|  | // Tree.cs | 
|  | // ------------------------------------------------------------------ | 
|  | // | 
|  | // Copyright (c) 2009 Dino Chiesa and Microsoft Corporation. | 
|  | // All rights reserved. | 
|  | // | 
|  | // This code module is part of DotNetZip, a zipfile class library. | 
|  | // | 
|  | // ------------------------------------------------------------------ | 
|  | // | 
|  | // This code is licensed under the Microsoft Public License. | 
|  | // See the file License.txt for the license details. | 
|  | // More info on: http://dotnetzip.codeplex.com | 
|  | // | 
|  | // ------------------------------------------------------------------ | 
|  | // | 
|  | // last saved (in emacs): | 
|  | // Time-stamp: <2009-October-28 13:29:50> | 
|  | // | 
|  | // ------------------------------------------------------------------ | 
|  | // | 
|  | // This module defines classes for zlib compression and | 
|  | // decompression. This code is derived from the jzlib implementation of | 
|  | // zlib. In keeping with the license for jzlib, the copyright to that | 
|  | // code is below. | 
|  | // | 
|  | // ------------------------------------------------------------------ | 
|  | // | 
|  | // Copyright (c) 2000,2001,2002,2003 ymnk, JCraft,Inc. All rights reserved. | 
|  | // | 
|  | // Redistribution and use in source and binary forms, with or without | 
|  | // modification, are permitted provided that the following conditions are met: | 
|  | // | 
|  | // 1. Redistributions of source code must retain the above copyright notice, | 
|  | // this list of conditions and the following disclaimer. | 
|  | // | 
|  | // 2. Redistributions in binary form must reproduce the above copyright | 
|  | // notice, this list of conditions and the following disclaimer in | 
|  | // the documentation and/or other materials provided with the distribution. | 
|  | // | 
|  | // 3. The names of the authors may not be used to endorse or promote products | 
|  | // derived from this software without specific prior written permission. | 
|  | // | 
|  | // THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, | 
|  | // INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND | 
|  | // FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL JCRAFT, | 
|  | // INC. OR ANY CONTRIBUTORS TO THIS SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, | 
|  | // INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT | 
|  | // LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, | 
|  | // OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF | 
|  | // LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING | 
|  | // NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, | 
|  | // EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | 
|  | // | 
|  | // ----------------------------------------------------------------------- | 
|  | // | 
|  | // This program is based on zlib-1.1.3; credit to authors | 
|  | // Jean-loup Gailly(jloup@gzip.org) and Mark Adler(madler@alumni.caltech.edu) | 
|  | // and contributors of zlib. | 
|  | // | 
|  | // ----------------------------------------------------------------------- | 
|  |  | 
|  |  | 
|  | using System; | 
|  |  | 
|  | namespace OfficeOpenXml.Packaging.Ionic.Zlib | 
|  | { | 
|  | sealed class Tree | 
|  | { | 
|  | private static readonly int HEAP_SIZE = (2 * InternalConstants.L_CODES + 1); | 
|  |  | 
|  | // extra bits for each length code | 
|  | internal static readonly int[] ExtraLengthBits = new int[] | 
|  | { | 
|  | 0, 0, 0, 0, 0, 0, 0, 0, 1, 1, 1, 1, 2, 2, 2, 2, | 
|  | 3, 3, 3, 3, 4, 4, 4, 4, 5, 5, 5, 5, 0 | 
|  | }; | 
|  |  | 
|  | // extra bits for each distance code | 
|  | internal static readonly int[] ExtraDistanceBits = new int[] | 
|  | { | 
|  | 0, 0, 0, 0, 1, 1,  2,  2,  3,  3,  4,  4,  5,  5,  6,  6, | 
|  | 7, 7, 8, 8, 9, 9, 10, 10, 11, 11, 12, 12, 13, 13 | 
|  | }; | 
|  |  | 
|  | // extra bits for each bit length code | 
|  | internal static readonly int[] extra_blbits = new int[]{0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 2, 3, 7}; | 
|  |  | 
|  | internal static readonly sbyte[] bl_order = new sbyte[]{16, 17, 18, 0, 8, 7, 9, 6, 10, 5, 11, 4, 12, 3, 13, 2, 14, 1, 15}; | 
|  |  | 
|  |  | 
|  | // The lengths of the bit length codes are sent in order of decreasing | 
|  | // probability, to avoid transmitting the lengths for unused bit | 
|  | // length codes. | 
|  |  | 
