blob: b76b8dd8ae33a47666bcaff5a3b95200cd6941d7 [file] [log] [blame]
Glenn Randers-Pehrsone6474622006-03-04 16:50:47 -06001
Andreas Dilger47a0c421997-05-16 02:46:07 -05002/* pngrutil.c - utilities to read a PNG file
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06003 *
Glenn Randers-Pehrson67ee8ce2011-12-22 08:21:00 -06004 * Last changed in libpng 1.6.0 [(PENDING RELEASE)]
Glenn Randers-Pehrson1531bd62012-01-01 14:45:04 -06005 * Copyright (c) 1998-2012 Glenn Randers-Pehrson
Glenn Randers-Pehrsond4366722000-06-04 14:29:29 -05006 * (Version 0.96 Copyright (c) 1996, 1997 Andreas Dilger)
7 * (Version 0.88 Copyright (c) 1995, 1996 Guy Eric Schalnat, Group 42, Inc.)
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06008 *
Glenn Randers-Pehrsonbfbf8652009-06-26 21:46:52 -05009 * This code is released under the libpng license.
Glenn Randers-Pehrsonc332bbc2009-06-25 13:43:50 -050010 * For conditions of distribution and use, see the disclaimer
Glenn Randers-Pehrson037023b2009-06-24 10:27:36 -050011 * and license in png.h
Glenn Randers-Pehrson3e61d792009-06-24 09:31:28 -050012 *
Glenn Randers-Pehrson8686fff1998-05-21 09:27:50 -050013 * This file contains routines that are only called from within
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -060014 * libpng itself during the course of reading an image.
15 */
Guy Schalnat0d580581995-07-20 02:43:20 -050016
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -050017#include "pngpriv.h"
Guy Schalnat0d580581995-07-20 02:43:20 -050018
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -060019#ifdef PNG_READ_SUPPORTED
Guy Schalnat0d580581995-07-20 02:43:20 -050020
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -060021#define png_strtod(p,a,b) strtod(a,b)
22
23png_uint_32 PNGAPI
John Bowler5d567862011-12-24 09:12:00 -060024png_get_uint_31(png_const_structrp png_ptr, png_const_bytep buf)
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -060025{
26 png_uint_32 uval = png_get_uint_32(buf);
27
28 if (uval > PNG_UINT_31_MAX)
29 png_error(png_ptr, "PNG unsigned integer out of range");
30
31 return (uval);
32}
33
34#if defined(PNG_READ_gAMA_SUPPORTED) || defined(PNG_READ_cHRM_SUPPORTED)
35/* The following is a variation on the above for use with the fixed
36 * point values used for gAMA and cHRM. Instead of png_error it
37 * issues a warning and returns (-1) - an invalid value because both
38 * gAMA and cHRM use *unsigned* integers for fixed point values.
39 */
40#define PNG_FIXED_ERROR (-1)
41
42static png_fixed_point /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -060043png_get_fixed_point(png_structrp png_ptr, png_const_bytep buf)
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -060044{
45 png_uint_32 uval = png_get_uint_32(buf);
46
47 if (uval <= PNG_UINT_31_MAX)
48 return (png_fixed_point)uval; /* known to be in range */
49
50 /* The caller can turn off the warning by passing NULL. */
51 if (png_ptr != NULL)
52 png_warning(png_ptr, "PNG fixed point integer out of range");
53
54 return PNG_FIXED_ERROR;
55}
56#endif
57
58#ifdef PNG_READ_INT_FUNCTIONS_SUPPORTED
59/* NOTE: the read macros will obscure these definitions, so that if
60 * PNG_USE_READ_MACROS is set the library will not use them internally,
61 * but the APIs will still be available externally.
62 *
63 * The parentheses around "PNGAPI function_name" in the following three
64 * functions are necessary because they allow the macros to co-exist with
65 * these (unused but exported) functions.
66 */
67
68/* Grab an unsigned 32-bit integer from a buffer in big-endian format. */
69png_uint_32 (PNGAPI
70png_get_uint_32)(png_const_bytep buf)
71{
72 png_uint_32 uval =
73 ((png_uint_32)(*(buf )) << 24) +
74 ((png_uint_32)(*(buf + 1)) << 16) +
75 ((png_uint_32)(*(buf + 2)) << 8) +
76 ((png_uint_32)(*(buf + 3)) ) ;
77
78 return uval;
Guy Schalnat0d580581995-07-20 02:43:20 -050079}
80
Glenn Randers-Pehrson8686fff1998-05-21 09:27:50 -050081/* Grab a signed 32-bit integer from a buffer in big-endian format. The
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -060082 * data is stored in the PNG file in two's complement format and there
83 * is no guarantee that a 'png_int_32' is exactly 32 bits, therefore
84 * the following code does a two's complement to native conversion.
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -050085 */
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -060086png_int_32 (PNGAPI
87png_get_int_32)(png_const_bytep buf)
Andreas Dilger47a0c421997-05-16 02:46:07 -050088{
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -060089 png_uint_32 uval = png_get_uint_32(buf);
John Bowlerf3f7e142011-09-09 07:32:37 -050090 if ((uval & 0x80000000) == 0) /* non-negative */
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -060091 return uval;
Andreas Dilger47a0c421997-05-16 02:46:07 -050092
John Bowlerf3f7e142011-09-09 07:32:37 -050093 uval = (uval ^ 0xffffffff) + 1; /* 2's complement: -x = ~x+1 */
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -060094 return -(png_int_32)uval;
Andreas Dilger47a0c421997-05-16 02:46:07 -050095}
Andreas Dilger47a0c421997-05-16 02:46:07 -050096
Glenn Randers-Pehrson8686fff1998-05-21 09:27:50 -050097/* Grab an unsigned 16-bit integer from a buffer in big-endian format. */
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -060098png_uint_16 (PNGAPI
99png_get_uint_16)(png_const_bytep buf)
Guy Schalnat0d580581995-07-20 02:43:20 -0500100{
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600101 /* ANSI-C requires an int value to accomodate at least 16 bits so this
102 * works and allows the compiler not to worry about possible narrowing
103 * on 32 bit systems. (Pre-ANSI systems did not make integers smaller
104 * than 16 bits either.)
105 */
106 unsigned int val =
107 ((unsigned int)(*buf) << 8) +
108 ((unsigned int)(*(buf + 1)));
Guy Schalnat0d580581995-07-20 02:43:20 -0500109
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600110 return (png_uint_16)val;
Guy Schalnat0d580581995-07-20 02:43:20 -0500111}
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600112
113#endif /* PNG_READ_INT_FUNCTIONS_SUPPORTED */
114
115/* Read and check the PNG file signature */
116void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -0600117png_read_sig(png_structrp png_ptr, png_inforp info_ptr)
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600118{
119 png_size_t num_checked, num_to_check;
120
121 /* Exit if the user application does not expect a signature. */
122 if (png_ptr->sig_bytes >= 8)
123 return;
124
125 num_checked = png_ptr->sig_bytes;
126 num_to_check = 8 - num_checked;
127
128#ifdef PNG_IO_STATE_SUPPORTED
129 png_ptr->io_state = PNG_IO_READING | PNG_IO_SIGNATURE;
130#endif
131
132 /* The signature must be serialized in a single I/O call. */
133 png_read_data(png_ptr, &(info_ptr->signature[num_checked]), num_to_check);
134 png_ptr->sig_bytes = 8;
135
136 if (png_sig_cmp(info_ptr->signature, num_checked, num_to_check))
137 {
138 if (num_checked < 4 &&
139 png_sig_cmp(info_ptr->signature, num_checked, num_to_check - 4))
140 png_error(png_ptr, "Not a PNG file");
141 else
142 png_error(png_ptr, "PNG file corrupted by ASCII conversion");
143 }
144 if (num_checked < 3)
145 png_ptr->mode |= PNG_HAVE_PNG_SIGNATURE;
146}
Glenn Randers-Pehrsona5815562010-11-20 21:48:29 -0600147
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -0500148/* Read the chunk header (length + type name).
149 * Put the type name into png_ptr->chunk_name, and return the length.
150 */
151png_uint_32 /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -0600152png_read_chunk_header(png_structrp png_ptr)
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -0500153{
154 png_byte buf[8];
155 png_uint_32 length;
156
157#ifdef PNG_IO_STATE_SUPPORTED
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -0500158 png_ptr->io_state = PNG_IO_READING | PNG_IO_CHUNK_HDR;
159#endif
160
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600161 /* Read the length and the chunk name.
162 * This must be performed in a single I/O call.
163 */
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -0500164 png_read_data(png_ptr, buf, 8);
165 length = png_get_uint_31(png_ptr, buf);
166
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600167 /* Put the chunk name into png_ptr->chunk_name. */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500168 png_ptr->chunk_name = PNG_CHUNK_FROM_STRING(buf+4);
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -0500169
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500170 png_debug2(0, "Reading %lx chunk, length = %lu",
171 (unsigned long)png_ptr->chunk_name, (unsigned long)length);
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -0500172
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600173 /* Reset the crc and run it over the chunk name. */
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -0500174 png_reset_crc(png_ptr);
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500175 png_calculate_crc(png_ptr, buf + 4, 4);
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -0500176
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600177 /* Check to see if chunk name is valid. */
Glenn Randers-Pehrson895a9c92008-07-25 08:51:18 -0500178 png_check_chunk_name(png_ptr, png_ptr->chunk_name);
179
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -0500180#ifdef PNG_IO_STATE_SUPPORTED
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -0500181 png_ptr->io_state = PNG_IO_READING | PNG_IO_CHUNK_DATA;
182#endif
183
184 return length;
185}
186
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500187/* Read data, and (optionally) run it through the CRC. */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500188void /* PRIVATE */
John Bowler0ae4f7b2012-03-03 21:10:26 -0600189png_crc_read(png_structrp png_ptr, png_bytep buf, png_uint_32 length)
Guy Schalnat0d580581995-07-20 02:43:20 -0500190{
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500191 if (png_ptr == NULL)
192 return;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600193
Guy Schalnat6d764711995-12-19 03:22:19 -0600194 png_read_data(png_ptr, buf, length);
Andreas Dilger47a0c421997-05-16 02:46:07 -0500195 png_calculate_crc(png_ptr, buf, length);
Guy Schalnat0d580581995-07-20 02:43:20 -0500196}
197
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600198/* Optionally skip data and then check the CRC. Depending on whether we
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500199 * are reading a ancillary or critical chunk, and how the program has set
200 * things up, we may calculate the CRC on the data and print a message.
201 * Returns '1' if there was a CRC error, '0' otherwise.
202 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500203int /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -0600204png_crc_finish(png_structrp png_ptr, png_uint_32 skip)
Guy Schalnat0d580581995-07-20 02:43:20 -0500205{
John Bowlerb5d00512012-03-09 09:15:18 -0600206 /* The size of the local buffer for inflate is a good guess as to a
207 * reasonable size to use for buffering reads from the application.
208 */
209 while (skip > 0)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600210 {
John Bowlerb5d00512012-03-09 09:15:18 -0600211 png_uint_32 len;
212 png_byte tmpbuf[PNG_INFLATE_BUF_SIZE];
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600213
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -0500214 len = (sizeof tmpbuf);
John Bowlerb5d00512012-03-09 09:15:18 -0600215 if (len > skip)
216 len = skip;
217 skip -= len;
218
219 png_crc_read(png_ptr, tmpbuf, len);
Guy Schalnat0d580581995-07-20 02:43:20 -0500220 }
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600221
Andreas Dilger47a0c421997-05-16 02:46:07 -0500222 if (png_crc_error(png_ptr))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600223 {
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500224 if (PNG_CHUNK_ANCILLIARY(png_ptr->chunk_name) ?
225 !(png_ptr->flags & PNG_FLAG_CRC_ANCILLARY_NOWARN) :
226 (png_ptr->flags & PNG_FLAG_CRC_CRITICAL_USE))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600227 {
Glenn Randers-Pehrson70e3f541998-01-03 22:40:55 -0600228 png_chunk_warning(png_ptr, "CRC error");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600229 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600230
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600231 else
232 {
Glenn Randers-Pehrson6bc53be2006-06-16 07:52:03 -0500233 png_chunk_benign_error(png_ptr, "CRC error");
234 return (0);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600235 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600236
Glenn Randers-Pehrsonb2120021998-01-31 20:07:59 -0600237 return (1);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600238 }
239
Glenn Randers-Pehrsonb2120021998-01-31 20:07:59 -0600240 return (0);
Guy Schalnat0d580581995-07-20 02:43:20 -0500241}
242
Glenn Randers-Pehrsonc4a2ae61998-01-16 22:06:18 -0600243/* Compare the CRC stored in the PNG file with that calculated by libpng from
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500244 * the data it has read thus far.
245 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500246int /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -0600247png_crc_error(png_structrp png_ptr)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600248{
249 png_byte crc_bytes[4];
250 png_uint_32 crc;
Andreas Dilger47a0c421997-05-16 02:46:07 -0500251 int need_crc = 1;
252
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500253 if (PNG_CHUNK_ANCILLIARY(png_ptr->chunk_name))
Andreas Dilger47a0c421997-05-16 02:46:07 -0500254 {
255 if ((png_ptr->flags & PNG_FLAG_CRC_ANCILLARY_MASK) ==
256 (PNG_FLAG_CRC_ANCILLARY_USE | PNG_FLAG_CRC_ANCILLARY_NOWARN))
257 need_crc = 0;
258 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600259
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -0500260 else /* critical */
Andreas Dilger47a0c421997-05-16 02:46:07 -0500261 {
262 if (png_ptr->flags & PNG_FLAG_CRC_CRITICAL_IGNORE)
263 need_crc = 0;
264 }
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600265
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -0500266#ifdef PNG_IO_STATE_SUPPORTED
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -0500267 png_ptr->io_state = PNG_IO_READING | PNG_IO_CHUNK_CRC;
268#endif
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500269
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600270 /* The chunk CRC must be serialized in a single I/O call. */
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600271 png_read_data(png_ptr, crc_bytes, 4);
272
Andreas Dilger47a0c421997-05-16 02:46:07 -0500273 if (need_crc)
274 {
275 crc = png_get_uint_32(crc_bytes);
Glenn Randers-Pehrsonb2120021998-01-31 20:07:59 -0600276 return ((int)(crc != png_ptr->crc));
Andreas Dilger47a0c421997-05-16 02:46:07 -0500277 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600278
Andreas Dilger47a0c421997-05-16 02:46:07 -0500279 else
Glenn Randers-Pehrsonb2120021998-01-31 20:07:59 -0600280 return (0);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600281}
282
John Bowlerb5d00512012-03-09 09:15:18 -0600283/* Manage the read buffer; this simply reallocates the buffer if it is not small
284 * enough (or if it is not allocated). The routine returns a pointer to the
285 * buffer, if an error occurs and 'warn' is set the routine returns NULL, else
286 * it will call png_error (via png_malloc) on failure. (warn == 2 means
287 * 'silent').
John Bowler42a2b552012-03-05 20:57:40 -0600288 */
John Bowlerb5d00512012-03-09 09:15:18 -0600289static png_bytep
290png_read_buffer(png_structrp png_ptr, png_alloc_size_t new_size, int warn)
John Bowler42a2b552012-03-05 20:57:40 -0600291{
John Bowlerb5d00512012-03-09 09:15:18 -0600292 png_bytep buffer = png_ptr->read_buffer;
293
294 if (buffer != NULL && new_size > png_ptr->read_buffer_size)
295 {
296 png_ptr->read_buffer = NULL;
297 png_ptr->read_buffer = NULL;
298 png_ptr->read_buffer_size = 0;
299 png_free(png_ptr, buffer);
300 buffer = NULL;
301 }
302
303 if (buffer == NULL)
304 {
305 buffer = png_voidcast(png_bytep, png_malloc_base(png_ptr, new_size));
306
307 if (buffer != NULL)
308 {
309 png_ptr->read_buffer = buffer;
310 png_ptr->read_buffer_size = new_size;
311 }
312
313 else if (warn < 2) /* else silent */
314 {
Glenn Randers-Pehrson4430b912012-08-09 22:24:04 -0500315#ifdef PNG_WARNINGS_SUPPORTED
316 if (warn)
317 png_chunk_warning(png_ptr, "insufficient memory to read chunk");
318 else
319#endif
320 {
321#ifdef PNG_ERROR_TEXT_SUPPORTED
322 png_chunk_error(png_ptr, "insufficient memory to read chunk");
323#endif
324 }
John Bowlerb5d00512012-03-09 09:15:18 -0600325 }
326 }
327
328 return buffer;
329}
330
331/* png_inflate_claim: claim the zstream for some nefarious purpose that involves
332 * decompression. Returns Z_OK on success, else a zlib error code. It checks
333 * the owner but, in final release builds, just issues a warning if some other
334 * chunk apparently owns the stream. Prior to release it does a png_error.
335 */
336static int
John Bowler90669192012-03-09 22:03:13 -0600337png_inflate_claim(png_structrp png_ptr, png_uint_32 owner, int window_bits)
John Bowlerb5d00512012-03-09 09:15:18 -0600338{
339 if (png_ptr->zowner != 0)
340 {
341 char msg[64];
342
343 PNG_STRING_FROM_CHUNK(msg, png_ptr->zowner);
344 /* So the message that results is "<chunk> using zstream"; this is an
345 * internal error, but is very useful for debugging. i18n requirements
346 * are minimal.
347 */
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -0500348 (void)png_safecat(msg, (sizeof msg), 4, " using zstream");
John Bowler921648a2012-03-28 23:36:12 -0500349# if PNG_LIBPNG_BUILD_BASE_TYPE >= PNG_LIBPNG_BUILD_RC
John Bowlerb5d00512012-03-09 09:15:18 -0600350 png_chunk_warning(png_ptr, msg);
351 png_ptr->zowner = 0;
352# else
353 png_chunk_error(png_ptr, msg);
354# endif
355 }
356
John Bowler42a2b552012-03-05 20:57:40 -0600357 /* Implementation note: unlike 'png_deflate_claim' this internal function
358 * does not take the size of the data as an argument. Some efficiency could
359 * be gained by using this when it is known *if* the zlib stream itself does
360 * not record the number, however this is a chimera: the original writer of
361 * the PNG may have selected a lower window size, and we really must follow
362 * that because, for systems with with limited capabilities, we would
363 * otherwise reject the applications attempts to use a smaller window size.
364 * (zlib doesn't have an interface to say "this or lower"!)
John Bowlerb5d00512012-03-09 09:15:18 -0600365 *
366 * inflateReset2 was added to zlib 1.2.4; before this the window could not be
367 * reset, therefore it is necessary to always allocate the maximum window
368 * size with earlier zlibs just in case later compressed chunks need it.
John Bowler42a2b552012-03-05 20:57:40 -0600369 */
John Bowler42a2b552012-03-05 20:57:40 -0600370 {
371 int ret; /* zlib return code */
372
John Bowlerb5d00512012-03-09 09:15:18 -0600373 /* Set this for safety, just in case the previous owner left pointers to
374 * memory allocations.
375 */
376 png_ptr->zstream.next_in = NULL;
377 png_ptr->zstream.avail_in = 0;
378 png_ptr->zstream.next_out = NULL;
379 png_ptr->zstream.avail_out = 0;
John Bowler42a2b552012-03-05 20:57:40 -0600380
381 if (png_ptr->flags & PNG_FLAG_ZSTREAM_INITIALIZED)
John Bowlerb5d00512012-03-09 09:15:18 -0600382 {
383# if ZLIB_VERNUM < 0x1240
John Bowler90669192012-03-09 22:03:13 -0600384 PNG_UNUSED(window_bits)
John Bowlerb5d00512012-03-09 09:15:18 -0600385 ret = inflateReset(&png_ptr->zstream);
386# else
John Bowler90669192012-03-09 22:03:13 -0600387 ret = inflateReset2(&png_ptr->zstream, window_bits);
John Bowlerb5d00512012-03-09 09:15:18 -0600388# endif
389 }
John Bowler42a2b552012-03-05 20:57:40 -0600390
391 else
392 {
John Bowlerb5d00512012-03-09 09:15:18 -0600393# if ZLIB_VERNUM < 0x1240
394 ret = inflateInit(&png_ptr->zstream);
395# else
John Bowler90669192012-03-09 22:03:13 -0600396 ret = inflateInit2(&png_ptr->zstream, window_bits);
John Bowlerb5d00512012-03-09 09:15:18 -0600397# endif
John Bowler42a2b552012-03-05 20:57:40 -0600398
399 if (ret == Z_OK)
400 png_ptr->flags |= PNG_FLAG_ZSTREAM_INITIALIZED;
401 }
402
403 if (ret == Z_OK)
John Bowlerb5d00512012-03-09 09:15:18 -0600404 png_ptr->zowner = owner;
John Bowler42a2b552012-03-05 20:57:40 -0600405
406 else
John Bowlerb5d00512012-03-09 09:15:18 -0600407 png_zstream_error(png_ptr, ret);
John Bowler42a2b552012-03-05 20:57:40 -0600408
John Bowlerb5d00512012-03-09 09:15:18 -0600409 return ret;
410 }
411}
412
John Bowlerb11b31a2012-03-21 07:55:46 -0500413#ifdef PNG_READ_COMPRESSED_TEXT_SUPPORTED
John Bowlerb5d00512012-03-09 09:15:18 -0600414/* png_inflate now returns zlib error codes including Z_OK and Z_STREAM_END to
415 * allow the caller to do multiple calls if required. If the 'finish' flag is
416 * set Z_FINISH will be passed to the final inflate() call and Z_STREAM_END must
417 * be returned or there has been a problem, otherwise Z_SYNC_FLUSH is used and
418 * Z_OK or Z_STREAM_END will be returned on success.
419 *
420 * The input and output sizes are updated to the actual amounts of data consumed
421 * or written, not the amount available (as in a z_stream). The data pointers
422 * are not changed, so the next input is (data+input_size) and the next
423 * available output is (output+output_size).
424 */
425static int
426png_inflate(png_structrp png_ptr, png_uint_32 owner, int finish,
427 /* INPUT: */ png_const_bytep input, png_uint_32p input_size_ptr,
428 /* OUTPUT: */ png_bytep output, png_alloc_size_t *output_size_ptr)
429{
430 if (png_ptr->zowner == owner) /* Else not claimed */
431 {
432 int ret;
433 png_alloc_size_t avail_out = *output_size_ptr;
434 png_uint_32 avail_in = *input_size_ptr;
435
436 /* zlib can't necessarily handle more than 65535 bytes at once (i.e. it
437 * can't even necessarily handle 65536 bytes) because the type uInt is
438 * "16 bits or more". Consequently it is necessary to chunk the input to
439 * zlib. This code uses ZLIB_IO_MAX, from pngpriv.h, as the maximum (the
440 * maximum value that can be stored in a uInt.) It is possible to set
441 * ZLIB_IO_MAX to a lower value in pngpriv.h and this may sometimes have
442 * a performance advantage, because it reduces the amount of data accessed
443 * at each step and that may give the OS more time to page it in.
444 */
445 png_ptr->zstream.next_in = PNGZ_INPUT_CAST(input);
446 /* avail_in and avail_out are set below from 'size' */
447 png_ptr->zstream.avail_in = 0;
448 png_ptr->zstream.avail_out = 0;
449
450 /* Read directly into the output if it is available (this is set to
451 * a local buffer below if output is NULL).
452 */
453 if (output != NULL)
454 png_ptr->zstream.next_out = output;
455
456 do
457 {
458 uInt avail;
459 Byte local_buffer[PNG_INFLATE_BUF_SIZE];
460
461 /* zlib INPUT BUFFER */
462 /* The setting of 'avail_in' used to be outside the loop; by setting it
463 * inside it is possible to chunk the input to zlib and simply rely on
464 * zlib to advance the 'next_in' pointer. This allows arbitrary
465 * amounts of data to be passed through zlib at the unavoidable cost of
Glenn Randers-Pehrsondbb7e192012-08-10 17:27:42 -0500466 * requiring a window save (memcpy of up to 32768 output bytes)
John Bowlerb5d00512012-03-09 09:15:18 -0600467 * every ZLIB_IO_MAX input bytes.
468 */
469 avail_in += png_ptr->zstream.avail_in; /* not consumed last time */
470
471 avail = ZLIB_IO_MAX;
472
473 if (avail_in < avail)
474 avail = (uInt)avail_in; /* safe: < than ZLIB_IO_MAX */
475
476 avail_in -= avail;
477 png_ptr->zstream.avail_in = avail;
478
479 /* zlib OUTPUT BUFFER */
480 avail_out += png_ptr->zstream.avail_out; /* not written last time */
481
482 avail = ZLIB_IO_MAX; /* maximum zlib can process */
483
484 if (output == NULL)
485 {
486 /* Reset the output buffer each time round if output is NULL and
487 * make available the full buffer, up to 'remaining_space'
488 */
489 png_ptr->zstream.next_out = local_buffer;
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -0500490 if ((sizeof local_buffer) < avail)
491 avail = (sizeof local_buffer);
John Bowlerb5d00512012-03-09 09:15:18 -0600492 }
493
494 if (avail_out < avail)
495 avail = (uInt)avail_out; /* safe: < ZLIB_IO_MAX */
496
497 png_ptr->zstream.avail_out = avail;
498 avail_out -= avail;
499
500 /* zlib inflate call */
501 /* In fact 'avail_out' may be 0 at this point, that happens at the end
502 * of the read when the final LZ end code was not passed at the end of
503 * the previous chunk of input data. Tell zlib if we have reached the
504 * end of the output buffer.
505 */
506 ret = inflate(&png_ptr->zstream, avail_out > 0 ? Z_NO_FLUSH :
507 (finish ? Z_FINISH : Z_SYNC_FLUSH));
508 } while (ret == Z_OK);
509
510 /* For safety kill the local buffer pointer now */
511 if (output == NULL)
512 png_ptr->zstream.next_out = NULL;
513
514 /* Claw back the 'size' and 'remaining_space' byte counts. */
515 avail_in += png_ptr->zstream.avail_in;
516 avail_out += png_ptr->zstream.avail_out;
517
518 /* Update the input and output sizes; the updated values are the amount
519 * consumed or written, effectively the inverse of what zlib uses.
520 */
521 if (avail_out > 0)
522 *output_size_ptr -= avail_out;
523
524 if (avail_in > 0)
525 *input_size_ptr -= avail_in;
526
527 /* Ensure png_ptr->zstream.msg is set (even in the success case!) */
528 png_zstream_error(png_ptr, ret);
529 return ret;
John Bowler42a2b552012-03-05 20:57:40 -0600530 }
531
532 else
Glenn Randers-Pehrsone3f3c4e2010-02-07 18:08:50 -0600533 {
John Bowlerb5d00512012-03-09 09:15:18 -0600534 /* This is a bad internal error. The recovery assigns to the zstream msg
535 * pointer, which is not owned by the caller, but this is safe; it's only
536 * used on errors!
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600537 */
John Bowlerb5d00512012-03-09 09:15:18 -0600538 png_ptr->zstream.msg = PNGZ_MSG_CAST("zstream unclaimed");
539 return Z_STREAM_ERROR;
Glenn Randers-Pehrsone3f3c4e2010-02-07 18:08:50 -0600540 }
Glenn Randers-Pehrsone3f3c4e2010-02-07 18:08:50 -0600541}
542
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600543/*
John Bowlerb5d00512012-03-09 09:15:18 -0600544 * Decompress trailing data in a chunk. The assumption is that read_buffer
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600545 * points at an allocated area holding the contents of a chunk with a
546 * trailing compressed part. What we get back is an allocated area
547 * holding the original prefix part and an uncompressed version of the
548 * trailing part (the malloc area passed in is freed).
549 */
John Bowlerb5d00512012-03-09 09:15:18 -0600550static int
551png_decompress_chunk(png_structrp png_ptr,
552 png_uint_32 chunklength, png_uint_32 prefix_size,
John Bowler0ae4f7b2012-03-03 21:10:26 -0600553 png_alloc_size_t *newlength /* must be initialized to the maximum! */,
554 int terminate /*add a '\0' to the end of the uncompressed data*/)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600555{
John Bowler0ae4f7b2012-03-03 21:10:26 -0600556 /* TODO: implement different limits for different types of chunk.
557 *
558 * The caller supplies *newlength set to the maximum length of the
559 * uncompressed data, but this routine allocates space for the prefix and
560 * maybe a '\0' terminator too. We have to assume that 'prefix_size' is
561 * limited only by the maximum chunk size.
562 */
563 png_alloc_size_t limit = PNG_SIZE_MAX;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600564
John Bowler0ae4f7b2012-03-03 21:10:26 -0600565# ifdef PNG_SET_CHUNK_MALLOC_LIMIT_SUPPORTED
566 if (png_ptr->user_chunk_malloc_max > 0 &&
567 png_ptr->user_chunk_malloc_max < limit)
568 limit = png_ptr->user_chunk_malloc_max;
569# elif PNG_USER_CHUNK_MALLOC_MAX > 0
570 if (PNG_USER_CHUNK_MALLOC_MAX < limit)
571 limit = PNG_USER_CHUNK_MALLOC_MAX;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600572# endif
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600573
John Bowler0ae4f7b2012-03-03 21:10:26 -0600574 if (limit >= prefix_size + (terminate != 0))
575 {
John Bowlerb5d00512012-03-09 09:15:18 -0600576 int ret;
Glenn Randers-Pehrson3744f942012-08-10 19:22:53 -0500577
John Bowler0ae4f7b2012-03-03 21:10:26 -0600578 limit -= prefix_size + (terminate != 0);
579
580 if (limit < *newlength)
581 *newlength = limit;
582
John Bowler90669192012-03-09 22:03:13 -0600583 /* Now try to claim the stream; the 'warn' setting causes zlib to be told
584 * to use the maximum window size during inflate; this hides errors in the
585 * deflate header window bits value which is used if '0' is passed. In
586 * fact this only has an effect with zlib versions 1.2.4 and later - see
587 * the comments in png_inflate_claim above.
