hexapdf 0.15.8 → 0.17.1

Sign up to get free protection for your applications and to get access to all the features.
Files changed (446) hide show
  1. checksums.yaml +4 -4
  2. data/lib/hexapdf/cli/batch.rb +1 -1
  3. data/lib/hexapdf/cli/command.rb +10 -1
  4. data/lib/hexapdf/cli/files.rb +1 -1
  5. data/lib/hexapdf/cli/fonts.rb +145 -0
  6. data/lib/hexapdf/cli/form.rb +27 -26
  7. data/lib/hexapdf/cli/image2pdf.rb +1 -1
  8. data/lib/hexapdf/cli/images.rb +1 -10
  9. data/lib/hexapdf/cli/info.rb +1 -1
  10. data/lib/hexapdf/cli/inspect.rb +1 -1
  11. data/lib/hexapdf/cli/merge.rb +1 -1
  12. data/lib/hexapdf/cli/modify.rb +1 -1
  13. data/lib/hexapdf/cli/optimize.rb +1 -1
  14. data/lib/hexapdf/cli/split.rb +1 -1
  15. data/lib/hexapdf/cli/watermark.rb +1 -1
  16. data/lib/hexapdf/cli.rb +3 -1
  17. data/lib/hexapdf/composer.rb +1 -1
  18. data/lib/hexapdf/configuration.rb +11 -2
  19. data/lib/hexapdf/content/canvas.rb +658 -167
  20. data/lib/hexapdf/content/color_space.rb +185 -3
  21. data/lib/hexapdf/content/graphic_object/arc.rb +111 -12
  22. data/lib/hexapdf/content/graphic_object/endpoint_arc.rb +1 -1
  23. data/lib/hexapdf/content/graphic_object/geom2d.rb +1 -1
  24. data/lib/hexapdf/content/graphic_object/solid_arc.rb +1 -1
  25. data/lib/hexapdf/content/graphic_object.rb +1 -1
  26. data/lib/hexapdf/content/graphics_state.rb +1 -1
  27. data/lib/hexapdf/content/operator.rb +1 -1
  28. data/lib/hexapdf/content/parser.rb +1 -1
  29. data/lib/hexapdf/content/processor.rb +1 -1
  30. data/lib/hexapdf/content/transformation_matrix.rb +1 -1
  31. data/lib/hexapdf/content.rb +1 -1
  32. data/lib/hexapdf/data_dir.rb +1 -1
  33. data/lib/hexapdf/dictionary.rb +1 -1
  34. data/lib/hexapdf/dictionary_fields.rb +30 -4
  35. data/lib/hexapdf/document/files.rb +3 -3
  36. data/lib/hexapdf/document/fonts.rb +1 -1
  37. data/lib/hexapdf/document/images.rb +1 -1
  38. data/lib/hexapdf/document/pages.rb +1 -1
  39. data/lib/hexapdf/document.rb +1 -1
  40. data/lib/hexapdf/encryption/aes.rb +1 -1
  41. data/lib/hexapdf/encryption/arc4.rb +1 -1
  42. data/lib/hexapdf/encryption/fast_aes.rb +1 -1
  43. data/lib/hexapdf/encryption/fast_arc4.rb +1 -1
  44. data/lib/hexapdf/encryption/identity.rb +1 -1
  45. data/lib/hexapdf/encryption/ruby_aes.rb +1 -1
  46. data/lib/hexapdf/encryption/ruby_arc4.rb +1 -1
  47. data/lib/hexapdf/encryption/security_handler.rb +1 -1
  48. data/lib/hexapdf/encryption/standard_security_handler.rb +1 -1
  49. data/lib/hexapdf/encryption.rb +1 -1
  50. data/lib/hexapdf/error.rb +1 -1
  51. data/lib/hexapdf/filter/ascii85_decode.rb +1 -1
  52. data/lib/hexapdf/filter/ascii_hex_decode.rb +1 -1
  53. data/lib/hexapdf/filter/crypt.rb +1 -1
  54. data/lib/hexapdf/filter/encryption.rb +1 -1
  55. data/lib/hexapdf/filter/flate_decode.rb +1 -1
  56. data/lib/hexapdf/filter/lzw_decode.rb +1 -1
  57. data/lib/hexapdf/filter/pass_through.rb +1 -1
  58. data/lib/hexapdf/filter/predictor.rb +1 -1
  59. data/lib/hexapdf/filter/run_length_decode.rb +1 -1
  60. data/lib/hexapdf/filter.rb +1 -1
  61. data/lib/hexapdf/font/cmap/parser.rb +1 -1
  62. data/lib/hexapdf/font/cmap/writer.rb +1 -1
  63. data/lib/hexapdf/font/cmap.rb +1 -1
  64. data/lib/hexapdf/font/encoding/base.rb +1 -1
  65. data/lib/hexapdf/font/encoding/difference_encoding.rb +1 -1
  66. data/lib/hexapdf/font/encoding/glyph_list.rb +1 -1
  67. data/lib/hexapdf/font/encoding/mac_expert_encoding.rb +1 -1
  68. data/lib/hexapdf/font/encoding/mac_roman_encoding.rb +1 -1
  69. data/lib/hexapdf/font/encoding/standard_encoding.rb +1 -1
  70. data/lib/hexapdf/font/encoding/symbol_encoding.rb +1 -1
  71. data/lib/hexapdf/font/encoding/win_ansi_encoding.rb +1 -1
  72. data/lib/hexapdf/font/encoding/zapf_dingbats_encoding.rb +1 -1
  73. data/lib/hexapdf/font/encoding.rb +1 -1
  74. data/lib/hexapdf/font/invalid_glyph.rb +1 -1
  75. data/lib/hexapdf/font/true_type/builder.rb +1 -1
  76. data/lib/hexapdf/font/true_type/font.rb +1 -1
  77. data/lib/hexapdf/font/true_type/optimizer.rb +1 -1
  78. data/lib/hexapdf/font/true_type/subsetter.rb +1 -1
  79. data/lib/hexapdf/font/true_type/table/cmap.rb +1 -1
  80. data/lib/hexapdf/font/true_type/table/cmap_subtable.rb +1 -1
  81. data/lib/hexapdf/font/true_type/table/directory.rb +1 -1
  82. data/lib/hexapdf/font/true_type/table/glyf.rb +1 -1
  83. data/lib/hexapdf/font/true_type/table/head.rb +1 -1
  84. data/lib/hexapdf/font/true_type/table/hhea.rb +1 -1
  85. data/lib/hexapdf/font/true_type/table/hmtx.rb +1 -1
  86. data/lib/hexapdf/font/true_type/table/kern.rb +1 -1
  87. data/lib/hexapdf/font/true_type/table/loca.rb +1 -1
  88. data/lib/hexapdf/font/true_type/table/maxp.rb +1 -1
  89. data/lib/hexapdf/font/true_type/table/name.rb +1 -1
  90. data/lib/hexapdf/font/true_type/table/os2.rb +1 -1
  91. data/lib/hexapdf/font/true_type/table/post.rb +1 -1
  92. data/lib/hexapdf/font/true_type/table.rb +1 -1
  93. data/lib/hexapdf/font/true_type.rb +1 -1
  94. data/lib/hexapdf/font/true_type_wrapper.rb +1 -1
  95. data/lib/hexapdf/font/type1/afm_parser.rb +1 -1
  96. data/lib/hexapdf/font/type1/character_metrics.rb +1 -1
  97. data/lib/hexapdf/font/type1/font.rb +1 -1
  98. data/lib/hexapdf/font/type1/font_metrics.rb +1 -1
  99. data/lib/hexapdf/font/type1/pfb_parser.rb +1 -1
  100. data/lib/hexapdf/font/type1.rb +1 -1
  101. data/lib/hexapdf/font/type1_wrapper.rb +1 -1
  102. data/lib/hexapdf/font_loader/from_configuration.rb +1 -1
  103. data/lib/hexapdf/font_loader/from_file.rb +1 -1
  104. data/lib/hexapdf/font_loader/standard14.rb +1 -1
  105. data/lib/hexapdf/font_loader.rb +1 -1
  106. data/lib/hexapdf/image_loader/jpeg.rb +1 -1
  107. data/lib/hexapdf/image_loader/pdf.rb +1 -1
  108. data/lib/hexapdf/image_loader/png.rb +1 -1
  109. data/lib/hexapdf/image_loader.rb +1 -1
  110. data/lib/hexapdf/importer.rb +1 -1
  111. data/lib/hexapdf/layout/box.rb +4 -2
  112. data/lib/hexapdf/layout/frame.rb +1 -1
  113. data/lib/hexapdf/layout/image_box.rb +1 -1
  114. data/lib/hexapdf/layout/inline_box.rb +1 -1
