1 /*
2 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
3 % %
4 % %
5 % %
6 % EEEEE PPPP TTTTT %
7 % E P P T %
8 % EEE PPPP T %
9 % E P T %
10 % EEEEE P T %
11 % %
12 % %
13 % Read/Write Encapsulated Postscript Format (with preview). %
14 % %
15 % Software Design %
16 % Cristy %
17 % July 1992 %
18 % %
19 % %
20 % Copyright 1999-2020 ImageMagick Studio LLC, a non-profit organization %
21 % dedicated to making software imaging solutions freely available. %
22 % %
23 % You may not use this file except in compliance with the License. You may %
24 % obtain a copy of the License at %
25 % %
26 % https://imagemagick.org/script/license.php %
27 % %
28 % Unless required by applicable law or agreed to in writing, software %
29 % distributed under the License is distributed on an "AS IS" BASIS, %
30 % WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. %
31 % See the License for the specific language governing permissions and %
32 % limitations under the License. %
33 % %
34 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
35 %
36 %
37 */
38
39 /*
40 Include declarations.
41 */
42 #include "MagickCore/studio.h"
43 #include "MagickCore/blob.h"
44 #include "MagickCore/blob-private.h"
45 #include "MagickCore/color.h"
46 #include "MagickCore/constitute.h"
47 #include "MagickCore/draw.h"
48 #include "MagickCore/exception.h"
49 #include "MagickCore/exception-private.h"
50 #include "MagickCore/delegate.h"
51 #include "MagickCore/geometry.h"
52 #include "MagickCore/histogram.h"
53 #include "MagickCore/image.h"
54 #include "MagickCore/image-private.h"
55 #include "MagickCore/list.h"
56 #include "MagickCore/magick.h"
57 #include "MagickCore/memory_.h"
58 #include "MagickCore/monitor.h"
59 #include "MagickCore/monitor-private.h"
60 #include "MagickCore/quantize.h"
61 #include "MagickCore/resource_.h"
62 #include "MagickCore/resize.h"
63 #include "MagickCore/quantum-private.h"
64 #include "MagickCore/static.h"
65 #include "MagickCore/string_.h"
66 #include "MagickCore/module.h"
67 #include "MagickCore/utility.h"
68
69 /*
70 Typedef declarations.
71 */
72 typedef struct _EPTInfo
73 {
74 size_t
75 magick;
76
77 MagickOffsetType
78 postscript_offset,
79 tiff_offset;
80
81 size_t
82 postscript_length,
83 tiff_length;
84
85 unsigned char
86 *postscript,
87 *tiff;
88 } EPTInfo;
89
90 /*
91 Forward declarations.
92 */
93 static MagickBooleanType
94 WriteEPTImage(const ImageInfo *,Image *,ExceptionInfo *);
95
96 /*
97 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
98 % %
99 % %
100 % %
101 % I s E P T %
102 % %
103 % %
104 % %
105 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
106 %
107 % IsEPT() returns MagickTrue if the image format type, identified by the
108 % magick string, is EPT.
109 %
110 % The format of the IsEPT method is:
111 %
112 % MagickBooleanType IsEPT(const unsigned char *magick,const size_t length)
113 %
114 % A description of each parameter follows:
115 %
116 % o magick: compare image format pattern against these bytes.
117 %
118 % o length: Specifies the length of the magick string.
119 %
120 */
IsEPT(const unsigned char * magick,const size_t length)121 static MagickBooleanType IsEPT(const unsigned char *magick,const size_t length)
122 {
123 if (length < 4)
124 return(MagickFalse);
125 if (memcmp(magick,"\305\320\323\306",4) == 0)
126 return(MagickTrue);
127 return(MagickFalse);
128 }
129
130 /*
131 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
132 % %
133 % %
134 % %
135 % R e a d E P T I m a g e %
136 % %
137 % %
138 % %
139 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
140 %
141 % ReadEPTImage() reads a binary Postscript image file and returns it. It
142 % allocates the memory necessary for the new Image structure and returns a
143 % pointer to the new image.
