Previous | Table of Contents | Next

Page 642

CONFIGURATION

The configuration language is a list of keyword and value pairs. Each keyword is followed by an = and then the desired value.

Recognized keywords include the following:

catalogue (list of string) Ordered list of font path element names. Use of the key-word "catalogue" is very misleading at present; the current implementation only supports a single catalogue (all), containing all of the specified fonts.
alternate-servers (list of string) List of alternate servers for this font server.
client-limit (cardinal) Number of clients this font server will support before refusing service. This is useful for tuning the load on each individual font server.
clone-self (Boolean) Whether this font server should attempt to clone itself when it reaches the client-limit.
default-point-size The default pointsize (in decipoints) for
(cardinal) fonts that don't specify. The default is 120.
default-resolutions Resolutions the server supports by default.
(list of resolutions) This information may be used as a hint for
prerendering, and substituted for scaled fonts that do not
specify a resolution. A resolution is a comma-
separated pair of x and y resolutions in pixels
per inch. Multiple resolutions are separated by commas.
error-file (string) Filename of the error file. All warnings and errors will be logged here.
port (cardinal) TCP port on which the server will listen for connections.
use-syslog (Boolean) Whether syslog(3) (on supported systems) is to be used for errors.
deferglyphs (string) Set the mode for delayed fetching and caching of glyphs. Value is none, meaning deferred glyphs is disabled, all, meaning it is enabled for all fonts, and 16, meaning it is enabled only for 16-bits fonts.

EXAMPLE

#
# sample font server configuration file
#
# allow a max of 10 clients to connect to this font server client-limit = 10
# when a font server reaches its limit, start up a new one clone-self = on
# alternate font servers for clients to use alternate-servers = hansen:7101,hansen:7102
# where to look for fonts
# the first is a set of Speedo outlines, the second is a set of
# misc bitmaps and the last is a set of 100dpi bitmaps
#
catalogue = /usr/X11R6/lib/X11/fonts/speedo,
/usr/X11R6/lib/X11/fonts/misc,
/usr/X11R6/lib/X11/fonts/100dpi/
# in 12 points, decipoints
default-point-size = 120
# 100 x 100 and 75 x 75
default-resolutions = 100,100,75,75
use-syslog = off

Page 643

FONT SERVER NAMES

One of the following forms can be used to name a font server that accepts TCP connections:

tcp/hostname:port tcp/hostname:port/cataloguelist

The hostname specifies the name (or decimal numeric address) of the machine on which the font server is running. The port is the decimal TCP port on which the font server is listening for connections. The cataloguelist specifies a list of catalogue names, with + as a separator.

Examples: tcp/fs.x.org:7100, tcp/18.30.0.212:7101/all.

One of the following forms can be used to name a font server that accepts DECnet connections:

decnet/nodename::font$objname decnet/nodename::font$objname/cataloguelist

The nodename specifies the name (or decimal numeric address) of the machine on which the font server is running. The objname is a normal, case-insensitive DECnet object name. The cataloguelist specifies a list of catalogue names, with + as a separator.

Examples: DECnet/SRVNOD::FONT$DEFAULT, decnet/44.70::font$special/symbols.

SEE ALSO

X(1), font server implementation overview

Bugs

Multiple catalogues should be supported.

AUTHORS

Dave Lemke (Network Computing Devices, Inc.), Keith Packard (Massachusetts Institute of Technology)

X Version 11 Release 6

xhost

xhost—Server access control program for X

SYNOPSIS

xhost [[+_]name ...]

DESCRIPTION

The xhost program is used to add and delete hostnames or usernames to the list allowed to make connections to the X server. In the case of hosts, this provides a rudimentary form of privacy control and security. It is only sufficient for a workstation (single user) environment, although it does limit the worst abuses. Environments that require more sophisticated measures should implement the user-based mechanism or use the hooks in the protocol for passing other authentication data to the server.

OPTIONS

Xhost accepts the following command-line options. For security, the options that effect access control may only be run from the "controlling host." For workstations, this is the same machine as the server. For X terminals, it is the login host.

_help Prints a usage message.
[+]name The given name (the plus sign is optional) is added to the list allowed to connect to the X server. The name can be a hostname or a username.

Previous | Table of Contents | Next

1