

















                 TThhee IInnppuutt MMeetthhoodd PPrroottooccooll

                        VVeerrssiioonn 11..00

                   XX CCoonnssoorrttiiuumm SSttaannddaarrdd

                  XX VVeerrssiioonn 1111,, RReelleeaassee 77

                        lliibbXX1111 11..33..22




                      _M_a_s_a_h_i_k_o _N_a_r_i_t_a
                      FUJITSU Limited.

                        _H_i_d_e_k_i _H_i_u_r_a
                       SunSoft, Inc.





                          _A_B_S_T_R_A_C_T

     This specifies a protocol between IM library and
     IM (Input Method) Server for internationalized
     text input, which is independent from any specific
     language, any specific input method and the trans­
     port layer used in communication between the IM
     library and the IM Server, and uses a client‐
     server model.  This protocol allows user to use
     his/her favorite input method for all applications
     within the stand‐alone distributed environment.































    X Window System is a trademark of X Consortium, Inc.

        Copyright © 1993, 1994 by X Consortium, Inc.




Permission is hereby granted, free of charge, to any person
obtaining a copy of this software and associated documenta­
tion files (the "Software"), to deal in the Software without
restriction, including without limitation the rights to use,
copy, modify, merge, publish, distribute, sublicense, and/or
sell copies of the Software, and to permit persons to whom
the Software is furnished to do so, subject to the following
conditions:

The above copyright notice and this permission notice shall
be included in all copies or substantial portions of the
Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY
KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PUR­
POSE AND NONINFRINGEMENT.  IN NO EVENT SHALL THE X CONSOR­
TIUM BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY,
WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE
OR OTHER DEALINGS IN THE SOFTWARE.

Except as contained in this notice, the name of the X Con­
sortium shall not be used in advertising or otherwise to
promote the sale, use or other dealings in this Software
without prior written authorization from the X Consortium.




         Copyright © 1993, 1994 by FUJITSU LIMITED

      Copyright © 1993, 1994 by Sun Microsystems, Inc.















Permission to use, copy, modify, and distribute this docu­
mentation for any purpose and without fee is hereby granted,
provided that the above copyright notice and this permission
notice appear in all copies.  Fujitsu and Sun Microsystems
make no representations about the suitability for any pur­
pose of the information in this document.  This documenta­
tion is provided as is without express or implied warranty.



























































11..  IInnttrroodduuccttiioonn

11..11..  SSccooppee

The internationalization in the X Window System Version 11,
Release 5 (X11R5) provides a common API which application
developers can use to create portable internationalized pro­
grams and to adapt them to the requirements of different
native languages, local customs, and character string encod­
ings (this is called ‘‘localization’’).  As one of its
internationalization mechanisms X11R5 has defined a func­
tional interface for internationalized text input, called
XIM (X Input Method).

When a client‐server model is used with an IM (Input Method)
implementation, a protocol must be established between the
client and the server.  However, the protocol used to inter­
face Input Method Servers (IM Servers) with the Input Method
libraries (IM libraries) to which applications are linked
was not addressed in X11R5.  This led application developers
to depend on vendor‐specific input methods, decreased the
user’s choice of available input methods, and made it more
difficult for developers to create portable applications.
This paper describes the Input Method Protocol developed for
X11R6 to resolve the above problems and to address the
requirements of existing and future input methods.

The Input Method Protocol is independent from the transport
layer used in communication between the IM library and the
IM Server.  Thus, the input method protocol can be built on
any inter‐process communication mechanism, such as TCP/IP or
the X protocol.

In addition, the protocol provides for future extensions
such as differing input model types.


11..22..  BBaacckkggrroouunndd

Text input is much more simple for some languages than oth­
ers.  English, for instance, uses an alphabet of a manage­
able size, and input consists of pressing the corresponding
key on a keyboard, perhaps in combination with a shift key
for capital letters or special characters.

Some languages have larger alphabets, or modifiers such as
accents, which require the addition of special key combina­
tions in order to enter text.  These input methods may
require ‘‘dead‐keys’’ or ‘‘compose‐keys’’ which, when fol­
lowed by different combinations of key strokes, generate
different characters.

Text input for ideographic languages is much less simple.
In these languages, characters represent actual objects



                              11





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


rather than phonetic sounds used in pronouncing a word, and
the number of characters in these languages may continue to
grow.  In Japanese, for instance, most text input methods
involve entering characters in a phonetic alphabet, after
which the input method searches a dictionary for possible
ideographic equivalents (of which there may be many).  The
input method then presents the candidate characters for the
user to choose from.

In Japanese, either Kana (phonetic symbols) or Roman letters
are typed and then a region is selected for conversion to
Kanji. Several Kanji characters may have the same phonetic
representation. If that is the case with the string entered,
a menu of characters is presented and the user must choose
the appropriate one. If no choice is necessary or a prefer­
ence has been established, the input method does the substi­
tution directly.

These complicated input methods must present state informa­
tion (Status Area), text entry and edit space (Preedit
Area), and menu/choice presentations (Auxiliary Area).  Much
of the protocol between the IM library and the IM Server
involves managing these IM areas.  Because of the size and
complexity of these input methods, and because of how widely
they vary from one language or locale to another, they are
usually implemented as separate processes which can serve
many client processes on the same computer or network.


11..33..  IInnppuutt MMeetthhoodd SSttyylleess

X11 internationalization support includes the following four
types of input method:

     ‐ on‐the‐spot:      The client application is directed
                         by the IM Server to display all
                         pre‐edit data at the site of text
                         insertion.  The client registers
                         callbacks invoked by the input
                         method during pre‐editing.

     ‐ off‐the‐spot:     The client application provides
                         display windows for the pre‐edit
                         data to the input method which dis­
                         plays into them directly.

     ‐ over‐the‐spot:    The input method displays pre‐edit
                         data in a window which it brings up
                         directly over the text insertion
                         position.

     ‐ root‐window:      The input method displays all pre‐
                         edit data in a separate area of the
                         screen in a window specific to the



                              22





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


                         input method.

Client applications must choose from the available input
methods supported by the IM Server and provide the display
areas and callbacks required by the input method.


22..  AArrcchhiitteeccttuurree

22..11..  IImmpplleemmeennttaattiioonn MMooddeell

Within the X Window System environment, the following two
typical architectural models can be used as an input
method’s implementation model.

     ‐ Client/Server model:
                         A separate process, the IM Server,
                         processes input and handles preed­
                         iting, converting, and committing.
                         The IM library within the applica­
                         tion, acting as client to the IM
                         Server, simply receives the commit­
                         ted string from the IM Server.

     ‐ Library model:    All input is handled by the IM
                         library within the application.
                         The event process is closed within
                         the IM library and a separate IM
                         Server process may not be required.

Most languages which need complex preediting, such as Asian
languages, are implemented using the Client/Server IM model.
Other languages which need only dead key or compose key pro­
cessing, such as European languages, are implemented using
the Library model.

In this paper, we discuss mainly the Client/Server IM model
and the protocol used in communication between the IM
library (client) and the IM Server.


22..22..  SSttrruuccttuurree ooff IIMM

When the client connects or disconnects to the IM Server, an
open or close operation occurs between the client and the IM
Server.

The IM can be specified at the time of XOpenIM() by setting
the locale of the client and a locale modifier. Since the IM
remembers the locale at the time of creation XOpenIM() can
be called multiple times (with the setting for the locale
and the locale modifier changed) to support multiple lan­
guages.




                              33





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


In addition, the supported IM type can be obtained using
XGetIMValues().

The client usually holds multiple input (text) fields. Xlib
provides a value type called the ‘‘Input Context’’ (IC) to
manage each individual input field.  An IC can be created by
specifying XIM using XCreateIC(), and it can be destroyed
using XDestroyIC().

The IC can specify the type of IM which is supported by XIM
for each input field, so each input field can handle a dif­
ferent type of IM.

Most importantly information such as the committed string
sent from the IM Server to the client, is exchanged based on
each IC.

Since each IC corresponds to an input field, the focused
input field should be announced to the IM Server using XSet­
ICFocus(). (XUnsetICFocus() can also be used to change the
focus.)


22..33..  EEvveenntt HHaannddlliinngg MMooddeell

Existing input methods support either the FrontEnd method,
the BackEnd method, or both.  This protocol specifically
supports the BackEnd method as the default method, but also
supports the FrontEnd method as an optional IM Server exten­
sion.

The difference between the FrontEnd and BackEnd methods is
in how events are delivered to the IM Server.  (Fig. 1)


22..33..11..  BBaacckkEEnndd MMeetthhoodd

In the BackEnd method, client window input events are always
delivered to the IM library, which then passes them to the
IM Server.  Events are handled serially in the order deliv­
ered, and therefore there is no synchronization problem
between the IM library and the IM Server.

Using this method, the IM library forwards all KeyPress and
KeyRelease events to the IM Server (as required by the Event
Flow Control model described in section 2.4. ‘‘Event Flow
Control’’), and synchronizes with the IM Server (as
described in section 4.16.  ‘‘Filtering Events’’).


22..33..22..  FFrroonnttEEnndd MMeetthhoodd

In the FrontEnd method, client window input events are
delivered by the X server directly to both the IM Server and



                              44





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


the IM library.  Therefore this method provides much better
interactive performance while preediting (particularly in
cases such as when the IM Server is running locally on the
user’s workstation and the client application is running on
another workstation over a relatively slow network).

However, the FrontEnd model may have synchronization prob­
lems between the key events handled in the IM Server and
other events handled in the client, and these problems could
possibly cause the loss or duplication of key events.  For
this reason, the BackEnd method is the core method sup­
ported, and the FrontEnd method is made available as an
extension for performance purposes. (Refer to Appendix A for
more information.)











































                              55





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


... 0.05 6.513 4.737 10.45 ... 0.000i 3.937i 4.687i 0.000i

       +


                          ____________________
                          ││                   ││
                          │  Application      │
                          │                   │
                          │  _______          │
                          │         ││         │
                          │  ││   _││__│__________│
                          │  │   │  │ Library │││
                          │  |│   _│__│__________││
                          _│__|│_______│__________││
                             |││      │
                             │      |│
                             │   ___|__________________
                             │   ││                    ││
                             │   │    IM Ser|ver       │
                             │   _│__________|__________│
               BackEnd Method│(Core)        |││FrontEnd Method (Extension)
                             │              │
                          ___│_______________│__
                          ││                   ││
                          │      X Server     │
                          _│___________________│


                  Fig.1 The Flow of Events


22..44..  EEvveenntt FFllooww CCoonnttrrooll

This protocol supports two event flow models for communica­
tion between the IM library and the IM Server (Static and
Dynamic).

Static Event Flow requires that input events always be sent
to the IM Server from the client.

Dynamic Event Flow, however, requires only that those input
events which need to be processed (converted) be sent to the
IM Server from the client.

For instance, in the case of inputing a combination of ASCII
characters and Chinese characters, ASCII characters do not
need to be processed in the IM Server, so their key events
do not have to be sent to the IM Server.  On the other hand,
key events necessary for composing Chinese characters must
be sent to the IM Server.

Thus, by adopting the Dynamic Event Flow, the number of
requests among the X Server, the client, and the IM Server



                              66





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


is significantly reduced, and the number of context switches
is also reduced, resulting in improved performance.  The IM
Server can send _X_I_M___R_E_G_I_S_T_E_R___T_R_I_G_G_E_R_K_E_Y_S message in order to
switch the event flow in the Dynamic Event Flow.

The protocol for this process is described in section 4.5.
‘‘Event Flow Control’’.


33..  DDeeffaauulltt PPrreeccoonnnneeccttiioonn CCoonnvveennttiioonn

IM Servers are strongly encouraged to register their sym­
bolic names as the ATOM names into the IM Server directory
property, _X_I_M___S_E_R_V_E_R_S_, on the root window of the screen_num­
ber 0.  This property can contain a list of ATOMs, and the
each ATOM represents each possible IM Server.  IM Server
names are restricted to POSIX Portable Filename Character
Set.  To discover if the IM Server is active, see if there
is an owner for the selection with that atom name.  To learn
the address of that IM Server, convert the selection target
_T_R_A_N_S_P_O_R_T_, which will return a string form of the transport
address(es).  To learn the supported locales of that IM
Server, convert the selection target _L_O_C_A_L_E_S_, which will
return a set of names of the supported locales in the syntax
X/Open defines.

The basic semantics to determine the IM Server if there are
multiple ATOMs are found in _X_I_M___S_E_R_V_E_R_S property, is first
fit if the IM Server name is not given as a X modifier’s
category _i_m_.

