blob: eda2e5217d6c36f4de90bcd72d1fc5b23df547d2 [file] [log] [blame]
Just7842e561999-12-16 21:34:53 +00001"""fontTools.t1Lib.py -- Tools for PostScript Type 1 fonts
2
3Functions for reading and writing raw Type 1 data:
4
5read(path)
6 reads any Type 1 font file, returns the raw data and a type indicator:
7 'LWFN', 'PFB' or 'OTHER', depending on the format of the file pointed
8 to by 'path'.
9 Raises an error when the file does not contain valid Type 1 data.
10
Just5810aa92001-06-24 15:12:48 +000011write(path, data, kind='OTHER', dohex=0)
Just7842e561999-12-16 21:34:53 +000012 writes raw Type 1 data to the file pointed to by 'path'.
13 'kind' can be one of 'LWFN', 'PFB' or 'OTHER'; it defaults to 'OTHER'.
14 'dohex' is a flag which determines whether the eexec encrypted
15 part should be written as hexadecimal or binary, but only if kind
16 is 'LWFN' or 'PFB'.
17"""
18
19__author__ = "jvr"
20__version__ = "1.0b2"
21DEBUG = 0
22
Justc2be3d92000-01-12 19:15:57 +000023from fontTools.misc import eexec
jvr45d1f3b2008-03-01 11:34:54 +000024from fontTools.misc.macCreatorType import getMacCreatorAndType
Just7842e561999-12-16 21:34:53 +000025import string
26import re
27import os
28
jvr22433b12002-07-12 19:20:19 +000029
30try:
jvr25ccb9c2002-05-03 19:38:07 +000031 try:
32 from Carbon import Res
33 except ImportError:
34 import Res # MacPython < 2.2
jvre568dc72002-07-23 09:25:42 +000035except ImportError:
36 haveMacSupport = 0
37else:
38 haveMacSupport = 1
jvrb19141e2003-06-07 15:15:51 +000039 import MacOS
jvr59afba72003-05-24 12:34:11 +000040
Just7842e561999-12-16 21:34:53 +000041
jvre568dc72002-07-23 09:25:42 +000042class T1Error(Exception): pass
Just7842e561999-12-16 21:34:53 +000043
Just7842e561999-12-16 21:34:53 +000044
45class T1Font:
46
Just36183002000-03-28 10:38:43 +000047 """Type 1 font class.
48
49 Uses a minimal interpeter that supports just about enough PS to parse
50 Type 1 fonts.
Just7842e561999-12-16 21:34:53 +000051 """
52
53 def __init__(self, path=None):
54 if path is not None:
55 self.data, type = read(path)
56 else:
57 pass # XXX
58
59 def saveAs(self, path, type):
jvr8c74f462001-08-16 10:34:22 +000060 write(path, self.getData(), type)
Just7842e561999-12-16 21:34:53 +000061
62 def getData(self):
Just36183002000-03-28 10:38:43 +000063 # XXX Todo: if the data has been converted to Python object,
64 # recreate the PS stream
Just7842e561999-12-16 21:34:53 +000065 return self.data
66
jvr7d4b6932003-08-25 17:53:29 +000067 def getGlyphSet(self):
68 """Return a generic GlyphSet, which is a dict-like object
69 mapping glyph names to glyph objects. The returned glyph objects
70 have a .draw() method that supports the Pen protocol, and will
71 have an attribute named 'width', but only *after* the .draw() method
72 has been called.
