Initial commit of OpenSPARC T2 architecture model.
[OpenSPARC-T2-SAM] / sam-t2 / devtools / v8plus / man / man3 / Hash::Util.3
CommitLineData
920dae64
AT
1.\" Automatically generated by Pod::Man v1.37, Pod::Parser v1.32
2.\"
3.\" Standard preamble:
4.\" ========================================================================
5.de Sh \" Subsection heading
6.br
7.if t .Sp
8.ne 5
9.PP
10\fB\\$1\fR
11.PP
12..
13.de Sp \" Vertical space (when we can't use .PP)
14.if t .sp .5v
15.if n .sp
16..
17.de Vb \" Begin verbatim text
18.ft CW
19.nf
20.ne \\$1
21..
22.de Ve \" End verbatim text
23.ft R
24.fi
25..
26.\" Set up some character translations and predefined strings. \*(-- will
27.\" give an unbreakable dash, \*(PI will give pi, \*(L" will give a left
28.\" double quote, and \*(R" will give a right double quote. | will give a
29.\" real vertical bar. \*(C+ will give a nicer C++. Capital omega is used to
30.\" do unbreakable dashes and therefore won't be available. \*(C` and \*(C'
31.\" expand to `' in nroff, nothing in troff, for use with C<>.
32.tr \(*W-|\(bv\*(Tr
33.ds C+ C\v'-.1v'\h'-1p'\s-2+\h'-1p'+\s0\v'.1v'\h'-1p'
34.ie n \{\
35. ds -- \(*W-
36. ds PI pi
37. if (\n(.H=4u)&(1m=24u) .ds -- \(*W\h'-12u'\(*W\h'-12u'-\" diablo 10 pitch
38. if (\n(.H=4u)&(1m=20u) .ds -- \(*W\h'-12u'\(*W\h'-8u'-\" diablo 12 pitch
39. ds L" ""
40. ds R" ""
41. ds C` ""
42. ds C' ""
43'br\}
44.el\{\
45. ds -- \|\(em\|
46. ds PI \(*p
47. ds L" ``
48. ds R" ''
49'br\}
50.\"
51.\" If the F register is turned on, we'll generate index entries on stderr for
52.\" titles (.TH), headers (.SH), subsections (.Sh), items (.Ip), and index
53.\" entries marked with X<> in POD. Of course, you'll have to process the
54.\" output yourself in some meaningful fashion.
55.if \nF \{\
56. de IX
57. tm Index:\\$1\t\\n%\t"\\$2"
58..
59. nr % 0
60. rr F
61.\}
62.\"
63.\" For nroff, turn off justification. Always turn off hyphenation; it makes
64.\" way too many mistakes in technical documents.
65.hy 0
66.if n .na
67.\"
68.\" Accent mark definitions (@(#)ms.acc 1.5 88/02/08 SMI; from UCB 4.2).
69.\" Fear. Run. Save yourself. No user-serviceable parts.
