* readline.c: Whitespace changes -- added space after
[bpt/guile.git] / libguile / weaks.c
CommitLineData
7dc6e754 1/* Copyright (C) 1995,1996,1998 Free Software Foundation, Inc.
0f2d19dd
JB
2 *
3 * This program is free software; you can redistribute it and/or modify
4 * it under the terms of the GNU General Public License as published by
5 * the Free Software Foundation; either version 2, or (at your option)
6 * any later version.
7 *
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
12 *
13 * You should have received a copy of the GNU General Public License
14 * along with this software; see the file COPYING. If not, write to
82892bed
JB
15 * the Free Software Foundation, Inc., 59 Temple Place, Suite 330,
16 * Boston, MA 02111-1307 USA
0f2d19dd
JB
17 *
18 * As a special exception, Free Software Foundation gives permission
19 * for additional uses of the text contained in its release of this library.
20 *
21 * The exception is that, if you link this library with other files
22 * to produce an executable, this does not by itself cause the
23 * resulting executable to be covered by the GNU General Public License.
24 * Your use of that executable is in no way restricted on account of
25 * linking this library code into it.
26 *
27 * This exception does not however invalidate any other reasons why
28 * the executable file might be covered by the GNU General Public License.
29 *
30 * This exception applies only to the code released by
31 * Free Software Foundation as part of this library. If you copy
32 * code from other releases distributed under the terms of the GPL into a copy of
33 * this library, as the General Public License permits, the exception does
34 * not apply to the code that you add in this way. To avoid misleading
35 * anyone as to the status of such modified files, you must delete
36 * this exception notice from such code.
37 *
38 * If you write modifications of your own for this library, it is your choice
39 * whether to permit this exception to apply to your modifications.
82892bed 40 * If you do not wish that, delete this exception notice. */
1bbd0b84
GB
41
42/* Software engineering face-lift by Greg J. Badros, 11-Dec-1999,
43 gjb@cs.washington.edu, http://www.cs.washington.edu/homes/gjb */
44
0f2d19dd
JB
45\f
46#include <stdio.h>
47#include "_scm.h"
48
1bbd0b84 49#include "scm_validate.h"
20e6290e 50#include "weaks.h"
0f2d19dd
JB
51\f
52
53
54/* {Weak Vectors}
55 */
56
57
a1ec6916 58SCM_DEFINE(scm_make_weak_vector, "make-weak-vector", 1, 1, 0,
1bbd0b84 59 (SCM k, SCM fill),
4079f87e
GB
60"Return a weak vector with @var{size} elements. If the optional
61argument @var{fill} is given, all entries in the vector will be set to
62@var{fill}. The default value for @var{fill} is the empty list.")
1bbd0b84 63#define FUNC_NAME s_scm_make_weak_vector
0f2d19dd
JB
64{
65 SCM v;
250da369 66 v = scm_make_vector (scm_sum (k, SCM_MAKINUM (2)), fill);
0f2d19dd
JB
67 SCM_DEFER_INTS;
68 SCM_SETLENGTH(v, SCM_INUM (k), scm_tc7_wvect);
250da369
JB
69 SCM_VELTS(v)[0] = SCM_EOL;
70 SCM_VELTS(v)[1] = (SCM)0;
71 SCM_SETVELTS(v, SCM_VELTS(v) + 2);
0f2d19dd
JB
72 SCM_ALLOW_INTS;
73 return v;
74}
1bbd0b84 75#undef FUNC_NAME
0f2d19dd
JB
76
77
1bbd0b84 78SCM_REGISTER_PROC(s_list_to_weak_vector, "list->weak-vector", 1, 0, 0, scm_weak_vector);
1cc91f1b 79
a1ec6916 80SCM_DEFINE(scm_weak_vector, "weak-vector", 0, 0, 1,
1bbd0b84 81 (SCM l),
4079f87e
GB
82"@deffnx primitive list->weak-vector l
83Construct a weak vector from a list: @code{weak-vector} uses the list of
84its arguments while @code{list->weak-vector} uses its only argument
85@var{l} (a list) to construct a weak vector the same way
86@code{vector->list} would.")
1bbd0b84 87#define FUNC_NAME s_scm_weak_vector
0f2d19dd
JB
88{
89 SCM res;
90 register SCM *data;
91 long i;
92
93 i = scm_ilength (l);
1bbd0b84 94 SCM_ASSERT (i >= 0, l, SCM_ARG1, FUNC_NAME);
0f2d19dd
JB
95 res = scm_make_weak_vector (SCM_MAKINUM (i), SCM_UNSPECIFIED);
96 data = SCM_VELTS (res);
97 for (;
0c95b57d 98 i && SCM_CONSP (l);
0f2d19dd
JB
99 --i, l = SCM_CDR (l))
100 *data++ = SCM_CAR (l);
101 return res;
102}
1bbd0b84 103#undef FUNC_NAME
0f2d19dd
JB
104
105
a1ec6916 106SCM_DEFINE(scm_weak_vector_p, "weak-vector?", 1, 0, 0,
1bbd0b84 107 (SCM x),
4079f87e
GB
108"Return @var{#t} if @var{obj} is a weak vector. Note that all weak
109hashes are also weak vectors.")
