Subversion Repositories planix.SVN

Rev

Details | Last modification | View Log | RSS feed

Rev Author Line No. Line
2 - 1
%   Copyright (C) 1996-1998 Geoffrey Keating. 
2
%	Copyright (C) 2001 Artifex Software, Inc.
3
% This file may be freely distributed with or without modifications,
4
% so long as modified versions are marked as such and copyright notices are
5
% not removed.
6
 
7
% $Id: pdf_sec.ps,v 1.15 2004/03/12 01:55:58 dan Exp $
8
% Implementation of security hooks for PDF reader.
9
 
10
% This file contains the procedures that have to take encryption into
11
% account when reading a PDF file. It replaces the stub version of this
12
% file that is shipped with GhostScript. It requires GhostScript 7.01
13
% or later.
14
 
15
% Documentation for using this file is available at
16
% http://www.ozemail.com.au/%7Egeoffk/pdfencrypt/
17
 
18
% Modified by Alex Cherepanov to work with GS 6.60 and higher.
19
% New versions of GS require explicit checks for /true , /false, and /null
20
% in .decpdfrun . This fix is backward-compatible.
21
 
22
% Modified by Raph Levien and Ralph Giles to use the new C
23
% implementations of md5 and arcfour in ghostscript 7.01, and to
24
% be compatible with PDF 1.4 128-bit encryption.
25
 
26
/.setlanguagelevel where { pop 2 .setlanguagelevel } if
27
.currentglobal true .setglobal
28
/pdfdict where { pop } { /pdfdict 100 dict def } ifelse
29
pdfdict begin
30
 
31
% Older ghostscript versions do not have .pdftoken, so we use 'token' instead.
32
/.pdftoken where { pop } { /.pdftoken /token load def } ifelse
33
 
34
% take a stream and arc4 decrypt it.
35
% <stream> <key> arc4decodefilter <stream>
36
/arc4decodefilter {
37
  1 dict begin
38
  /Key exch def
39
  currentdict end /ArcfourDecode filter
40
} bind def
41
 
42
% <ciphertext> <key> arc4decode <plaintext>
43
/arc4decode {
44
  %(key: ) print dup == (ct: ) print 1 index ==
45
  1 index length 0 eq {
46
    pop
47
  } {
48
    1 index length string 3 1 roll arc4decodefilter exch readstring pop
49
  } ifelse
50
} bind def
51
 
52
/md5 {
53
  16 string dup /MD5Encode filter dup 4 3 roll writestring closefile
54
} bind def
55
 
56
/md5_trunk {
57
  md5 0 pdf_key_length getinterval
58
} bind def
59
 
60
 
61
/pdf_padding_string
62
   <28bf4e5e4e758a41 64004e56fffa0108
63
    2e2e00b6d0683e80 2f0ca9fe6453697a>
64
def
65
 
66
% Pad a key out to 32 bytes.
67
/pdf_pad_key {		% <key> pdf_pad_key <padded key>
68
  dup length 32 gt { 0 32 getinterval } if
69
  pdf_padding_string
70
 
71
  concatstrings
72
} bind def
73
 
74
/pdf_xorbytes {      % <iter-num> <key> pdf_xorbytes <xored-key>
75
  dup length dup string
76
  exch 1 sub 0 1 3 2 roll {
77
    % <iter-num> <key> <new-key> <byte-num>
78
    dup 3 index exch get 4 index xor
79
    % <iter-num> <key> <new-key> <byte-num> <byte>
80
    3 copy put pop pop
81
  } for
82
  3 1 roll pop pop
83
} bind def
84
 
85
% Get length of encryption key in bytes
86
/pdf_key_length {    % pdf_key_length <key_length>
87
  Trailer /Encrypt oget /Length knownoget { -3 bitshift } { 5 } ifelse
88
} bind def
89
 
90
% Algorithm 3.2
91
/pdf_compute_encryption_key {  % <password> pdf_compute_encryption_key <key>
92
  % Step 1.
93
  pdf_pad_key
94
 
95
  % Step 2, 3.
96
  Trailer /Encrypt oget dup /O oget
97
  % <padded-key> <encrypt> <O>
98
 
99
  % Step 4.
100
  exch /P oget 4 string exch
101
  2 copy 255 and 0 exch put
102
  2 copy -8 bitshift 255 and 1 exch put
103
  2 copy -16 bitshift 255 and 2 exch put
104
  2 copy -24 bitshift 255 and 3 exch put pop
105
  % <padded-key> <O> <P>
106
 
