> On Maw, 2003-07-08 at 11:09, Andrew Morton wrote:
> > Comparing the complexity (size) of this code with the q-n-d hash tables
> > which are currently used one does wonder how useful it all will be. The
> > additional indirections are not needed with q-n-d hashes.
>
> Are these new hashes immune to deliberate attack (witness the network
> routing hash paper)
This is just hash table management code, hash functions are supplied by
the caller (e.g. they could use jhash).
- James
-- James Morris <jmorris@intercode.com.au>- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/