Now that Local proxy type exists on both Unix and Windows, document it and
[u/mdw/putty] / putty.h
CommitLineData
374330e2 1#ifndef PUTTY_PUTTY_H
2#define PUTTY_PUTTY_H
3
54a2bffb 4#include <stddef.h> /* for wchar_t */
ca20bfcf 5
f7f27309 6/*
7 * Global variables. Most modules declare these `extern', but
8 * window.c will do `#define PUTTY_DO_GLOBALS' before including this
9 * module, and so will get them properly defined.
10 */
11#ifndef GLOBAL
12#ifdef PUTTY_DO_GLOBALS
13#define GLOBAL
14#else
15#define GLOBAL extern
16#endif
17#endif
18
a8327734 19#ifndef DONE_TYPEDEFS
20#define DONE_TYPEDEFS
f7f27309 21typedef struct config_tag Config;
1709795f 22typedef struct backend_tag Backend;
887035a5 23typedef struct terminal_tag Terminal;
a8327734 24#endif
8df7a775 25
f7f27309 26#include "puttyps.h"
27#include "network.h"
9a30e26b 28#include "misc.h"
374330e2 29
2285d016 30/*
31 * Fingerprints of the PGP master keys that can be used to establish a trust
32 * path between an executable and other files.
33 */
34#define PGP_RSA_MASTER_KEY_FP \
35 "8F 15 97 DA 25 30 AB 0D 88 D1 92 54 11 CF 0C 4C"
36#define PGP_DSA_MASTER_KEY_FP \
37 "313C 3E76 4B74 C2C5 F2AE 83A8 4F5E 6DF5 6A93 B34E"
38
4eeb7d09 39/* Three attribute types:
50c1be3f 40 * The ATTRs (normal attributes) are stored with the characters in
41 * the main display arrays
4eeb7d09 42 *
50c1be3f 43 * The TATTRs (temporary attributes) are generated on the fly, they
44 * can overlap with characters but not with normal attributes.
4eeb7d09 45 *
50c1be3f 46 * The LATTRs (line attributes) are an entirely disjoint space of
47 * flags.
fd59420d 48 *
49 * The DATTRs (display attributes) are internal to terminal.c (but
50 * defined here because their values have to match the others
51 * here); they reuse the TATTR_* space but are always masked off
52 * before sending to the front end.
4eeb7d09 53 *
54 * ATTR_INVALID is an illegal colour combination.
55 */
56
36566009 57#define TATTR_ACTCURS 0x40000000UL /* active cursor (block) */
58#define TATTR_PASCURS 0x20000000UL /* passive cursor (box) */
59#define TATTR_RIGHTCURS 0x10000000UL /* cursor-on-RHS */
c6958dfe 60#define TATTR_COMBINING 0x80000000UL /* combining characters */
374330e2 61
fd59420d 62#define DATTR_STARTRUN 0x80000000UL /* start of redraw run */
63
64#define TDATTR_MASK 0xF0000000UL
65#define TATTR_MASK (TDATTR_MASK)
66#define DATTR_MASK (TDATTR_MASK)
67
c9def1b8 68#define LATTR_NORM 0x00000000UL
36566009 69#define LATTR_WIDE 0x00000001UL
70#define LATTR_TOP 0x00000002UL
71#define LATTR_BOT 0x00000003UL
72#define LATTR_MODE 0x00000003UL
e6717a98 73#define LATTR_WRAPPED 0x00000010UL /* this line wraps to next */
74#define LATTR_WRAPPED2 0x00000020UL /* with WRAPPED: CJK wide character
75 wrapped to next line, so last
76 single-width cell is empty */
4eeb7d09 77
fd59420d 78#define ATTR_INVALID 0x03FFFFU
4eeb7d09 79
80/* Like Linux use the F000 page for direct to font. */
36566009 81#define CSET_OEMCP 0x0000F000UL /* OEM Codepage DTF */
82#define CSET_ACP 0x0000F100UL /* Ansi Codepage DTF */
4eeb7d09 83
84/* These are internal use overlapping with the UTF-16 surrogates */
36566009 85#define CSET_ASCII 0x0000D800UL /* normal ASCII charset ESC ( B */
86#define CSET_LINEDRW 0x0000D900UL /* line drawing charset ESC ( 0 */
87#define CSET_SCOACS 0x0000DA00UL /* SCO Alternate charset */
88#define CSET_GBCHR 0x0000DB00UL /* UK variant charset ESC ( A */
89#define CSET_MASK 0xFFFFFF00UL /* Character set mask */
4eeb7d09 90
36566009 91#define DIRECT_CHAR(c) ((c&0xFFFFFC00)==0xD800)
92#define DIRECT_FONT(c) ((c&0xFFFFFE00)==0xF000)
4eeb7d09 93
36566009 94#define UCSERR (CSET_LINEDRW|'a') /* UCS Format error character. */
3c7366f8 95/*
96 * UCSWIDE is a special value used in the terminal data to signify
97 * the character cell containing the right-hand half of a CJK wide
98 * character. We use 0xDFFF because it's part of the surrogate
99 * range and hence won't be used for anything else (it's impossible
100 * to input it via UTF-8 because our UTF-8 decoder correctly
101 * rejects surrogates).
102 */
103#define UCSWIDE 0xDFFF
4eeb7d09 104
cecb13f6 105#define ATTR_NARROW 0x800000U
106#define ATTR_WIDE 0x400000U
107#define ATTR_BOLD 0x040000U
108#define ATTR_UNDER 0x080000U
109#define ATTR_REVERSE 0x100000U
110#define ATTR_BLINK 0x200000U
111#define ATTR_FGMASK 0x0001FFU
112#define ATTR_BGMASK 0x03FE00U
113#define ATTR_COLOURS 0x03FFFFU
36566009 114#define ATTR_FGSHIFT 0
cecb13f6 115#define ATTR_BGSHIFT 9
36566009 116
cecb13f6 117/*
118 * The definitive list of colour numbers stored in terminal
119 * attribute words is kept here. It is:
120 *
121 * - 0-7 are ANSI colours (KRGYBMCW).
122 * - 8-15 are the bold versions of those colours.
123 * - 16-255 are the remains of the xterm 256-colour mode (a
124 * 216-colour cube with R at most significant and B at least,
125 * followed by a uniform series of grey shades running between
126 * black and white but not including either on grounds of
127 * redundancy).
