blob: 59e991b5c6708033ec60c2c04e7d1ff59f730a67 [file] [log] [blame]
The Android Open Source Project893912b2009-03-03 19:30:05 -08001
2/* png.c - location for general purpose libpng functions
3 *
Sireesh Tripurarib478e662014-05-09 15:15:10 +05304 * Last changed in libpng 1.6.9 [February 6, 2014]
5 * Copyright (c) 1998-2014 Glenn Randers-Pehrson
The Android Open Source Project893912b2009-03-03 19:30:05 -08006 * (Version 0.96 Copyright (c) 1996, 1997 Andreas Dilger)
7 * (Version 0.88 Copyright (c) 1995, 1996 Guy Eric Schalnat, Group 42, Inc.)
Patrick Scotta0bb96c2009-07-22 11:50:02 -04008 *
9 * This code is released under the libpng license.
10 * For conditions of distribution and use, see the disclaimer
11 * and license in png.h
The Android Open Source Project893912b2009-03-03 19:30:05 -080012 */
13
Chris Craikb50c2172013-07-29 15:28:30 -070014#include "pngpriv.h"
The Android Open Source Project893912b2009-03-03 19:30:05 -080015
16/* Generate a compiler error if there is an old png.h in the search path. */
Sireesh Tripurarib478e662014-05-09 15:15:10 +053017typedef png_libpng_version_1_6_10 Your_png_h_is_not_version_1_6_10;
The Android Open Source Project893912b2009-03-03 19:30:05 -080018
19/* Tells libpng that we have already handled the first "num_bytes" bytes
20 * of the PNG file signature. If the PNG data is embedded into another
21 * stream we can set num_bytes = 8 so that libpng will not attempt to read
22 * or write any of the magic bytes before it starts on the IHDR.
23 */
24
25#ifdef PNG_READ_SUPPORTED
26void PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -070027png_set_sig_bytes(png_structrp png_ptr, int num_bytes)
The Android Open Source Project893912b2009-03-03 19:30:05 -080028{
Patrick Scott5f6bd842010-06-28 16:55:16 -040029 png_debug(1, "in png_set_sig_bytes");
30
Patrick Scotta0bb96c2009-07-22 11:50:02 -040031 if (png_ptr == NULL)
32 return;
Patrick Scott5f6bd842010-06-28 16:55:16 -040033
The Android Open Source Project893912b2009-03-03 19:30:05 -080034 if (num_bytes > 8)
Chris Craikb50c2172013-07-29 15:28:30 -070035 png_error(png_ptr, "Too many bytes for PNG signature");
The Android Open Source Project893912b2009-03-03 19:30:05 -080036
37 png_ptr->sig_bytes = (png_byte)(num_bytes < 0 ? 0 : num_bytes);
38}
39
40/* Checks whether the supplied bytes match the PNG signature. We allow
41 * checking less than the full 8-byte signature so that those apps that
42 * already read the first few bytes of a file to determine the file type
43 * can simply check the remaining bytes for extra assurance. Returns
44 * an integer less than, equal to, or greater than zero if sig is found,
45 * respectively, to be less than, to match, or be greater than the correct
Chris Craikb50c2172013-07-29 15:28:30 -070046 * PNG signature (this is the same behavior as strcmp, memcmp, etc).
The Android Open Source Project893912b2009-03-03 19:30:05 -080047 */
48int PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -070049png_sig_cmp(png_const_bytep sig, png_size_t start, png_size_t num_to_check)
The Android Open Source Project893912b2009-03-03 19:30:05 -080050{
51 png_byte png_signature[8] = {137, 80, 78, 71, 13, 10, 26, 10};
Chris Craikb50c2172013-07-29 15:28:30 -070052
The Android Open Source Project893912b2009-03-03 19:30:05 -080053 if (num_to_check > 8)
54 num_to_check = 8;
Chris Craikb50c2172013-07-29 15:28:30 -070055
The Android Open Source Project893912b2009-03-03 19:30:05 -080056 else if (num_to_check < 1)
57 return (-1);
58
59 if (start > 7)
60 return (-1);
61
62 if (start + num_to_check > 8)
63 num_to_check = 8 - start;
64
Chris Craikb50c2172013-07-29 15:28:30 -070065 return ((int)(memcmp(&sig[start], &png_signature[start], num_to_check)));
The Android Open Source Project893912b2009-03-03 19:30:05 -080066}
67
The Android Open Source Project893912b2009-03-03 19:30:05 -080068#endif /* PNG_READ_SUPPORTED */
69
70#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Chris Craikb50c2172013-07-29 15:28:30 -070071/* Function to allocate memory for zlib */
72PNG_FUNCTION(voidpf /* PRIVATE */,
73png_zalloc,(voidpf png_ptr, uInt items, uInt size),PNG_ALLOCATED)
The Android Open Source Project893912b2009-03-03 19:30:05 -080074{
Chris Craikb50c2172013-07-29 15:28:30 -070075 png_alloc_size_t num_bytes = size;
The Android Open Source Project893912b2009-03-03 19:30:05 -080076
Patrick Scotta0bb96c2009-07-22 11:50:02 -040077 if (png_ptr == NULL)
Chris Craikb50c2172013-07-29 15:28:30 -070078 return NULL;
The Android Open Source Project893912b2009-03-03 19:30:05 -080079
Chris Craikb50c2172013-07-29 15:28:30 -070080 if (items >= (~(png_alloc_size_t)0)/size)
The Android Open Source Project893912b2009-03-03 19:30:05 -080081 {
Chris Craikb50c2172013-07-29 15:28:30 -070082 png_warning (png_voidcast(png_structrp, png_ptr),
83 "Potential overflow in png_zalloc()");
84 return NULL;
The Android Open Source Project893912b2009-03-03 19:30:05 -080085 }
Chris Craikb50c2172013-07-29 15:28:30 -070086
87 num_bytes *= items;
88 return png_malloc_warn(png_voidcast(png_structrp, png_ptr), num_bytes);
The Android Open Source Project893912b2009-03-03 19:30:05 -080089}
90
Patrick Scotta0bb96c2009-07-22 11:50:02 -040091/* Function to free memory for zlib */
Patrick Scott5f6bd842010-06-28 16:55:16 -040092void /* PRIVATE */
The Android Open Source Project893912b2009-03-03 19:30:05 -080093png_zfree(voidpf png_ptr, voidpf ptr)
94{
Chris Craikb50c2172013-07-29 15:28:30 -070095 png_free(png_voidcast(png_const_structrp,png_ptr), ptr);
The Android Open Source Project893912b2009-03-03 19:30:05 -080096}
97
98/* Reset the CRC variable to 32 bits of 1's. Care must be taken
99 * in case CRC is > 32 bits to leave the top bits 0.
100 */
101void /* PRIVATE */
Chris Craikb50c2172013-07-29 15:28:30 -0700102png_reset_crc(png_structrp png_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800103{
Chris Craikb50c2172013-07-29 15:28:30 -0700104 /* The cast is safe because the crc is a 32 bit value. */
105 png_ptr->crc = (png_uint_32)crc32(0, Z_NULL, 0);
The Android Open Source Project893912b2009-03-03 19:30:05 -0800106}
107
108/* Calculate the CRC over a section of data. We can only pass as
109 * much data to this routine as the largest single buffer size. We
110 * also check that this data will actually be used before going to the
111 * trouble of calculating it.
112 */
113void /* PRIVATE */
Chris Craikb50c2172013-07-29 15:28:30 -0700114png_calculate_crc(png_structrp png_ptr, png_const_bytep ptr, png_size_t length)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800115{
116 int need_crc = 1;
117
Chris Craikb50c2172013-07-29 15:28:30 -0700118 if (PNG_CHUNK_ANCILLARY(png_ptr->chunk_name))
The Android Open Source Project893912b2009-03-03 19:30:05 -0800119 {
120 if ((png_ptr->flags & PNG_FLAG_CRC_ANCILLARY_MASK) ==
121 (PNG_FLAG_CRC_ANCILLARY_USE | PNG_FLAG_CRC_ANCILLARY_NOWARN))
122 need_crc = 0;
123 }
Chris Craikb50c2172013-07-29 15:28:30 -0700124
125 else /* critical */
The Android Open Source Project893912b2009-03-03 19:30:05 -0800126 {
127 if (png_ptr->flags & PNG_FLAG_CRC_CRITICAL_IGNORE)
128 need_crc = 0;
129 }
130
Chris Craikb50c2172013-07-29 15:28:30 -0700131 /* 'uLong' is defined in zlib.h as unsigned long; this means that on some
132 * systems it is a 64 bit value. crc32, however, returns 32 bits so the
133 * following cast is safe. 'uInt' may be no more than 16 bits, so it is
134 * necessary to perform a loop here.
135 */
136 if (need_crc && length > 0)
137 {
138 uLong crc = png_ptr->crc; /* Should never issue a warning */
139
140 do
141 {
142 uInt safe_length = (uInt)length;
143 if (safe_length == 0)
144 safe_length = (uInt)-1; /* evil, but safe */
145
146 crc = crc32(crc, ptr, safe_length);
147
148 /* The following should never issue compiler warnings; if they do the
149 * target system has characteristics that will probably violate other
150 * assumptions within the libpng code.
151 */
152 ptr += safe_length;
153 length -= safe_length;
154 }
155 while (length > 0);
156
157 /* And the following is always safe because the crc is only 32 bits. */
158 png_ptr->crc = (png_uint_32)crc;
159 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800160}
161
Chris Craikb50c2172013-07-29 15:28:30 -0700162/* Check a user supplied version number, called from both read and write
163 * functions that create a png_struct.
The Android Open Source Project893912b2009-03-03 19:30:05 -0800164 */
Chris Craikb50c2172013-07-29 15:28:30 -0700165int
166png_user_version_check(png_structrp png_ptr, png_const_charp user_png_ver)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800167{
Chris Craikb50c2172013-07-29 15:28:30 -0700168 if (user_png_ver)
169 {
170 int i = 0;
171
172 do
173 {
174 if (user_png_ver[i] != png_libpng_ver[i])
175 png_ptr->flags |= PNG_FLAG_LIBRARY_MISMATCH;
176 } while (png_libpng_ver[i++]);
177 }
178
179 else
180 png_ptr->flags |= PNG_FLAG_LIBRARY_MISMATCH;
181
182 if (png_ptr->flags & PNG_FLAG_LIBRARY_MISMATCH)
183 {
184 /* Libpng 0.90 and later are binary incompatible with libpng 0.89, so
185 * we must recompile any applications that use any older library version.
186 * For versions after libpng 1.0, we will be compatible, so we need
187 * only check the first and third digits (note that when we reach version
188 * 1.10 we will need to check the fourth symbol, namely user_png_ver[3]).
189 */
190 if (user_png_ver == NULL || user_png_ver[0] != png_libpng_ver[0] ||
191 (user_png_ver[0] == '1' && (user_png_ver[2] != png_libpng_ver[2] ||
192 user_png_ver[3] != png_libpng_ver[3])) ||
193 (user_png_ver[0] == '0' && user_png_ver[2] < '9'))
194 {
195#ifdef PNG_WARNINGS_SUPPORTED
196 size_t pos = 0;
197 char m[128];
198
199 pos = png_safecat(m, (sizeof m), pos,
200 "Application built with libpng-");
201 pos = png_safecat(m, (sizeof m), pos, user_png_ver);
202 pos = png_safecat(m, (sizeof m), pos, " but running with ");
203 pos = png_safecat(m, (sizeof m), pos, png_libpng_ver);
Sireesh Tripurarib478e662014-05-09 15:15:10 +0530204 PNG_UNUSED(pos)
Chris Craikb50c2172013-07-29 15:28:30 -0700205
206 png_warning(png_ptr, m);
207#endif
208
209#ifdef PNG_ERROR_NUMBERS_SUPPORTED
210 png_ptr->flags = 0;
211#endif
212
213 return 0;
214 }
215 }
216
217 /* Success return. */
218 return 1;
219}
220
221/* Generic function to create a png_struct for either read or write - this
222 * contains the common initialization.
223 */
224PNG_FUNCTION(png_structp /* PRIVATE */,
225png_create_png_struct,(png_const_charp user_png_ver, png_voidp error_ptr,
226 png_error_ptr error_fn, png_error_ptr warn_fn, png_voidp mem_ptr,
227 png_malloc_ptr malloc_fn, png_free_ptr free_fn),PNG_ALLOCATED)
228{
229 png_struct create_struct;
230# ifdef PNG_SETJMP_SUPPORTED
231 jmp_buf create_jmp_buf;
232# endif
233
234 /* This temporary stack-allocated structure is used to provide a place to
235 * build enough context to allow the user provided memory allocator (if any)
236 * to be called.
237 */
238 memset(&create_struct, 0, (sizeof create_struct));
239
240 /* Added at libpng-1.2.6 */
241# ifdef PNG_USER_LIMITS_SUPPORTED
242 create_struct.user_width_max = PNG_USER_WIDTH_MAX;
243 create_struct.user_height_max = PNG_USER_HEIGHT_MAX;
244
245# ifdef PNG_USER_CHUNK_CACHE_MAX
246 /* Added at libpng-1.2.43 and 1.4.0 */
247 create_struct.user_chunk_cache_max = PNG_USER_CHUNK_CACHE_MAX;
248# endif
249
250# ifdef PNG_USER_CHUNK_MALLOC_MAX
251 /* Added at libpng-1.2.43 and 1.4.1, required only for read but exists
252 * in png_struct regardless.
253 */
254 create_struct.user_chunk_malloc_max = PNG_USER_CHUNK_MALLOC_MAX;
255# endif
256# endif
257
258 /* The following two API calls simply set fields in png_struct, so it is safe
259 * to do them now even though error handling is not yet set up.
260 */
261# ifdef PNG_USER_MEM_SUPPORTED
262 png_set_mem_fn(&create_struct, mem_ptr, malloc_fn, free_fn);
Sireesh Tripurarib478e662014-05-09 15:15:10 +0530263# else
264 PNG_UNUSED(mem_ptr)
265 PNG_UNUSED(malloc_fn)
266 PNG_UNUSED(free_fn)
Chris Craikb50c2172013-07-29 15:28:30 -0700267# endif
268
269 /* (*error_fn) can return control to the caller after the error_ptr is set,
270 * this will result in a memory leak unless the error_fn does something
271 * extremely sophisticated. The design lacks merit but is implicit in the
272 * API.
273 */
274 png_set_error_fn(&create_struct, error_ptr, error_fn, warn_fn);
275
276# ifdef PNG_SETJMP_SUPPORTED
277 if (!setjmp(create_jmp_buf))
278 {
279 /* Temporarily fake out the longjmp information until we have
280 * successfully completed this function. This only works if we have
281 * setjmp() support compiled in, but it is safe - this stuff should
282 * never happen.
283 */
284 create_struct.jmp_buf_ptr = &create_jmp_buf;
285 create_struct.jmp_buf_size = 0; /*stack allocation*/
286 create_struct.longjmp_fn = longjmp;
287# else
288 {
289# endif
290 /* Call the general version checker (shared with read and write code):
291 */
292 if (png_user_version_check(&create_struct, user_png_ver))
293 {
294 png_structrp png_ptr = png_voidcast(png_structrp,
295 png_malloc_warn(&create_struct, (sizeof *png_ptr)));
296
297 if (png_ptr != NULL)
298 {
299 /* png_ptr->zstream holds a back-pointer to the png_struct, so
300 * this can only be done now:
301 */
302 create_struct.zstream.zalloc = png_zalloc;
303 create_struct.zstream.zfree = png_zfree;
304 create_struct.zstream.opaque = png_ptr;
305
306# ifdef PNG_SETJMP_SUPPORTED
307 /* Eliminate the local error handling: */
308 create_struct.jmp_buf_ptr = NULL;
309 create_struct.jmp_buf_size = 0;
310 create_struct.longjmp_fn = 0;
311# endif
312
313 *png_ptr = create_struct;
314
315 /* This is the successful return point */
316 return png_ptr;
317 }
318 }
319 }
320
321 /* A longjmp because of a bug in the application storage allocator or a
322 * simple failure to allocate the png_struct.
323 */
324 return NULL;
325}
326
327/* Allocate the memory for an info_struct for the application. */
328PNG_FUNCTION(png_infop,PNGAPI
329png_create_info_struct,(png_const_structrp png_ptr),PNG_ALLOCATED)
330{
331 png_inforp info_ptr;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800332
The Android Open Source Project4215dd12009-03-09 11:52:12 -0700333 png_debug(1, "in png_create_info_struct");
Patrick Scott5f6bd842010-06-28 16:55:16 -0400334
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400335 if (png_ptr == NULL)
Chris Craikb50c2172013-07-29 15:28:30 -0700336 return NULL;
Patrick Scott5f6bd842010-06-28 16:55:16 -0400337
Chris Craikb50c2172013-07-29 15:28:30 -0700338 /* Use the internal API that does not (or at least should not) error out, so
339 * that this call always returns ok. The application typically sets up the
340 * error handling *after* creating the info_struct because this is the way it
341 * has always been done in 'example.c'.
342 */
343 info_ptr = png_voidcast(png_inforp, png_malloc_base(png_ptr,
344 (sizeof *info_ptr)));
345
The Android Open Source Project893912b2009-03-03 19:30:05 -0800346 if (info_ptr != NULL)
Chris Craikb50c2172013-07-29 15:28:30 -0700347 memset(info_ptr, 0, (sizeof *info_ptr));
The Android Open Source Project893912b2009-03-03 19:30:05 -0800348
Chris Craikb50c2172013-07-29 15:28:30 -0700349 return info_ptr;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800350}
351
352/* This function frees the memory associated with a single info struct.
353 * Normally, one would use either png_destroy_read_struct() or
354 * png_destroy_write_struct() to free an info struct, but this may be
Chris Craikb50c2172013-07-29 15:28:30 -0700355 * useful for some applications. From libpng 1.6.0 this function is also used
356 * internally to implement the png_info release part of the 'struct' destroy
357 * APIs. This ensures that all possible approaches free the same data (all of
358 * it).
The Android Open Source Project893912b2009-03-03 19:30:05 -0800359 */
360void PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -0700361png_destroy_info_struct(png_const_structrp png_ptr, png_infopp info_ptr_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800362{
Chris Craikb50c2172013-07-29 15:28:30 -0700363 png_inforp info_ptr = NULL;
Patrick Scott5f6bd842010-06-28 16:55:16 -0400364
365 png_debug(1, "in png_destroy_info_struct");
366
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400367 if (png_ptr == NULL)
368 return;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800369
The Android Open Source Project893912b2009-03-03 19:30:05 -0800370 if (info_ptr_ptr != NULL)
371 info_ptr = *info_ptr_ptr;
372
373 if (info_ptr != NULL)
374 {
Chris Craikb50c2172013-07-29 15:28:30 -0700375 /* Do this first in case of an error below; if the app implements its own
376 * memory management this can lead to png_free calling png_error, which
377 * will abort this routine and return control to the app error handler.
378 * An infinite loop may result if it then tries to free the same info
379 * ptr.
380 */
The Android Open Source Project893912b2009-03-03 19:30:05 -0800381 *info_ptr_ptr = NULL;
Chris Craikb50c2172013-07-29 15:28:30 -0700382
383 png_free_data(png_ptr, info_ptr, PNG_FREE_ALL, -1);
384 memset(info_ptr, 0, (sizeof *info_ptr));
385 png_free(png_ptr, info_ptr);
The Android Open Source Project893912b2009-03-03 19:30:05 -0800386 }
387}
388
389/* Initialize the info structure. This is now an internal function (0.89)
390 * and applications using it are urged to use png_create_info_struct()
Chris Craikb50c2172013-07-29 15:28:30 -0700391 * instead. Use deprecated in 1.6.0, internal use removed (used internally it
392 * is just a memset).
393 *
394 * NOTE: it is almost inconceivable that this API is used because it bypasses
395 * the user-memory mechanism and the user error handling/warning mechanisms in
396 * those cases where it does anything other than a memset.
