These operations operate on integers representing semi-infinite bit strings, using a 2's-complement encoding.arithmetic-shift shifts i by j bits. A left shift is j > 0; a right shift is j < 0.
Returns the i th element of list. The first element (the car) is (nth list 0), the second element is (nth list 1), and so on.This procedure is provided as it is useful for accessing elements from the lists returned by the field-readers (chapter 8).
The functionality of nth is equivalent to that of R5RS's list-ref. Therefore, nth will go away in a future release.
Decrypts key by directly calling the crypt function
using salt to perturb the hashing algorithm. Salt must be
a two-character string consisting of digits, alphabetic characters,
``.'' or ``\
''. The length of key may be at most eight.
Section 3.2.8 already points out that POSIX's file locks are almost useless in practice. To bypass this restriction other advisory locking mechanisms, based only on standard file operations, where invented. One of them is the so-called dot-locking scheme where the lock of file-name is represented by the file file-name.lock. Care is taken that only one process may generate the lock for a given file.
Here is scsh's interface to dot-locking:
Tries to obtain the lock for file-name. If the file is already locked, the thread sleeps for interval seconds (default is 1) before it retries. If the lock cannot be obtained after retry-number attempts, the procedure returns #f, otherwise #t. The default value of retry-number is #f which corresponds to an infinite number of retires.If stale-time is non-#f, it specifies the minimum age a lock may have (in seconds) before it is considered stale. Obtain-dot-lock attempts to delete stale locks. If it was succcessful obtaining a lock after breaking it, obtain-dot-lock returns broken. If stale-time is #f, obtain-dot-lock never considers a lock stale. The default for stale-time is 300.
Note that it is possible that obtain-dot-lock breaks a lock but nevertheless fails to obtain it otherwise. If it is necessary to handle this case specially, use break-dot-lock directly (see below) rather than specifying a non-#f stale-time
Breaks the lock for file-name if one exists. Note that breaking a lock does not imply a subsequent obtain-dot-lock will succeed, as another party may have acquired the lock between break-dot-lock and obtain-dot-lock.
Releases the lock for file-name. On success, release-dot-lock returns #t, otherwise #f. Note that this procedure can also be used to break the lock for file-name.
The procedure with-dot-lock* obtains the requested lock, and then calls (thunk). When thunk returns, the lock is released. A non-local exit (e.g., throwing to a saved continuation or raising an exception) also causes the lock to be released.After a normal return from thunk, its return values are returned by with-dot-lock*. The with-dot-lock special form is equivalent syntactic sugar.
(Note: the functionality presented in this section is still somewhat experimental and thus subject to interface changes.)
The procedures in this section provide access to the 4.2BSD syslog facility present in most POSIX systems. The functionality is in a structure called syslog. There's an additional structure syslog-channels documented below. The scsh interface to the syslog facility differs significantly from that of the Unix library functionality in order to support multiple simultaneous connections to the syslog facility.
Log messages carry a variety of parameters beside the text of the message itself, namely a set of options controlling the output format and destination, the facility identifying the class of programs the message is coming from, an identifier specifying the conrete program, and the level identifying the importance of the message. Moreover, a log mask can prevent messages at certain levels to be actually sent to the syslog daemon.
A log option specifies details of the I/O behavior of the syslog facility. A syslog option is an element of a finite type (see the Scheme 48 manual) constructed by the syslog-option macro. The syslog facility works with sets of options which are represented as enum sets (see the Scheme 48 manual).
Syslog-option constructs a log option from the name of an option. (The possible names are listed below.) Syslog-option? is a predicate for log options. Options are comparable using eq?. Make-syslog-options constructs a set of options from a list of options. Syslog-options is a macro which expands into an expression returning a set of options from names. Syslog-options? is a predicate for sets of options.Here is a list of possible names of syslog options:
NOTA BENE: The delay and no-delay options are included for completeness, but do not have the expected effect in the present Scheme interface: Because the Scheme interface has to multiplex multiple simultaneous connections to the syslog facility over a single one, open and close operations on that facility happen at unpredictable times.
A log facility identifies the originator of a log message from a finite set known to the system. Each originator is identified by a name:
Syslog-facility is macro that expands into an expression returning a facility for a given name. Syslog-facility? is a predicate for facilities. Facilities are comparable via eq?.Here is a list of possible names of syslog facilities:
A log level identifies the importance of a message from a fixed set of possible levels.
Syslog-level is macro that expands into an expression returning a facility for a given name. Syslog-level? is a predicate for facilities. Levels are comparable via eq?.Here is a list of possible names of syslog levels:
A log masks can mask out log messages at a set of levels. A log mask is an enum set of log levels.
Make-syslog-mask constructs a mask from a list of levels. Syslog-mask is a macro which constructs a mask from names of levels. Syslog-mask-all is a predefined log mask containing all levels. Syslog-mask-upto returns a mask consisting of all levels up to and including a certain level, starting with emergency.
Scheme 48 dynamically maintains implicit connections to the syslog facility specifying a current identifier, current options, a current facility and a current log mask. This implicit connection is held in a thread fluid (see Section 9.5). Hence, every thread maintains it own implicit connection to syslog. Note that the connection is not implicitly preserved across a spawn, but it is preserved across a fork-thread:
With-syslog-destination dynamically binds parameters of the implicit connection to the syslog facility and runs thunk within those parameter bindings, returning what thunk returns. Each of the parameters may be #f in which case the previous values will be used. Set-syslog-destination! sets the parameters of the implicit connection of the current thread.
Syslog actually logs a message. Each of the parameters of the implicit connection (except for the log mask) can be explicitly specified as well for the current call to syslog, overriding the parameters of the channel. The parameters revert to their original values after the call.
The syslog-channels structure allows direct manipulation of syslog channels, the objects that represent connections to the syslog facility. Note that it is not necessary to explicitly open a syslog channel to do logging.
Open-syslog-channel and close-syslog-channel create and destroy a connection to the syslog facility, respectively. The specified form of calling syslog logs to the specified channel.
Scsh provides a direct interface to the MD5 functions to compute the ``fingerprint'' or ``message digest'' of a file or string. It uses the C library written by Colin Plum.
Calculates the MD5 digest for the given string.
Reads the contents of the port and calculates the MD5 digest for it. The optional argument buffer-size determines the size of the port's input buffer in bytes. It defaults to 1024 bytes.
The type predicate for MD5 digests: md5-digest? returns true if and only if thing is a MD5 digest.
Returns the number corresponding to the MD5 digest.
Creates a MD5 digest from a number.
These procedures provide a low-level interface to the library. A md5-context stores the state of a MD5 computation, it is created by make-md5-context, its type predicate is md5-context?. The procedure update-md5-context! extends the md5-context by the given string. Finally, md5-context->md5-digest returns the md5-digest for the md5-context. With these procedures it is possible to incrementally add strings to a md5-context before computing the digest.