diff mupdf-source/source/tools/pdfsign.c @ 2:b50eed0cc0ef upstream

ADD: MuPDF v1.26.7: the MuPDF source as downloaded by a default build of PyMuPDF 1.26.4. The directory name has changed: no version number in the expanded directory now.
author Franz Glasner <fzglas.hg@dom66.de>
date Mon, 15 Sep 2025 11:43:07 +0200
parents
children
line wrap: on
line diff
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/mupdf-source/source/tools/pdfsign.c	Mon Sep 15 11:43:07 2025 +0200
@@ -0,0 +1,383 @@
+// Copyright (C) 2004-2021 Artifex Software, Inc.
+//
+// This file is part of MuPDF.
+//
+// MuPDF is free software: you can redistribute it and/or modify it under the
+// terms of the GNU Affero General Public License as published by the Free
+// Software Foundation, either version 3 of the License, or (at your option)
+// any later version.
+//
+// MuPDF is distributed in the hope that it will be useful, but WITHOUT ANY
+// WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
+// FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more
+// details.
+//
+// You should have received a copy of the GNU Affero General Public License
+// along with MuPDF. If not, see <https://www.gnu.org/licenses/agpl-3.0.en.html>
+//
+// Alternative licensing terms are available from the licensor.
+// For commercial licensing, see <https://www.artifex.com/> or contact
+// Artifex Software, Inc., 39 Mesa Street, Suite 108A, San Francisco,
+// CA 94129, USA, for further information.
+
+/*
+ * PDF signature tool: verify and sign digital signatures in PDF files.
+ */
+
+#include "mupdf/fitz.h"
+#include "mupdf/pdf.h"
+#include "mupdf/helpers/pkcs7-openssl.h"
+
+#include <string.h>
+#include <stdlib.h>
+#include <stdio.h>
+
+static char *infile = NULL;
+static char *outfile = NULL;
+static char *certificatefile = NULL;
+static char *certificatepassword = "";
+static int verify = 0;
+static int clear = 0;
+static int sign = 0;
+static int list = 1;
+
+static int usage(void)
+{
+	fprintf(stderr,
+		"usage: mutool sign [options] input.pdf [signature object numbers]\n"
+		"\t-p -\tpassword\n"
+		"\t-v \tverify signature\n"
+		"\t-c \tclear signatures\n"
+		"\t-s -\tsign signatures using certificate file\n"
+		"\t-P -\tcertificate password\n"
+		"\t-o -\toutput file name\n"
+		   );
+	return 1;
+}
+
+static void verify_signature(fz_context *ctx, pdf_document *doc, pdf_obj *signature)
+{
+	char *name;
+	pdf_signature_error err;
+	pdf_pkcs7_verifier *verifier;
+	int edits;
+	pdf_pkcs7_distinguished_name *dn = NULL;
+
+	printf("Verifying signature %d:\n", pdf_to_num(ctx, signature));
+
+	if (!pdf_signature_is_signed(ctx, doc, signature))
+	{
+		printf("\tSignature is not signed.\n");
+		return;
+	}
+
+	verifier = pkcs7_openssl_new_verifier(ctx);
+	fz_var(dn);
+	fz_try(ctx)
+	{
+		dn = pdf_signature_get_signatory(ctx, verifier, doc, signature);
+		if (dn)
+		{
+			name = pdf_signature_format_distinguished_name(ctx, dn);
+			printf("\tDistinguished name: %s\n", name);
+			fz_free(ctx, name);
+		}
+		else
+		{
+			printf("\tSignature information missing.\n");
+		}
+
+		err = pdf_check_certificate(ctx, verifier, doc, signature);
+		if (err)
+			printf("\tCertificate error: %s\n", pdf_signature_error_description(err));
+		else
+			printf("\tCertificate is trusted.\n");
+
+		err = pdf_check_digest(ctx, verifier, doc, signature);
+		edits = pdf_signature_incremental_change_since_signing(ctx, doc, signature);
+		if (err)
+			printf("\tDigest error: %s\n", pdf_signature_error_description(err));
+		else if (edits)
