hexapdf 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/CONTRIBUTERS +3 -0
- data/LICENSE +26 -0
- data/README.md +88 -0
- data/Rakefile +121 -0
- data/VERSION +1 -0
- data/agpl-3.0.txt +661 -0
- data/bin/hexapdf +6 -0
- data/data/hexapdf/afm/Courier-Bold.afm +342 -0
- data/data/hexapdf/afm/Courier-BoldOblique.afm +342 -0
- data/data/hexapdf/afm/Courier-Oblique.afm +342 -0
- data/data/hexapdf/afm/Courier.afm +342 -0
- data/data/hexapdf/afm/Helvetica-Bold.afm +2827 -0
- data/data/hexapdf/afm/Helvetica-BoldOblique.afm +2827 -0
- data/data/hexapdf/afm/Helvetica-Oblique.afm +3051 -0
- data/data/hexapdf/afm/Helvetica.afm +3051 -0
- data/data/hexapdf/afm/MustRead.html +1 -0
- data/data/hexapdf/afm/Symbol.afm +213 -0
- data/data/hexapdf/afm/Times-Bold.afm +2588 -0
- data/data/hexapdf/afm/Times-BoldItalic.afm +2384 -0
- data/data/hexapdf/afm/Times-Italic.afm +2667 -0
- data/data/hexapdf/afm/Times-Roman.afm +2419 -0
- data/data/hexapdf/afm/ZapfDingbats.afm +225 -0
- data/data/hexapdf/encoding/glyphlist.txt +4305 -0
- data/data/hexapdf/encoding/zapfdingbats.txt +225 -0
- data/examples/arc.rb +50 -0
- data/examples/graphics.rb +274 -0
- data/examples/hello_world.rb +16 -0
- data/examples/machupicchu.jpg +0 -0
- data/examples/merging.rb +24 -0
- data/examples/optimizing.rb +20 -0
- data/examples/show_char_bboxes.rb +55 -0
- data/examples/standard_pdf_fonts.rb +72 -0
- data/examples/truetype.rb +45 -0
- data/lib/hexapdf/cli/extract.rb +128 -0
- data/lib/hexapdf/cli/info.rb +121 -0
- data/lib/hexapdf/cli/inspect.rb +157 -0
- data/lib/hexapdf/cli/modify.rb +218 -0
- data/lib/hexapdf/cli.rb +121 -0
- data/lib/hexapdf/configuration.rb +392 -0
- data/lib/hexapdf/content/canvas.rb +1974 -0
- data/lib/hexapdf/content/color_space.rb +364 -0
- data/lib/hexapdf/content/graphic_object/arc.rb +267 -0
- data/lib/hexapdf/content/graphic_object/endpoint_arc.rb +208 -0
- data/lib/hexapdf/content/graphic_object/solid_arc.rb +173 -0
- data/lib/hexapdf/content/graphic_object.rb +81 -0
- data/lib/hexapdf/content/graphics_state.rb +579 -0
- data/lib/hexapdf/content/operator.rb +1072 -0
- data/lib/hexapdf/content/parser.rb +204 -0
- data/lib/hexapdf/content/processor.rb +451 -0
- data/lib/hexapdf/content/transformation_matrix.rb +172 -0
- data/lib/hexapdf/content.rb +47 -0
- data/lib/hexapdf/data_dir.rb +51 -0
- data/lib/hexapdf/dictionary.rb +303 -0
- data/lib/hexapdf/dictionary_fields.rb +382 -0
- data/lib/hexapdf/document.rb +589 -0
- data/lib/hexapdf/document_utils.rb +209 -0
- data/lib/hexapdf/encryption/aes.rb +206 -0
- data/lib/hexapdf/encryption/arc4.rb +93 -0
- data/lib/hexapdf/encryption/fast_aes.rb +79 -0
- data/lib/hexapdf/encryption/fast_arc4.rb +67 -0
- data/lib/hexapdf/encryption/identity.rb +63 -0
- data/lib/hexapdf/encryption/ruby_aes.rb +447 -0
- data/lib/hexapdf/encryption/ruby_arc4.rb +96 -0
- data/lib/hexapdf/encryption/security_handler.rb +494 -0
- data/lib/hexapdf/encryption/standard_security_handler.rb +616 -0
- data/lib/hexapdf/encryption.rb +94 -0
- data/lib/hexapdf/error.rb +73 -0
- data/lib/hexapdf/filter/ascii85_decode.rb +160 -0
- data/lib/hexapdf/filter/ascii_hex_decode.rb +87 -0
- data/lib/hexapdf/filter/dct_decode.rb +57 -0
- data/lib/hexapdf/filter/encryption.rb +59 -0
- data/lib/hexapdf/filter/flate_decode.rb +93 -0
- data/lib/hexapdf/filter/jpx_decode.rb +56 -0
- data/lib/hexapdf/filter/lzw_decode.rb +191 -0
- data/lib/hexapdf/filter/predictor.rb +266 -0
- data/lib/hexapdf/filter/run_length_decode.rb +108 -0
- data/lib/hexapdf/filter.rb +176 -0
- data/lib/hexapdf/font/cmap/parser.rb +146 -0
- data/lib/hexapdf/font/cmap/writer.rb +176 -0
- data/lib/hexapdf/font/cmap.rb +90 -0
- data/lib/hexapdf/font/encoding/base.rb +77 -0
- data/lib/hexapdf/font/encoding/difference_encoding.rb +64 -0
- data/lib/hexapdf/font/encoding/glyph_list.rb +150 -0
- data/lib/hexapdf/font/encoding/mac_expert_encoding.rb +221 -0
- data/lib/hexapdf/font/encoding/mac_roman_encoding.rb +265 -0
- data/lib/hexapdf/font/encoding/standard_encoding.rb +205 -0
- data/lib/hexapdf/font/encoding/symbol_encoding.rb +244 -0
- data/lib/hexapdf/font/encoding/win_ansi_encoding.rb +280 -0
- data/lib/hexapdf/font/encoding/zapf_dingbats_encoding.rb +250 -0
- data/lib/hexapdf/font/encoding.rb +68 -0
- data/lib/hexapdf/font/true_type/font.rb +179 -0
- data/lib/hexapdf/font/true_type/table/cmap.rb +103 -0
- data/lib/hexapdf/font/true_type/table/cmap_subtable.rb +384 -0
- data/lib/hexapdf/font/true_type/table/directory.rb +92 -0
- data/lib/hexapdf/font/true_type/table/glyf.rb +166 -0
- data/lib/hexapdf/font/true_type/table/head.rb +143 -0
- data/lib/hexapdf/font/true_type/table/hhea.rb +109 -0
- data/lib/hexapdf/font/true_type/table/hmtx.rb +79 -0
- data/lib/hexapdf/font/true_type/table/loca.rb +79 -0
