blob: a3b59e3e4b5e24b61e0f45fb55d67f7b3f492109 [file] [log] [blame]
John Bowler8de49d02012-09-27 09:26:49 -05001
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06002/* png.c - location for general purpose libpng functions
3 *
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06004 * Last changed in libpng 1.6.11 [(PENDING RELEASE)]
Glenn Randers-Pehrson95a19732013-12-31 21:10:13 -06005 * Copyright (c) 1998-2014 Glenn Randers-Pehrson
Glenn Randers-Pehrsond4366722000-06-04 14:29:29 -05006 * (Version 0.96 Copyright (c) 1996, 1997 Andreas Dilger)
7 * (Version 0.88 Copyright (c) 1995, 1996 Guy Eric Schalnat, Group 42, Inc.)
Glenn Randers-Pehrson3e61d792009-06-24 09:31:28 -05008 *
Glenn Randers-Pehrsonbfbf8652009-06-26 21:46:52 -05009 * This code is released under the libpng license.
Glenn Randers-Pehrsonc332bbc2009-06-25 13:43:50 -050010 * For conditions of distribution and use, see the disclaimer
Glenn Randers-Pehrson037023b2009-06-24 10:27:36 -050011 * and license in png.h
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -060012 */
Guy Schalnat0d580581995-07-20 02:43:20 -050013
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -050014#include "pngpriv.h"
Guy Schalnat0d580581995-07-20 02:43:20 -050015
Glenn Randers-Pehrson520a7642000-03-21 05:13:06 -060016/* Generate a compiler error if there is an old png.h in the search path. */
Glenn Randers-Pehrsond5201df2014-04-20 20:16:56 -050017typedef png_libpng_version_1_6_11beta05 Your_png_h_is_not_version_1_6_11beta05;
Glenn Randers-Pehrson520a7642000-03-21 05:13:06 -060018
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060019/* Tells libpng that we have already handled the first "num_bytes" bytes
20 * of the PNG file signature. If the PNG data is embedded into another
21 * stream we can set num_bytes = 8 so that libpng will not attempt to read
22 * or write any of the magic bytes before it starts on the IHDR.
23 */
Glenn Randers-Pehrsonbcfd15d1999-10-01 14:22:25 -050024
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060025#ifdef PNG_READ_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -050026void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -060027png_set_sig_bytes(png_structrp png_ptr, int num_bytes)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060028{
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -050029 png_debug(1, "in png_set_sig_bytes");
30
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -050031 if (png_ptr == NULL)
32 return;
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -050033
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060034 if (num_bytes > 8)
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -050035 png_error(png_ptr, "Too many bytes for PNG signature");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060036
Glenn Randers-Pehrson860ab2b1999-10-14 07:43:10 -050037 png_ptr->sig_bytes = (png_byte)(num_bytes < 0 ? 0 : num_bytes);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060038}
39
40/* Checks whether the supplied bytes match the PNG signature. We allow
41 * checking less than the full 8-byte signature so that those apps that
42 * already read the first few bytes of a file to determine the file type
43 * can simply check the remaining bytes for extra assurance. Returns
44 * an integer less than, equal to, or greater than zero if sig is found,
45 * respectively, to be less than, to match, or be greater than the correct
Glenn Randers-Pehrson6d62ef12011-08-25 18:17:50 -050046 * PNG signature (this is the same behavior as strcmp, memcmp, etc).
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060047 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -050048int PNGAPI
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -050049png_sig_cmp(png_const_bytep sig, png_size_t start, png_size_t num_to_check)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060050{
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -060051 png_byte png_signature[8] = {137, 80, 78, 71, 13, 10, 26, 10};
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -050052
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060053 if (num_to_check > 8)
54 num_to_check = 8;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -050055
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060056 else if (num_to_check < 1)
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060057 return (-1);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060058
Andreas Dilger47a0c421997-05-16 02:46:07 -050059 if (start > 7)
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060060 return (-1);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060061
62 if (start + num_to_check > 8)
63 num_to_check = 8 - start;
64
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -060065 return ((int)(memcmp(&sig[start], &png_signature[start], num_to_check)));
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060066}
67
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060068#endif /* PNG_READ_SUPPORTED */
Guy Schalnat0d580581995-07-20 02:43:20 -050069
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -060070#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Glenn Randers-Pehrsonc5080812010-10-23 08:26:26 -050071/* Function to allocate memory for zlib */
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -050072PNG_FUNCTION(voidpf /* PRIVATE */,
73png_zalloc,(voidpf png_ptr, uInt items, uInt size),PNG_ALLOCATED)
Guy Schalnat0d580581995-07-20 02:43:20 -050074{
John Bowlerd332c672011-12-21 17:36:12 -060075 png_alloc_size_t num_bytes = size;
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -050076
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -050077 if (png_ptr == NULL)
John Bowlerd332c672011-12-21 17:36:12 -060078 return NULL;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -050079
John Bowlerd332c672011-12-21 17:36:12 -060080 if (items >= (~(png_alloc_size_t)0)/size)
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -050081 {
John Bowler5d567862011-12-24 09:12:00 -060082 png_warning (png_voidcast(png_structrp, png_ptr),
John Bowlerd332c672011-12-21 17:36:12 -060083 "Potential overflow in png_zalloc()");
84 return NULL;
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -050085 }
Glenn Randers-Pehrson9c0f0942002-02-21 23:14:23 -060086
John Bowlerd332c672011-12-21 17:36:12 -060087 num_bytes *= items;
John Bowler5d567862011-12-24 09:12:00 -060088 return png_malloc_warn(png_voidcast(png_structrp, png_ptr), num_bytes);
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -050089}
90
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -050091/* Function to free memory for zlib */
Glenn Randers-Pehrson3f705ba2009-07-23 12:53:06 -050092void /* PRIVATE */
Guy Schalnat51f0eb41995-09-26 05:22:39 -050093png_zfree(voidpf png_ptr, voidpf ptr)
Guy Schalnat0d580581995-07-20 02:43:20 -050094{
John Bowler5d567862011-12-24 09:12:00 -060095 png_free(png_voidcast(png_const_structrp,png_ptr), ptr);
Guy Schalnat0d580581995-07-20 02:43:20 -050096}
97
Andreas Dilger02ad0ef1997-01-17 01:34:35 -060098/* Reset the CRC variable to 32 bits of 1's. Care must be taken
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -060099 * in case CRC is > 32 bits to leave the top bits 0.
100 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500101void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -0600102png_reset_crc(png_structrp png_ptr)
Guy Schalnat0d580581995-07-20 02:43:20 -0500103{
John Bowlerf3f7e142011-09-09 07:32:37 -0500104 /* The cast is safe because the crc is a 32 bit value. */
105 png_ptr->crc = (png_uint_32)crc32(0, Z_NULL, 0);
Guy Schalnat0d580581995-07-20 02:43:20 -0500106}
107
Andreas Dilger47a0c421997-05-16 02:46:07 -0500108/* Calculate the CRC over a section of data. We can only pass as
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600109 * much data to this routine as the largest single buffer size. We
110 * also check that this data will actually be used before going to the
111 * trouble of calculating it.
112 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500113void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -0600114png_calculate_crc(png_structrp png_ptr, png_const_bytep ptr, png_size_t length)
Guy Schalnat0d580581995-07-20 02:43:20 -0500115{
Andreas Dilger47a0c421997-05-16 02:46:07 -0500116 int need_crc = 1;
117
Glenn Randers-Pehrson67a289f2013-04-19 19:03:34 -0500118 if (PNG_CHUNK_ANCILLARY(png_ptr->chunk_name))
Andreas Dilger47a0c421997-05-16 02:46:07 -0500119 {
120 if ((png_ptr->flags & PNG_FLAG_CRC_ANCILLARY_MASK) ==
121 (PNG_FLAG_CRC_ANCILLARY_USE | PNG_FLAG_CRC_ANCILLARY_NOWARN))
122 need_crc = 0;
123 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500124
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500125 else /* critical */
Andreas Dilger47a0c421997-05-16 02:46:07 -0500126 {
127 if (png_ptr->flags & PNG_FLAG_CRC_CRITICAL_IGNORE)
128 need_crc = 0;
129 }
130
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600131 /* 'uLong' is defined in zlib.h as unsigned long; this means that on some
132 * systems it is a 64 bit value. crc32, however, returns 32 bits so the
133 * following cast is safe. 'uInt' may be no more than 16 bits, so it is
134 * necessary to perform a loop here.
John Bowlerf3f7e142011-09-09 07:32:37 -0500135 */
136 if (need_crc && length > 0)
137 {
138 uLong crc = png_ptr->crc; /* Should never issue a warning */
139
140 do
141 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600142 uInt safe_length = (uInt)length;
143 if (safe_length == 0)
144 safe_length = (uInt)-1; /* evil, but safe */
John Bowlerf3f7e142011-09-09 07:32:37 -0500145
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600146 crc = crc32(crc, ptr, safe_length);
John Bowlerf3f7e142011-09-09 07:32:37 -0500147
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600148 /* The following should never issue compiler warnings; if they do the
John Bowlerf3f7e142011-09-09 07:32:37 -0500149 * target system has characteristics that will probably violate other
150 * assumptions within the libpng code.
151 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600152 ptr += safe_length;
153 length -= safe_length;
John Bowlerf3f7e142011-09-09 07:32:37 -0500154 }
155 while (length > 0);
156
157 /* And the following is always safe because the crc is only 32 bits. */
158 png_ptr->crc = (png_uint_32)crc;
159 }
Guy Schalnat0d580581995-07-20 02:43:20 -0500160}
Guy Schalnate5a37791996-06-05 15:50:50 -0500161
John Bowler88b77cc2011-05-05 06:49:55 -0500162/* Check a user supplied version number, called from both read and write
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600163 * functions that create a png_struct.
John Bowler88b77cc2011-05-05 06:49:55 -0500164 */
165int
John Bowler5d567862011-12-24 09:12:00 -0600166png_user_version_check(png_structrp png_ptr, png_const_charp user_png_ver)
John Bowler88b77cc2011-05-05 06:49:55 -0500167{
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -0600168 if (user_png_ver != NULL)
John Bowler88b77cc2011-05-05 06:49:55 -0500169 {
170 int i = 0;
171
172 do
173 {
174 if (user_png_ver[i] != png_libpng_ver[i])
175 png_ptr->flags |= PNG_FLAG_LIBRARY_MISMATCH;
176 } while (png_libpng_ver[i++]);
177 }
178
179 else
180 png_ptr->flags |= PNG_FLAG_LIBRARY_MISMATCH;
181
182 if (png_ptr->flags & PNG_FLAG_LIBRARY_MISMATCH)
183 {
184 /* Libpng 0.90 and later are binary incompatible with libpng 0.89, so
185 * we must recompile any applications that use any older library version.
186 * For versions after libpng 1.0, we will be compatible, so we need
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600187 * only check the first and third digits (note that when we reach version
188 * 1.10 we will need to check the fourth symbol, namely user_png_ver[3]).
John Bowler88b77cc2011-05-05 06:49:55 -0500189 */
190 if (user_png_ver == NULL || user_png_ver[0] != png_libpng_ver[0] ||
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600191 (user_png_ver[0] == '1' && (user_png_ver[2] != png_libpng_ver[2] ||
192 user_png_ver[3] != png_libpng_ver[3])) ||
John Bowler88b77cc2011-05-05 06:49:55 -0500193 (user_png_ver[0] == '0' && user_png_ver[2] < '9'))
194 {
195#ifdef PNG_WARNINGS_SUPPORTED
196 size_t pos = 0;
197 char m[128];
198
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600199 pos = png_safecat(m, (sizeof m), pos,
200 "Application built with libpng-");
201 pos = png_safecat(m, (sizeof m), pos, user_png_ver);
202 pos = png_safecat(m, (sizeof m), pos, " but running with ");
203 pos = png_safecat(m, (sizeof m), pos, png_libpng_ver);
Glenn Randers-Pehrson3f8a2ed2013-11-25 10:38:21 -0600204 PNG_UNUSED(pos)
John Bowler88b77cc2011-05-05 06:49:55 -0500205
206 png_warning(png_ptr, m);
207#endif
208
209#ifdef PNG_ERROR_NUMBERS_SUPPORTED
210 png_ptr->flags = 0;
211#endif
212
213 return 0;
214 }
215 }
216
217 /* Success return. */
218 return 1;
219}
220
John Bowlerd332c672011-12-21 17:36:12 -0600221/* Generic function to create a png_struct for either read or write - this
222 * contains the common initialization.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600223 */
John Bowlerd332c672011-12-21 17:36:12 -0600224PNG_FUNCTION(png_structp /* PRIVATE */,
225png_create_png_struct,(png_const_charp user_png_ver, png_voidp error_ptr,
226 png_error_ptr error_fn, png_error_ptr warn_fn, png_voidp mem_ptr,
227 png_malloc_ptr malloc_fn, png_free_ptr free_fn),PNG_ALLOCATED)
228{
229 png_struct create_struct;
230# ifdef PNG_SETJMP_SUPPORTED
231 jmp_buf create_jmp_buf;
232# endif
233
234 /* This temporary stack-allocated structure is used to provide a place to
235 * build enough context to allow the user provided memory allocator (if any)
236 * to be called.
237 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600238 memset(&create_struct, 0, (sizeof create_struct));
John Bowlerd332c672011-12-21 17:36:12 -0600239
240 /* Added at libpng-1.2.6 */
241# ifdef PNG_USER_LIMITS_SUPPORTED
242 create_struct.user_width_max = PNG_USER_WIDTH_MAX;
243 create_struct.user_height_max = PNG_USER_HEIGHT_MAX;
244
245# ifdef PNG_USER_CHUNK_CACHE_MAX
246 /* Added at libpng-1.2.43 and 1.4.0 */
247 create_struct.user_chunk_cache_max = PNG_USER_CHUNK_CACHE_MAX;
248# endif
249
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600250# ifdef PNG_USER_CHUNK_MALLOC_MAX
John Bowlerd332c672011-12-21 17:36:12 -0600251 /* Added at libpng-1.2.43 and 1.4.1, required only for read but exists
252 * in png_struct regardless.
253 */
254 create_struct.user_chunk_malloc_max = PNG_USER_CHUNK_MALLOC_MAX;
255# endif
256# endif
257
258 /* The following two API calls simply set fields in png_struct, so it is safe
259 * to do them now even though error handling is not yet set up.
260 */
261# ifdef PNG_USER_MEM_SUPPORTED
262 png_set_mem_fn(&create_struct, mem_ptr, malloc_fn, free_fn);
Glenn Randers-Pehrsonc9120502013-11-22 14:58:04 -0600263# else
264 PNG_UNUSED(mem_ptr)
265 PNG_UNUSED(malloc_fn)
266 PNG_UNUSED(free_fn)
John Bowlerd332c672011-12-21 17:36:12 -0600267# endif
268
269 /* (*error_fn) can return control to the caller after the error_ptr is set,
270 * this will result in a memory leak unless the error_fn does something
271 * extremely sophisticated. The design lacks merit but is implicit in the
272 * API.
273 */
274 png_set_error_fn(&create_struct, error_ptr, error_fn, warn_fn);
275
276# ifdef PNG_SETJMP_SUPPORTED
277 if (!setjmp(create_jmp_buf))
278 {
279 /* Temporarily fake out the longjmp information until we have
280 * successfully completed this function. This only works if we have
281 * setjmp() support compiled in, but it is safe - this stuff should
282 * never happen.
283 */
284 create_struct.jmp_buf_ptr = &create_jmp_buf;
285 create_struct.jmp_buf_size = 0; /*stack allocation*/
286 create_struct.longjmp_fn = longjmp;
287# else
288 {
289# endif
290 /* Call the general version checker (shared with read and write code):
291 */
292 if (png_user_version_check(&create_struct, user_png_ver))
293 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600294 png_structrp png_ptr = png_voidcast(png_structrp,
295 png_malloc_warn(&create_struct, (sizeof *png_ptr)));
John Bowlerd332c672011-12-21 17:36:12 -0600296
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600297 if (png_ptr != NULL)
John Bowlerd332c672011-12-21 17:36:12 -0600298 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600299 /* png_ptr->zstream holds a back-pointer to the png_struct, so
300 * this can only be done now:
301 */
302 create_struct.zstream.zalloc = png_zalloc;
303 create_struct.zstream.zfree = png_zfree;
304 create_struct.zstream.opaque = png_ptr;
John Bowlerd332c672011-12-21 17:36:12 -0600305
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600306# ifdef PNG_SETJMP_SUPPORTED
307 /* Eliminate the local error handling: */
308 create_struct.jmp_buf_ptr = NULL;
309 create_struct.jmp_buf_size = 0;
310 create_struct.longjmp_fn = 0;
311# endif
John Bowlerd332c672011-12-21 17:36:12 -0600312
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600313 *png_ptr = create_struct;
John Bowlerd332c672011-12-21 17:36:12 -0600314
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600315 /* This is the successful return point */
316 return png_ptr;
John Bowlerd332c672011-12-21 17:36:12 -0600317 }
318 }
319 }
320
321 /* A longjmp because of a bug in the application storage allocator or a
322 * simple failure to allocate the png_struct.
323 */
John Bowlerd332c672011-12-21 17:36:12 -0600324 return NULL;
325}
326
327/* Allocate the memory for an info_struct for the application. */
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -0500328PNG_FUNCTION(png_infop,PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600329png_create_info_struct,(png_const_structrp png_ptr),PNG_ALLOCATED)
Guy Schalnate5a37791996-06-05 15:50:50 -0500330{
John Bowler5d567862011-12-24 09:12:00 -0600331 png_inforp info_ptr;
Guy Schalnate5a37791996-06-05 15:50:50 -0500332
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500333 png_debug(1, "in png_create_info_struct");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500334
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500335 if (png_ptr == NULL)
John Bowlerd332c672011-12-21 17:36:12 -0600336 return NULL;
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500337
John Bowlerd332c672011-12-21 17:36:12 -0600338 /* Use the internal API that does not (or at least should not) error out, so
339 * that this call always returns ok. The application typically sets up the
340 * error handling *after* creating the info_struct because this is the way it
341 * has always been done in 'example.c'.
342 */
John Bowler5d567862011-12-24 09:12:00 -0600343 info_ptr = png_voidcast(png_inforp, png_malloc_base(png_ptr,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600344 (sizeof *info_ptr)));
John Bowlerd332c672011-12-21 17:36:12 -0600345
Glenn Randers-Pehrson5cded0b2001-11-07 07:10:08 -0600346 if (info_ptr != NULL)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600347 memset(info_ptr, 0, (sizeof *info_ptr));
Guy Schalnate5a37791996-06-05 15:50:50 -0500348
John Bowlerd332c672011-12-21 17:36:12 -0600349 return info_ptr;
Guy Schalnate5a37791996-06-05 15:50:50 -0500350}
351
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600352/* This function frees the memory associated with a single info struct.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600353 * Normally, one would use either png_destroy_read_struct() or
354 * png_destroy_write_struct() to free an info struct, but this may be
John Bowlerd332c672011-12-21 17:36:12 -0600355 * useful for some applications. From libpng 1.6.0 this function is also used
356 * internally to implement the png_info release part of the 'struct' destroy
357 * APIs. This ensures that all possible approaches free the same data (all of
358 * it).
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600359 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500360void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600361png_destroy_info_struct(png_const_structrp png_ptr, png_infopp info_ptr_ptr)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600362{
John Bowler5d567862011-12-24 09:12:00 -0600363 png_inforp info_ptr = NULL;
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600364
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500365 png_debug(1, "in png_destroy_info_struct");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500366
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500367 if (png_ptr == NULL)
368 return;
369
Andreas Dilger47a0c421997-05-16 02:46:07 -0500370 if (info_ptr_ptr != NULL)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600371 info_ptr = *info_ptr_ptr;
372
Andreas Dilger47a0c421997-05-16 02:46:07 -0500373 if (info_ptr != NULL)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600374 {
John Bowlerd332c672011-12-21 17:36:12 -0600375 /* Do this first in case of an error below; if the app implements its own
376 * memory management this can lead to png_free calling png_error, which
377 * will abort this routine and return control to the app error handler.
378 * An infinite loop may result if it then tries to free the same info
379 * ptr.
380 */
Glenn Randers-Pehrson3f549252001-10-27 07:35:13 -0500381 *info_ptr_ptr = NULL;
John Bowlerd332c672011-12-21 17:36:12 -0600382
John Bowlerdf477e42011-12-24 07:47:02 -0600383 png_free_data(png_ptr, info_ptr, PNG_FREE_ALL, -1);
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600384 memset(info_ptr, 0, (sizeof *info_ptr));
John Bowlerd332c672011-12-21 17:36:12 -0600385 png_free(png_ptr, info_ptr);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600386 }
387}
388
389/* Initialize the info structure. This is now an internal function (0.89)
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600390 * and applications using it are urged to use png_create_info_struct()
John Bowlerd332c672011-12-21 17:36:12 -0600391 * instead. Use deprecated in 1.6.0, internal use removed (used internally it
392 * is just a memset).
