This is a live mirror of the Perl 5 development currently hosted at https://github.com/perl/perl5
[perl #21839] perluniintro.pod: nice_string() doesn't escape
[perl5.git] / pod / perlapi.pod
CommitLineData
954c1994
GS
1=head1 NAME
2
3perlapi - autogenerated documentation for the perl public API
4
5=head1 DESCRIPTION
6
1c846c1f
NIS
7This file contains the documentation of the perl public API generated by
8embed.pl, specifically a listing of functions, macros, flags, and variables
9that may be used by extension writers. The interfaces of any functions that
954c1994
GS
10are not listed here are subject to change without notice. For this reason,
11blindly using functions listed in proto.h is to be avoided when writing
12extensions.
13
14Note that all Perl API global variables must be referenced with the C<PL_>
15prefix. Some macros are provided for compatibility with the older,
16unadorned names, but this support may be disabled in a future release.
17
18The listing is alphabetical, case insensitive.
19
94bdecf9
JH
20
21=head1 "Gimme" Values
22
23=over 8
24
25=item GIMME
26
27A backward-compatible version of C<GIMME_V> which can only return
28C<G_SCALAR> or C<G_ARRAY>; in a void context, it returns C<G_SCALAR>.
29Deprecated. Use C<GIMME_V> instead.
30
31 U32 GIMME
32
33=for hackers
34Found in file op.h
35
36=item GIMME_V
37
38The XSUB-writer's equivalent to Perl's C<wantarray>. Returns C<G_VOID>,
39C<G_SCALAR> or C<G_ARRAY> for void, scalar or list context,
40respectively.
41
42 U32 GIMME_V
43
44=for hackers
45Found in file op.h
46
47=item G_ARRAY
48
49Used to indicate list context. See C<GIMME_V>, C<GIMME> and
50L<perlcall>.
51
52=for hackers
53Found in file cop.h
54
55=item G_DISCARD
56
57Indicates that arguments returned from a callback should be discarded. See
58L<perlcall>.
59
60=for hackers
61Found in file cop.h
62
63=item G_EVAL
64
65Used to force a Perl C<eval> wrapper around a callback. See
66L<perlcall>.
67
68=for hackers
69Found in file cop.h
70
71=item G_NOARGS
72
73Indicates that no arguments are being sent to a callback. See
74L<perlcall>.
75
76=for hackers
77Found in file cop.h
78
79=item G_SCALAR
80
81Used to indicate scalar context. See C<GIMME_V>, C<GIMME>, and
82L<perlcall>.
83
84=for hackers
85Found in file cop.h
86
87=item G_VOID
88
89Used to indicate void context. See C<GIMME_V> and L<perlcall>.
90
91=for hackers
92Found in file cop.h
93
94
95=back
96
97=head1 Array Manipulation Functions
98
954c1994
GS
99=over 8
100
101=item AvFILL
102
103Same as C<av_len()>. Deprecated, use C<av_len()> instead.
104
105 int AvFILL(AV* av)
106
497711e7
GS
107=for hackers
108Found in file av.h
109
954c1994
GS
110=item av_clear
111
112Clears an array, making it empty. Does not free the memory used by the
113array itself.
114
115 void av_clear(AV* ar)
116
497711e7
GS
117=for hackers
118Found in file av.c
119
f3b76584
SC
120=item av_delete
121
122Deletes the element indexed by C<key> from the array. Returns the
123deleted element. C<flags> is currently ignored.
124
125 SV* av_delete(AV* ar, I32 key, I32 flags)
126
127=for hackers
128Found in file av.c
129
130=item av_exists
131
132Returns true if the element indexed by C<key> has been initialized.
133
134This relies on the fact that uninitialized array elements are set to
135C<&PL_sv_undef>.
136
137 bool av_exists(AV* ar, I32 key)
138
139=for hackers
140Found in file av.c
141
954c1994
GS
142=item av_extend
143
144Pre-extend an array. The C<key> is the index to which the array should be
145extended.
146
147 void av_extend(AV* ar, I32 key)
148
497711e7
GS
149=for hackers
150Found in file av.c
151
954c1994
GS
152=item av_fetch
153
154Returns the SV at the specified index in the array. The C<key> is the
155index. If C<lval> is set then the fetch will be part of a store. Check
156that the return value is non-null before dereferencing it to a C<SV*>.
157
96f1132b
GS
158See L<perlguts/"Understanding the Magic of Tied Hashes and Arrays"> for
159more information on how to use this function on tied arrays.
954c1994
GS
160
161 SV** av_fetch(AV* ar, I32 key, I32 lval)
162
497711e7
GS
163=for hackers
164Found in file av.c
165
f3b76584
SC
166=item av_fill
167
168Ensure than an array has a given number of elements, equivalent to
169Perl's C<$#array = $fill;>.
170
171 void av_fill(AV* ar, I32 fill)
172
173=for hackers
174Found in file av.c
175
954c1994
GS
176=item av_len
177
178Returns the highest index in the array. Returns -1 if the array is
179empty.
180
181 I32 av_len(AV* ar)
182
497711e7
GS
183=for hackers
184Found in file av.c
185
954c1994
GS
186=item av_make
187
188Creates a new AV and populates it with a list of SVs. The SVs are copied
189into the array, so they may be freed after the call to av_make. The new AV
190will have a reference count of 1.
191
192 AV* av_make(I32 size, SV** svp)
193
497711e7
GS
194=for hackers
195Found in file av.c
196
954c1994
GS
197=item av_pop
198
199Pops an SV off the end of the array. Returns C<&PL_sv_undef> if the array
200is empty.
201
202 SV* av_pop(AV* ar)
203
497711e7
GS
204=for hackers
205Found in file av.c
206
954c1994
GS
207=item av_push
208
209Pushes an SV onto the end of the array. The array will grow automatically
210to accommodate the addition.
211
212 void av_push(AV* ar, SV* val)
213
497711e7
GS
214=for hackers
215Found in file av.c
216
954c1994
GS
217=item av_shift
218
219Shifts an SV off the beginning of the array.
220
221 SV* av_shift(AV* ar)
222
497711e7
GS
223=for hackers
224Found in file av.c
225
954c1994
GS
226=item av_store
227
228Stores an SV in an array. The array index is specified as C<key>. The
229return value will be NULL if the operation failed or if the value did not
230need to be actually stored within the array (as in the case of tied
231arrays). Otherwise it can be dereferenced to get the original C<SV*>. Note
232that the caller is responsible for suitably incrementing the reference
233count of C<val> before the call, and decrementing it if the function
234returned NULL.
235
96f1132b 236See L<perlguts/"Understanding the Magic of Tied Hashes and Arrays"> for
954c1994
GS
237more information on how to use this function on tied arrays.
238
239 SV** av_store(AV* ar, I32 key, SV* val)
240
497711e7
GS
241=for hackers
242Found in file av.c
243
954c1994
GS
244=item av_undef
245
246Undefines the array. Frees the memory used by the array itself.
247
248 void av_undef(AV* ar)
249
497711e7
GS
250=for hackers
251Found in file av.c
252
954c1994
GS
253=item av_unshift
254
255Unshift the given number of C<undef> values onto the beginning of the
256array. The array will grow automatically to accommodate the addition. You
257must then use C<av_store> to assign values to these new elements.
258
259 void av_unshift(AV* ar, I32 num)
260
497711e7
GS
261=for hackers
262Found in file av.c
263
94bdecf9 264=item get_av
9f2ea798 265
94bdecf9
JH
266Returns the AV of the specified Perl array. If C<create> is set and the
267Perl variable does not exist then it will be created. If C<create> is not
268set and the variable does not exist then NULL is returned.
9f2ea798 269
94bdecf9
JH
270NOTE: the perl_ form of this function is deprecated.
271
272 AV* get_av(const char* name, I32 create)
9f2ea798
DM
273
274=for hackers
94bdecf9 275Found in file perl.c
9f2ea798 276
94bdecf9 277=item newAV
f9a63242 278
94bdecf9 279Creates a new AV. The reference count is set to 1.
f9a63242 280
94bdecf9
JH
281 AV* newAV()
282
283=for hackers
284Found in file av.c
285
286=item Nullav
287
288Null AV pointer.
f9a63242 289
f9a63242
JH
290
291=for hackers
94bdecf9 292Found in file av.h
f9a63242 293
94bdecf9 294=item sortsv
497711e7 295
94bdecf9 296Sort an array. Here is an example:
497711e7 297
94bdecf9 298 sortsv(AvARRAY(av), av_len(av)+1, Perl_sv_cmp_locale);
eebe1485 299
641d4181
JH
300See lib/sort.pm for details about controlling the sorting algorithm.
301
94bdecf9 302 void sortsv(SV ** array, size_t num_elts, SVCOMPARE_t cmp)
497711e7
GS
303
304=for hackers
94bdecf9
JH
305Found in file pp_sort.c
306
307
308=back
309
310=head1 Callback Functions
311
312=over 8
497711e7 313
954c1994
GS
314=item call_argv
315
316Performs a callback to the specified Perl sub. See L<perlcall>.
317
318NOTE: the perl_ form of this function is deprecated.
319
320 I32 call_argv(const char* sub_name, I32 flags, char** argv)
321
497711e7
GS
322=for hackers
323Found in file perl.c
324
954c1994
GS
325=item call_method
326
327Performs a callback to the specified Perl method. The blessed object must
328be on the stack. See L<perlcall>.
329
330NOTE: the perl_ form of this function is deprecated.
331
332 I32 call_method(const char* methname, I32 flags)
333
497711e7
GS
334=for hackers
335Found in file perl.c
336
954c1994
GS
337=item call_pv
338
339Performs a callback to the specified Perl sub. See L<perlcall>.
340
341NOTE: the perl_ form of this function is deprecated.
342
343 I32 call_pv(const char* sub_name, I32 flags)
344
497711e7
GS
345=for hackers
346Found in file perl.c
347
954c1994
GS
348=item call_sv
349
350Performs a callback to the Perl sub whose name is in the SV. See
351L<perlcall>.
352
353NOTE: the perl_ form of this function is deprecated.
354
355 I32 call_sv(SV* sv, I32 flags)
356
497711e7
GS
357=for hackers
358Found in file perl.c
359
94bdecf9 360=item ENTER
954c1994 361
94bdecf9 362Opening bracket on a callback. See C<LEAVE> and L<perlcall>.
954c1994 363
94bdecf9 364 ENTER;
954c1994 365
497711e7 366=for hackers
94bdecf9 367Found in file scope.h
497711e7 368
94bdecf9 369=item eval_pv
954c1994 370
94bdecf9 371Tells Perl to C<eval> the given string and return an SV* result.
954c1994 372
94bdecf9 373NOTE: the perl_ form of this function is deprecated.
954c1994 374
94bdecf9 375 SV* eval_pv(const char* p, I32 croak_on_error)
497711e7 376
94bdecf9
JH
377=for hackers
378Found in file perl.c
954c1994 379
94bdecf9 380=item eval_sv
c9d5ac95 381
94bdecf9 382Tells Perl to C<eval> the string in the SV.
c9d5ac95 383
94bdecf9 384NOTE: the perl_ form of this function is deprecated.
954c1994 385
94bdecf9 386 I32 eval_sv(SV* sv, I32 flags)
954c1994 387
497711e7 388=for hackers
94bdecf9 389Found in file perl.c
497711e7 390
94bdecf9 391=item FREETMPS
954c1994 392
94bdecf9
JH
393Closing bracket for temporaries on a callback. See C<SAVETMPS> and
394L<perlcall>.
954c1994 395
94bdecf9 396 FREETMPS;
954c1994 397
497711e7 398=for hackers
94bdecf9 399Found in file scope.h
beab0874 400
94bdecf9 401=item LEAVE
beab0874 402
94bdecf9 403Closing bracket on a callback. See C<ENTER> and L<perlcall>.
beab0874 404
94bdecf9 405 LEAVE;
beab0874
JT
406
407=for hackers
94bdecf9 408Found in file scope.h
beab0874 409
94bdecf9 410=item SAVETMPS
9f2ea798 411
94bdecf9
JH
412Opening bracket for temporaries on a callback. See C<FREETMPS> and
413L<perlcall>.
9f2ea798 414
94bdecf9 415 SAVETMPS;
9f2ea798
DM
416
417=for hackers
94bdecf9 418Found in file scope.h
9f2ea798 419
9f2ea798 420
94bdecf9 421=back
9f2ea798 422
94bdecf9 423=head1 Character classes
9f2ea798 424
94bdecf9 425=over 8
9f2ea798 426
94bdecf9 427=item isALNUM
954c1994 428
94bdecf9
JH
429Returns a boolean indicating whether the C C<char> is an ASCII alphanumeric
430character (including underscore) or digit.
954c1994 431
94bdecf9 432 bool isALNUM(char ch)
954c1994 433
497711e7 434=for hackers
94bdecf9 435Found in file handy.h
497711e7 436
94bdecf9 437=item isALPHA
954c1994 438
94bdecf9
JH
439Returns a boolean indicating whether the C C<char> is an ASCII alphabetic
440character.
954c1994 441
94bdecf9 442 bool isALPHA(char ch)
954c1994 443
497711e7 444=for hackers
94bdecf9 445Found in file handy.h
497711e7 446
94bdecf9 447=item isDIGIT
954c1994 448
94bdecf9
JH
449Returns a boolean indicating whether the C C<char> is an ASCII
450digit.
954c1994 451
94bdecf9 452 bool isDIGIT(char ch)
954c1994 453
497711e7 454=for hackers
94bdecf9 455Found in file handy.h
497711e7 456
94bdecf9 457=item isLOWER
954c1994 458
94bdecf9
JH
459Returns a boolean indicating whether the C C<char> is a lowercase
460character.
954c1994 461
94bdecf9 462 bool isLOWER(char ch)
954c1994 463
497711e7 464=for hackers
94bdecf9 465Found in file handy.h
497711e7 466
94bdecf9 467=item isSPACE
954c1994 468
94bdecf9 469Returns a boolean indicating whether the C C<char> is whitespace.
954c1994 470
94bdecf9 471 bool isSPACE(char ch)
954c1994 472
497711e7 473=for hackers
94bdecf9 474Found in file handy.h
497711e7 475
94bdecf9 476=item isUPPER
954c1994 477
94bdecf9
JH
478Returns a boolean indicating whether the C C<char> is an uppercase
479character.
954c1994 480
94bdecf9 481 bool isUPPER(char ch)
954c1994 482
497711e7 483=for hackers
94bdecf9 484Found in file handy.h
497711e7 485
94bdecf9 486=item toLOWER
954c1994 487
94bdecf9 488Converts the specified character to lowercase.
954c1994 489
94bdecf9 490 char toLOWER(char ch)
954c1994 491
94bdecf9
JH
492=for hackers
493Found in file handy.h
494
495=item toUPPER
496
497Converts the specified character to uppercase.
498
499 char toUPPER(char ch)
954c1994 500
497711e7 501=for hackers
94bdecf9 502Found in file handy.h
497711e7 503
954c1994 504
94bdecf9 505=back
954c1994 506
94bdecf9 507=head1 Cloning an interpreter
954c1994 508
94bdecf9
JH
509=over 8
510
511=item perl_clone
512
513Create and return a new interpreter by cloning the current one.
514
c78c2b74
HS
515perl_clone takes these flags as paramters:
516
517CLONEf_COPY_STACKS - is used to, well, copy the stacks also,
518without it we only clone the data and zero the stacks,
519with it we copy the stacks and the new perl interpreter is
520ready to run at the exact same point as the previous one.
521The pseudo-fork code uses COPY_STACKS while the
522threads->new doesn't.
523
524CLONEf_KEEP_PTR_TABLE
525perl_clone keeps a ptr_table with the pointer of the old
526variable as a key and the new variable as a value,
527this allows it to check if something has been cloned and not
528clone it again but rather just use the value and increase the
529refcount. If KEEP_PTR_TABLE is not set then perl_clone will kill
530the ptr_table using the function
531C<ptr_table_free(PL_ptr_table); PL_ptr_table = NULL;>,
532reason to keep it around is if you want to dup some of your own
533variable who are outside the graph perl scans, example of this
534code is in threads.xs create
535
536CLONEf_CLONE_HOST
537This is a win32 thing, it is ignored on unix, it tells perls
538win32host code (which is c++) to clone itself, this is needed on
539win32 if you want to run two threads at the same time,
540if you just want to do some stuff in a separate perl interpreter
541and then throw it away and return to the original one,
542you don't need to do anything.
543
94bdecf9 544 PerlInterpreter* perl_clone(PerlInterpreter* interp, UV flags)
954c1994 545
497711e7 546=for hackers
94bdecf9 547Found in file sv.c
497711e7 548
954c1994 549
94bdecf9 550=back
954c1994 551
94bdecf9
JH
552=head1 CV Manipulation Functions
553
554=over 8
555
556=item CvSTASH
557
558Returns the stash of the CV.
559
560 HV* CvSTASH(CV* cv)
954c1994 561
497711e7 562=for hackers
94bdecf9 563Found in file cv.h
497711e7 564
94bdecf9 565=item get_cv
954c1994 566
94bdecf9
JH
567Returns the CV of the specified Perl subroutine. If C<create> is set and
568the Perl subroutine does not exist then it will be declared (which has the
569same effect as saying C<sub name;>). If C<create> is not set and the
570subroutine does not exist then NULL is returned.
954c1994 571
94bdecf9
JH
572NOTE: the perl_ form of this function is deprecated.
573
574 CV* get_cv(const char* name, I32 create)
954c1994 575
497711e7 576=for hackers
94bdecf9 577Found in file perl.c
497711e7 578
94bdecf9 579=item Nullcv
954c1994 580
94bdecf9 581Null CV pointer.
954c1994 582
954c1994 583
497711e7 584=for hackers
94bdecf9 585Found in file cv.h
497711e7 586
7c9e965c 587
94bdecf9 588=back
7c9e965c 589
94bdecf9 590=head1 Embedding Functions
7c9e965c 591
94bdecf9 592=over 8
7c9e965c 593
7dafbf52
DM
594=item cv_undef
595
596Clear out all the active components of a CV. This can happen either
597by an explicit C<undef &foo>, or by the reference count going to zero.
598In the former case, we keep the CvOUTSIDE pointer, so that any anonymous
599children can still follow the full lexical scope chain.
600
601 void cv_undef(CV* cv)
602
603=for hackers
604Found in file op.c
605
94bdecf9 606=item load_module
7c9e965c 607
94bdecf9
JH
608Loads the module whose name is pointed to by the string part of name.
609Note that the actual module name, not its filename, should be given.
610Eg, "Foo::Bar" instead of "Foo/Bar.pm". flags can be any of
611PERL_LOADMOD_DENY, PERL_LOADMOD_NOIMPORT, or PERL_LOADMOD_IMPORT_OPS
612(or 0 for no flags). ver, if specified, provides version semantics
613similar to C<use Foo::Bar VERSION>. The optional trailing SV*
614arguments can be used to specify arguments to the module's import()
615method, similar to C<use Foo::Bar VERSION LIST>.
7c9e965c 616
94bdecf9 617 void load_module(U32 flags, SV* name, SV* ver, ...)
7c9e965c
JP
618
619=for hackers
94bdecf9 620Found in file op.c
7c9e965c 621
62375a60
NIS
622=item nothreadhook
623
624Stub that provides thread hook for perl_destruct when there are
625no threads.
626
627 int nothreadhook()
628
629=for hackers
630Found in file perl.c
631
94bdecf9 632=item perl_alloc
954c1994 633
94bdecf9 634Allocates a new Perl interpreter. See L<perlembed>.
954c1994 635
94bdecf9 636 PerlInterpreter* perl_alloc()
954c1994 637
497711e7 638=for hackers
94bdecf9 639Found in file perl.c
497711e7 640
94bdecf9 641=item perl_construct
89423764 642
94bdecf9 643Initializes a new Perl interpreter. See L<perlembed>.
89423764 644
94bdecf9 645 void perl_construct(PerlInterpreter* interp)
89423764
GS
646
647=for hackers
94bdecf9 648Found in file perl.c
954c1994 649
94bdecf9 650=item perl_destruct
954c1994 651
94bdecf9 652Shuts down a Perl interpreter. See L<perlembed>.
954c1994 653
94bdecf9 654 int perl_destruct(PerlInterpreter* interp)
954c1994 655
497711e7
GS
656=for hackers
657Found in file perl.c
658
94bdecf9 659=item perl_free
954c1994 660
94bdecf9 661Releases a Perl interpreter. See L<perlembed>.
954c1994 662
94bdecf9 663 void perl_free(PerlInterpreter* interp)
954c1994 664
497711e7
GS
665=for hackers
666Found in file perl.c
667
94bdecf9 668=item perl_parse
954c1994 669
94bdecf9 670Tells a Perl interpreter to parse a Perl script. See L<perlembed>.
954c1994 671
94bdecf9 672 int perl_parse(PerlInterpreter* interp, XSINIT_t xsinit, int argc, char** argv, char** env)
954c1994 673
94bdecf9
JH
674=for hackers
675Found in file perl.c
676
677=item perl_run
678
679Tells a Perl interpreter to run. See L<perlembed>.
680
681 int perl_run(PerlInterpreter* interp)
954c1994 682
497711e7
GS
683=for hackers
684Found in file perl.c
685
94bdecf9 686=item require_pv
954c1994 687
94bdecf9
JH
688Tells Perl to C<require> the file named by the string argument. It is
689analogous to the Perl code C<eval "require '$file'">. It's even
2307c6d0 690implemented that way; consider using load_module instead.
954c1994
GS
691
692NOTE: the perl_ form of this function is deprecated.
693
94bdecf9 694 void require_pv(const char* pv)
954c1994 695
497711e7
GS
696=for hackers
697Found in file perl.c
698
954c1994 699
94bdecf9 700=back
954c1994 701
6050d10e
JP
702=head1 Functions in file pp_pack.c
703
704
705=over 8
706
707=item pack_cat
708
709The engine implementing pack() Perl function.
710
711 void pack_cat(SV *cat, char *pat, char *patend, SV **beglist, SV **endlist, SV ***next_in_list, U32 flags)
712
713=for hackers
714Found in file pp_pack.c
715
716=item unpack_str
717
718The engine implementing unpack() Perl function.
719
720 I32 unpack_str(char *pat, char *patend, char *s, char *strbeg, char *strend, char **new_s, I32 ocnt, U32 flags)
721
722=for hackers
723Found in file pp_pack.c
724
725
726=back
727
94bdecf9 728=head1 Global Variables
954c1994 729
94bdecf9 730=over 8
497711e7 731
94bdecf9 732=item PL_modglobal
954c1994 733
94bdecf9
JH
734C<PL_modglobal> is a general purpose, interpreter global HV for use by
735extensions that need to keep information on a per-interpreter basis.
736In a pinch, it can also be used as a symbol table for extensions
737to share data among each other. It is a good idea to use keys
738prefixed by the package name of the extension that owns the data.
954c1994 739
94bdecf9 740 HV* PL_modglobal
954c1994 741
497711e7 742=for hackers
94bdecf9 743Found in file intrpvar.h
497711e7 744
94bdecf9 745=item PL_na
6e9d1081 746
94bdecf9
JH
747A convenience variable which is typically used with C<SvPV> when one
748doesn't care about the length of the string. It is usually more efficient
749to either declare a local variable and use that instead or to use the
750C<SvPV_nolen> macro.
6e9d1081 751
94bdecf9 752 STRLEN PL_na
6e9d1081 753
94bdecf9
JH
754=for hackers
755Found in file thrdvar.h
6e9d1081 756
94bdecf9 757=item PL_sv_no
6e9d1081 758
94bdecf9
JH
759This is the C<false> SV. See C<PL_sv_yes>. Always refer to this as
760C<&PL_sv_no>.
761
762 SV PL_sv_no
6e9d1081
NC
763
764=for hackers
94bdecf9 765Found in file intrpvar.h
6e9d1081 766
94bdecf9 767=item PL_sv_undef
6e9d1081 768
94bdecf9 769This is the C<undef> SV. Always refer to this as C<&PL_sv_undef>.
