xref: /minix3/usr.bin/make/lst.lib/lstNext.c (revision 2e2caf591948f38f31c4e679c6277d2cb999cee7)
1*2e2caf59SThomas Veerman /*	$NetBSD: lstNext.c,v 1.12 2008/12/13 15:19:29 dsl Exp $	*/
2*2e2caf59SThomas Veerman 
3*2e2caf59SThomas Veerman /*
4*2e2caf59SThomas Veerman  * Copyright (c) 1988, 1989, 1990, 1993
5*2e2caf59SThomas Veerman  *	The Regents of the University of California.  All rights reserved.
6*2e2caf59SThomas Veerman  *
7*2e2caf59SThomas Veerman  * This code is derived from software contributed to Berkeley by
8*2e2caf59SThomas Veerman  * Adam de Boor.
9*2e2caf59SThomas Veerman  *
10*2e2caf59SThomas Veerman  * Redistribution and use in source and binary forms, with or without
11*2e2caf59SThomas Veerman  * modification, are permitted provided that the following conditions
12*2e2caf59SThomas Veerman  * are met:
13*2e2caf59SThomas Veerman  * 1. Redistributions of source code must retain the above copyright
14*2e2caf59SThomas Veerman  *    notice, this list of conditions and the following disclaimer.
15*2e2caf59SThomas Veerman  * 2. Redistributions in binary form must reproduce the above copyright
16*2e2caf59SThomas Veerman  *    notice, this list of conditions and the following disclaimer in the
17*2e2caf59SThomas Veerman  *    documentation and/or other materials provided with the distribution.
18*2e2caf59SThomas Veerman  * 3. Neither the name of the University nor the names of its contributors
19*2e2caf59SThomas Veerman  *    may be used to endorse or promote products derived from this software
20*2e2caf59SThomas Veerman  *    without specific prior written permission.
21*2e2caf59SThomas Veerman  *
22*2e2caf59SThomas Veerman  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23*2e2caf59SThomas Veerman  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24*2e2caf59SThomas Veerman  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25*2e2caf59SThomas Veerman  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26*2e2caf59SThomas Veerman  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27*2e2caf59SThomas Veerman  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28*2e2caf59SThomas Veerman  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29*2e2caf59SThomas Veerman  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30*2e2caf59SThomas Veerman  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31*2e2caf59SThomas Veerman  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32*2e2caf59SThomas Veerman  * SUCH DAMAGE.
33*2e2caf59SThomas Veerman  */
34*2e2caf59SThomas Veerman 
35*2e2caf59SThomas Veerman #ifndef MAKE_NATIVE
36*2e2caf59SThomas Veerman static char rcsid[] = "$NetBSD: lstNext.c,v 1.12 2008/12/13 15:19:29 dsl Exp $";
37*2e2caf59SThomas Veerman #else
38*2e2caf59SThomas Veerman #include <sys/cdefs.h>
39*2e2caf59SThomas Veerman #ifndef lint
40*2e2caf59SThomas Veerman #if 0
41*2e2caf59SThomas Veerman static char sccsid[] = "@(#)lstNext.c	8.1 (Berkeley) 6/6/93";
42*2e2caf59SThomas Veerman #else
43*2e2caf59SThomas Veerman __RCSID("$NetBSD: lstNext.c,v 1.12 2008/12/13 15:19:29 dsl Exp $");
44*2e2caf59SThomas Veerman #endif
45*2e2caf59SThomas Veerman #endif /* not lint */
46*2e2caf59SThomas Veerman #endif
47*2e2caf59SThomas Veerman 
48*2e2caf59SThomas Veerman /*-
49*2e2caf59SThomas Veerman  * LstNext.c --
50*2e2caf59SThomas Veerman  *	Return the next node for a list.
51*2e2caf59SThomas Veerman  *	The sequential functions access the list in a slightly different way.
52*2e2caf59SThomas Veerman  *	CurPtr points to their idea of the current node in the list and they
53*2e2caf59SThomas Veerman  *	access the list based on it. Because the list is circular, Lst_Next
54*2e2caf59SThomas Veerman  *	and Lst_Prev will go around the list forever. Lst_IsAtEnd must be
55*2e2caf59SThomas Veerman  *	used to determine when to stop.
56*2e2caf59SThomas Veerman  */
57*2e2caf59SThomas Veerman 
58*2e2caf59SThomas Veerman #include	"lstInt.h"
59*2e2caf59SThomas Veerman 
60*2e2caf59SThomas Veerman /*-
61*2e2caf59SThomas Veerman  *-----------------------------------------------------------------------
62*2e2caf59SThomas Veerman  * Lst_Next --
63*2e2caf59SThomas Veerman  *	Return the next node for the given list.
64*2e2caf59SThomas Veerman  *
65*2e2caf59SThomas Veerman  * Results:
66*2e2caf59SThomas Veerman  *	The next node or NULL if the list has yet to be opened. Also
67*2e2caf59SThomas Veerman  *	if the list is non-circular and the end has been reached, NULL
68*2e2caf59SThomas Veerman  *	is returned.
69*2e2caf59SThomas Veerman  *
70*2e2caf59SThomas Veerman  * Side Effects:
71*2e2caf59SThomas Veerman  *	the curPtr field is updated.
72*2e2caf59SThomas Veerman  *
73*2e2caf59SThomas Veerman  *-----------------------------------------------------------------------
74*2e2caf59SThomas Veerman  */
75*2e2caf59SThomas Veerman LstNode
Lst_Next(Lst l)76*2e2caf59SThomas Veerman Lst_Next(Lst l)
77*2e2caf59SThomas Veerman {
78*2e2caf59SThomas Veerman     ListNode	tln;
79*2e2caf59SThomas Veerman     List 	list = l;
80*2e2caf59SThomas Veerman 
81*2e2caf59SThomas Veerman     if ((LstValid (l) == FALSE) ||
82*2e2caf59SThomas Veerman 	(list->isOpen == FALSE)) {
83*2e2caf59SThomas Veerman 	    return NULL;
84*2e2caf59SThomas Veerman     }
85*2e2caf59SThomas Veerman 
86*2e2caf59SThomas Veerman     list->prevPtr = list->curPtr;
87*2e2caf59SThomas Veerman 
88*2e2caf59SThomas Veerman     if (list->curPtr == NULL) {
89*2e2caf59SThomas Veerman 	if (list->atEnd == Unknown) {
90*2e2caf59SThomas Veerman 	    /*
91*2e2caf59SThomas Veerman 	     * If we're just starting out, atEnd will be Unknown.
92*2e2caf59SThomas Veerman 	     * Then we want to start this thing off in the right
93*2e2caf59SThomas Veerman 	     * direction -- at the start with atEnd being Middle.
94*2e2caf59SThomas Veerman 	     */
95*2e2caf59SThomas Veerman 	    list->curPtr = tln = list->firstPtr;
96*2e2caf59SThomas Veerman 	    list->atEnd = Middle;
97*2e2caf59SThomas Veerman 	} else {
98*2e2caf59SThomas Veerman 	    tln = NULL;
99*2e2caf59SThomas Veerman 	    list->atEnd = Tail;
100*2e2caf59SThomas Veerman 	}
101*2e2caf59SThomas Veerman     } else {
102*2e2caf59SThomas Veerman 	tln = list->curPtr->nextPtr;
103*2e2caf59SThomas Veerman 	list->curPtr = tln;
104*2e2caf59SThomas Veerman 
105*2e2caf59SThomas Veerman 	if (tln == list->firstPtr || tln == NULL) {
106*2e2caf59SThomas Veerman 	    /*
107*2e2caf59SThomas Veerman 	     * If back at the front, then we've hit the end...
108*2e2caf59SThomas Veerman 	     */
109*2e2caf59SThomas Veerman 	    list->atEnd = Tail;
110*2e2caf59SThomas Veerman 	} else {
111*2e2caf59SThomas Veerman 	    /*
112*2e2caf59SThomas Veerman 	     * Reset to Middle if gone past first.
113*2e2caf59SThomas Veerman 	     */
114*2e2caf59SThomas Veerman 	    list->atEnd = Middle;
115*2e2caf59SThomas Veerman 	}
116*2e2caf59SThomas Veerman     }
117*2e2caf59SThomas Veerman 
118*2e2caf59SThomas Veerman     return (tln);
119*2e2caf59SThomas Veerman }
120*2e2caf59SThomas Veerman 
121