Initial Commit
This commit is contained in:
512
iTechSharp/iTextSharp/text/pdf/PdfEncryption.cs
Normal file
512
iTechSharp/iTextSharp/text/pdf/PdfEncryption.cs
Normal file
@@ -0,0 +1,512 @@
|
||||
using System;
|
||||
using System.Collections;
|
||||
using System.Security.Cryptography;
|
||||
using System.Text;
|
||||
using System.IO;
|
||||
using iTextSharp.text.pdf.crypto;
|
||||
using Org.BouncyCastle.X509;
|
||||
|
||||
/*
|
||||
* $Id: PdfEncryption.cs,v 1.13 2007/06/14 20:01:48 psoares33 Exp $
|
||||
*
|
||||
* Copyright 2001-2006 Paulo Soares
|
||||
*
|
||||
* The contents of this file are subject to the Mozilla Public License Version 1.1
|
||||
* (the "License"); you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at http://www.mozilla.org/MPL/
|
||||
*
|
||||
* Software distributed under the License is distributed on an "AS IS" basis,
|
||||
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
||||
* for the specific language governing rights and limitations under the License.
|
||||
*
|
||||
* The Original Code is 'iText, a free JAVA-PDF library'.
|
||||
*
|
||||
* The Initial Developer of the Original Code is Bruno Lowagie. Portions created by
|
||||
* the Initial Developer are Copyright (C) 1999, 2000, 2001, 2002 by Bruno Lowagie.
|
||||
* All Rights Reserved.
|
||||
* Co-Developer of the code is Paulo Soares. Portions created by the Co-Developer
|
||||
* are Copyright (C) 2000, 2001, 2002 by Paulo Soares. All Rights Reserved.
|
||||
*
|
||||
* Contributor(s): all the names of the contributors are added in the source code
|
||||
* where applicable.
|
||||
*
|
||||
* Alternatively, the contents of this file may be used under the terms of the
|
||||
* LGPL license (the "GNU LIBRARY GENERAL PUBLIC LICENSE"), in which case the
|
||||
* provisions of LGPL are applicable instead of those above. If you wish to
|
||||
* allow use of your version of this file only under the terms of the LGPL
|
||||
* License and not to allow others to use your version of this file under
|
||||
* the MPL, indicate your decision by deleting the provisions above and
|
||||
* replace them with the notice and other provisions required by the LGPL.
|
||||
* If you do not delete the provisions above, a recipient may use your version
|
||||
* of this file under either the MPL or the GNU LIBRARY GENERAL PUBLIC LICENSE.
|
||||
*
|
||||
* This library is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the MPL as stated above or under the terms of the GNU
|
||||
* Library General Public License as published by the Free Software Foundation;
|
||||
* either version 2 of the License, or any later version.
|
||||
*
|
||||
* This library is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
|
||||
* FOR A PARTICULAR PURPOSE. See the GNU Library general Public License for more
|
||||
* details.
