Merge from trunk.
[bpt/emacs.git] / src / composite.c
CommitLineData
ca4c9455 1/* Composite sequence support.
73b0cd50 2 Copyright (C) 2001-2011 Free Software Foundation, Inc.
5df4f04c 3 Copyright (C) 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011
ce03bf76
KH
4 National Institute of Advanced Industrial Science and Technology (AIST)
5 Registration Number H14PRO021
f30d8d94 6 Copyright (C) 2003, 2006
1527c36e
KH
7 National Institute of Advanced Industrial Science and Technology (AIST)
8 Registration Number H13PRO009
ca4c9455
KH
9
10This file is part of GNU Emacs.
11
9ec0b715 12GNU Emacs is free software: you can redistribute it and/or modify
ca4c9455 13it under the terms of the GNU General Public License as published by
9ec0b715
GM
14the Free Software Foundation, either version 3 of the License, or
15(at your option) any later version.
ca4c9455
KH
16
17GNU Emacs is distributed in the hope that it will be useful,
18but WITHOUT ANY WARRANTY; without even the implied warranty of
19MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20GNU General Public License for more details.
21
22You should have received a copy of the GNU General Public License
9ec0b715 23along with GNU Emacs. If not, see <http://www.gnu.org/licenses/>. */
ca4c9455
KH
24
25#include <config.h>
d7306fe6 26#include <setjmp.h>
ca4c9455
KH
27#include "lisp.h"
28#include "buffer.h"
1527c36e 29#include "character.h"
f5199465 30#include "coding.h"
ca4c9455 31#include "intervals.h"
58753d74
KH
32#include "window.h"
33#include "frame.h"
34#include "dispextern.h"
35#include "font.h"
f5199465
KH
36#include "termhooks.h"
37
ca4c9455
KH
38
39/* Emacs uses special text property `composition' to support character
40 composition. A sequence of characters that have the same (i.e. eq)
41 `composition' property value is treated as a single composite
42 sequence (we call it just `composition' here after). Characters in
43 a composition are all composed somehow on the screen.
44
45 The property value has this form when the composition is made:
46 ((LENGTH . COMPONENTS) . MODIFICATION-FUNC)
47 then turns to this form:
48 (COMPOSITION-ID . (LENGTH COMPONENTS-VEC . MODIFICATION-FUNC))
49 when the composition is registered in composition_hash_table and
50 composition_table. These rather peculiar structures were designed
51 to make it easy to distinguish them quickly (we can do that by
52 checking only the first element) and to extract LENGTH (from the
53 former form) and COMPOSITION-ID (from the latter form).
54
55 We register a composition when it is displayed, or when the width
56 is required (for instance, to calculate columns).
57
58 LENGTH -- Length of the composition. This information is used to
59 check the validity of the composition.
60
61 COMPONENTS -- Character, string, vector, list, or nil.
62
63 If it is nil, characters in the text are composed relatively
64 according to their metrics in font glyphs.
65
66 If it is a character or a string, the character or characters
67 in the string are composed relatively.
68
69 If it is a vector or list of integers, the element is a
70 character or an encoded composition rule. The characters are
71 composed according to the rules. (2N)th elements are
72 characters to be composed and (2N+1)th elements are
73 composition rules to tell how to compose (2N+2)th element with
74 the previously composed 2N glyphs.
75
763d7377
EZ
76 COMPONENTS-VEC -- Vector of integers. In a relative composition,
77 the elements are the characters to be composed. In a rule-base
ca4c9455
KH
78 composition, the elements are characters or encoded
79 composition rules.
80
81 MODIFICATION-FUNC -- If non nil, it is a function to call when the
82 composition gets invalid after a modification in a buffer. If
83 it is nil, a function in `composition-function-table' of the
84 first character in the sequence is called.
85
86 COMPOSITION-ID --Identification number of the composition. It is
87 used as an index to composition_table for the composition.
88
89 When Emacs has to display a composition or has to know its
90 displaying width, the function get_composition_id is called. It
91 returns COMPOSITION-ID so that the caller can access the
92 information about the composition through composition_table. If a
93 COMPOSITION-ID has not yet been assigned to the composition,
94 get_composition_id checks the validity of `composition' property,
95 and, if valid, assigns a new ID, registers the information in
96 composition_hash_table and composition_table, and changes the form
763d7377
EZ
97 of the property value. If the property is invalid,
98 get_composition_id returns -1 without changing the property value.
ca4c9455 99
763d7377 100 We use two tables to keep the information about composition;
ca4c9455
KH
101 composition_hash_table and composition_table.
102
763d7377 103 The former is a hash table whose keys are COMPONENTS-VECs and
ca4c9455 104 values are the corresponding COMPOSITION-IDs. This hash table is
4abc7470 105 weak, but as each key (COMPONENTS-VEC) is also kept as a value of the
ca4c9455 106 `composition' property, it won't be collected as garbage until all
4abc7470 107 bits of text that have the same COMPONENTS-VEC are deleted.
ca4c9455
KH
108
109 The latter is a table of pointers to `struct composition' indexed
4abc7470 110 by COMPOSITION-ID. This structure keeps the other information (see
ca4c9455
KH
111 composite.h).
112
113 In general, a text property holds information about individual
114 characters. But, a `composition' property holds information about
4abc7470 115 a sequence of characters (in this sense, it is like the `intangible'
ca4c9455 116 property). That means that we should not share the property value
4abc7470 117 in adjacent compositions -- we can't distinguish them if they have the
ca4c9455
KH
118 same property. So, after any changes, we call
119 `update_compositions' and change a property of one of adjacent
120 compositions to a copy of it. This function also runs a proper
121 composition modification function to make a composition that gets
122 invalid by the change valid again.
123
4abc7470 124 As the value of the `composition' property holds information about a
ca4c9455 125 specific range of text, the value gets invalid if we change the
4abc7470 126 text in the range. We treat the `composition' property as always
ca4c9455
KH
127 rear-nonsticky (currently by setting default-text-properties to
128 (rear-nonsticky (composition))) and we never make properties of
129 adjacent compositions identical. Thus, any such changes make the
4abc7470 130 range just shorter. So, we can check the validity of the `composition'
ca4c9455
KH
131 property by comparing LENGTH information with the actual length of
132 the composition.
133
134*/
135
136
137Lisp_Object Qcomposition;
138
139/* Table of pointers to the structure `composition' indexed by
140 COMPOSITION-ID. This structure is for storing information about
141 each composition except for COMPONENTS-VEC. */
142struct composition **composition_table;
143
144/* The current size of `composition_table'. */
ebfa62c0 145static ptrdiff_t composition_table_size;
ca4c9455
KH
146
147/* Number of compositions currently made. */
ebfa62c0 148ptrdiff_t n_compositions;
ca4c9455
KH
149
150/* Hash table for compositions. The key is COMPONENTS-VEC of
151 `composition' property. The value is the corresponding
152 COMPOSITION-ID. */
153Lisp_Object composition_hash_table;
154
955cbe7b
PE
155static Lisp_Object Qauto_composed;
156static Lisp_Object Qauto_composition_function;
763d7377
EZ
157/* Maximum number of characters to look back for
158 auto-compositions. */
895416e3
KH
159#define MAX_AUTO_COMPOSITION_LOOKBACK 3
160
cd64ea1d
PE
161static Lisp_Object Fcomposition_get_gstring (Lisp_Object, Lisp_Object,
162 Lisp_Object, Lisp_Object);
ea058d2c 163
ca4c9455
KH
164/* Temporary variable used in macros COMPOSITION_XXX. */
165Lisp_Object composition_temp;
f30d8d94 166
ca4c9455 167\f
ca4c9455
KH
168/* Return COMPOSITION-ID of a composition at buffer position
169 CHARPOS/BYTEPOS and length NCHARS. The `composition' property of
170 the sequence is PROP. STRING, if non-nil, is a string that
171 contains the composition instead of the current buffer.
172
173 If the composition is invalid, return -1. */
174
ebfa62c0 175ptrdiff_t
579c18d0
EZ
176get_composition_id (EMACS_INT charpos, EMACS_INT bytepos, EMACS_INT nchars,
177 Lisp_Object prop, Lisp_Object string)
ca4c9455
KH
178{
179 Lisp_Object id, length, components, key, *key_contents;
d86d0d74 180 ptrdiff_t glyph_len;
ca4c9455 181 struct Lisp_Hash_Table *hash_table = XHASH_TABLE (composition_hash_table);
d3411f89 182 ptrdiff_t hash_index;
0de4bb68 183 EMACS_UINT hash_code;
d86d0d74 184 enum composition_method method;
ca4c9455 185 struct composition *cmp;
579c18d0
EZ
186 EMACS_INT i;
187 int ch;
ca4c9455 188
0065d054
PE
189 /* Maximum length of a string of glyphs. XftGlyphExtents limits
190 this to INT_MAX, and Emacs limits it further. Divide INT_MAX - 1
191 by 2 because x_produce_glyphs computes glyph_len * 2 + 1. Divide
192 the size by MAX_MULTIBYTE_LENGTH because encode_terminal_code
193 multiplies glyph_len by MAX_MULTIBYTE_LENGTH. */
d86d0d74 194 enum {
0065d054
PE
195 GLYPH_LEN_MAX = min ((INT_MAX - 1) / 2,
196 min (PTRDIFF_MAX, SIZE_MAX) / MAX_MULTIBYTE_LENGTH)
d86d0d74
PE
197 };
198
ca4c9455
KH
199 /* PROP should be
200 Form-A: ((LENGTH . COMPONENTS) . MODIFICATION-FUNC)
201 or
202 Form-B: (COMPOSITION-ID . (LENGTH COMPONENTS-VEC . MODIFICATION-FUNC))
203 */
204 if (nchars == 0 || !CONSP (prop))
205 goto invalid_composition;
206
207 id = XCAR (prop);
208 if (INTEGERP (id))
209 {
210 /* PROP should be Form-B. */
211 if (XINT (id) < 0 || XINT (id) >= n_compositions)
212 goto invalid_composition;
213 return XINT (id);
214 }
215
216 /* PROP should be Form-A.
