hash.h revision 1.18 1 1.18 rillig /* $NetBSD: hash.h,v 1.18 2020/08/13 03:54:57 rillig Exp $ */
2 1.4 christos
3 1.1 cgd /*
4 1.1 cgd * Copyright (c) 1988, 1989, 1990 The Regents of the University of California.
5 1.8 agc *
6 1.8 agc * This code is derived from software contributed to Berkeley by
7 1.8 agc * Adam de Boor.
8 1.8 agc *
9 1.8 agc * Redistribution and use in source and binary forms, with or without
10 1.8 agc * modification, are permitted provided that the following conditions
11 1.8 agc * are met:
12 1.8 agc * 1. Redistributions of source code must retain the above copyright
13 1.8 agc * notice, this list of conditions and the following disclaimer.
14 1.8 agc * 2. Redistributions in binary form must reproduce the above copyright
15 1.8 agc * notice, this list of conditions and the following disclaimer in the
16 1.8 agc * documentation and/or other materials provided with the distribution.
17 1.8 agc * 3. Neither the name of the University nor the names of its contributors
18 1.8 agc * may be used to endorse or promote products derived from this software
19 1.8 agc * without specific prior written permission.
20 1.8 agc *
21 1.8 agc * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 1.8 agc * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 1.8 agc * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 1.8 agc * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 1.8 agc * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 1.8 agc * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 1.8 agc * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 1.8 agc * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 1.8 agc * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 1.8 agc * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 1.8 agc * SUCH DAMAGE.
32 1.8 agc *
33 1.8 agc * from: @(#)hash.h 8.1 (Berkeley) 6/6/93
34 1.8 agc */
35 1.8 agc
36 1.8 agc /*
37 1.1 cgd * Copyright (c) 1988, 1989 by Adam de Boor
38 1.1 cgd * Copyright (c) 1989 by Berkeley Softworks
39 1.1 cgd * All rights reserved.
40 1.1 cgd *
41 1.1 cgd * This code is derived from software contributed to Berkeley by
42 1.1 cgd * Adam de Boor.
43 1.1 cgd *
44 1.1 cgd * Redistribution and use in source and binary forms, with or without
45 1.1 cgd * modification, are permitted provided that the following conditions
46 1.1 cgd * are met:
47 1.1 cgd * 1. Redistributions of source code must retain the above copyright
48 1.1 cgd * notice, this list of conditions and the following disclaimer.
49 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
50 1.1 cgd * notice, this list of conditions and the following disclaimer in the
51 1.1 cgd * documentation and/or other materials provided with the distribution.
52 1.1 cgd * 3. All advertising materials mentioning features or use of this software
53 1.1 cgd * must display the following acknowledgement:
54 1.1 cgd * This product includes software developed by the University of
55 1.1 cgd * California, Berkeley and its contributors.
56 1.1 cgd * 4. Neither the name of the University nor the names of its contributors
57 1.1 cgd * may be used to endorse or promote products derived from this software
58 1.1 cgd * without specific prior written permission.
59 1.1 cgd *
60 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
61 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
62 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
63 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
64 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
65 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
66 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
67 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
68 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
69 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
70 1.1 cgd * SUCH DAMAGE.
71 1.1 cgd *
72 1.5 christos * from: @(#)hash.h 8.1 (Berkeley) 6/6/93
73 1.1 cgd */
74 1.1 cgd
75 1.1 cgd /* hash.h --
76 1.1 cgd *
77 1.1 cgd * This file contains definitions used by the hash module,
78 1.1 cgd * which maintains hash tables.
79 1.1 cgd */
80 1.1 cgd
81 1.18 rillig #ifndef MAKE_HASH_H
82 1.18 rillig #define MAKE_HASH_H
83 1.1 cgd
84 1.5 christos /*
85 1.1 cgd * The following defines one entry in the hash table.
86 1.1 cgd */
87 1.1 cgd
88 1.1 cgd typedef struct Hash_Entry {
89 1.1 cgd struct Hash_Entry *next; /* Used to link together all the
90 1.16 rillig * entries associated with the same
91 1.1 cgd * bucket. */
92 1.11 sjg void *clientPtr; /* Arbitrary pointer */
93 1.1 cgd unsigned namehash; /* hash value of key */
94 1.1 cgd char name[1]; /* key string */
95 1.1 cgd } Hash_Entry;
96 1.1 cgd
97 1.1 cgd typedef struct Hash_Table {
98 1.1 cgd struct Hash_Entry **bucketPtr;/* Pointers to Hash_Entry, one
99 1.16 rillig * for each bucket in the table. */
100 1.1 cgd int size; /* Actual size of array. */
101 1.1 cgd int numEntries; /* Number of entries in the table. */
102 1.1 cgd int mask; /* Used to select bits for hashing. */
103 1.15 sjg int maxchain; /* max length of chain detected */
104 1.1 cgd } Hash_Table;
105 1.1 cgd
106 1.5 christos /*
107 1.1 cgd * The following structure is used by the searching routines
108 1.1 cgd * to record where we are in the search.
109 1.1 cgd */
110 1.1 cgd
111 1.1 cgd typedef struct Hash_Search {
112 1.1 cgd Hash_Table *tablePtr; /* Table being searched. */
113 1.1 cgd int nextIndex; /* Next bucket to check (after current). */
114 1.1 cgd Hash_Entry *hashEntryPtr; /* Next entry to check in current bucket. */
115 1.1 cgd } Hash_Search;
116 1.1 cgd
117 1.1 cgd /*
118 1.1 cgd * Macros.
119 1.1 cgd */
120 1.1 cgd
121 1.1 cgd /*
122 1.9 dsl * void * Hash_GetValue(h)
123 1.5 christos * Hash_Entry *h;
124 1.1 cgd */
125 1.1 cgd
126 1.11 sjg #define Hash_GetValue(h) ((h)->clientPtr)
127 1.1 cgd
128 1.5 christos /*
129 1.5 christos * Hash_SetValue(h, val);
130 1.5 christos * Hash_Entry *h;
131 1.5 christos * char *val;
132 1.1 cgd */
133 1.1 cgd
134 1.11 sjg #define Hash_SetValue(h, val) ((h)->clientPtr = (val))
135 1.1 cgd
136 1.6 wiz void Hash_InitTable(Hash_Table *, int);
137 1.6 wiz void Hash_DeleteTable(Hash_Table *);
138 1.7 christos Hash_Entry *Hash_FindEntry(Hash_Table *, const char *);
139 1.7 christos Hash_Entry *Hash_CreateEntry(Hash_Table *, const char *, Boolean *);
140 1.6 wiz void Hash_DeleteEntry(Hash_Table *, Hash_Entry *);
141 1.6 wiz Hash_Entry *Hash_EnumFirst(Hash_Table *, Hash_Search *);
142 1.6 wiz Hash_Entry *Hash_EnumNext(Hash_Search *);
143 1.13 rillig void Hash_ForEach(Hash_Table *, void (*)(void *, void *), void *);
144 1.15 sjg void Hash_DebugStats(Hash_Table *, const char *);
145 1.1 cgd
146 1.18 rillig #endif /* MAKE_HASH_H */
147