|
||||
*
|
||||
* If you didn't download this code from the following link, you should check if
|
||||
* you aren't using an obsolete version:
|
||||
* http://www.lowagie.com/iText/
|
||||
*/
|
||||
|
||||
namespace iTextSharp.text.pdf {
|
||||
|
||||
/**
|
||||
*
|
||||
* @author Paulo Soares (psoares@consiste.pt)
|
||||
*/
|
||||
public class PdfEncryption {
|
||||
|
||||
public const int STANDARD_ENCRYPTION_40 = 2;
|
||||
public const int STANDARD_ENCRYPTION_128 = 3;
|
||||
public const int AES_128 = 4;
|
||||
|
||||
private static byte[] pad = {
|
||||
(byte)0x28, (byte)0xBF, (byte)0x4E, (byte)0x5E, (byte)0x4E, (byte)0x75,
|
||||
(byte)0x8A, (byte)0x41, (byte)0x64, (byte)0x00, (byte)0x4E, (byte)0x56,
|
||||
(byte)0xFF, (byte)0xFA, (byte)0x01, (byte)0x08, (byte)0x2E, (byte)0x2E,
|
||||
(byte)0x00, (byte)0xB6, (byte)0xD0, (byte)0x68, (byte)0x3E, (byte)0x80,
|
||||
(byte)0x2F, (byte)0x0C, (byte)0xA9, (byte)0xFE, (byte)0x64, (byte)0x53,
|
||||
(byte)0x69, (byte)0x7A};
|
||||
|
||||
private static readonly byte[] salt = {(byte)0x73, (byte)0x41, (byte)0x6c, (byte)0x54};
|
||||
internal static readonly byte[] metadataPad = {(byte)255,(byte)255,(byte)255,(byte)255};
|
||||
/** The encryption key for a particular object/generation */
|
||||
internal byte[] key;
|
||||
/** The encryption key length for a particular object/generation */
|
||||
internal int keySize;
|
||||
/** The global encryption key */
|
||||
internal byte[] mkey;
|
||||
/** Work area to prepare the object/generation bytes */
|
||||
internal byte[] extra = new byte[5];
|
||||
/** The message digest algorithm MD5 */
|
||||
internal MD5 md5;
|
||||
/** The encryption key for the owner */
|
||||
internal byte[] ownerKey = new byte[32];
|
||||
/** The encryption key for the user */
|
||||
internal byte[] userKey = new byte[32];
|
||||
/** The public key security handler for certificate encryption */
|
||||
protected PdfPublicKeySecurityHandler publicKeyHandler = null;
|
||||
internal int permissions;
|
||||
internal byte[] documentID;
|
||||
internal static long seq = DateTime.Now.Ticks + Environment.TickCount;
|
||||
private int revision;
|
||||
private ARCFOUREncryption rc4 = new ARCFOUREncryption();
|
||||
/** The generic key length. It may be 40 or 128. */
|
||||
private int keyLength;
|
||||
private bool encryptMetadata;
|
||||
private int cryptoMode;
|
||||
|
||||
public PdfEncryption() {
|
||||
md5 = new MD5CryptoServiceProvider();
|
||||
publicKeyHandler = new PdfPublicKeySecurityHandler();
|
||||
}
|
||||
|
||||
public PdfEncryption(PdfEncryption enc) : this() {
|
||||
mkey = (byte[])enc.mkey.Clone();
|
||||
ownerKey = (byte[])enc.ownerKey.Clone();
|
||||
userKey = (byte[])enc.userKey.Clone();
|
||||
permissions = enc.permissions;
|
||||
if (enc.documentID != null)
|
||||
documentID = (byte[])enc.documentID.Clone();