The Android Open Source Project893912b2009-03-03 19:30:05 -0800397 */
Chris Craikb50c2172013-07-29 15:28:30 -0700398PNG_FUNCTION(void,PNGAPI
399png_info_init_3,(png_infopp ptr_ptr, png_size_t png_info_struct_size),
400 PNG_DEPRECATED)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800401{
Chris Craikb50c2172013-07-29 15:28:30 -0700402 png_inforp info_ptr = *ptr_ptr;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800403
Patrick Scott5f6bd842010-06-28 16:55:16 -0400404 png_debug(1, "in png_info_init_3");
405
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400406 if (info_ptr == NULL)
407 return;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800408
Chris Craikb50c2172013-07-29 15:28:30 -0700409 if ((sizeof (png_info)) > png_info_struct_size)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400410 {
Chris Craikb50c2172013-07-29 15:28:30 -0700411 *ptr_ptr = NULL;
412 /* The following line is why this API should not be used: */
413 free(info_ptr);
414 info_ptr = png_voidcast(png_inforp, png_malloc_base(NULL,
415 (sizeof *info_ptr)));
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400416 *ptr_ptr = info_ptr;
417 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800418
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400419 /* Set everything to 0 */
Chris Craikb50c2172013-07-29 15:28:30 -0700420 memset(info_ptr, 0, (sizeof *info_ptr));
The Android Open Source Project893912b2009-03-03 19:30:05 -0800421}
422
Chris Craikb50c2172013-07-29 15:28:30 -0700423/* The following API is not called internally */
The Android Open Source Project893912b2009-03-03 19:30:05 -0800424void PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -0700425png_data_freer(png_const_structrp png_ptr, png_inforp info_ptr,
The Android Open Source Project893912b2009-03-03 19:30:05 -0800426 int freer, png_uint_32 mask)
427{
The Android Open Source Project4215dd12009-03-09 11:52:12 -0700428 png_debug(1, "in png_data_freer");
Patrick Scott5f6bd842010-06-28 16:55:16 -0400429
The Android Open Source Project893912b2009-03-03 19:30:05 -0800430 if (png_ptr == NULL || info_ptr == NULL)
431 return;
Patrick Scott5f6bd842010-06-28 16:55:16 -0400432
The Android Open Source Project4215dd12009-03-09 11:52:12 -0700433 if (freer == PNG_DESTROY_WILL_FREE_DATA)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800434 info_ptr->free_me |= mask;
Chris Craikb50c2172013-07-29 15:28:30 -0700435
The Android Open Source Project4215dd12009-03-09 11:52:12 -0700436 else if (freer == PNG_USER_WILL_FREE_DATA)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800437 info_ptr->free_me &= ~mask;
Chris Craikb50c2172013-07-29 15:28:30 -0700438
The Android Open Source Project893912b2009-03-03 19:30:05 -0800439 else
Chris Craikb50c2172013-07-29 15:28:30 -0700440 png_error(png_ptr, "Unknown freer parameter in png_data_freer");
The Android Open Source Project893912b2009-03-03 19:30:05 -0800441}
The Android Open Source Project893912b2009-03-03 19:30:05 -0800442
443void PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -0700444png_free_data(png_const_structrp png_ptr, png_inforp info_ptr, png_uint_32 mask,
The Android Open Source Project893912b2009-03-03 19:30:05 -0800445 int num)
446{
The Android Open Source Project4215dd12009-03-09 11:52:12 -0700447 png_debug(1, "in png_free_data");
Patrick Scott5f6bd842010-06-28 16:55:16 -0400448
The Android Open Source Project893912b2009-03-03 19:30:05 -0800449 if (png_ptr == NULL || info_ptr == NULL)
450 return;
451
Patrick Scott5f6bd842010-06-28 16:55:16 -0400452#ifdef PNG_TEXT_SUPPORTED
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400453 /* Free text item num or (if num == -1) all text items */
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400454 if ((mask & PNG_FREE_TEXT) & info_ptr->free_me)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800455 {
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400456 if (num != -1)
457 {
458 if (info_ptr->text && info_ptr->text[num].key)
459 {
460 png_free(png_ptr, info_ptr->text[num].key);
461 info_ptr->text[num].key = NULL;
462 }
463 }
Chris Craikb50c2172013-07-29 15:28:30 -0700464
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400465 else
466 {
467 int i;
468 for (i = 0; i < info_ptr->num_text; i++)
469 png_free_data(png_ptr, info_ptr, PNG_FREE_TEXT, i);
470 png_free(png_ptr, info_ptr->text);
471 info_ptr->text = NULL;
472 info_ptr->num_text=0;
473 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800474 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800475#endif
476
Patrick Scott5f6bd842010-06-28 16:55:16 -0400477#ifdef PNG_tRNS_SUPPORTED
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400478 /* Free any tRNS entry */
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400479 if ((mask & PNG_FREE_TRNS) & info_ptr->free_me)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400480 {
Chris Craikb50c2172013-07-29 15:28:30 -0700481 png_free(png_ptr, info_ptr->trans_alpha);
482 info_ptr->trans_alpha = NULL;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400483 info_ptr->valid &= ~PNG_INFO_tRNS;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400484 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800485#endif
486
Patrick Scott5f6bd842010-06-28 16:55:16 -0400487#ifdef PNG_sCAL_SUPPORTED
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400488 /* Free any sCAL entry */
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400489 if ((mask & PNG_FREE_SCAL) & info_ptr->free_me)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400490 {
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400491 png_free(png_ptr, info_ptr->scal_s_width);
492 png_free(png_ptr, info_ptr->scal_s_height);
493 info_ptr->scal_s_width = NULL;
494 info_ptr->scal_s_height = NULL;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400495 info_ptr->valid &= ~PNG_INFO_sCAL;
496 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800497#endif
498
Patrick Scott5f6bd842010-06-28 16:55:16 -0400499#ifdef PNG_pCAL_SUPPORTED
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400500 /* Free any pCAL entry */
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400501 if ((mask & PNG_FREE_PCAL) & info_ptr->free_me)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400502 {
503 png_free(png_ptr, info_ptr->pcal_purpose);
504 png_free(png_ptr, info_ptr->pcal_units);
505 info_ptr->pcal_purpose = NULL;
506 info_ptr->pcal_units = NULL;
507 if (info_ptr->pcal_params != NULL)
508 {
Chris Craikb50c2172013-07-29 15:28:30 -0700509 unsigned int i;
510 for (i = 0; i < info_ptr->pcal_nparams; i++)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400511 {
512 png_free(png_ptr, info_ptr->pcal_params[i]);
Patrick Scott5f6bd842010-06-28 16:55:16 -0400513 info_ptr->pcal_params[i] = NULL;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400514 }
515 png_free(png_ptr, info_ptr->pcal_params);
516 info_ptr->pcal_params = NULL;
517 }
518 info_ptr->valid &= ~PNG_INFO_pCAL;
519 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800520#endif
521
Patrick Scott5f6bd842010-06-28 16:55:16 -0400522#ifdef PNG_iCCP_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -0700523 /* Free any profile entry */
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400524 if ((mask & PNG_FREE_ICCP) & info_ptr->free_me)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400525 {
526 png_free(png_ptr, info_ptr->iccp_name);
527 png_free(png_ptr, info_ptr->iccp_profile);
528 info_ptr->iccp_name = NULL;
529 info_ptr->iccp_profile = NULL;
530 info_ptr->valid &= ~PNG_INFO_iCCP;
531 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800532#endif
533
Patrick Scott5f6bd842010-06-28 16:55:16 -0400534#ifdef PNG_sPLT_SUPPORTED
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400535 /* Free a given sPLT entry, or (if num == -1) all sPLT entries */
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400536 if ((mask & PNG_FREE_SPLT) & info_ptr->free_me)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800537 {
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400538 if (num != -1)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800539 {
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400540 if (info_ptr->splt_palettes)
541 {
542 png_free(png_ptr, info_ptr->splt_palettes[num].name);
543 png_free(png_ptr, info_ptr->splt_palettes[num].entries);
544 info_ptr->splt_palettes[num].name = NULL;
545 info_ptr->splt_palettes[num].entries = NULL;
546 }
547 }
Chris Craikb50c2172013-07-29 15:28:30 -0700548
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400549 else
550 {
551 if (info_ptr->splt_palettes_num)
552 {
553 int i;
Chris Craikb50c2172013-07-29 15:28:30 -0700554 for (i = 0; i < info_ptr->splt_palettes_num; i++)
555 png_free_data(png_ptr, info_ptr, PNG_FREE_SPLT, (int)i);
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400556
557 png_free(png_ptr, info_ptr->splt_palettes);
558 info_ptr->splt_palettes = NULL;
559 info_ptr->splt_palettes_num = 0;
560 }
561 info_ptr->valid &= ~PNG_INFO_sPLT;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800562 }
563 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800564#endif
565
Chris Craikb50c2172013-07-29 15:28:30 -0700566#ifdef PNG_STORE_UNKNOWN_CHUNKS_SUPPORTED
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400567 if ((mask & PNG_FREE_UNKN) & info_ptr->free_me)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800568 {
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400569 if (num != -1)
570 {
571 if (info_ptr->unknown_chunks)
572 {
573 png_free(png_ptr, info_ptr->unknown_chunks[num].data);
574 info_ptr->unknown_chunks[num].data = NULL;
575 }
576 }
Chris Craikb50c2172013-07-29 15:28:30 -0700577
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400578 else
579 {
580 int i;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800581
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400582 if (info_ptr->unknown_chunks_num)
583 {
Chris Craikb50c2172013-07-29 15:28:30 -0700584 for (i = 0; i < info_ptr->unknown_chunks_num; i++)
585 png_free_data(png_ptr, info_ptr, PNG_FREE_UNKN, (int)i);
The Android Open Source Project893912b2009-03-03 19:30:05 -0800586
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400587 png_free(png_ptr, info_ptr->unknown_chunks);
588 info_ptr->unknown_chunks = NULL;
589 info_ptr->unknown_chunks_num = 0;
590 }
591 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800592 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800593#endif
594
Patrick Scott5f6bd842010-06-28 16:55:16 -0400595#ifdef PNG_hIST_SUPPORTED
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400596 /* Free any hIST entry */
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400597 if ((mask & PNG_FREE_HIST) & info_ptr->free_me)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400598 {
599 png_free(png_ptr, info_ptr->hist);
600 info_ptr->hist = NULL;
601 info_ptr->valid &= ~PNG_INFO_hIST;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400602 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800603#endif
604
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400605 /* Free any PLTE entry that was internally allocated */
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400606 if ((mask & PNG_FREE_PLTE) & info_ptr->free_me)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400607 {
Chris Craikb50c2172013-07-29 15:28:30 -0700608 png_free(png_ptr, info_ptr->palette);
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400609 info_ptr->palette = NULL;
610 info_ptr->valid &= ~PNG_INFO_PLTE;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400611 info_ptr->num_palette = 0;
612 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800613
Patrick Scott5f6bd842010-06-28 16:55:16 -0400614#ifdef PNG_INFO_IMAGE_SUPPORTED
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400615 /* Free any image bits attached to the info structure */
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400616 if ((mask & PNG_FREE_ROWS) & info_ptr->free_me)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400617 {
618 if (info_ptr->row_pointers)
619 {
Chris Craikb50c2172013-07-29 15:28:30 -0700620 png_uint_32 row;
621 for (row = 0; row < info_ptr->height; row++)
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400622 {
623 png_free(png_ptr, info_ptr->row_pointers[row]);
Patrick Scott5f6bd842010-06-28 16:55:16 -0400624 info_ptr->row_pointers[row] = NULL;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400625 }
626 png_free(png_ptr, info_ptr->row_pointers);
Patrick Scott5f6bd842010-06-28 16:55:16 -0400627 info_ptr->row_pointers = NULL;
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400628 }
629 info_ptr->valid &= ~PNG_INFO_IDAT;
630 }
The Android Open Source Project893912b2009-03-03 19:30:05 -0800631#endif
632
Chris Craikb50c2172013-07-29 15:28:30 -0700633 if (num != -1)
634 mask &= ~PNG_FREE_MUL;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800635
Chris Craikb50c2172013-07-29 15:28:30 -0700636 info_ptr->free_me &= ~mask;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800637}
638#endif /* defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED) */
639
640/* This function returns a pointer to the io_ptr associated with the user
641 * functions. The application should free any memory associated with this
642 * pointer before png_write_destroy() or png_read_destroy() are called.
643 */
644png_voidp PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -0700645png_get_io_ptr(png_const_structrp png_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800646{
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400647 if (png_ptr == NULL)
648 return (NULL);
Chris Craikb50c2172013-07-29 15:28:30 -0700649
The Android Open Source Project893912b2009-03-03 19:30:05 -0800650 return (png_ptr->io_ptr);
651}
652
653#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Chris Craikb50c2172013-07-29 15:28:30 -0700654# ifdef PNG_STDIO_SUPPORTED
The Android Open Source Project893912b2009-03-03 19:30:05 -0800655/* Initialize the default input/output functions for the PNG file. If you
656 * use your own read or write routines, you can call either png_set_read_fn()
657 * or png_set_write_fn() instead of png_init_io(). If you have defined
Chris Craikb50c2172013-07-29 15:28:30 -0700658 * PNG_NO_STDIO or otherwise disabled PNG_STDIO_SUPPORTED, you must use a
659 * function of your own because "FILE *" isn't necessarily available.
The Android Open Source Project893912b2009-03-03 19:30:05 -0800660 */
661void PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -0700662png_init_io(png_structrp png_ptr, png_FILE_p fp)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800663{
The Android Open Source Project4215dd12009-03-09 11:52:12 -0700664 png_debug(1, "in png_init_io");
Patrick Scott5f6bd842010-06-28 16:55:16 -0400665
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400666 if (png_ptr == NULL)
667 return;
Patrick Scott5f6bd842010-06-28 16:55:16 -0400668
The Android Open Source Project893912b2009-03-03 19:30:05 -0800669 png_ptr->io_ptr = (png_voidp)fp;
670}
Chris Craikb50c2172013-07-29 15:28:30 -0700671# endif
672
673#ifdef PNG_SAVE_INT_32_SUPPORTED
674/* The png_save_int_32 function assumes integers are stored in two's
675 * complement format. If this isn't the case, then this routine needs to
676 * be modified to write data in two's complement format. Note that,
677 * the following works correctly even if png_int_32 has more than 32 bits
678 * (compare the more complex code required on read for sign extension.)
679 */
680void PNGAPI
681png_save_int_32(png_bytep buf, png_int_32 i)
682{
683 buf[0] = (png_byte)((i >> 24) & 0xff);
684 buf[1] = (png_byte)((i >> 16) & 0xff);
685 buf[2] = (png_byte)((i >> 8) & 0xff);
686 buf[3] = (png_byte)(i & 0xff);
687}
The Android Open Source Project893912b2009-03-03 19:30:05 -0800688#endif
689
Chris Craikb50c2172013-07-29 15:28:30 -0700690# ifdef PNG_TIME_RFC1123_SUPPORTED
The Android Open Source Project893912b2009-03-03 19:30:05 -0800691/* Convert the supplied time into an RFC 1123 string suitable for use in
692 * a "Creation Time" or other text-based time string.
693 */
Chris Craikb50c2172013-07-29 15:28:30 -0700694int PNGAPI
695png_convert_to_rfc1123_buffer(char out[29], png_const_timep ptime)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800696{
697 static PNG_CONST char short_months[12][4] =
698 {"Jan", "Feb", "Mar", "Apr", "May", "Jun",
699 "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"};
700
Chris Craikb50c2172013-07-29 15:28:30 -0700701 if (out == NULL)
702 return 0;
703
704 if (ptime->year > 9999 /* RFC1123 limitation */ ||
705 ptime->month == 0 || ptime->month > 12 ||
706 ptime->day == 0 || ptime->day > 31 ||
707 ptime->hour > 23 || ptime->minute > 59 ||
708 ptime->second > 60)
709 return 0;
710
The Android Open Source Project893912b2009-03-03 19:30:05 -0800711 {
Chris Craikb50c2172013-07-29 15:28:30 -0700712 size_t pos = 0;
713 char number_buf[5]; /* enough for a four-digit year */
714
715# define APPEND_STRING(string) pos = png_safecat(out, 29, pos, (string))
716# define APPEND_NUMBER(format, value)\
717 APPEND_STRING(PNG_FORMAT_NUMBER(number_buf, format, (value)))
718# define APPEND(ch) if (pos < 28) out[pos++] = (ch)
719
720 APPEND_NUMBER(PNG_NUMBER_FORMAT_u, (unsigned)ptime->day);
721 APPEND(' ');
722 APPEND_STRING(short_months[(ptime->month - 1)]);
723 APPEND(' ');
724 APPEND_NUMBER(PNG_NUMBER_FORMAT_u, ptime->year);
725 APPEND(' ');
726 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->hour);
727 APPEND(':');
728 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->minute);
729 APPEND(':');
730 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->second);
731 APPEND_STRING(" +0000"); /* This reliably terminates the buffer */
732
733# undef APPEND
734# undef APPEND_NUMBER
735# undef APPEND_STRING
The Android Open Source Project893912b2009-03-03 19:30:05 -0800736 }
737
Chris Craikb50c2172013-07-29 15:28:30 -0700738 return 1;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800739}
Chris Craikb50c2172013-07-29 15:28:30 -0700740
741# if PNG_LIBPNG_VER < 10700
742/* To do: remove the following from libpng-1.7 */
743/* Original API that uses a private buffer in png_struct.
744 * Deprecated because it causes png_struct to carry a spurious temporary
745 * buffer (png_struct::time_buffer), better to have the caller pass this in.
746 */
747png_const_charp PNGAPI
748png_convert_to_rfc1123(png_structrp png_ptr, png_const_timep ptime)
749{
750 if (png_ptr != NULL)
751 {
752 /* The only failure above if png_ptr != NULL is from an invalid ptime */
753 if (!png_convert_to_rfc1123_buffer(png_ptr->time_buffer, ptime))
754 png_warning(png_ptr, "Ignoring invalid time value");
755
756 else
757 return png_ptr->time_buffer;
758 }
759
760 return NULL;
761}
762# endif
763# endif /* PNG_TIME_RFC1123_SUPPORTED */
The Android Open Source Project893912b2009-03-03 19:30:05 -0800764
765#endif /* defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED) */
766
Chris Craikb50c2172013-07-29 15:28:30 -0700767png_const_charp PNGAPI
768png_get_copyright(png_const_structrp png_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800769{
Chris Craikb50c2172013-07-29 15:28:30 -0700770 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Patrick Scott5f6bd842010-06-28 16:55:16 -0400771#ifdef PNG_STRING_COPYRIGHT
Chris Craikb50c2172013-07-29 15:28:30 -0700772 return PNG_STRING_COPYRIGHT
Patrick Scott5f6bd842010-06-28 16:55:16 -0400773#else
Chris Craikb50c2172013-07-29 15:28:30 -0700774# ifdef __STDC__
775 return PNG_STRING_NEWLINE \
Sireesh Tripurarib478e662014-05-09 15:15:10 +0530776 "libpng version 1.6.10 - March 6, 2014" PNG_STRING_NEWLINE \
777 "Copyright (c) 1998-2014 Glenn Randers-Pehrson" PNG_STRING_NEWLINE \
Patrick Scott5f6bd842010-06-28 16:55:16 -0400778 "Copyright (c) 1996-1997 Andreas Dilger" PNG_STRING_NEWLINE \
779 "Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc." \
Chris Craikb50c2172013-07-29 15:28:30 -0700780 PNG_STRING_NEWLINE;
781# else
Sireesh Tripurarib478e662014-05-09 15:15:10 +0530782 return "libpng version 1.6.10 - March 6, 2014\
783 Copyright (c) 1998-2014 Glenn Randers-Pehrson\
Patrick Scott5f6bd842010-06-28 16:55:16 -0400784 Copyright (c) 1996-1997 Andreas Dilger\
Chris Craikb50c2172013-07-29 15:28:30 -0700785 Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc.";
786# endif
Patrick Scott5f6bd842010-06-28 16:55:16 -0400787#endif
The Android Open Source Project893912b2009-03-03 19:30:05 -0800788}
789
790/* The following return the library version as a short string in the
791 * format 1.0.0 through 99.99.99zz. To get the version of *.h files
792 * used with your application, print out PNG_LIBPNG_VER_STRING, which
793 * is defined in png.h.
794 * Note: now there is no difference between png_get_libpng_ver() and
795 * png_get_header_ver(). Due to the version_nn_nn_nn typedef guard,
796 * it is guaranteed that png.c uses the correct version of png.h.
797 */
Chris Craikb50c2172013-07-29 15:28:30 -0700798png_const_charp PNGAPI
799png_get_libpng_ver(png_const_structrp png_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800800{
801 /* Version of *.c files used when building libpng */
Chris Craikb50c2172013-07-29 15:28:30 -0700802 return png_get_header_ver(png_ptr);
The Android Open Source Project893912b2009-03-03 19:30:05 -0800803}
804
Chris Craikb50c2172013-07-29 15:28:30 -0700805png_const_charp PNGAPI
806png_get_header_ver(png_const_structrp png_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800807{
808 /* Version of *.h files used when building libpng */
Chris Craikb50c2172013-07-29 15:28:30 -0700809 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
810 return PNG_LIBPNG_VER_STRING;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800811}
812
Chris Craikb50c2172013-07-29 15:28:30 -0700813png_const_charp PNGAPI
814png_get_header_version(png_const_structrp png_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800815{
816 /* Returns longer string containing both version and date */
Chris Craikb50c2172013-07-29 15:28:30 -0700817 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Patrick Scott5f6bd842010-06-28 16:55:16 -0400818#ifdef __STDC__
Chris Craikb50c2172013-07-29 15:28:30 -0700819 return PNG_HEADER_VERSION_STRING
820# ifndef PNG_READ_SUPPORTED
The Android Open Source Project893912b2009-03-03 19:30:05 -0800821 " (NO READ SUPPORT)"
Chris Craikb50c2172013-07-29 15:28:30 -0700822# endif
823 PNG_STRING_NEWLINE;
Patrick Scott5f6bd842010-06-28 16:55:16 -0400824#else
Chris Craikb50c2172013-07-29 15:28:30 -0700825 return PNG_HEADER_VERSION_STRING;
Patrick Scott5f6bd842010-06-28 16:55:16 -0400826#endif
The Android Open Source Project893912b2009-03-03 19:30:05 -0800827}
828
Sireesh Tripurarib478e662014-05-09 15:15:10 +0530829#ifdef PNG_BUILD_GRAYSCALE_PALETTE_SUPPORTED
830/* NOTE: this routine is not used internally! */
831/* Build a grayscale palette. Palette is assumed to be 1 << bit_depth
832 * large of png_color. This lets grayscale images be treated as
833 * paletted. Most useful for gamma correction and simplification
834 * of code. This API is not used internally.
835 */
836void PNGAPI
837png_build_grayscale_palette(int bit_depth, png_colorp palette)
838{
839 int num_palette;
840 int color_inc;
841 int i;
842 int v;
843
844 png_debug(1, "in png_do_build_grayscale_palette");
845
846 if (palette == NULL)
847 return;
848
849 switch (bit_depth)
850 {
851 case 1:
852 num_palette = 2;
853 color_inc = 0xff;
854 break;
855
856 case 2:
857 num_palette = 4;
858 color_inc = 0x55;
859 break;
860
861 case 4:
862 num_palette = 16;
863 color_inc = 0x11;
864 break;
865
866 case 8:
867 num_palette = 256;
868 color_inc = 1;
869 break;
870
871 default:
872 num_palette = 0;
873 color_inc = 0;
874 break;
875 }
876
877 for (i = 0, v = 0; i < num_palette; i++, v += color_inc)
878 {
879 palette[i].red = (png_byte)v;
880 palette[i].green = (png_byte)v;
881 palette[i].blue = (png_byte)v;
882 }
883}
884#endif
885
Chris Craikb50c2172013-07-29 15:28:30 -0700886#ifdef PNG_SET_UNKNOWN_CHUNKS_SUPPORTED
The Android Open Source Project893912b2009-03-03 19:30:05 -0800887int PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -0700888png_handle_as_unknown(png_const_structrp png_ptr, png_const_bytep chunk_name)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800889{
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400890 /* Check chunk_name and return "keep" value if it's on the list, else 0 */
Chris Craikb50c2172013-07-29 15:28:30 -0700891 png_const_bytep p, p_end;
The Android Open Source Project893912b2009-03-03 19:30:05 -0800892
Chris Craikb50c2172013-07-29 15:28:30 -0700893 if (png_ptr == NULL || chunk_name == NULL || png_ptr->num_chunk_list == 0)
894 return PNG_HANDLE_CHUNK_AS_DEFAULT;
895
896 p_end = png_ptr->chunk_list;
897 p = p_end + png_ptr->num_chunk_list*5; /* beyond end */
898
899 /* The code is the fifth byte after each four byte string. Historically this
900 * code was always searched from the end of the list, this is no longer
901 * necessary because the 'set' routine handles duplicate entries correcty.
902 */
903 do /* num_chunk_list > 0, so at least one */
904 {
905 p -= 5;
906
907 if (!memcmp(chunk_name, p, 4))
908 return p[4];
909 }
910 while (p > p_end);
911
912 /* This means that known chunks should be processed and unknown chunks should
913 * be handled according to the value of png_ptr->unknown_default; this can be
914 * confusing because, as a result, there are two levels of defaulting for
915 * unknown chunks.
916 */
917 return PNG_HANDLE_CHUNK_AS_DEFAULT;
918}
919
Sireesh Tripurarib478e662014-05-09 15:15:10 +0530920#if defined(PNG_READ_UNKNOWN_CHUNKS_SUPPORTED) ||\
921 defined(PNG_HANDLE_AS_UNKNOWN_SUPPORTED)
Chris Craikb50c2172013-07-29 15:28:30 -0700922int /* PRIVATE */
923png_chunk_unknown_handling(png_const_structrp png_ptr, png_uint_32 chunk_name)
924{
925 png_byte chunk_string[5];
926
927 PNG_CSTRING_FROM_CHUNK(chunk_string, chunk_name);
928 return png_handle_as_unknown(png_ptr, chunk_string);
929}
Sireesh Tripurarib478e662014-05-09 15:15:10 +0530930#endif /* READ_UNKNOWN_CHUNKS || HANDLE_AS_UNKNOWN */
Chris Craikb50c2172013-07-29 15:28:30 -0700931#endif /* SET_UNKNOWN_CHUNKS */
932
933#ifdef PNG_READ_SUPPORTED
The Android Open Source Project893912b2009-03-03 19:30:05 -0800934/* This function, added to libpng-1.0.6g, is untested. */
935int PNGAPI
Chris Craikb50c2172013-07-29 15:28:30 -0700936png_reset_zstream(png_structrp png_ptr)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800937{
Patrick Scotta0bb96c2009-07-22 11:50:02 -0400938 if (png_ptr == NULL)
939 return Z_STREAM_ERROR;
Chris Craikb50c2172013-07-29 15:28:30 -0700940
941 /* WARNING: this resets the window bits to the maximum! */
The Android Open Source Project893912b2009-03-03 19:30:05 -0800942 return (inflateReset(&png_ptr->zstream));
943}
Chris Craikb50c2172013-07-29 15:28:30 -0700944#endif /* PNG_READ_SUPPORTED */
The Android Open Source Project893912b2009-03-03 19:30:05 -0800945
946/* This function was added to libpng-1.0.7 */
947png_uint_32 PNGAPI
948png_access_version_number(void)
949{
950 /* Version of *.c files used when building libpng */
Chris Craikb50c2172013-07-29 15:28:30 -0700951 return((png_uint_32)PNG_LIBPNG_VER);
The Android Open Source Project893912b2009-03-03 19:30:05 -0800952}
953
954
The Android Open Source Project893912b2009-03-03 19:30:05 -0800955
956#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Chris Craikb50c2172013-07-29 15:28:30 -0700957/* Ensure that png_ptr->zstream.msg holds some appropriate error message string.
958 * If it doesn't 'ret' is used to set it to something appropriate, even in cases
959 * like Z_OK or Z_STREAM_END where the error code is apparently a success code.
960 */
961void /* PRIVATE */
962png_zstream_error(png_structrp png_ptr, int ret)
The Android Open Source Project893912b2009-03-03 19:30:05 -0800963{
Chris Craikb50c2172013-07-29 15:28:30 -0700964 /* Translate 'ret' into an appropriate error string, priority is given to the
965 * one in zstream if set. This always returns a string, even in cases like
966 * Z_OK or Z_STREAM_END where the error code is a success code.
967 */
968 if (png_ptr->zstream.msg == NULL) switch (ret)
969 {
970 default:
971 case Z_OK:
972 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected zlib return code");
973 break;
974
975 case Z_STREAM_END:
976 /* Normal exit */
977 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected end of LZ stream");
978 break;
979
980 case Z_NEED_DICT:
981 /* This means the deflate stream did not have a dictionary; this
982 * indicates a bogus PNG.
