From 65d473f78229a15504ad2875c90dcb3ed00f2d8a Mon Sep 17 00:00:00 2001 From: dkf Date: Tue, 21 Sep 2004 16:04:06 +0000 Subject: Highlight document-internal references --- doc/interp.n | 24 ++++++++++++------------ 1 file changed, 12 insertions(+), 12 deletions(-) diff --git a/doc/interp.n b/doc/interp.n index a1b50f1..7a681b0 100644 --- a/doc/interp.n +++ b/doc/interp.n @@ -5,7 +5,7 @@ '\" See the file "license.terms" for information on usage and redistribution '\" of this file, and for a DISCLAIMER OF ALL WARRANTIES. '\" -'\" RCS: @(#) $Id: interp.n,v 1.15 2004/09/14 17:45:36 msofer Exp $ +'\" RCS: @(#) $Id: interp.n,v 1.16 2004/09/21 16:04:06 dkf Exp $ '\" .so man.macros .TH interp n 7.6 Tcl "Tcl Built-In Commands" @@ -52,15 +52,15 @@ scripts without fear of them damaging other interpreters or the application's environment. For example, all IO channel creation commands and subprocess creation commands are made inaccessible to safe interpreters. -See SAFE INTERPRETERS below for more information on +See \fBSAFE INTERPRETERS\fR below for more information on what features are present in a safe interpreter. The dangerous functionality is not removed from the safe interpreter; instead, it is \fIhidden\fR, so that only trusted interpreters can obtain access to it. For a detailed explanation of hidden commands, see -HIDDEN COMMANDS, below. +\fBHIDDEN COMMANDS\fR, below. The alias mechanism can be used for protected communication (analogous to a kernel call) between a slave interpreter and its master. -See ALIAS INVOCATION, below, for more details +See \fBALIAS INVOCATION\fR, below, for more details on how the alias mechanism works. .PP A qualified interpreter name is a proper Tcl lists containing a subset of its @@ -120,7 +120,7 @@ in the invocation of \fIsrcCmd\fR. already exist; it is not created by this command. The alias arranges for the given target command to be invoked in the target interpreter whenever the given source command is -invoked in the source interpreter. See ALIAS INVOCATION below for +invoked in the source interpreter. See \fBALIAS INVOCATION\fR below for more details. The command returns a token that uniquely identifies the command created \fIsrcCmd\fR, even if the command is renamed afterwards. The token may but @@ -227,7 +227,7 @@ limit \fIlimitType\fR for the interpreter denoted by \fIpath\fR. If no \fIoption\fR is specified, return the current configuration of the limit. If \fIoption\fR is the sole argument, return the value of that option. Otherwise, a list of \fIoption\fR/\fIvalue\fR argument pairs -must supplied. See RESOURCE LIMITS below for a more detailed +must supplied. See \fBRESOURCE LIMITS\fR below for a more detailed explanation of what limits and options are supported. .VE 8.5 .TP @@ -326,7 +326,7 @@ in \fIslave\fR, \fItargetCmd\fR is invoked in the master. The \fIarg\fR arguments will be passed to \fItargetCmd\fR as additional arguments, prepended before any arguments passed in the invocation of \fIsrcCmd\fR. -See ALIAS INVOCATION below for details. +See \fBALIAS INVOCATION\fR below for details. The command returns a token that uniquely identifies the command created \fIsrcCmd\fR, even if the command is renamed afterwards. The token may but does not have to be equal to \fIsrcCmd\fR. @@ -346,7 +346,7 @@ accepted only if it is a valid global name space name without any ::), in \fIslave\fR. If an exposed command with the targeted name already exists, this command fails. -For more details on hidden commands, see HIDDEN COMMANDS, below. +For more details on hidden commands, see \fBHIDDEN COMMANDS\fR, below. .TP \fIslave \fBhide \fIexposedCmdName\fR ?\fIhiddenCmdName\fR? This command hides the exposed command \fIexposedCmdName\fR, renaming it to @@ -360,7 +360,7 @@ Commands to be hidden are looked up in the global namespace even if the current namespace is not the global one. This prevents slaves from fooling a master interpreter into hiding the wrong command, by making the current namespace be different from the global one. -For more details on hidden commands, see HIDDEN COMMANDS, below. +For more details on hidden commands, see \fBHIDDEN COMMANDS\fR, below. .TP \fIslave \fBhidden\fR Returns a list of the names of all hidden commands in \fIslave\fR. @@ -377,7 +377,7 @@ can access local variables in that or outer call frames. If both the \fB-namespace\fR and \fB-global\fR flags are given, the \fB-namespace\fR flag is ignored. For more details on hidden commands, -see HIDDEN COMMANDS, below. +see \fBHIDDEN COMMANDS\fR, below. .TP \fIslave \fBissafe\fR Returns \fB1\fR if the slave interpreter is safe, \fB0\fR otherwise. @@ -389,7 +389,7 @@ limit \fIlimitType\fR for the slave interpreter. If no \fIoption\fR is specified, return the current configuration of the limit. If \fIoption\fR is the sole argument, return the value of that option. Otherwise, a list of \fIoption\fR/\fIvalue\fR argument pairs must -supplied. See RESOURCE LIMITS below for a more detailed explanation of +supplied. See \fBRESOURCE LIMITS\fR below for a more detailed explanation of what limits and options are supported. .VE 8.5 .TP @@ -596,7 +596,7 @@ handling an alias invocation, great care must be taken to avoid evaluating any arguments passed in through the alias invocation. Otherwise, malicious slave interpreters could cause a trusted master interpreter to execute dangerous commands on their behalf. See the section -on ALIAS INVOCATION for a more complete discussion of this topic. +on \fBALIAS INVOCATION\fR for a more complete discussion of this topic. To help avoid this problem, no substitutions or evaluations are applied to arguments of \fBinterp invokehidden\fR. .PP -- cgit v0.12