|
||||
revision = enc.revision;
|
||||
keyLength = enc.keyLength;
|
||||
encryptMetadata = enc.encryptMetadata;
|
||||
publicKeyHandler = enc.publicKeyHandler;
|
||||
}
|
||||
|
||||
public void SetCryptoMode(int mode, int kl) {
|
||||
cryptoMode = mode;
|
||||
encryptMetadata = (mode & PdfWriter.DO_NOT_ENCRYPT_METADATA) == 0;
|
||||
mode &= PdfWriter.ENCRYPTION_MASK;
|
||||
switch (mode) {
|
||||
case PdfWriter.STANDARD_ENCRYPTION_40:
|
||||
encryptMetadata = true;
|
||||
keyLength = 40;
|
||||
revision = STANDARD_ENCRYPTION_40;
|
||||
break;
|
||||
case PdfWriter.STANDARD_ENCRYPTION_128:
|
||||
if (kl > 0)
|
||||
keyLength = kl;
|
||||
else
|
||||
keyLength = 128;
|
||||
revision = STANDARD_ENCRYPTION_128;
|
||||
break;
|
||||
case PdfWriter.ENCRYPTION_AES_128:
|
||||
keyLength = 128;
|
||||
revision = AES_128;
|
||||
break;
|
||||
default:
|
||||
throw new ArgumentException("No valid encryption mode");
|
||||
}
|
||||
}
|
||||
|
||||
public int GetCryptoMode() {
|
||||
return cryptoMode;
|
||||
}
|
||||
|
||||
public bool IsMetadataEncrypted() {
|
||||
return encryptMetadata;
|
||||
}
|
||||
|
||||
private byte[] PadPassword(byte[] userPassword) {
|
||||
byte[] userPad = new byte[32];
|
||||
if (userPassword == null) {
|
||||
Array.Copy(pad, 0, userPad, 0, 32);
|
||||
}
|
||||
else {
|
||||
Array.Copy(userPassword, 0, userPad, 0, Math.Min(userPassword.Length, 32));
|
||||
if (userPassword.Length < 32)
|
||||
Array.Copy(pad, 0, userPad, userPassword.Length, 32 - userPassword.Length);
|
||||
}
|
||||
|
||||
return userPad;
|
||||
}
|
||||
|
||||
/**
|
||||
*/
|
||||
private byte[] ComputeOwnerKey(byte[] userPad, byte[] ownerPad) {
|
||||
byte[] ownerKey = new byte[32];
|
||||
|
||||
byte[] digest = md5.ComputeHash(ownerPad);
|
||||
if (revision == STANDARD_ENCRYPTION_128 || revision == AES_128) {
|
||||
byte[] mkey = new byte[keyLength / 8];
|
||||
// only use for the input as many bit as the key consists of
|
||||
for (int k = 0; k < 50; ++k)
|
||||
Array.Copy(md5.ComputeHash(digest), 0, digest, 0, mkey.Length);
|
||||
Array.Copy(userPad, 0, ownerKey, 0, 32);
|
||||
for (int i = 0; i < 20; ++i) {
|
||||
for (int j = 0; j < mkey.Length ; ++j)
|
||||
mkey[j] = (byte)(digest[j] ^ i);
|
||||
rc4.PrepareARCFOURKey(mkey);
|
||||
rc4.EncryptARCFOUR(ownerKey);
|
||||
}
|
||||
}
|
||||
else {
|
||||
rc4.PrepareARCFOURKey(digest, 0, 5);
|
||||
rc4.EncryptARCFOUR(userPad, ownerKey);
|
||||
}
|
||||
|
||||
return ownerKey;
|
||||
}
|
||||
|
||||
/**
|
||||
*
|
||||
* ownerKey, documentID must be setuped
|
||||
*/
|
||||
private void SetupGlobalEncryptionKey(byte[] documentID, byte[] userPad, byte[] ownerKey, int permissions) {
|
||||
this.documentID = documentID;
|
||||
this.ownerKey = ownerKey;
|
||||
this.permissions = permissions;
|
||||
// use variable keylength
