PTVerificationOptions

@interface PTVerificationOptions : NSObject

Options pertaining to digital signature verification.

  • Constructs a set of options for digital signature verification.

    Declaration

    Objective-C

    - (instancetype)initWithImpl:(void *)impl;

    Swift

    init!(impl: UnsafeMutableRawPointer!)

    Parameters

    level

    – the general security level to use. Sets other security settings internally.

  • Undocumented

    Declaration

    Objective-C

    - (instancetype)initWithLevel: (PTVerificationOptionsSecurityLevel)level;
  • Adds a certificate to the store of trusted certificates inside this options object.

    Declaration

    Objective-C

    - (void)AddTrustedCertificateWithBuf:(NSData *)in_certificate_buf
                             in_buf_size:(unsigned long)in_buf_size
                          in_trust_flags:(unsigned short)in_trust_flags;

    Swift

    func addTrustedCertificate(withBuf in_certificate_buf: Data!, in_buf_size: UInt, in_trust_flags: UInt16)

    Parameters

    in_certificate_buf

    – a buffer consisting of the data of an X.509 public-key certificate encoded in binary DER (Distinguished Encoding Rules) format, or in PEM (appropriate Privacy-Enhanced Mail header+Base64 encoded DER+appropriate footer) format

    in_buf_size

    – buffer size

    in_trust_flags

    – a combination of trust flags (see enum CertificateTrustFlag) that determine for which situations this certificate should be trusted during trust verification. There is a default parameter value, the e_default_trust CertificateTrustFlag, which matches Acrobat’s behaviour for this parameter.

  • Undocumented

    Declaration

    Objective-C

    - (void)AddTrustedCertificate: (NSData*)in_certificate_buf in_buf_size:  (unsigned long)in_buf_size;

    Swift

    func addTrustedCertificate(_ in_certificate_buf: Data!, in_buf_size: UInt)
  • Adds a certificate to the store of trusted certificates inside this options object, by loading it from a file.

    Declaration

    Objective-C

    - (void)AddTrustedCertificateWithFilePath:(NSString *)in_filepath
                               in_trust_flags:(unsigned short)in_trust_flags;

    Swift

    func addTrustedCertificate(withFilePath in_filepath: String!, in_trust_flags: UInt16)

    Parameters

    in_filepath

    – a path to a file containing the data of an X.509 public-key certificate encoded in binary DER (Distinguished Encoding Rules) format, or in PEM (appropriate Privacy-Enhanced Mail header+Base64 encoded DER+appropriate footer) format.

    in_trust_flags

    – a combination of trust flags (see enum CertificateTrustFlag) that determine for which situations this certificate should be trusted during trust verification. There is a default parameter value, the e_default_trust CertificateTrustFlag, which matches Acrobat’s behaviour for this parameter.

  • Bulk trust list loading API from P7C. Attempts to decode the input data as binary DER and trust multiple trusted root certificates from it. Compatible with Acrobat’s .P7C format, which is a variation on PKCS #7/CMS that only contains certificates (i.e. no CRLs, no signature, etc.). If a certificate cannot be decoded, this is ignored and an attempt is made to decode the next certificate. This overload takes no account of trust-level flags because none are available in the P7C format. Therefore, when this function is used, all certificates in the P7C file will be loaded as if trusted for everything, which may lead to false positives when compared to other PDF software. (Most applications use the FDF Cert Exchange format.) The FDF-trust-list-loading function “LoadTrustList” should be used instead whenever possible.

    Declaration

    Objective-C

    - (void)AddTrustedCertificates:
                (NSData *)in_P7C_binary_DER_certificates_file_data
                           in_size:(unsigned long)in_size;

    Swift

    func addTrustedCertificates(_ in_P7C_binary_DER_certificates_file_data: Data!, in_size: UInt)

    Parameters

    in_P7C_binary_DER_certificates_file_data

    – the P7C-format bulk certificate data, encoded in binary DER (Distinguished Encoding Rules)

    in_size

    – the size of the data, in bytes

  • Bulk trust list loading API with trust flag support. Loads a trust list that is structured in Acrobat’s FDF Data/Cert Exchange format into the VerificationOptions certificate store. Use of this function is strongly recommended instead of the P7C API (i.e. AddTrustedCertificates). Certificates inside the FDF trust list that cannot be decoded and loaded, will be skipped.