393 *
394 * NOTE: it is almost inconceivable that this API is used because it bypasses
395 * the user-memory mechanism and the user error handling/warning mechanisms in
396 * those cases where it does anything other than a memset.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600397 */
John Bowlerd332c672011-12-21 17:36:12 -0600398PNG_FUNCTION(void,PNGAPI
399png_info_init_3,(png_infopp ptr_ptr, png_size_t png_info_struct_size),
400 PNG_DEPRECATED)
Glenn Randers-Pehrson8b6a8892001-05-18 04:54:50 -0500401{
John Bowler5d567862011-12-24 09:12:00 -0600402 png_inforp info_ptr = *ptr_ptr;
Glenn Randers-Pehrson8b6a8892001-05-18 04:54:50 -0500403
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500404 png_debug(1, "in png_info_init_3");
405
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500406 if (info_ptr == NULL)
407 return;
Glenn Randers-Pehrson6b12c082006-11-14 10:53:30 -0600408
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600409 if ((sizeof (png_info)) > png_info_struct_size)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500410 {
John Bowlerd332c672011-12-21 17:36:12 -0600411 *ptr_ptr = NULL;
412 /* The following line is why this API should not be used: */
413 free(info_ptr);
John Bowler5d567862011-12-24 09:12:00 -0600414 info_ptr = png_voidcast(png_inforp, png_malloc_base(NULL,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600415 (sizeof *info_ptr)));
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500416 *ptr_ptr = info_ptr;
417 }
Glenn Randers-Pehrson8b6a8892001-05-18 04:54:50 -0500418
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500419 /* Set everything to 0 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600420 memset(info_ptr, 0, (sizeof *info_ptr));
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600421}
422
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600423/* The following API is not called internally */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500424void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600425png_data_freer(png_const_structrp png_ptr, png_inforp info_ptr,
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500426 int freer, png_uint_32 mask)
427{
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500428 png_debug(1, "in png_data_freer");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500429
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500430 if (png_ptr == NULL || info_ptr == NULL)
431 return;
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500432
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500433 if (freer == PNG_DESTROY_WILL_FREE_DATA)
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500434 info_ptr->free_me |= mask;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500435
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500436 else if (freer == PNG_USER_WILL_FREE_DATA)
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500437 info_ptr->free_me &= ~mask;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500438
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500439 else
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600440 png_error(png_ptr, "Unknown freer parameter in png_data_freer");
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500441}
442
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500443void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600444png_free_data(png_const_structrp png_ptr, png_inforp info_ptr, png_uint_32 mask,
Glenn Randers-Pehrson82ae3832001-04-20 10:32:10 -0500445 int num)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600446{
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500447 png_debug(1, "in png_free_data");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500448
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600449 if (png_ptr == NULL || info_ptr == NULL)
450 return;
Glenn Randers-Pehrsona77ef622000-02-18 13:48:52 -0600451
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500452#ifdef PNG_TEXT_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500453 /* Free text item num or (if num == -1) all text items */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500454 if ((mask & PNG_FREE_TEXT) & info_ptr->free_me)
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600455 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500456 if (num != -1)
457 {
458 if (info_ptr->text && info_ptr->text[num].key)
459 {
460 png_free(png_ptr, info_ptr->text[num].key);
461 info_ptr->text[num].key = NULL;
462 }
463 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500464
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500465 else
466 {
467 int i;
468 for (i = 0; i < info_ptr->num_text; i++)
469 png_free_data(png_ptr, info_ptr, PNG_FREE_TEXT, i);
470 png_free(png_ptr, info_ptr->text);
471 info_ptr->text = NULL;
472 info_ptr->num_text=0;
473 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600474 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600475#endif
476
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500477#ifdef PNG_tRNS_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500478 /* Free any tRNS entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500479 if ((mask & PNG_FREE_TRNS) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500480 {
Glenn Randers-Pehrson6abea752009-08-08 16:52:06 -0500481 png_free(png_ptr, info_ptr->trans_alpha);
482 info_ptr->trans_alpha = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500483 info_ptr->valid &= ~PNG_INFO_tRNS;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500484 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600485#endif
486
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500487#ifdef PNG_sCAL_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500488 /* Free any sCAL entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500489 if ((mask & PNG_FREE_SCAL) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500490 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500491 png_free(png_ptr, info_ptr->scal_s_width);
492 png_free(png_ptr, info_ptr->scal_s_height);
493 info_ptr->scal_s_width = NULL;
494 info_ptr->scal_s_height = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500495 info_ptr->valid &= ~PNG_INFO_sCAL;
496 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600497#endif
498
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500499#ifdef PNG_pCAL_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500500 /* Free any pCAL entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500501 if ((mask & PNG_FREE_PCAL) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500502 {
503 png_free(png_ptr, info_ptr->pcal_purpose);
504 png_free(png_ptr, info_ptr->pcal_units);
505 info_ptr->pcal_purpose = NULL;
506 info_ptr->pcal_units = NULL;
507 if (info_ptr->pcal_params != NULL)
508 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600509 unsigned int i;
510 for (i = 0; i < info_ptr->pcal_nparams; i++)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500511 {
512 png_free(png_ptr, info_ptr->pcal_params[i]);
Glenn Randers-Pehrsonf81b50b2009-12-29 16:50:15 -0600513 info_ptr->pcal_params[i] = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500514 }
515 png_free(png_ptr, info_ptr->pcal_params);
516 info_ptr->pcal_params = NULL;
517 }
518 info_ptr->valid &= ~PNG_INFO_pCAL;
519 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600520#endif
521
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500522#ifdef PNG_iCCP_SUPPORTED
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600523 /* Free any profile entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500524 if ((mask & PNG_FREE_ICCP) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500525 {
526 png_free(png_ptr, info_ptr->iccp_name);
527 png_free(png_ptr, info_ptr->iccp_profile);
528 info_ptr->iccp_name = NULL;
529 info_ptr->iccp_profile = NULL;
530 info_ptr->valid &= ~PNG_INFO_iCCP;
531 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600532#endif
533
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500534#ifdef PNG_sPLT_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500535 /* Free a given sPLT entry, or (if num == -1) all sPLT entries */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500536 if ((mask & PNG_FREE_SPLT) & info_ptr->free_me)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600537 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500538 if (num != -1)
Glenn Randers-Pehrsonfc4a1432000-05-17 17:39:34 -0500539 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500540 if (info_ptr->splt_palettes)
541 {
542 png_free(png_ptr, info_ptr->splt_palettes[num].name);
543 png_free(png_ptr, info_ptr->splt_palettes[num].entries);
544 info_ptr->splt_palettes[num].name = NULL;
545 info_ptr->splt_palettes[num].entries = NULL;
546 }
547 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500548
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500549 else
550 {
551 if (info_ptr->splt_palettes_num)
552 {
Glenn Randers-Pehrson45679352013-01-20 00:44:29 -0600553 int i;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600554 for (i = 0; i < info_ptr->splt_palettes_num; i++)
555 png_free_data(png_ptr, info_ptr, PNG_FREE_SPLT, (int)i);
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500556
557 png_free(png_ptr, info_ptr->splt_palettes);
558 info_ptr->splt_palettes = NULL;
559 info_ptr->splt_palettes_num = 0;
560 }
561 info_ptr->valid &= ~PNG_INFO_sPLT;
Glenn Randers-Pehrsonfc4a1432000-05-17 17:39:34 -0500562 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600563 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600564#endif
565
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600566#ifdef PNG_STORE_UNKNOWN_CHUNKS_SUPPORTED
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500567 if ((mask & PNG_FREE_UNKN) & info_ptr->free_me)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600568 {
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500569 if (num != -1)
570 {
571 if (info_ptr->unknown_chunks)
572 {
573 png_free(png_ptr, info_ptr->unknown_chunks[num].data);
574 info_ptr->unknown_chunks[num].data = NULL;
575 }
576 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500577
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500578 else
579 {
Glenn Randers-Pehrson45679352013-01-20 00:44:29 -0600580 int i;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600581
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500582 if (info_ptr->unknown_chunks_num)
583 {
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -0500584 for (i = 0; i < info_ptr->unknown_chunks_num; i++)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600585 png_free_data(png_ptr, info_ptr, PNG_FREE_UNKN, (int)i);
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600586
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500587 png_free(png_ptr, info_ptr->unknown_chunks);
588 info_ptr->unknown_chunks = NULL;
589 info_ptr->unknown_chunks_num = 0;
590 }
591 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600592 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600593#endif
594
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500595#ifdef PNG_hIST_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500596 /* Free any hIST entry */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500597 if ((mask & PNG_FREE_HIST) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500598 {
599 png_free(png_ptr, info_ptr->hist);
600 info_ptr->hist = NULL;
601 info_ptr->valid &= ~PNG_INFO_hIST;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500602 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600603#endif
604
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500605 /* Free any PLTE entry that was internally allocated */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500606 if ((mask & PNG_FREE_PLTE) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500607 {
John Bowler40b26032011-12-22 08:09:15 -0600608 png_free(png_ptr, info_ptr->palette);
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500609 info_ptr->palette = NULL;
610 info_ptr->valid &= ~PNG_INFO_PLTE;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500611 info_ptr->num_palette = 0;
612 }
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600613
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500614#ifdef PNG_INFO_IMAGE_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500615 /* Free any image bits attached to the info structure */
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500616 if ((mask & PNG_FREE_ROWS) & info_ptr->free_me)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500617 {
618 if (info_ptr->row_pointers)
619 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600620 png_uint_32 row;
621 for (row = 0; row < info_ptr->height; row++)
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500622 {
623 png_free(png_ptr, info_ptr->row_pointers[row]);
Glenn Randers-Pehrsonf81b50b2009-12-29 16:50:15 -0600624 info_ptr->row_pointers[row] = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500625 }
626 png_free(png_ptr, info_ptr->row_pointers);
Glenn Randers-Pehrsonf81b50b2009-12-29 16:50:15 -0600627 info_ptr->row_pointers = NULL;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500628 }
629 info_ptr->valid &= ~PNG_INFO_IDAT;
630 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600631#endif
Glenn Randers-Pehrsonfc4a1432000-05-17 17:39:34 -0500632
John Bowler56a739b2010-12-19 16:33:20 -0600633 if (num != -1)
634 mask &= ~PNG_FREE_MUL;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500635
John Bowler56a739b2010-12-19 16:33:20 -0600636 info_ptr->free_me &= ~mask;
Glenn Randers-Pehrsona77ef622000-02-18 13:48:52 -0600637}
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -0600638#endif /* defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED) */
Guy Schalnat0d580581995-07-20 02:43:20 -0500639
Guy Schalnate5a37791996-06-05 15:50:50 -0500640/* This function returns a pointer to the io_ptr associated with the user
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600641 * functions. The application should free any memory associated with this
642 * pointer before png_write_destroy() or png_read_destroy() are called.
643 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500644png_voidp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600645png_get_io_ptr(png_const_structrp png_ptr)
Guy Schalnate5a37791996-06-05 15:50:50 -0500646{
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500647 if (png_ptr == NULL)
648 return (NULL);
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500649
Glenn Randers-Pehrsonb2120021998-01-31 20:07:59 -0600650 return (png_ptr->io_ptr);
Guy Schalnate5a37791996-06-05 15:50:50 -0500651}
Andreas Dilger47a0c421997-05-16 02:46:07 -0500652
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -0600653#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600654# ifdef PNG_STDIO_SUPPORTED
Andreas Dilger47a0c421997-05-16 02:46:07 -0500655/* Initialize the default input/output functions for the PNG file. If you
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600656 * use your own read or write routines, you can call either png_set_read_fn()
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500657 * or png_set_write_fn() instead of png_init_io(). If you have defined
Glenn Randers-Pehrsonce775cc2011-07-13 06:28:26 -0500658 * PNG_NO_STDIO or otherwise disabled PNG_STDIO_SUPPORTED, you must use a
659 * function of your own because "FILE *" isn't necessarily available.
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -0600660 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500661void PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600662png_init_io(png_structrp png_ptr, png_FILE_p fp)
Guy Schalnate5a37791996-06-05 15:50:50 -0500663{
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500664 png_debug(1, "in png_init_io");
Glenn Randers-Pehrsonda009802009-08-15 13:25:47 -0500665
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500666 if (png_ptr == NULL)
667 return;
Glenn Randers-Pehrsonb3ce3652009-08-15 21:47:03 -0500668
Guy Schalnate5a37791996-06-05 15:50:50 -0500669 png_ptr->io_ptr = (png_voidp)fp;
670}
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600671# endif
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500672
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600673#ifdef PNG_SAVE_INT_32_SUPPORTED
674/* The png_save_int_32 function assumes integers are stored in two's
675 * complement format. If this isn't the case, then this routine needs to
676 * be modified to write data in two's complement format. Note that,
677 * the following works correctly even if png_int_32 has more than 32 bits
678 * (compare the more complex code required on read for sign extension.)
679 */
680void PNGAPI
681png_save_int_32(png_bytep buf, png_int_32 i)
682{
683 buf[0] = (png_byte)((i >> 24) & 0xff);
684 buf[1] = (png_byte)((i >> 16) & 0xff);
685 buf[2] = (png_byte)((i >> 8) & 0xff);
686 buf[3] = (png_byte)(i & 0xff);
687}
688#endif
689
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600690# ifdef PNG_TIME_RFC1123_SUPPORTED
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500691/* Convert the supplied time into an RFC 1123 string suitable for use in
692 * a "Creation Time" or other text-based time string.
693 */
John Bowler40b26032011-12-22 08:09:15 -0600694int PNGAPI
695png_convert_to_rfc1123_buffer(char out[29], png_const_timep ptime)
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500696{
697 static PNG_CONST char short_months[12][4] =
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600698 {"Jan", "Feb", "Mar", "Apr", "May", "Jun",
699 "Jul", "Aug", "Sep", "Oct", "Nov", "Dec"};
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500700
John Bowler40b26032011-12-22 08:09:15 -0600701 if (out == NULL)
702 return 0;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500703
Glenn Randers-Pehrson925a6022011-11-19 18:04:01 -0600704 if (ptime->year > 9999 /* RFC1123 limitation */ ||
705 ptime->month == 0 || ptime->month > 12 ||
706 ptime->day == 0 || ptime->day > 31 ||
707 ptime->hour > 23 || ptime->minute > 59 ||
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600708 ptime->second > 60)
John Bowler40b26032011-12-22 08:09:15 -0600709 return 0;
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600710
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500711 {
John Bowler88b77cc2011-05-05 06:49:55 -0500712 size_t pos = 0;
Glenn Randers-Pehrson925a6022011-11-19 18:04:01 -0600713 char number_buf[5]; /* enough for a four-digit year */
John Bowler88b77cc2011-05-05 06:49:55 -0500714
John Bowler40b26032011-12-22 08:09:15 -0600715# define APPEND_STRING(string) pos = png_safecat(out, 29, pos, (string))
John Bowler88b77cc2011-05-05 06:49:55 -0500716# define APPEND_NUMBER(format, value)\
717 APPEND_STRING(PNG_FORMAT_NUMBER(number_buf, format, (value)))
John Bowler40b26032011-12-22 08:09:15 -0600718# define APPEND(ch) if (pos < 28) out[pos++] = (ch)
Glenn Randers-Pehrsonaf855e42011-05-07 10:52:49 -0500719
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600720 APPEND_NUMBER(PNG_NUMBER_FORMAT_u, (unsigned)ptime->day);
John Bowler88b77cc2011-05-05 06:49:55 -0500721 APPEND(' ');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600722 APPEND_STRING(short_months[(ptime->month - 1)]);
John Bowler88b77cc2011-05-05 06:49:55 -0500723 APPEND(' ');
724 APPEND_NUMBER(PNG_NUMBER_FORMAT_u, ptime->year);
725 APPEND(' ');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600726 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->hour);
John Bowler88b77cc2011-05-05 06:49:55 -0500727 APPEND(':');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600728 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->minute);
John Bowler88b77cc2011-05-05 06:49:55 -0500729 APPEND(':');
Glenn Randers-Pehrson29fca792011-11-19 15:08:04 -0600730 APPEND_NUMBER(PNG_NUMBER_FORMAT_02u, (unsigned)ptime->second);
John Bowler88b77cc2011-05-05 06:49:55 -0500731 APPEND_STRING(" +0000"); /* This reliably terminates the buffer */
732
733# undef APPEND
734# undef APPEND_NUMBER
735# undef APPEND_STRING
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500736 }
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500737
John Bowler40b26032011-12-22 08:09:15 -0600738 return 1;
Glenn Randers-Pehrsonf7d1a171998-06-06 15:31:35 -0500739}
John Bowler40b26032011-12-22 08:09:15 -0600740
741# if PNG_LIBPNG_VER < 10700
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600742/* To do: remove the following from libpng-1.7 */
John Bowler40b26032011-12-22 08:09:15 -0600743/* Original API that uses a private buffer in png_struct.
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600744 * Deprecated because it causes png_struct to carry a spurious temporary
John Bowler40b26032011-12-22 08:09:15 -0600745 * buffer (png_struct::time_buffer), better to have the caller pass this in.
746 */
747png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600748png_convert_to_rfc1123(png_structrp png_ptr, png_const_timep ptime)
John Bowler40b26032011-12-22 08:09:15 -0600749{
750 if (png_ptr != NULL)
751 {
752 /* The only failure above if png_ptr != NULL is from an invalid ptime */
753 if (!png_convert_to_rfc1123_buffer(png_ptr->time_buffer, ptime))
754 png_warning(png_ptr, "Ignoring invalid time value");
755
756 else
757 return png_ptr->time_buffer;
758 }
759
760 return NULL;
761}
762# endif
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600763# endif /* PNG_TIME_RFC1123_SUPPORTED */
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600764
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -0600765#endif /* defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED) */
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600766
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500767png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600768png_get_copyright(png_const_structrp png_ptr)
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600769{
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600770 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500771#ifdef PNG_STRING_COPYRIGHT
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600772 return PNG_STRING_COPYRIGHT
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500773#else
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600774# ifdef __STDC__
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500775 return PNG_STRING_NEWLINE \
Glenn Randers-Pehrsond5201df2014-04-20 20:16:56 -0500776 "libpng version 1.6.11beta05 - April 21, 2014" PNG_STRING_NEWLINE \
Glenn Randers-Pehrson95a19732013-12-31 21:10:13 -0600777 "Copyright (c) 1998-2014 Glenn Randers-Pehrson" PNG_STRING_NEWLINE \
Glenn Randers-Pehrson43aaf6e2008-08-05 22:17:03 -0500778 "Copyright (c) 1996-1997 Andreas Dilger" PNG_STRING_NEWLINE \
779 "Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc." \
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500780 PNG_STRING_NEWLINE;
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600781# else
Glenn Randers-Pehrsond5201df2014-04-20 20:16:56 -0500782 return "libpng version 1.6.11beta05 - April 21, 2014\
Glenn Randers-Pehrson95a19732013-12-31 21:10:13 -0600783 Copyright (c) 1998-2014 Glenn Randers-Pehrson\
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500784 Copyright (c) 1996-1997 Andreas Dilger\
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500785 Copyright (c) 1995-1996 Guy Eric Schalnat, Group 42, Inc.";
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600786# endif
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500787#endif
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -0600788}
Glenn Randers-Pehrsonbcfd15d1999-10-01 14:22:25 -0500789
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600790/* The following return the library version as a short string in the
Glenn Randers-Pehrson5b5dcf82004-07-17 22:45:44 -0500791 * format 1.0.0 through 99.99.99zz. To get the version of *.h files
792 * used with your application, print out PNG_LIBPNG_VER_STRING, which
793 * is defined in png.h.
794 * Note: now there is no difference between png_get_libpng_ver() and
795 * png_get_header_ver(). Due to the version_nn_nn_nn typedef guard,
796 * it is guaranteed that png.c uses the correct version of png.h.
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600797 */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500798png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600799png_get_libpng_ver(png_const_structrp png_ptr)
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600800{
801 /* Version of *.c files used when building libpng */
Glenn Randers-Pehrson4c8f7262010-03-16 19:30:01 -0500802 return png_get_header_ver(png_ptr);
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600803}
804
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500805png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600806png_get_header_ver(png_const_structrp png_ptr)
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600807{
808 /* Version of *.h files used when building libpng */
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600809 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500810 return PNG_LIBPNG_VER_STRING;
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600811}
812
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500813png_const_charp PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600814png_get_header_version(png_const_structrp png_ptr)
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600815{
816 /* Returns longer string containing both version and date */
Glenn Randers-Pehrsond546f432010-12-04 20:41:36 -0600817 PNG_UNUSED(png_ptr) /* Silence compiler warning about unused png_ptr */
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500818#ifdef __STDC__
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500819 return PNG_HEADER_VERSION_STRING
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600820# ifndef PNG_READ_SUPPORTED
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500821 " (NO READ SUPPORT)"
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -0600822# endif
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500823 PNG_STRING_NEWLINE;
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500824#else
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -0500825 return PNG_HEADER_VERSION_STRING;
Glenn Randers-Pehrsone0784c72008-08-09 07:11:44 -0500826#endif
Glenn Randers-Pehrson5379b241999-11-27 10:22:33 -0600827}
828
John Bowlerc10930a2013-12-19 15:24:06 -0600829#ifdef PNG_BUILD_GRAYSCALE_PALETTE_SUPPORTED
830/* NOTE: this routine is not used internally! */
831/* Build a grayscale palette. Palette is assumed to be 1 << bit_depth
832 * large of png_color. This lets grayscale images be treated as
833 * paletted. Most useful for gamma correction and simplification
834 * of code. This API is not used internally.
835 */
836void PNGAPI
837png_build_grayscale_palette(int bit_depth, png_colorp palette)
838{
839 int num_palette;
840 int color_inc;
841 int i;
842 int v;
843
844 png_debug(1, "in png_do_build_grayscale_palette");
845
846 if (palette == NULL)
847 return;
848
849 switch (bit_depth)
850 {
851 case 1:
852 num_palette = 2;
853 color_inc = 0xff;
854 break;
855
856 case 2:
857 num_palette = 4;
858 color_inc = 0x55;
859 break;
860
861 case 4:
862 num_palette = 16;
863 color_inc = 0x11;
864 break;
865
866 case 8:
867 num_palette = 256;
868 color_inc = 1;
869 break;
870
871 default:
872 num_palette = 0;
873 color_inc = 0;
874 break;
875 }
876
877 for (i = 0, v = 0; i < num_palette; i++, v += color_inc)
878 {
879 palette[i].red = (png_byte)v;
880 palette[i].green = (png_byte)v;
881 palette[i].blue = (png_byte)v;
882 }
883}
884#endif
885
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600886#ifdef PNG_SET_UNKNOWN_CHUNKS_SUPPORTED
Glenn Randers-Pehrsonc1bfe682002-03-06 22:08:00 -0600887int PNGAPI
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600888png_handle_as_unknown(png_const_structrp png_ptr, png_const_bytep chunk_name)
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600889{
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500890 /* Check chunk_name and return "keep" value if it's on the list, else 0 */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500891 png_const_bytep p, p_end;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500892
John Bowlerfcd301d2011-12-28 21:34:27 -0600893 if (png_ptr == NULL || chunk_name == NULL || png_ptr->num_chunk_list == 0)
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500894 return PNG_HANDLE_CHUNK_AS_DEFAULT;
895
896 p_end = png_ptr->chunk_list;
897 p = p_end + png_ptr->num_chunk_list*5; /* beyond end */
898
899 /* The code is the fifth byte after each four byte string. Historically this
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600900 * code was always searched from the end of the list, this is no longer
901 * necessary because the 'set' routine handles duplicate entries correcty.
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500902 */
903 do /* num_chunk_list > 0, so at least one */
904 {
905 p -= 5;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600906
907 if (!memcmp(chunk_name, p, 4))
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500908 return p[4];
909 }
910 while (p > p_end);
911
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600912 /* This means that known chunks should be processed and unknown chunks should
913 * be handled according to the value of png_ptr->unknown_default; this can be
914 * confusing because, as a result, there are two levels of defaulting for
915 * unknown chunks.
916 */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500917 return PNG_HANDLE_CHUNK_AS_DEFAULT;
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -0600918}
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500919
John Bowler15a80442013-09-21 10:06:32 -0500920#if defined(PNG_READ_UNKNOWN_CHUNKS_SUPPORTED) ||\
921 defined(PNG_HANDLE_AS_UNKNOWN_SUPPORTED)
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500922int /* PRIVATE */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600923png_chunk_unknown_handling(png_const_structrp png_ptr, png_uint_32 chunk_name)
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500924{
925 png_byte chunk_string[5];
926
927 PNG_CSTRING_FROM_CHUNK(chunk_string, chunk_name);
928 return png_handle_as_unknown(png_ptr, chunk_string);
929}
John Bowler15a80442013-09-21 10:06:32 -0500930#endif /* READ_UNKNOWN_CHUNKS || HANDLE_AS_UNKNOWN */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600931#endif /* SET_UNKNOWN_CHUNKS */
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500932
Glenn Randers-Pehrsonf10fa3c2010-04-29 08:25:29 -0500933#ifdef PNG_READ_SUPPORTED
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500934/* This function, added to libpng-1.0.6g, is untested. */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500935int PNGAPI
John Bowler5d567862011-12-24 09:12:00 -0600936png_reset_zstream(png_structrp png_ptr)
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500937{
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500938 if (png_ptr == NULL)
939 return Z_STREAM_ERROR;
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -0500940
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600941 /* WARNING: this resets the window bits to the maximum! */
Glenn Randers-Pehrson228bd392000-04-23 23:14:02 -0500942 return (inflateReset(&png_ptr->zstream));
943}
Glenn Randers-Pehrson2b8bef12010-04-29 11:50:24 -0500944#endif /* PNG_READ_SUPPORTED */
Glenn Randers-Pehrson1ef65b62000-05-12 06:19:53 -0500945
Glenn Randers-Pehrson5e5c1e12000-11-10 12:26:19 -0600946/* This function was added to libpng-1.0.7 */
Glenn Randers-Pehrson1ef65b62000-05-12 06:19:53 -0500947png_uint_32 PNGAPI
948png_access_version_number(void)
949{
950 /* Version of *.c files used when building libpng */
Glenn Randers-Pehrsond2332872010-10-12 19:19:28 -0500951 return((png_uint_32)PNG_LIBPNG_VER);
Glenn Randers-Pehrson1ef65b62000-05-12 06:19:53 -0500952}
Glenn Randers-Pehrson231e6872001-01-12 15:13:06 -0600953
Glenn Randers-Pehrson1fd5fb32001-05-06 05:34:26 -0500954
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500955
956#if defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -0600957/* Ensure that png_ptr->zstream.msg holds some appropriate error message string.
958 * If it doesn't 'ret' is used to set it to something appropriate, even in cases
959 * like Z_OK or Z_STREAM_END where the error code is apparently a success code.
960 */
961void /* PRIVATE */
962png_zstream_error(png_structrp png_ptr, int ret)
963{
964 /* Translate 'ret' into an appropriate error string, priority is given to the
965 * one in zstream if set. This always returns a string, even in cases like
966 * Z_OK or Z_STREAM_END where the error code is a success code.
967 */
968 if (png_ptr->zstream.msg == NULL) switch (ret)
969 {
970 default:
971 case Z_OK:
972 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected zlib return code");
973 break;
974
975 case Z_STREAM_END:
976 /* Normal exit */
977 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected end of LZ stream");
978 break;
979
980 case Z_NEED_DICT:
981 /* This means the deflate stream did not have a dictionary; this
982 * indicates a bogus PNG.
983 */
984 png_ptr->zstream.msg = PNGZ_MSG_CAST("missing LZ dictionary");
985 break;
986
987 case Z_ERRNO:
988 /* gz APIs only: should not happen */
989 png_ptr->zstream.msg = PNGZ_MSG_CAST("zlib IO error");
990 break;
991
992 case Z_STREAM_ERROR:
993 /* internal libpng error */
994 png_ptr->zstream.msg = PNGZ_MSG_CAST("bad parameters to zlib");
995 break;
996
997 case Z_DATA_ERROR:
998 png_ptr->zstream.msg = PNGZ_MSG_CAST("damaged LZ stream");
999 break;
1000
1001 case Z_MEM_ERROR:
1002 png_ptr->zstream.msg = PNGZ_MSG_CAST("insufficient memory");
1003 break;
1004
1005 case Z_BUF_ERROR:
1006 /* End of input or output; not a problem if the caller is doing
1007 * incremental read or write.
1008 */
1009 png_ptr->zstream.msg = PNGZ_MSG_CAST("truncated");
1010 break;
1011
1012 case Z_VERSION_ERROR:
1013 png_ptr->zstream.msg = PNGZ_MSG_CAST("unsupported zlib version");
1014 break;
1015
1016 case PNG_UNEXPECTED_ZLIB_RETURN:
1017 /* Compile errors here mean that zlib now uses the value co-opted in
1018 * pngpriv.h for PNG_UNEXPECTED_ZLIB_RETURN; update the switch above
1019 * and change pngpriv.h. Note that this message is "... return",
1020 * whereas the default/Z_OK one is "... return code".
1021 */
1022 png_ptr->zstream.msg = PNGZ_MSG_CAST("unexpected zlib return");
1023 break;
1024 }
1025}
1026
John Bowler736f40f2011-08-25 16:19:44 -05001027/* png_convert_size: a PNGAPI but no longer in png.h, so deleted
1028 * at libpng 1.5.5!
1029 */
Glenn Randers-Pehrsonf7831012008-11-13 06:05:13 -06001030
Glenn Randers-Pehrson02a5e332008-11-24 22:10:23 -06001031/* Added at libpng version 1.2.34 and 1.4.0 (moved from pngset.c) */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001032#ifdef PNG_GAMMA_SUPPORTED /* always set if COLORSPACE */
1033static int
1034png_colorspace_check_gamma(png_const_structrp png_ptr,
1035 png_colorspacerp colorspace, png_fixed_point gAMA, int from)
1036 /* This is called to check a new gamma value against an existing one. The
1037 * routine returns false if the new gamma value should not be written.
