Many hyperlinks are disabled.
Use anonymous login
to enable hyperlinks.
Overview
Comment: | Grammar check... |
---|---|
Downloads: | Tarball | ZIP archive | SQL archive |
Timelines: | family | ancestors | descendants | both | trunk |
Files: | files | file ages | folders |
SHA1: |
709893c6598797b10e99ede0de125aea |
User & Date: | dkf 2013-11-12 15:47:21 |
Context
2013-11-15
| ||
16:13 | Don't leak getaddrinfo() results check-in: a94b14f5b4 user: max tags: trunk | |
2013-11-14
| ||
10:25 | merge trunk check-in: bfd0e7d5aa user: dkf tags: dkf-bytecode-8.6-main | |
2013-11-13
| ||
22:18 | merge trunk check-in: 7a9fe7d77b user: jan.nijtmans tags: novem | |
2013-11-12
| ||
15:47 | Grammar check... check-in: 709893c659 user: dkf tags: trunk | |
15:43 | [528717] Slight rewording to clarify what the evaluation steps are. check-in: c0264cc2d3 user: dkf tags: trunk | |
Changes
Changes to doc/Tcl.n.
︙ | ︙ | |||
24 25 26 27 28 29 30 | (see below) unless quoted. .IP "[2] \fBEvaluation.\fR" A command is evaluated in two steps. First, the Tcl interpreter breaks the command into \fIwords\fR and performs substitutions as described below. These substitutions are performed in the same way for all commands. | | | 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 | (see below) unless quoted. .IP "[2] \fBEvaluation.\fR" A command is evaluated in two steps. First, the Tcl interpreter breaks the command into \fIwords\fR and performs substitutions as described below. These substitutions are performed in the same way for all commands. Secondly, the first word is used to locate a command procedure to carry out the command, then all of the words of the command are passed to the command procedure. The command procedure is free to interpret each of its words in any way it likes, such as an integer, variable name, list, or Tcl script. Different commands interpret their words differently. .IP "[3] \fBWords.\fR" |
︙ | ︙ |