Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(345)

Side by Side Diff: experimental/PdfViewer/SkPdfStandardSecurityHandlerDictionary_autogen.h

Issue 16975013: Deal with ca and CA transparency operators in pdf. add comments to generated classes. (Closed) Base URL: http://skia.googlecode.com/svn/trunk/
Patch Set: Created 7 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 #ifndef __DEFINED__SkPdfStandardSecurityHandlerDictionary 1 #ifndef __DEFINED__SkPdfStandardSecurityHandlerDictionary
2 #define __DEFINED__SkPdfStandardSecurityHandlerDictionary 2 #define __DEFINED__SkPdfStandardSecurityHandlerDictionary
3 3
4 #include "SkPdfEnums_autogen.h" 4 #include "SkPdfEnums_autogen.h"
5 #include "SkPdfArray_autogen.h" 5 #include "SkPdfArray_autogen.h"
6 #include "SkPdfDictionary_autogen.h" 6 #include "SkPdfDictionary_autogen.h"
7 7
8 // Additional encryption dictionary entries for the standard security handler
8 class SkPdfStandardSecurityHandlerDictionary : public SkPdfDictionary { 9 class SkPdfStandardSecurityHandlerDictionary : public SkPdfDictionary {
9 public: 10 public:
10 virtual SkPdfObjectType getType() const { return kStandardSecurityHandlerDicti onary_SkPdfObjectType;} 11 virtual SkPdfObjectType getType() const { return kStandardSecurityHandlerDicti onary_SkPdfObjectType;}
11 virtual SkPdfObjectType getTypeEnd() const { return (SkPdfObjectType)(kStandar dSecurityHandlerDictionary_SkPdfObjectType + 1);} 12 virtual SkPdfObjectType getTypeEnd() const { return (SkPdfObjectType)(kStandar dSecurityHandlerDictionary_SkPdfObjectType + 1);}
12 public: 13 public:
13 virtual SkPdfStandardSecurityHandlerDictionary* asStandardSecurityHandlerDicti onary() {return this;} 14 virtual SkPdfStandardSecurityHandlerDictionary* asStandardSecurityHandlerDicti onary() {return this;}
14 virtual const SkPdfStandardSecurityHandlerDictionary* asStandardSecurityHandle rDictionary() const {return this;} 15 virtual const SkPdfStandardSecurityHandlerDictionary* asStandardSecurityHandle rDictionary() const {return this;}
15 16
16 private: 17 private:
17 virtual SkPdfALinkAnnotationDictionary* asALinkAnnotationDictionary() {return NULL;} 18 virtual SkPdfALinkAnnotationDictionary* asALinkAnnotationDictionary() {return NULL;}
(...skipping 496 matching lines...) Expand 10 before | Expand all | Expand 10 after
514 515
515 public: 516 public:
516 private: 517 private:
517 public: 518 public:
518 SkPdfStandardSecurityHandlerDictionary(const PdfMemDocument* podofoDoc = NULL, const PdfObject* podofoObj = NULL) : SkPdfDictionary(podofoDoc, podofoObj) {} 519 SkPdfStandardSecurityHandlerDictionary(const PdfMemDocument* podofoDoc = NULL, const PdfObject* podofoObj = NULL) : SkPdfDictionary(podofoDoc, podofoObj) {}
519 520
520 virtual bool valid() const {return true;} 521 virtual bool valid() const {return true;}
521 522
522 SkPdfStandardSecurityHandlerDictionary& operator=(const SkPdfStandardSecurityH andlerDictionary& from) {this->fPodofoDoc = from.fPodofoDoc; this->fPodofoObj = from.fPodofoObj; return *this;} 523 SkPdfStandardSecurityHandlerDictionary& operator=(const SkPdfStandardSecurityH andlerDictionary& from) {this->fPodofoDoc = from.fPodofoDoc; this->fPodofoObj = from.fPodofoObj; return *this;}
523 524
525 /** (Required) A number specifying which revision of the standard security handl er should
526 * be used to interpret this dictionary. The revision number should be 2 if the document is
527 * encrypted with a V value less than 2 (see Table 3.13) and does not have any of the access
528 * permissions set (via the P entry, below) that are designated "Revision 3" in Table 3.15;
529 * otherwise (that is, if the document is encrypted with a V value greater than 2 or has any
530 * "Revision 3" access permissions set), this value should be 3.
