Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | ; |
michael@0 | 2 | ; jdct.inc - private declarations for forward & reverse DCT subsystems |
michael@0 | 3 | ; |
michael@0 | 4 | ; Copyright 2009 Pierre Ossman <ossman@cendio.se> for Cendio AB |
michael@0 | 5 | ; |
michael@0 | 6 | ; Based on |
michael@0 | 7 | ; x86 SIMD extension for IJG JPEG library |
michael@0 | 8 | ; Copyright (C) 1999-2006, MIYASAKA Masaru. |
michael@0 | 9 | ; For conditions of distribution and use, see copyright notice in jsimdext.inc |
michael@0 | 10 | ; |
michael@0 | 11 | ; [TAB8] |
michael@0 | 12 | |
michael@0 | 13 | ; Each IDCT routine is responsible for range-limiting its results and |
michael@0 | 14 | ; converting them to unsigned form (0..MAXJSAMPLE). The raw outputs could |
michael@0 | 15 | ; be quite far out of range if the input data is corrupt, so a bulletproof |
michael@0 | 16 | ; range-limiting step is required. We use a mask-and-table-lookup method |
michael@0 | 17 | ; to do the combined operations quickly. |
michael@0 | 18 | ; |
michael@0 | 19 | %define RANGE_MASK (MAXJSAMPLE * 4 + 3) ; 2 bits wider than legal samples |
michael@0 | 20 | |
michael@0 | 21 | %define ROW(n,b,s) ((b)+(n)*(s)) |
michael@0 | 22 | %define COL(n,b,s) ((b)+(n)*(s)*DCTSIZE) |
michael@0 | 23 | |
michael@0 | 24 | %define DWBLOCK(m,n,b,s) ((b)+(m)*DCTSIZE*(s)+(n)*SIZEOF_DWORD) |
michael@0 | 25 | %define MMBLOCK(m,n,b,s) ((b)+(m)*DCTSIZE*(s)+(n)*SIZEOF_MMWORD) |
michael@0 | 26 | %define XMMBLOCK(m,n,b,s) ((b)+(m)*DCTSIZE*(s)+(n)*SIZEOF_XMMWORD) |
michael@0 | 27 | |
michael@0 | 28 | ; -------------------------------------------------------------------------- |