| 1 |
– |
/* Copyright (c) 1991 Regents of the University of California */ |
| 2 |
– |
|
| 1 |
|
#ifndef lint |
| 2 |
< |
static char SCCSid[] = "$SunId$ LBL"; |
| 2 |
> |
static const char RCSid[] = "$Id$"; |
| 3 |
|
#endif |
| 6 |
– |
|
| 4 |
|
/* |
| 5 |
|
* Anticorrelated random function due to Christophe Schlick |
| 6 |
|
*/ |
| 7 |
|
|
| 8 |
+ |
/* ==================================================================== |
| 9 |
+ |
* The Radiance Software License, Version 1.0 |
| 10 |
+ |
* |
| 11 |
+ |
* Copyright (c) 1990 - 2002 The Regents of the University of California, |
| 12 |
+ |
* through Lawrence Berkeley National Laboratory. All rights reserved. |
| 13 |
+ |
* |
| 14 |
+ |
* Redistribution and use in source and binary forms, with or without |
| 15 |
+ |
* modification, are permitted provided that the following conditions |
| 16 |
+ |
* are met: |
| 17 |
+ |
* |
| 18 |
+ |
* 1. Redistributions of source code must retain the above copyright |
| 19 |
+ |
* notice, this list of conditions and the following disclaimer. |
| 20 |
+ |
* |
| 21 |
+ |
* 2. Redistributions in binary form must reproduce the above copyright |
| 22 |
+ |
* notice, this list of conditions and the following disclaimer in |
| 23 |
+ |
* the documentation and/or other materials provided with the |
| 24 |
+ |
* distribution. |
| 25 |
+ |
* |
| 26 |
+ |
* 3. The end-user documentation included with the redistribution, |
| 27 |
+ |
* if any, must include the following acknowledgment: |
| 28 |
+ |
* "This product includes Radiance software |
| 29 |
+ |
* (http://radsite.lbl.gov/) |
| 30 |
+ |
* developed by the Lawrence Berkeley National Laboratory |
| 31 |
+ |
* (http://www.lbl.gov/)." |
| 32 |
+ |
* Alternately, this acknowledgment may appear in the software itself, |
| 33 |
+ |
* if and wherever such third-party acknowledgments normally appear. |
| 34 |
+ |
* |
| 35 |
+ |
* 4. The names "Radiance," "Lawrence Berkeley National Laboratory" |
| 36 |
+ |
* and "The Regents of the University of California" must |
| 37 |
+ |
* not be used to endorse or promote products derived from this |
| 38 |
+ |
* software without prior written permission. For written |
| 39 |
+ |
* permission, please contact [email protected]. |
| 40 |
+ |
* |
| 41 |
+ |
* 5. Products derived from this software may not be called "Radiance", |
| 42 |
+ |
* nor may "Radiance" appear in their name, without prior written |
| 43 |
+ |
* permission of Lawrence Berkeley National Laboratory. |
| 44 |
+ |
* |
| 45 |
+ |
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED |
| 46 |
+ |
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
| 47 |
+ |
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE |
| 48 |
+ |
* DISCLAIMED. IN NO EVENT SHALL Lawrence Berkeley National Laboratory OR |
| 49 |
+ |
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
| 50 |
+ |
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
| 51 |
+ |
* LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF |
| 52 |
+ |
* USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND |
| 53 |
+ |
* ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, |
| 54 |
+ |
* OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT |
| 55 |
+ |
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 56 |
+ |
* SUCH DAMAGE. |
| 57 |
+ |
* ==================================================================== |
| 58 |
+ |
* |
| 59 |
+ |
* This software consists of voluntary contributions made by many |
| 60 |
+ |
* individuals on behalf of Lawrence Berkeley National Laboratory. For more |
| 61 |
+ |
* information on Lawrence Berkeley National Laboratory, please see |