The address information retrievable from the _T_R_A_N_S_P_O_R_T tar­
get is a transport‐specific name.  The preregistered formats
for transport‐specific names are listed in Appendix B.
Additional transport‐specific names may be registered with X
Consortium.

For environments that lack X connections, or for IM Servers
which do not use the X Window System, the preconnection con­
vention with IM Server may be given outside the X Window
system (e.g. using a Name Service).


44..  PPrroottooccooll

The protocol described below uses the bi‐directional syn­
chronous/asynchronous request/reply/error model and is spec­
ified using the same conventions outlined in Section 2 of
the core X Window System protocol [1]:








                              77





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


44..11..  BBaassiicc RReeqquueessttss PPaacckkeett FFoorrmmaatt

This section describes the requests that may be exchanged
between the client and the IM Server.

The basic request packet header format is as follows.

               major‐opcode:            CARD8
               minor‐opcode:            CARD8
               length:                  CARD16

The MAJOR‐OPCODE specifies which core request or extension
package this packet represents.  If the MAJOR‐OPCODE corre­
sponds to a core request, the MINOR‐OPCODE contains 8 bits
of request‐specific data.  (If the MINOR‐OPCODE is not used,
it is 0.)  Otherwise, the MAJOR‐OPCODE and the MINOR‐OPCODE
are specified by _X_I_M___Q_U_E_R_Y___E_X_T_E_N_S_I_O_N message.  (Refer to
4.7. Query the supported extension protocol list.)  The
LENGTH field specifies the number of 4 bytes elements fol­
lowing the header.  If no additional data is followed by the
header, the LENGTH field will be 0.


44..22..  DDaattaa TTyyppeess

The following data types are used in the core X IM Server
protocol:

BITMASK16
  CARD16

BITMASK32
  CARD32

PADDING FORMAT
  Where N is some expression, and Pad(N) is the number of bytes needed to round N up to a
  multiple of four.
     Pad(N) = (4 ‐ (N mod 4)) mod 4

LPCE
  1                 A character from the4 X Portable Character Set in Latin Portable
                    Character Encoding















                              88





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


STRING
  2  n              length of string in bytes
  n  LISTofLPCE     string
  p                 unused, p=Pad(2+n)

STR
  1  n              length of name in bytes
  n  STRING8        name

XIMATTR
  2  CARD16         attribute ID (*1)
  2  CARD16         type of the value (*2)
  2  n              length of im‐attribute
  n  STRING8        im‐attribute
  p                 unused, p = Pad(2+n)

The im‐attribute argument specifies XIM values such as XNQueryInputStyle.

XICATTR
  2  CARD16         attribute ID (*1)
  2  CARD16         type of the value (*2)
  2  n              length of ic‐attribute
  n  STRING8        ic‐attribute
  p                 unused, p = Pad(2+n)


(*1) XIMATTR and XICATTR are used during the setup stage and
     XIMATTRIBUTE and XICATTRIBUTE are used after each
     attribute ID has been recognized by the IM Server and
     the IM library.


(*2) The value types are defined as follows:

     ------------------------------------------------------------------------------------------
     vvaalluueess   ddaattaa                      ffoorrmmaatt
     ------------------------------------------------------------------------------------------
     #0       Separator of NestedList   ‐‐‐‐‐ (*3)
     #1       byte data                 CARD8
     #2       word data                 CARD16
     #3       long data                 CARD32
     #4       char data                 STRING8
     #5       Window                    CARD32
     #10      XIMStyles                 2            n                number of XIMStyle list
                                        2                             unused
                                        n            CARD32           XIMStyle list
     #11      XRectangle                2            INT16            X
                                        2            INT16            Y
                                        2            CARD16           width
                                        2            CARD16           height
     #12      XPoint                    2            INT16            X
                                        2            INT16            Y
     #13      XFontSet                  2            n                length of Base font name




                              99





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


     ------------------------------------------------------------------------------------------
     vvaalluueess   ddaattaa                      ffoorrmmaatt
     ------------------------------------------------------------------------------------------
                                        n            STRING8          Base font name list
                                        p                             unused, p = Pad(2+n)
     #15      XIMHotKeyTriggers         4            n                number of XIMTRIGGERKEY
                                                                      list (*4)
                                        n            XIMTRIGGERKEY    XIMHotkeyTrigger list
     #16      XIMHotKeyState                         XIMHOTKEYSTATE   HotKey processing state
     #17      XIMStringConversion       XIMSTRCONVTEXT
     #18      XIMPreeditState           XIMPREEDITSTATE
     #19      XIMResetState             XIMRESETSTATE
     #x7fff   NestedList                ‐‐‐‐‐
     ------------------------------------------------------------------------------------------



(*3) The IC value for the separator of NestedList is defined
     as follows,
          #define   XNSeparatorofNestedList   ‘‘separato­
     rofNestedList’’
     , which is registered in X Consortium and cannot be
     used for any other purpose.


(*4) LISTofFOO
          A Type name of the form LISTof FOO means a counted
          list of elements of type FOO.  The size of the
          length field may vary (it is not necessarily the
          same size as a FOO), and in some cases, it may be
          implicit.


XIMTRIGGERKEY
  4  CARD32         keysym
  4  CARD32         modifier
  4  CARD32         modifier mask

ENCODINGINFO
  2  n              length of encoding info
  n  STRING8        encoding info
  p                 unused, p=Pad(2+n)

EXT
  1  CARD8          extension major‐opcode
  1  CARD8          extension minor‐opcode
  2  n              length of extension name
  n  STRING8        extension name
  p                 unused, p = Pad(n)

XIMATTRIBUTE
  2  CARD16         attribute ID
  2  n              value length
  n                 value



                             1100





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


  p                 unused, p = Pad(n)

XICATTRIBUTE
  2  CARD16         attribute ID
  2  n              value length
  n                 value
  p                 unused, p = Pad(n)


















































                             1111





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


XIMSTRCONVTEXT
  2  CARD16                   XIMStringConversionFeedback
     #x0000001                XIMStringConversionLeftEdge
     #x0000002                XIMStringConversionRightEdge
     #x0000004                XIMStringConversionTopEdge
     #x0000008                XIMStringConversionBottomEdge
     #x0000010                XIMStringConversionConvealed
     #x0000020                XIMStringConversionWrapped
  2  n                        byte length of the retrieved string
  n  STRING8                  retrieved string
  p                           unused, p = Pad(n)
  2  m                        byte length of feedback array
  2                           unused
  m  LISTofXIMSTRCONVFEEDBACK feedback array(*1)

(*1) This field is reserved for future use.


XIMFEEDBACK
  4  CARD32         XIMFeedback
     #x000001       XIMReverse
     #x000002       XIMUnderline
     #x000004       XIMHighlight
     #x000008       XIMPrimary
     #x000010       XIMSecondary
     #x000020       XIMTertiary
     #x000040       XIMVisibleToForward
     #x000080       XIMVisibleToBackward
     #x000100       XIMVisibleCenter

XIMHOTKEYSTATE
  4  CARD32         XIMHotKeyState
     #x0000001      XIMHotKeyStateON
     #x0000002      XIMHotKeyStateOFF

XIMPREEDITSTATE
  4  CARD32         XIMPreeditState
     #x0000001      XIMPreeditEnable
     #x0000002      XIMPreeditDisable

XIMRESETSTATE
  4  CARD32         XIMResetState
     #x0000001      XIMInitialState
     #x0000002      XIMPreserveState


44..33..  EErrrroorr NNoottiiffiiccaattiioonn

Both the IM Server and the IM library return _X_I_M___E_R_R_O_R mes­
sages instead of the corresponding reply messages if any
errors occur during data processing.

At most one error is generated per request. If more than one
error condition is encountered in processing a request, the



                             1122





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


choice of which error is returned is implementation‐depen­
dent.


     XXIIMM__EERRRROORR ((IIMM SSeerrvveerr ←←→→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          2     BITMASK16           flag (*1)
                #0000               Both Input‐Method‐ID and Input‐Context‐ID are invalid
                #0001               Input‐Method‐ID is valid
                #0002               Input‐Context‐ID is valid
          2     CARD16              Error Code
                #1                  BadAlloc
                #2                  BadStyle
                #3                  BadClientWindow
                #4                  BadFocusWindow
                #5                  BadArea
                #6                  BadSpotLocation
                #7                  BadColormap
                #8                  BadAtom
                #9                  BadPixel
                #10                 BadPixmap
                #11                 BadName
                #12                 BadCursor
                #13                 BadProtocol
                #14                 BadForeground
                #15                 BadBackground
                #16                 LocaleNotSupported
                #999                BadSomething (*2)
          2     n                   byte length of error detail.
          2     CARD16              type of error detail (*3)
          n     STRING8             error detail (*4)
          p                         unused, p = Pad(n)



     (*1) Before an IM is created, both Input‐Method‐ID and
          Input‐Context‐ID are invalid.  Before an IC is
          created, only Input‐Method‐ID is valid.  After
          that, both of Input‐Method‐ID and Input‐Context‐ID
          are valid.

     (*2) Unspecific error, for example ‘‘language engine
          died’’

     (*3) This field is reserved for future use.

     (*4) Vendor defined detail error message


44..44..  CCoonnnneeccttiioonn EEssttaabblliisshhmmeenntt

_X_I_M___C_O_N_N_E_C_T message requests to establish a connection over
a mutually‐understood virtual stream.



                             1133





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


     XXIIMM__CCOONNNNEECCTT ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          1                         byte order
                #x42 MSB first
                #x6c LSB first
          1                         unused
          2     CARD16              client‐major‐protocol‐version (*1)
          2     CARD16              client‐minor‐protocol‐version (*1)
          2     CARD16              number of client‐auth‐protocol‐names
          n     LISTofSTRING        client‐auth‐protocol‐names



     (*1) Specify the version of IM Protocol that the client
          supports.


A client must send _X_I_M___C_O_N_N_E_C_T message as the first message
on the connection.  The list specifies the names of authen­
tication protocols the sending IM Server is willing to per­
form.  (If the client need not authenticate, the list may be
omited.)

_X_I_M___A_U_T_H___R_E_Q_U_I_R_E_D message is used to send the authentication
protocol name and protocol‐specific data.

     XXIIMM__AAUUTTHH__RREEQQUUIIRREEDD ((IIMM lliibbrraarryy ←←→→ IIMM SSeerrvveerr))
          1     CARD8               auth‐protocol‐index
          3                         unused
          2     n                   length of authentication data
          2                         unused
          n     <varies>            data
          p                         unused, p = Pad(n)


The auth‐protocol is specified by an index into the list of
names given in the _X_I_M___C_O_N_N_E_C_T or _X_I_M___A_U_T_H___S_E_T_U_P message.
Any protocol‐specific data that might be required is also
sent.

The IM library sends _X_I_M___A_U_T_H___R_E_P_L_Y message as the reply to
_X_I_M___A_U_T_H___R_E_Q_U_I_R_E_D message, if the IM Server is authenti­
cated.

     XXIIMM__AAUUTTHH__RREEPPLLYY ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     n                   length of authentication data
          2                         unused
          2     n                   length of authentication data
          2                         unused
          n     <varies>            data
          p                         unused, p = Pad(n)


The auth data is specific to the authentication protocol in
use.



                             1144





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


_X_I_M___A_U_T_H___N_E_X_T message requests to send more auth data.

     XXIIMM__AAUUTTHH__NNEEXXTT ((IIMM lliibbrraarryy ←←→→ IIMM SSeerrvveerr))
          2     n                   length of authentication data
          2                         unused
          n     <varies>            data
          p                         unused, p = Pad(n)


The auth data is specific to the authentication protocol in
use.

The IM Server sends _X_I_M___A_U_T_H___S_E_T_U_P message to authenticate
the client.

     XXIIMM__AAUUTTHH__SSEETTUUPP ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              number of client‐auth‐protocol‐names
          2                         unused
          n     LISTofSTRING        server‐auth‐protocol‐names


The list specifies the names of authentication protocols the
client is willing to perform.

_X_I_M___A_U_T_H___N_G message requests to give up the connection.

     XXIIMM__AAUUTTHH__NNGG ((IIMM lliibbrraarryy ←←→→ IIMM SSeerrvveerr))


The IM Server sends _X_I_M___C_O_N_N_E_C_T___R_E_P_L_Y message as the reply
to _X_I_M___C_O_N_N_E_C_T or _X_I_M___A_U_T_H___R_E_Q_U_I_R_E_D message.

