Network Working Group Robert W. Scheifler Request for Comments: 1013 June 1987 X WINDOW SYSTEM PROTOCOL, VERSION 11 Alpha Update April 1987 Copyright (c) 1986, 1987 Massachusetts Institute of Technology X Window System is a trademark of M.I.T. Status of this Memo This RFC is distributed to the Internet community for information only. It does not establish an Internet standard. The X window system has been widely reviewed and tested. The internet community is encouraged to experiment with it. Distribution of this memo is unlimited (see copyright notice on page 2).
Permission to use, copy, modify, and distribute this document for any purpose and without fee is hereby granted, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice are retained, and that the name of M.I.T. not be used in advertising or publicity pertaining to this document without specific, written prior permission. M.I.T. makes no representations about the suitability of this document or the protocol defined in this document for any purpose. It is provided "as is" without express or implied warranty. Author: Robert W. Scheifler Laboratory for Computer Science 545 Technology Square, Room 418 Cambridge, MA 02139 Contributors: Dave Carver (Digital HPW) Branko Gerovac (Digital HPW) Jim Gettys (MIT/Project Athena, Digital) Phil Karlton (Digital WSL) Scott McGregor (Digital SSG) Ram Rao (Digital UEG) David Rosenthal (Sun) Dave Winchell (Digital UEG) Implementors of initial server who provided useful input: Susan Angebranndt (Digital) Raymond Drewry (Digital) Todd Newman (Digital) Invited reviewers who provided useful input: Andrew Cherenson (Berkeley) Burns Fisher (Digital) Dan Garfinkel (HP) Leo Hourvitz (Next) Brock Krizan (HP) David Laidlaw (Stellar) Dave Mellinger (Interleaf) Ron Newman (MIT) John Ousterhout (Berkeley) Andrew Palay (ITC CMU) Ralph Swick (MIT) Craig Taylor (Sun) Jeffery Vroom (Stellar) This document does not attempt to provide the rationale or pragmatics required to fully understand the protocol or to place it in perspective within a complete system. Knowledge of X Version 10 will certainly aid in understanding this document.
The protocol contains many management mechanisms that are not intended for normal applications. Not all mechanisms are needed to build a particular user interface. It is important to keep in mind that the protocol is intended to provide mechanism, not policy. This document does not attempt to define precise formats or bit encodings. -------------------------------------------------------------------
SECTION 1. TERMINOLOGY Access control list X maintains a list of hosts from which client programs may be run. By default, only programs on the local host may use the display, plus any hosts specified in an initial list read by the server. This "access control list" can be changed by clients on the local host. Some server implementations may also implement other authorization mechanisms. Active grab A grab is "active" when the pointer or keyboard is actually owned by the single grabbing client. Ancestors If W is an inferior of A, then A is an "ancestor" of W. Atom An "atom" is a unique id corresponding to a string name. Atoms are used to identify properties, types, and selections. Backing store When a server maintains the contents of a window, the off-screen saved pixels are known as a "backing store". Bit gravity When a window is resized, the contents of the window are not necessarily discarded. It is possible to request the server (though no guarantees are made) to relocate the previous contents to some region of the window. This attraction of window contents for some location of a window is known as "bit gravity". Bitmap A "bitmap" is a pixmap of depth one. Button grabbing Buttons on the pointer may be passively "grabbed" by a client. When the button is pressed, the pointer is then actively grabbed by the client. Byte order For image (pixmap/bitmap) data, byte order is defined by the server, and clients with different native byte ordering must swap bytes as necessary. For all other parts of the protocol, the byte order is defined by the client, and the server swaps bytes as necessary. Children The "children" of a window are its first-level subwindows.
Client An application program connects to the window system server by some interprocess communication (IPC) path, such as a TCP connection or a shared memory buffer. This program is the window system server. More precisely, the client is the IPC path itself; a program with multiple paths open to the server is viewed as multiple clients by the protocol. Resource lifetimes are controlled by connection lifetimes, not by program lifetimes. Clipping regions In a graphics context, a bitmap or list of rectangles can be specified to restrict output to a particular region of the window. The image defined by the bitmap or rectangles is called a "clipping region". Color cell An entry in a colormap is known as a "color cell". An entry contains three values specifying red, green and blue intensities. These values are always viewed as 16 bit unsigned numbers, with zero being minimum intensity. The values are scaled by the server to match the display hardware. The components of a cell are coincident with components of other cells in DirectColor and TrueColor colormaps. Colormap A "colormap" consists of a set of color cells. A pixel value indexes the color map to produce intensities to be displayed. Depending on hardware limitations, one or more colormaps may be installed at one time, such that windows associated with those maps display with true colors. Connection The IPC path between the server and client program is known as a "connection". A client program typically (but not necessarily) has one connection to the server over which requests and events are sent. Containment A window "contains" the pointer if the window is viewable and the hotspot of the cursor is within a visible region of the window or a visible region of one of its inferiors. The border of the window is included as part of the window for containment. The pointer is "in" a window if the window contains the pointer but no inferior contains the pointer. Coordinate system The coordinate system has X horizontal and Y vertical, with the origin [0, 0] at the upper left. Coordinates are discrete, and in terms of pixels. Each window and pixmap has
its own coordinate system. For a window, the origin is at the inside upper left, inside the border. Cursor A "cursor" is the visible shape of the pointer on a screen. It consist of a hot spot, a source bitmap, a shape bitmap, and a pair of colors. The cursor defined for a window controls the visible appearance when the pinter is in that window. Depth The "depth" of a window or pixmap is number of bits per pixel it has. The depth of a gcontext is the depth of the root of the gcontext. Device Keyboards, mice, tablets, track-balls, button boxes, etc. are all collectively known as input "devices". The core protocol only deals with two devices, "the keyboard" and "the pointer". Drawable Both windows and pixmaps may be used as sources and destinations in graphics operations. These are collectively known as "drawables". However, an InputOnly window cannot be used as a source or destination in a graphics operation. Event Clients are informed of information asynchronously via "events". These events may be either asynchronously generated from devices, or generated as side effects of client requests. Events are grouped into types; events are never sent to a client by the server unless the client has specificially asked to be informed of that type of event, but other clients can force events to be sent to other clients. Events are typically reported relative to a window. Event mask Events are requested relative to a window. The set of event types a client requests relative to a window described using an "event mask". Event sychronization There are certain race conditions possible when demultiplexing device events to clients (in particular deciding where pointer and keyboard events should be sent when in the middle of window management operations). The event synchronization mechanism allows synchronous processing of device events.
