Commit | Line | Data |
---|---|---|
ca4c9455 | 1 | /* Composite sequence support. |
73b0cd50 | 2 | Copyright (C) 2001-2011 Free Software Foundation, Inc. |
5df4f04c | 3 | Copyright (C) 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011 |
ce03bf76 KH |
4 | National Institute of Advanced Industrial Science and Technology (AIST) |
5 | Registration Number H14PRO021 | |
f30d8d94 | 6 | Copyright (C) 2003, 2006 |
1527c36e KH |
7 | National Institute of Advanced Industrial Science and Technology (AIST) |
8 | Registration Number H13PRO009 | |
ca4c9455 KH |
9 | |
10 | This file is part of GNU Emacs. | |
11 | ||
9ec0b715 | 12 | GNU Emacs is free software: you can redistribute it and/or modify |
ca4c9455 | 13 | it under the terms of the GNU General Public License as published by |
9ec0b715 GM |
14 | the Free Software Foundation, either version 3 of the License, or |
15 | (at your option) any later version. | |
ca4c9455 KH |
16 | |
17 | GNU Emacs is distributed in the hope that it will be useful, | |
18 | but WITHOUT ANY WARRANTY; without even the implied warranty of | |
19 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
20 | GNU General Public License for more details. | |
21 | ||
22 | You should have received a copy of the GNU General Public License | |
9ec0b715 | 23 | along with GNU Emacs. If not, see <http://www.gnu.org/licenses/>. */ |
ca4c9455 KH |
24 | |
25 | #include <config.h> | |
d7306fe6 | 26 | #include <setjmp.h> |
ca4c9455 KH |
27 | #include "lisp.h" |
28 | #include "buffer.h" | |
1527c36e | 29 | #include "character.h" |
f5199465 | 30 | #include "coding.h" |
ca4c9455 | 31 | #include "intervals.h" |
58753d74 KH |
32 | #include "window.h" |
33 | #include "frame.h" | |
34 | #include "dispextern.h" | |
35 | #include "font.h" | |
f5199465 KH |
36 | #include "termhooks.h" |
37 | ||
ca4c9455 KH |
38 | |
39 | /* Emacs uses special text property `composition' to support character | |
40 | composition. A sequence of characters that have the same (i.e. eq) | |
41 | `composition' property value is treated as a single composite | |
42 | sequence (we call it just `composition' here after). Characters in | |
43 | a composition are all composed somehow on the screen. | |
44 | ||
45 | The property value has this form when the composition is made: | |
46 | ((LENGTH . COMPONENTS) . MODIFICATION-FUNC) | |
47 | then turns to this form: | |
48 | (COMPOSITION-ID . (LENGTH COMPONENTS-VEC . MODIFICATION-FUNC)) | |
49 | when the composition is registered in composition_hash_table and | |
50 | composition_table. These rather peculiar structures were designed | |
51 | to make it easy to distinguish them quickly (we can do that by | |
52 | checking only the first element) and to extract LENGTH (from the | |
53 | former form) and COMPOSITION-ID (from the latter form). | |
54 | ||
55 | We register a composition when it is displayed, or when the width | |
56 | is required (for instance, to calculate columns). | |
57 | ||
58 | LENGTH -- Length of the composition. This information is used to | |
59 | check the validity of the composition. | |
60 | ||
61 | COMPONENTS -- Character, string, vector, list, or nil. | |
62 | ||
63 | If it is nil, characters in the text are composed relatively | |
64 | according to their metrics in font glyphs. | |
65 | ||
66 | If it is a character or a string, the character or characters | |
67 | in the string are composed relatively. | |
68 | ||
69 | If it is a vector or list of integers, the element is a | |
70 | character or an encoded composition rule. The characters are | |
71 | composed according to the rules. (2N)th elements are | |
72 | characters to be composed and (2N+1)th elements are | |
73 | composition rules to tell how to compose (2N+2)th element with | |
74 | the previously composed 2N glyphs. | |
75 | ||
763d7377 EZ |
76 | COMPONENTS-VEC -- Vector of integers. In a relative composition, |
77 | the elements are the characters to be composed. In a rule-base | |
ca4c9455 KH |
78 | composition, the elements are characters or encoded |
79 | composition rules. | |
80 | ||
81 | MODIFICATION-FUNC -- If non nil, it is a function to call when the | |
82 | composition gets invalid after a modification in a buffer. If | |
83 | it is nil, a function in `composition-function-table' of the | |
84 | first character in the sequence is called. | |
85 | ||
86 | COMPOSITION-ID --Identification number of the composition. It is | |
87 | used as an index to composition_table for the composition. | |
88 | ||
89 | When Emacs has to display a composition or has to know its | |
90 | displaying width, the function get_composition_id is called. It | |
91 | returns COMPOSITION-ID so that the caller can access the | |
92 | information about the composition through composition_table. If a | |
93 | COMPOSITION-ID has not yet been assigned to the composition, | |
94 | get_composition_id checks the validity of `composition' property, | |
95 | and, if valid, assigns a new ID, registers the information in | |
96 | composition_hash_table and composition_table, and changes the form | |
763d7377 EZ |
97 | of the property value. If the property is invalid, |
98 | get_composition_id returns -1 without changing the property value. | |
ca4c9455 | 99 | |
763d7377 | 100 | We use two tables to keep the information about composition; |
ca4c9455 KH |
101 | composition_hash_table and composition_table. |
102 | ||
763d7377 | 103 | The former is a hash table whose keys are COMPONENTS-VECs and |
ca4c9455 | 104 | values are the corresponding COMPOSITION-IDs. This hash table is |
4abc7470 | 105 | weak, but as each key (COMPONENTS-VEC) is also kept as a value of the |
ca4c9455 | 106 | `composition' property, it won't be collected as garbage until all |
4abc7470 | 107 | bits of text that have the same COMPONENTS-VEC are deleted. |
ca4c9455 KH |
108 | |
109 | The latter is a table of pointers to `struct composition' indexed | |
4abc7470 | 110 | by COMPOSITION-ID. This structure keeps the other information (see |
ca4c9455 KH |
111 | composite.h). |
112 | ||
113 | In general, a text property holds information about individual | |
114 | characters. But, a `composition' property holds information about | |
4abc7470 | 115 | a sequence of characters (in this sense, it is like the `intangible' |
ca4c9455 | 116 | property). That means that we should not share the property value |
4abc7470 | 117 | in adjacent compositions -- we can't distinguish them if they have the |
ca4c9455 KH |
118 | same property. So, after any changes, we call |
119 | `update_compositions' and change a property of one of adjacent | |
120 | compositions to a copy of it. This function also runs a proper | |
121 | composition modification function to make a composition that gets | |
122 | invalid by the change valid again. | |
123 | ||
4abc7470 | 124 | As the value of the `composition' property holds information about a |
ca4c9455 | 125 | specific range of text, the value gets invalid if we change the |
4abc7470 | 126 | text in the range. We treat the `composition' property as always |
ca4c9455 KH |
127 | rear-nonsticky (currently by setting default-text-properties to |
128 | (rear-nonsticky (composition))) and we never make properties of | |
129 | adjacent compositions identical. Thus, any such changes make the | |
4abc7470 | 130 | range just shorter. So, we can check the validity of the `composition' |
ca4c9455 KH |
131 | property by comparing LENGTH information with the actual length of |
132 | the composition. | |
133 | ||
134 | */ | |
135 | ||
136 | ||
137 | Lisp_Object Qcomposition; | |
138 | ||
139 | /* Table of pointers to the structure `composition' indexed by | |
140 | COMPOSITION-ID. This structure is for storing information about | |
141 | each composition except for COMPONENTS-VEC. */ | |
142 | struct composition **composition_table; | |
143 | ||
144 | /* The current size of `composition_table'. */ | |
ebfa62c0 | 145 | static ptrdiff_t composition_table_size; |
ca4c9455 KH |
146 | |
147 | /* Number of compositions currently made. */ | |
ebfa62c0 | 148 | ptrdiff_t n_compositions; |
ca4c9455 KH |
149 | |
150 | /* Hash table for compositions. The key is COMPONENTS-VEC of | |
151 | `composition' property. The value is the corresponding | |
152 | COMPOSITION-ID. */ | |
153 | Lisp_Object composition_hash_table; | |
154 | ||
955cbe7b PE |
155 | static Lisp_Object Qauto_composed; |
156 | static Lisp_Object Qauto_composition_function; | |
763d7377 EZ |
157 | /* Maximum number of characters to look back for |
158 | auto-compositions. */ | |
895416e3 KH |
159 | #define MAX_AUTO_COMPOSITION_LOOKBACK 3 |
160 | ||
cd64ea1d PE |
161 | static Lisp_Object Fcomposition_get_gstring (Lisp_Object, Lisp_Object, |
162 | Lisp_Object, Lisp_Object); | |
ea058d2c | 163 | |
ca4c9455 KH |
164 | /* Temporary variable used in macros COMPOSITION_XXX. */ |
165 | Lisp_Object composition_temp; | |
f30d8d94 | 166 | |
ca4c9455 | 167 | \f |
ca4c9455 KH |
168 | /* Return COMPOSITION-ID of a composition at buffer position |
169 | CHARPOS/BYTEPOS and length NCHARS. The `composition' property of | |
170 | the sequence is PROP. STRING, if non-nil, is a string that | |
171 | contains the composition instead of the current buffer. | |
172 | ||
173 | If the composition is invalid, return -1. */ | |
174 | ||
ebfa62c0 | 175 | ptrdiff_t |
579c18d0 EZ |
176 | get_composition_id (EMACS_INT charpos, EMACS_INT bytepos, EMACS_INT nchars, |
177 | Lisp_Object prop, Lisp_Object string) | |
ca4c9455 KH |
178 | { |
179 | Lisp_Object id, length, components, key, *key_contents; | |
d86d0d74 | 180 | ptrdiff_t glyph_len; |
ca4c9455 | 181 | struct Lisp_Hash_Table *hash_table = XHASH_TABLE (composition_hash_table); |
d3411f89 | 182 | ptrdiff_t hash_index; |
0de4bb68 | 183 | EMACS_UINT hash_code; |
d86d0d74 | 184 | enum composition_method method; |
ca4c9455 | 185 | struct composition *cmp; |
579c18d0 EZ |
186 | EMACS_INT i; |
187 | int ch; | |
ca4c9455 | 188 | |
0065d054 PE |
189 | /* Maximum length of a string of glyphs. XftGlyphExtents limits |
190 | this to INT_MAX, and Emacs limits it further. Divide INT_MAX - 1 | |
191 | by 2 because x_produce_glyphs computes glyph_len * 2 + 1. Divide | |
192 | the size by MAX_MULTIBYTE_LENGTH because encode_terminal_code | |
193 | multiplies glyph_len by MAX_MULTIBYTE_LENGTH. */ | |
d86d0d74 | 194 | enum { |
0065d054 PE |
195 | GLYPH_LEN_MAX = min ((INT_MAX - 1) / 2, |
196 | min (PTRDIFF_MAX, SIZE_MAX) / MAX_MULTIBYTE_LENGTH) | |
d86d0d74 PE |
197 | }; |
198 | ||
ca4c9455 KH |
199 | /* PROP should be |
200 | Form-A: ((LENGTH . COMPONENTS) . MODIFICATION-FUNC) | |
201 | or | |
202 | Form-B: (COMPOSITION-ID . (LENGTH COMPONENTS-VEC . MODIFICATION-FUNC)) | |