107
  % Step 5.
108
  Trailer /ID knownoget { 0 oget } {
109
    ()
110
    (   **** ID key in the trailer is required for encrypted files.\n) pdfformaterror
111
  } ifelse
112
  3 { concatstrings } repeat 
113
  % We will finish step 5 after possibly including step 6.
114
 
115
  % The following only executed for /R equal to 3 or more
116
  Trailer /Encrypt oget dup /R oget dup 3 ge {
117
 
118
     % Step 6.  If EncryptMetadata is false, pass 0xFFFFFFFF to md5 function
119
     % The PDF 1.5 Spec says that EncryptMetadata is an undocumented
120
     % feature of PDF 1.4.  That implies that this piece of logic should
121
     % be executed if R >= 3.  However testing with Acrobat 5.0 and 6.0 shows
122
     % that this step is not executed if R equal to 3.  Thus we have a test for
123
     % R being >= 4.
124
     4 ge {
125
       /EncryptMetadata knownoget	% Get EncryptMetadata (if present)
126
       not { true } if			% Default is true
127
       not {				% If EncryptMetadata is false
128
         <ff ff ff ff> concatstrings	% Add 0xFFFFFFFF to working string
129
       } if
130
     } {
131
       pop				% Remove Encrypt dict
132
     } ifelse
133
     md5_trunk				% Finish step 5 and 6.
134
 
135
     % Step 7.  Executed as part of step 6
136
     % Step 8.  (This step is defintely a part of PDF 1.4.)
137
     50 { md5_trunk } repeat
138
  } {
139
     pop pop md5_trunk			% Remove R, Encrypt dict, finish step 5
140
  } ifelse
141
 
142
  % Step 9 - Done in md5_trunk.
143
} bind def
144
 
145
% Algorithm 3.4
146
/pdf_gen_user_password_R2 { % <filekey> pdf_gen_user_password_R2 <U>
147
 
148
  % Step 2.
149
  pdf_padding_string exch arc4decode
150
} bind def
151
 
152
% Algorithm 3.5
153
/pdf_gen_user_password_R3 { % <filekey> pdf_gen_user_password_R3 <U>
154
 
155
  % Step 2.
156
  pdf_padding_string
157
 
158
  % Step 3.
159
  Trailer /ID knownoget { 0 oget } {
160
    ()
161
    (   **** ID key in the trailer is required for encrypted files.\n) pdfformaterror
162
  } ifelse
163
  concatstrings md5
164
 
165
  % Step 4.
166
  1 index arc4decode
167
 
168
  % Step 5.
169
  1 1 19 {
170
    2 index pdf_xorbytes arc4decode
171
  } for
172
  exch pop
173
 
174
} bind def
175
 
176
/pdf_gen_user_password { % <password> pdf_gen_user_password <filekey> <U>
177
  % common Step 1 of Algorithms 3.4 and 3.5.
178
  pdf_compute_encryption_key dup
179
 
180
  Trailer /Encrypt oget
181
 
182
  /R oget dup 2 eq {
183
    pop pdf_gen_user_password_R2
184
  } {
185
    dup 3 eq {
186
      pop pdf_gen_user_password_R3
187
    } {
188
      dup 4 eq {	% 4 uses the algorithm as 3
189
        pop pdf_gen_user_password_R3
190
      } {
191
        (   **** This file uses an unknown standard security handler revision: )
192
        exch =string cvs concatstrings pdfformaterror printProducer
193
        /pdf_check_user_password cvx /undefined signalerror
194
      } ifelse
195
    } ifelse
196
  } ifelse
197
} bind def
198
 
199
% Algorithm 3.6
200
/pdf_check_user_password { % <password> pdf_check_user_password <filekey> true
201
                           % <password> pdf_check_user_password false
202
  pdf_gen_user_password
203
 
204
  Trailer /Encrypt oget /U oget
205
 
206
 
207
    true
208
  } {
209
    pop false
210
  } ifelse
211
} bind def
212
 
213
% Compute an owner key, ie the result of step 4 of Algorithm 3.3
214
/pdf_owner_key % <password> pdf_owner_key <owner-key>
215
{
216
  % Step 1.
217
  pdf_pad_key
218
 
219
  % Step 2.
220
  md5_trunk
221
 
222
  % 3.3 Step 3.  Only executed for /R equal to 3 or more
223
  Trailer /Encrypt oget /R oget 3 ge {
224
    50 { md5_trunk } repeat
225
  } if
226
 
227
  % Step 4 - Done in md5_trunk.
228
} bind def
229
 
230
% Algorithm 3.7
231
/pdf_check_owner_password { % <password> pdf_check_owner_password <filekey> true
232
                            % <password> pdf_check_owner_password false
233
  % Step 1.
234
  pdf_owner_key
235
 
