blob: a28eed06792ab2b005929f8738e02fee225a9d00 [file] [log] [blame]
The Android Open Source Project893912b2009-03-03 19:30:05 -08001
2/* png.c - location for general purpose libpng functions
3 *
Matt Sarett96be9082016-05-03 13:29:54 -04004 * Last changed in libpng 1.6.19 [November 12, 2015]
5 * Copyright (c) 1998-2015 Glenn Randers-Pehrson
The Android Open Source Project893912b2009-03-03 19:30:05 -08006 * (Version 0.96 Copyright (c) 1996, 1997 Andreas Dilger)
7 * (Version 0.88 Copyright (c) 1995, 1996 Guy Eric Schalnat, Group 42, Inc.)
Patrick Scotta0bb96c2009-07-22 11:50:02 -04008 *
9 * This code is released under the libpng license.
10 * For conditions of distribution and use, see the disclaimer
11 * and license in png.h
The Android Open Source Project893912b2009-03-03 19:30:05 -080012 */
13
Chris Craikb50c2172013-07-29 15:28:30 -070014#include "pngpriv.h"
The Android Open Source Project893912b2009-03-03 19:30:05 -080015
16/* Generate a compiler error if there is an old png.h in the search path. */
Matt Sarett96be9082016-05-03 13:29:54 -040017typedef png_libpng_version_1_6_20 Your_png_h_is_not_version_1_6_20;
The Android Open Source Project893912b2009-03-03 19:30:05 -080018
19/* Tells libpng that we have already handled the first "num_bytes" bytes
20 * of the PNG file signature. If the PNG data is embedded into another
21 * stream we can set num_bytes = 8 so that libpng will not attempt to read
22 * or write any of the magic bytes before it starts on the IHDR.
23 */
24
25#ifdef PNG_READ_SUPPORTED
26void PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -070027png_set_sig_bytes(png_structrp png_ptr, int num_bytes)
The Android Open Source Project893912b2009-03-03 19:30:05 -080028{
Matt Sarett96be9082016-05-03 13:29:54 -040029 unsigned int nb = (unsigned int)num_bytes;
30
Patrick Scott5f6bd842010-06-28 16:55:16 -040031 png_debug(1, "in png_set_sig_bytes");
32
Patrick Scotta0bb96c2009-07-22 11:50:02 -040033 if (png_ptr == NULL)
34 return;
Patrick Scott5f6bd842010-06-28 16:55:16 -040035
Matt Sarett96be9082016-05-03 13:29:54 -040036 if (num_bytes < 0)
37 nb = 0;
38
39 if (nb > 8)
Chris Craikb50c2172013-07-29 15:28:30 -070040 png_error(png_ptr, "Too many bytes for PNG signature");
The Android Open Source Project893912b2009-03-03 19:30:05 -080041
Matt Sarett96be9082016-05-03 13:29:54 -040042 png_ptr->sig_bytes = (png_byte)nb;
The Android Open Source Project893912b2009-03-03 19:30:05 -080043}
44
45/* Checks whether the supplied bytes match the PNG signature. We allow
46 * checking less than the full 8-byte signature so that those apps that
47 * already read the first few bytes of a file to determine the file type
48 * can simply check the remaining bytes for extra assurance. Returns
49 * an integer less than, equal to, or greater than zero if sig is found,
50 * respectively, to be less than, to match, or be greater than the correct
Chris Craikb50c2172013-07-29 15:28:30 -070051 * PNG signature (this is the same behavior as strcmp, memcmp, etc).
The Android Open Source Project893912b2009-03-03 19:30:05 -080052 */
53int PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -070054png_sig_cmp(png_const_bytep sig, png_size_t start, png_size_t num_to_check)
The Android Open Source Project893912b2009-03-03 19:30:05 -080055{
56 png_byte png_signature[8] = {137, 80, 78, 71, 13, 10, 26, 10};
Chris Craikb50c2172013-07-29 15:28:30 -070057
The Android Open Source Project893912b2009-03-03 19:30:05 -080058 if (num_to_check > 8)
59 num_to_check = 8;
Chris Craikb50c2172013-07-29 15:28:30 -070060
The Android Open Source Project893912b2009-03-03 19:30:05 -080061 else if (num_to_check < 1)
62 return (-1);
63
64 if (start > 7)
65 return (-1);
66
67 if (start + num_to_check > 8)
68 num_to_check = 8 - start;
69
Chris Craikb50c2172013-07-29 15:28:30 -070070 return ((int)(memcmp(&sig[start], &png_signature[start], num_to_check)));
The Android Open Source Project893912b2009-03-03 19:30:05 -080071}
72
Matt Sarett96be9082016-05-03 13:29:54 -040073#endif /* READ */
The Android Open Source Project893912b2009-03-03 19:30:05 -080074
75#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Chris Craikb50c2172013-07-29 15:28:30 -070076/* Function to allocate memory for zlib */
77PNG_FUNCTION(voidpf /* PRIVATE */,
78png_zalloc,(voidpf png_ptr, uInt items, uInt size),PNG_ALLOCATED)
The Android Open Source Project893912b2009-03-03 19:30:05 -080079{
Chris Craikb50c2172013-07-29 15:28:30 -070080 png_alloc_size_t num_bytes = size;
The Android Open Source Project893912b2009-03-03 19:30:05 -080081
Patrick Scotta0bb96c2009-07-22 11:50:02 -040082 if (png_ptr == NULL)
Chris Craikb50c2172013-07-29 15:28:30 -070083 return NULL;
The Android Open Source Project893912b2009-03-03 19:30:05 -080084
Chris Craikb50c2172013-07-29 15:28:30 -070085 if (items >= (~(png_alloc_size_t)0)/size)
The Android Open Source Project893912b2009-03-03 19:30:05 -080086 {
Chris Craikb50c2172013-07-29 15:28:30 -070087 png_warning (png_voidcast(png_structrp, png_ptr),
88 "Potential overflow in png_zalloc()");
89 return NULL;
The Android Open Source Project893912b2009-03-03 19:30:05 -080090 }
Chris Craikb50c2172013-07-29 15:28:30 -070091
92 num_bytes *= items;
93 return png_malloc_warn(png_voidcast(png_structrp, png_ptr), num_bytes);
The Android Open Source Project893912b2009-03-03 19:30:05 -080094}
95
Patrick Scotta0bb96c2009-07-22 11:50:02 -040096/* Function to free memory for zlib */
Patrick Scott5f6bd842010-06-28 16:55:16 -040097void /* PRIVATE */
The Android Open Source Project893912b2009-03-03 19:30:05 -080098png_zfree(voidpf png_ptr, voidpf ptr)
99{
Chris Craikb50c2172013-07-29 15:28:30 -0700100 png_free(png_voidcast(png_const_structrp,png_ptr), ptr);
The Android Open Source Project893912b2009-03-03 19:30:05 -0800101}
102
103/* Reset the CRC variable to 32 bits of 1's. Care must be taken
104 * in case CRC is > 32 bits to leave the top bits 0.
105 */
106void /* PRIVATE */
Chris Craikb50c2172013-07-29 15:28:30 -0700107png_reset_crc(png_structrp png_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800108{
Matt Sarett96be9082016-05-03 13:29:54 -0400109 /* The cast is safe because the crc is a 32-bit value. */
Chris Craikb50c2172013-07-29 15:28:30 -0700110 png_ptr->crc = (png_uint_32)crc32(0, Z_NULL, 0);
The Android Open Source Project893912b2009-03-03 19:30:05 -0800111}
112
113/* Calculate the CRC over a section of data. We can only pass as
114 * much data to this routine as the largest single buffer size. We
115 * also check that this data will actually be used before going to the
116 * trouble of calculating it.
117 */
118void /* PRIVATE */
Chris Craikb50c2172013-07-29 15:28:30 -0700119png_calculate_crc(png_structrp png_ptr, png_const_bytep ptr, png_size_t length)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800120{
121 int need_crc = 1;
122
Matt Sarett96be9082016-05-03 13:29:54 -0400123 if (PNG_CHUNK_ANCILLARY(png_ptr->chunk_name) != 0)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800124 {
125 if ((png_ptr->flags & PNG_FLAG_CRC_ANCILLARY_MASK) ==
126 (PNG_FLAG_CRC_ANCILLARY_USE | PNG_FLAG_CRC_ANCILLARY_NOWARN))
127 need_crc = 0;
128 }
Chris Craikb50c2172013-07-29 15:28:30 -0700129
130 else /* critical */
The Android Open Source Project893912b2009-03-03 19:30:05 -0800131 {
Matt Sarett96be9082016-05-03 13:29:54 -0400132 if ((png_ptr->flags & PNG_FLAG_CRC_CRITICAL_IGNORE) != 0)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800133 need_crc = 0;
134 }
135
Chris Craikb50c2172013-07-29 15:28:30 -0700136 /* 'uLong' is defined in zlib.h as unsigned long; this means that on some
Matt Sarett96be9082016-05-03 13:29:54 -0400137 * systems it is a 64-bit value. crc32, however, returns 32 bits so the
Chris Craikb50c2172013-07-29 15:28:30 -0700138 * following cast is safe. 'uInt' may be no more than 16 bits, so it is
139 * necessary to perform a loop here.
140 */
Matt Sarett96be9082016-05-03 13:29:54 -0400141 if (need_crc != 0 && length > 0)
Chris Craikb50c2172013-07-29 15:28:30 -0700142 {
143 uLong crc = png_ptr->crc; /* Should never issue a warning */
144
145 do
146 {
147 uInt safe_length = (uInt)length;
Matt Sarett96be9082016-05-03 13:29:54 -0400148#ifndef __COVERITY__
Chris Craikb50c2172013-07-29 15:28:30 -0700149 if (safe_length == 0)
150 safe_length = (uInt)-1; /* evil, but safe */
Matt Sarett96be9082016-05-03 13:29:54 -0400151#endif
Chris Craikb50c2172013-07-29 15:28:30 -0700152
153 crc = crc32(crc, ptr, safe_length);
154
155 /* The following should never issue compiler warnings; if they do the
156 * target system has characteristics that will probably violate other
157 * assumptions within the libpng code.
158 */
159 ptr += safe_length;
160 length -= safe_length;
161 }
162 while (length > 0);
163
164 /* And the following is always safe because the crc is only 32 bits. */
165 png_ptr->crc = (png_uint_32)crc;
166 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800167}
168
Chris Craikb50c2172013-07-29 15:28:30 -0700169/* Check a user supplied version number, called from both read and write
170 * functions that create a png_struct.
The Android Open Source Project893912b2009-03-03 19:30:05 -0800171 */
Chris Craikb50c2172013-07-29 15:28:30 -0700172int
173png_user_version_check(png_structrp png_ptr, png_const_charp user_png_ver)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800174{
Matt Sarett96be9082016-05-03 13:29:54 -0400175 /* Libpng versions 1.0.0 and later are binary compatible if the version
176 * string matches through the second '.'; we must recompile any
177 * applications that use any older library version.
178 */
179
180 if (user_png_ver != NULL)
Chris Craikb50c2172013-07-29 15:28:30 -0700181 {
Matt Sarett96be9082016-05-03 13:29:54 -0400182 int i = -1;
183 int found_dots = 0;
Chris Craikb50c2172013-07-29 15:28:30 -0700184
185 do
186 {
Matt Sarett96be9082016-05-03 13:29:54 -0400187 i++;
188 if (user_png_ver[i] != PNG_LIBPNG_VER_STRING[i])
Chris Craikb50c2172013-07-29 15:28:30 -0700189 png_ptr->flags |= PNG_FLAG_LIBRARY_MISMATCH;
Matt Sarett96be9082016-05-03 13:29:54 -0400190 if (user_png_ver[i] == '.')
191 found_dots++;
192 } while (found_dots < 2 && user_png_ver[i] != 0 &&
193 PNG_LIBPNG_VER_STRING[i] != 0);
Chris Craikb50c2172013-07-29 15:28:30 -0700194 }
195
196 else
197 png_ptr->flags |= PNG_FLAG_LIBRARY_MISMATCH;
198
Matt Sarett96be9082016-05-03 13:29:54 -0400199 if ((png_ptr->flags & PNG_FLAG_LIBRARY_MISMATCH) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -0700200 {
Chris Craikb50c2172013-07-29 15:28:30 -0700201#ifdef PNG_WARNINGS_SUPPORTED
Matt Sarett96be9082016-05-03 13:29:54 -0400202 size_t pos = 0;
203 char m[128];
Chris Craikb50c2172013-07-29 15:28:30 -0700204
Matt Sarett96be9082016-05-03 13:29:54 -0400205 pos = png_safecat(m, (sizeof m), pos,
206 "Application built with libpng-");
207 pos = png_safecat(m, (sizeof m), pos, user_png_ver);
208 pos = png_safecat(m, (sizeof m), pos, " but running with ");
209 pos = png_safecat(m, (sizeof m), pos, PNG_LIBPNG_VER_STRING);
210 PNG_UNUSED(pos)
Chris Craikb50c2172013-07-29 15:28:30 -0700211
Matt Sarett96be9082016-05-03 13:29:54 -0400212 png_warning(png_ptr, m);
Chris Craikb50c2172013-07-29 15:28:30 -0700213#endif
214
215#ifdef PNG_ERROR_NUMBERS_SUPPORTED
Matt Sarett96be9082016-05-03 13:29:54 -0400216 png_ptr->flags = 0;
Chris Craikb50c2172013-07-29 15:28:30 -0700217#endif
218
Matt Sarett96be9082016-05-03 13:29:54 -0400219 return 0;
Chris Craikb50c2172013-07-29 15:28:30 -0700220 }
221
222 /* Success return. */
223 return 1;
224}
225
226/* Generic function to create a png_struct for either read or write - this
227 * contains the common initialization.
228 */
229PNG_FUNCTION(png_structp /* PRIVATE */,
230png_create_png_struct,(png_const_charp user_png_ver, png_voidp error_ptr,
231 png_error_ptr error_fn, png_error_ptr warn_fn, png_voidp mem_ptr,
232 png_malloc_ptr malloc_fn, png_free_ptr free_fn),PNG_ALLOCATED)
233{
234 png_struct create_struct;
235# ifdef PNG_SETJMP_SUPPORTED
236 jmp_buf create_jmp_buf;
237# endif
238
239 /* This temporary stack-allocated structure is used to provide a place to
240 * build enough context to allow the user provided memory allocator (if any)
241 * to be called.
242 */
243 memset(&create_struct, 0, (sizeof create_struct));
244
245 /* Added at libpng-1.2.6 */
246# ifdef PNG_USER_LIMITS_SUPPORTED
247 create_struct.user_width_max = PNG_USER_WIDTH_MAX;
248 create_struct.user_height_max = PNG_USER_HEIGHT_MAX;
249
250# ifdef PNG_USER_CHUNK_CACHE_MAX
Matt Sarett96be9082016-05-03 13:29:54 -0400251 /* Added at libpng-1.2.43 and 1.4.0 */
252 create_struct.user_chunk_cache_max = PNG_USER_CHUNK_CACHE_MAX;
Chris Craikb50c2172013-07-29 15:28:30 -0700253# endif
254
255# ifdef PNG_USER_CHUNK_MALLOC_MAX
Matt Sarett96be9082016-05-03 13:29:54 -0400256 /* Added at libpng-1.2.43 and 1.4.1, required only for read but exists
257 * in png_struct regardless.
258 */
259 create_struct.user_chunk_malloc_max = PNG_USER_CHUNK_MALLOC_MAX;
Chris Craikb50c2172013-07-29 15:28:30 -0700260# endif
261# endif
262
263 /* The following two API calls simply set fields in png_struct, so it is safe
264 * to do them now even though error handling is not yet set up.
265 */
266# ifdef PNG_USER_MEM_SUPPORTED
267 png_set_mem_fn(&create_struct, mem_ptr, malloc_fn, free_fn);
Sireesh Tripurarib478e662014-05-09 15:15:10 +0530268# else
269 PNG_UNUSED(mem_ptr)
270 PNG_UNUSED(malloc_fn)
271 PNG_UNUSED(free_fn)
Chris Craikb50c2172013-07-29 15:28:30 -0700272# endif
273
274 /* (*error_fn) can return control to the caller after the error_ptr is set,
275 * this will result in a memory leak unless the error_fn does something
276 * extremely sophisticated. The design lacks merit but is implicit in the
277 * API.
278 */
279 png_set_error_fn(&create_struct, error_ptr, error_fn, warn_fn);
280
281# ifdef PNG_SETJMP_SUPPORTED
282 if (!setjmp(create_jmp_buf))
Matt Sarett96be9082016-05-03 13:29:54 -0400283# endif
Chris Craikb50c2172013-07-29 15:28:30 -0700284 {
Matt Sarett96be9082016-05-03 13:29:54 -0400285# ifdef PNG_SETJMP_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -0700286 /* Temporarily fake out the longjmp information until we have
287 * successfully completed this function. This only works if we have
288 * setjmp() support compiled in, but it is safe - this stuff should
289 * never happen.
290 */
291 create_struct.jmp_buf_ptr = &create_jmp_buf;
292 create_struct.jmp_buf_size = 0; /*stack allocation*/
293 create_struct.longjmp_fn = longjmp;
Chris Craikb50c2172013-07-29 15:28:30 -0700294# endif
295 /* Call the general version checker (shared with read and write code):
296 */
Matt Sarett96be9082016-05-03 13:29:54 -0400297 if (png_user_version_check(&create_struct, user_png_ver) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -0700298 {
299 png_structrp png_ptr = png_voidcast(png_structrp,
300 png_malloc_warn(&create_struct, (sizeof *png_ptr)));
301
302 if (png_ptr != NULL)
303 {
304 /* png_ptr->zstream holds a back-pointer to the png_struct, so
305 * this can only be done now:
306 */
307 create_struct.zstream.zalloc = png_zalloc;
308 create_struct.zstream.zfree = png_zfree;
309 create_struct.zstream.opaque = png_ptr;
310
311# ifdef PNG_SETJMP_SUPPORTED
Matt Sarett96be9082016-05-03 13:29:54 -0400312 /* Eliminate the local error handling: */
313 create_struct.jmp_buf_ptr = NULL;
314 create_struct.jmp_buf_size = 0;
315 create_struct.longjmp_fn = 0;
Chris Craikb50c2172013-07-29 15:28:30 -0700316# endif
317
318 *png_ptr = create_struct;
319
320 /* This is the successful return point */
321 return png_ptr;
322 }
323 }
324 }
325
326 /* A longjmp because of a bug in the application storage allocator or a
327 * simple failure to allocate the png_struct.
328 */
329 return NULL;
330}
331
332/* Allocate the memory for an info_struct for the application. */
333PNG_FUNCTION(png_infop,PNGAPI
334png_create_info_struct,(png_const_structrp png_ptr),PNG_ALLOCATED)
335{
336 png_inforp info_ptr;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800337
The Android Open Source Project4215dd12009-03-09 11:52:12 -0700338 png_debug(1, "in png_create_info_struct");
Patrick Scott5f6bd842010-06-28 16:55:16 -0400339
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400340 if (png_ptr == NULL)
Chris Craikb50c2172013-07-29 15:28:30 -0700341 return NULL;
Patrick Scott5f6bd842010-06-28 16:55:16 -0400342
Chris Craikb50c2172013-07-29 15:28:30 -0700343 /* Use the internal API that does not (or at least should not) error out, so
344 * that this call always returns ok. The application typically sets up the
345 * error handling *after* creating the info_struct because this is the way it
346 * has always been done in 'example.c'.
347 */
348 info_ptr = png_voidcast(png_inforp, png_malloc_base(png_ptr,
349 (sizeof *info_ptr)));
350
The Android Open Source Project893912b2009-03-03 19:30:05 -0800351 if (info_ptr != NULL)
Chris Craikb50c2172013-07-29 15:28:30 -0700352 memset(info_ptr, 0, (sizeof *info_ptr));
The Android Open Source Project893912b2009-03-03 19:30:05 -0800353
Chris Craikb50c2172013-07-29 15:28:30 -0700354 return info_ptr;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800355}
356
357/* This function frees the memory associated with a single info struct.
358 * Normally, one would use either png_destroy_read_struct() or
359 * png_destroy_write_struct() to free an info struct, but this may be
Chris Craikb50c2172013-07-29 15:28:30 -0700360 * useful for some applications. From libpng 1.6.0 this function is also used
361 * internally to implement the png_info release part of the 'struct' destroy
362 * APIs. This ensures that all possible approaches free the same data (all of
363 * it).
The Android Open Source Project893912b2009-03-03 19:30:05 -0800364 */
365void PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -0700366png_destroy_info_struct(png_const_structrp png_ptr, png_infopp info_ptr_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800367{
Chris Craikb50c2172013-07-29 15:28:30 -0700368 png_inforp info_ptr = NULL;
Patrick Scott5f6bd842010-06-28 16:55:16 -0400369
370 png_debug(1, "in png_destroy_info_struct");
371
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400372 if (png_ptr == NULL)
373 return;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800374
The Android Open Source Project893912b2009-03-03 19:30:05 -0800375 if (info_ptr_ptr != NULL)
376 info_ptr = *info_ptr_ptr;
377
378 if (info_ptr != NULL)
379 {
Chris Craikb50c2172013-07-29 15:28:30 -0700380 /* Do this first in case of an error below; if the app implements its own
381 * memory management this can lead to png_free calling png_error, which
382 * will abort this routine and return control to the app error handler.
383 * An infinite loop may result if it then tries to free the same info
384 * ptr.
385 */
The Android Open Source Project893912b2009-03-03 19:30:05 -0800386 *info_ptr_ptr = NULL;
Chris Craikb50c2172013-07-29 15:28:30 -0700387
388 png_free_data(png_ptr, info_ptr, PNG_FREE_ALL, -1);
389 memset(info_ptr, 0, (sizeof *info_ptr));
390 png_free(png_ptr, info_ptr);
The Android Open Source Project893912b2009-03-03 19:30:05 -0800391 }
392}
393
394/* Initialize the info structure. This is now an internal function (0.89)
395 * and applications using it are urged to use png_create_info_struct()
Chris Craikb50c2172013-07-29 15:28:30 -0700396 * instead. Use deprecated in 1.6.0, internal use removed (used internally it
397 * is just a memset).
398 *
399 * NOTE: it is almost inconceivable that this API is used because it bypasses
400 * the user-memory mechanism and the user error handling/warning mechanisms in
401 * those cases where it does anything other than a memset.