203 | */ | |
204 | if (nchars == 0 || !CONSP (prop)) | |
205 | goto invalid_composition; | |
206 | ||
207 | id = XCAR (prop); | |
208 | if (INTEGERP (id)) | |
209 | { | |
210 | /* PROP should be Form-B. */ | |
211 | if (XINT (id) < 0 || XINT (id) >= n_compositions) | |
212 | goto invalid_composition; | |
213 | return XINT (id); | |
214 | } | |
215 | ||
216 | /* PROP should be Form-A. | |
217 | Thus, ID should be (LENGTH . COMPONENTS). */ | |
218 | if (!CONSP (id)) | |
219 | goto invalid_composition; | |
220 | length = XCAR (id); | |
221 | if (!INTEGERP (length) || XINT (length) != nchars) | |
222 | goto invalid_composition; | |
223 | ||
224 | components = XCDR (id); | |
225 | ||
226 | /* Check if the same composition has already been registered or not | |
227 | by consulting composition_hash_table. The key for this table is | |
228 | COMPONENTS (converted to a vector COMPONENTS-VEC) or, if it is | |
229 | nil, vector of characters in the composition range. */ | |
230 | if (INTEGERP (components)) | |
231 | key = Fmake_vector (make_number (1), components); | |
232 | else if (STRINGP (components) || CONSP (components)) | |
233 | key = Fvconcat (1, &components); | |
234 | else if (VECTORP (components)) | |
235 | key = components; | |
236 | else if (NILP (components)) | |
237 | { | |
238 | key = Fmake_vector (make_number (nchars), Qnil); | |
239 | if (STRINGP (string)) | |
240 | for (i = 0; i < nchars; i++) | |
241 | { | |
242 | FETCH_STRING_CHAR_ADVANCE (ch, string, charpos, bytepos); | |
243 | XVECTOR (key)->contents[i] = make_number (ch); | |
244 | } | |
245 | else | |
246 | for (i = 0; i < nchars; i++) | |
247 | { | |
248 | FETCH_CHAR_ADVANCE (ch, charpos, bytepos); | |
249 | XVECTOR (key)->contents[i] = make_number (ch); | |
250 | } | |
251 | } | |
252 | else | |
253 | goto invalid_composition; | |
254 | ||
255 | hash_index = hash_lookup (hash_table, key, &hash_code); | |
256 | if (hash_index >= 0) | |
257 | { | |
258 | /* We have already registered the same composition. Change PROP | |
259 | from Form-A above to Form-B while replacing COMPONENTS with | |
260 | COMPONENTS-VEC stored in the hash table. We can directly | |
261 | modify the cons cell of PROP because it is not shared. */ | |
262 | key = HASH_KEY (hash_table, hash_index); | |
263 | id = HASH_VALUE (hash_table, hash_index); | |
f3fbd155 KR |
264 | XSETCAR (prop, id); |
265 | XSETCDR (prop, Fcons (make_number (nchars), Fcons (key, XCDR (prop)))); | |
ca4c9455 KH |
266 | return XINT (id); |
267 | } | |
268 | ||
269 | /* This composition is a new one. We must register it. */ | |
177c0ea7 | 270 | |
ca4c9455 | 271 | /* Check if we have sufficient memory to store this information. */ |
0065d054 PE |
272 | if (composition_table_size <= n_compositions) |
273 | composition_table = xpalloc (composition_table, &composition_table_size, | |
274 | 1, -1, sizeof *composition_table); | |
ca4c9455 KH |
275 | |
276 | key_contents = XVECTOR (key)->contents; | |
277 | ||
278 | /* Check if the contents of COMPONENTS are valid if COMPONENTS is a | |
279 | vector or a list. It should be a sequence of: | |
280 | char1 rule1 char2 rule2 char3 ... ruleN charN+1 */ | |
f30d8d94 | 281 | |
dd5e1ed4 | 282 | if (VECTORP (components) |
f30d8d94 KH |
283 | && ASIZE (components) >= 2 |
284 | && VECTORP (AREF (components, 0))) | |
285 | { | |
286 | /* COMPONENTS is a glyph-string. */ | |
7d100a81 | 287 | EMACS_INT len = ASIZE (key); |
f30d8d94 KH |
288 | |
289 | for (i = 1; i < len; i++) | |
290 | if (! VECTORP (AREF (key, i))) | |
291 | goto invalid_composition; | |
292 | } | |
dd5e1ed4 | 293 | else if (VECTORP (components) || CONSP (components)) |
ca4c9455 | 294 | { |
7d100a81 | 295 | EMACS_INT len = ASIZE (key); |
ca4c9455 KH |
296 | |
297 | /* The number of elements should be odd. */ | |
298 | if ((len % 2) == 0) | |
299 | goto invalid_composition; | |
300 | /* All elements should be integers (character or encoded | |
301 | composition rule). */ | |
302 | for (i = 0; i < len; i++) | |
303 | { | |
304 | if (!INTEGERP (key_contents[i])) | |
305 | goto invalid_composition; | |
306 | } | |
307 | } | |
308 | ||
309 | /* Change PROP from Form-A above to Form-B. We can directly modify | |
310 | the cons cell of PROP because it is not shared. */ | |
311 | XSETFASTINT (id, n_compositions); | |
f3fbd155 KR |
312 | XSETCAR (prop, id); |
313 | XSETCDR (prop, Fcons (make_number (nchars), Fcons (key, XCDR (prop)))); | |
ca4c9455 KH |
314 | |
315 | /* Register the composition in composition_hash_table. */ | |
316 | hash_index = hash_put (hash_table, key, id, hash_code); | |
317 | ||
d86d0d74 PE |
318 | method = (NILP (components) |
319 | ? COMPOSITION_RELATIVE | |
320 | : ((INTEGERP (components) || STRINGP (components)) | |
321 | ? COMPOSITION_WITH_ALTCHARS | |
322 | : COMPOSITION_WITH_RULE_ALTCHARS)); | |
323 | ||
324 | glyph_len = (method == COMPOSITION_WITH_RULE_ALTCHARS | |
325 | ? (ASIZE (key) + 1) / 2 | |
326 | : ASIZE (key)); | |
327 | ||
0065d054 | 328 | if (GLYPH_LEN_MAX < glyph_len) |
d86d0d74 PE |
329 | memory_full (SIZE_MAX); |
330 | ||
ca4c9455 KH |
331 | /* Register the composition in composition_table. */ |
332 | cmp = (struct composition *) xmalloc (sizeof (struct composition)); | |
333 | ||
d86d0d74 | 334 | cmp->method = method; |
ca4c9455 | 335 | cmp->hash_index = hash_index; |
ca4c9455 | 336 | cmp->glyph_len = glyph_len; |
0065d054 | 337 | cmp->offsets = xnmalloc (glyph_len, 2 * sizeof *cmp->offsets); |
ca4c9455 KH |
338 | cmp->font = NULL; |
339 | ||
58753d74 | 340 | if (cmp->method != COMPOSITION_WITH_RULE_ALTCHARS) |
ca4c9455 KH |
341 | { |
342 | /* Relative composition. */ | |
343 | cmp->width = 0; | |
344 | for (i = 0; i < glyph_len; i++) | |
345 | { | |
346 | int this_width; | |
347 | ch = XINT (key_contents[i]); | |
8e86803c | 348 | this_width = (ch == '\t' ? 1 : CHAR_WIDTH (ch)); |
ca4c9455 KH |
349 | if (cmp->width < this_width) |
350 | cmp->width = this_width; | |
351 | } | |
352 | } | |
353 | else | |
354 | { | |
355 | /* Rule-base composition. */ | |
356 | float leftmost = 0.0, rightmost; | |
357 | ||
358 | ch = XINT (key_contents[0]); | |
69df789a | 359 | rightmost = ch != '\t' ? CHAR_WIDTH (ch) : 1; |
ca4c9455 KH |
360 | |
361 | for (i = 1; i < glyph_len; i += 2) | |
362 | { | |
b13a45c6 | 363 | int rule, gref, nref; |
ca4c9455 KH |
364 | int this_width; |
365 | float this_left; | |
366 | ||
367 | rule = XINT (key_contents[i]); | |
368 | ch = XINT (key_contents[i + 1]); | |
69df789a | 369 | this_width = ch != '\t' ? CHAR_WIDTH (ch) : 1; |
ca4c9455 KH |
370 | |
371 | /* A composition rule is specified by an integer value | |
372 | that encodes global and new reference points (GREF and | |
373 | NREF). GREF and NREF are specified by numbers as | |
374 | below: | |
375 | 0---1---2 -- ascent | |
376 | | | | |
377 | | | | |
378 | | | | |
379 | 9--10--11 -- center | |
380 | | | | |
381 | ---3---4---5--- baseline | |
382 | | | | |
383 | 6---7---8 -- descent | |
384 | */ | |
b13a45c6 | 385 | COMPOSITION_DECODE_REFS (rule, gref, nref); |
ca4c9455 KH |
386 | this_left = (leftmost |
387 | + (gref % 3) * (rightmost - leftmost) / 2.0 | |
388 | - (nref % 3) * this_width / 2.0); | |
389 | ||
390 | if (this_left < leftmost) | |
391 | leftmost = this_left; | |
392 | if (this_left + this_width > rightmost) | |
393 | rightmost = this_left + this_width; | |
394 | } | |
395 | ||
396 | cmp->width = rightmost - leftmost; | |
397 | if (cmp->width < (rightmost - leftmost)) | |
398 | /* To get a ceiling integer value. */ | |
399 | cmp->width++; | |
400 | } | |
401 | ||
402 | composition_table[n_compositions] = cmp; | |
403 | ||
404 | return n_compositions++; | |
405 | ||
406 | invalid_composition: | |
407 | /* Would it be better to remove this `composition' property? */ | |
408 | return -1; | |
409 | } | |
410 | ||
411 | \f | |
90b3fe91 KH |
412 | /* Find a static composition at or nearest to position POS of OBJECT |
413 | (buffer or string). | |
ca4c9455 KH |
414 | |
415 | OBJECT defaults to the current buffer. If there's a composition at | |
416 | POS, set *START and *END to the start and end of the sequence, | |
417 | *PROP to the `composition' property, and return 1. | |
418 | ||
419 | If there's no composition at POS and LIMIT is negative, return 0. | |
420 | ||
421 | Otherwise, search for a composition forward (LIMIT > POS) or | |
422 | backward (LIMIT < POS). In this case, LIMIT bounds the search. | |
423 | ||
424 | If a composition is found, set *START, *END, and *PROP as above, | |
425 | and return 1, else return 0. | |
426 | ||
427 | This doesn't check the validity of composition. */ | |
428 | ||
429 | int | |
579c18d0 EZ |
430 | find_composition (EMACS_INT pos, EMACS_INT limit, |
431 | EMACS_INT *start, EMACS_INT *end, | |
432 | Lisp_Object *prop, Lisp_Object object) | |
ca4c9455 KH |
433 | { |
434 | Lisp_Object val; | |
435 | ||
436 | if (get_property_and_range (pos, Qcomposition, prop, start, end, object)) | |
437 | return 1; | |
438 | ||
439 | if (limit < 0 || limit == pos) | |
440 | return 0; | |
441 | ||
442 | if (limit > pos) /* search forward */ | |
d279f620 KH |
443 | { |
444 | val = Fnext_single_property_change (make_number (pos), Qcomposition, | |
445 | object, make_number (limit)); | |
446 | pos = XINT (val); | |
447 | if (pos == limit) | |
448 | return 0; | |
449 | } | |
ca4c9455 | 450 | else /* search backward */ |
d279f620 KH |
451 | { |
452 | if (get_property_and_range (pos - 1, Qcomposition, prop, start, end, | |
453 | object)) | |
454 | return 1; | |
455 | val = Fprevious_single_property_change (make_number (pos), Qcomposition, | |
456 | object, make_number (limit)); | |
457 | pos = XINT (val); | |
458 | if (pos == limit) | |
459 | return 0; | |
460 | pos--; | |
461 | } | |
ca4c9455 KH |
462 | get_property_and_range (pos, Qcomposition, prop, start, end, object); |
463 | return 1; | |
464 | } | |
465 | ||
466 | /* Run a proper function to adjust the composition sitting between | |
467 | FROM and TO with property PROP. */ | |
468 | ||
469 | static void | |
579c18d0 | 470 | run_composition_function (EMACS_INT from, EMACS_INT to, Lisp_Object prop) |
ca4c9455 | 471 | { |
7d019510 | 472 | Lisp_Object func; |
aaefca97 | 473 | EMACS_INT start, end; |
ca4c9455 KH |
474 | |
475 | func = COMPOSITION_MODIFICATION_FUNC (prop); | |
476 | /* If an invalid composition precedes or follows, try to make them | |
477 | valid too. */ | |
478 | if (from > BEGV | |
479 | && find_composition (from - 1, -1, &start, &end, &prop, Qnil) | |
480 | && !COMPOSITION_VALID_P (start, end, prop)) | |
481 | from = start; | |
482 | if (to < ZV | |
483 | && find_composition (to, -1, &start, &end, &prop, Qnil) | |
