From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=ham autolearn_force=no version=3.4.4 X-Google-Thread: 103376,9ce5fb49dc74582f X-Google-Attributes: gid103376,public X-Google-Language: ENGLISH,ASCII-7-bit Path: g2news2.google.com!postnews.google.com!b28g2000cwb.googlegroups.com!not-for-mail From: "Matthew Heaney" Newsgroups: comp.lang.ada Subject: Re: generic question Date: 21 Nov 2006 10:32:32 -0800 Organization: http://groups.google.com Message-ID: <1164133952.708960.282020@b28g2000cwb.googlegroups.com> References: <1163959439.299036.129940@e3g2000cwe.googlegroups.com> <87mz6nnt4v.fsf@ludovic-brenta.org> <20061119202320.19149a2f@cube.tz.axivion.com> <4560D5BE.5060508@obry.net> <1164059458.442430.110710@j44g2000cwa.googlegroups.com> <4562a51a$0$27404$ba4acef3@news.orange.fr> <45633396.10704@obry.net> <1uk1qt4fuz2ux.1a0rise4xwf5a.dlg@40tude.net> NNTP-Posting-Host: 66.162.65.129 Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" X-Trace: posting.google.com 1164133958 29148 127.0.0.1 (21 Nov 2006 18:32:38 GMT) X-Complaints-To: groups-abuse@google.com NNTP-Posting-Date: Tue, 21 Nov 2006 18:32:38 +0000 (UTC) In-Reply-To: <1uk1qt4fuz2ux.1a0rise4xwf5a.dlg@40tude.net> User-Agent: G2/1.0 X-HTTP-UserAgent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.0.8) Gecko/20061025 Firefox/1.5.0.8,gzip(gfe),gzip(gfe) Complaints-To: groups-abuse@google.com Injection-Info: b28g2000cwb.googlegroups.com; posting-host=66.162.65.129; posting-account=Zl1UPAwAAADEsUSm1PMMiDjihtBlZUi_ Xref: g2news2.google.com comp.lang.ada:7624 Date: 2006-11-21T10:32:32-08:00 List-Id: Dmitry A. Kazakov wrote: > > To have controlled access parameters of primitive subprograms? That's what (anonymous) access parameters are for. That was already true in Ada95. What changed in Ada05 is that now you can declare objects as having an anonymous access type. This is completely orthogonal to the issue of allocation and deallocation, for which named access types are still necessary.