217 Thus, ID should be (LENGTH . COMPONENTS). */
218 if (!CONSP (id))
219 goto invalid_composition;
220 length = XCAR (id);
221 if (!INTEGERP (length) || XINT (length) != nchars)
222 goto invalid_composition;
223
224 components = XCDR (id);
225
226 /* Check if the same composition has already been registered or not
227 by consulting composition_hash_table. The key for this table is
228 COMPONENTS (converted to a vector COMPONENTS-VEC) or, if it is
229 nil, vector of characters in the composition range. */
230 if (INTEGERP (components))
231 key = Fmake_vector (make_number (1), components);
232 else if (STRINGP (components) || CONSP (components))
233 key = Fvconcat (1, &components);
234 else if (VECTORP (components))
235 key = components;
236 else if (NILP (components))
237 {
238 key = Fmake_vector (make_number (nchars), Qnil);
239 if (STRINGP (string))
240 for (i = 0; i < nchars; i++)
241 {
242 FETCH_STRING_CHAR_ADVANCE (ch, string, charpos, bytepos);
243 XVECTOR (key)->contents[i] = make_number (ch);
244 }
245 else
246 for (i = 0; i < nchars; i++)
247 {
248 FETCH_CHAR_ADVANCE (ch, charpos, bytepos);
249 XVECTOR (key)->contents[i] = make_number (ch);
250 }
251 }
252 else
253 goto invalid_composition;
254
255 hash_index = hash_lookup (hash_table, key, &hash_code);
256 if (hash_index >= 0)
257 {
258 /* We have already registered the same composition. Change PROP
259 from Form-A above to Form-B while replacing COMPONENTS with
260 COMPONENTS-VEC stored in the hash table. We can directly
261 modify the cons cell of PROP because it is not shared. */
262 key = HASH_KEY (hash_table, hash_index);
263 id = HASH_VALUE (hash_table, hash_index);
f3fbd155
KR
264 XSETCAR (prop, id);
265 XSETCDR (prop, Fcons (make_number (nchars), Fcons (key, XCDR (prop))));
ca4c9455
KH
266 return XINT (id);
267 }
268
269 /* This composition is a new one. We must register it. */
177c0ea7 270
ca4c9455 271 /* Check if we have sufficient memory to store this information. */
0065d054
PE
272 if (composition_table_size <= n_compositions)
273 composition_table = xpalloc (composition_table, &composition_table_size,
274 1, -1, sizeof *composition_table);
ca4c9455
KH
275
276 key_contents = XVECTOR (key)->contents;
277
278 /* Check if the contents of COMPONENTS are valid if COMPONENTS is a
279 vector or a list. It should be a sequence of:
280 char1 rule1 char2 rule2 char3 ... ruleN charN+1 */
f30d8d94 281
dd5e1ed4 282 if (VECTORP (components)
f30d8d94
KH
283 && ASIZE (components) >= 2
284 && VECTORP (AREF (components, 0)))
285 {
286 /* COMPONENTS is a glyph-string. */
7d100a81 287 EMACS_INT len = ASIZE (key);
f30d8d94
KH
288
289 for (i = 1; i < len; i++)
290 if (! VECTORP (AREF (key, i)))
291 goto invalid_composition;
292 }
dd5e1ed4 293 else if (VECTORP (components) || CONSP (components))
ca4c9455 294 {
7d100a81 295 EMACS_INT len = ASIZE (key);
ca4c9455
KH
296
297 /* The number of elements should be odd. */
298 if ((len % 2) == 0)
299 goto invalid_composition;
300 /* All elements should be integers (character or encoded
301 composition rule). */
302 for (i = 0; i < len; i++)
303 {
304 if (!INTEGERP (key_contents[i]))
305 goto invalid_composition;
306 }
307 }
308
309 /* Change PROP from Form-A above to Form-B. We can directly modify
310 the cons cell of PROP because it is not shared. */
311 XSETFASTINT (id, n_compositions);
f3fbd155
KR
312 XSETCAR (prop, id);
313 XSETCDR (prop, Fcons (make_number (nchars), Fcons (key, XCDR (prop))));
ca4c9455
KH
314
315 /* Register the composition in composition_hash_table. */
316 hash_index = hash_put (hash_table, key, id, hash_code);
317
d86d0d74
PE
318 method = (NILP (components)
319 ? COMPOSITION_RELATIVE
320 : ((INTEGERP (components) || STRINGP (components))
321 ? COMPOSITION_WITH_ALTCHARS
322 : COMPOSITION_WITH_RULE_ALTCHARS));
323
324 glyph_len = (method == COMPOSITION_WITH_RULE_ALTCHARS
325 ? (ASIZE (key) + 1) / 2
326 : ASIZE (key));
327
0065d054 328 if (GLYPH_LEN_MAX < glyph_len)
d86d0d74
PE
329 memory_full (SIZE_MAX);
330
ca4c9455
KH
331 /* Register the composition in composition_table. */
332 cmp = (struct composition *) xmalloc (sizeof (struct composition));
333
d86d0d74 334 cmp->method = method;
ca4c9455 335 cmp->hash_index = hash_index;
ca4c9455 336 cmp->glyph_len = glyph_len;
0065d054 337 cmp->offsets = xnmalloc (glyph_len, 2 * sizeof *cmp->offsets);
ca4c9455
KH
338 cmp->font = NULL;
339
58753d74 340 if (cmp->method != COMPOSITION_WITH_RULE_ALTCHARS)
ca4c9455
KH
341 {
342 /* Relative composition. */
343 cmp->width = 0;
344 for (i = 0; i < glyph_len; i++)
345 {
346 int this_width;
347 ch = XINT (key_contents[i]);
8e86803c 348 this_width = (ch == '\t' ? 1 : CHAR_WIDTH (ch));
ca4c9455
KH
349 if (cmp->width < this_width)
350 cmp->width = this_width;
351 }
352 }
353 else
354 {
355 /* Rule-base composition. */
356 float leftmost = 0.0, rightmost;
357
358 ch = XINT (key_contents[0]);
69df789a 359 rightmost = ch != '\t' ? CHAR_WIDTH (ch) : 1;
ca4c9455
KH
360
361 for (i = 1; i < glyph_len; i += 2)
362 {
b13a45c6 363 int rule, gref, nref;
ca4c9455
KH
364 int this_width;
365 float this_left;
366
367 rule = XINT (key_contents[i]);
368 ch = XINT (key_contents[i + 1]);
69df789a 369 this_width = ch != '\t' ? CHAR_WIDTH (ch) : 1;
ca4c9455
KH
370
371 /* A composition rule is specified by an integer value
372 that encodes global and new reference points (GREF and
373 NREF). GREF and NREF are specified by numbers as
374 below:
375 0---1---2 -- ascent
376 | |
377 | |
378 | |
379 9--10--11 -- center
380 | |
381 ---3---4---5--- baseline
382 | |
383 6---7---8 -- descent
384 */
b13a45c6 385 COMPOSITION_DECODE_REFS (rule, gref, nref);
ca4c9455
KH
386 this_left = (leftmost
387 + (gref % 3) * (rightmost - leftmost) / 2.0
388 - (nref % 3) * this_width / 2.0);
389
390 if (this_left < leftmost)
391 leftmost = this_left;
392 if (this_left + this_width > rightmost)
393 rightmost = this_left + this_width;
394 }
395
396 cmp->width = rightmost - leftmost;
397 if (cmp->width < (rightmost - leftmost))
398 /* To get a ceiling integer value. */
399 cmp->width++;
400 }
401
402 composition_table[n_compositions] = cmp;
403
404 return n_compositions++;
405
406 invalid_composition:
407 /* Would it be better to remove this `composition' property? */
408 return -1;
409}
410
411\f
90b3fe91
KH
412/* Find a static composition at or nearest to position POS of OBJECT
413 (buffer or string).
ca4c9455
KH
414
415 OBJECT defaults to the current buffer. If there's a composition at
416 POS, set *START and *END to the start and end of the sequence,
417 *PROP to the `composition' property, and return 1.
418
419 If there's no composition at POS and LIMIT is negative, return 0.
420
421 Otherwise, search for a composition forward (LIMIT > POS) or
422 backward (LIMIT < POS). In this case, LIMIT bounds the search.
423
424 If a composition is found, set *START, *END, and *PROP as above,
425 and return 1, else return 0.
426
427 This doesn't check the validity of composition. */
428
429int
579c18d0
EZ
430find_composition (EMACS_INT pos, EMACS_INT limit,
431 EMACS_INT *start, EMACS_INT *end,
432 Lisp_Object *prop, Lisp_Object object)
ca4c9455
KH
433{
434 Lisp_Object val;
435
436 if (get_property_and_range (pos, Qcomposition, prop, start, end, object))
437 return 1;
438
439 if (limit < 0 || limit == pos)
440 return 0;
441
442 if (limit > pos) /* search forward */
d279f620
KH
443 {
444 val = Fnext_single_property_change (make_number (pos), Qcomposition,
445 object, make_number (limit));
446 pos = XINT (val);
447 if (pos == limit)
448 return 0;
449 }
ca4c9455 450 else /* search backward */
d279f620
KH
451 {
452 if (get_property_and_range (pos - 1, Qcomposition, prop, start, end,
453 object))
454 return 1;
455 val = Fprevious_single_property_change (make_number (pos), Qcomposition,
456 object, make_number (limit));
457 pos = XINT (val);
458 if (pos == limit)
459 return 0;
460 pos--;
461 }
ca4c9455
KH
462 get_property_and_range (pos, Qcomposition, prop, start, end, object);
463 return 1;
464}
465
466/* Run a proper function to adjust the composition sitting between
467 FROM and TO with property PROP. */
468
469static void
579c18d0 470run_composition_function (EMACS_INT from, EMACS_INT to, Lisp_Object prop)
ca4c9455 471{
7d019510 472 Lisp_Object func;
aaefca97 473 EMACS_INT start, end;
ca4c9455
KH
474
475 func = COMPOSITION_MODIFICATION_FUNC (prop);
476 /* If an invalid composition precedes or follows, try to make them
477 valid too. */
478 if (from > BEGV
479 && find_composition (from - 1, -1, &start, &end, &prop, Qnil)
480 && !COMPOSITION_VALID_P (start, end, prop))
481 from = start;
482 if (to < ZV
483 && find_composition (to, -1, &start, &end, &prop, Qnil)
484 && !COMPOSITION_VALID_P (start, end, prop))
485 to = end;
775b3d2d 486 if (!NILP (Ffboundp (func)))
ca4c9455 487 call2 (func, make_number (from), make_number (to));
ca4c9455
KH
488}
489
490/* Make invalid compositions adjacent to or inside FROM and TO valid.
491 CHECK_MASK is bitwise `or' of mask bits defined by macros
492 CHECK_XXX (see the comment in composite.h).
493
b418f8a6 494 It also resets the text-property `auto-composed' to a proper region
f96ba4c1
KH
495 so that automatic character composition works correctly later while
496 displaying the region.
8f924df7 497
ca4c9455
KH
498 This function is called when a buffer text is changed. If the
499 change is deletion, FROM == TO. Otherwise, FROM < TO. */
500
501void
971de7fb 502update_compositions (EMACS_INT from, EMACS_INT to, int check_mask)
ca4c9455 503{
7d019510 504 Lisp_Object prop;
aaefca97 505 EMACS_INT start, end;
f96ba4c1
KH
506 /* The beginning and end of the region to set the property
507 `auto-composed' to nil. */
aaefca97 508 EMACS_INT min_pos = from, max_pos = to;
ca4c9455 509
6c1aa7f1
GM
510 if (inhibit_modification_hooks)
511 return;
177c0ea7 512
d3f40cbd
KH
513 /* If FROM and TO are not in a valid range, do nothing. */
514 if (! (BEGV <= from && from <= to && to <= ZV))
515 return;
516
ca4c9455
KH
517 if (check_mask & CHECK_HEAD)
518 {
519 /* FROM should be at composition boundary. But, insertion or
520 deletion will make two compositions adjacent and
521 indistinguishable when they have same (eq) property. To
522 avoid it, in such a case, we change the property of the
523 latter to the copy of it. */
524 if (from > BEGV
553d3164
KH
525 && find_composition (from - 1, -1, &start, &end, &prop, Qnil)
526 && COMPOSITION_VALID_P (start, end, prop))
ca4c9455 527 {
f96ba4c1
KH
528 min_pos = start;
529 if (end > to)
530 max_pos = end;
ca4c9455
KH
531 if (from < end)
532 Fput_text_property (make_number (from), make_number (end),
533 Qcomposition,
534 Fcons (XCAR (prop), XCDR (prop)), Qnil);
535 run_composition_function (start, end, prop);
536 from = end;
537 }
dd33cc56 538 else if (from < ZV
553d3164 539 && find_composition (from, -1, &start, &from, &prop, Qnil)
9657d668 540 && COMPOSITION_VALID_P (start, from, prop))
f96ba4c1
KH
541 {
542 if (from > to)
543 max_pos = from;
544 run_composition_function (start, from, prop);
545 }
ca4c9455
KH
546 }
547
548 if (check_mask & CHECK_INSIDE)
549 {
550 /* In this case, we are sure that (check & CHECK_TAIL) is also
551 nonzero. Thus, here we should check only compositions before
552 (to - 1). */
553 while (from < to - 1
554 && find_composition (from, to, &start, &from, &prop, Qnil)
9657d668 555 && COMPOSITION_VALID_P (start, from, prop)
ca4c9455
KH
556 && from < to - 1)
557 run_composition_function (start, from, prop);
558 }
559
560 if (check_mask & CHECK_TAIL)
561 {
562 if (from < to
553d3164
KH
563 && find_composition (to - 1, -1, &start, &end, &prop, Qnil)
564 && COMPOSITION_VALID_P (start, end, prop))
ca4c9455
KH
565 {
566 /* TO should be also at composition boundary. But,
567 insertion or deletion will make two compositions adjacent
568 and indistinguishable when they have same (eq) property.
