1*2e2caf59SThomas Veerman /* $NetBSD: hash.h,v 1.10 2009/01/24 10:59:09 dsl Exp $ */ 2*2e2caf59SThomas Veerman 3*2e2caf59SThomas Veerman /* 4*2e2caf59SThomas Veerman * Copyright (c) 1988, 1989, 1990 The Regents of the University of California. 5*2e2caf59SThomas Veerman * 6*2e2caf59SThomas Veerman * This code is derived from software contributed to Berkeley by 7*2e2caf59SThomas Veerman * Adam de Boor. 8*2e2caf59SThomas Veerman * 9*2e2caf59SThomas Veerman * Redistribution and use in source and binary forms, with or without 10*2e2caf59SThomas Veerman * modification, are permitted provided that the following conditions 11*2e2caf59SThomas Veerman * are met: 12*2e2caf59SThomas Veerman * 1. Redistributions of source code must retain the above copyright 13*2e2caf59SThomas Veerman * notice, this list of conditions and the following disclaimer. 14*2e2caf59SThomas Veerman * 2. Redistributions in binary form must reproduce the above copyright 15*2e2caf59SThomas Veerman * notice, this list of conditions and the following disclaimer in the 16*2e2caf59SThomas Veerman * documentation and/or other materials provided with the distribution. 17*2e2caf59SThomas Veerman * 3. Neither the name of the University nor the names of its contributors 18*2e2caf59SThomas Veerman * may be used to endorse or promote products derived from this software 19*2e2caf59SThomas Veerman * without specific prior written permission. 20*2e2caf59SThomas Veerman * 21*2e2caf59SThomas Veerman * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 22*2e2caf59SThomas Veerman * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23*2e2caf59SThomas Veerman * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24*2e2caf59SThomas Veerman * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 25*2e2caf59SThomas Veerman * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26*2e2caf59SThomas Veerman * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27*2e2caf59SThomas Veerman * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28*2e2caf59SThomas Veerman * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29*2e2caf59SThomas Veerman * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30*2e2caf59SThomas Veerman * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31*2e2caf59SThomas Veerman * SUCH DAMAGE. 32*2e2caf59SThomas Veerman * 33*2e2caf59SThomas Veerman * from: @(#)hash.h 8.1 (Berkeley) 6/6/93 34*2e2caf59SThomas Veerman */ 35*2e2caf59SThomas Veerman 36*2e2caf59SThomas Veerman /* 37*2e2caf59SThomas Veerman * Copyright (c) 1988, 1989 by Adam de Boor 38*2e2caf59SThomas Veerman * Copyright (c) 1989 by Berkeley Softworks 39*2e2caf59SThomas Veerman * All rights reserved. 40*2e2caf59SThomas Veerman * 41*2e2caf59SThomas Veerman * This code is derived from software contributed to Berkeley by 42*2e2caf59SThomas Veerman * Adam de Boor. 43*2e2caf59SThomas Veerman * 44*2e2caf59SThomas Veerman * Redistribution and use in source and binary forms, with or without 45*2e2caf59SThomas Veerman * modification, are permitted provided that the following conditions 46*2e2caf59SThomas Veerman * are met: 47*2e2caf59SThomas Veerman * 1. Redistributions of source code must retain the above copyright 48*2e2caf59SThomas Veerman * notice, this list of conditions and the following disclaimer. 49*2e2caf59SThomas Veerman * 2. Redistributions in binary form must reproduce the above copyright 50*2e2caf59SThomas Veerman * notice, this list of conditions and the following disclaimer in the 51*2e2caf59SThomas Veerman * documentation and/or other materials provided with the distribution. 52*2e2caf59SThomas Veerman * 3. All advertising materials mentioning features or use of this software 53*2e2caf59SThomas Veerman * must display the following acknowledgement: 54*2e2caf59SThomas Veerman * This product includes software developed by the University of 55*2e2caf59SThomas Veerman * California, Berkeley and its contributors. 56*2e2caf59SThomas Veerman * 4. Neither the name of the University nor the names of its contributors 57*2e2caf59SThomas Veerman * may be used to endorse or promote products derived from this software 58*2e2caf59SThomas Veerman * without specific prior written permission. 59*2e2caf59SThomas Veerman * 60*2e2caf59SThomas Veerman * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 61*2e2caf59SThomas Veerman * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 62*2e2caf59SThomas Veerman * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 63*2e2caf59SThomas Veerman * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 64*2e2caf59SThomas Veerman * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 65*2e2caf59SThomas Veerman * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 66*2e2caf59SThomas Veerman * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 67*2e2caf59SThomas Veerman * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 68*2e2caf59SThomas Veerman * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 69*2e2caf59SThomas Veerman * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 70*2e2caf59SThomas Veerman * SUCH DAMAGE. 