2022-2023/tools/style/qrcode.dtx

3543 lines
114 KiB
TeX

% \iffalse meta-comment
%
% qrcode.ins
% Copyright 2014 by Anders O.F. Hendrickson (anders.hendrickson@snc.edu)
%
% This work may be distributed and/or modified under the
% conditions of the LaTeX Project Public License, either version 1.3
% of this license or (at your option) any later version.
% The latest version of this license is in
% http://www.latex-project.org/lppl.txt
% and version 1.3 or later is part of all distributions of LaTeX
% version 2005/12/01 or later.
%
% This work has the LPPL maintenance status `maintained'.
%
% The Current Maintainer of this work is Anders O.F. Hendrickson.
%
% This work consists of the files qrcode.dtx and qrcode.ins
% and the derived file qrcode.sty.
%
% \fi
%
% \iffalse
%<*driver>
\ProvidesFile{qrcode.dtx}
%</driver>
%<package>\NeedsTeXFormat{LaTeX2e}[1999/12/01]
%<package>\ProvidesPackage{qrcode}
%<*package>
[2015/01/08 v1.51 QR code generation]
%</package>
%
%<*driver>
\documentclass{ltxdoc}
\usepackage{hyperref}
\usepackage[nolinks]{qrcode}
\EnableCrossrefs
\CodelineIndex
\OnlyDescription
\RecordChanges
\begin{document}
\DocInput{qrcode.dtx}
\PrintChanges
%\PrintIndex
\end{document}
%</driver>
% \fi
%
% \CheckSum{0}
%
% \CharacterTable
% {Upper-case \A\B\C\D\E\F\G\H\I\J\K\L\M\N\O\P\Q\R\S\T\U\V\W\X\Y\Z
% Lower-case \a\b\c\d\e\f\g\h\i\j\k\l\m\n\o\p\q\r\s\t\u\v\w\x\y\z
% Digits \0\1\2\3\4\5\6\7\8\9
% Exclamation \! Double quote \" Hash (number) \#
% Dollar \$ Percent \% Ampersand \&
% Acute accent \' Left paren \( Right paren \)
% Asterisk \* Plus \+ Comma \,
% Minus \- Point \. Solidus \/
% Colon \: Semicolon \; Less than \<
% Equals \= Greater than \> Question mark \?
% Commercial at \@ Left bracket \[ Backslash \\
% Right bracket \] Circumflex \^ Underscore \_
% Grave accent \` Left brace \{ Vertical bar \|
% Right brace \} Tilde \~}
%
%
% \changes{v1.0}{2014/09/26}{Initial version}
% \changes{v1.5}{2015/01/08}{Added support for new lines and hyperlinks.}
% \changes{v1.51}{2015/01/14}{Bug fix.}
%
% \GetFileInfo{qrcode.sty}
%
% \DoNotIndex{\newcommand,\newenvironment,\def}
%
% \def\F{F}
%
% \title{The \textsf{qrcode} package: \\
% \makebox[0pt][r]{\raisebox{-0.3\height}[0pt][0pt]{\qrcode[hyperlink,tight]{http://ctan.org/pkg/qrcode}}\rule{0.75in}{0pt}}Quick Response code \\
% generation in \LaTeX\thanks{This document
% corresponds to \textsf{qrcode}~\fileversion, dated \filedate.}}
% \author{Anders Hendrickson\\ St.~Norbert College, De~Pere, WI, USA \\ \texttt{anders.hendrickson@snc.edu}}
% \date{January 8, 2015}
%
% \maketitle
%
%
% \section{Introduction}
%
% The proliferation of smartphones and tablets has led to the widespread
% use of Quick Response (QR) codes, which encode numeric, alphanumeric, kanji,
% or binary information into a square matrix of black and white pixels called modules.
% Although QR codes can encode any information up to almost three kilobytes,
% their most common use is as physical hyperlinks: a mobile device scans
% a printed QR code, decodes a URL, and automatically points a browser to that location.
%
% It is natural to want to include QR codes in certain \LaTeX\ documents;
% for example, one may want to direct the reader of a printed page to
% related interactive content online.
% Before now, the only \LaTeX\ package for producing QR codes was the
% immensely flexible {\tt pst-barcode}. As that package relies on
% {\tt pstricks}, however, it can be difficult to integrate with
% a pdf\LaTeX\ workflow,\footnote{%
% The {\tt auto-pst-pdf} or {\tt pstool} packages can make this possible
% by automatically running
% \LaTeX${}\rightarrow \tt dvips \rightarrow ps2pdf \rightarrow pdfcrop$
% for each barcode generated in {\tt pstricks},
% so long as the user is able and willing to enable {\tt\string\write18}
% in {\tt pdflatex} and install Perl.
% Judging by questions on {\tt tex.stackexchange.com} and {\tt latexcommunity.org},
% this is a significant hurdle for some users.
% Moreover, according to {\tt http://tex.stackexchange.com/questions/72876/}
% this workflow may have trouble if the QR code is in a header.}
% and a pdf\LaTeX\ user may not want the extra overhead just to produce a QR code.
% If one wants to avoid {\tt pstricks}, a Lua\TeX\ solution was proposed at
% {\tt http://tex.stackexchange.com/questions/89649/},
% and a plain\TeX\ solution can be found at
% {\catcode`\~=12\tt http://ktiml.mff.cuni.cz/~maj/QRcode.TeX},
% but until now no \LaTeX\ package had been available that did not call on outside machinery.
%
% The {\tt qrcode} package, in contrast, implements the QR code algorithm using
% only \TeX\ and \LaTeX\ commands, so it should work with any \LaTeX\ workflow.
% Because it draws the squares constituting a QR code using the \TeX\ primitive
% |\rule|, there is no need to load any graphics package whatsoever.
% For a user who merely wants a QR code, this is the simplest solution.
%
% \section{Usage}\label{sect:usage}
%
%
% \DescribeMacro{\qrcode}
% The package provides just one command, |\qrcode|, with the following syntax:
% \begin{center}
% |\qrcode|\oarg{options}\marg{text to be encoded}
% \end{center}
% For example, |\qrcode[hyperlink,height=0.5in]{http://www.ctan.org}| produces
% \begin{center}
% \qrcode[hyperlink,height=0.5in]{http://www.ctan.org}
% \end{center}
% Although the most common use of QR codes is as URLs,
% the \meta{text to be encoded} can be almost any typed text.
% The few exceptions to this are described in section \ref{sect:specialcharacters}.
%
% \subsection{Package Options}
%
% \DescribeMacro{nolinks}
% When the |hyperref| package is loaded,
% by default |\qrcode| assumes its argument is a URL
% and makes the QR code produced a hyperlink to that URL.
% This default behavior may be changed by invoking the |nolinks| package option.
% For example, most of the QR codes in this document are not in fact URLs,
% so this documentation was typeset with |\usepackage[nolinks]{qrcode}|.
% The |hyperlinks| option is an antonym to |nolinks| and is the default.
% These options have no effect if hyperref is not loaded.
%
% \DescribeMacro{draft}
% \DescribeMacro{final}
% Creating QR codes for short URLs takes relatively little time.\footnote{On
% this author's laptop, even a 60-character URL (version 4, level M) adds
% only about 0.7 seconds of compilation time.}
% Because \TeX\ was designed for typesetting, not for extensive computations,
% however, if many small QR codes or a single large one are required,
% the time spent can be quite noticeable. To save compilation
% time while working on a large document, calling the |draft| option
% causes the package not to compute QR codes, but merely to insert placeholder
% symbols with no data. The |final| option is an antonym to |draft|
% and is the default.
% \begin{quote}
% \begin{tabular}{p{1.25in}p{3.5in}}
% {\qrcode[draft,version=15]{http://www.tug.org}}
% &
% \begin{minipage}{3in}
% \tt
% |\documentclass{article}| \\
% |\usepackage[draft]{qrcode}| \\
% |\begin{document}| \\
% | \qrcode[version=15]{Dummy code}| \\
% |\end{document}|
% \end{minipage}
% \end{tabular}
% \end{quote}
% The placeholder symbol produced in {\tt draft} mode will have the same size
% and dimensions as the actual QR code.
%
% To conserve processing time, when |\qrcode| computes the binary matrix representing
% a QR code, it saves that binary data as a string of 1's and 0's
% both in a macro and in the {\tt .aux} file.
% Thus if the same QR code is desired later in the document, or upon the next
% run of \LaTeX, the QR symbol can be redrawn immediately from the saved binary data.
%
% \DescribeMacro{forget}
% There may be times when this is not desired; testing of this package is the chief
% example, but one might also have reason to believe that the {\tt .aux} file
% contains bad data.
% Invoking the |forget| package option causes |\qrcode| to calculate
% every QR code anew, even if a QR code for that \meta{text to be encoded}, level,
% and version
% was read from the {\tt .aux} file or was already computed earlier in the document.
%
% \subsection{Options}
% \DescribeMacro{\qrset}
% Several options affect the appearance and encoding of the QR code;
% {\tt qrcode} uses the {\tt xkeyval} package to handle the setting
% and processing of key-value pairs.
% The following options may either be given as optional arguments
% to |\qrcode| or changed within a \TeX-grouping using the
% macro |\qrset|.
% \begin{quote}
% \begin{tabular}{p{6cm}p{2in}}
% \qrcode{ABCD}
% {\qrset{height=1cm}%
% \qrcode{EFGH}}
% \qrcode{IJKL}
% &
% \begin{minipage}{3in}
% |\qrcode{ABCD}| \\
% |{\qrset{height=1cm}%| \\
% | \qrcode{EFGH}}| \\
% |\qrcode{IJKL}|
% \end{minipage}
% \end{tabular}
% \end{quote}
%
% \DescribeMacro{height}
% The |height=|\meta{dimen} key sets the printed height (and width) of the
% QR code. The default value is {\tt 2cm}.
% \begin{quote}
% \begin{tabular}{p{2in}p{2in}}
% \qrcode{ABCD} \qrcode[height=1cm]{ABCD}
% & |\qrcode{ABCD}| |\qrcode[height=1cm]{ABCD}|
% \end{tabular}
% \end{quote}
%
% \DescribeMacro{level}
% The QR code specification (ISO 18004:2006) includes four
% levels of encoding: Low, Medium, Quality, and High, in
% increasing order of error-correction capabaility.
% In general, for a given text a higher error-correction
% level requires more bits of information in the QR code.
% The key |level=|\meta{level specification}
% selects the minimum acceptable level.
% The \meta{level specification} may be |L|, |M|, |Q|, or |H|;
% the default is |M|.
% It may happen that the smallest QR code able to encode
% the specified text at the desired level
% is in fact large enough to provide a higher level of
% error-correction. If so, {\tt qrcode} automatically upgrades to the higher
% error-correction level, and a message is printed in the log file.
%
% \DescribeMacro{version}
% QR codes range in size from $21\times 21$ modules (``version 1'')
% to $177\times 177$ modules (``version 40''), in steps of 4 modules.
% The package automatically selects the smallest version large enough to encode
% the specified text at the desired error-correction level.
% Nevertheless, there might be occasions when a specific version is required;
% for example, perhaps a set of QR codes should have the same dimensions for
% aesthetic reasons, even though some encode shorter texts than others.
% For this reason, the key |version=|\meta{version specification} allows the user
% to specify a minimum version number, from 1 through 40, for the QR code.
% Setting |version=0| means ``as small as possible''; this is the default.
% If the desired version is not large enough to encode the text, the version
% will automatically be increased to accommodate the text, and a message will
% be placed in the log file.
% \begin{quote}
% \begin{tabular}{p{5.2cm}p{3in}}
% \raggedright
% \qrcode{ABCD}
% \qrcode[version=5]{ABCD}
% \medskip \\
% \qrcode[version=10]{ABCD}
% \qrcode[version=20]{ABCD}
% &
% \begin{minipage}{3in}
% |\qrcode{ABCD}| \\
% |\qrcode[version=5]{ABCD}| \\
% |\medskip \\| \\
% |\qrcode[version=10]{ABCD}| \\
% |\qrcode[version=20]{ABCD}|
% \end{minipage}
% \end{tabular}
% \end{quote}
%
%
% \DescribeMacro{tight}
% \DescribeMacro{padding}
% The QR specification states that a QR code should be surrounded by white\-space
% of a width equal to that of four modules. In many applications, a document
% author is likely to provide sufficient spacing anyway (e.g., by placing the
% QR code in a {\tt center} environment, header, or |\marginpar|), so by
% default the |qrcode| package adds no spacing. If the option |padding| is
% specified, however, the QR code will automatically be surrounded with 4 modules'
% worth of white\-space. The key |tight| is an antonym of |padding|; the default is |tight|.
%
% \DescribeMacro{link}
% \DescribeMacro{nolink}
% \DescribeMacro{\qrcode*}
% As described above, if the |hyperref| package is loaded,
% then the QR codes produced in a PDF document can be made
% into hyperlinks to their text. The default behavior
% can be controlled with the options |nolinks| and |hyperlinks|,
% but this default can be overridden for individual QR codes by invoking
% the options |link| or |nolink|.
% Moreover, the starred version of the macro, |\qrcode*|, is a shorthand
% equivalent to |\qrcode[nolink]|.
% \begin{quote}
% \begin{tabular}{p{5.2cm}p{3in}}
% \raggedright
% \qrset{link, height=1.5cm}
% \qrcode{http://www.ctan.org}
% \qrcode[nolink]{This is not a URL.}
% \qrcode*{Neither is this.}
% &
% \begin{minipage}{3in}
% |\qrset{link, height=1.5cm}| \\
% |\qrcode{http://www.ctan.org}| \\
% |\qrcode[nolink]{This is not a URL.}| \\
% |\qrcode*{Neither is this.}|
% \end{minipage}
% \end{tabular}
% \end{quote}
%
% \subsection{Special characters}\label{sect:specialcharacters}
% Many URLs can be processed by \TeX\ with no hiccups,
% but not infrequently a URL may contain the symbols |%|, |#|,
% |~|, |_|, and |&|. Moreover, QR codes need not just contain
% URL's, so a user may wish to encode text containing |^|, |$|, or spaces.
% The |qrcode| package offers two ways of coping with these special characters.
%
% First, the |\qrcode| command itself processes its \meta{text to be encoded}
% in a limited verbatim mode. The following characters will be encoded into
% the QR code as typed:
% \begin{center}
% |#| |$| |&| |^| |_| |~| |%| {\tt\char32}
% \end{center}
% and line breaks as well.\footnote{Technically, when the input character
% {\tt\char`\^\char`\^M} (CR, charcode 13) is encountered,
% the character {\tt\char`\^\char`\^J} (LF, charcode 10) is placed into the QR code.}
% Conspicuously absent from this list are |\|, |{|, and |}|.
% This is intentional, so that macros may be used within |\qrcode|
% to generate the \meta{text to be encoded} automatically.
% If these characters are desired, they may be obtained by ``escaping'' them
% with an extra backslash.
% \begin{quote}
% \begin{tabular}{p{2in}p{3in}}
% \qrset{height=1.5cm}%
% \qrcode{We can include #$&^_~%.}
% \def\foo{bar}%
% \qrcode{Set the \foo\ high.}
% \qrcode{We must escape \\emph\{this\}.}
% & \begin{minipage}{3in}
% |\qrset{height=1.5cm}%| \\
% |\qrcode{We can include #$&^_~%.}| \\
% |\def\foo{bar}%| \\
% |\qrcode{Set the \foo\ high.}| \\
% |\qrcode{We must escape \\emph\{this\}.}|
% \end{minipage}
% \end{tabular}
% \end{quote}
%
% As with all verbatim modes, however, because \TeX\ irrevocably sets catcodes
% when it first encounters characters, this will not work if the |\qrcode| macro
% is contained in another macro. If you call |\qrcode| inside an
% |\fbox| or a |\marginpar|, for example, and if your URL contains one of those
% special characters, you will either encounter error messages or (worse, because
% it is undetectable to the naked eye) have the wrong QR code typeset.
% In this scenario, you can still include any of the characters
% |#$&^_~%|{\tt\char32}|\{}|
% by escaping them with an extra backslash;
% so long as they eventually pass unexpanded to |\qrcode|,
% they will produce the correct QR code.
% A line break may be obtained with |\?|.
% \begin{quote}
% \begin{tabular}{p{1.5cm}p{2in}}
% \fbox{\qrcode[height=1cm]{\#\$\&\^\_\~\?\%\ \\\{\}}}
% & |\fbox{qrcode[height=1cm]{\#\$\&\^\_\~\?\%\ \\\{\}}}|
% \end{tabular}
% \end{quote}
%
% \section{Limitations and Cautions}
%
% \begin{itemize}
% \item The QR specification includes modes for encoding numeric, alphanumeric,
% or Kanji data more efficiently. This package does not (yet) offer
% those options.
% \item The QR specification offers ways to string lengthy data across multiple
% QR codes. This package does not implement that possibility.
% \end{itemize}
%
% \StopEventually{}
%
% \section{Implementation}
% \subsection{Key handling and options}
% \begin{macrocode}
%%PACKAGE LOADING
\RequirePackage{xcolor}%
\RequirePackage{xkeyval}%
%%INITIAL CODE
\newif\ifqr@draft@mode
\newif\ifqr@forget@mode
%%DECLARATION OF OPTIONS
\define@boolkey{qr}[qr@]{draft}[true]{\ifqr@draft\qr@draft@modetrue\else\qr@draft@modefalse\fi}%
\define@boolkey{qr}[qr@]{final}[true]{\ifqr@final\qr@draft@modefalse\else\qr@draft@modetrue\fi}%
\define@boolkey{qr}[qr@]{forget}[true]{\ifqr@forget\qr@forget@modetrue\else\qr@forget@modefalse\fi}%
\define@boolkey{qr}[qr@]{hyperlink}[true]{}% %This creates \ifqr@hyperlink.
