blob: e04045bb5921ba613b64831abac1e5af2d886b4d [file] [log] [blame]
John Bowler8de49d02012-09-27 09:26:49 -05001
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06002/* png.c - location for general purpose libpng functions
3 *
Glenn Randers-Pehrson1b3a9fd2014-09-20 11:01:20 -05004 * Last changed in libpng 1.6.14 [(PENDING RELEASE)]
Glenn Randers-Pehrson95a19732013-12-31 21:10:13 -06005 * Copyright (c) 1998-2014 Glenn Randers-Pehrson
Glenn Randers-Pehrsond4366722000-06-04 14:29:29 -05006 * (Version 0.96 Copyright (c) 1996, 1997 Andreas Dilger)
7 * (Version 0.88 Copyright (c) 1995, 1996 Guy Eric Schalnat, Group 42, Inc.)
Glenn Randers-Pehrson3e61d792009-06-24 09:31:28 -05008 *
Glenn Randers-Pehrsonbfbf8652009-06-26 21:46:52 -05009 * This code is released under the libpng license.
Glenn Randers-Pehrsonc332bbc2009-06-25 13:43:50 -050010 * For conditions of distribution and use, see the disclaimer
Glenn Randers-Pehrson037023b2009-06-24 10:27:36 -050011 * and license in png.h
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -060012 */
Guy Schalnat0d580581995-07-20 02:43:20 -050013
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -050014#include "pngpriv.h"
Guy Schalnat0d580581995-07-20 02:43:20 -050015
Glenn Randers-Pehrson520a7642000-03-21 05:13:06 -060016/* Generate a compiler error if there is an old png.h in the search path. */
Glenn Randers-Pehrson4c0ded32014-09-27 10:33:09 -050017typedef png_libpng_version_1_6_14beta05 Your_png_h_is_not_version_1_6_14beta05;
Glenn Randers-Pehrson520a7642000-03-21 05:13:06 -060018
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060019/* Tells libpng that we have already handled the first "num_bytes" bytes
20 * of the PNG file signature. If the PNG data is embedded into another
21 * stream we can set num_bytes = 8 so that libpng will not attempt to read
22 * or write any of the magic bytes before it starts on the IHDR.
23 */
Glenn Randers-Pehrsonbcfd15d1999-10-01 14:22:25 -050024
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060025#ifdef PNG_READ_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -050026void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -060027png_set_sig_bytes(png_structrp png_ptr, int num_bytes)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060028{
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -050029 png_debug(1, "in png_set_sig_bytes");
30
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -050031 if (png_ptr == NULL)
32 return;
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -050033
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060034 if (num_bytes > 8)
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -050035 png_error(png_ptr, "Too many bytes for PNG signature");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060036
Glenn Randers-Pehrson860ab2b1999-10-14 07:43:10 -050037 png_ptr->sig_bytes = (png_byte)(num_bytes < 0 ? 0 : num_bytes);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060038}
39
40/* Checks whether the supplied bytes match the PNG signature. We allow
41 * checking less than the full 8-byte signature so that those apps that
42 * already read the first few bytes of a file to determine the file type
43 * can simply check the remaining bytes for extra assurance. Returns
44 * an integer less than, equal to, or greater than zero if sig is found,
45 * respectively, to be less than, to match, or be greater than the correct
Glenn Randers-Pehrson6d62ef12011-08-25 18:17:50 -050046 * PNG signature (this is the same behavior as strcmp, memcmp, etc).
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060047 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -050048int PNGAPI
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -050049png_sig_cmp(png_const_bytep sig, png_size_t start, png_size_t num_to_check)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060050{
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -060051 png_byte png_signature[8] = {137, 80, 78, 71, 13, 10, 26, 10};
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -050052
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060053 if (num_to_check > 8)
54 num_to_check = 8;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -050055
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060056 else if (num_to_check < 1)
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060057 return (-1);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060058
Andreas Dilger47a0c421997-05-16 02:46:07 -050059 if (start > 7)
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060060 return (-1);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060061
62 if (start + num_to_check > 8)
63 num_to_check = 8 - start;
64
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -060065 return ((int)(memcmp(&sig[start], &png_signature[start], num_to_check)));
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060066}
67
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060068#endif /* PNG_READ_SUPPORTED */
Guy Schalnat0d580581995-07-20 02:43:20 -050069
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060070#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Glenn Randers-Pehrsonc5080812010-10-23 08:26:26 -050071/* Function to allocate memory for zlib */
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -050072PNG_FUNCTION(voidpf /* PRIVATE */,
73png_zalloc,(voidpf png_ptr, uInt items, uInt size),PNG_ALLOCATED)
Guy Schalnat0d580581995-07-20 02:43:20 -050074{
John Bowlerd332c672011-12-21 17:36:12 -060075 png_alloc_size_t num_bytes = size;
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -050076
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -050077 if (png_ptr == NULL)
John Bowlerd332c672011-12-21 17:36:12 -060078 return NULL;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -050079
John Bowlerd332c672011-12-21 17:36:12 -060080 if (items >= (~(png_alloc_size_t)0)/size)
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -050081 {
John Bowler5d567862011-12-24 09:12:00 -060082 png_warning (png_voidcast(png_structrp, png_ptr),
John Bowlerd332c672011-12-21 17:36:12 -060083 "Potential overflow in png_zalloc()");
84 return NULL;
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -050085 }
Glenn Randers-Pehrson9c0f0942002-02-21 23:14:23 -060086
John Bowlerd332c672011-12-21 17:36:12 -060087 num_bytes *= items;
John Bowler5d567862011-12-24 09:12:00 -060088 return png_malloc_warn(png_voidcast(png_structrp, png_ptr), num_bytes);
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -050089}
90
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -050091/* Function to free memory for zlib */
Glenn Randers-Pehrson3f705ba2009-07-23 12:53:06 -050092void /* PRIVATE */
Guy Schalnat51f0eb41995-09-26 05:22:39 -050093png_zfree(voidpf png_ptr, voidpf ptr)
Guy Schalnat0d580581995-07-20 02:43:20 -050094{
John Bowler5d567862011-12-24 09:12:00 -060095 png_free(png_voidcast(png_const_structrp,png_ptr), ptr);
Guy Schalnat0d580581995-07-20 02:43:20 -050096}
97
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060098/* Reset the CRC variable to 32 bits of 1's. Care must be taken
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -060099 * in case CRC is > 32 bits to leave the top bits 0.
100 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500101void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -0600102png_reset_crc(png_structrp png_ptr)
Guy Schalnat0d580581995-07-20 02:43:20 -0500103{
John Bowlerf3f7e142011-09-09 07:32:37 -0500104 /* The cast is safe because the crc is a 32 bit value. */
105 png_ptr->crc = (png_uint_32)crc32(0, Z_NULL, 0);
Guy Schalnat0d580581995-07-20 02:43:20 -0500106}
107
Andreas Dilger47a0c421997-05-16 02:46:07 -0500108/* Calculate the CRC over a section of data. We can only pass as
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600109 * much data to this routine as the largest single buffer size. We
110 * also check that this data will actually be used before going to the
111 * trouble of calculating it.
112 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500113void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -0600114png_calculate_crc(png_structrp png_ptr, png_const_bytep ptr, png_size_t length)
Guy Schalnat0d580581995-07-20 02:43:20 -0500115{
Andreas Dilger47a0c421997-05-16 02:46:07 -0500116 int need_crc = 1;
117
Glenn Randers-Pehrson67a289f2013-04-19 19:03:34 -0500118 if (PNG_CHUNK_ANCILLARY(png_ptr->chunk_name))
Andreas Dilger47a0c421997-05-16 02:46:07 -0500119 {
120 if ((png_ptr->flags & PNG_FLAG_CRC_ANCILLARY_MASK) ==
121 (PNG_FLAG_CRC_ANCILLARY_USE | PNG_FLAG_CRC_ANCILLARY_NOWARN))
122 need_crc = 0;
123 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500124
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500125 else /* critical */
Andreas Dilger47a0c421997-05-16 02:46:07 -0500126 {
127 if (png_ptr->flags & PNG_FLAG_CRC_CRITICAL_IGNORE)
128 need_crc = 0;
129 }
130
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600131 /* 'uLong' is defined in zlib.h as unsigned long; this means that on some
132 * systems it is a 64 bit value. crc32, however, returns 32 bits so the
133 * following cast is safe. 'uInt' may be no more than 16 bits, so it is
134 * necessary to perform a loop here.
John Bowlerf3f7e142011-09-09 07:32:37 -0500135 */
136 if (need_crc && length > 0)
137 {
138 uLong crc = png_ptr->crc; /* Should never issue a warning */
139
140 do
141 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600142 uInt safe_length = (uInt)length;
143 if (safe_length == 0)
144 safe_length = (uInt)-1; /* evil, but safe */
John Bowlerf3f7e142011-09-09 07:32:37 -0500145
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600146 crc = crc32(crc, ptr, safe_length);
John Bowlerf3f7e142011-09-09 07:32:37 -0500147
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600148 /* The following should never issue compiler warnings; if they do the
John Bowlerf3f7e142011-09-09 07:32:37 -0500149 * target system has characteristics that will probably violate other
150 * assumptions within the libpng code.
151 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600152 ptr += safe_length;
153 length -= safe_length;
John Bowlerf3f7e142011-09-09 07:32:37 -0500154 }
155 while (length > 0);
156
157 /* And the following is always safe because the crc is only 32 bits. */
158 png_ptr->crc = (png_uint_32)crc;
159 }
Guy Schalnat0d580581995-07-20 02:43:20 -0500160}
Guy Schalnate5a37791996-06-05 15:50:50 -0500161
John Bowler88b77cc2011-05-05 06:49:55 -0500162/* Check a user supplied version number, called from both read and write
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600163 * functions that create a png_struct.
John Bowler88b77cc2011-05-05 06:49:55 -0500164 */
165int
John Bowler5d567862011-12-24 09:12:00 -0600166png_user_version_check(png_structrp png_ptr, png_const_charp user_png_ver)
John Bowler88b77cc2011-05-05 06:49:55 -0500167{
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -0600168 if (user_png_ver != NULL)
John Bowler88b77cc2011-05-05 06:49:55 -0500169 {
170 int i = 0;
171
172 do
173 {
174 if (user_png_ver[i] != png_libpng_ver[i])
175 png_ptr->flags |= PNG_FLAG_LIBRARY_MISMATCH;
176 } while (png_libpng_ver[i++]);
177 }
178
179 else
180 png_ptr->flags |= PNG_FLAG_LIBRARY_MISMATCH;
181
182 if (png_ptr->flags & PNG_FLAG_LIBRARY_MISMATCH)
183 {
184 /* Libpng 0.90 and later are binary incompatible with libpng 0.89, so
185 * we must recompile any applications that use any older library version.
186 * For versions after libpng 1.0, we will be compatible, so we need
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600187 * only check the first and third digits (note that when we reach version
188 * 1.10 we will need to check the fourth symbol, namely user_png_ver[3]).
John Bowler88b77cc2011-05-05 06:49:55 -0500189 */
190 if (user_png_ver == NULL || user_png_ver[0] != png_libpng_ver[0] ||
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600191 (user_png_ver[0] == '1' && (user_png_ver[2] != png_libpng_ver[2] ||
192 user_png_ver[3] != png_libpng_ver[3])) ||
John Bowler88b77cc2011-05-05 06:49:55 -0500193 (user_png_ver[0] == '0' && user_png_ver[2] < '9'))
194 {
195#ifdef PNG_WARNINGS_SUPPORTED
196 size_t pos = 0;
197 char m[128];
198
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600199 pos = png_safecat(m, (sizeof m), pos,
200 "Application built with libpng-");
201 pos = png_safecat(m, (sizeof m), pos, user_png_ver);
202 pos = png_safecat(m, (sizeof m), pos, " but running with ");
203 pos = png_safecat(m, (sizeof m), pos, png_libpng_ver);
Glenn Randers-Pehrson3f8a2ed2013-11-25 10:38:21 -0600204 PNG_UNUSED(pos)
John Bowler88b77cc2011-05-05 06:49:55 -0500205
206 png_warning(png_ptr, m);
207#endif
208
209#ifdef PNG_ERROR_NUMBERS_SUPPORTED
210 png_ptr->flags = 0;
211#endif
212
213 return 0;
214 }
215 }
216
217 /* Success return. */
218 return 1;
219}
220
John Bowlerd332c672011-12-21 17:36:12 -0600221/* Generic function to create a png_struct for either read or write - this
222 * contains the common initialization.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600223 */
John Bowlerd332c672011-12-21 17:36:12 -0600224PNG_FUNCTION(png_structp /* PRIVATE */,
225png_create_png_struct,(png_const_charp user_png_ver, png_voidp error_ptr,
226 png_error_ptr error_fn, png_error_ptr warn_fn, png_voidp mem_ptr,
227 png_malloc_ptr malloc_fn, png_free_ptr free_fn),PNG_ALLOCATED)
228{
229 png_struct create_struct;
230# ifdef PNG_SETJMP_SUPPORTED
231 jmp_buf create_jmp_buf;
232# endif
233
234 /* This temporary stack-allocated structure is used to provide a place to
235 * build enough context to allow the user provided memory allocator (if any)
236 * to be called.
237 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600238 memset(&create_struct, 0, (sizeof create_struct));
John Bowlerd332c672011-12-21 17:36:12 -0600239
240 /* Added at libpng-1.2.6 */
241# ifdef PNG_USER_LIMITS_SUPPORTED
242 create_struct.user_width_max = PNG_USER_WIDTH_MAX;
243 create_struct.user_height_max = PNG_USER_HEIGHT_MAX;
244
245# ifdef PNG_USER_CHUNK_CACHE_MAX
246 /* Added at libpng-1.2.43 and 1.4.0 */
247 create_struct.user_chunk_cache_max = PNG_USER_CHUNK_CACHE_MAX;
248# endif
249
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600250# ifdef PNG_USER_CHUNK_MALLOC_MAX
John Bowlerd332c672011-12-21 17:36:12 -0600251 /* Added at libpng-1.2.43 and 1.4.1, required only for read but exists
252 * in png_struct regardless.
253 */
254 create_struct.user_chunk_malloc_max = PNG_USER_CHUNK_MALLOC_MAX;
255# endif
256# endif
257
258 /* The following two API calls simply set fields in png_struct, so it is safe
259 * to do them now even though error handling is not yet set up.
260 */
261# ifdef PNG_USER_MEM_SUPPORTED
262 png_set_mem_fn(&create_struct, mem_ptr, malloc_fn, free_fn);
Glenn Randers-Pehrsonc9120502013-11-22 14:58:04 -0600263# else
264 PNG_UNUSED(mem_ptr)
265 PNG_UNUSED(malloc_fn)
266 PNG_UNUSED(free_fn)
John Bowlerd332c672011-12-21 17:36:12 -0600267# endif
268
269 /* (*error_fn) can return control to the caller after the error_ptr is set,
270 * this will result in a memory leak unless the error_fn does something
271 * extremely sophisticated. The design lacks merit but is implicit in the
272 * API.
273 */
274 png_set_error_fn(&create_struct, error_ptr, error_fn, warn_fn);
275
276# ifdef PNG_SETJMP_SUPPORTED
277 if (!setjmp(create_jmp_buf))
278 {
279 /* Temporarily fake out the longjmp information until we have
280 * successfully completed this function. This only works if we have
281 * setjmp() support compiled in, but it is safe - this stuff should
282 * never happen.
283 */
284 create_struct.jmp_buf_ptr = &create_jmp_buf;
285 create_struct.jmp_buf_size = 0; /*stack allocation*/
286 create_struct.longjmp_fn = longjmp;
287# else
288 {
289# endif
290 /* Call the general version checker (shared with read and write code):
291 */
292 if (png_user_version_check(&create_struct, user_png_ver))
293 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600294 png_structrp png_ptr = png_voidcast(png_structrp,
295 png_malloc_warn(&create_struct, (sizeof *png_ptr)));
John Bowlerd332c672011-12-21 17:36:12 -0600296
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600297 if (png_ptr != NULL)
John Bowlerd332c672011-12-21 17:36:12 -0600298 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600299 /* png_ptr->zstream holds a back-pointer to the png_struct, so
300 * this can only be done now:
301 */
302 create_struct.zstream.zalloc = png_zalloc;
303 create_struct.zstream.zfree = png_zfree;
304 create_struct.zstream.opaque = png_ptr;
John Bowlerd332c672011-12-21 17:36:12 -0600305
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600306# ifdef PNG_SETJMP_SUPPORTED
307 /* Eliminate the local error handling: */
308 create_struct.jmp_buf_ptr = NULL;
309 create_struct.jmp_buf_size = 0;
310 create_struct.longjmp_fn = 0;
311# endif
John Bowlerd332c672011-12-21 17:36:12 -0600312
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600313 *png_ptr = create_struct;
John Bowlerd332c672011-12-21 17:36:12 -0600314
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600315 /* This is the successful return point */
316 return png_ptr;
John Bowlerd332c672011-12-21 17:36:12 -0600317 }
318 }
319 }
320
321 /* A longjmp because of a bug in the application storage allocator or a
322 * simple failure to allocate the png_struct.
323 */
John Bowlerd332c672011-12-21 17:36:12 -0600324 return NULL;
325}
326
327/* Allocate the memory for an info_struct for the application. */
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -0500328PNG_FUNCTION(png_infop,PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600329png_create_info_struct,(png_const_structrp png_ptr),PNG_ALLOCATED)
Guy Schalnate5a37791996-06-05 15:50:50 -0500330{
John Bowler5d567862011-12-24 09:12:00 -0600331 png_inforp info_ptr;
Guy Schalnate5a37791996-06-05 15:50:50 -0500332
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500333 png_debug(1, "in png_create_info_struct");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500334
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500335 if (png_ptr == NULL)
John Bowlerd332c672011-12-21 17:36:12 -0600336 return NULL;
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500337
John Bowlerd332c672011-12-21 17:36:12 -0600338 /* Use the internal API that does not (or at least should not) error out, so
339 * that this call always returns ok. The application typically sets up the
340 * error handling *after* creating the info_struct because this is the way it
341 * has always been done in 'example.c'.
342 */
John Bowler5d567862011-12-24 09:12:00 -0600343 info_ptr = png_voidcast(png_inforp, png_malloc_base(png_ptr,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600344 (sizeof *info_ptr)));
John Bowlerd332c672011-12-21 17:36:12 -0600345
Glenn Randers-Pehrson5cded0b2001-11-07 07:10:08 -0600346 if (info_ptr != NULL)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600347 memset(info_ptr, 0, (sizeof *info_ptr));
Guy Schalnate5a37791996-06-05 15:50:50 -0500348
John Bowlerd332c672011-12-21 17:36:12 -0600349 return info_ptr;
Guy Schalnate5a37791996-06-05 15:50:50 -0500350}
351
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600352/* This function frees the memory associated with a single info struct.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600353 * Normally, one would use either png_destroy_read_struct() or
354 * png_destroy_write_struct() to free an info struct, but this may be
John Bowlerd332c672011-12-21 17:36:12 -0600355 * useful for some applications. From libpng 1.6.0 this function is also used
356 * internally to implement the png_info release part of the 'struct' destroy
357 * APIs. This ensures that all possible approaches free the same data (all of
358 * it).
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600359 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500360void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600361png_destroy_info_struct(png_const_structrp png_ptr, png_infopp info_ptr_ptr)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600362{
John Bowler5d567862011-12-24 09:12:00 -0600363 png_inforp info_ptr = NULL;
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600364
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500365 png_debug(1, "in png_destroy_info_struct");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500366
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500367 if (png_ptr == NULL)
368 return;
369
Andreas Dilger47a0c421997-05-16 02:46:07 -0500370 if (info_ptr_ptr != NULL)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600371 info_ptr = *info_ptr_ptr;
372
Andreas Dilger47a0c421997-05-16 02:46:07 -0500373 if (info_ptr != NULL)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600374 {
John Bowlerd332c672011-12-21 17:36:12 -0600375 /* Do this first in case of an error below; if the app implements its own
376 * memory management this can lead to png_free calling png_error, which
377 * will abort this routine and return control to the app error handler.
378 * An infinite loop may result if it then tries to free the same info
379 * ptr.
380 */
Glenn Randers-Pehrson3f549252001-10-27 07:35:13 -0500381 *info_ptr_ptr = NULL;
John Bowlerd332c672011-12-21 17:36:12 -0600382
John Bowlerdf477e42011-12-24 07:47:02 -0600383 png_free_data(png_ptr, info_ptr, PNG_FREE_ALL, -1);
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600384 memset(info_ptr, 0, (sizeof *info_ptr));
John Bowlerd332c672011-12-21 17:36:12 -0600385 png_free(png_ptr, info_ptr);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600386 }
387}
388
389/* Initialize the info structure. This is now an internal function (0.89)
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600390 * and applications using it are urged to use png_create_info_struct()
John Bowlerd332c672011-12-21 17:36:12 -0600391 * instead. Use deprecated in 1.6.0, internal use removed (used internally it
392 * is just a memset).