73
74 In the case of Type 1, the GlyphSet is simply the CharStrings dict.
75 """
76 return self["CharStrings"]
77
Just7842e561999-12-16 21:34:53 +000078 def __getitem__(self, key):
79 if not hasattr(self, "font"):
80 self.parse()
Just36183002000-03-28 10:38:43 +000081 return self.font[key]
Just7842e561999-12-16 21:34:53 +000082
83 def parse(self):
Just528614e2000-01-16 22:14:02 +000084 from fontTools.misc import psLib
85 from fontTools.misc import psCharStrings
Just7842e561999-12-16 21:34:53 +000086 self.font = psLib.suckfont(self.data)
87 charStrings = self.font["CharStrings"]
88 lenIV = self.font["Private"].get("lenIV", 4)
89 assert lenIV >= 0
jvr489d76a2003-08-24 19:56:16 +000090 subrs = self.font["Private"]["Subrs"]
Just7842e561999-12-16 21:34:53 +000091 for glyphName, charString in charStrings.items():
Justc2be3d92000-01-12 19:15:57 +000092 charString, R = eexec.decrypt(charString, 4330)
jvr489d76a2003-08-24 19:56:16 +000093 charStrings[glyphName] = psCharStrings.T1CharString(charString[lenIV:],
94 subrs=subrs)
Just7842e561999-12-16 21:34:53 +000095 for i in range(len(subrs)):
Justc2be3d92000-01-12 19:15:57 +000096 charString, R = eexec.decrypt(subrs[i], 4330)
jvr489d76a2003-08-24 19:56:16 +000097 subrs[i] = psCharStrings.T1CharString(charString[lenIV:], subrs=subrs)
Just7842e561999-12-16 21:34:53 +000098 del self.data
Just7842e561999-12-16 21:34:53 +000099
100
Just36183002000-03-28 10:38:43 +0000101# low level T1 data read and write functions
Just7842e561999-12-16 21:34:53 +0000102
jvr10fd22a2005-01-25 19:06:51 +0000103def read(path, onlyHeader=0):
Just7842e561999-12-16 21:34:53 +0000104 """reads any Type 1 font file, returns raw data"""
105 normpath = string.lower(path)
jvr45d1f3b2008-03-01 11:34:54 +0000106 creator, type = getMacCreatorAndType(path)
107 if type == 'LWFN':
108 return readLWFN(path, onlyHeader), 'LWFN'
Just7842e561999-12-16 21:34:53 +0000109 if normpath[-4:] == '.pfb':
jvr10fd22a2005-01-25 19:06:51 +0000110 return readPFB(path, onlyHeader), 'PFB'
Just7842e561999-12-16 21:34:53 +0000111 else:
Just5810aa92001-06-24 15:12:48 +0000112 return readOther(path), 'OTHER'
Just7842e561999-12-16 21:34:53 +0000113
114def write(path, data, kind='OTHER', dohex=0):
Just5810aa92001-06-24 15:12:48 +0000115 assertType1(data)
Just7842e561999-12-16 21:34:53 +0000116 kind = string.upper(kind)
117 try:
118 os.remove(path)
119 except os.error:
120 pass
121 err = 1
122 try:
123 if kind == 'LWFN':
Just5810aa92001-06-24 15:12:48 +0000124 writeLWFN(path, data)
Just7842e561999-12-16 21:34:53 +0000125 elif kind == 'PFB':
Just5810aa92001-06-24 15:12:48 +0000126 writePFB(path, data)
Just7842e561999-12-16 21:34:53 +0000127 else:
Just5810aa92001-06-24 15:12:48 +0000128 writeOther(path, data, dohex)
Just7842e561999-12-16 21:34:53 +0000129 err = 0
130 finally:
131 if err and not DEBUG:
132 try:
133 os.remove(path)
134 except os.error:
135 pass
136
137
138# -- internal --
139
140LWFNCHUNKSIZE = 2000
141HEXLINELENGTH = 80
142
143
jvrda0d8052002-07-29 21:33:46 +0000144def readLWFN(path, onlyHeader=0):
Just7842e561999-12-16 21:34:53 +0000145 """reads an LWFN font file, returns raw data"""
jvr91bca422012-10-18 12:49:22 +0000146 resRef = Res.FSOpenResFile(path, 1) # read-only
Just7842e561999-12-16 21:34:53 +0000147 try:
