Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Swift 3,4,5...) Sign PDF with Timestamp from TSA (Timestamp Server Authority)See more PDF Signatures ExamplesThis example demonstrates how to a sign a PDF that is both long-term validation (LTV) enabled and includes a validating timestamp from a TSA (Timestamp Server Authority). Note: This example requires Chilkat v9.5.0.85 or greater.
func chilkatTest() { // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. let pdf = CkoPdf()! // Load a PDF to be signed. // The "hello.pdf" is available at https://chilkatsoft.com/hello.pdf var success: Bool = pdf.loadFile("qa_data/pdf/hello.pdf") if success == false { print("\(pdf.lastErrorText!)") return } // Options for signing are specified in JSON. let json = CkoJsonObject()! // In most cases, the signingCertificateV2 and signingTime attributes are required. json.updateInt("signingCertificateV2", value: 1) json.updateInt("signingTime", value: 1) // Tell Chilkat to create an LTV-enabled (long term validation) signature. // See PDF Long-Term Validation (LTV) Signature Example for more detailed comments about "ltvOcsp". json.updateBool("ltvOcsp", value: true) // Tell Chilkat to request a timestamp from a TSA server and include the timestamp token (1.2.840.113549.1.9.16.2.14) // in the CMS signature's authentication attributes json.updateBool("timestampToken.enabled", value: true) // In this example, we'll use a free TSA server (timestamp.digicert.com), but you may want to use your own timestamp authority server. json.update("timestampToken.tsaUrl", value: "http://timestamp.digicert.com") // If the timestamp server requires a username/password, do the following. Otherwise omit the following few lines of code. json.update("timestampToken.tsaUsername", value: "the_tsa_username") json.update("timestampToken.tsaPassword", value: "the_tsa_password") // When requesting the timestamp token, ask the server to include its certificate in the timestamp token response. // This allows for the timestamp server's certificate to be included in the LTV validation (i.e. if the timestamp server // has an OCSP URL, then Chilkat will also do the OCSP request for the timestamp server's certificate.) json.updateBool("timestampToken.requestTsaCert", value: true) // Define the appearance of the signature. json.updateInt("page", value: 1) json.update("appearance.y", value: "top") json.update("appearance.x", value: "left") json.update("appearance.fontScale", value: "10.0") json.update("appearance.text[0]", value: "Digitally signed by: cert_cn") json.update("appearance.text[1]", value: "current_dt") json.update("appearance.text[2]", value: "This is an LTV-enabled signature with a TSA timestamp.") // Load the signing certificate. (Use your own certificate.) let cert = CkoCert()! success = cert.loadPfxFile("qa_data/pfx/myPdfSigningCert.pfx", password: "pfxPassword") if success == false { print("\(cert.lastErrorText!)") return } // Tell the pdf object to use the certificate for signing. success = pdf.setSigning(cert) if success == false { print("\(pdf.lastErrorText!)") return } success = pdf.sign(json, outFilePath: "qa_output/hello_ltv_signed_with_timestamp.pdf") if success == false { print("\(pdf.lastErrorText!)") return } print("The PDF has been successfully cryptographically signed with TSA timestamp and long-term validation.") // If you open the Signature Panel in Adobe Acrobat, it will indicate that the signature is LTV enabled // and contains an embedded timestamp: } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.