Skip to main content

Understanding Escape Codes and Control Sequences

The exact term of escape code defined in ISO 6429 is a control function. Escape code is commonly used to refer to the code or sequence that represents control functions. Control codes defined by ISO 6429 are divided into two categories; C0 codes and C1 codes.

C0 codes correspond to non-printing characters in ASCII. These codes are familiar to developers. It includes line feed (\n), carriage return (\r), tab (\t), and null character (\0).

There are 32 codes in C1. They are represented by one-byte values between 0x80 and 0x9F. Unlike C0 codes, C1 codes are not defined in ASCII. They can only be used in terminals that support ASCII. In other words, they are available in 7-bit environments. In modern 8-bit environments, C1 codes cannot be used directly and must be expressed as escape sequences. Therefore, most modern terminals use escape sequences to represent C1 codes when needed.

An escape sequence is a series of characters that begins with ESC (0x1B). Sequences that correspond to C1 codes consist of a first byte of ESC (0x1B) and a second byte from @ (0x40) to _ (0x5F). For example, in a 7-bit environment, IND is represented by 0x84, but in an 8-bit environment, it is represented by ESC D (0x1B 0x44). This second byte is called the "Final character of Escape sequence," or "Fe," and two-byte C1 codes are also referred to as "Fe sequences."

In addition to Fe sequences, ISO 6429 defines other escape sequences. For example, values between `(0x60) and ~(0x7E) are called "Fs," and sequences of ESC and Fs are called "Fs sequences." Unlike C1 codes, Fs sequences are always expressed as escape sequences, regardless of the environment; they are called "independent control functions."

Fe sequences and Fs sequences mostly provide commands for controlling terminal devices. As a result, they are rarely used in modern terminal emulators. Instead, control sequences that begin with CSI (Control Sequence Introducer) are mainly used.

CSI is a value defined in the C1 control code. In a 7-bit environment, it is represented by 0x9B; in an 8-bit environment, CSI is represented by ESC [ (0x1B 0x5B). A series of sequences from CSI to byte between @ (0x40) and ~ (0x7E) are called "control sequences," and they can adjust various aspects of terminals, such as font, color, and cursor position. We will discuss this in more detail in the next article.

Comments

Popular posts from this blog

[C++] Handling Exceptions in Constructors

When you use RAII idiom, there are often situations where constructors have to do complex tasks. These complex tasks can sometimes fail, resulting in throwing exceptions. This raises a concern: Is it okay to throw exceptions in constructors? The first concern is memory leaks. Fortunately, memory leaks do not occur. Variables created on the stack are released through stack unwinding, and if an exception occurs during heap allocation with the new operator, the new operator automatically deallocates the memory and returns nullptr . The next concern is whether the destructor of the member variables will be called correctly. However, this is also not a problem. When an exception occurs, member variables can be divided into three categories: fully initialized member variables, member variables being initialized, and uninitialized member variables. Fully initialized member variables have had their constructors called and memory allocations completed successfully. In the example code, t

Iterator Adapters in Rust

An Iterator that takes another iterator and returns a new one is called an iterator adapter . The name "adapter" comes from one of the GoF's design patterns, the adapter pattern . However, in reality, it corresponds more to the decorator pattern , so if you pay too much attention to the name, you might get confused about its purpose. So it's better not to worry too much about the name. Enough complaining about the name, what does an iterator adapter do? An iterator adapter adds a task to be performed when the iterator iterates. This will be easier to understand when you see an example. The map function is one of the famous adapters. The iterator returned by the map function for those who have used functional languages iterates over new values transformed from the original values. Besides, various adapters are already implemented in the standard library. Among them, the most frequently used are those that are convenient to use with loops. Examples include the

Difference Between the clear Command in Linux and Mac

I've been writing a series of posts about CSI Sequences, but we rarely use CSI Sequences directly. However, there is a CSI Sequence that we use unknowingly. It's the clear command that clears the screen. The clear command basically uses two types of CSI sequences. One is CSI H ( Cu rsor P osition, a.k.a CUP); it moves the cursor to the beginning of the screen. The cursor is at the top-left corner after the command ends, thanks to CUP. The second CSI Sequence is CSI 2 J ( E rase in D isplay, a.k.a. ED), which is used to clear the entire screen. Linux and Mac use these two sequences; they behave the same way up to this point. However, Linux's clear and Mac's differ in their subsequent actions. In a nutshell, Linux's clear clears the scrollback buffer, while Mac's does not. Linux's one prints CSI 3 J after the two sequences. CSI 3 J is an extension of the Escape Sequence introduced by xterm that removes lines stored in the scrollback buffer. Since be