\define@boolkey{qr}[qr@]{hyperlinks}[true]{\ifqr@hyperlinks\qr@hyperlinktrue\else\qr@hyperlinkfalse\fi}%
\define@boolkey{qr}[qr@]{link}[true]{\ifqr@link\qr@hyperlinktrue\else\qr@hyperlinkfalse\fi}%
\define@boolkey{qr}[qr@]{nolink}[true]{\ifqr@nolink\qr@hyperlinkfalse\else\qr@hyperlinktrue\fi}% %Make nolink an antonym.
\define@boolkey{qr}[qr@]{links}[true]{\ifqr@links\qr@hyperlinktrue\else\qr@hyperlinkfalse\fi}%
\define@boolkey{qr}[qr@]{nolinks}[true]{\ifqr@nolinks\qr@hyperlinkfalse\else\qr@hyperlinktrue\fi}% %Make nolinks an antonym.
%%EXECUTION OF OPTIONS
\qr@draft@modefalse
\qr@forget@modefalse
\qr@hyperlinktrue
\ProcessOptionsX<qr>
% \end{macrocode}
% \subsection{Utilities}
% \begin{macrocode}
%COUNTERS
\newcounter{qr@i}%
\newcounter{qr@j}%
\newcount\qr@a
\newcount\qr@b
\newcount\qr@c
%BASICS
\let\xa=\expandafter
%This is for messages.
\newlinechar=`\^^J
%Tests
\def\qr@relax{\relax}%
%Manipulating macros
\def\qr@preface@macro#1#2{%
% #1 = macro name
% #2 = text to add to front of macro
\def\qr@tempb{#2}%
\xa\xa\xa\def\xa\xa\xa#1\xa\xa\xa{\xa\qr@tempb #1}%
}%
\def\qr@g@preface@macro#1#2{%
% #1 = macro to be appended to
% #2 = code to add
\edef\qr@tempb{#2}%
\xa\xa\xa\gdef\xa\xa\xa#1\xa\xa\xa{\xa\qr@tempb#1}%
}
\def\qr@getstringlength#1{%
\bgroup
\qr@a=0%
\xdef\qr@thestring{#1}%
\xa\qr@stringlength@recursive\xa(\qr@thestring\relax\relax)%
\xdef\qr@stringlength{\the\qr@a}%
\egroup
}%
\def\qr@stringlength@recursive(#1#2){%
\def\qr@testi{#1}%
\ifx\qr@testi\qr@relax
%we are done.
\let\qr@next=\relax%
\else
\advance\qr@a by 1%
\def\qr@next{\qr@stringlength@recursive(#2)}%
\fi
\qr@next
}%
% \end{macrocode}
% \subsubsection{For-loop macro}
% We implement a macro |\qr@for| with the syntax
% \begin{center}
% |\qr@for| \meta{control sequence}=\meta{number} to \meta{number} by \meta{number} \marg{loop body}
% \end{center}
% The \meta{control sequence} becomes the loop variable,
% which is a \TeX\ counter.
% For example, |\qr@for \i=1 to 8 by 2 {\fbox{\number\i}}|
% produces {\makeatletter\qr@for \i=1 to 8 by 2 {\fbox{\number\i}}}.
% \begin{macrocode}
%The \qr@for@depth counter measures the depth of our loop.
%The outermost loop has depth zero.
\newcount\qr@for@depth%
\newcount\qr@for@maxdepth%
\qr@for@depth=0%
\qr@for@maxdepth=0%
%These counters are used in the qr@for loop.
\newcount\qr@for@start%
\newcount\qr@for@end%
\newcount\qr@for@step%
%Now a macro to get a new count for every depth as needed.
\def\qr@allocate@new@for@counter{%
\global\advance\qr@for@maxdepth by 1%
\newcount\qr@newforcount%
\xa\global\xa\let\csname qr@for@var@\the\qr@for@maxdepth\endcsname=\qr@newforcount%
}%
\newif\ifqr@loopshouldrun
%The extra # in the following definition makes sure #4 scoops up everything up to the next opening brace.
%This is needed so the step can include more than one character without being enclosed in braces itself.
\def\qr@for #1=#2to#3by#4#{%
\qr@for@int{#1}{#2}{#3}{#4}%
}%
\long\def\qr@for@int#1#2#3#4#5{%
\bgroup
%Because we're working within a TeX group,
%any values of \qr@for@start, \qr@for@end, and \qr@for@step from an outer loop
%will be restored after the \egroup.
%
%For the \qr@for@var itself, however, we need a different counter,
%because the user's text within the loop might need to access the variable from the outer loop.
\advance\qr@for@depth by 1\relax% This is a local change.
\ifnum\qr@for@depth>\qr@for@maxdepth%
%This is the first time we have gone to this depth of nesting!
%We should only be over by one.
\qr@allocate@new@for@counter%
\fi
% \showthe\qr@for@depth%
\xa\let\xa\qr@for@var\xa=\csname qr@for@var@\the\qr@for@depth\endcsname%
%Now \qr@for@var points to the same register as \qr@for@var@3 or something.
%The next line lets the user-level variable (e.g., \i or \j) point to the same count register.
\let#1=\qr@for@var%
%Now establish the looping parameters.
\edef\qr@for@start@text{#2}%
\edef\qr@for@end@text{#3}%
\edef\qr@for@step@text{#4}%
\def\qr@for@body{\bgroup #5\egroup}%
\xa\qr@for@start\qr@for@start@text\relax%
\xa\qr@for@end \qr@for@end@text\relax%
\xa\qr@for@step \qr@for@step@text\relax%
%
%Next, test whether the loop should run at all.
% * "\qr@for \i = 1 to 0 by 1" should fail.
% * "\qr@for \i = 3 to 5 by -1" should fail.
% * "\qr@for \i = 6 to 2 by 1" should fail.
% * "\qr@for \i = 4 to 4 by -1" should run.
% * "\qr@for \i = 4 to 4 by 1" should run.
% * "\qr@for \i = 5 to 7 by 0" should fail.
%The loop should fail if (step)=0 or if (step) and (end-start) have opposite signs.
%The loop will fail if (step=0) or (step)*(end-start)<0.
% TODO: "\qr@for \i = 5 to 5 by 0" should run (just one iteration).
\qr@loopshouldruntrue
\ifnum\qr@for@step=0\relax
\qr@loopshouldrunfalse
\fi
\qr@a=\qr@for@end%
\advance\qr@a by -\qr@for@start%
\multiply\qr@a by \qr@for@step%
\ifnum\qr@a<0\relax
\qr@loopshouldrunfalse
\fi
\ifqr@loopshouldrun
\qr@for@var=\qr@for@start%
\ifnum\qr@for@step>0\relax
\def\qr@for@recursive{%
\qr@for@body%
\advance\qr@for@var by \qr@for@step%
\ifnum\qr@for@var>\qr@for@end%
\let\qr@for@next=\relax%
\else%
\let\qr@for@next=\qr@for@recursive%
\fi%
\qr@for@next%
}%
\else
\def\qr@for@recursive{%
\qr@for@body%
\advance\qr@for@var by \qr@for@step%
\ifnum\qr@for@var<\qr@for@end%
\let\qr@for@next=\relax%
\else%
\let\qr@for@next=\qr@for@recursive%
\fi%
\qr@for@next%
}%
\fi
\qr@for@recursive%
\fi
\egroup
}%
% \end{macrocode}
% \subsubsection{Base conversions}
% \begin{macrocode}
\def\qr@padatfront#1#2{%
% #1 = macro containing text to pad
% #2 = desired number of characters
% Pads a number with initial zeros.
\qr@getstringlength{#1}%
\qr@a=\qr@stringlength\relax%
\advance\qr@a by 1\relax%
\qr@for \i = \qr@a to #2 by 1\relax%
{\qr@g@preface@macro{#1}{0}}%
}
\qr@a=-1\relax%
\def\qr@savehexsymbols(#1#2){%
\advance\qr@a by 1\relax%
\xa\def\csname qr@hexchar@\the\qr@a\endcsname{#1}%
\xa\edef\csname qr@hextodecimal@#1\endcsname{\the\qr@a}%
\ifnum\qr@a=15\relax
%Done.
\let\qr@next=\relax%
\else
\def\qr@next{\qr@savehexsymbols(#2)}%
\fi%
\qr@next%
}%
\qr@savehexsymbols(0123456789abcdef\relax\relax)%
\def\qr@decimaltobase#1#2#3{%
% #1 = macro to store result
% #2 = decimal representation of a positive integer
% #3 = new base
\bgroup
\edef\qr@newbase{#3}%
\gdef\qr@base@result{}%
\qr@a=#2\relax%
\qr@decimaltobase@recursive%
\xdef#1{\qr@base@result}%
\egroup
}
\def\qr@decimaltobase@recursive{%
\qr@b=\qr@a%
\divide\qr@b by \qr@newbase\relax
\multiply\qr@b by -\qr@newbase\relax
\advance\qr@b by \qr@a\relax%
\divide\qr@a by \qr@newbase\relax%
\ifnum\qr@b<10\relax
\edef\qr@newdigit{\the\qr@b}%
\else
\edef\qr@newdigit{\csname qr@hexchar@\the\qr@b\endcsname}%
\fi
\edef\qr@argument{{\noexpand\qr@base@result}{\qr@newdigit}}%
\xa\qr@g@preface@macro\qr@argument%
\ifnum\qr@a=0\relax
\relax
\else
\xa\qr@decimaltobase@recursive
\fi
}
\newcommand\qr@decimaltohex[3][0]{%
% #1 (opt.) = number of hex digits to create
% #2 = macro to store result
% #3 = decimal digits to convert
\qr@decimaltobase{#2}{#3}{16}%
\qr@padatfront{#2}{#1}%
}
\newcommand\qr@decimaltobinary[3][0]{%
% #1 (opt.) = number of bits to create
% #2 = macro to store result
% #3 = decimal digits to convert
\qr@decimaltobase{#2}{#3}{2}%
\qr@padatfront{#2}{#1}%
}
\qr@for \i = 0 to 15 by 1%
{%
\qr@decimaltohex[1]{\qr@hexchar}{\the\i}%
\qr@decimaltobinary[4]{\qr@bits}{\the\i}%
\xa\xdef\csname qr@b2h@\qr@bits\endcsname{\qr@hexchar}%
\xa\xdef\csname qr@h2b@\qr@hexchar\endcsname{\qr@bits}%
}%
\newcommand\qr@binarytohex[3][\relax]{%
% #1 (optional) = # digits desired
% #2 = macro to save to
% #3 = binary string (must be multiple of 4 bits)
\def\qr@test@i{#1}%
\ifx\qr@test@i\qr@relax%
%No argument specified
\def\qr@desireddigits{0}%
\else
\def\qr@desireddigits{#1}%
\fi
\gdef\qr@base@result{}%
\edef\qr@argument{(#3\relax\relax\relax\relax\relax)}%
\xa\qr@binarytohex@int\qr@argument%
\qr@padatfront{\qr@base@result}{\qr@desireddigits}%
\xdef#2{\qr@base@result}%
}
\def\qr@binarytohex@int(#1#2#3#4#5){%
% #1#2#3#4 = 4 bits
% #5 = remainder, including \relax\relax\relax\relax\relax terminator
\def\qr@test@i{#1}%
\ifx\qr@test@i\qr@relax%
%Done.
\def\qr@next{\relax}%
\else%
\xdef\qr@base@result{\qr@base@result\csname qr@b2h@#1#2#3#4\endcsname}%
\def\qr@next{\qr@binarytohex@int(#5)}%
\fi%
\qr@next%
}
\newcommand\qr@hextobinary[3][\relax]{%
% #1 (optional) = # bits desired
% #2 = macro to save to
% #3 = hexadecimal string
\bgroup
\def\qr@test@i{#1}%
\ifx\qr@test@i\qr@relax%
%No argument specified
\def\qr@desireddigits{0}%
\else
\def\qr@desireddigits{#1}%
\fi
\gdef\qr@base@result{}%
\edef\qr@argument{(#3\relax\relax)}%
\xa\qr@hextobinary@int\qr@argument%
\qr@padatfront{\qr@base@result}{\qr@desireddigits}%
\xdef#2{\qr@base@result}%
\egroup
}
\def\qr@hextobinary@int(#1#2){%
% #1 = hexadecimal character
% #2 = remainder, including \relax\relax terminator
\def\qr@test@@i{#1}%
\ifx\qr@test@@i\qr@relax%
%Done.
\def\qr@next{\relax}%
\else%
\xdef\qr@base@result{\qr@base@result\csname qr@h2b@#1\endcsname}%
\def\qr@next{\qr@hextobinary@int(#2)}%
\fi%
\qr@next%
}
\def\qr@hextodecimal#1#2{%
\edef\qr@argument{#2}%
\xa\qr@a\xa=\xa\number\xa"\qr@argument\relax%
\edef#1{\the\qr@a}%
}
\def\qr@hextodecimal#1#2{%
% #1 = macro to store result
% #2 = hexadecimal representation of a positive integer
\bgroup
\qr@a=0\relax%
\edef\qr@argument{(#2\relax)}%
\xa\qr@hextodecimal@recursive\qr@argument%
\xdef#1{\the\qr@a}%
\egroup
}
\def\qr@hextodecimal@recursive(#1#2){%
% #1 = first hex char
% #2 = remainder
\advance \qr@a by \csname qr@hextodecimal@#1\endcsname\relax%
\edef\qr@testii{#2}%
\ifx\qr@testii\qr@relax%
%Done.
\let\qr@next=\relax%
\else
%There's at least one more digit.
\multiply\qr@a by 16\relax
\edef\qr@next{\noexpand\qr@hextodecimal@recursive(#2)}%
\fi%
\qr@next%
}
% \end{macrocode}
% \subsubsection{Catcode setup}
% \begin{macrocode}
%The following catcode trickery creates special characters
%with catcode 12 (other) for use in our verbatim handling.
{\catcode`\ =12\relax\gdef\qr@otherspace{ }}%
{\catcode`\%=12\relax\gdef\qr@otherpercent{%}}%
{\catcode`\#=12\relax\gdef\qr@otherpound{#}}%
{\catcode`\|=0\relax|catcode`|\=12|relax|gdef|qr@otherbackslash{\}}%
{\catcode`\^^J=12\relax\gdef\qr@otherlf{^^J}}%
\bgroup
\catcode`\<=1\relax
\catcode`\>=2\relax
\catcode`\{=12\relax\gdef\qr@otherleftbrace<{>%
\catcode`\}=12\relax\gdef\qr@otherrightbrace<}>%
\egroup%
{\catcode`\&=12\relax\gdef\qr@otherampersand{&}}%
{\catcode`\~=12\relax\gdef\qr@othertilde{~}}%
{\catcode`\^=12\relax\gdef\qr@othercaret{^}}%
{\catcode`\_=12\relax\gdef\qr@otherunderscore{_}}%
{\catcode`\$=12\relax\gdef\qr@otherdollar{$}}%
%Line feeds require some special handling. \TeX\ reads a line feed in the input
%as |^^M| (carriage return, character code 13), but it should be encoded in a
%QR code as |^^J| (line feed, character code 10).
%To do this, we make |^^M| an active character and a synonym for a |^^J| with catcode 12.
%Note that the macro |\qr@verbatimlinefeeds| must itself be processed with |^^M| active.
{\catcode`\^^M=13\relax\gdef\qr@verbatimlinefeeds{\let^^M=\qr@otherlf}}
\def\qr@verbatimcatcodes{%
\catcode`\#=12\relax
\catcode`\$=12\relax
\catcode`\&=12\relax
\catcode`\^=12\relax
\catcode`\_=12\relax
\catcode`\~=12\relax
\catcode`\%=12\relax
\catcode`\ =12\relax
\catcode`\^^M=13\relax\qr@verbatimlinefeeds}%
\def\qr@setescapedspecials{%
\let\ =\qr@otherspace%
\let\%=\qr@otherpercent%
\let\#=\qr@otherpound%
\let\&=\qr@otherampersand%
\let\^=\qr@othercaret%
\let\_=\qr@otherunderscore%
\let\~=\qr@othertilde%
\let\$=\qr@otherdollar%
\let\\=\qr@otherbackslash%
\let\{=\qr@otherleftbrace%
\let\}=\qr@otherrightbrace%
\let\?=\qr@otherlf%
}%
% \end{macrocode}
% \subsection{Plotting}
% \begin{macrocode}
\def\qr@creatematrix#1{%
\xa\gdef\csname #1\endcsname##1##2{%
\csname #1@##1@##2\endcsname
}%
}%
\def\qr@storetomatrix#1#2#3#4{%
% #1 = matrix name
% #2 = row number
% #3 = column number
% #4 = value of matrix entry
\xa\gdef\csname #1@#2@#3\endcsname{#4}%
}%
\def\qr@estoretomatrix#1#2#3#4{%
% This version performs exactly one expansion on #4.
