Coverage Report

Created: 2026-01-16 06:36

next uncovered line (L), next uncovered region (R), next uncovered branch (B)
/src/qpdf/libqpdf/QPDF_encryption.cc
Line
Count
Source
1
// This file implements methods from the QPDF class that involve encryption.
2
3
#include <qpdf/QPDF_private.hh>
4
5
#include <qpdf/QPDFExc.hh>
6
7
#include <qpdf/MD5.hh>
8
#include <qpdf/Pl_AES_PDF.hh>
9
#include <qpdf/Pl_Buffer.hh>
10
#include <qpdf/Pl_RC4.hh>
11
#include <qpdf/Pl_SHA2.hh>
12
#include <qpdf/QPDFObjectHandle_private.hh>
13
#include <qpdf/QTC.hh>
14
#include <qpdf/QUtil.hh>
15
#include <qpdf/RC4.hh>
16
#include <qpdf/Util.hh>
17
18
#include <algorithm>
19
#include <cstring>
20
21
using namespace qpdf;
22
using namespace std::literals;
23
24
using Encryption = QPDF::Doc::Encryption;
25
26
static std::string padding_string =
27
    "\x28\xbf\x4e\x5e\x4e\x75\x8a\x41\x64\x00\x4e\x56\xff\xfa\x01\x08"
28
    "\x2e\x2e\x00\xb6\xd0\x68\x3e\x80\x2f\x0c\xa9\xfe\x64\x53\x69\x7a"s;
29
30
static unsigned int const key_bytes = 32;
31
32
static unsigned int const OU_key_bytes_V5 = 48;
33
static unsigned int const OUE_key_bytes_V5 = 32;
34
static unsigned int const Perms_key_bytes_V5 = 16;
35
36
int
37
QPDF::EncryptionData::getV() const
38
0
{
39
0
    return this->V;
40
0
}
41
42
int
43
QPDF::EncryptionData::getR() const
44
0
{
45
0
    return this->R;
46
0
}
47
48
int
49
QPDF::EncryptionData::getLengthBytes() const
50
0
{
51
0
    return this->Length_bytes;
52
0
}
53
54
int
55
QPDF::EncryptionData::getP() const
56
0
{
57
0
    return this->P;
58
0
}
59
60
std::string const&
61
QPDF::EncryptionData::getO() const
62
0
{
63
0
    return this->O;
64
0
}
65
66
std::string const&
67
QPDF::EncryptionData::getU() const
68
0
{
69
0
    return this->U;
70
0
}
71
72
std::string const&
73
QPDF::EncryptionData::getOE() const
74
0
{
75
0
    return this->OE;
76
0
}
77
78
std::string const&
79
QPDF::EncryptionData::getUE() const
80
0
{
81
0
    return this->UE;
82
0
}
83
84
std::string const&
85
QPDF::EncryptionData::getPerms() const
86
0
{
87
0
    return this->Perms;
88
0
}
89
90
std::string const&
91
QPDF::EncryptionData::getId1() const
92
0
{
93
0
    return this->id1;
94
0
}
95
96
bool
97
QPDF::EncryptionData::getEncryptMetadata() const
98
0
{
99
0
    return this->encrypt_metadata;
100
0
}
101
102
void
103
QPDF::EncryptionData::setO(std::string const& O)
104
0
{
105
0
    this->O = O;
106
0
}
107
108
void
109
QPDF::EncryptionData::setU(std::string const& U)
110
0
{
111
0
    this->U = U;
112
0
}
113
114
void
115
QPDF::EncryptionData::setV5EncryptionParameters(
116
    std::string const& O,
117
    std::string const& OE,
118
    std::string const& U,
119
    std::string const& UE,
120
    std::string const& Perms)
121
0
{
122
0
    this->O = O;
123
0
    this->OE = OE;
124
0
    this->U = U;
125
0
    this->UE = UE;
126
0
    this->Perms = Perms;
127
0
}
128
129
int
130
Encryption::getV() const
131
759k
{
132
759k
    return this->V;
133
759k
}
134
135
int
136
Encryption::getR() const
137
924k
{
138
924k
    return this->R;
139
924k
}
140
141
int
142
Encryption::getLengthBytes() const
143
165k
{
144
165k
    return this->Length_bytes;
145
165k
}
146
147
int
148
Encryption::getP() const
149
118k
{
150
118k
    return static_cast<int>(P.to_ulong());
151
118k
}
152
153
bool
154
Encryption::getP(size_t bit) const
155
0
{
156
0
    qpdf_assert_debug(bit);
157
0
    return P.test(bit - 1);
158
0
}
159
160
bool
161
QPDF::EncryptionParameters::P(size_t bit) const
162
0
{
163
0
    qpdf_assert_debug(bit);
164
0
    return P_.test(bit - 1);
165
0
}
166
167
std::string const&
168
Encryption::getO() const
169
113k
{
170
113k
    return this->O;
171
113k
}
172
173
std::string const&
174
Encryption::getU() const
175
87.5k
{
176
87.5k
    return this->U;
177
87.5k
}
178
179
std::string const&
180
Encryption::getOE() const
181
33.4k
{
182
33.4k
    return this->OE;
183
33.4k
}
184
185
std::string const&
186
Encryption::getUE() const
187
35.7k
{
188
35.7k
    return this->UE;
189
35.7k
}
190
191
std::string const&
192
Encryption::getPerms() const
193
36.1k
{
194
36.1k
    return this->Perms;
195
36.1k
}
196
197
std::string const&
198
Encryption::getId1() const
199
71.6k
{
200
71.6k
    return this->id1;
201
71.6k
}
202
203
bool
204
Encryption::getEncryptMetadata() const
205
67.1k
{
206
67.1k
    return this->encrypt_metadata;
207
67.1k
}
208
209
void
210
Encryption::setO(std::string const& O)
211
0
{
212
0
    this->O = O;
213
0
}
214
215
void
216
Encryption::setU(std::string const& U)
217
0
{
218
0
    this->U = U;
219
0
}
220
221
void
222
Encryption::setP(size_t bit, bool val)
223
0
{
224
0
    qpdf_assert_debug(bit);
225
0
    P.set(bit - 1, val);
226
0
}
227
228
void
229
Encryption::setP(unsigned long val)
230
0
{
231
0
    P = std::bitset<32>(val);
232
0
}
233
234
void
235
Encryption::setId1(std::string const& val)
236
36.6k
{
237
36.6k
    id1 = val;
238
36.6k
}
239
240
void
241
Encryption::setV5EncryptionParameters(
242
    std::string const& O,
243
    std::string const& OE,
244
    std::string const& U,
245
    std::string const& UE,
246
    std::string const& Perms)
247
0
{
248
0
    this->O = O;
249
0
    this->OE = OE;
250
0
    this->U = U;
251
0
    this->UE = UE;
252
0
    this->Perms = Perms;
253
0
}
254
255
void
256
QPDF::trim_user_password(std::string& user_password)
257
461
{
258
    // Although unnecessary, this routine trims the padding string from the end of a user password.
