1 1.3 agc /* $NetBSD: hash.h,v 1.3 2003/08/07 10:04:37 agc Exp $ */ 2 1.1 mrg 3 1.1 mrg /* 4 1.1 mrg * Copyright (c) 1988, 1989, 1990 The Regents of the University of California. 5 1.3 agc * All rights reserved. 6 1.3 agc * 7 1.3 agc * This code is derived from software contributed to Berkeley by 8 1.3 agc * Adam de Boor. 9 1.3 agc * 10 1.3 agc * Redistribution and use in source and binary forms, with or without 11 1.3 agc * modification, are permitted provided that the following conditions 12 1.3 agc * are met: 13 1.3 agc * 1. Redistributions of source code must retain the above copyright 14 1.3 agc * notice, this list of conditions and the following disclaimer. 15 1.3 agc * 2. Redistributions in binary form must reproduce the above copyright 16 1.3 agc * notice, this list of conditions and the following disclaimer in the 17 1.3 agc * documentation and/or other materials provided with the distribution. 18 1.3 agc * 3. Neither the name of the University nor the names of its contributors 19 1.3 agc * may be used to endorse or promote products derived from this software 20 1.3 agc * without specific prior written permission. 21 1.3 agc * 22 1.3 agc * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 23 1.3 agc * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 24 1.3 agc * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 25 1.3 agc * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 26 1.3 agc * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 27 1.3 agc * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 28 1.3 agc * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 29 1.3 agc * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 30 1.3 agc * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 31 1.3 agc * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 32 1.3 agc * SUCH DAMAGE. 33 1.3 agc * 34 1.3 agc * from: @(#)hash.h 8.1 (Berkeley) 6/6/93 35 1.3 agc */ 36 1.3 agc 37 1.3 agc /* 38 1.1 mrg * Copyright (c) 1988, 1989 by Adam de Boor 39 1.1 mrg * Copyright (c) 1989 by Berkeley Softworks 40 1.1 mrg * All rights reserved. 41 1.1 mrg * 42 1.1 mrg * This code is derived from software contributed to Berkeley by 43 1.1 mrg * Adam de Boor. 44 1.1 mrg * 45 1.1 mrg * Redistribution and use in source and binary forms, with or without 46 1.1 mrg * modification, are permitted provided that the following conditions 47 1.1 mrg * are met: 48 1.1 mrg * 1. Redistributions of source code must retain the above copyright 49 1.1 mrg * notice, this list of conditions and the following disclaimer. 50 1.1 mrg * 2. Redistributions in binary form must reproduce the above copyright 51 1.1 mrg * notice, this list of conditions and the following disclaimer in the 52 1.1 mrg * documentation and/or other materials provided with the distribution. 53 1.1 mrg * 3. All advertising materials mentioning features or use of this software 54 1.1 mrg * must display the following acknowledgement: 55 1.1 mrg * This product includes software developed by the University of 56 1.1 mrg * California, Berkeley and its contributors. 57 1.1 mrg * 4. Neither the name of the University nor the names of its contributors 58 1.1 mrg * may be used to endorse or promote products derived from this software 59 1.1 mrg * without specific prior written permission. 