X-Git-Url: http://mj.ucw.cz/gitweb/?a=blobdiff_plain;ds=sidebyside;f=ucw%2Fdoc%2Fhash.txt;h=3e01b94156c23de6d9a79f7732f7992954787a89;hb=342e0c3edeacf4eecd03da36c879ca817c64a0f3;hp=bcdbb7e389ba19c6bddaa533a2e496ff69eebac3;hpb=b8729744ecc0b60680fd731f8f45bb86a839d997;p=libucw.git diff --git a/ucw/doc/hash.txt b/ucw/doc/hash.txt index bcdbb7e3..3e01b941 100644 --- a/ucw/doc/hash.txt +++ b/ucw/doc/hash.txt @@ -13,6 +13,9 @@ There are non-cryptographic hashes as well. - <> - <> +<>: +- <> + <>: - <> @@ -63,10 +66,22 @@ SHA1 has the same interface, so the same two ways apply. See also <>. +[[checksum]] +Checksums +--------- + +Their purpose is checking against random data changes, hardware +failures and alike. They are not to be used against aimed attacks. + +The <> is documented in the +<>. + [[nocrypto]] Non-cryptographic hashes ------------------------ +They are usually used to identify values in hash tables. + All these functions expect to be moduled by the size of a hash table. The size should be a prime number (it gives better distribution).