259
    // Its only purpose is for recovery of user passwords which is done in the test suite.
260
461
    if (user_password.size() < key_bytes) {
261
0
        return;
262
0
    }
263
264
461
    auto idx = user_password.find('\x28');
265
266
492
    while (idx != user_password.npos) {
267
31
        if (padding_string.starts_with(user_password.substr(idx))) {
268
0
            user_password.resize(idx);
269
0
            return;
270
0
        }
271
31
        QTC::TC("qpdf", "QPDF_encryption skip 0x28");
272
31
        idx = user_password.find('\x28', ++idx);
273
31
    }
274
461
}
275
276
static std::string
277
pad_or_truncate_password_V4(std::string password)
278
85.1k
{
279
85.1k
    if (password.size() < key_bytes) {
280
79.8k
        password.append(padding_string);
281
79.8k
    }
282
85.1k
    password.resize(key_bytes);
283
85.1k
    return password;
284
85.1k
}
285
286
static std::string
287
iterate_md5_digest(MD5& md5, int iterations, int key_len)
288
68.2k
{
289
68.2k
    MD5::Digest digest;
290
68.2k
    md5.digest(digest);
291
68.2k
    auto len = std::min(QIntC::to_size(key_len), sizeof(digest));
292
3.39M
    for (int i = 0; i < iterations; ++i) {
293
3.32M
        MD5 m;
294
3.32M
        m.encodeDataIncrementally(reinterpret_cast<char*>(digest), len);
295
3.32M
        m.digest(digest);
296
3.32M
    }
297
68.2k
    return {reinterpret_cast<char*>(digest), len};
298
68.2k
}
299
300
static void
301
iterate_rc4(std::string& data, std::string_view okey, int iterations, bool reverse)
302
48.0k
{
303
48.0k
    auto len = okey.size();
304
48.0k
    std::string key(len, '\0');
305
980k
    for (int i = 0; i < iterations; ++i) {
306
932k
        int const xor_value = (reverse ? iterations - 1 - i : i);
307
15.7M
        for (size_t j = 0; j < len; ++j) {
308
14.8M
            key[j] = static_cast<char>(okey[j] ^ xor_value);
309
14.8M
        }
310
932k
        RC4::process(key, data);
311
932k
    }
312
48.0k
}
313
314
static std::string
315
process_with_aes(
316
    std::string const& key,
317
    bool encrypt,
318
    std::string const& data,
319
    size_t outlength = 0,
320
    unsigned int repetitions = 1,
321
    unsigned char const* iv = nullptr,
322
    size_t iv_length = 0)
323
6.95M
{
324
6.95M
    Pl_Buffer buffer("buffer");
325
6.95M
    Pl_AES_PDF aes("aes", &buffer, encrypt, key);
326
6.95M
    if (iv) {
327
6.89M
        aes.setIV(iv, iv_length);
328
6.89M
    } else {
329
65.6k
        aes.useZeroIV();
330
65.6k
    }
331
6.95M
    aes.disablePadding();
332
448M
    for (unsigned int i = 0; i < repetitions; ++i) {
333
441M
        aes.writeString(data);
334
441M
    }
335
6.95M
    aes.finish();
336
6.95M
    if (outlength == 0) {
337
6.95M
        return buffer.getString();
338
6.95M
    } else {
339
0
        return buffer.getString().substr(0, outlength);
340
0
    }
341
6.95M
}
342
343
std::string
344
Encryption::hash_V5(
345
    std::string const& password, std::string const& salt, std::string const& udata) const
346
99.5k
{
347
99.5k
    Pl_SHA2 hash(256);
348
99.5k
    hash.writeString(password);
349
99.5k
    hash.writeString(salt);
350
99.5k
    hash.writeString(udata);
351
99.5k
    hash.finish();
352
99.5k
    std::string K = hash.getRawDigest();
353
354
99.5k
    std::string result;
355
99.5k
    if (getR() < 6) {
356
1.07k
        result = K;
357
98.4k
    } else {
358
        // Algorithm 2.B from ISO 32000-1 chapter 7: Computing a hash
359
360
98.4k
        int round_number = 0;
361
98.4k
        bool done = false;
362
6.98M
        while (!done) {
363
            // The hash algorithm has us setting K initially to the R5 value and then repeating a
364
            // series of steps 64 times before starting with the termination case testing.  The
365
            // wording of the specification is very unclear as to the exact number of times it
366
            // should be run since the wording about whether the initial setup counts as round 0 or
367
            // not is ambiguous.  This code counts the initial setup (R5) value as round 0, which
368
            // appears to be correct.  This was determined to be correct by increasing or decreasing
369
            // the number of rounds by 1 or 2 from this value and generating 20 test files.  In this
370
            // interpretation, all the test files worked with Adobe Reader X.  In the other
371
            // configurations, many of the files did not work, and we were accurately able to
372
            // predict which files didn't work by looking at the conditions under which we
373
            // terminated repetition.
374
375
6.89M
            ++round_number;
376
6.89M
            std::string K1 = password + K + udata;
377
6.89M
            qpdf_assert_debug(K.length() >= 32);
378
6.89M
            std::string E = process_with_aes(
379
6.89M
                K.substr(0, 16),
380
6.89M
                true,
381
6.89M
                K1,
382
6.89M
                0,
383
6.89M
                64,
384
6.89M
                QUtil::unsigned_char_pointer(K.substr(16, 16)),
385
6.89M
                16);
386
387
            // E_mod_3 is supposed to be mod 3 of the first 16 bytes of E taken as as a (128-bit)
388
            // big-endian number.  Since (xy mod n) is equal to ((x mod n) + (y mod n)) mod n and
389
            // since 256 mod n is 1, we can just take the sums of the the mod 3s of each byte to get
390
            // the same result.
391
6.89M
            int E_mod_3 = 0;
392
117M
            for (unsigned int i = 0; i < 16; ++i) {
393
110M
                E_mod_3 += static_cast<unsigned char>(E.at(i));
394
110M
            }
395
6.89M
            E_mod_3 %= 3;
396
6.89M
            int next_hash = ((E_mod_3 == 0) ? 256 : (E_mod_3 == 1) ? 384 : 512);
397
6.89M
            Pl_SHA2 sha2(next_hash);
398
6.89M
            sha2.writeString(E);
399
6.89M
            sha2.finish();
400
6.89M
            K = sha2.getRawDigest();
401
402
6.89M
            if (round_number >= 64) {
403
685k
                unsigned int ch = static_cast<unsigned char>(*(E.rbegin()));
404
405
685k
                if (ch <= QIntC::to_uint(round_number - 32)) {
406
98.4k
                    done = true;
407
98.4k
                }
408
685k
            }
409
6.89M
        }
410
98.4k
        result = K.substr(0, 32);
411
98.4k
    }
412
413
99.5k
    return result;
414
99.5k
}
415
416
static void
417
pad_short_parameter(std::string& param, size_t max_len)
418
86.6k
{
419
86.6k
    if (param.length() < max_len) {
420
21.2k
        QTC::TC("qpdf", "QPDF_encryption pad short parameter");
421
21.2k
        param.append(max_len - param.length(), '\0');
422
21.2k
    }
423
86.6k
}
424
425
std::string
426
QPDF::compute_data_key(
427
    std::string const& encryption_key,
428
    int objid,
429
    int generation,
430
    bool use_aes,
431
    int encryption_V,
432
    int encryption_R)
433
613k
{
434
    // Algorithm 3.1 from the PDF 1.7 Reference Manual
435
436
613k
    std::string result = encryption_key;
437
438
613k
    if (encryption_V >= 5) {
439
        // Algorithm 3.1a (PDF 1.7 extension level 3): just use encryption key straight.
