hash.h revision 1.13 1 1.13 rillig /* $NetBSD: hash.h,v 1.13 2020/07/03 17:03:09 rillig Exp $ */
2 1.4 christos
3 1.1 cgd /*
4 1.1 cgd * Copyright (c) 1988, 1989, 1990 The Regents of the University of California.
5 1.8 agc *
6 1.8 agc * This code is derived from software contributed to Berkeley by
7 1.8 agc * Adam de Boor.
8 1.8 agc *
9 1.8 agc * Redistribution and use in source and binary forms, with or without
10 1.8 agc * modification, are permitted provided that the following conditions
11 1.8 agc * are met:
12 1.8 agc * 1. Redistributions of source code must retain the above copyright
13 1.8 agc * notice, this list of conditions and the following disclaimer.
14 1.8 agc * 2. Redistributions in binary form must reproduce the above copyright
15 1.8 agc * notice, this list of conditions and the following disclaimer in the
16 1.8 agc * documentation and/or other materials provided with the distribution.
17 1.8 agc * 3. Neither the name of the University nor the names of its contributors
18 1.8 agc * may be used to endorse or promote products derived from this software
19 1.8 agc * without specific prior written permission.
20 1.8 agc *
21 1.8 agc * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 1.8 agc * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 1.8 agc * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 1.8 agc * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 1.8 agc * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 1.8 agc * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 1.8 agc * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 1.8 agc * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 1.8 agc * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 1.8 agc * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 1.8 agc * SUCH DAMAGE.
32 1.8 agc *
33 1.8 agc * from: @(#)hash.h 8.1 (Berkeley) 6/6/93
34 1.8 agc */
35 1.8 agc
36 1.8 agc /*
37 1.1 cgd * Copyright (c) 1988, 1989 by Adam de Boor
38 1.1 cgd * Copyright (c) 1989 by Berkeley Softworks
39 1.1 cgd * All rights reserved.
40 1.1 cgd *
41 1.1 cgd * This code is derived from software contributed to Berkeley by
42 1.1 cgd * Adam de Boor.
43 1.1 cgd *
44 1.1 cgd * Redistribution and use in source and binary forms, with or without
45 1.1 cgd * modification, are permitted provided that the following conditions
46 1.1 cgd * are met:
47 1.1 cgd * 1. Redistributions of source code must retain the above copyright
48 1.1 cgd * notice, this list of conditions and the following disclaimer.
49 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
50 1.1 cgd * notice, this list of conditions and the following disclaimer in the
51 1.1 cgd * documentation and/or other materials provided with the distribution.
52 1.1 cgd * 3. All advertising materials mentioning features or use of this software
53 1.1 cgd * must display the following acknowledgement:
54 1.1 cgd * This product includes software developed by the University of
55 1.1 cgd * California, Berkeley and its contributors.
56 1.1 cgd * 4. Neither the name of the University nor the names of its contributors
57 1.1 cgd * may be used to endorse or promote products derived from this software
58 1.1 cgd * without specific prior written permission.
59 1.1 cgd *
60 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
61 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
62 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
63 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
64 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
65 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
66 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
67 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
68 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
69 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
70 1.1 cgd * SUCH DAMAGE.
71 1.1 cgd *
72 1.5 christos * from: @(#)hash.h 8.1 (Berkeley) 6/6/93
73 1.1 cgd */
74 1.1 cgd
75 1.1 cgd /* hash.h --
76 1.1 cgd *
77 1.1 cgd * This file contains definitions used by the hash module,
78 1.1 cgd * which maintains hash tables.
79 1.1 cgd */
80 1.1 cgd
81 1.12 maya #ifndef _HASH_H
82 1.12 maya #define _HASH_H
83 1.1 cgd
84 1.5 christos /*
85 1.1 cgd * The following defines one entry in the hash table.
86 1.1 cgd */
87 1.1 cgd
88 1.1 cgd typedef struct Hash_Entry {
89 1.1 cgd struct Hash_Entry *next; /* Used to link together all the
90 1.1 cgd * entries associated with the same
91 1.1 cgd * bucket. */
92 1.11 sjg void *clientPtr; /* Arbitrary pointer */
93 1.1 cgd unsigned namehash; /* hash value of key */
94 1.1 cgd char name[1]; /* key string */
95 1.1 cgd } Hash_Entry;
96 1.1 cgd
97 1.1 cgd typedef struct Hash_Table {
98 1.1 cgd struct Hash_Entry **bucketPtr;/* Pointers to Hash_Entry, one
99 1.1 cgd * for each bucket in the table. */
100 1.1 cgd int size; /* Actual size of array. */
101 1.1 cgd int numEntries; /* Number of entries in the table. */
102 1.1 cgd int mask; /* Used to select bits for hashing. */
103 1.1 cgd } Hash_Table;
104 1.1 cgd
105 1.5 christos /*
106 1.1 cgd * The following structure is used by the searching routines
107 1.1 cgd * to record where we are in the search.
108 1.1 cgd */
109 1.1 cgd
110 1.1 cgd typedef struct Hash_Search {
111 1.1 cgd Hash_Table *tablePtr; /* Table being searched. */
112 1.1 cgd int nextIndex; /* Next bucket to check (after current). */
113 1.1 cgd Hash_Entry *hashEntryPtr; /* Next entry to check in current bucket. */
114 1.1 cgd } Hash_Search;
115 1.1 cgd
116 1.1 cgd /*
117 1.1 cgd * Macros.
118 1.1 cgd */
119 1.1 cgd
120 1.1 cgd /*
121 1.9 dsl * void * Hash_GetValue(h)
122 1.5 christos * Hash_Entry *h;
123 1.1 cgd */
124 1.1 cgd
125 1.11 sjg #define Hash_GetValue(h) ((h)->clientPtr)
126 1.1 cgd
127 1.5 christos /*
128 1.5 christos * Hash_SetValue(h, val);
129 1.5 christos * Hash_Entry *h;
130 1.5 christos * char *val;
131 1.1 cgd */
132 1.1 cgd
133 1.11 sjg #define Hash_SetValue(h, val) ((h)->clientPtr = (val))
134 1.1 cgd
135 1.5 christos /*
136 1.5 christos * Hash_Size(n) returns the number of words in an object of n bytes
137 1.1 cgd */
138 1.1 cgd
139 1.1 cgd #define Hash_Size(n) (((n) + sizeof (int) - 1) / sizeof (int))
140 1.1 cgd
141 1.6 wiz void Hash_InitTable(Hash_Table *, int);
142 1.6 wiz void Hash_DeleteTable(Hash_Table *);
143 1.7 christos Hash_Entry *Hash_FindEntry(Hash_Table *, const char *);
144 1.7 christos Hash_Entry *Hash_CreateEntry(Hash_Table *, const char *, Boolean *);
145 1.6 wiz void Hash_DeleteEntry(Hash_Table *, Hash_Entry *);
146 1.6 wiz Hash_Entry *Hash_EnumFirst(Hash_Table *, Hash_Search *);
147 1.6 wiz Hash_Entry *Hash_EnumNext(Hash_Search *);
148 1.13 rillig void Hash_ForEach(Hash_Table *, void (*)(void *, void *), void *);
149 1.1 cgd
150 1.12 maya #endif /* _HASH_H */
151