blob: 0a536eb4110381a359ffb0837bd3386b32bae432 [file] [log] [blame]
John Bowler8de49d02012-09-27 09:26:49 -05001
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06002/* png.c - location for general purpose libpng functions
3 *
Glenn Randers-Pehrsonebba0742014-10-25 12:22:39 -05004 * Last changed in libpng 1.6.15 [(PENDING RELEASE)]
Glenn Randers-Pehrson95a19732013-12-31 21:10:13 -06005 * Copyright (c) 1998-2014 Glenn Randers-Pehrson
Glenn Randers-Pehrsond4366722000-06-04 14:29:29 -05006 * (Version 0.96 Copyright (c) 1996, 1997 Andreas Dilger)
7 * (Version 0.88 Copyright (c) 1995, 1996 Guy Eric Schalnat, Group 42, Inc.)
Glenn Randers-Pehrson3e61d792009-06-24 09:31:28 -05008 *
Glenn Randers-Pehrsonbfbf8652009-06-26 21:46:52 -05009 * This code is released under the libpng license.
Glenn Randers-Pehrsonc332bbc2009-06-25 13:43:50 -050010 * For conditions of distribution and use, see the disclaimer
Glenn Randers-Pehrson037023b2009-06-24 10:27:36 -050011 * and license in png.h
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -060012 */
Guy Schalnat0d580581995-07-20 02:43:20 -050013
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -050014#include "pngpriv.h"
Guy Schalnat0d580581995-07-20 02:43:20 -050015
Glenn Randers-Pehrson520a7642000-03-21 05:13:06 -060016/* Generate a compiler error if there is an old png.h in the search path. */
Glenn Randers-Pehrson6b9a20e2014-10-29 09:10:15 -050017typedef png_libpng_version_1_6_15beta02 Your_png_h_is_not_version_1_6_15beta02;
Glenn Randers-Pehrson520a7642000-03-21 05:13:06 -060018
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060019/* Tells libpng that we have already handled the first "num_bytes" bytes
20 * of the PNG file signature. If the PNG data is embedded into another
21 * stream we can set num_bytes = 8 so that libpng will not attempt to read
22 * or write any of the magic bytes before it starts on the IHDR.
23 */
Glenn Randers-Pehrsonbcfd15d1999-10-01 14:22:25 -050024
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060025#ifdef PNG_READ_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -050026void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -060027png_set_sig_bytes(png_structrp png_ptr, int num_bytes)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060028{
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -050029 png_debug(1, "in png_set_sig_bytes");
30
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -050031 if (png_ptr == NULL)
32 return;
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -050033
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060034 if (num_bytes > 8)
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -050035 png_error(png_ptr, "Too many bytes for PNG signature");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060036
Glenn Randers-Pehrson860ab2b1999-10-14 07:43:10 -050037 png_ptr->sig_bytes = (png_byte)(num_bytes < 0 ? 0 : num_bytes);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060038}
39
40/* Checks whether the supplied bytes match the PNG signature. We allow
41 * checking less than the full 8-byte signature so that those apps that
42 * already read the first few bytes of a file to determine the file type
43 * can simply check the remaining bytes for extra assurance. Returns
44 * an integer less than, equal to, or greater than zero if sig is found,
45 * respectively, to be less than, to match, or be greater than the correct
Glenn Randers-Pehrson6d62ef12011-08-25 18:17:50 -050046 * PNG signature (this is the same behavior as strcmp, memcmp, etc).
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060047 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -050048int PNGAPI
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -050049png_sig_cmp(png_const_bytep sig, png_size_t start, png_size_t num_to_check)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060050{
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -060051 png_byte png_signature[8] = {137, 80, 78, 71, 13, 10, 26, 10};
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -050052
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060053 if (num_to_check > 8)
54 num_to_check = 8;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -050055
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060056 else if (num_to_check < 1)
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060057 return (-1);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060058
Andreas Dilger47a0c421997-05-16 02:46:07 -050059 if (start > 7)
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060060 return (-1);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060061
62 if (start + num_to_check > 8)
63 num_to_check = 8 - start;
64
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -060065 return ((int)(memcmp(&sig[start], &png_signature[start], num_to_check)));
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060066}
67
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060068#endif /* PNG_READ_SUPPORTED */
Guy Schalnat0d580581995-07-20 02:43:20 -050069
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060070#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Glenn Randers-Pehrsonc5080812010-10-23 08:26:26 -050071/* Function to allocate memory for zlib */
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -050072PNG_FUNCTION(voidpf /* PRIVATE */,
73png_zalloc,(voidpf png_ptr, uInt items, uInt size),PNG_ALLOCATED)
Guy Schalnat0d580581995-07-20 02:43:20 -050074{
John Bowlerd332c672011-12-21 17:36:12 -060075 png_alloc_size_t num_bytes = size;
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -050076
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -050077 if (png_ptr == NULL)
John Bowlerd332c672011-12-21 17:36:12 -060078 return NULL;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -050079
John Bowlerd332c672011-12-21 17:36:12 -060080 if (items >= (~(png_alloc_size_t)0)/size)
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -050081 {
John Bowler5d567862011-12-24 09:12:00 -060082 png_warning (png_voidcast(png_structrp, png_ptr),
John Bowlerd332c672011-12-21 17:36:12 -060083 "Potential overflow in png_zalloc()");
84 return NULL;
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -050085 }
Glenn Randers-Pehrson9c0f0942002-02-21 23:14:23 -060086
John Bowlerd332c672011-12-21 17:36:12 -060087 num_bytes *= items;
John Bowler5d567862011-12-24 09:12:00 -060088 return png_malloc_warn(png_voidcast(png_structrp, png_ptr), num_bytes);
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -050089}
90
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -050091/* Function to free memory for zlib */
Glenn Randers-Pehrson3f705ba2009-07-23 12:53:06 -050092void /* PRIVATE */
Guy Schalnat51f0eb41995-09-26 05:22:39 -050093png_zfree(voidpf png_ptr, voidpf ptr)
Guy Schalnat0d580581995-07-20 02:43:20 -050094{
John Bowler5d567862011-12-24 09:12:00 -060095 png_free(png_voidcast(png_const_structrp,png_ptr), ptr);
Guy Schalnat0d580581995-07-20 02:43:20 -050096}
97
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060098/* Reset the CRC variable to 32 bits of 1's. Care must be taken
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -060099 * in case CRC is > 32 bits to leave the top bits 0.
100 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500101void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -0600102png_reset_crc(png_structrp png_ptr)
Guy Schalnat0d580581995-07-20 02:43:20 -0500103{
John Bowlerf3f7e142011-09-09 07:32:37 -0500104 /* The cast is safe because the crc is a 32 bit value. */
105 png_ptr->crc = (png_uint_32)crc32(0, Z_NULL, 0);
Guy Schalnat0d580581995-07-20 02:43:20 -0500106}
107
Andreas Dilger47a0c421997-05-16 02:46:07 -0500108/* Calculate the CRC over a section of data. We can only pass as
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600109 * much data to this routine as the largest single buffer size. We
110 * also check that this data will actually be used before going to the
111 * trouble of calculating it.
112 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500113void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -0600114png_calculate_crc(png_structrp png_ptr, png_const_bytep ptr, png_size_t length)
Guy Schalnat0d580581995-07-20 02:43:20 -0500115{
Andreas Dilger47a0c421997-05-16 02:46:07 -0500116 int need_crc = 1;
117
Glenn Randers-Pehrson67a289f2013-04-19 19:03:34 -0500118 if (PNG_CHUNK_ANCILLARY(png_ptr->chunk_name))
Andreas Dilger47a0c421997-05-16 02:46:07 -0500119 {
120 if ((png_ptr->flags & PNG_FLAG_CRC_ANCILLARY_MASK) ==
121 (PNG_FLAG_CRC_ANCILLARY_USE | PNG_FLAG_CRC_ANCILLARY_NOWARN))
122 need_crc = 0;
123 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500124
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500125 else /* critical */
Andreas Dilger47a0c421997-05-16 02:46:07 -0500126 {
127 if (png_ptr->flags & PNG_FLAG_CRC_CRITICAL_IGNORE)
128 need_crc = 0;
129 }
130
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600131 /* 'uLong' is defined in zlib.h as unsigned long; this means that on some
132 * systems it is a 64 bit value. crc32, however, returns 32 bits so the
133 * following cast is safe. 'uInt' may be no more than 16 bits, so it is
134 * necessary to perform a loop here.
John Bowlerf3f7e142011-09-09 07:32:37 -0500135 */
136 if (need_crc && length > 0)
137 {
138 uLong crc = png_ptr->crc; /* Should never issue a warning */
139
140 do
141 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600142 uInt safe_length = (uInt)length;
143 if (safe_length == 0)
144 safe_length = (uInt)-1; /* evil, but safe */
John Bowlerf3f7e142011-09-09 07:32:37 -0500145
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600146 crc = crc32(crc, ptr, safe_length);
John Bowlerf3f7e142011-09-09 07:32:37 -0500147
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600148 /* The following should never issue compiler warnings; if they do the
John Bowlerf3f7e142011-09-09 07:32:37 -0500149 * target system has characteristics that will probably violate other
150 * assumptions within the libpng code.
151 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600152 ptr += safe_length;
153 length -= safe_length;
John Bowlerf3f7e142011-09-09 07:32:37 -0500154 }
155 while (length > 0);
156
157 /* And the following is always safe because the crc is only 32 bits. */
158 png_ptr->crc = (png_uint_32)crc;
159 }
Guy Schalnat0d580581995-07-20 02:43:20 -0500160}
Guy Schalnate5a37791996-06-05 15:50:50 -0500161
John Bowler88b77cc2011-05-05 06:49:55 -0500162/* Check a user supplied version number, called from both read and write
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600163 * functions that create a png_struct.
John Bowler88b77cc2011-05-05 06:49:55 -0500164 */
165int
John Bowler5d567862011-12-24 09:12:00 -0600166png_user_version_check(png_structrp png_ptr, png_const_charp user_png_ver)
John Bowler88b77cc2011-05-05 06:49:55 -0500167{
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -0600168 if (user_png_ver != NULL)
John Bowler88b77cc2011-05-05 06:49:55 -0500169 {
170 int i = 0;
171
172 do
173 {
174 if (user_png_ver[i] != png_libpng_ver[i])
175 png_ptr->flags |= PNG_FLAG_LIBRARY_MISMATCH;
176 } while (png_libpng_ver[i++]);
177 }
178
179 else
180 png_ptr->flags |= PNG_FLAG_LIBRARY_MISMATCH;
181
182 if (png_ptr->flags & PNG_FLAG_LIBRARY_MISMATCH)
183 {
184 /* Libpng 0.90 and later are binary incompatible with libpng 0.89, so
185 * we must recompile any applications that use any older library version.
186 * For versions after libpng 1.0, we will be compatible, so we need
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600187 * only check the first and third digits (note that when we reach version
188 * 1.10 we will need to check the fourth symbol, namely user_png_ver[3]).
John Bowler88b77cc2011-05-05 06:49:55 -0500189 */
190 if (user_png_ver == NULL || user_png_ver[0] != png_libpng_ver[0] ||
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600191 (user_png_ver[0] == '1' && (user_png_ver[2] != png_libpng_ver[2] ||
192 user_png_ver[3] != png_libpng_ver[3])) ||
John Bowler88b77cc2011-05-05 06:49:55 -0500193 (user_png_ver[0] == '0' && user_png_ver[2] < '9'))
194 {
195#ifdef PNG_WARNINGS_SUPPORTED
196 size_t pos = 0;
197 char m[128];
198
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600199 pos = png_safecat(m, (sizeof m), pos,
200 "Application built with libpng-");
201 pos = png_safecat(m, (sizeof m), pos, user_png_ver);
202 pos = png_safecat(m, (sizeof m), pos, " but running with ");
203 pos = png_safecat(m, (sizeof m), pos, png_libpng_ver);
Glenn Randers-Pehrson3f8a2ed2013-11-25 10:38:21 -0600204 PNG_UNUSED(pos)
John Bowler88b77cc2011-05-05 06:49:55 -0500205
206 png_warning(png_ptr, m);
207#endif
208
209#ifdef PNG_ERROR_NUMBERS_SUPPORTED
210 png_ptr->flags = 0;
211#endif
212
213 return 0;
214 }
215 }
216
217 /* Success return. */
218 return 1;
219}
220
John Bowlerd332c672011-12-21 17:36:12 -0600221/* Generic function to create a png_struct for either read or write - this
222 * contains the common initialization.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600223 */
John Bowlerd332c672011-12-21 17:36:12 -0600224PNG_FUNCTION(png_structp /* PRIVATE */,
225png_create_png_struct,(png_const_charp user_png_ver, png_voidp error_ptr,
226 png_error_ptr error_fn, png_error_ptr warn_fn, png_voidp mem_ptr,
227 png_malloc_ptr malloc_fn, png_free_ptr free_fn),PNG_ALLOCATED)
228{
229 png_struct create_struct;
230# ifdef PNG_SETJMP_SUPPORTED
231 jmp_buf create_jmp_buf;
232# endif
233
234 /* This temporary stack-allocated structure is used to provide a place to
235 * build enough context to allow the user provided memory allocator (if any)
236 * to be called.
237 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600238 memset(&create_struct, 0, (sizeof create_struct));
John Bowlerd332c672011-12-21 17:36:12 -0600239
240 /* Added at libpng-1.2.6 */
241# ifdef PNG_USER_LIMITS_SUPPORTED
242 create_struct.user_width_max = PNG_USER_WIDTH_MAX;
243 create_struct.user_height_max = PNG_USER_HEIGHT_MAX;
244
245# ifdef PNG_USER_CHUNK_CACHE_MAX
246 /* Added at libpng-1.2.43 and 1.4.0 */
247 create_struct.user_chunk_cache_max = PNG_USER_CHUNK_CACHE_MAX;
248# endif
249
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600250# ifdef PNG_USER_CHUNK_MALLOC_MAX
John Bowlerd332c672011-12-21 17:36:12 -0600251 /* Added at libpng-1.2.43 and 1.4.1, required only for read but exists
252 * in png_struct regardless.
253 */
254 create_struct.user_chunk_malloc_max = PNG_USER_CHUNK_MALLOC_MAX;
255# endif
256# endif
257
258 /* The following two API calls simply set fields in png_struct, so it is safe
259 * to do them now even though error handling is not yet set up.
260 */
261# ifdef PNG_USER_MEM_SUPPORTED
262 png_set_mem_fn(&create_struct, mem_ptr, malloc_fn, free_fn);
Glenn Randers-Pehrsonc9120502013-11-22 14:58:04 -0600263# else
264 PNG_UNUSED(mem_ptr)
265 PNG_UNUSED(malloc_fn)
266 PNG_UNUSED(free_fn)
John Bowlerd332c672011-12-21 17:36:12 -0600267# endif
268
269 /* (*error_fn) can return control to the caller after the error_ptr is set,
270 * this will result in a memory leak unless the error_fn does something
271 * extremely sophisticated. The design lacks merit but is implicit in the
272 * API.
273 */
274 png_set_error_fn(&create_struct, error_ptr, error_fn, warn_fn);
275
276# ifdef PNG_SETJMP_SUPPORTED
277 if (!setjmp(create_jmp_buf))
278 {
279 /* Temporarily fake out the longjmp information until we have
280 * successfully completed this function. This only works if we have
281 * setjmp() support compiled in, but it is safe - this stuff should
282 * never happen.
283 */
284 create_struct.jmp_buf_ptr = &create_jmp_buf;
285 create_struct.jmp_buf_size = 0; /*stack allocation*/
286 create_struct.longjmp_fn = longjmp;
287# else
288 {
289# endif
290 /* Call the general version checker (shared with read and write code):
291 */
292 if (png_user_version_check(&create_struct, user_png_ver))
293 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600294 png_structrp png_ptr = png_voidcast(png_structrp,
295 png_malloc_warn(&create_struct, (sizeof *png_ptr)));
John Bowlerd332c672011-12-21 17:36:12 -0600296
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600297 if (png_ptr != NULL)
John Bowlerd332c672011-12-21 17:36:12 -0600298 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600299 /* png_ptr->zstream holds a back-pointer to the png_struct, so
300 * this can only be done now:
301 */
302 create_struct.zstream.zalloc = png_zalloc;
303 create_struct.zstream.zfree = png_zfree;
304 create_struct.zstream.opaque = png_ptr;
John Bowlerd332c672011-12-21 17:36:12 -0600305
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600306# ifdef PNG_SETJMP_SUPPORTED
307 /* Eliminate the local error handling: */
308 create_struct.jmp_buf_ptr = NULL;
309 create_struct.jmp_buf_size = 0;
310 create_struct.longjmp_fn = 0;
311# endif
John Bowlerd332c672011-12-21 17:36:12 -0600312
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600313 *png_ptr = create_struct;
John Bowlerd332c672011-12-21 17:36:12 -0600314
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600315 /* This is the successful return point */
316 return png_ptr;
John Bowlerd332c672011-12-21 17:36:12 -0600317 }
318 }
319 }
320
321 /* A longjmp because of a bug in the application storage allocator or a
322 * simple failure to allocate the png_struct.
323 */
John Bowlerd332c672011-12-21 17:36:12 -0600324 return NULL;
325}
326
327/* Allocate the memory for an info_struct for the application. */
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -0500328PNG_FUNCTION(png_infop,PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600329png_create_info_struct,(png_const_structrp png_ptr),PNG_ALLOCATED)
Guy Schalnate5a37791996-06-05 15:50:50 -0500330{
John Bowler5d567862011-12-24 09:12:00 -0600331 png_inforp info_ptr;
Guy Schalnate5a37791996-06-05 15:50:50 -0500332
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500333 png_debug(1, "in png_create_info_struct");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500334
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500335 if (png_ptr == NULL)
John Bowlerd332c672011-12-21 17:36:12 -0600336 return NULL;
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500337
John Bowlerd332c672011-12-21 17:36:12 -0600338 /* Use the internal API that does not (or at least should not) error out, so
339 * that this call always returns ok. The application typically sets up the
340 * error handling *after* creating the info_struct because this is the way it
341 * has always been done in 'example.c'.
342 */
John Bowler5d567862011-12-24 09:12:00 -0600343 info_ptr = png_voidcast(png_inforp, png_malloc_base(png_ptr,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600344 (sizeof *info_ptr)));
John Bowlerd332c672011-12-21 17:36:12 -0600345
Glenn Randers-Pehrson5cded0b2001-11-07 07:10:08 -0600346 if (info_ptr != NULL)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600347 memset(info_ptr, 0, (sizeof *info_ptr));
Guy Schalnate5a37791996-06-05 15:50:50 -0500348
John Bowlerd332c672011-12-21 17:36:12 -0600349 return info_ptr;
Guy Schalnate5a37791996-06-05 15:50:50 -0500350}
351
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600352/* This function frees the memory associated with a single info struct.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600353 * Normally, one would use either png_destroy_read_struct() or
354 * png_destroy_write_struct() to free an info struct, but this may be
John Bowlerd332c672011-12-21 17:36:12 -0600355 * useful for some applications. From libpng 1.6.0 this function is also used
356 * internally to implement the png_info release part of the 'struct' destroy
357 * APIs. This ensures that all possible approaches free the same data (all of
358 * it).
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600359 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500360void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600361png_destroy_info_struct(png_const_structrp png_ptr, png_infopp info_ptr_ptr)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600362{
John Bowler5d567862011-12-24 09:12:00 -0600363 png_inforp info_ptr = NULL;
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600364
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500365 png_debug(1, "in png_destroy_info_struct");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500366
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500367 if (png_ptr == NULL)
368 return;
369
Andreas Dilger47a0c421997-05-16 02:46:07 -0500370 if (info_ptr_ptr != NULL)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600371 info_ptr = *info_ptr_ptr;
372
Andreas Dilger47a0c421997-05-16 02:46:07 -0500373 if (info_ptr != NULL)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600374 {
John Bowlerd332c672011-12-21 17:36:12 -0600375 /* Do this first in case of an error below; if the app implements its own
376 * memory management this can lead to png_free calling png_error, which
377 * will abort this routine and return control to the app error handler.
378 * An infinite loop may result if it then tries to free the same info
379 * ptr.
380 */
Glenn Randers-Pehrson3f549252001-10-27 07:35:13 -0500381 *info_ptr_ptr = NULL;
John Bowlerd332c672011-12-21 17:36:12 -0600382
John Bowlerdf477e42011-12-24 07:47:02 -0600383 png_free_data(png_ptr, info_ptr, PNG_FREE_ALL, -1);
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600384 memset(info_ptr, 0, (sizeof *info_ptr));
John Bowlerd332c672011-12-21 17:36:12 -0600385 png_free(png_ptr, info_ptr);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600386 }
387}
388
389/* Initialize the info structure. This is now an internal function (0.89)
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600390 * and applications using it are urged to use png_create_info_struct()
John Bowlerd332c672011-12-21 17:36:12 -0600391 * instead. Use deprecated in 1.6.0, internal use removed (used internally it
392 * is just a memset).
