blob: 6e7ddfbd7364b044b157cd6fe63103945330d9d1 [file] [log] [blame]
John Bowler8de49d02012-09-27 09:26:49 -05001
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06002/* png.c - location for general purpose libpng functions
3 *
Glenn Randers-Pehrson38f49402013-12-22 15:00:59 -06004 * Last changed in libpng 1.6.9 [(PENDING RELEASE)]
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06005 * Copyright (c) 1998-2013 Glenn Randers-Pehrson
Glenn Randers-Pehrsond4366722000-06-04 14:29:29 -05006 * (Version 0.96 Copyright (c) 1996, 1997 Andreas Dilger)
7 * (Version 0.88 Copyright (c) 1995, 1996 Guy Eric Schalnat, Group 42, Inc.)
Glenn Randers-Pehrson3e61d792009-06-24 09:31:28 -05008 *
Glenn Randers-Pehrsonbfbf8652009-06-26 21:46:52 -05009 * This code is released under the libpng license.
Glenn Randers-Pehrsonc332bbc2009-06-25 13:43:50 -050010 * For conditions of distribution and use, see the disclaimer
Glenn Randers-Pehrson037023b2009-06-24 10:27:36 -050011 * and license in png.h
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -060012 */
Guy Schalnat0d580581995-07-20 02:43:20 -050013
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -050014#include "pngpriv.h"
Guy Schalnat0d580581995-07-20 02:43:20 -050015
Glenn Randers-Pehrson520a7642000-03-21 05:13:06 -060016/* Generate a compiler error if there is an old png.h in the search path. */
Glenn Randers-Pehrson45687622013-12-26 11:28:37 -060017typedef png_libpng_version_1_6_9beta02 Your_png_h_is_not_version_1_6_9beta02;
Glenn Randers-Pehrson520a7642000-03-21 05:13:06 -060018
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060019/* Tells libpng that we have already handled the first "num_bytes" bytes
20 * of the PNG file signature. If the PNG data is embedded into another
21 * stream we can set num_bytes = 8 so that libpng will not attempt to read
22 * or write any of the magic bytes before it starts on the IHDR.
23 */
Glenn Randers-Pehrsonbcfd15d1999-10-01 14:22:25 -050024
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060025#ifdef PNG_READ_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -050026void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -060027png_set_sig_bytes(png_structrp png_ptr, int num_bytes)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060028{
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -050029 png_debug(1, "in png_set_sig_bytes");
30
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -050031 if (png_ptr == NULL)
32 return;
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -050033
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060034 if (num_bytes > 8)
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -050035 png_error(png_ptr, "Too many bytes for PNG signature");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060036
Glenn Randers-Pehrson860ab2b1999-10-14 07:43:10 -050037 png_ptr->sig_bytes = (png_byte)(num_bytes < 0 ? 0 : num_bytes);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060038}
39
40/* Checks whether the supplied bytes match the PNG signature. We allow
41 * checking less than the full 8-byte signature so that those apps that
42 * already read the first few bytes of a file to determine the file type
43 * can simply check the remaining bytes for extra assurance. Returns
44 * an integer less than, equal to, or greater than zero if sig is found,
45 * respectively, to be less than, to match, or be greater than the correct
Glenn Randers-Pehrson6d62ef12011-08-25 18:17:50 -050046 * PNG signature (this is the same behavior as strcmp, memcmp, etc).
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060047 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -050048int PNGAPI
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -050049png_sig_cmp(png_const_bytep sig, png_size_t start, png_size_t num_to_check)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060050{
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -060051 png_byte png_signature[8] = {137, 80, 78, 71, 13, 10, 26, 10};
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -050052
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060053 if (num_to_check > 8)
54 num_to_check = 8;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -050055
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060056 else if (num_to_check < 1)
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060057 return (-1);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060058
Andreas Dilger47a0c421997-05-16 02:46:07 -050059 if (start > 7)
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060060 return (-1);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060061
62 if (start + num_to_check > 8)
63 num_to_check = 8 - start;
64
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -060065 return ((int)(memcmp(&sig[start], &png_signature[start], num_to_check)));
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060066}
67
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060068#endif /* PNG_READ_SUPPORTED */
Guy Schalnat0d580581995-07-20 02:43:20 -050069
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060070#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Glenn Randers-Pehrsonc5080812010-10-23 08:26:26 -050071/* Function to allocate memory for zlib */
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -050072PNG_FUNCTION(voidpf /* PRIVATE */,
73png_zalloc,(voidpf png_ptr, uInt items, uInt size),PNG_ALLOCATED)
Guy Schalnat0d580581995-07-20 02:43:20 -050074{
John Bowlerd332c672011-12-21 17:36:12 -060075 png_alloc_size_t num_bytes = size;
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -050076
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -050077 if (png_ptr == NULL)
John Bowlerd332c672011-12-21 17:36:12 -060078 return NULL;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -050079
John Bowlerd332c672011-12-21 17:36:12 -060080 if (items >= (~(png_alloc_size_t)0)/size)
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -050081 {
John Bowler5d567862011-12-24 09:12:00 -060082 png_warning (png_voidcast(png_structrp, png_ptr),
John Bowlerd332c672011-12-21 17:36:12 -060083 "Potential overflow in png_zalloc()");
84 return NULL;
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -050085 }
Glenn Randers-Pehrson9c0f0942002-02-21 23:14:23 -060086
John Bowlerd332c672011-12-21 17:36:12 -060087 num_bytes *= items;
John Bowler5d567862011-12-24 09:12:00 -060088 return png_malloc_warn(png_voidcast(png_structrp, png_ptr), num_bytes);
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -050089}
90
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -050091/* Function to free memory for zlib */
Glenn Randers-Pehrson3f705ba2009-07-23 12:53:06 -050092void /* PRIVATE */
Guy Schalnat51f0eb41995-09-26 05:22:39 -050093png_zfree(voidpf png_ptr, voidpf ptr)
Guy Schalnat0d580581995-07-20 02:43:20 -050094{
John Bowler5d567862011-12-24 09:12:00 -060095 png_free(png_voidcast(png_const_structrp,png_ptr), ptr);
Guy Schalnat0d580581995-07-20 02:43:20 -050096}
97
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060098/* Reset the CRC variable to 32 bits of 1's. Care must be taken
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -060099 * in case CRC is > 32 bits to leave the top bits 0.
100 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500101void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -0600102png_reset_crc(png_structrp png_ptr)
Guy Schalnat0d580581995-07-20 02:43:20 -0500103{
John Bowlerf3f7e142011-09-09 07:32:37 -0500104 /* The cast is safe because the crc is a 32 bit value. */
105 png_ptr->crc = (png_uint_32)crc32(0, Z_NULL, 0);
Guy Schalnat0d580581995-07-20 02:43:20 -0500106}
107
Andreas Dilger47a0c421997-05-16 02:46:07 -0500108/* Calculate the CRC over a section of data. We can only pass as
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600109 * much data to this routine as the largest single buffer size. We
110 * also check that this data will actually be used before going to the
111 * trouble of calculating it.
112 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500113void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -0600114png_calculate_crc(png_structrp png_ptr, png_const_bytep ptr, png_size_t length)
Guy Schalnat0d580581995-07-20 02:43:20 -0500115{
Andreas Dilger47a0c421997-05-16 02:46:07 -0500116 int need_crc = 1;
117
Glenn Randers-Pehrson67a289f2013-04-19 19:03:34 -0500118 if (PNG_CHUNK_ANCILLARY(png_ptr->chunk_name))
Andreas Dilger47a0c421997-05-16 02:46:07 -0500119 {
120 if ((png_ptr->flags & PNG_FLAG_CRC_ANCILLARY_MASK) ==
121 (PNG_FLAG_CRC_ANCILLARY_USE | PNG_FLAG_CRC_ANCILLARY_NOWARN))
122 need_crc = 0;
123 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500124
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500125 else /* critical */
Andreas Dilger47a0c421997-05-16 02:46:07 -0500126 {
127 if (png_ptr->flags & PNG_FLAG_CRC_CRITICAL_IGNORE)
128 need_crc = 0;
129 }
130
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600131 /* 'uLong' is defined in zlib.h as unsigned long; this means that on some
132 * systems it is a 64 bit value. crc32, however, returns 32 bits so the
133 * following cast is safe. 'uInt' may be no more than 16 bits, so it is
134 * necessary to perform a loop here.
John Bowlerf3f7e142011-09-09 07:32:37 -0500135 */
136 if (need_crc && length > 0)
137 {
138 uLong crc = png_ptr->crc; /* Should never issue a warning */
139
140 do
141 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600142 uInt safe_length = (uInt)length;
143 if (safe_length == 0)
144 safe_length = (uInt)-1; /* evil, but safe */
John Bowlerf3f7e142011-09-09 07:32:37 -0500145
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600146 crc = crc32(crc, ptr, safe_length);
John Bowlerf3f7e142011-09-09 07:32:37 -0500147
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600148 /* The following should never issue compiler warnings; if they do the
John Bowlerf3f7e142011-09-09 07:32:37 -0500149 * target system has characteristics that will probably violate other
150 * assumptions within the libpng code.
151 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600152 ptr += safe_length;
153 length -= safe_length;
John Bowlerf3f7e142011-09-09 07:32:37 -0500154 }
155 while (length > 0);
156
157 /* And the following is always safe because the crc is only 32 bits. */
158 png_ptr->crc = (png_uint_32)crc;
159 }
Guy Schalnat0d580581995-07-20 02:43:20 -0500160}
Guy Schalnate5a37791996-06-05 15:50:50 -0500161
John Bowler88b77cc2011-05-05 06:49:55 -0500162/* Check a user supplied version number, called from both read and write
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600163 * functions that create a png_struct.
John Bowler88b77cc2011-05-05 06:49:55 -0500164 */
165int
John Bowler5d567862011-12-24 09:12:00 -0600166png_user_version_check(png_structrp png_ptr, png_const_charp user_png_ver)
John Bowler88b77cc2011-05-05 06:49:55 -0500167{
168 if (user_png_ver)
169 {
170 int i = 0;
171
172 do
173 {
174 if (user_png_ver[i] != png_libpng_ver[i])
175 png_ptr->flags |= PNG_FLAG_LIBRARY_MISMATCH;
176 } while (png_libpng_ver[i++]);
177 }
178
179 else
180 png_ptr->flags |= PNG_FLAG_LIBRARY_MISMATCH;
181
182 if (png_ptr->flags & PNG_FLAG_LIBRARY_MISMATCH)
183 {
184 /* Libpng 0.90 and later are binary incompatible with libpng 0.89, so
185 * we must recompile any applications that use any older library version.
186 * For versions after libpng 1.0, we will be compatible, so we need
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600187 * only check the first and third digits (note that when we reach version
188 * 1.10 we will need to check the fourth symbol, namely user_png_ver[3]).
John Bowler88b77cc2011-05-05 06:49:55 -0500189 */
190 if (user_png_ver == NULL || user_png_ver[0] != png_libpng_ver[0] ||
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600191 (user_png_ver[0] == '1' && (user_png_ver[2] != png_libpng_ver[2] ||
192 user_png_ver[3] != png_libpng_ver[3])) ||
John Bowler88b77cc2011-05-05 06:49:55 -0500193 (user_png_ver[0] == '0' && user_png_ver[2] < '9'))
194 {
195#ifdef PNG_WARNINGS_SUPPORTED
196 size_t pos = 0;
197 char m[128];
198
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600199 pos = png_safecat(m, (sizeof m), pos,
200 "Application built with libpng-");
201 pos = png_safecat(m, (sizeof m), pos, user_png_ver);
202 pos = png_safecat(m, (sizeof m), pos, " but running with ");
203 pos = png_safecat(m, (sizeof m), pos, png_libpng_ver);
Glenn Randers-Pehrson3f8a2ed2013-11-25 10:38:21 -0600204 PNG_UNUSED(pos)
John Bowler88b77cc2011-05-05 06:49:55 -0500205
206 png_warning(png_ptr, m);
207#endif
208
209#ifdef PNG_ERROR_NUMBERS_SUPPORTED
210 png_ptr->flags = 0;
211#endif
212
213 return 0;
214 }
215 }
216
217 /* Success return. */
218 return 1;
219}
220
John Bowlerd332c672011-12-21 17:36:12 -0600221/* Generic function to create a png_struct for either read or write - this
222 * contains the common initialization.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600223 */
John Bowlerd332c672011-12-21 17:36:12 -0600224PNG_FUNCTION(png_structp /* PRIVATE */,
225png_create_png_struct,(png_const_charp user_png_ver, png_voidp error_ptr,
226 png_error_ptr error_fn, png_error_ptr warn_fn, png_voidp mem_ptr,
227 png_malloc_ptr malloc_fn, png_free_ptr free_fn),PNG_ALLOCATED)
228{
229 png_struct create_struct;
230# ifdef PNG_SETJMP_SUPPORTED
231 jmp_buf create_jmp_buf;
232# endif
233
234 /* This temporary stack-allocated structure is used to provide a place to
235 * build enough context to allow the user provided memory allocator (if any)
236 * to be called.
237 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600238 memset(&create_struct, 0, (sizeof create_struct));
John Bowlerd332c672011-12-21 17:36:12 -0600239
240 /* Added at libpng-1.2.6 */
241# ifdef PNG_USER_LIMITS_SUPPORTED
242 create_struct.user_width_max = PNG_USER_WIDTH_MAX;
243 create_struct.user_height_max = PNG_USER_HEIGHT_MAX;
244
245# ifdef PNG_USER_CHUNK_CACHE_MAX
246 /* Added at libpng-1.2.43 and 1.4.0 */
247 create_struct.user_chunk_cache_max = PNG_USER_CHUNK_CACHE_MAX;
248# endif
249
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600250# ifdef PNG_USER_CHUNK_MALLOC_MAX
John Bowlerd332c672011-12-21 17:36:12 -0600251 /* Added at libpng-1.2.43 and 1.4.1, required only for read but exists
252 * in png_struct regardless.
253 */
254 create_struct.user_chunk_malloc_max = PNG_USER_CHUNK_MALLOC_MAX;
255# endif
256# endif
257
258 /* The following two API calls simply set fields in png_struct, so it is safe
259 * to do them now even though error handling is not yet set up.
260 */
261# ifdef PNG_USER_MEM_SUPPORTED
262 png_set_mem_fn(&create_struct, mem_ptr, malloc_fn, free_fn);
Glenn Randers-Pehrsonc9120502013-11-22 14:58:04 -0600263# else
264 PNG_UNUSED(mem_ptr)
265 PNG_UNUSED(malloc_fn)
266 PNG_UNUSED(free_fn)
John Bowlerd332c672011-12-21 17:36:12 -0600267# endif
268
269 /* (*error_fn) can return control to the caller after the error_ptr is set,
270 * this will result in a memory leak unless the error_fn does something
271 * extremely sophisticated. The design lacks merit but is implicit in the
272 * API.
273 */
274 png_set_error_fn(&create_struct, error_ptr, error_fn, warn_fn);
275
276# ifdef PNG_SETJMP_SUPPORTED
277 if (!setjmp(create_jmp_buf))
278 {
279 /* Temporarily fake out the longjmp information until we have
280 * successfully completed this function. This only works if we have
281 * setjmp() support compiled in, but it is safe - this stuff should
282 * never happen.
283 */
284 create_struct.jmp_buf_ptr = &create_jmp_buf;
285 create_struct.jmp_buf_size = 0; /*stack allocation*/
286 create_struct.longjmp_fn = longjmp;
287# else
288 {
289# endif
290 /* Call the general version checker (shared with read and write code):
291 */
292 if (png_user_version_check(&create_struct, user_png_ver))
293 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600294 png_structrp png_ptr = png_voidcast(png_structrp,
295 png_malloc_warn(&create_struct, (sizeof *png_ptr)));
John Bowlerd332c672011-12-21 17:36:12 -0600296
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600297 if (png_ptr != NULL)
John Bowlerd332c672011-12-21 17:36:12 -0600298 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600299 /* png_ptr->zstream holds a back-pointer to the png_struct, so
300 * this can only be done now:
301 */
302 create_struct.zstream.zalloc = png_zalloc;
303 create_struct.zstream.zfree = png_zfree;
304 create_struct.zstream.opaque = png_ptr;
John Bowlerd332c672011-12-21 17:36:12 -0600305
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600306# ifdef PNG_SETJMP_SUPPORTED
307 /* Eliminate the local error handling: */
308 create_struct.jmp_buf_ptr = NULL;
309 create_struct.jmp_buf_size = 0;
310 create_struct.longjmp_fn = 0;
311# endif
John Bowlerd332c672011-12-21 17:36:12 -0600312
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600313 *png_ptr = create_struct;
John Bowlerd332c672011-12-21 17:36:12 -0600314
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600315 /* This is the successful return point */
316 return png_ptr;
John Bowlerd332c672011-12-21 17:36:12 -0600317 }
318 }
319 }
320
321 /* A longjmp because of a bug in the application storage allocator or a
322 * simple failure to allocate the png_struct.
323 */
John Bowlerd332c672011-12-21 17:36:12 -0600324 return NULL;
325}
326
327/* Allocate the memory for an info_struct for the application. */
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -0500328PNG_FUNCTION(png_infop,PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600329png_create_info_struct,(png_const_structrp png_ptr),PNG_ALLOCATED)
Guy Schalnate5a37791996-06-05 15:50:50 -0500330{
John Bowler5d567862011-12-24 09:12:00 -0600331 png_inforp info_ptr;
Guy Schalnate5a37791996-06-05 15:50:50 -0500332
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500333 png_debug(1, "in png_create_info_struct");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500334
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500335 if (png_ptr == NULL)
John Bowlerd332c672011-12-21 17:36:12 -0600336 return NULL;
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500337
John Bowlerd332c672011-12-21 17:36:12 -0600338 /* Use the internal API that does not (or at least should not) error out, so
339 * that this call always returns ok. The application typically sets up the
340 * error handling *after* creating the info_struct because this is the way it
341 * has always been done in 'example.c'.
342 */
John Bowler5d567862011-12-24 09:12:00 -0600343 info_ptr = png_voidcast(png_inforp, png_malloc_base(png_ptr,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600344 (sizeof *info_ptr)));
John Bowlerd332c672011-12-21 17:36:12 -0600345
Glenn Randers-Pehrson5cded0b2001-11-07 07:10:08 -0600346 if (info_ptr != NULL)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600347 memset(info_ptr, 0, (sizeof *info_ptr));
Guy Schalnate5a37791996-06-05 15:50:50 -0500348
John Bowlerd332c672011-12-21 17:36:12 -0600349 return info_ptr;
Guy Schalnate5a37791996-06-05 15:50:50 -0500350}
351
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600352/* This function frees the memory associated with a single info struct.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600353 * Normally, one would use either png_destroy_read_struct() or
354 * png_destroy_write_struct() to free an info struct, but this may be
John Bowlerd332c672011-12-21 17:36:12 -0600355 * useful for some applications. From libpng 1.6.0 this function is also used
356 * internally to implement the png_info release part of the 'struct' destroy
357 * APIs. This ensures that all possible approaches free the same data (all of
358 * it).
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600359 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500360void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600361png_destroy_info_struct(png_const_structrp png_ptr, png_infopp info_ptr_ptr)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600362{
John Bowler5d567862011-12-24 09:12:00 -0600363 png_inforp info_ptr = NULL;
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600364
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500365 png_debug(1, "in png_destroy_info_struct");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500366
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500367 if (png_ptr == NULL)
368 return;
369
Andreas Dilger47a0c421997-05-16 02:46:07 -0500370 if (info_ptr_ptr != NULL)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600371 info_ptr = *info_ptr_ptr;
372
Andreas Dilger47a0c421997-05-16 02:46:07 -0500373 if (info_ptr != NULL)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600374 {
John Bowlerd332c672011-12-21 17:36:12 -0600375 /* Do this first in case of an error below; if the app implements its own
376 * memory management this can lead to png_free calling png_error, which
377 * will abort this routine and return control to the app error handler.
378 * An infinite loop may result if it then tries to free the same info
379 * ptr.
380 */
Glenn Randers-Pehrson3f549252001-10-27 07:35:13 -0500381 *info_ptr_ptr = NULL;
John Bowlerd332c672011-12-21 17:36:12 -0600382
John Bowlerdf477e42011-12-24 07:47:02 -0600383 png_free_data(png_ptr, info_ptr, PNG_FREE_ALL, -1);
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600384 memset(info_ptr, 0, (sizeof *info_ptr));
John Bowlerd332c672011-12-21 17:36:12 -0600385 png_free(png_ptr, info_ptr);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600386 }
387}
388
389/* Initialize the info structure. This is now an internal function (0.89)
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600390 * and applications using it are urged to use png_create_info_struct()
John Bowlerd332c672011-12-21 17:36:12 -0600391 * instead. Use deprecated in 1.6.0, internal use removed (used internally it
392 * is just a memset).