Event propagation Device-related events "propagate" from the source window to ancestor windows until some client has expressed interest in handling that type of event, or until the event is discarded explicitly. Event source The smallest window containing the pointer is the "source" of a device related event. Exposure event Servers do not guarantee to preserve the contents of windows when windows are obscured or reconfigur contents of regions of windows have been lost. Extension Named "extensions" to the core protocol can be defined to extend the system. Extension to output requests, resources, and event types are all possible, and expected. Font A "font" is an array of glyphs (typically characters). The protocol does no translation or interpretation of character sets. The client simply indicates values used to index the glyph array. A font contains additional metric information to determine inter-glyph and inter-line spacing. Glyph A "glyph" is an image, typically of a character, in a font. Grab Keyboard keys, the keyboard, pointer buttons, the pointer, and the server can be "grabbed" for exclusive use by a client. In general, these facilities are not intended to be used by normal applications, but are intended for various input and window managers to implement various styles of user interfaces. Graphics context Various information for graphics output is stored in "GC"'s, such as foreground pixel, background pixel, line width, clipping region, etc. Hotspot A cursor has an associated "hot spot" which defines a point in the cursor that corresponds to the coordinates reported for the pointer. Identifier Each resource has an "identifier", a unique value associated with it that clients use to name the resource. An identifier
can be used over any connection to name the resource. Inferiors The "inferiors" of a window are all of the subwindows nested below it: the children, the children's children, etc. Input focus The "input focus" is nominally where keyboard input goes. Keyboard events are by default sent to the client expressing interest on the window the pointer is in. This is said to be a "real estate driven" input focus. It is also possible to attach the keyboard input to a specific window; events will then be sent to the appropriate client independent of the pointer position. Input manager Control over keyboard input is typically provided by an "input manager" client. InputOnly window A window that cannot be used for graphics requests. InputOnly windows are "invisible", and can be used to control such things as cursors, input event generation, and grabbing. InputOutput window The "normal" kind of opaque window, used for both input and output. Key grabbing Keys on the keyboard may be passively "grabbed" by a client. When the key is pressed, the keyboard is then actively grabbed by the client. Keyboard grabbing A client can actively "grab" control of the keyboard, and key events will be sent to that client rather than the client the events would normally have been sent to. Mapping A window is said to be "mapped" if a map call has been performed on it. Unmapped windows are never viewable or visible. Modifier keys Shift, Control, Meta, Super, Hyper, ALT, Compose, Apple, CapsLock, ShiftLock, and similar keys are called "modifier" keys. Obscures Window A "obscures" window B if both are viewable InputOutput windows and A is higher in the global stacking
order, and the rectangle defined by the outside edges of intersects the rectangle defined by the outside edges of B. Note the (fine) distinction with "occludes". Also note that window borders are included in the calculation. Occludes Window A "occludes" window B if both are mapped and A is higher in the global stacking order, and the rectangle defined by the outside edges of A intersects the rectangle defined by the outside edges of B. Note the (fine) distinction with "obscures". Also note that window borders are included in the calculation. Padding Some padding bytes are inserted in the data stream to maintain alignment of the protocol requests on natural boundaries. This increases ease of portability to some machine architectures. Parent window If C is a child of P, then P is the "parent" of C. Passive grab Grabbing a key or button is a "passive" grab. The grab activates when the key or button is actually pressed. Pixel value A "pixel" is an N-bit value, where N is the number of bit planes used in a particular window or pixmap. For a window, a pixel value indexes a colormap to derive an actual color to be displayed. Pixmap A "pixmap" is a three dimensional array of bits. A pixmap is normally thought of as a two dimensional array of pixels, where each pixel can be a value from 0 to (2^N)-1, where N is the depth (z axis) of the pixmap. A pixmap can also be thought of as a stack of N bitmaps. Plane mask Graphics operations can be restricted to only affect a subset of bit planes of a destination. A "plane mask" is a bit mask describing which planes are to be modified, and is stored in a graphics context. Pointer The "pointer" is the pointing device attached to the cursor, and tracked on the screens. Pointer grabbing A client can actively "grab" control of the pointer, and
button and motion events will be sent to that client rather than the client the events would normally have been sent to. Pointing device A "pointing device" is typically a mouse or tablet, or some other device with effective dimensional motion. There is only one visible cursor is defined by the core protocol, and it tracks whatever pointing device is attached as the pointer. Property Windows may have associated "properties", consisting of a name, a type, a data format, and some data. The protocol places no interpretation on properties, they are intended as a general-purpose naming mechanism for clients. For example, clients might share information such as resize hints, program names, and icon formats with a window manager via properties. Property list The "property list" of a window is the list of properties that have been defined for the window. Redirecting control Window managers (or client programs) may wish to enforce window layout policy in various ways. When a client attempts to change the size or position of a window, the operation may be "redirected" to a specified client, rather than the operation actually being performed. Reply Information requested by a client program is sent back to the client with a "reply". Both events and replys are multipexed on the same connection. Most requests do not generate replies. Request A command to the server is called a "request". It is a single block of data sent over a connection. Resource Windows, pixmaps, cursors, fonts, graphics contexts, and colormaps are known as "resources". They all have unique identifiers associated with them for naming purposes. The lifetime of a resource is bounded by the lifetime of the connection over which the resource was created. Root The "root" of a pixmap or gcontext is the same as the root of whatever drawable was used when the pixmap or gcontext was created. The "root" of a window is the root window