60 1.1 mrg * 61 1.1 mrg * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 62 1.1 mrg * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 63 1.1 mrg * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 64 1.1 mrg * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 65 1.1 mrg * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 66 1.1 mrg * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 67 1.1 mrg * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 68 1.1 mrg * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 69 1.1 mrg * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 70 1.1 mrg * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 71 1.1 mrg * SUCH DAMAGE. 72 1.1 mrg * 73 1.1 mrg * from: @(#)hash.h 8.1 (Berkeley) 6/6/93 74 1.1 mrg */ 75 1.1 mrg 76 1.1 mrg /* hash.h -- 77 1.1 mrg * 78 1.1 mrg * This file contains definitions used by the hash module, 79 1.1 mrg * which maintains hash tables. 80 1.1 mrg */ 81 1.1 mrg 82 1.1 mrg #ifndef _HASH 83 1.1 mrg #define _HASH 84 1.1 mrg 85 1.1 mrg /* 86 1.1 mrg * The following defines one entry in the hash table. 87 1.1 mrg */ 88 1.1 mrg 89 1.1 mrg typedef struct Hash_Entry { 90 1.1 mrg struct Hash_Entry *next; /* Used to link together all the 91 1.1 mrg * entries associated with the same 92 1.1 mrg * bucket. */ 93 1.2 lukem void *clientData; /* Arbitrary piece of data associated 94 1.1 mrg * with key. */ 95 1.1 mrg unsigned namehash; /* hash value of key */ 96 1.1 mrg char name[1]; /* key string */ 97 1.1 mrg } Hash_Entry; 98 1.1 mrg 99 1.1 mrg typedef struct Hash_Table { 100 1.1 mrg struct Hash_Entry **bucketPtr; 101 1.1 mrg /* Pointers to Hash_Entry, one 102 1.1 mrg * for each bucket in the table. */ 103 1.1 mrg int size; /* Actual size of array. */ 104 1.1 mrg int numEntries; /* Number of entries in the table. */ 105 1.1 mrg int mask; /* Used to select bits for hashing. */ 106 1.1 mrg } Hash_Table; 107 1.1 mrg 108 1.1 mrg /* 109 1.1 mrg * The following structure is used by the searching routines 110 1.1 mrg * to record where we are in the search. 111 1.1 mrg */ 112 1.1 mrg 113 1.1 mrg typedef struct Hash_Search { 114 1.1 mrg Hash_Table *tablePtr; /* Table being searched. */ 115 1.1 mrg int nextIndex; /* Next bucket to check (after 116 1.1 mrg * current). */ 117 1.1 mrg Hash_Entry *hashEntryPtr; /* Next entry to check in current 118 1.1 mrg * bucket. */ 119 1.1 mrg } Hash_Search; 120 1.1 mrg 121 1.1 mrg /* 122 1.1 mrg * Macros. 123 1.1 mrg */ 124 1.1 mrg 125 1.1 mrg /* 126 1.2 lukem * void *Hash_GetValue(h) 127 1.1 mrg * Hash_Entry *h; 128 1.1 mrg */ 129 1.1 mrg 130 1.1 mrg #define Hash_GetValue(h) ((h)->clientData) 131 1.1 mrg 132 1.1 mrg /* 133 1.1 mrg * Hash_SetValue(h, val); 134 1.1 mrg * Hash_Entry *h; 135 1.1 mrg * char *val; 136 1.1 mrg */ 137 1.1 mrg 138 1.2 lukem #define Hash_SetValue(h, val) ((h)->clientData = (void *) (val)) 139 1.1 mrg 140 1.1 mrg /* 141 1.1 mrg * Hash_GetKey(h); 142 1.1 mrg * Hash_Entry *h; 143 1.1 mrg */ 144 1.1 mrg 145 1.1 mrg #define Hash_GetKey(h) ((h)->name) 146 1.1 mrg 147 1.1 mrg /* 148 1.1 mrg * Hash_Size(n) returns the number of words in an object of n bytes 149 1.1 mrg */ 150 1.1 mrg 151 1.1 mrg #define Hash_Size(n) (((n) + sizeof (int) - 1) / sizeof (int)) 152 1.1 mrg 153 1.2 lukem void Hash_InitTable(Hash_Table *, int); 154 1.2 lukem void Hash_DeleteTable(Hash_Table *); 155 1.2 lukem Hash_Entry *Hash_FindEntry(Hash_Table *, char *); 156 1.2 lukem Hash_Entry *Hash_CreateEntry(Hash_Table *, char *, int *); 157 1.2 lukem void Hash_DeleteEntry(Hash_Table *, Hash_Entry *); 158 1.2 lukem Hash_Entry *Hash_EnumFirst(Hash_Table *, Hash_Search *); 159 1.2 lukem Hash_Entry *Hash_EnumNext(Hash_Search *); 160 1.1 mrg 161 1.1 mrg #endif /* _HASH */ 162