usched: Allow process to change self cpu affinity
[dragonfly.git] / usr.bin / telnet / defines.h
blobab4b4b1a4d00b620db9fbc2478b4164d607c08b1
1 /*
2 * Copyright (c) 1988, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. Neither the name of the University nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
29 * @(#)defines.h 8.1 (Berkeley) 6/6/93
30 * $FreeBSD: src/crypto/telnet/telnet/defines.h,v 1.1.1.1.8.1 2002/04/13 10:59:08 markm Exp $
31 * $DragonFly: src/crypto/telnet/telnet/defines.h,v 1.2 2003/06/17 04:24:37 dillon Exp $
34 #define settimer(x) clocks.x = clocks.system++
36 #define NETADD(c) { *netoring.supply = c; ring_supplied(&netoring, 1); }
37 #define NET2ADD(c1,c2) { NETADD(c1); NETADD(c2); }
38 #define NETBYTES() (ring_full_count(&netoring))
39 #define NETROOM() (ring_empty_count(&netoring))
41 #define TTYADD(c) if (!(SYNCHing||flushout)) { \
42 *ttyoring.supply = c; \
43 ring_supplied(&ttyoring, 1); \
45 #define TTYBYTES() (ring_full_count(&ttyoring))
46 #define TTYROOM() (ring_empty_count(&ttyoring))
48 /* Various modes */
49 #define MODE_LOCAL_CHARS(m) ((m)&(MODE_EDIT|MODE_TRAPSIG))
50 #define MODE_LOCAL_ECHO(m) ((m)&MODE_ECHO)
51 #define MODE_COMMAND_LINE(m) ((m)==-1)
53 #define CONTROL(x) ((x)&0x1f) /* CTRL(x) is not portable */