]>
Commit | Line | Data |
---|---|---|
0272a10d VZ |
1 | |
2 | /* pngread.c - read a PNG file | |
3 | * | |
72281370 | 4 | * Last changed in libpng 1.5.7 [December 15, 2011] |
9c0d9ce3 | 5 | * Copyright (c) 1998-2011 Glenn Randers-Pehrson |
0272a10d VZ |
6 | * (Version 0.96 Copyright (c) 1996, 1997 Andreas Dilger) |
7 | * (Version 0.88 Copyright (c) 1995, 1996 Guy Eric Schalnat, Group 42, Inc.) | |
8 | * | |
b61cc19c PC |
9 | * This code is released under the libpng license. |
10 | * For conditions of distribution and use, see the disclaimer | |
11 | * and license in png.h | |
12 | * | |
0272a10d VZ |
13 | * This file contains routines that an application calls directly to |
14 | * read a PNG file or stream. | |
15 | */ | |
16 | ||
b61cc19c PC |
17 | #include "pngpriv.h" |
18 | ||
9c0d9ce3 | 19 | #ifdef PNG_READ_SUPPORTED |
0272a10d VZ |
20 | |
21 | /* Create a PNG structure for reading, and allocate any memory needed. */ | |
9c0d9ce3 DS |
22 | PNG_FUNCTION(png_structp,PNGAPI |
23 | png_create_read_struct,(png_const_charp user_png_ver, png_voidp error_ptr, | |
24 | png_error_ptr error_fn, png_error_ptr warn_fn),PNG_ALLOCATED) | |
0272a10d VZ |
25 | { |
26 | ||
27 | #ifdef PNG_USER_MEM_SUPPORTED | |
28 | return (png_create_read_struct_2(user_png_ver, error_ptr, error_fn, | |
9c0d9ce3 | 29 | warn_fn, NULL, NULL, NULL)); |
0272a10d VZ |
30 | } |
31 | ||
b61cc19c PC |
32 | /* Alternate create PNG structure for reading, and allocate any memory |
33 | * needed. | |
34 | */ | |
9c0d9ce3 DS |
35 | PNG_FUNCTION(png_structp,PNGAPI |
36 | png_create_read_struct_2,(png_const_charp user_png_ver, png_voidp error_ptr, | |
37 | png_error_ptr error_fn, png_error_ptr warn_fn, png_voidp mem_ptr, | |
38 | png_malloc_ptr malloc_fn, png_free_ptr free_fn),PNG_ALLOCATED) | |
0272a10d VZ |
39 | { |
40 | #endif /* PNG_USER_MEM_SUPPORTED */ | |
41 | ||
970f6abe VZ |
42 | #ifdef PNG_SETJMP_SUPPORTED |
43 | volatile | |
44 | #endif | |
0272a10d | 45 | png_structp png_ptr; |
b61cc19c | 46 | volatile int png_cleanup_needed = 0; |
0272a10d VZ |
47 | |
48 | #ifdef PNG_SETJMP_SUPPORTED | |
49 | #ifdef USE_FAR_KEYWORD | |
9c0d9ce3 | 50 | jmp_buf tmp_jmpbuf; |
0272a10d VZ |
51 | #endif |
52 | #endif | |
53 | ||
970f6abe | 54 | png_debug(1, "in png_create_read_struct"); |
b61cc19c | 55 | |
0272a10d VZ |
56 | #ifdef PNG_USER_MEM_SUPPORTED |
57 | png_ptr = (png_structp)png_create_struct_2(PNG_STRUCT_PNG, | |
9c0d9ce3 | 58 | malloc_fn, mem_ptr); |
0272a10d VZ |
59 | #else |
60 | png_ptr = (png_structp)png_create_struct(PNG_STRUCT_PNG); | |
61 | #endif | |
62 | if (png_ptr == NULL) | |
63 | return (NULL); | |
64 | ||
b61cc19c PC |
65 | /* Added at libpng-1.2.6 */ |
66 | #ifdef PNG_USER_LIMITS_SUPPORTED | |
67 | png_ptr->user_width_max = PNG_USER_WIDTH_MAX; | |
68 | png_ptr->user_height_max = PNG_USER_HEIGHT_MAX; | |
9c0d9ce3 | 69 | |
b61cc19c PC |
70 | # ifdef PNG_USER_CHUNK_CACHE_MAX |
71 | /* Added at libpng-1.2.43 and 1.4.0 */ | |
72 | png_ptr->user_chunk_cache_max = PNG_USER_CHUNK_CACHE_MAX; | |
73 | # endif | |
9c0d9ce3 | 74 | |
b61cc19c PC |
75 | # ifdef PNG_SET_USER_CHUNK_MALLOC_MAX |
76 | /* Added at libpng-1.2.43 and 1.4.1 */ | |
77 | png_ptr->user_chunk_malloc_max = PNG_USER_CHUNK_MALLOC_MAX; | |
78 | # endif | |
0272a10d VZ |
79 | #endif |
80 | ||
81 | #ifdef PNG_SETJMP_SUPPORTED | |
b61cc19c | 82 | /* Applications that neglect to set up their own setjmp() and then |
72281370 DS |
83 | * encounter a png_error() will longjmp here. Since the jmpbuf is |
84 | * then meaningless we abort instead of returning. | |
85 | */ | |
0272a10d | 86 | #ifdef USE_FAR_KEYWORD |
9c0d9ce3 | 87 | if (setjmp(tmp_jmpbuf)) |
0272a10d | 88 | #else |
b61cc19c | 89 | if (setjmp(png_jmpbuf(png_ptr))) /* Sets longjmp to match setjmp */ |
0272a10d | 90 | #endif |
b61cc19c | 91 | PNG_ABORT(); |
0272a10d | 92 | #ifdef USE_FAR_KEYWORD |
9c0d9ce3 | 93 | png_memcpy(png_jmpbuf(png_ptr), tmp_jmpbuf, png_sizeof(jmp_buf)); |
0272a10d | 94 | #endif |
b61cc19c | 95 | #endif /* PNG_SETJMP_SUPPORTED */ |
0272a10d VZ |
96 | |
97 | #ifdef PNG_USER_MEM_SUPPORTED | |
98 | png_set_mem_fn(png_ptr, mem_ptr, malloc_fn, free_fn); | |
99 | #endif | |
100 | ||
101 | png_set_error_fn(png_ptr, error_ptr, error_fn, warn_fn); | |
102 | ||
9c0d9ce3 DS |
103 | /* Call the general version checker (shared with read and write code): */ |
104 | if (!png_user_version_check(png_ptr, user_png_ver)) | |
105 | png_cleanup_needed = 1; | |
0272a10d | 106 | |
b61cc19c PC |
107 | if (!png_cleanup_needed) |
108 | { | |
109 | /* Initialize zbuf - compression buffer */ | |
0272a10d | 110 | png_ptr->zbuf_size = PNG_ZBUF_SIZE; |
9c0d9ce3 DS |
111 | png_ptr->zbuf = (png_bytep)png_malloc_warn(png_ptr, png_ptr->zbuf_size); |
112 | ||
b61cc19c | 113 | if (png_ptr->zbuf == NULL) |
9c0d9ce3 | 114 | png_cleanup_needed = 1; |
b61cc19c | 115 | } |
9c0d9ce3 | 116 | |
0272a10d VZ |
117 | png_ptr->zstream.zalloc = png_zalloc; |
118 | png_ptr->zstream.zfree = png_zfree; | |
119 | png_ptr->zstream.opaque = (voidpf)png_ptr; | |
120 | ||
b61cc19c | 121 | if (!png_cleanup_needed) |
0272a10d | 122 | { |
b61cc19c | 123 | switch (inflateInit(&png_ptr->zstream)) |
0272a10d | 124 | { |
9c0d9ce3 DS |
125 | case Z_OK: |
126 | break; /* Do nothing */ | |
127 | ||
b61cc19c | 128 | case Z_MEM_ERROR: |
9c0d9ce3 DS |
129 | png_warning(png_ptr, "zlib memory error"); |
130 | png_cleanup_needed = 1; | |
131 | break; | |
132 | ||
133 | case Z_STREAM_ERROR: | |
134 | png_warning(png_ptr, "zlib stream error"); | |
135 | png_cleanup_needed = 1; | |
136 | break; | |
137 | ||
138 | case Z_VERSION_ERROR: | |
139 | png_warning(png_ptr, "zlib version error"); | |
140 | png_cleanup_needed = 1; | |
141 | break; | |
142 | ||
b61cc19c PC |
143 | default: png_warning(png_ptr, "Unknown zlib error"); |
144 | png_cleanup_needed = 1; | |
0272a10d | 145 | } |
0272a10d | 146 | } |
0272a10d | 147 | |
b61cc19c | 148 | if (png_cleanup_needed) |
0272a10d | 149 | { |
b61cc19c PC |
150 | /* Clean up PNG structure and deallocate any memory. */ |
151 | png_free(png_ptr, png_ptr->zbuf); | |
152 | png_ptr->zbuf = NULL; | |
153 | #ifdef PNG_USER_MEM_SUPPORTED | |
154 | png_destroy_struct_2((png_voidp)png_ptr, | |
9c0d9ce3 | 155 | (png_free_ptr)free_fn, (png_voidp)mem_ptr); |
0272a10d | 156 | #else |
b61cc19c | 157 | png_destroy_struct((png_voidp)png_ptr); |
0272a10d | 158 | #endif |
b61cc19c | 159 | return (NULL); |
0272a10d VZ |
160 | } |
161 | ||
162 | png_ptr->zstream.next_out = png_ptr->zbuf; | |
163 | png_ptr->zstream.avail_out = (uInt)png_ptr->zbuf_size; | |
164 | ||
b61cc19c PC |
165 | png_set_read_fn(png_ptr, NULL, NULL); |
166 | ||
167 | ||
168 | return (png_ptr); | |
0272a10d VZ |
169 | } |
170 | ||
b61cc19c PC |
