[an error occurred while processing this directive]

HP OpenVMS Systems Documentation

Content starts here HP DECwindows Motif for OpenVMS Alpha

HP DECwindows Motif
for OpenVMS Alpha
New Features


Previous Contents Index

2.6.2.1.2 Specifying an X Authority File

By default, the X authority file referenced by client applications and the xauth utility is defined as SYS$LOGIN:DECW$XAUTHORITY.DECW$XAUTH. You can override this default and specify an alternate X authority file in either of the following ways:

  • You can create alternate X authority files and switch between them using the DECW$XAUTHORITY logical. For example, the following command changes the X authority file in use for the current DECwindows Motif session to UNTRUSTED.DECW$AUTH:


    $  DEFINE DECW$XAUTHORITY SYS$MANAGER:[SYSMGR]UNTRUSTED.DECW$XAUTH
    

    The logical definition remains in use until it is redefined or an alternate value is specified using the SET DISPLAY/XAUTHORITY command.
  • If a display device is used to create a client connection to an X server, you can specify an alternate X authority file using the SET DISPLAY/CREATE/XAUTHORITY command. Note that the file specified on this command line overrides both the default and any file referenced by the DECW$XAUTHORITY logical.

2.6.2.2 Invoking xauth and Entering Commands

You can choose to enter commands interactively from DCL, or enter the utility and issue commands from the xauth command line.

Note that SYS$LOGIN:DECW$XAUTHORITY.DECW$XAUTH is the default X authority file. If you want to work with an alternate file, use the -f option on the command line to specify the filename, as follows:


$ XAUTH -f SYS$SYSROOT:[SYSMGR]UNTRUSTED.DECW$XAUTH
Using authority file SYS$SYSROOT:[SYSMGR]UNTRUSTED.DECW$XAUTH
xauth>

Tips and Shortcuts

  • If you are working with an X authority file other than the default, and plan to enter a series of commands, use the XAUTH -f command to enter the utility; then issue the subsequent commands from the utility command line. Otherwise, you will need to reenter the fully-qualified filename with each xauth command issued from the DCL command line.
  • When adding a file entry, you can specify a period (.) in place of the value MIT-MAGIC-COOKIE-1. The period is replaced by the name of the authentication protocol.

2.6.2.3 Accessing Online Help

To display a brief list of the available xauth commands or a summary of their function, issue either the XAUTH ? or XAUTH HELP command.

2.6.2.4 Creating an X Authority File

Use the XAUTH -f ADD command to manually create an X authority file. You must manually create an X authority file for the server when enabling authentication outside of a DECwindows Motif session. You can also choose to create additional user X authority files to store alternate authentication settings, such as for authorizing untrusted network connections.

An X authority file name can consist of any characters currently supported by OpenVMS Alpha; however, the file extension is restricted to a maximum of 37 characters and version numbers are not allowed.

The -f option specifies the name of the X authority file, and the ADD command creates the file by adding an entry. If you do not enter a fully-qualified filename, the new X authority file is written to the current directory by default.

For example, the following command creates a new X authority file UNTRUSTED.DECW$XAUTH to be used to authorize untrusted network connections:


$ XAUTH -f UNTRUSTED.DECW$XAUTH ADD :0 .
cfcc5ef98f9718f90154f355c0ae9f62

2.6.2.5 Displaying File Information

To assist with debugging file access and write issues, xauth includes a command that displays summary information about a particular X authority file. Use the XAUTH INFO command to display information about an X authority file, such as the current lock status and change history.

For example, the following command displays summary information about the X authority file UNTRUSTED.DECW$XAUTH:


$  XAUTH -f SYS$SYSROOT:[SYSMGR]UNTRUSTED.DECW$XAUTH INFO
Authority file:      SYS$SYSROOT:[SYSMGR]UNTRUSTED.DECW$XAUTH
File new:            no
File locked:         yes
Number of entries:   2
Changes honored:     yes
Changes made:        no
Current input:       command line

2.6.2.6 Viewing and Editing X Authority Entries

Each X authority file assumes the default protections of the account and directory in which it resides. If you have the appropriate privileges, you can view or edit the contents of an X authority file. To ensure the appropriate level of security, access to this file is typically limited to either the local SYSTEM account, the file owner, or both.

Note

When an X authority file is open for viewing or editing, one or more lock files are created by adding -L or -C to the file extension (such as, *.DECW$XAUTH-C). This renders the X authority file locked from further use. When the file is closed, the lock is subsequently removed, and the lock files deleted.

If a DECwindows Motif session is terminated abruptly, one or more locked files can remain. Use the XAUTH command with options -b or -i to either break or ignore the locks and gain access to the file.