393 *
394 * NOTE: it is almost inconceivable that this API is used because it bypasses
395 * the user-memory mechanism and the user error handling/warning mechanisms in
396 * those cases where it does anything other than a memset.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600397 */
John Bowlerd332c672011-12-21 17:36:12 -0600398PNG_FUNCTION(void,PNGAPI
399png_info_init_3,(png_infopp ptr_ptr, png_size_t png_info_struct_size),
400 PNG_DEPRECATED)
Glenn Randers-Pehrson8b6a8892001-05-18 04:54:50 -0500401{
John Bowler5d567862011-12-24 09:12:00 -0600402 png_inforp info_ptr = *ptr_ptr;
Glenn Randers-Pehrson8b6a8892001-05-18 04:54:50 -0500403
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500404 png_debug(1, "in png_info_init_3");
405
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500406 if (info_ptr == NULL)
407 return;
Glenn Randers-Pehrson6b12c082006-11-14 10:53:30 -0600408
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600409 if ((sizeof (png_info)) > png_info_struct_size)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500410 {
John Bowlerd332c672011-12-21 17:36:12 -0600411 *ptr_ptr = NULL;
412 /* The following line is why this API should not be used: */
413 free(info_ptr);
John Bowler5d567862011-12-24 09:12:00 -0600414 info_ptr = png_voidcast(png_inforp, png_malloc_base(NULL,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600415 (sizeof *info_ptr)));
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500416 *ptr_ptr = info_ptr;
417 }
Glenn Randers-Pehrson8b6a8892001-05-18 04:54:50 -0500418
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500419 /* Set everything to 0 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600420 memset(info_ptr, 0, (sizeof *info_ptr));
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600421}
422
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600423/* The following API is not called internally */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500424void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600425png_data_freer(png_const_structrp png_ptr, png_inforp info_ptr,
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500426 int freer, png_uint_32 mask)
427{
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500428 png_debug(1, "in png_data_freer");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500429
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500430 if (png_ptr == NULL || info_ptr == NULL)
431 return;
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500432
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500433 if (freer == PNG_DESTROY_WILL_FREE_DATA)
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500434 info_ptr->free_me |= mask;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500435
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500436 else if (freer == PNG_USER_WILL_FREE_DATA)
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500437 info_ptr->free_me &= ~mask;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500438
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500439 else
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600440 png_error(png_ptr, "Unknown freer parameter in png_data_freer");
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500441}
442
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500443void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600444png_free_data(png_const_structrp png_ptr, png_inforp info_ptr, png_uint_32 mask,
Glenn Randers-Pehrson82ae3832001-04-20 10:32:10 -0500445 int num)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600446{
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500447 png_debug(1, "in png_free_data");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500448
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600449 if (png_ptr == NULL || info_ptr == NULL)
450 return;
Glenn Randers-Pehrsona77ef622000-02-18 13:48:52 -0600451
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500452#ifdef PNG_TEXT_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500453 /* Free text item num or (if num == -1) all text items */
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500454 if (info_ptr->text && ((mask & PNG_FREE_TEXT) & info_ptr->free_me))
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600455 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500456 if (num != -1)
457 {
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500458 png_free(png_ptr, info_ptr->text[num].key);
459 info_ptr->text[num].key = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500460 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500461
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500462 else
463 {
464 int i;
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500465
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500466 for (i = 0; i < info_ptr->num_text; i++)
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500467 png_free(png_ptr, info_ptr->text[i].key);
468
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500469 png_free(png_ptr, info_ptr->text);
470 info_ptr->text = NULL;
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500471 info_ptr->num_text = 0;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500472 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600473 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600474#endif
475
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500476#ifdef PNG_tRNS_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500477 /* Free any tRNS entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500478 if ((mask & PNG_FREE_TRNS) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500479 {
Glenn Randers-Pehrson6abea752009-08-08 16:52:06 -0500480 png_free(png_ptr, info_ptr->trans_alpha);
481 info_ptr->trans_alpha = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500482 info_ptr->valid &= ~PNG_INFO_tRNS;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500483 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600484#endif
485
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500486#ifdef PNG_sCAL_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500487 /* Free any sCAL entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500488 if ((mask & PNG_FREE_SCAL) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500489 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500490 png_free(png_ptr, info_ptr->scal_s_width);
491 png_free(png_ptr, info_ptr->scal_s_height);
492 info_ptr->scal_s_width = NULL;
493 info_ptr->scal_s_height = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500494 info_ptr->valid &= ~PNG_INFO_sCAL;
495 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600496#endif
497
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500498#ifdef PNG_pCAL_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500499 /* Free any pCAL entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500500 if ((mask & PNG_FREE_PCAL) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500501 {
502 png_free(png_ptr, info_ptr->pcal_purpose);
503 png_free(png_ptr, info_ptr->pcal_units);
504 info_ptr->pcal_purpose = NULL;
505 info_ptr->pcal_units = NULL;
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500506
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500507 if (info_ptr->pcal_params != NULL)
508 {
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500509 int i;
510
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600511 for (i = 0; i < info_ptr->pcal_nparams; i++)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500512 png_free(png_ptr, info_ptr->pcal_params[i]);
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500513
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500514 png_free(png_ptr, info_ptr->pcal_params);
515 info_ptr->pcal_params = NULL;
516 }
517 info_ptr->valid &= ~PNG_INFO_pCAL;
518 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600519#endif
520
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500521#ifdef PNG_iCCP_SUPPORTED
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600522 /* Free any profile entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500523 if ((mask & PNG_FREE_ICCP) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500524 {
525 png_free(png_ptr, info_ptr->iccp_name);
526 png_free(png_ptr, info_ptr->iccp_profile);
527 info_ptr->iccp_name = NULL;
528 info_ptr->iccp_profile = NULL;
529 info_ptr->valid &= ~PNG_INFO_iCCP;
530 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600531#endif
532
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500533#ifdef PNG_sPLT_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500534 /* Free a given sPLT entry, or (if num == -1) all sPLT entries */
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500535 if (info_ptr->splt_palettes && ((mask & PNG_FREE_SPLT) & info_ptr->free_me))
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600536 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500537 if (num != -1)
Glenn Randers-Pehrsonfc4a1432000-05-17 17:39:34 -0500538 {
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500539 png_free(png_ptr, info_ptr->splt_palettes[num].name);
540 png_free(png_ptr, info_ptr->splt_palettes[num].entries);
541 info_ptr->splt_palettes[num].name = NULL;
542 info_ptr->splt_palettes[num].entries = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500543 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500544
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500545 else
546 {
547 if (info_ptr->splt_palettes_num)
548 {
Glenn Randers-Pehrson45679352013-01-20 00:44:29 -0600549 int i;
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500550
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600551 for (i = 0; i < info_ptr->splt_palettes_num; i++)
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500552 {
553 png_free(png_ptr, info_ptr->splt_palettes[i].name);
554 png_free(png_ptr, info_ptr->splt_palettes[i].entries);
555 }
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500556
557 png_free(png_ptr, info_ptr->splt_palettes);
558 info_ptr->splt_palettes = NULL;
559 info_ptr->splt_palettes_num = 0;
560 }
561 info_ptr->valid &= ~PNG_INFO_sPLT;
Glenn Randers-Pehrsonfc4a1432000-05-17 17:39:34 -0500562 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600563 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600564#endif
565
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600566#ifdef PNG_STORE_UNKNOWN_CHUNKS_SUPPORTED
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500567 if (info_ptr->unknown_chunks && ((mask & PNG_FREE_UNKN) & info_ptr->free_me))
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600568 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500569 if (num != -1)
570 {
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500571 png_free(png_ptr, info_ptr->unknown_chunks[num].data);
572 info_ptr->unknown_chunks[num].data = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500573 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500574
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500575 else
576 {
Glenn Randers-Pehrson45679352013-01-20 00:44:29 -0600577 int i;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600578
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500579 if (info_ptr->unknown_chunks_num)
580 {
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -0500581 for (i = 0; i < info_ptr->unknown_chunks_num; i++)
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500582 png_free(png_ptr, info_ptr->unknown_chunks[i].data);
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600583
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500584 png_free(png_ptr, info_ptr->unknown_chunks);
585 info_ptr->unknown_chunks = NULL;
586 info_ptr->unknown_chunks_num = 0;
587 }
588 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600589 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600590#endif
591
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500592#ifdef PNG_hIST_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500593 /* Free any hIST entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500594 if ((mask & PNG_FREE_HIST) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500595 {
596 png_free(png_ptr, info_ptr->hist);
597 info_ptr->hist = NULL;
598 info_ptr->valid &= ~PNG_INFO_hIST;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500599 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600600#endif
601
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500602 /* Free any PLTE entry that was internally allocated */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500603 if ((mask & PNG_FREE_PLTE) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500604 {
John Bowler40b26032011-12-22 08:09:15 -0600605 png_free(png_ptr, info_ptr->palette);
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500606 info_ptr->palette = NULL;
607 info_ptr->valid &= ~PNG_INFO_PLTE;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500608 info_ptr->num_palette = 0;
609 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600610
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500611#ifdef PNG_INFO_IMAGE_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500612 /* Free any image bits attached to the info structure */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500613 if ((mask & PNG_FREE_ROWS) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500614 {
615 if (info_ptr->row_pointers)
616 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600617 png_uint_32 row;
618 for (row = 0; row < info_ptr->height; row++)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500619 png_free(png_ptr, info_ptr->row_pointers[row]);
Glenn Randers-Pehrsonbf95fad2014-10-26 21:09:03 -0500620
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500621 png_free(png_ptr, info_ptr->row_pointers);
Glenn Randers-Pehrsonf81b50b2009-12-29 16:50:15 -0600622 info_ptr->row_pointers = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500623 }
624 info_ptr->valid &= ~PNG_INFO_IDAT;
625 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600626#endif
Glenn Randers-Pehrsonfc4a1432000-05-17 17:39:34 -0500627
John Bowler56a739b2010-12-19 16:33:20 -0600628 if (num != -1)
629 mask &= ~PNG_FREE_MUL;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500630
John Bowler56a739b2010-12-19 16:33:20 -0600631 info_ptr->free_me &= ~mask;
Glenn Randers-Pehrsona77ef622000-02-18 13:48:52 -0600632}
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -0600633#endif /* defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED) */
Guy Schalnat0d580581995-07-20 02:43:20 -0500634
Guy Schalnate5a37791996-06-05 15:50:50 -0500635/* This function returns a pointer to the io_ptr associated with the user
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600636 * functions. The application should free any memory associated with this
637 * pointer before png_write_destroy() or png_read_destroy() are called.
638 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500639png_voidp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600640png_get_io_ptr(png_const_structrp png_ptr)
Guy Schalnate5a37791996-06-05 15:50:50 -0500641{
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500642 if (png_ptr == NULL)
643 return (NULL);
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500644
Glenn Randers-Pehrsonb2120021998-01-31 20:07:59 -0600645 return (png_ptr->io_ptr);
Guy Schalnate5a37791996-06-05 15:50:50 -0500646}
Andreas Dilger47a0c421997-05-16 02:46:07 -0500647
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -0600648#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600649# ifdef PNG_STDIO_SUPPORTED
Andreas Dilger47a0c421997-05-16 02:46:07 -0500650/* Initialize the default input/output functions for the PNG file. If you
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600651 * use your own read or write routines, you can call either png_set_read_fn()
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500652 * or png_set_write_fn() instead of png_init_io(). If you have defined
Glenn Randers-Pehrsonce775cc2011-07-13 06:28:26 -0500653 * PNG_NO_STDIO or otherwise disabled PNG_STDIO_SUPPORTED, you must use a
654 * function of your own because "FILE *" isn't necessarily available.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600655 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500656void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600657png_init_io(png_structrp png_ptr, png_FILE_p fp)
Guy Schalnate5a37791996-06-05 15:50:50 -0500658{
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500659 png_debug(1, "in png_init_io");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500660
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500661 if (png_ptr == NULL)
662 return;
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500663
Guy Schalnate5a37791996-06-05 15:50:50 -0500664 png_ptr->io_ptr = (png_voidp)fp;
665}
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600666# endif
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500667
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600668#ifdef PNG_SAVE_INT_32_SUPPORTED
669/* The png_save_int_32 function assumes integers are stored in two's
670 * complement format. If this isn't the case, then this routine needs to
671 * be modified to write data in two's complement format. Note that,
672 * the following works correctly even if png_int_32 has more than 32 bits
673 * (compare the more complex code required on read for sign extension.)
674 */
675void PNGAPI
676png_save_int_32(png_bytep buf, png_int_32 i)
677{
678 buf[0] = (png_byte)((i >> 24) & 0xff);
679 buf[1] = (png_byte)((i >> 16) & 0xff);
680 buf[2] = (png_byte)((i >> 8) & 0xff);
681 buf[3] = (png_byte)(i & 0xff);
682}
683#endif
684
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600685# ifdef PNG_TIME_RFC1123_SUPPORTED
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500686/* Convert the supplied time into an RFC 1123 string suitable for use in
687 * a "Creation Time" or other text-based time string.
688 */
John Bowler40b26032011-12-22 08:09:15 -0600689int PNGAPI
690png_convert_to_rfc1123_buffer(char out[29], png_const_timep ptime)
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500691{
692 static PNG_CONST char short_months[12][4] =
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600693 {"Jan", "Feb", "Mar", "Apr", "May", "Jun",
694 "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"};
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500695
John Bowler40b26032011-12-22 08:09:15 -0600696 if (out == NULL)
697 return 0;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500698
Glenn Randers-Pehrson925a6022011-11-19 18:04:01 -0600699 if (ptime->year > 9999 /* RFC1123 limitation */ ||
700 ptime->month == 0 || ptime->month > 12 ||
701 ptime->day == 0 || ptime->day > 31 ||
702 ptime->hour > 23 || ptime->minute > 59 ||
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600703 ptime->second > 60)
John Bowler40b26032011-12-22 08:09:15 -0600704 return 0;
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600705
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500706 {
John Bowler88b77cc2011-05-05 06:49:55 -0500707 size_t pos = 0;
Glenn Randers-Pehrson925a6022011-11-19 18:04:01 -0600708 char number_buf[5]; /* enough for a four-digit year */
John Bowler88b77cc2011-05-05 06:49:55 -0500709
John Bowler40b26032011-12-22 08:09:15 -0600710# define APPEND_STRING(string) pos = png_safecat(out, 29, pos, (string))
John Bowler88b77cc2011-05-05 06:49:55 -0500711# define APPEND_NUMBER(format, value)\
712 APPEND_STRING(PNG_FORMAT_NUMBER(number_buf, format, (value)))
John Bowler40b26032011-12-22 08:09:15 -0600713# define APPEND(ch) if (pos < 28) out[pos++] = (ch)
Glenn Randers-Pehrsonaf855e42011-05-07 10:52:49 -0500714
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600715 APPEND_NUMBER(PNG_NUMBER_FORMAT_u, (unsigned)ptime->day);
John Bowler88b77cc2011-05-05 06:49:55 -0500716 APPEND(' ');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600717 APPEND_STRING(short_months[(ptime->month - 1)]);
John Bowler88b77cc2011-05-05 06:49:55 -0500718 APPEND(' ');
719 APPEND_NUMBER(PNG_NUMBER_FORMAT_u, ptime->year);
720 APPEND(' ');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600721 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->hour);
John Bowler88b77cc2011-05-05 06:49:55 -0500722 APPEND(':');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600723 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->minute);
John Bowler88b77cc2011-05-05 06:49:55 -0500724 APPEND(':');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600725 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->second);
John Bowler88b77cc2011-05-05 06:49:55 -0500726 APPEND_STRING(" +0000"); /* This reliably terminates the buffer */
727
728# undef APPEND
729# undef APPEND_NUMBER
730# undef APPEND_STRING
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500731 }
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500732
John Bowler40b26032011-12-22 08:09:15 -0600733 return 1;
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500734}
John Bowler40b26032011-12-22 08:09:15 -0600735
736# if PNG_LIBPNG_VER < 10700
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600737/* To do: remove the following from libpng-1.7 */
John Bowler40b26032011-12-22 08:09:15 -0600738/* Original API that uses a private buffer in png_struct.
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600739 * Deprecated because it causes png_struct to carry a spurious temporary
John Bowler40b26032011-12-22 08:09:15 -0600740 * buffer (png_struct::time_buffer), better to have the caller pass this in.
741 */
742png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600743png_convert_to_rfc1123(png_structrp png_ptr, png_const_timep ptime)
John Bowler40b26032011-12-22 08:09:15 -0600744{
745 if (png_ptr != NULL)
746 {
747 /* The only failure above if png_ptr != NULL is from an invalid ptime */
748 if (!png_convert_to_rfc1123_buffer(png_ptr->time_buffer, ptime))
749 png_warning(png_ptr, "Ignoring invalid time value");
750
751 else
752 return png_ptr->time_buffer;
753 }
754
755 return NULL;
756}
757# endif
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600758# endif /* PNG_TIME_RFC1123_SUPPORTED */
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600759
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -0600760#endif /* defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED) */
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600761
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500762png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600763png_get_copyright(png_const_structrp png_ptr)
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600764{
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600765 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500766#ifdef PNG_STRING_COPYRIGHT
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600767 return PNG_STRING_COPYRIGHT
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500768#else
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600769# ifdef __STDC__
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500770 return PNG_STRING_NEWLINE \
Glenn Randers-Pehrson6b9a20e2014-10-29 09:10:15 -0500771 "libpng version 1.6.15beta02 - October 29, 2014" PNG_STRING_NEWLINE \
Glenn Randers-Pehrson95a19732013-12-31 21:10:13 -0600772 "Copyright (c) 1998-2014 Glenn Randers-Pehrson" PNG_STRING_NEWLINE \
Glenn Randers-Pehrson43aaf6e2008-08-05 22:17:03 -0500773 "Copyright (c) 1996-1997 Andreas Dilger" PNG_STRING_NEWLINE \
774 "Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc." \
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500775 PNG_STRING_NEWLINE;
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600776# else
Glenn Randers-Pehrson6b9a20e2014-10-29 09:10:15 -0500777 return "libpng version 1.6.15beta02 - October 29, 2014\
Glenn Randers-Pehrson95a19732013-12-31 21:10:13 -0600778 Copyright (c) 1998-2014 Glenn Randers-Pehrson\
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500779 Copyright (c) 1996-1997 Andreas Dilger\
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500780 Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc.";
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600781# endif
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500782#endif
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600783}
Glenn Randers-Pehrsonbcfd15d1999-10-01 14:22:25 -0500784
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600785/* The following return the library version as a short string in the
Glenn Randers-Pehrson5b5dcf82004-07-17 22:45:44 -0500786 * format 1.0.0 through 99.99.99zz. To get the version of *.h files
787 * used with your application, print out PNG_LIBPNG_VER_STRING, which
788 * is defined in png.h.
789 * Note: now there is no difference between png_get_libpng_ver() and
790 * png_get_header_ver(). Due to the version_nn_nn_nn typedef guard,
791 * it is guaranteed that png.c uses the correct version of png.h.
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600792 */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500793png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600794png_get_libpng_ver(png_const_structrp png_ptr)
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600795{
796 /* Version of *.c files used when building libpng */
Glenn Randers-Pehrson4c8f7262010-03-16 19:30:01 -0500797 return png_get_header_ver(png_ptr);
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600798}
799
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500800png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600801png_get_header_ver(png_const_structrp png_ptr)
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600802{
803 /* Version of *.h files used when building libpng */
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600804 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500805 return PNG_LIBPNG_VER_STRING;
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600806}
807
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500808png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600809png_get_header_version(png_const_structrp png_ptr)
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600810{
811 /* Returns longer string containing both version and date */
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600812 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500813#ifdef __STDC__
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500814 return PNG_HEADER_VERSION_STRING
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600815# ifndef PNG_READ_SUPPORTED
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500816 " (NO READ SUPPORT)"
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600817# endif
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500818 PNG_STRING_NEWLINE;
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500819#else
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500820 return PNG_HEADER_VERSION_STRING;
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500821#endif
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600822}
823
John Bowlerc10930a2013-12-19 15:24:06 -0600824#ifdef PNG_BUILD_GRAYSCALE_PALETTE_SUPPORTED
825/* NOTE: this routine is not used internally! */
826/* Build a grayscale palette. Palette is assumed to be 1 << bit_depth
827 * large of png_color. This lets grayscale images be treated as
828 * paletted. Most useful for gamma correction and simplification
829 * of code. This API is not used internally.
830 */
831void PNGAPI
832png_build_grayscale_palette(int bit_depth, png_colorp palette)
833{
834 int num_palette;
835 int color_inc;
836 int i;
837 int v;
838
839 png_debug(1, "in png_do_build_grayscale_palette");
840
841 if (palette == NULL)
842 return;
843
844 switch (bit_depth)
845 {
846 case 1:
847 num_palette = 2;
848 color_inc = 0xff;
849 break;
850
851 case 2:
852 num_palette = 4;
853 color_inc = 0x55;
854 break;
855
856 case 4:
857 num_palette = 16;
858 color_inc = 0x11;
859 break;
860
861 case 8:
862 num_palette = 256;
863 color_inc = 1;
864 break;
865
866 default:
867 num_palette = 0;
868 color_inc = 0;
869 break;
870 }
871
872 for (i = 0, v = 0; i < num_palette; i++, v += color_inc)
873 {
874 palette[i].red = (png_byte)v;
875 palette[i].green = (png_byte)v;
876 palette[i].blue = (png_byte)v;
877 }
878}
879#endif
880
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600881#ifdef PNG_SET_UNKNOWN_CHUNKS_SUPPORTED
Glenn Randers-Pehrsonc1bfe682002-03-06 22:08:00 -0600882int PNGAPI
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600883png_handle_as_unknown(png_const_structrp png_ptr, png_const_bytep chunk_name)
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600884{
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500885 /* Check chunk_name and return "keep" value if it's on the list, else 0 */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500886 png_const_bytep p, p_end;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500887
John Bowlerfcd301d2011-12-28 21:34:27 -0600888 if (png_ptr == NULL || chunk_name == NULL || png_ptr->num_chunk_list == 0)
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500889 return PNG_HANDLE_CHUNK_AS_DEFAULT;
890
891 p_end = png_ptr->chunk_list;
892 p = p_end + png_ptr->num_chunk_list*5; /* beyond end */
893
894 /* The code is the fifth byte after each four byte string. Historically this
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600895 * code was always searched from the end of the list, this is no longer
896 * necessary because the 'set' routine handles duplicate entries correcty.
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500897 */
898 do /* num_chunk_list > 0, so at least one */
899 {
900 p -= 5;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600901
902 if (!memcmp(chunk_name, p, 4))
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500903 return p[4];
904 }
905 while (p > p_end);
906
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600907 /* This means that known chunks should be processed and unknown chunks should
908 * be handled according to the value of png_ptr->unknown_default; this can be
909 * confusing because, as a result, there are two levels of defaulting for
910 * unknown chunks.
911 */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500912 return PNG_HANDLE_CHUNK_AS_DEFAULT;
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600913}
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500914
John Bowler15a80442013-09-21 10:06:32 -0500915#if defined(PNG_READ_UNKNOWN_CHUNKS_SUPPORTED) ||\
916 defined(PNG_HANDLE_AS_UNKNOWN_SUPPORTED)
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500917int /* PRIVATE */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600918png_chunk_unknown_handling(png_const_structrp png_ptr, png_uint_32 chunk_name)
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500919{
920 png_byte chunk_string[5];
921
922 PNG_CSTRING_FROM_CHUNK(chunk_string, chunk_name);
923 return png_handle_as_unknown(png_ptr, chunk_string);
924}
John Bowler15a80442013-09-21 10:06:32 -0500925#endif /* READ_UNKNOWN_CHUNKS || HANDLE_AS_UNKNOWN */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600926#endif /* SET_UNKNOWN_CHUNKS */
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500927
Glenn Randers-Pehrsonf10fa3c2010-04-29 08:25:29 -0500928#ifdef PNG_READ_SUPPORTED
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500929/* This function, added to libpng-1.0.6g, is untested. */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500930int PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600931png_reset_zstream(png_structrp png_ptr)
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500932{
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500933 if (png_ptr == NULL)
934 return Z_STREAM_ERROR;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500935
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600936 /* WARNING: this resets the window bits to the maximum! */
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500937 return (inflateReset(&png_ptr->zstream));
938}
Glenn Randers-Pehrson2b8bef12010-04-29 11:50:24 -0500939#endif /* PNG_READ_SUPPORTED */
Glenn Randers-Pehrson1ef65b62000-05-12 06:19:53 -0500940
Glenn Randers-Pehrson5e5c1e12000-11-10 12:26:19 -0600941/* This function was added to libpng-1.0.7 */
Glenn Randers-Pehrson1ef65b62000-05-12 06:19:53 -0500942png_uint_32 PNGAPI
943png_access_version_number(void)
944{
945 /* Version of *.c files used when building libpng */
Glenn Randers-Pehrsond2332872010-10-12 19:19:28 -0500946 return((png_uint_32)PNG_LIBPNG_VER);
Glenn Randers-Pehrson1ef65b62000-05-12 06:19:53 -0500947}
Glenn Randers-Pehrson231e6872001-01-12 15:13:06 -0600948
Glenn Randers-Pehrson1fd5fb32001-05-06 05:34:26 -0500949
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500950
951#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600952/* Ensure that png_ptr->zstream.msg holds some appropriate error message string.
953 * If it doesn't 'ret' is used to set it to something appropriate, even in cases
954 * like Z_OK or Z_STREAM_END where the error code is apparently a success code.
955 */
956void /* PRIVATE */
957png_zstream_error(png_structrp png_ptr, int ret)
958{
959 /* Translate 'ret' into an appropriate error string, priority is given to the
960 * one in zstream if set. This always returns a string, even in cases like
961 * Z_OK or Z_STREAM_END where the error code is a success code.
962 */
963 if (png_ptr->zstream.msg == NULL) switch (ret)
964 {
965 default:
966 case Z_OK:
967 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected zlib return code");
968 break;
969
970 case Z_STREAM_END:
971 /* Normal exit */
972 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected end of LZ stream");
973 break;
974
975 case Z_NEED_DICT:
976 /* This means the deflate stream did not have a dictionary; this
977 * indicates a bogus PNG.
978 */
979 png_ptr->zstream.msg = PNGZ_MSG_CAST("missing LZ dictionary");
980 break;
981
982 case Z_ERRNO:
983 /* gz APIs only: should not happen */
984 png_ptr->zstream.msg = PNGZ_MSG_CAST("zlib IO error");
985 break;
986
987 case Z_STREAM_ERROR:
988 /* internal libpng error */
989 png_ptr->zstream.msg = PNGZ_MSG_CAST("bad parameters to zlib");
990 break;
991
992 case Z_DATA_ERROR:
993 png_ptr->zstream.msg = PNGZ_MSG_CAST("damaged LZ stream");
994 break;
995
996 case Z_MEM_ERROR:
997 png_ptr->zstream.msg = PNGZ_MSG_CAST("insufficient memory");
998 break;
999
1000 case Z_BUF_ERROR:
1001 /* End of input or output; not a problem if the caller is doing
1002 * incremental read or write.
1003 */
1004 png_ptr->zstream.msg = PNGZ_MSG_CAST("truncated");
1005 break;
1006
1007 case Z_VERSION_ERROR:
1008 png_ptr->zstream.msg = PNGZ_MSG_CAST("unsupported zlib version");
1009 break;
1010
1011 case PNG_UNEXPECTED_ZLIB_RETURN:
1012 /* Compile errors here mean that zlib now uses the value co-opted in
1013 * pngpriv.h for PNG_UNEXPECTED_ZLIB_RETURN; update the switch above
1014 * and change pngpriv.h. Note that this message is "... return",
1015 * whereas the default/Z_OK one is "... return code".
1016 */
1017 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected zlib return");
1018 break;
1019 }
1020}
1021
John Bowler736f40f2011-08-25 16:19:44 -05001022/* png_convert_size: a PNGAPI but no longer in png.h, so deleted
1023 * at libpng 1.5.5!
1024 */
Glenn Randers-Pehrsonf7831012008-11-13 06:05:13 -06001025
Glenn Randers-Pehrson02a5e332008-11-24 22:10:23 -06001026/* Added at libpng version 1.2.34 and 1.4.0 (moved from pngset.c) */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001027#ifdef PNG_GAMMA_SUPPORTED /* always set if COLORSPACE */
1028static int
1029png_colorspace_check_gamma(png_const_structrp png_ptr,
1030 png_colorspacerp colorspace, png_fixed_point gAMA, int from)
1031 /* This is called to check a new gamma value against an existing one. The
1032 * routine returns false if the new gamma value should not be written.
1033 *
1034 * 'from' says where the new gamma value comes from:
1035 *
1036 * 0: the new gamma value is the libpng estimate for an ICC profile
1037 * 1: the new gamma value comes from a gAMA chunk
1038 * 2: the new gamma value comes from an sRGB chunk
John Bowlerb98681b2012-09-04 11:19:00 -05001039 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001040{
1041 png_fixed_point gtest;
1042
1043 if ((colorspace->flags & PNG_COLORSPACE_HAVE_GAMMA) != 0 &&
1044 (!png_muldiv(&gtest, colorspace->gamma, PNG_FP_1, gAMA) ||
1045 png_gamma_significant(gtest)))
John Bowlerb11b31a2012-03-21 07:55:46 -05001046 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001047 /* Either this is an sRGB image, in which case the calculated gamma
1048 * approximation should match, or this is an image with a profile and the
1049 * value libpng calculates for the gamma of the profile does not match the
1050 * value recorded in the file. The former, sRGB, case is an error, the
1051 * latter is just a warning.