128 * - 256 is default foreground
129 * - 257 is default bold foreground
130 * - 258 is default background
131 * - 259 is default bold background
132 * - 260 is cursor foreground
133 * - 261 is cursor background
134 */
4eeb7d09 135
cecb13f6 136#define ATTR_DEFFG (256 << ATTR_FGSHIFT)
137#define ATTR_DEFBG (258 << ATTR_BGSHIFT)
138#define ATTR_DEFAULT (ATTR_DEFFG | ATTR_DEFBG)
374330e2 139
0b4f0bc0 140struct sesslist {
141 int nsessions;
142 char **sessions;
143 char *buffer; /* so memory can be freed later */
144};
1709795f 145
21d2b241 146struct unicode_data {
147 char **uni_tbl;
148 int dbcs_screenfont;
149 int font_codepage;
150 int line_codepage;
151 wchar_t unitab_scoacs[256];
152 wchar_t unitab_line[256];
153 wchar_t unitab_font[256];
154 wchar_t unitab_xterm[256];
155 wchar_t unitab_oemcp[256];
156 unsigned char unitab_ctrl[256];
157};
4eeb7d09 158
32874aea 159#define LGXF_OVR 1 /* existing logfile overwrite */
160#define LGXF_APN 0 /* existing logfile append */
161#define LGXF_ASK -1 /* existing logfile ask */
162#define LGTYP_NONE 0 /* logmode: no logging */
163#define LGTYP_ASCII 1 /* logmode: pure ascii */
00db133f 164#define LGTYP_DEBUG 2 /* logmode: all chars of traffic */
165#define LGTYP_PACKETS 3 /* logmode: SSH data packets */
5fd04f07 166
374330e2 167typedef enum {
6f2d0cde 168 /* Actual special commands. Originally Telnet, but some codes have
169 * been re-used for similar specials in other protocols. */
374330e2 170 TS_AYT, TS_BRK, TS_SYNCH, TS_EC, TS_EL, TS_GA, TS_NOP, TS_ABORT,
a5f3e637 171 TS_AO, TS_IP, TS_SUSP, TS_EOR, TS_EOF, TS_LECHO, TS_RECHO, TS_PING,
6f2d0cde 172 TS_EOL,
4423d5c7 173 /* Special command for SSH. */
174 TS_REKEY,
6f2d0cde 175 /* POSIX-style signals. (not Telnet) */
176 TS_SIGABRT, TS_SIGALRM, TS_SIGFPE, TS_SIGHUP, TS_SIGILL,
177 TS_SIGINT, TS_SIGKILL, TS_SIGPIPE, TS_SIGQUIT, TS_SIGSEGV,
178 TS_SIGTERM, TS_SIGUSR1, TS_SIGUSR2,
179 /* Pseudo-specials used for constructing the specials menu. */
180 TS_SEP, /* Separator */
181 TS_SUBMENU, /* Start a new submenu with specified name */
182 TS_EXITMENU /* Exit current submenu or end of specials */
374330e2 183} Telnet_Special;
184
125105d1 185struct telnet_special {
6f2d0cde 186 const char *name;
125105d1 187 int code;
188};
189
374330e2 190typedef enum {
01c034ad 191 MBT_NOTHING,
192 MBT_LEFT, MBT_MIDDLE, MBT_RIGHT, /* `raw' button designations */
193 MBT_SELECT, MBT_EXTEND, MBT_PASTE, /* `cooked' button designations */
194 MBT_WHEEL_UP, MBT_WHEEL_DOWN /* mouse wheel */
374330e2 195} Mouse_Button;
196
197typedef enum {
198 MA_NOTHING, MA_CLICK, MA_2CLK, MA_3CLK, MA_DRAG, MA_RELEASE
199} Mouse_Action;
200
6c50d421 201/* Keyboard modifiers -- keys the user is actually holding down */
202
203#define PKM_SHIFT 0x01
204#define PKM_CONTROL 0x02
205#define PKM_META 0x04
206#define PKM_ALT 0x08
207
208/* Keyboard flags that aren't really modifiers */
209#define PKF_CAPSLOCK 0x10
210#define PKF_NUMLOCK 0x20
211#define PKF_REPEAT 0x40
212
213/* Stand-alone keysyms for function keys */
214
215typedef enum {
216 PK_NULL, /* No symbol for this key */
217 /* Main keypad keys */
218 PK_ESCAPE, PK_TAB, PK_BACKSPACE, PK_RETURN, PK_COMPOSE,
219 /* Editing keys */
220 PK_HOME, PK_INSERT, PK_DELETE, PK_END, PK_PAGEUP, PK_PAGEDOWN,
221 /* Cursor keys */
222 PK_UP, PK_DOWN, PK_RIGHT, PK_LEFT, PK_REST,
223 /* Numeric keypad */ /* Real one looks like: */
224 PK_PF1, PK_PF2, PK_PF3, PK_PF4, /* PF1 PF2 PF3 PF4 */
225 PK_KPCOMMA, PK_KPMINUS, PK_KPDECIMAL, /* 7 8 9 - */
226 PK_KP0, PK_KP1, PK_KP2, PK_KP3, PK_KP4, /* 4 5 6 , */
227 PK_KP5, PK_KP6, PK_KP7, PK_KP8, PK_KP9, /* 1 2 3 en- */
228 PK_KPBIGPLUS, PK_KPENTER, /* 0 . ter */
229 /* Top row */
230 PK_F1, PK_F2, PK_F3, PK_F4, PK_F5,
231 PK_F6, PK_F7, PK_F8, PK_F9, PK_F10,
232 PK_F11, PK_F12, PK_F13, PK_F14, PK_F15,
233 PK_F16, PK_F17, PK_F18, PK_F19, PK_F20,
234 PK_PAUSE
235} Key_Sym;
236
237#define PK_ISEDITING(k) ((k) >= PK_HOME && (k) <= PK_PAGEDOWN)
238#define PK_ISCURSOR(k) ((k) >= PK_UP && (k) <= PK_REST)
239#define PK_ISKEYPAD(k) ((k) >= PK_PF1 && (k) <= PK_KPENTER)
240#define PK_ISFKEY(k) ((k) >= PK_F1 && (k) <= PK_F20)
241
5ecd7ad0 242enum {
4eeb7d09 243 VT_XWINDOWS, VT_OEMANSI, VT_OEMONLY, VT_POORMAN, VT_UNICODE
5ecd7ad0 244};
374330e2 245
0965bee0 246enum {
247 /*
83e7d008 248 * SSH-2 key exchange algorithms
249 */
250 KEX_WARN,
251 KEX_DHGROUP1,
252 KEX_DHGROUP14,
253 KEX_DHGEX,
254 KEX_MAX
255};
256
257enum {
258 /*
2e85c969 259 * SSH ciphers (both SSH-1 and SSH-2)
ca20bfcf 260 */
261 CIPHER_WARN, /* pseudo 'cipher' */
262 CIPHER_3DES,
263 CIPHER_BLOWFISH,
2e85c969 264 CIPHER_AES, /* (SSH-2 only) */
7f1ae1d2 265 CIPHER_DES,
a2add208 266 CIPHER_ARCFOUR,
ca20bfcf 267 CIPHER_MAX /* no. ciphers (inc warn) */
268};
269
270enum {
271 /*
5ecd7ad0 272 * Several different bits of the PuTTY configuration seem to be
273 * three-way settings whose values are `always yes', `always
274 * no', and `decide by some more complex automated means'. This
275 * is true of line discipline options (local echo and line
276 * editing), proxy DNS, Close On Exit, and SSH server bug
277 * workarounds. Accordingly I supply a single enum here to deal
278 * with them all.
