aboutsummaryrefslogblamecommitdiffstats
path: root/src/modules/common/compress.cpp
blob: 5031adbecc3b0902220510604631a8a6eb2cba19 (plain) (tree)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767






























































































































































































































































































































































































































































































































































































































































































































































































                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                               
Compression Info, 10-11-95
Jeff Wheeler

Source of Algorithm
-------------------

The compression algorithms used here are based upon the algorithms developed and published by Haruhiko Okumura in a paper entitled "Data Compression Algorithms of LARC and LHarc."  This paper discusses three compression algorithms, LSZZ, LZARI, and LZHUF.  LZSS is described as the "first" of these, and is described as providing moderate compression with good speed.  LZARI is described as an improved LZSS, a combination of the LZSS algorithm with adaptive arithmetic compression.  It is described as being slower than LZSS but with better compression.  LZHUF (the basis of the common LHA compression program) was included in the paper, however, a free usage license was not included. 

The following are copies of the statements included at the beginning of each source code listing that was supplied in the working paper.

        LZSS, dated 4/6/89, marked as "Use, distribute and
        modify this program freely."

        LZARI, dated 4/7/89, marked as "Use, distribute and
        modify this program freely."

        LZHUF, dated 11/20/88, written by Haruyasu Yoshizaki,
        translated by Haruhiko Okumura on 4/7/89.  Not
        expressly marked as redistributable or modifiable.

Since both LZSS and LZARI are marked as "use, distribute and modify freely" we have felt at liberty basing our compression algorithm on either of these.

Selection of Algorithm
----------------------

Working samples of three possible compression algorithms are supplied in Okumura's paper.  Which should be used?

LZSS is the fastest at decompression, but does not generated as small a compressed file as the other methods. The other two methods provided, perhaps, a 15% improvement in compression.  Or, put another way, on a 100K file, LZSS might compress it to 50K while the others might approach 40-45K.  For STEP purposes, it was decided that decoding speed was of more importance than tighter compression. For these reasons, the first compression algorithm implemented is the LZSS algorithm.

About LZSS Encoding
-------------------

(adapted from Haruhiko Okumura's paper)

This scheme was proposed by Ziv and Lempel [1].  A slightly modified version is described by Storer and Szymanski [2]. An implementation using a binary tree has been proposed by Bell [3].

The algorithm is quite simple.
1. Keep a ring buffer which initially contains all space characters.
2. Read several letters from the file to the buffer.
3. Search the buffer for the longest string that matches the letters just read, and send its length and position into the buffer.

If the ring buffer is 4096 bytes, the position can be stored in 12 bits.  If the length is represented in 4 bits, the <position, length> pair is two bytes long.  If the longest match is no more than two characters, then just one character is sent without encoding.  The process starts again with the next character.  An extra bit is sent each time to tell the decoder whether the next item is a character of a <position, length> pair.

[1] J. Ziv and A. Lempel, IEEE Transactions IT-23, 337-343 (1977).
[2] J. A. Storer and T. G. Szymanski, J. ACM, 29, 928-951 (1982).
[3] T.C. Gell, IEEE Transactions COM-34, 1176-1182 (1986).

void InitTree(                      // no return value
    void);                          // no parameters

void InsertNode(                    // no return value
    short int Pos);                 // position in the buffer

void DeleteNode(                    // no return value
    short int Node);                // node to be removed

void Encode(                        // no return value
    void);                          // no parameters

void Decode(                        // no return value
    void);                          // no parameters

// The following are constant sizes used by the compression algorithm.
//
//  N         - This is the size of the ring buffer.  It is set
//              to 4K.  It is important to note that a position
//              within the ring buffer requires 12 bits.  
//
//  F         - This is the maximum length of a character sequence
//              that can be taken from the ring buffer.  It is set
//              to 18.  Note that a length must be 3 before it is
//              worthwhile to store a position/length pair, so the
//              length can be encoded in only 4 bits.  Or, put yet
//              another way, it is not necessary to encode a length
//              of 0-18, it is necessary to encode a length of
//              3-18, which requires 4 bits.
//              
//  THRESHOLD - It takes 2 bytes to store an offset and
//              a length.  If a character sequence only
//              requires 1 or 2 characters to store 
//              uncompressed, then it is better to store
//              it uncompressed than as an offset into
//              the ring buffer.
//
// Note that the 12 bits used to store the position and the 4 bits
// used to store the length equal a total of 16 bits, or 2 bytes.