393 *
394 * NOTE: it is almost inconceivable that this API is used because it bypasses
395 * the user-memory mechanism and the user error handling/warning mechanisms in
396 * those cases where it does anything other than a memset.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600397 */
John Bowlerd332c672011-12-21 17:36:12 -0600398PNG_FUNCTION(void,PNGAPI
399png_info_init_3,(png_infopp ptr_ptr, png_size_t png_info_struct_size),
400 PNG_DEPRECATED)
Glenn Randers-Pehrson8b6a8892001-05-18 04:54:50 -0500401{
John Bowler5d567862011-12-24 09:12:00 -0600402 png_inforp info_ptr = *ptr_ptr;
Glenn Randers-Pehrson8b6a8892001-05-18 04:54:50 -0500403
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500404 png_debug(1, "in png_info_init_3");
405
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500406 if (info_ptr == NULL)
407 return;
Glenn Randers-Pehrson6b12c082006-11-14 10:53:30 -0600408
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600409 if ((sizeof (png_info)) > png_info_struct_size)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500410 {
John Bowlerd332c672011-12-21 17:36:12 -0600411 *ptr_ptr = NULL;
412 /* The following line is why this API should not be used: */
413 free(info_ptr);
John Bowler5d567862011-12-24 09:12:00 -0600414 info_ptr = png_voidcast(png_inforp, png_malloc_base(NULL,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600415 (sizeof *info_ptr)));
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500416 *ptr_ptr = info_ptr;
417 }
Glenn Randers-Pehrson8b6a8892001-05-18 04:54:50 -0500418
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500419 /* Set everything to 0 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600420 memset(info_ptr, 0, (sizeof *info_ptr));
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600421}
422
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600423/* The following API is not called internally */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500424void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600425png_data_freer(png_const_structrp png_ptr, png_inforp info_ptr,
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500426 int freer, png_uint_32 mask)
427{
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500428 png_debug(1, "in png_data_freer");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500429
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500430 if (png_ptr == NULL || info_ptr == NULL)
431 return;
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500432
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500433 if (freer == PNG_DESTROY_WILL_FREE_DATA)
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500434 info_ptr->free_me |= mask;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500435
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500436 else if (freer == PNG_USER_WILL_FREE_DATA)
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500437 info_ptr->free_me &= ~mask;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500438
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500439 else
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600440 png_error(png_ptr, "Unknown freer parameter in png_data_freer");
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500441}
442
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500443void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600444png_free_data(png_const_structrp png_ptr, png_inforp info_ptr, png_uint_32 mask,
Glenn Randers-Pehrson82ae3832001-04-20 10:32:10 -0500445 int num)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600446{
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500447 png_debug(1, "in png_free_data");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500448
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600449 if (png_ptr == NULL || info_ptr == NULL)
450 return;
Glenn Randers-Pehrsona77ef622000-02-18 13:48:52 -0600451
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500452#ifdef PNG_TEXT_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500453 /* Free text item num or (if num == -1) all text items */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500454 if ((mask & PNG_FREE_TEXT) & info_ptr->free_me)
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600455 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500456 if (num != -1)
457 {
458 if (info_ptr->text && info_ptr->text[num].key)
459 {
460 png_free(png_ptr, info_ptr->text[num].key);
461 info_ptr->text[num].key = NULL;
462 }
463 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500464
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500465 else
466 {
467 int i;
468 for (i = 0; i < info_ptr->num_text; i++)
469 png_free_data(png_ptr, info_ptr, PNG_FREE_TEXT, i);
470 png_free(png_ptr, info_ptr->text);
471 info_ptr->text = NULL;
472 info_ptr->num_text=0;
473 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600474 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600475#endif
476
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500477#ifdef PNG_tRNS_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500478 /* Free any tRNS entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500479 if ((mask & PNG_FREE_TRNS) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500480 {
Glenn Randers-Pehrson6abea752009-08-08 16:52:06 -0500481 png_free(png_ptr, info_ptr->trans_alpha);
482 info_ptr->trans_alpha = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500483 info_ptr->valid &= ~PNG_INFO_tRNS;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500484 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600485#endif
486
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500487#ifdef PNG_sCAL_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500488 /* Free any sCAL entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500489 if ((mask & PNG_FREE_SCAL) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500490 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500491 png_free(png_ptr, info_ptr->scal_s_width);
492 png_free(png_ptr, info_ptr->scal_s_height);
493 info_ptr->scal_s_width = NULL;
494 info_ptr->scal_s_height = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500495 info_ptr->valid &= ~PNG_INFO_sCAL;
496 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600497#endif
498
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500499#ifdef PNG_pCAL_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500500 /* Free any pCAL entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500501 if ((mask & PNG_FREE_PCAL) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500502 {
503 png_free(png_ptr, info_ptr->pcal_purpose);
504 png_free(png_ptr, info_ptr->pcal_units);
505 info_ptr->pcal_purpose = NULL;
506 info_ptr->pcal_units = NULL;
507 if (info_ptr->pcal_params != NULL)
508 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600509 unsigned int i;
510 for (i = 0; i < info_ptr->pcal_nparams; i++)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500511 {
512 png_free(png_ptr, info_ptr->pcal_params[i]);
Glenn Randers-Pehrsonf81b50b2009-12-29 16:50:15 -0600513 info_ptr->pcal_params[i] = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500514 }
515 png_free(png_ptr, info_ptr->pcal_params);
516 info_ptr->pcal_params = NULL;
517 }
518 info_ptr->valid &= ~PNG_INFO_pCAL;
519 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600520#endif
521
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500522#ifdef PNG_iCCP_SUPPORTED
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600523 /* Free any profile entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500524 if ((mask & PNG_FREE_ICCP) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500525 {
526 png_free(png_ptr, info_ptr->iccp_name);
527 png_free(png_ptr, info_ptr->iccp_profile);
528 info_ptr->iccp_name = NULL;
529 info_ptr->iccp_profile = NULL;
530 info_ptr->valid &= ~PNG_INFO_iCCP;
531 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600532#endif
533
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500534#ifdef PNG_sPLT_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500535 /* Free a given sPLT entry, or (if num == -1) all sPLT entries */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500536 if ((mask & PNG_FREE_SPLT) & info_ptr->free_me)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600537 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500538 if (num != -1)
Glenn Randers-Pehrsonfc4a1432000-05-17 17:39:34 -0500539 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500540 if (info_ptr->splt_palettes)
541 {
542 png_free(png_ptr, info_ptr->splt_palettes[num].name);
543 png_free(png_ptr, info_ptr->splt_palettes[num].entries);
544 info_ptr->splt_palettes[num].name = NULL;
545 info_ptr->splt_palettes[num].entries = NULL;
546 }
547 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500548
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500549 else
550 {
551 if (info_ptr->splt_palettes_num)
552 {
Glenn Randers-Pehrson45679352013-01-20 00:44:29 -0600553 int i;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600554 for (i = 0; i < info_ptr->splt_palettes_num; i++)
555 png_free_data(png_ptr, info_ptr, PNG_FREE_SPLT, (int)i);
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500556
557 png_free(png_ptr, info_ptr->splt_palettes);
558 info_ptr->splt_palettes = NULL;
559 info_ptr->splt_palettes_num = 0;
560 }
561 info_ptr->valid &= ~PNG_INFO_sPLT;
Glenn Randers-Pehrsonfc4a1432000-05-17 17:39:34 -0500562 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600563 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600564#endif
565
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600566#ifdef PNG_STORE_UNKNOWN_CHUNKS_SUPPORTED
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500567 if ((mask & PNG_FREE_UNKN) & info_ptr->free_me)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600568 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500569 if (num != -1)
570 {
571 if (info_ptr->unknown_chunks)
572 {
573 png_free(png_ptr, info_ptr->unknown_chunks[num].data);
574 info_ptr->unknown_chunks[num].data = NULL;
575 }
576 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500577
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500578 else
579 {
Glenn Randers-Pehrson45679352013-01-20 00:44:29 -0600580 int i;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600581
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500582 if (info_ptr->unknown_chunks_num)
583 {
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -0500584 for (i = 0; i < info_ptr->unknown_chunks_num; i++)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600585 png_free_data(png_ptr, info_ptr, PNG_FREE_UNKN, (int)i);
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600586
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500587 png_free(png_ptr, info_ptr->unknown_chunks);
588 info_ptr->unknown_chunks = NULL;
589 info_ptr->unknown_chunks_num = 0;
590 }
591 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600592 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600593#endif
594
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500595#ifdef PNG_hIST_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500596 /* Free any hIST entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500597 if ((mask & PNG_FREE_HIST) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500598 {
599 png_free(png_ptr, info_ptr->hist);
600 info_ptr->hist = NULL;
601 info_ptr->valid &= ~PNG_INFO_hIST;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500602 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600603#endif
604
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500605 /* Free any PLTE entry that was internally allocated */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500606 if ((mask & PNG_FREE_PLTE) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500607 {
John Bowler40b26032011-12-22 08:09:15 -0600608 png_free(png_ptr, info_ptr->palette);
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500609 info_ptr->palette = NULL;
610 info_ptr->valid &= ~PNG_INFO_PLTE;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500611 info_ptr->num_palette = 0;
612 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600613
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500614#ifdef PNG_INFO_IMAGE_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500615 /* Free any image bits attached to the info structure */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500616 if ((mask & PNG_FREE_ROWS) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500617 {
618 if (info_ptr->row_pointers)
619 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600620 png_uint_32 row;
621 for (row = 0; row < info_ptr->height; row++)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500622 {
623 png_free(png_ptr, info_ptr->row_pointers[row]);
Glenn Randers-Pehrsonf81b50b2009-12-29 16:50:15 -0600624 info_ptr->row_pointers[row] = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500625 }
626 png_free(png_ptr, info_ptr->row_pointers);
Glenn Randers-Pehrsonf81b50b2009-12-29 16:50:15 -0600627 info_ptr->row_pointers = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500628 }
629 info_ptr->valid &= ~PNG_INFO_IDAT;
630 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600631#endif
Glenn Randers-Pehrsonfc4a1432000-05-17 17:39:34 -0500632
John Bowler56a739b2010-12-19 16:33:20 -0600633 if (num != -1)
634 mask &= ~PNG_FREE_MUL;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500635
John Bowler56a739b2010-12-19 16:33:20 -0600636 info_ptr->free_me &= ~mask;
Glenn Randers-Pehrsona77ef622000-02-18 13:48:52 -0600637}
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -0600638#endif /* defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED) */
Guy Schalnat0d580581995-07-20 02:43:20 -0500639
Guy Schalnate5a37791996-06-05 15:50:50 -0500640/* This function returns a pointer to the io_ptr associated with the user
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600641 * functions. The application should free any memory associated with this
642 * pointer before png_write_destroy() or png_read_destroy() are called.
643 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500644png_voidp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600645png_get_io_ptr(png_const_structrp png_ptr)
Guy Schalnate5a37791996-06-05 15:50:50 -0500646{
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500647 if (png_ptr == NULL)
648 return (NULL);
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500649
Glenn Randers-Pehrsonb2120021998-01-31 20:07:59 -0600650 return (png_ptr->io_ptr);
Guy Schalnate5a37791996-06-05 15:50:50 -0500651}
Andreas Dilger47a0c421997-05-16 02:46:07 -0500652
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -0600653#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600654# ifdef PNG_STDIO_SUPPORTED
Andreas Dilger47a0c421997-05-16 02:46:07 -0500655/* Initialize the default input/output functions for the PNG file. If you
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600656 * use your own read or write routines, you can call either png_set_read_fn()
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500657 * or png_set_write_fn() instead of png_init_io(). If you have defined
Glenn Randers-Pehrsonce775cc2011-07-13 06:28:26 -0500658 * PNG_NO_STDIO or otherwise disabled PNG_STDIO_SUPPORTED, you must use a
659 * function of your own because "FILE *" isn't necessarily available.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600660 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500661void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600662png_init_io(png_structrp png_ptr, png_FILE_p fp)
Guy Schalnate5a37791996-06-05 15:50:50 -0500663{
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500664 png_debug(1, "in png_init_io");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500665
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500666 if (png_ptr == NULL)
667 return;
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500668
Guy Schalnate5a37791996-06-05 15:50:50 -0500669 png_ptr->io_ptr = (png_voidp)fp;
670}
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600671# endif
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500672
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600673#ifdef PNG_SAVE_INT_32_SUPPORTED
674/* The png_save_int_32 function assumes integers are stored in two's
675 * complement format. If this isn't the case, then this routine needs to
676 * be modified to write data in two's complement format. Note that,
677 * the following works correctly even if png_int_32 has more than 32 bits
678 * (compare the more complex code required on read for sign extension.)
679 */
680void PNGAPI
681png_save_int_32(png_bytep buf, png_int_32 i)
682{
683 buf[0] = (png_byte)((i >> 24) & 0xff);
684 buf[1] = (png_byte)((i >> 16) & 0xff);
685 buf[2] = (png_byte)((i >> 8) & 0xff);
686 buf[3] = (png_byte)(i & 0xff);
687}
688#endif
689
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600690# ifdef PNG_TIME_RFC1123_SUPPORTED
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500691/* Convert the supplied time into an RFC 1123 string suitable for use in
692 * a "Creation Time" or other text-based time string.
693 */
John Bowler40b26032011-12-22 08:09:15 -0600694int PNGAPI
695png_convert_to_rfc1123_buffer(char out[29], png_const_timep ptime)
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500696{
697 static PNG_CONST char short_months[12][4] =
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600698 {"Jan", "Feb", "Mar", "Apr", "May", "Jun",
699 "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"};
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500700
John Bowler40b26032011-12-22 08:09:15 -0600701 if (out == NULL)
702 return 0;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500703
Glenn Randers-Pehrson925a6022011-11-19 18:04:01 -0600704 if (ptime->year > 9999 /* RFC1123 limitation */ ||
705 ptime->month == 0 || ptime->month > 12 ||
706 ptime->day == 0 || ptime->day > 31 ||
707 ptime->hour > 23 || ptime->minute > 59 ||
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600708 ptime->second > 60)
John Bowler40b26032011-12-22 08:09:15 -0600709 return 0;
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600710
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500711 {
John Bowler88b77cc2011-05-05 06:49:55 -0500712 size_t pos = 0;
Glenn Randers-Pehrson925a6022011-11-19 18:04:01 -0600713 char number_buf[5]; /* enough for a four-digit year */
John Bowler88b77cc2011-05-05 06:49:55 -0500714
John Bowler40b26032011-12-22 08:09:15 -0600715# define APPEND_STRING(string) pos = png_safecat(out, 29, pos, (string))
John Bowler88b77cc2011-05-05 06:49:55 -0500716# define APPEND_NUMBER(format, value)\
717 APPEND_STRING(PNG_FORMAT_NUMBER(number_buf, format, (value)))
John Bowler40b26032011-12-22 08:09:15 -0600718# define APPEND(ch) if (pos < 28) out[pos++] = (ch)
Glenn Randers-Pehrsonaf855e42011-05-07 10:52:49 -0500719
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600720 APPEND_NUMBER(PNG_NUMBER_FORMAT_u, (unsigned)ptime->day);
John Bowler88b77cc2011-05-05 06:49:55 -0500721 APPEND(' ');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600722 APPEND_STRING(short_months[(ptime->month - 1)]);
John Bowler88b77cc2011-05-05 06:49:55 -0500723 APPEND(' ');
724 APPEND_NUMBER(PNG_NUMBER_FORMAT_u, ptime->year);
725 APPEND(' ');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600726 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->hour);
John Bowler88b77cc2011-05-05 06:49:55 -0500727 APPEND(':');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600728 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->minute);
John Bowler88b77cc2011-05-05 06:49:55 -0500729 APPEND(':');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600730 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->second);
John Bowler88b77cc2011-05-05 06:49:55 -0500731 APPEND_STRING(" +0000"); /* This reliably terminates the buffer */
732
733# undef APPEND
734# undef APPEND_NUMBER
735# undef APPEND_STRING
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500736 }
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500737
John Bowler40b26032011-12-22 08:09:15 -0600738 return 1;
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500739}
John Bowler40b26032011-12-22 08:09:15 -0600740
741# if PNG_LIBPNG_VER < 10700
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600742/* To do: remove the following from libpng-1.7 */
John Bowler40b26032011-12-22 08:09:15 -0600743/* Original API that uses a private buffer in png_struct.
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600744 * Deprecated because it causes png_struct to carry a spurious temporary
John Bowler40b26032011-12-22 08:09:15 -0600745 * buffer (png_struct::time_buffer), better to have the caller pass this in.
746 */
747png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600748png_convert_to_rfc1123(png_structrp png_ptr, png_const_timep ptime)
John Bowler40b26032011-12-22 08:09:15 -0600749{
750 if (png_ptr != NULL)
751 {
752 /* The only failure above if png_ptr != NULL is from an invalid ptime */
753 if (!png_convert_to_rfc1123_buffer(png_ptr->time_buffer, ptime))
754 png_warning(png_ptr, "Ignoring invalid time value");
755
756 else
757 return png_ptr->time_buffer;
758 }
759
760 return NULL;
761}
762# endif
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600763# endif /* PNG_TIME_RFC1123_SUPPORTED */
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600764
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -0600765#endif /* defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED) */
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600766
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500767png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600768png_get_copyright(png_const_structrp png_ptr)
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600769{
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600770 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500771#ifdef PNG_STRING_COPYRIGHT
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600772 return PNG_STRING_COPYRIGHT
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500773#else
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600774# ifdef __STDC__
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500775 return PNG_STRING_NEWLINE \
Glenn Randers-Pehrson45687622013-12-26 11:28:37 -0600776 "libpng version 1.6.9beta02 - December 26, 2013" PNG_STRING_NEWLINE \
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600777 "Copyright (c) 1998-2013 Glenn Randers-Pehrson" PNG_STRING_NEWLINE \
Glenn Randers-Pehrson43aaf6e2008-08-05 22:17:03 -0500778 "Copyright (c) 1996-1997 Andreas Dilger" PNG_STRING_NEWLINE \
779 "Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc." \
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500780 PNG_STRING_NEWLINE;
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600781# else
Glenn Randers-Pehrson45687622013-12-26 11:28:37 -0600782 return "libpng version 1.6.9beta02 - December 26, 2013\
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600783 Copyright (c) 1998-2013 Glenn Randers-Pehrson\
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500784 Copyright (c) 1996-1997 Andreas Dilger\
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500785 Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc.";
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600786# endif
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500787#endif
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600788}
Glenn Randers-Pehrsonbcfd15d1999-10-01 14:22:25 -0500789
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600790/* The following return the library version as a short string in the
Glenn Randers-Pehrson5b5dcf82004-07-17 22:45:44 -0500791 * format 1.0.0 through 99.99.99zz. To get the version of *.h files
792 * used with your application, print out PNG_LIBPNG_VER_STRING, which
793 * is defined in png.h.
794 * Note: now there is no difference between png_get_libpng_ver() and
795 * png_get_header_ver(). Due to the version_nn_nn_nn typedef guard,
796 * it is guaranteed that png.c uses the correct version of png.h.
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600797 */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500798png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600799png_get_libpng_ver(png_const_structrp png_ptr)
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600800{
801 /* Version of *.c files used when building libpng */
Glenn Randers-Pehrson4c8f7262010-03-16 19:30:01 -0500802 return png_get_header_ver(png_ptr);
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600803}
804
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500805png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600806png_get_header_ver(png_const_structrp png_ptr)
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600807{
808 /* Version of *.h files used when building libpng */
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600809 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500810 return PNG_LIBPNG_VER_STRING;
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600811}
812
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500813png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600814png_get_header_version(png_const_structrp png_ptr)
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600815{
816 /* Returns longer string containing both version and date */
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600817 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500818#ifdef __STDC__
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500819 return PNG_HEADER_VERSION_STRING
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600820# ifndef PNG_READ_SUPPORTED
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500821 " (NO READ SUPPORT)"
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600822# endif
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500823 PNG_STRING_NEWLINE;
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500824#else
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500825 return PNG_HEADER_VERSION_STRING;
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500826#endif
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600827}
828
John Bowlerc10930a2013-12-19 15:24:06 -0600829#ifdef PNG_BUILD_GRAYSCALE_PALETTE_SUPPORTED
830/* NOTE: this routine is not used internally! */
831/* Build a grayscale palette. Palette is assumed to be 1 << bit_depth
832 * large of png_color. This lets grayscale images be treated as
833 * paletted. Most useful for gamma correction and simplification
834 * of code. This API is not used internally.
835 */
836void PNGAPI
837png_build_grayscale_palette(int bit_depth, png_colorp palette)
838{
839 int num_palette;
840 int color_inc;
841 int i;
842 int v;
843
844 png_debug(1, "in png_do_build_grayscale_palette");
845
846 if (palette == NULL)
847 return;
848
849 switch (bit_depth)
850 {
851 case 1:
852 num_palette = 2;
853 color_inc = 0xff;
854 break;
855
856 case 2:
857 num_palette = 4;
858 color_inc = 0x55;
859 break;
860
861 case 4:
862 num_palette = 16;
863 color_inc = 0x11;
864 break;
865
866 case 8:
867 num_palette = 256;
868 color_inc = 1;
869 break;
870
871 default:
872 num_palette = 0;
873 color_inc = 0;
874 break;
875 }
876
877 for (i = 0, v = 0; i < num_palette; i++, v += color_inc)
878 {
879 palette[i].red = (png_byte)v;
880 palette[i].green = (png_byte)v;
881 palette[i].blue = (png_byte)v;
882 }
883}
884#endif
885
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600886#ifdef PNG_SET_UNKNOWN_CHUNKS_SUPPORTED
Glenn Randers-Pehrsonc1bfe682002-03-06 22:08:00 -0600887int PNGAPI
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600888png_handle_as_unknown(png_const_structrp png_ptr, png_const_bytep chunk_name)
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600889{
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500890 /* Check chunk_name and return "keep" value if it's on the list, else 0 */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500891 png_const_bytep p, p_end;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500892
John Bowlerfcd301d2011-12-28 21:34:27 -0600893 if (png_ptr == NULL || chunk_name == NULL || png_ptr->num_chunk_list == 0)
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500894 return PNG_HANDLE_CHUNK_AS_DEFAULT;
895
896 p_end = png_ptr->chunk_list;
897 p = p_end + png_ptr->num_chunk_list*5; /* beyond end */
898
899 /* The code is the fifth byte after each four byte string. Historically this
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600900 * code was always searched from the end of the list, this is no longer
901 * necessary because the 'set' routine handles duplicate entries correcty.
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500902 */
903 do /* num_chunk_list > 0, so at least one */
904 {
905 p -= 5;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600906
907 if (!memcmp(chunk_name, p, 4))
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500908 return p[4];
909 }
910 while (p > p_end);
911
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600912 /* This means that known chunks should be processed and unknown chunks should
913 * be handled according to the value of png_ptr->unknown_default; this can be
914 * confusing because, as a result, there are two levels of defaulting for
915 * unknown chunks.
916 */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500917 return PNG_HANDLE_CHUNK_AS_DEFAULT;
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600918}
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500919
John Bowler15a80442013-09-21 10:06:32 -0500920#if defined(PNG_READ_UNKNOWN_CHUNKS_SUPPORTED) ||\
921 defined(PNG_HANDLE_AS_UNKNOWN_SUPPORTED)
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500922int /* PRIVATE */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600923png_chunk_unknown_handling(png_const_structrp png_ptr, png_uint_32 chunk_name)
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500924{
925 png_byte chunk_string[5];
926
927 PNG_CSTRING_FROM_CHUNK(chunk_string, chunk_name);
928 return png_handle_as_unknown(png_ptr, chunk_string);
929}
John Bowler15a80442013-09-21 10:06:32 -0500930#endif /* READ_UNKNOWN_CHUNKS || HANDLE_AS_UNKNOWN */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600931#endif /* SET_UNKNOWN_CHUNKS */
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500932
Glenn Randers-Pehrsonf10fa3c2010-04-29 08:25:29 -0500933#ifdef PNG_READ_SUPPORTED
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500934/* This function, added to libpng-1.0.6g, is untested. */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500935int PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600936png_reset_zstream(png_structrp png_ptr)
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500937{
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500938 if (png_ptr == NULL)
939 return Z_STREAM_ERROR;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500940
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600941 /* WARNING: this resets the window bits to the maximum! */
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500942 return (inflateReset(&png_ptr->zstream));
943}
Glenn Randers-Pehrson2b8bef12010-04-29 11:50:24 -0500944#endif /* PNG_READ_SUPPORTED */
Glenn Randers-Pehrson1ef65b62000-05-12 06:19:53 -0500945
Glenn Randers-Pehrson5e5c1e12000-11-10 12:26:19 -0600946/* This function was added to libpng-1.0.7 */
Glenn Randers-Pehrson1ef65b62000-05-12 06:19:53 -0500947png_uint_32 PNGAPI
948png_access_version_number(void)
949{
950 /* Version of *.c files used when building libpng */
Glenn Randers-Pehrsond2332872010-10-12 19:19:28 -0500951 return((png_uint_32)PNG_LIBPNG_VER);
Glenn Randers-Pehrson1ef65b62000-05-12 06:19:53 -0500952}
Glenn Randers-Pehrson231e6872001-01-12 15:13:06 -0600953
Glenn Randers-Pehrson1fd5fb32001-05-06 05:34:26 -0500954
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500955
956#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600957/* Ensure that png_ptr->zstream.msg holds some appropriate error message string.
958 * If it doesn't 'ret' is used to set it to something appropriate, even in cases
959 * like Z_OK or Z_STREAM_END where the error code is apparently a success code.
960 */
961void /* PRIVATE */
962png_zstream_error(png_structrp png_ptr, int ret)
963{
964 /* Translate 'ret' into an appropriate error string, priority is given to the
965 * one in zstream if set. This always returns a string, even in cases like
966 * Z_OK or Z_STREAM_END where the error code is a success code.
967 */
968 if (png_ptr->zstream.msg == NULL) switch (ret)
969 {
970 default:
971 case Z_OK:
972 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected zlib return code");
973 break;
974
975 case Z_STREAM_END:
976 /* Normal exit */
977 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected end of LZ stream");
978 break;
979
980 case Z_NEED_DICT:
981 /* This means the deflate stream did not have a dictionary; this
982 * indicates a bogus PNG.
983 */
984 png_ptr->zstream.msg = PNGZ_MSG_CAST("missing LZ dictionary");
985 break;
986
987 case Z_ERRNO:
988 /* gz APIs only: should not happen */
989 png_ptr->zstream.msg = PNGZ_MSG_CAST("zlib IO error");
990 break;
991
992 case Z_STREAM_ERROR:
993 /* internal libpng error */
994 png_ptr->zstream.msg = PNGZ_MSG_CAST("bad parameters to zlib");
995 break;
996
997 case Z_DATA_ERROR:
998 png_ptr->zstream.msg = PNGZ_MSG_CAST("damaged LZ stream");
999 break;
1000
1001 case Z_MEM_ERROR:
1002 png_ptr->zstream.msg = PNGZ_MSG_CAST("insufficient memory");
1003 break;
1004
1005 case Z_BUF_ERROR:
1006 /* End of input or output; not a problem if the caller is doing
1007 * incremental read or write.
1008 */
1009 png_ptr->zstream.msg = PNGZ_MSG_CAST("truncated");
1010 break;
1011
1012 case Z_VERSION_ERROR:
1013 png_ptr->zstream.msg = PNGZ_MSG_CAST("unsupported zlib version");
1014 break;
1015
1016 case PNG_UNEXPECTED_ZLIB_RETURN:
1017 /* Compile errors here mean that zlib now uses the value co-opted in
1018 * pngpriv.h for PNG_UNEXPECTED_ZLIB_RETURN; update the switch above
1019 * and change pngpriv.h. Note that this message is "... return",
1020 * whereas the default/Z_OK one is "... return code".
1021 */
1022 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected zlib return");
1023 break;
1024 }
1025}
1026
John Bowler736f40f2011-08-25 16:19:44 -05001027/* png_convert_size: a PNGAPI but no longer in png.h, so deleted
1028 * at libpng 1.5.5!
1029 */
Glenn Randers-Pehrsonf7831012008-11-13 06:05:13 -06001030
Glenn Randers-Pehrson02a5e332008-11-24 22:10:23 -06001031/* Added at libpng version 1.2.34 and 1.4.0 (moved from pngset.c) */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001032#ifdef PNG_GAMMA_SUPPORTED /* always set if COLORSPACE */
1033static int
1034png_colorspace_check_gamma(png_const_structrp png_ptr,
1035 png_colorspacerp colorspace, png_fixed_point gAMA, int from)
1036 /* This is called to check a new gamma value against an existing one. The
1037 * routine returns false if the new gamma value should not be written.