0965bee0 279 */
5ecd7ad0 280 FORCE_ON, FORCE_OFF, AUTO
281};
282
283enum {
284 /*
285 * Proxy types.
286 */
10068a0b 287 PROXY_NONE, PROXY_SOCKS4, PROXY_SOCKS5,
288 PROXY_HTTP, PROXY_TELNET, PROXY_CMD
0965bee0 289};
290
291enum {
292 /*
293 * Line discipline options which the backend might try to control.
294 */
32874aea 295 LD_EDIT, /* local line editing */
296 LD_ECHO /* local echo */
0965bee0 297};
298
b41069ff 299enum {
5ecd7ad0 300 /* Protocol back ends. (cfg.protocol) */
301 PROT_RAW, PROT_TELNET, PROT_RLOGIN, PROT_SSH
302};
303
304enum {
305 /* Bell settings (cfg.beep) */
85f6b361 306 BELL_DISABLED, BELL_DEFAULT, BELL_VISUAL, BELL_WAVEFILE, BELL_PCSPEAKER
5ecd7ad0 307};
308
309enum {
310 /* Taskbar flashing indication on bell (cfg.beep_ind) */
311 B_IND_DISABLED, B_IND_FLASH, B_IND_STEADY
312};
313
314enum {
315 /* Resize actions (cfg.resize_action) */
316 RESIZE_TERM, RESIZE_DISABLED, RESIZE_FONT, RESIZE_EITHER
b41069ff 317};
318
6c50d421 319enum {
320 /* Function key types (cfg.funky_type) */
321 FUNKY_TILDE,
322 FUNKY_LINUX,
323 FUNKY_XTERM,
324 FUNKY_VT400,
325 FUNKY_VT100P,
326 FUNKY_SCO
327};
328
17c7fed1 329enum {
330 FQ_DEFAULT, FQ_ANTIALIASED, FQ_NONANTIALIASED, FQ_CLEARTYPE
331};
332
c6ccd5c2 333extern const char *const ttymodes[];
334
05581745 335enum {
336 /*
337 * Network address types. Used for specifying choice of IPv4/v6
338 * in config; also used in proxy.c to indicate whether a given
339 * host name has already been resolved or will be resolved at
340 * the proxy end.
341 */
342 ADDRTYPE_UNSPEC, ADDRTYPE_IPV4, ADDRTYPE_IPV6, ADDRTYPE_NAME
343};
344
1709795f 345struct backend_tag {
cbe2d68f 346 const char *(*init) (void *frontend_handle, void **backend_handle,
347 Config *cfg,
79bf227b 348 char *host, int port, char **realhost, int nodelay,
349 int keepalive);
fabd1805 350 void (*free) (void *handle);
86916870 351 /* back->reconfig() passes in a replacement configuration. */
352 void (*reconfig) (void *handle, Config *cfg);
5471d09a 353 /* back->send() returns the current amount of buffered data. */
51470298 354 int (*send) (void *handle, char *buf, int len);
5471d09a 355 /* back->sendbuffer() does the same thing but without attempting a send */
51470298 356 int (*sendbuffer) (void *handle);
357 void (*size) (void *handle, int width, int height);
358 void (*special) (void *handle, Telnet_Special code);
125105d1 359 const struct telnet_special *(*get_specials) (void *handle);
6226c939 360 int (*connected) (void *handle);
51470298 361 int (*exitcode) (void *handle);
a52e493d 362 /* If back->sendok() returns FALSE, data sent to it from the frontend
363 * may be lost. */
51470298 364 int (*sendok) (void *handle);
365 int (*ldisc) (void *handle, int);
b9d7bcad 366 void (*provide_ldisc) (void *handle, void *ldisc);
a8327734 367 void (*provide_logctx) (void *handle, void *logctx);
5471d09a 368 /*
369 * back->unthrottle() tells the back end that the front end
370 * buffer is clearing.
371 */
51470298 372 void (*unthrottle) (void *handle, int);
f89c3294 373 int (*cfg_info) (void *handle);
97db3be4 374 int default_port;
1709795f 375};
374330e2 376
297d398b 377extern struct backend_list {
89ee5268 378 int protocol;
379 char *name;
380 Backend *backend;
381} backends[];
382
ffa79828 383/*
384 * Suggested default protocol provided by the backend link module.
385 * The application is free to ignore this.
386 */
387extern const int be_default_protocol;
388
5ecd7ad0 389/*
47e4e735 390 * Name of this particular application, for use in the config box
391 * and other pieces of text.
392 */
393extern const char *const appname;
394
395/*
5ecd7ad0 396 * IMPORTANT POLICY POINT: everything in this structure which wants
397 * to be treated like an integer must be an actual, honest-to-
398 * goodness `int'. No enum-typed variables. This is because parts
399 * of the code will want to pass around `int *' pointers to them
400 * and we can't run the risk of porting to some system on which the
401 * enum comes out as a different size from int.