#define N		4096
#define F		18
#define THRESHOLD	3
#define NOT_USED	N

// m_ring_buffer is a text buffer.  It contains "nodes" of
// uncompressed text that can be indexed by position.  That is,
// a substring of the ring buffer can be indexed by a position
// and a length.  When decoding, the compressed text may contain
// a position in the ring buffer and a count of the number of
// bytes from the ring buffer that are to be moved into the
// uncompressed buffer.  
//
// This ring buffer is not maintained as part of the compressed
// text.  Instead, it is reconstructed dynamically.  That is,
// it starts out empty and gets built as the text is decompressed.
//
// The ring buffer contain N bytes, with an additional F - 1 bytes
// to facilitate string comparison.

unsigned char m_ring_buffer[N + F - 1];

// m_match_position and m_match_length are set by InsertNode().
//
// These variables indicate the position in the ring buffer 
// and the number of characters at that position that match
// a given string.

short int m_match_position;
short int m_match_length;

// m_lson, m_rson, and m_dad are the Japanese way of referring to
// a tree structure.  The dad is the parent and it has a right and
// left son (child).
//
// For i = 0 to N-1, m_rson[i] and m_lson[i] will be the right 
// and left children of node i.  
//
// For i = 0 to N-1, m_dad[i] is the parent of node i.
//
// For i = 0 to 255, rson[N + i + 1] is the root of the tree for 
// strings that begin with the character i.  Note that this requires 
// one byte characters.
//
// These nodes store values of 0...(N-1).  Memory requirements
// can be reduces by using 2-byte integers instead of full 4-byte
// integers (for 32-bit applications).  Therefore, these are 
// defined as "short ints."

short int m_lson[N + 1];
short int m_rson[N + 257];
short int m_dad[N + 1];

/*
 -------------------------------------------------------------------------
    cLZSS::InitTree
    
    This function initializes the tree nodes to "empty" states. 
 -------------------------------------------------------------------------
*/

void cLZSS::InitTree(               // no return value
    void)                           // no parameters
    throw()                         // exception list

    {
    int  i;

    // For i = 0 to N - 1, m_rson[i] and m_lson[i] will be the right
    // and left children of node i.  These nodes need not be
    // initialized.  However, for debugging purposes, it is nice to
    // have them initialized.  Since this is only used for compression
    // (not decompression), I don't mind spending the time to do it.
    //
    // For the same range of i, m_dad[i] is the parent of node i.
    // These are initialized to a known value that can represent
    // a "not used" state.
    
    for (i = 0; i < N; i++)
        {
        m_lson[i] = NOT_USED;
        m_rson[i] = NOT_USED;
        m_dad[i] = NOT_USED;
        }

    // For i = 0 to 255, m_rson[N + i + 1] is the root of the tree
    // for strings that begin with the character i.  This is why
    // the right child array is larger than the left child array.
    // These are also initialzied to a "not used" state.
    //
    // Note that there are 256 of these, one for each of the possible
    // 256 characters.

    for (i = N + 1; i <= (N + 256); i++)
        {
        m_rson[i] = NOT_USED;
        }

    // Done.
    }

/*
 -------------------------------------------------------------------------
    cLZSS::InsertNode
    
    This function inserts a string from the ring buffer into one of
    the trees.  It loads the match position and length member variables
    for the longest match.
    
    The string to be inserted is identified by the parameter Pos,
    A full F bytes are inserted.  So, m_ring_buffer[Pos ... Pos+F-1]
    are inserted.

    If the matched length is exactly F, then an old node is removed
    in favor of the new one (because the old one will be deleted
    sooner).

    Note that Pos plays a dual role.  It is used as both a position
    in the ring buffer and also as a tree node.  m_ring_buffer[Pos]
    defines a character that is used to identify a tree node.
 -------------------------------------------------------------------------
*/

void cLZSS::InsertNode(                 // no return value
    short int Pos)                      // position in the buffer
    throw()                             // exception list

    {
    short int i;
    short int p;
    int cmp;
    unsigned char * key;

    ASSERT(Pos >= 0);
    ASSERT(Pos < N);

    cmp = 1;
    key = &(m_ring_buffer[Pos]);

    // The last 256 entries in m_rson contain the root nodes for
    // strings that begin with a letter.  Get an index for the
    // first letter in this string.

    p = (short int) (N + 1 + key[0]);

