Gradient fill

Carrying out a gradient fill is something very simple to do. The following code carries this out (whether you require a palette or not).

Aside from this function, you need to either have a CRect attribute in the class (m_rcClient), or set the width and height of the fill in the function itself. Also, a bool which indicates whether we need to use a palette or not.

This example carries out a blue gradient fill. If you want to use other colours, then you can do so easily for Red and Green (place the calculation in the Red or Green component of the RGB call!).

It really depends how sophisticated you want to get, you typically need to balance flexibility with speed when it comes to drawing.
void CImageWnd::DoGradientFill(CDC *pDC) const
{
	int nWidth = m_rcClient.Width(); 
	int nHeight = m_rcClient.Height();
	CRect rectangle;

	if(m_bUsePalette)
	{
		for(int i = 0; i < nHeight; ++i) // Fill in strip
		{
			rectangle.SetRect(0, i, nWidth, i + 1);
			
			CBrush brush;
			brush.CreateSolidBrush(RGB(0, 0, 255 - MulDiv(i,>252, nHeight)));
			pDC->FillRect(&rectangle, &brush);
		}
	}
	else
	{
		for(int i = 0; i < nHeight; ++i) // Fill in strip
		{
			rectangle.SetRect(0, i, nWidth, i + 1);
			pDC->FillSolidRect(&rectangle, RGB(0, 0, 255 ->MulDiv(i, 252, nHeight)));
		}
	}
}




Comments

  • There are no comments yet. Be the first to comment!

Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

  • The 3rd Platform of computing, based around the four pillars of mobile computing, social media, big data and analytics, and cloud, is redefining what IT infrastructure needs to provide. Endpoint solutions must meet not only traditional data protection requirements, but also a new set of requirements driven by the explosion in mobile computing. This IDC white paper explores the customer challenges associated with safeguarding data residing on various endpoint devices, including laptops, tablets, and …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date