393 *
394 * NOTE: it is almost inconceivable that this API is used because it bypasses
395 * the user-memory mechanism and the user error handling/warning mechanisms in
396 * those cases where it does anything other than a memset.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600397 */
John Bowlerd332c672011-12-21 17:36:12 -0600398PNG_FUNCTION(void,PNGAPI
399png_info_init_3,(png_infopp ptr_ptr, png_size_t png_info_struct_size),
400 PNG_DEPRECATED)
Glenn Randers-Pehrson8b6a8892001-05-18 04:54:50 -0500401{
John Bowler5d567862011-12-24 09:12:00 -0600402 png_inforp info_ptr = *ptr_ptr;
Glenn Randers-Pehrson8b6a8892001-05-18 04:54:50 -0500403
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500404 png_debug(1, "in png_info_init_3");
405
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500406 if (info_ptr == NULL)
407 return;
Glenn Randers-Pehrson6b12c082006-11-14 10:53:30 -0600408
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600409 if ((sizeof (png_info)) > png_info_struct_size)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500410 {
John Bowlerd332c672011-12-21 17:36:12 -0600411 *ptr_ptr = NULL;
412 /* The following line is why this API should not be used: */
413 free(info_ptr);
John Bowler5d567862011-12-24 09:12:00 -0600414 info_ptr = png_voidcast(png_inforp, png_malloc_base(NULL,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600415 (sizeof *info_ptr)));
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500416 *ptr_ptr = info_ptr;
417 }
Glenn Randers-Pehrson8b6a8892001-05-18 04:54:50 -0500418
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500419 /* Set everything to 0 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600420 memset(info_ptr, 0, (sizeof *info_ptr));
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600421}
422
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600423/* The following API is not called internally */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500424void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600425png_data_freer(png_const_structrp png_ptr, png_inforp info_ptr,
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500426 int freer, png_uint_32 mask)
427{
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500428 png_debug(1, "in png_data_freer");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500429
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500430 if (png_ptr == NULL || info_ptr == NULL)
431 return;
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500432
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500433 if (freer == PNG_DESTROY_WILL_FREE_DATA)
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500434 info_ptr->free_me |= mask;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500435
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500436 else if (freer == PNG_USER_WILL_FREE_DATA)
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500437 info_ptr->free_me &= ~mask;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500438
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500439 else
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600440 png_error(png_ptr, "Unknown freer parameter in png_data_freer");
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500441}
442
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500443void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600444png_free_data(png_const_structrp png_ptr, png_inforp info_ptr, png_uint_32 mask,
Glenn Randers-Pehrson82ae3832001-04-20 10:32:10 -0500445 int num)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600446{
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500447 png_debug(1, "in png_free_data");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500448
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600449 if (png_ptr == NULL || info_ptr == NULL)
450 return;
Glenn Randers-Pehrsona77ef622000-02-18 13:48:52 -0600451
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500452#ifdef PNG_TEXT_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500453 /* Free text item num or (if num == -1) all text items */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500454 if ((mask & PNG_FREE_TEXT) & info_ptr->free_me)
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600455 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500456 if (num != -1)
457 {
458 if (info_ptr->text && info_ptr->text[num].key)
459 {
460 png_free(png_ptr, info_ptr->text[num].key);
461 info_ptr->text[num].key = NULL;
462 }
463 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500464
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500465 else
466 {
467 int i;
468 for (i = 0; i < info_ptr->num_text; i++)
469 png_free_data(png_ptr, info_ptr, PNG_FREE_TEXT, i);
470 png_free(png_ptr, info_ptr->text);
471 info_ptr->text = NULL;
472 info_ptr->num_text=0;
473 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600474 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600475#endif
476
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500477#ifdef PNG_tRNS_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500478 /* Free any tRNS entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500479 if ((mask & PNG_FREE_TRNS) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500480 {
Glenn Randers-Pehrson6abea752009-08-08 16:52:06 -0500481 png_free(png_ptr, info_ptr->trans_alpha);
482 info_ptr->trans_alpha = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500483 info_ptr->valid &= ~PNG_INFO_tRNS;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500484 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600485#endif
486
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500487#ifdef PNG_sCAL_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500488 /* Free any sCAL entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500489 if ((mask & PNG_FREE_SCAL) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500490 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500491 png_free(png_ptr, info_ptr->scal_s_width);
492 png_free(png_ptr, info_ptr->scal_s_height);
493 info_ptr->scal_s_width = NULL;
494 info_ptr->scal_s_height = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500495 info_ptr->valid &= ~PNG_INFO_sCAL;
496 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600497#endif
498
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500499#ifdef PNG_pCAL_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500500 /* Free any pCAL entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500501 if ((mask & PNG_FREE_PCAL) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500502 {
503 png_free(png_ptr, info_ptr->pcal_purpose);
504 png_free(png_ptr, info_ptr->pcal_units);
505 info_ptr->pcal_purpose = NULL;
506 info_ptr->pcal_units = NULL;
507 if (info_ptr->pcal_params != NULL)
508 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600509 unsigned int i;
510 for (i = 0; i < info_ptr->pcal_nparams; i++)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500511 {
512 png_free(png_ptr, info_ptr->pcal_params[i]);
Glenn Randers-Pehrsonf81b50b2009-12-29 16:50:15 -0600513 info_ptr->pcal_params[i] = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500514 }
515 png_free(png_ptr, info_ptr->pcal_params);
516 info_ptr->pcal_params = NULL;
517 }
518 info_ptr->valid &= ~PNG_INFO_pCAL;
519 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600520#endif
521
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500522#ifdef PNG_iCCP_SUPPORTED
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600523 /* Free any profile entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500524 if ((mask & PNG_FREE_ICCP) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500525 {
526 png_free(png_ptr, info_ptr->iccp_name);
527 png_free(png_ptr, info_ptr->iccp_profile);
528 info_ptr->iccp_name = NULL;
529 info_ptr->iccp_profile = NULL;
530 info_ptr->valid &= ~PNG_INFO_iCCP;
531 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600532#endif
533
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500534#ifdef PNG_sPLT_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500535 /* Free a given sPLT entry, or (if num == -1) all sPLT entries */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500536 if ((mask & PNG_FREE_SPLT) & info_ptr->free_me)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600537 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500538 if (num != -1)
Glenn Randers-Pehrsonfc4a1432000-05-17 17:39:34 -0500539 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500540 if (info_ptr->splt_palettes)
541 {
542 png_free(png_ptr, info_ptr->splt_palettes[num].name);
543 png_free(png_ptr, info_ptr->splt_palettes[num].entries);
544 info_ptr->splt_palettes[num].name = NULL;
545 info_ptr->splt_palettes[num].entries = NULL;
546 }
547 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500548
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500549 else
550 {
551 if (info_ptr->splt_palettes_num)
552 {
Glenn Randers-Pehrson45679352013-01-20 00:44:29 -0600553 int i;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600554 for (i = 0; i < info_ptr->splt_palettes_num; i++)
555 png_free_data(png_ptr, info_ptr, PNG_FREE_SPLT, (int)i);
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500556
557 png_free(png_ptr, info_ptr->splt_palettes);
558 info_ptr->splt_palettes = NULL;
559 info_ptr->splt_palettes_num = 0;
560 }
561 info_ptr->valid &= ~PNG_INFO_sPLT;
Glenn Randers-Pehrsonfc4a1432000-05-17 17:39:34 -0500562 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600563 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600564#endif
565
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600566#ifdef PNG_STORE_UNKNOWN_CHUNKS_SUPPORTED
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500567 if ((mask & PNG_FREE_UNKN) & info_ptr->free_me)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600568 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500569 if (num != -1)
570 {
571 if (info_ptr->unknown_chunks)
572 {
573 png_free(png_ptr, info_ptr->unknown_chunks[num].data);
574 info_ptr->unknown_chunks[num].data = NULL;
575 }
576 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500577
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500578 else
579 {
Glenn Randers-Pehrson45679352013-01-20 00:44:29 -0600580 int i;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600581
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500582 if (info_ptr->unknown_chunks_num)
583 {
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -0500584 for (i = 0; i < info_ptr->unknown_chunks_num; i++)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600585 png_free_data(png_ptr, info_ptr, PNG_FREE_UNKN, (int)i);
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600586
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500587 png_free(png_ptr, info_ptr->unknown_chunks);
588 info_ptr->unknown_chunks = NULL;
589 info_ptr->unknown_chunks_num = 0;
590 }
591 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600592 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600593#endif
594
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500595#ifdef PNG_hIST_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500596 /* Free any hIST entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500597 if ((mask & PNG_FREE_HIST) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500598 {
599 png_free(png_ptr, info_ptr->hist);
600 info_ptr->hist = NULL;
601 info_ptr->valid &= ~PNG_INFO_hIST;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500602 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600603#endif
604
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500605 /* Free any PLTE entry that was internally allocated */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500606 if ((mask & PNG_FREE_PLTE) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500607 {
John Bowler40b26032011-12-22 08:09:15 -0600608 png_free(png_ptr, info_ptr->palette);
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500609 info_ptr->palette = NULL;
610 info_ptr->valid &= ~PNG_INFO_PLTE;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500611 info_ptr->num_palette = 0;
612 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600613
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500614#ifdef PNG_INFO_IMAGE_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500615 /* Free any image bits attached to the info structure */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500616 if ((mask & PNG_FREE_ROWS) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500617 {
618 if (info_ptr->row_pointers)
619 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600620 png_uint_32 row;
621 for (row = 0; row < info_ptr->height; row++)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500622 {
623 png_free(png_ptr, info_ptr->row_pointers[row]);
Glenn Randers-Pehrsonf81b50b2009-12-29 16:50:15 -0600624 info_ptr->row_pointers[row] = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500625 }
626 png_free(png_ptr, info_ptr->row_pointers);
Glenn Randers-Pehrsonf81b50b2009-12-29 16:50:15 -0600627 info_ptr->row_pointers = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500628 }
629 info_ptr->valid &= ~PNG_INFO_IDAT;
630 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600631#endif
Glenn Randers-Pehrsonfc4a1432000-05-17 17:39:34 -0500632
John Bowler56a739b2010-12-19 16:33:20 -0600633 if (num != -1)
634 mask &= ~PNG_FREE_MUL;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500635
John Bowler56a739b2010-12-19 16:33:20 -0600636 info_ptr->free_me &= ~mask;
Glenn Randers-Pehrsona77ef622000-02-18 13:48:52 -0600637}
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -0600638#endif /* defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED) */
Guy Schalnat0d580581995-07-20 02:43:20 -0500639
Guy Schalnate5a37791996-06-05 15:50:50 -0500640/* This function returns a pointer to the io_ptr associated with the user
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600641 * functions. The application should free any memory associated with this
642 * pointer before png_write_destroy() or png_read_destroy() are called.
643 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500644png_voidp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600645png_get_io_ptr(png_const_structrp png_ptr)
Guy Schalnate5a37791996-06-05 15:50:50 -0500646{
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500647 if (png_ptr == NULL)
648 return (NULL);
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500649
Glenn Randers-Pehrsonb2120021998-01-31 20:07:59 -0600650 return (png_ptr->io_ptr);
Guy Schalnate5a37791996-06-05 15:50:50 -0500651}
Andreas Dilger47a0c421997-05-16 02:46:07 -0500652
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -0600653#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600654# ifdef PNG_STDIO_SUPPORTED
Andreas Dilger47a0c421997-05-16 02:46:07 -0500655/* Initialize the default input/output functions for the PNG file. If you
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600656 * use your own read or write routines, you can call either png_set_read_fn()
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500657 * or png_set_write_fn() instead of png_init_io(). If you have defined
Glenn Randers-Pehrsonce775cc2011-07-13 06:28:26 -0500658 * PNG_NO_STDIO or otherwise disabled PNG_STDIO_SUPPORTED, you must use a
659 * function of your own because "FILE *" isn't necessarily available.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600660 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500661void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600662png_init_io(png_structrp png_ptr, png_FILE_p fp)
Guy Schalnate5a37791996-06-05 15:50:50 -0500663{
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500664 png_debug(1, "in png_init_io");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500665
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500666 if (png_ptr == NULL)
667 return;
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500668
Guy Schalnate5a37791996-06-05 15:50:50 -0500669 png_ptr->io_ptr = (png_voidp)fp;
670}
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600671# endif
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500672
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600673#ifdef PNG_SAVE_INT_32_SUPPORTED
674/* The png_save_int_32 function assumes integers are stored in two's
675 * complement format. If this isn't the case, then this routine needs to
676 * be modified to write data in two's complement format. Note that,
677 * the following works correctly even if png_int_32 has more than 32 bits
678 * (compare the more complex code required on read for sign extension.)
679 */
680void PNGAPI
681png_save_int_32(png_bytep buf, png_int_32 i)
682{
683 buf[0] = (png_byte)((i >> 24) & 0xff);
684 buf[1] = (png_byte)((i >> 16) & 0xff);
685 buf[2] = (png_byte)((i >> 8) & 0xff);
686 buf[3] = (png_byte)(i & 0xff);
687}
688#endif
689
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600690# ifdef PNG_TIME_RFC1123_SUPPORTED
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500691/* Convert the supplied time into an RFC 1123 string suitable for use in
692 * a "Creation Time" or other text-based time string.
693 */
John Bowler40b26032011-12-22 08:09:15 -0600694int PNGAPI
695png_convert_to_rfc1123_buffer(char out[29], png_const_timep ptime)
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500696{
697 static PNG_CONST char short_months[12][4] =
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600698 {"Jan", "Feb", "Mar", "Apr", "May", "Jun",
699 "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"};
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500700
John Bowler40b26032011-12-22 08:09:15 -0600701 if (out == NULL)
702 return 0;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500703
Glenn Randers-Pehrson925a6022011-11-19 18:04:01 -0600704 if (ptime->year > 9999 /* RFC1123 limitation */ ||
705 ptime->month == 0 || ptime->month > 12 ||
706 ptime->day == 0 || ptime->day > 31 ||
707 ptime->hour > 23 || ptime->minute > 59 ||
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600708 ptime->second > 60)
John Bowler40b26032011-12-22 08:09:15 -0600709 return 0;
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600710
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500711 {
John Bowler88b77cc2011-05-05 06:49:55 -0500712 size_t pos = 0;
Glenn Randers-Pehrson925a6022011-11-19 18:04:01 -0600713 char number_buf[5]; /* enough for a four-digit year */
John Bowler88b77cc2011-05-05 06:49:55 -0500714
John Bowler40b26032011-12-22 08:09:15 -0600715# define APPEND_STRING(string) pos = png_safecat(out, 29, pos, (string))
John Bowler88b77cc2011-05-05 06:49:55 -0500716# define APPEND_NUMBER(format, value)\
717 APPEND_STRING(PNG_FORMAT_NUMBER(number_buf, format, (value)))
John Bowler40b26032011-12-22 08:09:15 -0600718# define APPEND(ch) if (pos < 28) out[pos++] = (ch)
Glenn Randers-Pehrsonaf855e42011-05-07 10:52:49 -0500719
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600720 APPEND_NUMBER(PNG_NUMBER_FORMAT_u, (unsigned)ptime->day);
John Bowler88b77cc2011-05-05 06:49:55 -0500721 APPEND(' ');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600722 APPEND_STRING(short_months[(ptime->month - 1)]);
John Bowler88b77cc2011-05-05 06:49:55 -0500723 APPEND(' ');
724 APPEND_NUMBER(PNG_NUMBER_FORMAT_u, ptime->year);
725 APPEND(' ');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600726 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->hour);
John Bowler88b77cc2011-05-05 06:49:55 -0500727 APPEND(':');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600728 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->minute);
John Bowler88b77cc2011-05-05 06:49:55 -0500729 APPEND(':');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600730 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->second);
John Bowler88b77cc2011-05-05 06:49:55 -0500731 APPEND_STRING(" +0000"); /* This reliably terminates the buffer */
732
733# undef APPEND
734# undef APPEND_NUMBER
735# undef APPEND_STRING
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500736 }
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500737
John Bowler40b26032011-12-22 08:09:15 -0600738 return 1;
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500739}
John Bowler40b26032011-12-22 08:09:15 -0600740
741# if PNG_LIBPNG_VER < 10700
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600742/* To do: remove the following from libpng-1.7 */
John Bowler40b26032011-12-22 08:09:15 -0600743/* Original API that uses a private buffer in png_struct.
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600744 * Deprecated because it causes png_struct to carry a spurious temporary
John Bowler40b26032011-12-22 08:09:15 -0600745 * buffer (png_struct::time_buffer), better to have the caller pass this in.
746 */
747png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600748png_convert_to_rfc1123(png_structrp png_ptr, png_const_timep ptime)
John Bowler40b26032011-12-22 08:09:15 -0600749{
750 if (png_ptr != NULL)
751 {
752 /* The only failure above if png_ptr != NULL is from an invalid ptime */
753 if (!png_convert_to_rfc1123_buffer(png_ptr->time_buffer, ptime))
754 png_warning(png_ptr, "Ignoring invalid time value");
755
756 else
757 return png_ptr->time_buffer;
758 }
759
760 return NULL;
761}
762# endif
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600763# endif /* PNG_TIME_RFC1123_SUPPORTED */
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600764
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -0600765#endif /* defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED) */
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600766
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500767png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600768png_get_copyright(png_const_structrp png_ptr)
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600769{
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600770 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500771#ifdef PNG_STRING_COPYRIGHT
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600772 return PNG_STRING_COPYRIGHT
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500773#else
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600774# ifdef __STDC__
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500775 return PNG_STRING_NEWLINE \
Glenn Randers-Pehrson6147fae2014-10-01 10:23:56 -0500776 "libpng version 1.6.14beta05 - October 1, 2014" PNG_STRING_NEWLINE \
Glenn Randers-Pehrson95a19732013-12-31 21:10:13 -0600777 "Copyright (c) 1998-2014 Glenn Randers-Pehrson" PNG_STRING_NEWLINE \
Glenn Randers-Pehrson43aaf6e2008-08-05 22:17:03 -0500778 "Copyright (c) 1996-1997 Andreas Dilger" PNG_STRING_NEWLINE \
779 "Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc." \
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500780 PNG_STRING_NEWLINE;
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600781# else
Glenn Randers-Pehrson6147fae2014-10-01 10:23:56 -0500782 return "libpng version 1.6.14beta05 - October 1, 2014\
Glenn Randers-Pehrson95a19732013-12-31 21:10:13 -0600783 Copyright (c) 1998-2014 Glenn Randers-Pehrson\
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500784 Copyright (c) 1996-1997 Andreas Dilger\
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500785 Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc.";
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600786# endif
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500787#endif
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600788}
Glenn Randers-Pehrsonbcfd15d1999-10-01 14:22:25 -0500789
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600790/* The following return the library version as a short string in the
Glenn Randers-Pehrson5b5dcf82004-07-17 22:45:44 -0500791 * format 1.0.0 through 99.99.99zz. To get the version of *.h files
792 * used with your application, print out PNG_LIBPNG_VER_STRING, which
793 * is defined in png.h.
794 * Note: now there is no difference between png_get_libpng_ver() and
795 * png_get_header_ver(). Due to the version_nn_nn_nn typedef guard,
796 * it is guaranteed that png.c uses the correct version of png.h.
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600797 */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500798png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600799png_get_libpng_ver(png_const_structrp png_ptr)
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600800{
801 /* Version of *.c files used when building libpng */
Glenn Randers-Pehrson4c8f7262010-03-16 19:30:01 -0500802 return png_get_header_ver(png_ptr);
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600803}
804
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500805png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600806png_get_header_ver(png_const_structrp png_ptr)
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600807{
808 /* Version of *.h files used when building libpng */
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600809 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500810 return PNG_LIBPNG_VER_STRING;
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600811}
812
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500813png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600814png_get_header_version(png_const_structrp png_ptr)
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600815{
816 /* Returns longer string containing both version and date */
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600817 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500818#ifdef __STDC__
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500819 return PNG_HEADER_VERSION_STRING
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600820# ifndef PNG_READ_SUPPORTED
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500821 " (NO READ SUPPORT)"
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600822# endif
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500823 PNG_STRING_NEWLINE;
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500824#else
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500825 return PNG_HEADER_VERSION_STRING;
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500826#endif
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600827}
828
John Bowlerc10930a2013-12-19 15:24:06 -0600829#ifdef PNG_BUILD_GRAYSCALE_PALETTE_SUPPORTED
830/* NOTE: this routine is not used internally! */
831/* Build a grayscale palette. Palette is assumed to be 1 << bit_depth
832 * large of png_color. This lets grayscale images be treated as
833 * paletted. Most useful for gamma correction and simplification
834 * of code. This API is not used internally.
835 */
836void PNGAPI
837png_build_grayscale_palette(int bit_depth, png_colorp palette)
838{
839 int num_palette;
840 int color_inc;
841 int i;
842 int v;
843
844 png_debug(1, "in png_do_build_grayscale_palette");
845
846 if (palette == NULL)
847 return;
848
849 switch (bit_depth)
850 {
851 case 1:
852 num_palette = 2;
853 color_inc = 0xff;
854 break;
855
856 case 2:
857 num_palette = 4;
858 color_inc = 0x55;
859 break;
860
861 case 4:
862 num_palette = 16;
863 color_inc = 0x11;
864 break;
865
866 case 8:
867 num_palette = 256;
868 color_inc = 1;
869 break;
870
871 default:
872 num_palette = 0;
873 color_inc = 0;
874 break;
875 }
876
877 for (i = 0, v = 0; i < num_palette; i++, v += color_inc)
878 {
879 palette[i].red = (png_byte)v;
880 palette[i].green = (png_byte)v;
881 palette[i].blue = (png_byte)v;
882 }
883}
884#endif
885
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600886#ifdef PNG_SET_UNKNOWN_CHUNKS_SUPPORTED
Glenn Randers-Pehrsonc1bfe682002-03-06 22:08:00 -0600887int PNGAPI
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600888png_handle_as_unknown(png_const_structrp png_ptr, png_const_bytep chunk_name)
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600889{
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500890 /* Check chunk_name and return "keep" value if it's on the list, else 0 */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500891 png_const_bytep p, p_end;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500892
John Bowlerfcd301d2011-12-28 21:34:27 -0600893 if (png_ptr == NULL || chunk_name == NULL || png_ptr->num_chunk_list == 0)
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500894 return PNG_HANDLE_CHUNK_AS_DEFAULT;
895
896 p_end = png_ptr->chunk_list;
897 p = p_end + png_ptr->num_chunk_list*5; /* beyond end */
898
899 /* The code is the fifth byte after each four byte string. Historically this
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600900 * code was always searched from the end of the list, this is no longer
901 * necessary because the 'set' routine handles duplicate entries correcty.
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500902 */
903 do /* num_chunk_list > 0, so at least one */
904 {
905 p -= 5;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600906
907 if (!memcmp(chunk_name, p, 4))
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500908 return p[4];
909 }
910 while (p > p_end);
911
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600912 /* This means that known chunks should be processed and unknown chunks should
913 * be handled according to the value of png_ptr->unknown_default; this can be
914 * confusing because, as a result, there are two levels of defaulting for
915 * unknown chunks.
916 */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500917 return PNG_HANDLE_CHUNK_AS_DEFAULT;
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600918}
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500919
John Bowler15a80442013-09-21 10:06:32 -0500920#if defined(PNG_READ_UNKNOWN_CHUNKS_SUPPORTED) ||\
921 defined(PNG_HANDLE_AS_UNKNOWN_SUPPORTED)
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500922int /* PRIVATE */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600923png_chunk_unknown_handling(png_const_structrp png_ptr, png_uint_32 chunk_name)
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500924{
925 png_byte chunk_string[5];
926
927 PNG_CSTRING_FROM_CHUNK(chunk_string, chunk_name);
928 return png_handle_as_unknown(png_ptr, chunk_string);
929}
John Bowler15a80442013-09-21 10:06:32 -0500930#endif /* READ_UNKNOWN_CHUNKS || HANDLE_AS_UNKNOWN */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600931#endif /* SET_UNKNOWN_CHUNKS */
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500932
Glenn Randers-Pehrsonf10fa3c2010-04-29 08:25:29 -0500933#ifdef PNG_READ_SUPPORTED
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500934/* This function, added to libpng-1.0.6g, is untested. */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500935int PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600936png_reset_zstream(png_structrp png_ptr)
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500937{
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500938 if (png_ptr == NULL)
939 return Z_STREAM_ERROR;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500940
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600941 /* WARNING: this resets the window bits to the maximum! */
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500942 return (inflateReset(&png_ptr->zstream));
943}
Glenn Randers-Pehrson2b8bef12010-04-29 11:50:24 -0500944#endif /* PNG_READ_SUPPORTED */
Glenn Randers-Pehrson1ef65b62000-05-12 06:19:53 -0500945
Glenn Randers-Pehrson5e5c1e12000-11-10 12:26:19 -0600946/* This function was added to libpng-1.0.7 */
Glenn Randers-Pehrson1ef65b62000-05-12 06:19:53 -0500947png_uint_32 PNGAPI
948png_access_version_number(void)
949{
950 /* Version of *.c files used when building libpng */
Glenn Randers-Pehrsond2332872010-10-12 19:19:28 -0500951 return((png_uint_32)PNG_LIBPNG_VER);
Glenn Randers-Pehrson1ef65b62000-05-12 06:19:53 -0500952}
Glenn Randers-Pehrson231e6872001-01-12 15:13:06 -0600953
Glenn Randers-Pehrson1fd5fb32001-05-06 05:34:26 -0500954
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500955
956#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600957/* Ensure that png_ptr->zstream.msg holds some appropriate error message string.
958 * If it doesn't 'ret' is used to set it to something appropriate, even in cases
959 * like Z_OK or Z_STREAM_END where the error code is apparently a success code.
960 */
961void /* PRIVATE */
962png_zstream_error(png_structrp png_ptr, int ret)
963{
964 /* Translate 'ret' into an appropriate error string, priority is given to the
965 * one in zstream if set. This always returns a string, even in cases like
966 * Z_OK or Z_STREAM_END where the error code is a success code.
967 */
968 if (png_ptr->zstream.msg == NULL) switch (ret)
969 {
970 default:
971 case Z_OK:
972 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected zlib return code");
973 break;
974
975 case Z_STREAM_END:
976 /* Normal exit */
977 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected end of LZ stream");
978 break;
979
980 case Z_NEED_DICT:
981 /* This means the deflate stream did not have a dictionary; this
982 * indicates a bogus PNG.
983 */
984 png_ptr->zstream.msg = PNGZ_MSG_CAST("missing LZ dictionary");
985 break;
986
987 case Z_ERRNO:
988 /* gz APIs only: should not happen */
989 png_ptr->zstream.msg = PNGZ_MSG_CAST("zlib IO error");
990 break;
991
992 case Z_STREAM_ERROR:
993 /* internal libpng error */
994 png_ptr->zstream.msg = PNGZ_MSG_CAST("bad parameters to zlib");
995 break;
996
997 case Z_DATA_ERROR:
998 png_ptr->zstream.msg = PNGZ_MSG_CAST("damaged LZ stream");
999 break;
1000
1001 case Z_MEM_ERROR:
1002 png_ptr->zstream.msg = PNGZ_MSG_CAST("insufficient memory");
1003 break;
1004
1005 case Z_BUF_ERROR:
1006 /* End of input or output; not a problem if the caller is doing
1007 * incremental read or write.
1008 */
1009 png_ptr->zstream.msg = PNGZ_MSG_CAST("truncated");
1010 break;
1011
1012 case Z_VERSION_ERROR:
1013 png_ptr->zstream.msg = PNGZ_MSG_CAST("unsupported zlib version");
1014 break;
1015
1016 case PNG_UNEXPECTED_ZLIB_RETURN:
1017 /* Compile errors here mean that zlib now uses the value co-opted in
1018 * pngpriv.h for PNG_UNEXPECTED_ZLIB_RETURN; update the switch above
1019 * and change pngpriv.h. Note that this message is "... return",
1020 * whereas the default/Z_OK one is "... return code".
1021 */
1022 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected zlib return");
1023 break;
1024 }
1025}
1026
John Bowler736f40f2011-08-25 16:19:44 -05001027/* png_convert_size: a PNGAPI but no longer in png.h, so deleted
1028 * at libpng 1.5.5!
1029 */
Glenn Randers-Pehrsonf7831012008-11-13 06:05:13 -06001030
Glenn Randers-Pehrson02a5e332008-11-24 22:10:23 -06001031/* Added at libpng version 1.2.34 and 1.4.0 (moved from pngset.c) */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001032#ifdef PNG_GAMMA_SUPPORTED /* always set if COLORSPACE */
1033static int
1034png_colorspace_check_gamma(png_const_structrp png_ptr,
1035 png_colorspacerp colorspace, png_fixed_point gAMA, int from)
1036 /* This is called to check a new gamma value against an existing one. The
1037 * routine returns false if the new gamma value should not be written.
