| < draft-eastlake-fnv-05.txt | draft-eastlake-fnv-06.txt > | |||
|---|---|---|---|---|
| Network Working Group Glenn Fowler | Network Working Group Glenn Fowler | |||
| INTERNET-DRAFT AT&T Labs Research | INTERNET-DRAFT AT&T Labs Research | |||
| Intended Status: Informational Landon Curt Noll | Intended Status: Informational Landon Curt Noll | |||
| Cisco Systems | Cisco Systems | |||
| Kiem-Phong Vo | Kiem-Phong Vo | |||
| AT&T Labs Research | AT&T Labs Research | |||
| Donald Eastlake | Donald Eastlake | |||
| Huawei Technologies | Huawei Technologies | |||
| Expires: October 5, 2013 April 6, 2013 | Expires: March 31, 2013 October 1, 2013 | |||
| The FNV Non-Cryptographic Hash Algorithm | The FNV Non-Cryptographic Hash Algorithm | |||
| <draft-eastlake-fnv-05.txt> | <draft-eastlake-fnv-06.txt> | |||
| Abstract | Abstract | |||
| FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with | FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with | |||
| good dispersion. The purpose of this document is to make information | good dispersion. The purpose of this document is to make information | |||
| on FNV and open source code performing FNV conveniently available to | on FNV and open source code performing FNV conveniently available to | |||
| the Internet community. | the Internet community. | |||
| Status of This Memo | Status of This Memo | |||
| skipping to change at page 2, line 20 ¶ | skipping to change at page 2, line 20 ¶ | |||
| 2. FNV Basics..............................................4 | 2. FNV Basics..............................................4 | |||
| 2.1 FNV Primes.............................................4 | 2.1 FNV Primes.............................................4 | |||
| 2.2 FNV offset_basis.......................................5 | 2.2 FNV offset_basis.......................................5 | |||
| 2.3 FNV Endianism..........................................5 | 2.3 FNV Endianism..........................................5 | |||
| 3. Other Hash Sizes and XOR Folding........................6 | 3. Other Hash Sizes and XOR Folding........................6 | |||
| 4. FNV Constants...........................................7 | 4. FNV Constants...........................................7 | |||
| 5. The Source Code.........................................9 | 5. The Source Code.........................................9 | |||
| 5.1 FNV C Headers..........................................9 | 5.1 FNV C Code.............................................9 | |||
| 5.2 FNV C Code.............................................9 | 5.1.1 FNV32 C Code.........................................9 | |||
| 5.3 FNV Test Code..........................................9 | 5.1.2 FNV64 C Code.........................................9 | |||
| 5.1.3 FNV128 C Code........................................9 | ||||
| 5.2 FNV Test Code..........................................9 | ||||
| 6. Security Considerations................................10 | 6. Security Considerations................................10 | |||
| 6.1 Why is FNV Non-Cryptographic?.........................10 | 6.1 Why is FNV Non-Cryptographic?.........................10 | |||
| 7. IANA Considerations....................................11 | 7. IANA Considerations....................................11 | |||
| 8. Acknowledgements.......................................11 | 8. Acknowledgements.......................................11 | |||
| 9. References.............................................12 | 9. References.............................................12 | |||
| 9.1 Normative References..................................12 | 9.1 Normative References..................................12 | |||
| 9.2 Informative References................................12 | 9.2 Informative References................................12 | |||
| skipping to change at page 9, line 12 ¶ | skipping to change at page 9, line 12 ¶ | |||
| 0000000000000000 0000000000000000 0000000000000000 000000000004C6D7 | 0000000000000000 0000000000000000 0000000000000000 000000000004C6D7 | |||
| EB6E73802734510A 555F256CC005AE55 6BDE8CC9C6A93B21 AFF4B16C71EE90B3 | EB6E73802734510A 555F256CC005AE55 6BDE8CC9C6A93B21 AFF4B16C71EE90B3 | |||
| INTERNET-DRAFT FNV | INTERNET-DRAFT FNV | |||
| 5. The Source Code | 5. The Source Code | |||
| The following sub-sections are intended, in later versions, to | The following sub-sections are intended, in later versions, to | |||
| include reference C source code and a test driver for FNV-1a. | include reference C source code and a test driver for FNV-1a. | |||
| 5.1 FNV C Headers | 5.1 FNV C Code | |||
| 5.1.1 FNV32 C Code | ||||
| TBD | TBD | |||
| 5.2 FNV C Code | 5.1.2 FNV64 C Code | |||
| TBD | TBD | |||
| 5.3 FNV Test Code | 5.1.3 FNV128 C Code | |||
| TBD | ||||
| 5.2 FNV Test Code | ||||
| TBD | TBD | |||
| INTERNET-DRAFT FNV | INTERNET-DRAFT FNV | |||
| 6. Security Considerations | 6. Security Considerations | |||
| This document is intended to provide convenient open source access by | This document is intended to provide convenient open source access by | |||
| the Internet community to the FNV non-cryptographic hash. No | the Internet community to the FNV non-cryptographic hash. No | |||
| assertion of suitability for cryptographic applications is made for | assertion of suitability for cryptographic applications is made for | |||
| skipping to change at page 18, line 5 ¶ | skipping to change at page 17, line 17 ¶ | |||
| 3. Update dates and version number. | 3. Update dates and version number. | |||
| 4. Minor editing changes. | 4. Minor editing changes. | |||
| From -04 to -05 | From -04 to -05 | |||
| 1. Add Twitter as a use example and IPv6 flow hash study reference. | 1. Add Twitter as a use example and IPv6 flow hash study reference. | |||
| 2. Update dates and version number. | 2. Update dates and version number. | |||
| From -05 to -06 | ||||
| 1. Add code subsections. | ||||
| 2. Update dates and version number. | ||||
| INTERNET-DRAFT FNV | INTERNET-DRAFT FNV | |||
| Author's Address | Author's Address | |||
| Glenn Fowler | Glenn Fowler | |||
| AT&T Labs Research | AT&T Labs Research | |||
| 180 Park Avenue | 180 Park Avenue | |||
| Florham Park, NJ 07932 USA | Florham Park, NJ 07932 USA | |||
| Email: gsf@research.att.com | Email: gsf@research.att.com | |||
| End of changes. 7 change blocks. | ||||
| 8 lines changed or deleted | 22 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||