Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/lib/libc/db/man Convert to mdoc.
details: https://anonhg.NetBSD.org/src/rev/05e8ead5853f
branches: trunk
changeset: 545912:05e8ead5853f
user: wiz <wiz%NetBSD.org@localhost>
date: Thu Apr 17 19:18:01 2003 +0000
description:
Convert to mdoc.
diffstat:
lib/libc/db/man/hash.3 | 194 +++++++++++++++++++++++++-----------------------
1 files changed, 100 insertions(+), 94 deletions(-)
diffs (238 lines):
diff -r 1765b1730b6f -r 05e8ead5853f lib/libc/db/man/hash.3
--- a/lib/libc/db/man/hash.3 Thu Apr 17 19:17:48 2003 +0000
+++ b/lib/libc/db/man/hash.3 Thu Apr 17 19:18:01 2003 +0000
@@ -1,4 +1,4 @@
-.\" $NetBSD: hash.3,v 1.8 2002/02/07 07:00:10 ross Exp $
+.\" $NetBSD: hash.3,v 1.9 2003/04/17 19:18:01 wiz Exp $
.\"
.\" Copyright (c) 1990, 1993
.\" The Regents of the University of California. All rights reserved.
@@ -33,129 +33,135 @@
.\"
.\" @(#)hash.3 8.6 (Berkeley) 8/18/94
.\"
-.TH HASH 3 "August 18, 1994"
-.UC 7
-.SH NAME
-hash \- hash database access method
-.SH SYNOPSIS
-.nf
-.ft B
-#include \*[Lt]sys/types.h\*[Gt]
-#include \*[Lt]db.h\*[Gt]
-.ft R
-.fi
-.SH DESCRIPTION
+.Dd April 17, 2003
+.Dt HASH 3
+.Os
+.Sh NAME
+.Nm hash
+.Nd hash database access method
+.Sh SYNOPSIS
+.In sys/types.h
+.In db.h
+.Sh DESCRIPTION
The routine
-.IR dbopen
+.Fn dbopen
is the library interface to database files.
One of the supported file formats is hash files.
The general description of the database access methods is in
-.IR dbopen (3),
+.Xr dbopen 3 ,
this manual page describes only the hash specific information.
-.PP
+.Pp
The hash data structure is an extensible, dynamic hashing scheme.
-.PP
+.Pp
The access method specific data structure provided to
-.I dbopen
-is defined in the \*[Lt]db.h\*[Gt] include file as follows:
-.sp
+.Fn dbopen
+is defined in the
+.Aq Pa db.h
+include file as follows:
+.Bd -literal
typedef struct {
-.RS
-u_int bsize;
-.br
-u_int ffactor;
-.br
-u_int nelem;
-.br
-u_int cachesize;
-.br
-u_int32_t (*hash)(const void *, size_t);
-.br
-int lorder;
-.RE
+ u_int bsize;
+ u_int ffactor;
+ u_int nelem;
+ u_int cachesize;
+ u_int32_t (*hash)(const void *, size_t);
+ int lorder;
} HASHINFO;
-.PP
+.Ed
+.Pp
The elements of this structure are as follows:
-.TP
-bsize
-.I Bsize
+.Bl -tag -width cachesizex
+.It Fa bsize
+.Fa bsize
defines the hash table bucket size, and is, by default, 256 bytes.
-It may be preferable to increase the page size for disk-resident tables
-and tables with large data items.
-.TP
-ffactor
-.I Ffactor
+It may be preferable to increase the page size for disk-resident
+tables and tables with large data items.
+.It Fa ffactor
+.Fa ffactor
indicates a desired density within the hash table.
-It is an approximation of the number of keys allowed to accumulate in any
-one bucket, determining when the hash table grows or shrinks.
+It is an approximation of the number of keys allowed to accumulate in
+any one bucket, determining when the hash table grows or shrinks.
The default value is 8.
-.TP
-nelem
-.I Nelem
+.It Fa nelem
+.Fa nelem
is an estimate of the final size of the hash table.
