All Downloads are FREE. Search and download functionalities are using the official Maven repository.

net.openhft.hashing.LongHashFunction Maven / Gradle / Ivy

Go to download

Zero-allocation implementations of fast non-cryptographic hash functions for byte sequences or blocks of memory

There is a newer version: 0.27ea0
Show newest version
/*
 * Copyright 2014 Higher Frequency Trading http://www.higherfrequencytrading.com
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package net.openhft.hashing;

import org.jetbrains.annotations.NotNull;
import sun.nio.ch.DirectBuffer;

import java.io.Serializable;
import java.nio.ByteBuffer;
import java.nio.ByteOrder;

import static java.nio.ByteOrder.LITTLE_ENDIAN;
import static java.nio.ByteOrder.nativeOrder;
import static net.openhft.hashing.CharSequenceAccess.nativeCharSequenceAccess;
import static net.openhft.hashing.UnsafeAccess.*;

/**
 * Hash function producing {@code long}-valued result from byte sequences of any length and
 * a plenty of different sources which "feels like byte sequences". Except {@link
 * #hashBytes(byte[])}, {@link #hashBytes(ByteBuffer)} (with their "sliced" versions) and
 * {@link #hashMemory(long, long)} methods, which actually accept byte sequences, notion of byte
 * sequence is defined as follows:
 * 
    *
  • For methods accepting arrays of Java primitives, {@code String}s and * {@code StringBuilder}s, byte sequence is how the input's bytes are actually lay in memory. *
  • *
  • For methods accepting single primitive values, byte sequence is how this primitive * would be put into memory with {@link ByteOrder#nativeOrder() native} byte order, or * equivalently, {@code hashXxx(primitive)} has always the same result as {@code * hashXxxs(new xxx[] {primitive})}, where "xxx" is any Java primitive type name.
  • *
  • For {@link #hash(Object, Access, long, long)} method byte sequence abstraction * is defined by the given {@link Access} strategy to the given object.
  • *
* *

Hash function implementation could either produce equal results for equal input on platforms * with different {@link ByteOrder}, favoring one byte order in terms of performance, or different * results, but performing equally good. This choice should be explicitly documented for all * {@code LongHashFunction} implementations. * *

Subclassing

* To implement a specific hash function algorithm, this class should be subclassed. Only methods * that accept single primitives, {@link #hashVoid()} and {@link #hash(Object, Access, long, long)} * should be implemented; other have default implementations which in the end delegate to * {@link #hash(Object, Access, long, long)} abstract method. * *

Notes about how exactly methods with default implementations are implemented in doc comments * are given for information and could be changed at any moment. However, it could hardly cause * any issues with subclassing, except probably little performance degradation. Methods documented * as "shortcuts" could either delegate to the referenced method or delegate directly to the method * to which the referenced method delegates. * *

{@code LongHashFunction} implementations shouldn't assume that {@code Access} strategies * do defensive checks, and access only bytes within the requested range. */ public abstract class LongHashFunction implements Serializable { private static final long serialVersionUID = 0L; static final boolean NATIVE_LITTLE_ENDIAN = nativeOrder() == LITTLE_ENDIAN; private static final byte TRUE_BYTE_VALUE; private static final byte FALSE_BYTE_VALUE; static { byte trueByteValue, falseByteValue; try { trueByteValue = trueByteValue(); falseByteValue = falseByteValue(); } catch (Throwable t) { // Unsafe in pre-Nougat Android does not have getByte(), fall back to some reasonable // value trueByteValue = 1; falseByteValue = 0; } TRUE_BYTE_VALUE = trueByteValue; FALSE_BYTE_VALUE = falseByteValue; } private static byte trueByteValue() { return UNSAFE.getByte(new boolean[] {true}, BOOLEAN_BASE); } private static byte falseByteValue() { return UNSAFE.getByte(new boolean[] {false}, BOOLEAN_BASE); } /** * Returns a hash function implementing * * CityHash64 algorithm, version 1.1 without seed values. This implementation produce * equal results for equal input on platforms with different {@link ByteOrder}, but is slower * on big-endian platforms than on little-endian. * * @see #city_1_1(long) * @see #city_1_1(long, long) */ public static LongHashFunction city_1_1() { return CityAndFarmHash_1_1.asLongHashFunctionWithoutSeed(); } /** * Returns a hash function implementing * * CityHash64 algorithm, version 1.1 using the given seed value. This implementation produce * equal results for equal input on platforms with different {@link ByteOrder}, but is slower * on big-endian platforms than on little-endian. * * @see #city_1_1() * @see #city_1_1(long, long) */ public static LongHashFunction city_1_1(long seed) { return CityAndFarmHash_1_1.asLongHashFunctionWithSeed(seed); } /** * Returns a hash function implementing * * CityHash64 algorithm, version 1.1 using the two given seed values. This implementation * produce equal results for equal input on platforms with different {@link ByteOrder}, but * is slower on big-endian platforms than on little-endian. * * @see #city_1_1() * @see #city_1_1(long) */ public static LongHashFunction city_1_1(long seed0, long seed1) { return CityAndFarmHash_1_1.asLongHashFunctionWithTwoSeeds(seed0, seed1); } /** * Returns a hash function implementing so-called * * farmhashna algorithm, without seed values. This implementation produces equal results for * equal input on platforms with different {@link ByteOrder}, but is slower on big-endian * platforms than on little-endian. * *

