From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Michael K. Edwards" Subject: Re: Extensible hashing and RCU Date: Tue, 20 Feb 2007 12:09:59 -0800 Message-ID: References: <200702191913.08125.dada1@cosmosbay.com> <200702201738.19590.dada1@cosmosbay.com> <20070220165907.GB24930@2ka.mipt.ru> <200702201820.27095.dada1@cosmosbay.com> <20070220175550.GB26961@2ka.mipt.ru> <20070220181217.GA3401@2ka.mipt.ru> <20070220194409.GB5590@2ka.mipt.ru> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Cc: "Eric Dumazet" , "David Miller" , akepner@sgi.com, linux@horizon.com, netdev@vger.kernel.org, bcrl@kvack.org To: "Evgeniy Polyakov" Return-path: Received: from wr-out-0506.google.com ([64.233.184.237]:44650 "EHLO wr-out-0506.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1030388AbXBTUKB (ORCPT ); Tue, 20 Feb 2007 15:10:01 -0500 Received: by wr-out-0506.google.com with SMTP id i21so1977512wra for ; Tue, 20 Feb 2007 12:10:00 -0800 (PST) In-Reply-To: Content-Disposition: inline Sender: netdev-owner@vger.kernel.org List-Id: netdev.vger.kernel.org On 2/20/07, Michael K. Edwards wrote: > Correct. That's called a "weak hash", and Jenkins is known to be a > thoroughly weak hash. That's why you never, ever use it without a > salt, and you don't let an attacker inspect the hash output either. Weak in a cryptographic sense, of course. Excellent avalanche behavior, though, which is what you care about in a salted hash. http://en.wikipedia.org/wiki/Hash_table I know nothing about data structures and algorithms except what I read on the Internet. But you'd be amazed what's on the Internet. Cheers, - Michael