1052 */
1053 if ((colorspace->flags & PNG_COLORSPACE_FROM_sRGB) != 0 || from == 2)
1054 {
1055 png_chunk_report(png_ptr, "gamma value does not match sRGB",
1056 PNG_CHUNK_ERROR);
1057 /* Do not overwrite an sRGB value */
1058 return from == 2;
1059 }
1060
1061 else /* sRGB tag not involved */
1062 {
1063 png_chunk_report(png_ptr, "gamma value does not match libpng estimate",
1064 PNG_CHUNK_WARNING);
1065 return from == 1;
1066 }
John Bowlerb11b31a2012-03-21 07:55:46 -05001067 }
1068
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001069 return 1;
John Bowlerb11b31a2012-03-21 07:55:46 -05001070}
1071
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001072void /* PRIVATE */
1073png_colorspace_set_gamma(png_const_structrp png_ptr,
1074 png_colorspacerp colorspace, png_fixed_point gAMA)
1075{
1076 /* Changed in libpng-1.5.4 to limit the values to ensure overflow can't
1077 * occur. Since the fixed point representation is assymetrical it is
1078 * possible for 1/gamma to overflow the limit of 21474 and this means the
1079 * gamma value must be at least 5/100000 and hence at most 20000.0. For
1080 * safety the limits here are a little narrower. The values are 0.00016 to
1081 * 6250.0, which are truly ridiculous gamma values (and will produce
1082 * displays that are all black or all white.)
1083 *
1084 * In 1.6.0 this test replaces the ones in pngrutil.c, in the gAMA chunk
1085 * handling code, which only required the value to be >0.
1086 */
1087 png_const_charp errmsg;
1088
1089 if (gAMA < 16 || gAMA > 625000000)
1090 errmsg = "gamma value out of range";
1091
1092# ifdef PNG_READ_gAMA_SUPPORTED
1093 /* Allow the application to set the gamma value more than once */
1094 else if ((png_ptr->mode & PNG_IS_READ_STRUCT) != 0 &&
1095 (colorspace->flags & PNG_COLORSPACE_FROM_gAMA) != 0)
1096 errmsg = "duplicate";
1097# endif
1098
1099 /* Do nothing if the colorspace is already invalid */
1100 else if (colorspace->flags & PNG_COLORSPACE_INVALID)
1101 return;
1102
1103 else
1104 {
1105 if (png_colorspace_check_gamma(png_ptr, colorspace, gAMA, 1/*from gAMA*/))
1106 {
1107 /* Store this gamma value. */
1108 colorspace->gamma = gAMA;
1109 colorspace->flags |=
1110 (PNG_COLORSPACE_HAVE_GAMMA | PNG_COLORSPACE_FROM_gAMA);
1111 }
1112
1113 /* At present if the check_gamma test fails the gamma of the colorspace is
1114 * not updated however the colorspace is not invalidated. This
1115 * corresponds to the case where the existing gamma comes from an sRGB
1116 * chunk or profile. An error message has already been output.
1117 */
1118 return;
1119 }
1120
1121 /* Error exit - errmsg has been set. */
1122 colorspace->flags |= PNG_COLORSPACE_INVALID;
1123 png_chunk_report(png_ptr, errmsg, PNG_CHUNK_WRITE_ERROR);
1124}
1125
1126void /* PRIVATE */
1127png_colorspace_sync_info(png_const_structrp png_ptr, png_inforp info_ptr)
1128{
1129 if (info_ptr->colorspace.flags & PNG_COLORSPACE_INVALID)
1130 {
1131 /* Everything is invalid */
1132 info_ptr->valid &= ~(PNG_INFO_gAMA|PNG_INFO_cHRM|PNG_INFO_sRGB|
1133 PNG_INFO_iCCP);
1134
1135# ifdef PNG_COLORSPACE_SUPPORTED
1136 /* Clean up the iCCP profile now if it won't be used. */
1137 png_free_data(png_ptr, info_ptr, PNG_FREE_ICCP, -1/*not used*/);
1138# else
1139 PNG_UNUSED(png_ptr)
1140# endif
1141 }
1142
1143 else
1144 {
1145# ifdef PNG_COLORSPACE_SUPPORTED
1146 /* Leave the INFO_iCCP flag set if the pngset.c code has already set
1147 * it; this allows a PNG to contain a profile which matches sRGB and
1148 * yet still have that profile retrievable by the application.
1149 */
1150 if (info_ptr->colorspace.flags & PNG_COLORSPACE_MATCHES_sRGB)
1151 info_ptr->valid |= PNG_INFO_sRGB;
1152
1153 else
1154 info_ptr->valid &= ~PNG_INFO_sRGB;
1155
1156 if (info_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_ENDPOINTS)
1157 info_ptr->valid |= PNG_INFO_cHRM;
1158
1159 else
1160 info_ptr->valid &= ~PNG_INFO_cHRM;
1161# endif
1162
1163 if (info_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_GAMMA)
1164 info_ptr->valid |= PNG_INFO_gAMA;
1165
1166 else
1167 info_ptr->valid &= ~PNG_INFO_gAMA;
1168 }
1169}
1170
1171#ifdef PNG_READ_SUPPORTED
1172void /* PRIVATE */
1173png_colorspace_sync(png_const_structrp png_ptr, png_inforp info_ptr)
1174{
1175 if (info_ptr == NULL) /* reduce code size; check here not in the caller */
1176 return;
1177
1178 info_ptr->colorspace = png_ptr->colorspace;
1179 png_colorspace_sync_info(png_ptr, info_ptr);
1180}
1181#endif
1182#endif
1183
1184#ifdef PNG_COLORSPACE_SUPPORTED
John Bowler736f40f2011-08-25 16:19:44 -05001185/* Added at libpng-1.5.5 to support read and write of true CIEXYZ values for
1186 * cHRM, as opposed to using chromaticities. These internal APIs return
1187 * non-zero on a parameter error. The X, Y and Z values are required to be
1188 * positive and less than 1.0.
1189 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001190static int
1191png_xy_from_XYZ(png_xy *xy, const png_XYZ *XYZ)
John Bowler736f40f2011-08-25 16:19:44 -05001192{
1193 png_int_32 d, dwhite, whiteX, whiteY;
1194
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001195 d = XYZ->red_X + XYZ->red_Y + XYZ->red_Z;
1196 if (!png_muldiv(&xy->redx, XYZ->red_X, PNG_FP_1, d)) return 1;
1197 if (!png_muldiv(&xy->redy, XYZ->red_Y, PNG_FP_1, d)) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001198 dwhite = d;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001199 whiteX = XYZ->red_X;
1200 whiteY = XYZ->red_Y;
John Bowler736f40f2011-08-25 16:19:44 -05001201
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001202 d = XYZ->green_X + XYZ->green_Y + XYZ->green_Z;
1203 if (!png_muldiv(&xy->greenx, XYZ->green_X, PNG_FP_1, d)) return 1;
1204 if (!png_muldiv(&xy->greeny, XYZ->green_Y, PNG_FP_1, d)) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001205 dwhite += d;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001206 whiteX += XYZ->green_X;
1207 whiteY += XYZ->green_Y;
John Bowler736f40f2011-08-25 16:19:44 -05001208
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001209 d = XYZ->blue_X + XYZ->blue_Y + XYZ->blue_Z;
1210 if (!png_muldiv(&xy->bluex, XYZ->blue_X, PNG_FP_1, d)) return 1;
1211 if (!png_muldiv(&xy->bluey, XYZ->blue_Y, PNG_FP_1, d)) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001212 dwhite += d;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001213 whiteX += XYZ->blue_X;
1214 whiteY += XYZ->blue_Y;
John Bowler736f40f2011-08-25 16:19:44 -05001215
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001216 /* The reference white is simply the sum of the end-point (X,Y,Z) vectors,
John Bowler736f40f2011-08-25 16:19:44 -05001217 * thus:
1218 */
1219 if (!png_muldiv(&xy->whitex, whiteX, PNG_FP_1, dwhite)) return 1;
1220 if (!png_muldiv(&xy->whitey, whiteY, PNG_FP_1, dwhite)) return 1;
1221
1222 return 0;
1223}
1224
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001225static int
1226png_XYZ_from_xy(png_XYZ *XYZ, const png_xy *xy)
John Bowler736f40f2011-08-25 16:19:44 -05001227{
1228 png_fixed_point red_inverse, green_inverse, blue_scale;
1229 png_fixed_point left, right, denominator;
1230
1231 /* Check xy and, implicitly, z. Note that wide gamut color spaces typically
1232 * have end points with 0 tristimulus values (these are impossible end
1233 * points, but they are used to cover the possible colors.)
1234 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001235 if (xy->redx < 0 || xy->redx > PNG_FP_1) return 1;
1236 if (xy->redy < 0 || xy->redy > PNG_FP_1-xy->redx) return 1;
1237 if (xy->greenx < 0 || xy->greenx > PNG_FP_1) return 1;
1238 if (xy->greeny < 0 || xy->greeny > PNG_FP_1-xy->greenx) return 1;
1239 if (xy->bluex < 0 || xy->bluex > PNG_FP_1) return 1;
1240 if (xy->bluey < 0 || xy->bluey > PNG_FP_1-xy->bluex) return 1;
1241 if (xy->whitex < 0 || xy->whitex > PNG_FP_1) return 1;
1242 if (xy->whitey < 0 || xy->whitey > PNG_FP_1-xy->whitex) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001243
1244 /* The reverse calculation is more difficult because the original tristimulus
1245 * value had 9 independent values (red,green,blue)x(X,Y,Z) however only 8
1246 * derived values were recorded in the cHRM chunk;
1247 * (red,green,blue,white)x(x,y). This loses one degree of freedom and
1248 * therefore an arbitrary ninth value has to be introduced to undo the
1249 * original transformations.
1250 *
1251 * Think of the original end-points as points in (X,Y,Z) space. The
1252 * chromaticity values (c) have the property:
1253 *
1254 * C
1255 * c = ---------
1256 * X + Y + Z
1257 *
1258 * For each c (x,y,z) from the corresponding original C (X,Y,Z). Thus the
1259 * three chromaticity values (x,y,z) for each end-point obey the
1260 * relationship:
1261 *
1262 * x + y + z = 1
1263 *
1264 * This describes the plane in (X,Y,Z) space that intersects each axis at the
1265 * value 1.0; call this the chromaticity plane. Thus the chromaticity
1266 * calculation has scaled each end-point so that it is on the x+y+z=1 plane
1267 * and chromaticity is the intersection of the vector from the origin to the
1268 * (X,Y,Z) value with the chromaticity plane.
1269 *
1270 * To fully invert the chromaticity calculation we would need the three
1271 * end-point scale factors, (red-scale, green-scale, blue-scale), but these
1272 * were not recorded. Instead we calculated the reference white (X,Y,Z) and
1273 * recorded the chromaticity of this. The reference white (X,Y,Z) would have
1274 * given all three of the scale factors since:
1275 *
1276 * color-C = color-c * color-scale
1277 * white-C = red-C + green-C + blue-C
1278 * = red-c*red-scale + green-c*green-scale + blue-c*blue-scale
1279 *
1280 * But cHRM records only white-x and white-y, so we have lost the white scale
1281 * factor:
1282 *
1283 * white-C = white-c*white-scale
1284 *
1285 * To handle this the inverse transformation makes an arbitrary assumption
1286 * about white-scale:
1287 *
1288 * Assume: white-Y = 1.0
1289 * Hence: white-scale = 1/white-y
1290 * Or: red-Y + green-Y + blue-Y = 1.0
1291 *
1292 * Notice the last statement of the assumption gives an equation in three of
1293 * the nine values we want to calculate. 8 more equations come from the
1294 * above routine as summarised at the top above (the chromaticity
1295 * calculation):
1296 *
1297 * Given: color-x = color-X / (color-X + color-Y + color-Z)
1298 * Hence: (color-x - 1)*color-X + color.x*color-Y + color.x*color-Z = 0
1299 *
1300 * This is 9 simultaneous equations in the 9 variables "color-C" and can be
1301 * solved by Cramer's rule. Cramer's rule requires calculating 10 9x9 matrix
1302 * determinants, however this is not as bad as it seems because only 28 of
1303 * the total of 90 terms in the various matrices are non-zero. Nevertheless
1304 * Cramer's rule is notoriously numerically unstable because the determinant
1305 * calculation involves the difference of large, but similar, numbers. It is
1306 * difficult to be sure that the calculation is stable for real world values
1307 * and it is certain that it becomes unstable where the end points are close
1308 * together.
1309 *
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001310 * So this code uses the perhaps slightly less optimal but more
1311 * understandable and totally obvious approach of calculating color-scale.
John Bowler736f40f2011-08-25 16:19:44 -05001312 *
1313 * This algorithm depends on the precision in white-scale and that is
1314 * (1/white-y), so we can immediately see that as white-y approaches 0 the
1315 * accuracy inherent in the cHRM chunk drops off substantially.
1316 *
1317 * libpng arithmetic: a simple invertion of the above equations
1318 * ------------------------------------------------------------
1319 *
1320 * white_scale = 1/white-y
1321 * white-X = white-x * white-scale
1322 * white-Y = 1.0
1323 * white-Z = (1 - white-x - white-y) * white_scale
1324 *
1325 * white-C = red-C + green-C + blue-C
1326 * = red-c*red-scale + green-c*green-scale + blue-c*blue-scale
1327 *
1328 * This gives us three equations in (red-scale,green-scale,blue-scale) where
1329 * all the coefficients are now known:
1330 *
1331 * red-x*red-scale + green-x*green-scale + blue-x*blue-scale
1332 * = white-x/white-y
1333 * red-y*red-scale + green-y*green-scale + blue-y*blue-scale = 1
1334 * red-z*red-scale + green-z*green-scale + blue-z*blue-scale
1335 * = (1 - white-x - white-y)/white-y
1336 *
1337 * In the last equation color-z is (1 - color-x - color-y) so we can add all
1338 * three equations together to get an alternative third:
1339 *
1340 * red-scale + green-scale + blue-scale = 1/white-y = white-scale
1341 *
1342 * So now we have a Cramer's rule solution where the determinants are just
1343 * 3x3 - far more tractible. Unfortunately 3x3 determinants still involve
1344 * multiplication of three coefficients so we can't guarantee to avoid
1345 * overflow in the libpng fixed point representation. Using Cramer's rule in
1346 * floating point is probably a good choice here, but it's not an option for
1347 * fixed point. Instead proceed to simplify the first two equations by
1348 * eliminating what is likely to be the largest value, blue-scale:
1349 *
1350 * blue-scale = white-scale - red-scale - green-scale
1351 *
1352 * Hence:
1353 *
1354 * (red-x - blue-x)*red-scale + (green-x - blue-x)*green-scale =
1355 * (white-x - blue-x)*white-scale
1356 *
1357 * (red-y - blue-y)*red-scale + (green-y - blue-y)*green-scale =
1358 * 1 - blue-y*white-scale
1359 *
1360 * And now we can trivially solve for (red-scale,green-scale):
1361 *
1362 * green-scale =
1363 * (white-x - blue-x)*white-scale - (red-x - blue-x)*red-scale
1364 * -----------------------------------------------------------
1365 * green-x - blue-x
1366 *
1367 * red-scale =
1368 * 1 - blue-y*white-scale - (green-y - blue-y) * green-scale
1369 * ---------------------------------------------------------
1370 * red-y - blue-y
1371 *
1372 * Hence:
1373 *
1374 * red-scale =
1375 * ( (green-x - blue-x) * (white-y - blue-y) -
1376 * (green-y - blue-y) * (white-x - blue-x) ) / white-y
1377 * -------------------------------------------------------------------------
1378 * (green-x - blue-x)*(red-y - blue-y)-(green-y - blue-y)*(red-x - blue-x)
1379 *
1380 * green-scale =
1381 * ( (red-y - blue-y) * (white-x - blue-x) -
1382 * (red-x - blue-x) * (white-y - blue-y) ) / white-y
1383 * -------------------------------------------------------------------------
1384 * (green-x - blue-x)*(red-y - blue-y)-(green-y - blue-y)*(red-x - blue-x)
1385 *
1386 * Accuracy:
1387 * The input values have 5 decimal digits of accuracy. The values are all in
1388 * the range 0 < value < 1, so simple products are in the same range but may
1389 * need up to 10 decimal digits to preserve the original precision and avoid
1390 * underflow. Because we are using a 32-bit signed representation we cannot
1391 * match this; the best is a little over 9 decimal digits, less than 10.
1392 *
1393 * The approach used here is to preserve the maximum precision within the
1394 * signed representation. Because the red-scale calculation above uses the
1395 * difference between two products of values that must be in the range -1..+1
1396 * it is sufficient to divide the product by 7; ceil(100,000/32767*2). The
1397 * factor is irrelevant in the calculation because it is applied to both
1398 * numerator and denominator.
1399 *
1400 * Note that the values of the differences of the products of the
1401 * chromaticities in the above equations tend to be small, for example for
1402 * the sRGB chromaticities they are:
1403 *
1404 * red numerator: -0.04751
1405 * green numerator: -0.08788
1406 * denominator: -0.2241 (without white-y multiplication)
1407 *
1408 * The resultant Y coefficients from the chromaticities of some widely used
1409 * color space definitions are (to 15 decimal places):
1410 *
1411 * sRGB
1412 * 0.212639005871510 0.715168678767756 0.072192315360734
1413 * Kodak ProPhoto
1414 * 0.288071128229293 0.711843217810102 0.000085653960605
1415 * Adobe RGB
1416 * 0.297344975250536 0.627363566255466 0.075291458493998
1417 * Adobe Wide Gamut RGB
1418 * 0.258728243040113 0.724682314948566 0.016589442011321
1419 */
1420 /* By the argument, above overflow should be impossible here. The return
1421 * value of 2 indicates an internal error to the caller.
1422 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001423 if (!png_muldiv(&left, xy->greenx-xy->bluex, xy->redy - xy->bluey, 7))
1424 return 2;
1425 if (!png_muldiv(&right, xy->greeny-xy->bluey, xy->redx - xy->bluex, 7))
1426 return 2;
John Bowler736f40f2011-08-25 16:19:44 -05001427 denominator = left - right;
1428
1429 /* Now find the red numerator. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001430 if (!png_muldiv(&left, xy->greenx-xy->bluex, xy->whitey-xy->bluey, 7))
1431 return 2;
1432 if (!png_muldiv(&right, xy->greeny-xy->bluey, xy->whitex-xy->bluex, 7))
1433 return 2;
John Bowler736f40f2011-08-25 16:19:44 -05001434
1435 /* Overflow is possible here and it indicates an extreme set of PNG cHRM
1436 * chunk values. This calculation actually returns the reciprocal of the
1437 * scale value because this allows us to delay the multiplication of white-y
1438 * into the denominator, which tends to produce a small number.
1439 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001440 if (!png_muldiv(&red_inverse, xy->whitey, denominator, left-right) ||
1441 red_inverse <= xy->whitey /* r+g+b scales = white scale */)
John Bowler736f40f2011-08-25 16:19:44 -05001442 return 1;
1443
1444 /* Similarly for green_inverse: */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001445 if (!png_muldiv(&left, xy->redy-xy->bluey, xy->whitex-xy->bluex, 7))
1446 return 2;
1447 if (!png_muldiv(&right, xy->redx-xy->bluex, xy->whitey-xy->bluey, 7))
1448 return 2;
1449 if (!png_muldiv(&green_inverse, xy->whitey, denominator, left-right) ||
1450 green_inverse <= xy->whitey)
John Bowler736f40f2011-08-25 16:19:44 -05001451 return 1;
1452
1453 /* And the blue scale, the checks above guarantee this can't overflow but it
1454 * can still produce 0 for extreme cHRM values.
1455 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001456 blue_scale = png_reciprocal(xy->whitey) - png_reciprocal(red_inverse) -
John Bowler736f40f2011-08-25 16:19:44 -05001457 png_reciprocal(green_inverse);
1458 if (blue_scale <= 0) return 1;
1459
1460
1461 /* And fill in the png_XYZ: */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001462 if (!png_muldiv(&XYZ->red_X, xy->redx, PNG_FP_1, red_inverse)) return 1;
1463 if (!png_muldiv(&XYZ->red_Y, xy->redy, PNG_FP_1, red_inverse)) return 1;
1464 if (!png_muldiv(&XYZ->red_Z, PNG_FP_1 - xy->redx - xy->redy, PNG_FP_1,
John Bowler736f40f2011-08-25 16:19:44 -05001465 red_inverse))
1466 return 1;
1467
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001468 if (!png_muldiv(&XYZ->green_X, xy->greenx, PNG_FP_1, green_inverse))
1469 return 1;
1470 if (!png_muldiv(&XYZ->green_Y, xy->greeny, PNG_FP_1, green_inverse))
1471 return 1;
1472 if (!png_muldiv(&XYZ->green_Z, PNG_FP_1 - xy->greenx - xy->greeny, PNG_FP_1,
John Bowler736f40f2011-08-25 16:19:44 -05001473 green_inverse))
1474 return 1;
1475
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001476 if (!png_muldiv(&XYZ->blue_X, xy->bluex, blue_scale, PNG_FP_1)) return 1;
1477 if (!png_muldiv(&XYZ->blue_Y, xy->bluey, blue_scale, PNG_FP_1)) return 1;
1478 if (!png_muldiv(&XYZ->blue_Z, PNG_FP_1 - xy->bluex - xy->bluey, blue_scale,
John Bowler736f40f2011-08-25 16:19:44 -05001479 PNG_FP_1))
1480 return 1;
1481
1482 return 0; /*success*/
1483}
1484
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001485static int
1486png_XYZ_normalize(png_XYZ *XYZ)
John Bowler736f40f2011-08-25 16:19:44 -05001487{
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001488 png_int_32 Y;
1489
1490 if (XYZ->red_Y < 0 || XYZ->green_Y < 0 || XYZ->blue_Y < 0 ||
1491 XYZ->red_X < 0 || XYZ->green_X < 0 || XYZ->blue_X < 0 ||
1492 XYZ->red_Z < 0 || XYZ->green_Z < 0 || XYZ->blue_Z < 0)
1493 return 1;
1494
1495 /* Normalize by scaling so the sum of the end-point Y values is PNG_FP_1.
1496 * IMPLEMENTATION NOTE: ANSI requires signed overflow not to occur, therefore
1497 * relying on addition of two positive values producing a negative one is not
1498 * safe.
1499 */
1500 Y = XYZ->red_Y;
1501 if (0x7fffffff - Y < XYZ->green_X) return 1;
1502 Y += XYZ->green_Y;
1503 if (0x7fffffff - Y < XYZ->blue_X) return 1;
1504 Y += XYZ->blue_Y;
1505
1506 if (Y != PNG_FP_1)
1507 {
1508 if (!png_muldiv(&XYZ->red_X, XYZ->red_X, PNG_FP_1, Y)) return 1;
1509 if (!png_muldiv(&XYZ->red_Y, XYZ->red_Y, PNG_FP_1, Y)) return 1;
1510 if (!png_muldiv(&XYZ->red_Z, XYZ->red_Z, PNG_FP_1, Y)) return 1;
1511
1512 if (!png_muldiv(&XYZ->green_X, XYZ->green_X, PNG_FP_1, Y)) return 1;
1513 if (!png_muldiv(&XYZ->green_Y, XYZ->green_Y, PNG_FP_1, Y)) return 1;
1514 if (!png_muldiv(&XYZ->green_Z, XYZ->green_Z, PNG_FP_1, Y)) return 1;
1515
1516 if (!png_muldiv(&XYZ->blue_X, XYZ->blue_X, PNG_FP_1, Y)) return 1;
1517 if (!png_muldiv(&XYZ->blue_Y, XYZ->blue_Y, PNG_FP_1, Y)) return 1;
1518 if (!png_muldiv(&XYZ->blue_Z, XYZ->blue_Z, PNG_FP_1, Y)) return 1;
1519 }
1520
1521 return 0;
1522}
1523
1524static int
1525png_colorspace_endpoints_match(const png_xy *xy1, const png_xy *xy2, int delta)
1526{
1527 /* Allow an error of +/-0.01 (absolute value) on each chromaticity */
1528 return !(PNG_OUT_OF_RANGE(xy1->whitex, xy2->whitex,delta) ||
1529 PNG_OUT_OF_RANGE(xy1->whitey, xy2->whitey,delta) ||
1530 PNG_OUT_OF_RANGE(xy1->redx, xy2->redx, delta) ||
1531 PNG_OUT_OF_RANGE(xy1->redy, xy2->redy, delta) ||
1532 PNG_OUT_OF_RANGE(xy1->greenx, xy2->greenx,delta) ||
1533 PNG_OUT_OF_RANGE(xy1->greeny, xy2->greeny,delta) ||
1534 PNG_OUT_OF_RANGE(xy1->bluex, xy2->bluex, delta) ||
1535 PNG_OUT_OF_RANGE(xy1->bluey, xy2->bluey, delta));
1536}
1537
1538/* Added in libpng-1.6.0, a different check for the validity of a set of cHRM
1539 * chunk chromaticities. Earlier checks used to simply look for the overflow
1540 * condition (where the determinant of the matrix to solve for XYZ ends up zero
1541 * because the chromaticity values are not all distinct.) Despite this it is
1542 * theoretically possible to produce chromaticities that are apparently valid
1543 * but that rapidly degrade to invalid, potentially crashing, sets because of
1544 * arithmetic inaccuracies when calculations are performed on them. The new
1545 * check is to round-trip xy -> XYZ -> xy and then check that the result is
1546 * within a small percentage of the original.