    // Set the left and right tree nodes for this position to "not
    // used."

    m_lson[Pos] = NOT_USED;
    m_rson[Pos] = NOT_USED;

    // Haven't matched anything yet.

    m_match_length = 0;

    for ( ; ; )
        {
        if (cmp >= 0)
            {
            if (m_rson[p] != NOT_USED)
                {
                p = m_rson[p];
                }
            else
                {
                m_rson[p] = Pos;
                m_dad[Pos] = p;
                return;
                }
            }
        else
            {
            if (m_lson[p] != NOT_USED)
                {
                p = m_lson[p];
                }
            else
                {
                m_lson[p] = Pos;
                m_dad[Pos] = p;
                return;
                }
            }

        // Should we go to the right or the left to look for the
        // next match?

        for (i = 1; i < F; i++)
            {
            cmp = key[i] - m_ring_buffer[p + i];
            if (cmp != 0)
                break;
            }

        if (i > m_match_length)
            {
            m_match_position = p;
            m_match_length = i;

            if (i >= F)
                break;
            }
        }

    m_dad[Pos] = m_dad[p];
    m_lson[Pos] = m_lson[p];
    m_rson[Pos] = m_rson[p];

    m_dad[ m_lson[p] ] = Pos;
    m_dad[ m_rson[p] ] = Pos;

    if (m_rson[ m_dad[p] ] == p)
        {
        m_rson[ m_dad[p] ] = Pos;
        }
    else
        {
        m_lson[ m_dad[p] ] = Pos;
        }

    // Remove "p"

    m_dad[p] = NOT_USED;
    }

/*
 -------------------------------------------------------------------------
    cLZSS::DeleteNode   

    This function removes the node "Node" from the tree.
 -------------------------------------------------------------------------
*/

void cLZSS::DeleteNode(                 // no return value
    short int Node)                     // node to be removed
    throw()                             // exception list

    {
    short int  q;

    ASSERT(Node >= 0);
    ASSERT(Node < (N+1));

    if (m_dad[Node] == NOT_USED)
        {
        // not in tree, nothing to do
        return;
        }

    if (m_rson[Node] == NOT_USED)
        {
        q = m_lson[Node];
        }
    else if (m_lson[Node] == NOT_USED)
        {
        q = m_rson[Node];
        }
    else
        {
        q = m_lson[Node];
        if (m_rson[q] != NOT_USED)
            {
            do
                {
                q = m_rson[q];
                }
            while (m_rson[q] != NOT_USED);

            m_rson[ m_dad[q] ] = m_lson[q];
            m_dad[ m_lson[q] ] = m_dad[q];
            m_lson[q] = m_lson[Node];
            m_dad[ m_lson[Node] ] = q;
            }

        m_rson[q] = m_rson[Node];
        m_dad[ m_rson[Node] ] = q;
        }

    m_dad[q] = m_dad[Node];

    if (m_rson[ m_dad[Node] ] == Node)
        {
        m_rson[ m_dad[Node] ] = q;
        }
    else
        {
        m_lson[ m_dad[Node] ] = q;
        }

    m_dad[Node] = NOT_USED;
    }

/*
 -------------------------------------------------------------------------
    cLZSS::Encode

    This function "encodes" the input stream into the output stream.
    The GetChars() and SendChars() functions are used to separate
    this method from the actual i/o.
 -------------------------------------------------------------------------
*/

void cLZSS::Encode(                     // no return value
    void)                               // no parameters

    {
    short int i;                        // an iterator
    short int r;                        // node number in the binary tree
    short int s;                        // position in the ring buffer
    unsigned short int len;             // len of initial string
    short int last_match_length;        // length of last match
    short int code_buf_pos;             // position in the output buffer
    unsigned char code_buf[17];         // the output buffer
    unsigned char mask;                 // bit mask for byte 0 of out buf
    unsigned char c;                    // character read from string

    // Start with a clean tree.

    InitTree();

    // code_buf[0] works as eight flags.  A "1" represents that the
    // unit is an unencoded letter (1 byte), and a "0" represents
    // that the next unit is a <position,length> pair (2 bytes).
    //
    // code_buf[1..16] stores eight units of code.  Since the best
    // we can do is store eight <position,length> pairs, at most 16 
    // bytes are needed to store this.
    //
    // This is why the maximum size of the code buffer is 17 bytes.

    code_buf[0] = 0;
    code_buf_pos = 1;

    // Mask iterates over the 8 bits in the code buffer.  The first
    // character ends up being stored in the low bit.
    //
    //  bit   8   7   6   5   4   3   2   1
    //        |                           |
    //        |             first sequence in code buffer
    //        |
    //      last sequence in code buffer        

    mask = 1;

    s = 0;
    r = (short int) N - (short int) F;

    // Initialize the ring buffer with spaces...