440
449k
        return result;
441
449k
    }
442
443
    // Append low three bytes of object ID and low two bytes of generation
444
163k
    result.append(1, static_cast<char>(objid & 0xff));
445
163k
    result.append(1, static_cast<char>((objid >> 8) & 0xff));
446
163k
    result.append(1, static_cast<char>((objid >> 16) & 0xff));
447
163k
    result.append(1, static_cast<char>(generation & 0xff));
448
163k
    result.append(1, static_cast<char>((generation >> 8) & 0xff));
449
163k
    if (use_aes) {
450
13.8k
        result += "sAlT";
451
13.8k
    }
452
163k
    return MD5::digest(result).substr(0, result.size());
453
613k
}
454
455
std::string
456
QPDF::compute_encryption_key(std::string const& password, EncryptionData const& ed)
457
0
{
458
0
    return Encryption(
459
0
               ed.getV(),
460
0
               ed.getR(),
461
0
               ed.getLengthBytes(),
462
0
               ed.getP(),
463
0
               ed.getO(),
464
0
               ed.getU(),
465
0
               ed.getOE(),
466
0
               ed.getUE(),
467
0
               ed.getPerms(),
468
0
               ed.getId1(),
469
0
               ed.getEncryptMetadata())
470
0
        .compute_encryption_key(password);
471
0
}
472
473
std::string
474
Encryption::compute_encryption_key(std::string const& password) const
475
46.4k
{
476
46.4k
    if (getV() >= 5) {
477
        // For V >= 5, the encryption key is generated and stored in the file, encrypted separately
478
        // with both user and owner passwords.
479
0
        return recover_encryption_key_with_password(password);
480
46.4k
    } else {
481
        // For V < 5, the encryption key is derived from the user
482
        // password.
483
46.4k
        return compute_encryption_key_from_password(password);
484
46.4k
    }
485
46.4k
}
486
487
std::string
488
Encryption::compute_encryption_key_from_password(std::string const& password) const
489
46.4k
{
490
    // Algorithm 3.2 from the PDF 1.7 Reference Manual
491
492
    // This code does not properly handle Unicode passwords. Passwords are supposed to be converted
493
    // from OS codepage characters to PDFDocEncoding.  Unicode passwords are supposed to be
494
    // converted to OS codepage before converting to PDFDocEncoding.  We instead require the
495
    // password to be presented in its final form.
496
497
46.4k
    MD5 md5;
498
46.4k
    md5.encodeDataIncrementally(pad_or_truncate_password_V4(password));
499
46.4k
    md5.encodeDataIncrementally(getO());
500
46.4k
    char pbytes[4];
501
46.4k
    int p = getP();
502
46.4k
    pbytes[0] = static_cast<char>(p & 0xff);
503
46.4k
    pbytes[1] = static_cast<char>((p >> 8) & 0xff);
504
46.4k
    pbytes[2] = static_cast<char>((p >> 16) & 0xff);
505
46.4k
    pbytes[3] = static_cast<char>((p >> 24) & 0xff);
506
46.4k
    md5.encodeDataIncrementally(pbytes, 4);
507
46.4k
    md5.encodeDataIncrementally(getId1());
508
46.4k
    if (getR() >= 4 && !getEncryptMetadata()) {
509
27
        md5.encodeDataIncrementally("\xff\xff\xff\xff");
510
27
    }
511
46.4k
    return iterate_md5_digest(md5, (getR() >= 3 ? 50 : 0), getLengthBytes());
512
46.4k
}
513
514
std::string
515
Encryption::compute_O_rc4_key(
516
    std::string const& user_password, std::string const& owner_password) const
517
21.8k
{
518
21.8k
    if (getV() >= 5) {
519
0
        throw std::logic_error("compute_O_rc4_key called for file with V >= 5");
520
0
    }
521
21.8k
    std::string password = owner_password.empty() ? user_password : owner_password;
522
21.8k
    MD5 md5;
523
21.8k
    md5.encodeDataIncrementally(pad_or_truncate_password_V4(password));
524
21.8k
    return iterate_md5_digest(md5, (getR() >= 3 ? 50 : 0), getLengthBytes());
525
21.8k
}
526
527
std::string
528
Encryption::compute_O_value(
529
    std::string const& user_password, std::string const& owner_password) const
530
16.9k
{
531
    // Algorithm 3.3 from the PDF 1.7 Reference Manual
532
533
16.9k
    auto upass = pad_or_truncate_password_V4(user_password);
534
16.9k
    std::string O_key = compute_O_rc4_key(user_password, owner_password);
535
16.9k
    pad_short_parameter(O_key, QIntC::to_size(getLengthBytes()));
536
16.9k
    iterate_rc4(upass, O_key, getR() >= 3 ? 20 : 1, false);
537
16.9k
    return upass;
538
16.9k
}
539
540
std::string
541
Encryption::compute_U_value_R2(std::string const& user_password) const
542
1.03k
{
543
    // Algorithm 3.4 from the PDF 1.7 Reference Manual
544
545
1.03k
    std::string k1 = compute_encryption_key(user_password);
546
1.03k
    auto udata = padding_string;
547
1.03k
    pad_short_parameter(k1, QIntC::to_size(getLengthBytes()));
548
1.03k
    iterate_rc4(udata, k1, 1, false);
549
1.03k
    return udata;
550
1.03k
}
551
552
std::string
553
Encryption::compute_U_value_R3(std::string const& user_password) const
554
25.2k
{
555
    // Algorithm 3.5 from the PDF 1.7 Reference Manual
556
557
25.2k
    std::string k1 = compute_encryption_key(user_password);
