Thu, 04 Apr 2002 03:04:57 +0000
[gaim-migrate @ 3142]
Upgraded jabber to most recent stable version
| 3127 | 1 | /* -------------------------------------------------------------------------- |
| 2 | * | |
| 3 | * License | |
| 4 | * | |
| 5 | * The contents of this file are subject to the Jabber Open Source License | |
| 6 | * Version 1.0 (the "JOSL"). You may not copy or use this file, in either | |
| 7 | * source code or executable form, except in compliance with the JOSL. You | |
| 8 | * may obtain a copy of the JOSL at http://www.jabber.org/ or at | |
| 9 | * http://www.opensource.org/. | |
| 10 | * | |
| 11 | * Software distributed under the JOSL is distributed on an "AS IS" basis, | |
| 12 | * WITHOUT WARRANTY OF ANY KIND, either express or implied. See the JOSL | |
| 13 | * for the specific language governing rights and limitations under the | |
| 14 | * JOSL. | |
| 15 | * | |
| 16 | * Copyrights | |
| 17 | * | |
| 18 | * Portions created by or assigned to Jabber.com, Inc. are | |
| 19 | * Copyright (c) 1999-2002 Jabber.com, Inc. All Rights Reserved. Contact | |
| 20 | * information for Jabber.com, Inc. is available at http://www.jabber.com/. | |
| 21 | * | |
| 22 | * Portions Copyright (c) 1998-1999 Jeremie Miller. | |
| 23 | * | |
| 24 | * Acknowledgements | |
| 25 | * | |
| 26 | * Special thanks to the Jabber Open Source Contributors for their | |
| 27 | * suggestions and support of Jabber. | |
| 28 | * | |
| 29 | * Alternatively, the contents of this file may be used under the terms of the | |
| 30 | * GNU General Public License Version 2 or later (the "GPL"), in which case | |
| 31 | * the provisions of the GPL are applicable instead of those above. If you | |
| 32 | * wish to allow use of your version of this file only under the terms of the | |
| 33 | * GPL and not to allow others to use your version of this file under the JOSL, | |
| 34 | * indicate your decision by deleting the provisions above and replace them | |
| 35 | * with the notice and other provisions required by the GPL. If you do not | |
| 36 | * delete the provisions above, a recipient may use your version of this file | |
| 37 | * under either the JOSL or the GPL. | |
| 38 | * | |
| 39 | * | |
| 40 | * --------------------------------------------------------------------------*/ | |
| 41 | ||
| 42 | #include "lib.h" | |
| 43 | ||
| 44 | ||
| 45 | /* Generates a hash code for a string. | |
| 46 | * This function uses the ELF hashing algorithm as reprinted in | |
| 47 | * Andrew Binstock, "Hashing Rehashed," Dr. Dobb's Journal, April 1996. | |
| 48 | */ | |
| 49 | int _xhasher(const char *s) | |
| 50 | { | |
| 51 | /* ELF hash uses unsigned chars and unsigned arithmetic for portability */ | |
| 52 | const unsigned char *name = (const unsigned char *)s; | |
| 53 | unsigned long h = 0, g; | |
| 54 | ||
| 55 | while (*name) | |
| 56 | { /* do some fancy bitwanking on the string */ | |
| 57 | h = (h << 4) + (unsigned long)(*name++); | |
| 58 | if ((g = (h & 0xF0000000UL))!=0) | |
| 59 | h ^= (g >> 24); | |
| 60 | h &= ~g; | |
| 61 | ||
| 62 | } | |
| 63 | ||
| 64 | return (int)h; | |
| 65 | } | |
| 66 | ||
| 67 | ||
| 68 | xhn _xhash_node_new(xht h, int index) | |
| 69 | { | |
| 70 | xhn n; | |
| 71 | int i = index % h->prime; | |
| 72 | ||
| 73 | /* get existing empty one */ | |
| 74 | for(n = &h->zen[i]; n != NULL; n = n->next) | |
