Tue Jul 21 12:40:53 2009 UTC ()
Add HISTORY.


(joerg)
diff -r1.1 -r1.2 src/lib/libc/stdlib/mi_vector_hash.3

cvs diff -r1.1 -r1.2 src/lib/libc/stdlib/mi_vector_hash.3 (expand / switch to unified diff)

--- src/lib/libc/stdlib/mi_vector_hash.3 2009/07/20 17:03:37 1.1
+++ src/lib/libc/stdlib/mi_vector_hash.3 2009/07/21 12:40:52 1.2
@@ -1,14 +1,14 @@ @@ -1,14 +1,14 @@
1.\" $NetBSD: mi_vector_hash.3,v 1.1 2009/07/20 17:03:37 joerg Exp $ 1.\" $NetBSD: mi_vector_hash.3,v 1.2 2009/07/21 12:40:52 joerg Exp $
2.\" 2.\"
3.\" Copyright (c) 2009 The NetBSD Foundation, Inc. 3.\" Copyright (c) 2009 The NetBSD Foundation, Inc.
4.\" All rights reserved. 4.\" All rights reserved.
5.\" 5.\"
6.\" This code is derived from software contributed to The NetBSD Foundation 6.\" This code is derived from software contributed to The NetBSD Foundation
7.\" by Joerg Sonnenberger. 7.\" by Joerg Sonnenberger.
8.\" 8.\"
9.\" Redistribution and use in source and binary forms, with or without 9.\" Redistribution and use in source and binary forms, with or without
10.\" modification, are permitted provided that the following conditions 10.\" modification, are permitted provided that the following conditions
11.\" are met: 11.\" are met:
12.\" 1. Redistributions of source code must retain the above copyright 12.\" 1. Redistributions of source code must retain the above copyright
13.\" notice, this list of conditions and the following disclaimer. 13.\" notice, this list of conditions and the following disclaimer.
14.\" 2. Redistributions in binary form must reproduce the above copyright 14.\" 2. Redistributions in binary form must reproduce the above copyright
@@ -46,15 +46,20 @@ The @@ -46,15 +46,20 @@ The
46function computes three 32-bit hash values of the memory area starting at 46function computes three 32-bit hash values of the memory area starting at
47.Fa key 47.Fa key
48with length 48with length
49.Fa len . 49.Fa len .
50.Pp 50.Pp
51The output is identical on all architectures and only depends on 51The output is identical on all architectures and only depends on
52.Fa key 52.Fa key
53and 53and
54.Fa seed . 54.Fa seed .
55.Sh IMPLEMENTATION NOTES 55.Sh IMPLEMENTATION NOTES
56An optimised code path is used if 56An optimised code path is used if
57.Fa key 57.Fa key
58is aligned on a 32-bit boundary. 58is aligned on a 32-bit boundary.
 59.Sh HISTORY
 60The
 61.Nm
 62function appeared in
 63.Nx 6.0 .
59.Sh AUTHORS 64.Sh AUTHORS
60The hash function has been created by Bob Jenkins. 65The hash function has been created by Bob Jenkins.