558
25.2k
    MD5 md5;
559
25.2k
    md5.encodeDataIncrementally(padding_string);
560
25.2k
    md5.encodeDataIncrementally(getId1());
561
25.2k
    auto result = md5.digest();
562
25.2k
    pad_short_parameter(k1, QIntC::to_size(getLengthBytes()));
563
25.2k
    iterate_rc4(result, k1, 20, false);
564
    // pad with arbitrary data -- make it consistent for the sake of testing
565
25.2k
    result += "\x0\x21\x44\x69\x90\xb9\xe4\x11\x40\x71\xa4\xd9\x10\x49\x84\xc1"s;
566
25.2k
    return result;
567
25.2k
}
568
569
std::string
570
Encryption::compute_U_value(std::string const& user_password) const
571
26.2k
{
572
26.2k
    if (getR() >= 3) {
573
25.2k
        return compute_U_value_R3(user_password);
574
25.2k
    }
575
576
1.03k
    return compute_U_value_R2(user_password);
577
26.2k
}
578
579
bool
580
Encryption::check_user_password_V4(std::string const& user_password) const
581
9.33k
{
582
    // Algorithm 3.6 from the PDF 1.7 Reference Manual
583
584
9.33k
    std::string u_value = compute_U_value(user_password);
585
9.33k
    size_t to_compare = (getR() >= 3 ? sizeof(MD5::Digest) : key_bytes);
586
9.33k
    return memcmp(getU().c_str(), u_value.c_str(), to_compare) == 0;
587
9.33k
}
588
589
bool
590
Encryption::check_user_password_V5(std::string const& user_password) const
591
8.42k
{
592
    // Algorithm 3.11 from the PDF 1.7 extension level 3
593
594
8.42k
    std::string user_data = getU().substr(0, 32);
595
8.42k
    std::string validation_salt = getU().substr(32, 8);
596
8.42k
    std::string password = user_password.substr(0, 127);
597
8.42k
    return hash_V5(user_password.substr(0, 127), validation_salt, "") == user_data;
598
8.42k
}
599
600
bool
601
Encryption::check_user_password(std::string const& user_password) const
602
15.0k
{
603
15.0k
    if (getV() < 5) {
604
9.33k
        return check_user_password_V4(user_password);
605
9.33k
    } else {
606
5.70k
        return check_user_password_V5(user_password);
607
5.70k
    }
608
15.0k
}
609
610
bool
611
Encryption::check_owner_password_V4(
612
    std::string& user_password, std::string const& owner_password) const
613
4.89k
{
614
    // Algorithm 3.7 from the PDF 1.7 Reference Manual
615
616
4.89k
    auto key = compute_O_rc4_key(user_password, owner_password);
617
4.89k
    pad_short_parameter(key, QIntC::to_size(getLengthBytes()));
618
4.89k
    auto new_user_password = O.substr(0, key_bytes);
619
4.89k
    iterate_rc4(new_user_password, key, (getR() >= 3) ? 20 : 1, true);
620
4.89k
    if (check_user_password(new_user_password)) {
621
461
        user_password = new_user_password;
622
461
        return true;
623
461
    }
624
4.43k
    return false;
625
4.89k
}
626
627
bool
628
Encryption::check_owner_password_V5(std::string const& owner_password) const
629
8.87k
{
630
    // Algorithm 3.12 from the PDF 1.7 extension level 3
631
632
8.87k
    std::string user_data = getU().substr(0, 48);
633
8.87k
    std::string owner_data = getO().substr(0, 32);
634
8.87k
    std::string validation_salt = getO().substr(32, 8);
635
8.87k
    return hash_V5(owner_password.substr(0, 127), validation_salt, user_data) == owner_data;
636
8.87k
}
637
638
bool
639
Encryption::check_owner_password(
640
    std::string& user_password, std::string const& owner_password) const
641
10.6k
{
642
10.6k
    if (getV() < 5) {
643
4.89k
        return check_owner_password_V4(user_password, owner_password);
644
5.70k
    } else {
645
5.70k
        return check_owner_password_V5(owner_password);
646
5.70k
    }
647
10.6k
}
648
649
std::string
650
Encryption::recover_encryption_key_with_password(std::string const& password) const
651
0
{
652
    // Disregard whether Perms is valid.
653
0
    bool disregard;
654
0
    return recover_encryption_key_with_password(password, disregard);
655
0
}
656
657
std::string
658
Encryption::compute_Perms_value_V5_clear() const
659
22.9k
{
660
    // From algorithm 3.10 from the PDF 1.7 extension level 3
661
    // cSpell:ignore Tadb
662
22.9k
    std::string k = "    \xff\xff\xff\xffTadb    ";
663
22.9k
    int perms = getP();
664
114k
    for (size_t i = 0; i < 4; ++i) {
665
91.7k
        k[i] = static_cast<char>(perms & 0xff);
666
91.7k
        perms >>= 8;
667
91.7k
    }
668
22.9k
    if (!getEncryptMetadata()) {
669
19
        k[8] = 'F';
670
19
    }
671
22.9k
    QUtil::initializeWithRandomBytes(reinterpret_cast<unsigned char*>(&k[12]), 4);
672
22.9k
    return k;
673
22.9k
}
674
675
std::string
676
Encryption::recover_encryption_key_with_password(
677
    std::string const& password, bool& perms_valid) const
678
3.17k
{
679
    // Algorithm 3.2a from the PDF 1.7 extension level 3
680
681
    // This code does not handle Unicode passwords correctly. Empirical evidence suggests that most
682
    // viewers don't.  We are supposed to process the input string with the SASLprep (RFC 4013)
683
    // profile of stringprep (RFC 3454) and then convert the result to UTF-8.
