mirror of https://github.com/mkerrisk/man-pages
ffix
This commit is contained in:
parent
3b8affded2
commit
d830deef33
11
man3/cexp.3
11
man3/cexp.3
|
@ -1,7 +1,7 @@
|
||||||
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
|
.\" Copyright 2002 Walter Harms (walter.harms@informatik.uni-oldenburg.de)
|
||||||
.\" Distributed under GPL
|
.\" Distributed under GPL
|
||||||
.\"
|
.\"
|
||||||
.TH CEXP 3 2002-07-28 "" "Linux Programmer's Manual"
|
.TH CEXP 3 2007-12-26 "" "Linux Programmer's Manual"
|
||||||
.SH NAME
|
.SH NAME
|
||||||
cexp, cexpf, cexpl \- complex exponential function
|
cexp, cexpf, cexpl \- complex exponential function
|
||||||
.SH SYNOPSIS
|
.SH SYNOPSIS
|
||||||
|
@ -16,9 +16,14 @@ cexp, cexpf, cexpl \- complex exponential function
|
||||||
Link with \fI\-lm\fP.
|
Link with \fI\-lm\fP.
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
The function calculates e (2.71828..., the base of natural logarithms)
|
The function calculates e (2.71828..., the base of natural logarithms)
|
||||||
raised to the power of z.
|
raised to the power of
|
||||||
|
.BR z .
|
||||||
.LP
|
.LP
|
||||||
One has cexp(I * z) = ccos(z) + I * csin(z).
|
One has:
|
||||||
|
.nf
|
||||||
|
|
||||||
|
cexp(I * z) = ccos(z) + I * csin(z)
|
||||||
|
.fi
|
||||||
.SH "CONFORMING TO"
|
.SH "CONFORMING TO"
|
||||||
C99
|
C99
|
||||||
.SH "SEE ALSO"
|
.SH "SEE ALSO"
|
||||||
|
|
|
@ -15,7 +15,8 @@ cexp2, cexp2f, cexp2l \- base-2 exponent of a complex number
|
||||||
.sp
|
.sp
|
||||||
Link with \fI\-lm\fP.
|
Link with \fI\-lm\fP.
|
||||||
.SH DESCRIPTION
|
.SH DESCRIPTION
|
||||||
The function returns 2 raised to the power of z.
|
The function returns 2 raised to the power of
|
||||||
|
.IR z .
|
||||||
.SH "CONFORMING TO"
|
.SH "CONFORMING TO"
|
||||||
These function names are reserved for future use in C99.
|
These function names are reserved for future use in C99.
|
||||||
.SH AVAILABILITY
|
.SH AVAILABILITY
|
||||||
|
|
|
@ -73,11 +73,11 @@ and rejected
|
||||||
Used in security-conscious applications.
|
Used in security-conscious applications.
|
||||||
If it is unavailable
|
If it is unavailable
|
||||||
the assignment
|
the assignment
|
||||||
.RS
|
|
||||||
.nf
|
.nf
|
||||||
|
|
||||||
environ = NULL;
|
environ = NULL;
|
||||||
|
|
||||||
.fi
|
.fi
|
||||||
.RE
|
|
||||||
will probably do.
|
will probably do.
|
||||||
.LP
|
.LP
|
||||||
The DG/UX and Tru64 man pages write: If
|
The DG/UX and Tru64 man pages write: If
|
||||||
|
|
Loading…
Reference in New Issue