Chilkat HOME .NET Core C# Android™ AutoIt C C# C++ Chilkat2-Python CkPython Classic ASP DataFlex Delphi ActiveX Delphi DLL Go Java Lianja Mono C# Node.js Objective-C PHP ActiveX PHP Extension Perl PowerBuilder PowerShell PureBasic Ruby SQL Server Swift 2 Swift 3,4,5... Tcl Unicode C Unicode C++ VB.NET VBScript Visual Basic 6.0 Visual FoxPro Xojo Plugin
(Unicode C) Validate PDF SignaturesSee more PDF Signatures ExamplesThis example demonstrates how to validate the signatures in a PDF and also shows how to get information from each signature. Note: This example requires Chilkat v9.5.0.85 or greater.
#include <C_CkPdfW.h> #include <C_CkJsonObjectW.h> #include <C_CkDtObjW.h> void ChilkatSample(void) { HCkPdfW pdf; BOOL success; HCkJsonObjectW sigInfo; int numSignatures; BOOL validated; int i; HCkJsonObjectW json; HCkDtObjW unauthAttrTimestampTokenTstInfoGenTime; HCkDtObjW signingTime; HCkDtObjW authAttrSigningTimeUtctime; int intVal; const wchar_t *strVal; const wchar_t *issuerCN; const wchar_t *serial; const wchar_t *certSerialNumber; const wchar_t *certIssuerCN; const wchar_t *certDigestAlgOid; const wchar_t *certDigestAlgName; const wchar_t *contentType; const wchar_t *messageDigest; const wchar_t *signingAlgOid; const wchar_t *signingAlgName; const wchar_t *authAttr1_2_840_113583_1_1_8Der; const wchar_t *authAttrContentTypeName; const wchar_t *authAttrContentTypeOid; const wchar_t *authAttrMessageDigestName; const wchar_t *authAttrMessageDigestDigest; const wchar_t *unauthAttrTimestampTokenName; const wchar_t *unauthAttrTimestampTokenDer; BOOL unauthAttrTimestampTokenTimestampSignatureVerified; const wchar_t *unauthAttrTimestampTokenTstInfoTsaPolicyId; const wchar_t *unauthAttrTimestampTokenTstInfoMessageImprintHashAlg; const wchar_t *unauthAttrTimestampTokenTstInfoMessageImprintDigest; BOOL unauthAttrTimestampTokenTstInfoMessageImprintDigestMatches; const wchar_t *unauthAttrTimestampTokenTstInfoSerialNumber; int j; int count_j; const wchar_t *authAttrSigningTimeName; const wchar_t *authAttrSigningCertificateName; const wchar_t *authAttrSigningCertificateDer; const wchar_t *signatureDictionary_Contents; const wchar_t *signatureDictionary_Filter; const wchar_t *signatureDictionary_M; const wchar_t *signatureDictionary_Name; const wchar_t *signatureDictionary_Prop_Build_App_Name; int signatureDictionary_Prop_Build_App_R; const wchar_t *signatureDictionary_Prop_Build_App_REx; BOOL signatureDictionary_Prop_Build_App_TrustedMode; const wchar_t *signatureDictionary_Prop_Build_Filter_Date; const wchar_t *signatureDictionary_Prop_Build_Filter_Name; int signatureDictionary_Prop_Build_Filter_R; int signatureDictionary_Prop_Build_Filter_V; const wchar_t *signatureDictionary_Prop_Build_PubSec_Date; BOOL signatureDictionary_Prop_Build_PubSec_NonEFontNoWarn; int signatureDictionary_Prop_Build_PubSec_R; const wchar_t *signatureDictionary_SubFilter; const wchar_t *signatureDictionary_Type; int count_i; // This example requires the Chilkat API to have been previously unlocked. // See Global Unlock Sample for sample code. pdf = CkPdfW_Create(); // Load a PDF that has cryptographic signatures to be validated success = CkPdfW_LoadFile(pdf,L"qa_data/pdf/sign_testing_1/helloSigned2.pdf"); if (success == FALSE) { wprintf(L"%s\n",CkPdfW_lastErrorText(pdf)); CkPdfW_Dispose(pdf); return; } // Each time we verify a signature, information about the signature is written into // sigInfo (replacing whatever sigInfo previously contained). sigInfo = CkJsonObjectW_Create(); CkJsonObjectW_putEmitCompact(sigInfo,FALSE); // Iterate over each signature and validate each. numSignatures = CkPdfW_getNumSignatures(pdf); validated = FALSE; i = 0; while (i < numSignatures) { validated = CkPdfW_VerifySignature(pdf,i,sigInfo); wprintf(L"Signature %d validated: %d\n",i,validated); wprintf(L"%s\n",CkJsonObjectW_emit(sigInfo)); i = i + 1; } wprintf(L"Finished.