6e9d1081 770
94bdecf9 771 SV PL_sv_undef
6e9d1081 772
94bdecf9
JH
773=for hackers
774Found in file intrpvar.h
6e9d1081 775
94bdecf9 776=item PL_sv_yes
6e9d1081 777
94bdecf9
JH
778This is the C<true> SV. See C<PL_sv_no>. Always refer to this as
779C<&PL_sv_yes>.
780
781 SV PL_sv_yes
6e9d1081
NC
782
783=for hackers
94bdecf9 784Found in file intrpvar.h
6e9d1081 785
6e9d1081 786
94bdecf9 787=back
6e9d1081 788
94bdecf9 789=head1 GV Functions
6e9d1081 790
94bdecf9 791=over 8
6e9d1081 792
954c1994
GS
793=item GvSV
794
795Return the SV from the GV.
796
797 SV* GvSV(GV* gv)
798
497711e7
GS
799=for hackers
800Found in file gv.h
801
954c1994
GS
802=item gv_fetchmeth
803
804Returns the glob with the given C<name> and a defined subroutine or
805C<NULL>. The glob lives in the given C<stash>, or in the stashes
a453c169 806accessible via @ISA and UNIVERSAL::.
954c1994
GS
807
808The argument C<level> should be either 0 or -1. If C<level==0>, as a
809side-effect creates a glob with the given C<name> in the given C<stash>
810which in the case of success contains an alias for the subroutine, and sets
1c846c1f 811up caching info for this glob. Similarly for all the searched stashes.
954c1994
GS
812
813This function grants C<"SUPER"> token as a postfix of the stash name. The
814GV returned from C<gv_fetchmeth> may be a method cache entry, which is not
4929bf7b 815visible to Perl code. So when calling C<call_sv>, you should not use
954c1994 816the GV directly; instead, you should use the method's CV, which can be
1c846c1f 817obtained from the GV with the C<GvCV> macro.
954c1994
GS
818
819 GV* gv_fetchmeth(HV* stash, const char* name, STRLEN len, I32 level)
820
497711e7
GS
821=for hackers
822Found in file gv.c
823
954c1994
GS
824=item gv_fetchmethod
825
6d0f518e 826See L<gv_fetchmethod_autoload>.
954c1994
GS
827
828 GV* gv_fetchmethod(HV* stash, const char* name)
829
497711e7
GS
830=for hackers
831Found in file gv.c
832
954c1994
GS
833=item gv_fetchmethod_autoload
834
835Returns the glob which contains the subroutine to call to invoke the method
836on the C<stash>. In fact in the presence of autoloading this may be the
837glob for "AUTOLOAD". In this case the corresponding variable $AUTOLOAD is
1c846c1f 838already setup.
954c1994
GS
839
840The third parameter of C<gv_fetchmethod_autoload> determines whether
841AUTOLOAD lookup is performed if the given method is not present: non-zero
1c846c1f 842means yes, look for AUTOLOAD; zero means no, don't look for AUTOLOAD.
954c1994 843Calling C<gv_fetchmethod> is equivalent to calling C<gv_fetchmethod_autoload>
1c846c1f 844with a non-zero C<autoload> parameter.
954c1994
GS
845
846These functions grant C<"SUPER"> token as a prefix of the method name. Note
847that if you want to keep the returned glob for a long time, you need to
848check for it being "AUTOLOAD", since at the later time the call may load a
849different subroutine due to $AUTOLOAD changing its value. Use the glob
1c846c1f 850created via a side effect to do this.
954c1994
GS
851
852These functions have the same side-effects and as C<gv_fetchmeth> with
853C<level==0>. C<name> should be writable if contains C<':'> or C<'
854''>. The warning against passing the GV returned by C<gv_fetchmeth> to
1c846c1f 855C<call_sv> apply equally to these functions.
954c1994
GS
856
857 GV* gv_fetchmethod_autoload(HV* stash, const char* name, I32 autoload)
858
497711e7
GS
859=for hackers
860Found in file gv.c
861
0c81b680
JH
862=item gv_fetchmeth_autoload
863
864Same as gv_fetchmeth(), but looks for autoloaded subroutines too.
865Returns a glob for the subroutine.
866
867For an autoloaded subroutine without a GV, will create a GV even
868if C<level < 0>. For an autoloaded subroutine without a stub, GvCV()
869of the result may be zero.
870
871 GV* gv_fetchmeth_autoload(HV* stash, const char* name, STRLEN len, I32 level)
872
873=for hackers
874Found in file gv.c
875
954c1994
GS
876=item gv_stashpv
877
386d01d6
GS
878Returns a pointer to the stash for a specified package. C<name> should
879be a valid UTF-8 string. If C<create> is set then the package will be
880created if it does not already exist. If C<create> is not set and the
881package does not exist then NULL is returned.
954c1994
GS
882
883 HV* gv_stashpv(const char* name, I32 create)
884
497711e7
GS
885=for hackers
886Found in file gv.c
887
954c1994
GS
888=item gv_stashsv
889
386d01d6
GS
890Returns a pointer to the stash for a specified package, which must be a
891valid UTF-8 string. See C<gv_stashpv>.
954c1994
GS
892
893 HV* gv_stashsv(SV* sv, I32 create)
894
497711e7
GS
895=for hackers
896Found in file gv.c
897
954c1994 898
94bdecf9 899=back
954c1994 900
94bdecf9 901=head1 Handy Values
497711e7 902
94bdecf9 903=over 8
954c1994 904
94bdecf9 905=item HEf_SVKEY
954c1994 906
94bdecf9
JH
907This flag, used in the length slot of hash entries and magic structures,
908specifies the structure contains an C<SV*> pointer where a C<char*> pointer
909is to be expected. (For information only--not to be used).
497711e7 910
954c1994 911
94bdecf9
JH
912=for hackers
913Found in file hv.h
954c1994 914
dd2155a4 915=item Nullch
94bdecf9
JH
916
917Null character pointer.
2307c6d0 918
497711e7 919=for hackers
94bdecf9 920Found in file handy.h
497711e7 921
94bdecf9 922=item Nullsv
954c1994 923
94bdecf9 924Null SV pointer.
954c1994 925
497711e7 926=for hackers
94bdecf9 927Found in file handy.h
497711e7 928
954c1994 929
94bdecf9 930=back
954c1994 931
94bdecf9 932=head1 Hash Manipulation Functions
497711e7 933
94bdecf9 934=over 8
954c1994 935
94bdecf9 936=item get_hv
954c1994 937
94bdecf9
JH
938Returns the HV of the specified Perl hash. If C<create> is set and the
939Perl variable does not exist then it will be created. If C<create> is not
940set and the variable does not exist then NULL is returned.
497711e7 941
94bdecf9 942NOTE: the perl_ form of this function is deprecated.
954c1994 943
94bdecf9 944 HV* get_hv(const char* name, I32 create)
954c1994 945
497711e7 946=for hackers
94bdecf9 947Found in file perl.c
497711e7 948
954c1994
GS
949=item HeHASH
950
951Returns the computed hash stored in the hash entry.
952
953 U32 HeHASH(HE* he)
954
497711e7
GS
955=for hackers
956Found in file hv.h
957
954c1994
GS
958=item HeKEY
959
960Returns the actual pointer stored in the key slot of the hash entry. The
961pointer may be either C<char*> or C<SV*>, depending on the value of
962C<HeKLEN()>. Can be assigned to. The C<HePV()> or C<HeSVKEY()> macros are
963usually preferable for finding the value of a key.
964
965 void* HeKEY(HE* he)
966
497711e7
GS
967=for hackers
968Found in file hv.h
969
954c1994
GS
970=item HeKLEN
971
972If this is negative, and amounts to C<HEf_SVKEY>, it indicates the entry
973holds an C<SV*> key. Otherwise, holds the actual length of the key. Can
974be assigned to. The C<HePV()> macro is usually preferable for finding key
975lengths.
976
977 STRLEN HeKLEN(HE* he)
978
497711e7
GS
979=for hackers
980Found in file hv.h
981
954c1994
GS
982=item HePV
983
984Returns the key slot of the hash entry as a C<char*> value, doing any
985necessary dereferencing of possibly C<SV*> keys. The length of the string
986is placed in C<len> (this is a macro, so do I<not> use C<&len>). If you do
987not care about what the length of the key is, you may use the global
988variable C<PL_na>, though this is rather less efficient than using a local
989variable. Remember though, that hash keys in perl are free to contain
990embedded nulls, so using C<strlen()> or similar is not a good way to find
991the length of hash keys. This is very similar to the C<SvPV()> macro
992described elsewhere in this document.
993
994 char* HePV(HE* he, STRLEN len)
995
497711e7
GS
996=for hackers
997Found in file hv.h
998
954c1994
GS
999=item HeSVKEY
1000
1001Returns the key as an C<SV*>, or C<Nullsv> if the hash entry does not
1002contain an C<SV*> key.
1003
1004 SV* HeSVKEY(HE* he)
1005
497711e7
GS
1006=for hackers
1007Found in file hv.h
1008
954c1994
GS
1009=item HeSVKEY_force
1010
1011Returns the key as an C<SV*>. Will create and return a temporary mortal
1012C<SV*> if the hash entry contains only a C<char*> key.
1013
1014 SV* HeSVKEY_force(HE* he)
1015
497711e7
GS
1016=for hackers
1017Found in file hv.h
1018
954c1994
GS
1019=item HeSVKEY_set
1020
1021Sets the key to a given C<SV*>, taking care to set the appropriate flags to
1022indicate the presence of an C<SV*> key, and returns the same
1023C<SV*>.
1024
1025 SV* HeSVKEY_set(HE* he, SV* sv)
1026
497711e7
GS
1027=for hackers
1028Found in file hv.h
1029
954c1994
GS
1030=item HeVAL
1031
1032Returns the value slot (type C<SV*>) stored in the hash entry.
1033
1034 SV* HeVAL(HE* he)
1035
497711e7
GS
1036=for hackers
1037Found in file hv.h
1038
954c1994
GS
1039=item HvNAME
1040
1041Returns the package name of a stash. See C<SvSTASH>, C<CvSTASH>.
1042
1043 char* HvNAME(HV* stash)
1044
497711e7
GS
1045=for hackers
1046Found in file hv.h
1047
954c1994
GS
1048=item hv_clear
1049
1050Clears a hash, making it empty.
1051
1052 void hv_clear(HV* tb)
1053
497711e7
GS
1054=for hackers
1055Found in file hv.c
1056
954c1994
GS
1057=item hv_delete
1058
1059Deletes a key/value pair in the hash. The value SV is removed from the
1c846c1f 1060hash and returned to the caller. The C<klen> is the length of the key.
954c1994
GS
1061The C<flags> value will normally be zero; if set to G_DISCARD then NULL
1062will be returned.
1063
da58a35d 1064 SV* hv_delete(HV* tb, const char* key, I32 klen, I32 flags)
954c1994 1065
497711e7
GS
1066=for hackers
1067Found in file hv.c
1068
954c1994
GS
1069=item hv_delete_ent
1070
1071Deletes a key/value pair in the hash. The value SV is removed from the
1072hash and returned to the caller. The C<flags> value will normally be zero;
1073if set to G_DISCARD then NULL will be returned. C<hash> can be a valid
1074precomputed hash value, or 0 to ask for it to be computed.
1075
1076 SV* hv_delete_ent(HV* tb, SV* key, I32 flags, U32 hash)
1077
497711e7
GS
1078=for hackers
1079Found in file hv.c
1080
954c1994
GS
1081=item hv_exists
1082
1083Returns a boolean indicating whether the specified hash key exists. The
1084C<klen> is the length of the key.
1085
da58a35d 1086 bool hv_exists(HV* tb, const char* key, I32 klen)
954c1994 1087
497711e7
GS
1088=for hackers
1089Found in file hv.c
1090
954c1994
GS
1091=item hv_exists_ent
1092
1093Returns a boolean indicating whether the specified hash key exists. C<hash>
1094can be a valid precomputed hash value, or 0 to ask for it to be
1095computed.
1096
1097 bool hv_exists_ent(HV* tb, SV* key, U32 hash)
1098
497711e7
GS
1099=for hackers
1100Found in file hv.c
1101
954c1994
GS
1102=item hv_fetch
1103
1104Returns the SV which corresponds to the specified key in the hash. The
1105C<klen> is the length of the key. If C<lval> is set then the fetch will be
1106part of a store. Check that the return value is non-null before
f4758303 1107dereferencing it to an C<SV*>.
954c1994 1108
96f1132b 1109See L<perlguts/"Understanding the Magic of Tied Hashes and Arrays"> for more
954c1994
GS
1110information on how to use this function on tied hashes.
1111
da58a35d 1112 SV** hv_fetch(HV* tb, const char* key, I32 klen, I32 lval)
954c1994 1113
497711e7
GS
1114=for hackers
1115Found in file hv.c
1116
954c1994
GS
1117=item hv_fetch_ent
1118
1119Returns the hash entry which corresponds to the specified key in the hash.
1120C<hash> must be a valid precomputed hash number for the given C<key>, or 0
1121if you want the function to compute it. IF C<lval> is set then the fetch
1122will be part of a store. Make sure the return value is non-null before
1123accessing it. The return value when C<tb> is a tied hash is a pointer to a
1124static location, so be sure to make a copy of the structure if you need to
1c846c1f 1125store it somewhere.
954c1994 1126
96f1132b 1127See L<perlguts/"Understanding the Magic of Tied Hashes and Arrays"> for more
954c1994
GS
1128information on how to use this function on tied hashes.
1129
1130 HE* hv_fetch_ent(HV* tb, SV* key, I32 lval, U32 hash)
1131
497711e7
GS
1132=for hackers
1133Found in file hv.c
1134
954c1994
GS
1135=item hv_iterinit
1136
1137Prepares a starting point to traverse a hash table. Returns the number of
1138keys in the hash (i.e. the same as C<HvKEYS(tb)>). The return value is
1c846c1f 1139currently only meaningful for hashes without tie magic.
954c1994
GS
1140
1141NOTE: Before version 5.004_65, C<hv_iterinit> used to return the number of
1142hash buckets that happen to be in use. If you still need that esoteric
1143value, you can get it through the macro C<HvFILL(tb)>.
1144
641d4181 1145
954c1994
GS
1146 I32 hv_iterinit(HV* tb)
1147
497711e7
GS
1148=for hackers
1149Found in file hv.c
1150
954c1994
GS
1151=item hv_iterkey
1152
1153Returns the key from the current position of the hash iterator. See
1154C<hv_iterinit>.
1155
1156 char* hv_iterkey(HE* entry, I32* retlen)
1157
497711e7
GS
1158=for hackers
1159Found in file hv.c
1160
954c1994
GS
1161=item hv_iterkeysv
1162
1163Returns the key as an C<SV*> from the current position of the hash
1164iterator. The return value will always be a mortal copy of the key. Also
1165see C<hv_iterinit>.
1166
1167 SV* hv_iterkeysv(HE* entry)
1168
497711e7
GS
1169=for hackers
1170Found in file hv.c
1171
954c1994
GS
1172=item hv_iternext
1173
1174Returns entries from a hash iterator. See C<hv_iterinit>.
1175
641d4181
JH
1176You may call C<hv_delete> or C<hv_delete_ent> on the hash entry that the
1177iterator currently points to, without losing your place or invalidating your
1178iterator. Note that in this case the current entry is deleted from the hash
1179with your iterator holding the last reference to it. Your iterator is flagged
1180to free the entry on the next call to C<hv_iternext>, so you must not discard
1181your iterator immediately else the entry will leak - call C<hv_iternext> to
1182trigger the resource deallocation.
1183
954c1994
GS
1184 HE* hv_iternext(HV* tb)
1185
497711e7
GS
1186=for hackers
1187Found in file hv.c
1188
954c1994
GS
1189=item hv_iternextsv
1190
1191Performs an C<hv_iternext>, C<hv_iterkey>, and C<hv_iterval> in one
1192operation.
1193
1194 SV* hv_iternextsv(HV* hv, char** key, I32* retlen)
1195
497711e7
GS
1196=for hackers
1197Found in file hv.c
1198
641d4181
JH
1199=item hv_iternext_flags
1200
1201Returns entries from a hash iterator. See C<hv_iterinit> and C<hv_iternext>.
1202The C<flags> value will normally be zero; if HV_ITERNEXT_WANTPLACEHOLDERS is
1203set the placeholders keys (for restricted hashes) will be returned in addition
1204to normal keys. By default placeholders are automatically skipped over.
1205Currently a placeholder is implemented with a value that is literally
1206<&Perl_sv_undef> (a regular C<undef> value is a normal read-write SV for which
1207C<!SvOK> is false). Note that the implementation of placeholders and
1208restricted hashes may change, and the implementation currently is
1209insufficiently abstracted for any change to be tidy.
1210
1211NOTE: this function is experimental and may change or be
1212removed without notice.
1213
1214 HE* hv_iternext_flags(HV* tb, I32 flags)
1215
1216=for hackers
1217Found in file hv.c
1218
954c1994
GS
1219=item hv_iterval
1220
1221Returns the value from the current position of the hash iterator. See
1222C<hv_iterkey>.
1223
1224 SV* hv_iterval(HV* tb, HE* entry)
1225
497711e7
GS
1226=for hackers
1227Found in file hv.c
1228
954c1994
GS
1229=item hv_magic
1230
1231Adds magic to a hash. See C<sv_magic>.
1232
1233 void hv_magic(HV* hv, GV* gv, int how)
1234
497711e7
GS
1235=for hackers
1236Found in file hv.c
1237
954c1994
GS
1238=item hv_store
1239
1240Stores an SV in a hash. The hash key is specified as C<key> and C<klen> is
1241the length of the key. The C<hash> parameter is the precomputed hash
1242value; if it is zero then Perl will compute it. The return value will be
1243NULL if the operation failed or if the value did not need to be actually
1244stored within the hash (as in the case of tied hashes). Otherwise it can
1245be dereferenced to get the original C<SV*>. Note that the caller is
1246responsible for suitably incrementing the reference count of C<val> before
7e8c5dac
HS
1247the call, and decrementing it if the function returned NULL. Effectively
1248a successful hv_store takes ownership of one reference to C<val>. This is
1249usually what you want; a newly created SV has a reference count of one, so
1250if all your code does is create SVs then store them in a hash, hv_store
1251will own the only reference to the new SV, and your code doesn't need to do
1252anything further to tidy up. hv_store is not implemented as a call to
1253hv_store_ent, and does not create a temporary SV for the key, so if your
1254key data is not already in SV form then use hv_store in preference to
1255hv_store_ent.
954c1994 1256
96f1132b 1257See L<perlguts/"Understanding the Magic of Tied Hashes and Arrays"> for more
954c1994
GS
1258information on how to use this function on tied hashes.
1259
da58a35d 1260 SV** hv_store(HV* tb, const char* key, I32 klen, SV* val, U32 hash)
954c1994 1261
497711e7
GS
1262=for hackers
1263Found in file hv.c
1264
954c1994
GS
1265=item hv_store_ent
1266
1267Stores C<val> in a hash. The hash key is specified as C<key>. The C<hash>
1268parameter is the precomputed hash value; if it is zero then Perl will
1269compute it. The return value is the new hash entry so created. It will be
1270NULL if the operation failed or if the value did not need to be actually
1271stored within the hash (as in the case of tied hashes). Otherwise the
f22d8e4b 1272contents of the return value can be accessed using the C<He?> macros
954c1994
GS
1273described here. Note that the caller is responsible for suitably
1274incrementing the reference count of C<val> before the call, and
7e8c5dac
HS
1275decrementing it if the function returned NULL. Effectively a successful
1276hv_store_ent takes ownership of one reference to C<val>. This is
1277usually what you want; a newly created SV has a reference count of one, so
1278if all your code does is create SVs then store them in a hash, hv_store
1279will own the only reference to the new SV, and your code doesn't need to do
1280anything further to tidy up. Note that hv_store_ent only reads the C<key>;
1281unlike C<val> it does not take ownership of it, so maintaining the correct
1282reference count on C<key> is entirely the caller's responsibility. hv_store
1283is not implemented as a call to hv_store_ent, and does not create a temporary
1284SV for the key, so if your key data is not already in SV form then use
1285hv_store in preference to hv_store_ent.
954c1994 1286
96f1132b 1287See L<perlguts/"Understanding the Magic of Tied Hashes and Arrays"> for more
954c1994
GS
1288information on how to use this function on tied hashes.
1289
1290 HE* hv_store_ent(HV* tb, SV* key, SV* val, U32 hash)
1291
497711e7
GS
1292=for hackers
1293Found in file hv.c
1294
954c1994
GS
1295=item hv_undef
1296
1297Undefines the hash.
1298
1299 void hv_undef(HV* tb)
1300
497711e7
GS
1301=for hackers
1302Found in file hv.c
1303
94bdecf9 1304=item newHV
d2cc3551 1305
94bdecf9 1306Creates a new HV. The reference count is set to 1.
d2cc3551 1307
94bdecf9 1308 HV* newHV()
d2cc3551
JH
1309
1310=for hackers
94bdecf9 1311Found in file hv.c
d2cc3551 1312
94bdecf9 1313=item Nullhv
954c1994 1314
94bdecf9 1315Null HV pointer.
954c1994 1316
954c1994 1317
497711e7 1318=for hackers
94bdecf9 1319Found in file hv.h
497711e7 1320
954c1994 1321
94bdecf9 1322=back
954c1994 1323
94bdecf9 1324=head1 Magical Functions
954c1994 1325
94bdecf9 1326=over 8
497711e7 1327
94bdecf9 1328=item mg_clear
954c1994 1329
94bdecf9 1330Clear something magical that the SV represents. See C<sv_magic>.
954c1994 1331
94bdecf9 1332 int mg_clear(SV* sv)
954c1994 1333
497711e7 1334=for hackers
94bdecf9 1335Found in file mg.c
497711e7 1336
94bdecf9 1337=item mg_copy
954c1994 1338
94bdecf9 1339Copies the magic from one SV to another. See C<sv_magic>.
954c1994 1340
94bdecf9 1341 int mg_copy(SV* sv, SV* nsv, const char* key, I32 klen)
954c1994 1342
497711e7 1343=for hackers
94bdecf9 1344Found in file mg.c
497711e7 1345
94bdecf9 1346=item mg_find
954c1994 1347
94bdecf9 1348Finds the magic pointer for type matching the SV. See C<sv_magic>.
954c1994 1349
94bdecf9 1350 MAGIC* mg_find(SV* sv, int type)
954c1994 1351
497711e7 1352=for hackers
94bdecf9 1353Found in file mg.c
497711e7 1354
94bdecf9 1355=item mg_free
954c1994 1356
94bdecf9 1357Free any magic storage used by the SV. See C<sv_magic>.
954c1994 1358
94bdecf9 1359 int mg_free(SV* sv)
954c1994 1360
497711e7 1361=for hackers
94bdecf9 1362Found in file mg.c
497711e7 1363
94bdecf9 1364=item mg_get
eebe1485 1365
94bdecf9 1366Do magic after a value is retrieved from the SV. See C<sv_magic>.
282f25c9 1367
94bdecf9 1368 int mg_get(SV* sv)
eebe1485
SC
1369
1370=for hackers
94bdecf9 1371Found in file mg.c
eebe1485 1372
94bdecf9 1373=item mg_length
eebe1485 1374
94bdecf9 1375Report on the SV's length. See C<sv_magic>.
eebe1485 1376
94bdecf9 1377 U32 mg_length(SV* sv)
eebe1485
SC
1378
1379=for hackers
94bdecf9 1380Found in file mg.c
eebe1485 1381
94bdecf9 1382=item mg_magical
954c1994 1383
94bdecf9 1384Turns on the magical status of an SV. See C<sv_magic>.