1038 *
1039 * 'from' says where the new gamma value comes from:
1040 *
1041 * 0: the new gamma value is the libpng estimate for an ICC profile
1042 * 1: the new gamma value comes from a gAMA chunk
1043 * 2: the new gamma value comes from an sRGB chunk
John Bowlerb98681b2012-09-04 11:19:00 -05001044 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001045{
1046 png_fixed_point gtest;
1047
1048 if ((colorspace->flags & PNG_COLORSPACE_HAVE_GAMMA) != 0 &&
1049 (!png_muldiv(&gtest, colorspace->gamma, PNG_FP_1, gAMA) ||
1050 png_gamma_significant(gtest)))
John Bowlerb11b31a2012-03-21 07:55:46 -05001051 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001052 /* Either this is an sRGB image, in which case the calculated gamma
1053 * approximation should match, or this is an image with a profile and the
1054 * value libpng calculates for the gamma of the profile does not match the
1055 * value recorded in the file. The former, sRGB, case is an error, the
1056 * latter is just a warning.
1057 */
1058 if ((colorspace->flags & PNG_COLORSPACE_FROM_sRGB) != 0 || from == 2)
1059 {
1060 png_chunk_report(png_ptr, "gamma value does not match sRGB",
1061 PNG_CHUNK_ERROR);
1062 /* Do not overwrite an sRGB value */
1063 return from == 2;
1064 }
1065
1066 else /* sRGB tag not involved */
1067 {
1068 png_chunk_report(png_ptr, "gamma value does not match libpng estimate",
1069 PNG_CHUNK_WARNING);
1070 return from == 1;
1071 }
John Bowlerb11b31a2012-03-21 07:55:46 -05001072 }
1073
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001074 return 1;
John Bowlerb11b31a2012-03-21 07:55:46 -05001075}
1076
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001077void /* PRIVATE */
1078png_colorspace_set_gamma(png_const_structrp png_ptr,
1079 png_colorspacerp colorspace, png_fixed_point gAMA)
1080{
1081 /* Changed in libpng-1.5.4 to limit the values to ensure overflow can't
1082 * occur. Since the fixed point representation is assymetrical it is
1083 * possible for 1/gamma to overflow the limit of 21474 and this means the
1084 * gamma value must be at least 5/100000 and hence at most 20000.0. For
1085 * safety the limits here are a little narrower. The values are 0.00016 to
1086 * 6250.0, which are truly ridiculous gamma values (and will produce
1087 * displays that are all black or all white.)
1088 *
1089 * In 1.6.0 this test replaces the ones in pngrutil.c, in the gAMA chunk
1090 * handling code, which only required the value to be >0.
1091 */
1092 png_const_charp errmsg;
1093
1094 if (gAMA < 16 || gAMA > 625000000)
1095 errmsg = "gamma value out of range";
1096
1097# ifdef PNG_READ_gAMA_SUPPORTED
1098 /* Allow the application to set the gamma value more than once */
1099 else if ((png_ptr->mode & PNG_IS_READ_STRUCT) != 0 &&
1100 (colorspace->flags & PNG_COLORSPACE_FROM_gAMA) != 0)
1101 errmsg = "duplicate";
1102# endif
1103
1104 /* Do nothing if the colorspace is already invalid */
1105 else if (colorspace->flags & PNG_COLORSPACE_INVALID)
1106 return;
1107
1108 else
1109 {
1110 if (png_colorspace_check_gamma(png_ptr, colorspace, gAMA, 1/*from gAMA*/))
1111 {
1112 /* Store this gamma value. */
1113 colorspace->gamma = gAMA;
1114 colorspace->flags |=
1115 (PNG_COLORSPACE_HAVE_GAMMA | PNG_COLORSPACE_FROM_gAMA);
1116 }
1117
1118 /* At present if the check_gamma test fails the gamma of the colorspace is
1119 * not updated however the colorspace is not invalidated. This
1120 * corresponds to the case where the existing gamma comes from an sRGB
1121 * chunk or profile. An error message has already been output.
1122 */
1123 return;
1124 }
1125
1126 /* Error exit - errmsg has been set. */
1127 colorspace->flags |= PNG_COLORSPACE_INVALID;
1128 png_chunk_report(png_ptr, errmsg, PNG_CHUNK_WRITE_ERROR);
1129}
1130
1131void /* PRIVATE */
1132png_colorspace_sync_info(png_const_structrp png_ptr, png_inforp info_ptr)
1133{
1134 if (info_ptr->colorspace.flags & PNG_COLORSPACE_INVALID)
1135 {
1136 /* Everything is invalid */
1137 info_ptr->valid &= ~(PNG_INFO_gAMA|PNG_INFO_cHRM|PNG_INFO_sRGB|
1138 PNG_INFO_iCCP);
1139
1140# ifdef PNG_COLORSPACE_SUPPORTED
1141 /* Clean up the iCCP profile now if it won't be used. */
1142 png_free_data(png_ptr, info_ptr, PNG_FREE_ICCP, -1/*not used*/);
1143# else
1144 PNG_UNUSED(png_ptr)
1145# endif
1146 }
1147
1148 else
1149 {
1150# ifdef PNG_COLORSPACE_SUPPORTED
1151 /* Leave the INFO_iCCP flag set if the pngset.c code has already set
1152 * it; this allows a PNG to contain a profile which matches sRGB and
1153 * yet still have that profile retrievable by the application.
1154 */
1155 if (info_ptr->colorspace.flags & PNG_COLORSPACE_MATCHES_sRGB)
1156 info_ptr->valid |= PNG_INFO_sRGB;
1157
1158 else
1159 info_ptr->valid &= ~PNG_INFO_sRGB;
1160
1161 if (info_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_ENDPOINTS)
1162 info_ptr->valid |= PNG_INFO_cHRM;
1163
1164 else
1165 info_ptr->valid &= ~PNG_INFO_cHRM;
1166# endif
1167
1168 if (info_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_GAMMA)
1169 info_ptr->valid |= PNG_INFO_gAMA;
1170
1171 else
1172 info_ptr->valid &= ~PNG_INFO_gAMA;
1173 }
1174}
1175
1176#ifdef PNG_READ_SUPPORTED
1177void /* PRIVATE */
1178png_colorspace_sync(png_const_structrp png_ptr, png_inforp info_ptr)
1179{
1180 if (info_ptr == NULL) /* reduce code size; check here not in the caller */
1181 return;
1182
1183 info_ptr->colorspace = png_ptr->colorspace;
1184 png_colorspace_sync_info(png_ptr, info_ptr);
1185}
1186#endif
1187#endif
1188
1189#ifdef PNG_COLORSPACE_SUPPORTED
John Bowler736f40f2011-08-25 16:19:44 -05001190/* Added at libpng-1.5.5 to support read and write of true CIEXYZ values for
1191 * cHRM, as opposed to using chromaticities. These internal APIs return
1192 * non-zero on a parameter error. The X, Y and Z values are required to be
1193 * positive and less than 1.0.
1194 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001195static int
1196png_xy_from_XYZ(png_xy *xy, const png_XYZ *XYZ)
John Bowler736f40f2011-08-25 16:19:44 -05001197{
1198 png_int_32 d, dwhite, whiteX, whiteY;
1199
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001200 d = XYZ->red_X + XYZ->red_Y + XYZ->red_Z;
1201 if (!png_muldiv(&xy->redx, XYZ->red_X, PNG_FP_1, d)) return 1;
1202 if (!png_muldiv(&xy->redy, XYZ->red_Y, PNG_FP_1, d)) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001203 dwhite = d;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001204 whiteX = XYZ->red_X;
1205 whiteY = XYZ->red_Y;
John Bowler736f40f2011-08-25 16:19:44 -05001206
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001207 d = XYZ->green_X + XYZ->green_Y + XYZ->green_Z;
1208 if (!png_muldiv(&xy->greenx, XYZ->green_X, PNG_FP_1, d)) return 1;
1209 if (!png_muldiv(&xy->greeny, XYZ->green_Y, PNG_FP_1, d)) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001210 dwhite += d;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001211 whiteX += XYZ->green_X;
1212 whiteY += XYZ->green_Y;
John Bowler736f40f2011-08-25 16:19:44 -05001213
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001214 d = XYZ->blue_X + XYZ->blue_Y + XYZ->blue_Z;
1215 if (!png_muldiv(&xy->bluex, XYZ->blue_X, PNG_FP_1, d)) return 1;
1216 if (!png_muldiv(&xy->bluey, XYZ->blue_Y, PNG_FP_1, d)) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001217 dwhite += d;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001218 whiteX += XYZ->blue_X;
1219 whiteY += XYZ->blue_Y;
John Bowler736f40f2011-08-25 16:19:44 -05001220
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001221 /* The reference white is simply the sum of the end-point (X,Y,Z) vectors,
John Bowler736f40f2011-08-25 16:19:44 -05001222 * thus:
1223 */
1224 if (!png_muldiv(&xy->whitex, whiteX, PNG_FP_1, dwhite)) return 1;
1225 if (!png_muldiv(&xy->whitey, whiteY, PNG_FP_1, dwhite)) return 1;
1226
1227 return 0;
1228}
1229
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001230static int
1231png_XYZ_from_xy(png_XYZ *XYZ, const png_xy *xy)
John Bowler736f40f2011-08-25 16:19:44 -05001232{
1233 png_fixed_point red_inverse, green_inverse, blue_scale;
1234 png_fixed_point left, right, denominator;
1235
1236 /* Check xy and, implicitly, z. Note that wide gamut color spaces typically
1237 * have end points with 0 tristimulus values (these are impossible end
1238 * points, but they are used to cover the possible colors.)
1239 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001240 if (xy->redx < 0 || xy->redx > PNG_FP_1) return 1;
1241 if (xy->redy < 0 || xy->redy > PNG_FP_1-xy->redx) return 1;
1242 if (xy->greenx < 0 || xy->greenx > PNG_FP_1) return 1;
1243 if (xy->greeny < 0 || xy->greeny > PNG_FP_1-xy->greenx) return 1;
1244 if (xy->bluex < 0 || xy->bluex > PNG_FP_1) return 1;
1245 if (xy->bluey < 0 || xy->bluey > PNG_FP_1-xy->bluex) return 1;
1246 if (xy->whitex < 0 || xy->whitex > PNG_FP_1) return 1;
1247 if (xy->whitey < 0 || xy->whitey > PNG_FP_1-xy->whitex) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001248
1249 /* The reverse calculation is more difficult because the original tristimulus
1250 * value had 9 independent values (red,green,blue)x(X,Y,Z) however only 8
1251 * derived values were recorded in the cHRM chunk;
1252 * (red,green,blue,white)x(x,y). This loses one degree of freedom and
1253 * therefore an arbitrary ninth value has to be introduced to undo the
1254 * original transformations.
1255 *
1256 * Think of the original end-points as points in (X,Y,Z) space. The
1257 * chromaticity values (c) have the property:
1258 *
1259 * C
1260 * c = ---------
1261 * X + Y + Z
1262 *
1263 * For each c (x,y,z) from the corresponding original C (X,Y,Z). Thus the
1264 * three chromaticity values (x,y,z) for each end-point obey the
1265 * relationship:
1266 *
1267 * x + y + z = 1
1268 *
1269 * This describes the plane in (X,Y,Z) space that intersects each axis at the
1270 * value 1.0; call this the chromaticity plane. Thus the chromaticity
1271 * calculation has scaled each end-point so that it is on the x+y+z=1 plane
1272 * and chromaticity is the intersection of the vector from the origin to the
1273 * (X,Y,Z) value with the chromaticity plane.
1274 *
1275 * To fully invert the chromaticity calculation we would need the three
1276 * end-point scale factors, (red-scale, green-scale, blue-scale), but these
1277 * were not recorded. Instead we calculated the reference white (X,Y,Z) and
1278 * recorded the chromaticity of this. The reference white (X,Y,Z) would have
1279 * given all three of the scale factors since:
1280 *
1281 * color-C = color-c * color-scale
1282 * white-C = red-C + green-C + blue-C
1283 * = red-c*red-scale + green-c*green-scale + blue-c*blue-scale
1284 *
1285 * But cHRM records only white-x and white-y, so we have lost the white scale
1286 * factor:
1287 *
1288 * white-C = white-c*white-scale
1289 *
1290 * To handle this the inverse transformation makes an arbitrary assumption
1291 * about white-scale:
1292 *
1293 * Assume: white-Y = 1.0
1294 * Hence: white-scale = 1/white-y
1295 * Or: red-Y + green-Y + blue-Y = 1.0
1296 *
1297 * Notice the last statement of the assumption gives an equation in three of
1298 * the nine values we want to calculate. 8 more equations come from the
1299 * above routine as summarised at the top above (the chromaticity
1300 * calculation):
1301 *
1302 * Given: color-x = color-X / (color-X + color-Y + color-Z)
1303 * Hence: (color-x - 1)*color-X + color.x*color-Y + color.x*color-Z = 0
1304 *
1305 * This is 9 simultaneous equations in the 9 variables "color-C" and can be
1306 * solved by Cramer's rule. Cramer's rule requires calculating 10 9x9 matrix
1307 * determinants, however this is not as bad as it seems because only 28 of
1308 * the total of 90 terms in the various matrices are non-zero. Nevertheless
1309 * Cramer's rule is notoriously numerically unstable because the determinant
1310 * calculation involves the difference of large, but similar, numbers. It is
1311 * difficult to be sure that the calculation is stable for real world values
1312 * and it is certain that it becomes unstable where the end points are close
1313 * together.
1314 *
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001315 * So this code uses the perhaps slightly less optimal but more
1316 * understandable and totally obvious approach of calculating color-scale.
John Bowler736f40f2011-08-25 16:19:44 -05001317 *
1318 * This algorithm depends on the precision in white-scale and that is
1319 * (1/white-y), so we can immediately see that as white-y approaches 0 the
1320 * accuracy inherent in the cHRM chunk drops off substantially.
1321 *
1322 * libpng arithmetic: a simple invertion of the above equations
1323 * ------------------------------------------------------------
1324 *
1325 * white_scale = 1/white-y
1326 * white-X = white-x * white-scale
1327 * white-Y = 1.0
1328 * white-Z = (1 - white-x - white-y) * white_scale
1329 *
1330 * white-C = red-C + green-C + blue-C
1331 * = red-c*red-scale + green-c*green-scale + blue-c*blue-scale
1332 *
1333 * This gives us three equations in (red-scale,green-scale,blue-scale) where
1334 * all the coefficients are now known:
1335 *
1336 * red-x*red-scale + green-x*green-scale + blue-x*blue-scale
1337 * = white-x/white-y
1338 * red-y*red-scale + green-y*green-scale + blue-y*blue-scale = 1
1339 * red-z*red-scale + green-z*green-scale + blue-z*blue-scale
1340 * = (1 - white-x - white-y)/white-y
1341 *
1342 * In the last equation color-z is (1 - color-x - color-y) so we can add all
1343 * three equations together to get an alternative third:
1344 *
1345 * red-scale + green-scale + blue-scale = 1/white-y = white-scale
1346 *
1347 * So now we have a Cramer's rule solution where the determinants are just
1348 * 3x3 - far more tractible. Unfortunately 3x3 determinants still involve
1349 * multiplication of three coefficients so we can't guarantee to avoid
1350 * overflow in the libpng fixed point representation. Using Cramer's rule in
1351 * floating point is probably a good choice here, but it's not an option for
1352 * fixed point. Instead proceed to simplify the first two equations by
1353 * eliminating what is likely to be the largest value, blue-scale:
1354 *
1355 * blue-scale = white-scale - red-scale - green-scale
1356 *
1357 * Hence:
1358 *
1359 * (red-x - blue-x)*red-scale + (green-x - blue-x)*green-scale =
1360 * (white-x - blue-x)*white-scale
1361 *
1362 * (red-y - blue-y)*red-scale + (green-y - blue-y)*green-scale =
1363 * 1 - blue-y*white-scale
1364 *
1365 * And now we can trivially solve for (red-scale,green-scale):
1366 *
1367 * green-scale =
1368 * (white-x - blue-x)*white-scale - (red-x - blue-x)*red-scale
1369 * -----------------------------------------------------------
1370 * green-x - blue-x
1371 *
1372 * red-scale =
1373 * 1 - blue-y*white-scale - (green-y - blue-y) * green-scale
1374 * ---------------------------------------------------------
1375 * red-y - blue-y
1376 *
1377 * Hence:
1378 *
1379 * red-scale =
1380 * ( (green-x - blue-x) * (white-y - blue-y) -
1381 * (green-y - blue-y) * (white-x - blue-x) ) / white-y
1382 * -------------------------------------------------------------------------
1383 * (green-x - blue-x)*(red-y - blue-y)-(green-y - blue-y)*(red-x - blue-x)
1384 *
1385 * green-scale =
1386 * ( (red-y - blue-y) * (white-x - blue-x) -
1387 * (red-x - blue-x) * (white-y - blue-y) ) / white-y
1388 * -------------------------------------------------------------------------
1389 * (green-x - blue-x)*(red-y - blue-y)-(green-y - blue-y)*(red-x - blue-x)
1390 *
1391 * Accuracy:
1392 * The input values have 5 decimal digits of accuracy. The values are all in
1393 * the range 0 < value < 1, so simple products are in the same range but may
1394 * need up to 10 decimal digits to preserve the original precision and avoid
1395 * underflow. Because we are using a 32-bit signed representation we cannot
1396 * match this; the best is a little over 9 decimal digits, less than 10.
1397 *
1398 * The approach used here is to preserve the maximum precision within the
1399 * signed representation. Because the red-scale calculation above uses the
1400 * difference between two products of values that must be in the range -1..+1
1401 * it is sufficient to divide the product by 7; ceil(100,000/32767*2). The
1402 * factor is irrelevant in the calculation because it is applied to both
1403 * numerator and denominator.
1404 *
1405 * Note that the values of the differences of the products of the
1406 * chromaticities in the above equations tend to be small, for example for
1407 * the sRGB chromaticities they are:
1408 *
1409 * red numerator: -0.04751
1410 * green numerator: -0.08788
1411 * denominator: -0.2241 (without white-y multiplication)
1412 *
1413 * The resultant Y coefficients from the chromaticities of some widely used
1414 * color space definitions are (to 15 decimal places):
1415 *
1416 * sRGB
1417 * 0.212639005871510 0.715168678767756 0.072192315360734
1418 * Kodak ProPhoto
1419 * 0.288071128229293 0.711843217810102 0.000085653960605
1420 * Adobe RGB
1421 * 0.297344975250536 0.627363566255466 0.075291458493998
1422 * Adobe Wide Gamut RGB
1423 * 0.258728243040113 0.724682314948566 0.016589442011321
1424 */
1425 /* By the argument, above overflow should be impossible here. The return
1426 * value of 2 indicates an internal error to the caller.
1427 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001428 if (!png_muldiv(&left, xy->greenx-xy->bluex, xy->redy - xy->bluey, 7))
1429 return 2;
1430 if (!png_muldiv(&right, xy->greeny-xy->bluey, xy->redx - xy->bluex, 7))
1431 return 2;
John Bowler736f40f2011-08-25 16:19:44 -05001432 denominator = left - right;
1433
1434 /* Now find the red numerator. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001435 if (!png_muldiv(&left, xy->greenx-xy->bluex, xy->whitey-xy->bluey, 7))
1436 return 2;
1437 if (!png_muldiv(&right, xy->greeny-xy->bluey, xy->whitex-xy->bluex, 7))
1438 return 2;
John Bowler736f40f2011-08-25 16:19:44 -05001439
1440 /* Overflow is possible here and it indicates an extreme set of PNG cHRM
1441 * chunk values. This calculation actually returns the reciprocal of the
1442 * scale value because this allows us to delay the multiplication of white-y
1443 * into the denominator, which tends to produce a small number.
1444 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001445 if (!png_muldiv(&red_inverse, xy->whitey, denominator, left-right) ||
1446 red_inverse <= xy->whitey /* r+g+b scales = white scale */)
John Bowler736f40f2011-08-25 16:19:44 -05001447 return 1;
1448
1449 /* Similarly for green_inverse: */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001450 if (!png_muldiv(&left, xy->redy-xy->bluey, xy->whitex-xy->bluex, 7))
1451 return 2;
1452 if (!png_muldiv(&right, xy->redx-xy->bluex, xy->whitey-xy->bluey, 7))
1453 return 2;
1454 if (!png_muldiv(&green_inverse, xy->whitey, denominator, left-right) ||
1455 green_inverse <= xy->whitey)
John Bowler736f40f2011-08-25 16:19:44 -05001456 return 1;
1457
1458 /* And the blue scale, the checks above guarantee this can't overflow but it
1459 * can still produce 0 for extreme cHRM values.
1460 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001461 blue_scale = png_reciprocal(xy->whitey) - png_reciprocal(red_inverse) -
John Bowler736f40f2011-08-25 16:19:44 -05001462 png_reciprocal(green_inverse);
1463 if (blue_scale <= 0) return 1;
1464
1465
1466 /* And fill in the png_XYZ: */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001467 if (!png_muldiv(&XYZ->red_X, xy->redx, PNG_FP_1, red_inverse)) return 1;
1468 if (!png_muldiv(&XYZ->red_Y, xy->redy, PNG_FP_1, red_inverse)) return 1;
1469 if (!png_muldiv(&XYZ->red_Z, PNG_FP_1 - xy->redx - xy->redy, PNG_FP_1,
John Bowler736f40f2011-08-25 16:19:44 -05001470 red_inverse))
1471 return 1;
1472
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001473 if (!png_muldiv(&XYZ->green_X, xy->greenx, PNG_FP_1, green_inverse))
1474 return 1;
1475 if (!png_muldiv(&XYZ->green_Y, xy->greeny, PNG_FP_1, green_inverse))
1476 return 1;
1477 if (!png_muldiv(&XYZ->green_Z, PNG_FP_1 - xy->greenx - xy->greeny, PNG_FP_1,
John Bowler736f40f2011-08-25 16:19:44 -05001478 green_inverse))
1479 return 1;
1480
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001481 if (!png_muldiv(&XYZ->blue_X, xy->bluex, blue_scale, PNG_FP_1)) return 1;
1482 if (!png_muldiv(&XYZ->blue_Y, xy->bluey, blue_scale, PNG_FP_1)) return 1;
1483 if (!png_muldiv(&XYZ->blue_Z, PNG_FP_1 - xy->bluex - xy->bluey, blue_scale,
John Bowler736f40f2011-08-25 16:19:44 -05001484 PNG_FP_1))
1485 return 1;
1486
1487 return 0; /*success*/
1488}
1489
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001490static int
1491png_XYZ_normalize(png_XYZ *XYZ)
John Bowler736f40f2011-08-25 16:19:44 -05001492{
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001493 png_int_32 Y;
1494
1495 if (XYZ->red_Y < 0 || XYZ->green_Y < 0 || XYZ->blue_Y < 0 ||
1496 XYZ->red_X < 0 || XYZ->green_X < 0 || XYZ->blue_X < 0 ||
1497 XYZ->red_Z < 0 || XYZ->green_Z < 0 || XYZ->blue_Z < 0)
1498 return 1;
1499
1500 /* Normalize by scaling so the sum of the end-point Y values is PNG_FP_1.
1501 * IMPLEMENTATION NOTE: ANSI requires signed overflow not to occur, therefore
1502 * relying on addition of two positive values producing a negative one is not
1503 * safe.
1504 */
1505 Y = XYZ->red_Y;
1506 if (0x7fffffff - Y < XYZ->green_X) return 1;
1507 Y += XYZ->green_Y;
1508 if (0x7fffffff - Y < XYZ->blue_X) return 1;
1509 Y += XYZ->blue_Y;
1510
1511 if (Y != PNG_FP_1)
1512 {
1513 if (!png_muldiv(&XYZ->red_X, XYZ->red_X, PNG_FP_1, Y)) return 1;
1514 if (!png_muldiv(&XYZ->red_Y, XYZ->red_Y, PNG_FP_1, Y)) return 1;
1515 if (!png_muldiv(&XYZ->red_Z, XYZ->red_Z, PNG_FP_1, Y)) return 1;
1516
1517 if (!png_muldiv(&XYZ->green_X, XYZ->green_X, PNG_FP_1, Y)) return 1;
1518 if (!png_muldiv(&XYZ->green_Y, XYZ->green_Y, PNG_FP_1, Y)) return 1;
1519 if (!png_muldiv(&XYZ->green_Z, XYZ->green_Z, PNG_FP_1, Y)) return 1;
1520
1521 if (!png_muldiv(&XYZ->blue_X, XYZ->blue_X, PNG_FP_1, Y)) return 1;
1522 if (!png_muldiv(&XYZ->blue_Y, XYZ->blue_Y, PNG_FP_1, Y)) return 1;
1523 if (!png_muldiv(&XYZ->blue_Z, XYZ->blue_Z, PNG_FP_1, Y)) return 1;
1524 }
1525
1526 return 0;
1527}
1528
1529static int
1530png_colorspace_endpoints_match(const png_xy *xy1, const png_xy *xy2, int delta)
1531{
1532 /* Allow an error of +/-0.01 (absolute value) on each chromaticity */
1533 return !(PNG_OUT_OF_RANGE(xy1->whitex, xy2->whitex,delta) ||
1534 PNG_OUT_OF_RANGE(xy1->whitey, xy2->whitey,delta) ||
1535 PNG_OUT_OF_RANGE(xy1->redx, xy2->redx, delta) ||
1536 PNG_OUT_OF_RANGE(xy1->redy, xy2->redy, delta) ||
1537 PNG_OUT_OF_RANGE(xy1->greenx, xy2->greenx,delta) ||
1538 PNG_OUT_OF_RANGE(xy1->greeny, xy2->greeny,delta) ||
1539 PNG_OUT_OF_RANGE(xy1->bluex, xy2->bluex, delta) ||
1540 PNG_OUT_OF_RANGE(xy1->bluey, xy2->bluey, delta));
1541}
1542
1543/* Added in libpng-1.6.0, a different check for the validity of a set of cHRM
1544 * chunk chromaticities. Earlier checks used to simply look for the overflow
1545 * condition (where the determinant of the matrix to solve for XYZ ends up zero
1546 * because the chromaticity values are not all distinct.) Despite this it is
1547 * theoretically possible to produce chromaticities that are apparently valid
1548 * but that rapidly degrade to invalid, potentially crashing, sets because of
1549 * arithmetic inaccuracies when calculations are performed on them. The new
1550 * check is to round-trip xy -> XYZ -> xy and then check that the result is
1551 * within a small percentage of the original.
