hexapdf 0.15.8 → 0.17.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/hexapdf/cli/batch.rb +1 -1
- data/lib/hexapdf/cli/command.rb +10 -1
- data/lib/hexapdf/cli/files.rb +1 -1
- data/lib/hexapdf/cli/fonts.rb +145 -0
- data/lib/hexapdf/cli/form.rb +27 -26
- data/lib/hexapdf/cli/image2pdf.rb +1 -1
- data/lib/hexapdf/cli/images.rb +1 -10
- data/lib/hexapdf/cli/info.rb +1 -1
- data/lib/hexapdf/cli/inspect.rb +1 -1
- data/lib/hexapdf/cli/merge.rb +1 -1
- data/lib/hexapdf/cli/modify.rb +1 -1
- data/lib/hexapdf/cli/optimize.rb +1 -1
- data/lib/hexapdf/cli/split.rb +1 -1
- data/lib/hexapdf/cli/watermark.rb +1 -1
- data/lib/hexapdf/cli.rb +3 -1
- data/lib/hexapdf/composer.rb +1 -1
- data/lib/hexapdf/configuration.rb +11 -2
- data/lib/hexapdf/content/canvas.rb +658 -167
- data/lib/hexapdf/content/color_space.rb +185 -3
- data/lib/hexapdf/content/graphic_object/arc.rb +111 -12
- data/lib/hexapdf/content/graphic_object/endpoint_arc.rb +1 -1
- data/lib/hexapdf/content/graphic_object/geom2d.rb +1 -1
- data/lib/hexapdf/content/graphic_object/solid_arc.rb +1 -1
- data/lib/hexapdf/content/graphic_object.rb +1 -1
- data/lib/hexapdf/content/graphics_state.rb +1 -1
- data/lib/hexapdf/content/operator.rb +1 -1
- data/lib/hexapdf/content/parser.rb +1 -1
- data/lib/hexapdf/content/processor.rb +1 -1
- data/lib/hexapdf/content/transformation_matrix.rb +1 -1
- data/lib/hexapdf/content.rb +1 -1
- data/lib/hexapdf/data_dir.rb +1 -1
- data/lib/hexapdf/dictionary.rb +1 -1
- data/lib/hexapdf/dictionary_fields.rb +30 -4
- data/lib/hexapdf/document/files.rb +3 -3
- data/lib/hexapdf/document/fonts.rb +1 -1
- data/lib/hexapdf/document/images.rb +1 -1
- data/lib/hexapdf/document/pages.rb +1 -1
- data/lib/hexapdf/document.rb +1 -1
- data/lib/hexapdf/encryption/aes.rb +1 -1
- data/lib/hexapdf/encryption/arc4.rb +1 -1
- data/lib/hexapdf/encryption/fast_aes.rb +1 -1
- data/lib/hexapdf/encryption/fast_arc4.rb +1 -1
- data/lib/hexapdf/encryption/identity.rb +1 -1
- data/lib/hexapdf/encryption/ruby_aes.rb +1 -1
- data/lib/hexapdf/encryption/ruby_arc4.rb +1 -1
- data/lib/hexapdf/encryption/security_handler.rb +1 -1
- data/lib/hexapdf/encryption/standard_security_handler.rb +1 -1
- data/lib/hexapdf/encryption.rb +1 -1
- data/lib/hexapdf/error.rb +1 -1
- data/lib/hexapdf/filter/ascii85_decode.rb +1 -1
- data/lib/hexapdf/filter/ascii_hex_decode.rb +1 -1
- data/lib/hexapdf/filter/crypt.rb +1 -1
- data/lib/hexapdf/filter/encryption.rb +1 -1
- data/lib/hexapdf/filter/flate_decode.rb +1 -1
- data/lib/hexapdf/filter/lzw_decode.rb +1 -1
- data/lib/hexapdf/filter/pass_through.rb +1 -1
- data/lib/hexapdf/filter/predictor.rb +1 -1
- data/lib/hexapdf/filter/run_length_decode.rb +1 -1
- data/lib/hexapdf/filter.rb +1 -1
- data/lib/hexapdf/font/cmap/parser.rb +1 -1
- data/lib/hexapdf/font/cmap/writer.rb +1 -1
- data/lib/hexapdf/font/cmap.rb +1 -1
- data/lib/hexapdf/font/encoding/base.rb +1 -1
- data/lib/hexapdf/font/encoding/difference_encoding.rb +1 -1
- data/lib/hexapdf/font/encoding/glyph_list.rb +1 -1
- data/lib/hexapdf/font/encoding/mac_expert_encoding.rb +1 -1
- data/lib/hexapdf/font/encoding/mac_roman_encoding.rb +1 -1
- data/lib/hexapdf/font/encoding/standard_encoding.rb +1 -1
- data/lib/hexapdf/font/encoding/symbol_encoding.rb +1 -1
- data/lib/hexapdf/font/encoding/win_ansi_encoding.rb +1 -1
- data/lib/hexapdf/font/encoding/zapf_dingbats_encoding.rb +1 -1
- data/lib/hexapdf/font/encoding.rb +1 -1
- data/lib/hexapdf/font/invalid_glyph.rb +1 -1
- data/lib/hexapdf/font/true_type/builder.rb +1 -1
- data/lib/hexapdf/font/true_type/font.rb +1 -1
- data/lib/hexapdf/font/true_type/optimizer.rb +1 -1
- data/lib/hexapdf/font/true_type/subsetter.rb +1 -1
- data/lib/hexapdf/font/true_type/table/cmap.rb +1 -1
- data/lib/hexapdf/font/true_type/table/cmap_subtable.rb +1 -1
- data/lib/hexapdf/font/true_type/table/directory.rb +1 -1
- data/lib/hexapdf/font/true_type/table/glyf.rb +1 -1
- data/lib/hexapdf/font/true_type/table/head.rb +1 -1
- data/lib/hexapdf/font/true_type/table/hhea.rb +1 -1
- data/lib/hexapdf/font/true_type/table/hmtx.rb +1 -1
- data/lib/hexapdf/font/true_type/table/kern.rb +1 -1
- data/lib/hexapdf/font/true_type/table/loca.rb +1 -1
- data/lib/hexapdf/font/true_type/table/maxp.rb +1 -1
- data/lib/hexapdf/font/true_type/table/name.rb +1 -1
- data/lib/hexapdf/font/true_type/table/os2.rb +1 -1
- data/lib/hexapdf/font/true_type/table/post.rb +1 -1
- data/lib/hexapdf/font/true_type/table.rb +1 -1
- data/lib/hexapdf/font/true_type.rb +1 -1
- data/lib/hexapdf/font/true_type_wrapper.rb +1 -1
- data/lib/hexapdf/font/type1/afm_parser.rb +1 -1
- data/lib/hexapdf/font/type1/character_metrics.rb +1 -1
- data/lib/hexapdf/font/type1/font.rb +1 -1
- data/lib/hexapdf/font/type1/font_metrics.rb +1 -1
- data/lib/hexapdf/font/type1/pfb_parser.rb +1 -1
- data/lib/hexapdf/font/type1.rb +1 -1
- data/lib/hexapdf/font/type1_wrapper.rb +1 -1
- data/lib/hexapdf/font_loader/from_configuration.rb +1 -1
- data/lib/hexapdf/font_loader/from_file.rb +1 -1
- data/lib/hexapdf/font_loader/standard14.rb +1 -1
- data/lib/hexapdf/font_loader.rb +1 -1
- data/lib/hexapdf/image_loader/jpeg.rb +1 -1
- data/lib/hexapdf/image_loader/pdf.rb +1 -1
- data/lib/hexapdf/image_loader/png.rb +1 -1
- data/lib/hexapdf/image_loader.rb +1 -1
- data/lib/hexapdf/importer.rb +1 -1
- data/lib/hexapdf/layout/box.rb +4 -2
- data/lib/hexapdf/layout/frame.rb +1 -1
- data/lib/hexapdf/layout/image_box.rb +1 -1
- data/lib/hexapdf/layout/inline_box.rb +1 -1
- data/lib/hexapdf/layout/line.rb +1 -1
- data/lib/hexapdf/layout/numeric_refinements.rb +1 -1
- data/lib/hexapdf/layout/style.rb +40 -2
- data/lib/hexapdf/layout/text_box.rb +1 -1
- data/lib/hexapdf/layout/text_fragment.rb +1 -1
- data/lib/hexapdf/layout/text_layouter.rb +1 -1
- data/lib/hexapdf/layout/text_shaper.rb +1 -1
- data/lib/hexapdf/layout/width_from_polygon.rb +2 -2
- data/lib/hexapdf/layout.rb +1 -1
- data/lib/hexapdf/name_tree_node.rb +1 -1
- data/lib/hexapdf/number_tree_node.rb +1 -1
- data/lib/hexapdf/object.rb +1 -1
- data/lib/hexapdf/parser.rb +2 -2
- data/lib/hexapdf/pdf_array.rb +1 -1
- data/lib/hexapdf/rectangle.rb +1 -1
- data/lib/hexapdf/reference.rb +1 -1
- data/lib/hexapdf/revision.rb +1 -1
- data/lib/hexapdf/revisions.rb +1 -1
- data/lib/hexapdf/serializer.rb +1 -1