954c1994 1385
94bdecf9 1386 void mg_magical(SV* sv)
954c1994 1387
497711e7 1388=for hackers
94bdecf9 1389Found in file mg.c
497711e7 1390
94bdecf9 1391=item mg_set
954c1994 1392
94bdecf9 1393Do magic after a value is assigned to the SV. See C<sv_magic>.
954c1994 1394
94bdecf9 1395 int mg_set(SV* sv)
954c1994 1396
497711e7 1397=for hackers
94bdecf9 1398Found in file mg.c
497711e7 1399
94bdecf9 1400=item SvGETMAGIC
954c1994 1401
94bdecf9
JH
1402Invokes C<mg_get> on an SV if it has 'get' magic. This macro evaluates its
1403argument more than once.
954c1994 1404
94bdecf9 1405 void SvGETMAGIC(SV* sv)
954c1994 1406
497711e7 1407=for hackers
94bdecf9 1408Found in file sv.h
497711e7 1409
a4f1a029
NIS
1410=item SvLOCK
1411
1412Arranges for a mutual exclusion lock to be obtained on sv if a suitable module
1413has been loaded.
1414
1415 void SvLOCK(SV* sv)
1416
1417=for hackers
1418Found in file sv.h
1419
94bdecf9 1420=item SvSETMAGIC
7d3fb230 1421
94bdecf9
JH
1422Invokes C<mg_set> on an SV if it has 'set' magic. This macro evaluates its
1423argument more than once.
7d3fb230 1424
94bdecf9 1425 void SvSETMAGIC(SV* sv)
7d3fb230
BS
1426
1427=for hackers
94bdecf9 1428Found in file sv.h
7d3fb230 1429
94bdecf9 1430=item SvSetMagicSV
954c1994 1431
94bdecf9 1432Like C<SvSetSV>, but does any set magic required afterwards.
954c1994 1433
94bdecf9 1434 void SvSetMagicSV(SV* dsb, SV* ssv)
954c1994 1435
497711e7 1436=for hackers
94bdecf9 1437Found in file sv.h
497711e7 1438
a4f1a029
NIS
1439=item SvSetMagicSV_nosteal
1440
1441Like C<SvSetMagicSV>, but does any set magic required afterwards.
1442
1443 void SvSetMagicSV_nosteal(SV* dsv, SV* ssv)
1444
1445=for hackers
1446Found in file sv.h
1447
94bdecf9 1448=item SvSetSV
954c1994 1449
94bdecf9
JH
1450Calls C<sv_setsv> if dsv is not the same as ssv. May evaluate arguments
1451more than once.
1452
1453 void SvSetSV(SV* dsb, SV* ssv)
954c1994 1454
497711e7 1455=for hackers
94bdecf9 1456Found in file sv.h
497711e7 1457
94bdecf9 1458=item SvSetSV_nosteal
954c1994 1459
94bdecf9
JH
1460Calls a non-destructive version of C<sv_setsv> if dsv is not the same as
1461ssv. May evaluate arguments more than once.
954c1994 1462
94bdecf9 1463 void SvSetSV_nosteal(SV* dsv, SV* ssv)
954c1994 1464
497711e7 1465=for hackers
94bdecf9 1466Found in file sv.h
497711e7 1467
a4f1a029
NIS
1468=item SvSHARE
1469
1470Arranges for sv to be shared between threads if a suitable module
1471has been loaded.
1472
1473 void SvSHARE(SV* sv)
1474
1475=for hackers
1476Found in file sv.h
1477
954c1994 1478
94bdecf9 1479=back
954c1994 1480
94bdecf9 1481=head1 Memory Management
954c1994 1482
94bdecf9 1483=over 8
497711e7 1484
94bdecf9 1485=item Copy
954c1994 1486
94bdecf9
JH
1487The XSUB-writer's interface to the C C<memcpy> function. The C<src> is the
1488source, C<dest> is the destination, C<nitems> is the number of items, and C<type> is
1489the type. May fail on overlapping copies. See also C<Move>.
954c1994 1490
94bdecf9 1491 void Copy(void* src, void* dest, int nitems, type)
954c1994 1492
497711e7 1493=for hackers
94bdecf9 1494Found in file handy.h
497711e7 1495
94bdecf9 1496=item Move
954c1994 1497
94bdecf9
JH
1498The XSUB-writer's interface to the C C<memmove> function. The C<src> is the
1499source, C<dest> is the destination, C<nitems> is the number of items, and C<type> is
1500the type. Can do overlapping moves. See also C<Copy>.
954c1994 1501
94bdecf9 1502 void Move(void* src, void* dest, int nitems, type)
954c1994 1503
497711e7 1504=for hackers
94bdecf9 1505Found in file handy.h
497711e7 1506
94bdecf9 1507=item New
954c1994 1508
94bdecf9 1509The XSUB-writer's interface to the C C<malloc> function.
954c1994 1510
94bdecf9 1511 void New(int id, void* ptr, int nitems, type)
954c1994 1512
497711e7 1513=for hackers
94bdecf9 1514Found in file handy.h
497711e7 1515
94bdecf9 1516=item Newc
954c1994 1517
94bdecf9
JH
1518The XSUB-writer's interface to the C C<malloc> function, with
1519cast.
954c1994 1520
94bdecf9 1521 void Newc(int id, void* ptr, int nitems, type, cast)
954c1994 1522
497711e7 1523=for hackers
94bdecf9 1524Found in file handy.h
954c1994 1525
94bdecf9 1526=item NEWSV
497711e7 1527
94bdecf9
JH
1528Creates a new SV. A non-zero C<len> parameter indicates the number of
1529bytes of preallocated string space the SV should have. An extra byte for a
1530tailing NUL is also reserved. (SvPOK is not set for the SV even if string
1531space is allocated.) The reference count for the new SV is set to 1.
1532C<id> is an integer id between 0 and 1299 (used to identify leaks).
954c1994 1533
954c1994 1534
94bdecf9 1535 SV* NEWSV(int id, STRLEN len)
954c1994 1536
497711e7 1537=for hackers
94bdecf9 1538Found in file handy.h
497711e7 1539
94bdecf9 1540=item Newz
954c1994 1541
94bdecf9
JH
1542The XSUB-writer's interface to the C C<malloc> function. The allocated
1543memory is zeroed with C<memzero>.
954c1994 1544
94bdecf9 1545 void Newz(int id, void* ptr, int nitems, type)
954c1994 1546
497711e7
GS
1547=for hackers
1548Found in file handy.h
1549
9965345d
JH
1550=item Poison
1551
1552Fill up memory with a pattern (byte 0xAB over and over again) that
1553hopefully catches attempts to access uninitialized memory.
1554
1555 void Poison(void* dest, int nitems, type)
1556
1557=for hackers
1558Found in file handy.h
1559
94bdecf9 1560=item Renew
954c1994 1561
94bdecf9 1562The XSUB-writer's interface to the C C<realloc> function.
954c1994 1563
94bdecf9 1564 void Renew(void* ptr, int nitems, type)
954c1994 1565
497711e7
GS
1566=for hackers
1567Found in file handy.h
1568
94bdecf9 1569=item Renewc
954c1994 1570
94bdecf9
JH
1571The XSUB-writer's interface to the C C<realloc> function, with
1572cast.
954c1994 1573
94bdecf9 1574 void Renewc(void* ptr, int nitems, type, cast)
954c1994 1575
497711e7 1576=for hackers
94bdecf9 1577Found in file handy.h
497711e7 1578
94bdecf9 1579=item Safefree
954c1994 1580
94bdecf9 1581The XSUB-writer's interface to the C C<free> function.
954c1994 1582
94bdecf9 1583 void Safefree(void* ptr)
954c1994 1584
497711e7
GS
1585=for hackers
1586Found in file handy.h
1587
94bdecf9 1588=item savepv
954c1994 1589
641d4181
JH
1590Perl's version of C<strdup()>. Returns a pointer to a newly allocated
1591string which is a duplicate of C<pv>. The size of the string is
1592determined by C<strlen()>. The memory allocated for the new string can
1593be freed with the C<Safefree()> function.
954c1994 1594
641d4181 1595 char* savepv(const char* pv)
954c1994 1596
497711e7 1597=for hackers
94bdecf9 1598Found in file util.c
497711e7 1599
94bdecf9 1600=item savepvn
954c1994 1601
641d4181
JH
1602Perl's version of what C<strndup()> would be if it existed. Returns a
1603pointer to a newly allocated string which is a duplicate of the first
1604C<len> bytes from C<pv>. The memory allocated for the new string can be
1605freed with the C<Safefree()> function.
954c1994 1606
641d4181 1607 char* savepvn(const char* pv, I32 len)
954c1994 1608
497711e7 1609=for hackers
94bdecf9 1610Found in file util.c
497711e7 1611
a4f1a029
NIS
1612=item savesharedpv
1613
641d4181
JH
1614A version of C<savepv()> which allocates the duplicate string in memory
1615which is shared between threads.
a4f1a029 1616
641d4181 1617 char* savesharedpv(const char* pv)
a4f1a029
NIS
1618
1619=for hackers
1620Found in file util.c
1621
94bdecf9 1622=item StructCopy
954c1994 1623
94bdecf9 1624This is an architecture-independent macro to copy one structure to another.
954c1994 1625
94bdecf9 1626 void StructCopy(type src, type dest, type)
954c1994 1627
497711e7 1628=for hackers
94bdecf9 1629Found in file handy.h
497711e7 1630
94bdecf9 1631=item Zero
954c1994 1632
94bdecf9
JH
1633The XSUB-writer's interface to the C C<memzero> function. The C<dest> is the
1634destination, C<nitems> is the number of items, and C<type> is the type.
954c1994 1635
94bdecf9 1636 void Zero(void* dest, int nitems, type)
954c1994 1637
497711e7 1638=for hackers
94bdecf9 1639Found in file handy.h
497711e7 1640
954c1994 1641
94bdecf9 1642=back
954c1994 1643
94bdecf9 1644=head1 Miscellaneous Functions
954c1994 1645
94bdecf9 1646=over 8
497711e7 1647
94bdecf9 1648=item fbm_compile
8b4ac5a4 1649
94bdecf9
JH
1650Analyses the string in order to make fast searches on it using fbm_instr()
1651-- the Boyer-Moore algorithm.
8b4ac5a4 1652
94bdecf9 1653 void fbm_compile(SV* sv, U32 flags)
8b4ac5a4
JH
1654
1655=for hackers
94bdecf9 1656Found in file util.c
8b4ac5a4 1657
94bdecf9 1658=item fbm_instr
954c1994 1659
94bdecf9
JH
1660Returns the location of the SV in the string delimited by C<str> and
1661C<strend>. It returns C<Nullch> if the string can't be found. The C<sv>
1662does not have to be fbm_compiled, but the search will not be as fast
1663then.
954c1994 1664
94bdecf9 1665 char* fbm_instr(unsigned char* big, unsigned char* bigend, SV* littlesv, U32 flags)
954c1994 1666
497711e7 1667=for hackers
94bdecf9 1668Found in file util.c
497711e7 1669
94bdecf9 1670=item form
954c1994 1671
94bdecf9
JH
1672Takes a sprintf-style format pattern and conventional
1673(non-SV) arguments and returns the formatted string.
954c1994 1674
94bdecf9 1675 (char *) Perl_form(pTHX_ const char* pat, ...)
954c1994 1676
94bdecf9 1677can be used any place a string (char *) is required:
497711e7 1678
94bdecf9 1679 char * s = Perl_form("%d.%d",major,minor);
954c1994 1680
94bdecf9
JH
1681Uses a single private buffer so if you want to format several strings you
1682must explicitly copy the earlier strings away (and free the copies when you
1683are done).
954c1994 1684
94bdecf9 1685 char* form(const char* pat, ...)
954c1994 1686
497711e7 1687=for hackers
94bdecf9 1688Found in file util.c
497711e7 1689
94bdecf9 1690=item getcwd_sv
954c1994 1691
94bdecf9 1692Fill the sv with current working directory
954c1994 1693
94bdecf9 1694 int getcwd_sv(SV* sv)
954c1994 1695
497711e7 1696=for hackers
94bdecf9 1697Found in file util.c
497711e7 1698
94bdecf9 1699=item strEQ
954c1994 1700
94bdecf9 1701Test two strings to see if they are equal. Returns true or false.
954c1994 1702
94bdecf9 1703 bool strEQ(char* s1, char* s2)
954c1994 1704
497711e7 1705=for hackers
94bdecf9 1706Found in file handy.h
497711e7 1707
94bdecf9 1708=item strGE
1c846c1f 1709
94bdecf9
JH
1710Test two strings to see if the first, C<s1>, is greater than or equal to
1711the second, C<s2>. Returns true or false.
1c846c1f 1712
94bdecf9 1713 bool strGE(char* s1, char* s2)
1c846c1f
NIS
1714
1715=for hackers
94bdecf9 1716Found in file handy.h
1c846c1f 1717
94bdecf9 1718=item strGT
954c1994 1719
94bdecf9
JH
1720Test two strings to see if the first, C<s1>, is greater than the second,
1721C<s2>. Returns true or false.
954c1994 1722
94bdecf9 1723 bool strGT(char* s1, char* s2)
954c1994 1724
497711e7 1725=for hackers
94bdecf9 1726Found in file handy.h
497711e7 1727
94bdecf9 1728=item strLE
954c1994 1729
94bdecf9
JH
1730Test two strings to see if the first, C<s1>, is less than or equal to the
1731second, C<s2>. Returns true or false.
954c1994 1732
94bdecf9 1733 bool strLE(char* s1, char* s2)
954c1994 1734
497711e7 1735=for hackers
94bdecf9 1736Found in file handy.h
497711e7 1737
94bdecf9 1738=item strLT
1a3327fb 1739
94bdecf9
JH
1740Test two strings to see if the first, C<s1>, is less than the second,
1741C<s2>. Returns true or false.
1a3327fb 1742
94bdecf9 1743 bool strLT(char* s1, char* s2)
1a3327fb 1744
497711e7 1745=for hackers
94bdecf9 1746Found in file handy.h
497711e7 1747
94bdecf9 1748=item strNE
954c1994 1749
94bdecf9
JH
1750Test two strings to see if they are different. Returns true or
1751false.
1752
1753 bool strNE(char* s1, char* s2)
954c1994 1754
497711e7 1755=for hackers
94bdecf9 1756Found in file handy.h
497711e7 1757
94bdecf9 1758=item strnEQ
954c1994 1759
94bdecf9
JH
1760Test two strings to see if they are equal. The C<len> parameter indicates
1761the number of bytes to compare. Returns true or false. (A wrapper for
1762C<strncmp>).
1763
1764 bool strnEQ(char* s1, char* s2, STRLEN len)
954c1994 1765
497711e7 1766=for hackers
94bdecf9 1767Found in file handy.h
497711e7 1768
94bdecf9 1769=item strnNE
954c1994 1770
94bdecf9
JH
1771Test two strings to see if they are different. The C<len> parameter
1772indicates the number of bytes to compare. Returns true or false. (A
1773wrapper for C<strncmp>).
954c1994 1774
94bdecf9 1775 bool strnNE(char* s1, char* s2, STRLEN len)
954c1994 1776
497711e7
GS
1777=for hackers
1778Found in file handy.h
1779
f4758303 1780
94bdecf9 1781=back
7207e29d 1782
94bdecf9 1783=head1 Numeric functions
7207e29d 1784
94bdecf9 1785=over 8
f4758303 1786
94bdecf9 1787=item grok_bin
f4758303 1788
94bdecf9
JH
1789converts a string representing a binary number to numeric form.
1790
1791On entry I<start> and I<*len> give the string to scan, I<*flags> gives
1792conversion flags, and I<result> should be NULL or a pointer to an NV.
1793The scan stops at the end of the string, or the first invalid character.
1794On return I<*len> is set to the length scanned string, and I<*flags> gives
1795output flags.
1796
1797If the value is <= UV_MAX it is returned as a UV, the output flags are clear,
1798and nothing is written to I<*result>. If the value is > UV_MAX C<grok_bin>
1799returns UV_MAX, sets C<PERL_SCAN_GREATER_THAN_UV_MAX> in the output flags,
1800and writes the value to I<*result> (or the value is discarded if I<result>
1801is NULL).
1802
1803The hex number may optionally be prefixed with "0b" or "b" unless
1804C<PERL_SCAN_DISALLOW_PREFIX> is set in I<*flags> on entry. If
1805C<PERL_SCAN_ALLOW_UNDERSCORES> is set in I<*flags> then the binary
1806number may use '_' characters to separate digits.
1807
1808 UV grok_bin(char* start, STRLEN* len, I32* flags, NV *result)
f4758303
JP
1809
1810=for hackers
94bdecf9 1811Found in file numeric.c
f4758303 1812
94bdecf9 1813=item grok_hex
954c1994 1814
94bdecf9
JH
1815converts a string representing a hex number to numeric form.
1816
1817On entry I<start> and I<*len> give the string to scan, I<*flags> gives
1818conversion flags, and I<result> should be NULL or a pointer to an NV.
1819The scan stops at the end of the string, or the first non-hex-digit character.
1820On return I<*len> is set to the length scanned string, and I<*flags> gives
1821output flags.
1822
1823If the value is <= UV_MAX it is returned as a UV, the output flags are clear,
1824and nothing is written to I<*result>. If the value is > UV_MAX C<grok_hex>
1825returns UV_MAX, sets C<PERL_SCAN_GREATER_THAN_UV_MAX> in the output flags,
1826and writes the value to I<*result> (or the value is discarded if I<result>
1827is NULL).
1828
1829The hex number may optionally be prefixed with "0x" or "x" unless
1830C<PERL_SCAN_DISALLOW_PREFIX> is set in I<*flags> on entry. If
1831C<PERL_SCAN_ALLOW_UNDERSCORES> is set in I<*flags> then the hex
1832number may use '_' characters to separate digits.
1833
1834 UV grok_hex(char* start, STRLEN* len, I32* flags, NV *result)
954c1994 1835
497711e7 1836=for hackers
94bdecf9 1837Found in file numeric.c
497711e7 1838
94bdecf9 1839=item grok_number
954c1994 1840
94bdecf9
JH
1841Recognise (or not) a number. The type of the number is returned
1842(0 if unrecognised), otherwise it is a bit-ORed combination of
1843IS_NUMBER_IN_UV, IS_NUMBER_GREATER_THAN_UV_MAX, IS_NUMBER_NOT_INT,
1844IS_NUMBER_NEG, IS_NUMBER_INFINITY, IS_NUMBER_NAN (defined in perl.h).
1845
1846If the value of the number can fit an in UV, it is returned in the *valuep
1847IS_NUMBER_IN_UV will be set to indicate that *valuep is valid, IS_NUMBER_IN_UV
1848will never be set unless *valuep is valid, but *valuep may have been assigned
1849to during processing even though IS_NUMBER_IN_UV is not set on return.
1850If valuep is NULL, IS_NUMBER_IN_UV will be set for the same cases as when
1851valuep is non-NULL, but no actual assignment (or SEGV) will occur.
1852
1853IS_NUMBER_NOT_INT will be set with IS_NUMBER_IN_UV if trailing decimals were
1854seen (in which case *valuep gives the true value truncated to an integer), and
1855IS_NUMBER_NEG if the number is negative (in which case *valuep holds the
1856absolute value). IS_NUMBER_IN_UV is not set if e notation was used or the
1857number is larger than a UV.
1858
1859 int grok_number(const char *pv, STRLEN len, UV *valuep)
954c1994 1860
497711e7 1861=for hackers
94bdecf9 1862Found in file numeric.c
497711e7 1863
94bdecf9 1864=item grok_numeric_radix
954c1994 1865
94bdecf9
JH
1866Scan and skip for a numeric decimal separator (radix).
1867
1868 bool grok_numeric_radix(const char **sp, const char *send)
954c1994 1869
497711e7 1870=for hackers
94bdecf9 1871Found in file numeric.c
497711e7 1872
94bdecf9 1873=item grok_oct
954c1994 1874
94bdecf9
JH
1875
1876 UV grok_oct(char* start, STRLEN* len, I32* flags, NV *result)
954c1994 1877
497711e7 1878=for hackers
94bdecf9 1879Found in file numeric.c
497711e7 1880
94bdecf9 1881=item scan_bin
954c1994 1882
94bdecf9
JH
1883For backwards compatibility. Use C<grok_bin> instead.
1884
1885 NV scan_bin(char* start, STRLEN len, STRLEN* retlen)
954c1994 1886
497711e7 1887=for hackers
94bdecf9 1888Found in file numeric.c
497711e7 1889
94bdecf9 1890=item scan_hex
954c1994 1891
94bdecf9
JH
1892For backwards compatibility. Use C<grok_hex> instead.
1893
1894 NV scan_hex(char* start, STRLEN len, STRLEN* retlen)
954c1994 1895
497711e7 1896=for hackers
94bdecf9 1897Found in file numeric.c
497711e7 1898
94bdecf9 1899=item scan_oct
954c1994 1900
94bdecf9 1901For backwards compatibility. Use C<grok_oct> instead.
954c1994 1902
94bdecf9 1903 NV scan_oct(char* start, STRLEN len, STRLEN* retlen)
954c1994 1904
497711e7 1905=for hackers
94bdecf9 1906Found in file numeric.c
497711e7 1907
645c22ef 1908
94bdecf9 1909=back
645c22ef 1910
94bdecf9
JH
1911=head1 Optree Manipulation Functions
1912
1913=over 8
1914
1915=item cv_const_sv
1916
1917If C<cv> is a constant sub eligible for inlining. returns the constant
1918value returned by the sub. Otherwise, returns NULL.
1919
1920Constant subs can be created with C<newCONSTSUB> or as described in
1921L<perlsub/"Constant Functions">.
1922
1923 SV* cv_const_sv(CV* cv)
645c22ef
DM
1924
1925=for hackers
94bdecf9 1926Found in file op.c
645c22ef 1927
94bdecf9 1928=item newCONSTSUB
954c1994 1929
94bdecf9
JH
1930Creates a constant sub equivalent to Perl C<sub FOO () { 123 }> which is
1931eligible for inlining at compile-time.
954c1994 1932
94bdecf9 1933 CV* newCONSTSUB(HV* stash, char* name, SV* sv)
954c1994 1934
497711e7 1935=for hackers
94bdecf9 1936Found in file op.c
497711e7 1937
94bdecf9 1938=item newXS
954c1994 1939
94bdecf9 1940Used by C<xsubpp> to hook up XSUBs as Perl subs.
954c1994 1941
94bdecf9
JH
1942=for hackers
1943Found in file op.c
1944
1945
1946=back
1947
dd2155a4
DM
1948=head1 Pad Data Structures
1949
1950=over 8
1951
1952=item pad_sv
1953
1954Get the value at offset po in the current pad.
1955Use macro PAD_SV instead of calling this function directly.
1956
1957 SV* pad_sv(PADOFFSET po)
1958
1959=for hackers
1960Found in file pad.c
1961
1962
1963=back
1964
94bdecf9
JH
1965=head1 Stack Manipulation Macros
1966
1967=over 8
1968
1969=item dMARK
954c1994 1970
94bdecf9
JH
1971Declare a stack marker variable, C<mark>, for the XSUB. See C<MARK> and
1972C<dORIGMARK>.
954c1994 1973
94bdecf9 1974 dMARK;
954c1994 1975
497711e7 1976=for hackers
94bdecf9 1977Found in file pp.h
497711e7 1978
94bdecf9 1979=item dORIGMARK
954c1994 1980
94bdecf9 1981Saves the original stack mark for the XSUB. See C<ORIGMARK>.
954c1994 1982
94bdecf9 1983 dORIGMARK;
954c1994 1984
497711e7 1985=for hackers
94bdecf9 1986Found in file pp.h
497711e7 1987
94bdecf9 1988=item dSP
954c1994 1989
94bdecf9
JH
1990Declares a local copy of perl's stack pointer for the XSUB, available via
1991the C<SP> macro. See C<SP>.