\n"); // When VerifySignature validates a signature, a lot of information is deposited into the JSON sigInfo object. // The information can vary depending on what was included in the signature (for example, various authenticated attributes // and unauthenticated attributes may or may not be included). // Here is a sample of the information you'll see. // // The following online tool can be used to generate code to parse any given JSON. // Generate Parsing Code from JSON // { // "validated": true, // "signatureDictionary": { <--- This is the contents of the PDF Signature Dictionary for this signature. // "/ByteRange": [ // 0, // 154682, // 170512, // 3233 // ], // "/Contents": "<hex_data>", // "/Filter": "/Adobe.PPKLite", <--- The meaning of the Signature Dictionary entries are defined in the PDF format specification document. // "/M": "D:20201006110216-05'00'", // "/Name": "yubikey rsa 1024 authentication", // "/Prop_Build": { // "/App": { // "/Name": "/Adobe#20Acrobat#20Pro#20DC", // "/OS": [ // "/Win" // ], // "/R": 1313792, // "/REx": "2020.012.20048", // "/TrustedMode": true // }, // "/Filter": { // "/Date": "Sep 11 2020 16:30:54", // "/Name": "/Adobe.PPKLite", // "/R": 131104, // "/V": 2 // }, // "/PubSec": { // "/Date": "Sep 11 2020 16:30:54", // "/NonEFontNoWarn": true, // "/R": 131105 // } // }, // "/SubFilter": "/adbe.pkcs7.detached", // "/Type": "/Sig" // }, // "pkcs7": { <--- This is the content of the CMS signature. // "verify": { // "certs": [ <--- Each signing certificate is listed here (by issuer common name and signing cert's serail number (in hex)) // { // "issuerCN": "yubikey rsa 1024 authentication", // "serial": "66BE58138D761E92BC594A722932657BE26D421F" // } // ], // "digestAlgorithms": [ // "sha256" // ], // "signerInfo": [ <--- contains data from each SignerInfo // { // "cert": { // "serialNumber": "66BE58138D761E92BC594A722932657BE26D421F", // "issuerCN": "yubikey rsa 1024 authentication", // "digestAlgOid": "2.16.840.1.101.3.4.2.1", // "digestAlgName": "SHA256" // }, // "contentType": "1.2.840.113549.1.7.1", // "messageDigest": "btQOuSEvC31mdRFHtyEUPw8R9NuKfk0XPcQ6Lcmn6pk=", // "signingAlgOid": "1.2.840.113549.1.1.11", // "signingAlgName": "RSA-SHA256-PKCSV-1_5", // "authAttr": { <--- CMS authenticated attributes are contained here. // "1.2.840.113583.1.1.8": { // "der": "MAA=" // }, // "1.2.840.113549.1.9.3": { // "name": "contentType", // "oid": "1.2.840.113549.1.7.1" // }, // "1.2.840.113549.1.9.4": { // "name": "messageDigest", // "digest": "btQOuSEvC31mdRFHtyEUPw8R9NuKfk0XPcQ6Lcmn6pk=" // } // }, // "unauthAttr": { <--- CMS unauthenticated attributes are contained here. // "1.2.840.113549.1.9.16.2.14": { // "name": "timestampToken", // "der": "MIIOvAYJKo ... Es/70g=", // "verify": { // "digestAlgorithms": [ // "sha256" // ], // "signerInfo": [ // { // "cert": { // "serialNumber": "04CD3F8568AE76C61BB0FE7160CCA76D", // "issuerCN": "DigiCert SHA2 Assured ID Timestamping