402 */
f7f27309 403struct config_tag {
374330e2 404 /* Basic options */
405 char host[512];
406 int port;
5ecd7ad0 407 int protocol;
05581745 408 int addressfamily;
374330e2 409 int close_on_exit;
9ef49106 410 int warn_on_close;
32874aea 411 int ping_interval; /* in seconds */
2184a5d9 412 int tcp_nodelay;
79bf227b 413 int tcp_keepalives;
8eebd221 414 /* Proxy options */
415 char proxy_exclude_list[512];
5ecd7ad0 416 int proxy_dns;
b804e1e5 417 int even_proxy_localhost;
5ecd7ad0 418 int proxy_type;
8eebd221 419 char proxy_host[512];
420 int proxy_port;
f33ba69e 421 char proxy_username[128];
422 char proxy_password[128];
8eebd221 423 char proxy_telnet_command[512];
fef97f43 424 /* SSH options */
6abbf9e3 425 char remote_cmd[512];
fd5e5847 426 char remote_cmd2[512]; /* fallback if the first fails
427 * (used internally for scp) */
32874aea 428 char *remote_cmd_ptr; /* might point to a larger command
429 * but never for loading/saving */
fd5e5847 430 char *remote_cmd_ptr2; /* might point to a larger command
431 * but never for loading/saving */
fef97f43 432 int nopty;
4ba9b64b 433 int compression;
83e7d008 434 int ssh_kexlist[KEX_MAX];
d57f70af 435 int ssh_rekey_time; /* in minutes */
436 char ssh_rekey_data[16];
973612f5 437 int tryagent;
979310f1 438 int agentfwd;
2e85c969 439 int change_username; /* allow username switching in SSH-2 */
ca20bfcf 440 int ssh_cipherlist[CIPHER_MAX];
9a30e26b 441 Filename keyfile;
32874aea 442 int sshprot; /* use v1 or v2 when both available */
2e85c969 443 int ssh2_des_cbc; /* "des-cbc" unrecommended SSH-2 cipher */
a1a1fae4 444 int ssh_no_userauth; /* bypass "ssh-userauth" (SSH-2 only) */
ccbfb941 445 int try_tis_auth;
f091e308 446 int try_ki_auth;
4a8fc3c4 447 int ssh_subsys; /* run a subsystem rather than a command */
fd5e5847 448 int ssh_subsys2; /* fallback to go with remote_cmd2 */
0ed48730 449 int ssh_no_shell; /* avoid running a shell */
374330e2 450 /* Telnet options */
451 char termtype[32];
452 char termspeed[32];
c6ccd5c2 453 char ttymodes[768]; /* MODE\tVvalue\0MODE\tA\0\0 */
32874aea 454 char environmt[1024]; /* VAR\tvalue\0VAR\tvalue\0\0 */
277fc55e 455 char username[100];
456 char localusername[100];
374330e2 457 int rfc_environ;
8faa456c 458 int passive_telnet;
374330e2 459 /* Keyboard options */
460 int bksp_is_delete;
461 int rxvt_homeend;
c9def1b8 462 int funky_type;
32874aea 463 int no_applic_c; /* totally disable app cursor keys */
464 int no_applic_k; /* totally disable app keypad */
c0d36a72 465 int no_mouse_rep; /* totally disable mouse reporting */
0d2086c5 466 int no_remote_resize; /* disable remote resizing */
467 int no_alt_screen; /* disable alternate screen */
468 int no_remote_wintitle; /* disable remote retitling */
469 int no_dbackspace; /* disable destructive backspace */
470 int no_remote_charset; /* disable remote charset config */
7fcdebd3 471 int no_remote_qtitle; /* disable remote win title query */
374330e2 472 int app_cursor;
473 int app_keypad;
c5e9c988 474 int nethack_keypad;
a5f3e637 475 int telnet_keyboard;
eee63b77 476 int telnet_newline;
c5e9c988 477 int alt_f4; /* is it special? */
478 int alt_space; /* is it special? */
a094ae43 479 int alt_only; /* is it special? */
0965bee0 480 int localecho;
481 int localedit;
e95edc00 482 int alwaysontop;
8f57d753 483 int fullscreenonaltenter;
c9def1b8 484 int scroll_on_key;
a094ae43 485 int scroll_on_disp;
876e5d5e 486 int erase_to_scrollback;
a094ae43 487 int compose_key;
95bbe1ae 488 int ctrlaltkeys;
32874aea 489 char wintitle[256]; /* initial window title */
374330e2 490 /* Terminal options */
491 int savelines;
492 int dec_om;
493 int wrap_mode;
fef97f43 494 int lfhascr;
4e30ff69 495 int cursor_type; /* 0=block 1=underline 2=vertical */
c9def1b8 496 int blink_cur;
5ecd7ad0 497 int beep;
498 int beep_ind;
156686ef 499 int bellovl; /* bell overload protection active? */
500 int bellovl_n; /* number of bells to cause overload */
501 int bellovl_t; /* time interval for overload (seconds) */
502 int bellovl_s; /* period of silence to re-enable bell (s) */
9a30e26b 503 Filename bell_wavefile;
c9def1b8 504 int scrollbar;
a401e5f3 505 int scrollbar_in_fullscreen;
5ecd7ad0 506 int resize_action;
c9def1b8 507 int bce;
508 int blinktext;
374330e2 509 int win_name_always;
510 int width, height;
9a30e26b 511 FontSpec font;
17c7fed1 512 int font_quality;
9a30e26b 513 Filename logfilename;
e1c8e0ed 514 int logtype;
9f89f96e 515 int logxfovr;
6d60c791 516 int logflush;
9a10ecf4 517 int logomitpass;
518 int logomitdata;
554c540d 519 int hide_mouseptr;
57d08f2f 520 int sunken_edge;
5a73255e 521 int window_border;
e7fbcdd8 522 char answerback[256];
b44b307a 523 char printer[128];
f0fccd51 524 int arabicshaping;
525 int bidi;
374330e2 526 /* Colour options */
c6f1b8ed 527 int ansi_colour;
cecb13f6 528 int xterm_256_colour;
26d1da7b 529 int system_colour;
374330e2 530 int try_palette;
531 int bold_colour;
532 unsigned char colours[22][3];
533 /* Selection options */
534 int mouse_is_xterm;
6908fed7 535 int rect_select;
d3a22f79 536 int rawcnp;
a7419ea4 537 int rtf_paste;
b90840c3 538 int mouse_override;
374330e2 539 short wordness[256];
c9def1b8 540 /* translations */
5ecd7ad0 541 int vtmode;
8bb92a1c 542 char line_codepage[128];
74790953 543 int cjk_ambig_wide;
6ac7f054 544 int utf8_override;
a9c02454 545 int xlat_capslockcyr;
9c964e85 546 /* X11 forwarding */
547 int x11_forward;
548 char x11_display[128];
b3ebaa28 549 int x11_auth;
d74d141c 550 /* port forwarding */
beefa433 551 int lport_acceptall; /* accept conns from hosts other than localhost */
2e85c969 552 int rport_acceptall; /* same for remote forwarded ports (SSH-2 only) */
820ebe3b 553 /*
554 * The port forwarding string contains a number of
555 * NUL-terminated substrings, terminated in turn by an empty
556 * string (i.e. a second NUL immediately after the previous
557 * one). Each string can be of one of the following forms:
558 *
559 * [LR]localport\thost:port
560 * [LR]localaddr:localport\thost:port
561 * Dlocalport
562 * Dlocaladdr:localport
563 */
564 char portfwd[1024];
2c9c6388 565 /* SSH bug compatibility modes */
5ecd7ad0 566 int sshbug_ignore1, sshbug_plainpw1, sshbug_rsa1,
8e975795 567 sshbug_hmac2, sshbug_derivekey2, sshbug_rsapad2,
f382c87d 568 sshbug_pksessid2, sshbug_rekey2;
c8ee61b9 569 /* Options for pterm. Should split out into platform-dependent part. */
570 int stamp_utmp;
571 int login_shell;
239b3b36 572 int scrollbar_on_left;
bf133a73 573 int shadowbold;
9a30e26b 574 FontSpec boldfont;
575 FontSpec widefont;
576 FontSpec wideboldfont;
12994a99 577 int shadowboldoffset;
f7f27309 578};
374330e2 579
e277c42d 580/*
4017be6d 581 * Some global flags denoting the type of application.
