struct lbx_image {
unsigned short width, height;
unsigned short wtf, flags;
- unsigned short frames, leadin;
+ unsigned char frames, wtf2, leadin, chunk;
unsigned short palstart, palcount;
const struct lbx_file_ops *fops;
.width = unpack_16_le(hdr+0),
.height = unpack_16_le(hdr+2),
.wtf = unpack_16_le(hdr+4),
- .frames = unpack_16_le(hdr+6),
- .leadin = unpack_16_le(hdr+8),
+ .frames = hdr[6],
+ .wtf2 = hdr[7],
+ .leadin = hdr[8],
+ .chunk = hdr[9],
.flags = unpack_16_le(hdr+10),
.currentframe = -1,
/*
* DEBUG ONLY. These assertions exist to catch otherwise valid image
* files which differ from what I believe to be true of all LBX images.
- * If we never find any exceptions, we can replace the assertions with
- * assumptions.
+ * When we can decode every image, then these assertions should be
+ * replaced with constraints.
*/
- _lbx_assert(img->wtf == 0); /* version? */
- _lbx_assert(img->frames > img->leadin); /* cmbtshp.lbx breaks this. */
+ _lbx_assert(img->wtf == 0); /* version? */
+ _lbx_assert(img->wtf2 == 0); /* very likely is simply reserved. */
+ _lbx_assert(img->frames > img->leadin);
_lbx_assert(!(img->flags & ~FLAG_ALL));
/* Read all offsets. Should be merged with identical code in lbx.c */
if (img->flags & FLAG_RAW)
return read_raw_frame(img, frame);
- if (img->flags & FLAG_OVERWRITE) {
+ if ((img->flags & FLAG_OVERWRITE)
+ || (img->chunk && !(frame % img->chunk))) {
/* Clear the slate. */
img->currentframe = -1;
memset(img->framedata[0], 0, img->width * img->height);
.width = img->width,
.height = img->height,
.nframes = img->frames,
+ .chunk = img->chunk,
.palettesz = (img->flags & FLAG_PALETTE) ? img->palcount : 0,
};