1 /* 2 * Copyright 2013 Garrett D'Amore <garrett@damore.org> 3 * Copyright 2010 Nexenta Systems, Inc. All rights reserved. 4 * Copyright (c) 1989, 1993 5 * The Regents of the University of California. All rights reserved. 6 * (c) UNIX System Laboratories, Inc. 7 * All or some portions of this file are derived from material licensed 8 * to the University of California by American Telephone and Telegraph 9 * Co. or Unix System Laboratories, Inc. and are reproduced herein with 10 * the permission of UNIX System Laboratories, Inc. 11 * 12 * This code is derived from software contributed to Berkeley by 13 * Paul Borman at Krystal Technologies. 14 * 15 * Redistribution and use in source and binary forms, with or without 16 * modification, are permitted provided that the following conditions 17 * are met: 18 * 1. Redistributions of source code must retain the above copyright 19 * notice, this list of conditions and the following disclaimer. 20 * 2. Redistributions in binary form must reproduce the above copyright 21 * notice, this list of conditions and the following disclaimer in the 22 * documentation and/or other materials provided with the distribution. 23 * 3. Neither the name of the University nor the names of its contributors 24 * may be used to endorse or promote products derived from this software 25 * without specific prior written permission. 26 * 27 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 28 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 29 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 30 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 31 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 32 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 33 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 34 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 35 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 36 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 37 * SUCH DAMAGE. 38 */ 39 40 #ifndef __CTYPE_H_ 41 #define __CTYPE_H_ 42 43 /* 44 * Please take careful note. It turns out that the _ISxxx macros 45 * occupy the lower order byte, except for _ISGRAPH, _ISALPHA, and _ISPRINT. 46 * Those occupt 0x2000, 0x4000, and 0x8000. Now, noting *very* carefully, 47 * it turns out that this leaves some gaps in the extended bits, which 48 * are occupied by _E1 = phonogram, _E2 = ideogram, and _E3 = English. 49 * The *other* _Ex bits are reserved. We don't think these higher order 50 * bits are baked into applications (because they haven't been used before), 51 * so we believe it is safe to reuse them how we see fit. 52 * 53 * This makes it possible to define a single space which overlaps both the 54 * wctype types, and the ctype types. 55 */ 56 57 #define _CTYPE_A _ISALPHA /* Alpha */ 58 #define _CTYPE_C _ISCNTRL /* Control */ 59 #define _CTYPE_D _ISDIGIT /* Digit */ 60 #define _CTYPE_G _ISGRAPH /* Graph */ 61 #define _CTYPE_L _ISLOWER /* Lower */ 62 #define _CTYPE_P _ISPUNCT /* Punct */ 63 #define _CTYPE_S _ISSPACE /* Space */ 64 #define _CTYPE_U _ISUPPER /* Upper */ 65 #define _CTYPE_X _ISXDIGIT /* X digit */ 66 #define _CTYPE_B _ISBLANK /* Blank */ 67 #define _CTYPE_R _ISPRINT /* Print */ 68 69 #define _CTYPE_Q _E1 /* Phonogram */ 70 #define _CTYPE_I _E2 /* Ideogram */ 71 #define _CTYPE_E _E3 /* English (Solaris) */ 72 #define _CTYPE_N _E4 /* Number */ 73 #define _CTYPE_T _E5 /* Special */ 74 75 /* These high order bits were never used for anything at all. */ 76 #define _CTYPE_SW0 0x20000000U /* 0 width character */ 77 #define _CTYPE_SW1 0x40000000U /* 1 width character */ 78 #define _CTYPE_SW2 0x80000000U /* 2 width character */ 79 #define _CTYPE_SW3 0xc0000000U /* 3 width character */ 80 #define _CTYPE_SWM 0xe0000000U /* Mask for screen width data */ 81 #define _CTYPE_SWS 30 /* Bits to shift to get width */ 82 83 #endif /* !__CTYPE_H_ */ 84