- data/lib/hexapdf/stream.rb +1 -1
- data/lib/hexapdf/task/dereference.rb +1 -1
- data/lib/hexapdf/task/optimize.rb +1 -1
- data/lib/hexapdf/task.rb +1 -1
- data/lib/hexapdf/tokenizer.rb +1 -1
- data/lib/hexapdf/type/acro_form/appearance_generator.rb +14 -7
- data/lib/hexapdf/type/acro_form/button_field.rb +53 -28
- data/lib/hexapdf/type/acro_form/choice_field.rb +1 -1
- data/lib/hexapdf/type/acro_form/field.rb +21 -2
- data/lib/hexapdf/type/acro_form/form.rb +48 -29
- data/lib/hexapdf/type/acro_form/text_field.rb +2 -2
- data/lib/hexapdf/type/acro_form/variable_text_field.rb +17 -9
- data/lib/hexapdf/type/acro_form.rb +1 -1
- data/lib/hexapdf/type/action.rb +1 -1
- data/lib/hexapdf/type/actions/go_to.rb +1 -1
- data/lib/hexapdf/type/actions/go_to_r.rb +1 -1
- data/lib/hexapdf/type/actions/launch.rb +1 -1
- data/lib/hexapdf/type/actions/uri.rb +1 -1
- data/lib/hexapdf/type/actions.rb +1 -1
- data/lib/hexapdf/type/annotation.rb +1 -1
- data/lib/hexapdf/type/annotations/link.rb +1 -1
- data/lib/hexapdf/type/annotations/markup_annotation.rb +1 -1
- data/lib/hexapdf/type/annotations/text.rb +1 -1
- data/lib/hexapdf/type/annotations/widget.rb +2 -2
- data/lib/hexapdf/type/annotations.rb +1 -1
- data/lib/hexapdf/type/catalog.rb +1 -1
- data/lib/hexapdf/type/cid_font.rb +1 -1
- data/lib/hexapdf/type/embedded_file.rb +1 -1
- data/lib/hexapdf/type/file_specification.rb +1 -1
- data/lib/hexapdf/type/font.rb +1 -1
- data/lib/hexapdf/type/font_descriptor.rb +1 -1
- data/lib/hexapdf/type/font_simple.rb +1 -1
- data/lib/hexapdf/type/font_true_type.rb +1 -1
- data/lib/hexapdf/type/font_type0.rb +1 -1
- data/lib/hexapdf/type/font_type1.rb +1 -1
- data/lib/hexapdf/type/font_type3.rb +1 -1
- data/lib/hexapdf/type/form.rb +1 -1
- data/lib/hexapdf/type/graphics_state_parameter.rb +1 -1
- data/lib/hexapdf/type/icon_fit.rb +1 -1
- data/lib/hexapdf/type/image.rb +1 -1
- data/lib/hexapdf/type/info.rb +1 -1
- data/lib/hexapdf/type/names.rb +1 -1
- data/lib/hexapdf/type/object_stream.rb +1 -1
- data/lib/hexapdf/type/page.rb +15 -1
- data/lib/hexapdf/type/page_tree_node.rb +1 -1
- data/lib/hexapdf/type/resources.rb +1 -1
- data/lib/hexapdf/type/trailer.rb +1 -1
- data/lib/hexapdf/type/viewer_preferences.rb +1 -1
- data/lib/hexapdf/type/xref_stream.rb +1 -1
- data/lib/hexapdf/type.rb +1 -1
- data/lib/hexapdf/utils/bit_field.rb +1 -1
- data/lib/hexapdf/utils/bit_stream.rb +1 -1
- data/lib/hexapdf/utils/graphics_helpers.rb +1 -1
- data/lib/hexapdf/utils/lru_cache.rb +1 -1
- data/lib/hexapdf/utils/math_helpers.rb +1 -1
- data/lib/hexapdf/utils/object_hash.rb +1 -1
- data/lib/hexapdf/utils/pdf_doc_encoding.rb +1 -1
- data/lib/hexapdf/utils/sorted_tree_node.rb +1 -1
- data/lib/hexapdf/version.rb +2 -2
- data/lib/hexapdf/writer.rb +1 -1
- data/lib/hexapdf/xref_section.rb +1 -1
- data/lib/hexapdf.rb +1 -1
- metadata +5 -264
- data/CHANGELOG.md +0 -954
- data/LICENSE +0 -29
- data/README.md +0 -120
- data/Rakefile +0 -108
- data/agpl-3.0.txt +0 -661
- data/examples/001-hello_world.rb +0 -16
- data/examples/002-graphics.rb +0 -275
- data/examples/003-arcs.rb +0 -50
- data/examples/004-optimizing.rb +0 -23
- data/examples/005-merging.rb +0 -27
- data/examples/006-standard_pdf_fonts.rb +0 -73
- data/examples/007-truetype.rb +0 -42
- data/examples/008-show_char_bboxes.rb +0 -55
- data/examples/009-text_layouter_alignment.rb +0 -47
- data/examples/010-text_layouter_inline_boxes.rb +0 -64
- data/examples/011-text_layouter_line_wrapping.rb +0 -57
- data/examples/012-text_layouter_styling.rb +0 -122
- data/examples/013-text_layouter_shapes.rb +0 -176
- data/examples/014-text_in_polygon.rb +0 -60
- data/examples/015-boxes.rb +0 -76
- data/examples/016-frame_automatic_box_placement.rb +0 -90
- data/examples/017-frame_text_flow.rb +0 -60
- data/examples/018-composer.rb +0 -44
- data/examples/019-acro_form.rb +0 -88
- data/examples/emoji-smile.png +0 -0
- data/examples/emoji-wink.png +0 -0
- data/examples/machupicchu.jpg +0 -0
- data/test/data/aes-test-vectors/CBCGFSbox-128-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCGFSbox-128-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCGFSbox-192-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCGFSbox-192-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCGFSbox-256-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCGFSbox-256-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCKeySbox-128-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCKeySbox-128-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCKeySbox-192-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCKeySbox-192-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCKeySbox-256-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCKeySbox-256-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarKey-128-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarKey-128-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarKey-192-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarKey-192-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarKey-256-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarKey-256-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarTxt-128-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarTxt-128-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarTxt-192-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarTxt-192-encrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarTxt-256-decrypt.data.gz +0 -0
- data/test/data/aes-test-vectors/CBCVarTxt-256-encrypt.data.gz +0 -0
- data/test/data/fonts/Ubuntu-Title.ttf +0 -0
- data/test/data/images/cmyk.jpg +0 -0
- data/test/data/images/fillbytes.jpg +0 -0
- data/test/data/images/gray.jpg +0 -0
- data/test/data/images/greyscale-1bit.png +0 -0
- data/test/data/images/greyscale-2bit.png +0 -0
- data/test/data/images/greyscale-4bit.png +0 -0
- data/test/data/images/greyscale-8bit.png +0 -0
- data/test/data/images/greyscale-alpha-8bit.png +0 -0
- data/test/data/images/greyscale-trns-8bit.png +0 -0
- data/test/data/images/greyscale-with-gamma1.0.png +0 -0
- data/test/data/images/greyscale-with-gamma1.5.png +0 -0
- data/test/data/images/indexed-1bit.png +0 -0
- data/test/data/images/indexed-2bit.png +0 -0
- data/test/data/images/indexed-4bit.png +0 -0