983 */
984 png_ptr->zstream.msg = PNGZ_MSG_CAST("missing LZ dictionary");
985 break;
986
987 case Z_ERRNO:
988 /* gz APIs only: should not happen */
989 png_ptr->zstream.msg = PNGZ_MSG_CAST("zlib IO error");
990 break;
991
992 case Z_STREAM_ERROR:
993 /* internal libpng error */
994 png_ptr->zstream.msg = PNGZ_MSG_CAST("bad parameters to zlib");
995 break;
996
997 case Z_DATA_ERROR:
998 png_ptr->zstream.msg = PNGZ_MSG_CAST("damaged LZ stream");
999 break;
1000
1001 case Z_MEM_ERROR:
1002 png_ptr->zstream.msg = PNGZ_MSG_CAST("insufficient memory");
1003 break;
1004
1005 case Z_BUF_ERROR:
1006 /* End of input or output; not a problem if the caller is doing
1007 * incremental read or write.
1008 */
1009 png_ptr->zstream.msg = PNGZ_MSG_CAST("truncated");
1010 break;
1011
1012 case Z_VERSION_ERROR:
1013 png_ptr->zstream.msg = PNGZ_MSG_CAST("unsupported zlib version");
1014 break;
1015
1016 case PNG_UNEXPECTED_ZLIB_RETURN:
1017 /* Compile errors here mean that zlib now uses the value co-opted in
1018 * pngpriv.h for PNG_UNEXPECTED_ZLIB_RETURN; update the switch above
1019 * and change pngpriv.h. Note that this message is "... return",
1020 * whereas the default/Z_OK one is "... return code".
1021 */
1022 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected zlib return");
1023 break;
1024 }
The Android Open Source Project893912b2009-03-03 19:30:05 -08001025}
Chris Craikb50c2172013-07-29 15:28:30 -07001026
1027/* png_convert_size: a PNGAPI but no longer in png.h, so deleted
1028 * at libpng 1.5.5!
1029 */
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001030
1031/* Added at libpng version 1.2.34 and 1.4.0 (moved from pngset.c) */
Chris Craikb50c2172013-07-29 15:28:30 -07001032#ifdef PNG_GAMMA_SUPPORTED /* always set if COLORSPACE */
1033static int
1034png_colorspace_check_gamma(png_const_structrp png_ptr,
1035 png_colorspacerp colorspace, png_fixed_point gAMA, int from)
1036 /* This is called to check a new gamma value against an existing one. The
1037 * routine returns false if the new gamma value should not be written.
1038 *
1039 * 'from' says where the new gamma value comes from:
1040 *
1041 * 0: the new gamma value is the libpng estimate for an ICC profile
1042 * 1: the new gamma value comes from a gAMA chunk
1043 * 2: the new gamma value comes from an sRGB chunk
1044 */
1045{
1046 png_fixed_point gtest;
1047
1048 if ((colorspace->flags & PNG_COLORSPACE_HAVE_GAMMA) != 0 &&
1049 (!png_muldiv(&gtest, colorspace->gamma, PNG_FP_1, gAMA) ||
1050 png_gamma_significant(gtest)))
1051 {
1052 /* Either this is an sRGB image, in which case the calculated gamma
1053 * approximation should match, or this is an image with a profile and the
1054 * value libpng calculates for the gamma of the profile does not match the
1055 * value recorded in the file. The former, sRGB, case is an error, the
1056 * latter is just a warning.
1057 */
1058 if ((colorspace->flags & PNG_COLORSPACE_FROM_sRGB) != 0 || from == 2)
1059 {
1060 png_chunk_report(png_ptr, "gamma value does not match sRGB",
1061 PNG_CHUNK_ERROR);
1062 /* Do not overwrite an sRGB value */
1063 return from == 2;
1064 }
1065
1066 else /* sRGB tag not involved */
1067 {
1068 png_chunk_report(png_ptr, "gamma value does not match libpng estimate",
1069 PNG_CHUNK_WARNING);
1070 return from == 1;
1071 }
1072 }
1073
1074 return 1;
1075}
Patrick Scotta0bb96c2009-07-22 11:50:02 -04001076
Patrick Scott5f6bd842010-06-28 16:55:16 -04001077void /* PRIVATE */
Chris Craikb50c2172013-07-29 15:28:30 -07001078png_colorspace_set_gamma(png_const_structrp png_ptr,
1079 png_colorspacerp colorspace, png_fixed_point gAMA)
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001080{
Chris Craikb50c2172013-07-29 15:28:30 -07001081 /* Changed in libpng-1.5.4 to limit the values to ensure overflow can't
1082 * occur. Since the fixed point representation is assymetrical it is
1083 * possible for 1/gamma to overflow the limit of 21474 and this means the
1084 * gamma value must be at least 5/100000 and hence at most 20000.0. For
1085 * safety the limits here are a little narrower. The values are 0.00016 to
1086 * 6250.0, which are truly ridiculous gamma values (and will produce
1087 * displays that are all black or all white.)
1088 *
1089 * In 1.6.0 this test replaces the ones in pngrutil.c, in the gAMA chunk
1090 * handling code, which only required the value to be >0.
1091 */
1092 png_const_charp errmsg;
1093
1094 if (gAMA < 16 || gAMA > 625000000)
1095 errmsg = "gamma value out of range";
1096
1097# ifdef PNG_READ_gAMA_SUPPORTED
1098 /* Allow the application to set the gamma value more than once */
1099 else if ((png_ptr->mode & PNG_IS_READ_STRUCT) != 0 &&
1100 (colorspace->flags & PNG_COLORSPACE_FROM_gAMA) != 0)
1101 errmsg = "duplicate";
1102# endif
1103
1104 /* Do nothing if the colorspace is already invalid */
1105 else if (colorspace->flags & PNG_COLORSPACE_INVALID)
1106 return;
1107
1108 else
1109 {
1110 if (png_colorspace_check_gamma(png_ptr, colorspace, gAMA, 1/*from gAMA*/))
1111 {
1112 /* Store this gamma value. */
1113 colorspace->gamma = gAMA;
1114 colorspace->flags |=
1115 (PNG_COLORSPACE_HAVE_GAMMA | PNG_COLORSPACE_FROM_gAMA);
1116 }
1117
1118 /* At present if the check_gamma test fails the gamma of the colorspace is
1119 * not updated however the colorspace is not invalidated. This
1120 * corresponds to the case where the existing gamma comes from an sRGB
1121 * chunk or profile. An error message has already been output.
1122 */
1123 return;
1124 }
1125
1126 /* Error exit - errmsg has been set. */
1127 colorspace->flags |= PNG_COLORSPACE_INVALID;
1128 png_chunk_report(png_ptr, errmsg, PNG_CHUNK_WRITE_ERROR);
1129}
1130
1131void /* PRIVATE */
1132png_colorspace_sync_info(png_const_structrp png_ptr, png_inforp info_ptr)
1133{
1134 if (info_ptr->colorspace.flags & PNG_COLORSPACE_INVALID)
1135 {
1136 /* Everything is invalid */
1137 info_ptr->valid &= ~(PNG_INFO_gAMA|PNG_INFO_cHRM|PNG_INFO_sRGB|
1138 PNG_INFO_iCCP);
1139
1140# ifdef PNG_COLORSPACE_SUPPORTED
1141 /* Clean up the iCCP profile now if it won't be used. */
1142 png_free_data(png_ptr, info_ptr, PNG_FREE_ICCP, -1/*not used*/);
1143# else
1144 PNG_UNUSED(png_ptr)
1145# endif
1146 }
1147
1148 else
1149 {
1150# ifdef PNG_COLORSPACE_SUPPORTED
1151 /* Leave the INFO_iCCP flag set if the pngset.c code has already set
1152 * it; this allows a PNG to contain a profile which matches sRGB and
1153 * yet still have that profile retrievable by the application.
1154 */
1155 if (info_ptr->colorspace.flags & PNG_COLORSPACE_MATCHES_sRGB)
1156 info_ptr->valid |= PNG_INFO_sRGB;
1157
1158 else
1159 info_ptr->valid &= ~PNG_INFO_sRGB;
1160
1161 if (info_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_ENDPOINTS)
1162 info_ptr->valid |= PNG_INFO_cHRM;
1163
1164 else
1165 info_ptr->valid &= ~PNG_INFO_cHRM;
1166# endif
1167
1168 if (info_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_GAMMA)
1169 info_ptr->valid |= PNG_INFO_gAMA;
1170
1171 else
1172 info_ptr->valid &= ~PNG_INFO_gAMA;
1173 }
1174}
1175
1176#ifdef PNG_READ_SUPPORTED
1177void /* PRIVATE */
1178png_colorspace_sync(png_const_structrp png_ptr, png_inforp info_ptr)
1179{
1180 if (info_ptr == NULL) /* reduce code size; check here not in the caller */
1181 return;
1182
1183 info_ptr->colorspace = png_ptr->colorspace;
1184 png_colorspace_sync_info(png_ptr, info_ptr);
1185}
1186#endif
1187#endif
1188
1189#ifdef PNG_COLORSPACE_SUPPORTED
1190/* Added at libpng-1.5.5 to support read and write of true CIEXYZ values for
1191 * cHRM, as opposed to using chromaticities. These internal APIs return
1192 * non-zero on a parameter error. The X, Y and Z values are required to be
1193 * positive and less than 1.0.
1194 */
1195static int
1196png_xy_from_XYZ(png_xy *xy, const png_XYZ *XYZ)
1197{
1198 png_int_32 d, dwhite, whiteX, whiteY;
1199
1200 d = XYZ->red_X + XYZ->red_Y + XYZ->red_Z;
1201 if (!png_muldiv(&xy->redx, XYZ->red_X, PNG_FP_1, d)) return 1;
1202 if (!png_muldiv(&xy->redy, XYZ->red_Y, PNG_FP_1, d)) return 1;
1203 dwhite = d;
1204 whiteX = XYZ->red_X;
1205 whiteY = XYZ->red_Y;
1206
1207 d = XYZ->green_X + XYZ->green_Y + XYZ->green_Z;
1208 if (!png_muldiv(&xy->greenx, XYZ->green_X, PNG_FP_1, d)) return 1;
1209 if (!png_muldiv(&xy->greeny, XYZ->green_Y, PNG_FP_1, d)) return 1;
1210 dwhite += d;
1211 whiteX += XYZ->green_X;
1212 whiteY += XYZ->green_Y;
1213
1214 d = XYZ->blue_X + XYZ->blue_Y + XYZ->blue_Z;
1215 if (!png_muldiv(&xy->bluex, XYZ->blue_X, PNG_FP_1, d)) return 1;
1216 if (!png_muldiv(&xy->bluey, XYZ->blue_Y, PNG_FP_1, d)) return 1;
1217 dwhite += d;
1218 whiteX += XYZ->blue_X;
1219 whiteY += XYZ->blue_Y;
1220
1221 /* The reference white is simply the sum of the end-point (X,Y,Z) vectors,
1222 * thus:
1223 */
1224 if (!png_muldiv(&xy->whitex, whiteX, PNG_FP_1, dwhite)) return 1;
1225 if (!png_muldiv(&xy->whitey, whiteY, PNG_FP_1, dwhite)) return 1;
1226
1227 return 0;
1228}
1229
1230static int
1231png_XYZ_from_xy(png_XYZ *XYZ, const png_xy *xy)
1232{
1233 png_fixed_point red_inverse, green_inverse, blue_scale;
1234 png_fixed_point left, right, denominator;
1235
1236 /* Check xy and, implicitly, z. Note that wide gamut color spaces typically
1237 * have end points with 0 tristimulus values (these are impossible end
Christopher Ferrisee604d72015-05-19 13:05:28 -07001238 * points, but they are used to cover the possible colors). We check
1239 * xy->whitey against 5, not 0, to avoid a possible integer overflow.
Chris Craikb50c2172013-07-29 15:28:30 -07001240 */
Christopher Ferrisee604d72015-05-19 13:05:28 -07001241 if (xy->redx < 0 || xy->redx > PNG_FP_1) return 1;
1242 if (xy->redy < 0 || xy->redy > PNG_FP_1-xy->redx) return 1;
Chris Craikb50c2172013-07-29 15:28:30 -07001243 if (xy->greenx < 0 || xy->greenx > PNG_FP_1) return 1;
1244 if (xy->greeny < 0 || xy->greeny > PNG_FP_1-xy->greenx) return 1;
Christopher Ferrisee604d72015-05-19 13:05:28 -07001245 if (xy->bluex < 0 || xy->bluex > PNG_FP_1) return 1;
1246 if (xy->bluey < 0 || xy->bluey > PNG_FP_1-xy->bluex) return 1;
Chris Craikb50c2172013-07-29 15:28:30 -07001247 if (xy->whitex < 0 || xy->whitex > PNG_FP_1) return 1;
Christopher Ferrisee604d72015-05-19 13:05:28 -07001248 if (xy->whitey < 5 || xy->whitey > PNG_FP_1-xy->whitex) return 1;
Chris Craikb50c2172013-07-29 15:28:30 -07001249
1250 /* The reverse calculation is more difficult because the original tristimulus
1251 * value had 9 independent values (red,green,blue)x(X,Y,Z) however only 8
1252 * derived values were recorded in the cHRM chunk;
1253 * (red,green,blue,white)x(x,y). This loses one degree of freedom and
1254 * therefore an arbitrary ninth value has to be introduced to undo the
1255 * original transformations.
1256 *
1257 * Think of the original end-points as points in (X,Y,Z) space. The
1258 * chromaticity values (c) have the property:
1259 *
1260 * C
1261 * c = ---------
1262 * X + Y + Z
1263 *
1264 * For each c (x,y,z) from the corresponding original C (X,Y,Z). Thus the
1265 * three chromaticity values (x,y,z) for each end-point obey the
1266 * relationship:
1267 *
1268 * x + y + z = 1
1269 *
1270 * This describes the plane in (X,Y,Z) space that intersects each axis at the
1271 * value 1.0; call this the chromaticity plane. Thus the chromaticity
1272 * calculation has scaled each end-point so that it is on the x+y+z=1 plane
1273 * and chromaticity is the intersection of the vector from the origin to the
1274 * (X,Y,Z) value with the chromaticity plane.
1275 *
1276 * To fully invert the chromaticity calculation we would need the three
1277 * end-point scale factors, (red-scale, green-scale, blue-scale), but these
1278 * were not recorded. Instead we calculated the reference white (X,Y,Z) and
1279 * recorded the chromaticity of this. The reference white (X,Y,Z) would have
1280 * given all three of the scale factors since:
1281 *
1282 * color-C = color-c * color-scale
1283 * white-C = red-C + green-C + blue-C
1284 * = red-c*red-scale + green-c*green-scale + blue-c*blue-scale
1285 *
1286 * But cHRM records only white-x and white-y, so we have lost the white scale
1287 * factor:
1288 *
1289 * white-C = white-c*white-scale
1290 *
1291 * To handle this the inverse transformation makes an arbitrary assumption
1292 * about white-scale:
1293 *
1294 * Assume: white-Y = 1.0
1295 * Hence: white-scale = 1/white-y
1296 * Or: red-Y + green-Y + blue-Y = 1.0
1297 *
1298 * Notice the last statement of the assumption gives an equation in three of
1299 * the nine values we want to calculate. 8 more equations come from the
1300 * above routine as summarised at the top above (the chromaticity
1301 * calculation):
1302 *
1303 * Given: color-x = color-X / (color-X + color-Y + color-Z)
1304 * Hence: (color-x - 1)*color-X + color.x*color-Y + color.x*color-Z = 0
1305 *
1306 * This is 9 simultaneous equations in the 9 variables "color-C" and can be
1307 * solved by Cramer's rule. Cramer's rule requires calculating 10 9x9 matrix
1308 * determinants, however this is not as bad as it seems because only 28 of
1309 * the total of 90 terms in the various matrices are non-zero. Nevertheless
1310 * Cramer's rule is notoriously numerically unstable because the determinant
1311 * calculation involves the difference of large, but similar, numbers. It is
1312 * difficult to be sure that the calculation is stable for real world values
1313 * and it is certain that it becomes unstable where the end points are close
1314 * together.
1315 *
1316 * So this code uses the perhaps slightly less optimal but more
1317 * understandable and totally obvious approach of calculating color-scale.
1318 *
1319 * This algorithm depends on the precision in white-scale and that is
1320 * (1/white-y), so we can immediately see that as white-y approaches 0 the
1321 * accuracy inherent in the cHRM chunk drops off substantially.
1322 *
1323 * libpng arithmetic: a simple invertion of the above equations
1324 * ------------------------------------------------------------
1325 *
1326 * white_scale = 1/white-y
1327 * white-X = white-x * white-scale
1328 * white-Y = 1.0
1329 * white-Z = (1 - white-x - white-y) * white_scale
1330 *
1331 * white-C = red-C + green-C + blue-C
1332 * = red-c*red-scale + green-c*green-scale + blue-c*blue-scale
1333 *
1334 * This gives us three equations in (red-scale,green-scale,blue-scale) where
1335 * all the coefficients are now known:
1336 *
1337 * red-x*red-scale + green-x*green-scale + blue-x*blue-scale
1338 * = white-x/white-y
1339 * red-y*red-scale + green-y*green-scale + blue-y*blue-scale = 1
1340 * red-z*red-scale + green-z*green-scale + blue-z*blue-scale
1341 * = (1 - white-x - white-y)/white-y
1342 *
1343 * In the last equation color-z is (1 - color-x - color-y) so we can add all
1344 * three equations together to get an alternative third:
1345 *
1346 * red-scale + green-scale + blue-scale = 1/white-y = white-scale
1347 *
1348 * So now we have a Cramer's rule solution where the determinants are just
1349 * 3x3 - far more tractible. Unfortunately 3x3 determinants still involve
1350 * multiplication of three coefficients so we can't guarantee to avoid
1351 * overflow in the libpng fixed point representation. Using Cramer's rule in
1352 * floating point is probably a good choice here, but it's not an option for
1353 * fixed point. Instead proceed to simplify the first two equations by
1354 * eliminating what is likely to be the largest value, blue-scale:
1355 *
1356 * blue-scale = white-scale - red-scale - green-scale
1357 *
1358 * Hence:
1359 *
1360 * (red-x - blue-x)*red-scale + (green-x - blue-x)*green-scale =
1361 * (white-x - blue-x)*white-scale
1362 *
1363 * (red-y - blue-y)*red-scale + (green-y - blue-y)*green-scale =
1364 * 1 - blue-y*white-scale
1365 *
1366 * And now we can trivially solve for (red-scale,green-scale):
1367 *
1368 * green-scale =
1369 * (white-x - blue-x)*white-scale - (red-x - blue-x)*red-scale
1370 * -----------------------------------------------------------
1371 * green-x - blue-x
1372 *
1373 * red-scale =
1374 * 1 - blue-y*white-scale - (green-y - blue-y) * green-scale
1375 * ---------------------------------------------------------
1376 * red-y - blue-y
1377 *
1378 * Hence:
1379 *
1380 * red-scale =
1381 * ( (green-x - blue-x) * (white-y - blue-y) -
1382 * (green-y - blue-y) * (white-x - blue-x) ) / white-y
1383 * -------------------------------------------------------------------------
1384 * (green-x - blue-x)*(red-y - blue-y)-(green-y - blue-y)*(red-x - blue-x)
1385 *
1386 * green-scale =
1387 * ( (red-y - blue-y) * (white-x - blue-x) -
1388 * (red-x - blue-x) * (white-y - blue-y) ) / white-y
1389 * -------------------------------------------------------------------------
1390 * (green-x - blue-x)*(red-y - blue-y)-(green-y - blue-y)*(red-x - blue-x)
1391 *
1392 * Accuracy:
1393 * The input values have 5 decimal digits of accuracy. The values are all in
1394 * the range 0 < value < 1, so simple products are in the same range but may
1395 * need up to 10 decimal digits to preserve the original precision and avoid
1396 * underflow. Because we are using a 32-bit signed representation we cannot
1397 * match this; the best is a little over 9 decimal digits, less than 10.
1398 *
1399 * The approach used here is to preserve the maximum precision within the
1400 * signed representation. Because the red-scale calculation above uses the
1401 * difference between two products of values that must be in the range -1..+1
1402 * it is sufficient to divide the product by 7; ceil(100,000/32767*2). The
1403 * factor is irrelevant in the calculation because it is applied to both
1404 * numerator and denominator.
1405 *
1406 * Note that the values of the differences of the products of the
1407 * chromaticities in the above equations tend to be small, for example for
1408 * the sRGB chromaticities they are:
1409 *
1410 * red numerator: -0.04751
1411 * green numerator: -0.08788
1412 * denominator: -0.2241 (without white-y multiplication)
1413 *
1414 * The resultant Y coefficients from the chromaticities of some widely used
1415 * color space definitions are (to 15 decimal places):
1416 *
1417 * sRGB
1418 * 0.212639005871510 0.715168678767756 0.072192315360734
1419 * Kodak ProPhoto
1420 * 0.288071128229293 0.711843217810102 0.000085653960605
1421 * Adobe RGB
1422 * 0.297344975250536 0.627363566255466 0.075291458493998
1423 * Adobe Wide Gamut RGB
1424 * 0.258728243040113 0.724682314948566 0.016589442011321
1425 */
1426 /* By the argument, above overflow should be impossible here. The return
1427 * value of 2 indicates an internal error to the caller.
1428 */
1429 if (!png_muldiv(&left, xy->greenx-xy->bluex, xy->redy - xy->bluey, 7))
1430 return 2;
1431 if (!png_muldiv(&right, xy->greeny-xy->bluey, xy->redx - xy->bluex, 7))
1432 return 2;
1433 denominator = left - right;
1434
1435 /* Now find the red numerator. */
1436 if (!png_muldiv(&left, xy->greenx-xy->bluex, xy->whitey-xy->bluey, 7))
1437 return 2;
1438 if (!png_muldiv(&right, xy->greeny-xy->bluey, xy->whitex-xy->bluex, 7))
1439 return 2;
1440
1441 /* Overflow is possible here and it indicates an extreme set of PNG cHRM
1442 * chunk values. This calculation actually returns the reciprocal of the
1443 * scale value because this allows us to delay the multiplication of white-y
1444 * into the denominator, which tends to produce a small number.
1445 */
1446 if (!png_muldiv(&red_inverse, xy->whitey, denominator, left-right) ||
1447 red_inverse <= xy->whitey /* r+g+b scales = white scale */)
1448 return 1;
1449
1450 /* Similarly for green_inverse: */
1451 if (!png_muldiv(&left, xy->redy-xy->bluey, xy->whitex-xy->bluex, 7))
1452 return 2;
1453 if (!png_muldiv(&right, xy->redx-xy->bluex, xy->whitey-xy->bluey, 7))
1454 return 2;
1455 if (!png_muldiv(&green_inverse, xy->whitey, denominator, left-right) ||
1456 green_inverse <= xy->whitey)
1457 return 1;
1458
1459 /* And the blue scale, the checks above guarantee this can't overflow but it
1460 * can still produce 0 for extreme cHRM values.
1461 */
1462 blue_scale = png_reciprocal(xy->whitey) - png_reciprocal(red_inverse) -
1463 png_reciprocal(green_inverse);
1464 if (blue_scale <= 0) return 1;
1465
1466
1467 /* And fill in the png_XYZ: */
1468 if (!png_muldiv(&XYZ->red_X, xy->redx, PNG_FP_1, red_inverse)) return 1;
1469 if (!png_muldiv(&XYZ->red_Y, xy->redy, PNG_FP_1, red_inverse)) return 1;
1470 if (!png_muldiv(&XYZ->red_Z, PNG_FP_1 - xy->redx - xy->redy, PNG_FP_1,
1471 red_inverse))
1472 return 1;
1473
1474 if (!png_muldiv(&XYZ->green_X, xy->greenx, PNG_FP_1, green_inverse))
1475 return 1;
1476 if (!png_muldiv(&XYZ->green_Y, xy->greeny, PNG_FP_1, green_inverse))
1477 return 1;
1478 if (!png_muldiv(&XYZ->green_Z, PNG_FP_1 - xy->greenx - xy->greeny, PNG_FP_1,
1479 green_inverse))
1480 return 1;
1481
1482 if (!png_muldiv(&XYZ->blue_X, xy->bluex, blue_scale, PNG_FP_1)) return 1;
1483 if (!png_muldiv(&XYZ->blue_Y, xy->bluey, blue_scale, PNG_FP_1)) return 1;
1484 if (!png_muldiv(&XYZ->blue_Z, PNG_FP_1 - xy->bluex - xy->bluey, blue_scale,
1485 PNG_FP_1))
1486 return 1;
1487
1488 return 0; /*success*/
1489}
1490
1491static int
1492png_XYZ_normalize(png_XYZ *XYZ)
1493{
1494 png_int_32 Y;
1495
1496 if (XYZ->red_Y < 0 || XYZ->green_Y < 0 || XYZ->blue_Y < 0 ||
1497 XYZ->red_X < 0 || XYZ->green_X < 0 || XYZ->blue_X < 0 ||
1498 XYZ->red_Z < 0 || XYZ->green_Z < 0 || XYZ->blue_Z < 0)
1499 return 1;
1500
1501 /* Normalize by scaling so the sum of the end-point Y values is PNG_FP_1.