67779be7 582 *
583 * FLAG_VERBOSE is set when the user requests verbose details.
584 *
585 * FLAG_STDERR is set in command-line applications (which have a
586 * functioning stderr that it makes sense to write to) and not in
587 * GUI applications (which don't).
588 *
589 * FLAG_INTERACTIVE is set when a full interactive shell session is
590 * being run, _either_ because no remote command has been provided
591 * _or_ because the application is GUI and can't run non-
592 * interactively.
0b4f0bc0 593 *
594 * These flags describe the type of _application_ - they wouldn't
595 * vary between individual sessions - and so it's OK to have this
596 * variable be GLOBAL.
c44bf5bd 597 *
598 * Note that additional flags may be defined in platform-specific
599 * headers. It's probably best if those ones start from 0x1000, to
600 * avoid collision.
4017be6d 601 */
67779be7 602#define FLAG_VERBOSE 0x0001
603#define FLAG_STDERR 0x0002
604#define FLAG_INTERACTIVE 0x0004
4017be6d 605GLOBAL int flags;
606
0b4f0bc0 607/*
608 * Likewise, these two variables are set up when the application
609 * initialises, and inform all default-settings accesses after
610 * that.
611 */
e277c42d 612GLOBAL int default_protocol;
613GLOBAL int default_port;
374330e2 614
18e62ad8 615/*
616 * This is set TRUE by cmdline.c iff a session is loaded with "-load".
617 */
618GLOBAL int loaded_session;
619
4e23b276 620struct RSAKey; /* be a little careful of scope */
621
374330e2 622/*
edd0cb8a 623 * Mechanism for getting text strings such as usernames and passwords
624 * from the front-end.
625 * The fields are mostly modelled after SSH's keyboard-interactive auth.
626 * FIXME We should probably mandate a character set/encoding (probably UTF-8).
627 *
628 * Since many of the pieces of text involved may be chosen by the server,
629 * the caller must take care to ensure that the server can't spoof locally-
630 * generated prompts such as key passphrase prompts. Some ground rules:
631 * - If the front-end needs to truncate a string, it should lop off the
632 * end.
633 * - The front-end should filter out any dangerous characters and
634 * generally not trust the strings. (But \n is required to behave
635 * vaguely sensibly, at least in `instruction', and ideally in
636 * `prompt[]' too.)
637 */
638typedef struct {
639 char *prompt;
640 int echo;
641 char *result; /* allocated/freed by caller */
642 size_t result_len;
643} prompt_t;
644typedef struct {
645 /*
646 * Indicates whether the information entered is to be used locally
647 * (for instance a key passphrase prompt), or is destined for the wire.
648 * This is a hint only; the front-end is at liberty not to use this
649 * information (so the caller should ensure that the supplied text is
650 * sufficient).
651 */
652 int to_server;
653 char *name; /* Short description, perhaps for dialog box title */
654 int name_reqd; /* Display of `name' required or optional? */
655 char *instruction; /* Long description, maybe with embedded newlines */
656 int instr_reqd; /* Display of `instruction' required or optional? */
657 size_t n_prompts;
658 prompt_t **prompts;
659 void *frontend;
660 void *data; /* slot for housekeeping data, managed by
661 * get_userpass_input(); initially NULL */
662} prompts_t;
663prompts_t *new_prompts(void *frontend);
664void add_prompt(prompts_t *p, char *promptstr, int echo, size_t len);
665/* Burn the evidence. (Assumes _all_ strings want free()ing.) */
666void free_prompts(prompts_t *p);
667
668/*
5b152cce 669 * Exports from the front end.
374330e2 670 */
a8327734 671void request_resize(void *frontend, int, int);
36566009 672void do_text(Context, int, int, wchar_t *, int, unsigned long, int);
673void do_cursor(Context, int, int, wchar_t *, int, unsigned long, int);
2102eb8a 674int char_width(Context ctx, int uc);
37d2a505 675#ifdef OPTIMISE_SCROLL
341eb978 676void do_scroll(Context, int, int, int);
37d2a505 677#endif
a8327734 678void set_title(void *frontend, char *);
679void set_icon(void *frontend, char *);
680void set_sbar(void *frontend, int, int, int);
681Context get_ctx(void *frontend);
32874aea 682void free_ctx(Context);
a8327734 683void palette_set(void *frontend, int, int, int, int);
684void palette_reset(void *frontend);
685void write_aclip(void *frontend, char *, int, int);
c83c79bd 686void write_clip(void *frontend, wchar_t *, int *, int, int);
a8327734 687void get_clip(void *frontend, wchar_t **, int *);
688void optimised_move(void *frontend, int, int, int);
689void set_raw_mouse_mode(void *frontend, int);
a8327734 690void connection_fatal(void *frontend, char *, ...);
32874aea 691void fatalbox(char *, ...);
1709795f 692void modalfatalbox(char *, ...);
4b599b6d 693#ifdef macintosh
694#pragma noreturn(fatalbox)
695#pragma noreturn(modalfatalbox)
696#endif
860a34f8 697void do_beep(void *frontend, int);
a8327734 698void begin_session(void *frontend);
699void sys_cursor(void *frontend, int x, int y);
700void request_paste(void *frontend);
b9d7bcad 701void frontend_keypress(void *frontend);
702void ldisc_update(void *frontend, int echo, int edit);
533b1743 703/* It's the backend's responsibility to invoke this at the start of a
704 * connection, if necessary; it can also invoke it later if the set of
705 * special commands changes. It does not need to invoke it at session
706 * shutdown. */
125105d1 707void update_specials_menu(void *frontend);
fbf6cb3b 708int from_backend(void *frontend, int is_stderr, const char *data, int len);
edd0cb8a 709int from_backend_untrusted(void *frontend, const char *data, int len);
39934deb 710void notify_remote_exit(void *frontend);
c6ccd5c2 711/* Get a sensible value for a tty mode. NULL return = don't set.
712 * Otherwise, returned value should be freed by caller. */
713char *get_ttymode(void *frontend, const char *mode);
edd0cb8a 714/*
715 * >0 = `got all results, carry on'
716 * 0 = `user cancelled' (FIXME distinguish "give up entirely" and "next auth"?)