The Android Open Source Project893912b2009-03-03 19:30:05 -0800402 */
Chris Craikb50c2172013-07-29 15:28:30 -0700403PNG_FUNCTION(void,PNGAPI
404png_info_init_3,(png_infopp ptr_ptr, png_size_t png_info_struct_size),
405 PNG_DEPRECATED)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800406{
Chris Craikb50c2172013-07-29 15:28:30 -0700407 png_inforp info_ptr = *ptr_ptr;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800408
Patrick Scott5f6bd842010-06-28 16:55:16 -0400409 png_debug(1, "in png_info_init_3");
410
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400411 if (info_ptr == NULL)
412 return;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800413
Chris Craikb50c2172013-07-29 15:28:30 -0700414 if ((sizeof (png_info)) > png_info_struct_size)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400415 {
Chris Craikb50c2172013-07-29 15:28:30 -0700416 *ptr_ptr = NULL;
417 /* The following line is why this API should not be used: */
418 free(info_ptr);
419 info_ptr = png_voidcast(png_inforp, png_malloc_base(NULL,
420 (sizeof *info_ptr)));
Matt Sarett96be9082016-05-03 13:29:54 -0400421 if (info_ptr == NULL)
422 return;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400423 *ptr_ptr = info_ptr;
424 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800425
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400426 /* Set everything to 0 */
Chris Craikb50c2172013-07-29 15:28:30 -0700427 memset(info_ptr, 0, (sizeof *info_ptr));
The Android Open Source Project893912b2009-03-03 19:30:05 -0800428}
429
Chris Craikb50c2172013-07-29 15:28:30 -0700430/* The following API is not called internally */
The Android Open Source Project893912b2009-03-03 19:30:05 -0800431void PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -0700432png_data_freer(png_const_structrp png_ptr, png_inforp info_ptr,
The Android Open Source Project893912b2009-03-03 19:30:05 -0800433 int freer, png_uint_32 mask)
434{
The Android Open Source Project4215dd12009-03-09 11:52:12 -0700435 png_debug(1, "in png_data_freer");
Patrick Scott5f6bd842010-06-28 16:55:16 -0400436
The Android Open Source Project893912b2009-03-03 19:30:05 -0800437 if (png_ptr == NULL || info_ptr == NULL)
438 return;
Patrick Scott5f6bd842010-06-28 16:55:16 -0400439
The Android Open Source Project4215dd12009-03-09 11:52:12 -0700440 if (freer == PNG_DESTROY_WILL_FREE_DATA)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800441 info_ptr->free_me |= mask;
Chris Craikb50c2172013-07-29 15:28:30 -0700442
The Android Open Source Project4215dd12009-03-09 11:52:12 -0700443 else if (freer == PNG_USER_WILL_FREE_DATA)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800444 info_ptr->free_me &= ~mask;
Chris Craikb50c2172013-07-29 15:28:30 -0700445
The Android Open Source Project893912b2009-03-03 19:30:05 -0800446 else
Chris Craikb50c2172013-07-29 15:28:30 -0700447 png_error(png_ptr, "Unknown freer parameter in png_data_freer");
The Android Open Source Project893912b2009-03-03 19:30:05 -0800448}
The Android Open Source Project893912b2009-03-03 19:30:05 -0800449
450void PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -0700451png_free_data(png_const_structrp png_ptr, png_inforp info_ptr, png_uint_32 mask,
The Android Open Source Project893912b2009-03-03 19:30:05 -0800452 int num)
453{
The Android Open Source Project4215dd12009-03-09 11:52:12 -0700454 png_debug(1, "in png_free_data");
Patrick Scott5f6bd842010-06-28 16:55:16 -0400455
The Android Open Source Project893912b2009-03-03 19:30:05 -0800456 if (png_ptr == NULL || info_ptr == NULL)
457 return;
458
Patrick Scott5f6bd842010-06-28 16:55:16 -0400459#ifdef PNG_TEXT_SUPPORTED
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400460 /* Free text item num or (if num == -1) all text items */
Matt Sarett96be9082016-05-03 13:29:54 -0400461 if (info_ptr->text != 0 &&
462 ((mask & PNG_FREE_TEXT) & info_ptr->free_me) != 0)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800463 {
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400464 if (num != -1)
465 {
Matt Sarett96be9082016-05-03 13:29:54 -0400466 png_free(png_ptr, info_ptr->text[num].key);
467 info_ptr->text[num].key = NULL;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400468 }
Chris Craikb50c2172013-07-29 15:28:30 -0700469
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400470 else
471 {
472 int i;
Matt Sarett96be9082016-05-03 13:29:54 -0400473
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400474 for (i = 0; i < info_ptr->num_text; i++)
Matt Sarett96be9082016-05-03 13:29:54 -0400475 png_free(png_ptr, info_ptr->text[i].key);
476
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400477 png_free(png_ptr, info_ptr->text);
478 info_ptr->text = NULL;
Matt Sarett96be9082016-05-03 13:29:54 -0400479 info_ptr->num_text = 0;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400480 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800481 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800482#endif
483
Patrick Scott5f6bd842010-06-28 16:55:16 -0400484#ifdef PNG_tRNS_SUPPORTED
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400485 /* Free any tRNS entry */
Matt Sarett96be9082016-05-03 13:29:54 -0400486 if (((mask & PNG_FREE_TRNS) & info_ptr->free_me) != 0)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400487 {
Matt Sarett96be9082016-05-03 13:29:54 -0400488 info_ptr->valid &= ~PNG_INFO_tRNS;
Chris Craikb50c2172013-07-29 15:28:30 -0700489 png_free(png_ptr, info_ptr->trans_alpha);
490 info_ptr->trans_alpha = NULL;
Matt Sarett96be9082016-05-03 13:29:54 -0400491 info_ptr->num_trans = 0;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400492 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800493#endif
494
Patrick Scott5f6bd842010-06-28 16:55:16 -0400495#ifdef PNG_sCAL_SUPPORTED
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400496 /* Free any sCAL entry */
Matt Sarett96be9082016-05-03 13:29:54 -0400497 if (((mask & PNG_FREE_SCAL) & info_ptr->free_me) != 0)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400498 {
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400499 png_free(png_ptr, info_ptr->scal_s_width);
500 png_free(png_ptr, info_ptr->scal_s_height);
501 info_ptr->scal_s_width = NULL;
502 info_ptr->scal_s_height = NULL;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400503 info_ptr->valid &= ~PNG_INFO_sCAL;
504 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800505#endif
506
Patrick Scott5f6bd842010-06-28 16:55:16 -0400507#ifdef PNG_pCAL_SUPPORTED
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400508 /* Free any pCAL entry */
Matt Sarett96be9082016-05-03 13:29:54 -0400509 if (((mask & PNG_FREE_PCAL) & info_ptr->free_me) != 0)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400510 {
511 png_free(png_ptr, info_ptr->pcal_purpose);
512 png_free(png_ptr, info_ptr->pcal_units);
513 info_ptr->pcal_purpose = NULL;
514 info_ptr->pcal_units = NULL;
Matt Sarett96be9082016-05-03 13:29:54 -0400515
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400516 if (info_ptr->pcal_params != NULL)
517 {
Matt Sarett96be9082016-05-03 13:29:54 -0400518 int i;
519
Chris Craikb50c2172013-07-29 15:28:30 -0700520 for (i = 0; i < info_ptr->pcal_nparams; i++)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400521 png_free(png_ptr, info_ptr->pcal_params[i]);
Matt Sarett96be9082016-05-03 13:29:54 -0400522
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400523 png_free(png_ptr, info_ptr->pcal_params);
524 info_ptr->pcal_params = NULL;
525 }
526 info_ptr->valid &= ~PNG_INFO_pCAL;
527 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800528#endif
529
Patrick Scott5f6bd842010-06-28 16:55:16 -0400530#ifdef PNG_iCCP_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -0700531 /* Free any profile entry */
Matt Sarett96be9082016-05-03 13:29:54 -0400532 if (((mask & PNG_FREE_ICCP) & info_ptr->free_me) != 0)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400533 {
534 png_free(png_ptr, info_ptr->iccp_name);
535 png_free(png_ptr, info_ptr->iccp_profile);
536 info_ptr->iccp_name = NULL;
537 info_ptr->iccp_profile = NULL;
538 info_ptr->valid &= ~PNG_INFO_iCCP;
539 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800540#endif
541
Patrick Scott5f6bd842010-06-28 16:55:16 -0400542#ifdef PNG_sPLT_SUPPORTED
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400543 /* Free a given sPLT entry, or (if num == -1) all sPLT entries */
Matt Sarett96be9082016-05-03 13:29:54 -0400544 if (info_ptr->splt_palettes != 0 &&
545 ((mask & PNG_FREE_SPLT) & info_ptr->free_me) != 0)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800546 {
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400547 if (num != -1)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800548 {
Matt Sarett96be9082016-05-03 13:29:54 -0400549 png_free(png_ptr, info_ptr->splt_palettes[num].name);
550 png_free(png_ptr, info_ptr->splt_palettes[num].entries);
551 info_ptr->splt_palettes[num].name = NULL;
552 info_ptr->splt_palettes[num].entries = NULL;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400553 }
Chris Craikb50c2172013-07-29 15:28:30 -0700554
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400555 else
556 {
557 int i;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800558
Matt Sarett96be9082016-05-03 13:29:54 -0400559 for (i = 0; i < info_ptr->splt_palettes_num; i++)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400560 {
Matt Sarett96be9082016-05-03 13:29:54 -0400561 png_free(png_ptr, info_ptr->splt_palettes[i].name);
562 png_free(png_ptr, info_ptr->splt_palettes[i].entries);
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400563 }
Matt Sarett96be9082016-05-03 13:29:54 -0400564
565 png_free(png_ptr, info_ptr->splt_palettes);
566 info_ptr->splt_palettes = NULL;
567 info_ptr->splt_palettes_num = 0;
568 info_ptr->valid &= ~PNG_INFO_sPLT;
569 }
570 }
571#endif
572
573#ifdef PNG_STORE_UNKNOWN_CHUNKS_SUPPORTED
574 if (info_ptr->unknown_chunks != 0 &&
575 ((mask & PNG_FREE_UNKN) & info_ptr->free_me) != 0)
576 {
577 if (num != -1)
578 {
579 png_free(png_ptr, info_ptr->unknown_chunks[num].data);
580 info_ptr->unknown_chunks[num].data = NULL;
581 }
582
583 else
584 {
585 int i;
586
587 for (i = 0; i < info_ptr->unknown_chunks_num; i++)
588 png_free(png_ptr, info_ptr->unknown_chunks[i].data);
589
590 png_free(png_ptr, info_ptr->unknown_chunks);
591 info_ptr->unknown_chunks = NULL;
592 info_ptr->unknown_chunks_num = 0;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400593 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800594 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800595#endif
596
Patrick Scott5f6bd842010-06-28 16:55:16 -0400597#ifdef PNG_hIST_SUPPORTED
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400598 /* Free any hIST entry */
Matt Sarett96be9082016-05-03 13:29:54 -0400599 if (((mask & PNG_FREE_HIST) & info_ptr->free_me) != 0)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400600 {
601 png_free(png_ptr, info_ptr->hist);
602 info_ptr->hist = NULL;
603 info_ptr->valid &= ~PNG_INFO_hIST;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400604 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800605#endif
606
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400607 /* Free any PLTE entry that was internally allocated */
Matt Sarett96be9082016-05-03 13:29:54 -0400608 if (((mask & PNG_FREE_PLTE) & info_ptr->free_me) != 0)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400609 {
Chris Craikb50c2172013-07-29 15:28:30 -0700610 png_free(png_ptr, info_ptr->palette);
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400611 info_ptr->palette = NULL;
612 info_ptr->valid &= ~PNG_INFO_PLTE;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400613 info_ptr->num_palette = 0;
614 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800615
Patrick Scott5f6bd842010-06-28 16:55:16 -0400616#ifdef PNG_INFO_IMAGE_SUPPORTED
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400617 /* Free any image bits attached to the info structure */
Matt Sarett96be9082016-05-03 13:29:54 -0400618 if (((mask & PNG_FREE_ROWS) & info_ptr->free_me) != 0)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400619 {
Matt Sarett96be9082016-05-03 13:29:54 -0400620 if (info_ptr->row_pointers != 0)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400621 {
Chris Craikb50c2172013-07-29 15:28:30 -0700622 png_uint_32 row;
623 for (row = 0; row < info_ptr->height; row++)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400624 png_free(png_ptr, info_ptr->row_pointers[row]);
Matt Sarett96be9082016-05-03 13:29:54 -0400625
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400626 png_free(png_ptr, info_ptr->row_pointers);
Patrick Scott5f6bd842010-06-28 16:55:16 -0400627 info_ptr->row_pointers = NULL;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400628 }
629 info_ptr->valid &= ~PNG_INFO_IDAT;
630 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800631#endif
632
Chris Craikb50c2172013-07-29 15:28:30 -0700633 if (num != -1)
634 mask &= ~PNG_FREE_MUL;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800635
Chris Craikb50c2172013-07-29 15:28:30 -0700636 info_ptr->free_me &= ~mask;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800637}
Matt Sarett96be9082016-05-03 13:29:54 -0400638#endif /* READ || WRITE */
The Android Open Source Project893912b2009-03-03 19:30:05 -0800639
640/* This function returns a pointer to the io_ptr associated with the user
641 * functions. The application should free any memory associated with this
642 * pointer before png_write_destroy() or png_read_destroy() are called.
643 */
644png_voidp PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -0700645png_get_io_ptr(png_const_structrp png_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800646{
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400647 if (png_ptr == NULL)
648 return (NULL);
Chris Craikb50c2172013-07-29 15:28:30 -0700649
The Android Open Source Project893912b2009-03-03 19:30:05 -0800650 return (png_ptr->io_ptr);
651}
652
653#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Chris Craikb50c2172013-07-29 15:28:30 -0700654# ifdef PNG_STDIO_SUPPORTED
The Android Open Source Project893912b2009-03-03 19:30:05 -0800655/* Initialize the default input/output functions for the PNG file. If you
656 * use your own read or write routines, you can call either png_set_read_fn()
657 * or png_set_write_fn() instead of png_init_io(). If you have defined
Chris Craikb50c2172013-07-29 15:28:30 -0700658 * PNG_NO_STDIO or otherwise disabled PNG_STDIO_SUPPORTED, you must use a
659 * function of your own because "FILE *" isn't necessarily available.
The Android Open Source Project893912b2009-03-03 19:30:05 -0800660 */
661void PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -0700662png_init_io(png_structrp png_ptr, png_FILE_p fp)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800663{
The Android Open Source Project4215dd12009-03-09 11:52:12 -0700664 png_debug(1, "in png_init_io");
Patrick Scott5f6bd842010-06-28 16:55:16 -0400665
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400666 if (png_ptr == NULL)
667 return;
Patrick Scott5f6bd842010-06-28 16:55:16 -0400668
The Android Open Source Project893912b2009-03-03 19:30:05 -0800669 png_ptr->io_ptr = (png_voidp)fp;
670}
Chris Craikb50c2172013-07-29 15:28:30 -0700671# endif
672
Matt Sarett96be9082016-05-03 13:29:54 -0400673# ifdef PNG_SAVE_INT_32_SUPPORTED
674/* PNG signed integers are saved in 32-bit 2's complement format. ANSI C-90
675 * defines a cast of a signed integer to an unsigned integer either to preserve
676 * the value, if it is positive, or to calculate:
677 *
678 * (UNSIGNED_MAX+1) + integer
679 *
680 * Where UNSIGNED_MAX is the appropriate maximum unsigned value, so when the
681 * negative integral value is added the result will be an unsigned value
682 * correspnding to the 2's complement representation.
Chris Craikb50c2172013-07-29 15:28:30 -0700683 */
684void PNGAPI
685png_save_int_32(png_bytep buf, png_int_32 i)
686{
Matt Sarett96be9082016-05-03 13:29:54 -0400687 png_save_uint_32(buf, i);
Chris Craikb50c2172013-07-29 15:28:30 -0700688}
Matt Sarett96be9082016-05-03 13:29:54 -0400689# endif
The Android Open Source Project893912b2009-03-03 19:30:05 -0800690
Chris Craikb50c2172013-07-29 15:28:30 -0700691# ifdef PNG_TIME_RFC1123_SUPPORTED
The Android Open Source Project893912b2009-03-03 19:30:05 -0800692/* Convert the supplied time into an RFC 1123 string suitable for use in
693 * a "Creation Time" or other text-based time string.
694 */
Chris Craikb50c2172013-07-29 15:28:30 -0700695int PNGAPI
696png_convert_to_rfc1123_buffer(char out[29], png_const_timep ptime)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800697{
698 static PNG_CONST char short_months[12][4] =
699 {"Jan", "Feb", "Mar", "Apr", "May", "Jun",
700 "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"};
701
Chris Craikb50c2172013-07-29 15:28:30 -0700702 if (out == NULL)
703 return 0;
704
705 if (ptime->year > 9999 /* RFC1123 limitation */ ||
706 ptime->month == 0 || ptime->month > 12 ||
707 ptime->day == 0 || ptime->day > 31 ||
708 ptime->hour > 23 || ptime->minute > 59 ||
709 ptime->second > 60)
710 return 0;
711
The Android Open Source Project893912b2009-03-03 19:30:05 -0800712 {
Chris Craikb50c2172013-07-29 15:28:30 -0700713 size_t pos = 0;
714 char number_buf[5]; /* enough for a four-digit year */
715
716# define APPEND_STRING(string) pos = png_safecat(out, 29, pos, (string))
717# define APPEND_NUMBER(format, value)\
718 APPEND_STRING(PNG_FORMAT_NUMBER(number_buf, format, (value)))
719# define APPEND(ch) if (pos < 28) out[pos++] = (ch)
720
721 APPEND_NUMBER(PNG_NUMBER_FORMAT_u, (unsigned)ptime->day);
722 APPEND(' ');
723 APPEND_STRING(short_months[(ptime->month - 1)]);
724 APPEND(' ');
725 APPEND_NUMBER(PNG_NUMBER_FORMAT_u, ptime->year);
726 APPEND(' ');
727 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->hour);
728 APPEND(':');
729 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->minute);
730 APPEND(':');
731 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->second);
732 APPEND_STRING(" +0000"); /* This reliably terminates the buffer */
Matt Sarett96be9082016-05-03 13:29:54 -0400733 PNG_UNUSED (pos)
Chris Craikb50c2172013-07-29 15:28:30 -0700734
735# undef APPEND
736# undef APPEND_NUMBER
737# undef APPEND_STRING
The Android Open Source Project893912b2009-03-03 19:30:05 -0800738 }
739
Chris Craikb50c2172013-07-29 15:28:30 -0700740 return 1;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800741}
Chris Craikb50c2172013-07-29 15:28:30 -0700742
Matt Sarett96be9082016-05-03 13:29:54 -0400743# if PNG_LIBPNG_VER < 10700
Chris Craikb50c2172013-07-29 15:28:30 -0700744/* To do: remove the following from libpng-1.7 */
745/* Original API that uses a private buffer in png_struct.
746 * Deprecated because it causes png_struct to carry a spurious temporary
747 * buffer (png_struct::time_buffer), better to have the caller pass this in.
748 */
749png_const_charp PNGAPI
750png_convert_to_rfc1123(png_structrp png_ptr, png_const_timep ptime)
751{
752 if (png_ptr != NULL)
753 {
754 /* The only failure above if png_ptr != NULL is from an invalid ptime */
Matt Sarett96be9082016-05-03 13:29:54 -0400755 if (png_convert_to_rfc1123_buffer(png_ptr->time_buffer, ptime) == 0)
Chris Craikb50c2172013-07-29 15:28:30 -0700756 png_warning(png_ptr, "Ignoring invalid time value");
757
758 else
759 return png_ptr->time_buffer;
760 }
761
762 return NULL;
763}
Matt Sarett96be9082016-05-03 13:29:54 -0400764# endif /* LIBPNG_VER < 10700 */
765# endif /* TIME_RFC1123 */
The Android Open Source Project893912b2009-03-03 19:30:05 -0800766
Matt Sarett96be9082016-05-03 13:29:54 -0400767#endif /* READ || WRITE */
The Android Open Source Project893912b2009-03-03 19:30:05 -0800768
Chris Craikb50c2172013-07-29 15:28:30 -0700769png_const_charp PNGAPI
770png_get_copyright(png_const_structrp png_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800771{
Chris Craikb50c2172013-07-29 15:28:30 -0700772 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Patrick Scott5f6bd842010-06-28 16:55:16 -0400773#ifdef PNG_STRING_COPYRIGHT
Chris Craikb50c2172013-07-29 15:28:30 -0700774 return PNG_STRING_COPYRIGHT
Patrick Scott5f6bd842010-06-28 16:55:16 -0400775#else
Chris Craikb50c2172013-07-29 15:28:30 -0700776# ifdef __STDC__
777 return PNG_STRING_NEWLINE \
Matt Sarett96be9082016-05-03 13:29:54 -0400778 "libpng version 1.6.20 - December 3, 2015" PNG_STRING_NEWLINE \
779 "Copyright (c) 1998-2015 Glenn Randers-Pehrson" PNG_STRING_NEWLINE \
780 "Copyright (c) 1996-1997 Andreas Dilger" PNG_STRING_NEWLINE \
781 "Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc." \
782 PNG_STRING_NEWLINE;
Chris Craikb50c2172013-07-29 15:28:30 -0700783# else
Matt Sarett96be9082016-05-03 13:29:54 -0400784 return "libpng version 1.6.20 - December 3, 2015\
785 Copyright (c) 1998-2015 Glenn Randers-Pehrson\
Patrick Scott5f6bd842010-06-28 16:55:16 -0400786 Copyright (c) 1996-1997 Andreas Dilger\
Chris Craikb50c2172013-07-29 15:28:30 -0700787 Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc.";
788# endif
Patrick Scott5f6bd842010-06-28 16:55:16 -0400789#endif
The Android Open Source Project893912b2009-03-03 19:30:05 -0800790}
791
792/* The following return the library version as a short string in the
793 * format 1.0.0 through 99.99.99zz. To get the version of *.h files
794 * used with your application, print out PNG_LIBPNG_VER_STRING, which
795 * is defined in png.h.
796 * Note: now there is no difference between png_get_libpng_ver() and
797 * png_get_header_ver(). Due to the version_nn_nn_nn typedef guard,
798 * it is guaranteed that png.c uses the correct version of png.h.
799 */
Chris Craikb50c2172013-07-29 15:28:30 -0700800png_const_charp PNGAPI
801png_get_libpng_ver(png_const_structrp png_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800802{
803 /* Version of *.c files used when building libpng */
Chris Craikb50c2172013-07-29 15:28:30 -0700804 return png_get_header_ver(png_ptr);
The Android Open Source Project893912b2009-03-03 19:30:05 -0800805}
806
Chris Craikb50c2172013-07-29 15:28:30 -0700807png_const_charp PNGAPI
808png_get_header_ver(png_const_structrp png_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800809{
810 /* Version of *.h files used when building libpng */
Chris Craikb50c2172013-07-29 15:28:30 -0700811 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
812 return PNG_LIBPNG_VER_STRING;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800813}
814
Chris Craikb50c2172013-07-29 15:28:30 -0700815png_const_charp PNGAPI
816png_get_header_version(png_const_structrp png_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800817{
818 /* Returns longer string containing both version and date */
Chris Craikb50c2172013-07-29 15:28:30 -0700819 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Patrick Scott5f6bd842010-06-28 16:55:16 -0400820#ifdef __STDC__
Chris Craikb50c2172013-07-29 15:28:30 -0700821 return PNG_HEADER_VERSION_STRING
822# ifndef PNG_READ_SUPPORTED
Matt Sarett96be9082016-05-03 13:29:54 -0400823 " (NO READ SUPPORT)"
Chris Craikb50c2172013-07-29 15:28:30 -0700824# endif
Matt Sarett96be9082016-05-03 13:29:54 -0400825 PNG_STRING_NEWLINE;
Patrick Scott5f6bd842010-06-28 16:55:16 -0400826#else
Chris Craikb50c2172013-07-29 15:28:30 -0700827 return PNG_HEADER_VERSION_STRING;
Patrick Scott5f6bd842010-06-28 16:55:16 -0400828#endif
The Android Open Source Project893912b2009-03-03 19:30:05 -0800829}
830
Sireesh Tripurarib478e662014-05-09 15:15:10 +0530831#ifdef PNG_BUILD_GRAYSCALE_PALETTE_SUPPORTED
832/* NOTE: this routine is not used internally! */
833/* Build a grayscale palette. Palette is assumed to be 1 << bit_depth
834 * large of png_color. This lets grayscale images be treated as
835 * paletted. Most useful for gamma correction and simplification
836 * of code. This API is not used internally.
837 */
838void PNGAPI
839png_build_grayscale_palette(int bit_depth, png_colorp palette)
840{
841 int num_palette;
842 int color_inc;
843 int i;
844 int v;
845
846 png_debug(1, "in png_do_build_grayscale_palette");
847
848 if (palette == NULL)
849 return;
850
851 switch (bit_depth)
852 {
853 case 1:
854 num_palette = 2;
855 color_inc = 0xff;
856 break;
857
858 case 2:
859 num_palette = 4;
860 color_inc = 0x55;
861 break;
862
863 case 4:
864 num_palette = 16;
865 color_inc = 0x11;
866 break;
867
868 case 8:
869 num_palette = 256;
870 color_inc = 1;
871 break;
872
873 default:
874 num_palette = 0;
875 color_inc = 0;
876 break;
877 }
878
879 for (i = 0, v = 0; i < num_palette; i++, v += color_inc)
880 {
Matt Sarett96be9082016-05-03 13:29:54 -0400881 palette[i].red = (png_byte)(v & 0xff);
882 palette[i].green = (png_byte)(v & 0xff);
883 palette[i].blue = (png_byte)(v & 0xff);
Sireesh Tripurarib478e662014-05-09 15:15:10 +0530884 }
885}
886#endif
887
Chris Craikb50c2172013-07-29 15:28:30 -0700888#ifdef PNG_SET_UNKNOWN_CHUNKS_SUPPORTED
The Android Open Source Project893912b2009-03-03 19:30:05 -0800889int PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -0700890png_handle_as_unknown(png_const_structrp png_ptr, png_const_bytep chunk_name)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800891{
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400892 /* Check chunk_name and return "keep" value if it's on the list, else 0 */
Chris Craikb50c2172013-07-29 15:28:30 -0700893 png_const_bytep p, p_end;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800894
Chris Craikb50c2172013-07-29 15:28:30 -0700895 if (png_ptr == NULL || chunk_name == NULL || png_ptr->num_chunk_list == 0)
896 return PNG_HANDLE_CHUNK_AS_DEFAULT;
897
898 p_end = png_ptr->chunk_list;
899 p = p_end + png_ptr->num_chunk_list*5; /* beyond end */
900
901 /* The code is the fifth byte after each four byte string. Historically this
902 * code was always searched from the end of the list, this is no longer
903 * necessary because the 'set' routine handles duplicate entries correcty.
904 */
905 do /* num_chunk_list > 0, so at least one */
906 {
907 p -= 5;
908
Matt Sarett96be9082016-05-03 13:29:54 -0400909 if (memcmp(chunk_name, p, 4) == 0)
Chris Craikb50c2172013-07-29 15:28:30 -0700910 return p[4];
911 }
912 while (p > p_end);
913
914 /* This means that known chunks should be processed and unknown chunks should
915 * be handled according to the value of png_ptr->unknown_default; this can be
916 * confusing because, as a result, there are two levels of defaulting for
917 * unknown chunks.
918 */
919 return PNG_HANDLE_CHUNK_AS_DEFAULT;
920}
921
Sireesh Tripurarib478e662014-05-09 15:15:10 +0530922#if defined(PNG_READ_UNKNOWN_CHUNKS_SUPPORTED) ||\
923 defined(PNG_HANDLE_AS_UNKNOWN_SUPPORTED)
Chris Craikb50c2172013-07-29 15:28:30 -0700924int /* PRIVATE */
925png_chunk_unknown_handling(png_const_structrp png_ptr, png_uint_32 chunk_name)
926{
927 png_byte chunk_string[5];
928
929 PNG_CSTRING_FROM_CHUNK(chunk_string, chunk_name);
930 return png_handle_as_unknown(png_ptr, chunk_string);
931}
Sireesh Tripurarib478e662014-05-09 15:15:10 +0530932#endif /* READ_UNKNOWN_CHUNKS || HANDLE_AS_UNKNOWN */
Chris Craikb50c2172013-07-29 15:28:30 -0700933#endif /* SET_UNKNOWN_CHUNKS */
934
935#ifdef PNG_READ_SUPPORTED
The Android Open Source Project893912b2009-03-03 19:30:05 -0800936/* This function, added to libpng-1.0.6g, is untested. */
937int PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -0700938png_reset_zstream(png_structrp png_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800939{
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400940 if (png_ptr == NULL)
941 return Z_STREAM_ERROR;
Chris Craikb50c2172013-07-29 15:28:30 -0700942
943 /* WARNING: this resets the window bits to the maximum! */
The Android Open Source Project893912b2009-03-03 19:30:05 -0800944 return (inflateReset(&png_ptr->zstream));
945}
Matt Sarett96be9082016-05-03 13:29:54 -0400946#endif /* READ */
The Android Open Source Project893912b2009-03-03 19:30:05 -0800947
948/* This function was added to libpng-1.0.7 */
949png_uint_32 PNGAPI
950png_access_version_number(void)
951{
952 /* Version of *.c files used when building libpng */
Chris Craikb50c2172013-07-29 15:28:30 -0700953 return((png_uint_32)PNG_LIBPNG_VER);
The Android Open Source Project893912b2009-03-03 19:30:05 -0800954}
955
The Android Open Source Project893912b2009-03-03 19:30:05 -0800956#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Chris Craikb50c2172013-07-29 15:28:30 -0700957/* Ensure that png_ptr->zstream.msg holds some appropriate error message string.
958 * If it doesn't 'ret' is used to set it to something appropriate, even in cases
959 * like Z_OK or Z_STREAM_END where the error code is apparently a success code.
960 */
961void /* PRIVATE */
962png_zstream_error(png_structrp png_ptr, int ret)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800963{
Chris Craikb50c2172013-07-29 15:28:30 -0700964 /* Translate 'ret' into an appropriate error string, priority is given to the
965 * one in zstream if set. This always returns a string, even in cases like
966 * Z_OK or Z_STREAM_END where the error code is a success code.
967 */
968 if (png_ptr->zstream.msg == NULL) switch (ret)
969 {
970 default:
971 case Z_OK:
972 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected zlib return code");
973 break;
974
975 case Z_STREAM_END:
976 /* Normal exit */
977 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected end of LZ stream");
978 break;
979
980 case Z_NEED_DICT:
981 /* This means the deflate stream did not have a dictionary; this
982 * indicates a bogus PNG.
983 */
984 png_ptr->zstream.msg = PNGZ_MSG_CAST("missing LZ dictionary");
985 break;
986
987 case Z_ERRNO:
988 /* gz APIs only: should not happen */
989 png_ptr->zstream.msg = PNGZ_MSG_CAST("zlib IO error");
990 break;
991
992 case Z_STREAM_ERROR:
993 /* internal libpng error */
994 png_ptr->zstream.msg = PNGZ_MSG_CAST("bad parameters to zlib");
995 break;
996
997 case Z_DATA_ERROR:
998 png_ptr->zstream.msg = PNGZ_MSG_CAST("damaged LZ stream");
999 break;
1000
1001 case Z_MEM_ERROR:
1002 png_ptr->zstream.msg = PNGZ_MSG_CAST("insufficient memory");
1003 break;
1004
1005 case Z_BUF_ERROR:
1006 /* End of input or output; not a problem if the caller is doing
1007 * incremental read or write.