- data/lib/hexapdf/font/true_type/table/maxp.rb +112 -0
- data/lib/hexapdf/font/true_type/table/name.rb +218 -0
- data/lib/hexapdf/font/true_type/table/os2.rb +200 -0
- data/lib/hexapdf/font/true_type/table/post.rb +230 -0
- data/lib/hexapdf/font/true_type/table.rb +155 -0
- data/lib/hexapdf/font/true_type.rb +48 -0
- data/lib/hexapdf/font/true_type_wrapper.rb +240 -0
- data/lib/hexapdf/font/type1/afm_parser.rb +230 -0
- data/lib/hexapdf/font/type1/character_metrics.rb +67 -0
- data/lib/hexapdf/font/type1/font.rb +123 -0
- data/lib/hexapdf/font/type1/font_metrics.rb +117 -0
- data/lib/hexapdf/font/type1/pfb_parser.rb +71 -0
- data/lib/hexapdf/font/type1.rb +52 -0
- data/lib/hexapdf/font/type1_wrapper.rb +193 -0
- data/lib/hexapdf/font_loader/from_configuration.rb +70 -0
- data/lib/hexapdf/font_loader/standard14.rb +98 -0
- data/lib/hexapdf/font_loader.rb +85 -0
- data/lib/hexapdf/font_utils.rb +89 -0
- data/lib/hexapdf/image_loader/jpeg.rb +166 -0
- data/lib/hexapdf/image_loader/pdf.rb +89 -0
- data/lib/hexapdf/image_loader/png.rb +410 -0
- data/lib/hexapdf/image_loader.rb +68 -0
- data/lib/hexapdf/importer.rb +139 -0
- data/lib/hexapdf/name_tree_node.rb +78 -0
- data/lib/hexapdf/number_tree_node.rb +67 -0
- data/lib/hexapdf/object.rb +363 -0
- data/lib/hexapdf/parser.rb +349 -0
- data/lib/hexapdf/rectangle.rb +99 -0
- data/lib/hexapdf/reference.rb +98 -0
- data/lib/hexapdf/revision.rb +206 -0
- data/lib/hexapdf/revisions.rb +194 -0
- data/lib/hexapdf/serializer.rb +326 -0
- data/lib/hexapdf/stream.rb +279 -0
- data/lib/hexapdf/task/dereference.rb +109 -0
- data/lib/hexapdf/task/optimize.rb +230 -0
- data/lib/hexapdf/task.rb +68 -0
- data/lib/hexapdf/tokenizer.rb +406 -0
- data/lib/hexapdf/type/catalog.rb +107 -0
- data/lib/hexapdf/type/embedded_file.rb +87 -0
- data/lib/hexapdf/type/file_specification.rb +232 -0
- data/lib/hexapdf/type/font.rb +81 -0
- data/lib/hexapdf/type/font_descriptor.rb +109 -0
- data/lib/hexapdf/type/font_simple.rb +190 -0
- data/lib/hexapdf/type/font_true_type.rb +47 -0
- data/lib/hexapdf/type/font_type1.rb +162 -0
- data/lib/hexapdf/type/form.rb +103 -0
- data/lib/hexapdf/type/graphics_state_parameter.rb +79 -0
- data/lib/hexapdf/type/image.rb +73 -0
- data/lib/hexapdf/type/info.rb +70 -0
- data/lib/hexapdf/type/names.rb +69 -0
- data/lib/hexapdf/type/object_stream.rb +224 -0
- data/lib/hexapdf/type/page.rb +355 -0
- data/lib/hexapdf/type/page_tree_node.rb +269 -0
- data/lib/hexapdf/type/resources.rb +212 -0
- data/lib/hexapdf/type/trailer.rb +128 -0
- data/lib/hexapdf/type/viewer_preferences.rb +73 -0
- data/lib/hexapdf/type/xref_stream.rb +204 -0
- data/lib/hexapdf/type.rb +67 -0
- data/lib/hexapdf/utils/bit_field.rb +87 -0
- data/lib/hexapdf/utils/bit_stream.rb +148 -0
- data/lib/hexapdf/utils/lru_cache.rb +65 -0
- data/lib/hexapdf/utils/math_helpers.rb +55 -0
- data/lib/hexapdf/utils/object_hash.rb +130 -0
- data/lib/hexapdf/utils/pdf_doc_encoding.rb +93 -0
- data/lib/hexapdf/utils/sorted_tree_node.rb +339 -0
- data/lib/hexapdf/version.rb +39 -0
- data/lib/hexapdf/writer.rb +199 -0
- data/lib/hexapdf/xref_section.rb +152 -0
- data/lib/hexapdf.rb +34 -0
- data/man/man1/hexapdf.1 +249 -0
- data/test/data/aes-test-vectors/CBCGFSbox-128-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCGFSbox-128-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCGFSbox-192-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCGFSbox-192-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCGFSbox-256-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCGFSbox-256-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCKeySbox-128-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCKeySbox-128-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCKeySbox-192-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCKeySbox-192-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCKeySbox-256-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCKeySbox-256-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarKey-128-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarKey-128-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarKey-192-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarKey-192-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarKey-256-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarKey-256-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarTxt-128-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarTxt-128-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarTxt-192-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarTxt-192-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarTxt-256-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarTxt-256-encrypt.data.gz +0 -0
