< draft-eastlake-fnv-05.txt   draft-eastlake-fnv-06.txt >
Network Working Group Glenn Fowler Network Working Group Glenn Fowler
INTERNET-DRAFT AT&T Labs Research INTERNET-DRAFT AT&T Labs Research
Intended Status: Informational Landon Curt Noll Intended Status: Informational Landon Curt Noll
Cisco Systems Cisco Systems
Kiem-Phong Vo Kiem-Phong Vo
AT&T Labs Research AT&T Labs Research
Donald Eastlake Donald Eastlake
Huawei Technologies Huawei Technologies
Expires: October 5, 2013 April 6, 2013 Expires: March 31, 2013 October 1, 2013
The FNV Non-Cryptographic Hash Algorithm The FNV Non-Cryptographic Hash Algorithm
<draft-eastlake-fnv-05.txt> <draft-eastlake-fnv-06.txt>
Abstract Abstract
FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with FNV (Fowler/Noll/Vo) is a fast, non-cryptographic hash algorithm with
good dispersion. The purpose of this document is to make information good dispersion. The purpose of this document is to make information
on FNV and open source code performing FNV conveniently available to on FNV and open source code performing FNV conveniently available to
the Internet community. the Internet community.
Status of This Memo Status of This Memo
skipping to change at page 2, line 20 skipping to change at page 2, line 20
2. FNV Basics..............................................4 2. FNV Basics..............................................4
2.1 FNV Primes.............................................4 2.1 FNV Primes.............................................4
2.2 FNV offset_basis.......................................5 2.2 FNV offset_basis.......................................5
2.3 FNV Endianism..........................................5 2.3 FNV Endianism..........................................5
3. Other Hash Sizes and XOR Folding........................6 3. Other Hash Sizes and XOR Folding........................6
4. FNV Constants...........................................7 4. FNV Constants...........................................7
5. The Source Code.........................................9 5. The Source Code.........................................9
5.1 FNV C Headers..........................................9 5.1 FNV C Code.............................................9
5.2 FNV C Code.............................................9 5.1.1 FNV32 C Code.........................................9
5.3 FNV Test Code..........................................9 5.1.2 FNV64 C Code.........................................9
5.1.3 FNV128 C Code........................................9
5.2 FNV Test Code..........................................9
6. Security Considerations................................10 6. Security Considerations................................10
6.1 Why is FNV Non-Cryptographic?.........................10 6.1 Why is FNV Non-Cryptographic?.........................10
7. IANA Considerations....................................11 7. IANA Considerations....................................11
8. Acknowledgements.......................................11 8. Acknowledgements.......................................11
9. References.............................................12 9. References.............................................12
9.1 Normative References..................................12 9.1 Normative References..................................12
9.2 Informative References................................12 9.2 Informative References................................12
skipping to change at page 9, line 12 skipping to change at page 9, line 12
0000000000000000 0000000000000000 0000000000000000 000000000004C6D7 0000000000000000 0000000000000000 0000000000000000 000000000004C6D7
EB6E73802734510A 555F256CC005AE55 6BDE8CC9C6A93B21 AFF4B16C71EE90B3 EB6E73802734510A 555F256CC005AE55 6BDE8CC9C6A93B21 AFF4B16C71EE90B3
INTERNET-DRAFT FNV INTERNET-DRAFT FNV
5. The Source Code 5. The Source Code
The following sub-sections are intended, in later versions, to The following sub-sections are intended, in later versions, to
include reference C source code and a test driver for FNV-1a. include reference C source code and a test driver for FNV-1a.
5.1 FNV C Headers 5.1 FNV C Code
5.1.1 FNV32 C Code
TBD TBD
5.2 FNV C Code 5.1.2 FNV64 C Code
TBD TBD
5.3 FNV Test Code 5.1.3 FNV128 C Code
TBD
5.2 FNV Test Code
TBD TBD
INTERNET-DRAFT FNV INTERNET-DRAFT FNV
6. Security Considerations 6. Security Considerations
This document is intended to provide convenient open source access by This document is intended to provide convenient open source access by
the Internet community to the FNV non-cryptographic hash. No the Internet community to the FNV non-cryptographic hash. No
assertion of suitability for cryptographic applications is made for assertion of suitability for cryptographic applications is made for
skipping to change at page 18, line 5 skipping to change at page 17, line 17
3. Update dates and version number. 3. Update dates and version number.
4. Minor editing changes. 4. Minor editing changes.
From -04 to -05 From -04 to -05
1. Add Twitter as a use example and IPv6 flow hash study reference. 1. Add Twitter as a use example and IPv6 flow hash study reference.
2. Update dates and version number. 2. Update dates and version number.
From -05 to -06
1. Add code subsections.
2. Update dates and version number.
INTERNET-DRAFT FNV INTERNET-DRAFT FNV
Author's Address Author's Address
Glenn Fowler Glenn Fowler
AT&T Labs Research AT&T Labs Research
180 Park Avenue 180 Park Avenue
Florham Park, NJ 07932 USA Florham Park, NJ 07932 USA
Email: gsf@research.att.com Email: gsf@research.att.com
 End of changes. 7 change blocks. 
8 lines changed or deleted 22 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/