  115. data/lib/hexapdf/layout/line.rb +1 -1
  116. data/lib/hexapdf/layout/numeric_refinements.rb +1 -1
  117. data/lib/hexapdf/layout/style.rb +40 -2
  118. data/lib/hexapdf/layout/text_box.rb +1 -1
  119. data/lib/hexapdf/layout/text_fragment.rb +1 -1
  120. data/lib/hexapdf/layout/text_layouter.rb +1 -1
  121. data/lib/hexapdf/layout/text_shaper.rb +1 -1
  122. data/lib/hexapdf/layout/width_from_polygon.rb +2 -2
  123. data/lib/hexapdf/layout.rb +1 -1
  124. data/lib/hexapdf/name_tree_node.rb +1 -1
  125. data/lib/hexapdf/number_tree_node.rb +1 -1
  126. data/lib/hexapdf/object.rb +1 -1
  127. data/lib/hexapdf/parser.rb +2 -2
  128. data/lib/hexapdf/pdf_array.rb +1 -1
  129. data/lib/hexapdf/rectangle.rb +1 -1
  130. data/lib/hexapdf/reference.rb +1 -1
  131. data/lib/hexapdf/revision.rb +1 -1
  132. data/lib/hexapdf/revisions.rb +1 -1
  133. data/lib/hexapdf/serializer.rb +1 -1
  134. data/lib/hexapdf/stream.rb +1 -1
  135. data/lib/hexapdf/task/dereference.rb +1 -1
  136. data/lib/hexapdf/task/optimize.rb +1 -1
  137. data/lib/hexapdf/task.rb +1 -1
  138. data/lib/hexapdf/tokenizer.rb +1 -1
  139. data/lib/hexapdf/type/acro_form/appearance_generator.rb +14 -7
  140. data/lib/hexapdf/type/acro_form/button_field.rb +53 -28
  141. data/lib/hexapdf/type/acro_form/choice_field.rb +1 -1
  142. data/lib/hexapdf/type/acro_form/field.rb +21 -2
  143. data/lib/hexapdf/type/acro_form/form.rb +48 -29
  144. data/lib/hexapdf/type/acro_form/text_field.rb +2 -2
  145. data/lib/hexapdf/type/acro_form/variable_text_field.rb +17 -9
  146. data/lib/hexapdf/type/acro_form.rb +1 -1
  147. data/lib/hexapdf/type/action.rb +1 -1
  148. data/lib/hexapdf/type/actions/go_to.rb +1 -1
  149. data/lib/hexapdf/type/actions/go_to_r.rb +1 -1
  150. data/lib/hexapdf/type/actions/launch.rb +1 -1
  151. data/lib/hexapdf/type/actions/uri.rb +1 -1
  152. data/lib/hexapdf/type/actions.rb +1 -1
  153. data/lib/hexapdf/type/annotation.rb +1 -1
  154. data/lib/hexapdf/type/annotations/link.rb +1 -1
  155. data/lib/hexapdf/type/annotations/markup_annotation.rb +1 -1
  156. data/lib/hexapdf/type/annotations/text.rb +1 -1
  157. data/lib/hexapdf/type/annotations/widget.rb +2 -2
  158. data/lib/hexapdf/type/annotations.rb +1 -1
  159. data/lib/hexapdf/type/catalog.rb +1 -1
  160. data/lib/hexapdf/type/cid_font.rb +1 -1
  161. data/lib/hexapdf/type/embedded_file.rb +1 -1
  162. data/lib/hexapdf/type/file_specification.rb +1 -1
  163. data/lib/hexapdf/type/font.rb +1 -1
  164. data/lib/hexapdf/type/font_descriptor.rb +1 -1
  165. data/lib/hexapdf/type/font_simple.rb +1 -1
  166. data/lib/hexapdf/type/font_true_type.rb +1 -1
  167. data/lib/hexapdf/type/font_type0.rb +1 -1
  168. data/lib/hexapdf/type/font_type1.rb +1 -1
  169. data/lib/hexapdf/type/font_type3.rb +1 -1
  170. data/lib/hexapdf/type/form.rb +1 -1
  171. data/lib/hexapdf/type/graphics_state_parameter.rb +1 -1
  172. data/lib/hexapdf/type/icon_fit.rb +1 -1
  173. data/lib/hexapdf/type/image.rb +1 -1
  174. data/lib/hexapdf/type/info.rb +1 -1
  175. data/lib/hexapdf/type/names.rb +1 -1
  176. data/lib/hexapdf/type/object_stream.rb +1 -1
  177. data/lib/hexapdf/type/page.rb +15 -1
  178. data/lib/hexapdf/type/page_tree_node.rb +1 -1
  179. data/lib/hexapdf/type/resources.rb +1 -1
  180. data/lib/hexapdf/type/trailer.rb +1 -1
  181. data/lib/hexapdf/type/viewer_preferences.rb +1 -1
  182. data/lib/hexapdf/type/xref_stream.rb +1 -1
  183. data/lib/hexapdf/type.rb +1 -1
  184. data/lib/hexapdf/utils/bit_field.rb +1 -1
  185. data/lib/hexapdf/utils/bit_stream.rb +1 -1
  186. data/lib/hexapdf/utils/graphics_helpers.rb +1 -1
  187. data/lib/hexapdf/utils/lru_cache.rb +1 -1
  188. data/lib/hexapdf/utils/math_helpers.rb +1 -1
  189. data/lib/hexapdf/utils/object_hash.rb +1 -1
  190. data/lib/hexapdf/utils/pdf_doc_encoding.rb +1 -1
  191. data/lib/hexapdf/utils/sorted_tree_node.rb +1 -1
  192. data/lib/hexapdf/version.rb +2 -2
  193. data/lib/hexapdf/writer.rb +1 -1
  194. data/lib/hexapdf/xref_section.rb +1 -1
  195. data/lib/hexapdf.rb +1 -1
  196. metadata +5 -264
  197. data/CHANGELOG.md +0 -954
  198. data/LICENSE +0 -29
  199. data/README.md +0 -120
  200. data/Rakefile +0 -108
  201. data/agpl-3.0.txt +0 -661
  202. data/examples/001-hello_world.rb +0 -16
  203. data/examples/002-graphics.rb +0 -275
  204. data/examples/003-arcs.rb +0 -50
  205. data/examples/004-optimizing.rb +0 -23
  206. data/examples/005-merging.rb +0 -27
  207. data/examples/006-standard_pdf_fonts.rb +0 -73
  208. data/examples/007-truetype.rb +0 -42
  209. data/examples/008-show_char_bboxes.rb +0 -55
  210. data/examples/009-text_layouter_alignment.rb +0 -47
  211. data/examples/010-text_layouter_inline_boxes.rb +0 -64
  212. data/examples/011-text_layouter_line_wrapping.rb +0 -57
  213. data/examples/012-text_layouter_styling.rb +0 -122
  214. data/examples/013-text_layouter_shapes.rb +0 -176
  215. data/examples/014-text_in_polygon.rb +0 -60
  216. data/examples/015-boxes.rb +0 -76
  217. data/examples/016-frame_automatic_box_placement.rb +0 -90
  218. data/examples/017-frame_text_flow.rb +0 -60
  219. data/examples/018-composer.rb +0 -44
  220. data/examples/019-acro_form.rb +0 -88
  221. data/examples/emoji-smile.png +0 -0
  222. data/examples/emoji-wink.png +0 -0
  223. data/examples/machupicchu.jpg +0 -0
  224. data/test/data/aes-test-vectors/CBCGFSbox-128-decrypt.data.gz +0 -0
  225. data/test/data/aes-test-vectors/CBCGFSbox-128-encrypt.data.gz +0 -0
  226. data/test/data/aes-test-vectors/CBCGFSbox-192-decrypt.data.gz +0 -0
  227. data/test/data/aes-test-vectors/CBCGFSbox-192-encrypt.data.gz +0 -0
  228. data/test/data/aes-test-vectors/CBCGFSbox-256-decrypt.data.gz +0 -0
  229. data/test/data/aes-test-vectors/CBCGFSbox-256-encrypt.data.gz +0 -0
  230. data/test/data/aes-test-vectors/CBCKeySbox-128-decrypt.data.gz +0 -0
  231. data/test/data/aes-test-vectors/CBCKeySbox-128-encrypt.data.gz +0 -0
  232. data/test/data/aes-test-vectors/CBCKeySbox-192-decrypt.data.gz +0 -0
  233. data/test/data/aes-test-vectors/CBCKeySbox-192-encrypt.data.gz +0 -0