% #1 = matrix name
% #2 = row number
% #3 = column number
% #4 = value of matrix
\xa\xa\xa\gdef\xa\xa\csname #1@#2@#3\endcsname\xa{#4}%
}%
\def\qr@matrixentry#1#2#3{%
% #1 = matrix name
% #2 = row number
% #3 = column number
\csname #1@#2@#3\endcsname%
}%
\def\qr@createsquareblankmatrix#1#2{%
\qr@creatematrix{#1}%
\xa\gdef\csname #1@numrows\endcsname{#2}%
\xa\gdef\csname #1@numcols\endcsname{#2}%
\qr@for \i = 1 to #2 by 1%
{\qr@for \j = 1 to #2 by 1%
{\qr@storetomatrix{#1}{\the\i}{\the\j}{\qr@blank}}}%
}%
\def\qr@numberofrowsinmatrix#1{%
\csname #1@numrows\endcsname%
}%
\def\qr@numberofcolsinmatrix#1{%
\csname #1@numcols\endcsname%
}%
\def\qr@setnumberofrows#1#2{%
\xa\xdef\csname #1@numrows\endcsname{#2}%
}%
\def\qr@setnumberofcols#1#2{%
\xa\xdef\csname #1@numcols\endcsname{#2}%
}%
\newlength\qr@desiredheight
\setlength\qr@desiredheight{2cm}%
\newlength\qr@modulesize
\newlength\qr@minipagewidth
\def\qr@printmatrix#1{%
\def\qr@black{\rule{\qr@modulesize}{\qr@modulesize}}%
\def\qr@white{\rule{\qr@modulesize}{0pt}}%
\def\qr@black@fixed{\rule{\qr@modulesize}{\qr@modulesize}}%
\def\qr@white@fixed{\rule{\qr@modulesize}{0pt}}%
\def\qr@black@format{\rule{\qr@modulesize}{\qr@modulesize}}%
\def\qr@white@format{\rule{\qr@modulesize}{0pt}}%
%Set module size
\setlength{\qr@modulesize}{\qr@desiredheight}%
\divide\qr@modulesize by \qr@size\relax%
%
\setlength{\qr@minipagewidth}{\qr@modulesize}%
\multiply\qr@minipagewidth by \qr@size\relax%
\ifqr@tight
\else
\advance\qr@minipagewidth by 8\qr@modulesize%
\fi
\begin{minipage}{\qr@minipagewidth}%
\baselineskip=\qr@modulesize%
\ifqr@tight\else\rule{0pt}{4\qr@modulesize}\par\fi% %Blank space at top.
\qr@for \i = 1 to \qr@numberofrowsinmatrix{#1} by 1%
{\ifqr@tight\else\rule{4\qr@modulesize}{0pt}\fi% %Blank space at left.
\qr@for \j = 1 to \qr@numberofcolsinmatrix{#1} by 1%
{\qr@matrixentry{#1}{\the\i}{\the\j}}%
\par}%
\ifqr@tight\else\rule{0pt}{4\qr@modulesize}\par\fi%
\end{minipage}%
}%
\def\qr@printsavedbinarymatrix#1{%
\edef\qr@binarystring{#1\relax\relax}%
%Set module size
\setlength{\qr@modulesize}{\qr@desiredheight}%
\divide\qr@modulesize by \qr@size\relax%
%
\setlength{\qr@minipagewidth}{\qr@modulesize}%
\multiply\qr@minipagewidth by \qr@size\relax%
\ifqr@tight
\else
\advance\qr@minipagewidth by 8\qr@modulesize%
\fi
\begin{minipage}{\qr@minipagewidth}%
\baselineskip=\qr@modulesize%
\ifqr@tight\else\rule{0pt}{4\qr@modulesize}\par\fi% %Blank space at top.
\qr@for \i = 1 to \qr@size by 1%
{\ifqr@tight\else\rule{4\qr@modulesize}{0pt}\fi% %Blank space at left.
\qr@for \j = 1 to \qr@size by 1%
{\edef\qr@theargument{(\qr@binarystring)}%
\xa\qr@printsavedbinarymatrix@int\qr@theargument
}%
\par}%
\ifqr@tight\else\rule{0pt}{4\qr@modulesize}\par\fi%
\end{minipage}%
}%
\def\qr@printsavedbinarymatrix@int(#1#2){%
% #1 = first bit, either 1 or 0.
% #2 = remainder of string, terminating with \relax\relax
% There's no need to check for EOF here, because
% we'll only call this n^2 times.
\ifcase #1\relax
\rule{\qr@modulesize}{0pt}% % 0: white square
\or
\rule{\qr@modulesize}{\qr@modulesize}% % 1: black square
\fi
\xdef\qr@binarystring{#2}%
}%
\def\qr@createliteralmatrix#1#2#3{%
% #1 = matrix name
% #2 = m, the number of rows and columns in the square matrix
% #3 = a string of m^2 tokens to be written into the matrix
\qr@creatematrix{#1}%
\xa\xdef\csname #1@numrows\endcsname{#2}%
\xa\xdef\csname #1@numcols\endcsname{#2}%
\gdef\qr@literalmatrix@tokens{#3}%
\qr@for \i = 1 to #2 by 1%
{\qr@for \j = 1 to #2 by 1%
{\xa\qr@createliteralmatrix@int\xa(\qr@literalmatrix@tokens)%
\qr@estoretomatrix{#1}{\the\i}{\the\j}{\qr@entrytext}%
}%
}%
}
\def\qr@createliteralmatrix@int(#1#2){%
\def\qr@entrytext{#1}%
\gdef\qr@literalmatrix@tokens{#2}%
}
\qr@createliteralmatrix{finderpattern}{8}{%
\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@white@fixed%
\qr@black@fixed\qr@white@fixed\qr@white@fixed\qr@white@fixed\qr@white@fixed\qr@white@fixed\qr@black@fixed\qr@white@fixed%
\qr@black@fixed\qr@white@fixed\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@white@fixed\qr@black@fixed\qr@white@fixed%
\qr@black@fixed\qr@white@fixed\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@white@fixed\qr@black@fixed\qr@white@fixed%
\qr@black@fixed\qr@white@fixed\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@white@fixed\qr@black@fixed\qr@white@fixed%
\qr@black@fixed\qr@white@fixed\qr@white@fixed\qr@white@fixed\qr@white@fixed\qr@white@fixed\qr@black@fixed\qr@white@fixed%
\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@white@fixed%
\qr@white@fixed\qr@white@fixed\qr@white@fixed\qr@white@fixed\qr@white@fixed\qr@white@fixed\qr@white@fixed\qr@white@fixed%
}%
\qr@createliteralmatrix{alignmentpattern}{5}{%
\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@black@fixed%
\qr@black@fixed\qr@white@fixed\qr@white@fixed\qr@white@fixed\qr@black@fixed%
\qr@black@fixed\qr@white@fixed\qr@black@fixed\qr@white@fixed\qr@black@fixed%
\qr@black@fixed\qr@white@fixed\qr@white@fixed\qr@white@fixed\qr@black@fixed%
\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@black@fixed\qr@black@fixed%
}%
\def\qr@copymatrixentry#1#2#3#4#5#6{%
% Copy the (#2,#3) entry of matrix #1
% to the (#5,#6) position of matrix #4.
\xa\xa\xa\global%
\xa\xa\xa\let\xa\xa\csname #4@#5@#6\endcsname%
\csname #1@#2@#3\endcsname%
}%
\def\qr@createduplicatematrix#1#2{%
% #1 = name of copy
% #2 = original matrix to be copied
\qr@creatematrix{#1}%
\qr@for \i = 1 to \qr@numberofrowsinmatrix{#2} by 1%
{\qr@for \j = 1 to \qr@numberofcolsinmatrix{#2} by 1%
{\qr@copymatrixentry{#2}{\the\i}{\the\j}{#1}{\the\i}{\the\j}%
}%
}%
\qr@setnumberofrows{#1}{\qr@numberofrowsinmatrix{#2}}%
\qr@setnumberofcols{#1}{\qr@numberofcolsinmatrix{#2}}%
}%
\def\qr@placefinderpattern@int#1#2#3#4#5{%
% Work on matrix #1.
% Start in position (#2, #3) -- should be a corner
% #4 indicates horizontal direction (1=right, -1=left)
% #5 indicates vertical direction (1=down, -1=up)
%
% In this code, \sourcei and \sourcej are TeX counts working through the finderpattern matrix,
% and i and j are LaTeX counters indicating positions in the big matrix.
\setcounter{qr@i}{#2}%
\qr@for \sourcei=1 to 8 by 1%
{\setcounter{qr@j}{#3}%
\qr@for \sourcej=1 to 8 by 1%
{\qr@copymatrixentry{finderpattern}{\the\sourcei}{\the\sourcej}%
{#1}{\theqr@i}{\theqr@j}%
\addtocounter{qr@j}{#5}%
}%
\addtocounter{qr@i}{#4}%
}%
}%
\def\qr@placefinderpatterns#1{%
% #1=matrix name
\qr@placefinderpattern@int{#1}{1}{1}{1}{1}%
\qr@placefinderpattern@int{#1}{\qr@numberofrowsinmatrix{#1}}{1}{-1}{1}%
\qr@placefinderpattern@int{#1}{1}{\qr@numberofcolsinmatrix{#1}}{1}{-1}%
}%
\def\qr@placetimingpatterns#1{%
%Set \qr@endingcol to n-8.
\qr@a=\qr@size\relax%
\advance\qr@a by -8\relax%
\edef\qr@endingcol{\the\qr@a}%
\qr@for \j = 9 to \qr@endingcol by 1%
{\ifodd\j\relax%
\qr@storetomatrix{#1}{7}{\the\j}{\qr@black@fixed}%
\qr@storetomatrix{#1}{\the\j}{7}{\qr@black@fixed}%
\else%
\qr@storetomatrix{#1}{7}{\the\j}{\qr@white@fixed}%
\qr@storetomatrix{#1}{\the\j}{7}{\qr@white@fixed}%
\fi%
}%
}%
\def\qr@placealignmentpattern@int#1#2#3{%
% Work on matrix #1.
% Write an alignment pattern into the matrix, centered on (#2,#3).
\qr@a=#2\relax%
\advance\qr@a by -2\relax%
\qr@b=#3\relax%
\advance\qr@b by -2\relax%
\setcounter{qr@i}{\the\qr@a}%
\qr@for \i=1 to 5 by 1%
{\setcounter{qr@j}{\the\qr@b}%
\qr@for \j=1 to 5 by 1%
{\qr@copymatrixentry{alignmentpattern}{\the\i}{\the\j}%
{#1}{\theqr@i}{\theqr@j}%
\stepcounter{qr@j}%
}%
\stepcounter{qr@i}%
}%
}%
\newif\ifqr@incorner%
\def\qr@placealignmentpatterns#1{%
%There are k^2-3 alignment patterns,
%arranged in a (k x k) grid within the matrix.
%They begin in row 7, column 7,
%except that the ones in the NW, NE, and SW corners
%are omitted because of the finder patterns.
%Recall that
% * \qr@k stores k,
% * \qr@alignment@firstskip stores how far between the 1st and 2nd row/col, &
% * \qr@alignment@generalskip stores how far between each subsequent row/col.
\xa\ifnum\qr@k>0\relax
%There will be at least one alignment pattern.
%N.B. k cannot equal 1.
\xa\ifnum\qr@k=2\relax
% 2*2-3 = exactly 1 alignment pattern.
\qr@a=7\relax
\advance\qr@a by \qr@alignment@firstskip\relax
\xdef\qr@target@ii{\the\qr@a}%
\qr@placealignmentpattern@int{#1}{\qr@target@ii}{\qr@target@ii}%
\else
% k is at least 3, so the following loops should be safe.
\xdef\qr@target@ii{7}%
\qr@for \ii = 1 to \qr@k by 1%
{\ifcase\ii\relax%
\relax% \ii should never equal 0.
\or
\xdef\qr@target@ii{7}% If \ii = 1, we start in row 7.
\or
%If \ii = 2, we add the firstskip.
\qr@a=\qr@target@ii\relax%
\advance\qr@a by \qr@alignment@firstskip\relax%
\xdef\qr@target@ii{\the\qr@a}%
\else
%If \ii>2, we add the generalskip.
\qr@a=\qr@target@ii\relax%
\advance\qr@a by \qr@alignment@generalskip\relax%
\xdef\qr@target@ii{\the\qr@a}%
\fi
\qr@for \jj = 1 to \qr@k by 1%
{\ifcase\jj\relax%
\relax% \jj should never equal 0.
\or
\xdef\qr@target@jj{7}% If \jj=1, we start in row 7.
\or
%If \jj=2, we add the firstskip.
\qr@a=\qr@target@jj\relax%
\advance\qr@a by \qr@alignment@firstskip%
\xdef\qr@target@jj{\the\qr@a}%
\else
%If \jj>2, we add the generalskip.
\qr@a=\qr@target@jj\relax%
\advance\qr@a by \qr@alignment@generalskip%
\xdef\qr@target@jj{\the\qr@a}%
\fi
\qr@incornerfalse%
\ifnum\ii=1\relax
\ifnum\jj=1\relax
\qr@incornertrue
\else
\ifnum\qr@k=\jj\relax
\qr@incornertrue
\fi
\fi
\else
\xa\ifnum\qr@k=\ii\relax
\ifnum\jj=1\relax
\qr@incornertrue
\fi
\fi
\fi
\ifqr@incorner
\relax
\else
\qr@placealignmentpattern@int{#1}{\qr@target@ii}{\qr@target@jj}%
\fi
}% ends \qr@for \jj
}% ends \qr@for \ii
\fi
\fi
}%
\def\qr@placedummyformatpatterns#1{%
\qr@for \j = 1 to 9 by 1%
{\ifnum\j=7\relax%
\else%
\qr@storetomatrix{#1}{9}{\the\j}{\qr@format@square}%
\qr@storetomatrix{#1}{\the\j}{9}{\qr@format@square}%
\fi%
}%
\setcounter{qr@j}{\qr@size}%
\qr@for \j = 1 to 8 by 1%
{\qr@storetomatrix{#1}{9}{\theqr@j}{\qr@format@square}%
\qr@storetomatrix{#1}{\theqr@j}{9}{\qr@format@square}%
\addtocounter{qr@j}{-1}%
}%
%Now go back and change the \qr@format@square in (n-8,9) to \qr@black@fixed.
\addtocounter{qr@j}{1}%
\qr@storetomatrix{#1}{\theqr@j}{9}{\qr@black@fixed}%
}%
\def\qr@placedummyversionpatterns#1{%
\xa\ifnum\qr@version>6\relax
%Must include version information.
\global\c@qr@i=\qr@size%
\global\advance\c@qr@i by -10\relax%
\qr@for \i = 1 to 3 by 1%
{\qr@for \j = 1 to 6 by 1%
{\qr@storetomatrix{#1}{\theqr@i}{\the\j}{\qr@format@square}%
\qr@storetomatrix{#1}{\the\j}{\theqr@i}{\qr@format@square}%
}%
\stepcounter{qr@i}%
}%
\fi
}%
\def\qr@writebit(#1#2)#3{%
% #3 = matrix name
% (qr@i,qr@j) = position to write in (LaTeX counters)
% #1 = bit to be written
% #2 = remaining bits plus '\relax' as an end-of-file marker
\edef\qr@datatowrite{#2}%
\ifnum#1=1
\qr@storetomatrix{#3}{\theqr@i}{\theqr@j}{\qr@black}%
\else
\qr@storetomatrix{#3}{\theqr@i}{\theqr@j}{\qr@white}%
\fi
}%
\newif\ifqr@rightcol
\newif\ifqr@goingup
\def\qr@writedata@hex#1#2{%
% #1 = name of a matrix that has been prepared with finder patterns, timing patterns, etc.
% #2 = a string consisting of bytes to write into the matrix, in two-char hex format.
\setcounter{qr@i}{\qr@numberofrowsinmatrix{#1}}%
\setcounter{qr@j}{\qr@numberofcolsinmatrix{#1}}%
\qr@rightcoltrue%
\qr@goinguptrue%
\edef\qr@argument{{#1}(#2\relax\relax\relax)}%
\xa\qr@writedata@hex@recursive\qr@argument%
}%
\def\qr@writedata@hex@recursive#1(#2#3#4){%
% #1 = name of a matrix that has been prepared with finder patterns, timing patterns, etc.
% (qr@i,qr@j) = position to write in LaTeX counters
% #2#3#4 contains the hex codes of the bytes to be written, plus \relax\relax\relax
% as an end-of-file marker
\edef\qr@testii{#2}%
\ifx\qr@testii\qr@relax%
% #2 is \relax, so there is nothing more to write.
\relax
\let\qr@next=\relax
\else
% #2 is not \relax, so there is another byte to write.
\qr@hextobinary[8]{\bytetowrite}{#2#3}%
\xdef\qr@datatowrite{\bytetowrite\relax}% %Add terminating "\relax"
\qr@writedata@recursive{#1}% %This function actually writes the 8 bits.
\edef\qr@argument{{#1}(#4)}%
\xa\def\xa\qr@next\xa{\xa\qr@writedata@hex@recursive\qr@argument}% %Call self to write the next bit.
\fi
\qr@next
}%
\def\qr@writedata#1#2{%
% #1 = name of a matrix that has been prepared with finder patterns, timing patterns, etc.
% #2 = a string consisting of 0's and 1's to write into the matrix.
