07-23-2009
this only works if the two interfaces are in the same subnet and the other is not.
10 More Discussions You Might Find Interesting
1. IP Networking
HI folks,
I am developing a software which one of the module is to interchange the ip address of another active network interface's when making a socket connection.
I would like to know whether there is any function call that would enable me to retrieve the ip address that is obtained by a... (2 Replies)
Discussion started by: citiz3n
2 Replies
2. IP Networking
Hi all,
I have some doubts in selecting the interface to transfer packets and receive the packets.
--> Multiple interfaces :
--------------------
1) 0.0.0.0 --------> wild card address.
2) x.x.x.x --------> valid address.(192.168.1.156)
3) ff.ff.ff.ff -------->... (0 Replies)
Discussion started by: vijaypdp2006
0 Replies
3. Shell Programming and Scripting
Hi,
I have a file formated like this:
John 7.22 2010-01-25_17:01:36
George 8.22 2010-01-25_17:02:36
Bob 9.62 2010-01-25_17:04:36
Jane 10.11 2010-01-25_17:05:36
Emma 4.52 2010-01-25_17:01:36
What I want to do is cut out only the entries that have... (2 Replies)
Discussion started by: Donkey25
2 Replies
4. SCO
Hi all
I have installed a demo version of SCO OpenServer 5.0.2, I finally found it is Desktop Interface, I would like to know how to change its interface to dos based interface?
If you have any ideas, please tell me then. Thank you (2 Replies)
Discussion started by: TinhNhi
2 Replies
5. Shell Programming and Scripting
Hi
My pipe delimited .txt file contains rows with 10 columns.
Can anyone advise how I output to file only those rows with the letters ‘ci'
as the first 2 characters in the 3rd column ?
Many thanks (4 Replies)
Discussion started by: malts18
4 Replies
6. Shell Programming and Scripting
Move all files starting with a specific name to different directory.
This shell script program should have three parameters
File Name
Source Directory
Destination Directory
User should be able to enter ‘AB_CD*' in file name parameter. In this case all the files starting with AB_CD will... (1 Reply)
Discussion started by: chetancrsp18
1 Replies
7. Shell Programming and Scripting
I have two files with thousands of sequences of different lengths. infile1 contains the actual sequences and infile2 the scores for each A, T, G and C in infile1. Something like this:
infile1:
>HZVJKYI01ECH5R
TTGATGTGCCAGCTGCCGTTGGTGTGCCAA
>HZVJKYI01AQWJ8
GGATATGATGATGAACTGGTTTGGCACACC... (4 Replies)
Discussion started by: Xterra
4 Replies
8. Solaris
How to set gateway address to a particular interface? waht are the files need to update to make it permanent? (2 Replies)
Discussion started by: Naveen.6025
2 Replies
9. UNIX for Advanced & Expert Users
Hi ,
Could someone let me know how to detect duplicate ip address after assigning ip address to ethernet interface using c program (3 Replies)
Discussion started by: Gopi Krishna P
3 Replies
10. UNIX for Beginners Questions & Answers
Hello,
I have a sample data like this:
A1 B1 100.00
B1 A1 100.00
A2 B2 90.80
B2 A2 90.80
A3 B3 99.07
B3 A3 99.07
A4 B4 99.00
B4 A4 99.00
A5 B5 97.13
B5 A5 99.53
.
.
Ax By i
By Ax j
each two lines are same comparison with opposite order. What I expected is... (3 Replies)
Discussion started by: nengcheng
3 Replies
LEARN ABOUT DEBIAN
ipsec_bitstomask
IPSEC_GOODMASK(3) Library Functions Manual IPSEC_GOODMASK(3)
NAME
ipsec_goodmask, ipsec_masktobits, ipsec_bitstomask - check if Internet subnet mask is valid, convert Internet subnet mask to bit count,
convert bit count to Internet subnet mask
SYNOPSIS
#include <freeswan.h>
int goodmask(struct in_addr mask);
int masktobits(struct in_addr mask);
struct in_addr bitstomask(int n);
DESCRIPTION
These functions are obsolete; see ipsec_masktocount(3) for a partial replacement.
Goodmask reports whether the subnet mask is a valid one, i.e. consists of a (possibly empty) sequence of 1s followed by a (possibly empty)
sequence of 0s. Masktobits takes a (valid) subnet mask and returns the number of 1 bits in it. Bitstomask reverses this, returning the
subnet mask corresponding to bit count n.
All masks are in network byte order.
SEE ALSO
inet(3), ipsec_atosubnet(3)
DIAGNOSTICS
Masktobits returns -1 for an invalid mask. Bitstomask returns an all-zeros mask for a negative or out-of-range n.
HISTORY
Written for the FreeS/WAN project by Henry Spencer.
BUGS
The error-reporting convention of bitstomask is less than ideal; zero is sometimes a legitimate mask.
11 June 2001 IPSEC_GOODMASK(3)