1552 */
1553static int
1554png_colorspace_check_xy(png_XYZ *XYZ, const png_xy *xy)
1555{
1556 int result;
1557 png_xy xy_test;
1558
1559 /* As a side-effect this routine also returns the XYZ endpoints. */
1560 result = png_XYZ_from_xy(XYZ, xy);
1561 if (result) return result;
1562
1563 result = png_xy_from_XYZ(&xy_test, XYZ);
1564 if (result) return result;
1565
1566 if (png_colorspace_endpoints_match(xy, &xy_test,
1567 5/*actually, the math is pretty accurate*/))
1568 return 0;
1569
1570 /* Too much slip */
1571 return 1;
1572}
1573
1574/* This is the check going the other way. The XYZ is modified to normalize it
1575 * (another side-effect) and the xy chromaticities are returned.
1576 */
1577static int
1578png_colorspace_check_XYZ(png_xy *xy, png_XYZ *XYZ)
1579{
1580 int result;
1581 png_XYZ XYZtemp;
1582
1583 result = png_XYZ_normalize(XYZ);
1584 if (result) return result;
1585
1586 result = png_xy_from_XYZ(xy, XYZ);
1587 if (result) return result;
1588
1589 XYZtemp = *XYZ;
1590 return png_colorspace_check_xy(&XYZtemp, xy);
1591}
1592
1593/* Used to check for an endpoint match against sRGB */
1594static const png_xy sRGB_xy = /* From ITU-R BT.709-3 */
1595{
1596 /* color x y */
1597 /* red */ 64000, 33000,
1598 /* green */ 30000, 60000,
1599 /* blue */ 15000, 6000,
1600 /* white */ 31270, 32900
1601};
1602
1603static int
1604png_colorspace_set_xy_and_XYZ(png_const_structrp png_ptr,
1605 png_colorspacerp colorspace, const png_xy *xy, const png_XYZ *XYZ,
1606 int preferred)
1607{
1608 if (colorspace->flags & PNG_COLORSPACE_INVALID)
1609 return 0;
1610
1611 /* The consistency check is performed on the chromaticities; this factors out
1612 * variations because of the normalization (or not) of the end point Y
1613 * values.
1614 */
1615 if (preferred < 2 && (colorspace->flags & PNG_COLORSPACE_HAVE_ENDPOINTS))
1616 {
1617 /* The end points must be reasonably close to any we already have. The
1618 * following allows an error of up to +/-.001
1619 */
1620 if (!png_colorspace_endpoints_match(xy, &colorspace->end_points_xy, 100))
1621 {
1622 colorspace->flags |= PNG_COLORSPACE_INVALID;
1623 png_benign_error(png_ptr, "inconsistent chromaticities");
1624 return 0; /* failed */
1625 }
1626
1627 /* Only overwrite with preferred values */
1628 if (!preferred)
1629 return 1; /* ok, but no change */
1630 }
1631
1632 colorspace->end_points_xy = *xy;
1633 colorspace->end_points_XYZ = *XYZ;
1634 colorspace->flags |= PNG_COLORSPACE_HAVE_ENDPOINTS;
1635
1636 /* The end points are normally quoted to two decimal digits, so allow +/-0.01
1637 * on this test.
1638 */
1639 if (png_colorspace_endpoints_match(xy, &sRGB_xy, 1000))
1640 colorspace->flags |= PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB;
1641
1642 else
1643 colorspace->flags &= PNG_COLORSPACE_CANCEL(
1644 PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB);
1645
1646 return 2; /* ok and changed */
1647}
1648
1649int /* PRIVATE */
1650png_colorspace_set_chromaticities(png_const_structrp png_ptr,
1651 png_colorspacerp colorspace, const png_xy *xy, int preferred)
1652{
1653 /* We must check the end points to ensure they are reasonable - in the past
1654 * color management systems have crashed as a result of getting bogus
1655 * colorant values, while this isn't the fault of libpng it is the
1656 * responsibility of libpng because PNG carries the bomb and libpng is in a
1657 * position to protect against it.
1658 */
1659 png_XYZ XYZ;
1660
1661 switch (png_colorspace_check_xy(&XYZ, xy))
John Bowler736f40f2011-08-25 16:19:44 -05001662 {
1663 case 0: /* success */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001664 return png_colorspace_set_xy_and_XYZ(png_ptr, colorspace, xy, &XYZ,
1665 preferred);
John Bowler736f40f2011-08-25 16:19:44 -05001666
1667 case 1:
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001668 /* We can't invert the chromaticities so we can't produce value XYZ
1669 * values. Likely as not a color management system will fail too.
John Bowler736f40f2011-08-25 16:19:44 -05001670 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001671 colorspace->flags |= PNG_COLORSPACE_INVALID;
1672 png_benign_error(png_ptr, "invalid chromaticities");
John Bowler736f40f2011-08-25 16:19:44 -05001673 break;
1674
1675 default:
1676 /* libpng is broken; this should be a warning but if it happens we
1677 * want error reports so for the moment it is an error.
1678 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001679 colorspace->flags |= PNG_COLORSPACE_INVALID;
1680 png_error(png_ptr, "internal error checking chromaticities");
John Bowler736f40f2011-08-25 16:19:44 -05001681 break;
1682 }
1683
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001684 return 0; /* failed */
1685}
1686
1687int /* PRIVATE */
1688png_colorspace_set_endpoints(png_const_structrp png_ptr,
1689 png_colorspacerp colorspace, const png_XYZ *XYZ_in, int preferred)
1690{
1691 png_XYZ XYZ = *XYZ_in;
1692 png_xy xy;
1693
1694 switch (png_colorspace_check_XYZ(&xy, &XYZ))
1695 {
1696 case 0:
1697 return png_colorspace_set_xy_and_XYZ(png_ptr, colorspace, &xy, &XYZ,
1698 preferred);
1699
1700 case 1:
1701 /* End points are invalid. */
1702 colorspace->flags |= PNG_COLORSPACE_INVALID;
1703 png_benign_error(png_ptr, "invalid end points");
1704 break;
1705
1706 default:
1707 colorspace->flags |= PNG_COLORSPACE_INVALID;
1708 png_error(png_ptr, "internal error checking chromaticities");
1709 break;
1710 }
1711
1712 return 0; /* failed */
1713}
1714
1715#if defined(PNG_sRGB_SUPPORTED) || defined(PNG_iCCP_SUPPORTED)
1716/* Error message generation */
1717static char
1718png_icc_tag_char(png_uint_32 byte)
1719{
1720 byte &= 0xff;
1721 if (byte >= 32 && byte <= 126)
1722 return (char)byte;
1723 else
1724 return '?';
1725}
1726
1727static void
1728png_icc_tag_name(char *name, png_uint_32 tag)
1729{
1730 name[0] = '\'';
1731 name[1] = png_icc_tag_char(tag >> 24);
1732 name[2] = png_icc_tag_char(tag >> 16);
1733 name[3] = png_icc_tag_char(tag >> 8);
1734 name[4] = png_icc_tag_char(tag );
1735 name[5] = '\'';
1736}
1737
1738static int
1739is_ICC_signature_char(png_alloc_size_t it)
1740{
1741 return it == 32 || (it >= 48 && it <= 57) || (it >= 65 && it <= 90) ||
1742 (it >= 97 && it <= 122);
1743}
1744
1745static int is_ICC_signature(png_alloc_size_t it)
1746{
1747 return is_ICC_signature_char(it >> 24) /* checks all the top bits */ &&
1748 is_ICC_signature_char((it >> 16) & 0xff) &&
1749 is_ICC_signature_char((it >> 8) & 0xff) &&
1750 is_ICC_signature_char(it & 0xff);
1751}
1752
1753static int
1754png_icc_profile_error(png_const_structrp png_ptr, png_colorspacerp colorspace,
1755 png_const_charp name, png_alloc_size_t value, png_const_charp reason)
1756{
1757 size_t pos;
1758 char message[196]; /* see below for calculation */
1759
1760 if (colorspace != NULL)
1761 colorspace->flags |= PNG_COLORSPACE_INVALID;
1762
1763 pos = png_safecat(message, (sizeof message), 0, "profile '"); /* 9 chars */
1764 pos = png_safecat(message, pos+79, pos, name); /* Truncate to 79 chars */
1765 pos = png_safecat(message, (sizeof message), pos, "': "); /* +2 = 90 */
1766 if (is_ICC_signature(value))
1767 {
1768 /* So 'value' is at most 4 bytes and the following cast is safe */
1769 png_icc_tag_name(message+pos, (png_uint_32)value);
1770 pos += 6; /* total +8; less than the else clause */
1771 message[pos++] = ':';
1772 message[pos++] = ' ';
1773 }
1774# ifdef PNG_WARNINGS_SUPPORTED
1775 else
1776 {
1777 char number[PNG_NUMBER_BUFFER_SIZE]; /* +24 = 114*/
1778
1779 pos = png_safecat(message, (sizeof message), pos,
1780 png_format_number(number, number+(sizeof number),
1781 PNG_NUMBER_FORMAT_x, value));
1782 pos = png_safecat(message, (sizeof message), pos, "h: "); /*+2 = 116*/
1783 }
1784# endif
1785 /* The 'reason' is an arbitrary message, allow +79 maximum 195 */
1786 pos = png_safecat(message, (sizeof message), pos, reason);
Glenn Randers-Pehrson3f8a2ed2013-11-25 10:38:21 -06001787 PNG_UNUSED(pos)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001788
1789 /* This is recoverable, but make it unconditionally an app_error on write to
1790 * avoid writing invalid ICC profiles into PNG files. (I.e. we handle them
1791 * on read, with a warning, but on write unless the app turns off
1792 * application errors the PNG won't be written.)
1793 */
1794 png_chunk_report(png_ptr, message,
1795 (colorspace != NULL) ? PNG_CHUNK_ERROR : PNG_CHUNK_WRITE_ERROR);
1796
John Bowler736f40f2011-08-25 16:19:44 -05001797 return 0;
1798}
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001799#endif /* sRGB || iCCP */
1800
1801#ifdef PNG_sRGB_SUPPORTED
1802int /* PRIVATE */
1803png_colorspace_set_sRGB(png_const_structrp png_ptr, png_colorspacerp colorspace,
1804 int intent)
1805{
1806 /* sRGB sets known gamma, end points and (from the chunk) intent. */
1807 /* IMPORTANT: these are not necessarily the values found in an ICC profile
1808 * because ICC profiles store values adapted to a D50 environment; it is
1809 * expected that the ICC profile mediaWhitePointTag will be D50, see the
1810 * checks and code elsewhere to understand this better.
1811 *
1812 * These XYZ values, which are accurate to 5dp, produce rgb to gray
1813 * coefficients of (6968,23435,2366), which are reduced (because they add up
1814 * to 32769 not 32768) to (6968,23434,2366). These are the values that
1815 * libpng has traditionally used (and are the best values given the 15bit
1816 * algorithm used by the rgb to gray code.)
1817 */
1818 static const png_XYZ sRGB_XYZ = /* D65 XYZ (*not* the D50 adapted values!) */
1819 {
1820 /* color X Y Z */
1821 /* red */ 41239, 21264, 1933,
1822 /* green */ 35758, 71517, 11919,
1823 /* blue */ 18048, 7219, 95053
1824 };
1825
1826 /* Do nothing if the colorspace is already invalidated. */
1827 if (colorspace->flags & PNG_COLORSPACE_INVALID)
1828 return 0;
1829
1830 /* Check the intent, then check for existing settings. It is valid for the
1831 * PNG file to have cHRM or gAMA chunks along with sRGB, but the values must
1832 * be consistent with the correct values. If, however, this function is
1833 * called below because an iCCP chunk matches sRGB then it is quite
1834 * conceivable that an older app recorded incorrect gAMA and cHRM because of
1835 * an incorrect calculation based on the values in the profile - this does
1836 * *not* invalidate the profile (though it still produces an error, which can
1837 * be ignored.)
1838 */
1839 if (intent < 0 || intent >= PNG_sRGB_INTENT_LAST)
1840 return png_icc_profile_error(png_ptr, colorspace, "sRGB",
1841 (unsigned)intent, "invalid sRGB rendering intent");
1842
1843 if ((colorspace->flags & PNG_COLORSPACE_HAVE_INTENT) != 0 &&
1844 colorspace->rendering_intent != intent)
1845 return png_icc_profile_error(png_ptr, colorspace, "sRGB",
1846 (unsigned)intent, "inconsistent rendering intents");
1847
1848 if ((colorspace->flags & PNG_COLORSPACE_FROM_sRGB) != 0)
1849 {
1850 png_benign_error(png_ptr, "duplicate sRGB information ignored");
1851 return 0;
1852 }
1853
1854 /* If the standard sRGB cHRM chunk does not match the one from the PNG file
1855 * warn but overwrite the value with the correct one.
1856 */
1857 if ((colorspace->flags & PNG_COLORSPACE_HAVE_ENDPOINTS) != 0 &&
1858 !png_colorspace_endpoints_match(&sRGB_xy, &colorspace->end_points_xy,
1859 100))
1860 png_chunk_report(png_ptr, "cHRM chunk does not match sRGB",
1861 PNG_CHUNK_ERROR);
1862
1863 /* This check is just done for the error reporting - the routine always
1864 * returns true when the 'from' argument corresponds to sRGB (2).
1865 */
1866 (void)png_colorspace_check_gamma(png_ptr, colorspace, PNG_GAMMA_sRGB_INVERSE,
1867 2/*from sRGB*/);
1868
1869 /* intent: bugs in GCC force 'int' to be used as the parameter type. */
1870 colorspace->rendering_intent = (png_uint_16)intent;
1871 colorspace->flags |= PNG_COLORSPACE_HAVE_INTENT;
1872
1873 /* endpoints */
1874 colorspace->end_points_xy = sRGB_xy;
1875 colorspace->end_points_XYZ = sRGB_XYZ;
1876 colorspace->flags |=
1877 (PNG_COLORSPACE_HAVE_ENDPOINTS|PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB);
1878
1879 /* gamma */
1880 colorspace->gamma = PNG_GAMMA_sRGB_INVERSE;
1881 colorspace->flags |= PNG_COLORSPACE_HAVE_GAMMA;
1882
1883 /* Finally record that we have an sRGB profile */
1884 colorspace->flags |=
1885 (PNG_COLORSPACE_MATCHES_sRGB|PNG_COLORSPACE_FROM_sRGB);
1886
1887 return 1; /* set */
1888}
1889#endif /* sRGB */
1890
1891#ifdef PNG_iCCP_SUPPORTED
1892/* Encoded value of D50 as an ICC XYZNumber. From the ICC 2010 spec the value
1893 * is XYZ(0.9642,1.0,0.8249), which scales to:
1894 *
1895 * (63189.8112, 65536, 54060.6464)
1896 */
1897static const png_byte D50_nCIEXYZ[12] =
1898 { 0x00, 0x00, 0xf6, 0xd6, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x2d };
1899
1900int /* PRIVATE */
1901png_icc_check_length(png_const_structrp png_ptr, png_colorspacerp colorspace,
1902 png_const_charp name, png_uint_32 profile_length)
1903{
1904 if (profile_length < 132)
1905 return png_icc_profile_error(png_ptr, colorspace, name, profile_length,
1906 "too short");
1907
1908 if (profile_length & 3)
1909 return png_icc_profile_error(png_ptr, colorspace, name, profile_length,
1910 "invalid length");
1911
1912 return 1;
1913}
1914
1915int /* PRIVATE */
1916png_icc_check_header(png_const_structrp png_ptr, png_colorspacerp colorspace,
1917 png_const_charp name, png_uint_32 profile_length,
1918 png_const_bytep profile/* first 132 bytes only */, int color_type)
1919{
1920 png_uint_32 temp;
1921
1922 /* Length check; this cannot be ignored in this code because profile_length
1923 * is used later to check the tag table, so even if the profile seems over
1924 * long profile_length from the caller must be correct. The caller can fix
1925 * this up on read or write by just passing in the profile header length.
1926 */
1927 temp = png_get_uint_32(profile);
1928 if (temp != profile_length)
1929 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1930 "length does not match profile");
1931
1932 temp = png_get_uint_32(profile+128); /* tag count: 12 bytes/tag */
Glenn Randers-Pehrson67a289f2013-04-19 19:03:34 -05001933 if (temp > 357913930 || /* (2^32-4-132)/12: maximum possible tag count */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001934 profile_length < 132+12*temp) /* truncated tag table */
1935 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1936 "tag count too large");
1937
1938 /* The 'intent' must be valid or we can't store it, ICC limits the intent to
1939 * 16 bits.
1940 */
1941 temp = png_get_uint_32(profile+64);
1942 if (temp >= 0xffff) /* The ICC limit */
1943 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1944 "invalid rendering intent");
1945
1946 /* This is just a warning because the profile may be valid in future
1947 * versions.
1948 */
1949 if (temp >= PNG_sRGB_INTENT_LAST)
1950 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
1951 "intent outside defined range");
1952
1953 /* At this point the tag table can't be checked because it hasn't necessarily
1954 * been loaded; however, various header fields can be checked. These checks
1955 * are for values permitted by the PNG spec in an ICC profile; the PNG spec
1956 * restricts the profiles that can be passed in an iCCP chunk (they must be
1957 * appropriate to processing PNG data!)
1958 */
1959
1960 /* Data checks (could be skipped). These checks must be independent of the
1961 * version number; however, the version number doesn't accomodate changes in
1962 * the header fields (just the known tags and the interpretation of the
1963 * data.)
1964 */
1965 temp = png_get_uint_32(profile+36); /* signature 'ascp' */
1966 if (temp != 0x61637370)
1967 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1968 "invalid signature");
1969
1970 /* Currently the PCS illuminant/adopted white point (the computational
1971 * white point) are required to be D50,
1972 * however the profile contains a record of the illuminant so perhaps ICC
1973 * expects to be able to change this in the future (despite the rationale in
1974 * the introduction for using a fixed PCS adopted white.) Consequently the
1975 * following is just a warning.
1976 */
1977 if (memcmp(profile+68, D50_nCIEXYZ, 12) != 0)
1978 (void)png_icc_profile_error(png_ptr, NULL, name, 0/*no tag value*/,
1979 "PCS illuminant is not D50");
1980
1981 /* The PNG spec requires this:
1982 * "If the iCCP chunk is present, the image samples conform to the colour
1983 * space represented by the embedded ICC profile as defined by the
1984 * International Color Consortium [ICC]. The colour space of the ICC profile
1985 * shall be an RGB colour space for colour images (PNG colour types 2, 3, and
1986 * 6), or a greyscale colour space for greyscale images (PNG colour types 0
1987 * and 4)."
1988 *
1989 * This checking code ensures the embedded profile (on either read or write)
1990 * conforms to the specification requirements. Notice that an ICC 'gray'
1991 * color-space profile contains the information to transform the monochrome
1992 * data to XYZ or L*a*b (according to which PCS the profile uses) and this
1993 * should be used in preference to the standard libpng K channel replication
1994 * into R, G and B channels.
1995 *
1996 * Previously it was suggested that an RGB profile on grayscale data could be
1997 * handled. However it it is clear that using an RGB profile in this context
1998 * must be an error - there is no specification of what it means. Thus it is
1999 * almost certainly more correct to ignore the profile.
2000 */
2001 temp = png_get_uint_32(profile+16); /* data colour space field */
2002 switch (temp)
2003 {
2004 case 0x52474220: /* 'RGB ' */
2005 if (!(color_type & PNG_COLOR_MASK_COLOR))
2006 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2007 "RGB color space not permitted on grayscale PNG");
2008 break;
2009
2010 case 0x47524159: /* 'GRAY' */
2011 if (color_type & PNG_COLOR_MASK_COLOR)
2012 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2013 "Gray color space not permitted on RGB PNG");
2014 break;
2015
2016 default:
2017 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2018 "invalid ICC profile color space");
2019 }
2020
2021 /* It is up to the application to check that the profile class matches the
2022 * application requirements; the spec provides no guidance, but it's pretty
2023 * weird if the profile is not scanner ('scnr'), monitor ('mntr'), printer
2024 * ('prtr') or 'spac' (for generic color spaces). Issue a warning in these
2025 * cases. Issue an error for device link or abstract profiles - these don't
2026 * contain the records necessary to transform the color-space to anything
2027 * other than the target device (and not even that for an abstract profile).
2028 * Profiles of these classes may not be embedded in images.
2029 */
2030 temp = png_get_uint_32(profile+12); /* profile/device class */
2031 switch (temp)
2032 {
2033 case 0x73636E72: /* 'scnr' */
2034 case 0x6D6E7472: /* 'mntr' */
2035 case 0x70727472: /* 'prtr' */
2036 case 0x73706163: /* 'spac' */
2037 /* All supported */
2038 break;
2039
2040 case 0x61627374: /* 'abst' */
2041 /* May not be embedded in an image */
2042 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2043 "invalid embedded Abstract ICC profile");
2044
2045 case 0x6C696E6B: /* 'link' */
2046 /* DeviceLink profiles cannnot be interpreted in a non-device specific
2047 * fashion, if an app uses the AToB0Tag in the profile the results are
2048 * undefined unless the result is sent to the intended device,
2049 * therefore a DeviceLink profile should not be found embedded in a
2050 * PNG.
2051 */
2052 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2053 "unexpected DeviceLink ICC profile class");
2054
2055 case 0x6E6D636C: /* 'nmcl' */
2056 /* A NamedColor profile is also device specific, however it doesn't
2057 * contain an AToB0 tag that is open to misintrepretation. Almost
2058 * certainly it will fail the tests below.
2059 */
2060 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
2061 "unexpected NamedColor ICC profile class");
2062 break;
2063
2064 default:
2065 /* To allow for future enhancements to the profile accept unrecognized
2066 * profile classes with a warning, these then hit the test below on the
2067 * tag content to ensure they are backward compatible with one of the
2068 * understood profiles.
2069 */
2070 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
2071 "unrecognized ICC profile class");
2072 break;
2073 }
2074
2075 /* For any profile other than a device link one the PCS must be encoded
2076 * either in XYZ or Lab.
2077 */
2078 temp = png_get_uint_32(profile+20);
2079 switch (temp)
2080 {
2081 case 0x58595A20: /* 'XYZ ' */
2082 case 0x4C616220: /* 'Lab ' */
2083 break;
2084
2085 default:
2086 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2087 "unexpected ICC PCS encoding");
2088 }
2089
2090 return 1;
2091}
2092
2093int /* PRIVATE */
2094png_icc_check_tag_table(png_const_structrp png_ptr, png_colorspacerp colorspace,
2095 png_const_charp name, png_uint_32 profile_length,
2096 png_const_bytep profile /* header plus whole tag table */)
2097{
2098 png_uint_32 tag_count = png_get_uint_32(profile+128);
2099 png_uint_32 itag;
2100 png_const_bytep tag = profile+132; /* The first tag */
2101
2102 /* First scan all the tags in the table and add bits to the icc_info value
2103 * (temporarily in 'tags').
2104 */
2105 for (itag=0; itag < tag_count; ++itag, tag += 12)
2106 {
2107 png_uint_32 tag_id = png_get_uint_32(tag+0);
2108 png_uint_32 tag_start = png_get_uint_32(tag+4); /* must be aligned */
2109 png_uint_32 tag_length = png_get_uint_32(tag+8);/* not padded */
2110
2111 /* The ICC specification does not exclude zero length tags, therefore the
2112 * start might actually be anywhere if there is no data, but this would be
2113 * a clear abuse of the intent of the standard so the start is checked for
2114 * being in range. All defined tag types have an 8 byte header - a 4 byte
2115 * type signature then 0.