1502 * IMPLEMENTATION NOTE: ANSI requires signed overflow not to occur, therefore
1503 * relying on addition of two positive values producing a negative one is not
1504 * safe.
1505 */
1506 Y = XYZ->red_Y;
1507 if (0x7fffffff - Y < XYZ->green_X) return 1;
1508 Y += XYZ->green_Y;
1509 if (0x7fffffff - Y < XYZ->blue_X) return 1;
1510 Y += XYZ->blue_Y;
1511
1512 if (Y != PNG_FP_1)
1513 {
1514 if (!png_muldiv(&XYZ->red_X, XYZ->red_X, PNG_FP_1, Y)) return 1;
1515 if (!png_muldiv(&XYZ->red_Y, XYZ->red_Y, PNG_FP_1, Y)) return 1;
1516 if (!png_muldiv(&XYZ->red_Z, XYZ->red_Z, PNG_FP_1, Y)) return 1;
1517
1518 if (!png_muldiv(&XYZ->green_X, XYZ->green_X, PNG_FP_1, Y)) return 1;
1519 if (!png_muldiv(&XYZ->green_Y, XYZ->green_Y, PNG_FP_1, Y)) return 1;
1520 if (!png_muldiv(&XYZ->green_Z, XYZ->green_Z, PNG_FP_1, Y)) return 1;
1521
1522 if (!png_muldiv(&XYZ->blue_X, XYZ->blue_X, PNG_FP_1, Y)) return 1;
1523 if (!png_muldiv(&XYZ->blue_Y, XYZ->blue_Y, PNG_FP_1, Y)) return 1;
1524 if (!png_muldiv(&XYZ->blue_Z, XYZ->blue_Z, PNG_FP_1, Y)) return 1;
1525 }
1526
1527 return 0;
1528}
1529
1530static int
1531png_colorspace_endpoints_match(const png_xy *xy1, const png_xy *xy2, int delta)
1532{
1533 /* Allow an error of +/-0.01 (absolute value) on each chromaticity */
1534 return !(PNG_OUT_OF_RANGE(xy1->whitex, xy2->whitex,delta) ||
1535 PNG_OUT_OF_RANGE(xy1->whitey, xy2->whitey,delta) ||
1536 PNG_OUT_OF_RANGE(xy1->redx, xy2->redx, delta) ||
1537 PNG_OUT_OF_RANGE(xy1->redy, xy2->redy, delta) ||
1538 PNG_OUT_OF_RANGE(xy1->greenx, xy2->greenx,delta) ||
1539 PNG_OUT_OF_RANGE(xy1->greeny, xy2->greeny,delta) ||
1540 PNG_OUT_OF_RANGE(xy1->bluex, xy2->bluex, delta) ||
1541 PNG_OUT_OF_RANGE(xy1->bluey, xy2->bluey, delta));
1542}
1543
1544/* Added in libpng-1.6.0, a different check for the validity of a set of cHRM
1545 * chunk chromaticities. Earlier checks used to simply look for the overflow
1546 * condition (where the determinant of the matrix to solve for XYZ ends up zero
1547 * because the chromaticity values are not all distinct.) Despite this it is
1548 * theoretically possible to produce chromaticities that are apparently valid
1549 * but that rapidly degrade to invalid, potentially crashing, sets because of
1550 * arithmetic inaccuracies when calculations are performed on them. The new
1551 * check is to round-trip xy -> XYZ -> xy and then check that the result is
1552 * within a small percentage of the original.
1553 */
1554static int
1555png_colorspace_check_xy(png_XYZ *XYZ, const png_xy *xy)
1556{
1557 int result;
1558 png_xy xy_test;
1559
1560 /* As a side-effect this routine also returns the XYZ endpoints. */
1561 result = png_XYZ_from_xy(XYZ, xy);
1562 if (result) return result;
1563
1564 result = png_xy_from_XYZ(&xy_test, XYZ);
1565 if (result) return result;
1566
1567 if (png_colorspace_endpoints_match(xy, &xy_test,
1568 5/*actually, the math is pretty accurate*/))
1569 return 0;
1570
1571 /* Too much slip */
1572 return 1;
1573}
1574
1575/* This is the check going the other way. The XYZ is modified to normalize it
1576 * (another side-effect) and the xy chromaticities are returned.
1577 */
1578static int
1579png_colorspace_check_XYZ(png_xy *xy, png_XYZ *XYZ)
1580{
1581 int result;
1582 png_XYZ XYZtemp;
1583
1584 result = png_XYZ_normalize(XYZ);
1585 if (result) return result;
1586
1587 result = png_xy_from_XYZ(xy, XYZ);
1588 if (result) return result;
1589
1590 XYZtemp = *XYZ;
1591 return png_colorspace_check_xy(&XYZtemp, xy);
1592}
1593
1594/* Used to check for an endpoint match against sRGB */
1595static const png_xy sRGB_xy = /* From ITU-R BT.709-3 */
1596{
1597 /* color x y */
1598 /* red */ 64000, 33000,
1599 /* green */ 30000, 60000,
1600 /* blue */ 15000, 6000,
1601 /* white */ 31270, 32900
1602};
1603
1604static int
1605png_colorspace_set_xy_and_XYZ(png_const_structrp png_ptr,
1606 png_colorspacerp colorspace, const png_xy *xy, const png_XYZ *XYZ,
1607 int preferred)
1608{
1609 if (colorspace->flags & PNG_COLORSPACE_INVALID)
1610 return 0;
1611
1612 /* The consistency check is performed on the chromaticities; this factors out
1613 * variations because of the normalization (or not) of the end point Y
1614 * values.
1615 */
1616 if (preferred < 2 && (colorspace->flags & PNG_COLORSPACE_HAVE_ENDPOINTS))
1617 {
1618 /* The end points must be reasonably close to any we already have. The
1619 * following allows an error of up to +/-.001
1620 */
1621 if (!png_colorspace_endpoints_match(xy, &colorspace->end_points_xy, 100))
1622 {
1623 colorspace->flags |= PNG_COLORSPACE_INVALID;
1624 png_benign_error(png_ptr, "inconsistent chromaticities");
1625 return 0; /* failed */
1626 }
1627
1628 /* Only overwrite with preferred values */
1629 if (!preferred)
1630 return 1; /* ok, but no change */
1631 }
1632
1633 colorspace->end_points_xy = *xy;
1634 colorspace->end_points_XYZ = *XYZ;
1635 colorspace->flags |= PNG_COLORSPACE_HAVE_ENDPOINTS;
1636
1637 /* The end points are normally quoted to two decimal digits, so allow +/-0.01
1638 * on this test.
1639 */
1640 if (png_colorspace_endpoints_match(xy, &sRGB_xy, 1000))
1641 colorspace->flags |= PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB;
1642
1643 else
1644 colorspace->flags &= PNG_COLORSPACE_CANCEL(
1645 PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB);
1646
1647 return 2; /* ok and changed */
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001648}
Patrick Scotta0bb96c2009-07-22 11:50:02 -04001649
Patrick Scott5f6bd842010-06-28 16:55:16 -04001650int /* PRIVATE */
Chris Craikb50c2172013-07-29 15:28:30 -07001651png_colorspace_set_chromaticities(png_const_structrp png_ptr,
1652 png_colorspacerp colorspace, const png_xy *xy, int preferred)
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001653{
Chris Craikb50c2172013-07-29 15:28:30 -07001654 /* We must check the end points to ensure they are reasonable - in the past
1655 * color management systems have crashed as a result of getting bogus
1656 * colorant values, while this isn't the fault of libpng it is the
1657 * responsibility of libpng because PNG carries the bomb and libpng is in a
1658 * position to protect against it.
1659 */
1660 png_XYZ XYZ;
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001661
Chris Craikb50c2172013-07-29 15:28:30 -07001662 switch (png_colorspace_check_xy(&XYZ, xy))
1663 {
1664 case 0: /* success */
1665 return png_colorspace_set_xy_and_XYZ(png_ptr, colorspace, xy, &XYZ,
1666 preferred);
Patrick Scott5f6bd842010-06-28 16:55:16 -04001667
Chris Craikb50c2172013-07-29 15:28:30 -07001668 case 1:
1669 /* We can't invert the chromaticities so we can't produce value XYZ
1670 * values. Likely as not a color management system will fail too.
1671 */
1672 colorspace->flags |= PNG_COLORSPACE_INVALID;
1673 png_benign_error(png_ptr, "invalid chromaticities");
1674 break;
1675
1676 default:
1677 /* libpng is broken; this should be a warning but if it happens we
1678 * want error reports so for the moment it is an error.
1679 */
1680 colorspace->flags |= PNG_COLORSPACE_INVALID;
1681 png_error(png_ptr, "internal error checking chromaticities");
1682 break;
1683 }
1684
1685 return 0; /* failed */
1686}
1687
1688int /* PRIVATE */
1689png_colorspace_set_endpoints(png_const_structrp png_ptr,
1690 png_colorspacerp colorspace, const png_XYZ *XYZ_in, int preferred)
1691{
1692 png_XYZ XYZ = *XYZ_in;
1693 png_xy xy;
1694
1695 switch (png_colorspace_check_XYZ(&xy, &XYZ))
1696 {
1697 case 0:
1698 return png_colorspace_set_xy_and_XYZ(png_ptr, colorspace, &xy, &XYZ,
1699 preferred);
1700
1701 case 1:
1702 /* End points are invalid. */
1703 colorspace->flags |= PNG_COLORSPACE_INVALID;
1704 png_benign_error(png_ptr, "invalid end points");
1705 break;
1706
1707 default:
1708 colorspace->flags |= PNG_COLORSPACE_INVALID;
1709 png_error(png_ptr, "internal error checking chromaticities");
1710 break;
1711 }
1712
1713 return 0; /* failed */
1714}
1715
1716#if defined(PNG_sRGB_SUPPORTED) || defined(PNG_iCCP_SUPPORTED)
1717/* Error message generation */
1718static char
1719png_icc_tag_char(png_uint_32 byte)
1720{
1721 byte &= 0xff;
1722 if (byte >= 32 && byte <= 126)
1723 return (char)byte;
1724 else
1725 return '?';
1726}
1727
1728static void
1729png_icc_tag_name(char *name, png_uint_32 tag)
1730{
1731 name[0] = '\'';
1732 name[1] = png_icc_tag_char(tag >> 24);
1733 name[2] = png_icc_tag_char(tag >> 16);
1734 name[3] = png_icc_tag_char(tag >> 8);
1735 name[4] = png_icc_tag_char(tag );
1736 name[5] = '\'';
1737}
1738
1739static int
1740is_ICC_signature_char(png_alloc_size_t it)
1741{
1742 return it == 32 || (it >= 48 && it <= 57) || (it >= 65 && it <= 90) ||
1743 (it >= 97 && it <= 122);
1744}
1745
Sireesh Tripurarib478e662014-05-09 15:15:10 +05301746static int
1747is_ICC_signature(png_alloc_size_t it)
Chris Craikb50c2172013-07-29 15:28:30 -07001748{
1749 return is_ICC_signature_char(it >> 24) /* checks all the top bits */ &&
1750 is_ICC_signature_char((it >> 16) & 0xff) &&
1751 is_ICC_signature_char((it >> 8) & 0xff) &&
1752 is_ICC_signature_char(it & 0xff);
1753}
1754
1755static int
1756png_icc_profile_error(png_const_structrp png_ptr, png_colorspacerp colorspace,
1757 png_const_charp name, png_alloc_size_t value, png_const_charp reason)
1758{
1759 size_t pos;
1760 char message[196]; /* see below for calculation */
1761
1762 if (colorspace != NULL)
1763 colorspace->flags |= PNG_COLORSPACE_INVALID;
1764
1765 pos = png_safecat(message, (sizeof message), 0, "profile '"); /* 9 chars */
1766 pos = png_safecat(message, pos+79, pos, name); /* Truncate to 79 chars */
1767 pos = png_safecat(message, (sizeof message), pos, "': "); /* +2 = 90 */
1768 if (is_ICC_signature(value))
1769 {
1770 /* So 'value' is at most 4 bytes and the following cast is safe */
1771 png_icc_tag_name(message+pos, (png_uint_32)value);
1772 pos += 6; /* total +8; less than the else clause */
1773 message[pos++] = ':';
1774 message[pos++] = ' ';
1775 }
1776# ifdef PNG_WARNINGS_SUPPORTED
1777 else
1778 {
1779 char number[PNG_NUMBER_BUFFER_SIZE]; /* +24 = 114*/
1780
1781 pos = png_safecat(message, (sizeof message), pos,
1782 png_format_number(number, number+(sizeof number),
1783 PNG_NUMBER_FORMAT_x, value));
1784 pos = png_safecat(message, (sizeof message), pos, "h: "); /*+2 = 116*/
1785 }
1786# endif
1787 /* The 'reason' is an arbitrary message, allow +79 maximum 195 */
1788 pos = png_safecat(message, (sizeof message), pos, reason);
Sireesh Tripurarib478e662014-05-09 15:15:10 +05301789 PNG_UNUSED(pos)
Chris Craikb50c2172013-07-29 15:28:30 -07001790
1791 /* This is recoverable, but make it unconditionally an app_error on write to
1792 * avoid writing invalid ICC profiles into PNG files. (I.e. we handle them
1793 * on read, with a warning, but on write unless the app turns off
1794 * application errors the PNG won't be written.)
1795 */
1796 png_chunk_report(png_ptr, message,
1797 (colorspace != NULL) ? PNG_CHUNK_ERROR : PNG_CHUNK_WRITE_ERROR);
1798
1799 return 0;
1800}
1801#endif /* sRGB || iCCP */
1802
1803#ifdef PNG_sRGB_SUPPORTED
1804int /* PRIVATE */
1805png_colorspace_set_sRGB(png_const_structrp png_ptr, png_colorspacerp colorspace,
1806 int intent)
1807{
1808 /* sRGB sets known gamma, end points and (from the chunk) intent. */
1809 /* IMPORTANT: these are not necessarily the values found in an ICC profile
1810 * because ICC profiles store values adapted to a D50 environment; it is
1811 * expected that the ICC profile mediaWhitePointTag will be D50, see the
1812 * checks and code elsewhere to understand this better.
1813 *
1814 * These XYZ values, which are accurate to 5dp, produce rgb to gray
1815 * coefficients of (6968,23435,2366), which are reduced (because they add up
1816 * to 32769 not 32768) to (6968,23434,2366). These are the values that
1817 * libpng has traditionally used (and are the best values given the 15bit
1818 * algorithm used by the rgb to gray code.)
1819 */
1820 static const png_XYZ sRGB_XYZ = /* D65 XYZ (*not* the D50 adapted values!) */
1821 {
1822 /* color X Y Z */
1823 /* red */ 41239, 21264, 1933,
1824 /* green */ 35758, 71517, 11919,
1825 /* blue */ 18048, 7219, 95053
1826 };
1827
1828 /* Do nothing if the colorspace is already invalidated. */
1829 if (colorspace->flags & PNG_COLORSPACE_INVALID)
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001830 return 0;
1831
Chris Craikb50c2172013-07-29 15:28:30 -07001832 /* Check the intent, then check for existing settings. It is valid for the
1833 * PNG file to have cHRM or gAMA chunks along with sRGB, but the values must
1834 * be consistent with the correct values. If, however, this function is
1835 * called below because an iCCP chunk matches sRGB then it is quite
1836 * conceivable that an older app recorded incorrect gAMA and cHRM because of
1837 * an incorrect calculation based on the values in the profile - this does
1838 * *not* invalidate the profile (though it still produces an error, which can
1839 * be ignored.)
1840 */
1841 if (intent < 0 || intent >= PNG_sRGB_INTENT_LAST)
1842 return png_icc_profile_error(png_ptr, colorspace, "sRGB",
1843 (unsigned)intent, "invalid sRGB rendering intent");
1844
1845 if ((colorspace->flags & PNG_COLORSPACE_HAVE_INTENT) != 0 &&
1846 colorspace->rendering_intent != intent)
1847 return png_icc_profile_error(png_ptr, colorspace, "sRGB",
1848 (unsigned)intent, "inconsistent rendering intents");
1849
1850 if ((colorspace->flags & PNG_COLORSPACE_FROM_sRGB) != 0)
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001851 {
Chris Craikb50c2172013-07-29 15:28:30 -07001852 png_benign_error(png_ptr, "duplicate sRGB information ignored");
1853 return 0;
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001854 }
1855
Chris Craikb50c2172013-07-29 15:28:30 -07001856 /* If the standard sRGB cHRM chunk does not match the one from the PNG file
1857 * warn but overwrite the value with the correct one.
1858 */
1859 if ((colorspace->flags & PNG_COLORSPACE_HAVE_ENDPOINTS) != 0 &&
1860 !png_colorspace_endpoints_match(&sRGB_xy, &colorspace->end_points_xy,
1861 100))
1862 png_chunk_report(png_ptr, "cHRM chunk does not match sRGB",
1863 PNG_CHUNK_ERROR);
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001864
Chris Craikb50c2172013-07-29 15:28:30 -07001865 /* This check is just done for the error reporting - the routine always
1866 * returns true when the 'from' argument corresponds to sRGB (2).
1867 */
1868 (void)png_colorspace_check_gamma(png_ptr, colorspace, PNG_GAMMA_sRGB_INVERSE,
1869 2/*from sRGB*/);
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001870
Chris Craikb50c2172013-07-29 15:28:30 -07001871 /* intent: bugs in GCC force 'int' to be used as the parameter type. */
1872 colorspace->rendering_intent = (png_uint_16)intent;
1873 colorspace->flags |= PNG_COLORSPACE_HAVE_INTENT;
1874
1875 /* endpoints */
1876 colorspace->end_points_xy = sRGB_xy;
1877 colorspace->end_points_XYZ = sRGB_XYZ;
1878 colorspace->flags |=
1879 (PNG_COLORSPACE_HAVE_ENDPOINTS|PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB);
1880
1881 /* gamma */
1882 colorspace->gamma = PNG_GAMMA_sRGB_INVERSE;
1883 colorspace->flags |= PNG_COLORSPACE_HAVE_GAMMA;
1884
1885 /* Finally record that we have an sRGB profile */
1886 colorspace->flags |=
1887 (PNG_COLORSPACE_MATCHES_sRGB|PNG_COLORSPACE_FROM_sRGB);
1888
1889 return 1; /* set */
The Android Open Source Project4215dd12009-03-09 11:52:12 -07001890}
Chris Craikb50c2172013-07-29 15:28:30 -07001891#endif /* sRGB */
1892
1893#ifdef PNG_iCCP_SUPPORTED
1894/* Encoded value of D50 as an ICC XYZNumber. From the ICC 2010 spec the value
1895 * is XYZ(0.9642,1.0,0.8249), which scales to:
1896 *
1897 * (63189.8112, 65536, 54060.6464)
1898 */
1899static const png_byte D50_nCIEXYZ[12] =
1900 { 0x00, 0x00, 0xf6, 0xd6, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x2d };
1901
1902int /* PRIVATE */
1903png_icc_check_length(png_const_structrp png_ptr, png_colorspacerp colorspace,
1904 png_const_charp name, png_uint_32 profile_length)
1905{
1906 if (profile_length < 132)
1907 return png_icc_profile_error(png_ptr, colorspace, name, profile_length,
1908 "too short");
1909
1910 if (profile_length & 3)
1911 return png_icc_profile_error(png_ptr, colorspace, name, profile_length,
1912 "invalid length");
1913
1914 return 1;
1915}
1916
1917int /* PRIVATE */
1918png_icc_check_header(png_const_structrp png_ptr, png_colorspacerp colorspace,
1919 png_const_charp name, png_uint_32 profile_length,
1920 png_const_bytep profile/* first 132 bytes only */, int color_type)
1921{
1922 png_uint_32 temp;
1923
1924 /* Length check; this cannot be ignored in this code because profile_length
1925 * is used later to check the tag table, so even if the profile seems over
1926 * long profile_length from the caller must be correct. The caller can fix
1927 * this up on read or write by just passing in the profile header length.
1928 */
1929 temp = png_get_uint_32(profile);
1930 if (temp != profile_length)
1931 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1932 "length does not match profile");
1933
1934 temp = png_get_uint_32(profile+128); /* tag count: 12 bytes/tag */
1935 if (temp > 357913930 || /* (2^32-4-132)/12: maximum possible tag count */
1936 profile_length < 132+12*temp) /* truncated tag table */
1937 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1938 "tag count too large");
1939
1940 /* The 'intent' must be valid or we can't store it, ICC limits the intent to
1941 * 16 bits.
1942 */
1943 temp = png_get_uint_32(profile+64);
1944 if (temp >= 0xffff) /* The ICC limit */
1945 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1946 "invalid rendering intent");
1947
1948 /* This is just a warning because the profile may be valid in future
1949 * versions.
1950 */
1951 if (temp >= PNG_sRGB_INTENT_LAST)
1952 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
1953 "intent outside defined range");
1954
1955 /* At this point the tag table can't be checked because it hasn't necessarily
1956 * been loaded; however, various header fields can be checked. These checks
1957 * are for values permitted by the PNG spec in an ICC profile; the PNG spec
1958 * restricts the profiles that can be passed in an iCCP chunk (they must be
1959 * appropriate to processing PNG data!)
1960 */
1961
1962 /* Data checks (could be skipped). These checks must be independent of the
1963 * version number; however, the version number doesn't accomodate changes in
1964 * the header fields (just the known tags and the interpretation of the
1965 * data.)
1966 */
1967 temp = png_get_uint_32(profile+36); /* signature 'ascp' */
1968 if (temp != 0x61637370)
1969 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1970 "invalid signature");
1971
1972 /* Currently the PCS illuminant/adopted white point (the computational
1973 * white point) are required to be D50,
1974 * however the profile contains a record of the illuminant so perhaps ICC
1975 * expects to be able to change this in the future (despite the rationale in
1976 * the introduction for using a fixed PCS adopted white.) Consequently the
1977 * following is just a warning.
1978 */
1979 if (memcmp(profile+68, D50_nCIEXYZ, 12) != 0)
1980 (void)png_icc_profile_error(png_ptr, NULL, name, 0/*no tag value*/,
1981 "PCS illuminant is not D50");
1982
1983 /* The PNG spec requires this:
1984 * "If the iCCP chunk is present, the image samples conform to the colour
1985 * space represented by the embedded ICC profile as defined by the
1986 * International Color Consortium [ICC]. The colour space of the ICC profile
1987 * shall be an RGB colour space for colour images (PNG colour types 2, 3, and
1988 * 6), or a greyscale colour space for greyscale images (PNG colour types 0
1989 * and 4)."
1990 *
1991 * This checking code ensures the embedded profile (on either read or write)
1992 * conforms to the specification requirements. Notice that an ICC 'gray'
1993 * color-space profile contains the information to transform the monochrome
1994 * data to XYZ or L*a*b (according to which PCS the profile uses) and this
1995 * should be used in preference to the standard libpng K channel replication
1996 * into R, G and B channels.
1997 *
1998 * Previously it was suggested that an RGB profile on grayscale data could be
1999 * handled. However it it is clear that using an RGB profile in this context
2000 * must be an error - there is no specification of what it means. Thus it is
2001 * almost certainly more correct to ignore the profile.
