#define ATTR_PASCURS 0x40000000UL /* passive cursor (box) */
#define ATTR_INVALID 0x20000000UL
#define ATTR_WRAPPED 0x10000000UL
+#define ATTR_RIGHTCURS 0x10000000UL /* doubles as cursor-on-RHS indicator */
#define LATTR_NORM 0x00000000UL
#define LATTR_WIDE 0x01000000UL
GLOBAL int session_closed;
+#define LGTYP_NONE 0 /* logmode: no logging */
+#define LGTYP_ASCII 1 /* logmode: pure ascii */
+#define LGTYP_DEBUG 2 /* logmode: all chars of taffic */
GLOBAL char *logfile;
/*
enum { PROT_RAW, PROT_TELNET, PROT_SSH } protocol;
int close_on_exit;
int warn_on_close;
- int ping_interval;
+ int ping_interval; /* in seconds */
/* SSH options */
char remote_cmd[512];
int nopty;
int dec_om;
int wrap_mode;
int lfhascr;
+ int cursor_type; /* 0=block 1=underline 2=vertical */
int blink_cur;
int beep;
int scrollbar;
int fontisbold;
int fontheight;
int fontcharset;
+ char logfilename[FILENAME_MAX];
+ int logtype;
/* Colour options */
int try_palette;
int bold_colour;
void showabout (HWND);
void verify_ssh_host_key(char *host, int port, char *keytype,
char *keystr, char *fingerprint);
+int askappend(char *filename);
void registry_cleanup(void);
+void force_normal(HWND hwnd);
GLOBAL int nsessions;
GLOBAL char **sessions;
void term_paste(void);
void term_nopaste(void);
void from_backend(int is_stderr, char *data, int len);
+void logfopen (void);
+void logfclose (void);
void term_copyall(void);
/*
* Exports from misc.c.
*/
-/* #define MALLOC_LOG do this if you suspect putty of leaking memory */
-#ifdef MALLOC_LOG
-#define smalloc(z) (mlog(__FILE__,__LINE__), safemalloc(z))
-#define srealloc(y,z) (mlog(__FILE__,__LINE__), saferealloc(y,z))
-#define sfree(z) (mlog(__FILE__,__LINE__), safefree(z))
-void mlog(char *, int);
-#else
-#define smalloc safemalloc
-#define srealloc saferealloc
-#define sfree safefree
-#endif
-
-void *safemalloc(size_t);
-void *saferealloc(void *, size_t);
-void safefree(void *);
+#include "puttymem.h"
/*
* Exports from version.c.