954c1994 1992
94bdecf9 1993 dSP;
954c1994 1994
497711e7 1995=for hackers
94bdecf9 1996Found in file pp.h
497711e7 1997
94bdecf9 1998=item EXTEND
954c1994 1999
94bdecf9
JH
2000Used to extend the argument stack for an XSUB's return values. Once
2001used, guarantees that there is room for at least C<nitems> to be pushed
2002onto the stack.
954c1994 2003
94bdecf9 2004 void EXTEND(SP, int nitems)
954c1994 2005
497711e7 2006=for hackers
94bdecf9 2007Found in file pp.h
954c1994 2008
94bdecf9 2009=item MARK
954c1994 2010
94bdecf9 2011Stack marker variable for the XSUB. See C<dMARK>.
954c1994 2012
497711e7 2013=for hackers
94bdecf9 2014Found in file pp.h
954c1994 2015
94bdecf9 2016=item ORIGMARK
954c1994 2017
94bdecf9 2018The original stack mark for the XSUB. See C<dORIGMARK>.
954c1994 2019
497711e7 2020=for hackers
94bdecf9 2021Found in file pp.h
497711e7 2022
954c1994
GS
2023=item POPi
2024
2025Pops an integer off the stack.
2026
2027 IV POPi
2028
497711e7
GS
2029=for hackers
2030Found in file pp.h
2031
954c1994
GS
2032=item POPl
2033
2034Pops a long off the stack.
2035
2036 long POPl
2037
497711e7
GS
2038=for hackers
2039Found in file pp.h
2040
954c1994
GS
2041=item POPn
2042
2043Pops a double off the stack.
2044
2045 NV POPn
2046
497711e7
GS
2047=for hackers
2048Found in file pp.h
2049
954c1994
GS
2050=item POPp
2051
fa519979
JH
2052Pops a string off the stack. Deprecated. New code should provide
2053a STRLEN n_a and use POPpx.
954c1994
GS
2054
2055 char* POPp
2056
497711e7
GS
2057=for hackers
2058Found in file pp.h
2059
fa519979
JH
2060=item POPpbytex
2061
2062Pops a string off the stack which must consist of bytes i.e. characters < 256.
2063Requires a variable STRLEN n_a in scope.
2064
2065 char* POPpbytex
2066
2067=for hackers
2068Found in file pp.h
2069
2070=item POPpx
2071
2072Pops a string off the stack.
2073Requires a variable STRLEN n_a in scope.
2074
2075 char* POPpx
2076
2077=for hackers
2078Found in file pp.h
2079
954c1994
GS
2080=item POPs
2081
2082Pops an SV off the stack.
2083
2084 SV* POPs
2085
497711e7
GS
2086=for hackers
2087Found in file pp.h
2088
954c1994
GS
2089=item PUSHi
2090
2091Push an integer onto the stack. The stack must have room for this element.
2092Handles 'set' magic. See C<XPUSHi>.
2093
2094 void PUSHi(IV iv)
2095
497711e7
GS
2096=for hackers
2097Found in file pp.h
2098
954c1994
GS
2099=item PUSHMARK
2100
2101Opening bracket for arguments on a callback. See C<PUTBACK> and
2102L<perlcall>.
2103
2104 PUSHMARK;
2105
497711e7
GS
2106=for hackers
2107Found in file pp.h
2108
954c1994
GS
2109=item PUSHn
2110
2111Push a double onto the stack. The stack must have room for this element.
2112Handles 'set' magic. See C<XPUSHn>.
2113
2114 void PUSHn(NV nv)
2115
497711e7
GS
2116=for hackers
2117Found in file pp.h
2118
954c1994
GS
2119=item PUSHp
2120
2121Push a string onto the stack. The stack must have room for this element.
2122The C<len> indicates the length of the string. Handles 'set' magic. See
2123C<XPUSHp>.
2124
2125 void PUSHp(char* str, STRLEN len)
2126
497711e7
GS
2127=for hackers
2128Found in file pp.h
2129
954c1994
GS
2130=item PUSHs
2131
1c846c1f 2132Push an SV onto the stack. The stack must have room for this element.
954c1994
GS
2133Does not handle 'set' magic. See C<XPUSHs>.
2134
2135 void PUSHs(SV* sv)
2136
497711e7
GS
2137=for hackers
2138Found in file pp.h
2139
954c1994
GS
2140=item PUSHu
2141
2142Push an unsigned integer onto the stack. The stack must have room for this
2143element. See C<XPUSHu>.
2144
2145 void PUSHu(UV uv)
2146
497711e7
GS
2147=for hackers
2148Found in file pp.h
2149
954c1994
GS
2150=item PUTBACK
2151
2152Closing bracket for XSUB arguments. This is usually handled by C<xsubpp>.
2153See C<PUSHMARK> and L<perlcall> for other uses.
2154
2155 PUTBACK;
2156
497711e7
GS
2157=for hackers
2158Found in file pp.h
2159
94bdecf9 2160=item SP
d2cc3551 2161
94bdecf9
JH
2162Stack pointer. This is usually handled by C<xsubpp>. See C<dSP> and
2163C<SPAGAIN>.
d2cc3551 2164
94bdecf9
JH
2165=for hackers
2166Found in file pp.h
2167
2168=item SPAGAIN
2169
2170Refetch the stack pointer. Used after a callback. See L<perlcall>.
2171
2172 SPAGAIN;
d2cc3551
JH
2173
2174=for hackers
94bdecf9 2175Found in file pp.h
d2cc3551 2176
94bdecf9 2177=item XPUSHi
954c1994 2178
94bdecf9
JH
2179Push an integer onto the stack, extending the stack if necessary. Handles
2180'set' magic. See C<PUSHi>.
954c1994 2181
94bdecf9 2182 void XPUSHi(IV iv)
954c1994 2183
497711e7 2184=for hackers
94bdecf9 2185Found in file pp.h
497711e7 2186
94bdecf9 2187=item XPUSHn
954c1994 2188
94bdecf9
JH
2189Push a double onto the stack, extending the stack if necessary. Handles
2190'set' magic. See C<PUSHn>.
954c1994 2191
94bdecf9 2192 void XPUSHn(NV nv)
954c1994 2193
497711e7 2194=for hackers
94bdecf9 2195Found in file pp.h
497711e7 2196
94bdecf9 2197=item XPUSHp
954c1994 2198
94bdecf9
JH
2199Push a string onto the stack, extending the stack if necessary. The C<len>
2200indicates the length of the string. Handles 'set' magic. See
2201C<PUSHp>.
954c1994 2202
94bdecf9 2203 void XPUSHp(char* str, STRLEN len)
954c1994 2204
94bdecf9
JH
2205=for hackers
2206Found in file pp.h
2207
2208=item XPUSHs
2209
2210Push an SV onto the stack, extending the stack if necessary. Does not
2211handle 'set' magic. See C<PUSHs>.
2212
2213 void XPUSHs(SV* sv)
954c1994 2214
497711e7 2215=for hackers
94bdecf9 2216Found in file pp.h
497711e7 2217
94bdecf9 2218=item XPUSHu
954c1994 2219
94bdecf9
JH
2220Push an unsigned integer onto the stack, extending the stack if necessary.
2221See C<PUSHu>.
954c1994 2222
94bdecf9
JH
2223 void XPUSHu(UV uv)
2224
2225=for hackers
2226Found in file pp.h
2227
2228=item XSRETURN
2229
2230Return from XSUB, indicating number of items on the stack. This is usually
2231handled by C<xsubpp>.
2232
2233 void XSRETURN(int nitems)
954c1994 2234
497711e7
GS
2235=for hackers
2236Found in file XSUB.h
2237
94bdecf9 2238=item XSRETURN_IV
954c1994 2239
94bdecf9 2240Return an integer from an XSUB immediately. Uses C<XST_mIV>.
954c1994 2241
94bdecf9 2242 void XSRETURN_IV(IV iv)
954c1994 2243
497711e7 2244=for hackers
94bdecf9 2245Found in file XSUB.h
497711e7 2246
94bdecf9 2247=item XSRETURN_NO
954c1994 2248
94bdecf9 2249Return C<&PL_sv_no> from an XSUB immediately. Uses C<XST_mNO>.
954c1994 2250
94bdecf9 2251 XSRETURN_NO;
954c1994 2252
497711e7 2253=for hackers
94bdecf9 2254Found in file XSUB.h
497711e7 2255
94bdecf9 2256=item XSRETURN_NV
954c1994 2257
94bdecf9 2258Return a double from an XSUB immediately. Uses C<XST_mNV>.
954c1994 2259
94bdecf9 2260 void XSRETURN_NV(NV nv)
954c1994 2261
497711e7 2262=for hackers
94bdecf9
JH
2263Found in file XSUB.h
2264
2265=item XSRETURN_PV
2266
2267Return a copy of a string from an XSUB immediately. Uses C<XST_mPV>.
2268
2269 void XSRETURN_PV(char* str)
2270
2271=for hackers
2272Found in file XSUB.h
2273
2274=item XSRETURN_UNDEF
2275
2276Return C<&PL_sv_undef> from an XSUB immediately. Uses C<XST_mUNDEF>.
2277
2278 XSRETURN_UNDEF;
2279
2280=for hackers
2281Found in file XSUB.h
2282
2283=item XSRETURN_YES
2284
2285Return C<&PL_sv_yes> from an XSUB immediately. Uses C<XST_mYES>.
2286
2287 XSRETURN_YES;
2288
2289=for hackers
2290Found in file XSUB.h
2291
2292=item XST_mIV
2293
2294Place an integer into the specified position C<pos> on the stack. The
2295value is stored in a new mortal SV.
2296
2297 void XST_mIV(int pos, IV iv)
2298
2299=for hackers
2300Found in file XSUB.h
2301
2302=item XST_mNO
2303
2304Place C<&PL_sv_no> into the specified position C<pos> on the
2305stack.
2306
2307 void XST_mNO(int pos)
2308
2309=for hackers
2310Found in file XSUB.h
2311
2312=item XST_mNV
2313
2314Place a double into the specified position C<pos> on the stack. The value
2315is stored in a new mortal SV.
2316
2317 void XST_mNV(int pos, NV nv)
2318
2319=for hackers
2320Found in file XSUB.h
2321
2322=item XST_mPV
2323
2324Place a copy of a string into the specified position C<pos> on the stack.
2325The value is stored in a new mortal SV.
2326
2327 void XST_mPV(int pos, char* str)
2328
2329=for hackers
2330Found in file XSUB.h
2331
2332=item XST_mUNDEF
2333
2334Place C<&PL_sv_undef> into the specified position C<pos> on the
2335stack.
2336
2337 void XST_mUNDEF(int pos)
2338
2339=for hackers
2340Found in file XSUB.h
2341
2342=item XST_mYES
2343
2344Place C<&PL_sv_yes> into the specified position C<pos> on the
2345stack.
2346
2347 void XST_mYES(int pos)
2348
2349=for hackers
2350Found in file XSUB.h
2351
2352
2353=back
2354
2355=head1 SV Flags
497711e7 2356
94bdecf9 2357=over 8
954c1994 2358
94bdecf9 2359=item svtype
954c1994 2360
94bdecf9
JH
2361An enum of flags for Perl types. These are found in the file B<sv.h>
2362in the C<svtype> enum. Test these flags with the C<SvTYPE> macro.
954c1994 2363
497711e7 2364=for hackers
94bdecf9 2365Found in file sv.h
6e9d1081 2366
94bdecf9 2367=item SVt_IV
6e9d1081 2368
94bdecf9 2369Integer type flag for scalars. See C<svtype>.
6e9d1081
NC
2370
2371=for hackers
94bdecf9 2372Found in file sv.h
6e9d1081 2373
94bdecf9 2374=item SVt_NV
6e9d1081 2375
94bdecf9 2376Double type flag for scalars. See C<svtype>.
6e9d1081
NC
2377
2378=for hackers
94bdecf9 2379Found in file sv.h
6e9d1081 2380
94bdecf9 2381=item SVt_PV
6e9d1081 2382
94bdecf9 2383Pointer type flag for scalars. See C<svtype>.
6e9d1081
NC
2384
2385=for hackers
94bdecf9 2386Found in file sv.h
cd1ee231 2387
94bdecf9 2388=item SVt_PVAV
cd1ee231 2389
94bdecf9 2390Type flag for arrays. See C<svtype>.
cd1ee231
JH
2391
2392=for hackers
94bdecf9 2393Found in file sv.h
cd1ee231 2394
94bdecf9 2395=item SVt_PVCV
cd1ee231 2396
94bdecf9 2397Type flag for code refs. See C<svtype>.
cd1ee231
JH
2398
2399=for hackers
94bdecf9 2400Found in file sv.h
cd1ee231 2401
94bdecf9 2402=item SVt_PVHV
cd1ee231 2403
94bdecf9 2404Type flag for hashes. See C<svtype>.
cd1ee231
JH
2405
2406=for hackers
94bdecf9 2407Found in file sv.h
cd1ee231 2408
94bdecf9 2409=item SVt_PVMG
cd1ee231 2410
94bdecf9 2411Type flag for blessed scalars. See C<svtype>.
cd1ee231
JH
2412
2413=for hackers
94bdecf9 2414Found in file sv.h
cd1ee231 2415
cd1ee231 2416
94bdecf9 2417=back
cd1ee231 2418
94bdecf9 2419=head1 SV Manipulation Functions
cd1ee231 2420
94bdecf9 2421=over 8
cd1ee231 2422
94bdecf9 2423=item get_sv
cd1ee231 2424
94bdecf9
JH
2425Returns the SV of the specified Perl scalar. If C<create> is set and the
2426Perl variable does not exist then it will be created. If C<create> is not
2427set and the variable does not exist then NULL is returned.
2428
2429NOTE: the perl_ form of this function is deprecated.
2430
2431 SV* get_sv(const char* name, I32 create)
cd1ee231
JH
2432
2433=for hackers
94bdecf9 2434Found in file perl.c
cd1ee231 2435
94bdecf9 2436=item looks_like_number
cd1ee231 2437
94bdecf9
JH
2438Test if the content of an SV looks like a number (or is a number).
2439C<Inf> and C<Infinity> are treated as numbers (so will not issue a
2440non-numeric warning), even if your atof() doesn't grok them.
cd1ee231 2441
94bdecf9 2442 I32 looks_like_number(SV* sv)
cd1ee231
JH
2443
2444=for hackers
94bdecf9 2445Found in file sv.c
2a5a0c38 2446
94bdecf9 2447=item newRV_inc
2a5a0c38 2448
94bdecf9
JH
2449Creates an RV wrapper for an SV. The reference count for the original SV is
2450incremented.
2a5a0c38 2451
94bdecf9 2452 SV* newRV_inc(SV* sv)
2a5a0c38
JH
2453
2454=for hackers
94bdecf9 2455Found in file sv.h
2a5a0c38 2456
94bdecf9 2457=item newRV_noinc
954c1994 2458
94bdecf9
JH
2459Creates an RV wrapper for an SV. The reference count for the original
2460SV is B<not> incremented.
2461
2462 SV* newRV_noinc(SV *sv)
954c1994 2463
497711e7 2464=for hackers
94bdecf9 2465Found in file sv.c
497711e7 2466
94bdecf9 2467=item newSV
954c1994 2468
94bdecf9
JH
2469Create a new null SV, or if len > 0, create a new empty SVt_PV type SV
2470with an initial PV allocation of len+1. Normally accessed via the C<NEWSV>
2471macro.
954c1994 2472
94bdecf9 2473 SV* newSV(STRLEN len)
954c1994 2474
497711e7 2475=for hackers
94bdecf9 2476Found in file sv.c
497711e7 2477
94bdecf9 2478=item newSViv
954c1994 2479
94bdecf9
JH
2480Creates a new SV and copies an integer into it. The reference count for the
2481SV is set to 1.
954c1994 2482
94bdecf9 2483 SV* newSViv(IV i)
954c1994 2484
497711e7 2485=for hackers
94bdecf9 2486Found in file sv.c
497711e7 2487
94bdecf9 2488=item newSVnv
954c1994 2489
94bdecf9
JH
2490Creates a new SV and copies a floating point value into it.
2491The reference count for the SV is set to 1.
954c1994 2492
94bdecf9 2493 SV* newSVnv(NV n)
954c1994 2494
497711e7 2495=for hackers
94bdecf9 2496Found in file sv.c
497711e7 2497
94bdecf9 2498=item newSVpv
954c1994 2499
94bdecf9
JH
2500Creates a new SV and copies a string into it. The reference count for the
2501SV is set to 1. If C<len> is zero, Perl will compute the length using
2502strlen(). For efficiency, consider using C<newSVpvn> instead.
954c1994 2503
94bdecf9 2504 SV* newSVpv(const char* s, STRLEN len)
954c1994 2505
497711e7 2506=for hackers
94bdecf9 2507Found in file sv.c
497711e7 2508
94bdecf9 2509=item newSVpvf
954c1994 2510
94bdecf9
JH
2511Creates a new SV and initializes it with the string formatted like
2512C<sprintf>.
954c1994 2513
94bdecf9 2514 SV* newSVpvf(const char* pat, ...)
954c1994 2515
497711e7 2516=for hackers
94bdecf9 2517Found in file sv.c
497711e7 2518
94bdecf9 2519=item newSVpvn
954c1994 2520
94bdecf9
JH
2521Creates a new SV and copies a string into it. The reference count for the
2522SV is set to 1. Note that if C<len> is zero, Perl will create a zero length
2523string. You are responsible for ensuring that the source string is at least
2524C<len> bytes long.
954c1994 2525
94bdecf9 2526 SV* newSVpvn(const char* s, STRLEN len)
954c1994 2527
497711e7 2528=for hackers
94bdecf9 2529Found in file sv.c
497711e7 2530
94bdecf9 2531=item newSVpvn_share
954c1994 2532
94bdecf9
JH
2533Creates a new SV with its SvPVX pointing to a shared string in the string
2534table. If the string does not already exist in the table, it is created
2535first. Turns on READONLY and FAKE. The string's hash is stored in the UV
2536slot of the SV; if the C<hash> parameter is non-zero, that value is used;
2537otherwise the hash is computed. The idea here is that as the string table
2538is used for shared hash keys these strings will have SvPVX == HeKEY and
2539hash lookup will avoid string compare.
954c1994 2540
94bdecf9 2541 SV* newSVpvn_share(const char* s, I32 len, U32 hash)
954c1994 2542
497711e7 2543=for hackers
94bdecf9 2544Found in file sv.c
497711e7 2545
94bdecf9 2546=item newSVrv
954c1994 2547
94bdecf9
JH
2548Creates a new SV for the RV, C<rv>, to point to. If C<rv> is not an RV then
2549it will be upgraded to one. If C<classname> is non-null then the new SV will
2550be blessed in the specified package. The new SV is returned and its
2551reference count is 1.
954c1994 2552
94bdecf9 2553 SV* newSVrv(SV* rv, const char* classname)
954c1994 2554
497711e7 2555=for hackers
94bdecf9 2556Found in file sv.c
497711e7 2557
94bdecf9 2558=item newSVsv
954c1994 2559
94bdecf9
JH
2560Creates a new SV which is an exact duplicate of the original SV.
2561(Uses C<sv_setsv>).
954c1994 2562
94bdecf9 2563 SV* newSVsv(SV* old)
954c1994 2564
497711e7 2565=for hackers
94bdecf9 2566Found in file sv.c
497711e7 2567
94bdecf9 2568=item newSVuv
954c1994 2569
94bdecf9
JH
2570Creates a new SV and copies an unsigned integer into it.
2571The reference count for the SV is set to 1.
954c1994 2572
94bdecf9 2573 SV* newSVuv(UV u)
954c1994 2574
497711e7 2575=for hackers
94bdecf9 2576Found in file sv.c
497711e7 2577
b0f01acb
JP
2578=item new_version
2579
2580Returns a new version object based on the passed in SV:
2581
2582 SV *sv = new_version(SV *ver);
2583
2584Does not alter the passed in ver SV. See "upg_version" if you
2585want to upgrade the SV.
2586
2587 SV* new_version(SV *ver)
2588
2589=for hackers
2590Found in file util.c
2591
2592=item scan_version
2593
2594Returns a pointer to the next character after the parsed
2595version string, as well as upgrading the passed in SV to
2596an RV.
2597
2598Function must be called with an already existing SV like
2599
2600 sv = NEWSV(92,0);
2601 s = scan_version(s,sv);
2602
2603Performs some preprocessing to the string to ensure that
2604it has the correct characteristics of a version. Flags the
2605object if it contains an underscore (which denotes this
2606is a beta version).
2607
2608 char* scan_version(char *vstr, SV *sv)
2609
2610=for hackers
2611Found in file util.c
2612
2613=item scan_vstring
954c1994 2614
94bdecf9
JH
2615Returns a pointer to the next character after the parsed
2616vstring, as well as updating the passed in sv.
954c1994 2617
94bdecf9
JH
2618Function must be called like
2619
b0f01acb
JP
2620 sv = NEWSV(92,5);
2621 s = scan_vstring(s,sv);
94bdecf9 2622
b0f01acb
JP
2623The sv should already be large enough to store the vstring
2624passed in, for performance reasons.
94bdecf9 2625
b0f01acb 2626 char* scan_vstring(char *vstr, SV *sv)
954c1994 2627
497711e7 2628=for hackers
94bdecf9 2629Found in file util.c
497711e7 2630
954c1994
GS
2631=item SvCUR
2632
2633Returns the length of the string which is in the SV. See C<SvLEN>.
2634
2635 STRLEN SvCUR(SV* sv)
2636
497711e7
GS
2637=for hackers
2638Found in file sv.h
2639
954c1994
GS
2640=item SvCUR_set
2641
2642Set the length of the string which is in the SV. See C<SvCUR>.
2643
2644 void SvCUR_set(SV* sv, STRLEN len)
2645
497711e7
GS
2646=for hackers
2647Found in file sv.h
2648
94bdecf9 2649=item SvEND
954c1994 2650
94bdecf9
JH
2651Returns a pointer to the last character in the string which is in the SV.
2652See C<SvCUR>. Access the character as *(SvEND(sv)).
954c1994 2653
94bdecf9 2654 char* SvEND(SV* sv)
954c1994 2655
497711e7
GS
2656=for hackers
2657Found in file sv.h
2658
954c1994
GS
2659=item SvGROW
2660
2661Expands the character buffer in the SV so that it has room for the
2662indicated number of bytes (remember to reserve space for an extra trailing
8cf8f3d1 2663NUL character). Calls C<sv_grow> to perform the expansion if necessary.
954c1994
GS
2664Returns a pointer to the character buffer.
2665
679ac26e 2666 char * SvGROW(SV* sv, STRLEN len)
954c1994 2667
497711e7
GS
2668=for hackers
2669Found in file sv.h
2670
954c1994
GS
2671=item SvIOK
2672
2673Returns a boolean indicating whether the SV contains an integer.
2674
2675 bool SvIOK(SV* sv)
2676
497711e7
GS
2677=for hackers
2678Found in file sv.h
2679
954c1994
GS
2680=item SvIOKp
2681
2682Returns a boolean indicating whether the SV contains an integer. Checks
2683the B<private> setting. Use C<SvIOK>.
2684
2685 bool SvIOKp(SV* sv)
2686
497711e7
GS
2687=for hackers
2688Found in file sv.h
2689
e331fc52
JH
2690=item SvIOK_notUV
2691
f4758303 2692Returns a boolean indicating whether the SV contains a signed integer.
e331fc52
JH
2693
2694 void SvIOK_notUV(SV* sv)
2695
2696=for hackers
2697Found in file sv.h
2698
954c1994
GS
2699=item SvIOK_off
2700
2701Unsets the IV status of an SV.
2702
2703 void SvIOK_off(SV* sv)
2704
497711e7
GS
2705=for hackers
2706Found in file sv.h
2707
954c1994
GS
2708=item SvIOK_on
2709
2710Tells an SV that it is an integer.