1038 *
1039 * 'from' says where the new gamma value comes from:
1040 *
1041 * 0: the new gamma value is the libpng estimate for an ICC profile
1042 * 1: the new gamma value comes from a gAMA chunk
1043 * 2: the new gamma value comes from an sRGB chunk
John Bowlerb98681b2012-09-04 11:19:00 -05001044 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001045{
1046 png_fixed_point gtest;
1047
1048 if ((colorspace->flags & PNG_COLORSPACE_HAVE_GAMMA) != 0 &&
1049 (!png_muldiv(&gtest, colorspace->gamma, PNG_FP_1, gAMA) ||
1050 png_gamma_significant(gtest)))
John Bowlerb11b31a2012-03-21 07:55:46 -05001051 {
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001052 /* Either this is an sRGB image, in which case the calculated gamma
1053 * approximation should match, or this is an image with a profile and the
1054 * value libpng calculates for the gamma of the profile does not match the
1055 * value recorded in the file. The former, sRGB, case is an error, the
1056 * latter is just a warning.
1057 */
1058 if ((colorspace->flags & PNG_COLORSPACE_FROM_sRGB) != 0 || from == 2)
1059 {
1060 png_chunk_report(png_ptr, "gamma value does not match sRGB",
1061 PNG_CHUNK_ERROR);
1062 /* Do not overwrite an sRGB value */
1063 return from == 2;
1064 }
1065
1066 else /* sRGB tag not involved */
1067 {
1068 png_chunk_report(png_ptr, "gamma value does not match libpng estimate",
1069 PNG_CHUNK_WARNING);
1070 return from == 1;
1071 }
John Bowlerb11b31a2012-03-21 07:55:46 -05001072 }
1073
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001074 return 1;
John Bowlerb11b31a2012-03-21 07:55:46 -05001075}
1076
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001077void /* PRIVATE */
1078png_colorspace_set_gamma(png_const_structrp png_ptr,
1079 png_colorspacerp colorspace, png_fixed_point gAMA)
1080{
1081 /* Changed in libpng-1.5.4 to limit the values to ensure overflow can't
1082 * occur. Since the fixed point representation is assymetrical it is
1083 * possible for 1/gamma to overflow the limit of 21474 and this means the
1084 * gamma value must be at least 5/100000 and hence at most 20000.0. For
1085 * safety the limits here are a little narrower. The values are 0.00016 to
1086 * 6250.0, which are truly ridiculous gamma values (and will produce
1087 * displays that are all black or all white.)
1088 *
1089 * In 1.6.0 this test replaces the ones in pngrutil.c, in the gAMA chunk
1090 * handling code, which only required the value to be >0.
1091 */
1092 png_const_charp errmsg;
1093
1094 if (gAMA < 16 || gAMA > 625000000)
1095 errmsg = "gamma value out of range";
1096
1097# ifdef PNG_READ_gAMA_SUPPORTED
1098 /* Allow the application to set the gamma value more than once */
1099 else if ((png_ptr->mode & PNG_IS_READ_STRUCT) != 0 &&
1100 (colorspace->flags & PNG_COLORSPACE_FROM_gAMA) != 0)
1101 errmsg = "duplicate";
1102# endif
1103
1104 /* Do nothing if the colorspace is already invalid */
1105 else if (colorspace->flags & PNG_COLORSPACE_INVALID)
1106 return;
1107
1108 else
1109 {
1110 if (png_colorspace_check_gamma(png_ptr, colorspace, gAMA, 1/*from gAMA*/))
1111 {
1112 /* Store this gamma value. */
1113 colorspace->gamma = gAMA;
1114 colorspace->flags |=
1115 (PNG_COLORSPACE_HAVE_GAMMA | PNG_COLORSPACE_FROM_gAMA);
1116 }
1117
1118 /* At present if the check_gamma test fails the gamma of the colorspace is
1119 * not updated however the colorspace is not invalidated. This
1120 * corresponds to the case where the existing gamma comes from an sRGB
1121 * chunk or profile. An error message has already been output.
1122 */
1123 return;
1124 }
1125
1126 /* Error exit - errmsg has been set. */
1127 colorspace->flags |= PNG_COLORSPACE_INVALID;
1128 png_chunk_report(png_ptr, errmsg, PNG_CHUNK_WRITE_ERROR);
1129}
1130
1131void /* PRIVATE */
1132png_colorspace_sync_info(png_const_structrp png_ptr, png_inforp info_ptr)
1133{
1134 if (info_ptr->colorspace.flags & PNG_COLORSPACE_INVALID)
1135 {
1136 /* Everything is invalid */
1137 info_ptr->valid &= ~(PNG_INFO_gAMA|PNG_INFO_cHRM|PNG_INFO_sRGB|
1138 PNG_INFO_iCCP);
1139
1140# ifdef PNG_COLORSPACE_SUPPORTED
1141 /* Clean up the iCCP profile now if it won't be used. */
1142 png_free_data(png_ptr, info_ptr, PNG_FREE_ICCP, -1/*not used*/);
1143# else
1144 PNG_UNUSED(png_ptr)
1145# endif
1146 }
1147
1148 else
1149 {
1150# ifdef PNG_COLORSPACE_SUPPORTED
1151 /* Leave the INFO_iCCP flag set if the pngset.c code has already set
1152 * it; this allows a PNG to contain a profile which matches sRGB and
1153 * yet still have that profile retrievable by the application.
1154 */
1155 if (info_ptr->colorspace.flags & PNG_COLORSPACE_MATCHES_sRGB)
1156 info_ptr->valid |= PNG_INFO_sRGB;
1157
1158 else
1159 info_ptr->valid &= ~PNG_INFO_sRGB;
1160
1161 if (info_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_ENDPOINTS)
1162 info_ptr->valid |= PNG_INFO_cHRM;
1163
1164 else
1165 info_ptr->valid &= ~PNG_INFO_cHRM;
1166# endif
1167
1168 if (info_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_GAMMA)
1169 info_ptr->valid |= PNG_INFO_gAMA;
1170
1171 else
1172 info_ptr->valid &= ~PNG_INFO_gAMA;
1173 }
1174}
1175
1176#ifdef PNG_READ_SUPPORTED
1177void /* PRIVATE */
1178png_colorspace_sync(png_const_structrp png_ptr, png_inforp info_ptr)
1179{
1180 if (info_ptr == NULL) /* reduce code size; check here not in the caller */
1181 return;
1182
1183 info_ptr->colorspace = png_ptr->colorspace;
1184 png_colorspace_sync_info(png_ptr, info_ptr);
1185}
1186#endif
1187#endif
1188
1189#ifdef PNG_COLORSPACE_SUPPORTED
John Bowler736f40f2011-08-25 16:19:44 -05001190/* Added at libpng-1.5.5 to support read and write of true CIEXYZ values for
1191 * cHRM, as opposed to using chromaticities. These internal APIs return
1192 * non-zero on a parameter error. The X, Y and Z values are required to be
1193 * positive and less than 1.0.
1194 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001195static int
1196png_xy_from_XYZ(png_xy *xy, const png_XYZ *XYZ)
John Bowler736f40f2011-08-25 16:19:44 -05001197{
1198 png_int_32 d, dwhite, whiteX, whiteY;
1199
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001200 d = XYZ->red_X + XYZ->red_Y + XYZ->red_Z;
1201 if (!png_muldiv(&xy->redx, XYZ->red_X, PNG_FP_1, d)) return 1;
1202 if (!png_muldiv(&xy->redy, XYZ->red_Y, PNG_FP_1, d)) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001203 dwhite = d;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001204 whiteX = XYZ->red_X;
1205 whiteY = XYZ->red_Y;
John Bowler736f40f2011-08-25 16:19:44 -05001206
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001207 d = XYZ->green_X + XYZ->green_Y + XYZ->green_Z;
1208 if (!png_muldiv(&xy->greenx, XYZ->green_X, PNG_FP_1, d)) return 1;
1209 if (!png_muldiv(&xy->greeny, XYZ->green_Y, PNG_FP_1, d)) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001210 dwhite += d;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001211 whiteX += XYZ->green_X;
1212 whiteY += XYZ->green_Y;
John Bowler736f40f2011-08-25 16:19:44 -05001213
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001214 d = XYZ->blue_X + XYZ->blue_Y + XYZ->blue_Z;
1215 if (!png_muldiv(&xy->bluex, XYZ->blue_X, PNG_FP_1, d)) return 1;
1216 if (!png_muldiv(&xy->bluey, XYZ->blue_Y, PNG_FP_1, d)) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001217 dwhite += d;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001218 whiteX += XYZ->blue_X;
1219 whiteY += XYZ->blue_Y;
John Bowler736f40f2011-08-25 16:19:44 -05001220
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001221 /* The reference white is simply the sum of the end-point (X,Y,Z) vectors,
John Bowler736f40f2011-08-25 16:19:44 -05001222 * thus:
1223 */
1224 if (!png_muldiv(&xy->whitex, whiteX, PNG_FP_1, dwhite)) return 1;
1225 if (!png_muldiv(&xy->whitey, whiteY, PNG_FP_1, dwhite)) return 1;
1226
1227 return 0;
1228}
1229
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001230static int
1231png_XYZ_from_xy(png_XYZ *XYZ, const png_xy *xy)
John Bowler736f40f2011-08-25 16:19:44 -05001232{
1233 png_fixed_point red_inverse, green_inverse, blue_scale;
1234 png_fixed_point left, right, denominator;
1235
1236 /* Check xy and, implicitly, z. Note that wide gamut color spaces typically
1237 * have end points with 0 tristimulus values (these are impossible end
1238 * points, but they are used to cover the possible colors.)
1239 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001240 if (xy->redx < 0 || xy->redx > PNG_FP_1) return 1;
1241 if (xy->redy < 0 || xy->redy > PNG_FP_1-xy->redx) return 1;
1242 if (xy->greenx < 0 || xy->greenx > PNG_FP_1) return 1;
1243 if (xy->greeny < 0 || xy->greeny > PNG_FP_1-xy->greenx) return 1;
1244 if (xy->bluex < 0 || xy->bluex > PNG_FP_1) return 1;
1245 if (xy->bluey < 0 || xy->bluey > PNG_FP_1-xy->bluex) return 1;
1246 if (xy->whitex < 0 || xy->whitex > PNG_FP_1) return 1;
1247 if (xy->whitey < 0 || xy->whitey > PNG_FP_1-xy->whitex) return 1;
John Bowler736f40f2011-08-25 16:19:44 -05001248
1249 /* The reverse calculation is more difficult because the original tristimulus
1250 * value had 9 independent values (red,green,blue)x(X,Y,Z) however only 8
1251 * derived values were recorded in the cHRM chunk;
1252 * (red,green,blue,white)x(x,y). This loses one degree of freedom and
1253 * therefore an arbitrary ninth value has to be introduced to undo the
1254 * original transformations.
1255 *
1256 * Think of the original end-points as points in (X,Y,Z) space. The
1257 * chromaticity values (c) have the property:
1258 *
1259 * C
1260 * c = ---------
1261 * X + Y + Z
1262 *
1263 * For each c (x,y,z) from the corresponding original C (X,Y,Z). Thus the
1264 * three chromaticity values (x,y,z) for each end-point obey the
1265 * relationship:
1266 *
1267 * x + y + z = 1
1268 *
1269 * This describes the plane in (X,Y,Z) space that intersects each axis at the
1270 * value 1.0; call this the chromaticity plane. Thus the chromaticity
1271 * calculation has scaled each end-point so that it is on the x+y+z=1 plane
1272 * and chromaticity is the intersection of the vector from the origin to the
1273 * (X,Y,Z) value with the chromaticity plane.
1274 *
1275 * To fully invert the chromaticity calculation we would need the three
1276 * end-point scale factors, (red-scale, green-scale, blue-scale), but these
1277 * were not recorded. Instead we calculated the reference white (X,Y,Z) and
1278 * recorded the chromaticity of this. The reference white (X,Y,Z) would have
1279 * given all three of the scale factors since:
1280 *
1281 * color-C = color-c * color-scale
1282 * white-C = red-C + green-C + blue-C
1283 * = red-c*red-scale + green-c*green-scale + blue-c*blue-scale
1284 *
1285 * But cHRM records only white-x and white-y, so we have lost the white scale
1286 * factor:
1287 *
1288 * white-C = white-c*white-scale
1289 *
1290 * To handle this the inverse transformation makes an arbitrary assumption
1291 * about white-scale:
1292 *
1293 * Assume: white-Y = 1.0
1294 * Hence: white-scale = 1/white-y
1295 * Or: red-Y + green-Y + blue-Y = 1.0
1296 *
1297 * Notice the last statement of the assumption gives an equation in three of
1298 * the nine values we want to calculate. 8 more equations come from the
1299 * above routine as summarised at the top above (the chromaticity
1300 * calculation):
1301 *
1302 * Given: color-x = color-X / (color-X + color-Y + color-Z)
1303 * Hence: (color-x - 1)*color-X + color.x*color-Y + color.x*color-Z = 0
1304 *
1305 * This is 9 simultaneous equations in the 9 variables "color-C" and can be
1306 * solved by Cramer's rule. Cramer's rule requires calculating 10 9x9 matrix
1307 * determinants, however this is not as bad as it seems because only 28 of
1308 * the total of 90 terms in the various matrices are non-zero. Nevertheless
1309 * Cramer's rule is notoriously numerically unstable because the determinant
1310 * calculation involves the difference of large, but similar, numbers. It is
1311 * difficult to be sure that the calculation is stable for real world values
1312 * and it is certain that it becomes unstable where the end points are close
1313 * together.
1314 *
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001315 * So this code uses the perhaps slightly less optimal but more
1316 * understandable and totally obvious approach of calculating color-scale.
John Bowler736f40f2011-08-25 16:19:44 -05001317 *
1318 * This algorithm depends on the precision in white-scale and that is
1319 * (1/white-y), so we can immediately see that as white-y approaches 0 the
1320 * accuracy inherent in the cHRM chunk drops off substantially.
1321 *
1322 * libpng arithmetic: a simple invertion of the above equations
1323 * ------------------------------------------------------------
1324 *
1325 * white_scale = 1/white-y
1326 * white-X = white-x * white-scale
1327 * white-Y = 1.0
1328 * white-Z = (1 - white-x - white-y) * white_scale
1329 *
1330 * white-C = red-C + green-C + blue-C
1331 * = red-c*red-scale + green-c*green-scale + blue-c*blue-scale
1332 *
1333 * This gives us three equations in (red-scale,green-scale,blue-scale) where
1334 * all the coefficients are now known:
1335 *
1336 * red-x*red-scale + green-x*green-scale + blue-x*blue-scale
1337 * = white-x/white-y
1338 * red-y*red-scale + green-y*green-scale + blue-y*blue-scale = 1
1339 * red-z*red-scale + green-z*green-scale + blue-z*blue-scale
1340 * = (1 - white-x - white-y)/white-y
1341 *
1342 * In the last equation color-z is (1 - color-x - color-y) so we can add all
1343 * three equations together to get an alternative third:
1344 *
1345 * red-scale + green-scale + blue-scale = 1/white-y = white-scale
1346 *
1347 * So now we have a Cramer's rule solution where the determinants are just
1348 * 3x3 - far more tractible. Unfortunately 3x3 determinants still involve
1349 * multiplication of three coefficients so we can't guarantee to avoid
1350 * overflow in the libpng fixed point representation. Using Cramer's rule in
1351 * floating point is probably a good choice here, but it's not an option for
1352 * fixed point. Instead proceed to simplify the first two equations by
1353 * eliminating what is likely to be the largest value, blue-scale:
1354 *
1355 * blue-scale = white-scale - red-scale - green-scale
1356 *
1357 * Hence:
1358 *
1359 * (red-x - blue-x)*red-scale + (green-x - blue-x)*green-scale =
1360 * (white-x - blue-x)*white-scale
1361 *
1362 * (red-y - blue-y)*red-scale + (green-y - blue-y)*green-scale =
1363 * 1 - blue-y*white-scale
1364 *
1365 * And now we can trivially solve for (red-scale,green-scale):
1366 *
1367 * green-scale =
1368 * (white-x - blue-x)*white-scale - (red-x - blue-x)*red-scale
1369 * -----------------------------------------------------------
1370 * green-x - blue-x
1371 *
1372 * red-scale =
1373 * 1 - blue-y*white-scale - (green-y - blue-y) * green-scale
1374 * ---------------------------------------------------------
1375 * red-y - blue-y
1376 *
1377 * Hence:
1378 *
1379 * red-scale =
1380 * ( (green-x - blue-x) * (white-y - blue-y) -
1381 * (green-y - blue-y) * (white-x - blue-x) ) / white-y
1382 * -------------------------------------------------------------------------
1383 * (green-x - blue-x)*(red-y - blue-y)-(green-y - blue-y)*(red-x - blue-x)
1384 *
1385 * green-scale =
1386 * ( (red-y - blue-y) * (white-x - blue-x) -
1387 * (red-x - blue-x) * (white-y - blue-y) ) / white-y
1388 * -------------------------------------------------------------------------
1389 * (green-x - blue-x)*(red-y - blue-y)-(green-y - blue-y)*(red-x - blue-x)
1390 *
1391 * Accuracy:
1392 * The input values have 5 decimal digits of accuracy. The values are all in
1393 * the range 0 < value < 1, so simple products are in the same range but may
1394 * need up to 10 decimal digits to preserve the original precision and avoid
1395 * underflow. Because we are using a 32-bit signed representation we cannot
1396 * match this; the best is a little over 9 decimal digits, less than 10.
1397 *
1398 * The approach used here is to preserve the maximum precision within the
1399 * signed representation. Because the red-scale calculation above uses the
1400 * difference between two products of values that must be in the range -1..+1
1401 * it is sufficient to divide the product by 7; ceil(100,000/32767*2). The
1402 * factor is irrelevant in the calculation because it is applied to both
1403 * numerator and denominator.
1404 *
1405 * Note that the values of the differences of the products of the
1406 * chromaticities in the above equations tend to be small, for example for
1407 * the sRGB chromaticities they are:
1408 *
1409 * red numerator: -0.04751
1410 * green numerator: -0.08788
1411 * denominator: -0.2241 (without white-y multiplication)
1412 *
1413 * The resultant Y coefficients from the chromaticities of some widely used
1414 * color space definitions are (to 15 decimal places):
1415 *
1416 * sRGB
1417 * 0.212639005871510 0.715168678767756 0.072192315360734
1418 * Kodak ProPhoto
1419 * 0.288071128229293 0.711843217810102 0.000085653960605
1420 * Adobe RGB
1421 * 0.297344975250536 0.627363566255466 0.075291458493998
1422 * Adobe Wide Gamut RGB
1423 * 0.258728243040113 0.724682314948566 0.016589442011321
1424 */
1425 /* By the argument, above overflow should be impossible here. The return
1426 * value of 2 indicates an internal error to the caller.
1427 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001428 if (!png_muldiv(&left, xy->greenx-xy->bluex, xy->redy - xy->bluey, 7))
1429 return 2;
1430 if (!png_muldiv(&right, xy->greeny-xy->bluey, xy->redx - xy->bluex, 7))
1431 return 2;
John Bowler736f40f2011-08-25 16:19:44 -05001432 denominator = left - right;
1433
1434 /* Now find the red numerator. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001435 if (!png_muldiv(&left, xy->greenx-xy->bluex, xy->whitey-xy->bluey, 7))
1436 return 2;
1437 if (!png_muldiv(&right, xy->greeny-xy->bluey, xy->whitex-xy->bluex, 7))
1438 return 2;
John Bowler736f40f2011-08-25 16:19:44 -05001439
1440 /* Overflow is possible here and it indicates an extreme set of PNG cHRM
1441 * chunk values. This calculation actually returns the reciprocal of the
1442 * scale value because this allows us to delay the multiplication of white-y
1443 * into the denominator, which tends to produce a small number.
1444 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001445 if (!png_muldiv(&red_inverse, xy->whitey, denominator, left-right) ||
1446 red_inverse <= xy->whitey /* r+g+b scales = white scale */)
John Bowler736f40f2011-08-25 16:19:44 -05001447 return 1;
1448
1449 /* Similarly for green_inverse: */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001450 if (!png_muldiv(&left, xy->redy-xy->bluey, xy->whitex-xy->bluex, 7))
1451 return 2;
1452 if (!png_muldiv(&right, xy->redx-xy->bluex, xy->whitey-xy->bluey, 7))
1453 return 2;
1454 if (!png_muldiv(&green_inverse, xy->whitey, denominator, left-right) ||
1455 green_inverse <= xy->whitey)
John Bowler736f40f2011-08-25 16:19:44 -05001456 return 1;
1457
1458 /* And the blue scale, the checks above guarantee this can't overflow but it
1459 * can still produce 0 for extreme cHRM values.
1460 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001461 blue_scale = png_reciprocal(xy->whitey) - png_reciprocal(red_inverse) -
John Bowler736f40f2011-08-25 16:19:44 -05001462 png_reciprocal(green_inverse);
1463 if (blue_scale <= 0) return 1;
1464
1465
1466 /* And fill in the png_XYZ: */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001467 if (!png_muldiv(&XYZ->red_X, xy->redx, PNG_FP_1, red_inverse)) return 1;
1468 if (!png_muldiv(&XYZ->red_Y, xy->redy, PNG_FP_1, red_inverse)) return 1;
1469 if (!png_muldiv(&XYZ->red_Z, PNG_FP_1 - xy->redx - xy->redy, PNG_FP_1,
John Bowler736f40f2011-08-25 16:19:44 -05001470 red_inverse))
1471 return 1;
1472
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001473 if (!png_muldiv(&XYZ->green_X, xy->greenx, PNG_FP_1, green_inverse))
1474 return 1;
1475 if (!png_muldiv(&XYZ->green_Y, xy->greeny, PNG_FP_1, green_inverse))
1476 return 1;
1477 if (!png_muldiv(&XYZ->green_Z, PNG_FP_1 - xy->greenx - xy->greeny, PNG_FP_1,
John Bowler736f40f2011-08-25 16:19:44 -05001478 green_inverse))
1479 return 1;
1480
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001481 if (!png_muldiv(&XYZ->blue_X, xy->bluex, blue_scale, PNG_FP_1)) return 1;
1482 if (!png_muldiv(&XYZ->blue_Y, xy->bluey, blue_scale, PNG_FP_1)) return 1;
1483 if (!png_muldiv(&XYZ->blue_Z, PNG_FP_1 - xy->bluex - xy->bluey, blue_scale,
John Bowler736f40f2011-08-25 16:19:44 -05001484 PNG_FP_1))
1485 return 1;
1486
1487 return 0; /*success*/
1488}
1489
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001490static int
1491png_XYZ_normalize(png_XYZ *XYZ)
John Bowler736f40f2011-08-25 16:19:44 -05001492{
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001493 png_int_32 Y;
1494
1495 if (XYZ->red_Y < 0 || XYZ->green_Y < 0 || XYZ->blue_Y < 0 ||
1496 XYZ->red_X < 0 || XYZ->green_X < 0 || XYZ->blue_X < 0 ||
1497 XYZ->red_Z < 0 || XYZ->green_Z < 0 || XYZ->blue_Z < 0)
1498 return 1;
1499
1500 /* Normalize by scaling so the sum of the end-point Y values is PNG_FP_1.
1501 * IMPLEMENTATION NOTE: ANSI requires signed overflow not to occur, therefore
1502 * relying on addition of two positive values producing a negative one is not
1503 * safe.
1504 */
1505 Y = XYZ->red_Y;
1506 if (0x7fffffff - Y < XYZ->green_X) return 1;
1507 Y += XYZ->green_Y;
1508 if (0x7fffffff - Y < XYZ->blue_X) return 1;
1509 Y += XYZ->blue_Y;
1510
1511 if (Y != PNG_FP_1)
1512 {
1513 if (!png_muldiv(&XYZ->red_X, XYZ->red_X, PNG_FP_1, Y)) return 1;
1514 if (!png_muldiv(&XYZ->red_Y, XYZ->red_Y, PNG_FP_1, Y)) return 1;
1515 if (!png_muldiv(&XYZ->red_Z, XYZ->red_Z, PNG_FP_1, Y)) return 1;
1516
1517 if (!png_muldiv(&XYZ->green_X, XYZ->green_X, PNG_FP_1, Y)) return 1;
1518 if (!png_muldiv(&XYZ->green_Y, XYZ->green_Y, PNG_FP_1, Y)) return 1;
1519 if (!png_muldiv(&XYZ->green_Z, XYZ->green_Z, PNG_FP_1, Y)) return 1;
1520
1521 if (!png_muldiv(&XYZ->blue_X, XYZ->blue_X, PNG_FP_1, Y)) return 1;
1522 if (!png_muldiv(&XYZ->blue_Y, XYZ->blue_Y, PNG_FP_1, Y)) return 1;
1523 if (!png_muldiv(&XYZ->blue_Z, XYZ->blue_Z, PNG_FP_1, Y)) return 1;
1524 }
1525
1526 return 0;
1527}
1528
1529static int
1530png_colorspace_endpoints_match(const png_xy *xy1, const png_xy *xy2, int delta)
1531{
1532 /* Allow an error of +/-0.01 (absolute value) on each chromaticity */
1533 return !(PNG_OUT_OF_RANGE(xy1->whitex, xy2->whitex,delta) ||
1534 PNG_OUT_OF_RANGE(xy1->whitey, xy2->whitey,delta) ||
1535 PNG_OUT_OF_RANGE(xy1->redx, xy2->redx, delta) ||
1536 PNG_OUT_OF_RANGE(xy1->redy, xy2->redy, delta) ||
1537 PNG_OUT_OF_RANGE(xy1->greenx, xy2->greenx,delta) ||
1538 PNG_OUT_OF_RANGE(xy1->greeny, xy2->greeny,delta) ||
1539 PNG_OUT_OF_RANGE(xy1->bluex, xy2->bluex, delta) ||
1540 PNG_OUT_OF_RANGE(xy1->bluey, xy2->bluey, delta));
1541}
1542
1543/* Added in libpng-1.6.0, a different check for the validity of a set of cHRM
1544 * chunk chromaticities. Earlier checks used to simply look for the overflow
1545 * condition (where the determinant of the matrix to solve for XYZ ends up zero
1546 * because the chromaticity values are not all distinct.) Despite this it is
1547 * theoretically possible to produce chromaticities that are apparently valid
1548 * but that rapidly degrade to invalid, potentially crashing, sets because of
1549 * arithmetic inaccuracies when calculations are performed on them. The new
1550 * check is to round-trip xy -> XYZ -> xy and then check that the result is
1551 * within a small percentage of the original.