484 | && !COMPOSITION_VALID_P (start, end, prop)) | |
485 | to = end; | |
775b3d2d | 486 | if (!NILP (Ffboundp (func))) |
ca4c9455 | 487 | call2 (func, make_number (from), make_number (to)); |
ca4c9455 KH |
488 | } |
489 | ||
490 | /* Make invalid compositions adjacent to or inside FROM and TO valid. | |
491 | CHECK_MASK is bitwise `or' of mask bits defined by macros | |
492 | CHECK_XXX (see the comment in composite.h). | |
493 | ||
b418f8a6 | 494 | It also resets the text-property `auto-composed' to a proper region |
f96ba4c1 KH |
495 | so that automatic character composition works correctly later while |
496 | displaying the region. | |
8f924df7 | 497 | |
ca4c9455 KH |
498 | This function is called when a buffer text is changed. If the |
499 | change is deletion, FROM == TO. Otherwise, FROM < TO. */ | |
500 | ||
501 | void | |
971de7fb | 502 | update_compositions (EMACS_INT from, EMACS_INT to, int check_mask) |
ca4c9455 | 503 | { |
7d019510 | 504 | Lisp_Object prop; |
aaefca97 | 505 | EMACS_INT start, end; |
f96ba4c1 KH |
506 | /* The beginning and end of the region to set the property |
507 | `auto-composed' to nil. */ | |
aaefca97 | 508 | EMACS_INT min_pos = from, max_pos = to; |
ca4c9455 | 509 | |
6c1aa7f1 GM |
510 | if (inhibit_modification_hooks) |
511 | return; | |
177c0ea7 | 512 | |
d3f40cbd KH |
513 | /* If FROM and TO are not in a valid range, do nothing. */ |
514 | if (! (BEGV <= from && from <= to && to <= ZV)) | |
515 | return; | |
516 | ||
ca4c9455 KH |
517 | if (check_mask & CHECK_HEAD) |
518 | { | |
519 | /* FROM should be at composition boundary. But, insertion or | |
520 | deletion will make two compositions adjacent and | |
521 | indistinguishable when they have same (eq) property. To | |
522 | avoid it, in such a case, we change the property of the | |
523 | latter to the copy of it. */ | |
524 | if (from > BEGV | |
553d3164 KH |
525 | && find_composition (from - 1, -1, &start, &end, &prop, Qnil) |
526 | && COMPOSITION_VALID_P (start, end, prop)) | |
ca4c9455 | 527 | { |
f96ba4c1 KH |
528 | min_pos = start; |
529 | if (end > to) | |
530 | max_pos = end; | |
ca4c9455 KH |
531 | if (from < end) |
532 | Fput_text_property (make_number (from), make_number (end), | |
533 | Qcomposition, | |
534 | Fcons (XCAR (prop), XCDR (prop)), Qnil); | |
535 | run_composition_function (start, end, prop); | |
536 | from = end; | |
537 | } | |
dd33cc56 | 538 | else if (from < ZV |
553d3164 | 539 | && find_composition (from, -1, &start, &from, &prop, Qnil) |
9657d668 | 540 | && COMPOSITION_VALID_P (start, from, prop)) |
f96ba4c1 KH |
541 | { |
542 | if (from > to) | |
543 | max_pos = from; | |
544 | run_composition_function (start, from, prop); | |
545 | } | |
ca4c9455 KH |
546 | } |
547 | ||
548 | if (check_mask & CHECK_INSIDE) | |
549 | { | |
550 | /* In this case, we are sure that (check & CHECK_TAIL) is also | |
551 | nonzero. Thus, here we should check only compositions before | |
552 | (to - 1). */ | |
553 | while (from < to - 1 | |
554 | && find_composition (from, to, &start, &from, &prop, Qnil) | |
9657d668 | 555 | && COMPOSITION_VALID_P (start, from, prop) |
ca4c9455 KH |
556 | && from < to - 1) |
557 | run_composition_function (start, from, prop); | |
558 | } | |
559 | ||
560 | if (check_mask & CHECK_TAIL) | |
561 | { | |
562 | if (from < to | |
553d3164 KH |
563 | && find_composition (to - 1, -1, &start, &end, &prop, Qnil) |
564 | && COMPOSITION_VALID_P (start, end, prop)) | |
ca4c9455 KH |
565 | { |
566 | /* TO should be also at composition boundary. But, | |
567 | insertion or deletion will make two compositions adjacent | |
568 | and indistinguishable when they have same (eq) property. | |
569 | To avoid it, in such a case, we change the property of | |
570 | the former to the copy of it. */ | |
571 | if (to < end) | |
f96ba4c1 KH |
572 | { |
573 | Fput_text_property (make_number (start), make_number (to), | |
574 | Qcomposition, | |
575 | Fcons (XCAR (prop), XCDR (prop)), Qnil); | |
576 | max_pos = end; | |
577 | } | |
ca4c9455 KH |
578 | run_composition_function (start, end, prop); |
579 | } | |
580 | else if (to < ZV | |
553d3164 KH |
581 | && find_composition (to, -1, &start, &end, &prop, Qnil) |
582 | && COMPOSITION_VALID_P (start, end, prop)) | |
f96ba4c1 KH |
583 | { |
584 | run_composition_function (start, end, prop); | |
585 | max_pos = end; | |
586 | } | |
ca4c9455 | 587 | } |
f96ba4c1 | 588 | if (min_pos < max_pos) |
9d440521 KH |
589 | { |
590 | int count = SPECPDL_INDEX (); | |
591 | ||
592 | specbind (Qinhibit_read_only, Qt); | |
593 | specbind (Qinhibit_modification_hooks, Qt); | |
594 | specbind (Qinhibit_point_motion_hooks, Qt); | |
595 | Fremove_list_of_text_properties (make_number (min_pos), | |
596 | make_number (max_pos), | |
597 | Fcons (Qauto_composed, Qnil), Qnil); | |
598 | unbind_to (count, Qnil); | |
599 | } | |
ca4c9455 KH |
600 | } |
601 | ||
c1361885 KH |
602 | |
603 | /* Modify composition property values in LIST destructively. LIST is | |
604 | a list as returned from text_property_list. Change values to the | |
605 | top-level copies of them so that none of them are `eq'. */ | |
606 | ||
607 | void | |
971de7fb | 608 | make_composition_value_copy (Lisp_Object list) |
c1361885 KH |
609 | { |
610 | Lisp_Object plist, val; | |
611 | ||
612 | for (; CONSP (list); list = XCDR (list)) | |
613 | { | |
614 | plist = XCAR (XCDR (XCDR (XCAR (list)))); | |
615 | while (CONSP (plist) && CONSP (XCDR (plist))) | |
616 | { | |
617 | if (EQ (XCAR (plist), Qcomposition) | |
618 | && (val = XCAR (XCDR (plist)), CONSP (val))) | |
f3fbd155 | 619 | XSETCAR (XCDR (plist), Fcons (XCAR (val), XCDR (val))); |
c1361885 KH |
620 | plist = XCDR (XCDR (plist)); |
621 | } | |
622 | } | |
623 | } | |
624 | ||
625 | ||
ca4c9455 KH |
626 | /* Make text in the region between START and END a composition that |
627 | has COMPONENTS and MODIFICATION-FUNC. | |
628 | ||
629 | If STRING is non-nil, then operate on characters contained between | |
630 | indices START and END in STRING. */ | |
631 | ||
632 | void | |
579c18d0 EZ |
633 | compose_text (EMACS_INT start, EMACS_INT end, Lisp_Object components, |
634 | Lisp_Object modification_func, Lisp_Object string) | |
ca4c9455 KH |
635 | { |
636 | Lisp_Object prop; | |
637 | ||
638 | prop = Fcons (Fcons (make_number (end - start), components), | |
639 | modification_func); | |
640 | Fput_text_property (make_number (start), make_number (end), | |
641 | Qcomposition, prop, string); | |
642 | } | |
58753d74 KH |
643 | |
644 | ||
f57e2426 J |
645 | static Lisp_Object autocmp_chars (Lisp_Object, EMACS_INT, EMACS_INT, |
646 | EMACS_INT, struct window *, | |
647 | struct face *, Lisp_Object); | |
58753d74 KH |
648 | |
649 | \f | |
650 | /* Lisp glyph-string handlers */ | |
651 | ||
652 | /* Hash table for automatic composition. The key is a header of a | |
653 | lgstring (Lispy glyph-string), and the value is a body of a | |
654 | lgstring. */ | |
655 | ||
656 | static Lisp_Object gstring_hash_table; | |
657 | ||
f57e2426 | 658 | static Lisp_Object gstring_lookup_cache (Lisp_Object); |
58753d74 KH |
659 | |
660 | static Lisp_Object | |
971de7fb | 661 | gstring_lookup_cache (Lisp_Object header) |
58753d74 KH |
662 | { |
663 | struct Lisp_Hash_Table *h = XHASH_TABLE (gstring_hash_table); | |
d3411f89 | 664 | ptrdiff_t i = hash_lookup (h, header, NULL); |
58753d74 KH |
665 | |
666 | return (i >= 0 ? HASH_VALUE (h, i) : Qnil); | |
667 | } | |
668 | ||
669 | Lisp_Object | |
dcd5c89a | 670 | composition_gstring_put_cache (Lisp_Object gstring, EMACS_INT len) |
58753d74 KH |
671 | { |
672 | struct Lisp_Hash_Table *h = XHASH_TABLE (gstring_hash_table); | |
0de4bb68 | 673 | EMACS_UINT hash; |
58753d74 | 674 | Lisp_Object header, copy; |
dcd5c89a | 675 | EMACS_INT i; |
58753d74 KH |
676 | |
677 | header = LGSTRING_HEADER (gstring); | |
678 | hash = h->hashfn (h, header); | |
679 | if (len < 0) | |
680 | { | |
7d100a81 | 681 | EMACS_INT j, glyph_len = LGSTRING_GLYPH_LEN (gstring); |
27ccc379 PE |
682 | for (j = 0; j < glyph_len; j++) |
683 | if (NILP (LGSTRING_GLYPH (gstring, j))) | |
58753d74 | 684 | break; |
27ccc379 | 685 | len = j; |
58753d74 | 686 | } |
087e2ea9 | 687 | |
f2ed8a70 | 688 | lint_assume (len <= TYPE_MAXIMUM (EMACS_INT) - 2); |
58753d74 KH |
689 | copy = Fmake_vector (make_number (len + 2), Qnil); |
690 | LGSTRING_SET_HEADER (copy, Fcopy_sequence (header)); | |
691 | for (i = 0; i < len; i++) | |
692 | LGSTRING_SET_GLYPH (copy, i, Fcopy_sequence (LGSTRING_GLYPH (gstring, i))); | |
693 | i = hash_put (h, LGSTRING_HEADER (copy), copy, hash); | |
694 | LGSTRING_SET_ID (copy, make_number (i)); | |
695 | return copy; | |
696 | } | |
697 | ||
698 | Lisp_Object | |
ebfa62c0 | 699 | composition_gstring_from_id (ptrdiff_t id) |
58753d74 KH |
700 | { |
701 | struct Lisp_Hash_Table *h = XHASH_TABLE (gstring_hash_table); | |
702 | ||
703 | return HASH_VALUE (h, id); | |
704 | } | |
705 | ||
f57e2426 J |
706 | static Lisp_Object fill_gstring_header (Lisp_Object, Lisp_Object, |
707 | Lisp_Object, Lisp_Object, | |
708 | Lisp_Object); | |
58753d74 KH |
709 | |
710 | int | |
971de7fb | 711 | composition_gstring_p (Lisp_Object gstring) |
58753d74 KH |
712 | { |
713 | Lisp_Object header; | |
5eb55db9 | 714 | EMACS_INT i; |
58753d74 KH |
715 | |
716 | if (! VECTORP (gstring) || ASIZE (gstring) < 2) | |
717 | return 0; | |
718 | header = LGSTRING_HEADER (gstring); | |
719 | if (! VECTORP (header) || ASIZE (header) < 2) | |
720 | return 0; | |
721 | if (! NILP (LGSTRING_FONT (gstring)) | |
f5199465 KH |
722 | && (! FONT_OBJECT_P (LGSTRING_FONT (gstring)) |
723 | && ! CODING_SYSTEM_P (LGSTRING_FONT (gstring)))) | |
58753d74 KH |
724 | return 0; |
725 | for (i = 1; i < ASIZE (LGSTRING_HEADER (gstring)); i++) | |
726 | if (! NATNUMP (AREF (LGSTRING_HEADER (gstring), i))) | |
727 | return 0; | |
728 | if (! NILP (LGSTRING_ID (gstring)) && ! NATNUMP (LGSTRING_ID (gstring))) | |
729 | return 0; | |
730 | for (i = 0; i < LGSTRING_GLYPH_LEN (gstring); i++) | |
731 | { | |
732 | Lisp_Object glyph = LGSTRING_GLYPH (gstring, i); | |
733 | if (NILP (glyph)) | |
734 | break; | |
735 | if (! VECTORP (glyph) || ASIZE (glyph) != LGLYPH_SIZE) | |
736 | return 0; | |
737 | } | |
738 | return 1; | |
739 | } | |
740 | ||
741 | int | |
579c18d0 EZ |
742 | composition_gstring_width (Lisp_Object gstring, EMACS_INT from, EMACS_INT to, |
743 | struct font_metrics *metrics) | |
58753d74 KH |
744 | { |
745 | Lisp_Object *glyph; | |
746 | int width = 0; | |
747 | ||
748 | if (metrics) | |
749 | { | |
750 | Lisp_Object font_object = LGSTRING_FONT (gstring); | |
58753d74 | 751 | |
f5199465 KH |
752 | if (FONT_OBJECT_P (font_object)) |
753 | { | |