under which the window was created. Root window Each screen has a "root window" covering it. It cannot be reconfigured or unmapped, but otherwise acts as a full fledged window. A root window has no parent. Save set The "save set" of a client is a list of other client's windows which, if they are inferiors of one of the client's windows at connection close, should not be destroyed, and which should be remapped if it is unmapped. Save sets are typically used by window managers to avoid lost windows if the manager should terminate abnormally. Screen A server may provide several independent "screens", which typically have physically independent monitors. This would be the expected configuration when there is only a single keyboard and pointer shared among the screens. Server The "server" provides the basic windowing mechanism. It handles IPC connections from clients, demultipexes graphics requests onto the screens, and multiplexes input back to the appropriate clients. Server grabbing The server can be "grabbed" by a single client for exclusive use. This prevents processing of any requests from other client connections until the grab is complete. This is typically only a transient state for such things as rubber-banding and pop-up menus, or to execute requests indivisibly. Sibling Children of the same parent window are known as "sibling" windows. Stacking order Sibling windows may "stack" on top of each other. Windows above both obscure and occlude lower windows. This is similar to paper on a desk. The relationship between sibling windows is known as the "stacking order". Stipple A "stipple pattern" is a bitmap that is used to tile a region to serve as an additional clip mask for a fill operation with the foreground color.
Tile A pixmap can be replicated in two dimensions to "tile" a region. The pixmap itself is also known as a "tile". Timestamp A time value, expressed in milliseconds, typically since the last server reset. Timestamp values wrap around (after about 49.7 days). The server, given its current time is represented by timestamp T, always interprets timestamps from clients by treating half of the timestamp space as being earlier in time than T, and half of the timestamp space as being later in time than T. One timestamp value (named CurrentTime) is never generated by the server; this value is reserved for use in requests to represent the current server time. Type A type is an arbitrary atom used to identify the interpretation of property data. Types are completely uninterpreted by the server; they are solely for the benefit of clients. Unviewable A window is "unviewable" if it is mapped but some ancestor is unmapped. Viewable A window is "viewable" if it and all of its ancestors are mapped. This does not imply that any portion of the window is actually visible. Visible A region of a window is "visible" if someone looking at the screen can actually "see" it: the window is viewable and the region is not occluded by any other window. Window gravity When windows are resized, subwindows may be repositioned automatically relative to some position in the window. This attraction of a subwindow to some part of its parent is known as "window gravity". Window manager Manipulation of windows on the screen, and much of the user interface (policy) is typically provided by a "window manager" client. XYFormat The data for a pixmap is said to be in "XYFormat" if it is organized as a set of bitmaps representing individual bit planes.
ZFormat The data for a pixmap is said to be in "ZFormat" if it is organized as a set of pixel values in scanline order. SECTION 2. PROTOCOL FORMATS Request Format Every request contains an 8-bit "major" opcode, and a 16-bit length field expressed in units of 4 bytes. Every request consists of 4 bytes of header containing the major opcode, the length field, and a data byte) followed by zero or more additional bytes of data; the length field defines the total length of the request, including the header. The length field in a request must equal the minimum length required to contain the request; if the specified length is smaller or larger than the required length, an error is enerated. Unused bytes in a request are not required to be zero. Major opcodes 128 through 255 are reserved for extensions. Extensions are intended to contain multiple requests, so extension requests typically have an additional minor opcode encoded in the "spare" data byte in the request header, but the placement and interpretation of this minor opcode, and all other fields in extension requests, are not defined by the core protocol. Every request is implicitly assigned a sequence number, starting with one,used in replies, errors, and events. Reply Format Every reply contains a 32-bit length field expressed in units of 4 bytes. Every reply consists of 32 bytes, followed by zero or more additional bytes of data, as specified in the length field. Unused bytes within a reply are not guaranteed to be zero. Every reply also contains the least significant 16 bits of the sequence number of the corresponding request. Error Format Error reports are 32 bytes long. Every error includes an 8-bit error code. Error codes 128 through 255 are reserved for extensions. Every error also includes the major and minor opcodes of the failed request, and the least significant 16 bits of the sequence number of the request. For the following errors (see Section 5), the failing resource id is also returned: Colormap, Cursor, Drawable, Font, GContext, IDChoice, Pixmap, and Window. For Atom errors, the failing atom is returned. For Value errors, the failing value is returned. Other core errors return no additional data. Unused bytes within an error are not guaranteed to be zero. Event Format Events are 32 bytes long. Unused bytes within an event are not
guaranteed to be zero. Every event contains an 8-bit type code. The most significant bit in this code is set if the event was generated from a SendEvent request. Event codes 64 through 127 are reserved for extensions, although the core protocol does not define a mechanism for selecting interest in such events. Every core event (with the exception of KeymapNotify) also contains the least significant 16 bits of the sequence number of the last request issued by the client that was (or is currently being) processed by the server. SECTION 3. SYNTAX The syntax {...} encloses a set of alternatives. The syntax [...] encloses a set of structure components. In general, TYPEs are in upper case and AlternativeValues are capitalized. Requests in Section 10 are described in the following format: RequestName arg1: type1 ... argN: typeN => result1: type1 ... resultM: typeM Errors: kind1, ..., kindK Description. If no => is present in the description, then the request has no reply (it is asynchronous), although errors may still be reported. Events in Section 12 are described in the following format: EventName value1: type1 ... valueN: typeN Description.
