Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Lianja) Get PDF DSS (Document Security Store)See more PDF Signatures ExamplesThis example demonstrates how to extract the information from a PDF's DSS (Document Security Store), if a /DSS exists. (Just because a PDF is signed does not mean a /DSS will exists. In fact, the /DSS is typically created at the point of adding the 2nd or greater signature because the /DSS contains LTV (long term validation) information about the previous signature at the time of adding an additional signature.) Note: This example requires Chilkat v9.5.0.85 or greater.
// This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. loPdf = createobject("CkPdf") llSuccess = loPdf.LoadFile("qa_data/pdf/sign_testing_1/helloSigned2.pdf") if (llSuccess = .F.) then ? loPdf.LastErrorText release loPdf return endif loJson = createobject("CkJsonObject") loJson.EmitCompact = .F. llSuccess = loPdf.GetDss(loJson) ? loJson.Emit() // The document security store contains certificates, OCSP responses, and CRLs. // The following JSON is a sample of what the /DSS can contain. // Unfortunately, our sample contains /Certs and /OCSPs, but no /CRLs. // It's no problem because whatever JSON you get back, you can use the // following online tool to generate code to parse. // Generate Parsing Code from JSON // The code generated by the online tool for this JSON is shown below.. // { // "/VRI": { // "/EC5BB34CC1F8A0C5FE674427E16E313A08C80808": {} // }, // "/Certs": [ // { // "serial": "02", // "validFrom": "2011-08-07T19:00:00-05:00", // "validTo": "2021-08-10T23:59:59-05:00", // "expired": false, // "subject": { // "CN": "XYZ Corporation", // "O": "XYZ" // }, // "issuer": { // "CN": "XYZ Corporation", // "O": "XYZ" // }, // "keyType": "RSA", // "keySize": "2048", // "der": "MIIDz...Q4Zt" // }, // { // "serial": "01", // "validFrom": "2011-08-07T19:00:00-05:00", // "validTo": "2021-08-10T23:59:59-05:00", // "expired": false, // "subject": { // "CN": "XYZ Corporation", // "O": "XYZ" // }, // "issuer": { // "CN": "XYZ Corporation", // "O": "XYZ" // }, // "keyType": "RSA", // "keySize": "2048", // "der": "MIID...jXYFc=" // }, // { // "serial": "0AA125D6D6321B7E41E405DA3697C215", // "validFrom": "2016-01-07T06:00:00-06:00", // "validTo": "2031-01-07T12:00:00-06:00", // "expired": false, // "subject": { // "CN": "DigiCert SHA2 Assured ID Timestamping CA", // "OU": "www.digicert.com", // "O": "DigiCert Inc", // "C": "US" // }, // "issuer": { // "CN": "DigiCert Assured ID Root CA", // "OU": "www.digicert.com", // "O": "DigiCert Inc", // "C": "US" // }, // "keyType": "RSA", // "keySize": "2048", // "der": "MIIF...OUg==" // }, // { // "serial": "04CD3F8568AE76C61BB0FE7160CCA76D", // "validFrom": "2019-09-30T19:00:00-05:00", // "validTo": "2030-10-17T00:00:00-05:00", // "expired": false, // "subject": { // "CN": "TIMESTAMP-SHA256-2019-10-15", // "O": "DigiCert, Inc.", // "C": "US" // }, // "issuer": { // "CN": "DigiCert SHA2 Assured ID Timestamping CA", // "OU": "www.digicert.com", // "O": "DigiCert Inc", // "C": "US" // }, // "keyType": "RSA", // "keySize": "2048", // "der": "MIIG...MJtPc=" // }, // { // "serial": "0CE7E0E517D846FE8FE560FC1BF03039", // "validFrom": "2006-11-09T18:00:00-06:00", // "validTo": "2031-11-10T00:00:00-06:00", // "expired": false, // "subject": { // "CN": "DigiCert Assured ID Root CA", // "OU": "www.digicert.com", // "O": "DigiCert Inc", // "C": "US" // }, // "issuer": { // "CN": "DigiCert Assured ID Root CA", // "OU": "www.digicert.com", // "O": "DigiCert