IsCursorKey
NAMESYNTAX
ARGUMENTS
DESCRIPTION
SEE ALSO
NAME
IsCursorKey, IsFunctionKey, IsKeypadKey, IsMiscFunctionKey, IsModifierKey, IsPFKey, IsPrivateKeypadKey − keysym classification macros
SYNTAX
int IsCursorKey(KeySym keysym);
int IsFunctionKey(KeySym keysym);
int IsKeypadKey(KeySym keysym);
int IsMiscFunctionKey(KeySym keysym);
int IsModifierKey(KeySym keysym);
int IsPFKey(KeySym keysym);
int IsPrivateKeypadKey(KeySym keysym);
ARGUMENTS
keysym |
Specifies the KeySym that is to be tested. |
DESCRIPTION
The IsCursorKey macro returns True if the specified KeySym is a cursor key.
The IsFunctionKey macro returns True if the KeySym is a function key.
The IsKeypadKey macro returns True if the specified KeySym is a keypad key.
The IsMiscFunctionKey macro returns True if the specified KeySym is a miscellaneous function key.
The IsModifierKey macro returns True if the specified KeySym is a modifier key.
The IsPFKey macro returns True if the specified KeySym is a PF key.
The IsPrivateKeypadKey macro returns True if the specified KeySym is a vendor-private keypad key.
SEE ALSO
AllPlanes(3),
BlackPixelOfScreen(3), ImageByteOrder(3)
Xlib − C Language X Interface
More Linux Commands
manpages/audit_encode_nv_string.3.html
audit_encode_nv_string(3) - encode a name/value pair in a st
This function is used to encode a name/value pair. This should be used on any field being logged that potentially contains a space, a double-quote, or a control
manpages/gnutls_anon_free_client_credentials.3.html
gnutls_anon_free_client_credentials(3) - API function.......
gnutls_anon_free_client_credentials.3 - This structure is complex enough to manipulate directly thus this helper function is provided in order to free (dealloca
manpages/sysctl.2.html
sysctl(2) - read/write system parameters - Linux man page...
Do not use this system call! See NOTES. The _sysctl() call reads and/or writes kernel parameters. For example, the hostname, or the maximum number of open files
manpages/gcjh.1.html
gcjh(1) - - generate header files from Java class files.....
The gcjh program is used to generate header files from class files. It can generate both CNI and JNI header files, as well as stub implementation files which ca
manpages/hexdump.1.html
hexdump(1) - display file contents in ascii, decimal, hexade
The hexdump utility is a filter which displays the specified files, or standard input if no files are specified, in a user-specified format. OPTIONS Below, the
manpages/ldap_objectclass2name.3.html
ldap_objectclass2name(3) - Schema definition handling routin
These routines are used to parse schema definitions in the syntax defined in RFC 4512 into structs and handle these structs. These routines handle four kinds of
manpages/XpGetImageResolution.3x.html
XpGetImageResolution(3x) - Gets the current image resolution
XpGetImageResolution returns the current image resolution for the specified print context. A value of zero means the resolution automatically tracks the printer
manpages/colrm.1.html
colrm(1) - remove columns from a file - Linux manual page...
colrm removes selected columns from a file. Input is taken from standard input. Output is sent to standard output. If called with one parameter the columns of e
manpages/vgcfgrestore.8.html
vgcfgrestore(8) - restore volume group descriptor area......
vgcfgrestore allows you to restore the metadata of VolumeGroupName from a text backup file produced by vgcfgbackup. You can specify a backup file with --file. I
manpages/su.1.html
su(1) - run a shell with substitute user and group IDs......
su allows to run commands with a substitute user and group ID. When called without arguments, su defaults to running an interactive shell as root. For backward
manpages/hdestroy.3.html
hdestroy(3) - hash table management - Linux manual page.....
The three functions hcreate(), hsearch(), and hdestroy() allow the caller to create and manage a hash search table containing entries consisting of a key (a str
manpages/keyctl_instantiate_iov.3.html
keyctl_instantiate_iov(3) - Instantiate a key from segmented
keyctl_assume_authority() assumes the authority for the calling thread to deal with and instantiate the specified uninstantiated key. The calling thread must ha