Juste9601bf2001-07-30 19:04:40 +0000148 Res.UseResFile(resRef)
Just7842e561999-12-16 21:34:53 +0000149 n = Res.Count1Resources('POST')
150 data = []
151 for i in range(501, 501 + n):
152 res = Res.Get1Resource('POST', i)
153 code = ord(res.data[0])
Behdad Esfahbod180ace62013-11-27 02:40:30 -0500154 if ord(res.data[1]) != 0:
Behdad Esfahbodcd5aad92013-11-27 02:42:28 -0500155 raise T1Error('corrupt LWFN file')
Just7842e561999-12-16 21:34:53 +0000156 if code in [1, 2]:
jvrda0d8052002-07-29 21:33:46 +0000157 if onlyHeader and code == 2:
158 break
jvr05a16f22002-07-29 21:39:06 +0000159 data.append(res.data[2:])
Just7842e561999-12-16 21:34:53 +0000160 elif code in [3, 5]:
161 break
162 elif code == 4:
163 f = open(path, "rb")
164 data.append(f.read())
165 f.close()
166 elif code == 0:
167 pass # comment, ignore
168 else:
Behdad Esfahbodcd5aad92013-11-27 02:42:28 -0500169 raise T1Error('bad chunk code: ' + `code`)
Just7842e561999-12-16 21:34:53 +0000170 finally:
Juste9601bf2001-07-30 19:04:40 +0000171 Res.CloseResFile(resRef)
Just7842e561999-12-16 21:34:53 +0000172 data = string.join(data, '')
Just5810aa92001-06-24 15:12:48 +0000173 assertType1(data)
Just7842e561999-12-16 21:34:53 +0000174 return data
175
Just5810aa92001-06-24 15:12:48 +0000176def readPFB(path, onlyHeader=0):
Just7842e561999-12-16 21:34:53 +0000177 """reads a PFB font file, returns raw data"""
178 f = open(path, "rb")
179 data = []
180 while 1:
Behdad Esfahbod180ace62013-11-27 02:40:30 -0500181 if f.read(1) != chr(128):
Behdad Esfahbodcd5aad92013-11-27 02:42:28 -0500182 raise T1Error('corrupt PFB file')
Just7842e561999-12-16 21:34:53 +0000183 code = ord(f.read(1))
184 if code in [1, 2]:
Just5810aa92001-06-24 15:12:48 +0000185 chunklen = stringToLong(f.read(4))
Just36183002000-03-28 10:38:43 +0000186 chunk = f.read(chunklen)
187 assert len(chunk) == chunklen
188 data.append(chunk)
Just7842e561999-12-16 21:34:53 +0000189 elif code == 3:
190 break
191 else:
Behdad Esfahbodcd5aad92013-11-27 02:42:28 -0500192 raise T1Error('bad chunk code: ' + `code`)
Just5810aa92001-06-24 15:12:48 +0000193 if onlyHeader:
194 break
Just7842e561999-12-16 21:34:53 +0000195 f.close()
196 data = string.join(data, '')
Just5810aa92001-06-24 15:12:48 +0000197 assertType1(data)
Just7842e561999-12-16 21:34:53 +0000198 return data
199
Just5810aa92001-06-24 15:12:48 +0000200def readOther(path):
Just7842e561999-12-16 21:34:53 +0000201 """reads any (font) file, returns raw data"""
202 f = open(path, "rb")
203 data = f.read()
204 f.close()
Just5810aa92001-06-24 15:12:48 +0000205 assertType1(data)
Just7842e561999-12-16 21:34:53 +0000206
Just5810aa92001-06-24 15:12:48 +0000207 chunks = findEncryptedChunks(data)
Just7842e561999-12-16 21:34:53 +0000208 data = []
Just5810aa92001-06-24 15:12:48 +0000209 for isEncrypted, chunk in chunks:
210 if isEncrypted and isHex(chunk[:4]):
211 data.append(deHexString(chunk))
Just7842e561999-12-16 21:34:53 +0000212 else:
213 data.append(chunk)
214 return string.join(data, '')
215
216# file writing tools
217
Just5810aa92001-06-24 15:12:48 +0000218def writeLWFN(path, data):
Juste9601bf2001-07-30 19:04:40 +0000219 Res.FSpCreateResFile(path, "just", "LWFN", 0)
jvr91bca422012-10-18 12:49:22 +0000220 resRef = Res.FSOpenResFile(path, 2) # write-only