Inc", // "C": "US" // }, // "keyType": "RSA", // "keySize": "2048", // "der": "MIIDt...FL6Lw8g==" // }, // { // "serial": "E4D34D01798BE686424AF7F6F0C3BF41", // "validFrom": "2015-03-24T10:58:16-05:00", // "validTo": "2039-12-31T23:59:59-06:00", // "expired": false, // "subject": { // "CN": "www.xyz.com" // }, // "issuer": { // "CN": "www.xyz.com" // }, // "keyType": "RSA", // "keySize": "1024", // "der": "MIIB9DCCAWG...UR10lz" // } // ], // "/OCSPs": [ // { // "responseStatus": 0, // "responseTypeOid": "1.3.6.1.5.5.7.48.1.1", // "responseTypeName": "ocspBasic", // "response": { // "responderIdChoice": "KeyHash", // "responderKeyHash": "Reuir/SSy4IxLVGLp6chnfNtyA8=", // "dateTime": "20201005173921Z", // "cert": [ // { // "hashOid": "1.3.14.3.2.26", // "hashAlg": "SHA-1", // "issuerNameHash": "98S+C0C1w0QzPT+uuU1uONr67FE=", // "issuerKeyHash": "Reuir/SSy4IxLVGLp6chnfNtyA8=", // "serialNumber": "0AA125D6D6321B7E41E405DA3697C215", // "status": 0, // "thisUpdate": "20201005173921Z", // "nextUpdate": "20201012173921Z" // } // ] // } // }, // { // "responseStatus": 0, // "responseTypeOid": "1.3.6.1.5.5.7.48.1.1", // "responseTypeName": "ocspBasic", // "response": { // "responderIdChoice": "KeyHash", // "responderKeyHash": "9LbhIB3+Ka7S5GGlsqIlssgXNW4=", // "dateTime": "20201006114501Z", // "cert": [ // { // "hashOid": "1.3.14.3.2.26", // "hashAlg": "SHA-1", // "issuerNameHash": "+YYA+KSr7NIxRSxCjUNQo25SyD0=", // "issuerKeyHash": "9LbhIB3+Ka7S5GGlsqIlssgXNW4=", // "serialNumber": "04CD3F8568AE76C61BB0FE7160CCA76D", // "status": 0, // "thisUpdate": "20201006114501Z", // "nextUpdate": "20201013110001Z" // } // ] // } // } // ] // } loResponseDateTime = createobject("CkDtObj") loThisUpdate = createobject("CkDtObj") loNextUpdate = createobject("CkDtObj") i = 0 lnCount_i = loJson.SizeOfArray("/Certs") do while i < lnCount_i loJson.I = i lcSerial = loJson.StringOf("/Certs[i].serial") lcValidFrom = loJson.StringOf("/Certs[i].validFrom") lcValidTo = loJson.StringOf("/Certs[i].validTo") llExpired = loJson.BoolOf("/Certs[i].expired") lcSubjectCN = loJson.StringOf("/Certs[i].subject.CN") lcSubjectO = loJson.StringOf("/Certs[i].subject.O") lcIssuerCN = loJson.StringOf("/Certs[i].issuer.CN") lcIssuerO = loJson.StringOf("/Certs[i].issuer.O") lcKeyType = loJson.StringOf("/Certs[i].keyType") lcKeySize = loJson.StringOf("/Certs[i].keySize") lcDer = loJson.StringOf("/Certs[i].der") lcSubjectOU = loJson.StringOf("/Certs[i].subject.OU") lcSubjectC = loJson.StringOf("/Certs[i].subject.C") lcIssuerOU = loJson.StringOf("/Certs[i].issuer.OU") lcIssuerC = loJson.StringOf("/Certs[i].issuer.C") i = i + 1 enddo i = 0 lnCount_i = loJson.SizeOfArray("/OCSPs") do while i < lnCount_i loJson.I = i lnResponseStatus = loJson.IntOf("/OCSPs[i].responseStatus") lcResponseTypeOid = loJson.StringOf("/OCSPs[i].responseTypeOid") lcResponseTypeName = loJson.StringOf("/OCSPs[i].responseTypeName") lcResponseResponderIdChoice = loJson.StringOf("/OCSPs[i].response.responderIdChoice") lcResponseResponderKeyHash = loJson.StringOf("/OCSPs[i].response.responderKeyHash") loJson.DtOf("/OCSPs[i].response.dateTime",.F.,loResponseDateTime) j = 0 lnCount_j = loJson.SizeOfArray("/OCSPs[i].response.cert") do while j < lnCount_j loJson.J = j lcHashOid = loJson.StringOf("/OCSPs[i].response.cert[j].hashOid") lcHashAlg = loJson.StringOf("/OCSPs[i].response.cert[j].hashAlg") lcIssuerNameHash = loJson.StringOf("/OCSPs[i].response.cert[j].issuerNameHash") lcIssuerKeyHash = loJson.StringOf("/OCSPs[i].response.cert[j].issuerKeyHash") lcSerialNumber = loJson.StringOf("/OCSPs[i].response.cert[j].serialNumber") lnStatus = loJson.IntOf("/OCSPs[i].response.cert[j].status") loJson.DtOf("/OCSPs[i].response.cert[j].thisUpdate",.F.,loThisUpdate) loJson.DtOf("/OCSPs[i].response.cert[j].nextUpdate",.F.,loNextUpdate) j = j + 1 enddo i = i + 1 enddo release loPdf release loJson release loResponseDateTime release loThisUpdate release loNextUpdate |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.