    Declaration

    Objective-C

    - (void)LoadTrustList:(PTFDFDoc *)in_fdf_cert_exchange_data;

    Swift

    func loadTrustList(_ in_fdf_cert_exchange_data: PTFDFDoc!)

    Parameters

    in_fdf_cert_exchange_data

    – an FDFDoc from the FDF cert exchange data

  • Sets a flag that can turn on or off the verification of the permissibility of any modifications made to the document after the signing of the digital signature being verified, in terms of the document and field permissions specified by the digital signature being verified.

    Declaration

    Objective-C

    - (void)EnableModificationVerification:(BOOL)in_on_or_off;

    Swift

    func enableModificationVerification(_ in_on_or_off: Bool)

    Parameters

    in_on_or_off

    – A boolean.

  • Sets a flag that can turn on or off the verification of the digest (cryptographic hash) component of a digital signature.

    Declaration

    Objective-C

    - (void)EnableDigestVerification:(BOOL)in_on_or_off;

    Swift

    func enableDigestVerification(_ in_on_or_off: Bool)

    Parameters

    in_on_or_off

    – A boolean.

  • Sets a flag that can turn on or off the verification of the trust status of a digital signature.

    Declaration

    Objective-C

    - (void)EnableTrustVerification:(BOOL)in_on_or_off;

    Swift

    func enableTrustVerification(_ in_on_or_off: Bool)

    Parameters

    in_on_or_off

    – A boolean.

  • Enables/disables online CRL revocation checking. The default setting is for it to be turned off, but this may change in future versions.

    Note

    CRL checking is off by default because the technology is inherently complicated and resource-intensive, but may help improve verification rate when files are verified against a recent reference-time (e.g. maximum security mode), because online CRLs will be valid within that time. This mode will not be useful for old archival-type (‘LTV’) documents verified in archiving-and-compatibility security mode, because their online OCSP and/or CRL responder servers may not be alive anymore. However, such LTV documents can be created (if the CRL responder servers are still active) by enabling online checking, verifying, and then embedding the data using DigitalSignatureField.EnableLTVOfflineVerification.

    Declaration

    Objective-C

    - (void)EnableOnlineCRLRevocationChecking:(BOOL)in_on_or_off;

    Swift

    func enableOnlineCRLRevocationChecking(_ in_on_or_off: Bool)

    Parameters

    in_on_or_off

    – what setting to use

  • Enables/disables online OCSP revocation checking. The default setting is for it to be turned on.

    Declaration

    Objective-C

    - (void)EnableOnlineOCSPRevocationChecking:(BOOL)in_on_or_off;

    Swift

    func enableOnlineOCSPRevocationChecking(_ in_on_or_off: Bool)

    Parameters

    in_on_or_off

    – what setting to use.

  • Enables/disables all online revocation checking modes. The default settings are that online OCSP is turned on and online CRL is turned off, but the default CRL setting may change in future versions.

    Note

    CRL checking is off by default because the technology is inherently complicated and resource-intensive, but may help improve verification rate when files are verified against a recent reference-time (e.g. maximum security mode), because online CRLs will be valid within that time. This mode will not be useful for old archival-type (‘LTV’) documents verified in archiving-and-compatibility security mode, because their online OCSP and/or CRL responder servers may not be alive anymore. However, such LTV documents can be created (if the CRL responder servers are still active) by enabling online checking, verifying, and then embedding the data using DigitalSignatureField.EnableLTVOfflineVerification.

    Declaration

    Objective-C

    - (void)EnableOnlineRevocationChecking:(BOOL)in_on_or_off;

    Swift

    func enableOnlineRevocationChecking(_ in_on_or_off: Bool)

    Parameters

    in_on_or_off

    – what setting to use