- data/test/data/fonts/Ubuntu-Title.ttf +0 -0
- data/test/data/images/cmyk.jpg +0 -0
- data/test/data/images/fillbytes.jpg +0 -0
- data/test/data/images/gray.jpg +0 -0
- data/test/data/images/greyscale-1bit.png +0 -0
- data/test/data/images/greyscale-2bit.png +0 -0
- data/test/data/images/greyscale-4bit.png +0 -0
- data/test/data/images/greyscale-8bit.png +0 -0
- data/test/data/images/greyscale-alpha-8bit.png +0 -0
- data/test/data/images/greyscale-trns-8bit.png +0 -0
- data/test/data/images/greyscale-with-gamma1.0.png +0 -0
- data/test/data/images/greyscale-with-gamma1.5.png +0 -0
- data/test/data/images/indexed-1bit.png +0 -0
- data/test/data/images/indexed-2bit.png +0 -0
- data/test/data/images/indexed-4bit.png +0 -0
- data/test/data/images/indexed-8bit.png +0 -0
- data/test/data/images/indexed-alpha-4bit.png +0 -0
- data/test/data/images/indexed-alpha-8bit.png +0 -0
- data/test/data/images/rgb.jpg +0 -0
- data/test/data/images/truecolour-8bit.png +0 -0
- data/test/data/images/truecolour-alpha-8bit.png +0 -0
- data/test/data/images/truecolour-gama-chrm-8bit.png +0 -0
- data/test/data/images/truecolour-srgb-8bit.png +0 -0
- data/test/data/minimal.pdf +44 -0
- data/test/data/standard-security-handler/README +9 -0
- data/test/data/standard-security-handler/bothpwd-aes-128bit-V4.pdf +44 -0
- data/test/data/standard-security-handler/bothpwd-aes-256bit-V5.pdf +0 -0
- data/test/data/standard-security-handler/bothpwd-arc4-128bit-V2.pdf +43 -0
- data/test/data/standard-security-handler/bothpwd-arc4-128bit-V4.pdf +43 -0
- data/test/data/standard-security-handler/bothpwd-arc4-40bit-V1.pdf +0 -0
- data/test/data/standard-security-handler/nopwd-aes-128bit-V4.pdf +43 -0
- data/test/data/standard-security-handler/nopwd-aes-256bit-V5.pdf +0 -0
- data/test/data/standard-security-handler/nopwd-arc4-128bit-V2.pdf +43 -0
- data/test/data/standard-security-handler/nopwd-arc4-128bit-V4.pdf +43 -0
- data/test/data/standard-security-handler/nopwd-arc4-40bit-V1.pdf +43 -0
- data/test/data/standard-security-handler/ownerpwd-aes-128bit-V4.pdf +0 -0
- data/test/data/standard-security-handler/ownerpwd-aes-256bit-V5.pdf +43 -0
- data/test/data/standard-security-handler/ownerpwd-arc4-128bit-V2.pdf +43 -0
- data/test/data/standard-security-handler/ownerpwd-arc4-128bit-V4.pdf +43 -0
- data/test/data/standard-security-handler/ownerpwd-arc4-40bit-V1.pdf +43 -0
- data/test/data/standard-security-handler/userpwd-aes-128bit-V4.pdf +43 -0
- data/test/data/standard-security-handler/userpwd-aes-256bit-V5.pdf +43 -0
- data/test/data/standard-security-handler/userpwd-arc4-128bit-V2.pdf +0 -0
- data/test/data/standard-security-handler/userpwd-arc4-128bit-V4.pdf +0 -0
- data/test/data/standard-security-handler/userpwd-arc4-40bit-V1.pdf +43 -0
- data/test/hexapdf/common_tokenizer_tests.rb +204 -0
- data/test/hexapdf/content/common.rb +31 -0
- data/test/hexapdf/content/graphic_object/test_arc.rb +93 -0
- data/test/hexapdf/content/graphic_object/test_endpoint_arc.rb +91 -0
- data/test/hexapdf/content/graphic_object/test_solid_arc.rb +86 -0
- data/test/hexapdf/content/test_canvas.rb +1113 -0
- data/test/hexapdf/content/test_color_space.rb +97 -0
- data/test/hexapdf/content/test_graphics_state.rb +138 -0
- data/test/hexapdf/content/test_operator.rb +619 -0
- data/test/hexapdf/content/test_parser.rb +66 -0
- data/test/hexapdf/content/test_processor.rb +156 -0
- data/test/hexapdf/content/test_transformation_matrix.rb +64 -0
- data/test/hexapdf/encryption/common.rb +87 -0
- data/test/hexapdf/encryption/test_aes.rb +121 -0
- data/test/hexapdf/encryption/test_arc4.rb +39 -0
- data/test/hexapdf/encryption/test_fast_aes.rb +17 -0
- data/test/hexapdf/encryption/test_fast_arc4.rb +12 -0
- data/test/hexapdf/encryption/test_identity.rb +21 -0
- data/test/hexapdf/encryption/test_ruby_aes.rb +23 -0
- data/test/hexapdf/encryption/test_ruby_arc4.rb +20 -0
- data/test/hexapdf/encryption/test_security_handler.rb +356 -0
- data/test/hexapdf/encryption/test_standard_security_handler.rb +274 -0
- data/test/hexapdf/filter/common.rb +53 -0
- data/test/hexapdf/filter/test_ascii85_decode.rb +60 -0
- data/test/hexapdf/filter/test_ascii_hex_decode.rb +33 -0
- data/test/hexapdf/filter/test_encryption.rb +24 -0
- data/test/hexapdf/filter/test_flate_decode.rb +35 -0
- data/test/hexapdf/filter/test_lzw_decode.rb +52 -0
- data/test/hexapdf/filter/test_predictor.rb +183 -0
- data/test/hexapdf/filter/test_run_length_decode.rb +32 -0
- data/test/hexapdf/font/cmap/test_parser.rb +67 -0
- data/test/hexapdf/font/cmap/test_writer.rb +58 -0
- data/test/hexapdf/font/encoding/test_base.rb +35 -0
- data/test/hexapdf/font/encoding/test_difference_encoding.rb +21 -0
- data/test/hexapdf/font/encoding/test_glyph_list.rb +59 -0
- data/test/hexapdf/font/encoding/test_zapf_dingbats_encoding.rb +16 -0
- data/test/hexapdf/font/test_encoding.rb +27 -0
- data/test/hexapdf/font/test_true_type_wrapper.rb +110 -0
- data/test/hexapdf/font/test_type1_wrapper.rb +66 -0
- data/test/hexapdf/font/true_type/common.rb +19 -0
- data/test/hexapdf/font/true_type/table/test_cmap.rb +59 -0
