- NAME
- Tk_Init, Tk_SafeInit — add Tk to an interpreter and make a new
Tk application.
- SYNOPSIS
- #include <tk.h>
- int
- Tk_Init(interp)
- int
- Tk_SafeInit(interp)
- ARGUMENTS
- DESCRIPTION
- bell
- clipboard
- grab
- menu
- selection
- send
- tk
- tkwait
- toplevel
- wm
- KEYWORDS
Tk_Init, Tk_SafeInit — add Tk to an interpreter and make a new Tk
application.
#include <tk.h>
int
Tk_Init(interp)
int
Tk_SafeInit(interp)
- Tcl_Interp *interp (in)
- Interpreter in which to load Tk. Tk should not already be
loaded in this interpreter.
Tk_Init is the package initialization procedure for Tk. It
is normally invoked by the Tcl_AppInit procedure for an
application or by the load command. Tk_Init adds all
of Tk's commands to interp and creates a new Tk application,
including its main window. If the initialization is successful
Tk_Init returns TCL_OK; if there is an error it
returns TCL_ERROR. Tk_Init also leaves a result or
error message in interpreter interp's result.
If there is a variable argv in interp,
Tk_Init treats the contents of this variable as a list of
options for the new Tk application. The options may have any of the
forms documented for the wish application (in fact,
wish uses Tk_Init to
process its command-line arguments).
Tk_SafeInit is identical to Tk_Init except that it
removes all Tk commands that are considered unsafe. Those commands
and the reasons for their exclusion are:
- bell
- Continuous ringing of the bell is a nuisance.
- clipboard
- A malicious script could replace the contents of the clipboard
with the string “rm -r *” and lead to surprises when the
contents of the clipboard are pasted.
- grab
- Grab can be used to block the user from using any other
applications.
- menu
- Menus can be used to cover the entire screen and to steal input
from the user.
- selection
- See clipboard.
- send
- Send can be used to cause unsafe interpreters to execute
commands.
- tk
- The tk command recreates the send command, which is
unsafe.
- tkwait
- Tkwait can block the containing process forever
- toplevel
- Toplevels can be used to cover the entire screen and to steal
input from the user.
- wm
- If toplevels are ever allowed, wm can be used to remove
decorations, move windows around, etc.
safe, application, initialization, load, main window
Copyright © 1995-1996 Sun Microsystems,
Inc.