1008 */
1009 png_ptr->zstream.msg = PNGZ_MSG_CAST("truncated");
1010 break;
1011
1012 case Z_VERSION_ERROR:
1013 png_ptr->zstream.msg = PNGZ_MSG_CAST("unsupported zlib version");
1014 break;
1015
1016 case PNG_UNEXPECTED_ZLIB_RETURN:
1017 /* Compile errors here mean that zlib now uses the value co-opted in
1018 * pngpriv.h for PNG_UNEXPECTED_ZLIB_RETURN; update the switch above
1019 * and change pngpriv.h. Note that this message is "... return",
1020 * whereas the default/Z_OK one is "... return code".
1021 */
1022 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected zlib return");
1023 break;
1024 }
The Android Open Source Project893912b2009-03-03 19:30:05 -08001025}
Chris Craikb50c2172013-07-29 15:28:30 -07001026
1027/* png_convert_size: a PNGAPI but no longer in png.h, so deleted
1028 * at libpng 1.5.5!
1029 */
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001030
1031/* Added at libpng version 1.2.34 and 1.4.0 (moved from pngset.c) */
Chris Craikb50c2172013-07-29 15:28:30 -07001032#ifdef PNG_GAMMA_SUPPORTED /* always set if COLORSPACE */
1033static int
1034png_colorspace_check_gamma(png_const_structrp png_ptr,
1035 png_colorspacerp colorspace, png_fixed_point gAMA, int from)
1036 /* This is called to check a new gamma value against an existing one. The
1037 * routine returns false if the new gamma value should not be written.
1038 *
1039 * 'from' says where the new gamma value comes from:
1040 *
1041 * 0: the new gamma value is the libpng estimate for an ICC profile
1042 * 1: the new gamma value comes from a gAMA chunk
1043 * 2: the new gamma value comes from an sRGB chunk
1044 */
1045{
1046 png_fixed_point gtest;
1047
1048 if ((colorspace->flags & PNG_COLORSPACE_HAVE_GAMMA) != 0 &&
Matt Sarett96be9082016-05-03 13:29:54 -04001049 (png_muldiv(&gtest, colorspace->gamma, PNG_FP_1, gAMA) == 0 ||
1050 png_gamma_significant(gtest) != 0))
Chris Craikb50c2172013-07-29 15:28:30 -07001051 {
1052 /* Either this is an sRGB image, in which case the calculated gamma
1053 * approximation should match, or this is an image with a profile and the
1054 * value libpng calculates for the gamma of the profile does not match the
1055 * value recorded in the file. The former, sRGB, case is an error, the
1056 * latter is just a warning.
1057 */
1058 if ((colorspace->flags & PNG_COLORSPACE_FROM_sRGB) != 0 || from == 2)
1059 {
1060 png_chunk_report(png_ptr, "gamma value does not match sRGB",
1061 PNG_CHUNK_ERROR);
1062 /* Do not overwrite an sRGB value */
1063 return from == 2;
1064 }
1065
1066 else /* sRGB tag not involved */
1067 {
1068 png_chunk_report(png_ptr, "gamma value does not match libpng estimate",
1069 PNG_CHUNK_WARNING);
1070 return from == 1;
1071 }
1072 }
1073
1074 return 1;
1075}
Patrick Scotta0bb96c2009-07-22 11:50:02 -04001076
Patrick Scott5f6bd842010-06-28 16:55:16 -04001077void /* PRIVATE */
Chris Craikb50c2172013-07-29 15:28:30 -07001078png_colorspace_set_gamma(png_const_structrp png_ptr,
1079 png_colorspacerp colorspace, png_fixed_point gAMA)
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001080{
Chris Craikb50c2172013-07-29 15:28:30 -07001081 /* Changed in libpng-1.5.4 to limit the values to ensure overflow can't
Matt Sarett96be9082016-05-03 13:29:54 -04001082 * occur. Since the fixed point representation is asymetrical it is
Chris Craikb50c2172013-07-29 15:28:30 -07001083 * possible for 1/gamma to overflow the limit of 21474 and this means the
1084 * gamma value must be at least 5/100000 and hence at most 20000.0. For
1085 * safety the limits here are a little narrower. The values are 0.00016 to
1086 * 6250.0, which are truly ridiculous gamma values (and will produce
1087 * displays that are all black or all white.)
1088 *
1089 * In 1.6.0 this test replaces the ones in pngrutil.c, in the gAMA chunk
1090 * handling code, which only required the value to be >0.
1091 */
1092 png_const_charp errmsg;
1093
1094 if (gAMA < 16 || gAMA > 625000000)
1095 errmsg = "gamma value out of range";
1096
1097# ifdef PNG_READ_gAMA_SUPPORTED
Matt Sarett96be9082016-05-03 13:29:54 -04001098 /* Allow the application to set the gamma value more than once */
1099 else if ((png_ptr->mode & PNG_IS_READ_STRUCT) != 0 &&
1100 (colorspace->flags & PNG_COLORSPACE_FROM_gAMA) != 0)
1101 errmsg = "duplicate";
Chris Craikb50c2172013-07-29 15:28:30 -07001102# endif
1103
1104 /* Do nothing if the colorspace is already invalid */
Matt Sarett96be9082016-05-03 13:29:54 -04001105 else if ((colorspace->flags & PNG_COLORSPACE_INVALID) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001106 return;
1107
1108 else
1109 {
Matt Sarett96be9082016-05-03 13:29:54 -04001110 if (png_colorspace_check_gamma(png_ptr, colorspace, gAMA,
1111 1/*from gAMA*/) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001112 {
1113 /* Store this gamma value. */
1114 colorspace->gamma = gAMA;
1115 colorspace->flags |=
1116 (PNG_COLORSPACE_HAVE_GAMMA | PNG_COLORSPACE_FROM_gAMA);
1117 }
1118
1119 /* At present if the check_gamma test fails the gamma of the colorspace is
1120 * not updated however the colorspace is not invalidated. This
1121 * corresponds to the case where the existing gamma comes from an sRGB
1122 * chunk or profile. An error message has already been output.
1123 */
1124 return;
1125 }
1126
1127 /* Error exit - errmsg has been set. */
1128 colorspace->flags |= PNG_COLORSPACE_INVALID;
1129 png_chunk_report(png_ptr, errmsg, PNG_CHUNK_WRITE_ERROR);
1130}
1131
1132void /* PRIVATE */
1133png_colorspace_sync_info(png_const_structrp png_ptr, png_inforp info_ptr)
1134{
Matt Sarett96be9082016-05-03 13:29:54 -04001135 if ((info_ptr->colorspace.flags & PNG_COLORSPACE_INVALID) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001136 {
1137 /* Everything is invalid */
1138 info_ptr->valid &= ~(PNG_INFO_gAMA|PNG_INFO_cHRM|PNG_INFO_sRGB|
1139 PNG_INFO_iCCP);
1140
1141# ifdef PNG_COLORSPACE_SUPPORTED
Matt Sarett96be9082016-05-03 13:29:54 -04001142 /* Clean up the iCCP profile now if it won't be used. */
1143 png_free_data(png_ptr, info_ptr, PNG_FREE_ICCP, -1/*not used*/);
Chris Craikb50c2172013-07-29 15:28:30 -07001144# else
Matt Sarett96be9082016-05-03 13:29:54 -04001145 PNG_UNUSED(png_ptr)
Chris Craikb50c2172013-07-29 15:28:30 -07001146# endif
1147 }
1148
1149 else
1150 {
1151# ifdef PNG_COLORSPACE_SUPPORTED
Matt Sarett96be9082016-05-03 13:29:54 -04001152 /* Leave the INFO_iCCP flag set if the pngset.c code has already set
1153 * it; this allows a PNG to contain a profile which matches sRGB and
1154 * yet still have that profile retrievable by the application.
1155 */
1156 if ((info_ptr->colorspace.flags & PNG_COLORSPACE_MATCHES_sRGB) != 0)
1157 info_ptr->valid |= PNG_INFO_sRGB;
Chris Craikb50c2172013-07-29 15:28:30 -07001158
Matt Sarett96be9082016-05-03 13:29:54 -04001159 else
1160 info_ptr->valid &= ~PNG_INFO_sRGB;
Chris Craikb50c2172013-07-29 15:28:30 -07001161
Matt Sarett96be9082016-05-03 13:29:54 -04001162 if ((info_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_ENDPOINTS) != 0)
1163 info_ptr->valid |= PNG_INFO_cHRM;
Chris Craikb50c2172013-07-29 15:28:30 -07001164
Matt Sarett96be9082016-05-03 13:29:54 -04001165 else
1166 info_ptr->valid &= ~PNG_INFO_cHRM;
Chris Craikb50c2172013-07-29 15:28:30 -07001167# endif
1168
Matt Sarett96be9082016-05-03 13:29:54 -04001169 if ((info_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_GAMMA) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001170 info_ptr->valid |= PNG_INFO_gAMA;
1171
1172 else
1173 info_ptr->valid &= ~PNG_INFO_gAMA;
1174 }
1175}
1176
1177#ifdef PNG_READ_SUPPORTED
1178void /* PRIVATE */
1179png_colorspace_sync(png_const_structrp png_ptr, png_inforp info_ptr)
1180{
1181 if (info_ptr == NULL) /* reduce code size; check here not in the caller */
1182 return;
1183
1184 info_ptr->colorspace = png_ptr->colorspace;
1185 png_colorspace_sync_info(png_ptr, info_ptr);
1186}
1187#endif
Matt Sarett96be9082016-05-03 13:29:54 -04001188#endif /* GAMMA */
Chris Craikb50c2172013-07-29 15:28:30 -07001189
1190#ifdef PNG_COLORSPACE_SUPPORTED
1191/* Added at libpng-1.5.5 to support read and write of true CIEXYZ values for
1192 * cHRM, as opposed to using chromaticities. These internal APIs return
1193 * non-zero on a parameter error. The X, Y and Z values are required to be
1194 * positive and less than 1.0.
1195 */
1196static int
1197png_xy_from_XYZ(png_xy *xy, const png_XYZ *XYZ)
1198{
1199 png_int_32 d, dwhite, whiteX, whiteY;
1200
1201 d = XYZ->red_X + XYZ->red_Y + XYZ->red_Z;
Matt Sarett96be9082016-05-03 13:29:54 -04001202 if (png_muldiv(&xy->redx, XYZ->red_X, PNG_FP_1, d) == 0)
1203 return 1;
1204 if (png_muldiv(&xy->redy, XYZ->red_Y, PNG_FP_1, d) == 0)
1205 return 1;
Chris Craikb50c2172013-07-29 15:28:30 -07001206 dwhite = d;
1207 whiteX = XYZ->red_X;
1208 whiteY = XYZ->red_Y;
1209
1210 d = XYZ->green_X + XYZ->green_Y + XYZ->green_Z;
Matt Sarett96be9082016-05-03 13:29:54 -04001211 if (png_muldiv(&xy->greenx, XYZ->green_X, PNG_FP_1, d) == 0)
1212 return 1;
1213 if (png_muldiv(&xy->greeny, XYZ->green_Y, PNG_FP_1, d) == 0)
1214 return 1;
Chris Craikb50c2172013-07-29 15:28:30 -07001215 dwhite += d;
1216 whiteX += XYZ->green_X;
1217 whiteY += XYZ->green_Y;
1218
1219 d = XYZ->blue_X + XYZ->blue_Y + XYZ->blue_Z;
Matt Sarett96be9082016-05-03 13:29:54 -04001220 if (png_muldiv(&xy->bluex, XYZ->blue_X, PNG_FP_1, d) == 0)
1221 return 1;
1222 if (png_muldiv(&xy->bluey, XYZ->blue_Y, PNG_FP_1, d) == 0)
1223 return 1;
Chris Craikb50c2172013-07-29 15:28:30 -07001224 dwhite += d;
1225 whiteX += XYZ->blue_X;
1226 whiteY += XYZ->blue_Y;
1227
1228 /* The reference white is simply the sum of the end-point (X,Y,Z) vectors,
1229 * thus:
1230 */
Matt Sarett96be9082016-05-03 13:29:54 -04001231 if (png_muldiv(&xy->whitex, whiteX, PNG_FP_1, dwhite) == 0)
1232 return 1;
1233 if (png_muldiv(&xy->whitey, whiteY, PNG_FP_1, dwhite) == 0)
1234 return 1;
Chris Craikb50c2172013-07-29 15:28:30 -07001235
1236 return 0;
1237}
1238
1239static int
1240png_XYZ_from_xy(png_XYZ *XYZ, const png_xy *xy)
1241{
1242 png_fixed_point red_inverse, green_inverse, blue_scale;
1243 png_fixed_point left, right, denominator;
1244
1245 /* Check xy and, implicitly, z. Note that wide gamut color spaces typically
1246 * have end points with 0 tristimulus values (these are impossible end
1247 * points, but they are used to cover the possible colors.)
1248 */
1249 if (xy->redx < 0 || xy->redx > PNG_FP_1) return 1;
1250 if (xy->redy < 0 || xy->redy > PNG_FP_1-xy->redx) return 1;
1251 if (xy->greenx < 0 || xy->greenx > PNG_FP_1) return 1;
1252 if (xy->greeny < 0 || xy->greeny > PNG_FP_1-xy->greenx) return 1;
1253 if (xy->bluex < 0 || xy->bluex > PNG_FP_1) return 1;
1254 if (xy->bluey < 0 || xy->bluey > PNG_FP_1-xy->bluex) return 1;
1255 if (xy->whitex < 0 || xy->whitex > PNG_FP_1) return 1;
1256 if (xy->whitey < 0 || xy->whitey > PNG_FP_1-xy->whitex) return 1;
1257
1258 /* The reverse calculation is more difficult because the original tristimulus
1259 * value had 9 independent values (red,green,blue)x(X,Y,Z) however only 8
1260 * derived values were recorded in the cHRM chunk;
1261 * (red,green,blue,white)x(x,y). This loses one degree of freedom and
1262 * therefore an arbitrary ninth value has to be introduced to undo the
1263 * original transformations.
1264 *
1265 * Think of the original end-points as points in (X,Y,Z) space. The
1266 * chromaticity values (c) have the property:
1267 *
1268 * C
1269 * c = ---------
1270 * X + Y + Z
1271 *
1272 * For each c (x,y,z) from the corresponding original C (X,Y,Z). Thus the
1273 * three chromaticity values (x,y,z) for each end-point obey the
1274 * relationship:
1275 *
1276 * x + y + z = 1
1277 *
1278 * This describes the plane in (X,Y,Z) space that intersects each axis at the
1279 * value 1.0; call this the chromaticity plane. Thus the chromaticity
1280 * calculation has scaled each end-point so that it is on the x+y+z=1 plane
1281 * and chromaticity is the intersection of the vector from the origin to the
1282 * (X,Y,Z) value with the chromaticity plane.
1283 *
1284 * To fully invert the chromaticity calculation we would need the three
1285 * end-point scale factors, (red-scale, green-scale, blue-scale), but these
1286 * were not recorded. Instead we calculated the reference white (X,Y,Z) and
1287 * recorded the chromaticity of this. The reference white (X,Y,Z) would have
1288 * given all three of the scale factors since:
1289 *
1290 * color-C = color-c * color-scale
1291 * white-C = red-C + green-C + blue-C
1292 * = red-c*red-scale + green-c*green-scale + blue-c*blue-scale
1293 *
1294 * But cHRM records only white-x and white-y, so we have lost the white scale
1295 * factor:
1296 *
1297 * white-C = white-c*white-scale
1298 *
1299 * To handle this the inverse transformation makes an arbitrary assumption
1300 * about white-scale:
1301 *
1302 * Assume: white-Y = 1.0
1303 * Hence: white-scale = 1/white-y
1304 * Or: red-Y + green-Y + blue-Y = 1.0
1305 *
1306 * Notice the last statement of the assumption gives an equation in three of
1307 * the nine values we want to calculate. 8 more equations come from the
1308 * above routine as summarised at the top above (the chromaticity
1309 * calculation):
1310 *
1311 * Given: color-x = color-X / (color-X + color-Y + color-Z)
1312 * Hence: (color-x - 1)*color-X + color.x*color-Y + color.x*color-Z = 0
1313 *
1314 * This is 9 simultaneous equations in the 9 variables "color-C" and can be
1315 * solved by Cramer's rule. Cramer's rule requires calculating 10 9x9 matrix
1316 * determinants, however this is not as bad as it seems because only 28 of
1317 * the total of 90 terms in the various matrices are non-zero. Nevertheless
1318 * Cramer's rule is notoriously numerically unstable because the determinant
1319 * calculation involves the difference of large, but similar, numbers. It is
1320 * difficult to be sure that the calculation is stable for real world values
1321 * and it is certain that it becomes unstable where the end points are close
1322 * together.
1323 *
1324 * So this code uses the perhaps slightly less optimal but more
1325 * understandable and totally obvious approach of calculating color-scale.
1326 *
1327 * This algorithm depends on the precision in white-scale and that is
1328 * (1/white-y), so we can immediately see that as white-y approaches 0 the
1329 * accuracy inherent in the cHRM chunk drops off substantially.
1330 *
Matt Sarett96be9082016-05-03 13:29:54 -04001331 * libpng arithmetic: a simple inversion of the above equations
Chris Craikb50c2172013-07-29 15:28:30 -07001332 * ------------------------------------------------------------
1333 *
1334 * white_scale = 1/white-y
1335 * white-X = white-x * white-scale
1336 * white-Y = 1.0
1337 * white-Z = (1 - white-x - white-y) * white_scale
1338 *
1339 * white-C = red-C + green-C + blue-C
1340 * = red-c*red-scale + green-c*green-scale + blue-c*blue-scale
1341 *
1342 * This gives us three equations in (red-scale,green-scale,blue-scale) where
1343 * all the coefficients are now known:
1344 *
1345 * red-x*red-scale + green-x*green-scale + blue-x*blue-scale
1346 * = white-x/white-y
1347 * red-y*red-scale + green-y*green-scale + blue-y*blue-scale = 1
1348 * red-z*red-scale + green-z*green-scale + blue-z*blue-scale
1349 * = (1 - white-x - white-y)/white-y
1350 *
1351 * In the last equation color-z is (1 - color-x - color-y) so we can add all
1352 * three equations together to get an alternative third:
1353 *
1354 * red-scale + green-scale + blue-scale = 1/white-y = white-scale
1355 *
1356 * So now we have a Cramer's rule solution where the determinants are just
1357 * 3x3 - far more tractible. Unfortunately 3x3 determinants still involve
1358 * multiplication of three coefficients so we can't guarantee to avoid
1359 * overflow in the libpng fixed point representation. Using Cramer's rule in
1360 * floating point is probably a good choice here, but it's not an option for
1361 * fixed point. Instead proceed to simplify the first two equations by
1362 * eliminating what is likely to be the largest value, blue-scale:
1363 *
1364 * blue-scale = white-scale - red-scale - green-scale
1365 *
1366 * Hence:
1367 *
1368 * (red-x - blue-x)*red-scale + (green-x - blue-x)*green-scale =
1369 * (white-x - blue-x)*white-scale
1370 *
1371 * (red-y - blue-y)*red-scale + (green-y - blue-y)*green-scale =
1372 * 1 - blue-y*white-scale
1373 *
1374 * And now we can trivially solve for (red-scale,green-scale):
1375 *
1376 * green-scale =
1377 * (white-x - blue-x)*white-scale - (red-x - blue-x)*red-scale
1378 * -----------------------------------------------------------
1379 * green-x - blue-x
1380 *
1381 * red-scale =
1382 * 1 - blue-y*white-scale - (green-y - blue-y) * green-scale
1383 * ---------------------------------------------------------
1384 * red-y - blue-y
1385 *
1386 * Hence:
1387 *
1388 * red-scale =
1389 * ( (green-x - blue-x) * (white-y - blue-y) -
1390 * (green-y - blue-y) * (white-x - blue-x) ) / white-y
1391 * -------------------------------------------------------------------------
1392 * (green-x - blue-x)*(red-y - blue-y)-(green-y - blue-y)*(red-x - blue-x)
1393 *
1394 * green-scale =
1395 * ( (red-y - blue-y) * (white-x - blue-x) -
1396 * (red-x - blue-x) * (white-y - blue-y) ) / white-y
1397 * -------------------------------------------------------------------------
1398 * (green-x - blue-x)*(red-y - blue-y)-(green-y - blue-y)*(red-x - blue-x)
1399 *
1400 * Accuracy:
1401 * The input values have 5 decimal digits of accuracy. The values are all in
1402 * the range 0 < value < 1, so simple products are in the same range but may
1403 * need up to 10 decimal digits to preserve the original precision and avoid
1404 * underflow. Because we are using a 32-bit signed representation we cannot
1405 * match this; the best is a little over 9 decimal digits, less than 10.
1406 *
1407 * The approach used here is to preserve the maximum precision within the
1408 * signed representation. Because the red-scale calculation above uses the
1409 * difference between two products of values that must be in the range -1..+1
1410 * it is sufficient to divide the product by 7; ceil(100,000/32767*2). The
1411 * factor is irrelevant in the calculation because it is applied to both
1412 * numerator and denominator.
1413 *
1414 * Note that the values of the differences of the products of the
1415 * chromaticities in the above equations tend to be small, for example for
1416 * the sRGB chromaticities they are:
1417 *
1418 * red numerator: -0.04751
1419 * green numerator: -0.08788
1420 * denominator: -0.2241 (without white-y multiplication)
1421 *
1422 * The resultant Y coefficients from the chromaticities of some widely used
1423 * color space definitions are (to 15 decimal places):
1424 *
1425 * sRGB
1426 * 0.212639005871510 0.715168678767756 0.072192315360734
1427 * Kodak ProPhoto
1428 * 0.288071128229293 0.711843217810102 0.000085653960605
1429 * Adobe RGB
1430 * 0.297344975250536 0.627363566255466 0.075291458493998
1431 * Adobe Wide Gamut RGB
1432 * 0.258728243040113 0.724682314948566 0.016589442011321
1433 */
1434 /* By the argument, above overflow should be impossible here. The return
1435 * value of 2 indicates an internal error to the caller.
1436 */
Matt Sarett96be9082016-05-03 13:29:54 -04001437 if (png_muldiv(&left, xy->greenx-xy->bluex, xy->redy - xy->bluey, 7) == 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001438 return 2;
Matt Sarett96be9082016-05-03 13:29:54 -04001439 if (png_muldiv(&right, xy->greeny-xy->bluey, xy->redx - xy->bluex, 7) == 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001440 return 2;
1441 denominator = left - right;
1442
1443 /* Now find the red numerator. */
Matt Sarett96be9082016-05-03 13:29:54 -04001444 if (png_muldiv(&left, xy->greenx-xy->bluex, xy->whitey-xy->bluey, 7) == 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001445 return 2;
Matt Sarett96be9082016-05-03 13:29:54 -04001446 if (png_muldiv(&right, xy->greeny-xy->bluey, xy->whitex-xy->bluex, 7) == 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001447 return 2;
1448
1449 /* Overflow is possible here and it indicates an extreme set of PNG cHRM
1450 * chunk values. This calculation actually returns the reciprocal of the
1451 * scale value because this allows us to delay the multiplication of white-y
1452 * into the denominator, which tends to produce a small number.
1453 */
Matt Sarett96be9082016-05-03 13:29:54 -04001454 if (png_muldiv(&red_inverse, xy->whitey, denominator, left-right) == 0 ||
Chris Craikb50c2172013-07-29 15:28:30 -07001455 red_inverse <= xy->whitey /* r+g+b scales = white scale */)
1456 return 1;
1457
1458 /* Similarly for green_inverse: */
Matt Sarett96be9082016-05-03 13:29:54 -04001459 if (png_muldiv(&left, xy->redy-xy->bluey, xy->whitex-xy->bluex, 7) == 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001460 return 2;
Matt Sarett96be9082016-05-03 13:29:54 -04001461 if (png_muldiv(&right, xy->redx-xy->bluex, xy->whitey-xy->bluey, 7) == 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001462 return 2;
Matt Sarett96be9082016-05-03 13:29:54 -04001463 if (png_muldiv(&green_inverse, xy->whitey, denominator, left-right) == 0 ||
Chris Craikb50c2172013-07-29 15:28:30 -07001464 green_inverse <= xy->whitey)
1465 return 1;
1466
1467 /* And the blue scale, the checks above guarantee this can't overflow but it
1468 * can still produce 0 for extreme cHRM values.
1469 */
1470 blue_scale = png_reciprocal(xy->whitey) - png_reciprocal(red_inverse) -
Matt Sarett96be9082016-05-03 13:29:54 -04001471 png_reciprocal(green_inverse);
1472 if (blue_scale <= 0)
1473 return 1;
Chris Craikb50c2172013-07-29 15:28:30 -07001474
1475
1476 /* And fill in the png_XYZ: */
Matt Sarett96be9082016-05-03 13:29:54 -04001477 if (png_muldiv(&XYZ->red_X, xy->redx, PNG_FP_1, red_inverse) == 0)
1478 return 1;
1479 if (png_muldiv(&XYZ->red_Y, xy->redy, PNG_FP_1, red_inverse) == 0)
1480 return 1;
1481 if (png_muldiv(&XYZ->red_Z, PNG_FP_1 - xy->redx - xy->redy, PNG_FP_1,
1482 red_inverse) == 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001483 return 1;
1484
Matt Sarett96be9082016-05-03 13:29:54 -04001485 if (png_muldiv(&XYZ->green_X, xy->greenx, PNG_FP_1, green_inverse) == 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001486 return 1;
Matt Sarett96be9082016-05-03 13:29:54 -04001487 if (png_muldiv(&XYZ->green_Y, xy->greeny, PNG_FP_1, green_inverse) == 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001488 return 1;
Matt Sarett96be9082016-05-03 13:29:54 -04001489 if (png_muldiv(&XYZ->green_Z, PNG_FP_1 - xy->greenx - xy->greeny, PNG_FP_1,
1490 green_inverse) == 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001491 return 1;
1492
Matt Sarett96be9082016-05-03 13:29:54 -04001493 if (png_muldiv(&XYZ->blue_X, xy->bluex, blue_scale, PNG_FP_1) == 0)
1494 return 1;
1495 if (png_muldiv(&XYZ->blue_Y, xy->bluey, blue_scale, PNG_FP_1) == 0)
1496 return 1;
1497 if (png_muldiv(&XYZ->blue_Z, PNG_FP_1 - xy->bluex - xy->bluey, blue_scale,
1498 PNG_FP_1) == 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001499 return 1;
1500
1501 return 0; /*success*/
1502}
1503
1504static int
1505png_XYZ_normalize(png_XYZ *XYZ)
1506{
1507 png_int_32 Y;
1508
1509 if (XYZ->red_Y < 0 || XYZ->green_Y < 0 || XYZ->blue_Y < 0 ||
1510 XYZ->red_X < 0 || XYZ->green_X < 0 || XYZ->blue_X < 0 ||
1511 XYZ->red_Z < 0 || XYZ->green_Z < 0 || XYZ->blue_Z < 0)
1512 return 1;
1513
1514 /* Normalize by scaling so the sum of the end-point Y values is PNG_FP_1.
1515 * IMPLEMENTATION NOTE: ANSI requires signed overflow not to occur, therefore
1516 * relying on addition of two positive values producing a negative one is not
1517 * safe.