    // Note that the last F bytes of the ring buffer are not filled.
    // This is because those F bytes will be filled in immediately
    // with bytes from the input stream.

    memset(m_ring_buffer, ' ', N - F);
    
    // Read F bytes into the last F bytes of the ring buffer.
    //
    // This function loads the buffer with X characters and returns
    // the actual amount loaded.

    len = GetChars(&(m_ring_buffer[r]), F);

    // Make sure there is something to be compressed.

    if (len == 0)
        return;

    // Insert the F strings, each of which begins with one or more
    // 'space' characters.  Note the order in which these strings
    // are inserted.  This way, degenerate trees will be less likely
    // to occur.

    for (i = 1; i <= F; i++)
        {
        InsertNode((short int) (r - i));
        }

    // Finally, insert the whole string just read.  The
    // member variables match_length and match_position are set.

    InsertNode(r);

    // Now that we're preloaded, continue till done.

    do
        {

        // m_match_length may be spuriously long near the end of
        // text.

        if (m_match_length > len)
            {
            m_match_length = len;
            }

        // Is it cheaper to store this as a single character?  If so,
        // make it so.

        if (m_match_length < THRESHOLD)
            {
            // Send one character.  Remember that code_buf[0] is the
            // set of flags for the next eight items.

            m_match_length = 1;     
            code_buf[0] |= mask;  
            code_buf[code_buf_pos++] = m_ring_buffer[r];
            }

        // Otherwise, we do indeed have a string that can be stored
        // compressed to save space.

        else
            {
            // The next 16 bits need to contain the position (12 bits)
            // and the length (4 bits).

            code_buf[code_buf_pos++] = (unsigned char) m_match_position;
            code_buf[code_buf_pos++] = (unsigned char) (
                ((m_match_position >> 4) & 0xf0) | 
                (m_match_length - THRESHOLD) );
            }

        // Shift the mask one bit to the left so that it will be ready
        // to store the new bit.

        mask = (unsigned char) (mask << 1);

        // If the mask is now 0, then we know that we have a full set
        // of flags and items in the code buffer.  These need to be
        // output.

        if (mask == 0)
            {
            // code_buf is the buffer of characters to be output.
            // code_buf_pos is the number of characters it contains.

            SendChars(code_buf, code_buf_pos);

            // Reset for next buffer...

            code_buf[0] = 0;
            code_buf_pos = 1;
            mask = 1;
            }

        last_match_length = m_match_length;

        // Delete old strings and read new bytes...

        for (i = 0; i < last_match_length; i++)
            {

            // Get next character...

            if (GetChars(&c, 1) != 1)
                break;

            // Delete "old strings"

            DeleteNode(s);

            // Put this character into the ring buffer.
            //          
            // The original comment here says "If the position is near
            // the end of the buffer, extend the buffer to make
            // string comparison easier."
            //
            // That's a little misleading, because the "end" of the 
            // buffer is really what we consider to be the "beginning"
            // of the buffer, that is, positions 0 through F.
            //
            // The idea is that the front end of the buffer is duplicated
            // into the back end so that when you're looking at characters
            // at the back end of the buffer, you can index ahead (beyond
            // the normal end of the buffer) and see the characters
            // that are at the front end of the buffer wihtout having
            // to adjust the index.
            //
            // That is...
            //
            //      1234xxxxxxxxxxxxxxxxxxxxxxxxxxxxx1234
            //      |                               |  |
            //      position 0          end of buffer  |
            //                                         |
            //                  duplicate of front of buffer

            m_ring_buffer[s] = c;

            if (s < F - 1)
                {
                m_ring_buffer[s + N] = c;
                }

            // Increment the position, and wrap around when we're at
            // the end.  Note that this relies on N being a power of 2.

            s = (short int) ( (s + 1) & (N - 1) );
            r = (short int) ( (r + 1) & (N - 1) );

            // Register the string that is found in 
            // m_ring_buffer[r..r+F-1].