1547 */
1548static int
1549png_colorspace_check_xy(png_XYZ *XYZ, const png_xy *xy)
1550{
1551 int result;
1552 png_xy xy_test;
1553
1554 /* As a side-effect this routine also returns the XYZ endpoints. */
1555 result = png_XYZ_from_xy(XYZ, xy);
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06001556 if (result != 0) return result;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001557
1558 result = png_xy_from_XYZ(&xy_test, XYZ);
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06001559 if (result != 0) return result;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001560
1561 if (png_colorspace_endpoints_match(xy, &xy_test,
1562 5/*actually, the math is pretty accurate*/))
1563 return 0;
1564
1565 /* Too much slip */
1566 return 1;
1567}
1568
1569/* This is the check going the other way. The XYZ is modified to normalize it
1570 * (another side-effect) and the xy chromaticities are returned.
1571 */
1572static int
1573png_colorspace_check_XYZ(png_xy *xy, png_XYZ *XYZ)
1574{
1575 int result;
1576 png_XYZ XYZtemp;
1577
1578 result = png_XYZ_normalize(XYZ);
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06001579 if (result != 0) return result;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001580
1581 result = png_xy_from_XYZ(xy, XYZ);
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06001582 if (result != 0) return result;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001583
1584 XYZtemp = *XYZ;
1585 return png_colorspace_check_xy(&XYZtemp, xy);
1586}
1587
1588/* Used to check for an endpoint match against sRGB */
1589static const png_xy sRGB_xy = /* From ITU-R BT.709-3 */
1590{
1591 /* color x y */
1592 /* red */ 64000, 33000,
1593 /* green */ 30000, 60000,
1594 /* blue */ 15000, 6000,
1595 /* white */ 31270, 32900
1596};
1597
1598static int
1599png_colorspace_set_xy_and_XYZ(png_const_structrp png_ptr,
1600 png_colorspacerp colorspace, const png_xy *xy, const png_XYZ *XYZ,
1601 int preferred)
1602{
1603 if (colorspace->flags & PNG_COLORSPACE_INVALID)
1604 return 0;
1605
1606 /* The consistency check is performed on the chromaticities; this factors out
1607 * variations because of the normalization (or not) of the end point Y
1608 * values.
1609 */
1610 if (preferred < 2 && (colorspace->flags & PNG_COLORSPACE_HAVE_ENDPOINTS))
1611 {
1612 /* The end points must be reasonably close to any we already have. The
1613 * following allows an error of up to +/-.001
1614 */
1615 if (!png_colorspace_endpoints_match(xy, &colorspace->end_points_xy, 100))
1616 {
1617 colorspace->flags |= PNG_COLORSPACE_INVALID;
1618 png_benign_error(png_ptr, "inconsistent chromaticities");
1619 return 0; /* failed */
1620 }
1621
1622 /* Only overwrite with preferred values */
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06001623 if (preferred == 0)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001624 return 1; /* ok, but no change */
1625 }
1626
1627 colorspace->end_points_xy = *xy;
1628 colorspace->end_points_XYZ = *XYZ;
1629 colorspace->flags |= PNG_COLORSPACE_HAVE_ENDPOINTS;
1630
1631 /* The end points are normally quoted to two decimal digits, so allow +/-0.01
1632 * on this test.
1633 */
1634 if (png_colorspace_endpoints_match(xy, &sRGB_xy, 1000))
1635 colorspace->flags |= PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB;
1636
1637 else
1638 colorspace->flags &= PNG_COLORSPACE_CANCEL(
1639 PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB);
1640
1641 return 2; /* ok and changed */
1642}
1643
1644int /* PRIVATE */
1645png_colorspace_set_chromaticities(png_const_structrp png_ptr,
1646 png_colorspacerp colorspace, const png_xy *xy, int preferred)
1647{
1648 /* We must check the end points to ensure they are reasonable - in the past
1649 * color management systems have crashed as a result of getting bogus
1650 * colorant values, while this isn't the fault of libpng it is the
1651 * responsibility of libpng because PNG carries the bomb and libpng is in a
1652 * position to protect against it.
1653 */
1654 png_XYZ XYZ;
1655
1656 switch (png_colorspace_check_xy(&XYZ, xy))
John Bowler736f40f2011-08-25 16:19:44 -05001657 {
1658 case 0: /* success */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001659 return png_colorspace_set_xy_and_XYZ(png_ptr, colorspace, xy, &XYZ,
1660 preferred);
John Bowler736f40f2011-08-25 16:19:44 -05001661
1662 case 1:
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001663 /* We can't invert the chromaticities so we can't produce value XYZ
1664 * values. Likely as not a color management system will fail too.
John Bowler736f40f2011-08-25 16:19:44 -05001665 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001666 colorspace->flags |= PNG_COLORSPACE_INVALID;
1667 png_benign_error(png_ptr, "invalid chromaticities");
John Bowler736f40f2011-08-25 16:19:44 -05001668 break;
1669
1670 default:
1671 /* libpng is broken; this should be a warning but if it happens we
1672 * want error reports so for the moment it is an error.
1673 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001674 colorspace->flags |= PNG_COLORSPACE_INVALID;
1675 png_error(png_ptr, "internal error checking chromaticities");
John Bowler736f40f2011-08-25 16:19:44 -05001676 break;
1677 }
1678
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001679 return 0; /* failed */
1680}
1681
1682int /* PRIVATE */
1683png_colorspace_set_endpoints(png_const_structrp png_ptr,
1684 png_colorspacerp colorspace, const png_XYZ *XYZ_in, int preferred)
1685{
1686 png_XYZ XYZ = *XYZ_in;
1687 png_xy xy;
1688
1689 switch (png_colorspace_check_XYZ(&xy, &XYZ))
1690 {
1691 case 0:
1692 return png_colorspace_set_xy_and_XYZ(png_ptr, colorspace, &xy, &XYZ,
1693 preferred);
1694
1695 case 1:
1696 /* End points are invalid. */
1697 colorspace->flags |= PNG_COLORSPACE_INVALID;
1698 png_benign_error(png_ptr, "invalid end points");
1699 break;
1700
1701 default:
1702 colorspace->flags |= PNG_COLORSPACE_INVALID;
1703 png_error(png_ptr, "internal error checking chromaticities");
1704 break;
1705 }
1706
1707 return 0; /* failed */
1708}
1709
1710#if defined(PNG_sRGB_SUPPORTED) || defined(PNG_iCCP_SUPPORTED)
1711/* Error message generation */
1712static char
1713png_icc_tag_char(png_uint_32 byte)
1714{
1715 byte &= 0xff;
1716 if (byte >= 32 && byte <= 126)
1717 return (char)byte;
1718 else
1719 return '?';
1720}
1721
1722static void
1723png_icc_tag_name(char *name, png_uint_32 tag)
1724{
1725 name[0] = '\'';
1726 name[1] = png_icc_tag_char(tag >> 24);
1727 name[2] = png_icc_tag_char(tag >> 16);
1728 name[3] = png_icc_tag_char(tag >> 8);
1729 name[4] = png_icc_tag_char(tag );
1730 name[5] = '\'';
1731}
1732
1733static int
1734is_ICC_signature_char(png_alloc_size_t it)
1735{
1736 return it == 32 || (it >= 48 && it <= 57) || (it >= 65 && it <= 90) ||
1737 (it >= 97 && it <= 122);
1738}
1739
Glenn Randers-Pehrson24afd072014-03-05 16:55:19 -06001740static int
1741is_ICC_signature(png_alloc_size_t it)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001742{
1743 return is_ICC_signature_char(it >> 24) /* checks all the top bits */ &&
1744 is_ICC_signature_char((it >> 16) & 0xff) &&
1745 is_ICC_signature_char((it >> 8) & 0xff) &&
1746 is_ICC_signature_char(it & 0xff);
1747}
1748
1749static int
1750png_icc_profile_error(png_const_structrp png_ptr, png_colorspacerp colorspace,
1751 png_const_charp name, png_alloc_size_t value, png_const_charp reason)
1752{
1753 size_t pos;
1754 char message[196]; /* see below for calculation */
1755
1756 if (colorspace != NULL)
1757 colorspace->flags |= PNG_COLORSPACE_INVALID;
1758
1759 pos = png_safecat(message, (sizeof message), 0, "profile '"); /* 9 chars */
1760 pos = png_safecat(message, pos+79, pos, name); /* Truncate to 79 chars */
1761 pos = png_safecat(message, (sizeof message), pos, "': "); /* +2 = 90 */
1762 if (is_ICC_signature(value))
1763 {
1764 /* So 'value' is at most 4 bytes and the following cast is safe */
1765 png_icc_tag_name(message+pos, (png_uint_32)value);
1766 pos += 6; /* total +8; less than the else clause */
1767 message[pos++] = ':';
1768 message[pos++] = ' ';
1769 }
1770# ifdef PNG_WARNINGS_SUPPORTED
1771 else
1772 {
1773 char number[PNG_NUMBER_BUFFER_SIZE]; /* +24 = 114*/
1774
1775 pos = png_safecat(message, (sizeof message), pos,
1776 png_format_number(number, number+(sizeof number),
1777 PNG_NUMBER_FORMAT_x, value));
1778 pos = png_safecat(message, (sizeof message), pos, "h: "); /*+2 = 116*/
1779 }
1780# endif
1781 /* The 'reason' is an arbitrary message, allow +79 maximum 195 */
1782 pos = png_safecat(message, (sizeof message), pos, reason);
Glenn Randers-Pehrson3f8a2ed2013-11-25 10:38:21 -06001783 PNG_UNUSED(pos)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001784
1785 /* This is recoverable, but make it unconditionally an app_error on write to
1786 * avoid writing invalid ICC profiles into PNG files. (I.e. we handle them
1787 * on read, with a warning, but on write unless the app turns off
1788 * application errors the PNG won't be written.)
1789 */
1790 png_chunk_report(png_ptr, message,
1791 (colorspace != NULL) ? PNG_CHUNK_ERROR : PNG_CHUNK_WRITE_ERROR);
1792
John Bowler736f40f2011-08-25 16:19:44 -05001793 return 0;
1794}
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001795#endif /* sRGB || iCCP */
1796
1797#ifdef PNG_sRGB_SUPPORTED
1798int /* PRIVATE */
1799png_colorspace_set_sRGB(png_const_structrp png_ptr, png_colorspacerp colorspace,
1800 int intent)
1801{
1802 /* sRGB sets known gamma, end points and (from the chunk) intent. */
1803 /* IMPORTANT: these are not necessarily the values found in an ICC profile
1804 * because ICC profiles store values adapted to a D50 environment; it is
1805 * expected that the ICC profile mediaWhitePointTag will be D50, see the
1806 * checks and code elsewhere to understand this better.
1807 *
1808 * These XYZ values, which are accurate to 5dp, produce rgb to gray
1809 * coefficients of (6968,23435,2366), which are reduced (because they add up
1810 * to 32769 not 32768) to (6968,23434,2366). These are the values that
1811 * libpng has traditionally used (and are the best values given the 15bit
1812 * algorithm used by the rgb to gray code.)
1813 */
1814 static const png_XYZ sRGB_XYZ = /* D65 XYZ (*not* the D50 adapted values!) */
1815 {
1816 /* color X Y Z */
1817 /* red */ 41239, 21264, 1933,
1818 /* green */ 35758, 71517, 11919,
1819 /* blue */ 18048, 7219, 95053
1820 };
1821
1822 /* Do nothing if the colorspace is already invalidated. */
1823 if (colorspace->flags & PNG_COLORSPACE_INVALID)
1824 return 0;
1825
1826 /* Check the intent, then check for existing settings. It is valid for the
1827 * PNG file to have cHRM or gAMA chunks along with sRGB, but the values must
1828 * be consistent with the correct values. If, however, this function is
1829 * called below because an iCCP chunk matches sRGB then it is quite
1830 * conceivable that an older app recorded incorrect gAMA and cHRM because of
1831 * an incorrect calculation based on the values in the profile - this does
1832 * *not* invalidate the profile (though it still produces an error, which can
1833 * be ignored.)
1834 */
1835 if (intent < 0 || intent >= PNG_sRGB_INTENT_LAST)
1836 return png_icc_profile_error(png_ptr, colorspace, "sRGB",
1837 (unsigned)intent, "invalid sRGB rendering intent");
1838
1839 if ((colorspace->flags & PNG_COLORSPACE_HAVE_INTENT) != 0 &&
1840 colorspace->rendering_intent != intent)
1841 return png_icc_profile_error(png_ptr, colorspace, "sRGB",
1842 (unsigned)intent, "inconsistent rendering intents");
1843
1844 if ((colorspace->flags & PNG_COLORSPACE_FROM_sRGB) != 0)
1845 {
1846 png_benign_error(png_ptr, "duplicate sRGB information ignored");
1847 return 0;
1848 }
1849
1850 /* If the standard sRGB cHRM chunk does not match the one from the PNG file
1851 * warn but overwrite the value with the correct one.
1852 */
1853 if ((colorspace->flags & PNG_COLORSPACE_HAVE_ENDPOINTS) != 0 &&
1854 !png_colorspace_endpoints_match(&sRGB_xy, &colorspace->end_points_xy,
1855 100))
1856 png_chunk_report(png_ptr, "cHRM chunk does not match sRGB",
1857 PNG_CHUNK_ERROR);
1858
1859 /* This check is just done for the error reporting - the routine always
1860 * returns true when the 'from' argument corresponds to sRGB (2).
1861 */
1862 (void)png_colorspace_check_gamma(png_ptr, colorspace, PNG_GAMMA_sRGB_INVERSE,
1863 2/*from sRGB*/);
1864
1865 /* intent: bugs in GCC force 'int' to be used as the parameter type. */
1866 colorspace->rendering_intent = (png_uint_16)intent;
1867 colorspace->flags |= PNG_COLORSPACE_HAVE_INTENT;
1868
1869 /* endpoints */
1870 colorspace->end_points_xy = sRGB_xy;
1871 colorspace->end_points_XYZ = sRGB_XYZ;
1872 colorspace->flags |=
1873 (PNG_COLORSPACE_HAVE_ENDPOINTS|PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB);
1874
1875 /* gamma */
1876 colorspace->gamma = PNG_GAMMA_sRGB_INVERSE;
1877 colorspace->flags |= PNG_COLORSPACE_HAVE_GAMMA;
1878
1879 /* Finally record that we have an sRGB profile */
1880 colorspace->flags |=
1881 (PNG_COLORSPACE_MATCHES_sRGB|PNG_COLORSPACE_FROM_sRGB);
1882
1883 return 1; /* set */
1884}
1885#endif /* sRGB */
1886
1887#ifdef PNG_iCCP_SUPPORTED
1888/* Encoded value of D50 as an ICC XYZNumber. From the ICC 2010 spec the value
1889 * is XYZ(0.9642,1.0,0.8249), which scales to:
1890 *
1891 * (63189.8112, 65536, 54060.6464)
1892 */
1893static const png_byte D50_nCIEXYZ[12] =
1894 { 0x00, 0x00, 0xf6, 0xd6, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x2d };
1895
1896int /* PRIVATE */
1897png_icc_check_length(png_const_structrp png_ptr, png_colorspacerp colorspace,
1898 png_const_charp name, png_uint_32 profile_length)
1899{
1900 if (profile_length < 132)
1901 return png_icc_profile_error(png_ptr, colorspace, name, profile_length,
1902 "too short");
1903
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001904 return 1;
1905}
1906
1907int /* PRIVATE */
1908png_icc_check_header(png_const_structrp png_ptr, png_colorspacerp colorspace,
1909 png_const_charp name, png_uint_32 profile_length,
1910 png_const_bytep profile/* first 132 bytes only */, int color_type)
1911{
1912 png_uint_32 temp;
1913
1914 /* Length check; this cannot be ignored in this code because profile_length
1915 * is used later to check the tag table, so even if the profile seems over
1916 * long profile_length from the caller must be correct. The caller can fix
1917 * this up on read or write by just passing in the profile header length.
1918 */
1919 temp = png_get_uint_32(profile);
1920 if (temp != profile_length)
1921 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1922 "length does not match profile");
1923
Glenn Randers-Pehrson5a1d1b52014-04-24 15:54:28 -05001924 temp = (png_uint_32) (*(profile+8));
1925 if (temp > 3 && (profile_length & 3))
1926 return png_icc_profile_error(png_ptr, colorspace, name, profile_length,
1927 "invalid length");
1928
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001929 temp = png_get_uint_32(profile+128); /* tag count: 12 bytes/tag */
Glenn Randers-Pehrson67a289f2013-04-19 19:03:34 -05001930 if (temp > 357913930 || /* (2^32-4-132)/12: maximum possible tag count */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001931 profile_length < 132+12*temp) /* truncated tag table */
1932 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1933 "tag count too large");
1934
1935 /* The 'intent' must be valid or we can't store it, ICC limits the intent to
1936 * 16 bits.
1937 */
1938 temp = png_get_uint_32(profile+64);
1939 if (temp >= 0xffff) /* The ICC limit */
1940 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1941 "invalid rendering intent");
1942
1943 /* This is just a warning because the profile may be valid in future
1944 * versions.
1945 */
1946 if (temp >= PNG_sRGB_INTENT_LAST)
1947 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
1948 "intent outside defined range");
1949
1950 /* At this point the tag table can't be checked because it hasn't necessarily
1951 * been loaded; however, various header fields can be checked. These checks
1952 * are for values permitted by the PNG spec in an ICC profile; the PNG spec
1953 * restricts the profiles that can be passed in an iCCP chunk (they must be
1954 * appropriate to processing PNG data!)
1955 */
1956
1957 /* Data checks (could be skipped). These checks must be independent of the
1958 * version number; however, the version number doesn't accomodate changes in
1959 * the header fields (just the known tags and the interpretation of the
1960 * data.)
1961 */
1962 temp = png_get_uint_32(profile+36); /* signature 'ascp' */
1963 if (temp != 0x61637370)
1964 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1965 "invalid signature");
1966
1967 /* Currently the PCS illuminant/adopted white point (the computational
1968 * white point) are required to be D50,
1969 * however the profile contains a record of the illuminant so perhaps ICC
1970 * expects to be able to change this in the future (despite the rationale in
1971 * the introduction for using a fixed PCS adopted white.) Consequently the
1972 * following is just a warning.
1973 */
1974 if (memcmp(profile+68, D50_nCIEXYZ, 12) != 0)
1975 (void)png_icc_profile_error(png_ptr, NULL, name, 0/*no tag value*/,
1976 "PCS illuminant is not D50");
1977
1978 /* The PNG spec requires this:
1979 * "If the iCCP chunk is present, the image samples conform to the colour
1980 * space represented by the embedded ICC profile as defined by the
1981 * International Color Consortium [ICC]. The colour space of the ICC profile
1982 * shall be an RGB colour space for colour images (PNG colour types 2, 3, and
1983 * 6), or a greyscale colour space for greyscale images (PNG colour types 0
1984 * and 4)."
1985 *
1986 * This checking code ensures the embedded profile (on either read or write)
1987 * conforms to the specification requirements. Notice that an ICC 'gray'
1988 * color-space profile contains the information to transform the monochrome
1989 * data to XYZ or L*a*b (according to which PCS the profile uses) and this
1990 * should be used in preference to the standard libpng K channel replication
1991 * into R, G and B channels.
1992 *
1993 * Previously it was suggested that an RGB profile on grayscale data could be
1994 * handled. However it it is clear that using an RGB profile in this context
1995 * must be an error - there is no specification of what it means. Thus it is
1996 * almost certainly more correct to ignore the profile.
1997 */
1998 temp = png_get_uint_32(profile+16); /* data colour space field */
1999 switch (temp)
2000 {
2001 case 0x52474220: /* 'RGB ' */
2002 if (!(color_type & PNG_COLOR_MASK_COLOR))
2003 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2004 "RGB color space not permitted on grayscale PNG");
2005 break;
2006
2007 case 0x47524159: /* 'GRAY' */
2008 if (color_type & PNG_COLOR_MASK_COLOR)
2009 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2010 "Gray color space not permitted on RGB PNG");
2011 break;
2012
2013 default:
2014 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2015 "invalid ICC profile color space");
2016 }
2017
2018 /* It is up to the application to check that the profile class matches the
2019 * application requirements; the spec provides no guidance, but it's pretty
2020 * weird if the profile is not scanner ('scnr'), monitor ('mntr'), printer
2021 * ('prtr') or 'spac' (for generic color spaces). Issue a warning in these
2022 * cases. Issue an error for device link or abstract profiles - these don't
2023 * contain the records necessary to transform the color-space to anything
2024 * other than the target device (and not even that for an abstract profile).
2025 * Profiles of these classes may not be embedded in images.
2026 */
2027 temp = png_get_uint_32(profile+12); /* profile/device class */
2028 switch (temp)
2029 {
2030 case 0x73636E72: /* 'scnr' */
2031 case 0x6D6E7472: /* 'mntr' */
2032 case 0x70727472: /* 'prtr' */
2033 case 0x73706163: /* 'spac' */
2034 /* All supported */
2035 break;
2036
2037 case 0x61627374: /* 'abst' */
2038 /* May not be embedded in an image */
2039 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2040 "invalid embedded Abstract ICC profile");
2041
2042 case 0x6C696E6B: /* 'link' */
Glenn Randers-Pehrson5a1d1b52014-04-24 15:54:28 -05002043 /* DeviceLink profiles cannot be interpreted in a non-device specific
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002044 * fashion, if an app uses the AToB0Tag in the profile the results are
2045 * undefined unless the result is sent to the intended device,
2046 * therefore a DeviceLink profile should not be found embedded in a
2047 * PNG.
2048 */
2049 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2050 "unexpected DeviceLink ICC profile class");
2051
2052 case 0x6E6D636C: /* 'nmcl' */
2053 /* A NamedColor profile is also device specific, however it doesn't
Glenn Randers-Pehrson5a1d1b52014-04-24 15:54:28 -05002054 * contain an AToB0 tag that is open to misinterpretation. Almost
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002055 * certainly it will fail the tests below.
2056 */
2057 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
2058 "unexpected NamedColor ICC profile class");
2059 break;
2060
2061 default:
2062 /* To allow for future enhancements to the profile accept unrecognized
2063 * profile classes with a warning, these then hit the test below on the
2064 * tag content to ensure they are backward compatible with one of the
2065 * understood profiles.
2066 */
2067 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
2068 "unrecognized ICC profile class");
2069 break;
2070 }
2071
2072 /* For any profile other than a device link one the PCS must be encoded
2073 * either in XYZ or Lab.
2074 */
2075 temp = png_get_uint_32(profile+20);
2076 switch (temp)
2077 {
2078 case 0x58595A20: /* 'XYZ ' */
2079 case 0x4C616220: /* 'Lab ' */
2080 break;
2081
2082 default:
2083 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2084 "unexpected ICC PCS encoding");
2085 }
2086
2087 return 1;
2088}
2089
2090int /* PRIVATE */
2091png_icc_check_tag_table(png_const_structrp png_ptr, png_colorspacerp colorspace,
2092 png_const_charp name, png_uint_32 profile_length,
2093 png_const_bytep profile /* header plus whole tag table */)
2094{
2095 png_uint_32 tag_count = png_get_uint_32(profile+128);
2096 png_uint_32 itag;
2097 png_const_bytep tag = profile+132; /* The first tag */
2098
2099 /* First scan all the tags in the table and add bits to the icc_info value
2100 * (temporarily in 'tags').
2101 */
2102 for (itag=0; itag < tag_count; ++itag, tag += 12)
2103 {
2104 png_uint_32 tag_id = png_get_uint_32(tag+0);
2105 png_uint_32 tag_start = png_get_uint_32(tag+4); /* must be aligned */
2106 png_uint_32 tag_length = png_get_uint_32(tag+8);/* not padded */
2107
2108 /* The ICC specification does not exclude zero length tags, therefore the
2109 * start might actually be anywhere if there is no data, but this would be
2110 * a clear abuse of the intent of the standard so the start is checked for
2111 * being in range. All defined tag types have an 8 byte header - a 4 byte
2112 * type signature then 0.
2113 */
2114 if ((tag_start & 3) != 0)
2115 {
2116 /* CNHP730S.icc shipped with Microsoft Windows 64 violates this, it is
2117 * only a warning here because libpng does not care about the
2118 * alignment.
2119 */
2120 (void)png_icc_profile_error(png_ptr, NULL, name, tag_id,
2121 "ICC profile tag start not a multiple of 4");
2122 }
2123
2124 /* This is a hard error; potentially it can cause read outside the
2125 * profile.