1518 */
1519 Y = XYZ->red_Y;
Matt Sarett96be9082016-05-03 13:29:54 -04001520 if (0x7fffffff - Y < XYZ->green_X)
1521 return 1;
Chris Craikb50c2172013-07-29 15:28:30 -07001522 Y += XYZ->green_Y;
Matt Sarett96be9082016-05-03 13:29:54 -04001523 if (0x7fffffff - Y < XYZ->blue_X)
1524 return 1;
Chris Craikb50c2172013-07-29 15:28:30 -07001525 Y += XYZ->blue_Y;
1526
1527 if (Y != PNG_FP_1)
1528 {
Matt Sarett96be9082016-05-03 13:29:54 -04001529 if (png_muldiv(&XYZ->red_X, XYZ->red_X, PNG_FP_1, Y) == 0)
1530 return 1;
1531 if (png_muldiv(&XYZ->red_Y, XYZ->red_Y, PNG_FP_1, Y) == 0)
1532 return 1;
1533 if (png_muldiv(&XYZ->red_Z, XYZ->red_Z, PNG_FP_1, Y) == 0)
1534 return 1;
Chris Craikb50c2172013-07-29 15:28:30 -07001535
Matt Sarett96be9082016-05-03 13:29:54 -04001536 if (png_muldiv(&XYZ->green_X, XYZ->green_X, PNG_FP_1, Y) == 0)
1537 return 1;
1538 if (png_muldiv(&XYZ->green_Y, XYZ->green_Y, PNG_FP_1, Y) == 0)
1539 return 1;
1540 if (png_muldiv(&XYZ->green_Z, XYZ->green_Z, PNG_FP_1, Y) == 0)
1541 return 1;
Chris Craikb50c2172013-07-29 15:28:30 -07001542
Matt Sarett96be9082016-05-03 13:29:54 -04001543 if (png_muldiv(&XYZ->blue_X, XYZ->blue_X, PNG_FP_1, Y) == 0)
1544 return 1;
1545 if (png_muldiv(&XYZ->blue_Y, XYZ->blue_Y, PNG_FP_1, Y) == 0)
1546 return 1;
1547 if (png_muldiv(&XYZ->blue_Z, XYZ->blue_Z, PNG_FP_1, Y) == 0)
1548 return 1;
Chris Craikb50c2172013-07-29 15:28:30 -07001549 }
1550
1551 return 0;
1552}
1553
1554static int
1555png_colorspace_endpoints_match(const png_xy *xy1, const png_xy *xy2, int delta)
1556{
1557 /* Allow an error of +/-0.01 (absolute value) on each chromaticity */
Matt Sarett96be9082016-05-03 13:29:54 -04001558 if (PNG_OUT_OF_RANGE(xy1->whitex, xy2->whitex,delta) ||
1559 PNG_OUT_OF_RANGE(xy1->whitey, xy2->whitey,delta) ||
1560 PNG_OUT_OF_RANGE(xy1->redx, xy2->redx, delta) ||
1561 PNG_OUT_OF_RANGE(xy1->redy, xy2->redy, delta) ||
1562 PNG_OUT_OF_RANGE(xy1->greenx, xy2->greenx,delta) ||
1563 PNG_OUT_OF_RANGE(xy1->greeny, xy2->greeny,delta) ||
1564 PNG_OUT_OF_RANGE(xy1->bluex, xy2->bluex, delta) ||
1565 PNG_OUT_OF_RANGE(xy1->bluey, xy2->bluey, delta))
1566 return 0;
1567 return 1;
Chris Craikb50c2172013-07-29 15:28:30 -07001568}
1569
1570/* Added in libpng-1.6.0, a different check for the validity of a set of cHRM
1571 * chunk chromaticities. Earlier checks used to simply look for the overflow
1572 * condition (where the determinant of the matrix to solve for XYZ ends up zero
1573 * because the chromaticity values are not all distinct.) Despite this it is
1574 * theoretically possible to produce chromaticities that are apparently valid
1575 * but that rapidly degrade to invalid, potentially crashing, sets because of
1576 * arithmetic inaccuracies when calculations are performed on them. The new
1577 * check is to round-trip xy -> XYZ -> xy and then check that the result is
1578 * within a small percentage of the original.
1579 */
1580static int
1581png_colorspace_check_xy(png_XYZ *XYZ, const png_xy *xy)
1582{
1583 int result;
1584 png_xy xy_test;
1585
1586 /* As a side-effect this routine also returns the XYZ endpoints. */
1587 result = png_XYZ_from_xy(XYZ, xy);
Matt Sarett96be9082016-05-03 13:29:54 -04001588 if (result != 0)
1589 return result;
Chris Craikb50c2172013-07-29 15:28:30 -07001590
1591 result = png_xy_from_XYZ(&xy_test, XYZ);
Matt Sarett96be9082016-05-03 13:29:54 -04001592 if (result != 0)
1593 return result;
Chris Craikb50c2172013-07-29 15:28:30 -07001594
1595 if (png_colorspace_endpoints_match(xy, &xy_test,
Matt Sarett96be9082016-05-03 13:29:54 -04001596 5/*actually, the math is pretty accurate*/) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001597 return 0;
1598
1599 /* Too much slip */
1600 return 1;
1601}
1602
1603/* This is the check going the other way. The XYZ is modified to normalize it
1604 * (another side-effect) and the xy chromaticities are returned.
1605 */
1606static int
1607png_colorspace_check_XYZ(png_xy *xy, png_XYZ *XYZ)
1608{
1609 int result;
1610 png_XYZ XYZtemp;
1611
1612 result = png_XYZ_normalize(XYZ);
Matt Sarett96be9082016-05-03 13:29:54 -04001613 if (result != 0)
1614 return result;
Chris Craikb50c2172013-07-29 15:28:30 -07001615
1616 result = png_xy_from_XYZ(xy, XYZ);
Matt Sarett96be9082016-05-03 13:29:54 -04001617 if (result != 0)
1618 return result;
Chris Craikb50c2172013-07-29 15:28:30 -07001619
1620 XYZtemp = *XYZ;
1621 return png_colorspace_check_xy(&XYZtemp, xy);
1622}
1623
1624/* Used to check for an endpoint match against sRGB */
1625static const png_xy sRGB_xy = /* From ITU-R BT.709-3 */
1626{
1627 /* color x y */
1628 /* red */ 64000, 33000,
1629 /* green */ 30000, 60000,
1630 /* blue */ 15000, 6000,
1631 /* white */ 31270, 32900
1632};
1633
1634static int
1635png_colorspace_set_xy_and_XYZ(png_const_structrp png_ptr,
1636 png_colorspacerp colorspace, const png_xy *xy, const png_XYZ *XYZ,
1637 int preferred)
1638{
Matt Sarett96be9082016-05-03 13:29:54 -04001639 if ((colorspace->flags & PNG_COLORSPACE_INVALID) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001640 return 0;
1641
1642 /* The consistency check is performed on the chromaticities; this factors out
1643 * variations because of the normalization (or not) of the end point Y
1644 * values.
1645 */
Matt Sarett96be9082016-05-03 13:29:54 -04001646 if (preferred < 2 &&
1647 (colorspace->flags & PNG_COLORSPACE_HAVE_ENDPOINTS) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001648 {
1649 /* The end points must be reasonably close to any we already have. The
1650 * following allows an error of up to +/-.001
1651 */
Matt Sarett96be9082016-05-03 13:29:54 -04001652 if (png_colorspace_endpoints_match(xy, &colorspace->end_points_xy,
1653 100) == 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001654 {
1655 colorspace->flags |= PNG_COLORSPACE_INVALID;
1656 png_benign_error(png_ptr, "inconsistent chromaticities");
1657 return 0; /* failed */
1658 }
1659
1660 /* Only overwrite with preferred values */
Matt Sarett96be9082016-05-03 13:29:54 -04001661 if (preferred == 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001662 return 1; /* ok, but no change */
1663 }
1664
1665 colorspace->end_points_xy = *xy;
1666 colorspace->end_points_XYZ = *XYZ;
1667 colorspace->flags |= PNG_COLORSPACE_HAVE_ENDPOINTS;
1668
1669 /* The end points are normally quoted to two decimal digits, so allow +/-0.01
1670 * on this test.
1671 */
Matt Sarett96be9082016-05-03 13:29:54 -04001672 if (png_colorspace_endpoints_match(xy, &sRGB_xy, 1000) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001673 colorspace->flags |= PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB;
1674
1675 else
1676 colorspace->flags &= PNG_COLORSPACE_CANCEL(
1677 PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB);
1678
1679 return 2; /* ok and changed */
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001680}
Patrick Scotta0bb96c2009-07-22 11:50:02 -04001681
Patrick Scott5f6bd842010-06-28 16:55:16 -04001682int /* PRIVATE */
Chris Craikb50c2172013-07-29 15:28:30 -07001683png_colorspace_set_chromaticities(png_const_structrp png_ptr,
1684 png_colorspacerp colorspace, const png_xy *xy, int preferred)
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001685{
Chris Craikb50c2172013-07-29 15:28:30 -07001686 /* We must check the end points to ensure they are reasonable - in the past
1687 * color management systems have crashed as a result of getting bogus
1688 * colorant values, while this isn't the fault of libpng it is the
1689 * responsibility of libpng because PNG carries the bomb and libpng is in a
1690 * position to protect against it.
1691 */
1692 png_XYZ XYZ;
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001693
Chris Craikb50c2172013-07-29 15:28:30 -07001694 switch (png_colorspace_check_xy(&XYZ, xy))
1695 {
1696 case 0: /* success */
1697 return png_colorspace_set_xy_and_XYZ(png_ptr, colorspace, xy, &XYZ,
1698 preferred);
Patrick Scott5f6bd842010-06-28 16:55:16 -04001699
Chris Craikb50c2172013-07-29 15:28:30 -07001700 case 1:
1701 /* We can't invert the chromaticities so we can't produce value XYZ
1702 * values. Likely as not a color management system will fail too.
1703 */
1704 colorspace->flags |= PNG_COLORSPACE_INVALID;
1705 png_benign_error(png_ptr, "invalid chromaticities");
1706 break;
1707
1708 default:
1709 /* libpng is broken; this should be a warning but if it happens we
1710 * want error reports so for the moment it is an error.
1711 */
1712 colorspace->flags |= PNG_COLORSPACE_INVALID;
1713 png_error(png_ptr, "internal error checking chromaticities");
Chris Craikb50c2172013-07-29 15:28:30 -07001714 }
1715
1716 return 0; /* failed */
1717}
1718
1719int /* PRIVATE */
1720png_colorspace_set_endpoints(png_const_structrp png_ptr,
1721 png_colorspacerp colorspace, const png_XYZ *XYZ_in, int preferred)
1722{
1723 png_XYZ XYZ = *XYZ_in;
1724 png_xy xy;
1725
1726 switch (png_colorspace_check_XYZ(&xy, &XYZ))
1727 {
1728 case 0:
1729 return png_colorspace_set_xy_and_XYZ(png_ptr, colorspace, &xy, &XYZ,
1730 preferred);
1731
1732 case 1:
1733 /* End points are invalid. */
1734 colorspace->flags |= PNG_COLORSPACE_INVALID;
1735 png_benign_error(png_ptr, "invalid end points");
1736 break;
1737
1738 default:
1739 colorspace->flags |= PNG_COLORSPACE_INVALID;
1740 png_error(png_ptr, "internal error checking chromaticities");
Chris Craikb50c2172013-07-29 15:28:30 -07001741 }
1742
1743 return 0; /* failed */
1744}
1745
1746#if defined(PNG_sRGB_SUPPORTED) || defined(PNG_iCCP_SUPPORTED)
1747/* Error message generation */
1748static char
1749png_icc_tag_char(png_uint_32 byte)
1750{
1751 byte &= 0xff;
1752 if (byte >= 32 && byte <= 126)
1753 return (char)byte;
1754 else
1755 return '?';
1756}
1757
1758static void
1759png_icc_tag_name(char *name, png_uint_32 tag)
1760{
1761 name[0] = '\'';
1762 name[1] = png_icc_tag_char(tag >> 24);
1763 name[2] = png_icc_tag_char(tag >> 16);
1764 name[3] = png_icc_tag_char(tag >> 8);
1765 name[4] = png_icc_tag_char(tag );
1766 name[5] = '\'';
1767}
1768
1769static int
1770is_ICC_signature_char(png_alloc_size_t it)
1771{
1772 return it == 32 || (it >= 48 && it <= 57) || (it >= 65 && it <= 90) ||
1773 (it >= 97 && it <= 122);
1774}
1775
Sireesh Tripurarib478e662014-05-09 15:15:10 +05301776static int
1777is_ICC_signature(png_alloc_size_t it)
Chris Craikb50c2172013-07-29 15:28:30 -07001778{
1779 return is_ICC_signature_char(it >> 24) /* checks all the top bits */ &&
1780 is_ICC_signature_char((it >> 16) & 0xff) &&
1781 is_ICC_signature_char((it >> 8) & 0xff) &&
1782 is_ICC_signature_char(it & 0xff);
1783}
1784
1785static int
1786png_icc_profile_error(png_const_structrp png_ptr, png_colorspacerp colorspace,
1787 png_const_charp name, png_alloc_size_t value, png_const_charp reason)
1788{
1789 size_t pos;
1790 char message[196]; /* see below for calculation */
1791
1792 if (colorspace != NULL)
1793 colorspace->flags |= PNG_COLORSPACE_INVALID;
1794
1795 pos = png_safecat(message, (sizeof message), 0, "profile '"); /* 9 chars */
1796 pos = png_safecat(message, pos+79, pos, name); /* Truncate to 79 chars */
1797 pos = png_safecat(message, (sizeof message), pos, "': "); /* +2 = 90 */
Matt Sarett96be9082016-05-03 13:29:54 -04001798 if (is_ICC_signature(value) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07001799 {
1800 /* So 'value' is at most 4 bytes and the following cast is safe */
1801 png_icc_tag_name(message+pos, (png_uint_32)value);
1802 pos += 6; /* total +8; less than the else clause */
1803 message[pos++] = ':';
1804 message[pos++] = ' ';
1805 }
1806# ifdef PNG_WARNINGS_SUPPORTED
1807 else
1808 {
1809 char number[PNG_NUMBER_BUFFER_SIZE]; /* +24 = 114*/
1810
1811 pos = png_safecat(message, (sizeof message), pos,
1812 png_format_number(number, number+(sizeof number),
1813 PNG_NUMBER_FORMAT_x, value));
1814 pos = png_safecat(message, (sizeof message), pos, "h: "); /*+2 = 116*/
1815 }
1816# endif
1817 /* The 'reason' is an arbitrary message, allow +79 maximum 195 */
1818 pos = png_safecat(message, (sizeof message), pos, reason);
Sireesh Tripurarib478e662014-05-09 15:15:10 +05301819 PNG_UNUSED(pos)
Chris Craikb50c2172013-07-29 15:28:30 -07001820
1821 /* This is recoverable, but make it unconditionally an app_error on write to
Matt Sarett96be9082016-05-03 13:29:54 -04001822 * avoid writing invalid ICC profiles into PNG files (i.e., we handle them
Chris Craikb50c2172013-07-29 15:28:30 -07001823 * on read, with a warning, but on write unless the app turns off
1824 * application errors the PNG won't be written.)
1825 */
1826 png_chunk_report(png_ptr, message,
1827 (colorspace != NULL) ? PNG_CHUNK_ERROR : PNG_CHUNK_WRITE_ERROR);
1828
1829 return 0;
1830}
1831#endif /* sRGB || iCCP */
1832
1833#ifdef PNG_sRGB_SUPPORTED
1834int /* PRIVATE */
1835png_colorspace_set_sRGB(png_const_structrp png_ptr, png_colorspacerp colorspace,
1836 int intent)
1837{
1838 /* sRGB sets known gamma, end points and (from the chunk) intent. */
1839 /* IMPORTANT: these are not necessarily the values found in an ICC profile
1840 * because ICC profiles store values adapted to a D50 environment; it is
Matt Sarett96be9082016-05-03 13:29:54 -04001841 * expected that the ICC profile mediaWhitePointTag will be D50; see the
Chris Craikb50c2172013-07-29 15:28:30 -07001842 * checks and code elsewhere to understand this better.
1843 *
1844 * These XYZ values, which are accurate to 5dp, produce rgb to gray
1845 * coefficients of (6968,23435,2366), which are reduced (because they add up
1846 * to 32769 not 32768) to (6968,23434,2366). These are the values that
1847 * libpng has traditionally used (and are the best values given the 15bit
1848 * algorithm used by the rgb to gray code.)
1849 */
1850 static const png_XYZ sRGB_XYZ = /* D65 XYZ (*not* the D50 adapted values!) */
1851 {
1852 /* color X Y Z */
1853 /* red */ 41239, 21264, 1933,
1854 /* green */ 35758, 71517, 11919,
1855 /* blue */ 18048, 7219, 95053
1856 };
1857
1858 /* Do nothing if the colorspace is already invalidated. */
Matt Sarett96be9082016-05-03 13:29:54 -04001859 if ((colorspace->flags & PNG_COLORSPACE_INVALID) != 0)
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001860 return 0;
1861
Chris Craikb50c2172013-07-29 15:28:30 -07001862 /* Check the intent, then check for existing settings. It is valid for the
1863 * PNG file to have cHRM or gAMA chunks along with sRGB, but the values must
1864 * be consistent with the correct values. If, however, this function is
1865 * called below because an iCCP chunk matches sRGB then it is quite
1866 * conceivable that an older app recorded incorrect gAMA and cHRM because of
1867 * an incorrect calculation based on the values in the profile - this does
1868 * *not* invalidate the profile (though it still produces an error, which can
1869 * be ignored.)
1870 */
1871 if (intent < 0 || intent >= PNG_sRGB_INTENT_LAST)
1872 return png_icc_profile_error(png_ptr, colorspace, "sRGB",
1873 (unsigned)intent, "invalid sRGB rendering intent");
1874
1875 if ((colorspace->flags & PNG_COLORSPACE_HAVE_INTENT) != 0 &&
1876 colorspace->rendering_intent != intent)
1877 return png_icc_profile_error(png_ptr, colorspace, "sRGB",
1878 (unsigned)intent, "inconsistent rendering intents");
1879
1880 if ((colorspace->flags & PNG_COLORSPACE_FROM_sRGB) != 0)
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001881 {
Chris Craikb50c2172013-07-29 15:28:30 -07001882 png_benign_error(png_ptr, "duplicate sRGB information ignored");
1883 return 0;
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001884 }
1885
Chris Craikb50c2172013-07-29 15:28:30 -07001886 /* If the standard sRGB cHRM chunk does not match the one from the PNG file
1887 * warn but overwrite the value with the correct one.
1888 */
1889 if ((colorspace->flags & PNG_COLORSPACE_HAVE_ENDPOINTS) != 0 &&
1890 !png_colorspace_endpoints_match(&sRGB_xy, &colorspace->end_points_xy,
1891 100))
1892 png_chunk_report(png_ptr, "cHRM chunk does not match sRGB",
1893 PNG_CHUNK_ERROR);
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001894
Chris Craikb50c2172013-07-29 15:28:30 -07001895 /* This check is just done for the error reporting - the routine always
1896 * returns true when the 'from' argument corresponds to sRGB (2).
1897 */
1898 (void)png_colorspace_check_gamma(png_ptr, colorspace, PNG_GAMMA_sRGB_INVERSE,
1899 2/*from sRGB*/);
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001900
Chris Craikb50c2172013-07-29 15:28:30 -07001901 /* intent: bugs in GCC force 'int' to be used as the parameter type. */
1902 colorspace->rendering_intent = (png_uint_16)intent;
1903 colorspace->flags |= PNG_COLORSPACE_HAVE_INTENT;
1904
1905 /* endpoints */
1906 colorspace->end_points_xy = sRGB_xy;
1907 colorspace->end_points_XYZ = sRGB_XYZ;
1908 colorspace->flags |=
1909 (PNG_COLORSPACE_HAVE_ENDPOINTS|PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB);
1910
1911 /* gamma */
1912 colorspace->gamma = PNG_GAMMA_sRGB_INVERSE;
1913 colorspace->flags |= PNG_COLORSPACE_HAVE_GAMMA;
1914
1915 /* Finally record that we have an sRGB profile */
1916 colorspace->flags |=
1917 (PNG_COLORSPACE_MATCHES_sRGB|PNG_COLORSPACE_FROM_sRGB);
1918
1919 return 1; /* set */
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001920}
Chris Craikb50c2172013-07-29 15:28:30 -07001921#endif /* sRGB */
1922
1923#ifdef PNG_iCCP_SUPPORTED
1924/* Encoded value of D50 as an ICC XYZNumber. From the ICC 2010 spec the value
1925 * is XYZ(0.9642,1.0,0.8249), which scales to:
1926 *
1927 * (63189.8112, 65536, 54060.6464)
1928 */
1929static const png_byte D50_nCIEXYZ[12] =
1930 { 0x00, 0x00, 0xf6, 0xd6, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x2d };
1931
1932int /* PRIVATE */
1933png_icc_check_length(png_const_structrp png_ptr, png_colorspacerp colorspace,
1934 png_const_charp name, png_uint_32 profile_length)
1935{
1936 if (profile_length < 132)
1937 return png_icc_profile_error(png_ptr, colorspace, name, profile_length,
1938 "too short");
1939
Chris Craikb50c2172013-07-29 15:28:30 -07001940 return 1;
1941}
1942
1943int /* PRIVATE */
1944png_icc_check_header(png_const_structrp png_ptr, png_colorspacerp colorspace,
1945 png_const_charp name, png_uint_32 profile_length,
1946 png_const_bytep profile/* first 132 bytes only */, int color_type)
1947{
1948 png_uint_32 temp;
1949
1950 /* Length check; this cannot be ignored in this code because profile_length
1951 * is used later to check the tag table, so even if the profile seems over
1952 * long profile_length from the caller must be correct. The caller can fix
1953 * this up on read or write by just passing in the profile header length.
1954 */
1955 temp = png_get_uint_32(profile);
1956 if (temp != profile_length)
1957 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1958 "length does not match profile");
1959
Matt Sarett96be9082016-05-03 13:29:54 -04001960 temp = (png_uint_32) (*(profile+8));
1961 if (temp > 3 && (profile_length & 3))
1962 return png_icc_profile_error(png_ptr, colorspace, name, profile_length,
1963 "invalid length");
1964
Chris Craikb50c2172013-07-29 15:28:30 -07001965 temp = png_get_uint_32(profile+128); /* tag count: 12 bytes/tag */
1966 if (temp > 357913930 || /* (2^32-4-132)/12: maximum possible tag count */
1967 profile_length < 132+12*temp) /* truncated tag table */
1968 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1969 "tag count too large");
1970
1971 /* The 'intent' must be valid or we can't store it, ICC limits the intent to
1972 * 16 bits.
1973 */
1974 temp = png_get_uint_32(profile+64);
1975 if (temp >= 0xffff) /* The ICC limit */
1976 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1977 "invalid rendering intent");
1978
1979 /* This is just a warning because the profile may be valid in future
1980 * versions.
1981 */
1982 if (temp >= PNG_sRGB_INTENT_LAST)
1983 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
1984 "intent outside defined range");
1985
1986 /* At this point the tag table can't be checked because it hasn't necessarily
1987 * been loaded; however, various header fields can be checked. These checks
1988 * are for values permitted by the PNG spec in an ICC profile; the PNG spec
1989 * restricts the profiles that can be passed in an iCCP chunk (they must be
1990 * appropriate to processing PNG data!)
1991 */
1992
1993 /* Data checks (could be skipped). These checks must be independent of the
1994 * version number; however, the version number doesn't accomodate changes in
1995 * the header fields (just the known tags and the interpretation of the
1996 * data.)
1997 */
1998 temp = png_get_uint_32(profile+36); /* signature 'ascp' */
1999 if (temp != 0x61637370)
2000 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2001 "invalid signature");
2002
2003 /* Currently the PCS illuminant/adopted white point (the computational
2004 * white point) are required to be D50,
2005 * however the profile contains a record of the illuminant so perhaps ICC
2006 * expects to be able to change this in the future (despite the rationale in
2007 * the introduction for using a fixed PCS adopted white.) Consequently the
2008 * following is just a warning.
2009 */
2010 if (memcmp(profile+68, D50_nCIEXYZ, 12) != 0)
2011 (void)png_icc_profile_error(png_ptr, NULL, name, 0/*no tag value*/,
2012 "PCS illuminant is not D50");
2013
2014 /* The PNG spec requires this:
2015 * "If the iCCP chunk is present, the image samples conform to the colour
2016 * space represented by the embedded ICC profile as defined by the
2017 * International Color Consortium [ICC]. The colour space of the ICC profile
2018 * shall be an RGB colour space for colour images (PNG colour types 2, 3, and
2019 * 6), or a greyscale colour space for greyscale images (PNG colour types 0
2020 * and 4)."
2021 *
2022 * This checking code ensures the embedded profile (on either read or write)
2023 * conforms to the specification requirements. Notice that an ICC 'gray'
2024 * color-space profile contains the information to transform the monochrome
2025 * data to XYZ or L*a*b (according to which PCS the profile uses) and this
2026 * should be used in preference to the standard libpng K channel replication
2027 * into R, G and B channels.
2028 *
2029 * Previously it was suggested that an RGB profile on grayscale data could be
2030 * handled. However it it is clear that using an RGB profile in this context
2031 * must be an error - there is no specification of what it means. Thus it is
2032 * almost certainly more correct to ignore the profile.
2033 */
2034 temp = png_get_uint_32(profile+16); /* data colour space field */
2035 switch (temp)
2036 {
2037 case 0x52474220: /* 'RGB ' */
Matt Sarett96be9082016-05-03 13:29:54 -04002038 if ((color_type & PNG_COLOR_MASK_COLOR) == 0)
Chris Craikb50c2172013-07-29 15:28:30 -07002039 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2040 "RGB color space not permitted on grayscale PNG");
2041 break;
2042
2043 case 0x47524159: /* 'GRAY' */
Matt Sarett96be9082016-05-03 13:29:54 -04002044 if ((color_type & PNG_COLOR_MASK_COLOR) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07002045 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2046 "Gray color space not permitted on RGB PNG");
2047 break;
2048
2049 default:
2050 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2051 "invalid ICC profile color space");
2052 }
2053
2054 /* It is up to the application to check that the profile class matches the
2055 * application requirements; the spec provides no guidance, but it's pretty
2056 * weird if the profile is not scanner ('scnr'), monitor ('mntr'), printer
2057 * ('prtr') or 'spac' (for generic color spaces). Issue a warning in these
2058 * cases. Issue an error for device link or abstract profiles - these don't
2059 * contain the records necessary to transform the color-space to anything
2060 * other than the target device (and not even that for an abstract profile).
2061 * Profiles of these classes may not be embedded in images.