- data/test/data/images/indexed-8bit.png +0 -0
- data/test/data/images/indexed-alpha-4bit.png +0 -0
- data/test/data/images/indexed-alpha-8bit.png +0 -0
- data/test/data/images/rgb.jpg +0 -0
- data/test/data/images/truecolour-8bit.png +0 -0
- data/test/data/images/truecolour-alpha-8bit.png +0 -0
- data/test/data/images/truecolour-gama-chrm-8bit.png +0 -0
- data/test/data/images/truecolour-srgb-8bit.png +0 -0
- data/test/data/images/ycck.jpg +0 -0
- data/test/data/minimal.pdf +0 -44
- data/test/data/standard-security-handler/README +0 -9
- data/test/data/standard-security-handler/bothpwd-aes-128bit-V4.pdf +0 -44
- data/test/data/standard-security-handler/bothpwd-aes-256bit-V5.pdf +0 -0
- data/test/data/standard-security-handler/bothpwd-arc4-128bit-V2.pdf +0 -43
- data/test/data/standard-security-handler/bothpwd-arc4-128bit-V4.pdf +0 -43
- data/test/data/standard-security-handler/bothpwd-arc4-40bit-V1.pdf +0 -0
- data/test/data/standard-security-handler/nopwd-aes-128bit-V4.pdf +0 -43
- data/test/data/standard-security-handler/nopwd-aes-256bit-V5.pdf +0 -0
- data/test/data/standard-security-handler/nopwd-arc4-128bit-V2.pdf +0 -43
- data/test/data/standard-security-handler/nopwd-arc4-128bit-V4.pdf +0 -43
- data/test/data/standard-security-handler/nopwd-arc4-40bit-V1.pdf +0 -43
- data/test/data/standard-security-handler/ownerpwd-aes-128bit-V4.pdf +0 -0
- data/test/data/standard-security-handler/ownerpwd-aes-256bit-V5.pdf +0 -43
- data/test/data/standard-security-handler/ownerpwd-arc4-128bit-V2.pdf +0 -43
- data/test/data/standard-security-handler/ownerpwd-arc4-128bit-V4.pdf +0 -43
- data/test/data/standard-security-handler/ownerpwd-arc4-40bit-V1.pdf +0 -43
- data/test/data/standard-security-handler/userpwd-aes-128bit-V4.pdf +0 -43
- data/test/data/standard-security-handler/userpwd-aes-256bit-V5.pdf +0 -43
- data/test/data/standard-security-handler/userpwd-arc4-128bit-V2.pdf +0 -0
- data/test/data/standard-security-handler/userpwd-arc4-128bit-V4.pdf +0 -0
- data/test/data/standard-security-handler/userpwd-arc4-40bit-V1.pdf +0 -43
- data/test/hexapdf/common_tokenizer_tests.rb +0 -236
- data/test/hexapdf/content/common.rb +0 -39
- data/test/hexapdf/content/graphic_object/test_arc.rb +0 -93
- data/test/hexapdf/content/graphic_object/test_endpoint_arc.rb +0 -90
- data/test/hexapdf/content/graphic_object/test_geom2d.rb +0 -79
- data/test/hexapdf/content/graphic_object/test_solid_arc.rb +0 -86
- data/test/hexapdf/content/test_canvas.rb +0 -1216
- data/test/hexapdf/content/test_color_space.rb +0 -164
- data/test/hexapdf/content/test_graphics_state.rb +0 -151
- data/test/hexapdf/content/test_operator.rb +0 -619
- data/test/hexapdf/content/test_parser.rb +0 -99
- data/test/hexapdf/content/test_processor.rb +0 -163
- data/test/hexapdf/content/test_transformation_matrix.rb +0 -64
- data/test/hexapdf/document/test_files.rb +0 -72
- data/test/hexapdf/document/test_fonts.rb +0 -60
- data/test/hexapdf/document/test_images.rb +0 -72
- data/test/hexapdf/document/test_pages.rb +0 -130
- data/test/hexapdf/encryption/common.rb +0 -87
- data/test/hexapdf/encryption/test_aes.rb +0 -129
- data/test/hexapdf/encryption/test_arc4.rb +0 -39
- data/test/hexapdf/encryption/test_fast_aes.rb +0 -17
- data/test/hexapdf/encryption/test_fast_arc4.rb +0 -12
- data/test/hexapdf/encryption/test_identity.rb +0 -21
- data/test/hexapdf/encryption/test_ruby_aes.rb +0 -23
- data/test/hexapdf/encryption/test_ruby_arc4.rb +0 -20
- data/test/hexapdf/encryption/test_security_handler.rb +0 -380
- data/test/hexapdf/encryption/test_standard_security_handler.rb +0 -322
- data/test/hexapdf/filter/common.rb +0 -53
- data/test/hexapdf/filter/test_ascii85_decode.rb +0 -59
- data/test/hexapdf/filter/test_ascii_hex_decode.rb +0 -38
- data/test/hexapdf/filter/test_crypt.rb +0 -21
- data/test/hexapdf/filter/test_encryption.rb +0 -24
- data/test/hexapdf/filter/test_flate_decode.rb +0 -44
- data/test/hexapdf/filter/test_lzw_decode.rb +0 -52
- data/test/hexapdf/filter/test_predictor.rb +0 -219
- data/test/hexapdf/filter/test_run_length_decode.rb +0 -32
- data/test/hexapdf/font/cmap/test_parser.rb +0 -102
- data/test/hexapdf/font/cmap/test_writer.rb +0 -66
- data/test/hexapdf/font/encoding/test_base.rb +0 -45
- data/test/hexapdf/font/encoding/test_difference_encoding.rb +0 -29
- data/test/hexapdf/font/encoding/test_glyph_list.rb +0 -59
- data/test/hexapdf/font/encoding/test_zapf_dingbats_encoding.rb +0 -16
- data/test/hexapdf/font/test_cmap.rb +0 -104
- data/test/hexapdf/font/test_encoding.rb +0 -27
- data/test/hexapdf/font/test_invalid_glyph.rb +0 -34
- data/test/hexapdf/font/test_true_type_wrapper.rb +0 -186
- data/test/hexapdf/font/test_type1_wrapper.rb +0 -107
- data/test/hexapdf/font/true_type/common.rb +0 -17
- data/test/hexapdf/font/true_type/table/common.rb +0 -27
- data/test/hexapdf/font/true_type/table/test_cmap.rb +0 -47
- data/test/hexapdf/font/true_type/table/test_cmap_subtable.rb +0 -141
- data/test/hexapdf/font/true_type/table/test_directory.rb +0 -30
- data/test/hexapdf/font/true_type/table/test_glyf.rb +0 -58
- data/test/hexapdf/font/true_type/table/test_head.rb +0 -56
- data/test/hexapdf/font/true_type/table/test_hhea.rb +0 -26
- data/test/hexapdf/font/true_type/table/test_hmtx.rb +0 -30
- data/test/hexapdf/font/true_type/table/test_kern.rb +0 -61
- data/test/hexapdf/font/true_type/table/test_loca.rb +0 -33
- data/test/hexapdf/font/true_type/table/test_maxp.rb +0 -50
- data/test/hexapdf/font/true_type/table/test_name.rb +0 -76
- data/test/hexapdf/font/true_type/table/test_os2.rb +0 -55
- data/test/hexapdf/font/true_type/table/test_post.rb +0 -78
- data/test/hexapdf/font/true_type/test_builder.rb +0 -42
- data/test/hexapdf/font/true_type/test_font.rb +0 -116
- data/test/hexapdf/font/true_type/test_optimizer.rb +0 -26
- data/test/hexapdf/font/true_type/test_subsetter.rb +0 -73
- data/test/hexapdf/font/true_type/test_table.rb +0 -48
- data/test/hexapdf/font/type1/common.rb +0 -6
- data/test/hexapdf/font/type1/test_afm_parser.rb +0 -65
- data/test/hexapdf/font/type1/test_font.rb +0 -104
- data/test/hexapdf/font/type1/test_font_metrics.rb +0 -22
- data/test/hexapdf/font/type1/test_pfb_parser.rb +0 -37
- data/test/hexapdf/font_loader/test_from_configuration.rb +0 -43