|
||||
mkey = new byte[keyLength / 8];
|
||||
|
||||
//fixed by ujihara in order to follow PDF refrence
|
||||
md5.Initialize();
|
||||
md5.TransformBlock(userPad, 0, userPad.Length, userPad, 0);
|
||||
md5.TransformBlock(ownerKey, 0, ownerKey.Length, ownerKey, 0);
|
||||
|
||||
byte[] ext = new byte[4];
|
||||
ext[0] = (byte)permissions;
|
||||
ext[1] = (byte)(permissions >> 8);
|
||||
ext[2] = (byte)(permissions >> 16);
|
||||
ext[3] = (byte)(permissions >> 24);
|
||||
md5.TransformBlock(ext, 0, 4, ext, 0);
|
||||
if (documentID != null)
|
||||
md5.TransformBlock(documentID, 0, documentID.Length, documentID, 0);
|
||||
if (!encryptMetadata)
|
||||
md5.TransformBlock(metadataPad, 0, metadataPad.Length, metadataPad, 0);
|
||||
md5.TransformFinalBlock(ext, 0, 0);
|
||||
|
||||
byte[] digest = new byte[mkey.Length];
|
||||
Array.Copy(md5.Hash, 0, digest, 0, mkey.Length);
|
||||
|
||||
|
||||
md5.Initialize();
|
||||
// only use the really needed bits as input for the hash
|
||||
if (revision == STANDARD_ENCRYPTION_128 || revision == AES_128) {
|
||||
for (int k = 0; k < 50; ++k) {
|
||||
Array.Copy(md5.ComputeHash(digest), 0, digest, 0, mkey.Length);
|
||||
md5.Initialize();
|
||||
}
|
||||
}
|
||||
Array.Copy(digest, 0, mkey, 0, mkey.Length);
|
||||
}
|
||||
|
||||
/**
|
||||
*
|
||||
* mkey must be setuped
|
||||
*/
|
||||
// use the revision to choose the setup method
|
||||
private void SetupUserKey() {
|
||||
if (revision == STANDARD_ENCRYPTION_128 || revision == AES_128) {
|
||||
md5.TransformBlock(pad, 0, pad.Length, pad, 0);
|
||||
md5.TransformFinalBlock(documentID, 0, documentID.Length);
|
||||
byte[] digest = md5.Hash;
|
||||
md5.Initialize();
|
||||
Array.Copy(digest, 0, userKey, 0, 16);
|
||||
for (int k = 16; k < 32; ++k)
|
||||
userKey[k] = 0;
|
||||
for (int i = 0; i < 20; ++i) {
|
||||
for (int j = 0; j < mkey.Length; ++j)
|
||||
digest[j] = (byte)(mkey[j] ^ i);
|
||||
rc4.PrepareARCFOURKey(digest, 0, mkey.Length);
|
||||
rc4.EncryptARCFOUR(userKey, 0, 16);
|
||||
}
|
||||
}
|
||||
else {
|
||||
rc4.PrepareARCFOURKey(mkey);
|
||||
rc4.EncryptARCFOUR(pad, userKey);
|
||||
}
|
||||
}
|
||||
|
||||
// gets keylength and revision and uses revison to choose the initial values for permissions
|
||||
public void SetupAllKeys(byte[] userPassword, byte[] ownerPassword, int permissions) {
|
||||
if (ownerPassword == null || ownerPassword.Length == 0)
|
||||
ownerPassword = md5.ComputeHash(CreateDocumentId());
|
||||
md5.Initialize();
|
||||
permissions |= (int)((revision == STANDARD_ENCRYPTION_128 || revision == AES_128) ? (uint)0xfffff0c0 : (uint)0xffffffc0);
|
||||
permissions &= unchecked((int)0xfffffffc);
|
||||
//PDF refrence 3.5.2 Standard Security Handler, Algorithum 3.3-1
|
||||
//If there is no owner password, use the user password instead.