1038 *
1039 * 'from' says where the new gamma value comes from:
1040 *
1041 * 0: the new gamma value is the libpng estimate for an ICC profile
1042 * 1: the new gamma value comes from a gAMA chunk
1043 * 2: the new gamma value comes from an sRGB chunk
John Bowlerb98681b2012-09-04 11:19:00 -05001044 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001045{
1046 png_fixed_point gtest;
1047
1048 if ((colorspace->flags & PNG_COLORSPACE_HAVE_GAMMA) != 0 &&
1049 (!png_muldiv(&gtest, colorspace->gamma, PNG_FP_1, gAMA) ||
1050 png_gamma_significant(gtest)))
John Bowlerb11b31a2012-03-21 07:55:46 -05001051 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001052 /* Either this is an sRGB image, in which case the calculated gamma
1053 * approximation should match, or this is an image with a profile and the
1054 * value libpng calculates for the gamma of the profile does not match the
1055 * value recorded in the file. The former, sRGB, case is an error, the
1056 * latter is just a warning.
1057 */
1058 if ((colorspace->flags & PNG_COLORSPACE_FROM_sRGB) != 0 || from == 2)
1059 {
1060 png_chunk_report(png_ptr, "gamma value does not match sRGB",
1061 PNG_CHUNK_ERROR);
1062 /* Do not overwrite an sRGB value */
1063 return from == 2;
1064 }
1065
1066 else /* sRGB tag not involved */
1067 {
1068 png_chunk_report(png_ptr, "gamma value does not match libpng estimate",
1069 PNG_CHUNK_WARNING);
1070 return from == 1;
1071 }
John Bowlerb11b31a2012-03-21 07:55:46 -05001072 }
1073
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001074 return 1;
John Bowlerb11b31a2012-03-21 07:55:46 -05001075}
1076
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001077void /* PRIVATE */
1078png_colorspace_set_gamma(png_const_structrp png_ptr,
1079 png_colorspacerp colorspace, png_fixed_point gAMA)
1080{
1081 /* Changed in libpng-1.5.4 to limit the values to ensure overflow can't
1082 * occur. Since the fixed point representation is assymetrical it is
1083 * possible for 1/gamma to overflow the limit of 21474 and this means the
1084 * gamma value must be at least 5/100000 and hence at most 20000.0. For
1085 * safety the limits here are a little narrower. The values are 0.00016 to
1086 * 6250.0, which are truly ridiculous gamma values (and will produce
1087 * displays that are all black or all white.)
1088 *
1089 * In 1.6.0 this test replaces the ones in pngrutil.c, in the gAMA chunk
1090 * handling code, which only required the value to be >0.
1091 */
1092 png_const_charp errmsg;
1093
1094 if (gAMA < 16 || gAMA > 625000000)
1095 errmsg = "gamma value out of range";
1096
1097# ifdef PNG_READ_gAMA_SUPPORTED
1098 /* Allow the application to set the gamma value more than once */
1099 else if ((png_ptr->mode & PNG_IS_READ_STRUCT) != 0 &&
1100 (colorspace->flags & PNG_COLORSPACE_FROM_gAMA) != 0)
1101 errmsg = "duplicate";
1102# endif
1103
1104 /* Do nothing if the colorspace is already invalid */
1105 else if (colorspace->flags & PNG_COLORSPACE_INVALID)
1106 return;
1107
1108 else
1109 {
1110 if (png_colorspace_check_gamma(png_ptr, colorspace, gAMA, 1/*from gAMA*/))
1111 {
1112 /* Store this gamma value. */
1113 colorspace->gamma = gAMA;
1114 colorspace->flags |=
1115 (PNG_COLORSPACE_HAVE_GAMMA | PNG_COLORSPACE_FROM_gAMA);
1116 }
1117
1118 /* At present if the check_gamma test fails the gamma of the colorspace is
1119 * not updated however the colorspace is not invalidated. This
1120 * corresponds to the case where the existing gamma comes from an sRGB
1121 * chunk or profile. An error message has already been output.
1122 */
1123 return;
1124 }
1125
1126 /* Error exit - errmsg has been set. */
1127 colorspace->flags |= PNG_COLORSPACE_INVALID;
1128 png_chunk_report(png_ptr, errmsg, PNG_CHUNK_WRITE_ERROR);
1129}
1130
1131void /* PRIVATE */
1132png_colorspace_sync_info(png_const_structrp png_ptr, png_inforp info_ptr)
1133{
1134 if (info_ptr->colorspace.flags & PNG_COLORSPACE_INVALID)
1135 {
1136 /* Everything is invalid */
1137 info_ptr->valid &= ~(PNG_INFO_gAMA|PNG_INFO_cHRM|PNG_INFO_sRGB|
1138 PNG_INFO_iCCP);
1139
1140# ifdef PNG_COLORSPACE_SUPPORTED
1141 /* Clean up the iCCP profile now if it won't be used. */
1142 png_free_data(png_ptr, info_ptr, PNG_FREE_ICCP, -1/*not used*/);
1143# else
1144 PNG_UNUSED(png_ptr)
1145# endif
1146 }
1147
1148 else
1149 {
1150# ifdef PNG_COLORSPACE_SUPPORTED
1151 /* Leave the INFO_iCCP flag set if the pngset.c code has already set
1152 * it; this allows a PNG to contain a profile which matches sRGB and
1153 * yet still have that profile retrievable by the application.
1154 */
1155 if (info_ptr->colorspace.flags & PNG_COLORSPACE_MATCHES_sRGB)
1156 info_ptr->valid |= PNG_INFO_sRGB;
1157
1158 else
1159 info_ptr->valid &= ~PNG_INFO_sRGB;
1160
1161 if (info_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_ENDPOINTS)
1162 info_ptr->valid |= PNG_INFO_cHRM;
1163
1164 else
1165 info_ptr->valid &= ~PNG_INFO_cHRM;
1166# endif
1167
1168 if (info_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_GAMMA)
1169 info_ptr->valid |= PNG_INFO_gAMA;
1170
1171 else
1172 info_ptr->valid &= ~PNG_INFO_gAMA;
1173 }
1174}
1175
1176#ifdef PNG_READ_SUPPORTED
1177void /* PRIVATE */
1178png_colorspace_sync(png_const_structrp png_ptr, png_inforp info_ptr)
1179{
1180 if (info_ptr == NULL) /* reduce code size; check here not in the caller */
1181 return;
1182
1183 info_ptr->colorspace = png_ptr->colorspace;
1184 png_colorspace_sync_info(png_ptr, info_ptr);
1185}
1186#endif
1187#endif
1188
1189#ifdef PNG_COLORSPACE_SUPPORTED
John Bowler736f40f2011-08-25 16:19:44 -05001190/* Added at libpng-1.5.5 to support read and write of true CIEXYZ values for
1191 * cHRM, as opposed to using chromaticities. These internal APIs return
1192 * non-zero on a parameter error. The X, Y and Z values are required to be
1193 * positive and less than 1.0.
1194 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001195static int
1196png_xy_from_XYZ(png_xy *xy, const png_XYZ *XYZ)
John Bowler736f40f2011-08-25 16:19:44 -05001197{
1198 png_int_32 d, dwhite, whiteX, whiteY;
1199
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001200 d = XYZ->red_X + XYZ->red_Y + XYZ->red_Z;
1201 if (!png_muldiv(&xy->redx, XYZ->red_X, PNG_FP_1, d)) return 1;
1202 if (!png_muldiv(&xy->redy, XYZ->red_Y, PNG_FP_1, d)) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001203 dwhite = d;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001204 whiteX = XYZ->red_X;
1205 whiteY = XYZ->red_Y;
John Bowler736f40f2011-08-25 16:19:44 -05001206
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001207 d = XYZ->green_X + XYZ->green_Y + XYZ->green_Z;
1208 if (!png_muldiv(&xy->greenx, XYZ->green_X, PNG_FP_1, d)) return 1;
1209 if (!png_muldiv(&xy->greeny, XYZ->green_Y, PNG_FP_1, d)) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001210 dwhite += d;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001211 whiteX += XYZ->green_X;
1212 whiteY += XYZ->green_Y;
John Bowler736f40f2011-08-25 16:19:44 -05001213
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001214 d = XYZ->blue_X + XYZ->blue_Y + XYZ->blue_Z;
1215 if (!png_muldiv(&xy->bluex, XYZ->blue_X, PNG_FP_1, d)) return 1;
1216 if (!png_muldiv(&xy->bluey, XYZ->blue_Y, PNG_FP_1, d)) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001217 dwhite += d;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001218 whiteX += XYZ->blue_X;
1219 whiteY += XYZ->blue_Y;
John Bowler736f40f2011-08-25 16:19:44 -05001220
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001221 /* The reference white is simply the sum of the end-point (X,Y,Z) vectors,
John Bowler736f40f2011-08-25 16:19:44 -05001222 * thus:
1223 */
1224 if (!png_muldiv(&xy->whitex, whiteX, PNG_FP_1, dwhite)) return 1;
1225 if (!png_muldiv(&xy->whitey, whiteY, PNG_FP_1, dwhite)) return 1;
1226
1227 return 0;
1228}
1229
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001230static int
1231png_XYZ_from_xy(png_XYZ *XYZ, const png_xy *xy)
John Bowler736f40f2011-08-25 16:19:44 -05001232{
1233 png_fixed_point red_inverse, green_inverse, blue_scale;
1234 png_fixed_point left, right, denominator;
1235
1236 /* Check xy and, implicitly, z. Note that wide gamut color spaces typically
1237 * have end points with 0 tristimulus values (these are impossible end
1238 * points, but they are used to cover the possible colors.)
1239 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001240 if (xy->redx < 0 || xy->redx > PNG_FP_1) return 1;
1241 if (xy->redy < 0 || xy->redy > PNG_FP_1-xy->redx) return 1;
1242 if (xy->greenx < 0 || xy->greenx > PNG_FP_1) return 1;
1243 if (xy->greeny < 0 || xy->greeny > PNG_FP_1-xy->greenx) return 1;
1244 if (xy->bluex < 0 || xy->bluex > PNG_FP_1) return 1;
1245 if (xy->bluey < 0 || xy->bluey > PNG_FP_1-xy->bluex) return 1;
1246 if (xy->whitex < 0 || xy->whitex > PNG_FP_1) return 1;
1247 if (xy->whitey < 0 || xy->whitey > PNG_FP_1-xy->whitex) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001248
1249 /* The reverse calculation is more difficult because the original tristimulus
1250 * value had 9 independent values (red,green,blue)x(X,Y,Z) however only 8
1251 * derived values were recorded in the cHRM chunk;
1252 * (red,green,blue,white)x(x,y). This loses one degree of freedom and
1253 * therefore an arbitrary ninth value has to be introduced to undo the
1254 * original transformations.
1255 *
1256 * Think of the original end-points as points in (X,Y,Z) space. The
1257 * chromaticity values (c) have the property:
1258 *
1259 * C
1260 * c = ---------
1261 * X + Y + Z
1262 *
1263 * For each c (x,y,z) from the corresponding original C (X,Y,Z). Thus the
1264 * three chromaticity values (x,y,z) for each end-point obey the
1265 * relationship:
1266 *
1267 * x + y + z = 1
1268 *
1269 * This describes the plane in (X,Y,Z) space that intersects each axis at the
1270 * value 1.0; call this the chromaticity plane. Thus the chromaticity
1271 * calculation has scaled each end-point so that it is on the x+y+z=1 plane
1272 * and chromaticity is the intersection of the vector from the origin to the
1273 * (X,Y,Z) value with the chromaticity plane.
1274 *
1275 * To fully invert the chromaticity calculation we would need the three
1276 * end-point scale factors, (red-scale, green-scale, blue-scale), but these
1277 * were not recorded. Instead we calculated the reference white (X,Y,Z) and
1278 * recorded the chromaticity of this. The reference white (X,Y,Z) would have
1279 * given all three of the scale factors since:
1280 *
1281 * color-C = color-c * color-scale
1282 * white-C = red-C + green-C + blue-C
1283 * = red-c*red-scale + green-c*green-scale + blue-c*blue-scale
1284 *
1285 * But cHRM records only white-x and white-y, so we have lost the white scale
1286 * factor:
1287 *
1288 * white-C = white-c*white-scale
1289 *
1290 * To handle this the inverse transformation makes an arbitrary assumption
1291 * about white-scale:
1292 *
1293 * Assume: white-Y = 1.0
1294 * Hence: white-scale = 1/white-y
1295 * Or: red-Y + green-Y + blue-Y = 1.0
1296 *
1297 * Notice the last statement of the assumption gives an equation in three of
1298 * the nine values we want to calculate. 8 more equations come from the
1299 * above routine as summarised at the top above (the chromaticity
1300 * calculation):
1301 *
1302 * Given: color-x = color-X / (color-X + color-Y + color-Z)
1303 * Hence: (color-x - 1)*color-X + color.x*color-Y + color.x*color-Z = 0
1304 *
1305 * This is 9 simultaneous equations in the 9 variables "color-C" and can be
1306 * solved by Cramer's rule. Cramer's rule requires calculating 10 9x9 matrix
1307 * determinants, however this is not as bad as it seems because only 28 of
1308 * the total of 90 terms in the various matrices are non-zero. Nevertheless
1309 * Cramer's rule is notoriously numerically unstable because the determinant
1310 * calculation involves the difference of large, but similar, numbers. It is
1311 * difficult to be sure that the calculation is stable for real world values
1312 * and it is certain that it becomes unstable where the end points are close
1313 * together.
1314 *
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001315 * So this code uses the perhaps slightly less optimal but more
1316 * understandable and totally obvious approach of calculating color-scale.
John Bowler736f40f2011-08-25 16:19:44 -05001317 *
1318 * This algorithm depends on the precision in white-scale and that is
1319 * (1/white-y), so we can immediately see that as white-y approaches 0 the
1320 * accuracy inherent in the cHRM chunk drops off substantially.
1321 *
1322 * libpng arithmetic: a simple invertion of the above equations
1323 * ------------------------------------------------------------
1324 *
1325 * white_scale = 1/white-y
1326 * white-X = white-x * white-scale
1327 * white-Y = 1.0
1328 * white-Z = (1 - white-x - white-y) * white_scale
1329 *
1330 * white-C = red-C + green-C + blue-C
1331 * = red-c*red-scale + green-c*green-scale + blue-c*blue-scale
1332 *
1333 * This gives us three equations in (red-scale,green-scale,blue-scale) where
1334 * all the coefficients are now known:
1335 *
1336 * red-x*red-scale + green-x*green-scale + blue-x*blue-scale
1337 * = white-x/white-y
1338 * red-y*red-scale + green-y*green-scale + blue-y*blue-scale = 1
1339 * red-z*red-scale + green-z*green-scale + blue-z*blue-scale
1340 * = (1 - white-x - white-y)/white-y
1341 *
1342 * In the last equation color-z is (1 - color-x - color-y) so we can add all
1343 * three equations together to get an alternative third:
1344 *
1345 * red-scale + green-scale + blue-scale = 1/white-y = white-scale
1346 *
1347 * So now we have a Cramer's rule solution where the determinants are just
1348 * 3x3 - far more tractible. Unfortunately 3x3 determinants still involve
1349 * multiplication of three coefficients so we can't guarantee to avoid
1350 * overflow in the libpng fixed point representation. Using Cramer's rule in
1351 * floating point is probably a good choice here, but it's not an option for
1352 * fixed point. Instead proceed to simplify the first two equations by
1353 * eliminating what is likely to be the largest value, blue-scale:
1354 *
1355 * blue-scale = white-scale - red-scale - green-scale
1356 *
1357 * Hence:
1358 *
1359 * (red-x - blue-x)*red-scale + (green-x - blue-x)*green-scale =
1360 * (white-x - blue-x)*white-scale
1361 *
1362 * (red-y - blue-y)*red-scale + (green-y - blue-y)*green-scale =
1363 * 1 - blue-y*white-scale
1364 *
1365 * And now we can trivially solve for (red-scale,green-scale):
1366 *
1367 * green-scale =
1368 * (white-x - blue-x)*white-scale - (red-x - blue-x)*red-scale
1369 * -----------------------------------------------------------
1370 * green-x - blue-x
1371 *
1372 * red-scale =
1373 * 1 - blue-y*white-scale - (green-y - blue-y) * green-scale
1374 * ---------------------------------------------------------
1375 * red-y - blue-y
1376 *
1377 * Hence:
1378 *
1379 * red-scale =
1380 * ( (green-x - blue-x) * (white-y - blue-y) -
1381 * (green-y - blue-y) * (white-x - blue-x) ) / white-y
1382 * -------------------------------------------------------------------------
1383 * (green-x - blue-x)*(red-y - blue-y)-(green-y - blue-y)*(red-x - blue-x)
1384 *
1385 * green-scale =
1386 * ( (red-y - blue-y) * (white-x - blue-x) -
1387 * (red-x - blue-x) * (white-y - blue-y) ) / white-y
1388 * -------------------------------------------------------------------------
1389 * (green-x - blue-x)*(red-y - blue-y)-(green-y - blue-y)*(red-x - blue-x)
1390 *
1391 * Accuracy:
1392 * The input values have 5 decimal digits of accuracy. The values are all in
1393 * the range 0 < value < 1, so simple products are in the same range but may
1394 * need up to 10 decimal digits to preserve the original precision and avoid
1395 * underflow. Because we are using a 32-bit signed representation we cannot
1396 * match this; the best is a little over 9 decimal digits, less than 10.
1397 *
1398 * The approach used here is to preserve the maximum precision within the
1399 * signed representation. Because the red-scale calculation above uses the
1400 * difference between two products of values that must be in the range -1..+1
1401 * it is sufficient to divide the product by 7; ceil(100,000/32767*2). The
1402 * factor is irrelevant in the calculation because it is applied to both
1403 * numerator and denominator.
1404 *
1405 * Note that the values of the differences of the products of the
1406 * chromaticities in the above equations tend to be small, for example for
1407 * the sRGB chromaticities they are:
1408 *
1409 * red numerator: -0.04751
1410 * green numerator: -0.08788
1411 * denominator: -0.2241 (without white-y multiplication)
1412 *
1413 * The resultant Y coefficients from the chromaticities of some widely used
1414 * color space definitions are (to 15 decimal places):
1415 *
1416 * sRGB
1417 * 0.212639005871510 0.715168678767756 0.072192315360734
1418 * Kodak ProPhoto
1419 * 0.288071128229293 0.711843217810102 0.000085653960605
1420 * Adobe RGB
1421 * 0.297344975250536 0.627363566255466 0.075291458493998
1422 * Adobe Wide Gamut RGB
1423 * 0.258728243040113 0.724682314948566 0.016589442011321
1424 */
1425 /* By the argument, above overflow should be impossible here. The return
1426 * value of 2 indicates an internal error to the caller.
1427 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001428 if (!png_muldiv(&left, xy->greenx-xy->bluex, xy->redy - xy->bluey, 7))
1429 return 2;
1430 if (!png_muldiv(&right, xy->greeny-xy->bluey, xy->redx - xy->bluex, 7))
1431 return 2;
John Bowler736f40f2011-08-25 16:19:44 -05001432 denominator = left - right;
1433
1434 /* Now find the red numerator. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001435 if (!png_muldiv(&left, xy->greenx-xy->bluex, xy->whitey-xy->bluey, 7))
1436 return 2;
1437 if (!png_muldiv(&right, xy->greeny-xy->bluey, xy->whitex-xy->bluex, 7))
1438 return 2;
John Bowler736f40f2011-08-25 16:19:44 -05001439
1440 /* Overflow is possible here and it indicates an extreme set of PNG cHRM
1441 * chunk values. This calculation actually returns the reciprocal of the
1442 * scale value because this allows us to delay the multiplication of white-y
1443 * into the denominator, which tends to produce a small number.
1444 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001445 if (!png_muldiv(&red_inverse, xy->whitey, denominator, left-right) ||
1446 red_inverse <= xy->whitey /* r+g+b scales = white scale */)
John Bowler736f40f2011-08-25 16:19:44 -05001447 return 1;
1448
1449 /* Similarly for green_inverse: */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001450 if (!png_muldiv(&left, xy->redy-xy->bluey, xy->whitex-xy->bluex, 7))
1451 return 2;
1452 if (!png_muldiv(&right, xy->redx-xy->bluex, xy->whitey-xy->bluey, 7))
1453 return 2;
1454 if (!png_muldiv(&green_inverse, xy->whitey, denominator, left-right) ||
1455 green_inverse <= xy->whitey)
John Bowler736f40f2011-08-25 16:19:44 -05001456 return 1;
1457
1458 /* And the blue scale, the checks above guarantee this can't overflow but it
1459 * can still produce 0 for extreme cHRM values.
1460 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001461 blue_scale = png_reciprocal(xy->whitey) - png_reciprocal(red_inverse) -
John Bowler736f40f2011-08-25 16:19:44 -05001462 png_reciprocal(green_inverse);
1463 if (blue_scale <= 0) return 1;
1464
1465
1466 /* And fill in the png_XYZ: */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001467 if (!png_muldiv(&XYZ->red_X, xy->redx, PNG_FP_1, red_inverse)) return 1;
1468 if (!png_muldiv(&XYZ->red_Y, xy->redy, PNG_FP_1, red_inverse)) return 1;
1469 if (!png_muldiv(&XYZ->red_Z, PNG_FP_1 - xy->redx - xy->redy, PNG_FP_1,
John Bowler736f40f2011-08-25 16:19:44 -05001470 red_inverse))
1471 return 1;
1472
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001473 if (!png_muldiv(&XYZ->green_X, xy->greenx, PNG_FP_1, green_inverse))
1474 return 1;
1475 if (!png_muldiv(&XYZ->green_Y, xy->greeny, PNG_FP_1, green_inverse))
1476 return 1;
1477 if (!png_muldiv(&XYZ->green_Z, PNG_FP_1 - xy->greenx - xy->greeny, PNG_FP_1,
John Bowler736f40f2011-08-25 16:19:44 -05001478 green_inverse))
1479 return 1;
1480
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001481 if (!png_muldiv(&XYZ->blue_X, xy->bluex, blue_scale, PNG_FP_1)) return 1;
1482 if (!png_muldiv(&XYZ->blue_Y, xy->bluey, blue_scale, PNG_FP_1)) return 1;
1483 if (!png_muldiv(&XYZ->blue_Z, PNG_FP_1 - xy->bluex - xy->bluey, blue_scale,
John Bowler736f40f2011-08-25 16:19:44 -05001484 PNG_FP_1))
1485 return 1;
1486
1487 return 0; /*success*/
1488}
1489
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001490static int
1491png_XYZ_normalize(png_XYZ *XYZ)
John Bowler736f40f2011-08-25 16:19:44 -05001492{
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001493 png_int_32 Y;
1494
1495 if (XYZ->red_Y < 0 || XYZ->green_Y < 0 || XYZ->blue_Y < 0 ||
1496 XYZ->red_X < 0 || XYZ->green_X < 0 || XYZ->blue_X < 0 ||
1497 XYZ->red_Z < 0 || XYZ->green_Z < 0 || XYZ->blue_Z < 0)
1498 return 1;
1499
1500 /* Normalize by scaling so the sum of the end-point Y values is PNG_FP_1.
1501 * IMPLEMENTATION NOTE: ANSI requires signed overflow not to occur, therefore
1502 * relying on addition of two positive values producing a negative one is not
1503 * safe.
1504 */
1505 Y = XYZ->red_Y;
1506 if (0x7fffffff - Y < XYZ->green_X) return 1;
1507 Y += XYZ->green_Y;
1508 if (0x7fffffff - Y < XYZ->blue_X) return 1;
1509 Y += XYZ->blue_Y;
1510
1511 if (Y != PNG_FP_1)
1512 {
1513 if (!png_muldiv(&XYZ->red_X, XYZ->red_X, PNG_FP_1, Y)) return 1;
1514 if (!png_muldiv(&XYZ->red_Y, XYZ->red_Y, PNG_FP_1, Y)) return 1;
1515 if (!png_muldiv(&XYZ->red_Z, XYZ->red_Z, PNG_FP_1, Y)) return 1;
1516
1517 if (!png_muldiv(&XYZ->green_X, XYZ->green_X, PNG_FP_1, Y)) return 1;
1518 if (!png_muldiv(&XYZ->green_Y, XYZ->green_Y, PNG_FP_1, Y)) return 1;
1519 if (!png_muldiv(&XYZ->green_Z, XYZ->green_Z, PNG_FP_1, Y)) return 1;
1520
1521 if (!png_muldiv(&XYZ->blue_X, XYZ->blue_X, PNG_FP_1, Y)) return 1;
1522 if (!png_muldiv(&XYZ->blue_Y, XYZ->blue_Y, PNG_FP_1, Y)) return 1;
1523 if (!png_muldiv(&XYZ->blue_Z, XYZ->blue_Z, PNG_FP_1, Y)) return 1;
1524 }
1525
1526 return 0;
1527}
1528
1529static int
1530png_colorspace_endpoints_match(const png_xy *xy1, const png_xy *xy2, int delta)
1531{
1532 /* Allow an error of +/-0.01 (absolute value) on each chromaticity */
1533 return !(PNG_OUT_OF_RANGE(xy1->whitex, xy2->whitex,delta) ||
1534 PNG_OUT_OF_RANGE(xy1->whitey, xy2->whitey,delta) ||
1535 PNG_OUT_OF_RANGE(xy1->redx, xy2->redx, delta) ||
1536 PNG_OUT_OF_RANGE(xy1->redy, xy2->redy, delta) ||
1537 PNG_OUT_OF_RANGE(xy1->greenx, xy2->greenx,delta) ||
1538 PNG_OUT_OF_RANGE(xy1->greeny, xy2->greeny,delta) ||
1539 PNG_OUT_OF_RANGE(xy1->bluex, xy2->bluex, delta) ||
1540 PNG_OUT_OF_RANGE(xy1->bluey, xy2->bluey, delta));
1541}
1542
1543/* Added in libpng-1.6.0, a different check for the validity of a set of cHRM
1544 * chunk chromaticities. Earlier checks used to simply look for the overflow
1545 * condition (where the determinant of the matrix to solve for XYZ ends up zero
1546 * because the chromaticity values are not all distinct.) Despite this it is
1547 * theoretically possible to produce chromaticities that are apparently valid
1548 * but that rapidly degrade to invalid, potentially crashing, sets because of
1549 * arithmetic inaccuracies when calculations are performed on them. The new
1550 * check is to round-trip xy -> XYZ -> xy and then check that the result is
1551 * within a small percentage of the original.