717 * <0 = `please call back later with more in/inlen'
718 */
719int get_userpass_input(prompts_t *p, unsigned char *in, int inlen);
374330e2 720#define OPTIMISE_IS_SCROLL 1
721
a8327734 722void set_iconic(void *frontend, int iconic);
723void move_window(void *frontend, int x, int y);
724void set_zorder(void *frontend, int top);
725void refresh_window(void *frontend);
726void set_zoomed(void *frontend, int zoomed);
727int is_iconic(void *frontend);
728void get_window_pos(void *frontend, int *x, int *y);
729void get_window_pixels(void *frontend, int *x, int *y);
730char *get_window_title(void *frontend, int icon);
755e0524 731/* Hint from backend to frontend about time-consuming operations.
732 * Initial state is assumed to be BUSY_NOT. */
733enum {
734 BUSY_NOT, /* Not busy, all user interaction OK */
735 BUSY_WAITING, /* Waiting for something; local event loops still running
736 so some local interaction (e.g. menus) OK, but network
737 stuff is suspended */
738 BUSY_CPU /* Locally busy (e.g. crypto); user interaction suspended */
739};
740void set_busy_status(void *frontend, int status);
68f9b3d9 741
93b581bd 742void cleanup_exit(int);
743
374330e2 744/*
745 * Exports from noise.c.
746 */
32874aea 747void noise_get_heavy(void (*func) (void *, int));
748void noise_get_light(void (*func) (void *, int));
7d6ee6ff 749void noise_regular(void);
f7f27309 750void noise_ultralight(unsigned long data);
374330e2 751void random_save_seed(void);
de3df031 752void random_destroy_seed(void);
374330e2 753
754/*
a9422f39 755 * Exports from settings.c.
756 */
3f935d5b 757char *save_settings(char *section, int do_host, Config * cfg);
b537dd42 758void save_open_settings(void *sesskey, int do_host, Config *cfg);
32874aea 759void load_settings(char *section, int do_host, Config * cfg);
ce283213 760void load_open_settings(void *sesskey, int do_host, Config *cfg);
0b4f0bc0 761void get_sesslist(struct sesslist *, int allocate);
1709795f 762void do_defaults(char *, Config *);
763void registry_cleanup(void);
a9422f39 764
765/*
5a9eb105 766 * Functions used by settings.c to provide platform-specific
767 * default settings.
768 *
769 * (The integer one is expected to return `def' if it has no clear
770 * opinion of its own. This is because there's no integer value
771 * which I can reliably set aside to indicate `nil'. The string
9a30e26b 772 * function is perfectly all right returning NULL, of course. The
773 * Filename and FontSpec functions are _not allowed_ to fail to
774 * return, since these defaults _must_ be per-platform.)
5a9eb105 775 */
c85623f9 776char *platform_default_s(const char *name);
777int platform_default_i(const char *name, int def);
9a30e26b 778Filename platform_default_filename(const char *name);
779FontSpec platform_default_fontspec(const char *name);
5a9eb105 780
781/*
374330e2 782 * Exports from terminal.c.
783 */
784
21d2b241 785Terminal *term_init(Config *, struct unicode_data *, void *);
fabd1805 786void term_free(Terminal *);
887035a5 787void term_size(Terminal *, int, int, int);
c1b55581 788void term_paint(Terminal *, Context, int, int, int, int, int);
887035a5 789void term_scroll(Terminal *, int, int);
900f9aca 790void term_pwron(Terminal *, int);
887035a5 791void term_clrsb(Terminal *);
fc5b0934 792void term_mouse(Terminal *, Mouse_Button, Mouse_Button, Mouse_Action,
793 int,int,int,int,int);
6c50d421 794void term_key(Terminal *, Key_Sym, wchar_t *, size_t, unsigned int,
795 unsigned int);
887035a5 796void term_deselect(Terminal *);
797void term_update(Terminal *);
798void term_invalidate(Terminal *);
799void term_blink(Terminal *, int set_cursor);
800void term_do_paste(Terminal *);
801int term_paste_pending(Terminal *);
802void term_paste(Terminal *);
803void term_nopaste(Terminal *);
804int term_ldisc(Terminal *, int option);
805void term_copyall(Terminal *);
64734920 806void term_reconfig(Terminal *, Config *);
887035a5 807void term_seen_key_event(Terminal *);
fbf6cb3b 808int term_data(Terminal *, int is_stderr, const char *data, int len);
edd0cb8a 809int term_data_untrusted(Terminal *, const char *data, int len);
51470298 810void term_provide_resize_fn(Terminal *term,
811 void (*resize_fn)(void *, int, int),
812 void *resize_ctx);
a8327734 813void term_provide_logctx(Terminal *term, void *logctx);
1cff1320 814void term_set_focus(Terminal *term, int has_focus);
c6ccd5c2 815char *term_get_ttymode(Terminal *term, const char *mode);
edd0cb8a 816int term_get_userpass_input(Terminal *term, prompts_t *p,
817 unsigned char *in, int inlen);
374330e2 818
819/*
00db133f 820 * Exports from logging.c.
821 */
c229ef97 822void *log_init(void *frontend, Config *cfg);
fabd1805 823void log_free(void *logctx);
c229ef97 824void log_reconfig(void *logctx, Config *cfg);
a8327734 825void logfopen(void *logctx);
826void logfclose(void *logctx);
827void logtraffic(void *logctx, unsigned char c, int logmode);
11cc5e30 828void logflush(void *logctx);
cbe2d68f 829void log_eventlog(void *logctx, const char *string);
00db133f 830enum { PKT_INCOMING, PKT_OUTGOING };
9a10ecf4 831enum { PKTLOG_EMIT, PKTLOG_BLANK, PKTLOG_OMIT };
832struct logblank_t {
833 int offset;
834 int len;
835 int type;
836};
a8327734 837void log_packet(void *logctx, int direction, int type,
9a10ecf4 838 char *texttype, void *data, int len,
839 int n_blanks, const struct logblank_t *blanks);
00db133f 840
841/*
d082ac49 842 * Exports from testback.c
843 */
844
845extern Backend null_backend;
846extern Backend loop_backend;
847
848/*
5e1a8e27 849 * Exports from raw.c.
850 */
851
3d9a14c9 852extern Backend raw_backend;
5e1a8e27 853
854/*
c91409da 855 * Exports from rlogin.c.
856 */
857
858extern Backend rlogin_backend;
859
860/*
374330e2 861 * Exports from telnet.c.
862 */
863
c14776e8 864extern Backend telnet_backend;
374330e2 865
866/*
edd0cb8a 867 * Exports from ssh.c.
374330e2 868 */
c14776e8 869extern Backend ssh_backend;
374330e2 870
871/*
5bc238bb 872 * Exports from ldisc.c.