|
||||
byte[] userPad = PadPassword(userPassword);
|
||||
byte[] ownerPad = PadPassword(ownerPassword);
|
||||
|
||||
this.ownerKey = ComputeOwnerKey(userPad, ownerPad);
|
||||
documentID = CreateDocumentId();
|
||||
SetupByUserPad(this.documentID, userPad, this.ownerKey, permissions);
|
||||
}
|
||||
|
||||
public static byte[] CreateDocumentId() {
|
||||
MD5 md5 = new MD5CryptoServiceProvider();
|
||||
long time = DateTime.Now.Ticks + Environment.TickCount;
|
||||
long mem = GC.GetTotalMemory(false);
|
||||
String s = time + "+" + mem + "+" + (seq++);
|
||||
return md5.ComputeHash(Encoding.ASCII.GetBytes(s));
|
||||
}
|
||||
|
||||
public void SetupByUserPassword(byte[] documentID, byte[] userPassword, byte[] ownerKey, int permissions) {
|
||||
SetupByUserPad(documentID, PadPassword(userPassword), ownerKey, permissions);
|
||||
}
|
||||
|
||||
/**
|
||||
*/
|
||||
private void SetupByUserPad(byte[] documentID, byte[] userPad, byte[] ownerKey, int permissions) {
|
||||
SetupGlobalEncryptionKey(documentID, userPad, ownerKey, permissions);
|
||||
SetupUserKey();
|
||||
}
|
||||
|
||||
/**
|
||||
*/
|
||||
public void SetupByOwnerPassword(byte[] documentID, byte[] ownerPassword, byte[] userKey, byte[] ownerKey, int permissions) {
|
||||
SetupByOwnerPad(documentID, PadPassword(ownerPassword), userKey, ownerKey, permissions);
|
||||
}
|
||||
|
||||
private void SetupByOwnerPad(byte[] documentID, byte[] ownerPad, byte[] userKey, byte[] ownerKey, int permissions) {
|
||||
byte[] userPad = ComputeOwnerKey(ownerKey, ownerPad); //userPad will be set in this.ownerKey
|
||||
SetupGlobalEncryptionKey(documentID, userPad, ownerKey, permissions); //step 3
|
||||
SetupUserKey();
|
||||
}
|
||||
|
||||
public void SetupByEncryptionKey(byte[] key, int keylength) {
|
||||
mkey = new byte[keylength/8];
|
||||
System.Array.Copy(key, 0, mkey, 0, mkey.Length);
|
||||
}
|
||||
|
||||
public void SetHashKey(int number, int generation) {
|
||||
md5.Initialize(); //added by ujihara
|
||||
extra[0] = (byte)number;
|
||||
extra[1] = (byte)(number >> 8);
|
||||
extra[2] = (byte)(number >> 16);
|
||||
extra[3] = (byte)generation;
|
||||
extra[4] = (byte)(generation >> 8);
|
||||
md5.TransformBlock(mkey, 0, mkey.Length, mkey, 0);
|
||||
md5.TransformBlock(extra, 0, extra.Length, extra, 0);
|
||||
if (revision == AES_128)
|
||||
md5.TransformBlock(salt, 0, salt.Length, salt, 0);
|
||||
md5.TransformFinalBlock(extra, 0, 0);
|
||||
key = md5.Hash;
|
||||
md5.Initialize();
|
||||
keySize = mkey.Length + 5;
|
||||
if (keySize > 16)
|
||||
keySize = 16;
|
||||
}
|
||||
|
||||
public static PdfObject CreateInfoId(byte[] id) {
|
||||
ByteBuffer buf = new ByteBuffer(90);
|
||||
buf.Append('[').Append('<');
|
||||
for (int k = 0; k < 16; ++k)
|
||||
buf.AppendHex(id[k]);
|
||||
buf.Append('>').Append('<');
|
||||
id = CreateDocumentId();
|
||||
for (int k = 0; k < 16; ++k)
|
||||
buf.AppendHex(id[k]);
|
||||