  234. data/test/data/aes-test-vectors/CBCKeySbox-256-decrypt.data.gz +0 -0
  235. data/test/data/aes-test-vectors/CBCKeySbox-256-encrypt.data.gz +0 -0
  236. data/test/data/aes-test-vectors/CBCVarKey-128-decrypt.data.gz +0 -0
  237. data/test/data/aes-test-vectors/CBCVarKey-128-encrypt.data.gz +0 -0
  238. data/test/data/aes-test-vectors/CBCVarKey-192-decrypt.data.gz +0 -0
  239. data/test/data/aes-test-vectors/CBCVarKey-192-encrypt.data.gz +0 -0
  240. data/test/data/aes-test-vectors/CBCVarKey-256-decrypt.data.gz +0 -0
  241. data/test/data/aes-test-vectors/CBCVarKey-256-encrypt.data.gz +0 -0
  242. data/test/data/aes-test-vectors/CBCVarTxt-128-decrypt.data.gz +0 -0
  243. data/test/data/aes-test-vectors/CBCVarTxt-128-encrypt.data.gz +0 -0
  244. data/test/data/aes-test-vectors/CBCVarTxt-192-decrypt.data.gz +0 -0
  245. data/test/data/aes-test-vectors/CBCVarTxt-192-encrypt.data.gz +0 -0
  246. data/test/data/aes-test-vectors/CBCVarTxt-256-decrypt.data.gz +0 -0
  247. data/test/data/aes-test-vectors/CBCVarTxt-256-encrypt.data.gz +0 -0
  248. data/test/data/fonts/Ubuntu-Title.ttf +0 -0
  249. data/test/data/images/cmyk.jpg +0 -0
  250. data/test/data/images/fillbytes.jpg +0 -0
  251. data/test/data/images/gray.jpg +0 -0
  252. data/test/data/images/greyscale-1bit.png +0 -0
  253. data/test/data/images/greyscale-2bit.png +0 -0
  254. data/test/data/images/greyscale-4bit.png +0 -0
  255. data/test/data/images/greyscale-8bit.png +0 -0
  256. data/test/data/images/greyscale-alpha-8bit.png +0 -0
  257. data/test/data/images/greyscale-trns-8bit.png +0 -0
  258. data/test/data/images/greyscale-with-gamma1.0.png +0 -0
  259. data/test/data/images/greyscale-with-gamma1.5.png +0 -0
  260. data/test/data/images/indexed-1bit.png +0 -0
  261. data/test/data/images/indexed-2bit.png +0 -0
  262. data/test/data/images/indexed-4bit.png +0 -0
  263. data/test/data/images/indexed-8bit.png +0 -0
  264. data/test/data/images/indexed-alpha-4bit.png +0 -0
  265. data/test/data/images/indexed-alpha-8bit.png +0 -0
  266. data/test/data/images/rgb.jpg +0 -0
  267. data/test/data/images/truecolour-8bit.png +0 -0
  268. data/test/data/images/truecolour-alpha-8bit.png +0 -0
  269. data/test/data/images/truecolour-gama-chrm-8bit.png +0 -0
  270. data/test/data/images/truecolour-srgb-8bit.png +0 -0
  271. data/test/data/images/ycck.jpg +0 -0
  272. data/test/data/minimal.pdf +0 -44
  273. data/test/data/standard-security-handler/README +0 -9
  274. data/test/data/standard-security-handler/bothpwd-aes-128bit-V4.pdf +0 -44
  275. data/test/data/standard-security-handler/bothpwd-aes-256bit-V5.pdf +0 -0
  276. data/test/data/standard-security-handler/bothpwd-arc4-128bit-V2.pdf +0 -43
  277. data/test/data/standard-security-handler/bothpwd-arc4-128bit-V4.pdf +0 -43
  278. data/test/data/standard-security-handler/bothpwd-arc4-40bit-V1.pdf +0 -0
  279. data/test/data/standard-security-handler/nopwd-aes-128bit-V4.pdf +0 -43
  280. data/test/data/standard-security-handler/nopwd-aes-256bit-V5.pdf +0 -0
  281. data/test/data/standard-security-handler/nopwd-arc4-128bit-V2.pdf +0 -43
  282. data/test/data/standard-security-handler/nopwd-arc4-128bit-V4.pdf +0 -43
  283. data/test/data/standard-security-handler/nopwd-arc4-40bit-V1.pdf +0 -43
  284. data/test/data/standard-security-handler/ownerpwd-aes-128bit-V4.pdf +0 -0
  285. data/test/data/standard-security-handler/ownerpwd-aes-256bit-V5.pdf +0 -43
  286. data/test/data/standard-security-handler/ownerpwd-arc4-128bit-V2.pdf +0 -43
  287. data/test/data/standard-security-handler/ownerpwd-arc4-128bit-V4.pdf +0 -43
  288. data/test/data/standard-security-handler/ownerpwd-arc4-40bit-V1.pdf +0 -43
  289. data/test/data/standard-security-handler/userpwd-aes-128bit-V4.pdf +0 -43
  290. data/test/data/standard-security-handler/userpwd-aes-256bit-V5.pdf +0 -43
  291. data/test/data/standard-security-handler/userpwd-arc4-128bit-V2.pdf +0 -0
  292. data/test/data/standard-security-handler/userpwd-arc4-128bit-V4.pdf +0 -0
  293. data/test/data/standard-security-handler/userpwd-arc4-40bit-V1.pdf +0 -43
  294. data/test/hexapdf/common_tokenizer_tests.rb +0 -236
  295. data/test/hexapdf/content/common.rb +0 -39
  296. data/test/hexapdf/content/graphic_object/test_arc.rb +0 -93
  297. data/test/hexapdf/content/graphic_object/test_endpoint_arc.rb +0 -90
  298. data/test/hexapdf/content/graphic_object/test_geom2d.rb +0 -79
  299. data/test/hexapdf/content/graphic_object/test_solid_arc.rb +0 -86
  300. data/test/hexapdf/content/test_canvas.rb +0 -1216
  301. data/test/hexapdf/content/test_color_space.rb +0 -164
  302. data/test/hexapdf/content/test_graphics_state.rb +0 -151
  303. data/test/hexapdf/content/test_operator.rb +0 -619
  304. data/test/hexapdf/content/test_parser.rb +0 -99
  305. data/test/hexapdf/content/test_processor.rb +0 -163
  306. data/test/hexapdf/content/test_transformation_matrix.rb +0 -64
  307. data/test/hexapdf/document/test_files.rb +0 -72
  308. data/test/hexapdf/document/test_fonts.rb +0 -60
  309. data/test/hexapdf/document/test_images.rb +0 -72
  310. data/test/hexapdf/document/test_pages.rb +0 -130
  311. data/test/hexapdf/encryption/common.rb +0 -87
  312. data/test/hexapdf/encryption/test_aes.rb +0 -129
  313. data/test/hexapdf/encryption/test_arc4.rb +0 -39
  314. data/test/hexapdf/encryption/test_fast_aes.rb +0 -17
  315. data/test/hexapdf/encryption/test_fast_arc4.rb +0 -12
  316. data/test/hexapdf/encryption/test_identity.rb +0 -21
  317. data/test/hexapdf/encryption/test_ruby_aes.rb +0 -23
  318. data/test/hexapdf/encryption/test_ruby_arc4.rb +0 -20
  319. data/test/hexapdf/encryption/test_security_handler.rb +0 -380
  320. data/test/hexapdf/encryption/test_standard_security_handler.rb +0 -322
  321. data/test/hexapdf/filter/common.rb +0 -53
  322. data/test/hexapdf/filter/test_ascii85_decode.rb +0 -59
  323. data/test/hexapdf/filter/test_ascii_hex_decode.rb +0 -38
  324. data/test/hexapdf/filter/test_crypt.rb +0 -21
  325. data/test/hexapdf/filter/test_encryption.rb +0 -24