1552 */
1553static int
1554png_colorspace_check_xy(png_XYZ *XYZ, const png_xy *xy)
1555{
1556 int result;
1557 png_xy xy_test;
1558
1559 /* As a side-effect this routine also returns the XYZ endpoints. */
1560 result = png_XYZ_from_xy(XYZ, xy);
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06001561 if (result != 0) return result;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001562
1563 result = png_xy_from_XYZ(&xy_test, XYZ);
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06001564 if (result != 0) return result;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001565
1566 if (png_colorspace_endpoints_match(xy, &xy_test,
1567 5/*actually, the math is pretty accurate*/))
1568 return 0;
1569
1570 /* Too much slip */
1571 return 1;
1572}
1573
1574/* This is the check going the other way. The XYZ is modified to normalize it
1575 * (another side-effect) and the xy chromaticities are returned.
1576 */
1577static int
1578png_colorspace_check_XYZ(png_xy *xy, png_XYZ *XYZ)
1579{
1580 int result;
1581 png_XYZ XYZtemp;
1582
1583 result = png_XYZ_normalize(XYZ);
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06001584 if (result != 0) return result;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001585
1586 result = png_xy_from_XYZ(xy, XYZ);
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06001587 if (result != 0) return result;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001588
1589 XYZtemp = *XYZ;
1590 return png_colorspace_check_xy(&XYZtemp, xy);
1591}
1592
1593/* Used to check for an endpoint match against sRGB */
1594static const png_xy sRGB_xy = /* From ITU-R BT.709-3 */
1595{
1596 /* color x y */
1597 /* red */ 64000, 33000,
1598 /* green */ 30000, 60000,
1599 /* blue */ 15000, 6000,
1600 /* white */ 31270, 32900
1601};
1602
1603static int
1604png_colorspace_set_xy_and_XYZ(png_const_structrp png_ptr,
1605 png_colorspacerp colorspace, const png_xy *xy, const png_XYZ *XYZ,
1606 int preferred)
1607{
1608 if (colorspace->flags & PNG_COLORSPACE_INVALID)
1609 return 0;
1610
1611 /* The consistency check is performed on the chromaticities; this factors out
1612 * variations because of the normalization (or not) of the end point Y
1613 * values.
1614 */
1615 if (preferred < 2 && (colorspace->flags & PNG_COLORSPACE_HAVE_ENDPOINTS))
1616 {
1617 /* The end points must be reasonably close to any we already have. The
1618 * following allows an error of up to +/-.001
1619 */
1620 if (!png_colorspace_endpoints_match(xy, &colorspace->end_points_xy, 100))
1621 {
1622 colorspace->flags |= PNG_COLORSPACE_INVALID;
1623 png_benign_error(png_ptr, "inconsistent chromaticities");
1624 return 0; /* failed */
1625 }
1626
1627 /* Only overwrite with preferred values */
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06001628 if (preferred == 0)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001629 return 1; /* ok, but no change */
1630 }
1631
1632 colorspace->end_points_xy = *xy;
1633 colorspace->end_points_XYZ = *XYZ;
1634 colorspace->flags |= PNG_COLORSPACE_HAVE_ENDPOINTS;
1635
1636 /* The end points are normally quoted to two decimal digits, so allow +/-0.01
1637 * on this test.
1638 */
1639 if (png_colorspace_endpoints_match(xy, &sRGB_xy, 1000))
1640 colorspace->flags |= PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB;
1641
1642 else
1643 colorspace->flags &= PNG_COLORSPACE_CANCEL(
1644 PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB);
1645
1646 return 2; /* ok and changed */
1647}
1648
1649int /* PRIVATE */
1650png_colorspace_set_chromaticities(png_const_structrp png_ptr,
1651 png_colorspacerp colorspace, const png_xy *xy, int preferred)
1652{
1653 /* We must check the end points to ensure they are reasonable - in the past
1654 * color management systems have crashed as a result of getting bogus
1655 * colorant values, while this isn't the fault of libpng it is the
1656 * responsibility of libpng because PNG carries the bomb and libpng is in a
1657 * position to protect against it.
1658 */
1659 png_XYZ XYZ;
1660
1661 switch (png_colorspace_check_xy(&XYZ, xy))
John Bowler736f40f2011-08-25 16:19:44 -05001662 {
1663 case 0: /* success */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001664 return png_colorspace_set_xy_and_XYZ(png_ptr, colorspace, xy, &XYZ,
1665 preferred);
John Bowler736f40f2011-08-25 16:19:44 -05001666
1667 case 1:
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001668 /* We can't invert the chromaticities so we can't produce value XYZ
1669 * values. Likely as not a color management system will fail too.
John Bowler736f40f2011-08-25 16:19:44 -05001670 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001671 colorspace->flags |= PNG_COLORSPACE_INVALID;
1672 png_benign_error(png_ptr, "invalid chromaticities");
John Bowler736f40f2011-08-25 16:19:44 -05001673 break;
1674
1675 default:
1676 /* libpng is broken; this should be a warning but if it happens we
1677 * want error reports so for the moment it is an error.
1678 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001679 colorspace->flags |= PNG_COLORSPACE_INVALID;
1680 png_error(png_ptr, "internal error checking chromaticities");
John Bowler736f40f2011-08-25 16:19:44 -05001681 break;
1682 }
1683
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001684 return 0; /* failed */
1685}
1686
1687int /* PRIVATE */
1688png_colorspace_set_endpoints(png_const_structrp png_ptr,
1689 png_colorspacerp colorspace, const png_XYZ *XYZ_in, int preferred)
1690{
1691 png_XYZ XYZ = *XYZ_in;
1692 png_xy xy;
1693
1694 switch (png_colorspace_check_XYZ(&xy, &XYZ))
1695 {
1696 case 0:
1697 return png_colorspace_set_xy_and_XYZ(png_ptr, colorspace, &xy, &XYZ,
1698 preferred);
1699
1700 case 1:
1701 /* End points are invalid. */
1702 colorspace->flags |= PNG_COLORSPACE_INVALID;
1703 png_benign_error(png_ptr, "invalid end points");
1704 break;
1705
1706 default:
1707 colorspace->flags |= PNG_COLORSPACE_INVALID;
1708 png_error(png_ptr, "internal error checking chromaticities");
1709 break;
1710 }
1711
1712 return 0; /* failed */
1713}
1714
1715#if defined(PNG_sRGB_SUPPORTED) || defined(PNG_iCCP_SUPPORTED)
1716/* Error message generation */
1717static char
1718png_icc_tag_char(png_uint_32 byte)
1719{
1720 byte &= 0xff;
1721 if (byte >= 32 && byte <= 126)
1722 return (char)byte;
1723 else
1724 return '?';
1725}
1726
1727static void
1728png_icc_tag_name(char *name, png_uint_32 tag)
1729{
1730 name[0] = '\'';
1731 name[1] = png_icc_tag_char(tag >> 24);
1732 name[2] = png_icc_tag_char(tag >> 16);
1733 name[3] = png_icc_tag_char(tag >> 8);
1734 name[4] = png_icc_tag_char(tag );
1735 name[5] = '\'';
1736}
1737
1738static int
1739is_ICC_signature_char(png_alloc_size_t it)
1740{
1741 return it == 32 || (it >= 48 && it <= 57) || (it >= 65 && it <= 90) ||
1742 (it >= 97 && it <= 122);
1743}
1744
Glenn Randers-Pehrson24afd072014-03-05 16:55:19 -06001745static int
1746is_ICC_signature(png_alloc_size_t it)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001747{
1748 return is_ICC_signature_char(it >> 24) /* checks all the top bits */ &&
1749 is_ICC_signature_char((it >> 16) & 0xff) &&
1750 is_ICC_signature_char((it >> 8) & 0xff) &&
1751 is_ICC_signature_char(it & 0xff);
1752}
1753
1754static int
1755png_icc_profile_error(png_const_structrp png_ptr, png_colorspacerp colorspace,
1756 png_const_charp name, png_alloc_size_t value, png_const_charp reason)
1757{
1758 size_t pos;
1759 char message[196]; /* see below for calculation */
1760
1761 if (colorspace != NULL)
1762 colorspace->flags |= PNG_COLORSPACE_INVALID;
1763
1764 pos = png_safecat(message, (sizeof message), 0, "profile '"); /* 9 chars */
1765 pos = png_safecat(message, pos+79, pos, name); /* Truncate to 79 chars */
1766 pos = png_safecat(message, (sizeof message), pos, "': "); /* +2 = 90 */
1767 if (is_ICC_signature(value))
1768 {
1769 /* So 'value' is at most 4 bytes and the following cast is safe */
1770 png_icc_tag_name(message+pos, (png_uint_32)value);
1771 pos += 6; /* total +8; less than the else clause */
1772 message[pos++] = ':';
1773 message[pos++] = ' ';
1774 }
1775# ifdef PNG_WARNINGS_SUPPORTED
1776 else
1777 {
1778 char number[PNG_NUMBER_BUFFER_SIZE]; /* +24 = 114*/
1779
1780 pos = png_safecat(message, (sizeof message), pos,
1781 png_format_number(number, number+(sizeof number),
1782 PNG_NUMBER_FORMAT_x, value));
1783 pos = png_safecat(message, (sizeof message), pos, "h: "); /*+2 = 116*/
1784 }
1785# endif
1786 /* The 'reason' is an arbitrary message, allow +79 maximum 195 */
1787 pos = png_safecat(message, (sizeof message), pos, reason);
Glenn Randers-Pehrson3f8a2ed2013-11-25 10:38:21 -06001788 PNG_UNUSED(pos)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001789
1790 /* This is recoverable, but make it unconditionally an app_error on write to
1791 * avoid writing invalid ICC profiles into PNG files. (I.e. we handle them
1792 * on read, with a warning, but on write unless the app turns off
1793 * application errors the PNG won't be written.)
1794 */
1795 png_chunk_report(png_ptr, message,
1796 (colorspace != NULL) ? PNG_CHUNK_ERROR : PNG_CHUNK_WRITE_ERROR);
1797
John Bowler736f40f2011-08-25 16:19:44 -05001798 return 0;
1799}
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001800#endif /* sRGB || iCCP */
1801
1802#ifdef PNG_sRGB_SUPPORTED
1803int /* PRIVATE */
1804png_colorspace_set_sRGB(png_const_structrp png_ptr, png_colorspacerp colorspace,
1805 int intent)
1806{
1807 /* sRGB sets known gamma, end points and (from the chunk) intent. */
1808 /* IMPORTANT: these are not necessarily the values found in an ICC profile
1809 * because ICC profiles store values adapted to a D50 environment; it is
1810 * expected that the ICC profile mediaWhitePointTag will be D50, see the
1811 * checks and code elsewhere to understand this better.
1812 *
1813 * These XYZ values, which are accurate to 5dp, produce rgb to gray
1814 * coefficients of (6968,23435,2366), which are reduced (because they add up
1815 * to 32769 not 32768) to (6968,23434,2366). These are the values that
1816 * libpng has traditionally used (and are the best values given the 15bit
1817 * algorithm used by the rgb to gray code.)
1818 */
1819 static const png_XYZ sRGB_XYZ = /* D65 XYZ (*not* the D50 adapted values!) */
1820 {
1821 /* color X Y Z */
1822 /* red */ 41239, 21264, 1933,
1823 /* green */ 35758, 71517, 11919,
1824 /* blue */ 18048, 7219, 95053
1825 };
1826
1827 /* Do nothing if the colorspace is already invalidated. */
1828 if (colorspace->flags & PNG_COLORSPACE_INVALID)
1829 return 0;
1830
1831 /* Check the intent, then check for existing settings. It is valid for the
1832 * PNG file to have cHRM or gAMA chunks along with sRGB, but the values must
1833 * be consistent with the correct values. If, however, this function is
1834 * called below because an iCCP chunk matches sRGB then it is quite
1835 * conceivable that an older app recorded incorrect gAMA and cHRM because of
1836 * an incorrect calculation based on the values in the profile - this does
1837 * *not* invalidate the profile (though it still produces an error, which can
1838 * be ignored.)
1839 */
1840 if (intent < 0 || intent >= PNG_sRGB_INTENT_LAST)
1841 return png_icc_profile_error(png_ptr, colorspace, "sRGB",
1842 (unsigned)intent, "invalid sRGB rendering intent");
1843
1844 if ((colorspace->flags & PNG_COLORSPACE_HAVE_INTENT) != 0 &&
1845 colorspace->rendering_intent != intent)
1846 return png_icc_profile_error(png_ptr, colorspace, "sRGB",
1847 (unsigned)intent, "inconsistent rendering intents");
1848
1849 if ((colorspace->flags & PNG_COLORSPACE_FROM_sRGB) != 0)
1850 {
1851 png_benign_error(png_ptr, "duplicate sRGB information ignored");
1852 return 0;
1853 }
1854
1855 /* If the standard sRGB cHRM chunk does not match the one from the PNG file
1856 * warn but overwrite the value with the correct one.
1857 */
1858 if ((colorspace->flags & PNG_COLORSPACE_HAVE_ENDPOINTS) != 0 &&
1859 !png_colorspace_endpoints_match(&sRGB_xy, &colorspace->end_points_xy,
1860 100))
1861 png_chunk_report(png_ptr, "cHRM chunk does not match sRGB",
1862 PNG_CHUNK_ERROR);
1863
1864 /* This check is just done for the error reporting - the routine always
1865 * returns true when the 'from' argument corresponds to sRGB (2).
1866 */
1867 (void)png_colorspace_check_gamma(png_ptr, colorspace, PNG_GAMMA_sRGB_INVERSE,
1868 2/*from sRGB*/);
1869
1870 /* intent: bugs in GCC force 'int' to be used as the parameter type. */
1871 colorspace->rendering_intent = (png_uint_16)intent;
1872 colorspace->flags |= PNG_COLORSPACE_HAVE_INTENT;
1873
1874 /* endpoints */
1875 colorspace->end_points_xy = sRGB_xy;
1876 colorspace->end_points_XYZ = sRGB_XYZ;
1877 colorspace->flags |=
1878 (PNG_COLORSPACE_HAVE_ENDPOINTS|PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB);
1879
1880 /* gamma */
1881 colorspace->gamma = PNG_GAMMA_sRGB_INVERSE;
1882 colorspace->flags |= PNG_COLORSPACE_HAVE_GAMMA;
1883
1884 /* Finally record that we have an sRGB profile */
1885 colorspace->flags |=
1886 (PNG_COLORSPACE_MATCHES_sRGB|PNG_COLORSPACE_FROM_sRGB);
1887
1888 return 1; /* set */
1889}
1890#endif /* sRGB */
1891
1892#ifdef PNG_iCCP_SUPPORTED
1893/* Encoded value of D50 as an ICC XYZNumber. From the ICC 2010 spec the value
1894 * is XYZ(0.9642,1.0,0.8249), which scales to:
1895 *
1896 * (63189.8112, 65536, 54060.6464)
1897 */
1898static const png_byte D50_nCIEXYZ[12] =
1899 { 0x00, 0x00, 0xf6, 0xd6, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x2d };
1900
1901int /* PRIVATE */
1902png_icc_check_length(png_const_structrp png_ptr, png_colorspacerp colorspace,
1903 png_const_charp name, png_uint_32 profile_length)
1904{
1905 if (profile_length < 132)
1906 return png_icc_profile_error(png_ptr, colorspace, name, profile_length,
1907 "too short");
1908
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001909 return 1;
1910}
1911
1912int /* PRIVATE */
1913png_icc_check_header(png_const_structrp png_ptr, png_colorspacerp colorspace,
1914 png_const_charp name, png_uint_32 profile_length,
1915 png_const_bytep profile/* first 132 bytes only */, int color_type)
1916{
1917 png_uint_32 temp;
1918
1919 /* Length check; this cannot be ignored in this code because profile_length
1920 * is used later to check the tag table, so even if the profile seems over
1921 * long profile_length from the caller must be correct. The caller can fix
1922 * this up on read or write by just passing in the profile header length.
1923 */
1924 temp = png_get_uint_32(profile);
1925 if (temp != profile_length)
1926 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1927 "length does not match profile");
1928
Glenn Randers-Pehrson5a1d1b52014-04-24 15:54:28 -05001929 temp = (png_uint_32) (*(profile+8));
1930 if (temp > 3 && (profile_length & 3))
1931 return png_icc_profile_error(png_ptr, colorspace, name, profile_length,
1932 "invalid length");
1933
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001934 temp = png_get_uint_32(profile+128); /* tag count: 12 bytes/tag */
Glenn Randers-Pehrson67a289f2013-04-19 19:03:34 -05001935 if (temp > 357913930 || /* (2^32-4-132)/12: maximum possible tag count */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001936 profile_length < 132+12*temp) /* truncated tag table */
1937 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1938 "tag count too large");
1939
1940 /* The 'intent' must be valid or we can't store it, ICC limits the intent to
1941 * 16 bits.
1942 */
1943 temp = png_get_uint_32(profile+64);
1944 if (temp >= 0xffff) /* The ICC limit */
1945 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1946 "invalid rendering intent");
1947
1948 /* This is just a warning because the profile may be valid in future
1949 * versions.
1950 */
1951 if (temp >= PNG_sRGB_INTENT_LAST)
1952 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
1953 "intent outside defined range");
1954
1955 /* At this point the tag table can't be checked because it hasn't necessarily
1956 * been loaded; however, various header fields can be checked. These checks
1957 * are for values permitted by the PNG spec in an ICC profile; the PNG spec
1958 * restricts the profiles that can be passed in an iCCP chunk (they must be
1959 * appropriate to processing PNG data!)
1960 */
1961
1962 /* Data checks (could be skipped). These checks must be independent of the
1963 * version number; however, the version number doesn't accomodate changes in
1964 * the header fields (just the known tags and the interpretation of the
1965 * data.)
1966 */
1967 temp = png_get_uint_32(profile+36); /* signature 'ascp' */
1968 if (temp != 0x61637370)
1969 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1970 "invalid signature");
1971
1972 /* Currently the PCS illuminant/adopted white point (the computational
1973 * white point) are required to be D50,
1974 * however the profile contains a record of the illuminant so perhaps ICC
1975 * expects to be able to change this in the future (despite the rationale in
1976 * the introduction for using a fixed PCS adopted white.) Consequently the
1977 * following is just a warning.
1978 */
1979 if (memcmp(profile+68, D50_nCIEXYZ, 12) != 0)
1980 (void)png_icc_profile_error(png_ptr, NULL, name, 0/*no tag value*/,
1981 "PCS illuminant is not D50");
1982
1983 /* The PNG spec requires this:
1984 * "If the iCCP chunk is present, the image samples conform to the colour
1985 * space represented by the embedded ICC profile as defined by the
1986 * International Color Consortium [ICC]. The colour space of the ICC profile
1987 * shall be an RGB colour space for colour images (PNG colour types 2, 3, and
1988 * 6), or a greyscale colour space for greyscale images (PNG colour types 0
1989 * and 4)."
1990 *
1991 * This checking code ensures the embedded profile (on either read or write)
1992 * conforms to the specification requirements. Notice that an ICC 'gray'
1993 * color-space profile contains the information to transform the monochrome
1994 * data to XYZ or L*a*b (according to which PCS the profile uses) and this
1995 * should be used in preference to the standard libpng K channel replication
1996 * into R, G and B channels.
1997 *
1998 * Previously it was suggested that an RGB profile on grayscale data could be
1999 * handled. However it it is clear that using an RGB profile in this context
2000 * must be an error - there is no specification of what it means. Thus it is
2001 * almost certainly more correct to ignore the profile.
2002 */
2003 temp = png_get_uint_32(profile+16); /* data colour space field */
2004 switch (temp)
2005 {
2006 case 0x52474220: /* 'RGB ' */
2007 if (!(color_type & PNG_COLOR_MASK_COLOR))
2008 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2009 "RGB color space not permitted on grayscale PNG");
2010 break;
2011
2012 case 0x47524159: /* 'GRAY' */
2013 if (color_type & PNG_COLOR_MASK_COLOR)
2014 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2015 "Gray color space not permitted on RGB PNG");
2016 break;
2017
2018 default:
2019 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2020 "invalid ICC profile color space");
2021 }
2022
2023 /* It is up to the application to check that the profile class matches the
2024 * application requirements; the spec provides no guidance, but it's pretty
2025 * weird if the profile is not scanner ('scnr'), monitor ('mntr'), printer
2026 * ('prtr') or 'spac' (for generic color spaces). Issue a warning in these
2027 * cases. Issue an error for device link or abstract profiles - these don't
2028 * contain the records necessary to transform the color-space to anything
2029 * other than the target device (and not even that for an abstract profile).
2030 * Profiles of these classes may not be embedded in images.
2031 */
2032 temp = png_get_uint_32(profile+12); /* profile/device class */
2033 switch (temp)
2034 {
2035 case 0x73636E72: /* 'scnr' */
2036 case 0x6D6E7472: /* 'mntr' */
2037 case 0x70727472: /* 'prtr' */
2038 case 0x73706163: /* 'spac' */
2039 /* All supported */
2040 break;
2041
2042 case 0x61627374: /* 'abst' */
2043 /* May not be embedded in an image */
2044 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2045 "invalid embedded Abstract ICC profile");
2046
2047 case 0x6C696E6B: /* 'link' */
Glenn Randers-Pehrson5a1d1b52014-04-24 15:54:28 -05002048 /* DeviceLink profiles cannot be interpreted in a non-device specific
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002049 * fashion, if an app uses the AToB0Tag in the profile the results are
2050 * undefined unless the result is sent to the intended device,
2051 * therefore a DeviceLink profile should not be found embedded in a
2052 * PNG.
2053 */
2054 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2055 "unexpected DeviceLink ICC profile class");
2056
2057 case 0x6E6D636C: /* 'nmcl' */
2058 /* A NamedColor profile is also device specific, however it doesn't
Glenn Randers-Pehrson5a1d1b52014-04-24 15:54:28 -05002059 * contain an AToB0 tag that is open to misinterpretation. Almost
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002060 * certainly it will fail the tests below.
2061 */
2062 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
2063 "unexpected NamedColor ICC profile class");
2064 break;
2065
2066 default:
2067 /* To allow for future enhancements to the profile accept unrecognized
2068 * profile classes with a warning, these then hit the test below on the
2069 * tag content to ensure they are backward compatible with one of the
2070 * understood profiles.
2071 */
2072 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
2073 "unrecognized ICC profile class");
2074 break;
2075 }
2076
2077 /* For any profile other than a device link one the PCS must be encoded
2078 * either in XYZ or Lab.
2079 */
2080 temp = png_get_uint_32(profile+20);
2081 switch (temp)
2082 {
2083 case 0x58595A20: /* 'XYZ ' */
2084 case 0x4C616220: /* 'Lab ' */
2085 break;
2086
2087 default:
2088 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2089 "unexpected ICC PCS encoding");
2090 }
2091
2092 return 1;
2093}
2094
2095int /* PRIVATE */
2096png_icc_check_tag_table(png_const_structrp png_ptr, png_colorspacerp colorspace,
2097 png_const_charp name, png_uint_32 profile_length,
2098 png_const_bytep profile /* header plus whole tag table */)
2099{
2100 png_uint_32 tag_count = png_get_uint_32(profile+128);
2101 png_uint_32 itag;
2102 png_const_bytep tag = profile+132; /* The first tag */
2103
2104 /* First scan all the tags in the table and add bits to the icc_info value
2105 * (temporarily in 'tags').
2106 */
2107 for (itag=0; itag < tag_count; ++itag, tag += 12)
2108 {
2109 png_uint_32 tag_id = png_get_uint_32(tag+0);
2110 png_uint_32 tag_start = png_get_uint_32(tag+4); /* must be aligned */
2111 png_uint_32 tag_length = png_get_uint_32(tag+8);/* not padded */
2112
2113 /* The ICC specification does not exclude zero length tags, therefore the
2114 * start might actually be anywhere if there is no data, but this would be
2115 * a clear abuse of the intent of the standard so the start is checked for
2116 * being in range. All defined tag types have an 8 byte header - a 4 byte
2117 * type signature then 0.