- data/test/hexapdf/font_loader/test_from_file.rb +0 -36
- data/test/hexapdf/font_loader/test_standard14.rb +0 -33
- data/test/hexapdf/image_loader/test_jpeg.rb +0 -93
- data/test/hexapdf/image_loader/test_pdf.rb +0 -47
- data/test/hexapdf/image_loader/test_png.rb +0 -259
- data/test/hexapdf/layout/test_box.rb +0 -152
- data/test/hexapdf/layout/test_frame.rb +0 -350
- data/test/hexapdf/layout/test_image_box.rb +0 -73
- data/test/hexapdf/layout/test_inline_box.rb +0 -71
- data/test/hexapdf/layout/test_line.rb +0 -206
- data/test/hexapdf/layout/test_style.rb +0 -779
- data/test/hexapdf/layout/test_text_box.rb +0 -140
- data/test/hexapdf/layout/test_text_fragment.rb +0 -375
- data/test/hexapdf/layout/test_text_layouter.rb +0 -758
- data/test/hexapdf/layout/test_text_shaper.rb +0 -62
- data/test/hexapdf/layout/test_width_from_polygon.rb +0 -108
- data/test/hexapdf/task/test_dereference.rb +0 -51
- data/test/hexapdf/task/test_optimize.rb +0 -162
- data/test/hexapdf/test_composer.rb +0 -258
- data/test/hexapdf/test_configuration.rb +0 -93
- data/test/hexapdf/test_data_dir.rb +0 -32
- data/test/hexapdf/test_dictionary.rb +0 -340
- data/test/hexapdf/test_dictionary_fields.rb +0 -245
- data/test/hexapdf/test_document.rb +0 -641
- data/test/hexapdf/test_filter.rb +0 -100
- data/test/hexapdf/test_importer.rb +0 -106
- data/test/hexapdf/test_object.rb +0 -258
- data/test/hexapdf/test_parser.rb +0 -637
- data/test/hexapdf/test_pdf_array.rb +0 -169
- data/test/hexapdf/test_rectangle.rb +0 -73
- data/test/hexapdf/test_reference.rb +0 -50
- data/test/hexapdf/test_revision.rb +0 -188
- data/test/hexapdf/test_revisions.rb +0 -196
- data/test/hexapdf/test_serializer.rb +0 -195
- data/test/hexapdf/test_stream.rb +0 -274
- data/test/hexapdf/test_tokenizer.rb +0 -80
- data/test/hexapdf/test_type.rb +0 -18
- data/test/hexapdf/test_writer.rb +0 -140
- data/test/hexapdf/test_xref_section.rb +0 -61
- data/test/hexapdf/type/acro_form/test_appearance_generator.rb +0 -794
- data/test/hexapdf/type/acro_form/test_button_field.rb +0 -302
- data/test/hexapdf/type/acro_form/test_choice_field.rb +0 -220
- data/test/hexapdf/type/acro_form/test_field.rb +0 -247
- data/test/hexapdf/type/acro_form/test_form.rb +0 -353
- data/test/hexapdf/type/acro_form/test_signature_field.rb +0 -38
- data/test/hexapdf/type/acro_form/test_text_field.rb +0 -195
- data/test/hexapdf/type/acro_form/test_variable_text_field.rb +0 -77
- data/test/hexapdf/type/actions/test_launch.rb +0 -24
- data/test/hexapdf/type/actions/test_uri.rb +0 -23
- data/test/hexapdf/type/annotations/test_markup_annotation.rb +0 -22
- data/test/hexapdf/type/annotations/test_text.rb +0 -34
- data/test/hexapdf/type/annotations/test_widget.rb +0 -225
- data/test/hexapdf/type/test_annotation.rb +0 -97
- data/test/hexapdf/type/test_catalog.rb +0 -48
- data/test/hexapdf/type/test_cid_font.rb +0 -61
- data/test/hexapdf/type/test_file_specification.rb +0 -141
- data/test/hexapdf/type/test_font.rb +0 -67
- data/test/hexapdf/type/test_font_descriptor.rb +0 -61
- data/test/hexapdf/type/test_font_simple.rb +0 -176
- data/test/hexapdf/type/test_font_true_type.rb +0 -31
- data/test/hexapdf/type/test_font_type0.rb +0 -120
- data/test/hexapdf/type/test_font_type1.rb +0 -142
- data/test/hexapdf/type/test_font_type3.rb +0 -26
- data/test/hexapdf/type/test_form.rb +0 -120
- data/test/hexapdf/type/test_image.rb +0 -261
- data/test/hexapdf/type/test_info.rb +0 -9
- data/test/hexapdf/type/test_object_stream.rb +0 -117
- data/test/hexapdf/type/test_page.rb +0 -587
- data/test/hexapdf/type/test_page_tree_node.rb +0 -315
- data/test/hexapdf/type/test_resources.rb +0 -209
- data/test/hexapdf/type/test_trailer.rb +0 -116
- data/test/hexapdf/type/test_xref_stream.rb +0 -143
- data/test/hexapdf/utils/test_bit_field.rb +0 -63
- data/test/hexapdf/utils/test_bit_stream.rb +0 -69
- data/test/hexapdf/utils/test_graphics_helpers.rb +0 -37
- data/test/hexapdf/utils/test_lru_cache.rb +0 -22
- data/test/hexapdf/utils/test_object_hash.rb +0 -120
- data/test/hexapdf/utils/test_pdf_doc_encoding.rb +0 -18
- data/test/hexapdf/utils/test_sorted_tree_node.rb +0 -239
- data/test/test_helper.rb +0 -58
@@ -1,129 +0,0 @@
|
|
1
|
-
# -*- encoding: utf-8 -*-
|
2
|
-
|
3
|
-
require_relative 'common'
|
4
|
-
require 'hexapdf/encryption/aes'
|
5
|
-
|
6
|
-
describe HexaPDF::Encryption::AES do
|
7
|
-
include EncryptionAlgorithmInterfaceTests
|
8
|
-
|
9
|
-
before do
|
10
|
-
@algorithm_class = Class.new do
|
11
|
-
prepend HexaPDF::Encryption::AES
|
12
|
-
|
13
|
-
attr_reader :key, :iv, :mode
|
14
|
-
|
15
|
-
def initialize(key, iv, mode)
|
16
|
-
@key, @iv, @mode = key, iv, mode
|
17
|
-
end
|
18
|
-
|
19
|
-
def process(data)
|
20
|
-
raise "invalid data" if data.empty? || data.length % 16 != 0
|
21
|
-
data
|
22
|
-
end
|
23
|
-
end
|
24
|
-
|
25
|
-
@padding_data = (0..15).map do |length|
|
26
|
-
{
|
27
|
-
plain: '5' * length,
|
28
|
-
cipher_padding: '5' * length + (16 - length).chr * (16 - length),
|
29
|
-
length: 32,
|
30
|
-
}
|
31
|
-
end
|
32
|
-
@padding_data << {plain: '5' * 16, cipher_padding: '5' * 16 + 16.chr * 16, length: 48}
|
33
|
-
end
|
34
|
-
|
35
|
-
describe "klass.encrypt/.decrypt" do
|
36
|
-
it "returns the padded result with IV on klass.encrypt" do
|
37
|
-
@padding_data.each do |data|
|
38
|
-
result = @algorithm_class.encrypt('some key' * 2, data[:plain])
|
39
|
-
assert_equal(data[:length], result.length)
|
40
|
-
assert_equal(data[:cipher_padding][-16, 16], result[-16, 16])
|
41
|
-
end
|
42
|
-
end
|
43
|
-
|
44
|
-
it "returns the decrypted result without padding and with IV removed on klass.decrypt" do
|
45
|
-
@padding_data.each do |data|
|
46
|
-
result = @algorithm_class.decrypt('some key' * 2, 'iv' * 8 + data[:cipher_padding])
|
47
|
-
assert_equal(data[:plain], result)
|
48
|
-
end
|
49
|
-
end
|
50
|
-
|
51
|
-
it "fails on decryption if not enough bytes are provided" do
|
52
|
-
assert_raises(HexaPDF::EncryptionError) do
|
53
|
-
@algorithm_class.decrypt('some' * 4, 'no iv')
|
54
|
-
end
|
55
|
-
end
|
56
|
-
end
|
57
|
-
|
58
|
-
describe "klass.encryption_fiber/.decryption_fiber" do
|
59
|
-
before do
|
60
|
-
@fiber = Fiber.new { Fiber.yield('first'); 'second' }
|
61
|
-
end
|
62
|
-
|
63
|
-