70. \" fudge factors for nroff and troff
71.if n \{\
72. ds #H 0
73. ds #V .8m
74. ds #F .3m
75. ds #[ \f1
76. ds #] \fP
77.\}
78.if t \{\
79. ds #H ((1u-(\\\\n(.fu%2u))*.13m)
80. ds #V .6m
81. ds #F 0
82. ds #[ \&
83. ds #] \&
84.\}
85. \" simple accents for nroff and troff
86.if n \{\
87. ds ' \&
88. ds ` \&
89. ds ^ \&
90. ds , \&
91. ds ~ ~
92. ds /
93.\}
94.if t \{\
95. ds ' \\k:\h'-(\\n(.wu*8/10-\*(#H)'\'\h"|\\n:u"
96. ds ` \\k:\h'-(\\n(.wu*8/10-\*(#H)'\`\h'|\\n:u'
97. ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'^\h'|\\n:u'
98. ds , \\k:\h'-(\\n(.wu*8/10)',\h'|\\n:u'
99. ds ~ \\k:\h'-(\\n(.wu-\*(#H-.1m)'~\h'|\\n:u'
100. ds / \\k:\h'-(\\n(.wu*8/10-\*(#H)'\z\(sl\h'|\\n:u'
101.\}
102. \" troff and (daisy-wheel) nroff accents
103.ds : \\k:\h'-(\\n(.wu*8/10-\*(#H+.1m+\*(#F)'\v'-\*(#V'\z.\h'.2m+\*(#F'.\h'|\\n:u'\v'\*(#V'
104.ds 8 \h'\*(#H'\(*b\h'-\*(#H'
105.ds o \\k:\h'-(\\n(.wu+\w'\(de'u-\*(#H)/2u'\v'-.3n'\*(#[\z\(de\v'.3n'\h'|\\n:u'\*(#]
106.ds d- \h'\*(#H'\(pd\h'-\w'~'u'\v'-.25m'\f2\(hy\fP\v'.25m'\h'-\*(#H'
107.ds D- D\\k:\h'-\w'D'u'\v'-.11m'\z\(hy\v'.11m'\h'|\\n:u'
108.ds th \*(#[\v'.3m'\s+1I\s-1\v'-.3m'\h'-(\w'I'u*2/3)'\s-1o\s+1\*(#]
109.ds Th \*(#[\s+2I\s-2\h'-\w'I'u*3/5'\v'-.3m'o\v'.3m'\*(#]
110.ds ae a\h'-(\w'a'u*4/10)'e
111.ds Ae A\h'-(\w'A'u*4/10)'E
112. \" corrections for vroff
113.if v .ds ~ \\k:\h'-(\\n(.wu*9/10-\*(#H)'\s-2\u~\d\s+2\h'|\\n:u'
114.if v .ds ^ \\k:\h'-(\\n(.wu*10/11-\*(#H)'\v'-.4m'^\v'.4m'\h'|\\n:u'
115. \" for low resolution devices (crt and lpr)
116.if \n(.H>23 .if \n(.V>19 \
117\{\
118. ds : e
119. ds 8 ss
120. ds o a
121. ds d- d\h'-1'\(ga
122. ds D- D\h'-1'\(hy
123. ds th \o'bp'
124. ds Th \o'LP'
125. ds ae ae
126. ds Ae AE
127.\}
128.rm #[ #] #H #V #F C
129.\" ========================================================================
130.\"
131.IX Title "Hash::Util 3"
132.TH Hash::Util 3 "2001-09-21" "perl v5.8.8" "Perl Programmers Reference Guide"
133.SH "NAME"
134Hash::Util \- A selection of general\-utility hash subroutines
135.SH "SYNOPSIS"
136.IX Header "SYNOPSIS"
137.Vb 4
138\& use Hash::Util qw(lock_keys unlock_keys
139\& lock_value unlock_value
140\& lock_hash unlock_hash
141\& hash_seed);
142.Ve
143.PP
144.Vb 4
145\& %hash = (foo => 42, bar => 23);
146\& lock_keys(%hash);
147\& lock_keys(%hash, @keyset);
148\& unlock_keys(%hash);
149.Ve
150.PP
151.Vb 2
152\& lock_value (%hash, 'foo');
153\& unlock_value(%hash, 'foo');
154.Ve
155.PP
156.Vb 2
157\& lock_hash (%hash);
158\& unlock_hash(%hash);
159.Ve
160.PP
161.Vb 1
162\& my $hashes_are_randomised = hash_seed() != 0;
163.Ve
164.SH "DESCRIPTION"
165.IX Header "DESCRIPTION"
166\&\f(CW\*(C`Hash::Util\*(C'\fR contains special functions for manipulating hashes that
167don't really warrant a keyword.
168.PP
169By default \f(CW\*(C`Hash::Util\*(C'\fR does not export anything.
170.Sh "Restricted hashes"
171.IX Subsection "Restricted hashes"
1725.8.0 introduces the ability to restrict a hash to a certain set of
173keys. No keys outside of this set can be added. It also introduces
174the ability to lock an individual key so it cannot be deleted and the
175value cannot be changed.