684
685
3.17k
    perms_valid = false;
686
3.17k
    std::string key_password = password.substr(0, 127);
687
3.17k
    std::string key_salt;
688
3.17k
    std::string user_data;
689
3.17k
    std::string encrypted_file_key;
690
3.17k
    if (check_owner_password_V5(key_password)) {
691
453
        key_salt = getO().substr(40, 8);
692
453
        user_data = getU().substr(0, 48);
693
453
        encrypted_file_key = getOE().substr(0, 32);
694
2.72k
    } else if (check_user_password_V5(key_password)) {
695
2.72k
        key_salt = getU().substr(40, 8);
696
2.72k
        encrypted_file_key = getUE().substr(0, 32);
697
2.72k
    }
698
3.17k
    std::string intermediate_key = hash_V5(key_password, key_salt, user_data);
699
3.17k
    std::string file_key = process_with_aes(intermediate_key, false, encrypted_file_key);
700
701
    // Decrypt Perms and check against expected value
702
3.17k
    auto perms_check = process_with_aes(file_key, false, getPerms()).substr(0, 12);
703
3.17k
    perms_valid = compute_Perms_value_V5_clear().substr(0, 12) == perms_check;
704
3.17k
    return file_key;
705
3.17k
}
706
707
QPDF::encryption_method_e
708
QPDF::EncryptionParameters::interpretCF(Name const& cf) const
709
19.3k
{
710
19.3k
    if (!cf) {
711
        // Default: /Identity
712
8.00k
        return e_none;
713
8.00k
    }
714
11.3k
    auto it = crypt_filters.find(cf);
715
11.3k
    if (it != crypt_filters.end()) {
716
2.83k
        return it->second;
717
2.83k
    }
718
8.49k
    if (cf == "/Identity") {
719
51
        return e_none;
720
51
    }
721
8.44k
    return e_unknown;
722
8.49k
}
723
724
void
725
QPDF::initializeEncryption()
726
0
{
727
0
    m->encp->initialize(*this);
728
0
}
729
730
void
731
QPDF::EncryptionParameters::initialize(QPDF& qpdf)
732
127k
{
733
127k
    if (encryption_initialized) {
734
180
        return;
735
180
    }
736
127k
    encryption_initialized = true;
737
738
127k
    auto& c = qpdf.m->c;
739
127k
    auto& qm = *qpdf.m;
740
127k
    auto& trailer = qm.trailer;
741
127k
    auto& file = qm.file;
742
743
127k
    auto warn_damaged_pdf = [&qpdf, c](std::string const& msg) {
744
2.96k
        qpdf.warn(c.damagedPDF("encryption dictionary", msg));
745
2.96k
    };
746
127k
    auto throw_damaged_pdf = [&qpdf](std::string const& msg) {
747
841
        throw qpdf.m->c.damagedPDF("encryption dictionary", msg);
748
841
    };
749
127k
    auto unsupported = [&file](std::string const& msg) -> QPDFExc {
750
1.31k
        return {
751
1.31k
            qpdf_e_unsupported,
752
1.31k
            file->getName(),
753
1.31k
            "encryption dictionary",
754
1.31k
            file->getLastOffset(),
755
1.31k
            msg};
756
1.31k
    };
757
758
    // After we initialize encryption parameters, we must use stored key information and never look
759
    // at /Encrypt again.  Otherwise, things could go wrong if someone mutates the encryption
760
    // dictionary.
761
762
127k
    if (!trailer.contains("/Encrypt")) {
763
114k
        return;
764
114k
    }
765
766
    // Go ahead and set m->encrypted here.  That way, isEncrypted will return true even if there
767
    // were errors reading the encryption dictionary.
768
13.0k
    encrypted = true;
769
770
13.0k
    std::string id1;
771
13.0k
    auto id_obj = trailer.getKey("/ID");
772
13.0k
    if (id_obj.size() != 2 || !id_obj.getArrayItem(0).isString()) {
773
        // Treating a missing ID as the empty string enables qpdf to decrypt some invalid encrypted
774
        // files with no /ID that poppler can read but Adobe Reader can't.
775
9.28k
        qpdf.warn(qpdf.m->c.damagedPDF("trailer", "invalid /ID in trailer dictionary"));
776
9.28k
    } else {
777
3.72k
        id1 = id_obj.getArrayItem(0).getStringValue();
778
3.72k
    }
779
780
13.0k
    auto encryption_dict = trailer.getKey("/Encrypt");
781
13.0k
    if (!encryption_dict.isDictionary()) {
782
107
        throw qpdf.m->c.damagedPDF("/Encrypt in trailer dictionary is not a dictionary");
783
107
    }
784
785
12.9k
    if (Name(encryption_dict["/Filter"]) != "/Standard") {
786
535
        throw unsupported("unsupported encryption filter");
787
535
    }
788
12.3k
    if (!encryption_dict.getKey("/SubFilter").null()) {
789
31
        qpdf.warn(unsupported("file uses encryption SubFilters, which qpdf does not support"));
790
31
    }
791
792
12.3k
    if (!(encryption_dict.getKey("/V").isInteger() && encryption_dict.getKey("/R").isInteger() &&
793
11.8k
          encryption_dict.getKey("/O").isString() && encryption_dict.getKey("/U").isString() &&
794
11.5k
          encryption_dict.getKey("/P").isInteger())) {
795
745
        throw_damaged_pdf("some encryption dictionary parameters are missing or the wrong type");
796
745
    }
797
798
12.3k
    int V = encryption_dict.getKey("/V").getIntValueAsInt();
799
12.3k
    int R = encryption_dict.getKey("/R").getIntValueAsInt();
800
12.3k
    std::string O = encryption_dict.getKey("/O").getStringValue();
801
12.3k
    std::string U = encryption_dict.getKey("/U").getStringValue();
802
12.3k
    int p = static_cast<int>(encryption_dict.getKey("/P").getIntValue());
803
804
    // If supporting new encryption R/V values, remember to update error message inside this if
805
    // statement.
806
12.3k
    if (!(2 <= R && R <= 6 && (V == 1 || V == 2 || V == 4 || V == 5))) {
807
747
        throw unsupported(
808
747
            "Unsupported /R or /V in encryption dictionary; R = " + std::to_string(R) +
809
747
            " (max 6), V = " + std::to_string(V) + " (max 5)");
810
747
    }
811
812
11.6k
    P_ = std::bitset<32>(static_cast<unsigned long long>(p));
813
11.6k
    encryption_V = V;
814
11.6k
    R_ = R;
815
816
    // OE, UE, and Perms are only present if V >= 5.
817
11.6k
    std::string OE;
818
11.6k
    std::string UE;
819
11.6k
    std::string Perms;
820
821
11.6k
    if (V < 5) {
822
        // These must be exactly the right number of bytes.
823
4.97k
        pad_short_parameter(O, key_bytes);
824
4.97k
        pad_short_parameter(U, key_bytes);
825
4.97k
        if (!(O.length() == key_bytes && U.length() == key_bytes)) {
826
54
            throw_damaged_pdf("incorrect length for /O and/or /U in encryption dictionary");
827
54
        }
828
6.65k
    } else {
829
6.65k
        if (!(encryption_dict.getKey("/OE").isString() &&
830
5.76k
              encryption_dict.getKey("/UE").isString() &&
831
5.74k
              encryption_dict.getKey("/Perms").isString())) {
832
42
            throw_damaged_pdf(
833
42
                "some V=5 encryption dictionary parameters are missing or the wrong type");
834
42
        }
835
6.65k
        OE = encryption_dict.getKey("/OE").getStringValue();
836
6.65k
        UE = encryption_dict.getKey("/UE").getStringValue();
837
6.65k
        Perms = encryption_dict.getKey("/Perms").getStringValue();
838
839
        // These may be longer than the minimum number of bytes.
840
6.65k
        pad_short_parameter(O, OU_key_bytes_V5);
841
6.65k
        pad_short_parameter(U, OU_key_bytes_V5);
842
6.65k
        pad_short_parameter(OE, OUE_key_bytes_V5);
843
6.65k
        pad_short_parameter(UE, OUE_key_bytes_V5);
844
6.65k
        pad_short_parameter(Perms, Perms_key_bytes_V5);
845
6.65k
    }
846
847
11.6k
    int Length = 128; // Just take a guess.