144 %
145 % The format of the ReadEPTImage method is:
146 %
147 % Image *ReadEPTImage(const ImageInfo *image_info,
148 % ExceptionInfo *exception)
149 %
150 % A description of each parameter follows:
151 %
152 % o image_info: the image info.
153 %
154 % o exception: return any errors or warnings in this structure.
155 %
156 */
ReadEPTImage(const ImageInfo * image_info,ExceptionInfo * exception)157 static Image *ReadEPTImage(const ImageInfo *image_info,ExceptionInfo *exception)
158 {
159 const void
160 *postscript_data,
161 *tiff_data;
162
163 EPTInfo
164 ept_info;
165
166 Image
167 *image;
168
169 ImageInfo
170 *read_info;
171
172 MagickBooleanType
173 status;
174
175 MagickOffsetType
176 offset;
177
178 ssize_t
179 count;
180
181 /*
182 Open image file.
183 */
184 assert(image_info != (const ImageInfo *) NULL);
185 assert(image_info->signature == MagickCoreSignature);
186 if (image_info->debug != MagickFalse)
187 (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",
188 image_info->filename);
189 assert(exception != (ExceptionInfo *) NULL);
190 assert(exception->signature == MagickCoreSignature);
191 image=AcquireImage(image_info,exception);
192 status=OpenBlob(image_info,image,ReadBinaryBlobMode,exception);
193 if (status == MagickFalse)
194 {
195 image=DestroyImageList(image);
196 return((Image *) NULL);
197 }
198 ept_info.magick=ReadBlobLSBLong(image);
199 if (ept_info.magick != 0xc6d3d0c5ul)
200 ThrowReaderException(CorruptImageError,"ImproperImageHeader");
201 ept_info.postscript_offset=(MagickOffsetType) ReadBlobLSBLong(image);
202 ept_info.postscript_length=ReadBlobLSBLong(image);
203 if ((MagickSizeType) ept_info.postscript_length > GetBlobSize(image))
204 ThrowReaderException(CorruptImageError,"InsufficientImageDataInFile");
205 (void) ReadBlobLSBLong(image);
206 (void) ReadBlobLSBLong(image);
207 ept_info.tiff_offset=(MagickOffsetType) ReadBlobLSBLong(image);
208 ept_info.tiff_length=ReadBlobLSBLong(image);
209 if ((MagickSizeType) ept_info.tiff_length > GetBlobSize(image))
210 ThrowReaderException(CorruptImageError,"InsufficientImageDataInFile");
211 (void) ReadBlobLSBShort(image);
212 ept_info.postscript=(unsigned char *) AcquireQuantumMemory(
213 ept_info.postscript_length+1,sizeof(*ept_info.postscript));
214 if (ept_info.postscript == (unsigned char *) NULL)
215 ThrowReaderException(ResourceLimitError,"MemoryAllocationFailed");
216 (void) memset(ept_info.postscript,0,(ept_info.postscript_length+1)*
217 sizeof(*ept_info.postscript));
218 ept_info.tiff=(unsigned char *) AcquireQuantumMemory(ept_info.tiff_length+1,
219 sizeof(*ept_info.tiff));
220 if (ept_info.tiff == (unsigned char *) NULL)
221 {
222 ept_info.postscript=(unsigned char *) RelinquishMagickMemory(
223 ept_info.postscript);
224 ThrowReaderException(ResourceLimitError,"MemoryAllocationFailed");
225 }
226 (void) memset(ept_info.tiff,0,(ept_info.tiff_length+1)*