2116 */
2117 if ((tag_start & 3) != 0)
2118 {
2119 /* CNHP730S.icc shipped with Microsoft Windows 64 violates this, it is
2120 * only a warning here because libpng does not care about the
2121 * alignment.
2122 */
2123 (void)png_icc_profile_error(png_ptr, NULL, name, tag_id,
2124 "ICC profile tag start not a multiple of 4");
2125 }
2126
2127 /* This is a hard error; potentially it can cause read outside the
2128 * profile.
2129 */
2130 if (tag_start > profile_length || tag_length > profile_length - tag_start)
2131 return png_icc_profile_error(png_ptr, colorspace, name, tag_id,
2132 "ICC profile tag outside profile");
2133 }
2134
2135 return 1; /* success, maybe with warnings */
2136}
2137
2138#ifdef PNG_sRGB_SUPPORTED
2139/* Information about the known ICC sRGB profiles */
2140static const struct
2141{
2142 png_uint_32 adler, crc, length;
2143 png_uint_32 md5[4];
2144 png_byte have_md5;
2145 png_byte is_broken;
2146 png_uint_16 intent;
2147
2148# define PNG_MD5(a,b,c,d) { a, b, c, d }, (a!=0)||(b!=0)||(c!=0)||(d!=0)
2149# define PNG_ICC_CHECKSUM(adler, crc, md5, intent, broke, date, length, fname)\
2150 { adler, crc, length, md5, broke, intent },
2151
2152} png_sRGB_checks[] =
2153{
2154 /* This data comes from contrib/tools/checksum-icc run on downloads of
2155 * all four ICC sRGB profiles from www.color.org.
2156 */
2157 /* adler32, crc32, MD5[4], intent, date, length, file-name */
2158 PNG_ICC_CHECKSUM(0x0a3fd9f6, 0x3b8772b9,
2159 PNG_MD5(0x29f83dde, 0xaff255ae, 0x7842fae4, 0xca83390d), 0, 0,
2160 "2009/03/27 21:36:31", 3048, "sRGB_IEC61966-2-1_black_scaled.icc")
2161
2162 /* ICC sRGB v2 perceptual no black-compensation: */
2163 PNG_ICC_CHECKSUM(0x4909e5e1, 0x427ebb21,
2164 PNG_MD5(0xc95bd637, 0xe95d8a3b, 0x0df38f99, 0xc1320389), 1, 0,
2165 "2009/03/27 21:37:45", 3052, "sRGB_IEC61966-2-1_no_black_scaling.icc")
2166
2167 PNG_ICC_CHECKSUM(0xfd2144a1, 0x306fd8ae,
2168 PNG_MD5(0xfc663378, 0x37e2886b, 0xfd72e983, 0x8228f1b8), 0, 0,
2169 "2009/08/10 17:28:01", 60988, "sRGB_v4_ICC_preference_displayclass.icc")
2170
2171 /* ICC sRGB v4 perceptual */
2172 PNG_ICC_CHECKSUM(0x209c35d2, 0xbbef7812,
2173 PNG_MD5(0x34562abf, 0x994ccd06, 0x6d2c5721, 0xd0d68c5d), 0, 0,
2174 "2007/07/25 00:05:37", 60960, "sRGB_v4_ICC_preference.icc")
2175
2176 /* The following profiles have no known MD5 checksum. If there is a match
2177 * on the (empty) MD5 the other fields are used to attempt a match and
2178 * a warning is produced. The first two of these profiles have a 'cprt' tag
2179 * which suggests that they were also made by Hewlett Packard.
2180 */
2181 PNG_ICC_CHECKSUM(0xa054d762, 0x5d5129ce,
2182 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 1, 0,
2183 "2004/07/21 18:57:42", 3024, "sRGB_IEC61966-2-1_noBPC.icc")
2184
2185 /* This is a 'mntr' (display) profile with a mediaWhitePointTag that does not
2186 * match the D50 PCS illuminant in the header (it is in fact the D65 values,
2187 * so the white point is recorded as the un-adapted value.) The profiles
2188 * below only differ in one byte - the intent - and are basically the same as
2189 * the previous profile except for the mediaWhitePointTag error and a missing
2190 * chromaticAdaptationTag.
2191 */
2192 PNG_ICC_CHECKSUM(0xf784f3fb, 0x182ea552,
2193 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 0, 1/*broken*/,
2194 "1998/02/09 06:49:00", 3144, "HP-Microsoft sRGB v2 perceptual")
2195
2196 PNG_ICC_CHECKSUM(0x0398f3fc, 0xf29e526d,
2197 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 1, 1/*broken*/,
2198 "1998/02/09 06:49:00", 3144, "HP-Microsoft sRGB v2 media-relative")
2199};
2200
2201static int
2202png_compare_ICC_profile_with_sRGB(png_const_structrp png_ptr,
2203 png_const_bytep profile, uLong adler)
2204{
2205 /* The quick check is to verify just the MD5 signature and trust the
2206 * rest of the data. Because the profile has already been verified for
2207 * correctness this is safe. png_colorspace_set_sRGB will check the 'intent'
2208 * field too, so if the profile has been edited with an intent not defined
2209 * by sRGB (but maybe defined by a later ICC specification) the read of
2210 * the profile will fail at that point.
2211 */
2212 png_uint_32 length = 0;
2213 png_uint_32 intent = 0x10000; /* invalid */
2214#if PNG_sRGB_PROFILE_CHECKS > 1
2215 uLong crc = 0; /* the value for 0 length data */
John Bowler921648a2012-03-28 23:36:12 -05002216#endif
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002217 unsigned int i;
2218
2219 for (i=0; i < (sizeof png_sRGB_checks) / (sizeof png_sRGB_checks[0]); ++i)
2220 {
2221 if (png_get_uint_32(profile+84) == png_sRGB_checks[i].md5[0] &&
2222 png_get_uint_32(profile+88) == png_sRGB_checks[i].md5[1] &&
2223 png_get_uint_32(profile+92) == png_sRGB_checks[i].md5[2] &&
2224 png_get_uint_32(profile+96) == png_sRGB_checks[i].md5[3])
2225 {
2226 /* This may be one of the old HP profiles without an MD5, in that
2227 * case we can only use the length and Adler32 (note that these
2228 * are not used by default if there is an MD5!)
2229 */
2230# if PNG_sRGB_PROFILE_CHECKS == 0
2231 if (png_sRGB_checks[i].have_md5)
2232 return 1+png_sRGB_checks[i].is_broken;
2233# endif
2234
2235 /* Profile is unsigned or more checks have been configured in. */
2236 if (length == 0)
2237 {
2238 length = png_get_uint_32(profile);
2239 intent = png_get_uint_32(profile+64);
2240 }
2241
2242 /* Length *and* intent must match */
2243 if (length == png_sRGB_checks[i].length &&
2244 intent == png_sRGB_checks[i].intent)
2245 {
Glenn Randers-Pehrson1f24cb72013-03-04 21:58:02 -06002246 /* Now calculate the adler32 if not done already. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002247 if (adler == 0)
2248 {
2249 adler = adler32(0, NULL, 0);
2250 adler = adler32(adler, profile, length);
2251 }
2252
2253 if (adler == png_sRGB_checks[i].adler)
2254 {
2255 /* These basic checks suggest that the data has not been
2256 * modified, but if the check level is more than 1 perform
2257 * our own crc32 checksum on the data.
2258 */
2259# if PNG_sRGB_PROFILE_CHECKS > 1
2260 if (crc == 0)
2261 {
2262 crc = crc32(0, NULL, 0);
2263 crc = crc32(crc, profile, length);
2264 }
2265
2266 /* So this check must pass for the 'return' below to happen.
2267 */
2268 if (crc == png_sRGB_checks[i].crc)
2269# endif
2270 {
2271 if (png_sRGB_checks[i].is_broken)
2272 {
2273 /* These profiles are known to have bad data that may cause
2274 * problems if they are used, therefore attempt to
2275 * discourage their use, skip the 'have_md5' warning below,
2276 * which is made irrelevant by this error.
2277 */
2278 png_chunk_report(png_ptr, "known incorrect sRGB profile",
2279 PNG_CHUNK_ERROR);
2280 }
2281
2282 /* Warn that this being done; this isn't even an error since
2283 * the profile is perfectly valid, but it would be nice if
2284 * people used the up-to-date ones.
2285 */
2286 else if (!png_sRGB_checks[i].have_md5)
2287 {
2288 png_chunk_report(png_ptr,
2289 "out-of-date sRGB profile with no signature",
2290 PNG_CHUNK_WARNING);
2291 }
2292
2293 return 1+png_sRGB_checks[i].is_broken;
2294 }
2295 }
2296 }
2297
2298# if PNG_sRGB_PROFILE_CHECKS > 0
2299 /* The signature matched, but the profile had been changed in some
2300 * way. This is an apparent violation of the ICC terms of use and,
2301 * anyway, probably indicates a data error or uninformed hacking.
2302 */
2303 if (png_sRGB_checks[i].have_md5)
2304 png_benign_error(png_ptr,
2305 "copyright violation: edited ICC profile ignored");
2306# endif
2307 }
2308 }
2309
2310 return 0; /* no match */
2311}
2312#endif
2313
2314#ifdef PNG_sRGB_SUPPORTED
2315void /* PRIVATE */
2316png_icc_set_sRGB(png_const_structrp png_ptr,
2317 png_colorspacerp colorspace, png_const_bytep profile, uLong adler)
2318{
2319 /* Is this profile one of the known ICC sRGB profiles? If it is, just set
2320 * the sRGB information.
2321 */
2322 if (png_compare_ICC_profile_with_sRGB(png_ptr, profile, adler))
2323 (void)png_colorspace_set_sRGB(png_ptr, colorspace,
2324 (int)/*already checked*/png_get_uint_32(profile+64));
2325}
2326#endif /* PNG_READ_sRGB_SUPPORTED */
2327
2328int /* PRIVATE */
2329png_colorspace_set_ICC(png_const_structrp png_ptr, png_colorspacerp colorspace,
2330 png_const_charp name, png_uint_32 profile_length, png_const_bytep profile,
2331 int color_type)
2332{
2333 if (colorspace->flags & PNG_COLORSPACE_INVALID)
2334 return 0;
2335
2336 if (png_icc_check_length(png_ptr, colorspace, name, profile_length) &&
2337 png_icc_check_header(png_ptr, colorspace, name, profile_length, profile,
2338 color_type) &&
2339 png_icc_check_tag_table(png_ptr, colorspace, name, profile_length,
2340 profile))
2341 {
John Bowlere4413a72013-04-17 21:27:47 -05002342# ifdef PNG_sRGB_SUPPORTED
2343 /* If no sRGB support, don't try storing sRGB information */
2344 png_icc_set_sRGB(png_ptr, colorspace, profile, 0);
2345# endif
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002346 return 1;
2347 }
2348
2349 /* Failure case */
2350 return 0;
2351}
2352#endif /* iCCP */
2353
2354#ifdef PNG_READ_RGB_TO_GRAY_SUPPORTED
2355void /* PRIVATE */
2356png_colorspace_set_rgb_coefficients(png_structrp png_ptr)
2357{
2358 /* Set the rgb_to_gray coefficients from the colorspace. */
2359 if (!png_ptr->rgb_to_gray_coefficients_set &&
2360 (png_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_ENDPOINTS) != 0)
2361 {
2362 /* png_set_background has not been called, get the coefficients from the Y
2363 * values of the colorspace colorants.
2364 */
2365 png_fixed_point r = png_ptr->colorspace.end_points_XYZ.red_Y;
2366 png_fixed_point g = png_ptr->colorspace.end_points_XYZ.green_Y;
2367 png_fixed_point b = png_ptr->colorspace.end_points_XYZ.blue_Y;
2368 png_fixed_point total = r+g+b;
2369
2370 if (total > 0 &&
2371 r >= 0 && png_muldiv(&r, r, 32768, total) && r >= 0 && r <= 32768 &&
2372 g >= 0 && png_muldiv(&g, g, 32768, total) && g >= 0 && g <= 32768 &&
2373 b >= 0 && png_muldiv(&b, b, 32768, total) && b >= 0 && b <= 32768 &&
2374 r+g+b <= 32769)
2375 {
2376 /* We allow 0 coefficients here. r+g+b may be 32769 if two or
2377 * all of the coefficients were rounded up. Handle this by
2378 * reducing the *largest* coefficient by 1; this matches the
2379 * approach used for the default coefficients in pngrtran.c
2380 */
2381 int add = 0;
2382
2383 if (r+g+b > 32768)
2384 add = -1;
2385 else if (r+g+b < 32768)
2386 add = 1;
2387
2388 if (add != 0)
2389 {
2390 if (g >= r && g >= b)
2391 g += add;
2392 else if (r >= g && r >= b)
2393 r += add;
2394 else
2395 b += add;
2396 }
2397
2398 /* Check for an internal error. */
2399 if (r+g+b != 32768)
2400 png_error(png_ptr,
2401 "internal error handling cHRM coefficients");
2402
2403 else
2404 {
2405 png_ptr->rgb_to_gray_red_coeff = (png_uint_16)r;
2406 png_ptr->rgb_to_gray_green_coeff = (png_uint_16)g;
2407 }
2408 }
2409
2410 /* This is a png_error at present even though it could be ignored -
2411 * it should never happen, but it is important that if it does, the
2412 * bug is fixed.
2413 */
2414 else
2415 png_error(png_ptr, "internal error handling cHRM->XYZ");
2416 }
2417}
2418#endif
2419
2420#endif /* COLORSPACE */
John Bowlerb11b31a2012-03-21 07:55:46 -05002421
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002422void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06002423png_check_IHDR(png_const_structrp png_ptr,
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002424 png_uint_32 width, png_uint_32 height, int bit_depth,
2425 int color_type, int interlace_type, int compression_type,
2426 int filter_type)
2427{
2428 int error = 0;
2429
2430 /* Check for width and height valid values */
2431 if (width == 0)
2432 {
2433 png_warning(png_ptr, "Image width is zero in IHDR");
2434 error = 1;
2435 }
2436
2437 if (height == 0)
2438 {
2439 png_warning(png_ptr, "Image height is zero in IHDR");
2440 error = 1;
2441 }
2442
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002443# ifdef PNG_SET_USER_LIMITS_SUPPORTED
Glenn Randers-Pehrsonb7040362011-06-11 14:20:22 -05002444 if (width > png_ptr->user_width_max)
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -05002445
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002446# else
Glenn Randers-Pehrsondd66f3e2009-09-30 14:58:28 -05002447 if (width > PNG_USER_WIDTH_MAX)
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002448# endif
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002449 {
2450 png_warning(png_ptr, "Image width exceeds user limit in IHDR");
2451 error = 1;
2452 }
2453
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002454# ifdef PNG_SET_USER_LIMITS_SUPPORTED
Glenn Randers-Pehrsonb7040362011-06-11 14:20:22 -05002455 if (height > png_ptr->user_height_max)
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002456# else
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002457 if (height > PNG_USER_HEIGHT_MAX)
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002458# endif
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002459 {
2460 png_warning(png_ptr, "Image height exceeds user limit in IHDR");
2461 error = 1;
2462 }
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002463
Glenn Randers-Pehrsondd66f3e2009-09-30 14:58:28 -05002464 if (width > PNG_UINT_31_MAX)
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002465 {
Glenn Randers-Pehrsondd66f3e2009-09-30 14:58:28 -05002466 png_warning(png_ptr, "Invalid image width in IHDR");
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002467 error = 1;
2468 }
2469
Glenn Randers-Pehrsonbc363ec2010-10-12 21:17:00 -05002470 if (height > PNG_UINT_31_MAX)
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002471 {
Glenn Randers-Pehrsondd66f3e2009-09-30 14:58:28 -05002472 png_warning(png_ptr, "Invalid image height in IHDR");
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002473 error = 1;
2474 }
2475
Glenn Randers-Pehrsonbc363ec2010-10-12 21:17:00 -05002476 if (width > (PNG_UINT_32_MAX
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002477 >> 3) /* 8-byte RGBA pixels */
Glenn Randers-Pehrsonc5080812010-10-23 08:26:26 -05002478 - 48 /* bigrowbuf hack */
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002479 - 1 /* filter byte */
2480 - 7*8 /* rounding of width to multiple of 8 pixels */
2481 - 8) /* extra max_pixel_depth pad */
2482 png_warning(png_ptr, "Width is too large for libpng to process pixels");
2483
2484 /* Check other values */
2485 if (bit_depth != 1 && bit_depth != 2 && bit_depth != 4 &&
2486 bit_depth != 8 && bit_depth != 16)
2487 {
2488 png_warning(png_ptr, "Invalid bit depth in IHDR");
2489 error = 1;
2490 }
2491
2492 if (color_type < 0 || color_type == 1 ||
2493 color_type == 5 || color_type > 6)
2494 {
2495 png_warning(png_ptr, "Invalid color type in IHDR");
2496 error = 1;
2497 }
2498
2499 if (((color_type == PNG_COLOR_TYPE_PALETTE) && bit_depth > 8) ||
2500 ((color_type == PNG_COLOR_TYPE_RGB ||
2501 color_type == PNG_COLOR_TYPE_GRAY_ALPHA ||
2502 color_type == PNG_COLOR_TYPE_RGB_ALPHA) && bit_depth < 8))
2503 {
2504 png_warning(png_ptr, "Invalid color type/bit depth combination in IHDR");
2505 error = 1;
2506 }
2507
2508 if (interlace_type >= PNG_INTERLACE_LAST)
2509 {
2510 png_warning(png_ptr, "Unknown interlace method in IHDR");
2511 error = 1;
2512 }
2513
2514 if (compression_type != PNG_COMPRESSION_TYPE_BASE)
2515 {
2516 png_warning(png_ptr, "Unknown compression method in IHDR");
2517 error = 1;
2518 }
2519
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002520# ifdef PNG_MNG_FEATURES_SUPPORTED
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002521 /* Accept filter_method 64 (intrapixel differencing) only if
2522 * 1. Libpng was compiled with PNG_MNG_FEATURES_SUPPORTED and
2523 * 2. Libpng did not read a PNG signature (this filter_method is only
2524 * used in PNG datastreams that are embedded in MNG datastreams) and
2525 * 3. The application called png_permit_mng_features with a mask that
2526 * included PNG_FLAG_MNG_FILTER_64 and
2527 * 4. The filter_method is 64 and
2528 * 5. The color_type is RGB or RGBA
2529 */
2530 if ((png_ptr->mode & PNG_HAVE_PNG_SIGNATURE) &&
2531 png_ptr->mng_features_permitted)
2532 png_warning(png_ptr, "MNG features are not allowed in a PNG datastream");
2533
2534 if (filter_type != PNG_FILTER_TYPE_BASE)
2535 {
Glenn Randers-Pehrson7ec330d2009-09-25 11:45:42 -05002536 if (!((png_ptr->mng_features_permitted & PNG_FLAG_MNG_FILTER_64) &&
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002537 (filter_type == PNG_INTRAPIXEL_DIFFERENCING) &&
2538 ((png_ptr->mode & PNG_HAVE_PNG_SIGNATURE) == 0) &&
2539 (color_type == PNG_COLOR_TYPE_RGB ||
2540 color_type == PNG_COLOR_TYPE_RGB_ALPHA)))
Glenn Randers-Pehrson7ec330d2009-09-25 11:45:42 -05002541 {
2542 png_warning(png_ptr, "Unknown filter method in IHDR");
2543 error = 1;
2544 }
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002545
Glenn Randers-Pehrson7ec330d2009-09-25 11:45:42 -05002546 if (png_ptr->mode & PNG_HAVE_PNG_SIGNATURE)
2547 {
2548 png_warning(png_ptr, "Invalid filter method in IHDR");
2549 error = 1;
2550 }
2551 }
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002552
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002553# else
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002554 if (filter_type != PNG_FILTER_TYPE_BASE)
2555 {
2556 png_warning(png_ptr, "Unknown filter method in IHDR");
2557 error = 1;
2558 }
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002559# endif
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002560
2561 if (error == 1)
2562 png_error(png_ptr, "Invalid IHDR data");
2563}
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002564
2565#if defined(PNG_sCAL_SUPPORTED) || defined(PNG_pCAL_SUPPORTED)
2566/* ASCII to fp functions */
2567/* Check an ASCII formated floating point value, see the more detailed
2568 * comments in pngpriv.h
2569 */
John Bowler8d261262011-06-18 13:37:11 -05002570/* The following is used internally to preserve the sticky flags */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002571#define png_fp_add(state, flags) ((state) |= (flags))
John Bowler8d261262011-06-18 13:37:11 -05002572#define png_fp_set(state, value) ((state) = (value) | ((state) & PNG_FP_STICKY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002573
2574int /* PRIVATE */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002575png_check_fp_number(png_const_charp string, png_size_t size, int *statep,
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002576 png_size_tp whereami)
2577{
2578 int state = *statep;
2579 png_size_t i = *whereami;
2580
2581 while (i < size)
2582 {
2583 int type;
2584 /* First find the type of the next character */
John Bowler8d261262011-06-18 13:37:11 -05002585 switch (string[i])
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002586 {
John Bowler8d261262011-06-18 13:37:11 -05002587 case 43: type = PNG_FP_SAW_SIGN; break;
2588 case 45: type = PNG_FP_SAW_SIGN + PNG_FP_NEGATIVE; break;
2589 case 46: type = PNG_FP_SAW_DOT; break;
2590 case 48: type = PNG_FP_SAW_DIGIT; break;
2591 case 49: case 50: case 51: case 52:
2592 case 53: case 54: case 55: case 56:
2593 case 57: type = PNG_FP_SAW_DIGIT + PNG_FP_NONZERO; break;
2594 case 69:
2595 case 101: type = PNG_FP_SAW_E; break;
2596 default: goto PNG_FP_End;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002597 }
2598
2599 /* Now deal with this type according to the current
2600 * state, the type is arranged to not overlap the
2601 * bits of the PNG_FP_STATE.
2602 */
John Bowler8d261262011-06-18 13:37:11 -05002603 switch ((state & PNG_FP_STATE) + (type & PNG_FP_SAW_ANY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002604 {
John Bowler8d261262011-06-18 13:37:11 -05002605 case PNG_FP_INTEGER + PNG_FP_SAW_SIGN:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002606 if (state & PNG_FP_SAW_ANY)
2607 goto PNG_FP_End; /* not a part of the number */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002608
John Bowler8d261262011-06-18 13:37:11 -05002609 png_fp_add(state, type);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002610 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002611
John Bowler8d261262011-06-18 13:37:11 -05002612 case PNG_FP_INTEGER + PNG_FP_SAW_DOT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002613 /* Ok as trailer, ok as lead of fraction. */
2614 if (state & PNG_FP_SAW_DOT) /* two dots */
2615 goto PNG_FP_End;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002616
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002617 else if (state & PNG_FP_SAW_DIGIT) /* trailing dot? */
John Bowler8d261262011-06-18 13:37:11 -05002618 png_fp_add(state, type);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002619
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002620 else
John Bowler8d261262011-06-18 13:37:11 -05002621 png_fp_set(state, PNG_FP_FRACTION | type);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002622
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002623 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002624
John Bowler8d261262011-06-18 13:37:11 -05002625 case PNG_FP_INTEGER + PNG_FP_SAW_DIGIT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002626 if (state & PNG_FP_SAW_DOT) /* delayed fraction */
2627 png_fp_set(state, PNG_FP_FRACTION | PNG_FP_SAW_DOT);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002628
John Bowler8d261262011-06-18 13:37:11 -05002629 png_fp_add(state, type | PNG_FP_WAS_VALID);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002630
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002631 break;
John Bowler8d261262011-06-18 13:37:11 -05002632
2633 case PNG_FP_INTEGER + PNG_FP_SAW_E:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002634 if ((state & PNG_FP_SAW_DIGIT) == 0)
2635 goto PNG_FP_End;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002636
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002637 png_fp_set(state, PNG_FP_EXPONENT);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002638
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002639 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002640
John Bowler8d261262011-06-18 13:37:11 -05002641 /* case PNG_FP_FRACTION + PNG_FP_SAW_SIGN:
2642 goto PNG_FP_End; ** no sign in fraction */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002643
John Bowler8d261262011-06-18 13:37:11 -05002644 /* case PNG_FP_FRACTION + PNG_FP_SAW_DOT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002645 goto PNG_FP_End; ** Because SAW_DOT is always set */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002646
John Bowler8d261262011-06-18 13:37:11 -05002647 case PNG_FP_FRACTION + PNG_FP_SAW_DIGIT:
2648 png_fp_add(state, type | PNG_FP_WAS_VALID);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002649 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002650
John Bowler8d261262011-06-18 13:37:11 -05002651 case PNG_FP_FRACTION + PNG_FP_SAW_E:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002652 /* This is correct because the trailing '.' on an
2653 * integer is handled above - so we can only get here
2654 * with the sequence ".E" (with no preceding digits).
