COMPO On-line documentation: XAcc Protocol
last revision: November 28, 1992
---------------------------------------------------------------------------
This standard is published by COMPO Software. It may be used freely by
anyone developing software using the GEM interface. This document may also
be distributed freely so long as the documentation remains complete and
unmodified in any way. Commercial distribution only allowed with written
permission from COMPO. If you have any suggestions or comments on XAcc
please send them to your nearest COMPO office:

COMPO Software GmbH     COMPO Software          COMPO Software Ltd
Ritzstrae 13           Ursulinenhof 1          Unit 3, Green Farm
5540 Prm               4133 DA Vianen          Abbott's Ripton
Germany                 The Netherlands         Huntingdon
                                                Cambridgeshire
                                                PE17 2PF
                                                England

Email: compo@cix.compulink.co.uk
===========================================================================

XAcc: a communication protocol for GEM applications
---------------------------------------------------------------------------
The XAcc protocol was originally designed for non-multitasking versions of
GEM to allow data exchange between the main application and any number of
accessories. Since the AES did not provide a function to find the
application ids (apids) of other applications without knowing their names,
XAcc had to rely on the undocumented feature that the main application
always has the apid 0. Therefore XAcc in its present form does not work in
a multitasking environment. However, AES 4.0 provides the new function
appl_search(), which allows any application to find the apids of all other
applications running concurrently. This makes it possible to design a
modified XAcc that does not use any 'dirty tricks'. This document contains
a proposal for such a modified XAcc; the changes with respect to the
previous definition are small and modifying an existing XAcc-based
application should be a matter of minutes. Since single-tasking TOS will
still be with us for a while, applications are encouraged to implement both
'traditional' and 'modern' XAcc,  depending  on  the  version number of the
AES.


Purpose
-------
The GEM AES functions appl_write() and appl_read() can be used to exchange
data between GEM applications running concurrently. In practice however,
some problems need to be solved to make good use of these two functions:

- There are no standard messages for exchanging data. Their definition is
  the main goal of XAcc.

- appl_write() needs the receiver's application identifier (apid). The
  only way to get this (before AES 4.0) is to call appl_find(), which
  needs the receiver's name. Thus communication is only possible if
  the sender knows the receiver's name.
  This problem is solved in AES 4.0 by the introduction of the function
  appl_search().

- The main application does not know when an accessory is activated or
  deactivated. This would often be useful, for example if the main
  application changes system variables could affect the accessory's
  behaviour. If the main application were informed before the accessory
  gains control, it could reset those to their old values and change
  them back after the accessory is finished.
  Another advantage would be that after an accessory has been called,
  the main application could check if something has been written to the
  clipboard or if other changes to the environment have been made.

  With multitasking GEM, the situation has changed in several important
  ways. The possibility of using several 'main' applications in parallel
  makes it even more undesirable to let them directly manipulate system
  variables and the like; nevertheless there will probably always remain
  some purposes that require such methods. On the other hand, at least
  for applications using windows (the preferred method to get the most
  out of a multitasking system) it is now possible to detect changes
  of the active application by interpreting the new AES messages
  WM_ONTOP and WM_UNTOPPED. Therefore it is not considered necessary
  for XAcc to provide additional means to achieve this.

The communications protocol described in this document solves all these
problems. It was designed for two distinct purposes:

- Exchanging data of standard types between programs that have no
  information about each other.

- Exchanging data between specific applications known to each other.
  The standard protocol ensures that program combinations from
  different vendors do not interfere with each other.

A potential problem caused by this protocol should be mentioned at this
point: for single-tasking GEM versions, it relies on the currently
undocumented fact that the main application's apid is always zero. Without
this assumption there is no way to exchange data without using appl_find().
Although this fact is not documented, it holds for all single-tasking
versions of GEM in existence until now, both for MS-DOS and the Atari ST
(this information was confirmed by Digital Research Germany). Of course
the main application's apid may be different in future versions, although
there is no reason to change the current behaviour for single-tasking
systems. For AES 4.0 (and later) the above assumption is not needed anyway,
so no compatibility problems are to be expected in the future.