754 | struct font *font = XFONT_OBJECT (font_object); | |
755 | ||
756 | metrics->ascent = font->ascent; | |
757 | metrics->descent = font->descent; | |
758 | } | |
759 | else | |
760 | { | |
761 | metrics->ascent = 1; | |
762 | metrics->descent = 0; | |
763 | } | |
58753d74 KH |
764 | metrics->width = metrics->lbearing = metrics->rbearing = 0; |
765 | } | |
766 | for (glyph = &LGSTRING_GLYPH (gstring, from); from < to; from++, glyph++) | |
767 | { | |
768 | int x; | |
769 | ||
770 | if (NILP (LGLYPH_ADJUSTMENT (*glyph))) | |
771 | width += LGLYPH_WIDTH (*glyph); | |
772 | else | |
773 | width += LGLYPH_WADJUST (*glyph); | |
774 | if (metrics) | |
775 | { | |
776 | x = metrics->width + LGLYPH_LBEARING (*glyph) + LGLYPH_XOFF (*glyph); | |
777 | if (metrics->lbearing > x) | |
778 | metrics->lbearing = x; | |
779 | x = metrics->width + LGLYPH_RBEARING (*glyph) + LGLYPH_XOFF (*glyph); | |
780 | if (metrics->rbearing < x) | |
781 | metrics->rbearing = x; | |
782 | metrics->width = width; | |
783 | x = LGLYPH_ASCENT (*glyph) - LGLYPH_YOFF (*glyph); | |
784 | if (metrics->ascent < x) | |
785 | metrics->ascent = x; | |
895416e3 | 786 | x = LGLYPH_DESCENT (*glyph) + LGLYPH_YOFF (*glyph); |
58753d74 KH |
787 | if (metrics->descent < x) |
788 | metrics->descent = x; | |
789 | } | |
790 | } | |
791 | return width; | |
792 | } | |
793 | ||
794 | ||
795 | static Lisp_Object gstring_work; | |
796 | static Lisp_Object gstring_work_headers; | |
797 | ||
798 | static Lisp_Object | |
971de7fb | 799 | fill_gstring_header (Lisp_Object header, Lisp_Object start, Lisp_Object end, Lisp_Object font_object, Lisp_Object string) |
58753d74 KH |
800 | { |
801 | EMACS_INT from, to, from_byte; | |
802 | EMACS_INT len, i; | |
803 | ||
804 | if (NILP (string)) | |
805 | { | |
4b4deea2 | 806 | if (NILP (BVAR (current_buffer, enable_multibyte_characters))) |
58753d74 KH |
807 | error ("Attempt to shape unibyte text"); |
808 | validate_region (&start, &end); | |
809 | from = XFASTINT (start); | |
810 | to = XFASTINT (end); | |
811 | from_byte = CHAR_TO_BYTE (from); | |
812 | } | |
813 | else | |
814 | { | |
815 | CHECK_STRING (string); | |
793ffee8 | 816 | if (! STRING_MULTIBYTE (string)) |
58753d74 | 817 | error ("Attempt to shape unibyte text"); |
ea8ba975 | 818 | /* FROM and TO are checked by the caller. */ |
58753d74 | 819 | from = XINT (start); |
58753d74 KH |
820 | to = XINT (end); |
821 | if (from < 0 || from > to || to > SCHARS (string)) | |
822 | args_out_of_range_3 (string, start, end); | |
823 | from_byte = string_char_to_byte (string, from); | |
824 | } | |
825 | ||
826 | len = to - from; | |
827 | if (len == 0) | |
828 | error ("Attempt to shape zero-length text"); | |
829 | if (VECTORP (header)) | |
830 | { | |
831 | if (ASIZE (header) != len + 1) | |
832 | args_out_of_range (header, make_number (len + 1)); | |
833 | } | |
834 | else | |
835 | { | |
836 | if (len <= 8) | |
837 | header = AREF (gstring_work_headers, len - 1); | |
838 | else | |
839 | header = Fmake_vector (make_number (len + 1), Qnil); | |
840 | } | |
841 | ||
842 | ASET (header, 0, font_object); | |
843 | for (i = 0; i < len; i++) | |
844 | { | |
845 | int c; | |
846 | ||
847 | if (NILP (string)) | |
848 | FETCH_CHAR_ADVANCE_NO_CHECK (c, from, from_byte); | |
849 | else | |
850 | FETCH_STRING_CHAR_ADVANCE_NO_CHECK (c, string, from, from_byte); | |
851 | ASET (header, i + 1, make_number (c)); | |
852 | } | |
853 | return header; | |
854 | } | |
855 | ||
58753d74 | 856 | static void |
971de7fb | 857 | fill_gstring_body (Lisp_Object gstring) |
58753d74 KH |
858 | { |
859 | Lisp_Object font_object = LGSTRING_FONT (gstring); | |
860 | Lisp_Object header = AREF (gstring, 0); | |
861 | EMACS_INT len = LGSTRING_CHAR_LEN (gstring); | |
862 | EMACS_INT i; | |
863 | ||
864 | for (i = 0; i < len; i++) | |
865 | { | |
866 | Lisp_Object g = LGSTRING_GLYPH (gstring, i); | |
f8c86b69 | 867 | int c = XFASTINT (AREF (header, i + 1)); |
58753d74 KH |
868 | |
869 | if (NILP (g)) | |
870 | { | |
871 | g = LGLYPH_NEW (); | |
872 | LGSTRING_SET_GLYPH (gstring, i, g); | |
873 | } | |
874 | LGLYPH_SET_FROM (g, i); | |
875 | LGLYPH_SET_TO (g, i); | |
876 | LGLYPH_SET_CHAR (g, c); | |
f5199465 | 877 | if (FONT_OBJECT_P (font_object)) |
58753d74 KH |
878 | { |
879 | font_fill_lglyph_metrics (g, font_object); | |
880 | } | |
881 | else | |
882 | { | |
883 | int width = XFASTINT (CHAR_TABLE_REF (Vchar_width_table, c)); | |
884 | ||
885 | LGLYPH_SET_CODE (g, c); | |
886 | LGLYPH_SET_LBEARING (g, 0); | |
887 | LGLYPH_SET_RBEARING (g, width); | |
888 | LGLYPH_SET_WIDTH (g, width); | |
889 | LGLYPH_SET_ASCENT (g, 1); | |
890 | LGLYPH_SET_DESCENT (g, 0); | |
891 | } | |
892 | LGLYPH_SET_ADJUSTMENT (g, Qnil); | |
893 | } | |
894 | if (i < LGSTRING_GLYPH_LEN (gstring)) | |
895 | LGSTRING_SET_GLYPH (gstring, i, Qnil); | |
896 | } | |
897 | ||
58753d74 | 898 | |
10f72a37 KH |
899 | /* Try to compose the characters at CHARPOS according to composition |
900 | rule RULE ([PATTERN PREV-CHARS FUNC]). LIMIT limits the characters | |
901 | to compose. STRING, if not nil, is a target string. WIN is a | |
902 | window where the characters are being displayed. If characters are | |
903 | successfully composed, return the composition as a glyph-string | |
904 | object. Otherwise return nil. */ | |
58753d74 KH |
905 | |
906 | static Lisp_Object | |
971de7fb | 907 | autocmp_chars (Lisp_Object rule, EMACS_INT charpos, EMACS_INT bytepos, EMACS_INT limit, struct window *win, struct face *face, Lisp_Object string) |
58753d74 KH |
908 | { |
909 | int count = SPECPDL_INDEX (); | |
910 | FRAME_PTR f = XFRAME (win->frame); | |
911 | Lisp_Object pos = make_number (charpos); | |
10f72a37 | 912 | EMACS_INT to; |
58753d74 | 913 | EMACS_INT pt = PT, pt_byte = PT_BYTE; |
10f72a37 | 914 | Lisp_Object re, font_object, lgstring; |
579c18d0 | 915 | EMACS_INT len; |
087e2ea9 | 916 | |
58753d74 | 917 | record_unwind_save_match_data (); |
10f72a37 KH |
918 | re = AREF (rule, 0); |
919 | if (NILP (re)) | |
920 | len = 1; | |
921 | else if (! STRINGP (re)) | |
922 | return unbind_to (count, Qnil); | |
923 | else if ((len = fast_looking_at (re, charpos, bytepos, limit, -1, string)) | |
924 | > 0) | |
58753d74 | 925 | { |
10f72a37 KH |
926 | if (NILP (string)) |
927 | len = BYTE_TO_CHAR (bytepos + len) - charpos; | |
928 | else | |
929 | len = string_byte_to_char (string, bytepos + len) - charpos; | |
930 | } | |
931 | if (len <= 0) | |
932 | return unbind_to (count, Qnil); | |
933 | to = limit = charpos + len; | |
58753d74 | 934 | #ifdef HAVE_WINDOW_SYSTEM |
10f72a37 KH |
935 | if (FRAME_WINDOW_P (f)) |
936 | { | |
937 | font_object = font_range (charpos, &to, win, face, string); | |
938 | if (! FONT_OBJECT_P (font_object) | |
939 | || (! NILP (re) | |
940 | && to < limit | |
941 | && (fast_looking_at (re, charpos, bytepos, to, -1, string) <= 0))) | |
942 | return unbind_to (count, Qnil); | |
943 | } | |
944 | else | |
58753d74 | 945 | #endif /* not HAVE_WINDOW_SYSTEM */ |
10f72a37 KH |
946 | font_object = win->frame; |
947 | lgstring = Fcomposition_get_gstring (pos, make_number (to), font_object, | |
948 | string); | |
949 | if (NILP (LGSTRING_ID (lgstring))) | |
950 | { | |
951 | Lisp_Object args[6]; | |
5dcde606 | 952 | |
10f72a37 KH |
953 | /* Save point as marker before calling out to lisp. */ |
954 | if (NILP (string)) | |
955 | { | |
956 | Lisp_Object m = Fmake_marker (); | |
957 | set_marker_both (m, Qnil, pt, pt_byte); | |
958 | record_unwind_protect (restore_point_unwind, m); | |
58753d74 | 959 | } |
10f72a37 KH |
960 | |
961 | args[0] = Vauto_composition_function; | |
962 | args[1] = AREF (rule, 2); | |
963 | args[2] = pos; | |
964 | args[3] = make_number (to); | |
965 | args[4] = font_object; | |
966 | args[5] = string; | |
967 | lgstring = safe_call (6, args); | |
58753d74 | 968 | } |
10f72a37 | 969 | return unbind_to (count, lgstring); |
58753d74 KH |
970 | } |
971 | ||
82ebc97b | 972 | static Lisp_Object _work_val; |
82ebc97b | 973 | |
f6aa6ec6 KH |
974 | /* 1 iff the character C is composable. Characters of general |
975 | category Z? or C? are not composable except for ZWNJ and ZWJ. */ | |
976 | ||
82ebc97b | 977 | #define CHAR_COMPOSABLE_P(C) \ |
a28d4396 KH |
978 | ((C) > ' ' \ |
979 | && ((C) == 0x200C || (C) == 0x200D \ | |
980 | || (_work_val = CHAR_TABLE_REF (Vunicode_category_table, (C)), \ | |
c805dec0 KH |
981 | (INTEGERP (_work_val) \ |
982 | && (XINT (_work_val) <= UNICODE_CATEGORY_So))))) | |
58753d74 KH |
983 | |
984 | /* Update cmp_it->stop_pos to the next position after CHARPOS (and | |
985 | BYTEPOS) where character composition may happen. If BYTEPOS is | |
82ebc97b KH |
986 | negative, compute it. ENDPOS is a limit of searching. If it is |
987 | less than CHARPOS, search backward to ENDPOS+1 assuming that | |
988 | set_iterator_to_next works in reverse order. In this case, if a | |
989 | composition closest to CHARPOS is found, set cmp_it->stop_pos to | |
990 | the last character of the composition. | |
991 | ||
992 | If no composition is found, set cmp_it->ch to -2. If a static | |
993 | composition is found, set cmp_it->ch to -1. Otherwise, set | |
994 | cmp_it->ch to the character that triggers the automatic | |
995 | composition. */ | |
58753d74 KH |
996 | |
997 | void | |
971de7fb | 998 | composition_compute_stop_pos (struct composition_it *cmp_it, EMACS_INT charpos, EMACS_INT bytepos, EMACS_INT endpos, Lisp_Object string) |
58753d74 | 999 | { |
f8c86b69 PE |
1000 | EMACS_INT start, end; |
1001 | int c; | |
58753d74 | 1002 | Lisp_Object prop, val; |
3ffdafce KH |
1003 | /* This is from forward_to_next_line_start in xdisp.c. */ |
1004 | const int MAX_NEWLINE_DISTANCE = 500; | |
58753d74 | 1005 | |
82ebc97b KH |
1006 | if (charpos < endpos) |
1007 | { | |
1008 | if (endpos > charpos + MAX_NEWLINE_DISTANCE) | |
1009 | endpos = charpos + MAX_NEWLINE_DISTANCE; | |
1010 | } | |
1011 | else if (endpos < charpos) | |
1012 | { | |
1013 | /* We search backward for a position to check composition. */ | |
1014 | if (endpos < 0) | |
1015 | { | |
1016 | /* But we don't know where to stop the searching. */ | |
1017 | endpos = NILP (string) ? BEGV - 1 : -1; | |
1018 | /* Usually we don't reach ENDPOS because we stop searching | |
1019 | at an uncomposable character (NL, LRE, etc). */ | |
1020 | } | |
1021 | } | |
053ca52b | 1022 | cmp_it->id = -1; |
44566dc7 | 1023 | cmp_it->ch = -2; |
82ebc97b KH |
1024 | cmp_it->reversed_p = 0; |
1025 | cmp_it->stop_pos = endpos; | |
1026 | if (charpos == endpos) | |
1027 | return; | |
1028 | /* FIXME: Bidi is not yet handled well in static composition. */ | |
1029 | if (charpos < endpos | |
