hash.h revision 1.3 1 1.3 agc /* $NetBSD: hash.h,v 1.3 2003/08/07 10:04:37 agc Exp $ */
2 1.1 mrg
3 1.1 mrg /*
4 1.1 mrg * Copyright (c) 1988, 1989, 1990 The Regents of the University of California.
5 1.3 agc * All rights reserved.
6 1.3 agc *
7 1.3 agc * This code is derived from software contributed to Berkeley by
8 1.3 agc * Adam de Boor.
9 1.3 agc *
10 1.3 agc * Redistribution and use in source and binary forms, with or without
11 1.3 agc * modification, are permitted provided that the following conditions
12 1.3 agc * are met:
13 1.3 agc * 1. Redistributions of source code must retain the above copyright
14 1.3 agc * notice, this list of conditions and the following disclaimer.
15 1.3 agc * 2. Redistributions in binary form must reproduce the above copyright
16 1.3 agc * notice, this list of conditions and the following disclaimer in the
17 1.3 agc * documentation and/or other materials provided with the distribution.
18 1.3 agc * 3. Neither the name of the University nor the names of its contributors
19 1.3 agc * may be used to endorse or promote products derived from this software
20 1.3 agc * without specific prior written permission.
21 1.3 agc *
22 1.3 agc * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
23 1.3 agc * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 1.3 agc * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 1.3 agc * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 1.3 agc * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 1.3 agc * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 1.3 agc * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 1.3 agc * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 1.3 agc * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 1.3 agc * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 1.3 agc * SUCH DAMAGE.
33 1.3 agc *
34 1.3 agc * from: @(#)hash.h 8.1 (Berkeley) 6/6/93
35 1.3 agc */
36 1.3 agc
37 1.3 agc /*
38 1.1 mrg * Copyright (c) 1988, 1989 by Adam de Boor
39 1.1 mrg * Copyright (c) 1989 by Berkeley Softworks
40 1.1 mrg * All rights reserved.
41 1.1 mrg *
42 1.1 mrg * This code is derived from software contributed to Berkeley by
43 1.1 mrg * Adam de Boor.
44 1.1 mrg *
45 1.1 mrg * Redistribution and use in source and binary forms, with or without
46 1.1 mrg * modification, are permitted provided that the following conditions
47 1.1 mrg * are met:
48 1.1 mrg * 1. Redistributions of source code must retain the above copyright
49 1.1 mrg * notice, this list of conditions and the following disclaimer.
50 1.1 mrg * 2. Redistributions in binary form must reproduce the above copyright
51 1.1 mrg * notice, this list of conditions and the following disclaimer in the
52 1.1 mrg * documentation and/or other materials provided with the distribution.
53 1.1 mrg * 3. All advertising materials mentioning features or use of this software
54 1.1 mrg * must display the following acknowledgement:
55 1.1 mrg * This product includes software developed by the University of
56 1.1 mrg * California, Berkeley and its contributors.
57 1.1 mrg * 4. Neither the name of the University nor the names of its contributors
58 1.1 mrg * may be used to endorse or promote products derived from this software
59 1.1 mrg * without specific prior written permission.
60 1.1 mrg *
61 1.1 mrg * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
62 1.1 mrg * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
63 1.1 mrg * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
64 1.1 mrg * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
65 1.1 mrg * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
66 1.1 mrg * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
67 1.1 mrg * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
68 1.1 mrg * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
69 1.1 mrg * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
70 1.1 mrg * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
71 1.1 mrg * SUCH DAMAGE.
72 1.1 mrg *
73 1.1 mrg * from: @(#)hash.h 8.1 (Berkeley) 6/6/93
74 1.1 mrg */
75 1.1 mrg
76 1.1 mrg /* hash.h --
77 1.1 mrg *
78 1.1 mrg * This file contains definitions used by the hash module,
79 1.1 mrg * which maintains hash tables.