1552 */
1553static int
1554png_colorspace_check_xy(png_XYZ *XYZ, const png_xy *xy)
1555{
1556 int result;
1557 png_xy xy_test;
1558
1559 /* As a side-effect this routine also returns the XYZ endpoints. */
1560 result = png_XYZ_from_xy(XYZ, xy);
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06001561 if (result != 0) return result;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001562
1563 result = png_xy_from_XYZ(&xy_test, XYZ);
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06001564 if (result != 0) return result;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001565
1566 if (png_colorspace_endpoints_match(xy, &xy_test,
1567 5/*actually, the math is pretty accurate*/))
1568 return 0;
1569
1570 /* Too much slip */
1571 return 1;
1572}
1573
1574/* This is the check going the other way. The XYZ is modified to normalize it
1575 * (another side-effect) and the xy chromaticities are returned.
1576 */
1577static int
1578png_colorspace_check_XYZ(png_xy *xy, png_XYZ *XYZ)
1579{
1580 int result;
1581 png_XYZ XYZtemp;
1582
1583 result = png_XYZ_normalize(XYZ);
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06001584 if (result != 0) return result;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001585
1586 result = png_xy_from_XYZ(xy, XYZ);
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06001587 if (result != 0) return result;
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001588
1589 XYZtemp = *XYZ;
1590 return png_colorspace_check_xy(&XYZtemp, xy);
1591}
1592
1593/* Used to check for an endpoint match against sRGB */
1594static const png_xy sRGB_xy = /* From ITU-R BT.709-3 */
1595{
1596 /* color x y */
1597 /* red */ 64000, 33000,
1598 /* green */ 30000, 60000,
1599 /* blue */ 15000, 6000,
1600 /* white */ 31270, 32900
1601};
1602
1603static int
1604png_colorspace_set_xy_and_XYZ(png_const_structrp png_ptr,
1605 png_colorspacerp colorspace, const png_xy *xy, const png_XYZ *XYZ,
1606 int preferred)
1607{
1608 if (colorspace->flags & PNG_COLORSPACE_INVALID)
1609 return 0;
1610
1611 /* The consistency check is performed on the chromaticities; this factors out
1612 * variations because of the normalization (or not) of the end point Y
1613 * values.
1614 */
1615 if (preferred < 2 && (colorspace->flags & PNG_COLORSPACE_HAVE_ENDPOINTS))
1616 {
1617 /* The end points must be reasonably close to any we already have. The
1618 * following allows an error of up to +/-.001
1619 */
1620 if (!png_colorspace_endpoints_match(xy, &colorspace->end_points_xy, 100))
1621 {
1622 colorspace->flags |= PNG_COLORSPACE_INVALID;
1623 png_benign_error(png_ptr, "inconsistent chromaticities");
1624 return 0; /* failed */
1625 }
1626
1627 /* Only overwrite with preferred values */
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06001628 if (preferred == 0)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001629 return 1; /* ok, but no change */
1630 }
1631
1632 colorspace->end_points_xy = *xy;
1633 colorspace->end_points_XYZ = *XYZ;
1634 colorspace->flags |= PNG_COLORSPACE_HAVE_ENDPOINTS;
1635
1636 /* The end points are normally quoted to two decimal digits, so allow +/-0.01
1637 * on this test.
1638 */
1639 if (png_colorspace_endpoints_match(xy, &sRGB_xy, 1000))
1640 colorspace->flags |= PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB;
1641
1642 else
1643 colorspace->flags &= PNG_COLORSPACE_CANCEL(
1644 PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB);
1645
1646 return 2; /* ok and changed */
1647}
1648
1649int /* PRIVATE */
1650png_colorspace_set_chromaticities(png_const_structrp png_ptr,
1651 png_colorspacerp colorspace, const png_xy *xy, int preferred)
1652{
1653 /* We must check the end points to ensure they are reasonable - in the past
1654 * color management systems have crashed as a result of getting bogus
1655 * colorant values, while this isn't the fault of libpng it is the
1656 * responsibility of libpng because PNG carries the bomb and libpng is in a
1657 * position to protect against it.
1658 */
1659 png_XYZ XYZ;
1660
1661 switch (png_colorspace_check_xy(&XYZ, xy))
John Bowler736f40f2011-08-25 16:19:44 -05001662 {
1663 case 0: /* success */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001664 return png_colorspace_set_xy_and_XYZ(png_ptr, colorspace, xy, &XYZ,
1665 preferred);
John Bowler736f40f2011-08-25 16:19:44 -05001666
1667 case 1:
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001668 /* We can't invert the chromaticities so we can't produce value XYZ
1669 * values. Likely as not a color management system will fail too.
John Bowler736f40f2011-08-25 16:19:44 -05001670 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001671 colorspace->flags |= PNG_COLORSPACE_INVALID;
1672 png_benign_error(png_ptr, "invalid chromaticities");
John Bowler736f40f2011-08-25 16:19:44 -05001673 break;
1674
1675 default:
1676 /* libpng is broken; this should be a warning but if it happens we
1677 * want error reports so for the moment it is an error.
1678 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001679 colorspace->flags |= PNG_COLORSPACE_INVALID;
1680 png_error(png_ptr, "internal error checking chromaticities");
John Bowler736f40f2011-08-25 16:19:44 -05001681 break;
1682 }
1683
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001684 return 0; /* failed */
1685}
1686
1687int /* PRIVATE */
1688png_colorspace_set_endpoints(png_const_structrp png_ptr,
1689 png_colorspacerp colorspace, const png_XYZ *XYZ_in, int preferred)
1690{
1691 png_XYZ XYZ = *XYZ_in;
1692 png_xy xy;
1693
1694 switch (png_colorspace_check_XYZ(&xy, &XYZ))
1695 {
1696 case 0:
1697 return png_colorspace_set_xy_and_XYZ(png_ptr, colorspace, &xy, &XYZ,
1698 preferred);
1699
1700 case 1:
1701 /* End points are invalid. */
1702 colorspace->flags |= PNG_COLORSPACE_INVALID;
1703 png_benign_error(png_ptr, "invalid end points");
1704 break;
1705
1706 default:
1707 colorspace->flags |= PNG_COLORSPACE_INVALID;
1708 png_error(png_ptr, "internal error checking chromaticities");
1709 break;
1710 }
1711
1712 return 0; /* failed */
1713}
1714
1715#if defined(PNG_sRGB_SUPPORTED) || defined(PNG_iCCP_SUPPORTED)
1716/* Error message generation */
1717static char
1718png_icc_tag_char(png_uint_32 byte)
1719{
1720 byte &= 0xff;
1721 if (byte >= 32 && byte <= 126)
1722 return (char)byte;
1723 else
1724 return '?';
1725}
1726
1727static void
1728png_icc_tag_name(char *name, png_uint_32 tag)
1729{
1730 name[0] = '\'';
1731 name[1] = png_icc_tag_char(tag >> 24);
1732 name[2] = png_icc_tag_char(tag >> 16);
1733 name[3] = png_icc_tag_char(tag >> 8);
1734 name[4] = png_icc_tag_char(tag );
1735 name[5] = '\'';
1736}
1737
1738static int
1739is_ICC_signature_char(png_alloc_size_t it)
1740{
1741 return it == 32 || (it >= 48 && it <= 57) || (it >= 65 && it <= 90) ||
1742 (it >= 97 && it <= 122);
1743}
1744
Glenn Randers-Pehrson24afd072014-03-05 16:55:19 -06001745static int
1746is_ICC_signature(png_alloc_size_t it)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001747{
1748 return is_ICC_signature_char(it >> 24) /* checks all the top bits */ &&
1749 is_ICC_signature_char((it >> 16) & 0xff) &&
1750 is_ICC_signature_char((it >> 8) & 0xff) &&
1751 is_ICC_signature_char(it & 0xff);
1752}
1753
1754static int
1755png_icc_profile_error(png_const_structrp png_ptr, png_colorspacerp colorspace,
1756 png_const_charp name, png_alloc_size_t value, png_const_charp reason)
1757{
1758 size_t pos;
1759 char message[196]; /* see below for calculation */
1760
1761 if (colorspace != NULL)
1762 colorspace->flags |= PNG_COLORSPACE_INVALID;
1763
1764 pos = png_safecat(message, (sizeof message), 0, "profile '"); /* 9 chars */
1765 pos = png_safecat(message, pos+79, pos, name); /* Truncate to 79 chars */
1766 pos = png_safecat(message, (sizeof message), pos, "': "); /* +2 = 90 */
1767 if (is_ICC_signature(value))
1768 {
1769 /* So 'value' is at most 4 bytes and the following cast is safe */
1770 png_icc_tag_name(message+pos, (png_uint_32)value);
1771 pos += 6; /* total +8; less than the else clause */
1772 message[pos++] = ':';
1773 message[pos++] = ' ';
1774 }
1775# ifdef PNG_WARNINGS_SUPPORTED
1776 else
1777 {
1778 char number[PNG_NUMBER_BUFFER_SIZE]; /* +24 = 114*/
1779
1780 pos = png_safecat(message, (sizeof message), pos,
1781 png_format_number(number, number+(sizeof number),
1782 PNG_NUMBER_FORMAT_x, value));
1783 pos = png_safecat(message, (sizeof message), pos, "h: "); /*+2 = 116*/
1784 }
1785# endif
1786 /* The 'reason' is an arbitrary message, allow +79 maximum 195 */
1787 pos = png_safecat(message, (sizeof message), pos, reason);
Glenn Randers-Pehrson3f8a2ed2013-11-25 10:38:21 -06001788 PNG_UNUSED(pos)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001789
1790 /* This is recoverable, but make it unconditionally an app_error on write to
1791 * avoid writing invalid ICC profiles into PNG files. (I.e. we handle them
1792 * on read, with a warning, but on write unless the app turns off
1793 * application errors the PNG won't be written.)
1794 */
1795 png_chunk_report(png_ptr, message,
1796 (colorspace != NULL) ? PNG_CHUNK_ERROR : PNG_CHUNK_WRITE_ERROR);
1797
John Bowler736f40f2011-08-25 16:19:44 -05001798 return 0;
1799}
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001800#endif /* sRGB || iCCP */
1801
1802#ifdef PNG_sRGB_SUPPORTED
1803int /* PRIVATE */
1804png_colorspace_set_sRGB(png_const_structrp png_ptr, png_colorspacerp colorspace,
1805 int intent)
1806{
1807 /* sRGB sets known gamma, end points and (from the chunk) intent. */
1808 /* IMPORTANT: these are not necessarily the values found in an ICC profile
1809 * because ICC profiles store values adapted to a D50 environment; it is
1810 * expected that the ICC profile mediaWhitePointTag will be D50, see the
1811 * checks and code elsewhere to understand this better.
1812 *
1813 * These XYZ values, which are accurate to 5dp, produce rgb to gray
1814 * coefficients of (6968,23435,2366), which are reduced (because they add up
1815 * to 32769 not 32768) to (6968,23434,2366). These are the values that
1816 * libpng has traditionally used (and are the best values given the 15bit
1817 * algorithm used by the rgb to gray code.)
1818 */
1819 static const png_XYZ sRGB_XYZ = /* D65 XYZ (*not* the D50 adapted values!) */
1820 {
1821 /* color X Y Z */
1822 /* red */ 41239, 21264, 1933,
1823 /* green */ 35758, 71517, 11919,
1824 /* blue */ 18048, 7219, 95053
1825 };
1826
1827 /* Do nothing if the colorspace is already invalidated. */
1828 if (colorspace->flags & PNG_COLORSPACE_INVALID)
1829 return 0;
1830
1831 /* Check the intent, then check for existing settings. It is valid for the
1832 * PNG file to have cHRM or gAMA chunks along with sRGB, but the values must
1833 * be consistent with the correct values. If, however, this function is
1834 * called below because an iCCP chunk matches sRGB then it is quite
1835 * conceivable that an older app recorded incorrect gAMA and cHRM because of
1836 * an incorrect calculation based on the values in the profile - this does
1837 * *not* invalidate the profile (though it still produces an error, which can
1838 * be ignored.)
1839 */
1840 if (intent < 0 || intent >= PNG_sRGB_INTENT_LAST)
1841 return png_icc_profile_error(png_ptr, colorspace, "sRGB",
1842 (unsigned)intent, "invalid sRGB rendering intent");
1843
1844 if ((colorspace->flags & PNG_COLORSPACE_HAVE_INTENT) != 0 &&
1845 colorspace->rendering_intent != intent)
1846 return png_icc_profile_error(png_ptr, colorspace, "sRGB",
1847 (unsigned)intent, "inconsistent rendering intents");
1848
1849 if ((colorspace->flags & PNG_COLORSPACE_FROM_sRGB) != 0)
1850 {
1851 png_benign_error(png_ptr, "duplicate sRGB information ignored");
1852 return 0;
1853 }
1854
1855 /* If the standard sRGB cHRM chunk does not match the one from the PNG file
1856 * warn but overwrite the value with the correct one.
1857 */
1858 if ((colorspace->flags & PNG_COLORSPACE_HAVE_ENDPOINTS) != 0 &&
1859 !png_colorspace_endpoints_match(&sRGB_xy, &colorspace->end_points_xy,
1860 100))
1861 png_chunk_report(png_ptr, "cHRM chunk does not match sRGB",
1862 PNG_CHUNK_ERROR);
1863
1864 /* This check is just done for the error reporting - the routine always
1865 * returns true when the 'from' argument corresponds to sRGB (2).
1866 */
1867 (void)png_colorspace_check_gamma(png_ptr, colorspace, PNG_GAMMA_sRGB_INVERSE,
1868 2/*from sRGB*/);
1869
1870 /* intent: bugs in GCC force 'int' to be used as the parameter type. */
1871 colorspace->rendering_intent = (png_uint_16)intent;
1872 colorspace->flags |= PNG_COLORSPACE_HAVE_INTENT;
1873
1874 /* endpoints */
1875 colorspace->end_points_xy = sRGB_xy;
1876 colorspace->end_points_XYZ = sRGB_XYZ;
1877 colorspace->flags |=
1878 (PNG_COLORSPACE_HAVE_ENDPOINTS|PNG_COLORSPACE_ENDPOINTS_MATCH_sRGB);
1879
1880 /* gamma */
1881 colorspace->gamma = PNG_GAMMA_sRGB_INVERSE;
1882 colorspace->flags |= PNG_COLORSPACE_HAVE_GAMMA;
1883
1884 /* Finally record that we have an sRGB profile */
1885 colorspace->flags |=
1886 (PNG_COLORSPACE_MATCHES_sRGB|PNG_COLORSPACE_FROM_sRGB);
1887
1888 return 1; /* set */
1889}
1890#endif /* sRGB */
1891
1892#ifdef PNG_iCCP_SUPPORTED
1893/* Encoded value of D50 as an ICC XYZNumber. From the ICC 2010 spec the value
1894 * is XYZ(0.9642,1.0,0.8249), which scales to:
1895 *
1896 * (63189.8112, 65536, 54060.6464)
1897 */
1898static const png_byte D50_nCIEXYZ[12] =
1899 { 0x00, 0x00, 0xf6, 0xd6, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0xd3, 0x2d };
1900
1901int /* PRIVATE */
1902png_icc_check_length(png_const_structrp png_ptr, png_colorspacerp colorspace,
1903 png_const_charp name, png_uint_32 profile_length)
1904{
1905 if (profile_length < 132)
1906 return png_icc_profile_error(png_ptr, colorspace, name, profile_length,
1907 "too short");
1908
1909 if (profile_length & 3)
1910 return png_icc_profile_error(png_ptr, colorspace, name, profile_length,
1911 "invalid length");
1912
1913 return 1;
1914}
1915
1916int /* PRIVATE */
1917png_icc_check_header(png_const_structrp png_ptr, png_colorspacerp colorspace,
1918 png_const_charp name, png_uint_32 profile_length,
1919 png_const_bytep profile/* first 132 bytes only */, int color_type)
1920{
1921 png_uint_32 temp;
1922
1923 /* Length check; this cannot be ignored in this code because profile_length
1924 * is used later to check the tag table, so even if the profile seems over
1925 * long profile_length from the caller must be correct. The caller can fix
1926 * this up on read or write by just passing in the profile header length.
1927 */
1928 temp = png_get_uint_32(profile);
1929 if (temp != profile_length)
1930 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1931 "length does not match profile");
1932
1933 temp = png_get_uint_32(profile+128); /* tag count: 12 bytes/tag */
Glenn Randers-Pehrson67a289f2013-04-19 19:03:34 -05001934 if (temp > 357913930 || /* (2^32-4-132)/12: maximum possible tag count */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06001935 profile_length < 132+12*temp) /* truncated tag table */
1936 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1937 "tag count too large");
1938
1939 /* The 'intent' must be valid or we can't store it, ICC limits the intent to
1940 * 16 bits.
1941 */
1942 temp = png_get_uint_32(profile+64);
1943 if (temp >= 0xffff) /* The ICC limit */
1944 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1945 "invalid rendering intent");
1946
1947 /* This is just a warning because the profile may be valid in future
1948 * versions.
1949 */
1950 if (temp >= PNG_sRGB_INTENT_LAST)
1951 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
1952 "intent outside defined range");
1953
1954 /* At this point the tag table can't be checked because it hasn't necessarily
1955 * been loaded; however, various header fields can be checked. These checks
1956 * are for values permitted by the PNG spec in an ICC profile; the PNG spec
1957 * restricts the profiles that can be passed in an iCCP chunk (they must be
1958 * appropriate to processing PNG data!)
1959 */
1960
1961 /* Data checks (could be skipped). These checks must be independent of the
1962 * version number; however, the version number doesn't accomodate changes in
1963 * the header fields (just the known tags and the interpretation of the
1964 * data.)
1965 */
1966 temp = png_get_uint_32(profile+36); /* signature 'ascp' */
1967 if (temp != 0x61637370)
1968 return png_icc_profile_error(png_ptr, colorspace, name, temp,
1969 "invalid signature");
1970
1971 /* Currently the PCS illuminant/adopted white point (the computational
1972 * white point) are required to be D50,
1973 * however the profile contains a record of the illuminant so perhaps ICC
1974 * expects to be able to change this in the future (despite the rationale in
1975 * the introduction for using a fixed PCS adopted white.) Consequently the
1976 * following is just a warning.
1977 */
1978 if (memcmp(profile+68, D50_nCIEXYZ, 12) != 0)
1979 (void)png_icc_profile_error(png_ptr, NULL, name, 0/*no tag value*/,
1980 "PCS illuminant is not D50");
1981
1982 /* The PNG spec requires this:
1983 * "If the iCCP chunk is present, the image samples conform to the colour
1984 * space represented by the embedded ICC profile as defined by the
1985 * International Color Consortium [ICC]. The colour space of the ICC profile
1986 * shall be an RGB colour space for colour images (PNG colour types 2, 3, and
1987 * 6), or a greyscale colour space for greyscale images (PNG colour types 0
1988 * and 4)."
1989 *
1990 * This checking code ensures the embedded profile (on either read or write)
1991 * conforms to the specification requirements. Notice that an ICC 'gray'
1992 * color-space profile contains the information to transform the monochrome
1993 * data to XYZ or L*a*b (according to which PCS the profile uses) and this
1994 * should be used in preference to the standard libpng K channel replication
1995 * into R, G and B channels.
1996 *
1997 * Previously it was suggested that an RGB profile on grayscale data could be
1998 * handled. However it it is clear that using an RGB profile in this context
1999 * must be an error - there is no specification of what it means. Thus it is
2000 * almost certainly more correct to ignore the profile.
2001 */
2002 temp = png_get_uint_32(profile+16); /* data colour space field */
2003 switch (temp)
2004 {
2005 case 0x52474220: /* 'RGB ' */
2006 if (!(color_type & PNG_COLOR_MASK_COLOR))
2007 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2008 "RGB color space not permitted on grayscale PNG");
2009 break;
2010
2011 case 0x47524159: /* 'GRAY' */
2012 if (color_type & PNG_COLOR_MASK_COLOR)
2013 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2014 "Gray color space not permitted on RGB PNG");
2015 break;
2016
2017 default:
2018 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2019 "invalid ICC profile color space");
2020 }
2021
2022 /* It is up to the application to check that the profile class matches the
2023 * application requirements; the spec provides no guidance, but it's pretty
2024 * weird if the profile is not scanner ('scnr'), monitor ('mntr'), printer
2025 * ('prtr') or 'spac' (for generic color spaces). Issue a warning in these
2026 * cases. Issue an error for device link or abstract profiles - these don't
2027 * contain the records necessary to transform the color-space to anything
2028 * other than the target device (and not even that for an abstract profile).
2029 * Profiles of these classes may not be embedded in images.
2030 */
2031 temp = png_get_uint_32(profile+12); /* profile/device class */
2032 switch (temp)
2033 {
2034 case 0x73636E72: /* 'scnr' */
2035 case 0x6D6E7472: /* 'mntr' */
2036 case 0x70727472: /* 'prtr' */
2037 case 0x73706163: /* 'spac' */
2038 /* All supported */
2039 break;
2040
2041 case 0x61627374: /* 'abst' */
2042 /* May not be embedded in an image */
2043 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2044 "invalid embedded Abstract ICC profile");
2045
2046 case 0x6C696E6B: /* 'link' */
2047 /* DeviceLink profiles cannnot be interpreted in a non-device specific
2048 * fashion, if an app uses the AToB0Tag in the profile the results are
2049 * undefined unless the result is sent to the intended device,
2050 * therefore a DeviceLink profile should not be found embedded in a
2051 * PNG.
2052 */
2053 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2054 "unexpected DeviceLink ICC profile class");
2055
2056 case 0x6E6D636C: /* 'nmcl' */
2057 /* A NamedColor profile is also device specific, however it doesn't
2058 * contain an AToB0 tag that is open to misintrepretation. Almost
2059 * certainly it will fail the tests below.
2060 */
2061 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
2062 "unexpected NamedColor ICC profile class");
2063 break;
2064
2065 default:
2066 /* To allow for future enhancements to the profile accept unrecognized
2067 * profile classes with a warning, these then hit the test below on the
2068 * tag content to ensure they are backward compatible with one of the
2069 * understood profiles.
2070 */
2071 (void)png_icc_profile_error(png_ptr, NULL, name, temp,
2072 "unrecognized ICC profile class");
2073 break;
2074 }
2075
2076 /* For any profile other than a device link one the PCS must be encoded
2077 * either in XYZ or Lab.
2078 */
2079 temp = png_get_uint_32(profile+20);
2080 switch (temp)
2081 {
2082 case 0x58595A20: /* 'XYZ ' */
2083 case 0x4C616220: /* 'Lab ' */
2084 break;
2085
2086 default:
2087 return png_icc_profile_error(png_ptr, colorspace, name, temp,
2088 "unexpected ICC PCS encoding");
2089 }
2090
2091 return 1;
2092}
2093
2094int /* PRIVATE */
2095png_icc_check_tag_table(png_const_structrp png_ptr, png_colorspacerp colorspace,
2096 png_const_charp name, png_uint_32 profile_length,
2097 png_const_bytep profile /* header plus whole tag table */)
2098{
2099 png_uint_32 tag_count = png_get_uint_32(profile+128);
2100 png_uint_32 itag;
2101 png_const_bytep tag = profile+132; /* The first tag */
2102
2103 /* First scan all the tags in the table and add bits to the icc_info value
2104 * (temporarily in 'tags').
2105 */
2106 for (itag=0; itag < tag_count; ++itag, tag += 12)
2107 {
2108 png_uint_32 tag_id = png_get_uint_32(tag+0);
2109 png_uint_32 tag_start = png_get_uint_32(tag+4); /* must be aligned */
2110 png_uint_32 tag_length = png_get_uint_32(tag+8);/* not padded */
2111
2112 /* The ICC specification does not exclude zero length tags, therefore the
2113 * start might actually be anywhere if there is no data, but this would be
2114 * a clear abuse of the intent of the standard so the start is checked for
2115 * being in range. All defined tag types have an 8 byte header - a 4 byte
2116 * type signature then 0.