171 | |
172 | #ifdef PNG_SEQUENTIAL_READ_SUPPORTED | |
0272a10d VZ |
173 | /* Read the information before the actual image data. This has been |
174 | * changed in v0.90 to allow reading a file that already has the magic | |
175 | * bytes read from the stream. You can tell libpng how many bytes have | |
176 | * been read from the beginning of the stream (up to the maximum of 8) | |
177 | * via png_set_sig_bytes(), and we will only check the remaining bytes | |
178 | * here. The application can then have access to the signature bytes we | |
179 | * read if it is determined that this isn't a valid PNG file. | |
180 | */ | |
181 | void PNGAPI | |
182 | png_read_info(png_structp png_ptr, png_infop info_ptr) | |
183 | { | |
970f6abe | 184 | png_debug(1, "in png_read_info"); |
9c0d9ce3 | 185 | |
b61cc19c PC |
186 | if (png_ptr == NULL || info_ptr == NULL) |
187 | return; | |
0272a10d | 188 | |
9c0d9ce3 DS |
189 | /* Read and check the PNG file signature. */ |
190 | png_read_sig(png_ptr, info_ptr); | |
0272a10d | 191 | |
970f6abe | 192 | for (;;) |
0272a10d | 193 | { |
970f6abe | 194 | png_uint_32 length = png_read_chunk_header(png_ptr); |
9c0d9ce3 | 195 | png_uint_32 chunk_name = png_ptr->chunk_name; |
0272a10d VZ |
196 | |
197 | /* This should be a binary subdivision search or a hash for | |
198 | * matching the chunk name rather than a linear search. | |
199 | */ | |
9c0d9ce3 DS |
200 | if (chunk_name == png_IDAT) |
201 | if (png_ptr->mode & PNG_AFTER_IDAT) | |
202 | png_ptr->mode |= PNG_HAVE_CHUNK_AFTER_IDAT; | |
0272a10d | 203 | |
9c0d9ce3 | 204 | if (chunk_name == png_IHDR) |
0272a10d | 205 | png_handle_IHDR(png_ptr, info_ptr, length); |
9c0d9ce3 DS |
206 | |
207 | else if (chunk_name == png_IEND) | |
0272a10d | 208 | png_handle_IEND(png_ptr, info_ptr, length); |
9c0d9ce3 | 209 | |
0272a10d | 210 | #ifdef PNG_HANDLE_AS_UNKNOWN_SUPPORTED |
9c0d9ce3 DS |
211 | else if (png_chunk_unknown_handling(png_ptr, chunk_name) != |
212 | PNG_HANDLE_CHUNK_AS_DEFAULT) | |
0272a10d | 213 | { |
9c0d9ce3 | 214 | if (chunk_name == png_IDAT) |
0272a10d | 215 | png_ptr->mode |= PNG_HAVE_IDAT; |
9c0d9ce3 | 216 | |
0272a10d | 217 | png_handle_unknown(png_ptr, info_ptr, length); |
9c0d9ce3 DS |
218 | |
219 | if (chunk_name == png_PLTE) | |
0272a10d | 220 | png_ptr->mode |= PNG_HAVE_PLTE; |
9c0d9ce3 DS |
221 | |
222 | else if (chunk_name == png_IDAT) | |
0272a10d VZ |
223 | { |
224 | if (!(png_ptr->mode & PNG_HAVE_IHDR)) | |
225 | png_error(png_ptr, "Missing IHDR before IDAT"); | |
9c0d9ce3 | 226 | |
0272a10d | 227 | else if (png_ptr->color_type == PNG_COLOR_TYPE_PALETTE && |
9c0d9ce3 | 228 | !(png_ptr->mode & PNG_HAVE_PLTE)) |
0272a10d | 229 | png_error(png_ptr, "Missing PLTE before IDAT"); |
9c0d9ce3 | 230 | |
0272a10d VZ |
231 | break; |
232 | } | |
233 | } | |
234 | #endif | |
9c0d9ce3 | 235 | else if (chunk_name == png_PLTE) |
0272a10d | 236 | png_handle_PLTE(png_ptr, info_ptr, length); |
9c0d9ce3 DS |
237 | |
238 | else if (chunk_name == png_IDAT) | |
0272a10d VZ |
239 | { |
240 | if (!(png_ptr->mode & PNG_HAVE_IHDR)) | |
241 | png_error(png_ptr, "Missing IHDR before IDAT"); | |
9c0d9ce3 | 242 | |
0272a10d | 243 | else if (png_ptr->color_type == PNG_COLOR_TYPE_PALETTE && |
9c0d9ce3 | 244 | !(png_ptr->mode & PNG_HAVE_PLTE)) |
0272a10d VZ |
245 | png_error(png_ptr, "Missing PLTE before IDAT"); |
246 | ||
247 | png_ptr->idat_size = length; | |
248 | png_ptr->mode |= PNG_HAVE_IDAT; | |
249 | break; | |
250 | } | |
9c0d9ce3 | 251 | |
b61cc19c | 252 | #ifdef PNG_READ_bKGD_SUPPORTED |
9c0d9ce3 | 253 | else if (chunk_name == png_bKGD) |
0272a10d VZ |
254 | png_handle_bKGD(png_ptr, info_ptr, length); |
255 | #endif | |
9c0d9ce3 | 256 | |
b61cc19c | 257 | #ifdef PNG_READ_cHRM_SUPPORTED |
9c0d9ce3 | 258 | else if (chunk_name == png_cHRM) |
0272a10d VZ |
259 | png_handle_cHRM(png_ptr, info_ptr, length); |
260 | #endif | |
9c0d9ce3 | 261 | |
b61cc19c | 262 | #ifdef PNG_READ_gAMA_SUPPORTED |
9c0d9ce3 | 263 | else if (chunk_name == png_gAMA) |
0272a10d VZ |
264 | png_handle_gAMA(png_ptr, info_ptr, length); |
265 | #endif | |
9c0d9ce3 | 266 | |
b61cc19c | 267 | #ifdef PNG_READ_hIST_SUPPORTED |
9c0d9ce3 | 268 | else if (chunk_name == png_hIST) |
0272a10d VZ |
269 | png_handle_hIST(png_ptr, info_ptr, length); |
270 | #endif | |
9c0d9ce3 | 271 | |
b61cc19c | 272 | #ifdef PNG_READ_oFFs_SUPPORTED |
9c0d9ce3 | 273 | else if (chunk_name == png_oFFs) |
0272a10d VZ |
274 | png_handle_oFFs(png_ptr, info_ptr, length); |
275 | #endif | |
9c0d9ce3 | 276 | |
b61cc19c | 277 | #ifdef PNG_READ_pCAL_SUPPORTED |
9c0d9ce3 | 278 | else if (chunk_name == png_pCAL) |
0272a10d VZ |
279 | png_handle_pCAL(png_ptr, info_ptr, length); |
280 | #endif | |
9c0d9ce3 | 281 | |
b61cc19c | 282 | #ifdef PNG_READ_sCAL_SUPPORTED |
9c0d9ce3 | 283 | else if (chunk_name == png_sCAL) |
0272a10d VZ |
284 | png_handle_sCAL(png_ptr, info_ptr, length); |
285 | #endif | |
9c0d9ce3 | 286 | |
b61cc19c | 287 | #ifdef PNG_READ_pHYs_SUPPORTED |
9c0d9ce3 | 288 | else if (chunk_name == png_pHYs) |
0272a10d VZ |
289 | png_handle_pHYs(png_ptr, info_ptr, length); |
290 | #endif | |
9c0d9ce3 | 291 | |
b61cc19c | 292 | #ifdef PNG_READ_sBIT_SUPPORTED |
9c0d9ce3 | 293 | else if (chunk_name == png_sBIT) |
0272a10d VZ |
294 | png_handle_sBIT(png_ptr, info_ptr, length); |
295 | #endif | |
9c0d9ce3 | 296 | |
b61cc19c | 297 | #ifdef PNG_READ_sRGB_SUPPORTED |
9c0d9ce3 | 298 | else if (chunk_name == png_sRGB) |
0272a10d VZ |
299 | png_handle_sRGB(png_ptr, info_ptr, length); |
300 | #endif | |
9c0d9ce3 | 301 | |
b61cc19c | 302 | #ifdef PNG_READ_iCCP_SUPPORTED |
9c0d9ce3 | 303 | else if (chunk_name == png_iCCP) |
0272a10d VZ |
304 | png_handle_iCCP(png_ptr, info_ptr, length); |
305 | #endif | |
9c0d9ce3 | 306 | |
b61cc19c | 307 | #ifdef PNG_READ_sPLT_SUPPORTED |
9c0d9ce3 | 308 | else if (chunk_name == png_sPLT) |
0272a10d VZ |
309 | png_handle_sPLT(png_ptr, info_ptr, length); |
310 | #endif | |
9c0d9ce3 | 311 | |
b61cc19c | 312 | #ifdef PNG_READ_tEXt_SUPPORTED |
9c0d9ce3 | 313 | else if (chunk_name == png_tEXt) |
0272a10d VZ |
314 | png_handle_tEXt(png_ptr, info_ptr, length); |
315 | #endif | |
9c0d9ce3 | 316 | |
b61cc19c | 317 | #ifdef PNG_READ_tIME_SUPPORTED |
9c0d9ce3 | 318 | else if (chunk_name == png_tIME) |
0272a10d VZ |
319 | png_handle_tIME(png_ptr, info_ptr, length); |
320 | #endif | |
9c0d9ce3 | 321 | |
b61cc19c | 322 | #ifdef PNG_READ_tRNS_SUPPORTED |
9c0d9ce3 | 323 | else if (chunk_name == png_tRNS) |
0272a10d VZ |
324 | png_handle_tRNS(png_ptr, info_ptr, length); |
325 | #endif | |
9c0d9ce3 | 326 | |
b61cc19c | 327 | #ifdef PNG_READ_zTXt_SUPPORTED |
9c0d9ce3 | 328 | else if (chunk_name == png_zTXt) |
0272a10d VZ |
329 | png_handle_zTXt(png_ptr, info_ptr, length); |