A further requirement is that all programs not using this protocol must
ignore its messages. This should not be a serious problem, as all GEM
applications should ignore messages they do not understand. At the time
of writing no programs are known to violate this rule.


XAcc message groups
-------------------

[Note: The "levels" used in previous XAcc versions have been replaced
 by this new concept. Compatibility issues are discussed in a special
 section at the end of this document.]

Both main applications and accessories can have widely different needs for
communication with other programs. Therefore XAcc defines several groups
of related messages that deal with a certain range of data types.
The message groups always indicate the messages understood by a
program, not the messages it might send to other ones. If a program
supports a certain message group, it must correctly respond to all
corresponding messages, whether it can actually use the supplied data
or not.

In addition to message groups, there are the so-called "basic messages",
which must be supported by any XAcc-aware program, and program-specific
so-called "special messages".

The basic messages deal solely with identification, but no real data
exchange. They are already sufficient for programs that either do not
exchange data with others at all or use only special messages to
communicate with a number of other specific programs.

Message group 1 specifies the exchange of ASCII-format character data.

Message group 2 deals with the exchange of drawings and pictures using
the GEM metafile format and the GEM bit-image file format.

Future extensions might include sound or spreadsheet data. In addition,
a message group could be defined to handle command interchange between
applications, e.g. for a "drag&drop" protocol.


XAcc messages
-------------

There are two kinds of XAcc messages: standard messages, which must be
understood by every participating program, and special messages intended
for communications between specific program combinations. The standard
messages have numbers ranging from 0x400 to 0x7ff, special messages start
from 0x800. The latter ones may only be sent after the receiver has been
identified and is known to understand them. The following description is
only concerned with standard messages.
In addition to XAcc standard messages, the AES messages normally sent
by the screen manager may be used. The most useful ones are AC_OPEN
and MN_SELECTED; the latter one requires a knowledge of the receiver
and therefore belongs to the special messages.


Basic messages
--------------

ACC_ID = 0x400
ACC_OPEN = 0x401
ACC_CLOSE = 0x402
ACC_ACC = 0x403
ACC_EXIT = 0x404

These messages provide XAcc initialization and organization. This is
the only part of XAcc which has to be implemented in a different way for
single- and multi-tasking GEM versions. Note that the procedure
described for 'multitasking' actually only depends on the existence of
appl_search() and hence on an AES version number >= 4.0. If some
future single-tasking AES supports appl_search(), the "multitasking"
initialization should be used. Multitasking AES versions with a version
number < 4.0 should never exist; to be on the safe side, applications
should not attempt to use XAcc if such a situation is detected.

I) Single-tasking GEM versions

The communication between the main application and the accessories is
initiated in the following way:

1) When a main application is started (or terminated), all accessories
   receive an AC_CLOSE message from the AES screen manager. In response
   they must send an identification to the main application according
   to the following format:

     msgbuf[0]:  ACC_ID
     msgbuf[1]:  sender's apid
     msgbuf[2]:  length of the message - 16, giving 0
     msgbuf[3]:  program version number and message groups
     msgbuf[4] and msgbuf[5]:   pointer to sender's name
     msgbuf[6]:  menu number (menu_id) as returned by menu_register()
     msgbuf[7]:  reserved (see ACC_ACC)

   The low byte of msgbuf[3] contains a bitmap indicating which message
   groups are understood by the sender. Bit zero is set for message
   group 1, bit one for message group 2, and so on. This is independent
   of the message types which the sender might itself send to others. The
   sender of a message must ensure that it is understood by the receiver.
   The high byte is used to indicate a program version number using an
   arbitrary encoding scheme.
   The pointer to the sender's name is stored in a machine-dependent
   format. The name itself is a character string following C conventions,
   i.e. a string of characters terminated by a zero byte. To avoid name
   conflicts, long names are preferred to short abbreviations. The name
   must be available at the given address at any time, it may not be
   removed after initialisation. As the version number is stored in
   msgbuf[3], it should not occur again in the name.
   [Note: see the section "Extended names" for more details on names.]
   Accessories using more than one menu entry must issue one ACC_ID
   message for each entry used. Accessories without a menu entry must
   use a number of -1.