1030 | && find_composition (charpos, endpos, &start, &end, &prop, string) | |
15fa4783 | 1031 | && start >= charpos |
58753d74 KH |
1032 | && COMPOSITION_VALID_P (start, end, prop)) |
1033 | { | |
1034 | cmp_it->stop_pos = endpos = start; | |
1035 | cmp_it->ch = -1; | |
1036 | } | |
4b4deea2 | 1037 | if (NILP (BVAR (current_buffer, enable_multibyte_characters)) |
d9a7c140 | 1038 | || NILP (Vauto_composition_mode)) |
58753d74 KH |
1039 | return; |
1040 | if (bytepos < 0) | |
1041 | { | |
82ebc97b | 1042 | if (NILP (string)) |
58753d74 | 1043 | bytepos = CHAR_TO_BYTE (charpos); |
82ebc97b KH |
1044 | else |
1045 | bytepos = string_char_to_byte (string, charpos); | |
58753d74 KH |
1046 | } |
1047 | ||
1048 | start = charpos; | |
82ebc97b | 1049 | if (charpos < endpos) |
58753d74 | 1050 | { |
82ebc97b KH |
1051 | /* Forward search. */ |
1052 | while (charpos < endpos) | |
ea8ba975 | 1053 | { |
82ebc97b KH |
1054 | if (STRINGP (string)) |
1055 | FETCH_STRING_CHAR_ADVANCE (c, string, charpos, bytepos); | |
1056 | else | |
1057 | FETCH_CHAR_ADVANCE (c, charpos, bytepos); | |
1058 | if (c == '\n') | |
1059 | { | |
1060 | cmp_it->ch = -2; | |
1061 | break; | |
1062 | } | |
1063 | val = CHAR_TABLE_REF (Vcomposition_function_table, c); | |
1064 | if (! NILP (val)) | |
1065 | { | |
1066 | Lisp_Object elt; | |
10f72a37 | 1067 | int ridx; |
82ebc97b | 1068 | |
10f72a37 | 1069 | for (ridx = 0; CONSP (val); val = XCDR (val), ridx++) |
82ebc97b KH |
1070 | { |
1071 | elt = XCAR (val); | |
1072 | if (VECTORP (elt) && ASIZE (elt) == 3 | |
1073 | && NATNUMP (AREF (elt, 1)) | |
1074 | && charpos - 1 - XFASTINT (AREF (elt, 1)) >= start) | |
1075 | break; | |
1076 | } | |
1077 | if (CONSP (val)) | |
1078 | { | |
10f72a37 | 1079 | cmp_it->rule_idx = ridx; |
82ebc97b KH |
1080 | cmp_it->lookback = XFASTINT (AREF (elt, 1)); |
1081 | cmp_it->stop_pos = charpos - 1 - cmp_it->lookback; | |
1082 | cmp_it->ch = c; | |
1083 | return; | |
1084 | } | |
1085 | } | |
ea8ba975 | 1086 | } |
ff94e32c KH |
1087 | if (charpos == endpos) |
1088 | { | |
1089 | /* We couldn't find a composition point before ENDPOS. But, | |
1090 | some character after ENDPOS may be composed with | |
1091 | characters before ENDPOS. So, we should stop at the safe | |
1092 | point. */ | |
1093 | charpos = endpos - MAX_AUTO_COMPOSITION_LOOKBACK; | |
1094 | if (charpos < start) | |
1095 | charpos = start; | |
1096 | } | |
82ebc97b | 1097 | } |
b7050583 | 1098 | else if (charpos > endpos) |
82ebc97b KH |
1099 | { |
1100 | /* Search backward for a pattern that may be composed and the | |
1101 | position of (possibly) the last character of the match is | |
1102 | closest to (but not after) START. The reason for the last | |
d07f018c EZ |
1103 | character is that set_iterator_to_next works in reverse order, |
1104 | and thus we must stop at the last character for composition | |
82ebc97b KH |
1105 | check. */ |
1106 | unsigned char *p; | |
1107 | int len; | |
d07f018c EZ |
1108 | /* Limit byte position used in fast_looking_at. This is the |
1109 | byte position of the character after START. */ | |
82ebc97b KH |
1110 | EMACS_INT limit; |
1111 | ||
1112 | if (NILP (string)) | |
1113 | p = BYTE_POS_ADDR (bytepos); | |
1114 | else | |
1115 | p = SDATA (string) + bytepos; | |
1116 | c = STRING_CHAR_AND_LENGTH (p, len); | |
1117 | limit = bytepos + len; | |
1118 | while (CHAR_COMPOSABLE_P (c)) | |
58753d74 | 1119 | { |
10f72a37 KH |
1120 | val = CHAR_TABLE_REF (Vcomposition_function_table, c); |
1121 | if (! NILP (val)) | |
82ebc97b | 1122 | { |
10f72a37 | 1123 | Lisp_Object elt; |
8f5201ae | 1124 | int ridx, back, blen; |
58753d74 | 1125 | |
10f72a37 | 1126 | for (ridx = 0; CONSP (val); val = XCDR (val), ridx++) |
82ebc97b | 1127 | { |
10f72a37 KH |
1128 | elt = XCAR (val); |
1129 | if (VECTORP (elt) && ASIZE (elt) == 3 | |
1130 | && NATNUMP (AREF (elt, 1)) | |
1131 | && charpos - (back = XFASTINT (AREF (elt, 1))) > endpos) | |
82ebc97b | 1132 | { |
10f72a37 KH |
1133 | EMACS_INT cpos = charpos - back, bpos; |
1134 | ||
1135 | if (back == 0) | |
1136 | bpos = bytepos; | |
82ebc97b | 1137 | else |
10f72a37 KH |
1138 | bpos = (NILP (string) ? CHAR_TO_BYTE (cpos) |
1139 | : string_char_to_byte (string, cpos)); | |
1140 | if (STRINGP (AREF (elt, 0))) | |
8f5201ae PE |
1141 | blen = fast_looking_at (AREF (elt, 0), cpos, bpos, |
1142 | start + 1, limit, string); | |
10f72a37 | 1143 | else |
8f5201ae PE |
1144 | blen = 1; |
1145 | if (blen > 0) | |
82ebc97b | 1146 | { |
10f72a37 | 1147 | /* Make CPOS point to the last character of |
8f5201ae PE |
1148 | match. Note that BLEN is byte-length. */ |
1149 | if (blen > 1) | |
10f72a37 | 1150 | { |
8f5201ae | 1151 | bpos += blen; |
10f72a37 KH |
1152 | if (NILP (string)) |
1153 | cpos = BYTE_TO_CHAR (bpos) - 1; | |
1154 | else | |
1155 | cpos = string_byte_to_char (string, bpos) - 1; | |
1156 | } | |
1157 | back = cpos - (charpos - back); | |
1158 | if (cmp_it->stop_pos < cpos | |
1159 | || (cmp_it->stop_pos == cpos | |
1160 | && cmp_it->lookback < back)) | |
1161 | { | |
1162 | cmp_it->rule_idx = ridx; | |
1163 | cmp_it->stop_pos = cpos; | |
1164 | cmp_it->ch = c; | |
1165 | cmp_it->lookback = back; | |
1166 | cmp_it->nchars = back + 1; | |
1167 | } | |
82ebc97b KH |
1168 | } |
1169 | } | |
1170 | } | |
1171 | } | |
1172 | if (charpos - 1 == endpos) | |
1173 | break; | |
1174 | if (STRINGP (string)) | |
58753d74 | 1175 | { |
82ebc97b KH |
1176 | p--, bytepos--; |
1177 | while (! CHAR_HEAD_P (*p)) | |
1178 | p--, bytepos--; | |
1179 | charpos--; | |
1180 | } | |
1181 | else | |
1182 | { | |
1183 | DEC_BOTH (charpos, bytepos); | |
1184 | p = BYTE_POS_ADDR (bytepos); | |
58753d74 | 1185 | } |
82ebc97b KH |
1186 | c = STRING_CHAR (p); |
1187 | } | |
1188 | if (cmp_it->ch >= 0) | |
1189 | /* We found a position to check. */ | |
1190 | return; | |
1191 | /* Skip all uncomposable characters. */ | |
1192 | if (NILP (string)) | |
1193 | { | |
1194 | while (charpos - 1 > endpos && ! CHAR_COMPOSABLE_P (c)) | |
58753d74 | 1195 | { |
82ebc97b KH |
1196 | DEC_BOTH (charpos, bytepos); |
1197 | c = FETCH_MULTIBYTE_CHAR (bytepos); | |
1198 | } | |
1199 | } | |
1200 | else | |
1201 | { | |
1202 | while (charpos - 1 > endpos && ! CHAR_COMPOSABLE_P (c)) | |
1203 | { | |
1204 | p--; | |
1205 | while (! CHAR_HEAD_P (*p)) | |
1206 | p--; | |
1207 | charpos--; | |
1208 | c = STRING_CHAR (p); | |
58753d74 KH |
1209 | } |
1210 | } | |
1211 | } | |
44566dc7 | 1212 | cmp_it->stop_pos = charpos; |
58753d74 KH |
1213 | } |
1214 | ||
1215 | /* Check if the character at CHARPOS (and BYTEPOS) is composed | |
22e33406 | 1216 | (possibly with the following characters) on window W. ENDPOS limits |
58753d74 KH |
1217 | characters to be composed. FACE, in non-NULL, is a base face of |
1218 | the character. If STRING is not nil, it is a string containing the | |
1219 | character to check, and CHARPOS and BYTEPOS are indices in the | |
1220 | string. In that case, FACE must not be NULL. | |
1221 | ||
1222 | If the character is composed, setup members of CMP_IT (id, nglyphs, | |
82ebc97b KH |
1223 | from, to, reversed_p), and return 1. Otherwise, update |
1224 | CMP_IT->stop_pos, and return 0. */ | |
58753d74 KH |
1225 | |
1226 | int | |
971de7fb | 1227 | composition_reseat_it (struct composition_it *cmp_it, EMACS_INT charpos, EMACS_INT bytepos, EMACS_INT endpos, struct window *w, struct face *face, Lisp_Object string) |
58753d74 | 1228 | { |
f6aa6ec6 KH |
1229 | if (endpos < 0) |
1230 | endpos = NILP (string) ? BEGV : 0; | |
e614ea00 | 1231 | |
3ffdafce KH |
1232 | if (cmp_it->ch == -2) |
1233 | { | |
1234 | composition_compute_stop_pos (cmp_it, charpos, bytepos, endpos, string); | |
10f72a37 | 1235 | if (cmp_it->ch == -2 || cmp_it->stop_pos != charpos) |
82ebc97b | 1236 | /* The current position is not composed. */ |
3ffdafce KH |
1237 | return 0; |
1238 | } | |
1239 | ||
58753d74 KH |
1240 | if (cmp_it->ch < 0) |
1241 | { | |
1242 | /* We are looking at a static composition. */ | |
1243 | EMACS_INT start, end; | |
1244 | Lisp_Object prop; | |
1245 | ||
1246 | find_composition (charpos, -1, &start, &end, &prop, string); | |
1247 | cmp_it->id = get_composition_id (charpos, bytepos, end - start, | |
1248 | prop, string); | |
1249 | if (cmp_it->id < 0) | |
1250 | goto no_composition; | |
1251 | cmp_it->nchars = end - start; | |
1252 | cmp_it->nglyphs = composition_table[cmp_it->id]->glyph_len; | |
1253 | } | |
29fb7306 | 1254 | else if (w) |
58753d74 | 1255 | { |
10f72a37 | 1256 | Lisp_Object lgstring = Qnil; |
b246f932 | 1257 | Lisp_Object val, elt; |
5eb55db9 | 1258 | EMACS_INT i; |
58753d74 KH |
1259 | |
1260 | val = CHAR_TABLE_REF (Vcomposition_function_table, cmp_it->ch); | |
10f72a37 | 1261 | for (i = 0; i < cmp_it->rule_idx; i++, val = XCDR (val)); |
82ebc97b | 1262 | if (charpos < endpos) |
90b3fe91 | 1263 | { |
82ebc97b KH |
1264 | for (; CONSP (val); val = XCDR (val)) |
1265 | { | |
1266 | elt = XCAR (val); | |
10f72a37 KH |
1267 | if (! VECTORP (elt) || ASIZE (elt) != 3 |
1268 | || ! INTEGERP (AREF (elt, 1))) | |
1269 | continue; | |
1270 | if (XFASTINT (AREF (elt, 1)) != cmp_it->lookback) | |
aa3830c4 | 1271 | goto no_composition; |
10f72a37 KH |
1272 | lgstring = autocmp_chars (elt, charpos, bytepos, endpos, |
1273 | w, face, string); | |
1274 | if (composition_gstring_p (lgstring)) | |
82ebc97b | 1275 | break; |
10f72a37 KH |
1276 | lgstring = Qnil; |
1277 | /* Composition failed perhaps because the font doesn't | |
1278 | support sufficient range of characters. Try the | |
1279 | other composition rules if any. */ | |
82ebc97b | 1280 | } |
82ebc97b | 1281 | cmp_it->reversed_p = 0; |
90b3fe91 | 1282 | } |
82ebc97b KH |
1283 | else |
1284 | { | |
10f72a37 | 1285 | EMACS_INT cpos = charpos, bpos = bytepos; |
90b3fe91 | 1286 | |
10f72a37 | 1287 | while (1) |
82ebc97b | 1288 | { |
10f72a37 KH |
1289 | elt = XCAR (val); |
1290 | if (cmp_it->lookback > 0) | |
1291 | { | |
f6aa6ec6 | 1292 | cpos = charpos - cmp_it->lookback; |
10f72a37 KH |
1293 | if (STRINGP (string)) |
1294 | bpos = string_char_to_byte (string, cpos); | |
1295 | else | |
1296 | bpos = CHAR_TO_BYTE (cpos); | |
1297 | } | |
1298 | lgstring = autocmp_chars (elt, cpos, bpos, charpos + 1, w, face, | |
1299 | string); | |
1300 | if (composition_gstring_p (lgstring) | |
1301 | && cpos + LGSTRING_CHAR_LEN (lgstring) - 1 == charpos) | |
1302 | break; | |
1303 | /* Composition failed or didn't cover the current | |
1304 | character. */ | |
1305 | if (cmp_it->lookback == 0) | |
82ebc97b | 1306 | goto no_composition; |
10f72a37 KH |
1307 | lgstring = Qnil; |
1308 | /* Try to find a shorter compostion that starts after CPOS. */ | |
1309 | composition_compute_stop_pos (cmp_it, charpos, bytepos, cpos, | |