569 To avoid it, in such a case, we change the property of
570 the former to the copy of it. */
571 if (to < end)
f96ba4c1
KH
572 {
573 Fput_text_property (make_number (start), make_number (to),
574 Qcomposition,
575 Fcons (XCAR (prop), XCDR (prop)), Qnil);
576 max_pos = end;
577 }
ca4c9455
KH
578 run_composition_function (start, end, prop);
579 }
580 else if (to < ZV
553d3164
KH
581 && find_composition (to, -1, &start, &end, &prop, Qnil)
582 && COMPOSITION_VALID_P (start, end, prop))
f96ba4c1
KH
583 {
584 run_composition_function (start, end, prop);
585 max_pos = end;
586 }
ca4c9455 587 }
f96ba4c1 588 if (min_pos < max_pos)
9d440521
KH
589 {
590 int count = SPECPDL_INDEX ();
591
592 specbind (Qinhibit_read_only, Qt);
593 specbind (Qinhibit_modification_hooks, Qt);
594 specbind (Qinhibit_point_motion_hooks, Qt);
595 Fremove_list_of_text_properties (make_number (min_pos),
596 make_number (max_pos),
597 Fcons (Qauto_composed, Qnil), Qnil);
598 unbind_to (count, Qnil);
599 }
ca4c9455
KH
600}
601
c1361885
KH
602
603/* Modify composition property values in LIST destructively. LIST is
604 a list as returned from text_property_list. Change values to the
605 top-level copies of them so that none of them are `eq'. */
606
607void
971de7fb 608make_composition_value_copy (Lisp_Object list)
c1361885
KH
609{
610 Lisp_Object plist, val;
611
612 for (; CONSP (list); list = XCDR (list))
613 {
614 plist = XCAR (XCDR (XCDR (XCAR (list))));
615 while (CONSP (plist) && CONSP (XCDR (plist)))
616 {
617 if (EQ (XCAR (plist), Qcomposition)
618 && (val = XCAR (XCDR (plist)), CONSP (val)))
f3fbd155 619 XSETCAR (XCDR (plist), Fcons (XCAR (val), XCDR (val)));
c1361885
KH
620 plist = XCDR (XCDR (plist));
621 }
622 }
623}
624
625
ca4c9455
KH
626/* Make text in the region between START and END a composition that
627 has COMPONENTS and MODIFICATION-FUNC.
628
629 If STRING is non-nil, then operate on characters contained between
630 indices START and END in STRING. */
631
632void
579c18d0
EZ
633compose_text (EMACS_INT start, EMACS_INT end, Lisp_Object components,
634 Lisp_Object modification_func, Lisp_Object string)
ca4c9455
KH
635{
636 Lisp_Object prop;
637
638 prop = Fcons (Fcons (make_number (end - start), components),
639 modification_func);
640 Fput_text_property (make_number (start), make_number (end),
641 Qcomposition, prop, string);
642}
58753d74
KH
643
644
f57e2426
J
645static Lisp_Object autocmp_chars (Lisp_Object, EMACS_INT, EMACS_INT,
646 EMACS_INT, struct window *,
647 struct face *, Lisp_Object);
58753d74
KH
648
649\f
650/* Lisp glyph-string handlers */
651
652/* Hash table for automatic composition. The key is a header of a
653 lgstring (Lispy glyph-string), and the value is a body of a
654 lgstring. */
655
656static Lisp_Object gstring_hash_table;
657
f57e2426 658static Lisp_Object gstring_lookup_cache (Lisp_Object);
58753d74
KH
659
660static Lisp_Object
971de7fb 661gstring_lookup_cache (Lisp_Object header)
58753d74
KH
662{
663 struct Lisp_Hash_Table *h = XHASH_TABLE (gstring_hash_table);
d3411f89 664 ptrdiff_t i = hash_lookup (h, header, NULL);
58753d74
KH
665
666 return (i >= 0 ? HASH_VALUE (h, i) : Qnil);
667}
668
669Lisp_Object
dcd5c89a 670composition_gstring_put_cache (Lisp_Object gstring, EMACS_INT len)
58753d74
KH
671{
672 struct Lisp_Hash_Table *h = XHASH_TABLE (gstring_hash_table);
0de4bb68 673 EMACS_UINT hash;
58753d74 674 Lisp_Object header, copy;
dcd5c89a 675 EMACS_INT i;
58753d74
KH
676
677 header = LGSTRING_HEADER (gstring);
678 hash = h->hashfn (h, header);
679 if (len < 0)
680 {
7d100a81 681 EMACS_INT j, glyph_len = LGSTRING_GLYPH_LEN (gstring);
27ccc379
PE
682 for (j = 0; j < glyph_len; j++)
683 if (NILP (LGSTRING_GLYPH (gstring, j)))
58753d74 684 break;
27ccc379 685 len = j;
58753d74 686 }
087e2ea9 687
f2ed8a70 688 lint_assume (len <= TYPE_MAXIMUM (EMACS_INT) - 2);
58753d74
KH
689 copy = Fmake_vector (make_number (len + 2), Qnil);
690 LGSTRING_SET_HEADER (copy, Fcopy_sequence (header));
691 for (i = 0; i < len; i++)
692 LGSTRING_SET_GLYPH (copy, i, Fcopy_sequence (LGSTRING_GLYPH (gstring, i)));
693 i = hash_put (h, LGSTRING_HEADER (copy), copy, hash);
694 LGSTRING_SET_ID (copy, make_number (i));
695 return copy;
696}
697
698Lisp_Object
ebfa62c0 699composition_gstring_from_id (ptrdiff_t id)
58753d74
KH
700{
701 struct Lisp_Hash_Table *h = XHASH_TABLE (gstring_hash_table);
702
703 return HASH_VALUE (h, id);
704}
705
f57e2426
J
706static Lisp_Object fill_gstring_header (Lisp_Object, Lisp_Object,
707 Lisp_Object, Lisp_Object,
708 Lisp_Object);
58753d74
KH
709
710int
971de7fb 711composition_gstring_p (Lisp_Object gstring)
58753d74
KH
712{
713 Lisp_Object header;
5eb55db9 714 EMACS_INT i;
58753d74
KH
715
716 if (! VECTORP (gstring) || ASIZE (gstring) < 2)
717 return 0;
718 header = LGSTRING_HEADER (gstring);
719 if (! VECTORP (header) || ASIZE (header) < 2)
720 return 0;
721 if (! NILP (LGSTRING_FONT (gstring))
f5199465
KH
722 && (! FONT_OBJECT_P (LGSTRING_FONT (gstring))
723 && ! CODING_SYSTEM_P (LGSTRING_FONT (gstring))))
58753d74
KH
724 return 0;
725 for (i = 1; i < ASIZE (LGSTRING_HEADER (gstring)); i++)
726 if (! NATNUMP (AREF (LGSTRING_HEADER (gstring), i)))
727 return 0;
728 if (! NILP (LGSTRING_ID (gstring)) && ! NATNUMP (LGSTRING_ID (gstring)))
729 return 0;
730 for (i = 0; i < LGSTRING_GLYPH_LEN (gstring); i++)
731 {
732 Lisp_Object glyph = LGSTRING_GLYPH (gstring, i);
733 if (NILP (glyph))
734 break;
735 if (! VECTORP (glyph) || ASIZE (glyph) != LGLYPH_SIZE)
736 return 0;
737 }
738 return 1;
739}
740
741int
579c18d0
EZ
742composition_gstring_width (Lisp_Object gstring, EMACS_INT from, EMACS_INT to,
743 struct font_metrics *metrics)
58753d74
KH
744{
745 Lisp_Object *glyph;
746 int width = 0;
747
748 if (metrics)
749 {
750 Lisp_Object font_object = LGSTRING_FONT (gstring);
58753d74 751
f5199465
KH
752 if (FONT_OBJECT_P (font_object))
753 {
754 struct font *font = XFONT_OBJECT (font_object);
755
756 metrics->ascent = font->ascent;
757 metrics->descent = font->descent;
758 }
759 else
760 {
761 metrics->ascent = 1;
762 metrics->descent = 0;
763 }
58753d74
KH
764 metrics->width = metrics->lbearing = metrics->rbearing = 0;
765 }
766 for (glyph = &LGSTRING_GLYPH (gstring, from); from < to; from++, glyph++)
767 {
768 int x;
769
770 if (NILP (LGLYPH_ADJUSTMENT (*glyph)))
771 width += LGLYPH_WIDTH (*glyph);
772 else
773 width += LGLYPH_WADJUST (*glyph);
774 if (metrics)
775 {
776 x = metrics->width + LGLYPH_LBEARING (*glyph) + LGLYPH_XOFF (*glyph);
777 if (metrics->lbearing > x)
778 metrics->lbearing = x;
779 x = metrics->width + LGLYPH_RBEARING (*glyph) + LGLYPH_XOFF (*glyph);
780 if (metrics->rbearing < x)
781 metrics->rbearing = x;
782 metrics->width = width;
783 x = LGLYPH_ASCENT (*glyph) - LGLYPH_YOFF (*glyph);
784 if (metrics->ascent < x)
785 metrics->ascent = x;
895416e3 786 x = LGLYPH_DESCENT (*glyph) + LGLYPH_YOFF (*glyph);
58753d74
KH
787 if (metrics->descent < x)
788 metrics->descent = x;
789 }
790 }
791 return width;
792}
793
794
795static Lisp_Object gstring_work;
796static Lisp_Object gstring_work_headers;
797
798static Lisp_Object
971de7fb 799fill_gstring_header (Lisp_Object header, Lisp_Object start, Lisp_Object end, Lisp_Object font_object, Lisp_Object string)
58753d74
KH
800{
801 EMACS_INT from, to, from_byte;
802 EMACS_INT len, i;
803
804 if (NILP (string))
805 {
4b4deea2 806 if (NILP (BVAR (current_buffer, enable_multibyte_characters)))
58753d74
KH
807 error ("Attempt to shape unibyte text");
808 validate_region (&start, &end);
809 from = XFASTINT (start);
810 to = XFASTINT (end);
811 from_byte = CHAR_TO_BYTE (from);
812 }
813 else
814 {
815 CHECK_STRING (string);
793ffee8 816 if (! STRING_MULTIBYTE (string))
58753d74 817 error ("Attempt to shape unibyte text");
ea8ba975 818 /* FROM and TO are checked by the caller. */
58753d74 819 from = XINT (start);
58753d74
KH
820 to = XINT (end);
821 if (from < 0 || from > to || to > SCHARS (string))
822 args_out_of_range_3 (string, start, end);
823 from_byte = string_char_to_byte (string, from);
824 }
825
826 len = to - from;
827 if (len == 0)
828 error ("Attempt to shape zero-length text");
829 if (VECTORP (header))
830 {
831 if (ASIZE (header) != len + 1)
832 args_out_of_range (header, make_number (len + 1));
833 }
834 else
835 {
836 if (len <= 8)
837 header = AREF (gstring_work_headers, len - 1);
838 else
839 header = Fmake_vector (make_number (len + 1), Qnil);
840 }
841
842 ASET (header, 0, font_object);
