International Tables for Crystallography (2006). Vol. G. ch. 5.4, pp. 526-538
https://doi.org/10.1107/97809553602060000754

Chapter 5.4. CIFtbx : Fortran tools for manipulating CIFs

Contents

  • 5.4. CIFtbx: Fortran tools for manipulating CIFs  (pp. 526-538) | html | pdf | chapter contents |
    • 5.4.1. Introduction  (p. 526) | html | pdf |
    • 5.4.2. An overview of the library  (p. 526) | html | pdf |
    • 5.4.3. Initialization commands  (pp. 526-527) | html | pdf |
    • 5.4.4. Read commands  (p. 527) | html | pdf |
    • 5.4.5. Write commands  (pp. 527-528) | html | pdf |
    • 5.4.6. Variables  (pp. 528-529) | html | pdf |
      • 5.4.6.1. General monitor variables  (p. 528) | html | pdf |
      • 5.4.6.2. General control variables  (p. 528) | html | pdf |
      • 5.4.6.3. Input monitor variables  (p. 529) | html | pdf |
      • 5.4.6.4. Output control variables  (p. 529) | html | pdf |
    • 5.4.7. Name aliases  (pp. 529-530) | html | pdf |
    • 5.4.8. Implementation of the tools  (p. 530) | html | pdf |
    • 5.4.9. How to read CIF data  (p. 530) | html | pdf |
    • 5.4.10. How to write a CIF  (pp. 530-531) | html | pdf |
    • 5.4.11. Error-message glossary  (pp. 531-535) | html | pdf |
      • 5.4.11.1. Fatal errors: array bounds  (pp. 532-534) | html | pdf |
      • 5.4.11.2. Fatal errors: data sequence, syntax and file construction  (p. 534) | html | pdf |
      • 5.4.11.3. Fatal errors: invalid arguments  (p. 534) | html | pdf |
      • 5.4.11.4. Warnings: input errors  (p. 534) | html | pdf |
      • 5.4.11.5. Warnings: output errors  (pp. 534-535) | html | pdf |
      • 5.4.11.6. Warnings: dictionary checks  (p. 535) | html | pdf |
    • 5.4.12. Internals and programming style  (pp. 535-538) | html | pdf |
      • 5.4.12.1. Programming style  (p. 536) | html | pdf |
      • 5.4.12.2. Memory management  (p. 536) | html | pdf |
      • 5.4.12.3. Use of INCLUDE  (p. 536) | html | pdf |
      • 5.4.12.4. Use of ENDDO  (p. 536) | html | pdf |
      • 5.4.12.5. Names of internal routines  (pp. 536-537) | html | pdf |
      • 5.4.12.6. Use of the underscore character  (p. 537) | html | pdf |
      • 5.4.12.7. Names longer than six characters  (p. 537) | html | pdf |
      • 5.4.12.8. File management  (p. 537) | html | pdf |
      • 5.4.12.9. Case sensitivity  (p. 538) | html | pdf |
      • 5.4.12.10. Management of white space  (p. 538) | html | pdf |
    • 5.4.13. Distribution  (p. 538) | html | pdf |
    • References | html | pdf |
    • Figures
      • Fig. 5.4.7.1. Example application accessing aliased data names  (p. 530) | html | pdf |
      • Fig. 5.4.9.1. Sample program CIF_IN  (p. 531) | html | pdf |
      • Fig. 5.4.9.2. Example CIF read by the sample program CIF_IN shown in Fig. 5.4.9.1  (p. 532) | html | pdf |
      • Fig. 5.4.9.3. Printout from the example program CIF_IN run on the test file of Fig. 5.4.9.2  (p. 532) | html | pdf |
      • Fig. 5.4.10.1. Sample program to create a CIF  (p. 533) | html | pdf |
      • Fig. 5.4.10.2. Sample CIF created by the example program of Fig. 5.4.10.1  (p. 533) | html | pdf |
    • Tables
      • Table 5.4.6.1. CIFtbx variables  (p. 528) | html | pdf |
      • Table 5.4.12.1. Parameter statements in CIFtbx  (p. 536) | html | pdf |