Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

tkwait(1t) [opensolaris man page]

tkwait(1T)						       Tk Built-In Commands							tkwait(1T)

__________________________________________________________________________________________________________________________________________________

NAME
tkwait - Wait for variable to change or window to be destroyed SYNOPSIS
tkwait variable name tkwait visibility name tkwait window name _________________________________________________________________ DESCRIPTION
The tkwait command waits for one of several things to happen, then it returns without taking any other actions. The return value is always an empty string. If the first argument is variable (or any abbreviation of it) then the second argument is the name of a global variable and the command waits for that variable to be modified. If the first argument is visibility (or any abbreviation of it) then the second argument is the name of a window and the tkwait command waits for a change in its visibility state (as indicated by the arrival of a Visi- bilityNotify event). This form is typically used to wait for a newly-created window to appear on the screen before taking some action. If the first argument is window (or any abbreviation of it) then the second argument is the name of a window and the tkwait command waits for that window to be destroyed. This form is typically used to wait for a user to finish interacting with a dialog box before using the result of that interaction. While the tkwait command is waiting it processes events in the normal fashion, so the application will continue to respond to user interac- tions. If an event handler invokes tkwait again, the nested call to tkwait must complete before the outer call can complete. KEYWORDS
variable, visibility, wait, window ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +--------------------+-----------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +--------------------+-----------------+ |Availability | SUNWTk | +--------------------+-----------------+ |Interface Stability | Uncommitted | +--------------------+-----------------+ NOTES
Source for Tk is available on http://opensolaris.org. Tk tkwait(1T)

Check Out this Related Man Page

Tk_Init(3TK)						       Tk Library Procedures						      Tk_Init(3TK)

__________________________________________________________________________________________________________________________________________________

NAME
Tk_Init, Tk_SafeInit - add Tk to an interpreter and make a new Tk application. SYNOPSIS
#include <tk.h> int Tk_Init(interp) int Tk_SafeInit(interp) ARGUMENTS
Tcl_Interp *interp (in) Interpreter in which to load Tk. Tk should not already be loaded in this interpreter. _________________________________________________________________ DESCRIPTION
Tk_Init is the package initialization procedure for Tk. It is normally invoked by the Tcl_AppInit procedure for an application or by the load command. Tk_Init adds all of Tk's commands to interp and creates a new Tk application, including its main window. If the initializa- tion is successful Tk_Init returns TCL_OK; if there is an error it returns TCL_ERROR. Tk_Init also leaves a result or error message in interp->result. If there is a variable argv in interp, Tk_Init treats the contents of this variable as a list of options for the new Tk application. The options may have any of the forms documented for the wish application (in fact, wish uses Tk_Init to process its command-line arguments). Tk_SafeInit is identical to Tk_Init except that it removes all Tk commands that are considered unsafe. Those commands and the reasons for their exclusion are: bell Continuous ringing of the bell is a nuisance. clipboard A malicious script could replace the contents of the clipboard with the string "rm -r *" and lead to surprises when the contents of the clipboard are pasted. grab Grab can be used to block the user from using any other applications. menu Menus can be used to cover the entire screen and to steal input from the user. selection See clipboard. send Send can be used to cause unsafe interpreters to execute commands. tk The tk command recreates the send command, which is unsafe. tkwait Tkwait can block the containing process forever toplevel Toplevels can be used to cover the entire screen and to steal input from the user. wm If toplevels are ever allowed, wm can be used to remove decorations, move windows around, etc. KEYWORDS
safe, application, initialization, load, main window ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +--------------------+-----------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +--------------------+-----------------+ |Availability | SUNWTk | +--------------------+-----------------+ |Interface Stability | Uncommitted | +--------------------+-----------------+ NOTES
Source for Tk is available on http://opensolaris.org. Tk 8.0 Tk_Init(3TK)
Man Page