58 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			Groff
		
	
	
	
	
	
			
		
		
	
	
			58 lines
		
	
	
		
			2.1 KiB
		
	
	
	
		
			Groff
		
	
	
	
	
	
| .\" Copyright (c) 2006,2008 Joseph Koshy.  All rights reserved.
 | |
| .\"
 | |
| .\" Redistribution and use in source and binary forms, with or without
 | |
| .\" modification, are permitted provided that the following conditions
 | |
| .\" are met:
 | |
| .\" 1. Redistributions of source code must retain the above copyright
 | |
| .\"    notice, this list of conditions and the following disclaimer.
 | |
| .\" 2. Redistributions in binary form must reproduce the above copyright
 | |
| .\"    notice, this list of conditions and the following disclaimer in the
 | |
| .\"    documentation and/or other materials provided with the distribution.
 | |
| .\"
 | |
| .\" This software is provided by Joseph Koshy ``as is'' and
 | |
| .\" any express or implied warranties, including, but not limited to, the
 | |
| .\" implied warranties of merchantability and fitness for a particular purpose
 | |
| .\" are disclaimed.  in no event shall Joseph Koshy be liable
 | |
| .\" for any direct, indirect, incidental, special, exemplary, or consequential
 | |
| .\" damages (including, but not limited to, procurement of substitute goods
 | |
| .\" or services; loss of use, data, or profits; or business interruption)
 | |
| .\" however caused and on any theory of liability, whether in contract, strict
 | |
| .\" liability, or tort (including negligence or otherwise) arising in any way
 | |
| .\" out of the use of this software, even if advised of the possibility of
 | |
| .\" such damage.
 | |
| .\"
 | |
| .\" $Id$
 | |
| .\"
 | |
| .Dd August 15, 2006
 | |
| .Os
 | |
| .Dt ELF_HASH 3
 | |
| .Sh NAME
 | |
| .Nm elf_hash
 | |
| .Nd compute a hash value for a string
 | |
| .Sh LIBRARY
 | |
| .Lb libelf
 | |
| .Sh SYNOPSIS
 | |
| .In libelf.h
 | |
| .Ft "unsigned long"
 | |
| .Fn elf_hash "const char *name"
 | |
| .Sh DESCRIPTION
 | |
| Function
 | |
| .Fn elf_hash
 | |
| computes a portable hash value for the null terminated string
 | |
| pointed to by argument
 | |
| .Ar name .
 | |
| .Pp
 | |
| The hash value returned is will be identical across
 | |
| machines of different architectures.
 | |
| This allows hash tables to be built on one machine and
 | |
| correctly used on another of a different architecture.
 | |
| The hash value returned is also guaranteed
 | |
| .Em not
 | |
| to be the bit pattern of all ones (~0UL).
 | |
| .Sh IMPLEMENTATION NOTES
 | |
| The library internally uses unsigned 32 bit arithmetic to compute
 | |
| the hash value.
 | |
| .Sh SEE ALSO
 | |
| .Xr elf 3 ,
 | |
| .Xr gelf 3
 | 
