1*4887Schin #include "FEATURE/uwin"
2*4887Schin
3*4887Schin #if !_UWIN || _lib_acosh
4*4887Schin
_STUB_acosh()5*4887Schin void _STUB_acosh(){}
6*4887Schin
7*4887Schin #else
8*4887Schin
9*4887Schin /*
10*4887Schin * Copyright (c) 1985, 1993
11*4887Schin * The Regents of the University of California. All rights reserved.
12*4887Schin *
13*4887Schin * Redistribution and use in source and binary forms, with or without
14*4887Schin * modification, are permitted provided that the following conditions
15*4887Schin * are met:
16*4887Schin * 1. Redistributions of source code must retain the above copyright
17*4887Schin * notice, this list of conditions and the following disclaimer.
18*4887Schin * 2. Redistributions in binary form must reproduce the above copyright
19*4887Schin * notice, this list of conditions and the following disclaimer in the
20*4887Schin * documentation and/or other materials provided with the distribution.
21*4887Schin * 3. Neither the name of the University nor the names of its contributors
22*4887Schin * may be used to endorse or promote products derived from this software
23*4887Schin * without specific prior written permission.
24*4887Schin *
25*4887Schin * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
26*4887Schin * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
27*4887Schin * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
28*4887Schin * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
29*4887Schin * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
30*4887Schin * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
31*4887Schin * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
32*4887Schin * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
33*4887Schin * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
34*4887Schin * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35*4887Schin * SUCH DAMAGE.
36*4887Schin */
37*4887Schin
38*4887Schin #ifndef lint
39*4887Schin static char sccsid[] = "@(#)acosh.c 8.1 (Berkeley) 6/4/93";
40*4887Schin #endif /* not lint */
41*4887Schin
42*4887Schin /* ACOSH(X)
43*4887Schin * RETURN THE INVERSE HYPERBOLIC COSINE OF X
44*4887Schin * DOUBLE PRECISION (VAX D FORMAT 56 BITS, IEEE DOUBLE 53 BITS)
45*4887Schin * CODED IN C BY K.C. NG, 2/16/85;
46*4887Schin * REVISED BY K.C. NG on 3/6/85, 3/24/85, 4/16/85, 8/17/85.
47*4887Schin *
48*4887Schin * Required system supported functions :
49*4887Schin * sqrt(x)
50*4887Schin *
51*4887Schin * Required kernel function:
52*4887Schin * log1p(x) ...return log(1+x)
53*4887Schin *
54*4887Schin * Method :
55*4887Schin * Based on
56*4887Schin * acosh(x) = log [ x + sqrt(x*x-1) ]
57*4887Schin * we have
58*4887Schin * acosh(x) := log1p(x)+ln2, if (x > 1.0E20); else
59*4887Schin * acosh(x) := log1p( sqrt(x-1) * (sqrt(x-1) + sqrt(x+1)) ) .
60*4887Schin * These formulae avoid the over/underflow complication.
61*4887Schin *
62*4887Schin * Special cases:
63*4887Schin * acosh(x) is NaN with signal if x<1.
64*4887Schin * acosh(NaN) is NaN without signal.
65*4887Schin *
66*4887Schin * Accuracy:
67*4887Schin * acosh(x) returns the exact inverse hyperbolic cosine of x nearly
68*4887Schin * rounded. In a test run with 512,000 random arguments on a VAX, the
69*4887Schin * maximum observed error was 3.30 ulps (units of the last place) at
70*4887Schin * x=1.0070493753568216 .
71*4887Schin *
72*4887Schin * Constants:
73*4887Schin * The hexadecimal values are the intended ones for the following constants.
74*4887Schin * The decimal values may be used, provided that the compiler will convert
75*4887Schin * from decimal to binary accurately enough to produce the hexadecimal values
76*4887Schin * shown.
77*4887Schin */
78*4887Schin
79*4887Schin #include "mathimpl.h"
80*4887Schin
81*4887Schin vc(ln2hi, 6.9314718055829871446E-1 ,7217,4031,0000,f7d0, 0, .B17217F7D00000)
82*4887Schin vc(ln2lo, 1.6465949582897081279E-12 ,bcd5,2ce7,d9cc,e4f1, -39, .E7BCD5E4F1D9CC)
83*4887Schin
84*4887Schin ic(ln2hi, 6.9314718036912381649E-1, -1, 1.62E42FEE00000)
85*4887Schin ic(ln2lo, 1.9082149292705877000E-10,-33, 1.A39EF35793C76)
86*4887Schin
87*4887Schin #ifdef vccast
88*4887Schin #define ln2hi vccast(ln2hi)
89*4887Schin #define ln2lo vccast(ln2lo)
90*4887Schin #endif
91*4887Schin
92*4887Schin extern double acosh(x)
93*4887Schin double x;
94*4887Schin {
95*4887Schin double t,big=1.E20; /* big+1==big */
96*4887Schin
97*4887Schin #if !defined(vax)&&!defined(tahoe)
98*4887Schin if(x!=x) return(x); /* x is NaN */
99*4887Schin #endif /* !defined(vax)&&!defined(tahoe) */
100*4887Schin
101*4887Schin /* return log1p(x) + log(2) if x is large */
102*4887Schin if(x>big) {t=log1p(x)+ln2lo; return(t+ln2hi);}
103*4887Schin
104*4887Schin t=sqrt(x-1.0);
105*4887Schin return(log1p(t*(t+sqrt(x+1.0))));
106*4887Schin }
107*4887Schin
108*4887Schin #endif
109