|  | internal const int Buf_size = 8 * 2; | 
|  |  | 
|  | // see definition of array dist_code below | 
|  | //internal const int DIST_CODE_LEN = 512; | 
|  |  | 
|  | private static readonly sbyte[] _dist_code = new sbyte[] | 
|  | { | 
|  | 0,  1,  2,  3,  4,  4,  5,  5,  6,  6,  6,  6,  7,  7,  7,  7, | 
|  | 8,  8,  8,  8,  8,  8,  8,  8,  9,  9,  9,  9,  9,  9,  9,  9, | 
|  | 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, 10, | 
|  | 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, 11, | 
|  | 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, | 
|  | 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, 12, | 
|  | 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, | 
|  | 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, 13, | 
|  | 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, | 
|  | 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, | 
|  | 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, | 
|  | 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, 14, | 
|  | 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, | 
|  | 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, | 
|  | 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, | 
|  | 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, 15, | 
|  | 0,   0, 16, 17, 18, 18, 19, 19, 20, 20, 20, 20, 21, 21, 21, 21, | 
|  | 22, 22, 22, 22, 22, 22, 22, 22, 23, 23, 23, 23, 23, 23, 23, 23, | 
|  | 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, | 
|  | 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, | 
|  | 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, | 
|  | 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, | 
|  | 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, | 
|  | 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, | 
|  | 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, | 
|  | 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, | 
|  | 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, | 
|  | 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, 28, | 
|  | 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, | 
|  | 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, | 
|  | 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, | 
|  | 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29, 29 | 
|  | }; | 
|  |  | 
|  | internal static readonly sbyte[] LengthCode = new sbyte[] | 
|  | { | 
|  | 0,   1,  2,  3,  4,  5,  6,  7,  8,  8,  9,  9, 10, 10, 11, 11, | 
|  | 12, 12, 12, 12, 13, 13, 13, 13, 14, 14, 14, 14, 15, 15, 15, 15, | 
|  | 16, 16, 16, 16, 16, 16, 16, 16, 17, 17, 17, 17, 17, 17, 17, 17, | 
|  | 18, 18, 18, 18, 18, 18, 18, 18, 19, 19, 19, 19, 19, 19, 19, 19, | 
|  | 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, 20, | 
|  | 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, 21, | 
|  | 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, 22, | 
|  | 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, | 
|  | 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, | 
|  | 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, 24, | 
|  | 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, | 
|  | 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, 25, | 
|  | 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, | 
|  | 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, 26, | 
|  | 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, | 
|  | 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 27, 28 | 
|  | }; | 
|  |  | 
|  |  | 
|  | internal static readonly int[] LengthBase = new int[] | 
|  | { | 
|  | 0,   1,  2,  3,  4,  5,  6,   7,   8,  10,  12,  14, 16, 20, 24, 28, | 
|  | 32, 40, 48, 56, 64, 80, 96, 112, 128, 160, 192, 224, 0 | 
|  | }; | 
|  |  | 
|  |  | 
|  | internal static readonly int[] DistanceBase = new int[] | 
|  | { | 
|  | 0, 1, 2, 3, 4, 6, 8, 12, 16, 24, 32, 48, 64, 96, 128, 192, | 
|  | 256, 384, 512, 768, 1024, 1536, 2048, 3072, 4096, 6144, 8192, 12288, 16384, 24576 | 
|  | }; | 
|  |  | 
|  |  | 
|  | /// <summary> | 
|  | /// Map from a distance to a distance code. | 
|  | /// </summary> | 
|  | /// <remarks> | 
|  | /// No side effects. _dist_code[256] and _dist_code[257] are never used. | 
|  | /// </remarks> | 
|  | internal static int DistanceCode(int dist) | 
|  | { | 
|  | return (dist < 256) | 
|  | ? _dist_code[dist] | 
|  | : _dist_code[256 + SharedUtils.URShift(dist, 7)]; | 
|  | } | 
|  |  | 
