|
hosts_ctl(3) -- tcp wrapper access control library
|
The routines described in this document are part of the libwrap.a library. They implement a rule-based access control language with optional shell commands that are executed when a rule fires. request... |
hsearch(3) -- manage hash search table
|
The hcreate(), hdestroy() and hsearch() functions manage hash search tables. The hcreate() function allocates and initializes the table. The nel argument specifies an estimate of the maximum number of... |
|
hstrerror(3) -- get network host entry
|
The gethostbyname(), gethostbyname2() and gethostbyaddr() functions each return a pointer to an object with the following structure describing an internet host referenced by name or by address, respec... |
htobe16(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
htobe32(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
htobe64(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
htoi(3) -- S/Key library functions
|
These functions implement the S/Key one time password authentication mechanism. The atob8() function converts the 16-byte hex string in to an 8-byte binary array stored in out. The atob8() function re... |
htole16(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
htole32(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
htole64(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
htonl(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
htons(3) -- convert values between different byte orderings
|
These routines convert 16, 32 and 64-bit quantities between different byte orderings. The ``swap'' functions reverse the byte ordering of the given quantity, the others converts either from/to the n... |
hypot(3) -- Euclidean distance and complex absolute value functions
|
The hypot() and cabs() functions compute the sqrt(x*x+y*y) in such a way that underflow will not happen, and overflow occurs only if the final result deserves it. The hypotf() and cabsf() functions ar... |
hypotf(3) -- Euclidean distance and complex absolute value functions
|
The hypot() and cabs() functions compute the sqrt(x*x+y*y) in such a way that underflow will not happen, and overflow occurs only if the final result deserves it. The hypotf() and cabsf() functions ar... |
i2d_DHparams(3) -- PKCS#3 DH parameter functions.
|
These functions decode and encode PKCS#3 DH parameters using the DHparameter structure described in PKCS#3. Othewise these behave in a similar way to d2i_X509() and i2d_X509() described in the d2i_X50... |