227 sizeof(*ept_info.tiff));
228 offset=SeekBlob(image,ept_info.tiff_offset,SEEK_SET);
229 if ((ept_info.tiff_length != 0) && (offset < 30))
230 {
231 ept_info.tiff=(unsigned char *) RelinquishMagickMemory(ept_info.tiff);
232 ept_info.postscript=(unsigned char *) RelinquishMagickMemory(
233 ept_info.postscript);
234 ThrowReaderException(CorruptImageError,"ImproperImageHeader");
235 }
236 tiff_data=ReadBlobStream(image,ept_info.tiff_length,ept_info.tiff,&count);
237 if (count != (ssize_t) (ept_info.tiff_length))
238 (void) ThrowMagickException(exception,GetMagickModule(),CorruptImageWarning,
239 "InsufficientImageDataInFile","`%s'",image->filename);
240 offset=SeekBlob(image,ept_info.postscript_offset,SEEK_SET);
241 if ((ept_info.postscript_length != 0) && (offset < 30))
242 {
243 ept_info.tiff=(unsigned char *) RelinquishMagickMemory(ept_info.tiff);
244 ept_info.postscript=(unsigned char *) RelinquishMagickMemory(
245 ept_info.postscript);
246 ThrowReaderException(CorruptImageError,"ImproperImageHeader");
247 }
248 postscript_data=ReadBlobStream(image,ept_info.postscript_length,
249 ept_info.postscript,&count);
250 if (count != (ssize_t) (ept_info.postscript_length))
251 (void) ThrowMagickException(exception,GetMagickModule(),CorruptImageWarning,
252 "InsufficientImageDataInFile","`%s'",image->filename);
253 (void) CloseBlob(image);
254 image=DestroyImage(image);
255 read_info=CloneImageInfo(image_info);
256 (void) CopyMagickString(read_info->magick,"EPS",MagickPathExtent);
257 image=BlobToImage(read_info,postscript_data,ept_info.postscript_length,
258 exception);
259 if (image == (Image *) NULL)
260 {
261 (void) CopyMagickString(read_info->magick,"TIFF",MagickPathExtent);
262 image=BlobToImage(read_info,tiff_data,ept_info.tiff_length,exception);
263 }
264 read_info=DestroyImageInfo(read_info);
265 if (image != (Image *) NULL)
266 {
267 (void) CopyMagickString(image->filename,image_info->filename,
268 MagickPathExtent);
269 (void) CopyMagickString(image->magick,"EPT",MagickPathExtent);
270 }
271 ept_info.tiff=(unsigned char *) RelinquishMagickMemory(ept_info.tiff);
272 ept_info.postscript=(unsigned char *) RelinquishMagickMemory(
273 ept_info.postscript);
274 return(image);
275 }
276
277 /*
278 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
279 % %
280 % %
281 % %
282 % R e g i s t e r E P T I m a g e %
283 % %
284 % %
285 % %
286 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
287 %
288 % RegisterEPTImage() adds attributes for the EPT image format to
289 % the list of supported formats. The attributes include the image format
290 % tag, a method to read and/or write the format, whether the format
291 % supports the saving of more than one frame to the same file or blob,
292 % whether the format supports native in-memory I/O, and a brief
293 % description of the format.