it "returns the padded result with IV on encryption_fiber" do
|
64
|
-
@padding_data.each do |data|
|
65
|
-
result = @algorithm_class.encryption_fiber('some key' * 2, Fiber.new { data[:plain] })
|
66
|
-
result = TestHelper.collector(result)
|
67
|
-
assert_equal(data[:length], result.length)
|
68
|
-
assert_equal(data[:cipher_padding][-16, 16], result[-16, 16])
|
69
|
-
end
|
70
|
-
end
|
71
|
-
|
72
|
-
it "returns the decrypted result without padding and with IV removed on decryption_fiber" do
|
73
|
-
@padding_data.each do |data|
|
74
|
-
result = @algorithm_class.decryption_fiber('some key' * 2,
|
75
|
-
Fiber.new { 'iv' * 8 + data[:cipher_padding] })
|
76
|
-
result = TestHelper.collector(result)
|
77
|
-
assert_equal(data[:plain], result)
|
78
|
-
end
|
79
|
-
end
|
80
|
-
|
81
|
-
it "encryption works with multiple yielded strings" do
|
82
|
-
f = Fiber.new { Fiber.yield('a' * 40); Fiber.yield('test'); "b" * 20 }
|
83
|
-
result = TestHelper.collector(@algorithm_class.encryption_fiber('some key' * 2, f))
|
84
|
-
assert_equal('a' * 40 << 'test' << 'b' * 20, result[16..-17])
|
85
|
-
end
|
86
|
-
|
87
|
-
it "decryption works with multiple yielded strings" do
|
88
|
-
f = Fiber.new do
|
89
|
-
Fiber.yield('iv' * 4)
|
90
|
-
Fiber.yield('iv' * 4)
|
91
|
-
Fiber.yield('a' * 20)
|
92
|
-
Fiber.yield('a' * 20)
|
93
|
-
8.chr * 8
|
94
|
-
end
|
95
|
-
result = TestHelper.collector(@algorithm_class.decryption_fiber('some key' * 2, f))
|
96
|
-
assert_equal('a' * 40, result)
|
97
|
-
end
|
98
|
-
|
99
|
-
it "decryption works if the padding is invalid" do
|
100
|
-
f = Fiber.new { 'a' * 32 }
|
101
|
-
result = TestHelper.collector(@algorithm_class.decryption_fiber('some' * 4, f))
|
102
|
-
assert_equal('a' * 16, result)
|
103
|
-
|
104
|
-
f = Fiber.new { 'a' * 31 << "\x00" }
|
105
|
-
result = TestHelper.collector(@algorithm_class.decryption_fiber('some' * 4, f))
|
106
|
-
assert_equal('a' * 15 << "\x00", result)
|
107
|
-
|
108
|
-
f = Fiber.new { 'a' * 29 << "\x00\x01\x03" }
|
109
|
-
result = TestHelper.collector(@algorithm_class.decryption_fiber('some' * 4, f))
|
110
|
-
assert_equal('a' * 13 << "\x00\x01\x03", result)
|
111
|
-
end
|
112
|
-
|
113
|
-
it "fails on decryption if not enough bytes are provided" do
|
114
|
-
[4, 20, 40].each do |length|
|
115
|
-
assert_raises(HexaPDF::EncryptionError) do
|
116
|
-
TestHelper.collector(@algorithm_class.decryption_fiber('some' * 4,
|
117
|
-
Fiber.new { 'a' * length }))
|
118
|
-
end
|
119
|
-
end
|
120
|
-
end
|
121
|
-
end
|
122
|
-
|
123
|
-
it "does basic validation on initialization" do
|
124
|
-
assert_raises(HexaPDF::EncryptionError) { @algorithm_class.new('t' * 7, '0' * 16, :encrypt) }
|
125
|
-
assert_raises(HexaPDF::EncryptionError) { @algorithm_class.new('t' * 16, '0' * 7, :encrypt) }
|
126
|
-
obj = @algorithm_class.new('t' * 16, 'i' * 16, 'encrypt')
|
127
|
-
assert_equal(:encrypt, obj.mode)
|
128
|
-
end
|
129
|
-
end
|
@@ -1,39 +0,0 @@
|
|
1
|
-
# -*- encoding: utf-8 -*-
|
2
|
-
|
3
|
-
require_relative 'common'
|
4
|
-
require 'hexapdf/encryption/arc4'
|
5
|
-
|
6
|
-
describe HexaPDF::Encryption::ARC4 do
|
7
|
-
include EncryptionAlgorithmInterfaceTests
|
8
|
-
|
9
|
-
before do
|
10
|
-
@algorithm_class = Class.new do
|
11
|
-
prepend HexaPDF::Encryption::ARC4
|
12
|
-
|
13
|
-
def initialize(key)
|
14
|
-
@data = key
|
15
|
-
end
|
16
|
-
|
17
|
-
def process(data)
|
18
|
-
raise if data.empty?
|
19
|
-
result = @data << data
|
20
|
-
@data = ''
|
21
|
-
result
|
22
|
-
end
|
23
|
-
end
|
24
|
-
end
|
25
|
-
|
26
|
-
it "correctly uses klass.encrypt and klass.decrypt" do
|
27
|
-
assert_equal('mykeydata', @algorithm_class.encrypt('mykey', 'data'))
|
28
|
-
assert_equal('mykeydata', @algorithm_class.decrypt('mykey', 'data'))
|
29
|
-
end
|
30
|
-
|
31
|
-
it "correctly uses klass.encryption_fiber and klass.decryption_fiber" do
|
32
|
-
f = Fiber.new { Fiber.yield('first'); Fiber.yield(''); 'second' }
|
33
|
-
assert_equal('mykeyfirstsecond',
|
34
|
-
TestHelper.collector(@algorithm_class.encryption_fiber('mykey', f)))
|
35
|
-
f = Fiber.new { Fiber.yield('first'); 'second' }
|
36
|
-
assert_equal('mykeyfirstsecond',
|
37
|
-
TestHelper.collector(@algorithm_class.decryption_fiber('mykey', f)))
|
38
|
-
end
|
39
|
-
end
|
@@ -1,17 +0,0 @@
|
|
1
|
-
# -*- encoding: utf-8 -*-
|
2
|
-
|
3
|
-
require_relative 'common'
|
4
|
-
require 'hexapdf/encryption/fast_aes'
|
5
|
-
|
6
|
-
describe HexaPDF::Encryption::FastAES do
|
7
|
-
include AESEncryptionTests
|
8
|
-
|
9
|
-
before do
|
10
|
-
@algorithm_class = HexaPDF::Encryption::FastAES
|
11
|
-
end
|
12
|
-
|
13
|
-
it "uses a better random bytes generator" do
|
14
|
-
assert_equal(@algorithm_class.singleton_class, @algorithm_class.method(:random_bytes).owner)
|
15
|
-
assert_equal(16, @algorithm_class.random_bytes(16).length)
|
16
|
-
end
|
17
|
-
end
|
@@ -1,21 +0,0 @@
|
|
1
|
-
# -*- encoding: utf-8 -*-
|
2
|
-
|
3
|
-
require_relative 'common'
|
4
|
-
require 'hexapdf/encryption/identity'
|
5
|
-
|
6
|
-
describe HexaPDF::Encryption::Identity do
|
7
|
-
include EncryptionAlgorithmInterfaceTests
|
8
|
-
|
9
|
-
before do
|
10
|
-
@algorithm_class = HexaPDF::Encryption::Identity
|
11
|
-
end
|
12
|
-
|
13
|
-
it "returns the data unmodified for encrypt/decrypt" do
|
14
|
-
assert_equal('data', @algorithm_class.encrypt('key', 'data'))
|
15
|
-
end
|
16
|
-
|
17
|
-
it "returns the source Fiber unmodified for encryption_fiber/decryption_fiber" do
|
18
|
-
f = Fiber.new { 'data' }
|
19
|
-
assert_equal(f, @algorithm_class.encryption_fiber('key', f))
|
20
|
-
end
|
21
|
-
end
|
@@ -1,23 +0,0 @@
|
|
1
|
-
# -*- encoding: utf-8 -*-
|
2
|
-
|
3
|
-
require_relative 'common'
|
4
|
-
require 'hexapdf/encryption/ruby_aes'
|
5
|
-
require 'hexapdf/encryption/fast_aes'
|
6
|
-
|
7
|
-
describe HexaPDF::Encryption::RubyAES do
|
8
|
-
include AESEncryptionTests
|
9
|
-
|
10
|
-
before do
|
11
|
-
@algorithm_class = HexaPDF::Encryption::RubyAES
|
12
|
-
end
|
13
|
-
|
14
|
-
it "is compatible with the OpenSSL based FastAES implementation" do
|
15
|
-
sample = Random.new.bytes(1024)
|
16
|
-
key = Random.new.bytes(16)
|
17
|
-
iv = Random.new.bytes(16)
|
18
|
-
assert_equal(sample, HexaPDF::Encryption::FastAES.new(key, iv, :encrypt).
