XkbKeyActionsPtr − Returns a pointer to the two-dimensional array of key actions associated with the key corresponding to keycode


XkbKeyActionPtr XkbKeyActionsPtr

(XkbDescPtr xkb, KeyCode keycode);


− xkb

Xkb description of interest

− keycode

keycode of interest


A key action defines the effect key presses and releases have on the internal state of the server. For example, the expected key action associated with pressing the Shift key is to set the Shift modifier. There is zero or one key action associated with each keysym bound to each key.

Just as the entire list of key symbols for the keyboard mapping is held in the syms field of the client map, the entire list of key actions for the keyboard mapping is held in the acts array of the server map. The total size of acts is specified by size_acts, and the number of entries is specified by num_acts.

The key_acts array, indexed by keycode, describes the actions associated with a key. The key_acts array has min_key_code unused entries at the start to allow direct indexing using a keycode. If a key_acts entry is zero, it means the key does not have any actions associated with it. If an entry is not zero, the entry represents an index into the acts field of the server map, much as the offset field of a KeySymMapRec structure is an index into the syms field of the client map.

The reason the acts field is a linear list of XkbActions is to reduce the memory consumption associated with a keymap. Because Xkb allows individual keys to have multiple shift levels and a different number of groups per key, a single two-dimensional array of KeySyms would potentially be very large and sparse. Instead, Xkb provides a small two-dimensional array of XkbActions for each key. To store all of these individual arrays, Xkb concatenates each array together in the acts field of the server map.

The key action structures consist only of fields of type char or unsigned char. This is done to optimize data transfer when the server sends bytes over the wire. If the fields are anything but bytes, the server has to sift through all of the actions and swap any nonbyte fields. Because they consist of nothing but bytes, it can just copy them out.

XkbKeyActionsPtr returns a pointer to the two-dimensional array of key actions associated with the key corresponding to keycode. Use XkbKeyActionsPtr only if the key actually has some actions associated with it, that is, XkbKeyNumActions (xkb, keycode) returns something greater than zero.


The KeySymMapRec structure is defined as follows:

#define XkbNumKbdGroups 4
#define XkbMaxKbdGroup (XkbNumKbdGroups-1)

typedef struct { /∗ map to keysyms for a single keycode
unsigned char kt_index[XkbNumKbdGroups]; /∗ key type index for
each group */
unsigned char group_info; /∗ # of groups and out of range group
handling */
unsigned char width; /∗ max # of shift levels for key */
unsigned short offset; /∗ index to keysym table in syms array
} XkbSymMapRec, *XkbSymMapPtr;



Open Source

Open License - On October 29, 2015 the Department of Education announced a proposed regulation to require that all copyrightable intellectual property created with grant funds have an open license. Openly licensed materials can be modified and redistributed without violating copyright laws.

Free Technology Academy - The FTA provides a virtual campus offering course modules on Free Software and Open Standards. Educational materials in the FTA are released under free licenses. FTA is constructed on a Free Software OS and utilizes Free Software and standards to deliver its services.

What is Linux - Linux is a computer operating system (OS) that is free and open-source software. The software that runs the computer and the source code used to create it are both available to you at no cost. Linux is used on games, watches, laptops, desktops and super computers. The capability to operate and create on these devices is available to you.

US Navy - The US Navy's most advanced warship is powered by Linux. The next generation warship is a guided missile destroyer. It uses Red Hat Enterprise Linux along with Fedora as its operating systems. The Navy also utilizes Linux to run it's drone fleet. Government use of open source continues to expand.

Free Office Software - The Libre Office Suite is available for Linux or Windows and incldues, Writer, the word processor, Calc, the spreadsheet application, Impress, the presentation engine, Draw, our drawing and flowcharting application, Base, our database and database frontend, and Math for editing mathematics.

Competitive Advantage - Goldman Sachs, IBM and countless large corporations are leveraging open source to reduce costs, develop products and increase their bottom lines. Learn what these companies think about open source and how open source can give you the competitive advantage.

Harvard - MIT - Stanford - The open edX platform delivers free online courses from Harvard, MIT, Columbia, UC Berkeley and other top Universities. Hundreds of courses are available and include almost all major subject areas and course levels. Paid courses and certifications are also available.

More Linux Commands

XCloseOM (3)         - open output methods
The XOpenOM function opens an output method matching the current locale and modifiers specification. The current locale and modifiers are bound to the output me...

git-fetch (1)        - Download objects and refs from another repository
Fetch branches and/or tags (collectively, refs) from one or more other repositories, along with the objects necessary to complete their histories. Remote-tracki...

pbmtopsg3 (1)        - convert PBM images to Postscript with G3 fax compression
This program is part of Netpbm(1) pbmtopsg3 converts the PBM images in the input PBM file to pages in a Postscript file encoded with G3 fax compression. If you...

pthread_attr_getstacksize (3) - set/get stack size attribute in thread attrib...
The pthread_attr_setstacksize() function sets the stack size attribute of the thread attributes object referred to by attr to the value specified in stacksize....

gnutls_kx_get (3)    - API function
Get currently used key exchange algorithm. RETURNS the key exchange algorithm used in the last handshake, a gnutls_kx_algorithm_t value. REPORTING BUGS Report b...

subs (3pm)           - Perl pragma to predeclare sub names
This will predeclare all the subroutine whose names are in the list, allowing you to use them without parentheses even before theyre declared. Unlike pragmas th...

git-merge-one-file (1) - The standard helper program to use with git-merge-index
This is the standard helper program to use with git merge-index to resolve a merge after the trivial merge done with git read-tree -m. GIT Part of the git(1) su...

version::Internals (3pm) - Perl extension for Version Objects
Overloaded version objects for all modern versions of Perl. This documents the internal data representation and underlying code for version.pm. See version.pod...

csin (3)             - complex sine function
The complex sine function is defined as: csin(z) = (exp(i * z) - exp(-i * z)) / (2 * i) VERSIONS These functions first appeared in glibc in version 2.1. CONFORM...

yuvdenoise (1)       - Motion-Compensating-YUV4MPEG2-frame-denoiser
yuvdenoise is a spatio-temporal noise-filter for YUV4MPEG2 streams. This is useful to reduce the bitrate needed to encode your captured movies for VCD and SVCD...

SDL_WM_SetIcon (3)   - Sets the icon for the display window
Sets the icon for the display window. Win32 icons must be 32x32. This function must be called before the first call to SDL_SetVideoMode. It takes an icon surfac...

vsftpd (8)           - Very Secure FTP Daemon
vsftpd is the Very Secure File Transfer Protocol Daemon. The server can be launched via a super-server such as inetd(8) or xinetd(8). Alternatively, vsftpd can...

XkbGetDeviceButtonActions (3) - Query the button actions associated with an X...
XkbGetDeviceButtonActions queries the server for the desired button information for the device indicated by the device_spec field of device_info and waits for a...

ifcfg-wireless (5)   - wireless LAN network interface configuration
Wireless networks need some additional configuration data compared to ethernet ones. Therefore additional variables for ifcfg files were introduced. Wireless......

ifplugd (8)          - A link detection daemon for ethernet devices
ifplugd is a daemon which will automatically configure your ethernet device when a cable is plugged in and automatically unconfigure it if the cable is pulled....