+			printf("\tThe signature is valid but there have been edits since signing.\n");
+		else
+			printf("\tThe document is unchanged since signing.\n");
+	}
+	fz_always(ctx)
+	{
+		pdf_signature_drop_distinguished_name(ctx, dn);
+		pdf_drop_verifier(ctx, verifier);
+	}
+	fz_catch(ctx)
+	{
+		fz_rethrow(ctx);
+	}
+}
+
+static void clear_signature(fz_context *ctx, pdf_document *doc, pdf_obj *signature)
+{
+	pdf_page *page = NULL;
+	pdf_annot *widget;
+	pdf_obj *parent;
+	int pageno, pagenoend;
+
+	fz_var(page);
+
+	printf("Clearing signature %d.\n", pdf_to_num(ctx, signature));
+
+	fz_try(ctx)
+	{
+		parent = pdf_dict_get(ctx, signature, PDF_NAME(P));
+		if (pdf_is_dict(ctx, parent))
+		{
+			pageno = pdf_lookup_page_number(ctx, doc, parent);
+			pagenoend = pageno+1;
+		}
+		else
+		{
+			pageno = 0;
+			pagenoend = pdf_count_pages(ctx, doc);
+		}
+		for (; pageno < pagenoend; pageno++)
+		{
+			page = pdf_load_page(ctx, doc, pageno);
+			for (widget = pdf_first_widget(ctx, page); widget; widget = pdf_next_widget(ctx, widget))
+				if (pdf_widget_type(ctx, widget) == PDF_WIDGET_TYPE_SIGNATURE && !pdf_objcmp_resolve(ctx, pdf_annot_obj(ctx, widget), signature))
+					pdf_clear_signature(ctx, widget);
+			fz_drop_page(ctx, (fz_page *) page);
+			page = NULL;
+		}
+	}
+	fz_always(ctx)
+		fz_drop_page(ctx, (fz_page*)page);
+	fz_catch(ctx)
+		fz_rethrow(ctx);
+}
+
+static void sign_signature(fz_context *ctx, pdf_document *doc, pdf_obj *signature)
+{
+	pdf_pkcs7_signer *signer = NULL;
+	pdf_page *page = NULL;
+	pdf_annot *widget;
+	pdf_obj *parent;
+	int pageno, pagenoend;
+
+	fz_var(page);
+	fz_var(signer);
+
+	printf("Signing signature %d.\n", pdf_to_num(ctx, signature));
+
+	fz_try(ctx)
+	{
+		signer = pkcs7_openssl_read_pfx(ctx, certificatefile, certificatepassword);
+
+		parent = pdf_dict_get(ctx, signature, PDF_NAME(P));
+		if (pdf_is_dict(ctx, parent))
+		{
+			pageno = pdf_lookup_page_number(ctx, doc, parent);
+			pagenoend = pageno+1;
+		}
+		else
+		{
+			pageno = 0;
+			pagenoend = pdf_count_pages(ctx, doc);
+		}
+		for (; pageno < pagenoend; pageno++)
+		{
+			page = pdf_load_page(ctx, doc, pageno);
+			for (widget = pdf_first_widget(ctx, page); widget; widget = pdf_next_widget(ctx, widget))
+				if (pdf_widget_type(ctx, widget) == PDF_WIDGET_TYPE_SIGNATURE && !pdf_objcmp_resolve(ctx, pdf_annot_obj(ctx, widget), signature))
+					pdf_sign_signature(ctx, widget, signer,
+						PDF_SIGNATURE_DEFAULT_APPEARANCE,
+						NULL,
+						NULL,
+						NULL);
+			fz_drop_page(ctx, (fz_page *) page);
+			page = NULL;
+		}
+	}
+	fz_always(ctx)
+	{
+		fz_drop_page(ctx, (fz_page*)page);
+		pdf_drop_signer(ctx, signer);
+	}
+	fz_catch(ctx)
+		fz_rethrow(ctx);
+
+}
+
+static void list_signature(fz_context *ctx, pdf_document *doc, pdf_obj *signature)
+{
+	pdf_pkcs7_distinguished_name *dn;
+	pdf_pkcs7_verifier *verifier;
+
+	if (!pdf_signature_is_signed(ctx, doc, signature))
+	{
+		printf("%5d: Signature is not signed.\n", pdf_to_num(ctx, signature));
+		return;
+	}
+
+	verifier = pkcs7_openssl_new_verifier(ctx);
+
+	dn = pdf_signature_get_signatory(ctx, verifier, doc, signature);
+	if (dn)
+	{
+		char *s = pdf_signature_format_distinguished_name(ctx, dn);
+		printf("%5d: Distinguished name: %s\n", pdf_to_num(ctx, signature), s);
+		fz_free(ctx, s);
+		pdf_signature_drop_distinguished_name(ctx, dn);
+	}
+	else
+	{
+		printf("%5d: Signature information missing.\n", pdf_to_num(ctx, signature));
+	}
+
+	pdf_drop_verifier(ctx, verifier);
+
+}
+