2711
2712 void SvIOK_on(SV* sv)
2713
497711e7
GS
2714=for hackers
2715Found in file sv.h
2716
954c1994
GS
2717=item SvIOK_only
2718
2719Tells an SV that it is an integer and disables all other OK bits.
2720
2721 void SvIOK_only(SV* sv)
2722
497711e7
GS
2723=for hackers
2724Found in file sv.h
2725
e331fc52
JH
2726=item SvIOK_only_UV
2727
2728Tells and SV that it is an unsigned integer and disables all other OK bits.
2729
2730 void SvIOK_only_UV(SV* sv)
2731
2732=for hackers
2733Found in file sv.h
2734
2735=item SvIOK_UV
2736
2737Returns a boolean indicating whether the SV contains an unsigned integer.
2738
2739 void SvIOK_UV(SV* sv)
2740
2741=for hackers
2742Found in file sv.h
2743
19dbb8f1
NC
2744=item SvIsCOW
2745
2746Returns a boolean indicating whether the SV is Copy-On-Write. (either shared
2747hash key scalars, or full Copy On Write scalars if 5.9.0 is configured for
2748COW)
2749
2750 bool SvIsCOW(SV* sv)
2751
2752=for hackers
2753Found in file sv.h
2754
2755=item SvIsCOW_shared_hash
2756
2757Returns a boolean indicating whether the SV is Copy-On-Write shared hash key
2758scalar.
2759
2760 bool SvIsCOW_shared_hash(SV* sv)
2761
2762=for hackers
2763Found in file sv.h
2764
954c1994
GS
2765=item SvIV
2766
645c22ef
DM
2767Coerces the given SV to an integer and returns it. See C<SvIVx> for a
2768version which guarantees to evaluate sv only once.
954c1994
GS
2769
2770 IV SvIV(SV* sv)
2771
497711e7
GS
2772=for hackers
2773Found in file sv.h
2774
baca2b92 2775=item SvIVx
954c1994 2776
baca2b92
DM
2777Coerces the given SV to an integer and returns it. Guarantees to evaluate
2778sv only once. Use the more efficient C<SvIV> otherwise.
954c1994 2779
baca2b92 2780 IV SvIVx(SV* sv)
954c1994 2781
497711e7
GS
2782=for hackers
2783Found in file sv.h
2784
baca2b92 2785=item SvIVX
645c22ef 2786
baca2b92
DM
2787Returns the raw value in the SV's IV slot, without checks or conversions.
2788Only use when you are sure SvIOK is true. See also C<SvIV()>.
645c22ef 2789
baca2b92 2790 IV SvIVX(SV* sv)
645c22ef
DM
2791
2792=for hackers
2793Found in file sv.h
2794
954c1994
GS
2795=item SvLEN
2796
91e74348
JH
2797Returns the size of the string buffer in the SV, not including any part
2798attributable to C<SvOOK>. See C<SvCUR>.
954c1994
GS
2799
2800 STRLEN SvLEN(SV* sv)
2801
497711e7
GS
2802=for hackers
2803Found in file sv.h
2804
954c1994
GS
2805=item SvNIOK
2806
2807Returns a boolean indicating whether the SV contains a number, integer or
2808double.
2809
2810 bool SvNIOK(SV* sv)
2811
497711e7
GS
2812=for hackers
2813Found in file sv.h
2814
954c1994
GS
2815=item SvNIOKp
2816
2817Returns a boolean indicating whether the SV contains a number, integer or
2818double. Checks the B<private> setting. Use C<SvNIOK>.
2819
2820 bool SvNIOKp(SV* sv)
2821
497711e7
GS
2822=for hackers
2823Found in file sv.h
2824
954c1994
GS
2825=item SvNIOK_off
2826
2827Unsets the NV/IV status of an SV.
2828
2829 void SvNIOK_off(SV* sv)
2830
497711e7
GS
2831=for hackers
2832Found in file sv.h
2833
954c1994
GS
2834=item SvNOK
2835
2836Returns a boolean indicating whether the SV contains a double.
2837
2838 bool SvNOK(SV* sv)
2839
497711e7
GS
2840=for hackers
2841Found in file sv.h
2842
954c1994
GS
2843=item SvNOKp
2844
2845Returns a boolean indicating whether the SV contains a double. Checks the
2846B<private> setting. Use C<SvNOK>.
2847
2848 bool SvNOKp(SV* sv)
2849
497711e7
GS
2850=for hackers
2851Found in file sv.h
2852
954c1994
GS
2853=item SvNOK_off
2854
2855Unsets the NV status of an SV.
2856
2857 void SvNOK_off(SV* sv)
2858
497711e7
GS
2859=for hackers
2860Found in file sv.h
2861
954c1994
GS
2862=item SvNOK_on
2863
2864Tells an SV that it is a double.
2865
2866 void SvNOK_on(SV* sv)
2867
497711e7
GS
2868=for hackers
2869Found in file sv.h
2870
954c1994
GS
2871=item SvNOK_only
2872
2873Tells an SV that it is a double and disables all other OK bits.
2874
2875 void SvNOK_only(SV* sv)
2876
497711e7
GS
2877=for hackers
2878Found in file sv.h
2879
954c1994
GS
2880=item SvNV
2881
645c22ef
DM
2882Coerce the given SV to a double and return it. See C<SvNVx> for a version
2883which guarantees to evaluate sv only once.
954c1994
GS
2884
2885 NV SvNV(SV* sv)
2886
497711e7
GS
2887=for hackers
2888Found in file sv.h
2889
baca2b92 2890=item SvNVX
645c22ef 2891
baca2b92
DM
2892Returns the raw value in the SV's NV slot, without checks or conversions.
2893Only use when you are sure SvNOK is true. See also C<SvNV()>.
645c22ef 2894
baca2b92 2895 NV SvNVX(SV* sv)
645c22ef
DM
2896
2897=for hackers
2898Found in file sv.h
2899
baca2b92 2900=item SvNVx
954c1994 2901
baca2b92
DM
2902Coerces the given SV to a double and returns it. Guarantees to evaluate
2903sv only once. Use the more efficient C<SvNV> otherwise.
954c1994 2904
baca2b92 2905 NV SvNVx(SV* sv)
954c1994 2906
497711e7
GS
2907=for hackers
2908Found in file sv.h
2909
954c1994
GS
2910=item SvOK
2911
2912Returns a boolean indicating whether the value is an SV.
2913
2914 bool SvOK(SV* sv)
2915
497711e7
GS
2916=for hackers
2917Found in file sv.h
2918
954c1994
GS
2919=item SvOOK
2920
2921Returns a boolean indicating whether the SvIVX is a valid offset value for
2922the SvPVX. This hack is used internally to speed up removal of characters
2923from the beginning of a SvPV. When SvOOK is true, then the start of the
2924allocated string buffer is really (SvPVX - SvIVX).
2925
2926 bool SvOOK(SV* sv)
2927
497711e7
GS
2928=for hackers
2929Found in file sv.h
2930
954c1994
GS
2931=item SvPOK
2932
2933Returns a boolean indicating whether the SV contains a character
2934string.
2935
2936 bool SvPOK(SV* sv)
2937
497711e7
GS
2938=for hackers
2939Found in file sv.h
2940
954c1994
GS
2941=item SvPOKp
2942
2943Returns a boolean indicating whether the SV contains a character string.
2944Checks the B<private> setting. Use C<SvPOK>.
2945
2946 bool SvPOKp(SV* sv)
2947
497711e7
GS
2948=for hackers
2949Found in file sv.h
2950
954c1994
GS
2951=item SvPOK_off
2952
2953Unsets the PV status of an SV.
2954
2955 void SvPOK_off(SV* sv)
2956
497711e7
GS
2957=for hackers
2958Found in file sv.h
2959
954c1994
GS
2960=item SvPOK_on
2961
2962Tells an SV that it is a string.
2963
2964 void SvPOK_on(SV* sv)
2965
497711e7
GS
2966=for hackers
2967Found in file sv.h
2968
954c1994
GS
2969=item SvPOK_only
2970
2971Tells an SV that it is a string and disables all other OK bits.
d5ce4a7c 2972Will also turn off the UTF8 status.
954c1994
GS
2973
2974 void SvPOK_only(SV* sv)
2975
497711e7
GS
2976=for hackers
2977Found in file sv.h
2978
914184e1
JH
2979=item SvPOK_only_UTF8
2980
d5ce4a7c
GA
2981Tells an SV that it is a string and disables all other OK bits,
2982and leaves the UTF8 status as it was.
f1a1024e 2983
914184e1
JH
2984 void SvPOK_only_UTF8(SV* sv)
2985
2986=for hackers
2987Found in file sv.h
2988
954c1994
GS
2989=item SvPV
2990
12b7c5c7
JH
2991Returns a pointer to the string in the SV, or a stringified form of
2992the SV if the SV does not contain a string. The SV may cache the
2993stringified version becoming C<SvPOK>. Handles 'get' magic. See also
645c22ef 2994C<SvPVx> for a version which guarantees to evaluate sv only once.
954c1994
GS
2995
2996 char* SvPV(SV* sv, STRLEN len)
2997
497711e7
GS
2998=for hackers
2999Found in file sv.h
3000
645c22ef
DM
3001=item SvPVbyte
3002
3003Like C<SvPV>, but converts sv to byte representation first if necessary.
3004
3005 char* SvPVbyte(SV* sv, STRLEN len)
3006
3007=for hackers
3008Found in file sv.h
3009
3010=item SvPVbytex
3011
3012Like C<SvPV>, but converts sv to byte representation first if necessary.
d1be9408 3013Guarantees to evaluate sv only once; use the more efficient C<SvPVbyte>
645c22ef
DM
3014otherwise.
3015
645c22ef
DM
3016 char* SvPVbytex(SV* sv, STRLEN len)
3017
3018=for hackers
3019Found in file sv.h
3020
3021=item SvPVbytex_force
3022
3023Like C<SvPV_force>, but converts sv to byte representation first if necessary.
d1be9408 3024Guarantees to evaluate sv only once; use the more efficient C<SvPVbyte_force>
645c22ef
DM
3025otherwise.
3026
3027 char* SvPVbytex_force(SV* sv, STRLEN len)
3028
3029=for hackers
3030Found in file sv.h
3031
3032=item SvPVbyte_force
3033
3034Like C<SvPV_force>, but converts sv to byte representation first if necessary.
3035
3036 char* SvPVbyte_force(SV* sv, STRLEN len)
3037
3038=for hackers
3039Found in file sv.h
3040
3041=item SvPVbyte_nolen
3042
3043Like C<SvPV_nolen>, but converts sv to byte representation first if necessary.
3044
1fdc5aa6 3045 char* SvPVbyte_nolen(SV* sv)
645c22ef
DM
3046
3047=for hackers
3048Found in file sv.h
3049
3050=item SvPVutf8
3051
1fdc5aa6 3052Like C<SvPV>, but converts sv to utf8 first if necessary.
645c22ef
DM
3053
3054 char* SvPVutf8(SV* sv, STRLEN len)
3055
3056=for hackers
3057Found in file sv.h
3058
3059=item SvPVutf8x
3060
1fdc5aa6 3061Like C<SvPV>, but converts sv to utf8 first if necessary.
d1be9408 3062Guarantees to evaluate sv only once; use the more efficient C<SvPVutf8>
645c22ef
DM
3063otherwise.
3064
3065 char* SvPVutf8x(SV* sv, STRLEN len)
3066
3067=for hackers
3068Found in file sv.h
3069
3070=item SvPVutf8x_force
3071
1fdc5aa6 3072Like C<SvPV_force>, but converts sv to utf8 first if necessary.
d1be9408 3073Guarantees to evaluate sv only once; use the more efficient C<SvPVutf8_force>
645c22ef
DM
3074otherwise.
3075
3076 char* SvPVutf8x_force(SV* sv, STRLEN len)
3077
3078=for hackers
3079Found in file sv.h
3080
3081=item SvPVutf8_force
3082
1fdc5aa6 3083Like C<SvPV_force>, but converts sv to utf8 first if necessary.
645c22ef
DM
3084
3085 char* SvPVutf8_force(SV* sv, STRLEN len)
3086
3087=for hackers
3088Found in file sv.h
3089
3090=item SvPVutf8_nolen
3091
1fdc5aa6 3092Like C<SvPV_nolen>, but converts sv to utf8 first if necessary.
645c22ef 3093
1fdc5aa6 3094 char* SvPVutf8_nolen(SV* sv)
645c22ef
DM
3095
3096=for hackers
3097Found in file sv.h
3098
b0f01acb 3099=item SvPVx
645c22ef 3100
b0f01acb 3101A version of C<SvPV> which guarantees to evaluate sv only once.
645c22ef 3102
b0f01acb 3103 char* SvPVx(SV* sv, STRLEN len)
645c22ef
DM
3104
3105=for hackers
3106Found in file sv.h
3107
b0f01acb 3108=item SvPVX
954c1994 3109
b0f01acb
JP
3110Returns a pointer to the physical string in the SV. The SV must contain a
3111string.
954c1994 3112
b0f01acb 3113 char* SvPVX(SV* sv)
954c1994 3114
497711e7
GS
3115=for hackers
3116Found in file sv.h
3117
954c1994
GS
3118=item SvPV_force
3119
12b7c5c7
JH
3120Like C<SvPV> but will force the SV into containing just a string
3121(C<SvPOK_only>). You want force if you are going to update the C<SvPVX>
3122directly.
954c1994
GS
3123
3124 char* SvPV_force(SV* sv, STRLEN len)
3125
497711e7
GS
3126=for hackers
3127Found in file sv.h
3128
645c22ef
DM
3129=item SvPV_force_nomg
3130
12b7c5c7
JH
3131Like C<SvPV> but will force the SV into containing just a string
3132(C<SvPOK_only>). You want force if you are going to update the C<SvPVX>
3133directly. Doesn't process magic.
645c22ef
DM
3134
3135 char* SvPV_force_nomg(SV* sv, STRLEN len)
3136
3137=for hackers
3138Found in file sv.h
3139
954c1994
GS
3140=item SvPV_nolen
3141
12b7c5c7
JH
3142Returns a pointer to the string in the SV, or a stringified form of
3143the SV if the SV does not contain a string. The SV may cache the
3144stringified form becoming C<SvPOK>. Handles 'get' magic.
954c1994
GS
3145
3146 char* SvPV_nolen(SV* sv)
3147
497711e7
GS
3148=for hackers
3149Found in file sv.h
3150
954c1994
GS
3151=item SvREFCNT
3152
3153Returns the value of the object's reference count.
3154
3155 U32 SvREFCNT(SV* sv)
3156
497711e7
GS
3157=for hackers
3158Found in file sv.h
3159
954c1994
GS
3160=item SvREFCNT_dec
3161
3162Decrements the reference count of the given SV.
3163
3164 void SvREFCNT_dec(SV* sv)
3165
497711e7
GS
3166=for hackers
3167Found in file sv.h
3168
954c1994
GS
3169=item SvREFCNT_inc
3170
3171Increments the reference count of the given SV.
3172
3173 SV* SvREFCNT_inc(SV* sv)
3174
497711e7
GS
3175=for hackers
3176Found in file sv.h
3177
954c1994
GS
3178=item SvROK
3179
3180Tests if the SV is an RV.
3181
3182 bool SvROK(SV* sv)
3183
497711e7
GS
3184=for hackers
3185Found in file sv.h
3186
954c1994
GS
3187=item SvROK_off
3188
3189Unsets the RV status of an SV.
3190
3191 void SvROK_off(SV* sv)
3192
497711e7
GS
3193=for hackers
3194Found in file sv.h
3195
954c1994
GS
3196=item SvROK_on
3197
3198Tells an SV that it is an RV.
3199
3200 void SvROK_on(SV* sv)
3201
497711e7
GS
3202=for hackers
3203Found in file sv.h
3204
954c1994
GS
3205=item SvRV
3206
3207Dereferences an RV to return the SV.
3208
3209 SV* SvRV(SV* sv)
3210
497711e7
GS
3211=for hackers
3212Found in file sv.h
3213
954c1994
GS
3214=item SvSTASH
3215
3216Returns the stash of the SV.
3217
3218 HV* SvSTASH(SV* sv)
3219
497711e7
GS
3220=for hackers
3221Found in file sv.h
3222
954c1994
GS
3223=item SvTAINT
3224
3225Taints an SV if tainting is enabled
3226
3227 void SvTAINT(SV* sv)
3228
497711e7
GS
3229=for hackers
3230Found in file sv.h
3231
954c1994
GS
3232=item SvTAINTED
3233
3234Checks to see if an SV is tainted. Returns TRUE if it is, FALSE if
3235not.
3236
3237 bool SvTAINTED(SV* sv)
3238
497711e7
GS
3239=for hackers
3240Found in file sv.h
3241
954c1994
GS
3242=item SvTAINTED_off
3243
3244Untaints an SV. Be I<very> careful with this routine, as it short-circuits
3245some of Perl's fundamental security features. XS module authors should not
3246use this function unless they fully understand all the implications of
3247unconditionally untainting the value. Untainting should be done in the
3248standard perl fashion, via a carefully crafted regexp, rather than directly
3249untainting variables.
3250
3251 void SvTAINTED_off(SV* sv)
3252
497711e7
GS
3253=for hackers
3254Found in file sv.h
3255
954c1994
GS
3256=item SvTAINTED_on
3257
3258Marks an SV as tainted.
3259
3260 void SvTAINTED_on(SV* sv)
3261
497711e7
GS
3262=for hackers
3263Found in file sv.h
3264
954c1994
GS
3265=item SvTRUE
3266
3267Returns a boolean indicating whether Perl would evaluate the SV as true or
3268false, defined or undefined. Does not handle 'get' magic.
3269
3270 bool SvTRUE(SV* sv)
3271
497711e7
GS
3272=for hackers
3273Found in file sv.h
3274
9f4817db 3275=item SvTYPE
af3c7592 3276
9f4817db
JH
3277Returns the type of the SV. See C<svtype>.
3278
3279 svtype SvTYPE(SV* sv)
954c1994 3280
497711e7
GS
3281=for hackers
3282Found in file sv.h
3283
a4f1a029
NIS
3284=item SvUNLOCK
3285
3286Releases a mutual exclusion lock on sv if a suitable module
3287has been loaded.
3288
3289
3290 void SvUNLOCK(SV* sv)
3291
3292=for hackers
3293Found in file sv.h
3294
a8586c98
JH
3295=item SvUOK
3296
3297Returns a boolean indicating whether the SV contains an unsigned integer.
3298
3299 void SvUOK(SV* sv)
3300
3301=for hackers
3302Found in file sv.h
3303
954c1994
GS
3304=item SvUPGRADE
3305
3306Used to upgrade an SV to a more complex form. Uses C<sv_upgrade> to
3307perform the upgrade if necessary. See C<svtype>.
3308
3309 void SvUPGRADE(SV* sv, svtype type)
3310
497711e7
GS
3311=for hackers
3312Found in file sv.h
3313
914184e1
JH
3314=item SvUTF8
3315
3316Returns a boolean indicating whether the SV contains UTF-8 encoded data.
3317
3318 void SvUTF8(SV* sv)
3319
3320=for hackers
3321Found in file sv.h
3322
3323=item SvUTF8_off
3324
3325Unsets the UTF8 status of an SV.
3326
3327 void SvUTF8_off(SV *sv)
3328
3329=for hackers
3330Found in file sv.h
3331
3332=item SvUTF8_on
3333
d5ce4a7c
GA
3334Turn on the UTF8 status of an SV (the data is not changed, just the flag).
3335Do not use frivolously.
914184e1
JH
3336
3337 void SvUTF8_on(SV *sv)
3338
3339=for hackers
3340Found in file sv.h
3341
954c1994
GS
3342=item SvUV
3343
645c22ef
DM
3344Coerces the given SV to an unsigned integer and returns it. See C<SvUVx>
3345for a version which guarantees to evaluate sv only once.
954c1994
GS
3346
3347 UV SvUV(SV* sv)
3348
497711e7
GS
3349=for hackers
3350Found in file sv.h
3351
b0f01acb
JP
3352=item SvUVX
3353
3354Returns the raw value in the SV's UV slot, without checks or conversions.
3355Only use when you are sure SvIOK is true. See also C<SvUV()>.
3356
3357 UV SvUVX(SV* sv)
3358
3359=for hackers
3360Found in file sv.h
3361
d6721266 3362=item SvUVx
954c1994 3363
d6721266
DM
3364Coerces the given SV to an unsigned integer and returns it. Guarantees to
3365evaluate sv only once. Use the more efficient C<SvUV> otherwise.
954c1994 3366
d6721266 3367 UV SvUVx(SV* sv)
954c1994 3368
497711e7
GS
3369=for hackers
3370Found in file sv.h
3371
b0f01acb 3372=item SvVOK
645c22ef 3373
b0f01acb 3374Returns a boolean indicating whether the SV contains a v-string.
645c22ef 3375
b0f01acb 3376 bool SvVOK(SV* sv)
645c22ef
DM
3377
3378=for hackers
3379Found in file sv.h
3380
3381=item sv_2bool
3382
3383This function is only called on magical items, and is only used by
8cf8f3d1 3384sv_true() or its macro equivalent.
645c22ef
DM
3385
3386 bool sv_2bool(SV* sv)
3387
3388=for hackers
3389Found in file sv.c
3390
3391=item sv_2cv
3392
3393Using various gambits, try to get a CV from an SV; in addition, try if
3394possible to set C<*st> and C<*gvp> to the stash and GV associated with it.
3395
3396 CV* sv_2cv(SV* sv, HV** st, GV** gvp, I32 lref)
3397
3398=for hackers
3399Found in file sv.c
3400
3401=item sv_2io
3402
3403Using various gambits, try to get an IO from an SV: the IO slot if its a
3404GV; or the recursive result if we're an RV; or the IO slot of the symbol
3405named after the PV if we're a string.
3406
3407 IO* sv_2io(SV* sv)
3408
3409=for hackers
3410Found in file sv.c
3411
3412=item sv_2iv
3413
3414Return the integer value of an SV, doing any necessary string conversion,
3415magic etc. Normally used via the C<SvIV(sv)> and C<SvIVx(sv)> macros.
3416
3417 IV sv_2iv(SV* sv)
3418
3419=for hackers
3420Found in file sv.c
3421
954c1994
GS
3422=item sv_2mortal
3423
793edb8a
JH
3424Marks an existing SV as mortal. The SV will be destroyed "soon", either
3425by an explicit call to FREETMPS, or by an implicit call at places such as
3426statement boundaries. See also C<sv_newmortal> and C<sv_mortalcopy>.
954c1994
GS
3427
3428 SV* sv_2mortal(SV* sv)
3429
497711e7
GS
3430=for hackers
3431Found in file sv.c
3432
645c22ef
DM
3433=item sv_2nv
3434
3435Return the num value of an SV, doing any necessary string or integer
3436conversion, magic etc. Normally used via the C<SvNV(sv)> and C<SvNVx(sv)>
3437macros.
3438
3439 NV sv_2nv(SV* sv)
3440
3441=for hackers
3442Found in file sv.c
3443
451be7b1
DM
3444=item sv_2pvbyte
3445
3446Return a pointer to the byte-encoded representation of the SV, and set *lp
3447to its length. May cause the SV to be downgraded from UTF8 as a
3448side-effect.
3449
3450Usually accessed via the C<SvPVbyte> macro.
3451
3452 char* sv_2pvbyte(SV* sv, STRLEN* lp)
3453
3454=for hackers
3455Found in file sv.c
3456
645c22ef
DM
3457=item sv_2pvbyte_nolen
3458
3459Return a pointer to the byte-encoded representation of the SV.
3460May cause the SV to be downgraded from UTF8 as a side-effect.
3461
3462Usually accessed via the C<SvPVbyte_nolen> macro.
3463
3464 char* sv_2pvbyte_nolen(SV* sv)
3465
3466=for hackers
3467Found in file sv.c
3468
451be7b1
DM
3469=item sv_2pvutf8
3470
3471Return a pointer to the UTF8-encoded representation of the SV, and set *lp
3472to its length. May cause the SV to be upgraded to UTF8 as a side-effect.
