Direct Input 7 Keyboard Class

Environment: Win9x, Windows NT/2000, DirectX Installed

Introduction

DirectInput is essential for responsive games, therefore to help ease the transition of DOS games programmers, you can use this class to read the keyboard direct trapping input before Windows starts performing it translation functions. 

To use the class, define a global variable :-

CDIKeyboard myKeyboard;

You will have to supply the HWND for the parent window under which you wish to take Keyboard Control.

The class has the following public methods:-

  • CDIKeyboard.SetHWND(HWND)
    
    Set the windows handle to which Direct Input Will be attached to. Must be the Parent Window.
  •  

  • void CDIKeyboard.SetHWND(CWnd*)
    

    Set the windows handle to which Direct Input Will be attached to. Must be the Parent Window. MFC Version.
    CDIKeyboard mkbrd;
    mkbrd.SetHWND(this);
    
  •  

  • bool CDIKeyboard.PollDevice(void)
    

    Obtain and update the keyboard state information.
  •  

  • bool CDIKeyboard.IsKeyPressed(unsigned char)
    

    returns true if a DIK_KEY is pressed, false if not. Example:
    mkbrd.IsKeyPressed(DIK_F1);
    
  •  

  • bool CDIKeyboard.Acquire(bool state)
    

    Acquire/Unacquire the Keyboard Device.  You will need to Unacquire the device if you want Windows to handle WM_CHAR, WM_KEYUP, WM_KEYDOWN messages.

    state=true To Acquire
    state=false To UnAcquire

    Returns : true=Operation Successful, false=Operation unsuccessful

Before obtaining keyboard state information you will need to set the HWND of the parent window of your application.  Use PollDevice method before checking the Keyboard state information and IsKeyPressed(key) method to check a particular key has been pressed.

The following code snippet can be used to show which keys have been pressed

bool m_bInput;
myKeyboard.PollDevice();
	
m_bInput=myKeyboard.IsKeyPressed(DIK_F1)?true:false;

Downloads

Download base source project - 4 Kb
Download source - 2 Kb


Comments

  • 굿잡

    Posted by Legacy on 09/24/2003 12:00am

    Originally posted by: gogo

    ...

    Reply
  • go raibh a mile maith agat

    Posted by Legacy on 08/14/2002 12:00am

    Originally posted by: Elaine

    Thanks....I was going spare with this before hand

    Reply
  • appreciados

    Posted by Legacy on 10/06/2001 12:00am

    Originally posted by: d.martin

    thank you for sharing your time and wealth of knowledge.............

    • help!!!!!!!!!!!!

      Posted by bahar on 08/16/2004 03:58am

      I wanna to implement DirectInput rof keyboard in my project. I have read this article and downloaded the tow filws. Now I do not no what is the next step?! I added files to a Dialog Based project. but compiling it resulted in many errors. I do not know where I must use these files. Can u plz help me? thanx

      Reply
    • help!!!!!!!!!!!

      Posted by bahar on 08/16/2004 03:56am

      I wanna to implement DirectInput rof keyboard in my project. I have read this article and downloaded the tow filws. Now I do not no what is the next step?! I added files to a Dialog Based project. but compiling it resulted in many errors. I do not know where I must use these files. Can u plz help me? thanx

      Reply
    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Wednesday, September 24, 2014 8:00 AM - 9:00 AM PDT According to a recent Forrester Research report, many companies are choosing low-code platforms over traditional programming platforms, due to the speed with which low-code apps can be assembled and tested. With customer-facing applications on the rise, traditional programming platforms simply can't keep up with the "short schedules and rapid change cycles" required to develop these applications. Check out this upcoming webinar and join Clay Richardson from …

  • For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. Neustar's survey reveals evidence that the DDoS attack landscape is changing. The number of companies attacked is up, but attack duration is down. Larger attacks are more common, but most attacks are still less than 1 Gbps. More than half of attacked companies reported theft of funds, data or intellectual property. Read the full report to learn how DDoS attacks have evolved in both strategy …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds