Research
Security News
Quasar RAT Disguised as an npm Package for Detecting Vulnerabilities in Ethereum Smart Contracts
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
network-byte-order
Advanced tools
htonl, htons, ntohl, ntohs - convert values between host and network byte order.
These routines are used for converting values between host and network byte order.
Derived from an implementation by Membase, Inc.
The htonl()
function converts the given unsigned 32-bit (long) integer from host byte order to network byte order (Little-Endian to Big-Endian).
b
is an Array
of octets or a Node.JS Buffer
.
i
is the zero-based index at which to write into b
.
v
is the value to convert.
The htons()
function converts the given unsigned 16-bit (short) integer from host byte order to network byte order (Little-Endian to Big-Endian).
b
is an Array
of octets or a Node.JS Buffer
.
i
is the zero-based index at which to write into b
.
v
is the value to convert.
The ntohl()
function converts the unsigned 32-bit (long) integer from network byte order to host byte order (Big-Endian to Little-Endian).
b
is an Array
of octets or a Node.JS Buffer
to read the value from.
i
is the zero-based index at which to read from b
.
s
is a string
to the read value from.
i
is the zero-based index at which to read from s
.
The ntohs()
function converts the unsigned 16-bit (short) integer from network byte order to host byte order (Big-Endian to Little-Endian).
b
is an Array
of octets or a Node.JS Buffer
to read the value from.
i
is the zero-based index at which to read from b
.
s
is a string
to the read value from.
i
is the zero-based index at which to read from s
.
Licensed under the Apache License, Version 2.0.
FAQs
htonl, htons, ntohl, ntohs - convert values between host and network byte order.
The npm package network-byte-order receives a total of 565 weekly downloads. As such, network-byte-order popularity was classified as not popular.
We found that network-byte-order demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket researchers uncover a malicious npm package posing as a tool for detecting vulnerabilities in Etherium smart contracts.
Security News
Research
A supply chain attack on Rspack's npm packages injected cryptomining malware, potentially impacting thousands of developers.
Research
Security News
Socket researchers discovered a malware campaign on npm delivering the Skuld infostealer via typosquatted packages, exposing sensitive data.