1310 | string); | |
1311 | if (cmp_it->ch == -2 || cmp_it->stop_pos < charpos) | |
1312 | goto no_composition; | |
1313 | val = CHAR_TABLE_REF (Vcomposition_function_table, cmp_it->ch); | |
1314 | for (i = 0; i < cmp_it->rule_idx; i++, val = XCDR (val)); | |
82ebc97b KH |
1315 | } |
1316 | cmp_it->reversed_p = 1; | |
1317 | } | |
10f72a37 KH |
1318 | if (NILP (lgstring)) |
1319 | goto no_composition; | |
1320 | if (NILP (LGSTRING_ID (lgstring))) | |
1321 | lgstring = composition_gstring_put_cache (lgstring, -1); | |
1322 | cmp_it->id = XINT (LGSTRING_ID (lgstring)); | |
1323 | for (i = 0; i < LGSTRING_GLYPH_LEN (lgstring); i++) | |
1324 | if (NILP (LGSTRING_GLYPH (lgstring, i))) | |
58753d74 KH |
1325 | break; |
1326 | cmp_it->nglyphs = i; | |
82ebc97b KH |
1327 | cmp_it->from = 0; |
1328 | cmp_it->to = i; | |
58753d74 | 1329 | } |
29fb7306 KH |
1330 | else |
1331 | goto no_composition; | |
58753d74 KH |
1332 | return 1; |
1333 | ||
1334 | no_composition: | |
82ebc97b KH |
1335 | if (charpos == endpos) |
1336 | return 0; | |
1337 | if (charpos < endpos) | |
1338 | { | |
1339 | charpos++; | |
10f72a37 | 1340 | if (NILP (string)) |
82ebc97b | 1341 | INC_POS (bytepos); |
10f72a37 | 1342 | else |
aa3830c4 | 1343 | bytepos += BYTES_BY_CHAR_HEAD (*(SDATA (string) + bytepos)); |
82ebc97b | 1344 | } |
58753d74 | 1345 | else |
82ebc97b KH |
1346 | { |
1347 | charpos--; | |
1348 | /* BYTEPOS is calculated in composition_compute_stop_pos */ | |
1349 | bytepos = -1; | |
1350 | } | |
58753d74 KH |
1351 | composition_compute_stop_pos (cmp_it, charpos, bytepos, endpos, string); |
1352 | return 0; | |
1353 | } | |
1354 | ||
10f72a37 KH |
1355 | /* Update charpos, nchars, nbytes, and width of the current grapheme |
1356 | cluster. | |
1357 | ||
1358 | If the composition is static or automatic in L2R context, the | |
1359 | cluster is identified by CMP_IT->from, and CHARPOS is the position | |
1360 | of the first character of the cluster. In this case, update | |
1361 | CMP_IT->to too. | |
1362 | ||
1363 | If the composition is automatic in R2L context, the cluster is | |
1364 | identified by CMP_IT->to, and CHARPOS is the position of the last | |
1365 | character of the cluster. In this case, update CMP_IT->from too. | |
1366 | ||
1367 | The return value is the character code of the first character of | |
1368 | the cluster, or -1 if the composition is somehow broken. */ | |
82ebc97b | 1369 | |
58753d74 | 1370 | int |
971de7fb | 1371 | composition_update_it (struct composition_it *cmp_it, EMACS_INT charpos, EMACS_INT bytepos, Lisp_Object string) |
58753d74 | 1372 | { |
80e079b2 | 1373 | int i, c IF_LINT (= 0); |
58753d74 KH |
1374 | |
1375 | if (cmp_it->ch < 0) | |
1376 | { | |
10f72a37 | 1377 | /* static composition */ |
58753d74 KH |
1378 | struct composition *cmp = composition_table[cmp_it->id]; |
1379 | ||
10f72a37 | 1380 | cmp_it->charpos = charpos; |
58753d74 KH |
1381 | cmp_it->to = cmp_it->nglyphs; |
1382 | if (cmp_it->nglyphs == 0) | |
1383 | c = -1; | |
1384 | else | |
1385 | { | |
1386 | for (i = 0; i < cmp->glyph_len; i++) | |
1387 | if ((c = COMPOSITION_GLYPH (cmp, i)) != '\t') | |
1388 | break; | |
1389 | if (c == '\t') | |
1390 | c = ' '; | |
1391 | } | |
1392 | cmp_it->width = cmp->width; | |
10f72a37 KH |
1393 | charpos += cmp_it->nchars; |
1394 | if (STRINGP (string)) | |
1395 | cmp_it->nbytes = string_char_to_byte (string, charpos) - bytepos; | |
1396 | else | |
1397 | cmp_it->nbytes = CHAR_TO_BYTE (charpos) - bytepos; | |
58753d74 KH |
1398 | } |
1399 | else | |
1400 | { | |
10f72a37 | 1401 | /* automatic composition */ |
58753d74 | 1402 | Lisp_Object gstring = composition_gstring_from_id (cmp_it->id); |
10f72a37 | 1403 | Lisp_Object glyph; |
579c18d0 | 1404 | EMACS_INT from; |
58753d74 KH |
1405 | |
1406 | if (cmp_it->nglyphs == 0) | |
1407 | { | |
58753d74 KH |
1408 | cmp_it->nchars = LGSTRING_CHAR_LEN (gstring); |
1409 | cmp_it->width = 0; | |
10f72a37 KH |
1410 | cmp_it->from = cmp_it->to = 0; |
1411 | return -1; | |
58753d74 | 1412 | } |
10f72a37 | 1413 | if (! cmp_it->reversed_p) |
58753d74 | 1414 | { |
10f72a37 KH |
1415 | glyph = LGSTRING_GLYPH (gstring, cmp_it->from); |
1416 | from = LGLYPH_FROM (glyph); | |
58753d74 KH |
1417 | for (cmp_it->to = cmp_it->from + 1; cmp_it->to < cmp_it->nglyphs; |
1418 | cmp_it->to++) | |
1419 | { | |
1420 | glyph = LGSTRING_GLYPH (gstring, cmp_it->to); | |
1421 | if (LGLYPH_FROM (glyph) != from) | |
1422 | break; | |
58753d74 | 1423 | } |
10f72a37 | 1424 | cmp_it->charpos = charpos; |
58753d74 | 1425 | } |
82ebc97b KH |
1426 | else |
1427 | { | |
10f72a37 KH |
1428 | glyph = LGSTRING_GLYPH (gstring, cmp_it->to - 1); |
1429 | from = LGLYPH_FROM (glyph); | |
1430 | cmp_it->charpos = charpos - (LGLYPH_TO (glyph) - from); | |
1431 | for (cmp_it->from = cmp_it->to - 1; cmp_it->from > 0; | |
1432 | cmp_it->from--) | |
82ebc97b | 1433 | { |
10f72a37 | 1434 | glyph = LGSTRING_GLYPH (gstring, cmp_it->from - 1); |
82ebc97b KH |
1435 | if (LGLYPH_FROM (glyph) != from) |
1436 | break; | |
82ebc97b | 1437 | } |
10f72a37 KH |
1438 | } |
1439 | glyph = LGSTRING_GLYPH (gstring, cmp_it->from); | |
1440 | cmp_it->nchars = LGLYPH_TO (glyph) + 1 - from; | |
1441 | cmp_it->nbytes = 0; | |
1442 | cmp_it->width = 0; | |
1443 | for (i = cmp_it->nchars - 1; i >= 0; i--) | |
1444 | { | |
1445 | c = XINT (LGSTRING_CHAR (gstring, i)); | |
1446 | cmp_it->nbytes += CHAR_BYTES (c); | |
63257f6c | 1447 | cmp_it->width += CHAR_WIDTH (c); |
82ebc97b | 1448 | } |
58753d74 | 1449 | } |
58753d74 KH |
1450 | return c; |
1451 | } | |
1452 | ||
1453 | ||
90b3fe91 KH |
1454 | struct position_record |
1455 | { | |
1456 | EMACS_INT pos, pos_byte; | |
1457 | unsigned char *p; | |
1458 | }; | |
1459 | ||
763d7377 | 1460 | /* Update the members of POSITION to the next character boundary. */ |
90b3fe91 KH |
1461 | #define FORWARD_CHAR(POSITION, STOP) \ |
1462 | do { \ | |
90b3fe91 | 1463 | (POSITION).pos++; \ |
900c4486 KH |
1464 | if ((POSITION).pos == (STOP)) \ |
1465 | { \ | |
1466 | (POSITION).p = GAP_END_ADDR; \ | |
1467 | (POSITION).pos_byte = GPT_BYTE; \ | |
1468 | } \ | |
1469 | else \ | |
1470 | { \ | |
900c4486 | 1471 | (POSITION).pos_byte += BYTES_BY_CHAR_HEAD (*((POSITION).p)); \ |
d45a49e3 | 1472 | (POSITION).p += BYTES_BY_CHAR_HEAD (*((POSITION).p)); \ |
900c4486 | 1473 | } \ |
90b3fe91 KH |
1474 | } while (0) |
1475 | ||
763d7377 | 1476 | /* Update the members of POSITION to the previous character boundary. */ |
90b3fe91 KH |
1477 | #define BACKWARD_CHAR(POSITION, STOP) \ |
1478 | do { \ | |
a28d4396 | 1479 | if ((POSITION).pos == (STOP)) \ |
90b3fe91 KH |
1480 | (POSITION).p = GPT_ADDR; \ |
1481 | do { \ | |
1482 | (POSITION).pos_byte--; \ | |
1483 | (POSITION).p--; \ | |
1484 | } while (! CHAR_HEAD_P (*((POSITION).p))); \ | |
1485 | (POSITION).pos--; \ | |
1486 | } while (0) | |
1487 | ||
90b3fe91 | 1488 | /* This is like find_composition, but find an automatic composition |
a28d4396 KH |
1489 | instead. It is assured that POS is not within a static |
1490 | composition. If found, set *GSTRING to the glyph-string | |
1491 | representing the composition, and return 1. Otherwise, *GSTRING to | |
1492 | Qnil, and return 0. */ | |
90b3fe91 KH |
1493 | |
1494 | static int | |
a28d4396 KH |
1495 | find_automatic_composition (EMACS_INT pos, EMACS_INT limit, |
1496 | EMACS_INT *start, EMACS_INT *end, | |
1497 | Lisp_Object *gstring, Lisp_Object string) | |
90b3fe91 KH |
1498 | { |
1499 | EMACS_INT head, tail, stop; | |
a28d4396 KH |
1500 | /* Forward limit position of checking a composition taking a |
1501 | looking-back count into account. */ | |
895416e3 | 1502 | EMACS_INT fore_check_limit; |
a28d4396 | 1503 | struct position_record cur, prev; |
90b3fe91 | 1504 | int c; |
29fb7306 | 1505 | Lisp_Object window; |
90b3fe91 | 1506 | struct window *w; |
a28d4396 | 1507 | int need_adjustment = 0; |
90b3fe91 | 1508 | |
3eda4b19 | 1509 | window = Fget_buffer_window (Fcurrent_buffer (), Qnil); |
29fb7306 KH |
1510 | if (NILP (window)) |
1511 | return 0; | |
1512 | w = XWINDOW (window); | |
1513 | ||
a28d4396 | 1514 | cur.pos = pos; |
90b3fe91 KH |
1515 | if (NILP (string)) |
1516 | { | |
1517 | head = BEGV, tail = ZV, stop = GPT; | |
a28d4396 KH |
1518 | cur.pos_byte = CHAR_TO_BYTE (cur.pos); |
1519 | cur.p = BYTE_POS_ADDR (cur.pos_byte); | |
90b3fe91 KH |
1520 | } |
1521 | else | |
1522 | { | |
1523 | head = 0, tail = SCHARS (string), stop = -1; | |
a28d4396 KH |
1524 | cur.pos_byte = string_char_to_byte (string, cur.pos); |
1525 | cur.p = SDATA (string) + cur.pos_byte; | |
90b3fe91 | 1526 | } |
a28d4396 KH |
1527 | if (limit < 0) |
1528 | /* Finding a composition covering the character after POS is the | |
1529 | same as setting LIMIT to POS. */ | |
1530 | limit = pos; | |
1531 | if (limit <= pos) | |
1532 | fore_check_limit = min (tail, pos + 1 + MAX_AUTO_COMPOSITION_LOOKBACK); | |
90b3fe91 | 1533 | else |
895416e3 | 1534 | fore_check_limit = min (tail, limit + MAX_AUTO_COMPOSITION_LOOKBACK); |
90b3fe91 | 1535 | |
a28d4396 | 1536 | /* Provided that we have these possible compositions now: |
895416e3 | 1537 | |
a28d4396 KH |
1538 | POS: 1 2 3 4 5 6 7 8 9 |
1539 | |-A-| | |
1540 | |-B-|-C-|--D--| | |
895416e3 | 1541 | |
a28d4396 KH |
1542 | Here, it is known that characters after positions 1 and 9 can |
1543 | never be composed (i.e. ! CHAR_COMPOSABLE_P (CH)), and | |
1544 | composition A is an invalid one because it's partially covered by | |
1545 | the valid composition C. And to know whether a composition is | |
1546 | valid or not, the only way is to start searching forward from a | |
1547 | position that can not be a tail part of composition (it's 2 in | |
1548 | the above case). | |
1549 | ||
1550 | Now we have these cases (1 through 4): | |
1551 | ||
1552 | -- character after POS is ... -- | |
1553 | not composable composable | |
1554 | LIMIT <= POS (1) (3) | |
1555 | POS < LIMIT (2) (4) | |
1556 | ||
1557 | Among them, in case (2), we simply search forward from POS. | |
1558 | ||
1559 | In the other cases, we at first rewind back to the position where | |
1560 | the previous character is not composable or the beginning of | |
1561 | buffer (string), then search compositions forward. In case (1) | |
1562 | and (3) we repeat this process until a composition is found. */ | |
1563 | ||
1564 | while (1) | |
1565 | { | |
62a6e103 | 1566 | c = STRING_CHAR (cur.p); |
90b3fe91 | 1567 | if (! CHAR_COMPOSABLE_P (c)) |
90b3fe91 | 1568 | { |
a28d4396 KH |
1569 | if (limit <= pos) /* case (1) */ |
1570 | { | |
1571 | do { | |
31bfc35c | 1572 | if (cur.pos <= limit) |
a28d4396 KH |
1573 | return 0; |
1574 | BACKWARD_CHAR (cur, stop); | |