848
11.6k
    if (V <= 1) {
849
341
        Length = 40;
850
11.2k
    } else if (V == 4) {
851
3.54k
        Length = 128;
852
7.73k
    } else if (V == 5) {
853
5.73k
        Length = 256;
854
5.73k
    } else {
855
2.00k
        if (encryption_dict.getKey("/Length").isInteger()) {
856
371
            Length = encryption_dict.getKey("/Length").getIntValueAsInt();
857
371
            if (Length % 8 || Length < 40 || Length > 128) {
858
128
                Length = 128; // Just take a guess.
859
128
            }
860
371
        }
861
2.00k
    }
862
863
11.6k
    encrypt_metadata = true;
864
11.6k
    if (V >= 4 && encryption_dict.getKey("/EncryptMetadata").isBool()) {
865
78
        encrypt_metadata = encryption_dict.getKey("/EncryptMetadata").getBoolValue();
866
78
    }
867
868
11.6k
    if (V == 4 || V == 5) {
869
9.27k
        auto CF = encryption_dict.getKey("/CF");
870
47.9k
        for (auto const& [filter, cdict]: CF.as_dictionary()) {
871
47.9k
            if (cdict.isDictionary()) {
872
21.7k
                encryption_method_e method = e_none;
873
21.7k
                if (Name const& CFM = cdict["/CFM"]) {
874
8.73k
                    if (CFM == "/V2") {
875
1.15k
                        method = e_rc4;
876
7.57k
                    } else if (CFM == "/AESV2") {
877
1.16k
                        method = e_aes;
878
6.41k
                    } else if (CFM == "/AESV3") {
879
1.53k
                        method = e_aesv3;
880
4.87k
                    } else {
881
                        // Don't complain now -- maybe we won't need to reference this type.
882
4.87k
                        method = e_unknown;
883
4.87k
                    }
884
8.73k
                }
885
21.7k
                crypt_filters[filter] = method;
886
21.7k
            }
887
47.9k
        }
888
889
9.27k
        cf_stream = interpretCF(encryption_dict["/StmF"]);
890
9.27k
        cf_string = interpretCF(encryption_dict["/StrF"]);
891
9.27k
        if (Name const& EFF = encryption_dict["/EFF"]) {
892
            // qpdf does not use this for anything other than informational purposes. This is
893
            // intended to instruct conforming writers on which crypt filter should be used when new
894
            // file attachments are added to a PDF file, but qpdf never generates encrypted files
895
            // with non-default crypt filters. Prior to 10.2, I was under the mistaken impression
896
            // that this was supposed to be used for decrypting attachments, but the code was wrong
897
            // in a way that turns out not to have mattered because no writers were generating files
898
            // the way I was imagining. Still, providing this information could be useful when
899
            // looking at a file generated by something else, such as Acrobat when specifying that
900
            // only attachments should be encrypted.
901
746
            cf_file = interpretCF(EFF);
902
8.52k
        } else {
903
8.52k
            cf_file = cf_stream;
904
8.52k
        }
905
9.27k
    }
906
907
11.6k
    Encryption data(V, R, Length / 8, p, O, U, OE, UE, Perms, id1, encrypt_metadata);
908
11.6k
    if (qm.cf.password_is_hex_key()) {
909
        // ignore passwords in file
910
0
        encryption_key = QUtil::hex_decode(provided_password);
911
0
        return;
912
0
    }
913
914
11.6k
    owner_password_matched = data.check_owner_password(user_password, provided_password);
915
11.6k
    if (owner_password_matched && V < 5) {
916
        // password supplied was owner password; user_password has been initialized for V < 5
917
461
        if (qpdf.getTrimmedUserPassword() == provided_password) {
918
0
            user_password_matched = true;
919
0
            QTC::TC("qpdf", "QPDF_encryption user matches owner V < 5");
920
0
        }
921
11.1k
    } else {
922
11.1k
        user_password_matched = data.check_user_password(provided_password);
923
11.1k
        if (user_password_matched) {
924
5.52k
            user_password = provided_password;
925
5.52k
        }
926
11.1k
    }
927
11.6k
    if (user_password_matched && owner_password_matched) {
928
18
        QTC::TC("qpdf", "QPDF_encryption same password", (V < 5) ? 0 : 1);
929
18
    }
930
11.6k
    if (!(owner_password_matched || user_password_matched)) {
931
4.18k
        throw QPDFExc(qpdf_e_password, file->getName(), "", 0, "invalid password");
932
4.18k
    }
933
934
7.43k
    if (V < 5) {
935
        // For V < 5, the user password is encrypted with the owner password, and the user password
936
        // is always used for computing the encryption key.
937
3.24k
        encryption_key = data.compute_encryption_key(user_password);
938
4.19k
    } else {
939
        // For V >= 5, either password can be used independently to compute the encryption key, and
940
        // neither password can be used to recover the other.
941
4.19k
        bool perms_valid;
942
4.19k
        encryption_key = data.recover_encryption_key_with_password(provided_password, perms_valid);
943
4.19k
        if (!perms_valid) {
944
2.96k
            warn_damaged_pdf("/Perms field in encryption dictionary doesn't match expected value");
945
2.96k
        }
946
4.19k
    }
947
7.43k
}
948
949
std::string
950
QPDF::getKeyForObject(std::shared_ptr<EncryptionParameters> encp, QPDFObjGen og, bool use_aes)
951
369k
{
952
369k
    if (!encp->encrypted) {
953
0
        throw std::logic_error("request for encryption key in non-encrypted PDF");
954
0
    }
955
956
369k
    if (og != encp->cached_key_og) {
957
47.0k
        encp->cached_object_encryption_key = compute_data_key(
958
47.0k
            encp->encryption_key, og.getObj(), og.getGen(), use_aes, encp->encryption_V, encp->R());
959
47.0k
        encp->cached_key_og = og;
960
47.0k
    }
961
962
369k
    return encp->cached_object_encryption_key;
963
369k
}
964
965
void
966
QPDF::decryptString(std::string& str, QPDFObjGen og)
967
344k
{
968
344k
    if (!og.isIndirect()) {
969
0
        return;
970
0
    }
971
344k
    bool use_aes = false;
972
344k
    if (m->encp->encryption_V >= 4) {
973
263k
        switch (m->encp->cf_string) {
974
10.9k
        case e_none:
975
10.9k
            return;
976
977
236k
        case e_aes:
978
236k
            use_aes = true;
979
236k
            break;
980
981
9.63k
        case e_aesv3:
982
9.63k
            use_aes = true;
983
9.63k
            break;
984
985
4.27k
        case e_rc4:
986
4.27k
            break;
987
988
1.95k
        default:
989
1.95k
            warn(m->c.damagedPDF(
990
1.95k
                "unknown encryption filter for strings (check /StrF in "
991
1.95k
                "/Encrypt dictionary); strings may be decrypted improperly"));
992
            // To avoid repeated warnings, reset cf_string.  Assume we'd want to use AES if V == 4.
