1*da2e3ebdSchin #include "FEATURE/uwin"
2*da2e3ebdSchin
3*da2e3ebdSchin #if !_UWIN || _lib_acosh
4*da2e3ebdSchin
_STUB_acosh()5*da2e3ebdSchin void _STUB_acosh(){}
6*da2e3ebdSchin
7*da2e3ebdSchin #else
8*da2e3ebdSchin
9*da2e3ebdSchin /*
10*da2e3ebdSchin * Copyright (c) 1985, 1993
11*da2e3ebdSchin * The Regents of the University of California. All rights reserved.
12*da2e3ebdSchin *
13*da2e3ebdSchin * Redistribution and use in source and binary forms, with or without
14*da2e3ebdSchin * modification, are permitted provided that the following conditions
15*da2e3ebdSchin * are met:
16*da2e3ebdSchin * 1. Redistributions of source code must retain the above copyright
17*da2e3ebdSchin * notice, this list of conditions and the following disclaimer.
18*da2e3ebdSchin * 2. Redistributions in binary form must reproduce the above copyright
19*da2e3ebdSchin * notice, this list of conditions and the following disclaimer in the
20*da2e3ebdSchin * documentation and/or other materials provided with the distribution.
21*da2e3ebdSchin * 3. Neither the name of the University nor the names of its contributors
22*da2e3ebdSchin * may be used to endorse or promote products derived from this software
23*da2e3ebdSchin * without specific prior written permission.
24*da2e3ebdSchin *
25*da2e3ebdSchin * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
26*da2e3ebdSchin * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27*da2e3ebdSchin * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28*da2e3ebdSchin * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29*da2e3ebdSchin * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30*da2e3ebdSchin * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31*da2e3ebdSchin * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32*da2e3ebdSchin * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33*da2e3ebdSchin * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34*da2e3ebdSchin * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35*da2e3ebdSchin * SUCH DAMAGE.
36*da2e3ebdSchin */
37*da2e3ebdSchin
38*da2e3ebdSchin #ifndef lint
39*da2e3ebdSchin static char sccsid[] = "@(#)acosh.c 8.1 (Berkeley) 6/4/93";
40*da2e3ebdSchin #endif /* not lint */
41*da2e3ebdSchin
42*da2e3ebdSchin /* ACOSH(X)
43*da2e3ebdSchin * RETURN THE INVERSE HYPERBOLIC COSINE OF X
44*da2e3ebdSchin * DOUBLE PRECISION (VAX D FORMAT 56 BITS, IEEE DOUBLE 53 BITS)
45*da2e3ebdSchin * CODED IN C BY K.C. NG, 2/16/85;
46*da2e3ebdSchin * REVISED BY K.C. NG on 3/6/85, 3/24/85, 4/16/85, 8/17/85.
47*da2e3ebdSchin *
48*da2e3ebdSchin * Required system supported functions :
49*da2e3ebdSchin * sqrt(x)
50*da2e3ebdSchin *
51*da2e3ebdSchin * Required kernel function:
52*da2e3ebdSchin * log1p(x) ...return log(1+x)
53*da2e3ebdSchin *
54*da2e3ebdSchin * Method :
55*da2e3ebdSchin * Based on
56*da2e3ebdSchin * acosh(x) = log [ x + sqrt(x*x-1) ]
57*da2e3ebdSchin * we have
58*da2e3ebdSchin * acosh(x) := log1p(x)+ln2, if (x > 1.0E20); else
59*da2e3ebdSchin * acosh(x) := log1p( sqrt(x-1) * (sqrt(x-1) + sqrt(x+1)) ) .
60*da2e3ebdSchin * These formulae avoid the over/underflow complication.
61*da2e3ebdSchin *
62*da2e3ebdSchin * Special cases:
63*da2e3ebdSchin * acosh(x) is NaN with signal if x<1.
64*da2e3ebdSchin * acosh(NaN) is NaN without signal.
65*da2e3ebdSchin *
66*da2e3ebdSchin * Accuracy:
67*da2e3ebdSchin * acosh(x) returns the exact inverse hyperbolic cosine of x nearly
68*da2e3ebdSchin * rounded. In a test run with 512,000 random arguments on a VAX, the
69*da2e3ebdSchin * maximum observed error was 3.30 ulps (units of the last place) at
70*da2e3ebdSchin * x=1.0070493753568216 .
71*da2e3ebdSchin *
72*da2e3ebdSchin * Constants:
73*da2e3ebdSchin * The hexadecimal values are the intended ones for the following constants.
74*da2e3ebdSchin * The decimal values may be used, provided that the compiler will convert
75*da2e3ebdSchin * from decimal to binary accurately enough to produce the hexadecimal values
76*da2e3ebdSchin * shown.
77*da2e3ebdSchin */
78*da2e3ebdSchin
79*da2e3ebdSchin #include "mathimpl.h"
80*da2e3ebdSchin
81*da2e3ebdSchin vc(ln2hi, 6.9314718055829871446E-1 ,7217,4031,0000,f7d0, 0, .B17217F7D00000)
82*da2e3ebdSchin vc(ln2lo, 1.6465949582897081279E-12 ,bcd5,2ce7,d9cc,e4f1, -39, .E7BCD5E4F1D9CC)
83*da2e3ebdSchin
84*da2e3ebdSchin ic(ln2hi, 6.9314718036912381649E-1, -1, 1.62E42FEE00000)
85*da2e3ebdSchin ic(ln2lo, 1.9082149292705877000E-10,-33, 1.A39EF35793C76)
86*da2e3ebdSchin
87*da2e3ebdSchin #ifdef vccast
88*da2e3ebdSchin #define ln2hi vccast(ln2hi)
89*da2e3ebdSchin #define ln2lo vccast(ln2lo)
90*da2e3ebdSchin #endif
91*da2e3ebdSchin
92*da2e3ebdSchin extern double acosh(x)
93*da2e3ebdSchin double x;
94*da2e3ebdSchin {
95*da2e3ebdSchin double t,big=1.E20; /* big+1==big */
96*da2e3ebdSchin
97*da2e3ebdSchin #if !defined(vax)&&!defined(tahoe)
98*da2e3ebdSchin if(x!=x) return(x); /* x is NaN */
99*da2e3ebdSchin #endif /* !defined(vax)&&!defined(tahoe) */
100*da2e3ebdSchin
101*da2e3ebdSchin /* return log1p(x) + log(2) if x is large */
102*da2e3ebdSchin if(x>big) {t=log1p(x)+ln2lo; return(t+ln2hi);}
103*da2e3ebdSchin
104*da2e3ebdSchin t=sqrt(x-1.0);
105*da2e3ebdSchin return(log1p(t*(t+sqrt(x+1.0))));
106*da2e3ebdSchin }
107*da2e3ebdSchin
108*da2e3ebdSchin #endif
109