+static void process_field(fz_context *ctx, pdf_document *doc, pdf_obj *field)
+{
+	if (pdf_dict_get_inheritable(ctx, field, PDF_NAME(FT)) != PDF_NAME(Sig))
+		fz_warn(ctx, "%d is not a signature, skipping", pdf_to_num(ctx, field));
+	else
+	{
+		if (list)
+			list_signature(ctx, doc, field);
+		if (verify)
+			verify_signature(ctx, doc, field);
+		if (clear)
+			clear_signature(ctx, doc, field);
+		if (sign)
+			sign_signature(ctx, doc, field);
+	}
+}
+
+static int process_field_hierarchy(fz_context *ctx, pdf_document *doc, pdf_obj *field, pdf_cycle_list *cycle_up)
+{
+	pdf_cycle_list cycle;
+	pdf_obj *kids;
+	int x = 0;
+
+	if (field == NULL || pdf_cycle(ctx, &cycle, cycle_up, field))
+		fz_throw(ctx, FZ_ERROR_SYNTAX, "recursive field hierarchy");
+
+	kids = pdf_dict_get(ctx, field, PDF_NAME(Kids));
+	if (kids)
+	{
+		int i, n;
+		n = pdf_array_len(ctx, kids);
+		for (i = 0; i < n; ++i)
+		{
+			pdf_obj *kid = pdf_array_get(ctx, kids, i);
+			x += process_field_hierarchy(ctx, doc, kid, &cycle);
+		}
+	}
+	else if (pdf_dict_get_inheritable(ctx, field, PDF_NAME(FT)) == PDF_NAME(Sig))
+	{
+		process_field(ctx, doc, field);
+		++x;
+	}
+
+	return x;
+}
+
+static int process_acro_form(fz_context *ctx, pdf_document *doc)
+{
+	pdf_obj *trailer = pdf_trailer(ctx, doc);
+	pdf_obj *root = pdf_dict_get(ctx, trailer, PDF_NAME(Root));
+	pdf_obj *acroform = pdf_dict_get(ctx, root, PDF_NAME(AcroForm));
+	pdf_obj *fields = pdf_dict_get(ctx, acroform, PDF_NAME(Fields));
+	int i, x, n = pdf_array_len(ctx, fields);
+	for (i = x = 0; i < n; ++i)
+		x += process_field_hierarchy(ctx, doc, pdf_array_get(ctx, fields, i), NULL);
+	return x;
+}
+
+int pdfsign_main(int argc, char **argv)
+{
+	fz_context *ctx;
+	pdf_document *doc = NULL;
+	char *password = "";
+	int c;
+
+	while ((c = fz_getopt(argc, argv, "co:p:s:vP:")) != -1)
+	{
+		switch (c)
+		{
+		case 'c': list = 0; clear = 1; break;
+		case 'o': outfile = fz_optpath(fz_optarg); break;
+		case 'p': password = fz_optarg; break;
+		case 'P': certificatepassword = fz_optarg; break;
+		case 's': list = 0; sign = 1; certificatefile = fz_optarg; break;
+		case 'v': list = 0; verify = 1; break;
+		default: return usage();
+		}
+	}
+
+	if (argc - fz_optind < 1)
+		return usage();
+
+	infile = argv[fz_optind++];
+
+	if (!clear && !sign && !verify && argc - fz_optind > 0)
+	{
+		list = 0;
+		verify = 1;
+	}
+
+	ctx = fz_new_context(NULL, NULL, FZ_STORE_UNLIMITED);
+	if (!ctx)
+	{
+		fprintf(stderr, "cannot initialize context\n");
+		exit(1);
+	}
+
+	fz_var(doc);
+
+	fz_try(ctx)
+	{
+		doc = pdf_open_document(ctx, infile);
+		if (pdf_needs_password(ctx, doc))
+			if (!pdf_authenticate_password(ctx, doc, password))
+				fz_warn(ctx, "cannot authenticate password: %s", infile);
+
+		if (argc - fz_optind <= 0 || list)
+		{
+			if (!process_acro_form(ctx, doc))
+			{
+				fprintf(stderr, "No signatures found!\n");
+				exit(1);
+			}
+		}
+		else
+		{
+			while (argc - fz_optind)
+			{
+				pdf_obj *field = pdf_new_indirect(ctx, doc, fz_atoi(argv[fz_optind]), 0);
+				process_field(ctx, doc, field);
+				pdf_drop_obj(ctx, field);
+				fz_optind++;
+			}
+		}
+
+		if (clear || sign)
+		{
+			pdf_write_options opts = pdf_default_write_options;
+			opts.do_incremental = 1;
+			if (!outfile)
+				outfile = "out.pdf";
+			pdf_save_document(ctx, doc, outfile, &opts);
+		}
+	}
+	fz_always(ctx)
+		pdf_drop_document(ctx, doc);
+	fz_catch(ctx)
+	{
+		fz_report_error(ctx);
+		fz_log_error(ctx, "error processing signatures");
+	}
+
+	fz_flush_warnings(ctx);
+	fz_drop_context(ctx);
+	return 0;
+}