If not set or set too low, hash tables will expand gracefully as keys
-are entered, although a slight performance degradation may be noticed.
+are entered, although a slight performance degradation may be
+noticed.
The default value is 1.
-.TP
-cachesize
+.It Fa cachesize
A suggested maximum size, in bytes, of the memory cache.
This value is
-.B only
+.Em only
advisory, and the access method will allocate more memory rather
than fail.
-.TP
-hash
-.I Hash
+.It Fa hash
+.Fa hash
is a user defined hash function.
Since no hash function performs equally well on all possible data, the
-user may find that the built-in hash function does poorly on a particular
-data set.
-User specified hash functions must take two arguments (a pointer to a byte
-string and a length) and return a 32-bit quantity to be used as the hash
-value.
-.TP
-lorder
+user may find that the built-in hash function does poorly on a
+particular data set.
+User specified hash functions must take two arguments (a pointer to a
+byte string and a length) and return a 32-bit quantity to be used as
+the hash value.
+.It Fa lorder
The byte order for integers in the stored database metadata.
The number should represent the order as an integer; for example,
big endian order would be the number 4,321.
If
-.I lorder
+.Fa lorder
is 0 (no order is specified) the current host order is used.
-If the file already exists, the specified value is ignored and the
+If the file already exists, the specified value is ignored and the
value specified when the tree was created is used.
-.PP
-If the file already exists (and the O_TRUNC flag is not specified), the
-values specified for the parameters bsize, ffactor, lorder and nelem are
-ignored and the values specified when the tree was created are used.
-.PP
-If a hash function is specified,
-.I hash_open
-will attempt to determine if the hash function specified is the same as
-the one with which the database was created, and will fail if it is not.
-.PP
-Backward compatible interfaces to the routines described in
-.IR dbm (3),
+.El
+.Pp
+If the file already exists (and the
+.Dv O_TRUNC
+flag is not specified), the values specified for the parameters
+.Fa bsize ,
+.Fa ffactor ,
+.Fa lorder ,
and
-.IR ndbm (3)
-are provided, however these interfaces are not compatible with
-previous file formats.
-.SH ERRORS
+.Fa nelem
+are ignored and the values specified when the tree was created are
+used.
+.Pp
+If a hash function is specified,
+.Fn hash_open
+will attempt to determine if the hash function specified is the same
+as the one with which the database was created, and will fail if it is
+not.
+.\".Pp
+.\"Backward compatible interfaces to the routines described in
+.\".Xr dbm 3 ,
+.\"and
+.\".Xr ndbm 3
+.\"are provided, however these interfaces are not compatible with
+.\"previous file formats.
+.Sh ERRORS
The
-.I hash
+.Nm
access method routines may fail and set
-.I errno
+.Va errno
for any of the errors specified for the library routine
-.IR dbopen (3).
-.SH "SEE ALSO"
-.IR btree (3),
-.IR dbopen (3),
-.IR mpool (3),
-.IR recno (3)
-.sp
-.IR "Dynamic Hash Tables" ,
-Per-Ake Larson, Communications of the ACM, April 1988.
-.sp
-.IR "A New Hash Package for UNIX" ,
-Margo Seltzer, USENIX Proceedings, Winter 1991.
-.SH BUGS
+.Xr dbopen 3 .
+.Sh SEE ALSO
+.Xr btree 3 ,
+.Xr dbopen 3 ,
+.Xr mpool 3 ,
+.Xr recno 3
+.Pp
+.Rs
+.%T "Dynamic Hash Tables"
+.%A Per-Ake Larson
+.%J Communications of the ACM
+.%D April 1988
+.Re
+.Rs
+.%T "A New Hash Package for UNIX"
+.%A Margo Seltzer
+.%J USENIX Proceedings
+.%D Winter 1991
+.Re
+.Sh BUGS
Only big and little endian byte order is supported.
Home |
Main Index |
Thread Index |
Old Index