/* * Copyright (c) 2004, Stefan Walter * Copyright (c) 2011, Collabora Ltd. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * * * Redistributions of source code must retain the above * copyright notice, this list of conditions and the * following disclaimer. * * Redistributions in binary form must reproduce the * above copyright notice, this list of conditions and * the following disclaimer in the documentation and/or * other materials provided with the distribution. * * The names of contributors to this software may not be * used to endorse or promote products derived from this * software without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF * THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH * DAMAGE. */ /* * Originally from apache 2.0 * Modifications for general use by */ /* Copyright 2000-2004 The Apache Software Foundation * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include #include #include #include #include "hash.h" /* * The internal form of a hash table. * * The table is an array indexed by the hash of the key; collisions * are resolved by hanging a linked list of hash entries off each * element of the array. Although this is a really simple design it * isn't too bad given that pools have a low allocation overhead. */ typedef struct hash_entry hash_entry_t; struct hash_entry { hash_entry_t* next; unsigned int hash; void* key; void* val; }; /* * The size of the array is always a power of two. We use the maximum * index rather than the size so that we can use bitwise-AND for * modular arithmetic. * The count of hash entries may be greater depending on the chosen * collision rate. */ struct hash { hash_entry_t** array; unsigned int count; unsigned int max; hash_hash_func hash_func; hash_equal_func equal_func; hash_destroy_func key_destroy_func; hash_destroy_func value_destroy_func; }; #define INITIAL_MAX 15 /* tunable == 2^n - 1 */ #define int_malloc malloc #define int_calloc calloc #define int_free free /* * Hash creation functions. */ static hash_entry_t** alloc_array(hash_t* ht, unsigned int max) { return (hash_entry_t**)int_calloc (sizeof (*(ht->array)), (max + 1)); } hash_t* hash_create (hash_hash_func hash_func, hash_equal_func equal_func, hash_destroy_func key_destroy_func, hash_destroy_func value_destroy_func) { hash_t* ht; assert (hash_func); assert (equal_func); ht = int_malloc (sizeof (hash_t)); if (ht) { ht->count = 0; ht->max = INITIAL_MAX; ht->hash_func = hash_func; ht->equal_func = equal_func; ht->key_destroy_func = key_destroy_func; ht->value_destroy_func = value_destroy_func; ht->array = alloc_array (ht, ht->max); if (!ht->array) { int_free (ht); return NULL; } } return ht; } void hash_free (hash_t* ht) { hash_iter_t hi; if (!ht) return; hash_iterate (ht, &hi); while (hash_next (&hi, NULL, NULL)) { if (ht->key_destroy_func) ht->key_destroy_func (hi.ths->key); if (ht->value_destroy_func) ht->value_destroy_func (hi.ths->val); } if (ht->array) int_free (ht->array); int_free (ht); } /* * Hash iteration functions. */ int hash_next (hash_iter_t* hi, void **key, void **value) { hi->ths = hi->next; while (!hi->ths) { if (hi->index > hi->ht->max) return 0; hi->ths = hi->ht->array[hi->index++]; } hi->next = hi->ths->next; if (key) *key = hi->ths->key; if (value) *value = hi->ths->val; return 1; } void hash_iterate (hash_t* ht, hash_iter_t *hi) { hi->ht = ht; hi->index = 0; hi->ths = NULL; hi->next = NULL; } /* * Expanding a hash table */ static int expand_array (hash_t* ht) { hash_iter_t hi; hash_entry_t** new_array; unsigned int new_max; new_max = ht->max * 2 + 1; new_array = alloc_array (ht, new_max); if(!new_array) return 0; hash_iterate (ht, &hi); while (hash_next (&hi, NULL, NULL)) { unsigned int i = hi.ths->hash & new_max; hi.ths->next = new_array[i]; new_array[i] = hi.ths; } if(ht->array) int_free (ht->array); ht->array = new_array; ht->max = new_max; return 1; } /* * This is where we keep the details of the hash function and control * the maximum collision rate. * * If val is non-NULL it creates and initializes a new hash entry if * there isn't already one there; it returns an updatable pointer so * that hash entries can be removed. */ static hash_entry_t** find_entry (hash_t* ht, const void* key, void* val) { hash_entry_t** hep; hash_entry_t* he; unsigned int hash; /* Perform the hashing */ hash = ht->hash_func (key); /* scan linked list */ for (hep = &ht->array[hash & ht->max], he = *hep; he; hep = &he->next, he = *hep) { if(he->hash == hash && ht->equal_func (he->key, key)) break; } if(he || !val) return hep; /* add a new entry for non-NULL val */ he = int_malloc (sizeof (*he)); if(he) { he->key = (void*)key; he->next = NULL; he->hash = hash; he->val = val; *hep = he; ht->count++; } return hep; } void* hash_get (hash_t* ht, const void *key) { hash_entry_t** he = find_entry (ht, key, NULL); if (he && *he) return (void*)((*he)->val); else return NULL; } int hash_set (hash_t* ht, void* key, void* val) { hash_entry_t** hep = find_entry (ht, key, val); if(hep && *hep) { /* replace entry */ (*hep)->val = val; /* check that the collision rate isn't too high */ if (ht->count > ht->max) { if (!expand_array (ht)) return 0; } return 1; } return 0; } int hash_remove (hash_t* ht, const void* key) { hash_entry_t** hep = find_entry (ht, key, NULL); if (hep && *hep) { hash_entry_t* old = *hep; *hep = (*hep)->next; --ht->count; if (ht->key_destroy_func) ht->key_destroy_func (old->key); if (ht->value_destroy_func) ht->value_destroy_func (old->val); free (old); return 1; } return 0; } void hash_clear (hash_t* ht) { hash_entry_t *he, *next; int i; /* Free all entries in the array */ for (i = 0; i < ht->max; ++i) { he = ht->array[i]; while (he) { next = he->next; if (ht->key_destroy_func) ht->key_destroy_func (he->key); if (ht->value_destroy_func) ht->value_destroy_func (he->val); free (he); he = next; } } memset (ht->array, 0, ht->max * sizeof (hash_entry_t*)); ht->count = 0; } unsigned int hash_count (hash_t* ht) { return ht->count; } unsigned int hash_string_hash (const void *string) { unsigned int hash; const unsigned char *p; assert (string); /* * This is the popular `times 33' hash algorithm which is used by * perl and also appears in Berkeley DB. This is one of the best * known hash functions for strings because it is both computed * very fast and distributes very well. * * The originator may be Dan Bernstein but the code in Berkeley DB * cites Chris Torek as the source. The best citation I have found * is "Chris Torek, Hash function for text in C, Usenet message * <27038@mimsy.umd.edu> in comp.lang.c , October, 1990." in Rich * Salz's USENIX 1992 paper about INN which can be found at * . * * The magic of number 33, i.e. why it works better than many other * constants, prime or not, has never been adequately explained by * anyone. So I try an explanation: if one experimentally tests all * multipliers between 1 and 256 (as I did while writing a low-level * data structure library some time ago) one detects that even * numbers are not useable at all. The remaining 128 odd numbers * (except for the number 1) work more or less all equally well. * They all distribute in an acceptable way and this way fill a hash * table with an average percent of approx. 86%. * * If one compares the chi^2 values of the variants (see * Bob Jenkins ``Hashing Frequently Asked Questions'' at * http://burtleburtle.net/bob/hash/hashfaq.html for a description * of chi^2), the number 33 not even has the best value. But the * number 33 and a few other equally good numbers like 17, 31, 63, * 127 and 129 have nevertheless a great advantage to the remaining * numbers in the large set of possible multipliers: their multiply * operation can be replaced by a faster operation based on just one * shift plus either a single addition or subtraction operation. And * because a hash function has to both distribute good _and_ has to * be very fast to compute, those few numbers should be preferred. * * -- Ralf S. Engelschall */ hash = 0; for(p = string; *p; p++) hash = hash * 33 + *p; return hash; } int hash_string_equal (const void *string_one, const void *string_two) { assert (string_one); assert (string_two); return strcmp (string_one, string_two) == 0; } unsigned int hash_ulongptr_hash (const void *to_ulong) { assert (to_ulong); return (unsigned int)*((unsigned long*)to_ulong); } int hash_ulongptr_equal (const void *ulong_one, const void *ulong_two) { assert (ulong_one); assert (ulong_two); return *((unsigned long*)ulong_one) == *((unsigned long*)ulong_two); } unsigned int hash_direct_hash (const void *ptr) { return (unsigned int)ptr; } int hash_direct_equal (const void *ptr_one, const void *ptr_two) { return ptr_one == ptr_two; }