l3tol(3) Library Functions Manual l3tol(3)Name
l3tol, ltol3 - convert between 3-byte integers and long integers
Syntax
void l3tol (lp, cp, n)
long *lp;
char *cp;
int n;
void ltol3 (cp, lp, n)
char *cp;
long *lp;
int n;
Description
The subroutine converts a list of n three-byte integers packed into a character string pointed to by cp into a list of long integers
pointed to by lp.
The performs the reverse conversion from long integers (lp) to three-byte integers (cp).
These functions are useful for file-system maintenance where the block numbers are three bytes long.
Restrictions
Because of possible differences in byte ordering, the numerical values of the long integers are machine-dependent.
See Alsofs(5)l3tol(3)
Check Out this Related Man Page
htonl(3) Library Functions Manual htonl(3)NAME
htonl - Converts an unsigned 32-bit integer from host byte order to Internet network-byte order
LIBRARY
Standard C Library (libc.so, libc.a)
SYNOPSIS
#include <arpa/inet.h> in_addr_t htonl ( in_addr_t hostint) ;
STANDARDS
Interfaces documented on this reference page conform to industry standards as follows:
htonl(): XNS4.0
Refer to the standards(5) reference page for more information about industry standards and associated tags.
PARAMETERS
Specifies a 32-bit integer in host byte order.
DESCRIPTION
The htonl() (host-to-network long) function converts an unsigned 32-bit integer from host byte order to Internet network-byte order.
The Internet network requires address and port reference data in network-byte order. Use the htonl() function to convert address and port
integers from Internet host byte order to Internet network-byte ordered integers.
RETURN VALUES
Upon successful completion, the htonl() function returns a 32-bit integer in Internet network-byte order.
ERRORS
Current industry standards do not define error values for the htonl() function.
RELATED INFORMATION
Functions: endhostent(3), endservent(3), htons(3), ntohl(3), ntohs(3)
Standards: standards(5)
Network Programmer's Guide delim off
htonl(3)
<h1>A short history of UNIX</h1>
<p>In the late 1960's Ken Thompsom joined the computing-science research group at Bell
Laboratories, which is the research arm of the giant American corporation ATT. He and many
colleagues had been collaborating with MIT and GE on the development of an... (0 Replies)
We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
I'm writing a command shell, and I want to be able to detect when the user presses an arrow key (otherwise it just prints [[A, [[B, etc.). I know it's relatively easy (although somewhat more time-consuming) to detect keystrokes in noncanonical mode, but I've noticed that the bash shell detects... (4 Replies)
I'm learning off Linux (Ubuntu) right now. I want to move up to Unix, but I don't want to rush like I did when it came to Windows --> to Linux. What is the best Unix OS that fits in pretty well with Ubuntu.
In other words is there kind of an equal Linux with Unix?
Also what do I need to... (10 Replies)
I noticed my hostname is <my-full-name>s-macbook.local. I'm not sure exactly what information leaves the local network, and whether the hostname is included, but if it is, this would mean people on the Internet can look at my hostname and see who I am. Before anyone says that's not possible,... (4 Replies)