These operations operate on integers representing semi-infinite bit strings, using a 2's-complement encoding.arithmetic-shift shifts i by j bits. A left shift is j > 0; a right shift is j < 0.
Returns the i th element of list. The first element (the car) is (nth list 0), the second element is (nth list 1), and so on.This procedure is provided as it is useful for accessing elements from the lists returned by the field-readers (chapter 8).
The functionality of nth is equivalent to that of R5RS's list-ref. Therefore, nth will go away in a future release.
This runs a Scheme 48 read-eval-print loop, reading forms from the current input port, and writing their values to the current output port.If you wish to try something dangerous, and want to be able to recover your shell state, you can fork off a subshell with the following form:
(run (begin (repl)))...or, rephrased for the proceduralists:(wait (fork repl))
Decrypts key by directly calling the crypt function
using salt to perturb the hashing algorithm. Salt must be
a two-character string consisting of digits, alphabetic characters,
``.'' or ``\
''. The length of key may be at most eight.
Section 3.2.8 already points out that POSIX's file locks are almost useless in practice. To bypass this restriction other advisory locking mechanisms, based only on standard file operations, where invented. One of them is the so-called dot-locking scheme where the lock of file-name is represented by the file file-name.lock. Care is taken that only one process may generate the lock for a given file.
Here is scsh's interface to dot-locking:
Tries to obtain the lock for file-name. If the file is already locked, the thread sleeps for interval seconds (default is 1) before it retries. If the lock cannot be obtained after retry-number attempts, the procedure returns #f, otherwise #t. The default value of retry-number is #fwhich corresponds to an infinite number of retires.If stale-time is non-#f, it specifies the minimum age a lock may have (in seconds) before it is considered stale. Obtain-dot-lock attempts to delete stale locks. If it was succcessful obtaining a lock after breaking it, obtain-dot-lock returns broken. If stale-time is #f, obtain-dot-lock never considers a lock stale. The default for stale-time is 300.
Note that it is possible that obtain-dot-lock breaks a lock but nevertheless fails to obtain it otherwise. If it is necessary to handle this case specially, use break-dot-lock directly (see below) rather than specifying a non-#fstale-time
Breaks the lock for file-name if one exists. Note that breaking a lock does not imply a subsequent obtain-dot-lock will succeed, as another party may have acquired the lock between break-dot-lock and obtain-dot-lock.
Releases the lock for file-name. On success, release-dot-lock returns #t, otherwise #f. Note that this procedure can also be used to break the lock for file-name.
This procedure obtains the requested lock, and then calls (thunk). When thunk returns, the lock is released. A non-local exit (e.g., throwing to a saved continuation or raising an exception) also causes the lock to be released.After a normal return from thunk, its return values are returned by with-dot-lock*. The with-dot-lock special form is equivalent syntactic sugar.
(Note: the functionality presented in this section is still somewhat experimental and thus subject to interface changes.)
The procedures in this section provide access to the 4.2BSD syslog facility present in most POSIX systems. The functionality is in a structure called syslog. There's an additional structure syslog-channels documented below. The scsh interface to the syslog facility differs significantly from that of the Unix library functionality in order to support multiple simultaneous connections to the syslog facility.
Log messages carry a variety of parameters beside the text of the message itself, namely a set of options controlling the output format and destination, the facility identifying the class of programs the message is coming from, an identifier specifying the conrete program, and the level identifying the importance of the message. Moreover, a log mask can prevent messages at certain levels to be actually sent to the syslog daemon.
A log option specifies details of the I/O behavior of the syslog facility. A syslog option is an element of a finite type (see the Scheme 48 manual) constructed by the syslog-option macro. The syslog facility works with sets of options which are represented as enum sets (see the Scheme 48 manual).
Syslog-option constructs a log option from the name of an option. (The possible names are listed below.) Syslog-option? is a predicate for log options. Options are comparable using eq?. Make-syslog-options constructs a set of options from a list of options. Syslog-options is a macro which expands into an expression returning a set of options from names. Syslog-options? is a predicate for sets of options.Here is a list of possible names of syslog options:
console If syslog cannot pass the message to syslogd it will attempt to write the message to the console.
delay Delay opening the connection to syslogd immediately until the first message is logged.
no-delay Open the connection to syslogd immediately. Normally the open is delayed until the first message is logged. Useful for programs that need to manage the order in which file descriptors are allocated.
NOTA BENE: The delay and no-delay options are included for completeness, but do not have the expected effect in the present Scheme interface: Because the Scheme interface has to multiplex multiple simultaneous connections to the syslog facility over a single one, open and close operations on that facility happen at unpredictable times.
log-pid Log the process id with each message: useful for identifying instantiations of daemons.
A log facility identifies the originator of a log message from a finite set known to the system. Each originator is identified by a name:
Syslog-facility is macro that expands into an expression returning a facility for a given name. Syslog-facility? is a predicate for facilities. Facilities are comparable via eq?.Here is a list of possible names of syslog facilities:
authorization The authorization system: login, su, getty, etc.
cron The cron daemon.
daemon System daemons, such as routed, that are not provided for explicitly by other facilities.
kernel Messages generated by the kernel.
lpr The line printer spooling system: lpr, lpc, lpd, etc.
mail The mail system.
news The network news system.
user Messages generated by random user processes.
uucp The uucp system.
local0 local1 local2 local3 local4 local5 local6 local7 Reserved for local use.
A log level identifies the importance of a message from a fixed set of possible levels.
Syslog-level is macro that expands into an expression returning a facility for a given name. Syslog-level? is a predicate for facilities. Levels are comparable via eq?.Here is a list of possible names of syslog levels:
emergency A panic condition. This is normally broadcast to all users.
alert A condition that should be corrected immediately, such as a corrupted system database.
critical Critical conditions, e.g., hard device errors.
error Errors.
warning Warning messages.
notice Conditions that are not error conditions, but should possibly be handled specially.
info Informational messages.
debug Messages that contain information normally of use only when debugging a program.
A log masks can mask out log messages at a set of levels. A log mask is an enum set of log levels.
Make-syslog-mask constructs a mask from a list of levels. Syslog-mask is a macro which constructs a mask from names of levels. Syslog-mask-all is a predefined log mask containing all levels. Syslog-mask-upto returns a mask consisting of all levels up to and including a certain level, starting with emergency.
Scheme 48 dynamically maintains implicit connections to the syslog facility specifying a current identifier, current options, a current facility and a current log mask. This implicit connection is held in a thread fluid (see Section 9.5). Hence, every thread maintains it own implicit connection to syslog. Note that the connection is not implicitly preserved across a spawn, but it is preserved across a fork-thread:
With-syslog-destination dynamically binds parameters of the implicit connection to the syslog facility and runs thunk within those parameter bindings, returning what thunk returns. Each of the parameters may be #f in which case the previous values will be used. Set-syslog-destination! sets the parameters of the implicit connection of the current thread.
Syslog actually logs a message. Each of the parameters of the implicit connection (except for the log mask) can be explicitly specified as well for the current call to syslog, overriding the parameters of the channel. The parameters revert to their original values after the call.
The syslog-channels structure allows direct manipulation of syslog channels, the objects that represent connections to the syslog facility. Note that it is not necessary to explicitly open a syslog channel to do logging.
Open-syslog-channel and close-syslog-channel create and destroy a connection to the syslog facility, respectively. The specified form of calling syslog logs to the specified channel.