SECTION 4. COMMON TYPES LISTofFOO A type name of the form LISTofFOO means a counted list of elements of type FOO; the size of the length field may vary (it is not necessarily the same size as a FOO), in some cases may be implicit, and is not fully specified in this document. BITMASK and LISTofVALUE The types BITMASK and LISTofVALUE are somewhat special. Various requests contain arguments of the form: value-mask: BITMASK value-list: LISTofVALUE used to allow the client to specify a subset of a heterogeneous collection of "optional" arguments. The value-mask specifies which arguments are to be provided; each such argument is assigned a unique bit position. The representation of the BITMASK will typically contain more bits than there are defined arguments; unused bits in the value-mask must be zero (or the server generates a Value error). The value-list contains one value for each one bit in the mask, from least to most significant bit in the mask. Each value is represented with 4 bytes, but the actual value occupies only the least significant bytes as required; the values of the unused bytes do not matter. Or Types A type of the form "T1 or ... or Tn" means the union of the indicated types; a single-element type is given as the element without enclosing braces. DEVICE: 32-bit id (<class,model,manufacturer,unit> 8 bits each) WINDOW: 32-bit id PIXMAP: 32-bit id CURSOR: 32-bit id FONT: 32-bit id GCONTEXT: 32-bit id COLORMAP: 32-bit id DRAWABLE: WINDOW or PIXMAP ATOM: 32-bit id (top 3 bits guaranteed to be zero) VISUALID: 32-bit id (top 3 bits guaranteed to be zero) VALUE: 32-bit quantity (used only in LISTofVALUE) INT8: 8-bit signed integer INT16: 16-bit signed integer INT32: 32-bit signed integer CARD8: 8-bit unsigned integer CARD16: 16-bit unsigned integer CARD32: 32-bit unsigned integer
TIMESTAMP: CARD32 BITGRAVITY: {Forget, Static, NorthWest, North, NorthEast, West, Center, East, SouthWest, South, SouthEast} WINGRAVITY: {Unmap, Static, NorthWest, North, NorthEast, West, Center, East, SouthWest, South, SouthEast} BOOL: {True, False} EVENT: {KeyPress, KeyRelease, OwnerGrabButton, ButtonPress, ButtonRelease, EnterWindow, LeaveWindow, PointerMotion, PointerMotionHint, Button1Motion, Button2Motion, Button3Motion, Button4Motion, Button5Motion, ButtonMotion Exposure, VisibilityChange, StructureNotify, ResizeRedirect, SubstructureNotify, SubstructureRedirect, FocusChange, PropertyChange, ColormapChange, KeymapState} POINTEREVENT: {ButtonPress, ButtonRelease, EnterWindow, LeaveWindow, PointerMotion, PointerMotionHint, Button1Motion, Button2Motion, Button3Motion, Button4Motion, Button5Motion, ButtonMotion KeymapState} DEVICEEVENT: {KeyPress, KeyRelease, ButtonPress, ButtonRelease, PointerMotion, Button1Motion, Button2Motion, Button3Motion, Button4Motion, Button5Motion, ButtonMotion} KEYCODE: CARD8 BUTTON: CARD8 KEYMASK: {Shift, CapsLock, Control, Mod1, Mod2, Mod3, Mod4, Mod5} BUTMASK: {Button1, Button2, Button3, Button4, Button5} KEYBUTMASK: KEYMASK or BUTMASK STRING8: LISTofCARD8 STRING16: LISTofCHAR2B CHAR2B: [byte1, byte2: CARD8] POINT: [x, y: INT16] RECTANGLE: [x, y: INT16, width, height: CARD16] ARC: [x, y: INT16, width, height: CARD16, angle1, angle2: INT16] HOST: [family: {Internet, NS, ECMA, Datakit, DECnet} address: LISTofCARD8] The [x,y] coordinates of a RECTANGLE specify the upper left corner.