843 for (i = 0; i < len; i++)
844 {
845 int c;
846
847 if (NILP (string))
848 FETCH_CHAR_ADVANCE_NO_CHECK (c, from, from_byte);
849 else
850 FETCH_STRING_CHAR_ADVANCE_NO_CHECK (c, string, from, from_byte);
851 ASET (header, i + 1, make_number (c));
852 }
853 return header;
854}
855
58753d74 856static void
971de7fb 857fill_gstring_body (Lisp_Object gstring)
58753d74
KH
858{
859 Lisp_Object font_object = LGSTRING_FONT (gstring);
860 Lisp_Object header = AREF (gstring, 0);
861 EMACS_INT len = LGSTRING_CHAR_LEN (gstring);
862 EMACS_INT i;
863
864 for (i = 0; i < len; i++)
865 {
866 Lisp_Object g = LGSTRING_GLYPH (gstring, i);
f8c86b69 867 int c = XFASTINT (AREF (header, i + 1));
58753d74
KH
868
869 if (NILP (g))
870 {
871 g = LGLYPH_NEW ();
872 LGSTRING_SET_GLYPH (gstring, i, g);
873 }
874 LGLYPH_SET_FROM (g, i);
875 LGLYPH_SET_TO (g, i);
876 LGLYPH_SET_CHAR (g, c);
f5199465 877 if (FONT_OBJECT_P (font_object))
58753d74
KH
878 {
879 font_fill_lglyph_metrics (g, font_object);
880 }
881 else
882 {
883 int width = XFASTINT (CHAR_TABLE_REF (Vchar_width_table, c));
884
885 LGLYPH_SET_CODE (g, c);
886 LGLYPH_SET_LBEARING (g, 0);
887 LGLYPH_SET_RBEARING (g, width);
888 LGLYPH_SET_WIDTH (g, width);
889 LGLYPH_SET_ASCENT (g, 1);
890 LGLYPH_SET_DESCENT (g, 0);
891 }
892 LGLYPH_SET_ADJUSTMENT (g, Qnil);
893 }
894 if (i < LGSTRING_GLYPH_LEN (gstring))
895 LGSTRING_SET_GLYPH (gstring, i, Qnil);
896}
897
58753d74 898
10f72a37
KH
899/* Try to compose the characters at CHARPOS according to composition
900 rule RULE ([PATTERN PREV-CHARS FUNC]). LIMIT limits the characters
901 to compose. STRING, if not nil, is a target string. WIN is a
902 window where the characters are being displayed. If characters are
903 successfully composed, return the composition as a glyph-string
904 object. Otherwise return nil. */
58753d74
KH
905
906static Lisp_Object
971de7fb 907autocmp_chars (Lisp_Object rule, EMACS_INT charpos, EMACS_INT bytepos, EMACS_INT limit, struct window *win, struct face *face, Lisp_Object string)
58753d74
KH
908{
909 int count = SPECPDL_INDEX ();
910 FRAME_PTR f = XFRAME (win->frame);
911 Lisp_Object pos = make_number (charpos);
10f72a37 912 EMACS_INT to;
58753d74 913 EMACS_INT pt = PT, pt_byte = PT_BYTE;
10f72a37 914 Lisp_Object re, font_object, lgstring;
579c18d0 915 EMACS_INT len;
087e2ea9 916
58753d74 917 record_unwind_save_match_data ();
10f72a37
KH
918 re = AREF (rule, 0);
919 if (NILP (re))
920 len = 1;
921 else if (! STRINGP (re))
922 return unbind_to (count, Qnil);
923 else if ((len = fast_looking_at (re, charpos, bytepos, limit, -1, string))
924 > 0)
58753d74 925 {
10f72a37
KH
926 if (NILP (string))
927 len = BYTE_TO_CHAR (bytepos + len) - charpos;
928 else
929 len = string_byte_to_char (string, bytepos + len) - charpos;
930 }
931 if (len <= 0)
932 return unbind_to (count, Qnil);
933 to = limit = charpos + len;
58753d74 934#ifdef HAVE_WINDOW_SYSTEM
10f72a37
KH
935 if (FRAME_WINDOW_P (f))
936 {
937 font_object = font_range (charpos, &to, win, face, string);
938 if (! FONT_OBJECT_P (font_object)
939 || (! NILP (re)
940 && to < limit
941 && (fast_looking_at (re, charpos, bytepos, to, -1, string) <= 0)))
942 return unbind_to (count, Qnil);
943 }
944 else
58753d74 945#endif /* not HAVE_WINDOW_SYSTEM */
10f72a37
KH
946 font_object = win->frame;
947 lgstring = Fcomposition_get_gstring (pos, make_number (to), font_object,
948 string);
949 if (NILP (LGSTRING_ID (lgstring)))
950 {
951 Lisp_Object args[6];
5dcde606 952
10f72a37
KH
953 /* Save point as marker before calling out to lisp. */
954 if (NILP (string))
955 {
956 Lisp_Object m = Fmake_marker ();
957 set_marker_both (m, Qnil, pt, pt_byte);
958 record_unwind_protect (restore_point_unwind, m);
58753d74 959 }
10f72a37
KH
960
961 args[0] = Vauto_composition_function;
962 args[1] = AREF (rule, 2);
963 args[2] = pos;
964 args[3] = make_number (to);
965 args[4] = font_object;
966 args[5] = string;
967 lgstring = safe_call (6, args);
58753d74 968 }
10f72a37 969 return unbind_to (count, lgstring);
58753d74
KH
970}
971
82ebc97b 972static Lisp_Object _work_val;
82ebc97b 973
f6aa6ec6
KH
974/* 1 iff the character C is composable. Characters of general
975 category Z? or C? are not composable except for ZWNJ and ZWJ. */
976
82ebc97b 977#define CHAR_COMPOSABLE_P(C) \
a28d4396
KH
978 ((C) > ' ' \
979 && ((C) == 0x200C || (C) == 0x200D \
980 || (_work_val = CHAR_TABLE_REF (Vunicode_category_table, (C)), \
c805dec0
KH
981 (INTEGERP (_work_val) \
982 && (XINT (_work_val) <= UNICODE_CATEGORY_So)))))
58753d74
KH
983
984/* Update cmp_it->stop_pos to the next position after CHARPOS (and
985 BYTEPOS) where character composition may happen. If BYTEPOS is
82ebc97b
KH
986 negative, compute it. ENDPOS is a limit of searching. If it is
987 less than CHARPOS, search backward to ENDPOS+1 assuming that
988 set_iterator_to_next works in reverse order. In this case, if a
989 composition closest to CHARPOS is found, set cmp_it->stop_pos to
990 the last character of the composition.
991
992 If no composition is found, set cmp_it->ch to -2. If a static
993 composition is found, set cmp_it->ch to -1. Otherwise, set
994 cmp_it->ch to the character that triggers the automatic
995 composition. */
58753d74
KH
996
997void
971de7fb 998composition_compute_stop_pos (struct composition_it *cmp_it, EMACS_INT charpos, EMACS_INT bytepos, EMACS_INT endpos, Lisp_Object string)
58753d74 999{
f8c86b69
PE
1000 EMACS_INT start, end;
1001 int c;
58753d74 1002 Lisp_Object prop, val;
3ffdafce
KH
1003 /* This is from forward_to_next_line_start in xdisp.c. */
1004 const int MAX_NEWLINE_DISTANCE = 500;
58753d74 1005
82ebc97b
KH
1006 if (charpos < endpos)
1007 {
1008 if (endpos > charpos + MAX_NEWLINE_DISTANCE)
1009 endpos = charpos + MAX_NEWLINE_DISTANCE;
1010 }
1011 else if (endpos < charpos)
1012 {
1013 /* We search backward for a position to check composition. */
1014 if (endpos < 0)
1015 {
1016 /* But we don't know where to stop the searching. */
1017 endpos = NILP (string) ? BEGV - 1 : -1;
1018 /* Usually we don't reach ENDPOS because we stop searching
1019 at an uncomposable character (NL, LRE, etc). */
1020 }
1021 }
053ca52b 1022 cmp_it->id = -1;
44566dc7 1023 cmp_it->ch = -2;
82ebc97b
KH
1024 cmp_it->reversed_p = 0;
1025 cmp_it->stop_pos = endpos;
1026 if (charpos == endpos)
1027 return;
1028 /* FIXME: Bidi is not yet handled well in static composition. */
1029 if (charpos < endpos
1030 && find_composition (charpos, endpos, &start, &end, &prop, string)
15fa4783 1031 && start >= charpos
58753d74
KH
1032 && COMPOSITION_VALID_P (start, end, prop))
1033 {
1034 cmp_it->stop_pos = endpos = start;
1035 cmp_it->ch = -1;
1036 }
4b4deea2 1037 if (NILP (BVAR (current_buffer, enable_multibyte_characters))
d9a7c140 1038 || NILP (Vauto_composition_mode))
58753d74
KH
1039 return;
1040 if (bytepos < 0)
1041 {
82ebc97b 1042 if (NILP (string))
58753d74 1043 bytepos = CHAR_TO_BYTE (charpos);
82ebc97b
KH
1044 else
1045 bytepos = string_char_to_byte (string, charpos);
58753d74
KH
1046 }
1047
1048 start = charpos;
82ebc97b 1049 if (charpos < endpos)
58753d74 1050 {
82ebc97b
KH
1051 /* Forward search. */
1052 while (charpos < endpos)
ea8ba975 1053 {
82ebc97b
KH
1054 if (STRINGP (string))
1055 FETCH_STRING_CHAR_ADVANCE (c, string, charpos, bytepos);
1056 else
1057 FETCH_CHAR_ADVANCE (c, charpos, bytepos);
1058 if (c == '\n')
1059 {
1060 cmp_it->ch = -2;
1061 break;
1062 }
1063 val = CHAR_TABLE_REF (Vcomposition_function_table, c);
1064 if (! NILP (val))
1065 {
1066 Lisp_Object elt;
10f72a37 1067 int ridx;
82ebc97b 1068
10f72a37 1069 for (ridx = 0; CONSP (val); val = XCDR (val), ridx++)
82ebc97b
KH
1070 {
1071 elt = XCAR (val);
1072 if (VECTORP (elt) && ASIZE (elt) == 3
1073 && NATNUMP (AREF (elt, 1))
1074 && charpos - 1 - XFASTINT (AREF (elt, 1)) >= start)
1075 break;
1076 }
1077 if (CONSP (val))
1078 {
10f72a37 1079 cmp_it->rule_idx = ridx;
82ebc97b
KH
1080 cmp_it->lookback = XFASTINT (AREF (elt, 1));
1081 cmp_it->stop_pos = charpos - 1 - cmp_it->lookback;
1082 cmp_it->ch = c;
1083 return;
1084 }
1085 }
ea8ba975 1086 }
ff94e32c
KH
1087 if (charpos == endpos)
1088 {
1089 /* We couldn't find a composition point before ENDPOS. But,
1090 some character after ENDPOS may be composed with
1091 characters before ENDPOS. So, we should stop at the safe
1092 point. */
1093 charpos = endpos - MAX_AUTO_COMPOSITION_LOOKBACK;
1094 if (charpos < start)
1095 charpos = start;
1096 }
82ebc97b 1097 }
b7050583 1098 else if (charpos > endpos)