588 */
589 ret = png_inflate_claim(png_ptr, png_ptr->chunk_name,
590 png_ptr->flags & PNG_FLAG_BENIGN_ERRORS_WARN ? 15 : 0);
John Bowlerb5d00512012-03-09 09:15:18 -0600591
592 if (ret == Z_OK)
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600593 {
John Bowlerb5d00512012-03-09 09:15:18 -0600594 png_uint_32 lzsize = chunklength - prefix_size;
595
596 ret = png_inflate(png_ptr, png_ptr->chunk_name, 1/*finish*/,
597 /* input: */ png_ptr->read_buffer + prefix_size, &lzsize,
598 /* output: */ NULL, newlength);
Glenn Randers-Pehrson3744f942012-08-10 19:22:53 -0500599
John Bowlerb5d00512012-03-09 09:15:18 -0600600 if (ret == Z_STREAM_END)
601 {
John Bowler90669192012-03-09 22:03:13 -0600602 /* Use 'inflateReset' here, not 'inflateReset2' because this
603 * preserves the previously decided window size (otherwise it would
604 * be necessary to store the previous window size.) In practice
605 * this doesn't matter anyway, because png_inflate will call inflate
606 * with Z_FINISH in almost all cases, so the window will not be
607 * maintained.
608 */
John Bowlerb5d00512012-03-09 09:15:18 -0600609 if (inflateReset(&png_ptr->zstream) == Z_OK)
Glenn Randers-Pehrson20788d32011-01-06 09:01:04 -0600610 {
John Bowler0ae4f7b2012-03-03 21:10:26 -0600611 /* Because of the limit checks above we know that the new,
612 * expanded, size will fit in a size_t (let alone an
613 * png_alloc_size_t). Use png_malloc_base here to avoid an
614 * extra OOM message.
615 */
616 png_alloc_size_t new_size = *newlength;
John Bowlerb5d00512012-03-09 09:15:18 -0600617 png_alloc_size_t buffer_size = prefix_size + new_size +
618 (terminate != 0);
619 png_bytep text = png_voidcast(png_bytep, png_malloc_base(png_ptr,
620 buffer_size));
John Bowler0ae4f7b2012-03-03 21:10:26 -0600621
John Bowlerb5d00512012-03-09 09:15:18 -0600622 if (text != NULL)
John Bowler0ae4f7b2012-03-03 21:10:26 -0600623 {
John Bowlerb5d00512012-03-09 09:15:18 -0600624 ret = png_inflate(png_ptr, png_ptr->chunk_name, 1/*finish*/,
625 png_ptr->read_buffer + prefix_size, &lzsize,
626 text + prefix_size, newlength);
627
628 if (ret == Z_STREAM_END)
629 {
John Bowler0ae4f7b2012-03-03 21:10:26 -0600630 if (new_size == *newlength)
631 {
632 if (terminate)
633 text[prefix_size + *newlength] = 0;
634
635 if (prefix_size > 0)
Glenn Randers-Pehrsondbb7e192012-08-10 17:27:42 -0500636 memcpy(text, png_ptr->read_buffer, prefix_size);
John Bowler0ae4f7b2012-03-03 21:10:26 -0600637
John Bowlerb5d00512012-03-09 09:15:18 -0600638 {
639 png_bytep old_ptr = png_ptr->read_buffer;
640
641 png_ptr->read_buffer = text;
642 png_ptr->read_buffer_size = buffer_size;
643 text = old_ptr; /* freed below */
644 }
John Bowler0ae4f7b2012-03-03 21:10:26 -0600645 }
646
John Bowlerb5d00512012-03-09 09:15:18 -0600647 else
648 {
649 /* The size changed on the second read, there can be no
650 * guarantee that anything is correct at this point.
651 * The 'msg' pointer has been set to "unexpected end of
652 * LZ stream", which is fine, but return an error code
653 * that the caller won't accept.
654 */
655 ret = PNG_UNEXPECTED_ZLIB_RETURN;
656 }
657 }
John Bowler0ae4f7b2012-03-03 21:10:26 -0600658
John Bowlerb5d00512012-03-09 09:15:18 -0600659 else if (ret == Z_OK)
660 ret = PNG_UNEXPECTED_ZLIB_RETURN; /* for safety */
John Bowler0ae4f7b2012-03-03 21:10:26 -0600661
John Bowlerb5d00512012-03-09 09:15:18 -0600662 /* Free the text pointer (this is the old read_buffer on
663 * success)
664 */
665 png_free(png_ptr, text);
666
667 /* This really is very benign, but it's still an error because
668 * the extra space may otherwise be used as a Trojan Horse.
669 */
670 if (ret == Z_STREAM_END &&
671 chunklength - prefix_size != lzsize)
672 png_chunk_benign_error(png_ptr, "extra compressed data");
673 }
674
675 else
676 {
677 /* Out of memory allocating the buffer */
678 ret = Z_MEM_ERROR;
679 png_zstream_error(png_ptr, Z_MEM_ERROR);
John Bowler0ae4f7b2012-03-03 21:10:26 -0600680 }
Glenn Randers-Pehrson20788d32011-01-06 09:01:04 -0600681 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600682
John Bowlerb5d00512012-03-09 09:15:18 -0600683 else
684 {
685 /* inflateReset failed, store the error message */
686 png_zstream_error(png_ptr, ret);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600687
John Bowlerb5d00512012-03-09 09:15:18 -0600688 if (ret == Z_STREAM_END)
689 ret = PNG_UNEXPECTED_ZLIB_RETURN;
690 }
691 }
692
693 else if (ret == Z_OK)
694 ret = PNG_UNEXPECTED_ZLIB_RETURN;
695
696 /* Release the claimed stream */
697 png_ptr->zowner = 0;
Glenn Randers-Pehrson20788d32011-01-06 09:01:04 -0600698 }
John Bowlerb5d00512012-03-09 09:15:18 -0600699
700 else /* the claim failed */ if (ret == Z_STREAM_END) /* impossible! */
701 ret = PNG_UNEXPECTED_ZLIB_RETURN;
702
703 return ret;
Glenn Randers-Pehrson20788d32011-01-06 09:01:04 -0600704 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600705
John Bowlerb5d00512012-03-09 09:15:18 -0600706 else
707 {
708 /* Application/configuration limits exceeded */
709 png_zstream_error(png_ptr, Z_MEM_ERROR);
710 return Z_MEM_ERROR;
711 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -0600712}
Glenn Randers-Pehrson5975f312011-04-01 13:15:36 -0500713#endif /* PNG_READ_COMPRESSED_TEXT_SUPPORTED */
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600714
John Bowlerb11b31a2012-03-21 07:55:46 -0500715#ifdef PNG_READ_iCCP_SUPPORTED
716/* Perform a partial read and decompress, producing 'avail_out' bytes and
717 * reading from the current chunk as required.
718 */
719static int
720png_inflate_read(png_structrp png_ptr, png_bytep read_buffer, uInt read_size,
721 png_uint_32p chunk_bytes, png_bytep next_out, png_alloc_size_t *out_size,
722 int finish)
723{
724 if (png_ptr->zowner == png_ptr->chunk_name)
725 {
726 int ret;
727
728 /* next_in and avail_in must have been initialized by the caller. */
729 png_ptr->zstream.next_out = next_out;
730 png_ptr->zstream.avail_out = 0; /* set in the loop */
731
732 do
733 {
734 if (png_ptr->zstream.avail_in == 0)
735 {
736 if (read_size > *chunk_bytes)
737 read_size = (uInt)*chunk_bytes;
738 *chunk_bytes -= read_size;
739
740 if (read_size > 0)
741 png_crc_read(png_ptr, read_buffer, read_size);
742
743 png_ptr->zstream.next_in = read_buffer;
744 png_ptr->zstream.avail_in = read_size;
745 }
746
747 if (png_ptr->zstream.avail_out == 0)
748 {
749 uInt avail = ZLIB_IO_MAX;
750 if (avail > *out_size)
751 avail = (uInt)*out_size;
752 *out_size -= avail;
753
754 png_ptr->zstream.avail_out = avail;
755 }
756
757 /* Use Z_SYNC_FLUSH when there is no more chunk data to ensure that all
758 * the available output is produced; this allows reading of truncated
759 * streams.
760 */
761 ret = inflate(&png_ptr->zstream,
762 *chunk_bytes > 0 ? Z_NO_FLUSH : (finish ? Z_FINISH : Z_SYNC_FLUSH));
763 }
764 while (ret == Z_OK && (*out_size > 0 || png_ptr->zstream.avail_out > 0));
765
766 *out_size += png_ptr->zstream.avail_out;
767 png_ptr->zstream.avail_out = 0; /* Should not be required, but is safe */
768
769 /* Ensure the error message pointer is always set: */
770 png_zstream_error(png_ptr, ret);
771 return ret;
772 }
773
774 else
775 {
776 png_ptr->zstream.msg = PNGZ_MSG_CAST("zstream unclaimed");
777 return Z_STREAM_ERROR;
778 }
779}
780#endif
781
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500782/* Read and check the IDHR chunk */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500783void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -0600784png_handle_IHDR(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Guy Schalnat0d580581995-07-20 02:43:20 -0500785{
786 png_byte buf[13];
787 png_uint_32 width, height;
788 int bit_depth, color_type, compression_type, filter_type;
789 int interlace_type;
790
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500791 png_debug(1, "in png_handle_IHDR");
Andreas Dilger47a0c421997-05-16 02:46:07 -0500792
Glenn Randers-Pehrson520a7642000-03-21 05:13:06 -0600793 if (png_ptr->mode & PNG_HAVE_IHDR)
John Bowlerb11b31a2012-03-21 07:55:46 -0500794 png_chunk_error(png_ptr, "out of place");
Guy Schalnate5a37791996-06-05 15:50:50 -0500795
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500796 /* Check the length */
Guy Schalnat0d580581995-07-20 02:43:20 -0500797 if (length != 13)
John Bowlerb11b31a2012-03-21 07:55:46 -0500798 png_chunk_error(png_ptr, "invalid");
Guy Schalnat0d580581995-07-20 02:43:20 -0500799
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600800 png_ptr->mode |= PNG_HAVE_IHDR;
801
Guy Schalnat0d580581995-07-20 02:43:20 -0500802 png_crc_read(png_ptr, buf, 13);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600803 png_crc_finish(png_ptr, 0);
Guy Schalnat0d580581995-07-20 02:43:20 -0500804
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -0500805 width = png_get_uint_31(png_ptr, buf);
806 height = png_get_uint_31(png_ptr, buf + 4);
Guy Schalnat0d580581995-07-20 02:43:20 -0500807 bit_depth = buf[8];
808 color_type = buf[9];
809 compression_type = buf[10];
810 filter_type = buf[11];
811 interlace_type = buf[12];
812
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500813 /* Set internal variables */
Guy Schalnat0d580581995-07-20 02:43:20 -0500814 png_ptr->width = width;
815 png_ptr->height = height;
Guy Schalnatb2e01bd1996-01-26 01:38:47 -0600816 png_ptr->bit_depth = (png_byte)bit_depth;
817 png_ptr->interlaced = (png_byte)interlace_type;
818 png_ptr->color_type = (png_byte)color_type;
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -0500819#ifdef PNG_MNG_FEATURES_SUPPORTED
Glenn Randers-Pehrson2ad31ae2000-12-15 08:54:42 -0600820 png_ptr->filter_type = (png_byte)filter_type;
Glenn Randers-Pehrson8b6a8892001-05-18 04:54:50 -0500821#endif
Glenn Randers-Pehrson5b5dcf82004-07-17 22:45:44 -0500822 png_ptr->compression_type = (png_byte)compression_type;
Guy Schalnat0d580581995-07-20 02:43:20 -0500823
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500824 /* Find number of channels */
Guy Schalnat0d580581995-07-20 02:43:20 -0500825 switch (png_ptr->color_type)
826 {
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600827 default: /* invalid, png_set_IHDR calls png_error */
Andreas Dilger47a0c421997-05-16 02:46:07 -0500828 case PNG_COLOR_TYPE_GRAY:
829 case PNG_COLOR_TYPE_PALETTE:
Guy Schalnat0d580581995-07-20 02:43:20 -0500830 png_ptr->channels = 1;
831 break;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500832
Andreas Dilger47a0c421997-05-16 02:46:07 -0500833 case PNG_COLOR_TYPE_RGB:
Guy Schalnat0d580581995-07-20 02:43:20 -0500834 png_ptr->channels = 3;
835 break;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500836
Andreas Dilger47a0c421997-05-16 02:46:07 -0500837 case PNG_COLOR_TYPE_GRAY_ALPHA:
Guy Schalnat0d580581995-07-20 02:43:20 -0500838 png_ptr->channels = 2;
839 break;
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500840
Andreas Dilger47a0c421997-05-16 02:46:07 -0500841 case PNG_COLOR_TYPE_RGB_ALPHA:
Guy Schalnat0d580581995-07-20 02:43:20 -0500842 png_ptr->channels = 4;
843 break;
844 }
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600845
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500846 /* Set up other useful info */
Guy Schalnatb2e01bd1996-01-26 01:38:47 -0600847 png_ptr->pixel_depth = (png_byte)(png_ptr->bit_depth *
Glenn Randers-Pehrson0f881d61998-02-07 10:20:57 -0600848 png_ptr->channels);
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -0500849 png_ptr->rowbytes = PNG_ROWBYTES(png_ptr->pixel_depth, png_ptr->width);
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500850 png_debug1(3, "bit_depth = %d", png_ptr->bit_depth);
851 png_debug1(3, "channels = %d", png_ptr->channels);
Glenn Randers-Pehrsonb764c602011-01-14 21:18:37 -0600852 png_debug1(3, "rowbytes = %lu", (unsigned long)png_ptr->rowbytes);
Andreas Dilger47a0c421997-05-16 02:46:07 -0500853 png_set_IHDR(png_ptr, info_ptr, width, height, bit_depth,
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600854 color_type, interlace_type, compression_type, filter_type);
Guy Schalnat0d580581995-07-20 02:43:20 -0500855}
856
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500857/* Read and check the palette */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -0500858void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -0600859png_handle_PLTE(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Guy Schalnat0d580581995-07-20 02:43:20 -0500860{
Glenn Randers-Pehrson76e5fd62000-12-28 07:50:05 -0600861 png_color palette[PNG_MAX_PALETTE_LENGTH];
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600862 int num, i;
Glenn Randers-Pehrsondbd40142009-08-31 08:42:02 -0500863#ifdef PNG_POINTER_INDEXING_SUPPORTED
Glenn Randers-Pehrsond4366722000-06-04 14:29:29 -0500864 png_colorp pal_ptr;
865#endif
Guy Schalnat0d580581995-07-20 02:43:20 -0500866
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -0500867 png_debug(1, "in png_handle_PLTE");
Andreas Dilger47a0c421997-05-16 02:46:07 -0500868
Guy Schalnate5a37791996-06-05 15:50:50 -0500869 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -0500870 png_chunk_error(png_ptr, "missing IHDR");
871
872 /* Moved to before the 'after IDAT' check below because otherwise duplicate
873 * PLTE chunks are potentially ignored (the spec says there shall not be more
874 * than one PLTE, the error is not treated as benign, so this check trumps
875 * the requirement that PLTE appears before IDAT.)
876 */
877 else if (png_ptr->mode & PNG_HAVE_PLTE)
878 png_chunk_error(png_ptr, "duplicate");
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500879
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600880 else if (png_ptr->mode & PNG_HAVE_IDAT)
881 {
John Bowlerb11b31a2012-03-21 07:55:46 -0500882 /* This is benign because the non-benign error happened before, when an
883 * IDAT was encountered in a color-mapped image with no PLTE.
884 */
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600885 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -0500886 png_chunk_benign_error(png_ptr, "out of place");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600887 return;
888 }
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500889
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600890 png_ptr->mode |= PNG_HAVE_PLTE;
Guy Schalnate5a37791996-06-05 15:50:50 -0500891
John Bowlerb11b31a2012-03-21 07:55:46 -0500892 if (!(png_ptr->color_type & PNG_COLOR_MASK_COLOR))
Glenn Randers-Pehrson3097f612001-05-07 14:52:45 -0500893 {
Glenn Randers-Pehrson3097f612001-05-07 14:52:45 -0500894 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -0500895 png_chunk_benign_error(png_ptr, "ignored in grayscale PNG");
Glenn Randers-Pehrson3097f612001-05-07 14:52:45 -0500896 return;
897 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600898
Glenn Randers-Pehrsonb2aca212009-09-23 11:32:37 -0500899#ifndef PNG_READ_OPT_PLTE_SUPPORTED
Guy Schalnate5a37791996-06-05 15:50:50 -0500900 if (png_ptr->color_type != PNG_COLOR_TYPE_PALETTE)
901 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600902 png_crc_finish(png_ptr, length);
Guy Schalnate5a37791996-06-05 15:50:50 -0500903 return;
904 }
905#endif
906
Glenn Randers-Pehrson76e5fd62000-12-28 07:50:05 -0600907 if (length > 3*PNG_MAX_PALETTE_LENGTH || length % 3)
Guy Schalnate5a37791996-06-05 15:50:50 -0500908 {
John Bowlerb11b31a2012-03-21 07:55:46 -0500909 png_crc_finish(png_ptr, length);
910
Guy Schalnate5a37791996-06-05 15:50:50 -0500911 if (png_ptr->color_type != PNG_COLOR_TYPE_PALETTE)
John Bowlerb11b31a2012-03-21 07:55:46 -0500912 png_chunk_benign_error(png_ptr, "invalid");
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500913
Guy Schalnate5a37791996-06-05 15:50:50 -0500914 else
John Bowlerb11b31a2012-03-21 07:55:46 -0500915 png_chunk_error(png_ptr, "invalid");
916
917 return;
Guy Schalnate5a37791996-06-05 15:50:50 -0500918 }
Guy Schalnat0d580581995-07-20 02:43:20 -0500919
John Bowlerb11b31a2012-03-21 07:55:46 -0500920 /* The cast is safe because 'length' is less than 3*PNG_MAX_PALETTE_LENGTH */
Guy Schalnat0d580581995-07-20 02:43:20 -0500921 num = (int)length / 3;
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500922
Glenn Randers-Pehrsondbd40142009-08-31 08:42:02 -0500923#ifdef PNG_POINTER_INDEXING_SUPPORTED
Glenn Randers-Pehrsond4366722000-06-04 14:29:29 -0500924 for (i = 0, pal_ptr = palette; i < num; i++, pal_ptr++)
925 {
926 png_byte buf[3];
927
928 png_crc_read(png_ptr, buf, 3);
929 pal_ptr->red = buf[0];
930 pal_ptr->green = buf[1];
931 pal_ptr->blue = buf[2];
932 }
933#else
Guy Schalnatb2e01bd1996-01-26 01:38:47 -0600934 for (i = 0; i < num; i++)
Guy Schalnat0d580581995-07-20 02:43:20 -0500935 {
936 png_byte buf[3];
937
938 png_crc_read(png_ptr, buf, 3);
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -0500939 /* Don't depend upon png_color being any order */
Guy Schalnat0d580581995-07-20 02:43:20 -0500940 palette[i].red = buf[0];
941 palette[i].green = buf[1];
942 palette[i].blue = buf[2];
943 }
Glenn Randers-Pehrsond4366722000-06-04 14:29:29 -0500944#endif
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600945
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600946 /* If we actually need the PLTE chunk (ie for a paletted image), we do
Glenn Randers-Pehrson glennrp@comcast.netb1c0d332009-05-15 20:39:34 -0500947 * whatever the normal CRC configuration tells us. However, if we
948 * have an RGB image, the PLTE can be considered ancillary, so
949 * we will act as though it is.
950 */
Glenn Randers-Pehrsonb2aca212009-09-23 11:32:37 -0500951#ifndef PNG_READ_OPT_PLTE_SUPPORTED
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600952 if (png_ptr->color_type == PNG_COLOR_TYPE_PALETTE)
Glenn Randers-Pehrson46f61e21998-01-30 21:45:12 -0600953#endif
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600954 {
Andreas Dilger47a0c421997-05-16 02:46:07 -0500955 png_crc_finish(png_ptr, 0);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600956 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600957
Glenn Randers-Pehrsonb2aca212009-09-23 11:32:37 -0500958#ifndef PNG_READ_OPT_PLTE_SUPPORTED
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600959 else if (png_crc_error(png_ptr)) /* Only if we have a CRC error */
960 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600961 /* If we don't want to use the data from an ancillary chunk,
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600962 * we have two options: an error abort, or a warning and we
963 * ignore the data in this chunk (which should be OK, since
964 * it's considered ancillary for a RGB or RGBA image).
John Bowlerb11b31a2012-03-21 07:55:46 -0500965 *
966 * IMPLEMENTATION NOTE: this is only here because png_crc_finish uses the
967 * chunk type to determine whether to check the ancillary or the critical
968 * flags.
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600969 */
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600970 if (!(png_ptr->flags & PNG_FLAG_CRC_ANCILLARY_USE))
971 {
972 if (png_ptr->flags & PNG_FLAG_CRC_ANCILLARY_NOWARN)
973 {
Glenn Randers-Pehrson895a9c92008-07-25 08:51:18 -0500974 png_chunk_benign_error(png_ptr, "CRC error");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600975 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600976
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600977 else
978 {
Glenn Randers-Pehrson70e3f541998-01-03 22:40:55 -0600979 png_chunk_warning(png_ptr, "CRC error");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600980 return;
981 }
982 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -0600983
Andreas Dilger47a0c421997-05-16 02:46:07 -0500984 /* Otherwise, we (optionally) emit a warning and use the chunk. */
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600985 else if (!(png_ptr->flags & PNG_FLAG_CRC_ANCILLARY_NOWARN))
986 {
Glenn Randers-Pehrson70e3f541998-01-03 22:40:55 -0600987 png_chunk_warning(png_ptr, "CRC error");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -0600988 }
989 }
Glenn Randers-Pehrson46f61e21998-01-30 21:45:12 -0600990#endif
Glenn Randers-Pehrson38e6e772000-04-09 19:06:13 -0500991
John Bowlerb11b31a2012-03-21 07:55:46 -0500992 /* TODO: png_set_PLTE has the side effect of setting png_ptr->palette to its
993 * own copy of the palette. This has the side effect that when png_start_row
994 * is called (this happens after any call to png_read_update_info) the
995 * info_ptr palette gets changed. This is extremely unexpected and
996 * confusing.
997 *
998 * Fix this by not sharing the palette in this way.
999 */
Andreas Dilger47a0c421997-05-16 02:46:07 -05001000 png_set_PLTE(png_ptr, info_ptr, palette, num);
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05001001
John Bowlerb11b31a2012-03-21 07:55:46 -05001002 /* The three chunks, bKGD, hIST and tRNS *must* appear after PLTE and before
1003 * IDAT. Prior to 1.6.0 this was not checked; instead the code merely
1004 * checked the apparent validity of a tRNS chunk inserted before PLTE on a
1005 * palette PNG. 1.6.0 attempts to rigorously follow the standard and
1006 * therefore does a benign error if the erroneous condition is detected *and*
1007 * cancels the tRNS if the benign error returns. The alternative is to
1008 * amend the standard since it would be rather hypocritical of the standards
1009 * maintainers to ignore it.
1010 */
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05001011#ifdef PNG_READ_tRNS_SUPPORTED
Glenn Randers-Pehrson3744f942012-08-10 19:22:53 -05001012 if (png_ptr->num_trans > 0 ||
John Bowlerb11b31a2012-03-21 07:55:46 -05001013 (info_ptr != NULL && (info_ptr->valid & PNG_INFO_tRNS) != 0))
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05001014 {
John Bowlerb11b31a2012-03-21 07:55:46 -05001015 /* Cancel this because otherwise it would be used if the transforms
1016 * require it. Don't cancel the 'valid' flag because this would prevent
1017 * detection of duplicate chunks.