2117 */
2118 if ((tag_start & 3) != 0)
2119 {
2120 /* CNHP730S.icc shipped with Microsoft Windows 64 violates this, it is
2121 * only a warning here because libpng does not care about the
2122 * alignment.
2123 */
2124 (void)png_icc_profile_error(png_ptr, NULL, name, tag_id,
2125 "ICC profile tag start not a multiple of 4");
2126 }
2127
2128 /* This is a hard error; potentially it can cause read outside the
2129 * profile.
2130 */
2131 if (tag_start > profile_length || tag_length > profile_length - tag_start)
2132 return png_icc_profile_error(png_ptr, colorspace, name, tag_id,
2133 "ICC profile tag outside profile");
2134 }
2135
2136 return 1; /* success, maybe with warnings */
2137}
2138
Glenn Randers-Pehrson0ace9f52014-04-20 20:06:14 -05002139#if defined(PNG_sRGB_SUPPORTED) && PNG_sRGB_PROFILE_CHECKS >= 0
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002140/* Information about the known ICC sRGB profiles */
2141static const struct
2142{
2143 png_uint_32 adler, crc, length;
2144 png_uint_32 md5[4];
2145 png_byte have_md5;
2146 png_byte is_broken;
2147 png_uint_16 intent;
2148
2149# define PNG_MD5(a,b,c,d) { a, b, c, d }, (a!=0)||(b!=0)||(c!=0)||(d!=0)
2150# define PNG_ICC_CHECKSUM(adler, crc, md5, intent, broke, date, length, fname)\
2151 { adler, crc, length, md5, broke, intent },
2152
2153} png_sRGB_checks[] =
2154{
2155 /* This data comes from contrib/tools/checksum-icc run on downloads of
2156 * all four ICC sRGB profiles from www.color.org.
2157 */
2158 /* adler32, crc32, MD5[4], intent, date, length, file-name */
2159 PNG_ICC_CHECKSUM(0x0a3fd9f6, 0x3b8772b9,
2160 PNG_MD5(0x29f83dde, 0xaff255ae, 0x7842fae4, 0xca83390d), 0, 0,
2161 "2009/03/27 21:36:31", 3048, "sRGB_IEC61966-2-1_black_scaled.icc")
2162
2163 /* ICC sRGB v2 perceptual no black-compensation: */
2164 PNG_ICC_CHECKSUM(0x4909e5e1, 0x427ebb21,
2165 PNG_MD5(0xc95bd637, 0xe95d8a3b, 0x0df38f99, 0xc1320389), 1, 0,
2166 "2009/03/27 21:37:45", 3052, "sRGB_IEC61966-2-1_no_black_scaling.icc")
2167
2168 PNG_ICC_CHECKSUM(0xfd2144a1, 0x306fd8ae,
2169 PNG_MD5(0xfc663378, 0x37e2886b, 0xfd72e983, 0x8228f1b8), 0, 0,
2170 "2009/08/10 17:28:01", 60988, "sRGB_v4_ICC_preference_displayclass.icc")
2171
2172 /* ICC sRGB v4 perceptual */
2173 PNG_ICC_CHECKSUM(0x209c35d2, 0xbbef7812,
2174 PNG_MD5(0x34562abf, 0x994ccd06, 0x6d2c5721, 0xd0d68c5d), 0, 0,
2175 "2007/07/25 00:05:37", 60960, "sRGB_v4_ICC_preference.icc")
2176
2177 /* The following profiles have no known MD5 checksum. If there is a match
2178 * on the (empty) MD5 the other fields are used to attempt a match and
2179 * a warning is produced. The first two of these profiles have a 'cprt' tag
2180 * which suggests that they were also made by Hewlett Packard.
2181 */
2182 PNG_ICC_CHECKSUM(0xa054d762, 0x5d5129ce,
2183 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 1, 0,
2184 "2004/07/21 18:57:42", 3024, "sRGB_IEC61966-2-1_noBPC.icc")
2185
2186 /* This is a 'mntr' (display) profile with a mediaWhitePointTag that does not
2187 * match the D50 PCS illuminant in the header (it is in fact the D65 values,
2188 * so the white point is recorded as the un-adapted value.) The profiles
2189 * below only differ in one byte - the intent - and are basically the same as
2190 * the previous profile except for the mediaWhitePointTag error and a missing
2191 * chromaticAdaptationTag.
2192 */
2193 PNG_ICC_CHECKSUM(0xf784f3fb, 0x182ea552,
2194 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 0, 1/*broken*/,
2195 "1998/02/09 06:49:00", 3144, "HP-Microsoft sRGB v2 perceptual")
2196
2197 PNG_ICC_CHECKSUM(0x0398f3fc, 0xf29e526d,
2198 PNG_MD5(0x00000000, 0x00000000, 0x00000000, 0x00000000), 1, 1/*broken*/,
2199 "1998/02/09 06:49:00", 3144, "HP-Microsoft sRGB v2 media-relative")
2200};
2201
2202static int
2203png_compare_ICC_profile_with_sRGB(png_const_structrp png_ptr,
2204 png_const_bytep profile, uLong adler)
2205{
2206 /* The quick check is to verify just the MD5 signature and trust the
2207 * rest of the data. Because the profile has already been verified for
2208 * correctness this is safe. png_colorspace_set_sRGB will check the 'intent'
2209 * field too, so if the profile has been edited with an intent not defined
2210 * by sRGB (but maybe defined by a later ICC specification) the read of
2211 * the profile will fail at that point.
2212 */
2213 png_uint_32 length = 0;
2214 png_uint_32 intent = 0x10000; /* invalid */
2215#if PNG_sRGB_PROFILE_CHECKS > 1
2216 uLong crc = 0; /* the value for 0 length data */
John Bowler921648a2012-03-28 23:36:12 -05002217#endif
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002218 unsigned int i;
2219
2220 for (i=0; i < (sizeof png_sRGB_checks) / (sizeof png_sRGB_checks[0]); ++i)
2221 {
2222 if (png_get_uint_32(profile+84) == png_sRGB_checks[i].md5[0] &&
2223 png_get_uint_32(profile+88) == png_sRGB_checks[i].md5[1] &&
2224 png_get_uint_32(profile+92) == png_sRGB_checks[i].md5[2] &&
2225 png_get_uint_32(profile+96) == png_sRGB_checks[i].md5[3])
2226 {
2227 /* This may be one of the old HP profiles without an MD5, in that
2228 * case we can only use the length and Adler32 (note that these
2229 * are not used by default if there is an MD5!)
2230 */
2231# if PNG_sRGB_PROFILE_CHECKS == 0
2232 if (png_sRGB_checks[i].have_md5)
2233 return 1+png_sRGB_checks[i].is_broken;
2234# endif
2235
2236 /* Profile is unsigned or more checks have been configured in. */
2237 if (length == 0)
2238 {
2239 length = png_get_uint_32(profile);
2240 intent = png_get_uint_32(profile+64);
2241 }
2242
2243 /* Length *and* intent must match */
2244 if (length == png_sRGB_checks[i].length &&
2245 intent == png_sRGB_checks[i].intent)
2246 {
Glenn Randers-Pehrson1f24cb72013-03-04 21:58:02 -06002247 /* Now calculate the adler32 if not done already. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002248 if (adler == 0)
2249 {
2250 adler = adler32(0, NULL, 0);
2251 adler = adler32(adler, profile, length);
2252 }
2253
2254 if (adler == png_sRGB_checks[i].adler)
2255 {
2256 /* These basic checks suggest that the data has not been
2257 * modified, but if the check level is more than 1 perform
2258 * our own crc32 checksum on the data.
2259 */
2260# if PNG_sRGB_PROFILE_CHECKS > 1
2261 if (crc == 0)
2262 {
2263 crc = crc32(0, NULL, 0);
2264 crc = crc32(crc, profile, length);
2265 }
2266
2267 /* So this check must pass for the 'return' below to happen.
2268 */
2269 if (crc == png_sRGB_checks[i].crc)
2270# endif
2271 {
2272 if (png_sRGB_checks[i].is_broken)
2273 {
2274 /* These profiles are known to have bad data that may cause
2275 * problems if they are used, therefore attempt to
2276 * discourage their use, skip the 'have_md5' warning below,
2277 * which is made irrelevant by this error.
2278 */
2279 png_chunk_report(png_ptr, "known incorrect sRGB profile",
2280 PNG_CHUNK_ERROR);
2281 }
2282
2283 /* Warn that this being done; this isn't even an error since
2284 * the profile is perfectly valid, but it would be nice if
2285 * people used the up-to-date ones.
2286 */
2287 else if (!png_sRGB_checks[i].have_md5)
2288 {
2289 png_chunk_report(png_ptr,
2290 "out-of-date sRGB profile with no signature",
2291 PNG_CHUNK_WARNING);
2292 }
2293
2294 return 1+png_sRGB_checks[i].is_broken;
2295 }
2296 }
2297 }
2298
Glenn Randers-Pehrsonab56b742014-02-27 08:00:17 -06002299# if PNG_sRGB_PROFILE_CHECKS > 0
Glenn Randers-Pehrsone3ae5832014-02-22 22:22:15 -06002300 /* The signature matched, but the profile had been changed in some
2301 * way. This probably indicates a data error or uninformed hacking.
2302 * Fall through to "no match".
2303 */
2304 png_chunk_report(png_ptr,
2305 "Not recognizing known sRGB profile that has been edited",
2306 PNG_CHUNK_WARNING);
2307 break;
Glenn Randers-Pehrsonab56b742014-02-27 08:00:17 -06002308# endif
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002309 }
2310 }
2311
2312 return 0; /* no match */
2313}
2314#endif
2315
2316#ifdef PNG_sRGB_SUPPORTED
2317void /* PRIVATE */
2318png_icc_set_sRGB(png_const_structrp png_ptr,
2319 png_colorspacerp colorspace, png_const_bytep profile, uLong adler)
2320{
2321 /* Is this profile one of the known ICC sRGB profiles? If it is, just set
2322 * the sRGB information.
2323 */
Glenn Randers-Pehrson0ace9f52014-04-20 20:06:14 -05002324#if PNG_sRGB_PROFILE_CHECKS >= 0
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002325 if (png_compare_ICC_profile_with_sRGB(png_ptr, profile, adler))
Glenn Randers-Pehrson0ace9f52014-04-20 20:06:14 -05002326#endif
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002327 (void)png_colorspace_set_sRGB(png_ptr, colorspace,
2328 (int)/*already checked*/png_get_uint_32(profile+64));
2329}
2330#endif /* PNG_READ_sRGB_SUPPORTED */
2331
2332int /* PRIVATE */
2333png_colorspace_set_ICC(png_const_structrp png_ptr, png_colorspacerp colorspace,
2334 png_const_charp name, png_uint_32 profile_length, png_const_bytep profile,
2335 int color_type)
2336{
2337 if (colorspace->flags & PNG_COLORSPACE_INVALID)
2338 return 0;
2339
2340 if (png_icc_check_length(png_ptr, colorspace, name, profile_length) &&
2341 png_icc_check_header(png_ptr, colorspace, name, profile_length, profile,
2342 color_type) &&
2343 png_icc_check_tag_table(png_ptr, colorspace, name, profile_length,
2344 profile))
2345 {
John Bowlere4413a72013-04-17 21:27:47 -05002346# ifdef PNG_sRGB_SUPPORTED
2347 /* If no sRGB support, don't try storing sRGB information */
2348 png_icc_set_sRGB(png_ptr, colorspace, profile, 0);
2349# endif
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002350 return 1;
2351 }
2352
2353 /* Failure case */
2354 return 0;
2355}
2356#endif /* iCCP */
2357
2358#ifdef PNG_READ_RGB_TO_GRAY_SUPPORTED
2359void /* PRIVATE */
2360png_colorspace_set_rgb_coefficients(png_structrp png_ptr)
2361{
2362 /* Set the rgb_to_gray coefficients from the colorspace. */
2363 if (!png_ptr->rgb_to_gray_coefficients_set &&
2364 (png_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_ENDPOINTS) != 0)
2365 {
2366 /* png_set_background has not been called, get the coefficients from the Y
2367 * values of the colorspace colorants.
2368 */
2369 png_fixed_point r = png_ptr->colorspace.end_points_XYZ.red_Y;
2370 png_fixed_point g = png_ptr->colorspace.end_points_XYZ.green_Y;
2371 png_fixed_point b = png_ptr->colorspace.end_points_XYZ.blue_Y;
2372 png_fixed_point total = r+g+b;
2373
2374 if (total > 0 &&
2375 r >= 0 && png_muldiv(&r, r, 32768, total) && r >= 0 && r <= 32768 &&
2376 g >= 0 && png_muldiv(&g, g, 32768, total) && g >= 0 && g <= 32768 &&
2377 b >= 0 && png_muldiv(&b, b, 32768, total) && b >= 0 && b <= 32768 &&
2378 r+g+b <= 32769)
2379 {
2380 /* We allow 0 coefficients here. r+g+b may be 32769 if two or
2381 * all of the coefficients were rounded up. Handle this by
2382 * reducing the *largest* coefficient by 1; this matches the
2383 * approach used for the default coefficients in pngrtran.c
2384 */
2385 int add = 0;
2386
2387 if (r+g+b > 32768)
2388 add = -1;
2389 else if (r+g+b < 32768)
2390 add = 1;
2391
2392 if (add != 0)
2393 {
2394 if (g >= r && g >= b)
2395 g += add;
2396 else if (r >= g && r >= b)
2397 r += add;
2398 else
2399 b += add;
2400 }
2401
2402 /* Check for an internal error. */
2403 if (r+g+b != 32768)
2404 png_error(png_ptr,
2405 "internal error handling cHRM coefficients");
2406
2407 else
2408 {
2409 png_ptr->rgb_to_gray_red_coeff = (png_uint_16)r;
2410 png_ptr->rgb_to_gray_green_coeff = (png_uint_16)g;
2411 }
2412 }
2413
2414 /* This is a png_error at present even though it could be ignored -
2415 * it should never happen, but it is important that if it does, the
2416 * bug is fixed.
2417 */
2418 else
2419 png_error(png_ptr, "internal error handling cHRM->XYZ");
2420 }
2421}
2422#endif
2423
2424#endif /* COLORSPACE */
John Bowlerb11b31a2012-03-21 07:55:46 -05002425
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002426void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06002427png_check_IHDR(png_const_structrp png_ptr,
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002428 png_uint_32 width, png_uint_32 height, int bit_depth,
2429 int color_type, int interlace_type, int compression_type,
2430 int filter_type)
2431{
2432 int error = 0;
2433
2434 /* Check for width and height valid values */
2435 if (width == 0)
2436 {
2437 png_warning(png_ptr, "Image width is zero in IHDR");
2438 error = 1;
2439 }
Cosmin Trutaae6eaa82014-03-22 09:39:33 -05002440 else if (width > PNG_UINT_31_MAX)
2441 {
2442 png_warning(png_ptr, "Invalid image width in IHDR");
2443 error = 1;
2444 }
2445 else
2446 {
2447# ifdef PNG_SET_USER_LIMITS_SUPPORTED
2448 if (width > png_ptr->user_width_max)
2449# else
2450 if (width > PNG_USER_WIDTH_MAX)
2451# endif
2452 {
2453 png_warning(png_ptr, "Image width exceeds user limit in IHDR");
2454 error = 1;
2455 }
2456 }
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002457
2458 if (height == 0)
2459 {
2460 png_warning(png_ptr, "Image height is zero in IHDR");
2461 error = 1;
2462 }
Cosmin Trutaae6eaa82014-03-22 09:39:33 -05002463 else if (height > PNG_UINT_31_MAX)
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002464 {
Glenn Randers-Pehrsondd66f3e2009-09-30 14:58:28 -05002465 png_warning(png_ptr, "Invalid image height in IHDR");
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002466 error = 1;
2467 }
Cosmin Trutaae6eaa82014-03-22 09:39:33 -05002468 else
2469 {
2470# ifdef PNG_SET_USER_LIMITS_SUPPORTED
2471 if (height > png_ptr->user_height_max)
2472# else
2473 if (height > PNG_USER_HEIGHT_MAX)
2474# endif
2475 {
2476 png_warning(png_ptr, "Image height exceeds user limit in IHDR");
2477 error = 1;
2478 }
2479 }
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002480
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002481 /* Check other values */
2482 if (bit_depth != 1 && bit_depth != 2 && bit_depth != 4 &&
2483 bit_depth != 8 && bit_depth != 16)
2484 {
2485 png_warning(png_ptr, "Invalid bit depth in IHDR");
2486 error = 1;
2487 }
2488
2489 if (color_type < 0 || color_type == 1 ||
2490 color_type == 5 || color_type > 6)
2491 {
2492 png_warning(png_ptr, "Invalid color type in IHDR");
2493 error = 1;
2494 }
2495
2496 if (((color_type == PNG_COLOR_TYPE_PALETTE) && bit_depth > 8) ||
2497 ((color_type == PNG_COLOR_TYPE_RGB ||
2498 color_type == PNG_COLOR_TYPE_GRAY_ALPHA ||
2499 color_type == PNG_COLOR_TYPE_RGB_ALPHA) && bit_depth < 8))
2500 {
2501 png_warning(png_ptr, "Invalid color type/bit depth combination in IHDR");
2502 error = 1;
2503 }
2504
2505 if (interlace_type >= PNG_INTERLACE_LAST)
2506 {
2507 png_warning(png_ptr, "Unknown interlace method in IHDR");
2508 error = 1;
2509 }
2510
2511 if (compression_type != PNG_COMPRESSION_TYPE_BASE)
2512 {
2513 png_warning(png_ptr, "Unknown compression method in IHDR");
2514 error = 1;
2515 }
2516
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002517# ifdef PNG_MNG_FEATURES_SUPPORTED
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002518 /* Accept filter_method 64 (intrapixel differencing) only if
2519 * 1. Libpng was compiled with PNG_MNG_FEATURES_SUPPORTED and
2520 * 2. Libpng did not read a PNG signature (this filter_method is only
2521 * used in PNG datastreams that are embedded in MNG datastreams) and
2522 * 3. The application called png_permit_mng_features with a mask that
2523 * included PNG_FLAG_MNG_FILTER_64 and
2524 * 4. The filter_method is 64 and
2525 * 5. The color_type is RGB or RGBA
2526 */
2527 if ((png_ptr->mode & PNG_HAVE_PNG_SIGNATURE) &&
2528 png_ptr->mng_features_permitted)
2529 png_warning(png_ptr, "MNG features are not allowed in a PNG datastream");
2530
2531 if (filter_type != PNG_FILTER_TYPE_BASE)
2532 {
Glenn Randers-Pehrson7ec330d2009-09-25 11:45:42 -05002533 if (!((png_ptr->mng_features_permitted & PNG_FLAG_MNG_FILTER_64) &&
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002534 (filter_type == PNG_INTRAPIXEL_DIFFERENCING) &&
2535 ((png_ptr->mode & PNG_HAVE_PNG_SIGNATURE) == 0) &&
2536 (color_type == PNG_COLOR_TYPE_RGB ||
2537 color_type == PNG_COLOR_TYPE_RGB_ALPHA)))
Glenn Randers-Pehrson7ec330d2009-09-25 11:45:42 -05002538 {
2539 png_warning(png_ptr, "Unknown filter method in IHDR");
2540 error = 1;
2541 }
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002542
Glenn Randers-Pehrson7ec330d2009-09-25 11:45:42 -05002543 if (png_ptr->mode & PNG_HAVE_PNG_SIGNATURE)
2544 {
2545 png_warning(png_ptr, "Invalid filter method in IHDR");
2546 error = 1;
2547 }
2548 }
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002549
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002550# else
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002551 if (filter_type != PNG_FILTER_TYPE_BASE)
2552 {
2553 png_warning(png_ptr, "Unknown filter method in IHDR");
2554 error = 1;
2555 }
Glenn Randers-Pehrson6f6a91a2010-03-06 13:54:59 -06002556# endif
Glenn Randers-Pehrson134bbe42009-09-24 18:10:49 -05002557
2558 if (error == 1)
2559 png_error(png_ptr, "Invalid IHDR data");
2560}
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002561
2562#if defined(PNG_sCAL_SUPPORTED) || defined(PNG_pCAL_SUPPORTED)
2563/* ASCII to fp functions */
2564/* Check an ASCII formated floating point value, see the more detailed
2565 * comments in pngpriv.h
2566 */
John Bowler8d261262011-06-18 13:37:11 -05002567/* The following is used internally to preserve the sticky flags */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002568#define png_fp_add(state, flags) ((state) |= (flags))
John Bowler8d261262011-06-18 13:37:11 -05002569#define png_fp_set(state, value) ((state) = (value) | ((state) & PNG_FP_STICKY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002570
2571int /* PRIVATE */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002572png_check_fp_number(png_const_charp string, png_size_t size, int *statep,
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002573 png_size_tp whereami)
2574{
2575 int state = *statep;
2576 png_size_t i = *whereami;
2577
2578 while (i < size)
2579 {
2580 int type;
2581 /* First find the type of the next character */
John Bowler8d261262011-06-18 13:37:11 -05002582 switch (string[i])
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002583 {
John Bowler8d261262011-06-18 13:37:11 -05002584 case 43: type = PNG_FP_SAW_SIGN; break;
2585 case 45: type = PNG_FP_SAW_SIGN + PNG_FP_NEGATIVE; break;
2586 case 46: type = PNG_FP_SAW_DOT; break;
2587 case 48: type = PNG_FP_SAW_DIGIT; break;
2588 case 49: case 50: case 51: case 52:
2589 case 53: case 54: case 55: case 56:
2590 case 57: type = PNG_FP_SAW_DIGIT + PNG_FP_NONZERO; break;
2591 case 69:
2592 case 101: type = PNG_FP_SAW_E; break;
2593 default: goto PNG_FP_End;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002594 }
2595
2596 /* Now deal with this type according to the current
2597 * state, the type is arranged to not overlap the
2598 * bits of the PNG_FP_STATE.
2599 */
John Bowler8d261262011-06-18 13:37:11 -05002600 switch ((state & PNG_FP_STATE) + (type & PNG_FP_SAW_ANY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002601 {
John Bowler8d261262011-06-18 13:37:11 -05002602 case PNG_FP_INTEGER + PNG_FP_SAW_SIGN:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002603 if (state & PNG_FP_SAW_ANY)
2604 goto PNG_FP_End; /* not a part of the number */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002605
John Bowler8d261262011-06-18 13:37:11 -05002606 png_fp_add(state, type);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002607 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002608
John Bowler8d261262011-06-18 13:37:11 -05002609 case PNG_FP_INTEGER + PNG_FP_SAW_DOT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002610 /* Ok as trailer, ok as lead of fraction. */
2611 if (state & PNG_FP_SAW_DOT) /* two dots */
2612 goto PNG_FP_End;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002613
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002614 else if (state & PNG_FP_SAW_DIGIT) /* trailing dot? */
John Bowler8d261262011-06-18 13:37:11 -05002615 png_fp_add(state, type);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002616
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002617 else
John Bowler8d261262011-06-18 13:37:11 -05002618 png_fp_set(state, PNG_FP_FRACTION | type);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002619
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002620 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002621
John Bowler8d261262011-06-18 13:37:11 -05002622 case PNG_FP_INTEGER + PNG_FP_SAW_DIGIT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002623 if (state & PNG_FP_SAW_DOT) /* delayed fraction */
2624 png_fp_set(state, PNG_FP_FRACTION | PNG_FP_SAW_DOT);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002625
John Bowler8d261262011-06-18 13:37:11 -05002626 png_fp_add(state, type | PNG_FP_WAS_VALID);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002627
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002628 break;
John Bowler8d261262011-06-18 13:37:11 -05002629
2630 case PNG_FP_INTEGER + PNG_FP_SAW_E:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002631 if ((state & PNG_FP_SAW_DIGIT) == 0)
2632 goto PNG_FP_End;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002633
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002634 png_fp_set(state, PNG_FP_EXPONENT);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002635
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002636 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002637
John Bowler8d261262011-06-18 13:37:11 -05002638 /* case PNG_FP_FRACTION + PNG_FP_SAW_SIGN:
2639 goto PNG_FP_End; ** no sign in fraction */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002640
John Bowler8d261262011-06-18 13:37:11 -05002641 /* case PNG_FP_FRACTION + PNG_FP_SAW_DOT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002642 goto PNG_FP_End; ** Because SAW_DOT is always set */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002643
John Bowler8d261262011-06-18 13:37:11 -05002644 case PNG_FP_FRACTION + PNG_FP_SAW_DIGIT:
2645 png_fp_add(state, type | PNG_FP_WAS_VALID);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002646 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002647
John Bowler8d261262011-06-18 13:37:11 -05002648 case PNG_FP_FRACTION + PNG_FP_SAW_E:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002649 /* This is correct because the trailing '.' on an
2650 * integer is handled above - so we can only get here
2651 * with the sequence ".E" (with no preceding digits).