531 **/
532 bool has_R() const {
533 return (ObjectFromDictionary(fPodofoDoc, fPodofoObj->GetDictionary(), "R", " ", NULL));
534 }
535
524 double R() const { 536 double R() const {
525 double ret; 537 double ret;
526 if (DoubleFromDictionary(fPodofoDoc, fPodofoObj->GetDictionary(), "R", "", & ret)) return ret; 538 if (DoubleFromDictionary(fPodofoDoc, fPodofoObj->GetDictionary(), "R", "", & ret)) return ret;
527 // TODO(edisonn): warn about missing required field, assert for known good p dfs 539 // TODO(edisonn): warn about missing required field, assert for known good p dfs
528 return 0; 540 return 0;
529 } 541 }
530 542
543 /** (Required) A 32-byte string, based on both the owner and user passwords, tha t is used in
544 * computing the encryption key and in determining whether a valid owner passwo rd was
545 * entered. For more information, see "Encryption Key Algorithm" on page 78 and "Pass-
546 * word Algorithms" on page 79.
547 **/
548 bool has_O() const {
549 return (ObjectFromDictionary(fPodofoDoc, fPodofoObj->GetDictionary(), "O", " ", NULL));
550 }
551
531 std::string O() const { 552 std::string O() const {
532 std::string ret; 553 std::string ret;
533 if (StringFromDictionary(fPodofoDoc, fPodofoObj->GetDictionary(), "O", "", & ret)) return ret; 554 if (StringFromDictionary(fPodofoDoc, fPodofoObj->GetDictionary(), "O", "", & ret)) return ret;
534 // TODO(edisonn): warn about missing required field, assert for known good p dfs 555 // TODO(edisonn): warn about missing required field, assert for known good p dfs
535 return ""; 556 return "";
536 } 557 }
537 558
559 /** (Required) A 32-byte string, based on the user password, that is used in det ermining
560 * whether to prompt the user for a password and, if so, whether a valid user o r owner pass-
561 * word was entered. For more information, see "Password Algorithms" on page 79 .
562 **/
563 bool has_U() const {
564 return (ObjectFromDictionary(fPodofoDoc, fPodofoObj->GetDictionary(), "U", " ", NULL));
565 }
566
538 std::string U() const { 567 std::string U() const {
539 std::string ret; 568 std::string ret;
540 if (StringFromDictionary(fPodofoDoc, fPodofoObj->GetDictionary(), "U", "", & ret)) return ret; 569 if (StringFromDictionary(fPodofoDoc, fPodofoObj->GetDictionary(), "U", "", & ret)) return ret;
541 // TODO(edisonn): warn about missing required field, assert for known good p dfs 570 // TODO(edisonn): warn about missing required field, assert for known good p dfs
542 return ""; 571 return "";
543 } 572 }
544 573
574 /** (Required) A set of flags specifying which operations are permitted when the document is
575 * opened with user access (see Table 3.15).
576 **/
577 bool has_P() const {
578 return (ObjectFromDictionary(fPodofoDoc, fPodofoObj->GetDictionary(), "P", " ", NULL));
579 }
580
545 long P() const { 581 long P() const {
546 long ret; 582 long ret;
547 if (LongFromDictionary(fPodofoDoc, fPodofoObj->GetDictionary(), "P", "", &re t)) return ret; 583 if (LongFromDictionary(fPodofoDoc, fPodofoObj->GetDictionary(), "P", "", &re t)) return ret;
548 // TODO(edisonn): warn about missing required field, assert for known good p dfs 584 // TODO(edisonn): warn about missing required field, assert for known good p dfs
549 return 0; 585 return 0;
550 } 586 }
551 587
552 }; 588 };
553 589
554 #endif // __DEFINED__SkPdfStandardSecurityHandlerDictionary 590 #endif // __DEFINED__SkPdfStandardSecurityHandlerDictionary
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698