236
  % Step 2.
237
  Trailer /Encrypt oget dup /O oget 2 index arc4decode
238
  % <encryption-key> <encrypt-dict> <decrypted-O>
239
 
240
  % Step 3.  Only executed for /R equal to 3 or more
241
  exch /R oget 3 ge {
242
    1 1 19 {
243
      2 index pdf_xorbytes arc4decode
244
    } for
245
  } if
246
  exch pop
247
  % <result-of-step-3>
248
 
249
  pdf_check_user_password
250
} bind def
251
 
252
% Process the encryption information in the Trailer.
253
/pdf_process_Encrypt {
254
  Trailer /Encrypt oget
255
  /Filter oget /Standard eq not {
256
    (   **** This file uses an unknown security handler.\n) pdfformaterror
257
    printProducer
258
    /pdf_process_Encrypt cvx /undefined signalerror
259
  } if
260
  () pdf_check_user_password
261
  {
262
    /FileKey exch def
263
  } {
264
    /PDFPassword where {
265
       pop PDFPassword pdf_check_user_password
266
       {
267
         /FileKey exch def
268
       } {
269
         PDFPassword pdf_check_owner_password
270
         {
271
           /FileKey exch def
272
         } {
273
           (   **** Password did not work.\n) pdfformaterror
274
	   printProducer
275
	   /pdf_process_Encrypt cvx /invalidfileaccess signalerror
276
         } ifelse
277
       } ifelse
278
    } {
279
      (   **** This file requires a password for access.\n) pdfformaterror
280
      printProducer
281
      /pdf_process_Encrypt cvx /invalidfileaccess signalerror
282
    } ifelse
283
  } ifelse
284
 
285
%   Trailer /Encrypt oget /P oget 4 and 0 eq #? and
286
%    { (   ****This owner of this file has requested you do not print it.\n)
287
%      pdfformaterror printProducer
288
%      /pdf_process_Encrypt cvx /invalidfileaccess signalerror
289
%    }
290
%   if
291
} bind def
292
 
293
% Calculate the key used to decrypt an object (to pass to .decpdfrun or
294
% put into a stream dictionary).
295
/computeobjkey	% <object#> <generation#> computeobjkey <keystring>
296
{
297
  exch
298
  FileKey length 5 add string
299
  dup 0 FileKey putinterval
300
  exch
301
		% stack:  gen# string obj#
302
    2 copy 255 and FileKey length exch put
303
    2 copy -8 bitshift 255 and FileKey length 1 add exch put
304
    2 copy -16 bitshift 255 and FileKey length 2 add exch put
305
  pop exch
306
    2 copy 255 and FileKey length 3 add exch put
307
    2 copy -8 bitshift 255 and FileKey length 4 add exch put
308
  pop md5 0 FileKey length 5 add 2 index length .min getinterval
309
} bind def
310
 
311
% As .pdfrun, but decrypt strings with key <key>.
312
/.decpdfrun			% <file> <keystring> <opdict> .decpdfrun -
313
 {	% Construct a procedure with the file, opdict and key bound into it.
314
   2 index cvlit mark mark 5 2 roll
315
    { .pdftoken not { (%%EOF) cvn cvx } if
316
      dup xcheck
317
       { PDFDEBUG { dup == flush } if
318
	 3 -1 roll pop
319
	 2 copy .knownget
320
	  { exch pop exch pop exec
321
          }
322
	  { exch pop
323
            dup /true eq
324
              { pop //true
325
              }
326
              { dup /false eq
327
                  { pop //false 
328
                  }
329
                  { dup /null eq
330
                      { pop //null
331
                      }
332
                      { (   **** Unknown operator: ) 
333
	                exch =string cvs concatstrings (\n) concatstrings
334
			pdfformaterror
335
                      }
336
                    ifelse
337
                  }
338
                ifelse
339
              }
340
            ifelse
341
	  }
342
	 ifelse
343
       }
344
       { exch pop PDFDEBUG { dup ==only ( ) print flush } if
345
	 dup type /stringtype eq
346
          {
347
	% Check if we have encrypted strings  R=4 allows for
348
	% selection of encryption on streams and strings
349
            Trailer /Encrypt oget	% Get encryption dictionary
350
            dup /R oget 4 lt		% only 4 has selectable
351
             {				% R < 4 --> encrypted strings
352
	       pop 1 index arc4decode	% Decrypt string
353
	       PDFDEBUG { (%Decrypted: ) print dup == flush } if
354
             } {			% Else R = 4
355
	       /StrF knownoget		% Get StrF (if present)
356
	        {			% If StrF is present ...
357
		  /Identity eq not	% Check if StrF != Identity
358
	  	   { 1 index arc4decode	% Decrypt string
359
		     PDFDEBUG { (%Decrypted: ) print dup == flush } if
360
		   }
361
		  if			% If StrF != identity
362
		}
363
	       if			% If StrF is known
364
      	     }
365
	    ifelse			% Ifelse R < 4
366
	  }
367
	 if				% If  = stringtype
368
	 exch pop
369
       }
370
      ifelse
371
    }
372
   aload pop .packtomark cvx
373
   /loop cvx 2 packedarray cvx
374
    { stopped /PDFsource } aload pop
375
   PDFsource
376
    { store { stop } if } aload pop .packtomark cvx 
377
   /PDFsource 3 -1 roll store exec
378
 } bind def
379
 