2062 */
2063 temp = png_get_uint_32(profile+12); /* profile/device class */
2064 switch (temp)
2065 {
Matt Sarett96be9082016-05-03 13:29:54 -04002066 case 0x73636e72: /* 'scnr' */
2067 case 0x6d6e7472: /* 'mntr' */
Chris Craikb50c2172013-07-29 15:28:30 -07002068 case 0x70727472: /* 'prtr' */
2069 case 0x73706163: /* 'spac' */
2070 /* All supported */
2071 break;
2072
2073 case 0x61627374: /* 'abst' */
2074 /* May not be embedded in an image */
2075 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2076 "invalid embedded Abstract ICC profile");
2077
Matt Sarett96be9082016-05-03 13:29:54 -04002078 case 0x6c696e6b: /* 'link' */
2079 /* DeviceLink profiles cannot be interpreted in a non-device specific
Chris Craikb50c2172013-07-29 15:28:30 -07002080 * fashion, if an app uses the AToB0Tag in the profile the results are
2081 * undefined unless the result is sent to the intended device,
2082 * therefore a DeviceLink profile should not be found embedded in a
2083 * PNG.
2084 */
2085 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2086 "unexpected DeviceLink ICC profile class");
2087
Matt Sarett96be9082016-05-03 13:29:54 -04002088 case 0x6e6d636c: /* 'nmcl' */
Chris Craikb50c2172013-07-29 15:28:30 -07002089 /* A NamedColor profile is also device specific, however it doesn't
Matt Sarett96be9082016-05-03 13:29:54 -04002090 * contain an AToB0 tag that is open to misinterpretation. Almost
Chris Craikb50c2172013-07-29 15:28:30 -07002091 * certainly it will fail the tests below.
2092 */
2093 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
2094 "unexpected NamedColor ICC profile class");
2095 break;
2096
2097 default:
2098 /* To allow for future enhancements to the profile accept unrecognized
2099 * profile classes with a warning, these then hit the test below on the
2100 * tag content to ensure they are backward compatible with one of the
2101 * understood profiles.
2102 */
2103 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
2104 "unrecognized ICC profile class");
2105 break;
2106 }
2107
2108 /* For any profile other than a device link one the PCS must be encoded
2109 * either in XYZ or Lab.
2110 */
2111 temp = png_get_uint_32(profile+20);
2112 switch (temp)
2113 {
Matt Sarett96be9082016-05-03 13:29:54 -04002114 case 0x58595a20: /* 'XYZ ' */
2115 case 0x4c616220: /* 'Lab ' */
Chris Craikb50c2172013-07-29 15:28:30 -07002116 break;
2117
2118 default:
2119 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2120 "unexpected ICC PCS encoding");
2121 }
2122
2123 return 1;
2124}
2125
2126int /* PRIVATE */
2127png_icc_check_tag_table(png_const_structrp png_ptr, png_colorspacerp colorspace,
2128 png_const_charp name, png_uint_32 profile_length,
2129 png_const_bytep profile /* header plus whole tag table */)
2130{
2131 png_uint_32 tag_count = png_get_uint_32(profile+128);
2132 png_uint_32 itag;
2133 png_const_bytep tag = profile+132; /* The first tag */
2134
2135 /* First scan all the tags in the table and add bits to the icc_info value
2136 * (temporarily in 'tags').
2137 */
2138 for (itag=0; itag < tag_count; ++itag, tag += 12)
2139 {
2140 png_uint_32 tag_id = png_get_uint_32(tag+0);
2141 png_uint_32 tag_start = png_get_uint_32(tag+4); /* must be aligned */
2142 png_uint_32 tag_length = png_get_uint_32(tag+8);/* not padded */
2143
2144 /* The ICC specification does not exclude zero length tags, therefore the
2145 * start might actually be anywhere if there is no data, but this would be
2146 * a clear abuse of the intent of the standard so the start is checked for
2147 * being in range. All defined tag types have an 8 byte header - a 4 byte
2148 * type signature then 0.
2149 */
2150 if ((tag_start & 3) != 0)
2151 {
2152 /* CNHP730S.icc shipped with Microsoft Windows 64 violates this, it is
2153 * only a warning here because libpng does not care about the
2154 * alignment.
2155 */
2156 (void)png_icc_profile_error(png_ptr, NULL, name, tag_id,
2157 "ICC profile tag start not a multiple of 4");
2158 }
2159
2160 /* This is a hard error; potentially it can cause read outside the
2161 * profile.
2162 */
2163 if (tag_start > profile_length || tag_length > profile_length - tag_start)
2164 return png_icc_profile_error(png_ptr, colorspace, name, tag_id,
2165 "ICC profile tag outside profile");
2166 }
2167
2168 return 1; /* success, maybe with warnings */
2169}
2170
2171#ifdef PNG_sRGB_SUPPORTED
Matt Sarett96be9082016-05-03 13:29:54 -04002172#if PNG_sRGB_PROFILE_CHECKS >= 0
Chris Craikb50c2172013-07-29 15:28:30 -07002173/* Information about the known ICC sRGB profiles */
2174static const struct
2175{
2176 png_uint_32 adler, crc, length;
2177 png_uint_32 md5[4];
2178 png_byte have_md5;
2179 png_byte is_broken;
2180 png_uint_16 intent;
2181
2182# define PNG_MD5(a,b,c,d) { a, b, c, d }, (a!=0)||(b!=0)||(c!=0)||(d!=0)
2183# define PNG_ICC_CHECKSUM(adler, crc, md5, intent, broke, date, length, fname)\
2184 { adler, crc, length, md5, broke, intent },
2185
2186} png_sRGB_checks[] =
2187{
2188 /* This data comes from contrib/tools/checksum-icc run on downloads of
2189 * all four ICC sRGB profiles from www.color.org.
2190 */
2191 /* adler32, crc32, MD5[4], intent, date, length, file-name */
2192 PNG_ICC_CHECKSUM(0x0a3fd9f6, 0x3b8772b9,
2193 PNG_MD5(0x29f83dde, 0xaff255ae, 0x7842fae4, 0xca83390d), 0, 0,
2194 "2009/03/27 21:36:31", 3048, "sRGB_IEC61966-2-1_black_scaled.icc")
2195
2196 /* ICC sRGB v2 perceptual no black-compensation: */
2197 PNG_ICC_CHECKSUM(0x4909e5e1, 0x427ebb21,
2198 PNG_MD5(0xc95bd637, 0xe95d8a3b, 0x0df38f99, 0xc1320389), 1, 0,
2199 "2009/03/27 21:37:45", 3052, "sRGB_IEC61966-2-1_no_black_scaling.icc")
2200
2201 PNG_ICC_CHECKSUM(0xfd2144a1, 0x306fd8ae,
2202 PNG_MD5(0xfc663378, 0x37e2886b, 0xfd72e983, 0x8228f1b8), 0, 0,
2203 "2009/08/10 17:28:01", 60988, "sRGB_v4_ICC_preference_displayclass.icc")
2204
2205 /* ICC sRGB v4 perceptual */
2206 PNG_ICC_CHECKSUM(0x209c35d2, 0xbbef7812,
2207 PNG_MD5(0x34562abf, 0x994ccd06, 0x6d2c5721, 0xd0d68c5d), 0, 0,
2208 "2007/07/25 00:05:37", 60960, "sRGB_v4_ICC_preference.icc")
2209
2210 /* The following profiles have no known MD5 checksum. If there is a match
2211 * on the (empty) MD5 the other fields are used to attempt a match and
2212 * a warning is produced. The first two of these profiles have a 'cprt' tag
2213 * which suggests that they were also made by Hewlett Packard.
2214 */
2215 PNG_ICC_CHECKSUM(0xa054d762, 0x5d5129ce,
2216 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 1, 0,
2217 "2004/07/21 18:57:42", 3024, "sRGB_IEC61966-2-1_noBPC.icc")
2218
2219 /* This is a 'mntr' (display) profile with a mediaWhitePointTag that does not
2220 * match the D50 PCS illuminant in the header (it is in fact the D65 values,
2221 * so the white point is recorded as the un-adapted value.) The profiles
2222 * below only differ in one byte - the intent - and are basically the same as
2223 * the previous profile except for the mediaWhitePointTag error and a missing
2224 * chromaticAdaptationTag.
2225 */
2226 PNG_ICC_CHECKSUM(0xf784f3fb, 0x182ea552,
2227 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 0, 1/*broken*/,
2228 "1998/02/09 06:49:00", 3144, "HP-Microsoft sRGB v2 perceptual")
2229
2230 PNG_ICC_CHECKSUM(0x0398f3fc, 0xf29e526d,
2231 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 1, 1/*broken*/,
2232 "1998/02/09 06:49:00", 3144, "HP-Microsoft sRGB v2 media-relative")
2233};
2234
2235static int
2236png_compare_ICC_profile_with_sRGB(png_const_structrp png_ptr,
2237 png_const_bytep profile, uLong adler)
2238{
2239 /* The quick check is to verify just the MD5 signature and trust the
2240 * rest of the data. Because the profile has already been verified for
2241 * correctness this is safe. png_colorspace_set_sRGB will check the 'intent'
2242 * field too, so if the profile has been edited with an intent not defined
2243 * by sRGB (but maybe defined by a later ICC specification) the read of
2244 * the profile will fail at that point.
2245 */
Matt Sarett96be9082016-05-03 13:29:54 -04002246
Chris Craikb50c2172013-07-29 15:28:30 -07002247 png_uint_32 length = 0;
2248 png_uint_32 intent = 0x10000; /* invalid */
2249#if PNG_sRGB_PROFILE_CHECKS > 1
2250 uLong crc = 0; /* the value for 0 length data */
2251#endif
2252 unsigned int i;
2253
Matt Sarett96be9082016-05-03 13:29:54 -04002254#ifdef PNG_SET_OPTION_SUPPORTED
2255 /* First see if PNG_SKIP_sRGB_CHECK_PROFILE has been set to "on" */
2256 if (((png_ptr->options >> PNG_SKIP_sRGB_CHECK_PROFILE) & 3) ==
2257 PNG_OPTION_ON)
2258 return 0;
2259#endif
2260
Chris Craikb50c2172013-07-29 15:28:30 -07002261 for (i=0; i < (sizeof png_sRGB_checks) / (sizeof png_sRGB_checks[0]); ++i)
2262 {
2263 if (png_get_uint_32(profile+84) == png_sRGB_checks[i].md5[0] &&
2264 png_get_uint_32(profile+88) == png_sRGB_checks[i].md5[1] &&
2265 png_get_uint_32(profile+92) == png_sRGB_checks[i].md5[2] &&
2266 png_get_uint_32(profile+96) == png_sRGB_checks[i].md5[3])
2267 {
2268 /* This may be one of the old HP profiles without an MD5, in that
2269 * case we can only use the length and Adler32 (note that these
2270 * are not used by default if there is an MD5!)
2271 */
2272# if PNG_sRGB_PROFILE_CHECKS == 0
Matt Sarett96be9082016-05-03 13:29:54 -04002273 if (png_sRGB_checks[i].have_md5 != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07002274 return 1+png_sRGB_checks[i].is_broken;
2275# endif
2276
2277 /* Profile is unsigned or more checks have been configured in. */
2278 if (length == 0)
2279 {
2280 length = png_get_uint_32(profile);
2281 intent = png_get_uint_32(profile+64);
2282 }
2283
2284 /* Length *and* intent must match */
Matt Sarett96be9082016-05-03 13:29:54 -04002285 if (length == (png_uint_32) png_sRGB_checks[i].length &&
2286 intent == (png_uint_32) png_sRGB_checks[i].intent)
Chris Craikb50c2172013-07-29 15:28:30 -07002287 {
2288 /* Now calculate the adler32 if not done already. */
2289 if (adler == 0)
2290 {
2291 adler = adler32(0, NULL, 0);
2292 adler = adler32(adler, profile, length);
2293 }
2294
2295 if (adler == png_sRGB_checks[i].adler)
2296 {
2297 /* These basic checks suggest that the data has not been
2298 * modified, but if the check level is more than 1 perform
2299 * our own crc32 checksum on the data.
2300 */
2301# if PNG_sRGB_PROFILE_CHECKS > 1
2302 if (crc == 0)
2303 {
2304 crc = crc32(0, NULL, 0);
2305 crc = crc32(crc, profile, length);
2306 }
2307
2308 /* So this check must pass for the 'return' below to happen.
2309 */
2310 if (crc == png_sRGB_checks[i].crc)
2311# endif
2312 {
Matt Sarett96be9082016-05-03 13:29:54 -04002313 if (png_sRGB_checks[i].is_broken != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07002314 {
2315 /* These profiles are known to have bad data that may cause
2316 * problems if they are used, therefore attempt to
2317 * discourage their use, skip the 'have_md5' warning below,
2318 * which is made irrelevant by this error.
2319 */
2320 png_chunk_report(png_ptr, "known incorrect sRGB profile",
2321 PNG_CHUNK_ERROR);
2322 }
2323
2324 /* Warn that this being done; this isn't even an error since
2325 * the profile is perfectly valid, but it would be nice if
2326 * people used the up-to-date ones.
2327 */
Matt Sarett96be9082016-05-03 13:29:54 -04002328 else if (png_sRGB_checks[i].have_md5 == 0)
Chris Craikb50c2172013-07-29 15:28:30 -07002329 {
2330 png_chunk_report(png_ptr,
2331 "out-of-date sRGB profile with no signature",
2332 PNG_CHUNK_WARNING);
2333 }
2334
2335 return 1+png_sRGB_checks[i].is_broken;
2336 }
2337 }
Chris Craikb50c2172013-07-29 15:28:30 -07002338
Sireesh Tripurarib478e662014-05-09 15:15:10 +05302339# if PNG_sRGB_PROFILE_CHECKS > 0
2340 /* The signature matched, but the profile had been changed in some
2341 * way. This probably indicates a data error or uninformed hacking.
2342 * Fall through to "no match".
2343 */
2344 png_chunk_report(png_ptr,
Matt Sarett96be9082016-05-03 13:29:54 -04002345 "Not recognizing known sRGB profile that has been edited",
Sireesh Tripurarib478e662014-05-09 15:15:10 +05302346 PNG_CHUNK_WARNING);
2347 break;
2348# endif
Matt Sarett96be9082016-05-03 13:29:54 -04002349 }
Chris Craikb50c2172013-07-29 15:28:30 -07002350 }
2351 }
2352
2353 return 0; /* no match */
2354}
Matt Sarett96be9082016-05-03 13:29:54 -04002355#endif /* PNG_sRGB_PROFILE_CHECKS >= 0 */
Chris Craikb50c2172013-07-29 15:28:30 -07002356
Chris Craikb50c2172013-07-29 15:28:30 -07002357void /* PRIVATE */
2358png_icc_set_sRGB(png_const_structrp png_ptr,
2359 png_colorspacerp colorspace, png_const_bytep profile, uLong adler)
2360{
2361 /* Is this profile one of the known ICC sRGB profiles? If it is, just set
2362 * the sRGB information.
2363 */
Matt Sarett96be9082016-05-03 13:29:54 -04002364#if PNG_sRGB_PROFILE_CHECKS >= 0
2365 if (png_compare_ICC_profile_with_sRGB(png_ptr, profile, adler) != 0)
2366#endif
Chris Craikb50c2172013-07-29 15:28:30 -07002367 (void)png_colorspace_set_sRGB(png_ptr, colorspace,
2368 (int)/*already checked*/png_get_uint_32(profile+64));
2369}
Matt Sarett96be9082016-05-03 13:29:54 -04002370#endif /* sRGB */
Chris Craikb50c2172013-07-29 15:28:30 -07002371
2372int /* PRIVATE */
2373png_colorspace_set_ICC(png_const_structrp png_ptr, png_colorspacerp colorspace,
2374 png_const_charp name, png_uint_32 profile_length, png_const_bytep profile,
2375 int color_type)
2376{
Matt Sarett96be9082016-05-03 13:29:54 -04002377 if ((colorspace->flags & PNG_COLORSPACE_INVALID) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07002378 return 0;
2379
Matt Sarett96be9082016-05-03 13:29:54 -04002380 if (png_icc_check_length(png_ptr, colorspace, name, profile_length) != 0 &&
2381 png_icc_check_header(png_ptr, colorspace, name, profile_length, profile,
2382 color_type) != 0 &&
2383 png_icc_check_tag_table(png_ptr, colorspace, name, profile_length,
2384 profile) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07002385 {
2386# ifdef PNG_sRGB_SUPPORTED
2387 /* If no sRGB support, don't try storing sRGB information */
2388 png_icc_set_sRGB(png_ptr, colorspace, profile, 0);
2389# endif
2390 return 1;
2391 }
2392
2393 /* Failure case */
2394 return 0;
2395}
2396#endif /* iCCP */
2397
2398#ifdef PNG_READ_RGB_TO_GRAY_SUPPORTED
2399void /* PRIVATE */
2400png_colorspace_set_rgb_coefficients(png_structrp png_ptr)
2401{
2402 /* Set the rgb_to_gray coefficients from the colorspace. */
Matt Sarett96be9082016-05-03 13:29:54 -04002403 if (png_ptr->rgb_to_gray_coefficients_set == 0 &&
Chris Craikb50c2172013-07-29 15:28:30 -07002404 (png_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_ENDPOINTS) != 0)
2405 {
2406 /* png_set_background has not been called, get the coefficients from the Y
2407 * values of the colorspace colorants.
2408 */
2409 png_fixed_point r = png_ptr->colorspace.end_points_XYZ.red_Y;
2410 png_fixed_point g = png_ptr->colorspace.end_points_XYZ.green_Y;
2411 png_fixed_point b = png_ptr->colorspace.end_points_XYZ.blue_Y;
2412 png_fixed_point total = r+g+b;
2413
2414 if (total > 0 &&
2415 r >= 0 && png_muldiv(&r, r, 32768, total) && r >= 0 && r <= 32768 &&
2416 g >= 0 && png_muldiv(&g, g, 32768, total) && g >= 0 && g <= 32768 &&
2417 b >= 0 && png_muldiv(&b, b, 32768, total) && b >= 0 && b <= 32768 &&
2418 r+g+b <= 32769)
2419 {
2420 /* We allow 0 coefficients here. r+g+b may be 32769 if two or
2421 * all of the coefficients were rounded up. Handle this by
2422 * reducing the *largest* coefficient by 1; this matches the
2423 * approach used for the default coefficients in pngrtran.c
2424 */
2425 int add = 0;
2426
2427 if (r+g+b > 32768)
2428 add = -1;
2429 else if (r+g+b < 32768)
2430 add = 1;
2431
2432 if (add != 0)
2433 {
2434 if (g >= r && g >= b)
2435 g += add;
2436 else if (r >= g && r >= b)
2437 r += add;
2438 else
2439 b += add;
2440 }
2441
2442 /* Check for an internal error. */
2443 if (r+g+b != 32768)
2444 png_error(png_ptr,
2445 "internal error handling cHRM coefficients");
2446
2447 else
2448 {
2449 png_ptr->rgb_to_gray_red_coeff = (png_uint_16)r;
2450 png_ptr->rgb_to_gray_green_coeff = (png_uint_16)g;
2451 }
2452 }
2453
2454 /* This is a png_error at present even though it could be ignored -
2455 * it should never happen, but it is important that if it does, the
2456 * bug is fixed.
2457 */
2458 else
2459 png_error(png_ptr, "internal error handling cHRM->XYZ");
2460 }
2461}
Matt Sarett96be9082016-05-03 13:29:54 -04002462#endif /* READ_RGB_TO_GRAY */
Chris Craikb50c2172013-07-29 15:28:30 -07002463
2464#endif /* COLORSPACE */
Patrick Scott5f6bd842010-06-28 16:55:16 -04002465
Narayan Kamath7d659e42015-02-25 14:33:29 +00002466#ifdef __GNUC__
2467/* This exists solely to work round a warning from GNU C. */
2468static int /* PRIVATE */
2469png_gt(size_t a, size_t b)
2470{
2471 return a > b;
2472}
2473#else
2474# define png_gt(a,b) ((a) > (b))
2475#endif
2476
Patrick Scott5f6bd842010-06-28 16:55:16 -04002477void /* PRIVATE */
Chris Craikb50c2172013-07-29 15:28:30 -07002478png_check_IHDR(png_const_structrp png_ptr,
Patrick Scott5f6bd842010-06-28 16:55:16 -04002479 png_uint_32 width, png_uint_32 height, int bit_depth,
2480 int color_type, int interlace_type, int compression_type,
2481 int filter_type)
2482{
2483 int error = 0;
2484
2485 /* Check for width and height valid values */
2486 if (width == 0)
2487 {
2488 png_warning(png_ptr, "Image width is zero in IHDR");
2489 error = 1;
2490 }
Matt Sarett96be9082016-05-03 13:29:54 -04002491
2492 if (width > PNG_UINT_31_MAX)
Narayan Kamath7d659e42015-02-25 14:33:29 +00002493 {
2494 png_warning(png_ptr, "Invalid image width in IHDR");
2495 error = 1;
2496 }
2497
Matt Sarett96be9082016-05-03 13:29:54 -04002498 if (png_gt(((width + 7) & (~7)),
2499 ((PNG_SIZE_MAX
2500 - 48 /* big_row_buf hack */
2501 - 1) /* filter byte */
2502 / 8) /* 8-byte RGBA pixels */
2503 - 1)) /* extra max_pixel_depth pad */
Narayan Kamath7d659e42015-02-25 14:33:29 +00002504 {
2505 /* The size of the row must be within the limits of this architecture.
2506 * Because the read code can perform arbitrary transformations the
2507 * maximum size is checked here. Because the code in png_read_start_row
2508 * adds extra space "for safety's sake" in several places a conservative
2509 * limit is used here.
2510 *
2511 * NOTE: it would be far better to check the size that is actually used,
2512 * but the effect in the real world is minor and the changes are more
2513 * extensive, therefore much more dangerous and much more difficult to
2514 * write in a way that avoids compiler warnings.
2515 */
Matt Sarett96be9082016-05-03 13:29:54 -04002516 png_warning(png_ptr, "Image width is too large for this architecture");
2517 error = 1;
Narayan Kamath7d659e42015-02-25 14:33:29 +00002518 }
2519
Matt Sarett96be9082016-05-03 13:29:54 -04002520#ifdef PNG_SET_USER_LIMITS_SUPPORTED
2521 if (width > png_ptr->user_width_max)
2522#else
2523 if (width > PNG_USER_WIDTH_MAX)
2524#endif
Narayan Kamath7d659e42015-02-25 14:33:29 +00002525 {
2526 png_warning(png_ptr, "Image width exceeds user limit in IHDR");
2527 error = 1;
2528 }
Patrick Scott5f6bd842010-06-28 16:55:16 -04002529
2530 if (height == 0)
2531 {
2532 png_warning(png_ptr, "Image height is zero in IHDR");
2533 error = 1;
2534 }
2535
Chris Craikb50c2172013-07-29 15:28:30 -07002536 if (height > PNG_UINT_31_MAX)
Patrick Scott5f6bd842010-06-28 16:55:16 -04002537 {
2538 png_warning(png_ptr, "Invalid image height in IHDR");
2539 error = 1;
2540 }
2541
Matt Sarett96be9082016-05-03 13:29:54 -04002542#ifdef PNG_SET_USER_LIMITS_SUPPORTED
2543 if (height > png_ptr->user_height_max)
2544#else
2545 if (height > PNG_USER_HEIGHT_MAX)
2546#endif
2547 {
2548 png_warning(png_ptr, "Image height exceeds user limit in IHDR");
2549 error = 1;
2550 }
2551
Patrick Scott5f6bd842010-06-28 16:55:16 -04002552 /* Check other values */
2553 if (bit_depth != 1 && bit_depth != 2 && bit_depth != 4 &&
2554 bit_depth != 8 && bit_depth != 16)
2555 {
2556 png_warning(png_ptr, "Invalid bit depth in IHDR");
2557 error = 1;
2558 }
2559
2560 if (color_type < 0 || color_type == 1 ||
2561 color_type == 5 || color_type > 6)
2562 {
2563 png_warning(png_ptr, "Invalid color type in IHDR");
2564 error = 1;
2565 }
2566
2567 if (((color_type == PNG_COLOR_TYPE_PALETTE) && bit_depth > 8) ||
2568 ((color_type == PNG_COLOR_TYPE_RGB ||
2569 color_type == PNG_COLOR_TYPE_GRAY_ALPHA ||
2570 color_type == PNG_COLOR_TYPE_RGB_ALPHA) && bit_depth < 8))
2571 {
2572 png_warning(png_ptr, "Invalid color type/bit depth combination in IHDR");
2573 error = 1;
2574 }
2575
2576 if (interlace_type >= PNG_INTERLACE_LAST)
2577 {
2578 png_warning(png_ptr, "Unknown interlace method in IHDR");
2579 error = 1;
2580 }
2581
2582 if (compression_type != PNG_COMPRESSION_TYPE_BASE)
2583 {
2584 png_warning(png_ptr, "Unknown compression method in IHDR");
2585 error = 1;
2586 }
2587
Matt Sarett96be9082016-05-03 13:29:54 -04002588#ifdef PNG_MNG_FEATURES_SUPPORTED
Patrick Scott5f6bd842010-06-28 16:55:16 -04002589 /* Accept filter_method 64 (intrapixel differencing) only if
2590 * 1. Libpng was compiled with PNG_MNG_FEATURES_SUPPORTED and
2591 * 2. Libpng did not read a PNG signature (this filter_method is only
2592 * used in PNG datastreams that are embedded in MNG datastreams) and
2593 * 3. The application called png_permit_mng_features with a mask that
2594 * included PNG_FLAG_MNG_FILTER_64 and
2595 * 4. The filter_method is 64 and
2596 * 5. The color_type is RGB or RGBA
2597 */
Matt Sarett96be9082016-05-03 13:29:54 -04002598 if ((png_ptr->mode & PNG_HAVE_PNG_SIGNATURE) != 0 &&
2599 png_ptr->mng_features_permitted != 0)
Patrick Scott5f6bd842010-06-28 16:55:16 -04002600 png_warning(png_ptr, "MNG features are not allowed in a PNG datastream");
2601
2602 if (filter_type != PNG_FILTER_TYPE_BASE)
2603 {
Matt Sarett96be9082016-05-03 13:29:54 -04002604 if (!((png_ptr->mng_features_permitted & PNG_FLAG_MNG_FILTER_64) != 0 &&
Chris Craikb50c2172013-07-29 15:28:30 -07002605 (filter_type == PNG_INTRAPIXEL_DIFFERENCING) &&
2606 ((png_ptr->mode & PNG_HAVE_PNG_SIGNATURE) == 0) &&
2607 (color_type == PNG_COLOR_TYPE_RGB ||
2608 color_type == PNG_COLOR_TYPE_RGB_ALPHA)))
Patrick Scott5f6bd842010-06-28 16:55:16 -04002609 {
2610 png_warning(png_ptr, "Unknown filter method in IHDR");
2611 error = 1;
2612 }
2613
Matt Sarett96be9082016-05-03 13:29:54 -04002614 if ((png_ptr->mode & PNG_HAVE_PNG_SIGNATURE) != 0)
Patrick Scott5f6bd842010-06-28 16:55:16 -04002615 {
2616 png_warning(png_ptr, "Invalid filter method in IHDR");
2617 error = 1;
2618 }
2619 }
2620
Matt Sarett96be9082016-05-03 13:29:54 -04002621#else
Patrick Scott5f6bd842010-06-28 16:55:16 -04002622 if (filter_type != PNG_FILTER_TYPE_BASE)
2623 {
2624 png_warning(png_ptr, "Unknown filter method in IHDR");
2625 error = 1;
2626 }
Matt Sarett96be9082016-05-03 13:29:54 -04002627#endif
Patrick Scott5f6bd842010-06-28 16:55:16 -04002628
2629 if (error == 1)
2630 png_error(png_ptr, "Invalid IHDR data");
2631}
Chris Craikb50c2172013-07-29 15:28:30 -07002632
2633#if defined(PNG_sCAL_SUPPORTED) || defined(PNG_pCAL_SUPPORTED)
2634/* ASCII to fp functions */
2635/* Check an ASCII formated floating point value, see the more detailed
2636 * comments in pngpriv.h
2637 */
2638/* The following is used internally to preserve the sticky flags */
2639#define png_fp_add(state, flags) ((state) |= (flags))
2640#define png_fp_set(state, value) ((state) = (value) | ((state) & PNG_FP_STICKY))
2641
2642int /* PRIVATE */
2643png_check_fp_number(png_const_charp string, png_size_t size, int *statep,
2644 png_size_tp whereami)
2645{
2646 int state = *statep;
2647 png_size_t i = *whereami;
2648
2649 while (i < size)
2650 {
2651 int type;
2652 /* First find the type of the next character */
2653 switch (string[i])
2654 {
2655 case 43: type = PNG_FP_SAW_SIGN; break;
2656 case 45: type = PNG_FP_SAW_SIGN + PNG_FP_NEGATIVE; break;
2657 case 46: type = PNG_FP_SAW_DOT; break;
2658 case 48: type = PNG_FP_SAW_DIGIT; break;
2659 case 49: case 50: case 51: case 52:
2660 case 53: case 54: case 55: case 56:
2661 case 57: type = PNG_FP_SAW_DIGIT + PNG_FP_NONZERO; break;
2662 case 69:
2663 case 101: type = PNG_FP_SAW_E; break;
2664 default: goto PNG_FP_End;
2665 }
2666
2667 /* Now deal with this type according to the current
2668 * state, the type is arranged to not overlap the
2669 * bits of the PNG_FP_STATE.