- data/test/hexapdf/font/true_type/table/test_cmap_subtable.rb +133 -0
- data/test/hexapdf/font/true_type/table/test_directory.rb +35 -0
- data/test/hexapdf/font/true_type/table/test_glyf.rb +58 -0
- data/test/hexapdf/font/true_type/table/test_head.rb +76 -0
- data/test/hexapdf/font/true_type/table/test_hhea.rb +40 -0
- data/test/hexapdf/font/true_type/table/test_hmtx.rb +38 -0
- data/test/hexapdf/font/true_type/table/test_loca.rb +43 -0
- data/test/hexapdf/font/true_type/table/test_maxp.rb +62 -0
- data/test/hexapdf/font/true_type/table/test_name.rb +95 -0
- data/test/hexapdf/font/true_type/table/test_os2.rb +65 -0
- data/test/hexapdf/font/true_type/table/test_post.rb +89 -0
- data/test/hexapdf/font/true_type/test_font.rb +120 -0
- data/test/hexapdf/font/true_type/test_table.rb +41 -0
- data/test/hexapdf/font/type1/test_afm_parser.rb +51 -0
- data/test/hexapdf/font/type1/test_font.rb +68 -0
- data/test/hexapdf/font/type1/test_pfb_parser.rb +37 -0
- data/test/hexapdf/font_loader/test_from_configuration.rb +28 -0
- data/test/hexapdf/font_loader/test_standard14.rb +22 -0
- data/test/hexapdf/image_loader/test_jpeg.rb +83 -0
- data/test/hexapdf/image_loader/test_pdf.rb +47 -0
- data/test/hexapdf/image_loader/test_png.rb +258 -0
- data/test/hexapdf/task/test_dereference.rb +46 -0
- data/test/hexapdf/task/test_optimize.rb +137 -0
- data/test/hexapdf/test_configuration.rb +82 -0
- data/test/hexapdf/test_data_dir.rb +32 -0
- data/test/hexapdf/test_dictionary.rb +284 -0
- data/test/hexapdf/test_dictionary_fields.rb +185 -0
- data/test/hexapdf/test_document.rb +574 -0
- data/test/hexapdf/test_document_utils.rb +144 -0
- data/test/hexapdf/test_filter.rb +96 -0
- data/test/hexapdf/test_font_utils.rb +47 -0
- data/test/hexapdf/test_importer.rb +78 -0
- data/test/hexapdf/test_object.rb +177 -0
- data/test/hexapdf/test_parser.rb +394 -0
- data/test/hexapdf/test_rectangle.rb +36 -0
- data/test/hexapdf/test_reference.rb +41 -0
- data/test/hexapdf/test_revision.rb +139 -0
- data/test/hexapdf/test_revisions.rb +93 -0
- data/test/hexapdf/test_serializer.rb +169 -0
- data/test/hexapdf/test_stream.rb +262 -0
- data/test/hexapdf/test_tokenizer.rb +30 -0
- data/test/hexapdf/test_writer.rb +120 -0
- data/test/hexapdf/test_xref_section.rb +35 -0
- data/test/hexapdf/type/test_catalog.rb +30 -0
- data/test/hexapdf/type/test_embedded_file.rb +16 -0
- data/test/hexapdf/type/test_file_specification.rb +148 -0
- data/test/hexapdf/type/test_font.rb +35 -0
- data/test/hexapdf/type/test_font_descriptor.rb +51 -0
- data/test/hexapdf/type/test_font_simple.rb +190 -0
- data/test/hexapdf/type/test_font_type1.rb +128 -0
- data/test/hexapdf/type/test_form.rb +60 -0
- data/test/hexapdf/type/test_info.rb +14 -0
- data/test/hexapdf/type/test_names.rb +9 -0
- data/test/hexapdf/type/test_object_stream.rb +84 -0
- data/test/hexapdf/type/test_page.rb +260 -0
- data/test/hexapdf/type/test_page_tree_node.rb +255 -0
- data/test/hexapdf/type/test_resources.rb +167 -0
- data/test/hexapdf/type/test_trailer.rb +109 -0
- data/test/hexapdf/type/test_xref_stream.rb +131 -0
- data/test/hexapdf/utils/test_bit_field.rb +47 -0
- data/test/hexapdf/utils/test_lru_cache.rb +22 -0
- data/test/hexapdf/utils/test_object_hash.rb +115 -0
- data/test/hexapdf/utils/test_pdf_doc_encoding.rb +18 -0
- data/test/hexapdf/utils/test_sorted_tree_node.rb +232 -0
- data/test/test_helper.rb +56 -0
- metadata +427 -0
@@ -0,0 +1,494 @@
|
|
1
|
+
# -*- encoding: utf-8 -*-
|
2
|
+
#
|
3
|
+
#--
|
4
|
+
# This file is part of HexaPDF.
|
5
|
+
#
|
6
|
+
# HexaPDF - A Versatile PDF Creation and Manipulation Library For Ruby
|
7
|
+
# Copyright (C) 2016 Thomas Leitner
|
8
|
+
#
|
9
|
+
# HexaPDF is free software: you can redistribute it and/or modify it
|
10
|
+
# under the terms of the GNU Affero General Public License version 3 as
|
11
|
+
# published by the Free Software Foundation with the addition of the
|
12
|
+
# following permission added to Section 15 as permitted in Section 7(a):
|
13
|
+
# FOR ANY PART OF THE COVERED WORK IN WHICH THE COPYRIGHT IS OWNED BY
|
14
|
+
# THOMAS LEITNER, THOMAS LEITNER DISCLAIMS THE WARRANTY OF NON
|
15
|
+
# INFRINGEMENT OF THIRD PARTY RIGHTS.
|
16
|
+
#
|
17
|
+
# HexaPDF is distributed in the hope that it will be useful, but WITHOUT
|
18
|
+
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
19
|
+
# FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public
|
20
|
+
# License for more details.
|
21
|
+
#
|
22
|
+
# You should have received a copy of the GNU Affero General Public License
|
23
|
+
# along with HexaPDF. If not, see <http://www.gnu.org/licenses/>.
|
24
|
+
#
|
25
|
+
# The interactive user interfaces in modified source and object code
|
26
|
+
# versions of HexaPDF must display Appropriate Legal Notices, as required
|
27
|
+
# under Section 5 of the GNU Affero General Public License version 3.
|
28
|
+
#
|
29
|
+
# In accordance with Section 7(b) of the GNU Affero General Public
|
30
|
+
# License, a covered work must retain the producer line in every PDF that
|
31
|
+
# is created or manipulated using HexaPDF.
|