Just7842e561999-12-16 21:34:53 +0000221 try:
Juste9601bf2001-07-30 19:04:40 +0000222 Res.UseResFile(resRef)
Just7842e561999-12-16 21:34:53 +0000223 resID = 501
Just5810aa92001-06-24 15:12:48 +0000224 chunks = findEncryptedChunks(data)
225 for isEncrypted, chunk in chunks:
226 if isEncrypted:
Just7842e561999-12-16 21:34:53 +0000227 code = 2
228 else:
229 code = 1
230 while chunk:
231 res = Res.Resource(chr(code) + '\0' + chunk[:LWFNCHUNKSIZE - 2])
232 res.AddResource('POST', resID, '')
233 chunk = chunk[LWFNCHUNKSIZE - 2:]
234 resID = resID + 1
235 res = Res.Resource(chr(5) + '\0')
236 res.AddResource('POST', resID, '')
237 finally:
Juste9601bf2001-07-30 19:04:40 +0000238 Res.CloseResFile(resRef)
Just7842e561999-12-16 21:34:53 +0000239
Just5810aa92001-06-24 15:12:48 +0000240def writePFB(path, data):
241 chunks = findEncryptedChunks(data)
Just36183002000-03-28 10:38:43 +0000242 f = open(path, "wb")
Just7842e561999-12-16 21:34:53 +0000243 try:
Just5810aa92001-06-24 15:12:48 +0000244 for isEncrypted, chunk in chunks:
245 if isEncrypted:
Just7842e561999-12-16 21:34:53 +0000246 code = 2
247 else:
248 code = 1
249 f.write(chr(128) + chr(code))
Just5810aa92001-06-24 15:12:48 +0000250 f.write(longToString(len(chunk)))
Just7842e561999-12-16 21:34:53 +0000251 f.write(chunk)
252 f.write(chr(128) + chr(3))
253 finally:
254 f.close()
Just7842e561999-12-16 21:34:53 +0000255
Just5810aa92001-06-24 15:12:48 +0000256def writeOther(path, data, dohex = 0):
257 chunks = findEncryptedChunks(data)
Just7842e561999-12-16 21:34:53 +0000258 f = open(path, "wb")
259 try:
260 hexlinelen = HEXLINELENGTH / 2
Just5810aa92001-06-24 15:12:48 +0000261 for isEncrypted, chunk in chunks:
262 if isEncrypted:
Just7842e561999-12-16 21:34:53 +0000263 code = 2
264 else:
265 code = 1
266 if code == 2 and dohex:
267 while chunk:
Justc2be3d92000-01-12 19:15:57 +0000268 f.write(eexec.hexString(chunk[:hexlinelen]))
Just7842e561999-12-16 21:34:53 +0000269 f.write('\r')
270 chunk = chunk[hexlinelen:]
271 else:
272 f.write(chunk)
273 finally:
274 f.close()
Just7842e561999-12-16 21:34:53 +0000275
276
277# decryption tools
278
279EEXECBEGIN = "currentfile eexec"
280EEXECEND = '0' * 64
281EEXECINTERNALEND = "currentfile closefile"
282EEXECBEGINMARKER = "%-- eexec start\r"
283EEXECENDMARKER = "%-- eexec end\r"
284
285_ishexRE = re.compile('[0-9A-Fa-f]*$')
286
Just5810aa92001-06-24 15:12:48 +0000287def isHex(text):
Just7842e561999-12-16 21:34:53 +0000288 return _ishexRE.match(text) is not None
289
290
Just5810aa92001-06-24 15:12:48 +0000291def decryptType1(data):
292 chunks = findEncryptedChunks(data)
Just7842e561999-12-16 21:34:53 +0000293 data = []
Just5810aa92001-06-24 15:12:48 +0000294 for isEncrypted, chunk in chunks:
295 if isEncrypted:
296 if isHex(chunk[:4]):
297 chunk = deHexString(chunk)
Justc2be3d92000-01-12 19:15:57 +0000298 decrypted, R = eexec.decrypt(chunk, 55665)
Just7842e561999-12-16 21:34:53 +0000299 decrypted = decrypted[4:]
Behdad Esfahbod180ace62013-11-27 02:40:30 -0500300 if decrypted[-len(EEXECINTERNALEND)-1:-1] != EEXECINTERNALEND \
301 and decrypted[-len(EEXECINTERNALEND)-2:-2] != EEXECINTERNALEND:
Behdad Esfahbodcd5aad92013-11-27 02:42:28 -0500302 raise T1Error("invalid end of eexec part")
Just7842e561999-12-16 21:34:53 +0000303 decrypted = decrypted[:-len(EEXECINTERNALEND)-2] + '\r'