{@code farmhashna} was introduced in FarmHash 1.0. For inputs shorter than 32 bytes it's * output is equivalent to {@link #city_1_1()} output. * * @see #farmNa(long) * @see #farmNa(long, long) */ public static LongHashFunction farmNa() { return CityAndFarmHash_1_1.naWithoutSeeds(); } /** * Returns a hash function implementing so-called * * farmhashna algorithm, using the given seed value. This implementation produces equal * results for equal input on platforms with different {@link ByteOrder}, but is slower on * big-endian platforms than on little-endian. * *

{@code farmhashna} was introduced in FarmHash 1.0. For inputs shorter than 32 bytes it's * output is equivalent to {@link #city_1_1(long)} output. * * @see #farmNa() * @see #farmNa(long, long) */ public static LongHashFunction farmNa(long seed) { return CityAndFarmHash_1_1.naWithSeed(seed); } /** * Returns a hash function implementing so-called * * farmhashna algorithm, using the two given seed values. This implementation produces equal * results for equal input on platforms with different {@link ByteOrder}, but is slower on * big-endian platforms than on little-endian. * *

{@code farmhashna} was introduced in FarmHash 1.0. For inputs shorter than 32 bytes it's * output is equivalent to {@link #city_1_1(long, long)} output. * * @see #farmNa() * @see #farmNa(long) */ public static LongHashFunction farmNa(long seed0, long seed1) { return CityAndFarmHash_1_1.naWithSeeds(seed0, seed1); } /** * Returns a hash function implementing so-called * * farmhashuo algorithm without seed values. This implementation produces equal results for * equal input on platforms with different {@link ByteOrder}, but is slower on big-endian * platforms than on little-endian. * *

{@code farmhashuo} was introduced in FarmHash 1.1. * * @see #farmUo(long) * @see #farmUo(long, long) */ public static LongHashFunction farmUo() { return CityAndFarmHash_1_1.uoWithoutSeeds(); } /** * Returns a hash function implementing so-called * * farmhashuo algorithm with the given seed value. This implementation produces equal results * for equal input on platforms with different {@link ByteOrder}, but is slower on big-endian * platforms than on little-endian. * *

{@code farmhashuo} was introduced in FarmHash 1.1. * * @see #farmUo() * @see #farmUo(long, long) */ public static LongHashFunction farmUo(long seed) { return CityAndFarmHash_1_1.uoWithSeed(seed); } /** * Returns a hash function implementing so-called * * farmhashuo algorithm with the two given seed values. This implementation produces equal * results for equal input on platforms with different {@link ByteOrder}, but is slower on * big-endian platforms than on little-endian. * *