Displaying File Entries

Use the XAUTH LIST command to display the contents of an X authority file. Entries are displayed in the order in which they were added to the file (most recent, last).

For example, the following XAUTH command displays the entries in the X authority file UNTRUSTED.DECW$XAUTH:


$  XAUTH -f UNTRUSTED.DECW$XAUTH LIST
local/ZEPHYR:0  MIT-MAGIC-COOKIE-1  cfcc5ef98f9718f90154f355c0ae9f62
decnet/ZEPHYR::0  MIT-MAGIC-COOKIE-1  cfcc5ef98f9718f90154f355c0ae9f62
116.94.24.187:0  MIT-MAGIC-COOKIE-1  cfcc5ef98f9718f90154f355c0ae9f62

Note

TCP/IP is considered the default transport for X authority file entries. As a result, the transport portion of the display name is assumed and not displayed for entries that use the TCP/IP transport.

To limit the list to entries related to a particular display, enter the display name at the end of the XAUTH LIST command, as follows:


$ XAUTH -f UNTRUSTED.DECW$XAUTH LIST ZEPHYR::0
decnet/ZEPHYR::0  MIT-MAGIC-COOKIE-1  cfcc5ef98f9718f90154f355c0ae9f62

Adding and Removing File Entries

Use the XAUTH ADD and XAUTH REMOVE commands to add entries to or delete entries from an X authority file.

If you have created a display device (using the SET DISPLAY command), you can specify the device name on the xauth command line to insert or remove entries related to the display device. Typically, the X authority file entry for a display device corresponds to the display server specified by the SET DISPLAY command. However, if the SET DISPLAY command specifies that a proxy server be used, the file entry pertains to that proxy server.

For example, the following X authority file has a single entry for the LOCAL transport on node ZEPHYR. To use the same authorization key for the DECnet transport and to specify that Kerberos be used when connecting to remote node HUBBUB, you could add the following entries to the X authority file UNTRUSTED.DECW$XAUTH:


$  XAUTH -f UNTRUSTED.DECW$XAUTH
Using authority file untrusted.decw$xauth
xauth>  LIST
local/ZEPHYR:0  MIT-MAGIC-COOKIE-1  cfcc5ef98f9718f90154f355c0ae9f62
xauth>  ADD ::0 . cfcc5ef98f9718f90154f355c0ae9f62
xauth>  ADD HUBBUB::0 MIT-KERBEROS-5 ""
xauth>  LIST
local/ZEPHYR:0  MIT-MAGIC-COOKIE-1  cfcc5ef98f9718f90154f355c0ae9f62
decnet/ZEPHYR::0  MIT-MAGIC-COOKIE-1  cfcc5ef98f9718f90154f355c0ae9f62
decnet/HUBBUB::0  MIT-KERBEROS-5
xauth> EXIT
Writing X authority file untrusted.decw$xauth

Client applications running on systems in the same cluster share a single X authority file. As a result, in cluster configurations, adding an entry for the DECnet transport to the local system grants client applications running on other nodes in the cluster access to that system.

To discontinue remote access to HUBBUB, you could use the XAUTH REMOVE command to remove the entry, as follows:


$  XAUTH -f UNTRUSTED.DECW$XAUTH
Using authority file untrusted.decw$xauth
xauth> REMOVE HUBBUB::0
1 entries removed
xauth> LIST
local/ZEPHYR:0  MIT-MAGIC-COOKIE-1  cfcc5ef98f9718f90154f355c0ae9f62
decnet/ZEPHYR::0  MIT-MAGIC-COOKIE-1  cfcc5ef98f9718f90154f355c0ae9f62
xauth> EXIT
Writing X authority file untrusted.decw$xauth

Copying Entries Between X Authority Files

Use one or more of the following XAUTH commands to copy entries for a particular display from one X authority file to another.

This enables you to use an existing entry to grant another user access to a particular display or to obtain access to a remote host from the current display device.