1018 */
1019 png_ptr->num_trans = 0;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001020
John Bowlerb11b31a2012-03-21 07:55:46 -05001021 if (info_ptr != NULL)
1022 info_ptr->num_trans = 0;
1023
1024 png_chunk_benign_error(png_ptr, "tRNS must be after");
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05001025 }
1026#endif
1027
John Bowlerb11b31a2012-03-21 07:55:46 -05001028#ifdef PNG_READ_hIST_SUPPORTED
1029 if (info_ptr != NULL && (info_ptr->valid & PNG_INFO_hIST) != 0)
1030 png_chunk_benign_error(png_ptr, "hIST must be after");
1031#endif
1032
1033#ifdef PNG_READ_bKGD_SUPPORTED
1034 if (info_ptr != NULL && (info_ptr->valid & PNG_INFO_bKGD) != 0)
1035 png_chunk_benign_error(png_ptr, "bKGD must be after");
1036#endif
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001037}
Guy Schalnate5a37791996-06-05 15:50:50 -05001038
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05001039void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06001040png_handle_IEND(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001041{
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05001042 png_debug(1, "in png_handle_IEND");
Andreas Dilger47a0c421997-05-16 02:46:07 -05001043
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001044 if (!(png_ptr->mode & PNG_HAVE_IHDR) || !(png_ptr->mode & PNG_HAVE_IDAT))
John Bowlerb11b31a2012-03-21 07:55:46 -05001045 png_chunk_error(png_ptr, "out of place");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001046
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -06001047 png_ptr->mode |= (PNG_AFTER_IDAT | PNG_HAVE_IEND);
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001048
Andreas Dilger47a0c421997-05-16 02:46:07 -05001049 png_crc_finish(png_ptr, length);
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001050
John Bowlerb11b31a2012-03-21 07:55:46 -05001051 if (length != 0)
1052 png_chunk_benign_error(png_ptr, "invalid");
1053
1054 PNG_UNUSED(info_ptr)
Guy Schalnat0d580581995-07-20 02:43:20 -05001055}
1056
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05001057#ifdef PNG_READ_gAMA_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05001058void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06001059png_handle_gAMA(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Guy Schalnat0d580581995-07-20 02:43:20 -05001060{
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -06001061 png_fixed_point igamma;
Guy Schalnat0d580581995-07-20 02:43:20 -05001062 png_byte buf[4];
1063
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05001064 png_debug(1, "in png_handle_gAMA");
Andreas Dilger47a0c421997-05-16 02:46:07 -05001065
Guy Schalnate5a37791996-06-05 15:50:50 -05001066 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05001067 png_chunk_error(png_ptr, "missing IHDR");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001068
John Bowlerb11b31a2012-03-21 07:55:46 -05001069 else if (png_ptr->mode & (PNG_HAVE_IDAT|PNG_HAVE_PLTE))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001070 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001071 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001072 png_chunk_benign_error(png_ptr, "out of place");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001073 return;
1074 }
Guy Schalnate5a37791996-06-05 15:50:50 -05001075
Guy Schalnat0d580581995-07-20 02:43:20 -05001076 if (length != 4)
1077 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001078 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001079 png_chunk_benign_error(png_ptr, "invalid");
Guy Schalnat0d580581995-07-20 02:43:20 -05001080 return;
1081 }
1082
1083 png_crc_read(png_ptr, buf, 4);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001084
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001085 if (png_crc_finish(png_ptr, 0))
1086 return;
1087
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001088 igamma = png_get_fixed_point(NULL, buf);
Glenn Randers-Pehrson33893092010-10-23 13:20:18 -05001089
John Bowlerf8dfd122012-10-25 19:30:02 -05001090 png_colorspace_set_gamma(png_ptr, &png_ptr->colorspace, igamma);
John Bowlerb11b31a2012-03-21 07:55:46 -05001091 png_colorspace_sync(png_ptr, info_ptr);
Guy Schalnat0d580581995-07-20 02:43:20 -05001092}
Guy Schalnat51f0eb41995-09-26 05:22:39 -05001093#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05001094
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05001095#ifdef PNG_READ_sBIT_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05001096void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06001097png_handle_sBIT(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Guy Schalnat0d580581995-07-20 02:43:20 -05001098{
John Bowler0ae4f7b2012-03-03 21:10:26 -06001099 unsigned int truelen;
Guy Schalnatb2e01bd1996-01-26 01:38:47 -06001100 png_byte buf[4];
Guy Schalnat69b14481996-01-10 02:56:49 -06001101
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05001102 png_debug(1, "in png_handle_sBIT");
Andreas Dilger47a0c421997-05-16 02:46:07 -05001103
Guy Schalnat69b14481996-01-10 02:56:49 -06001104 buf[0] = buf[1] = buf[2] = buf[3] = 0;
Guy Schalnat0d580581995-07-20 02:43:20 -05001105
Guy Schalnate5a37791996-06-05 15:50:50 -05001106 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05001107 png_chunk_error(png_ptr, "missing IHDR");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001108
John Bowlerb11b31a2012-03-21 07:55:46 -05001109 else if (png_ptr->mode & (PNG_HAVE_IDAT|PNG_HAVE_PLTE))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001110 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001111 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001112 png_chunk_benign_error(png_ptr, "out of place");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001113 return;
1114 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001115
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001116 if (info_ptr != NULL && (info_ptr->valid & PNG_INFO_sBIT))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001117 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001118 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001119 png_chunk_benign_error(png_ptr, "duplicate");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001120 return;
1121 }
Guy Schalnate5a37791996-06-05 15:50:50 -05001122
Guy Schalnat0d580581995-07-20 02:43:20 -05001123 if (png_ptr->color_type == PNG_COLOR_TYPE_PALETTE)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001124 truelen = 3;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001125
Guy Schalnat0d580581995-07-20 02:43:20 -05001126 else
John Bowler0ae4f7b2012-03-03 21:10:26 -06001127 truelen = png_ptr->channels;
Guy Schalnat0d580581995-07-20 02:43:20 -05001128
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -05001129 if (length != truelen || length > 4)
Guy Schalnat0d580581995-07-20 02:43:20 -05001130 {
John Bowlerb11b31a2012-03-21 07:55:46 -05001131 png_chunk_benign_error(png_ptr, "invalid");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001132 png_crc_finish(png_ptr, length);
Guy Schalnatb2e01bd1996-01-26 01:38:47 -06001133 return;
Guy Schalnat0d580581995-07-20 02:43:20 -05001134 }
1135
Andreas Dilger47a0c421997-05-16 02:46:07 -05001136 png_crc_read(png_ptr, buf, truelen);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001137
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001138 if (png_crc_finish(png_ptr, 0))
1139 return;
1140
Guy Schalnat0d580581995-07-20 02:43:20 -05001141 if (png_ptr->color_type & PNG_COLOR_MASK_COLOR)
1142 {
Guy Schalnat6d764711995-12-19 03:22:19 -06001143 png_ptr->sig_bit.red = buf[0];
1144 png_ptr->sig_bit.green = buf[1];
1145 png_ptr->sig_bit.blue = buf[2];
1146 png_ptr->sig_bit.alpha = buf[3];
Guy Schalnat0d580581995-07-20 02:43:20 -05001147 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001148
Guy Schalnat0d580581995-07-20 02:43:20 -05001149 else
1150 {
Guy Schalnatb2e01bd1996-01-26 01:38:47 -06001151 png_ptr->sig_bit.gray = buf[0];
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -06001152 png_ptr->sig_bit.red = buf[0];
1153 png_ptr->sig_bit.green = buf[0];
1154 png_ptr->sig_bit.blue = buf[0];
Guy Schalnat6d764711995-12-19 03:22:19 -06001155 png_ptr->sig_bit.alpha = buf[1];
Guy Schalnat0d580581995-07-20 02:43:20 -05001156 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001157
Andreas Dilger47a0c421997-05-16 02:46:07 -05001158 png_set_sBIT(png_ptr, info_ptr, &(png_ptr->sig_bit));
Guy Schalnat0d580581995-07-20 02:43:20 -05001159}
Guy Schalnat51f0eb41995-09-26 05:22:39 -05001160#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05001161
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05001162#ifdef PNG_READ_cHRM_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05001163void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06001164png_handle_cHRM(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Guy Schalnat0d580581995-07-20 02:43:20 -05001165{
Glenn Randers-Pehrson6bc53be2006-06-16 07:52:03 -05001166 png_byte buf[32];
John Bowlerb11b31a2012-03-21 07:55:46 -05001167 png_xy xy;
Glenn Randers-Pehrson9c0f0942002-02-21 23:14:23 -06001168
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05001169 png_debug(1, "in png_handle_cHRM");
Andreas Dilger47a0c421997-05-16 02:46:07 -05001170
Guy Schalnate5a37791996-06-05 15:50:50 -05001171 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05001172 png_chunk_error(png_ptr, "missing IHDR");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001173
John Bowlerb11b31a2012-03-21 07:55:46 -05001174 else if (png_ptr->mode & (PNG_HAVE_IDAT|PNG_HAVE_PLTE))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001175 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001176 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001177 png_chunk_benign_error(png_ptr, "out of place");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001178 return;
1179 }
Guy Schalnate5a37791996-06-05 15:50:50 -05001180
Guy Schalnat0d580581995-07-20 02:43:20 -05001181 if (length != 32)
1182 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001183 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001184 png_chunk_benign_error(png_ptr, "invalid");
Guy Schalnatb2e01bd1996-01-26 01:38:47 -06001185 return;
Guy Schalnat0d580581995-07-20 02:43:20 -05001186 }
1187
Glenn Randers-Pehrson6bc53be2006-06-16 07:52:03 -05001188 png_crc_read(png_ptr, buf, 32);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001189
Glenn Randers-Pehrson6bc53be2006-06-16 07:52:03 -05001190 if (png_crc_finish(png_ptr, 0))
1191 return;
1192
John Bowlerb11b31a2012-03-21 07:55:46 -05001193 xy.whitex = png_get_fixed_point(NULL, buf);
1194 xy.whitey = png_get_fixed_point(NULL, buf + 4);
1195 xy.redx = png_get_fixed_point(NULL, buf + 8);
1196 xy.redy = png_get_fixed_point(NULL, buf + 12);
1197 xy.greenx = png_get_fixed_point(NULL, buf + 16);
1198 xy.greeny = png_get_fixed_point(NULL, buf + 20);
1199 xy.bluex = png_get_fixed_point(NULL, buf + 24);
1200 xy.bluey = png_get_fixed_point(NULL, buf + 28);
Glenn Randers-Pehrson33893092010-10-23 13:20:18 -05001201
John Bowlerb11b31a2012-03-21 07:55:46 -05001202 if (xy.whitex == PNG_FIXED_ERROR ||
1203 xy.whitey == PNG_FIXED_ERROR ||
1204 xy.redx == PNG_FIXED_ERROR ||
1205 xy.redy == PNG_FIXED_ERROR ||
1206 xy.greenx == PNG_FIXED_ERROR ||
1207 xy.greeny == PNG_FIXED_ERROR ||
1208 xy.bluex == PNG_FIXED_ERROR ||
1209 xy.bluey == PNG_FIXED_ERROR)
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001210 {
John Bowlerb11b31a2012-03-21 07:55:46 -05001211 png_chunk_benign_error(png_ptr, "invalid values");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001212 return;
1213 }
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001214
John Bowlerb11b31a2012-03-21 07:55:46 -05001215 /* If a colorspace error has already been output skip this chunk */
1216 if (png_ptr->colorspace.flags & PNG_COLORSPACE_INVALID)
1217 return;
1218
1219 if (png_ptr->colorspace.flags & PNG_COLORSPACE_FROM_cHRM)
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001220 {
John Bowlerb11b31a2012-03-21 07:55:46 -05001221 png_ptr->colorspace.flags |= PNG_COLORSPACE_INVALID;
1222 png_colorspace_sync(png_ptr, info_ptr);
1223 png_chunk_benign_error(png_ptr, "duplicate");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001224 return;
1225 }
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06001226
John Bowlerb11b31a2012-03-21 07:55:46 -05001227 png_ptr->colorspace.flags |= PNG_COLORSPACE_FROM_cHRM;
1228 (void)png_colorspace_set_chromaticities(png_ptr, &png_ptr->colorspace, &xy,
1229 1/*prefer cHRM values*/);
1230 png_colorspace_sync(png_ptr, info_ptr);
Guy Schalnat0d580581995-07-20 02:43:20 -05001231}
Guy Schalnat51f0eb41995-09-26 05:22:39 -05001232#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05001233
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05001234#ifdef PNG_READ_sRGB_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05001235void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06001236png_handle_sRGB(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06001237{
John Bowlerb11b31a2012-03-21 07:55:46 -05001238 png_byte intent;
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06001239
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05001240 png_debug(1, "in png_handle_sRGB");
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06001241
1242 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05001243 png_chunk_error(png_ptr, "missing IHDR");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001244
John Bowlerb11b31a2012-03-21 07:55:46 -05001245 else if (png_ptr->mode & (PNG_HAVE_IDAT|PNG_HAVE_PLTE))
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06001246 {
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06001247 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001248 png_chunk_benign_error(png_ptr, "out of place");
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06001249 return;
1250 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001251
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06001252 if (length != 1)
1253 {
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06001254 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001255 png_chunk_benign_error(png_ptr, "invalid");
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06001256 return;
1257 }
1258
John Bowlerb11b31a2012-03-21 07:55:46 -05001259 png_crc_read(png_ptr, &intent, 1);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001260
Glenn Randers-Pehrsonb6ce43d1998-01-01 07:13:13 -06001261 if (png_crc_finish(png_ptr, 0))
1262 return;
1263
John Bowlerb11b31a2012-03-21 07:55:46 -05001264 /* If a colorspace error has already been output skip this chunk */
1265 if (png_ptr->colorspace.flags & PNG_COLORSPACE_INVALID)
1266 return;
John Bowler88b77cc2011-05-05 06:49:55 -05001267
John Bowlerb11b31a2012-03-21 07:55:46 -05001268 /* Only one sRGB or iCCP chunk is allowed, use the HAVE_INTENT flag to detect
1269 * this.
John Bowler736f40f2011-08-25 16:19:44 -05001270 */
John Bowlerb11b31a2012-03-21 07:55:46 -05001271 if (png_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_INTENT)
1272 {
1273 png_ptr->colorspace.flags |= PNG_COLORSPACE_INVALID;
1274 png_colorspace_sync(png_ptr, info_ptr);
1275 png_chunk_benign_error(png_ptr, "too many profiles");
1276 return;
1277 }
John Bowler736f40f2011-08-25 16:19:44 -05001278
John Bowlerf8dfd122012-10-25 19:30:02 -05001279 png_colorspace_set_sRGB(png_ptr, &png_ptr->colorspace, intent);
John Bowlerb11b31a2012-03-21 07:55:46 -05001280 png_colorspace_sync(png_ptr, info_ptr);
Glenn Randers-Pehrson2687fcc1998-01-07 20:54:20 -06001281}
1282#endif /* PNG_READ_sRGB_SUPPORTED */
1283
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05001284#ifdef PNG_READ_iCCP_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05001285void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06001286png_handle_iCCP(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
John Bowleraa816c42012-03-16 07:39:49 -05001287/* Note: this does not properly handle profiles that are > 64K under DOS */
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001288{
John Bowler921648a2012-03-28 23:36:12 -05001289 png_const_charp errmsg = NULL; /* error message output, or no error */
1290 int finished = 0; /* crc checked */
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001291
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05001292 png_debug(1, "in png_handle_iCCP");
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001293
1294 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05001295 png_chunk_error(png_ptr, "missing IHDR");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001296
John Bowlerb11b31a2012-03-21 07:55:46 -05001297 else if (png_ptr->mode & (PNG_HAVE_IDAT|PNG_HAVE_PLTE))
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001298 {
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001299 png_crc_finish(png_ptr, length);
John Bowleraa816c42012-03-16 07:39:49 -05001300 png_chunk_benign_error(png_ptr, "out of place");
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001301 return;
1302 }
1303
John Bowlerb11b31a2012-03-21 07:55:46 -05001304 /* Consistent with all the above colorspace handling an obviously *invalid*
1305 * chunk is just ignored, so does not invalidate the color space. An
1306 * alternative is to set the 'invalid' flags at the start of this routine
1307 * and only clear them in they were not set before and all the tests pass.
1308 * The minimum 'deflate' stream is assumed to be just the 2 byte header and 4
1309 * byte checksum. The keyword must be one character and there is a
1310 * terminator (0) byte and the compression method.
1311 */
1312 if (length < 9)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001313 {
John Bowler0ae4f7b2012-03-03 21:10:26 -06001314 png_crc_finish(png_ptr, length);
John Bowleraa816c42012-03-16 07:39:49 -05001315 png_chunk_benign_error(png_ptr, "too short");
John Bowler0ae4f7b2012-03-03 21:10:26 -06001316 return;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001317 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001318
John Bowlerb11b31a2012-03-21 07:55:46 -05001319 /* If a colorspace error has already been output skip this chunk */
1320 if (png_ptr->colorspace.flags & PNG_COLORSPACE_INVALID)
John Bowler0ae4f7b2012-03-03 21:10:26 -06001321 {
John Bowlerb11b31a2012-03-21 07:55:46 -05001322 png_crc_finish(png_ptr, length);
John Bowler0ae4f7b2012-03-03 21:10:26 -06001323 return;
1324 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001325
John Bowlerb11b31a2012-03-21 07:55:46 -05001326 /* Only one sRGB or iCCP chunk is allowed, use the HAVE_INTENT flag to detect
1327 * this.
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05001328 */
John Bowlerb11b31a2012-03-21 07:55:46 -05001329 if ((png_ptr->colorspace.flags & PNG_COLORSPACE_HAVE_INTENT) == 0)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001330 {
John Bowlerb11b31a2012-03-21 07:55:46 -05001331 uInt read_length, keyword_length;
1332 char keyword[81];
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001333
John Bowlerb11b31a2012-03-21 07:55:46 -05001334 /* Find the keyword; the keyword plus separator and compression method
1335 * bytes can be at most 81 characters long.
John Bowler0ae4f7b2012-03-03 21:10:26 -06001336 */
John Bowlerb11b31a2012-03-21 07:55:46 -05001337 read_length = 81; /* maximum */
1338 if (read_length > length)
1339 read_length = (uInt)length;
John Bowler0ae4f7b2012-03-03 21:10:26 -06001340
John Bowlerb11b31a2012-03-21 07:55:46 -05001341 png_crc_read(png_ptr, (png_bytep)keyword, read_length);
1342 length -= read_length;
John Bowler0ae4f7b2012-03-03 21:10:26 -06001343
John Bowlerb11b31a2012-03-21 07:55:46 -05001344 keyword_length = 0;
1345 while (keyword_length < 80 && keyword_length < read_length &&
1346 keyword[keyword_length] != 0)
1347 ++keyword_length;
1348
1349 /* TODO: make the keyword checking common */
1350 if (keyword_length >= 1 && keyword_length <= 79)
John Bowler0ae4f7b2012-03-03 21:10:26 -06001351 {
John Bowlerb11b31a2012-03-21 07:55:46 -05001352 /* We only understand '0' compression - deflate - so if we get a
1353 * different value we can't safely decode the chunk.
John Bowler0ae4f7b2012-03-03 21:10:26 -06001354 */
John Bowlerb11b31a2012-03-21 07:55:46 -05001355 if (keyword_length+1 < read_length &&
1356 keyword[keyword_length+1] == PNG_COMPRESSION_TYPE_BASE)
1357 {
1358 read_length -= keyword_length+2;
John Bowler0ae4f7b2012-03-03 21:10:26 -06001359
John Bowlerb11b31a2012-03-21 07:55:46 -05001360 if (png_inflate_claim(png_ptr, png_iCCP,
1361 png_ptr->flags & PNG_FLAG_BENIGN_ERRORS_WARN ? 15 : 0) == Z_OK)
1362 {
John Bowlerb11b31a2012-03-21 07:55:46 -05001363 Byte profile_header[132];
1364 Byte local_buffer[PNG_INFLATE_BUF_SIZE];
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05001365 png_alloc_size_t size = (sizeof profile_header);
John Bowlerb11b31a2012-03-21 07:55:46 -05001366
1367 png_ptr->zstream.next_in = (Bytef*)keyword + (keyword_length+2);
1368 png_ptr->zstream.avail_in = read_length;
John Bowler921648a2012-03-28 23:36:12 -05001369 (void)png_inflate_read(png_ptr, local_buffer,
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05001370 (sizeof local_buffer), &length, profile_header, &size,
John Bowlerb11b31a2012-03-21 07:55:46 -05001371 0/*finish: don't, because the output is too small*/);
1372
1373 if (size == 0)
1374 {
1375 /* We have the ICC profile header; do the basic header checks.
1376 */
1377 const png_uint_32 profile_length =
1378 png_get_uint_32(profile_header);
1379
John Bowlerb11b31a2012-03-21 07:55:46 -05001380 if (png_icc_check_length(png_ptr, &png_ptr->colorspace,
1381 keyword, profile_length))
1382 {
1383 /* The length is apparently ok, so we can check the 132
1384 * byte header.
1385 */
1386 if (png_icc_check_header(png_ptr, &png_ptr->colorspace,
John Bowler14d0ca62012-08-25 16:21:46 -05001387 keyword, profile_length, profile_header,
1388 png_ptr->color_type))
John Bowlerb11b31a2012-03-21 07:55:46 -05001389 {
1390 /* Now read the tag table; a variable size buffer is
1391 * needed at this point, allocate one for the whole
1392 * profile. The header check has already validated
1393 * that none of these stuff will overflow.
1394 */
1395 const png_uint_32 tag_count = png_get_uint_32(
1396 profile_header+128);
1397 png_bytep profile = png_read_buffer(png_ptr,
1398 profile_length, 2/*silent*/);
1399
1400 if (profile != NULL)
1401 {
Glenn Randers-Pehrsondbb7e192012-08-10 17:27:42 -05001402 memcpy(profile, profile_header,
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05001403 (sizeof profile_header));
John Bowlerb11b31a2012-03-21 07:55:46 -05001404
John Bowler13a87d92012-03-28 09:51:43 -05001405 size = 12 * tag_count;
Glenn Randers-Pehrson8fbd60d2012-03-21 09:18:15 -05001406
John Bowler921648a2012-03-28 23:36:12 -05001407 (void)png_inflate_read(png_ptr, local_buffer,
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05001408 (sizeof local_buffer), &length,
John Bowlerb11b31a2012-03-21 07:55:46 -05001409 profile + (sizeof profile_header), &size, 0);
1410
John Bowler921648a2012-03-28 23:36:12 -05001411 /* Still expect a a buffer error because we expect
1412 * there to be some tag data!
1413 */
John Bowlerb11b31a2012-03-21 07:55:46 -05001414 if (size == 0)
1415 {
1416 if (png_icc_check_tag_table(png_ptr,
1417 &png_ptr->colorspace, keyword, profile_length,
1418 profile))
1419 {
1420 /* The profile has been validated for basic
1421 * security issues, so read the whole thing in.
1422 */
1423 size = profile_length - (sizeof profile_header)
1424 - 12 * tag_count;
Glenn Randers-Pehrson8fbd60d2012-03-21 09:18:15 -05001425
John Bowler921648a2012-03-28 23:36:12 -05001426 (void)png_inflate_read(png_ptr, local_buffer,
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05001427 (sizeof local_buffer), &length,
John Bowlerb11b31a2012-03-21 07:55:46 -05001428 profile + (sizeof profile_header) +
1429 12 * tag_count, &size, 1/*finish*/);
1430
John Bowler921648a2012-03-28 23:36:12 -05001431 if (length > 0 && !(png_ptr->flags &
1432 PNG_FLAG_BENIGN_ERRORS_WARN))
1433 errmsg = "extra compressed data";
1434
1435 /* But otherwise allow extra data: */
1436 else if (size == 0)
John Bowlerb11b31a2012-03-21 07:55:46 -05001437 {
John Bowler921648a2012-03-28 23:36:12 -05001438 if (length > 0)
1439 {
1440 /* This can be handled completely, so
1441 * keep going.
1442 */
John Bowlerb11b31a2012-03-21 07:55:46 -05001443 png_chunk_warning(png_ptr,
1444 "extra compressed data");
John Bowler921648a2012-03-28 23:36:12 -05001445 }
John Bowlerb11b31a2012-03-21 07:55:46 -05001446
John Bowler921648a2012-03-28 23:36:12 -05001447 png_crc_finish(png_ptr, length);
1448 finished = 1;
1449
1450 /* Set the gAMA and cHRM information, this
1451 * checks for a known sRGB profile. The
1452 * result is 0 on error.
John Bowlerb11b31a2012-03-21 07:55:46 -05001453 */
John Bowlerf8dfd122012-10-25 19:30:02 -05001454 png_icc_set_gAMA_and_cHRM(png_ptr,
John Bowlerb11b31a2012-03-21 07:55:46 -05001455 &png_ptr->colorspace, keyword, profile,
John Bowlerb98681b2012-09-04 11:19:00 -05001456 png_ptr->zstream.adler);
John Bowlerb11b31a2012-03-21 07:55:46 -05001457
Glenn Randers-Pehrson8fbd60d2012-03-21 09:18:15 -05001458 /* Steal the profile for info_ptr. */
John Bowlerf8dfd122012-10-25 19:30:02 -05001459 if (info_ptr != NULL)
John Bowlerb11b31a2012-03-21 07:55:46 -05001460 {
1461 png_free_data(png_ptr, info_ptr,
1462 PNG_FREE_ICCP, 0);
1463
1464 info_ptr->iccp_name = png_voidcast(char*,
1465 png_malloc_base(png_ptr,
1466 keyword_length+1));
John Bowler921648a2012-03-28 23:36:12 -05001467 if (info_ptr->iccp_name != NULL)
1468 {
Glenn Randers-Pehrsondbb7e192012-08-10 17:27:42 -05001469 memcpy(info_ptr->iccp_name, keyword,
John Bowler921648a2012-03-28 23:36:12 -05001470 keyword_length+1);
1471 info_ptr->iccp_proflen =
1472 profile_length;
1473 info_ptr->iccp_profile = profile;
1474 png_ptr->read_buffer = NULL; /*steal*/
1475 info_ptr->free_me |= PNG_FREE_ICCP;
1476 info_ptr->valid |= PNG_INFO_iCCP;
1477 }
1478
1479 else
John Bowlerb11b31a2012-03-21 07:55:46 -05001480 {
1481 png_ptr->colorspace.flags |=
1482 PNG_COLORSPACE_INVALID;
John Bowler921648a2012-03-28 23:36:12 -05001483 errmsg = "out of memory";
John Bowlerb11b31a2012-03-21 07:55:46 -05001484 }
John Bowlerb11b31a2012-03-21 07:55:46 -05001485 }
1486
John Bowler921648a2012-03-28 23:36:12 -05001487 /* else the profile remains in the read
1488 * buffer which gets reused for subsequent
1489 * chunks.
1490 */
1491
1492 if (info_ptr != NULL)
1493 png_colorspace_sync(png_ptr, info_ptr);
1494
John Bowlerf8dfd122012-10-25 19:30:02 -05001495 if (errmsg == NULL)
John Bowler921648a2012-03-28 23:36:12 -05001496 {
1497 png_ptr->zowner = 0;
1498 return;
1499 }
John Bowlerb11b31a2012-03-21 07:55:46 -05001500 }
1501
John Bowler921648a2012-03-28 23:36:12 -05001502 else if (size > 0)
John Bowlerb11b31a2012-03-21 07:55:46 -05001503 errmsg = "truncated";
John Bowler921648a2012-03-28 23:36:12 -05001504
1505 else
1506 errmsg = png_ptr->zstream.msg;
John Bowlerb11b31a2012-03-21 07:55:46 -05001507 }
1508
1509 /* else png_icc_check_tag_table output an error */
1510 }
1511
1512 else /* profile truncated */
1513 errmsg = png_ptr->zstream.msg;
1514 }
1515
1516 else
1517 errmsg = "out of memory";
1518 }
1519
1520 /* else png_icc_check_header output an error */
1521 }
1522
1523 /* else png_icc_check_length output an error */
1524 }
1525
1526 else /* profile truncated */
1527 errmsg = png_ptr->zstream.msg;
1528
1529 /* Release the stream */
1530 png_ptr->zowner = 0;
1531 }
1532
1533 else /* png_inflate_claim failed */
1534 errmsg = png_ptr->zstream.msg;
1535 }
John Bowler0ae4f7b2012-03-03 21:10:26 -06001536
1537 else
John Bowlerb11b31a2012-03-21 07:55:46 -05001538 errmsg = "bad compression method"; /* or missing */
John Bowler0ae4f7b2012-03-03 21:10:26 -06001539 }
John Bowler0ae4f7b2012-03-03 21:10:26 -06001540
John Bowlerb5d00512012-03-09 09:15:18 -06001541 else
John Bowlerb11b31a2012-03-21 07:55:46 -05001542 errmsg = "bad keyword";
John Bowlerb5d00512012-03-09 09:15:18 -06001543 }
Glenn Randers-Pehrson3744f942012-08-10 19:22:53 -05001544
John Bowlerb11b31a2012-03-21 07:55:46 -05001545 else
1546 errmsg = "too many profiles";
John Bowler0ae4f7b2012-03-03 21:10:26 -06001547
John Bowlerb11b31a2012-03-21 07:55:46 -05001548 /* Failure: the reason is in 'errmsg' */
John Bowler921648a2012-03-28 23:36:12 -05001549 if (!finished)
1550 png_crc_finish(png_ptr, length);
1551
John Bowlerb11b31a2012-03-21 07:55:46 -05001552 png_ptr->colorspace.flags |= PNG_COLORSPACE_INVALID;
1553 png_colorspace_sync(png_ptr, info_ptr);
1554 if (errmsg != NULL) /* else already output */
1555 png_chunk_benign_error(png_ptr, errmsg);
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001556}
1557#endif /* PNG_READ_iCCP_SUPPORTED */
1558
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05001559#ifdef PNG_READ_sPLT_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05001560void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06001561png_handle_sPLT(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001562/* Note: this does not properly handle chunks that are > 64K under DOS */
1563{
John Bowlerb5d00512012-03-09 09:15:18 -06001564 png_bytep entry_start, buffer;
Glenn Randers-Pehrson520a7642000-03-21 05:13:06 -06001565 png_sPLT_t new_palette;
Glenn Randers-Pehrsond4366722000-06-04 14:29:29 -05001566 png_sPLT_entryp pp;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001567 png_uint_32 data_length;
1568 int entry_size, i;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001569 png_uint_32 skip = 0;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001570 png_uint_32 dl;
1571 png_size_t max_dl;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001572
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05001573 png_debug(1, "in png_handle_sPLT");
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001574
Glenn Randers-Pehrsone3f3c4e2010-02-07 18:08:50 -06001575#ifdef PNG_USER_LIMITS_SUPPORTED
Glenn Randers-Pehrson800d1e92008-08-20 17:25:21 -05001576 if (png_ptr->user_chunk_cache_max != 0)
1577 {
1578 if (png_ptr->user_chunk_cache_max == 1)
1579 {
1580 png_crc_finish(png_ptr, length);
1581 return;
1582 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001583
Glenn Randers-Pehrson800d1e92008-08-20 17:25:21 -05001584 if (--png_ptr->user_chunk_cache_max == 1)
1585 {
1586 png_warning(png_ptr, "No space in chunk cache for sPLT");
1587 png_crc_finish(png_ptr, length);
1588 return;
1589 }
1590 }
1591#endif
1592
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001593 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05001594 png_chunk_error(png_ptr, "missing IHDR");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001595
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001596 else if (png_ptr->mode & PNG_HAVE_IDAT)
1597 {
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001598 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001599 png_chunk_benign_error(png_ptr, "out of place");
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001600 return;
1601 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001602
1603#ifdef PNG_MAX_MALLOC_64K
John Bowlerb11b31a2012-03-21 07:55:46 -05001604 if (length > 65535U)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001605 {
John Bowlerb11b31a2012-03-21 07:55:46 -05001606 png_crc_finish(png_ptr, length);
1607 png_chunk_benign_error(png_ptr, "too large to fit in memory");
1608 return;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001609 }
1610#endif
1611
John Bowlerb11b31a2012-03-21 07:55:46 -05001612 buffer = png_read_buffer(png_ptr, length+1, 2/*silent*/);
1613 if (buffer == NULL)
1614 {
1615 png_crc_finish(png_ptr, length);
1616 png_chunk_benign_error(png_ptr, "out of memory");
1617 return;
1618 }
1619
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001620
1621 /* WARNING: this may break if size_t is less than 32 bits; it is assumed
1622 * that the PNG_MAX_MALLOC_64K test is enabled in this case, but this is a
1623 * potential breakage point if the types in pngconf.h aren't exactly right.
1624 */
John Bowlerb5d00512012-03-09 09:15:18 -06001625 png_crc_read(png_ptr, buffer, length);
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001626
1627 if (png_crc_finish(png_ptr, skip))
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001628 return;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001629
John Bowlerb5d00512012-03-09 09:15:18 -06001630 buffer[length] = 0;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001631
John Bowlerb5d00512012-03-09 09:15:18 -06001632 for (entry_start = buffer; *entry_start; entry_start++)
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05001633 /* Empty loop to find end of name */ ;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001634
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001635 ++entry_start;
1636
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05001637 /* A sample depth should follow the separator, and we should be on it */
John Bowlerb5d00512012-03-09 09:15:18 -06001638 if (entry_start > buffer + length - 2)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001639 {
Glenn Randers-Pehrson4accabb2000-04-14 14:20:47 -05001640 png_warning(png_ptr, "malformed sPLT chunk");
1641 return;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001642 }
1643
1644 new_palette.depth = *entry_start++;
Glenn Randers-Pehrsona565f0e2010-03-06 08:24:45 -06001645 entry_size = (new_palette.depth == 8 ? 6 : 10);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001646 /* This must fit in a png_uint_32 because it is derived from the original
John Bowlerb5d00512012-03-09 09:15:18 -06001647 * chunk data length.