330 | #endif | |
9c0d9ce3 | 331 | |
b61cc19c | 332 | #ifdef PNG_READ_iTXt_SUPPORTED |
9c0d9ce3 | 333 | else if (chunk_name == png_iTXt) |
0272a10d VZ |
334 | png_handle_iTXt(png_ptr, info_ptr, length); |
335 | #endif | |
9c0d9ce3 | 336 | |
0272a10d VZ |
337 | else |
338 | png_handle_unknown(png_ptr, info_ptr, length); | |
339 | } | |
340 | } | |
b61cc19c | 341 | #endif /* PNG_SEQUENTIAL_READ_SUPPORTED */ |
0272a10d | 342 | |
b61cc19c | 343 | /* Optional call to update the users info_ptr structure */ |
0272a10d VZ |
344 | void PNGAPI |
345 | png_read_update_info(png_structp png_ptr, png_infop info_ptr) | |
346 | { | |
970f6abe | 347 | png_debug(1, "in png_read_update_info"); |
9c0d9ce3 | 348 | |
b61cc19c PC |
349 | if (png_ptr == NULL) |
350 | return; | |
b61cc19c | 351 | |
9c0d9ce3 DS |
352 | png_read_start_row(png_ptr); |
353 | ||
354 | #ifdef PNG_READ_TRANSFORMS_SUPPORTED | |
0272a10d | 355 | png_read_transform_info(png_ptr, info_ptr); |
9c0d9ce3 DS |
356 | #else |
357 | PNG_UNUSED(info_ptr) | |
358 | #endif | |
0272a10d VZ |
359 | } |
360 | ||
b61cc19c | 361 | #ifdef PNG_SEQUENTIAL_READ_SUPPORTED |
0272a10d VZ |
362 | /* Initialize palette, background, etc, after transformations |
363 | * are set, but before any reading takes place. This allows | |
364 | * the user to obtain a gamma-corrected palette, for example. | |
365 | * If the user doesn't call this, we will do it ourselves. | |
366 | */ | |
367 | void PNGAPI | |
368 | png_start_read_image(png_structp png_ptr) | |
369 | { | |
970f6abe | 370 | png_debug(1, "in png_start_read_image"); |
9c0d9ce3 DS |
371 | |
372 | if (png_ptr != NULL) | |
373 | png_read_start_row(png_ptr); | |
0272a10d | 374 | } |
b61cc19c | 375 | #endif /* PNG_SEQUENTIAL_READ_SUPPORTED */ |
0272a10d | 376 | |
b61cc19c | 377 | #ifdef PNG_SEQUENTIAL_READ_SUPPORTED |
0272a10d VZ |
378 | void PNGAPI |
379 | png_read_row(png_structp png_ptr, png_bytep row, png_bytep dsp_row) | |
380 | { | |
0272a10d | 381 | int ret; |
9c0d9ce3 DS |
382 | |
383 | png_row_info row_info; | |
384 | ||
b61cc19c PC |
385 | if (png_ptr == NULL) |
386 | return; | |
9c0d9ce3 | 387 | |
970f6abe | 388 | png_debug2(1, "in png_read_row (row %lu, pass %d)", |
9c0d9ce3 | 389 | (unsigned long)png_ptr->row_number, png_ptr->pass); |
b61cc19c | 390 | |
9c0d9ce3 DS |
391 | /* png_read_start_row sets the information (in particular iwidth) for this |
392 | * interlace pass. | |
393 | */ | |
0272a10d VZ |
394 | if (!(png_ptr->flags & PNG_FLAG_ROW_INIT)) |
395 | png_read_start_row(png_ptr); | |
9c0d9ce3 DS |
396 | |
397 | /* 1.5.6: row_info moved out of png_struct to a local here. */ | |
398 | row_info.width = png_ptr->iwidth; /* NOTE: width of current interlaced row */ | |
399 | row_info.color_type = png_ptr->color_type; | |
400 | row_info.bit_depth = png_ptr->bit_depth; | |
401 | row_info.channels = png_ptr->channels; | |
402 | row_info.pixel_depth = png_ptr->pixel_depth; | |
403 | row_info.rowbytes = PNG_ROWBYTES(row_info.pixel_depth, row_info.width); | |
404 | ||
0272a10d VZ |
405 | if (png_ptr->row_number == 0 && png_ptr->pass == 0) |
406 | { | |
b61cc19c | 407 | /* Check for transforms that have been set but were defined out */ |
0272a10d VZ |
408 | #if defined(PNG_WRITE_INVERT_SUPPORTED) && !defined(PNG_READ_INVERT_SUPPORTED) |
409 | if (png_ptr->transformations & PNG_INVERT_MONO) | |
b61cc19c | 410 | png_warning(png_ptr, "PNG_READ_INVERT_SUPPORTED is not defined"); |
0272a10d | 411 | #endif |
9c0d9ce3 | 412 | |
0272a10d VZ |
413 | #if defined(PNG_WRITE_FILLER_SUPPORTED) && !defined(PNG_READ_FILLER_SUPPORTED) |
414 | if (png_ptr->transformations & PNG_FILLER) | |
b61cc19c | 415 | png_warning(png_ptr, "PNG_READ_FILLER_SUPPORTED is not defined"); |
0272a10d | 416 | #endif |
9c0d9ce3 | 417 | |
b61cc19c PC |
418 | #if defined(PNG_WRITE_PACKSWAP_SUPPORTED) && \ |
419 | !defined(PNG_READ_PACKSWAP_SUPPORTED) | |
0272a10d | 420 | if (png_ptr->transformations & PNG_PACKSWAP) |
b61cc19c | 421 | png_warning(png_ptr, "PNG_READ_PACKSWAP_SUPPORTED is not defined"); |
0272a10d | 422 | #endif |
9c0d9ce3 | 423 | |
0272a10d VZ |
424 | #if defined(PNG_WRITE_PACK_SUPPORTED) && !defined(PNG_READ_PACK_SUPPORTED) |
425 | if (png_ptr->transformations & PNG_PACK) | |
b61cc19c | 426 | png_warning(png_ptr, "PNG_READ_PACK_SUPPORTED is not defined"); |
0272a10d | 427 | #endif |
9c0d9ce3 | 428 | |
0272a10d VZ |
429 | #if defined(PNG_WRITE_SHIFT_SUPPORTED) && !defined(PNG_READ_SHIFT_SUPPORTED) |
430 | if (png_ptr->transformations & PNG_SHIFT) | |
b61cc19c | 431 | png_warning(png_ptr, "PNG_READ_SHIFT_SUPPORTED is not defined"); |
0272a10d | 432 | #endif |
9c0d9ce3 | 433 | |
0272a10d VZ |
434 | #if defined(PNG_WRITE_BGR_SUPPORTED) && !defined(PNG_READ_BGR_SUPPORTED) |
435 | if (png_ptr->transformations & PNG_BGR) | |
b61cc19c | 436 | png_warning(png_ptr, "PNG_READ_BGR_SUPPORTED is not defined"); |
0272a10d | 437 | #endif |
9c0d9ce3 | 438 | |
0272a10d VZ |
439 | #if defined(PNG_WRITE_SWAP_SUPPORTED) && !defined(PNG_READ_SWAP_SUPPORTED) |
440 | if (png_ptr->transformations & PNG_SWAP_BYTES) | |
b61cc19c | 441 | png_warning(png_ptr, "PNG_READ_SWAP_SUPPORTED is not defined"); |
0272a10d VZ |
442 | #endif |
443 | } | |
444 | ||
b61cc19c | 445 | #ifdef PNG_READ_INTERLACING_SUPPORTED |
9c0d9ce3 DS |
446 | /* If interlaced and we do not need a new row, combine row and return. |
447 | * Notice that the pixels we have from previous rows have been transformed | |
448 | * already; we can only combine like with like (transformed or | |
449 | * untransformed) and, because of the libpng API for interlaced images, this | |
450 | * means we must transform before de-interlacing. | |
451 | */ | |
0272a10d VZ |
452 | if (png_ptr->interlaced && (png_ptr->transformations & PNG_INTERLACE)) |
453 | { | |
454 | switch (png_ptr->pass) | |
455 | { | |
456 | case 0: | |
457 | if (png_ptr->row_number & 0x07) | |
458 | { | |
459 | if (dsp_row != NULL) | |
9c0d9ce3 | 460 | png_combine_row(png_ptr, dsp_row, 1/*display*/); |
0272a10d VZ |
461 | png_read_finish_row(png_ptr); |
462 | return; | |
463 | } | |
464 | break; | |
9c0d9ce3 | 465 | |
0272a10d VZ |
466 | case 1: |
467 | if ((png_ptr->row_number & 0x07) || png_ptr->width < 5) | |
468 | { | |
469 | if (dsp_row != NULL) | |
9c0d9ce3 DS |
470 | png_combine_row(png_ptr, dsp_row, 1/*display*/); |
471 | ||
0272a10d VZ |
472 | png_read_finish_row(png_ptr); |
473 | return; | |
474 | } | |
475 | break; | |
9c0d9ce3 | 476 | |
0272a10d VZ |
477 | case 2: |
478 | if ((png_ptr->row_number & 0x07) != 4) | |
479 | { | |
480 | if (dsp_row != NULL && (png_ptr->row_number & 4)) | |
9c0d9ce3 DS |
481 | png_combine_row(png_ptr, dsp_row, 1/*display*/); |
482 | ||
0272a10d VZ |