The primary interpretation of "large" characters in a STRING16 is that they are composed of two bytes used to index a 2-D matrix; hence the use of CHAR2B rather than CARD16. This corresponds to the JIS/ISO method of indexing two-byte characters. It is expected that most "large" fonts will be defined with two-byte matrix indexing. For large fonts constructed with linear indexing, a CHAR2B can be interpreted as a 16-bit number by treating byte1 as the most significant byte; this means that clients should always transmit such 16-bit character values most significant byte first, as the server will never byte-swap CHAR2B quantities. The length, format, and interpretation of a HOST address are specific to the family. SECTION 5. ERRORS In general, when a request terminates with an error, the request has no side effects (i.e., there is no partial execution). The only requests for which this is not true are ChangeWindowAttributes, ChangeGC, PolyText8, PolyText16, FreeColors, StoreColors, and ChangeKeyboardControl. The following error codes can be returned by the various requests: Access An attempt to grab a key/button combination already grabbed by another client. An attempt to free a colormap entry not allocated by the client. An attempt to store into a read-only or an unallocated colormap entry. An attempt to modify the access control list from other than the local (or otherwise authorized) host. An attempt to select an event type, that at most one client can select at a time, when another client has already selected it. Alloc The server failed to allocate the requested resource. Note that this only covers allocation errors at a very coarse level, and is not intended to (nor can it in practice hope to) cover all cases of a server running out of allocation space in the middle of service.
The semantics when a server runs out of allocation space are left unspecified. Atom A value for an ATOM argument does not name a defined ATOM. Colormap A value for a COLORMAP argument does not name a defined COLORMAP. Cursor A value for a CURSOR argument does not name a defined CURSOR. Drawable A value for a DRAWABLE argument does not name a defined WINDOW or PIXMAP. Font A value for a FONT or <FONT or GCONTEXT> argument does not name a defined FONT. GContext A value for a GCONTEXT argument does not name a defined GCONTEXT. IDChoice The value chosen for a resource identifier is either not included in the range assigned to the client, or is already in use. Implementation The server does not implement some aspect of the request. A server which generates this error for a core request is deficient. As such, this error is not listed for any of the requests, but clients should be prepared to receive such errors, and handle or discard them. Length The length of a request is shorter or longer than that required to minimally contain the arguments. Match An InputOnly window is used as a DRAWABLE. Some argument (or pair of arguments) has the correct type and range, but fails to "match" in some other way required by the request. Name A font or color of the specified name does not exist.
Pixmap A value for a PIXMAP argument does not name a defined PIXMAP. Property The requested property does not exist for the specified window. Request The major or minor opcode does not specify a valid request. Value Some numeric value falls outside the range of values accepted by the request. Unless a specific range is specified for an argument, the full range defined by the argument's type is accepted. Any argument defined as a set of alternatives can generate this error. Window A value for a WINDOW argument does not name a defined WINDOW. Note: the Atom, Colormap, Cursor, Drawable, Font, GContext, Pixmap, and Window errors are also used when the argument type is extended by union with a set of fixed alternatives, e.g.,<Window or PointerRoot or None>. SECTION 6. KEYBOARDS Keycodes are always in the inclusive range [8,255]. For keyboards with both left-side and right-side modifier keys (e.g., Shift and Control), the mask bits in the protocol always define the OR of the keys. If electronically distinguishable, they can have separate up/down events generated, and clients that want to distinguish can track the individual states manually. <As part of the core we need to define a universal association between keycaps and keycodes. A keycap is the graphical information imprinted on a keyboard key, e.g., "$ 4", "T", "+ =".> SECTION 7. POINTERS Buttons are always numbered starting with one. SECTION 8. PREDEFINED ATOMS Predefined atoms are not strictly necessary, and may not be useful in all environments, but will eliminate many InternAtom requests in most applications. The core protocol imposes no semantics on these names,
except as they are used in FONTPROP structures (see QueryFont). Note that upper/lower case matters. BITMAP ICON_SIZE RGB_GREEN_MAP COMMAND ITALIC_ANGLE RGB_RED_MAP COPYRIGHT MAX_SPACE SECONDARY CUT_BUFFER0 MIN_SPACE SIZE_HINTS CUT_BUFFER1 NAME STRIKEOUT_ASCENT CUT_BUFFER2 NORMAL_HINTS STRIKEOUT_DESCENT CUT_BUFFER3 NORM_SPACE STRING CUT_BUFFER4 PIXMAP SUBSCRIPT_X CUT_BUFFER5 POINT_SIZE SUBSCRIPT_Y CUT_BUFFER6 PRIMARY SUPERSCRIPT_X CUT_BUFFER7 QUAD_WIDTH SUPERSCRIPT_Y DEFAULT_CHAR RECTANGLE UNDERLINE_POSITION END_SPACE RESIZE_HINT UNDERLINE_THICKNESS FACE_NAME RESOLUTION WEIGHT FAMILY_NAME RGB_BEST_MAP WINDOW FONT_ASCENT RGB_BLUE_MAP WM_HINTS FONT_DESCENT RGB_COLOR_MAP X_HEIGHT ICON RGB_DEFAULT_MAP ZOOM_HINTS ICON_NAME SECTION 9. CONNECTION SETUP For remote clients, the X protocol can be built on top of any reliable byte stream. For TCP connections, displays on a given host a numbered starting from 0, and the server for display N listens and accepts connections on port 6000+N. The client must send an initial byte of data to identify the byte order to be employed. The value of the byte must be octal 102 or 154. The value 102 (ASCII uppercase B) means values are transmitted most significant byte first, and value 154 (ASCII lowercase l) means values are transmitted least significant byte first. Except where explicitly noted in the protocol, all 16-bit and 32-bit quantities sent by the client must be transmitted with this byte order, and all 16-bit and 32-bit quantities returned by the server will be transmitted with this byte order. Following the byte-order byte, the following information is sent by the client at connection setup: protocol-major-version: CARD16 protocol-minor-version: CARD16 authorization-protocol-name: STRING8 authorization-protocol-data: STRING8 The version numbers indicate what version of the protocol the client expects the server to implement. See below for an
