Main Page
Namespaces
Classes
Package Documentation
All
Classes
Namespaces
Files
Functions
Variables
Typedefs
Enumerations
Enumerator
Properties
Friends
Macros
Pages
src
CondFormats
Common
interface
hash64.h
Go to the documentation of this file.
1
#ifndef CondCommon_Hash64_h
2
#define CondCommon_Hash64_h
3
4
namespace
cond {
5
6
/*
7
--------------------------------------------------------------------
8
lookup8.c, by Bob Jenkins, January 4 1997, Public Domain.
9
hash(), hash2(), hash3, and mix() are externally useful functions.
10
Routines to test the hash are included if SELF_TEST is defined.
11
You can use this free for any purpose. It has no warranty.
12
--------------------------------------------------------------------
13
*/
14
15
16
/*
17
--------------------------------------------------------------------
18
hash() -- hash a variable-length key into a 64-bit value
19
k : the key (the unaligned variable-length array of bytes)
20
len : the length of the key, counting by bytes
21
level : can be any 8-byte value
22
Returns a 64-bit value. Every bit of the key affects every bit of
23
the return value. No funnels. Every 1-bit and 2-bit delta achieves
24
avalanche. About 41+5len instructions.
25
26
The best hash table sizes are powers of 2. There is no need to do
27
mod a prime (mod is sooo slow!). If you need less than 64 bits,
28
use a bitmask. For example, if you need only 10 bits, do
29
h = (h & hashmask(10));
30
In which case, the hash table should have hashsize(10) elements.
31
32
If you are hashing n strings (ub1 **)k, do it like this:
33
for (i=0, h=0; i<n; ++i) h = hash( k[i], len[i], h);
34
35
By Bob Jenkins, Jan 4 1997. bob_jenkins@burtleburtle.net. You may
36
use this code any way you wish, private, educational, or commercial,
37
but I would appreciate if you give me credit.
38
39
See http://burtleburtle.net/bob/hash/evahash.html
40
Use for hash table lookup, or anything where one collision in 2^^64
41
is acceptable. Do NOT use for cryptographic purposes.
42
--------------------------------------------------------------------
43
*/
44
/*
45
--------------------------------------------------------------------
46
This is identical to hash() on little-endian machines, and it is much
47
faster than hash(), but a little slower than hash2(), and it requires
48
-- that all your machines be little-endian, for example all Intel x86
49
chips or all VAXen. It gives wrong results on big-endian machines.
50
--------------------------------------------------------------------
51
*/
52
53
unsigned
long
long
hash64
(
unsigned
char
*
k
,
unsigned
long
long
length,
unsigned
long
long
level
);
54
55
56
}
57
#endif
cond::hash64
unsigned long long hash64(unsigned char *k, unsigned long long length, unsigned long long level)
Definition:
hash64.cc:45
gen::k
int k[5][pyjets_maxn]
Definition:
Cascade2Hadronizer.cc:79
testEve_cfg.level
tuple level
Definition:
testEve_cfg.py:34
Generated for CMSSW Reference Manual by
1.8.5