2670 */
2671 switch ((state & PNG_FP_STATE) + (type & PNG_FP_SAW_ANY))
2672 {
2673 case PNG_FP_INTEGER + PNG_FP_SAW_SIGN:
Matt Sarett96be9082016-05-03 13:29:54 -04002674 if ((state & PNG_FP_SAW_ANY) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07002675 goto PNG_FP_End; /* not a part of the number */
2676
2677 png_fp_add(state, type);
2678 break;
2679
2680 case PNG_FP_INTEGER + PNG_FP_SAW_DOT:
2681 /* Ok as trailer, ok as lead of fraction. */
Matt Sarett96be9082016-05-03 13:29:54 -04002682 if ((state & PNG_FP_SAW_DOT) != 0) /* two dots */
Chris Craikb50c2172013-07-29 15:28:30 -07002683 goto PNG_FP_End;
2684
Matt Sarett96be9082016-05-03 13:29:54 -04002685 else if ((state & PNG_FP_SAW_DIGIT) != 0) /* trailing dot? */
Chris Craikb50c2172013-07-29 15:28:30 -07002686 png_fp_add(state, type);
2687
2688 else
2689 png_fp_set(state, PNG_FP_FRACTION | type);
2690
2691 break;
2692
2693 case PNG_FP_INTEGER + PNG_FP_SAW_DIGIT:
Matt Sarett96be9082016-05-03 13:29:54 -04002694 if ((state & PNG_FP_SAW_DOT) != 0) /* delayed fraction */
Chris Craikb50c2172013-07-29 15:28:30 -07002695 png_fp_set(state, PNG_FP_FRACTION | PNG_FP_SAW_DOT);
2696
2697 png_fp_add(state, type | PNG_FP_WAS_VALID);
2698
2699 break;
2700
2701 case PNG_FP_INTEGER + PNG_FP_SAW_E:
2702 if ((state & PNG_FP_SAW_DIGIT) == 0)
2703 goto PNG_FP_End;
2704
2705 png_fp_set(state, PNG_FP_EXPONENT);
2706
2707 break;
2708
2709 /* case PNG_FP_FRACTION + PNG_FP_SAW_SIGN:
2710 goto PNG_FP_End; ** no sign in fraction */
2711
2712 /* case PNG_FP_FRACTION + PNG_FP_SAW_DOT:
2713 goto PNG_FP_End; ** Because SAW_DOT is always set */
2714
2715 case PNG_FP_FRACTION + PNG_FP_SAW_DIGIT:
2716 png_fp_add(state, type | PNG_FP_WAS_VALID);
2717 break;
2718
2719 case PNG_FP_FRACTION + PNG_FP_SAW_E:
2720 /* This is correct because the trailing '.' on an
2721 * integer is handled above - so we can only get here
2722 * with the sequence ".E" (with no preceding digits).
2723 */
2724 if ((state & PNG_FP_SAW_DIGIT) == 0)
2725 goto PNG_FP_End;
2726
2727 png_fp_set(state, PNG_FP_EXPONENT);
2728
2729 break;
2730
2731 case PNG_FP_EXPONENT + PNG_FP_SAW_SIGN:
Matt Sarett96be9082016-05-03 13:29:54 -04002732 if ((state & PNG_FP_SAW_ANY) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07002733 goto PNG_FP_End; /* not a part of the number */
2734
2735 png_fp_add(state, PNG_FP_SAW_SIGN);
2736
2737 break;
2738
2739 /* case PNG_FP_EXPONENT + PNG_FP_SAW_DOT:
2740 goto PNG_FP_End; */
2741
2742 case PNG_FP_EXPONENT + PNG_FP_SAW_DIGIT:
2743 png_fp_add(state, PNG_FP_SAW_DIGIT | PNG_FP_WAS_VALID);
2744
2745 break;
2746
2747 /* case PNG_FP_EXPONEXT + PNG_FP_SAW_E:
2748 goto PNG_FP_End; */
2749
2750 default: goto PNG_FP_End; /* I.e. break 2 */
2751 }
2752
2753 /* The character seems ok, continue. */
2754 ++i;
2755 }
2756
2757PNG_FP_End:
2758 /* Here at the end, update the state and return the correct
2759 * return code.
2760 */
2761 *statep = state;
2762 *whereami = i;
2763
2764 return (state & PNG_FP_SAW_DIGIT) != 0;
2765}
2766
2767
2768/* The same but for a complete string. */
2769int
2770png_check_fp_string(png_const_charp string, png_size_t size)
2771{
2772 int state=0;
2773 png_size_t char_index=0;
2774
Matt Sarett96be9082016-05-03 13:29:54 -04002775 if (png_check_fp_number(string, size, &state, &char_index) != 0 &&
Chris Craikb50c2172013-07-29 15:28:30 -07002776 (char_index == size || string[char_index] == 0))
2777 return state /* must be non-zero - see above */;
2778
2779 return 0; /* i.e. fail */
2780}
Matt Sarett96be9082016-05-03 13:29:54 -04002781#endif /* pCAL || sCAL */
Chris Craikb50c2172013-07-29 15:28:30 -07002782
2783#ifdef PNG_sCAL_SUPPORTED
2784# ifdef PNG_FLOATING_POINT_SUPPORTED
2785/* Utility used below - a simple accurate power of ten from an integral
2786 * exponent.
2787 */
2788static double
2789png_pow10(int power)
2790{
2791 int recip = 0;
2792 double d = 1;
2793
2794 /* Handle negative exponent with a reciprocal at the end because
2795 * 10 is exact whereas .1 is inexact in base 2
2796 */
2797 if (power < 0)
2798 {
2799 if (power < DBL_MIN_10_EXP) return 0;
2800 recip = 1, power = -power;
2801 }
2802
2803 if (power > 0)
2804 {
2805 /* Decompose power bitwise. */
2806 double mult = 10;
2807 do
2808 {
2809 if (power & 1) d *= mult;
2810 mult *= mult;
2811 power >>= 1;
2812 }
2813 while (power > 0);
2814
Matt Sarett96be9082016-05-03 13:29:54 -04002815 if (recip != 0) d = 1/d;
Chris Craikb50c2172013-07-29 15:28:30 -07002816 }
2817 /* else power is 0 and d is 1 */
2818
2819 return d;
2820}
2821
2822/* Function to format a floating point value in ASCII with a given
2823 * precision.
2824 */
2825void /* PRIVATE */
2826png_ascii_from_fp(png_const_structrp png_ptr, png_charp ascii, png_size_t size,
2827 double fp, unsigned int precision)
2828{
2829 /* We use standard functions from math.h, but not printf because
2830 * that would require stdio. The caller must supply a buffer of
2831 * sufficient size or we will png_error. The tests on size and
2832 * the space in ascii[] consumed are indicated below.
2833 */
2834 if (precision < 1)
2835 precision = DBL_DIG;
2836
2837 /* Enforce the limit of the implementation precision too. */
2838 if (precision > DBL_DIG+1)
2839 precision = DBL_DIG+1;
2840
2841 /* Basic sanity checks */
2842 if (size >= precision+5) /* See the requirements below. */
2843 {
2844 if (fp < 0)
2845 {
2846 fp = -fp;
2847 *ascii++ = 45; /* '-' PLUS 1 TOTAL 1 */
2848 --size;
2849 }
2850
2851 if (fp >= DBL_MIN && fp <= DBL_MAX)
2852 {
Matt Sarett96be9082016-05-03 13:29:54 -04002853 int exp_b10; /* A base 10 exponent */
Chris Craikb50c2172013-07-29 15:28:30 -07002854 double base; /* 10^exp_b10 */
2855
2856 /* First extract a base 10 exponent of the number,
2857 * the calculation below rounds down when converting
2858 * from base 2 to base 10 (multiply by log10(2) -
2859 * 0.3010, but 77/256 is 0.3008, so exp_b10 needs to
2860 * be increased. Note that the arithmetic shift
2861 * performs a floor() unlike C arithmetic - using a
2862 * C multiply would break the following for negative
2863 * exponents.
2864 */
2865 (void)frexp(fp, &exp_b10); /* exponent to base 2 */
2866
2867 exp_b10 = (exp_b10 * 77) >> 8; /* <= exponent to base 10 */
2868
2869 /* Avoid underflow here. */
2870 base = png_pow10(exp_b10); /* May underflow */
2871
2872 while (base < DBL_MIN || base < fp)
2873 {
2874 /* And this may overflow. */
2875 double test = png_pow10(exp_b10+1);
2876
2877 if (test <= DBL_MAX)
2878 ++exp_b10, base = test;
2879
2880 else
2881 break;
2882 }
2883
2884 /* Normalize fp and correct exp_b10, after this fp is in the
2885 * range [.1,1) and exp_b10 is both the exponent and the digit
2886 * *before* which the decimal point should be inserted
2887 * (starting with 0 for the first digit). Note that this
2888 * works even if 10^exp_b10 is out of range because of the
2889 * test on DBL_MAX above.
2890 */
2891 fp /= base;
2892 while (fp >= 1) fp /= 10, ++exp_b10;
2893
2894 /* Because of the code above fp may, at this point, be
2895 * less than .1, this is ok because the code below can
2896 * handle the leading zeros this generates, so no attempt
2897 * is made to correct that here.
2898 */
2899
2900 {
Matt Sarett96be9082016-05-03 13:29:54 -04002901 unsigned int czero, clead, cdigits;
Chris Craikb50c2172013-07-29 15:28:30 -07002902 char exponent[10];
2903
2904 /* Allow up to two leading zeros - this will not lengthen
2905 * the number compared to using E-n.
2906 */
2907 if (exp_b10 < 0 && exp_b10 > -3) /* PLUS 3 TOTAL 4 */
2908 {
2909 czero = -exp_b10; /* PLUS 2 digits: TOTAL 3 */
2910 exp_b10 = 0; /* Dot added below before first output. */
2911 }
2912 else
2913 czero = 0; /* No zeros to add */
2914
2915 /* Generate the digit list, stripping trailing zeros and
2916 * inserting a '.' before a digit if the exponent is 0.
2917 */
2918 clead = czero; /* Count of leading zeros */
2919 cdigits = 0; /* Count of digits in list. */
2920
2921 do
2922 {
2923 double d;
2924
2925 fp *= 10;
2926 /* Use modf here, not floor and subtract, so that
2927 * the separation is done in one step. At the end
2928 * of the loop don't break the number into parts so
2929 * that the final digit is rounded.
2930 */
Matt Sarett96be9082016-05-03 13:29:54 -04002931 if (cdigits+czero+1 < precision+clead)
Chris Craikb50c2172013-07-29 15:28:30 -07002932 fp = modf(fp, &d);
2933
2934 else
2935 {
2936 d = floor(fp + .5);
2937
2938 if (d > 9)
2939 {
2940 /* Rounding up to 10, handle that here. */
2941 if (czero > 0)
2942 {
2943 --czero, d = 1;
2944 if (cdigits == 0) --clead;
2945 }
2946 else
2947 {
2948 while (cdigits > 0 && d > 9)
2949 {
2950 int ch = *--ascii;
2951
2952 if (exp_b10 != (-1))
2953 ++exp_b10;
2954
2955 else if (ch == 46)
2956 {
2957 ch = *--ascii, ++size;
2958 /* Advance exp_b10 to '1', so that the
2959 * decimal point happens after the
2960 * previous digit.
2961 */
2962 exp_b10 = 1;
2963 }
2964
2965 --cdigits;
2966 d = ch - 47; /* I.e. 1+(ch-48) */
2967 }
2968
2969 /* Did we reach the beginning? If so adjust the
2970 * exponent but take into account the leading
2971 * decimal point.
2972 */
2973 if (d > 9) /* cdigits == 0 */
2974 {
2975 if (exp_b10 == (-1))
2976 {
2977 /* Leading decimal point (plus zeros?), if
2978 * we lose the decimal point here it must
2979 * be reentered below.
2980 */
2981 int ch = *--ascii;
2982
2983 if (ch == 46)
2984 ++size, exp_b10 = 1;
2985
2986 /* Else lost a leading zero, so 'exp_b10' is
2987 * still ok at (-1)
2988 */
2989 }
2990 else
2991 ++exp_b10;
2992
2993 /* In all cases we output a '1' */
2994 d = 1;
2995 }
2996 }
2997 }
2998 fp = 0; /* Guarantees termination below. */
2999 }
3000
3001 if (d == 0)
3002 {
3003 ++czero;
3004 if (cdigits == 0) ++clead;
3005 }
3006 else
3007 {
3008 /* Included embedded zeros in the digit count. */
3009 cdigits += czero - clead;
3010 clead = 0;
3011
3012 while (czero > 0)
3013 {
3014 /* exp_b10 == (-1) means we just output the decimal
3015 * place - after the DP don't adjust 'exp_b10' any
3016 * more!
3017 */
3018 if (exp_b10 != (-1))
3019 {
3020 if (exp_b10 == 0) *ascii++ = 46, --size;
3021 /* PLUS 1: TOTAL 4 */
3022 --exp_b10;
3023 }
3024 *ascii++ = 48, --czero;
3025 }
3026
3027 if (exp_b10 != (-1))
3028 {
Matt Sarett96be9082016-05-03 13:29:54 -04003029 if (exp_b10 == 0)
3030 *ascii++ = 46, --size; /* counted above */
3031
Chris Craikb50c2172013-07-29 15:28:30 -07003032 --exp_b10;
3033 }
3034 *ascii++ = (char)(48 + (int)d), ++cdigits;
3035 }
3036 }
Matt Sarett96be9082016-05-03 13:29:54 -04003037 while (cdigits+czero < precision+clead && fp > DBL_MIN);
Chris Craikb50c2172013-07-29 15:28:30 -07003038
3039 /* The total output count (max) is now 4+precision */
3040
3041 /* Check for an exponent, if we don't need one we are
3042 * done and just need to terminate the string. At
3043 * this point exp_b10==(-1) is effectively if flag - it got
Matt Sarett96be9082016-05-03 13:29:54 -04003044 * to '-1' because of the decrement after outputting
Chris Craikb50c2172013-07-29 15:28:30 -07003045 * the decimal point above (the exponent required is
3046 * *not* -1!)
3047 */
3048 if (exp_b10 >= (-1) && exp_b10 <= 2)
3049 {
3050 /* The following only happens if we didn't output the
3051 * leading zeros above for negative exponent, so this
Matt Sarett96be9082016-05-03 13:29:54 -04003052 * doesn't add to the digit requirement. Note that the
Chris Craikb50c2172013-07-29 15:28:30 -07003053 * two zeros here can only be output if the two leading
3054 * zeros were *not* output, so this doesn't increase
3055 * the output count.
3056 */
3057 while (--exp_b10 >= 0) *ascii++ = 48;
3058
3059 *ascii = 0;
3060
3061 /* Total buffer requirement (including the '\0') is
3062 * 5+precision - see check at the start.
3063 */
3064 return;
3065 }
3066
3067 /* Here if an exponent is required, adjust size for
3068 * the digits we output but did not count. The total
3069 * digit output here so far is at most 1+precision - no
3070 * decimal point and no leading or trailing zeros have
3071 * been output.
3072 */
3073 size -= cdigits;
3074
3075 *ascii++ = 69, --size; /* 'E': PLUS 1 TOTAL 2+precision */
3076
3077 /* The following use of an unsigned temporary avoids ambiguities in
3078 * the signed arithmetic on exp_b10 and permits GCC at least to do
3079 * better optimization.
3080 */
3081 {
3082 unsigned int uexp_b10;
3083
3084 if (exp_b10 < 0)
3085 {
3086 *ascii++ = 45, --size; /* '-': PLUS 1 TOTAL 3+precision */
3087 uexp_b10 = -exp_b10;
3088 }
3089
3090 else
3091 uexp_b10 = exp_b10;
3092
3093 cdigits = 0;
3094
3095 while (uexp_b10 > 0)
3096 {
3097 exponent[cdigits++] = (char)(48 + uexp_b10 % 10);
3098 uexp_b10 /= 10;
3099 }
3100 }
3101
3102 /* Need another size check here for the exponent digits, so
3103 * this need not be considered above.
3104 */
Matt Sarett96be9082016-05-03 13:29:54 -04003105 if (size > cdigits)
Chris Craikb50c2172013-07-29 15:28:30 -07003106 {
3107 while (cdigits > 0) *ascii++ = exponent[--cdigits];
3108
3109 *ascii = 0;
3110
3111 return;
3112 }
3113 }
3114 }
3115 else if (!(fp >= DBL_MIN))
3116 {
3117 *ascii++ = 48; /* '0' */
3118 *ascii = 0;
3119 return;
3120 }
3121 else
3122 {
3123 *ascii++ = 105; /* 'i' */
3124 *ascii++ = 110; /* 'n' */
3125 *ascii++ = 102; /* 'f' */
3126 *ascii = 0;
3127 return;
3128 }
3129 }
3130
3131 /* Here on buffer too small. */
3132 png_error(png_ptr, "ASCII conversion buffer too small");
3133}
3134
3135# endif /* FLOATING_POINT */
3136
3137# ifdef PNG_FIXED_POINT_SUPPORTED
3138/* Function to format a fixed point value in ASCII.
3139 */
3140void /* PRIVATE */
3141png_ascii_from_fixed(png_const_structrp png_ptr, png_charp ascii,
3142 png_size_t size, png_fixed_point fp)
3143{
3144 /* Require space for 10 decimal digits, a decimal point, a minus sign and a
3145 * trailing \0, 13 characters:
3146 */
3147 if (size > 12)
3148 {
3149 png_uint_32 num;
3150
3151 /* Avoid overflow here on the minimum integer. */
3152 if (fp < 0)
Matt Sarett96be9082016-05-03 13:29:54 -04003153 *ascii++ = 45, num = -fp;
Chris Craikb50c2172013-07-29 15:28:30 -07003154 else
3155 num = fp;
3156
3157 if (num <= 0x80000000) /* else overflowed */
3158 {
3159 unsigned int ndigits = 0, first = 16 /* flag value */;
3160 char digits[10];
3161
3162 while (num)
3163 {
3164 /* Split the low digit off num: */
3165 unsigned int tmp = num/10;
3166 num -= tmp*10;
3167 digits[ndigits++] = (char)(48 + num);
3168 /* Record the first non-zero digit, note that this is a number
3169 * starting at 1, it's not actually the array index.
3170 */
3171 if (first == 16 && num > 0)
3172 first = ndigits;
3173 num = tmp;
3174 }
3175
3176 if (ndigits > 0)
3177 {
3178 while (ndigits > 5) *ascii++ = digits[--ndigits];
3179 /* The remaining digits are fractional digits, ndigits is '5' or
3180 * smaller at this point. It is certainly not zero. Check for a
3181 * non-zero fractional digit:
3182 */
3183 if (first <= 5)
3184 {
3185 unsigned int i;
3186 *ascii++ = 46; /* decimal point */
3187 /* ndigits may be <5 for small numbers, output leading zeros
3188 * then ndigits digits to first:
3189 */
3190 i = 5;
3191 while (ndigits < i) *ascii++ = 48, --i;
3192 while (ndigits >= first) *ascii++ = digits[--ndigits];
3193 /* Don't output the trailing zeros! */
3194 }
3195 }
3196 else
3197 *ascii++ = 48;
3198
3199 /* And null terminate the string: */
3200 *ascii = 0;
3201 return;
3202 }
3203 }
3204
3205 /* Here on buffer too small. */
3206 png_error(png_ptr, "ASCII conversion buffer too small");
3207}
3208# endif /* FIXED_POINT */
Matt Sarett96be9082016-05-03 13:29:54 -04003209#endif /* SCAL */
Chris Craikb50c2172013-07-29 15:28:30 -07003210
3211#if defined(PNG_FLOATING_POINT_SUPPORTED) && \
3212 !defined(PNG_FIXED_POINT_MACRO_SUPPORTED) && \
3213 (defined(PNG_gAMA_SUPPORTED) || defined(PNG_cHRM_SUPPORTED) || \
3214 defined(PNG_sCAL_SUPPORTED) || defined(PNG_READ_BACKGROUND_SUPPORTED) || \
3215 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)) || \
3216 (defined(PNG_sCAL_SUPPORTED) && \
3217 defined(PNG_FLOATING_ARITHMETIC_SUPPORTED))
3218png_fixed_point
3219png_fixed(png_const_structrp png_ptr, double fp, png_const_charp text)
3220{
3221 double r = floor(100000 * fp + .5);
3222
3223 if (r > 2147483647. || r < -2147483648.)
3224 png_fixed_error(png_ptr, text);
3225
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303226# ifndef PNG_ERROR_TEXT_SUPPORTED
Matt Sarett96be9082016-05-03 13:29:54 -04003227 PNG_UNUSED(text)
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303228# endif
3229
Chris Craikb50c2172013-07-29 15:28:30 -07003230 return (png_fixed_point)r;
3231}
3232#endif
3233
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303234#if defined(PNG_GAMMA_SUPPORTED) || defined(PNG_COLORSPACE_SUPPORTED) ||\
Chris Craikb50c2172013-07-29 15:28:30 -07003235 defined(PNG_INCH_CONVERSIONS_SUPPORTED) || defined(PNG_READ_pHYs_SUPPORTED)
3236/* muldiv functions */
3237/* This API takes signed arguments and rounds the result to the nearest
3238 * integer (or, for a fixed point number - the standard argument - to
3239 * the nearest .00001). Overflow and divide by zero are signalled in
3240 * the result, a boolean - true on success, false on overflow.
3241 */
3242int
3243png_muldiv(png_fixed_point_p res, png_fixed_point a, png_int_32 times,
3244 png_int_32 divisor)
3245{
3246 /* Return a * times / divisor, rounded. */
3247 if (divisor != 0)
3248 {
3249 if (a == 0 || times == 0)
3250 {
3251 *res = 0;
3252 return 1;
3253 }
3254 else
3255 {
3256#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3257 double r = a;
3258 r *= times;
3259 r /= divisor;
3260 r = floor(r+.5);
3261
3262 /* A png_fixed_point is a 32-bit integer. */
3263 if (r <= 2147483647. && r >= -2147483648.)
3264 {
3265 *res = (png_fixed_point)r;
3266 return 1;
3267 }
3268#else
3269 int negative = 0;
3270 png_uint_32 A, T, D;
3271 png_uint_32 s16, s32, s00;
3272
3273 if (a < 0)
3274 negative = 1, A = -a;
3275 else
3276 A = a;
3277
3278 if (times < 0)
3279 negative = !negative, T = -times;
3280 else
3281 T = times;
3282
3283 if (divisor < 0)
3284 negative = !negative, D = -divisor;
3285 else
3286 D = divisor;
3287
3288 /* Following can't overflow because the arguments only
3289 * have 31 bits each, however the result may be 32 bits.
3290 */
3291 s16 = (A >> 16) * (T & 0xffff) +
3292 (A & 0xffff) * (T >> 16);
3293 /* Can't overflow because the a*times bit is only 30
3294 * bits at most.
3295 */
3296 s32 = (A >> 16) * (T >> 16) + (s16 >> 16);
3297 s00 = (A & 0xffff) * (T & 0xffff);
3298
3299 s16 = (s16 & 0xffff) << 16;
3300 s00 += s16;
3301
3302 if (s00 < s16)
3303 ++s32; /* carry */
3304
3305 if (s32 < D) /* else overflow */
3306 {
3307 /* s32.s00 is now the 64-bit product, do a standard
3308 * division, we know that s32 < D, so the maximum
3309 * required shift is 31.
3310 */
3311 int bitshift = 32;
3312 png_fixed_point result = 0; /* NOTE: signed */
3313
3314 while (--bitshift >= 0)
3315 {
3316 png_uint_32 d32, d00;
3317
3318 if (bitshift > 0)
3319 d32 = D >> (32-bitshift), d00 = D << bitshift;
3320
3321 else
3322 d32 = 0, d00 = D;
3323
3324 if (s32 > d32)
3325 {
3326 if (s00 < d00) --s32; /* carry */
3327 s32 -= d32, s00 -= d00, result += 1<<bitshift;
3328 }
3329
3330 else
3331 if (s32 == d32 && s00 >= d00)
3332 s32 = 0, s00 -= d00, result += 1<<bitshift;
3333 }
3334
3335 /* Handle the rounding. */
3336 if (s00 >= (D >> 1))
3337 ++result;
3338
Matt Sarett96be9082016-05-03 13:29:54 -04003339 if (negative != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07003340 result = -result;
3341
3342 /* Check for overflow. */
Matt Sarett96be9082016-05-03 13:29:54 -04003343 if ((negative != 0 && result <= 0) ||
3344 (negative == 0 && result >= 0))
Chris Craikb50c2172013-07-29 15:28:30 -07003345 {
3346 *res = result;
3347 return 1;
3348 }
3349 }
3350#endif
3351 }
3352 }
3353
3354 return 0;
3355}
3356#endif /* READ_GAMMA || INCH_CONVERSIONS */
3357
3358#if defined(PNG_READ_GAMMA_SUPPORTED) || defined(PNG_INCH_CONVERSIONS_SUPPORTED)
3359/* The following is for when the caller doesn't much care about the
3360 * result.