483 | png_read_finish_row(png_ptr); |
484 | return; | |
485 | } | |
486 | break; | |
9c0d9ce3 | 487 | |
0272a10d VZ |
488 | case 3: |
489 | if ((png_ptr->row_number & 3) || png_ptr->width < 3) | |
490 | { | |
491 | if (dsp_row != NULL) | |
9c0d9ce3 DS |
492 | png_combine_row(png_ptr, dsp_row, 1/*display*/); |
493 | ||
0272a10d VZ |
494 | png_read_finish_row(png_ptr); |
495 | return; | |
496 | } | |
497 | break; | |
9c0d9ce3 | 498 | |
0272a10d VZ |
499 | case 4: |
500 | if ((png_ptr->row_number & 3) != 2) | |
501 | { | |
502 | if (dsp_row != NULL && (png_ptr->row_number & 2)) | |
9c0d9ce3 DS |
503 | png_combine_row(png_ptr, dsp_row, 1/*display*/); |
504 | ||
0272a10d VZ |
505 | png_read_finish_row(png_ptr); |
506 | return; | |
507 | } | |
508 | break; | |
509 | case 5: | |
510 | if ((png_ptr->row_number & 1) || png_ptr->width < 2) | |
511 | { | |
512 | if (dsp_row != NULL) | |
9c0d9ce3 DS |
513 | png_combine_row(png_ptr, dsp_row, 1/*display*/); |
514 | ||
0272a10d VZ |
515 | png_read_finish_row(png_ptr); |
516 | return; | |
517 | } | |
518 | break; | |
9c0d9ce3 DS |
519 | |
520 | default: | |
0272a10d VZ |
521 | case 6: |
522 | if (!(png_ptr->row_number & 1)) | |
523 | { | |
524 | png_read_finish_row(png_ptr); | |
525 | return; | |
526 | } | |
527 | break; | |
528 | } | |
529 | } | |
530 | #endif | |
531 | ||
532 | if (!(png_ptr->mode & PNG_HAVE_IDAT)) | |
533 | png_error(png_ptr, "Invalid attempt to read row data"); | |
534 | ||
535 | png_ptr->zstream.next_out = png_ptr->row_buf; | |
b61cc19c PC |
536 | png_ptr->zstream.avail_out = |
537 | (uInt)(PNG_ROWBYTES(png_ptr->pixel_depth, | |
538 | png_ptr->iwidth) + 1); | |
9c0d9ce3 | 539 | |
0272a10d VZ |
540 | do |
541 | { | |
542 | if (!(png_ptr->zstream.avail_in)) | |
543 | { | |
544 | while (!png_ptr->idat_size) | |
545 | { | |
0272a10d VZ |
546 | png_crc_finish(png_ptr, 0); |
547 | ||
970f6abe | 548 | png_ptr->idat_size = png_read_chunk_header(png_ptr); |
9c0d9ce3 | 549 | if (png_ptr->chunk_name != png_IDAT) |
0272a10d VZ |
550 | png_error(png_ptr, "Not enough image data"); |
551 | } | |
552 | png_ptr->zstream.avail_in = (uInt)png_ptr->zbuf_size; | |
553 | png_ptr->zstream.next_in = png_ptr->zbuf; | |
554 | if (png_ptr->zbuf_size > png_ptr->idat_size) | |
555 | png_ptr->zstream.avail_in = (uInt)png_ptr->idat_size; | |
556 | png_crc_read(png_ptr, png_ptr->zbuf, | |
9c0d9ce3 | 557 | (png_size_t)png_ptr->zstream.avail_in); |
0272a10d VZ |
558 | png_ptr->idat_size -= png_ptr->zstream.avail_in; |
559 | } | |
9c0d9ce3 | 560 | |
0272a10d | 561 | ret = inflate(&png_ptr->zstream, Z_PARTIAL_FLUSH); |
9c0d9ce3 | 562 | |
0272a10d VZ |
563 | if (ret == Z_STREAM_END) |
564 | { | |
565 | if (png_ptr->zstream.avail_out || png_ptr->zstream.avail_in || | |
566 | png_ptr->idat_size) | |
b61cc19c | 567 | png_benign_error(png_ptr, "Extra compressed data"); |
0272a10d VZ |
568 | png_ptr->mode |= PNG_AFTER_IDAT; |
569 | png_ptr->flags |= PNG_FLAG_ZLIB_FINISHED; | |
570 | break; | |
571 | } | |
9c0d9ce3 | 572 | |
0272a10d VZ |
573 | if (ret != Z_OK) |
574 | png_error(png_ptr, png_ptr->zstream.msg ? png_ptr->zstream.msg : | |
9c0d9ce3 | 575 | "Decompression error"); |
0272a10d VZ |
576 | |
577 | } while (png_ptr->zstream.avail_out); | |
578 | ||
9c0d9ce3 DS |
579 | if (png_ptr->row_buf[0] > PNG_FILTER_VALUE_NONE) |
580 | { | |
581 | if (png_ptr->row_buf[0] < PNG_FILTER_VALUE_LAST) | |
72281370 | 582 | png_read_filter_row(png_ptr, &row_info, png_ptr->row_buf + 1, |
9c0d9ce3 DS |
583 | png_ptr->prev_row + 1, png_ptr->row_buf[0]); |
584 | else | |
585 | png_error(png_ptr, "bad adaptive filter value"); | |
586 | } | |
0272a10d | 587 | |
9c0d9ce3 DS |
588 | /* libpng 1.5.6: the following line was copying png_ptr->rowbytes before |
589 | * 1.5.6, while the buffer really is this big in current versions of libpng | |
590 | * it may not be in the future, so this was changed just to copy the | |
591 | * interlaced count: | |
592 | */ | |
593 | png_memcpy(png_ptr->prev_row, png_ptr->row_buf, row_info.rowbytes + 1); | |
0272a10d | 594 | |
b61cc19c | 595 | #ifdef PNG_MNG_FEATURES_SUPPORTED |
970f6abe | 596 | if ((png_ptr->mng_features_permitted & PNG_FLAG_MNG_FILTER_64) && |
9c0d9ce3 | 597 | (png_ptr->filter_type == PNG_INTRAPIXEL_DIFFERENCING)) |
0272a10d VZ |
598 | { |
599 | /* Intrapixel differencing */ | |
9c0d9ce3 | 600 | png_do_read_intrapixel(&row_info, png_ptr->row_buf + 1); |
0272a10d VZ |
601 | } |
602 | #endif | |
603 | ||
604 | ||
9c0d9ce3 DS |
605 | #ifdef PNG_READ_TRANSFORMS_SUPPORTED |
606 | if (png_ptr->transformations) | |
607 | png_do_read_transformations(png_ptr, &row_info); | |
608 | #endif | |
609 | ||
610 | /* The transformed pixel depth should match the depth now in row_info. */ | |
611 | if (png_ptr->transformed_pixel_depth == 0) | |
612 | { | |
613 | png_ptr->transformed_pixel_depth = row_info.pixel_depth; | |
614 | if (row_info.pixel_depth > png_ptr->maximum_pixel_depth) | |
615 | png_error(png_ptr, "sequential row overflow"); | |
616 | } | |
617 | ||
618 | else if (png_ptr->transformed_pixel_depth != row_info.pixel_depth) | |
619 | png_error(png_ptr, "internal sequential row size calculation error"); | |
0272a10d | 620 | |
b61cc19c PC |
621 | #ifdef PNG_READ_INTERLACING_SUPPORTED |
622 | /* Blow up interlaced rows to full size */ | |
0272a10d VZ |
623 | if (png_ptr->interlaced && |
624 | (png_ptr->transformations & PNG_INTERLACE)) | |
625 | { | |
626 | if (png_ptr->pass < 6) | |
9c0d9ce3 DS |
627 | png_do_read_interlace(&row_info, png_ptr->row_buf + 1, png_ptr->pass, |
628 | png_ptr->transformations); | |
0272a10d VZ |
629 | |
630 | if (dsp_row != NULL) | |
9c0d9ce3 DS |
631 | png_combine_row(png_ptr, dsp_row, 1/*display*/); |
632 | ||
0272a10d | 633 | if (row != NULL) |
9c0d9ce3 | 634 | png_combine_row(png_ptr, row, 0/*row*/); |
0272a10d | 635 | } |
9c0d9ce3 | 636 | |
0272a10d VZ |
637 | else |
638 | #endif | |
639 | { | |
640 | if (row != NULL) | |
9c0d9ce3 DS |
641 | png_combine_row(png_ptr, row, -1/*ignored*/); |
642 | ||
0272a10d | 643 | if (dsp_row != NULL) |
9c0d9ce3 | 644 | png_combine_row(png_ptr, dsp_row, -1/*ignored*/); |
0272a10d VZ |
645 | } |
646 | png_read_finish_row(png_ptr); | |
647 | ||
648 | if (png_ptr->read_row_fn != NULL) | |
649 | (*(png_ptr->read_row_fn))(png_ptr, png_ptr->row_number, png_ptr->pass); | |
650 | } | |
b61cc19c | 651 | #endif /* PNG_SEQUENTIAL_READ_SUPPORTED */ |
0272a10d | 652 | |
b61cc19c | 653 | #ifdef PNG_SEQUENTIAL_READ_SUPPORTED |
0272a10d VZ |
654 | /* Read one or more rows of image data. If the image is interlaced, |
655 | * and png_set_interlace_handling() has been called, the rows need to | |
656 | * contain the contents of the rows from the previous pass. If the | |
