Deleted Added
full compact
hash.3 (1573) hash.3 (14272)
1.\" Copyright (c) 1990, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 15 unchanged lines hidden (view full) ---

24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
1.\" Copyright (c) 1990, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 15 unchanged lines hidden (view full) ---

24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)hash.3 8.5 (Berkeley) 2/21/94
32.\" @(#)hash.3 8.6 (Berkeley) 8/18/94
33.\"
33.\"
34.TH HASH 3 "February 21, 1994"
34.TH HASH 3 "August 18, 1994"
35.UC 7
36.SH NAME
37hash \- hash database access method
38.SH SYNOPSIS
39.nf
40.ft B
41#include <sys/types.h>
42#include <db.h>

--- 89 unchanged lines hidden (view full) ---

132the one with which the database was created, and will fail if it is not.
133.PP
134Backward compatible interfaces to the routines described in
135.IR dbm (3),
136and
137.IR ndbm (3)
138are provided, however these interfaces are not compatible with
139previous file formats.
35.UC 7
36.SH NAME
37hash \- hash database access method
38.SH SYNOPSIS
39.nf
40.ft B
41#include <sys/types.h>
42#include <db.h>

--- 89 unchanged lines hidden (view full) ---

132the one with which the database was created, and will fail if it is not.
133.PP
134Backward compatible interfaces to the routines described in
135.IR dbm (3),
136and
137.IR ndbm (3)
138are provided, however these interfaces are not compatible with
139previous file formats.
140.SH ERRORS
141The
142.I hash
143access method routines may fail and set
144.I errno
145for any of the errors specified for the library routine
146.IR dbopen (3).
140.SH "SEE ALSO"
141.IR btree (3),
142.IR dbopen (3),
143.IR mpool (3),
144.IR recno (3)
145.sp
146.IR "Dynamic Hash Tables" ,
147Per-Ake Larson, Communications of the ACM, April 1988.
148.sp
149.IR "A New Hash Package for UNIX" ,
150Margo Seltzer, USENIX Proceedings, Winter 1991.
151.SH BUGS
152Only big and little endian byte order is supported.
147.SH "SEE ALSO"
148.IR btree (3),
149.IR dbopen (3),
150.IR mpool (3),
151.IR recno (3)
152.sp
153.IR "Dynamic Hash Tables" ,
154Per-Ake Larson, Communications of the ACM, April 1988.
155.sp
156.IR "A New Hash Package for UNIX" ,
157Margo Seltzer, USENIX Proceedings, Winter 1991.
158.SH BUGS
159Only big and little endian byte order is supported.