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001648 */
John Bowlerb5d00512012-03-09 09:15:18 -06001649 data_length = length - (png_uint_32)(entry_start - buffer);
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001650
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05001651 /* Integrity-check the data length */
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001652 if (data_length % entry_size)
1653 {
Glenn Randers-Pehrson3097f612001-05-07 14:52:45 -05001654 png_warning(png_ptr, "sPLT chunk has bad length");
1655 return;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001656 }
1657
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001658 dl = (png_int_32)(data_length / entry_size);
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05001659 max_dl = PNG_SIZE_MAX / (sizeof (png_sPLT_entry));
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001660
1661 if (dl > max_dl)
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -05001662 {
1663 png_warning(png_ptr, "sPLT chunk too long");
1664 return;
1665 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001666
1667 new_palette.nentries = (png_int_32)(data_length / entry_size);
1668
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -05001669 new_palette.entries = (png_sPLT_entryp)png_malloc_warn(
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05001670 png_ptr, new_palette.nentries * (sizeof (png_sPLT_entry)));
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001671
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -05001672 if (new_palette.entries == NULL)
1673 {
1674 png_warning(png_ptr, "sPLT chunk requires too much memory");
1675 return;
1676 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001677
Glenn Randers-Pehrsondbd40142009-08-31 08:42:02 -05001678#ifdef PNG_POINTER_INDEXING_SUPPORTED
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001679 for (i = 0; i < new_palette.nentries; i++)
1680 {
Glenn Randers-Pehrson90b878c2009-10-07 12:44:35 -05001681 pp = new_palette.entries + i;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001682
1683 if (new_palette.depth == 8)
1684 {
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001685 pp->red = *entry_start++;
1686 pp->green = *entry_start++;
1687 pp->blue = *entry_start++;
1688 pp->alpha = *entry_start++;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001689 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001690
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001691 else
1692 {
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001693 pp->red = png_get_uint_16(entry_start); entry_start += 2;
1694 pp->green = png_get_uint_16(entry_start); entry_start += 2;
1695 pp->blue = png_get_uint_16(entry_start); entry_start += 2;
1696 pp->alpha = png_get_uint_16(entry_start); entry_start += 2;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001697 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001698
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001699 pp->frequency = png_get_uint_16(entry_start); entry_start += 2;
1700 }
Glenn Randers-Pehrsond4366722000-06-04 14:29:29 -05001701#else
1702 pp = new_palette.entries;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001703
Glenn Randers-Pehrsond4366722000-06-04 14:29:29 -05001704 for (i = 0; i < new_palette.nentries; i++)
1705 {
1706
1707 if (new_palette.depth == 8)
1708 {
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001709 pp[i].red = *entry_start++;
1710 pp[i].green = *entry_start++;
1711 pp[i].blue = *entry_start++;
1712 pp[i].alpha = *entry_start++;
Glenn Randers-Pehrsond4366722000-06-04 14:29:29 -05001713 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001714
Glenn Randers-Pehrsond4366722000-06-04 14:29:29 -05001715 else
1716 {
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001717 pp[i].red = png_get_uint_16(entry_start); entry_start += 2;
1718 pp[i].green = png_get_uint_16(entry_start); entry_start += 2;
1719 pp[i].blue = png_get_uint_16(entry_start); entry_start += 2;
1720 pp[i].alpha = png_get_uint_16(entry_start); entry_start += 2;
Glenn Randers-Pehrsond4366722000-06-04 14:29:29 -05001721 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001722
Glenn Randers-Pehrsonf27592a2011-03-21 18:05:40 -05001723 pp[i].frequency = png_get_uint_16(entry_start); entry_start += 2;
Glenn Randers-Pehrsond4366722000-06-04 14:29:29 -05001724 }
1725#endif
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001726
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05001727 /* Discard all chunk data except the name and stash that */
John Bowlerb5d00512012-03-09 09:15:18 -06001728 new_palette.name = (png_charp)buffer;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001729
Glenn Randers-Pehrsona77ef622000-02-18 13:48:52 -06001730 png_set_sPLT(png_ptr, info_ptr, &new_palette, 1);
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001731
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06001732 png_free(png_ptr, new_palette.entries);
1733}
1734#endif /* PNG_READ_sPLT_SUPPORTED */
1735
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05001736#ifdef PNG_READ_tRNS_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05001737void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06001738png_handle_tRNS(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Guy Schalnat0d580581995-07-20 02:43:20 -05001739{
Glenn Randers-Pehrsond1e8c862002-06-20 06:54:34 -05001740 png_byte readbuf[PNG_MAX_PALETTE_LENGTH];
Glenn Randers-Pehrson76e5fd62000-12-28 07:50:05 -06001741
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05001742 png_debug(1, "in png_handle_tRNS");
Andreas Dilger47a0c421997-05-16 02:46:07 -05001743
Guy Schalnate5a37791996-06-05 15:50:50 -05001744 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05001745 png_chunk_error(png_ptr, "missing IHDR");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001746
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001747 else if (png_ptr->mode & PNG_HAVE_IDAT)
1748 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001749 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001750 png_chunk_benign_error(png_ptr, "out of place");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001751 return;
1752 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001753
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -06001754 else if (info_ptr != NULL && (info_ptr->valid & PNG_INFO_tRNS))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001755 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001756 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001757 png_chunk_benign_error(png_ptr, "duplicate");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001758 return;
1759 }
Guy Schalnate5a37791996-06-05 15:50:50 -05001760
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001761 if (png_ptr->color_type == PNG_COLOR_TYPE_GRAY)
Guy Schalnat0d580581995-07-20 02:43:20 -05001762 {
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001763 png_byte buf[2];
Guy Schalnat0d580581995-07-20 02:43:20 -05001764
1765 if (length != 2)
1766 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001767 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001768 png_chunk_benign_error(png_ptr, "invalid");
Guy Schalnatb2e01bd1996-01-26 01:38:47 -06001769 return;
1770 }
Guy Schalnat0d580581995-07-20 02:43:20 -05001771
Guy Schalnatb2e01bd1996-01-26 01:38:47 -06001772 png_crc_read(png_ptr, buf, 2);
1773 png_ptr->num_trans = 1;
Glenn Randers-Pehrson56f63962008-10-06 10:16:17 -05001774 png_ptr->trans_color.gray = png_get_uint_16(buf);
Guy Schalnatb2e01bd1996-01-26 01:38:47 -06001775 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001776
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001777 else if (png_ptr->color_type == PNG_COLOR_TYPE_RGB)
1778 {
1779 png_byte buf[6];
1780
1781 if (length != 6)
1782 {
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001783 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001784 png_chunk_benign_error(png_ptr, "invalid");
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001785 return;
1786 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001787
John Bowler0ae4f7b2012-03-03 21:10:26 -06001788 png_crc_read(png_ptr, buf, length);
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001789 png_ptr->num_trans = 1;
Glenn Randers-Pehrson56f63962008-10-06 10:16:17 -05001790 png_ptr->trans_color.red = png_get_uint_16(buf);
1791 png_ptr->trans_color.green = png_get_uint_16(buf + 2);
1792 png_ptr->trans_color.blue = png_get_uint_16(buf + 4);
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001793 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001794
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001795 else if (png_ptr->color_type == PNG_COLOR_TYPE_PALETTE)
1796 {
1797 if (!(png_ptr->mode & PNG_HAVE_PLTE))
1798 {
John Bowlerb11b31a2012-03-21 07:55:46 -05001799 /* TODO: is this actually an error in the ISO spec? */
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001800 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001801 png_chunk_benign_error(png_ptr, "out of place");
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001802 return;
1803 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001804
John Bowlerb11b31a2012-03-21 07:55:46 -05001805 if (length > png_ptr->num_palette || length > PNG_MAX_PALETTE_LENGTH ||
1806 length == 0)
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001807 {
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001808 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001809 png_chunk_benign_error(png_ptr, "invalid");
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001810 return;
1811 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001812
John Bowler0ae4f7b2012-03-03 21:10:26 -06001813 png_crc_read(png_ptr, readbuf, length);
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05001814 png_ptr->num_trans = (png_uint_16)length;
1815 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001816
Guy Schalnatb2e01bd1996-01-26 01:38:47 -06001817 else
Guy Schalnate5a37791996-06-05 15:50:50 -05001818 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001819 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001820 png_chunk_benign_error(png_ptr, "invalid with alpha channel");
Guy Schalnate5a37791996-06-05 15:50:50 -05001821 return;
1822 }
Guy Schalnat0d580581995-07-20 02:43:20 -05001823
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001824 if (png_crc_finish(png_ptr, 0))
Glenn Randers-Pehrsona7dbcba2007-05-15 16:16:34 -05001825 {
1826 png_ptr->num_trans = 0;
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001827 return;
Glenn Randers-Pehrsona7dbcba2007-05-15 16:16:34 -05001828 }
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001829
John Bowlerb11b31a2012-03-21 07:55:46 -05001830 /* TODO: this is a horrible side effect in the palette case because the
1831 * png_struct ends up with a pointer to the tRNS buffer owned by the
1832 * png_info. Fix this.
1833 */
Glenn Randers-Pehrson76e5fd62000-12-28 07:50:05 -06001834 png_set_tRNS(png_ptr, info_ptr, readbuf, png_ptr->num_trans,
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001835 &(png_ptr->trans_color));
Guy Schalnat0d580581995-07-20 02:43:20 -05001836}
Guy Schalnat51f0eb41995-09-26 05:22:39 -05001837#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05001838
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05001839#ifdef PNG_READ_bKGD_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05001840void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06001841png_handle_bKGD(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Guy Schalnat0d580581995-07-20 02:43:20 -05001842{
John Bowler0ae4f7b2012-03-03 21:10:26 -06001843 unsigned int truelen;
Guy Schalnat0d580581995-07-20 02:43:20 -05001844 png_byte buf[6];
John Bowlercb0b2962011-05-12 21:48:29 -05001845 png_color_16 background;
Guy Schalnat0d580581995-07-20 02:43:20 -05001846
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05001847 png_debug(1, "in png_handle_bKGD");
Andreas Dilger47a0c421997-05-16 02:46:07 -05001848
Guy Schalnate5a37791996-06-05 15:50:50 -05001849 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05001850 png_chunk_error(png_ptr, "missing IHDR");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001851
John Bowlerb11b31a2012-03-21 07:55:46 -05001852 else if ((png_ptr->mode & PNG_HAVE_IDAT) ||
1853 (png_ptr->color_type == PNG_COLOR_TYPE_PALETTE &&
1854 !(png_ptr->mode & PNG_HAVE_PLTE)))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001855 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001856 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001857 png_chunk_benign_error(png_ptr, "out of place");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001858 return;
1859 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001860
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -06001861 else if (info_ptr != NULL && (info_ptr->valid & PNG_INFO_bKGD))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001862 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001863 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001864 png_chunk_benign_error(png_ptr, "duplicate");
Guy Schalnate5a37791996-06-05 15:50:50 -05001865 return;
1866 }
1867
Guy Schalnat0d580581995-07-20 02:43:20 -05001868 if (png_ptr->color_type == PNG_COLOR_TYPE_PALETTE)
1869 truelen = 1;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001870
Guy Schalnat0d580581995-07-20 02:43:20 -05001871 else if (png_ptr->color_type & PNG_COLOR_MASK_COLOR)
1872 truelen = 6;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001873
Guy Schalnat0d580581995-07-20 02:43:20 -05001874 else
1875 truelen = 2;
1876
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001877 if (length != truelen)
Guy Schalnat0d580581995-07-20 02:43:20 -05001878 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001879 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001880 png_chunk_benign_error(png_ptr, "invalid");
Guy Schalnat0d580581995-07-20 02:43:20 -05001881 return;
1882 }
1883
Andreas Dilger47a0c421997-05-16 02:46:07 -05001884 png_crc_read(png_ptr, buf, truelen);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001885
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001886 if (png_crc_finish(png_ptr, 0))
1887 return;
1888
Guy Schalnate5a37791996-06-05 15:50:50 -05001889 /* We convert the index value into RGB components so that we can allow
1890 * arbitrary RGB values for background when we have transparency, and
1891 * so it is easy to determine the RGB values of the background color
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001892 * from the info_ptr struct.
1893 */
Guy Schalnat0d580581995-07-20 02:43:20 -05001894 if (png_ptr->color_type == PNG_COLOR_TYPE_PALETTE)
Guy Schalnate5a37791996-06-05 15:50:50 -05001895 {
John Bowlercb0b2962011-05-12 21:48:29 -05001896 background.index = buf[0];
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001897
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05001898 if (info_ptr && info_ptr->num_palette)
Glenn Randers-Pehrson4393a9a1999-09-17 12:27:26 -05001899 {
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001900 if (buf[0] >= info_ptr->num_palette)
1901 {
John Bowlerb11b31a2012-03-21 07:55:46 -05001902 png_chunk_benign_error(png_ptr, "invalid index");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001903 return;
1904 }
1905
John Bowlercb0b2962011-05-12 21:48:29 -05001906 background.red = (png_uint_16)png_ptr->palette[buf[0]].red;
1907 background.green = (png_uint_16)png_ptr->palette[buf[0]].green;
1908 background.blue = (png_uint_16)png_ptr->palette[buf[0]].blue;
Glenn Randers-Pehrson4393a9a1999-09-17 12:27:26 -05001909 }
John Bowlercb0b2962011-05-12 21:48:29 -05001910
1911 else
1912 background.red = background.green = background.blue = 0;
1913
1914 background.gray = 0;
Guy Schalnate5a37791996-06-05 15:50:50 -05001915 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001916
Andreas Dilger47a0c421997-05-16 02:46:07 -05001917 else if (!(png_ptr->color_type & PNG_COLOR_MASK_COLOR)) /* GRAY */
Guy Schalnate5a37791996-06-05 15:50:50 -05001918 {
John Bowlercb0b2962011-05-12 21:48:29 -05001919 background.index = 0;
1920 background.red =
1921 background.green =
1922 background.blue =
1923 background.gray = png_get_uint_16(buf);
Guy Schalnate5a37791996-06-05 15:50:50 -05001924 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001925
Guy Schalnat0d580581995-07-20 02:43:20 -05001926 else
1927 {
John Bowlercb0b2962011-05-12 21:48:29 -05001928 background.index = 0;
1929 background.red = png_get_uint_16(buf);
1930 background.green = png_get_uint_16(buf + 2);
1931 background.blue = png_get_uint_16(buf + 4);
1932 background.gray = 0;
Guy Schalnat0d580581995-07-20 02:43:20 -05001933 }
1934
John Bowlercb0b2962011-05-12 21:48:29 -05001935 png_set_bKGD(png_ptr, info_ptr, &background);
Guy Schalnat0d580581995-07-20 02:43:20 -05001936}
Guy Schalnat51f0eb41995-09-26 05:22:39 -05001937#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05001938
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05001939#ifdef PNG_READ_hIST_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05001940void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06001941png_handle_hIST(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Guy Schalnat0d580581995-07-20 02:43:20 -05001942{
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -05001943 unsigned int num, i;
Glenn Randers-Pehrsond1e8c862002-06-20 06:54:34 -05001944 png_uint_16 readbuf[PNG_MAX_PALETTE_LENGTH];
Guy Schalnat0d580581995-07-20 02:43:20 -05001945
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05001946 png_debug(1, "in png_handle_hIST");
Andreas Dilger47a0c421997-05-16 02:46:07 -05001947
Guy Schalnate5a37791996-06-05 15:50:50 -05001948 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05001949 png_chunk_error(png_ptr, "missing IHDR");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001950
John Bowlerb11b31a2012-03-21 07:55:46 -05001951 else if ((png_ptr->mode & PNG_HAVE_IDAT) || !(png_ptr->mode & PNG_HAVE_PLTE))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001952 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001953 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001954 png_chunk_benign_error(png_ptr, "out of place");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001955 return;
1956 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001957
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -06001958 else if (info_ptr != NULL && (info_ptr->valid & PNG_INFO_hIST))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001959 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001960 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001961 png_chunk_benign_error(png_ptr, "duplicate");
Guy Schalnate5a37791996-06-05 15:50:50 -05001962 return;
1963 }
1964
Glenn Randers-Pehrson5fea36f2004-07-28 08:20:44 -05001965 num = length / 2 ;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06001966
John Bowlerb11b31a2012-03-21 07:55:46 -05001967 if (num != png_ptr->num_palette || num > PNG_MAX_PALETTE_LENGTH)
Guy Schalnatb2e01bd1996-01-26 01:38:47 -06001968 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001969 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05001970 png_chunk_benign_error(png_ptr, "invalid");
Guy Schalnatb2e01bd1996-01-26 01:38:47 -06001971 return;
1972 }
Guy Schalnat0d580581995-07-20 02:43:20 -05001973
Guy Schalnatb2e01bd1996-01-26 01:38:47 -06001974 for (i = 0; i < num; i++)
Guy Schalnat0d580581995-07-20 02:43:20 -05001975 {
1976 png_byte buf[2];
1977
1978 png_crc_read(png_ptr, buf, 2);
Glenn Randers-Pehrson76e5fd62000-12-28 07:50:05 -06001979 readbuf[i] = png_get_uint_16(buf);
Guy Schalnat0d580581995-07-20 02:43:20 -05001980 }
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06001981
1982 if (png_crc_finish(png_ptr, 0))
1983 return;
1984
Glenn Randers-Pehrson76e5fd62000-12-28 07:50:05 -06001985 png_set_hIST(png_ptr, info_ptr, readbuf);
Guy Schalnat0d580581995-07-20 02:43:20 -05001986}
Guy Schalnat51f0eb41995-09-26 05:22:39 -05001987#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05001988
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05001989#ifdef PNG_READ_pHYs_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05001990void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06001991png_handle_pHYs(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Guy Schalnat0d580581995-07-20 02:43:20 -05001992{
1993 png_byte buf[9];
1994 png_uint_32 res_x, res_y;
1995 int unit_type;
1996
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05001997 png_debug(1, "in png_handle_pHYs");
Andreas Dilger47a0c421997-05-16 02:46:07 -05001998
Guy Schalnate5a37791996-06-05 15:50:50 -05001999 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05002000 png_chunk_error(png_ptr, "missing IHDR");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002001
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002002 else if (png_ptr->mode & PNG_HAVE_IDAT)
2003 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002004 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002005 png_chunk_benign_error(png_ptr, "out of place");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002006 return;
2007 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002008
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -06002009 else if (info_ptr != NULL && (info_ptr->valid & PNG_INFO_pHYs))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002010 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002011 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002012 png_chunk_benign_error(png_ptr, "duplicate");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002013 return;
2014 }
Guy Schalnate5a37791996-06-05 15:50:50 -05002015
Guy Schalnat0d580581995-07-20 02:43:20 -05002016 if (length != 9)
2017 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002018 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002019 png_chunk_benign_error(png_ptr, "invalid");
Guy Schalnat0d580581995-07-20 02:43:20 -05002020 return;
Guy Schalnatb2e01bd1996-01-26 01:38:47 -06002021 }
Guy Schalnat0d580581995-07-20 02:43:20 -05002022
2023 png_crc_read(png_ptr, buf, 9);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002024
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002025 if (png_crc_finish(png_ptr, 0))
2026 return;
Guy Schalnat0d580581995-07-20 02:43:20 -05002027
2028 res_x = png_get_uint_32(buf);
2029 res_y = png_get_uint_32(buf + 4);
2030 unit_type = buf[8];
Andreas Dilger47a0c421997-05-16 02:46:07 -05002031 png_set_pHYs(png_ptr, info_ptr, res_x, res_y, unit_type);
Guy Schalnat0d580581995-07-20 02:43:20 -05002032}
Guy Schalnat51f0eb41995-09-26 05:22:39 -05002033#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05002034
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05002035#ifdef PNG_READ_oFFs_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05002036void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06002037png_handle_oFFs(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Guy Schalnat0d580581995-07-20 02:43:20 -05002038{
2039 png_byte buf[9];
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002040 png_int_32 offset_x, offset_y;
Guy Schalnat0d580581995-07-20 02:43:20 -05002041 int unit_type;
2042
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05002043 png_debug(1, "in png_handle_oFFs");
Andreas Dilger47a0c421997-05-16 02:46:07 -05002044
Guy Schalnate5a37791996-06-05 15:50:50 -05002045 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05002046 png_chunk_error(png_ptr, "missing IHDR");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002047
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002048 else if (png_ptr->mode & PNG_HAVE_IDAT)
2049 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002050 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002051 png_chunk_benign_error(png_ptr, "out of place");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002052 return;
2053 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002054
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -06002055 else if (info_ptr != NULL && (info_ptr->valid & PNG_INFO_oFFs))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002056 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002057 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002058 png_chunk_benign_error(png_ptr, "duplicate");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002059 return;
2060 }
Guy Schalnate5a37791996-06-05 15:50:50 -05002061
Guy Schalnat0d580581995-07-20 02:43:20 -05002062 if (length != 9)
2063 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002064 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002065 png_chunk_benign_error(png_ptr, "invalid");
Guy Schalnat0d580581995-07-20 02:43:20 -05002066 return;
2067 }
2068
Guy Schalnatb2e01bd1996-01-26 01:38:47 -06002069 png_crc_read(png_ptr, buf, 9);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002070
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002071 if (png_crc_finish(png_ptr, 0))
2072 return;
Guy Schalnat0d580581995-07-20 02:43:20 -05002073
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002074 offset_x = png_get_int_32(buf);
2075 offset_y = png_get_int_32(buf + 4);
Guy Schalnat0d580581995-07-20 02:43:20 -05002076 unit_type = buf[8];
Andreas Dilger47a0c421997-05-16 02:46:07 -05002077 png_set_oFFs(png_ptr, info_ptr, offset_x, offset_y, unit_type);
2078}
2079#endif
2080
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05002081#ifdef PNG_READ_pCAL_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05002082/* Read the pCAL chunk (described in the PNG Extensions document) */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05002083void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06002084png_handle_pCAL(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Andreas Dilger47a0c421997-05-16 02:46:07 -05002085{
Andreas Dilger47a0c421997-05-16 02:46:07 -05002086 png_int_32 X0, X1;
2087 png_byte type, nparams;
John Bowlerb5d00512012-03-09 09:15:18 -06002088 png_bytep buffer, buf, units, endptr;
Andreas Dilger47a0c421997-05-16 02:46:07 -05002089 png_charpp params;
2090 int i;
2091
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05002092 png_debug(1, "in png_handle_pCAL");
Andreas Dilger47a0c421997-05-16 02:46:07 -05002093
2094 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05002095 png_chunk_error(png_ptr, "missing IHDR");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002096
Andreas Dilger47a0c421997-05-16 02:46:07 -05002097 else if (png_ptr->mode & PNG_HAVE_IDAT)
2098 {
Andreas Dilger47a0c421997-05-16 02:46:07 -05002099 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002100 png_chunk_benign_error(png_ptr, "out of place");
Andreas Dilger47a0c421997-05-16 02:46:07 -05002101 return;
2102 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002103
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -06002104 else if (info_ptr != NULL && (info_ptr->valid & PNG_INFO_pCAL))
Andreas Dilger47a0c421997-05-16 02:46:07 -05002105 {
Andreas Dilger47a0c421997-05-16 02:46:07 -05002106 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002107 png_chunk_benign_error(png_ptr, "duplicate");
Andreas Dilger47a0c421997-05-16 02:46:07 -05002108 return;
2109 }
2110
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002111 png_debug1(2, "Allocating and reading pCAL chunk data (%u bytes)",
2112 length + 1);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002113
John Bowlerb11b31a2012-03-21 07:55:46 -05002114 buffer = png_read_buffer(png_ptr, length+1, 2/*silent*/);
John Bowlerb5d00512012-03-09 09:15:18 -06002115
2116 if (buffer == NULL)
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002117 {
John Bowlerb11b31a2012-03-21 07:55:46 -05002118 png_crc_finish(png_ptr, length);
2119 png_chunk_benign_error(png_ptr, "out of memory");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002120 return;
2121 }
2122
John Bowlerb5d00512012-03-09 09:15:18 -06002123 png_crc_read(png_ptr, buffer, length);
Andreas Dilger47a0c421997-05-16 02:46:07 -05002124
2125 if (png_crc_finish(png_ptr, 0))
Andreas Dilger47a0c421997-05-16 02:46:07 -05002126 return;
Andreas Dilger47a0c421997-05-16 02:46:07 -05002127
John Bowlerb5d00512012-03-09 09:15:18 -06002128 buffer[length] = 0; /* Null terminate the last string */
Andreas Dilger47a0c421997-05-16 02:46:07 -05002129
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05002130 png_debug(3, "Finding end of pCAL purpose string");
John Bowlerb5d00512012-03-09 09:15:18 -06002131 for (buf = buffer; *buf; buf++)
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05002132 /* Empty loop */ ;
Andreas Dilger47a0c421997-05-16 02:46:07 -05002133
John Bowlerb5d00512012-03-09 09:15:18 -06002134 endptr = buffer + length;
Andreas Dilger47a0c421997-05-16 02:46:07 -05002135
2136 /* We need to have at least 12 bytes after the purpose string
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002137 * in order to get the parameter information.
2138 */
Andreas Dilger47a0c421997-05-16 02:46:07 -05002139 if (endptr <= buf + 12)
2140 {
John Bowlerb11b31a2012-03-21 07:55:46 -05002141 png_chunk_benign_error(png_ptr, "invalid");
Andreas Dilger47a0c421997-05-16 02:46:07 -05002142 return;
2143 }
2144
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05002145 png_debug(3, "Reading pCAL X0, X1, type, nparams, and units");
Andreas Dilger47a0c421997-05-16 02:46:07 -05002146 X0 = png_get_int_32((png_bytep)buf+1);
2147 X1 = png_get_int_32((png_bytep)buf+5);
2148 type = buf[9];
2149 nparams = buf[10];
2150 units = buf + 11;
2151
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05002152 png_debug(3, "Checking pCAL equation type and number of parameters");
Andreas Dilger47a0c421997-05-16 02:46:07 -05002153 /* Check that we have the right number of parameters for known
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002154 * equation types.
2155 */
Andreas Dilger47a0c421997-05-16 02:46:07 -05002156 if ((type == PNG_EQUATION_LINEAR && nparams != 2) ||
2157 (type == PNG_EQUATION_BASE_E && nparams != 3) ||
2158 (type == PNG_EQUATION_ARBITRARY && nparams != 3) ||
2159 (type == PNG_EQUATION_HYPERBOLIC && nparams != 4))
2160 {
John Bowlerb11b31a2012-03-21 07:55:46 -05002161 png_chunk_benign_error(png_ptr, "invalid parameter count");
Andreas Dilger47a0c421997-05-16 02:46:07 -05002162 return;
2163 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002164
Andreas Dilger47a0c421997-05-16 02:46:07 -05002165 else if (type >= PNG_EQUATION_LAST)
2166 {
John Bowlerb11b31a2012-03-21 07:55:46 -05002167 png_chunk_benign_error(png_ptr, "unrecognized equation type");
Andreas Dilger47a0c421997-05-16 02:46:07 -05002168 }
2169
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05002170 for (buf = units; *buf; buf++)
Glenn Randers-Pehrsonf9f2fe01998-03-15 18:20:23 -06002171 /* Empty loop to move past the units string. */ ;
Andreas Dilger47a0c421997-05-16 02:46:07 -05002172
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05002173 png_debug(3, "Allocating pCAL parameters array");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002174
John Bowlerb5d00512012-03-09 09:15:18 -06002175 params = png_voidcast(png_charpp, png_malloc_warn(png_ptr,
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05002176 nparams * (sizeof (png_charp))));
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002177
Glenn Randers-Pehrson07748d12002-05-25 11:12:10 -05002178 if (params == NULL)
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002179 {
John Bowlerb11b31a2012-03-21 07:55:46 -05002180 png_chunk_benign_error(png_ptr, "out of memory");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002181 return;
2182 }
Andreas Dilger47a0c421997-05-16 02:46:07 -05002183
2184 /* Get pointers to the start of each parameter string. */
John Bowlerb5d00512012-03-09 09:15:18 -06002185 for (i = 0; i < nparams; i++)
Andreas Dilger47a0c421997-05-16 02:46:07 -05002186 {
2187 buf++; /* Skip the null string terminator from previous parameter. */
2188
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05002189 png_debug1(3, "Reading pCAL parameter %d", i);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002190
John Bowlerb5d00512012-03-09 09:15:18 -06002191 for (params[i] = (png_charp)buf; buf <= endptr && *buf != 0; buf++)
Glenn Randers-Pehrsonf9f2fe01998-03-15 18:20:23 -06002192 /* Empty loop to move past each parameter string */ ;
Andreas Dilger47a0c421997-05-16 02:46:07 -05002193
2194 /* Make sure we haven't run out of data yet */
2195 if (buf > endptr)
2196 {
Andreas Dilger47a0c421997-05-16 02:46:07 -05002197 png_free(png_ptr, params);
John Bowlerb11b31a2012-03-21 07:55:46 -05002198 png_chunk_benign_error(png_ptr, "invalid data");
Andreas Dilger47a0c421997-05-16 02:46:07 -05002199 return;
2200 }
2201 }
2202
John Bowlerb5d00512012-03-09 09:15:18 -06002203 png_set_pCAL(png_ptr, info_ptr, (png_charp)buffer, X0, X1, type, nparams,
2204 (png_charp)units, params);
Andreas Dilger47a0c421997-05-16 02:46:07 -05002205
Andreas Dilger47a0c421997-05-16 02:46:07 -05002206 png_free(png_ptr, params);
Guy Schalnat0d580581995-07-20 02:43:20 -05002207}
Guy Schalnat51f0eb41995-09-26 05:22:39 -05002208#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05002209
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05002210#ifdef PNG_READ_sCAL_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05002211/* Read the sCAL chunk */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05002212void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06002213png_handle_sCAL(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002214{
John Bowlerb5d00512012-03-09 09:15:18 -06002215 png_bytep buffer;
2216 png_size_t i;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002217 int state;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002218
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05002219 png_debug(1, "in png_handle_sCAL");
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002220
2221 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05002222 png_chunk_error(png_ptr, "missing IHDR");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002223
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002224 else if (png_ptr->mode & PNG_HAVE_IDAT)
2225 {
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002226 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002227 png_chunk_benign_error(png_ptr, "out of place");
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002228 return;
2229 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002230
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -06002231 else if (info_ptr != NULL && (info_ptr->valid & PNG_INFO_sCAL))
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002232 {
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002233 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002234 png_chunk_benign_error(png_ptr, "duplicate");
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002235 return;
2236 }
2237
Glenn Randers-Pehrson254a5132011-06-10 17:45:48 -05002238 /* Need unit type, width, \0, height: minimum 4 bytes */
2239 else if (length < 4)
2240 {
Glenn Randers-Pehrson254a5132011-06-10 17:45:48 -05002241 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002242 png_chunk_benign_error(png_ptr, "invalid");
Glenn Randers-Pehrson254a5132011-06-10 17:45:48 -05002243 return;
2244 }
2245
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002246 png_debug1(2, "Allocating and reading sCAL chunk data (%u bytes)",
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05002247 length + 1);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002248
John Bowlerb11b31a2012-03-21 07:55:46 -05002249 buffer = png_read_buffer(png_ptr, length+1, 2/*silent*/);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002250
John Bowlerb5d00512012-03-09 09:15:18 -06002251 if (buffer == NULL)
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05002252 {
John Bowlerb11b31a2012-03-21 07:55:46 -05002253 png_chunk_benign_error(png_ptr, "out of memory");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002254 png_crc_finish(png_ptr, length);
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05002255 return;
2256 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002257
John Bowlerb5d00512012-03-09 09:15:18 -06002258 png_crc_read(png_ptr, buffer, length);
2259 buffer[length] = 0; /* Null terminate the last string */
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002260
2261 if (png_crc_finish(png_ptr, 0))
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002262 return;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002263
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002264 /* Validate the unit. */
John Bowlerb5d00512012-03-09 09:15:18 -06002265 if (buffer[0] != 1 && buffer[0] != 2)
Glenn Randers-Pehrson4accabb2000-04-14 14:20:47 -05002266 {
John Bowlerb11b31a2012-03-21 07:55:46 -05002267 png_chunk_benign_error(png_ptr, "invalid unit");
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -05002268 return;
2269 }
Glenn Randers-Pehrsonf24daf22010-05-06 09:44:04 -05002270
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002271 /* Validate the ASCII numbers, need two ASCII numbers separated by
2272 * a '\0' and they need to fit exactly in the chunk data.