657 | * image has alpha or transparency, and png_handle_alpha()[*] has been | |
658 | * called, the rows contents must be initialized to the contents of the | |
659 | * screen. | |
660 | * | |
661 | * "row" holds the actual image, and pixels are placed in it | |
662 | * as they arrive. If the image is displayed after each pass, it will | |
663 | * appear to "sparkle" in. "display_row" can be used to display a | |
664 | * "chunky" progressive image, with finer detail added as it becomes | |
665 | * available. If you do not want this "chunky" display, you may pass | |
666 | * NULL for display_row. If you do not want the sparkle display, and | |
667 | * you have not called png_handle_alpha(), you may pass NULL for rows. | |
668 | * If you have called png_handle_alpha(), and the image has either an | |
669 | * alpha channel or a transparency chunk, you must provide a buffer for | |
670 | * rows. In this case, you do not have to provide a display_row buffer | |
671 | * also, but you may. If the image is not interlaced, or if you have | |
672 | * not called png_set_interlace_handling(), the display_row buffer will | |
673 | * be ignored, so pass NULL to it. | |
674 | * | |
675 | * [*] png_handle_alpha() does not exist yet, as of this version of libpng | |
676 | */ | |
677 | ||
678 | void PNGAPI | |
679 | png_read_rows(png_structp png_ptr, png_bytepp row, | |
9c0d9ce3 | 680 | png_bytepp display_row, png_uint_32 num_rows) |
0272a10d VZ |
681 | { |
682 | png_uint_32 i; | |
683 | png_bytepp rp; | |
684 | png_bytepp dp; | |
685 | ||
970f6abe | 686 | png_debug(1, "in png_read_rows"); |
9c0d9ce3 | 687 | |
b61cc19c PC |
688 | if (png_ptr == NULL) |
689 | return; | |
9c0d9ce3 | 690 | |
0272a10d VZ |
691 | rp = row; |
692 | dp = display_row; | |
693 | if (rp != NULL && dp != NULL) | |
694 | for (i = 0; i < num_rows; i++) | |
695 | { | |
696 | png_bytep rptr = *rp++; | |
697 | png_bytep dptr = *dp++; | |
698 | ||
699 | png_read_row(png_ptr, rptr, dptr); | |
700 | } | |
9c0d9ce3 | 701 | |
970f6abe | 702 | else if (rp != NULL) |
0272a10d VZ |
703 | for (i = 0; i < num_rows; i++) |
704 | { | |
705 | png_bytep rptr = *rp; | |
b61cc19c | 706 | png_read_row(png_ptr, rptr, NULL); |
0272a10d VZ |
707 | rp++; |
708 | } | |
9c0d9ce3 | 709 | |
970f6abe | 710 | else if (dp != NULL) |
0272a10d VZ |
711 | for (i = 0; i < num_rows; i++) |
712 | { | |
713 | png_bytep dptr = *dp; | |
b61cc19c | 714 | png_read_row(png_ptr, NULL, dptr); |
0272a10d VZ |
715 | dp++; |
716 | } | |
717 | } | |
b61cc19c | 718 | #endif /* PNG_SEQUENTIAL_READ_SUPPORTED */ |
0272a10d | 719 | |
b61cc19c | 720 | #ifdef PNG_SEQUENTIAL_READ_SUPPORTED |
0272a10d VZ |
721 | /* Read the entire image. If the image has an alpha channel or a tRNS |
722 | * chunk, and you have called png_handle_alpha()[*], you will need to | |
723 | * initialize the image to the current image that PNG will be overlaying. | |
724 | * We set the num_rows again here, in case it was incorrectly set in | |
725 | * png_read_start_row() by a call to png_read_update_info() or | |
726 | * png_start_read_image() if png_set_interlace_handling() wasn't called | |
727 | * prior to either of these functions like it should have been. You can | |
728 | * only call this function once. If you desire to have an image for | |
729 | * each pass of a interlaced image, use png_read_rows() instead. | |
730 | * | |
731 | * [*] png_handle_alpha() does not exist yet, as of this version of libpng | |
732 | */ | |
733 | void PNGAPI | |
734 | png_read_image(png_structp png_ptr, png_bytepp image) | |
735 | { | |
970f6abe | 736 | png_uint_32 i, image_height; |
0272a10d VZ |
737 | int pass, j; |
738 | png_bytepp rp; | |
739 | ||
970f6abe | 740 | png_debug(1, "in png_read_image"); |
9c0d9ce3 | 741 | |
b61cc19c PC |
742 | if (png_ptr == NULL) |
743 | return; | |
0272a10d VZ |
744 | |
745 | #ifdef PNG_READ_INTERLACING_SUPPORTED | |
9c0d9ce3 DS |
746 | if (!(png_ptr->flags & PNG_FLAG_ROW_INIT)) |
747 | { | |
748 | pass = png_set_interlace_handling(png_ptr); | |
749 | /* And make sure transforms are initialized. */ | |
750 | png_start_read_image(png_ptr); | |
751 | } | |
752 | else | |
753 | { | |
754 | if (png_ptr->interlaced && !(png_ptr->transformations & PNG_INTERLACE)) | |
755 | { | |
756 | /* Caller called png_start_read_image or png_read_update_info without | |
757 | * first turning on the PNG_INTERLACE transform. We can fix this here, | |
758 | * but the caller should do it! | |
759 | */ | |
760 | png_warning(png_ptr, "Interlace handling should be turned on when " | |
761 | "using png_read_image"); | |
762 | /* Make sure this is set correctly */ | |
763 | png_ptr->num_rows = png_ptr->height; | |
764 | } | |
765 | ||
766 | /* Obtain the pass number, which also turns on the PNG_INTERLACE flag in | |
767 | * the above error case. | |
768 | */ | |
769 | pass = png_set_interlace_handling(png_ptr); | |
770 | } | |
0272a10d VZ |
771 | #else |
772 | if (png_ptr->interlaced) | |
773 | png_error(png_ptr, | |
9c0d9ce3 DS |
774 | "Cannot read interlaced image -- interlace handler disabled"); |
775 | ||
0272a10d VZ |
776 | pass = 1; |
777 | #endif | |
778 | ||
0272a10d | 779 | image_height=png_ptr->height; |
0272a10d VZ |
780 | |
781 | for (j = 0; j < pass; j++) | |
782 | { | |
783 | rp = image; | |
784 | for (i = 0; i < image_height; i++) | |
785 | { | |
b61cc19c | 786 | png_read_row(png_ptr, *rp, NULL); |
0272a10d VZ |
787 | rp++; |
788 | } | |
789 | } | |
790 | } | |
b61cc19c | 791 | #endif /* PNG_SEQUENTIAL_READ_SUPPORTED */ |
0272a10d | 792 | |
b61cc19c | 793 | #ifdef PNG_SEQUENTIAL_READ_SUPPORTED |
0272a10d VZ |
794 | /* Read the end of the PNG file. Will not read past the end of the |
795 | * file, will verify the end is accurate, and will read any comments | |
796 | * or time information at the end of the file, if info is not NULL. | |
797 | */ | |
798 | void PNGAPI | |
799 | png_read_end(png_structp png_ptr, png_infop info_ptr) | |
800 | { | |
970f6abe | 801 | png_debug(1, "in png_read_end"); |
9c0d9ce3 | 802 | |
b61cc19c PC |
803 | if (png_ptr == NULL) |
804 | return; | |
9c0d9ce3 | 805 | |
0272a10d VZ |
806 | png_crc_finish(png_ptr, 0); /* Finish off CRC from last IDAT chunk */ |
807 | ||
808 | do | |
809 | { | |
970f6abe | 810 | png_uint_32 length = png_read_chunk_header(png_ptr); |
9c0d9ce3 | 811 | png_uint_32 chunk_name = png_ptr->chunk_name; |
0272a10d | 812 | |
9c0d9ce3 | 813 | if (chunk_name == png_IHDR) |
0272a10d | 814 | png_handle_IHDR(png_ptr, info_ptr, length); |
9c0d9ce3 DS |
815 | |
816 | else if (chunk_name == png_IEND) | |
0272a10d | 817 | png_handle_IEND(png_ptr, info_ptr, length); |
9c0d9ce3 | 818 | |
0272a10d | 819 | #ifdef PNG_HANDLE_AS_UNKNOWN_SUPPORTED |