     XXIIMM__CCOONNNNEECCTT__RREEPPLLYY ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              server‐major‐protocol‐version (*1)
          2     CARD16              server‐minor‐protocol‐version (*1)



     (*1) Specify the version of IM Protocol that the IM
          Server supports.  This document specifies major
          version one, minor version zero.


Here are the state diagrams for the client and the IM
Server.

SSttaattee ttrraannssiittiioonnss ffoorr tthhee cclliieenntt

     _i_n_i_t___s_t_a_t_u_s:
          Use authorization function → _c_l_i_e_n_t___a_s_k
          Not use authorization function → _c_l_i_e_n_t___n_o___c_h_e_c_k






                             1155





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


     _s_t_a_r_t:
          Send _X_I_M___C_O_N_N_E_C_T
               If _c_l_i_e_n_t___a_s_k → _c_l_i_e_n_t___w_a_i_t_1
               If _c_l_i_e_n_t___n_o___c_h_e_c_k, client‐auth‐protocol‐
               names may be omited → _c_l_i_e_n_t___w_a_i_t_2


     _c_l_i_e_n_t___w_a_i_t_1:
          Receive _X_I_M___A_U_T_H___R_E_Q_U_I_R_E_D → _c_l_i_e_n_t___c_h_e_c_k
          Receive <other> → _c_l_i_e_n_t___N_G


     _c_l_i_e_n_t___c_h_e_c_k:
          If no more auth needed, send _X_I_M___A_U_T_H___R_E_P_L_Y →
          _c_l_i_e_n_t___w_a_i_t_2
          If good auth data, send _X_I_M___A_U_T_H___N_E_X_T →
          _c_l_i_e_n_t___w_a_i_t_1
          If bad auth data, send _X_I_M___A_U_T_H___N_G → give up on
          this protocol


     _c_l_i_e_n_t___w_a_i_t_2:
          Receive _X_I_M___C_O_N_N_E_C_T___R_E_P_L_Y → connect
          Receive _X_I_M___A_U_T_H___S_E_T_U_P → _c_l_i_e_n_t___m_o_r_e
          Receive _X_I_M___A_U_T_H___N_E_X_T → _c_l_i_e_n_t___m_o_r_e
          Receive _X_I_M___A_U_T_H___N_G → give up on this protocol
          Receive <other> → _c_l_i_e_n_t___N_G


     _c_l_i_e_n_t___m_o_r_e:
          Send _X_I_M___A_U_T_H___R_E_Q_U_I_R_E_D → _c_l_i_e_n_t___w_a_i_t_2


     _c_l_i_e_n_t___N_G:
          Send _X_I_M___A_U_T_H___N_G → give up on this protocol


SSttaattee ttrraannssiittiioonnss ffoorr tthhee IIMM SSeerrvveerr

     _i_n_i_t_‐_s_t_a_t_u_s:
          Use authorization function → _s_e_r_v_e_r___a_s_k
          Not use authorization function → _s_e_r_v_e_r___n_o___c_h_e_c_k


     _s_t_a_r_t:
          Receive _X_I_M___C_O_N_N_E_C_T → _s_t_a_r_t_2
          Receive <other> → _s_e_r_v_e_r___N_G


     _s_t_a_r_t_2:
          If _c_l_i_e_n_t___a_s_k, send _X_I_M___A_U_T_H___R_E_Q_U_I_R_E_D →
          _s_e_r_v_e_r___w_a_i_t_1
          If _c_l_i_e_n_t___n_o___c_h_e_c_k and _s_e_r_v_e_r___a_s_k, send
          _X_I_M___A_U_T_H___S_E_T_U_P → _s_e_r_v_e_r___w_a_i_t_2



                             1166





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


          If _c_l_i_e_n_t___n_o___c_h_e_c_k and _s_e_r_v_e_r___n_o___c_h_e_c_k, send
          _X_I_M___C_O_N_N_E_C_T___R_E_P_L_Y → connect


     _s_e_r_v_e_r___w_a_i_t_1:
          Receive _X_I_M___A_U_T_H___R_E_P_L_Y → _s_e_r_v_e_r_2
          Receive _X_I_M___A_U_T_H___N_E_X_T → _s_e_r_v_e_r___m_o_r_e
          Receive <other> → _s_e_r_v_e_r___N_G


     _s_e_r_v_e_r___m_o_r_e
          Send _X_I_M___A_U_T_H___R_E_Q_U_I_R_E_D → _s_e_r_v_e_r___w_a_i_t_1


     _s_e_r_v_e_r_2
          If _s_e_r_v_e_r___a_s_k, send _X_I_M___A_U_T_H___S_E_T_U_P → _s_e_r_v_e_r___w_a_i_t_2
          If _s_e_r_v_e_r___n_o___c_h_e_c_k, send _X_I_M___C_O_N_N_E_C_T___R_E_P_L_Y → con­
          nect


     _s_e_r_v_e_r___w_a_i_t_2
          Receive _X_I_M___A_U_T_H___R_E_Q_U_I_R_E_D → _s_e_r_v_e_r___c_h_e_c_k
          Receive <other> → _s_e_r_v_e_r___N_G


     _s_e_r_v_e_r___c_h_e_c_k
          If no more auth data, send _X_I_M___C_O_N_N_E_C_T___R_E_P_L_Y →
          connect
          If bad auth data, send _X_I_M___A_U_T_H___N_G → give up on
          this protocol
          If good auth data, send _X_I_M___A_U_T_H___N_E_X_T →
          _s_e_r_v_e_r___w_a_i_t_2


     _s_e_r_v_e_r___N_G
          Send _X_I_M___A_U_T_H___N_G → give up on this protocol


_X_I_M___D_I_S_C_O_N_N_E_C_T message requests to shutdown the connection
over a mutually‐understood virtual stream.

     XXIIMM__DDIISSCCOONNNNEECCTT ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))


_X_I_M___D_I_S_C_O_N_N_E_C_T is a synchronous request.  The IM library
should wait until it receives either an _X_I_M___D_I_S_C_O_N_N_E_C_T___R_E_P_L_Y
packet or an _X_I_M___E_R_R_O_R packet.


     XXIIMM__DDIISSCCOONNNNEECCTT__RREEPPLLYY ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))


_X_I_M___O_P_E_N requests to establish a logical connection between
the IM library and the IM Server.



                             1177





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


     XXIIMM__OOPPEENN ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          n     STR                 locale name
          p                         unused, p = Pad(n)


_X_I_M___O_P_E_N is a synchronous request.  The IM library should
wait until receiving either an _X_I_M___O_P_E_N___R_E_P_L_Y packet or an
_X_I_M___E_R_R_O_R packet.


     XXIIMM__OOPPEENN__RREEPPLLYY ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     n                   byte length of IM attributes supported
          n     LISTofXIMATTR       IM attributes supported
          2     m                   byte length of IC attributes supported
          2     CARD16              unused
          m     LISTofXICATTR        IC attributes supported


_X_I_M___O_P_E_N___R_E_P_L_Y message returns all supported IM and IC
attributes in LISTofXIMATTR and LISTofXICATTR.  These IM and
IC attribute IDs are used to reduce the amount of data which
must be transferred via the network. In addition, this indi­
cates to the IM library what kinds of IM/IC attributes can
be used in this session, and what types of data will be
exchanged. This allows the IM Server provider and applica­
tion writer to support IM system enhancements with new IM/IC
attributes, without modifying Xlib.  The IC value for the
separator of NestedList must be included in the LISTofXI­
CATTR.

_X_I_M___C_L_O_S_E message requests to shutdown the logical connec­
tion between the IM library and the IM Server.

     XXIIMM__CCLLOOSSEE ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     CARD16              input‐method‐ID
          2                         unused


_X_I_M___C_L_O_S_E is a synchronous request.  The IM library should
wait until receiving either an _X_I_M___C_L_O_S_E___R_E_P_L_Y packet or an
_X_I_M___E_R_R_O_R packet.


     XXIIMM__CCLLOOSSEE__RREEPPLLYY ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2                         unused



44..55..  EEvveenntt FFllooww CCoonnttrrooll

An IM Server must send _X_I_M___S_E_T___E_V_E_N_T___M_A_S_K message to the IM
library in order for events to be forwarded to the IM



                             1188





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


Server, since the IM library initially doesn’t forward any
events to the IM Server. In the protocol, the IM Server will
specify masks of X events to be forwarded and which need to
be synchronized by the IM library.


     XXIIMM__SSEETT__EEVVEENNTT__MMAASSKK ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          4     EVENTMASK           forward‐event‐mask (*1)
          4     EVENTMASK           synchronous‐event‐mask (*2)



     (*1) Specify all the events to be forwarded to the IM
          Server by the IM library.

     (*2) Specify the events to be forwarded with syn­
          chronous flag on by the IM library.


_X_I_M___S_E_T___E_V_E_N_T___M_A_S_K is an asynchronous request.  The event
masks are valid immediately after they are set until changed
by another _X_I_M___S_E_T___E_V_E_N_T___M_A_S_K message.  If input‐context‐ID
is set to zero, the default value of the input‐method‐ID
will be changed to the event masks specified in the request.
That value will be used for the IC’s which have no individ­
ual values.

Using the Dynamic Event Flow model, an IM Server sends
_X_I_M___R_E_G_I_S_T_E_R___T_R_I_G_G_E_R_K_E_Y_S message to the IM library before
sending _X_I_M___O_P_E_N___R_E_P_L_Y message.  Or the IM library may sup­
pose that the IM Server uses the Static Event Flow model.

     XXIIMM__RREEGGIISSTTEERR__TTRRIIGGGGEERRKKEEYYSS ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16                input‐method‐ID
          2                           unused
          4     n                     byte length of on‐keys
          n     LISTofXIMTRIGGERKEY   on‐keys list
          4     m                     byte length of off‐keys
          m     LISTofXIMTRIGGERKEY   off‐keys list


_X_I_M___R_E_G_I_S_T_E_R___T_R_I_G_G_E_R_K_E_Y_S is an asynchronous request.  The IM
Server notifys the IM library of on‐keys and off‐keys lists
with this message.

The IM library notifys the IM Server with _X_I_M___T_R_I_G_G_E_R___N_O_T_I_F_Y
message that a key event matching either on‐keys or off‐keys
has been occurred.


     XXIIMM__TTRRIIGGGGEERR__NNOOTTIIFFYY ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))




                             1199





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          4     CARD32              flag
                #0                  on‐keys list
                #1                  off‐keys list
          4     CARD32              index of keys list
          4     EVENTMASK           client‐select‐event‐mask (*1)



     (*1) Specify the events currently selected by the IM
          library with XSelectInput.


_X_I_M___T_R_I_G_G_E_R___N_O_T_I_F_Y is a synchronous request.  The IM library
should wait until receiving either an _X_I_M___T_R_I_G_­
_G_E_R___N_O_T_I_F_Y___R_E_P_L_Y packet or an _X_I_M___E_R_R_O_R packet.


     XXIIMM__TTRRIIGGGGEERR__NNOOTTIIFFYY__RREEPPLLYY ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID



44..66..  EEnnccooddiinngg NNeeggoottiiaattiioonn

_X_I_M___E_N_C_O_D_I_N_G___N_E_G_O_T_I_A_T_I_O_N message requests to decide which
encoding to be sent across the wire.  When the negotiation
fails, the fallback default encoding is Portable Character
Encoding.

     XXIIMM__EENNCCOODDIINNGG__NNEEGGOOTTIIAATTIIOONN ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))..sspp 66pp
          2     CARD16               input‐method‐ID
          2     n                    byte length of encodings listed by name
          n     LISTofSTR            list of encodings supported in the IM library.
          p                          unused, p = Pad(n)
          2     m                    byte length of encodings listed by detailed data
          2                          unused
          m     LISTofENCODINGINFO   list of encordings supported in the IM library


The IM Server must choose one encoding from the list sent by
the IM library.  If index of the encording determined is ‐1
to indicate that the negotiation is failed, the fallback
default encoding is used.  The message must be issued after
sending _X_I_M___O_P_E_N message via XOpenIM().  The name of encod­
ing may be registered with X Consortium.

_X_I_M___E_N_C_O_D_I_N_G___N_E_G_O_T_I_A_T_I_O_N is a synchronous request.  The IM
library should wait until receiving either an _X_I_M___E_N_C_O_D_­
_I_N_G___N_E_G_O_T_I_A_T_I_O_N___R_E_P_L_Y packet or an _X_I_M___E_R_R_O_R packet.