2126 */
2127 if (tag_start > profile_length || tag_length > profile_length - tag_start)
2128 return png_icc_profile_error(png_ptr, colorspace, name, tag_id,
2129 "ICC profile tag outside profile");
2130 }
2131
2132 return 1; /* success, maybe with warnings */
2133}
2134
Glenn Randers-Pehrson0ace9f52014-04-20 20:06:14 -05002135#if defined(PNG_sRGB_SUPPORTED) && PNG_sRGB_PROFILE_CHECKS >= 0
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002136/* Information about the known ICC sRGB profiles */
2137static const struct
2138{
2139 png_uint_32 adler, crc, length;
2140 png_uint_32 md5[4];
2141 png_byte have_md5;
2142 png_byte is_broken;
2143 png_uint_16 intent;
2144
2145# define PNG_MD5(a,b,c,d) { a, b, c, d }, (a!=0)||(b!=0)||(c!=0)||(d!=0)
2146# define PNG_ICC_CHECKSUM(adler, crc, md5, intent, broke, date, length, fname)\
2147 { adler, crc, length, md5, broke, intent },
2148
2149} png_sRGB_checks[] =
2150{
2151 /* This data comes from contrib/tools/checksum-icc run on downloads of
2152 * all four ICC sRGB profiles from www.color.org.
2153 */
2154 /* adler32, crc32, MD5[4], intent, date, length, file-name */
2155 PNG_ICC_CHECKSUM(0x0a3fd9f6, 0x3b8772b9,
2156 PNG_MD5(0x29f83dde, 0xaff255ae, 0x7842fae4, 0xca83390d), 0, 0,
2157 "2009/03/27 21:36:31", 3048, "sRGB_IEC61966-2-1_black_scaled.icc")
2158
2159 /* ICC sRGB v2 perceptual no black-compensation: */
2160 PNG_ICC_CHECKSUM(0x4909e5e1, 0x427ebb21,
2161 PNG_MD5(0xc95bd637, 0xe95d8a3b, 0x0df38f99, 0xc1320389), 1, 0,
2162 "2009/03/27 21:37:45", 3052, "sRGB_IEC61966-2-1_no_black_scaling.icc")
2163
2164 PNG_ICC_CHECKSUM(0xfd2144a1, 0x306fd8ae,
2165 PNG_MD5(0xfc663378, 0x37e2886b, 0xfd72e983, 0x8228f1b8), 0, 0,
2166 "2009/08/10 17:28:01", 60988, "sRGB_v4_ICC_preference_displayclass.icc")
2167
2168 /* ICC sRGB v4 perceptual */
2169 PNG_ICC_CHECKSUM(0x209c35d2, 0xbbef7812,
2170 PNG_MD5(0x34562abf, 0x994ccd06, 0x6d2c5721, 0xd0d68c5d), 0, 0,
2171 "2007/07/25 00:05:37", 60960, "sRGB_v4_ICC_preference.icc")
2172
2173 /* The following profiles have no known MD5 checksum. If there is a match
2174 * on the (empty) MD5 the other fields are used to attempt a match and
2175 * a warning is produced. The first two of these profiles have a 'cprt' tag
2176 * which suggests that they were also made by Hewlett Packard.
2177 */
2178 PNG_ICC_CHECKSUM(0xa054d762, 0x5d5129ce,
2179 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 1, 0,
2180 "2004/07/21 18:57:42", 3024, "sRGB_IEC61966-2-1_noBPC.icc")
2181
2182 /* This is a 'mntr' (display) profile with a mediaWhitePointTag that does not
2183 * match the D50 PCS illuminant in the header (it is in fact the D65 values,
2184 * so the white point is recorded as the un-adapted value.) The profiles
2185 * below only differ in one byte - the intent - and are basically the same as
2186 * the previous profile except for the mediaWhitePointTag error and a missing
2187 * chromaticAdaptationTag.
2188 */
2189 PNG_ICC_CHECKSUM(0xf784f3fb, 0x182ea552,
2190 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 0, 1/*broken*/,
2191 "1998/02/09 06:49:00", 3144, "HP-Microsoft sRGB v2 perceptual")
2192
2193 PNG_ICC_CHECKSUM(0x0398f3fc, 0xf29e526d,
2194 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 1, 1/*broken*/,
2195 "1998/02/09 06:49:00", 3144, "HP-Microsoft sRGB v2 media-relative")
2196};
2197
2198static int
2199png_compare_ICC_profile_with_sRGB(png_const_structrp png_ptr,
2200 png_const_bytep profile, uLong adler)
2201{
2202 /* The quick check is to verify just the MD5 signature and trust the
2203 * rest of the data. Because the profile has already been verified for
2204 * correctness this is safe. png_colorspace_set_sRGB will check the 'intent'
2205 * field too, so if the profile has been edited with an intent not defined
2206 * by sRGB (but maybe defined by a later ICC specification) the read of
2207 * the profile will fail at that point.
2208 */
Glenn Randers-Pehrsone95ce2c2014-05-07 12:07:12 -05002209
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002210 png_uint_32 length = 0;
2211 png_uint_32 intent = 0x10000; /* invalid */
2212#if PNG_sRGB_PROFILE_CHECKS > 1
2213 uLong crc = 0; /* the value for 0 length data */
John Bowler921648a2012-03-28 23:36:12 -05002214#endif
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002215 unsigned int i;
2216
Glenn Randers-Pehrson36694672014-08-22 08:55:50 -05002217#ifdef PNG_SET_OPTION_SUPPORTED
Glenn Randers-Pehrsonb7afba62014-06-06 12:07:07 -05002218 /* First see if PNG_SKIP_sRGB_CHECK_PROFILE has been set to "on" */
2219 if (((png_ptr->options >> PNG_SKIP_sRGB_CHECK_PROFILE) & 3) ==
2220 PNG_OPTION_ON)
2221 return 0;
Glenn Randers-Pehrson36694672014-08-22 08:55:50 -05002222#endif
Glenn Randers-Pehrsonb7afba62014-06-06 12:07:07 -05002223
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002224 for (i=0; i < (sizeof png_sRGB_checks) / (sizeof png_sRGB_checks[0]); ++i)
2225 {
2226 if (png_get_uint_32(profile+84) == png_sRGB_checks[i].md5[0] &&
2227 png_get_uint_32(profile+88) == png_sRGB_checks[i].md5[1] &&
2228 png_get_uint_32(profile+92) == png_sRGB_checks[i].md5[2] &&
2229 png_get_uint_32(profile+96) == png_sRGB_checks[i].md5[3])
2230 {
2231 /* This may be one of the old HP profiles without an MD5, in that
2232 * case we can only use the length and Adler32 (note that these
2233 * are not used by default if there is an MD5!)
2234 */
2235# if PNG_sRGB_PROFILE_CHECKS == 0
2236 if (png_sRGB_checks[i].have_md5)
2237 return 1+png_sRGB_checks[i].is_broken;
2238# endif
2239
2240 /* Profile is unsigned or more checks have been configured in. */
2241 if (length == 0)
2242 {
2243 length = png_get_uint_32(profile);
2244 intent = png_get_uint_32(profile+64);
2245 }
2246
2247 /* Length *and* intent must match */
2248 if (length == png_sRGB_checks[i].length &&
2249 intent == png_sRGB_checks[i].intent)
2250 {
Glenn Randers-Pehrson1f24cb72013-03-04 21:58:02 -06002251 /* Now calculate the adler32 if not done already. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002252 if (adler == 0)
2253 {
2254 adler = adler32(0, NULL, 0);
2255 adler = adler32(adler, profile, length);
2256 }
2257
2258 if (adler == png_sRGB_checks[i].adler)
2259 {
2260 /* These basic checks suggest that the data has not been
2261 * modified, but if the check level is more than 1 perform
2262 * our own crc32 checksum on the data.
2263 */
2264# if PNG_sRGB_PROFILE_CHECKS > 1
2265 if (crc == 0)
2266 {
2267 crc = crc32(0, NULL, 0);
2268 crc = crc32(crc, profile, length);
2269 }
2270
2271 /* So this check must pass for the 'return' below to happen.
2272 */
2273 if (crc == png_sRGB_checks[i].crc)
2274# endif
2275 {
2276 if (png_sRGB_checks[i].is_broken)
2277 {
2278 /* These profiles are known to have bad data that may cause
2279 * problems if they are used, therefore attempt to
2280 * discourage their use, skip the 'have_md5' warning below,
2281 * which is made irrelevant by this error.
2282 */
2283 png_chunk_report(png_ptr, "known incorrect sRGB profile",
2284 PNG_CHUNK_ERROR);
2285 }
2286
2287 /* Warn that this being done; this isn't even an error since
2288 * the profile is perfectly valid, but it would be nice if
2289 * people used the up-to-date ones.
2290 */
2291 else if (!png_sRGB_checks[i].have_md5)
2292 {
Glenn Randers-Pehrson3efbeca2014-07-21 16:57:30 -05002293 png_chunk_report(png_ptr, "out-of-date sRGB profile with"
2294 " no signature",
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002295 PNG_CHUNK_WARNING);
2296 }
2297
2298 return 1+png_sRGB_checks[i].is_broken;
2299 }
2300 }
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002301
Glenn Randers-Pehrsonab56b742014-02-27 08:00:17 -06002302# if PNG_sRGB_PROFILE_CHECKS > 0
Glenn Randers-Pehrsone3ae5832014-02-22 22:22:15 -06002303 /* The signature matched, but the profile had been changed in some
2304 * way. This probably indicates a data error or uninformed hacking.
2305 * Fall through to "no match".
2306 */
Glenn Randers-Pehrson3efbeca2014-07-21 16:57:30 -05002307 png_chunk_report(png_ptr, "Not recognizing known sRGB profile that"
2308 " has been edited",
Glenn Randers-Pehrsone3ae5832014-02-22 22:22:15 -06002309 PNG_CHUNK_WARNING);
2310 break;
Glenn Randers-Pehrsonab56b742014-02-27 08:00:17 -06002311# endif
Glenn Randers-Pehrsonf30aa7e2014-04-26 06:28:50 -05002312 }
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002313 }
2314 }
2315
2316 return 0; /* no match */
2317}
2318#endif
2319
2320#ifdef PNG_sRGB_SUPPORTED
2321void /* PRIVATE */
2322png_icc_set_sRGB(png_const_structrp png_ptr,
2323 png_colorspacerp colorspace, png_const_bytep profile, uLong adler)
2324{
2325 /* Is this profile one of the known ICC sRGB profiles? If it is, just set
2326 * the sRGB information.
2327 */
Glenn Randers-Pehrson0ace9f52014-04-20 20:06:14 -05002328#if PNG_sRGB_PROFILE_CHECKS >= 0
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002329 if (png_compare_ICC_profile_with_sRGB(png_ptr, profile, adler))
Glenn Randers-Pehrson0ace9f52014-04-20 20:06:14 -05002330#endif
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002331 (void)png_colorspace_set_sRGB(png_ptr, colorspace,
2332 (int)/*already checked*/png_get_uint_32(profile+64));
2333}
2334#endif /* PNG_READ_sRGB_SUPPORTED */
2335
2336int /* PRIVATE */
2337png_colorspace_set_ICC(png_const_structrp png_ptr, png_colorspacerp colorspace,
2338 png_const_charp name, png_uint_32 profile_length, png_const_bytep profile,
2339 int color_type)
2340{
2341 if (colorspace->flags & PNG_COLORSPACE_INVALID)
2342 return 0;
2343
2344 if (png_icc_check_length(png_ptr, colorspace, name, profile_length) &&
2345 png_icc_check_header(png_ptr, colorspace, name, profile_length, profile,
2346 color_type) &&
2347 png_icc_check_tag_table(png_ptr, colorspace, name, profile_length,
2348 profile))
2349 {
John Bowlere4413a72013-04-17 21:27:47 -05002350# ifdef PNG_sRGB_SUPPORTED
2351 /* If no sRGB support, don't try storing sRGB information */
2352 png_icc_set_sRGB(png_ptr, colorspace, profile, 0);
2353# endif
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002354 return 1;
2355 }
2356
2357 /* Failure case */
2358 return 0;
2359}
2360#endif /* iCCP */
2361
2362#ifdef PNG_READ_RGB_TO_GRAY_SUPPORTED
2363void /* PRIVATE */
2364png_colorspace_set_rgb_coefficients(png_structrp png_ptr)
2365{
2366 /* Set the rgb_to_gray coefficients from the colorspace. */
2367 if (!png_ptr->rgb_to_gray_coefficients_set &&
2368 (png_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_ENDPOINTS) != 0)
2369 {
2370 /* png_set_background has not been called, get the coefficients from the Y
2371 * values of the colorspace colorants.
2372 */
2373 png_fixed_point r = png_ptr->colorspace.end_points_XYZ.red_Y;
2374 png_fixed_point g = png_ptr->colorspace.end_points_XYZ.green_Y;
2375 png_fixed_point b = png_ptr->colorspace.end_points_XYZ.blue_Y;
2376 png_fixed_point total = r+g+b;
2377
2378 if (total > 0 &&
2379 r >= 0 && png_muldiv(&r, r, 32768, total) && r >= 0 && r <= 32768 &&
2380 g >= 0 && png_muldiv(&g, g, 32768, total) && g >= 0 && g <= 32768 &&
2381 b >= 0 && png_muldiv(&b, b, 32768, total) && b >= 0 && b <= 32768 &&
2382 r+g+b <= 32769)
2383 {
2384 /* We allow 0 coefficients here. r+g+b may be 32769 if two or
2385 * all of the coefficients were rounded up. Handle this by
2386 * reducing the *largest* coefficient by 1; this matches the
2387 * approach used for the default coefficients in pngrtran.c
2388 */
2389 int add = 0;
2390
2391 if (r+g+b > 32768)
2392 add = -1;
2393 else if (r+g+b < 32768)
2394 add = 1;
2395
2396 if (add != 0)
2397 {
2398 if (g >= r && g >= b)
2399 g += add;
2400 else if (r >= g && r >= b)
2401 r += add;
2402 else
2403 b += add;
2404 }
2405
2406 /* Check for an internal error. */
2407 if (r+g+b != 32768)
2408 png_error(png_ptr,
2409 "internal error handling cHRM coefficients");
2410
2411 else
2412 {
2413 png_ptr->rgb_to_gray_red_coeff = (png_uint_16)r;
2414 png_ptr->rgb_to_gray_green_coeff = (png_uint_16)g;
2415 }
2416 }
2417
2418 /* This is a png_error at present even though it could be ignored -
2419 * it should never happen, but it is important that if it does, the
2420 * bug is fixed.
2421 */
2422 else
2423 png_error(png_ptr, "internal error handling cHRM->XYZ");
2424 }
2425}
2426#endif
2427
2428#endif /* COLORSPACE */
John Bowlerb11b31a2012-03-21 07:55:46 -05002429
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002430void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06002431png_check_IHDR(png_const_structrp png_ptr,
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002432 png_uint_32 width, png_uint_32 height, int bit_depth,
2433 int color_type, int interlace_type, int compression_type,
2434 int filter_type)
2435{
2436 int error = 0;
2437
2438 /* Check for width and height valid values */
2439 if (width == 0)
2440 {
2441 png_warning(png_ptr, "Image width is zero in IHDR");
2442 error = 1;
2443 }
Cosmin Trutaae6eaa82014-03-22 09:39:33 -05002444 else if (width > PNG_UINT_31_MAX)
2445 {
2446 png_warning(png_ptr, "Invalid image width in IHDR");
2447 error = 1;
2448 }
2449 else
2450 {
2451# ifdef PNG_SET_USER_LIMITS_SUPPORTED
2452 if (width > png_ptr->user_width_max)
2453# else
2454 if (width > PNG_USER_WIDTH_MAX)
2455# endif
2456 {
2457 png_warning(png_ptr, "Image width exceeds user limit in IHDR");
2458 error = 1;
2459 }
2460 }
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002461
2462 if (height == 0)
2463 {
2464 png_warning(png_ptr, "Image height is zero in IHDR");
2465 error = 1;
2466 }
Cosmin Trutaae6eaa82014-03-22 09:39:33 -05002467 else if (height > PNG_UINT_31_MAX)
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002468 {
Glenn Randers-Pehrsondd66f3e2009-09-30 14:58:28 -05002469 png_warning(png_ptr, "Invalid image height in IHDR");
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002470 error = 1;
2471 }
Cosmin Trutaae6eaa82014-03-22 09:39:33 -05002472 else
2473 {
2474# ifdef PNG_SET_USER_LIMITS_SUPPORTED
2475 if (height > png_ptr->user_height_max)
2476# else
2477 if (height > PNG_USER_HEIGHT_MAX)
2478# endif
2479 {
2480 png_warning(png_ptr, "Image height exceeds user limit in IHDR");
2481 error = 1;
2482 }
2483 }
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002484
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002485 /* Check other values */
2486 if (bit_depth != 1 && bit_depth != 2 && bit_depth != 4 &&
2487 bit_depth != 8 && bit_depth != 16)
2488 {
2489 png_warning(png_ptr, "Invalid bit depth in IHDR");
2490 error = 1;
2491 }
2492
2493 if (color_type < 0 || color_type == 1 ||
2494 color_type == 5 || color_type > 6)
2495 {
2496 png_warning(png_ptr, "Invalid color type in IHDR");
2497 error = 1;
2498 }
2499
2500 if (((color_type == PNG_COLOR_TYPE_PALETTE) && bit_depth > 8) ||
2501 ((color_type == PNG_COLOR_TYPE_RGB ||
2502 color_type == PNG_COLOR_TYPE_GRAY_ALPHA ||
2503 color_type == PNG_COLOR_TYPE_RGB_ALPHA) && bit_depth < 8))
2504 {
2505 png_warning(png_ptr, "Invalid color type/bit depth combination in IHDR");
2506 error = 1;
2507 }
2508
2509 if (interlace_type >= PNG_INTERLACE_LAST)
2510 {
2511 png_warning(png_ptr, "Unknown interlace method in IHDR");
2512 error = 1;
2513 }
2514
2515 if (compression_type != PNG_COMPRESSION_TYPE_BASE)
2516 {
2517 png_warning(png_ptr, "Unknown compression method in IHDR");
2518 error = 1;
2519 }
2520
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002521# ifdef PNG_MNG_FEATURES_SUPPORTED
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002522 /* Accept filter_method 64 (intrapixel differencing) only if
2523 * 1. Libpng was compiled with PNG_MNG_FEATURES_SUPPORTED and
2524 * 2. Libpng did not read a PNG signature (this filter_method is only
2525 * used in PNG datastreams that are embedded in MNG datastreams) and
2526 * 3. The application called png_permit_mng_features with a mask that
2527 * included PNG_FLAG_MNG_FILTER_64 and
2528 * 4. The filter_method is 64 and
2529 * 5. The color_type is RGB or RGBA
2530 */
2531 if ((png_ptr->mode & PNG_HAVE_PNG_SIGNATURE) &&
2532 png_ptr->mng_features_permitted)
2533 png_warning(png_ptr, "MNG features are not allowed in a PNG datastream");
2534
2535 if (filter_type != PNG_FILTER_TYPE_BASE)
2536 {
Glenn Randers-Pehrson7ec330d2009-09-25 11:45:42 -05002537 if (!((png_ptr->mng_features_permitted & PNG_FLAG_MNG_FILTER_64) &&
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002538 (filter_type == PNG_INTRAPIXEL_DIFFERENCING) &&
2539 ((png_ptr->mode & PNG_HAVE_PNG_SIGNATURE) == 0) &&
2540 (color_type == PNG_COLOR_TYPE_RGB ||
2541 color_type == PNG_COLOR_TYPE_RGB_ALPHA)))
Glenn Randers-Pehrson7ec330d2009-09-25 11:45:42 -05002542 {
2543 png_warning(png_ptr, "Unknown filter method in IHDR");
2544 error = 1;
2545 }
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002546
Glenn Randers-Pehrson7ec330d2009-09-25 11:45:42 -05002547 if (png_ptr->mode & PNG_HAVE_PNG_SIGNATURE)
2548 {
2549 png_warning(png_ptr, "Invalid filter method in IHDR");
2550 error = 1;
2551 }
2552 }
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002553
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002554# else
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002555 if (filter_type != PNG_FILTER_TYPE_BASE)
2556 {
2557 png_warning(png_ptr, "Unknown filter method in IHDR");
2558 error = 1;
2559 }
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002560# endif
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002561
2562 if (error == 1)
2563 png_error(png_ptr, "Invalid IHDR data");
2564}
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002565
2566#if defined(PNG_sCAL_SUPPORTED) || defined(PNG_pCAL_SUPPORTED)
2567/* ASCII to fp functions */
2568/* Check an ASCII formated floating point value, see the more detailed
2569 * comments in pngpriv.h
2570 */
John Bowler8d261262011-06-18 13:37:11 -05002571/* The following is used internally to preserve the sticky flags */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002572#define png_fp_add(state, flags) ((state) |= (flags))
John Bowler8d261262011-06-18 13:37:11 -05002573#define png_fp_set(state, value) ((state) = (value) | ((state) & PNG_FP_STICKY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002574
2575int /* PRIVATE */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002576png_check_fp_number(png_const_charp string, png_size_t size, int *statep,
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002577 png_size_tp whereami)
2578{
2579 int state = *statep;
2580 png_size_t i = *whereami;
2581
2582 while (i < size)
2583 {
2584 int type;
2585 /* First find the type of the next character */
John Bowler8d261262011-06-18 13:37:11 -05002586 switch (string[i])
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002587 {
John Bowler8d261262011-06-18 13:37:11 -05002588 case 43: type = PNG_FP_SAW_SIGN; break;
2589 case 45: type = PNG_FP_SAW_SIGN + PNG_FP_NEGATIVE; break;
2590 case 46: type = PNG_FP_SAW_DOT; break;
2591 case 48: type = PNG_FP_SAW_DIGIT; break;
2592 case 49: case 50: case 51: case 52:
2593 case 53: case 54: case 55: case 56:
2594 case 57: type = PNG_FP_SAW_DIGIT + PNG_FP_NONZERO; break;
2595 case 69:
2596 case 101: type = PNG_FP_SAW_E; break;
2597 default: goto PNG_FP_End;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002598 }
2599
2600 /* Now deal with this type according to the current
2601 * state, the type is arranged to not overlap the
2602 * bits of the PNG_FP_STATE.
2603 */
John Bowler8d261262011-06-18 13:37:11 -05002604 switch ((state & PNG_FP_STATE) + (type & PNG_FP_SAW_ANY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002605 {
John Bowler8d261262011-06-18 13:37:11 -05002606 case PNG_FP_INTEGER + PNG_FP_SAW_SIGN:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002607 if (state & PNG_FP_SAW_ANY)
2608 goto PNG_FP_End; /* not a part of the number */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002609
John Bowler8d261262011-06-18 13:37:11 -05002610 png_fp_add(state, type);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002611 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002612
John Bowler8d261262011-06-18 13:37:11 -05002613 case PNG_FP_INTEGER + PNG_FP_SAW_DOT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002614 /* Ok as trailer, ok as lead of fraction. */
2615 if (state & PNG_FP_SAW_DOT) /* two dots */
2616 goto PNG_FP_End;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002617
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002618 else if (state & PNG_FP_SAW_DIGIT) /* trailing dot? */
John Bowler8d261262011-06-18 13:37:11 -05002619 png_fp_add(state, type);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002620
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002621 else
John Bowler8d261262011-06-18 13:37:11 -05002622 png_fp_set(state, PNG_FP_FRACTION | type);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002623
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002624 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002625
John Bowler8d261262011-06-18 13:37:11 -05002626 case PNG_FP_INTEGER + PNG_FP_SAW_DIGIT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002627 if (state & PNG_FP_SAW_DOT) /* delayed fraction */
2628 png_fp_set(state, PNG_FP_FRACTION | PNG_FP_SAW_DOT);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002629
John Bowler8d261262011-06-18 13:37:11 -05002630 png_fp_add(state, type | PNG_FP_WAS_VALID);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002631
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002632 break;
John Bowler8d261262011-06-18 13:37:11 -05002633
2634 case PNG_FP_INTEGER + PNG_FP_SAW_E:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002635 if ((state & PNG_FP_SAW_DIGIT) == 0)
2636 goto PNG_FP_End;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002637
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002638 png_fp_set(state, PNG_FP_EXPONENT);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002639
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002640 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002641
John Bowler8d261262011-06-18 13:37:11 -05002642 /* case PNG_FP_FRACTION + PNG_FP_SAW_SIGN:
2643 goto PNG_FP_End; ** no sign in fraction */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002644
John Bowler8d261262011-06-18 13:37:11 -05002645 /* case PNG_FP_FRACTION + PNG_FP_SAW_DOT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002646 goto PNG_FP_End; ** Because SAW_DOT is always set */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002647
John Bowler8d261262011-06-18 13:37:11 -05002648 case PNG_FP_FRACTION + PNG_FP_SAW_DIGIT:
2649 png_fp_add(state, type | PNG_FP_WAS_VALID);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002650 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002651
John Bowler8d261262011-06-18 13:37:11 -05002652 case PNG_FP_FRACTION + PNG_FP_SAW_E:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002653 /* This is correct because the trailing '.' on an
2654 * integer is handled above - so we can only get here
2655 * with the sequence ".E" (with no preceding digits).