\setcounter{qr@i}{\qr@numberofrowsinmatrix{#1}}%
\setcounter{qr@j}{\qr@numberofcolsinmatrix{#1}}%
\qr@rightcoltrue
\qr@goinguptrue
\edef\qr@datatowrite{#2\relax}%
\qr@writedata@recursive{#1}%
}%
\def\qr@@blank{\qr@blank}%
\def\qr@writedata@recursive#1{%
% #1 = matrix name
% (qr@i,qr@j) = position to write in (LaTeX counters)
% \qr@datatowrite contains the bits to be written, plus '\relax' as an end-of-file marker
\xa\let\xa\squarevalue\csname #1@\theqr@i @\theqr@j\endcsname%
\ifx\squarevalue\qr@@blank
%Square is blank, so write data in it.
\xa\qr@writebit\xa(\qr@datatowrite){#1}%
%The \qr@writebit macro not only writes the first bit of \qr@datatowrite into the matrix,
%but also removes the bit from the 'bitstream' of \qr@datatowrite.
\fi
%Now adjust our position in the matrix.
\ifqr@rightcol
%From the right-hand half of the two-bit column, we always move left. Easy peasy.
\addtocounter{qr@j}{-1}%
\qr@rightcolfalse
\else
%If we're in the left-hand column, things are harder.
\ifqr@goingup
%First, suppose we're going upwards.
\ifnum\c@qr@i>1\relax%
%If we're not in the first row, things are easy.
%We move one to the right and one up.
\addtocounter{qr@j}{1}%
\addtocounter{qr@i}{-1}%
\qr@rightcoltrue
\else
%If we are in the first row, then we move to the left,
%and we are now in the right-hand column on a downward pass.
\addtocounter{qr@j}{-1}%
\qr@goingupfalse
\qr@rightcoltrue
\fi
\else
%Now, suppose we're going downwards.
\xa\ifnum\qr@size>\c@qr@i\relax%
%If we're not yet in the bottom row, things are easy.
%We move one to the right and one down.
\addtocounter{qr@j}{1}%
\addtocounter{qr@i}{1}%
\qr@rightcoltrue
\else
%If we are in the bottom row, then we move to the left,
%and we are now in the right-hand column on an upward pass.
\addtocounter{qr@j}{-1}%
\qr@rightcoltrue
\qr@goinguptrue
\fi
\fi
%One problem: what if we just moved into the 7th column?
%Das ist verboten.
%If we just moved (left) into the 7th column, we should move on into the 6th column.
\ifnum\c@qr@j=7\relax%
\setcounter{qr@j}{6}%
\fi
\fi
%Now check whether there are any more bits to write.
\ifx\qr@datatowrite\qr@relax
% \qr@datatowrite is just `\relax', so we're done.
\let\qr@next=\relax
\relax
\else
% Write some more!
\def\qr@next{\qr@writedata@recursive{#1}}%
\fi
\qr@next
}%
\def\qr@writeremainderbits#1{%
% #1 = name of a matrix that has been prepared and partly filled.
% (qr@i,qr@j) = position to write in LaTeX counters
\xa\ifnum\qr@numremainderbits>0\relax
\def\qr@datatowrite{}%
\qr@for \i = 1 to \qr@numremainderbits by 1%
{\g@addto@macro{\qr@datatowrite}{0}}%
\g@addto@macro{\qr@datatowrite}{\relax}% terminator
\qr@writedata@recursive{#1}%
\fi
}%
\newif\ifqr@cellinmask
\def\qr@setmaskingfunction#1{%
% #1 = 1 decimal digit for the mask. (I see no reason to use the 3-bit binary code.)
% The current position is (\themaski,\themaskj), with indexing starting at 0.
\edef\qr@maskselection{#1}%
\xa\ifcase\qr@maskselection\relax
%Case 0: checkerboard
\def\qr@parsemaskingfunction{%
% Compute mod(\themaski+\themaskj,2)%
\qr@a=\c@maski%
\advance\qr@a by \c@maskj%
\qr@b=\qr@a%
\divide\qr@b by 2%
\multiply\qr@b by 2%
\advance\qr@a by -\qr@b%
\edef\qr@maskfunctionresult{\the\qr@a}%
}%
\or
%Case 1: horizontal stripes
\def\qr@parsemaskingfunction{%
% Compute mod(\themaski,2)%
\ifodd\c@maski\relax%
\def\qr@maskfunctionresult{1}%
\else%
\def\qr@maskfunctionresult{0}%
\fi%
}%
\or
%Case 2: vertical stripes
\def\qr@parsemaskingfunction{%
% Compute mod(\themaskj,3)%
\qr@a=\c@maskj%
\divide\qr@a by 3%
\multiply\qr@a by 3%
\advance\qr@a by -\c@maskj%
\edef\qr@maskfunctionresult{\the\qr@a}%
}%
\or
%Case 3: diagonal stripes
\def\qr@parsemaskingfunction{%
% Compute mod(\themaski+\themaskj,3)%
\qr@a=\c@maski%
\advance\qr@a by \c@maskj%
\qr@b=\qr@a%
\divide\qr@b by 3%
\multiply\qr@b by 3%
\advance\qr@b by -\qr@a%
\edef\qr@maskfunctionresult{\the\qr@b}%
}%
\or
%Case 4: wide checkerboard
\def\qr@parsemaskingfunction{%
% Compute mod(floor(\themaski/2) + floor(\themaskj/3),2) %
\qr@a=\c@maski%
\divide\qr@a by 2%
\qr@b=\c@maskj%
\divide\qr@b by 3%
\advance\qr@a by \qr@b%
\qr@b=\qr@a%
\divide\qr@a by 2%
\multiply\qr@a by 2%
\advance\qr@a by -\qr@b%
\edef\qr@maskfunctionresult{\the\qr@a}%
}%
\or
%Case 5: quilt
\def\qr@parsemaskingfunction{%
% Compute mod(\themaski*\themaskj,2) + mod(\themaski*\themaskj,3) %
\qr@a=\c@maski%
\multiply\qr@a by \c@maskj%
\qr@b=\qr@a%
\qr@c=\qr@a%
\divide\qr@a by 2%
\multiply\qr@a by 2%
\advance\qr@a by -\qr@c% (result will be -mod(i*j,2), which is negative.)
\divide\qr@b by 3%
\multiply\qr@b by 3%
\advance\qr@b by -\qr@c% (result will be -mod(i*j,3), which is negative.)
\advance\qr@a by \qr@b% (result is negative of what's in the spec.)
\edef\qr@maskfunctionresult{\the\qr@a}%
}%
\or
%Case 6: arrows
\def\qr@parsemaskingfunction{%
% Compute mod( mod(\themaski*\themaskj,2) + mod(\themaski*\themaskj,3) , 2 ) %
\qr@a=\c@maski%
\multiply\qr@a by \c@maskj%
\qr@b=\qr@a%
\qr@c=\qr@a%
\multiply\qr@c by 2% % \qr@c equals 2*i*j.
\divide\qr@a by 2%
\multiply\qr@a by 2%
\advance\qr@c by -\qr@a% Now \qr@c equals i*j + mod(i*j,2).
\divide\qr@b by 3%
\multiply\qr@b by 3%
\advance\qr@c by -\qr@b% (Now \qr@c equals mod(i*j,2) + mod(i*j,3).
\qr@a=\qr@c%
\divide\qr@a by 2%
\multiply\qr@a by 2%
\advance\qr@c by-\qr@a%
\edef\qr@maskfunctionresult{\the\qr@c}%
}%
\or
%Case 7: shotgun
\def\qr@parsemaskingfunction{%
% Compute mod( mod(\themaski+\themaskj,2) + mod(\themaski*\themaskj,3) , 2 ) %
\qr@a=\c@maski%
\advance\qr@a by \c@maskj% %So \qr@a = i+j
\qr@b=\c@maski%
\multiply\qr@b by \c@maskj% %So \qr@b = i*j
\qr@c=\qr@a%
\advance\qr@c by \qr@b% So \qr@c = i+j+i*j
\divide\qr@a by 2%
\multiply\qr@a by 2%
\advance\qr@c by -\qr@a% So \qr@c = mod(i+j,2) + i*j
\divide\qr@b by 3%
\multiply\qr@b by 3%
\advance\qr@c by -\qr@b% So \qr@c = mod(i+j,2) + mod(i*j,3)
\qr@a=\qr@c%
\divide\qr@c by 2%
\multiply\qr@c by 2%
\advance\qr@a by -\qr@c%
\edef\qr@maskfunctionresult{\the\qr@a}%
}%
\fi
}%
\def\qr@checkifcellisinmask{%
% The current position is (\i,\j), in TeX counts,
% but the LaTeX counters (maski,maskj) should contain
% the current position with indexing starting at 0.
% That is, maski = \i-1 and maskj = \j-1.
%
% \qr@parsemaskingfunction must have been set by a call to \qr@setmaskingfunction
\qr@parsemaskingfunction
\xa\ifnum\qr@maskfunctionresult=0\relax
\qr@cellinmasktrue
\else
\qr@cellinmaskfalse
\fi
}%
\newcounter{maski}%
\newcounter{maskj}%
\def\qr@applymask#1#2#3{%
% #1 = name of a matrix that should be filled out completely
% except for the format and/or version information.
% #2 = name of a new matrix to contain the masked version
% #3 = 1 decimal digit naming the mask
\qr@createduplicatematrix{#2}{#1}%
\qr@setmaskingfunction{#3}%
\setcounter{maski}{-1}%
\qr@for \i = 1 to \qr@size by 1%
{\stepcounter{maski}%
\setcounter{maskj}{-1}%
\qr@for \j = 1 to \qr@size by 1%
{\stepcounter{maskj}%
\qr@checkifcellisinmask
\ifqr@cellinmask
\qr@checkifcurrentcellcontainsdata{#2}%
\ifqr@currentcellcontainsdata
\qr@flipcurrentcell{#2}%
\fi
\fi
}%
}%
}%
\newif\ifqr@currentcellcontainsdata
\qr@currentcellcontainsdatafalse
\def\qr@@white{\qr@white}%
\def\qr@@black{\qr@black}%
\def\qr@checkifcurrentcellcontainsdata#1{%
% #1 = name of matrix
\qr@currentcellcontainsdatafalse
\xa\ifx\csname #1@\the\i @\the\j\endcsname\qr@@white
\qr@currentcellcontainsdatatrue
\fi
\xa\ifx\csname #1@\the\i @\the\j\endcsname\qr@@black
\qr@currentcellcontainsdatatrue
\fi
}%
\def\qr@flipped@black{\qr@black}%
\def\qr@flipped@white{\qr@white}%
\def\qr@flipcurrentcell#1{%
% #1 = name of matrix
% (\i, \j) = current position, in TeX counts.
% This assumes the cell contains data, either black or white!
\xa\ifx\csname #1@\the\i @\the\j\endcsname\qr@@white
\qr@storetomatrix{#1}{\the\i}{\the\j}{\qr@flipped@black}%
\else
\qr@storetomatrix{#1}{\the\i}{\the\j}{\qr@flipped@white}%
\fi
}%
\def\qr@chooseandapplybestmask#1{%
% #1 = name of a matrix that should be filled out completely
% except for the format and/or version information.
% This function applies all eight masks in succession,
% calculates their penalties, and remembers the best.
% The number indicating which mask was used is saved in \qr@mask@selected.
\qr@createduplicatematrix{originalmatrix}{#1}%
\message{<Applying Mask 0...}%
\qr@applymask{originalmatrix}{#1}{0}%
\message{done. Calculating penalty...}%
\qr@evaluatemaskpenalty{#1}%
\xdef\qr@currentbestpenalty{\qr@penalty}%
\message{penalty is \qr@penalty>^^J}%
\gdef\qr@currentbestmask{0}%
\qr@for \i = 1 to 7 by 1%
{\message{<Applying Mask \the\i...}%
\qr@applymask{originalmatrix}{currentmasked}{\the\i}%
\message{done. Calculating penalty...}%
\qr@evaluatemaskpenalty{currentmasked}%
\message{penalty is \qr@penalty>^^J}%
\xa\xa\xa\ifnum\xa\qr@penalty\xa<\qr@currentbestpenalty\relax
%We found a better mask.
\xdef\qr@currentbestmask{\the\i}%
\qr@createduplicatematrix{#1}{currentmasked}%
\xdef\qr@currentbestpenalty{\qr@penalty}%
\fi
}%
\xdef\qr@mask@selected{\qr@currentbestmask}%
\message{<Selected Mask \qr@mask@selected>^^J}%
}%
\def\qr@Ni{3}%
\def\qr@Nii{3}%
\def\qr@Niii{40}%
\def\qr@Niv{10}%
\def\qr@fiveones{11111}%
\def\qr@fivezeros{11111}%
\def\qr@twoones{11}%
\def\qr@twozeros{00}%
\def\qr@finderA{00001011101}%
\def\qr@finderB{10111010000}%
\def\qr@finderB@three{1011101000}%
\def\qr@finderB@two{101110100}%
\def\qr@finderB@one{10111010}%
\def\qr@finderB@zero{1011101}%
\newif\ifqr@stringoffive
\def\qr@addpenaltyiii{%
\addtocounter{penaltyiii}{\qr@Niii}%
}%
\newcounter{totalones}%
\newcounter{penaltyi}%
\newcounter{penaltyii}%
\newcounter{penaltyiii}%
\newcounter{penaltyiv}%
\def\qr@evaluatemaskpenalty#1{%
% #1 = name of a matrix that we will test for the penalty
% according to the specs.
\setcounter{penaltyi}{0}%
\setcounter{penaltyii}{0}%
\setcounter{penaltyiii}{0}%
\setcounter{penaltyiv}{0}%
\bgroup%localize the meanings we give to the symbols
\def\qr@black{1}\def\qr@white{0}%
\def\qr@black@fixed{1}\def\qr@white@fixed{0}%
\def\qr@format@square{0}% This is not stated in the specs, but seems
% to be the standard implementation.
\def\qr@blank{0}% These would be any bits at the end.
%
\setcounter{totalones}{0}%
\qr@for \i=1 to \qr@size by 1%
{\def\qr@lastfive{z}% %The z is a dummy, that will be removed before any testing.
\qr@stringoffivefalse
\def\qr@lasttwo@thisrow{z}% %The z is a dummy.
\def\qr@lasttwo@nextrow{z}% %The z is a dummy.
\def\qr@lastnine{z0000}% %The 0000 stands for the white space to the left. The z is a dummy.
\def\qr@ignore@finderB@at{0}%
\qr@for \j=1 to \qr@size by 1%
{\edef\qr@newbit{\qr@matrixentry{#1}{\the\i}{\the\j}}%
%
% LASTFIVE CODE FOR PENALTY 1
% First, add the new bit to the end.
\xa\g@addto@macro\xa\qr@lastfive\xa{\qr@newbit}%
\ifnum\j<5\relax%
%Not yet on the 5th entry.
%Don't do any testing.
\else
% 5th entry or later.
% Remove the old one, and then test.
\qr@removefirsttoken\qr@lastfive%
\ifx\qr@lastfive\qr@fiveones%
\ifqr@stringoffive%
%This is a continuation of a previous block of five or more 1's.
\stepcounter{penaltyi}%
\else
%This is a new string of five 1's.
\addtocounter{penaltyi}{\qr@Ni}%
\global\qr@stringoffivetrue
\fi
\else
\ifx\qr@lastfive\qr@fivezeros%
\ifqr@stringoffive
%This is a continuation of a previous block of five or more 0's.
\stepcounter{penaltyi}%
\else
%This is a new string of five 0's.
\addtocounter{penaltyi}{\qr@Ni}%
\global\qr@stringoffivetrue
\fi
\else
%This is not a string of five 1's or five 0's.
\global\qr@stringoffivefalse
\fi
\fi
\fi
%
% 2x2 BLOCKS FOR PENALTY 2
% Every 2x2 block of all 1's counts for \qr@Nii penalty points.
% We do not need to run this test in the last row.
\xa\ifnum\xa\i\xa<\qr@size\relax
\xa\g@addto@macro\xa\qr@lasttwo@thisrow\xa{\qr@newbit}%
%Compute \qr@iplusone
\qr@a=\i\relax%
\advance\qr@a by 1%
\edef\qr@iplusone{\the\qr@a}%
%
\edef\qr@nextrowbit{\qr@matrixentry{#1}{\qr@iplusone}{\the\j}}%
\xa\g@addto@macro\xa\qr@lasttwo@nextrow\xa{\qr@nextrowbit}%
\ifnum\j<2\relax%
%Still in the first column; no check.
\else
%Second column or later. Remove the old bits, and then test.
\qr@removefirsttoken\qr@lasttwo@thisrow
\qr@removefirsttoken\qr@lasttwo@nextrow
\ifx\qr@lasttwo@thisrow\qr@twoones
\ifx\qr@lasttwo@nextrow\qr@twoones
\addtocounter{penaltyii}{\qr@Nii}%
\fi
\else
\ifx\qr@lasttwo@thisrow\qr@twozeros
\ifx\qr@lasttwo@nextrow\qr@twozeros
\addtocounter{penaltyii}{\qr@Nii}%
\fi
\fi
\fi
\fi
\fi
%
% LASTNINE CODE FOR PENALTY 3
% First, add the new bit to the end.
\xa\g@addto@macro\xa\qr@lastnine\xa{\qr@newbit}%
\ifnum\j<7\relax%
%Not yet on the 7th entry.
%Don't do any testing.
\else
% 7th entry or later.
% Remove the old one, and then test.