3473
3474Usually accessed via the C<SvPVutf8> macro.
3475
3476 char* sv_2pvutf8(SV* sv, STRLEN* lp)
3477
3478=for hackers
3479Found in file sv.c
3480
645c22ef
DM
3481=item sv_2pvutf8_nolen
3482
3483Return a pointer to the UTF8-encoded representation of the SV.
3484May cause the SV to be upgraded to UTF8 as a side-effect.
3485
3486Usually accessed via the C<SvPVutf8_nolen> macro.
3487
3488 char* sv_2pvutf8_nolen(SV* sv)
3489
3490=for hackers
3491Found in file sv.c
3492
3493=item sv_2pv_flags
3494
ff276b08 3495Returns a pointer to the string value of an SV, and sets *lp to its length.
645c22ef
DM
3496If flags includes SV_GMAGIC, does an mg_get() first. Coerces sv to a string
3497if necessary.
3498Normally invoked via the C<SvPV_flags> macro. C<sv_2pv()> and C<sv_2pv_nomg>
3499usually end up here too.
3500
3501 char* sv_2pv_flags(SV* sv, STRLEN* lp, I32 flags)
3502
3503=for hackers
3504Found in file sv.c
3505
3506=item sv_2pv_nolen
3507
3508Like C<sv_2pv()>, but doesn't return the length too. You should usually
3509use the macro wrapper C<SvPV_nolen(sv)> instead.
3510 char* sv_2pv_nolen(SV* sv)
3511
3512=for hackers
3513Found in file sv.c
3514
3515=item sv_2uv
3516
3517Return the unsigned integer value of an SV, doing any necessary string
3518conversion, magic etc. Normally used via the C<SvUV(sv)> and C<SvUVx(sv)>
3519macros.
3520
3521 UV sv_2uv(SV* sv)
3522
3523=for hackers
3524Found in file sv.c
3525
3526=item sv_backoff
3527
3528Remove any string offset. You should normally use the C<SvOOK_off> macro
3529wrapper instead.
3530
3531 int sv_backoff(SV* sv)
3532
3533=for hackers
3534Found in file sv.c
3535
954c1994
GS
3536=item sv_bless
3537
3538Blesses an SV into a specified package. The SV must be an RV. The package
3539must be designated by its stash (see C<gv_stashpv()>). The reference count
3540of the SV is unaffected.
3541
3542 SV* sv_bless(SV* sv, HV* stash)
3543
497711e7
GS
3544=for hackers
3545Found in file sv.c
3546
954c1994
GS
3547=item sv_catpv
3548
3549Concatenates the string onto the end of the string which is in the SV.
d5ce4a7c
GA
3550If the SV has the UTF8 status set, then the bytes appended should be
3551valid UTF8. Handles 'get' magic, but not 'set' magic. See C<sv_catpv_mg>.
954c1994
GS
3552
3553 void sv_catpv(SV* sv, const char* ptr)
3554
497711e7
GS
3555=for hackers
3556Found in file sv.c
3557
954c1994
GS
3558=item sv_catpvf
3559
d5ce4a7c
GA
3560Processes its arguments like C<sprintf> and appends the formatted
3561output to an SV. If the appended data contains "wide" characters
3562(including, but not limited to, SVs with a UTF-8 PV formatted with %s,
3563and characters >255 formatted with %c), the original SV might get
3564upgraded to UTF-8. Handles 'get' magic, but not 'set' magic.
3565C<SvSETMAGIC()> must typically be called after calling this function
3566to handle 'set' magic.
954c1994
GS
3567
3568 void sv_catpvf(SV* sv, const char* pat, ...)
3569
497711e7
GS
3570=for hackers
3571Found in file sv.c
3572
954c1994
GS
3573=item sv_catpvf_mg
3574
3575Like C<sv_catpvf>, but also handles 'set' magic.
3576
3577 void sv_catpvf_mg(SV *sv, const char* pat, ...)
3578
497711e7
GS
3579=for hackers
3580Found in file sv.c
3581
954c1994
GS
3582=item sv_catpvn
3583
3584Concatenates the string onto the end of the string which is in the SV. The
d5ce4a7c
GA
3585C<len> indicates number of bytes to copy. If the SV has the UTF8
3586status set, then the bytes appended should be valid UTF8.
3587Handles 'get' magic, but not 'set' magic. See C<sv_catpvn_mg>.
954c1994
GS
3588
3589 void sv_catpvn(SV* sv, const char* ptr, STRLEN len)
3590
497711e7
GS
3591=for hackers
3592Found in file sv.c
3593
8d6d96c1
HS
3594=item sv_catpvn_flags
3595
3596Concatenates the string onto the end of the string which is in the SV. The
3597C<len> indicates number of bytes to copy. If the SV has the UTF8
3598status set, then the bytes appended should be valid UTF8.
3599If C<flags> has C<SV_GMAGIC> bit set, will C<mg_get> on C<dsv> if
3600appropriate, else not. C<sv_catpvn> and C<sv_catpvn_nomg> are implemented
3601in terms of this function.
3602
3603 void sv_catpvn_flags(SV* sv, const char* ptr, STRLEN len, I32 flags)
3604
3605=for hackers
3606Found in file sv.c
3607
954c1994
GS
3608=item sv_catpvn_mg
3609
3610Like C<sv_catpvn>, but also handles 'set' magic.
3611
3612 void sv_catpvn_mg(SV *sv, const char *ptr, STRLEN len)
3613
497711e7
GS
3614=for hackers
3615Found in file sv.c
3616
954c1994
GS
3617=item sv_catpv_mg
3618
3619Like C<sv_catpv>, but also handles 'set' magic.
3620
3621 void sv_catpv_mg(SV *sv, const char *ptr)
3622
497711e7
GS
3623=for hackers
3624Found in file sv.c
3625
954c1994
GS
3626=item sv_catsv
3627
1aa99e6b
IH
3628Concatenates the string from SV C<ssv> onto the end of the string in
3629SV C<dsv>. Modifies C<dsv> but not C<ssv>. Handles 'get' magic, but
3630not 'set' magic. See C<sv_catsv_mg>.
954c1994
GS
3631
3632 void sv_catsv(SV* dsv, SV* ssv)
3633
497711e7
GS
3634=for hackers
3635Found in file sv.c
3636
8d6d96c1
HS
3637=item sv_catsv_flags
3638
3639Concatenates the string from SV C<ssv> onto the end of the string in
3640SV C<dsv>. Modifies C<dsv> but not C<ssv>. If C<flags> has C<SV_GMAGIC>
3641bit set, will C<mg_get> on the SVs if appropriate, else not. C<sv_catsv>
3642and C<sv_catsv_nomg> are implemented in terms of this function.
3643
3644 void sv_catsv_flags(SV* dsv, SV* ssv, I32 flags)
3645
3646=for hackers
3647Found in file sv.c
3648
954c1994
GS
3649=item sv_catsv_mg
3650
3651Like C<sv_catsv>, but also handles 'set' magic.
3652
3653 void sv_catsv_mg(SV *dstr, SV *sstr)
3654
497711e7
GS
3655=for hackers
3656Found in file sv.c
3657
954c1994
GS
3658=item sv_chop
3659
1c846c1f 3660Efficient removal of characters from the beginning of the string buffer.
954c1994
GS
3661SvPOK(sv) must be true and the C<ptr> must be a pointer to somewhere inside
3662the string buffer. The C<ptr> becomes the first character of the adjusted
645c22ef 3663string. Uses the "OOK hack".
954c1994
GS
3664
3665 void sv_chop(SV* sv, char* ptr)
3666
497711e7
GS
3667=for hackers
3668Found in file sv.c
3669
c461cf8f
JH
3670=item sv_clear
3671
645c22ef
DM
3672Clear an SV: call any destructors, free up any memory used by the body,
3673and free the body itself. The SV's head is I<not> freed, although
3674its type is set to all 1's so that it won't inadvertently be assumed
3675to be live during global destruction etc.
3676This function should only be called when REFCNT is zero. Most of the time
3677you'll want to call C<sv_free()> (or its macro wrapper C<SvREFCNT_dec>)
3678instead.
c461cf8f
JH
3679
3680 void sv_clear(SV* sv)
3681
3682=for hackers
3683Found in file sv.c
3684
954c1994
GS
3685=item sv_cmp
3686
3687Compares the strings in two SVs. Returns -1, 0, or 1 indicating whether the
3688string in C<sv1> is less than, equal to, or greater than the string in
645c22ef
DM
3689C<sv2>. Is UTF-8 and 'use bytes' aware, handles get magic, and will
3690coerce its args to strings if necessary. See also C<sv_cmp_locale>.
954c1994
GS
3691
3692 I32 sv_cmp(SV* sv1, SV* sv2)
3693
497711e7
GS
3694=for hackers
3695Found in file sv.c
3696
c461cf8f
JH
3697=item sv_cmp_locale
3698
645c22ef
DM
3699Compares the strings in two SVs in a locale-aware manner. Is UTF-8 and
3700'use bytes' aware, handles get magic, and will coerce its args to strings
3701if necessary. See also C<sv_cmp_locale>. See also C<sv_cmp>.
c461cf8f
JH
3702
3703 I32 sv_cmp_locale(SV* sv1, SV* sv2)
3704
3705=for hackers
3706Found in file sv.c
3707
645c22ef
DM
3708=item sv_collxfrm
3709
3710Add Collate Transform magic to an SV if it doesn't already have it.
3711
3712Any scalar variable may carry PERL_MAGIC_collxfrm magic that contains the
3713scalar data of the variable, but transformed to such a format that a normal
3714memory comparison can be used to compare the data according to the locale
3715settings.
3716
3717 char* sv_collxfrm(SV* sv, STRLEN* nxp)
3718
3719=for hackers
3720Found in file sv.c
3721
6050d10e
JP
3722=item sv_copypv
3723
3724Copies a stringified representation of the source SV into the
3725destination SV. Automatically performs any necessary mg_get and
9ede5bc8 3726coercion of numeric values into strings. Guaranteed to preserve
6050d10e 3727UTF-8 flag even from overloaded objects. Similar in nature to
9ede5bc8
DM
3728sv_2pv[_flags] but operates directly on an SV instead of just the
3729string. Mostly uses sv_2pv_flags to do its work, except when that
6050d10e
JP
3730would lose the UTF-8'ness of the PV.
3731
3732 void sv_copypv(SV* dsv, SV* ssv)
3733
3734=for hackers
3735Found in file sv.c
3736
954c1994
GS
3737=item sv_dec
3738
645c22ef
DM
3739Auto-decrement of the value in the SV, doing string to numeric conversion
3740if necessary. Handles 'get' magic.
954c1994
GS
3741
3742 void sv_dec(SV* sv)
3743
497711e7
GS
3744=for hackers
3745Found in file sv.c
3746
954c1994
GS
3747=item sv_derived_from
3748
3749Returns a boolean indicating whether the SV is derived from the specified
3750class. This is the function that implements C<UNIVERSAL::isa>. It works
3751for class names as well as for objects.
3752
3753 bool sv_derived_from(SV* sv, const char* name)
3754
497711e7
GS
3755=for hackers
3756Found in file universal.c
3757
954c1994
GS
3758=item sv_eq
3759
3760Returns a boolean indicating whether the strings in the two SVs are
645c22ef
DM
3761identical. Is UTF-8 and 'use bytes' aware, handles get magic, and will
3762coerce its args to strings if necessary.
954c1994
GS
3763
3764 I32 sv_eq(SV* sv1, SV* sv2)
3765
497711e7
GS
3766=for hackers
3767Found in file sv.c
3768
645c22ef
DM
3769=item sv_force_normal
3770
3771Undo various types of fakery on an SV: if the PV is a shared string, make
3772a private copy; if we're a ref, stop refing; if we're a glob, downgrade to
3773an xpvmg. See also C<sv_force_normal_flags>.
3774
3775 void sv_force_normal(SV *sv)
3776
3777=for hackers
3778Found in file sv.c
3779
3780=item sv_force_normal_flags
3781
3782Undo various types of fakery on an SV: if the PV is a shared string, make
3783a private copy; if we're a ref, stop refing; if we're a glob, downgrade to
765f542d
NC
3784an xpvmg; if we're a copy-on-write scalar, this is the on-write time when
3785we do the copy, and is also used locally. If C<SV_COW_DROP_PV> is set
3786then a copy-on-write scalar drops its PV buffer (if any) and becomes
3787SvPOK_off rather than making a copy. (Used where this scalar is about to be
d3050d9d 3788set to some other value.) In addition, the C<flags> parameter gets passed to
765f542d
NC
3789C<sv_unref_flags()> when unrefing. C<sv_force_normal> calls this function
3790with flags set to 0.
645c22ef
DM
3791
3792 void sv_force_normal_flags(SV *sv, U32 flags)
3793
3794=for hackers
3795Found in file sv.c
3796
c461cf8f
JH
3797=item sv_free
3798
645c22ef
DM
3799Decrement an SV's reference count, and if it drops to zero, call
3800C<sv_clear> to invoke destructors and free up any memory used by
3801the body; finally, deallocate the SV's head itself.
3802Normally called via a wrapper macro C<SvREFCNT_dec>.
c461cf8f
JH
3803
3804 void sv_free(SV* sv)
3805
3806=for hackers
3807Found in file sv.c
3808
3809=item sv_gets
3810
3811Get a line from the filehandle and store it into the SV, optionally
3812appending to the currently-stored string.
3813
3814 char* sv_gets(SV* sv, PerlIO* fp, I32 append)
3815
3816=for hackers
3817Found in file sv.c
3818
954c1994
GS
3819=item sv_grow
3820
645c22ef
DM
3821Expands the character buffer in the SV. If necessary, uses C<sv_unref> and
3822upgrades the SV to C<SVt_PV>. Returns a pointer to the character buffer.
3823Use the C<SvGROW> wrapper instead.
954c1994
GS
3824
3825 char* sv_grow(SV* sv, STRLEN newlen)
3826
497711e7
GS
3827=for hackers
3828Found in file sv.c
3829
954c1994
GS
3830=item sv_inc
3831
645c22ef
DM
3832Auto-increment of the value in the SV, doing string to numeric conversion
3833if necessary. Handles 'get' magic.
954c1994
GS
3834
3835 void sv_inc(SV* sv)
3836
497711e7
GS
3837=for hackers
3838Found in file sv.c
3839
954c1994
GS
3840=item sv_insert
3841
3842Inserts a string at the specified offset/length within the SV. Similar to
3843the Perl substr() function.
3844
3845 void sv_insert(SV* bigsv, STRLEN offset, STRLEN len, char* little, STRLEN littlelen)
3846
497711e7
GS
3847=for hackers
3848Found in file sv.c
3849
954c1994
GS
3850=item sv_isa
3851
3852Returns a boolean indicating whether the SV is blessed into the specified
3853class. This does not check for subtypes; use C<sv_derived_from> to verify
3854an inheritance relationship.
3855
3856 int sv_isa(SV* sv, const char* name)
3857
497711e7
GS
3858=for hackers
3859Found in file sv.c
3860
954c1994
GS
3861=item sv_isobject
3862
3863Returns a boolean indicating whether the SV is an RV pointing to a blessed
3864object. If the SV is not an RV, or if the object is not blessed, then this
3865will return false.
3866
3867 int sv_isobject(SV* sv)
3868
497711e7
GS
3869=for hackers
3870Found in file sv.c
3871
645c22ef
DM
3872=item sv_iv
3873
3874A private implementation of the C<SvIVx> macro for compilers which can't
3875cope with complex macro expressions. Always use the macro instead.
3876
3877 IV sv_iv(SV* sv)
3878
3879=for hackers
3880Found in file sv.c
3881
954c1994
GS
3882=item sv_len
3883
645c22ef
DM
3884Returns the length of the string in the SV. Handles magic and type
3885coercion. See also C<SvCUR>, which gives raw access to the xpv_cur slot.
954c1994
GS
3886
3887 STRLEN sv_len(SV* sv)
3888
497711e7
GS
3889=for hackers
3890Found in file sv.c
3891
c461cf8f
JH
3892=item sv_len_utf8
3893
3894Returns the number of characters in the string in an SV, counting wide
645c22ef 3895UTF8 bytes as a single character. Handles magic and type coercion.
c461cf8f
JH
3896
3897 STRLEN sv_len_utf8(SV* sv)
3898
3899=for hackers
3900Found in file sv.c
3901
954c1994
GS
3902=item sv_magic
3903
645c22ef
DM
3904Adds magic to an SV. First upgrades C<sv> to type C<SVt_PVMG> if necessary,
3905then adds a new magic item of type C<how> to the head of the magic list.
3906
954c1994
GS
3907 void sv_magic(SV* sv, SV* obj, int how, const char* name, I32 namlen)
3908
497711e7
GS
3909=for hackers
3910Found in file sv.c
3911
a4f1a029
NIS
3912=item sv_magicext
3913
3914Adds magic to an SV, upgrading it if necessary. Applies the
3915supplied vtable and returns pointer to the magic added.
3916
3917Note that sv_magicext will allow things that sv_magic will not.
3918In particular you can add magic to SvREADONLY SVs and and more than
3919one instance of the same 'how'
3920
3921I C<namelen> is greater then zero then a savepvn() I<copy> of C<name> is stored,
3922if C<namelen> is zero then C<name> is stored as-is and - as another special
3923case - if C<(name && namelen == HEf_SVKEY)> then C<name> is assumed to contain
3924an C<SV*> and has its REFCNT incremented
3925
3926(This is now used as a subroutine by sv_magic.)
3927
3928 MAGIC * sv_magicext(SV* sv, SV* obj, int how, MGVTBL *vtbl, const char* name, I32 namlen )
3929
3930=for hackers
3931Found in file sv.c
3932
954c1994
GS
3933=item sv_mortalcopy
3934
645c22ef 3935Creates a new SV which is a copy of the original SV (using C<sv_setsv>).
793edb8a
JH
3936The new SV is marked as mortal. It will be destroyed "soon", either by an
3937explicit call to FREETMPS, or by an implicit call at places such as
3938statement boundaries. See also C<sv_newmortal> and C<sv_2mortal>.
954c1994
GS
3939
3940 SV* sv_mortalcopy(SV* oldsv)
3941
497711e7
GS
3942=for hackers
3943Found in file sv.c
3944
954c1994
GS
3945=item sv_newmortal
3946
645c22ef 3947Creates a new null SV which is mortal. The reference count of the SV is
793edb8a
JH
3948set to 1. It will be destroyed "soon", either by an explicit call to
3949FREETMPS, or by an implicit call at places such as statement boundaries.
3950See also C<sv_mortalcopy> and C<sv_2mortal>.
954c1994
GS
3951
3952 SV* sv_newmortal()
3953
497711e7
GS
3954=for hackers
3955Found in file sv.c
3956
645c22ef
DM
3957=item sv_newref
3958
3959Increment an SV's reference count. Use the C<SvREFCNT_inc()> wrapper
3960instead.
3961
3962 SV* sv_newref(SV* sv)
3963
3964=for hackers
3965Found in file sv.c
3966
a4f1a029
NIS
3967=item sv_nolocking
3968
3969Dummy routine which "locks" an SV when there is no locking module present.
3970Exists to avoid test for a NULL function pointer and because it could potentially warn under
3971some level of strict-ness.
3972
3973 void sv_nolocking(SV *)
3974
3975=for hackers
3976Found in file util.c
3977
3978=item sv_nosharing
3979
3980Dummy routine which "shares" an SV when there is no sharing module present.
3981Exists to avoid test for a NULL function pointer and because it could potentially warn under
3982some level of strict-ness.
3983
3984 void sv_nosharing(SV *)
3985
3986=for hackers
3987Found in file util.c
3988
3989=item sv_nounlocking
3990
3991Dummy routine which "unlocks" an SV when there is no locking module present.
3992Exists to avoid test for a NULL function pointer and because it could potentially warn under
3993some level of strict-ness.
3994
3995 void sv_nounlocking(SV *)
3996
3997=for hackers
3998Found in file util.c
3999
645c22ef
DM
4000=item sv_nv
4001
4002A private implementation of the C<SvNVx> macro for compilers which can't
4003cope with complex macro expressions. Always use the macro instead.
4004
4005 NV sv_nv(SV* sv)
4006
4007=for hackers
4008Found in file sv.c
4009
4010=item sv_pos_b2u
4011
4012Converts the value pointed to by offsetp from a count of bytes from the
4013start of the string, to a count of the equivalent number of UTF8 chars.
4014Handles magic and type coercion.
4015
4016 void sv_pos_b2u(SV* sv, I32* offsetp)
4017
4018=for hackers
4019Found in file sv.c
4020
4021=item sv_pos_u2b
4022
4023Converts the value pointed to by offsetp from a count of UTF8 chars from
4024the start of the string, to a count of the equivalent number of bytes; if
4025lenp is non-zero, it does the same to lenp, but this time starting from
4026the offset, rather than from the start of the string. Handles magic and
4027type coercion.
4028
4029 void sv_pos_u2b(SV* sv, I32* offsetp, I32* lenp)
4030
4031=for hackers
4032Found in file sv.c
4033
451be7b1
DM
4034=item sv_pv
4035
baca2b92 4036Use the C<SvPV_nolen> macro instead
451be7b1
DM
4037
4038 char* sv_pv(SV *sv)
4039
4040=for hackers
4041Found in file sv.c
4042
645c22ef
DM
4043=item sv_pvbyte
4044
baca2b92 4045Use C<SvPVbyte_nolen> instead.
645c22ef
DM
4046
4047 char* sv_pvbyte(SV *sv)
4048
4049=for hackers
4050Found in file sv.c
4051
4052=item sv_pvbyten
4053
4054A private implementation of the C<SvPVbyte> macro for compilers
4055which can't cope with complex macro expressions. Always use the macro
4056instead.
4057
4058 char* sv_pvbyten(SV *sv, STRLEN *len)
4059
4060=for hackers
4061Found in file sv.c
4062
4063=item sv_pvbyten_force
4064
4065A private implementation of the C<SvPVbytex_force> macro for compilers
4066which can't cope with complex macro expressions. Always use the macro
4067instead.
4068
4069 char* sv_pvbyten_force(SV* sv, STRLEN* lp)
4070
4071=for hackers
4072Found in file sv.c
4073
451be7b1
DM
4074=item sv_pvn
4075
4076A private implementation of the C<SvPV> macro for compilers which can't
4077cope with complex macro expressions. Always use the macro instead.
4078
4079 char* sv_pvn(SV *sv, STRLEN *len)
4080
4081=for hackers
4082Found in file sv.c
4083
c461cf8f
JH
4084=item sv_pvn_force
4085
4086Get a sensible string out of the SV somehow.
645c22ef
DM
4087A private implementation of the C<SvPV_force> macro for compilers which
4088can't cope with complex macro expressions. Always use the macro instead.
c461cf8f
JH
4089
4090 char* sv_pvn_force(SV* sv, STRLEN* lp)
4091
4092=for hackers
4093Found in file sv.c
4094
8d6d96c1
HS
4095=item sv_pvn_force_flags
4096
4097Get a sensible string out of the SV somehow.
4098If C<flags> has C<SV_GMAGIC> bit set, will C<mg_get> on C<sv> if
4099appropriate, else not. C<sv_pvn_force> and C<sv_pvn_force_nomg> are
4100implemented in terms of this function.
645c22ef
DM
4101You normally want to use the various wrapper macros instead: see
4102C<SvPV_force> and C<SvPV_force_nomg>
8d6d96c1
HS
4103
4104 char* sv_pvn_force_flags(SV* sv, STRLEN* lp, I32 flags)
4105
4106=for hackers
4107Found in file sv.c
4108
645c22ef
DM
4109=item sv_pvutf8
4110
baca2b92 4111Use the C<SvPVutf8_nolen> macro instead
645c22ef
DM
4112
4113 char* sv_pvutf8(SV *sv)
4114
4115=for hackers
4116Found in file sv.c
4117
4118=item sv_pvutf8n
4119
4120A private implementation of the C<SvPVutf8> macro for compilers
4121which can't cope with complex macro expressions. Always use the macro
4122instead.
