blob: 7789fbdd50ea44f9461e0e1d34bb2be32edee9b9 [file] [log] [blame]
epoger@google.comec3ed6a2011-07-28 14:26:00 +00001/*
2 * Copyright 2011 Google Inc.
3 *
4 * Use of this source code is governed by a BSD-style license that can be
5 * found in the LICENSE file.
6 */
tfarina@chromium.orge4fafb12013-12-12 21:11:12 +00007
reed@android.comd66efc22009-03-03 18:35:18 +00008#include "SkColorPriv.h"
9#include "SkXfermode.h"
tfarina@chromium.org8f6884a2014-01-24 20:56:26 +000010#include "Test.h"
reed@android.comd66efc22009-03-03 18:35:18 +000011
12// our std SkAlpha255To256
13static int test_srcover0(unsigned dst, unsigned alpha) {
14 return alpha + SkAlphaMul(dst, SkAlpha255To256(255 - alpha));
15}
16
17// faster hack +1
18static int test_srcover1(unsigned dst, unsigned alpha) {
19 return alpha + SkAlphaMul(dst, 256 - alpha);
20}
21
22// slower "correct"
23static int test_srcover2(unsigned dst, unsigned alpha) {
24 return alpha + SkMulDiv255Round(dst, 255 - alpha);
25}
26
tfarina@chromium.orge4fafb12013-12-12 21:11:12 +000027DEF_TEST(SrcOver, reporter) {
reed@android.comd66efc22009-03-03 18:35:18 +000028 /* Here's the idea. Can we ensure that when we blend on top of an opaque
29 dst, that the result always stay's opaque (i.e. exactly 255)?
30 */
reed@android.com80e39a72009-04-02 16:59:40 +000031
reed@android.comd66efc22009-03-03 18:35:18 +000032 unsigned i;
33 int opaqueCounter0 = 0;
34 int opaqueCounter1 = 0;
35 int opaqueCounter2 = 0;
36 for (i = 0; i <= 255; i++) {
37 unsigned result0 = test_srcover0(0xFF, i);
38 unsigned result1 = test_srcover1(0xFF, i);
39 unsigned result2 = test_srcover2(0xFF, i);
40 opaqueCounter0 += (result0 == 0xFF);
41 opaqueCounter1 += (result1 == 0xFF);
42 opaqueCounter2 += (result2 == 0xFF);
43 }
44#if 0
halcanary7d571242016-02-24 17:59:16 -080045 INFOF(reporter, "---- opaque test: [%d %d %d]\n",
46 opaqueCounter0, opaqueCounter1, opaqueCounter2);
reed@android.comd66efc22009-03-03 18:35:18 +000047#endif
48 // we acknowledge that technique0 does not always return opaque
reed@android.com9781ca52009-04-14 14:28:22 +000049 REPORTER_ASSERT(reporter, opaqueCounter0 == 256);
reed@android.comd66efc22009-03-03 18:35:18 +000050 REPORTER_ASSERT(reporter, opaqueCounter1 == 256);
51 REPORTER_ASSERT(reporter, opaqueCounter2 == 256);
reed@android.com80e39a72009-04-02 16:59:40 +000052
reed@android.comd66efc22009-03-03 18:35:18 +000053 // Now ensure that we never over/underflow a byte
54 for (i = 0; i <= 255; i++) {
55 for (unsigned dst = 0; dst <= 255; dst++) {
56 unsigned r0 = test_srcover0(dst, i);
57 unsigned r1 = test_srcover1(dst, i);
58 unsigned r2 = test_srcover2(dst, i);
59 unsigned max = SkMax32(dst, i);
60 // ignore the known failure
61 if (dst != 255) {
62 REPORTER_ASSERT(reporter, r0 <= 255 && r0 >= max);
63 }
64 REPORTER_ASSERT(reporter, r1 <= 255 && r1 >= max);
65 REPORTER_ASSERT(reporter, r2 <= 255 && r2 >= max);
reed@android.com80e39a72009-04-02 16:59:40 +000066
reed@android.comd66efc22009-03-03 18:35:18 +000067#if 0
68 // this shows where r1 (faster) differs from r2 (more exact)
69 if (r1 != r2) {
halcanary7d571242016-02-24 17:59:16 -080070 INFOF(reporter, "--- dst=%d i=%d r1=%d r2=%d exact=%g\n",
71 dst, i, r1, r2, i + dst - dst*i/255.0f);
reed@android.comd66efc22009-03-03 18:35:18 +000072 }
73#endif
74 }
75 }
76}