CA", // "digestAlgOid": "2.16.840.1.101.3.4.2.1", // "digestAlgName": "SHA256" // }, // "contentType": "1.2.840.113549.1.9.16.1.4", // "signingTime": "201006160423Z", // "messageDigest": "Atv5Rj3kidB8IR6CplYiX3o6De/k8SC6JJ6uUPAGO0g=", // "signingAlgOid": "1.2.840.113549.1.1.1", // "signingAlgName": "RSA-PKCSV-1_5", // "authAttr": { // "1.2.840.113549.1.9.3": { // "name": "contentType", // "oid": "1.2.840.113549.1.9.16.1.4" // }, // "1.2.840.113549.1.9.5": { // "name": "signingTime", // "utctime": "201006160423Z" // }, // "1.2.840.113549.1.9.16.2.12": { // "name": "signingCertificate", // "der": "MBowGDAWBBQDJb1QXtqWMC3CL0+gHkwovig0xQ==" // }, // "1.2.840.113549.1.9.4": { // "name": "messageDigest", // "digest": "Atv5Rj3kidB8IR6CplYiX3o6De/k8SC6JJ6uUPAGO0g=" // } // } // } // ] // }, // "timestampSignatureVerified": true, // "tstInfo": { // "tsaPolicyId": "2.16.840.1.114412.7.1", // "messageImprint": { // "hashAlg": "sha256", // "digest": "gLJtrRWUSDfjzDkF1MfWG1wyHA6FrUJLkWMGRG+eMlA=", // "digestMatches": true // }, // "serialNumber": "00CE57E1113970607EF63B1D1160545321", // "genTime": "20201006160423Z" // } // } // } // } // ], // "pkcs7": { // "verify": { // "certs": [ // { // "issuerCN": "DigiCert SHA2 Assured ID Timestamping CA", // "serial": "04CD3F8568AE76C61BB0FE7160CCA76D" // }, // { // "issuerCN": "DigiCert Assured ID Root CA", // "serial": "0AA125D6D6321B7E41E405DA3697C215" // } // ] // } // } // } // } // } // **** The point of this code is to show how to get at each desired piece of information contained in the signature. // **** If your signature contains additional information not shown here, then you can use the online tool to generate the parse code. // **** It is likely you're only interested in a few items of information, and therefore you wouldn't copy all of this code, but might // **** choose to use bits and pieces to get the information you find important. json = CkJsonObjectW_Create(); // Imagine that the "json" object contains the information obtained by validating a signature... // The code below was generated using the online tool: Generate Parsing Code from JSON // Chilkat functions returning "const char *" return a pointer to temporary internal memory owned and managed by Chilkat. // See this example explaining how this memory should be used: const char * functions. unauthAttrTimestampTokenTstInfoGenTime = CkDtObjW_Create(); signingTime = CkDtObjW_Create(); authAttrSigningTimeUtctime = CkDtObjW_Create(); validated = CkJsonObjectW_BoolOf(json,L"validated"); signatureDictionary_Contents = CkJsonObjectW_stringOf(json,L"signatureDictionary./Contents"); signatureDictionary_Filter = CkJsonObjectW_stringOf(json,L"signatureDictionary./Filter"); signatureDictionary_M = CkJsonObjectW_stringOf(json,L"signatureDictionary./M"); signatureDictionary_Name = CkJsonObjectW_stringOf(json,L"signatureDictionary./Name"); signatureDictionary_Prop_Build_App_Name = CkJsonObjectW_stringOf(json,L"signatureDictionary./Prop_Build./App./Name"); signatureDictionary_Prop_Build_App_R = CkJsonObjectW_IntOf(json,L"signatureDictionary./Prop_Build./App./R"); signatureDictionary_Prop_Build_App_REx = CkJsonObjectW_stringOf(json,L"signatureDictionary./Prop_Build./App./REx"); signatureDictionary_Prop_Build_App_TrustedMode = CkJsonObjectW_BoolOf(json,L"signatureDictionary./Prop_Build./App./TrustedMode"); signatureDictionary_Prop_Build_Filter_Date = CkJsonObjectW_stringOf(json,L"signatureDictionary./Prop_Build./Filter./Date"); signatureDictionary_Prop_Build_Filter_Name = CkJsonObjectW_stringOf(json,L"signatureDictionary./Prop_Build./Filter./Name"); signatureDictionary_Prop_Build_Filter_R = CkJsonObjectW_IntOf(json,L"signatureDictionary./Prop_Build./Filter./R"); signatureDictionary_Prop_Build_Filter_V = CkJsonObjectW_IntOf(json,L"signatureDictionary./Prop_Build./Filter./V"); signatureDictionary_Prop_Build_PubSec_Date = CkJsonObjectW_stringOf(json,L"signatureDictionary./Prop_Build./PubSec./Date"); signatureDictionary_Prop_Build_PubSec_NonEFontNoWarn = CkJsonObjectW_BoolOf(json,L"signatureDictionary./Prop_Build./PubSec./NonEFontNoWarn"); signatureDictionary_Prop_Build_PubSec_R = CkJsonObjectW_IntOf(json,L"signatureDictionary./Prop_Build./PubSec./R"); signatureDictionary_SubFilter = CkJsonObjectW_stringOf(json,L"signatureDictionary./SubFilter"); signatureDictionary_Type = CkJsonObjectW_stringOf(json,L"signatureDictionary./Type"); i = 0; count_i = CkJsonObjectW_SizeOfArray(json,L"signatureDictionary./ByteRange"); while (i < count_i) { CkJsonObjectW_putI(json,i); intVal = CkJsonObjectW_IntOf(json,L"signatureDictionary./ByteRange[i]"); i = i + 1; } i = 0; count_i = CkJsonObjectW_SizeOfArray(json,L"signatureDictionary./Prop_Build./App./OS"); while (i < count_i) { CkJsonObjectW_putI(json,i); strVal = CkJsonObjectW_stringOf(json,L"signatureDictionary./Prop_Build./App./OS[i]"); i = i + 1; } i = 0; count_i = CkJsonObjectW_SizeOfArray(json,L"pkcs7.verify.certs"); while (i < count_i) { CkJsonObjectW_putI(json,i); issuerCN = CkJsonObjectW_stringOf(json,L"pkcs7.verify.certs[i].issuerCN"); serial = CkJsonObjectW_stringOf(json,L"pkcs7.verify.certs[i].serial"); i = i + 1; } i = 0; count_i = CkJsonObjectW_SizeOfArray(json,L"pkcs7.verify.digestAlgorithms"); while (i < count_i) { CkJsonObjectW_putI(json,i); strVal = CkJsonObjectW_stringOf(json,L"pkcs7.verify.digestAlgorithms[i]"); i = i + 1; } i = 0; count_i = CkJsonObjectW_SizeOfArray(json,L"pkcs7.verify.signerInfo"); while (i < count_i) { CkJsonObjectW_putI(json,i); certSerialNumber = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].cert.serialNumber"); certIssuerCN = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].cert.issuerCN"); certDigestAlgOid = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].cert.digestAlgOid"); certDigestAlgName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].cert.digestAlgName"); contentType = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].contentType"); messageDigest = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].messageDigest"); signingAlgOid = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].signingAlgOid"); signingAlgName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].signingAlgName"); authAttr1_2_840_113583_1_1_8Der = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113583.1.1.8\".der"); authAttrContentTypeName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.3\".name"); authAttrContentTypeOid = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.3\".oid"); authAttrMessageDigestName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.4\".name"); authAttrMessageDigestDigest = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].authAttr.\"1.2.840.113549.1.9.4\".digest"); unauthAttrTimestampTokenName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".name"); unauthAttrTimestampTokenDer = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".der"); unauthAttrTimestampTokenTimestampSignatureVerified = CkJsonObjectW_BoolOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".timestampSignatureVerified"); unauthAttrTimestampTokenTstInfoTsaPolicyId = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".tstInfo.tsaPolicyId"); unauthAttrTimestampTokenTstInfoMessageImprintHashAlg = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".tstInfo.messageImprint.hashAlg"); unauthAttrTimestampTokenTstInfoMessageImprintDigest = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".tstInfo.messageImprint.digest"); unauthAttrTimestampTokenTstInfoMessageImprintDigestMatches = CkJsonObjectW_BoolOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".tstInfo.messageImprint.digestMatches"); unauthAttrTimestampTokenTstInfoSerialNumber = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".tstInfo.serialNumber"); CkJsonObjectW_DtOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".tstInfo.genTime",FALSE,unauthAttrTimestampTokenTstInfoGenTime); j = 0; count_j = CkJsonObjectW_SizeOfArray(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.digestAlgorithms"); while (j < count_j) { CkJsonObjectW_putJ(json,j); strVal = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.digestAlgorithms[j]"); j = j + 1; } j = 0; count_j = CkJsonObjectW_SizeOfArray(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo"); while (j < count_j) { CkJsonObjectW_putJ(json,j); certSerialNumber = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].cert.serialNumber"); certIssuerCN = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].cert.issuerCN"); certDigestAlgOid = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].cert.digestAlgOid"); certDigestAlgName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].cert.digestAlgName"); contentType = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].contentType"); CkJsonObjectW_DtOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].signingTime",FALSE,signingTime); messageDigest = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].messageDigest"); signingAlgOid = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].signingAlgOid"); signingAlgName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].signingAlgName"); authAttrContentTypeName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].authAttr.\"1.2.840.113549.1.9.3\".name"); authAttrContentTypeOid = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].authAttr.\"1.2.840.113549.1.9.3\".oid"); authAttrSigningTimeName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].authAttr.\"1.2.840.113549.1.9.5\".name"); CkJsonObjectW_DtOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].authAttr.\"1.2.840.113549.1.9.5\".utctime",FALSE,authAttrSigningTimeUtctime); authAttrSigningCertificateName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].authAttr.\"1.2.840.113549.1.9.16.2.12\".name"); authAttrSigningCertificateDer = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].authAttr.\"1.2.840.113549.1.9.16.2.12\".der"); authAttrMessageDigestName = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].authAttr.\"1.2.840.113549.1.9.4\".name"); authAttrMessageDigestDigest = CkJsonObjectW_stringOf(json,L"pkcs7.verify.signerInfo[i].unauthAttr.\"1.2.840.113549.1.9.16.2.14\".verify.signerInfo[j].authAttr.\"1.2.840.113549.1.9.4\".digest"); j = j + 1; } i = i + 1; } i = 0; count_i = CkJsonObjectW_SizeOfArray(json,L"pkcs7.verify.pkcs7.verify.certs"); while (i < count_i) { CkJsonObjectW_putI(json,i); issuerCN = CkJsonObjectW_stringOf(json,L"pkcs7.verify.pkcs7.verify.certs[i].issuerCN"); serial = CkJsonObjectW_stringOf(json,L"pkcs7.verify.pkcs7.verify.certs[i].serial"); i = i + 1; } CkPdfW_Dispose(pdf); CkJsonObjectW_Dispose(sigInfo); CkJsonObjectW_Dispose(json); CkDtObjW_Dispose(unauthAttrTimestampTokenTstInfoGenTime); CkDtObjW_Dispose(signingTime); CkDtObjW_Dispose(authAttrSigningTimeUtctime); } |
© 2000-2024 Chilkat Software, Inc. All Rights Reserved.