| @@ -1,14 +1,14 @@ | | | @@ -1,14 +1,14 @@ |
1 | .\" $NetBSD: mi_vector_hash.3,v 1.1 2009/07/20 17:03:37 joerg Exp $ | | 1 | .\" $NetBSD: mi_vector_hash.3,v 1.2 2009/07/21 12:40:52 joerg Exp $ |
2 | .\" | | 2 | .\" |
3 | .\" Copyright (c) 2009 The NetBSD Foundation, Inc. | | 3 | .\" Copyright (c) 2009 The NetBSD Foundation, Inc. |
4 | .\" All rights reserved. | | 4 | .\" All rights reserved. |
5 | .\" | | 5 | .\" |
6 | .\" This code is derived from software contributed to The NetBSD Foundation | | 6 | .\" This code is derived from software contributed to The NetBSD Foundation |
7 | .\" by Joerg Sonnenberger. | | 7 | .\" by Joerg Sonnenberger. |
8 | .\" | | 8 | .\" |
9 | .\" Redistribution and use in source and binary forms, with or without | | 9 | .\" Redistribution and use in source and binary forms, with or without |
10 | .\" modification, are permitted provided that the following conditions | | 10 | .\" modification, are permitted provided that the following conditions |
11 | .\" are met: | | 11 | .\" are met: |
12 | .\" 1. Redistributions of source code must retain the above copyright | | 12 | .\" 1. Redistributions of source code must retain the above copyright |
13 | .\" notice, this list of conditions and the following disclaimer. | | 13 | .\" notice, this list of conditions and the following disclaimer. |
14 | .\" 2. Redistributions in binary form must reproduce the above copyright | | 14 | .\" 2. Redistributions in binary form must reproduce the above copyright |
| @@ -46,15 +46,20 @@ The | | | @@ -46,15 +46,20 @@ The |
46 | function computes three 32-bit hash values of the memory area starting at | | 46 | function computes three 32-bit hash values of the memory area starting at |
47 | .Fa key | | 47 | .Fa key |
48 | with length | | 48 | with length |
49 | .Fa len . | | 49 | .Fa len . |
50 | .Pp | | 50 | .Pp |
51 | The output is identical on all architectures and only depends on | | 51 | The output is identical on all architectures and only depends on |
52 | .Fa key | | 52 | .Fa key |
53 | and | | 53 | and |
54 | .Fa seed . | | 54 | .Fa seed . |
55 | .Sh IMPLEMENTATION NOTES | | 55 | .Sh IMPLEMENTATION NOTES |
56 | An optimised code path is used if | | 56 | An optimised code path is used if |
57 | .Fa key | | 57 | .Fa key |
58 | is aligned on a 32-bit boundary. | | 58 | is aligned on a 32-bit boundary. |
| | | 59 | .Sh HISTORY |
| | | 60 | The |
| | | 61 | .Nm |
| | | 62 | function appeared in |
| | | 63 | .Nx 6.0 . |
59 | .Sh AUTHORS | | 64 | .Sh AUTHORS |
60 | The hash function has been created by Bob Jenkins. | | 65 | The hash function has been created by Bob Jenkins. |