2118 */
2119 if ((tag_start & 3) != 0)
2120 {
2121 /* CNHP730S.icc shipped with Microsoft Windows 64 violates this, it is
2122 * only a warning here because libpng does not care about the
2123 * alignment.
2124 */
2125 (void)png_icc_profile_error(png_ptr, NULL, name, tag_id,
2126 "ICC profile tag start not a multiple of 4");
2127 }
2128
2129 /* This is a hard error; potentially it can cause read outside the
2130 * profile.
2131 */
2132 if (tag_start > profile_length || tag_length > profile_length - tag_start)
2133 return png_icc_profile_error(png_ptr, colorspace, name, tag_id,
2134 "ICC profile tag outside profile");
2135 }
2136
2137 return 1; /* success, maybe with warnings */
2138}
2139
Glenn Randers-Pehrson0ace9f52014-04-20 20:06:14 -05002140#if defined(PNG_sRGB_SUPPORTED) && PNG_sRGB_PROFILE_CHECKS >= 0
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002141/* Information about the known ICC sRGB profiles */
2142static const struct
2143{
2144 png_uint_32 adler, crc, length;
2145 png_uint_32 md5[4];
2146 png_byte have_md5;
2147 png_byte is_broken;
2148 png_uint_16 intent;
2149
2150# define PNG_MD5(a,b,c,d) { a, b, c, d }, (a!=0)||(b!=0)||(c!=0)||(d!=0)
2151# define PNG_ICC_CHECKSUM(adler, crc, md5, intent, broke, date, length, fname)\
2152 { adler, crc, length, md5, broke, intent },
2153
2154} png_sRGB_checks[] =
2155{
2156 /* This data comes from contrib/tools/checksum-icc run on downloads of
2157 * all four ICC sRGB profiles from www.color.org.
2158 */
2159 /* adler32, crc32, MD5[4], intent, date, length, file-name */
2160 PNG_ICC_CHECKSUM(0x0a3fd9f6, 0x3b8772b9,
2161 PNG_MD5(0x29f83dde, 0xaff255ae, 0x7842fae4, 0xca83390d), 0, 0,
2162 "2009/03/27 21:36:31", 3048, "sRGB_IEC61966-2-1_black_scaled.icc")
2163
2164 /* ICC sRGB v2 perceptual no black-compensation: */
2165 PNG_ICC_CHECKSUM(0x4909e5e1, 0x427ebb21,
2166 PNG_MD5(0xc95bd637, 0xe95d8a3b, 0x0df38f99, 0xc1320389), 1, 0,
2167 "2009/03/27 21:37:45", 3052, "sRGB_IEC61966-2-1_no_black_scaling.icc")
2168
2169 PNG_ICC_CHECKSUM(0xfd2144a1, 0x306fd8ae,
2170 PNG_MD5(0xfc663378, 0x37e2886b, 0xfd72e983, 0x8228f1b8), 0, 0,
2171 "2009/08/10 17:28:01", 60988, "sRGB_v4_ICC_preference_displayclass.icc")
2172
2173 /* ICC sRGB v4 perceptual */
2174 PNG_ICC_CHECKSUM(0x209c35d2, 0xbbef7812,
2175 PNG_MD5(0x34562abf, 0x994ccd06, 0x6d2c5721, 0xd0d68c5d), 0, 0,
2176 "2007/07/25 00:05:37", 60960, "sRGB_v4_ICC_preference.icc")
2177
2178 /* The following profiles have no known MD5 checksum. If there is a match
2179 * on the (empty) MD5 the other fields are used to attempt a match and
2180 * a warning is produced. The first two of these profiles have a 'cprt' tag
2181 * which suggests that they were also made by Hewlett Packard.
2182 */
2183 PNG_ICC_CHECKSUM(0xa054d762, 0x5d5129ce,
2184 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 1, 0,
2185 "2004/07/21 18:57:42", 3024, "sRGB_IEC61966-2-1_noBPC.icc")
2186
2187 /* This is a 'mntr' (display) profile with a mediaWhitePointTag that does not
2188 * match the D50 PCS illuminant in the header (it is in fact the D65 values,
2189 * so the white point is recorded as the un-adapted value.) The profiles
2190 * below only differ in one byte - the intent - and are basically the same as
2191 * the previous profile except for the mediaWhitePointTag error and a missing
2192 * chromaticAdaptationTag.
2193 */
2194 PNG_ICC_CHECKSUM(0xf784f3fb, 0x182ea552,
2195 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 0, 1/*broken*/,
2196 "1998/02/09 06:49:00", 3144, "HP-Microsoft sRGB v2 perceptual")
2197
2198 PNG_ICC_CHECKSUM(0x0398f3fc, 0xf29e526d,
2199 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 1, 1/*broken*/,
2200 "1998/02/09 06:49:00", 3144, "HP-Microsoft sRGB v2 media-relative")
2201};
2202
2203static int
2204png_compare_ICC_profile_with_sRGB(png_const_structrp png_ptr,
2205 png_const_bytep profile, uLong adler)
2206{
2207 /* The quick check is to verify just the MD5 signature and trust the
2208 * rest of the data. Because the profile has already been verified for
2209 * correctness this is safe. png_colorspace_set_sRGB will check the 'intent'
2210 * field too, so if the profile has been edited with an intent not defined
2211 * by sRGB (but maybe defined by a later ICC specification) the read of
2212 * the profile will fail at that point.
2213 */
Glenn Randers-Pehrsone95ce2c2014-05-07 12:07:12 -05002214
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002215 png_uint_32 length = 0;
2216 png_uint_32 intent = 0x10000; /* invalid */
2217#if PNG_sRGB_PROFILE_CHECKS > 1
2218 uLong crc = 0; /* the value for 0 length data */
John Bowler921648a2012-03-28 23:36:12 -05002219#endif
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002220 unsigned int i;
2221
Glenn Randers-Pehrson36694672014-08-22 08:55:50 -05002222#ifdef PNG_SET_OPTION_SUPPORTED
Glenn Randers-Pehrsonb7afba62014-06-06 12:07:07 -05002223 /* First see if PNG_SKIP_sRGB_CHECK_PROFILE has been set to "on" */
2224 if (((png_ptr->options >> PNG_SKIP_sRGB_CHECK_PROFILE) & 3) ==
2225 PNG_OPTION_ON)
2226 return 0;
Glenn Randers-Pehrson36694672014-08-22 08:55:50 -05002227#endif
Glenn Randers-Pehrsonb7afba62014-06-06 12:07:07 -05002228
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002229 for (i=0; i < (sizeof png_sRGB_checks) / (sizeof png_sRGB_checks[0]); ++i)
2230 {
2231 if (png_get_uint_32(profile+84) == png_sRGB_checks[i].md5[0] &&
2232 png_get_uint_32(profile+88) == png_sRGB_checks[i].md5[1] &&
2233 png_get_uint_32(profile+92) == png_sRGB_checks[i].md5[2] &&
2234 png_get_uint_32(profile+96) == png_sRGB_checks[i].md5[3])
2235 {
2236 /* This may be one of the old HP profiles without an MD5, in that
2237 * case we can only use the length and Adler32 (note that these
2238 * are not used by default if there is an MD5!)
2239 */
2240# if PNG_sRGB_PROFILE_CHECKS == 0
2241 if (png_sRGB_checks[i].have_md5)
2242 return 1+png_sRGB_checks[i].is_broken;
2243# endif
2244
2245 /* Profile is unsigned or more checks have been configured in. */
2246 if (length == 0)
2247 {
2248 length = png_get_uint_32(profile);
2249 intent = png_get_uint_32(profile+64);
2250 }
2251
2252 /* Length *and* intent must match */
2253 if (length == png_sRGB_checks[i].length &&
2254 intent == png_sRGB_checks[i].intent)
2255 {
Glenn Randers-Pehrson1f24cb72013-03-04 21:58:02 -06002256 /* Now calculate the adler32 if not done already. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002257 if (adler == 0)
2258 {
2259 adler = adler32(0, NULL, 0);
2260 adler = adler32(adler, profile, length);
2261 }
2262
2263 if (adler == png_sRGB_checks[i].adler)
2264 {
2265 /* These basic checks suggest that the data has not been
2266 * modified, but if the check level is more than 1 perform
2267 * our own crc32 checksum on the data.
2268 */
2269# if PNG_sRGB_PROFILE_CHECKS > 1
2270 if (crc == 0)
2271 {
2272 crc = crc32(0, NULL, 0);
2273 crc = crc32(crc, profile, length);
2274 }
2275
2276 /* So this check must pass for the 'return' below to happen.
2277 */
2278 if (crc == png_sRGB_checks[i].crc)
2279# endif
2280 {
2281 if (png_sRGB_checks[i].is_broken)
2282 {
2283 /* These profiles are known to have bad data that may cause
2284 * problems if they are used, therefore attempt to
2285 * discourage their use, skip the 'have_md5' warning below,
2286 * which is made irrelevant by this error.
2287 */
2288 png_chunk_report(png_ptr, "known incorrect sRGB profile",
2289 PNG_CHUNK_ERROR);
2290 }
2291
2292 /* Warn that this being done; this isn't even an error since
2293 * the profile is perfectly valid, but it would be nice if
2294 * people used the up-to-date ones.
2295 */
2296 else if (!png_sRGB_checks[i].have_md5)
2297 {
Glenn Randers-Pehrson3efbeca2014-07-21 16:57:30 -05002298 png_chunk_report(png_ptr, "out-of-date sRGB profile with"
2299 " no signature",
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002300 PNG_CHUNK_WARNING);
2301 }
2302
2303 return 1+png_sRGB_checks[i].is_broken;
2304 }
2305 }
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002306
Glenn Randers-Pehrsonab56b742014-02-27 08:00:17 -06002307# if PNG_sRGB_PROFILE_CHECKS > 0
Glenn Randers-Pehrsone3ae5832014-02-22 22:22:15 -06002308 /* The signature matched, but the profile had been changed in some
2309 * way. This probably indicates a data error or uninformed hacking.
2310 * Fall through to "no match".
2311 */
Glenn Randers-Pehrson3efbeca2014-07-21 16:57:30 -05002312 png_chunk_report(png_ptr, "Not recognizing known sRGB profile that"
2313 " has been edited",
Glenn Randers-Pehrsone3ae5832014-02-22 22:22:15 -06002314 PNG_CHUNK_WARNING);
2315 break;
Glenn Randers-Pehrsonab56b742014-02-27 08:00:17 -06002316# endif
Glenn Randers-Pehrsonf30aa7e2014-04-26 06:28:50 -05002317 }
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002318 }
2319 }
2320
2321 return 0; /* no match */
2322}
2323#endif
2324
2325#ifdef PNG_sRGB_SUPPORTED
2326void /* PRIVATE */
2327png_icc_set_sRGB(png_const_structrp png_ptr,
2328 png_colorspacerp colorspace, png_const_bytep profile, uLong adler)
2329{
2330 /* Is this profile one of the known ICC sRGB profiles? If it is, just set
2331 * the sRGB information.
2332 */
Glenn Randers-Pehrson0ace9f52014-04-20 20:06:14 -05002333#if PNG_sRGB_PROFILE_CHECKS >= 0
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002334 if (png_compare_ICC_profile_with_sRGB(png_ptr, profile, adler))
Glenn Randers-Pehrson0ace9f52014-04-20 20:06:14 -05002335#endif
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002336 (void)png_colorspace_set_sRGB(png_ptr, colorspace,
2337 (int)/*already checked*/png_get_uint_32(profile+64));
2338}
2339#endif /* PNG_READ_sRGB_SUPPORTED */
2340
2341int /* PRIVATE */
2342png_colorspace_set_ICC(png_const_structrp png_ptr, png_colorspacerp colorspace,
2343 png_const_charp name, png_uint_32 profile_length, png_const_bytep profile,
2344 int color_type)
2345{
2346 if (colorspace->flags & PNG_COLORSPACE_INVALID)
2347 return 0;
2348
2349 if (png_icc_check_length(png_ptr, colorspace, name, profile_length) &&
2350 png_icc_check_header(png_ptr, colorspace, name, profile_length, profile,
2351 color_type) &&
2352 png_icc_check_tag_table(png_ptr, colorspace, name, profile_length,
2353 profile))
2354 {
John Bowlere4413a72013-04-17 21:27:47 -05002355# ifdef PNG_sRGB_SUPPORTED
2356 /* If no sRGB support, don't try storing sRGB information */
2357 png_icc_set_sRGB(png_ptr, colorspace, profile, 0);
2358# endif
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002359 return 1;
2360 }
2361
2362 /* Failure case */
2363 return 0;
2364}
2365#endif /* iCCP */
2366
2367#ifdef PNG_READ_RGB_TO_GRAY_SUPPORTED
2368void /* PRIVATE */
2369png_colorspace_set_rgb_coefficients(png_structrp png_ptr)
2370{
2371 /* Set the rgb_to_gray coefficients from the colorspace. */
2372 if (!png_ptr->rgb_to_gray_coefficients_set &&
2373 (png_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_ENDPOINTS) != 0)
2374 {
2375 /* png_set_background has not been called, get the coefficients from the Y
2376 * values of the colorspace colorants.
2377 */
2378 png_fixed_point r = png_ptr->colorspace.end_points_XYZ.red_Y;
2379 png_fixed_point g = png_ptr->colorspace.end_points_XYZ.green_Y;
2380 png_fixed_point b = png_ptr->colorspace.end_points_XYZ.blue_Y;
2381 png_fixed_point total = r+g+b;
2382
2383 if (total > 0 &&
2384 r >= 0 && png_muldiv(&r, r, 32768, total) && r >= 0 && r <= 32768 &&
2385 g >= 0 && png_muldiv(&g, g, 32768, total) && g >= 0 && g <= 32768 &&
2386 b >= 0 && png_muldiv(&b, b, 32768, total) && b >= 0 && b <= 32768 &&
2387 r+g+b <= 32769)
2388 {
2389 /* We allow 0 coefficients here. r+g+b may be 32769 if two or
2390 * all of the coefficients were rounded up. Handle this by
2391 * reducing the *largest* coefficient by 1; this matches the
2392 * approach used for the default coefficients in pngrtran.c
2393 */
2394 int add = 0;
2395
2396 if (r+g+b > 32768)
2397 add = -1;
2398 else if (r+g+b < 32768)
2399 add = 1;
2400
2401 if (add != 0)
2402 {
2403 if (g >= r && g >= b)
2404 g += add;
2405 else if (r >= g && r >= b)
2406 r += add;
2407 else
2408 b += add;
2409 }
2410
2411 /* Check for an internal error. */
2412 if (r+g+b != 32768)
2413 png_error(png_ptr,
2414 "internal error handling cHRM coefficients");
2415
2416 else
2417 {
2418 png_ptr->rgb_to_gray_red_coeff = (png_uint_16)r;
2419 png_ptr->rgb_to_gray_green_coeff = (png_uint_16)g;
2420 }
2421 }
2422
2423 /* This is a png_error at present even though it could be ignored -
2424 * it should never happen, but it is important that if it does, the
2425 * bug is fixed.
2426 */
2427 else
2428 png_error(png_ptr, "internal error handling cHRM->XYZ");
2429 }
2430}
2431#endif
2432
2433#endif /* COLORSPACE */
John Bowlerb11b31a2012-03-21 07:55:46 -05002434
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002435void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06002436png_check_IHDR(png_const_structrp png_ptr,
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002437 png_uint_32 width, png_uint_32 height, int bit_depth,
2438 int color_type, int interlace_type, int compression_type,
2439 int filter_type)
2440{
2441 int error = 0;
2442
2443 /* Check for width and height valid values */
2444 if (width == 0)
2445 {
2446 png_warning(png_ptr, "Image width is zero in IHDR");
2447 error = 1;
2448 }
Cosmin Trutaae6eaa82014-03-22 09:39:33 -05002449 else if (width > PNG_UINT_31_MAX)
2450 {
2451 png_warning(png_ptr, "Invalid image width in IHDR");
2452 error = 1;
2453 }
2454 else
2455 {
2456# ifdef PNG_SET_USER_LIMITS_SUPPORTED
2457 if (width > png_ptr->user_width_max)
2458# else
2459 if (width > PNG_USER_WIDTH_MAX)
2460# endif
2461 {
2462 png_warning(png_ptr, "Image width exceeds user limit in IHDR");
2463 error = 1;
2464 }
2465 }
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002466
2467 if (height == 0)
2468 {
2469 png_warning(png_ptr, "Image height is zero in IHDR");
2470 error = 1;
2471 }
Cosmin Trutaae6eaa82014-03-22 09:39:33 -05002472 else if (height > PNG_UINT_31_MAX)
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002473 {
Glenn Randers-Pehrsondd66f3e2009-09-30 14:58:28 -05002474 png_warning(png_ptr, "Invalid image height in IHDR");
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002475 error = 1;
2476 }
Cosmin Trutaae6eaa82014-03-22 09:39:33 -05002477 else
2478 {
2479# ifdef PNG_SET_USER_LIMITS_SUPPORTED
2480 if (height > png_ptr->user_height_max)
2481# else
2482 if (height > PNG_USER_HEIGHT_MAX)
2483# endif
2484 {
2485 png_warning(png_ptr, "Image height exceeds user limit in IHDR");
2486 error = 1;
2487 }
2488 }
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002489
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002490 /* Check other values */
2491 if (bit_depth != 1 && bit_depth != 2 && bit_depth != 4 &&
2492 bit_depth != 8 && bit_depth != 16)
2493 {
2494 png_warning(png_ptr, "Invalid bit depth in IHDR");
2495 error = 1;
2496 }
2497
2498 if (color_type < 0 || color_type == 1 ||
2499 color_type == 5 || color_type > 6)
2500 {
2501 png_warning(png_ptr, "Invalid color type in IHDR");
2502 error = 1;
2503 }
2504
2505 if (((color_type == PNG_COLOR_TYPE_PALETTE) && bit_depth > 8) ||
2506 ((color_type == PNG_COLOR_TYPE_RGB ||
2507 color_type == PNG_COLOR_TYPE_GRAY_ALPHA ||
2508 color_type == PNG_COLOR_TYPE_RGB_ALPHA) && bit_depth < 8))
2509 {
2510 png_warning(png_ptr, "Invalid color type/bit depth combination in IHDR");
2511 error = 1;
2512 }
2513
2514 if (interlace_type >= PNG_INTERLACE_LAST)
2515 {
2516 png_warning(png_ptr, "Unknown interlace method in IHDR");
2517 error = 1;
2518 }
2519
2520 if (compression_type != PNG_COMPRESSION_TYPE_BASE)
2521 {
2522 png_warning(png_ptr, "Unknown compression method in IHDR");
2523 error = 1;
2524 }
2525
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002526# ifdef PNG_MNG_FEATURES_SUPPORTED
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002527 /* Accept filter_method 64 (intrapixel differencing) only if
2528 * 1. Libpng was compiled with PNG_MNG_FEATURES_SUPPORTED and
2529 * 2. Libpng did not read a PNG signature (this filter_method is only
2530 * used in PNG datastreams that are embedded in MNG datastreams) and
2531 * 3. The application called png_permit_mng_features with a mask that
2532 * included PNG_FLAG_MNG_FILTER_64 and
2533 * 4. The filter_method is 64 and
2534 * 5. The color_type is RGB or RGBA
2535 */
2536 if ((png_ptr->mode & PNG_HAVE_PNG_SIGNATURE) &&
2537 png_ptr->mng_features_permitted)
2538 png_warning(png_ptr, "MNG features are not allowed in a PNG datastream");
2539
2540 if (filter_type != PNG_FILTER_TYPE_BASE)
2541 {
Glenn Randers-Pehrson7ec330d2009-09-25 11:45:42 -05002542 if (!((png_ptr->mng_features_permitted & PNG_FLAG_MNG_FILTER_64) &&
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002543 (filter_type == PNG_INTRAPIXEL_DIFFERENCING) &&
2544 ((png_ptr->mode & PNG_HAVE_PNG_SIGNATURE) == 0) &&
2545 (color_type == PNG_COLOR_TYPE_RGB ||
2546 color_type == PNG_COLOR_TYPE_RGB_ALPHA)))
Glenn Randers-Pehrson7ec330d2009-09-25 11:45:42 -05002547 {
2548 png_warning(png_ptr, "Unknown filter method in IHDR");
2549 error = 1;
2550 }
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002551
Glenn Randers-Pehrson7ec330d2009-09-25 11:45:42 -05002552 if (png_ptr->mode & PNG_HAVE_PNG_SIGNATURE)
2553 {
2554 png_warning(png_ptr, "Invalid filter method in IHDR");
2555 error = 1;
2556 }
2557 }
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002558
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002559# else
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002560 if (filter_type != PNG_FILTER_TYPE_BASE)
2561 {
2562 png_warning(png_ptr, "Unknown filter method in IHDR");
2563 error = 1;
2564 }
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002565# endif
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002566
2567 if (error == 1)
2568 png_error(png_ptr, "Invalid IHDR data");
2569}
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002570
2571#if defined(PNG_sCAL_SUPPORTED) || defined(PNG_pCAL_SUPPORTED)
2572/* ASCII to fp functions */
2573/* Check an ASCII formated floating point value, see the more detailed
2574 * comments in pngpriv.h
2575 */
John Bowler8d261262011-06-18 13:37:11 -05002576/* The following is used internally to preserve the sticky flags */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002577#define png_fp_add(state, flags) ((state) |= (flags))
John Bowler8d261262011-06-18 13:37:11 -05002578#define png_fp_set(state, value) ((state) = (value) | ((state) & PNG_FP_STICKY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002579
2580int /* PRIVATE */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002581png_check_fp_number(png_const_charp string, png_size_t size, int *statep,
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002582 png_size_tp whereami)
2583{
2584 int state = *statep;
2585 png_size_t i = *whereami;
2586
2587 while (i < size)
2588 {
2589 int type;
2590 /* First find the type of the next character */
John Bowler8d261262011-06-18 13:37:11 -05002591 switch (string[i])
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002592 {
John Bowler8d261262011-06-18 13:37:11 -05002593 case 43: type = PNG_FP_SAW_SIGN; break;
2594 case 45: type = PNG_FP_SAW_SIGN + PNG_FP_NEGATIVE; break;
2595 case 46: type = PNG_FP_SAW_DOT; break;
2596 case 48: type = PNG_FP_SAW_DIGIT; break;
2597 case 49: case 50: case 51: case 52:
2598 case 53: case 54: case 55: case 56:
2599 case 57: type = PNG_FP_SAW_DIGIT + PNG_FP_NONZERO; break;
2600 case 69:
2601 case 101: type = PNG_FP_SAW_E; break;
2602 default: goto PNG_FP_End;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002603 }
2604
2605 /* Now deal with this type according to the current
2606 * state, the type is arranged to not overlap the
2607 * bits of the PNG_FP_STATE.
2608 */
John Bowler8d261262011-06-18 13:37:11 -05002609 switch ((state & PNG_FP_STATE) + (type & PNG_FP_SAW_ANY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002610 {
John Bowler8d261262011-06-18 13:37:11 -05002611 case PNG_FP_INTEGER + PNG_FP_SAW_SIGN:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002612 if (state & PNG_FP_SAW_ANY)
2613 goto PNG_FP_End; /* not a part of the number */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002614
John Bowler8d261262011-06-18 13:37:11 -05002615 png_fp_add(state, type);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002616 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002617
John Bowler8d261262011-06-18 13:37:11 -05002618 case PNG_FP_INTEGER + PNG_FP_SAW_DOT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002619 /* Ok as trailer, ok as lead of fraction. */
2620 if (state & PNG_FP_SAW_DOT) /* two dots */
2621 goto PNG_FP_End;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002622
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002623 else if (state & PNG_FP_SAW_DIGIT) /* trailing dot? */
John Bowler8d261262011-06-18 13:37:11 -05002624 png_fp_add(state, type);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002625
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002626 else
John Bowler8d261262011-06-18 13:37:11 -05002627 png_fp_set(state, PNG_FP_FRACTION | type);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002628
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002629 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002630
John Bowler8d261262011-06-18 13:37:11 -05002631 case PNG_FP_INTEGER + PNG_FP_SAW_DIGIT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002632 if (state & PNG_FP_SAW_DOT) /* delayed fraction */
2633 png_fp_set(state, PNG_FP_FRACTION | PNG_FP_SAW_DOT);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002634
John Bowler8d261262011-06-18 13:37:11 -05002635 png_fp_add(state, type | PNG_FP_WAS_VALID);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002636
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002637 break;
John Bowler8d261262011-06-18 13:37:11 -05002638
2639 case PNG_FP_INTEGER + PNG_FP_SAW_E:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002640 if ((state & PNG_FP_SAW_DIGIT) == 0)
2641 goto PNG_FP_End;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002642
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002643 png_fp_set(state, PNG_FP_EXPONENT);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002644
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002645 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002646
John Bowler8d261262011-06-18 13:37:11 -05002647 /* case PNG_FP_FRACTION + PNG_FP_SAW_SIGN:
2648 goto PNG_FP_End; ** no sign in fraction */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002649
John Bowler8d261262011-06-18 13:37:11 -05002650 /* case PNG_FP_FRACTION + PNG_FP_SAW_DOT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002651 goto PNG_FP_End; ** Because SAW_DOT is always set */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002652
John Bowler8d261262011-06-18 13:37:11 -05002653 case PNG_FP_FRACTION + PNG_FP_SAW_DIGIT:
2654 png_fp_add(state, type | PNG_FP_WAS_VALID);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002655 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002656
John Bowler8d261262011-06-18 13:37:11 -05002657 case PNG_FP_FRACTION + PNG_FP_SAW_E:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002658 /* This is correct because the trailing '.' on an
2659 * integer is handled above - so we can only get here
2660 * with the sequence ".E" (with no preceding digits).