82ebc97b
KH
1099 {
1100 /* Search backward for a pattern that may be composed and the
1101 position of (possibly) the last character of the match is
1102 closest to (but not after) START. The reason for the last
d07f018c
EZ
1103 character is that set_iterator_to_next works in reverse order,
1104 and thus we must stop at the last character for composition
82ebc97b
KH
1105 check. */
1106 unsigned char *p;
1107 int len;
d07f018c
EZ
1108 /* Limit byte position used in fast_looking_at. This is the
1109 byte position of the character after START. */
82ebc97b
KH
1110 EMACS_INT limit;
1111
1112 if (NILP (string))
1113 p = BYTE_POS_ADDR (bytepos);
1114 else
1115 p = SDATA (string) + bytepos;
1116 c = STRING_CHAR_AND_LENGTH (p, len);
1117 limit = bytepos + len;
1118 while (CHAR_COMPOSABLE_P (c))
58753d74 1119 {
10f72a37
KH
1120 val = CHAR_TABLE_REF (Vcomposition_function_table, c);
1121 if (! NILP (val))
82ebc97b 1122 {
10f72a37 1123 Lisp_Object elt;
8f5201ae 1124 int ridx, back, blen;
58753d74 1125
10f72a37 1126 for (ridx = 0; CONSP (val); val = XCDR (val), ridx++)
82ebc97b 1127 {
10f72a37
KH
1128 elt = XCAR (val);
1129 if (VECTORP (elt) && ASIZE (elt) == 3
1130 && NATNUMP (AREF (elt, 1))
1131 && charpos - (back = XFASTINT (AREF (elt, 1))) > endpos)
82ebc97b 1132 {
10f72a37
KH
1133 EMACS_INT cpos = charpos - back, bpos;
1134
1135 if (back == 0)
1136 bpos = bytepos;
82ebc97b 1137 else
10f72a37
KH
1138 bpos = (NILP (string) ? CHAR_TO_BYTE (cpos)
1139 : string_char_to_byte (string, cpos));
1140 if (STRINGP (AREF (elt, 0)))
8f5201ae
PE
1141 blen = fast_looking_at (AREF (elt, 0), cpos, bpos,
1142 start + 1, limit, string);
10f72a37 1143 else
8f5201ae
PE
1144 blen = 1;
1145 if (blen > 0)
82ebc97b 1146 {
10f72a37 1147 /* Make CPOS point to the last character of
8f5201ae
PE
1148 match. Note that BLEN is byte-length. */
1149 if (blen > 1)
10f72a37 1150 {
8f5201ae 1151 bpos += blen;
10f72a37
KH
1152 if (NILP (string))
1153 cpos = BYTE_TO_CHAR (bpos) - 1;
1154 else
1155 cpos = string_byte_to_char (string, bpos) - 1;
1156 }
1157 back = cpos - (charpos - back);
1158 if (cmp_it->stop_pos < cpos
1159 || (cmp_it->stop_pos == cpos
1160 && cmp_it->lookback < back))
1161 {
1162 cmp_it->rule_idx = ridx;
1163 cmp_it->stop_pos = cpos;
1164 cmp_it->ch = c;
1165 cmp_it->lookback = back;
1166 cmp_it->nchars = back + 1;
1167 }
82ebc97b
KH
1168 }
1169 }
1170 }
1171 }
1172 if (charpos - 1 == endpos)
1173 break;
1174 if (STRINGP (string))
58753d74 1175 {
82ebc97b
KH
1176 p--, bytepos--;
1177 while (! CHAR_HEAD_P (*p))
1178 p--, bytepos--;
1179 charpos--;
1180 }
1181 else
1182 {
1183 DEC_BOTH (charpos, bytepos);
1184 p = BYTE_POS_ADDR (bytepos);
58753d74 1185 }
82ebc97b
KH
1186 c = STRING_CHAR (p);
1187 }
1188 if (cmp_it->ch >= 0)
1189 /* We found a position to check. */
1190 return;
1191 /* Skip all uncomposable characters. */
1192 if (NILP (string))
1193 {
1194 while (charpos - 1 > endpos && ! CHAR_COMPOSABLE_P (c))
58753d74 1195 {
82ebc97b
KH
1196 DEC_BOTH (charpos, bytepos);
1197 c = FETCH_MULTIBYTE_CHAR (bytepos);
1198 }
1199 }
1200 else
1201 {
1202 while (charpos - 1 > endpos && ! CHAR_COMPOSABLE_P (c))
1203 {
1204 p--;
1205 while (! CHAR_HEAD_P (*p))
1206 p--;
1207 charpos--;
1208 c = STRING_CHAR (p);
58753d74
KH
1209 }
1210 }
1211 }
44566dc7 1212 cmp_it->stop_pos = charpos;
58753d74
KH
1213}
1214
1215/* Check if the character at CHARPOS (and BYTEPOS) is composed
22e33406 1216 (possibly with the following characters) on window W. ENDPOS limits
58753d74
KH
1217 characters to be composed. FACE, in non-NULL, is a base face of
1218 the character. If STRING is not nil, it is a string containing the
1219 character to check, and CHARPOS and BYTEPOS are indices in the
1220 string. In that case, FACE must not be NULL.
1221
1222 If the character is composed, setup members of CMP_IT (id, nglyphs,
82ebc97b
KH
1223 from, to, reversed_p), and return 1. Otherwise, update
1224 CMP_IT->stop_pos, and return 0. */
58753d74
KH
1225
1226int
971de7fb 1227composition_reseat_it (struct composition_it *cmp_it, EMACS_INT charpos, EMACS_INT bytepos, EMACS_INT endpos, struct window *w, struct face *face, Lisp_Object string)
58753d74 1228{
f6aa6ec6
KH
1229 if (endpos < 0)
1230 endpos = NILP (string) ? BEGV : 0;
e614ea00 1231
3ffdafce
KH
1232 if (cmp_it->ch == -2)
1233 {
1234 composition_compute_stop_pos (cmp_it, charpos, bytepos, endpos, string);
10f72a37 1235 if (cmp_it->ch == -2 || cmp_it->stop_pos != charpos)
82ebc97b 1236 /* The current position is not composed. */
3ffdafce
KH
1237 return 0;
1238 }
1239
58753d74
KH
1240 if (cmp_it->ch < 0)
1241 {
1242 /* We are looking at a static composition. */
1243 EMACS_INT start, end;
1244 Lisp_Object prop;
1245
1246 find_composition (charpos, -1, &start, &end, &prop, string);
1247 cmp_it->id = get_composition_id (charpos, bytepos, end - start,
1248 prop, string);
1249 if (cmp_it->id < 0)
1250 goto no_composition;
1251 cmp_it->nchars = end - start;
1252 cmp_it->nglyphs = composition_table[cmp_it->id]->glyph_len;
1253 }
29fb7306 1254 else if (w)
58753d74 1255 {
10f72a37 1256 Lisp_Object lgstring = Qnil;
b246f932 1257 Lisp_Object val, elt;
5eb55db9 1258 EMACS_INT i;
58753d74
KH
1259
1260 val = CHAR_TABLE_REF (Vcomposition_function_table, cmp_it->ch);
10f72a37 1261 for (i = 0; i < cmp_it->rule_idx; i++, val = XCDR (val));
82ebc97b 1262 if (charpos < endpos)
90b3fe91 1263 {
82ebc97b
KH
1264 for (; CONSP (val); val = XCDR (val))
1265 {
1266 elt = XCAR (val);
10f72a37
KH
1267 if (! VECTORP (elt) || ASIZE (elt) != 3
1268 || ! INTEGERP (AREF (elt, 1)))
1269 continue;
1270 if (XFASTINT (AREF (elt, 1)) != cmp_it->lookback)
aa3830c4 1271 goto no_composition;
10f72a37
KH
1272 lgstring = autocmp_chars (elt, charpos, bytepos, endpos,
1273 w, face, string);
1274 if (composition_gstring_p (lgstring))
82ebc97b 1275 break;
10f72a37
KH
1276 lgstring = Qnil;
1277 /* Composition failed perhaps because the font doesn't
1278 support sufficient range of characters. Try the
1279 other composition rules if any. */
82ebc97b 1280 }
82ebc97b 1281 cmp_it->reversed_p = 0;
90b3fe91 1282 }
82ebc97b
KH
1283 else
1284 {
10f72a37 1285 EMACS_INT cpos = charpos, bpos = bytepos;
90b3fe91 1286
10f72a37 1287 while (1)
82ebc97b 1288 {
10f72a37
KH
1289 elt = XCAR (val);
1290 if (cmp_it->lookback > 0)
1291 {
f6aa6ec6 1292 cpos = charpos - cmp_it->lookback;
10f72a37
KH
1293 if (STRINGP (string))
1294 bpos = string_char_to_byte (string, cpos);
1295 else
1296 bpos = CHAR_TO_BYTE (cpos);
1297 }
1298 lgstring = autocmp_chars (elt, cpos, bpos, charpos + 1, w, face,
1299 string);
1300 if (composition_gstring_p (lgstring)
1301 && cpos + LGSTRING_CHAR_LEN (lgstring) - 1 == charpos)
1302 break;
1303 /* Composition failed or didn't cover the current
1304 character. */
1305 if (cmp_it->lookback == 0)
82ebc97b 1306 goto no_composition;
10f72a37
KH
1307 lgstring = Qnil;
1308 /* Try to find a shorter compostion that starts after CPOS. */
1309 composition_compute_stop_pos (cmp_it, charpos, bytepos, cpos,
1310 string);
1311 if (cmp_it->ch == -2 || cmp_it->stop_pos < charpos)
1312 goto no_composition;
1313 val = CHAR_TABLE_REF (Vcomposition_function_table, cmp_it->ch);
1314 for (i = 0; i < cmp_it->rule_idx; i++, val = XCDR (val));
82ebc97b
KH
1315 }
1316 cmp_it->reversed_p = 1;
1317 }
10f72a37
KH
1318 if (NILP (lgstring))
1319 goto no_composition;
1320 if (NILP (LGSTRING_ID (lgstring)))
1321 lgstring = composition_gstring_put_cache (lgstring, -1);
1322 cmp_it->id = XINT (LGSTRING_ID (lgstring));
1323 for (i = 0; i < LGSTRING_GLYPH_LEN (lgstring); i++)
1324 if (NILP (LGSTRING_GLYPH (lgstring, i)))
58753d74
KH
1325 break;
1326 cmp_it->nglyphs = i;
82ebc97b
KH
1327 cmp_it->from = 0;
1328 cmp_it->to = i;
58753d74 1329 }
29fb7306
KH
1330 else
1331 goto no_composition;
58753d74
KH
1332 return 1;
1333
1334 no_composition:
82ebc97b
KH
1335 if (charpos == endpos)
1336 return 0;
1337 if (charpos < endpos)
1338 {
1339 charpos++;
10f72a37 1340 if (NILP (string))
82ebc97b 1341 INC_POS (bytepos);
10f72a37 1342 else
aa3830c4 1343 bytepos += BYTES_BY_CHAR_HEAD (*(SDATA (string) + bytepos));
82ebc97b 1344 }
58753d74 1345 else
82ebc97b
KH
1346 {
1347 charpos--;
1348 /* BYTEPOS is calculated in composition_compute_stop_pos */
1349 bytepos = -1;
1350 }
58753d74
KH
1351 composition_compute_stop_pos (cmp_it, charpos, bytepos, endpos, string);
1352 return 0;
1353}
1354
10f72a37
KH
1355/* Update charpos, nchars, nbytes, and width of the current grapheme
1356 cluster.
