3127
|
1 /* --------------------------------------------------------------------------
|
|
2 *
|
|
3 * License
|
|
4 *
|
|
5 * The contents of this file are subject to the Jabber Open Source License
|
|
6 * Version 1.0 (the "JOSL"). You may not copy or use this file, in either
|
|
7 * source code or executable form, except in compliance with the JOSL. You
|
|
8 * may obtain a copy of the JOSL at http://www.jabber.org/ or at
|
|
9 * http://www.opensource.org/.
|
|
10 *
|
|
11 * Software distributed under the JOSL is distributed on an "AS IS" basis,
|
|
12 * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the JOSL
|
|
13 * for the specific language governing rights and limitations under the
|
|
14 * JOSL.
|
|
15 *
|
|
16 * Copyrights
|
|
17 *
|
|
18 * Portions created by or assigned to Jabber.com, Inc. are
|
|
19 * Copyright (c) 1999-2002 Jabber.com, Inc. All Rights Reserved. Contact
|
|
20 * information for Jabber.com, Inc. is available at http://www.jabber.com/.
|
|
21 *
|
|
22 * Portions Copyright (c) 1998-1999 Jeremie Miller.
|
|
23 *
|
|
24 * Acknowledgements
|
|
25 *
|
|
26 * Special thanks to the Jabber Open Source Contributors for their
|
|
27 * suggestions and support of Jabber.
|
|
28 *
|
|
29 * Alternatively, the contents of this file may be used under the terms of the
|
|
30 * GNU General Public License Version 2 or later (the "GPL"), in which case
|
|
31 * the provisions of the GPL are applicable instead of those above. If you
|
|
32 * wish to allow use of your version of this file only under the terms of the
|
|
33 * GPL and not to allow others to use your version of this file under the JOSL,
|
|
34 * indicate your decision by deleting the provisions above and replace them
|
|
35 * with the notice and other provisions required by the GPL. If you do not
|
|
36 * delete the provisions above, a recipient may use your version of this file
|
|
37 * under either the JOSL or the GPL.
|
|
38 *
|
|
39 *
|
|
40 * --------------------------------------------------------------------------*/
|
|
41
|
|
42 #include "lib.h"
|
|
43
|
|
44
|
|
45 /* Generates a hash code for a string.
|
|
46 * This function uses the ELF hashing algorithm as reprinted in
|
|
47 * Andrew Binstock, "Hashing Rehashed," Dr. Dobb's Journal, April 1996.
|
|
48 */
|
|
49 int _xhasher(const char *s)
|
|
50 {
|
|
51 /* ELF hash uses unsigned chars and unsigned arithmetic for portability */
|
|
52 const unsigned char *name = (const unsigned char *)s;
|
|
53 unsigned long h = 0, g;
|
|
54
|
|
55 while (*name)
|
|
56 { /* do some fancy bitwanking on the string */
|
|
57 h = (h << 4) + (unsigned long)(*name++);
|
|
58 if ((g = (h & 0xF0000000UL))!=0)
|
|
59 h ^= (g >> 24);
|
|
60 h &= ~g;
|
|
61
|
|
62 }
|
|
63
|
|
64 return (int)h;
|
|
65 }
|
|
66
|
|
67
|
|
68 xhn _xhash_node_new(xht h, int index)
|
|
69 {
|
|
70 xhn n;
|
|
71 int i = index % h->prime;
|
|
72
|
|
73 /* get existing empty one */
|
|
74 for(n = &h->zen[i]; n != NULL; n = n->next)
