hash.h revision 1.27 1 1.27 rillig /* $NetBSD: hash.h,v 1.27 2020/10/18 10:44:25 rillig Exp $ */
2 1.4 christos
3 1.1 cgd /*
4 1.1 cgd * Copyright (c) 1988, 1989, 1990 The Regents of the University of California.
5 1.8 agc *
6 1.8 agc * This code is derived from software contributed to Berkeley by
7 1.8 agc * Adam de Boor.
8 1.8 agc *
9 1.8 agc * Redistribution and use in source and binary forms, with or without
10 1.8 agc * modification, are permitted provided that the following conditions
11 1.8 agc * are met:
12 1.8 agc * 1. Redistributions of source code must retain the above copyright
13 1.8 agc * notice, this list of conditions and the following disclaimer.
14 1.8 agc * 2. Redistributions in binary form must reproduce the above copyright
15 1.8 agc * notice, this list of conditions and the following disclaimer in the
16 1.8 agc * documentation and/or other materials provided with the distribution.
17 1.8 agc * 3. Neither the name of the University nor the names of its contributors
18 1.8 agc * may be used to endorse or promote products derived from this software
19 1.8 agc * without specific prior written permission.
20 1.8 agc *
21 1.8 agc * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 1.8 agc * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 1.8 agc * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 1.8 agc * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 1.8 agc * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 1.8 agc * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 1.8 agc * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 1.8 agc * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 1.8 agc * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 1.8 agc * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 1.8 agc * SUCH DAMAGE.
32 1.8 agc *
33 1.8 agc * from: @(#)hash.h 8.1 (Berkeley) 6/6/93
34 1.8 agc */
35 1.8 agc
36 1.8 agc /*
37 1.1 cgd * Copyright (c) 1988, 1989 by Adam de Boor
38 1.1 cgd * Copyright (c) 1989 by Berkeley Softworks
39 1.1 cgd * All rights reserved.
40 1.1 cgd *
41 1.1 cgd * This code is derived from software contributed to Berkeley by
42 1.1 cgd * Adam de Boor.
43 1.1 cgd *
44 1.1 cgd * Redistribution and use in source and binary forms, with or without
45 1.1 cgd * modification, are permitted provided that the following conditions
46 1.1 cgd * are met:
47 1.1 cgd * 1. Redistributions of source code must retain the above copyright
48 1.1 cgd * notice, this list of conditions and the following disclaimer.
49 1.1 cgd * 2. Redistributions in binary form must reproduce the above copyright
50 1.1 cgd * notice, this list of conditions and the following disclaimer in the
51 1.1 cgd * documentation and/or other materials provided with the distribution.
52 1.1 cgd * 3. All advertising materials mentioning features or use of this software
53 1.1 cgd * must display the following acknowledgement:
54 1.1 cgd * This product includes software developed by the University of
55 1.1 cgd * California, Berkeley and its contributors.
56 1.1 cgd * 4. Neither the name of the University nor the names of its contributors
57 1.1 cgd * may be used to endorse or promote products derived from this software
58 1.1 cgd * without specific prior written permission.
59 1.1 cgd *
60 1.1 cgd * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
61 1.1 cgd * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
62 1.1 cgd * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
63 1.1 cgd * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
64 1.1 cgd * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
65 1.1 cgd * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
66 1.1 cgd * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
67 1.1 cgd * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
68 1.1 cgd * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
69 1.1 cgd * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
70 1.1 cgd * SUCH DAMAGE.
71 1.1 cgd *
72 1.5 christos * from: @(#)hash.h 8.1 (Berkeley) 6/6/93
73 1.1 cgd */
74 1.1 cgd
75 1.21 rillig /* Hash tables with strings as keys and arbitrary pointers as values. */
76 1.1 cgd
77 1.18 rillig #ifndef MAKE_HASH_H
78 1.18 rillig #define MAKE_HASH_H
79 1.1 cgd
80 1.21 rillig /* A single key-value entry in the hash table. */
81 1.1 cgd typedef struct Hash_Entry {
82 1.21 rillig struct Hash_Entry *next; /* Used to link together all the entries
83 1.21 rillig * associated with the same bucket. */
84 1.21 rillig void *value;
85 1.21 rillig unsigned namehash; /* hash value of key */
86 1.21 rillig char name[1]; /* key string, variable length */
87 1.1 cgd } Hash_Entry;
88 1.1 cgd
89 1.21 rillig /* The hash table containing the entries. */
90 1.1 cgd typedef struct Hash_Table {
91 1.21 rillig Hash_Entry **buckets; /* Pointers to Hash_Entry, one
92 1.16 rillig * for each bucket in the table. */
93 1.26 rillig unsigned int bucketsSize;
94 1.26 rillig unsigned int numEntries; /* Number of entries in the table. */
95 1.26 rillig unsigned int bucketsMask; /* Used to select the bucket for a hash. */
96 1.26 rillig unsigned int maxchain; /* max length of chain detected */
97 1.1 cgd } Hash_Table;
98 1.1 cgd
99 1.27 rillig /* State of an iteration over all entries in a table. */
100 1.27 rillig typedef struct HashIter {
101 1.25 rillig Hash_Table *table; /* Table being searched. */
102 1.26 rillig unsigned int nextBucket; /* Next bucket to check (after current). */
103 1.25 rillig Hash_Entry *entry; /* Next entry to check in current bucket. */
104 1.27 rillig } HashIter;
105 1.1 cgd
106 1.23 rillig static inline MAKE_ATTR_UNUSED void *
107 1.20 rillig Hash_GetValue(Hash_Entry *h)
108 1.20 rillig {
109 1.21 rillig return h->value;
110 1.20 rillig }
111 1.20 rillig
112 1.23 rillig static inline MAKE_ATTR_UNUSED void
113 1.20 rillig Hash_SetValue(Hash_Entry *h, void *datum)
114 1.20 rillig {
115 1.21 rillig h->value = datum;
116 1.20 rillig }
117 1.1 cgd
118 1.22 rillig void Hash_InitTable(Hash_Table *);
119 1.6 wiz void Hash_DeleteTable(Hash_Table *);
120 1.7 christos Hash_Entry *Hash_FindEntry(Hash_Table *, const char *);
121 1.24 rillig void *Hash_FindValue(Hash_Table *, const char *);
122 1.7 christos Hash_Entry *Hash_CreateEntry(Hash_Table *, const char *, Boolean *);
123 1.6 wiz void Hash_DeleteEntry(Hash_Table *, Hash_Entry *);
124 1.27 rillig
125 1.27 rillig void HashIter_Init(HashIter *, Hash_Table *);
126 1.27 rillig Hash_Entry *HashIter_Next(HashIter *);
127 1.27 rillig
128 1.15 sjg void Hash_DebugStats(Hash_Table *, const char *);
129 1.1 cgd
130 1.18 rillig #endif /* MAKE_HASH_H */
131