Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

a64l(3) [ultrix man page]

a64l(3) 						     Library Functions Manual							   a64l(3)

Name
       a64l, l64a - convert long integer and base-64 ASCII string

Syntax
       long a64l (s)
       char *s;

       char *l64a (l)
       long l;

Description
       These  functions  are used to maintain numbers stored in base-64 ASCII characters.  This is a notation by which long integers can be repre-
       sented by up to six characters; each character represents a ``digit'' in a radix-64 notation.

       The characters used to represent ``digits'' are .  for 0, / for 1, 0 through 9 for 2-11, A through Z for 12-37, and a through z for 38-63.

       The subroutine takes a pointer to a null-terminated base-64 representation and returns a corresponding long value.  If the  string  pointed
       to by s contains more than six characters, will use the first six.

       The  subroutine	takes  a long argument and returns a pointer to the corresponding base-64 representation.  If the argument is 0, returns a
       pointer to a null string.

Restrictions
       The value returned by is a pointer into a static buffer, the contents of which are overwritten by each call.

																	   a64l(3)

Check Out this Related Man Page

a64l(3C)						   Standard C Library Functions 						  a64l(3C)

NAME
a64l, l64a - convert between long integer and base-64 ASCII string SYNOPSIS
#include <stdlib.h> long a64l(const char *s); char *l64a(long l); DESCRIPTION
These functions maintain numbers stored in base-64 ASCII characters that define a notation by which long integers can be represented by up to six characters. Each character represents a "digit" in a radix-64 notation. The characters used to represent "digits" are as follows: +-----------------------------+-----------------------------+ |Character | Digit | +-----------------------------+-----------------------------+ |. | 0 | |/ | 1 | |0-9 | 2-11 | |A-Z | 12-37 | |a-z | 38-63 | +-----------------------------+-----------------------------+ The a64l() function takes a pointer to a null-terminated base-64 representation and returns a corresponding long value. If the string pointed to by s contains more than six characters, a64l() uses the first six. The a64l() function scans the character string from left to right with the least significant digit on the left, decoding each character as a 6-bit radix-64 number. The l64a() function takes a long argument and returns a pointer to the corresponding base-64 representation. If the argument is 0, l64a() returns a pointer to a null string. The value returned by l64a() is a pointer into a static buffer, the contents of which are overwritten by each call. In the case of multi- threaded applications, the return value is a pointer to thread specific data. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Interface Stability |Standard | +-----------------------------+-----------------------------+ |MT-Level |MT-Safe | +-----------------------------+-----------------------------+ SEE ALSO
attributes(5), standards(5) SunOS 5.11 24 Jul 2002 a64l(3C)
Man Page

5 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

A short history of UNIX by l.madden@ic.ac.uk

<h1>A short history of UNIX</h1> <p>In the late 1960's Ken Thompsom joined the computing-science research group at Bell Laboratories, which is the research arm of the giant American corporation ATT. He and many colleagues had been collaborating with MIT and GE on the development of an... (0 Replies)
Discussion started by: Neo
0 Replies

2. Answers to Frequently Asked Questions

Lost root password / Can't login as root

We have quite a few threads about this subject. I have collected some of them and arranged them by the OS which is primarily discussed in the thread. That is because the exact procedure depends on the OS involved. What's more, since you often need to interact with the boot process, the... (0 Replies)
Discussion started by: Perderabo
0 Replies

3. Programming

How do you detect keystrokes in canonical mode?

I'm writing a command shell, and I want to be able to detect when the user presses an arrow key (otherwise it just prints [[A, [[B, etc.). I know it's relatively easy (although somewhat more time-consuming) to detect keystrokes in noncanonical mode, but I've noticed that the bash shell detects... (4 Replies)
Discussion started by: Ultrix
4 Replies

4. UNIX for Dummies Questions & Answers

Linux (Ubuntu) = Unix (NOT IMPORTANT - NO RUSH)

I'm learning off Linux (Ubuntu) right now. I want to move up to Unix, but I don't want to rush like I did when it came to Windows --> to Linux. What is the best Unix OS that fits in pretty well with Ubuntu. In other words is there kind of an equal Linux with Unix? Also what do I need to... (10 Replies)
Discussion started by: Linux_Guy
10 Replies

5. IP Networking

Can I change my hostname without messing things up?

I noticed my hostname is <my-full-name>s-macbook.local. I'm not sure exactly what information leaves the local network, and whether the hostname is included, but if it is, this would mean people on the Internet can look at my hostname and see who I am. Before anyone says that's not possible,... (4 Replies)
Discussion started by: Ultrix
4 Replies