80 1.1 mrg */
81 1.1 mrg
82 1.1 mrg #ifndef _HASH
83 1.1 mrg #define _HASH
84 1.1 mrg
85 1.1 mrg /*
86 1.1 mrg * The following defines one entry in the hash table.
87 1.1 mrg */
88 1.1 mrg
89 1.1 mrg typedef struct Hash_Entry {
90 1.1 mrg struct Hash_Entry *next; /* Used to link together all the
91 1.1 mrg * entries associated with the same
92 1.1 mrg * bucket. */
93 1.2 lukem void *clientData; /* Arbitrary piece of data associated
94 1.1 mrg * with key. */
95 1.1 mrg unsigned namehash; /* hash value of key */
96 1.1 mrg char name[1]; /* key string */
97 1.1 mrg } Hash_Entry;
98 1.1 mrg
99 1.1 mrg typedef struct Hash_Table {
100 1.1 mrg struct Hash_Entry **bucketPtr;
101 1.1 mrg /* Pointers to Hash_Entry, one
102 1.1 mrg * for each bucket in the table. */
103 1.1 mrg int size; /* Actual size of array. */
104 1.1 mrg int numEntries; /* Number of entries in the table. */
105 1.1 mrg int mask; /* Used to select bits for hashing. */
106 1.1 mrg } Hash_Table;
107 1.1 mrg
108 1.1 mrg /*
109 1.1 mrg * The following structure is used by the searching routines
110 1.1 mrg * to record where we are in the search.
111 1.1 mrg */
112 1.1 mrg
113 1.1 mrg typedef struct Hash_Search {
114 1.1 mrg Hash_Table *tablePtr; /* Table being searched. */
115 1.1 mrg int nextIndex; /* Next bucket to check (after
116 1.1 mrg * current). */
117 1.1 mrg Hash_Entry *hashEntryPtr; /* Next entry to check in current
118 1.1 mrg * bucket. */
119 1.1 mrg } Hash_Search;
120 1.1 mrg
121 1.1 mrg /*
122 1.1 mrg * Macros.
123 1.1 mrg */
124 1.1 mrg
125 1.1 mrg /*
126 1.2 lukem * void *Hash_GetValue(h)
127 1.1 mrg * Hash_Entry *h;
128 1.1 mrg */
129 1.1 mrg
130 1.1 mrg #define Hash_GetValue(h) ((h)->clientData)
131 1.1 mrg
132 1.1 mrg /*
133 1.1 mrg * Hash_SetValue(h, val);
134 1.1 mrg * Hash_Entry *h;
135 1.1 mrg * char *val;
136 1.1 mrg */
137 1.1 mrg
138 1.2 lukem #define Hash_SetValue(h, val) ((h)->clientData = (void *) (val))
139 1.1 mrg
140 1.1 mrg /*
141 1.1 mrg * Hash_GetKey(h);
142 1.1 mrg * Hash_Entry *h;
143 1.1 mrg */
144 1.1 mrg
145 1.1 mrg #define Hash_GetKey(h) ((h)->name)
146 1.1 mrg
147 1.1 mrg /*
148 1.1 mrg * Hash_Size(n) returns the number of words in an object of n bytes
149 1.1 mrg */
150 1.1 mrg
151 1.1 mrg #define Hash_Size(n) (((n) + sizeof (int) - 1) / sizeof (int))
152 1.1 mrg
153 1.2 lukem void Hash_InitTable(Hash_Table *, int);
154 1.2 lukem void Hash_DeleteTable(Hash_Table *);
155 1.2 lukem Hash_Entry *Hash_FindEntry(Hash_Table *, char *);
156 1.2 lukem Hash_Entry *Hash_CreateEntry(Hash_Table *, char *, int *);
157 1.2 lukem void Hash_DeleteEntry(Hash_Table *, Hash_Entry *);
158 1.2 lukem Hash_Entry *Hash_EnumFirst(Hash_Table *, Hash_Search *);
159 1.2 lukem Hash_Entry *Hash_EnumNext(Hash_Search *);
160 1.1 mrg
161 1.1 mrg #endif /* _HASH */
162