summaryrefslogtreecommitdiffstats
path: root/doc/Tk_Init.3
diff options
context:
space:
mode:
Diffstat (limited to 'doc/Tk_Init.3')
-rw-r--r--doc/Tk_Init.352
1 files changed, 5 insertions, 47 deletions
diff --git a/doc/Tk_Init.3 b/doc/Tk_Init.3
index 779a9e6..badcbe4 100644
--- a/doc/Tk_Init.3
+++ b/doc/Tk_Init.3
@@ -4,23 +4,21 @@
'\" See the file "license.terms" for information on usage and redistribution
'\" of this file, and for a DISCLAIMER OF ALL WARRANTIES.
'\"
-'\" RCS: @(#) $Id: Tk_Init.3,v 1.3 2000/04/28 00:46:04 ericm Exp $
+'\" RCS: @(#) $Id: Tk_Init.3,v 1.2 1998/09/14 18:22:54 stanton Exp $
'\"
.so man.macros
-.TH Tk_Init 3 8.0 Tk "Tk Library Procedures"
+.TH Tk_Init 3 4.1 Tk "Tk Library Procedures"
.BS
.SH NAME
-Tk_Init, Tk_SafeInit \- add Tk to an interpreter and make a new Tk application.
+Tk_Init \- add Tk to an interpreter and make a new Tk application.
.SH SYNOPSIS
.nf
\fB#include <tk.h>\fR
.sp
int
\fBTk_Init\fR(\fIinterp\fR)
-.sp
-int
-\fBTk_SafeInit\fR(\fIinterp\fR)
.SH ARGUMENTS
+.AS Tcl_Interp *interp
.AP Tcl_Interp *interp in
Interpreter in which to load Tk. Tk should not already be loaded
in this interpreter.
@@ -44,46 +42,6 @@ new Tk application.
The options may have any of the forms documented for the
\fBwish\fR application (in fact, \fBwish\fR uses Tk_Init to process
its command-line arguments).
-.PP
-\fBTk_SafeInit\fR is identical to \fBTk_Init\fR except that it removes
-all Tk commands that are considered unsafe. Those commands and the
-reasons for their exclusion are:
-.TP
-\fBbell\fR
-Continuous ringing of the bell is a nuisance.
-.TP
-\fBclipboard\fR
-A malicious script could replace the contents of the clipboard with
-the string \fB"rm -r *"\fR and lead to surprises when the contents of
-the clipboard are pasted.
-.TP
-\fBgrab\fR
-Grab can be used to block the user from using any other applications.
-.TP
-\fBmenu\fR
-Menus can be used to cover the entire screen and to steal input from
-the user.
-.TP
-\fBselection\fR
-See clipboard.
-.TP
-\fBsend\fR
-Send can be used to cause unsafe interpreters to execute commands.
-.TP
-\fBtk\fR
-The tk command recreates the send command, which is unsafe.
-.TP
-\fBtkwait\fR
-Tkwait can block the containing process forever
-.TP
-\fBtoplevel\fR
-Toplevels can be used to cover the entire screen and to steal input
-from the user.
-.TP
-\fBwm\fR
-If toplevels are ever allowed, wm can be used to remove decorations,
-move windows around, etc.
-.CE
.SH KEYWORDS
-safe, application, initialization, load, main window
+application, initialization, load, main window