1bbd0b84 110#define FUNC_NAME s_scm_weak_vector_p
0f2d19dd 111{
0c95b57d 112 return SCM_BOOL(SCM_WVECTP (x) && !SCM_IS_WHVEC (x));
0f2d19dd 113}
1bbd0b84 114#undef FUNC_NAME
0f2d19dd
JB
115
116
117
118\f
119
120
121
a1ec6916 122SCM_DEFINE(scm_make_weak_key_hash_table, "make-weak-key-hash-table", 1, 0, 0,
1bbd0b84 123 (SCM k),
4079f87e
GB
124"@deffnx primitive make-weak-value-hash-table size
125@deffnx primitive make-doubly-weak-hash-table size
126Return a weak hash table with @var{size} buckets. As with any hash
127table, choosing a good size for the table requires some caution.
128
129You can modify weak hash tables in exactly the same way you would modify
130regular hash tables. (@pxref{Hash Tables})")
1bbd0b84 131#define FUNC_NAME s_scm_make_weak_key_hash_table
0f2d19dd
JB
132{
133 SCM v;
47c6b75e 134 SCM_VALIDATE_INUM(1,k);
0f2d19dd
JB
135 v = scm_make_weak_vector (k, SCM_EOL);
136 SCM_ALLOW_INTS;
137 SCM_VELTS (v)[-1] = 1;
138 SCM_ALLOW_INTS;
139 return v;
140}
1bbd0b84 141#undef FUNC_NAME
0f2d19dd
JB
142
143
a1ec6916 144SCM_DEFINE (scm_make_weak_value_hash_table, "make-weak-value-hash-table", 1, 0, 0,
1bbd0b84
GB
145 (SCM k),
146"")
147#define FUNC_NAME s_scm_make_weak_value_hash_table
0f2d19dd
JB
148{
149 SCM v;
47c6b75e 150 SCM_VALIDATE_INUM(1,k);
0f2d19dd
JB
151 v = scm_make_weak_vector (k, SCM_EOL);
152 SCM_ALLOW_INTS;
153 SCM_VELTS (v)[-1] = 2;
154 SCM_ALLOW_INTS;
155 return v;
156}
1bbd0b84 157#undef FUNC_NAME
0f2d19dd
JB
158
159
160
a1ec6916 161SCM_DEFINE (scm_make_doubly_weak_hash_table, "make-doubly-weak-hash-table", 1, 0, 0,
1bbd0b84
GB
162 (SCM k),
163"")
164#define FUNC_NAME s_scm_make_doubly_weak_hash_table
0f2d19dd
JB
165{
166 SCM v;
47c6b75e 167 SCM_VALIDATE_INUM(1,k);
0f2d19dd
JB
168 v = scm_make_weak_vector (k, SCM_EOL);
169 SCM_ALLOW_INTS;
170 SCM_VELTS (v)[-1] = 3;
171 SCM_ALLOW_INTS;
172 return v;
173}
1bbd0b84 174#undef FUNC_NAME
0f2d19dd 175
a1ec6916 176SCM_DEFINE(scm_weak_key_hash_table_p, "weak-key-hash-table?", 1, 0, 0,
1bbd0b84 177 (SCM x),
4079f87e
GB
178"@deffnx primitive weak-value-hash-table? obj
179@deffnx primitive doubly-weak-hash-table? obj
180Return @var{#t} if @var{obj} is the specified weak hash table. Note
181that a doubly weak hash table is neither a weak key nor a weak value
182hash table.")
1bbd0b84 183#define FUNC_NAME s_scm_weak_key_hash_table_p
0f2d19dd 184{
0c95b57d 185 return SCM_BOOL(SCM_WVECTP (x) && SCM_IS_WHVEC(x));
0f2d19dd 186}
1bbd0b84 187#undef FUNC_NAME
0f2d19dd
JB
188
189
a1ec6916 190SCM_DEFINE (scm_weak_value_hash_table_p, "weak-value-hash-table?", 1, 0, 0,
1bbd0b84
GB
191 (SCM x),
192"")
193#define FUNC_NAME s_scm_weak_value_hash_table_p
0f2d19dd 194{
0c95b57d 195 return SCM_BOOL(SCM_WVECTP (x) && SCM_IS_WHVEC_V(x));
0f2d19dd 196}
1bbd0b84 197#undef FUNC_NAME
0f2d19dd
JB
198
199
a1ec6916 200SCM_DEFINE (scm_doubly_weak_hash_table_p, "doubly-weak-hash-table?", 1, 0, 0,
1bbd0b84
GB
201 (SCM x),
202"")
203#define FUNC_NAME s_scm_doubly_weak_hash_table_p
0f2d19dd 204{
0c95b57d 205 return SCM_BOOL(SCM_WVECTP (x) && SCM_IS_WHVEC_B (x));
0f2d19dd 206}
1bbd0b84 207#undef FUNC_NAME
0f2d19dd
JB
208
209
210\f
211
1cc91f1b 212
0f2d19dd
JB
213void
214scm_init_weaks ()
0f2d19dd
JB
215{
216#include "weaks.x"
217}
218