1 /* 2 * Copyright 2010 Nexenta Systems, Inc. All rights reserved. 3 * Copyright (c) 1989, 1993 4 * The Regents of the University of California. All rights reserved. 5 * (c) UNIX System Laboratories, Inc. 6 * All or some portions of this file are derived from material licensed 7 * to the University of California by American Telephone and Telegraph 8 * Co. or Unix System Laboratories, Inc. and are reproduced herein with 9 * the permission of UNIX System Laboratories, Inc. 10 * 11 * This code is derived from software contributed to Berkeley by 12 * Paul Borman at Krystal Technologies. 13 * 14 * Redistribution and use in source and binary forms, with or without 15 * modification, are permitted provided that the following conditions 16 * are met: 17 * 1. Redistributions of source code must retain the above copyright 18 * notice, this list of conditions and the following disclaimer. 19 * 2. Redistributions in binary form must reproduce the above copyright 20 * notice, this list of conditions and the following disclaimer in the 21 * documentation and/or other materials provided with the distribution. 22 * 3. Neither the name of the University nor the names of its contributors 23 * may be used to endorse or promote products derived from this software 24 * without specific prior written permission. 25 * 26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 36 * SUCH DAMAGE. 37 */ 38 39 #ifndef __CTYPE_H_ 40 #define __CTYPE_H_ 41 42 /* 43 * Please take careful note. It turns out that the _ISxxx macros 44 * occupy the lower order byte, except for _ISGRAPH, _ISALPHA, and _ISPRINT. 45 * Those occupt 0x2000, 0x4000, and 0x8000. Now, noting *very* carefully, 46 * it turns out that this leaves some gaps in the extended bits, which 47 * are occupied by _E1 = phonogram, _E2 = ideogram, and _E3 = English. 48 * The *other* _Ex bits are reserved. We don't think these higher order 49 * bits are baked into applications (because they haven't been used before), 50 * so we believe it is safe to reuse them how we see fit. 51 * 52 * This makes it possible to define a single space which overlaps both the 53 * wctype types, and the ctype types. 54 */ 55 56 #define _CTYPE_A _ISALPHA /* Alpha */ 57 #define _CTYPE_C _ISCNTRL /* Control */ 58 #define _CTYPE_D _ISDIGIT /* Digit */ 59 #define _CTYPE_G _ISGRAPH /* Graph */ 60 #define _CTYPE_L _ISLOWER /* Lower */ 61 #define _CTYPE_P _ISPUNCT /* Punct */ 62 #define _CTYPE_S _ISSPACE /* Space */ 63 #define _CTYPE_U _ISUPPER /* Upper */ 64 #define _CTYPE_X _ISXDIGIT /* X digit */ 65 #define _CTYPE_B _ISBLANK /* Blank */ 66 #define _CTYPE_R _ISPRINT /* Print */ 67 68 #define _CTYPE_Q _E1 /* Phonogram */ 69 #define _CTYPE_I _E2 /* Ideogram */ 70 #define _CTYPE_E _E3 /* English (Solaris) */ 71 #define _CTYPE_N _E4 /* Number */ 72 #define _CTYPE_T _E5 /* Special */ 73 74 /* These high order bits were never used for anything at all. */ 75 #define _CTYPE_SW0 0x20000000U /* 0 width character */ 76 #define _CTYPE_SW1 0x40000000U /* 1 width character */ 77 #define _CTYPE_SW2 0x80000000U /* 2 width character */ 78 #define _CTYPE_SW3 0xc0000000U /* 3 width character */ 79 #define _CTYPE_SWM 0xe0000000U /* Mask for screen width data */ 80 #define _CTYPE_SWS 30 /* Bits to shift to get width */ 81 82 unsigned int ___runetype(int); 83 84 #endif /* !__CTYPE_H_ */ 85