304 data.append(EEXECBEGINMARKER + decrypted + EEXECENDMARKER)
305 else:
306 if chunk[-len(EEXECBEGIN)-1:-1] == EEXECBEGIN:
307 data.append(chunk[:-len(EEXECBEGIN)-1])
308 else:
309 data.append(chunk)
310 return string.join(data, '')
311
Just5810aa92001-06-24 15:12:48 +0000312def findEncryptedChunks(data):
Just7842e561999-12-16 21:34:53 +0000313 chunks = []
314 while 1:
Just5810aa92001-06-24 15:12:48 +0000315 eBegin = string.find(data, EEXECBEGIN)
316 if eBegin < 0:
Just7842e561999-12-16 21:34:53 +0000317 break
jvr90290b72001-11-28 12:22:15 +0000318 eBegin = eBegin + len(EEXECBEGIN) + 1
Just5810aa92001-06-24 15:12:48 +0000319 eEnd = string.find(data, EEXECEND, eBegin)
320 if eEnd < 0:
Behdad Esfahbodcd5aad92013-11-27 02:42:28 -0500321 raise T1Error("can't find end of eexec part")
jvrdb1f2802002-07-23 14:54:47 +0000322 cypherText = data[eBegin:eEnd + 2]
jvre56bc902008-03-10 21:58:00 +0000323 if isHex(cypherText[:4]):
324 cypherText = deHexString(cypherText)
jvrdb1f2802002-07-23 14:54:47 +0000325 plainText, R = eexec.decrypt(cypherText, 55665)
326 eEndLocal = string.find(plainText, EEXECINTERNALEND)
327 if eEndLocal < 0:
Behdad Esfahbodcd5aad92013-11-27 02:42:28 -0500328 raise T1Error("can't find end of eexec part")
jvr90290b72001-11-28 12:22:15 +0000329 chunks.append((0, data[:eBegin]))
jvre56bc902008-03-10 21:58:00 +0000330 chunks.append((1, cypherText[:eEndLocal + len(EEXECINTERNALEND) + 1]))
Just5810aa92001-06-24 15:12:48 +0000331 data = data[eEnd:]
Just7842e561999-12-16 21:34:53 +0000332 chunks.append((0, data))
333 return chunks
334
Just5810aa92001-06-24 15:12:48 +0000335def deHexString(hexstring):
Justc2be3d92000-01-12 19:15:57 +0000336 return eexec.deHexString(string.join(string.split(hexstring), ""))
Just7842e561999-12-16 21:34:53 +0000337
338
339# Type 1 assertion
340
341_fontType1RE = re.compile(r"/FontType\s+1\s+def")
342
Just5810aa92001-06-24 15:12:48 +0000343def assertType1(data):
jvre56bc902008-03-10 21:58:00 +0000344 for head in ['%!PS-AdobeFont', '%!FontType1']:
Just7842e561999-12-16 21:34:53 +0000345 if data[:len(head)] == head:
346 break
347 else:
Behdad Esfahbodcd5aad92013-11-27 02:42:28 -0500348 raise T1Error("not a PostScript font")
Just7842e561999-12-16 21:34:53 +0000349 if not _fontType1RE.search(data):
Behdad Esfahbodcd5aad92013-11-27 02:42:28 -0500350 raise T1Error("not a Type 1 font")
Just7842e561999-12-16 21:34:53 +0000351 if string.find(data, "currentfile eexec") < 0:
Behdad Esfahbodcd5aad92013-11-27 02:42:28 -0500352 raise T1Error("not an encrypted Type 1 font")
Just7842e561999-12-16 21:34:53 +0000353 # XXX what else?
354 return data
355
356
357# pfb helpers
358
Just5810aa92001-06-24 15:12:48 +0000359def longToString(long):
Just7842e561999-12-16 21:34:53 +0000360 str = ""
361 for i in range(4):
362 str = str + chr((long & (0xff << (i * 8))) >> i * 8)
363 return str
364
Just5810aa92001-06-24 15:12:48 +0000365def stringToLong(str):
Behdad Esfahbod180ace62013-11-27 02:40:30 -0500366 if len(str) != 4:
Behdad Esfahbodcd5aad92013-11-27 02:42:28 -0500367 raise ValueError('string must be 4 bytes long')
Just7842e561999-12-16 21:34:53 +0000368 long = 0
369 for i in range(4):
370 long = long + (ord(str[i]) << (i * 8))
371 return long
Just5810aa92001-06-24 15:12:48 +0000372