1 .\" $OpenBSD: ohash_init.3,v 1.14 2007/05/31 19:19:30 jmc Exp $
2 .\" Copyright (c) 1999 Marc Espie <espie@openbsd.org>
4 .\" Permission to use, copy, modify, and distribute this software for any
5 .\" purpose with or without fee is hereby granted, provided that the above
6 .\" copyright notice and this permission notice appear in all copies.
8 .\" THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 .\" WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 .\" MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 .\" ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 .\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 .\" ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 .\" OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
16 .Dd $Mdocdate: May 31 2007 $
22 .Nm ohash_lookup_interval ,
23 .Nm ohash_lookup_memory ,
30 .Nd light-weight open hashing
32 .Fd #include <stdint.h>
33 .Fd #include <stddef.h>
34 .Fd #include <ohash.h>
36 .Fn ohash_init "struct ohash *h" "unsigned int size" "struct ohash_info *info"
38 .Fn ohash_delete "struct ohash *h"
40 .Fn ohash_lookup_interval "struct ohash *h" "const char *start" "const char *end" "uint32_t hv"
42 .Fn ohash_lookup_memory "struct ohash *h" "const char *k" "size_t s" "uint32_t hv"
44 .Fn ohash_find "struct ohash *h" "unsigned int i"
46 .Fn ohash_remove "struct ohash *h" "unsigned int i"
48 .Fn ohash_insert "struct ohash *h" "unsigned int i" "void *p"
50 .Fn ohash_first "struct ohash *h" "unsigned int *i"
52 .Fn ohash_next "struct ohash *h" "unsigned int *i"
54 .Fn ohash_entries "struct ohash *h"
56 These functions have been designed as a fast, extensible alternative to
57 the usual hash table functions.
58 They provide storage and retrieval of records indexed by keys,
59 where a key is a contiguous sequence of bytes at a fixed position in
61 Keys can either be NUL-terminated strings or fixed-size memory areas.
62 All functions take a pointer to an ohash structure as the
65 Storage for this structure should be provided by user code.
68 initializes the table to store roughly 2 to the power
72 holds the position of the key in each record, and two pointers to
76 functions, to use for managing the table internal storage.
79 frees storage internal to
81 Elements themselves should be freed by the user first, using for instance
86 .Fn ohash_lookup_interval
88 .Fn ohash_lookup_memory
89 are the basic look-up element functions.
90 The hashing function result is provided by the user as
101 This slot is only valid up to the next call to
106 .Fn ohash_lookup_interval
107 handles string-like keys.
108 .Fn ohash_lookup_interval
109 assumes the key is the interval between
114 though the actual elements stored in the table should only contain
117 .Fn ohash_lookup_memory
118 assumes the key is the memory area starting at
122 All bytes are significant in key comparison.
125 retrieves an element from a slot
132 if the slot is empty.
135 inserts a new element
141 must be empty and element
143 must have a key corresponding to the
148 removes the element at slot
150 It returns the removed element, for user code to dispose of, or
152 if the slot was empty.
157 can be used to access all elements in an ohash table, like this:
158 .Bd -literal -offset indent
159 for (n = ohash_first(h, &i); n != NULL; n = ohash_next(h, &i))
160 do_something_with(n);
164 points to an auxiliary unsigned integer used to record the current position
166 Those functions are safe to use even while entries are added to/removed
167 from the table, but in such a case they don't guarantee that new entries
169 As a special case, they can safely be used to free elements in the table.
172 returns the number of elements in the hash table.
180 may call the user-supplied memory functions.
181 It is the responsibility of the user memory allocation code to verify
182 that those calls did not fail.
184 If memory allocation fails,
186 returns a useless hash table.
190 still perform the requested operation, but the returned table should be
191 considered read-only.
192 It can still be accessed by
198 to dump relevant information to disk before aborting.
200 The open hashing functions are not thread-safe by design.
201 In particular, in a threaded environment, there is no guarantee that a
203 will not move between a
212 Multi-threaded applications should explicitly protect ohash table access.
217 .%B The Art of Computer Programming
223 Those functions are completely non-standard and should be avoided in
226 Those functions were designed and written for
229 by Marc Espie in 1999.