294 %
295 % The format of the RegisterEPTImage method is:
296 %
297 % size_t RegisterEPTImage(void)
298 %
299 */
RegisterEPTImage(void)300 ModuleExport size_t RegisterEPTImage(void)
301 {
302 MagickInfo
303 *entry;
304
305 entry=AcquireMagickInfo("EPT","EPT",
306 "Encapsulated PostScript with TIFF preview");
307 entry->decoder=(DecodeImageHandler *) ReadEPTImage;
308 entry->encoder=(EncodeImageHandler *) WriteEPTImage;
309 entry->magick=(IsImageFormatHandler *) IsEPT;
310 entry->flags|=CoderDecoderSeekableStreamFlag;
311 entry->flags^=CoderAdjoinFlag;
312 entry->flags^=CoderBlobSupportFlag;
313 (void) RegisterMagickInfo(entry);
314 entry=AcquireMagickInfo("EPT","EPT2",
315 "Encapsulated PostScript Level II with TIFF preview");
316 entry->decoder=(DecodeImageHandler *) ReadEPTImage;
317 entry->encoder=(EncodeImageHandler *) WriteEPTImage;
318 entry->magick=(IsImageFormatHandler *) IsEPT;
319 entry->flags^=CoderAdjoinFlag;
320 entry->flags|=CoderDecoderSeekableStreamFlag;
321 entry->flags^=CoderBlobSupportFlag;
322 (void) RegisterMagickInfo(entry);
323 entry=AcquireMagickInfo("EPT","EPT3",
324 "Encapsulated PostScript Level III with TIFF preview");
325 entry->decoder=(DecodeImageHandler *) ReadEPTImage;
326 entry->encoder=(EncodeImageHandler *) WriteEPTImage;
327 entry->magick=(IsImageFormatHandler *) IsEPT;
328 entry->flags|=CoderDecoderSeekableStreamFlag;
329 entry->flags^=CoderBlobSupportFlag;
330 (void) RegisterMagickInfo(entry);
331 return(MagickImageCoderSignature);
332 }
333
334 /*
335 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
336 % %
337 % %
338 % %
339 % U n r e g i s t e r E P T I m a g e %
340 % %
341 % %
342 % %
343 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
344 %
345 % UnregisterEPTImage() removes format registrations made by the
346 % EPT module from the list of supported formats.
347 %
348 % The format of the UnregisterEPTImage method is:
349 %
350 % UnregisterEPTImage(void)
351 %
352 */
UnregisterEPTImage(void)353 ModuleExport void UnregisterEPTImage(void)
354 {
355 (void) UnregisterMagickInfo("EPT");
356 }
357
358 /*
359 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
360 % %
361 % %
362 % %
363 % W r i t e E P T I m a g e %
364 % %
365 % %
366 % %
367 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
368 %
369 % WriteEPTImage() writes an image in the Encapsulated Postscript format
370 % with a TIFF preview.
371 %
372 % The format of the WriteEPTImage method is:
373 %
374 % MagickBooleanType WriteEPTImage(const ImageInfo *image_info,
375 % Image *image,ExceptionInfo *exception)
376 %
377 % A description of each parameter follows.
378 %
379 % o image_info: the image info.
380 %
381 % o image: The image.
382 %
383 % o exception: return any errors or warnings in this structure.
384 %
385 */
WriteEPTImage(const ImageInfo * image_info,Image * image,ExceptionInfo * exception)386 static MagickBooleanType WriteEPTImage(const ImageInfo *image_info,Image *image,
387 ExceptionInfo *exception)
388 {
389 char
390 filename[MagickPathExtent];
391
392 EPTInfo
393 ept_info;
394
395 Image
396 *write_image;
397
398 ImageInfo
399 *write_info;
400
401 MagickBooleanType
402 status;