32
|
+
#++
|
33
|
+
|
34
|
+
require 'digest/md5'
|
35
|
+
require 'hexapdf/error'
|
36
|
+
require 'hexapdf/dictionary'
|
37
|
+
require 'hexapdf/stream'
|
38
|
+
|
39
|
+
module HexaPDF
|
40
|
+
module Encryption
|
41
|
+
|
42
|
+
# Base class for all encryption dictionaries.
|
43
|
+
#
|
44
|
+
# Contains entries common to all encryption dictionaries. If a specific security handler
|
45
|
+
# needs further fields it should derive a new subclass and add the new fields there.
|
46
|
+
#
|
47
|
+
# See: PDF1.7 s7.6.1
|
48
|
+
class EncryptionDictionary < Dictionary
|
49
|
+
|
50
|
+
define_field :Filter, type: Symbol, required: true
|
51
|
+
define_field :SubFilter, type: Symbol, version: '1.3'
|
52
|
+
define_field :V, type: Integer, required: true
|
53
|
+
define_field :Lenth, type: Integer, default: 40, version: '1.4'
|
54
|
+
define_field :CF, type: Dictionary, version: '1.5'
|
55
|
+
define_field :StmF, type: Symbol, default: :Identity, version: '1.5'
|
56
|
+
define_field :StrF, type: Symbol, default: :Identity, version: '1.5'
|
57
|
+
define_field :EFF, type: Symbol, version: '1.6'
|
58
|
+
|
59
|
+
private
|
60
|
+
|
61
|
+
# Ensures that the encryption dictionary's content is valid.
|
62
|
+
def perform_validation
|
63
|
+
super
|
64
|
+
unless [1, 2, 4, 5].include?(value[:V])
|
65
|
+
yield("Value of /V is not one of 1, 2, 4 or 5", false)
|
66
|
+
end
|
67
|
+
if value[:V] == 2 && (!key?(:Length) || value[:Length] < 40 ||
|
68
|
+
value[:Length] > 128 || value[:Length] % 8 != 0)
|
69
|
+
yield("Invalid value for /Length field when /V is 2", false)
|
70
|
+
end
|
71
|
+
end
|
72
|
+
|
73
|
+
end
|
74
|
+
|
75
|
+
# Base class for all security handlers.
|
76
|
+
#
|
77
|
+
# == Creating SecurityHandler Instances
|
78
|
+
#
|
79
|
+
# The base class provides two class methods for this:
|
80
|
+
#
|
81
|
+
# * The method ::set_up_encryption is used when a security handler instance should be created
|
82
|
+
# that populates the document's encryption dictionary.
|
83
|
+
#
|
84
|
+
# * The method ::set_up_decryption is used when a security handler should be created from the
|
85
|
+
# document's encryption dictionary.
|
86
|
+
#
|
87
|
+
# Security handlers could also be created with the ::new method but this is discouraged because
|
88
|
+
# the above methods provide the correct handling in both cases.
|
89
|
+
#
|
90
|
+
#
|
91
|
+
# == Using SecurityHandler Instances
|
92
|
+
#
|
93
|
+
# The SecurityHandler base class provides the methods for decrypting an indirect object and for
|
94
|
+
# encrypting strings and streams:
|
95
|
+
#
|
96
|
+
# * #decrypt
|
97
|
+
# * #encrypt_string
|
98
|
+
# * #encrypt_stream
|
99
|
+
#
|
100
|
+
# How the decryption/encryption key is actually computed is deferred to a sub class.
|
101
|
+
#
|
102
|
+
# Additionally, the #encryption_key_valid? method can be used to check whether the
|
103
|
+
# SecurityHandler instance is built from/built for the current version of the encryption
|
104
|
+
# dictionary.
|
105
|
+
#
|
106
|
+
#
|
107
|
+
# == Implementing a SecurityHandler Class
|
108
|
+
#
|
109
|
+
# Each security handler has to implement the following methods:
|
110
|
+
#
|
111
|
+
# prepare_encryption(**options)::
|
112
|
+
# Prepares the security handler for use in encrypting the document.
|
113
|
+
#
|
114
|
+
# See the #set_up_encryption documentation for information on which options are passed on to
|
115
|
+
# this method.
|
116
|
+
#
|
117
|
+
# Returns the encryption key as well as the names of the string, stream and embedded file
|
118
|
+
# algorithms.
|
119
|
+
#
|
120
|
+
# prepare_decryption(**options)::
|
121
|
+
# Prepares the security handler for decryption by using the information from the document's
|
122
|
+
# encryption dictionary as well as the provided arguments.
|
123
|
+
#
|
124
|
+
# See the #set_up_decryption documentation for additional information.
|
125
|
+
#
|
126
|
+
# Returns the encryption key that should be used for decryption.
|
127
|
+
#
|
128
|
+
# Additionally, the following methods can be overridden to provide a more specific meaning:
|
129
|
+
#
|
130
|
+
# encryption_dictionary_class::
|
131
|
+
# Returns the class that is used for the encryption dictionary. Should be derived from the
|
132
|
+
# EncryptionDictionary class.
|
133
|
+
class SecurityHandler
|
134
|
+
|
135
|
+
# :call-seq:
|
136
|
+
# SecurityHandler.set_up_encryption(document, handler_name, **options) -> handler
|
137
|
+
#
|
138
|
+
# Sets up and returns the security handler with the specified name for the document and
|
139
|
+
# modifies then document's encryption dictionary accordingly.
|
140
|
+
#
|
141
|
+
# The +encryption_opts+ can contain any encryption options for the specific security handler
|
142
|
+
# and the common encryption options.
|
143
|
+
#
|
144
|
+
# See: #set_up_encryption (for the common encryption options).
|
145
|
+
def self.set_up_encryption(document, handler_name, **options)
|
146
|
+
handler = HexaPDF::GlobalConfiguration.constantize('encryption.filter_map', handler_name)
|
147
|
+
if handler.nil?