explanation. The authorization name indicates what authorization protocol the client expects the server to use, and the data is specific to that protocol. Specification of valid authorization mechanisms is not part of the core X protocol. It is hoped that eventually one authorization protocol will be agreed upon. In the mean time, a server that implements a different protocol than the client expects, or a server that only implements the host-based mechanism, will simply ignore this information. Received by the client at connection setup: success: BOOL protocol-major-version: CARD16 protocol-minor-version: CARD16 length: CARD16 Length is the amount of additional data to follow, in units of 4 bytes. The version numbers are an escape hatch in case future revisions of the protocol are necessary. In general, the major version would increment for incompatible changes, and the minor version would increment for small upward compatible changes. Barring changes, the major version will be eleven, and the minor version will be zero. The protocol version numbers returned indicate the protocol the server actually supports. This might not equal the version sent by the client. The server can (but need not) refuse connections from clients that offer a different version than the server supports. A server can (but need not) support more than one version simultaneously. Additional data received if authorization fails: reason: STRING8 Additional data received if authorization is accepted: vendor: STRING8 release-number: CARD32 resource-id-base, resource-id-mask: CARD32 image-byte-order: {LSBFirst, MSBFirst} bitmap-format-scanline-unit: {8, 16, 32} bitmap-format-scanline-pad: {8, 16, 32} bitmap-format-bit-order: {LeastSignificant, MostSignificant} pixmap-formats: LISTofFORMAT roots: LISTofSCREEN keyboard: DEVICE pointer: DEVICE motion-buffer-size: CARD32 maximum-request-length: CARD16 where FORMAT: [depth: CARD8,
bits-per-pixel: {4, 8, 16, 24, 32} scanline-pad: {8, 16, 32}] SCREEN: [root: WINDOW device: DEVICE width-in-pixels, height-in-pixels: CARD16 width-in-millimeters,height-in-millimeters:CARD16 allowed-depths: LISTofDEPTH root-depth: CARD8 root-visual: VISUALID default-colormap: COLORMAP white-pixel, black-pixel: CARD32 min-installed-maps, max-installed-maps: CARD16 backing-stores: {Never, WhenMapped, Always} save-unders: BOOL current-input-masks: SETofEVENT] DEPTH: [depth: CARD8 visuals: LISTofVISUALTYPE] VISUALTYPE: [visual-id: VISUALID class: {StaticGray, StaticColor, TrueColor,GrayScale, PseudoColor, DirectColor} red-mask, green-mask, blue-mask: CARD32 bits-per-rgb-value: CARD8 colormap-entries: CARD16] Per server information: The vendor string gives some indentification of the owner of the server implementation. The semantics of the release-number is controlled by the vendor. The resource-id-mask contains a single contiguous set of bits (at least 18); the client allocates resource ids by choosing a value with (only) some subset of these bits set, and ORing it with resource-id-base. Only values constructed in this way can be used to name newly created resources over this connection. Resource ids never have the top 3 bits set. The client is not restricted to linear or contiguous allocation of resource ids. Once an id has been freed, it can be reused, but this should not be necessary. An id must be unique with respect to the ids of all other resources, not just other resources of the same type. Although the server is in general responsible for byte swapping data to match the client, images are always transmitted and received in formats (including byte order) specified by the server. The byte order for images is given by image-byte-order, and applies to each scanline unit in XYFormat (bitmap) format, and to each pixel value in ZFormat. A bitmap is represented in scanline order. Each scanline is padded to a multiple of bits as given by bitmap-format-scanline-pad. The
pad bits are of arbitrary value. The scanline is quantized in multiples of bits as given by bitmap-format-scanline-unit. Within each unit, the leftmost bit in the bitmap is either the least or most significant bit in the unit, as given by bitmap-format-bit-order. If a pixmap is represented in XYFormat, each plane is represented as a bitmap, and the planes appear from most to least significant in bit order. For each pixmap depth supported by some screen, pixmap-formats lists the ZFormat used to represent images of that depth. In ZFormat, the pixels are in scanline order, left to right within a scanline. The number of bits used to hold each pixel is given by bits-per-pixel, and may be larger than strictly required by the depth. When the bits-per-pixel is 4, the order of nibbles in the byte is the same as the image byte-order. Each scanline is padded to a multiple of bits as given by scanline-pad. How a pointing device roams the screens is up to the server implementation, and is transparent to the protocol. No geometry among screens is defined. The server may retain the recent history of pointer motion, and to a finer granularity than is reported by MotionNotify events. Such history is available via the GetPointerMotions request. The approximate size of the history buffer is given by motion-buffer-size. Maximum-request-length specifies the maximum length of a request, in 4-byte units, accepted by the server; i.e., this is the maximum value that can appear in the length field of a request. Requests larger than this generate a Length error, and the server will read and simply discard the entire request. Maximum-request-length will always be at least 4096 (i.e., requests of length up to and including 16384 bytes will be accepted by all servers). Per screen information: The allowed-depths specifies what pixmap and window depths are supported. Pixmaps are supported for each depth listed, and windows of that depth are supported if at least one visual type is listed for the depth. A pixmap depth of one is always supported and listed, but windows of depth one might not be supported. A depth of zero is never listed, but zero-depth InputOnly windows are always supported. Root-depth and root-visual specify the depth and visual type of the root window. Width-in-pixels and height-in-pixels specify the size of the root window (which cannot be changed). The class of the root window is always InputOutput. Width-in-millimeters and height-in-millimeters can be used to determine the physical size and the aspect ratio.
