ftok.3 (246e7a2b6494cd991b08ac669ed761ecea0cc98c) | ftok.3 (0aee91e1fb311f4f92779bb2c7ef0c1fe10d8d35) |
---|---|
1.\" Copyright (c) 1994 SigmaSoft, Th. Lockert <tholo@sigmasoft.com> 2.\" All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 50 unchanged lines hidden (view full) --- 59.Fa id . 60.Sh RETURN VALUES 61The 62.Fn ftok 63function will return -1 if 64.Fa path 65does not exist or if it cannot be accessed by the calling process. 66.Sh SEE ALSO | 1.\" Copyright (c) 1994 SigmaSoft, Th. Lockert <tholo@sigmasoft.com> 2.\" All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 50 unchanged lines hidden (view full) --- 59.Fa id . 60.Sh RETURN VALUES 61The 62.Fn ftok 63function will return -1 if 64.Fa path 65does not exist or if it cannot be accessed by the calling process. 66.Sh SEE ALSO |
67.Xr msgget 2 , |
|
67.Xr semget 2 , | 68.Xr semget 2 , |
68.Xr shmget 2 , 69.Xr msgget 2 | 69.Xr shmget 2 |
70.Sh HISTORY 71The 72.Fn ftok 73function originates with System V and is typically used by programs 74that use the System V IPC routines. 75.Sh AUTHORS 76.An Thorsten Lockert Aq Mt tholo@sigmasoft.com 77.Sh BUGS 78The returned key is computed based on the device minor number and inode of the 79specified 80.Fa path 81in combination with the lower 8 bits of the given 82.Fa id . 83Thus it is quite possible for the routine to return duplicate keys. | 70.Sh HISTORY 71The 72.Fn ftok 73function originates with System V and is typically used by programs 74that use the System V IPC routines. 75.Sh AUTHORS 76.An Thorsten Lockert Aq Mt tholo@sigmasoft.com 77.Sh BUGS 78The returned key is computed based on the device minor number and inode of the 79specified 80.Fa path 81in combination with the lower 8 bits of the given 82.Fa id . 83Thus it is quite possible for the routine to return duplicate keys. |