1357
1358 If the composition is static or automatic in L2R context, the
1359 cluster is identified by CMP_IT->from, and CHARPOS is the position
1360 of the first character of the cluster. In this case, update
1361 CMP_IT->to too.
1362
1363 If the composition is automatic in R2L context, the cluster is
1364 identified by CMP_IT->to, and CHARPOS is the position of the last
1365 character of the cluster. In this case, update CMP_IT->from too.
1366
1367 The return value is the character code of the first character of
1368 the cluster, or -1 if the composition is somehow broken. */
82ebc97b 1369
58753d74 1370int
971de7fb 1371composition_update_it (struct composition_it *cmp_it, EMACS_INT charpos, EMACS_INT bytepos, Lisp_Object string)
58753d74 1372{
80e079b2 1373 int i, c IF_LINT (= 0);
58753d74
KH
1374
1375 if (cmp_it->ch < 0)
1376 {
10f72a37 1377 /* static composition */
58753d74
KH
1378 struct composition *cmp = composition_table[cmp_it->id];
1379
10f72a37 1380 cmp_it->charpos = charpos;
58753d74
KH
1381 cmp_it->to = cmp_it->nglyphs;
1382 if (cmp_it->nglyphs == 0)
1383 c = -1;
1384 else
1385 {
1386 for (i = 0; i < cmp->glyph_len; i++)
1387 if ((c = COMPOSITION_GLYPH (cmp, i)) != '\t')
1388 break;
1389 if (c == '\t')
1390 c = ' ';
1391 }
1392 cmp_it->width = cmp->width;
10f72a37
KH
1393 charpos += cmp_it->nchars;
1394 if (STRINGP (string))
1395 cmp_it->nbytes = string_char_to_byte (string, charpos) - bytepos;
1396 else
1397 cmp_it->nbytes = CHAR_TO_BYTE (charpos) - bytepos;
58753d74
KH
1398 }
1399 else
1400 {
10f72a37 1401 /* automatic composition */
58753d74 1402 Lisp_Object gstring = composition_gstring_from_id (cmp_it->id);
10f72a37 1403 Lisp_Object glyph;
579c18d0 1404 EMACS_INT from;
58753d74
KH
1405
1406 if (cmp_it->nglyphs == 0)
1407 {
58753d74
KH
1408 cmp_it->nchars = LGSTRING_CHAR_LEN (gstring);
1409 cmp_it->width = 0;
10f72a37
KH
1410 cmp_it->from = cmp_it->to = 0;
1411 return -1;
58753d74 1412 }
10f72a37 1413 if (! cmp_it->reversed_p)
58753d74 1414 {
10f72a37
KH
1415 glyph = LGSTRING_GLYPH (gstring, cmp_it->from);
1416 from = LGLYPH_FROM (glyph);
58753d74
KH
1417 for (cmp_it->to = cmp_it->from + 1; cmp_it->to < cmp_it->nglyphs;
1418 cmp_it->to++)
1419 {
1420 glyph = LGSTRING_GLYPH (gstring, cmp_it->to);
1421 if (LGLYPH_FROM (glyph) != from)
1422 break;
58753d74 1423 }
10f72a37 1424 cmp_it->charpos = charpos;
58753d74 1425 }
82ebc97b
KH
1426 else
1427 {
10f72a37
KH
1428 glyph = LGSTRING_GLYPH (gstring, cmp_it->to - 1);
1429 from = LGLYPH_FROM (glyph);
1430 cmp_it->charpos = charpos - (LGLYPH_TO (glyph) - from);
1431 for (cmp_it->from = cmp_it->to - 1; cmp_it->from > 0;
1432 cmp_it->from--)
82ebc97b 1433 {
10f72a37 1434 glyph = LGSTRING_GLYPH (gstring, cmp_it->from - 1);
82ebc97b
KH
1435 if (LGLYPH_FROM (glyph) != from)
1436 break;
82ebc97b 1437 }
10f72a37
KH
1438 }
1439 glyph = LGSTRING_GLYPH (gstring, cmp_it->from);
1440 cmp_it->nchars = LGLYPH_TO (glyph) + 1 - from;
1441 cmp_it->nbytes = 0;
1442 cmp_it->width = 0;
1443 for (i = cmp_it->nchars - 1; i >= 0; i--)
1444 {
1445 c = XINT (LGSTRING_CHAR (gstring, i));
1446 cmp_it->nbytes += CHAR_BYTES (c);
63257f6c 1447 cmp_it->width += CHAR_WIDTH (c);
82ebc97b 1448 }
58753d74 1449 }
58753d74
KH
1450 return c;
1451}
1452
1453
90b3fe91
KH
1454struct position_record
1455{
1456 EMACS_INT pos, pos_byte;
1457 unsigned char *p;
1458};
1459
763d7377 1460/* Update the members of POSITION to the next character boundary. */
90b3fe91
KH
1461#define FORWARD_CHAR(POSITION, STOP) \
1462 do { \
90b3fe91 1463 (POSITION).pos++; \
900c4486
KH
1464 if ((POSITION).pos == (STOP)) \
1465 { \
1466 (POSITION).p = GAP_END_ADDR; \
1467 (POSITION).pos_byte = GPT_BYTE; \
1468 } \
1469 else \
1470 { \
900c4486 1471 (POSITION).pos_byte += BYTES_BY_CHAR_HEAD (*((POSITION).p)); \
d45a49e3 1472 (POSITION).p += BYTES_BY_CHAR_HEAD (*((POSITION).p)); \
900c4486 1473 } \
90b3fe91
KH
1474 } while (0)
1475
763d7377 1476/* Update the members of POSITION to the previous character boundary. */
90b3fe91
KH
1477#define BACKWARD_CHAR(POSITION, STOP) \
1478 do { \
a28d4396 1479 if ((POSITION).pos == (STOP)) \
90b3fe91
KH
1480 (POSITION).p = GPT_ADDR; \
1481 do { \
1482 (POSITION).pos_byte--; \
1483 (POSITION).p--; \
1484 } while (! CHAR_HEAD_P (*((POSITION).p))); \
1485 (POSITION).pos--; \
1486 } while (0)
1487
90b3fe91 1488/* This is like find_composition, but find an automatic composition
a28d4396
KH
1489 instead. It is assured that POS is not within a static
1490 composition. If found, set *GSTRING to the glyph-string
1491 representing the composition, and return 1. Otherwise, *GSTRING to
1492 Qnil, and return 0. */
90b3fe91
KH
1493
1494static int
a28d4396
KH
1495find_automatic_composition (EMACS_INT pos, EMACS_INT limit,
1496 EMACS_INT *start, EMACS_INT *end,
1497 Lisp_Object *gstring, Lisp_Object string)
90b3fe91
KH
1498{
1499 EMACS_INT head, tail, stop;
a28d4396
KH
1500 /* Forward limit position of checking a composition taking a
1501 looking-back count into account. */
895416e3 1502 EMACS_INT fore_check_limit;
a28d4396 1503 struct position_record cur, prev;
90b3fe91 1504 int c;
29fb7306 1505 Lisp_Object window;
90b3fe91 1506 struct window *w;
a28d4396 1507 int need_adjustment = 0;
90b3fe91 1508
3eda4b19 1509 window = Fget_buffer_window (Fcurrent_buffer (), Qnil);
29fb7306
KH
1510 if (NILP (window))
1511 return 0;
1512 w = XWINDOW (window);
1513
a28d4396 1514 cur.pos = pos;
90b3fe91
KH
1515 if (NILP (string))
1516 {
1517 head = BEGV, tail = ZV, stop = GPT;
a28d4396
KH
1518 cur.pos_byte = CHAR_TO_BYTE (cur.pos);
1519 cur.p = BYTE_POS_ADDR (cur.pos_byte);
90b3fe91
KH
1520 }
1521 else
1522 {
1523 head = 0, tail = SCHARS (string), stop = -1;
a28d4396
KH
1524 cur.pos_byte = string_char_to_byte (string, cur.pos);
1525 cur.p = SDATA (string) + cur.pos_byte;
90b3fe91 1526 }
a28d4396
KH
1527 if (limit < 0)
1528 /* Finding a composition covering the character after POS is the
1529 same as setting LIMIT to POS. */
1530 limit = pos;
1531 if (limit <= pos)
1532 fore_check_limit = min (tail, pos + 1 + MAX_AUTO_COMPOSITION_LOOKBACK);
90b3fe91 1533 else
895416e3 1534 fore_check_limit = min (tail, limit + MAX_AUTO_COMPOSITION_LOOKBACK);
90b3fe91 1535
a28d4396 1536 /* Provided that we have these possible compositions now:
895416e3 1537
a28d4396
KH
1538 POS: 1 2 3 4 5 6 7 8 9
1539 |-A-|
1540 |-B-|-C-|--D--|
895416e3 1541
a28d4396
KH
1542 Here, it is known that characters after positions 1 and 9 can
1543 never be composed (i.e. ! CHAR_COMPOSABLE_P (CH)), and
1544 composition A is an invalid one because it's partially covered by
1545 the valid composition C. And to know whether a composition is
1546 valid or not, the only way is to start searching forward from a
1547 position that can not be a tail part of composition (it's 2 in
1548 the above case).