  326. data/test/hexapdf/filter/test_flate_decode.rb +0 -44
  327. data/test/hexapdf/filter/test_lzw_decode.rb +0 -52
  328. data/test/hexapdf/filter/test_predictor.rb +0 -219
  329. data/test/hexapdf/filter/test_run_length_decode.rb +0 -32
  330. data/test/hexapdf/font/cmap/test_parser.rb +0 -102
  331. data/test/hexapdf/font/cmap/test_writer.rb +0 -66
  332. data/test/hexapdf/font/encoding/test_base.rb +0 -45
  333. data/test/hexapdf/font/encoding/test_difference_encoding.rb +0 -29
  334. data/test/hexapdf/font/encoding/test_glyph_list.rb +0 -59
  335. data/test/hexapdf/font/encoding/test_zapf_dingbats_encoding.rb +0 -16
  336. data/test/hexapdf/font/test_cmap.rb +0 -104
  337. data/test/hexapdf/font/test_encoding.rb +0 -27
  338. data/test/hexapdf/font/test_invalid_glyph.rb +0 -34
  339. data/test/hexapdf/font/test_true_type_wrapper.rb +0 -186
  340. data/test/hexapdf/font/test_type1_wrapper.rb +0 -107
  341. data/test/hexapdf/font/true_type/common.rb +0 -17
  342. data/test/hexapdf/font/true_type/table/common.rb +0 -27
  343. data/test/hexapdf/font/true_type/table/test_cmap.rb +0 -47
  344. data/test/hexapdf/font/true_type/table/test_cmap_subtable.rb +0 -141
  345. data/test/hexapdf/font/true_type/table/test_directory.rb +0 -30
  346. data/test/hexapdf/font/true_type/table/test_glyf.rb +0 -58
  347. data/test/hexapdf/font/true_type/table/test_head.rb +0 -56
  348. data/test/hexapdf/font/true_type/table/test_hhea.rb +0 -26
  349. data/test/hexapdf/font/true_type/table/test_hmtx.rb +0 -30
  350. data/test/hexapdf/font/true_type/table/test_kern.rb +0 -61
  351. data/test/hexapdf/font/true_type/table/test_loca.rb +0 -33
  352. data/test/hexapdf/font/true_type/table/test_maxp.rb +0 -50
  353. data/test/hexapdf/font/true_type/table/test_name.rb +0 -76
  354. data/test/hexapdf/font/true_type/table/test_os2.rb +0 -55
  355. data/test/hexapdf/font/true_type/table/test_post.rb +0 -78
  356. data/test/hexapdf/font/true_type/test_builder.rb +0 -42
  357. data/test/hexapdf/font/true_type/test_font.rb +0 -116
  358. data/test/hexapdf/font/true_type/test_optimizer.rb +0 -26
  359. data/test/hexapdf/font/true_type/test_subsetter.rb +0 -73
  360. data/test/hexapdf/font/true_type/test_table.rb +0 -48
  361. data/test/hexapdf/font/type1/common.rb +0 -6
  362. data/test/hexapdf/font/type1/test_afm_parser.rb +0 -65
  363. data/test/hexapdf/font/type1/test_font.rb +0 -104
  364. data/test/hexapdf/font/type1/test_font_metrics.rb +0 -22
  365. data/test/hexapdf/font/type1/test_pfb_parser.rb +0 -37
  366. data/test/hexapdf/font_loader/test_from_configuration.rb +0 -43
  367. data/test/hexapdf/font_loader/test_from_file.rb +0 -36
  368. data/test/hexapdf/font_loader/test_standard14.rb +0 -33
  369. data/test/hexapdf/image_loader/test_jpeg.rb +0 -93
  370. data/test/hexapdf/image_loader/test_pdf.rb +0 -47
  371. data/test/hexapdf/image_loader/test_png.rb +0 -259
  372. data/test/hexapdf/layout/test_box.rb +0 -152
  373. data/test/hexapdf/layout/test_frame.rb +0 -350
  374. data/test/hexapdf/layout/test_image_box.rb +0 -73
  375. data/test/hexapdf/layout/test_inline_box.rb +0 -71
  376. data/test/hexapdf/layout/test_line.rb +0 -206
  377. data/test/hexapdf/layout/test_style.rb +0 -779
  378. data/test/hexapdf/layout/test_text_box.rb +0 -140
  379. data/test/hexapdf/layout/test_text_fragment.rb +0 -375
  380. data/test/hexapdf/layout/test_text_layouter.rb +0 -758
  381. data/test/hexapdf/layout/test_text_shaper.rb +0 -62
  382. data/test/hexapdf/layout/test_width_from_polygon.rb +0 -108
  383. data/test/hexapdf/task/test_dereference.rb +0 -51
  384. data/test/hexapdf/task/test_optimize.rb +0 -162
  385. data/test/hexapdf/test_composer.rb +0 -258
  386. data/test/hexapdf/test_configuration.rb +0 -93
  387. data/test/hexapdf/test_data_dir.rb +0 -32
  388. data/test/hexapdf/test_dictionary.rb +0 -340
  389. data/test/hexapdf/test_dictionary_fields.rb +0 -245
  390. data/test/hexapdf/test_document.rb +0 -641
  391. data/test/hexapdf/test_filter.rb +0 -100
  392. data/test/hexapdf/test_importer.rb +0 -106
  393. data/test/hexapdf/test_object.rb +0 -258
  394. data/test/hexapdf/test_parser.rb +0 -637
  395. data/test/hexapdf/test_pdf_array.rb +0 -169
  396. data/test/hexapdf/test_rectangle.rb +0 -73
  397. data/test/hexapdf/test_reference.rb +0 -50
  398. data/test/hexapdf/test_revision.rb +0 -188
  399. data/test/hexapdf/test_revisions.rb +0 -196
  400. data/test/hexapdf/test_serializer.rb +0 -195
  401. data/test/hexapdf/test_stream.rb +0 -274
  402. data/test/hexapdf/test_tokenizer.rb +0 -80
  403. data/test/hexapdf/test_type.rb +0 -18
  404. data/test/hexapdf/test_writer.rb +0 -140
  405. data/test/hexapdf/test_xref_section.rb +0 -61
  406. data/test/hexapdf/type/acro_form/test_appearance_generator.rb +0 -794
  407. data/test/hexapdf/type/acro_form/test_button_field.rb +0 -302
  408. data/test/hexapdf/type/acro_form/test_choice_field.rb +0 -220
  409. data/test/hexapdf/type/acro_form/test_field.rb +0 -247
  410. data/test/hexapdf/type/acro_form/test_form.rb +0 -353
  411. data/test/hexapdf/type/acro_form/test_signature_field.rb +0 -38
  412. data/test/hexapdf/type/acro_form/test_text_field.rb +0 -195
  413. data/test/hexapdf/type/acro_form/test_variable_text_field.rb +0 -77
  414. data/test/hexapdf/type/actions/test_launch.rb +0 -24
  415. data/test/hexapdf/type/actions/test_uri.rb +0 -23
  416. data/test/hexapdf/type/annotations/test_markup_annotation.rb +0 -22
  417. data/test/hexapdf/type/annotations/test_text.rb +0 -34
  418. data/test/hexapdf/type/annotations/test_widget.rb +0 -225
  419. data/test/hexapdf/type/test_annotation.rb +0 -97
  420. data/test/hexapdf/type/test_catalog.rb +0 -48
  421. data/test/hexapdf/type/test_cid_font.rb +0 -61
  422. data/test/hexapdf/type/test_file_specification.rb +0 -141
  423. data/test/hexapdf/type/test_font.rb +0 -67
  424. data/test/hexapdf/type/test_font_descriptor.rb +0 -61
  425. data/test/hexapdf/type/test_font_simple.rb +0 -176
  426. data/test/hexapdf/type/test_font_true_type.rb +0 -31