{@code farmhashuo} was introduced in FarmHash 1.1. * * @see #farmUo() * @see #farmUo(long) */ public static LongHashFunction farmUo(long seed0, long seed1) { return CityAndFarmHash_1_1.uoWithSeeds(seed0, seed1); } /** * Returns a hash function implementing * MurmurHash3 * algorithm without seed values. This implementation produces equal results for equal input * on platforms with different {@link ByteOrder}, but is slower on big-endian platforms than on * little-endian. * * @see #murmur_3(long) */ public static LongHashFunction murmur_3() { return MurmurHash_3.asLongHashFunctionWithoutSeed(); } /** * Returns a hash function implementing * MurmurHash3 * algorithm with the given seed value. This implementation produces equal results for equal * input on platforms with different {@link ByteOrder}, but is slower on big-endian platforms * than on little-endian. * * @see #murmur_3() */ public static LongHashFunction murmur_3(long seed) { return MurmurHash_3.asLongHashFunctionWithSeed(seed); } /** * Returns a hash function implementing xxHash * algorithm without a seed value (0 is used as default seed value). This implementation * produces equal results for equal input on platforms with different {@link * ByteOrder}, but is slower on big-endian platforms than on little-endian. * * @see #xx(long) */ public static LongHashFunction xx() { return XxHash.asLongHashFunctionWithoutSeed(); } /** * Returns a hash function implementing xxHash * algorithm with the given seed value. This implementation produces equal results for equal * input on platforms with different {@link ByteOrder}, but is slower on big-endian platforms * than on little-endian. * * @see #xx() */ public static LongHashFunction xx(long seed) { return XxHash.asLongHashFunctionWithSeed(seed); } /** * Returns a hash function implementing * * wyhash algorithm, version 3 without a seed value (0 is used as default seed value). This * implementation produces equal results for equal input on platforms with different {@link * ByteOrder}, but is slower on big-endian platforms than on little-endian. * * @see #wy_3(long) */ public static LongHashFunction wy_3() { return WyHash.asLongHashFunctionWithoutSeed(); } /** * Returns a hash function implementing * * wyhash algorithm, version 3 with the given seed value. This implementation produces equal * results for equal input on platforms with different {@link ByteOrder}, but is slower on * big-endian platforms than on little-endian. * * @see #wy_3() */ public static LongHashFunction wy_3(long seed) { return WyHash.asLongHashFunctionWithSeed(seed); } /** * Returns a hash function implementing the 64 bit version of * metrohash algorithm without * a seed value (0 is used as default seed value), with the initialization vector for * metrohash64_2. This implementation produces equal results for equal input on platforms with * different {@link ByteOrder}, but is slower on big-endian platforms than on little-endian. * * @see #metro(long) */ public static LongHashFunction metro() { return MetroHash.asLongHashFunctionWithoutSeed(); } /** * Returns a hash function implementing the 64 bit version of * metrohash algorithm with the given * seed value, with the initialization vector for metrohash64_2. This implementation produces * equal results for equal input on platforms with different {@link ByteOrder}, but is slower on * big-endian platforms than on little-endian. * * @see #metro() */ public static LongHashFunction metro(long seed) { return MetroHash.asLongHashFunctionWithSeed(seed); } private static StringHash stringHash; static { try { if (System.getProperty("java.vm.name").contains("HotSpot")) { String javaVersion = System.getProperty("java.version"); if (javaVersion.compareTo("1.7.0_06") >= 0) { if (javaVersion.compareTo("1.9") >= 0) { stringHash = UnknownJvmStringHash.INSTANCE; } else { stringHash = ModernHotSpotStringHash.INSTANCE; } } else { stringHash = HotSpotPrior7u6StringHash.INSTANCE; } } else { // try to initialize this version anyway stringHash = HotSpotPrior7u6StringHash.INSTANCE; } } catch (Throwable e) { // ignore } finally { if (stringHash == null) stringHash = UnknownJvmStringHash.INSTANCE; } } private static void checkArrayOffs(int arrayLength, int off, int len) { if (len < 0 || off < 0 || off + len > arrayLength || off + len < 0) throw new IndexOutOfBoundsException(); } /** * Constructor for use in subclasses. */ protected LongHashFunction() {} /** * Returns the hash code for the given {@code long} value; this method is consistent with * {@code LongHashFunction} methods that accept sequences of bytes, assuming the {@code input} * value is interpreted in {@linkplain ByteOrder#nativeOrder() native} byte order. For example, * the result of {@code hashLong(v)} call is identical to the result of * {@code hashLongs(new long[] {v})} call for any {@code long} value. */ public abstract long hashLong(long input); /** * Returns the hash code for the given {@code int} value; this method is consistent with * {@code LongHashFunction} methods that accept sequences of bytes, assuming the {@code input} * value is interpreted in {@linkplain ByteOrder#nativeOrder() native} byte order. For example, * the result of {@code hashInt(v)} call is identical to the result of * {@code hashInts(new int[] {v})} call for any {@code int} value. */ public abstract long hashInt(int input); /** * Returns the hash code for the given {@code short} value; this method is consistent with * {@code LongHashFunction} methods that accept sequences of bytes, assuming the {@code input} * value is interpreted in {@linkplain ByteOrder#nativeOrder() native} byte order. For example, * the result of {@code hashShort(v)} call is identical to the result of * {@code hashShorts(new short[] {v})} call for any {@code short} value. * As a consequence, {@code hashShort(v)} call produce always the same result as {@code * hashChar((char) v)}. */ public abstract long hashShort(short input); /** * Returns the hash code for the given {@code char} value; this method is consistent with * {@code LongHashFunction} methods that accept sequences of bytes, assuming the {@code input} * value is interpreted in {@linkplain ByteOrder#nativeOrder() native} byte order. For example, * the result of {@code hashChar(v)} call is identical to the result of * {@code hashChars(new char[] {v})} call for any {@code char} value. * As a consequence, {@code hashChar(v)} call produce always the same result as {@code * hashShort((short) v)}. */ public abstract long hashChar(char input); /** * Returns the hash code for the given {@code byte} value. This method is consistent with * {@code LongHashFunction} methods that accept sequences of bytes. For example, the result of * {@code hashByte(v)} call is identical to the result of * {@code hashBytes(new byte[] {v})} call for any {@code byte} value. */ public abstract long hashByte(byte input); /** * Returns the hash code for the empty (zero-length) bytes sequence, * for example {@code hashBytes(new byte[0])}. */ public abstract long hashVoid(); /** * Returns the hash code for {@code len} continuous bytes of the given {@code input} object, * starting from the given offset. The abstraction of input as ordered byte sequence and * "offset within the input" is defined by the given {@code access} strategy. * *

