key.h revision 1573
1/*- 2 * Copyright (c) 1992, 1993 3 * The Regents of the University of California. All rights reserved. 4 * 5 * This code is derived from software contributed to Berkeley by 6 * Christos Zoulas of Cornell University. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions 10 * are met: 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. All advertising materials mentioning features or use of this software 17 * must display the following acknowledgement: 18 * This product includes software developed by the University of 19 * California, Berkeley and its contributors. 20 * 4. Neither the name of the University nor the names of its contributors 21 * may be used to endorse or promote products derived from this software 22 * without specific prior written permission. 23 * 24 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 25 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 27 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 28 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 29 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 30 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 31 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 32 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 33 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 34 * SUCH DAMAGE. 35 * 36 * @(#)key.h 8.1 (Berkeley) 6/4/93 37 */ 38 39/* 40 * el.key.h: Key macro header 41 */ 42#ifndef _h_el_key 43#define _h_el_key 44 45typedef union key_value_t { 46 el_action_t cmd; /* If it is a command the # */ 47 char *str; /* If it is a string... */ 48} key_value_t; 49 50typedef struct key_node_t key_node_t; 51 52typedef struct el_key_t { 53 char *buf; /* Key print buffer */ 54 key_node_t *map; /* Key map */ 55 key_value_t val; /* Local conversion buffer */ 56} el_key_t; 57 58#define XK_CMD 0 59#define XK_STR 1 60#define XK_NOD 2 61#define XK_EXE 3 62 63protected int key_init __P((EditLine *)); 64protected void key_end __P((EditLine *)); 65protected key_value_t * key_map_cmd __P((EditLine *, int)); 66protected key_value_t * key_map_str __P((EditLine *, char *)); 67protected void key_reset __P((EditLine *)); 68protected int key_get __P((EditLine *, char *, 69 key_value_t *)); 70protected void key_add __P((EditLine *, char *, key_value_t *, 71 int)); 72protected void key_clear __P((EditLine *, el_action_t *, 73 char *)); 74protected int key_delete __P((EditLine *, char *)); 75protected void key_print __P((EditLine *, char *)); 76protected void key_kprint __P((EditLine *, char *, 77 key_value_t *, int)); 78protected char *key__decode_str __P((char *, char *, char *)); 79 80#endif /* _h_el_key */ 81