873 */
fe5634f6 874void *ldisc_create(Config *, Terminal *, Backend *, void *, void *);
fabd1805 875void ldisc_free(void *);
b9d7bcad 876void ldisc_send(void *handle, char *buf, int len, int interactive);
5bc238bb 877
878/*
5def7522 879 * Exports from ldiscucs.c.
880 */
881void lpage_send(void *, int codepage, char *buf, int len, int interactive);
882void luni_send(void *, wchar_t * widebuf, int len, int interactive);
883
884/*
374330e2 885 * Exports from sshrand.c.
886 */
887
888void random_add_noise(void *noise, int length);
374330e2 889int random_byte(void);
890void random_get_savedata(void **data, int *len);
93b581bd 891extern int random_active;
5d17ccfc 892/* The random number subsystem is activated if at least one other entity
893 * within the program expresses an interest in it. So each SSH session
894 * calls random_ref on startup and random_unref on shutdown. */
895void random_ref(void);
896void random_unref(void);
374330e2 897
898/*
39934deb 899 * Exports from pinger.c.
900 */
901typedef struct pinger_tag *Pinger;
902Pinger pinger_new(Config *cfg, Backend *back, void *backhandle);
903void pinger_reconfig(Pinger, Config *oldcfg, Config *newcfg);
904void pinger_free(Pinger);
905
906/*
374330e2 907 * Exports from misc.c.
908 */
909
db9c0f86 910#include "misc.h"
374330e2 911
912/*
067a15ea 913 * Exports from version.c.
914 */
915extern char ver[];
916
917/*
4eeb7d09 918 * Exports from unicode.c.
14963b8f 919 */
4eeb7d09 920#ifndef CP_UTF8
921#define CP_UTF8 65001
922#endif
facd762c 923/* void init_ucs(void); -- this is now in platform-specific headers */
5def7522 924int is_dbcs_leadbyte(int codepage, char byte);
925int mb_to_wc(int codepage, int flags, char *mbstr, int mblen,
926 wchar_t *wcstr, int wclen);
927int wc_to_mb(int codepage, int flags, wchar_t *wcstr, int wclen,
21d2b241 928 char *mbstr, int mblen, char *defchr, int *defused,
929 struct unicode_data *ucsdata);
a9c02454 930wchar_t xlat_uskbd2cyrllic(int ch);
4eeb7d09 931int check_compose(int first, int second);
932int decode_codepage(char *cp_name);
d4413bd2 933const char *cp_enumerate (int index);
934const char *cp_name(int codepage);
a7419ea4 935void get_unitab(int codepage, wchar_t * unitab, int ftype);
14963b8f 936
937/*
5f6fe27e 938 * Exports from wcwidth.c
939 */
94debd8c 940int mk_wcwidth(wchar_t ucs);
941int mk_wcswidth(const wchar_t *pwcs, size_t n);
942int mk_wcwidth_cjk(wchar_t ucs);
943int mk_wcswidth_cjk(const wchar_t *pwcs, size_t n);
5f6fe27e 944
945/*
8f203108 946 * Exports from mscrypto.c
947 */
948#ifdef MSCRYPTOAPI
949int crypto_startup();
950void crypto_wrapup();
951#endif
952
953/*
839f10db 954 * Exports from pageantc.c.
955 *
956 * agent_query returns 1 for here's-a-response, and 0 for query-in-
957 * progress. In the latter case there will be a call to `callback'
958 * at some future point, passing callback_ctx as the first
959 * parameter and the actual reply data as the second and third.
960 *
961 * The response may be a NULL pointer (in either of the synchronous
962 * or asynchronous cases), which indicates failure to receive a
963 * response.
5c58ad2d 964 */
839f10db 965int agent_query(void *in, int inlen, void **out, int *outlen,
966 void (*callback)(void *, void *, int), void *callback_ctx);
5c58ad2d 967int agent_exists(void);
968
4eb24e3a 969/*
970 * Exports from wildcard.c
971 */
972const char *wc_error(int value);
973int wc_match(const char *wildcard, const char *target);
974int wc_unescape(char *output, const char *wildcard);
374330e2 975
ff2ae367 976/*
2285d016 977 * Exports from frontend (windlg.c etc)
1709795f 978 */
cbe2d68f 979void logevent(void *frontend, const char *);
2285d016 980void pgp_fingerprints(void);
3d9449a1 981/*
982 * verify_ssh_host_key() can return one of three values:
983 *
984 * - +1 means `key was OK' (either already known or the user just
985 * approved it) `so continue with the connection'
986 *
987 * - 0 means `key was not OK, abandon the connection'
988 *
989 * - -1 means `I've initiated enquiries, please wait to be called
990 * back via the provided function with a result that's either 0
991 * or +1'.
992 */
993int verify_ssh_host_key(void *frontend, char *host, int port, char *keytype,
994 char *keystr, char *fingerprint,
995 void (*callback)(void *ctx, int result), void *ctx);
996/*
997 * askalg has the same set of return values as verify_ssh_host_key.
998 */
999int askalg(void *frontend, const char *algtype, const char *algname,
1000 void (*callback)(void *ctx, int result), void *ctx);
919baedb 1001/*
1002 * askappend can return four values:
1003 *
1004 * - 2 means overwrite the log file
1005 * - 1 means append to the log file
1006 * - 0 means cancel logging for this session
1007 * - -1 means please wait.
1008 */
1009int askappend(void *frontend, Filename filename,
1010 void (*callback)(void *ctx, int result), void *ctx);
1709795f 1011
1012/*
edd0cb8a 1013 * Exports from console frontends (wincons.c, uxcons.c)
1014 * that aren't equivalents to things in windlg.c et al.
ff2ae367 1015 */
1016extern int console_batch_mode;
edd0cb8a 1017int console_get_userpass_input(prompts_t *p, unsigned char *in, int inlen);
d3fef4a5 1018void console_provide_logctx(void *logctx);
47a6b94c 1019int is_interactive(void);
ff2ae367 1020
b44b307a 1021/*
1022 * Exports from printing.c.
1023 */
1024typedef struct printer_enum_tag printer_enum;
1025typedef struct printer_job_tag printer_job;
1026printer_enum *printer_start_enum(int *nprinters);
1027char *printer_get_name(printer_enum *, int);
1028void printer_finish_enum(printer_enum *);
1029printer_job *printer_start_job(char *printer);
1030void printer_job_data(printer_job *, void *, int);
1031void printer_finish_job(printer_job *);
1032
c0a81592 1033/*
1034 * Exports from cmdline.c (and also cmdline_error(), which is
1035 * defined differently in various places and required _by_
1036 * cmdline.c).