|
148
|
+
handler = HexaPDF::GlobalConfiguration.constantize('encryption.sub_filter_map', handler_name)
|
149
|
+
end
|
150
|
+
if handler.nil?
|
151
|
+
raise HexaPDF::EncryptionError, "Could not find the specified security handler"
|
152
|
+
end
|
153
|
+
|
154
|
+
handler = handler.new(document)
|
155
|
+
document.trailer[:Encrypt] = handler.set_up_encryption(**options)
|
156
|
+
handler.freeze
|
157
|
+
end
|
158
|
+
|
159
|
+
# :call-seq:
|
160
|
+
# SecurityHandler.set_up_decryption(document, **options) -> handler
|
161
|
+
#
|
162
|
+
# Sets up and returns the security handler that is used for decrypting the given document and
|
163
|
+
# modifies the document's object loader so that the decryption is handled automatically behind
|
164
|
+
# the scenes.
|
165
|
+
#
|
166
|
+
# The +decryption_opts+ has to contain decryption options specific to the security handler
|
167
|
+
# that is used by the PDF file.
|
168
|
+
#
|
169
|
+
# See: #set_up_decryption
|
170
|
+
def self.set_up_decryption(document, **options)
|
171
|
+
dict = document.trailer[:Encrypt]
|
172
|
+
if dict.nil?
|
173
|
+
raise HexaPDF::EncryptionError, "No /Encrypt dictionary found"
|
174
|
+
end
|
175
|
+
handler = HexaPDF::GlobalConfiguration.constantize('encryption.filter_map', dict[:Filter])
|
176
|
+
if handler.nil?
|
177
|
+
handler = HexaPDF::GlobalConfiguration.constantize('encryption.sub_filter_map', dict[:SubFilter])
|
178
|
+
end
|
179
|
+
if handler.nil?
|
180
|
+
raise HexaPDF::EncryptionError, "Could not find a suitable security handler"
|
181
|
+
end
|
182
|
+
|
183
|
+
handler = handler.new(document)
|
184
|
+
document.trailer[:Encrypt] = handler.set_up_decryption(dict, **options)
|
185
|
+
document.revisions.each do |r|
|
186
|
+
loader = r.loader
|
187
|
+
r.loader = lambda do |xref_entry|
|
188
|
+
obj = loader.call(xref_entry)
|
189
|
+
xref_entry.compressed? ? obj : handler.decrypt(obj)
|
190
|
+
end
|
191
|
+
end
|
192
|
+
|
193
|
+
handler.freeze
|
194
|
+
end
|
195
|
+
|
196
|
+
|
197
|
+
# A hash containing information about the used encryption. This information is only
|
198
|
+
# available once the security handler has been set up for decryption or encryption.
|
199
|
+
#
|
200
|
+
# Available keys:
|
201
|
+
#
|
202
|
+
# :version::
|
203
|
+
# The version of the security handler in use.
|
204
|
+
# :string_algorithm::
|
205
|
+
# The algorithm used for encrypting/decrypting strings.
|
206
|
+
# :stream_algorithm::
|
207
|
+
# The algorithm used for encrypting/decrypting streams.
|
208
|
+
# :embedded_file_algorithm::
|
209
|
+
# The algorithm used for encrypting/decrypting embedded files.
|
210
|
+
# :key_length::
|
211
|
+
# The key length in bits.
|
212
|
+
attr_reader :encryption_details
|
213
|
+
|
214
|
+
# Creates a new SecurityHandler for the given document.
|
215
|
+
def initialize(document)
|
216
|
+
@document = document
|
217
|
+
@encrypt_dict_hash = nil
|
218
|
+
@encryption_details = {}
|
219
|
+
end
|
220
|
+
|
221
|
+
# Checks if the encryption key computed by this security handler is derived from the
|
222
|
+
# document's encryption dictionary.
|
223
|
+
def encryption_key_valid?
|
224
|
+
document.unwrap(document.trailer[:Encrypt]).hash == @encrypt_dict_hash
|
225
|
+
end
|
226
|
+
|
227
|
+
# Decrypts the strings and the possibly attached stream of the given indirect object in
|
228
|
+
# place.
|
229
|
+
#
|
230
|
+
# See: PDF1.7 s7.6.2
|
231
|
+
def decrypt(obj)
|
232
|
+
return obj if obj == document.trailer[:Encrypt] || obj.type == :XRef
|
233
|
+
|
234
|
+
key = object_key(obj.oid, obj.gen, string_algorithm)
|
235
|
+
each_string_in_object(obj.value) do |str|
|
236
|
+
next if str.empty?
|
237
|
+
str.replace(string_algorithm.decrypt(key, str))
|
238
|
+
end
|
239
|
+
|
240
|
+
if obj.kind_of?(HexaPDF::Stream)
|
241
|
+
unless string_algorithm == stream_algorithm
|
242
|
+
key = object_key(obj.oid, obj.gen, stream_algorithm)
|
243
|
+
end
|
244
|
+
obj.raw_stream.filter.unshift(:Encryption)
|
245
|
+
obj.raw_stream.decode_parms.unshift(key: key, algorithm: stream_algorithm)