|  | internal short[] dyn_tree; // the dynamic tree | 
|  | internal int max_code; // largest code with non zero frequency | 
|  | internal StaticTree staticTree; // the corresponding static tree | 
|  |  | 
|  | // Compute the optimal bit lengths for a tree and update the total bit length | 
|  | // for the current block. | 
|  | // IN assertion: the fields freq and dad are set, heap[heap_max] and | 
|  | //    above are the tree nodes sorted by increasing frequency. | 
|  | // OUT assertions: the field len is set to the optimal bit length, the | 
|  | //     array bl_count contains the frequencies for each bit length. | 
|  | //     The length opt_len is updated; static_len is also updated if stree is | 
|  | //     not null. | 
|  | internal void  gen_bitlen(DeflateManager s) | 
|  | { | 
|  | short[] tree = dyn_tree; | 
|  | short[] stree = staticTree.treeCodes; | 
|  | int[] extra = staticTree.extraBits; | 
|  | int base_Renamed = staticTree.extraBase; | 
|  | int max_length = staticTree.maxLength; | 
|  | int h; // heap index | 
|  | int n, m; // iterate over the tree elements | 
|  | int bits; // bit length | 
|  | int xbits; // extra bits | 
|  | short f; // frequency | 
|  | int overflow = 0; // number of elements with bit length too large | 
|  |  | 
|  | for (bits = 0; bits <= InternalConstants.MAX_BITS; bits++) | 
|  | s.bl_count[bits] = 0; | 
|  |  | 
|  | // In a first pass, compute the optimal bit lengths (which may | 
|  | // overflow in the case of the bit length tree). | 
|  | tree[s.heap[s.heap_max] * 2 + 1] = 0; // root of the heap | 
|  |  | 
|  | for (h = s.heap_max + 1; h < HEAP_SIZE; h++) | 
|  | { | 
|  | n = s.heap[h]; | 
|  | bits = tree[tree[n * 2 + 1] * 2 + 1] + 1; | 
|  | if (bits > max_length) | 
|  | { | 
|  | bits = max_length; overflow++; | 
|  | } | 
|  | tree[n * 2 + 1] = (short) bits; | 
|  | // We overwrite tree[n*2+1] which is no longer needed | 
|  |  | 
|  | if (n > max_code) | 
|  | continue; // not a leaf node | 
|  |  | 
|  | s.bl_count[bits]++; | 
|  | xbits = 0; | 
|  | if (n >= base_Renamed) | 
|  | xbits = extra[n - base_Renamed]; | 
|  | f = tree[n * 2]; | 
|  | s.opt_len += f * (bits + xbits); | 
|  | if (stree != null) | 
|  | s.static_len += f * (stree[n * 2 + 1] + xbits); | 
|  | } | 
|  | if (overflow == 0) | 
|  | return ; | 
|  |  | 
|  | // This happens for example on obj2 and pic of the Calgary corpus | 
|  | // Find the first bit length which could increase: | 
|  | do | 
|  | { | 
|  | bits = max_length - 1; | 
|  | while (s.bl_count[bits] == 0) | 
|  | bits--; | 
|  | s.bl_count[bits]--; // move one leaf down the tree | 
|  | s.bl_count[bits + 1] = (short) (s.bl_count[bits + 1] + 2); // move one overflow item as its brother | 
|  | s.bl_count[max_length]--; | 
|  | // The brother of the overflow item also moves one step up, | 
|  | // but this does not affect bl_count[max_length] | 
|  | overflow -= 2; | 
|  | } | 
|  | while (overflow > 0); | 
|  |  | 
|  | for (bits = max_length; bits != 0; bits--) | 
|  | { | 
|  | n = s.bl_count[bits]; | 
|  | while (n != 0) | 
|  | { | 
|  | m = s.heap[--h]; | 
|  | if (m > max_code) | 
|  | continue; | 
|  | if (tree[m * 2 + 1] != bits) | 
|  | { | 
|  | s.opt_len = (int) (s.opt_len + ((long) bits - (long) tree[m * 2 + 1]) * (long) tree[m * 2]); | 
|  | tree[m * 2 + 1] = (short) bits; | 
|  | } | 
|  | n--; | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | // Construct one Huffman tree and assigns the code bit strings and lengths. | 
|  | // Update the total bit length for the current block. | 
|  | // IN assertion: the field freq is set for all tree elements. | 
|  | // OUT assertions: the fields len and code are set to the optimal bit length | 
|  | //     and corresponding code. The length opt_len is updated; static_len is | 
|  | //     also updated if stree is not null. The field max_code is set. | 
|  | internal void  build_tree(DeflateManager s) | 
|  | { | 
|  | short[] tree  = dyn_tree; | 
|  | short[] stree = staticTree.treeCodes; | 
|  | int elems     = staticTree.elems; | 
|  | int n, m;            // iterate over heap elements | 
|  | int max_code  = -1;  // largest code with non zero frequency | 
|  | int node;            // new node being created | 
|  |  | 
|  | // Construct the initial heap, with least frequent element in | 
|  | // heap[1]. The sons of heap[n] are heap[2*n] and heap[2*n+1]. | 
|  | // heap[0] is not used. | 
|  | s.heap_len = 0; | 
