y0,  y0f,  y0l,  y1,  y1f,  y1l, yn, ynf, ynl - Bessel functions of the
   second kind


   #include <math.h>

   double y0(double x);
   double y1(double x);
   double yn(int n, double x);

   float y0f(float x);
   float y1f(float x);
   float ynf(int n, float x);

   long double y0l(long double x);
   long double y1l(long double x);
   long double ynl(int n, long double x);

   Link with -lm.

   Feature Test Macro Requirements for glibc (see feature_test_macros(7)):

   y0(), y1(), yn():
           || /* Since glibc 2.19: */ _DEFAULT_SOURCE
           || /* Glibc versions <= 2.19: */ _SVID_SOURCE || _BSD_SOURCE
   y0f(), y0l(), y1f(), y1l(), ynf(), ynl():
       _XOPEN_SOURCE  >= 600
           || (_ISOC99_SOURCE && _XOPEN_SOURCE)
           || /* Since glibc 2.19: */ _DEFAULT_SOURCE
           || /* Glibc versions <= 2.19: */ _SVID_SOURCE || _BSD_SOURCE


   The y0() and y1() functions return Bessel functions of x of the  second
   kind  of  orders  0 and 1, respectively.  The yn() function returns the
   Bessel function of x of the second kind of order n.

   The value of x must be positive.

   The y0f(), y1f(), and ynf() functions are versions that take and return
   float  values.  The y0l(), y1l(), and ynl() functions are versions that
   take and return long double values.


   On success, these functions return the appropriate Bessel value of  the
   second kind for x.

   If x is a NaN, a NaN is returned.

   If  x  is  negative,  a  domain  error occurs, and the functions return
   -HUGE_VAL, -HUGE_VALF, or -HUGE_VALL, respectively.  (POSIX.1-2001 also
   allows a NaN return for this case.)

   If  x  is 0.0, a pole error occurs, and the functions return -HUGE_VAL,
   -HUGE_VALF, or -HUGE_VALL, respectively.

   If the result underflows, a  range  error  occurs,  and  the  functions
   return 0.0

   If the result overflows, a range error occurs, and the functions return
   -HUGE_VAL, -HUGE_VALF, or -HUGE_VALL, respectively.  (POSIX.1-2001 also
   allows a 0.0 return for this case.)


   See  math_error(7) for information on how to determine whether an error
   has occurred when calling these functions.

   The following errors can occur:

   Domain error: x is negative
          errno is set  to  EDOM.   An  invalid  floating-point  exception
          (FE_INVALID) is raised.

   Pole error: x is 0.0
          errno  is  set  to  ERANGE  (but  see  BUGS).   No  FE_DIVBYZERO
          exception is returned by fetestexcept(3) for this case.

   Range error: result underflow
          errno is set to ERANGE.  No FE_UNDERFLOW exception  is  returned
          by fetestexcept(3) for this case.

   Range error: result overflow
          errno  is  not  set  for  this case.  An overflow floating-point
          exception (FE_OVERFLOW) is raised.


   For  an  explanation  of  the  terms  used   in   this   section,   see

   │InterfaceAttributeValue   │
   │y0(), y0f(), y0l() │ Thread safety │ MT-Safe │
   │y1(), y1f(), y1l() │ Thread safety │ MT-Safe │
   │yn(), ynf(), ynl() │ Thread safety │ MT-Safe │


   The  functions  returning double conform to SVr4, 4.3BSD, POSIX.1-2001,
   POSIX.1-2008.  The others are nonstandard functions that also exist  on
   the BSDs.


   On  a  pole error, these functions set errno to EDOM, instead of ERANGE
   as POSIX.1-2004 requires.

   In glibc version 2.3.2 and earlier, these functions  do  not  raise  an
   invalid  floating-point  exception  (FE_INVALID)  when  a  domain error




   This page is part of release 4.09 of the Linux  man-pages  project.   A
   description  of  the project, information about reporting bugs, and the
   latest    version    of    this    page,    can     be     found     at

                              2016-03-15                             Y0(3)

More Linux Commands

acl_get_tag_type(3) - get the tag type of an ACL entry......
The acl_get_tag_type() function assigns to the value pointed to by tag_type_p the tag type for the ACL entry indicated by the argument entry_d. The argument ent

gnutls_privkey_decrypt_data(3) - API function (Man Page)....
This function will decrypt the given data using the algorithm supported by the private key. RETURNS On success, GNUTLS_E_SUCCESS (0) is returned, otherwise a ne

mbexamine(8) - examine a cyrus-format mailbox (Man Page)....
Mbexamine will examine the header, index, and cache files of a cyrus format mailbox and dump the information contained therein. It can also limit its output to

gluDisk(3gl) - draw a disk (Library - Linux man page).......
gluDisk renders a disk on the z = 0 plane. The disk has a radius of outer, and contains a concentric circular hole with a radius of inner. If inner is 0, then n

div(3) - compute quotient and remainder of an integer divisi
div.3 - The div() function computes the value numerator/denominator and returns the quotient and remainder in a structure named div_t that contains two integer

XtCreateSelectionRequest(3) - bundle multiple selection conv
When XtCreateSelectionRequest is called, subsequent calls to XtGetSelectionValue and XtGetSelectionValueIncremental with the requestor and selection as specifie

jscal(1) joystick calibration and remapping program.........
jscal calibrates joysticks and maps joystick axes and buttons. Calibrating a joystick ensures the positions on the various axes are correctly interpreted. Mappi

fts_set(3) - traverse a file hierarchy - Linux manual page
The fts functions are provided for traversing file hierarchies. A simple overview is that the fts_open() function returns a handle on a file hierarchy, which is

nsswitch.conf(5) - System Databases and Name Service Switch
The Name Service Switch (NSS) configuration file, /etc/nsswitch.conf, is used by the GNU C Library to determine the sources from which to obtain name-service in

ldap_memalloc(3) - LDAP memory allocation routines (ManPage)
These routines are used to allocate/deallocate memory used/returned by the LDAP library. ldap_memalloc(), ldap_memcalloc(), ldap_memrealloc(), and ldap_memfree(

setgroups(2) - get/set list of supplementary group IDs......
getgroups() returns the supplementary group IDs of the calling process in list. The argument size should be set to the maximum number of items that can be store

logrotate(8) - rotates, compresses, and mails system logs...
logrotate is designed to ease administration of systems that generate large numbers of log files. It allows automatic rotation, compression, removal, and mailin

We can't live, work or learn in freedom unless the software we use is free.