\qr@removefirsttoken\qr@lastnine
\xa\ifnum\qr@size=\j\relax%
% Last column. Any of the following should count:
% 1011101 (\qr@finderB@zero)
% 10111010 (\qr@finderB@one)
% 101110100 (\qr@finderB@two)
% 1011101000 (\qr@finderB@three)
% 10111010000 (\qr@finderB)
\ifx\qr@lastnine\qr@finderB
\qr@addpenaltyiii
\else
\qr@removefirsttoken\qr@lastnine
\ifx\qr@lastnine\qr@finderB@three
\qr@addpenaltyiii
\else
\qr@removefirsttoken\qr@lastnine
\ifx\qr@lastnine\qr@finderB@two
\qr@addpenaltyiii
\else
\qr@removefirsttoken\qr@lastnine
\ifx\qr@lastnine\qr@finderB@one
\qr@addpenaltyiii
\else
\qr@removefirsttoken\qr@lastnine
\ifx\qr@lastnine\qr@finderB@zero
\qr@addpenaltyiii
\fi
\fi
\fi
\fi
\fi
\else
\ifx\qr@lastnine\qr@finderA% %Matches 0000 1011101
\qr@addpenaltyiii
%Also, we record our discovery, so that we can't count this pattern again
%if it shows up four columns later as 1011101 0000.
%
%Set \qr@ignore@finderB@at to \j+4.
\qr@a=\j\relax%
\advance\qr@a by 4%
\xdef\qr@ignore@finderB@at{\the\qr@a}%
\else
\ifx\qr@lastfive\qr@finderB% %Matches 1011101 0000.
\xa\ifnum\qr@ignore@finderB@at=\j\relax
%This pattern was *not* counted already earlier.
\qr@addpenaltyiii
\fi
\fi
\fi
\fi
\fi
%
%COUNT 1's FOR PENALTY 4
\xa\ifnum\qr@newbit=1\relax%
\stepcounter{totalones}%
\fi
}% end of j-loop
}% end of i-loop
%
%NOW WE ALSO NEED TO RUN DOWN THE COLUMNS TO FINISH CALCULATING PENALTIES 1 AND 3.
\qr@for \j=1 to \qr@size by 1%
{\def\qr@lastfive{z}% %The z is a dummy, that will be removed before any testing.
\qr@stringoffivefalse
\def\qr@lastnine{z0000}% %The 0000 stands for the white space to the left. The z is a dummy.
\def\qr@ignore@finderB@at{0}%
\qr@for \i=1 to \qr@size by 1%
{\edef\qr@newbit{\qr@matrixentry{#1}{\the\i}{\the\j}}%
%
% LASTFIVE CODE FOR PENALTY 1
% First, add the new bit to the end.
\xa\g@addto@macro\xa\qr@lastfive\xa{\qr@newbit}%
\ifnum\i<5\relax%
%Not yet on the 5th entry.
%Don't do any testing.
\else
% 5th entry or later.
% Remove the old one, and then test.
\qr@removefirsttoken\qr@lastfive%
\ifx\qr@lastfive\qr@fiveones%
\ifqr@stringoffive%
%This is a continuation of a previous block of five or more 1's.
\stepcounter{penaltyi}%
\else
%This is a new string of five 1's.
\addtocounter{penaltyi}{\qr@Ni}%
\global\qr@stringoffivetrue
\fi
\else
\ifx\qr@lastfive\qr@fivezeros%
\ifqr@stringoffive
%This is a continuation of a previous block of five or more 0's.
\stepcounter{penaltyi}%
\else
%This is a new string of five 0's.
\addtocounter{penaltyi}{\qr@Ni}%
\global\qr@stringoffivetrue
\fi
\else
%This is not a string of five 1's or five 0's.
\global\qr@stringoffivefalse
\fi
\fi
\fi
%
% HAPPILY, WE DON'T NEED TO CALCULATE PENALTY 2 AGAIN.
%
% LASTNINE CODE FOR PENALTY 3
% First, add the new bit to the end.
\xa\g@addto@macro\xa\qr@lastnine\xa{\qr@newbit}%
\ifnum\i<7\relax%
%Not yet on the 7th entry.
%Don't do any testing.
\else
% 7th entry or later.
% Remove the old one, and then test.
\qr@removefirsttoken\qr@lastnine
\xa\ifnum\qr@size=\i\relax%
% Last column. Any of the following should count:
% 1011101 (\qr@finderB@zero)
% 10111010 (\qr@finderB@one)
% 101110100 (\qr@finderB@two)
% 1011101000 (\qr@finderB@three)
% 10111010000 (\qr@finderB)
\ifx\qr@lastnine\qr@finderB
\qr@addpenaltyiii
\else
\qr@removefirsttoken\qr@lastnine
\ifx\qr@lastnine\qr@finderB@three
\qr@addpenaltyiii
\else
\qr@removefirsttoken\qr@lastnine
\ifx\qr@lastnine\qr@finderB@two
\qr@addpenaltyiii
\else
\qr@removefirsttoken\qr@lastnine
\ifx\qr@lastnine\qr@finderB@one
\qr@addpenaltyiii
\else
\qr@removefirsttoken\qr@lastnine
\ifx\qr@lastnine\qr@finderB@zero
\qr@addpenaltyiii
\fi
\fi
\fi
\fi
\fi
\else
\ifx\qr@lastnine\qr@finderA% %Matches 0000 1011101
\qr@addpenaltyiii
%Also, we record our discovery, so that we can't count this pattern again
%if it shows up four columns later as 1011101 0000.
%
%Set \qr@ignore@finderB@at to \i+4.
\qr@a=\i\relax%
\advance\qr@a by 4%
\xdef\qr@ignore@finderB@at{\the\qr@a}%
\else
\ifx\qr@lastfive\qr@finderB% %Matches 1011101 0000.
\xa\ifnum\qr@ignore@finderB@at=\i\relax
%This pattern was *not* counted already earlier.
\qr@addpenaltyiii
\fi
\fi
\fi
\fi
\fi
%
}% end of i-loop
}% end of j-loop
\egroup%
%
%CALCULATE PENALTY 4
%According to the spec, penalty #4 is computed as
% floor( |(i/n^2)-0.5|/0.05 )
% where i is the total number of 1's in the matrix.
% This is equal to abs(20*i-10n^2) div n^2.
%
\qr@a=\c@totalones\relax
\multiply\qr@a by 20\relax
\qr@b=\qr@size\relax
\multiply\qr@b by \qr@size\relax
\qr@c=10\relax
\multiply\qr@c by \qr@b\relax
\advance\qr@a by -\qr@c\relax
\ifnum\qr@a<0\relax
\multiply\qr@a by -1\relax
\fi
\divide\qr@a by \qr@b\relax
\setcounter{penaltyiv}{\the\qr@a}%
%
%CALCULATE TOTAL PENALTY
\qr@a=\thepenaltyi\relax%
\advance\qr@a by \thepenaltyii\relax%
\advance\qr@a by \thepenaltyiii\relax%
\advance\qr@a by \thepenaltyiv\relax%
\edef\qr@penalty{\the\qr@a}%
}%
\def\qr@removefirsttoken#1{%
%Removes the first token from the macro named in #1.
\edef\qr@argument{(#1)}%
\xa\qr@removefirsttoken@int\qr@argument%
\xdef#1{\qr@removefirsttoken@result}%
}%
\def\qr@removefirsttoken@int(#1#2){%
\def\qr@removefirsttoken@result{#2}%
}%
\def\qr@writeformatstring#1#2{%
% #1 = matrix name
% #2 = binary string representing the encoded and masked format information
\setcounter{qr@i}{9}%
\setcounter{qr@j}{1}%
\edef\qr@argument{{#1}(#2\relax)}%
\xa\qr@writeformatA@recursive\qr@argument
%
\setcounter{qr@i}{\qr@numberofrowsinmatrix{#1}}%
\setcounter{qr@j}{9}%
\xa\qr@writeformatB@recursive\qr@argument
}%
\def\qr@writeformatA@recursive#1(#2#3){%
% #1 = matrix name
% #2 = first bit of string
% #3 = rest of bitstream
% (qr@i,qr@j) = current (valid) position to write (in LaTeX counters)
\ifnum#2=1\relax
\qr@storetomatrix{#1}{\theqr@i}{\theqr@j}{\qr@black@format}%
\else
\qr@storetomatrix{#1}{\theqr@i}{\theqr@j}{\qr@white@format}%
\fi
% Now the tricky part--moving \i and \j to their next positions.
\ifnum\c@qr@j<9\relax
%If we're not yet in column 9, move right.
\stepcounter{qr@j}%
\ifnum\c@qr@j=7\relax
%But we skip column 7!
\stepcounter{qr@j}%
\fi
\else
%If we're in column 9, we move up.
\addtocounter{qr@i}{-1}%
\ifnum\c@qr@i=7\relax
%But we skip row 7!
\addtocounter{qr@i}{-1}%
\fi
\fi
%N.B. that at the end of time, this will leave us at invalid position (0,9).
%That makes for an easy test to know when we are done.
\ifnum\c@qr@i<1
\let\qr@next=\relax
\else
\def\qr@next{\qr@writeformatA@recursive{#1}(#3)}%
\fi
\qr@next
}%
\def\qr@writeformatB@recursive#1(#2#3){%
% #1 = matrix name
% #2 = first bit of string
% #3 = rest of bitstream
% (qr@i,qr@j) = current (valid) position to write (in LaTeX counters)
\ifnum#2=1\relax
\qr@storetomatrix{#1}{\theqr@i}{\theqr@j}{\qr@black@format}%
\else
\qr@storetomatrix{#1}{\theqr@i}{\theqr@j}{\qr@white@format}%
\fi
% Now the tricky part--moving counters i and j to their next positions.
\qr@a=\qr@size%
\advance\qr@a by -6\relax%
\ifnum\qr@a<\c@qr@i\relax
%If we're not yet in row n-6, move up.
\addtocounter{qr@i}{-1}%
\else
\ifnum\qr@a=\c@qr@i\relax
%If we're actually in row n-6, we jump to position (9,n-7).
\setcounter{qr@i}{9}%
%Set counter j equal to \qr@size-7.
\global\c@qr@j=\qr@size\relax%
\global\advance\c@qr@j by -7\relax%
\else
%Otherwise, we must be in row 9.
%In this case, we move right.
\stepcounter{qr@j}%
\fi
\fi
%N.B. that at the end of time, this will leave us at invalid position (9,n+1).
%That makes for an easy test to know when we are done.
\xa\ifnum\qr@size<\c@qr@j\relax
\let\qr@next=\relax
\else
\def\qr@next{\qr@writeformatB@recursive{#1}(#3)}%
\fi
\qr@next
}%
\def\qr@writeversionstring#1#2{%
% #1 = matrix name
% #2 = binary string representing the encoded version information
%
% Plot the encoded version string into the matrix.
% This is only done for versions 7 and higher.
\xa\ifnum\qr@version>6\relax
%Move to position (n-8,6).
\setcounter{qr@i}{\qr@size}\relax%
\addtocounter{qr@i}{-8}\relax%
\setcounter{qr@j}{6}%
\edef\qr@argument{{#1}(#2\relax)}%
\xa\qr@writeversion@recursive\qr@argument
\fi
}%
\def\qr@writeversion@recursive#1(#2#3){%
% #1 = matrix name
% #2 = first bit of string
% #3 = rest of bitstream
% (qr@i,qr@j) = current (valid) position to write (in LaTeX counters)
%
% The version information is stored symmetrically in the matrix
% In two transposed regions, so we can write both at the same time.
% In the comments, we describe what happens in the lower-left region,
% not the upper-right.
%
%Set \qr@topline equal to n-10.
\qr@a=\qr@size\relax%
\advance\qr@a by -10\relax%
\edef\qr@topline{\the\qr@a}%
%
\ifnum#2=1\relax
\qr@storetomatrix{#1}{\theqr@i}{\theqr@j}{\qr@black@format}%
\qr@storetomatrix{#1}{\theqr@j}{\theqr@i}{\qr@black@format}%
\else
\qr@storetomatrix{#1}{\theqr@i}{\theqr@j}{\qr@white@format}%
\qr@storetomatrix{#1}{\theqr@j}{\theqr@i}{\qr@white@format}%
\fi
% Now the tricky part--moving counters i and j to their next positions.
\addtocounter{qr@i}{-1}%
\xa\ifnum\qr@topline>\c@qr@i\relax
%We've overshot the top of the region.
%We need to move left one column and down three.
\addtocounter{qr@j}{-1}%
\addtocounter{qr@i}{3}%
\fi
%N.B. that at the end of time, this will leave us at invalid position (n-8,0).
%That makes for an easy test to know when we are done.
\ifnum\c@qr@j<1\relax
\let\qr@next=\relax
\else
\def\qr@next{\qr@writeversion@recursive{#1}(#3)}%
\fi
\qr@next
}%
% \end{macrocode}
%
% \subsection{Encoding and error correction}
% \begin{macrocode}
\newcounter{qr@hexchars}%
\def\qr@string@binarytohex#1{%
\qr@binarytohex{\qr@hex@result}{#1}%
}%
\def\qr@encode@binary#1{%
% #1 = string of ascii characters, to be converted into bitstream
%
% We do this one entirely in hex, rather than binary, because we can.
\edef\qr@plaintext{#1}%
%
%First, the mode indicator.
\def\qr@codetext{4}% %This means `binary'
%
%Next, the character count.
\qr@getstringlength{\qr@plaintext}%
%Set \qr@charactercountlengthinhex to \qr@charactercountbits@byte/4%
\qr@a=\qr@charactercountbits@byte\relax%
\divide \qr@a by 4\relax%
\edef\qr@charactercountlengthinhex{\the\qr@a}%
\qr@decimaltohex[\qr@charactercountlengthinhex]{\qr@charactercount}{\qr@stringlength}%
\xa\g@addto@macro\xa\qr@codetext\xa{\qr@charactercount}%
%
%Now comes the actual data.
\edef\qr@argument{(,\qr@plaintext\relax\relax\relax)}%
\xa\qr@encode@ascii@recursive\qr@argument%
%
%Now the terminator.
\g@addto@macro\qr@codetext{0}% %This is '0000' in binary.
%
%There is no need to pad bits to make a multiple of 8,
%because the data length is already 4 + 8 + 8n + 4.
%
%Now add padding codewords if needed.
\setcounter{qr@hexchars}{0}%
\qr@getstringlength{\qr@codetext}%
\setcounter{qr@hexchars}{\qr@stringlength}%
%Set \qr@numpaddingcodewords equal to \qr@totaldatacodewords - qr@hexchars/2.
\qr@a=-\c@qr@hexchars\relax
\divide\qr@a by 2\relax
\advance\qr@a by \qr@totaldatacodewords\relax
\edef\qr@numpaddingcodewords{\the\qr@a}%
%
\xa\ifnum\qr@numpaddingcodewords<0%
\edef\ds{ERROR: Too much data! Over by \qr@numpaddingcodewords bytes.}\show\ds%
\fi%
\xa\ifnum\qr@numpaddingcodewords>0%
\qr@for \i = 2 to \qr@numpaddingcodewords by 2%
{\g@addto@macro{\qr@codetext}{ec11}}%
\xa\ifodd\qr@numpaddingcodewords\relax%
\g@addto@macro{\qr@codetext}{ec}%
\fi%
\fi%
}%
\def\qr@encode@ascii@recursive(#1,#2#3){%
% #1 = hex codes translated so far
% #2 = next plaintext character to translate
% #3 = remainder of plaintext
\edef\qr@testii{#2}%
\ifx\qr@testii\qr@relax%
% All done!
\g@addto@macro\qr@codetext{#1}%
\else%
% Another character to translate.
\edef\qr@asciicode{\number`#2}%
\qr@decimaltohex[2]{\qr@newhexcodes}{\qr@asciicode}%
\edef\qr@argument{(#1\qr@newhexcodes,#3)}%
%\show\qr@argument
\xa\qr@encode@ascii@recursive\qr@argument%
\fi%
}%
\def\qr@splitcodetextintoblocks{%
\setcounter{qr@i}{0}%
\qr@for \j = 1 to \qr@numshortblocks by 1%
{\stepcounter{qr@i}%
\qr@splitoffblock{\qr@codetext}{\theqr@i}{\qr@shortblock@size}%
}%
\xa\ifnum\qr@numlongblocks>0\relax%
\qr@for \j = 1 to \qr@numlongblocks by 1%
{\stepcounter{qr@i}%
\qr@splitoffblock{\qr@codetext}{\theqr@i}{\qr@longblock@size}%
}%
\fi%
}%
\def\qr@splitoffblock#1#2#3{%
% #1 = current codetext in hexadecimal
% #2 = number to use in csname "\datablock@#2".
% #3 = number of bytes to split off
\message{<Splitting off block #2>}%
\xa\gdef\csname datablock@#2\endcsname{}% %This line is important!
\qr@for \i = 1 to #3 by 1%
{\edef\qr@argument{{#2}(#1)}%
\xa\qr@splitoffblock@int\qr@argument%
}%
}%
\def\qr@splitoffblock@int#1(#2#3#4){%
% #1 = number to use in csname "\datablock@#1".
% #2#3 = next byte to split off
% #4 = remaining text
%
% We add the next byte to "\datablock@#1",
% and we remove it from the codetext.