2655 */
2656 if ((state & PNG_FP_SAW_DIGIT) == 0)
2657 goto PNG_FP_End;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002658
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002659 png_fp_set(state, PNG_FP_EXPONENT);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002660
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002661 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002662
John Bowler8d261262011-06-18 13:37:11 -05002663 case PNG_FP_EXPONENT + PNG_FP_SAW_SIGN:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002664 if (state & PNG_FP_SAW_ANY)
2665 goto PNG_FP_End; /* not a part of the number */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002666
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002667 png_fp_add(state, PNG_FP_SAW_SIGN);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002668
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002669 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002670
John Bowler8d261262011-06-18 13:37:11 -05002671 /* case PNG_FP_EXPONENT + PNG_FP_SAW_DOT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002672 goto PNG_FP_End; */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002673
John Bowler8d261262011-06-18 13:37:11 -05002674 case PNG_FP_EXPONENT + PNG_FP_SAW_DIGIT:
2675 png_fp_add(state, PNG_FP_SAW_DIGIT | PNG_FP_WAS_VALID);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002676
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002677 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002678
John Bowler8d261262011-06-18 13:37:11 -05002679 /* case PNG_FP_EXPONEXT + PNG_FP_SAW_E:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002680 goto PNG_FP_End; */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002681
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002682 default: goto PNG_FP_End; /* I.e. break 2 */
2683 }
2684
2685 /* The character seems ok, continue. */
2686 ++i;
2687 }
2688
2689PNG_FP_End:
2690 /* Here at the end, update the state and return the correct
2691 * return code.
2692 */
2693 *statep = state;
2694 *whereami = i;
2695
2696 return (state & PNG_FP_SAW_DIGIT) != 0;
2697}
2698
2699
2700/* The same but for a complete string. */
2701int
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002702png_check_fp_string(png_const_charp string, png_size_t size)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002703{
2704 int state=0;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002705 png_size_t char_index=0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002706
John Bowler8d261262011-06-18 13:37:11 -05002707 if (png_check_fp_number(string, size, &state, &char_index) &&
2708 (char_index == size || string[char_index] == 0))
2709 return state /* must be non-zero - see above */;
2710
2711 return 0; /* i.e. fail */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002712}
2713#endif /* pCAL or sCAL */
2714
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002715#ifdef PNG_sCAL_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002716# ifdef PNG_FLOATING_POINT_SUPPORTED
2717/* Utility used below - a simple accurate power of ten from an integral
2718 * exponent.
2719 */
2720static double
2721png_pow10(int power)
2722{
2723 int recip = 0;
2724 double d = 1;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002725
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002726 /* Handle negative exponent with a reciprocal at the end because
2727 * 10 is exact whereas .1 is inexact in base 2
2728 */
2729 if (power < 0)
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002730 {
2731 if (power < DBL_MIN_10_EXP) return 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002732 recip = 1, power = -power;
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002733 }
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002734
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002735 if (power > 0)
2736 {
2737 /* Decompose power bitwise. */
2738 double mult = 10;
2739 do
2740 {
2741 if (power & 1) d *= mult;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002742 mult *= mult;
2743 power >>= 1;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002744 }
2745 while (power > 0);
2746
2747 if (recip) d = 1/d;
2748 }
2749 /* else power is 0 and d is 1 */
2750
2751 return d;
2752}
2753
2754/* Function to format a floating point value in ASCII with a given
2755 * precision.
2756 */
2757void /* PRIVATE */
John Bowler4f67e402011-12-28 08:43:37 -06002758png_ascii_from_fp(png_const_structrp png_ptr, png_charp ascii, png_size_t size,
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002759 double fp, unsigned int precision)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002760{
2761 /* We use standard functions from math.h, but not printf because
2762 * that would require stdio. The caller must supply a buffer of
2763 * sufficient size or we will png_error. The tests on size and
2764 * the space in ascii[] consumed are indicated below.
2765 */
2766 if (precision < 1)
2767 precision = DBL_DIG;
2768
2769 /* Enforce the limit of the implementation precision too. */
2770 if (precision > DBL_DIG+1)
2771 precision = DBL_DIG+1;
2772
2773 /* Basic sanity checks */
2774 if (size >= precision+5) /* See the requirements below. */
2775 {
2776 if (fp < 0)
2777 {
2778 fp = -fp;
Glenn Randers-Pehrsonb75b2412011-04-16 19:35:05 -05002779 *ascii++ = 45; /* '-' PLUS 1 TOTAL 1 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002780 --size;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002781 }
2782
2783 if (fp >= DBL_MIN && fp <= DBL_MAX)
2784 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002785 int exp_b10; /* A base 10 exponent */
2786 double base; /* 10^exp_b10 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002787
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002788 /* First extract a base 10 exponent of the number,
2789 * the calculation below rounds down when converting
2790 * from base 2 to base 10 (multiply by log10(2) -
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002791 * 0.3010, but 77/256 is 0.3008, so exp_b10 needs to
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002792 * be increased. Note that the arithmetic shift
2793 * performs a floor() unlike C arithmetic - using a
2794 * C multiply would break the following for negative
2795 * exponents.
2796 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002797 (void)frexp(fp, &exp_b10); /* exponent to base 2 */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002798
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002799 exp_b10 = (exp_b10 * 77) >> 8; /* <= exponent to base 10 */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002800
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002801 /* Avoid underflow here. */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002802 base = png_pow10(exp_b10); /* May underflow */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002803
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002804 while (base < DBL_MIN || base < fp)
2805 {
2806 /* And this may overflow. */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002807 double test = png_pow10(exp_b10+1);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002808
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002809 if (test <= DBL_MAX)
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002810 ++exp_b10, base = test;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002811
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002812 else
2813 break;
2814 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002815
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002816 /* Normalize fp and correct exp_b10, after this fp is in the
2817 * range [.1,1) and exp_b10 is both the exponent and the digit
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002818 * *before* which the decimal point should be inserted
2819 * (starting with 0 for the first digit). Note that this
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002820 * works even if 10^exp_b10 is out of range because of the
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002821 * test on DBL_MAX above.
2822 */
2823 fp /= base;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002824 while (fp >= 1) fp /= 10, ++exp_b10;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002825
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002826 /* Because of the code above fp may, at this point, be
2827 * less than .1, this is ok because the code below can
2828 * handle the leading zeros this generates, so no attempt
2829 * is made to correct that here.
2830 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002831
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002832 {
2833 int czero, clead, cdigits;
2834 char exponent[10];
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002835
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002836 /* Allow up to two leading zeros - this will not lengthen
2837 * the number compared to using E-n.
2838 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002839 if (exp_b10 < 0 && exp_b10 > -3) /* PLUS 3 TOTAL 4 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002840 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002841 czero = -exp_b10; /* PLUS 2 digits: TOTAL 3 */
2842 exp_b10 = 0; /* Dot added below before first output. */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002843 }
2844 else
2845 czero = 0; /* No zeros to add */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002846
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002847 /* Generate the digit list, stripping trailing zeros and
2848 * inserting a '.' before a digit if the exponent is 0.
2849 */
2850 clead = czero; /* Count of leading zeros */
2851 cdigits = 0; /* Count of digits in list. */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002852
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002853 do
2854 {
2855 double d;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002856
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002857 fp *= 10;
2858 /* Use modf here, not floor and subtract, so that
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002859 * the separation is done in one step. At the end
2860 * of the loop don't break the number into parts so
2861 * that the final digit is rounded.
2862 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002863 if (cdigits+czero-clead+1 < (int)precision)
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002864 fp = modf(fp, &d);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002865
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002866 else
2867 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002868 d = floor(fp + .5);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002869
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002870 if (d > 9)
2871 {
2872 /* Rounding up to 10, handle that here. */
2873 if (czero > 0)
2874 {
2875 --czero, d = 1;
2876 if (cdigits == 0) --clead;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002877 }
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002878 else
2879 {
2880 while (cdigits > 0 && d > 9)
2881 {
2882 int ch = *--ascii;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002883
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002884 if (exp_b10 != (-1))
2885 ++exp_b10;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002886
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002887 else if (ch == 46)
2888 {
2889 ch = *--ascii, ++size;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002890 /* Advance exp_b10 to '1', so that the
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002891 * decimal point happens after the
2892 * previous digit.
2893 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002894 exp_b10 = 1;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002895 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002896
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002897 --cdigits;
2898 d = ch - 47; /* I.e. 1+(ch-48) */
2899 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002900
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002901 /* Did we reach the beginning? If so adjust the
2902 * exponent but take into account the leading
2903 * decimal point.
2904 */
2905 if (d > 9) /* cdigits == 0 */
2906 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002907 if (exp_b10 == (-1))
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002908 {
2909 /* Leading decimal point (plus zeros?), if
2910 * we lose the decimal point here it must
2911 * be reentered below.
2912 */
2913 int ch = *--ascii;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002914
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002915 if (ch == 46)
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002916 ++size, exp_b10 = 1;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002917
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002918 /* Else lost a leading zero, so 'exp_b10' is
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002919 * still ok at (-1)
2920 */
2921 }
2922 else
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002923 ++exp_b10;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002924
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002925 /* In all cases we output a '1' */
2926 d = 1;
2927 }
2928 }
2929 }
2930 fp = 0; /* Guarantees termination below. */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002931 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002932
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002933 if (d == 0)
2934 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002935 ++czero;
2936 if (cdigits == 0) ++clead;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002937 }
2938 else
2939 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002940 /* Included embedded zeros in the digit count. */
2941 cdigits += czero - clead;
2942 clead = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002943
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002944 while (czero > 0)
2945 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002946 /* exp_b10 == (-1) means we just output the decimal
2947 * place - after the DP don't adjust 'exp_b10' any
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002948 * more!
2949 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002950 if (exp_b10 != (-1))
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002951 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002952 if (exp_b10 == 0) *ascii++ = 46, --size;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002953 /* PLUS 1: TOTAL 4 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002954 --exp_b10;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002955 }
2956 *ascii++ = 48, --czero;
2957 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002958
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002959 if (exp_b10 != (-1))
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002960 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002961 if (exp_b10 == 0) *ascii++ = 46, --size; /* counted
2962 above */
2963 --exp_b10;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002964 }
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05002965 *ascii++ = (char)(48 + (int)d), ++cdigits;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002966 }
2967 }
2968 while (cdigits+czero-clead < (int)precision && fp > DBL_MIN);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002969
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002970 /* The total output count (max) is now 4+precision */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002971
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002972 /* Check for an exponent, if we don't need one we are
2973 * done and just need to terminate the string. At
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002974 * this point exp_b10==(-1) is effectively if flag - it got
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002975 * to '-1' because of the decrement after outputing
2976 * the decimal point above (the exponent required is
2977 * *not* -1!)
2978 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002979 if (exp_b10 >= (-1) && exp_b10 <= 2)
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002980 {
2981 /* The following only happens if we didn't output the
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002982 * leading zeros above for negative exponent, so this
2983 * doest add to the digit requirement. Note that the
2984 * two zeros here can only be output if the two leading
2985 * zeros were *not* output, so this doesn't increase
2986 * the output count.
2987 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002988 while (--exp_b10 >= 0) *ascii++ = 48;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002989
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002990 *ascii = 0;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002991
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002992 /* Total buffer requirement (including the '\0') is
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002993 * 5+precision - see check at the start.
2994 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002995 return;
2996 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002997
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002998 /* Here if an exponent is required, adjust size for
2999 * the digits we output but did not count. The total
3000 * digit output here so far is at most 1+precision - no
3001 * decimal point and no leading or trailing zeros have
3002 * been output.
3003 */
3004 size -= cdigits;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003005
Glenn Randers-Pehrsonb75b2412011-04-16 19:35:05 -05003006 *ascii++ = 69, --size; /* 'E': PLUS 1 TOTAL 2+precision */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003007
John Bowler75156122011-09-09 17:21:44 -05003008 /* The following use of an unsigned temporary avoids ambiguities in
3009 * the signed arithmetic on exp_b10 and permits GCC at least to do
3010 * better optimization.
3011 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003012 {
John Bowler75156122011-09-09 17:21:44 -05003013 unsigned int uexp_b10;
3014
3015 if (exp_b10 < 0)
3016 {
3017 *ascii++ = 45, --size; /* '-': PLUS 1 TOTAL 3+precision */
3018 uexp_b10 = -exp_b10;
3019 }
3020
3021 else
3022 uexp_b10 = exp_b10;
3023
3024 cdigits = 0;
3025
3026 while (uexp_b10 > 0)
3027 {
3028 exponent[cdigits++] = (char)(48 + uexp_b10 % 10);
3029 uexp_b10 /= 10;
3030 }
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003031 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003032
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003033 /* Need another size check here for the exponent digits, so
3034 * this need not be considered above.
3035 */
3036 if ((int)size > cdigits)
3037 {
3038 while (cdigits > 0) *ascii++ = exponent[--cdigits];
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003039
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003040 *ascii = 0;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003041
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003042 return;
3043 }
3044 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003045 }
3046 else if (!(fp >= DBL_MIN))
3047 {
3048 *ascii++ = 48; /* '0' */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003049 *ascii = 0;
3050 return;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003051 }
3052 else
3053 {
3054 *ascii++ = 105; /* 'i' */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003055 *ascii++ = 110; /* 'n' */
3056 *ascii++ = 102; /* 'f' */
3057 *ascii = 0;
3058 return;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003059 }
3060 }
3061
3062 /* Here on buffer too small. */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003063 png_error(png_ptr, "ASCII conversion buffer too small");
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003064}
3065
3066# endif /* FLOATING_POINT */
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003067
3068# ifdef PNG_FIXED_POINT_SUPPORTED
3069/* Function to format a fixed point value in ASCII.
3070 */
3071void /* PRIVATE */
John Bowler4f67e402011-12-28 08:43:37 -06003072png_ascii_from_fixed(png_const_structrp png_ptr, png_charp ascii,
3073 png_size_t size, png_fixed_point fp)
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003074{
3075 /* Require space for 10 decimal digits, a decimal point, a minus sign and a
3076 * trailing \0, 13 characters:
3077 */
3078 if (size > 12)
3079 {
3080 png_uint_32 num;
3081
3082 /* Avoid overflow here on the minimum integer. */
3083 if (fp < 0)
3084 *ascii++ = 45, --size, num = -fp;
3085 else
3086 num = fp;
3087
John Bowler75156122011-09-09 17:21:44 -05003088 if (num <= 0x80000000) /* else overflowed */
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003089 {
Glenn Randers-Pehrsonb75b2412011-04-16 19:35:05 -05003090 unsigned int ndigits = 0, first = 16 /* flag value */;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003091 char digits[10];
3092
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003093 while (num)
3094 {
3095 /* Split the low digit off num: */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003096 unsigned int tmp = num/10;
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003097 num -= tmp*10;
3098 digits[ndigits++] = (char)(48 + num);
3099 /* Record the first non-zero digit, note that this is a number
3100 * starting at 1, it's not actually the array index.
3101 */
3102 if (first == 16 && num > 0)
3103 first = ndigits;
3104 num = tmp;
3105 }
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003106
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003107 if (ndigits > 0)
3108 {
3109 while (ndigits > 5) *ascii++ = digits[--ndigits];
3110 /* The remaining digits are fractional digits, ndigits is '5' or
3111 * smaller at this point. It is certainly not zero. Check for a
3112 * non-zero fractional digit:
3113 */
3114 if (first <= 5)
3115 {
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003116 unsigned int i;
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003117 *ascii++ = 46; /* decimal point */
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -05003118 /* ndigits may be <5 for small numbers, output leading zeros
3119 * then ndigits digits to first:
3120 */
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003121 i = 5;
3122 while (ndigits < i) *ascii++ = 48, --i;
3123 while (ndigits >= first) *ascii++ = digits[--ndigits];
3124 /* Don't output the trailing zeros! */
3125 }
3126 }
3127 else
3128 *ascii++ = 48;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003129
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003130 /* And null terminate the string: */
3131 *ascii = 0;
3132 return;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003133 }
3134 }
3135
3136 /* Here on buffer too small. */
3137 png_error(png_ptr, "ASCII conversion buffer too small");
3138}
3139# endif /* FIXED_POINT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003140#endif /* READ_SCAL */
3141
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -05003142#if defined(PNG_FLOATING_POINT_SUPPORTED) && \
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003143 !defined(PNG_FIXED_POINT_MACRO_SUPPORTED) && \
3144 (defined(PNG_gAMA_SUPPORTED) || defined(PNG_cHRM_SUPPORTED) || \
3145 defined(PNG_sCAL_SUPPORTED) || defined(PNG_READ_BACKGROUND_SUPPORTED) || \
3146 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)) || \
3147 (defined(PNG_sCAL_SUPPORTED) && \
3148 defined(PNG_FLOATING_ARITHMETIC_SUPPORTED))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003149png_fixed_point
John Bowler5d567862011-12-24 09:12:00 -06003150png_fixed(png_const_structrp png_ptr, double fp, png_const_charp text)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003151{
3152 double r = floor(100000 * fp + .5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003153
Glenn Randers-Pehrson77c3bf12011-01-20 15:56:31 -06003154 if (r > 2147483647. || r < -2147483648.)
3155 png_fixed_error(png_ptr, text);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003156
Glenn Randers-Pehrsonc9120502013-11-22 14:58:04 -06003157# ifndef PNG_ERROR_TEXT_SUPPORTED
3158 PNG_UNUSED(text)
3159# endif
3160
Glenn Randers-Pehrson77c3bf12011-01-20 15:56:31 -06003161 return (png_fixed_point)r;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003162}
3163#endif
3164
Glenn Randers-Pehrsonc9120502013-11-22 14:58:04 -06003165#if defined(PNG_GAMMA_SUPPORTED) || defined(PNG_COLORSPACE_SUPPORTED) ||\
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003166 defined(PNG_INCH_CONVERSIONS_SUPPORTED) || defined(PNG_READ_pHYs_SUPPORTED)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003167/* muldiv functions */
3168/* This API takes signed arguments and rounds the result to the nearest
3169 * integer (or, for a fixed point number - the standard argument - to
3170 * the nearest .00001). Overflow and divide by zero are signalled in
3171 * the result, a boolean - true on success, false on overflow.
3172 */
3173int
3174png_muldiv(png_fixed_point_p res, png_fixed_point a, png_int_32 times,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003175 png_int_32 divisor)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003176{
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003177 /* Return a * times / divisor, rounded. */
3178 if (divisor != 0)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003179 {
3180 if (a == 0 || times == 0)
3181 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003182 *res = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003183 return 1;
3184 }
3185 else
3186 {
3187#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003188 double r = a;
3189 r *= times;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003190 r /= divisor;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003191 r = floor(r+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003192
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003193 /* A png_fixed_point is a 32-bit integer. */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003194 if (r <= 2147483647. && r >= -2147483648.)
3195 {
3196 *res = (png_fixed_point)r;
3197 return 1;
3198 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003199#else
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003200 int negative = 0;
3201 png_uint_32 A, T, D;
Glenn Randers-Pehrson3b5d6952010-08-19 08:06:12 -05003202 png_uint_32 s16, s32, s00;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003203
3204 if (a < 0)
3205 negative = 1, A = -a;
3206 else
3207 A = a;
3208
3209 if (times < 0)
3210 negative = !negative, T = -times;
3211 else
3212 T = times;
3213
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003214 if (divisor < 0)
3215 negative = !negative, D = -divisor;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003216 else
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003217 D = divisor;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003218
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003219 /* Following can't overflow because the arguments only
3220 * have 31 bits each, however the result may be 32 bits.
3221 */
Glenn Randers-Pehrson3b5d6952010-08-19 08:06:12 -05003222 s16 = (A >> 16) * (T & 0xffff) +
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05003223 (A & 0xffff) * (T >> 16);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003224 /* Can't overflow because the a*times bit is only 30
3225 * bits at most.
3226 */
Glenn Randers-Pehrson3b5d6952010-08-19 08:06:12 -05003227 s32 = (A >> 16) * (T >> 16) + (s16 >> 16);
3228 s00 = (A & 0xffff) * (T & 0xffff);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003229
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003230 s16 = (s16 & 0xffff) << 16;
3231 s00 += s16;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003232
3233 if (s00 < s16)
3234 ++s32; /* carry */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003235
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003236 if (s32 < D) /* else overflow */
3237 {
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003238 /* s32.s00 is now the 64-bit product, do a standard
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003239 * division, we know that s32 < D, so the maximum
3240 * required shift is 31.
3241 */
3242 int bitshift = 32;
3243 png_fixed_point result = 0; /* NOTE: signed */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003244
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003245 while (--bitshift >= 0)
3246 {
3247 png_uint_32 d32, d00;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003248
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003249 if (bitshift > 0)
3250 d32 = D >> (32-bitshift), d00 = D << bitshift;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003251
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003252 else
3253 d32 = 0, d00 = D;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003254
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003255 if (s32 > d32)
3256 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05003257 if (s00 < d00) --s32; /* carry */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003258 s32 -= d32, s00 -= d00, result += 1<<bitshift;
3259 }
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003260
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003261 else
3262 if (s32 == d32 && s00 >= d00)
3263 s32 = 0, s00 -= d00, result += 1<<bitshift;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003264 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003265
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003266 /* Handle the rounding. */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003267 if (s00 >= (D >> 1))
3268 ++result;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003269
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003270 if (negative)
3271 result = -result;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003272
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003273 /* Check for overflow. */
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003274 if ((negative && result <= 0) || (!negative && result >= 0))
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003275 {
3276 *res = result;
3277 return 1;
3278 }
3279 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003280#endif
3281 }
3282 }
3283
3284 return 0;
3285}
3286#endif /* READ_GAMMA || INCH_CONVERSIONS */
3287
3288#if defined(PNG_READ_GAMMA_SUPPORTED) || defined(PNG_INCH_CONVERSIONS_SUPPORTED)
3289/* The following is for when the caller doesn't much care about the
3290 * result.
3291 */
3292png_fixed_point
John Bowler5d567862011-12-24 09:12:00 -06003293png_muldiv_warn(png_const_structrp png_ptr, png_fixed_point a, png_int_32 times,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003294 png_int_32 divisor)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003295{
3296 png_fixed_point result;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003297
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003298 if (png_muldiv(&result, a, times, divisor))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003299 return result;
3300
3301 png_warning(png_ptr, "fixed point overflow ignored");
3302 return 0;
3303}
3304#endif
3305
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003306#ifdef PNG_GAMMA_SUPPORTED /* more fixed point functions for gamma */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003307/* Calculate a reciprocal, return 0 on div-by-zero or overflow. */
3308png_fixed_point
3309png_reciprocal(png_fixed_point a)
3310{
3311#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3312 double r = floor(1E10/a+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003313
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003314 if (r <= 2147483647. && r >= -2147483648.)
3315 return (png_fixed_point)r;
3316#else
3317 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003318
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003319 if (png_muldiv(&res, 100000, 100000, a))
3320 return res;
3321#endif
3322
3323 return 0; /* error/overflow */
3324}
3325
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003326/* This is the shared test on whether a gamma value is 'significant' - whether
3327 * it is worth doing gamma correction.
3328 */
3329int /* PRIVATE */
3330png_gamma_significant(png_fixed_point gamma_val)
3331{
3332 return gamma_val < PNG_FP_1 - PNG_GAMMA_THRESHOLD_FIXED ||
3333 gamma_val > PNG_FP_1 + PNG_GAMMA_THRESHOLD_FIXED;
3334}
3335#endif
3336
3337#ifdef PNG_READ_GAMMA_SUPPORTED
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003338# ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003339/* A local convenience routine. */
3340static png_fixed_point
3341png_product2(png_fixed_point a, png_fixed_point b)
3342{
Glenn Randers-Pehrson9c690912010-08-27 11:39:38 -05003343 /* The required result is 1/a * 1/b; the following preserves accuracy. */
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003344# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003345 double r = a * 1E-5;
3346 r *= b;
3347 r = floor(r+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003348
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003349 if (r <= 2147483647. && r >= -2147483648.)
3350 return (png_fixed_point)r;
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003351# else
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003352 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003353
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003354 if (png_muldiv(&res, a, b, 100000))
3355 return res;
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003356# endif
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003357
3358 return 0; /* overflow */
3359}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003360# endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003361
3362/* The inverse of the above. */
3363png_fixed_point
3364png_reciprocal2(png_fixed_point a, png_fixed_point b)
3365{
Glenn Randers-Pehrson9c690912010-08-27 11:39:38 -05003366 /* The required result is 1/a * 1/b; the following preserves accuracy. */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003367#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3368 double r = 1E15/a;
3369 r /= b;
3370 r = floor(r+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003371
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003372 if (r <= 2147483647. && r >= -2147483648.)