993
1.95k
            m->encp->cf_string = e_aes;
994
1.95k
            use_aes = true;
995
1.95k
            break;
996
263k
        }
997
263k
    }
998
999
333k
    std::string key = getKeyForObject(m->encp, og, use_aes);
1000
333k
    try {
1001
333k
        if (use_aes) {
1002
248k
            QTC::TC("qpdf", "QPDF_encryption aes decode string");
1003
248k
            Pl_Buffer bufpl("decrypted string");
1004
248k
            Pl_AES_PDF pl("aes decrypt string", &bufpl, false, key);
1005
248k
            pl.writeString(str);
1006
248k
            pl.finish();
1007
248k
            str = bufpl.getString();
1008
248k
        } else {
1009
85.3k
            QTC::TC("qpdf", "QPDF_encryption rc4 decode string");
1010
85.3k
            size_t vlen = str.length();
1011
            // Using std::shared_ptr guarantees that tmp will be freed even if rc4.process throws an
1012
            // exception.
1013
85.3k
            auto tmp = QUtil::make_unique_cstr(str);
1014
85.3k
            RC4 rc4(QUtil::unsigned_char_pointer(key), QIntC::to_int(key.length()));
1015
85.3k
            auto data = QUtil::unsigned_char_pointer(tmp.get());
1016
85.3k
            rc4.process(data, vlen, data);
1017
85.3k
            str = std::string(tmp.get(), vlen);
1018
85.3k
        }
1019
333k
    } catch (QPDFExc&) {
1020
0
        throw;
1021
30
    } catch (std::runtime_error& e) {
1022
30
        throw m->c.damagedPDF(
1023
30
            "error decrypting string for object " + og.unparse() + ": " + e.what());
1024
30
    }
1025
333k
}
1026
1027
// Prepend a decryption pipeline to 'pipeline'. The decryption pipeline (returned as
1028
// 'decrypt_pipeline' must be owned by the caller to ensure that it stays alive while the pipeline
1029
// is in use.
1030
void
1031
QPDF::decryptStream(
1032
    std::shared_ptr<EncryptionParameters> encp,
1033
    std::shared_ptr<InputSource> file,
1034
    QPDF& qpdf_for_warning,
1035
    Pipeline*& pipeline,
1036
    QPDFObjGen og,
1037
    QPDFObjectHandle& stream_dict,
1038
    bool is_root_metadata,
1039
    std::unique_ptr<Pipeline>& decrypt_pipeline)
1040
39.2k
{
1041
39.2k
    if (Name(stream_dict["/Type"]) == "/XRef") {
1042
294
        return;
1043
294
    }
1044
38.9k
    bool use_aes = false;
1045
38.9k
    if (encp->encryption_V >= 4) {
1046
28.7k
        encryption_method_e method = e_unknown;
1047
28.7k
        std::string method_source = "/StmF from /Encrypt dictionary";
1048
1049
28.7k
        if (stream_dict.getKey("/Filter").isOrHasName("/Crypt")) {
1050
1.02k
            if (Dictionary decode_parms = stream_dict["/DecodeParms"]) {
1051
407
                if (Name(decode_parms["/Type"]) == "/CryptFilterDecodeParms") {
1052
107
                    method = encp->interpretCF(decode_parms["/Name"]);
1053
107
                    method_source = "stream's Crypt decode parameters";
1054
107
                }
1055
621
            } else {
1056
621
                Array filter = stream_dict["/Filter"];
1057
621
                Array decode = stream_dict.getKey("/DecodeParms");
1058
621
                if (filter.size() == decode.size()) {
1059
337
                    size_t i = 0;
1060
710
                    for (Name item: filter) {
1061
710
                        if (item == "/Crypt") {
1062
209
                            if (Name name = decode[i]["/Name"]) {
1063
12
                                method = encp->interpretCF(name);
1064
12
                                method_source = "stream's Crypt decode parameters (array)";
1065
12
                            }
1066
209
                            break;
1067
209
                        }
1068
501
                        ++i;
1069
501
                    }
1070
337
                }
1071
621
            }
1072
1.02k
        }
1073
1074
28.7k
        if (method == e_unknown) {
1075
28.6k
            if (!encp->encrypt_metadata && is_root_metadata) {
1076
0
                method = e_none;
1077
28.6k
            } else {
1078
28.6k
                method = encp->cf_stream;
1079
28.6k
            }
1080
28.6k
        }
1081
28.7k
        use_aes = false;
1082
28.7k
        switch (method) {
1083
3.15k
        case e_none:
1084
3.15k
            return;
1085
0
            break;
1086
1087
16.8k
        case e_aes:
1088
16.8k
            use_aes = true;
1089
16.8k
            break;
1090
1091
4.70k
        case e_aesv3:
1092
4.70k
            use_aes = true;
1093
4.70k
            break;
1094
1095
2.52k
        case e_rc4:
1096
2.52k
            break;
1097
1098
1.52k
        default:
1099
            // filter local to this stream.
1100
1.52k
            qpdf_for_warning.warn(
1101
1.52k
                {qpdf_e_damaged_pdf,
1102
1.52k
                 file->getName(),
1103
1.52k
                 "",
1104
1.52k
                 file->getLastOffset(),
1105
1.52k
                 "unknown encryption filter for streams (check " + method_source +
1106
1.52k
                     "); streams may be decrypted improperly"});
1107
            // To avoid repeated warnings, reset cf_stream.  Assume we'd want to use AES if V == 4.
