|
@@ -1,9 +1,12 @@
|
|
-//Author: Wang Yi <godspeed_china@yeah.net>
|
|
|
|
|
|
+/* Copyright 2020 王一 Wang Yi <godspeed_china@yeah.net>
|
|
|
|
+ This is free and unencumbered software released into the public domain. http://unlicense.org/
|
|
|
|
+ See github.com/wangyi-fudan/wyhash/ LICENSE
|
|
|
|
+ */
|
|
#ifndef wyhash_final_version
|
|
#ifndef wyhash_final_version
|
|
#define wyhash_final_version
|
|
#define wyhash_final_version
|
|
//defines that change behavior
|
|
//defines that change behavior
|
|
#ifndef WYHASH_CONDOM
|
|
#ifndef WYHASH_CONDOM
|
|
-#define WYHASH_CONDOM 1 //0: read 8 bytes before and after boudaries, dangerous but fastest. 1: normal valid behavior 2: extra protection against entropy loss (probability=2^-63), aka. "blind multiplication"
|
|
|
|
|
|
+#define WYHASH_CONDOM 1 //0: read 8 bytes before and after boundaries, dangerous but fastest. 1: normal valid behavior 2: extra protection against entropy loss (probability=2^-63), aka. "blind multiplication"
|
|
#endif
|
|
#endif
|
|
#define WYHASH_32BIT_MUM 0 //faster on 32 bit system
|
|
#define WYHASH_32BIT_MUM 0 //faster on 32 bit system
|
|
//includes
|
|
//includes
|