2656 */
2657 if ((state & PNG_FP_SAW_DIGIT) == 0)
2658 goto PNG_FP_End;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002659
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002660 png_fp_set(state, PNG_FP_EXPONENT);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002661
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002662 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002663
John Bowler8d261262011-06-18 13:37:11 -05002664 case PNG_FP_EXPONENT + PNG_FP_SAW_SIGN:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002665 if (state & PNG_FP_SAW_ANY)
2666 goto PNG_FP_End; /* not a part of the number */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002667
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002668 png_fp_add(state, PNG_FP_SAW_SIGN);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002669
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002670 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002671
John Bowler8d261262011-06-18 13:37:11 -05002672 /* case PNG_FP_EXPONENT + PNG_FP_SAW_DOT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002673 goto PNG_FP_End; */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002674
John Bowler8d261262011-06-18 13:37:11 -05002675 case PNG_FP_EXPONENT + PNG_FP_SAW_DIGIT:
2676 png_fp_add(state, PNG_FP_SAW_DIGIT | PNG_FP_WAS_VALID);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002677
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002678 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002679
John Bowler8d261262011-06-18 13:37:11 -05002680 /* case PNG_FP_EXPONEXT + PNG_FP_SAW_E:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002681 goto PNG_FP_End; */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002682
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002683 default: goto PNG_FP_End; /* I.e. break 2 */
2684 }
2685
2686 /* The character seems ok, continue. */
2687 ++i;
2688 }
2689
2690PNG_FP_End:
2691 /* Here at the end, update the state and return the correct
2692 * return code.
2693 */
2694 *statep = state;
2695 *whereami = i;
2696
2697 return (state & PNG_FP_SAW_DIGIT) != 0;
2698}
2699
2700
2701/* The same but for a complete string. */
2702int
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002703png_check_fp_string(png_const_charp string, png_size_t size)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002704{
2705 int state=0;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002706 png_size_t char_index=0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002707
John Bowler8d261262011-06-18 13:37:11 -05002708 if (png_check_fp_number(string, size, &state, &char_index) &&
2709 (char_index == size || string[char_index] == 0))
2710 return state /* must be non-zero - see above */;
2711
2712 return 0; /* i.e. fail */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002713}
2714#endif /* pCAL or sCAL */
2715
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002716#ifdef PNG_sCAL_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002717# ifdef PNG_FLOATING_POINT_SUPPORTED
2718/* Utility used below - a simple accurate power of ten from an integral
2719 * exponent.
2720 */
2721static double
2722png_pow10(int power)
2723{
2724 int recip = 0;
2725 double d = 1;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002726
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002727 /* Handle negative exponent with a reciprocal at the end because
2728 * 10 is exact whereas .1 is inexact in base 2
2729 */
2730 if (power < 0)
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002731 {
2732 if (power < DBL_MIN_10_EXP) return 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002733 recip = 1, power = -power;
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002734 }
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002735
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002736 if (power > 0)
2737 {
2738 /* Decompose power bitwise. */
2739 double mult = 10;
2740 do
2741 {
2742 if (power & 1) d *= mult;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002743 mult *= mult;
2744 power >>= 1;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002745 }
2746 while (power > 0);
2747
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06002748 if (recip != 0) d = 1/d;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002749 }
2750 /* else power is 0 and d is 1 */
2751
2752 return d;
2753}
2754
2755/* Function to format a floating point value in ASCII with a given
2756 * precision.
2757 */
2758void /* PRIVATE */
John Bowler4f67e402011-12-28 08:43:37 -06002759png_ascii_from_fp(png_const_structrp png_ptr, png_charp ascii, png_size_t size,
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002760 double fp, unsigned int precision)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002761{
2762 /* We use standard functions from math.h, but not printf because
2763 * that would require stdio. The caller must supply a buffer of
2764 * sufficient size or we will png_error. The tests on size and
2765 * the space in ascii[] consumed are indicated below.
2766 */
2767 if (precision < 1)
2768 precision = DBL_DIG;
2769
2770 /* Enforce the limit of the implementation precision too. */
2771 if (precision > DBL_DIG+1)
2772 precision = DBL_DIG+1;
2773
2774 /* Basic sanity checks */
2775 if (size >= precision+5) /* See the requirements below. */
2776 {
2777 if (fp < 0)
2778 {
2779 fp = -fp;
Glenn Randers-Pehrsonb75b2412011-04-16 19:35:05 -05002780 *ascii++ = 45; /* '-' PLUS 1 TOTAL 1 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002781 --size;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002782 }
2783
2784 if (fp >= DBL_MIN && fp <= DBL_MAX)
2785 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002786 int exp_b10; /* A base 10 exponent */
2787 double base; /* 10^exp_b10 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002788
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002789 /* First extract a base 10 exponent of the number,
2790 * the calculation below rounds down when converting
2791 * from base 2 to base 10 (multiply by log10(2) -
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002792 * 0.3010, but 77/256 is 0.3008, so exp_b10 needs to
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002793 * be increased. Note that the arithmetic shift
2794 * performs a floor() unlike C arithmetic - using a
2795 * C multiply would break the following for negative
2796 * exponents.
2797 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002798 (void)frexp(fp, &exp_b10); /* exponent to base 2 */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002799
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002800 exp_b10 = (exp_b10 * 77) >> 8; /* <= exponent to base 10 */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002801
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002802 /* Avoid underflow here. */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002803 base = png_pow10(exp_b10); /* May underflow */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002804
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002805 while (base < DBL_MIN || base < fp)
2806 {
2807 /* And this may overflow. */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002808 double test = png_pow10(exp_b10+1);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002809
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002810 if (test <= DBL_MAX)
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002811 ++exp_b10, base = test;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002812
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002813 else
2814 break;
2815 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002816
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002817 /* Normalize fp and correct exp_b10, after this fp is in the
2818 * range [.1,1) and exp_b10 is both the exponent and the digit
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002819 * *before* which the decimal point should be inserted
2820 * (starting with 0 for the first digit). Note that this
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002821 * works even if 10^exp_b10 is out of range because of the
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002822 * test on DBL_MAX above.
2823 */
2824 fp /= base;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002825 while (fp >= 1) fp /= 10, ++exp_b10;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002826
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002827 /* Because of the code above fp may, at this point, be
2828 * less than .1, this is ok because the code below can
2829 * handle the leading zeros this generates, so no attempt
2830 * is made to correct that here.
2831 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002832
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002833 {
2834 int czero, clead, cdigits;
2835 char exponent[10];
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002836
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002837 /* Allow up to two leading zeros - this will not lengthen
2838 * the number compared to using E-n.
2839 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002840 if (exp_b10 < 0 && exp_b10 > -3) /* PLUS 3 TOTAL 4 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002841 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002842 czero = -exp_b10; /* PLUS 2 digits: TOTAL 3 */
2843 exp_b10 = 0; /* Dot added below before first output. */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002844 }
2845 else
2846 czero = 0; /* No zeros to add */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002847
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002848 /* Generate the digit list, stripping trailing zeros and
2849 * inserting a '.' before a digit if the exponent is 0.
2850 */
2851 clead = czero; /* Count of leading zeros */
2852 cdigits = 0; /* Count of digits in list. */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002853
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002854 do
2855 {
2856 double d;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002857
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002858 fp *= 10;
2859 /* Use modf here, not floor and subtract, so that
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002860 * the separation is done in one step. At the end
2861 * of the loop don't break the number into parts so
2862 * that the final digit is rounded.
2863 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002864 if (cdigits+czero-clead+1 < (int)precision)
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002865 fp = modf(fp, &d);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002866
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002867 else
2868 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002869 d = floor(fp + .5);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002870
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002871 if (d > 9)
2872 {
2873 /* Rounding up to 10, handle that here. */
2874 if (czero > 0)
2875 {
2876 --czero, d = 1;
2877 if (cdigits == 0) --clead;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002878 }
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002879 else
2880 {
2881 while (cdigits > 0 && d > 9)
2882 {
2883 int ch = *--ascii;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002884
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002885 if (exp_b10 != (-1))
2886 ++exp_b10;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002887
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002888 else if (ch == 46)
2889 {
2890 ch = *--ascii, ++size;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002891 /* Advance exp_b10 to '1', so that the
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002892 * decimal point happens after the
2893 * previous digit.
2894 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002895 exp_b10 = 1;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002896 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002897
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002898 --cdigits;
2899 d = ch - 47; /* I.e. 1+(ch-48) */
2900 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002901
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002902 /* Did we reach the beginning? If so adjust the
2903 * exponent but take into account the leading
2904 * decimal point.
2905 */
2906 if (d > 9) /* cdigits == 0 */
2907 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002908 if (exp_b10 == (-1))
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002909 {
2910 /* Leading decimal point (plus zeros?), if
2911 * we lose the decimal point here it must
2912 * be reentered below.
2913 */
2914 int ch = *--ascii;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002915
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002916 if (ch == 46)
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002917 ++size, exp_b10 = 1;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002918
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002919 /* Else lost a leading zero, so 'exp_b10' is
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002920 * still ok at (-1)
2921 */
2922 }
2923 else
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002924 ++exp_b10;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002925
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002926 /* In all cases we output a '1' */
2927 d = 1;
2928 }
2929 }
2930 }
2931 fp = 0; /* Guarantees termination below. */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002932 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002933
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002934 if (d == 0)
2935 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002936 ++czero;
2937 if (cdigits == 0) ++clead;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002938 }
2939 else
2940 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002941 /* Included embedded zeros in the digit count. */
2942 cdigits += czero - clead;
2943 clead = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002944
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002945 while (czero > 0)
2946 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002947 /* exp_b10 == (-1) means we just output the decimal
2948 * place - after the DP don't adjust 'exp_b10' any
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002949 * more!
2950 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002951 if (exp_b10 != (-1))
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002952 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002953 if (exp_b10 == 0) *ascii++ = 46, --size;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002954 /* PLUS 1: TOTAL 4 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002955 --exp_b10;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002956 }
2957 *ascii++ = 48, --czero;
2958 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002959
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002960 if (exp_b10 != (-1))
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002961 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002962 if (exp_b10 == 0) *ascii++ = 46, --size; /* counted
2963 above */
2964 --exp_b10;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002965 }
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05002966 *ascii++ = (char)(48 + (int)d), ++cdigits;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002967 }
2968 }
2969 while (cdigits+czero-clead < (int)precision && fp > DBL_MIN);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002970
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002971 /* The total output count (max) is now 4+precision */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002972
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002973 /* Check for an exponent, if we don't need one we are
2974 * done and just need to terminate the string. At
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002975 * this point exp_b10==(-1) is effectively if flag - it got
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002976 * to '-1' because of the decrement after outputing
2977 * the decimal point above (the exponent required is
2978 * *not* -1!)
2979 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002980 if (exp_b10 >= (-1) && exp_b10 <= 2)
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002981 {
2982 /* The following only happens if we didn't output the
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002983 * leading zeros above for negative exponent, so this
2984 * doest add to the digit requirement. Note that the
2985 * two zeros here can only be output if the two leading
2986 * zeros were *not* output, so this doesn't increase
2987 * the output count.
2988 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002989 while (--exp_b10 >= 0) *ascii++ = 48;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002990
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002991 *ascii = 0;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002992
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002993 /* Total buffer requirement (including the '\0') is
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002994 * 5+precision - see check at the start.
2995 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002996 return;
2997 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002998
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002999 /* Here if an exponent is required, adjust size for
3000 * the digits we output but did not count. The total
3001 * digit output here so far is at most 1+precision - no
3002 * decimal point and no leading or trailing zeros have
3003 * been output.
3004 */
3005 size -= cdigits;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003006
Glenn Randers-Pehrsonb75b2412011-04-16 19:35:05 -05003007 *ascii++ = 69, --size; /* 'E': PLUS 1 TOTAL 2+precision */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003008
John Bowler75156122011-09-09 17:21:44 -05003009 /* The following use of an unsigned temporary avoids ambiguities in
3010 * the signed arithmetic on exp_b10 and permits GCC at least to do
3011 * better optimization.
3012 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003013 {
John Bowler75156122011-09-09 17:21:44 -05003014 unsigned int uexp_b10;
3015
3016 if (exp_b10 < 0)
3017 {
3018 *ascii++ = 45, --size; /* '-': PLUS 1 TOTAL 3+precision */
3019 uexp_b10 = -exp_b10;
3020 }
3021
3022 else
3023 uexp_b10 = exp_b10;
3024
3025 cdigits = 0;
3026
3027 while (uexp_b10 > 0)
3028 {
3029 exponent[cdigits++] = (char)(48 + uexp_b10 % 10);
3030 uexp_b10 /= 10;
3031 }
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003032 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003033
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003034 /* Need another size check here for the exponent digits, so
3035 * this need not be considered above.
3036 */
3037 if ((int)size > cdigits)
3038 {
3039 while (cdigits > 0) *ascii++ = exponent[--cdigits];
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003040
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003041 *ascii = 0;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003042
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003043 return;
3044 }
3045 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003046 }
3047 else if (!(fp >= DBL_MIN))
3048 {
3049 *ascii++ = 48; /* '0' */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003050 *ascii = 0;
3051 return;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003052 }
3053 else
3054 {
3055 *ascii++ = 105; /* 'i' */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003056 *ascii++ = 110; /* 'n' */
3057 *ascii++ = 102; /* 'f' */
3058 *ascii = 0;
3059 return;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003060 }
3061 }
3062
3063 /* Here on buffer too small. */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003064 png_error(png_ptr, "ASCII conversion buffer too small");
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003065}
3066
3067# endif /* FLOATING_POINT */
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003068
3069# ifdef PNG_FIXED_POINT_SUPPORTED
3070/* Function to format a fixed point value in ASCII.
3071 */
3072void /* PRIVATE */
John Bowler4f67e402011-12-28 08:43:37 -06003073png_ascii_from_fixed(png_const_structrp png_ptr, png_charp ascii,
3074 png_size_t size, png_fixed_point fp)
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003075{
3076 /* Require space for 10 decimal digits, a decimal point, a minus sign and a
3077 * trailing \0, 13 characters:
3078 */
3079 if (size > 12)
3080 {
3081 png_uint_32 num;
3082
3083 /* Avoid overflow here on the minimum integer. */
3084 if (fp < 0)
3085 *ascii++ = 45, --size, num = -fp;
3086 else
3087 num = fp;
3088
John Bowler75156122011-09-09 17:21:44 -05003089 if (num <= 0x80000000) /* else overflowed */
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003090 {
Glenn Randers-Pehrsonb75b2412011-04-16 19:35:05 -05003091 unsigned int ndigits = 0, first = 16 /* flag value */;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003092 char digits[10];
3093
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003094 while (num)
3095 {
3096 /* Split the low digit off num: */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003097 unsigned int tmp = num/10;
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003098 num -= tmp*10;
3099 digits[ndigits++] = (char)(48 + num);
3100 /* Record the first non-zero digit, note that this is a number
3101 * starting at 1, it's not actually the array index.
3102 */
3103 if (first == 16 && num > 0)
3104 first = ndigits;
3105 num = tmp;
3106 }
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003107
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003108 if (ndigits > 0)
3109 {
3110 while (ndigits > 5) *ascii++ = digits[--ndigits];
3111 /* The remaining digits are fractional digits, ndigits is '5' or
3112 * smaller at this point. It is certainly not zero. Check for a
3113 * non-zero fractional digit:
3114 */
3115 if (first <= 5)
3116 {
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003117 unsigned int i;
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003118 *ascii++ = 46; /* decimal point */
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -05003119 /* ndigits may be <5 for small numbers, output leading zeros
3120 * then ndigits digits to first:
3121 */
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003122 i = 5;
3123 while (ndigits < i) *ascii++ = 48, --i;
3124 while (ndigits >= first) *ascii++ = digits[--ndigits];
3125 /* Don't output the trailing zeros! */
3126 }
3127 }
3128 else
3129 *ascii++ = 48;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003130
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003131 /* And null terminate the string: */
3132 *ascii = 0;
3133 return;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003134 }
3135 }
3136
3137 /* Here on buffer too small. */
3138 png_error(png_ptr, "ASCII conversion buffer too small");
3139}
3140# endif /* FIXED_POINT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003141#endif /* READ_SCAL */
3142
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -05003143#if defined(PNG_FLOATING_POINT_SUPPORTED) && \
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003144 !defined(PNG_FIXED_POINT_MACRO_SUPPORTED) && \
3145 (defined(PNG_gAMA_SUPPORTED) || defined(PNG_cHRM_SUPPORTED) || \
3146 defined(PNG_sCAL_SUPPORTED) || defined(PNG_READ_BACKGROUND_SUPPORTED) || \
3147 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)) || \
3148 (defined(PNG_sCAL_SUPPORTED) && \
3149 defined(PNG_FLOATING_ARITHMETIC_SUPPORTED))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003150png_fixed_point
John Bowler5d567862011-12-24 09:12:00 -06003151png_fixed(png_const_structrp png_ptr, double fp, png_const_charp text)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003152{
3153 double r = floor(100000 * fp + .5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003154
Glenn Randers-Pehrson77c3bf12011-01-20 15:56:31 -06003155 if (r > 2147483647. || r < -2147483648.)
3156 png_fixed_error(png_ptr, text);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003157
Glenn Randers-Pehrsonc9120502013-11-22 14:58:04 -06003158# ifndef PNG_ERROR_TEXT_SUPPORTED
3159 PNG_UNUSED(text)
3160# endif
3161
Glenn Randers-Pehrson77c3bf12011-01-20 15:56:31 -06003162 return (png_fixed_point)r;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003163}
3164#endif
3165
Glenn Randers-Pehrsonc9120502013-11-22 14:58:04 -06003166#if defined(PNG_GAMMA_SUPPORTED) || defined(PNG_COLORSPACE_SUPPORTED) ||\
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003167 defined(PNG_INCH_CONVERSIONS_SUPPORTED) || defined(PNG_READ_pHYs_SUPPORTED)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003168/* muldiv functions */
3169/* This API takes signed arguments and rounds the result to the nearest
3170 * integer (or, for a fixed point number - the standard argument - to
3171 * the nearest .00001). Overflow and divide by zero are signalled in
3172 * the result, a boolean - true on success, false on overflow.
3173 */
3174int
3175png_muldiv(png_fixed_point_p res, png_fixed_point a, png_int_32 times,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003176 png_int_32 divisor)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003177{
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003178 /* Return a * times / divisor, rounded. */
3179 if (divisor != 0)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003180 {
3181 if (a == 0 || times == 0)
3182 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003183 *res = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003184 return 1;
3185 }
3186 else
3187 {
3188#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003189 double r = a;
3190 r *= times;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003191 r /= divisor;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003192 r = floor(r+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003193
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003194 /* A png_fixed_point is a 32-bit integer. */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003195 if (r <= 2147483647. && r >= -2147483648.)
3196 {
3197 *res = (png_fixed_point)r;
3198 return 1;
3199 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003200#else
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003201 int negative = 0;
3202 png_uint_32 A, T, D;
Glenn Randers-Pehrson3b5d6952010-08-19 08:06:12 -05003203 png_uint_32 s16, s32, s00;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003204
3205 if (a < 0)
3206 negative = 1, A = -a;
3207 else
3208 A = a;
3209
3210 if (times < 0)
3211 negative = !negative, T = -times;
3212 else
3213 T = times;
3214
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003215 if (divisor < 0)
3216 negative = !negative, D = -divisor;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003217 else
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003218 D = divisor;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003219
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003220 /* Following can't overflow because the arguments only
3221 * have 31 bits each, however the result may be 32 bits.
3222 */
Glenn Randers-Pehrson3b5d6952010-08-19 08:06:12 -05003223 s16 = (A >> 16) * (T & 0xffff) +
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05003224 (A & 0xffff) * (T >> 16);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003225 /* Can't overflow because the a*times bit is only 30
3226 * bits at most.
3227 */
Glenn Randers-Pehrson3b5d6952010-08-19 08:06:12 -05003228 s32 = (A >> 16) * (T >> 16) + (s16 >> 16);
3229 s00 = (A & 0xffff) * (T & 0xffff);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003230
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003231 s16 = (s16 & 0xffff) << 16;
3232 s00 += s16;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003233
3234 if (s00 < s16)
3235 ++s32; /* carry */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003236
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003237 if (s32 < D) /* else overflow */
3238 {
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003239 /* s32.s00 is now the 64-bit product, do a standard
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003240 * division, we know that s32 < D, so the maximum
3241 * required shift is 31.
3242 */
3243 int bitshift = 32;
3244 png_fixed_point result = 0; /* NOTE: signed */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003245
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003246 while (--bitshift >= 0)
3247 {
3248 png_uint_32 d32, d00;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003249
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003250 if (bitshift > 0)
3251 d32 = D >> (32-bitshift), d00 = D << bitshift;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003252
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003253 else
3254 d32 = 0, d00 = D;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003255
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003256 if (s32 > d32)
3257 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05003258 if (s00 < d00) --s32; /* carry */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003259 s32 -= d32, s00 -= d00, result += 1<<bitshift;
3260 }
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003261
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003262 else
3263 if (s32 == d32 && s00 >= d00)
3264 s32 = 0, s00 -= d00, result += 1<<bitshift;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003265 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003266
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003267 /* Handle the rounding. */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003268 if (s00 >= (D >> 1))
3269 ++result;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003270
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06003271 if (negative != 0)
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003272 result = -result;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003273
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003274 /* Check for overflow. */
Glenn Randers-Pehrsonebba0742014-10-25 12:22:39 -05003275 if ((negative != 0 && result <= 0) ||
3276 (negative == 0 && result >= 0))
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003277 {
3278 *res = result;
3279 return 1;
3280 }
3281 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003282#endif
3283 }
3284 }
3285
3286 return 0;
3287}
3288#endif /* READ_GAMMA || INCH_CONVERSIONS */
3289
3290#if defined(PNG_READ_GAMMA_SUPPORTED) || defined(PNG_INCH_CONVERSIONS_SUPPORTED)
3291/* The following is for when the caller doesn't much care about the
3292 * result.
3293 */
3294png_fixed_point
John Bowler5d567862011-12-24 09:12:00 -06003295png_muldiv_warn(png_const_structrp png_ptr, png_fixed_point a, png_int_32 times,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003296 png_int_32 divisor)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003297{
3298 png_fixed_point result;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003299
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003300 if (png_muldiv(&result, a, times, divisor))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003301 return result;
3302
3303 png_warning(png_ptr, "fixed point overflow ignored");
3304 return 0;
3305}
3306#endif
3307
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003308#ifdef PNG_GAMMA_SUPPORTED /* more fixed point functions for gamma */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003309/* Calculate a reciprocal, return 0 on div-by-zero or overflow. */
3310png_fixed_point
3311png_reciprocal(png_fixed_point a)
3312{
3313#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3314 double r = floor(1E10/a+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003315
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003316 if (r <= 2147483647. && r >= -2147483648.)
3317 return (png_fixed_point)r;
3318#else
3319 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003320
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003321 if (png_muldiv(&res, 100000, 100000, a))
3322 return res;
3323#endif
3324
3325 return 0; /* error/overflow */
3326}
3327
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003328/* This is the shared test on whether a gamma value is 'significant' - whether
3329 * it is worth doing gamma correction.
3330 */
3331int /* PRIVATE */
3332png_gamma_significant(png_fixed_point gamma_val)
3333{
3334 return gamma_val < PNG_FP_1 - PNG_GAMMA_THRESHOLD_FIXED ||
3335 gamma_val > PNG_FP_1 + PNG_GAMMA_THRESHOLD_FIXED;
3336}
3337#endif
3338
3339#ifdef PNG_READ_GAMMA_SUPPORTED
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003340# ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003341/* A local convenience routine. */
3342static png_fixed_point
3343png_product2(png_fixed_point a, png_fixed_point b)
3344{
Glenn Randers-Pehrson9c690912010-08-27 11:39:38 -05003345 /* The required result is 1/a * 1/b; the following preserves accuracy. */
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003346# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003347 double r = a * 1E-5;
3348 r *= b;
3349 r = floor(r+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003350
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003351 if (r <= 2147483647. && r >= -2147483648.)
3352 return (png_fixed_point)r;
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003353# else
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003354 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003355
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003356 if (png_muldiv(&res, a, b, 100000))
3357 return res;
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003358# endif
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003359
3360 return 0; /* overflow */
3361}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003362# endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003363
3364/* The inverse of the above. */
3365png_fixed_point
3366png_reciprocal2(png_fixed_point a, png_fixed_point b)
3367{
Glenn Randers-Pehrson9c690912010-08-27 11:39:38 -05003368 /* The required result is 1/a * 1/b; the following preserves accuracy. */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003369#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3370 double r = 1E15/a;
3371 r /= b;
3372 r = floor(r+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003373
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003374 if (r <= 2147483647. && r >= -2147483648.)