|  | s.heap_max = HEAP_SIZE; | 
|  |  | 
|  | for (n = 0; n < elems; n++) | 
|  | { | 
|  | if (tree[n * 2] != 0) | 
|  | { | 
|  | s.heap[++s.heap_len] = max_code = n; | 
|  | s.depth[n] = 0; | 
|  | } | 
|  | else | 
|  | { | 
|  | tree[n * 2 + 1] = 0; | 
|  | } | 
|  | } | 
|  |  | 
|  | // The pkzip format requires that at least one distance code exists, | 
|  | // and that at least one bit should be sent even if there is only one | 
|  | // possible code. So to avoid special checks later on we force at least | 
|  | // two codes of non zero frequency. | 
|  | while (s.heap_len < 2) | 
|  | { | 
|  | node = s.heap[++s.heap_len] = (max_code < 2?++max_code:0); | 
|  | tree[node * 2] = 1; | 
|  | s.depth[node] = 0; | 
|  | s.opt_len--; | 
|  | if (stree != null) | 
|  | s.static_len -= stree[node * 2 + 1]; | 
|  | // node is 0 or 1 so it does not have extra bits | 
|  | } | 
|  | this.max_code = max_code; | 
|  |  | 
|  | // The elements heap[heap_len/2+1 .. heap_len] are leaves of the tree, | 
|  | // establish sub-heaps of increasing lengths: | 
|  |  | 
|  | for (n = s.heap_len / 2; n >= 1; n--) | 
|  | s.pqdownheap(tree, n); | 
|  |  | 
|  | // Construct the Huffman tree by repeatedly combining the least two | 
|  | // frequent nodes. | 
|  |  | 
|  | node = elems; // next internal node of the tree | 
|  | do | 
|  | { | 
|  | // n = node of least frequency | 
|  | n = s.heap[1]; | 
|  | s.heap[1] = s.heap[s.heap_len--]; | 
|  | s.pqdownheap(tree, 1); | 
|  | m = s.heap[1]; // m = node of next least frequency | 
|  |  | 
|  | s.heap[--s.heap_max] = n; // keep the nodes sorted by frequency | 
|  | s.heap[--s.heap_max] = m; | 
|  |  | 
|  | // Create a new node father of n and m | 
|  | tree[node * 2] = unchecked((short) (tree[n * 2] + tree[m * 2])); | 
|  | s.depth[node] = (sbyte) (System.Math.Max((byte) s.depth[n], (byte) s.depth[m]) + 1); | 
|  | tree[n * 2 + 1] = tree[m * 2 + 1] = (short) node; | 
|  |  | 
|  | // and insert the new node in the heap | 
|  | s.heap[1] = node++; | 
|  | s.pqdownheap(tree, 1); | 
|  | } | 
|  | while (s.heap_len >= 2); | 
|  |  | 
|  | s.heap[--s.heap_max] = s.heap[1]; | 
|  |  | 
|  | // At this point, the fields freq and dad are set. We can now | 
|  | // generate the bit lengths. | 
|  |  | 
|  | gen_bitlen(s); | 
|  |  | 
|  | // The field len is now set, we can generate the bit codes | 
|  | gen_codes(tree, max_code, s.bl_count); | 
|  | } | 
|  |  | 
|  | // Generate the codes for a given tree and bit counts (which need not be | 
|  | // optimal). | 
|  | // IN assertion: the array bl_count contains the bit length statistics for | 
|  | // the given tree and the field len is set for all tree elements. | 
|  | // OUT assertion: the field code is set for all tree elements of non | 
|  | //     zero code length. | 
|  | internal static void  gen_codes(short[] tree, int max_code, short[] bl_count) | 
|  | { | 
|  | short[] next_code = new short[InternalConstants.MAX_BITS + 1]; // next code value for each bit length | 
|  | short code = 0; // running code value | 
|  | int bits; // bit index | 
|  | int n; // code index | 
|  |  | 
|  | // The distribution counts are first used to generate the code values | 
|  | // without bit reversal. | 
|  | for (bits = 1; bits <= InternalConstants.MAX_BITS; bits++) | 
|  | unchecked { | 
|  | next_code[bits] = code = (short) ((code + bl_count[bits - 1]) << 1); | 
|  | } | 
|  |  | 
|  | // Check that the bit counts in bl_count are consistent. The last code | 
|  | // must be all ones. | 
|  | //Assert (code + bl_count[MAX_BITS]-1 == (1<<MAX_BITS)-1, | 
|  | //        "inconsistent bit counts"); | 
|  | //Tracev((stderr,"\ngen_codes: max_code %d ", max_code)); | 
|  |  | 
|  | for (n = 0; n <= max_code; n++) | 
|  | { | 
|  | int len = tree[n * 2 + 1]; | 
|  | if (len == 0) | 
|  | continue; | 
|  | // Now reverse the bits | 
|  | tree[n * 2] =  unchecked((short) (bi_reverse(next_code[len]++, len))); | 
|  | } | 
|  | } | 
|  |  | 
|  | // Reverse the first len bits of a code, using straightforward code (a faster | 
|  | // method would use a table) | 
|  | // IN assertion: 1 <= len <= 15 | 
|  | internal static int bi_reverse(int code, int len) | 
|  | { | 
|  | int res = 0; | 
|  | do | 
|  | { | 
|  | res |= code & 1; | 
|  | code >>= 1; //SharedUtils.URShift(code, 1); | 
|  | res <<= 1; | 
|  | } | 
|  | while (--len > 0); | 
|  | return res >> 1; | 
|  | } | 
|  | } | 
|  | } |