2652 */
2653 if ((state & PNG_FP_SAW_DIGIT) == 0)
2654 goto PNG_FP_End;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002655
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002656 png_fp_set(state, PNG_FP_EXPONENT);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002657
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002658 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002659
John Bowler8d261262011-06-18 13:37:11 -05002660 case PNG_FP_EXPONENT + PNG_FP_SAW_SIGN:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002661 if (state & PNG_FP_SAW_ANY)
2662 goto PNG_FP_End; /* not a part of the number */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002663
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002664 png_fp_add(state, PNG_FP_SAW_SIGN);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002665
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002666 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002667
John Bowler8d261262011-06-18 13:37:11 -05002668 /* case PNG_FP_EXPONENT + PNG_FP_SAW_DOT:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002669 goto PNG_FP_End; */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002670
John Bowler8d261262011-06-18 13:37:11 -05002671 case PNG_FP_EXPONENT + PNG_FP_SAW_DIGIT:
2672 png_fp_add(state, PNG_FP_SAW_DIGIT | PNG_FP_WAS_VALID);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002673
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002674 break;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002675
John Bowler8d261262011-06-18 13:37:11 -05002676 /* case PNG_FP_EXPONEXT + PNG_FP_SAW_E:
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002677 goto PNG_FP_End; */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002678
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002679 default: goto PNG_FP_End; /* I.e. break 2 */
2680 }
2681
2682 /* The character seems ok, continue. */
2683 ++i;
2684 }
2685
2686PNG_FP_End:
2687 /* Here at the end, update the state and return the correct
2688 * return code.
2689 */
2690 *statep = state;
2691 *whereami = i;
2692
2693 return (state & PNG_FP_SAW_DIGIT) != 0;
2694}
2695
2696
2697/* The same but for a complete string. */
2698int
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002699png_check_fp_string(png_const_charp string, png_size_t size)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002700{
2701 int state=0;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002702 png_size_t char_index=0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002703
John Bowler8d261262011-06-18 13:37:11 -05002704 if (png_check_fp_number(string, size, &state, &char_index) &&
2705 (char_index == size || string[char_index] == 0))
2706 return state /* must be non-zero - see above */;
2707
2708 return 0; /* i.e. fail */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002709}
2710#endif /* pCAL or sCAL */
2711
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06002712#ifdef PNG_sCAL_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002713# ifdef PNG_FLOATING_POINT_SUPPORTED
2714/* Utility used below - a simple accurate power of ten from an integral
2715 * exponent.
2716 */
2717static double
2718png_pow10(int power)
2719{
2720 int recip = 0;
2721 double d = 1;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002722
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002723 /* Handle negative exponent with a reciprocal at the end because
2724 * 10 is exact whereas .1 is inexact in base 2
2725 */
2726 if (power < 0)
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002727 {
2728 if (power < DBL_MIN_10_EXP) return 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002729 recip = 1, power = -power;
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002730 }
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002731
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002732 if (power > 0)
2733 {
2734 /* Decompose power bitwise. */
2735 double mult = 10;
2736 do
2737 {
2738 if (power & 1) d *= mult;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002739 mult *= mult;
2740 power >>= 1;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002741 }
2742 while (power > 0);
2743
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06002744 if (recip != 0) d = 1/d;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002745 }
2746 /* else power is 0 and d is 1 */
2747
2748 return d;
2749}
2750
2751/* Function to format a floating point value in ASCII with a given
2752 * precision.
2753 */
2754void /* PRIVATE */
John Bowler4f67e402011-12-28 08:43:37 -06002755png_ascii_from_fp(png_const_structrp png_ptr, png_charp ascii, png_size_t size,
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05002756 double fp, unsigned int precision)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002757{
2758 /* We use standard functions from math.h, but not printf because
2759 * that would require stdio. The caller must supply a buffer of
2760 * sufficient size or we will png_error. The tests on size and
2761 * the space in ascii[] consumed are indicated below.
2762 */
2763 if (precision < 1)
2764 precision = DBL_DIG;
2765
2766 /* Enforce the limit of the implementation precision too. */
2767 if (precision > DBL_DIG+1)
2768 precision = DBL_DIG+1;
2769
2770 /* Basic sanity checks */
2771 if (size >= precision+5) /* See the requirements below. */
2772 {
2773 if (fp < 0)
2774 {
2775 fp = -fp;
Glenn Randers-Pehrsonb75b2412011-04-16 19:35:05 -05002776 *ascii++ = 45; /* '-' PLUS 1 TOTAL 1 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002777 --size;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002778 }
2779
2780 if (fp >= DBL_MIN && fp <= DBL_MAX)
2781 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002782 int exp_b10; /* A base 10 exponent */
2783 double base; /* 10^exp_b10 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002784
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002785 /* First extract a base 10 exponent of the number,
2786 * the calculation below rounds down when converting
2787 * from base 2 to base 10 (multiply by log10(2) -
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002788 * 0.3010, but 77/256 is 0.3008, so exp_b10 needs to
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002789 * be increased. Note that the arithmetic shift
2790 * performs a floor() unlike C arithmetic - using a
2791 * C multiply would break the following for negative
2792 * exponents.
2793 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002794 (void)frexp(fp, &exp_b10); /* exponent to base 2 */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002795
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002796 exp_b10 = (exp_b10 * 77) >> 8; /* <= exponent to base 10 */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002797
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002798 /* Avoid underflow here. */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002799 base = png_pow10(exp_b10); /* May underflow */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002800
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002801 while (base < DBL_MIN || base < fp)
2802 {
2803 /* And this may overflow. */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002804 double test = png_pow10(exp_b10+1);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002805
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002806 if (test <= DBL_MAX)
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002807 ++exp_b10, base = test;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002808
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002809 else
2810 break;
2811 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002812
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002813 /* Normalize fp and correct exp_b10, after this fp is in the
2814 * range [.1,1) and exp_b10 is both the exponent and the digit
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002815 * *before* which the decimal point should be inserted
2816 * (starting with 0 for the first digit). Note that this
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002817 * works even if 10^exp_b10 is out of range because of the
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002818 * test on DBL_MAX above.
2819 */
2820 fp /= base;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002821 while (fp >= 1) fp /= 10, ++exp_b10;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002822
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002823 /* Because of the code above fp may, at this point, be
2824 * less than .1, this is ok because the code below can
2825 * handle the leading zeros this generates, so no attempt
2826 * is made to correct that here.
2827 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002828
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002829 {
2830 int czero, clead, cdigits;
2831 char exponent[10];
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002832
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002833 /* Allow up to two leading zeros - this will not lengthen
2834 * the number compared to using E-n.
2835 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002836 if (exp_b10 < 0 && exp_b10 > -3) /* PLUS 3 TOTAL 4 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002837 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002838 czero = -exp_b10; /* PLUS 2 digits: TOTAL 3 */
2839 exp_b10 = 0; /* Dot added below before first output. */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002840 }
2841 else
2842 czero = 0; /* No zeros to add */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002843
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002844 /* Generate the digit list, stripping trailing zeros and
2845 * inserting a '.' before a digit if the exponent is 0.
2846 */
2847 clead = czero; /* Count of leading zeros */
2848 cdigits = 0; /* Count of digits in list. */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002849
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002850 do
2851 {
2852 double d;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002853
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002854 fp *= 10;
2855 /* Use modf here, not floor and subtract, so that
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002856 * the separation is done in one step. At the end
2857 * of the loop don't break the number into parts so
2858 * that the final digit is rounded.
2859 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002860 if (cdigits+czero-clead+1 < (int)precision)
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002861 fp = modf(fp, &d);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002862
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002863 else
2864 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002865 d = floor(fp + .5);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002866
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002867 if (d > 9)
2868 {
2869 /* Rounding up to 10, handle that here. */
2870 if (czero > 0)
2871 {
2872 --czero, d = 1;
2873 if (cdigits == 0) --clead;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002874 }
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002875 else
2876 {
2877 while (cdigits > 0 && d > 9)
2878 {
2879 int ch = *--ascii;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002880
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002881 if (exp_b10 != (-1))
2882 ++exp_b10;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002883
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002884 else if (ch == 46)
2885 {
2886 ch = *--ascii, ++size;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002887 /* Advance exp_b10 to '1', so that the
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002888 * decimal point happens after the
2889 * previous digit.
2890 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002891 exp_b10 = 1;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002892 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002893
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002894 --cdigits;
2895 d = ch - 47; /* I.e. 1+(ch-48) */
2896 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002897
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002898 /* Did we reach the beginning? If so adjust the
2899 * exponent but take into account the leading
2900 * decimal point.
2901 */
2902 if (d > 9) /* cdigits == 0 */
2903 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002904 if (exp_b10 == (-1))
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002905 {
2906 /* Leading decimal point (plus zeros?), if
2907 * we lose the decimal point here it must
2908 * be reentered below.
2909 */
2910 int ch = *--ascii;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002911
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002912 if (ch == 46)
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002913 ++size, exp_b10 = 1;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002914
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002915 /* Else lost a leading zero, so 'exp_b10' is
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002916 * still ok at (-1)
2917 */
2918 }
2919 else
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002920 ++exp_b10;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002921
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002922 /* In all cases we output a '1' */
2923 d = 1;
2924 }
2925 }
2926 }
2927 fp = 0; /* Guarantees termination below. */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002928 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002929
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002930 if (d == 0)
2931 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002932 ++czero;
2933 if (cdigits == 0) ++clead;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002934 }
2935 else
2936 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002937 /* Included embedded zeros in the digit count. */
2938 cdigits += czero - clead;
2939 clead = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002940
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002941 while (czero > 0)
2942 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002943 /* exp_b10 == (-1) means we just output the decimal
2944 * place - after the DP don't adjust 'exp_b10' any
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002945 * more!
2946 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002947 if (exp_b10 != (-1))
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002948 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002949 if (exp_b10 == 0) *ascii++ = 46, --size;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002950 /* PLUS 1: TOTAL 4 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002951 --exp_b10;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002952 }
2953 *ascii++ = 48, --czero;
2954 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002955
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002956 if (exp_b10 != (-1))
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002957 {
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002958 if (exp_b10 == 0) *ascii++ = 46, --size; /* counted
2959 above */
2960 --exp_b10;
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002961 }
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05002962 *ascii++ = (char)(48 + (int)d), ++cdigits;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002963 }
2964 }
2965 while (cdigits+czero-clead < (int)precision && fp > DBL_MIN);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002966
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002967 /* The total output count (max) is now 4+precision */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002968
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002969 /* Check for an exponent, if we don't need one we are
2970 * done and just need to terminate the string. At
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002971 * this point exp_b10==(-1) is effectively if flag - it got
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002972 * to '-1' because of the decrement after outputing
2973 * the decimal point above (the exponent required is
2974 * *not* -1!)
2975 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002976 if (exp_b10 >= (-1) && exp_b10 <= 2)
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002977 {
2978 /* The following only happens if we didn't output the
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002979 * leading zeros above for negative exponent, so this
2980 * doest add to the digit requirement. Note that the
2981 * two zeros here can only be output if the two leading
2982 * zeros were *not* output, so this doesn't increase
2983 * the output count.
2984 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06002985 while (--exp_b10 >= 0) *ascii++ = 48;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002986
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002987 *ascii = 0;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05002988
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002989 /* Total buffer requirement (including the '\0') is
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05002990 * 5+precision - see check at the start.
2991 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002992 return;
2993 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05002994
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05002995 /* Here if an exponent is required, adjust size for
2996 * the digits we output but did not count. The total
2997 * digit output here so far is at most 1+precision - no
2998 * decimal point and no leading or trailing zeros have
2999 * been output.
3000 */
3001 size -= cdigits;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003002
Glenn Randers-Pehrsonb75b2412011-04-16 19:35:05 -05003003 *ascii++ = 69, --size; /* 'E': PLUS 1 TOTAL 2+precision */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003004
John Bowler75156122011-09-09 17:21:44 -05003005 /* The following use of an unsigned temporary avoids ambiguities in
3006 * the signed arithmetic on exp_b10 and permits GCC at least to do
3007 * better optimization.
3008 */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003009 {
John Bowler75156122011-09-09 17:21:44 -05003010 unsigned int uexp_b10;
3011
3012 if (exp_b10 < 0)
3013 {
3014 *ascii++ = 45, --size; /* '-': PLUS 1 TOTAL 3+precision */
3015 uexp_b10 = -exp_b10;
3016 }
3017
3018 else
3019 uexp_b10 = exp_b10;
3020
3021 cdigits = 0;
3022
3023 while (uexp_b10 > 0)
3024 {
3025 exponent[cdigits++] = (char)(48 + uexp_b10 % 10);
3026 uexp_b10 /= 10;
3027 }
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003028 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003029
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003030 /* Need another size check here for the exponent digits, so
3031 * this need not be considered above.
3032 */
3033 if ((int)size > cdigits)
3034 {
3035 while (cdigits > 0) *ascii++ = exponent[--cdigits];
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003036
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003037 *ascii = 0;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003038
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003039 return;
3040 }
3041 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003042 }
3043 else if (!(fp >= DBL_MIN))
3044 {
3045 *ascii++ = 48; /* '0' */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003046 *ascii = 0;
3047 return;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003048 }
3049 else
3050 {
3051 *ascii++ = 105; /* 'i' */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003052 *ascii++ = 110; /* 'n' */
3053 *ascii++ = 102; /* 'f' */
3054 *ascii = 0;
3055 return;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003056 }
3057 }
3058
3059 /* Here on buffer too small. */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003060 png_error(png_ptr, "ASCII conversion buffer too small");
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003061}
3062
3063# endif /* FLOATING_POINT */
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003064
3065# ifdef PNG_FIXED_POINT_SUPPORTED
3066/* Function to format a fixed point value in ASCII.
3067 */
3068void /* PRIVATE */
John Bowler4f67e402011-12-28 08:43:37 -06003069png_ascii_from_fixed(png_const_structrp png_ptr, png_charp ascii,
3070 png_size_t size, png_fixed_point fp)
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003071{
3072 /* Require space for 10 decimal digits, a decimal point, a minus sign and a
3073 * trailing \0, 13 characters:
3074 */
3075 if (size > 12)
3076 {
3077 png_uint_32 num;
3078
3079 /* Avoid overflow here on the minimum integer. */
3080 if (fp < 0)
3081 *ascii++ = 45, --size, num = -fp;
3082 else
3083 num = fp;
3084
John Bowler75156122011-09-09 17:21:44 -05003085 if (num <= 0x80000000) /* else overflowed */
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003086 {
Glenn Randers-Pehrsonb75b2412011-04-16 19:35:05 -05003087 unsigned int ndigits = 0, first = 16 /* flag value */;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003088 char digits[10];
3089
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003090 while (num)
3091 {
3092 /* Split the low digit off num: */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003093 unsigned int tmp = num/10;
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003094 num -= tmp*10;
3095 digits[ndigits++] = (char)(48 + num);
3096 /* Record the first non-zero digit, note that this is a number
3097 * starting at 1, it's not actually the array index.
3098 */
3099 if (first == 16 && num > 0)
3100 first = ndigits;
3101 num = tmp;
3102 }
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003103
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003104 if (ndigits > 0)
3105 {
3106 while (ndigits > 5) *ascii++ = digits[--ndigits];
3107 /* The remaining digits are fractional digits, ndigits is '5' or
3108 * smaller at this point. It is certainly not zero. Check for a
3109 * non-zero fractional digit:
3110 */
3111 if (first <= 5)
3112 {
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003113 unsigned int i;
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003114 *ascii++ = 46; /* decimal point */
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -05003115 /* ndigits may be <5 for small numbers, output leading zeros
3116 * then ndigits digits to first:
3117 */
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003118 i = 5;
3119 while (ndigits < i) *ascii++ = 48, --i;
3120 while (ndigits >= first) *ascii++ = digits[--ndigits];
3121 /* Don't output the trailing zeros! */
3122 }
3123 }
3124 else
3125 *ascii++ = 48;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003126
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003127 /* And null terminate the string: */
3128 *ascii = 0;
3129 return;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003130 }
3131 }
3132
3133 /* Here on buffer too small. */
3134 png_error(png_ptr, "ASCII conversion buffer too small");
3135}
3136# endif /* FIXED_POINT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003137#endif /* READ_SCAL */
3138
Glenn Randers-Pehrson77396b62010-08-02 08:00:10 -05003139#if defined(PNG_FLOATING_POINT_SUPPORTED) && \
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003140 !defined(PNG_FIXED_POINT_MACRO_SUPPORTED) && \
3141 (defined(PNG_gAMA_SUPPORTED) || defined(PNG_cHRM_SUPPORTED) || \
3142 defined(PNG_sCAL_SUPPORTED) || defined(PNG_READ_BACKGROUND_SUPPORTED) || \
3143 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)) || \
3144 (defined(PNG_sCAL_SUPPORTED) && \
3145 defined(PNG_FLOATING_ARITHMETIC_SUPPORTED))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003146png_fixed_point
John Bowler5d567862011-12-24 09:12:00 -06003147png_fixed(png_const_structrp png_ptr, double fp, png_const_charp text)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003148{
3149 double r = floor(100000 * fp + .5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003150
Glenn Randers-Pehrson77c3bf12011-01-20 15:56:31 -06003151 if (r > 2147483647. || r < -2147483648.)
3152 png_fixed_error(png_ptr, text);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003153
Glenn Randers-Pehrsonc9120502013-11-22 14:58:04 -06003154# ifndef PNG_ERROR_TEXT_SUPPORTED
3155 PNG_UNUSED(text)
3156# endif
3157
Glenn Randers-Pehrson77c3bf12011-01-20 15:56:31 -06003158 return (png_fixed_point)r;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003159}
3160#endif
3161
Glenn Randers-Pehrsonc9120502013-11-22 14:58:04 -06003162#if defined(PNG_GAMMA_SUPPORTED) || defined(PNG_COLORSPACE_SUPPORTED) ||\
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003163 defined(PNG_INCH_CONVERSIONS_SUPPORTED) || defined(PNG_READ_pHYs_SUPPORTED)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003164/* muldiv functions */
3165/* This API takes signed arguments and rounds the result to the nearest
3166 * integer (or, for a fixed point number - the standard argument - to
3167 * the nearest .00001). Overflow and divide by zero are signalled in
3168 * the result, a boolean - true on success, false on overflow.
3169 */
3170int
3171png_muldiv(png_fixed_point_p res, png_fixed_point a, png_int_32 times,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003172 png_int_32 divisor)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003173{
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003174 /* Return a * times / divisor, rounded. */
3175 if (divisor != 0)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003176 {
3177 if (a == 0 || times == 0)
3178 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003179 *res = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003180 return 1;
3181 }
3182 else
3183 {
3184#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003185 double r = a;
3186 r *= times;
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003187 r /= divisor;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003188 r = floor(r+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003189
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003190 /* A png_fixed_point is a 32-bit integer. */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003191 if (r <= 2147483647. && r >= -2147483648.)
3192 {
3193 *res = (png_fixed_point)r;
3194 return 1;
3195 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003196#else
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003197 int negative = 0;
3198 png_uint_32 A, T, D;
Glenn Randers-Pehrson3b5d6952010-08-19 08:06:12 -05003199 png_uint_32 s16, s32, s00;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003200
3201 if (a < 0)
3202 negative = 1, A = -a;
3203 else
3204 A = a;
3205
3206 if (times < 0)
3207 negative = !negative, T = -times;
3208 else
3209 T = times;
3210
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003211 if (divisor < 0)
3212 negative = !negative, D = -divisor;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003213 else
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003214 D = divisor;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003215
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003216 /* Following can't overflow because the arguments only
3217 * have 31 bits each, however the result may be 32 bits.
3218 */
Glenn Randers-Pehrson3b5d6952010-08-19 08:06:12 -05003219 s16 = (A >> 16) * (T & 0xffff) +
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05003220 (A & 0xffff) * (T >> 16);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003221 /* Can't overflow because the a*times bit is only 30
3222 * bits at most.
3223 */
Glenn Randers-Pehrson3b5d6952010-08-19 08:06:12 -05003224 s32 = (A >> 16) * (T >> 16) + (s16 >> 16);
3225 s00 = (A & 0xffff) * (T & 0xffff);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003226
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003227 s16 = (s16 & 0xffff) << 16;
3228 s00 += s16;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003229
3230 if (s00 < s16)
3231 ++s32; /* carry */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003232
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003233 if (s32 < D) /* else overflow */
3234 {
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003235 /* s32.s00 is now the 64-bit product, do a standard
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003236 * division, we know that s32 < D, so the maximum
3237 * required shift is 31.
3238 */
3239 int bitshift = 32;
3240 png_fixed_point result = 0; /* NOTE: signed */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003241
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003242 while (--bitshift >= 0)
3243 {
3244 png_uint_32 d32, d00;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003245
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003246 if (bitshift > 0)
3247 d32 = D >> (32-bitshift), d00 = D << bitshift;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003248
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003249 else
3250 d32 = 0, d00 = D;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003251
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003252 if (s32 > d32)
3253 {
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05003254 if (s00 < d00) --s32; /* carry */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003255 s32 -= d32, s00 -= d00, result += 1<<bitshift;
3256 }
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003257
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003258 else
3259 if (s32 == d32 && s00 >= d00)
3260 s32 = 0, s00 -= d00, result += 1<<bitshift;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003261 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003262
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003263 /* Handle the rounding. */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003264 if (s00 >= (D >> 1))
3265 ++result;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003266
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06003267 if (negative != 0)
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003268 result = -result;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003269
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003270 /* Check for overflow. */
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003271 if ((negative && result <= 0) || (!negative && result >= 0))
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003272 {
3273 *res = result;
3274 return 1;
3275 }
3276 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003277#endif
3278 }
3279 }
3280
3281 return 0;
3282}
3283#endif /* READ_GAMMA || INCH_CONVERSIONS */
3284
3285#if defined(PNG_READ_GAMMA_SUPPORTED) || defined(PNG_INCH_CONVERSIONS_SUPPORTED)
3286/* The following is for when the caller doesn't much care about the
3287 * result.
3288 */
3289png_fixed_point
John Bowler5d567862011-12-24 09:12:00 -06003290png_muldiv_warn(png_const_structrp png_ptr, png_fixed_point a, png_int_32 times,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003291 png_int_32 divisor)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003292{
3293 png_fixed_point result;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003294
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003295 if (png_muldiv(&result, a, times, divisor))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003296 return result;
3297
3298 png_warning(png_ptr, "fixed point overflow ignored");
3299 return 0;
3300}
3301#endif
3302
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003303#ifdef PNG_GAMMA_SUPPORTED /* more fixed point functions for gamma */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003304/* Calculate a reciprocal, return 0 on div-by-zero or overflow. */
3305png_fixed_point
3306png_reciprocal(png_fixed_point a)
3307{
3308#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3309 double r = floor(1E10/a+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003310
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003311 if (r <= 2147483647. && r >= -2147483648.)
3312 return (png_fixed_point)r;
3313#else
3314 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003315
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003316 if (png_muldiv(&res, 100000, 100000, a))
3317 return res;
3318#endif
3319
3320 return 0; /* error/overflow */
3321}
3322
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003323/* This is the shared test on whether a gamma value is 'significant' - whether
3324 * it is worth doing gamma correction.
3325 */
3326int /* PRIVATE */
3327png_gamma_significant(png_fixed_point gamma_val)
3328{
3329 return gamma_val < PNG_FP_1 - PNG_GAMMA_THRESHOLD_FIXED ||
3330 gamma_val > PNG_FP_1 + PNG_GAMMA_THRESHOLD_FIXED;
3331}
3332#endif
3333
3334#ifdef PNG_READ_GAMMA_SUPPORTED
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003335# ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003336/* A local convenience routine. */
3337static png_fixed_point
3338png_product2(png_fixed_point a, png_fixed_point b)
3339{
Glenn Randers-Pehrson9c690912010-08-27 11:39:38 -05003340 /* The required result is 1/a * 1/b; the following preserves accuracy. */
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003341# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003342 double r = a * 1E-5;
3343 r *= b;
3344 r = floor(r+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003345
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003346 if (r <= 2147483647. && r >= -2147483648.)
3347 return (png_fixed_point)r;
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003348# else
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003349 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003350
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003351 if (png_muldiv(&res, a, b, 100000))
3352 return res;
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003353# endif
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003354
3355 return 0; /* overflow */
3356}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003357# endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003358
3359/* The inverse of the above. */
3360png_fixed_point
3361png_reciprocal2(png_fixed_point a, png_fixed_point b)
3362{
Glenn Randers-Pehrson9c690912010-08-27 11:39:38 -05003363 /* The required result is 1/a * 1/b; the following preserves accuracy. */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003364#ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
3365 double r = 1E15/a;
3366 r /= b;
3367 r = floor(r+.5);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003368
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003369 if (r <= 2147483647. && r >= -2147483648.)
3370 return (png_fixed_point)r;
3371#else
3372 /* This may overflow because the range of png_fixed_point isn't symmetric,
3373 * but this API is only used for the product of file and screen gamma so it
3374 * doesn't matter that the smallest number it can produce is 1/21474, not
3375 * 1/100000
3376 */
3377 png_fixed_point res = png_product2(a, b);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003378
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003379 if (res != 0)
3380 return png_reciprocal(res);
3381#endif
3382
3383 return 0; /* overflow */
3384}
3385#endif /* READ_GAMMA */
3386
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003387#ifdef PNG_READ_GAMMA_SUPPORTED /* gamma table code */
3388#ifndef PNG_FLOATING_ARITHMETIC_SUPPORTED
3389/* Fixed point gamma.
