SignDoc SDK (C)  5.0.0
Trusted Root Certificates

Under Windows, SignDoc SDK verifies certificates against trusted root certificates in the Windows Certificate Store.

Under Linux and OS X, SignDoc SDK uses OpenSSL for verifying certificates. The OpenSSL root directory is /etc/softpro/ssl. Put trusted certificates into file /etc/softpro/ssl/cert.pem or create a hashed directory of certificates in /etc/softpro/ssl/certs. You can also make /etc/softpro/ssl a symbolic link to /etc/ssl to use the certificates trusted by the operating system.

Under iOS, SignDoc SDK uses OpenSSL for verifying certificates as the certificate verification function of iOS does not provide enough information. Unfortunately, the trusted certificates of iOS (anchor certificates) cannot be exported and thus cannot be used by OpenSSL. The OpenSSL root directory is ssl in the application bundle directory. Put trusted certificates into file ssl/cert.pem of your application bundle or create a hashed directory of certificates in ssl/certs.

Under Android, SignDoc SDK uses OpenSSL for verifying certificates. The OpenSSL root directory is files/ssl in the application directory. Put trusted certificates into file files/ssl/cert.pem or create a hashed directory of certificates in files/ssl/certs.

You can change the trusted certificates file and directory used by OpenSSL by setting environment variables SSL_CERT_FILE and SSL_CERT_DIR, respectively.