*** empty log message ***
[bpt/guile.git] / libguile / weaks.c
CommitLineData
7dc6e754 1/* Copyright (C) 1995,1996,1998 Free Software Foundation, Inc.
0f2d19dd
JB
2 *
3 * This program is free software; you can redistribute it and/or modify
4 * it under the terms of the GNU General Public License as published by
5 * the Free Software Foundation; either version 2, or (at your option)
6 * any later version.
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public License
14 * along with this software; see the file COPYING. If not, write to
82892bed
JB
15 * the Free Software Foundation, Inc., 59 Temple Place, Suite 330,
16 * Boston, MA 02111-1307 USA
0f2d19dd
JB
17 *
18 * As a special exception, Free Software Foundation gives permission
19 * for additional uses of the text contained in its release of this library.
20 *
21 * The exception is that, if you link this library with other files
22 * to produce an executable, this does not by itself cause the
23 * resulting executable to be covered by the GNU General Public License.
24 * Your use of that executable is in no way restricted on account of
25 * linking this library code into it.
26 *
27 * This exception does not however invalidate any other reasons why
28 * the executable file might be covered by the GNU General Public License.
29 *
30 * This exception applies only to the code released by
31 * Free Software Foundation as part of this library. If you copy
32 * code from other releases distributed under the terms of the GPL into a copy of
33 * this library, as the General Public License permits, the exception does
34 * not apply to the code that you add in this way. To avoid misleading
35 * anyone as to the status of such modified files, you must delete
36 * this exception notice from such code.
37 *
38 * If you write modifications of your own for this library, it is your choice
39 * whether to permit this exception to apply to your modifications.
82892bed 40 * If you do not wish that, delete this exception notice. */
1bbd0b84
GB
41
42/* Software engineering face-lift by Greg J. Badros, 11-Dec-1999,
43 gjb@cs.washington.edu, http://www.cs.washington.edu/homes/gjb */
44
0f2d19dd
JB
45\f
46#include <stdio.h>
47#include "_scm.h"
003d1fd0 48#include "vectors.h"
0f2d19dd 49
b6791b2e 50#include "validate.h"
20e6290e 51#include "weaks.h"
0f2d19dd
JB
52\f
53
54
55/* {Weak Vectors}
56 */
57
58
3b3b36dd 59SCM_DEFINE (scm_make_weak_vector, "make-weak-vector", 1, 1, 0,
1bbd0b84 60 (SCM k, SCM fill),
b380b885
MD
61 "Return a weak vector with @var{size} elements. If the optional\n"
62 "argument @var{fill} is given, all entries in the vector will be set to\n"
63 "@var{fill}. The default value for @var{fill} is the empty list.")
1bbd0b84 64#define FUNC_NAME s_scm_make_weak_vector
0f2d19dd
JB
65{
66 SCM v;
250da369 67 v = scm_make_vector (scm_sum (k, SCM_MAKINUM (2)), fill);
0f2d19dd
JB
68 SCM_DEFER_INTS;
69 SCM_SETLENGTH(v, SCM_INUM (k), scm_tc7_wvect);
250da369
JB
70 SCM_VELTS(v)[0] = SCM_EOL;
71 SCM_VELTS(v)[1] = (SCM)0;
72 SCM_SETVELTS(v, SCM_VELTS(v) + 2);
0f2d19dd
JB
73 SCM_ALLOW_INTS;
74 return v;
75}
1bbd0b84 76#undef FUNC_NAME
0f2d19dd
JB
77
78
1bbd0b84 79SCM_REGISTER_PROC(s_list_to_weak_vector, "list->weak-vector", 1, 0, 0, scm_weak_vector);
1cc91f1b 80
3b3b36dd 81SCM_DEFINE (scm_weak_vector, "weak-vector", 0, 0, 1,
1bbd0b84 82 (SCM l),
b380b885
MD
83 "@deffnx primitive list->weak-vector l\n"
84 "Construct a weak vector from a list: @code{weak-vector} uses the list of\n"
85 "its arguments while @code{list->weak-vector} uses its only argument\n"
86 "@var{l} (a list) to construct a weak vector the same way\n"
87 "@code{vector->list} would.")
1bbd0b84 88#define FUNC_NAME s_scm_weak_vector
0f2d19dd
JB
89{
90 SCM res;
91 register SCM *data;
92 long i;
93
94 i = scm_ilength (l);
1bbd0b84 95 SCM_ASSERT (i >= 0, l, SCM_ARG1, FUNC_NAME);
0f2d19dd
JB
96 res = scm_make_weak_vector (SCM_MAKINUM (i), SCM_UNSPECIFIED);
97 data = SCM_VELTS (res);
98 for (;
0c95b57d 99 i && SCM_CONSP (l);
0f2d19dd
JB
100 --i, l = SCM_CDR (l))
101 *data++ = SCM_CAR (l);
102 return res;
103}
1bbd0b84 104#undef FUNC_NAME
0f2d19dd
JB
105
106
3b3b36dd 107SCM_DEFINE (scm_weak_vector_p, "weak-vector?", 1, 0, 0,
1bbd0b84 108 (SCM x),
b380b885
MD
109 "Return @var{#t} if @var{obj} is a weak vector. Note that all weak\n"
110 "hashes are also weak vectors.")