\xa\xdef\csname datablock@#1\endcsname{\csname datablock@#1\endcsname#2#3}%
\xdef\qr@codetext{#4}%
}%
\def\qr@createerrorblocks{%
\qr@for \ii = 1 to \qr@numblocks by 1%
{\message{<Making error block \the\ii>}%
\FX@generate@errorbytes{\csname datablock@\the\ii\endcsname}{\qr@num@eccodewords}%
\xa\xdef\csname errorblock@\the\ii\endcsname{\FX@errorbytes}%
}%
}%
\def\qr@interleave{%
\setcounter{qr@i}{0}%
\def\qr@interleaved@text{}%
\message{<Interleaving datablocks of length \qr@shortblock@size\ and \qr@longblock@size: }%
\qr@for \ii = 1 to \qr@shortblock@size by 1%
{\qr@for \jj = 1 to \qr@numblocks by 1%
{\qr@writefromblock{datablock}{\the\jj}%
}%
\message{\the\ii,}%
}%
%The long blocks are numbered \qr@numshortblocks+1, \qr@numshortblocks+2, ..., \qr@numblocks.
\qr@a=\qr@numshortblocks\relax%
\advance\qr@a by 1\relax%
\qr@for \jj = \qr@a to \qr@numblocks by 1%
{\qr@writefromblock{datablock}{\the\jj}}%
\xa\ifnum\qr@numlongblocks>0\relax%
\message{\qr@longblock@size.>}%
\else
\message{.>}%
\fi
\message{<Interleaving errorblocks of length \qr@num@eccodewords: }%
\qr@for \ii = 1 to \qr@num@eccodewords by 1%
{\message{\the\ii,}%
\qr@for \jj = 1 to \qr@numblocks by 1%
{\qr@writefromblock{errorblock}{\the\jj}%
}%
}%
\message{.><Interleaving complete.>}%
}%
\def\qr@writefromblock#1#2{%
% #1 = either 'datablock' or 'errorblock'
% #2 = block number, in {1,...,\qr@numblocks}%
\edef\qr@argument{(\csname #1@#2\endcsname\relax\relax\relax)}%
\xa\qr@writefromblock@int\qr@argument
\xa\xdef\csname #1@#2\endcsname{\qr@writefromblock@remainder}%
}%
\def\qr@writefromblock@int(#1#2#3){%
% #1#2 = first byte (in hex) of text, which will be written to \qr@interleaved@text
% #3 = remainder, including \relax\relax\relax terminator.
\g@addto@macro{\qr@interleaved@text}{#1#2}%
\qr@writefromblock@intint(#3)%
}%
\def\qr@writefromblock@intint(#1\relax\relax\relax){%
\xdef\qr@writefromblock@remainder{#1}%
}%
% \end{macrocode}
%
% \subsection{Encoding format and version information}
% \begin{macrocode}
\let\xa=\expandafter
\makeatletter
\def\qr@preface@macro#1#2{%
% #1 = macro name
% #2 = text to add to front of macro
\def\qr@tempb{#2}%
\xa\xa\xa\gdef\xa\xa\xa#1\xa\xa\xa{\xa\qr@tempb #1}%
}%
\newif\ifqr@leadingcoeff
\def\qr@testleadingcoeff(#1#2){%
% Tests whether the leading digit of #1#2 is 1.
\ifnum#1=1\relax
\qr@leadingcoefftrue
\else
\qr@leadingcoefffalse
\fi
}%
\def\qr@polynomialdivide#1#2{%
\edef\qr@numerator{#1}%
\edef\qr@denominator{#2}%
\qr@divisiondonefalse%
\xa\xa\xa\qr@oneroundofdivision\xa\xa\xa{\xa\qr@numerator\xa}\xa{\qr@denominator}%
}%
\def\@qr@empty{}%
\def\qr@oneroundofdivision#1#2{%
% #1 = f(x), of degree n
% #2 = g(x), of degree m
% Obtains a new polynomial h(x), congruent to f(x) modulo g(x),
% but of degree at most n-1.
%
% If leading coefficient of f(x) is 1, subtracts off g(x) * x^(n-m).
% If leading coefficient of f(x) is 0, strips off that leading zero.
%
\qr@testleadingcoeff(#1)%
\ifqr@leadingcoeff
\qr@xorbitstrings{#1}{#2}%
\ifqr@xorfailed
%If xor failed, that means our #1 was already the remainder!
\qr@divisiondonetrue
\edef\qr@theremainder{#1}%
\else
%xor succeeded. We need to recurse.
\xa\xa\xa\edef\xa\xa\xa\qr@numerator\xa\xa\xa{\xa\qr@stripleadingzero\xa(\qr@xorresult)}%
\fi
\else
\xa\def\xa\qr@numerator\xa{\qr@stripleadingzero(#1)}%
\ifx\qr@numerator\@qr@empty
\qr@divisiondonetrue
\def\qr@theremainder{0}%
\fi
\fi
\ifqr@divisiondone
\relax
\else
\xa\qr@oneroundofdivision\xa{\qr@numerator}{#2}%
\fi
}%
\def\qr@stripleadingzero(0#1){#1}%Strips off a leading zero.
\newif\ifqr@xorfailed% This flag will trigger when #2 is longer than #1.
\def\qr@xorbitstrings#1#2{%
% #1 = bitstring
% #2 = bitstring no longer than #1
\qr@xorfailedfalse
\edef\qr@argument{(,#1\relax\relax)(#2\relax\relax)}%
\xa\qr@xorbitstrings@recursive\qr@argument
%\qr@xorbitstrings@recursive(,#1\relax\relax)(#2\relax\relax)%
}%
\def\qr@xorbitstrings@recursive(#1,#2#3)(#4#5){%
% #1#2#3 is the first bitstring, xor'ed up through #1.
% #4#5 is the remaining portion of the second bitstring.
\def\qr@testii{#2}%
\def\qr@testiv{#4}%
\ifx\qr@testii\qr@relax
% #1 contains the whole string.
% Now if #4 is also \relax, that means the two strings started off with equal lengths.
% If, however, #4 is not \relax, that means the second string was longer than the first, a problem.
\ifx\qr@testiv\qr@relax
%No problem. We are done.
\qr@xorbit@saveresult(#1#2#3)%
\else
%Problem! The second string was longer than the first.
\qr@xorfailedtrue
\def\qr@xorresult{}%
\fi
\else
% There is still a bit to manipulate in #2.
% Check whether #4 contains anything.
\ifx\qr@testiv\qr@relax
% No, #4 is empty. We are done. "#2#3" contains the remainder of the first string,
% which we append untouched and then strip off the two \relax-es.
\qr@xorbit@saveresult(#1#2#3)%
\else
% Yes, #4 still has something to XOR. Do the task.
\ifnum#2=#4\relax
\qr@xorbitstrings@recursive(#1%
0,#3)(#5)%
\else
\qr@xorbitstrings@recursive(#1%
1,#3)(#5)%
\fi
\fi
\fi
}%
\def\qr@xorbit@saveresult(#1\relax\relax){%
%Strips off the extra '\relax'es at the end.
\def\qr@xorresult{#1}%
}%
\newif\ifqr@divisiondone
\def\qr@BCHcode#1{%
\edef\qr@formatinfo{#1}%
\def\qr@formatinfopadded{\qr@formatinfo 0000000000}%
\def\qr@divisor{10100110111}%
\qr@divisiondonefalse
\qr@polynomialdivide{\qr@formatinfopadded}{\qr@divisor}%
%
\qr@getstringlength{\qr@theremainder}%
%Run loop from stringlength+1 to 10.
\qr@a=\qr@stringlength\relax%
\advance\qr@a by 1\relax%
\qr@for \i = \qr@a to 10 by 1%
{\qr@preface@macro{\qr@theremainder}{0}%
\xdef\qr@theremainder{\qr@theremainder}%
}%
\edef\qr@BCHresult{\qr@formatinfo\qr@theremainder}%
}%
\def\qr@formatmask{101010000010010}%
\def\qr@encodeandmaskformat#1{%
\qr@BCHcode{#1}%
\qr@xorbitstrings{\qr@BCHresult}{\qr@formatmask}%
\edef\qr@format@bitstring{\qr@xorresult}%
}%
\def\qr@Golaycode#1{%
% #1 = 6-bit version number
\edef\qr@versioninfo{#1}%
\def\qr@versioninfopadded{\qr@versioninfo 000000000000}% %Append 12 zeros.
\def\qr@divisor{1111100100101}%
\qr@divisiondonefalse
\qr@polynomialdivide{\qr@versioninfopadded}{\qr@divisor}%
%
\qr@getstringlength{\qr@theremainder}%
%Run loop from stringlength+1 to 12.
\qr@a=\qr@stringlength\relax%
\advance\qr@a by 1\relax%
\qr@for \i = \qr@a to 12 by 1%
{\qr@preface@macro{\qr@theremainder}{0}%
\xdef\qr@theremainder{\qr@theremainder}%
}%
\edef\qr@Golayresult{\qr@versioninfo\qr@theremainder}%
}%
% \end{macrocode}
%
% \subsection{Error correction}
% The error-correction code is defined over $\F_{256}=GF(256)$,
% the finite field of order $256$.
% The QR specification encodes this field as $\F_2[X]/(X^8+X^4+X^3+X^2+1)$;
% in other words, each field element is an 8-bit binary string representing
% an integer between 0 and 255.
%
% We represent these 8-bit strings as two hexadecimal characters;
% for example, {\tt 5a} represents {\tt 01011010}.
% Because addition is done by xor-ing the bitstrings,
% we can define addition on hexadecimal characters.
% Since there are only $16^2$ possibilities,
% we create a lookup table.
% \begin{macrocode}
\def\F@result{}%
\def\qr@xorbitstring#1#2#3{%
% #1 = new macro to receive result
% #2, #3 = bitstrings to xor. The second can be shorter than the first.
\def\qr@xor@result{}%
\edef\qr@argument{(#2\relax\relax)(#3\relax\relax)}%
\xa\qr@xorbitstring@recursive\qr@argument%
\edef#1{\qr@xor@result}%
}%
\def\qr@xorbitstring@recursive(#1#2)(#3#4){%
\edef\qr@testi{#1}%
\ifx\qr@testi\qr@relax%
%Done.
\let\qr@next=\relax%
\else
\if#1#3\relax
\g@addto@macro{\qr@xor@result}{0}%
\else
\g@addto@macro{\qr@xor@result}{1}%
\fi
\edef\qr@next{\noexpand\qr@xorbitstring@recursive(#2)(#4)}%
\fi
\qr@next
}
\def\F@addchar@raw#1#2{%
%Add two hexadecimal digits using bitwise xor
\qr@hextobinary[4]{\qr@summandA}{#1}%
\qr@hextobinary[4]{\qr@summandB}{#2}%
\qr@xorbitstring{\F@result}{\qr@summandA}{\qr@summandB}%
\qr@binarytohex[1]{\F@result}{\F@result}%
}%
\def\qr@canceltwos#1{%
\edef\qr@argument{(#1\relax\relax)}%
\xa\qr@canceltwos@int\qr@argument%
}%
\def\qr@canceltwos@int(#1#2){%
\xa\qr@canceltwos@recursion(,#1#2)%
}%
\def\qr@canceltwos@recursion(#1,#2#3){%
\def\qr@testii{#2}%
\ifx\qr@testii\qr@relax
%Cancelling complete.
\qr@striptworelaxes(#1#2#3)%
%Now \F@result contains the answer.
\else
\relax
\ifnum#2=2\relax
\qr@canceltwos@recursion(#10,#3)%
\else
\qr@canceltwos@recursion(#1#2,#3)%
\fi
\fi
}%
\def\qr@striptworelaxes(#1\relax\relax){%
\gdef\F@result{#1}%
}%
\qr@for \i = 0 to 15 by 1%
{\qr@decimaltohex[1]{\qr@tempa}{\the\i}%
\qr@for \j = 0 to 15 by 1%
{\qr@decimaltohex[1]{\qr@tempb}{\the\j}%
\F@addchar@raw\qr@tempa\qr@tempb
\xa\xdef\csname F@addchar@\qr@tempa\qr@tempb\endcsname{\F@result}%
}%
}%
\def\F@addchar#1#2{%
\xa\def\xa\F@result\xa{\csname F@addchar@#1#2\endcsname}%
}%
\def\F@addstrings#1#2{%
\edef\qr@argument{(,#1\relax\relax)(#2\relax\relax)}%
\xa\F@addstrings@recursion\qr@argument%
}%
\def\F@addstrings@recursion(#1,#2#3)(#4#5){%
%Adds two hexadecimal strings, bitwise, from left to right.
%The second string is allowed to be shorter than the first.
\def\qr@testii{#2}%
\def\qr@testiv{#4}%
\ifx\qr@testii\qr@relax
%The entire string has been processed.
\gdef\F@result{#1}%
\else
\ifx\qr@testiv\qr@relax
%The second string is over.
\qr@striptworelaxes(#1#2#3)%
%Now \F@result contains the answer.
\else
%We continue to add.
\F@addchar{#2}{#4}%
\edef\qr@argument{(#1\F@result,#3)(#5)}%
\xa\F@addstrings@recursion\qr@argument%
\fi
\fi
}%
% \end{macrocode}
% Now we handle multiplication.
% Our approach to multiplying $a,b\in\F_{256}$
% is to take discrete logarithms (with 2 as our base),
% add the logarithms, and then take the antilog.
% We first create a log table.
% \begin{macrocode}
\gdef\F@stripleadingzero(0#1){\edef\F@result{#1}}%
\setcounter{qr@i}{0}%
\def\qr@poweroftwo{1}%
\qr@for \i = 1 to 254 by 1%
{\stepcounter{qr@i}%
\qr@a=\qr@poweroftwo\relax
\multiply\qr@a by 2\relax
\edef\qr@poweroftwo{\the\qr@a}%
%\show\qr@poweroftwo
\qr@decimaltohex[2]{\qr@poweroftwo@hex}{\qr@poweroftwo}%
\xa\ifnum\qr@poweroftwo>255\relax
%We need to bitwise add the polynomial represented by 100011101, i.e. 0x11d.
\F@addstrings{\qr@poweroftwo@hex}{11d}% %Now it should start with 0.
\xa\F@stripleadingzero\xa(\F@result)% %Now it should be two hex digits.
\edef\qr@poweroftwo@hex{\F@result}% %Save the hex version.
\qr@hextodecimal{\qr@poweroftwo}{\F@result}%
\fi
\xdef\qr@poweroftwo{\qr@poweroftwo}%
\xa\xdef\csname F@twotothe@\theqr@i\endcsname{\qr@poweroftwo@hex}%
\xa\xdef\csname F@logtwo@\qr@poweroftwo@hex\endcsname{\theqr@i}%
}%
\xa\xdef\csname F@twotothe@0\endcsname{01}%
\xa\xdef\csname F@logtwo@01\endcsname{0}%
\def\F@twotothe#1{%
\xa\xdef\xa\F@result\xa{\csname F@twotothe@#1\endcsname}%
}%
\def\F@logtwo#1{%
\xa\xdef\xa\F@result\xa{\csname F@logtwo@#1\endcsname}%
}%
\def\qr@zerozero{00}%
\def\F@multiply#1#2{%
% #1 and #2 are two elements of F_256,
% given as two-character hexadecimal strings.
% Multiply them within F_256, and place the answer in \F@result
\edef\qr@argA{#1}%
\edef\qr@argB{#2}%
\ifx\qr@argA\qr@zerozero
\def\F@result{00}%
\else
\ifx\qr@argB\qr@zerozero
\def\F@result{00}%
\else
\xa\F@logtwo\xa{\qr@argA}%
\edef\qr@logA{\F@result}%
\xa\F@logtwo\xa{\qr@argB}%
\edef\qr@logB{\F@result}%
\xa\qr@a\xa=\qr@logA\relax% \qr@a = \qr@logA
\xa\advance\xa\qr@a\qr@logB\relax% \advance \qr@a by \qr@logB
\ifnum\qr@a>254\relax%
\advance\qr@a by -255\relax%
\fi%
\xa\F@twotothe\xa{\the\qr@a}%
% Now \F@result contains the product, as desired.
\fi
\fi
}%
\def\F@multiply#1#2{%
% #1 and #2 are two elements of F_256,
% given as two-character hexadecimal strings.
% Multiply them within F_256, and place the answer in \F@result
\edef\qr@argA{#1}%
\edef\qr@argB{#2}%
\ifx\qr@argA\qr@zerozero
\def\F@result{00}%
\else
\ifx\qr@argB\qr@zerozero
\def\F@result{00}%
\else
\xa\F@logtwo\xa{\qr@argA}%
\edef\qr@logA{\F@result}%
\xa\F@logtwo\xa{\qr@argB}%
\edef\qr@logB{\F@result}%
\xa\qr@a\xa=\qr@logA\relax% \qr@a = \qr@logA
\xa\advance\xa\qr@a\qr@logB\relax% \advance \qr@a by \qr@logB
\ifnum\qr@a>254\relax%
\advance\qr@a by -255\relax%
\fi%
\xa\F@twotothe\xa{\the\qr@a}%
% Now \F@result contains the product, as desired.
\fi
\fi
}%
% \end{macrocode}
% Having developed $\F_{256}$, we now turn to the real task.
% Each byte of data is read as an element of $\F_{256}$,
% and a sequence of bytes corresponds a polynomial in
% $\F_{256}[X]$.
% The Reed-Solomon code takes that codeword $f(X)\in \F_{256}[X]$
% of degree $k$, divides $f(X)\cdot X^\ell$ by a fixed
% polynomial,
% and keeps the remainder $r(X)$ as the error-correction word.