                             2200





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


     XXIIMM__EENNCCOODDIINNGG__NNEEGGOOTTIIAATTIIOONN__RREEPPLLYY ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              category of the encoding determined.
                #0                  name
                #1                  detailed data
          2     INT16               index of the encoding determinated.
          2                         unused



44..77..  QQuueerryy tthhee ssuuppppoorrtteedd eexxtteennssiioonn pprroottooccooll lliisstt

_X_I_M___Q_U_E_R_Y___E_X_T_E_N_S_I_O_N message requests to query the IM exten­
sions supported by the IM Server to which the client is
being connected.

     XXIIMM__QQUUEERRYY__EEXXTTEENNSSIIOONN ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     CARD16              input‐method‐ID
          2     n                   byte length of extensions supported by
                                    the IM library
          n     LISTofSTR           extensions supported by the IM library
          p                         unused, p = Pad(n)


An example of a supported extension is FrontEnd.  The mes­
sage must be issued after sending _X_I_M___O_P_E_N message via
XOpenIM().

If n is 0, the IM library queries the IM Server for all
extensions.

If n is not 0, the IM library queries whether the IM Server
supports the contents specified in the list.

If a client uses an extension request without previously
having issued a _X_I_M___Q_U_E_R_Y___E_X_T_E_N_S_I_O_N message for that exten­
sion, the IM Server responds with a _B_a_d_P_r_o_t_o_c_o_l error.  If
the IM Server encounters a request with an unknown MAJOR‐
OPCODE or MINOR‐OPCODE, it responds with a _B_a_d_P_r_o_t_o_c_o_l
error.

_X_I_M___Q_U_E_R_Y___E_X_T_E_N_S_I_O_N is a synchronous request.  The IM
library should wait until receiving either an
_X_I_M___Q_U_E_R_Y___E_X_T_E_N_S_I_O_N___R_E_P_L_Y packet or an _X_I_M___E_R_R_O_R packet.


     XXIIMM__QQUUEERRYY__EEXXTTEENNSSIIOONN__RREEPPLLYY ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     n                   byte length of extensions supported
                                    by both the IM library and the IM
                                    Server






                             2211





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


          n     LISTofEXT           list of extensions supported by
                                    both the IM library and the IM
                                    Server


_X_I_M___Q_U_E_R_Y___E_X_T_E_N_S_I_O_N___R_E_P_L_Y message returns the list of exten­
sions supported by both the IM library and the IM Server. If
the list passed in _X_I_M___Q_U_E_R_Y___E_X_T_E_N_S_I_O_N message is NULL, the
IM Server returns the full list of extensions supported by
the IM Server.  If the list is not NULL, the IM Server
returns the extensions in the list that are supported by the
IM Server.

A zero‐length string is not a valid extension name.  The IM
library should disregard any zero‐length strings that are
returned in the extension list.  The IM library does not use
the requests which are not supported by the IM Server.


44..88..  SSeettttiinngg IIMM VVaalluueess

_X_I_M___S_E_T___I_M___V_A_L_U_E_S requests to set attributes to the IM.

     XXIIMM__SSEETT__IIMM__VVAALLUUEESS ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     CARD16               input‐method‐ID
          2     n                    byte length of im‐attribute
          n     LISTofXIMATTRIBUTE   im‐attributes


The im‐attributes in _X_I_M___S_E_T___I_M___V_A_L_U_E_S message are specified
as a LISTofXIMATTRIBUTE, specifying the attributes to be
set. Attributes other than the ones returned by
_X_I_M___O_P_E_N___R_E_P_L_Y message should not be specified.

_X_I_M___S_E_T___I_M___V_A_L_U_E_S is a synchronous request. The IM library
should wait until receiving either an _X_I_M___S_E_T___I_M___V_A_L_­
_U_E_S___R_E_P_L_Y packet or an _X_I_M___E_R_R_O_R packet, because it must
receive the error attribute if _X_I_M___E_R_R_O_R message is
returned.

     XXIIMM__SSEETT__IIMM__VVAALLUUEESS__RREEPPLLYY ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2                         unused


_X_I_M___S_E_T___I_M___V_A_L_U_E_S___R_E_P_L_Y message returns the input‐method‐ID
to distinguish replies from multiple IMs.


44..99..  GGeettttiinngg IIMM VVaalluueess

_X_I_M___G_E_T___I_M___V_A_L_U_E_S requests to query IM values supported by
the IM Server currently being connected.




                             2222





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


     XXIIMM__GGEETT__IIMM__VVAALLUUEESS ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     CARD16              input‐method‐ID
          2     n                   byte length of im‐attribute‐id
          n     LISTofCARD16        im‐attribute‐id
          p                         unused, p=Pad(n)


_X_I_M___G_E_T___I_M___V_A_L_U_E_S is a synchronous request.  The IM library
should wait until it receives either an _X_I_M___G_E_T___I_M___V_A_L_­
_U_E_S___R_E_P_L_Y packet or an _X_I_M___E_R_R_O_R packet.

     XXIIMM__GGEETT__IIMM__VVAALLUUEESS__RREEPPLLYY ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16               input‐method‐ID
          2     n                    byte length of im‐attributes returned
          n     LISTofXIMATTRIBUTE   im‐attributes returned


The IM Server returns IM values with _X_I_M___G_E_T___I_M___V_A_L_U_E_S___R_E_P_L_Y
message.  The order of the returned im‐attribute values cor­
responds directly to that of the list passed with the
_X_I_M___G_E_T___I_M___V_A_L_U_E_S message.


44..1100..  CCrreeaattiinngg aann IICC

_X_I_M___C_R_E_A_T_E___I_C message requests to create an IC.


     XXIIMM__CCRREEAATTEE__IICC ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     CARD16               input‐method‐ID
          2     n                    byte length of ic‐attributes
          n     LISTofXICATTRIBUTE   ic‐attributes


The input‐context‐id is specified by the IM Server to iden­
tify the client (IC).  (It is not specified by the client in
_X_I_M___C_R_E_A_T_E___I_C message.), and it should not be set to zero.

_X_I_M___C_R_E_A_T_E___I_C is a synchronous request which returns the
input‐context‐ID.  The IM library should wait until it
receives either an _X_I_M___C_R_E_A_T_E___I_C___R_E_P_L_Y packet or an
_X_I_M___E_R_R_O_R packet.

     XXIIMM__CCRREEAATTEE__IICC__RREEPPLLYY ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID



44..1111..  DDeessttrrooyyiinngg tthhee IICC

_X_I_M___D_E_S_T_R_O_Y___I_C message requests to destroy the IC.





                             2233





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


     XXIIMM__DDEESSTTRROOYY__IICC ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID


_X_I_M___D_E_S_T_R_O_Y___I_C is a synchronous request. The IM library
should not free its resources until it receives an
_X_I_M___D_E_S_T_R_O_Y___I_C___R_E_P_L_Y message because _X_I_M___D_E_S_T_R_O_Y___I_C message
may result in Callback packets such as _X_I_M___P_R_E_E_D_I_T___D_R_A_W and
_X_I_M___P_R_E_E_D_I_T___D_O_N_E_.


     XXIIMM__DDEESSTTRROOYY__IICC__RREEPPLLYY ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID



44..1122..  SSeettttiinngg IICC VVaalluueess

_X_I_M___S_E_T___I_C___V_A_L_U_E_S messages requests to set attributes to the
IC.

     XXIIMM__SSEETT__IICC__VVAALLUUEESS ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     CARD16               input‐method‐ID
          2     CARD16               input‐context‐ID
          2     n                    byte length of ic‐attributes
          2                          unused
          n     LISTofXICATTRIBUTE   ic‐attributes


The ic‐attributes in _X_I_M___S_E_T___I_C___V_A_L_U_E_S message are specified
as a LISTofXICATTRIBUTE, specifying the attributes to be
set. Attributes other than the ones returned by
_X_I_M___O_P_E_N___R_E_P_L_Y message should not be specified.

_X_I_M___S_E_T___I_C___V_A_L_U_E_S is a synchronous request. The IM library
should wait until receiving either an _X_I_M___S_E_T___I_C___V_A_L_­
_U_E_S___R_E_P_L_Y packet or an _X_I_M___E_R_R_O_R packet, because it must
receive the error attribute if _X_I_M___E_R_R_O_R message is
returned.

     XXIIMM__SSEETT__IICC__VVAALLUUEESS__RREEPPLLYY ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID



44..1133..  GGeettttiinngg IICC VVaalluueess

_X_I_M___G_E_T___I_C___V_A_L_U_E_S message requests to query IC values sup­
ported by the IM Server currently being connected.





                             2244





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


     XXIIMM__GGEETT__IICC__VVAALLUUEESS ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          2     n                   byte length of ic‐attribute‐id
          n     LISTofCARD16        ic‐attribute‐id
          p                         unused, p=Pad(2+n)


In LISTofCARD16, the appearance of the ic‐attribute‐id for
the separator of NestedList shows the end of the heading
nested list.

_X_I_M___G_E_T___I_C___V_A_L_U_E_S is a synchronous request and returns each
attribute with its values to show the correspondence.  The
IM library should wait until receiving either an
_X_I_M___G_E_T___I_C___V_A_L_U_E_S___R_E_P_L_Y packet or an _X_I_M___E_R_R_O_R packet.

     XXIIMM__GGEETT__IICC__VVAALLUUEESS__RREEPPLLYY ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16               input‐method‐ID
          2     CARD16               input‐context‐ID
          2     n                    byte length of ic‐attribute
          2                          unused
          n     LISTofXICATTRIBUTE   ic‐attribute



44..1144..  SSeettttiinngg IICC FFooccuuss

_X_I_M___S_E_T___I_C___F_O_C_U_S message requests to set the focus to the
IC.

     XXIIMM__SSEETT__IICC__FFOOCCUUSS ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID


_X_I_M___S_E_T___I_C___F_O_C_U_S is an asynchronous request.


44..1155..  UUnnsseettttiinngg IICC FFooccuuss

_X_I_M___U_N_S_E_T___I_C___F_O_C_U_S message requests to unset the focus to
the focused IC.

     XXIIMM__UUNNSSEETT__IICC__FFOOCCUUSS ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID


_X_I_M___U_N_S_E_T___I_C___F_O_C_U_S is an asynchronous request.







                             2255





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


44..1166..  FFiilltteerriinngg EEvveennttss

Event filtering is mainly provided for BackEnd method to
allow input method to capture X events transparently to
clients.

X Events are forwarded by _X_I_M___F_O_R_W_A_R_D___E_V_E_N_T message.  This
message can be operated both synchronously and asyn­
chronously.  If the requester sets the synchronous flag, the
receiver must send _X_I_M___S_Y_N_C___R_E_P_L_Y message back to the
requester when all the data processing is done.

PPrroottooccooll ffllooww ooff BBaacckkEEnndd mmooddeell


With BackEnd method, the protocol flow can be classified
into two methods in terms of synchronization, depending on
the synchronous‐eventmask of _X_I_M___S_E_T___E_V_E_N_T___M_A_S_K message.
One can be called on‐demand‐synchronous method and another
can be called as full‐synchronous method.

In on‐demand‐synchronous method, the IM library always
receives _X_I_M___F_O_R_W_A_R_D___E_V_E_N_T or _X_I_M___C_O_M_M_I_T message as a syn­
chronous request. Also, the IM Server needs to synchronously
process the correspondent reply from the IM library and the
following _X_I_M___F_O_R_W_A_R_D___E_V_E_N_T message sent from the IM library
when any of the event causes the IM Server to send _X_I_M___F_O_R_­
_W_A_R_D___E_V_E_N_T or _X_I_M___C_O_M_M_I_T message to the IM library, so that
the input service is consistent.  If the IM library gets the
control back from the application after receiving the syn­
chronous request, the IM library replies for the synchronous
request before processing any of the events. In this time,
the IM Server blocks _X_I_M___F_O_R_W_A_R_D___E_V_E_N_T message which is sent
by the IM library, and handles it after receiving the reply.
However, the IM Server handles the other protocols at any
time.

In full‐synchronous method, the IM library always sends
_X_I_M___F_O_R_W_A_R_D___E_V_E_N_T message to the IM Server as a synchronous
request. Therefore, the reply to it from the IM Server will
be put between the _X_I_M___F_O_R_W_A_R_D___E_V_E_N_T message and its
_X_I_M___S_Y_N_C___R_E_P_L_Y message.  In case of sending _X_I_M___F_O_R_­
_W_A_R_D___E_V_E_N_T or _X_I_M___C_O_M_M_I_T message, the IM Server should set
the synchronous flag off. Because the synchronization can be
done by the following _X_I_M___S_Y_N_C___R_E_P_L_Y message.