1037 */
5555d393 1038int cmdline_process_param(char *, char *, int, Config *);
1039void cmdline_run_saved(Config *);
679539d7 1040void cmdline_cleanup(void);
edd0cb8a 1041int cmdline_get_passwd_input(prompts_t *p, unsigned char *in, int inlen);
c0a81592 1042#define TOOLTYPE_FILETRANSFER 1
46a3419b 1043#define TOOLTYPE_NONNETWORK 2
c0a81592 1044extern int cmdline_tooltype;
1045
1046void cmdline_error(char *, ...);
1047
e0e7dff8 1048/*
d1582b2e 1049 * Exports from config.c.
1050 */
1a602f03 1051struct controlbox;
12745e35 1052void setup_config_box(struct controlbox *b, int midsession,
1053 int protocol, int protcfginfo);
d1582b2e 1054
1055/*
f0fccd51 1056 * Exports from minibidi.c.
1057 */
1058typedef struct bidi_char {
1059 wchar_t origwc, wc;
1060 unsigned short index;
1061} bidi_char;
1062int do_bidi(bidi_char *line, int count);
1063int do_shape(bidi_char *line, bidi_char *to, int count);
1064
1065/*
e0e7dff8 1066 * X11 auth mechanisms we know about.
1067 */
1068enum {
1069 X11_NO_AUTH,
1070 X11_MIT, /* MIT-MAGIC-COOKIE-1 */
2f92b717 1071 X11_XDM, /* XDM-AUTHORIZATION-1 */
e0e7dff8 1072 X11_NAUTHS
1073};
1074extern const char *const x11_authnames[]; /* declared in x11fwd.c */
1075
9a30e26b 1076/*
1077 * Miscellaneous exports from the platform-specific code.
1078 */
9fab77dc 1079Filename filename_from_str(const char *string);
1080const char *filename_to_str(const Filename *fn);
9a30e26b 1081int filename_equal(Filename f1, Filename f2);
1082int filename_is_null(Filename fn);
799dfcfa 1083char *get_username(void); /* return value needs freeing */
47a6b94c 1084char *get_random_data(int bytes); /* used in cmdgen.c */
9a30e26b 1085
39934deb 1086/*
1087 * Exports and imports from timing.c.
1088 *
1089 * schedule_timer() asks the front end to schedule a callback to a
1090 * timer function in a given number of ticks. The returned value is
1091 * the time (in ticks since an arbitrary offset) at which the
1092 * callback can be expected. This value will also be passed as the
1093 * `now' parameter to the callback function. Hence, you can (for
1094 * example) schedule an event at a particular time by calling
1095 * schedule_timer() and storing the return value in your context
1096 * structure as the time when that event is due. The first time a
1097 * callback function gives you that value or more as `now', you do
1098 * the thing.
1099 *
1100 * expire_timer_context() drops all current timers associated with
1101 * a given value of ctx (for when you're about to free ctx).
1102 *
1103 * run_timers() is called from the front end when it has reason to
1104 * think some timers have reached their moment, or when it simply
1105 * needs to know how long to wait next. We pass it the time we
1106 * think it is. It returns TRUE and places the time when the next
1107 * timer needs to go off in `next', or alternatively it returns
1108 * FALSE if there are no timers at all pending.
1109 *
1110 * timer_change_notify() must be supplied by the front end; it
1111 * notifies the front end that a new timer has been added to the
1112 * list which is sooner than any existing ones. It provides the
1113 * time when that timer needs to go off.
4ce3729f 1114 *
1115 * *** FRONT END IMPLEMENTORS NOTE:
1116 *
1117 * There's an important subtlety in the front-end implementation of
1118 * the timer interface. When a front end is given a `next' value,
1119 * either returned from run_timers() or via timer_change_notify(),
1120 * it should ensure that it really passes _that value_ as the `now'
1121 * parameter to its next run_timers call. It should _not_ simply
1122 * call GETTICKCOUNT() to get the `now' parameter when invoking
1123 * run_timers().
1124 *
1125 * The reason for this is that an OS's system clock might not agree
1126 * exactly with the timing mechanisms it supplies to wait for a
1127 * given interval. I'll illustrate this by the simple example of
1128 * Unix Plink, which uses timeouts to select() in a way which for
1129 * these purposes can simply be considered to be a wait() function.
1130 * Suppose, for the sake of argument, that this wait() function
1131 * tends to return early by 1%. Then a possible sequence of actions
1132 * is:
1133 *
1134 * - run_timers() tells the front end that the next timer firing
1135 * is 10000ms from now.
1136 * - Front end calls wait(10000ms), but according to
1137 * GETTICKCOUNT() it has only waited for 9900ms.
1138 * - Front end calls run_timers() again, passing time T-100ms as
1139 * `now'.
1140 * - run_timers() does nothing, and says the next timer firing is
1141 * still 100ms from now.
1142 * - Front end calls wait(100ms), which only waits for 99ms.
1143 * - Front end calls run_timers() yet again, passing time T-1ms.
1144 * - run_timers() says there's still 1ms to wait.
1145 * - Front end calls wait(1ms).
1146 *
1147 * If you're _lucky_ at this point, wait(1ms) will actually wait
1148 * for 1ms and you'll only have woken the program up three times.
1149 * If you're unlucky, wait(1ms) might do nothing at all due to
1150 * being below some minimum threshold, and you might find your
1151 * program spends the whole of the last millisecond tight-looping
1152 * between wait() and run_timers().
1153 *
1154 * Instead, what you should do is to _save_ the precise `next'
1155 * value provided by run_timers() or via timer_change_notify(), and
1156 * use that precise value as the input to the next run_timers()
1157 * call. So:
1158 *
1159 * - run_timers() tells the front end that the next timer firing
1160 * is at time T, 10000ms from now.
1161 * - Front end calls wait(10000ms).
1162 * - Front end then immediately calls run_timers() and passes it
1163 * time T, without stopping to check GETTICKCOUNT() at all.
1164 *
1165 * This guarantees that the program wakes up only as many times as
1166 * there are actual timer actions to be taken, and that the timing
1167 * mechanism will never send it into a tight loop.
1168 *
1169 * (It does also mean that the timer action in the above example
1170 * will occur 100ms early, but this is not generally critical. And
1171 * the hypothetical 1% error in wait() will be partially corrected
1172 * for anyway when, _after_ run_timers() returns, you call
1173 * GETTICKCOUNT() and compare the result with the returned `next'
1174 * value to find out how long you have to make your next wait().)
39934deb 1175 */
1176typedef void (*timer_fn_t)(void *ctx, long now);
1177long schedule_timer(int ticks, timer_fn_t fn, void *ctx);
1178void expire_timer_context(void *ctx);
1179int run_timers(long now, long *next);
1180void timer_change_notify(long next);
1181
374330e2 1182#endif