9c0d9ce3 DS |
820 | else if (png_chunk_unknown_handling(png_ptr, chunk_name) != |
821 | PNG_HANDLE_CHUNK_AS_DEFAULT) | |
0272a10d | 822 | { |
9c0d9ce3 | 823 | if (chunk_name == png_IDAT) |
0272a10d VZ |
824 | { |
825 | if ((length > 0) || (png_ptr->mode & PNG_HAVE_CHUNK_AFTER_IDAT)) | |
b61cc19c | 826 | png_benign_error(png_ptr, "Too many IDATs found"); |
0272a10d VZ |
827 | } |
828 | png_handle_unknown(png_ptr, info_ptr, length); | |
9c0d9ce3 | 829 | if (chunk_name == png_PLTE) |
0272a10d VZ |
830 | png_ptr->mode |= PNG_HAVE_PLTE; |
831 | } | |
832 | #endif | |
9c0d9ce3 DS |
833 | |
834 | else if (chunk_name == png_IDAT) | |
0272a10d VZ |
835 | { |
836 | /* Zero length IDATs are legal after the last IDAT has been | |
837 | * read, but not after other chunks have been read. | |
838 | */ | |
839 | if ((length > 0) || (png_ptr->mode & PNG_HAVE_CHUNK_AFTER_IDAT)) | |
b61cc19c | 840 | png_benign_error(png_ptr, "Too many IDATs found"); |
9c0d9ce3 | 841 | |
0272a10d VZ |
842 | png_crc_finish(png_ptr, length); |
843 | } | |
9c0d9ce3 | 844 | else if (chunk_name == png_PLTE) |
0272a10d | 845 | png_handle_PLTE(png_ptr, info_ptr, length); |
9c0d9ce3 | 846 | |
b61cc19c | 847 | #ifdef PNG_READ_bKGD_SUPPORTED |
9c0d9ce3 | 848 | else if (chunk_name == png_bKGD) |
0272a10d VZ |
849 | png_handle_bKGD(png_ptr, info_ptr, length); |
850 | #endif | |
9c0d9ce3 | 851 | |
b61cc19c | 852 | #ifdef PNG_READ_cHRM_SUPPORTED |
9c0d9ce3 | 853 | else if (chunk_name == png_cHRM) |
0272a10d VZ |
854 | png_handle_cHRM(png_ptr, info_ptr, length); |
855 | #endif | |
9c0d9ce3 | 856 | |
b61cc19c | 857 | #ifdef PNG_READ_gAMA_SUPPORTED |
9c0d9ce3 | 858 | else if (chunk_name == png_gAMA) |
0272a10d VZ |
859 | png_handle_gAMA(png_ptr, info_ptr, length); |
860 | #endif | |
9c0d9ce3 | 861 | |
b61cc19c | 862 | #ifdef PNG_READ_hIST_SUPPORTED |
9c0d9ce3 | 863 | else if (chunk_name == png_hIST) |
0272a10d VZ |
864 | png_handle_hIST(png_ptr, info_ptr, length); |
865 | #endif | |
9c0d9ce3 | 866 | |
b61cc19c | 867 | #ifdef PNG_READ_oFFs_SUPPORTED |
9c0d9ce3 | 868 | else if (chunk_name == png_oFFs) |
0272a10d VZ |
869 | png_handle_oFFs(png_ptr, info_ptr, length); |
870 | #endif | |
9c0d9ce3 | 871 | |
b61cc19c | 872 | #ifdef PNG_READ_pCAL_SUPPORTED |
9c0d9ce3 | 873 | else if (chunk_name == png_pCAL) |
0272a10d VZ |
874 | png_handle_pCAL(png_ptr, info_ptr, length); |
875 | #endif | |
9c0d9ce3 | 876 | |
b61cc19c | 877 | #ifdef PNG_READ_sCAL_SUPPORTED |
9c0d9ce3 | 878 | else if (chunk_name == png_sCAL) |
0272a10d VZ |
879 | png_handle_sCAL(png_ptr, info_ptr, length); |
880 | #endif | |
9c0d9ce3 | 881 | |
b61cc19c | 882 | #ifdef PNG_READ_pHYs_SUPPORTED |
9c0d9ce3 | 883 | else if (chunk_name == png_pHYs) |
0272a10d VZ |
884 | png_handle_pHYs(png_ptr, info_ptr, length); |
885 | #endif | |
9c0d9ce3 | 886 | |
b61cc19c | 887 | #ifdef PNG_READ_sBIT_SUPPORTED |
9c0d9ce3 | 888 | else if (chunk_name == png_sBIT) |
0272a10d VZ |
889 | png_handle_sBIT(png_ptr, info_ptr, length); |
890 | #endif | |
9c0d9ce3 | 891 | |
b61cc19c | 892 | #ifdef PNG_READ_sRGB_SUPPORTED |
9c0d9ce3 | 893 | else if (chunk_name == png_sRGB) |
0272a10d VZ |
894 | png_handle_sRGB(png_ptr, info_ptr, length); |
895 | #endif | |
9c0d9ce3 | 896 | |
b61cc19c | 897 | #ifdef PNG_READ_iCCP_SUPPORTED |
9c0d9ce3 | 898 | else if (chunk_name == png_iCCP) |
0272a10d VZ |
899 | png_handle_iCCP(png_ptr, info_ptr, length); |
900 | #endif | |
9c0d9ce3 | 901 | |
b61cc19c | 902 | #ifdef PNG_READ_sPLT_SUPPORTED |
9c0d9ce3 | 903 | else if (chunk_name == png_sPLT) |
0272a10d VZ |
904 | png_handle_sPLT(png_ptr, info_ptr, length); |
905 | #endif | |
9c0d9ce3 | 906 | |
b61cc19c | 907 | #ifdef PNG_READ_tEXt_SUPPORTED |
9c0d9ce3 | 908 | else if (chunk_name == png_tEXt) |
0272a10d VZ |
909 | png_handle_tEXt(png_ptr, info_ptr, length); |
910 | #endif | |
9c0d9ce3 | 911 | |
b61cc19c | 912 | #ifdef PNG_READ_tIME_SUPPORTED |
9c0d9ce3 | 913 | else if (chunk_name == png_tIME) |
0272a10d VZ |
914 | png_handle_tIME(png_ptr, info_ptr, length); |
915 | #endif | |
9c0d9ce3 | 916 | |
b61cc19c | 917 | #ifdef PNG_READ_tRNS_SUPPORTED |
9c0d9ce3 | 918 | else if (chunk_name == png_tRNS) |
0272a10d VZ |
919 | png_handle_tRNS(png_ptr, info_ptr, length); |
920 | #endif | |
9c0d9ce3 | 921 | |
b61cc19c | 922 | #ifdef PNG_READ_zTXt_SUPPORTED |
9c0d9ce3 | 923 | else if (chunk_name == png_zTXt) |
0272a10d VZ |
924 | png_handle_zTXt(png_ptr, info_ptr, length); |
925 | #endif | |
9c0d9ce3 | 926 | |
b61cc19c | 927 | #ifdef PNG_READ_iTXt_SUPPORTED |
9c0d9ce3 | 928 | else if (chunk_name == png_iTXt) |
0272a10d VZ |
929 | png_handle_iTXt(png_ptr, info_ptr, length); |
930 | #endif | |
9c0d9ce3 | 931 | |
0272a10d VZ |
932 | else |
933 | png_handle_unknown(png_ptr, info_ptr, length); | |
934 | } while (!(png_ptr->mode & PNG_HAVE_IEND)); | |
935 | } | |
b61cc19c | 936 | #endif /* PNG_SEQUENTIAL_READ_SUPPORTED */ |
0272a10d | 937 | |
b61cc19c | 938 | /* Free all memory used by the read */ |
0272a10d VZ |
939 | void PNGAPI |
940 | png_destroy_read_struct(png_structpp png_ptr_ptr, png_infopp info_ptr_ptr, | |
9c0d9ce3 | 941 | png_infopp end_info_ptr_ptr) |
0272a10d VZ |
942 | { |
943 | png_structp png_ptr = NULL; | |
944 | png_infop info_ptr = NULL, end_info_ptr = NULL; | |
945 | #ifdef PNG_USER_MEM_SUPPORTED | |
970f6abe VZ |
946 | png_free_ptr free_fn = NULL; |
947 | png_voidp mem_ptr = NULL; | |
0272a10d VZ |
948 | #endif |
949 | ||
970f6abe | 950 | png_debug(1, "in png_destroy_read_struct"); |
9c0d9ce3 | 951 | |
0272a10d VZ |
952 | if (png_ptr_ptr != NULL) |
953 | png_ptr = *png_ptr_ptr; | |
970f6abe VZ |
954 | if (png_ptr == NULL) |
955 | return; | |
956 | ||
957 | #ifdef PNG_USER_MEM_SUPPORTED | |
958 | free_fn = png_ptr->free_fn; | |
959 | mem_ptr = png_ptr->mem_ptr; | |
960 | #endif | |
0272a10d VZ |
961 | |
962 | if (info_ptr_ptr != NULL) | |
963 | info_ptr = *info_ptr_ptr; | |
964 | ||
965 | if (end_info_ptr_ptr != NULL) | |
966 | end_info_ptr = *end_info_ptr_ptr; | |
967 | ||
0272a10d VZ |
968 | png_read_destroy(png_ptr, info_ptr, end_info_ptr); |
969 | ||
970 | if (info_ptr != NULL) | |
971 | { | |
b61cc19c | 972 | #ifdef PNG_TEXT_SUPPORTED |
0272a10d VZ |
973 | png_free_data(png_ptr, info_ptr, PNG_FREE_TEXT, -1); |
974 | #endif | |
975 | ||
976 | #ifdef PNG_USER_MEM_SUPPORTED | |
977 | png_destroy_struct_2((png_voidp)info_ptr, (png_free_ptr)free_fn, | |
978 | (png_voidp)mem_ptr); | |
979 | #else | |
980 | png_destroy_struct((png_voidp)info_ptr); | |
981 | #endif | |
982 | *info_ptr_ptr = NULL; | |
983 | } | |
984 | ||
985 | if (end_info_ptr != NULL) | |
986 | { | |
b61cc19c | 987 | #ifdef PNG_READ_TEXT_SUPPORTED |
0272a10d VZ |
988 | png_free_data(png_ptr, end_info_ptr, PNG_FREE_TEXT, -1); |
989 | #endif | |