  • EXTRACT -- Creates a new X authority file whose entries match those in the original file.
  • MERGE -- Appends the contents of one file to another, replacing entries for the same display name or adding entries for different names.
  • NEXTRACT and NMERGE -- These commands are designed to be used with the PIPE command. NEXTRACT extracts file entries in a text format that can then be used as input for the NMERGE command.
    For example, the following command extracts the X authority file entry for the local transport from the file UNTRUSTED.DECW$XAUTH and adds it to a new X authority file NEW_XAUTHORITY.DECW$XAUTH:


    $  PIPE XAUTH -f UNTRUSTED.DECW$XAUTH NEXTRACT SYS$OUTPUT :0 | -
    _$ XAUTH -f NEW_XAUTHORITY.DECW$XAUTH NMERGE SYS$INPUT
    

These commands can also be used with the rsh command to copy entries from an X authority file on an OpenVMS host to an X authority file on a remote UNIX system. For example, the following command extracts the entry for TCP/IP access (TCPIP/0:0) and adds it to the current file for user SMITH on the remote Tru64 UNIX system FLOPSY:


$  PIPE XAUTH -f UNTRUSTED.DECW$XAUTH NEXTRACT - TCPIP/0:0 | -
_$ rsh/user=smith/password=secret flopsy "xauth nmerge -"

Note

When using the PIPE and XAUTH commands to pass information to a Tru64 UNIX host, you must press Ctrl/C to terminate the connection to the Tru64 UNIX host and return control to OpenVMS.

2.6.2.7 Generating Authorization Keys

When the SECURITY extension is enabled on an X display server, you can generate additional authorization keys. Generated keys enable you to further manage server access and control the type of operations performed over the connection. For example, you can revoke a generated key at will, set it to expire after a certain time period, or use it to further grant or restrict the operations (at the X atom level) that can be performed over the connection.

Use the XAUTH GENERATE command to produce a new authorization key. Note that the generated key overwrites any existing key for the current session. To preserve the existing key, specify an alternate X authority file on the XAUTH command line.

For example, the following commands specify the alternate X authority file UNTRUSTED.DECW$XAUTH, generate and display a new key for the local display, and write the generated key to the alternate file:


$  XAUTH -f UNTRUSTED.DECW$XAUTH
Using authority file untrusted.decw$xauth
xauth> LIST :0
local/ZEPHYR:0  MIT-MAGIC-COOKIE-1  cfcc5ef98f9718f90154f355c0ae9f62
xauth> GENERATE :0
xauth> LIST :0
local/ZEPHYR:0  MIT-MAGIC-COOKIE-1  cfcc4ff77f3709c46222c355f0ea1c93
xauth> EXIT
Writing X authority file untrusted.decw$xauth

2.6.3 X Keyboard Compiler Utility (xkbcomp)

V1.3

The Keyboard Compiler utility (xkbcomp) compiles X Keyboard source files into loadable X Keyboard layout (.XKM) files. Using xkbcomp, you can customize the standard layouts provided with the X Window System by creating or modifying the component source files.

To run this utility, define xkbcomp as a foreign command:


$ xkbcomp == "$SYS$SYSTEM:DECW$XKBCOMP"

The command format for xkbcomp is as follows:


$ xkbcomp [-options...] input-file [output-file]

Table 2-9 Keyboard Compiler Options
Option Description
-a Specifies that all user actions be displayed.
-C Creates a C header file during compilation.
-em1 message Prints the specified message before printing any informational or error messages.
-emp message Prints the specified message at the start of each line of messages.
-eml message Prints the specified message after any informational or error messages.
-dflts Specifies that the compiler generate default values for any missing parameters.
-I [ directory] Specifies the top level directory for include statements. A comma-separated list of multiple directories is allowed.
-l [ flags] Specifies that a list of matching keymap files be displayed, where flags can be one or more of the following options:
  • f: lists fully-specified filenames
  • h: lists hidden keymap files
  • l: generates a long list
  • p: lists partial keymap files
  • r: lists recursive subdirectories

The default of -l with no flags turns all options off.

-map keymap file Specifies the keymap file to compile.
-merge Merges the keymap file with the keymap currently residing on the server.
-o file Specifies the fully-qualified name of the compiled keymap (.XKM) file.
-optional parts Specifies optional components of a keymap file, where parts can be any combination of:
  • c: compatibility map
  • g: geometry
  • k: keycodes
  • s: symbols
  • t: types

Note that errors in specifying optional components are not fatal.

-R [ DIRECTORY] Specifies the directory in which the component source files are located.
-synch Forces keymap synchronization.
-w [ level] Sets the warning level for compiler errors, ranging from 0 (none) to all (10).
-xkb Generates an X keyboard (.XKB) source file.
-xkm Generates a compiled keymap (.XKM) file.

2.6.3.1 The X Keyboard Components Database

The X server maintains a database of keyboard components and common keyboard mappings. When combined, these components provide a complete description of a keyboard and its behavior.

The server loads the database from the compiled keymap file specified by the DECW$SERVER_XKEYBOARD_MAP parameter. This file is located in the directory defined by the DECW$SERVER_XKEYBOARD_COMPILED_DIR parameter. If the compiled keymap file does not exist, the server runs xkbcomp to compile the file from its component sources.