The default-colormap is the one initially associated with the root window. Clients with minimal color requirements creating windows of the same depth as the root may want to allocate from this map by default. Black-pixel and white-pixel can be used in implementing a "monochrome" application. These pixel values are for permanently allocated entries in the default-colormap; the actual RGB values may be settable on some screens. The border of the root window is initially a pixmap filled with the black-pixel. The initial background of the root window is a pixmap filled with some unspecified two-color pattern using black-pixel and white-pixel. Min-installed-maps specifies the number of maps that can be guaranteed to installed simultaneously (with InstallColormap), regardless of the number of entries allocated in each map. Max-installed-maps specifies the maximum number of maps that might possibly be installed simultaneously, depending on their allocations. For the typical case of a single hardware colormap, both values will be one. Backing-stores indicates when the server supports backing stores for this screen, although it may be storage limited in the number of windows it can support at once. If save-unders is True, then the a server can support the save-under mode in CreateWindow and ChangeWindowAttributes, although again it may be storage limited. The current-input-events is what GetWindowAttributes would return for the all-event-masks for the root window. Per visual-type information: A given visual type might be listed for more than one depth, or for more than one screen. For PseudoColor, a pixel value indexes a colormap to produce independent RGB values; the RGB values can be changed dynamically. GrayScale is treated the same as PseudoColor, except which primary drives the screen is undefined, so the client should always store the same value for red, green, and blue in colormaps. For DirectColor, a pixel value is decomposed into separate RGB subfields, and each subfield separately indexes the colormap for the corresponding value; The RGB values can be changed dynamically. TrueColor is treated the same as DirectColor, except the colormap has predefined read-only RGB values, which are server-dependent, but provide (near-)linear ramps in each primary. StaticColor is treated the same as PseudoColor, except the colormap has predefined read-only RGB values, which are server-dependent. StaticGray is treated the same as StaticColor, except the red,
green, and blue values are equal for any single pixel value, resulting in shades of gray. StaticGray with a two-entry colormap can be thought of as "monochrome". The red-mask, green-mask, and blue-mask are only defined for DirectColor and TrueColor; each has one contiguous set of bits, with no intersections. The bits-per-rgb-value specifies the log base 2 of the approximate number of distinct color values (individually) of red, green, and blue. Actual RGB values are always passed in the protocol within a 16-bit spectrum. The colormap-entries defines the number of available colormap entries in a newly created colormap. For DirectColor and TrueColor, this will usually be the size of an individual pixel subfield. SECTION 10. REQUESTS CreateWindow wid, parent: WINDOW class: {InputOutput, InputOnly, CopyFromParent} depth: CARD8 visual: VISUALID or CopyFromParent x, y: INT16 width, height, border-width: CARD16 value-mask: BITMASK value-list: LISTofVALUE Errors: IDChoice, Window, Pixmap, Colormap, Cursor, Match, Value, Alloc Creates an unmapped window, and assigns the identifier wid to it. A class of CopyFromParent means the class is taken from the parent. A depth of zero for class InputOutput or CopyFromParent means the depth is taken from the parent. A visual of CopyFromParent means the visual type is taken from the parent. For class InputOutput, the visual type and depth must be a combination supported for the screen (else a Match error); the depth need not be the same as the parent, but the parent must not be of class InputOnly (else a Match error). For class InputOnly, the depth must be zero (else a Match error), and the visual must be one supported for the screen (else a Match error), but the parent may have any depth and class. The server essentially acts as if InputOnly windows do not exist for the purposes of graphics requests, exposure
processing, and VisibilityNotify events. An InputOnly window cannot be used as a drawable (as a source or destination for graphics requests). InputOnly and InputOutput windows act identically in other respects (properties, grabs, input control, and so on). The window is placed on top in the stacking order with respect to siblings. The x and y coordinates are relative to the parent's origin, and specify the position of the upper left outer corner of the window (not the origin). The width and height specify the inside size, not including the border, and must be non-zero. The border-width for an InputOnly window must be zero (else a Match error). The value-mask and value-list specify attributes of the window that are to be explicitly initialized. The possible values are: background-pixmap: PIXMAP or None or ParentRelative background-pixel: CARD32 border-pixmap: PIXMAP or CopyFromParent border-pixel: CARD32 bit-gravity: BITGRAVITY win-gravity: WINGRAVITY backing-store: {NotUseful, WhenMapped, Always} backing-bit-planes: CARD32 backing-pixel: CARD32 save-under: BOOL event-mask: SETofEVENT do-not-propagate-mask: SETofDEVICEEVENT override-redirect: BOOL colormap: COLORMAP or CopyFromParent cursor: CURSOR or None The default values, when attributes are not explicitly initialized, are: background-pixmap: None border-pixmap: CopyFromParent bit-gravity: Forget win-gravity: NorthWest backing-store: NotUseful backing-bit-planes: all ones backing-pixel: zero save-under: False event-mask: {} (empty set) do-not-propagate-mask: {} (empty set) override-redirect: False colormap: CopyFromParent cursor: None
