Non-cryptographic hash functions (DJB2, DJB2a, FNV-1, FNV-1a).
Dan Bernstein’s DJB2 non-cryptographic hash algorithm.
Type | Intent | Optional | Attributes | Name | ||
---|---|---|---|---|---|---|
character(len=*), | intent(in) | :: | str |
Input string. |
Dan Bernstein’s DJB2a (XOR) non-cryptographic hash algorithm.
Type | Intent | Optional | Attributes | Name | ||
---|---|---|---|---|---|---|
character(len=*), | intent(in) | :: | str |
Input string. |
32-bit Fowler–Noll–Vo hash function (FNV-1). Uses a 64-bit signed integer to store the unsigned 32-bit hash.
Type | Intent | Optional | Attributes | Name | ||
---|---|---|---|---|---|---|
character(len=*), | intent(in) | :: | str |
Input string. |
32-bit Fowler–Noll–Vo hash function (FNV-1a). Uses a 64-bit signed integer to store the unsigned 32-bit hash.
Type | Intent | Optional | Attributes | Name | ||
---|---|---|---|---|---|---|
character(len=*), | intent(in) | :: | str |
Input string. |