2661 */
2662 if ((state & PNG_FP_SAW_DIGIT) == 0)
2663 goto PNG_FP_End;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002664
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002665 png_fp_set(state, PNG_FP_EXPONENT);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002666
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002667 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002668
John Bowler8d261262011-06-18 13:37:11 -05002669 case PNG_FP_EXPONENT + PNG_FP_SAW_SIGN:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002670 if (state & PNG_FP_SAW_ANY)
2671 goto PNG_FP_End; /* not a part of the number */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002672
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002673 png_fp_add(state, PNG_FP_SAW_SIGN);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002674
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002675 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002676
John Bowler8d261262011-06-18 13:37:11 -05002677 /* case PNG_FP_EXPONENT + PNG_FP_SAW_DOT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002678 goto PNG_FP_End; */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002679
John Bowler8d261262011-06-18 13:37:11 -05002680 case PNG_FP_EXPONENT + PNG_FP_SAW_DIGIT:
2681 png_fp_add(state, PNG_FP_SAW_DIGIT | PNG_FP_WAS_VALID);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002682
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002683 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002684
John Bowler8d261262011-06-18 13:37:11 -05002685 /* case PNG_FP_EXPONEXT + PNG_FP_SAW_E:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002686 goto PNG_FP_End; */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002687
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002688 default: goto PNG_FP_End; /* I.e. break 2 */
2689 }
2690
2691 /* The character seems ok, continue. */
2692 ++i;
2693 }
2694
2695PNG_FP_End:
2696 /* Here at the end, update the state and return the correct
2697 * return code.
2698 */
2699 *statep = state;
2700 *whereami = i;
2701
2702 return (state & PNG_FP_SAW_DIGIT) != 0;
2703}
2704
2705
2706/* The same but for a complete string. */
2707int
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002708png_check_fp_string(png_const_charp string, png_size_t size)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002709{
2710 int state=0;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002711 png_size_t char_index=0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002712
John Bowler8d261262011-06-18 13:37:11 -05002713 if (png_check_fp_number(string, size, &state, &char_index) &&
2714 (char_index == size || string[char_index] == 0))
2715 return state /* must be non-zero - see above */;
2716
2717 return 0; /* i.e. fail */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002718}
2719#endif /* pCAL or sCAL */
2720
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002721#ifdef PNG_sCAL_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002722# ifdef PNG_FLOATING_POINT_SUPPORTED
2723/* Utility used below - a simple accurate power of ten from an integral
2724 * exponent.
2725 */
2726static double
2727png_pow10(int power)
2728{
2729 int recip = 0;
2730 double d = 1;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002731
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002732 /* Handle negative exponent with a reciprocal at the end because
2733 * 10 is exact whereas .1 is inexact in base 2
2734 */
2735 if (power < 0)
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002736 {
2737 if (power < DBL_MIN_10_EXP) return 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002738 recip = 1, power = -power;
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002739 }
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002740
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002741 if (power > 0)
2742 {
2743 /* Decompose power bitwise. */
2744 double mult = 10;
2745 do
2746 {
2747 if (power & 1) d *= mult;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002748 mult *= mult;
2749 power >>= 1;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002750 }
2751 while (power > 0);
2752
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06002753 if (recip != 0) d = 1/d;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002754 }
2755 /* else power is 0 and d is 1 */
2756
2757 return d;
2758}
2759
2760/* Function to format a floating point value in ASCII with a given
2761 * precision.
2762 */
2763void /* PRIVATE */
John Bowler4f67e402011-12-28 08:43:37 -06002764png_ascii_from_fp(png_const_structrp png_ptr, png_charp ascii, png_size_t size,
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002765 double fp, unsigned int precision)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002766{
2767 /* We use standard functions from math.h, but not printf because
2768 * that would require stdio. The caller must supply a buffer of
2769 * sufficient size or we will png_error. The tests on size and
2770 * the space in ascii[] consumed are indicated below.
2771 */
2772 if (precision < 1)
2773 precision = DBL_DIG;
2774
2775 /* Enforce the limit of the implementation precision too. */
2776 if (precision > DBL_DIG+1)
2777 precision = DBL_DIG+1;
2778
2779 /* Basic sanity checks */
2780 if (size >= precision+5) /* See the requirements below. */
2781 {
2782 if (fp < 0)
2783 {
2784 fp = -fp;
Glenn Randers-Pehrsonb75b2412011-04-16 19:35:05 -05002785 *ascii++ = 45; /* '-' PLUS 1 TOTAL 1 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002786 --size;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002787 }
2788
2789 if (fp >= DBL_MIN && fp <= DBL_MAX)
2790 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002791 int exp_b10; /* A base 10 exponent */
2792 double base; /* 10^exp_b10 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002793
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002794 /* First extract a base 10 exponent of the number,
2795 * the calculation below rounds down when converting
2796 * from base 2 to base 10 (multiply by log10(2) -
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002797 * 0.3010, but 77/256 is 0.3008, so exp_b10 needs to
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002798 * be increased. Note that the arithmetic shift
2799 * performs a floor() unlike C arithmetic - using a
2800 * C multiply would break the following for negative
2801 * exponents.
2802 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002803 (void)frexp(fp, &exp_b10); /* exponent to base 2 */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002804
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002805 exp_b10 = (exp_b10 * 77) >> 8; /* <= exponent to base 10 */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002806
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002807 /* Avoid underflow here. */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002808 base = png_pow10(exp_b10); /* May underflow */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002809
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002810 while (base < DBL_MIN || base < fp)
2811 {
2812 /* And this may overflow. */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002813 double test = png_pow10(exp_b10+1);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002814
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002815 if (test <= DBL_MAX)
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002816 ++exp_b10, base = test;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002817
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002818 else
2819 break;
2820 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002821
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002822 /* Normalize fp and correct exp_b10, after this fp is in the
2823 * range [.1,1) and exp_b10 is both the exponent and the digit
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002824 * *before* which the decimal point should be inserted
2825 * (starting with 0 for the first digit). Note that this
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002826 * works even if 10^exp_b10 is out of range because of the
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002827 * test on DBL_MAX above.
2828 */
2829 fp /= base;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002830 while (fp >= 1) fp /= 10, ++exp_b10;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002831
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002832 /* Because of the code above fp may, at this point, be
2833 * less than .1, this is ok because the code below can
2834 * handle the leading zeros this generates, so no attempt
2835 * is made to correct that here.
2836 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002837
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002838 {
2839 int czero, clead, cdigits;
2840 char exponent[10];
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002841
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002842 /* Allow up to two leading zeros - this will not lengthen
2843 * the number compared to using E-n.
2844 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002845 if (exp_b10 < 0 && exp_b10 > -3) /* PLUS 3 TOTAL 4 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002846 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002847 czero = -exp_b10; /* PLUS 2 digits: TOTAL 3 */
2848 exp_b10 = 0; /* Dot added below before first output. */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002849 }
2850 else
2851 czero = 0; /* No zeros to add */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002852
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002853 /* Generate the digit list, stripping trailing zeros and
2854 * inserting a '.' before a digit if the exponent is 0.
2855 */
2856 clead = czero; /* Count of leading zeros */
2857 cdigits = 0; /* Count of digits in list. */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002858
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002859 do
2860 {
2861 double d;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002862
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002863 fp *= 10;
2864 /* Use modf here, not floor and subtract, so that
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002865 * the separation is done in one step. At the end
2866 * of the loop don't break the number into parts so
2867 * that the final digit is rounded.
2868 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002869 if (cdigits+czero-clead+1 < (int)precision)
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002870 fp = modf(fp, &d);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002871
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002872 else
2873 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002874 d = floor(fp + .5);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002875
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002876 if (d > 9)
2877 {
2878 /* Rounding up to 10, handle that here. */
2879 if (czero > 0)
2880 {
2881 --czero, d = 1;
2882 if (cdigits == 0) --clead;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002883 }
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002884 else
2885 {
2886 while (cdigits > 0 && d > 9)
2887 {
2888 int ch = *--ascii;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002889
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002890 if (exp_b10 != (-1))
2891 ++exp_b10;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002892
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002893 else if (ch == 46)
2894 {
2895 ch = *--ascii, ++size;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002896 /* Advance exp_b10 to '1', so that the
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002897 * decimal point happens after the
2898 * previous digit.
2899 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002900 exp_b10 = 1;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002901 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002902
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002903 --cdigits;
2904 d = ch - 47; /* I.e. 1+(ch-48) */
2905 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002906
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002907 /* Did we reach the beginning? If so adjust the
2908 * exponent but take into account the leading
2909 * decimal point.
2910 */
2911 if (d > 9) /* cdigits == 0 */
2912 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002913 if (exp_b10 == (-1))
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002914 {
2915 /* Leading decimal point (plus zeros?), if
2916 * we lose the decimal point here it must
2917 * be reentered below.
2918 */
2919 int ch = *--ascii;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002920
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002921 if (ch == 46)
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002922 ++size, exp_b10 = 1;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002923
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002924 /* Else lost a leading zero, so 'exp_b10' is
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002925 * still ok at (-1)
2926 */
2927 }
2928 else
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002929 ++exp_b10;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002930
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002931 /* In all cases we output a '1' */
2932 d = 1;
2933 }
2934 }
2935 }
2936 fp = 0; /* Guarantees termination below. */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002937 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002938
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002939 if (d == 0)
2940 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002941 ++czero;
2942 if (cdigits == 0) ++clead;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002943 }
2944 else
2945 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002946 /* Included embedded zeros in the digit count. */
2947 cdigits += czero - clead;
2948 clead = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002949
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002950 while (czero > 0)
2951 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002952 /* exp_b10 == (-1) means we just output the decimal
2953 * place - after the DP don't adjust 'exp_b10' any
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002954 * more!
2955 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002956 if (exp_b10 != (-1))
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002957 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002958 if (exp_b10 == 0) *ascii++ = 46, --size;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002959 /* PLUS 1: TOTAL 4 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002960 --exp_b10;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002961 }
2962 *ascii++ = 48, --czero;
2963 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002964
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002965 if (exp_b10 != (-1))
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002966 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002967 if (exp_b10 == 0) *ascii++ = 46, --size; /* counted
2968 above */
2969 --exp_b10;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002970 }
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05002971 *ascii++ = (char)(48 + (int)d), ++cdigits;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002972 }
2973 }
2974 while (cdigits+czero-clead < (int)precision && fp > DBL_MIN);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002975
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002976 /* The total output count (max) is now 4+precision */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002977
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002978 /* Check for an exponent, if we don't need one we are
2979 * done and just need to terminate the string. At
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002980 * this point exp_b10==(-1) is effectively if flag - it got
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002981 * to '-1' because of the decrement after outputing
2982 * the decimal point above (the exponent required is
2983 * *not* -1!)
2984 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002985 if (exp_b10 >= (-1) && exp_b10 <= 2)
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002986 {
2987 /* The following only happens if we didn't output the
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002988 * leading zeros above for negative exponent, so this
2989 * doest add to the digit requirement. Note that the
2990 * two zeros here can only be output if the two leading
2991 * zeros were *not* output, so this doesn't increase
2992 * the output count.
2993 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002994 while (--exp_b10 >= 0) *ascii++ = 48;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002995
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002996 *ascii = 0;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002997
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002998 /* Total buffer requirement (including the '\0') is
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002999 * 5+precision - see check at the start.
3000 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003001 return;
3002 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003003
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003004 /* Here if an exponent is required, adjust size for
3005 * the digits we output but did not count. The total
3006 * digit output here so far is at most 1+precision - no
3007 * decimal point and no leading or trailing zeros have
3008 * been output.
3009 */
3010 size -= cdigits;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003011
Glenn Randers-Pehrsonb75b2412011-04-16 19:35:05 -05003012 *ascii++ = 69, --size; /* 'E': PLUS 1 TOTAL 2+precision */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003013
John Bowler75156122011-09-09 17:21:44 -05003014 /* The following use of an unsigned temporary avoids ambiguities in
3015 * the signed arithmetic on exp_b10 and permits GCC at least to do
3016 * better optimization.
3017 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003018 {
John Bowler75156122011-09-09 17:21:44 -05003019 unsigned int uexp_b10;
3020
3021 if (exp_b10 < 0)
3022 {
3023 *ascii++ = 45, --size; /* '-': PLUS 1 TOTAL 3+precision */
3024 uexp_b10 = -exp_b10;
3025 }
3026
3027 else
3028 uexp_b10 = exp_b10;
3029
3030 cdigits = 0;
3031
3032 while (uexp_b10 > 0)
3033 {
3034 exponent[cdigits++] = (char)(48 + uexp_b10 % 10);
3035 uexp_b10 /= 10;
3036 }
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003037 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003038
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003039 /* Need another size check here for the exponent digits, so
3040 * this need not be considered above.
3041 */
3042 if ((int)size > cdigits)
3043 {
3044 while (cdigits > 0) *ascii++ = exponent[--cdigits];
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003045
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003046 *ascii = 0;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003047
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003048 return;
3049 }
3050 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003051 }
3052 else if (!(fp >= DBL_MIN))
3053 {
3054 *ascii++ = 48; /* '0' */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003055 *ascii = 0;
3056 return;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003057 }
3058 else
3059 {
3060 *ascii++ = 105; /* 'i' */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003061 *ascii++ = 110; /* 'n' */
3062 *ascii++ = 102; /* 'f' */
3063 *ascii = 0;
3064 return;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003065 }
3066 }
3067
3068 /* Here on buffer too small. */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003069 png_error(png_ptr, "ASCII conversion buffer too small");
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003070}
3071
3072# endif /* FLOATING_POINT */
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003073
3074# ifdef PNG_FIXED_POINT_SUPPORTED
3075/* Function to format a fixed point value in ASCII.
3076 */
3077void /* PRIVATE */
John Bowler4f67e402011-12-28 08:43:37 -06003078png_ascii_from_fixed(png_const_structrp png_ptr, png_charp ascii,
3079 png_size_t size, png_fixed_point fp)
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003080{
3081 /* Require space for 10 decimal digits, a decimal point, a minus sign and a
3082 * trailing \0, 13 characters:
3083 */
3084 if (size > 12)
3085 {
3086 png_uint_32 num;
3087
3088 /* Avoid overflow here on the minimum integer. */
3089 if (fp < 0)
3090 *ascii++ = 45, --size, num = -fp;
3091 else
3092 num = fp;
3093
John Bowler75156122011-09-09 17:21:44 -05003094 if (num <= 0x80000000) /* else overflowed */
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003095 {
Glenn Randers-Pehrsonb75b2412011-04-16 19:35:05 -05003096 unsigned int ndigits = 0, first = 16 /* flag value */;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003097 char digits[10];
3098
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003099 while (num)
3100 {
3101 /* Split the low digit off num: */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003102 unsigned int tmp = num/10;
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003103 num -= tmp*10;
3104 digits[ndigits++] = (char)(48 + num);
3105 /* Record the first non-zero digit, note that this is a number
3106 * starting at 1, it's not actually the array index.
3107 */
3108 if (first == 16 && num > 0)
3109 first = ndigits;
3110 num = tmp;
3111 }
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003112
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003113 if (ndigits > 0)
3114 {
3115 while (ndigits > 5) *ascii++ = digits[--ndigits];
3116 /* The remaining digits are fractional digits, ndigits is '5' or
3117 * smaller at this point. It is certainly not zero. Check for a
3118 * non-zero fractional digit:
3119 */
3120 if (first <= 5)
3121 {
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003122 unsigned int i;
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003123 *ascii++ = 46; /* decimal point */
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -05003124 /* ndigits may be <5 for small numbers, output leading zeros
3125 * then ndigits digits to first:
3126 */
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003127 i = 5;
3128 while (ndigits < i) *ascii++ = 48, --i;
3129 while (ndigits >= first) *ascii++ = digits[--ndigits];
3130 /* Don't output the trailing zeros! */
3131 }
3132 }
3133 else
3134 *ascii++ = 48;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003135
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003136 /* And null terminate the string: */
3137 *ascii = 0;
3138 return;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003139 }
3140 }
3141
3142 /* Here on buffer too small. */
3143 png_error(png_ptr, "ASCII conversion buffer too small");
3144}
3145# endif /* FIXED_POINT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003146#endif /* READ_SCAL */
3147
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -05003148#if defined(PNG_FLOATING_POINT_SUPPORTED) && \
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003149 !defined(PNG_FIXED_POINT_MACRO_SUPPORTED) && \
3150 (defined(PNG_gAMA_SUPPORTED) || defined(PNG_cHRM_SUPPORTED) || \
3151 defined(PNG_sCAL_SUPPORTED) || defined(PNG_READ_BACKGROUND_SUPPORTED) || \
3152 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)) || \
3153 (defined(PNG_sCAL_SUPPORTED) && \
3154 defined(PNG_FLOATING_ARITHMETIC_SUPPORTED))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003155png_fixed_point
John Bowler5d567862011-12-24 09:12:00 -06003156png_fixed(png_const_structrp png_ptr, double fp, png_const_charp text)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003157{
3158 double r = floor(100000 * fp + .5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003159
Glenn Randers-Pehrson77c3bf12011-01-20 15:56:31 -06003160 if (r > 2147483647. || r < -2147483648.)
3161 png_fixed_error(png_ptr, text);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003162
Glenn Randers-Pehrsonc9120502013-11-22 14:58:04 -06003163# ifndef PNG_ERROR_TEXT_SUPPORTED
3164 PNG_UNUSED(text)
3165# endif
3166
Glenn Randers-Pehrson77c3bf12011-01-20 15:56:31 -06003167 return (png_fixed_point)r;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003168}
3169#endif
3170
Glenn Randers-Pehrsonc9120502013-11-22 14:58:04 -06003171#if defined(PNG_GAMMA_SUPPORTED) || defined(PNG_COLORSPACE_SUPPORTED) ||\
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003172 defined(PNG_INCH_CONVERSIONS_SUPPORTED) || defined(PNG_READ_pHYs_SUPPORTED)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003173/* muldiv functions */
3174/* This API takes signed arguments and rounds the result to the nearest
3175 * integer (or, for a fixed point number - the standard argument - to
3176 * the nearest .00001). Overflow and divide by zero are signalled in
3177 * the result, a boolean - true on success, false on overflow.
3178 */
3179int
3180png_muldiv(png_fixed_point_p res, png_fixed_point a, png_int_32 times,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003181 png_int_32 divisor)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003182{
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003183 /* Return a * times / divisor, rounded. */
3184 if (divisor != 0)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003185 {
3186 if (a == 0 || times == 0)
3187 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003188 *res = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003189 return 1;
3190 }
3191 else
3192 {
3193#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003194 double r = a;
3195 r *= times;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003196 r /= divisor;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003197 r = floor(r+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003198
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003199 /* A png_fixed_point is a 32-bit integer. */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003200 if (r <= 2147483647. && r >= -2147483648.)
3201 {
3202 *res = (png_fixed_point)r;
3203 return 1;
3204 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003205#else
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003206 int negative = 0;
3207 png_uint_32 A, T, D;
Glenn Randers-Pehrson3b5d6952010-08-19 08:06:12 -05003208 png_uint_32 s16, s32, s00;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003209
3210 if (a < 0)
3211 negative = 1, A = -a;
3212 else
3213 A = a;
3214
3215 if (times < 0)
3216 negative = !negative, T = -times;
3217 else
3218 T = times;
3219
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003220 if (divisor < 0)
3221 negative = !negative, D = -divisor;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003222 else
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003223 D = divisor;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003224
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003225 /* Following can't overflow because the arguments only
3226 * have 31 bits each, however the result may be 32 bits.
3227 */
Glenn Randers-Pehrson3b5d6952010-08-19 08:06:12 -05003228 s16 = (A >> 16) * (T & 0xffff) +
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05003229 (A & 0xffff) * (T >> 16);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003230 /* Can't overflow because the a*times bit is only 30
3231 * bits at most.
3232 */
Glenn Randers-Pehrson3b5d6952010-08-19 08:06:12 -05003233 s32 = (A >> 16) * (T >> 16) + (s16 >> 16);
3234 s00 = (A & 0xffff) * (T & 0xffff);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003235
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003236 s16 = (s16 & 0xffff) << 16;
3237 s00 += s16;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003238
3239 if (s00 < s16)
3240 ++s32; /* carry */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003241
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003242 if (s32 < D) /* else overflow */
3243 {
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003244 /* s32.s00 is now the 64-bit product, do a standard
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003245 * division, we know that s32 < D, so the maximum
3246 * required shift is 31.
3247 */
3248 int bitshift = 32;
3249 png_fixed_point result = 0; /* NOTE: signed */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003250
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003251 while (--bitshift >= 0)
3252 {
3253 png_uint_32 d32, d00;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003254
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003255 if (bitshift > 0)
3256 d32 = D >> (32-bitshift), d00 = D << bitshift;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003257
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003258 else
3259 d32 = 0, d00 = D;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003260
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003261 if (s32 > d32)
3262 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05003263 if (s00 < d00) --s32; /* carry */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003264 s32 -= d32, s00 -= d00, result += 1<<bitshift;
3265 }
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003266
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003267 else
3268 if (s32 == d32 && s00 >= d00)
3269 s32 = 0, s00 -= d00, result += 1<<bitshift;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003270 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003271
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003272 /* Handle the rounding. */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003273 if (s00 >= (D >> 1))
3274 ++result;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003275
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06003276 if (negative != 0)
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003277 result = -result;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003278
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003279 /* Check for overflow. */
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003280 if ((negative && result <= 0) || (!negative && result >= 0))
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003281 {
3282 *res = result;
3283 return 1;
3284 }
3285 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003286#endif
3287 }
3288 }
3289
3290 return 0;
3291}
3292#endif /* READ_GAMMA || INCH_CONVERSIONS */
3293
3294#if defined(PNG_READ_GAMMA_SUPPORTED) || defined(PNG_INCH_CONVERSIONS_SUPPORTED)
3295/* The following is for when the caller doesn't much care about the
3296 * result.
3297 */
3298png_fixed_point
John Bowler5d567862011-12-24 09:12:00 -06003299png_muldiv_warn(png_const_structrp png_ptr, png_fixed_point a, png_int_32 times,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003300 png_int_32 divisor)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003301{
3302 png_fixed_point result;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003303
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003304 if (png_muldiv(&result, a, times, divisor))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003305 return result;
3306
3307 png_warning(png_ptr, "fixed point overflow ignored");
3308 return 0;
3309}
3310#endif
3311
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003312#ifdef PNG_GAMMA_SUPPORTED /* more fixed point functions for gamma */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003313/* Calculate a reciprocal, return 0 on div-by-zero or overflow. */
3314png_fixed_point
3315png_reciprocal(png_fixed_point a)
3316{
3317#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3318 double r = floor(1E10/a+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003319
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003320 if (r <= 2147483647. && r >= -2147483648.)
3321 return (png_fixed_point)r;
3322#else
3323 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003324
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003325 if (png_muldiv(&res, 100000, 100000, a))
3326 return res;
3327#endif
3328
3329 return 0; /* error/overflow */
3330}
3331
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003332/* This is the shared test on whether a gamma value is 'significant' - whether
3333 * it is worth doing gamma correction.
3334 */
3335int /* PRIVATE */
3336png_gamma_significant(png_fixed_point gamma_val)
3337{
3338 return gamma_val < PNG_FP_1 - PNG_GAMMA_THRESHOLD_FIXED ||
3339 gamma_val > PNG_FP_1 + PNG_GAMMA_THRESHOLD_FIXED;
3340}
3341#endif
3342
3343#ifdef PNG_READ_GAMMA_SUPPORTED
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003344# ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003345/* A local convenience routine. */
3346static png_fixed_point
3347png_product2(png_fixed_point a, png_fixed_point b)
3348{
Glenn Randers-Pehrson9c690912010-08-27 11:39:38 -05003349 /* The required result is 1/a * 1/b; the following preserves accuracy. */
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003350# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003351 double r = a * 1E-5;
3352 r *= b;
3353 r = floor(r+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003354
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003355 if (r <= 2147483647. && r >= -2147483648.)
3356 return (png_fixed_point)r;
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003357# else
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003358 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003359
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003360 if (png_muldiv(&res, a, b, 100000))
3361 return res;
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003362# endif
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003363
3364 return 0; /* overflow */
3365}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003366# endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003367
3368/* The inverse of the above. */
3369png_fixed_point
3370png_reciprocal2(png_fixed_point a, png_fixed_point b)
3371{
Glenn Randers-Pehrson9c690912010-08-27 11:39:38 -05003372 /* The required result is 1/a * 1/b; the following preserves accuracy. */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003373#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3374 double r = 1E15/a;
3375 r /= b;
3376 r = floor(r+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003377
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003378 if (r <= 2147483647. && r >= -2147483648.)