2002 */
2003 temp = png_get_uint_32(profile+16); /* data colour space field */
2004 switch (temp)
2005 {
2006 case 0x52474220: /* 'RGB ' */
2007 if (!(color_type & PNG_COLOR_MASK_COLOR))
2008 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2009 "RGB color space not permitted on grayscale PNG");
2010 break;
2011
2012 case 0x47524159: /* 'GRAY' */
2013 if (color_type & PNG_COLOR_MASK_COLOR)
2014 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2015 "Gray color space not permitted on RGB PNG");
2016 break;
2017
2018 default:
2019 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2020 "invalid ICC profile color space");
2021 }
2022
2023 /* It is up to the application to check that the profile class matches the
2024 * application requirements; the spec provides no guidance, but it's pretty
2025 * weird if the profile is not scanner ('scnr'), monitor ('mntr'), printer
2026 * ('prtr') or 'spac' (for generic color spaces). Issue a warning in these
2027 * cases. Issue an error for device link or abstract profiles - these don't
2028 * contain the records necessary to transform the color-space to anything
2029 * other than the target device (and not even that for an abstract profile).
2030 * Profiles of these classes may not be embedded in images.
2031 */
2032 temp = png_get_uint_32(profile+12); /* profile/device class */
2033 switch (temp)
2034 {
2035 case 0x73636E72: /* 'scnr' */
2036 case 0x6D6E7472: /* 'mntr' */
2037 case 0x70727472: /* 'prtr' */
2038 case 0x73706163: /* 'spac' */
2039 /* All supported */
2040 break;
2041
2042 case 0x61627374: /* 'abst' */
2043 /* May not be embedded in an image */
2044 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2045 "invalid embedded Abstract ICC profile");
2046
2047 case 0x6C696E6B: /* 'link' */
2048 /* DeviceLink profiles cannnot be interpreted in a non-device specific
2049 * fashion, if an app uses the AToB0Tag in the profile the results are
2050 * undefined unless the result is sent to the intended device,
2051 * therefore a DeviceLink profile should not be found embedded in a
2052 * PNG.
2053 */
2054 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2055 "unexpected DeviceLink ICC profile class");
2056
2057 case 0x6E6D636C: /* 'nmcl' */
2058 /* A NamedColor profile is also device specific, however it doesn't
2059 * contain an AToB0 tag that is open to misintrepretation. Almost
2060 * certainly it will fail the tests below.
2061 */
2062 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
2063 "unexpected NamedColor ICC profile class");
2064 break;
2065
2066 default:
2067 /* To allow for future enhancements to the profile accept unrecognized
2068 * profile classes with a warning, these then hit the test below on the
2069 * tag content to ensure they are backward compatible with one of the
2070 * understood profiles.
2071 */
2072 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
2073 "unrecognized ICC profile class");
2074 break;
2075 }
2076
2077 /* For any profile other than a device link one the PCS must be encoded
2078 * either in XYZ or Lab.
2079 */
2080 temp = png_get_uint_32(profile+20);
2081 switch (temp)
2082 {
2083 case 0x58595A20: /* 'XYZ ' */
2084 case 0x4C616220: /* 'Lab ' */
2085 break;
2086
2087 default:
2088 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2089 "unexpected ICC PCS encoding");
2090 }
2091
2092 return 1;
2093}
2094
2095int /* PRIVATE */
2096png_icc_check_tag_table(png_const_structrp png_ptr, png_colorspacerp colorspace,
2097 png_const_charp name, png_uint_32 profile_length,
2098 png_const_bytep profile /* header plus whole tag table */)
2099{
2100 png_uint_32 tag_count = png_get_uint_32(profile+128);
2101 png_uint_32 itag;
2102 png_const_bytep tag = profile+132; /* The first tag */
2103
2104 /* First scan all the tags in the table and add bits to the icc_info value
2105 * (temporarily in 'tags').
2106 */
2107 for (itag=0; itag < tag_count; ++itag, tag += 12)
2108 {
2109 png_uint_32 tag_id = png_get_uint_32(tag+0);
2110 png_uint_32 tag_start = png_get_uint_32(tag+4); /* must be aligned */
2111 png_uint_32 tag_length = png_get_uint_32(tag+8);/* not padded */
2112
2113 /* The ICC specification does not exclude zero length tags, therefore the
2114 * start might actually be anywhere if there is no data, but this would be
2115 * a clear abuse of the intent of the standard so the start is checked for
2116 * being in range. All defined tag types have an 8 byte header - a 4 byte
2117 * type signature then 0.
2118 */
2119 if ((tag_start & 3) != 0)
2120 {
2121 /* CNHP730S.icc shipped with Microsoft Windows 64 violates this, it is
2122 * only a warning here because libpng does not care about the
2123 * alignment.
2124 */
2125 (void)png_icc_profile_error(png_ptr, NULL, name, tag_id,
2126 "ICC profile tag start not a multiple of 4");
2127 }
2128
2129 /* This is a hard error; potentially it can cause read outside the
2130 * profile.
2131 */
2132 if (tag_start > profile_length || tag_length > profile_length - tag_start)
2133 return png_icc_profile_error(png_ptr, colorspace, name, tag_id,
2134 "ICC profile tag outside profile");
2135 }
2136
2137 return 1; /* success, maybe with warnings */
2138}
2139
2140#ifdef PNG_sRGB_SUPPORTED
2141/* Information about the known ICC sRGB profiles */
2142static const struct
2143{
2144 png_uint_32 adler, crc, length;
2145 png_uint_32 md5[4];
2146 png_byte have_md5;
2147 png_byte is_broken;
2148 png_uint_16 intent;
2149
2150# define PNG_MD5(a,b,c,d) { a, b, c, d }, (a!=0)||(b!=0)||(c!=0)||(d!=0)
2151# define PNG_ICC_CHECKSUM(adler, crc, md5, intent, broke, date, length, fname)\
2152 { adler, crc, length, md5, broke, intent },
2153
2154} png_sRGB_checks[] =
2155{
2156 /* This data comes from contrib/tools/checksum-icc run on downloads of
2157 * all four ICC sRGB profiles from www.color.org.
2158 */
2159 /* adler32, crc32, MD5[4], intent, date, length, file-name */
2160 PNG_ICC_CHECKSUM(0x0a3fd9f6, 0x3b8772b9,
2161 PNG_MD5(0x29f83dde, 0xaff255ae, 0x7842fae4, 0xca83390d), 0, 0,
2162 "2009/03/27 21:36:31", 3048, "sRGB_IEC61966-2-1_black_scaled.icc")
2163
2164 /* ICC sRGB v2 perceptual no black-compensation: */
2165 PNG_ICC_CHECKSUM(0x4909e5e1, 0x427ebb21,
2166 PNG_MD5(0xc95bd637, 0xe95d8a3b, 0x0df38f99, 0xc1320389), 1, 0,
2167 "2009/03/27 21:37:45", 3052, "sRGB_IEC61966-2-1_no_black_scaling.icc")
2168
2169 PNG_ICC_CHECKSUM(0xfd2144a1, 0x306fd8ae,
2170 PNG_MD5(0xfc663378, 0x37e2886b, 0xfd72e983, 0x8228f1b8), 0, 0,
2171 "2009/08/10 17:28:01", 60988, "sRGB_v4_ICC_preference_displayclass.icc")
2172
2173 /* ICC sRGB v4 perceptual */
2174 PNG_ICC_CHECKSUM(0x209c35d2, 0xbbef7812,
2175 PNG_MD5(0x34562abf, 0x994ccd06, 0x6d2c5721, 0xd0d68c5d), 0, 0,
2176 "2007/07/25 00:05:37", 60960, "sRGB_v4_ICC_preference.icc")
2177
2178 /* The following profiles have no known MD5 checksum. If there is a match
2179 * on the (empty) MD5 the other fields are used to attempt a match and
2180 * a warning is produced. The first two of these profiles have a 'cprt' tag
2181 * which suggests that they were also made by Hewlett Packard.
2182 */
2183 PNG_ICC_CHECKSUM(0xa054d762, 0x5d5129ce,
2184 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 1, 0,
2185 "2004/07/21 18:57:42", 3024, "sRGB_IEC61966-2-1_noBPC.icc")
2186
2187 /* This is a 'mntr' (display) profile with a mediaWhitePointTag that does not
2188 * match the D50 PCS illuminant in the header (it is in fact the D65 values,
2189 * so the white point is recorded as the un-adapted value.) The profiles
2190 * below only differ in one byte - the intent - and are basically the same as
2191 * the previous profile except for the mediaWhitePointTag error and a missing
2192 * chromaticAdaptationTag.
2193 */
2194 PNG_ICC_CHECKSUM(0xf784f3fb, 0x182ea552,
2195 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 0, 1/*broken*/,
2196 "1998/02/09 06:49:00", 3144, "HP-Microsoft sRGB v2 perceptual")
2197
2198 PNG_ICC_CHECKSUM(0x0398f3fc, 0xf29e526d,
2199 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 1, 1/*broken*/,
2200 "1998/02/09 06:49:00", 3144, "HP-Microsoft sRGB v2 media-relative")
2201};
2202
2203static int
2204png_compare_ICC_profile_with_sRGB(png_const_structrp png_ptr,
2205 png_const_bytep profile, uLong adler)
2206{
2207 /* The quick check is to verify just the MD5 signature and trust the
2208 * rest of the data. Because the profile has already been verified for
2209 * correctness this is safe. png_colorspace_set_sRGB will check the 'intent'
2210 * field too, so if the profile has been edited with an intent not defined
2211 * by sRGB (but maybe defined by a later ICC specification) the read of
2212 * the profile will fail at that point.
2213 */
2214 png_uint_32 length = 0;
2215 png_uint_32 intent = 0x10000; /* invalid */
2216#if PNG_sRGB_PROFILE_CHECKS > 1
2217 uLong crc = 0; /* the value for 0 length data */
2218#endif
2219 unsigned int i;
2220
2221 for (i=0; i < (sizeof png_sRGB_checks) / (sizeof png_sRGB_checks[0]); ++i)
2222 {
2223 if (png_get_uint_32(profile+84) == png_sRGB_checks[i].md5[0] &&
2224 png_get_uint_32(profile+88) == png_sRGB_checks[i].md5[1] &&
2225 png_get_uint_32(profile+92) == png_sRGB_checks[i].md5[2] &&
2226 png_get_uint_32(profile+96) == png_sRGB_checks[i].md5[3])
2227 {
2228 /* This may be one of the old HP profiles without an MD5, in that
2229 * case we can only use the length and Adler32 (note that these
2230 * are not used by default if there is an MD5!)
2231 */
2232# if PNG_sRGB_PROFILE_CHECKS == 0
2233 if (png_sRGB_checks[i].have_md5)
2234 return 1+png_sRGB_checks[i].is_broken;
2235# endif
2236
2237 /* Profile is unsigned or more checks have been configured in. */
2238 if (length == 0)
2239 {
2240 length = png_get_uint_32(profile);
2241 intent = png_get_uint_32(profile+64);
2242 }
2243
2244 /* Length *and* intent must match */
2245 if (length == png_sRGB_checks[i].length &&
2246 intent == png_sRGB_checks[i].intent)
2247 {
2248 /* Now calculate the adler32 if not done already. */
2249 if (adler == 0)
2250 {
2251 adler = adler32(0, NULL, 0);
2252 adler = adler32(adler, profile, length);
2253 }
2254
2255 if (adler == png_sRGB_checks[i].adler)
2256 {
2257 /* These basic checks suggest that the data has not been
2258 * modified, but if the check level is more than 1 perform
2259 * our own crc32 checksum on the data.
2260 */
2261# if PNG_sRGB_PROFILE_CHECKS > 1
2262 if (crc == 0)
2263 {
2264 crc = crc32(0, NULL, 0);
2265 crc = crc32(crc, profile, length);
2266 }
2267
2268 /* So this check must pass for the 'return' below to happen.
2269 */
2270 if (crc == png_sRGB_checks[i].crc)
2271# endif
2272 {
2273 if (png_sRGB_checks[i].is_broken)
2274 {
2275 /* These profiles are known to have bad data that may cause
2276 * problems if they are used, therefore attempt to
2277 * discourage their use, skip the 'have_md5' warning below,
2278 * which is made irrelevant by this error.
2279 */
2280 png_chunk_report(png_ptr, "known incorrect sRGB profile",
2281 PNG_CHUNK_ERROR);
2282 }
2283
2284 /* Warn that this being done; this isn't even an error since
2285 * the profile is perfectly valid, but it would be nice if
2286 * people used the up-to-date ones.
2287 */
2288 else if (!png_sRGB_checks[i].have_md5)
2289 {
2290 png_chunk_report(png_ptr,
2291 "out-of-date sRGB profile with no signature",
2292 PNG_CHUNK_WARNING);
2293 }
2294
2295 return 1+png_sRGB_checks[i].is_broken;
2296 }
2297 }
2298 }
2299
Sireesh Tripurarib478e662014-05-09 15:15:10 +05302300# if PNG_sRGB_PROFILE_CHECKS > 0
2301 /* The signature matched, but the profile had been changed in some
2302 * way. This probably indicates a data error or uninformed hacking.
2303 * Fall through to "no match".
2304 */
2305 png_chunk_report(png_ptr,
2306 "Not recognizing known sRGB profile that has been edited",
2307 PNG_CHUNK_WARNING);
2308 break;
2309# endif
Chris Craikb50c2172013-07-29 15:28:30 -07002310 }
2311 }
2312
2313 return 0; /* no match */
2314}
2315#endif
2316
2317#ifdef PNG_sRGB_SUPPORTED
2318void /* PRIVATE */
2319png_icc_set_sRGB(png_const_structrp png_ptr,
2320 png_colorspacerp colorspace, png_const_bytep profile, uLong adler)
2321{
2322 /* Is this profile one of the known ICC sRGB profiles? If it is, just set
2323 * the sRGB information.
2324 */
2325 if (png_compare_ICC_profile_with_sRGB(png_ptr, profile, adler))
2326 (void)png_colorspace_set_sRGB(png_ptr, colorspace,
2327 (int)/*already checked*/png_get_uint_32(profile+64));
2328}
2329#endif /* PNG_READ_sRGB_SUPPORTED */
2330
2331int /* PRIVATE */
2332png_colorspace_set_ICC(png_const_structrp png_ptr, png_colorspacerp colorspace,
2333 png_const_charp name, png_uint_32 profile_length, png_const_bytep profile,
2334 int color_type)
2335{
2336 if (colorspace->flags & PNG_COLORSPACE_INVALID)
2337 return 0;
2338
2339 if (png_icc_check_length(png_ptr, colorspace, name, profile_length) &&
2340 png_icc_check_header(png_ptr, colorspace, name, profile_length, profile,
2341 color_type) &&
2342 png_icc_check_tag_table(png_ptr, colorspace, name, profile_length,
2343 profile))
2344 {
2345# ifdef PNG_sRGB_SUPPORTED
2346 /* If no sRGB support, don't try storing sRGB information */
2347 png_icc_set_sRGB(png_ptr, colorspace, profile, 0);
2348# endif
2349 return 1;
2350 }
2351
2352 /* Failure case */
2353 return 0;
2354}
2355#endif /* iCCP */
2356
2357#ifdef PNG_READ_RGB_TO_GRAY_SUPPORTED
2358void /* PRIVATE */
2359png_colorspace_set_rgb_coefficients(png_structrp png_ptr)
2360{
2361 /* Set the rgb_to_gray coefficients from the colorspace. */
2362 if (!png_ptr->rgb_to_gray_coefficients_set &&
2363 (png_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_ENDPOINTS) != 0)
2364 {
2365 /* png_set_background has not been called, get the coefficients from the Y
2366 * values of the colorspace colorants.
2367 */
2368 png_fixed_point r = png_ptr->colorspace.end_points_XYZ.red_Y;
2369 png_fixed_point g = png_ptr->colorspace.end_points_XYZ.green_Y;
2370 png_fixed_point b = png_ptr->colorspace.end_points_XYZ.blue_Y;
2371 png_fixed_point total = r+g+b;
2372
2373 if (total > 0 &&
2374 r >= 0 && png_muldiv(&r, r, 32768, total) && r >= 0 && r <= 32768 &&
2375 g >= 0 && png_muldiv(&g, g, 32768, total) && g >= 0 && g <= 32768 &&
2376 b >= 0 && png_muldiv(&b, b, 32768, total) && b >= 0 && b <= 32768 &&
2377 r+g+b <= 32769)
2378 {
2379 /* We allow 0 coefficients here. r+g+b may be 32769 if two or
2380 * all of the coefficients were rounded up. Handle this by
2381 * reducing the *largest* coefficient by 1; this matches the
2382 * approach used for the default coefficients in pngrtran.c
2383 */
2384 int add = 0;
2385
2386 if (r+g+b > 32768)
2387 add = -1;
2388 else if (r+g+b < 32768)
2389 add = 1;
2390
2391 if (add != 0)
2392 {
2393 if (g >= r && g >= b)
2394 g += add;
2395 else if (r >= g && r >= b)
2396 r += add;
2397 else
2398 b += add;
2399 }
2400
2401 /* Check for an internal error. */
2402 if (r+g+b != 32768)
2403 png_error(png_ptr,
2404 "internal error handling cHRM coefficients");
2405
2406 else
2407 {
2408 png_ptr->rgb_to_gray_red_coeff = (png_uint_16)r;
2409 png_ptr->rgb_to_gray_green_coeff = (png_uint_16)g;
2410 }
2411 }
2412
2413 /* This is a png_error at present even though it could be ignored -
2414 * it should never happen, but it is important that if it does, the
2415 * bug is fixed.
2416 */
2417 else
2418 png_error(png_ptr, "internal error handling cHRM->XYZ");
2419 }
2420}
2421#endif
2422
2423#endif /* COLORSPACE */
Patrick Scott5f6bd842010-06-28 16:55:16 -04002424
Narayan Kamathf4435df2015-02-25 14:33:29 +00002425#ifdef __GNUC__
2426/* This exists solely to work round a warning from GNU C. */
2427static int /* PRIVATE */
2428png_gt(size_t a, size_t b)
2429{
2430 return a > b;
2431}
2432#else
2433# define png_gt(a,b) ((a) > (b))
2434#endif
2435
Patrick Scott5f6bd842010-06-28 16:55:16 -04002436void /* PRIVATE */
Chris Craikb50c2172013-07-29 15:28:30 -07002437png_check_IHDR(png_const_structrp png_ptr,
Patrick Scott5f6bd842010-06-28 16:55:16 -04002438 png_uint_32 width, png_uint_32 height, int bit_depth,
2439 int color_type, int interlace_type, int compression_type,
2440 int filter_type)
2441{
2442 int error = 0;
2443
2444 /* Check for width and height valid values */
2445 if (width == 0)
2446 {
2447 png_warning(png_ptr, "Image width is zero in IHDR");
2448 error = 1;
2449 }
Narayan Kamathf4435df2015-02-25 14:33:29 +00002450 else if (width > PNG_UINT_31_MAX)
2451 {
2452 png_warning(png_ptr, "Invalid image width in IHDR");
2453 error = 1;
2454 }
2455
2456 else if (png_gt(width,
2457 (PNG_SIZE_MAX >> 3) /* 8-byte RGBA pixels */
2458 - 48 /* big_row_buf hack */
2459 - 1 /* filter byte */
2460 - 7*8 /* rounding width to multiple of 8 pix */
2461 - 8)) /* extra max_pixel_depth pad */
2462 {
2463 /* The size of the row must be within the limits of this architecture.
2464 * Because the read code can perform arbitrary transformations the
2465 * maximum size is checked here. Because the code in png_read_start_row
2466 * adds extra space "for safety's sake" in several places a conservative
2467 * limit is used here.
2468 *
2469 * NOTE: it would be far better to check the size that is actually used,
2470 * but the effect in the real world is minor and the changes are more
2471 * extensive, therefore much more dangerous and much more difficult to
2472 * write in a way that avoids compiler warnings.
2473 */
2474 png_warning(png_ptr, "Image width is too large for this architecture");
2475 error = 1;
2476 }
2477
2478# ifdef PNG_SET_USER_LIMITS_SUPPORTED
2479 else if (width > png_ptr->user_width_max)
2480# else
2481 else if (width > PNG_USER_WIDTH_MAX)
2482# endif
2483 {
2484 png_warning(png_ptr, "Image width exceeds user limit in IHDR");
2485 error = 1;
2486 }
Patrick Scott5f6bd842010-06-28 16:55:16 -04002487
2488 if (height == 0)
2489 {
2490 png_warning(png_ptr, "Image height is zero in IHDR");
2491 error = 1;
2492 }
2493
Patrick Scott5f6bd842010-06-28 16:55:16 -04002494
Chris Craikb50c2172013-07-29 15:28:30 -07002495# ifdef PNG_SET_USER_LIMITS_SUPPORTED
2496 if (height > png_ptr->user_height_max)
2497# else
Patrick Scott5f6bd842010-06-28 16:55:16 -04002498 if (height > PNG_USER_HEIGHT_MAX)
Chris Craikb50c2172013-07-29 15:28:30 -07002499# endif
Patrick Scott5f6bd842010-06-28 16:55:16 -04002500 {
2501 png_warning(png_ptr, "Image height exceeds user limit in IHDR");
2502 error = 1;
2503 }
2504
Patrick Scott5f6bd842010-06-28 16:55:16 -04002505
Chris Craikb50c2172013-07-29 15:28:30 -07002506 if (height > PNG_UINT_31_MAX)
Patrick Scott5f6bd842010-06-28 16:55:16 -04002507 {
2508 png_warning(png_ptr, "Invalid image height in IHDR");
2509 error = 1;
2510 }
2511
Patrick Scott5f6bd842010-06-28 16:55:16 -04002512 /* Check other values */
2513 if (bit_depth != 1 && bit_depth != 2 && bit_depth != 4 &&
2514 bit_depth != 8 && bit_depth != 16)
2515 {
2516 png_warning(png_ptr, "Invalid bit depth in IHDR");
2517 error = 1;
2518 }
2519
2520 if (color_type < 0 || color_type == 1 ||
2521 color_type == 5 || color_type > 6)
2522 {
2523 png_warning(png_ptr, "Invalid color type in IHDR");
2524 error = 1;
2525 }
2526
2527 if (((color_type == PNG_COLOR_TYPE_PALETTE) && bit_depth > 8) ||
2528 ((color_type == PNG_COLOR_TYPE_RGB ||
2529 color_type == PNG_COLOR_TYPE_GRAY_ALPHA ||
2530 color_type == PNG_COLOR_TYPE_RGB_ALPHA) && bit_depth < 8))
2531 {
2532 png_warning(png_ptr, "Invalid color type/bit depth combination in IHDR");
2533 error = 1;
2534 }
2535
2536 if (interlace_type >= PNG_INTERLACE_LAST)
2537 {
2538 png_warning(png_ptr, "Unknown interlace method in IHDR");
2539 error = 1;
2540 }
2541
2542 if (compression_type != PNG_COMPRESSION_TYPE_BASE)
2543 {
2544 png_warning(png_ptr, "Unknown compression method in IHDR");
2545 error = 1;
2546 }
2547
Chris Craikb50c2172013-07-29 15:28:30 -07002548# ifdef PNG_MNG_FEATURES_SUPPORTED
Patrick Scott5f6bd842010-06-28 16:55:16 -04002549 /* Accept filter_method 64 (intrapixel differencing) only if
2550 * 1. Libpng was compiled with PNG_MNG_FEATURES_SUPPORTED and
2551 * 2. Libpng did not read a PNG signature (this filter_method is only
2552 * used in PNG datastreams that are embedded in MNG datastreams) and
2553 * 3. The application called png_permit_mng_features with a mask that
2554 * included PNG_FLAG_MNG_FILTER_64 and
2555 * 4. The filter_method is 64 and
2556 * 5. The color_type is RGB or RGBA
2557 */
2558 if ((png_ptr->mode & PNG_HAVE_PNG_SIGNATURE) &&
2559 png_ptr->mng_features_permitted)
2560 png_warning(png_ptr, "MNG features are not allowed in a PNG datastream");
2561
2562 if (filter_type != PNG_FILTER_TYPE_BASE)
2563 {
2564 if (!((png_ptr->mng_features_permitted & PNG_FLAG_MNG_FILTER_64) &&
Chris Craikb50c2172013-07-29 15:28:30 -07002565 (filter_type == PNG_INTRAPIXEL_DIFFERENCING) &&
2566 ((png_ptr->mode & PNG_HAVE_PNG_SIGNATURE) == 0) &&
2567 (color_type == PNG_COLOR_TYPE_RGB ||
2568 color_type == PNG_COLOR_TYPE_RGB_ALPHA)))
Patrick Scott5f6bd842010-06-28 16:55:16 -04002569 {
2570 png_warning(png_ptr, "Unknown filter method in IHDR");
2571 error = 1;
2572 }
2573
2574 if (png_ptr->mode & PNG_HAVE_PNG_SIGNATURE)
2575 {
2576 png_warning(png_ptr, "Invalid filter method in IHDR");
2577 error = 1;
2578 }
2579 }
2580
Chris Craikb50c2172013-07-29 15:28:30 -07002581# else
Patrick Scott5f6bd842010-06-28 16:55:16 -04002582 if (filter_type != PNG_FILTER_TYPE_BASE)
2583 {
2584 png_warning(png_ptr, "Unknown filter method in IHDR");
2585 error = 1;
2586 }
Chris Craikb50c2172013-07-29 15:28:30 -07002587# endif
Patrick Scott5f6bd842010-06-28 16:55:16 -04002588
2589 if (error == 1)
2590 png_error(png_ptr, "Invalid IHDR data");
2591}
Chris Craikb50c2172013-07-29 15:28:30 -07002592
2593#if defined(PNG_sCAL_SUPPORTED) || defined(PNG_pCAL_SUPPORTED)
2594/* ASCII to fp functions */
2595/* Check an ASCII formated floating point value, see the more detailed
2596 * comments in pngpriv.h
2597 */
2598/* The following is used internally to preserve the sticky flags */
2599#define png_fp_add(state, flags) ((state) |= (flags))
2600#define png_fp_set(state, value) ((state) = (value) | ((state) & PNG_FP_STICKY))
2601
2602int /* PRIVATE */
2603png_check_fp_number(png_const_charp string, png_size_t size, int *statep,
2604 png_size_tp whereami)
2605{
2606 int state = *statep;
2607 png_size_t i = *whereami;
2608
2609 while (i < size)
2610 {
2611 int type;
2612 /* First find the type of the next character */
2613 switch (string[i])
2614 {
2615 case 43: type = PNG_FP_SAW_SIGN; break;
2616 case 45: type = PNG_FP_SAW_SIGN + PNG_FP_NEGATIVE; break;
2617 case 46: type = PNG_FP_SAW_DOT; break;
2618 case 48: type = PNG_FP_SAW_DIGIT; break;
2619 case 49: case 50: case 51: case 52:
2620 case 53: case 54: case 55: case 56:
2621 case 57: type = PNG_FP_SAW_DIGIT + PNG_FP_NONZERO; break;
2622 case 69:
2623 case 101: type = PNG_FP_SAW_E; break;
2624 default: goto PNG_FP_End;
2625 }
2626
2627 /* Now deal with this type according to the current
2628 * state, the type is arranged to not overlap the
2629 * bits of the PNG_FP_STATE.
