IsCursorKey, IsFunctionKey, IsKeypadKey, IsMiscFunctionKey, IsModifierKey, IsPFKey, IsPrivateKeypadKey − keysym classification macros


int IsCursorKey(KeySym keysym);

int IsFunctionKey(KeySym keysym);

int IsKeypadKey(KeySym keysym);

int IsMiscFunctionKey(KeySym keysym);

int IsModifierKey(KeySym keysym);

int IsPFKey(KeySym keysym);

int IsPrivateKeypadKey(KeySym keysym);



Specifies the KeySym that is to be tested.


The IsCursorKey macro returns True if the specified KeySym is a cursor key.

The IsFunctionKey macro returns True if the KeySym is a function key.

The IsKeypadKey macro returns True if the specified KeySym is a keypad key.

The IsMiscFunctionKey macro returns True if the specified KeySym is a miscellaneous function key.

The IsModifierKey macro returns True if the specified KeySym is a modifier key.

The IsPFKey macro returns True if the specified KeySym is a PF key.

The IsPrivateKeypadKey macro returns True if the specified KeySym is a vendor-private keypad key.


AllPlanes(3), BlackPixelOfScreen(3), ImageByteOrder(3)
Xlib − C Language X Interface

More Linux Commands

audit_encode_nv_string(3) - encode a name/value pair in a st
This function is used to encode a name/value pair. This should be used on any field being logged that potentially contains a space, a double-quote, or a control

gnutls_anon_free_client_credentials(3) - API function.......
gnutls_anon_free_client_credentials.3 - This structure is complex enough to manipulate directly thus this helper function is provided in order to free (dealloca

sysctl(2) - read/write system parameters - Linux man page...
Do not use this system call! See NOTES. The _sysctl() call reads and/or writes kernel parameters. For example, the hostname, or the maximum number of open files

gcjh(1) - - generate header files from Java class files.....
The gcjh program is used to generate header files from class files. It can generate both CNI and JNI header files, as well as stub implementation files which ca

hexdump(1) - display file contents in ascii, decimal, hexade
The hexdump utility is a filter which displays the specified files, or standard input if no files are specified, in a user-specified format. OPTIONS Below, the

ldap_objectclass2name(3) - Schema definition handling routin
These routines are used to parse schema definitions in the syntax defined in RFC 4512 into structs and handle these structs. These routines handle four kinds of

XpGetImageResolution(3x) - Gets the current image resolution
XpGetImageResolution returns the current image resolution for the specified print context. A value of zero means the resolution automatically tracks the printer

colrm(1) - remove columns from a file - Linux manual page...
colrm removes selected columns from a file. Input is taken from standard input. Output is sent to standard output. If called with one parameter the columns of e

vgcfgrestore(8) - restore volume group descriptor area......
vgcfgrestore allows you to restore the metadata of VolumeGroupName from a text backup file produced by vgcfgbackup. You can specify a backup file with --file. I

su(1) - run a shell with substitute user and group IDs......
su allows to run commands with a substitute user and group ID. When called without arguments, su defaults to running an interactive shell as root. For backward

hdestroy(3) - hash table management - Linux manual page.....
The three functions hcreate(), hsearch(), and hdestroy() allow the caller to create and manage a hash search table containing entries consisting of a key (a str

keyctl_instantiate_iov(3) - Instantiate a key from segmented
keyctl_assume_authority() assumes the authority for the calling thread to deal with and instantiate the specified uninstantiated key. The calling thread must ha

We can't live, work or learn in freedom unless the software we use is free.