| 75 | if(n->key == NULL) | |
| 76 | return n; | |
| 77 | ||
| 78 | /* overflowing, new one! */ | |
| 79 | n = pmalloco(h->p, sizeof(_xhn)); | |
| 80 | n->next = h->zen[i].next; | |
| 81 | h->zen[i].next = n; | |
| 82 | return n; | |
| 83 | } | |
| 84 | ||
| 85 | ||
| 86 | xhn _xhash_node_get(xht h, const char *key, int index) | |
| 87 | { | |
| 88 | xhn n; | |
| 89 | int i = index % h->prime; | |
| 90 | for(n = &h->zen[i]; n != NULL; n = n->next) | |
| 91 | if(j_strcmp(key, n->key) == 0) | |
| 92 | return n; | |
| 93 | return NULL; | |
| 94 | } | |
| 95 | ||
| 96 | ||
| 97 | xht xhash_new(int prime) | |
| 98 | { | |
| 99 | xht xnew; | |
| 100 | pool p; | |
| 101 | ||
| 102 | /* log_debug(ZONE,"creating new hash table of size %d",prime); */ | |
| 103 | ||
| 104 | p = pool_heap(sizeof(_xhn)*prime + sizeof(_xht)); | |
| 105 | xnew = pmalloco(p, sizeof(_xht)); | |
| 106 | xnew->prime = prime; | |
| 107 | xnew->p = p; | |
| 108 | xnew->zen = pmalloco(p, sizeof(_xhn)*prime); /* array of xhn size of prime */ | |
| 109 | return xnew; | |
| 110 | } | |
| 111 | ||
| 112 | ||
| 113 | void xhash_put(xht h, const char *key, void *val) | |
| 114 | { | |
| 115 | int index; | |
| 116 | xhn n; | |
| 117 | ||
| 118 | if(h == NULL || key == NULL) | |
| 119 | return; | |
| 120 | ||
| 121 | index = _xhasher(key); | |
| 122 | ||
| 123 | /* if existing key, replace it */ | |
| 124 | if((n = _xhash_node_get(h, key, index)) != NULL) | |
| 125 | { | |
| 126 | /* log_debug(ZONE,"replacing %s with new val %X",key,val); */ | |
| 127 | ||
| 128 | n->key = key; | |
| 129 | n->val = val; | |
| 130 | return; | |
| 131 | } | |
| 132 | ||
| 133 | /* log_debug(ZONE,"saving %s val %X",key,val); */ | |
| 134 | ||
| 135 | /* new node */ | |
| 136 | n = _xhash_node_new(h, index); | |
| 137 | n->key = key; | |
| 138 | n->val = val; | |
| 139 | } | |
| 140 | ||
| 141 | ||
| 142 | void *xhash_get(xht h, const char *key) | |
| 143 | { | |
| 144 | xhn n; | |
| 145 | ||
| 146 | if(h == NULL || key == NULL || (n = _xhash_node_get(h, key, _xhasher(key))) == NULL) | |
| 147 | { | |
| 148 | /* log_debug(ZONE,"failed lookup of %s",key); */ | |
| 149 | return NULL; | |
| 150 | } | |
| 151 | ||
| 152 | /* log_debug(ZONE,"found %s returning %X",key,n->val); */ | |
| 153 | return n->val; | |
| 154 | } | |
| 155 | ||
| 156 | ||
| 157 | void xhash_zap(xht h, const char *key) | |
| 158 | { | |
| 159 | xhn n; | |
| 160 | ||
| 161 | if(h == NULL || key == NULL || (n = _xhash_node_get(h, key, _xhasher(key))) == NULL) | |
| 162 | return; | |
| 163 | ||
| 164 | /* log_debug(ZONE,"zapping %s",key); */ | |
| 165 | ||
| 166 | /* kill an entry by zeroing out the key */ | |
| 167 | n->key = NULL; | |
| 168 | } | |
| 169 | ||
| 170 | ||
| 171 | void xhash_free(xht h) | |
| 172 | { | |
| 173 | /* log_debug(ZONE,"hash free %X",h); */ | |
| 174 | ||
| 175 | if(h != NULL) | |
| 176 | pool_free(h->p); | |
| 177 | } | |
| 178 | ||
| 179 | void xhash_walk(xht h, xhash_walker w, void *arg) | |
| 180 | { | |
| 181 | int i; | |
| 182 | xhn n; | |
| 183 | ||
| 184 | if(h == NULL || w == NULL) | |
| 185 | return; | |
| 186 | ||
| 187 | /* log_debug(ZONE,"walking %X",h); */ | |
| 188 | ||
| 189 | for(i = 0; i < h->prime; i++) | |
| 190 | for(n = &h->zen[i]; n != NULL; n = n->next) | |
| 191 | if(n->key != NULL && n->val != NULL) | |
| 192 | (*w)(h, n->key, n->val, arg); | |
| 193 | } | |
| 194 |