1bbd0b84 111#define FUNC_NAME s_scm_weak_vector_p
0f2d19dd 112{
0c95b57d 113 return SCM_BOOL(SCM_WVECTP (x) && !SCM_IS_WHVEC (x));
0f2d19dd 114}
1bbd0b84 115#undef FUNC_NAME
0f2d19dd
JB
116
117
118
119\f
120
121
122
3b3b36dd 123SCM_DEFINE (scm_make_weak_key_hash_table, "make-weak-key-hash-table", 1, 0, 0,
1bbd0b84 124 (SCM k),
b380b885
MD
125 "@deffnx primitive make-weak-value-hash-table size\n"
126 "@deffnx primitive make-doubly-weak-hash-table size\n"
127 "Return a weak hash table with @var{size} buckets. As with any hash\n"
128 "table, choosing a good size for the table requires some caution.\n\n"
129 "You can modify weak hash tables in exactly the same way you would modify\n"
130 "regular hash tables. (@pxref{Hash Tables})")
1bbd0b84 131#define FUNC_NAME s_scm_make_weak_key_hash_table
0f2d19dd
JB
132{
133 SCM v;
3b3b36dd 134 SCM_VALIDATE_INUM (1,k);
0f2d19dd
JB
135 v = scm_make_weak_vector (k, SCM_EOL);
136 SCM_ALLOW_INTS;
f1267706 137 SCM_UNPACK (SCM_VELTS (v)[-1]) = 1;
0f2d19dd
JB
138 SCM_ALLOW_INTS;
139 return v;
140}
1bbd0b84 141#undef FUNC_NAME
0f2d19dd
JB
142
143
a1ec6916 144SCM_DEFINE (scm_make_weak_value_hash_table, "make-weak-value-hash-table", 1, 0, 0,
1bbd0b84 145 (SCM k),
b380b885 146 "")
1bbd0b84 147#define FUNC_NAME s_scm_make_weak_value_hash_table
0f2d19dd
JB
148{
149 SCM v;
3b3b36dd 150 SCM_VALIDATE_INUM (1,k);
0f2d19dd
JB
151 v = scm_make_weak_vector (k, SCM_EOL);
152 SCM_ALLOW_INTS;
f1267706 153 SCM_UNPACK (SCM_VELTS (v)[-1]) = 2;
0f2d19dd
JB
154 SCM_ALLOW_INTS;
155 return v;
156}
1bbd0b84 157#undef FUNC_NAME
0f2d19dd
JB
158
159
160
a1ec6916 161SCM_DEFINE (scm_make_doubly_weak_hash_table, "make-doubly-weak-hash-table", 1, 0, 0,
1bbd0b84 162 (SCM k),
b380b885 163 "")
1bbd0b84 164#define FUNC_NAME s_scm_make_doubly_weak_hash_table
0f2d19dd
JB
165{
166 SCM v;
3b3b36dd 167 SCM_VALIDATE_INUM (1,k);
0f2d19dd
JB
168 v = scm_make_weak_vector (k, SCM_EOL);
169 SCM_ALLOW_INTS;
f1267706 170 SCM_UNPACK (SCM_VELTS (v)[-1]) = 3;
0f2d19dd
JB
171 SCM_ALLOW_INTS;
172 return v;
173}
1bbd0b84 174#undef FUNC_NAME
0f2d19dd 175
3b3b36dd 176SCM_DEFINE (scm_weak_key_hash_table_p, "weak-key-hash-table?", 1, 0, 0,
1bbd0b84 177 (SCM x),
b380b885
MD
178 "@deffnx primitive weak-value-hash-table? obj\n"
179 "@deffnx primitive doubly-weak-hash-table? obj\n"
180 "Return @var{#t} if @var{obj} is the specified weak hash table. Note\n"
181 "that a doubly weak hash table is neither a weak key nor a weak value\n"
182 "hash table.")
1bbd0b84 183#define FUNC_NAME s_scm_weak_key_hash_table_p
0f2d19dd 184{
0c95b57d 185 return SCM_BOOL(SCM_WVECTP (x) && SCM_IS_WHVEC(x));
0f2d19dd 186}
1bbd0b84 187#undef FUNC_NAME
0f2d19dd
JB
188
189
a1ec6916 190SCM_DEFINE (scm_weak_value_hash_table_p, "weak-value-hash-table?", 1, 0, 0,
1bbd0b84 191 (SCM x),
b380b885 192 "")
1bbd0b84 193#define FUNC_NAME s_scm_weak_value_hash_table_p
0f2d19dd 194{
0c95b57d 195 return SCM_BOOL(SCM_WVECTP (x) && SCM_IS_WHVEC_V(x));
0f2d19dd 196}
1bbd0b84 197#undef FUNC_NAME
0f2d19dd
JB
198
199
a1ec6916 200SCM_DEFINE (scm_doubly_weak_hash_table_p, "doubly-weak-hash-table?", 1, 0, 0,
1bbd0b84 201 (SCM x),
b380b885 202 "")
1bbd0b84 203#define FUNC_NAME s_scm_doubly_weak_hash_table_p
0f2d19dd 204{
0c95b57d 205 return SCM_BOOL(SCM_WVECTP (x) && SCM_IS_WHVEC_B (x));
0f2d19dd 206}
1bbd0b84 207#undef FUNC_NAME
0f2d19dd
JB
208
209
210\f
211
1cc91f1b 212
0f2d19dd
JB
213void
214scm_init_weaks ()
0f2d19dd
JB
215{
216#include "weaks.x"
217}
218