/* * Copyright 2013 Garrett D'Amore * Copyright 2010 Nexenta Systems, Inc. All rights reserved. * Copyright (c) 1989, 1993 * The Regents of the University of California. All rights reserved. * (c) UNIX System Laboratories, Inc. * All or some portions of this file are derived from material licensed * to the University of California by American Telephone and Telegraph * Co. or Unix System Laboratories, Inc. and are reproduced herein with * the permission of UNIX System Laboratories, Inc. * * This code is derived from software contributed to Berkeley by * Paul Borman at Krystal Technologies. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. Neither the name of the University nor the names of its contributors * may be used to endorse or promote products derived from this software * without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */ #ifndef __CTYPE_H_ #define __CTYPE_H_ /* * Please take careful note. It turns out that the _ISxxx macros * occupy the lower order byte, except for _ISGRAPH, _ISALPHA, and _ISPRINT. * Those occupt 0x2000, 0x4000, and 0x8000. Now, noting *very* carefully, * it turns out that this leaves some gaps in the extended bits, which * are occupied by _E1 = phonogram, _E2 = ideogram, and _E3 = English. * The *other* _Ex bits are reserved. We don't think these higher order * bits are baked into applications (because they haven't been used before), * so we believe it is safe to reuse them how we see fit. * * This makes it possible to define a single space which overlaps both the * wctype types, and the ctype types. */ #define _CTYPE_A _ISALPHA /* Alpha */ #define _CTYPE_C _ISCNTRL /* Control */ #define _CTYPE_D _ISDIGIT /* Digit */ #define _CTYPE_G _ISGRAPH /* Graph */ #define _CTYPE_L _ISLOWER /* Lower */ #define _CTYPE_P _ISPUNCT /* Punct */ #define _CTYPE_S _ISSPACE /* Space */ #define _CTYPE_U _ISUPPER /* Upper */ #define _CTYPE_X _ISXDIGIT /* X digit */ #define _CTYPE_B _ISBLANK /* Blank */ #define _CTYPE_R _ISPRINT /* Print */ #define _CTYPE_Q _E1 /* Phonogram */ #define _CTYPE_I _E2 /* Ideogram */ #define _CTYPE_E _E3 /* English (Solaris) */ #define _CTYPE_N _E4 /* Number */ #define _CTYPE_T _E5 /* Special */ /* These high order bits were never used for anything at all. */ #define _CTYPE_SW0 0x20000000U /* 0 width character */ #define _CTYPE_SW1 0x40000000U /* 1 width character */ #define _CTYPE_SW2 0x80000000U /* 2 width character */ #define _CTYPE_SW3 0xc0000000U /* 3 width character */ #define _CTYPE_SWM 0xe0000000U /* Mask for screen width data */ #define _CTYPE_SWS 30 /* Bits to shift to get width */ #endif /* !__CTYPE_H_ */