buf.Append('>').Append(']');
|
||||
return new PdfLiteral(buf.ToByteArray());
|
||||
}
|
||||
|
||||
public PdfDictionary GetEncryptionDictionary() {
|
||||
PdfDictionary dic = new PdfDictionary();
|
||||
|
||||
if (publicKeyHandler.GetRecipientsSize() > 0) {
|
||||
PdfArray recipients = null;
|
||||
|
||||
dic.Put(PdfName.FILTER, PdfName.PUBSEC);
|
||||
dic.Put(PdfName.R, new PdfNumber(revision));
|
||||
|
||||
recipients = publicKeyHandler.GetEncodedRecipients();
|
||||
|
||||
if (revision == STANDARD_ENCRYPTION_40) {
|
||||
dic.Put(PdfName.V, new PdfNumber(1));
|
||||
dic.Put(PdfName.SUBFILTER, PdfName.ADBE_PKCS7_S4);
|
||||
dic.Put(PdfName.RECIPIENTS, recipients);
|
||||
}
|
||||
else if (revision == STANDARD_ENCRYPTION_128 && encryptMetadata) {
|
||||
dic.Put(PdfName.V, new PdfNumber(2));
|
||||
dic.Put(PdfName.LENGTH, new PdfNumber(128));
|
||||
dic.Put(PdfName.SUBFILTER, PdfName.ADBE_PKCS7_S4);
|
||||
dic.Put(PdfName.RECIPIENTS, recipients);
|
||||
}
|
||||
else {
|
||||
dic.Put(PdfName.R, new PdfNumber(AES_128));
|
||||
dic.Put(PdfName.V, new PdfNumber(4));
|
||||
dic.Put(PdfName.SUBFILTER, PdfName.ADBE_PKCS7_S5);
|
||||
|
||||
PdfDictionary stdcf = new PdfDictionary();
|
||||
stdcf.Put(PdfName.RECIPIENTS, recipients);
|
||||
if (!encryptMetadata)
|
||||
stdcf.Put(PdfName.ENCRYPTMETADATA, PdfBoolean.PDFFALSE);
|
||||
|
||||
if (revision == AES_128)
|
||||
stdcf.Put(PdfName.CFM, PdfName.AESV2);
|
||||
else
|
||||
stdcf.Put(PdfName.CFM, PdfName.V2);
|
||||
PdfDictionary cf = new PdfDictionary();
|
||||
cf.Put(PdfName.DEFAULTCRYPTFILER, stdcf);
|
||||
dic.Put(PdfName.CF, cf);
|
||||
dic.Put(PdfName.STRF, PdfName.DEFAULTCRYPTFILER);
|
||||
dic.Put(PdfName.STMF, PdfName.DEFAULTCRYPTFILER);
|
||||
}
|
||||
|
||||
SHA1 sh = new SHA1CryptoServiceProvider();
|
||||
byte[] encodedRecipient = null;
|
||||
byte[] seed = publicKeyHandler.GetSeed();
|
||||
sh.TransformBlock(seed, 0, seed.Length, seed, 0);
|
||||
for (int i=0; i<publicKeyHandler.GetRecipientsSize(); i++)
|
||||
{
|
||||
encodedRecipient = publicKeyHandler.GetEncodedRecipient(i);
|
||||
sh.TransformBlock(encodedRecipient, 0, encodedRecipient.Length, encodedRecipient, 0);
|
||||
}
|
||||
if (!encryptMetadata)
|
||||
sh.TransformBlock(metadataPad, 0, metadataPad.Length, metadataPad, 0);
|
||||
sh.TransformFinalBlock(seed, 0, 0);
|
||||
byte[] mdResult = sh.Hash;
|
||||
|
||||
SetupByEncryptionKey(mdResult, keyLength);
|
||||
} else {
|
||||
dic.Put(PdfName.FILTER, PdfName.STANDARD);
|
||||
dic.Put(PdfName.O, new PdfLiteral(PdfContentByte.EscapeString(ownerKey)));
|
||||
dic.Put(PdfName.U, new PdfLiteral(PdfContentByte.EscapeString(userKey)));
|
||||
dic.Put(PdfName.P, new PdfNumber(permissions));
|
||||
dic.Put(PdfName.R, new PdfNumber(revision));
|
||||
if (revision == STANDARD_ENCRYPTION_40) {
|
||||
dic.Put(PdfName.V, new PdfNumber(1));
|
||||
}
|
||||
else if (revision == STANDARD_ENCRYPTION_128 && encryptMetadata) {
|
||||