% We therefore must implement polynomial division over $\F_{256}$.
% \begin{macrocode}
%These polynomials are represented as sequences of coefficients,
%from highest power to lowest,
%with each coefficient represented by two hexadecimal characters.
\def\FX@getstringlength#1{%
%Count number of two-character coefficients
\setcounter{qr@i}{0}%
\xdef\qr@argument{(#1\relax\relax\relax)}%
\xa\FX@stringlength@recursive\qr@argument%
\xdef\stringresult{\arabic{qr@i}}%
}%
\def\FX@stringlength@recursive(#1#2#3){%
\def\qr@testi{#1}%
\ifx\qr@testi\qr@relax
%we are done.
\else
\stepcounter{qr@i}%
%\showthe\c@qr@i
\qr@stringlength@recursive(#3)%
\fi
}%
\newif\ifFX@leadingcoeff@zero
\def\FX@testleadingcoeff(#1#2#3){%
% Tests whether the leading coefficient of the hex-string #1#2#3 is '00'.
\edef\FX@leadingcoefficient{#1#2}%
\FX@leadingcoeff@zerofalse
\ifx\FX@leadingcoefficient\qr@zerozero
\FX@leadingcoeff@zerotrue
\fi
}%
\newif\ifFX@divisiondone
\newcounter{qr@divisionsremaining} %Keep track of how many divisions to go!
\def\FX@polynomialdivide#1#2{%
\edef\FX@numerator{#1}%
\edef\FX@denominator{#2}%
\qr@getstringlength\FX@numerator%
\setcounter{qr@divisionsremaining}{\qr@stringlength}%
\qr@getstringlength\FX@denominator%
\addtocounter{qr@divisionsremaining}{-\qr@stringlength}%
\addtocounter{qr@divisionsremaining}{2}%
\divide\c@qr@divisionsremaining by 2\relax% %2 hex chars per number
\FX@divisiondonefalse%
\xa\xa\xa\FX@polynomialdivide@recursive\xa\xa\xa{\xa\FX@numerator\xa}\xa{\FX@denominator}%
}%
\def\FX@polynomialdivide@recursive#1#2{%
% #1 = f(x), of degree n
% #2 = g(x), of degree m
% Obtains a new polynomial h(x), congruent to f(x) modulo g(x),
% but of degree at most n-1.
%
% If leading coefficient of f(x) is 0, strips off that leading zero.
% If leading coefficient of f(x) is a, subtracts off a * g(x) * x^(n-m).
% N.B. we assume g is monic.
%
\FX@testleadingcoeff(#1)%
\ifFX@leadingcoeff@zero%
%Leading coefficient is zero, so remove it.
\xa\def\xa\FX@numerator\xa{\FX@stripleadingzero(#1)}%
\else%
%Leading coefficient is nonzero, and contained in \FX@leadingcoefficient
\FX@subtractphase{#1}{#2}{\FX@leadingcoefficient}%
\ifFX@subtract@failed%
%If subtraction failed, that means our #1 was already the remainder!
\FX@divisiondonetrue%
\edef\qr@theremainder{#1}%
\else%
%xor succeeded. We need to recurse.
\xa\xa\xa\edef\xa\xa\xa\FX@numerator\xa\xa\xa{\xa\FX@stripleadingzero\xa(\FX@subtraction@result)}%
\fi%
\fi%
\addtocounter{qr@divisionsremaining}{-1}%
\ifnum\c@qr@divisionsremaining=0\relax
%Division is done!
\FX@divisiondonetrue%
\edef\qr@theremainder{\FX@numerator}%
\relax%
\else%
\xa\FX@polynomialdivide@recursive\xa{\FX@numerator}{#2}%
\fi%
}%
\def\FX@stripleadingzero(00#1){#1}%Strips off a single leading zero of F_256.
\newif\ifFX@subtract@failed% This flag will trigger when #2 is longer than #1.
\def\FX@subtractphase#1#2#3{%
% #1 = bitstring
% #2 = bitstring no longer than #1
% #3 = leading coefficient
\FX@subtract@failedfalse%
\edef\qr@argument{(,#1\relax\relax\relax)(#2\relax\relax\relax)(#3)}%
\xa\FX@subtract@recursive\qr@argument%
}%
\def\FX@subtract@recursive(#1,#2#3#4)(#5#6#7)(#8){%
% This is a recursive way to compute f(x) - a*g(x)*x^k.
% #1#2#3#4 is the first bitstring, subtracted up through #1.
% Thus #2#3 constitutes the next two-character coefficient.
% #5#6#7 is the remaining portion of the second bitstring.
% Thus #5#6 constitutes the next two-character coefficient
% #8 is the element a of F_256. It should contain two characters.
\def\qr@testii{#2}%
\def\qr@testv{#5}%
\ifx\qr@testii\qr@relax
% #1 contains the whole string.
% Now if #5 is also \relax, that means the two strings started off with equal lengths.
% If, however, #5 is not \relax, that means the second string was longer than the first, a problem.
\ifx\qr@testv\qr@relax
%No problem. We are done.
\FX@subtract@saveresult(#1#2#3#4)% %We keep the #2#3#4 to be sure we have all three relax-es to strip off.
\else
%Problem! The second string was longer than the first.
%This usually indicates the end of the long division process.
\FX@subtract@failedtrue
\def\FX@subtraction@result{}%
\fi
\else
% There is still a coefficient to manipulate in #2#3.
% Check whether #5 contains anything.
\ifx\qr@testv\qr@relax
% No, #5 is empty. We are done. "#2#3#4" contains the remainder of the first string,
% which we append untouched and then strip off the three \relax-es.
\FX@subtract@saveresult(#1#2#3#4)%
\else
% Yes, #5#6 still has something to XOR. Do the task.
\F@multiply{#5#6}{#8}% Multiply by the factor 'a'.
\F@addstrings{#2#3}{\F@result}% Subtract. (We're in characteristic two, so adding works.)
\edef\qr@argument{(#1\F@result,#4)(#7)(#8)}%
\xa\FX@subtract@recursive\qr@argument%
\fi
\fi
}%
\def\FX@subtract@saveresult(#1\relax\relax\relax){%
%Strips off the three extra '\relax'es at the end.
\def\FX@subtraction@result{#1}%
}%
\def\FX@creategeneratorpolynomial#1{%
% #1 = n, the number of error codewords desired.
% We need to create \prod_{j=0}^{n-1} (x-2^j).
\edef\FX@generator@degree{#1}%
\def\FX@generatorpolynomial{01}% Initially, set it equal to 1.
\setcounter{qr@i}{0}%
\FX@creategenerator@recursive%
%The result is now stored in \FX@generatorpolynomial
}%
\def\FX@creategenerator@recursive{%
% \c@qr@i contains the current value of i.
% \FX@generatorpolynomial contains the current polynomial f(x),
% which should be a degree-i polynomial
% equal to \prod_{j=0}^{i-1} (x-2^j).
% (If i=0, then \FX@generatorpolynomial should be 01.)
% This recursion step should multiply the existing polynomial by (x-2^i),
% increment i by 1, and check whether we're done or not.
\edef\qr@summandA{\FX@generatorpolynomial 00}% This is f(x) * x
\edef\qr@summandB{00\FX@generatorpolynomial}% This is f(x), with a 0x^{i+1} in front.
\F@twotothe{\theqr@i}%
\edef\qr@theconstant{\F@result}%
\FX@subtractphase{\qr@summandA}{\qr@summandB}{\qr@theconstant}%
%This calculates \qr@summandA + \qr@theconstant * \qr@summandB
%and stores the result in \FX@subtraction@result
\edef\FX@generatorpolynomial{\FX@subtraction@result}%
\stepcounter{qr@i}%
\xa\ifnum\FX@generator@degree=\c@qr@i\relax%
%We just multiplied by (x-2^{n-1}), so we're done.
\relax%
\else%
%We need to do this again!
\xa%
\FX@creategenerator@recursive%
\fi%
}%
\def\FX@generate@errorbytes#1#2{%
% #1 = datastream in hex
% #2 = number of error correction bytes requested
\edef\qr@numerrorbytes{#2}%
\xa\FX@creategeneratorpolynomial\xa{\qr@numerrorbytes}%
\edef\FX@numerator{#1}%
\qr@for \i = 1 to \qr@numerrorbytes by 1%
{\g@addto@macro\FX@numerator{00}}% %One error byte means two hex codes.
\FX@polynomialdivide{\FX@numerator}{\FX@generatorpolynomial}%
\edef\FX@errorbytes{\qr@theremainder}%
}%
% \end{macrocode}
%
% \subsection{Version handling}
% \begin{macrocode}
\newif\ifqr@versionmodules
\def\qr@level@char#1{%
\xa\ifcase#1
M\or L\or H\or Q\fi}%
\newif\ifqr@versiongoodenough
\def\qr@choose@best@version#1{%
% \qr@desiredversion = user-requested version
% \qr@desiredlevel = user-requested error-correction level
\edef\qr@plaintext{#1}%
\qr@getstringlength{\qr@plaintext}%
%
%Run double loop over levels and versions, looking for
%the smallest version that can contain our data,
%and then choosing the best error-correcting level at that version,
%subject to the level being at least as good as the user desires.
\global\qr@versiongoodenoughfalse%
\gdef\qr@bestversion{0}%
\gdef\qr@bestlevel{0}%
\ifnum\qr@desiredversion=0\relax
\qr@a=1\relax
\else
\qr@a=\qr@desiredversion\relax
\fi
\qr@for \i=\qr@a to 40 by 1
{\edef\qr@version{\the\i}%
\global\qr@versiongoodenoughfalse
\qr@for \j=0 to 3 by 1%
{%First, we map {0,1,2,3} to {1,0,4,3}, so that we loop through {M,L,H,Q}
%in order of increasing error-correction capabilities.
\qr@a = \j\relax
\divide \qr@a by 2\relax
\multiply \qr@a by 4\relax
\advance \qr@a by 1\relax
\advance \qr@a by -\j\relax
\edef\qr@level{\the\qr@a}%
\ifnum\qr@desiredlevel=\qr@a\relax
\global\qr@versiongoodenoughtrue
\fi
\ifqr@versiongoodenough
\qr@calculate@capacity{\qr@version}{\qr@level}%
\xa\xa\xa\ifnum\xa\qr@truecapacity\xa<\qr@stringlength\relax
%Too short
\relax
\else
%Long enough!
\xdef\qr@bestversion{\qr@version}%
\xdef\qr@bestlevel{\qr@level}%
\global\i=40%
\fi
\fi
}%
}%
\edef\qr@version{\qr@bestversion}%
\edef\qr@level{\qr@bestlevel}%
\xa\ifnum\qr@desiredversion>0\relax
\ifx\qr@bestversion\qr@desiredversion\relax
%No change from desired version.
\else
%Version was increased
\message{<Requested QR version '\qr@desiredversion' is too small for desired text.}%
\message{Version increased to '\qr@bestversion' to fit text.>^^J}%
\fi
\fi
\ifx\qr@bestlevel\qr@desiredlevel\relax
%No change in level.
\else
\message{<Error-correction level increased from \qr@level@char{\qr@desiredlevel}}%
\message{to \qr@level@char{\qr@bestlevel} at no cost.>^^J}%
\fi
}%
\def\qr@calculate@capacity#1#2{%
\edef\qr@version{#1}%
\edef\qr@level{#2}%
%Calculate \qr@size, the number of modules per side.
% The formula is 4\qr@version+17.
\qr@a=\qr@version\relax%
\multiply\qr@a by 4\relax%
\advance\qr@a by 17\relax%
\edef\qr@size{\the\qr@a}%
%
% Calculate \qr@k, which governs the number of alignment patterns.
% The alignment patterns lie in a kxk square, except for 3 that are replaced by finding patterns.
% The formula is 2 + floor( \qr@version / 7 ), except that k=0 for version 1.
\xa\ifnum\qr@version=1\relax%
\def\qr@k{0}%
\else%
\qr@a=\qr@version\relax
\divide \qr@a by 7\relax
\advance\qr@a by 2\relax
\edef\qr@k{\the\qr@a}%
\fi%
%
%Calculate number of function pattern modules.
%This consists of the three 8x8 finder patterns, the two timing strips, and the (k^2-3) 5x5 alignment patterns.
%The formula is 160+2n+25(k^2-3)-10(k-2), unless k=0 in which case we just have 160+2n.
\qr@a=\qr@size\relax
\multiply\qr@a by 2\relax
\advance\qr@a by 160\relax
\xa\ifnum\qr@k=0\relax\else
%\qr@k is nonzero, hence at least 2, so we continue to add 25(k^2-3)-10(k-2).
\qr@b=\qr@k\relax
\multiply\qr@b by \qr@k\relax
\advance\qr@b by -3\relax
\multiply\qr@b by 25\relax
\advance\qr@a by \qr@b\relax
\qr@b=\qr@k\relax
\advance\qr@b by -2\relax
\multiply\qr@b by 10\relax
\advance\qr@a by -\qr@b\relax
\fi
\edef\qr@numfunctionpatternmodules{\the\qr@a}%
%
%Calculate the number of version modules, either 36 or 0.
\xa\ifnum\qr@version>6\relax
\qr@versionmodulestrue
\def\qr@numversionmodules{36}%
\else
\qr@versionmodulesfalse
\def\qr@numversionmodules{0}%
\fi
%
%Now calculate the codeword capacity and remainder bits.
%Take n^2 modules, subtract all those dedicated to finder patterns etc., format information, and version information,
%and what's left is the number of bits we can play with.
%The number of complete bytes is \qr@numdatacodewords;
%the leftover bits are \qr@numremainderbits.
\qr@a=\qr@size\relax
\multiply \qr@a by \qr@size\relax
\advance \qr@a by -\qr@numfunctionpatternmodules\relax
\advance \qr@a by -31\relax% % There are 31 format modules.
\advance \qr@a by -\qr@numversionmodules\relax
\qr@b=\qr@a\relax
\divide \qr@a by 8\relax
\edef\qr@numdatacodewords{\the\qr@a}%
\multiply\qr@a by 8\relax
\advance \qr@b by -\qr@a\relax
\edef\qr@numremainderbits{\the\qr@b}%
%
%The size of the character count indicator also varies by version.
%There are only two options, so hardcoding seems easier than expressing these functionally.
\xa\ifnum\qr@version<10\relax
\def\qr@charactercountbytes@byte{1}%
\def\qr@charactercountbits@byte{8}%
\else
\def\qr@charactercountbytes@byte{2}%
\def\qr@charactercountbits@byte{16}%
\fi
%
%Now we call on the table, from the QR specification,
%of how many blocks to divide the message into, and how many error bytes each block gets.
%This affects the true capacity for data, which we store into \qr@totaldatacodewords.
% The following macro sets \qr@numblocks and \qr@num@eccodewords
% based on Table 9 of the QR specification.
\qr@settableix
\qr@a = -\qr@numblocks\relax
\multiply \qr@a by \qr@num@eccodewords\relax
\advance\qr@a by \qr@numdatacodewords\relax
\edef\qr@totaldatacodewords{\the\qr@a}%
\advance\qr@a by -\qr@charactercountbytes@byte\relax%Subtract character count
\advance\qr@a by -1\relax% Subtract 1 byte for the 4-bit mode indicator and the 4-bit terminator at the end.
\edef\qr@truecapacity{\the\qr@a}%
}
\def\qr@setversion#1#2{%
% #1 = version number, an integer between 1 and 40 inclusive.
% #2 = error-correction level, as an integer between 0 and 3 inclusive.
% 0 = 00 = M
% 1 = 01 = L
% 2 = 10 = H
% 3 = 11 = Q
% This macro calculates and sets a variety of global macros and/or counters
% storing version information that is used later in construction the QR code.
% Thus \qr@setversion should be called every time!
%
\edef\qr@version{#1}%
\edef\qr@level{#2}%
%
\qr@calculate@capacity{\qr@version}{\qr@level}%
%The capacity-check code sets the following:
% * \qr@size
% * \qr@k
% * \ifqr@versionmodules
% * \qr@numversionmodules
% * \qr@numdatacodewords
% * \qr@numremainderbits
% * \qr@charactercountbits@byte
% * \qr@charactercountbytes@byte
% * \qr@numblocks (via \qr@settableix)
% * \qr@num@eccodewords (via \qr@settableix)
% * \qr@totaldatacodewords
%
% The alignment patterns' square is 7 modules in from each edge.
% They are spaced "as evenly as possible" with an even number of modules between each row/column,
% unevenness in division being accommodated by making the first such gap smaller.
% The formula seems to be
% general distance = 2*round((n-13)/(k-1)/2+0.25)
% = 2*floor((n-13)/(k-1)/2+0.75)
% = 2*floor( (2*(n-13)/(k-1)+3) / 4 )
% = (((2*(n-13)) div (k-1) + 3 ) div 4 ) * 2
% first distance = leftovers
% The 0.25 is to accommodate version 32, which is the only time we round down.
% Otherwise a simple 2*ceiling((n-13)/(k-1)/2) would have sufficed.