|
19
|
-
process(HexaPDF::Encryption::RubyAES.new(key, iv, :decrypt).process(sample)))
|
20
|
-
assert_equal(sample, HexaPDF::Encryption::FastAES.new(key, iv, :decrypt).
|
21
|
-
process(HexaPDF::Encryption::RubyAES.new(key, iv, :encrypt).process(sample)))
|
22
|
-
end
|
23
|
-
end
|
@@ -1,20 +0,0 @@
|
|
1
|
-
# -*- encoding: utf-8 -*-
|
2
|
-
|
3
|
-
require_relative 'common'
|
4
|
-
require 'hexapdf/encryption/ruby_arc4'
|
5
|
-
require 'hexapdf/encryption/fast_arc4'
|
6
|
-
|
7
|
-
describe HexaPDF::Encryption::RubyARC4 do
|
8
|
-
include ARC4EncryptionTests
|
9
|
-
|
10
|
-
before do
|
11
|
-
@algorithm_class = HexaPDF::Encryption::RubyARC4
|
12
|
-
end
|
13
|
-
|
14
|
-
it "is compatible with the OpenSSL based FastARC4 implementation" do
|
15
|
-
@keys.each_with_index do |key, i|
|
16
|
-
assert_equal(@plain[i], HexaPDF::Encryption::FastARC4.new(key).
|
17
|
-
process(HexaPDF::Encryption::RubyARC4.new(key).process(@plain[i])))
|
18
|
-
end
|
19
|
-
end
|
20
|
-
end
|
@@ -1,380 +0,0 @@
|
|
1
|
-
# -*- encoding: utf-8 -*-
|
2
|
-
|
3
|
-
require 'test_helper'
|
4
|
-
require 'hexapdf/encryption/security_handler'
|
5
|
-
require 'hexapdf/document'
|
6
|
-
require 'hexapdf/stream'
|
7
|
-
|
8
|
-
describe HexaPDF::Encryption::EncryptionDictionary do
|
9
|
-
before do
|
10
|
-
@document = HexaPDF::Document.new
|
11
|
-
@dict = HexaPDF::Encryption::EncryptionDictionary.new({}, document: @document)
|
12
|
-
@dict[:Filter] = :Standard
|
13
|
-
@dict[:V] = 1
|
14
|
-
end
|
15
|
-
|
16
|
-
it "must be an indirect object" do
|
17
|
-
assert(@dict.must_be_indirect?)
|
18
|
-
end
|
19
|
-
|
20
|
-
it "validates the /V value" do
|
21
|
-
@dict[:V] = 1
|
22
|
-
assert(@dict.validate)
|
23
|
-
@dict[:V] = 3
|
24
|
-
refute(@dict.validate)
|
25
|
-
end
|
26
|
-
|
27
|
-
it "validates the /Length field when /V=2" do
|
28
|
-
@dict[:V] = 2
|
29
|
-
refute(@dict.validate)
|
30
|
-
|
31
|
-
@dict[:Length] = 32
|
32
|
-
refute(@dict.validate)
|
33
|
-
@dict[:Length] = 136
|
34
|
-
refute(@dict.validate)
|
35
|
-
@dict[:Length] = 55
|
36
|
-
refute(@dict.validate)
|
37
|
-
|
38
|
-
@dict[:Length] = 120
|
39
|
-
assert(@dict.validate)
|
40
|
-
end
|
41
|
-
end
|
42
|
-
|
43
|
-
describe HexaPDF::Encryption::SecurityHandler do
|
44
|
-
class TestHandler < HexaPDF::Encryption::SecurityHandler
|
45
|
-
|
46
|
-
attr_accessor :strf, :myopt
|
47
|
-
public :dict
|
48
|
-
|
49
|
-
def prepare_encryption(**_options)
|
50
|
-
dict[:Filter] = :Test
|
51
|
-
@key = "a" * key_length
|
52
|
-
@strf ||= :aes
|
53
|
-
@stmf ||= :arc4
|
54
|
-
@eff ||= :identity
|
55
|
-
[@key, @strf, @stmf, @eff]
|
56
|
-
end
|
57
|
-
|
58
|
-
def prepare_decryption(myopt: nil)
|
59
|
-
@myopt = myopt
|
60
|
-
@key = "a" * key_length
|
61
|
-
end
|
62
|
-
|
63
|
-
end
|
64
|
-
|
65
|
-
before do
|
66
|
-
@document = HexaPDF::Document.new
|
67
|
-
@obj = @document.add({})
|
68
|
-
@handler = TestHandler.new(@document)
|
69
|
-
end
|
70
|
-
|
71
|
-
describe "class methods" do
|
72
|
-
before do
|
73
|
-
@document.config['encryption.filter_map'][:Test] = TestHandler
|
74
|
-
end
|
75
|
-
|
76
|
-
describe "set_up_encryption" do
|
77
|
-
it "fails if the requested security handler cannot be found" do
|
78
|
-
assert_raises(HexaPDF::EncryptionError) do
|
79
|
-
HexaPDF::Encryption::SecurityHandler.set_up_encryption(@document, :non_standard)
|
80
|
-
end
|
81
|
-
end
|
82
|
-
|
83
|
-
it "updates the trailer's /Encrypt entry to be wrapped by an encryption dictionary" do
|
84
|
-
HexaPDF::Encryption::SecurityHandler.set_up_encryption(@document, :Test)
|
85
|
-
assert_kind_of(HexaPDF::Encryption::EncryptionDictionary, @document.trailer[:Encrypt])
|
86
|
-
end
|
87
|
-
|
88
|
-
it "returns the frozen security handler" do
|
89
|
-
handler = HexaPDF::Encryption::SecurityHandler.set_up_encryption(@document, :Test)
|
90
|
-
assert(handler.frozen?)
|
91
|
-
end
|
92
|
-
end
|
93
|
-
|
94
|
-
describe "set_up_decryption" do
|
95
|
-
it "fails if the document has no /Encrypt dictionary" do
|
96
|
-
exp = assert_raises(HexaPDF::EncryptionError) do
|
97
|
-
HexaPDF::Encryption::SecurityHandler.set_up_decryption(@document)
|
98
|
-
end
|
99
|
-
assert_match(/No \/Encrypt/i, exp.message)
|
100
|
-
end
|
101
|
-
|
102
|
-
it "fails if the requested security handler cannot be found" do
|
103
|
-
@document.trailer[:Encrypt] = {Filter: :NonStandard}
|
104
|
-
assert_raises(HexaPDF::EncryptionError) do
|
105
|
-
HexaPDF::Encryption::SecurityHandler.set_up_decryption(@document)
|
106
|
-
end
|
107
|
-
end
|
108
|
-
|
109
|
-
it "updates the trailer's /Encrypt entry to be wrapped by an encryption dictionary" do
|
110
|
-
@document.trailer[:Encrypt] = {Filter: :Test, V: 1}
|
111
|
-
HexaPDF::Encryption::SecurityHandler.set_up_decryption(@document)
|
112
|
-
assert_kind_of(HexaPDF::Encryption::EncryptionDictionary, @document.trailer[:Encrypt])
|
113
|
-
end
|
114
|
-
|
115
|
-
it "returns the frozen security handler" do
|
116
|
-
@document.trailer[:Encrypt] = {Filter: :Test, V: 1}
|
117
|
-
handler = HexaPDF::Encryption::SecurityHandler.set_up_decryption(@document)
|
118
|
-
assert(handler.frozen?)