3390 *
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003391 * The code to calculate the tables used below can be found in the shell script
3392 * contrib/tools/intgamma.sh
3393 *
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003394 * To calculate gamma this code implements fast log() and exp() calls using only
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003395 * fixed point arithmetic. This code has sufficient precision for either 8-bit
3396 * or 16-bit sample values.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003397 *
3398 * The tables used here were calculated using simple 'bc' programs, but C double
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003399 * precision floating point arithmetic would work fine.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003400 *
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003401 * 8-bit log table
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003402 * This is a table of -log(value/255)/log(2) for 'value' in the range 128 to
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003403 * 255, so it's the base 2 logarithm of a normalized 8-bit floating point
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003404 * mantissa. The numbers are 32-bit fractions.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003405 */
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003406static const png_uint_32
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003407png_8bit_l2[128] =
3408{
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003409 4270715492U, 4222494797U, 4174646467U, 4127164793U, 4080044201U, 4033279239U,
3410 3986864580U, 3940795015U, 3895065449U, 3849670902U, 3804606499U, 3759867474U,
3411 3715449162U, 3671346997U, 3627556511U, 3584073329U, 3540893168U, 3498011834U,
3412 3455425220U, 3413129301U, 3371120137U, 3329393864U, 3287946700U, 3246774933U,
3413 3205874930U, 3165243125U, 3124876025U, 3084770202U, 3044922296U, 3005329011U,
3414 2965987113U, 2926893432U, 2888044853U, 2849438323U, 2811070844U, 2772939474U,
3415 2735041326U, 2697373562U, 2659933400U, 2622718104U, 2585724991U, 2548951424U,
3416 2512394810U, 2476052606U, 2439922311U, 2404001468U, 2368287663U, 2332778523U,
3417 2297471715U, 2262364947U, 2227455964U, 2192742551U, 2158222529U, 2123893754U,
3418 2089754119U, 2055801552U, 2022034013U, 1988449497U, 1955046031U, 1921821672U,
3419 1888774511U, 1855902668U, 1823204291U, 1790677560U, 1758320682U, 1726131893U,
3420 1694109454U, 1662251657U, 1630556815U, 1599023271U, 1567649391U, 1536433567U,
3421 1505374214U, 1474469770U, 1443718700U, 1413119487U, 1382670639U, 1352370686U,
3422 1322218179U, 1292211689U, 1262349810U, 1232631153U, 1203054352U, 1173618059U,
3423 1144320946U, 1115161701U, 1086139034U, 1057251672U, 1028498358U, 999877854U,
3424 971388940U, 943030410U, 914801076U, 886699767U, 858725327U, 830876614U,
3425 803152505U, 775551890U, 748073672U, 720716771U, 693480120U, 666362667U,
3426 639363374U, 612481215U, 585715177U, 559064263U, 532527486U, 506103872U,
3427 479792461U, 453592303U, 427502463U, 401522014U, 375650043U, 349885648U,
3428 324227938U, 298676034U, 273229066U, 247886176U, 222646516U, 197509248U,
3429 172473545U, 147538590U, 122703574U, 97967701U, 73330182U, 48790236U,
3430 24347096U, 0U
Glenn Randers-Pehrson8888ea42011-11-28 11:29:10 -06003431
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003432#if 0
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003433 /* The following are the values for 16-bit tables - these work fine for the
3434 * 8-bit conversions but produce very slightly larger errors in the 16-bit
3435 * log (about 1.2 as opposed to 0.7 absolute error in the final value). To
3436 * use these all the shifts below must be adjusted appropriately.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003437 */
3438 65166, 64430, 63700, 62976, 62257, 61543, 60835, 60132, 59434, 58741, 58054,
3439 57371, 56693, 56020, 55352, 54689, 54030, 53375, 52726, 52080, 51439, 50803,
3440 50170, 49542, 48918, 48298, 47682, 47070, 46462, 45858, 45257, 44661, 44068,
3441 43479, 42894, 42312, 41733, 41159, 40587, 40020, 39455, 38894, 38336, 37782,
3442 37230, 36682, 36137, 35595, 35057, 34521, 33988, 33459, 32932, 32408, 31887,
3443 31369, 30854, 30341, 29832, 29325, 28820, 28319, 27820, 27324, 26830, 26339,
3444 25850, 25364, 24880, 24399, 23920, 23444, 22970, 22499, 22029, 21562, 21098,
3445 20636, 20175, 19718, 19262, 18808, 18357, 17908, 17461, 17016, 16573, 16132,
3446 15694, 15257, 14822, 14390, 13959, 13530, 13103, 12678, 12255, 11834, 11415,
3447 10997, 10582, 10168, 9756, 9346, 8937, 8531, 8126, 7723, 7321, 6921, 6523,
3448 6127, 5732, 5339, 4947, 4557, 4169, 3782, 3397, 3014, 2632, 2251, 1872, 1495,
3449 1119, 744, 372
3450#endif
3451};
3452
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003453static png_int_32
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003454png_log8bit(unsigned int x)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003455{
John Bowler168a4332011-01-16 19:32:22 -06003456 unsigned int lg2 = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003457 /* Each time 'x' is multiplied by 2, 1 must be subtracted off the final log,
3458 * because the log is actually negate that means adding 1. The final
3459 * returned value thus has the range 0 (for 255 input) to 7.994 (for 1
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003460 * input), return -1 for the overflow (log 0) case, - so the result is
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003461 * always at most 19 bits.
3462 */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003463 if ((x &= 0xff) == 0)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003464 return -1;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003465
3466 if ((x & 0xf0) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003467 lg2 = 4, x <<= 4;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003468
3469 if ((x & 0xc0) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003470 lg2 += 2, x <<= 2;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003471
3472 if ((x & 0x80) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003473 lg2 += 1, x <<= 1;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003474
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003475 /* result is at most 19 bits, so this cast is safe: */
John Bowler168a4332011-01-16 19:32:22 -06003476 return (png_int_32)((lg2 << 16) + ((png_8bit_l2[x-128]+32768)>>16));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003477}
3478
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003479/* The above gives exact (to 16 binary places) log2 values for 8-bit images,
3480 * for 16-bit images we use the most significant 8 bits of the 16-bit value to
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003481 * get an approximation then multiply the approximation by a correction factor
3482 * determined by the remaining up to 8 bits. This requires an additional step
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003483 * in the 16-bit case.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003484 *
3485 * We want log2(value/65535), we have log2(v'/255), where:
3486 *
3487 * value = v' * 256 + v''
3488 * = v' * f
3489 *
3490 * So f is value/v', which is equal to (256+v''/v') since v' is in the range 128
3491 * to 255 and v'' is in the range 0 to 255 f will be in the range 256 to less
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003492 * than 258. The final factor also needs to correct for the fact that our 8-bit
3493 * value is scaled by 255, whereas the 16-bit values must be scaled by 65535.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003494 *
3495 * This gives a final formula using a calculated value 'x' which is value/v' and
3496 * scaling by 65536 to match the above table:
3497 *
3498 * log2(x/257) * 65536
3499 *
3500 * Since these numbers are so close to '1' we can use simple linear
3501 * interpolation between the two end values 256/257 (result -368.61) and 258/257
3502 * (result 367.179). The values used below are scaled by a further 64 to give
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003503 * 16-bit precision in the interpolation:
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003504 *
3505 * Start (256): -23591
3506 * Zero (257): 0
3507 * End (258): 23499
3508 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003509static png_int_32
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003510png_log16bit(png_uint_32 x)
3511{
John Bowler168a4332011-01-16 19:32:22 -06003512 unsigned int lg2 = 0;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003513
3514 /* As above, but now the input has 16 bits. */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003515 if ((x &= 0xffff) == 0)
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003516 return -1;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003517
3518 if ((x & 0xff00) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003519 lg2 = 8, x <<= 8;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003520
3521 if ((x & 0xf000) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003522 lg2 += 4, x <<= 4;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003523
3524 if ((x & 0xc000) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003525 lg2 += 2, x <<= 2;
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003526
3527 if ((x & 0x8000) == 0)
John Bowler168a4332011-01-16 19:32:22 -06003528 lg2 += 1, x <<= 1;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003529
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003530 /* Calculate the base logarithm from the top 8 bits as a 28-bit fractional
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003531 * value.
3532 */
John Bowler168a4332011-01-16 19:32:22 -06003533 lg2 <<= 28;
3534 lg2 += (png_8bit_l2[(x>>8)-128]+8) >> 4;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003535
3536 /* Now we need to interpolate the factor, this requires a division by the top
3537 * 8 bits. Do this with maximum precision.
3538 */
3539 x = ((x << 16) + (x >> 9)) / (x >> 8);
3540
3541 /* Since we divided by the top 8 bits of 'x' there will be a '1' at 1<<24,
3542 * the value at 1<<16 (ignoring this) will be 0 or 1; this gives us exactly
3543 * 16 bits to interpolate to get the low bits of the result. Round the
3544 * answer. Note that the end point values are scaled by 64 to retain overall
John Bowler168a4332011-01-16 19:32:22 -06003545 * precision and that 'lg2' is current scaled by an extra 12 bits, so adjust
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003546 * the overall scaling by 6-12. Round at every step.
3547 */
3548 x -= 1U << 24;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003549
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003550 if (x <= 65536U) /* <= '257' */
John Bowler168a4332011-01-16 19:32:22 -06003551 lg2 += ((23591U * (65536U-x)) + (1U << (16+6-12-1))) >> (16+6-12);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003552
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003553 else
John Bowler168a4332011-01-16 19:32:22 -06003554 lg2 -= ((23499U * (x-65536U)) + (1U << (16+6-12-1))) >> (16+6-12);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003555
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003556 /* Safe, because the result can't have more than 20 bits: */
John Bowler168a4332011-01-16 19:32:22 -06003557 return (png_int_32)((lg2 + 2048) >> 12);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003558}
3559
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003560/* The 'exp()' case must invert the above, taking a 20-bit fixed point
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003561 * logarithmic value and returning a 16 or 8-bit number as appropriate. In
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003562 * each case only the low 16 bits are relevant - the fraction - since the
3563 * integer bits (the top 4) simply determine a shift.
3564 *
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003565 * The worst case is the 16-bit distinction between 65535 and 65534, this
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003566 * requires perhaps spurious accuracty in the decoding of the logarithm to
3567 * distinguish log2(65535/65534.5) - 10^-5 or 17 bits. There is little chance
3568 * of getting this accuracy in practice.
3569 *
3570 * To deal with this the following exp() function works out the exponent of the
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003571 * frational part of the logarithm by using an accurate 32-bit value from the
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003572 * top four fractional bits then multiplying in the remaining bits.
3573 */
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003574static const png_uint_32
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003575png_32bit_exp[16] =
3576{
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003577 /* NOTE: the first entry is deliberately set to the maximum 32-bit value. */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003578 4294967295U, 4112874773U, 3938502376U, 3771522796U, 3611622603U, 3458501653U,
3579 3311872529U, 3171459999U, 3037000500U, 2908241642U, 2784941738U, 2666869345U,
3580 2553802834U, 2445529972U, 2341847524U, 2242560872U
3581};
3582
3583/* Adjustment table; provided to explain the numbers in the code below. */
Glenn Randers-Pehrson90a87c82011-12-05 12:05:43 -06003584#if 0
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003585for (i=11;i>=0;--i){ print i, " ", (1 - e(-(2^i)/65536*l(2))) * 2^(32-i), "\n"}
3586 11 44937.64284865548751208448
3587 10 45180.98734845585101160448
3588 9 45303.31936980687359311872
3589 8 45364.65110595323018870784
3590 7 45395.35850361789624614912
3591 6 45410.72259715102037508096
3592 5 45418.40724413220722311168
3593 4 45422.25021786898173001728
3594 3 45424.17186732298419044352
3595 2 45425.13273269940811464704
3596 1 45425.61317555035558641664
3597 0 45425.85339951654943850496
3598#endif
3599
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003600static png_uint_32
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003601png_exp(png_fixed_point x)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003602{
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003603 if (x > 0 && x <= 0xfffff) /* Else overflow or zero (underflow) */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003604 {
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003605 /* Obtain a 4-bit approximation */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003606 png_uint_32 e = png_32bit_exp[(x >> 12) & 0xf];
3607
3608 /* Incorporate the low 12 bits - these decrease the returned value by
3609 * multiplying by a number less than 1 if the bit is set. The multiplier
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003610 * is determined by the above table and the shift. Notice that the values
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003611 * converge on 45426 and this is used to allow linear interpolation of the
3612 * low bits.
3613 */
Glenn Randers-Pehrson233357e2010-07-29 21:49:38 -05003614 if (x & 0x800)
3615 e -= (((e >> 16) * 44938U) + 16U) >> 5;
3616
3617 if (x & 0x400)
3618 e -= (((e >> 16) * 45181U) + 32U) >> 6;
3619
3620 if (x & 0x200)
3621 e -= (((e >> 16) * 45303U) + 64U) >> 7;
3622
3623 if (x & 0x100)
3624 e -= (((e >> 16) * 45365U) + 128U) >> 8;
3625
3626 if (x & 0x080)
3627 e -= (((e >> 16) * 45395U) + 256U) >> 9;
3628
3629 if (x & 0x040)
3630 e -= (((e >> 16) * 45410U) + 512U) >> 10;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003631
3632 /* And handle the low 6 bits in a single block. */
3633 e -= (((e >> 16) * 355U * (x & 0x3fU)) + 256U) >> 9;
3634
3635 /* Handle the upper bits of x. */
3636 e >>= x >> 16;
3637 return e;
3638 }
3639
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003640 /* Check for overflow */
3641 if (x <= 0)
3642 return png_32bit_exp[0];
3643
3644 /* Else underflow */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003645 return 0;
3646}
3647
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003648static png_byte
John Bowler168a4332011-01-16 19:32:22 -06003649png_exp8bit(png_fixed_point lg2)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003650{
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003651 /* Get a 32-bit value: */
John Bowler168a4332011-01-16 19:32:22 -06003652 png_uint_32 x = png_exp(lg2);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003653
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003654 /* Convert the 32-bit value to 0..255 by multiplying by 256-1, note that the
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003655 * second, rounding, step can't overflow because of the first, subtraction,
3656 * step.
3657 */
3658 x -= x >> 8;
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003659 return (png_byte)((x + 0x7fffffU) >> 24);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003660}
3661
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003662#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003663static png_uint_16
John Bowler168a4332011-01-16 19:32:22 -06003664png_exp16bit(png_fixed_point lg2)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003665{
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003666 /* Get a 32-bit value: */
John Bowler168a4332011-01-16 19:32:22 -06003667 png_uint_32 x = png_exp(lg2);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003668
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003669 /* Convert the 32-bit value to 0..65535 by multiplying by 65536-1: */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003670 x -= x >> 16;
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003671 return (png_uint_16)((x + 32767U) >> 16);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003672}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003673#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003674#endif /* FLOATING_ARITHMETIC */
3675
3676png_byte
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003677png_gamma_8bit_correct(unsigned int value, png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003678{
3679 if (value > 0 && value < 255)
3680 {
3681# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003682 double r = floor(255*pow(value/255.,gamma_val*.00001)+.5);
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003683 return (png_byte)r;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003684# else
John Bowler168a4332011-01-16 19:32:22 -06003685 png_int_32 lg2 = png_log8bit(value);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003686 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003687
John Bowler168a4332011-01-16 19:32:22 -06003688 if (png_muldiv(&res, gamma_val, lg2, PNG_FP_1))
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003689 return png_exp8bit(res);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003690
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003691 /* Overflow. */
3692 value = 0;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003693# endif
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003694 }
3695
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003696 return (png_byte)value;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003697}
3698
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003699#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003700png_uint_16
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003701png_gamma_16bit_correct(unsigned int value, png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003702{
3703 if (value > 0 && value < 65535)
3704 {
3705# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003706 double r = floor(65535*pow(value/65535.,gamma_val*.00001)+.5);
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003707 return (png_uint_16)r;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003708# else
John Bowler168a4332011-01-16 19:32:22 -06003709 png_int_32 lg2 = png_log16bit(value);
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003710 png_fixed_point res;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003711
John Bowler168a4332011-01-16 19:32:22 -06003712 if (png_muldiv(&res, gamma_val, lg2, PNG_FP_1))
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003713 return png_exp16bit(res);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003714
Glenn Randers-Pehrson3df324d2010-07-31 13:45:04 -05003715 /* Overflow. */
3716 value = 0;
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003717# endif
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003718 }
3719
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003720 return (png_uint_16)value;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003721}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003722#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003723
3724/* This does the right thing based on the bit_depth field of the
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003725 * png_struct, interpreting values as 8-bit or 16-bit. While the result
3726 * is nominally a 16-bit value if bit depth is 8 then the result is
3727 * 8-bit (as are the arguments.)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003728 */
3729png_uint_16 /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06003730png_gamma_correct(png_structrp png_ptr, unsigned int value,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003731 png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003732{
3733 if (png_ptr->bit_depth == 8)
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003734 return png_gamma_8bit_correct(value, gamma_val);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003735
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003736#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003737 else
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003738 return png_gamma_16bit_correct(value, gamma_val);
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003739#else
3740 /* should not reach this */
3741 return 0;
3742#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003743}
3744
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003745#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003746/* Internal function to build a single 16-bit table - the table consists of
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003747 * 'num' 256 entry subtables, where 'num' is determined by 'shift' - the amount
3748 * to shift the input values right (or 16-number_of_signifiant_bits).
3749 *
Glenn Randers-Pehrsona774c5d2010-08-26 19:37:55 -05003750 * The caller is responsible for ensuring that the table gets cleaned up on
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003751 * png_error (i.e. if one of the mallocs below fails) - i.e. the *table argument
3752 * should be somewhere that will be cleaned.
3753 */
3754static void
John Bowler5d567862011-12-24 09:12:00 -06003755png_build_16bit_table(png_structrp png_ptr, png_uint_16pp *ptable,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003756 PNG_CONST unsigned int shift, PNG_CONST png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003757{
3758 /* Various values derived from 'shift': */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003759 PNG_CONST unsigned int num = 1U << (8U - shift);
3760 PNG_CONST unsigned int max = (1U << (16U - shift))-1U;
3761 PNG_CONST unsigned int max_by_2 = 1U << (15U-shift);
3762 unsigned int i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003763
3764 png_uint_16pp table = *ptable =
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003765 (png_uint_16pp)png_calloc(png_ptr, num * (sizeof (png_uint_16p)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003766
3767 for (i = 0; i < num; i++)
3768 {
3769 png_uint_16p sub_table = table[i] =
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003770 (png_uint_16p)png_malloc(png_ptr, 256 * (sizeof (png_uint_16)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003771
3772 /* The 'threshold' test is repeated here because it can arise for one of
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003773 * the 16-bit tables even if the others don't hit it.
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003774 */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003775 if (png_gamma_significant(gamma_val))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003776 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003777 /* The old code would overflow at the end and this would cause the
3778 * 'pow' function to return a result >1, resulting in an
3779 * arithmetic error. This code follows the spec exactly; ig is
3780 * the recovered input sample, it always has 8-16 bits.
3781 *
3782 * We want input * 65535/max, rounded, the arithmetic fits in 32
3783 * bits (unsigned) so long as max <= 32767.
3784 */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003785 unsigned int j;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003786 for (j = 0; j < 256; j++)
3787 {
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003788 png_uint_32 ig = (j << (8-shift)) + i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003789# ifdef PNG_FLOATING_ARITHMETIC_SUPPORTED
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003790 /* Inline the 'max' scaling operation: */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003791 double d = floor(65535*pow(ig/(double)max, gamma_val*.00001)+.5);
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003792 sub_table[j] = (png_uint_16)d;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003793# else
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06003794 if (shift != 0)
Glenn Randers-Pehrson4eb18e92010-07-30 14:46:52 -05003795 ig = (ig * 65535U + max_by_2)/max;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003796
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003797 sub_table[j] = png_gamma_16bit_correct(ig, gamma_val);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003798# endif
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003799 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003800 }
3801 else
3802 {
3803 /* We must still build a table, but do it the fast way. */
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003804 unsigned int j;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003805
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003806 for (j = 0; j < 256; j++)
3807 {
3808 png_uint_32 ig = (j << (8-shift)) + i;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003809
Glenn Randers-Pehrson05670152014-03-08 12:39:52 -06003810 if (shift != 0)
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003811 ig = (ig * 65535U + max_by_2)/max;
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003812
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003813 sub_table[j] = (png_uint_16)ig;
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003814 }
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003815 }
3816 }
3817}
3818
3819/* NOTE: this function expects the *inverse* of the overall gamma transformation
3820 * required.
3821 */
3822static void
John Bowler5d567862011-12-24 09:12:00 -06003823png_build_16to8_table(png_structrp png_ptr, png_uint_16pp *ptable,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003824 PNG_CONST unsigned int shift, PNG_CONST png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003825{
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003826 PNG_CONST unsigned int num = 1U << (8U - shift);
3827 PNG_CONST unsigned int max = (1U << (16U - shift))-1U;
3828 unsigned int i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003829 png_uint_32 last;
3830
3831 png_uint_16pp table = *ptable =
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003832 (png_uint_16pp)png_calloc(png_ptr, num * (sizeof (png_uint_16p)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003833
3834 /* 'num' is the number of tables and also the number of low bits of low
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003835 * bits of the input 16-bit value used to select a table. Each table is
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003836 * itself index by the high 8 bits of the value.
3837 */
3838 for (i = 0; i < num; i++)
3839 table[i] = (png_uint_16p)png_malloc(png_ptr,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003840 256 * (sizeof (png_uint_16)));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003841
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003842 /* 'gamma_val' is set to the reciprocal of the value calculated above, so
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003843 * pow(out,g) is an *input* value. 'last' is the last input value set.
3844 *
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003845 * In the loop 'i' is used to find output values. Since the output is
3846 * 8-bit there are only 256 possible values. The tables are set up to
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003847 * select the closest possible output value for each input by finding
3848 * the input value at the boundary between each pair of output values
3849 * and filling the table up to that boundary with the lower output
3850 * value.
3851 *
Glenn Randers-Pehrson8a7ec522011-05-17 07:14:30 -05003852 * The boundary values are 0.5,1.5..253.5,254.5. Since these are 9-bit
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003853 * values the code below uses a 16-bit value in i; the values start at
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003854 * 128.5 (for 0.5) and step by 257, for a total of 254 values (the last
3855 * entries are filled with 255). Start i at 128 and fill all 'last'
3856 * table entries <= 'max'
3857 */
3858 last = 0;
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003859 for (i = 0; i < 255; ++i) /* 8-bit output value */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003860 {
3861 /* Find the corresponding maximum input value */
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003862 png_uint_16 out = (png_uint_16)(i * 257U); /* 16-bit output value */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003863
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003864 /* Find the boundary value in 16 bits: */
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003865 png_uint_32 bound = png_gamma_16bit_correct(out+128U, gamma_val);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003866
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003867 /* Adjust (round) to (16-shift) bits: */
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003868 bound = (bound * max + 32768U)/65535U + 1U;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003869
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05003870 while (last < bound)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003871 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05003872 table[last & (0xffU >> shift)][last >> (8U - shift)] = out;
3873 last++;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003874 }
3875 }
3876
3877 /* And fill in the final entries. */
3878 while (last < (num << 8))
3879 {
3880 table[last & (0xff >> shift)][last >> (8U - shift)] = 65535U;
3881 last++;
3882 }
3883}
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003884#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003885
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05003886/* Build a single 8-bit table: same as the 16-bit case but much simpler (and
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003887 * typically much faster). Note that libpng currently does no sBIT processing
3888 * (apparently contrary to the spec) so a 256 entry table is always generated.
3889 */
3890static void
John Bowler5d567862011-12-24 09:12:00 -06003891png_build_8bit_table(png_structrp png_ptr, png_bytepp ptable,
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003892 PNG_CONST png_fixed_point gamma_val)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003893{
Glenn Randers-Pehrsone600c512010-08-18 07:25:46 -05003894 unsigned int i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003895 png_bytep table = *ptable = (png_bytep)png_malloc(png_ptr, 256);
3896
Glenn Randers-Pehrson2368a922011-01-16 13:32:05 -06003897 if (png_gamma_significant(gamma_val)) for (i=0; i<256; i++)
3898 table[i] = png_gamma_8bit_correct(i, gamma_val);
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003899
Glenn Randers-Pehrson4009a762010-07-31 06:34:36 -05003900 else for (i=0; i<256; ++i)
3901 table[i] = (png_byte)i;
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003902}
3903
John Bowler07772cb2011-10-14 18:19:47 -05003904/* Used from png_read_destroy and below to release the memory used by the gamma
3905 * tables.
