ftok.3 (246e7a2b6494cd991b08ac669ed761ecea0cc98c) ftok.3 (0aee91e1fb311f4f92779bb2c7ef0c1fe10d8d35)
1.\" Copyright (c) 1994 SigmaSoft, Th. Lockert <tholo@sigmasoft.com>
2.\" All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 50 unchanged lines hidden (view full) ---

59.Fa id .
60.Sh RETURN VALUES
61The
62.Fn ftok
63function will return -1 if
64.Fa path
65does not exist or if it cannot be accessed by the calling process.
66.Sh SEE ALSO
1.\" Copyright (c) 1994 SigmaSoft, Th. Lockert <tholo@sigmasoft.com>
2.\" All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 50 unchanged lines hidden (view full) ---

59.Fa id .
60.Sh RETURN VALUES
61The
62.Fn ftok
63function will return -1 if
64.Fa path
65does not exist or if it cannot be accessed by the calling process.
66.Sh SEE ALSO
67.Xr msgget 2 ,
67.Xr semget 2 ,
68.Xr semget 2 ,
68.Xr shmget 2 ,
69.Xr msgget 2
69.Xr shmget 2
70.Sh HISTORY
71The
72.Fn ftok
73function originates with System V and is typically used by programs
74that use the System V IPC routines.
75.Sh AUTHORS
76.An Thorsten Lockert Aq Mt tholo@sigmasoft.com
77.Sh BUGS
78The returned key is computed based on the device minor number and inode of the
79specified
80.Fa path
81in combination with the lower 8 bits of the given
82.Fa id .
83Thus it is quite possible for the routine to return duplicate keys.
70.Sh HISTORY
71The
72.Fn ftok
73function originates with System V and is typically used by programs
74that use the System V IPC routines.
75.Sh AUTHORS
76.An Thorsten Lockert Aq Mt tholo@sigmasoft.com
77.Sh BUGS
78The returned key is computed based on the device minor number and inode of the
79specified
80.Fa path
81in combination with the lower 8 bits of the given
82.Fa id .
83Thus it is quite possible for the routine to return duplicate keys.