SSaammppllee PPrroottooccooll ffllooww cchhaarrtt 11

Following chart shows one of the simplest protocol flow
which only deals with keyevents for preediting operation.

... 0.425 6.888 6.3 10.296 ... 0.000i 3.408i 5.875i 0.000i




                             2266





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


             Xlib API    IM library               IM Server
  Key ev_e_n_t-_-XNextEvent        ││                  ││
             XFilterE-v-e-n-t-------│                  │
                              --│ XIM_FORWARD_EVENT│
                               │                --│
  Key ev_e_n_t-_-XNextEvent        │ XIM_FORWARD_EV-E-NT│synchronous
             XFilterEvent      │ or XIM_COMMIT    │request
                              --│ (synchronous)    │
                     -----------│--              --│      ___
             XNextEve-n-t        │                --│Pending  ││
             XFilterEvent (retu│rnsXIFMa_lFsOeR)WARD_EVENT│         │
       -_-____ XmbLookupString   │                  │         │
 Application moves           --│  XIM_SYNC      --│         │
 the focus   XSetICFoc_u_s_____-_-_│___X_I_M___S_Y_N_C___R_E_P_L_Y-_-│         │
                               │-_-________________ │processed│
                               │  XIM_SET_IC_FOCUS│(The focu│sed
                               │                --│IC is cha│nged)
             XNextEvent        │XIM_SYNC_REPLY a-s-│aprroecpelsysed│
                              --│of the XIM_FORWARD│_EVENT    │
                             --│                  │         │
                               │               -- │proces-s-e-d-│



                 Fig.2 Sample Protocol Flow


SSaammppllee PPrroottooccooll ffllooww cchhaarrtt 22

Following chart shows one of the complex protocol flow,
which deals with multiple focus windows and button press
event as well as keyevent, and the focus is moved by the
application triggered by both of keyevent and button press
event.























                             2277





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


... 0.425 5.575 6.3 10.296 ... 0.000i 4.721i 5.875i 0.000i

             Xlib API    IM library               IM Server
  Key ev_e_n_t-_-XNextEvent        ││                  ││
             XFilterE-v-e-n-t-------│                  │
                              --│ XIM_FORWARD_EVENT│
                               │               -- │
  Key ev_e_n_t-_-XNextEvent        │ XIM_FORWARD_EVENT│synchronous
             XFilterEvent      │ or XIM_COMMIT    │request
                              --│ (synchronous)    │
  Bfuotctuosn_c_ph_ra-en-sgseXSceatuIsCeFsocus       │                --│Pendin_g__
                      Pending -u-│ntXiIlM_FORWARD_EVENT│         ││
                      sync cycl│e--is doXnIeM_SYNC  --│         │
                               │--                │         │
                               │-- XIM_SYNC_REPLY │         │
             XNextEve-n-t       --│-XIM_SET_IC_FOCUS i│s         │
             XFilterEvent (re││tu│rnpsenFdalbseec)ause anoth│er sync cy│cle
       -_-____ XmbLookupString │ │is started by XIM_│COMMIT    │
 Application moves           │ │                  │         │
 the focus   XSetICFoc_u_s_____-│_-_│ XIM_SET_IC_FOCUS │         │
                             │ │                --│processed│
                             │ │                --│(The focu│sed
                             │ │                  │IC is cha│nged)
 Key ev_e_n_t_--XNextEvent      │ │XIM_SYNC_REPLY as │aprroecpelsysed│
                             │ │of the XIM_FORWARD│_EVENT    │
             XFilterEvent    -│--│                  │         │
                             -│+│               -- │proces-s-e-d-│
                             -+│   XIM_SET_IC_FOCU│S
                               │               -- │processed
                               │               -- │
                               │XIM_FORWARD_EVENT │



              Fig.3 Sample Protocol Flow chart



     XXIIMM__FFOORRWWAARRDD__EEVVEENNTT ((IIMM lliibbrraarryy ←←→→ IIMM SSeerrvveerr))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          2     BITMASK16           flag
                #0001               synchronous
                #0002               request filtering (*1)
                #0004               request lookupstring (*2)
          2     CARD16              serial number
                XEVENT              X event



     (*1) Indicate the receiver should filter events and
          possible preedit may be invoked.





                             2288





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


     (*2) Indicate the receiver should only do lookup
          string. The IM Server is expected to just do a
          conversion of the key event to the best candidate.
          This bit may affect the state of the preedit state
          (e.g. compose of dead key sequences).

XEVENT format is same as the X Protocol event for­
mat(xEvent).  As the value of xEvent’s sequenceNumber is the
bottom of 16 bit of XEvent’s xany.serial, the top of 16 bit
is sent by serial number(INT16).

_X_I_M___F_O_R_W_A_R_D___E_V_E_N_T message is used for forwarding the events
from the IM library to the IM Server in order for IM to be
able to filter the event. On the other hand, this message is
also used for forwarding the events from the IM Server to
the IM library if the event forwarded from the IM library is
not filtered.  The IM Server, which receives _X_I_M___F_O_R_­
_W_A_R_D___E_V_E_N_T message without synchronous bit, should set syn­
chronous bit.  If both ‘‘request event filtering’’ and
‘‘request lookupstring’’ flag are set, then both filtering
and lookup should be done for the same event.


44..1177..  SSyynncchhrroonniizziinngg wwiitthh tthhee IIMM SSeerrvveerr

_X_I_M___S_Y_N_C message requests to synchronize the IM library and
the IM Server.

     XXIIMM__SSYYNNCC ((IIMM lliibbrraarryy ←←→→ IIMM SSeerrvveerr))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID


This synchronization can be started either on the IM library
side or on the IM Server side.  The side which receives
_X_I_M___S_Y_N_C message should process all XIM requests before
replying. The input‐context‐ID is necessary to distinguish
the IC with which the IM library and the IM Server are syn­
chronized.

     XXIIMM__SSYYNNCC__RREEPPLLYY ((IIMM SSeerrvveerr ←←→→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID


The side which receives _X_I_M___F_O_R_W_A_R_D___E_V_E_N_T_, _X_I_M___C_O_M_M_I_T or any
other message with synchronous bit, should process all XIM
request before replying, and send _X_I_M___S_Y_N_C___R_E_P_L_Y message as
the reply to the previous message.








                             2299





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


44..1188..  SSeennddiinngg aa ccoommmmiitttteedd ssttrriinngg

When the IM Server commits a string, the IM Server sends
either the committed string or list of KeySym, or both, by
_X_I_M___C_O_M_M_I_T message.

     XXIIMM__CCOOMMMMIITT ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          2     BITMASK16           flag
                #0001               synchronous
                #0002               XLookupChars
                #0004               XLookupKeySym
                #0006                XLookupBoth = XLookupChars | XLookupKeySym


     If flag is XLookupKeySym, the arguments continue as
     follows:

          2                         unused
          4     KEYSYM              KeySym


     If flag is XLookupChars, the arguments continue as fol­
     lows:

          2     m                   byte length of committed string
          m     LISTofBYTE          committed string
          p                         unused, p = Pad(m)


     If flag is XLookupBoth, the arguments continue as fol­
     lows:

          2                         unused
          4     KEYSYM              KeySym
          2     n                   byte length of committed string
          n     LISTofBYTE          committed string
          p                         unused, p = Pad(2+n)


The IM Server which receives _X_I_M___C_O_M_M_I_T message without syn­
chronous bit should set synchronous bit.


44..1199..  RReesseett IICC

_X_I_M___R_E_S_E_T___I_C message requests to reset the status of IC in
the IM Server.

     XXIIMM__RREESSEETT__IICC ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID




                             3300





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


_X_I_M___R_E_S_E_T___I_C is a synchronous request. The IM library should
wait until receiving either an _X_I_M___R_E_S_E_T___I_C___R_E_P_L_Y packet or
an _X_I_M___E_R_R_O_R packet.


     XXIIMM__RREESSEETT__IICC__RREEPPLLYY ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          2     n                   byte length of preedit string
          n     LISTofBYTE          preedit string
          p                         unused, p = Pad(2+n)


_X_I_M___R_E_S_E_T___I_C___R_E_P_L_Y message returns the input‐context‐ID to
distinguish replies from multiple ICs.


44..2200..  CCaallllbbaacckkss

If XIMStyle has XIMPreeditArea or XIMStatusArea set, XIMGe­
ometryCallback may be used, and if XIMPreeditCallback and/or
XIMStatusCallback are set, corresponding callbacks may be
used.

Any callback request may be sent from an IM Server to an IM
client asynchronously in response to any request previously
sent by the IM client to the IM Server.

When an IM Server needs to send a callback request syn­
chronously with the request previously sent by an IM client,
the IM Server sends it before replying to the previous
request.


44..2200..11..  NNeeggoottiiaattiinngg ggeeoommeettrryy

The IM Server sends _X_I_M___G_E_O_M_E_T_R_Y message to start geometry
negotiation, if XIMStyle has XIMPreeditArea or XIMStatusArea
set.

     XXIIMM__GGEEOOMMEETTRRYY ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID


There is always a single Focus Window, even if some input
fields have only one IC.


44..2200..22..  CCoonnvveerrttiinngg aa ssttrriinngg


     XXIIMM__SSTTRR__CCOONNVVEERRSSIIOONN ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))




                             3311





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          2     CARD16              XIMStringConversionPosition
          2                         unused
          4     CARD32              XIMCaretDirection
                #0                  XIMForwardChar
                #1                  XIMBackwardChar
                #2                  XIMForwardWord
                #3                  XIMBackwardWord
                #4                  XIMCaretUp
                #5                  XIMCaretDown
                #6                  XIMNextLine
                #7                  XIMCPreviousLine
                #8                  XIMLineStart
                #9                  XIMLineEnd
                #10                 XIMAbsolutePosition
                #11                 XIMDontChange
          2     CARD16              factor
          2     CARD16              XIMStringConversionOperation
                #0001               XIMStringConversionSubstitution
                #0002               XIMStringConversionRetrieval
          2     INT16               byte length to multiply the XIM­
                                    StringConversionType



_X_I_M___S_T_R___C_O_N_V_E_R_S_I_O_N message may be used to start the string
conversion from the IM Server.


     XXIIMM__SSTTRR__CCOONNVVEERRSSIIOONN__RREEPPLLYY ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          4     CARD32              XIMStringConversionFeedback
                XIMSTRCONVTEXT      XIMStringConversionText



_X_I_M___S_T_R___C_O_N_V_E_R_S_I_O_N___R_E_P_L_Y message returns the string to be
converted and the feedback information array.


44..2200..33..  PPrreeeeddiitt CCaallllbbaacckkss

The IM Server sends _X_I_M___P_R_E_E_D_I_T___S_T_A_R_T message to call the
XIMPreeditStartCallback function.

     XXIIMM__PPRREEEEDDIITT__SSTTAARRTT ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID


The reply to this message must be sent synchronously. The
reply forwards the return value from the callback function



                             3322





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


to the IM Server.

     XXIIMM__PPRREEEEDDIITT__SSTTAARRTT__RREEPPLLYY ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          4     INT32               return value


_X_I_M___P_R_E_E_D_I_T___S_T_A_R_T___R_E_P_L_Y message returns the input‐context‐ID
to distinguish replies from multiple IC’s.  The return value
contains the return value of the function XIMPreeditStart­
Callback.

The IM Server sends _X_I_M___P_R_E_E_D_I_T___D_R_A_W message to call the
XIMPreeditDrawCallback function.

     XXIIMM__PPRREEEEDDIITT__DDRRAAWW ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          4     INT32               caret
          4     INT32               chg_first
          4     INT32               chg_length
          4     BITMASK32           status
                #x0000001           no string
                #x0000002           no feedback
          2     n                   length of preedit string
          n     STRING8             preedit string
          p                         unused, p = Pad(2+n)
          2     m                   byte length of feedback array
          2                         unused
          m     LISTofXIMFEEDBACK   feedback array


The fields ‘‘caret’’, ‘‘chg_first’’ and ‘‘chg_length’’ cor­
respond to the fields of XIMPreeditDrawCallbackStruct.  When
the ‘‘no string’’ bit of the status field is set, the text
field of XIMPreeditDrawCallbackStruct is NULL.  When the
‘‘no feedback’’ bit of the status field is set, the text
feedback field of XIMPreeditDrawCallbackStruct is NULL.
When the above bits are not set, ‘‘preedit string’’ contains
the preedit string to be displayed, and the feedback array
contains feedback information.