3906 */
3907void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06003908png_destroy_gamma_table(png_structrp png_ptr)
John Bowler07772cb2011-10-14 18:19:47 -05003909{
3910 png_free(png_ptr, png_ptr->gamma_table);
3911 png_ptr->gamma_table = NULL;
3912
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003913#ifdef PNG_16BIT_SUPPORTED
John Bowler07772cb2011-10-14 18:19:47 -05003914 if (png_ptr->gamma_16_table != NULL)
3915 {
3916 int i;
3917 int istop = (1 << (8 - png_ptr->gamma_shift));
3918 for (i = 0; i < istop; i++)
3919 {
3920 png_free(png_ptr, png_ptr->gamma_16_table[i]);
3921 }
3922 png_free(png_ptr, png_ptr->gamma_16_table);
3923 png_ptr->gamma_16_table = NULL;
3924 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003925#endif /* 16BIT */
John Bowler07772cb2011-10-14 18:19:47 -05003926
3927#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
3928 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
3929 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
3930 png_free(png_ptr, png_ptr->gamma_from_1);
3931 png_ptr->gamma_from_1 = NULL;
3932 png_free(png_ptr, png_ptr->gamma_to_1);
3933 png_ptr->gamma_to_1 = NULL;
3934
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003935#ifdef PNG_16BIT_SUPPORTED
John Bowler07772cb2011-10-14 18:19:47 -05003936 if (png_ptr->gamma_16_from_1 != NULL)
3937 {
3938 int i;
3939 int istop = (1 << (8 - png_ptr->gamma_shift));
3940 for (i = 0; i < istop; i++)
3941 {
3942 png_free(png_ptr, png_ptr->gamma_16_from_1[i]);
3943 }
3944 png_free(png_ptr, png_ptr->gamma_16_from_1);
3945 png_ptr->gamma_16_from_1 = NULL;
3946 }
3947 if (png_ptr->gamma_16_to_1 != NULL)
3948 {
3949 int i;
3950 int istop = (1 << (8 - png_ptr->gamma_shift));
3951 for (i = 0; i < istop; i++)
3952 {
3953 png_free(png_ptr, png_ptr->gamma_16_to_1[i]);
3954 }
3955 png_free(png_ptr, png_ptr->gamma_16_to_1);
3956 png_ptr->gamma_16_to_1 = NULL;
3957 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06003958#endif /* 16BIT */
John Bowler07772cb2011-10-14 18:19:47 -05003959#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
3960}
3961
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003962/* We build the 8- or 16-bit gamma tables here. Note that for 16-bit
3963 * tables, we don't make a full table if we are reducing to 8-bit in
3964 * the future. Note also how the gamma_16 tables are segmented so that
3965 * we don't need to allocate > 64K chunks for a full 16-bit table.
3966 */
3967void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06003968png_build_gamma_table(png_structrp png_ptr, int bit_depth)
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003969{
3970 png_debug(1, "in png_build_gamma_table");
3971
John Bowler07772cb2011-10-14 18:19:47 -05003972 /* Remove any existing table; this copes with multiple calls to
3973 * png_read_update_info. The warning is because building the gamma tables
3974 * multiple times is a performance hit - it's harmless but the ability to call
3975 * png_read_update_info() multiple times is new in 1.5.6 so it seems sensible
3976 * to warn if the app introduces such a hit.
3977 */
3978 if (png_ptr->gamma_table != NULL || png_ptr->gamma_16_table != NULL)
3979 {
3980 png_warning(png_ptr, "gamma table being rebuilt");
3981 png_destroy_gamma_table(png_ptr);
3982 }
3983
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003984 if (bit_depth <= 8)
3985 {
3986 png_build_8bit_table(png_ptr, &png_ptr->gamma_table,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003987 png_ptr->screen_gamma > 0 ? png_reciprocal2(png_ptr->colorspace.gamma,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003988 png_ptr->screen_gamma) : PNG_FP_1);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003989
3990#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
John Bowlerd273ad22011-05-07 21:00:28 -05003991 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003992 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
John Bowlerd273ad22011-05-07 21:00:28 -05003993 if (png_ptr->transformations & (PNG_COMPOSE | PNG_RGB_TO_GRAY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003994 {
3995 png_build_8bit_table(png_ptr, &png_ptr->gamma_to_1,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06003996 png_reciprocal(png_ptr->colorspace.gamma));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05003997
3998 png_build_8bit_table(png_ptr, &png_ptr->gamma_from_1,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05003999 png_ptr->screen_gamma > 0 ? png_reciprocal(png_ptr->screen_gamma) :
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004000 png_ptr->colorspace.gamma/* Probably doing rgb_to_gray */);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004001 }
John Bowlerd273ad22011-05-07 21:00:28 -05004002#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004003 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06004004#ifdef PNG_16BIT_SUPPORTED
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004005 else
4006 {
4007 png_byte shift, sig_bit;
4008
4009 if (png_ptr->color_type & PNG_COLOR_MASK_COLOR)
4010 {
4011 sig_bit = png_ptr->sig_bit.red;
4012
4013 if (png_ptr->sig_bit.green > sig_bit)
4014 sig_bit = png_ptr->sig_bit.green;
4015
4016 if (png_ptr->sig_bit.blue > sig_bit)
4017 sig_bit = png_ptr->sig_bit.blue;
4018 }
4019 else
4020 sig_bit = png_ptr->sig_bit.gray;
4021
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05004022 /* 16-bit gamma code uses this equation:
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004023 *
4024 * ov = table[(iv & 0xff) >> gamma_shift][iv >> 8]
4025 *
4026 * Where 'iv' is the input color value and 'ov' is the output value -
4027 * pow(iv, gamma).
4028 *
4029 * Thus the gamma table consists of up to 256 256 entry tables. The table
4030 * is selected by the (8-gamma_shift) most significant of the low 8 bits of
4031 * the color value then indexed by the upper 8 bits:
4032 *
4033 * table[low bits][high 8 bits]
4034 *
4035 * So the table 'n' corresponds to all those 'iv' of:
4036 *
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05004037 * <all high 8-bit values><n << gamma_shift>..<(n+1 << gamma_shift)-1>
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004038 *
4039 */
Glenn Randers-Pehrson67439c42010-08-19 07:01:09 -05004040 if (sig_bit > 0 && sig_bit < 16U)
4041 shift = (png_byte)(16U - sig_bit); /* shift == insignificant bits */
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004042
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004043 else
4044 shift = 0; /* keep all 16 bits */
4045
Glenn Randers-Pehrsonab63dd02011-06-17 20:04:17 -05004046 if (png_ptr->transformations & (PNG_16_TO_8 | PNG_SCALE_16_TO_8))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004047 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004048 /* PNG_MAX_GAMMA_8 is the number of bits to keep - effectively
4049 * the significant bits in the *input* when the output will
4050 * eventually be 8 bits. By default it is 11.
4051 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004052 if (shift < (16U - PNG_MAX_GAMMA_8))
4053 shift = (16U - PNG_MAX_GAMMA_8);
4054 }
4055
4056 if (shift > 8U)
4057 shift = 8U; /* Guarantees at least one table! */
4058
4059 png_ptr->gamma_shift = shift;
4060
Glenn Randers-Pehrsonef217b72011-06-15 12:58:27 -05004061 /* NOTE: prior to 1.5.4 this test used to include PNG_BACKGROUND (now
John Bowlerd273ad22011-05-07 21:00:28 -05004062 * PNG_COMPOSE). This effectively smashed the background calculation for
Glenn Randers-Pehrson55fbff32011-05-17 06:49:32 -05004063 * 16-bit output because the 8-bit table assumes the result will be reduced
John Bowlerd273ad22011-05-07 21:00:28 -05004064 * to 8 bits.
4065 */
Glenn Randers-Pehrsonab63dd02011-06-17 20:04:17 -05004066 if (png_ptr->transformations & (PNG_16_TO_8 | PNG_SCALE_16_TO_8))
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004067 png_build_16to8_table(png_ptr, &png_ptr->gamma_16_table, shift,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004068 png_ptr->screen_gamma > 0 ? png_product2(png_ptr->colorspace.gamma,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004069 png_ptr->screen_gamma) : PNG_FP_1);
4070
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004071 else
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004072 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_table, shift,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004073 png_ptr->screen_gamma > 0 ? png_reciprocal2(png_ptr->colorspace.gamma,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004074 png_ptr->screen_gamma) : PNG_FP_1);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004075
4076#if defined(PNG_READ_BACKGROUND_SUPPORTED) || \
John Bowlerd273ad22011-05-07 21:00:28 -05004077 defined(PNG_READ_ALPHA_MODE_SUPPORTED) || \
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004078 defined(PNG_READ_RGB_TO_GRAY_SUPPORTED)
John Bowlerd273ad22011-05-07 21:00:28 -05004079 if (png_ptr->transformations & (PNG_COMPOSE | PNG_RGB_TO_GRAY))
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004080 {
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004081 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_to_1, shift,
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004082 png_reciprocal(png_ptr->colorspace.gamma));
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004083
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004084 /* Notice that the '16 from 1' table should be full precision, however
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004085 * the lookup on this table still uses gamma_shift, so it can't be.
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004086 * TODO: fix this.
4087 */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004088 png_build_16bit_table(png_ptr, &png_ptr->gamma_16_from_1, shift,
Glenn Randers-Pehrson7b81e2e2010-07-29 22:54:34 -05004089 png_ptr->screen_gamma > 0 ? png_reciprocal(png_ptr->screen_gamma) :
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004090 png_ptr->colorspace.gamma/* Probably doing rgb_to_gray */);
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004091 }
John Bowlerd273ad22011-05-07 21:00:28 -05004092#endif /* READ_BACKGROUND || READ_ALPHA_MODE || RGB_TO_GRAY */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004093 }
Glenn Randers-Pehrson11321342013-11-18 20:12:24 -06004094#endif /* 16BIT */
Glenn Randers-Pehrson31aee0d2010-07-29 17:39:14 -05004095}
4096#endif /* READ_GAMMA */
John Bowler7875d532011-11-07 22:33:49 -06004097
Glenn Randers-Pehrsonc4b37182014-04-06 08:59:57 -05004098/* HARDWARE OR SOFTWARE OPTION SUPPORT */
John Bowlerf3728102013-03-04 16:26:31 -06004099#ifdef PNG_SET_OPTION_SUPPORTED
4100int PNGAPI
4101png_set_option(png_structrp png_ptr, int option, int onoff)
4102{
4103 if (png_ptr != NULL && option >= 0 && option < PNG_OPTION_NEXT &&
4104 (option & 1) == 0)
4105 {
4106 int mask = 3 << option;
4107 int setting = (2 + (onoff != 0)) << option;
4108 int current = png_ptr->options;
4109
4110 png_ptr->options = (png_byte)((current & ~mask) | setting);
4111
4112 return (current & mask) >> option;
4113 }
4114
4115 return PNG_OPTION_INVALID;
4116}
4117#endif
4118
John Bowler7875d532011-11-07 22:33:49 -06004119/* sRGB support */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004120#if defined(PNG_SIMPLIFIED_READ_SUPPORTED) ||\
4121 defined(PNG_SIMPLIFIED_WRITE_SUPPORTED)
John Bowler0a521d32011-11-11 18:14:59 -06004122/* sRGB conversion tables; these are machine generated with the code in
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004123 * contrib/tools/makesRGB.c. The actual sRGB transfer curve defined in the
4124 * specification (see the article at http://en.wikipedia.org/wiki/SRGB)
4125 * is used, not the gamma=1/2.2 approximation use elsewhere in libpng.
4126 * The sRGB to linear table is exact (to the nearest 16 bit linear fraction).
4127 * The inverse (linear to sRGB) table has accuracies as follows:
John Bowler0a521d32011-11-11 18:14:59 -06004128 *
4129 * For all possible (255*65535+1) input values:
4130 *
4131 * error: -0.515566 - 0.625971, 79441 (0.475369%) of readings inexact
4132 *
4133 * For the input values corresponding to the 65536 16-bit values:
4134 *
4135 * error: -0.513727 - 0.607759, 308 (0.469978%) of readings inexact
4136 *
4137 * In all cases the inexact readings are off by one.
John Bowler7875d532011-11-07 22:33:49 -06004138 */
John Bowler7875d532011-11-07 22:33:49 -06004139
4140#ifdef PNG_SIMPLIFIED_READ_SUPPORTED
4141/* The convert-to-sRGB table is only currently required for read. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004142const png_uint_16 png_sRGB_table[256] =
John Bowler7875d532011-11-07 22:33:49 -06004143{
4144 0,20,40,60,80,99,119,139,
4145 159,179,199,219,241,264,288,313,
4146 340,367,396,427,458,491,526,562,
4147 599,637,677,718,761,805,851,898,
4148 947,997,1048,1101,1156,1212,1270,1330,
4149 1391,1453,1517,1583,1651,1720,1790,1863,
4150 1937,2013,2090,2170,2250,2333,2418,2504,
4151 2592,2681,2773,2866,2961,3058,3157,3258,
4152 3360,3464,3570,3678,3788,3900,4014,4129,
4153 4247,4366,4488,4611,4736,4864,4993,5124,
4154 5257,5392,5530,5669,5810,5953,6099,6246,
4155 6395,6547,6700,6856,7014,7174,7335,7500,
4156 7666,7834,8004,8177,8352,8528,8708,8889,
4157 9072,9258,9445,9635,9828,10022,10219,10417,
4158 10619,10822,11028,11235,11446,11658,11873,12090,
4159 12309,12530,12754,12980,13209,13440,13673,13909,
4160 14146,14387,14629,14874,15122,15371,15623,15878,
4161 16135,16394,16656,16920,17187,17456,17727,18001,
4162 18277,18556,18837,19121,19407,19696,19987,20281,
4163 20577,20876,21177,21481,21787,22096,22407,22721,
4164 23038,23357,23678,24002,24329,24658,24990,25325,
4165 25662,26001,26344,26688,27036,27386,27739,28094,
4166 28452,28813,29176,29542,29911,30282,30656,31033,
4167 31412,31794,32179,32567,32957,33350,33745,34143,
4168 34544,34948,35355,35764,36176,36591,37008,37429,
4169 37852,38278,38706,39138,39572,40009,40449,40891,
4170 41337,41785,42236,42690,43147,43606,44069,44534,
4171 45002,45473,45947,46423,46903,47385,47871,48359,
4172 48850,49344,49841,50341,50844,51349,51858,52369,
4173 52884,53401,53921,54445,54971,55500,56032,56567,
4174 57105,57646,58190,58737,59287,59840,60396,60955,
4175 61517,62082,62650,63221,63795,64372,64952,65535
4176};
John Bowler0a521d32011-11-11 18:14:59 -06004177
John Bowler7875d532011-11-07 22:33:49 -06004178#endif /* simplified read only */
4179
4180/* The base/delta tables are required for both read and write (but currently
4181 * only the simplified versions.)
4182 */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004183const png_uint_16 png_sRGB_base[512] =
John Bowler7875d532011-11-07 22:33:49 -06004184{
John Bowler0a521d32011-11-11 18:14:59 -06004185 128,1782,3383,4644,5675,6564,7357,8074,
4186 8732,9346,9921,10463,10977,11466,11935,12384,
4187 12816,13233,13634,14024,14402,14769,15125,15473,
4188 15812,16142,16466,16781,17090,17393,17690,17981,
John Bowler7875d532011-11-07 22:33:49 -06004189 18266,18546,18822,19093,19359,19621,19879,20133,
John Bowler0a521d32011-11-11 18:14:59 -06004190 20383,20630,20873,21113,21349,21583,21813,22041,
4191 22265,22487,22707,22923,23138,23350,23559,23767,
John Bowler7875d532011-11-07 22:33:49 -06004192 23972,24175,24376,24575,24772,24967,25160,25352,
John Bowler0a521d32011-11-11 18:14:59 -06004193 25542,25730,25916,26101,26284,26465,26645,26823,
4194 27000,27176,27350,27523,27695,27865,28034,28201,
John Bowler7875d532011-11-07 22:33:49 -06004195 28368,28533,28697,28860,29021,29182,29341,29500,
John Bowler0a521d32011-11-11 18:14:59 -06004196 29657,29813,29969,30123,30276,30429,30580,30730,
John Bowler7875d532011-11-07 22:33:49 -06004197 30880,31028,31176,31323,31469,31614,31758,31902,
John Bowler0a521d32011-11-11 18:14:59 -06004198 32045,32186,32327,32468,32607,32746,32884,33021,
4199 33158,33294,33429,33564,33697,33831,33963,34095,
4200 34226,34357,34486,34616,34744,34873,35000,35127,
John Bowler7875d532011-11-07 22:33:49 -06004201 35253,35379,35504,35629,35753,35876,35999,36122,
4202 36244,36365,36486,36606,36726,36845,36964,37083,
John Bowler0a521d32011-11-11 18:14:59 -06004203 37201,37318,37435,37551,37668,37783,37898,38013,
John Bowler7875d532011-11-07 22:33:49 -06004204 38127,38241,38354,38467,38580,38692,38803,38915,
John Bowler0a521d32011-11-11 18:14:59 -06004205 39026,39136,39246,39356,39465,39574,39682,39790,
John Bowler7875d532011-11-07 22:33:49 -06004206 39898,40005,40112,40219,40325,40431,40537,40642,
4207 40747,40851,40955,41059,41163,41266,41369,41471,
John Bowler0a521d32011-11-11 18:14:59 -06004208 41573,41675,41777,41878,41979,42079,42179,42279,
4209 42379,42478,42577,42676,42775,42873,42971,43068,
4210 43165,43262,43359,43456,43552,43648,43743,43839,
4211 43934,44028,44123,44217,44311,44405,44499,44592,
4212 44685,44778,44870,44962,45054,45146,45238,45329,
John Bowler7875d532011-11-07 22:33:49 -06004213 45420,45511,45601,45692,45782,45872,45961,46051,
John Bowler0a521d32011-11-11 18:14:59 -06004214 46140,46229,46318,46406,46494,46583,46670,46758,
4215 46846,46933,47020,47107,47193,47280,47366,47452,
4216 47538,47623,47709,47794,47879,47964,48048,48133,
4217 48217,48301,48385,48468,48552,48635,48718,48801,
4218 48884,48966,49048,49131,49213,49294,49376,49458,
4219 49539,49620,49701,49782,49862,49943,50023,50103,
4220 50183,50263,50342,50422,50501,50580,50659,50738,
4221 50816,50895,50973,51051,51129,51207,51285,51362,
4222 51439,51517,51594,51671,51747,51824,51900,51977,
4223 52053,52129,52205,52280,52356,52432,52507,52582,
John Bowler7875d532011-11-07 22:33:49 -06004224 52657,52732,52807,52881,52956,53030,53104,53178,
John Bowler0a521d32011-11-11 18:14:59 -06004225 53252,53326,53400,53473,53546,53620,53693,53766,
John Bowler7875d532011-11-07 22:33:49 -06004226 53839,53911,53984,54056,54129,54201,54273,54345,
4227 54417,54489,54560,54632,54703,54774,54845,54916,
John Bowler0a521d32011-11-11 18:14:59 -06004228 54987,55058,55129,55199,55269,55340,55410,55480,
4229 55550,55620,55689,55759,55828,55898,55967,56036,
4230 56105,56174,56243,56311,56380,56448,56517,56585,
John Bowler7875d532011-11-07 22:33:49 -06004231 56653,56721,56789,56857,56924,56992,57059,57127,
4232 57194,57261,57328,57395,57462,57529,57595,57662,
4233 57728,57795,57861,57927,57993,58059,58125,58191,
4234 58256,58322,58387,58453,58518,58583,58648,58713,
4235 58778,58843,58908,58972,59037,59101,59165,59230,
4236 59294,59358,59422,59486,59549,59613,59677,59740,
4237 59804,59867,59930,59993,60056,60119,60182,60245,
4238 60308,60370,60433,60495,60558,60620,60682,60744,
4239 60806,60868,60930,60992,61054,61115,61177,61238,
4240 61300,61361,61422,61483,61544,61605,61666,61727,
John Bowler0a521d32011-11-11 18:14:59 -06004241 61788,61848,61909,61969,62030,62090,62150,62211,
John Bowler7875d532011-11-07 22:33:49 -06004242 62271,62331,62391,62450,62510,62570,62630,62689,
4243 62749,62808,62867,62927,62986,63045,63104,63163,
John Bowler0a521d32011-11-11 18:14:59 -06004244 63222,63281,63340,63398,63457,63515,63574,63632,
John Bowler7875d532011-11-07 22:33:49 -06004245 63691,63749,63807,63865,63923,63981,64039,64097,
John Bowler0a521d32011-11-11 18:14:59 -06004246 64155,64212,64270,64328,64385,64443,64500,64557,
4247 64614,64672,64729,64786,64843,64900,64956,65013,
4248 65070,65126,65183,65239,65296,65352,65409,65465
John Bowler7875d532011-11-07 22:33:49 -06004249};
4250
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004251const png_byte png_sRGB_delta[512] =
John Bowler7875d532011-11-07 22:33:49 -06004252{
John Bowler0a521d32011-11-11 18:14:59 -06004253 207,201,158,129,113,100,90,82,77,72,68,64,61,59,56,54,
John Bowler7875d532011-11-07 22:33:49 -06004254 52,50,49,47,46,45,43,42,41,40,39,39,38,37,36,36,
4255 35,34,34,33,33,32,32,31,31,30,30,30,29,29,28,28,
John Bowler0a521d32011-11-11 18:14:59 -06004256 28,27,27,27,27,26,26,26,25,25,25,25,24,24,24,24,
John Bowler7875d532011-11-07 22:33:49 -06004257 23,23,23,23,23,22,22,22,22,22,22,21,21,21,21,21,
4258 21,20,20,20,20,20,20,20,20,19,19,19,19,19,19,19,
4259 19,18,18,18,18,18,18,18,18,18,18,17,17,17,17,17,
4260 17,17,17,17,17,17,16,16,16,16,16,16,16,16,16,16,
4261 16,16,16,16,15,15,15,15,15,15,15,15,15,15,15,15,
4262 15,15,15,15,14,14,14,14,14,14,14,14,14,14,14,14,
4263 14,14,14,14,14,14,14,13,13,13,13,13,13,13,13,13,
4264 13,13,13,13,13,13,13,13,13,13,13,13,13,13,12,12,
4265 12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,12,
4266 12,12,12,12,12,12,12,12,12,12,12,12,11,11,11,11,
4267 11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,
4268 11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,11,
4269 11,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4270 10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4271 10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,10,
4272 10,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4273 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4274 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4275 9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,9,
4276 9,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4277 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4278 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4279 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4280 8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,8,
4281 8,8,8,8,8,8,8,8,8,7,7,7,7,7,7,7,
4282 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
4283 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,
4284 7,7,7,7,7,7,7,7,7,7,7,7,7,7,7,7
4285};
John Bowler7875d532011-11-07 22:33:49 -06004286#endif /* SIMPLIFIED READ/WRITE sRGB support */
4287
4288/* SIMPLIFIED READ/WRITE SUPPORT */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004289#if defined(PNG_SIMPLIFIED_READ_SUPPORTED) ||\
4290 defined(PNG_SIMPLIFIED_WRITE_SUPPORTED)
John Bowler7875d532011-11-07 22:33:49 -06004291static int
4292png_image_free_function(png_voidp argument)
4293{
John Bowler4fa96a42011-11-16 16:39:16 -06004294 png_imagep image = png_voidcast(png_imagep, argument);
John Bowler7875d532011-11-07 22:33:49 -06004295 png_controlp cp = image->opaque;
4296 png_control c;
4297
4298 /* Double check that we have a png_ptr - it should be impossible to get here
4299 * without one.
4300 */
4301 if (cp->png_ptr == NULL)
4302 return 0;
4303
4304 /* First free any data held in the control structure. */
4305# ifdef PNG_STDIO_SUPPORTED
4306 if (cp->owned_file)
4307 {
John Bowler4fa96a42011-11-16 16:39:16 -06004308 FILE *fp = png_voidcast(FILE*, cp->png_ptr->io_ptr);
John Bowler7875d532011-11-07 22:33:49 -06004309 cp->owned_file = 0;
4310
4311 /* Ignore errors here. */
4312 if (fp != NULL)
4313 {
4314 cp->png_ptr->io_ptr = NULL;
4315 (void)fclose(fp);
4316 }
4317 }
4318# endif
4319
4320 /* Copy the control structure so that the original, allocated, version can be
4321 * safely freed. Notice that a png_error here stops the remainder of the
4322 * cleanup, but this is probably fine because that would indicate bad memory
4323 * problems anyway.
4324 */
4325 c = *cp;
4326 image->opaque = &c;
4327 png_free(c.png_ptr, cp);
4328
4329 /* Then the structures, calling the correct API. */
4330 if (c.for_write)
4331 {
4332# ifdef PNG_SIMPLIFIED_WRITE_SUPPORTED
4333 png_destroy_write_struct(&c.png_ptr, &c.info_ptr);
4334# else
4335 png_error(c.png_ptr, "simplified write not supported");
4336# endif
4337 }
4338 else
4339 {
4340# ifdef PNG_SIMPLIFIED_READ_SUPPORTED
4341 png_destroy_read_struct(&c.png_ptr, &c.info_ptr, NULL);
4342# else
4343 png_error(c.png_ptr, "simplified read not supported");
4344# endif
4345 }
4346
4347 /* Success. */
4348 return 1;
4349}
4350
4351void PNGAPI
4352png_image_free(png_imagep image)
4353{
4354 /* Safely call the real function, but only if doing so is safe at this point
4355 * (if not inside an error handling context). Otherwise assume
4356 * png_safe_execute will call this API after the return.
4357 */
4358 if (image != NULL && image->opaque != NULL &&
4359 image->opaque->error_buf == NULL)
4360 {
4361 /* Ignore errors here: */
4362 (void)png_safe_execute(image, png_image_free_function, image);
4363 image->opaque = NULL;
4364 }
4365}
4366
4367int /* PRIVATE */
4368png_image_error(png_imagep image, png_const_charp error_message)
4369{
4370 /* Utility to log an error. */
Glenn Randers-Pehrson871b1d02013-03-02 14:58:22 -06004371 png_safecat(image->message, (sizeof image->message), 0, error_message);
4372 image->warning_or_error |= PNG_IMAGE_ERROR;
John Bowler7875d532011-11-07 22:33:49 -06004373 png_image_free(image);
4374 return 0;
4375}
4376
4377#endif /* SIMPLIFIED READ/WRITE */
Glenn Randers-Pehrson29034c52010-07-29 17:58:49 -05004378#endif /* defined(PNG_READ_SUPPORTED) || defined(PNG_WRITE_SUPPORTED) */