1575 | c = STRING_CHAR (cur.p); | |
1576 | } while (! CHAR_COMPOSABLE_P (c)); | |
1577 | fore_check_limit = cur.pos + 1; | |
1578 | } | |
1579 | else /* case (2) */ | |
1580 | /* No need of rewinding back. */ | |
1581 | goto search_forward; | |
1582 | } | |
90b3fe91 | 1583 | |
a28d4396 KH |
1584 | /* Rewind back to the position where we can safely search |
1585 | forward for compositions. It is assured that the character | |
1586 | at cur.pos is composable. */ | |
1587 | while (head < cur.pos) | |
1588 | { | |
1589 | prev = cur; | |
1590 | BACKWARD_CHAR (cur, stop); | |
1591 | c = STRING_CHAR (cur.p); | |
1592 | if (! CHAR_COMPOSABLE_P (c)) | |
90b3fe91 | 1593 | { |
a28d4396 KH |
1594 | cur = prev; |
1595 | break; | |
90b3fe91 | 1596 | } |
a28d4396 KH |
1597 | } |
1598 | ||
1599 | search_forward: | |
1600 | /* Now search forward. */ | |
1601 | *gstring = Qnil; | |
1602 | prev = cur; /* remember the start of searching position. */ | |
1603 | while (cur.pos < fore_check_limit) | |
1604 | { | |
1605 | Lisp_Object val; | |
1606 | ||
1607 | c = STRING_CHAR (cur.p); | |
1608 | for (val = CHAR_TABLE_REF (Vcomposition_function_table, c); | |
1609 | CONSP (val); val = XCDR (val)) | |
90b3fe91 | 1610 | { |
a28d4396 KH |
1611 | Lisp_Object elt = XCAR (val); |
1612 | ||
1613 | if (VECTORP (elt) && ASIZE (elt) == 3 && NATNUMP (AREF (elt, 1))) | |
90b3fe91 | 1614 | { |
a28d4396 KH |
1615 | EMACS_INT check_pos = cur.pos - XFASTINT (AREF (elt, 1)); |
1616 | struct position_record check; | |
1617 | ||
1618 | if (check_pos < head | |
1619 | || (limit <= pos ? pos < check_pos | |
1620 | : limit <= check_pos)) | |
1621 | continue; | |
1622 | for (check = cur; check_pos < check.pos; ) | |
1623 | BACKWARD_CHAR (check, stop); | |
1624 | *gstring = autocmp_chars (elt, check.pos, check.pos_byte, | |
1625 | tail, w, NULL, string); | |
90b3fe91 | 1626 | need_adjustment = 1; |
a28d4396 | 1627 | if (NILP (*gstring)) |
90b3fe91 | 1628 | { |
a28d4396 KH |
1629 | /* As we have called Lisp, there's a possibility |
1630 | that buffer/string is relocated. */ | |
1631 | if (NILP (string)) | |
1632 | cur.p = BYTE_POS_ADDR (cur.pos_byte); | |
1633 | else | |
1634 | cur.p = SDATA (string) + cur.pos_byte; | |
1635 | } | |
1636 | else | |
1637 | { | |
1638 | /* We found a candidate of a target composition. */ | |
90b3fe91 KH |
1639 | *start = check.pos; |
1640 | *end = check.pos + LGSTRING_CHAR_LEN (*gstring); | |
a28d4396 KH |
1641 | if (pos < limit |
1642 | ? pos < *end | |
1643 | : *start <= pos && pos < *end) | |
1644 | /* This is the target composition. */ | |
90b3fe91 KH |
1645 | return 1; |
1646 | cur.pos = *end; | |
a28d4396 KH |
1647 | if (NILP (string)) |
1648 | { | |
1649 | cur.pos_byte = CHAR_TO_BYTE (cur.pos); | |
1650 | cur.p = BYTE_POS_ADDR (cur.pos_byte); | |
1651 | } | |
1652 | else | |
1653 | { | |
1654 | cur.pos_byte = string_char_to_byte (string, cur.pos); | |
1655 | cur.p = SDATA (string) + cur.pos_byte; | |
1656 | } | |
90b3fe91 KH |
1657 | break; |
1658 | } | |
1659 | } | |
1660 | } | |
a28d4396 KH |
1661 | if (! CONSP (val)) |
1662 | /* We found no composition here. */ | |
90b3fe91 | 1663 | FORWARD_CHAR (cur, stop); |
90b3fe91 | 1664 | } |
a28d4396 KH |
1665 | |
1666 | if (pos < limit) /* case (2) and (4)*/ | |
1667 | return 0; | |
1668 | if (! NILP (*gstring)) | |
1669 | return 1; | |
1670 | if (prev.pos == head) | |
1671 | return 0; | |
90b3fe91 | 1672 | cur = prev; |
a28d4396 KH |
1673 | if (need_adjustment) |
1674 | { | |
1675 | if (NILP (string)) | |
1676 | cur.p = BYTE_POS_ADDR (cur.pos_byte); | |
1677 | else | |
1678 | cur.p = SDATA (string) + cur.pos_byte; | |
1679 | } | |
90b3fe91 | 1680 | BACKWARD_CHAR (cur, stop); |
90b3fe91 | 1681 | } |
90b3fe91 KH |
1682 | } |
1683 | ||
e614ea00 KH |
1684 | /* Return the adjusted point provided that point is moved from LAST_PT |
1685 | to NEW_PT. */ | |
1686 | ||
41118bd3 | 1687 | EMACS_INT |
971de7fb | 1688 | composition_adjust_point (EMACS_INT last_pt, EMACS_INT new_pt) |
58753d74 | 1689 | { |
5eb55db9 | 1690 | EMACS_INT i, beg, end; |
90b3fe91 | 1691 | Lisp_Object val; |
58753d74 | 1692 | |
e614ea00 KH |
1693 | if (new_pt == BEGV || new_pt == ZV) |
1694 | return new_pt; | |
58753d74 | 1695 | |
90b3fe91 | 1696 | /* At first check the static composition. */ |
e614ea00 | 1697 | if (get_property_and_range (new_pt, Qcomposition, &val, &beg, &end, Qnil) |
895416e3 KH |
1698 | && COMPOSITION_VALID_P (beg, end, val)) |
1699 | { | |
e614ea00 | 1700 | if (beg < new_pt /* && end > new_pt <- It's always the case. */ |
895416e3 | 1701 | && (last_pt <= beg || last_pt >= end)) |
e614ea00 KH |
1702 | return (new_pt < last_pt ? beg : end); |
1703 | return new_pt; | |
895416e3 | 1704 | } |
58753d74 | 1705 | |
4b4deea2 | 1706 | if (NILP (BVAR (current_buffer, enable_multibyte_characters)) |
d9a7c140 | 1707 | || NILP (Vauto_composition_mode)) |
e614ea00 | 1708 | return new_pt; |
58753d74 | 1709 | |
90b3fe91 | 1710 | /* Next check the automatic composition. */ |
e614ea00 KH |
1711 | if (! find_automatic_composition (new_pt, (EMACS_INT) -1, &beg, &end, &val, |
1712 | Qnil) | |
1713 | || beg == new_pt) | |
1714 | return new_pt; | |
90b3fe91 | 1715 | for (i = 0; i < LGSTRING_GLYPH_LEN (val); i++) |
58753d74 | 1716 | { |
90b3fe91 | 1717 | Lisp_Object glyph = LGSTRING_GLYPH (val, i); |
58753d74 | 1718 | |
90b3fe91 KH |
1719 | if (NILP (glyph)) |
1720 | break; | |
e614ea00 KH |
1721 | if (beg + LGLYPH_FROM (glyph) == new_pt) |
1722 | return new_pt; | |
1723 | if (beg + LGLYPH_TO (glyph) >= new_pt) | |
1724 | return (new_pt < last_pt | |
90b3fe91 KH |
1725 | ? beg + LGLYPH_FROM (glyph) |
1726 | : beg + LGLYPH_TO (glyph) + 1); | |
58753d74 | 1727 | } |
e614ea00 | 1728 | return new_pt; |
58753d74 KH |
1729 | } |
1730 | ||
1731 | DEFUN ("composition-get-gstring", Fcomposition_get_gstring, | |
1732 | Scomposition_get_gstring, 4, 4, 0, | |
1733 | doc: /* Return a glyph-string for characters between FROM and TO. | |
9d751859 | 1734 | If the glyph string is for graphic display, FONT-OBJECT must be |
58753d74 | 1735 | a font-object to use for those characters. |
f5199465 KH |
1736 | Otherwise (for terminal display), FONT-OBJECT must be a terminal ID, a |
1737 | frame, or nil for the selected frame's terminal device. | |
58753d74 KH |
1738 | |
1739 | If the optional 4th argument STRING is not nil, it is a string | |
1740 | containing the target characters between indices FROM and TO. | |
1741 | ||
9d751859 EZ |
1742 | A glyph-string is a vector containing information about how to display |
1743 | a specific character sequence. The format is: | |
58753d74 KH |
1744 | [HEADER ID GLYPH ...] |
1745 | ||
1746 | HEADER is a vector of this form: | |
1747 | [FONT-OBJECT CHAR ...] | |
1748 | where | |
1749 | FONT-OBJECT is a font-object for all glyphs in the glyph-string, | |
f5199465 | 1750 | or the terminal coding system of the specified terminal. |
58753d74 KH |
1751 | CHARs are characters to be composed by GLYPHs. |
1752 | ||
1753 | ID is an identification number of the glyph-string. It may be nil if | |
1754 | not yet shaped. | |
1755 | ||
9d751859 | 1756 | GLYPH is a vector whose elements have this form: |
58753d74 KH |
1757 | [ FROM-IDX TO-IDX C CODE WIDTH LBEARING RBEARING ASCENT DESCENT |
1758 | [ [X-OFF Y-OFF WADJUST] | nil] ] | |
1759 | where | |
1760 | FROM-IDX and TO-IDX are used internally and should not be touched. | |
1761 | C is the character of the glyph. | |
1762 | CODE is the glyph-code of C in FONT-OBJECT. | |
1763 | WIDTH thru DESCENT are the metrics (in pixels) of the glyph. | |
9d751859 | 1764 | X-OFF and Y-OFF are offsets to the base position for the glyph. |
58753d74 KH |
1765 | WADJUST is the adjustment to the normal width of the glyph. |
1766 | ||
9d751859 EZ |
1767 | If GLYPH is nil, the remaining elements of the glyph-string vector |
1768 | should be ignored. */) | |
5842a27b | 1769 | (Lisp_Object from, Lisp_Object to, Lisp_Object font_object, Lisp_Object string) |
58753d74 KH |
1770 | { |
1771 | Lisp_Object gstring, header; | |
46f905e1 | 1772 | EMACS_INT frompos, topos; |
58753d74 | 1773 | |
ea8ba975 KH |
1774 | CHECK_NATNUM (from); |
1775 | CHECK_NATNUM (to); | |
f5199465 KH |
1776 | if (! FONT_OBJECT_P (font_object)) |
1777 | { | |
1778 | struct coding_system *coding; | |
1779 | struct terminal *terminal = get_terminal (font_object, 1); | |
1780 | ||
1781 | coding = ((TERMINAL_TERMINAL_CODING (terminal)->common_flags | |
1782 | & CODING_REQUIRE_ENCODING_MASK) | |
1783 | ? TERMINAL_TERMINAL_CODING (terminal) : &safe_terminal_coding); | |
1784 | font_object = CODING_ID_NAME (coding->id); | |
1785 | } | |
1786 | ||
58753d74 KH |
1787 | header = fill_gstring_header (Qnil, from, to, font_object, string); |
1788 | gstring = gstring_lookup_cache (header); | |
1789 | if (! NILP (gstring)) | |
1790 | return gstring; | |
46f905e1 | 1791 | |
ea8ba975 KH |
1792 | frompos = XINT (from); |
1793 | topos = XINT (to); | |
46f905e1 SM |
1794 | if (LGSTRING_GLYPH_LEN (gstring_work) < topos - frompos) |
1795 | gstring_work = Fmake_vector (make_number (topos - frompos + 2), Qnil); | |
58753d74 KH |
1796 | LGSTRING_SET_HEADER (gstring_work, header); |
1797 | LGSTRING_SET_ID (gstring_work, Qnil); | |
1798 | fill_gstring_body (gstring_work); | |
1799 | return gstring_work; | |
1800 | } | |
1801 | ||
ca4c9455 KH |
1802 | \f |
1803 | /* Emacs Lisp APIs. */ | |
1804 | ||
1805 | DEFUN ("compose-region-internal", Fcompose_region_internal, | |
1806 | Scompose_region_internal, 2, 4, 0, | |
335c5470 PJ |
1807 | doc: /* Internal use only. |
1808 | ||
1809 | Compose text in the region between START and END. | |
1810 | Optional 3rd and 4th arguments are COMPONENTS and MODIFICATION-FUNC | |
9d751859 | 1811 | for the composition. See `compose-region' for more details. */) |
5842a27b | 1812 | (Lisp_Object start, Lisp_Object end, Lisp_Object components, Lisp_Object modification_func) |
ca4c9455 KH |
1813 | { |
1814 | validate_region (&start, &end); | |
1815 | if (!NILP (components) | |
1816 | && !INTEGERP (components) | |
1817 | && !CONSP (components) | |
1818 | && !STRINGP (components)) | |
b7826503 | 1819 | CHECK_VECTOR (components); |
ca4c9455 | 1820 | |
d562f8ab | 1821 | compose_text (XINT (start), XINT (end), components, modification_func, Qnil); |
ca4c9455 KH |
1822 | return Qnil; |
1823 | } | |
1824 | ||
1825 | DEFUN ("compose-string-internal", Fcompose_string_internal, | |
1826 | Scompose_string_internal, 3, 5, 0, | |
335c5470 PJ |
1827 | doc: /* Internal use only. |
1828 | ||
1829 | Compose text between indices START and END of STRING. | |
1830 | Optional 4th and 5th arguments are COMPONENTS and MODIFICATION-FUNC | |