3379 return (png_fixed_point)r;
3380#else
3381 /* This may overflow because the range of png_fixed_point isn't symmetric,
3382 * but this API is only used for the product of file and screen gamma so it
3383 * doesn't matter that the smallest number it can produce is 1/21474, not
3384 * 1/100000
3385 */
3386 png_fixed_point res = png_product2(a, b);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003387
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003388 if (res != 0)
3389 return png_reciprocal(res);
3390#endif
3391
3392 return 0; /* overflow */
3393}
3394#endif /* READ_GAMMA */
3395
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003396#ifdef PNG_READ_GAMMA_SUPPORTED /* gamma table code */
3397#ifndef PNG_FLOATING_ARITHMETIC_SUPPORTED
3398/* Fixed point gamma.
3399 *
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003400 * The code to calculate the tables used below can be found in the shell script
3401 * contrib/tools/intgamma.sh
3402 *
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003403 * To calculate gamma this code implements fast log() and exp() calls using only
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003404 * fixed point arithmetic. This code has sufficient precision for either 8-bit
3405 * or 16-bit sample values.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003406 *
3407 * The tables used here were calculated using simple 'bc' programs, but C double
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003408 * precision floating point arithmetic would work fine.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003409 *
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003410 * 8-bit log table
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003411 * This is a table of -log(value/255)/log(2) for 'value' in the range 128 to
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003412 * 255, so it's the base 2 logarithm of a normalized 8-bit floating point
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003413 * mantissa. The numbers are 32-bit fractions.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003414 */
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003415static const png_uint_32
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003416png_8bit_l2[128] =
3417{
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003418 4270715492U, 4222494797U, 4174646467U, 4127164793U, 4080044201U, 4033279239U,
3419 3986864580U, 3940795015U, 3895065449U, 3849670902U, 3804606499U, 3759867474U,
3420 3715449162U, 3671346997U, 3627556511U, 3584073329U, 3540893168U, 3498011834U,
3421 3455425220U, 3413129301U, 3371120137U, 3329393864U, 3287946700U, 3246774933U,
3422 3205874930U, 3165243125U, 3124876025U, 3084770202U, 3044922296U, 3005329011U,
3423 2965987113U, 2926893432U, 2888044853U, 2849438323U, 2811070844U, 2772939474U,
3424 2735041326U, 2697373562U, 2659933400U, 2622718104U, 2585724991U, 2548951424U,
3425 2512394810U, 2476052606U, 2439922311U, 2404001468U, 2368287663U, 2332778523U,
3426 2297471715U, 2262364947U, 2227455964U, 2192742551U, 2158222529U, 2123893754U,
3427 2089754119U, 2055801552U, 2022034013U, 1988449497U, 1955046031U, 1921821672U,
3428 1888774511U, 1855902668U, 1823204291U, 1790677560U, 1758320682U, 1726131893U,
3429 1694109454U, 1662251657U, 1630556815U, 1599023271U, 1567649391U, 1536433567U,
3430 1505374214U, 1474469770U, 1443718700U, 1413119487U, 1382670639U, 1352370686U,
3431 1322218179U, 1292211689U, 1262349810U, 1232631153U, 1203054352U, 1173618059U,
3432 1144320946U, 1115161701U, 1086139034U, 1057251672U, 1028498358U, 999877854U,
3433 971388940U, 943030410U, 914801076U, 886699767U, 858725327U, 830876614U,
3434 803152505U, 775551890U, 748073672U, 720716771U, 693480120U, 666362667U,
3435 639363374U, 612481215U, 585715177U, 559064263U, 532527486U, 506103872U,
3436 479792461U, 453592303U, 427502463U, 401522014U, 375650043U, 349885648U,
3437 324227938U, 298676034U, 273229066U, 247886176U, 222646516U, 197509248U,
3438 172473545U, 147538590U, 122703574U, 97967701U, 73330182U, 48790236U,
3439 24347096U, 0U
Glenn Randers-Pehrson8888ea42011-11-28 11:29:10 -06003440
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003441#if 0
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003442 /* The following are the values for 16-bit tables - these work fine for the
3443 * 8-bit conversions but produce very slightly larger errors in the 16-bit
3444 * log (about 1.2 as opposed to 0.7 absolute error in the final value). To
3445 * use these all the shifts below must be adjusted appropriately.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003446 */
3447 65166, 64430, 63700, 62976, 62257, 61543, 60835, 60132, 59434, 58741, 58054,
3448 57371, 56693, 56020, 55352, 54689, 54030, 53375, 52726, 52080, 51439, 50803,
3449 50170, 49542, 48918, 48298, 47682, 47070, 46462, 45858, 45257, 44661, 44068,
3450 43479, 42894, 42312, 41733, 41159, 40587, 40020, 39455, 38894, 38336, 37782,
3451 37230, 36682, 36137, 35595, 35057, 34521, 33988, 33459, 32932, 32408, 31887,
3452 31369, 30854, 30341, 29832, 29325, 28820, 28319, 27820, 27324, 26830, 26339,
3453 25850, 25364, 24880, 24399, 23920, 23444, 22970, 22499, 22029, 21562, 21098,
3454 20636, 20175, 19718, 19262, 18808, 18357, 17908, 17461, 17016, 16573, 16132,
3455 15694, 15257, 14822, 14390, 13959, 13530, 13103, 12678, 12255, 11834, 11415,
3456 10997, 10582, 10168, 9756, 9346, 8937, 8531, 8126, 7723, 7321, 6921, 6523,
3457 6127, 5732, 5339, 4947, 4557, 4169, 3782, 3397, 3014, 2632, 2251, 1872, 1495,
3458 1119, 744, 372
3459#endif
3460};
3461
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003462static png_int_32
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003463png_log8bit(unsigned int x)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003464{
John Bowler168a4332011-01-16 19:32:22 -06003465 unsigned int lg2 = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003466 /* Each time 'x' is multiplied by 2, 1 must be subtracted off the final log,
3467 * because the log is actually negate that means adding 1. The final
3468 * returned value thus has the range 0 (for 255 input) to 7.994 (for 1
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003469 * input), return -1 for the overflow (log 0) case, - so the result is
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003470 * always at most 19 bits.
3471 */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003472 if ((x &= 0xff) == 0)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003473 return -1;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003474
3475 if ((x & 0xf0) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003476 lg2 = 4, x <<= 4;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003477
3478 if ((x & 0xc0) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003479 lg2 += 2, x <<= 2;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003480
3481 if ((x & 0x80) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003482 lg2 += 1, x <<= 1;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003483
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003484 /* result is at most 19 bits, so this cast is safe: */
John Bowler168a4332011-01-16 19:32:22 -06003485 return (png_int_32)((lg2 << 16) + ((png_8bit_l2[x-128]+32768)>>16));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003486}
3487
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003488/* The above gives exact (to 16 binary places) log2 values for 8-bit images,
3489 * for 16-bit images we use the most significant 8 bits of the 16-bit value to
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003490 * get an approximation then multiply the approximation by a correction factor
3491 * determined by the remaining up to 8 bits. This requires an additional step
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003492 * in the 16-bit case.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003493 *
3494 * We want log2(value/65535), we have log2(v'/255), where:
3495 *
3496 * value = v' * 256 + v''
3497 * = v' * f
3498 *
3499 * So f is value/v', which is equal to (256+v''/v') since v' is in the range 128
3500 * to 255 and v'' is in the range 0 to 255 f will be in the range 256 to less
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003501 * than 258. The final factor also needs to correct for the fact that our 8-bit
3502 * value is scaled by 255, whereas the 16-bit values must be scaled by 65535.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003503 *
3504 * This gives a final formula using a calculated value 'x' which is value/v' and
3505 * scaling by 65536 to match the above table:
3506 *
3507 * log2(x/257) * 65536
3508 *
3509 * Since these numbers are so close to '1' we can use simple linear
3510 * interpolation between the two end values 256/257 (result -368.61) and 258/257
3511 * (result 367.179). The values used below are scaled by a further 64 to give
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003512 * 16-bit precision in the interpolation:
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003513 *
3514 * Start (256): -23591
3515 * Zero (257): 0
3516 * End (258): 23499
3517 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003518static png_int_32
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003519png_log16bit(png_uint_32 x)
3520{
John Bowler168a4332011-01-16 19:32:22 -06003521 unsigned int lg2 = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003522
3523 /* As above, but now the input has 16 bits. */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003524 if ((x &= 0xffff) == 0)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003525 return -1;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003526
3527 if ((x & 0xff00) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003528 lg2 = 8, x <<= 8;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003529
3530 if ((x & 0xf000) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003531 lg2 += 4, x <<= 4;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003532
3533 if ((x & 0xc000) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003534 lg2 += 2, x <<= 2;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003535
3536 if ((x & 0x8000) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003537 lg2 += 1, x <<= 1;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003538
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003539 /* Calculate the base logarithm from the top 8 bits as a 28-bit fractional
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003540 * value.
3541 */
John Bowler168a4332011-01-16 19:32:22 -06003542 lg2 <<= 28;
3543 lg2 += (png_8bit_l2[(x>>8)-128]+8) >> 4;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003544
3545 /* Now we need to interpolate the factor, this requires a division by the top
3546 * 8 bits. Do this with maximum precision.
3547 */
3548 x = ((x << 16) + (x >> 9)) / (x >> 8);
3549
3550 /* Since we divided by the top 8 bits of 'x' there will be a '1' at 1<<24,
3551 * the value at 1<<16 (ignoring this) will be 0 or 1; this gives us exactly
3552 * 16 bits to interpolate to get the low bits of the result. Round the
3553 * answer. Note that the end point values are scaled by 64 to retain overall
John Bowler168a4332011-01-16 19:32:22 -06003554 * precision and that 'lg2' is current scaled by an extra 12 bits, so adjust
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003555 * the overall scaling by 6-12. Round at every step.
3556 */
3557 x -= 1U << 24;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003558
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003559 if (x <= 65536U) /* <= '257' */
John Bowler168a4332011-01-16 19:32:22 -06003560 lg2 += ((23591U * (65536U-x)) + (1U << (16+6-12-1))) >> (16+6-12);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003561
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003562 else
John Bowler168a4332011-01-16 19:32:22 -06003563 lg2 -= ((23499U * (x-65536U)) + (1U << (16+6-12-1))) >> (16+6-12);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003564
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003565 /* Safe, because the result can't have more than 20 bits: */
John Bowler168a4332011-01-16 19:32:22 -06003566 return (png_int_32)((lg2 + 2048) >> 12);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003567}
3568
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003569/* The 'exp()' case must invert the above, taking a 20-bit fixed point
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003570 * logarithmic value and returning a 16 or 8-bit number as appropriate. In
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003571 * each case only the low 16 bits are relevant - the fraction - since the
3572 * integer bits (the top 4) simply determine a shift.
3573 *
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003574 * The worst case is the 16-bit distinction between 65535 and 65534, this
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003575 * requires perhaps spurious accuracty in the decoding of the logarithm to
3576 * distinguish log2(65535/65534.5) - 10^-5 or 17 bits. There is little chance
3577 * of getting this accuracy in practice.
3578 *
3579 * To deal with this the following exp() function works out the exponent of the
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003580 * frational part of the logarithm by using an accurate 32-bit value from the
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003581 * top four fractional bits then multiplying in the remaining bits.
3582 */
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003583static const png_uint_32
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003584png_32bit_exp[16] =
3585{
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003586 /* NOTE: the first entry is deliberately set to the maximum 32-bit value. */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003587 4294967295U, 4112874773U, 3938502376U, 3771522796U, 3611622603U, 3458501653U,
3588 3311872529U, 3171459999U, 3037000500U, 2908241642U, 2784941738U, 2666869345U,
3589 2553802834U, 2445529972U, 2341847524U, 2242560872U
3590};
3591
3592/* Adjustment table; provided to explain the numbers in the code below. */
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003593#if 0
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003594for (i=11;i>=0;--i){ print i, " ", (1 - e(-(2^i)/65536*l(2))) * 2^(32-i), "\n"}
3595 11 44937.64284865548751208448
3596 10 45180.98734845585101160448
3597 9 45303.31936980687359311872
3598 8 45364.65110595323018870784
3599 7 45395.35850361789624614912
3600 6 45410.72259715102037508096
3601 5 45418.40724413220722311168
3602 4 45422.25021786898173001728
3603 3 45424.17186732298419044352
3604 2 45425.13273269940811464704
3605 1 45425.61317555035558641664
3606 0 45425.85339951654943850496
3607#endif
3608
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003609static png_uint_32
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003610png_exp(png_fixed_point x)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003611{
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003612 if (x > 0 && x <= 0xfffff) /* Else overflow or zero (underflow) */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003613 {
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003614 /* Obtain a 4-bit approximation */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003615 png_uint_32 e = png_32bit_exp[(x >> 12) & 0xf];
3616
3617 /* Incorporate the low 12 bits - these decrease the returned value by
3618 * multiplying by a number less than 1 if the bit is set. The multiplier
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003619 * is determined by the above table and the shift. Notice that the values
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003620 * converge on 45426 and this is used to allow linear interpolation of the
3621 * low bits.
3622 */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003623 if (x & 0x800)
3624 e -= (((e >> 16) * 44938U) + 16U) >> 5;
3625
3626 if (x & 0x400)
3627 e -= (((e >> 16) * 45181U) + 32U) >> 6;
3628
3629 if (x & 0x200)
3630 e -= (((e >> 16) * 45303U) + 64U) >> 7;
3631
3632 if (x & 0x100)
3633 e -= (((e >> 16) * 45365U) + 128U) >> 8;
3634
3635 if (x & 0x080)
3636 e -= (((e >> 16) * 45395U) + 256U) >> 9;
3637
3638 if (x & 0x040)
3639 e -= (((e >> 16) * 45410U) + 512U) >> 10;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003640
3641 /* And handle the low 6 bits in a single block. */
3642 e -= (((e >> 16) * 355U * (x & 0x3fU)) + 256U) >> 9;
3643
3644 /* Handle the upper bits of x. */
3645 e >>= x >> 16;
3646 return e;
3647 }
3648
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003649 /* Check for overflow */
3650 if (x <= 0)
3651 return png_32bit_exp[0];
3652
3653 /* Else underflow */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003654 return 0;
3655}
3656
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003657static png_byte
John Bowler168a4332011-01-16 19:32:22 -06003658png_exp8bit(png_fixed_point lg2)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003659{
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003660 /* Get a 32-bit value: */
John Bowler168a4332011-01-16 19:32:22 -06003661 png_uint_32 x = png_exp(lg2);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003662
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003663 /* Convert the 32-bit value to 0..255 by multiplying by 256-1, note that the
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003664 * second, rounding, step can't overflow because of the first, subtraction,
3665 * step.
3666 */
3667 x -= x >> 8;
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003668 return (png_byte)((x + 0x7fffffU) >> 24);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003669}
3670
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003671#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003672static png_uint_16
John Bowler168a4332011-01-16 19:32:22 -06003673png_exp16bit(png_fixed_point lg2)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003674{
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003675 /* Get a 32-bit value: */
John Bowler168a4332011-01-16 19:32:22 -06003676 png_uint_32 x = png_exp(lg2);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003677
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003678 /* Convert the 32-bit value to 0..65535 by multiplying by 65536-1: */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003679 x -= x >> 16;
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003680 return (png_uint_16)((x + 32767U) >> 16);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003681}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003682#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003683#endif /* FLOATING_ARITHMETIC */
3684
3685png_byte
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003686png_gamma_8bit_correct(unsigned int value, png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003687{
3688 if (value > 0 && value < 255)
3689 {
3690# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003691 double r = floor(255*pow(value/255.,gamma_val*.00001)+.5);
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003692 return (png_byte)r;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003693# else
John Bowler168a4332011-01-16 19:32:22 -06003694 png_int_32 lg2 = png_log8bit(value);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003695 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003696
John Bowler168a4332011-01-16 19:32:22 -06003697 if (png_muldiv(&res, gamma_val, lg2, PNG_FP_1))
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003698 return png_exp8bit(res);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003699
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003700 /* Overflow. */
3701 value = 0;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003702# endif
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003703 }
3704
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003705 return (png_byte)value;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003706}
3707
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003708#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003709png_uint_16
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003710png_gamma_16bit_correct(unsigned int value, png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003711{
3712 if (value > 0 && value < 65535)
3713 {
3714# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003715 double r = floor(65535*pow(value/65535.,gamma_val*.00001)+.5);
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003716 return (png_uint_16)r;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003717# else
John Bowler168a4332011-01-16 19:32:22 -06003718 png_int_32 lg2 = png_log16bit(value);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003719 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003720
John Bowler168a4332011-01-16 19:32:22 -06003721 if (png_muldiv(&res, gamma_val, lg2, PNG_FP_1))
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003722 return png_exp16bit(res);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003723
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003724 /* Overflow. */
3725 value = 0;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003726# endif
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003727 }
3728
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003729 return (png_uint_16)value;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003730}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003731#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003732
3733/* This does the right thing based on the bit_depth field of the
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003734 * png_struct, interpreting values as 8-bit or 16-bit. While the result
3735 * is nominally a 16-bit value if bit depth is 8 then the result is
3736 * 8-bit (as are the arguments.)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003737 */
3738png_uint_16 /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06003739png_gamma_correct(png_structrp png_ptr, unsigned int value,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003740 png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003741{
3742 if (png_ptr->bit_depth == 8)
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003743 return png_gamma_8bit_correct(value, gamma_val);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003744
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003745#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003746 else
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003747 return png_gamma_16bit_correct(value, gamma_val);
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003748#else
3749 /* should not reach this */
3750 return 0;
3751#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003752}
3753
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003754#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003755/* Internal function to build a single 16-bit table - the table consists of
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003756 * 'num' 256 entry subtables, where 'num' is determined by 'shift' - the amount
3757 * to shift the input values right (or 16-number_of_signifiant_bits).
3758 *
Glenn Randers-Pehrsona774c5d2010-08-26 19:37:55 -05003759 * The caller is responsible for ensuring that the table gets cleaned up on
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003760 * png_error (i.e. if one of the mallocs below fails) - i.e. the *table argument
3761 * should be somewhere that will be cleaned.
3762 */
3763static void
John Bowler5d567862011-12-24 09:12:00 -06003764png_build_16bit_table(png_structrp png_ptr, png_uint_16pp *ptable,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003765 PNG_CONST unsigned int shift, PNG_CONST png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003766{
3767 /* Various values derived from 'shift': */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003768 PNG_CONST unsigned int num = 1U << (8U - shift);
3769 PNG_CONST unsigned int max = (1U << (16U - shift))-1U;
3770 PNG_CONST unsigned int max_by_2 = 1U << (15U-shift);
3771 unsigned int i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003772
3773 png_uint_16pp table = *ptable =
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003774 (png_uint_16pp)png_calloc(png_ptr, num * (sizeof (png_uint_16p)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003775
3776 for (i = 0; i < num; i++)
3777 {
3778 png_uint_16p sub_table = table[i] =
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003779 (png_uint_16p)png_malloc(png_ptr, 256 * (sizeof (png_uint_16)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003780
3781 /* The 'threshold' test is repeated here because it can arise for one of
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003782 * the 16-bit tables even if the others don't hit it.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003783 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003784 if (png_gamma_significant(gamma_val))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003785 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003786 /* The old code would overflow at the end and this would cause the
3787 * 'pow' function to return a result >1, resulting in an
3788 * arithmetic error. This code follows the spec exactly; ig is
3789 * the recovered input sample, it always has 8-16 bits.
3790 *
3791 * We want input * 65535/max, rounded, the arithmetic fits in 32
3792 * bits (unsigned) so long as max <= 32767.
3793 */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003794 unsigned int j;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003795 for (j = 0; j < 256; j++)
3796 {
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003797 png_uint_32 ig = (j << (8-shift)) + i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003798# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003799 /* Inline the 'max' scaling operation: */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003800 double d = floor(65535*pow(ig/(double)max, gamma_val*.00001)+.5);
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003801 sub_table[j] = (png_uint_16)d;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003802# else
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06003803 if (shift != 0)
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05003804 ig = (ig * 65535U + max_by_2)/max;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003805
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003806 sub_table[j] = png_gamma_16bit_correct(ig, gamma_val);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003807# endif
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003808 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003809 }
3810 else
3811 {
3812 /* We must still build a table, but do it the fast way. */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003813 unsigned int j;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003814
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003815 for (j = 0; j < 256; j++)
3816 {
3817 png_uint_32 ig = (j << (8-shift)) + i;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003818
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06003819 if (shift != 0)
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003820 ig = (ig * 65535U + max_by_2)/max;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003821
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003822 sub_table[j] = (png_uint_16)ig;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003823 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003824 }
3825 }
3826}
3827
3828/* NOTE: this function expects the *inverse* of the overall gamma transformation
3829 * required.
3830 */
3831static void
John Bowler5d567862011-12-24 09:12:00 -06003832png_build_16to8_table(png_structrp png_ptr, png_uint_16pp *ptable,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003833 PNG_CONST unsigned int shift, PNG_CONST png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003834{
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003835 PNG_CONST unsigned int num = 1U << (8U - shift);
3836 PNG_CONST unsigned int max = (1U << (16U - shift))-1U;
3837 unsigned int i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003838 png_uint_32 last;
3839
3840 png_uint_16pp table = *ptable =
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003841 (png_uint_16pp)png_calloc(png_ptr, num * (sizeof (png_uint_16p)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003842
3843 /* 'num' is the number of tables and also the number of low bits of low
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003844 * bits of the input 16-bit value used to select a table. Each table is
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003845 * itself index by the high 8 bits of the value.
3846 */
3847 for (i = 0; i < num; i++)
3848 table[i] = (png_uint_16p)png_malloc(png_ptr,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003849 256 * (sizeof (png_uint_16)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003850
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003851 /* 'gamma_val' is set to the reciprocal of the value calculated above, so
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003852 * pow(out,g) is an *input* value. 'last' is the last input value set.
3853 *
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003854 * In the loop 'i' is used to find output values. Since the output is
3855 * 8-bit there are only 256 possible values. The tables are set up to
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003856 * select the closest possible output value for each input by finding
3857 * the input value at the boundary between each pair of output values
3858 * and filling the table up to that boundary with the lower output
3859 * value.
3860 *
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003861 * The boundary values are 0.5,1.5..253.5,254.5. Since these are 9-bit
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003862 * values the code below uses a 16-bit value in i; the values start at
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003863 * 128.5 (for 0.5) and step by 257, for a total of 254 values (the last
3864 * entries are filled with 255). Start i at 128 and fill all 'last'
3865 * table entries <= 'max'
3866 */
3867 last = 0;
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003868 for (i = 0; i < 255; ++i) /* 8-bit output value */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003869 {
3870 /* Find the corresponding maximum input value */
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003871 png_uint_16 out = (png_uint_16)(i * 257U); /* 16-bit output value */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003872
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003873 /* Find the boundary value in 16 bits: */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003874 png_uint_32 bound = png_gamma_16bit_correct(out+128U, gamma_val);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003875
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003876 /* Adjust (round) to (16-shift) bits: */
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003877 bound = (bound * max + 32768U)/65535U + 1U;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003878
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003879 while (last < bound)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003880 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003881 table[last & (0xffU >> shift)][last >> (8U - shift)] = out;
3882 last++;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003883 }
3884 }
3885
3886 /* And fill in the final entries. */
3887 while (last < (num << 8))
3888 {
3889 table[last & (0xff >> shift)][last >> (8U - shift)] = 65535U;
3890 last++;
3891 }
3892}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003893#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003894
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003895/* Build a single 8-bit table: same as the 16-bit case but much simpler (and
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003896 * typically much faster). Note that libpng currently does no sBIT processing
3897 * (apparently contrary to the spec) so a 256 entry table is always generated.
3898 */
3899static void
John Bowler5d567862011-12-24 09:12:00 -06003900png_build_8bit_table(png_structrp png_ptr, png_bytepp ptable,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003901 PNG_CONST png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003902{
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003903 unsigned int i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003904 png_bytep table = *ptable = (png_bytep)png_malloc(png_ptr, 256);
3905
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003906 if (png_gamma_significant(gamma_val)) for (i=0; i<256; i++)
3907 table[i] = png_gamma_8bit_correct(i, gamma_val);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003908
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003909 else for (i=0; i<256; ++i)
3910 table[i] = (png_byte)i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003911}
3912
John Bowler07772cb2011-10-14 18:19:47 -05003913/* Used from png_read_destroy and below to release the memory used by the gamma
3914 * tables.
