On 8 Jul 2003, Alan Cox wrote:
> On Maw, 2003-07-08 at 11:09, Andrew Morton wrote:
> > Comparing the complexity (size) of this code with the q-n-d hash tables
> > which are currently used one does wonder how useful it all will be. The
> > additional indirections are not needed with q-n-d hashes.
> Are these new hashes immune to deliberate attack (witness the network
> routing hash paper)
This is just hash table management code, hash functions are supplied by
the caller (e.g. they could use jhash).
-- James Morris <email@example.com>
- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to firstname.lastname@example.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Tue Jul 15 2003 - 22:00:27 EST