|
119
|
-
end
|
120
|
-
end
|
121
|
-
end
|
122
|
-
|
123
|
-
it "doesn't have a valid encryption key directly after creation" do
|
124
|
-
refute(@handler.encryption_key_valid?)
|
125
|
-
end
|
126
|
-
|
127
|
-
describe "set_up_encryption" do
|
128
|
-
it "sets the correct /V value for the given key length and algorithm" do
|
129
|
-
[[40, :arc4, 1], [128, :arc4, 2], [128, :arc4, 4],
|
130
|
-
[128, :aes, 4], [256, :aes, 5]].each do |length, algorithm, version|
|
131
|
-
@handler.set_up_encryption(key_length: length, algorithm: algorithm, force_v4: version == 4)
|
132
|
-
assert_equal(version, @handler.dict[:V])
|
133
|
-
end
|
134
|
-
end
|
135
|
-
|
136
|
-
it "sets the correct /Length value for the given key length" do
|
137
|
-
[[40, nil], [48, 48], [128, 128], [256, nil]].each do |key_length, result|
|
138
|
-
algorithm = (key_length == 256 ? :aes : :arc4)
|
139
|
-
@handler.set_up_encryption(key_length: key_length, algorithm: algorithm)
|
140
|
-
assert(result == @handler.dict[:Length])
|
141
|
-
end
|
142
|
-
end
|
143
|
-
|
144
|
-
it "calls the prepare_encryption method" do
|
145
|
-
@handler.set_up_encryption
|
146
|
-
assert_equal(:Test, @handler.dict[:Filter])
|
147
|
-
end
|
148
|
-
|
149
|
-
it "returns the generated encryption dictionary wrapped in an encryption class" do
|
150
|
-
dict = @handler.set_up_encryption
|
151
|
-
assert_kind_of(HexaPDF::Encryption::EncryptionDictionary, dict)
|
152
|
-
end
|
153
|
-
|
154
|
-
it "set's up the handler for encryption" do
|
155
|
-
[:arc4, :aes].each do |algorithm|
|
156
|
-
@handler.set_up_encryption(key_length: 128, algorithm: algorithm)
|
157
|
-
@obj[:X] = @handler.encrypt_string('data', @obj)
|
158
|
-
assert_equal('data', @handler.decrypt(@obj)[:X])
|
159
|
-
end
|
160
|
-
end
|
161
|
-
|
162
|
-
it "generates a valid encryption key" do
|
163
|
-
@document.trailer[:Encrypt] = @handler.set_up_encryption
|
164
|
-
assert(@handler.encryption_key_valid?)
|
165
|
-
end
|
166
|
-
|
167
|
-
it "provides correct encryption details" do
|
168
|
-
@handler.set_up_encryption
|
169
|
-
assert_equal({version: 4, string_algorithm: :aes, stream_algorithm: :arc4,
|
170
|
-
embedded_file_algorithm: :identity, key_length: 128},
|
171
|
-
@handler.encryption_details)
|
172
|
-
assert_equal(HexaPDF::Encryption::Identity, @handler.send(:embedded_file_algorithm))
|
173
|
-
assert_equal(HexaPDF::Encryption::FastAES, @handler.send(:string_algorithm))
|
174
|
-
assert_equal(HexaPDF::Encryption::FastARC4, @handler.send(:stream_algorithm))
|
175
|
-
end
|
176
|
-
|
177
|
-
it "fails for unsupported encryption key lengths" do
|
178
|
-
exp = assert_raises(HexaPDF::UnsupportedEncryptionError) do
|
179
|
-
@handler.set_up_encryption(key_length: 43)
|
180
|
-
end
|
181
|
-
assert_match(/Invalid key length/i, exp.message)
|
182
|
-
end
|
183
|
-
|
184
|
-
it "fails for unsupported encryption algorithms" do
|
185
|
-
exp = assert_raises(HexaPDF::UnsupportedEncryptionError) do
|
186
|
-
@handler.set_up_encryption(algorithm: :test)
|
187
|
-
end
|
188
|
-
assert_match(/Unsupported encryption algorithm/i, exp.message)
|
189
|
-
end
|
190
|
-
|
191
|
-
it "fails for the aes algorithm with key lengths != 128 or 256" do
|
192
|
-
exp = assert_raises(HexaPDF::UnsupportedEncryptionError) do
|
193
|
-
@handler.set_up_encryption(algorithm: :aes, key_length: 40)
|
194
|
-
end
|
195
|
-
assert_match(/AES algorithm.*key length/i, exp.message)
|
196
|
-
end
|
197
|
-
|
198
|
-
it "fails for the arc4 algorithm with a key length of 256" do
|
199
|
-
exp = assert_raises(HexaPDF::UnsupportedEncryptionError) do
|
200
|
-
@handler.set_up_encryption(algorithm: :arc4, key_length: 256)
|
201
|
-
end
|
202
|
-
assert_match(/ARC4 algorithm.*key length/i, exp.message)
|
203
|
-
end
|
204
|
-
end
|
205
|
-
|
206
|
-
describe "set_up_decryption" do
|
207
|
-
it "wraps the given hash in an encryption dictionary class, uses it for its dict, returns it" do
|
208
|
-
dict = @handler.set_up_decryption({Filter: :test, V: 1})
|
209
|
-
assert_equal(dict, @handler.dict)
|
210
|
-
assert_kind_of(HexaPDF::Encryption::EncryptionDictionary, @handler.dict)
|
211
|
-
assert_equal({Filter: :test, V: 1}, @handler.dict.value)
|
212
|
-
end
|
213
|
-
|
214
|
-
it "doesn't modify the trailer's /Encrypt dictionary" do
|
215
|
-
@handler.set_up_decryption({Filter: :test, V: 4, Length: 128})
|
216
|
-
assert_nil(@document.trailer[:Encrypt])
|
217
|
-
end
|
218
|
-
|
219
|
-
it "calls prepare_decryption" do
|
220
|
-
@handler.set_up_decryption({Filter: :test, V: 4, Length: 128}, myopt: 5)
|
221
|
-
assert_equal(5, @handler.myopt)
|
222
|
-
end
|
223
|
-
|
224
|
-
it "selects the correct algorithm based on the /V and /CF values" do
|
225
|
-
@enc = @handler.dup
|
226
|
-
|
227
|
-
[
|
228
|
-
[:arc4, 40, {V: 1}],
|
229
|
-
[:arc4, 80, {V: 2, Length: 80}],
|
230
|
-
[:arc4, 128, {V: 4, StrF: :Mine, CF: {Mine: {CFM: :V2}}}],
|
231
|
-
[:aes, 128, {V: 4, StrF: :Mine, CF: {Mine: {CFM: :AESV2}}}],
|
232
|
-
[:aes, 256, {V: 5, StrF: :Mine, CF: {Mine: {CFM: :AESV3}}}],
|
233
|
-
[:identity, 128, {V: 4, StrF: :Mine, CF: {Mine: {CFM: :None}}}],
|
234
|
-
[:identity, 128, {V: 4, CF: {Mine: {CFM: :AESV2}}}],
|
235
|
-
].each do |alg, length, dict|
|
236
|
-
@enc.strf = alg
|
237
|
-
@enc.set_up_encryption(key_length: length, algorithm: (alg == :identity ? :aes : alg))
|
238
|
-
@obj[:X] = @enc.encrypt_string('data', @obj)
|
239
|
-
@handler.set_up_decryption(dict)
|
240
|
-
assert_equal('data', @handler.decrypt(@obj)[:X])
|
241
|
-
end
|
242
|
-
end
|
243
|
-
|
244
|
-
it "selects the correct algorithm for string, stream and embedded file decryption" do
|
245
|
-
@handler.set_up_decryption({V: 4, StrF: :Mine, StmF: :Mine, EFF: :Mine,
|
246
|
-
CF: {Mine: {CFM: :V2}}})
|
247
|
-