71*2e2caf59SThomas Veerman * 72*2e2caf59SThomas Veerman * from: @(#)hash.h 8.1 (Berkeley) 6/6/93 73*2e2caf59SThomas Veerman */ 74*2e2caf59SThomas Veerman 75*2e2caf59SThomas Veerman /* hash.h -- 76*2e2caf59SThomas Veerman * 77*2e2caf59SThomas Veerman * This file contains definitions used by the hash module, 78*2e2caf59SThomas Veerman * which maintains hash tables. 79*2e2caf59SThomas Veerman */ 80*2e2caf59SThomas Veerman 81*2e2caf59SThomas Veerman #ifndef _HASH 82*2e2caf59SThomas Veerman #define _HASH 83*2e2caf59SThomas Veerman 84*2e2caf59SThomas Veerman /* 85*2e2caf59SThomas Veerman * The following defines one entry in the hash table. 86*2e2caf59SThomas Veerman */ 87*2e2caf59SThomas Veerman 88*2e2caf59SThomas Veerman typedef struct Hash_Entry { 89*2e2caf59SThomas Veerman struct Hash_Entry *next; /* Used to link together all the 90*2e2caf59SThomas Veerman * entries associated with the same 91*2e2caf59SThomas Veerman * bucket. */ 92*2e2caf59SThomas Veerman union { 93*2e2caf59SThomas Veerman void *clientPtr; /* Arbitrary pointer */ 94*2e2caf59SThomas Veerman time_t clientTime; /* Arbitrary Time */ 95*2e2caf59SThomas Veerman } clientInfo; 96*2e2caf59SThomas Veerman unsigned namehash; /* hash value of key */ 97*2e2caf59SThomas Veerman char name[1]; /* key string */ 98*2e2caf59SThomas Veerman } Hash_Entry; 99*2e2caf59SThomas Veerman 100*2e2caf59SThomas Veerman typedef struct Hash_Table { 101*2e2caf59SThomas Veerman struct Hash_Entry **bucketPtr;/* Pointers to Hash_Entry, one 102*2e2caf59SThomas Veerman * for each bucket in the table. */ 103*2e2caf59SThomas Veerman int size; /* Actual size of array. */ 104*2e2caf59SThomas Veerman int numEntries; /* Number of entries in the table. */ 105*2e2caf59SThomas Veerman int mask; /* Used to select bits for hashing. */ 106*2e2caf59SThomas Veerman } Hash_Table; 107*2e2caf59SThomas Veerman 108*2e2caf59SThomas Veerman /* 109*2e2caf59SThomas Veerman * The following structure is used by the searching routines 110*2e2caf59SThomas Veerman * to record where we are in the search. 111*2e2caf59SThomas Veerman */ 112*2e2caf59SThomas Veerman 113*2e2caf59SThomas Veerman typedef struct Hash_Search { 114*2e2caf59SThomas Veerman Hash_Table *tablePtr; /* Table being searched. */ 115*2e2caf59SThomas Veerman int nextIndex; /* Next bucket to check (after current). */ 116*2e2caf59SThomas Veerman Hash_Entry *hashEntryPtr; /* Next entry to check in current bucket. */ 117*2e2caf59SThomas Veerman } Hash_Search; 118*2e2caf59SThomas Veerman 119*2e2caf59SThomas Veerman /* 120*2e2caf59SThomas Veerman * Macros. 121*2e2caf59SThomas Veerman */ 122*2e2caf59SThomas Veerman 123*2e2caf59SThomas Veerman /* 124*2e2caf59SThomas Veerman * void * Hash_GetValue(h) 125*2e2caf59SThomas Veerman * Hash_Entry *h; 126*2e2caf59SThomas Veerman */ 127*2e2caf59SThomas Veerman 128*2e2caf59SThomas Veerman #define Hash_GetValue(h) ((h)->clientInfo.clientPtr) 129*2e2caf59SThomas Veerman #define Hash_GetTimeValue(h) ((h)->clientInfo.clientTime) 130*2e2caf59SThomas Veerman 131*2e2caf59SThomas Veerman /* 132*2e2caf59SThomas Veerman * Hash_SetValue(h, val); 133*2e2caf59SThomas Veerman * Hash_Entry *h; 134*2e2caf59SThomas Veerman * char *val; 135*2e2caf59SThomas Veerman */ 136*2e2caf59SThomas Veerman 137*2e2caf59SThomas Veerman #define Hash_SetValue(h, val) ((h)->clientInfo.clientPtr = (val)) 138*2e2caf59SThomas Veerman #define Hash_SetTimeValue(h, val) ((h)->clientInfo.clientTime = (val)) 139*2e2caf59SThomas Veerman 140*2e2caf59SThomas Veerman /* 141*2e2caf59SThomas Veerman * Hash_Size(n) returns the number of words in an object of n bytes 142*2e2caf59SThomas Veerman */ 143*2e2caf59SThomas Veerman 144*2e2caf59SThomas Veerman #define Hash_Size(n) (((n) + sizeof (int) - 1) / sizeof (int)) 145*2e2caf59SThomas Veerman 146*2e2caf59SThomas Veerman void Hash_InitTable(Hash_Table *, int); 147*2e2caf59SThomas Veerman void Hash_DeleteTable(Hash_Table *); 148*2e2caf59SThomas Veerman Hash_Entry *Hash_FindEntry(Hash_Table *, const char *); 149*2e2caf59SThomas Veerman Hash_Entry *Hash_CreateEntry(Hash_Table *, const char *, Boolean *); 150*2e2caf59SThomas Veerman void Hash_DeleteEntry(Hash_Table *, Hash_Entry *); 151*2e2caf59SThomas Veerman Hash_Entry *Hash_EnumFirst(Hash_Table *, Hash_Search *); 152*2e2caf59SThomas Veerman Hash_Entry *Hash_EnumNext(Hash_Search *); 153*2e2caf59SThomas Veerman 154*2e2caf59SThomas Veerman #endif /* _HASH */ 155