2630 */
2631 switch ((state & PNG_FP_STATE) + (type & PNG_FP_SAW_ANY))
2632 {
2633 case PNG_FP_INTEGER + PNG_FP_SAW_SIGN:
2634 if (state & PNG_FP_SAW_ANY)
2635 goto PNG_FP_End; /* not a part of the number */
2636
2637 png_fp_add(state, type);
2638 break;
2639
2640 case PNG_FP_INTEGER + PNG_FP_SAW_DOT:
2641 /* Ok as trailer, ok as lead of fraction. */
2642 if (state & PNG_FP_SAW_DOT) /* two dots */
2643 goto PNG_FP_End;
2644
2645 else if (state & PNG_FP_SAW_DIGIT) /* trailing dot? */
2646 png_fp_add(state, type);
2647
2648 else
2649 png_fp_set(state, PNG_FP_FRACTION | type);
2650
2651 break;
2652
2653 case PNG_FP_INTEGER + PNG_FP_SAW_DIGIT:
2654 if (state & PNG_FP_SAW_DOT) /* delayed fraction */
2655 png_fp_set(state, PNG_FP_FRACTION | PNG_FP_SAW_DOT);
2656
2657 png_fp_add(state, type | PNG_FP_WAS_VALID);
2658
2659 break;
2660
2661 case PNG_FP_INTEGER + PNG_FP_SAW_E:
2662 if ((state & PNG_FP_SAW_DIGIT) == 0)
2663 goto PNG_FP_End;
2664
2665 png_fp_set(state, PNG_FP_EXPONENT);
2666
2667 break;
2668
2669 /* case PNG_FP_FRACTION + PNG_FP_SAW_SIGN:
2670 goto PNG_FP_End; ** no sign in fraction */
2671
2672 /* case PNG_FP_FRACTION + PNG_FP_SAW_DOT:
2673 goto PNG_FP_End; ** Because SAW_DOT is always set */
2674
2675 case PNG_FP_FRACTION + PNG_FP_SAW_DIGIT:
2676 png_fp_add(state, type | PNG_FP_WAS_VALID);
2677 break;
2678
2679 case PNG_FP_FRACTION + PNG_FP_SAW_E:
2680 /* This is correct because the trailing '.' on an
2681 * integer is handled above - so we can only get here
2682 * with the sequence ".E" (with no preceding digits).
2683 */
2684 if ((state & PNG_FP_SAW_DIGIT) == 0)
2685 goto PNG_FP_End;
2686
2687 png_fp_set(state, PNG_FP_EXPONENT);
2688
2689 break;
2690
2691 case PNG_FP_EXPONENT + PNG_FP_SAW_SIGN:
2692 if (state & PNG_FP_SAW_ANY)
2693 goto PNG_FP_End; /* not a part of the number */
2694
2695 png_fp_add(state, PNG_FP_SAW_SIGN);
2696
2697 break;
2698
2699 /* case PNG_FP_EXPONENT + PNG_FP_SAW_DOT:
2700 goto PNG_FP_End; */
2701
2702 case PNG_FP_EXPONENT + PNG_FP_SAW_DIGIT:
2703 png_fp_add(state, PNG_FP_SAW_DIGIT | PNG_FP_WAS_VALID);
2704
2705 break;
2706
2707 /* case PNG_FP_EXPONEXT + PNG_FP_SAW_E:
2708 goto PNG_FP_End; */
2709
2710 default: goto PNG_FP_End; /* I.e. break 2 */
2711 }
2712
2713 /* The character seems ok, continue. */
2714 ++i;
2715 }
2716
2717PNG_FP_End:
2718 /* Here at the end, update the state and return the correct
2719 * return code.
2720 */
2721 *statep = state;
2722 *whereami = i;
2723
2724 return (state & PNG_FP_SAW_DIGIT) != 0;
2725}
2726
2727
2728/* The same but for a complete string. */
2729int
2730png_check_fp_string(png_const_charp string, png_size_t size)
2731{
2732 int state=0;
2733 png_size_t char_index=0;
2734
2735 if (png_check_fp_number(string, size, &state, &char_index) &&
2736 (char_index == size || string[char_index] == 0))
2737 return state /* must be non-zero - see above */;
2738
2739 return 0; /* i.e. fail */
2740}
2741#endif /* pCAL or sCAL */
2742
2743#ifdef PNG_sCAL_SUPPORTED
2744# ifdef PNG_FLOATING_POINT_SUPPORTED
2745/* Utility used below - a simple accurate power of ten from an integral
2746 * exponent.
2747 */
2748static double
2749png_pow10(int power)
2750{
2751 int recip = 0;
2752 double d = 1;
2753
2754 /* Handle negative exponent with a reciprocal at the end because
2755 * 10 is exact whereas .1 is inexact in base 2
2756 */
2757 if (power < 0)
2758 {
2759 if (power < DBL_MIN_10_EXP) return 0;
2760 recip = 1, power = -power;
2761 }
2762
2763 if (power > 0)
2764 {
2765 /* Decompose power bitwise. */
2766 double mult = 10;
2767 do
2768 {
2769 if (power & 1) d *= mult;
2770 mult *= mult;
2771 power >>= 1;
2772 }
2773 while (power > 0);
2774
2775 if (recip) d = 1/d;
2776 }
2777 /* else power is 0 and d is 1 */
2778
2779 return d;
2780}
2781
2782/* Function to format a floating point value in ASCII with a given
2783 * precision.
2784 */
2785void /* PRIVATE */
2786png_ascii_from_fp(png_const_structrp png_ptr, png_charp ascii, png_size_t size,
2787 double fp, unsigned int precision)
2788{
2789 /* We use standard functions from math.h, but not printf because
2790 * that would require stdio. The caller must supply a buffer of
2791 * sufficient size or we will png_error. The tests on size and
2792 * the space in ascii[] consumed are indicated below.
2793 */
2794 if (precision < 1)
2795 precision = DBL_DIG;
2796
2797 /* Enforce the limit of the implementation precision too. */
2798 if (precision > DBL_DIG+1)
2799 precision = DBL_DIG+1;
2800
2801 /* Basic sanity checks */
2802 if (size >= precision+5) /* See the requirements below. */
2803 {
2804 if (fp < 0)
2805 {
2806 fp = -fp;
2807 *ascii++ = 45; /* '-' PLUS 1 TOTAL 1 */
2808 --size;
2809 }
2810
2811 if (fp >= DBL_MIN && fp <= DBL_MAX)
2812 {
2813 int exp_b10; /* A base 10 exponent */
2814 double base; /* 10^exp_b10 */
2815
2816 /* First extract a base 10 exponent of the number,
2817 * the calculation below rounds down when converting
2818 * from base 2 to base 10 (multiply by log10(2) -
2819 * 0.3010, but 77/256 is 0.3008, so exp_b10 needs to
2820 * be increased. Note that the arithmetic shift
2821 * performs a floor() unlike C arithmetic - using a
2822 * C multiply would break the following for negative
2823 * exponents.
2824 */
2825 (void)frexp(fp, &exp_b10); /* exponent to base 2 */
2826
2827 exp_b10 = (exp_b10 * 77) >> 8; /* <= exponent to base 10 */
2828
2829 /* Avoid underflow here. */
2830 base = png_pow10(exp_b10); /* May underflow */
2831
2832 while (base < DBL_MIN || base < fp)
2833 {
2834 /* And this may overflow. */
2835 double test = png_pow10(exp_b10+1);
2836
2837 if (test <= DBL_MAX)
2838 ++exp_b10, base = test;
2839
2840 else
2841 break;
2842 }
2843
2844 /* Normalize fp and correct exp_b10, after this fp is in the
2845 * range [.1,1) and exp_b10 is both the exponent and the digit
2846 * *before* which the decimal point should be inserted
2847 * (starting with 0 for the first digit). Note that this
2848 * works even if 10^exp_b10 is out of range because of the
2849 * test on DBL_MAX above.
2850 */
2851 fp /= base;
2852 while (fp >= 1) fp /= 10, ++exp_b10;
2853
2854 /* Because of the code above fp may, at this point, be
2855 * less than .1, this is ok because the code below can
2856 * handle the leading zeros this generates, so no attempt
2857 * is made to correct that here.
2858 */
2859
2860 {
2861 int czero, clead, cdigits;
2862 char exponent[10];
2863
2864 /* Allow up to two leading zeros - this will not lengthen
2865 * the number compared to using E-n.
2866 */
2867 if (exp_b10 < 0 && exp_b10 > -3) /* PLUS 3 TOTAL 4 */
2868 {
2869 czero = -exp_b10; /* PLUS 2 digits: TOTAL 3 */
2870 exp_b10 = 0; /* Dot added below before first output. */
2871 }
2872 else
2873 czero = 0; /* No zeros to add */
2874
2875 /* Generate the digit list, stripping trailing zeros and
2876 * inserting a '.' before a digit if the exponent is 0.
2877 */
2878 clead = czero; /* Count of leading zeros */
2879 cdigits = 0; /* Count of digits in list. */
2880
2881 do
2882 {
2883 double d;
2884
2885 fp *= 10;
2886 /* Use modf here, not floor and subtract, so that
2887 * the separation is done in one step. At the end
2888 * of the loop don't break the number into parts so
2889 * that the final digit is rounded.
2890 */
2891 if (cdigits+czero-clead+1 < (int)precision)
2892 fp = modf(fp, &d);
2893
2894 else
2895 {
2896 d = floor(fp + .5);
2897
2898 if (d > 9)
2899 {
2900 /* Rounding up to 10, handle that here. */
2901 if (czero > 0)
2902 {
2903 --czero, d = 1;
2904 if (cdigits == 0) --clead;
2905 }
2906 else
2907 {
2908 while (cdigits > 0 && d > 9)
2909 {
2910 int ch = *--ascii;
2911
2912 if (exp_b10 != (-1))
2913 ++exp_b10;
2914
2915 else if (ch == 46)
2916 {
2917 ch = *--ascii, ++size;
2918 /* Advance exp_b10 to '1', so that the
2919 * decimal point happens after the
2920 * previous digit.
2921 */
2922 exp_b10 = 1;
2923 }
2924
2925 --cdigits;
2926 d = ch - 47; /* I.e. 1+(ch-48) */
2927 }
2928
2929 /* Did we reach the beginning? If so adjust the
2930 * exponent but take into account the leading
2931 * decimal point.
2932 */
2933 if (d > 9) /* cdigits == 0 */
2934 {
2935 if (exp_b10 == (-1))
2936 {
2937 /* Leading decimal point (plus zeros?), if
2938 * we lose the decimal point here it must
2939 * be reentered below.
2940 */
2941 int ch = *--ascii;
2942
2943 if (ch == 46)
2944 ++size, exp_b10 = 1;
2945
2946 /* Else lost a leading zero, so 'exp_b10' is
2947 * still ok at (-1)
2948 */
2949 }
2950 else
2951 ++exp_b10;
2952
2953 /* In all cases we output a '1' */
2954 d = 1;
2955 }
2956 }
2957 }
2958 fp = 0; /* Guarantees termination below. */
2959 }
2960
2961 if (d == 0)
2962 {
2963 ++czero;
2964 if (cdigits == 0) ++clead;
2965 }
2966 else
2967 {
2968 /* Included embedded zeros in the digit count. */
2969 cdigits += czero - clead;
2970 clead = 0;
2971
2972 while (czero > 0)
2973 {
2974 /* exp_b10 == (-1) means we just output the decimal
2975 * place - after the DP don't adjust 'exp_b10' any
2976 * more!
2977 */
2978 if (exp_b10 != (-1))
2979 {
2980 if (exp_b10 == 0) *ascii++ = 46, --size;
2981 /* PLUS 1: TOTAL 4 */
2982 --exp_b10;
2983 }
2984 *ascii++ = 48, --czero;
2985 }
2986
2987 if (exp_b10 != (-1))
2988 {
2989 if (exp_b10 == 0) *ascii++ = 46, --size; /* counted
2990 above */
2991 --exp_b10;
2992 }
2993 *ascii++ = (char)(48 + (int)d), ++cdigits;
2994 }
2995 }
2996 while (cdigits+czero-clead < (int)precision && fp > DBL_MIN);
2997
2998 /* The total output count (max) is now 4+precision */
2999
3000 /* Check for an exponent, if we don't need one we are
3001 * done and just need to terminate the string. At
3002 * this point exp_b10==(-1) is effectively if flag - it got
3003 * to '-1' because of the decrement after outputing
3004 * the decimal point above (the exponent required is
3005 * *not* -1!)
3006 */
3007 if (exp_b10 >= (-1) && exp_b10 <= 2)
3008 {
3009 /* The following only happens if we didn't output the
3010 * leading zeros above for negative exponent, so this
3011 * doest add to the digit requirement. Note that the
3012 * two zeros here can only be output if the two leading
3013 * zeros were *not* output, so this doesn't increase
3014 * the output count.
3015 */
3016 while (--exp_b10 >= 0) *ascii++ = 48;
3017
3018 *ascii = 0;
3019
3020 /* Total buffer requirement (including the '\0') is
3021 * 5+precision - see check at the start.
3022 */
3023 return;
3024 }
3025
3026 /* Here if an exponent is required, adjust size for
3027 * the digits we output but did not count. The total
3028 * digit output here so far is at most 1+precision - no
3029 * decimal point and no leading or trailing zeros have
3030 * been output.
3031 */
3032 size -= cdigits;
3033
3034 *ascii++ = 69, --size; /* 'E': PLUS 1 TOTAL 2+precision */
3035
3036 /* The following use of an unsigned temporary avoids ambiguities in
3037 * the signed arithmetic on exp_b10 and permits GCC at least to do
3038 * better optimization.
3039 */
3040 {
3041 unsigned int uexp_b10;
3042
3043 if (exp_b10 < 0)
3044 {
3045 *ascii++ = 45, --size; /* '-': PLUS 1 TOTAL 3+precision */
3046 uexp_b10 = -exp_b10;
3047 }
3048
3049 else
3050 uexp_b10 = exp_b10;
3051
3052 cdigits = 0;
3053
3054 while (uexp_b10 > 0)
3055 {
3056 exponent[cdigits++] = (char)(48 + uexp_b10 % 10);
3057 uexp_b10 /= 10;
3058 }
3059 }
3060
3061 /* Need another size check here for the exponent digits, so
3062 * this need not be considered above.
3063 */
3064 if ((int)size > cdigits)
3065 {
3066 while (cdigits > 0) *ascii++ = exponent[--cdigits];
3067
3068 *ascii = 0;
3069
3070 return;
3071 }
3072 }
3073 }
3074 else if (!(fp >= DBL_MIN))
3075 {
3076 *ascii++ = 48; /* '0' */
3077 *ascii = 0;
3078 return;
3079 }
3080 else
3081 {
3082 *ascii++ = 105; /* 'i' */
3083 *ascii++ = 110; /* 'n' */
3084 *ascii++ = 102; /* 'f' */
3085 *ascii = 0;
3086 return;
3087 }
3088 }
3089
3090 /* Here on buffer too small. */
3091 png_error(png_ptr, "ASCII conversion buffer too small");
3092}
3093
3094# endif /* FLOATING_POINT */
3095
3096# ifdef PNG_FIXED_POINT_SUPPORTED
3097/* Function to format a fixed point value in ASCII.
3098 */
3099void /* PRIVATE */
3100png_ascii_from_fixed(png_const_structrp png_ptr, png_charp ascii,
3101 png_size_t size, png_fixed_point fp)
3102{
3103 /* Require space for 10 decimal digits, a decimal point, a minus sign and a
3104 * trailing \0, 13 characters:
3105 */
3106 if (size > 12)
3107 {
3108 png_uint_32 num;
3109
3110 /* Avoid overflow here on the minimum integer. */
3111 if (fp < 0)
3112 *ascii++ = 45, --size, num = -fp;
3113 else
3114 num = fp;
3115
3116 if (num <= 0x80000000) /* else overflowed */
3117 {
3118 unsigned int ndigits = 0, first = 16 /* flag value */;
3119 char digits[10];
3120
3121 while (num)
3122 {
3123 /* Split the low digit off num: */
3124 unsigned int tmp = num/10;
3125 num -= tmp*10;
3126 digits[ndigits++] = (char)(48 + num);
3127 /* Record the first non-zero digit, note that this is a number
3128 * starting at 1, it's not actually the array index.
3129 */
3130 if (first == 16 && num > 0)
3131 first = ndigits;
3132 num = tmp;
3133 }
3134
3135 if (ndigits > 0)
3136 {
3137 while (ndigits > 5) *ascii++ = digits[--ndigits];
3138 /* The remaining digits are fractional digits, ndigits is '5' or
3139 * smaller at this point. It is certainly not zero. Check for a
3140 * non-zero fractional digit:
3141 */
3142 if (first <= 5)
3143 {
3144 unsigned int i;
3145 *ascii++ = 46; /* decimal point */
3146 /* ndigits may be <5 for small numbers, output leading zeros
3147 * then ndigits digits to first:
3148 */
3149 i = 5;
3150 while (ndigits < i) *ascii++ = 48, --i;
3151 while (ndigits >= first) *ascii++ = digits[--ndigits];
3152 /* Don't output the trailing zeros! */
3153 }
3154 }
3155 else
3156 *ascii++ = 48;
3157
3158 /* And null terminate the string: */
3159 *ascii = 0;
3160 return;
3161 }
3162 }
3163
3164 /* Here on buffer too small. */
3165 png_error(png_ptr, "ASCII conversion buffer too small");
3166}
3167# endif /* FIXED_POINT */
3168#endif /* READ_SCAL */
3169
3170#if defined(PNG_FLOATING_POINT_SUPPORTED) && \
3171 !defined(PNG_FIXED_POINT_MACRO_SUPPORTED) && \
3172 (defined(PNG_gAMA_SUPPORTED) || defined(PNG_cHRM_SUPPORTED) || \
3173 defined(PNG_sCAL_SUPPORTED) || defined(PNG_READ_BACKGROUND_SUPPORTED) || \
3174 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)) || \
3175 (defined(PNG_sCAL_SUPPORTED) && \
3176 defined(PNG_FLOATING_ARITHMETIC_SUPPORTED))
3177png_fixed_point
3178png_fixed(png_const_structrp png_ptr, double fp, png_const_charp text)
3179{
3180 double r = floor(100000 * fp + .5);
3181
3182 if (r > 2147483647. || r < -2147483648.)
3183 png_fixed_error(png_ptr, text);
3184
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303185# ifndef PNG_ERROR_TEXT_SUPPORTED
3186 PNG_UNUSED(text)
3187# endif
3188
Chris Craikb50c2172013-07-29 15:28:30 -07003189 return (png_fixed_point)r;
3190}
3191#endif
3192
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303193#if defined(PNG_GAMMA_SUPPORTED) || defined(PNG_COLORSPACE_SUPPORTED) ||\
Chris Craikb50c2172013-07-29 15:28:30 -07003194 defined(PNG_INCH_CONVERSIONS_SUPPORTED) || defined(PNG_READ_pHYs_SUPPORTED)
3195/* muldiv functions */
3196/* This API takes signed arguments and rounds the result to the nearest
3197 * integer (or, for a fixed point number - the standard argument - to
3198 * the nearest .00001). Overflow and divide by zero are signalled in
3199 * the result, a boolean - true on success, false on overflow.
3200 */
3201int
3202png_muldiv(png_fixed_point_p res, png_fixed_point a, png_int_32 times,
3203 png_int_32 divisor)
3204{
3205 /* Return a * times / divisor, rounded. */
3206 if (divisor != 0)
3207 {
3208 if (a == 0 || times == 0)
3209 {
3210 *res = 0;
3211 return 1;
3212 }
3213 else
3214 {
3215#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3216 double r = a;
3217 r *= times;
3218 r /= divisor;
3219 r = floor(r+.5);
3220
3221 /* A png_fixed_point is a 32-bit integer. */
3222 if (r <= 2147483647. && r >= -2147483648.)
3223 {
3224 *res = (png_fixed_point)r;
3225 return 1;
3226 }
3227#else
3228 int negative = 0;
3229 png_uint_32 A, T, D;
3230 png_uint_32 s16, s32, s00;
3231
3232 if (a < 0)
3233 negative = 1, A = -a;
3234 else
3235 A = a;
3236
3237 if (times < 0)
3238 negative = !negative, T = -times;
3239 else
3240 T = times;
3241
3242 if (divisor < 0)
3243 negative = !negative, D = -divisor;
3244 else
3245 D = divisor;
3246
3247 /* Following can't overflow because the arguments only
3248 * have 31 bits each, however the result may be 32 bits.
3249 */
3250 s16 = (A >> 16) * (T & 0xffff) +
3251 (A & 0xffff) * (T >> 16);
3252 /* Can't overflow because the a*times bit is only 30
3253 * bits at most.
3254 */
3255 s32 = (A >> 16) * (T >> 16) + (s16 >> 16);
3256 s00 = (A & 0xffff) * (T & 0xffff);
3257
3258 s16 = (s16 & 0xffff) << 16;
3259 s00 += s16;
3260
3261 if (s00 < s16)
3262 ++s32; /* carry */
3263
3264 if (s32 < D) /* else overflow */
3265 {
3266 /* s32.s00 is now the 64-bit product, do a standard
3267 * division, we know that s32 < D, so the maximum
3268 * required shift is 31.