assert_equal(HexaPDF::Encryption::FastARC4, @handler.send(:embedded_file_algorithm))
|
248
|
-
assert_equal(HexaPDF::Encryption::FastARC4, @handler.send(:string_algorithm))
|
249
|
-
assert_equal(HexaPDF::Encryption::FastARC4, @handler.send(:stream_algorithm))
|
250
|
-
end
|
251
|
-
|
252
|
-
it "provides correct encryption details" do
|
253
|
-
@handler.set_up_decryption({Filter: :test, V: 2, Length: 128}, myopt: 5)
|
254
|
-
assert_equal({version: 2, string_algorithm: :arc4, stream_algorithm: :arc4,
|
255
|
-
embedded_file_algorithm: :arc4, key_length: 128},
|
256
|
-
@handler.encryption_details)
|
257
|
-
end
|
258
|
-
|
259
|
-
it "fails for unsupported /V values in the dict" do
|
260
|
-
exp = assert_raises(HexaPDF::UnsupportedEncryptionError) do
|
261
|
-
@handler.set_up_decryption({V: 3})
|
262
|
-
end
|
263
|
-
assert_match(/Unsupported encryption version/i, exp.message)
|
264
|
-
end
|
265
|
-
|
266
|
-
it "fails for unsupported crypt filter encryption methods" do
|
267
|
-
exp = assert_raises(HexaPDF::UnsupportedEncryptionError) do
|
268
|
-
@handler.set_up_decryption({V: 4, StrF: :Mine, CF: {Mine: {CFM: :Unknown}}})
|
269
|
-
end
|
270
|
-
assert_match(/Unsupported encryption method/i, exp.message)
|
271
|
-
end
|
272
|
-
end
|
273
|
-
|
274
|
-
describe "decrypt" do
|
275
|
-
before do
|
276
|
-
@handler.set_up_decryption({V: 1})
|
277
|
-
@encrypted = @handler.encrypt_string('string', @obj)
|
278
|
-
@obj.value = {Key: @encrypted.dup, Array: [@encrypted.dup], Hash: {Another: @encrypted.dup}}
|
279
|
-
end
|
280
|
-
|
281
|
-
it "decrypts all strings in an object" do
|
282
|
-
@handler.decrypt(@obj)
|
283
|
-
assert_equal('string', @obj[:Key])
|
284
|
-
assert_equal('string', @obj[:Array][0])
|
285
|
-
assert_equal('string', @obj[:Hash][:Another])
|
286
|
-
end
|
287
|
-
|
288
|
-
it "decrypts the content of a stream object" do
|
289
|
-
data = HexaPDF::StreamData.new(proc { @encrypted })
|
290
|
-
obj = @document.wrap({}, oid: @obj.oid, stream: data)
|
291
|
-
@handler.decrypt(obj)
|
292
|
-
assert_equal('string', obj.stream)
|
293
|
-
end
|
294
|
-
|
295
|
-
it "doesn't decrypt a document's Encrypt dictionary" do
|
296
|
-
@document.trailer[:Encrypt] = @obj
|
297
|
-
assert_equal(@encrypted, @handler.decrypt(@obj)[:Key])
|
298
|
-
end
|
299
|
-
|
300
|
-
it "defers handling encryption to a Crypt filter is specified" do
|
301
|
-
data = HexaPDF::StreamData.new(proc { 'mydata' }, filter: :Crypt)
|
302
|
-
obj = @document.wrap({}, oid: 1, stream: data)
|
303
|
-
@handler.decrypt(obj)
|
304
|
-
assert_equal('mydata', obj.stream)
|
305
|
-
end
|
306
|
-
|
307
|
-
it "doesn't decrypt XRef streams" do
|
308
|
-
@obj[:Type] = :XRef
|
309
|
-
assert_equal(@encrypted, @handler.decrypt(@obj)[:Key])
|
310
|
-
end
|
311
|
-
|
312
|
-
it "doesn't decrypt the /Contents of a signature dictionary" do
|
313
|
-
@obj[:Type] = :Sig
|
314
|
-
@obj[:Contents] = "test"
|
315
|
-
assert_equal("test", @handler.decrypt(@obj)[:Contents])
|
316
|
-
end
|
317
|
-
|
318
|
-
it "fails if V < 5 and the object number changes" do
|
319
|
-
@obj.oid = 55
|
320
|
-
@handler.decrypt(@obj)
|
321
|
-
refute_equal('string', @obj[:Key])
|
322
|
-
end
|
323
|
-
end
|
324
|
-
|
325
|
-
describe "encryption" do
|
326
|
-
before do
|
327
|
-
@handler.set_up_encryption(key_length: 128, algorithm: :arc4)
|
328
|
-
@stream = @document.wrap({}, oid: 1, stream: HexaPDF::StreamData.new(proc { "string" }))
|
329
|
-
end
|
330
|
-
|
331
|
-
it "encrypts strings of indirect objects" do
|
332
|
-
@obj[:Key] = @handler.encrypt_string('string', @obj)
|
333
|
-
assert_equal('string', @handler.decrypt(@obj)[:Key])
|
334
|
-
end
|
335
|
-
|
336
|
-
it "encrypts streams" do
|
337
|
-
result = TestHelper.collector(@handler.encrypt_stream(@stream))
|
338
|
-
@stream.stream = HexaPDF::StreamData.new(proc { result })
|
339
|
-
assert_equal('string', @handler.decrypt(@stream).stream)
|
340
|
-
end
|
341
|
-
|
342
|
-
it "doesn't encrypt strings in a document's Encrypt dictionary" do
|
343
|
-
@document.trailer[:Encrypt] = @handler.dict
|
344
|
-
@document.trailer[:Encrypt][:Mine] = 'string'
|
345
|
-
assert_equal('string', @handler.encrypt_string('string', @document.trailer[:Encrypt]))
|
346
|
-
end
|
347
|
-
|
348
|
-
it "doesn't encrypt XRef streams" do
|
349
|
-
@stream[:Type] = :XRef
|
350
|
-
assert_equal('string', @handler.encrypt_stream(@stream).resume)
|
351
|
-
end
|
352
|
-
|
353
|
-
it "defers encrypting to a Crypt filter if specified" do
|
354
|
-
@stream.set_filter(:Crypt)
|
355
|
-
assert_equal('string', @handler.encrypt_stream(@stream).resume)
|
356
|
-
|
357
|
-
@stream.set_filter([:Crypt])
|
358
|
-
assert_equal('string', @handler.encrypt_stream(@stream).resume)
|
359
|
-
end
|
360
|
-
|
361
|
-
it "doesn't encrypt the /Contents key of signature dictionaries" do
|
362
|
-
@obj[:Type] = :Sig
|
363
|
-
@obj[:Contents] = "test"
|
364
|
-
refute_equal('test', @handler.encrypt_string("test", @obj))
|
365
|
-
assert_equal('test', @handler.encrypt_string(@obj[:Contents], @obj))
|
366
|
-
end
|
367
|
-
end
|
368
|
-
|
369
|
-
it "works correctly with different decryption and encryption handlers" do
|
370
|
-
test_file = File.join(TEST_DATA_DIR, 'standard-security-handler', 'nopwd-arc4-40bit-V1.pdf')
|
371
|
-
doc = HexaPDF::Document.new(io: StringIO.new(File.read(test_file)))
|
372
|
-
doc.encrypt(algorithm: :aes, password: 'test')
|
373
|
-
out = StringIO.new(''.b)
|
374
|
-
doc.write(out, update_fields: false)
|
375
|
-
|
376
|
-
assert_raises(HexaPDF::EncryptionError) { HexaPDF::Document.new(io: out) }
|
377
|
-
doc = HexaPDF::Document.new(io: out, decryption_opts: {password: 'test'})
|
378
|
-
assert_equal('D:20150409164600', doc.trailer[:Info].value[:ModDate])
|
379
|
-
end
|
380
|
-
end
|