This method doesn't promise to throw a {@code RuntimeException} if {@code * [off, off + len - 1]} subsequence exceeds the bounds of the bytes sequence, defined by {@code * access} strategy for the given {@code input}, so use this method with caution. * * @param input the object to read bytes from * @param access access which defines the abstraction of the given input * as ordered byte sequence * @param off offset to the first byte of the subsequence to hash * @param len length of the subsequence to hash * @param the type of the input * @return hash code for the specified bytes subsequence */ public abstract long hash(T input, Access access, long off, long len); private long unsafeHash(Object input, long off, long len) { return hash(input, UnsafeAccess.INSTANCE, off, len); } /** * Shortcut for {@link #hashBooleans(boolean[]) hashBooleans(new boolean[] {input})}. * Note that this is not necessarily equal to {@code hashByte(input ? (byte) 1 : (byte) 0)}, * because booleans could be stored differently in this JVM. */ public long hashBoolean(boolean input) { return hashByte(input ? TRUE_BYTE_VALUE : FALSE_BYTE_VALUE); } /** * Shortcut for {@link #hashBooleans(boolean[], int, int) hashBooleans(input, 0, input.length)}. */ public long hashBooleans(@NotNull boolean[] input) { return unsafeHash(input, BOOLEAN_BASE, input.length); } /** * Returns the hash code for the specified subsequence of the given {@code boolean} array. * *

Default implementation delegates to {@link #hash(Object, Access, long, long)} method * using {@linkplain Access#unsafe() unsafe} {@code Access}. * * @param input the array to read data from * @param off index of the first {@code boolean} in the subsequence to hash * @param len length of the subsequence to hash * @return hash code for the specified subsequence * @throws IndexOutOfBoundsException if {@code off < 0} or {@code off + len > input.length} * or {@code len < 0} */ public long hashBooleans(@NotNull boolean[] input, int off, int len) { checkArrayOffs(input.length, off, len); return unsafeHash(input, BOOLEAN_BASE + off, len); } /** * Shortcut for {@link #hashBytes(byte[], int, int) hashBytes(input, 0, input.length)}. */ public long hashBytes(@NotNull byte[] input) { return unsafeHash(input, BYTE_BASE, input.length); } /** * Returns the hash code for the specified subsequence of the given {@code byte} array. * *