1108
1.52k
            encp->cf_stream = e_aes;
1109
1.52k
            use_aes = true;
1110
1.52k
            break;
1111
28.7k
        }
1112
28.7k
    }
1113
35.6k
    std::string key = getKeyForObject(encp, og, use_aes);
1114
35.6k
    if (use_aes) {
1115
22.8k
        decrypt_pipeline =
1116
22.8k
            std::make_unique<Pl_AES_PDF>("AES stream decryption", pipeline, false, key);
1117
22.8k
    } else {
1118
12.7k
        decrypt_pipeline = std::make_unique<Pl_RC4>("RC4 stream decryption", pipeline, key);
1119
12.7k
    }
1120
35.6k
    pipeline = decrypt_pipeline.get();
1121
35.6k
}
1122
1123
void
1124
QPDF::compute_encryption_O_U(
1125
    char const* user_password,
1126
    char const* owner_password,
1127
    int V,
1128
    int R,
1129
    int key_len,
1130
    int P,
1131
    bool encrypt_metadata,
1132
    std::string const& id1,
1133
    std::string& out_O,
1134
    std::string& out_U)
1135
0
{
1136
0
    Encryption data(V, R, key_len, P, "", "", "", "", "", id1, encrypt_metadata);
1137
0
    data.compute_encryption_O_U(user_password, owner_password);
1138
0
    out_O = data.getO();
1139
0
    out_U = data.getU();
1140
0
}
1141
1142
void
1143
Encryption::compute_encryption_O_U(char const* user_password, char const* owner_password)
1144
16.9k
{
1145
16.9k
    if (V >= 5) {
1146
0
        throw std::logic_error("compute_encryption_O_U called for file with V >= 5");
1147
0
    }
1148
16.9k
    O = compute_O_value(user_password, owner_password);
1149
16.9k
    U = compute_U_value(user_password);
1150
16.9k
}
1151
1152
void
1153
QPDF::compute_encryption_parameters_V5(
1154
    char const* user_password,
1155
    char const* owner_password,
1156
    int V,
1157
    int R,
1158
    int key_len,
1159
    int P,
1160
    bool encrypt_metadata,
1161
    std::string const& id1,
1162
    std::string& encryption_key,
1163
    std::string& out_O,
1164
    std::string& out_U,
1165
    std::string& out_OE,
1166
    std::string& out_UE,
1167
    std::string& out_Perms)
1168
0
{
1169
0
    Encryption data(V, R, key_len, P, "", "", "", "", "", id1, encrypt_metadata);
1170
0
    encryption_key = data.compute_encryption_parameters_V5(user_password, owner_password);
1171
1172
0
    out_O = data.getO();
1173
0
    out_U = data.getU();
1174
0
    out_OE = data.getOE();
1175
0
    out_UE = data.getUE();
1176
0
    out_Perms = data.getPerms();
1177
0
}
1178
1179
std::string
1180
Encryption::compute_encryption_parameters_V5(char const* user_password, char const* owner_password)
1181
19.7k
{
1182
19.7k
    auto out_encryption_key = util::random_string(key_bytes);
1183
    // Algorithm 8 from the PDF 2.0
1184
19.7k
    auto validation_salt = util::random_string(8);
1185
19.7k
    auto key_salt = util::random_string(8);
1186
19.7k
    U = hash_V5(user_password, validation_salt, "").append(validation_salt).append(key_salt);
1187
19.7k
    auto intermediate_key = hash_V5(user_password, key_salt, "");
1188
19.7k
    UE = process_with_aes(intermediate_key, true, out_encryption_key);
1189
    // Algorithm 9 from the PDF 2.0
1190
19.7k
    validation_salt = util::random_string(8);
1191
19.7k
    key_salt = util::random_string(8);
1192
19.7k
    O = hash_V5(owner_password, validation_salt, U) + validation_salt + key_salt;
1193
19.7k
    intermediate_key = hash_V5(owner_password, key_salt, U);
1194
19.7k
    OE = process_with_aes(intermediate_key, true, out_encryption_key);
1195
    // Algorithm 10 from the PDF 2.0
1196
19.7k
    Perms = process_with_aes(out_encryption_key, true, compute_Perms_value_V5_clear());
1197
19.7k
    return out_encryption_key;
1198
19.7k
}
1199
1200
std::string
1201
Encryption::compute_parameters(char const* user_password, char const* owner_password)
1202
36.6k
{
1203
36.6k
    if (V < 5) {
1204
16.9k
        compute_encryption_O_U(user_password, owner_password);
1205
16.9k
        return compute_encryption_key(user_password);
1206
19.7k
    } else {
1207
19.7k
        return compute_encryption_parameters_V5(user_password, owner_password);
1208
19.7k
    }
1209
36.6k
}
1210
1211
std::string const&
1212
QPDF::getPaddedUserPassword() const
1213
0
{
1214
0
    return m->encp->user_password;
1215
0
}
1216
1217
std::string
1218
QPDF::getTrimmedUserPassword() const
1219
461
{
1220
461
    std::string result = m->encp->user_password;
1221
461
    trim_user_password(result);
1222
461
    return result;
1223
461
}
1224
1225
std::string
1226
QPDF::getEncryptionKey() const
1227
0
{
1228
0
    return m->encp->encryption_key;
1229
0
}
1230
1231
bool
1232
QPDF::isEncrypted() const
1233
0
{
1234
0
    return m->encp->encrypted;
1235
0
}
1236
1237
bool
1238
QPDF::isEncrypted(int& R, int& P)
1239
0
{
1240
0
    if (!m->encp->encrypted) {
1241
0
        return false;
1242
0
    }
1243
0
    P = m->encp->P();
1244
0
    R = m->encp->R();
1245
0
    return true;
1246
0
}
1247
1248
bool
1249
QPDF::isEncrypted(
1250
    int& R,
1251
    int& P,
1252
    int& V,
1253
    encryption_method_e& stream_method,
1254
    encryption_method_e& string_method,
1255
    encryption_method_e& file_method)
1256
0
{
1257
0
    if (!m->encp->encrypted) {
1258
0
        return false;
1259
0
    }
1260
0
    P = m->encp->P();
1261
0
    R = m->encp->R();
1262
0
    V = m->encp->encryption_V;
1263
0
    stream_method = m->encp->cf_stream;
1264
0
    string_method = m->encp->cf_string;
1265
0
    file_method = m->encp->cf_file;
1266
0
    return true;
1267
0
}
1268
1269
bool
1270
QPDF::ownerPasswordMatched() const
1271
0
{
1272
0
    return m->encp->owner_password_matched;
1273
0
}
1274
1275
bool
1276
QPDF::userPasswordMatched() const
1277
0
{
1278
0
    return m->encp->user_password_matched;
1279
0
}
1280
1281
bool
1282
QPDF::allowAccessibility()
1283
0
{
1284
0
    return m->encp->R() < 3 ? m->encp->P(5) : m->encp->P(10);
1285
0
}
1286
1287
bool
1288
QPDF::allowExtractAll()
1289
0
{
1290
0
    return m->encp->P(5);
1291
0
}
1292
1293
bool
1294
QPDF::allowPrintLowRes()
1295
0
{
1296
0
    return m->encp->P(3);
1297
0
}
1298
1299
bool
1300
QPDF::allowPrintHighRes()
1301
0
{
1302
0
    return allowPrintLowRes() && (m->encp->R() < 3 ? true : m->encp->P(12));
1303
0
}
1304
1305
bool
1306
QPDF::allowModifyAssembly()
1307
0
{
1308
0
    return m->encp->R() < 3 ? m->encp->P(4) : m->encp->P(11);
1309
0
}
1310
1311
bool
1312
QPDF::allowModifyForm()
1313
0
{
1314
0
    return m->encp->R() < 3 ? m->encp->P(6) : m->encp->P(9);
1315
0
}
1316
1317
bool
1318
QPDF::allowModifyAnnotation()
1319
0
{
1320
0
    return m->encp->P(6);
1321
0
}
1322
1323
bool
1324
QPDF::allowModifyOther()
1325
0
{
1326
0
    return m->encp->P(4);
1327
0
}
1328
1329
bool
1330
QPDF::allowModifyAll()
1331
0
{
1332
0
    return allowModifyAnnotation() && allowModifyOther() &&
1333
0
        (m->encp->R() < 3 ? true : allowModifyForm() && allowModifyAssembly());
1334
0
}