3375 return (png_fixed_point)r;
3376#else
3377 /* This may overflow because the range of png_fixed_point isn't symmetric,
3378 * but this API is only used for the product of file and screen gamma so it
3379 * doesn't matter that the smallest number it can produce is 1/21474, not
3380 * 1/100000
3381 */
3382 png_fixed_point res = png_product2(a, b);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003383
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003384 if (res != 0)
3385 return png_reciprocal(res);
3386#endif
3387
3388 return 0; /* overflow */
3389}
3390#endif /* READ_GAMMA */
3391
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003392#ifdef PNG_READ_GAMMA_SUPPORTED /* gamma table code */
3393#ifndef PNG_FLOATING_ARITHMETIC_SUPPORTED
3394/* Fixed point gamma.
3395 *
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003396 * The code to calculate the tables used below can be found in the shell script
3397 * contrib/tools/intgamma.sh
3398 *
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003399 * To calculate gamma this code implements fast log() and exp() calls using only
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003400 * fixed point arithmetic. This code has sufficient precision for either 8-bit
3401 * or 16-bit sample values.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003402 *
3403 * The tables used here were calculated using simple 'bc' programs, but C double
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003404 * precision floating point arithmetic would work fine.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003405 *
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003406 * 8-bit log table
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003407 * This is a table of -log(value/255)/log(2) for 'value' in the range 128 to
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003408 * 255, so it's the base 2 logarithm of a normalized 8-bit floating point
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003409 * mantissa. The numbers are 32-bit fractions.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003410 */
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003411static const png_uint_32
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003412png_8bit_l2[128] =
3413{
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003414 4270715492U, 4222494797U, 4174646467U, 4127164793U, 4080044201U, 4033279239U,
3415 3986864580U, 3940795015U, 3895065449U, 3849670902U, 3804606499U, 3759867474U,
3416 3715449162U, 3671346997U, 3627556511U, 3584073329U, 3540893168U, 3498011834U,
3417 3455425220U, 3413129301U, 3371120137U, 3329393864U, 3287946700U, 3246774933U,
3418 3205874930U, 3165243125U, 3124876025U, 3084770202U, 3044922296U, 3005329011U,
3419 2965987113U, 2926893432U, 2888044853U, 2849438323U, 2811070844U, 2772939474U,
3420 2735041326U, 2697373562U, 2659933400U, 2622718104U, 2585724991U, 2548951424U,
3421 2512394810U, 2476052606U, 2439922311U, 2404001468U, 2368287663U, 2332778523U,
3422 2297471715U, 2262364947U, 2227455964U, 2192742551U, 2158222529U, 2123893754U,
3423 2089754119U, 2055801552U, 2022034013U, 1988449497U, 1955046031U, 1921821672U,
3424 1888774511U, 1855902668U, 1823204291U, 1790677560U, 1758320682U, 1726131893U,
3425 1694109454U, 1662251657U, 1630556815U, 1599023271U, 1567649391U, 1536433567U,
3426 1505374214U, 1474469770U, 1443718700U, 1413119487U, 1382670639U, 1352370686U,
3427 1322218179U, 1292211689U, 1262349810U, 1232631153U, 1203054352U, 1173618059U,
3428 1144320946U, 1115161701U, 1086139034U, 1057251672U, 1028498358U, 999877854U,
3429 971388940U, 943030410U, 914801076U, 886699767U, 858725327U, 830876614U,
3430 803152505U, 775551890U, 748073672U, 720716771U, 693480120U, 666362667U,
3431 639363374U, 612481215U, 585715177U, 559064263U, 532527486U, 506103872U,
3432 479792461U, 453592303U, 427502463U, 401522014U, 375650043U, 349885648U,
3433 324227938U, 298676034U, 273229066U, 247886176U, 222646516U, 197509248U,
3434 172473545U, 147538590U, 122703574U, 97967701U, 73330182U, 48790236U,
3435 24347096U, 0U
Glenn Randers-Pehrson8888ea42011-11-28 11:29:10 -06003436
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003437#if 0
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003438 /* The following are the values for 16-bit tables - these work fine for the
3439 * 8-bit conversions but produce very slightly larger errors in the 16-bit
3440 * log (about 1.2 as opposed to 0.7 absolute error in the final value). To
3441 * use these all the shifts below must be adjusted appropriately.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003442 */
3443 65166, 64430, 63700, 62976, 62257, 61543, 60835, 60132, 59434, 58741, 58054,
3444 57371, 56693, 56020, 55352, 54689, 54030, 53375, 52726, 52080, 51439, 50803,
3445 50170, 49542, 48918, 48298, 47682, 47070, 46462, 45858, 45257, 44661, 44068,
3446 43479, 42894, 42312, 41733, 41159, 40587, 40020, 39455, 38894, 38336, 37782,
3447 37230, 36682, 36137, 35595, 35057, 34521, 33988, 33459, 32932, 32408, 31887,
3448 31369, 30854, 30341, 29832, 29325, 28820, 28319, 27820, 27324, 26830, 26339,
3449 25850, 25364, 24880, 24399, 23920, 23444, 22970, 22499, 22029, 21562, 21098,
3450 20636, 20175, 19718, 19262, 18808, 18357, 17908, 17461, 17016, 16573, 16132,
3451 15694, 15257, 14822, 14390, 13959, 13530, 13103, 12678, 12255, 11834, 11415,
3452 10997, 10582, 10168, 9756, 9346, 8937, 8531, 8126, 7723, 7321, 6921, 6523,
3453 6127, 5732, 5339, 4947, 4557, 4169, 3782, 3397, 3014, 2632, 2251, 1872, 1495,
3454 1119, 744, 372
3455#endif
3456};
3457
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003458static png_int_32
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003459png_log8bit(unsigned int x)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003460{
John Bowler168a4332011-01-16 19:32:22 -06003461 unsigned int lg2 = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003462 /* Each time 'x' is multiplied by 2, 1 must be subtracted off the final log,
3463 * because the log is actually negate that means adding 1. The final
3464 * returned value thus has the range 0 (for 255 input) to 7.994 (for 1
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003465 * input), return -1 for the overflow (log 0) case, - so the result is
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003466 * always at most 19 bits.
3467 */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003468 if ((x &= 0xff) == 0)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003469 return -1;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003470
3471 if ((x & 0xf0) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003472 lg2 = 4, x <<= 4;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003473
3474 if ((x & 0xc0) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003475 lg2 += 2, x <<= 2;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003476
3477 if ((x & 0x80) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003478 lg2 += 1, x <<= 1;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003479
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003480 /* result is at most 19 bits, so this cast is safe: */
John Bowler168a4332011-01-16 19:32:22 -06003481 return (png_int_32)((lg2 << 16) + ((png_8bit_l2[x-128]+32768)>>16));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003482}
3483
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003484/* The above gives exact (to 16 binary places) log2 values for 8-bit images,
3485 * for 16-bit images we use the most significant 8 bits of the 16-bit value to
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003486 * get an approximation then multiply the approximation by a correction factor
3487 * determined by the remaining up to 8 bits. This requires an additional step
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003488 * in the 16-bit case.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003489 *
3490 * We want log2(value/65535), we have log2(v'/255), where:
3491 *
3492 * value = v' * 256 + v''
3493 * = v' * f
3494 *
3495 * So f is value/v', which is equal to (256+v''/v') since v' is in the range 128
3496 * to 255 and v'' is in the range 0 to 255 f will be in the range 256 to less
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003497 * than 258. The final factor also needs to correct for the fact that our 8-bit
3498 * value is scaled by 255, whereas the 16-bit values must be scaled by 65535.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003499 *
3500 * This gives a final formula using a calculated value 'x' which is value/v' and
3501 * scaling by 65536 to match the above table:
3502 *
3503 * log2(x/257) * 65536
3504 *
3505 * Since these numbers are so close to '1' we can use simple linear
3506 * interpolation between the two end values 256/257 (result -368.61) and 258/257
3507 * (result 367.179). The values used below are scaled by a further 64 to give
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003508 * 16-bit precision in the interpolation:
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003509 *
3510 * Start (256): -23591
3511 * Zero (257): 0
3512 * End (258): 23499
3513 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003514static png_int_32
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003515png_log16bit(png_uint_32 x)
3516{
John Bowler168a4332011-01-16 19:32:22 -06003517 unsigned int lg2 = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003518
3519 /* As above, but now the input has 16 bits. */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003520 if ((x &= 0xffff) == 0)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003521 return -1;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003522
3523 if ((x & 0xff00) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003524 lg2 = 8, x <<= 8;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003525
3526 if ((x & 0xf000) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003527 lg2 += 4, x <<= 4;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003528
3529 if ((x & 0xc000) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003530 lg2 += 2, x <<= 2;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003531
3532 if ((x & 0x8000) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003533 lg2 += 1, x <<= 1;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003534
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003535 /* Calculate the base logarithm from the top 8 bits as a 28-bit fractional
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003536 * value.
3537 */
John Bowler168a4332011-01-16 19:32:22 -06003538 lg2 <<= 28;
3539 lg2 += (png_8bit_l2[(x>>8)-128]+8) >> 4;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003540
3541 /* Now we need to interpolate the factor, this requires a division by the top
3542 * 8 bits. Do this with maximum precision.
3543 */
3544 x = ((x << 16) + (x >> 9)) / (x >> 8);
3545
3546 /* Since we divided by the top 8 bits of 'x' there will be a '1' at 1<<24,
3547 * the value at 1<<16 (ignoring this) will be 0 or 1; this gives us exactly
3548 * 16 bits to interpolate to get the low bits of the result. Round the
3549 * answer. Note that the end point values are scaled by 64 to retain overall
John Bowler168a4332011-01-16 19:32:22 -06003550 * precision and that 'lg2' is current scaled by an extra 12 bits, so adjust
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003551 * the overall scaling by 6-12. Round at every step.
3552 */
3553 x -= 1U << 24;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003554
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003555 if (x <= 65536U) /* <= '257' */
John Bowler168a4332011-01-16 19:32:22 -06003556 lg2 += ((23591U * (65536U-x)) + (1U << (16+6-12-1))) >> (16+6-12);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003557
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003558 else
John Bowler168a4332011-01-16 19:32:22 -06003559 lg2 -= ((23499U * (x-65536U)) + (1U << (16+6-12-1))) >> (16+6-12);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003560
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003561 /* Safe, because the result can't have more than 20 bits: */
John Bowler168a4332011-01-16 19:32:22 -06003562 return (png_int_32)((lg2 + 2048) >> 12);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003563}
3564
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003565/* The 'exp()' case must invert the above, taking a 20-bit fixed point
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003566 * logarithmic value and returning a 16 or 8-bit number as appropriate. In
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003567 * each case only the low 16 bits are relevant - the fraction - since the
3568 * integer bits (the top 4) simply determine a shift.
3569 *
Glenn Randers-Pehrsonca9c3a62014-10-03 18:08:34 -05003570 * The worst case is the 16-bit distinction between 65535 and 65534. This
3571 * requires perhaps spurious accuracy in the decoding of the logarithm to
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003572 * distinguish log2(65535/65534.5) - 10^-5 or 17 bits. There is little chance
3573 * of getting this accuracy in practice.
3574 *
3575 * To deal with this the following exp() function works out the exponent of the
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003576 * frational part of the logarithm by using an accurate 32-bit value from the
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003577 * top four fractional bits then multiplying in the remaining bits.
3578 */
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003579static const png_uint_32
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003580png_32bit_exp[16] =
3581{
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003582 /* NOTE: the first entry is deliberately set to the maximum 32-bit value. */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003583 4294967295U, 4112874773U, 3938502376U, 3771522796U, 3611622603U, 3458501653U,
3584 3311872529U, 3171459999U, 3037000500U, 2908241642U, 2784941738U, 2666869345U,
3585 2553802834U, 2445529972U, 2341847524U, 2242560872U
3586};
3587
3588/* Adjustment table; provided to explain the numbers in the code below. */
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003589#if 0
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003590for (i=11;i>=0;--i){ print i, " ", (1 - e(-(2^i)/65536*l(2))) * 2^(32-i), "\n"}
3591 11 44937.64284865548751208448
3592 10 45180.98734845585101160448
3593 9 45303.31936980687359311872
3594 8 45364.65110595323018870784
3595 7 45395.35850361789624614912
3596 6 45410.72259715102037508096
3597 5 45418.40724413220722311168
3598 4 45422.25021786898173001728
3599 3 45424.17186732298419044352
3600 2 45425.13273269940811464704
3601 1 45425.61317555035558641664
3602 0 45425.85339951654943850496
3603#endif
3604
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003605static png_uint_32
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003606png_exp(png_fixed_point x)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003607{
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003608 if (x > 0 && x <= 0xfffff) /* Else overflow or zero (underflow) */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003609 {
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003610 /* Obtain a 4-bit approximation */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003611 png_uint_32 e = png_32bit_exp[(x >> 12) & 0xf];
3612
3613 /* Incorporate the low 12 bits - these decrease the returned value by
3614 * multiplying by a number less than 1 if the bit is set. The multiplier
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003615 * is determined by the above table and the shift. Notice that the values
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003616 * converge on 45426 and this is used to allow linear interpolation of the
3617 * low bits.
3618 */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003619 if (x & 0x800)
3620 e -= (((e >> 16) * 44938U) + 16U) >> 5;
3621
3622 if (x & 0x400)
3623 e -= (((e >> 16) * 45181U) + 32U) >> 6;
3624
3625 if (x & 0x200)
3626 e -= (((e >> 16) * 45303U) + 64U) >> 7;
3627
3628 if (x & 0x100)
3629 e -= (((e >> 16) * 45365U) + 128U) >> 8;
3630
3631 if (x & 0x080)
3632 e -= (((e >> 16) * 45395U) + 256U) >> 9;
3633
3634 if (x & 0x040)
3635 e -= (((e >> 16) * 45410U) + 512U) >> 10;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003636
3637 /* And handle the low 6 bits in a single block. */
3638 e -= (((e >> 16) * 355U * (x & 0x3fU)) + 256U) >> 9;
3639
3640 /* Handle the upper bits of x. */
3641 e >>= x >> 16;
3642 return e;
3643 }
3644
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003645 /* Check for overflow */
3646 if (x <= 0)
3647 return png_32bit_exp[0];
3648
3649 /* Else underflow */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003650 return 0;
3651}
3652
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003653static png_byte
John Bowler168a4332011-01-16 19:32:22 -06003654png_exp8bit(png_fixed_point lg2)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003655{
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003656 /* Get a 32-bit value: */
John Bowler168a4332011-01-16 19:32:22 -06003657 png_uint_32 x = png_exp(lg2);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003658
Glenn Randers-Pehrsonca9c3a62014-10-03 18:08:34 -05003659 /* Convert the 32-bit value to 0..255 by multiplying by 256-1. Note that the
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003660 * second, rounding, step can't overflow because of the first, subtraction,
3661 * step.
3662 */
3663 x -= x >> 8;
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003664 return (png_byte)((x + 0x7fffffU) >> 24);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003665}
3666
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003667#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003668static png_uint_16
John Bowler168a4332011-01-16 19:32:22 -06003669png_exp16bit(png_fixed_point lg2)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003670{
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003671 /* Get a 32-bit value: */
John Bowler168a4332011-01-16 19:32:22 -06003672 png_uint_32 x = png_exp(lg2);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003673
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003674 /* Convert the 32-bit value to 0..65535 by multiplying by 65536-1: */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003675 x -= x >> 16;
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003676 return (png_uint_16)((x + 32767U) >> 16);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003677}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003678#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003679#endif /* FLOATING_ARITHMETIC */
3680
3681png_byte
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003682png_gamma_8bit_correct(unsigned int value, png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003683{
3684 if (value > 0 && value < 255)
3685 {
3686# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003687 double r = floor(255*pow(value/255.,gamma_val*.00001)+.5);
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003688 return (png_byte)r;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003689# else
John Bowler168a4332011-01-16 19:32:22 -06003690 png_int_32 lg2 = png_log8bit(value);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003691 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003692
John Bowler168a4332011-01-16 19:32:22 -06003693 if (png_muldiv(&res, gamma_val, lg2, PNG_FP_1))
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003694 return png_exp8bit(res);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003695
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003696 /* Overflow. */
3697 value = 0;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003698# endif
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003699 }
3700
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003701 return (png_byte)value;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003702}
3703
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003704#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003705png_uint_16
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003706png_gamma_16bit_correct(unsigned int value, png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003707{
3708 if (value > 0 && value < 65535)
3709 {
3710# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003711 double r = floor(65535*pow(value/65535.,gamma_val*.00001)+.5);
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003712 return (png_uint_16)r;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003713# else
John Bowler168a4332011-01-16 19:32:22 -06003714 png_int_32 lg2 = png_log16bit(value);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003715 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003716
John Bowler168a4332011-01-16 19:32:22 -06003717 if (png_muldiv(&res, gamma_val, lg2, PNG_FP_1))
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003718 return png_exp16bit(res);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003719
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003720 /* Overflow. */
3721 value = 0;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003722# endif
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003723 }
3724
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003725 return (png_uint_16)value;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003726}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003727#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003728
3729/* This does the right thing based on the bit_depth field of the
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003730 * png_struct, interpreting values as 8-bit or 16-bit. While the result
3731 * is nominally a 16-bit value if bit depth is 8 then the result is
3732 * 8-bit (as are the arguments.)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003733 */
3734png_uint_16 /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06003735png_gamma_correct(png_structrp png_ptr, unsigned int value,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003736 png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003737{
3738 if (png_ptr->bit_depth == 8)
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003739 return png_gamma_8bit_correct(value, gamma_val);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003740
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003741#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003742 else
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003743 return png_gamma_16bit_correct(value, gamma_val);
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003744#else
3745 /* should not reach this */
3746 return 0;
3747#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003748}
3749
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003750#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003751/* Internal function to build a single 16-bit table - the table consists of
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003752 * 'num' 256 entry subtables, where 'num' is determined by 'shift' - the amount
3753 * to shift the input values right (or 16-number_of_signifiant_bits).
3754 *
Glenn Randers-Pehrsona774c5d2010-08-26 19:37:55 -05003755 * The caller is responsible for ensuring that the table gets cleaned up on
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003756 * png_error (i.e. if one of the mallocs below fails) - i.e. the *table argument
3757 * should be somewhere that will be cleaned.
3758 */
3759static void
John Bowler5d567862011-12-24 09:12:00 -06003760png_build_16bit_table(png_structrp png_ptr, png_uint_16pp *ptable,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003761 PNG_CONST unsigned int shift, PNG_CONST png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003762{
3763 /* Various values derived from 'shift': */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003764 PNG_CONST unsigned int num = 1U << (8U - shift);
3765 PNG_CONST unsigned int max = (1U << (16U - shift))-1U;
3766 PNG_CONST unsigned int max_by_2 = 1U << (15U-shift);
3767 unsigned int i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003768
3769 png_uint_16pp table = *ptable =
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003770 (png_uint_16pp)png_calloc(png_ptr, num * (sizeof (png_uint_16p)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003771
3772 for (i = 0; i < num; i++)
3773 {
3774 png_uint_16p sub_table = table[i] =
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003775 (png_uint_16p)png_malloc(png_ptr, 256 * (sizeof (png_uint_16)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003776
3777 /* The 'threshold' test is repeated here because it can arise for one of
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003778 * the 16-bit tables even if the others don't hit it.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003779 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003780 if (png_gamma_significant(gamma_val))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003781 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003782 /* The old code would overflow at the end and this would cause the
3783 * 'pow' function to return a result >1, resulting in an
3784 * arithmetic error. This code follows the spec exactly; ig is
3785 * the recovered input sample, it always has 8-16 bits.
3786 *
3787 * We want input * 65535/max, rounded, the arithmetic fits in 32
3788 * bits (unsigned) so long as max <= 32767.
3789 */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003790 unsigned int j;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003791 for (j = 0; j < 256; j++)
3792 {
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003793 png_uint_32 ig = (j << (8-shift)) + i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003794# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003795 /* Inline the 'max' scaling operation: */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003796 double d = floor(65535*pow(ig/(double)max, gamma_val*.00001)+.5);
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003797 sub_table[j] = (png_uint_16)d;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003798# else
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06003799 if (shift != 0)
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05003800 ig = (ig * 65535U + max_by_2)/max;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003801
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003802 sub_table[j] = png_gamma_16bit_correct(ig, gamma_val);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003803# endif
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003804 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003805 }
3806 else
3807 {
3808 /* We must still build a table, but do it the fast way. */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003809 unsigned int j;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003810
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003811 for (j = 0; j < 256; j++)
3812 {
3813 png_uint_32 ig = (j << (8-shift)) + i;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003814
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06003815 if (shift != 0)
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003816 ig = (ig * 65535U + max_by_2)/max;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003817
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003818 sub_table[j] = (png_uint_16)ig;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003819 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003820 }
3821 }
3822}
3823
3824/* NOTE: this function expects the *inverse* of the overall gamma transformation
3825 * required.
3826 */
3827static void
John Bowler5d567862011-12-24 09:12:00 -06003828png_build_16to8_table(png_structrp png_ptr, png_uint_16pp *ptable,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003829 PNG_CONST unsigned int shift, PNG_CONST png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003830{
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003831 PNG_CONST unsigned int num = 1U << (8U - shift);
3832 PNG_CONST unsigned int max = (1U << (16U - shift))-1U;
3833 unsigned int i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003834 png_uint_32 last;
3835
3836 png_uint_16pp table = *ptable =
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003837 (png_uint_16pp)png_calloc(png_ptr, num * (sizeof (png_uint_16p)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003838
3839 /* 'num' is the number of tables and also the number of low bits of low
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003840 * bits of the input 16-bit value used to select a table. Each table is
Glenn Randers-Pehrsonca9c3a62014-10-03 18:08:34 -05003841 * itself indexed by the high 8 bits of the value.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003842 */
3843 for (i = 0; i < num; i++)
3844 table[i] = (png_uint_16p)png_malloc(png_ptr,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003845 256 * (sizeof (png_uint_16)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003846
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003847 /* 'gamma_val' is set to the reciprocal of the value calculated above, so
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003848 * pow(out,g) is an *input* value. 'last' is the last input value set.
3849 *
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003850 * In the loop 'i' is used to find output values. Since the output is
3851 * 8-bit there are only 256 possible values. The tables are set up to
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003852 * select the closest possible output value for each input by finding
3853 * the input value at the boundary between each pair of output values
3854 * and filling the table up to that boundary with the lower output
3855 * value.
3856 *
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003857 * The boundary values are 0.5,1.5..253.5,254.5. Since these are 9-bit
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003858 * values the code below uses a 16-bit value in i; the values start at
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003859 * 128.5 (for 0.5) and step by 257, for a total of 254 values (the last
3860 * entries are filled with 255). Start i at 128 and fill all 'last'
3861 * table entries <= 'max'
3862 */
3863 last = 0;
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003864 for (i = 0; i < 255; ++i) /* 8-bit output value */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003865 {
3866 /* Find the corresponding maximum input value */
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003867 png_uint_16 out = (png_uint_16)(i * 257U); /* 16-bit output value */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003868
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003869 /* Find the boundary value in 16 bits: */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003870 png_uint_32 bound = png_gamma_16bit_correct(out+128U, gamma_val);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003871
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003872 /* Adjust (round) to (16-shift) bits: */
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003873 bound = (bound * max + 32768U)/65535U + 1U;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003874
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003875 while (last < bound)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003876 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003877 table[last & (0xffU >> shift)][last >> (8U - shift)] = out;
3878 last++;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003879 }
3880 }
3881
3882 /* And fill in the final entries. */
3883 while (last < (num << 8))
3884 {
3885 table[last & (0xff >> shift)][last >> (8U - shift)] = 65535U;
3886 last++;
3887 }
3888}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003889#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003890
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003891/* Build a single 8-bit table: same as the 16-bit case but much simpler (and
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003892 * typically much faster). Note that libpng currently does no sBIT processing
Glenn Randers-Pehrsonca9c3a62014-10-03 18:08:34 -05003893 * (apparently contrary to the spec) so a 256-entry table is always generated.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003894 */
3895static void
John Bowler5d567862011-12-24 09:12:00 -06003896png_build_8bit_table(png_structrp png_ptr, png_bytepp ptable,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003897 PNG_CONST png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003898{
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003899 unsigned int i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003900 png_bytep table = *ptable = (png_bytep)png_malloc(png_ptr, 256);
3901
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003902 if (png_gamma_significant(gamma_val)) for (i=0; i<256; i++)
3903 table[i] = png_gamma_8bit_correct(i, gamma_val);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003904
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003905 else for (i=0; i<256; ++i)
3906 table[i] = (png_byte)i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003907}
3908
John Bowler07772cb2011-10-14 18:19:47 -05003909/* Used from png_read_destroy and below to release the memory used by the gamma
3910 * tables.