3915 */
3916void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06003917png_destroy_gamma_table(png_structrp png_ptr)
John Bowler07772cb2011-10-14 18:19:47 -05003918{
3919 png_free(png_ptr, png_ptr->gamma_table);
3920 png_ptr->gamma_table = NULL;
3921
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003922#ifdef PNG_16BIT_SUPPORTED
John Bowler07772cb2011-10-14 18:19:47 -05003923 if (png_ptr->gamma_16_table != NULL)
3924 {
3925 int i;
3926 int istop = (1 << (8 - png_ptr->gamma_shift));
3927 for (i = 0; i < istop; i++)
3928 {
3929 png_free(png_ptr, png_ptr->gamma_16_table[i]);
3930 }
3931 png_free(png_ptr, png_ptr->gamma_16_table);
3932 png_ptr->gamma_16_table = NULL;
3933 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003934#endif /* 16BIT */
John Bowler07772cb2011-10-14 18:19:47 -05003935
3936#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
3937 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
3938 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
3939 png_free(png_ptr, png_ptr->gamma_from_1);
3940 png_ptr->gamma_from_1 = NULL;
3941 png_free(png_ptr, png_ptr->gamma_to_1);
3942 png_ptr->gamma_to_1 = NULL;
3943
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003944#ifdef PNG_16BIT_SUPPORTED
John Bowler07772cb2011-10-14 18:19:47 -05003945 if (png_ptr->gamma_16_from_1 != NULL)
3946 {
3947 int i;
3948 int istop = (1 << (8 - png_ptr->gamma_shift));
3949 for (i = 0; i < istop; i++)
3950 {
3951 png_free(png_ptr, png_ptr->gamma_16_from_1[i]);
3952 }
3953 png_free(png_ptr, png_ptr->gamma_16_from_1);
3954 png_ptr->gamma_16_from_1 = NULL;
3955 }
3956 if (png_ptr->gamma_16_to_1 != NULL)
3957 {
3958 int i;
3959 int istop = (1 << (8 - png_ptr->gamma_shift));
3960 for (i = 0; i < istop; i++)
3961 {
3962 png_free(png_ptr, png_ptr->gamma_16_to_1[i]);
3963 }
3964 png_free(png_ptr, png_ptr->gamma_16_to_1);
3965 png_ptr->gamma_16_to_1 = NULL;
3966 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003967#endif /* 16BIT */
John Bowler07772cb2011-10-14 18:19:47 -05003968#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
3969}
3970
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003971/* We build the 8- or 16-bit gamma tables here. Note that for 16-bit
3972 * tables, we don't make a full table if we are reducing to 8-bit in
3973 * the future. Note also how the gamma_16 tables are segmented so that
3974 * we don't need to allocate > 64K chunks for a full 16-bit table.
3975 */
3976void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06003977png_build_gamma_table(png_structrp png_ptr, int bit_depth)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003978{
3979 png_debug(1, "in png_build_gamma_table");
3980
John Bowler07772cb2011-10-14 18:19:47 -05003981 /* Remove any existing table; this copes with multiple calls to
3982 * png_read_update_info. The warning is because building the gamma tables
3983 * multiple times is a performance hit - it's harmless but the ability to call
3984 * png_read_update_info() multiple times is new in 1.5.6 so it seems sensible
3985 * to warn if the app introduces such a hit.
3986 */
3987 if (png_ptr->gamma_table != NULL || png_ptr->gamma_16_table != NULL)
3988 {
3989 png_warning(png_ptr, "gamma table being rebuilt");
3990 png_destroy_gamma_table(png_ptr);
3991 }
3992
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003993 if (bit_depth <= 8)
3994 {
3995 png_build_8bit_table(png_ptr, &png_ptr->gamma_table,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003996 png_ptr->screen_gamma > 0 ? png_reciprocal2(png_ptr->colorspace.gamma,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003997 png_ptr->screen_gamma) : PNG_FP_1);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003998
3999#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
John Bowlerd273ad22011-05-07 21:00:28 -05004000 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004001 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
John Bowlerd273ad22011-05-07 21:00:28 -05004002 if (png_ptr->transformations & (PNG_COMPOSE | PNG_RGB_TO_GRAY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004003 {
4004 png_build_8bit_table(png_ptr, &png_ptr->gamma_to_1,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004005 png_reciprocal(png_ptr->colorspace.gamma));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004006
4007 png_build_8bit_table(png_ptr, &png_ptr->gamma_from_1,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004008 png_ptr->screen_gamma > 0 ? png_reciprocal(png_ptr->screen_gamma) :
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004009 png_ptr->colorspace.gamma/* Probably doing rgb_to_gray */);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004010 }
John Bowlerd273ad22011-05-07 21:00:28 -05004011#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004012 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06004013#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004014 else
4015 {
4016 png_byte shift, sig_bit;
4017
4018 if (png_ptr->color_type & PNG_COLOR_MASK_COLOR)
4019 {
4020 sig_bit = png_ptr->sig_bit.red;
4021
4022 if (png_ptr->sig_bit.green > sig_bit)
4023 sig_bit = png_ptr->sig_bit.green;
4024
4025 if (png_ptr->sig_bit.blue > sig_bit)
4026 sig_bit = png_ptr->sig_bit.blue;
4027 }
4028 else
4029 sig_bit = png_ptr->sig_bit.gray;
4030
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05004031 /* 16-bit gamma code uses this equation:
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004032 *
4033 * ov = table[(iv & 0xff) >> gamma_shift][iv >> 8]
4034 *
4035 * Where 'iv' is the input color value and 'ov' is the output value -
4036 * pow(iv, gamma).
4037 *
4038 * Thus the gamma table consists of up to 256 256 entry tables. The table
4039 * is selected by the (8-gamma_shift) most significant of the low 8 bits of
4040 * the color value then indexed by the upper 8 bits:
4041 *
4042 * table[low bits][high 8 bits]
4043 *
4044 * So the table 'n' corresponds to all those 'iv' of:
4045 *
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05004046 * <all high 8-bit values><n << gamma_shift>..<(n+1 << gamma_shift)-1>
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004047 *
4048 */
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05004049 if (sig_bit > 0 && sig_bit < 16U)
4050 shift = (png_byte)(16U - sig_bit); /* shift == insignificant bits */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004051
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004052 else
4053 shift = 0; /* keep all 16 bits */
4054
Glenn Randers-Pehrsonab63dd02011-06-17 20:04:17 -05004055 if (png_ptr->transformations & (PNG_16_TO_8 | PNG_SCALE_16_TO_8))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004056 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004057 /* PNG_MAX_GAMMA_8 is the number of bits to keep - effectively
4058 * the significant bits in the *input* when the output will
4059 * eventually be 8 bits. By default it is 11.
4060 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004061 if (shift < (16U - PNG_MAX_GAMMA_8))
4062 shift = (16U - PNG_MAX_GAMMA_8);
4063 }
4064
4065 if (shift > 8U)
4066 shift = 8U; /* Guarantees at least one table! */
4067
4068 png_ptr->gamma_shift = shift;
4069
Glenn Randers-Pehrsonef217b72011-06-15 12:58:27 -05004070 /* NOTE: prior to 1.5.4 this test used to include PNG_BACKGROUND (now
John Bowlerd273ad22011-05-07 21:00:28 -05004071 * PNG_COMPOSE). This effectively smashed the background calculation for
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05004072 * 16-bit output because the 8-bit table assumes the result will be reduced
John Bowlerd273ad22011-05-07 21:00:28 -05004073 * to 8 bits.
4074 */
Glenn Randers-Pehrsonab63dd02011-06-17 20:04:17 -05004075 if (png_ptr->transformations & (PNG_16_TO_8 | PNG_SCALE_16_TO_8))
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004076 png_build_16to8_table(png_ptr, &png_ptr->gamma_16_table, shift,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004077 png_ptr->screen_gamma > 0 ? png_product2(png_ptr->colorspace.gamma,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004078 png_ptr->screen_gamma) : PNG_FP_1);
4079
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004080 else
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004081 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_table, shift,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004082 png_ptr->screen_gamma > 0 ? png_reciprocal2(png_ptr->colorspace.gamma,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004083 png_ptr->screen_gamma) : PNG_FP_1);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004084
4085#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
John Bowlerd273ad22011-05-07 21:00:28 -05004086 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004087 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
John Bowlerd273ad22011-05-07 21:00:28 -05004088 if (png_ptr->transformations & (PNG_COMPOSE | PNG_RGB_TO_GRAY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004089 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004090 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_to_1, shift,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004091 png_reciprocal(png_ptr->colorspace.gamma));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004092
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004093 /* Notice that the '16 from 1' table should be full precision, however
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004094 * the lookup on this table still uses gamma_shift, so it can't be.
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004095 * TODO: fix this.
4096 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004097 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_from_1, shift,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004098 png_ptr->screen_gamma > 0 ? png_reciprocal(png_ptr->screen_gamma) :
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004099 png_ptr->colorspace.gamma/* Probably doing rgb_to_gray */);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004100 }
John Bowlerd273ad22011-05-07 21:00:28 -05004101#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004102 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06004103#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004104}
4105#endif /* READ_GAMMA */
John Bowler7875d532011-11-07 22:33:49 -06004106
Glenn Randers-Pehrsonc4b37182014-04-06 08:59:57 -05004107/* HARDWARE OR SOFTWARE OPTION SUPPORT */
John Bowlerf3728102013-03-04 16:26:31 -06004108#ifdef PNG_SET_OPTION_SUPPORTED
4109int PNGAPI
4110png_set_option(png_structrp png_ptr, int option, int onoff)
4111{
4112 if (png_ptr != NULL && option >= 0 && option < PNG_OPTION_NEXT &&
4113 (option & 1) == 0)
4114 {
4115 int mask = 3 << option;
4116 int setting = (2 + (onoff != 0)) << option;
4117 int current = png_ptr->options;
4118
4119 png_ptr->options = (png_byte)((current & ~mask) | setting);
4120
4121 return (current & mask) >> option;
4122 }
4123
4124 return PNG_OPTION_INVALID;
4125}
4126#endif
4127
John Bowler7875d532011-11-07 22:33:49 -06004128/* sRGB support */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004129#if defined(PNG_SIMPLIFIED_READ_SUPPORTED) ||\
4130 defined(PNG_SIMPLIFIED_WRITE_SUPPORTED)
John Bowler0a521d32011-11-11 18:14:59 -06004131/* sRGB conversion tables; these are machine generated with the code in
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004132 * contrib/tools/makesRGB.c. The actual sRGB transfer curve defined in the
4133 * specification (see the article at http://en.wikipedia.org/wiki/SRGB)
4134 * is used, not the gamma=1/2.2 approximation use elsewhere in libpng.
4135 * The sRGB to linear table is exact (to the nearest 16 bit linear fraction).
4136 * The inverse (linear to sRGB) table has accuracies as follows:
John Bowler0a521d32011-11-11 18:14:59 -06004137 *
4138 * For all possible (255*65535+1) input values:
4139 *
4140 * error: -0.515566 - 0.625971, 79441 (0.475369%) of readings inexact
4141 *
4142 * For the input values corresponding to the 65536 16-bit values:
4143 *
4144 * error: -0.513727 - 0.607759, 308 (0.469978%) of readings inexact
4145 *
4146 * In all cases the inexact readings are off by one.
John Bowler7875d532011-11-07 22:33:49 -06004147 */
John Bowler7875d532011-11-07 22:33:49 -06004148
4149#ifdef PNG_SIMPLIFIED_READ_SUPPORTED
4150/* The convert-to-sRGB table is only currently required for read. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004151const png_uint_16 png_sRGB_table[256] =
John Bowler7875d532011-11-07 22:33:49 -06004152{
4153 0,20,40,60,80,99,119,139,
4154 159,179,199,219,241,264,288,313,
4155 340,367,396,427,458,491,526,562,
4156 599,637,677,718,761,805,851,898,
4157 947,997,1048,1101,1156,1212,1270,1330,
4158 1391,1453,1517,1583,1651,1720,1790,1863,
4159 1937,2013,2090,2170,2250,2333,2418,2504,
4160 2592,2681,2773,2866,2961,3058,3157,3258,
4161 3360,3464,3570,3678,3788,3900,4014,4129,
4162 4247,4366,4488,4611,4736,4864,4993,5124,
4163 5257,5392,5530,5669,5810,5953,6099,6246,
4164 6395,6547,6700,6856,7014,7174,7335,7500,
4165 7666,7834,8004,8177,8352,8528,8708,8889,
4166 9072,9258,9445,9635,9828,10022,10219,10417,
4167 10619,10822,11028,11235,11446,11658,11873,12090,
4168 12309,12530,12754,12980,13209,13440,13673,13909,
4169 14146,14387,14629,14874,15122,15371,15623,15878,
4170 16135,16394,16656,16920,17187,17456,17727,18001,
4171 18277,18556,18837,19121,19407,19696,19987,20281,
4172 20577,20876,21177,21481,21787,22096,22407,22721,
4173 23038,23357,23678,24002,24329,24658,24990,25325,
4174 25662,26001,26344,26688,27036,27386,27739,28094,
4175 28452,28813,29176,29542,29911,30282,30656,31033,
4176 31412,31794,32179,32567,32957,33350,33745,34143,
4177 34544,34948,35355,35764,36176,36591,37008,37429,
4178 37852,38278,38706,39138,39572,40009,40449,40891,
4179 41337,41785,42236,42690,43147,43606,44069,44534,
4180 45002,45473,45947,46423,46903,47385,47871,48359,
4181 48850,49344,49841,50341,50844,51349,51858,52369,
4182 52884,53401,53921,54445,54971,55500,56032,56567,
4183 57105,57646,58190,58737,59287,59840,60396,60955,
4184 61517,62082,62650,63221,63795,64372,64952,65535
4185};
Glenn Randers-Pehrson1b3a9fd2014-09-20 11:01:20 -05004186#endif /* PNG_SIMPLIFIED_READ_SUPPORTED */
John Bowler7875d532011-11-07 22:33:49 -06004187
4188/* The base/delta tables are required for both read and write (but currently
4189 * only the simplified versions.)
4190 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004191const png_uint_16 png_sRGB_base[512] =
John Bowler7875d532011-11-07 22:33:49 -06004192{
John Bowler0a521d32011-11-11 18:14:59 -06004193 128,1782,3383,4644,5675,6564,7357,8074,
4194 8732,9346,9921,10463,10977,11466,11935,12384,
4195 12816,13233,13634,14024,14402,14769,15125,15473,
4196 15812,16142,16466,16781,17090,17393,17690,17981,
John Bowler7875d532011-11-07 22:33:49 -06004197 18266,18546,18822,19093,19359,19621,19879,20133,
John Bowler0a521d32011-11-11 18:14:59 -06004198 20383,20630,20873,21113,21349,21583,21813,22041,
4199 22265,22487,22707,22923,23138,23350,23559,23767,
John Bowler7875d532011-11-07 22:33:49 -06004200 23972,24175,24376,24575,24772,24967,25160,25352,
John Bowler0a521d32011-11-11 18:14:59 -06004201 25542,25730,25916,26101,26284,26465,26645,26823,
4202 27000,27176,27350,27523,27695,27865,28034,28201,
John Bowler7875d532011-11-07 22:33:49 -06004203 28368,28533,28697,28860,29021,29182,29341,29500,
John Bowler0a521d32011-11-11 18:14:59 -06004204 29657,29813,29969,30123,30276,30429,30580,30730,
John Bowler7875d532011-11-07 22:33:49 -06004205 30880,31028,31176,31323,31469,31614,31758,31902,
John Bowler0a521d32011-11-11 18:14:59 -06004206 32045,32186,32327,32468,32607,32746,32884,33021,
4207 33158,33294,33429,33564,33697,33831,33963,34095,
4208 34226,34357,34486,34616,34744,34873,35000,35127,
John Bowler7875d532011-11-07 22:33:49 -06004209 35253,35379,35504,35629,35753,35876,35999,36122,
4210 36244,36365,36486,36606,36726,36845,36964,37083,
John Bowler0a521d32011-11-11 18:14:59 -06004211 37201,37318,37435,37551,37668,37783,37898,38013,
John Bowler7875d532011-11-07 22:33:49 -06004212 38127,38241,38354,38467,38580,38692,38803,38915,
John Bowler0a521d32011-11-11 18:14:59 -06004213 39026,39136,39246,39356,39465,39574,39682,39790,
John Bowler7875d532011-11-07 22:33:49 -06004214 39898,40005,40112,40219,40325,40431,40537,40642,
4215 40747,40851,40955,41059,41163,41266,41369,41471,
John Bowler0a521d32011-11-11 18:14:59 -06004216 41573,41675,41777,41878,41979,42079,42179,42279,
4217 42379,42478,42577,42676,42775,42873,42971,43068,
4218 43165,43262,43359,43456,43552,43648,43743,43839,
4219 43934,44028,44123,44217,44311,44405,44499,44592,
4220 44685,44778,44870,44962,45054,45146,45238,45329,
John Bowler7875d532011-11-07 22:33:49 -06004221 45420,45511,45601,45692,45782,45872,45961,46051,
John Bowler0a521d32011-11-11 18:14:59 -06004222 46140,46229,46318,46406,46494,46583,46670,46758,
4223 46846,46933,47020,47107,47193,47280,47366,47452,
4224 47538,47623,47709,47794,47879,47964,48048,48133,
4225 48217,48301,48385,48468,48552,48635,48718,48801,
4226 48884,48966,49048,49131,49213,49294,49376,49458,
4227 49539,49620,49701,49782,49862,49943,50023,50103,
4228 50183,50263,50342,50422,50501,50580,50659,50738,
4229 50816,50895,50973,51051,51129,51207,51285,51362,
4230 51439,51517,51594,51671,51747,51824,51900,51977,
4231 52053,52129,52205,52280,52356,52432,52507,52582,
John Bowler7875d532011-11-07 22:33:49 -06004232 52657,52732,52807,52881,52956,53030,53104,53178,
John Bowler0a521d32011-11-11 18:14:59 -06004233 53252,53326,53400,53473,53546,53620,53693,53766,
John Bowler7875d532011-11-07 22:33:49 -06004234 53839,53911,53984,54056,54129,54201,54273,54345,
4235 54417,54489,54560,54632,54703,54774,54845,54916,
John Bowler0a521d32011-11-11 18:14:59 -06004236 54987,55058,55129,55199,55269,55340,55410,55480,
4237 55550,55620,55689,55759,55828,55898,55967,56036,
4238 56105,56174,56243,56311,56380,56448,56517,56585,
John Bowler7875d532011-11-07 22:33:49 -06004239 56653,56721,56789,56857,56924,56992,57059,57127,
4240 57194,57261,57328,57395,57462,57529,57595,57662,
4241 57728,57795,57861,57927,57993,58059,58125,58191,
4242 58256,58322,58387,58453,58518,58583,58648,58713,
4243 58778,58843,58908,58972,59037,59101,59165,59230,
4244 59294,59358,59422,59486,59549,59613,59677,59740,
4245 59804,59867,59930,59993,60056,60119,60182,60245,
4246 60308,60370,60433,60495,60558,60620,60682,60744,
4247 60806,60868,60930,60992,61054,61115,61177,61238,
4248 61300,61361,61422,61483,61544,61605,61666,61727,
John Bowler0a521d32011-11-11 18:14:59 -06004249 61788,61848,61909,61969,62030,62090,62150,62211,
John Bowler7875d532011-11-07 22:33:49 -06004250 62271,62331,62391,62450,62510,62570,62630,62689,
4251 62749,62808,62867,62927,62986,63045,63104,63163,
John Bowler0a521d32011-11-11 18:14:59 -06004252 63222,63281,63340,63398,63457,63515,63574,63632,
John Bowler7875d532011-11-07 22:33:49 -06004253 63691,63749,63807,63865,63923,63981,64039,64097,
John Bowler0a521d32011-11-11 18:14:59 -06004254 64155,64212,64270,64328,64385,64443,64500,64557,
4255 64614,64672,64729,64786,64843,64900,64956,65013,
4256 65070,65126,65183,65239,65296,65352,65409,65465
John Bowler7875d532011-11-07 22:33:49 -06004257};
4258
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004259const png_byte png_sRGB_delta[512] =
John Bowler7875d532011-11-07 22:33:49 -06004260{
John Bowler0a521d32011-11-11 18:14:59 -06004261 207,201,158,129,113,100,90,82,77,72,68,64,61,59,56,54,
John Bowler7875d532011-11-07 22:33:49 -06004262 52,50,49,47,46,45,43,42,41,40,39,39,38,37,36,36,
4263 35,34,34,33,33,32,32,31,31,30,30,30,29,29,28,28,
John Bowler0a521d32011-11-11 18:14:59 -06004264 28,27,27,27,27,26,26,26,25,25,25,25,24,24,24,24,
John Bowler7875d532011-11-07 22:33:49 -06004265 23,23,23,23,23,22,22,22,22,22,22,21,21,21,21,21,
4266 21,20,20,20,20,20,20,20,20,19,19,19,19,19,19,19,
4267 19,18,18,18,18,18,18,18,18,18,18,17,17,17,17,17,
4268 17,17,17,17,17,17,16,16,16,16,16,16,16,16,16,16,
4269 16,16,16,16,15,15,15,15,15,15,15,15,15,15,15,15,
4270 15,15,15,15,14,14,14,14,14,14,14,14,14,14,14,14,
4271 14,14,14,14,14,14,14,13,13,13,13,13,13,13,13,13,
4272 13,13,13,13,13,13,13,13,13,13,13,13,13,13,12,12,
4273 12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,
4274 12,12,12,12,12,12,12,12,12,12,12,12,11,11,11,11,
4275 11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,
4276 11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,
4277 11,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4278 10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4279 10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4280 10,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4281 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4282 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4283 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4284 9,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4285 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4286 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4287 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4288 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4289 8,8,8,8,8,8,8,8,8,7,7,7,7,7,7,7,
4290 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
4291 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
4292 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7
4293};
John Bowler7875d532011-11-07 22:33:49 -06004294#endif /* SIMPLIFIED READ/WRITE sRGB support */
4295
4296/* SIMPLIFIED READ/WRITE SUPPORT */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004297#if defined(PNG_SIMPLIFIED_READ_SUPPORTED) ||\
4298 defined(PNG_SIMPLIFIED_WRITE_SUPPORTED)
John Bowler7875d532011-11-07 22:33:49 -06004299static int
4300png_image_free_function(png_voidp argument)
4301{
John Bowler4fa96a42011-11-16 16:39:16 -06004302 png_imagep image = png_voidcast(png_imagep, argument);
John Bowler7875d532011-11-07 22:33:49 -06004303 png_controlp cp = image->opaque;
4304 png_control c;
4305
4306 /* Double check that we have a png_ptr - it should be impossible to get here
4307 * without one.
4308 */
4309 if (cp->png_ptr == NULL)
4310 return 0;
4311
4312 /* First free any data held in the control structure. */
4313# ifdef PNG_STDIO_SUPPORTED
4314 if (cp->owned_file)
4315 {
John Bowler4fa96a42011-11-16 16:39:16 -06004316 FILE *fp = png_voidcast(FILE*, cp->png_ptr->io_ptr);
John Bowler7875d532011-11-07 22:33:49 -06004317 cp->owned_file = 0;
4318
4319 /* Ignore errors here. */
4320 if (fp != NULL)
4321 {
4322 cp->png_ptr->io_ptr = NULL;
4323 (void)fclose(fp);
4324 }
4325 }
4326# endif
4327
4328 /* Copy the control structure so that the original, allocated, version can be
4329 * safely freed. Notice that a png_error here stops the remainder of the
4330 * cleanup, but this is probably fine because that would indicate bad memory
4331 * problems anyway.
4332 */
4333 c = *cp;
4334 image->opaque = &c;
4335 png_free(c.png_ptr, cp);
4336
4337 /* Then the structures, calling the correct API. */
4338 if (c.for_write)
4339 {
4340# ifdef PNG_SIMPLIFIED_WRITE_SUPPORTED
4341 png_destroy_write_struct(&c.png_ptr, &c.info_ptr);
4342# else
4343 png_error(c.png_ptr, "simplified write not supported");
4344# endif
4345 }
4346 else
4347 {
4348# ifdef PNG_SIMPLIFIED_READ_SUPPORTED
4349 png_destroy_read_struct(&c.png_ptr, &c.info_ptr, NULL);
4350# else
4351 png_error(c.png_ptr, "simplified read not supported");
4352# endif
4353 }
4354
4355 /* Success. */
4356 return 1;
4357}
4358
4359void PNGAPI
4360png_image_free(png_imagep image)
4361{
4362 /* Safely call the real function, but only if doing so is safe at this point
4363 * (if not inside an error handling context). Otherwise assume
4364 * png_safe_execute will call this API after the return.
4365 */
4366 if (image != NULL && image->opaque != NULL &&
4367 image->opaque->error_buf == NULL)
4368 {
4369 /* Ignore errors here: */
4370 (void)png_safe_execute(image, png_image_free_function, image);
4371 image->opaque = NULL;
4372 }
4373}
4374
4375int /* PRIVATE */
4376png_image_error(png_imagep image, png_const_charp error_message)
4377{
4378 /* Utility to log an error. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004379 png_safecat(image->message, (sizeof image->message), 0, error_message);
4380 image->warning_or_error |= PNG_IMAGE_ERROR;
John Bowler7875d532011-11-07 22:33:49 -06004381 png_image_free(image);
4382 return 0;
4383}
4384
4385#endif /* SIMPLIFIED READ/WRITE */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004386#endif /* defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED) */