1549
1550 Now we have these cases (1 through 4):
1551
1552 -- character after POS is ... --
1553 not composable composable
1554 LIMIT <= POS (1) (3)
1555 POS < LIMIT (2) (4)
1556
1557 Among them, in case (2), we simply search forward from POS.
1558
1559 In the other cases, we at first rewind back to the position where
1560 the previous character is not composable or the beginning of
1561 buffer (string), then search compositions forward. In case (1)
1562 and (3) we repeat this process until a composition is found. */
1563
1564 while (1)
1565 {
62a6e103 1566 c = STRING_CHAR (cur.p);
90b3fe91 1567 if (! CHAR_COMPOSABLE_P (c))
90b3fe91 1568 {
a28d4396
KH
1569 if (limit <= pos) /* case (1) */
1570 {
1571 do {
31bfc35c 1572 if (cur.pos <= limit)
a28d4396
KH
1573 return 0;
1574 BACKWARD_CHAR (cur, stop);
1575 c = STRING_CHAR (cur.p);
1576 } while (! CHAR_COMPOSABLE_P (c));
1577 fore_check_limit = cur.pos + 1;
1578 }
1579 else /* case (2) */
1580 /* No need of rewinding back. */
1581 goto search_forward;
1582 }
90b3fe91 1583
a28d4396
KH
1584 /* Rewind back to the position where we can safely search
1585 forward for compositions. It is assured that the character
1586 at cur.pos is composable. */
1587 while (head < cur.pos)
1588 {
1589 prev = cur;
1590 BACKWARD_CHAR (cur, stop);
1591 c = STRING_CHAR (cur.p);
1592 if (! CHAR_COMPOSABLE_P (c))
90b3fe91 1593 {
a28d4396
KH
1594 cur = prev;
1595 break;
90b3fe91 1596 }
a28d4396
KH
1597 }
1598
1599 search_forward:
1600 /* Now search forward. */
1601 *gstring = Qnil;
1602 prev = cur; /* remember the start of searching position. */
1603 while (cur.pos < fore_check_limit)
1604 {
1605 Lisp_Object val;
1606
1607 c = STRING_CHAR (cur.p);
1608 for (val = CHAR_TABLE_REF (Vcomposition_function_table, c);
1609 CONSP (val); val = XCDR (val))
90b3fe91 1610 {
a28d4396
KH
1611 Lisp_Object elt = XCAR (val);
1612
1613 if (VECTORP (elt) && ASIZE (elt) == 3 && NATNUMP (AREF (elt, 1)))
90b3fe91 1614 {
a28d4396
KH
1615 EMACS_INT check_pos = cur.pos - XFASTINT (AREF (elt, 1));
1616 struct position_record check;
1617
1618 if (check_pos < head
1619 || (limit <= pos ? pos < check_pos
1620 : limit <= check_pos))
1621 continue;
1622 for (check = cur; check_pos < check.pos; )
1623 BACKWARD_CHAR (check, stop);
1624 *gstring = autocmp_chars (elt, check.pos, check.pos_byte,
1625 tail, w, NULL, string);
90b3fe91 1626 need_adjustment = 1;
a28d4396 1627 if (NILP (*gstring))
90b3fe91 1628 {
a28d4396
KH
1629 /* As we have called Lisp, there's a possibility
1630 that buffer/string is relocated. */
1631 if (NILP (string))
1632 cur.p = BYTE_POS_ADDR (cur.pos_byte);
1633 else
1634 cur.p = SDATA (string) + cur.pos_byte;
1635 }
1636 else
1637 {
1638 /* We found a candidate of a target composition. */
90b3fe91
KH
1639 *start = check.pos;
1640 *end = check.pos + LGSTRING_CHAR_LEN (*gstring);
a28d4396
KH
1641 if (pos < limit
1642 ? pos < *end
1643 : *start <= pos && pos < *end)
1644 /* This is the target composition. */
90b3fe91
KH
1645 return 1;
1646 cur.pos = *end;
a28d4396
KH
1647 if (NILP (string))
1648 {
1649 cur.pos_byte = CHAR_TO_BYTE (cur.pos);
1650 cur.p = BYTE_POS_ADDR (cur.pos_byte);
1651 }
1652 else
1653 {
1654 cur.pos_byte = string_char_to_byte (string, cur.pos);
1655 cur.p = SDATA (string) + cur.pos_byte;
1656 }
90b3fe91
KH
1657 break;
1658 }
1659 }
1660 }
a28d4396
KH
1661 if (! CONSP (val))
1662 /* We found no composition here. */
90b3fe91 1663 FORWARD_CHAR (cur, stop);
90b3fe91 1664 }
a28d4396
KH
1665
1666 if (pos < limit) /* case (2) and (4)*/
1667 return 0;
1668 if (! NILP (*gstring))
1669 return 1;
1670 if (prev.pos == head)
1671 return 0;
90b3fe91 1672 cur = prev;
a28d4396
KH
1673 if (need_adjustment)
1674 {
1675 if (NILP (string))
1676 cur.p = BYTE_POS_ADDR (cur.pos_byte);
1677 else
1678 cur.p = SDATA (string) + cur.pos_byte;
1679 }
90b3fe91 1680 BACKWARD_CHAR (cur, stop);
90b3fe91 1681 }
90b3fe91
KH
1682}
1683
e614ea00
KH
1684/* Return the adjusted point provided that point is moved from LAST_PT
1685 to NEW_PT. */
1686
41118bd3 1687EMACS_INT
971de7fb 1688composition_adjust_point (EMACS_INT last_pt, EMACS_INT new_pt)
58753d74 1689{
5eb55db9 1690 EMACS_INT i, beg, end;
90b3fe91 1691 Lisp_Object val;
58753d74 1692
e614ea00
KH
1693 if (new_pt == BEGV || new_pt == ZV)
1694 return new_pt;
58753d74 1695
90b3fe91 1696 /* At first check the static composition. */
e614ea00 1697 if (get_property_and_range (new_pt, Qcomposition, &val, &beg, &end, Qnil)
895416e3
KH
1698 && COMPOSITION_VALID_P (beg, end, val))
1699 {
e614ea00 1700 if (beg < new_pt /* && end > new_pt <- It's always the case. */
895416e3 1701 && (last_pt <= beg || last_pt >= end))
e614ea00
KH
1702 return (new_pt < last_pt ? beg : end);
1703 return new_pt;
895416e3 1704 }
58753d74 1705
4b4deea2 1706 if (NILP (BVAR (current_buffer, enable_multibyte_characters))
d9a7c140 1707 || NILP (Vauto_composition_mode))
e614ea00 1708 return new_pt;
58753d74 1709
90b3fe91 1710 /* Next check the automatic composition. */
e614ea00
KH
1711 if (! find_automatic_composition (new_pt, (EMACS_INT) -1, &beg, &end, &val,
1712 Qnil)
1713 || beg == new_pt)
1714 return new_pt;
90b3fe91 1715 for (i = 0; i < LGSTRING_GLYPH_LEN (val); i++)
58753d74 1716 {
90b3fe91 1717 Lisp_Object glyph = LGSTRING_GLYPH (val, i);
58753d74 1718
90b3fe91
KH
1719 if (NILP (glyph))
1720 break;
e614ea00
KH
1721 if (beg + LGLYPH_FROM (glyph) == new_pt)
1722 return new_pt;
1723 if (beg + LGLYPH_TO (glyph) >= new_pt)
1724 return (new_pt < last_pt
90b3fe91
KH
1725 ? beg + LGLYPH_FROM (glyph)
1726 : beg + LGLYPH_TO (glyph) + 1);
58753d74 1727 }
e614ea00 1728 return new_pt;
58753d74
KH
1729}
1730
1731DEFUN ("composition-get-gstring", Fcomposition_get_gstring,
1732 Scomposition_get_gstring, 4, 4, 0,
1733 doc: /* Return a glyph-string for characters between FROM and TO.
9d751859 1734If the glyph string is for graphic display, FONT-OBJECT must be
58753d74 1735a font-object to use for those characters.
f5199465
KH
1736Otherwise (for terminal display), FONT-OBJECT must be a terminal ID, a
1737frame, or nil for the selected frame's terminal device.
58753d74
KH
1738
1739If the optional 4th argument STRING is not nil, it is a string
1740containing the target characters between indices FROM and TO.
1741
9d751859
EZ
1742A glyph-string is a vector containing information about how to display
1743a specific character sequence. The format is:
58753d74
KH
1744 [HEADER ID GLYPH ...]
1745
1746HEADER is a vector of this form:
1747 [FONT-OBJECT CHAR ...]
1748where
1749 FONT-OBJECT is a font-object for all glyphs in the glyph-string,
f5199465 1750 or the terminal coding system of the specified terminal.
58753d74
KH
1751 CHARs are characters to be composed by GLYPHs.
1752
1753ID is an identification number of the glyph-string. It may be nil if
1754not yet shaped.
1755
9d751859 1756GLYPH is a vector whose elements have this form:
58753d74
KH
1757 [ FROM-IDX TO-IDX C CODE WIDTH LBEARING RBEARING ASCENT DESCENT
1758 [ [X-OFF Y-OFF WADJUST] | nil] ]
1759where
1760 FROM-IDX and TO-IDX are used internally and should not be touched.
1761 C is the character of the glyph.
1762 CODE is the glyph-code of C in FONT-OBJECT.
1763 WIDTH thru DESCENT are the metrics (in pixels) of the glyph.
9d751859 1764 X-OFF and Y-OFF are offsets to the base position for the glyph.
58753d74
KH
1765 WADJUST is the adjustment to the normal width of the glyph.
1766
9d751859
EZ
1767If GLYPH is nil, the remaining elements of the glyph-string vector
1768should be ignored. */)
5842a27b 1769 (Lisp_Object from, Lisp_Object to, Lisp_Object font_object, Lisp_Object string)
58753d74
KH
1770{
1771 Lisp_Object gstring, header;
46f905e1 1772 EMACS_INT frompos, topos;
58753d74 1773
ea8ba975
KH
1774 CHECK_NATNUM (from);
1775 CHECK_NATNUM (to);
f5199465
KH
1776 if (! FONT_OBJECT_P (font_object))
1777 {
1778 struct coding_system *coding;
1779 struct terminal *terminal = get_terminal (font_object, 1);
1780
1781 coding = ((TERMINAL_TERMINAL_CODING (terminal)->common_flags
1782 & CODING_REQUIRE_ENCODING_MASK)
1783 ? TERMINAL_TERMINAL_CODING (terminal) : &safe_terminal_coding);
1784 font_object = CODING_ID_NAME (coding->id);
1785 }
1786
58753d74
KH
1787 header = fill_gstring_header (Qnil, from, to, font_object, string);
1788 gstring = gstring_lookup_cache (header);
1789 if (! NILP (gstring))
1790 return gstring;
46f905e1 1791
ea8ba975
KH
1792 frompos = XINT (from);
1793 topos = XINT (to);
46f905e1
SM
1794 if (LGSTRING_GLYPH_LEN (gstring_work) < topos - frompos)
1795 gstring_work = Fmake_vector (make_number (topos - frompos + 2), Qnil);
58753d74
KH
1796 LGSTRING_SET_HEADER (gstring_work, header);
1797 LGSTRING_SET_ID (gstring_work, Qnil);
1798 fill_gstring_body (gstring_work);
1799 return gstring_work;
1800}
1801
ca4c9455
KH
1802\f
1803/* Emacs Lisp APIs. */
1804
1805DEFUN ("compose-region-internal", Fcompose_region_internal,
1806 Scompose_region_internal, 2, 4, 0,
335c5470
PJ
1807 doc: /* Internal use only.
1808
1809Compose text in the region between START and END.
1810Optional 3rd and 4th arguments are COMPONENTS and MODIFICATION-FUNC
9d751859 1811for the composition. See `compose-region' for more details. */)
5842a27b 1812 (Lisp_Object start, Lisp_Object end, Lisp_Object components, Lisp_Object modification_func)
ca4c9455
KH
1813{
1814 validate_region (&start, &end);
1815 if (!NILP (components)
1816 && !INTEGERP (components)
1817 && !CONSP (components)
1818 && !STRINGP (components))
b7826503 1819 CHECK_VECTOR (components);
ca4c9455 1820
d562f8ab 1821 compose_text (XINT (start), XINT (end), components, modification_func, Qnil);
ca4c9455
KH
1822 return Qnil;
1823}
1824
1825DEFUN ("compose-string-internal", Fcompose_string_internal,
1826 Scompose_string_internal, 3, 5, 0,
335c5470
PJ
1827 doc: /* Internal use only.