3373 return (png_fixed_point)r;
3374#else
3375 /* This may overflow because the range of png_fixed_point isn't symmetric,
3376 * but this API is only used for the product of file and screen gamma so it
3377 * doesn't matter that the smallest number it can produce is 1/21474, not
3378 * 1/100000
3379 */
3380 png_fixed_point res = png_product2(a, b);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003381
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003382 if (res != 0)
3383 return png_reciprocal(res);
3384#endif
3385
3386 return 0; /* overflow */
3387}
3388#endif /* READ_GAMMA */
3389
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003390#ifdef PNG_READ_GAMMA_SUPPORTED /* gamma table code */
3391#ifndef PNG_FLOATING_ARITHMETIC_SUPPORTED
3392/* Fixed point gamma.
3393 *
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003394 * The code to calculate the tables used below can be found in the shell script
3395 * contrib/tools/intgamma.sh
3396 *
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003397 * To calculate gamma this code implements fast log() and exp() calls using only
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003398 * fixed point arithmetic. This code has sufficient precision for either 8-bit
3399 * or 16-bit sample values.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003400 *
3401 * The tables used here were calculated using simple 'bc' programs, but C double
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003402 * precision floating point arithmetic would work fine.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003403 *
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003404 * 8-bit log table
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003405 * This is a table of -log(value/255)/log(2) for 'value' in the range 128 to
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003406 * 255, so it's the base 2 logarithm of a normalized 8-bit floating point
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003407 * mantissa. The numbers are 32-bit fractions.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003408 */
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003409static const png_uint_32
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003410png_8bit_l2[128] =
3411{
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003412 4270715492U, 4222494797U, 4174646467U, 4127164793U, 4080044201U, 4033279239U,
3413 3986864580U, 3940795015U, 3895065449U, 3849670902U, 3804606499U, 3759867474U,
3414 3715449162U, 3671346997U, 3627556511U, 3584073329U, 3540893168U, 3498011834U,
3415 3455425220U, 3413129301U, 3371120137U, 3329393864U, 3287946700U, 3246774933U,
3416 3205874930U, 3165243125U, 3124876025U, 3084770202U, 3044922296U, 3005329011U,
3417 2965987113U, 2926893432U, 2888044853U, 2849438323U, 2811070844U, 2772939474U,
3418 2735041326U, 2697373562U, 2659933400U, 2622718104U, 2585724991U, 2548951424U,
3419 2512394810U, 2476052606U, 2439922311U, 2404001468U, 2368287663U, 2332778523U,
3420 2297471715U, 2262364947U, 2227455964U, 2192742551U, 2158222529U, 2123893754U,
3421 2089754119U, 2055801552U, 2022034013U, 1988449497U, 1955046031U, 1921821672U,
3422 1888774511U, 1855902668U, 1823204291U, 1790677560U, 1758320682U, 1726131893U,
3423 1694109454U, 1662251657U, 1630556815U, 1599023271U, 1567649391U, 1536433567U,
3424 1505374214U, 1474469770U, 1443718700U, 1413119487U, 1382670639U, 1352370686U,
3425 1322218179U, 1292211689U, 1262349810U, 1232631153U, 1203054352U, 1173618059U,
3426 1144320946U, 1115161701U, 1086139034U, 1057251672U, 1028498358U, 999877854U,
3427 971388940U, 943030410U, 914801076U, 886699767U, 858725327U, 830876614U,
3428 803152505U, 775551890U, 748073672U, 720716771U, 693480120U, 666362667U,
3429 639363374U, 612481215U, 585715177U, 559064263U, 532527486U, 506103872U,
3430 479792461U, 453592303U, 427502463U, 401522014U, 375650043U, 349885648U,
3431 324227938U, 298676034U, 273229066U, 247886176U, 222646516U, 197509248U,
3432 172473545U, 147538590U, 122703574U, 97967701U, 73330182U, 48790236U,
3433 24347096U, 0U
Glenn Randers-Pehrson8888ea42011-11-28 11:29:10 -06003434
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003435#if 0
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003436 /* The following are the values for 16-bit tables - these work fine for the
3437 * 8-bit conversions but produce very slightly larger errors in the 16-bit
3438 * log (about 1.2 as opposed to 0.7 absolute error in the final value). To
3439 * use these all the shifts below must be adjusted appropriately.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003440 */
3441 65166, 64430, 63700, 62976, 62257, 61543, 60835, 60132, 59434, 58741, 58054,
3442 57371, 56693, 56020, 55352, 54689, 54030, 53375, 52726, 52080, 51439, 50803,
3443 50170, 49542, 48918, 48298, 47682, 47070, 46462, 45858, 45257, 44661, 44068,
3444 43479, 42894, 42312, 41733, 41159, 40587, 40020, 39455, 38894, 38336, 37782,
3445 37230, 36682, 36137, 35595, 35057, 34521, 33988, 33459, 32932, 32408, 31887,
3446 31369, 30854, 30341, 29832, 29325, 28820, 28319, 27820, 27324, 26830, 26339,
3447 25850, 25364, 24880, 24399, 23920, 23444, 22970, 22499, 22029, 21562, 21098,
3448 20636, 20175, 19718, 19262, 18808, 18357, 17908, 17461, 17016, 16573, 16132,
3449 15694, 15257, 14822, 14390, 13959, 13530, 13103, 12678, 12255, 11834, 11415,
3450 10997, 10582, 10168, 9756, 9346, 8937, 8531, 8126, 7723, 7321, 6921, 6523,
3451 6127, 5732, 5339, 4947, 4557, 4169, 3782, 3397, 3014, 2632, 2251, 1872, 1495,
3452 1119, 744, 372
3453#endif
3454};
3455
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003456static png_int_32
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003457png_log8bit(unsigned int x)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003458{
John Bowler168a4332011-01-16 19:32:22 -06003459 unsigned int lg2 = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003460 /* Each time 'x' is multiplied by 2, 1 must be subtracted off the final log,
3461 * because the log is actually negate that means adding 1. The final
3462 * returned value thus has the range 0 (for 255 input) to 7.994 (for 1
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003463 * input), return -1 for the overflow (log 0) case, - so the result is
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003464 * always at most 19 bits.
3465 */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003466 if ((x &= 0xff) == 0)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003467 return -1;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003468
3469 if ((x & 0xf0) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003470 lg2 = 4, x <<= 4;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003471
3472 if ((x & 0xc0) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003473 lg2 += 2, x <<= 2;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003474
3475 if ((x & 0x80) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003476 lg2 += 1, x <<= 1;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003477
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003478 /* result is at most 19 bits, so this cast is safe: */
John Bowler168a4332011-01-16 19:32:22 -06003479 return (png_int_32)((lg2 << 16) + ((png_8bit_l2[x-128]+32768)>>16));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003480}
3481
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003482/* The above gives exact (to 16 binary places) log2 values for 8-bit images,
3483 * for 16-bit images we use the most significant 8 bits of the 16-bit value to
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003484 * get an approximation then multiply the approximation by a correction factor
3485 * determined by the remaining up to 8 bits. This requires an additional step
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003486 * in the 16-bit case.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003487 *
3488 * We want log2(value/65535), we have log2(v'/255), where:
3489 *
3490 * value = v' * 256 + v''
3491 * = v' * f
3492 *
3493 * So f is value/v', which is equal to (256+v''/v') since v' is in the range 128
3494 * to 255 and v'' is in the range 0 to 255 f will be in the range 256 to less
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003495 * than 258. The final factor also needs to correct for the fact that our 8-bit
3496 * value is scaled by 255, whereas the 16-bit values must be scaled by 65535.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003497 *
3498 * This gives a final formula using a calculated value 'x' which is value/v' and
3499 * scaling by 65536 to match the above table:
3500 *
3501 * log2(x/257) * 65536
3502 *
3503 * Since these numbers are so close to '1' we can use simple linear
3504 * interpolation between the two end values 256/257 (result -368.61) and 258/257
3505 * (result 367.179). The values used below are scaled by a further 64 to give
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003506 * 16-bit precision in the interpolation:
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003507 *
3508 * Start (256): -23591
3509 * Zero (257): 0
3510 * End (258): 23499
3511 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003512static png_int_32
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003513png_log16bit(png_uint_32 x)
3514{
John Bowler168a4332011-01-16 19:32:22 -06003515 unsigned int lg2 = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003516
3517 /* As above, but now the input has 16 bits. */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003518 if ((x &= 0xffff) == 0)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003519 return -1;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003520
3521 if ((x & 0xff00) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003522 lg2 = 8, x <<= 8;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003523
3524 if ((x & 0xf000) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003525 lg2 += 4, x <<= 4;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003526
3527 if ((x & 0xc000) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003528 lg2 += 2, x <<= 2;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003529
3530 if ((x & 0x8000) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003531 lg2 += 1, x <<= 1;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003532
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003533 /* Calculate the base logarithm from the top 8 bits as a 28-bit fractional
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003534 * value.
3535 */
John Bowler168a4332011-01-16 19:32:22 -06003536 lg2 <<= 28;
3537 lg2 += (png_8bit_l2[(x>>8)-128]+8) >> 4;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003538
3539 /* Now we need to interpolate the factor, this requires a division by the top
3540 * 8 bits. Do this with maximum precision.
3541 */
3542 x = ((x << 16) + (x >> 9)) / (x >> 8);
3543
3544 /* Since we divided by the top 8 bits of 'x' there will be a '1' at 1<<24,
3545 * the value at 1<<16 (ignoring this) will be 0 or 1; this gives us exactly
3546 * 16 bits to interpolate to get the low bits of the result. Round the
3547 * answer. Note that the end point values are scaled by 64 to retain overall
John Bowler168a4332011-01-16 19:32:22 -06003548 * precision and that 'lg2' is current scaled by an extra 12 bits, so adjust
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003549 * the overall scaling by 6-12. Round at every step.
3550 */
3551 x -= 1U << 24;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003552
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003553 if (x <= 65536U) /* <= '257' */
John Bowler168a4332011-01-16 19:32:22 -06003554 lg2 += ((23591U * (65536U-x)) + (1U << (16+6-12-1))) >> (16+6-12);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003555
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003556 else
John Bowler168a4332011-01-16 19:32:22 -06003557 lg2 -= ((23499U * (x-65536U)) + (1U << (16+6-12-1))) >> (16+6-12);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003558
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003559 /* Safe, because the result can't have more than 20 bits: */
John Bowler168a4332011-01-16 19:32:22 -06003560 return (png_int_32)((lg2 + 2048) >> 12);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003561}
3562
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003563/* The 'exp()' case must invert the above, taking a 20-bit fixed point
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003564 * logarithmic value and returning a 16 or 8-bit number as appropriate. In
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003565 * each case only the low 16 bits are relevant - the fraction - since the
3566 * integer bits (the top 4) simply determine a shift.
3567 *
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003568 * The worst case is the 16-bit distinction between 65535 and 65534, this
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003569 * requires perhaps spurious accuracty in the decoding of the logarithm to
3570 * distinguish log2(65535/65534.5) - 10^-5 or 17 bits. There is little chance
3571 * of getting this accuracy in practice.
3572 *
3573 * To deal with this the following exp() function works out the exponent of the
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003574 * frational part of the logarithm by using an accurate 32-bit value from the
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003575 * top four fractional bits then multiplying in the remaining bits.
3576 */
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003577static const png_uint_32
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003578png_32bit_exp[16] =
3579{
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003580 /* NOTE: the first entry is deliberately set to the maximum 32-bit value. */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003581 4294967295U, 4112874773U, 3938502376U, 3771522796U, 3611622603U, 3458501653U,
3582 3311872529U, 3171459999U, 3037000500U, 2908241642U, 2784941738U, 2666869345U,
3583 2553802834U, 2445529972U, 2341847524U, 2242560872U
3584};
3585
3586/* Adjustment table; provided to explain the numbers in the code below. */
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003587#if 0
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003588for (i=11;i>=0;--i){ print i, " ", (1 - e(-(2^i)/65536*l(2))) * 2^(32-i), "\n"}
3589 11 44937.64284865548751208448
3590 10 45180.98734845585101160448
3591 9 45303.31936980687359311872
3592 8 45364.65110595323018870784
3593 7 45395.35850361789624614912
3594 6 45410.72259715102037508096
3595 5 45418.40724413220722311168
3596 4 45422.25021786898173001728
3597 3 45424.17186732298419044352
3598 2 45425.13273269940811464704
3599 1 45425.61317555035558641664
3600 0 45425.85339951654943850496
3601#endif
3602
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003603static png_uint_32
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003604png_exp(png_fixed_point x)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003605{
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003606 if (x > 0 && x <= 0xfffff) /* Else overflow or zero (underflow) */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003607 {
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003608 /* Obtain a 4-bit approximation */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003609 png_uint_32 e = png_32bit_exp[(x >> 12) & 0xf];
3610
3611 /* Incorporate the low 12 bits - these decrease the returned value by
3612 * multiplying by a number less than 1 if the bit is set. The multiplier
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003613 * is determined by the above table and the shift. Notice that the values
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003614 * converge on 45426 and this is used to allow linear interpolation of the
3615 * low bits.
3616 */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003617 if (x & 0x800)
3618 e -= (((e >> 16) * 44938U) + 16U) >> 5;
3619
3620 if (x & 0x400)
3621 e -= (((e >> 16) * 45181U) + 32U) >> 6;
3622
3623 if (x & 0x200)
3624 e -= (((e >> 16) * 45303U) + 64U) >> 7;
3625
3626 if (x & 0x100)
3627 e -= (((e >> 16) * 45365U) + 128U) >> 8;
3628
3629 if (x & 0x080)
3630 e -= (((e >> 16) * 45395U) + 256U) >> 9;
3631
3632 if (x & 0x040)
3633 e -= (((e >> 16) * 45410U) + 512U) >> 10;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003634
3635 /* And handle the low 6 bits in a single block. */
3636 e -= (((e >> 16) * 355U * (x & 0x3fU)) + 256U) >> 9;
3637
3638 /* Handle the upper bits of x. */
3639 e >>= x >> 16;
3640 return e;
3641 }
3642
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003643 /* Check for overflow */
3644 if (x <= 0)
3645 return png_32bit_exp[0];
3646
3647 /* Else underflow */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003648 return 0;
3649}
3650
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003651static png_byte
John Bowler168a4332011-01-16 19:32:22 -06003652png_exp8bit(png_fixed_point lg2)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003653{
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003654 /* Get a 32-bit value: */
John Bowler168a4332011-01-16 19:32:22 -06003655 png_uint_32 x = png_exp(lg2);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003656
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003657 /* Convert the 32-bit value to 0..255 by multiplying by 256-1, note that the
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003658 * second, rounding, step can't overflow because of the first, subtraction,
3659 * step.
3660 */
3661 x -= x >> 8;
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003662 return (png_byte)((x + 0x7fffffU) >> 24);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003663}
3664
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003665#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003666static png_uint_16
John Bowler168a4332011-01-16 19:32:22 -06003667png_exp16bit(png_fixed_point lg2)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003668{
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003669 /* Get a 32-bit value: */
John Bowler168a4332011-01-16 19:32:22 -06003670 png_uint_32 x = png_exp(lg2);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003671
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003672 /* Convert the 32-bit value to 0..65535 by multiplying by 65536-1: */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003673 x -= x >> 16;
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003674 return (png_uint_16)((x + 32767U) >> 16);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003675}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003676#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003677#endif /* FLOATING_ARITHMETIC */
3678
3679png_byte
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003680png_gamma_8bit_correct(unsigned int value, png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003681{
3682 if (value > 0 && value < 255)
3683 {
3684# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003685 double r = floor(255*pow(value/255.,gamma_val*.00001)+.5);
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003686 return (png_byte)r;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003687# else
John Bowler168a4332011-01-16 19:32:22 -06003688 png_int_32 lg2 = png_log8bit(value);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003689 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003690
John Bowler168a4332011-01-16 19:32:22 -06003691 if (png_muldiv(&res, gamma_val, lg2, PNG_FP_1))
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003692 return png_exp8bit(res);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003693
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003694 /* Overflow. */
3695 value = 0;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003696# endif
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003697 }
3698
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003699 return (png_byte)value;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003700}
3701
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003702#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003703png_uint_16
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003704png_gamma_16bit_correct(unsigned int value, png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003705{
3706 if (value > 0 && value < 65535)
3707 {
3708# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003709 double r = floor(65535*pow(value/65535.,gamma_val*.00001)+.5);
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003710 return (png_uint_16)r;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003711# else
John Bowler168a4332011-01-16 19:32:22 -06003712 png_int_32 lg2 = png_log16bit(value);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003713 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003714
John Bowler168a4332011-01-16 19:32:22 -06003715 if (png_muldiv(&res, gamma_val, lg2, PNG_FP_1))
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003716 return png_exp16bit(res);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003717
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003718 /* Overflow. */
3719 value = 0;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003720# endif
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003721 }
3722
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003723 return (png_uint_16)value;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003724}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003725#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003726
3727/* This does the right thing based on the bit_depth field of the
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003728 * png_struct, interpreting values as 8-bit or 16-bit. While the result
3729 * is nominally a 16-bit value if bit depth is 8 then the result is
3730 * 8-bit (as are the arguments.)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003731 */
3732png_uint_16 /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06003733png_gamma_correct(png_structrp png_ptr, unsigned int value,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003734 png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003735{
3736 if (png_ptr->bit_depth == 8)
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003737 return png_gamma_8bit_correct(value, gamma_val);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003738
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003739#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003740 else
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003741 return png_gamma_16bit_correct(value, gamma_val);
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003742#else
3743 /* should not reach this */
3744 return 0;
3745#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003746}
3747
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003748#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003749/* Internal function to build a single 16-bit table - the table consists of
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003750 * 'num' 256 entry subtables, where 'num' is determined by 'shift' - the amount
3751 * to shift the input values right (or 16-number_of_signifiant_bits).
3752 *
Glenn Randers-Pehrsona774c5d2010-08-26 19:37:55 -05003753 * The caller is responsible for ensuring that the table gets cleaned up on
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003754 * png_error (i.e. if one of the mallocs below fails) - i.e. the *table argument
3755 * should be somewhere that will be cleaned.
3756 */
3757static void
John Bowler5d567862011-12-24 09:12:00 -06003758png_build_16bit_table(png_structrp png_ptr, png_uint_16pp *ptable,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003759 PNG_CONST unsigned int shift, PNG_CONST png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003760{
3761 /* Various values derived from 'shift': */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003762 PNG_CONST unsigned int num = 1U << (8U - shift);
3763 PNG_CONST unsigned int max = (1U << (16U - shift))-1U;
3764 PNG_CONST unsigned int max_by_2 = 1U << (15U-shift);
3765 unsigned int i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003766
3767 png_uint_16pp table = *ptable =
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003768 (png_uint_16pp)png_calloc(png_ptr, num * (sizeof (png_uint_16p)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003769
3770 for (i = 0; i < num; i++)
3771 {
3772 png_uint_16p sub_table = table[i] =
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003773 (png_uint_16p)png_malloc(png_ptr, 256 * (sizeof (png_uint_16)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003774
3775 /* The 'threshold' test is repeated here because it can arise for one of
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003776 * the 16-bit tables even if the others don't hit it.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003777 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003778 if (png_gamma_significant(gamma_val))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003779 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003780 /* The old code would overflow at the end and this would cause the
3781 * 'pow' function to return a result >1, resulting in an
3782 * arithmetic error. This code follows the spec exactly; ig is
3783 * the recovered input sample, it always has 8-16 bits.
3784 *
3785 * We want input * 65535/max, rounded, the arithmetic fits in 32
3786 * bits (unsigned) so long as max <= 32767.
3787 */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003788 unsigned int j;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003789 for (j = 0; j < 256; j++)
3790 {
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003791 png_uint_32 ig = (j << (8-shift)) + i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003792# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003793 /* Inline the 'max' scaling operation: */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003794 double d = floor(65535*pow(ig/(double)max, gamma_val*.00001)+.5);
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003795 sub_table[j] = (png_uint_16)d;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003796# else
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003797 if (shift)
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05003798 ig = (ig * 65535U + max_by_2)/max;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003799
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003800 sub_table[j] = png_gamma_16bit_correct(ig, gamma_val);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003801# endif
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003802 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003803 }
3804 else
3805 {
3806 /* We must still build a table, but do it the fast way. */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003807 unsigned int j;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003808
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003809 for (j = 0; j < 256; j++)
3810 {
3811 png_uint_32 ig = (j << (8-shift)) + i;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003812
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003813 if (shift)
3814 ig = (ig * 65535U + max_by_2)/max;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003815
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003816 sub_table[j] = (png_uint_16)ig;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003817 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003818 }
3819 }
3820}
3821
3822/* NOTE: this function expects the *inverse* of the overall gamma transformation
3823 * required.
3824 */
3825static void
John Bowler5d567862011-12-24 09:12:00 -06003826png_build_16to8_table(png_structrp png_ptr, png_uint_16pp *ptable,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003827 PNG_CONST unsigned int shift, PNG_CONST png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003828{
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003829 PNG_CONST unsigned int num = 1U << (8U - shift);
3830 PNG_CONST unsigned int max = (1U << (16U - shift))-1U;
3831 unsigned int i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003832 png_uint_32 last;
3833
3834 png_uint_16pp table = *ptable =
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003835 (png_uint_16pp)png_calloc(png_ptr, num * (sizeof (png_uint_16p)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003836
3837 /* 'num' is the number of tables and also the number of low bits of low
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003838 * bits of the input 16-bit value used to select a table. Each table is
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003839 * itself index by the high 8 bits of the value.
3840 */
3841 for (i = 0; i < num; i++)
3842 table[i] = (png_uint_16p)png_malloc(png_ptr,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003843 256 * (sizeof (png_uint_16)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003844
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003845 /* 'gamma_val' is set to the reciprocal of the value calculated above, so
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003846 * pow(out,g) is an *input* value. 'last' is the last input value set.
3847 *
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003848 * In the loop 'i' is used to find output values. Since the output is
3849 * 8-bit there are only 256 possible values. The tables are set up to
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003850 * select the closest possible output value for each input by finding
3851 * the input value at the boundary between each pair of output values
3852 * and filling the table up to that boundary with the lower output
3853 * value.
3854 *
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003855 * The boundary values are 0.5,1.5..253.5,254.5. Since these are 9-bit
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003856 * values the code below uses a 16-bit value in i; the values start at
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003857 * 128.5 (for 0.5) and step by 257, for a total of 254 values (the last
3858 * entries are filled with 255). Start i at 128 and fill all 'last'
3859 * table entries <= 'max'
3860 */
3861 last = 0;
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003862 for (i = 0; i < 255; ++i) /* 8-bit output value */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003863 {
3864 /* Find the corresponding maximum input value */
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003865 png_uint_16 out = (png_uint_16)(i * 257U); /* 16-bit output value */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003866
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003867 /* Find the boundary value in 16 bits: */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003868 png_uint_32 bound = png_gamma_16bit_correct(out+128U, gamma_val);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003869
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003870 /* Adjust (round) to (16-shift) bits: */
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003871 bound = (bound * max + 32768U)/65535U + 1U;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003872
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003873 while (last < bound)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003874 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003875 table[last & (0xffU >> shift)][last >> (8U - shift)] = out;
3876 last++;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003877 }
3878 }
3879
3880 /* And fill in the final entries. */
3881 while (last < (num << 8))
3882 {
3883 table[last & (0xff >> shift)][last >> (8U - shift)] = 65535U;
3884 last++;
3885 }
3886}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003887#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003888
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003889/* Build a single 8-bit table: same as the 16-bit case but much simpler (and
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003890 * typically much faster). Note that libpng currently does no sBIT processing
3891 * (apparently contrary to the spec) so a 256 entry table is always generated.
3892 */
3893static void
John Bowler5d567862011-12-24 09:12:00 -06003894png_build_8bit_table(png_structrp png_ptr, png_bytepp ptable,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003895 PNG_CONST png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003896{
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003897 unsigned int i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003898 png_bytep table = *ptable = (png_bytep)png_malloc(png_ptr, 256);
3899
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003900 if (png_gamma_significant(gamma_val)) for (i=0; i<256; i++)
3901 table[i] = png_gamma_8bit_correct(i, gamma_val);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003902
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003903 else for (i=0; i<256; ++i)
3904 table[i] = (png_byte)i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003905}
3906
John Bowler07772cb2011-10-14 18:19:47 -05003907/* Used from png_read_destroy and below to release the memory used by the gamma
3908 * tables.