  427. data/test/hexapdf/type/test_font_type0.rb +0 -120
  428. data/test/hexapdf/type/test_font_type1.rb +0 -142
  429. data/test/hexapdf/type/test_font_type3.rb +0 -26
  430. data/test/hexapdf/type/test_form.rb +0 -120
  431. data/test/hexapdf/type/test_image.rb +0 -261
  432. data/test/hexapdf/type/test_info.rb +0 -9
  433. data/test/hexapdf/type/test_object_stream.rb +0 -117
  434. data/test/hexapdf/type/test_page.rb +0 -587
  435. data/test/hexapdf/type/test_page_tree_node.rb +0 -315
  436. data/test/hexapdf/type/test_resources.rb +0 -209
  437. data/test/hexapdf/type/test_trailer.rb +0 -116
  438. data/test/hexapdf/type/test_xref_stream.rb +0 -143
  439. data/test/hexapdf/utils/test_bit_field.rb +0 -63
  440. data/test/hexapdf/utils/test_bit_stream.rb +0 -69
  441. data/test/hexapdf/utils/test_graphics_helpers.rb +0 -37
  442. data/test/hexapdf/utils/test_lru_cache.rb +0 -22
  443. data/test/hexapdf/utils/test_object_hash.rb +0 -120
  444. data/test/hexapdf/utils/test_pdf_doc_encoding.rb +0 -18
  445. data/test/hexapdf/utils/test_sorted_tree_node.rb +0 -239
  446. data/test/test_helper.rb +0 -58
@@ -1,129 +0,0 @@
1
- # -*- encoding: utf-8 -*-
2
-
3
- require_relative 'common'
4
- require 'hexapdf/encryption/aes'
5
-
6
- describe HexaPDF::Encryption::AES do
7
- include EncryptionAlgorithmInterfaceTests
8
-
9
- before do
10
- @algorithm_class = Class.new do
11
- prepend HexaPDF::Encryption::AES
12
-
13
- attr_reader :key, :iv, :mode
14
-
15
- def initialize(key, iv, mode)
16
- @key, @iv, @mode = key, iv, mode
17
- end
18
-
19
- def process(data)
20
- raise "invalid data" if data.empty? || data.length % 16 != 0
21
- data
22
- end
23
- end
24
-
25
- @padding_data = (0..15).map do |length|
26
- {
27
- plain: '5' * length,
28
- cipher_padding: '5' * length + (16 - length).chr * (16 - length),
29
- length: 32,
30
- }
31
- end
32
- @padding_data << {plain: '5' * 16, cipher_padding: '5' * 16 + 16.chr * 16, length: 48}
33
- end
34
-
35
- describe "klass.encrypt/.decrypt" do
36
- it "returns the padded result with IV on klass.encrypt" do
37
- @padding_data.each do |data|
38
- result = @algorithm_class.encrypt('some key' * 2, data[:plain])
39
- assert_equal(data[:length], result.length)
40
- assert_equal(data[:cipher_padding][-16, 16], result[-16, 16])
41
- end
42
- end
43
-
44
- it "returns the decrypted result without padding and with IV removed on klass.decrypt" do
45
- @padding_data.each do |data|
46
- result = @algorithm_class.decrypt('some key' * 2, 'iv' * 8 + data[:cipher_padding])
47
- assert_equal(data[:plain], result)
48
- end
49
- end
50
-
51
- it "fails on decryption if not enough bytes are provided" do
52
- assert_raises(HexaPDF::EncryptionError) do
53
- @algorithm_class.decrypt('some' * 4, 'no iv')
54
- end
55
- end
56
- end
57
-
58
- describe "klass.encryption_fiber/.decryption_fiber" do
59
- before do
60
- @fiber = Fiber.new { Fiber.yield('first'); 'second' }
61
- end
62
-
63
- it "returns the padded result with IV on encryption_fiber" do
64
- @padding_data.each do |data|
65
- result = @algorithm_class.encryption_fiber('some key' * 2, Fiber.new { data[:plain] })
66
- result = TestHelper.collector(result)
67
- assert_equal(data[:length], result.length)
68
- assert_equal(data[:cipher_padding][-16, 16], result[-16, 16])
69
- end
70
- end
71
-
72
- it "returns the decrypted result without padding and with IV removed on decryption_fiber" do
73
- @padding_data.each do |data|
74
- result = @algorithm_class.decryption_fiber('some key' * 2,
75
- Fiber.new { 'iv' * 8 + data[:cipher_padding] })
76
- result = TestHelper.collector(result)
77
- assert_equal(data[:plain], result)
78
- end
79
- end
80
-
81
- it "encryption works with multiple yielded strings" do
82
- f = Fiber.new { Fiber.yield('a' * 40); Fiber.yield('test'); "b" * 20 }
83
- result = TestHelper.collector(@algorithm_class.encryption_fiber('some key' * 2, f))
84
- assert_equal('a' * 40 << 'test' << 'b' * 20, result[16..-17])
85
- end
86
-
87
- it "decryption works with multiple yielded strings" do
88
- f = Fiber.new do
89
- Fiber.yield('iv' * 4)
90
- Fiber.yield('iv' * 4)
91
- Fiber.yield('a' * 20)
92
- Fiber.yield('a' * 20)
93
- 8.chr * 8
94
- end
95
- result = TestHelper.collector(@algorithm_class.decryption_fiber('some key' * 2, f))
96
- assert_equal('a' * 40, result)
97
- end
98
-
99
- it "decryption works if the padding is invalid" do
100
- f = Fiber.new { 'a' * 32 }
101
- result = TestHelper.collector(@algorithm_class.decryption_fiber('some' * 4, f))
102
- assert_equal('a' * 16, result)
103
-
104
- f = Fiber.new { 'a' * 31 << "\x00" }
105
- result = TestHelper.collector(@algorithm_class.decryption_fiber('some' * 4, f))
106
- assert_equal('a' * 15 << "\x00", result)
107
-
108
- f = Fiber.new { 'a' * 29 << "\x00\x01\x03" }
109
- result = TestHelper.collector(@algorithm_class.decryption_fiber('some' * 4, f))
110
- assert_equal('a' * 13 << "\x00\x01\x03", result)
111
- end
112
-
113
- it "fails on decryption if not enough bytes are provided" do
114
- [4, 20, 40].each do |length|
115
- assert_raises(HexaPDF::EncryptionError) do
116
- TestHelper.collector(@algorithm_class.decryption_fiber('some' * 4,
117
- Fiber.new { 'a' * length }))
118
- end
119
- end
120
- end
121
- end
122
-
123
- it "does basic validation on initialization" do
124
- assert_raises(HexaPDF::EncryptionError) { @algorithm_class.new('t' * 7, '0' * 16, :encrypt) }
125
- assert_raises(HexaPDF::EncryptionError) { @algorithm_class.new('t' * 16, '0' * 7, :encrypt) }
126
- obj = @algorithm_class.new('t' * 16, 'i' * 16, 'encrypt')
127
- assert_equal(:encrypt, obj.mode)
128
- end
129
- end
@@ -1,39 +0,0 @@
1
- # -*- encoding: utf-8 -*-
2
-
3
- require_relative 'common'
4
- require 'hexapdf/encryption/arc4'
5
-
6
- describe HexaPDF::Encryption::ARC4 do
7
- include EncryptionAlgorithmInterfaceTests
8
-
9
- before do
10
- @algorithm_class = Class.new do
11
- prepend HexaPDF::Encryption::ARC4
12
-
13
- def initialize(key)
14
- @data = key
15
- end
16
-
17
- def process(data)
18
- raise if data.empty?