176.PP
177This is intended to largely replace the deprecated pseudo\-hashes.
178.IP "lock_keys" 4
179.IX Item "lock_keys"
180.PD 0
181.IP "unlock_keys" 4
182.IX Item "unlock_keys"
183.PD
184.Vb 2
185\& lock_keys(%hash);
186\& lock_keys(%hash, @keys);
187.Ve
188.Sp
189Restricts the given \f(CW%hash\fR's set of keys to \f(CW@keys\fR. If \f(CW@keys\fR is not
190given it restricts it to its current keyset. No more keys can be
191added. \fIdelete()\fR and \fIexists()\fR will still work, but will not alter
192the set of allowed keys. \fBNote\fR: the current implementation prevents
193the hash from being \fIbless()\fRed while it is in a locked state. Any attempt
194to do so will raise an exception. Of course you can still \fIbless()\fR
195the hash before you call \fIlock_keys()\fR so this shouldn't be a problem.
196.Sp
197.Vb 1
198\& unlock_keys(%hash);
199.Ve
200.Sp
201Removes the restriction on the \f(CW%hash\fR's keyset.
202.IP "lock_value" 4
203.IX Item "lock_value"
204.PD 0
205.IP "unlock_value" 4
206.IX Item "unlock_value"
207.PD
208.Vb 2
209\& lock_value (%hash, $key);
210\& unlock_value(%hash, $key);
211.Ve
212.Sp
213Locks and unlocks an individual key of a hash. The value of a locked
214key cannot be changed.
215.Sp
216%hash must have already been locked for this to have useful effect.
217.IP "\fBlock_hash\fR" 4
218.IX Item "lock_hash"
219.PD 0
220.IP "\fBunlock_hash\fR" 4
221.IX Item "unlock_hash"
222.PD
223.Vb 1
224\& lock_hash(%hash);
225.Ve
226.Sp
227\&\fIlock_hash()\fR locks an entire hash, making all keys and values readonly.
228No value can be changed, no keys can be added or deleted.
229.Sp
230.Vb 1
231\& unlock_hash(%hash);
232.Ve
233.Sp
234\&\fIunlock_hash()\fR does the opposite of \fIlock_hash()\fR. All keys and values
235are made read/write. All values can be changed and keys can be added
236and deleted.
237.IP "\fBhash_seed\fR" 4
238.IX Item "hash_seed"
239.Vb 1
240\& my $hash_seed = hash_seed();
241.Ve
242.Sp
243\&\fIhash_seed()\fR returns the seed number used to randomise hash ordering.
244Zero means the \*(L"traditional\*(R" random hash ordering, non-zero means the
245new even more random hash ordering introduced in Perl 5.8.1.
246.Sp
247\&\fBNote that the hash seed is sensitive information\fR: by knowing it one
248can craft a denial-of-service attack against Perl code, even remotely,
249see \*(L"Algorithmic Complexity Attacks\*(R" in perlsec for more information.
250\&\fBDo not disclose the hash seed\fR to people who don't need to know it.
251See also \*(L"\s-1PERL_HASH_SEED_DEBUG\s0\*(R" in perlrun.
252.SH "CAVEATS"
253.IX Header "CAVEATS"
254Note that the trapping of the restricted operations is not atomic:
255for example
256.PP
257.Vb 1
258\& eval { %hash = (illegal_key => 1) }
259.Ve
260.PP
261leaves the \f(CW%hash\fR empty rather than with its original contents.
262.SH "AUTHOR"
263.IX Header "AUTHOR"
264Michael G Schwern <schwern@pobox.com> on top of code by Nick
265Ing-Simmons and Jeffrey Friedl.
266.SH "SEE ALSO"
267.IX Header "SEE ALSO"
268Scalar::Util, List::Util, Hash::Util,
269and \*(L"Algorithmic Complexity Attacks\*(R" in perlsec.