The following keyboard component source files comprise the database and are used to produce the loadable keymap files:

  • Keymap source files -- These are the upper-level source files that are specified as input files on the xkbcomp command line. These files are stored in the KEYMAP.DIGITAL subdirectory of the root directory specified by the DECW$SERVER_XKEYBOARD_DIRECTORY parameter. There is one keymap file for each supported language variant, for example:
    • DECW$SYSCOMMON:[SYS$KEYMAP.XKB.KEYMAP.DIGITAL]US
    • DECW$SYSCOMMON:[SYS$KEYMAP.XKB.KEYMAP.DIGITAL]JAPANESE

    The keymap source files reference the following component source files during the compilation to produce complete, loadable keymap (.XKM) file.
  • Keycode component source files -- These files specify the range and interpretation of the raw keycodes reported by the input device. They set the keycode symbolic names, the minimum and maximum legal keycodes for the keyboard, and the symbolic name for each key.
    The keycode files can also contain aliases for keys, symbolic names for indicators, and a description of which indicators are physically present.
    The keycode component source files are stored in the KEYCODES.DIGITAL subdirectory of the root directory specified by the DECW$SERVER_XKEYBOARD_DIRECTORY parameter, for example:
    • DECW$SYSCOMMON:[SYS$KEYMAP.XKB.KEYCODES.DIGITAL]LK
    • DECW$SYSCOMMON:[SYS$KEYMAP.XKB.KEYCODES.DIGITAL]PC
  • Types Source Files -- These files specify the layout types that can be associated with the various keyboard keys. They affect the types symbolic name and the list of layout types associated with the keyboard.
    The types component can also contain real modifier bindings and symbolic names for one or more virtual modifiers.
    These files are stored in the TYPES subdirectory under the root directory specified by the DECW$SERVER_XKEYBOARD_DIRECTORY parameter, for example:
    • DECW$SYSCOMMON:[SYS$KEYMAP.XKB.TYPES]BASIC
    • DECW$SYSCOMMON:[SYS$KEYMAP.XKB.TYPES]DEFAULT
  • Compatibility Map Source Files -- These files specify the rules used to assign actions to keyboard symbols (keysyms) based on the XKB capability (aware or unaware) between the client and server. The XKB capability is determined through the following compatibility transformations:
    • XKB extension state to core state
    • Core keyboard mapping to XKB keyboard mapping
    • XKB keyboard mapping to Core keyboard mapping

    The compatibility map component affects the compatibility symbolic name, the symbol compatibility map, and the group compatibility map. This component can also specify maps for indicators, as well as real modifier bindings and symbolic names of some virtual modifiers.
    The compatibility map source files are stored in the COMPAT subdirectory under the root directory specified by the DECW$SERVER_XKEYBOARD_DIRECTORY parameter, for example:
    • DECW$SYSCOMMON:[SYS$KEYMAP.XKB.COMPAT]BASIC
    • DECW$SYSCOMMON:[SYS$KEYMAP.XKB.COMPAT]DEFAULT
  • Symbols Source Files -- These files specify the symbols bound to each keyboard key. They affect the symbols symbolic name, a key symbol mapping for each key, the keyboard modifier mapping, and the symbolic names for the keyboard symbol groups. The symbols component can also contain explicit actions and behaviors for some keys, or the real modifier bindings and symbolic names for some virtual modifiers.
    The symbols source files are stored in the SYMBOLS and SYMBOLS.DIGITAL subdirectories under the root directory specified by the DECW$SERVER_XKEYBOARD_DIRECTORY parameter, for example:
    • DECW$SYSCOMMON:[SYS$KEYMAP.XKB.SYMBOLS]US
    • DECW$SYSCOMMON:[SYS$KEYMAP.XKB.SYMBOLS.DIGITAL]SWISS_FRENCH

  • Geometry Source Files -- These files define the geometry of the keyboard. They define the geometry symbolic name and the keyboard geometry description. The geometry component can also contain aliases for keys or symbolic names for indicators and might affect the set of indicators that are physically present. Key aliases defined in the geometry component of a keyboard mapping override those defined in the keycodes component.
    These files are stored in the GEOMETRY subdirectory under the root directory specified by the DECW$SERVER_XKEYBOARD_DIRECTORY parameter, for example:
    • DECW$SYSCOMMON: [SYS$KEYMAP.XKB.GEOMETRY.DIGITAL]LK
    • DECW$SYSCOMMON: [SYS$KEYMAP.XKB.GEOMETRY.DIGITAL]PC
  • Other Directories -- The SEMANTICS subdirectory of the base directory DECW$SERVER_XKEYBOARD_DIRECTORY contains a set of files that define the default semantics for keyboard types and compatibility components.
    Files in the base directory DECW$SERVER_XKEYBOARD_DIRECTORY and in subdirectories TMP and RULES are used by the server and should not be modified.