|
246
|
+
end
|
247
|
+
|
248
|
+
obj
|
249
|
+
end
|
250
|
+
|
251
|
+
# Returns the encrypted version of the string that resides in the given indirect object.
|
252
|
+
#
|
253
|
+
# See: PDF1.7 s7.6.2
|
254
|
+
def encrypt_string(str, obj)
|
255
|
+
return str if str.empty? || obj == document.trailer[:Encrypt] || obj.type == :XRef
|
256
|
+
|
257
|
+
key = object_key(obj.oid, obj.gen, string_algorithm)
|
258
|
+
string_algorithm.encrypt(key, str)
|
259
|
+
end
|
260
|
+
|
261
|
+
# Returns a Fiber that encrypts the contents of the given stream object.
|
262
|
+
def encrypt_stream(obj)
|
263
|
+
return obj.stream_encoder if obj.type == :XRef
|
264
|
+
|
265
|
+
key = object_key(obj.oid, obj.gen, stream_algorithm)
|
266
|
+
obj.stream_encoder(:Encryption, key: key, algorithm: stream_algorithm)
|
267
|
+
end
|
268
|
+
|
269
|
+
# Computes the encryption key and sets up the algorithms for encrypting the document based on
|
270
|
+
# the given options, and returns the corresponding encryption dictionary.
|
271
|
+
#
|
272
|
+
# The security handler specific +options+ as well as the +algorithm+ argument are passed on to
|
273
|
+
# the #prepare_encryption method.
|
274
|
+
#
|
275
|
+
# Options for all security handlers:
|
276
|
+
#
|
277
|
+
# key_length::
|
278
|
+
# The key length in bits. Possible values are in the range of 40 to 128 and 256 and it
|
279
|
+
# needs to be divisible by 8.
|
280
|
+
#
|
281
|
+
# algorithm::
|
282
|
+
# The encryption algorithm. Possible values are :arc4 for ARC4 encryption with key lengths
|
283
|
+
# of 40 to 128 bit or :aes for AES encryption with key lengths of 128 or 256 bit.
|
284
|
+
#
|
285
|
+
# force_V4::
|
286
|
+
# Forces the use of protocol version 4 when key_length=128 and algorithm=:arc4.
|
287
|
+
#
|
288
|
+
# See: PDF1.7 s7.6.1, PDF2.0 s7.6.1
|
289
|
+
def set_up_encryption(key_length: 128, algorithm: :aes, force_V4: false, **options)
|
290
|
+
@dict = document.wrap({}, type: encryption_dictionary_class)
|
291
|
+
|
292
|
+
dict[:V] =
|
293
|
+
case key_length
|
294
|
+
when 40
|
295
|
+
1
|
296
|
+
when 48, 56, 64, 72, 80, 88, 96, 104, 112, 120
|
297
|
+
2
|
298
|
+
when 128
|
299
|
+
(algorithm == :aes || force_V4 ? 4 : 2)
|
300
|
+
when 256
|
301
|
+
5
|
302
|
+
else
|
303
|
+
raise(HexaPDF::UnsupportedEncryptionError,
|
304
|
+
"Invalid key length #{key_length} specified")
|
305
|
+
end
|
306
|
+
dict[:Length] = key_length if dict[:V] == 2
|
307
|
+
|
308
|
+
if ![:aes, :arc4].include?(algorithm)
|
309
|
+
raise(HexaPDF::UnsupportedEncryptionError,
|
310
|
+
"Unsupported encryption algorithm: #{algorithm}")
|
311
|
+
elsif key_length < 128 && algorithm == :aes
|
312
|
+
raise(HexaPDF::UnsupportedEncryptionError,
|
313
|
+
"AES algorithm needs a key length of 128 or 256 bit")
|
314
|
+
elsif key_length == 256 && algorithm == :arc4
|
315
|
+
raise(HexaPDF::UnsupportedEncryptionError,
|
316
|
+
"ARC4 algorithm can only be used with key lengths between 40 and 128 bit")
|
317
|
+
end
|
318
|
+
|
319
|
+
result = prepare_encryption(algorithm: algorithm, **options)
|
320
|
+
@encrypt_dict_hash = document.unwrap(dict).hash
|
321
|
+
set_up_security_handler(*result)
|
322
|
+
@dict
|
323
|
+
end
|
324
|
+
|
325
|
+
# Uses the given encryption dictionary to set up the security handler for decrypting the
|
326
|
+
# document.
|
327
|
+
#
|
328
|
+
# The security handler specific +options+ are passed on to the #prepare_decryption method.
|
329
|
+
#
|
330
|
+
# See: PDF1.7 s7.6.1, PDF2.0 s7.6.1
|
331
|
+
def set_up_decryption(dictionary, **options)
|
332
|
+
@dict = document.wrap(dictionary, type: encryption_dictionary_class)
|
333
|
+
|
334
|
+
case dict[:V]
|
335
|
+
when 1, 2
|
336
|
+
strf = stmf = eff = :arc4
|
337
|
+
when 4, 5
|
338
|
+
strf, stmf, eff = [:StrF, :StmF, :EFF].map do |alg|
|
339
|
+
if dict[:CF] && (cf_dict = dict[:CF][dict[alg]])
|
340
|
+
case cf_dict[:CFM]
|
341
|
+
when :V2 then :arc4
|
342
|
+
when :AESV2, :AESV3 then :aes
|
343
|
+
when :None then :identity
|
344
|
+
else
|
345
|
+
raise(HexaPDF::UnsupportedEncryptionError,
|
346
|
+
"Unsupported encryption method: #{cf_dict[:CFM]}")
|
347
|
+
end
|
348
|
+
else
|
349
|
+
:identity
|
350
|
+
end
|
351
|
+
end
|
352
|
+
eff = stmf unless dict[:EFF]
|
353
|
+
else
|
354
|
+
raise HexaPDF::UnsupportedEncryptionError, "Unsupported encryption version #{dict[:V]}"
|
355
|
+
end
|
356
|
+
|
357
|
+
set_up_security_handler(prepare_decryption(**options), strf, stmf, eff)