380
% Run the code to resolve an object reference.
381
/pdf_run_resolve
382
{ /FileKey where			% Check if the file is encrypted
383
  { pop					% File is encrypted
384
    2 copy computeobjkey dup 4 1 roll
385
    PDFfile exch resolveopdict .decpdfrun
386
    dup dup dup 5 2 roll
387
	% stack: object object key object object
388
    {	% Use loop to provide an exitable context.
389
      xcheck exch type /dicttype eq and % Check if executable dictionary
390
      not {				% If object is not ...
391
        pop pop				% ignore object
392
        exit				% Exit 'loop' context
393
      } if				% If not possible stream
394
	% Starting with PDF 1.4 (R = 3), there are some extra features
395
	% which control encryption of streams.  The EncryptMetadata entry
396
	% in the Encrypt dict controls the encryption of metadata streams.
397
      Trailer /Encrypt oget		% Get encryption dictionary
398
      dup /R oget dup 3 lt		% Only PDF 1.4 and higher has options
399
      {					% R < 3 --> all streams encrypted
400
        pop pop /StreamKey exch put	% Insert StreamKey in dictionary
401
	exit				% Exit 'loop' context
402
      } if
403
	% Check EncryptMeta.  stack:  object object key Encrypt R
404
      exch dup /EncryptMetadata knownoget % Get EncryptMetadata (if present)
405
      not { true } if			% If not present default = true
406
      not				% Check if EncryptMetadata = false
407
      { 				% if false we need to check the stream type
408
	3 index /Type knownoget		% Get stream type (if present)
409
	not { //null } if		% If type not present use fake name
410
	/Metadata eq			% Check if the type is Metadata
411
        { pop pop pop pop		% Type == Metadata --> no encryption
412
	  exit				% Exit 'loop' context
413
        } if
414
      } if
415
    	% PDF 1.5 encryption (R == 4) has selectable encryption handlers.  If
416
	% this is not PDF 1.5 encryption (R < 4) then we are done checking and
417
	% we need to decrypt the stream.  stack:  object object key R Encrypt
418
      exch 4 lt				% Check for less than PDF 1.5
419
      { pop /StreamKey exch put		% Insert StreamKey in dictionary
420
	exit				% Exit 'loop' context
421
      } if
422
	% Check if the stream encryption handler (StmF) == Identity.
423
      /StmF knownoget			% Get StmF (if present)
424
      not { /Identity } if		% If StmF not present default = Identity
425
      /Identity eq 			% Check if StmF == Identity
426
      { pop pop				% Identity --> no encryption
427
	exit				% Exit 'loop' context
428
      } if
429
      	% If we get here then we need to decrypt the stream.
430
      /StreamKey exch put		% Insert StreamKey into dictionary
431
      exit				% Exit 'loop' context, never loop
432
    } loop				% End of loop exitable context
433
  } {					% Else file is not encrypted
434
    PDFfile resolveopdict .pdfrun
435
  } ifelse				% Ifelse encrypted
436
} bind def
437
 
438
% Prefix a decryption filter to a stream if needed.
439
% Stack: readdata? dict parms file/string filternames
440
% (both before and after).
441
/pdf_decrypt_stream
442
 { 3 index /StreamKey known	% Check if the file is encrypted
443
   {
444
      exch 
445
	% Stack: readdata? dict parms filternames file/string
446
      3 index /Length oget
447
      dup 0 eq {
448
	% Handle Length=0 case specially to avoid SubFileDecode semantics
449
        pop pop ()
450
      } {
451
        () /SubFileDecode filter
452
      } ifelse
453
      3 index /StreamKey get arc4decodefilter
454
      exch
455
   } if
456
 } bind def
457
 
458
end			% pdfdict
459
.setglobal