| 62 |
+ |
* <http://www.lbl.gov/>. |
| 63 |
+ |
*/ |
| 64 |
+ |
|
| 65 |
+ |
#include <stdlib.h> |
| 66 |
|
#include "random.h" |
| 67 |
|
|
| 68 |
< |
#define NULL 0 |
| 68 |
> |
#undef initurand |
| 69 |
|
|
| 70 |
< |
extern char *malloc(); |
| 70 |
> |
#define MAXORDER (8*sizeof(unsigned short)) |
| 71 |
|
|
| 72 |
< |
short *urperm; /* urand() permutation */ |
| 72 |
> |
unsigned short *urperm = NULL; /* urand() permutation */ |
| 73 |
|
int urmask; /* bits used in permutation */ |
| 74 |
|
|
| 75 |
< |
|
| 75 |
> |
int |
| 76 |
|
initurand(size) /* initialize urand() for size entries */ |
| 77 |
|
int size; |
| 78 |
|
{ |
| 79 |
|
int order, n; |
| 80 |
|
register int i, offset; |
| 81 |
|
|
| 82 |
< |
size--; |
| 82 |
> |
if (urperm != NULL) |
| 83 |
> |
free((void *)urperm); |
| 84 |
> |
if (--size <= 0) { |
| 85 |
> |
urperm = NULL; |
| 86 |
> |
urmask = 0; |
| 87 |
> |
return(0); |
| 88 |
> |
} |
| 89 |
|
for (i = 1; size >>= 1; i++) |
| 90 |
|
; |
| 91 |
< |
order = i; |
| 91 |
> |
order = i>MAXORDER ? MAXORDER : i; |
| 92 |
|
urmask = (1<<i) - 1; |
| 93 |
< |
urperm = (short *)malloc((urmask+1)*sizeof(short)); |
| 93 |
> |
urperm = (unsigned short *)malloc((urmask+1)*sizeof(unsigned short)); |
| 94 |
|
if (urperm == NULL) { |
| 95 |
|
eputs("out of memory in initurand\n"); |
| 96 |
|
quit(1); |
| 105 |
|
else |
| 106 |
|
urperm[i+offset]++; |
| 107 |
|
} |
| 108 |
+ |
return(1<<order); |
| 109 |
|
} |
| 110 |
|
|
| 111 |
|
|
| 121 |
|
while (n-- > 0) |
| 122 |
|
hval += *d++ * tab[n&7]; |
| 123 |
|
return(hval); |
| 62 |
– |
} |
| 63 |
– |
|
| 64 |
– |
|
| 65 |
– |
static char bctab[256] = { |
| 66 |
– |
0, 1, 1, 2, 1, 2, 2, 3, 1, 2, 2, 3, 2, 3, 3, 4, |
| 67 |
– |
1, 2, 2, 3, 2, 3, 3, 4, 2, 3, 3, 4, 3, 4, 4, 5, |
| 68 |
– |
1, 2, 2, 3, 2, 3, 3, 4, 2, 3, 3, 4, 3, 4, 4, 5, |
| 69 |
– |
2, 3, 3, 4, 3, 4, 4, 5, 3, 4, 4, 5, 4, 5, 5, 6, |
| 70 |
– |
1, 2, 2, 3, 2, 3, 3, 4, 2, 3, 3, 4, 3, 4, 4, 5, |
| 71 |
– |
2, 3, 3, 4, 3, 4, 4, 5, 3, 4, 4, 5, 4, 5, 5, 6, |
| 72 |
– |
2, 3, 3, 4, 3, 4, 4, 5, 3, 4, 4, 5, 4, 5, 5, 6, |
| 73 |
– |
3, 4, 4, 5, 4, 5, 5, 6, 4, 5, 5, 6, 5, 6, 6, 7, |
| 74 |
– |
1, 2, 2, 3, 2, 3, 3, 4, 2, 3, 3, 4, 3, 4, 4, 5, |
| 75 |
– |
2, 3, 3, 4, 3, 4, 4, 5, 3, 4, 4, 5, 4, 5, 5, 6, |
| 76 |
– |
2, 3, 3, 4, 3, 4, 4, 5, 3, 4, 4, 5, 4, 5, 5, 6, |
| 77 |
– |
3, 4, 4, 5, 4, 5, 5, 6, 4, 5, 5, 6, 5, 6, 6, 7, |
| 78 |
– |
2, 3, 3, 4, 3, 4, 4, 5, 3, 4, 4, 5, 4, 5, 5, 6, |
| 79 |
– |
3, 4, 4, 5, 4, 5, 5, 6, 4, 5, 5, 6, 5, 6, 6, 7, |
| 80 |
– |
3, 4, 4, 5, 4, 5, 5, 6, 4, 5, 5, 6, 5, 6, 6, 7, |
| 81 |
– |
4, 5, 5, 6, 5, 6, 6, 7, 5, 6, 6, 7, 6, 7, 7, 8, |
| 82 |
– |
}; |
| 83 |
– |
|
| 84 |
– |
|
| 85 |
– |
#define NBITS 32 |
| 86 |
– |
|
| 87 |
– |
#if NBITS==32 |
| 88 |
– |
#define bitcount(i) (bctab[(i)>>24&0xff]+bctab[(i)>>16&0xff]+ \ |
| 89 |
– |
bctab[(i)>>8&0xff]+bctab[(i)&0xff]) |
| 90 |
– |
#endif |
| 91 |
– |
#if NBITS==16 |
| 92 |
– |
#define bitcount(i) (bctab[(i)>>8&0xff]+bctab[(i)&0xff]) |
| 93 |
– |
#endif |
| 94 |
– |
|
| 95 |
– |
|
| 96 |
– |
int |
| 97 |
– |
urind(s, i) /* compute i'th index from seed s */ |
| 98 |
– |
int s, i; |
| 99 |
– |
{ |
| 100 |
– |
register int ss, k; |
| 101 |
– |
int left; |
| 102 |
– |
|
| 103 |
– |
ss = s*1103515245 + 12345; |
| 104 |
– |
left = 0; |
| 105 |
– |
for (k = i/NBITS; k--; ) { |
| 106 |
– |
left += bitcount(ss); |
| 107 |
– |
ss = ss*1103515245 + 12345; |
| 108 |
– |
} |
| 109 |
– |
for (k = i&(NBITS-1); k--; ss >>= 1) |
| 110 |
– |
left += ss & 1; |
| 111 |
– |
if (ss & 1) |
| 112 |
– |
return(s-left-1); |
| 113 |
– |
return(s-left+i); |
| 124 |
|
} |