Since msgbuf[1] and msgbuf[2] have the same meaning for all message
types, they are no longer mentioned from now on.

2) In response to an ACC_ID message the main application sends an
   identification back to the accessory. The format is identical, except
   that there is no menu number and thus msgbuf[6] can be used for any
   other purpose if necessary. The same applies to msgbuf[7].

3) In addition to the ACC_ID message, the main application informs all
   previously registered accessories about the new one by sending them
   the message
     msgbuf[0]:  ACC_ACC
     msgbuf[3]:  program version number and message groups
     msgbuf[4] and msgbuf[5]:   pointer to accessory's name
     msgbuf[6]:  accessory's menu number (menu_id)
     msgbuf[7]:  accessory's apid

4) An accessory receiving the ACC_ACC message from the main application
   sends an ACC_ID message to the thereby registered accessory, identical
   to the one previously sent to the main application.

5) When an accessory is activated by receiving an AC_OPEN message, it
   sends the following message to the main application:

     msgbuf[0]:  ACC_OPEN

   Just before the accessory returns control to another program, it
   sends the message

     msgbuf[0]:  ACC_CLOSE

   When receiving ACC_OPEN, the main application restores all system
   variables it has changed to their original values (if possible and
   necessary). After receiving ACC_CLOSE, it may set them again to any
   desired value.

   Accessories should change system variables only after sending
   ACC_OPEN and restore them before ACC_CLOSE.

   There have been some problems with the implementation of ACC_OPEN and
   ACC_CLOSE that should be mentioned. The system was designed with
   window-less accessories in mind, i.e. accessories that only display
   a dialog box. For these accessories, the above procedure is
   well-defined. Accessories that use windows however have no way to
   find out if they have been activated or deactivated, because they
   do not receive a message to indicate this (starting from AES 4.0,
   this problem is solved). Therefore such accessories must be careful
   with ACC_OPEN and ACC_CLOSE. The most important thing is to guarantee
   that ACC_OPEN and ACC_CLOSE always occur in pairs, and that in between
   no other program gains control. How exactly this is implemented
   depends on the specific application. Sometimes the best implementation
   is not to use ACC_OPEN and ACC_CLOSE at all.

After initialization is completed, all participating programs know the
identity of all other ones, either by receiving an ACC_ID message or by
receiving an ACC_ACC message. The main application is always informed
about accessory activities. If in addition it proves necessary to
inform one accessory about the activation of another one, this can be
accomplished by sending special messages (starting from 0x800).

II) Multitasking GEM versions

The initialization procedure is much simpler in this case. Any application,
i.e. both 'standard' applications and accessories, uses appl_search() to
detect all currently running AES processes when it is started. To each
application or accessory (i.e. everything but system processes) it sends
an ACC_ID message:

  msgbuf[0]:  ACC_ID
  msgbuf[1]:  sender's apid
  msgbuf[2]:  length of the message - 16, giving 0
  msgbuf[3]:  program version number and message groups
  msgbuf[4] and msgbuf[5]:   pointer to sender's name
  msgbuf[6]:  menu number (menu_id) as returned by menu_register()
  msgbuf[7]:  reserved

The low byte of msgbuf[3] contains a bitmap indicating which message
groups are understood by the sender. Bit zero is set for message
group 1, bit one for message group 2, and so on. This is independent
of the message types which the sender might itself send to others. The
sender of message must ensure that it is understood by the receiver. The
high byte is used to indicate a program version number using an
arbitrary encoding scheme.

The pointer to the sender's name is stored in a processor-dependent
format. The name itself is a string of characters terminated by two zero
byte. To avoid name conflicts, long names are preferred to short
abbreviations. The name must be available at the given address at any time,
it may not be removed after initialization. It must also reside in
globally accessible memory. As the version number is stored in msgbuf[3],
it should not occur again in the name.

[Note: see the section "Extended names" for more details on names.]
Applications using more than one menu entry must issue one ACC_ID
message for each entry used. Accessories without a menu entry must
use a number of -1.

When receiving an ACC_ID message, an application replies by sending a
message of the same format to the original sender, the only difference
being that ACC_ACC is used instead of ACC_ID. Applications with
several menu entries must again send one message for each entry.

The messages ACC_OPEN and ACC_CLOSE are not used in multitasking
systems.

Note: The only difference between ACC_ID and ACC_ACC for multitasking
systems is that an application receiving ACC_ID sends ACC_ACC as a
reply, whereas no reply is sent on receiving ACC_ACC. This prevents
applications from sending ACC_ID to each other indefinitely.
Obviously the name ACC_ACC has lost its original meaning and
probably should be changed. But since the symbolic names do not influence
the actual behaviour of any program, this is not really important at all.

Since in a multitasking environment every participating application
can terminate, some means must be provided to tell other applications
about this. Therefore the message ACC_EXIT has been added to the list
of level 0 messages. Before terminating, any application sends

  msgbuf[0]:  ACC_ID
  msgbuf[1]:  sender's apid
  msgbuf[2]:  length of the message - 16, giving 0

to all applications that have ever registered themselves by sending
ACC_ID or ACC_ACC.


Extended names
--------------
Experience with XAcc has shown that it would often be useful to have more
information about an application than specified with ACC_ID messages.
For example it is sometimes useful to check for a special feature that
is not unique to a single program, but to several similar ones. This
was the motivation for the introduction of "extended names".

An "extended name" is a character string of the format
'name'\0XDSC\0'string'\0'string'\0...'string'\0\0
i.e. a "standard" name followed by the string "XDSC" (for "eXtended
DeSCription"), followed by a list of strings containing additional
information. The end of the list is marked by an additional zero byte.

Each information string indicates by its first byte what kind of
information it contains. Currently the following types are defined:

'1' - application type (human readable)
      The text following this byte (an ASCII-1, 0x31) should roughly
      specify the type of application, e.g. "word processor" or
      "spreadsheet". The purpose is for applications to present this
      information to the user to let him/her decide where data should go.
      This is not the place for advertising hype; a word processor should
      call itself "word processor" and not "document editing and design
      system".
      It should be clear that the text be understandable for end users,
      especially it should be in the language used for the user interface.

'2' - application type (machine readable)
      currently defined are:
      WP - word processor
      DP - desktop publishing
      ED - text editor
      DB - data base
      SS - spreadsheet
      RG - raster graphics application
      VG - Vector graphics application
      GG - general graphics application
      MU - music application
      CD - CAD application
      DC - data communication
      DT - desktop
      PE - programming environment

'X' - extended features
      This string is used to indicate special communication capabilities
      of an application. It can be used to give more specific information
      than the message groups understood. Since this information is meant
      to be used by other applications rather than end users, short
      abbreviations are sufficient.

'N' - generic name
      Often several related, but not completely identical, applications
      have different names. Marketing requirements may even dictate
      changes of the "official" brand names, making them unsuitable
      for a "technical" identification. In such cases a "generic" name
      for all these programs can be specified, which is mainly used
      by other programs wishing to use special messages.

The "normal" name should be the "official" name of the program, just as it
is used on the package, in the manual, and in similar places. It should
be presentable to the user to let him/her decide where to send data.

Example: The address database "That's Address" identifies itself with the
extended name (in C syntax) "That's Address\0XDSC\01database\0XMM\0XSU\0",
indicating that it is a database with features "MM" and "SU". The first
one indicates a special mail merge mode, the second one the possibility
of retrieving data by sending the key via ACC_TEXT.
(Further information on this program can be obtained from its manual.)


Message group 1
---------------
ACC_ACK = 0x500
ACC_TEXT = 0x501
ACC_KEY = 0x502


1) Transmitting text data:

     msgbuf[0]:  ACC_TEXT
     msgbuf[4] and msgbuf[5]:   pointer to text

   The text may contain all printable ASCII characters (code >= 32) and the
   following control codes:

     0x09  TAB (may be interpreted as a space by the receiver)
     0x0A  LF  (usually ignored by receiver)
     0x0D  CR  (used to mark an end-of-line (or end-of paragraph)

   Other control codes may only be used if the receiver is known to
   understand them. The text is terminated by a zero byte.
   After the text has been interpreted completely, the receiver
   acknowledges by sending

     msgbuf[0]:  ACC_ACK
     msgbuf[3]:  0 if the text was simply ignored, 1 if it was used in
                 some sensible way

   The sender of a text message may not change the text nor send any
   other text messages to the same receiver until is has received the
   acknowledge.
   The sender must make sure that the memory used to store the text
   is globally accessible.
   The receiver should normally interpret the text as if it were typed
   from the keyboard. A word processor would for example insert it into
   the currently edited document (this implies using CR as an end-of-
   paragraph mark), a command line interpreter would interpret the text
   as a command (which implies using CR as an end-of-line mark).

2) Simulation of a key press:

     msgbuf[0]:  ACC_KEY
     msgbuf[3]:  scan code of the simulated key and corresponding
                 ASCII code (as returned by evnt_keybd())
     msgbuf[4]:  state of the SHIFT keys (as returned by Kbshift())

   This message should be regarded identical to a keyboard event. It can
   be used to send control commands to a receiver which might have
   been issued from the keyboard. Of course this requires a knowledge
   of the receiver as no standard keyboard command sets exist. It should
   be noted that the receiver is free to use only the ASCII code or the
   scan code, or both of them.
   This message is acknowledged after its interpretation with

     msgbuf[0]:  ACC_ACK
     msgbuf[3]:  0 if ACC_KEY was ignored or a given command was not
                 understood, 1 if some action was taken.

To prevent a deadlock if a program does not properly acknowledge a
message, the sender should have some way to recover. An accessory
could for example stop waiting for an acknowledgement after the next
AC_OPEN, a main application might time out after a sufficiently long
period.


Message group 2
---------------
ACC_META = 0x503
ACC_IMG = 0x504

These message are used to exchange drawings and pictures. Only the file
formats defined in the GEM documentation are used; they are sufficient
to meet most requirements, and any GEM application should be able to
handle them anyway.

1) Sending a metafile:

     msgbuf[0]:  ACC_META
     msgbuf[3]:  1 for the final part, 0 otherwise
     msgbuf[4] and msgbuf[5]:   pointer to data
     msgbuf[6] and msgbuf[7]:   length of data (32 bit longword)

   The metafile data is sent in the same format as they would be stored
   on disk. As metafiles can become quite large and especially
   accessories often do not have sufficient memory to store them, a
   file can be sent in several pieces. The receiver has to take care
   of assembling all parts to restore the original data, if necessary
   by writing the parts to a file. The last part of a file is marked
   by msgbuf[3]=1. The sender may send no other data between the parts
   of a file. msgbuf[6] and msgbuf[7] contain the length of the part
   being sent, not the total length.
   The receiver acknowledges each part as described for level 1.
   As for text messages, the sender must make sure that the data to
   be transferred is stored in globally accessible memory.

2) Sending a bit image file:

     msgbuf[0]: ACC_IMG

   otherwise identical to 1)

Compatibility considerations
----------------------------
There are two major changes with respect to the original XAcc definition:

1) "Levels" have been replaced by "message groups".
   The motivation for this change was that the classification according
   to exchangeable data types was not really a hierarchical one; there
   is no reason why a program accepting graphics should also be able to
   understand text. The new scheme makes no such arbitrary assumptions.

   There is only one situation in which a possible incompatibility could
   occur: an application following the "old" convention encounters a
   "new" application and one of them indicates 2 in the level/message
   group byte. This would be interpreted as "graphics only" by one and
   as "graphics and text" by the other. Since the number of level-2
   applications was always extremely small (in fact, the author knows
   only of a single one), this should be no problem in practice.

2) Extended names have been introduced.
   This could lead to a problem in the extremely unlikely case of an
   "old" application using a name string which is accidentally followed
   by "XDSC".

In any case it is expected that most applications will be converted to
the new rules soon, if only to support MultiTOS.
---------------------------------------------------------------------------
25th June 1994