3361 */
3362png_fixed_point
3363png_muldiv_warn(png_const_structrp png_ptr, png_fixed_point a, png_int_32 times,
3364 png_int_32 divisor)
3365{
3366 png_fixed_point result;
3367
Matt Sarett96be9082016-05-03 13:29:54 -04003368 if (png_muldiv(&result, a, times, divisor) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07003369 return result;
3370
3371 png_warning(png_ptr, "fixed point overflow ignored");
3372 return 0;
3373}
3374#endif
3375
3376#ifdef PNG_GAMMA_SUPPORTED /* more fixed point functions for gamma */
3377/* Calculate a reciprocal, return 0 on div-by-zero or overflow. */
3378png_fixed_point
3379png_reciprocal(png_fixed_point a)
3380{
3381#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3382 double r = floor(1E10/a+.5);
3383
3384 if (r <= 2147483647. && r >= -2147483648.)
3385 return (png_fixed_point)r;
3386#else
3387 png_fixed_point res;
3388
Matt Sarett96be9082016-05-03 13:29:54 -04003389 if (png_muldiv(&res, 100000, 100000, a) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07003390 return res;
3391#endif
3392
3393 return 0; /* error/overflow */
3394}
3395
3396/* This is the shared test on whether a gamma value is 'significant' - whether
3397 * it is worth doing gamma correction.
3398 */
3399int /* PRIVATE */
3400png_gamma_significant(png_fixed_point gamma_val)
3401{
3402 return gamma_val < PNG_FP_1 - PNG_GAMMA_THRESHOLD_FIXED ||
3403 gamma_val > PNG_FP_1 + PNG_GAMMA_THRESHOLD_FIXED;
3404}
3405#endif
3406
3407#ifdef PNG_READ_GAMMA_SUPPORTED
Matt Sarett96be9082016-05-03 13:29:54 -04003408#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07003409/* A local convenience routine. */
3410static png_fixed_point
3411png_product2(png_fixed_point a, png_fixed_point b)
3412{
3413 /* The required result is 1/a * 1/b; the following preserves accuracy. */
Matt Sarett96be9082016-05-03 13:29:54 -04003414#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07003415 double r = a * 1E-5;
3416 r *= b;
3417 r = floor(r+.5);
3418
3419 if (r <= 2147483647. && r >= -2147483648.)
3420 return (png_fixed_point)r;
Matt Sarett96be9082016-05-03 13:29:54 -04003421#else
Chris Craikb50c2172013-07-29 15:28:30 -07003422 png_fixed_point res;
3423
Matt Sarett96be9082016-05-03 13:29:54 -04003424 if (png_muldiv(&res, a, b, 100000) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07003425 return res;
Matt Sarett96be9082016-05-03 13:29:54 -04003426#endif
Chris Craikb50c2172013-07-29 15:28:30 -07003427
3428 return 0; /* overflow */
3429}
Matt Sarett96be9082016-05-03 13:29:54 -04003430#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07003431
3432/* The inverse of the above. */
3433png_fixed_point
3434png_reciprocal2(png_fixed_point a, png_fixed_point b)
3435{
3436 /* The required result is 1/a * 1/b; the following preserves accuracy. */
3437#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Matt Sarett96be9082016-05-03 13:29:54 -04003438 if (a != 0 && b != 0)
3439 {
3440 double r = 1E15/a;
3441 r /= b;
3442 r = floor(r+.5);
Chris Craikb50c2172013-07-29 15:28:30 -07003443
Matt Sarett96be9082016-05-03 13:29:54 -04003444 if (r <= 2147483647. && r >= -2147483648.)
3445 return (png_fixed_point)r;
3446 }
Chris Craikb50c2172013-07-29 15:28:30 -07003447#else
3448 /* This may overflow because the range of png_fixed_point isn't symmetric,
3449 * but this API is only used for the product of file and screen gamma so it
3450 * doesn't matter that the smallest number it can produce is 1/21474, not
3451 * 1/100000
3452 */
3453 png_fixed_point res = png_product2(a, b);
3454
3455 if (res != 0)
3456 return png_reciprocal(res);
3457#endif
3458
3459 return 0; /* overflow */
3460}
3461#endif /* READ_GAMMA */
3462
3463#ifdef PNG_READ_GAMMA_SUPPORTED /* gamma table code */
3464#ifndef PNG_FLOATING_ARITHMETIC_SUPPORTED
3465/* Fixed point gamma.
3466 *
3467 * The code to calculate the tables used below can be found in the shell script
3468 * contrib/tools/intgamma.sh
3469 *
3470 * To calculate gamma this code implements fast log() and exp() calls using only
3471 * fixed point arithmetic. This code has sufficient precision for either 8-bit
3472 * or 16-bit sample values.
3473 *
3474 * The tables used here were calculated using simple 'bc' programs, but C double
3475 * precision floating point arithmetic would work fine.
3476 *
3477 * 8-bit log table
3478 * This is a table of -log(value/255)/log(2) for 'value' in the range 128 to
3479 * 255, so it's the base 2 logarithm of a normalized 8-bit floating point
3480 * mantissa. The numbers are 32-bit fractions.
3481 */
3482static const png_uint_32
3483png_8bit_l2[128] =
3484{
3485 4270715492U, 4222494797U, 4174646467U, 4127164793U, 4080044201U, 4033279239U,
3486 3986864580U, 3940795015U, 3895065449U, 3849670902U, 3804606499U, 3759867474U,
3487 3715449162U, 3671346997U, 3627556511U, 3584073329U, 3540893168U, 3498011834U,
3488 3455425220U, 3413129301U, 3371120137U, 3329393864U, 3287946700U, 3246774933U,
3489 3205874930U, 3165243125U, 3124876025U, 3084770202U, 3044922296U, 3005329011U,
3490 2965987113U, 2926893432U, 2888044853U, 2849438323U, 2811070844U, 2772939474U,
3491 2735041326U, 2697373562U, 2659933400U, 2622718104U, 2585724991U, 2548951424U,
3492 2512394810U, 2476052606U, 2439922311U, 2404001468U, 2368287663U, 2332778523U,
3493 2297471715U, 2262364947U, 2227455964U, 2192742551U, 2158222529U, 2123893754U,
3494 2089754119U, 2055801552U, 2022034013U, 1988449497U, 1955046031U, 1921821672U,
3495 1888774511U, 1855902668U, 1823204291U, 1790677560U, 1758320682U, 1726131893U,
3496 1694109454U, 1662251657U, 1630556815U, 1599023271U, 1567649391U, 1536433567U,
3497 1505374214U, 1474469770U, 1443718700U, 1413119487U, 1382670639U, 1352370686U,
3498 1322218179U, 1292211689U, 1262349810U, 1232631153U, 1203054352U, 1173618059U,
3499 1144320946U, 1115161701U, 1086139034U, 1057251672U, 1028498358U, 999877854U,
3500 971388940U, 943030410U, 914801076U, 886699767U, 858725327U, 830876614U,
3501 803152505U, 775551890U, 748073672U, 720716771U, 693480120U, 666362667U,
3502 639363374U, 612481215U, 585715177U, 559064263U, 532527486U, 506103872U,
3503 479792461U, 453592303U, 427502463U, 401522014U, 375650043U, 349885648U,
3504 324227938U, 298676034U, 273229066U, 247886176U, 222646516U, 197509248U,
3505 172473545U, 147538590U, 122703574U, 97967701U, 73330182U, 48790236U,
3506 24347096U, 0U
3507
3508#if 0
3509 /* The following are the values for 16-bit tables - these work fine for the
3510 * 8-bit conversions but produce very slightly larger errors in the 16-bit
3511 * log (about 1.2 as opposed to 0.7 absolute error in the final value). To
3512 * use these all the shifts below must be adjusted appropriately.
3513 */
3514 65166, 64430, 63700, 62976, 62257, 61543, 60835, 60132, 59434, 58741, 58054,
3515 57371, 56693, 56020, 55352, 54689, 54030, 53375, 52726, 52080, 51439, 50803,
3516 50170, 49542, 48918, 48298, 47682, 47070, 46462, 45858, 45257, 44661, 44068,
3517 43479, 42894, 42312, 41733, 41159, 40587, 40020, 39455, 38894, 38336, 37782,
3518 37230, 36682, 36137, 35595, 35057, 34521, 33988, 33459, 32932, 32408, 31887,
3519 31369, 30854, 30341, 29832, 29325, 28820, 28319, 27820, 27324, 26830, 26339,
3520 25850, 25364, 24880, 24399, 23920, 23444, 22970, 22499, 22029, 21562, 21098,
3521 20636, 20175, 19718, 19262, 18808, 18357, 17908, 17461, 17016, 16573, 16132,
3522 15694, 15257, 14822, 14390, 13959, 13530, 13103, 12678, 12255, 11834, 11415,
3523 10997, 10582, 10168, 9756, 9346, 8937, 8531, 8126, 7723, 7321, 6921, 6523,
3524 6127, 5732, 5339, 4947, 4557, 4169, 3782, 3397, 3014, 2632, 2251, 1872, 1495,
3525 1119, 744, 372
3526#endif
3527};
3528
3529static png_int_32
3530png_log8bit(unsigned int x)
3531{
3532 unsigned int lg2 = 0;
3533 /* Each time 'x' is multiplied by 2, 1 must be subtracted off the final log,
3534 * because the log is actually negate that means adding 1. The final
3535 * returned value thus has the range 0 (for 255 input) to 7.994 (for 1
3536 * input), return -1 for the overflow (log 0) case, - so the result is
3537 * always at most 19 bits.
3538 */
3539 if ((x &= 0xff) == 0)
3540 return -1;
3541
3542 if ((x & 0xf0) == 0)
3543 lg2 = 4, x <<= 4;
3544
3545 if ((x & 0xc0) == 0)
3546 lg2 += 2, x <<= 2;
3547
3548 if ((x & 0x80) == 0)
3549 lg2 += 1, x <<= 1;
3550
3551 /* result is at most 19 bits, so this cast is safe: */
3552 return (png_int_32)((lg2 << 16) + ((png_8bit_l2[x-128]+32768)>>16));
3553}
3554
3555/* The above gives exact (to 16 binary places) log2 values for 8-bit images,
3556 * for 16-bit images we use the most significant 8 bits of the 16-bit value to
3557 * get an approximation then multiply the approximation by a correction factor
3558 * determined by the remaining up to 8 bits. This requires an additional step
3559 * in the 16-bit case.
3560 *
3561 * We want log2(value/65535), we have log2(v'/255), where:
3562 *
3563 * value = v' * 256 + v''
3564 * = v' * f
3565 *
3566 * So f is value/v', which is equal to (256+v''/v') since v' is in the range 128
3567 * to 255 and v'' is in the range 0 to 255 f will be in the range 256 to less
3568 * than 258. The final factor also needs to correct for the fact that our 8-bit
3569 * value is scaled by 255, whereas the 16-bit values must be scaled by 65535.
3570 *
3571 * This gives a final formula using a calculated value 'x' which is value/v' and
3572 * scaling by 65536 to match the above table:
3573 *
3574 * log2(x/257) * 65536
3575 *
3576 * Since these numbers are so close to '1' we can use simple linear
3577 * interpolation between the two end values 256/257 (result -368.61) and 258/257
3578 * (result 367.179). The values used below are scaled by a further 64 to give
3579 * 16-bit precision in the interpolation:
3580 *
3581 * Start (256): -23591
3582 * Zero (257): 0
3583 * End (258): 23499
3584 */
Matt Sarett96be9082016-05-03 13:29:54 -04003585#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07003586static png_int_32
3587png_log16bit(png_uint_32 x)
3588{
3589 unsigned int lg2 = 0;
3590
3591 /* As above, but now the input has 16 bits. */
3592 if ((x &= 0xffff) == 0)
3593 return -1;
3594
3595 if ((x & 0xff00) == 0)
3596 lg2 = 8, x <<= 8;
3597
3598 if ((x & 0xf000) == 0)
3599 lg2 += 4, x <<= 4;
3600
3601 if ((x & 0xc000) == 0)
3602 lg2 += 2, x <<= 2;
3603
3604 if ((x & 0x8000) == 0)
3605 lg2 += 1, x <<= 1;
3606
3607 /* Calculate the base logarithm from the top 8 bits as a 28-bit fractional
3608 * value.
3609 */
3610 lg2 <<= 28;
3611 lg2 += (png_8bit_l2[(x>>8)-128]+8) >> 4;
3612
3613 /* Now we need to interpolate the factor, this requires a division by the top
3614 * 8 bits. Do this with maximum precision.
3615 */
3616 x = ((x << 16) + (x >> 9)) / (x >> 8);
3617
3618 /* Since we divided by the top 8 bits of 'x' there will be a '1' at 1<<24,
3619 * the value at 1<<16 (ignoring this) will be 0 or 1; this gives us exactly
3620 * 16 bits to interpolate to get the low bits of the result. Round the
3621 * answer. Note that the end point values are scaled by 64 to retain overall
3622 * precision and that 'lg2' is current scaled by an extra 12 bits, so adjust
3623 * the overall scaling by 6-12. Round at every step.
3624 */
3625 x -= 1U << 24;
3626
3627 if (x <= 65536U) /* <= '257' */
3628 lg2 += ((23591U * (65536U-x)) + (1U << (16+6-12-1))) >> (16+6-12);
3629
3630 else
3631 lg2 -= ((23499U * (x-65536U)) + (1U << (16+6-12-1))) >> (16+6-12);
3632
3633 /* Safe, because the result can't have more than 20 bits: */
3634 return (png_int_32)((lg2 + 2048) >> 12);
3635}
Matt Sarett96be9082016-05-03 13:29:54 -04003636#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07003637
3638/* The 'exp()' case must invert the above, taking a 20-bit fixed point
3639 * logarithmic value and returning a 16 or 8-bit number as appropriate. In
3640 * each case only the low 16 bits are relevant - the fraction - since the
3641 * integer bits (the top 4) simply determine a shift.
3642 *
Matt Sarett96be9082016-05-03 13:29:54 -04003643 * The worst case is the 16-bit distinction between 65535 and 65534. This
3644 * requires perhaps spurious accuracy in the decoding of the logarithm to
Chris Craikb50c2172013-07-29 15:28:30 -07003645 * distinguish log2(65535/65534.5) - 10^-5 or 17 bits. There is little chance
3646 * of getting this accuracy in practice.
3647 *
3648 * To deal with this the following exp() function works out the exponent of the
3649 * frational part of the logarithm by using an accurate 32-bit value from the
3650 * top four fractional bits then multiplying in the remaining bits.
3651 */
3652static const png_uint_32
3653png_32bit_exp[16] =
3654{
3655 /* NOTE: the first entry is deliberately set to the maximum 32-bit value. */
3656 4294967295U, 4112874773U, 3938502376U, 3771522796U, 3611622603U, 3458501653U,
3657 3311872529U, 3171459999U, 3037000500U, 2908241642U, 2784941738U, 2666869345U,
3658 2553802834U, 2445529972U, 2341847524U, 2242560872U
3659};
3660
3661/* Adjustment table; provided to explain the numbers in the code below. */
3662#if 0
3663for (i=11;i>=0;--i){ print i, " ", (1 - e(-(2^i)/65536*l(2))) * 2^(32-i), "\n"}
3664 11 44937.64284865548751208448
3665 10 45180.98734845585101160448
3666 9 45303.31936980687359311872
3667 8 45364.65110595323018870784
3668 7 45395.35850361789624614912
3669 6 45410.72259715102037508096
3670 5 45418.40724413220722311168
3671 4 45422.25021786898173001728
3672 3 45424.17186732298419044352
3673 2 45425.13273269940811464704
3674 1 45425.61317555035558641664
3675 0 45425.85339951654943850496
3676#endif
3677
3678static png_uint_32
3679png_exp(png_fixed_point x)
3680{
3681 if (x > 0 && x <= 0xfffff) /* Else overflow or zero (underflow) */
3682 {
3683 /* Obtain a 4-bit approximation */
Matt Sarett96be9082016-05-03 13:29:54 -04003684 png_uint_32 e = png_32bit_exp[(x >> 12) & 0x0f];
Chris Craikb50c2172013-07-29 15:28:30 -07003685
3686 /* Incorporate the low 12 bits - these decrease the returned value by
3687 * multiplying by a number less than 1 if the bit is set. The multiplier
3688 * is determined by the above table and the shift. Notice that the values
3689 * converge on 45426 and this is used to allow linear interpolation of the
3690 * low bits.
3691 */
3692 if (x & 0x800)
3693 e -= (((e >> 16) * 44938U) + 16U) >> 5;
3694
3695 if (x & 0x400)
3696 e -= (((e >> 16) * 45181U) + 32U) >> 6;
3697
3698 if (x & 0x200)
3699 e -= (((e >> 16) * 45303U) + 64U) >> 7;
3700
3701 if (x & 0x100)
3702 e -= (((e >> 16) * 45365U) + 128U) >> 8;
3703
3704 if (x & 0x080)
3705 e -= (((e >> 16) * 45395U) + 256U) >> 9;
3706
3707 if (x & 0x040)
3708 e -= (((e >> 16) * 45410U) + 512U) >> 10;
3709
3710 /* And handle the low 6 bits in a single block. */
3711 e -= (((e >> 16) * 355U * (x & 0x3fU)) + 256U) >> 9;
3712
3713 /* Handle the upper bits of x. */
3714 e >>= x >> 16;
3715 return e;
3716 }
3717
3718 /* Check for overflow */
3719 if (x <= 0)
3720 return png_32bit_exp[0];
3721
3722 /* Else underflow */
3723 return 0;
3724}
3725
3726static png_byte
3727png_exp8bit(png_fixed_point lg2)
3728{
3729 /* Get a 32-bit value: */
3730 png_uint_32 x = png_exp(lg2);
3731
Matt Sarett96be9082016-05-03 13:29:54 -04003732 /* Convert the 32-bit value to 0..255 by multiplying by 256-1. Note that the
Chris Craikb50c2172013-07-29 15:28:30 -07003733 * second, rounding, step can't overflow because of the first, subtraction,
3734 * step.
3735 */
3736 x -= x >> 8;
Matt Sarett96be9082016-05-03 13:29:54 -04003737 return (png_byte)(((x + 0x7fffffU) >> 24) & 0xff);
Chris Craikb50c2172013-07-29 15:28:30 -07003738}
3739
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303740#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07003741static png_uint_16
3742png_exp16bit(png_fixed_point lg2)
3743{
3744 /* Get a 32-bit value: */
3745 png_uint_32 x = png_exp(lg2);
3746
3747 /* Convert the 32-bit value to 0..65535 by multiplying by 65536-1: */
3748 x -= x >> 16;
3749 return (png_uint_16)((x + 32767U) >> 16);
3750}
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303751#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07003752#endif /* FLOATING_ARITHMETIC */
3753
3754png_byte
3755png_gamma_8bit_correct(unsigned int value, png_fixed_point gamma_val)
3756{
3757 if (value > 0 && value < 255)
3758 {
3759# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Matt Sarett96be9082016-05-03 13:29:54 -04003760 /* 'value' is unsigned, ANSI-C90 requires the compiler to correctly
3761 * convert this to a floating point value. This includes values that
3762 * would overflow if 'value' were to be converted to 'int'.
3763 *
3764 * Apparently GCC, however, does an intermediate conversion to (int)
3765 * on some (ARM) but not all (x86) platforms, possibly because of
3766 * hardware FP limitations. (E.g. if the hardware conversion always
3767 * assumes the integer register contains a signed value.) This results
3768 * in ANSI-C undefined behavior for large values.
3769 *
3770 * Other implementations on the same machine might actually be ANSI-C90
3771 * conformant and therefore compile spurious extra code for the large
3772 * values.
3773 *
3774 * We can be reasonably sure that an unsigned to float conversion
3775 * won't be faster than an int to float one. Therefore this code
3776 * assumes responsibility for the undefined behavior, which it knows
3777 * can't happen because of the check above.
3778 *
3779 * Note the argument to this routine is an (unsigned int) because, on
3780 * 16-bit platforms, it is assigned a value which might be out of
3781 * range for an (int); that would result in undefined behavior in the
3782 * caller if the *argument* ('value') were to be declared (int).
3783 */
3784 double r = floor(255*pow((int)/*SAFE*/value/255.,gamma_val*.00001)+.5);
Chris Craikb50c2172013-07-29 15:28:30 -07003785 return (png_byte)r;
3786# else
3787 png_int_32 lg2 = png_log8bit(value);
3788 png_fixed_point res;
3789
Matt Sarett96be9082016-05-03 13:29:54 -04003790 if (png_muldiv(&res, gamma_val, lg2, PNG_FP_1) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07003791 return png_exp8bit(res);
3792
3793 /* Overflow. */
3794 value = 0;
3795# endif
3796 }
3797
Matt Sarett96be9082016-05-03 13:29:54 -04003798 return (png_byte)(value & 0xff);
Chris Craikb50c2172013-07-29 15:28:30 -07003799}
3800
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303801#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07003802png_uint_16
3803png_gamma_16bit_correct(unsigned int value, png_fixed_point gamma_val)
3804{
3805 if (value > 0 && value < 65535)
3806 {
3807# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Matt Sarett96be9082016-05-03 13:29:54 -04003808 /* The same (unsigned int)->(double) constraints apply here as above,
3809 * however in this case the (unsigned int) to (int) conversion can
3810 * overflow on an ANSI-C90 compliant system so the cast needs to ensure
3811 * that this is not possible.
3812 */
3813 double r = floor(65535*pow((png_int_32)value/65535.,
3814 gamma_val*.00001)+.5);
Chris Craikb50c2172013-07-29 15:28:30 -07003815 return (png_uint_16)r;
3816# else
3817 png_int_32 lg2 = png_log16bit(value);
3818 png_fixed_point res;
3819
Matt Sarett96be9082016-05-03 13:29:54 -04003820 if (png_muldiv(&res, gamma_val, lg2, PNG_FP_1) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07003821 return png_exp16bit(res);
3822
3823 /* Overflow. */
3824 value = 0;
3825# endif
3826 }
3827
3828 return (png_uint_16)value;
3829}
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303830#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07003831
3832/* This does the right thing based on the bit_depth field of the
3833 * png_struct, interpreting values as 8-bit or 16-bit. While the result
3834 * is nominally a 16-bit value if bit depth is 8 then the result is
3835 * 8-bit (as are the arguments.)
3836 */
3837png_uint_16 /* PRIVATE */
3838png_gamma_correct(png_structrp png_ptr, unsigned int value,
3839 png_fixed_point gamma_val)
3840{
3841 if (png_ptr->bit_depth == 8)
3842 return png_gamma_8bit_correct(value, gamma_val);
3843
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303844#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07003845 else
3846 return png_gamma_16bit_correct(value, gamma_val);
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303847#else
3848 /* should not reach this */
3849 return 0;
3850#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07003851}
3852
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303853#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07003854/* Internal function to build a single 16-bit table - the table consists of
3855 * 'num' 256 entry subtables, where 'num' is determined by 'shift' - the amount
3856 * to shift the input values right (or 16-number_of_signifiant_bits).
3857 *
3858 * The caller is responsible for ensuring that the table gets cleaned up on
3859 * png_error (i.e. if one of the mallocs below fails) - i.e. the *table argument
3860 * should be somewhere that will be cleaned.
3861 */
3862static void
3863png_build_16bit_table(png_structrp png_ptr, png_uint_16pp *ptable,
3864 PNG_CONST unsigned int shift, PNG_CONST png_fixed_point gamma_val)
3865{
3866 /* Various values derived from 'shift': */
3867 PNG_CONST unsigned int num = 1U << (8U - shift);
Matt Sarett96be9082016-05-03 13:29:54 -04003868#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3869 /* CSE the division and work round wacky GCC warnings (see the comments
3870 * in png_gamma_8bit_correct for where these come from.)
3871 */
3872 PNG_CONST double fmax = 1./(((png_int_32)1 << (16U - shift))-1);
3873#endif
Chris Craikb50c2172013-07-29 15:28:30 -07003874 PNG_CONST unsigned int max = (1U << (16U - shift))-1U;
3875 PNG_CONST unsigned int max_by_2 = 1U << (15U-shift);
3876 unsigned int i;
3877
3878 png_uint_16pp table = *ptable =
3879 (png_uint_16pp)png_calloc(png_ptr, num * (sizeof (png_uint_16p)));
3880
3881 for (i = 0; i < num; i++)
3882 {
3883 png_uint_16p sub_table = table[i] =
3884 (png_uint_16p)png_malloc(png_ptr, 256 * (sizeof (png_uint_16)));
3885
3886 /* The 'threshold' test is repeated here because it can arise for one of
3887 * the 16-bit tables even if the others don't hit it.
3888 */
Matt Sarett96be9082016-05-03 13:29:54 -04003889 if (png_gamma_significant(gamma_val) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07003890 {
3891 /* The old code would overflow at the end and this would cause the
3892 * 'pow' function to return a result >1, resulting in an
3893 * arithmetic error. This code follows the spec exactly; ig is
3894 * the recovered input sample, it always has 8-16 bits.
3895 *
3896 * We want input * 65535/max, rounded, the arithmetic fits in 32
3897 * bits (unsigned) so long as max <= 32767.
3898 */
3899 unsigned int j;
3900 for (j = 0; j < 256; j++)
3901 {
3902 png_uint_32 ig = (j << (8-shift)) + i;
3903# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3904 /* Inline the 'max' scaling operation: */
Matt Sarett96be9082016-05-03 13:29:54 -04003905 /* See png_gamma_8bit_correct for why the cast to (int) is
3906 * required here.
3907 */
3908 double d = floor(65535.*pow(ig*fmax, gamma_val*.00001)+.5);
Chris Craikb50c2172013-07-29 15:28:30 -07003909 sub_table[j] = (png_uint_16)d;
3910# else
Matt Sarett96be9082016-05-03 13:29:54 -04003911 if (shift != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07003912 ig = (ig * 65535U + max_by_2)/max;
3913
3914 sub_table[j] = png_gamma_16bit_correct(ig, gamma_val);
3915# endif
3916 }
3917 }
3918 else
3919 {
3920 /* We must still build a table, but do it the fast way. */
3921 unsigned int j;
3922
3923 for (j = 0; j < 256; j++)
3924 {
3925 png_uint_32 ig = (j << (8-shift)) + i;
3926
Matt Sarett96be9082016-05-03 13:29:54 -04003927 if (shift != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07003928 ig = (ig * 65535U + max_by_2)/max;
3929
3930 sub_table[j] = (png_uint_16)ig;
3931 }
3932 }
3933 }
3934}
3935
3936/* NOTE: this function expects the *inverse* of the overall gamma transformation
3937 * required.