19
- result = @data << data
20
- @data = ''
21
- result
22
- end
23
- end
24
- end
25
-
26
- it "correctly uses klass.encrypt and klass.decrypt" do
27
- assert_equal('mykeydata', @algorithm_class.encrypt('mykey', 'data'))
28
- assert_equal('mykeydata', @algorithm_class.decrypt('mykey', 'data'))
29
- end
30
-
31
- it "correctly uses klass.encryption_fiber and klass.decryption_fiber" do
32
- f = Fiber.new { Fiber.yield('first'); Fiber.yield(''); 'second' }
33
- assert_equal('mykeyfirstsecond',
34
- TestHelper.collector(@algorithm_class.encryption_fiber('mykey', f)))
35
- f = Fiber.new { Fiber.yield('first'); 'second' }
36
- assert_equal('mykeyfirstsecond',
37
- TestHelper.collector(@algorithm_class.decryption_fiber('mykey', f)))
38
- end
39
- end
@@ -1,17 +0,0 @@
1
- # -*- encoding: utf-8 -*-
2
-
3
- require_relative 'common'
4
- require 'hexapdf/encryption/fast_aes'
5
-
6
- describe HexaPDF::Encryption::FastAES do
7
- include AESEncryptionTests
8
-
9
- before do
10
- @algorithm_class = HexaPDF::Encryption::FastAES
11
- end
12
-
13
- it "uses a better random bytes generator" do
14
- assert_equal(@algorithm_class.singleton_class, @algorithm_class.method(:random_bytes).owner)
15
- assert_equal(16, @algorithm_class.random_bytes(16).length)
16
- end
17
- end
@@ -1,12 +0,0 @@
1
- # -*- encoding: utf-8 -*-
2
-
3
- require_relative 'common'
4
- require 'hexapdf/encryption/fast_arc4'
5
-
6
- describe HexaPDF::Encryption::FastARC4 do
7
- include ARC4EncryptionTests
8
-
9
- before do
10
- @algorithm_class = HexaPDF::Encryption::FastARC4
11
- end
12
- end
@@ -1,21 +0,0 @@
1
- # -*- encoding: utf-8 -*-
2
-
3
- require_relative 'common'
4
- require 'hexapdf/encryption/identity'
5
-
6
- describe HexaPDF::Encryption::Identity do
7
- include EncryptionAlgorithmInterfaceTests
8
-
9
- before do
10
- @algorithm_class = HexaPDF::Encryption::Identity
11
- end
12
-
13
- it "returns the data unmodified for encrypt/decrypt" do
14
- assert_equal('data', @algorithm_class.encrypt('key', 'data'))
15
- end
16
-
17
- it "returns the source Fiber unmodified for encryption_fiber/decryption_fiber" do
18
- f = Fiber.new { 'data' }
19
- assert_equal(f, @algorithm_class.encryption_fiber('key', f))
20
- end
21
- end
@@ -1,23 +0,0 @@
1
- # -*- encoding: utf-8 -*-
2
-
3
- require_relative 'common'
4
- require 'hexapdf/encryption/ruby_aes'
5
- require 'hexapdf/encryption/fast_aes'
6
-
7
- describe HexaPDF::Encryption::RubyAES do
8
- include AESEncryptionTests
9
-
10
- before do
11
- @algorithm_class = HexaPDF::Encryption::RubyAES
12
- end
13
-
14
- it "is compatible with the OpenSSL based FastAES implementation" do
15
- sample = Random.new.bytes(1024)
16
- key = Random.new.bytes(16)
17
- iv = Random.new.bytes(16)
18
- assert_equal(sample, HexaPDF::Encryption::FastAES.new(key, iv, :encrypt).
19
- process(HexaPDF::Encryption::RubyAES.new(key, iv, :decrypt).process(sample)))
20
- assert_equal(sample, HexaPDF::Encryption::FastAES.new(key, iv, :decrypt).
21
- process(HexaPDF::Encryption::RubyAES.new(key, iv, :encrypt).process(sample)))
22
- end
23
- end
@@ -1,20 +0,0 @@
1
- # -*- encoding: utf-8 -*-
2
-
3
- require_relative 'common'
4
- require 'hexapdf/encryption/ruby_arc4'
5
- require 'hexapdf/encryption/fast_arc4'
6
-
7
- describe HexaPDF::Encryption::RubyARC4 do
8
- include ARC4EncryptionTests
9
-
10
- before do
11
- @algorithm_class = HexaPDF::Encryption::RubyARC4
12
- end
13
-
14
- it "is compatible with the OpenSSL based FastARC4 implementation" do
15
- @keys.each_with_index do |key, i|
16
- assert_equal(@plain[i], HexaPDF::Encryption::FastARC4.new(key).
17
- process(HexaPDF::Encryption::RubyARC4.new(key).process(@plain[i])))
18
- end
19
- end
20
- end
@@ -1,380 +0,0 @@
1
- # -*- encoding: utf-8 -*-
2
-
3
- require 'test_helper'
4
- require 'hexapdf/encryption/security_handler'
5
- require 'hexapdf/document'
6
- require 'hexapdf/stream'
7
-
8
- describe HexaPDF::Encryption::EncryptionDictionary do
9
- before do
10
- @document = HexaPDF::Document.new
11
- @dict = HexaPDF::Encryption::EncryptionDictionary.new({}, document: @document)
12
- @dict[:Filter] = :Standard
13
- @dict[:V] = 1
14
- end
15
-
16
- it "must be an indirect object" do
17
- assert(@dict.must_be_indirect?)