3269 */
3270 int bitshift = 32;
3271 png_fixed_point result = 0; /* NOTE: signed */
3272
3273 while (--bitshift >= 0)
3274 {
3275 png_uint_32 d32, d00;
3276
3277 if (bitshift > 0)
3278 d32 = D >> (32-bitshift), d00 = D << bitshift;
3279
3280 else
3281 d32 = 0, d00 = D;
3282
3283 if (s32 > d32)
3284 {
3285 if (s00 < d00) --s32; /* carry */
3286 s32 -= d32, s00 -= d00, result += 1<<bitshift;
3287 }
3288
3289 else
3290 if (s32 == d32 && s00 >= d00)
3291 s32 = 0, s00 -= d00, result += 1<<bitshift;
3292 }
3293
3294 /* Handle the rounding. */
3295 if (s00 >= (D >> 1))
3296 ++result;
3297
3298 if (negative)
3299 result = -result;
3300
3301 /* Check for overflow. */
3302 if ((negative && result <= 0) || (!negative && result >= 0))
3303 {
3304 *res = result;
3305 return 1;
3306 }
3307 }
3308#endif
3309 }
3310 }
3311
3312 return 0;
3313}
3314#endif /* READ_GAMMA || INCH_CONVERSIONS */
3315
3316#if defined(PNG_READ_GAMMA_SUPPORTED) || defined(PNG_INCH_CONVERSIONS_SUPPORTED)
3317/* The following is for when the caller doesn't much care about the
3318 * result.
3319 */
3320png_fixed_point
3321png_muldiv_warn(png_const_structrp png_ptr, png_fixed_point a, png_int_32 times,
3322 png_int_32 divisor)
3323{
3324 png_fixed_point result;
3325
3326 if (png_muldiv(&result, a, times, divisor))
3327 return result;
3328
3329 png_warning(png_ptr, "fixed point overflow ignored");
3330 return 0;
3331}
3332#endif
3333
3334#ifdef PNG_GAMMA_SUPPORTED /* more fixed point functions for gamma */
3335/* Calculate a reciprocal, return 0 on div-by-zero or overflow. */
3336png_fixed_point
3337png_reciprocal(png_fixed_point a)
3338{
3339#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3340 double r = floor(1E10/a+.5);
3341
3342 if (r <= 2147483647. && r >= -2147483648.)
3343 return (png_fixed_point)r;
3344#else
3345 png_fixed_point res;
3346
3347 if (png_muldiv(&res, 100000, 100000, a))
3348 return res;
3349#endif
3350
3351 return 0; /* error/overflow */
3352}
3353
3354/* This is the shared test on whether a gamma value is 'significant' - whether
3355 * it is worth doing gamma correction.
3356 */
3357int /* PRIVATE */
3358png_gamma_significant(png_fixed_point gamma_val)
3359{
3360 return gamma_val < PNG_FP_1 - PNG_GAMMA_THRESHOLD_FIXED ||
3361 gamma_val > PNG_FP_1 + PNG_GAMMA_THRESHOLD_FIXED;
3362}
3363#endif
3364
3365#ifdef PNG_READ_GAMMA_SUPPORTED
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303366# ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07003367/* A local convenience routine. */
3368static png_fixed_point
3369png_product2(png_fixed_point a, png_fixed_point b)
3370{
3371 /* The required result is 1/a * 1/b; the following preserves accuracy. */
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303372# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07003373 double r = a * 1E-5;
3374 r *= b;
3375 r = floor(r+.5);
3376
3377 if (r <= 2147483647. && r >= -2147483648.)
3378 return (png_fixed_point)r;
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303379# else
Chris Craikb50c2172013-07-29 15:28:30 -07003380 png_fixed_point res;
3381
3382 if (png_muldiv(&res, a, b, 100000))
3383 return res;
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303384# endif
Chris Craikb50c2172013-07-29 15:28:30 -07003385
3386 return 0; /* overflow */
3387}
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303388# endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07003389
3390/* The inverse of the above. */
3391png_fixed_point
3392png_reciprocal2(png_fixed_point a, png_fixed_point b)
3393{
3394 /* The required result is 1/a * 1/b; the following preserves accuracy. */
3395#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3396 double r = 1E15/a;
3397 r /= b;
3398 r = floor(r+.5);
3399
3400 if (r <= 2147483647. && r >= -2147483648.)
3401 return (png_fixed_point)r;
3402#else
3403 /* This may overflow because the range of png_fixed_point isn't symmetric,
3404 * but this API is only used for the product of file and screen gamma so it
3405 * doesn't matter that the smallest number it can produce is 1/21474, not
3406 * 1/100000
3407 */
3408 png_fixed_point res = png_product2(a, b);
3409
3410 if (res != 0)
3411 return png_reciprocal(res);
3412#endif
3413
3414 return 0; /* overflow */
3415}
3416#endif /* READ_GAMMA */
3417
3418#ifdef PNG_READ_GAMMA_SUPPORTED /* gamma table code */
3419#ifndef PNG_FLOATING_ARITHMETIC_SUPPORTED
3420/* Fixed point gamma.
3421 *
3422 * The code to calculate the tables used below can be found in the shell script
3423 * contrib/tools/intgamma.sh
3424 *
3425 * To calculate gamma this code implements fast log() and exp() calls using only
3426 * fixed point arithmetic. This code has sufficient precision for either 8-bit
3427 * or 16-bit sample values.
3428 *
3429 * The tables used here were calculated using simple 'bc' programs, but C double
3430 * precision floating point arithmetic would work fine.
3431 *
3432 * 8-bit log table
3433 * This is a table of -log(value/255)/log(2) for 'value' in the range 128 to
3434 * 255, so it's the base 2 logarithm of a normalized 8-bit floating point
3435 * mantissa. The numbers are 32-bit fractions.
3436 */
3437static const png_uint_32
3438png_8bit_l2[128] =
3439{
3440 4270715492U, 4222494797U, 4174646467U, 4127164793U, 4080044201U, 4033279239U,
3441 3986864580U, 3940795015U, 3895065449U, 3849670902U, 3804606499U, 3759867474U,
3442 3715449162U, 3671346997U, 3627556511U, 3584073329U, 3540893168U, 3498011834U,
3443 3455425220U, 3413129301U, 3371120137U, 3329393864U, 3287946700U, 3246774933U,
3444 3205874930U, 3165243125U, 3124876025U, 3084770202U, 3044922296U, 3005329011U,
3445 2965987113U, 2926893432U, 2888044853U, 2849438323U, 2811070844U, 2772939474U,
3446 2735041326U, 2697373562U, 2659933400U, 2622718104U, 2585724991U, 2548951424U,
3447 2512394810U, 2476052606U, 2439922311U, 2404001468U, 2368287663U, 2332778523U,
3448 2297471715U, 2262364947U, 2227455964U, 2192742551U, 2158222529U, 2123893754U,
3449 2089754119U, 2055801552U, 2022034013U, 1988449497U, 1955046031U, 1921821672U,
3450 1888774511U, 1855902668U, 1823204291U, 1790677560U, 1758320682U, 1726131893U,
3451 1694109454U, 1662251657U, 1630556815U, 1599023271U, 1567649391U, 1536433567U,
3452 1505374214U, 1474469770U, 1443718700U, 1413119487U, 1382670639U, 1352370686U,
3453 1322218179U, 1292211689U, 1262349810U, 1232631153U, 1203054352U, 1173618059U,
3454 1144320946U, 1115161701U, 1086139034U, 1057251672U, 1028498358U, 999877854U,
3455 971388940U, 943030410U, 914801076U, 886699767U, 858725327U, 830876614U,
3456 803152505U, 775551890U, 748073672U, 720716771U, 693480120U, 666362667U,
3457 639363374U, 612481215U, 585715177U, 559064263U, 532527486U, 506103872U,
3458 479792461U, 453592303U, 427502463U, 401522014U, 375650043U, 349885648U,
3459 324227938U, 298676034U, 273229066U, 247886176U, 222646516U, 197509248U,
3460 172473545U, 147538590U, 122703574U, 97967701U, 73330182U, 48790236U,
3461 24347096U, 0U
3462
3463#if 0
3464 /* The following are the values for 16-bit tables - these work fine for the
3465 * 8-bit conversions but produce very slightly larger errors in the 16-bit
3466 * log (about 1.2 as opposed to 0.7 absolute error in the final value). To
3467 * use these all the shifts below must be adjusted appropriately.
3468 */
3469 65166, 64430, 63700, 62976, 62257, 61543, 60835, 60132, 59434, 58741, 58054,
3470 57371, 56693, 56020, 55352, 54689, 54030, 53375, 52726, 52080, 51439, 50803,
3471 50170, 49542, 48918, 48298, 47682, 47070, 46462, 45858, 45257, 44661, 44068,
3472 43479, 42894, 42312, 41733, 41159, 40587, 40020, 39455, 38894, 38336, 37782,
3473 37230, 36682, 36137, 35595, 35057, 34521, 33988, 33459, 32932, 32408, 31887,
3474 31369, 30854, 30341, 29832, 29325, 28820, 28319, 27820, 27324, 26830, 26339,
3475 25850, 25364, 24880, 24399, 23920, 23444, 22970, 22499, 22029, 21562, 21098,
3476 20636, 20175, 19718, 19262, 18808, 18357, 17908, 17461, 17016, 16573, 16132,
3477 15694, 15257, 14822, 14390, 13959, 13530, 13103, 12678, 12255, 11834, 11415,
3478 10997, 10582, 10168, 9756, 9346, 8937, 8531, 8126, 7723, 7321, 6921, 6523,
3479 6127, 5732, 5339, 4947, 4557, 4169, 3782, 3397, 3014, 2632, 2251, 1872, 1495,
3480 1119, 744, 372
3481#endif
3482};
3483
3484static png_int_32
3485png_log8bit(unsigned int x)
3486{
3487 unsigned int lg2 = 0;
3488 /* Each time 'x' is multiplied by 2, 1 must be subtracted off the final log,
3489 * because the log is actually negate that means adding 1. The final
3490 * returned value thus has the range 0 (for 255 input) to 7.994 (for 1
3491 * input), return -1 for the overflow (log 0) case, - so the result is
3492 * always at most 19 bits.
3493 */
3494 if ((x &= 0xff) == 0)
3495 return -1;
3496
3497 if ((x & 0xf0) == 0)
3498 lg2 = 4, x <<= 4;
3499
3500 if ((x & 0xc0) == 0)
3501 lg2 += 2, x <<= 2;
3502
3503 if ((x & 0x80) == 0)
3504 lg2 += 1, x <<= 1;
3505
3506 /* result is at most 19 bits, so this cast is safe: */
3507 return (png_int_32)((lg2 << 16) + ((png_8bit_l2[x-128]+32768)>>16));
3508}
3509
3510/* The above gives exact (to 16 binary places) log2 values for 8-bit images,
3511 * for 16-bit images we use the most significant 8 bits of the 16-bit value to
3512 * get an approximation then multiply the approximation by a correction factor
3513 * determined by the remaining up to 8 bits. This requires an additional step
3514 * in the 16-bit case.
3515 *
3516 * We want log2(value/65535), we have log2(v'/255), where:
3517 *
3518 * value = v' * 256 + v''
3519 * = v' * f
3520 *
3521 * So f is value/v', which is equal to (256+v''/v') since v' is in the range 128
3522 * to 255 and v'' is in the range 0 to 255 f will be in the range 256 to less
3523 * than 258. The final factor also needs to correct for the fact that our 8-bit
3524 * value is scaled by 255, whereas the 16-bit values must be scaled by 65535.
3525 *
3526 * This gives a final formula using a calculated value 'x' which is value/v' and
3527 * scaling by 65536 to match the above table:
3528 *
3529 * log2(x/257) * 65536
3530 *
3531 * Since these numbers are so close to '1' we can use simple linear
3532 * interpolation between the two end values 256/257 (result -368.61) and 258/257
3533 * (result 367.179). The values used below are scaled by a further 64 to give
3534 * 16-bit precision in the interpolation:
3535 *
3536 * Start (256): -23591
3537 * Zero (257): 0
3538 * End (258): 23499
3539 */
3540static png_int_32
3541png_log16bit(png_uint_32 x)
3542{
3543 unsigned int lg2 = 0;
3544
3545 /* As above, but now the input has 16 bits. */
3546 if ((x &= 0xffff) == 0)
3547 return -1;
3548
3549 if ((x & 0xff00) == 0)
3550 lg2 = 8, x <<= 8;
3551
3552 if ((x & 0xf000) == 0)
3553 lg2 += 4, x <<= 4;
3554
3555 if ((x & 0xc000) == 0)
3556 lg2 += 2, x <<= 2;
3557
3558 if ((x & 0x8000) == 0)
3559 lg2 += 1, x <<= 1;
3560
3561 /* Calculate the base logarithm from the top 8 bits as a 28-bit fractional
3562 * value.
3563 */
3564 lg2 <<= 28;
3565 lg2 += (png_8bit_l2[(x>>8)-128]+8) >> 4;
3566
3567 /* Now we need to interpolate the factor, this requires a division by the top
3568 * 8 bits. Do this with maximum precision.
3569 */
3570 x = ((x << 16) + (x >> 9)) / (x >> 8);
3571
3572 /* Since we divided by the top 8 bits of 'x' there will be a '1' at 1<<24,
3573 * the value at 1<<16 (ignoring this) will be 0 or 1; this gives us exactly
3574 * 16 bits to interpolate to get the low bits of the result. Round the
3575 * answer. Note that the end point values are scaled by 64 to retain overall
3576 * precision and that 'lg2' is current scaled by an extra 12 bits, so adjust
3577 * the overall scaling by 6-12. Round at every step.
3578 */
3579 x -= 1U << 24;
3580
3581 if (x <= 65536U) /* <= '257' */
3582 lg2 += ((23591U * (65536U-x)) + (1U << (16+6-12-1))) >> (16+6-12);
3583
3584 else
3585 lg2 -= ((23499U * (x-65536U)) + (1U << (16+6-12-1))) >> (16+6-12);
3586
3587 /* Safe, because the result can't have more than 20 bits: */
3588 return (png_int_32)((lg2 + 2048) >> 12);
3589}
3590
3591/* The 'exp()' case must invert the above, taking a 20-bit fixed point
3592 * logarithmic value and returning a 16 or 8-bit number as appropriate. In
3593 * each case only the low 16 bits are relevant - the fraction - since the
3594 * integer bits (the top 4) simply determine a shift.
3595 *
3596 * The worst case is the 16-bit distinction between 65535 and 65534, this
3597 * requires perhaps spurious accuracty in the decoding of the logarithm to
3598 * distinguish log2(65535/65534.5) - 10^-5 or 17 bits. There is little chance
3599 * of getting this accuracy in practice.
3600 *
3601 * To deal with this the following exp() function works out the exponent of the
3602 * frational part of the logarithm by using an accurate 32-bit value from the
3603 * top four fractional bits then multiplying in the remaining bits.
3604 */
3605static const png_uint_32
3606png_32bit_exp[16] =
3607{
3608 /* NOTE: the first entry is deliberately set to the maximum 32-bit value. */
3609 4294967295U, 4112874773U, 3938502376U, 3771522796U, 3611622603U, 3458501653U,
3610 3311872529U, 3171459999U, 3037000500U, 2908241642U, 2784941738U, 2666869345U,
3611 2553802834U, 2445529972U, 2341847524U, 2242560872U
3612};
3613
3614/* Adjustment table; provided to explain the numbers in the code below. */
3615#if 0
3616for (i=11;i>=0;--i){ print i, " ", (1 - e(-(2^i)/65536*l(2))) * 2^(32-i), "\n"}
3617 11 44937.64284865548751208448
3618 10 45180.98734845585101160448
3619 9 45303.31936980687359311872
3620 8 45364.65110595323018870784
3621 7 45395.35850361789624614912
3622 6 45410.72259715102037508096
3623 5 45418.40724413220722311168
3624 4 45422.25021786898173001728
3625 3 45424.17186732298419044352
3626 2 45425.13273269940811464704
3627 1 45425.61317555035558641664
3628 0 45425.85339951654943850496
3629#endif
3630
3631static png_uint_32
3632png_exp(png_fixed_point x)
3633{
3634 if (x > 0 && x <= 0xfffff) /* Else overflow or zero (underflow) */
3635 {
3636 /* Obtain a 4-bit approximation */
3637 png_uint_32 e = png_32bit_exp[(x >> 12) & 0xf];
3638
3639 /* Incorporate the low 12 bits - these decrease the returned value by
3640 * multiplying by a number less than 1 if the bit is set. The multiplier
3641 * is determined by the above table and the shift. Notice that the values
3642 * converge on 45426 and this is used to allow linear interpolation of the
3643 * low bits.
3644 */
3645 if (x & 0x800)
3646 e -= (((e >> 16) * 44938U) + 16U) >> 5;
3647
3648 if (x & 0x400)
3649 e -= (((e >> 16) * 45181U) + 32U) >> 6;
3650
3651 if (x & 0x200)
3652 e -= (((e >> 16) * 45303U) + 64U) >> 7;
3653
3654 if (x & 0x100)
3655 e -= (((e >> 16) * 45365U) + 128U) >> 8;
3656
3657 if (x & 0x080)
3658 e -= (((e >> 16) * 45395U) + 256U) >> 9;
3659
3660 if (x & 0x040)
3661 e -= (((e >> 16) * 45410U) + 512U) >> 10;
3662
3663 /* And handle the low 6 bits in a single block. */
3664 e -= (((e >> 16) * 355U * (x & 0x3fU)) + 256U) >> 9;
3665
3666 /* Handle the upper bits of x. */
3667 e >>= x >> 16;
3668 return e;
3669 }
3670
3671 /* Check for overflow */
3672 if (x <= 0)
3673 return png_32bit_exp[0];
3674
3675 /* Else underflow */
3676 return 0;
3677}
3678
3679static png_byte
3680png_exp8bit(png_fixed_point lg2)
3681{
3682 /* Get a 32-bit value: */
3683 png_uint_32 x = png_exp(lg2);
3684
3685 /* Convert the 32-bit value to 0..255 by multiplying by 256-1, note that the
3686 * second, rounding, step can't overflow because of the first, subtraction,
3687 * step.
3688 */
3689 x -= x >> 8;
3690 return (png_byte)((x + 0x7fffffU) >> 24);
3691}
3692
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303693#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07003694static png_uint_16
3695png_exp16bit(png_fixed_point lg2)
3696{
3697 /* Get a 32-bit value: */
3698 png_uint_32 x = png_exp(lg2);
3699
3700 /* Convert the 32-bit value to 0..65535 by multiplying by 65536-1: */
3701 x -= x >> 16;
3702 return (png_uint_16)((x + 32767U) >> 16);
3703}
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303704#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07003705#endif /* FLOATING_ARITHMETIC */
3706
3707png_byte
3708png_gamma_8bit_correct(unsigned int value, png_fixed_point gamma_val)
3709{
3710 if (value > 0 && value < 255)
3711 {
3712# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3713 double r = floor(255*pow(value/255.,gamma_val*.00001)+.5);
3714 return (png_byte)r;
3715# else
3716 png_int_32 lg2 = png_log8bit(value);
3717 png_fixed_point res;
3718
3719 if (png_muldiv(&res, gamma_val, lg2, PNG_FP_1))
3720 return png_exp8bit(res);
3721
3722 /* Overflow. */
3723 value = 0;
3724# endif
3725 }
3726
3727 return (png_byte)value;
3728}
3729
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303730#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07003731png_uint_16
3732png_gamma_16bit_correct(unsigned int value, png_fixed_point gamma_val)
3733{
3734 if (value > 0 && value < 65535)
3735 {
3736# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3737 double r = floor(65535*pow(value/65535.,gamma_val*.00001)+.5);
3738 return (png_uint_16)r;
3739# else
3740 png_int_32 lg2 = png_log16bit(value);
3741 png_fixed_point res;
3742
3743 if (png_muldiv(&res, gamma_val, lg2, PNG_FP_1))
3744 return png_exp16bit(res);
3745
3746 /* Overflow. */
3747 value = 0;
3748# endif
3749 }
3750
3751 return (png_uint_16)value;
3752}
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303753#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07003754
3755/* This does the right thing based on the bit_depth field of the
3756 * png_struct, interpreting values as 8-bit or 16-bit. While the result
3757 * is nominally a 16-bit value if bit depth is 8 then the result is
3758 * 8-bit (as are the arguments.)
3759 */
3760png_uint_16 /* PRIVATE */
3761png_gamma_correct(png_structrp png_ptr, unsigned int value,
3762 png_fixed_point gamma_val)
3763{
3764 if (png_ptr->bit_depth == 8)
3765 return png_gamma_8bit_correct(value, gamma_val);
3766
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303767#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07003768 else
3769 return png_gamma_16bit_correct(value, gamma_val);
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303770#else
3771 /* should not reach this */
3772 return 0;
3773#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07003774}
3775
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303776#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07003777/* Internal function to build a single 16-bit table - the table consists of
3778 * 'num' 256 entry subtables, where 'num' is determined by 'shift' - the amount
3779 * to shift the input values right (or 16-number_of_signifiant_bits).
3780 *
3781 * The caller is responsible for ensuring that the table gets cleaned up on
3782 * png_error (i.e. if one of the mallocs below fails) - i.e. the *table argument
3783 * should be somewhere that will be cleaned.
3784 */
3785static void
3786png_build_16bit_table(png_structrp png_ptr, png_uint_16pp *ptable,
3787 PNG_CONST unsigned int shift, PNG_CONST png_fixed_point gamma_val)
3788{
3789 /* Various values derived from 'shift': */
3790 PNG_CONST unsigned int num = 1U << (8U - shift);
3791 PNG_CONST unsigned int max = (1U << (16U - shift))-1U;
3792 PNG_CONST unsigned int max_by_2 = 1U << (15U-shift);
3793 unsigned int i;
3794
3795 png_uint_16pp table = *ptable =
3796 (png_uint_16pp)png_calloc(png_ptr, num * (sizeof (png_uint_16p)));
3797
3798 for (i = 0; i < num; i++)
3799 {
3800 png_uint_16p sub_table = table[i] =
3801 (png_uint_16p)png_malloc(png_ptr, 256 * (sizeof (png_uint_16)));
3802
3803 /* The 'threshold' test is repeated here because it can arise for one of
3804 * the 16-bit tables even if the others don't hit it.
3805 */
3806 if (png_gamma_significant(gamma_val))
3807 {
3808 /* The old code would overflow at the end and this would cause the
3809 * 'pow' function to return a result >1, resulting in an
3810 * arithmetic error. This code follows the spec exactly; ig is
3811 * the recovered input sample, it always has 8-16 bits.
3812 *
3813 * We want input * 65535/max, rounded, the arithmetic fits in 32
3814 * bits (unsigned) so long as max <= 32767.
3815 */
3816 unsigned int j;
3817 for (j = 0; j < 256; j++)
3818 {
3819 png_uint_32 ig = (j << (8-shift)) + i;
3820# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3821 /* Inline the 'max' scaling operation: */
3822 double d = floor(65535*pow(ig/(double)max, gamma_val*.00001)+.5);
3823 sub_table[j] = (png_uint_16)d;
3824# else
3825 if (shift)
3826 ig = (ig * 65535U + max_by_2)/max;
3827
3828 sub_table[j] = png_gamma_16bit_correct(ig, gamma_val);
3829# endif
3830 }
3831 }
3832 else
3833 {
3834 /* We must still build a table, but do it the fast way. */
3835 unsigned int j;
3836
3837 for (j = 0; j < 256; j++)
3838 {
3839 png_uint_32 ig = (j << (8-shift)) + i;
3840
3841 if (shift)
3842 ig = (ig * 65535U + max_by_2)/max;
3843
3844 sub_table[j] = (png_uint_16)ig;
3845 }
3846 }
3847 }
3848}
3849
3850/* NOTE: this function expects the *inverse* of the overall gamma transformation
3851 * required.
3852 */
3853static void
3854png_build_16to8_table(png_structrp png_ptr, png_uint_16pp *ptable,
3855 PNG_CONST unsigned int shift, PNG_CONST png_fixed_point gamma_val)
3856{
3857 PNG_CONST unsigned int num = 1U << (8U - shift);
3858 PNG_CONST unsigned int max = (1U << (16U - shift))-1U;
3859 unsigned int i;
3860 png_uint_32 last;
3861
3862 png_uint_16pp table = *ptable =
3863 (png_uint_16pp)png_calloc(png_ptr, num * (sizeof (png_uint_16p)));
3864
3865 /* 'num' is the number of tables and also the number of low bits of low
3866 * bits of the input 16-bit value used to select a table. Each table is
3867 * itself index by the high 8 bits of the value.
3868 */
3869 for (i = 0; i < num; i++)
3870 table[i] = (png_uint_16p)png_malloc(png_ptr,
3871 256 * (sizeof (png_uint_16)));
3872
3873 /* 'gamma_val' is set to the reciprocal of the value calculated above, so
3874 * pow(out,g) is an *input* value. 'last' is the last input value set.