4123
4124 char* sv_pvutf8n(SV *sv, STRLEN *len)
4125
4126=for hackers
4127Found in file sv.c
4128
c461cf8f
JH
4129=item sv_pvutf8n_force
4130
645c22ef
DM
4131A private implementation of the C<SvPVutf8_force> macro for compilers
4132which can't cope with complex macro expressions. Always use the macro
4133instead.
c461cf8f
JH
4134
4135 char* sv_pvutf8n_force(SV* sv, STRLEN* lp)
4136
4137=for hackers
4138Found in file sv.c
4139
4140=item sv_reftype
4141
4142Returns a string describing what the SV is a reference to.
4143
4144 char* sv_reftype(SV* sv, int ob)
4145
4146=for hackers
4147Found in file sv.c
4148
4149=item sv_replace
4150
4151Make the first argument a copy of the second, then delete the original.
645c22ef
DM
4152The target SV physically takes over ownership of the body of the source SV
4153and inherits its flags; however, the target keeps any magic it owns,
4154and any magic in the source is discarded.
ff276b08 4155Note that this is a rather specialist SV copying operation; most of the
645c22ef 4156time you'll want to use C<sv_setsv> or one of its many macro front-ends.
c461cf8f
JH
4157
4158 void sv_replace(SV* sv, SV* nsv)
4159
4160=for hackers
4161Found in file sv.c
4162
645c22ef
DM
4163=item sv_report_used
4164
4165Dump the contents of all SVs not yet freed. (Debugging aid).
4166
4167 void sv_report_used()
4168
4169=for hackers
4170Found in file sv.c
4171
451be7b1
DM
4172=item sv_reset
4173
4174Underlying implementation for the C<reset> Perl function.
4175Note that the perl-level function is vaguely deprecated.
4176
4177 void sv_reset(char* s, HV* stash)
4178
4179=for hackers
4180Found in file sv.c
4181
c461cf8f
JH
4182=item sv_rvweaken
4183
645c22ef
DM
4184Weaken a reference: set the C<SvWEAKREF> flag on this RV; give the
4185referred-to SV C<PERL_MAGIC_backref> magic if it hasn't already; and
4186push a back-reference to this RV onto the array of backreferences
4187associated with that magic.
c461cf8f
JH
4188
4189 SV* sv_rvweaken(SV *sv)
4190
4191=for hackers
4192Found in file sv.c
4193
954c1994
GS
4194=item sv_setiv
4195
645c22ef
DM
4196Copies an integer into the given SV, upgrading first if necessary.
4197Does not handle 'set' magic. See also C<sv_setiv_mg>.
954c1994
GS
4198
4199 void sv_setiv(SV* sv, IV num)
4200
497711e7
GS
4201=for hackers
4202Found in file sv.c
4203
954c1994
GS
4204=item sv_setiv_mg
4205
4206Like C<sv_setiv>, but also handles 'set' magic.
4207
4208 void sv_setiv_mg(SV *sv, IV i)
4209
497711e7
GS
4210=for hackers
4211Found in file sv.c
4212
954c1994
GS
4213=item sv_setnv
4214
645c22ef
DM
4215Copies a double into the given SV, upgrading first if necessary.
4216Does not handle 'set' magic. See also C<sv_setnv_mg>.
954c1994
GS
4217
4218 void sv_setnv(SV* sv, NV num)
4219
497711e7
GS
4220=for hackers
4221Found in file sv.c
4222
954c1994
GS
4223=item sv_setnv_mg
4224
4225Like C<sv_setnv>, but also handles 'set' magic.
4226
4227 void sv_setnv_mg(SV *sv, NV num)
4228
497711e7
GS
4229=for hackers
4230Found in file sv.c
4231
954c1994
GS
4232=item sv_setpv
4233
4234Copies a string into an SV. The string must be null-terminated. Does not
4235handle 'set' magic. See C<sv_setpv_mg>.
4236
4237 void sv_setpv(SV* sv, const char* ptr)
4238
497711e7
GS
4239=for hackers
4240Found in file sv.c
4241
954c1994
GS
4242=item sv_setpvf
4243
4244Processes its arguments like C<sprintf> and sets an SV to the formatted
4245output. Does not handle 'set' magic. See C<sv_setpvf_mg>.
4246
4247 void sv_setpvf(SV* sv, const char* pat, ...)
4248
497711e7
GS
4249=for hackers
4250Found in file sv.c
4251
954c1994
GS
4252=item sv_setpvf_mg
4253
4254Like C<sv_setpvf>, but also handles 'set' magic.
4255
4256 void sv_setpvf_mg(SV *sv, const char* pat, ...)
4257
497711e7
GS
4258=for hackers
4259Found in file sv.c
4260
2307c6d0
SB
4261=item sv_setpviv
4262
4263Copies an integer into the given SV, also updating its string value.
4264Does not handle 'set' magic. See C<sv_setpviv_mg>.
4265
4266 void sv_setpviv(SV* sv, IV num)
4267
4268=for hackers
4269Found in file sv.c
4270
4271=item sv_setpviv_mg
4272
4273Like C<sv_setpviv>, but also handles 'set' magic.
4274
4275 void sv_setpviv_mg(SV *sv, IV iv)
4276
4277=for hackers
4278Found in file sv.c
4279
954c1994
GS
4280=item sv_setpvn
4281
4282Copies a string into an SV. The C<len> parameter indicates the number of
4283bytes to be copied. Does not handle 'set' magic. See C<sv_setpvn_mg>.
4284
4285 void sv_setpvn(SV* sv, const char* ptr, STRLEN len)
4286
497711e7
GS
4287=for hackers
4288Found in file sv.c
4289
954c1994
GS
4290=item sv_setpvn_mg
4291
4292Like C<sv_setpvn>, but also handles 'set' magic.
4293
4294 void sv_setpvn_mg(SV *sv, const char *ptr, STRLEN len)
4295
497711e7
GS
4296=for hackers
4297Found in file sv.c
4298
954c1994
GS
4299=item sv_setpv_mg
4300
4301Like C<sv_setpv>, but also handles 'set' magic.
4302
4303 void sv_setpv_mg(SV *sv, const char *ptr)
4304
497711e7
GS
4305=for hackers
4306Found in file sv.c
4307
954c1994
GS
4308=item sv_setref_iv
4309
4310Copies an integer into a new SV, optionally blessing the SV. The C<rv>
4311argument will be upgraded to an RV. That RV will be modified to point to
4312the new SV. The C<classname> argument indicates the package for the
4313blessing. Set C<classname> to C<Nullch> to avoid the blessing. The new SV
4314will be returned and will have a reference count of 1.
4315
4316 SV* sv_setref_iv(SV* rv, const char* classname, IV iv)
4317
497711e7
GS
4318=for hackers
4319Found in file sv.c
4320
954c1994
GS
4321=item sv_setref_nv
4322
4323Copies a double into a new SV, optionally blessing the SV. The C<rv>
4324argument will be upgraded to an RV. That RV will be modified to point to
4325the new SV. The C<classname> argument indicates the package for the
4326blessing. Set C<classname> to C<Nullch> to avoid the blessing. The new SV
4327will be returned and will have a reference count of 1.
4328
4329 SV* sv_setref_nv(SV* rv, const char* classname, NV nv)
4330
497711e7
GS
4331=for hackers
4332Found in file sv.c
4333
954c1994
GS
4334=item sv_setref_pv
4335
4336Copies a pointer into a new SV, optionally blessing the SV. The C<rv>
4337argument will be upgraded to an RV. That RV will be modified to point to
4338the new SV. If the C<pv> argument is NULL then C<PL_sv_undef> will be placed
4339into the SV. The C<classname> argument indicates the package for the
4340blessing. Set C<classname> to C<Nullch> to avoid the blessing. The new SV
4341will be returned and will have a reference count of 1.
4342
4343Do not use with other Perl types such as HV, AV, SV, CV, because those
4344objects will become corrupted by the pointer copy process.
4345
4346Note that C<sv_setref_pvn> copies the string while this copies the pointer.
4347
4348 SV* sv_setref_pv(SV* rv, const char* classname, void* pv)
4349
497711e7
GS
4350=for hackers
4351Found in file sv.c
4352
954c1994
GS
4353=item sv_setref_pvn
4354
4355Copies a string into a new SV, optionally blessing the SV. The length of the
4356string must be specified with C<n>. The C<rv> argument will be upgraded to
4357an RV. That RV will be modified to point to the new SV. The C<classname>
4358argument indicates the package for the blessing. Set C<classname> to
4359C<Nullch> to avoid the blessing. The new SV will be returned and will have
4360a reference count of 1.
4361
4362Note that C<sv_setref_pv> copies the pointer while this copies the string.
4363
4364 SV* sv_setref_pvn(SV* rv, const char* classname, char* pv, STRLEN n)
4365
497711e7
GS
4366=for hackers
4367Found in file sv.c
4368
e1c57cef
JH
4369=item sv_setref_uv
4370
4371Copies an unsigned integer into a new SV, optionally blessing the SV. The C<rv>
4372argument will be upgraded to an RV. That RV will be modified to point to
4373the new SV. The C<classname> argument indicates the package for the
4374blessing. Set C<classname> to C<Nullch> to avoid the blessing. The new SV
4375will be returned and will have a reference count of 1.
4376
4377 SV* sv_setref_uv(SV* rv, const char* classname, UV uv)
4378
4379=for hackers
4380Found in file sv.c
4381
954c1994
GS
4382=item sv_setsv
4383
645c22ef
DM
4384Copies the contents of the source SV C<ssv> into the destination SV
4385C<dsv>. The source SV may be destroyed if it is mortal, so don't use this
4386function if the source SV needs to be reused. Does not handle 'set' magic.
4387Loosely speaking, it performs a copy-by-value, obliterating any previous
4388content of the destination.
4389
4390You probably want to use one of the assortment of wrappers, such as
4391C<SvSetSV>, C<SvSetSV_nosteal>, C<SvSetMagicSV> and
4392C<SvSetMagicSV_nosteal>.
4393
954c1994
GS
4394 void sv_setsv(SV* dsv, SV* ssv)
4395
497711e7
GS
4396=for hackers
4397Found in file sv.c
4398
8d6d96c1
HS
4399=item sv_setsv_flags
4400
645c22ef
DM
4401Copies the contents of the source SV C<ssv> into the destination SV
4402C<dsv>. The source SV may be destroyed if it is mortal, so don't use this
4403function if the source SV needs to be reused. Does not handle 'set' magic.
4404Loosely speaking, it performs a copy-by-value, obliterating any previous
4405content of the destination.
4406If the C<flags> parameter has the C<SV_GMAGIC> bit set, will C<mg_get> on
4407C<ssv> if appropriate, else not. C<sv_setsv> and C<sv_setsv_nomg> are
4408implemented in terms of this function.
4409
4410You probably want to use one of the assortment of wrappers, such as
4411C<SvSetSV>, C<SvSetSV_nosteal>, C<SvSetMagicSV> and
4412C<SvSetMagicSV_nosteal>.
4413
4414This is the primary function for copying scalars, and most other
4415copy-ish functions and macros use this underneath.
8d6d96c1
HS
4416
4417 void sv_setsv_flags(SV* dsv, SV* ssv, I32 flags)
4418
4419=for hackers
4420Found in file sv.c
4421
954c1994
GS
4422=item sv_setsv_mg
4423
4424Like C<sv_setsv>, but also handles 'set' magic.
4425
4426 void sv_setsv_mg(SV *dstr, SV *sstr)
4427
497711e7
GS
4428=for hackers
4429Found in file sv.c
4430
954c1994
GS
4431=item sv_setuv
4432
645c22ef
DM
4433Copies an unsigned integer into the given SV, upgrading first if necessary.
4434Does not handle 'set' magic. See also C<sv_setuv_mg>.
954c1994
GS
4435
4436 void sv_setuv(SV* sv, UV num)
4437
497711e7
GS
4438=for hackers
4439Found in file sv.c
4440
954c1994
GS
4441=item sv_setuv_mg
4442
4443Like C<sv_setuv>, but also handles 'set' magic.
4444
4445 void sv_setuv_mg(SV *sv, UV u)
4446
497711e7
GS
4447=for hackers
4448Found in file sv.c
4449
645c22ef
DM
4450=item sv_taint
4451
4452Taint an SV. Use C<SvTAINTED_on> instead.
4453 void sv_taint(SV* sv)
4454
4455=for hackers
4456Found in file sv.c
4457
451be7b1
DM
4458=item sv_tainted
4459
4460Test an SV for taintedness. Use C<SvTAINTED> instead.
4461 bool sv_tainted(SV* sv)
4462
4463=for hackers
4464Found in file sv.c
4465
c461cf8f
JH
4466=item sv_true
4467
4468Returns true if the SV has a true value by Perl's rules.
645c22ef
DM
4469Use the C<SvTRUE> macro instead, which may call C<sv_true()> or may
4470instead use an in-line version.
c461cf8f
JH
4471
4472 I32 sv_true(SV *sv)
4473
4474=for hackers
4475Found in file sv.c
4476
4477=item sv_unmagic
4478
645c22ef 4479Removes all magic of type C<type> from an SV.
c461cf8f
JH
4480
4481 int sv_unmagic(SV* sv, int type)
4482
4483=for hackers
4484Found in file sv.c
4485
954c1994
GS
4486=item sv_unref
4487
4488Unsets the RV status of the SV, and decrements the reference count of
4489whatever was being referenced by the RV. This can almost be thought of
b06226ff 4490as a reversal of C<newSVrv>. This is C<sv_unref_flags> with the C<flag>
ae154d6d 4491being zero. See C<SvROK_off>.
954c1994
GS
4492
4493 void sv_unref(SV* sv)
4494
497711e7
GS
4495=for hackers
4496Found in file sv.c
4497
840a7b70
IZ
4498=item sv_unref_flags
4499
4500Unsets the RV status of the SV, and decrements the reference count of
4501whatever was being referenced by the RV. This can almost be thought of
4502as a reversal of C<newSVrv>. The C<cflags> argument can contain
4503C<SV_IMMEDIATE_UNREF> to force the reference count to be decremented
4504(otherwise the decrementing is conditional on the reference count being
4505different from one or the reference being a readonly SV).
ae154d6d 4506See C<SvROK_off>.
840a7b70
IZ
4507
4508 void sv_unref_flags(SV* sv, U32 flags)
4509
4510=for hackers
4511Found in file sv.c
4512
451be7b1
DM
4513=item sv_untaint
4514
4515Untaint an SV. Use C<SvTAINTED_off> instead.
4516 void sv_untaint(SV* sv)
4517
4518=for hackers
4519Found in file sv.c
4520
954c1994
GS
4521=item sv_upgrade
4522
ff276b08 4523Upgrade an SV to a more complex form. Generally adds a new body type to the
645c22ef 4524SV, then copies across as much information as possible from the old body.
ff276b08 4525You generally want to use the C<SvUPGRADE> macro wrapper. See also C<svtype>.
954c1994
GS
4526
4527 bool sv_upgrade(SV* sv, U32 mt)
4528
497711e7
GS
4529=for hackers
4530Found in file sv.c
4531
954c1994
GS
4532=item sv_usepvn
4533
4534Tells an SV to use C<ptr> to find its string value. Normally the string is
1c846c1f 4535stored inside the SV but sv_usepvn allows the SV to use an outside string.
954c1994
GS
4536The C<ptr> should point to memory that was allocated by C<malloc>. The
4537string length, C<len>, must be supplied. This function will realloc the
4538memory pointed to by C<ptr>, so that pointer should not be freed or used by
4539the programmer after giving it to sv_usepvn. Does not handle 'set' magic.
4540See C<sv_usepvn_mg>.
4541
4542 void sv_usepvn(SV* sv, char* ptr, STRLEN len)
4543
497711e7
GS
4544=for hackers
4545Found in file sv.c
4546
954c1994
GS
4547=item sv_usepvn_mg
4548
4549Like C<sv_usepvn>, but also handles 'set' magic.
4550
4551 void sv_usepvn_mg(SV *sv, char *ptr, STRLEN len)
4552
497711e7
GS
4553=for hackers
4554Found in file sv.c
4555
2457d041
JH
4556=item sv_utf8_decode
4557
4558Convert the octets in the PV from UTF-8 to chars. Scan for validity and then
645c22ef 4559turn off SvUTF8 if needed so that we see characters. Used as a building block
2457d041
JH
4560for decode_utf8 in Encode.xs
4561
4562NOTE: this function is experimental and may change or be
4563removed without notice.
4564
4565 bool sv_utf8_decode(SV *sv)
4566
4567=for hackers
4568Found in file sv.c
4569
c461cf8f
JH
4570=item sv_utf8_downgrade
4571
4572Attempt to convert the PV of an SV from UTF8-encoded to byte encoding.
4573This may not be possible if the PV contains non-byte encoding characters;
4574if this is the case, either returns false or, if C<fail_ok> is not
4575true, croaks.
4576
9ede5bc8
DM
4577This is not as a general purpose Unicode to byte encoding interface:
4578use the Encode extension for that.
4579
c461cf8f
JH
4580NOTE: this function is experimental and may change or be
4581removed without notice.
4582
4583 bool sv_utf8_downgrade(SV *sv, bool fail_ok)
4584
4585=for hackers
4586Found in file sv.c
4587
4588=item sv_utf8_encode
4589
4590Convert the PV of an SV to UTF8-encoded, but then turn off the C<SvUTF8>
2457d041
JH
4591flag so that it looks like octets again. Used as a building block
4592for encode_utf8 in Encode.xs
c461cf8f
JH
4593
4594 void sv_utf8_encode(SV *sv)
4595
4596=for hackers
4597Found in file sv.c
4598
4599=item sv_utf8_upgrade
4600
4601Convert the PV of an SV to its UTF8-encoded form.
645c22ef 4602Forces the SV to string form if it is not already.
2457d041
JH
4603Always sets the SvUTF8 flag to avoid future validity checks even
4604if all the bytes have hibit clear.
c461cf8f 4605
9ede5bc8
DM
4606This is not as a general purpose byte encoding to Unicode interface:
4607use the Encode extension for that.
4608
2457d041 4609 STRLEN sv_utf8_upgrade(SV *sv)
c461cf8f
JH
4610
4611=for hackers
4612Found in file sv.c
4613
8d6d96c1
HS
4614=item sv_utf8_upgrade_flags
4615
4616Convert the PV of an SV to its UTF8-encoded form.
645c22ef 4617Forces the SV to string form if it is not already.
8d6d96c1
HS
4618Always sets the SvUTF8 flag to avoid future validity checks even
4619if all the bytes have hibit clear. If C<flags> has C<SV_GMAGIC> bit set,
4620will C<mg_get> on C<sv> if appropriate, else not. C<sv_utf8_upgrade> and
4621C<sv_utf8_upgrade_nomg> are implemented in terms of this function.
4622
9ede5bc8
DM
4623This is not as a general purpose byte encoding to Unicode interface:
4624use the Encode extension for that.
4625
8d6d96c1
HS
4626 STRLEN sv_utf8_upgrade_flags(SV *sv, I32 flags)
4627
4628=for hackers
4629Found in file sv.c
4630
645c22ef
DM
4631=item sv_uv
4632
4633A private implementation of the C<SvUVx> macro for compilers which can't
4634cope with complex macro expressions. Always use the macro instead.
4635
4636 UV sv_uv(SV* sv)
4637
4638=for hackers
4639Found in file sv.c
4640
954c1994
GS
4641=item sv_vcatpvfn
4642
4643Processes its arguments like C<vsprintf> and appends the formatted output
4644to an SV. Uses an array of SVs if the C style variable argument list is
4645missing (NULL). When running with taint checks enabled, indicates via
4646C<maybe_tainted> if results are untrustworthy (often due to the use of
4647locales).
4648
645c22ef
DM
4649Usually used via one of its frontends C<sv_catpvf> and C<sv_catpvf_mg>.
4650
954c1994
GS
4651 void sv_vcatpvfn(SV* sv, const char* pat, STRLEN patlen, va_list* args, SV** svargs, I32 svmax, bool *maybe_tainted)
4652
497711e7
GS
4653=for hackers
4654Found in file sv.c
4655
954c1994
GS
4656=item sv_vsetpvfn
4657
4658Works like C<vcatpvfn> but copies the text into the SV instead of
4659appending it.
4660
645c22ef
DM
4661Usually used via one of its frontends C<sv_setpvf> and C<sv_setpvf_mg>.
4662
954c1994
GS
4663 void sv_vsetpvfn(SV* sv, const char* pat, STRLEN patlen, va_list* args, SV** svargs, I32 svmax, bool *maybe_tainted)
4664
497711e7 4665=for hackers
94bdecf9
JH
4666Found in file sv.c
4667
b0f01acb
JP
4668=item upg_version
4669
4670In-place upgrade of the supplied SV to a version object.
4671
4672 SV *sv = upg_version(SV *sv);
4673
4674Returns a pointer to the upgraded SV.
4675
4676 SV* upg_version(SV *ver)
4677
4678=for hackers
4679Found in file util.c
4680
ad63d80f
JP
4681=item vcmp
4682
4683Version object aware cmp. Both operands must already have been
4684converted into version objects.
4685
4686 int vcmp(SV *lvs, SV *rvs)
4687
4688=for hackers
4689Found in file util.c
4690
b0f01acb
JP
4691=item vnumify
4692
ad63d80f
JP
4693Accepts a version object and returns the normalized floating
4694point representation. Call like:
b0f01acb 4695
ad63d80f 4696 sv = vnumify(rv);
b0f01acb 4697
ad63d80f
JP
4698NOTE: you can pass either the object directly or the SV
4699contained within the RV.
b0f01acb 4700
ad63d80f 4701 SV* vnumify(SV *vs)
b0f01acb
JP
4702
4703=for hackers
4704Found in file util.c
4705
4706=item vstringify
4707
ad63d80f
JP
4708Accepts a version object and returns the normalized string
4709representation. Call like:
b0f01acb 4710
ad63d80f 4711 sv = vstringify(rv);
b0f01acb 4712
ad63d80f
JP
4713NOTE: you can pass either the object directly or the SV
4714contained within the RV.
b0f01acb 4715
ad63d80f 4716 SV* vstringify(SV *vs)
b0f01acb
JP
4717
4718=for hackers
4719Found in file util.c
4720
94bdecf9
JH
4721
4722=back
4723
4724=head1 Unicode Support
4725
4726=over 8
4727
4728=item bytes_from_utf8
4729
4730Converts a string C<s> of length C<len> from UTF8 into byte encoding.
4731Unlike <utf8_to_bytes> but like C<bytes_to_utf8>, returns a pointer to
4732the newly-created string, and updates C<len> to contain the new
4733length. Returns the original string if no conversion occurs, C<len>
4734is unchanged. Do nothing if C<is_utf8> points to 0. Sets C<is_utf8> to
47350 if C<s> is converted or contains all 7bit characters.
4736
4737NOTE: this function is experimental and may change or be
4738removed without notice.
4739
4740 U8* bytes_from_utf8(U8 *s, STRLEN *len, bool *is_utf8)
4741
4742=for hackers
4743Found in file utf8.c
4744
4745=item bytes_to_utf8
4746
4747Converts a string C<s> of length C<len> from ASCII into UTF8 encoding.
4748Returns a pointer to the newly-created string, and sets C<len> to
4749reflect the new length.
4750
bd5cf849
HS
4751If you want to convert to UTF8 from other encodings than ASCII,
4752see sv_recode_to_utf8().
4753
94bdecf9
JH
4754NOTE: this function is experimental and may change or be
4755removed without notice.