18
- end
19
-
20
- it "validates the /V value" do
21
- @dict[:V] = 1
22
- assert(@dict.validate)
23
- @dict[:V] = 3
24
- refute(@dict.validate)
25
- end
26
-
27
- it "validates the /Length field when /V=2" do
28
- @dict[:V] = 2
29
- refute(@dict.validate)
30
-
31
- @dict[:Length] = 32
32
- refute(@dict.validate)
33
- @dict[:Length] = 136
34
- refute(@dict.validate)
35
- @dict[:Length] = 55
36
- refute(@dict.validate)
37
-
38
- @dict[:Length] = 120
39
- assert(@dict.validate)
40
- end
41
- end
42
-
43
- describe HexaPDF::Encryption::SecurityHandler do
44
- class TestHandler < HexaPDF::Encryption::SecurityHandler
45
-
46
- attr_accessor :strf, :myopt
47
- public :dict
48
-
49
- def prepare_encryption(**_options)
50
- dict[:Filter] = :Test
51
- @key = "a" * key_length
52
- @strf ||= :aes
53
- @stmf ||= :arc4
54
- @eff ||= :identity
55
- [@key, @strf, @stmf, @eff]
56
- end
57
-
58
- def prepare_decryption(myopt: nil)
59
- @myopt = myopt
60
- @key = "a" * key_length
61
- end
62
-
63
- end
64
-
65
- before do
66
- @document = HexaPDF::Document.new
67
- @obj = @document.add({})
68
- @handler = TestHandler.new(@document)
69
- end
70
-
71
- describe "class methods" do
72
- before do
73
- @document.config['encryption.filter_map'][:Test] = TestHandler
74
- end
75
-
76
- describe "set_up_encryption" do
77
- it "fails if the requested security handler cannot be found" do
78
- assert_raises(HexaPDF::EncryptionError) do
79
- HexaPDF::Encryption::SecurityHandler.set_up_encryption(@document, :non_standard)
80
- end
81
- end
82
-
83
- it "updates the trailer's /Encrypt entry to be wrapped by an encryption dictionary" do
84
- HexaPDF::Encryption::SecurityHandler.set_up_encryption(@document, :Test)
85
- assert_kind_of(HexaPDF::Encryption::EncryptionDictionary, @document.trailer[:Encrypt])
86
- end
87
-
88
- it "returns the frozen security handler" do
89
- handler = HexaPDF::Encryption::SecurityHandler.set_up_encryption(@document, :Test)
90
- assert(handler.frozen?)
91
- end
92
- end
93
-
94
- describe "set_up_decryption" do
95
- it "fails if the document has no /Encrypt dictionary" do
96
- exp = assert_raises(HexaPDF::EncryptionError) do
97
- HexaPDF::Encryption::SecurityHandler.set_up_decryption(@document)
98
- end
99
- assert_match(/No \/Encrypt/i, exp.message)
100
- end
101
-
102
- it "fails if the requested security handler cannot be found" do
103
- @document.trailer[:Encrypt] = {Filter: :NonStandard}
104
- assert_raises(HexaPDF::EncryptionError) do
105
- HexaPDF::Encryption::SecurityHandler.set_up_decryption(@document)
106
- end
107
- end
108
-
109
- it "updates the trailer's /Encrypt entry to be wrapped by an encryption dictionary" do
110
- @document.trailer[:Encrypt] = {Filter: :Test, V: 1}
111
- HexaPDF::Encryption::SecurityHandler.set_up_decryption(@document)
112
- assert_kind_of(HexaPDF::Encryption::EncryptionDictionary, @document.trailer[:Encrypt])
113
- end
114
-
115
- it "returns the frozen security handler" do
116
- @document.trailer[:Encrypt] = {Filter: :Test, V: 1}
117
- handler = HexaPDF::Encryption::SecurityHandler.set_up_decryption(@document)
118
- assert(handler.frozen?)
119
- end
120
- end
121
- end
122
-
123
- it "doesn't have a valid encryption key directly after creation" do
124
- refute(@handler.encryption_key_valid?)
125
- end
126
-
127
- describe "set_up_encryption" do
128
- it "sets the correct /V value for the given key length and algorithm" do
129
- [[40, :arc4, 1], [128, :arc4, 2], [128, :arc4, 4],
130
- [128, :aes, 4], [256, :aes, 5]].each do |length, algorithm, version|
131
- @handler.set_up_encryption(key_length: length, algorithm: algorithm, force_v4: version == 4)
132
- assert_equal(version, @handler.dict[:V])
133
- end
134
- end
135
-
136
- it "sets the correct /Length value for the given key length" do
137
- [[40, nil], [48, 48], [128, 128], [256, nil]].each do |key_length, result|
138
- algorithm = (key_length == 256 ? :aes : :arc4)
139
- @handler.set_up_encryption(key_length: key_length, algorithm: algorithm)
140
- assert(result == @handler.dict[:Length])
141
- end
142
- end
143
-
144
- it "calls the prepare_encryption method" do
145
- @handler.set_up_encryption
146
- assert_equal(:Test, @handler.dict[:Filter])
147
- end
148
-
149
- it "returns the generated encryption dictionary wrapped in an encryption class" do
150
- dict = @handler.set_up_encryption
151
- assert_kind_of(HexaPDF::Encryption::EncryptionDictionary, dict)
152
- end
153
-
154
- it "set's up the handler for encryption" do
155
- [:arc4, :aes].each do |algorithm|
156
- @handler.set_up_encryption(key_length: 128, algorithm: algorithm)
157
- @obj[:X] = @handler.encrypt_string('data', @obj)
158
- assert_equal('data', @handler.decrypt(@obj)[:X])
159
- end
160
- end
161
-
162
- it "generates a valid encryption key" do
163
- @document.trailer[:Encrypt] = @handler.set_up_encryption
164
- assert(@handler.encryption_key_valid?)
165
- end
166
-
167
- it "provides correct encryption details" do
168
- @handler.set_up_encryption
169
- assert_equal({version: 4, string_algorithm: :aes, stream_algorithm: :arc4,
170
- embedded_file_algorithm: :identity, key_length: 128},
171
- @handler.encryption_details)
172
- assert_equal(HexaPDF::Encryption::Identity, @handler.send(:embedded_file_algorithm))
173
- assert_equal(HexaPDF::Encryption::FastAES, @handler.send(:string_algorithm))
174
- assert_equal(HexaPDF::Encryption::FastARC4, @handler.send(:stream_algorithm))
175
- end
176
-
177
- it "fails for unsupported encryption key lengths" do
178
- exp = assert_raises(HexaPDF::UnsupportedEncryptionError) do
179
- @handler.set_up_encryption(key_length: 43)
180
- end
181
- assert_match(/Invalid key length/i, exp.message)
182
- end
183
-
184
- it "fails for unsupported encryption algorithms" do
185
- exp = assert_raises(HexaPDF::UnsupportedEncryptionError) do
186
- @handler.set_up_encryption(algorithm: :test)
187
- end
188
- assert_match(/Unsupported encryption algorithm/i, exp.message)
189
- end
190
-
191
- it "fails for the aes algorithm with key lengths != 128 or 256" do
192
- exp = assert_raises(HexaPDF::UnsupportedEncryptionError) do
193
- @handler.set_up_encryption(algorithm: :aes, key_length: 40)
194
- end
195
- assert_match(/AES algorithm.*key length/i, exp.message)
196
- end
197
-
198
- it "fails for the arc4 algorithm with a key length of 256" do
199
- exp = assert_raises(HexaPDF::UnsupportedEncryptionError) do
200
- @handler.set_up_encryption(algorithm: :arc4, key_length: 256)
201
- end
202
- assert_match(/ARC4 algorithm.*key length/i, exp.message)
203
- end
204
- end
205
-
206
- describe "set_up_decryption" do
207
- it "wraps the given hash in an encryption dictionary class, uses it for its dict, returns it" do
208
- dict = @handler.set_up_decryption({Filter: :test, V: 1})
209
- assert_equal(dict, @handler.dict)