%
\qr@a = \qr@size\relax
\advance\qr@a by -13\relax
\multiply\qr@a by 2\relax
\qr@b = \qr@k\relax
\advance \qr@b by -1\relax
\divide\qr@a by \qr@b\relax
\advance\qr@a by 3\relax
\divide\qr@a by 4\relax
\multiply\qr@a by 2\relax
\edef\qr@alignment@generalskip{\the\qr@a}%
%
%Now set \qr@alignment@firstskip to (\qr@size-13)-(\qr@k-2)*\qr@alignment@generalskip %
\qr@a = \qr@k\relax
\advance\qr@a by -2\relax
\multiply\qr@a by -\qr@alignment@generalskip\relax
\advance\qr@a by \qr@size\relax
\advance\qr@a by -13\relax
\edef\qr@alignment@firstskip{\the\qr@a}%
%
%
%
% Our \qr@totaldatacodewords bytes of data are broken up as evenly as possible
% into \qr@numblocks datablocks; some may be one byte longer than others.
% We set \qr@shortblock@size to floor(\qr@totaldatacodewords / \qr@numblocks)
% and \qr@numlongblocks to mod(\qr@totaldatacodewords , \qr@numblocks).
\qr@a=\qr@totaldatacodewords\relax
\divide\qr@a by \qr@numblocks\relax
\edef\qr@shortblock@size{\the\qr@a}%
\multiply\qr@a by -\qr@numblocks\relax
\advance\qr@a by \qr@totaldatacodewords\relax
\edef\qr@numlongblocks{\the\qr@a}%
%
%Set \qr@longblock@size to \qr@shortblock@size+1.
\qr@a=\qr@shortblock@size\relax
\advance\qr@a by 1\relax
\edef\qr@longblock@size{\the\qr@a}%
%
%Set \qr@numshortblocks to \qr@numblocks - \qr@numlongblocks
\qr@b=\qr@numblocks\relax
\advance\qr@b by -\qr@numlongblocks\relax
\edef\qr@numshortblocks{\the\qr@b}%
}%
\def\qr@settableix@int(#1,#2){%
\edef\qr@numblocks{#1}%
\edef\qr@num@eccodewords{#2}%
}%
\def\qr@settableix{%
\xa\ifcase\qr@level\relax
%00: Level 'M', medium error correction
\edef\qr@tempdata{(%
\ifcase\qr@version\relax
\relax %There is no version 0.
\or1,10%
\or1,16%
\or1,26%
\or2,18%
\or2,24%
\or4,16%
\or4,18%
\or4,22%
\or5,22%
\or5,26%
\or5,30%
\or8,22%
\or9,22%
\or9,24%
\or10,24%
\or10,28%
\or11,28%
\or13,26%
\or14,26%
\or16,26%
\or17,26%
\or17,28%
\or18,28%
\or20,28%
\or21,28%
\or23,28%
\or25,28%
\or26,28%
\or28,28%
\or29,28%
\or31,28%
\or33,28%
\or35,28%
\or37,28%
\or38,28%
\or40,28%
\or43,28%
\or45,28%
\or47,28%
\or49,28%
\fi)}%
\or
%01: Level 'L', low error correction
\edef\qr@tempdata{%
(\ifcase\qr@version\relax
\relax %There is no version 0.
\or 1,7%
\or 1,10%
\or 1,15%
\or 1,20%
\or 1,26%
\or 2,18%
\or 2,20%
\or 2,24%
\or 2,30%
\or 4,18%
\or 4,20%
\or 4,24%
\or 4,26%
\or 4,30%
\or 6,22%
\or 6,24%
\or 6,28%
\or 6,30%
\or 7,28%
\or 8,28%
\or 8,28%
\or 9,28%
\or 9,30%
\or 10,30%
\or 12,26%
\or 12,28%
\or 12,30%
\or 13,30%
\or 14,30%
\or 15,30%
\or 16,30%
\or 17,30%
\or 18,30%
\or 19,30%
\or 19,30%
\or 20,30%
\or 21,30%
\or 22,30%
\or 24,30%
\or 25,30%
\fi)}%
\or
%10: Level 'H', high error correction
\edef\qr@tempdata{(%
\ifcase\qr@version\relax
\relax %There is no version 0.
\or1,17%
\or1,28%
\or2,22%
\or4,16%
\or4,22%
\or4,28%
\or5,26%
\or6,26%
\or8,24%
\or8,28%
\or11,24%
\or11,28%
\or16,22%
\or16,24%
\or18,24%
\or16,30%
\or19,28%
\or21,28%
\or25,26%
\or25,28%
\or25,30%
\or34,24%
\or30,30%
\or32,30%
\or35,30%
\or37,30%
\or40,30%
\or42,30%
\or45,30%
\or48,30%
\or51,30%
\or54,30%
\or57,30%
\or60,30%
\or63,30%
\or66,30%
\or70,30%
\or74,30%
\or77,30%
\or81,30%
\fi)}%
\or
%11: Level 'Q', quality error correction
\edef\qr@tempdata{(%
\ifcase\qr@version\relax
\relax %There is no version 0.
\or1,13%
\or1,22%
\or2,18%
\or2,26%
\or4,18%
\or4,24%
\or6,18%
\or6,22%
\or8,20%
\or8,24%
\or8,28%
\or10,26%
\or12,24%
\or16,20%
\or12,30%
\or17,24%
\or16,28%
\or18,28%
\or21,26%
\or20,30%
\or23,28%
\or23,30%
\or25,30%
\or27,30%
\or29,30%
\or34,28%
\or34,30%
\or35,30%
\or38,30%
\or40,30%
\or43,30%
\or45,30%
\or48,30%
\or51,30%
\or53,30%
\or56,30%
\or59,30%
\or62,30%
\or65,30%
\or68,30%
\fi)}%
\fi
\xa\qr@settableix@int\qr@tempdata
}%
% \end{macrocode}
% \subsection{More key handling}
% \begin{macrocode}
\define@key{qr}{version}{\edef\qr@desiredversion{#1}}%
\define@key{qr}{level}{\qr@setlevel{#1}}%
\define@key{qr}{height}{\qr@setheight{#1}}%
\define@boolkey{qr}[qr@]{tight}[true]{}% %This creates \ifqr@tight and initializes it to true.
\define@boolkey{qr}[qr@]{padding}[true]{\ifqr@padding\qr@tightfalse\else\qr@tighttrue\fi}% %Define 'padding' as antonym to 'tight'
\def\@qr@M{M}\def\@qr@z{0}%
\def\@qr@L{L}\def\@qr@i{1}%
\def\@qr@H{H}\def\@qr@ii{2}%
\def\@qr@Q{Q}\def\@qr@iii{3}%
\def\qr@setlevel#1{%
\edef\qr@level@selected{#1}%
\ifx\qr@level@selected\@qr@M
\edef\qr@desiredlevel{0}%
\fi
\ifx\qr@level@selected\@qr@L
\edef\qr@desiredlevel{1}%
\fi
\ifx\qr@level@selected\@qr@H
\edef\qr@desiredlevel{2}%
\fi
\ifx\qr@level@selected\@qr@Q
\edef\qr@desiredlevel{3}%
\fi
\ifx\qr@level@selected\@qr@z
\edef\qr@desiredlevel{0}%
\fi
\ifx\qr@level@selected\@qr@i
\edef\qr@desiredlevel{1}%
\fi
\ifx\qr@level@selected\@qr@ii
\edef\qr@desiredlevel{2}%
\fi
\ifx\qr@level@selected\@qr@iii
\edef\qr@desiredlevel{3}%
\fi
}%
\def\qr@setheight#1{%
\setlength{\qr@desiredheight}{#1}%
}%
\newcommand\qrset[1]{%
\setkeys{qr}{#1}%
}
%SET DEFAULTS
\qrset{version=0, level=0, tight}
% \end{macrocode}
% \subsection{Main user functions}
% At last we are ready to define the main user functions.
% Some care is needed to ensure
% that the \meta{text to be encoded} is read with the appropriate catcodes,
% and that any escaped special characters are converted to the intended
% characters with category code 12 (other).
% \begin{macrocode}
\newif\ifqr@starinvoked%
\def\qrcode{\@ifstar\qrcode@star\qrcode@nostar}%
\def\qrcode@star{\qr@starinvokedtrue\qrcode@i}%
\def\qrcode@nostar{\qr@starinvokedfalse\qrcode@i}%
\newcommand\qrcode@i[1][]{%
\begingroup%
\ifqr@starinvoked%
\qr@hyperlinkfalse%
\fi%
\setkeys{qr}{#1}%
\bgroup\qr@verbatimcatcodes\qr@setescapedspecials\qrcode@in}%
\def\qrcode@in#1{\xdef\qr@texttoencode{#1}\egroup\qrcode@int\endgroup}%
\def\qrcode@hyperwrapper@hyperref{\href{\qr@texttoencode}}%
\def\qrcode@hyperwrapper@nohyperref{\relax}%
\AtBeginDocument{%
\@ifpackageloaded{hyperref}%
{\global\let\qrcode@hyperwrapper=\qrcode@hyperwrapper@hyperref}%
{\global\let\qrcode@hyperwrapper=\qrcode@hyperwrapper@nohyperref}%
}%
\def\qrcode@int{%
\message{^^J^^J<QR code requested for "\qr@texttoencode" in version
\qr@desiredversion-\qr@level@char{\qr@desiredlevel}.>^^J}%
%First, choose the version and level.
%Recall that \qr@choose@best@version sets \qr@version and \qr@level.
\xa\qr@choose@best@version\xa{\qr@texttoencode}%
\qr@setversion{\qr@version}{\qr@level}%
%
\ifqr@hyperlink%
\let\qrcode@wrapper=\qrcode@hyperwrapper%
\else%
\let\qrcode@wrapper=\relax%
\fi%
%
%Next, check whether we have already encoded this text at this version
%and level.
\qrcode@wrapper{%
\xa\ifx\csname qr@savedbinarymatrix@\qr@texttoencode @\qr@version @\qr@level\endcsname
\relax%
%This text has not yet been encoded.
\qrcode@int@new%
\else
%This text has already been encoded!
\ifqr@forget@mode
%In 'forget' mode, we deliberately recalculate anyway.
\qrcode@int@new%
\else
\qrcode@int@remember%
\fi
\fi%
}%
}%
\def\qrcode@int@new{%
\qr@createsquareblankmatrix{newqr}{\qr@size}%
\qr@placefinderpatterns{newqr}%
\qr@placetimingpatterns{newqr}%
\qr@placealignmentpatterns{newqr}%
\qr@placedummyformatpatterns{newqr}%
\qr@placedummyversionpatterns{newqr}%
\ifqr@draft@mode
\message{<Inserting dummy QR code in draft mode for "\qr@texttoencode" in
version \qr@version-\qr@level@char{\qr@level}.>^^J}%
\relax% Draft mode---don't load any data or do any work. Also don't save!
\def\qr@format@square{\qr@black}%
\def\qr@blank{\qr@white}%
\fboxsep=-\fboxrule%
\fbox{\qr@printmatrix{newqr}}%
\else
\message{<Calculating QR code for "\qr@texttoencode" in
version \qr@version-\qr@level@char{\qr@level}.>^^J}%
\xa\qr@encode@binary\xa{\qr@texttoencode}%
\qr@splitcodetextintoblocks
\qr@createerrorblocks
\qr@interleave
\message{<Writing data...}%
\qr@writedata@hex{newqr}{\qr@interleaved@text}%
\message{done.>^^J}%
\qr@writeremainderbits{newqr}%
\qr@chooseandapplybestmask{newqr}%
\qr@decimaltobinary[2]{\qr@level@binary}{\qr@level}%
\qr@decimaltobinary[3]{\qr@mask@binary}{\qr@mask@selected}%
\edef\qr@formatstring{\qr@level@binary\qr@mask@binary}%
\message{<Encoding and writing format string...}%
\xa\qr@encodeandmaskformat\xa{\qr@formatstring}%
\qr@writeformatstring{newqr}{\qr@format@bitstring}%
\message{done.>^^J}%
\message{<Encoding and writing version information...}%
\qr@decimaltobinary[6]{\qr@version@binary}{\qr@version}%
\qr@Golaycode{\qr@version@binary}%
\qr@writeversionstring{newqr}{\qr@Golayresult}%
\message{done.>^^J}%
\message{<Saving QR code to memory...}%
\qr@matrixtobinary{newqr}%
%
%Now save the binary version into TeX's memory for later use in this document.
\xa\xdef\csname qr@savedbinarymatrix@\qr@texttoencode @\qr@version @\qr@level\endcsname
{\qr@binarymatrix@result}%
\message{done.>^^J}%
%
%Also save the binary version into the aux file, for use in later runs.
\message{<Writing QR code to aux file...}%
\qr@writebinarymatrixtoauxfile{\qr@binarymatrix@result}%
\message{done.>^^J}%
\message{<Printing matrix...}%
\qr@printmatrix{newqr}%
\message{done.>^^J}%
\fi
\message{^^J}%
}%
\def\qrcode@int@remember{%
%This text has already been encoded,
%so we just copy it from the saved binary string.
\message{<Copying the QR code for "\qr@texttoencode" in version \qr@version-\qr@level@char{\qr@level} as previously calculated.>^^J}%
\xa\qr@printsavedbinarymatrix\xa{\csname qr@savedbinarymatrix@\qr@texttoencode @\qr@version @\qr@level\endcsname}%
%
% Now this still might need to be written to the aux file.
%
\xa\ifx\csname qr@savedflag@\qr@texttoencode @\qr@version @\qr@level\endcsname\@qr@TRUE
%Okay, this has already been written to aux file.
%Do nothing.
\relax%
\else%
%This has NOT been written to the aux file yet.
%We need to do so now.
\xa\qr@writebinarymatrixtoauxfile\xa{\csname qr@savedbinarymatrix@\qr@texttoencode @\qr@version @\qr@level\endcsname}%
\fi%
}%
\def\qr@matrixtobinary#1{%
\def\qr@binarymatrix@result{}%
\bgroup
\def\qr@black{1}%
\def\qr@white{0}%
\def\qr@blank{0}%
\def\qr@black@fixed{1}%
\def\qr@white@fixed{0}%
\def\qr@black@format{1}%
\def\qr@white@format{0}%
%
\qr@for \i = 1 to \qr@size by 1%
{\qr@for \j = 1 to \qr@size by 1%
{\edef\qr@theentry{\qr@matrixentry{#1}{\the\i}{\the\j}}%
\xa\g@addto@macro\xa\qr@binarymatrix@result\xa{\qr@theentry}%
}%
}%
\egroup%
}%
\def\qr@sanitize@output#1{%
%Read through ASCII text '#1' and escape backslashes and braces
\def\qr@sanitized@result{}%
\edef\qr@argument{(#1\relax\relax\relax)}%
\xa\qr@sanitize@output@int\qr@argument%
}
\def\qr@sanitize@output@int(#1#2){%
% #1 = first character
% #2 = rest of output, including terminator
\edef\qr@testi{#1}%
\ifx\qr@testi\qr@relax
% Done.
\let\qr@next=\relax
\else
\ifx\qr@testi\qr@otherrightbrace
\edef\qr@sanitized@result{\qr@sanitized@result\qr@otherbackslash}%
\else\ifx\qr@testi\qr@otherleftbrace
\edef\qr@sanitized@result{\qr@sanitized@result\qr@otherbackslash}%
\else\ifx\qr@testi\qr@otherbackslash
\edef\qr@sanitized@result{\qr@sanitized@result\qr@otherbackslash}%
\fi
\fi
\fi
\edef\qr@sanitized@result{\qr@sanitized@result#1}%
\def\qr@next{\qr@sanitize@output@int(#2)}%
\fi
\qr@next
}
\def\@qr@TRUE{TRUE}%
\def\qr@writebinarymatrixtoauxfile#1{%
\qr@sanitize@output{\qr@texttoencode}%
\edef\qr@theargument{{\qr@sanitized@result}{\qr@version}{\qr@level}{#1}}%
\xa\write\xa\@auxout\xa{\xa\string\xa\qr@savematrix\qr@theargument}%
%
% Now set a flag, so we don't write this again.
\xa\gdef\csname qr@savedflag@\qr@texttoencode @\qr@version @\qr@level\endcsname{TRUE}%
}%
\gdef\qr@dummyqrsavedefinition{}%
\begingroup
\catcode`\#=12\relax
\catcode`\<=1\relax
\catcode`\{=12\relax
\catcode`\>=2\relax
\catcode`\}=12\relax
\catcode`\|=0\relax
\catcode`\\=12|relax
|gdef|qr@dummyqrsavedefinition<%
\ifx\qr@savematrix\@undefined%
\def\qr@savematrix{\begingroup\let\do\@makeother\dospecials\catcode`\{=1\catcode`\}=2\relax
\qr@savematrix@int}%
\def\qr@savematrix@int#1#2#3#4{\endgroup}%
\fi%
>
|endgroup
\edef\qr@argument{(\qr@dummyqrsavedefinition)}%
\xa\write\xa\@auxout\xa{\qr@dummyqrsavedefinition}%
\def\qr@savematrix{\bgroup\qr@verbatimcatcodes\qr@setescapedspecials\qr@savematrix@int}%
\def\qr@savematrix@int#1{\xdef\qr@savedmatrix@name{#1}\egroup\qr@savematrix@int@int}%
\def\qr@savematrix@int@int#1#2#3{%
% \qr@savedmatrix@name = encoded text
% #1 = version
% #2 = level
% #3 = binary text
\def\ds{<Reading QR code for "\qr@savedmatrix@name" at level #1-\qr@level@char{#2} from aux file.>^^J}\xa\message\xa{\ds}%
{\let\%=\qr@otherpercent
\xa\gdef\csname qr@savedbinarymatrix@\qr@savedmatrix@name @#1@#2\endcsname{#3}%
}%
}%
% \end{macrocode}
%
% \Finale
\endinput