|
358
|
+
@encrypt_dict_hash = document.unwrap(@dict).hash
|
359
|
+
|
360
|
+
@dict
|
361
|
+
end
|
362
|
+
|
363
|
+
private
|
364
|
+
|
365
|
+
# Returns the associated PDF document.
|
366
|
+
#
|
367
|
+
# Subclasses should use this method to access the document.
|
368
|
+
def document
|
369
|
+
@document
|
370
|
+
end
|
371
|
+
|
372
|
+
# Returns the encryption dictionary used by this security handler.
|
373
|
+
#
|
374
|
+
# Subclasses should use this dictionary to read and set values.
|
375
|
+
def dict
|
376
|
+
@dict
|
377
|
+
end
|
378
|
+
|
379
|
+
# Returns the encryption key that is used for encryption/decryption.
|
380
|
+
#
|
381
|
+
# Only available after decryption or encryption has been set up.
|
382
|
+
def encryption_key
|
383
|
+
@encryption_key
|
384
|
+
end
|
385
|
+
|
386
|
+
# Returns the algorithm class that is used for encrypting/decrypting strings.
|
387
|
+
#
|
388
|
+
# Only available after decryption or encryption has been set up.
|
389
|
+
def string_algorithm
|
390
|
+
@string_algorithm
|
391
|
+
end
|
392
|
+
|
393
|
+
# Returns the algorithm class that is used for encrypting/decrypting streams.
|
394
|
+
#
|
395
|
+
# Only available after decryption or encryption has been set up.
|
396
|
+
def stream_algorithm
|
397
|
+
@stream_algorithm
|
398
|
+
end
|
399
|
+
|
400
|
+
# Returns the algorithm class that is used for encrypting/decrypting embedded files.
|
401
|
+
#
|
402
|
+
# Only available after decryption or encryption has been set up.
|
403
|
+
def embedded_file_algorithm
|
404
|
+
@embedded_file_algorithm
|
405
|
+
end
|
406
|
+
|
407
|
+
# Assigns all necessary attributes so that encryption/decryption works correctly.
|
408
|
+
#
|
409
|
+
# The assigned values can be retrieved via the #encryption_key, #string_algorithm,
|
410
|
+
# #stream_algorithm and #embedded_file_algorithm methods.
|
411
|
+
def set_up_security_handler(key, strf, stmf, eff)
|
412
|
+
@encryption_key = key
|
413
|
+
@string_algorithm = send("#{strf}_algorithm")
|
414
|
+
@stream_algorithm = send("#{stmf}_algorithm")
|
415
|
+
@embedded_file_algorithm = send("#{eff}_algorithm")
|
416
|
+
@encryption_details = {
|
417
|
+
version: dict[:V],
|
418
|
+
string_algorithm: strf,
|
419
|
+
stream_algorithm: stmf,
|
420
|
+
embedded_file_algorithm: eff,
|
421
|
+
key_length: key_length * 8,
|
422
|
+
}
|
423
|
+
end
|
424
|
+
|
425
|
+
# Returns the class that is used for ARC4 encryption.
|
426
|
+
def arc4_algorithm
|
427
|
+
@arc4_algorithm ||= HexaPDF::GlobalConfiguration.constantize('encryption.arc4')
|
428
|
+
end
|
429
|
+
|
430
|
+
# Returns the class that is used for AES encryption.
|
431
|
+
def aes_algorithm
|
432
|
+
@aes_algorithm ||= HexaPDF::GlobalConfiguration.constantize('encryption.aes')
|
433
|
+
end
|
434
|
+
|
435
|
+
# Returns the class that is used for the identity algorithm which passes back the data as is
|
436
|
+
# without encrypting or decrypting it.
|
437
|
+
def identity_algorithm
|
438
|
+
Identity
|
439
|
+
end
|
440
|
+
|
441
|
+
# Computes the key for decrypting the indirect object with the given algorithm.
|
442
|
+
#
|
443
|
+
# See: PDF1.7 s7.6.2 (algorithm 1), PDF2.0 s7.6.2.2 (algorithm 1.A)
|
444
|
+
def object_key(oid, gen, algorithm)
|
445
|
+
key = encryption_key
|
446
|
+
return key if dict[:V] == 5
|
447
|
+
|
448
|
+
key += [oid, gen].pack('VXv'.freeze)
|
449
|
+
key << "sAlT".freeze if algorithm.ancestors.include?(AES)
|
450
|
+
n_plus_5 = key_length + 5
|
451
|
+
Digest::MD5.digest(key)[0, (n_plus_5 > 16 ? 16 : n_plus_5)]
|
452
|
+
end
|
453
|
+
|
454
|
+
# Returns the length of the encryption key in bytes based on the security handlers version.
|
455
|
+
#
|
456
|
+
# See: PDF1.7 s7.6.1, PDF2.0 s7.6.1
|
457
|
+
def key_length
|
458
|
+
case dict[:V]
|
459
|
+
when 1 then 5
|
460
|
+
when 2 then dict[:Length] / 8
|
461
|
+
when 4 then 16 # PDF2.0 s7.6.1 specifies that a /V of 4 is equal to length of 128bit
|
462
|
+
when 5 then 32 # PDF2.0 s7.6.1 specifies that a /V of 5 is equal to length of 256bit
|
463
|
+
end
|
464
|
+
end
|
465
|
+
|
466
|
+
# Returns the class used as wrapper for the encryption dictionary.
|
467
|
+
def encryption_dictionary_class
|
468
|
+
EncryptionDictionary
|
469
|
+
end
|
470
|
+
|
471
|
+
# Returns +n+ random bytes.
|
472
|
+
def random_bytes(n)
|
473
|
+
aes_algorithm.random_bytes(n)
|
474
|
+
end
|
475
|
+
|
476
|
+
# Finds all strings in the given object and yields them.
|
477
|
+
#
|
478
|
+
# Note: Decryption happens directly after parsing and loading an object, before it can be
|
479
|
+
# touched by anthing else. Therefore we only have to contend with the basic data structures.
|
480
|
+
def each_string_in_object(obj, &block) # :yields: str
|
481
|
+
case obj
|
482
|
+
when Hash
|
483
|
+
obj.each_value {|val| each_string_in_object(val, &block)}
|
484
|
+
when Array
|
485
|
+
obj.each {|inner_o| each_string_in_object(inner_o, &block)}
|
486
|
+
when String
|
487
|
+
yield(obj)
|
488
|
+
end
|
489
|
+
end
|
490
|
+
|
491
|
+
end
|
492
|
+
|
493
|
+
end
|
494
|
+
end
|