12de3b87aSKai Wang.\" Copyright (c) 2006,2008 Joseph Koshy. All rights reserved. 22de3b87aSKai Wang.\" 32de3b87aSKai Wang.\" Redistribution and use in source and binary forms, with or without 42de3b87aSKai Wang.\" modification, are permitted provided that the following conditions 52de3b87aSKai Wang.\" are met: 62de3b87aSKai Wang.\" 1. Redistributions of source code must retain the above copyright 72de3b87aSKai Wang.\" notice, this list of conditions and the following disclaimer. 82de3b87aSKai Wang.\" 2. Redistributions in binary form must reproduce the above copyright 92de3b87aSKai Wang.\" notice, this list of conditions and the following disclaimer in the 102de3b87aSKai Wang.\" documentation and/or other materials provided with the distribution. 112de3b87aSKai Wang.\" 122de3b87aSKai Wang.\" This software is provided by Joseph Koshy ``as is'' and 132de3b87aSKai Wang.\" any express or implied warranties, including, but not limited to, the 142de3b87aSKai Wang.\" implied warranties of merchantability and fitness for a particular purpose 152de3b87aSKai Wang.\" are disclaimed. in no event shall Joseph Koshy be liable 162de3b87aSKai Wang.\" for any direct, indirect, incidental, special, exemplary, or consequential 172de3b87aSKai Wang.\" damages (including, but not limited to, procurement of substitute goods 182de3b87aSKai Wang.\" or services; loss of use, data, or profits; or business interruption) 192de3b87aSKai Wang.\" however caused and on any theory of liability, whether in contract, strict 202de3b87aSKai Wang.\" liability, or tort (including negligence or otherwise) arising in any way 212de3b87aSKai Wang.\" out of the use of this software, even if advised of the possibility of 222de3b87aSKai Wang.\" such damage. 232de3b87aSKai Wang.\" 24*ae500c1fSEd Maste.\" $Id: elf_hash.3 3639 2018-10-14 14:07:02Z jkoshy $ 252de3b87aSKai Wang.\" 262de3b87aSKai Wang.Dd August 15, 2006 272de3b87aSKai Wang.Dt ELF_HASH 3 28*ae500c1fSEd Maste.Os 292de3b87aSKai Wang.Sh NAME 302de3b87aSKai Wang.Nm elf_hash 312de3b87aSKai Wang.Nd compute a hash value for a string 322de3b87aSKai Wang.Sh LIBRARY 332de3b87aSKai Wang.Lb libelf 342de3b87aSKai Wang.Sh SYNOPSIS 352de3b87aSKai Wang.In libelf.h 362de3b87aSKai Wang.Ft "unsigned long" 372de3b87aSKai Wang.Fn elf_hash "const char *name" 382de3b87aSKai Wang.Sh DESCRIPTION 392de3b87aSKai WangFunction 402de3b87aSKai Wang.Fn elf_hash 412de3b87aSKai Wangcomputes a portable hash value for the null terminated string 422de3b87aSKai Wangpointed to by argument 432de3b87aSKai Wang.Ar name . 442de3b87aSKai Wang.Pp 452de3b87aSKai WangThe hash value returned is will be identical across 462de3b87aSKai Wangmachines of different architectures. 472de3b87aSKai WangThis allows hash tables to be built on one machine and 482de3b87aSKai Wangcorrectly used on another of a different architecture. 492de3b87aSKai WangThe hash value returned is also guaranteed 502de3b87aSKai Wang.Em not 512de3b87aSKai Wangto be the bit pattern of all ones (~0UL). 522de3b87aSKai Wang.Sh IMPLEMENTATION NOTES 532de3b87aSKai WangThe library internally uses unsigned 32 bit arithmetic to compute 542de3b87aSKai Wangthe hash value. 552de3b87aSKai Wang.Sh SEE ALSO 562de3b87aSKai Wang.Xr elf 3 , 572de3b87aSKai Wang.Xr gelf 3 58