990 | #ifdef PNG_USER_MEM_SUPPORTED | |
991 | png_destroy_struct_2((png_voidp)end_info_ptr, (png_free_ptr)free_fn, | |
9c0d9ce3 | 992 | (png_voidp)mem_ptr); |
0272a10d VZ |
993 | #else |
994 | png_destroy_struct((png_voidp)end_info_ptr); | |
995 | #endif | |
996 | *end_info_ptr_ptr = NULL; | |
997 | } | |
998 | ||
999 | if (png_ptr != NULL) | |
1000 | { | |
1001 | #ifdef PNG_USER_MEM_SUPPORTED | |
1002 | png_destroy_struct_2((png_voidp)png_ptr, (png_free_ptr)free_fn, | |
1003 | (png_voidp)mem_ptr); | |
1004 | #else | |
1005 | png_destroy_struct((png_voidp)png_ptr); | |
1006 | #endif | |
1007 | *png_ptr_ptr = NULL; | |
1008 | } | |
1009 | } | |
1010 | ||
b61cc19c | 1011 | /* Free all memory used by the read (old method) */ |
0272a10d | 1012 | void /* PRIVATE */ |
b61cc19c PC |
1013 | png_read_destroy(png_structp png_ptr, png_infop info_ptr, |
1014 | png_infop end_info_ptr) | |
0272a10d VZ |
1015 | { |
1016 | #ifdef PNG_SETJMP_SUPPORTED | |
1017 | jmp_buf tmp_jmp; | |
1018 | #endif | |
1019 | png_error_ptr error_fn; | |
9c0d9ce3 | 1020 | #ifdef PNG_WARNINGS_SUPPORTED |
0272a10d | 1021 | png_error_ptr warning_fn; |
9c0d9ce3 | 1022 | #endif |
0272a10d VZ |
1023 | png_voidp error_ptr; |
1024 | #ifdef PNG_USER_MEM_SUPPORTED | |
1025 | png_free_ptr free_fn; | |
1026 | #endif | |
1027 | ||
970f6abe | 1028 | png_debug(1, "in png_read_destroy"); |
9c0d9ce3 | 1029 | |
0272a10d VZ |
1030 | if (info_ptr != NULL) |
1031 | png_info_destroy(png_ptr, info_ptr); | |
1032 | ||
1033 | if (end_info_ptr != NULL) | |
1034 | png_info_destroy(png_ptr, end_info_ptr); | |
1035 | ||
9c0d9ce3 DS |
1036 | #ifdef PNG_READ_GAMMA_SUPPORTED |
1037 | png_destroy_gamma_table(png_ptr); | |
1038 | #endif | |
1039 | ||
0272a10d VZ |
1040 | png_free(png_ptr, png_ptr->zbuf); |
1041 | png_free(png_ptr, png_ptr->big_row_buf); | |
9c0d9ce3 | 1042 | png_free(png_ptr, png_ptr->big_prev_row); |
970f6abe | 1043 | png_free(png_ptr, png_ptr->chunkdata); |
9c0d9ce3 | 1044 | |
b61cc19c | 1045 | #ifdef PNG_READ_QUANTIZE_SUPPORTED |
0272a10d | 1046 | png_free(png_ptr, png_ptr->palette_lookup); |
b61cc19c | 1047 | png_free(png_ptr, png_ptr->quantize_index); |
0272a10d | 1048 | #endif |
9c0d9ce3 | 1049 | |
0272a10d VZ |
1050 | if (png_ptr->free_me & PNG_FREE_PLTE) |
1051 | png_zfree(png_ptr, png_ptr->palette); | |
1052 | png_ptr->free_me &= ~PNG_FREE_PLTE; | |
9c0d9ce3 | 1053 | |
0272a10d VZ |
1054 | #if defined(PNG_tRNS_SUPPORTED) || \ |
1055 | defined(PNG_READ_EXPAND_SUPPORTED) || defined(PNG_READ_BACKGROUND_SUPPORTED) | |
0272a10d | 1056 | if (png_ptr->free_me & PNG_FREE_TRNS) |
b61cc19c | 1057 | png_free(png_ptr, png_ptr->trans_alpha); |
0272a10d | 1058 | png_ptr->free_me &= ~PNG_FREE_TRNS; |
0272a10d | 1059 | #endif |
9c0d9ce3 | 1060 | |
b61cc19c | 1061 | #ifdef PNG_READ_hIST_SUPPORTED |
0272a10d VZ |
1062 | if (png_ptr->free_me & PNG_FREE_HIST) |
1063 | png_free(png_ptr, png_ptr->hist); | |
1064 | png_ptr->free_me &= ~PNG_FREE_HIST; | |
0272a10d | 1065 | #endif |
0272a10d VZ |
1066 | |
1067 | inflateEnd(&png_ptr->zstream); | |
9c0d9ce3 | 1068 | |
0272a10d VZ |
1069 | #ifdef PNG_PROGRESSIVE_READ_SUPPORTED |
1070 | png_free(png_ptr, png_ptr->save_buffer); | |
1071 | #endif | |
1072 | ||
1073 | #ifdef PNG_PROGRESSIVE_READ_SUPPORTED | |
1074 | #ifdef PNG_TEXT_SUPPORTED | |
1075 | png_free(png_ptr, png_ptr->current_text); | |
1076 | #endif /* PNG_TEXT_SUPPORTED */ | |
1077 | #endif /* PNG_PROGRESSIVE_READ_SUPPORTED */ | |
1078 | ||
1079 | /* Save the important info out of the png_struct, in case it is | |
1080 | * being used again. | |
1081 | */ | |
1082 | #ifdef PNG_SETJMP_SUPPORTED | |
9c0d9ce3 | 1083 | png_memcpy(tmp_jmp, png_ptr->longjmp_buffer, png_sizeof(jmp_buf)); |
0272a10d VZ |
1084 | #endif |
1085 | ||
1086 | error_fn = png_ptr->error_fn; | |
9c0d9ce3 | 1087 | #ifdef PNG_WARNINGS_SUPPORTED |
0272a10d | 1088 | warning_fn = png_ptr->warning_fn; |
9c0d9ce3 | 1089 | #endif |
0272a10d VZ |
1090 | error_ptr = png_ptr->error_ptr; |
1091 | #ifdef PNG_USER_MEM_SUPPORTED | |
1092 | free_fn = png_ptr->free_fn; | |
1093 | #endif | |
1094 | ||
970f6abe | 1095 | png_memset(png_ptr, 0, png_sizeof(png_struct)); |
0272a10d VZ |
1096 | |
1097 | png_ptr->error_fn = error_fn; | |
9c0d9ce3 | 1098 | #ifdef PNG_WARNINGS_SUPPORTED |
0272a10d | 1099 | png_ptr->warning_fn = warning_fn; |
9c0d9ce3 | 1100 | #endif |
0272a10d VZ |
1101 | png_ptr->error_ptr = error_ptr; |
1102 | #ifdef PNG_USER_MEM_SUPPORTED | |
1103 | png_ptr->free_fn = free_fn; | |
1104 | #endif | |
1105 | ||
1106 | #ifdef PNG_SETJMP_SUPPORTED | |
9c0d9ce3 | 1107 | png_memcpy(png_ptr->longjmp_buffer, tmp_jmp, png_sizeof(jmp_buf)); |
0272a10d VZ |
1108 | #endif |
1109 | ||
1110 | } | |
1111 | ||
1112 | void PNGAPI | |
1113 | png_set_read_status_fn(png_structp png_ptr, png_read_status_ptr read_row_fn) | |
1114 | { | |
b61cc19c PC |
1115 | if (png_ptr == NULL) |
1116 | return; | |
9c0d9ce3 | 1117 | |
0272a10d VZ |
1118 | png_ptr->read_row_fn = read_row_fn; |
1119 | } | |
1120 | ||
1121 | ||
b61cc19c PC |
1122 | #ifdef PNG_SEQUENTIAL_READ_SUPPORTED |
1123 | #ifdef PNG_INFO_IMAGE_SUPPORTED | |
0272a10d VZ |
1124 | void PNGAPI |
1125 | png_read_png(png_structp png_ptr, png_infop info_ptr, | |
1126 | int transforms, | |
1127 | voidp params) | |
1128 | { | |
1129 | int row; | |
1130 | ||
9c0d9ce3 | 1131 | if (png_ptr == NULL || info_ptr == NULL) |
b61cc19c | 1132 | return; |
0272a10d VZ |
1133 | |
1134 | /* png_read_info() gives us all of the information from the | |
1135 | * PNG file before the first IDAT (image data chunk). | |
1136 | */ | |
1137 | png_read_info(png_ptr, info_ptr); | |
1138 | if (info_ptr->height > PNG_UINT_32_MAX/png_sizeof(png_bytep)) | |
970f6abe | 1139 | png_error(png_ptr, "Image is too high to process with png_read_png()"); |
0272a10d VZ |
1140 | |
1141 | /* -------------- image transformations start here ------------------- */ | |
1142 | ||
9c0d9ce3 DS |
1143 | #ifdef PNG_READ_SCALE_16_TO_8_SUPPORTED |
1144 | /* Tell libpng to strip 16-bit/color files down to 8 bits per color. | |
1145 | */ | |
1146 | if (transforms & PNG_TRANSFORM_SCALE_16) | |
1147 | { | |
1148 | /* Added at libpng-1.5.4. "strip_16" produces the same result that it | |
1149 | * did in earlier versions, while "scale_16" is now more accurate. | |
1150 | */ | |
1151 | png_set_scale_16(png_ptr); | |
1152 | } | |
1153 | #endif | |
1154 | ||
1155 | #ifdef PNG_READ_STRIP_16_TO_8_SUPPORTED | |
1156 | /* If both SCALE and STRIP are required pngrtran will effectively cancel the | |
1157 | * latter by doing SCALE first. This is ok and allows apps not to check for | |
1158 | * which is supported to get the right answer. | |
0272a10d VZ |
1159 | */ |
1160 | if (transforms & PNG_TRANSFORM_STRIP_16) | |