3938 */
3939static void
3940png_build_16to8_table(png_structrp png_ptr, png_uint_16pp *ptable,
3941 PNG_CONST unsigned int shift, PNG_CONST png_fixed_point gamma_val)
3942{
3943 PNG_CONST unsigned int num = 1U << (8U - shift);
3944 PNG_CONST unsigned int max = (1U << (16U - shift))-1U;
3945 unsigned int i;
3946 png_uint_32 last;
3947
3948 png_uint_16pp table = *ptable =
3949 (png_uint_16pp)png_calloc(png_ptr, num * (sizeof (png_uint_16p)));
3950
3951 /* 'num' is the number of tables and also the number of low bits of low
3952 * bits of the input 16-bit value used to select a table. Each table is
Matt Sarett96be9082016-05-03 13:29:54 -04003953 * itself indexed by the high 8 bits of the value.
Chris Craikb50c2172013-07-29 15:28:30 -07003954 */
3955 for (i = 0; i < num; i++)
3956 table[i] = (png_uint_16p)png_malloc(png_ptr,
3957 256 * (sizeof (png_uint_16)));
3958
3959 /* 'gamma_val' is set to the reciprocal of the value calculated above, so
3960 * pow(out,g) is an *input* value. 'last' is the last input value set.
3961 *
3962 * In the loop 'i' is used to find output values. Since the output is
3963 * 8-bit there are only 256 possible values. The tables are set up to
3964 * select the closest possible output value for each input by finding
3965 * the input value at the boundary between each pair of output values
3966 * and filling the table up to that boundary with the lower output
3967 * value.
3968 *
3969 * The boundary values are 0.5,1.5..253.5,254.5. Since these are 9-bit
3970 * values the code below uses a 16-bit value in i; the values start at
3971 * 128.5 (for 0.5) and step by 257, for a total of 254 values (the last
3972 * entries are filled with 255). Start i at 128 and fill all 'last'
3973 * table entries <= 'max'
3974 */
3975 last = 0;
3976 for (i = 0; i < 255; ++i) /* 8-bit output value */
3977 {
3978 /* Find the corresponding maximum input value */
3979 png_uint_16 out = (png_uint_16)(i * 257U); /* 16-bit output value */
3980
3981 /* Find the boundary value in 16 bits: */
3982 png_uint_32 bound = png_gamma_16bit_correct(out+128U, gamma_val);
3983
3984 /* Adjust (round) to (16-shift) bits: */
3985 bound = (bound * max + 32768U)/65535U + 1U;
3986
3987 while (last < bound)
3988 {
3989 table[last & (0xffU >> shift)][last >> (8U - shift)] = out;
3990 last++;
3991 }
3992 }
3993
3994 /* And fill in the final entries. */
3995 while (last < (num << 8))
3996 {
3997 table[last & (0xff >> shift)][last >> (8U - shift)] = 65535U;
3998 last++;
3999 }
4000}
Sireesh Tripurarib478e662014-05-09 15:15:10 +05304001#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07004002
4003/* Build a single 8-bit table: same as the 16-bit case but much simpler (and
4004 * typically much faster). Note that libpng currently does no sBIT processing
Matt Sarett96be9082016-05-03 13:29:54 -04004005 * (apparently contrary to the spec) so a 256-entry table is always generated.
Chris Craikb50c2172013-07-29 15:28:30 -07004006 */
4007static void
4008png_build_8bit_table(png_structrp png_ptr, png_bytepp ptable,
4009 PNG_CONST png_fixed_point gamma_val)
4010{
4011 unsigned int i;
4012 png_bytep table = *ptable = (png_bytep)png_malloc(png_ptr, 256);
4013
Matt Sarett96be9082016-05-03 13:29:54 -04004014 if (png_gamma_significant(gamma_val) != 0)
4015 for (i=0; i<256; i++)
4016 table[i] = png_gamma_8bit_correct(i, gamma_val);
Chris Craikb50c2172013-07-29 15:28:30 -07004017
Matt Sarett96be9082016-05-03 13:29:54 -04004018 else
4019 for (i=0; i<256; ++i)
4020 table[i] = (png_byte)(i & 0xff);
Chris Craikb50c2172013-07-29 15:28:30 -07004021}
4022
4023/* Used from png_read_destroy and below to release the memory used by the gamma
4024 * tables.
4025 */
4026void /* PRIVATE */
4027png_destroy_gamma_table(png_structrp png_ptr)
4028{
4029 png_free(png_ptr, png_ptr->gamma_table);
4030 png_ptr->gamma_table = NULL;
4031
Sireesh Tripurarib478e662014-05-09 15:15:10 +05304032#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07004033 if (png_ptr->gamma_16_table != NULL)
4034 {
4035 int i;
4036 int istop = (1 << (8 - png_ptr->gamma_shift));
4037 for (i = 0; i < istop; i++)
4038 {
4039 png_free(png_ptr, png_ptr->gamma_16_table[i]);
4040 }
4041 png_free(png_ptr, png_ptr->gamma_16_table);
4042 png_ptr->gamma_16_table = NULL;
4043 }
Sireesh Tripurarib478e662014-05-09 15:15:10 +05304044#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07004045
4046#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
4047 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
4048 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
4049 png_free(png_ptr, png_ptr->gamma_from_1);
4050 png_ptr->gamma_from_1 = NULL;
4051 png_free(png_ptr, png_ptr->gamma_to_1);
4052 png_ptr->gamma_to_1 = NULL;
4053
Sireesh Tripurarib478e662014-05-09 15:15:10 +05304054#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07004055 if (png_ptr->gamma_16_from_1 != NULL)
4056 {
4057 int i;
4058 int istop = (1 << (8 - png_ptr->gamma_shift));
4059 for (i = 0; i < istop; i++)
4060 {
4061 png_free(png_ptr, png_ptr->gamma_16_from_1[i]);
4062 }
4063 png_free(png_ptr, png_ptr->gamma_16_from_1);
4064 png_ptr->gamma_16_from_1 = NULL;
4065 }
4066 if (png_ptr->gamma_16_to_1 != NULL)
4067 {
4068 int i;
4069 int istop = (1 << (8 - png_ptr->gamma_shift));
4070 for (i = 0; i < istop; i++)
4071 {
4072 png_free(png_ptr, png_ptr->gamma_16_to_1[i]);
4073 }
4074 png_free(png_ptr, png_ptr->gamma_16_to_1);
4075 png_ptr->gamma_16_to_1 = NULL;
4076 }
Sireesh Tripurarib478e662014-05-09 15:15:10 +05304077#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07004078#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
4079}
4080
4081/* We build the 8- or 16-bit gamma tables here. Note that for 16-bit
4082 * tables, we don't make a full table if we are reducing to 8-bit in
4083 * the future. Note also how the gamma_16 tables are segmented so that
4084 * we don't need to allocate > 64K chunks for a full 16-bit table.
4085 */
4086void /* PRIVATE */
4087png_build_gamma_table(png_structrp png_ptr, int bit_depth)
4088{
4089 png_debug(1, "in png_build_gamma_table");
4090
4091 /* Remove any existing table; this copes with multiple calls to
4092 * png_read_update_info. The warning is because building the gamma tables
4093 * multiple times is a performance hit - it's harmless but the ability to call
4094 * png_read_update_info() multiple times is new in 1.5.6 so it seems sensible
4095 * to warn if the app introduces such a hit.
4096 */
4097 if (png_ptr->gamma_table != NULL || png_ptr->gamma_16_table != NULL)
4098 {
4099 png_warning(png_ptr, "gamma table being rebuilt");
4100 png_destroy_gamma_table(png_ptr);
4101 }
4102
4103 if (bit_depth <= 8)
4104 {
4105 png_build_8bit_table(png_ptr, &png_ptr->gamma_table,
4106 png_ptr->screen_gamma > 0 ? png_reciprocal2(png_ptr->colorspace.gamma,
4107 png_ptr->screen_gamma) : PNG_FP_1);
4108
4109#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
4110 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
4111 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
Matt Sarett96be9082016-05-03 13:29:54 -04004112 if ((png_ptr->transformations & (PNG_COMPOSE | PNG_RGB_TO_GRAY)) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07004113 {
4114 png_build_8bit_table(png_ptr, &png_ptr->gamma_to_1,
4115 png_reciprocal(png_ptr->colorspace.gamma));
4116
4117 png_build_8bit_table(png_ptr, &png_ptr->gamma_from_1,
4118 png_ptr->screen_gamma > 0 ? png_reciprocal(png_ptr->screen_gamma) :
4119 png_ptr->colorspace.gamma/* Probably doing rgb_to_gray */);
4120 }
4121#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
4122 }
Sireesh Tripurarib478e662014-05-09 15:15:10 +05304123#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07004124 else
4125 {
4126 png_byte shift, sig_bit;
4127
Matt Sarett96be9082016-05-03 13:29:54 -04004128 if ((png_ptr->color_type & PNG_COLOR_MASK_COLOR) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07004129 {
4130 sig_bit = png_ptr->sig_bit.red;
4131
4132 if (png_ptr->sig_bit.green > sig_bit)
4133 sig_bit = png_ptr->sig_bit.green;
4134
4135 if (png_ptr->sig_bit.blue > sig_bit)
4136 sig_bit = png_ptr->sig_bit.blue;
4137 }
4138 else
4139 sig_bit = png_ptr->sig_bit.gray;
4140
4141 /* 16-bit gamma code uses this equation:
4142 *
4143 * ov = table[(iv & 0xff) >> gamma_shift][iv >> 8]
4144 *
4145 * Where 'iv' is the input color value and 'ov' is the output value -
4146 * pow(iv, gamma).
4147 *
Matt Sarett96be9082016-05-03 13:29:54 -04004148 * Thus the gamma table consists of up to 256 256-entry tables. The table
Chris Craikb50c2172013-07-29 15:28:30 -07004149 * is selected by the (8-gamma_shift) most significant of the low 8 bits of
4150 * the color value then indexed by the upper 8 bits:
4151 *
4152 * table[low bits][high 8 bits]
4153 *
4154 * So the table 'n' corresponds to all those 'iv' of:
4155 *
4156 * <all high 8-bit values><n << gamma_shift>..<(n+1 << gamma_shift)-1>
4157 *
4158 */
4159 if (sig_bit > 0 && sig_bit < 16U)
Matt Sarett96be9082016-05-03 13:29:54 -04004160 /* shift == insignificant bits */
4161 shift = (png_byte)((16U - sig_bit) & 0xff);
Chris Craikb50c2172013-07-29 15:28:30 -07004162
4163 else
4164 shift = 0; /* keep all 16 bits */
4165
Matt Sarett96be9082016-05-03 13:29:54 -04004166 if ((png_ptr->transformations & (PNG_16_TO_8 | PNG_SCALE_16_TO_8)) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07004167 {
4168 /* PNG_MAX_GAMMA_8 is the number of bits to keep - effectively
4169 * the significant bits in the *input* when the output will
4170 * eventually be 8 bits. By default it is 11.
4171 */
4172 if (shift < (16U - PNG_MAX_GAMMA_8))
4173 shift = (16U - PNG_MAX_GAMMA_8);
4174 }
4175
4176 if (shift > 8U)
4177 shift = 8U; /* Guarantees at least one table! */
4178
4179 png_ptr->gamma_shift = shift;
4180
Chris Craikb50c2172013-07-29 15:28:30 -07004181 /* NOTE: prior to 1.5.4 this test used to include PNG_BACKGROUND (now
4182 * PNG_COMPOSE). This effectively smashed the background calculation for
4183 * 16-bit output because the 8-bit table assumes the result will be reduced
4184 * to 8 bits.
4185 */
Matt Sarett96be9082016-05-03 13:29:54 -04004186 if ((png_ptr->transformations & (PNG_16_TO_8 | PNG_SCALE_16_TO_8)) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07004187 png_build_16to8_table(png_ptr, &png_ptr->gamma_16_table, shift,
4188 png_ptr->screen_gamma > 0 ? png_product2(png_ptr->colorspace.gamma,
4189 png_ptr->screen_gamma) : PNG_FP_1);
4190
Chris Craikb50c2172013-07-29 15:28:30 -07004191 else
4192 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_table, shift,
4193 png_ptr->screen_gamma > 0 ? png_reciprocal2(png_ptr->colorspace.gamma,
4194 png_ptr->screen_gamma) : PNG_FP_1);
Chris Craikb50c2172013-07-29 15:28:30 -07004195
4196#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
4197 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
4198 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
Matt Sarett96be9082016-05-03 13:29:54 -04004199 if ((png_ptr->transformations & (PNG_COMPOSE | PNG_RGB_TO_GRAY)) != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07004200 {
4201 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_to_1, shift,
4202 png_reciprocal(png_ptr->colorspace.gamma));
4203
4204 /* Notice that the '16 from 1' table should be full precision, however
4205 * the lookup on this table still uses gamma_shift, so it can't be.
4206 * TODO: fix this.
4207 */
4208 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_from_1, shift,
4209 png_ptr->screen_gamma > 0 ? png_reciprocal(png_ptr->screen_gamma) :
4210 png_ptr->colorspace.gamma/* Probably doing rgb_to_gray */);
4211 }
4212#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
4213 }
Sireesh Tripurarib478e662014-05-09 15:15:10 +05304214#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07004215}
4216#endif /* READ_GAMMA */
4217
Matt Sarett96be9082016-05-03 13:29:54 -04004218/* HARDWARE OR SOFTWARE OPTION SUPPORT */
Chris Craikb50c2172013-07-29 15:28:30 -07004219#ifdef PNG_SET_OPTION_SUPPORTED
4220int PNGAPI
4221png_set_option(png_structrp png_ptr, int option, int onoff)
4222{
4223 if (png_ptr != NULL && option >= 0 && option < PNG_OPTION_NEXT &&
4224 (option & 1) == 0)
4225 {
4226 int mask = 3 << option;
4227 int setting = (2 + (onoff != 0)) << option;
4228 int current = png_ptr->options;
4229
Matt Sarett96be9082016-05-03 13:29:54 -04004230 png_ptr->options = (png_byte)(((current & ~mask) | setting) & 0xff);
Chris Craikb50c2172013-07-29 15:28:30 -07004231
4232 return (current & mask) >> option;
4233 }
4234
4235 return PNG_OPTION_INVALID;
4236}
4237#endif
4238
4239/* sRGB support */
4240#if defined(PNG_SIMPLIFIED_READ_SUPPORTED) ||\
4241 defined(PNG_SIMPLIFIED_WRITE_SUPPORTED)
4242/* sRGB conversion tables; these are machine generated with the code in
4243 * contrib/tools/makesRGB.c. The actual sRGB transfer curve defined in the
4244 * specification (see the article at http://en.wikipedia.org/wiki/SRGB)
4245 * is used, not the gamma=1/2.2 approximation use elsewhere in libpng.
Matt Sarett96be9082016-05-03 13:29:54 -04004246 * The sRGB to linear table is exact (to the nearest 16-bit linear fraction).
Chris Craikb50c2172013-07-29 15:28:30 -07004247 * The inverse (linear to sRGB) table has accuracies as follows:
4248 *
4249 * For all possible (255*65535+1) input values:
4250 *
4251 * error: -0.515566 - 0.625971, 79441 (0.475369%) of readings inexact
4252 *
4253 * For the input values corresponding to the 65536 16-bit values:
4254 *
4255 * error: -0.513727 - 0.607759, 308 (0.469978%) of readings inexact
4256 *
Matt Sarett96be9082016-05-03 13:29:54 -04004257 * In all cases the inexact readings are only off by one.
Chris Craikb50c2172013-07-29 15:28:30 -07004258 */
4259
4260#ifdef PNG_SIMPLIFIED_READ_SUPPORTED
4261/* The convert-to-sRGB table is only currently required for read. */
4262const png_uint_16 png_sRGB_table[256] =
4263{
4264 0,20,40,60,80,99,119,139,
4265 159,179,199,219,241,264,288,313,
4266 340,367,396,427,458,491,526,562,
4267 599,637,677,718,761,805,851,898,
4268 947,997,1048,1101,1156,1212,1270,1330,
4269 1391,1453,1517,1583,1651,1720,1790,1863,
4270 1937,2013,2090,2170,2250,2333,2418,2504,
4271 2592,2681,2773,2866,2961,3058,3157,3258,
4272 3360,3464,3570,3678,3788,3900,4014,4129,
4273 4247,4366,4488,4611,4736,4864,4993,5124,
4274 5257,5392,5530,5669,5810,5953,6099,6246,
4275 6395,6547,6700,6856,7014,7174,7335,7500,
4276 7666,7834,8004,8177,8352,8528,8708,8889,
4277 9072,9258,9445,9635,9828,10022,10219,10417,
4278 10619,10822,11028,11235,11446,11658,11873,12090,
4279 12309,12530,12754,12980,13209,13440,13673,13909,
4280 14146,14387,14629,14874,15122,15371,15623,15878,
4281 16135,16394,16656,16920,17187,17456,17727,18001,
4282 18277,18556,18837,19121,19407,19696,19987,20281,
4283 20577,20876,21177,21481,21787,22096,22407,22721,
4284 23038,23357,23678,24002,24329,24658,24990,25325,
4285 25662,26001,26344,26688,27036,27386,27739,28094,
4286 28452,28813,29176,29542,29911,30282,30656,31033,
4287 31412,31794,32179,32567,32957,33350,33745,34143,
4288 34544,34948,35355,35764,36176,36591,37008,37429,
4289 37852,38278,38706,39138,39572,40009,40449,40891,
4290 41337,41785,42236,42690,43147,43606,44069,44534,
4291 45002,45473,45947,46423,46903,47385,47871,48359,
4292 48850,49344,49841,50341,50844,51349,51858,52369,
4293 52884,53401,53921,54445,54971,55500,56032,56567,
4294 57105,57646,58190,58737,59287,59840,60396,60955,
4295 61517,62082,62650,63221,63795,64372,64952,65535
4296};
Matt Sarett96be9082016-05-03 13:29:54 -04004297#endif /* SIMPLIFIED_READ */
Chris Craikb50c2172013-07-29 15:28:30 -07004298
4299/* The base/delta tables are required for both read and write (but currently
4300 * only the simplified versions.)
4301 */
4302const png_uint_16 png_sRGB_base[512] =
4303{
4304 128,1782,3383,4644,5675,6564,7357,8074,
4305 8732,9346,9921,10463,10977,11466,11935,12384,
4306 12816,13233,13634,14024,14402,14769,15125,15473,
4307 15812,16142,16466,16781,17090,17393,17690,17981,
4308 18266,18546,18822,19093,19359,19621,19879,20133,
4309 20383,20630,20873,21113,21349,21583,21813,22041,
4310 22265,22487,22707,22923,23138,23350,23559,23767,
4311 23972,24175,24376,24575,24772,24967,25160,25352,
4312 25542,25730,25916,26101,26284,26465,26645,26823,
4313 27000,27176,27350,27523,27695,27865,28034,28201,
4314 28368,28533,28697,28860,29021,29182,29341,29500,
4315 29657,29813,29969,30123,30276,30429,30580,30730,
4316 30880,31028,31176,31323,31469,31614,31758,31902,
4317 32045,32186,32327,32468,32607,32746,32884,33021,
4318 33158,33294,33429,33564,33697,33831,33963,34095,
4319 34226,34357,34486,34616,34744,34873,35000,35127,
4320 35253,35379,35504,35629,35753,35876,35999,36122,
4321 36244,36365,36486,36606,36726,36845,36964,37083,
4322 37201,37318,37435,37551,37668,37783,37898,38013,
4323 38127,38241,38354,38467,38580,38692,38803,38915,
4324 39026,39136,39246,39356,39465,39574,39682,39790,
4325 39898,40005,40112,40219,40325,40431,40537,40642,
4326 40747,40851,40955,41059,41163,41266,41369,41471,
4327 41573,41675,41777,41878,41979,42079,42179,42279,
4328 42379,42478,42577,42676,42775,42873,42971,43068,
4329 43165,43262,43359,43456,43552,43648,43743,43839,
4330 43934,44028,44123,44217,44311,44405,44499,44592,
4331 44685,44778,44870,44962,45054,45146,45238,45329,
4332 45420,45511,45601,45692,45782,45872,45961,46051,
4333 46140,46229,46318,46406,46494,46583,46670,46758,
4334 46846,46933,47020,47107,47193,47280,47366,47452,
4335 47538,47623,47709,47794,47879,47964,48048,48133,
4336 48217,48301,48385,48468,48552,48635,48718,48801,
4337 48884,48966,49048,49131,49213,49294,49376,49458,
4338 49539,49620,49701,49782,49862,49943,50023,50103,
4339 50183,50263,50342,50422,50501,50580,50659,50738,
4340 50816,50895,50973,51051,51129,51207,51285,51362,
4341 51439,51517,51594,51671,51747,51824,51900,51977,
4342 52053,52129,52205,52280,52356,52432,52507,52582,
4343 52657,52732,52807,52881,52956,53030,53104,53178,
4344 53252,53326,53400,53473,53546,53620,53693,53766,
4345 53839,53911,53984,54056,54129,54201,54273,54345,
4346 54417,54489,54560,54632,54703,54774,54845,54916,
4347 54987,55058,55129,55199,55269,55340,55410,55480,
4348 55550,55620,55689,55759,55828,55898,55967,56036,
4349 56105,56174,56243,56311,56380,56448,56517,56585,
4350 56653,56721,56789,56857,56924,56992,57059,57127,
4351 57194,57261,57328,57395,57462,57529,57595,57662,
4352 57728,57795,57861,57927,57993,58059,58125,58191,
4353 58256,58322,58387,58453,58518,58583,58648,58713,
4354 58778,58843,58908,58972,59037,59101,59165,59230,
4355 59294,59358,59422,59486,59549,59613,59677,59740,
4356 59804,59867,59930,59993,60056,60119,60182,60245,
4357 60308,60370,60433,60495,60558,60620,60682,60744,
4358 60806,60868,60930,60992,61054,61115,61177,61238,
4359 61300,61361,61422,61483,61544,61605,61666,61727,
4360 61788,61848,61909,61969,62030,62090,62150,62211,
4361 62271,62331,62391,62450,62510,62570,62630,62689,
4362 62749,62808,62867,62927,62986,63045,63104,63163,
4363 63222,63281,63340,63398,63457,63515,63574,63632,
4364 63691,63749,63807,63865,63923,63981,64039,64097,
4365 64155,64212,64270,64328,64385,64443,64500,64557,
4366 64614,64672,64729,64786,64843,64900,64956,65013,
4367 65070,65126,65183,65239,65296,65352,65409,65465
4368};
4369
4370const png_byte png_sRGB_delta[512] =
4371{
4372 207,201,158,129,113,100,90,82,77,72,68,64,61,59,56,54,
4373 52,50,49,47,46,45,43,42,41,40,39,39,38,37,36,36,
4374 35,34,34,33,33,32,32,31,31,30,30,30,29,29,28,28,
4375 28,27,27,27,27,26,26,26,25,25,25,25,24,24,24,24,
4376 23,23,23,23,23,22,22,22,22,22,22,21,21,21,21,21,
4377 21,20,20,20,20,20,20,20,20,19,19,19,19,19,19,19,
4378 19,18,18,18,18,18,18,18,18,18,18,17,17,17,17,17,
4379 17,17,17,17,17,17,16,16,16,16,16,16,16,16,16,16,
4380 16,16,16,16,15,15,15,15,15,15,15,15,15,15,15,15,
4381 15,15,15,15,14,14,14,14,14,14,14,14,14,14,14,14,
4382 14,14,14,14,14,14,14,13,13,13,13,13,13,13,13,13,
4383 13,13,13,13,13,13,13,13,13,13,13,13,13,13,12,12,
4384 12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,
4385 12,12,12,12,12,12,12,12,12,12,12,12,11,11,11,11,
4386 11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,
4387 11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,
4388 11,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4389 10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4390 10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4391 10,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4392 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4393 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4394 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4395 9,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4396 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4397 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4398 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4399 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4400 8,8,8,8,8,8,8,8,8,7,7,7,7,7,7,7,
4401 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
4402 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
4403 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7
4404};
4405#endif /* SIMPLIFIED READ/WRITE sRGB support */
4406
4407/* SIMPLIFIED READ/WRITE SUPPORT */
4408#if defined(PNG_SIMPLIFIED_READ_SUPPORTED) ||\
4409 defined(PNG_SIMPLIFIED_WRITE_SUPPORTED)
4410static int
4411png_image_free_function(png_voidp argument)
4412{
4413 png_imagep image = png_voidcast(png_imagep, argument);
4414 png_controlp cp = image->opaque;
4415 png_control c;
4416
4417 /* Double check that we have a png_ptr - it should be impossible to get here
4418 * without one.
4419 */
4420 if (cp->png_ptr == NULL)
4421 return 0;
4422
4423 /* First free any data held in the control structure. */
4424# ifdef PNG_STDIO_SUPPORTED
Matt Sarett96be9082016-05-03 13:29:54 -04004425 if (cp->owned_file != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07004426 {
4427 FILE *fp = png_voidcast(FILE*, cp->png_ptr->io_ptr);
4428 cp->owned_file = 0;
4429
4430 /* Ignore errors here. */
4431 if (fp != NULL)
4432 {
4433 cp->png_ptr->io_ptr = NULL;
4434 (void)fclose(fp);
4435 }
4436 }
4437# endif
4438
4439 /* Copy the control structure so that the original, allocated, version can be
4440 * safely freed. Notice that a png_error here stops the remainder of the
4441 * cleanup, but this is probably fine because that would indicate bad memory
4442 * problems anyway.
4443 */
4444 c = *cp;
4445 image->opaque = &c;
4446 png_free(c.png_ptr, cp);
4447
4448 /* Then the structures, calling the correct API. */
Matt Sarett96be9082016-05-03 13:29:54 -04004449 if (c.for_write != 0)
Chris Craikb50c2172013-07-29 15:28:30 -07004450 {
4451# ifdef PNG_SIMPLIFIED_WRITE_SUPPORTED
4452 png_destroy_write_struct(&c.png_ptr, &c.info_ptr);
4453# else
4454 png_error(c.png_ptr, "simplified write not supported");
4455# endif
4456 }
4457 else
4458 {
4459# ifdef PNG_SIMPLIFIED_READ_SUPPORTED
4460 png_destroy_read_struct(&c.png_ptr, &c.info_ptr, NULL);
4461# else
4462 png_error(c.png_ptr, "simplified read not supported");
4463# endif
4464 }
4465
4466 /* Success. */
4467 return 1;
4468}
4469
4470void PNGAPI
4471png_image_free(png_imagep image)
4472{
4473 /* Safely call the real function, but only if doing so is safe at this point
4474 * (if not inside an error handling context). Otherwise assume
4475 * png_safe_execute will call this API after the return.
4476 */
4477 if (image != NULL && image->opaque != NULL &&
4478 image->opaque->error_buf == NULL)
4479 {
4480 /* Ignore errors here: */
4481 (void)png_safe_execute(image, png_image_free_function, image);
4482 image->opaque = NULL;
4483 }
4484}
4485
4486int /* PRIVATE */
4487png_image_error(png_imagep image, png_const_charp error_message)
4488{
4489 /* Utility to log an error. */
4490 png_safecat(image->message, (sizeof image->message), 0, error_message);
4491 image->warning_or_error |= PNG_IMAGE_ERROR;
4492 png_image_free(image);
4493 return 0;
4494}
4495
4496#endif /* SIMPLIFIED READ/WRITE */
Matt Sarett96be9082016-05-03 13:29:54 -04004497#endif /* READ || WRITE */