3909 */
3910void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06003911png_destroy_gamma_table(png_structrp png_ptr)
John Bowler07772cb2011-10-14 18:19:47 -05003912{
3913 png_free(png_ptr, png_ptr->gamma_table);
3914 png_ptr->gamma_table = NULL;
3915
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003916#ifdef PNG_16BIT_SUPPORTED
John Bowler07772cb2011-10-14 18:19:47 -05003917 if (png_ptr->gamma_16_table != NULL)
3918 {
3919 int i;
3920 int istop = (1 << (8 - png_ptr->gamma_shift));
3921 for (i = 0; i < istop; i++)
3922 {
3923 png_free(png_ptr, png_ptr->gamma_16_table[i]);
3924 }
3925 png_free(png_ptr, png_ptr->gamma_16_table);
3926 png_ptr->gamma_16_table = NULL;
3927 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003928#endif /* 16BIT */
John Bowler07772cb2011-10-14 18:19:47 -05003929
3930#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
3931 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
3932 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
3933 png_free(png_ptr, png_ptr->gamma_from_1);
3934 png_ptr->gamma_from_1 = NULL;
3935 png_free(png_ptr, png_ptr->gamma_to_1);
3936 png_ptr->gamma_to_1 = NULL;
3937
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003938#ifdef PNG_16BIT_SUPPORTED
John Bowler07772cb2011-10-14 18:19:47 -05003939 if (png_ptr->gamma_16_from_1 != NULL)
3940 {
3941 int i;
3942 int istop = (1 << (8 - png_ptr->gamma_shift));
3943 for (i = 0; i < istop; i++)
3944 {
3945 png_free(png_ptr, png_ptr->gamma_16_from_1[i]);
3946 }
3947 png_free(png_ptr, png_ptr->gamma_16_from_1);
3948 png_ptr->gamma_16_from_1 = NULL;
3949 }
3950 if (png_ptr->gamma_16_to_1 != NULL)
3951 {
3952 int i;
3953 int istop = (1 << (8 - png_ptr->gamma_shift));
3954 for (i = 0; i < istop; i++)
3955 {
3956 png_free(png_ptr, png_ptr->gamma_16_to_1[i]);
3957 }
3958 png_free(png_ptr, png_ptr->gamma_16_to_1);
3959 png_ptr->gamma_16_to_1 = NULL;
3960 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003961#endif /* 16BIT */
John Bowler07772cb2011-10-14 18:19:47 -05003962#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
3963}
3964
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003965/* We build the 8- or 16-bit gamma tables here. Note that for 16-bit
3966 * tables, we don't make a full table if we are reducing to 8-bit in
3967 * the future. Note also how the gamma_16 tables are segmented so that
3968 * we don't need to allocate > 64K chunks for a full 16-bit table.
3969 */
3970void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06003971png_build_gamma_table(png_structrp png_ptr, int bit_depth)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003972{
3973 png_debug(1, "in png_build_gamma_table");
3974
John Bowler07772cb2011-10-14 18:19:47 -05003975 /* Remove any existing table; this copes with multiple calls to
3976 * png_read_update_info. The warning is because building the gamma tables
3977 * multiple times is a performance hit - it's harmless but the ability to call
3978 * png_read_update_info() multiple times is new in 1.5.6 so it seems sensible
3979 * to warn if the app introduces such a hit.
3980 */
3981 if (png_ptr->gamma_table != NULL || png_ptr->gamma_16_table != NULL)
3982 {
3983 png_warning(png_ptr, "gamma table being rebuilt");
3984 png_destroy_gamma_table(png_ptr);
3985 }
3986
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003987 if (bit_depth <= 8)
3988 {
3989 png_build_8bit_table(png_ptr, &png_ptr->gamma_table,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003990 png_ptr->screen_gamma > 0 ? png_reciprocal2(png_ptr->colorspace.gamma,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003991 png_ptr->screen_gamma) : PNG_FP_1);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003992
3993#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
John Bowlerd273ad22011-05-07 21:00:28 -05003994 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003995 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
John Bowlerd273ad22011-05-07 21:00:28 -05003996 if (png_ptr->transformations & (PNG_COMPOSE | PNG_RGB_TO_GRAY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003997 {
3998 png_build_8bit_table(png_ptr, &png_ptr->gamma_to_1,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003999 png_reciprocal(png_ptr->colorspace.gamma));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004000
4001 png_build_8bit_table(png_ptr, &png_ptr->gamma_from_1,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004002 png_ptr->screen_gamma > 0 ? png_reciprocal(png_ptr->screen_gamma) :
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004003 png_ptr->colorspace.gamma/* Probably doing rgb_to_gray */);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004004 }
John Bowlerd273ad22011-05-07 21:00:28 -05004005#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004006 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06004007#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004008 else
4009 {
4010 png_byte shift, sig_bit;
4011
4012 if (png_ptr->color_type & PNG_COLOR_MASK_COLOR)
4013 {
4014 sig_bit = png_ptr->sig_bit.red;
4015
4016 if (png_ptr->sig_bit.green > sig_bit)
4017 sig_bit = png_ptr->sig_bit.green;
4018
4019 if (png_ptr->sig_bit.blue > sig_bit)
4020 sig_bit = png_ptr->sig_bit.blue;
4021 }
4022 else
4023 sig_bit = png_ptr->sig_bit.gray;
4024
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05004025 /* 16-bit gamma code uses this equation:
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004026 *
4027 * ov = table[(iv & 0xff) >> gamma_shift][iv >> 8]
4028 *
4029 * Where 'iv' is the input color value and 'ov' is the output value -
4030 * pow(iv, gamma).
4031 *
4032 * Thus the gamma table consists of up to 256 256 entry tables. The table
4033 * is selected by the (8-gamma_shift) most significant of the low 8 bits of
4034 * the color value then indexed by the upper 8 bits:
4035 *
4036 * table[low bits][high 8 bits]
4037 *
4038 * So the table 'n' corresponds to all those 'iv' of:
4039 *
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05004040 * <all high 8-bit values><n << gamma_shift>..<(n+1 << gamma_shift)-1>
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004041 *
4042 */
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05004043 if (sig_bit > 0 && sig_bit < 16U)
4044 shift = (png_byte)(16U - sig_bit); /* shift == insignificant bits */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004045
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004046 else
4047 shift = 0; /* keep all 16 bits */
4048
Glenn Randers-Pehrsonab63dd02011-06-17 20:04:17 -05004049 if (png_ptr->transformations & (PNG_16_TO_8 | PNG_SCALE_16_TO_8))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004050 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004051 /* PNG_MAX_GAMMA_8 is the number of bits to keep - effectively
4052 * the significant bits in the *input* when the output will
4053 * eventually be 8 bits. By default it is 11.
4054 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004055 if (shift < (16U - PNG_MAX_GAMMA_8))
4056 shift = (16U - PNG_MAX_GAMMA_8);
4057 }
4058
4059 if (shift > 8U)
4060 shift = 8U; /* Guarantees at least one table! */
4061
4062 png_ptr->gamma_shift = shift;
4063
Glenn Randers-Pehrsonef217b72011-06-15 12:58:27 -05004064 /* NOTE: prior to 1.5.4 this test used to include PNG_BACKGROUND (now
John Bowlerd273ad22011-05-07 21:00:28 -05004065 * PNG_COMPOSE). This effectively smashed the background calculation for
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05004066 * 16-bit output because the 8-bit table assumes the result will be reduced
John Bowlerd273ad22011-05-07 21:00:28 -05004067 * to 8 bits.
4068 */
Glenn Randers-Pehrsonab63dd02011-06-17 20:04:17 -05004069 if (png_ptr->transformations & (PNG_16_TO_8 | PNG_SCALE_16_TO_8))
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004070 png_build_16to8_table(png_ptr, &png_ptr->gamma_16_table, shift,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004071 png_ptr->screen_gamma > 0 ? png_product2(png_ptr->colorspace.gamma,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004072 png_ptr->screen_gamma) : PNG_FP_1);
4073
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004074 else
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004075 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_table, shift,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004076 png_ptr->screen_gamma > 0 ? png_reciprocal2(png_ptr->colorspace.gamma,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004077 png_ptr->screen_gamma) : PNG_FP_1);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004078
4079#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
John Bowlerd273ad22011-05-07 21:00:28 -05004080 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004081 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
John Bowlerd273ad22011-05-07 21:00:28 -05004082 if (png_ptr->transformations & (PNG_COMPOSE | PNG_RGB_TO_GRAY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004083 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004084 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_to_1, shift,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004085 png_reciprocal(png_ptr->colorspace.gamma));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004086
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004087 /* Notice that the '16 from 1' table should be full precision, however
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004088 * the lookup on this table still uses gamma_shift, so it can't be.
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004089 * TODO: fix this.
4090 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004091 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_from_1, shift,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004092 png_ptr->screen_gamma > 0 ? png_reciprocal(png_ptr->screen_gamma) :
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004093 png_ptr->colorspace.gamma/* Probably doing rgb_to_gray */);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004094 }
John Bowlerd273ad22011-05-07 21:00:28 -05004095#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004096 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06004097#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004098}
4099#endif /* READ_GAMMA */
John Bowler7875d532011-11-07 22:33:49 -06004100
John Bowlerf3728102013-03-04 16:26:31 -06004101/* HARDWARE OPTION SUPPORT */
4102#ifdef PNG_SET_OPTION_SUPPORTED
4103int PNGAPI
4104png_set_option(png_structrp png_ptr, int option, int onoff)
4105{
4106 if (png_ptr != NULL && option >= 0 && option < PNG_OPTION_NEXT &&
4107 (option & 1) == 0)
4108 {
4109 int mask = 3 << option;
4110 int setting = (2 + (onoff != 0)) << option;
4111 int current = png_ptr->options;
4112
4113 png_ptr->options = (png_byte)((current & ~mask) | setting);
4114
4115 return (current & mask) >> option;
4116 }
4117
4118 return PNG_OPTION_INVALID;
4119}
4120#endif
4121
John Bowler7875d532011-11-07 22:33:49 -06004122/* sRGB support */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004123#if defined(PNG_SIMPLIFIED_READ_SUPPORTED) ||\
4124 defined(PNG_SIMPLIFIED_WRITE_SUPPORTED)
John Bowler0a521d32011-11-11 18:14:59 -06004125/* sRGB conversion tables; these are machine generated with the code in
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004126 * contrib/tools/makesRGB.c. The actual sRGB transfer curve defined in the
4127 * specification (see the article at http://en.wikipedia.org/wiki/SRGB)
4128 * is used, not the gamma=1/2.2 approximation use elsewhere in libpng.
4129 * The sRGB to linear table is exact (to the nearest 16 bit linear fraction).
4130 * The inverse (linear to sRGB) table has accuracies as follows:
John Bowler0a521d32011-11-11 18:14:59 -06004131 *
4132 * For all possible (255*65535+1) input values:
4133 *
4134 * error: -0.515566 - 0.625971, 79441 (0.475369%) of readings inexact
4135 *
4136 * For the input values corresponding to the 65536 16-bit values:
4137 *
4138 * error: -0.513727 - 0.607759, 308 (0.469978%) of readings inexact
4139 *
4140 * In all cases the inexact readings are off by one.
John Bowler7875d532011-11-07 22:33:49 -06004141 */
John Bowler7875d532011-11-07 22:33:49 -06004142
4143#ifdef PNG_SIMPLIFIED_READ_SUPPORTED
4144/* The convert-to-sRGB table is only currently required for read. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004145const png_uint_16 png_sRGB_table[256] =
John Bowler7875d532011-11-07 22:33:49 -06004146{
4147 0,20,40,60,80,99,119,139,
4148 159,179,199,219,241,264,288,313,
4149 340,367,396,427,458,491,526,562,
4150 599,637,677,718,761,805,851,898,
4151 947,997,1048,1101,1156,1212,1270,1330,
4152 1391,1453,1517,1583,1651,1720,1790,1863,
4153 1937,2013,2090,2170,2250,2333,2418,2504,
4154 2592,2681,2773,2866,2961,3058,3157,3258,
4155 3360,3464,3570,3678,3788,3900,4014,4129,
4156 4247,4366,4488,4611,4736,4864,4993,5124,
4157 5257,5392,5530,5669,5810,5953,6099,6246,
4158 6395,6547,6700,6856,7014,7174,7335,7500,
4159 7666,7834,8004,8177,8352,8528,8708,8889,
4160 9072,9258,9445,9635,9828,10022,10219,10417,
4161 10619,10822,11028,11235,11446,11658,11873,12090,
4162 12309,12530,12754,12980,13209,13440,13673,13909,
4163 14146,14387,14629,14874,15122,15371,15623,15878,
4164 16135,16394,16656,16920,17187,17456,17727,18001,
4165 18277,18556,18837,19121,19407,19696,19987,20281,
4166 20577,20876,21177,21481,21787,22096,22407,22721,
4167 23038,23357,23678,24002,24329,24658,24990,25325,
4168 25662,26001,26344,26688,27036,27386,27739,28094,
4169 28452,28813,29176,29542,29911,30282,30656,31033,
4170 31412,31794,32179,32567,32957,33350,33745,34143,
4171 34544,34948,35355,35764,36176,36591,37008,37429,
4172 37852,38278,38706,39138,39572,40009,40449,40891,
4173 41337,41785,42236,42690,43147,43606,44069,44534,
4174 45002,45473,45947,46423,46903,47385,47871,48359,
4175 48850,49344,49841,50341,50844,51349,51858,52369,
4176 52884,53401,53921,54445,54971,55500,56032,56567,
4177 57105,57646,58190,58737,59287,59840,60396,60955,
4178 61517,62082,62650,63221,63795,64372,64952,65535
4179};
John Bowler0a521d32011-11-11 18:14:59 -06004180
John Bowler7875d532011-11-07 22:33:49 -06004181#endif /* simplified read only */
4182
4183/* The base/delta tables are required for both read and write (but currently
4184 * only the simplified versions.)
4185 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004186const png_uint_16 png_sRGB_base[512] =
John Bowler7875d532011-11-07 22:33:49 -06004187{
John Bowler0a521d32011-11-11 18:14:59 -06004188 128,1782,3383,4644,5675,6564,7357,8074,
4189 8732,9346,9921,10463,10977,11466,11935,12384,
4190 12816,13233,13634,14024,14402,14769,15125,15473,
4191 15812,16142,16466,16781,17090,17393,17690,17981,
John Bowler7875d532011-11-07 22:33:49 -06004192 18266,18546,18822,19093,19359,19621,19879,20133,
John Bowler0a521d32011-11-11 18:14:59 -06004193 20383,20630,20873,21113,21349,21583,21813,22041,
4194 22265,22487,22707,22923,23138,23350,23559,23767,
John Bowler7875d532011-11-07 22:33:49 -06004195 23972,24175,24376,24575,24772,24967,25160,25352,
John Bowler0a521d32011-11-11 18:14:59 -06004196 25542,25730,25916,26101,26284,26465,26645,26823,
4197 27000,27176,27350,27523,27695,27865,28034,28201,
John Bowler7875d532011-11-07 22:33:49 -06004198 28368,28533,28697,28860,29021,29182,29341,29500,
John Bowler0a521d32011-11-11 18:14:59 -06004199 29657,29813,29969,30123,30276,30429,30580,30730,
John Bowler7875d532011-11-07 22:33:49 -06004200 30880,31028,31176,31323,31469,31614,31758,31902,
John Bowler0a521d32011-11-11 18:14:59 -06004201 32045,32186,32327,32468,32607,32746,32884,33021,
4202 33158,33294,33429,33564,33697,33831,33963,34095,
4203 34226,34357,34486,34616,34744,34873,35000,35127,
John Bowler7875d532011-11-07 22:33:49 -06004204 35253,35379,35504,35629,35753,35876,35999,36122,
4205 36244,36365,36486,36606,36726,36845,36964,37083,
John Bowler0a521d32011-11-11 18:14:59 -06004206 37201,37318,37435,37551,37668,37783,37898,38013,
John Bowler7875d532011-11-07 22:33:49 -06004207 38127,38241,38354,38467,38580,38692,38803,38915,
John Bowler0a521d32011-11-11 18:14:59 -06004208 39026,39136,39246,39356,39465,39574,39682,39790,
John Bowler7875d532011-11-07 22:33:49 -06004209 39898,40005,40112,40219,40325,40431,40537,40642,
4210 40747,40851,40955,41059,41163,41266,41369,41471,
John Bowler0a521d32011-11-11 18:14:59 -06004211 41573,41675,41777,41878,41979,42079,42179,42279,
4212 42379,42478,42577,42676,42775,42873,42971,43068,
4213 43165,43262,43359,43456,43552,43648,43743,43839,
4214 43934,44028,44123,44217,44311,44405,44499,44592,
4215 44685,44778,44870,44962,45054,45146,45238,45329,
John Bowler7875d532011-11-07 22:33:49 -06004216 45420,45511,45601,45692,45782,45872,45961,46051,
John Bowler0a521d32011-11-11 18:14:59 -06004217 46140,46229,46318,46406,46494,46583,46670,46758,
4218 46846,46933,47020,47107,47193,47280,47366,47452,
4219 47538,47623,47709,47794,47879,47964,48048,48133,
4220 48217,48301,48385,48468,48552,48635,48718,48801,
4221 48884,48966,49048,49131,49213,49294,49376,49458,
4222 49539,49620,49701,49782,49862,49943,50023,50103,
4223 50183,50263,50342,50422,50501,50580,50659,50738,
4224 50816,50895,50973,51051,51129,51207,51285,51362,
4225 51439,51517,51594,51671,51747,51824,51900,51977,
4226 52053,52129,52205,52280,52356,52432,52507,52582,
John Bowler7875d532011-11-07 22:33:49 -06004227 52657,52732,52807,52881,52956,53030,53104,53178,
John Bowler0a521d32011-11-11 18:14:59 -06004228 53252,53326,53400,53473,53546,53620,53693,53766,
John Bowler7875d532011-11-07 22:33:49 -06004229 53839,53911,53984,54056,54129,54201,54273,54345,
4230 54417,54489,54560,54632,54703,54774,54845,54916,
John Bowler0a521d32011-11-11 18:14:59 -06004231 54987,55058,55129,55199,55269,55340,55410,55480,
4232 55550,55620,55689,55759,55828,55898,55967,56036,
4233 56105,56174,56243,56311,56380,56448,56517,56585,
John Bowler7875d532011-11-07 22:33:49 -06004234 56653,56721,56789,56857,56924,56992,57059,57127,
4235 57194,57261,57328,57395,57462,57529,57595,57662,
4236 57728,57795,57861,57927,57993,58059,58125,58191,
4237 58256,58322,58387,58453,58518,58583,58648,58713,
4238 58778,58843,58908,58972,59037,59101,59165,59230,
4239 59294,59358,59422,59486,59549,59613,59677,59740,
4240 59804,59867,59930,59993,60056,60119,60182,60245,
4241 60308,60370,60433,60495,60558,60620,60682,60744,
4242 60806,60868,60930,60992,61054,61115,61177,61238,
4243 61300,61361,61422,61483,61544,61605,61666,61727,
John Bowler0a521d32011-11-11 18:14:59 -06004244 61788,61848,61909,61969,62030,62090,62150,62211,
John Bowler7875d532011-11-07 22:33:49 -06004245 62271,62331,62391,62450,62510,62570,62630,62689,
4246 62749,62808,62867,62927,62986,63045,63104,63163,
John Bowler0a521d32011-11-11 18:14:59 -06004247 63222,63281,63340,63398,63457,63515,63574,63632,
John Bowler7875d532011-11-07 22:33:49 -06004248 63691,63749,63807,63865,63923,63981,64039,64097,
John Bowler0a521d32011-11-11 18:14:59 -06004249 64155,64212,64270,64328,64385,64443,64500,64557,
4250 64614,64672,64729,64786,64843,64900,64956,65013,
4251 65070,65126,65183,65239,65296,65352,65409,65465
John Bowler7875d532011-11-07 22:33:49 -06004252};
4253
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004254const png_byte png_sRGB_delta[512] =
John Bowler7875d532011-11-07 22:33:49 -06004255{
John Bowler0a521d32011-11-11 18:14:59 -06004256 207,201,158,129,113,100,90,82,77,72,68,64,61,59,56,54,
John Bowler7875d532011-11-07 22:33:49 -06004257 52,50,49,47,46,45,43,42,41,40,39,39,38,37,36,36,
4258 35,34,34,33,33,32,32,31,31,30,30,30,29,29,28,28,
John Bowler0a521d32011-11-11 18:14:59 -06004259 28,27,27,27,27,26,26,26,25,25,25,25,24,24,24,24,
John Bowler7875d532011-11-07 22:33:49 -06004260 23,23,23,23,23,22,22,22,22,22,22,21,21,21,21,21,
4261 21,20,20,20,20,20,20,20,20,19,19,19,19,19,19,19,
4262 19,18,18,18,18,18,18,18,18,18,18,17,17,17,17,17,
4263 17,17,17,17,17,17,16,16,16,16,16,16,16,16,16,16,
4264 16,16,16,16,15,15,15,15,15,15,15,15,15,15,15,15,
4265 15,15,15,15,14,14,14,14,14,14,14,14,14,14,14,14,
4266 14,14,14,14,14,14,14,13,13,13,13,13,13,13,13,13,
4267 13,13,13,13,13,13,13,13,13,13,13,13,13,13,12,12,
4268 12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,
4269 12,12,12,12,12,12,12,12,12,12,12,12,11,11,11,11,
4270 11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,
4271 11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,
4272 11,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4273 10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4274 10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4275 10,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4276 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4277 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4278 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4279 9,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4280 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4281 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4282 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4283 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4284 8,8,8,8,8,8,8,8,8,7,7,7,7,7,7,7,
4285 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
4286 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
4287 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7
4288};
John Bowler7875d532011-11-07 22:33:49 -06004289#endif /* SIMPLIFIED READ/WRITE sRGB support */
4290
4291/* SIMPLIFIED READ/WRITE SUPPORT */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004292#if defined(PNG_SIMPLIFIED_READ_SUPPORTED) ||\
4293 defined(PNG_SIMPLIFIED_WRITE_SUPPORTED)
John Bowler7875d532011-11-07 22:33:49 -06004294static int
4295png_image_free_function(png_voidp argument)
4296{
John Bowler4fa96a42011-11-16 16:39:16 -06004297 png_imagep image = png_voidcast(png_imagep, argument);
John Bowler7875d532011-11-07 22:33:49 -06004298 png_controlp cp = image->opaque;
4299 png_control c;
4300
4301 /* Double check that we have a png_ptr - it should be impossible to get here
4302 * without one.
4303 */
4304 if (cp->png_ptr == NULL)
4305 return 0;
4306
4307 /* First free any data held in the control structure. */
4308# ifdef PNG_STDIO_SUPPORTED
4309 if (cp->owned_file)
4310 {
John Bowler4fa96a42011-11-16 16:39:16 -06004311 FILE *fp = png_voidcast(FILE*, cp->png_ptr->io_ptr);
John Bowler7875d532011-11-07 22:33:49 -06004312 cp->owned_file = 0;
4313
4314 /* Ignore errors here. */
4315 if (fp != NULL)
4316 {
4317 cp->png_ptr->io_ptr = NULL;
4318 (void)fclose(fp);
4319 }
4320 }
4321# endif
4322
4323 /* Copy the control structure so that the original, allocated, version can be
4324 * safely freed. Notice that a png_error here stops the remainder of the
4325 * cleanup, but this is probably fine because that would indicate bad memory
4326 * problems anyway.
4327 */
4328 c = *cp;
4329 image->opaque = &c;
4330 png_free(c.png_ptr, cp);
4331
4332 /* Then the structures, calling the correct API. */
4333 if (c.for_write)
4334 {
4335# ifdef PNG_SIMPLIFIED_WRITE_SUPPORTED
4336 png_destroy_write_struct(&c.png_ptr, &c.info_ptr);
4337# else
4338 png_error(c.png_ptr, "simplified write not supported");
4339# endif
4340 }
4341 else
4342 {
4343# ifdef PNG_SIMPLIFIED_READ_SUPPORTED
4344 png_destroy_read_struct(&c.png_ptr, &c.info_ptr, NULL);
4345# else
4346 png_error(c.png_ptr, "simplified read not supported");
4347# endif
4348 }
4349
4350 /* Success. */
4351 return 1;
4352}
4353
4354void PNGAPI
4355png_image_free(png_imagep image)
4356{
4357 /* Safely call the real function, but only if doing so is safe at this point
4358 * (if not inside an error handling context). Otherwise assume
4359 * png_safe_execute will call this API after the return.
4360 */
4361 if (image != NULL && image->opaque != NULL &&
4362 image->opaque->error_buf == NULL)
4363 {
4364 /* Ignore errors here: */
4365 (void)png_safe_execute(image, png_image_free_function, image);
4366 image->opaque = NULL;
4367 }
4368}
4369
4370int /* PRIVATE */
4371png_image_error(png_imagep image, png_const_charp error_message)
4372{
4373 /* Utility to log an error. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004374 png_safecat(image->message, (sizeof image->message), 0, error_message);
4375 image->warning_or_error |= PNG_IMAGE_ERROR;
John Bowler7875d532011-11-07 22:33:49 -06004376 png_image_free(image);
4377 return 0;
4378}
4379
4380#endif /* SIMPLIFIED READ/WRITE */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004381#endif /* defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED) */