b61cc19c | 1161 | png_set_strip_16(png_ptr); |
0272a10d VZ |
1162 | #endif |
1163 | ||
b61cc19c | 1164 | #ifdef PNG_READ_STRIP_ALPHA_SUPPORTED |
0272a10d VZ |
1165 | /* Strip alpha bytes from the input data without combining with |
1166 | * the background (not recommended). | |
1167 | */ | |
1168 | if (transforms & PNG_TRANSFORM_STRIP_ALPHA) | |
b61cc19c | 1169 | png_set_strip_alpha(png_ptr); |
0272a10d VZ |
1170 | #endif |
1171 | ||
1172 | #if defined(PNG_READ_PACK_SUPPORTED) && !defined(PNG_READ_EXPAND_SUPPORTED) | |
1173 | /* Extract multiple pixels with bit depths of 1, 2, or 4 from a single | |
1174 | * byte into separate bytes (useful for paletted and grayscale images). | |
1175 | */ | |
1176 | if (transforms & PNG_TRANSFORM_PACKING) | |
b61cc19c | 1177 | png_set_packing(png_ptr); |
0272a10d VZ |
1178 | #endif |
1179 | ||
b61cc19c | 1180 | #ifdef PNG_READ_PACKSWAP_SUPPORTED |
0272a10d VZ |
1181 | /* Change the order of packed pixels to least significant bit first |
1182 | * (not useful if you are using png_set_packing). | |
1183 | */ | |
1184 | if (transforms & PNG_TRANSFORM_PACKSWAP) | |
b61cc19c | 1185 | png_set_packswap(png_ptr); |
0272a10d VZ |
1186 | #endif |
1187 | ||
b61cc19c | 1188 | #ifdef PNG_READ_EXPAND_SUPPORTED |
0272a10d VZ |
1189 | /* Expand paletted colors into true RGB triplets |
1190 | * Expand grayscale images to full 8 bits from 1, 2, or 4 bits/pixel | |
1191 | * Expand paletted or RGB images with transparency to full alpha | |
1192 | * channels so the data will be available as RGBA quartets. | |
1193 | */ | |
1194 | if (transforms & PNG_TRANSFORM_EXPAND) | |
b61cc19c PC |
1195 | if ((png_ptr->bit_depth < 8) || |
1196 | (png_ptr->color_type == PNG_COLOR_TYPE_PALETTE) || | |
1197 | (png_get_valid(png_ptr, info_ptr, PNG_INFO_tRNS))) | |
0272a10d VZ |
1198 | png_set_expand(png_ptr); |
1199 | #endif | |
1200 | ||
b61cc19c | 1201 | /* We don't handle background color or gamma transformation or quantizing. |
0272a10d VZ |
1202 | */ |
1203 | ||
b61cc19c PC |
1204 | #ifdef PNG_READ_INVERT_SUPPORTED |
1205 | /* Invert monochrome files to have 0 as white and 1 as black | |
0272a10d VZ |
1206 | */ |
1207 | if (transforms & PNG_TRANSFORM_INVERT_MONO) | |
b61cc19c | 1208 | png_set_invert_mono(png_ptr); |
0272a10d VZ |
1209 | #endif |
1210 | ||
b61cc19c | 1211 | #ifdef PNG_READ_SHIFT_SUPPORTED |
0272a10d VZ |
1212 | /* If you want to shift the pixel values from the range [0,255] or |
1213 | * [0,65535] to the original [0,7] or [0,31], or whatever range the | |
1214 | * colors were originally in: | |
1215 | */ | |
1216 | if ((transforms & PNG_TRANSFORM_SHIFT) | |
1217 | && png_get_valid(png_ptr, info_ptr, PNG_INFO_sBIT)) | |
1218 | { | |
1219 | png_color_8p sig_bit; | |
1220 | ||
1221 | png_get_sBIT(png_ptr, info_ptr, &sig_bit); | |
1222 | png_set_shift(png_ptr, sig_bit); | |
1223 | } | |
1224 | #endif | |
1225 | ||
b61cc19c | 1226 | #ifdef PNG_READ_BGR_SUPPORTED |
9c0d9ce3 | 1227 | /* Flip the RGB pixels to BGR (or RGBA to BGRA) */ |
0272a10d | 1228 | if (transforms & PNG_TRANSFORM_BGR) |
b61cc19c | 1229 | png_set_bgr(png_ptr); |
0272a10d VZ |
1230 | #endif |
1231 | ||
b61cc19c | 1232 | #ifdef PNG_READ_SWAP_ALPHA_SUPPORTED |
9c0d9ce3 | 1233 | /* Swap the RGBA or GA data to ARGB or AG (or BGRA to ABGR) */ |
0272a10d | 1234 | if (transforms & PNG_TRANSFORM_SWAP_ALPHA) |
9c0d9ce3 | 1235 | png_set_swap_alpha(png_ptr); |
0272a10d VZ |
1236 | #endif |
1237 | ||
b61cc19c | 1238 | #ifdef PNG_READ_SWAP_SUPPORTED |
9c0d9ce3 | 1239 | /* Swap bytes of 16-bit files to least significant byte first */ |
0272a10d | 1240 | if (transforms & PNG_TRANSFORM_SWAP_ENDIAN) |
b61cc19c PC |
1241 | png_set_swap(png_ptr); |
1242 | #endif | |
1243 | ||
1244 | /* Added at libpng-1.2.41 */ | |
1245 | #ifdef PNG_READ_INVERT_ALPHA_SUPPORTED | |
9c0d9ce3 | 1246 | /* Invert the alpha channel from opacity to transparency */ |
b61cc19c | 1247 | if (transforms & PNG_TRANSFORM_INVERT_ALPHA) |
9c0d9ce3 | 1248 | png_set_invert_alpha(png_ptr); |
b61cc19c PC |
1249 | #endif |
1250 | ||
1251 | /* Added at libpng-1.2.41 */ | |
1252 | #ifdef PNG_READ_GRAY_TO_RGB_SUPPORTED | |
9c0d9ce3 | 1253 | /* Expand grayscale image to RGB */ |
b61cc19c | 1254 | if (transforms & PNG_TRANSFORM_GRAY_TO_RGB) |
9c0d9ce3 DS |
1255 | png_set_gray_to_rgb(png_ptr); |
1256 | #endif | |
1257 | ||
1258 | /* Added at libpng-1.5.4 */ | |
1259 | #ifdef PNG_READ_EXPAND_16_SUPPORTED | |
1260 | if (transforms & PNG_TRANSFORM_EXPAND_16) | |
1261 | png_set_expand_16(png_ptr); | |
0272a10d VZ |
1262 | #endif |
1263 | ||
1264 | /* We don't handle adding filler bytes */ | |
1265 | ||
9c0d9ce3 DS |
1266 | /* We use png_read_image and rely on that for interlace handling, but we also |
1267 | * call png_read_update_info therefore must turn on interlace handling now: | |
1268 | */ | |
1269 | (void)png_set_interlace_handling(png_ptr); | |
1270 | ||
0272a10d VZ |
1271 | /* Optional call to gamma correct and add the background to the palette |
1272 | * and update info structure. REQUIRED if you are expecting libpng to | |
1273 | * update the palette for you (i.e., you selected such a transform above). | |
1274 | */ | |
1275 | png_read_update_info(png_ptr, info_ptr); | |
1276 | ||
1277 | /* -------------- image transformations end here ------------------- */ | |
1278 | ||
0272a10d | 1279 | png_free_data(png_ptr, info_ptr, PNG_FREE_ROWS, 0); |
970f6abe | 1280 | if (info_ptr->row_pointers == NULL) |
0272a10d | 1281 | { |
9c0d9ce3 | 1282 | png_uint_32 iptr; |
b61cc19c | 1283 | |
0272a10d | 1284 | info_ptr->row_pointers = (png_bytepp)png_malloc(png_ptr, |
9c0d9ce3 | 1285 | info_ptr->height * png_sizeof(png_bytep)); |
b61cc19c PC |
1286 | for (iptr=0; iptr<info_ptr->height; iptr++) |
1287 | info_ptr->row_pointers[iptr] = NULL; | |
1288 | ||
0272a10d | 1289 | info_ptr->free_me |= PNG_FREE_ROWS; |
b61cc19c | 1290 | |
0272a10d | 1291 | for (row = 0; row < (int)info_ptr->height; row++) |
0272a10d VZ |
1292 | info_ptr->row_pointers[row] = (png_bytep)png_malloc(png_ptr, |
1293 | png_get_rowbytes(png_ptr, info_ptr)); | |
0272a10d VZ |
1294 | } |
1295 | ||
1296 | png_read_image(png_ptr, info_ptr->row_pointers); | |
1297 | info_ptr->valid |= PNG_INFO_IDAT; | |
1298 | ||
b61cc19c | 1299 | /* Read rest of file, and get additional chunks in info_ptr - REQUIRED */ |
0272a10d VZ |
1300 | png_read_end(png_ptr, info_ptr); |
1301 | ||
9c0d9ce3 DS |
1302 | PNG_UNUSED(transforms) /* Quiet compiler warnings */ |
1303 | PNG_UNUSED(params) | |
0272a10d VZ |
1304 | |
1305 | } | |
1306 | #endif /* PNG_INFO_IMAGE_SUPPORTED */ | |
b61cc19c | 1307 | #endif /* PNG_SEQUENTIAL_READ_SUPPORTED */ |
0272a10d | 1308 | #endif /* PNG_READ_SUPPORTED */ |