1828
1829Compose text between indices START and END of STRING.
1830Optional 4th and 5th arguments are COMPONENTS and MODIFICATION-FUNC
9d751859 1831for the composition. See `compose-string' for more details. */)
5842a27b 1832 (Lisp_Object string, Lisp_Object start, Lisp_Object end, Lisp_Object components, Lisp_Object modification_func)
ca4c9455 1833{
b7826503
PJ
1834 CHECK_STRING (string);
1835 CHECK_NUMBER (start);
1836 CHECK_NUMBER (end);
ca4c9455
KH
1837
1838 if (XINT (start) < 0 ||
1839 XINT (start) > XINT (end)
d5db4077 1840 || XINT (end) > SCHARS (string))
ca4c9455
KH
1841 args_out_of_range (start, end);
1842
d562f8ab 1843 compose_text (XINT (start), XINT (end), components, modification_func, string);
ca4c9455
KH
1844 return string;
1845}
1846
1847DEFUN ("find-composition-internal", Ffind_composition_internal,
177c0ea7 1848 Sfind_composition_internal, 4, 4, 0,
335c5470
PJ
1849 doc: /* Internal use only.
1850
1851Return information about composition at or nearest to position POS.
9d751859 1852See `find-composition' for more details. */)
5842a27b 1853 (Lisp_Object pos, Lisp_Object limit, Lisp_Object string, Lisp_Object detail_p)
ca4c9455 1854{
90b3fe91
KH
1855 Lisp_Object prop, tail, gstring;
1856 EMACS_INT start, end, from, to;
ca4c9455
KH
1857 int id;
1858
b7826503 1859 CHECK_NUMBER_COERCE_MARKER (pos);
90b3fe91 1860 from = XINT (pos);
ca4c9455
KH
1861 if (!NILP (limit))
1862 {
b7826503 1863 CHECK_NUMBER_COERCE_MARKER (limit);
90b3fe91 1864 to = XINT (limit);
ca4c9455
KH
1865 }
1866 else
90b3fe91 1867 to = -1;
177c0ea7 1868
ca4c9455 1869 if (!NILP (string))
e3b3e327 1870 {
b7826503 1871 CHECK_STRING (string);
d5db4077 1872 if (XINT (pos) < 0 || XINT (pos) > SCHARS (string))
e3b3e327
GM
1873 args_out_of_range (string, pos);
1874 }
1875 else
1876 {
fa9090b8 1877 if (XINT (pos) < BEGV || XINT (pos) > ZV)
e3b3e327
GM
1878 args_out_of_range (Fcurrent_buffer (), pos);
1879 }
ca4c9455 1880
90b3fe91
KH
1881 if (!find_composition (from, to, &start, &end, &prop, string))
1882 {
4b4deea2 1883 if (!NILP (BVAR (current_buffer, enable_multibyte_characters))
d9a7c140 1884 && ! NILP (Vauto_composition_mode)
90b3fe91
KH
1885 && find_automatic_composition (from, to, &start, &end, &gstring,
1886 string))
1887 return list3 (make_number (start), make_number (end), gstring);
1888 return Qnil;
1889 }
1890 if ((end <= XINT (pos) || start > XINT (pos)))
1891 {
1892 EMACS_INT s, e;
1893
1894 if (find_automatic_composition (from, to, &s, &e, &gstring, string)
1895 && (e <= XINT (pos) ? e > end : s < start))
fcebfc6a 1896 return list3 (make_number (s), make_number (e), gstring);
90b3fe91 1897 }
ca4c9455
KH
1898 if (!COMPOSITION_VALID_P (start, end, prop))
1899 return Fcons (make_number (start), Fcons (make_number (end),
1900 Fcons (Qnil, Qnil)));
1901 if (NILP (detail_p))
1902 return Fcons (make_number (start), Fcons (make_number (end),
1903 Fcons (Qt, Qnil)));
1904
1905 if (COMPOSITION_REGISTERD_P (prop))
1906 id = COMPOSITION_ID (prop);
1907 else
1908 {
579c18d0
EZ
1909 EMACS_INT start_byte = (NILP (string)
1910 ? CHAR_TO_BYTE (start)
1911 : string_char_to_byte (string, start));
ca4c9455
KH
1912 id = get_composition_id (start, start_byte, end - start, prop, string);
1913 }
1914
1915 if (id >= 0)
1916 {
1917 Lisp_Object components, relative_p, mod_func;
1918 enum composition_method method = COMPOSITION_METHOD (prop);
1919 int width = composition_table[id]->width;
1920
1921 components = Fcopy_sequence (COMPOSITION_COMPONENTS (prop));
1922 relative_p = (method == COMPOSITION_WITH_RULE_ALTCHARS
1923 ? Qnil : Qt);
1924 mod_func = COMPOSITION_MODIFICATION_FUNC (prop);
1925 tail = Fcons (components,
1926 Fcons (relative_p,
1927 Fcons (mod_func,
1928 Fcons (make_number (width), Qnil))));
1929 }
1930 else
1931 tail = Qnil;
1932
1933 return Fcons (make_number (start), Fcons (make_number (end), tail));
1934}
1935
1936\f
1937void
971de7fb 1938syms_of_composite (void)
ca4c9455 1939{
58753d74
KH
1940 int i;
1941
cd3520a4 1942 DEFSYM (Qcomposition, "composition");
ca4c9455 1943
58753d74 1944 /* Make a hash table for static composition. */
ca4c9455 1945 {
09654086 1946 Lisp_Object args[6];
177c0ea7 1947
ca4c9455
KH
1948 args[0] = QCtest;
1949 args[1] = Qequal;
1950 args[2] = QCweakness;
dc47eccc 1951 /* We used to make the hash table weak so that unreferenced
ca101cff 1952 compositions can be garbage-collected. But, usually once
dc47eccc
KH
1953 created compositions are repeatedly used in an Emacs session,
1954 and thus it's not worth to save memory in such a way. So, we
1955 make the table not weak. */
6a83ee8a 1956 args[3] = Qnil;
ca4c9455
KH
1957 args[4] = QCsize;
1958 args[5] = make_number (311);
09654086 1959 composition_hash_table = Fmake_hash_table (6, args);
ca4c9455
KH
1960 staticpro (&composition_hash_table);
1961 }
1962
58753d74
KH
1963 /* Make a hash table for glyph-string. */
1964 {
1965 Lisp_Object args[6];
58753d74
KH
1966 args[0] = QCtest;
1967 args[1] = Qequal;
1968 args[2] = QCweakness;
1969 args[3] = Qnil;
1970 args[4] = QCsize;
1971 args[5] = make_number (311);
1972 gstring_hash_table = Fmake_hash_table (6, args);
1973 staticpro (&gstring_hash_table);
1974 }
1975
1976 staticpro (&gstring_work_headers);
1977 gstring_work_headers = Fmake_vector (make_number (8), Qnil);
1978 for (i = 0; i < 8; i++)
1979 ASET (gstring_work_headers, i, Fmake_vector (make_number (i + 2), Qnil));
1980 staticpro (&gstring_work);
1981 gstring_work = Fmake_vector (make_number (10), Qnil);
1982
ca4c9455
KH
1983 /* Text property `composition' should be nonsticky by default. */
1984 Vtext_property_default_nonsticky
1985 = Fcons (Fcons (Qcomposition, Qt), Vtext_property_default_nonsticky);
1986
29208e82 1987 DEFVAR_LISP ("compose-chars-after-function", Vcompose_chars_after_function,
335c5470
PJ
1988 doc: /* Function to adjust composition of buffer text.
1989
9d751859
EZ
1990This function is called with three arguments: FROM, TO, and OBJECT.
1991FROM and TO specify the range of text whose composition should be
335c5470
PJ
1992adjusted. OBJECT, if non-nil, is a string that contains the text.
1993
1994This function is called after a text with `composition' property is
1995inserted or deleted to keep `composition' property of buffer text
1996valid.
1997
1998The default value is the function `compose-chars-after'. */);
d67b4f80 1999 Vcompose_chars_after_function = intern_c_string ("compose-chars-after");
ca4c9455 2000
cd3520a4
JB
2001 DEFSYM (Qauto_composed, "auto-composed");
2002 DEFSYM (Qauto_composition_function, "auto-composition-function");
40add26d 2003
29208e82 2004 DEFVAR_LISP ("auto-composition-mode", Vauto_composition_mode,
d9a7c140
KH
2005 doc: /* Non-nil if Auto-Composition mode is enabled.
2006Use the command `auto-composition-mode' to change this variable. */);
2007 Vauto_composition_mode = Qt;
2008
29208e82 2009 DEFVAR_LISP ("auto-composition-function", Vauto_composition_function,
f96ba4c1 2010 doc: /* Function to call to compose characters automatically.
9d751859 2011This function is called from the display routine with four arguments:
ddc872ba 2012FROM, TO, WINDOW, and STRING.
335c5470 2013
ddc872ba
KH
2014If STRING is nil, the function must compose characters in the region
2015between FROM and TO in the current buffer.
335c5470 2016
ddc872ba
KH
2017Otherwise, STRING is a string, and FROM and TO are indices into the
2018string. In this case, the function must compose characters in the
2019string. */);
f96ba4c1 2020 Vauto_composition_function = Qnil;
40add26d 2021
29208e82 2022 DEFVAR_LISP ("composition-function-table", Vcomposition_function_table,
9d751859 2023 doc: /* Char-table of functions for automatic character composition.
58753d74
KH
2024For each character that has to be composed automatically with
2025preceding and/or following characters, this char-table contains
2026a function to call to compose that character.
2027
2028The element at index C in the table, if non-nil, is a list of
10f72a37 2029composition rules of this form: ([PATTERN PREV-CHARS FUNC] ...)
58753d74 2030
9d751859 2031PATTERN is a regular expression which C and the surrounding
58753d74
KH
2032characters must match.
2033
895416e3
KH
2034PREV-CHARS is a non-negative integer (less than 4) specifying how many
2035characters before C to check the matching with PATTERN. If it is 0,
2036PATTERN must match C and the following characters. If it is 1,
2037PATTERN must match a character before C and the following characters.
58753d74
KH
2038
2039If PREV-CHARS is 0, PATTERN can be nil, which means that the
2040single character C should be composed.
2041
2042FUNC is a function to return a glyph-string representing a
9d751859 2043composition of the characters that match PATTERN. It is
58753d74
KH
2044called with one argument GSTRING.
2045
2046GSTRING is a template of a glyph-string to return. It is already
2047filled with a proper header for the characters to compose, and
2048glyphs corresponding to those characters one by one. The
9d751859 2049function must return a new glyph-string with the same header as
58753d74
KH
2050GSTRING, or modify GSTRING itself and return it.
2051
2052See also the documentation of `auto-composition-mode'. */);
2053 Vcomposition_function_table = Fmake_char_table (Qnil, Qnil);
2054
ca4c9455
KH
2055 defsubr (&Scompose_region_internal);
2056 defsubr (&Scompose_string_internal);
2057 defsubr (&Sfind_composition_internal);
58753d74 2058 defsubr (&Scomposition_get_gstring);
ca4c9455 2059}