2.6.4 Window Dump to Print File (xpr) Utility

V1.2

The Window Dump to Print File utility prints an X Window dump using the xpr program.

The xpr program receives as input a window dump file produced by the Window Dump utility (xwd) and formats it for output on the following printers:

  • PostScript
  • DIGITAL LN03 or LA100
  • IBM PP3812 page printer
  • HP LaserJet (or other PCL printers)
  • HP PaintJet

To use the xpr program, define xpr as a user-defined command:


$ xpr == "$DECW$UTILS:XPR"

You must specify an input file. The xpr program prints the largest possible representation of the window on the output page. Options allow the user to add headers and trailers, specify margins, adjust the scale and orientation, and append multiple window dumps to a single output file.

Use the following command format:


$ xpr input_file [options...]

Options include:


    -append filename  -noff  -output filename
    -compact
    -device {ln03 | la100 | ps | lw | pp | ljet | pjet | pjetxl}
    -dump
    -gamma correction
    -gray {2 | 3 | 4}
    -height inches  -width inches
    -header string  -trailer string
    -landscape  -portrait
    -left inches  -top inches
    -noposition
    -nosixopt
    -plane n
    -psfig
    -render type
    -report
    -rv
    -scale scale
    -slide
    -split n-pages

Table 2-10 defines the available options.

Table 2-10 Window Dump to Print File Options
Option Description
-device devtype Specifies the device on which the file is printed.

Currently supported devices:

la100 DIGITAL LA100.
ln03 DIGITAL LN03.
ljet HP LaserJet series and other monochrome PCL devices such as ThinkJet, QuietJet, RuggedWriter, HP series, and HP-series printers.
pjet HP PaintJet (color mode).
pjetxl HP PaintJet XL Color Graphics Printer (color mode).
pp IBM PP3812.
ps PostScript printer.
lw LaserWriter is equivalent to -device ps and is provided only for backwards compatibility.

The default is PostScript.

-scale scale Affects the size of the window on the page. The PostScript, LN03, and HP printers can translate each bit in a window pixel map into a grid of a specified size. For example, each bit might translate into a 3x3 grid. This would be specified by -scale 3. By default, a window is printed with the largest scale that will fit onto the page for the specified orientation.
-height inches Specifies the maximum height of the page.
-width inches Specifies the maximum width of the page.
-left inches Specifies the left margin in inches. Fractions are allowed. By default the window is centered in the page.
-top inches Specifies the top margin for the picture in inches. Fractions are allowed.
-header string Specifies a header string to be printed above the window.
-trailer string Specifies a trailer string to be printed below the window.
-landscape Forces the window to be printed in landscape mode. By default, a window is printed so that its longest side follows the long side of the paper.
-portrait Forces the window to be printed in portrait mode. By default a window is printed so that its longest side follows the long side of the paper.
-plane number Specifies which bit plane to use in an image. The default is to use the entire image and map values into black and white based on color intensities.
-gray Uses a 2x2, 3x3, or 4x4 gray scale conversion on a color image, rather than mapping to strictly black and white. This doubles, triples, or quadruples the effective width and height of the image.
-rv Forces the window to print in reverse video.
-compact Uses run-length encoding for compact representation of windows with white pixels.
-output filename Specifies an output file name.
-append filename Specifies a file name previously produced by xpr to which the window is to be appended.
-noff When specified in conjunction with -append, the window appears on the same page as the previous window.
-split n-pages Allows the user to split a window onto several pages. This might be necessary for very large windows that would otherwise cause the printer to overload and print the page in an obscure manner.
-psfig Suppresses translation of the PostScript picture to the center of the page.
-density dpi Indicates dot-per-inch density to be used by the HP printer.
-cutoff level Changes the intensity level where colors are mapped to either black or white for monochrome output on a LaserJet printer. The level is expressed as percentage of full brightness. Fractions are allowed.
-noposition Causes header, trailer, and image positioning command generation to be bypassed for LaserJet, PaintJet and PaintJet XL printers.
-gamma correction Changes the intensity of the colors printed by the PaintJet XL printer. The correction is a floating-point value in the range 0.00 to 3.00. Consult the operator's manual to determine the correct value for the specific printer.
-render algorithm Allows the PaintJet XL printer to render the image with the best quality versus performance tradeoff. Consult the operator's manual to determine the available algorithms.
-slide filename Allows overhead transparencies to be printed using the PaintJet and PaintJet XL printers.


Previous Next Contents Index