DRI2 Protocol Spec Draft

Keith Packard keithp at keithp.com
Wed Sep 10 16:41:42 PDT 2008


On Wed, 2008-09-10 at 17:28 -0400, Kristian Høgsberg wrote:

> No that's why the existing scheme is better, it doesn't rely on
> random/cryptographical tokens.  It just needs to be a unique handle
> that lets the server identify the right client to authenticate.  If
> you can pass this token to the X server you're authenticated.  What
> better way to establish that than, erh, passing it through protocol?
> The key point is that the server does the ioctl that authenticates the
> client.

Ok, so the kernel generates a unique token that identifies the client
which the client takes and hands to the X server to pass back into the
kernel to authorize the client.

Just trying to figure out how this stuff is supposed to work.

-- 
keith.packard at intel.com
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
URL: <http://lists.x.org/archives/xorg/attachments/20080910/94d8a7c1/attachment.pgp>


More information about the xorg mailing list