The IM Server sends _X_I_M___P_R_E_E_D_I_T___C_A_R_E_T message to call the
PreeditCaretCallback function.

     XXIIMM__PPRREEEEDDIITT__CCAARREETT ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          4     INT32               position
          4     CARD32              direction
                #0                  XIMForwardChar
                #1                  XIMBackwardChar




                             3333





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


                #2                  XIMForwardWord
                #3                  XIMBackwardWord
                #4                  XIMCaretUp
                #5                  XIMCaretDown
                #6                  XIMNextLine
                #7                  XIMCPreviousLine
                #8                  XIMLineStart
                #9                  XIMLineEnd
                #10                 XIMAbsolutePosition
                #11                 XIMDontChange
          4     CARD32              style
                #0                  XIMInvisible
                #1                  XIMCPrimary
                #2                  XIMSecondary


Each entry corresponds to a field of XIMPreeditCaretCall­
backStruct.  Since this callback sets the caret position,
its reply must be sent synchronously.

     XXIIMM__PPRREEEEDDIITT__CCAARREETT__RREEPPLLYY ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          4     CARD32              position


The position is the value returned by the callback function
after it has been called.

The IM Server sends _X_I_M___P_R_E_E_D_I_T___D_O_N_E message to call the
XIMPreeditDoneCallback function.

     XXIIMM__PPRREEEEDDIITT__DDOONNEE ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID



44..2200..44..  PPrreeeeddiitt ssttaattee nnoottiiffyy

     XXIIMM__PPRREEEEDDIITTSSTTAATTEE ((IIMM SSeerrvveerr →→ IIMM LLiibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          4     BITMASK32           XIMPreeditState
                #x0000000           XIMPreeditUnknown
                #x0000001           XIMPreeditEnable
                #x0000002           XIMPreeditDisable




_X_I_M___P_R_E_E_D_I_T_S_T_A_T_E message is used to call the XIMPreedit­
StateNotifyCallback function.




                             3344





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


44..2200..55..  SSttaattuuss CCaallllbbaacckkss

The IM Server sends _X_I_M___S_T_A_T_U_S___S_T_A_R_T message to call the
XIMStatusStartCallback function.

     XXIIMM__SSTTAATTUUSS__SSTTAARRTT ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID


The IM Server sends _X_I_M___S_T_A_T_U_S___D_R_A_W message to call the XIM­
StatusDrawCallback function.

     XXIIMM__SSTTAATTUUSS__DDRRAAWW ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          4     CARD32              type
                #0                  XIMTextType
                #1                  XIMBitmapType


     If type is XIMTextType, the arguments continue as fol­
     lows.

          4     BITMASK32           status
                #x0000001           no string
                #x0000002           no feedback
          2     n                   length of status string
          n     STRING8             status string
          p                         unused, p = Pad(2+n)
          2     m                   byte length of feedback array
          2                         unused
          m     LISTofXIMFEEDBACK   feedback array


     If type is XIMBitmapType, the arguments continue as
     follows.

          4     PIXMAP              pixmap data


The field ‘‘type’’ corresponds to the field in XIMStatus­
DrawCallbackStruct.

The IM Server sends _X_I_M___S_T_A_T_U_S___D_O_N_E message to call the XIM­
StatusDoneCallback function.

     XXIIMM__SSTTAATTUUSS__DDOONNEE ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID







                             3355





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


55..  AAcckknnoowwlleeddggeemmeennttss

This document represents the culmination of several years of
debate and experiments done under the auspices of the MIT X
Consortium i18n working group.  Although this was a group
effort, the author remains responsible for any errors or
omissions.

We would like to thank to all members of this group.  And we
would like to make special thanks to the following people
(in alphabetical order) for their participation in the IM
Protocol design, Hector Chan, Takashi Fujiwara, Yoshio Hori­
uchi, Makoto Inada, Hiromu Inukai, Mickael Kung, Seiji
Kuwari, Franky Ling, Hiroyuki Machida, Hiroyuki Miyamoto,
Frank Rojas, Bob Scheifler, Makiko Shimamura, Shoji
Sugiyama, Hidetoshi Tajima, Masaki Takeuchi, Makoto Waka­
matsu, Masaki Wakao, Nobuyuki Tanaka, Shigeru Yamada, Kat­
suhisa Yano, Jinsoo Yoon.


66..  RReeffeerreenncceess

All of the following documents are X Consortium standards
available from MIT:

[1] Scheifler, Robert W., _‘_‘_X _W_i_n_d_o_w _S_y_s_t_e_m _P_r_o_t_o_c_o_l _V_e_r_s_i_o_n
_1_1_’_’

[2] Scheifler, Robert W. etc., _‘_‘_X_l_i_b _− _C _L_a_n_g_u_a_g_e _X _I_n_t_e_r_­
_f_a_c_e_’_’



























                             3366





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


                         AAppppeennddiixx AA

                     CCoommmmoonn EExxtteennssiioonnss


Extension opcodes and packet names (e.g.
_X_I_M___E_X_T___S_E_T___E_V_E_N_T___M_A_S_K ) for additional extensions may be
registered with X Consortium.  The following is a commonly
well‐known extended packet.



((11))  Extension to manipulate the event handling

_X_I_M___E_X_T___S_E_T___E_V_E_N_T___M_A_S_K message specifies the set of event
masks that the IM library should manipulate.

     XXIIMM__EEXXTT__SSEETT__EEVVEENNTT__MMAASSKK ((IIMM SSeerrvveerr →→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          4     EVENTMASK           filter‐event‐mask (*1)
          4     EVENTMASK           intercept‐event‐mask (*2)
          4     EVENTMASK           select‐event‐mask (*3)
          4     EVENTMASK           forward‐event‐mask (*4)
          4     EVENTMASK           synchronous‐event‐mask (*5)


     (*1) Specify the events to be neglected by the IM
          library via XFilterEvent.

     (*2) Specify the events to be deselected by the IM
          library with XSelectInput.

     (*3) Specify the events to be selected by the IM
          library with XSelectInput.

     (*4) Specify all the events to be forwarded to the IM
          Server by the IM library.

     (*5) Specify the events to be forwarded with syn­
          chronous flag on by the IM library.

The IM library must reply _X_I_M___S_Y_N_C___R_E_P_L_Y message to the IM
Server. This request is valid after the ic is created.



((22))  Extension for improvement of performance

The following requests may be used for improvement of per­
formance.

_X_I_M___E_X_T___F_O_R_W_A_R_D___K_E_Y_E_V_E_N_T message may be used instead of
_X_I_M___F_O_R_W_A_R_D___E_V_E_N_T message.



                             3377





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


     XXIIMM__EEXXTT__FFOORRWWAARRDD__KKEEYYEEVVEENNTT ((IIMM SSeerrvveerr ←←→→ IIMM lliibbrraarryy))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          2     BITMASK16           flag
                #0001               synchronous
          2     CARD16              sequence number
          1     BYTE                xEvent.u.u.type
          1     BYTE                keycode
          2     CARD16              state
          4     CARD32              time
          4     CARD32              window














































                             3388





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


_X_I_M___E_X_T___M_O_V_E message may be used to change the spot location
instead of  XIM_SET_IC_VALUES message.  It is effective only
if the client specified XIMPreeditPosition.

     XXIIMM__EEXXTT__MMOOVVEE ((IIMM lliibbrraarryy →→ IIMM SSeerrvveerr))
          2     CARD16              input‐method‐ID
          2     CARD16              input‐context‐ID
          2     INT16               X
          2     INT16               Y


_X_I_M___E_X_T___M_O_V_E message is a asynchronous request.













































                             3399





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


                         AAppppeennddiixx BB

TThhee lliisstt ooff ttrraannssppoorrtt ssppeecciiffiicc IIMM SSeerrvveerr aaddddrreessss ffoorrmmaatt rreeggiisstteerreedd


The following format represents the ATOM contained in
_X_I_M___S_E_R_V_E_R_S property and the string returned from the
request converting selection target LOCALES and TRANSPORT.

          ‘‘{@_c_a_t_e_g_o_r_y=[_v_a_l_u_e,...]}...’’


The following categories are currently registered.

     sseerrvveerr      : IM Server name (used for XIM_SERVERS)
     llooccaallee      : XPG4 locale name (LOCALES)
     ttrraannssppoorrtt   : transport‐specific name (TRANSPORT)


The preregistered formats for transport‐specific names are
as follows:

     TTCCPP//IIPP NNaammeess

          The following syntax should be used for system
          internal domain names:

               <_l_o_c_a_l _n_a_m_e>  ::= ‘‘local/’’<_h_o_s_t_n_a_m_e>‘‘:’’<_p_a_t_h_n_a_m_e>


          Where <_p_a_t_h_n_a_m_e> is a path name of socket address.

          IM Server’s name should be set to <_p_a_t_h_n_a_m_e> to
          run multiple IM Server at the same time

          The following syntax should be used for Internet
          domain names:

               <_T_C_P _n_a_m_e>  ::=  ‘‘tcp/’’<_h_o_s_t_n_a_m_e>‘‘:’’<_i_p_p_o_r_t_n_u_m_b_e_r>

          where <_h_o_s_t_n_a_m_e> is either symbolic (such as
          expo.lcs.mit.edu) or numeric decimal (such as
          18.30.0.212).  The <_i_p_p_o_r_t_n_u_m_b_e_r> is the port on
          which the IM Server is listening for connections.
          For example:

               tcp/expo.lcs.mit.edu:8012
               tcp/18.30.0.212:7890


     DDEECCnneett NNaammeess

          The following syntax should be used for DECnet
          names:



                             4400





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


               <_D_E_C_n_e_t _n_a_m_e>  ::=  ‘‘decnet/’’<_n_o_d_e_n_a_m_e>‘‘::IMSERVER$’’<_o_b_j_n_a_m_e>

          where <_n_o_d_e_n_a_m_e> is either symbolic (such as
          SRVNOD) or the numeric decimal form of the DECnet
          address (such as 44.70).  The <_o_b_j_n_a_m_e> is normal,
          case‐insensitive DECnet object name. For example:

               DECNET/SRVNOD::IMSERVER$DEFAULT
               decnet/44.70::IMSERVER$other


     XX NNaammeess

          The following syntax should be used for X names:

               <_X _n_a_m_e>  ::=  ‘‘X/’’


If a given category has multiple values, the value is evalu­
ated in order of setting.





































                             4411





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


                         AAppppeennddiixx CC

                      PPrroottooccooll nnuummbbeerr


MMaajjoorr PPrroottooccooll nnuummbbeerr

         XIM_CONNECT                           #001
         XIM_CONNECT_REPLY                     #002
         XIM_DISCONNECT                        #003
         XIM_DISCONNECT_REPLY                  #004

         XIM_AUTH_REQUIRED                     #010
         XIM_AUTH_REPLY                        #011
         XIM_AUTH_NEXT                         #012
         XIM_AUTH_SETUP                        #013
         XIM_AUTH_NG                           #014

         XIM_ERROR                             #020

         XIM_OPEN                              #030
         XIM_OPEN_REPLY                        #031
         XIM_CLOSE                             #032
         XIM_CLOSE_REPLY                       #033
         XIM_REGISTER_TRIGGERKEYS              #034
         XIM_TRIGGER_NOTIFY                    #035
         XIM_TRIGGER_NOTIFY_REPLY              #036
         XIM_SET_EVENT_MASK                    #037
         XIM_ENCODING_NEGOTIATION              #038
         XIM_ENCODING_NEGOTIATION_REPLY        #039
         XIM_QUERY_EXTENSION                   #040
         XIM_QUERY_EXTENSION_REPLY             #041
         XIM_SET_IM_VALUES                     #042
         XIM_SET_IM_VALUES_REPLY               #043
         XIM_GET_IM_VALUES                     #044
         XIM_GET_IM_VALUES_REPLY               #045

         XIM_CREATE_IC                         #050
         XIM_CREATE_IC_REPLY                   #051
         XIM_DESTROY_IC                        #052
         XIM_DESTROY_IC_REPLY                  #053
         XIM_SET_IC_VALUES                     #054
         XIM_SET_IC_VALUES_REPLY               #055
         XIM_GET_IC_VALUES                     #056
         XIM_GET_IC_VALUES_REPLY               #057
         XIM_SET_IC_FOCUS                      #058
         XIM_UNSET_IC_FOCUS                    #059
         XIM_FORWARD_EVENT                     #060
         XIM_SYNC                              #061
         XIM_SYNC_REPLY                        #062
         XIM_COMMIT                            #063
         XIM_RESET_IC                          #064
         XIM_RESET_IC_REPLY                    #065




                             4422





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22



         XIM_GEOMETRY                          #070
         XIM_STR_CONVERSION                    #071
         XIM_STR_CONVERSION_REPLY              #072
         XIM_PREEDIT_START                     #073
         XIM_PREEDIT_START_REPLY               #074
         XIM_PREEDIT_DRAW                      #075
         XIM_PREEDIT_CARET                     #076
         XIM_PREEDIT_CARET_REPLY               #077
         XIM_PREEDIT_DONE                      #078
         XIM_STATUS_START                      #079
         XIM_STATUS_DRAW                       #080
         XIM_STATUS_DONE                       #081
         XIM_PREEDITSTATE                      #082


(*) The IM Server’s extension protocol number should be more
than #128.







































                             4433





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


                         AAppppeennddiixx DD

                    IImmpplleemmeennttaattiioonn TTiippss



((11))  FrontEnd Method

FrontEnd method is recognized as a performance acceleration
by the trade off of the variety of the reliability.

