1 /* Copyright (C) 1995,1996,1998 Free Software Foundation, Inc.
3 * This program is free software; you can redistribute it and/or modify
4 * it under the terms of the GNU General Public License as published by
5 * the Free Software Foundation; either version 2, or (at your option)
8 * This program is distributed in the hope that it will be useful,
9 * but WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 * GNU General Public License for more details.
13 * You should have received a copy of the GNU General Public License
14 * along with this software; see the file COPYING. If not, write to
15 * the Free Software Foundation, Inc., 59 Temple Place, Suite 330,
16 * Boston, MA 02111-1307 USA
18 * As a special exception, Free Software Foundation gives permission
19 * for additional uses of the text contained in its release of this library.
21 * The exception is that, if you link this library with other files
22 * to produce an executable, this does not by itself cause the
23 * resulting executable to be covered by the GNU General Public License.
24 * Your use of that executable is in no way restricted on account of
25 * linking this library code into it.
27 * This exception does not however invalidate any other reasons why
28 * the executable file might be covered by the GNU General Public License.
30 * This exception applies only to the code released by
31 * Free Software Foundation as part of this library. If you copy
32 * code from other releases distributed under the terms of the GPL into a copy of
33 * this library, as the General Public License permits, the exception does
34 * not apply to the code that you add in this way. To avoid misleading
35 * anyone as to the status of such modified files, you must delete
36 * this exception notice from such code.
38 * If you write modifications of your own for this library, it is your choice
39 * whether to permit this exception to apply to your modifications.
40 * If you do not wish that, delete this exception notice. */
42 /* Software engineering face-lift by Greg J. Badros, 11-Dec-1999,
43 gjb@cs.washington.edu, http://www.cs.washington.edu/homes/gjb */
49 #include "scm_validate.h"
58 SCM_DEFINE (scm_make_weak_vector
, "make-weak-vector", 1, 1, 0,
60 "Return a weak vector with @var{size} elements. If the optional
61 argument @var{fill} is given, all entries in the vector will be set to
62 @var{fill}. The default value for @var{fill} is the empty list.")
63 #define FUNC_NAME s_scm_make_weak_vector
66 v
= scm_make_vector (scm_sum (k
, SCM_MAKINUM (2)), fill
);
68 SCM_SETLENGTH(v
, SCM_INUM (k
), scm_tc7_wvect
);
69 SCM_VELTS(v
)[0] = SCM_EOL
;
70 SCM_VELTS(v
)[1] = (SCM
)0;
71 SCM_SETVELTS(v
, SCM_VELTS(v
) + 2);
78 SCM_REGISTER_PROC(s_list_to_weak_vector
, "list->weak-vector", 1, 0, 0, scm_weak_vector
);
80 SCM_DEFINE (scm_weak_vector
, "weak-vector", 0, 0, 1,
82 "@deffnx primitive list->weak-vector l
83 Construct a weak vector from a list: @code{weak-vector} uses the list of
84 its arguments while @code{list->weak-vector} uses its only argument
85 @var{l} (a list) to construct a weak vector the same way
86 @code{vector->list} would.")
87 #define FUNC_NAME s_scm_weak_vector
94 SCM_ASSERT (i
>= 0, l
, SCM_ARG1
, FUNC_NAME
);
95 res
= scm_make_weak_vector (SCM_MAKINUM (i
), SCM_UNSPECIFIED
);
96 data
= SCM_VELTS (res
);
100 *data
++ = SCM_CAR (l
);
106 SCM_DEFINE (scm_weak_vector_p
, "weak-vector?", 1, 0, 0,
108 "Return @var{#t} if @var{obj} is a weak vector. Note that all weak
109 hashes are also weak vectors.")
110 #define FUNC_NAME s_scm_weak_vector_p
112 return SCM_BOOL(SCM_WVECTP (x
) && !SCM_IS_WHVEC (x
));
122 SCM_DEFINE (scm_make_weak_key_hash_table
, "make-weak-key-hash-table", 1, 0, 0,
124 "@deffnx primitive make-weak-value-hash-table size
125 @deffnx primitive make-doubly-weak-hash-table size
126 Return a weak hash table with @var{size} buckets. As with any hash
127 table, choosing a good size for the table requires some caution.
129 You can modify weak hash tables in exactly the same way you would modify
130 regular hash tables. (@pxref{Hash Tables})")
131 #define FUNC_NAME s_scm_make_weak_key_hash_table
134 SCM_VALIDATE_INUM (1,k
);
135 v
= scm_make_weak_vector (k
, SCM_EOL
);
137 SCM_VELTS (v
)[-1] = 1;
144 SCM_DEFINE (scm_make_weak_value_hash_table
, "make-weak-value-hash-table", 1, 0, 0,
147 #define FUNC_NAME s_scm_make_weak_value_hash_table
150 SCM_VALIDATE_INUM (1,k
);
151 v
= scm_make_weak_vector (k
, SCM_EOL
);
153 SCM_VELTS (v
)[-1] = 2;
161 SCM_DEFINE (scm_make_doubly_weak_hash_table
, "make-doubly-weak-hash-table", 1, 0, 0,
164 #define FUNC_NAME s_scm_make_doubly_weak_hash_table
167 SCM_VALIDATE_INUM (1,k
);
168 v
= scm_make_weak_vector (k
, SCM_EOL
);
170 SCM_VELTS (v
)[-1] = 3;
176 SCM_DEFINE (scm_weak_key_hash_table_p
, "weak-key-hash-table?", 1, 0, 0,
178 "@deffnx primitive weak-value-hash-table? obj
179 @deffnx primitive doubly-weak-hash-table? obj
180 Return @var{#t} if @var{obj} is the specified weak hash table. Note
181 that a doubly weak hash table is neither a weak key nor a weak value
183 #define FUNC_NAME s_scm_weak_key_hash_table_p
185 return SCM_BOOL(SCM_WVECTP (x
) && SCM_IS_WHVEC(x
));
190 SCM_DEFINE (scm_weak_value_hash_table_p
, "weak-value-hash-table?", 1, 0, 0,
193 #define FUNC_NAME s_scm_weak_value_hash_table_p
195 return SCM_BOOL(SCM_WVECTP (x
) && SCM_IS_WHVEC_V(x
));
200 SCM_DEFINE (scm_doubly_weak_hash_table_p
, "doubly-weak-hash-table?", 1, 0, 0,
203 #define FUNC_NAME s_scm_doubly_weak_hash_table_p
205 return SCM_BOOL(SCM_WVECTP (x
) && SCM_IS_WHVEC_B (x
));