2273 */
Glenn Randers-Pehrson254a5132011-06-10 17:45:48 -05002274 i = 1;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002275 state = 0;
Glenn Randers-Pehrsonccadcae2010-10-23 17:29:13 -05002276
John Bowlerb5d00512012-03-09 09:15:18 -06002277 if (!png_check_fp_number((png_const_charp)buffer, length, &state, &i) ||
2278 i >= length || buffer[i++] != 0)
John Bowlerb11b31a2012-03-21 07:55:46 -05002279 png_chunk_benign_error(png_ptr, "bad width format");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002280
John Bowler8d261262011-06-18 13:37:11 -05002281 else if (!PNG_FP_IS_POSITIVE(state))
John Bowlerb11b31a2012-03-21 07:55:46 -05002282 png_chunk_benign_error(png_ptr, "non-positive width");
John Bowler8d261262011-06-18 13:37:11 -05002283
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002284 else
Glenn Randers-Pehrson20788d32011-01-06 09:01:04 -06002285 {
John Bowler168a4332011-01-16 19:32:22 -06002286 png_size_t heighti = i;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002287
Glenn Randers-Pehrson254a5132011-06-10 17:45:48 -05002288 state = 0;
John Bowlerb5d00512012-03-09 09:15:18 -06002289 if (!png_check_fp_number((png_const_charp)buffer, length, &state, &i) ||
2290 i != length)
John Bowlerb11b31a2012-03-21 07:55:46 -05002291 png_chunk_benign_error(png_ptr, "bad height format");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002292
John Bowler8d261262011-06-18 13:37:11 -05002293 else if (!PNG_FP_IS_POSITIVE(state))
John Bowlerb11b31a2012-03-21 07:55:46 -05002294 png_chunk_benign_error(png_ptr, "non-positive height");
John Bowler8d261262011-06-18 13:37:11 -05002295
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002296 else
2297 /* This is the (only) success case. */
John Bowlerb5d00512012-03-09 09:15:18 -06002298 png_set_sCAL_s(png_ptr, info_ptr, buffer[0],
2299 (png_charp)buffer+1, (png_charp)buffer+heighti);
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05002300 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002301}
2302#endif
2303
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05002304#ifdef PNG_READ_tIME_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05002305void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06002306png_handle_tIME(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Guy Schalnat0d580581995-07-20 02:43:20 -05002307{
2308 png_byte buf[7];
2309 png_time mod_time;
2310
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05002311 png_debug(1, "in png_handle_tIME");
Andreas Dilger47a0c421997-05-16 02:46:07 -05002312
Guy Schalnate5a37791996-06-05 15:50:50 -05002313 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05002314 png_chunk_error(png_ptr, "missing IHDR");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002315
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -06002316 else if (info_ptr != NULL && (info_ptr->valid & PNG_INFO_tIME))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002317 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002318 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002319 png_chunk_benign_error(png_ptr, "duplicate");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002320 return;
2321 }
2322
2323 if (png_ptr->mode & PNG_HAVE_IDAT)
2324 png_ptr->mode |= PNG_AFTER_IDAT;
Guy Schalnate5a37791996-06-05 15:50:50 -05002325
Guy Schalnat0d580581995-07-20 02:43:20 -05002326 if (length != 7)
2327 {
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002328 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002329 png_chunk_benign_error(png_ptr, "invalid");
Guy Schalnat0d580581995-07-20 02:43:20 -05002330 return;
2331 }
2332
2333 png_crc_read(png_ptr, buf, 7);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002334
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002335 if (png_crc_finish(png_ptr, 0))
2336 return;
Guy Schalnat0d580581995-07-20 02:43:20 -05002337
2338 mod_time.second = buf[6];
2339 mod_time.minute = buf[5];
2340 mod_time.hour = buf[4];
2341 mod_time.day = buf[3];
2342 mod_time.month = buf[2];
Guy Schalnatb2e01bd1996-01-26 01:38:47 -06002343 mod_time.year = png_get_uint_16(buf);
Guy Schalnat0d580581995-07-20 02:43:20 -05002344
Andreas Dilger47a0c421997-05-16 02:46:07 -05002345 png_set_tIME(png_ptr, info_ptr, &mod_time);
Guy Schalnat0d580581995-07-20 02:43:20 -05002346}
Guy Schalnat51f0eb41995-09-26 05:22:39 -05002347#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05002348
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05002349#ifdef PNG_READ_tEXt_SUPPORTED
Andreas Dilger47a0c421997-05-16 02:46:07 -05002350/* Note: this does not properly handle chunks that are > 64K under DOS */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05002351void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06002352png_handle_tEXt(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Guy Schalnat0d580581995-07-20 02:43:20 -05002353{
John Bowlerb5d00512012-03-09 09:15:18 -06002354 png_text text_info;
2355 png_bytep buffer;
Guy Schalnatb2e01bd1996-01-26 01:38:47 -06002356 png_charp key;
Guy Schalnat6d764711995-12-19 03:22:19 -06002357 png_charp text;
Andreas Dilger47a0c421997-05-16 02:46:07 -05002358 png_uint_32 skip = 0;
2359
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05002360 png_debug(1, "in png_handle_tEXt");
Guy Schalnat0d580581995-07-20 02:43:20 -05002361
Glenn Randers-Pehrsone3f3c4e2010-02-07 18:08:50 -06002362#ifdef PNG_USER_LIMITS_SUPPORTED
Glenn Randers-Pehrson800d1e92008-08-20 17:25:21 -05002363 if (png_ptr->user_chunk_cache_max != 0)
2364 {
2365 if (png_ptr->user_chunk_cache_max == 1)
2366 {
2367 png_crc_finish(png_ptr, length);
2368 return;
2369 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002370
Glenn Randers-Pehrson800d1e92008-08-20 17:25:21 -05002371 if (--png_ptr->user_chunk_cache_max == 1)
2372 {
Glenn Randers-Pehrson800d1e92008-08-20 17:25:21 -05002373 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002374 png_chunk_benign_error(png_ptr, "no space in chunk cache");
Glenn Randers-Pehrson800d1e92008-08-20 17:25:21 -05002375 return;
2376 }
2377 }
2378#endif
2379
Guy Schalnate5a37791996-06-05 15:50:50 -05002380 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05002381 png_chunk_error(png_ptr, "missing IHDR");
Guy Schalnate5a37791996-06-05 15:50:50 -05002382
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002383 if (png_ptr->mode & PNG_HAVE_IDAT)
2384 png_ptr->mode |= PNG_AFTER_IDAT;
2385
Andreas Dilger47a0c421997-05-16 02:46:07 -05002386#ifdef PNG_MAX_MALLOC_64K
John Bowlerb11b31a2012-03-21 07:55:46 -05002387 if (length > 65535U)
Andreas Dilger47a0c421997-05-16 02:46:07 -05002388 {
John Bowlerb11b31a2012-03-21 07:55:46 -05002389 png_crc_finish(png_ptr, length);
2390 png_chunk_benign_error(png_ptr, "too large to fit in memory");
2391 return;
Andreas Dilger47a0c421997-05-16 02:46:07 -05002392 }
2393#endif
2394
John Bowlerb5d00512012-03-09 09:15:18 -06002395 buffer = png_read_buffer(png_ptr, length+1, 1/*warn*/);
Glenn Randers-Pehrson97a9b482008-10-25 20:03:28 -05002396
John Bowlerb5d00512012-03-09 09:15:18 -06002397 if (buffer == NULL)
Glenn Randers-Pehrson07748d12002-05-25 11:12:10 -05002398 {
John Bowlerb11b31a2012-03-21 07:55:46 -05002399 png_chunk_benign_error(png_ptr, "out of memory");
Glenn Randers-Pehrson07748d12002-05-25 11:12:10 -05002400 return;
2401 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002402
John Bowlerb5d00512012-03-09 09:15:18 -06002403 png_crc_read(png_ptr, buffer, length);
Andreas Dilger47a0c421997-05-16 02:46:07 -05002404
2405 if (png_crc_finish(png_ptr, skip))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002406 return;
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002407
John Bowlerb5d00512012-03-09 09:15:18 -06002408 key = (png_charp)buffer;
2409 key[length] = 0;
Guy Schalnat0d580581995-07-20 02:43:20 -05002410
2411 for (text = key; *text; text++)
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05002412 /* Empty loop to find end of key */ ;
Guy Schalnat0d580581995-07-20 02:43:20 -05002413
John Bowler0ae4f7b2012-03-03 21:10:26 -06002414 if (text != key + length)
Guy Schalnat0d580581995-07-20 02:43:20 -05002415 text++;
2416
John Bowlerb5d00512012-03-09 09:15:18 -06002417 text_info.compression = PNG_TEXT_COMPRESSION_NONE;
2418 text_info.key = key;
2419 text_info.lang = NULL;
2420 text_info.lang_key = NULL;
2421 text_info.itxt_length = 0;
2422 text_info.text = text;
Glenn Randers-Pehrsonece07cf2012-08-10 18:08:02 -05002423 text_info.text_length = strlen(text);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002424
John Bowlerb5d00512012-03-09 09:15:18 -06002425 if (png_set_text_2(png_ptr, info_ptr, &text_info, 1))
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002426 png_warning(png_ptr, "Insufficient memory to process text chunk");
Guy Schalnat0d580581995-07-20 02:43:20 -05002427}
Guy Schalnat51f0eb41995-09-26 05:22:39 -05002428#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05002429
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05002430#ifdef PNG_READ_zTXt_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05002431/* Note: this does not correctly handle chunks that are > 64K under DOS */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05002432void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06002433png_handle_zTXt(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Guy Schalnat0d580581995-07-20 02:43:20 -05002434{
John Bowler0ae4f7b2012-03-03 21:10:26 -06002435 png_const_charp errmsg = NULL;
John Bowlerb5d00512012-03-09 09:15:18 -06002436 png_bytep buffer;
2437 png_uint_32 keyword_length;
Andreas Dilger47a0c421997-05-16 02:46:07 -05002438
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05002439 png_debug(1, "in png_handle_zTXt");
Glenn Randers-Pehrson800d1e92008-08-20 17:25:21 -05002440
Glenn Randers-Pehrsone3f3c4e2010-02-07 18:08:50 -06002441#ifdef PNG_USER_LIMITS_SUPPORTED
Glenn Randers-Pehrson800d1e92008-08-20 17:25:21 -05002442 if (png_ptr->user_chunk_cache_max != 0)
2443 {
2444 if (png_ptr->user_chunk_cache_max == 1)
2445 {
2446 png_crc_finish(png_ptr, length);
2447 return;
2448 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002449
Glenn Randers-Pehrson800d1e92008-08-20 17:25:21 -05002450 if (--png_ptr->user_chunk_cache_max == 1)
2451 {
Glenn Randers-Pehrson800d1e92008-08-20 17:25:21 -05002452 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002453 png_chunk_benign_error(png_ptr, "no space in chunk cache");
Glenn Randers-Pehrson800d1e92008-08-20 17:25:21 -05002454 return;
2455 }
2456 }
2457#endif
2458
Guy Schalnate5a37791996-06-05 15:50:50 -05002459 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05002460 png_chunk_error(png_ptr, "missing IHDR");
Guy Schalnate5a37791996-06-05 15:50:50 -05002461
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002462 if (png_ptr->mode & PNG_HAVE_IDAT)
2463 png_ptr->mode |= PNG_AFTER_IDAT;
2464
John Bowlerb11b31a2012-03-21 07:55:46 -05002465 buffer = png_read_buffer(png_ptr, length, 2/*silent*/);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002466
John Bowlerb5d00512012-03-09 09:15:18 -06002467 if (buffer == NULL)
Glenn Randers-Pehrson07748d12002-05-25 11:12:10 -05002468 {
John Bowlerb11b31a2012-03-21 07:55:46 -05002469 png_crc_finish(png_ptr, length);
2470 png_chunk_benign_error(png_ptr, "out of memory");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002471 return;
Glenn Randers-Pehrson07748d12002-05-25 11:12:10 -05002472 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002473
John Bowlerb5d00512012-03-09 09:15:18 -06002474 png_crc_read(png_ptr, buffer, length);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002475
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002476 if (png_crc_finish(png_ptr, 0))
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002477 return;
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002478
John Bowler0ae4f7b2012-03-03 21:10:26 -06002479 /* TODO: also check that the keyword contents match the spec! */
2480 for (keyword_length = 0;
John Bowlerb5d00512012-03-09 09:15:18 -06002481 keyword_length < length && buffer[keyword_length] != 0;
John Bowler0ae4f7b2012-03-03 21:10:26 -06002482 ++keyword_length)
2483 /* Empty loop to find end of name */ ;
Guy Schalnat0d580581995-07-20 02:43:20 -05002484
John Bowler0ae4f7b2012-03-03 21:10:26 -06002485 if (keyword_length > 79 || keyword_length < 1)
2486 errmsg = "bad keyword";
Guy Schalnat0d580581995-07-20 02:43:20 -05002487
John Bowler0ae4f7b2012-03-03 21:10:26 -06002488 /* zTXt must have some LZ data after the keyword, although it may expand to
2489 * zero bytes; we need a '\0' at the end of the keyword, the compression type
2490 * then the LZ data:
2491 */
2492 else if (keyword_length + 3 > length)
2493 errmsg = "truncated";
2494
John Bowlerb5d00512012-03-09 09:15:18 -06002495 else if (buffer[keyword_length+1] != PNG_COMPRESSION_TYPE_BASE)
John Bowler0ae4f7b2012-03-03 21:10:26 -06002496 errmsg = "unknown compression type";
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002497
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002498 else
Guy Schalnat0d580581995-07-20 02:43:20 -05002499 {
John Bowler0ae4f7b2012-03-03 21:10:26 -06002500 png_alloc_size_t uncompressed_length = PNG_SIZE_MAX;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002501
John Bowler0ae4f7b2012-03-03 21:10:26 -06002502 /* TODO: at present png_decompress_chunk imposes a single application
2503 * level memory limit, this should be split to different values for iCCP
2504 * and text chunks.
2505 */
John Bowlerb5d00512012-03-09 09:15:18 -06002506 if (png_decompress_chunk(png_ptr, length, keyword_length+2,
2507 &uncompressed_length, 1/*terminate*/) == Z_STREAM_END)
John Bowler0ae4f7b2012-03-03 21:10:26 -06002508 {
2509 png_text text;
2510
John Bowlerb5d00512012-03-09 09:15:18 -06002511 /* It worked; png_ptr->read_buffer now looks like a tEXt chunk except
2512 * for the extra compression type byte and the fact that it isn't
John Bowler0ae4f7b2012-03-03 21:10:26 -06002513 * necessarily '\0' terminated.
2514 */
John Bowlerb5d00512012-03-09 09:15:18 -06002515 buffer = png_ptr->read_buffer;
2516 buffer[uncompressed_length+(keyword_length+2)] = 0;
John Bowler0ae4f7b2012-03-03 21:10:26 -06002517
2518 text.compression = PNG_TEXT_COMPRESSION_zTXt;
John Bowlerb5d00512012-03-09 09:15:18 -06002519 text.key = (png_charp)buffer;
2520 text.text = (png_charp)(buffer + keyword_length+2);
John Bowler0ae4f7b2012-03-03 21:10:26 -06002521 text.text_length = uncompressed_length;
2522 text.itxt_length = 0;
2523 text.lang = NULL;
2524 text.lang_key = NULL;
2525
2526 if (png_set_text_2(png_ptr, info_ptr, &text, 1))
John Bowlerb11b31a2012-03-21 07:55:46 -05002527 errmsg = "insufficient memory";
John Bowler0ae4f7b2012-03-03 21:10:26 -06002528 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002529
John Bowlerb5d00512012-03-09 09:15:18 -06002530 else
2531 errmsg = png_ptr->zstream.msg;
2532 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002533
John Bowler0ae4f7b2012-03-03 21:10:26 -06002534 if (errmsg != NULL)
2535 png_chunk_benign_error(png_ptr, errmsg);
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002536}
2537#endif
2538
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05002539#ifdef PNG_READ_iTXt_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05002540/* Note: this does not correctly handle chunks that are > 64K under DOS */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05002541void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06002542png_handle_iTXt(png_structrp png_ptr, png_inforp info_ptr, png_uint_32 length)
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002543{
John Bowler0ae4f7b2012-03-03 21:10:26 -06002544 png_const_charp errmsg = NULL;
John Bowlerb5d00512012-03-09 09:15:18 -06002545 png_bytep buffer;
John Bowler0ae4f7b2012-03-03 21:10:26 -06002546 png_uint_32 prefix_length;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002547
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05002548 png_debug(1, "in png_handle_iTXt");
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002549
Glenn Randers-Pehrsone3f3c4e2010-02-07 18:08:50 -06002550#ifdef PNG_USER_LIMITS_SUPPORTED
Glenn Randers-Pehrson800d1e92008-08-20 17:25:21 -05002551 if (png_ptr->user_chunk_cache_max != 0)
2552 {
2553 if (png_ptr->user_chunk_cache_max == 1)
2554 {
2555 png_crc_finish(png_ptr, length);
2556 return;
2557 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002558
Glenn Randers-Pehrson800d1e92008-08-20 17:25:21 -05002559 if (--png_ptr->user_chunk_cache_max == 1)
2560 {
Glenn Randers-Pehrson800d1e92008-08-20 17:25:21 -05002561 png_crc_finish(png_ptr, length);
John Bowlerb11b31a2012-03-21 07:55:46 -05002562 png_chunk_benign_error(png_ptr, "no space in chunk cache");
Glenn Randers-Pehrson800d1e92008-08-20 17:25:21 -05002563 return;
2564 }
2565 }
2566#endif
2567
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002568 if (!(png_ptr->mode & PNG_HAVE_IHDR))
John Bowlerb11b31a2012-03-21 07:55:46 -05002569 png_chunk_error(png_ptr, "missing IHDR");
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002570
2571 if (png_ptr->mode & PNG_HAVE_IDAT)
2572 png_ptr->mode |= PNG_AFTER_IDAT;
2573
John Bowlerb5d00512012-03-09 09:15:18 -06002574 buffer = png_read_buffer(png_ptr, length+1, 1/*warn*/);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002575
John Bowlerb5d00512012-03-09 09:15:18 -06002576 if (buffer == NULL)
Glenn Randers-Pehrson07748d12002-05-25 11:12:10 -05002577 {
John Bowlerb11b31a2012-03-21 07:55:46 -05002578 png_crc_finish(png_ptr, length);
2579 png_chunk_benign_error(png_ptr, "out of memory");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002580 return;
Glenn Randers-Pehrson07748d12002-05-25 11:12:10 -05002581 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002582
John Bowlerb5d00512012-03-09 09:15:18 -06002583 png_crc_read(png_ptr, buffer, length);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002584
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002585 if (png_crc_finish(png_ptr, 0))
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002586 return;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002587
John Bowler0ae4f7b2012-03-03 21:10:26 -06002588 /* First the keyword. */
2589 for (prefix_length=0;
John Bowlerb5d00512012-03-09 09:15:18 -06002590 prefix_length < length && buffer[prefix_length] != 0;
John Bowler0ae4f7b2012-03-03 21:10:26 -06002591 ++prefix_length)
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05002592 /* Empty loop */ ;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002593
John Bowler0ae4f7b2012-03-03 21:10:26 -06002594 /* Perform a basic check on the keyword length here. */
2595 if (prefix_length > 79 || prefix_length < 1)
2596 errmsg = "bad keyword";
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002597
John Bowler0ae4f7b2012-03-03 21:10:26 -06002598 /* Expect keyword, compression flag, compression type, language, translated
2599 * keyword (both may be empty but are 0 terminated) then the text, which may
2600 * be empty.
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05002601 */
John Bowler0ae4f7b2012-03-03 21:10:26 -06002602 else if (prefix_length + 5 > length)
2603 errmsg = "truncated";
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -06002604
John Bowlerb5d00512012-03-09 09:15:18 -06002605 else if (buffer[prefix_length+1] == 0 ||
2606 (buffer[prefix_length+1] == 1 &&
2607 buffer[prefix_length+2] == PNG_COMPRESSION_TYPE_BASE))
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002608 {
John Bowlerb5d00512012-03-09 09:15:18 -06002609 int compressed = buffer[prefix_length+1] != 0;
John Bowler0ae4f7b2012-03-03 21:10:26 -06002610 png_uint_32 language_offset, translated_keyword_offset;
2611 png_alloc_size_t uncompressed_length = 0;
2612
2613 /* Now the language tag */
2614 prefix_length += 3;
2615 language_offset = prefix_length;
2616
John Bowlerb5d00512012-03-09 09:15:18 -06002617 for (; prefix_length < length && buffer[prefix_length] != 0;
John Bowler0ae4f7b2012-03-03 21:10:26 -06002618 ++prefix_length)
2619 /* Empty loop */ ;
2620
2621 /* WARNING: the length may be invalid here, this is checked below. */
2622 translated_keyword_offset = ++prefix_length;
2623
John Bowlerb5d00512012-03-09 09:15:18 -06002624 for (; prefix_length < length && buffer[prefix_length] != 0;
John Bowler0ae4f7b2012-03-03 21:10:26 -06002625 ++prefix_length)
2626 /* Empty loop */ ;
2627
2628 /* prefix_length should now be at the trailing '\0' of the translated
2629 * keyword, but it may already be over the end. None of this arithmetic
2630 * can overflow because chunks are at most 2^31 bytes long, but on 16-bit
2631 * systems the available allocaton may overflow.
2632 */
2633 ++prefix_length;
2634
2635 if (!compressed && prefix_length <= length)
2636 uncompressed_length = length - prefix_length;
2637
2638 else if (compressed && prefix_length < length)
2639 {
2640 uncompressed_length = PNG_SIZE_MAX;
2641
2642 /* TODO: at present png_decompress_chunk imposes a single application
2643 * level memory limit, this should be split to different values for
2644 * iCCP and text chunks.
2645 */
John Bowlerb5d00512012-03-09 09:15:18 -06002646 if (png_decompress_chunk(png_ptr, length, prefix_length,
2647 &uncompressed_length, 1/*terminate*/) == Z_STREAM_END)
2648 buffer = png_ptr->read_buffer;
2649
2650 else
2651 errmsg = png_ptr->zstream.msg;
John Bowler0ae4f7b2012-03-03 21:10:26 -06002652 }
2653
2654 else
2655 errmsg = "truncated";
2656
2657 if (errmsg == NULL)
2658 {
2659 png_text text;
2660
John Bowlerb5d00512012-03-09 09:15:18 -06002661 buffer[uncompressed_length+prefix_length] = 0;
John Bowler0ae4f7b2012-03-03 21:10:26 -06002662
2663 if (compressed)
2664 text.compression = PNG_ITXT_COMPRESSION_NONE;
2665
2666 else
2667 text.compression = PNG_ITXT_COMPRESSION_zTXt;
2668
John Bowlerb5d00512012-03-09 09:15:18 -06002669 text.key = (png_charp)buffer;
2670 text.lang = (png_charp)buffer + language_offset;
2671 text.lang_key = (png_charp)buffer + translated_keyword_offset;
2672 text.text = (png_charp)buffer + prefix_length;
John Bowler0ae4f7b2012-03-03 21:10:26 -06002673 text.text_length = 0;
2674 text.itxt_length = uncompressed_length;
2675
2676 if (png_set_text_2(png_ptr, info_ptr, &text, 1))
2677 errmsg = "insufficient memory";
2678 }
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002679 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002680
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002681 else
John Bowler0ae4f7b2012-03-03 21:10:26 -06002682 errmsg = "bad compression info";
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002683
John Bowler0ae4f7b2012-03-03 21:10:26 -06002684 if (errmsg != NULL)
2685 png_chunk_benign_error(png_ptr, errmsg);
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002686}
2687#endif
2688
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05002689#ifdef PNG_READ_UNKNOWN_CHUNKS_SUPPORTED
John Bowlere9567512012-08-15 22:53:00 -05002690/* Utility function for png_handle_unknown; set up png_ptr::unknown_chunk */
2691static int
2692png_cache_unknown_chunk(png_structrp png_ptr, png_uint_32 length)
2693{
2694 png_alloc_size_t limit = PNG_SIZE_MAX;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002695
John Bowlere9567512012-08-15 22:53:00 -05002696 if (png_ptr->unknown_chunk.data != NULL)
2697 {
2698 png_free(png_ptr, png_ptr->unknown_chunk.data);
2699 png_ptr->unknown_chunk.data = NULL;
2700 }
2701
2702# ifdef PNG_SET_CHUNK_MALLOC_LIMIT_SUPPORTED
2703 if (png_ptr->user_chunk_malloc_max > 0 &&
2704 png_ptr->user_chunk_malloc_max < limit)
2705 limit = png_ptr->user_chunk_malloc_max;
2706
2707# elif PNG_USER_CHUNK_MALLOC_MAX > 0
2708 if (PNG_USER_CHUNK_MALLOC_MAX < limit)
2709 limit = PNG_USER_CHUNK_MALLOC_MAX;
2710# endif
2711
2712 if (length <= limit)
2713 {
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05002714 PNG_CSTRING_FROM_CHUNK(png_ptr->unknown_chunk.name, png_ptr->chunk_name);
John Bowlere9567512012-08-15 22:53:00 -05002715 /* The following is safe because of the PNG_SIZE_MAX init above */
2716 png_ptr->unknown_chunk.size = (png_size_t)length/*SAFE*/;
2717 /* 'mode' is a flag array, only the bottom four bits matter here */
2718 png_ptr->unknown_chunk.location = (png_byte)png_ptr->mode/*SAFE*/;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002719
2720 if (length == 0)
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05002721 png_ptr->unknown_chunk.data = NULL;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002722
2723 else
2724 {
John Bowlere9567512012-08-15 22:53:00 -05002725 /* Do a 'warn' here - it is handled below. */
2726 png_ptr->unknown_chunk.data = png_voidcast(png_bytep,
2727 png_malloc_warn(png_ptr, length));
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002728 }
John Bowlere9567512012-08-15 22:53:00 -05002729 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002730
John Bowlere9567512012-08-15 22:53:00 -05002731 if (png_ptr->unknown_chunk.data == NULL && length > 0)
2732 {
2733 /* This is benign because we clean up correctly */
2734 png_crc_finish(png_ptr, length);
2735 png_chunk_benign_error(png_ptr, "unknown chunk exceeds memory limits");
2736 return 0;
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002737 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002738
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002739 else
John Bowlere9567512012-08-15 22:53:00 -05002740 {
2741 if (length > 0)
2742 png_crc_read(png_ptr, png_ptr->unknown_chunk.data, length);
2743 png_crc_finish(png_ptr, 0);
2744 return 1;
2745 }
2746}
2747#endif /* PNG_READ_UNKNOWN_CHUNKS_SUPPORTED */
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06002748
John Bowlere9567512012-08-15 22:53:00 -05002749/* Handle an unknown, or known but disabled, chunk */
2750void /* PRIVATE */
2751png_handle_unknown(png_structrp png_ptr, png_inforp info_ptr,
2752 png_uint_32 length, int keep)
2753{
2754 int handled = 0; /* the chunk was handled */
Glenn Randers-Pehrson61c32d92000-02-04 23:40:16 -06002755
John Bowlere9567512012-08-15 22:53:00 -05002756 png_debug(1, "in png_handle_unknown");
2757
2758#ifdef PNG_READ_UNKNOWN_CHUNKS_SUPPORTED
2759 /* NOTE: this code is based on the code in libpng-1.4.12 except for fixing
2760 * the bug which meant that setting a non-default behavior for a specific
2761 * chunk would be ignored (the default was always used unless a user
2762 * callback was installed).
2763 *
2764 * 'keep' is the value from the png_chunk_unknown_handling, the setting for
2765 * this specific chunk_name, if PNG_HANDLE_AS_UNKNOWN_SUPPORTED, if not it
2766 * will always be PNG_HANDLE_CHUNK_AS_DEFAULT and it needs to be set here.
2767 * This is just an optimization to avoid multiple calls to the lookup
2768 * function.
2769 */
2770# ifndef PNG_HANDLE_AS_UNKNOWN_SUPPORTED
John Bowler4a6c6df2012-08-16 16:12:13 -05002771# ifdef PNG_SET_UNKNOWN_CHUNKS_SUPPORTED
2772 keep = png_chunk_unknown_handling(png_ptr, png_ptr->chunk_name);
2773# endif
John Bowlere9567512012-08-15 22:53:00 -05002774# endif
2775
2776 /* One of the following methods will read the chunk or skip it (at least one
2777 * of these is always defined because this is the only way to switch on
2778 * PNG_READ_UNKNOWN_CHUNKS_SUPPORTED)
2779 */
2780# ifdef PNG_READ_USER_CHUNKS_SUPPORTED
2781 /* The user callback takes precedence over the chunk keep value, but the
2782 * keep value is still required to validate a save of a critical chunk.
2783 */
2784 if (png_ptr->read_user_chunk_fn != NULL)
2785 {
2786 if (png_cache_unknown_chunk(png_ptr, length))
2787 {
2788 /* Callback to user unknown chunk handler */
2789 int ret = (*(png_ptr->read_user_chunk_fn))(png_ptr,
2790 &png_ptr->unknown_chunk);
2791
2792 /* ret is:
2793 * negative: An error occured, png_chunk_error will be called.
2794 * zero: The chunk was not handled, the chunk will be discarded
2795 * unless png_set_keep_unknown_chunks has been used to set
2796 * a 'keep' behavior for this particular chunk, in which
2797 * case that will be used. A critical chunk will cause an
2798 * error at this point unless it is to be saved.
2799 * positive: The chunk was handled, libpng will ignore/discard it.
2800 */
2801 if (ret < 0)
2802 png_chunk_error(png_ptr, "error in user chunk");
2803
2804 else if (ret == 0)
2805 {
2806 /* If the keep value is 'default' or 'never' override it, but
2807 * still error out on critical chunks unless the keep value is
2808 * 'always' While this is weird it is the behavior in 1.4.12. A
2809 * possible improvement would be to obey the value set for the
2810 * chunk, but this would be an API change that would probably
2811 * damage some applications.
2812 *
2813 * The png_app_warning below catches the case that matters, where
2814 * the application has neither set specific save for this chunk
2815 * or global save.
