# encryption.rb : Implements encrypted PDF and access permissions.
#
# Copyright August 2008, Brad Ediger. All Rights Reserved.
#
# This is free software. Please see the LICENSE and COPYING files for details.
require 'digest/md5'
require 'pdf/core/byte_string'
require_relative 'security/arcfour'
module Prawn
class Document
# Implements PDF encryption (password protection and permissions) as
# specified in the PDF Reference, version 1.3, section 3.5 "Encryption".
module Security
# @group Experimental API
# Encrypts the document, to protect confidential data or control
# modifications to the document. The encryption algorithm used is
# detailed in the PDF Reference 1.3, section 3.5 "Encryption", and it is
# implemented by all major PDF readers.
#
# +options+ can contain the following:
#
# :user_password:: Password required to open the document. If
# this is omitted or empty, no password will be
# required. The document will still be
# encrypted, but anyone can read it.
#
# :owner_password:: Password required to make modifications to
# the document or change or override its
# permissions. If this is set to
# :random, a random password will be
# used; this can be useful if you never want
# users to be able to override the document
# permissions.
#
# :permissions:: A hash mapping permission symbols (see below) to
# true or false. True means
# "permitted", and false means "not permitted".
# All permissions default to true.
#
# The following permissions can be specified:
#
# :print_document:: Print document.
#
# :modify_contents:: Modify contents of document (other than text
# annotations and interactive form fields).
#
# :copy_contents:: Copy text and graphics from document.
#
# :modify_annotations:: Add or modify text annotations and
# interactive form fields.
#
# == Examples
#
# Deny printing to everyone, but allow anyone to open without a password:
#
# encrypt_document :permissions => { :print_document => false },
# :owner_password => :random
#
# Set a user and owner password on the document, with full permissions for
# both the user and the owner:
#
# encrypt_document :user_password => 'foo', :owner_password => 'bar'
#
# Set no passwords, grant all permissions (This is useful because the
# default in some readers, if no permissions are specified, is "deny"):
#
# encrypt_document
#
# == Caveats
#
# * The encryption used is weak; the key is password-derived and is
# limited to 40 bits, due to US export controls in effect at the time
# the PDF standard was written.
#
# * There is nothing technologically requiring PDF readers to respect the
# permissions embedded in a document. Many PDF readers do not.
#
# * In short, you have no security at all against a moderately
# motivated person. Don't use this for anything super-serious. This is
# not a limitation of Prawn, but is rather a built-in limitation of the
# PDF format.
#
def encrypt_document(options = {})
Prawn.verify_options [:user_password, :owner_password, :permissions],
options
@user_password = options.delete(:user_password) || ''
@owner_password = options.delete(:owner_password) || @user_password
if @owner_password == :random
# Generate a completely ridiculous password
@owner_password = (1..32).map { rand(256) }.pack('c*')
end
self.permissions = options.delete(:permissions) || {}
# Shove the necessary entries in the trailer and enable encryption.
state.trailer[:Encrypt] = encryption_dictionary
state.encrypt = true
state.encryption_key = user_encryption_key
end
# Encrypts the given string under the given key, also requiring the
# object ID and generation number of the reference.
# See Algorithm 3.1.
def self.encrypt_string(str, key, id, gen)
# Convert ID and Gen number into little-endian truncated byte strings
id = [id].pack('V')[0, 3]
gen = [gen].pack('V')[0, 2]
extended_key = "#{key}#{id}#{gen}"
# Compute the RC4 key from the extended key and perform the encryption
rc4_key = Digest::MD5.digest(extended_key)[0, 10]
Arcfour.new(rc4_key).encrypt(str)