|
|
75 if(n->key == NULL)
|
|
76 return n;
|
|
77
|
|
78 /* overflowing, new one! */
|
|
79 n = pmalloco(h->p, sizeof(_xhn));
|
|
80 n->next = h->zen[i].next;
|
|
81 h->zen[i].next = n;
|
|
82 return n;
|
|
83 }
|
|
84
|
|
85
|
|
86 xhn _xhash_node_get(xht h, const char *key, int index)
|
|
87 {
|
|
88 xhn n;
|
|
89 int i = index % h->prime;
|
|
90 for(n = &h->zen[i]; n != NULL; n = n->next)
|
|
91 if(j_strcmp(key, n->key) == 0)
|
|
92 return n;
|
|
93 return NULL;
|
|
94 }
|
|
95
|
|
96
|
|
97 xht xhash_new(int prime)
|
|
98 {
|
|
99 xht xnew;
|
|
100 pool p;
|
|
101
|
|
102 /* log_debug(ZONE,"creating new hash table of size %d",prime); */
|
|
103
|
|
104 p = pool_heap(sizeof(_xhn)*prime + sizeof(_xht));
|
|
105 xnew = pmalloco(p, sizeof(_xht));
|
|
106 xnew->prime = prime;
|
|
107 xnew->p = p;
|
|
108 xnew->zen = pmalloco(p, sizeof(_xhn)*prime); /* array of xhn size of prime */
|
|
109 return xnew;
|
|
110 }
|
|
111
|
|
112
|
|
113 void xhash_put(xht h, const char *key, void *val)
|
|
114 {
|
|
115 int index;
|
|
116 xhn n;
|
|
117
|
|
118 if(h == NULL || key == NULL)
|
|
119 return;
|
|
120
|
|
121 index = _xhasher(key);
|
|
122
|
|
123 /* if existing key, replace it */
|
|
124 if((n = _xhash_node_get(h, key, index)) != NULL)
|
|
125 {
|
|
126 /* log_debug(ZONE,"replacing %s with new val %X",key,val); */
|
|
127
|
|
128 n->key = key;
|
|
129 n->val = val;
|
|
130 return;
|
|
131 }
|
|
132
|
|
133 /* log_debug(ZONE,"saving %s val %X",key,val); */
|
|
134
|
|
135 /* new node */
|
|
136 n = _xhash_node_new(h, index);
|
|
137 n->key = key;
|
|
138 n->val = val;
|
|
139 }
|
|
140
|
|
141
|
|
142 void *xhash_get(xht h, const char *key)
|
|
143 {
|
|
144 xhn n;
|
|
145
|
|
146 if(h == NULL || key == NULL || (n = _xhash_node_get(h, key, _xhasher(key))) == NULL)
|
|
147 {
|
|
148 /* log_debug(ZONE,"failed lookup of %s",key); */
|
|
149 return NULL;
|
|
150 }
|
|
151
|
|
152 /* log_debug(ZONE,"found %s returning %X",key,n->val); */
|
|
153 return n->val;
|
|
154 }
|
|
155
|
|
156
|
|
157 void xhash_zap(xht h, const char *key)
|
|
158 {
|
|
159 xhn n;
|
|
160
|
|
161 if(h == NULL || key == NULL || (n = _xhash_node_get(h, key, _xhasher(key))) == NULL)
|
|
162 return;
|
|
163
|
|
164 /* log_debug(ZONE,"zapping %s",key); */
|
|
165
|
|
166 /* kill an entry by zeroing out the key */
|
|
167 n->key = NULL;
|
|
168 }
|
|
169
|
|
170
|
|
171 void xhash_free(xht h)
|
|
172 {
|
|
173 /* log_debug(ZONE,"hash free %X",h); */
|
|
174
|
|
175 if(h != NULL)
|
|
176 pool_free(h->p);
|
|
177 }
|
|
178
|
|
179 void xhash_walk(xht h, xhash_walker w, void *arg)
|
|
180 {
|
|
181 int i;
|
|
182 xhn n;
|
|
183
|
|
184 if(h == NULL || w == NULL)
|
|
185 return;
|
|
186
|
|
187 /* log_debug(ZONE,"walking %X",h); */
|
|
188
|
|
189 for(i = 0; i < h->prime; i++)
|
|
190 for(n = &h->zen[i]; n != NULL; n = n->next)
|
|
191 if(n->key != NULL && n->val != NULL)
|
|
192 (*w)(h, n->key, n->val, arg);
|
|
193 }
|
|
194
|