In order to use the FrontEnd method, the IM library must
query the IM Server to see if the FrontEnd extension is
available.  The query is made by using the _X_I_M___Q_U_E_R_Y___E_X_T_E_N_­
_S_I_O_N message. The IM Server may send _X_I_M___E_X_T___S_E_T___E_V_E_N_T___M_A_S_K
message with intercept‐event‐mask, forward‐event‐mask, and
synchronous‐event‐mask values set after replying
_X_I_M___Q_U_E_R_Y___E_X_T_E_N_S_I_O_N___R_E_P_L_Y message.

FrontEnd method can be implemented in a couple of ways
depending on how the IM Server utilize
_X_I_M___E_X_T___S_E_T___E_V_E_N_T___M_A_S_K message.

One approach is to update both of the input mask and the
filter‐event‐mask depending on the preeidting state. The
sample protocol sequence using the static event flow is as
follows:


... 1.675 6.888 6.237 10.296 ... 0.000i 3.408i 4.562i 0.000i

                IM library                  IM Server
       Keys in the on‐k││ey‐list              ││
             ________-_-│__X_I_M___F_O_R_W_A_R_D___E_V_E-_N-T  │
                       │-_-________________   │
                       │XIM_EXT_SET_EVENT_MA│SK
         event mask is │chainngteedrcept‐event‐ma│sekveinstsmeatsk is changed
         to deselect th│e event              │to select the event
                       │                    │
                       │                    │-_-______
                       │                    │--
                       │                    │ X events directly come
                       │                    │ to the IM Server.
                       │                    │ when preediting is turning off
                       │-_-________________   │
         event mask is │cXhIaMn_gEeXdT_SET_EVENT_MA│SKevent mask is changed
         to select the │evesnetlect‐event‐mask │istosedteselect the event
                       │                    │
                       │                    │
                       │                    │
                       │                    │
                       │                    │





                             4444





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


To pursuit a maximum performance regardless of the preedit­
ing mode, the IM Server may use the dynamic event flow with
the following sample protocol sequence.






















































                             4455





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


... 1.675 6.888 6.237 10.296 ... 0.000i 3.408i 4.562i 0.000i

                IM library                  IM Server
       Keys in the on‐k││ey‐list              ││
             ________-_-│__X_I_M___T_R_I_G_G_E_R___N_O_T-_I-FY │
                       │-_-________________   │
                       │XIM_EXT_SET_EVENT_MA│SK
         event mask is │chainngteedrcept‐event‐ma│sekveinstsmeatsk is changed
         to deselect th│eXIeMv_eTnRtIGGER_NOTIFY_R│EtPoLYselect the event
                       │-_-________________   │
                       │                    │-_-______
                       │                    │--
                       │                    │ X events directly come
                       │                    │ to the IM Server.
                       │                    │ when preediting is turning off
                       │-_-________________   │
         event mask is │cXhIaMn_gEeXdT_SET_EVENT_MA│SKevent mask is changed
         to select the │evesnetlect‐event‐mask │istosedteselect the event
                       │                    │
                       │                    │
                       │                    │
                       │                    │
                       │                    │


This method can reduce the XIM protocol traffic dramatically
by updating intercept‐event‐mask and select‐event‐mask
accordingly.  The tradeoff of this performance improvement
is that the key events may be lost or disordered in some
particular situation, such as when the user types the key­
board in following sequence really fast:
     <preediting on key>‘‘some strings’’<preediting off
     key>‘‘another string’’
Since this method requires the input mask updates to the
both the IM Server and Xlib when turning on and off the
preediting, and there is a time lag till the requests take
effect when two client issues the input mask updates simul­
taneously.

Another approach of the FrontEnd method is to update the
filter‐event‐mask depending on the preediting state and not
to update the input mask.  The IM Server must register both
of the preediting on key list and off key list by _X_I_M___R_E_G_I_S_­
_T_E_R___T_R_I_G_G_E_R_K_E_Y_S message.  In this method, Both the IM Server
and the IM client select the same events on the same
client’s window, so that the events are delivered to both of
the IM Server and the client. The preediting on and off
states are expressed by whether the key events are filtered
or not.  The sample protocol sequence are as follows:








                             4466





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


<<Using static event flow>>


... 1.488 7.325 6.487 10.358 ... 0.000i 3.033i 4.999i 0.000i

                IM library                  IM Server

     Keys in _t_h_e__o_n_‐_k-_e-││y‐_l_iX_sI_tM___F_O_R_W_A_R_D___E_V_E-_N-T  ││-_-__K_e_y_s__i_n_the on‐key‐list
                      │ -_-_______________-_-  │--
                      │ XIM_EXT_SET_EVENT_MA│SK
           the specifi│ed efvielnttesr‐event‐mask │isthseetspecified events
           are being f│iltered               │ are being processed
                      │                     │
                      │                     │
      Keys in the off‐│key‐list              │  Keys in the off‐key‐list
             ________-_-│                     │-_-_________
                      │  -_-________________  │
                      │ XIMf_iElXtTe_rS‐EeTv_eEnVtE‐NmTa_sMkA│SiKs set
                      │                     │
           the specifi│ed events             │ the specified events
           are being p│rocessed              │ are being discarded
                      │                     │
                      │                     │
                      │                     │
                      │                     │

<<Using the dynamic event flow>>

... 1.488 7.325 6.487 10.358 ... 0.000i 3.033i 4.999i 0.000i

                IM library                  IM Server

     Keys in _t_h_e__o_n_‐_k-_e-││y‐_l_Xi_Is_Mt___T_R_I_G_G_E_R___N_O_T-_I-FY ││-_-__K_e_y_s__i_n_the on‐key‐list
                      │ -_-_______________-_-  │--
                      │ XIM_EXT_SET_EVENT_MA│SK
           the specifi│ed efvielnttesr‐event‐mask │isthseetspecified events
           are being f│iltered               │ are being processed
                      │ XIM_TRIGGER_NOTIFY_R│EPLY
                      │ -_-________________   │
      Keys in the off‐│key‐list              │  Keys in the off‐key‐list
             ________-_-│                     │-_-_________
                      │  -_-________________  │
                      │ XIMf_iElXtTe_rS‐EeTv_eEnVtE‐NmTa_sMkA│SiKs set
                      │                     │
           the specifi│ed events             │ the specified events
           are being p│rocessed              │ are being discarded
                      │                     │
                      │                     │
                      │                     │
                      │                     │


This method does not have the problem of the time lag when
going across the preediting on and off mode, however, the



                             4477





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


amount of the performance acceleration is not as good as the
method described above.

In general, the FrontEnd method requires some synchroniza­
tion to some of the X protocols, such as the ChangeWindowAt­
tribute protocol for the event mask change or the GrabKey
protocol, since it relies on the X’s principal event dis­
patching mechanism. Any X protocol bindings do not consider
the synchronization might cause some mis‐synchronization
between the IM clients and the IM Server.















































                             4488





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


((22))  Transport Layer

The Xlib XIM implementation is layered into three functions,
a protocol layer, an interface layer and a transport layer.
The purpose of this layering is to make the protocol inde­
pendent of transport implementation.  Each function of these
layers are:

     _T_h_e _p_r_o_t_o_c_o_l _l_a_y_e_r
          implements overall function of XIM and calls the
          interface layer functions when it needs to commu­
          nicate to IM Server.

     _T_h_e _i_n_t_e_r_f_a_c_e _l_a_y_e_r
          separates the implementation of the transport
          layer from the protocol layer, in other words, it
          provides implementation independent hook for the
          transport layer functions.

     _T_h_e _t_r_a_n_s_p_o_r_t _l_a_y_e_r
          handles actual data communication with IM Server.
          It is done by a set of several functions named
          transporters.

The interface layer and the transport layer make various
communication channels usable such as X Protocol, TCP/IP,
DECnet or STREAM.  The following is a sample implementation
for the transporter using the X connection.  Refer to
"xtrans" for the transporter using Socket Transport.

At the beginning of the X Transport connection for the XIM
transport mechanism, two different windows must be created
either in an Xlib XIM or in an IM Server, with which the
Xlib and the IM Server exchange the XIM transports by using
the ClientMessage events and Window Properties.  In the fol­
lowing, the window created by the Xlib is referred as the
"client communication window", and on the other hand, the
window created by the IM Server is referred as the "IMS com­
munication window".

CCoonnnneeccttiioonn

     In order to establish a connection, a communication
     window is created.  A ClientMessage in the following
     event’s format is sent to the owner window of
     XIM_SERVER selection, which the IM Server has created.

     Refer to "The Input Method Protocol" for the XIM_SERVER
     atom.

      Table D‐1; The ClientMessage sent to the IMS window.






                             4499





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


     -----------------------+------------------------------------------------
     SSttrruuccttuurree MMeemmbbeerr       | CCoonntteennttss
     -----------------------+------------------------------------------------
     int       type         | ClientMessage
     u_long    serial       | Set by the X Window System
     Bool      send_event   | Set by the X Window System
     Display   *display     | The display to which connects
     Window    window       | IMS Window ID
     Atom      message_type | XInternAtom(display, ‘‘_XIM_XCONNECT’’, False)
     int       format       | 32
     long      data.l[0]    | client communication window ID
     long      data.l[1]    | client‐major‐transport‐version (*1)
     long      data.l[2]    | client‐major‐transport‐version (*1)
     -----------------------+------------------------------------------------


     In order to establish the connection (to notify the IM
     Server communication window), the IM Server sends a
     ClientMessage in the following event’s format to the
     client communication window.





































                             5500





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


         Table D‐2; The ClientMessage sent by IM Server.

     -----------------------+-------------------------------------------------------
     SSttrruuccttuurree MMeemmbbeerr       | CCoonntteennttss
     -----------------------+-------------------------------------------------------
     int       type         | ClientMessage
     u_long    serial       | Set by the X Window System
     Bool      send_event   | Set by the X Window System
     Display   *display     | The display to which connects
     Window    window       | client communication window ID
     Atom      message_type | XInternAtom(display, ‘‘_XIM_XCONNECT’’, False)
     int       format       | 32
     long      data.l[0]    | IMS communication window ID
     long      data.l[1]    | server‐major‐transport‐version (*1)
     long      data.l[2]    | server‐minor‐transport‐version (*1)
     long      data.l[3]    | dividing size between ClientMessage and Property (*2)
     -----------------------+-------------------------------------------------------



     (*1) major/minor‐transport‐version
               The read/write method is decided by the com­
               bination of major/minor‐transport‐version, as
               follows:

          Table D‐3; The read/write method and the major/minor‐transport‐version

      +------------------+---------------------------------------+
      |TTrraannssppoorrtt‐‐vveerrssiioonn | rreeaadd//wwrriittee                            |
      +--------+---------+---------------------------------------+
      | mmaajjoorr  |  mmiinnoorr  |                                       |
      +--------+---------+---------------------------------------+
      |   0    |    0    | only‐CM & Property‐with‐CM            |
      |        |    1    | only‐CM & multi‐CM                    |
      |        |    2    | only‐CM & multi‐CM & Property‐with‐CM |
      +--------+---------+---------------------------------------+
      |   1    |    0    | PropertyNotify                        |
      +--------+---------+---------------------------------------+
      |   2    |    0    | only‐CM & PropertyNotify              |
      |        |    1    | only‐CM & multi‐CM & PropertyNotify   |
      +--------+---------+---------------------------------------+



      only‐CM            :   data is sent via a ClientMessage
      multi‐CM           :   data is sent via multiple ClientMessages
      Property‐with‐CM   :   data is written in Property, and its Atom
                             is send via ClientMessage
      PropertyNotify     :   data is written in Property, and its Atom
                             is send via PropertyNotify


          The method to decide major/minor‐transport‐version
          is as follows:



                             5511





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


          (1)  The client sends 0 as major/minor‐transport‐
               version to the IM Server.  The client must
               support all methods in Table D‐3.  The client
               may send another number as major/minor‐trans­
               port‐version to use other method than the
               above in the future.