3875 *
3876 * In the loop 'i' is used to find output values. Since the output is
3877 * 8-bit there are only 256 possible values. The tables are set up to
3878 * select the closest possible output value for each input by finding
3879 * the input value at the boundary between each pair of output values
3880 * and filling the table up to that boundary with the lower output
3881 * value.
3882 *
3883 * The boundary values are 0.5,1.5..253.5,254.5. Since these are 9-bit
3884 * values the code below uses a 16-bit value in i; the values start at
3885 * 128.5 (for 0.5) and step by 257, for a total of 254 values (the last
3886 * entries are filled with 255). Start i at 128 and fill all 'last'
3887 * table entries <= 'max'
3888 */
3889 last = 0;
3890 for (i = 0; i < 255; ++i) /* 8-bit output value */
3891 {
3892 /* Find the corresponding maximum input value */
3893 png_uint_16 out = (png_uint_16)(i * 257U); /* 16-bit output value */
3894
3895 /* Find the boundary value in 16 bits: */
3896 png_uint_32 bound = png_gamma_16bit_correct(out+128U, gamma_val);
3897
3898 /* Adjust (round) to (16-shift) bits: */
3899 bound = (bound * max + 32768U)/65535U + 1U;
3900
3901 while (last < bound)
3902 {
3903 table[last & (0xffU >> shift)][last >> (8U - shift)] = out;
3904 last++;
3905 }
3906 }
3907
3908 /* And fill in the final entries. */
3909 while (last < (num << 8))
3910 {
3911 table[last & (0xff >> shift)][last >> (8U - shift)] = 65535U;
3912 last++;
3913 }
3914}
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303915#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07003916
3917/* Build a single 8-bit table: same as the 16-bit case but much simpler (and
3918 * typically much faster). Note that libpng currently does no sBIT processing
3919 * (apparently contrary to the spec) so a 256 entry table is always generated.
3920 */
3921static void
3922png_build_8bit_table(png_structrp png_ptr, png_bytepp ptable,
3923 PNG_CONST png_fixed_point gamma_val)
3924{
3925 unsigned int i;
3926 png_bytep table = *ptable = (png_bytep)png_malloc(png_ptr, 256);
3927
3928 if (png_gamma_significant(gamma_val)) for (i=0; i<256; i++)
3929 table[i] = png_gamma_8bit_correct(i, gamma_val);
3930
3931 else for (i=0; i<256; ++i)
3932 table[i] = (png_byte)i;
3933}
3934
3935/* Used from png_read_destroy and below to release the memory used by the gamma
3936 * tables.
3937 */
3938void /* PRIVATE */
3939png_destroy_gamma_table(png_structrp png_ptr)
3940{
3941 png_free(png_ptr, png_ptr->gamma_table);
3942 png_ptr->gamma_table = NULL;
3943
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303944#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07003945 if (png_ptr->gamma_16_table != NULL)
3946 {
3947 int i;
3948 int istop = (1 << (8 - png_ptr->gamma_shift));
3949 for (i = 0; i < istop; i++)
3950 {
3951 png_free(png_ptr, png_ptr->gamma_16_table[i]);
3952 }
3953 png_free(png_ptr, png_ptr->gamma_16_table);
3954 png_ptr->gamma_16_table = NULL;
3955 }
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303956#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07003957
3958#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
3959 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
3960 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
3961 png_free(png_ptr, png_ptr->gamma_from_1);
3962 png_ptr->gamma_from_1 = NULL;
3963 png_free(png_ptr, png_ptr->gamma_to_1);
3964 png_ptr->gamma_to_1 = NULL;
3965
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303966#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07003967 if (png_ptr->gamma_16_from_1 != NULL)
3968 {
3969 int i;
3970 int istop = (1 << (8 - png_ptr->gamma_shift));
3971 for (i = 0; i < istop; i++)
3972 {
3973 png_free(png_ptr, png_ptr->gamma_16_from_1[i]);
3974 }
3975 png_free(png_ptr, png_ptr->gamma_16_from_1);
3976 png_ptr->gamma_16_from_1 = NULL;
3977 }
3978 if (png_ptr->gamma_16_to_1 != NULL)
3979 {
3980 int i;
3981 int istop = (1 << (8 - png_ptr->gamma_shift));
3982 for (i = 0; i < istop; i++)
3983 {
3984 png_free(png_ptr, png_ptr->gamma_16_to_1[i]);
3985 }
3986 png_free(png_ptr, png_ptr->gamma_16_to_1);
3987 png_ptr->gamma_16_to_1 = NULL;
3988 }
Sireesh Tripurarib478e662014-05-09 15:15:10 +05303989#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07003990#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
3991}
3992
3993/* We build the 8- or 16-bit gamma tables here. Note that for 16-bit
3994 * tables, we don't make a full table if we are reducing to 8-bit in
3995 * the future. Note also how the gamma_16 tables are segmented so that
3996 * we don't need to allocate > 64K chunks for a full 16-bit table.
3997 */
3998void /* PRIVATE */
3999png_build_gamma_table(png_structrp png_ptr, int bit_depth)
4000{
4001 png_debug(1, "in png_build_gamma_table");
4002
4003 /* Remove any existing table; this copes with multiple calls to
4004 * png_read_update_info. The warning is because building the gamma tables
4005 * multiple times is a performance hit - it's harmless but the ability to call
4006 * png_read_update_info() multiple times is new in 1.5.6 so it seems sensible
4007 * to warn if the app introduces such a hit.
4008 */
4009 if (png_ptr->gamma_table != NULL || png_ptr->gamma_16_table != NULL)
4010 {
4011 png_warning(png_ptr, "gamma table being rebuilt");
4012 png_destroy_gamma_table(png_ptr);
4013 }
4014
4015 if (bit_depth <= 8)
4016 {
4017 png_build_8bit_table(png_ptr, &png_ptr->gamma_table,
4018 png_ptr->screen_gamma > 0 ? png_reciprocal2(png_ptr->colorspace.gamma,
4019 png_ptr->screen_gamma) : PNG_FP_1);
4020
4021#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
4022 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
4023 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
4024 if (png_ptr->transformations & (PNG_COMPOSE | PNG_RGB_TO_GRAY))
4025 {
4026 png_build_8bit_table(png_ptr, &png_ptr->gamma_to_1,
4027 png_reciprocal(png_ptr->colorspace.gamma));
4028
4029 png_build_8bit_table(png_ptr, &png_ptr->gamma_from_1,
4030 png_ptr->screen_gamma > 0 ? png_reciprocal(png_ptr->screen_gamma) :
4031 png_ptr->colorspace.gamma/* Probably doing rgb_to_gray */);
4032 }
4033#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
4034 }
Sireesh Tripurarib478e662014-05-09 15:15:10 +05304035#ifdef PNG_16BIT_SUPPORTED
Chris Craikb50c2172013-07-29 15:28:30 -07004036 else
4037 {
4038 png_byte shift, sig_bit;
4039
4040 if (png_ptr->color_type & PNG_COLOR_MASK_COLOR)
4041 {
4042 sig_bit = png_ptr->sig_bit.red;
4043
4044 if (png_ptr->sig_bit.green > sig_bit)
4045 sig_bit = png_ptr->sig_bit.green;
4046
4047 if (png_ptr->sig_bit.blue > sig_bit)
4048 sig_bit = png_ptr->sig_bit.blue;
4049 }
4050 else
4051 sig_bit = png_ptr->sig_bit.gray;
4052
4053 /* 16-bit gamma code uses this equation:
4054 *
4055 * ov = table[(iv & 0xff) >> gamma_shift][iv >> 8]
4056 *
4057 * Where 'iv' is the input color value and 'ov' is the output value -
4058 * pow(iv, gamma).
4059 *
4060 * Thus the gamma table consists of up to 256 256 entry tables. The table
4061 * is selected by the (8-gamma_shift) most significant of the low 8 bits of
4062 * the color value then indexed by the upper 8 bits:
4063 *
4064 * table[low bits][high 8 bits]
4065 *
4066 * So the table 'n' corresponds to all those 'iv' of:
4067 *
4068 * <all high 8-bit values><n << gamma_shift>..<(n+1 << gamma_shift)-1>
4069 *
4070 */
4071 if (sig_bit > 0 && sig_bit < 16U)
4072 shift = (png_byte)(16U - sig_bit); /* shift == insignificant bits */
4073
4074 else
4075 shift = 0; /* keep all 16 bits */
4076
4077 if (png_ptr->transformations & (PNG_16_TO_8 | PNG_SCALE_16_TO_8))
4078 {
4079 /* PNG_MAX_GAMMA_8 is the number of bits to keep - effectively
4080 * the significant bits in the *input* when the output will
4081 * eventually be 8 bits. By default it is 11.
4082 */
4083 if (shift < (16U - PNG_MAX_GAMMA_8))
4084 shift = (16U - PNG_MAX_GAMMA_8);
4085 }
4086
4087 if (shift > 8U)
4088 shift = 8U; /* Guarantees at least one table! */
4089
4090 png_ptr->gamma_shift = shift;
4091
Chris Craikb50c2172013-07-29 15:28:30 -07004092 /* NOTE: prior to 1.5.4 this test used to include PNG_BACKGROUND (now
4093 * PNG_COMPOSE). This effectively smashed the background calculation for
4094 * 16-bit output because the 8-bit table assumes the result will be reduced
4095 * to 8 bits.
4096 */
4097 if (png_ptr->transformations & (PNG_16_TO_8 | PNG_SCALE_16_TO_8))
Chris Craikb50c2172013-07-29 15:28:30 -07004098 png_build_16to8_table(png_ptr, &png_ptr->gamma_16_table, shift,
4099 png_ptr->screen_gamma > 0 ? png_product2(png_ptr->colorspace.gamma,
4100 png_ptr->screen_gamma) : PNG_FP_1);
4101
Chris Craikb50c2172013-07-29 15:28:30 -07004102 else
4103 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_table, shift,
4104 png_ptr->screen_gamma > 0 ? png_reciprocal2(png_ptr->colorspace.gamma,
4105 png_ptr->screen_gamma) : PNG_FP_1);
Chris Craikb50c2172013-07-29 15:28:30 -07004106
4107#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
4108 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
4109 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
4110 if (png_ptr->transformations & (PNG_COMPOSE | PNG_RGB_TO_GRAY))
4111 {
4112 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_to_1, shift,
4113 png_reciprocal(png_ptr->colorspace.gamma));
4114
4115 /* Notice that the '16 from 1' table should be full precision, however
4116 * the lookup on this table still uses gamma_shift, so it can't be.
4117 * TODO: fix this.
4118 */
4119 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_from_1, shift,
4120 png_ptr->screen_gamma > 0 ? png_reciprocal(png_ptr->screen_gamma) :
4121 png_ptr->colorspace.gamma/* Probably doing rgb_to_gray */);
4122 }
4123#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
4124 }
Sireesh Tripurarib478e662014-05-09 15:15:10 +05304125#endif /* 16BIT */
Chris Craikb50c2172013-07-29 15:28:30 -07004126}
4127#endif /* READ_GAMMA */
4128
4129/* HARDWARE OPTION SUPPORT */
4130#ifdef PNG_SET_OPTION_SUPPORTED
4131int PNGAPI
4132png_set_option(png_structrp png_ptr, int option, int onoff)
4133{
4134 if (png_ptr != NULL && option >= 0 && option < PNG_OPTION_NEXT &&
4135 (option & 1) == 0)
4136 {
4137 int mask = 3 << option;
4138 int setting = (2 + (onoff != 0)) << option;
4139 int current = png_ptr->options;
4140
4141 png_ptr->options = (png_byte)((current & ~mask) | setting);
4142
4143 return (current & mask) >> option;
4144 }
4145
4146 return PNG_OPTION_INVALID;
4147}
4148#endif
4149
4150/* sRGB support */
4151#if defined(PNG_SIMPLIFIED_READ_SUPPORTED) ||\
4152 defined(PNG_SIMPLIFIED_WRITE_SUPPORTED)
4153/* sRGB conversion tables; these are machine generated with the code in
4154 * contrib/tools/makesRGB.c. The actual sRGB transfer curve defined in the
4155 * specification (see the article at http://en.wikipedia.org/wiki/SRGB)
4156 * is used, not the gamma=1/2.2 approximation use elsewhere in libpng.
4157 * The sRGB to linear table is exact (to the nearest 16 bit linear fraction).
4158 * The inverse (linear to sRGB) table has accuracies as follows:
4159 *
4160 * For all possible (255*65535+1) input values:
4161 *
4162 * error: -0.515566 - 0.625971, 79441 (0.475369%) of readings inexact
4163 *
4164 * For the input values corresponding to the 65536 16-bit values:
4165 *
4166 * error: -0.513727 - 0.607759, 308 (0.469978%) of readings inexact
4167 *
4168 * In all cases the inexact readings are off by one.
4169 */
4170
4171#ifdef PNG_SIMPLIFIED_READ_SUPPORTED
4172/* The convert-to-sRGB table is only currently required for read. */
4173const png_uint_16 png_sRGB_table[256] =
4174{
4175 0,20,40,60,80,99,119,139,
4176 159,179,199,219,241,264,288,313,
4177 340,367,396,427,458,491,526,562,
4178 599,637,677,718,761,805,851,898,
4179 947,997,1048,1101,1156,1212,1270,1330,
4180 1391,1453,1517,1583,1651,1720,1790,1863,
4181 1937,2013,2090,2170,2250,2333,2418,2504,
4182 2592,2681,2773,2866,2961,3058,3157,3258,
4183 3360,3464,3570,3678,3788,3900,4014,4129,
4184 4247,4366,4488,4611,4736,4864,4993,5124,
4185 5257,5392,5530,5669,5810,5953,6099,6246,
4186 6395,6547,6700,6856,7014,7174,7335,7500,
4187 7666,7834,8004,8177,8352,8528,8708,8889,
4188 9072,9258,9445,9635,9828,10022,10219,10417,
4189 10619,10822,11028,11235,11446,11658,11873,12090,
4190 12309,12530,12754,12980,13209,13440,13673,13909,
4191 14146,14387,14629,14874,15122,15371,15623,15878,
4192 16135,16394,16656,16920,17187,17456,17727,18001,
4193 18277,18556,18837,19121,19407,19696,19987,20281,
4194 20577,20876,21177,21481,21787,22096,22407,22721,
4195 23038,23357,23678,24002,24329,24658,24990,25325,
4196 25662,26001,26344,26688,27036,27386,27739,28094,
4197 28452,28813,29176,29542,29911,30282,30656,31033,
4198 31412,31794,32179,32567,32957,33350,33745,34143,
4199 34544,34948,35355,35764,36176,36591,37008,37429,
4200 37852,38278,38706,39138,39572,40009,40449,40891,
4201 41337,41785,42236,42690,43147,43606,44069,44534,
4202 45002,45473,45947,46423,46903,47385,47871,48359,
4203 48850,49344,49841,50341,50844,51349,51858,52369,
4204 52884,53401,53921,54445,54971,55500,56032,56567,
4205 57105,57646,58190,58737,59287,59840,60396,60955,
4206 61517,62082,62650,63221,63795,64372,64952,65535
4207};
4208
4209#endif /* simplified read only */
4210
4211/* The base/delta tables are required for both read and write (but currently
4212 * only the simplified versions.)
4213 */
4214const png_uint_16 png_sRGB_base[512] =
4215{
4216 128,1782,3383,4644,5675,6564,7357,8074,
4217 8732,9346,9921,10463,10977,11466,11935,12384,
4218 12816,13233,13634,14024,14402,14769,15125,15473,
4219 15812,16142,16466,16781,17090,17393,17690,17981,
4220 18266,18546,18822,19093,19359,19621,19879,20133,
4221 20383,20630,20873,21113,21349,21583,21813,22041,
4222 22265,22487,22707,22923,23138,23350,23559,23767,
4223 23972,24175,24376,24575,24772,24967,25160,25352,
4224 25542,25730,25916,26101,26284,26465,26645,26823,
4225 27000,27176,27350,27523,27695,27865,28034,28201,
4226 28368,28533,28697,28860,29021,29182,29341,29500,
4227 29657,29813,29969,30123,30276,30429,30580,30730,
4228 30880,31028,31176,31323,31469,31614,31758,31902,
4229 32045,32186,32327,32468,32607,32746,32884,33021,
4230 33158,33294,33429,33564,33697,33831,33963,34095,
4231 34226,34357,34486,34616,34744,34873,35000,35127,
4232 35253,35379,35504,35629,35753,35876,35999,36122,
4233 36244,36365,36486,36606,36726,36845,36964,37083,
4234 37201,37318,37435,37551,37668,37783,37898,38013,
4235 38127,38241,38354,38467,38580,38692,38803,38915,
4236 39026,39136,39246,39356,39465,39574,39682,39790,
4237 39898,40005,40112,40219,40325,40431,40537,40642,
4238 40747,40851,40955,41059,41163,41266,41369,41471,
4239 41573,41675,41777,41878,41979,42079,42179,42279,
4240 42379,42478,42577,42676,42775,42873,42971,43068,
4241 43165,43262,43359,43456,43552,43648,43743,43839,
4242 43934,44028,44123,44217,44311,44405,44499,44592,
4243 44685,44778,44870,44962,45054,45146,45238,45329,
4244 45420,45511,45601,45692,45782,45872,45961,46051,
4245 46140,46229,46318,46406,46494,46583,46670,46758,
4246 46846,46933,47020,47107,47193,47280,47366,47452,
4247 47538,47623,47709,47794,47879,47964,48048,48133,
4248 48217,48301,48385,48468,48552,48635,48718,48801,
4249 48884,48966,49048,49131,49213,49294,49376,49458,
4250 49539,49620,49701,49782,49862,49943,50023,50103,
4251 50183,50263,50342,50422,50501,50580,50659,50738,
4252 50816,50895,50973,51051,51129,51207,51285,51362,
4253 51439,51517,51594,51671,51747,51824,51900,51977,
4254 52053,52129,52205,52280,52356,52432,52507,52582,
4255 52657,52732,52807,52881,52956,53030,53104,53178,
4256 53252,53326,53400,53473,53546,53620,53693,53766,
4257 53839,53911,53984,54056,54129,54201,54273,54345,
4258 54417,54489,54560,54632,54703,54774,54845,54916,
4259 54987,55058,55129,55199,55269,55340,55410,55480,
4260 55550,55620,55689,55759,55828,55898,55967,56036,
4261 56105,56174,56243,56311,56380,56448,56517,56585,
4262 56653,56721,56789,56857,56924,56992,57059,57127,
4263 57194,57261,57328,57395,57462,57529,57595,57662,
4264 57728,57795,57861,57927,57993,58059,58125,58191,
4265 58256,58322,58387,58453,58518,58583,58648,58713,
4266 58778,58843,58908,58972,59037,59101,59165,59230,
4267 59294,59358,59422,59486,59549,59613,59677,59740,
4268 59804,59867,59930,59993,60056,60119,60182,60245,
4269 60308,60370,60433,60495,60558,60620,60682,60744,
4270 60806,60868,60930,60992,61054,61115,61177,61238,
4271 61300,61361,61422,61483,61544,61605,61666,61727,
4272 61788,61848,61909,61969,62030,62090,62150,62211,
4273 62271,62331,62391,62450,62510,62570,62630,62689,
4274 62749,62808,62867,62927,62986,63045,63104,63163,
4275 63222,63281,63340,63398,63457,63515,63574,63632,
4276 63691,63749,63807,63865,63923,63981,64039,64097,
4277 64155,64212,64270,64328,64385,64443,64500,64557,
4278 64614,64672,64729,64786,64843,64900,64956,65013,
4279 65070,65126,65183,65239,65296,65352,65409,65465
4280};
4281
4282const png_byte png_sRGB_delta[512] =
4283{
4284 207,201,158,129,113,100,90,82,77,72,68,64,61,59,56,54,
4285 52,50,49,47,46,45,43,42,41,40,39,39,38,37,36,36,
4286 35,34,34,33,33,32,32,31,31,30,30,30,29,29,28,28,
4287 28,27,27,27,27,26,26,26,25,25,25,25,24,24,24,24,
4288 23,23,23,23,23,22,22,22,22,22,22,21,21,21,21,21,
4289 21,20,20,20,20,20,20,20,20,19,19,19,19,19,19,19,
4290 19,18,18,18,18,18,18,18,18,18,18,17,17,17,17,17,
4291 17,17,17,17,17,17,16,16,16,16,16,16,16,16,16,16,
4292 16,16,16,16,15,15,15,15,15,15,15,15,15,15,15,15,
4293 15,15,15,15,14,14,14,14,14,14,14,14,14,14,14,14,
4294 14,14,14,14,14,14,14,13,13,13,13,13,13,13,13,13,
4295 13,13,13,13,13,13,13,13,13,13,13,13,13,13,12,12,
4296 12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,
4297 12,12,12,12,12,12,12,12,12,12,12,12,11,11,11,11,
4298 11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,
4299 11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,
4300 11,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4301 10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4302 10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4303 10,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4304 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4305 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4306 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4307 9,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4308 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4309 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4310 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4311 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4312 8,8,8,8,8,8,8,8,8,7,7,7,7,7,7,7,
4313 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
4314 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
4315 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7
4316};
4317#endif /* SIMPLIFIED READ/WRITE sRGB support */
4318
4319/* SIMPLIFIED READ/WRITE SUPPORT */
4320#if defined(PNG_SIMPLIFIED_READ_SUPPORTED) ||\
4321 defined(PNG_SIMPLIFIED_WRITE_SUPPORTED)
4322static int
4323png_image_free_function(png_voidp argument)
4324{
4325 png_imagep image = png_voidcast(png_imagep, argument);
4326 png_controlp cp = image->opaque;
4327 png_control c;
4328
4329 /* Double check that we have a png_ptr - it should be impossible to get here
4330 * without one.
4331 */
4332 if (cp->png_ptr == NULL)
4333 return 0;
4334
4335 /* First free any data held in the control structure. */
4336# ifdef PNG_STDIO_SUPPORTED
4337 if (cp->owned_file)
4338 {
4339 FILE *fp = png_voidcast(FILE*, cp->png_ptr->io_ptr);
4340 cp->owned_file = 0;
4341
4342 /* Ignore errors here. */
4343 if (fp != NULL)
4344 {
4345 cp->png_ptr->io_ptr = NULL;
4346 (void)fclose(fp);
4347 }
4348 }
4349# endif
4350
4351 /* Copy the control structure so that the original, allocated, version can be
4352 * safely freed. Notice that a png_error here stops the remainder of the
4353 * cleanup, but this is probably fine because that would indicate bad memory
4354 * problems anyway.
4355 */
4356 c = *cp;
4357 image->opaque = &c;
4358 png_free(c.png_ptr, cp);
4359
4360 /* Then the structures, calling the correct API. */
4361 if (c.for_write)
4362 {
4363# ifdef PNG_SIMPLIFIED_WRITE_SUPPORTED
4364 png_destroy_write_struct(&c.png_ptr, &c.info_ptr);
4365# else
4366 png_error(c.png_ptr, "simplified write not supported");
4367# endif
4368 }
4369 else
4370 {
4371# ifdef PNG_SIMPLIFIED_READ_SUPPORTED
4372 png_destroy_read_struct(&c.png_ptr, &c.info_ptr, NULL);
4373# else
4374 png_error(c.png_ptr, "simplified read not supported");
4375# endif
4376 }
4377
4378 /* Success. */
4379 return 1;
4380}
4381
4382void PNGAPI
4383png_image_free(png_imagep image)
4384{
4385 /* Safely call the real function, but only if doing so is safe at this point
4386 * (if not inside an error handling context). Otherwise assume
4387 * png_safe_execute will call this API after the return.
4388 */
4389 if (image != NULL && image->opaque != NULL &&
4390 image->opaque->error_buf == NULL)
4391 {
4392 /* Ignore errors here: */
4393 (void)png_safe_execute(image, png_image_free_function, image);
4394 image->opaque = NULL;
4395 }
4396}
4397
4398int /* PRIVATE */
4399png_image_error(png_imagep image, png_const_charp error_message)
4400{
4401 /* Utility to log an error. */
4402 png_safecat(image->message, (sizeof image->message), 0, error_message);
4403 image->warning_or_error |= PNG_IMAGE_ERROR;
4404 png_image_free(image);
4405 return 0;
4406}
4407
4408#endif /* SIMPLIFIED READ/WRITE */
The Android Open Source Project893912b2009-03-03 19:30:05 -08004409#endif /* defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED) */