hash.3 (1573) | hash.3 (14272) |
---|---|
1.\" Copyright (c) 1990, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 15 unchanged lines hidden (view full) --- 24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" | 1.\" Copyright (c) 1990, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 15 unchanged lines hidden (view full) --- 24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" |
32.\" @(#)hash.3 8.5 (Berkeley) 2/21/94 | 32.\" @(#)hash.3 8.6 (Berkeley) 8/18/94 |
33.\" | 33.\" |
34.TH HASH 3 "February 21, 1994" | 34.TH HASH 3 "August 18, 1994" |
35.UC 7 36.SH NAME 37hash \- hash database access method 38.SH SYNOPSIS 39.nf 40.ft B 41#include <sys/types.h> 42#include <db.h> --- 89 unchanged lines hidden (view full) --- 132the one with which the database was created, and will fail if it is not. 133.PP 134Backward compatible interfaces to the routines described in 135.IR dbm (3), 136and 137.IR ndbm (3) 138are provided, however these interfaces are not compatible with 139previous file formats. | 35.UC 7 36.SH NAME 37hash \- hash database access method 38.SH SYNOPSIS 39.nf 40.ft B 41#include <sys/types.h> 42#include <db.h> --- 89 unchanged lines hidden (view full) --- 132the one with which the database was created, and will fail if it is not. 133.PP 134Backward compatible interfaces to the routines described in 135.IR dbm (3), 136and 137.IR ndbm (3) 138are provided, however these interfaces are not compatible with 139previous file formats. |
140.SH ERRORS 141The 142.I hash 143access method routines may fail and set 144.I errno 145for any of the errors specified for the library routine 146.IR dbopen (3). |
|
140.SH "SEE ALSO" 141.IR btree (3), 142.IR dbopen (3), 143.IR mpool (3), 144.IR recno (3) 145.sp 146.IR "Dynamic Hash Tables" , 147Per-Ake Larson, Communications of the ACM, April 1988. 148.sp 149.IR "A New Hash Package for UNIX" , 150Margo Seltzer, USENIX Proceedings, Winter 1991. 151.SH BUGS 152Only big and little endian byte order is supported. | 147.SH "SEE ALSO" 148.IR btree (3), 149.IR dbopen (3), 150.IR mpool (3), 151.IR recno (3) 152.sp 153.IR "Dynamic Hash Tables" , 154Per-Ake Larson, Communications of the ACM, April 1988. 155.sp 156.IR "A New Hash Package for UNIX" , 157Margo Seltzer, USENIX Proceedings, Winter 1991. 158.SH BUGS 159Only big and little endian byte order is supported. |