Default implementation delegates to {@link #hash(Object, Access, long, long)} method * using {@linkplain Access#unsafe() unsafe} {@code Access}. * * @param input the array to read bytes from * @param off index of the first {@code byte} in the subsequence to hash * @param len length of the subsequence to hash * @return hash code for the specified subsequence * @throws IndexOutOfBoundsException if {@code off < 0} or {@code off + len > input.length} * or {@code len < 0} */ public long hashBytes(@NotNull byte[] input, int off, int len) { checkArrayOffs(input.length, off, len); return unsafeHash(input, BYTE_BASE + off, len); } /** * Shortcut for {@link #hashBytes(ByteBuffer, int, int) * hashBytes(input, input.position(), input.remaining())}. */ public long hashBytes(ByteBuffer input) { return hashByteBuffer(input, input.position(), input.remaining()); } /** * Returns the hash code for the specified subsequence of the given {@code ByteBuffer}. * *

This method doesn't alter the state (mark, position, limit or order) of the given * {@code ByteBuffer}. * *

Default implementation delegates to {@link #hash(Object, Access, long, long)} method * using {@link Access#toByteBuffer()}. * * @param input the buffer to read bytes from * @param off index of the first {@code byte} in the subsequence to hash * @param len length of the subsequence to hash * @return hash code for the specified subsequence * @throws IndexOutOfBoundsException if {@code off < 0} or {@code off + len > input.capacity()} * or {@code len < 0} */ public long hashBytes(@NotNull ByteBuffer input, int off, int len) { checkArrayOffs(input.capacity(), off, len); return hashByteBuffer(input, off, len); } private long hashByteBuffer(@NotNull ByteBuffer input, int off, int len) { if (input.hasArray()) { return unsafeHash(input.array(), BYTE_BASE + input.arrayOffset() + off, len); } else if (input instanceof DirectBuffer) { return unsafeHash(null, ((DirectBuffer) input).address() + off, len); } else { return hash(input, ByteBufferAccess.INSTANCE, off, len); } } /** * Returns the hash code of bytes of the wild memory from the given address. Use with caution. * *

Default implementation delegates to {@link #hash(Object, Access, long, long)} method * using {@linkplain Access#unsafe() unsafe} {@code Access}. * * @param address the address of the first byte to hash * @param len length of the byte sequence to hash * @return hash code for the specified byte sequence */ public long hashMemory(long address, long len) { return unsafeHash(null, address, len); } /** * Shortcut for {@link #hashChars(char[], int, int) hashChars(input, 0, input.length)}. */ public long hashChars(@NotNull char[] input) { return unsafeHash(input, CHAR_BASE, input.length * 2L); } /** * Returns the hash code for bytes, as they lay in memory, of the specified subsequence * of the given {@code char} array. * *

Default implementation delegates to {@link #hash(Object, Access, long, long)} method * using {@linkplain Access#unsafe() unsafe} {@code Access}. * * @param input the array to read data from * @param off index of the first {@code char} in the subsequence to hash * @param len length of the subsequence to hash, in chars (i. e. the length of the bytes * sequence to hash is {@code len * 2L}) * @return hash code for the specified subsequence * @throws IndexOutOfBoundsException if {@code off < 0} or {@code off + len > input.length} * or {@code len < 0} */ public long hashChars(@NotNull char[] input, int off, int len) { checkArrayOffs(input.length, off, len); return unsafeHash(input, CHAR_BASE + (off * 2L), len * 2L); } /** * Shortcut for {@link #hashChars(String, int, int) hashChars(input, 0, input.length())}. */ public long hashChars(@NotNull String input) { return stringHash.longHash(input, this, 0, input.length()); } /** * Returns the hash code for bytes of the specified subsequence of the given {@code String}'s * underlying {@code char} array. * *

Default implementation could either delegate to {@link #hash(Object, Access, long, long)} * using {@link Access#toNativeCharSequence()}, or to {@link #hashChars(char[], int, int)}. * * @param input the string which bytes to hash * @param off index of the first {@code char} in the subsequence to hash * @param len length of the subsequence to hash, in chars (i. e. the length of the bytes * sequence to hash is {@code len * 2L}) * @return the hash code of the given {@code String}'s bytes * @throws IndexOutOfBoundsException if {@code off < 0} or {@code off + len > input.length()} * or {@code len < 0} */ public long hashChars(@NotNull String input, int off, int len) { checkArrayOffs(input.length(), off, len); return stringHash.longHash(input, this, off, len); } /** * Shortcut for {@link #hashChars(StringBuilder, int, int) hashChars(input, 0, input.length())}. */ public long hashChars(@NotNull StringBuilder input) { return hashNativeChars(input); } /** * Returns the hash code for bytes of the specified subsequence of the given * {@code StringBuilder}'s underlying {@code char} array. * *