403
404 /*
405 Write EPT image.
406 */
407 assert(image_info != (const ImageInfo *) NULL);
408 assert(image_info->signature == MagickCoreSignature);
409 assert(image != (Image *) NULL);
410 assert(image->signature == MagickCoreSignature);
411 if (image->debug != MagickFalse)
412 (void) LogMagickEvent(TraceEvent,GetMagickModule(),"%s",image->filename);
413 assert(exception != (ExceptionInfo *) NULL);
414 assert(exception->signature == MagickCoreSignature);
415 status=OpenBlob(image_info,image,WriteBinaryBlobMode,exception);
416 if (status == MagickFalse)
417 return(status);
418 write_image=CloneImage(image,0,0,MagickTrue,exception);
419 if (write_image == (Image *) NULL)
420 return(MagickFalse);
421 write_info=CloneImageInfo(image_info);
422 (void) CopyMagickString(write_info->filename,"EPS:",MagickPathExtent);
423 (void) CopyMagickString(write_info->magick,"EPS",MagickPathExtent);
424 if (LocaleCompare(image_info->magick,"EPT2") == 0)
425 {
426 (void) CopyMagickString(write_info->filename,"EPS2:",MagickPathExtent);
427 (void) CopyMagickString(write_info->magick,"EPS2",MagickPathExtent);
428 }
429 if (LocaleCompare(image_info->magick,"EPT3") == 0)
430 {
431 (void) CopyMagickString(write_info->filename,"EPS3:",MagickPathExtent);
432 (void) CopyMagickString(write_info->magick,"EPS3",MagickPathExtent);
433 }
434 (void) memset(&ept_info,0,sizeof(ept_info));
435 ept_info.magick=0xc6d3d0c5ul;
436 ept_info.postscript=(unsigned char *) ImageToBlob(write_info,write_image,
437 &ept_info.postscript_length,exception);
438 write_image=DestroyImage(write_image);
439 write_info=DestroyImageInfo(write_info);
440 if (ept_info.postscript == (void *) NULL)
441 return(MagickFalse);
442 write_image=CloneImage(image,0,0,MagickTrue,exception);
443 if (write_image == (Image *) NULL)
444 return(MagickFalse);
445 write_info=CloneImageInfo(image_info);
446 (void) CopyMagickString(write_info->magick,"TIFF",MagickPathExtent);
447 (void) FormatLocaleString(filename,MagickPathExtent,"tiff:%s",
448 write_info->filename);
449 (void) CopyMagickString(write_info->filename,filename,MagickPathExtent);
450 if ((write_image->columns > 512) || (write_image->rows > 512))
451 {
452 Image
453 *resize_image;
454
455 resize_image=ResizeImage(write_image,512,512,write_image->filter,
456 exception);
457 if (resize_image != (Image *) NULL)
458 {
459 write_image=DestroyImage(write_image);
460 write_image=resize_image;
461 }
462 }
463 if ((write_image->storage_class == DirectClass) ||
464 (write_image->colors > 256))
465 {
466 QuantizeInfo
467 quantize_info;
468
469 /*
470 EPT preview requires that the image is colormapped.
471 */
472 GetQuantizeInfo(&quantize_info);
473 quantize_info.dither_method=IdentifyPaletteImage(write_image,
474 exception) == MagickFalse ? RiemersmaDitherMethod : NoDitherMethod;
475 (void) QuantizeImage(&quantize_info,write_image,exception);
476 }
477 write_info->compression=NoCompression;
478 ept_info.tiff=(unsigned char *) ImageToBlob(write_info,write_image,
479 &ept_info.tiff_length,exception);
480 write_image=DestroyImage(write_image);
481 write_info=DestroyImageInfo(write_info);
482 if (ept_info.tiff == (void *) NULL)
483 {
484 ept_info.postscript=(unsigned char *) RelinquishMagickMemory(
485 ept_info.postscript);
486 return(MagickFalse);
487 }
488 /*
489 Write EPT image.
490 */
491 (void) WriteBlobLSBLong(image,(unsigned int) ept_info.magick);
492 (void) WriteBlobLSBLong(image,30);
493 (void) WriteBlobLSBLong(image,(unsigned int) ept_info.postscript_length);
494 (void) WriteBlobLSBLong(image,0);
495 (void) WriteBlobLSBLong(image,0);
496 (void) WriteBlobLSBLong(image,(unsigned int) ept_info.postscript_length+30);
497 (void) WriteBlobLSBLong(image,(unsigned int) ept_info.tiff_length);
498 (void) WriteBlobLSBShort(image,0xffff);
499 (void) WriteBlob(image,ept_info.postscript_length,ept_info.postscript);
500 (void) WriteBlob(image,ept_info.tiff_length,ept_info.tiff);
501 /*
502 Relinquish resources.
503 */
504 ept_info.postscript=(unsigned char *) RelinquishMagickMemory(
505 ept_info.postscript);
506 ept_info.tiff=(unsigned char *) RelinquishMagickMemory(ept_info.tiff);
507 (void) CloseBlob(image);
508 return(MagickTrue);
509 }
510