clog2, clog2f, clog2l - base-2 logarithm of a complex number


   #include <complex.h>

   double complex clog2(double complex z);
   float complex clog2f(float complex z);
   long double complex clog2l(long double complex z);


   The call clog2(z) is equivalent to clog(z)/log(2).

   The other functions perform the same task for float and long double.

   Note that z close to zero will cause an overflow.


   These function names are reserved for future use in C99.


   Not yet in glibc, as at version 2.19.


   cabs(3), cexp(3), clog(3), clog10(3), complex(7)


   This  page  is  part of release 4.09 of the Linux man-pages project.  A
   description of the project, information about reporting bugs,  and  the
   latest     version     of     this    page,    can    be    found    at

                              2014-08-19                          CLOG2(3)

More Linux Commands

Digest::HMAC_MD5(3pm) - Keyed-Hashing for Message Authentica
This module provide HMAC-MD5 hashing. SEE ALSO Digest::HMAC, Digest::MD5, Digest::HMAC_SHA1 AUTHOR Gisle Aas &lt;; Digest::HMAC_MD5.3pm (Library - Linu

arp(8) - manipulate the system ARP cache - Linux man page...
Arp manipulates the kernels ARP cache in various ways. The primary options are clearing an address mapping entry and manually setting up one. For debugging purp

siginterrupt(3) - allow signals to interrupt system calls...
The siginterrupt() function changes the restart behavior when a system call is interrupted by the signal sig. If the flag argument is false (0), then system cal

XtVaSetSubvalues(3) - obtain and set widget resources.......
The XtSetValues function starts with the resources specified for the Core widget fields and proceeds down the subclass chain to the widget. At each stage, it wr

pam_userdb(8) - PAM module to authenticate against a db data
The pam_userdb module is used to verify a username/password pair against values stored in a Berkeley DB database. The database is indexed by the username, and t

Tcl_ChannelVersion(3) - procedures for creating and manipula
Tcl uses a two-layered channel architecture. It provides a generic upper layer to enable C and Tcl programs to perform input and output using the same APIs for

english(5) - flag format for English ispell dictionaries....
English dictionaries for ispell(1) supports 3 prefix and 14 suffix flags. For a detailed description of how ispell handles flags and capitalization, see ispell(

crda(8) - send to the kernel a wireless regulatory domain fo
crda is the Linux wireless central regulatory domain agent. crda is intended to be used by udev scripts and should not be run manually unless debugging udev scr

icnctrl.8 (Manual - Linux man page)........................
icnctrl is used to setup the ICN ISDN device driver and for downloading the firmware into the ISDN card. The use of icnctrl makes sense, if you are using an ICN

fgrep(1) - print lines matching a pattern - Linux man page
grep searches the named input FILEs (or standard input if no files are named, or if a single hyphen-minus (-) is given as file name) for lines containing a matc

diagnostics(3pm) - produce verbose warning diagnostics......
diagnostics.3pm - The diagnostics Pragma This module extends the terse diagnostics normally emitted by both the perl compiler and the perl interpreter (from run

acl_calc_mask(3) - calculate the file group class mask......
The acl_calc_mask() function calculates and sets the permissions associated with the ACL_MASK ACL entry of the ACL referred to by acl_p. The value of the new pe

We can't live, work or learn in freedom unless the software we use is free.