Default implementation could either delegate to {@link #hash(Object, Access, long, long)} * using {@link Access#toNativeCharSequence()}, or to {@link #hashChars(char[], int, int)}. * * @param input the string builder which bytes to hash * @param off index of the first {@code char} in the subsequence to hash * @param len length of the subsequence to hash, in chars (i. e. the length of the bytes * sequence to hash is {@code len * 2L}) * @return the hash code of the given {@code String}'s bytes * @throws IndexOutOfBoundsException if {@code off < 0} or {@code off + len > input.length()} * or {@code len < 0} */ public long hashChars(@NotNull StringBuilder input, int off, int len) { checkArrayOffs(input.length(), off, len); return hashNativeChars(input, off, len); } long hashNativeChars(CharSequence input) { return hashNativeChars(input, 0, input.length()); } long hashNativeChars(CharSequence input, int off, int len) { return hash(input, nativeCharSequenceAccess(), off * 2L, len * 2L); } /** * Shortcut for {@link #hashShorts(short[], int, int) hashShorts(input, 0, input.length)}. */ public long hashShorts(@NotNull short[] input) { return unsafeHash(input, SHORT_BASE, input.length * 2L); } /** * Returns the hash code for bytes, as they lay in memory, of the specified subsequence * of the given {@code short} array. * *

Default implementation delegates to {@link #hash(Object, Access, long, long)} method * using {@linkplain Access#unsafe() unsafe} {@code Access}. * * @param input the array to read data from * @param off index of the first {@code short} in the subsequence to hash * @param len length of the subsequence to hash, in shorts (i. e. the length of the bytes * sequence to hash is {@code len * 2L}) * @return hash code for the specified subsequence * @throws IndexOutOfBoundsException if {@code off < 0} or {@code off + len > input.length} * or {@code len < 0} */ public long hashShorts(@NotNull short[] input, int off, int len) { checkArrayOffs(input.length, off, len); return unsafeHash(input, SHORT_BASE + (off * 2L), len * 2L); } /** * Shortcut for {@link #hashInts(int[], int, int) hashInts(input, 0, input.length)}. */ public long hashInts(@NotNull int[] input) { return unsafeHash(input, INT_BASE, input.length * 4L); } /** * Returns the hash code for bytes, as they lay in memory, of the specified subsequence * of the given {@code int} array. * *

Default implementation delegates to {@link #hash(Object, Access, long, long)} method * using {@linkplain Access#unsafe() unsafe} {@code Access}. * * @param input the array to read data from * @param off index of the first {@code int} in the subsequence to hash * @param len length of the subsequence to hash, in ints (i. e. the length of the bytes * sequence to hash is {@code len * 4L}) * @return hash code for the specified subsequence * @throws IndexOutOfBoundsException if {@code off < 0} or {@code off + len > input.length} * or {@code len < 0} */ public long hashInts(@NotNull int[] input, int off, int len) { checkArrayOffs(input.length, off, len); return unsafeHash(input, INT_BASE + (off * 4L), len * 4L); } /** * Shortcut for {@link #hashLongs(long[], int, int) hashLongs(input, 0, input.length)}. */ public long hashLongs(@NotNull long[] input) { return unsafeHash(input, LONG_BASE, input.length * 8L); } /** * Returns the hash code for bytes, as they lay in memory, of the specified subsequence * of the given {@code long} array. * *

Default implementation delegates to {@link #hash(Object, Access, long, long)} method * using {@linkplain Access#unsafe() unsafe} {@code Access}. * * @param input the array to read data from * @param off index of the first {@code long} in the subsequence to hash * @param len length of the subsequence to hash, in longs (i. e. the length of the bytes * sequence to hash is {@code len * 8L}) * @return hash code for the specified subsequence * @throws IndexOutOfBoundsException if {@code off < 0} or {@code off + len > input.length} * or {@code len < 0} */ public long hashLongs(@NotNull long[] input, int off, int len) { checkArrayOffs(input.length, off, len); return unsafeHash(input, LONG_BASE + (off * 8L), len * 8L); } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy