1448d9
diff -up tigervnc-1.0.90-20091221svn3929/unix/vncserver.cookie tigervnc-1.0.90-20091221svn3929/unix/vncserver
1448d9
--- tigervnc-1.0.90-20091221svn3929/unix/vncserver.cookie	2009-11-12 11:39:54.000000000 +0100
1448d9
+++ tigervnc-1.0.90-20091221svn3929/unix/vncserver	2009-12-21 16:15:01.907799091 +0100
1448d9
@@ -189,27 +189,12 @@ $vncPort = 5900 + $displayNumber;
1448d9
 $desktopLog = "$vncUserDir/$host:$displayNumber.log";
1448d9
 unlink($desktopLog);
1448d9
 
1448d9
-# Make an X server cookie - use /dev/urandom on systems that have it,
1448d9
-# otherwise use perl's random number generator, seeded with the sum
1448d9
-# of the current time, our PID and part of the encrypted form of the password.
1448d9
-
1448d9
-my $cookie = "";
1448d9
-if (open(URANDOM, '<', '/dev/urandom')) {
1448d9
-  my $randata;
1448d9
-  if (sysread(URANDOM, $randata, 16) == 16) {
1448d9
-    $cookie = unpack 'h*', $randata;
1448d9
-  }
1448d9
-  close(URANDOM);
1448d9
-}
1448d9
-if ($cookie eq "") {
1448d9
-  srand(time+$$+unpack("L",`cat $vncUserDir/passwd`));
1448d9
-  for (1..16) {
1448d9
-    $cookie .= sprintf("%02x", int(rand(256)) % 256);
1448d9
-  }
1448d9
-}
1448d9
-
1448d9
-system("xauth -f $xauthorityFile add $host:$displayNumber . $cookie");
1448d9
-system("xauth -f $xauthorityFile add $host/unix:$displayNumber . $cookie"); 
1448d9
+# Make an X server cookie - use mcookie
1448d9
+$cookie = `/usr/bin/mcookie`;
1448d9
+open (XAUTH, "|xauth -f $xauthorityFile source -");
1448d9
+print XAUTH "add $host:$displayNumber . $cookie\n";
1448d9
+print XAUTH "add $host/unix:$displayNumber . $cookie\n";
1448d9
+close XAUTH;
1448d9
 
1448d9
 if ($opt{'-name'}) {
1448d9
     $desktopName = $opt{'-name'};