end
private
# Provides the values for the trailer encryption dictionary.
def encryption_dictionary
{
Filter: :Standard, # default PDF security handler
V: 1, # "Algorithm 3.1", PDF reference 1.3
R: 2, # Revision 2 of the algorithm
O: PDF::Core::ByteString.new(owner_password_hash),
U: PDF::Core::ByteString.new(user_password_hash),
P: permissions_value
}
end
# Flags in the permissions word, numbered as LSB = 1
PermissionsBits = {
print_document: 3,
modify_contents: 4,
copy_contents: 5,
modify_annotations: 6
}.freeze
FULL_PERMISSIONS = 0b1111_1111_1111_1111_1111_1111_1111_1111
def permissions=(perms = {})
@permissions ||= FULL_PERMISSIONS
perms.each do |key, value|
unless PermissionsBits[key]
raise(
ArgumentError,
"Unknown permission :#{key}. Valid options: " +
PermissionsBits.keys.map(&:inspect).join(', ')
)
end
# 0-based bit number, from LSB
bit_position = PermissionsBits[key] - 1
if value # set bit
@permissions |= (1 << bit_position)
else # clear bit
@permissions &= ~(1 << bit_position)
end
end
end
def permissions_value
@permissions || FULL_PERMISSIONS
end
PasswordPadding =
'28BF4E5E4E758A4164004E56FFFA01082E2E00B6D0683E802F0CA9FE6453697A'
.scan(/../).map { |x| x.to_i(16) }.pack('c*')
# Pads or truncates a password to 32 bytes as per Alg 3.2.
def pad_password(password)
password = password[0, 32]
password + PasswordPadding[0, 32 - password.length]
end
def user_encryption_key
@user_encryption_key ||= begin
md5 = Digest::MD5.new
md5 << pad_password(@user_password)
md5 << owner_password_hash
md5 << [permissions_value].pack('V')
md5.digest[0, 5]
end
end
# The O (owner) value in the encryption dictionary. Algorithm 3.3.
def owner_password_hash
@owner_password_hash ||= begin
key = Digest::MD5.digest(pad_password(@owner_password))[0, 5]
Arcfour.new(key).encrypt(pad_password(@user_password))
end
end
# The U (user) value in the encryption dictionary. Algorithm 3.4.
def user_password_hash
Arcfour.new(user_encryption_key).encrypt(PasswordPadding)
end
end
end
end
# @private
module PDF
module Core
module_function
# Like pdf_object, but returns an encrypted result if required.
# For direct objects, requires the object identifier and generation number
# from the indirect object referencing obj.
#
# @private
def encrypted_pdf_object(obj, key, id, gen, in_content_stream = false)
case obj
when Array
'[' << obj.map do |e|
encrypted_pdf_object(e, key, id, gen, in_content_stream)
end.join(' ') << ']'
when LiteralString
obj = ByteString.new(
Prawn::Document::Security.encrypt_string(obj, key, id, gen)
).gsub(/[\\\n\(\)]/) { |m| "\\#{m}" }
"(#{obj})"
when Time
obj = obj.strftime('D:%Y%m%d%H%M%S%z').chop.chop + "'00'"
obj = ByteString.new(
Prawn::Document::Security.encrypt_string(obj, key, id, gen)
).gsub(/[\\\n\(\)]/) { |m| "\\#{m}" }
"(#{obj})"
when String
pdf_object(
ByteString.new(
Prawn::Document::Security.encrypt_string(obj, key, id, gen)
),
in_content_stream
)
when ::Hash
output = '<< '
obj.each do |k, v|
unless k.is_a?(String) || k.is_a?(Symbol)
raise PDF::Core::Errors::FailedObjectConversion,
'A PDF Dictionary must be keyed by names'
end
output << pdf_object(k.to_sym, in_content_stream) << ' ' <<
encrypted_pdf_object(v, key, id, gen, in_content_stream) << "\n"
end
output << '>>'
when NameTree::Value
pdf_object(obj.name) + ' ' +
encrypted_pdf_object(obj.value, key, id, gen, in_content_stream)
when PDF::Core::OutlineRoot, PDF::Core::OutlineItem
encrypted_pdf_object(obj.to_hash, key, id, gen, in_content_stream)
else # delegate back to pdf_object
pdf_object(obj, in_content_stream)
end
end
# @private
class Stream
def encrypted_object(key, id, gen)
if filtered_stream
"stream\n" +
Prawn::Document::Security.encrypt_string(
filtered_stream, key, id, gen
) + "\nendstream\n"
else
''
end
end
end
# @private
class Reference
# Returns the object definition for the object this references, keyed from
# +key+.
def encrypted_object(key)
@on_encode.call(self) if @on_encode
output = "#{@identifier} #{gen} obj\n"
if @stream.empty?
output <<
PDF::Core.encrypted_pdf_object(data, key, @identifier, gen) << "\n"
else
output << PDF::Core.encrypted_pdf_object(
data.merge(@stream.data), key, @identifier, gen
) << "\n" <<
@stream.encrypted_object(key, @identifier, gen)
end
output << "endobj\n"
end
end
end
end