3911 */
3912void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06003913png_destroy_gamma_table(png_structrp png_ptr)
John Bowler07772cb2011-10-14 18:19:47 -05003914{
3915 png_free(png_ptr, png_ptr->gamma_table);
3916 png_ptr->gamma_table = NULL;
3917
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003918#ifdef PNG_16BIT_SUPPORTED
John Bowler07772cb2011-10-14 18:19:47 -05003919 if (png_ptr->gamma_16_table != NULL)
3920 {
3921 int i;
3922 int istop = (1 << (8 - png_ptr->gamma_shift));
3923 for (i = 0; i < istop; i++)
3924 {
3925 png_free(png_ptr, png_ptr->gamma_16_table[i]);
3926 }
3927 png_free(png_ptr, png_ptr->gamma_16_table);
3928 png_ptr->gamma_16_table = NULL;
3929 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003930#endif /* 16BIT */
John Bowler07772cb2011-10-14 18:19:47 -05003931
3932#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
3933 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
3934 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
3935 png_free(png_ptr, png_ptr->gamma_from_1);
3936 png_ptr->gamma_from_1 = NULL;
3937 png_free(png_ptr, png_ptr->gamma_to_1);
3938 png_ptr->gamma_to_1 = NULL;
3939
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003940#ifdef PNG_16BIT_SUPPORTED
John Bowler07772cb2011-10-14 18:19:47 -05003941 if (png_ptr->gamma_16_from_1 != NULL)
3942 {
3943 int i;
3944 int istop = (1 << (8 - png_ptr->gamma_shift));
3945 for (i = 0; i < istop; i++)
3946 {
3947 png_free(png_ptr, png_ptr->gamma_16_from_1[i]);
3948 }
3949 png_free(png_ptr, png_ptr->gamma_16_from_1);
3950 png_ptr->gamma_16_from_1 = NULL;
3951 }
3952 if (png_ptr->gamma_16_to_1 != NULL)
3953 {
3954 int i;
3955 int istop = (1 << (8 - png_ptr->gamma_shift));
3956 for (i = 0; i < istop; i++)
3957 {
3958 png_free(png_ptr, png_ptr->gamma_16_to_1[i]);
3959 }
3960 png_free(png_ptr, png_ptr->gamma_16_to_1);
3961 png_ptr->gamma_16_to_1 = NULL;
3962 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003963#endif /* 16BIT */
John Bowler07772cb2011-10-14 18:19:47 -05003964#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
3965}
3966
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003967/* We build the 8- or 16-bit gamma tables here. Note that for 16-bit
3968 * tables, we don't make a full table if we are reducing to 8-bit in
3969 * the future. Note also how the gamma_16 tables are segmented so that
3970 * we don't need to allocate > 64K chunks for a full 16-bit table.
3971 */
3972void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06003973png_build_gamma_table(png_structrp png_ptr, int bit_depth)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003974{
3975 png_debug(1, "in png_build_gamma_table");
3976
John Bowler07772cb2011-10-14 18:19:47 -05003977 /* Remove any existing table; this copes with multiple calls to
3978 * png_read_update_info. The warning is because building the gamma tables
3979 * multiple times is a performance hit - it's harmless but the ability to call
3980 * png_read_update_info() multiple times is new in 1.5.6 so it seems sensible
3981 * to warn if the app introduces such a hit.
3982 */
3983 if (png_ptr->gamma_table != NULL || png_ptr->gamma_16_table != NULL)
3984 {
3985 png_warning(png_ptr, "gamma table being rebuilt");
3986 png_destroy_gamma_table(png_ptr);
3987 }
3988
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003989 if (bit_depth <= 8)
3990 {
3991 png_build_8bit_table(png_ptr, &png_ptr->gamma_table,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003992 png_ptr->screen_gamma > 0 ? png_reciprocal2(png_ptr->colorspace.gamma,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003993 png_ptr->screen_gamma) : PNG_FP_1);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003994
3995#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
John Bowlerd273ad22011-05-07 21:00:28 -05003996 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003997 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
John Bowlerd273ad22011-05-07 21:00:28 -05003998 if (png_ptr->transformations & (PNG_COMPOSE | PNG_RGB_TO_GRAY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003999 {
4000 png_build_8bit_table(png_ptr, &png_ptr->gamma_to_1,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004001 png_reciprocal(png_ptr->colorspace.gamma));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004002
4003 png_build_8bit_table(png_ptr, &png_ptr->gamma_from_1,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004004 png_ptr->screen_gamma > 0 ? png_reciprocal(png_ptr->screen_gamma) :
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004005 png_ptr->colorspace.gamma/* Probably doing rgb_to_gray */);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004006 }
John Bowlerd273ad22011-05-07 21:00:28 -05004007#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004008 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06004009#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004010 else
4011 {
4012 png_byte shift, sig_bit;
4013
4014 if (png_ptr->color_type & PNG_COLOR_MASK_COLOR)
4015 {
4016 sig_bit = png_ptr->sig_bit.red;
4017
4018 if (png_ptr->sig_bit.green > sig_bit)
4019 sig_bit = png_ptr->sig_bit.green;
4020
4021 if (png_ptr->sig_bit.blue > sig_bit)
4022 sig_bit = png_ptr->sig_bit.blue;
4023 }
4024 else
4025 sig_bit = png_ptr->sig_bit.gray;
4026
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05004027 /* 16-bit gamma code uses this equation:
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004028 *
4029 * ov = table[(iv & 0xff) >> gamma_shift][iv >> 8]
4030 *
4031 * Where 'iv' is the input color value and 'ov' is the output value -
4032 * pow(iv, gamma).
4033 *
Glenn Randers-Pehrsonca9c3a62014-10-03 18:08:34 -05004034 * Thus the gamma table consists of up to 256 256-entry tables. The table
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004035 * is selected by the (8-gamma_shift) most significant of the low 8 bits of
4036 * the color value then indexed by the upper 8 bits:
4037 *
4038 * table[low bits][high 8 bits]
4039 *
4040 * So the table 'n' corresponds to all those 'iv' of:
4041 *
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05004042 * <all high 8-bit values><n << gamma_shift>..<(n+1 << gamma_shift)-1>
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004043 *
4044 */
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05004045 if (sig_bit > 0 && sig_bit < 16U)
4046 shift = (png_byte)(16U - sig_bit); /* shift == insignificant bits */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004047
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004048 else
4049 shift = 0; /* keep all 16 bits */
4050
Glenn Randers-Pehrsonab63dd02011-06-17 20:04:17 -05004051 if (png_ptr->transformations & (PNG_16_TO_8 | PNG_SCALE_16_TO_8))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004052 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004053 /* PNG_MAX_GAMMA_8 is the number of bits to keep - effectively
4054 * the significant bits in the *input* when the output will
4055 * eventually be 8 bits. By default it is 11.
4056 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004057 if (shift < (16U - PNG_MAX_GAMMA_8))
4058 shift = (16U - PNG_MAX_GAMMA_8);
4059 }
4060
4061 if (shift > 8U)
4062 shift = 8U; /* Guarantees at least one table! */
4063
4064 png_ptr->gamma_shift = shift;
4065
Glenn Randers-Pehrsonef217b72011-06-15 12:58:27 -05004066 /* NOTE: prior to 1.5.4 this test used to include PNG_BACKGROUND (now
John Bowlerd273ad22011-05-07 21:00:28 -05004067 * PNG_COMPOSE). This effectively smashed the background calculation for
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05004068 * 16-bit output because the 8-bit table assumes the result will be reduced
John Bowlerd273ad22011-05-07 21:00:28 -05004069 * to 8 bits.
4070 */
Glenn Randers-Pehrsonab63dd02011-06-17 20:04:17 -05004071 if (png_ptr->transformations & (PNG_16_TO_8 | PNG_SCALE_16_TO_8))
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004072 png_build_16to8_table(png_ptr, &png_ptr->gamma_16_table, shift,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004073 png_ptr->screen_gamma > 0 ? png_product2(png_ptr->colorspace.gamma,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004074 png_ptr->screen_gamma) : PNG_FP_1);
4075
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004076 else
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004077 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_table, shift,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004078 png_ptr->screen_gamma > 0 ? png_reciprocal2(png_ptr->colorspace.gamma,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004079 png_ptr->screen_gamma) : PNG_FP_1);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004080
4081#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
John Bowlerd273ad22011-05-07 21:00:28 -05004082 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004083 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
John Bowlerd273ad22011-05-07 21:00:28 -05004084 if (png_ptr->transformations & (PNG_COMPOSE | PNG_RGB_TO_GRAY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004085 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004086 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_to_1, shift,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004087 png_reciprocal(png_ptr->colorspace.gamma));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004088
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004089 /* Notice that the '16 from 1' table should be full precision, however
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004090 * the lookup on this table still uses gamma_shift, so it can't be.
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004091 * TODO: fix this.
4092 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004093 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_from_1, shift,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004094 png_ptr->screen_gamma > 0 ? png_reciprocal(png_ptr->screen_gamma) :
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004095 png_ptr->colorspace.gamma/* Probably doing rgb_to_gray */);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004096 }
John Bowlerd273ad22011-05-07 21:00:28 -05004097#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004098 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06004099#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004100}
4101#endif /* READ_GAMMA */
John Bowler7875d532011-11-07 22:33:49 -06004102
Glenn Randers-Pehrsonc4b37182014-04-06 08:59:57 -05004103/* HARDWARE OR SOFTWARE OPTION SUPPORT */
John Bowlerf3728102013-03-04 16:26:31 -06004104#ifdef PNG_SET_OPTION_SUPPORTED
4105int PNGAPI
4106png_set_option(png_structrp png_ptr, int option, int onoff)
4107{
4108 if (png_ptr != NULL && option >= 0 && option < PNG_OPTION_NEXT &&
4109 (option & 1) == 0)
4110 {
4111 int mask = 3 << option;
4112 int setting = (2 + (onoff != 0)) << option;
4113 int current = png_ptr->options;
4114
4115 png_ptr->options = (png_byte)((current & ~mask) | setting);
4116
4117 return (current & mask) >> option;
4118 }
4119
4120 return PNG_OPTION_INVALID;
4121}
4122#endif
4123
John Bowler7875d532011-11-07 22:33:49 -06004124/* sRGB support */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004125#if defined(PNG_SIMPLIFIED_READ_SUPPORTED) ||\
4126 defined(PNG_SIMPLIFIED_WRITE_SUPPORTED)
John Bowler0a521d32011-11-11 18:14:59 -06004127/* sRGB conversion tables; these are machine generated with the code in
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004128 * contrib/tools/makesRGB.c. The actual sRGB transfer curve defined in the
4129 * specification (see the article at http://en.wikipedia.org/wiki/SRGB)
4130 * is used, not the gamma=1/2.2 approximation use elsewhere in libpng.
4131 * The sRGB to linear table is exact (to the nearest 16 bit linear fraction).
4132 * The inverse (linear to sRGB) table has accuracies as follows:
John Bowler0a521d32011-11-11 18:14:59 -06004133 *
4134 * For all possible (255*65535+1) input values:
4135 *
4136 * error: -0.515566 - 0.625971, 79441 (0.475369%) of readings inexact
4137 *
4138 * For the input values corresponding to the 65536 16-bit values:
4139 *
4140 * error: -0.513727 - 0.607759, 308 (0.469978%) of readings inexact
4141 *
Glenn Randers-Pehrsonca9c3a62014-10-03 18:08:34 -05004142 * In all cases the inexact readings are only off by one.
John Bowler7875d532011-11-07 22:33:49 -06004143 */
John Bowler7875d532011-11-07 22:33:49 -06004144
4145#ifdef PNG_SIMPLIFIED_READ_SUPPORTED
4146/* The convert-to-sRGB table is only currently required for read. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004147const png_uint_16 png_sRGB_table[256] =
John Bowler7875d532011-11-07 22:33:49 -06004148{
4149 0,20,40,60,80,99,119,139,
4150 159,179,199,219,241,264,288,313,
4151 340,367,396,427,458,491,526,562,
4152 599,637,677,718,761,805,851,898,
4153 947,997,1048,1101,1156,1212,1270,1330,
4154 1391,1453,1517,1583,1651,1720,1790,1863,
4155 1937,2013,2090,2170,2250,2333,2418,2504,
4156 2592,2681,2773,2866,2961,3058,3157,3258,
4157 3360,3464,3570,3678,3788,3900,4014,4129,
4158 4247,4366,4488,4611,4736,4864,4993,5124,
4159 5257,5392,5530,5669,5810,5953,6099,6246,
4160 6395,6547,6700,6856,7014,7174,7335,7500,
4161 7666,7834,8004,8177,8352,8528,8708,8889,
4162 9072,9258,9445,9635,9828,10022,10219,10417,
4163 10619,10822,11028,11235,11446,11658,11873,12090,
4164 12309,12530,12754,12980,13209,13440,13673,13909,
4165 14146,14387,14629,14874,15122,15371,15623,15878,
4166 16135,16394,16656,16920,17187,17456,17727,18001,
4167 18277,18556,18837,19121,19407,19696,19987,20281,
4168 20577,20876,21177,21481,21787,22096,22407,22721,
4169 23038,23357,23678,24002,24329,24658,24990,25325,
4170 25662,26001,26344,26688,27036,27386,27739,28094,
4171 28452,28813,29176,29542,29911,30282,30656,31033,
4172 31412,31794,32179,32567,32957,33350,33745,34143,
4173 34544,34948,35355,35764,36176,36591,37008,37429,
4174 37852,38278,38706,39138,39572,40009,40449,40891,
4175 41337,41785,42236,42690,43147,43606,44069,44534,
4176 45002,45473,45947,46423,46903,47385,47871,48359,
4177 48850,49344,49841,50341,50844,51349,51858,52369,
4178 52884,53401,53921,54445,54971,55500,56032,56567,
4179 57105,57646,58190,58737,59287,59840,60396,60955,
4180 61517,62082,62650,63221,63795,64372,64952,65535
4181};
Glenn Randers-Pehrson1b3a9fd2014-09-20 11:01:20 -05004182#endif /* PNG_SIMPLIFIED_READ_SUPPORTED */
John Bowler7875d532011-11-07 22:33:49 -06004183
4184/* The base/delta tables are required for both read and write (but currently
4185 * only the simplified versions.)
4186 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004187const png_uint_16 png_sRGB_base[512] =
John Bowler7875d532011-11-07 22:33:49 -06004188{
John Bowler0a521d32011-11-11 18:14:59 -06004189 128,1782,3383,4644,5675,6564,7357,8074,
4190 8732,9346,9921,10463,10977,11466,11935,12384,
4191 12816,13233,13634,14024,14402,14769,15125,15473,
4192 15812,16142,16466,16781,17090,17393,17690,17981,
John Bowler7875d532011-11-07 22:33:49 -06004193 18266,18546,18822,19093,19359,19621,19879,20133,
John Bowler0a521d32011-11-11 18:14:59 -06004194 20383,20630,20873,21113,21349,21583,21813,22041,
4195 22265,22487,22707,22923,23138,23350,23559,23767,
John Bowler7875d532011-11-07 22:33:49 -06004196 23972,24175,24376,24575,24772,24967,25160,25352,
John Bowler0a521d32011-11-11 18:14:59 -06004197 25542,25730,25916,26101,26284,26465,26645,26823,
4198 27000,27176,27350,27523,27695,27865,28034,28201,
John Bowler7875d532011-11-07 22:33:49 -06004199 28368,28533,28697,28860,29021,29182,29341,29500,
John Bowler0a521d32011-11-11 18:14:59 -06004200 29657,29813,29969,30123,30276,30429,30580,30730,
John Bowler7875d532011-11-07 22:33:49 -06004201 30880,31028,31176,31323,31469,31614,31758,31902,
John Bowler0a521d32011-11-11 18:14:59 -06004202 32045,32186,32327,32468,32607,32746,32884,33021,
4203 33158,33294,33429,33564,33697,33831,33963,34095,
4204 34226,34357,34486,34616,34744,34873,35000,35127,
John Bowler7875d532011-11-07 22:33:49 -06004205 35253,35379,35504,35629,35753,35876,35999,36122,
4206 36244,36365,36486,36606,36726,36845,36964,37083,
John Bowler0a521d32011-11-11 18:14:59 -06004207 37201,37318,37435,37551,37668,37783,37898,38013,
John Bowler7875d532011-11-07 22:33:49 -06004208 38127,38241,38354,38467,38580,38692,38803,38915,
John Bowler0a521d32011-11-11 18:14:59 -06004209 39026,39136,39246,39356,39465,39574,39682,39790,
John Bowler7875d532011-11-07 22:33:49 -06004210 39898,40005,40112,40219,40325,40431,40537,40642,
4211 40747,40851,40955,41059,41163,41266,41369,41471,
John Bowler0a521d32011-11-11 18:14:59 -06004212 41573,41675,41777,41878,41979,42079,42179,42279,
4213 42379,42478,42577,42676,42775,42873,42971,43068,
4214 43165,43262,43359,43456,43552,43648,43743,43839,
4215 43934,44028,44123,44217,44311,44405,44499,44592,
4216 44685,44778,44870,44962,45054,45146,45238,45329,
John Bowler7875d532011-11-07 22:33:49 -06004217 45420,45511,45601,45692,45782,45872,45961,46051,
John Bowler0a521d32011-11-11 18:14:59 -06004218 46140,46229,46318,46406,46494,46583,46670,46758,
4219 46846,46933,47020,47107,47193,47280,47366,47452,
4220 47538,47623,47709,47794,47879,47964,48048,48133,
4221 48217,48301,48385,48468,48552,48635,48718,48801,
4222 48884,48966,49048,49131,49213,49294,49376,49458,
4223 49539,49620,49701,49782,49862,49943,50023,50103,
4224 50183,50263,50342,50422,50501,50580,50659,50738,
4225 50816,50895,50973,51051,51129,51207,51285,51362,
4226 51439,51517,51594,51671,51747,51824,51900,51977,
4227 52053,52129,52205,52280,52356,52432,52507,52582,
John Bowler7875d532011-11-07 22:33:49 -06004228 52657,52732,52807,52881,52956,53030,53104,53178,
John Bowler0a521d32011-11-11 18:14:59 -06004229 53252,53326,53400,53473,53546,53620,53693,53766,
John Bowler7875d532011-11-07 22:33:49 -06004230 53839,53911,53984,54056,54129,54201,54273,54345,
4231 54417,54489,54560,54632,54703,54774,54845,54916,
John Bowler0a521d32011-11-11 18:14:59 -06004232 54987,55058,55129,55199,55269,55340,55410,55480,
4233 55550,55620,55689,55759,55828,55898,55967,56036,
4234 56105,56174,56243,56311,56380,56448,56517,56585,
John Bowler7875d532011-11-07 22:33:49 -06004235 56653,56721,56789,56857,56924,56992,57059,57127,
4236 57194,57261,57328,57395,57462,57529,57595,57662,
4237 57728,57795,57861,57927,57993,58059,58125,58191,
4238 58256,58322,58387,58453,58518,58583,58648,58713,
4239 58778,58843,58908,58972,59037,59101,59165,59230,
4240 59294,59358,59422,59486,59549,59613,59677,59740,
4241 59804,59867,59930,59993,60056,60119,60182,60245,
4242 60308,60370,60433,60495,60558,60620,60682,60744,
4243 60806,60868,60930,60992,61054,61115,61177,61238,
4244 61300,61361,61422,61483,61544,61605,61666,61727,
John Bowler0a521d32011-11-11 18:14:59 -06004245 61788,61848,61909,61969,62030,62090,62150,62211,
John Bowler7875d532011-11-07 22:33:49 -06004246 62271,62331,62391,62450,62510,62570,62630,62689,
4247 62749,62808,62867,62927,62986,63045,63104,63163,
John Bowler0a521d32011-11-11 18:14:59 -06004248 63222,63281,63340,63398,63457,63515,63574,63632,
John Bowler7875d532011-11-07 22:33:49 -06004249 63691,63749,63807,63865,63923,63981,64039,64097,
John Bowler0a521d32011-11-11 18:14:59 -06004250 64155,64212,64270,64328,64385,64443,64500,64557,
4251 64614,64672,64729,64786,64843,64900,64956,65013,
4252 65070,65126,65183,65239,65296,65352,65409,65465
John Bowler7875d532011-11-07 22:33:49 -06004253};
4254
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004255const png_byte png_sRGB_delta[512] =
John Bowler7875d532011-11-07 22:33:49 -06004256{
John Bowler0a521d32011-11-11 18:14:59 -06004257 207,201,158,129,113,100,90,82,77,72,68,64,61,59,56,54,
John Bowler7875d532011-11-07 22:33:49 -06004258 52,50,49,47,46,45,43,42,41,40,39,39,38,37,36,36,
4259 35,34,34,33,33,32,32,31,31,30,30,30,29,29,28,28,
John Bowler0a521d32011-11-11 18:14:59 -06004260 28,27,27,27,27,26,26,26,25,25,25,25,24,24,24,24,
John Bowler7875d532011-11-07 22:33:49 -06004261 23,23,23,23,23,22,22,22,22,22,22,21,21,21,21,21,
4262 21,20,20,20,20,20,20,20,20,19,19,19,19,19,19,19,
4263 19,18,18,18,18,18,18,18,18,18,18,17,17,17,17,17,
4264 17,17,17,17,17,17,16,16,16,16,16,16,16,16,16,16,
4265 16,16,16,16,15,15,15,15,15,15,15,15,15,15,15,15,
4266 15,15,15,15,14,14,14,14,14,14,14,14,14,14,14,14,
4267 14,14,14,14,14,14,14,13,13,13,13,13,13,13,13,13,
4268 13,13,13,13,13,13,13,13,13,13,13,13,13,13,12,12,
4269 12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,
4270 12,12,12,12,12,12,12,12,12,12,12,12,11,11,11,11,
4271 11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,
4272 11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,
4273 11,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4274 10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4275 10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4276 10,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4277 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4278 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4279 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4280 9,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4281 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4282 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4283 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4284 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4285 8,8,8,8,8,8,8,8,8,7,7,7,7,7,7,7,
4286 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
4287 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
4288 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7
4289};
John Bowler7875d532011-11-07 22:33:49 -06004290#endif /* SIMPLIFIED READ/WRITE sRGB support */
4291
4292/* SIMPLIFIED READ/WRITE SUPPORT */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004293#if defined(PNG_SIMPLIFIED_READ_SUPPORTED) ||\
4294 defined(PNG_SIMPLIFIED_WRITE_SUPPORTED)
John Bowler7875d532011-11-07 22:33:49 -06004295static int
4296png_image_free_function(png_voidp argument)
4297{
John Bowler4fa96a42011-11-16 16:39:16 -06004298 png_imagep image = png_voidcast(png_imagep, argument);
John Bowler7875d532011-11-07 22:33:49 -06004299 png_controlp cp = image->opaque;
4300 png_control c;
4301
4302 /* Double check that we have a png_ptr - it should be impossible to get here
4303 * without one.
4304 */
4305 if (cp->png_ptr == NULL)
4306 return 0;
4307
4308 /* First free any data held in the control structure. */
4309# ifdef PNG_STDIO_SUPPORTED
4310 if (cp->owned_file)
4311 {
John Bowler4fa96a42011-11-16 16:39:16 -06004312 FILE *fp = png_voidcast(FILE*, cp->png_ptr->io_ptr);
John Bowler7875d532011-11-07 22:33:49 -06004313 cp->owned_file = 0;
4314
4315 /* Ignore errors here. */
4316 if (fp != NULL)
4317 {
4318 cp->png_ptr->io_ptr = NULL;
4319 (void)fclose(fp);
4320 }
4321 }
4322# endif
4323
4324 /* Copy the control structure so that the original, allocated, version can be
4325 * safely freed. Notice that a png_error here stops the remainder of the
4326 * cleanup, but this is probably fine because that would indicate bad memory
4327 * problems anyway.
4328 */
4329 c = *cp;
4330 image->opaque = &c;
4331 png_free(c.png_ptr, cp);
4332
4333 /* Then the structures, calling the correct API. */
4334 if (c.for_write)
4335 {
4336# ifdef PNG_SIMPLIFIED_WRITE_SUPPORTED
4337 png_destroy_write_struct(&c.png_ptr, &c.info_ptr);
4338# else
4339 png_error(c.png_ptr, "simplified write not supported");
4340# endif
4341 }
4342 else
4343 {
4344# ifdef PNG_SIMPLIFIED_READ_SUPPORTED
4345 png_destroy_read_struct(&c.png_ptr, &c.info_ptr, NULL);
4346# else
4347 png_error(c.png_ptr, "simplified read not supported");
4348# endif
4349 }
4350
4351 /* Success. */
4352 return 1;
4353}
4354
4355void PNGAPI
4356png_image_free(png_imagep image)
4357{
4358 /* Safely call the real function, but only if doing so is safe at this point
4359 * (if not inside an error handling context). Otherwise assume
4360 * png_safe_execute will call this API after the return.
4361 */
4362 if (image != NULL && image->opaque != NULL &&
4363 image->opaque->error_buf == NULL)
4364 {
4365 /* Ignore errors here: */
4366 (void)png_safe_execute(image, png_image_free_function, image);
4367 image->opaque = NULL;
4368 }
4369}
4370
4371int /* PRIVATE */
4372png_image_error(png_imagep image, png_const_charp error_message)
4373{
4374 /* Utility to log an error. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004375 png_safecat(image->message, (sizeof image->message), 0, error_message);
4376 image->warning_or_error |= PNG_IMAGE_ERROR;
John Bowler7875d532011-11-07 22:33:49 -06004377 png_image_free(image);
4378 return 0;
4379}
4380
4381#endif /* SIMPLIFIED READ/WRITE */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004382#endif /* defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED) */