210
- assert_kind_of(HexaPDF::Encryption::EncryptionDictionary, @handler.dict)
211
- assert_equal({Filter: :test, V: 1}, @handler.dict.value)
212
- end
213
-
214
- it "doesn't modify the trailer's /Encrypt dictionary" do
215
- @handler.set_up_decryption({Filter: :test, V: 4, Length: 128})
216
- assert_nil(@document.trailer[:Encrypt])
217
- end
218
-
219
- it "calls prepare_decryption" do
220
- @handler.set_up_decryption({Filter: :test, V: 4, Length: 128}, myopt: 5)
221
- assert_equal(5, @handler.myopt)
222
- end
223
-
224
- it "selects the correct algorithm based on the /V and /CF values" do
225
- @enc = @handler.dup
226
-
227
- [
228
- [:arc4, 40, {V: 1}],
229
- [:arc4, 80, {V: 2, Length: 80}],
230
- [:arc4, 128, {V: 4, StrF: :Mine, CF: {Mine: {CFM: :V2}}}],
231
- [:aes, 128, {V: 4, StrF: :Mine, CF: {Mine: {CFM: :AESV2}}}],
232
- [:aes, 256, {V: 5, StrF: :Mine, CF: {Mine: {CFM: :AESV3}}}],
233
- [:identity, 128, {V: 4, StrF: :Mine, CF: {Mine: {CFM: :None}}}],
234
- [:identity, 128, {V: 4, CF: {Mine: {CFM: :AESV2}}}],
235
- ].each do |alg, length, dict|
236
- @enc.strf = alg
237
- @enc.set_up_encryption(key_length: length, algorithm: (alg == :identity ? :aes : alg))
238
- @obj[:X] = @enc.encrypt_string('data', @obj)
239
- @handler.set_up_decryption(dict)
240
- assert_equal('data', @handler.decrypt(@obj)[:X])
241
- end
242
- end
243
-
244
- it "selects the correct algorithm for string, stream and embedded file decryption" do
245
- @handler.set_up_decryption({V: 4, StrF: :Mine, StmF: :Mine, EFF: :Mine,
246
- CF: {Mine: {CFM: :V2}}})
247
- assert_equal(HexaPDF::Encryption::FastARC4, @handler.send(:embedded_file_algorithm))
248
- assert_equal(HexaPDF::Encryption::FastARC4, @handler.send(:string_algorithm))
249
- assert_equal(HexaPDF::Encryption::FastARC4, @handler.send(:stream_algorithm))
250
- end
251
-
252
- it "provides correct encryption details" do
253
- @handler.set_up_decryption({Filter: :test, V: 2, Length: 128}, myopt: 5)
254
- assert_equal({version: 2, string_algorithm: :arc4, stream_algorithm: :arc4,
255
- embedded_file_algorithm: :arc4, key_length: 128},
256
- @handler.encryption_details)
257
- end
258
-
259
- it "fails for unsupported /V values in the dict" do
260
- exp = assert_raises(HexaPDF::UnsupportedEncryptionError) do
261
- @handler.set_up_decryption({V: 3})
262
- end
263
- assert_match(/Unsupported encryption version/i, exp.message)
264
- end
265
-
266
- it "fails for unsupported crypt filter encryption methods" do
267
- exp = assert_raises(HexaPDF::UnsupportedEncryptionError) do
268
- @handler.set_up_decryption({V: 4, StrF: :Mine, CF: {Mine: {CFM: :Unknown}}})
269
- end
270
- assert_match(/Unsupported encryption method/i, exp.message)
271
- end
272
- end
273
-
274
- describe "decrypt" do
275
- before do
276
- @handler.set_up_decryption({V: 1})
277
- @encrypted = @handler.encrypt_string('string', @obj)
278
- @obj.value = {Key: @encrypted.dup, Array: [@encrypted.dup], Hash: {Another: @encrypted.dup}}
279
- end
280
-
281
- it "decrypts all strings in an object" do
282
- @handler.decrypt(@obj)
283
- assert_equal('string', @obj[:Key])
284
- assert_equal('string', @obj[:Array][0])
285
- assert_equal('string', @obj[:Hash][:Another])
286
- end
287
-
288
- it "decrypts the content of a stream object" do
289
- data = HexaPDF::StreamData.new(proc { @encrypted })
290
- obj = @document.wrap({}, oid: @obj.oid, stream: data)
291
- @handler.decrypt(obj)
292
- assert_equal('string', obj.stream)
293
- end
294
-
295
- it "doesn't decrypt a document's Encrypt dictionary" do
296
- @document.trailer[:Encrypt] = @obj
297
- assert_equal(@encrypted, @handler.decrypt(@obj)[:Key])
298
- end
299
-
300
- it "defers handling encryption to a Crypt filter is specified" do
301
- data = HexaPDF::StreamData.new(proc { 'mydata' }, filter: :Crypt)
302
- obj = @document.wrap({}, oid: 1, stream: data)
303
- @handler.decrypt(obj)
304
- assert_equal('mydata', obj.stream)
305
- end
306
-
307
- it "doesn't decrypt XRef streams" do
308
- @obj[:Type] = :XRef
309
- assert_equal(@encrypted, @handler.decrypt(@obj)[:Key])
310
- end
311
-
312
- it "doesn't decrypt the /Contents of a signature dictionary" do
313
- @obj[:Type] = :Sig
314
- @obj[:Contents] = "test"
315
- assert_equal("test", @handler.decrypt(@obj)[:Contents])
316
- end
317
-
318
- it "fails if V < 5 and the object number changes" do
319
- @obj.oid = 55
320
- @handler.decrypt(@obj)
321
- refute_equal('string', @obj[:Key])
322
- end
323
- end
324
-
325
- describe "encryption" do
326
- before do
327
- @handler.set_up_encryption(key_length: 128, algorithm: :arc4)
328
- @stream = @document.wrap({}, oid: 1, stream: HexaPDF::StreamData.new(proc { "string" }))
329
- end
330
-
331
- it "encrypts strings of indirect objects" do
332
- @obj[:Key] = @handler.encrypt_string('string', @obj)
333
- assert_equal('string', @handler.decrypt(@obj)[:Key])
334
- end
335
-
336
- it "encrypts streams" do
337
- result = TestHelper.collector(@handler.encrypt_stream(@stream))
338
- @stream.stream = HexaPDF::StreamData.new(proc { result })
339
- assert_equal('string', @handler.decrypt(@stream).stream)
340
- end
341
-
342
- it "doesn't encrypt strings in a document's Encrypt dictionary" do
343
- @document.trailer[:Encrypt] = @handler.dict
344
- @document.trailer[:Encrypt][:Mine] = 'string'
345
- assert_equal('string', @handler.encrypt_string('string', @document.trailer[:Encrypt]))
346
- end
347
-
348
- it "doesn't encrypt XRef streams" do
349
- @stream[:Type] = :XRef
350
- assert_equal('string', @handler.encrypt_stream(@stream).resume)
351
- end
352
-
353
- it "defers encrypting to a Crypt filter if specified" do
354
- @stream.set_filter(:Crypt)
355
- assert_equal('string', @handler.encrypt_stream(@stream).resume)
356
-
357
- @stream.set_filter([:Crypt])
358
- assert_equal('string', @handler.encrypt_stream(@stream).resume)
359
- end
360
-
361
- it "doesn't encrypt the /Contents key of signature dictionaries" do
362
- @obj[:Type] = :Sig
363
- @obj[:Contents] = "test"
364
- refute_equal('test', @handler.encrypt_string("test", @obj))
365
- assert_equal('test', @handler.encrypt_string(@obj[:Contents], @obj))
366
- end
367
- end
368
-
369
- it "works correctly with different decryption and encryption handlers" do
370
- test_file = File.join(TEST_DATA_DIR, 'standard-security-handler', 'nopwd-arc4-40bit-V1.pdf')
371
- doc = HexaPDF::Document.new(io: StringIO.new(File.read(test_file)))
372
- doc.encrypt(algorithm: :aes, password: 'test')
373
- out = StringIO.new(''.b)
374
- doc.write(out, update_fields: false)
375
-
376
- assert_raises(HexaPDF::EncryptionError) { HexaPDF::Document.new(io: out) }
377
- doc = HexaPDF::Document.new(io: out, decryption_opts: {password: 'test'})
378
- assert_equal('D:20150409164600', doc.trailer[:Info].value[:ModDate])
379
- end
380
- end