#include "FEATURE/uwin"12#if !_UWIN || _lib_acosh34void _STUB_acosh(){}56#else78/*9* Copyright (c) 1985, 199310* The Regents of the University of California. All rights reserved.11*12* Redistribution and use in source and binary forms, with or without13* modification, are permitted provided that the following conditions14* are met:15* 1. Redistributions of source code must retain the above copyright16* notice, this list of conditions and the following disclaimer.17* 2. Redistributions in binary form must reproduce the above copyright18* notice, this list of conditions and the following disclaimer in the19* documentation and/or other materials provided with the distribution.20* 3. Neither the name of the University nor the names of its contributors21* may be used to endorse or promote products derived from this software22* without specific prior written permission.23*24* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND25* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE26* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE27* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE28* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL29* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS30* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)31* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT32* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY33* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF34* SUCH DAMAGE.35*/3637#ifndef lint38static char sccsid[] = "@(#)acosh.c 8.1 (Berkeley) 6/4/93";39#endif /* not lint */4041/* ACOSH(X)42* RETURN THE INVERSE HYPERBOLIC COSINE OF X43* DOUBLE PRECISION (VAX D FORMAT 56 BITS, IEEE DOUBLE 53 BITS)44* CODED IN C BY K.C. NG, 2/16/85;45* REVISED BY K.C. NG on 3/6/85, 3/24/85, 4/16/85, 8/17/85.46*47* Required system supported functions :48* sqrt(x)49*50* Required kernel function:51* log1p(x) ...return log(1+x)52*53* Method :54* Based on55* acosh(x) = log [ x + sqrt(x*x-1) ]56* we have57* acosh(x) := log1p(x)+ln2, if (x > 1.0E20); else58* acosh(x) := log1p( sqrt(x-1) * (sqrt(x-1) + sqrt(x+1)) ) .59* These formulae avoid the over/underflow complication.60*61* Special cases:62* acosh(x) is NaN with signal if x<1.63* acosh(NaN) is NaN without signal.64*65* Accuracy:66* acosh(x) returns the exact inverse hyperbolic cosine of x nearly67* rounded. In a test run with 512,000 random arguments on a VAX, the68* maximum observed error was 3.30 ulps (units of the last place) at69* x=1.0070493753568216 .70*71* Constants:72* The hexadecimal values are the intended ones for the following constants.73* The decimal values may be used, provided that the compiler will convert74* from decimal to binary accurately enough to produce the hexadecimal values75* shown.76*/7778#include "mathimpl.h"7980vc(ln2hi, 6.9314718055829871446E-1 ,7217,4031,0000,f7d0, 0, .B17217F7D00000)81vc(ln2lo, 1.6465949582897081279E-12 ,bcd5,2ce7,d9cc,e4f1, -39, .E7BCD5E4F1D9CC)8283ic(ln2hi, 6.9314718036912381649E-1, -1, 1.62E42FEE00000)84ic(ln2lo, 1.9082149292705877000E-10,-33, 1.A39EF35793C76)8586#ifdef vccast87#define ln2hi vccast(ln2hi)88#define ln2lo vccast(ln2lo)89#endif9091extern double acosh(x)92double x;93{94double t,big=1.E20; /* big+1==big */9596#if !defined(vax)&&!defined(tahoe)97if(x!=x) return(x); /* x is NaN */98#endif /* !defined(vax)&&!defined(tahoe) */99100/* return log1p(x) + log(2) if x is large */101if(x>big) {t=log1p(x)+ln2lo; return(t+ln2hi);}102103t=sqrt(x-1.0);104return(log1p(t*(t+sqrt(x+1.0))));105}106107#endif108109110