          (2)  The IM Server sends its major/minor‐trans­
               port‐version number to the client. The client
               sends data using the method specified by the
               IM Server.

          (3)  If major/minor‐transport‐version number is
               not available, it is regarded as 0.


     (*2) dividing size between ClientMessage and Property
               If data is sent via both of multi‐CM and
               Property, specify the dividing size between
               ClientMessage and Property. The data, which
               is smaller than this size, is sent via multi‐
               CM (or only‐CM), and the data, which is lager
               than this size, is sent via Property.



rreeaadd//wwrriittee

     The data is transferred via either ClientMessage or
     Window Property in the X Window System.

     FFoorrmmaatt ffoorr tthhee ddaattaa ffrroomm tthhee CClliieenntt ttoo tthhee IIMM SSeerrvveerr

          CClliieennttMMeessssaaggee

          If data is sent via ClientMessage event, the for­
          mat is as follows:

          Table D‐4; The ClientMessage event’s format (first
                              or middle)

          -----------------------+------------------------------------------------
          SSttrruuccttuurree MMeemmbbeerr       | CCoonntteennttss
          -----------------------+------------------------------------------------
          int       type         | ClientMessage
          u_long    serial       | Set by the X Window System
          Bool      send_event   | Set by the X Window System
          Display   *display     | The display to which connects
          Window    window       | IMS communication window ID
          Atom      message_type | XInternAtom(display, ‘‘_XIM_MOREDATA’’, False)
          int       format       | 8
          char      data.b[20]   | (read/write DATA : 20 byte)
          -----------------------+------------------------------------------------




                             5522





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


          Table D‐5; The ClientMessage event’s format (only
                               or last)

          -----------------------+------------------------------------------------
          SSttrruuccttuurree MMeemmbbeerr       | CCoonntteennttss
          -----------------------+------------------------------------------------
          int       type         | ClientMessage
          u_long    serial       | Set by the X Window System
          Bool      send_event   | Set by the X Window System
          Display   *display     | The display to which connects
          Window    window       | IMS communication window ID
          Atom      message_type | XInternAtom(display, ‘‘_XIM_PROTOCOL’’, False)
          int       format       | 8
          char      data.b[20]   | (read/write DATA : MAX 20 byte)  (*1)
          -----------------------+------------------------------------------------


          (*1) If the data is smaller than 20 byte, all data
               other than available data must be 0.

          PPrrooppeerrttyy

          In the case of large data, data will be sent via
          the Window Property for the efficiency.  There are
          the following two methods to notify Property, and
          transport‐version is decided which method is used.


          (1)  The XChangeProperty function is used to store
               data in the client communication window, and
               Atom of the stored data is notified to the IM
               Server via ClientMessage event.

          (2)  The XChangeProperty function is used to store
               data in the client communication window, and
               Atom of the stored data is notified to the IM
               Server via PropertyNotify event.

          The arguments of the XChangeProperty are as fol­
          lows:

















                             5533





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


            Table D‐6; The XChangeProperty event’s format

          --------------------+--------------------------------
          AArrgguummeenntt            | CCoonntteennttss
          --------------------+--------------------------------
          Display   *display  | The display to which connects
          Window    window    | IMS communication window ID
          Atom      property  | read/write property Atom (*1)
          Atom      type      | XA_STRING
          int       format    | 8
          int       mode      | PropModeAppend
          u_char    *data     | read/write DATA
          int       nelements | length of DATA
          --------------------+--------------------------------



          (*1) The read/write property ATOM allocates the
               following strings by XXIInntteerrnnAAttoomm.
                    ‘‘_clientXXX’’

          The client changes the property with the mode of
          PropModeAppend and the IM Server will read it with
          the delete mode i.e. (delete = True).

          If Atom is notified via ClientMessage event, the
          format of the ClientMessage is as follows:

          Table D‐7; The ClientMessage event’s format to
                        send Atom of property

          -----------------------+------------------------------------------------
          SSttrruuccttuurree MMeemmbbeerr       | CCoonntteennttss
          -----------------------+------------------------------------------------
          int       type         | ClientMessage
          u_long    serial       | Set by the X Window System
          Bool      send_event   | Set by the X Window System
          Display   *display     | The display to which connects
          Window    window       | IMS communication window ID
          Atom      message_type | XInternAtom(display, ‘‘_XIM_PROTOCOL’’, False)
          int       format       | 32
          long      data.l[0]    | length of read/write property Atom
          long      data.l[1]    | read/write property Atom
          -----------------------+------------------------------------------------


     FFoorrmmaatt ffoorr tthhee ddaattaa ffrroomm tthhee IIMM SSeerrvveerr ttoo tthhee CClliieenntt

          CClliieennttMMeessssaaggee

          The format of the ClientMessage is as follows:

          Table D‐8; The ClientMessage event’s format (first
                              or middle)



                             5544





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


          -----------------------+------------------------------------------------
          SSttrruuccttuurree MMeemmbbeerr       | CCoonntteennttss
          -----------------------+------------------------------------------------
          int       type         | ClientMessage
          u_long    serial       | Set by the X Window System
          Bool      send_event   | Set by the X Window System
          Display   *display     | The display to which connects
          Window    window       | client communication window ID
          Atom      message_type | XInternAtom(display, ‘‘_XIM_MOREDATA’’, False)
          int       format       | 8
          char      data.b[20]   | (read/write DATA : 20 byte)
          -----------------------+------------------------------------------------













































                             5555





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


          Table D‐9; The ClientMessage event’s format (only
                               or last)

          -----------------------+------------------------------------------------
          SSttrruuccttuurree MMeemmbbeerr       | CCoonntteennttss
          -----------------------+------------------------------------------------
          int       type         | ClientMessage
          u_long    serial       | Set by the X Window System
          Bool      send_event   | Set by the X Window System
          Display   *display     | The display to which connects
          Window    window       | client communication window ID
          Atom      message_type | XInternAtom(display, ‘‘_XIM_PROTOCOL’’, False)
          int       format       | 8
          char      data.b[20]   | (read/write DATA : MAX 20 byte) (*1)
          -----------------------+------------------------------------------------



          (*1) If the data size is smaller than 20 bytes,
               all data other than available data must be 0.

          PPrrooppeerrttyy

          In the case of large data, data will be sent via
          the Window Property for the efficiency. There are
          the following two methods to notify Property, and
          transport‐version is decided which method is used.


          (1)  The XChangeProperty function is used to store
               data in the IMS communication window, and
               Atom of the property is sent via the
               ClientMessage event.

          (2)  The XChangeProperty function is used to store
               data in the IMS communication window, and
               Atom of the property is sent via PropertyNo­
               tify event.

          The arguments of the XChangeProperty are as fol­
          lows:

            Table D‐10; The XChangeProperty event’s format

          --------------------+----------------------------------
          AArrgguummeenntt            | CCoonntteennttss
          --------------------+----------------------------------
          Display   *display  | The display which to connects
          Window    window    | client communication window ID
          Atom      property  | read/write property Atom (*1)
          Atom      type      | XA_STRING
          int       format    | 8
          int       mode      | PropModeAppend




                             5566





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


          --------------------+----------------------------------
          AArrgguummeenntt            | CCoonntteennttss
          --------------------+----------------------------------
          u_char    *data     | read/write DATA
          int       nelements | length of DATA
          --------------------+----------------------------------



          (*1) The read/write property ATOM allocates some
               strings, which are not allocated by the
               client, by XXIInntteerrnnAAttoomm.

          The IM Server changes the property with the mode
          of PropModeAppend and the client reads it with the
          delete mode, i.e. (delete = True).

          If Atom is notified via ClientMessage event, the
          format of the ClientMessage is as follows:






































                             5577





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


          Table D‐11; The ClientMessage event’s format to
                        send Atom of property

          -----------------------+------------------------------------------------
          SSttrruuccttuurree MMeemmbbeerr       | CCoonntteennttss
          -----------------------+------------------------------------------------
          int       type         | ClientMessage
          u_long    serial       | Set by the X Window System
          Bool      send_event   | Set by the X Window System
          Display   *display     | The display to which connects
          Window    window       | client communication window ID
          Atom      message_type | XInternAtom(display, ‘‘_XIM_PROTOCOL’’, False)
          int       format       | 32
          long      data.l[0]    | length of read/write property ATOM
          long      data.l[1]    | read/write property ATOM
          -----------------------+------------------------------------------------


CClloossiinngg CCoonnnneeccttiioonn

     If the client disconnect with the IM Server, shutdown
     function should free the communication window proper­
     ties and etc..


































                             5588





XX IInnppuutt MMeetthhoodd PPrroottooccooll                         lliibbXX1111 11..33..22


                     TTaabbllee ooff CCoonntteennttss


1. Introduction  . . . . . . . . . . . . . . . . . . . .   1
1.1. Scope . . . . . . . . . . . . . . . . . . . . . . .   1
1.2. Background  . . . . . . . . . . . . . . . . . . . .   1
1.3. Input Method Styles . . . . . . . . . . . . . . . .   2
2. Architecture  . . . . . . . . . . . . . . . . . . . .   3
2.1. Implementation Model  . . . . . . . . . . . . . . .   3
2.2. Structure of IM . . . . . . . . . . . . . . . . . .   3
2.3. Event Handling Model  . . . . . . . . . . . . . . .   4
2.3.1. BackEnd Method  . . . . . . . . . . . . . . . . .   4
2.3.2. FrontEnd Method . . . . . . . . . . . . . . . . .   4
2.4. Event Flow Control  . . . . . . . . . . . . . . . .   6
3. Default Preconnection Convention  . . . . . . . . . .   7
4. Protocol  . . . . . . . . . . . . . . . . . . . . . .   7
4.1. Basic Requests Packet Format  . . . . . . . . . . .   8
4.2. Data Types  . . . . . . . . . . . . . . . . . . . .   8
4.3. Error Notification  . . . . . . . . . . . . . . . .  12
4.4. Connection Establishment  . . . . . . . . . . . . .  13
4.5. Event Flow Control  . . . . . . . . . . . . . . . .  18
4.6. Encoding Negotiation  . . . . . . . . . . . . . . .  20
4.7. Query the supported extension protocol list . . . .  21
4.8. Setting IM Values . . . . . . . . . . . . . . . . .  22
4.9. getting IM Values . . . . . . . . . . . . . . . . .  22
4.10. Creating an IC . . . . . . . . . . . . . . . . . .  23
4.11. Destroying the IC  . . . . . . . . . . . . . . . .  23
4.12. Setting IC Values  . . . . . . . . . . . . . . . .  24
4.13. Getting IC Values  . . . . . . . . . . . . . . . .  24
4.14. Setting IC Focus . . . . . . . . . . . . . . . . .  25
4.15. Unsetting IC Focus . . . . . . . . . . . . . . . .  25
4.16. Filtering Events . . . . . . . . . . . . . . . . .  26
4.17. Synchronizing with the IM Server . . . . . . . . .  29
4.18. Sending a committed string . . . . . . . . . . . .  30
4.19. Reset IC . . . . . . . . . . . . . . . . . . . . .  30
4.20. Callbacks  . . . . . . . . . . . . . . . . . . . .  31
4.20.1. Negotiating geometry . . . . . . . . . . . . . .  31
4.20.2. Converting a string  . . . . . . . . . . . . . .  31
4.20.3. Preedit Callbacks  . . . . . . . . . . . . . . .  32
4.20.4. Preedit state notify . . . . . . . . . . . . . .  34
4.20.5. Status Callbacks . . . . . . . . . . . . . . . .  35
5. Acknowledgements  . . . . . . . . . . . . . . . . . .  36
6. References  . . . . . . . . . . . . . . . . . . . . .  36
Appendix A − Common Extensions . . . . . . . . . . . . .  37
Appendix B − The list of transport specific IM
Server names registered  . . . . . . . . . . . . . . . .  40
Appendix C − Protocol number . . . . . . . . . . . . . .  42
Appendix D − Implementation Tips . . . . . . . . . . . .  44