dic.Put(PdfName.V, new PdfNumber(2));
|
||||
dic.Put(PdfName.LENGTH, new PdfNumber(128));
|
||||
|
||||
}
|
||||
else {
|
||||
if (!encryptMetadata)
|
||||
dic.Put(PdfName.ENCRYPTMETADATA, PdfBoolean.PDFFALSE);
|
||||
dic.Put(PdfName.R, new PdfNumber(AES_128));
|
||||
dic.Put(PdfName.V, new PdfNumber(4));
|
||||
dic.Put(PdfName.LENGTH, new PdfNumber(128));
|
||||
PdfDictionary stdcf = new PdfDictionary();
|
||||
stdcf.Put(PdfName.LENGTH, new PdfNumber(16));
|
||||
stdcf.Put(PdfName.AUTHEVENT, PdfName.DOCOPEN);
|
||||
if (revision == AES_128)
|
||||
stdcf.Put(PdfName.CFM, PdfName.AESV2);
|
||||
else
|
||||
stdcf.Put(PdfName.CFM, PdfName.V2);
|
||||
PdfDictionary cf = new PdfDictionary();
|
||||
cf.Put(PdfName.STDCF, stdcf);
|
||||
dic.Put(PdfName.CF, cf);
|
||||
dic.Put(PdfName.STRF, PdfName.STDCF);
|
||||
dic.Put(PdfName.STMF, PdfName.STDCF);
|
||||
}
|
||||
}
|
||||
return dic;
|
||||
}
|
||||
|
||||
public PdfObject FileID {
|
||||
get {
|
||||
return CreateInfoId(documentID);
|
||||
}
|
||||
}
|
||||
public OutputStreamEncryption GetEncryptionStream(Stream os) {
|
||||
return new OutputStreamEncryption(os, key, 0, keySize, revision);
|
||||
}
|
||||
|
||||
public int CalculateStreamSize(int n) {
|
||||
if (revision == AES_128)
|
||||
return (n & 0x7ffffff0) + 32;
|
||||
else
|
||||
return n;
|
||||
}
|
||||
|
||||
public byte[] EncryptByteArray(byte[] b) {
|
||||
MemoryStream ba = new MemoryStream();
|
||||
OutputStreamEncryption os2 = GetEncryptionStream(ba);
|
||||
os2.Write(b, 0, b.Length);
|
||||
os2.Finish();
|
||||
return ba.ToArray();
|
||||
}
|
||||
|
||||
public StandardDecryption GetDecryptor() {
|
||||
return new StandardDecryption(key, 0, keySize, revision);
|
||||
}
|
||||
|
||||
public byte[] DecryptByteArray(byte[] b) {
|
||||
MemoryStream ba = new MemoryStream();
|
||||
StandardDecryption dec = GetDecryptor();
|
||||
byte[] b2 = dec.Update(b, 0, b.Length);
|
||||
if (b2 != null)
|
||||
ba.Write(b2, 0, b2.Length);
|
||||
b2 = dec.Finish();
|
||||
if (b2 != null)
|
||||
ba.Write(b2, 0, b2.Length);
|
||||
return ba.ToArray();
|
||||
}
|
||||
|
||||
public void AddRecipient(X509Certificate cert, int permission) {
|
||||
documentID = CreateDocumentId();
|
||||
publicKeyHandler.AddRecipient(new PdfPublicKeyRecipient(cert, permission));
|
||||
}
|
||||
|
||||
public byte[] ComputeUserPassword(byte[] ownerPassword) {
|
||||
byte[] userPad = ComputeOwnerKey(ownerKey, PadPassword(ownerPassword));
|
||||
for (int i = 0; i < userPad.Length; i++) {
|
||||
bool match = true;
|
||||
for (int j = 0; j < userPad.Length - i; j++) {
|
||||
if (userPad[i + j] != pad[j]) {
|
||||
match = false;
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (!match) continue;
|
||||
byte[] userPassword = new byte[i];
|
||||
System.Array.Copy(userPad, 0, userPassword, 0, i);
|
||||
return userPassword;
|
||||
}
|
||||
return userPad;
|
||||
}
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user