#include "FEATURE/uwin"12#if !_UWIN34void _STUB_log__L(){}56#else78/*9* Copyright (c) 1985, 199310* The Regents of the University of California. All rights reserved.11*12* Redistribution and use in source and binary forms, with or without13* modification, are permitted provided that the following conditions14* are met:15* 1. Redistributions of source code must retain the above copyright16* notice, this list of conditions and the following disclaimer.17* 2. Redistributions in binary form must reproduce the above copyright18* notice, this list of conditions and the following disclaimer in the19* documentation and/or other materials provided with the distribution.20* 3. Neither the name of the University nor the names of its contributors21* may be used to endorse or promote products derived from this software22* without specific prior written permission.23*24* THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND25* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE26* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE27* ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE28* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL29* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS30* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)31* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT32* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY33* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF34* SUCH DAMAGE.35*/3637#ifndef lint38static char sccsid[] = "@(#)log__L.c 8.1 (Berkeley) 6/4/93";39#endif /* not lint */4041/* log__L(Z)42* LOG(1+X) - 2S X43* RETURN --------------- WHERE Z = S*S, S = ------- , 0 <= Z <= .0294...44* S 2 + X45*46* DOUBLE PRECISION (VAX D FORMAT 56 bits or IEEE DOUBLE 53 BITS)47* KERNEL FUNCTION FOR LOG; TO BE USED IN LOG1P, LOG, AND POW FUNCTIONS48* CODED IN C BY K.C. NG, 1/19/85;49* REVISED BY K.C. Ng, 2/3/85, 4/16/85.50*51* Method :52* 1. Polynomial approximation: let s = x/(2+x).53* Based on log(1+x) = log(1+s) - log(1-s)54* = 2s + 2/3 s**3 + 2/5 s**5 + .....,55*56* (log(1+x) - 2s)/s is computed by57*58* z*(L1 + z*(L2 + z*(... (L7 + z*L8)...)))59*60* where z=s*s. (See the listing below for Lk's values.) The61* coefficients are obtained by a special Remez algorithm.62*63* Accuracy:64* Assuming no rounding error, the maximum magnitude of the approximation65* error (absolute) is 2**(-58.49) for IEEE double, and 2**(-63.63)66* for VAX D format.67*68* Constants:69* The hexadecimal values are the intended ones for the following constants.70* The decimal values may be used, provided that the compiler will convert71* from decimal to binary accurately enough to produce the hexadecimal values72* shown.73*/7475#include "mathimpl.h"7677vc(L1, 6.6666666666666703212E-1 ,aaaa,402a,aac5,aaaa, 0, .AAAAAAAAAAAAC5)78vc(L2, 3.9999999999970461961E-1 ,cccc,3fcc,2684,cccc, -1, .CCCCCCCCCC2684)79vc(L3, 2.8571428579395698188E-1 ,4924,3f92,5782,92f8, -1, .92492492F85782)80vc(L4, 2.2222221233634724402E-1 ,8e38,3f63,af2c,39b7, -2, .E38E3839B7AF2C)81vc(L5, 1.8181879517064680057E-1 ,2eb4,3f3a,655e,cc39, -2, .BA2EB4CC39655E)82vc(L6, 1.5382888777946145467E-1 ,8551,3f1d,781d,e8c5, -2, .9D8551E8C5781D)83vc(L7, 1.3338356561139403517E-1 ,95b3,3f08,cd92,907f, -2, .8895B3907FCD92)84vc(L8, 1.2500000000000000000E-1 ,0000,3f00,0000,0000, -2, .80000000000000)8586ic(L1, 6.6666666666667340202E-1, -1, 1.5555555555592)87ic(L2, 3.9999999999416702146E-1, -2, 1.999999997FF24)88ic(L3, 2.8571428742008753154E-1, -2, 1.24924941E07B4)89ic(L4, 2.2222198607186277597E-1, -3, 1.C71C52150BEA6)90ic(L5, 1.8183562745289935658E-1, -3, 1.74663CC94342F)91ic(L6, 1.5314087275331442206E-1, -3, 1.39A1EC014045B)92ic(L7, 1.4795612545334174692E-1, -3, 1.2F039F0085122)9394#ifdef vccast95#define L1 vccast(L1)96#define L2 vccast(L2)97#define L3 vccast(L3)98#define L4 vccast(L4)99#define L5 vccast(L5)100#define L6 vccast(L6)101#define L7 vccast(L7)102#define L8 vccast(L8)103#endif104105double __log__L(z)106double z;107{108#if defined(vax)||defined(tahoe)109return(z*(L1+z*(L2+z*(L3+z*(L4+z*(L5+z*(L6+z*(L7+z*L8))))))));110#else /* defined(vax)||defined(tahoe) */111return(z*(L1+z*(L2+z*(L3+z*(L4+z*(L5+z*(L6+z*L7)))))));112#endif /* defined(vax)||defined(tahoe) */113}114115#endif116117118