4756
4757 U8* bytes_to_utf8(U8 *s, STRLEN *len)
4758
4759=for hackers
4760Found in file utf8.c
4761
4762=item ibcmp_utf8
4763
4764Return true if the strings s1 and s2 differ case-insensitively, false
4765if not (if they are equal case-insensitively). If u1 is true, the
4766string s1 is assumed to be in UTF-8-encoded Unicode. If u2 is true,
4767the string s2 is assumed to be in UTF-8-encoded Unicode. If u1 or u2
4768are false, the respective string is assumed to be in native 8-bit
4769encoding.
4770
4771If the pe1 and pe2 are non-NULL, the scanning pointers will be copied
4772in there (they will point at the beginning of the I<next> character).
4773If the pointers behind pe1 or pe2 are non-NULL, they are the end
4774pointers beyond which scanning will not continue under any
4775circustances. If the byte lengths l1 and l2 are non-zero, s1+l1 and
4776s2+l2 will be used as goal end pointers that will also stop the scan,
4777and which qualify towards defining a successful match: all the scans
4778that define an explicit length must reach their goal pointers for
4779a match to succeed).
4780
4781For case-insensitiveness, the "casefolding" of Unicode is used
4782instead of upper/lowercasing both the characters, see
4783http://www.unicode.org/unicode/reports/tr21/ (Case Mappings).
4784
4785 I32 ibcmp_utf8(const char* a, char **pe1, UV l1, bool u1, const char* b, char **pe2, UV l2, bool u2)
4786
4787=for hackers
4788Found in file utf8.c
4789
4790=item is_utf8_char
4791
4792Tests if some arbitrary number of bytes begins in a valid UTF-8
641d4181
JH
4793character. Note that an INVARIANT (i.e. ASCII) character is a valid
4794UTF-8 character. The actual number of bytes in the UTF-8 character
4795will be returned if it is valid, otherwise 0.
94bdecf9
JH
4796
4797 STRLEN is_utf8_char(U8 *p)
4798
4799=for hackers
4800Found in file utf8.c
4801
4802=item is_utf8_string
4803
bd5cf849
HS
4804Returns true if first C<len> bytes of the given string form a valid
4805UTF8 string, false otherwise. Note that 'a valid UTF8 string' does
4806not mean 'a string that contains code points above 0x7F encoded in
4807UTF8' because a valid ASCII string is a valid UTF8 string.
94bdecf9
JH
4808
4809 bool is_utf8_string(U8 *s, STRLEN len)
4810
4811=for hackers
4812Found in file utf8.c
497711e7 4813
94bdecf9 4814=item pv_uni_display
954c1994 4815
94bdecf9
JH
4816Build to the scalar dsv a displayable version of the string spv,
4817length len, the displayable version being at most pvlim bytes long
4818(if longer, the rest is truncated and "..." will be appended).
0a2ef054
JH
4819
4820The flags argument can have UNI_DISPLAY_ISPRINT set to display
a4f1a029 4821isPRINT()able characters as themselves, UNI_DISPLAY_BACKSLASH
0a2ef054
JH
4822to display the \\[nrfta\\] as the backslashed versions (like '\n')
4823(UNI_DISPLAY_BACKSLASH is preferred over UNI_DISPLAY_ISPRINT for \\).
4824UNI_DISPLAY_QQ (and its alias UNI_DISPLAY_REGEX) have both
4825UNI_DISPLAY_BACKSLASH and UNI_DISPLAY_ISPRINT turned on.
4826
94bdecf9 4827The pointer to the PV of the dsv is returned.
954c1994 4828
94bdecf9 4829 char* pv_uni_display(SV *dsv, U8 *spv, STRLEN len, STRLEN pvlim, UV flags)
954c1994 4830
497711e7 4831=for hackers
94bdecf9 4832Found in file utf8.c
497711e7 4833
220e2d4e
IH
4834=item sv_cat_decode
4835
4836The encoding is assumed to be an Encode object, the PV of the ssv is
4837assumed to be octets in that encoding and decoding the input starts
4838from the position which (PV + *offset) pointed to. The dsv will be
4839concatenated the decoded UTF-8 string from ssv. Decoding will terminate
4840when the string tstr appears in decoding output or the input ends on
4841the PV of the ssv. The value which the offset points will be modified
4842to the last input position on the ssv.
4843
4844Returns TRUE if the terminator was found, else returns FALSE.
4845
4846 bool sv_cat_decode(SV* dsv, SV *encoding, SV *ssv, int *offset, char* tstr, int tlen)
4847
4848=for hackers
4849Found in file sv.c
4850
94bdecf9 4851=item sv_recode_to_utf8
954c1994 4852
94bdecf9
JH
4853The encoding is assumed to be an Encode object, on entry the PV
4854of the sv is assumed to be octets in that encoding, and the sv
4855will be converted into Unicode (and UTF-8).
954c1994 4856
94bdecf9
JH
4857If the sv already is UTF-8 (or if it is not POK), or if the encoding
4858is not a reference, nothing is done to the sv. If the encoding is not
4859an C<Encode::XS> Encoding object, bad things will happen.
4860(See F<lib/encoding.pm> and L<Encode>).
4861
4862The PV of the sv is returned.
4863
4864 char* sv_recode_to_utf8(SV* sv, SV *encoding)
954c1994 4865
497711e7 4866=for hackers
94bdecf9 4867Found in file sv.c
497711e7 4868
94bdecf9 4869=item sv_uni_display
954c1994 4870
94bdecf9 4871Build to the scalar dsv a displayable version of the scalar sv,
0a2ef054 4872the displayable version being at most pvlim bytes long
94bdecf9 4873(if longer, the rest is truncated and "..." will be appended).
0a2ef054
JH
4874
4875The flags argument is as in pv_uni_display().
4876
94bdecf9 4877The pointer to the PV of the dsv is returned.
954c1994 4878
94bdecf9 4879 char* sv_uni_display(SV *dsv, SV *ssv, STRLEN pvlim, UV flags)
954c1994 4880
497711e7 4881=for hackers
94bdecf9 4882Found in file utf8.c
497711e7 4883
6b5c0936
JH
4884=item to_utf8_case
4885
4886The "p" contains the pointer to the UTF-8 string encoding
4887the character that is being converted.
4888
4889The "ustrp" is a pointer to the character buffer to put the
4890conversion result to. The "lenp" is a pointer to the length
4891of the result.
4892
12b7c5c7 4893The "swashp" is a pointer to the swash to use.
6b5c0936 4894
12b7c5c7
JH
4895Both the special and normal mappings are stored lib/unicore/To/Foo.pl,
4896and loaded by SWASHGET, using lib/utf8_heavy.pl. The special (usually,
4897but not always, a multicharacter mapping), is tried first.
4898
4899The "special" is a string like "utf8::ToSpecLower", which means the
4900hash %utf8::ToSpecLower. The access to the hash is through
4901Perl_to_utf8_case().
6b5c0936 4902
12b7c5c7
JH
4903The "normal" is a string like "ToLower" which means the swash
4904%utf8::ToLower.
6b5c0936
JH
4905
4906 UV to_utf8_case(U8 *p, U8* ustrp, STRLEN *lenp, SV **swash, char *normal, char *special)
4907
4908=for hackers
4909Found in file utf8.c
4910
d3e79532
JH
4911=item to_utf8_fold
4912
4913Convert the UTF-8 encoded character at p to its foldcase version and
4914store that in UTF-8 in ustrp and its length in bytes in lenp. Note
4915that the ustrp needs to be at least UTF8_MAXLEN_FOLD+1 bytes since the
4916foldcase version may be longer than the original character (up to
4917three characters).
4918
4919The first character of the foldcased version is returned
4920(but note, as explained above, that there may be more.)
4921
4922 UV to_utf8_fold(U8 *p, U8* ustrp, STRLEN *lenp)
4923
4924=for hackers
4925Found in file utf8.c
4926
4927=item to_utf8_lower
4928
4929Convert the UTF-8 encoded character at p to its lowercase version and
4930store that in UTF-8 in ustrp and its length in bytes in lenp. Note
4931that the ustrp needs to be at least UTF8_MAXLEN_UCLC+1 bytes since the
4932lowercase version may be longer than the original character (up to two
4933characters).
4934
4935The first character of the lowercased version is returned
4936(but note, as explained above, that there may be more.)
4937
4938 UV to_utf8_lower(U8 *p, U8* ustrp, STRLEN *lenp)
4939
4940=for hackers
4941Found in file utf8.c
4942
4943=item to_utf8_title
4944
4945Convert the UTF-8 encoded character at p to its titlecase version and
4946store that in UTF-8 in ustrp and its length in bytes in lenp. Note
4947that the ustrp needs to be at least UTF8_MAXLEN_UCLC+1 bytes since the
4948titlecase version may be longer than the original character (up to two
4949characters).
4950
4951The first character of the titlecased version is returned
4952(but note, as explained above, that there may be more.)
4953
4954 UV to_utf8_title(U8 *p, U8* ustrp, STRLEN *lenp)
4955
4956=for hackers
4957Found in file utf8.c
4958
4959=item to_utf8_upper
4960
4961Convert the UTF-8 encoded character at p to its uppercase version and
4962store that in UTF-8 in ustrp and its length in bytes in lenp. Note
4963that the ustrp needs to be at least UTF8_MAXLEN_UCLC+1 bytes since the
4964uppercase version may be longer than the original character (up to two
4965characters).
4966
4967The first character of the uppercased version is returned
4968(but note, as explained above, that there may be more.)
4969
4970 UV to_utf8_upper(U8 *p, U8* ustrp, STRLEN *lenp)
4971
4972=for hackers
4973Found in file utf8.c
4974
282f25c9
JH
4975=item utf8n_to_uvchr
4976
4977Returns the native character value of the first character in the string C<s>
4978which is assumed to be in UTF8 encoding; C<retlen> will be set to the
4979length, in bytes, of that character.
4980
4981Allows length and flags to be passed to low level routine.
4982
4983 UV utf8n_to_uvchr(U8 *s, STRLEN curlen, STRLEN* retlen, U32 flags)
4984
4985=for hackers
4986Found in file utf8.c
4987
4988=item utf8n_to_uvuni
4989
4990Bottom level UTF-8 decode routine.
4991Returns the unicode code point value of the first character in the string C<s>
4992which is assumed to be in UTF8 encoding and no longer than C<curlen>;
4993C<retlen> will be set to the length, in bytes, of that character.
4994
4995If C<s> does not point to a well-formed UTF8 character, the behaviour
4996is dependent on the value of C<flags>: if it contains UTF8_CHECK_ONLY,
4997it is assumed that the caller will raise a warning, and this function
4998will silently just set C<retlen> to C<-1> and return zero. If the
4999C<flags> does not contain UTF8_CHECK_ONLY, warnings about
5000malformations will be given, C<retlen> will be set to the expected
5001length of the UTF-8 character in bytes, and zero will be returned.
5002
5003The C<flags> can also contain various flags to allow deviations from
5004the strict UTF-8 encoding (see F<utf8.h>).
5005
5006Most code should use utf8_to_uvchr() rather than call this directly.
5007
5008 UV utf8n_to_uvuni(U8 *s, STRLEN curlen, STRLEN* retlen, U32 flags)
5009
5010=for hackers
5011Found in file utf8.c
5012
b06226ff
JH
5013=item utf8_distance
5014
5015Returns the number of UTF8 characters between the UTF-8 pointers C<a>
5016and C<b>.
5017
5018WARNING: use only if you *know* that the pointers point inside the
5019same UTF-8 buffer.
5020
5021 IV utf8_distance(U8 *a, U8 *b)
5022
5023=for hackers
5024Found in file utf8.c
5025
5026=item utf8_hop
5027
8850bf83
JH
5028Return the UTF-8 pointer C<s> displaced by C<off> characters, either
5029forward or backward.
b06226ff
JH
5030
5031WARNING: do not use the following unless you *know* C<off> is within
8850bf83
JH
5032the UTF-8 data pointed to by C<s> *and* that on entry C<s> is aligned
5033on the first byte of character or just after the last byte of a character.
b06226ff
JH
5034
5035 U8* utf8_hop(U8 *s, I32 off)
5036
5037=for hackers
5038Found in file utf8.c
5039
5040=item utf8_length
5041
5042Return the length of the UTF-8 char encoded string C<s> in characters.
5043Stops at C<e> (inclusive). If C<e E<lt> s> or if the scan would end
5044up past C<e>, croaks.
5045
5046 STRLEN utf8_length(U8* s, U8 *e)
5047
5048=for hackers
5049Found in file utf8.c
5050
497711e7
GS
5051=item utf8_to_bytes
5052
246fae53
MG
5053Converts a string C<s> of length C<len> from UTF8 into byte encoding.
5054Unlike C<bytes_to_utf8>, this over-writes the original string, and
5055updates len to contain the new length.
67e989fb 5056Returns zero on failure, setting C<len> to -1.
497711e7 5057
eebe1485
SC
5058NOTE: this function is experimental and may change or be
5059removed without notice.
5060
5061 U8* utf8_to_bytes(U8 *s, STRLEN *len)
497711e7
GS
5062
5063=for hackers
5064Found in file utf8.c
5065
282f25c9 5066=item utf8_to_uvchr
b6b716fe 5067
282f25c9
JH
5068Returns the native character value of the first character in the string C<s>
5069which is assumed to be in UTF8 encoding; C<retlen> will be set to the
5070length, in bytes, of that character.
28d3d195 5071
282f25c9
JH
5072If C<s> does not point to a well-formed UTF8 character, zero is
5073returned and retlen is set, if possible, to -1.
444155da 5074
282f25c9 5075 UV utf8_to_uvchr(U8 *s, STRLEN* retlen)
444155da
JH
5076
5077=for hackers
5078Found in file utf8.c
5079
282f25c9 5080=item utf8_to_uvuni
444155da 5081
282f25c9 5082Returns the Unicode code point of the first character in the string C<s>
dcad2880 5083which is assumed to be in UTF8 encoding; C<retlen> will be set to the
1aa99e6b 5084length, in bytes, of that character.
444155da 5085
282f25c9
JH
5086This function should only be used when returned UV is considered
5087an index into the Unicode semantic tables (e.g. swashes).
5088
dcad2880
JH
5089If C<s> does not point to a well-formed UTF8 character, zero is
5090returned and retlen is set, if possible, to -1.
b6b716fe 5091
282f25c9
JH
5092 UV utf8_to_uvuni(U8 *s, STRLEN* retlen)
5093
5094=for hackers
5095Found in file utf8.c
5096
5097=item uvchr_to_utf8
5098
5099Adds the UTF8 representation of the Native codepoint C<uv> to the end
5100of the string C<d>; C<d> should be have at least C<UTF8_MAXLEN+1> free
5101bytes available. The return value is the pointer to the byte after the
5102end of the new character. In other words,
5103
5104 d = uvchr_to_utf8(d, uv);
5105
5106is the recommended wide native character-aware way of saying
5107
5108 *(d++) = uv;
5109
5110 U8* uvchr_to_utf8(U8 *d, UV uv)
eebe1485
SC
5111
5112=for hackers
5113Found in file utf8.c
5114
b851fbc1 5115=item uvuni_to_utf8_flags
eebe1485
SC
5116
5117Adds the UTF8 representation of the Unicode codepoint C<uv> to the end
5118of the string C<d>; C<d> should be have at least C<UTF8_MAXLEN+1> free
5119bytes available. The return value is the pointer to the byte after the
282f25c9 5120end of the new character. In other words,
eebe1485 5121
b851fbc1
JH
5122 d = uvuni_to_utf8_flags(d, uv, flags);
5123
5124or, in most cases,
5125
282f25c9 5126 d = uvuni_to_utf8(d, uv);
eebe1485 5127
b851fbc1
JH
5128(which is equivalent to)
5129
5130 d = uvuni_to_utf8_flags(d, uv, 0);
5131
eebe1485
SC
5132is the recommended Unicode-aware way of saying
5133
5134 *(d++) = uv;
5135
b851fbc1 5136 U8* uvuni_to_utf8_flags(U8 *d, UV uv, UV flags)
b6b716fe
SC
5137
5138=for hackers
5139Found in file utf8.c
5140
497711e7 5141
94bdecf9 5142=back
954c1994 5143
94bdecf9 5144=head1 Variables created by C<xsubpp> and C<xsubpp> internal functions
954c1994 5145
94bdecf9 5146=over 8
954c1994 5147
94bdecf9 5148=item ax
497711e7 5149
94bdecf9
JH
5150Variable which is setup by C<xsubpp> to indicate the stack base offset,
5151used by the C<ST>, C<XSprePUSH> and C<XSRETURN> macros. The C<dMARK> macro
5152must be called prior to setup the C<MARK> variable.
954c1994 5153
94bdecf9 5154 I32 ax
954c1994 5155
497711e7
GS
5156=for hackers
5157Found in file XSUB.h
5158
94bdecf9 5159=item CLASS
954c1994 5160
94bdecf9
JH
5161Variable which is setup by C<xsubpp> to indicate the
5162class name for a C++ XS constructor. This is always a C<char*>. See C<THIS>.
954c1994 5163
94bdecf9 5164 char* CLASS
954c1994 5165
497711e7
GS
5166=for hackers
5167Found in file XSUB.h
5168
94bdecf9 5169=item dAX
954c1994 5170
94bdecf9
JH
5171Sets up the C<ax> variable.
5172This is usually handled automatically by C<xsubpp> by calling C<dXSARGS>.
954c1994 5173
94bdecf9 5174 dAX;
954c1994 5175
497711e7
GS
5176=for hackers
5177Found in file XSUB.h
5178
94bdecf9 5179=item dITEMS
954c1994 5180
94bdecf9
JH
5181Sets up the C<items> variable.
5182This is usually handled automatically by C<xsubpp> by calling C<dXSARGS>.
954c1994 5183
94bdecf9 5184 dITEMS;
954c1994 5185
497711e7
GS
5186=for hackers
5187Found in file XSUB.h
5188
94bdecf9 5189=item dXSARGS
954c1994 5190
94bdecf9
JH
5191Sets up stack and mark pointers for an XSUB, calling dSP and dMARK.
5192Sets up the C<ax> and C<items> variables by calling C<dAX> and C<dITEMS>.
5193This is usually handled automatically by C<xsubpp>.
954c1994 5194
94bdecf9 5195 dXSARGS;
954c1994 5196
497711e7
GS
5197=for hackers
5198Found in file XSUB.h
5199
94bdecf9 5200=item dXSI32
954c1994 5201
94bdecf9
JH
5202Sets up the C<ix> variable for an XSUB which has aliases. This is usually
5203handled automatically by C<xsubpp>.
954c1994 5204
94bdecf9 5205 dXSI32;
954c1994 5206
497711e7
GS
5207=for hackers
5208Found in file XSUB.h
5209
94bdecf9 5210=item items
954c1994 5211
94bdecf9
JH
5212Variable which is setup by C<xsubpp> to indicate the number of
5213items on the stack. See L<perlxs/"Variable-length Parameter Lists">.
954c1994 5214
94bdecf9 5215 I32 items
954c1994 5216
497711e7
GS
5217=for hackers
5218Found in file XSUB.h
5219
94bdecf9 5220=item ix
954c1994 5221
94bdecf9
JH
5222Variable which is setup by C<xsubpp> to indicate which of an
5223XSUB's aliases was used to invoke it. See L<perlxs/"The ALIAS: Keyword">.
954c1994 5224
94bdecf9 5225 I32 ix
954c1994 5226
497711e7
GS
5227=for hackers
5228Found in file XSUB.h
5229
94bdecf9 5230=item newXSproto
954c1994 5231
94bdecf9
JH
5232Used by C<xsubpp> to hook up XSUBs as Perl subs. Adds Perl prototypes to
5233the subs.
954c1994 5234
497711e7
GS
5235=for hackers
5236Found in file XSUB.h
5237
94bdecf9 5238=item RETVAL
954c1994 5239
94bdecf9
JH
5240Variable which is setup by C<xsubpp> to hold the return value for an
5241XSUB. This is always the proper type for the XSUB. See
5242L<perlxs/"The RETVAL Variable">.
954c1994 5243
94bdecf9 5244 (whatever) RETVAL
954c1994 5245
497711e7
GS
5246=for hackers
5247Found in file XSUB.h
5248
94bdecf9 5249=item ST
954c1994 5250
94bdecf9 5251Used to access elements on the XSUB's stack.
954c1994 5252
94bdecf9 5253 SV* ST(int ix)
954c1994 5254
497711e7
GS
5255=for hackers
5256Found in file XSUB.h
5257
94bdecf9 5258=item THIS
954c1994 5259
94bdecf9
JH
5260Variable which is setup by C<xsubpp> to designate the object in a C++
5261XSUB. This is always the proper type for the C++ object. See C<CLASS> and
5262L<perlxs/"Using XS With C++">.
954c1994 5263
94bdecf9 5264 (whatever) THIS
954c1994 5265
497711e7
GS
5266=for hackers
5267Found in file XSUB.h
5268
94bdecf9 5269=item XS
954c1994 5270
94bdecf9
JH
5271Macro to declare an XSUB and its C parameter list. This is handled by
5272C<xsubpp>.
954c1994 5273
497711e7
GS
5274=for hackers
5275Found in file XSUB.h
5276
94bdecf9 5277=item XSRETURN_EMPTY
497711e7 5278
94bdecf9 5279Return an empty list from an XSUB immediately.
954c1994 5280
954c1994 5281
94bdecf9 5282 XSRETURN_EMPTY;
954c1994 5283
497711e7
GS
5284=for hackers
5285Found in file XSUB.h
5286
954c1994
GS
5287=item XS_VERSION
5288
5289The version identifier for an XS module. This is usually
5290handled automatically by C<ExtUtils::MakeMaker>. See C<XS_VERSION_BOOTCHECK>.
5291
497711e7
GS
5292=for hackers
5293Found in file XSUB.h
5294
954c1994
GS
5295=item XS_VERSION_BOOTCHECK
5296
5297Macro to verify that a PM module's $VERSION variable matches the XS
5298module's C<XS_VERSION> variable. This is usually handled automatically by
5299C<xsubpp>. See L<perlxs/"The VERSIONCHECK: Keyword">.
5300
5301 XS_VERSION_BOOTCHECK;
5302
497711e7
GS
5303=for hackers
5304Found in file XSUB.h
5305
954c1994 5306
94bdecf9 5307=back
954c1994 5308
94bdecf9
JH
5309=head1 Warning and Dieing
5310
5311=over 8
5312
5313=item croak
5314
5315This is the XSUB-writer's interface to Perl's C<die> function.
5316Normally use this function the same way you use the C C<printf>
5317function. See C<warn>.
5318
5319If you want to throw an exception object, assign the object to
5320C<$@> and then pass C<Nullch> to croak():
5321
5322 errsv = get_sv("@", TRUE);
5323 sv_setsv(errsv, exception_object);
5324 croak(Nullch);
5325
5326 void croak(const char* pat, ...)
954c1994 5327
497711e7 5328=for hackers
94bdecf9
JH
5329Found in file util.c
5330
5331=item warn
5332
5333This is the XSUB-writer's interface to Perl's C<warn> function. Use this
5334function the same way you use the C C<printf> function. See
5335C<croak>.
5336
5337 void warn(const char* pat, ...)
5338
5339=for hackers
5340Found in file util.c
5341
497711e7 5342
954c1994
GS
5343=back
5344
5345=head1 AUTHORS
5346
5347Until May 1997, this document was maintained by Jeff Okamoto
5348<okamoto@corp.hp.com>. It is now maintained as part of Perl itself.
5349
5350With lots of help and suggestions from Dean Roehrich, Malcolm Beattie,
5351Andreas Koenig, Paul Hudson, Ilya Zakharevich, Paul Marquess, Neil
5352Bowers, Matthew Green, Tim Bunce, Spider Boardman, Ulrich Pfeifer,
5353Stephen McCamant, and Gurusamy Sarathy.
5354
5355API Listing originally by Dean Roehrich <roehrich@cray.com>.
5356
5357Updated to be autogenerated from comments in the source by Benjamin Stuhl.
5358
5359=head1 SEE ALSO
5360
5361perlguts(1), perlxs(1), perlxstut(1), perlintern(1)
5362