summaryrefslogtreecommitdiffstats
path: root/tk8.6/doc/Tk_Init.3
diff options
context:
space:
mode:
Diffstat (limited to 'tk8.6/doc/Tk_Init.3')
-rw-r--r--tk8.6/doc/Tk_Init.385
1 files changed, 0 insertions, 85 deletions
diff --git a/tk8.6/doc/Tk_Init.3 b/tk8.6/doc/Tk_Init.3
deleted file mode 100644
index 7bc46dd..0000000
--- a/tk8.6/doc/Tk_Init.3
+++ /dev/null
@@ -1,85 +0,0 @@
-'\"
-'\" Copyright (c) 1995-1996 Sun Microsystems, Inc.
-'\"
-'\" See the file "license.terms" for information on usage and redistribution
-'\" of this file, and for a DISCLAIMER OF ALL WARRANTIES.
-'\"
-.TH Tk_Init 3 8.0 Tk "Tk Library Procedures"
-.so man.macros
-.BS
-.SH NAME
-Tk_Init, Tk_SafeInit \- add Tk to an interpreter and make a new Tk application.
-.SH SYNOPSIS
-.nf
-\fB#include <tk.h>\fR
-.sp
-int
-\fBTk_Init\fR(\fIinterp\fR)
-.sp
-int
-\fBTk_SafeInit\fR(\fIinterp\fR)
-.SH ARGUMENTS
-.AP Tcl_Interp *interp in
-Interpreter in which to load Tk. Tk should not already be loaded
-in this interpreter.
-.BE
-.SH DESCRIPTION
-.PP
-\fBTk_Init\fR is the package initialization procedure for Tk.
-It is normally invoked by the \fBTcl_AppInit\fR procedure
-for an application or by the \fBload\fR command.
-\fBTk_Init\fR adds all of Tk's commands to \fIinterp\fR
-and creates a new Tk application, including its main window.
-If the initialization is successful \fBTk_Init\fR returns
-\fBTCL_OK\fR; if there is an error it returns \fBTCL_ERROR\fR.
-\fBTk_Init\fR also leaves a result or error message
-in interpreter \fIinterp\fR's result.
-.PP
-If there is a variable \fBargv\fR in \fIinterp\fR, \fBTk_Init\fR
-treats the contents of this variable as a list of options for the
-new Tk application.
-The options may have any of the forms documented for the
-\fBwish\fR application (in fact, \fBwish\fR uses Tk_Init to process
-its command-line arguments).
-.PP
-\fBTk_SafeInit\fR is identical to \fBTk_Init\fR except that it removes
-all Tk commands that are considered unsafe. Those commands and the
-reasons for their exclusion are:
-.TP
-\fBbell\fR
-Continuous ringing of the bell is a nuisance.
-.TP
-\fBclipboard\fR
-A malicious script could replace the contents of the clipboard with
-the string
-.QW "\fBrm \-r *\fR"
-and lead to surprises when the contents of the clipboard are pasted.
-.TP
-\fBgrab\fR
-Grab can be used to block the user from using any other applications.
-.TP
-\fBmenu\fR
-Menus can be used to cover the entire screen and to steal input from
-the user.
-.TP
-\fBselection\fR
-See clipboard.
-.TP
-\fBsend\fR
-Send can be used to cause unsafe interpreters to execute commands.
-.TP
-\fBtk\fR
-The tk command recreates the send command, which is unsafe.
-.TP
-\fBtkwait\fR
-Tkwait can block the containing process forever
-.TP
-\fBtoplevel\fR
-Toplevels can be used to cover the entire screen and to steal input
-from the user.
-.TP
-\fBwm\fR
-If toplevels are ever allowed, wm can be used to remove decorations,
-move windows around, etc.
-.SH KEYWORDS
-safe, application, initialization, load, main window