@@ -514,7 +514,7 @@ def get_object(
514
514
def read_object_header (self , stream : StreamType ) -> Tuple [int , int ]:
515
515
# Should never be necessary to read out whitespace, since the
516
516
# cross-reference table should put us in the right spot to read the
517
- # object header. In reality... some files have stupid cross reference
517
+ # object header. In reality some files have stupid cross reference
518
518
# tables that are off by whitespace bytes.
519
519
extra = False
520
520
skip_over_comment (stream )
@@ -736,8 +736,8 @@ def _read_standard_xref_table(self, stream: StreamType) -> None:
736
736
737
737
# On the other hand, some malformed PDF files
738
738
# use a single character EOL without a preceding
739
- # space. Detect that case, and seek the stream
740
- # back one character. (0-9 means we've bled into
739
+ # space. Detect that case, and seek the stream
740
+ # back one character (0-9 means we've bled into
741
741
# the next xref entry, t means we've bled into the
742
742
# text "trailer"):
743
743
if line [- 1 ] in b"0123456789t" :
@@ -896,7 +896,7 @@ def _read_xref_other_error(
896
896
__name__ ,
897
897
)
898
898
return None
899
- # bad xref character at startxref. Let's see if we can find
899
+ # bad xref character at startxref. Let's see if we can find
900
900
# the xref table nearby, as we've observed this error with an
901
901
# off-by-one before.
902
902
stream .seek (- 11 , 1 )
@@ -1063,7 +1063,7 @@ def decrypt(self, password: Union[str, bytes]) -> PasswordType:
1063
1063
owner password, and then stores the resulting decryption key if either
1064
1064
password is correct.
1065
1065
1066
- It does not matter which password was matched. Both passwords provide
1066
+ It does not matter which password was matched. Both passwords provide
1067
1067
the correct decryption key that will allow the document to be used with
1068
1068
this library.
1069
1069
0 commit comments