2816 */
2817 if (keep < PNG_HANDLE_CHUNK_IF_SAFE)
2818 {
2819# ifdef PNG_SET_UNKNOWN_CHUNKS_SUPPORTED
2820 if (png_ptr->unknown_default < PNG_HANDLE_CHUNK_IF_SAFE)
2821 png_app_warning(png_ptr,
2822 "forcing save of an unhandled chunk; please call png_set_keep_unknown_chunks");
2823# endif
2824 keep = PNG_HANDLE_CHUNK_IF_SAFE;
2825 }
2826 }
2827
2828 else /* chunk was handled */
2829 {
2830 handled = 1;
2831 /* Critical chunks can be safely discarded at this point. */
2832 keep = PNG_HANDLE_CHUNK_NEVER;
2833 }
2834 }
2835
2836 else
2837 keep = PNG_HANDLE_CHUNK_NEVER; /* insufficient memory */
2838 }
2839
John Bowlerd0eef282012-08-17 15:30:29 -05002840 else
2841 /* Use the SAVE_UNKNOWN_CHUNKS code or skip the chunk */
John Bowlere9567512012-08-15 22:53:00 -05002842# endif /* PNG_READ_USER_CHUNKS_SUPPORTED */
2843
2844# ifdef PNG_SAVE_UNKNOWN_CHUNKS_SUPPORTED
2845 {
2846 /* keep is currently just the per-chunk setting, if there was no
2847 * setting change it to the global default now (not that this may
2848 * still be AS_DEFAULT) then obtain the cache of the chunk if required,
2849 * if not simply skip the chunk.
2850 */
2851 if (keep == PNG_HANDLE_CHUNK_AS_DEFAULT)
2852 keep = png_ptr->unknown_default;
2853
2854 if (keep == PNG_HANDLE_CHUNK_ALWAYS ||
2855 (keep == PNG_HANDLE_CHUNK_IF_SAFE &&
2856 PNG_CHUNK_ANCILLIARY(png_ptr->chunk_name)))
2857 {
2858 if (!png_cache_unknown_chunk(png_ptr, length))
2859 keep = PNG_HANDLE_CHUNK_NEVER;
2860 }
2861
2862 else
2863 png_crc_finish(png_ptr, length);
2864 }
2865# else
2866# ifndef PNG_READ_USER_CHUNKS_SUPPORTED
2867# error no method to support READ_UNKNOWN_CHUNKS
2868# endif
John Bowlerd0eef282012-08-17 15:30:29 -05002869
2870 {
2871 /* If here there is no read callback pointer set and no support is
2872 * compiled in to just save the unknown chunks, so simply skip this
2873 * chunk. If 'keep' is something other than AS_DEFAULT or NEVER then
2874 * the app has erroneously asked for unknown chunk saving when there
2875 * is no support.
2876 */
2877 if (keep > PNG_HANDLE_CHUNK_NEVER)
2878 png_app_error(png_ptr, "no unknown chunk support available");
2879
2880 png_crc_finish(png_ptr, length);
2881 }
John Bowlere9567512012-08-15 22:53:00 -05002882# endif
2883
2884# ifdef PNG_STORE_UNKNOWN_CHUNKS_SUPPORTED
2885 /* Now store the chunk in the chunk list if appropriate, and if the limits
2886 * permit it.
2887 */
2888 if (keep == PNG_HANDLE_CHUNK_ALWAYS ||
2889 (keep == PNG_HANDLE_CHUNK_IF_SAFE &&
2890 PNG_CHUNK_ANCILLIARY(png_ptr->chunk_name)))
2891 {
2892# ifdef PNG_USER_LIMITS_SUPPORTED
2893 switch (png_ptr->user_chunk_cache_max)
2894 {
2895 case 2:
2896 png_ptr->user_chunk_cache_max = 1;
2897 png_chunk_benign_error(png_ptr, "no space in chunk cache");
2898 /* FALL THROUGH */
2899 case 1:
2900 /* NOTE: prior to 1.6.0 this case resulted in an unknown critical
2901 * chunk being skipped, now there will be a hard error below.
2902 */
2903 break;
2904
2905 default: /* not at limit */
2906 --(png_ptr->user_chunk_cache_max);
2907 /* FALL THROUGH */
2908 case 0: /* no limit */
2909# endif /* PNG_USER_LIMITS_SUPPORTED */
2910 /* Here when the limit isn't reached or when limits are compiled
2911 * out; store the chunk.
2912 */
2913 png_set_unknown_chunks(png_ptr, info_ptr,
2914 &png_ptr->unknown_chunk, 1);
2915 handled = 1;
2916# ifdef PNG_USER_LIMITS_SUPPORTED
2917 break;
2918 }
2919# endif
2920 }
2921# else /* no store support! */
2922 PNG_UNUSED(info_ptr)
2923# error untested code (reading unknown chunks with no store support)
2924# endif
2925
2926 /* Regardless of the error handling below the cached data (if any) can be
2927 * freed now. Notice that the data is not freed if there is a png_error, but
2928 * it will be freed by destroy_read_struct.
2929 */
2930 if (png_ptr->unknown_chunk.data != NULL)
2931 png_free(png_ptr, png_ptr->unknown_chunk.data);
2932 png_ptr->unknown_chunk.data = NULL;
2933
2934#else /* !PNG_READ_UNKNOWN_CHUNKS_SUPPORTED */
2935 /* There is no support to read an unknown chunk, so just skip it. */
2936 png_crc_finish(png_ptr, length);
2937 PNG_UNUSED(info_ptr)
2938 PNG_UNUSED(keep)
2939#endif /* !PNG_READ_UNKNOWN_CHUNKS_SUPPORTED */
2940
2941 /* Check for unhandled critical chunks */
2942 if (!handled && PNG_CHUNK_CRITICAL(png_ptr->chunk_name))
2943 png_chunk_error(png_ptr, "unhandled critical chunk");
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002944}
2945
2946/* This function is called to verify that a chunk name is valid.
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002947 * This function can't have the "critical chunk check" incorporated
2948 * into it, since in the future we will need to be able to call user
2949 * functions to handle unknown critical chunks after we check that
2950 * the chunk name itself is valid.
2951 */
Andreas Dilger47a0c421997-05-16 02:46:07 -05002952
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05002953/* Bit hacking: the test for an invalid byte in the 4 byte chunk name is:
2954 *
2955 * ((c) < 65 || (c) > 122 || ((c) > 90 && (c) < 97))
2956 */
Andreas Dilger47a0c421997-05-16 02:46:07 -05002957
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05002958void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06002959png_check_chunk_name(png_structrp png_ptr, png_uint_32 chunk_name)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002960{
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05002961 int i;
2962
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05002963 png_debug(1, "in png_check_chunk_name");
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05002964
2965 for (i=1; i<=4; ++i)
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002966 {
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05002967 int c = chunk_name & 0xff;
2968
2969 if (c < 65 || c > 122 || (c > 90 && c < 97))
2970 png_chunk_error(png_ptr, "invalid chunk type");
2971
2972 chunk_name >>= 8;
Andreas Dilger02ad0ef1997-01-17 01:34:35 -06002973 }
2974}
2975
John Bowler7875d532011-11-07 22:33:49 -06002976/* Combines the row recently read in with the existing pixels in the row. This
2977 * routine takes care of alpha and transparency if requested. This routine also
2978 * handles the two methods of progressive display of interlaced images,
2979 * depending on the 'display' value; if 'display' is true then the whole row
2980 * (dp) is filled from the start by replicating the available pixels. If
2981 * 'display' is false only those pixels present in the pass are filled in.
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002982 */
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05002983void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06002984png_combine_row(png_const_structrp png_ptr, png_bytep dp, int display)
Guy Schalnat0d580581995-07-20 02:43:20 -05002985{
John Bowler4e68aa72011-10-11 16:01:33 -05002986 unsigned int pixel_depth = png_ptr->transformed_pixel_depth;
2987 png_const_bytep sp = png_ptr->row_buf + 1;
John Bowlerac8375d2011-10-06 22:27:16 -05002988 png_uint_32 row_width = png_ptr->width;
John Bowler4e68aa72011-10-11 16:01:33 -05002989 unsigned int pass = png_ptr->pass;
John Bowlerfb5b3ac2011-10-16 22:52:56 -05002990 png_bytep end_ptr = 0;
2991 png_byte end_byte = 0;
2992 unsigned int end_mask;
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05002993
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05002994 png_debug(1, "in png_combine_row");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06002995
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05002996 /* Added in 1.5.6: it should not be possible to enter this routine until at
2997 * least one row has been read from the PNG data and transformed.
2998 */
2999 if (pixel_depth == 0)
3000 png_error(png_ptr, "internal row logic error");
3001
3002 /* Added in 1.5.4: the pixel depth should match the information returned by
3003 * any call to png_read_update_info at this point. Do not continue if we got
John Bowler9994f252011-05-15 18:52:39 -05003004 * this wrong.
3005 */
3006 if (png_ptr->info_rowbytes != 0 && png_ptr->info_rowbytes !=
John Bowlerac8375d2011-10-06 22:27:16 -05003007 PNG_ROWBYTES(pixel_depth, row_width))
John Bowler9994f252011-05-15 18:52:39 -05003008 png_error(png_ptr, "internal row size calculation error");
3009
John Bowlerac8375d2011-10-06 22:27:16 -05003010 /* Don't expect this to ever happen: */
3011 if (row_width == 0)
3012 png_error(png_ptr, "internal row width error");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003013
John Bowlerfb5b3ac2011-10-16 22:52:56 -05003014 /* Preserve the last byte in cases where only part of it will be overwritten,
3015 * the multiply below may overflow, we don't care because ANSI-C guarantees
3016 * we get the low bits.
3017 */
3018 end_mask = (pixel_depth * row_width) & 7;
3019 if (end_mask != 0)
3020 {
Glenn Randers-Pehrsonef02d562011-10-27 12:05:58 -05003021 /* end_ptr == NULL is a flag to say do nothing */
John Bowlerfb5b3ac2011-10-16 22:52:56 -05003022 end_ptr = dp + PNG_ROWBYTES(pixel_depth, row_width) - 1;
3023 end_byte = *end_ptr;
3024# ifdef PNG_READ_PACKSWAP_SUPPORTED
3025 if (png_ptr->transformations & PNG_PACKSWAP) /* little-endian byte */
3026 end_mask = 0xff << end_mask;
3027
3028 else /* big-endian byte */
3029# endif
3030 end_mask = 0xff >> end_mask;
3031 /* end_mask is now the bits to *keep* from the destination row */
3032 }
3033
Glenn Randers-Pehrsondbb7e192012-08-10 17:27:42 -05003034 /* For non-interlaced images this reduces to a memcpy(). A memcpy()
Glenn Randers-Pehrsonef02d562011-10-27 12:05:58 -05003035 * will also happen if interlacing isn't supported or if the application
3036 * does not call png_set_interlace_handling(). In the latter cases the
3037 * caller just gets a sequence of the unexpanded rows from each interlace
3038 * pass.
John Bowlerac8375d2011-10-06 22:27:16 -05003039 */
3040#ifdef PNG_READ_INTERLACING_SUPPORTED
3041 if (png_ptr->interlaced && (png_ptr->transformations & PNG_INTERLACE) &&
John Bowler4e68aa72011-10-11 16:01:33 -05003042 pass < 6 && (display == 0 ||
3043 /* The following copies everything for 'display' on passes 0, 2 and 4. */
3044 (display == 1 && (pass & 1) != 0)))
Guy Schalnat0d580581995-07-20 02:43:20 -05003045 {
John Bowler4e68aa72011-10-11 16:01:33 -05003046 /* Narrow images may have no bits in a pass; the caller should handle
3047 * this, but this test is cheap:
John Bowlerac8375d2011-10-06 22:27:16 -05003048 */
John Bowler4e68aa72011-10-11 16:01:33 -05003049 if (row_width <= PNG_PASS_START_COL(pass))
3050 return;
John Bowlerac8375d2011-10-06 22:27:16 -05003051
John Bowler4e68aa72011-10-11 16:01:33 -05003052 if (pixel_depth < 8)
Guy Schalnat0d580581995-07-20 02:43:20 -05003053 {
John Bowler7875d532011-11-07 22:33:49 -06003054 /* For pixel depths up to 4 bpp the 8-pixel mask can be expanded to fit
John Bowler4e68aa72011-10-11 16:01:33 -05003055 * into 32 bits, then a single loop over the bytes using the four byte
Glenn Randers-Pehrsonef02d562011-10-27 12:05:58 -05003056 * values in the 32-bit mask can be used. For the 'display' option the
John Bowler4e68aa72011-10-11 16:01:33 -05003057 * expanded mask may also not require any masking within a byte. To
3058 * make this work the PACKSWAP option must be taken into account - it
3059 * simply requires the pixels to be reversed in each byte.
3060 *
3061 * The 'regular' case requires a mask for each of the first 6 passes,
3062 * the 'display' case does a copy for the even passes in the range
John Bowler7875d532011-11-07 22:33:49 -06003063 * 0..6. This has already been handled in the test above.
John Bowler4e68aa72011-10-11 16:01:33 -05003064 *
3065 * The masks are arranged as four bytes with the first byte to use in
3066 * the lowest bits (little-endian) regardless of the order (PACKSWAP or
3067 * not) of the pixels in each byte.
3068 *
3069 * NOTE: the whole of this logic depends on the caller of this function
3070 * only calling it on rows appropriate to the pass. This function only
John Bowler7875d532011-11-07 22:33:49 -06003071 * understands the 'x' logic; the 'y' logic is handled by the caller.
John Bowler4e68aa72011-10-11 16:01:33 -05003072 *
3073 * The following defines allow generation of compile time constant bit
3074 * masks for each pixel depth and each possibility of swapped or not
Glenn Randers-Pehrsonef02d562011-10-27 12:05:58 -05003075 * swapped bytes. Pass 'p' is in the range 0..6; 'x', a pixel index,
3076 * is in the range 0..7; and the result is 1 if the pixel is to be
3077 * copied in the pass, 0 if not. 'S' is for the sparkle method, 'B'
3078 * for the block method.
3079 *
John Bowler92ef3132011-10-27 19:36:08 -05003080 * With some compilers a compile time expression of the general form:
Glenn Randers-Pehrsoncb756992011-10-27 16:59:03 -05003081 *
John Bowler92ef3132011-10-27 19:36:08 -05003082 * (shift >= 32) ? (a >> (shift-32)) : (b >> shift)
3083 *
3084 * Produces warnings with values of 'shift' in the range 33 to 63
Glenn Randers-Pehrson18763662011-10-27 22:09:22 -05003085 * because the right hand side of the ?: expression is evaluated by
John Bowler92ef3132011-10-27 19:36:08 -05003086 * the compiler even though it isn't used. Microsoft Visual C (various
3087 * versions) and the Intel C compiler are known to do this. To avoid
3088 * this the following macros are used in 1.5.6. This is a temporary
John Bowler7875d532011-11-07 22:33:49 -06003089 * solution to avoid destabilizing the code during the release process.
Glenn Randers-Pehrsoncb756992011-10-27 16:59:03 -05003090 */
John Bowler92ef3132011-10-27 19:36:08 -05003091# if PNG_USE_COMPILE_TIME_MASKS
Glenn Randers-Pehrsoncb756992011-10-27 16:59:03 -05003092# define PNG_LSR(x,s) ((x)>>((s) & 0x1f))
3093# define PNG_LSL(x,s) ((x)<<((s) & 0x1f))
Glenn Randers-Pehrsonef02d562011-10-27 12:05:58 -05003094# else
Glenn Randers-Pehrsoncb756992011-10-27 16:59:03 -05003095# define PNG_LSR(x,s) ((x)>>(s))
3096# define PNG_LSL(x,s) ((x)<<(s))
Glenn Randers-Pehrsonef02d562011-10-27 12:05:58 -05003097# endif
Glenn Randers-Pehrsoncb756992011-10-27 16:59:03 -05003098# define S_COPY(p,x) (((p)<4 ? PNG_LSR(0x80088822,(3-(p))*8+(7-(x))) :\
3099 PNG_LSR(0xaa55ff00,(7-(p))*8+(7-(x)))) & 1)
3100# define B_COPY(p,x) (((p)<4 ? PNG_LSR(0xff0fff33,(3-(p))*8+(7-(x))) :\
3101 PNG_LSR(0xff55ff00,(7-(p))*8+(7-(x)))) & 1)
Guy Schalnat0d580581995-07-20 02:43:20 -05003102
John Bowler4e68aa72011-10-11 16:01:33 -05003103 /* Return a mask for pass 'p' pixel 'x' at depth 'd'. The mask is
3104 * little endian - the first pixel is at bit 0 - however the extra
3105 * parameter 's' can be set to cause the mask position to be swapped
3106 * within each byte, to match the PNG format. This is done by XOR of
3107 * the shift with 7, 6 or 4 for bit depths 1, 2 and 4.
3108 */
Glenn Randers-Pehrsoncb756992011-10-27 16:59:03 -05003109# define PIXEL_MASK(p,x,d,s) \
3110 (PNG_LSL(((PNG_LSL(1U,(d)))-1),(((x)*(d))^((s)?8-(d):0))))
John Bowlerac8375d2011-10-06 22:27:16 -05003111
John Bowler4e68aa72011-10-11 16:01:33 -05003112 /* Hence generate the appropriate 'block' or 'sparkle' pixel copy mask.
3113 */
3114# define S_MASKx(p,x,d,s) (S_COPY(p,x)?PIXEL_MASK(p,x,d,s):0)
3115# define B_MASKx(p,x,d,s) (B_COPY(p,x)?PIXEL_MASK(p,x,d,s):0)
John Bowlerac8375d2011-10-06 22:27:16 -05003116
Glenn Randers-Pehrsonef02d562011-10-27 12:05:58 -05003117 /* Combine 8 of these to get the full mask. For the 1-bpp and 2-bpp
3118 * cases the result needs replicating, for the 4-bpp case the above
3119 * generates a full 32 bits.
John Bowler4e68aa72011-10-11 16:01:33 -05003120 */
3121# define MASK_EXPAND(m,d) ((m)*((d)==1?0x01010101:((d)==2?0x00010001:1)))
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003122
John Bowler4e68aa72011-10-11 16:01:33 -05003123# define S_MASK(p,d,s) MASK_EXPAND(S_MASKx(p,0,d,s) + S_MASKx(p,1,d,s) +\
3124 S_MASKx(p,2,d,s) + S_MASKx(p,3,d,s) + S_MASKx(p,4,d,s) +\
3125 S_MASKx(p,5,d,s) + S_MASKx(p,6,d,s) + S_MASKx(p,7,d,s), d)
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003126
John Bowler4e68aa72011-10-11 16:01:33 -05003127# define B_MASK(p,d,s) MASK_EXPAND(B_MASKx(p,0,d,s) + B_MASKx(p,1,d,s) +\
3128 B_MASKx(p,2,d,s) + B_MASKx(p,3,d,s) + B_MASKx(p,4,d,s) +\
3129 B_MASKx(p,5,d,s) + B_MASKx(p,6,d,s) + B_MASKx(p,7,d,s), d)
John Bowlerac8375d2011-10-06 22:27:16 -05003130
John Bowler4e68aa72011-10-11 16:01:33 -05003131#if PNG_USE_COMPILE_TIME_MASKS
3132 /* Utility macros to construct all the masks for a depth/swap
3133 * combination. The 's' parameter says whether the format is PNG
John Bowler7875d532011-11-07 22:33:49 -06003134 * (big endian bytes) or not. Only the three odd-numbered passes are
John Bowler4e68aa72011-10-11 16:01:33 -05003135 * required for the display/block algorithm.
3136 */
3137# define S_MASKS(d,s) { S_MASK(0,d,s), S_MASK(1,d,s), S_MASK(2,d,s),\
3138 S_MASK(3,d,s), S_MASK(4,d,s), S_MASK(5,d,s) }
John Bowlerac8375d2011-10-06 22:27:16 -05003139
John Bowler4e68aa72011-10-11 16:01:33 -05003140# define B_MASKS(d,s) { B_MASK(1,d,s), S_MASK(3,d,s), S_MASK(5,d,s) }
John Bowlerac8375d2011-10-06 22:27:16 -05003141
John Bowler4e68aa72011-10-11 16:01:33 -05003142# define DEPTH_INDEX(d) ((d)==1?0:((d)==2?1:2))
John Bowlerac8375d2011-10-06 22:27:16 -05003143
John Bowler4e68aa72011-10-11 16:01:33 -05003144 /* Hence the pre-compiled masks indexed by PACKSWAP (or not), depth and
3145 * then pass:
3146 */
John Bowler7875d532011-11-07 22:33:49 -06003147 static PNG_CONST png_uint_32 row_mask[2/*PACKSWAP*/][3/*depth*/][6] =
3148 {
John Bowler4e68aa72011-10-11 16:01:33 -05003149 /* Little-endian byte masks for PACKSWAP */
3150 { S_MASKS(1,0), S_MASKS(2,0), S_MASKS(4,0) },
3151 /* Normal (big-endian byte) masks - PNG format */
3152 { S_MASKS(1,1), S_MASKS(2,1), S_MASKS(4,1) }
3153 };
John Bowlerac8375d2011-10-06 22:27:16 -05003154
John Bowler4e68aa72011-10-11 16:01:33 -05003155 /* display_mask has only three entries for the odd passes, so index by
3156 * pass>>1.
3157 */
John Bowler7875d532011-11-07 22:33:49 -06003158 static PNG_CONST png_uint_32 display_mask[2][3][3] =
3159 {
John Bowler4e68aa72011-10-11 16:01:33 -05003160 /* Little-endian byte masks for PACKSWAP */
3161 { B_MASKS(1,0), B_MASKS(2,0), B_MASKS(4,0) },
3162 /* Normal (big-endian byte) masks - PNG format */
3163 { B_MASKS(1,1), B_MASKS(2,1), B_MASKS(4,1) }
3164 };
John Bowlerac8375d2011-10-06 22:27:16 -05003165
John Bowler4e68aa72011-10-11 16:01:33 -05003166# define MASK(pass,depth,display,png)\
3167 ((display)?display_mask[png][DEPTH_INDEX(depth)][pass>>1]:\
3168 row_mask[png][DEPTH_INDEX(depth)][pass])
John Bowlerac8375d2011-10-06 22:27:16 -05003169
John Bowler4e68aa72011-10-11 16:01:33 -05003170#else /* !PNG_USE_COMPILE_TIME_MASKS */
3171 /* This is the runtime alternative: it seems unlikely that this will
3172 * ever be either smaller or faster than the compile time approach.
3173 */
3174# define MASK(pass,depth,display,png)\
3175 ((display)?B_MASK(pass,depth,png):S_MASK(pass,depth,png))
3176#endif /* !PNG_USE_COMPILE_TIME_MASKS */
John Bowlerac8375d2011-10-06 22:27:16 -05003177
John Bowler4e68aa72011-10-11 16:01:33 -05003178 /* Use the appropriate mask to copy the required bits. In some cases
3179 * the byte mask will be 0 or 0xff, optimize these cases. row_width is
3180 * the number of pixels, but the code copies bytes, so it is necessary
3181 * to special case the end.
3182 */
3183 png_uint_32 pixels_per_byte = 8 / pixel_depth;
3184 png_uint_32 mask;
John Bowlerac8375d2011-10-06 22:27:16 -05003185
John Bowler4e68aa72011-10-11 16:01:33 -05003186# ifdef PNG_READ_PACKSWAP_SUPPORTED
3187 if (png_ptr->transformations & PNG_PACKSWAP)
3188 mask = MASK(pass, pixel_depth, display, 0);
John Bowlerac8375d2011-10-06 22:27:16 -05003189
3190 else
John Bowler4e68aa72011-10-11 16:01:33 -05003191# endif
3192 mask = MASK(pass, pixel_depth, display, 1);
3193
3194 for (;;)
3195 {
3196 png_uint_32 m;
3197
3198 /* It doesn't matter in the following if png_uint_32 has more than
Glenn Randers-Pehrsonef02d562011-10-27 12:05:58 -05003199 * 32 bits because the high bits always match those in m<<24; it is,
John Bowler4e68aa72011-10-11 16:01:33 -05003200 * however, essential to use OR here, not +, because of this.
3201 */
3202 m = mask;
3203 mask = (m >> 8) | (m << 24); /* rotate right to good compilers */
3204 m &= 0xff;
3205
3206 if (m != 0) /* something to copy */
John Bowlerac8375d2011-10-06 22:27:16 -05003207 {
John Bowler4e68aa72011-10-11 16:01:33 -05003208 if (m != 0xff)
3209 *dp = (png_byte)((*dp & ~m) | (*sp & m));
3210 else
3211 *dp = *sp;
John Bowlerac8375d2011-10-06 22:27:16 -05003212 }
John Bowler4e68aa72011-10-11 16:01:33 -05003213
3214 /* NOTE: this may overwrite the last byte with garbage if the image
Glenn Randers-Pehrsonef02d562011-10-27 12:05:58 -05003215 * is not an exact number of bytes wide; libpng has always done
John Bowler4e68aa72011-10-11 16:01:33 -05003216 * this.
3217 */
3218 if (row_width <= pixels_per_byte)
John Bowlerfb5b3ac2011-10-16 22:52:56 -05003219 break; /* May need to restore part of the last byte */
John Bowler4e68aa72011-10-11 16:01:33 -05003220
3221 row_width -= pixels_per_byte;
3222 ++dp;
3223 ++sp;
3224 }
3225 }
3226
3227 else /* pixel_depth >= 8 */
3228 {
3229 unsigned int bytes_to_copy, bytes_to_jump;
3230
3231 /* Validate the depth - it must be a multiple of 8 */
3232 if (pixel_depth & 7)
3233 png_error(png_ptr, "invalid user transform pixel depth");
3234
3235 pixel_depth >>= 3; /* now in bytes */
3236 row_width *= pixel_depth;
3237
3238 /* Regardless of pass number the Adam 7 interlace always results in a
3239 * fixed number of pixels to copy then to skip. There may be a
3240 * different number of pixels to skip at the start though.
3241 */
3242 {
3243 unsigned int offset = PNG_PASS_START_COL(pass) * pixel_depth;
3244
3245 row_width -= offset;
3246 dp += offset;
3247 sp += offset;
John Bowlerac8375d2011-10-06 22:27:16 -05003248 }
3249
John Bowler4e68aa72011-10-11 16:01:33 -05003250 /* Work out the bytes to copy. */
3251 if (display)
3252 {
3253 /* When doing the 'block' algorithm the pixel in the pass gets
3254 * replicated to adjacent pixels. This is why the even (0,2,4,6)
3255 * passes are skipped above - the entire expanded row is copied.
3256 */
3257 bytes_to_copy = (1<<((6-pass)>>1)) * pixel_depth;
3258
3259 /* But don't allow this number to exceed the actual row width. */
3260 if (bytes_to_copy > row_width)
3261 bytes_to_copy = row_width;
3262 }
3263
3264 else /* normal row; Adam7 only ever gives us one pixel to copy. */
3265 bytes_to_copy = pixel_depth;
3266
3267 /* In Adam7 there is a constant offset between where the pixels go. */
3268 bytes_to_jump = PNG_PASS_COL_OFFSET(pass) * pixel_depth;
3269
3270 /* And simply copy these bytes. Some optimization is possible here,
Glenn Randers-Pehrsonef02d562011-10-27 12:05:58 -05003271 * depending on the value of 'bytes_to_copy'. Special case the low
John Bowler4e68aa72011-10-11 16:01:33 -05003272 * byte counts, which we know to be frequent.
John Bowlerfb5b3ac2011-10-16 22:52:56 -05003273 *
3274 * Notice that these cases all 'return' rather than 'break' - this
3275 * avoids an unnecessary test on whether to restore the last byte
3276 * below.
John Bowler4e68aa72011-10-11 16:01:33 -05003277 */
3278 switch (bytes_to_copy)
3279 {
3280 case 1:
3281 for (;;)
3282 {
3283 *dp = *sp;
3284
3285 if (row_width <= bytes_to_jump)
3286 return;
3287
3288 dp += bytes_to_jump;
3289 sp += bytes_to_jump;
3290 row_width -= bytes_to_jump;
3291 }
3292
3293 case 2:
Glenn Randers-Pehrsonef02d562011-10-27 12:05:58 -05003294 /* There is a possibility of a partial copy at the end here; this
John Bowler4e68aa72011-10-11 16:01:33 -05003295 * slows the code down somewhat.
3296 */
3297 do
3298 {
3299 dp[0] = sp[0], dp[1] = sp[1];
3300
3301 if (row_width <= bytes_to_jump)
3302 return;
3303
3304 sp += bytes_to_jump;
3305 dp += bytes_to_jump;
3306 row_width -= bytes_to_jump;
3307 }
3308 while (row_width > 1);
3309
3310 /* And there can only be one byte left at this point: */
3311 *dp = *sp;
3312 return;
3313
3314 case 3:
3315 /* This can only be the RGB case, so each copy is exactly one
3316 * pixel and it is not necessary to check for a partial copy.
3317 */
3318 for(;;)
3319 {
3320 dp[0] = sp[0], dp[1] = sp[1], dp[2] = sp[2];
3321
3322 if (row_width <= bytes_to_jump)
3323 return;
3324
3325 sp += bytes_to_jump;
3326 dp += bytes_to_jump;
3327 row_width -= bytes_to_jump;
3328 }
3329
3330 default:
3331#if PNG_ALIGN_TYPE != PNG_ALIGN_NONE
Glenn Randers-Pehrsonef02d562011-10-27 12:05:58 -05003332 /* Check for double byte alignment and, if possible, use a
3333 * 16-bit copy. Don't attempt this for narrow images - ones that
John Bowler4e68aa72011-10-11 16:01:33 -05003334 * are less than an interlace panel wide. Don't attempt it for
Glenn Randers-Pehrsondbb7e192012-08-10 17:27:42 -05003335 * wide bytes_to_copy either - use the memcpy there.