Only the following attributes are defined for InputOnly windows: win-gravity, event-mask, do-not-propagate-mask, and cursor. It is a Match error to specify any other attributes for InputOnly windows. If background-pixmap is given, it overrides the default background-pixel. The background pixmap and the window must have the same root and the same depth (else a Match error). Any size pixmap can be used, although some sizes may be faster than others. If background None is specifed, the window has no defined background. If background ParentRelative is specified, the parent's background is used, but the window must have the same depth as the parent (else a Match error); if the parent has background None, then the window will also have background None. A copy of the parent's background is not made; the parent's background is reexamined each time the window background is required. If background-pixel is given, it overrides the default and any background-pixmap given, and a pixmap of undefined size filled with background-pixel is used for the background. For a ParentRelative background, the background tile origin always aligns with the parent's background tile origin; otherwise the background tile origin is always the window origin. When regions of the window are exposed and the server has not retained the contents, the server automatically tiles the regions with the window's background unless the window has a background of None, in which case the previous screen contents are simply left in place. Exposure events are then generated for the regions, even if the background is None. The border tile origin is always the same as the background tile origin. If border-pixmap is given, it overrides the default border-pixel. The border pixmap and the window must have the same root and the same depth (else a Match error). Any size pixmap can be used, although some sizes may faster than others. If CopyFromParent is given, the parent's border pixmap is copied (subsequent changes to the parent do not affect the child), but the window must have the same depth as the parent (else a Match error). If border-pixel is given, it overrides the default and any border-pixmap given, and a pixmap of undefined size filled with border-pixel is used for the border. Output to a window is always clipped to the inside of the window, so that the border is never affected. The bit-gravity defines which region of the window should be retained if the window is resized, and win-gravity defines how the window should be repositioned if the parent is
resized; see ConfigureWindow. A backing-store of WhenMapped advises the server that maintaining contents of obscured regions when the window is mapped would be beneficial. A backing-store of Always advises the server that maintaining contents even when the window is unmapped would be beneficial. Note that, even if the window is larger than its parent, the server should maintain complete contents, not just the region within the parent boundaries. If the server maintains contents, Exposure events will not be generated, but the server may stop maintaining contents at any time. A value of NotUseful advises the server that maintaining contents is unnecessary, although a server may still choose to maintain contents. Backing-bit-planes indicates (with one bits) which bit planes of the window hold dynamic data that must be preserved in backing-stores. Backing-pixel specifies what value to use in planes not covered by backing-bit-planes. The server is free to only save the specified bit planes in the backing-store, and regenerate the remaining planes with the specified pixel value. If save-under is True, the server is advised that, when this window is mapped, saving the contents of windows it obscures would be beneficial. The event-mask defines which events the client is interested in for this window (or, for some event types, inferiors of the window). The do-not-propagate-mask defines which events should not be propagated to ancestor windows when no client has the event type selected in this window. Override-redirect specifies whether map and configure request on this window should override a SubstructureRedirect on the parent, typically to inform a window manager not to tamper with the window. The colormap specifies the colormap, that best reflects the "true" colors of the window. Servers capable of supporting hardware colormaps may use this information, and window managers may use it for InstallColormap requests. The colormap must have the same visual type as the window (else a match error). If CopyFromParent is specified, the parents's colormap is copied (subsequent changes to the parent do not affect the child), but the window must have the same visual type as the parent (else a Match error) an the parent must not have a colormap of None (else a Match error).
If a cursor is specified, it will be used whenever the pointer is in the window. If None is specified, the parent's cursor will be used when the pointer is in the window, and any change in the parent's cursor will cause an immediate change in the display cursor. This request generates a CreateNotify event. The background and border pixmaps and the cursor may be freed immediately if no further explicit references to them are to be made. Subsequent drawing into the background or border pixmap has an undefined effect on the window state; the server might or might not make a copy of the pixmap. ChangeWindowAttributes window: WINDOW value-mask: BITMASK value-list: LISTofVALUE Errors: Window, Pixmap, Colormap, Cursor, Match, Value, Access The value-mask and value-list specify which attributes are to be changed. The values and restrictions are the same as for CreateWindow. Changing the background does not cause the window contents to be changed. Setting the border, or changing the background such that border tile origin changes, causes the border to be repainted. Changing the background of a root window to None or ParentRelative restores the default background pixmap. Changing the border of a root window to CopyFromParent restores the default border pixmap. Changing the back-store of an obsecured window to WhenMapped or Always, or changing the backing-bit-planes, backing-pixel, or save-under of a mapped window, may have no immediate effect. Multiple clients can select input on the same window; their event-masks are disjoint. When an event is generated it will be reported to all interested clients. However, at most one client at a time can select for SubstructureRedirect, at most one client at a time can select for ResizeRedirectr, and at most one client at a time can select for ButtonPress. There is only one do-not-propagate-mask for a window, not one per client.