C Curses, programowanie, c++, Curses
[ Pobierz całość w formacie PDF ]
OS/390
IBM
C Curses
SC28-1907-01
OS/390
IBM
C Curses
SC28-1907-01
Note!
Before using this information and the product it supports, be sure to read the general information under “Notices” on page ix.
|
Second Edition (September 1997)
| This edition applies to OS/390 Version 2 Release 4 (5647-A01) and to all subsequent releases and modifications until otherwise
| indicated in new editions.
Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the
address given below.
IBM welcomes your comments. A form for your comments appears at the back of this publication. If the form has been removed,
address your comments to:
International Business Machines Corporation
Department 55JA, Mail Station P384
522 South Road
Poughkeepsie, N.Y. 12601-5400
United States of America
FAX (United States & Canada): 914+432-9405
FAX (Other Countries):
Your International Access Code +1+914+432-9405
IBMLink (United States customers only): KGNVMC(MHVRCFS)
IBM Mail Exchange: USIBTC9 at IBMMAIL
Internet: mhvrcfs@vnet.ibm.com
If you would like a reply, be sure to include your name, address, telephone number, or fax number. Make sure to include the
following in your comment or note:
Title and order number of this book
Page number or topic related to your comment.
When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes
appropriate without incurring any obligation to you.
The information contained in the glossary section and tagged by the word [POSIX] is copyrighted information of the Institute of
Electrical and Electronics Engineers, Inc., extracted from IEEE Std 1003.1-1990, IEEE P1003.0, and IEEE P1003.2. This information
was written within the context of these documents in their entirety. The IEEE takes no responsibility or liability for and will assume
no liability for any damages resulting from the reader's misinterpretation of said information resulting from the placement and context
in this publication. Information is reproduced with the permission of the IEEE.
Ò
Copyright International Business Machines Corporation 1996, 1997. All rights reserved.
Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to
restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
Contents
Notices
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ix
Trademarks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ix
About This Book
....................................
xi
Typographical Conventions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xi
Other Documents
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xii
A Task-Oriented Guide to OS/390 OpenEdition Information
...........
xiii
Getting a Basic Understanding
..........................
xiii
Administration
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xiv
Using the Shell and Utilities or Hierarchical File System
............
xiv
Application Programming: Standards
.......................
xiv
Designing and Coding Programs
.........................
xiv
Compiling and Running Programs
........................
xiv
Debugging Programs
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xv
Diagnosing Problems
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xv
Non-IBM Books
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xv
Standards Supported
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xv
Application Programming Environments Not Supported
............
xv
Summary of Changes
.................................
xvi
Chapter 1. The Curses Library
...........................
1
Terminology
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2
Naming Conventions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2
Structure of a Curses Program
...........................
3
Initializing Curses
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3
Windows in the Curses Environment
.........................
4
The Default Window Structure
............................
5
The Current Window Structure
...........................
5
Subwindows
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5
Pads
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6
Manipulating Window Data with Curses
........................
7
Creating Windows
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7
Subwindows
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7
Pads
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7
Removing Windows, Pads, and Subwindows
...................
7
Changing the Screen or Window Images
.....................
7
Refreshing Windows
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8
Functions Used for Refreshing Pads
........................
8
Refreshing Areas that Have Not Changed
.....................
8
Garbled Displays
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8
Manipulating Window Content
............................
9
Support for Filters
...................................
9
Controlling the Cursor
..................................
9
Manipulating Characters with Curses
........................
10
Adding Characters to the Screen Image
.....................
10
waddch Functions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
10
waddstr Functions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12
winsch Functions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12
winsertln Functions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12
wprintw Functions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12
Ò
Copyright IBM Corp. 1996, 1997
iii
[ Pobierz całość w formacie PDF ]
zanotowane.pl doc.pisz.pl pdf.pisz.pl lemansa.htw.pl
OS/390
IBM
C Curses
SC28-1907-01
OS/390
IBM
C Curses
SC28-1907-01
Note!
Before using this information and the product it supports, be sure to read the general information under “Notices” on page ix.
|
Second Edition (September 1997)
| This edition applies to OS/390 Version 2 Release 4 (5647-A01) and to all subsequent releases and modifications until otherwise
| indicated in new editions.
Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the
address given below.
IBM welcomes your comments. A form for your comments appears at the back of this publication. If the form has been removed,
address your comments to:
International Business Machines Corporation
Department 55JA, Mail Station P384
522 South Road
Poughkeepsie, N.Y. 12601-5400
United States of America
FAX (United States & Canada): 914+432-9405
FAX (Other Countries):
Your International Access Code +1+914+432-9405
IBMLink (United States customers only): KGNVMC(MHVRCFS)
IBM Mail Exchange: USIBTC9 at IBMMAIL
Internet: mhvrcfs@vnet.ibm.com
If you would like a reply, be sure to include your name, address, telephone number, or fax number. Make sure to include the
following in your comment or note:
Title and order number of this book
Page number or topic related to your comment.
When you send information to IBM, you grant IBM a nonexclusive right to use or distribute the information in any way it believes
appropriate without incurring any obligation to you.
The information contained in the glossary section and tagged by the word [POSIX] is copyrighted information of the Institute of
Electrical and Electronics Engineers, Inc., extracted from IEEE Std 1003.1-1990, IEEE P1003.0, and IEEE P1003.2. This information
was written within the context of these documents in their entirety. The IEEE takes no responsibility or liability for and will assume
no liability for any damages resulting from the reader's misinterpretation of said information resulting from the placement and context
in this publication. Information is reproduced with the permission of the IEEE.
Ò
Copyright International Business Machines Corporation 1996, 1997. All rights reserved.
Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to
restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
Contents
Notices
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ix
Trademarks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
ix
About This Book
....................................
xi
Typographical Conventions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xi
Other Documents
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xii
A Task-Oriented Guide to OS/390 OpenEdition Information
...........
xiii
Getting a Basic Understanding
..........................
xiii
Administration
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xiv
Using the Shell and Utilities or Hierarchical File System
............
xiv
Application Programming: Standards
.......................
xiv
Designing and Coding Programs
.........................
xiv
Compiling and Running Programs
........................
xiv
Debugging Programs
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xv
Diagnosing Problems
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xv
Non-IBM Books
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xv
Standards Supported
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xv
Application Programming Environments Not Supported
............
xv
Summary of Changes
.................................
xvi
Chapter 1. The Curses Library
...........................
1
Terminology
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2
Naming Conventions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2
Structure of a Curses Program
...........................
3
Initializing Curses
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3
Windows in the Curses Environment
.........................
4
The Default Window Structure
............................
5
The Current Window Structure
...........................
5
Subwindows
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5
Pads
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6
Manipulating Window Data with Curses
........................
7
Creating Windows
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7
Subwindows
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7
Pads
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
7
Removing Windows, Pads, and Subwindows
...................
7
Changing the Screen or Window Images
.....................
7
Refreshing Windows
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8
Functions Used for Refreshing Pads
........................
8
Refreshing Areas that Have Not Changed
.....................
8
Garbled Displays
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8
Manipulating Window Content
............................
9
Support for Filters
...................................
9
Controlling the Cursor
..................................
9
Manipulating Characters with Curses
........................
10
Adding Characters to the Screen Image
.....................
10
waddch Functions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
10
waddstr Functions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12
winsch Functions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12
winsertln Functions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12
wprintw Functions
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
12
Ò
Copyright IBM Corp. 1996, 1997
iii
[ Pobierz całość w formacie PDF ]