John Bowler4e68aa72011-10-11 16:01:33 -05003336 */
Glenn Randers-Pehrsondbb7e192012-08-10 17:27:42 -05003337 if (bytes_to_copy < 16 /*else use memcpy*/ &&
John Bowler4e68aa72011-10-11 16:01:33 -05003338 png_isaligned(dp, png_uint_16) &&
3339 png_isaligned(sp, png_uint_16) &&
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05003340 bytes_to_copy % (sizeof (png_uint_16)) == 0 &&
3341 bytes_to_jump % (sizeof (png_uint_16)) == 0)
John Bowler4e68aa72011-10-11 16:01:33 -05003342 {
3343 /* Everything is aligned for png_uint_16 copies, but try for
3344 * png_uint_32 first.
3345 */
3346 if (png_isaligned(dp, png_uint_32) &&
3347 png_isaligned(sp, png_uint_32) &&
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05003348 bytes_to_copy % (sizeof (png_uint_32)) == 0 &&
3349 bytes_to_jump % (sizeof (png_uint_32)) == 0)
John Bowler4e68aa72011-10-11 16:01:33 -05003350 {
John Bowlerb4541692012-04-30 06:31:54 -05003351 png_uint_32p dp32 = png_aligncast(png_uint_32p,dp);
3352 png_const_uint_32p sp32 = png_aligncastconst(
3353 png_const_uint_32p, sp);
John Bowler4e68aa72011-10-11 16:01:33 -05003354 unsigned int skip = (bytes_to_jump-bytes_to_copy) /
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05003355 (sizeof (png_uint_32));
John Bowler4e68aa72011-10-11 16:01:33 -05003356
3357 do
3358 {
3359 size_t c = bytes_to_copy;
3360 do
3361 {
3362 *dp32++ = *sp32++;
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05003363 c -= (sizeof (png_uint_32));
John Bowler4e68aa72011-10-11 16:01:33 -05003364 }
3365 while (c > 0);
3366
3367 if (row_width <= bytes_to_jump)
3368 return;
3369
3370 dp32 += skip;
3371 sp32 += skip;
3372 row_width -= bytes_to_jump;
3373 }
3374 while (bytes_to_copy <= row_width);
3375
3376 /* Get to here when the row_width truncates the final copy.
3377 * There will be 1-3 bytes left to copy, so don't try the
Glenn Randers-Pehrsonef02d562011-10-27 12:05:58 -05003378 * 16-bit loop below.
John Bowler4e68aa72011-10-11 16:01:33 -05003379 */
3380 dp = (png_bytep)dp32;
3381 sp = (png_const_bytep)sp32;
3382 do
3383 *dp++ = *sp++;
3384 while (--row_width > 0);
3385 return;
3386 }
3387
Glenn Randers-Pehrsonef02d562011-10-27 12:05:58 -05003388 /* Else do it in 16-bit quantities, but only if the size is
John Bowler4e68aa72011-10-11 16:01:33 -05003389 * not too large.
3390 */
3391 else
3392 {
John Bowlerb4541692012-04-30 06:31:54 -05003393 png_uint_16p dp16 = png_aligncast(png_uint_16p, dp);
3394 png_const_uint_16p sp16 = png_aligncastconst(
3395 png_const_uint_16p, sp);
John Bowler4e68aa72011-10-11 16:01:33 -05003396 unsigned int skip = (bytes_to_jump-bytes_to_copy) /
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05003397 (sizeof (png_uint_16));
John Bowler4e68aa72011-10-11 16:01:33 -05003398
3399 do
3400 {
3401 size_t c = bytes_to_copy;
3402 do
3403 {
3404 *dp16++ = *sp16++;
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05003405 c -= (sizeof (png_uint_16));
John Bowler4e68aa72011-10-11 16:01:33 -05003406 }
3407 while (c > 0);
3408
3409 if (row_width <= bytes_to_jump)
3410 return;
3411
3412 dp16 += skip;
3413 sp16 += skip;
3414 row_width -= bytes_to_jump;
3415 }
3416 while (bytes_to_copy <= row_width);
3417
Glenn Randers-Pehrsonef02d562011-10-27 12:05:58 -05003418 /* End of row - 1 byte left, bytes_to_copy > row_width: */
John Bowler4e68aa72011-10-11 16:01:33 -05003419 dp = (png_bytep)dp16;
3420 sp = (png_const_bytep)sp16;
3421 do
3422 *dp++ = *sp++;
3423 while (--row_width > 0);
3424 return;
3425 }
3426 }
3427#endif /* PNG_ALIGN_ code */
3428
Glenn Randers-Pehrsondbb7e192012-08-10 17:27:42 -05003429 /* The true default - use a memcpy: */
John Bowler4e68aa72011-10-11 16:01:33 -05003430 for (;;)
3431 {
Glenn Randers-Pehrsondbb7e192012-08-10 17:27:42 -05003432 memcpy(dp, sp, bytes_to_copy);
John Bowler4e68aa72011-10-11 16:01:33 -05003433
3434 if (row_width <= bytes_to_jump)
3435 return;
3436
3437 sp += bytes_to_jump;
3438 dp += bytes_to_jump;
3439 row_width -= bytes_to_jump;
3440 if (bytes_to_copy > row_width)
3441 bytes_to_copy = row_width;
3442 }
3443 }
John Bowlerfb5b3ac2011-10-16 22:52:56 -05003444
3445 /* NOT REACHED*/
John Bowler4e68aa72011-10-11 16:01:33 -05003446 } /* pixel_depth >= 8 */
3447
John Bowlerfb5b3ac2011-10-16 22:52:56 -05003448 /* Here if pixel_depth < 8 to check 'end_ptr' below. */
Guy Schalnat0d580581995-07-20 02:43:20 -05003449 }
John Bowler4e68aa72011-10-11 16:01:33 -05003450 else
John Bowlerac8375d2011-10-06 22:27:16 -05003451#endif
3452
Glenn Randers-Pehrsondbb7e192012-08-10 17:27:42 -05003453 /* If here then the switch above wasn't used so just memcpy the whole row
John Bowler4e68aa72011-10-11 16:01:33 -05003454 * from the temporary row buffer (notice that this overwrites the end of the
3455 * destination row if it is a partial byte.)
John Bowlerac8375d2011-10-06 22:27:16 -05003456 */
Glenn Randers-Pehrsondbb7e192012-08-10 17:27:42 -05003457 memcpy(dp, sp, PNG_ROWBYTES(pixel_depth, row_width));
John Bowlerfb5b3ac2011-10-16 22:52:56 -05003458
3459 /* Restore the overwritten bits from the last byte if necessary. */
3460 if (end_ptr != NULL)
3461 *end_ptr = (png_byte)((end_byte & end_mask) | (*end_ptr & ~end_mask));
Guy Schalnat0d580581995-07-20 02:43:20 -05003462}
3463
Glenn Randers-Pehrson231e6872001-01-12 15:13:06 -06003464#ifdef PNG_READ_INTERLACING_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05003465void /* PRIVATE */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05003466png_do_read_interlace(png_row_infop row_info, png_bytep row, int pass,
3467 png_uint_32 transformations /* Because these may affect the byte layout */)
Guy Schalnat0d580581995-07-20 02:43:20 -05003468{
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05003469 /* Arrays to facilitate easy interlacing - use pass (0 - 6) as index */
3470 /* Offset to next interlace block */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05003471 static PNG_CONST int png_pass_inc[7] = {8, 8, 4, 4, 2, 2, 1};
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06003472
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05003473 png_debug(1, "in png_do_read_interlace");
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003474 if (row != NULL && row_info != NULL)
Guy Schalnat0d580581995-07-20 02:43:20 -05003475 {
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003476 png_uint_32 final_width;
3477
3478 final_width = row_info->width * png_pass_inc[pass];
Guy Schalnat0d580581995-07-20 02:43:20 -05003479
3480 switch (row_info->pixel_depth)
3481 {
3482 case 1:
3483 {
Glenn Randers-Pehrson1d963611998-05-02 12:52:25 -05003484 png_bytep sp = row + (png_size_t)((row_info->width - 1) >> 3);
3485 png_bytep dp = row + (png_size_t)((final_width - 1) >> 3);
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003486 int sshift, dshift;
3487 int s_start, s_end, s_inc;
3488 int jstop = png_pass_inc[pass];
3489 png_byte v;
Guy Schalnat0d580581995-07-20 02:43:20 -05003490 png_uint_32 i;
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003491 int j;
Guy Schalnat0d580581995-07-20 02:43:20 -05003492
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05003493#ifdef PNG_READ_PACKSWAP_SUPPORTED
Andreas Dilger47a0c421997-05-16 02:46:07 -05003494 if (transformations & PNG_PACKSWAP)
3495 {
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003496 sshift = (int)((row_info->width + 7) & 0x07);
3497 dshift = (int)((final_width + 7) & 0x07);
3498 s_start = 7;
3499 s_end = 0;
3500 s_inc = -1;
Andreas Dilger47a0c421997-05-16 02:46:07 -05003501 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003502
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003503 else
Andreas Dilger47a0c421997-05-16 02:46:07 -05003504#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05003505 {
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003506 sshift = 7 - (int)((row_info->width + 7) & 0x07);
3507 dshift = 7 - (int)((final_width + 7) & 0x07);
3508 s_start = 0;
3509 s_end = 7;
3510 s_inc = 1;
3511 }
Glenn Randers-Pehrson5dd2b8e2004-11-24 07:50:16 -06003512
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003513 for (i = 0; i < row_info->width; i++)
3514 {
3515 v = (png_byte)((*sp >> sshift) & 0x01);
3516 for (j = 0; j < jstop; j++)
Guy Schalnat0d580581995-07-20 02:43:20 -05003517 {
John Bowler8fb6c6a2012-01-25 07:47:44 -06003518 unsigned int tmp = *dp & (0x7f7f >> (7 - dshift));
3519 tmp |= v << dshift;
3520 *dp = (png_byte)(tmp & 0xff);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003521
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003522 if (dshift == s_end)
3523 {
3524 dshift = s_start;
3525 dp--;
3526 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003527
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003528 else
3529 dshift += s_inc;
3530 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003531
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003532 if (sshift == s_end)
3533 {
3534 sshift = s_start;
Guy Schalnat0d580581995-07-20 02:43:20 -05003535 sp--;
3536 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003537
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003538 else
3539 sshift += s_inc;
Guy Schalnat0d580581995-07-20 02:43:20 -05003540 }
3541 break;
3542 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003543
Guy Schalnat0d580581995-07-20 02:43:20 -05003544 case 2:
3545 {
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003546 png_bytep sp = row + (png_uint_32)((row_info->width - 1) >> 2);
3547 png_bytep dp = row + (png_uint_32)((final_width - 1) >> 2);
3548 int sshift, dshift;
3549 int s_start, s_end, s_inc;
3550 int jstop = png_pass_inc[pass];
Andreas Dilger47a0c421997-05-16 02:46:07 -05003551 png_uint_32 i;
Guy Schalnat0d580581995-07-20 02:43:20 -05003552
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05003553#ifdef PNG_READ_PACKSWAP_SUPPORTED
Andreas Dilger47a0c421997-05-16 02:46:07 -05003554 if (transformations & PNG_PACKSWAP)
3555 {
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003556 sshift = (int)(((row_info->width + 3) & 0x03) << 1);
3557 dshift = (int)(((final_width + 3) & 0x03) << 1);
3558 s_start = 6;
3559 s_end = 0;
3560 s_inc = -2;
Andreas Dilger47a0c421997-05-16 02:46:07 -05003561 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003562
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003563 else
Andreas Dilger47a0c421997-05-16 02:46:07 -05003564#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05003565 {
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003566 sshift = (int)((3 - ((row_info->width + 3) & 0x03)) << 1);
3567 dshift = (int)((3 - ((final_width + 3) & 0x03)) << 1);
3568 s_start = 0;
3569 s_end = 6;
3570 s_inc = 2;
3571 }
Andreas Dilger47a0c421997-05-16 02:46:07 -05003572
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003573 for (i = 0; i < row_info->width; i++)
3574 {
3575 png_byte v;
3576 int j;
3577
3578 v = (png_byte)((*sp >> sshift) & 0x03);
3579 for (j = 0; j < jstop; j++)
Guy Schalnat0d580581995-07-20 02:43:20 -05003580 {
John Bowler8fb6c6a2012-01-25 07:47:44 -06003581 unsigned int tmp = *dp & (0x3f3f >> (6 - dshift));
3582 tmp |= v << dshift;
3583 *dp = (png_byte)(tmp & 0xff);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003584
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003585 if (dshift == s_end)
3586 {
3587 dshift = s_start;
3588 dp--;
3589 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003590
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003591 else
3592 dshift += s_inc;
3593 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003594
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003595 if (sshift == s_end)
3596 {
3597 sshift = s_start;
Guy Schalnat0d580581995-07-20 02:43:20 -05003598 sp--;
3599 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003600
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003601 else
3602 sshift += s_inc;
Guy Schalnat0d580581995-07-20 02:43:20 -05003603 }
3604 break;
3605 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003606
Guy Schalnat0d580581995-07-20 02:43:20 -05003607 case 4:
3608 {
Glenn Randers-Pehrson1d963611998-05-02 12:52:25 -05003609 png_bytep sp = row + (png_size_t)((row_info->width - 1) >> 1);
3610 png_bytep dp = row + (png_size_t)((final_width - 1) >> 1);
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003611 int sshift, dshift;
3612 int s_start, s_end, s_inc;
Guy Schalnat0d580581995-07-20 02:43:20 -05003613 png_uint_32 i;
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003614 int jstop = png_pass_inc[pass];
Guy Schalnat0d580581995-07-20 02:43:20 -05003615
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05003616#ifdef PNG_READ_PACKSWAP_SUPPORTED
Andreas Dilger47a0c421997-05-16 02:46:07 -05003617 if (transformations & PNG_PACKSWAP)
3618 {
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003619 sshift = (int)(((row_info->width + 1) & 0x01) << 2);
3620 dshift = (int)(((final_width + 1) & 0x01) << 2);
3621 s_start = 4;
3622 s_end = 0;
3623 s_inc = -4;
Andreas Dilger47a0c421997-05-16 02:46:07 -05003624 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003625
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003626 else
Andreas Dilger47a0c421997-05-16 02:46:07 -05003627#endif
3628 {
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003629 sshift = (int)((1 - ((row_info->width + 1) & 0x01)) << 2);
3630 dshift = (int)((1 - ((final_width + 1) & 0x01)) << 2);
3631 s_start = 0;
3632 s_end = 4;
3633 s_inc = 4;
3634 }
Andreas Dilger47a0c421997-05-16 02:46:07 -05003635
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003636 for (i = 0; i < row_info->width; i++)
3637 {
Glenn Randers-Pehrson8db19982011-10-27 16:17:24 -05003638 png_byte v = (png_byte)((*sp >> sshift) & 0x0f);
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003639 int j;
Andreas Dilger47a0c421997-05-16 02:46:07 -05003640
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003641 for (j = 0; j < jstop; j++)
Guy Schalnat0d580581995-07-20 02:43:20 -05003642 {
John Bowler8fb6c6a2012-01-25 07:47:44 -06003643 unsigned int tmp = *dp & (0xf0f >> (4 - dshift));
3644 tmp |= v << dshift;
3645 *dp = (png_byte)(tmp & 0xff);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003646
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003647 if (dshift == s_end)
3648 {
3649 dshift = s_start;
3650 dp--;
3651 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003652
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003653 else
3654 dshift += s_inc;
3655 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003656
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003657 if (sshift == s_end)
3658 {
3659 sshift = s_start;
Guy Schalnat0d580581995-07-20 02:43:20 -05003660 sp--;
3661 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003662
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003663 else
3664 sshift += s_inc;
Guy Schalnat0d580581995-07-20 02:43:20 -05003665 }
3666 break;
3667 }
John Bowlerac8375d2011-10-06 22:27:16 -05003668
Guy Schalnat0d580581995-07-20 02:43:20 -05003669 default:
3670 {
Glenn Randers-Pehrson1d963611998-05-02 12:52:25 -05003671 png_size_t pixel_bytes = (row_info->pixel_depth >> 3);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003672
Glenn Randers-Pehrsone3f3c4e2010-02-07 18:08:50 -06003673 png_bytep sp = row + (png_size_t)(row_info->width - 1)
3674 * pixel_bytes;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003675
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003676 png_bytep dp = row + (png_size_t)(final_width - 1) * pixel_bytes;
Guy Schalnat0d580581995-07-20 02:43:20 -05003677
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003678 int jstop = png_pass_inc[pass];
3679 png_uint_32 i;
3680
3681 for (i = 0; i < row_info->width; i++)
Guy Schalnat0d580581995-07-20 02:43:20 -05003682 {
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003683 png_byte v[8];
3684 int j;
3685
Glenn Randers-Pehrsondbb7e192012-08-10 17:27:42 -05003686 memcpy(v, sp, pixel_bytes);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003687
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003688 for (j = 0; j < jstop; j++)
3689 {
Glenn Randers-Pehrsondbb7e192012-08-10 17:27:42 -05003690 memcpy(dp, v, pixel_bytes);
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003691 dp -= pixel_bytes;
3692 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003693
Glenn Randers-Pehrsonc3dda6d2004-11-27 18:22:29 -06003694 sp -= pixel_bytes;
Guy Schalnat0d580581995-07-20 02:43:20 -05003695 }
3696 break;
3697 }
3698 }
John Bowlerac8375d2011-10-06 22:27:16 -05003699
Guy Schalnat0d580581995-07-20 02:43:20 -05003700 row_info->width = final_width;
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05003701 row_info->rowbytes = PNG_ROWBYTES(row_info->pixel_depth, final_width);
Guy Schalnat0d580581995-07-20 02:43:20 -05003702 }
Glenn Randers-Pehrsonb2aca212009-09-23 11:32:37 -05003703#ifndef PNG_READ_PACKSWAP_SUPPORTED
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003704 PNG_UNUSED(transformations) /* Silence compiler warning */
Glenn Randers-Pehrson104622b2000-05-29 08:58:03 -05003705#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05003706}
Glenn Randers-Pehrson231e6872001-01-12 15:13:06 -06003707#endif /* PNG_READ_INTERLACING_SUPPORTED */
Guy Schalnat0d580581995-07-20 02:43:20 -05003708
Mans Rullgardd3a94802011-11-03 00:47:55 -05003709static void
3710png_read_filter_row_sub(png_row_infop row_info, png_bytep row,
3711 png_const_bytep prev_row)
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05003712{
Mans Rullgardd3a94802011-11-03 00:47:55 -05003713 png_size_t i;
3714 png_size_t istop = row_info->rowbytes;
3715 unsigned int bpp = (row_info->pixel_depth + 7) >> 3;
3716 png_bytep rp = row + bpp;
Mans Rullgardd3a94802011-11-03 00:47:55 -05003717
3718 PNG_UNUSED(prev_row)
3719
3720 for (i = bpp; i < istop; i++)
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05003721 {
John Bowler7875d532011-11-07 22:33:49 -06003722 *rp = (png_byte)(((int)(*rp) + (int)(*(rp-bpp))) & 0xff);
Mans Rullgardd3a94802011-11-03 00:47:55 -05003723 rp++;
3724 }
3725}
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003726
Mans Rullgardd3a94802011-11-03 00:47:55 -05003727static void
3728png_read_filter_row_up(png_row_infop row_info, png_bytep row,
3729 png_const_bytep prev_row)
3730{
3731 png_size_t i;
3732 png_size_t istop = row_info->rowbytes;
3733 png_bytep rp = row;
3734 png_const_bytep pp = prev_row;
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05003735
Mans Rullgardd3a94802011-11-03 00:47:55 -05003736 for (i = 0; i < istop; i++)
3737 {
3738 *rp = (png_byte)(((int)(*rp) + (int)(*pp++)) & 0xff);
3739 rp++;
3740 }
3741}
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05003742
Mans Rullgardd3a94802011-11-03 00:47:55 -05003743static void
3744png_read_filter_row_avg(png_row_infop row_info, png_bytep row,
3745 png_const_bytep prev_row)
3746{
3747 png_size_t i;
3748 png_bytep rp = row;
3749 png_const_bytep pp = prev_row;
Mans Rullgardd3a94802011-11-03 00:47:55 -05003750 unsigned int bpp = (row_info->pixel_depth + 7) >> 3;
3751 png_size_t istop = row_info->rowbytes - bpp;
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05003752
Mans Rullgardd3a94802011-11-03 00:47:55 -05003753 for (i = 0; i < bpp; i++)
3754 {
3755 *rp = (png_byte)(((int)(*rp) +
3756 ((int)(*pp++) / 2 )) & 0xff);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003757
Mans Rullgardd3a94802011-11-03 00:47:55 -05003758 rp++;
3759 }
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -06003760
Mans Rullgardd3a94802011-11-03 00:47:55 -05003761 for (i = 0; i < istop; i++)
3762 {
3763 *rp = (png_byte)(((int)(*rp) +
John Bowler7875d532011-11-07 22:33:49 -06003764 (int)(*pp++ + *(rp-bpp)) / 2 ) & 0xff);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003765
Mans Rullgardd3a94802011-11-03 00:47:55 -05003766 rp++;
3767 }
3768}
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05003769
Mans Rullgardd3a94802011-11-03 00:47:55 -05003770static void
John Bowlerfcc02632011-11-03 18:31:00 -05003771png_read_filter_row_paeth_1byte_pixel(png_row_infop row_info, png_bytep row,
Mans Rullgardd3a94802011-11-03 00:47:55 -05003772 png_const_bytep prev_row)
3773{
John Bowlerfcc02632011-11-03 18:31:00 -05003774 png_bytep rp_end = row + row_info->rowbytes;
3775 int a, c;
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05003776
John Bowlerfcc02632011-11-03 18:31:00 -05003777 /* First pixel/byte */
3778 c = *prev_row++;
3779 a = *row + c;
3780 *row++ = (png_byte)a;
3781
3782 /* Remainder */
3783 while (row < rp_end)
Mans Rullgardd3a94802011-11-03 00:47:55 -05003784 {
John Bowlerfcc02632011-11-03 18:31:00 -05003785 int b, pa, pb, pc, p;
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05003786
John Bowlerfcc02632011-11-03 18:31:00 -05003787 a &= 0xff; /* From previous iteration or start */
3788 b = *prev_row++;
Mans Rullgardd3a94802011-11-03 00:47:55 -05003789
3790 p = b - c;
3791 pc = a - c;
Glenn Randers-Pehrson1d963611998-05-02 12:52:25 -05003792
John Bowlerfcc02632011-11-03 18:31:00 -05003793# ifdef PNG_USE_ABS
3794 pa = abs(p);
3795 pb = abs(pc);
3796 pc = abs(p + pc);
3797# else
3798 pa = p < 0 ? -p : p;
3799 pb = pc < 0 ? -pc : pc;
3800 pc = (p + pc) < 0 ? -(p + pc) : p + pc;
3801# endif
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05003802
John Bowlerfcc02632011-11-03 18:31:00 -05003803 /* Find the best predictor, the least of pa, pb, pc favoring the earlier
3804 * ones in the case of a tie.
3805 */
3806 if (pb < pa) pa = pb, a = b;
3807 if (pc < pa) a = c;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003808
John Bowlerfcc02632011-11-03 18:31:00 -05003809 /* Calculate the current pixel in a, and move the previous row pixel to c
3810 * for the next time round the loop
3811 */
3812 c = b;
3813 a += *row;
3814 *row++ = (png_byte)a;
3815 }
3816}
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06003817
John Bowlerfcc02632011-11-03 18:31:00 -05003818static void
3819png_read_filter_row_paeth_multibyte_pixel(png_row_infop row_info, png_bytep row,
3820 png_const_bytep prev_row)
3821{
3822 int bpp = (row_info->pixel_depth + 7) >> 3;
3823 png_bytep rp_end = row + bpp;
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05003824
John Bowlerfcc02632011-11-03 18:31:00 -05003825 /* Process the first pixel in the row completely (this is the same as 'up'
3826 * because there is only one candidate predictor for the first row).
3827 */
3828 while (row < rp_end)
3829 {
3830 int a = *row + *prev_row++;
3831 *row++ = (png_byte)a;
3832 }
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05003833
John Bowlerfcc02632011-11-03 18:31:00 -05003834 /* Remainder */
3835 rp_end += row_info->rowbytes - bpp;
3836
3837 while (row < rp_end)
3838 {
3839 int a, b, c, pa, pb, pc, p;
3840
3841 c = *(prev_row - bpp);
3842 a = *(row - bpp);
3843 b = *prev_row++;
3844
3845 p = b - c;
3846 pc = a - c;
3847
3848# ifdef PNG_USE_ABS
3849 pa = abs(p);
3850 pb = abs(pc);
3851 pc = abs(p + pc);
3852# else
3853 pa = p < 0 ? -p : p;
3854 pb = pc < 0 ? -pc : pc;
3855 pc = (p + pc) < 0 ? -(p + pc) : p + pc;
3856# endif
3857
3858 if (pb < pa) pa = pb, a = b;
3859 if (pc < pa) a = c;
3860
3861 c = b;
3862 a += *row;
3863 *row++ = (png_byte)a;
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05003864 }
3865}
Guy Schalnat0d580581995-07-20 02:43:20 -05003866
Mans Rullgardd3a94802011-11-03 00:47:55 -05003867#ifdef PNG_ARM_NEON
Mans Rullgarde7acc6a2011-11-16 13:48:18 -06003868
3869#ifdef __linux__
3870#include <stdio.h>
3871#include <elf.h>
3872#include <asm/hwcap.h>
3873
3874static int png_have_hwcap(unsigned cap)
3875{
3876 FILE *f = fopen("/proc/self/auxv", "r");
3877 Elf32_auxv_t aux;
3878 int have_cap = 0;
3879
3880 if (!f)
3881 return 0;
3882
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05003883 while (fread(&aux, (sizeof aux), 1, f) > 0)
Mans Rullgarde7acc6a2011-11-16 13:48:18 -06003884 {
3885 if (aux.a_type == AT_HWCAP &&
3886 aux.a_un.a_val & cap)
3887 {
3888 have_cap = 1;
3889 break;
3890 }
3891 }
3892
3893 fclose(f);
3894
3895 return have_cap;
3896}
3897#endif /* __linux__ */
3898
Mans Rullgardd3a94802011-11-03 00:47:55 -05003899static void
John Bowler5d567862011-12-24 09:12:00 -06003900png_init_filter_functions_neon(png_structrp pp, unsigned int bpp)
Mans Rullgardd3a94802011-11-03 00:47:55 -05003901{
Mans Rullgarde7acc6a2011-11-16 13:48:18 -06003902#ifdef __linux__
3903 if (!png_have_hwcap(HWCAP_NEON))
3904 return;
3905#endif
3906
Mans Rullgardd3a94802011-11-03 00:47:55 -05003907 pp->read_filter[PNG_FILTER_VALUE_UP-1] = png_read_filter_row_up_neon;
3908
Mans Rullgarde7acc6a2011-11-16 13:48:18 -06003909 if (bpp == 3)
3910 {
Mans Rullgardd3a94802011-11-03 00:47:55 -05003911 pp->read_filter[PNG_FILTER_VALUE_SUB-1] = png_read_filter_row_sub3_neon;
3912 pp->read_filter[PNG_FILTER_VALUE_AVG-1] = png_read_filter_row_avg3_neon;
John Bowler6f237b62012-03-02 13:13:15 -06003913 pp->read_filter[PNG_FILTER_VALUE_PAETH-1] =
Mans Rullgarde7acc6a2011-11-16 13:48:18 -06003914 png_read_filter_row_paeth3_neon;
3915 }
3916
3917 else if (bpp == 4)
3918 {
Mans Rullgardd3a94802011-11-03 00:47:55 -05003919 pp->read_filter[PNG_FILTER_VALUE_SUB-1] = png_read_filter_row_sub4_neon;
3920 pp->read_filter[PNG_FILTER_VALUE_AVG-1] = png_read_filter_row_avg4_neon;
Mans Rullgarde7acc6a2011-11-16 13:48:18 -06003921 pp->read_filter[PNG_FILTER_VALUE_PAETH-1] =
3922 png_read_filter_row_paeth4_neon;
Mans Rullgardd3a94802011-11-03 00:47:55 -05003923 }
3924}
Mans Rullgarde7acc6a2011-11-16 13:48:18 -06003925#endif /* PNG_ARM_NEON */
Mans Rullgardd3a94802011-11-03 00:47:55 -05003926
3927static void
John Bowler5d567862011-12-24 09:12:00 -06003928png_init_filter_functions(png_structrp pp)
Mans Rullgardd3a94802011-11-03 00:47:55 -05003929{
John Bowlerfcc02632011-11-03 18:31:00 -05003930 unsigned int bpp = (pp->pixel_depth + 7) >> 3;
3931
Mans Rullgardd3a94802011-11-03 00:47:55 -05003932 pp->read_filter[PNG_FILTER_VALUE_SUB-1] = png_read_filter_row_sub;
3933 pp->read_filter[PNG_FILTER_VALUE_UP-1] = png_read_filter_row_up;
3934 pp->read_filter[PNG_FILTER_VALUE_AVG-1] = png_read_filter_row_avg;
John Bowlerfcc02632011-11-03 18:31:00 -05003935 if (bpp == 1)
3936 pp->read_filter[PNG_FILTER_VALUE_PAETH-1] =
3937 png_read_filter_row_paeth_1byte_pixel;
3938 else
3939 pp->read_filter[PNG_FILTER_VALUE_PAETH-1] =
3940 png_read_filter_row_paeth_multibyte_pixel;
Mans Rullgardd3a94802011-11-03 00:47:55 -05003941
3942#ifdef PNG_ARM_NEON
John Bowlerfcc02632011-11-03 18:31:00 -05003943 png_init_filter_functions_neon(pp, bpp);
Mans Rullgardd3a94802011-11-03 00:47:55 -05003944#endif
3945}
3946
3947void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06003948png_read_filter_row(png_structrp pp, png_row_infop row_info, png_bytep row,
Mans Rullgardd3a94802011-11-03 00:47:55 -05003949 png_const_bytep prev_row, int filter)
3950{
3951 if (pp->read_filter[0] == NULL)
3952 png_init_filter_functions(pp);
3953 if (filter > PNG_FILTER_VALUE_NONE && filter < PNG_FILTER_VALUE_LAST)
3954 pp->read_filter[filter-1](row_info, row, prev_row);
3955}
3956
Glenn Randers-Pehrsondbd40142009-08-31 08:42:02 -05003957#ifdef PNG_SEQUENTIAL_READ_SUPPORTED
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05003958void /* PRIVATE */
John Bowlerb5d00512012-03-09 09:15:18 -06003959png_read_IDAT_data(png_structrp png_ptr, png_bytep output,
3960 png_alloc_size_t avail_out)
3961{
3962 /* Loop reading IDATs and decompressing the result into output[avail_out] */
3963 png_ptr->zstream.next_out = output;
3964 png_ptr->zstream.avail_out = 0; /* safety: set below */
3965
3966 if (output == NULL)
3967 avail_out = 0;
3968
3969 do
3970 {
3971 int ret;
3972 png_byte tmpbuf[PNG_INFLATE_BUF_SIZE];
3973
3974 if (png_ptr->zstream.avail_in == 0)
3975 {
3976 uInt avail_in;
3977 png_bytep buffer;
3978
3979 while (png_ptr->idat_size == 0)
3980 {
3981 png_crc_finish(png_ptr, 0);
3982
3983 png_ptr->idat_size = png_read_chunk_header(png_ptr);
3984 /* This is an error even in the 'check' case because the code just
3985 * consumed a non-IDAT header.
3986 */
3987 if (png_ptr->chunk_name != png_IDAT)
3988 png_error(png_ptr, "Not enough image data");
3989 }
3990
3991 avail_in = png_ptr->IDAT_read_size;
3992
3993 if (avail_in > png_ptr->idat_size)
3994 avail_in = (uInt)png_ptr->idat_size;
3995
3996 /* A PNG with a gradually increasing IDAT size will defeat this attempt
3997 * to minimize memory usage by causing lots of re-allocs, but
3998 * realistically doing IDAT_read_size re-allocs is not likely to be a
3999 * big problem.
4000 */
4001 buffer = png_read_buffer(png_ptr, avail_in, 0/*error*/);
4002
4003 png_crc_read(png_ptr, buffer, avail_in);
4004 png_ptr->idat_size -= avail_in;
4005
4006 png_ptr->zstream.next_in = buffer;
4007 png_ptr->zstream.avail_in = avail_in;
4008 }
4009
4010 /* And set up the output side. */
4011 if (output != NULL) /* standard read */
4012 {
4013 uInt out = ZLIB_IO_MAX;
4014
4015 if (out > avail_out)
4016 out = (uInt)avail_out;
4017
4018 avail_out -= out;
4019 png_ptr->zstream.avail_out = out;
4020 }
4021
4022 else /* check for end */
4023 {
4024 png_ptr->zstream.next_out = tmpbuf;
Glenn Randers-Pehrson432c1742012-08-09 20:14:48 -05004025 png_ptr->zstream.avail_out = (sizeof tmpbuf);
John Bowlerb5d00512012-03-09 09:15:18 -06004026 }
4027
4028 /* Use NO_FLUSH; this gives zlib the maximum opportunity to optimize the
John Bowler90669192012-03-09 22:03:13 -06004029 * process. If the LZ stream is truncated the sequential reader will
4030 * terminally damage the stream, above, by reading the chunk header of the
4031 * following chunk (it then exits with png_error).
4032 *
4033 * TODO: deal more elegantly with truncated IDAT lists.
John Bowlerb5d00512012-03-09 09:15:18 -06004034 */
4035 ret = inflate(&png_ptr->zstream, Z_NO_FLUSH);
4036
4037 /* Take the unconsumed output back (so, in the 'check' case this just
4038 * counts up).
4039 */
4040 avail_out += png_ptr->zstream.avail_out;
4041 png_ptr->zstream.avail_out = 0;
4042
4043 if (ret == Z_STREAM_END)
4044 {
4045 /* Do this for safety; we won't read any more into this row. */
4046 png_ptr->zstream.next_out = NULL;
4047
4048 png_ptr->mode |= PNG_AFTER_IDAT;
4049 png_ptr->flags |= PNG_FLAG_ZSTREAM_ENDED;
4050
4051 if (png_ptr->zstream.avail_in > 0 || png_ptr->idat_size > 0)
4052 png_chunk_benign_error(png_ptr, "Extra compressed data");
4053 break;
4054 }
4055
4056 if (ret != Z_OK)
4057 {
4058 png_zstream_error(png_ptr, ret);
4059
4060 if (output != NULL)
4061 png_chunk_error(png_ptr, png_ptr->zstream.msg);
4062
4063 else /* checking */
4064 {
4065 png_chunk_benign_error(png_ptr, png_ptr->zstream.msg);
4066 return;
4067 }
4068 }
4069 } while (avail_out > 0);
4070
4071 if (avail_out > 0)
4072 {
4073 /* The stream ended before the image; this is the same as too few IDATs so
4074 * should be handled the same way.
4075 */
4076 if (output != NULL)
4077 png_error(png_ptr, "Not enough image data");
4078
4079 else /* checking */
4080 png_chunk_benign_error(png_ptr, "Too much image data");
4081 }
4082}
4083
4084void /* PRIVATE */
4085png_read_finish_IDAT(png_structrp png_ptr)
4086{
4087 /* We don't need any more data and the stream should have ended, however the
4088 * LZ end code may actually not have been processed. In this case we must
4089 * read it otherwise stray unread IDAT data or, more likely, an IDAT chunk
4090 * may still remain to be consumed.
4091 */
4092 if (!(png_ptr->flags & PNG_FLAG_ZSTREAM_ENDED))
4093 {
4094 /* The NULL causes png_read_IDAT_data to swallow any remaining bytes in
4095 * the compressed stream, but the stream may be damaged too, so even after
4096 * this call we may need to terminate the zstream ownership.
4097 */
4098 png_read_IDAT_data(png_ptr, NULL, 0);
4099 png_ptr->zstream.next_out = NULL; /* safety */
4100
4101 /* Now clear everything out for safety; the following may not have been
4102 * done.
4103 */
4104 if (!(png_ptr->flags & PNG_FLAG_ZSTREAM_ENDED))
4105 {
4106 png_ptr->mode |= PNG_AFTER_IDAT;
4107 png_ptr->flags |= PNG_FLAG_ZSTREAM_ENDED;
4108 }
4109 }
4110
4111 /* If the zstream has not been released do it now *and* terminate the reading
4112 * of the final IDAT chunk.
4113 */
4114 if (png_ptr->zowner == png_IDAT)
4115 {
4116 /* Always do this; the pointers otherwise point into the read buffer. */
4117 png_ptr->zstream.next_in = NULL;
4118 png_ptr->zstream.avail_in = 0;
4119
4120 /* Now we no longer own the zstream. */
4121 png_ptr->zowner = 0;
4122
4123 /* The slightly weird semantics of the sequential IDAT reading is that we
4124 * are always in or at the end of an IDAT chunk, so we always need to do a
4125 * crc_finish here. If idat_size is non-zero we also need to read the
4126 * spurious bytes at the end of the chunk now.
4127 */
4128 (void)png_crc_finish(png_ptr, png_ptr->idat_size);
4129 }
4130}
4131
4132void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06004133png_read_finish_row(png_structrp png_ptr)
Guy Schalnat0d580581995-07-20 02:43:20 -05004134{
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05004135#ifdef PNG_READ_INTERLACING_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05004136 /* Arrays to facilitate easy interlacing - use pass (0 - 6) as index */
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06004137
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05004138 /* Start of interlace block */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05004139 static PNG_CONST png_byte png_pass_start[7] = {0, 4, 0, 2, 0, 1, 0};
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06004140
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05004141 /* Offset to next interlace block */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05004142 static PNG_CONST png_byte png_pass_inc[7] = {8, 8, 4, 4, 2, 2, 1};
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06004143
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05004144 /* Start of interlace block in the y direction */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05004145 static PNG_CONST png_byte png_pass_ystart[7] = {0, 0, 4, 0, 2, 0, 1};
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06004146
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05004147 /* Offset to next interlace block in the y direction */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05004148 static PNG_CONST png_byte png_pass_yinc[7] = {8, 8, 8, 4, 4, 2, 2};
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05004149#endif /* PNG_READ_INTERLACING_SUPPORTED */
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06004150
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05004151 png_debug(1, "in png_read_finish_row");
Guy Schalnat0d580581995-07-20 02:43:20 -05004152 png_ptr->row_number++;
4153 if (png_ptr->row_number < png_ptr->num_rows)
4154 return;
4155
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05004156#ifdef PNG_READ_INTERLACING_SUPPORTED
Guy Schalnat0d580581995-07-20 02:43:20 -05004157 if (png_ptr->interlaced)
4158 {
4159 png_ptr->row_number = 0;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004160
Glenn Randers-Pehrson435cf872011-10-05 16:23:53 -05004161 /* TO DO: don't do this if prev_row isn't needed (requires
4162 * read-ahead of the next row's filter byte.
4163 */
Glenn Randers-Pehrsondbb7e192012-08-10 17:27:42 -05004164 memset(png_ptr->prev_row, 0, png_ptr->rowbytes + 1);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004165
Guy Schalnat0d580581995-07-20 02:43:20 -05004166 do
4167 {
4168 png_ptr->pass++;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004169
Guy Schalnat0d580581995-07-20 02:43:20 -05004170 if (png_ptr->pass >= 7)
4171 break;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004172
Guy Schalnat0d580581995-07-20 02:43:20 -05004173 png_ptr->iwidth = (png_ptr->width +
4174 png_pass_inc[png_ptr->pass] - 1 -
4175 png_pass_start[png_ptr->pass]) /
4176 png_pass_inc[png_ptr->pass];
Glenn Randers-Pehrson272489d2004-08-04 06:34:52 -05004177
Guy Schalnat0d580581995-07-20 02:43:20 -05004178 if (!(png_ptr->transformations & PNG_INTERLACE))
4179 {
4180 png_ptr->num_rows = (png_ptr->height +
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004181 png_pass_yinc[png_ptr->pass] - 1 -
4182 png_pass_ystart[png_ptr->pass]) /
4183 png_pass_yinc[png_ptr->pass];
Guy Schalnat0d580581995-07-20 02:43:20 -05004184 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004185
Glenn Randers-Pehrson345bc271998-06-14 14:43:31 -05004186 else /* if (png_ptr->transformations & PNG_INTERLACE) */
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004187 break; /* libpng deinterlacing sees every row */
4188
4189 } while (png_ptr->num_rows == 0 || png_ptr->iwidth == 0);
Guy Schalnat0d580581995-07-20 02:43:20 -05004190
4191 if (png_ptr->pass < 7)
4192 return;
4193 }
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05004194#endif /* PNG_READ_INTERLACING_SUPPORTED */
Guy Schalnat0d580581995-07-20 02:43:20 -05004195
John Bowler42a2b552012-03-05 20:57:40 -06004196 /* Here after at the end of the last row of the last pass. */
John Bowlerb5d00512012-03-09 09:15:18 -06004197 png_read_finish_IDAT(png_ptr);
Guy Schalnat0d580581995-07-20 02:43:20 -05004198}
Glenn Randers-Pehrsondbd40142009-08-31 08:42:02 -05004199#endif /* PNG_SEQUENTIAL_READ_SUPPORTED */
Guy Schalnat0d580581995-07-20 02:43:20 -05004200
Glenn Randers-Pehrson75294572000-05-06 14:09:57 -05004201void /* PRIVATE */
John Bowler5d567862011-12-24 09:12:00 -06004202png_read_start_row(png_structrp png_ptr)
Guy Schalnat0d580581995-07-20 02:43:20 -05004203{
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05004204#ifdef PNG_READ_INTERLACING_SUPPORTED
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05004205 /* Arrays to facilitate easy interlacing - use pass (0 - 6) as index */
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06004206
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05004207 /* Start of interlace block */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05004208 static PNG_CONST png_byte png_pass_start[7] = {0, 4, 0, 2, 0, 1, 0};
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06004209
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05004210 /* Offset to next interlace block */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05004211 static PNG_CONST png_byte png_pass_inc[7] = {8, 8, 4, 4, 2, 2, 1};
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06004212
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05004213 /* Start of interlace block in the y direction */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05004214 static PNG_CONST png_byte png_pass_ystart[7] = {0, 0, 4, 0, 2, 0, 1};
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06004215
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05004216 /* Offset to next interlace block in the y direction */
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05004217 static PNG_CONST png_byte png_pass_yinc[7] = {8, 8, 8, 4, 4, 2, 2};
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05004218#endif
Glenn Randers-Pehrson166c5a31999-12-10 09:43:02 -06004219
Guy Schalnat0d580581995-07-20 02:43:20 -05004220 int max_pixel_depth;
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -05004221 png_size_t row_bytes;
Guy Schalnat0d580581995-07-20 02:43:20 -05004222
Glenn Randers-Pehrson51650b82008-08-05 07:44:42 -05004223 png_debug(1, "in png_read_start_row");
John Bowler42a2b552012-03-05 20:57:40 -06004224
John Bowler4a12f4a2011-04-17 18:34:22 -05004225#ifdef PNG_READ_TRANSFORMS_SUPPORTED
Guy Schalnat0d580581995-07-20 02:43:20 -05004226 png_init_read_transformations(png_ptr);
John Bowler4a12f4a2011-04-17 18:34:22 -05004227#endif
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05004228#ifdef PNG_READ_INTERLACING_SUPPORTED
Guy Schalnat0d580581995-07-20 02:43:20 -05004229 if (png_ptr->interlaced)
4230 {
4231 if (!(png_ptr->transformations & PNG_INTERLACE))
4232 png_ptr->num_rows = (png_ptr->height + png_pass_yinc[0] - 1 -
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004233 png_pass_ystart[0]) / png_pass_yinc[0];
4234
Guy Schalnat0d580581995-07-20 02:43:20 -05004235 else
4236 png_ptr->num_rows = png_ptr->height;
4237
4238 png_ptr->iwidth = (png_ptr->width +
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004239 png_pass_inc[png_ptr->pass] - 1 -
4240 png_pass_start[png_ptr->pass]) /
4241 png_pass_inc[png_ptr->pass];
Guy Schalnat0d580581995-07-20 02:43:20 -05004242 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004243
Guy Schalnat0d580581995-07-20 02:43:20 -05004244 else
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05004245#endif /* PNG_READ_INTERLACING_SUPPORTED */
Guy Schalnat0d580581995-07-20 02:43:20 -05004246 {
4247 png_ptr->num_rows = png_ptr->height;
4248 png_ptr->iwidth = png_ptr->width;
Guy Schalnat0d580581995-07-20 02:43:20 -05004249 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004250
Guy Schalnat0d580581995-07-20 02:43:20 -05004251 max_pixel_depth = png_ptr->pixel_depth;
4252
John Bowlere6fb6912011-11-08 21:35:16 -06004253 /* WARNING: * png_read_transform_info (pngrtran.c) performs a simpliar set of
4254 * calculations to calculate the final pixel depth, then
4255 * png_do_read_transforms actually does the transforms. This means that the
4256 * code which effectively calculates this value is actually repeated in three
4257 * separate places. They must all match. Innocent changes to the order of
4258 * transformations can and will break libpng in a way that causes memory
4259 * overwrites.
4260 *
4261 * TODO: fix this.
4262 */
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05004263#ifdef PNG_READ_PACK_SUPPORTED
Guy Schalnat0d580581995-07-20 02:43:20 -05004264 if ((png_ptr->transformations & PNG_PACK) && png_ptr->bit_depth < 8)
Guy Schalnat0d580581995-07-20 02:43:20 -05004265 max_pixel_depth = 8;
Guy Schalnat51f0eb41995-09-26 05:22:39 -05004266#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05004267
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05004268#ifdef PNG_READ_EXPAND_SUPPORTED
Guy Schalnate5a37791996-06-05 15:50:50 -05004269 if (png_ptr->transformations & PNG_EXPAND)
Guy Schalnat0d580581995-07-20 02:43:20 -05004270 {
4271 if (png_ptr->color_type == PNG_COLOR_TYPE_PALETTE)
4272 {
4273 if (png_ptr->num_trans)
4274 max_pixel_depth = 32;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004275
Guy Schalnat0d580581995-07-20 02:43:20 -05004276 else
4277 max_pixel_depth = 24;
4278 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004279
Guy Schalnat0d580581995-07-20 02:43:20 -05004280 else if (png_ptr->color_type == PNG_COLOR_TYPE_GRAY)
4281 {
4282 if (max_pixel_depth < 8)
4283 max_pixel_depth = 8;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004284
Guy Schalnat0d580581995-07-20 02:43:20 -05004285 if (png_ptr->num_trans)
4286 max_pixel_depth *= 2;
4287 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004288
Guy Schalnat0d580581995-07-20 02:43:20 -05004289 else if (png_ptr->color_type == PNG_COLOR_TYPE_RGB)
4290 {
4291 if (png_ptr->num_trans)
4292 {
4293 max_pixel_depth *= 4;
4294 max_pixel_depth /= 3;
4295 }
4296 }
4297 }
Guy Schalnat51f0eb41995-09-26 05:22:39 -05004298#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05004299
John Bowler4d562962011-02-12 09:01:20 -06004300#ifdef PNG_READ_EXPAND_16_SUPPORTED
4301 if (png_ptr->transformations & PNG_EXPAND_16)
4302 {
4303# ifdef PNG_READ_EXPAND_SUPPORTED
4304 /* In fact it is an error if it isn't supported, but checking is
4305 * the safe way.
4306 */
4307 if (png_ptr->transformations & PNG_EXPAND)
4308 {
4309 if (png_ptr->bit_depth < 16)
4310 max_pixel_depth *= 2;
4311 }
4312 else
4313# endif
4314 png_ptr->transformations &= ~PNG_EXPAND_16;
4315 }
4316#endif
4317
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05004318#ifdef PNG_READ_FILLER_SUPPORTED
Guy Schalnat51f0eb41995-09-26 05:22:39 -05004319 if (png_ptr->transformations & (PNG_FILLER))
Guy Schalnat0d580581995-07-20 02:43:20 -05004320 {
John Bowlere6fb6912011-11-08 21:35:16 -06004321 if (png_ptr->color_type == PNG_COLOR_TYPE_GRAY)
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05004322 {
4323 if (max_pixel_depth <= 8)
4324 max_pixel_depth = 16;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004325
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05004326 else
4327 max_pixel_depth = 32;
4328 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004329
John Bowlere6fb6912011-11-08 21:35:16 -06004330 else if (png_ptr->color_type == PNG_COLOR_TYPE_RGB ||
4331 png_ptr->color_type == PNG_COLOR_TYPE_PALETTE)
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05004332 {
4333 if (max_pixel_depth <= 32)
4334 max_pixel_depth = 32;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004335
Glenn Randers-Pehrson896239b1998-04-21 15:03:57 -05004336 else
4337 max_pixel_depth = 64;
4338 }
Guy Schalnat0d580581995-07-20 02:43:20 -05004339 }
Guy Schalnat51f0eb41995-09-26 05:22:39 -05004340#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05004341
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05004342#ifdef PNG_READ_GRAY_TO_RGB_SUPPORTED
Guy Schalnat0d580581995-07-20 02:43:20 -05004343 if (png_ptr->transformations & PNG_GRAY_TO_RGB)
4344 {
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -06004345 if (
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05004346#ifdef PNG_READ_EXPAND_SUPPORTED
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004347 (png_ptr->num_trans && (png_ptr->transformations & PNG_EXPAND)) ||
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -06004348#endif
Glenn Randers-Pehrsone26c0952009-09-23 11:22:08 -05004349#ifdef PNG_READ_FILLER_SUPPORTED
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004350 (png_ptr->transformations & (PNG_FILLER)) ||
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -06004351#endif
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004352 png_ptr->color_type == PNG_COLOR_TYPE_GRAY_ALPHA)
Guy Schalnat0d580581995-07-20 02:43:20 -05004353 {
4354 if (max_pixel_depth <= 16)
4355 max_pixel_depth = 32;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004356
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -06004357 else
Guy Schalnat0d580581995-07-20 02:43:20 -05004358 max_pixel_depth = 64;
4359 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004360
Guy Schalnat0d580581995-07-20 02:43:20 -05004361 else
4362 {
4363 if (max_pixel_depth <= 8)
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004364 {
4365 if (png_ptr->color_type == PNG_COLOR_TYPE_RGB_ALPHA)
Glenn Randers-Pehrsona77ef622000-02-18 13:48:52 -06004366 max_pixel_depth = 32;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004367
4368 else
Glenn Randers-Pehrsona77ef622000-02-18 13:48:52 -06004369 max_pixel_depth = 24;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004370 }
4371
Glenn Randers-Pehrsona77ef622000-02-18 13:48:52 -06004372 else if (png_ptr->color_type == PNG_COLOR_TYPE_RGB_ALPHA)
4373 max_pixel_depth = 64;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004374
Glenn Randers-Pehrson5c6aeb21998-12-29 11:47:59 -06004375 else
Guy Schalnat0d580581995-07-20 02:43:20 -05004376 max_pixel_depth = 48;
4377 }
4378 }
Guy Schalnat51f0eb41995-09-26 05:22:39 -05004379#endif
Guy Schalnat0d580581995-07-20 02:43:20 -05004380
Glenn Randers-Pehrson6942d532000-05-01 09:31:54 -05004381#if defined(PNG_READ_USER_TRANSFORM_SUPPORTED) && \
4382defined(PNG_USER_TRANSFORM_PTR_SUPPORTED)
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05004383 if (png_ptr->transformations & PNG_USER_TRANSFORM)
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004384 {
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05004385 int user_pixel_depth = png_ptr->user_transform_depth *
Glenn Randers-Pehrsonbcfd15d1999-10-01 14:22:25 -05004386 png_ptr->user_transform_channels;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004387
4388 if (user_pixel_depth > max_pixel_depth)
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05004389 max_pixel_depth = user_pixel_depth;
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004390 }
Glenn Randers-Pehrsonbcfd15d1999-10-01 14:22:25 -05004391#endif
4392
Glenn Randers-Pehrsonbb5cb142011-09-22 12:41:58 -05004393 /* This value is stored in png_struct and double checked in the row read
4394 * code.
4395 */
4396 png_ptr->maximum_pixel_depth = (png_byte)max_pixel_depth;
4397 png_ptr->transformed_pixel_depth = 0; /* calculated on demand */
4398
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05004399 /* Align the width on the next larger 8 pixels. Mainly used
4400 * for interlacing
4401 */
Glenn Randers-Pehrsond0dce401998-05-09 10:02:29 -05004402 row_bytes = ((png_ptr->width + 7) & ~((png_uint_32)7));
Glenn Randers-Pehrson4bb4d012009-05-20 12:45:29 -05004403 /* Calculate the maximum bytes needed, adding a byte and a pixel
4404 * for safety's sake
4405 */
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05004406 row_bytes = PNG_ROWBYTES(max_pixel_depth, row_bytes) +
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004407 1 + ((max_pixel_depth + 7) >> 3);
4408
Guy Schalnat0d580581995-07-20 02:43:20 -05004409#ifdef PNG_MAX_MALLOC_64K
Glenn Randers-Pehrsond0dce401998-05-09 10:02:29 -05004410 if (row_bytes > (png_uint_32)65536L)
Guy Schalnate5a37791996-06-05 15:50:50 -05004411 png_error(png_ptr, "This image requires a row greater than 64KB");
Guy Schalnat0d580581995-07-20 02:43:20 -05004412#endif
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05004413
Glenn Randers-Pehrsoneddc5af2009-11-20 21:15:06 -06004414 if (row_bytes + 48 > png_ptr->old_big_row_buf_size)
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05004415 {
4416 png_free(png_ptr, png_ptr->big_row_buf);
Mans Rullgardc9e27d02011-10-17 15:25:03 -05004417 png_free(png_ptr, png_ptr->big_prev_row);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004418
Glenn Randers-Pehrson6917b512009-03-09 15:31:08 -05004419 if (png_ptr->interlaced)
Glenn Randers-Pehrsona515d302010-01-01 10:24:25 -06004420 png_ptr->big_row_buf = (png_bytep)png_calloc(png_ptr,
4421 row_bytes + 48);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004422
Glenn Randers-Pehrsona515d302010-01-01 10:24:25 -06004423 else
Mans Rullgardc9e27d02011-10-17 15:25:03 -05004424 png_ptr->big_row_buf = (png_bytep)png_malloc(png_ptr, row_bytes + 48);
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004425
Mans Rullgardc9e27d02011-10-17 15:25:03 -05004426 png_ptr->big_prev_row = (png_bytep)png_malloc(png_ptr, row_bytes + 48);
Glenn Randers-Pehrsoneddc5af2009-11-20 21:15:06 -06004427
4428#ifdef PNG_ALIGNED_MEMORY_SUPPORTED
4429 /* Use 16-byte aligned memory for row_buf with at least 16 bytes
Mans Rullgardc9e27d02011-10-17 15:25:03 -05004430 * of padding before and after row_buf; treat prev_row similarly.
John Bowlerac8375d2011-10-06 22:27:16 -05004431 * NOTE: the alignment is to the start of the pixels, one beyond the start
4432 * of the buffer, because of the filter byte. Prior to libpng 1.5.6 this
Mans Rullgardc9e27d02011-10-17 15:25:03 -05004433 * was incorrect; the filter byte was aligned, which had the exact
4434 * opposite effect of that intended.
Glenn Randers-Pehrsoneddc5af2009-11-20 21:15:06 -06004435 */
John Bowlerac8375d2011-10-06 22:27:16 -05004436 {
4437 png_bytep temp = png_ptr->big_row_buf + 32;
Glenn Randers-Pehrson8db19982011-10-27 16:17:24 -05004438 int extra = (int)((temp - (png_bytep)0) & 0x0f);
John Bowlerac8375d2011-10-06 22:27:16 -05004439 png_ptr->row_buf = temp - extra - 1/*filter byte*/;
Mans Rullgardc9e27d02011-10-17 15:25:03 -05004440
4441 temp = png_ptr->big_prev_row + 32;
Glenn Randers-Pehrson8db19982011-10-27 16:17:24 -05004442 extra = (int)((temp - (png_bytep)0) & 0x0f);
Mans Rullgardc9e27d02011-10-17 15:25:03 -05004443 png_ptr->prev_row = temp - extra - 1/*filter byte*/;
John Bowlerac8375d2011-10-06 22:27:16 -05004444 }
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004445
Glenn Randers-Pehrsoneddc5af2009-11-20 21:15:06 -06004446#else
John Bowlerac8375d2011-10-06 22:27:16 -05004447 /* Use 31 bytes of padding before and 17 bytes after row_buf. */
4448 png_ptr->row_buf = png_ptr->big_row_buf + 31;
Mans Rullgardc9e27d02011-10-17 15:25:03 -05004449 png_ptr->prev_row = png_ptr->big_prev_row + 31;
Glenn Randers-Pehrsoneddc5af2009-11-20 21:15:06 -06004450#endif
4451 png_ptr->old_big_row_buf_size = row_bytes + 48;
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05004452 }
Guy Schalnat0d580581995-07-20 02:43:20 -05004453
4454#ifdef PNG_MAX_MALLOC_64K
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004455 if (png_ptr->rowbytes > 65535)
Guy Schalnate5a37791996-06-05 15:50:50 -05004456 png_error(png_ptr, "This image requires a row greater than 64KB");
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004457
Guy Schalnat0d580581995-07-20 02:43:20 -05004458#endif
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004459 if (png_ptr->rowbytes > (PNG_SIZE_MAX - 1))
Glenn Randers-Pehrsonbeb572e2006-08-19 13:59:24 -05004460 png_error(png_ptr, "Row has too many bytes to allocate in memory");
Glenn Randers-Pehrson145f5c82008-07-10 09:13:13 -05004461
Glenn Randers-Pehrsondbb7e192012-08-10 17:27:42 -05004462 memset(png_ptr->prev_row, 0, png_ptr->rowbytes + 1);
Andreas Dilger47a0c421997-05-16 02:46:07 -05004463
Glenn Randers-Pehrson5c92dec2011-01-07 18:28:47 -06004464 png_debug1(3, "width = %u,", png_ptr->width);
4465 png_debug1(3, "height = %u,", png_ptr->height);
4466 png_debug1(3, "iwidth = %u,", png_ptr->iwidth);
4467 png_debug1(3, "num_rows = %u,", png_ptr->num_rows);
Glenn Randers-Pehrsonb764c602011-01-14 21:18:37 -06004468 png_debug1(3, "rowbytes = %lu,", (unsigned long)png_ptr->rowbytes);
4469 png_debug1(3, "irowbytes = %lu",
4470 (unsigned long)PNG_ROWBYTES(png_ptr->pixel_depth, png_ptr->iwidth) + 1);
Guy Schalnat0d580581995-07-20 02:43:20 -05004471
John Bowlerb5d00512012-03-09 09:15:18 -06004472 /* The sequential reader needs a buffer for IDAT, but the progressive reader
4473 * does not, so free the read buffer now regardless; the sequential reader
4474 * reallocates it on demand.
4475 */
4476 if (png_ptr->read_buffer)
4477 {
4478 png_bytep buffer = png_ptr->read_buffer;
4479
4480 png_ptr->read_buffer_size = 0;
4481 png_ptr->read_buffer = NULL;
4482 png_free(png_ptr, buffer);
4483 }
4484
John Bowler90669192012-03-09 22:03:13 -06004485 /* Finally claim the zstream for the inflate of the IDAT data, use the bits
4486 * value from the stream (note that this will result in a fatal error if the
4487 * IDAT stream has a bogus deflate header window_bits value, but this should
4488 * not be happening any longer!)
4489 */
4490 if (png_inflate_claim(png_ptr, png_IDAT, 0) != Z_OK)
John Bowlerb5d00512012-03-09 09:15:18 -06004491 png_error(png_ptr, png_ptr->zstream.msg);
John Bowler42a2b552012-03-05 20:57:40 -06004492
Guy Schalnate5a37791996-06-05 15:50:50 -05004493 png_ptr->flags |= PNG_FLAG_ROW_INIT;
Guy Schalnat0d580581995-07-20 02:43:20 -05004494}
Glenn Randers-Pehrson9c3ab682006-02-20 22:09:05 -06004495#endif /* PNG_READ_SUPPORTED */