            InsertNode(r);
            }

        // If we didn't quit because we hit the last_match_length,
        // then we must have quit because we ran out of characters
        // to process.

        while (i++ < last_match_length)
            {                              
            DeleteNode(s);

            s = (short int) ( (s + 1) & (N - 1) );
            r = (short int) ( (r + 1) & (N - 1) );

            // Note that len hitting 0 is the key that causes the
            // do...while() to terminate.  This is the only place
            // within the loop that len is modified.
            //
            // Its original value is F (or a number less than F for
            // short strings).

            if (--len)
                {
                InsertNode(r);       /* buffer may not be empty. */
                }
            }

        // End of do...while() loop.  Continue processing until there
        // are no more characters to be compressed.  The variable
        // "len" is used to signal this condition.
        }
    while (len > 0);

    // There could still be something in the output buffer.  Send it
    // now.

    if (code_buf_pos > 1)
        {
        // code_buf is the encoded string to send.
        // code_buf_ptr is the number of characters.

        SendChars(code_buf, code_buf_pos);
        }

    // Done!
    }

/*
 -------------------------------------------------------------------------
    cLZSS::Decode   

    This function "decodes" the input stream into the output stream.
    The GetChars() and SendChars() functions are used to separate
    this method from the actual i/o.
 -------------------------------------------------------------------------
*/

void cLZSS::Decode(                     // no return value
    void)                               // no parameters

    {
    int k;
    int r;                              // node number
    unsigned char c[F];                 // an array of chars
    unsigned char flags;                // 8 bits of flags
    int flag_count;                     // which flag we're on
    short int pos;                      // position in the ring buffer
    short int len;                      // number of chars in ring buffer

    // Initialize the ring buffer with a common string.
    //
    // Note that the last F bytes of the ring buffer are not filled.

    memset(m_ring_buffer, ' ', N - F);
    
    r = N - F;

    flags = (char) 0;
    flag_count = 0;

    for ( ; ; )
        {

        // If there are more bits of interest in this flag, then
        // shift that next interesting bit into the 1's position.
        //
        // If this flag has been exhausted, the next byte must 
        // be a flag.

        if (flag_count > 0)
            {
            flags = (unsigned char) (flags >> 1);
            flag_count--;
            }
        else
            {
            // Next byte must be a flag.

            if (GetChars(&flags, 1) != 1)
                break;

            // Set the flag counter.  While at first it might appear
            // that this should be an 8 since there are 8 bits in the
            // flag, it should really be a 7 because the shift must
            // be performed 7 times in order to see all 8 bits.

            flag_count = 7;
            }

        // If the low order bit of the flag is now set, then we know
        // that the next byte is a single, unencoded character.

        if (flags & 1)
            {
            if (GetChars(c, 1) != 1)
                break;

            if (SendChars(c, 1) != 1)
                break;

            // Add to buffer, and increment to next spot. Wrap at end.

            m_ring_buffer[r] = c[0];
            r = (short int) ( (r + 1) & (N - 1) );
            }

        // Otherwise, we know that the next two bytes are a
        // <position,length> pair.  The position is in 12 bits and
        // the length is in 4 bits.

        else
            {
            // Original code:
            //  if ((i = getc(infile)) == EOF)
            //      break;
            //  if ((j = getc(infile)) == EOF)
            //      break;
            //  i |= ((j & 0xf0) << 4);    
            //  j = (j & 0x0f) + THRESHOLD;
            //
            // I've modified this to only make one input call, and
            // have changed the variable names to something more
            // obvious.

            if (GetChars(c, 2) != 2)
                break;

            // Convert these two characters into the position and
            // length.  Note that the length is always at least
            // THRESHOLD, which is why we're able to get a length
            // of 18 out of only 4 bits.

            pos = (short int) ( c[0] | ((c[1] & 0xf0) << 4) );

            len = (short int) ( (c[1] & 0x0f) + THRESHOLD );

            // There are now "len" characters at position "pos" in
            // the ring buffer that can be pulled out.  Note that
            // len is never more than F.

            for (k = 0; k < len; k++)
                {
                c[k] = m_ring_buffer[(pos + k) & (N - 1)];

                // Add to buffer, and increment to next spot. Wrap at end.

                m_ring_buffer[r] = c[k];
                r = (short int) ( (r + 1) & (N - 1) );
                }

            // Add the "len" characters to the output stream.

            if (SendChars(c, len) != len)
                break;
            }
        }
    }