9d751859 | 1831 | for the composition. See `compose-string' for more details. */) |
5842a27b | 1832 | (Lisp_Object string, Lisp_Object start, Lisp_Object end, Lisp_Object components, Lisp_Object modification_func) |
ca4c9455 | 1833 | { |
b7826503 PJ |
1834 | CHECK_STRING (string); |
1835 | CHECK_NUMBER (start); | |
1836 | CHECK_NUMBER (end); | |
ca4c9455 KH |
1837 | |
1838 | if (XINT (start) < 0 || | |
1839 | XINT (start) > XINT (end) | |
d5db4077 | 1840 | || XINT (end) > SCHARS (string)) |
ca4c9455 KH |
1841 | args_out_of_range (start, end); |
1842 | ||
d562f8ab | 1843 | compose_text (XINT (start), XINT (end), components, modification_func, string); |
ca4c9455 KH |
1844 | return string; |
1845 | } | |
1846 | ||
1847 | DEFUN ("find-composition-internal", Ffind_composition_internal, | |
177c0ea7 | 1848 | Sfind_composition_internal, 4, 4, 0, |
335c5470 PJ |
1849 | doc: /* Internal use only. |
1850 | ||
1851 | Return information about composition at or nearest to position POS. | |
9d751859 | 1852 | See `find-composition' for more details. */) |
5842a27b | 1853 | (Lisp_Object pos, Lisp_Object limit, Lisp_Object string, Lisp_Object detail_p) |
ca4c9455 | 1854 | { |
90b3fe91 KH |
1855 | Lisp_Object prop, tail, gstring; |
1856 | EMACS_INT start, end, from, to; | |
ca4c9455 KH |
1857 | int id; |
1858 | ||
b7826503 | 1859 | CHECK_NUMBER_COERCE_MARKER (pos); |
90b3fe91 | 1860 | from = XINT (pos); |
ca4c9455 KH |
1861 | if (!NILP (limit)) |
1862 | { | |
b7826503 | 1863 | CHECK_NUMBER_COERCE_MARKER (limit); |
90b3fe91 | 1864 | to = XINT (limit); |
ca4c9455 KH |
1865 | } |
1866 | else | |
90b3fe91 | 1867 | to = -1; |
177c0ea7 | 1868 | |
ca4c9455 | 1869 | if (!NILP (string)) |
e3b3e327 | 1870 | { |
b7826503 | 1871 | CHECK_STRING (string); |
d5db4077 | 1872 | if (XINT (pos) < 0 || XINT (pos) > SCHARS (string)) |
e3b3e327 GM |
1873 | args_out_of_range (string, pos); |
1874 | } | |
1875 | else | |
1876 | { | |
fa9090b8 | 1877 | if (XINT (pos) < BEGV || XINT (pos) > ZV) |
e3b3e327 GM |
1878 | args_out_of_range (Fcurrent_buffer (), pos); |
1879 | } | |
ca4c9455 | 1880 | |
90b3fe91 KH |
1881 | if (!find_composition (from, to, &start, &end, &prop, string)) |
1882 | { | |
4b4deea2 | 1883 | if (!NILP (BVAR (current_buffer, enable_multibyte_characters)) |
d9a7c140 | 1884 | && ! NILP (Vauto_composition_mode) |
90b3fe91 KH |
1885 | && find_automatic_composition (from, to, &start, &end, &gstring, |
1886 | string)) | |
1887 | return list3 (make_number (start), make_number (end), gstring); | |
1888 | return Qnil; | |
1889 | } | |
1890 | if ((end <= XINT (pos) || start > XINT (pos))) | |
1891 | { | |
1892 | EMACS_INT s, e; | |
1893 | ||
1894 | if (find_automatic_composition (from, to, &s, &e, &gstring, string) | |
1895 | && (e <= XINT (pos) ? e > end : s < start)) | |
fcebfc6a | 1896 | return list3 (make_number (s), make_number (e), gstring); |
90b3fe91 | 1897 | } |
ca4c9455 KH |
1898 | if (!COMPOSITION_VALID_P (start, end, prop)) |
1899 | return Fcons (make_number (start), Fcons (make_number (end), | |
1900 | Fcons (Qnil, Qnil))); | |
1901 | if (NILP (detail_p)) | |
1902 | return Fcons (make_number (start), Fcons (make_number (end), | |
1903 | Fcons (Qt, Qnil))); | |
1904 | ||
1905 | if (COMPOSITION_REGISTERD_P (prop)) | |
1906 | id = COMPOSITION_ID (prop); | |
1907 | else | |
1908 | { | |
579c18d0 EZ |
1909 | EMACS_INT start_byte = (NILP (string) |
1910 | ? CHAR_TO_BYTE (start) | |
1911 | : string_char_to_byte (string, start)); | |
ca4c9455 KH |
1912 | id = get_composition_id (start, start_byte, end - start, prop, string); |
1913 | } | |
1914 | ||
1915 | if (id >= 0) | |
1916 | { | |
1917 | Lisp_Object components, relative_p, mod_func; | |
1918 | enum composition_method method = COMPOSITION_METHOD (prop); | |
1919 | int width = composition_table[id]->width; | |
1920 | ||
1921 | components = Fcopy_sequence (COMPOSITION_COMPONENTS (prop)); | |
1922 | relative_p = (method == COMPOSITION_WITH_RULE_ALTCHARS | |
1923 | ? Qnil : Qt); | |
1924 | mod_func = COMPOSITION_MODIFICATION_FUNC (prop); | |
1925 | tail = Fcons (components, | |
1926 | Fcons (relative_p, | |
1927 | Fcons (mod_func, | |
1928 | Fcons (make_number (width), Qnil)))); | |
1929 | } | |
1930 | else | |
1931 | tail = Qnil; | |
1932 | ||
1933 | return Fcons (make_number (start), Fcons (make_number (end), tail)); | |
1934 | } | |
1935 | ||
1936 | \f | |
1937 | void | |
971de7fb | 1938 | syms_of_composite (void) |
ca4c9455 | 1939 | { |
58753d74 KH |
1940 | int i; |
1941 | ||
cd3520a4 | 1942 | DEFSYM (Qcomposition, "composition"); |
ca4c9455 | 1943 | |
58753d74 | 1944 | /* Make a hash table for static composition. */ |
ca4c9455 | 1945 | { |
09654086 | 1946 | Lisp_Object args[6]; |
177c0ea7 | 1947 | |
ca4c9455 KH |
1948 | args[0] = QCtest; |
1949 | args[1] = Qequal; | |
1950 | args[2] = QCweakness; | |
dc47eccc | 1951 | /* We used to make the hash table weak so that unreferenced |
ca101cff | 1952 | compositions can be garbage-collected. But, usually once |
dc47eccc KH |
1953 | created compositions are repeatedly used in an Emacs session, |
1954 | and thus it's not worth to save memory in such a way. So, we | |
1955 | make the table not weak. */ | |
6a83ee8a | 1956 | args[3] = Qnil; |
ca4c9455 KH |
1957 | args[4] = QCsize; |
1958 | args[5] = make_number (311); | |
09654086 | 1959 | composition_hash_table = Fmake_hash_table (6, args); |
ca4c9455 KH |
1960 | staticpro (&composition_hash_table); |
1961 | } | |
1962 | ||
58753d74 KH |
1963 | /* Make a hash table for glyph-string. */ |
1964 | { | |
1965 | Lisp_Object args[6]; | |
58753d74 KH |
1966 | args[0] = QCtest; |
1967 | args[1] = Qequal; | |
1968 | args[2] = QCweakness; | |
1969 | args[3] = Qnil; | |
1970 | args[4] = QCsize; | |
1971 | args[5] = make_number (311); | |
1972 | gstring_hash_table = Fmake_hash_table (6, args); | |
1973 | staticpro (&gstring_hash_table); | |
1974 | } | |
1975 | ||
1976 | staticpro (&gstring_work_headers); | |
1977 | gstring_work_headers = Fmake_vector (make_number (8), Qnil); | |
1978 | for (i = 0; i < 8; i++) | |
1979 | ASET (gstring_work_headers, i, Fmake_vector (make_number (i + 2), Qnil)); | |
1980 | staticpro (&gstring_work); | |
1981 | gstring_work = Fmake_vector (make_number (10), Qnil); | |
1982 | ||
ca4c9455 KH |
1983 | /* Text property `composition' should be nonsticky by default. */ |
1984 | Vtext_property_default_nonsticky | |
1985 | = Fcons (Fcons (Qcomposition, Qt), Vtext_property_default_nonsticky); | |
1986 | ||
29208e82 | 1987 | DEFVAR_LISP ("compose-chars-after-function", Vcompose_chars_after_function, |
335c5470 PJ |
1988 | doc: /* Function to adjust composition of buffer text. |
1989 | ||
9d751859 EZ |
1990 | This function is called with three arguments: FROM, TO, and OBJECT. |
1991 | FROM and TO specify the range of text whose composition should be | |
335c5470 PJ |
1992 | adjusted. OBJECT, if non-nil, is a string that contains the text. |
1993 | ||
1994 | This function is called after a text with `composition' property is | |
1995 | inserted or deleted to keep `composition' property of buffer text | |
1996 | valid. | |
1997 | ||
1998 | The default value is the function `compose-chars-after'. */); | |
d67b4f80 | 1999 | Vcompose_chars_after_function = intern_c_string ("compose-chars-after"); |
ca4c9455 | 2000 | |
cd3520a4 JB |
2001 | DEFSYM (Qauto_composed, "auto-composed"); |
2002 | DEFSYM (Qauto_composition_function, "auto-composition-function"); | |
40add26d | 2003 | |
29208e82 | 2004 | DEFVAR_LISP ("auto-composition-mode", Vauto_composition_mode, |
d9a7c140 KH |
2005 | doc: /* Non-nil if Auto-Composition mode is enabled. |
2006 | Use the command `auto-composition-mode' to change this variable. */); | |
2007 | Vauto_composition_mode = Qt; | |
2008 | ||
29208e82 | 2009 | DEFVAR_LISP ("auto-composition-function", Vauto_composition_function, |
f96ba4c1 | 2010 | doc: /* Function to call to compose characters automatically. |
9d751859 | 2011 | This function is called from the display routine with four arguments: |
ddc872ba | 2012 | FROM, TO, WINDOW, and STRING. |
335c5470 | 2013 | |
ddc872ba KH |
2014 | If STRING is nil, the function must compose characters in the region |
2015 | between FROM and TO in the current buffer. | |
335c5470 | 2016 | |
ddc872ba KH |
2017 | Otherwise, STRING is a string, and FROM and TO are indices into the |
2018 | string. In this case, the function must compose characters in the | |
2019 | string. */); | |
f96ba4c1 | 2020 | Vauto_composition_function = Qnil; |
40add26d | 2021 | |
29208e82 | 2022 | DEFVAR_LISP ("composition-function-table", Vcomposition_function_table, |
9d751859 | 2023 | doc: /* Char-table of functions for automatic character composition. |
58753d74 KH |
2024 | For each character that has to be composed automatically with |
2025 | preceding and/or following characters, this char-table contains | |
2026 | a function to call to compose that character. | |
2027 | ||
2028 | The element at index C in the table, if non-nil, is a list of | |
10f72a37 | 2029 | composition rules of this form: ([PATTERN PREV-CHARS FUNC] ...) |
58753d74 | 2030 | |
9d751859 | 2031 | PATTERN is a regular expression which C and the surrounding |
58753d74 KH |
2032 | characters must match. |
2033 | ||
895416e3 KH |
2034 | PREV-CHARS is a non-negative integer (less than 4) specifying how many |
2035 | characters before C to check the matching with PATTERN. If it is 0, | |
2036 | PATTERN must match C and the following characters. If it is 1, | |
2037 | PATTERN must match a character before C and the following characters. | |
58753d74 KH |
2038 | |
2039 | If PREV-CHARS is 0, PATTERN can be nil, which means that the | |
2040 | single character C should be composed. | |
2041 | ||
2042 | FUNC is a function to return a glyph-string representing a | |
9d751859 | 2043 | composition of the characters that match PATTERN. It is |
58753d74 KH |
2044 | called with one argument GSTRING. |
2045 | ||
2046 | GSTRING is a template of a glyph-string to return. It is already | |
2047 | filled with a proper header for the characters to compose, and | |
2048 | glyphs corresponding to those characters one by one. The | |
9d751859 | 2049 | function must return a new glyph-string with the same header as |
58753d74 KH |
2050 | GSTRING, or modify GSTRING itself and return it. |
2051 | ||
2052 | See also the documentation of `auto-composition-mode'. */); | |
2053 | Vcomposition_function_table = Fmake_char_table (Qnil, Qnil); | |
2054 | ||
ca4c9455 KH |
2055 | defsubr (&Scompose_region_internal); |
2056 | defsubr (&Scompose_string_internal); | |
2057 | defsubr (&Sfind_composition_internal); | |
58753d74 | 2058 | defsubr (&Scomposition_get_gstring); |
ca4c9455 | 2059 | } |