Annotation of embedaddon/trafshow/lookupa.c, revision 1.1.1.1

1.1       misho       1: /*
                      2: --------------------------------------------------------------------
                      3: lookupa.c, by Bob Jenkins, December 1996.  Same as lookup2.c
                      4: Use this code however you wish.  Public Domain.  No warranty.
                      5: Source is http://burtleburtle.net/bob/c/lookupa.c
                      6: --------------------------------------------------------------------
                      7: */
                      8: #ifndef STANDARD
                      9: #include "standard.h"
                     10: #endif
                     11: #ifndef LOOKUPA
                     12: #include "lookupa.h"
                     13: #endif
                     14: 
                     15: /*
                     16: --------------------------------------------------------------------
                     17: mix -- mix 3 32-bit values reversibly.
                     18: For every delta with one or two bit set, and the deltas of all three
                     19:   high bits or all three low bits, whether the original value of a,b,c
                     20:   is almost all zero or is uniformly distributed,
                     21: * If mix() is run forward or backward, at least 32 bits in a,b,c
                     22:   have at least 1/4 probability of changing.
                     23: * If mix() is run forward, every bit of c will change between 1/3 and
                     24:   2/3 of the time.  (Well, 22/100 and 78/100 for some 2-bit deltas.)
                     25: mix() was built out of 36 single-cycle latency instructions in a 
                     26:   structure that could supported 2x parallelism, like so:
                     27:       a -= b; 
                     28:       a -= c; x = (c>>13);
                     29:       b -= c; a ^= x;
                     30:       b -= a; x = (a<<8);
                     31:       c -= a; b ^= x;
                     32:       c -= b; x = (b>>13);
                     33:       ...
                     34:   Unfortunately, superscalar Pentiums and Sparcs can't take advantage 
                     35:   of that parallelism.  They've also turned some of those single-cycle
                     36:   latency instructions into multi-cycle latency instructions.  Still,
                     37:   this is the fastest good hash I could find.  There were about 2^^68
                     38:   to choose from.  I only looked at a billion or so.
                     39: --------------------------------------------------------------------
                     40: */
                     41: #define mix(a,b,c) \
                     42: { \
                     43:   a -= b; a -= c; a ^= (c>>13); \
                     44:   b -= c; b -= a; b ^= (a<<8); \
                     45:   c -= a; c -= b; c ^= (b>>13); \
                     46:   a -= b; a -= c; a ^= (c>>12);  \
                     47:   b -= c; b -= a; b ^= (a<<16); \
                     48:   c -= a; c -= b; c ^= (b>>5); \
                     49:   a -= b; a -= c; a ^= (c>>3);  \
                     50:   b -= c; b -= a; b ^= (a<<10); \
                     51:   c -= a; c -= b; c ^= (b>>15); \
                     52: }
                     53: 
                     54: /*
                     55: --------------------------------------------------------------------
                     56: lookup() -- hash a variable-length key into a 32-bit value
                     57:   k     : the key (the unaligned variable-length array of bytes)
                     58:   len   : the length of the key, counting by bytes
                     59:   level : can be any 4-byte value
                     60: Returns a 32-bit value.  Every bit of the key affects every bit of
                     61: the return value.  Every 1-bit and 2-bit delta achieves avalanche.
                     62: About 6len+35 instructions.
                     63: 
                     64: The best hash table sizes are powers of 2.  There is no need to do
                     65: mod a prime (mod is sooo slow!).  If you need less than 32 bits,
                     66: use a bitmask.  For example, if you need only 10 bits, do
                     67:   h = (h & hashmask(10));
                     68: In which case, the hash table should have hashsize(10) elements.
                     69: 
                     70: If you are hashing n strings (ub1 **)k, do it like this:
                     71:   for (i=0, h=0; i<n; ++i) h = lookup( k[i], len[i], h);
                     72: 
                     73: By Bob Jenkins, 1996.  bob_jenkins@burtleburtle.net.  You may use this
                     74: code any way you wish, private, educational, or commercial.
                     75: 
                     76: See http://burtleburtle.net/bob/hash/evahash.html
                     77: Use for hash table lookup, or anything where one collision in 2^32 is
                     78: acceptable.  Do NOT use for cryptographic purposes.
                     79: --------------------------------------------------------------------
                     80: */
                     81: 
                     82: ub4 lookup( k, length, level)
                     83: register ub1 *k;        /* the key */
                     84: register ub4  length;   /* the length of the key */
                     85: register ub4  level;    /* the previous hash, or an arbitrary value */
                     86: {
                     87:    register ub4 a,b,c,len;
                     88: 
                     89:    /* Set up the internal state */
                     90:    len = length;
                     91:    a = b = 0x9e3779b9;  /* the golden ratio; an arbitrary value */
                     92:    c = level;           /* the previous hash value */
                     93: 
                     94:    /*---------------------------------------- handle most of the key */
                     95:    while (len >= 12)
                     96:    {
                     97:       a += (k[0] +((ub4)k[1]<<8) +((ub4)k[2]<<16) +((ub4)k[3]<<24));
                     98:       b += (k[4] +((ub4)k[5]<<8) +((ub4)k[6]<<16) +((ub4)k[7]<<24));
                     99:       c += (k[8] +((ub4)k[9]<<8) +((ub4)k[10]<<16)+((ub4)k[11]<<24));
                    100:       mix(a,b,c);
                    101:       k += 12; len -= 12;
                    102:    }
                    103: 
                    104:    /*------------------------------------- handle the last 11 bytes */
                    105:    c += length;
                    106:    switch(len)              /* all the case statements fall through */
                    107:    {
                    108:    case 11: c+=((ub4)k[10]<<24);
                    109:    case 10: c+=((ub4)k[9]<<16);
                    110:    case 9 : c+=((ub4)k[8]<<8);
                    111:       /* the first byte of c is reserved for the length */
                    112:    case 8 : b+=((ub4)k[7]<<24);
                    113:    case 7 : b+=((ub4)k[6]<<16);
                    114:    case 6 : b+=((ub4)k[5]<<8);
                    115:    case 5 : b+=k[4];
                    116:    case 4 : a+=((ub4)k[3]<<24);
                    117:    case 3 : a+=((ub4)k[2]<<16);
                    118:    case 2 : a+=((ub4)k[1]<<8);
                    119:    case 1 : a+=k[0];
                    120:      /* case 0: nothing left to add */
                    121:    }
                    122:    mix(a,b,c);
                    123:    /*-------------------------------------------- report the result */
                    124:    return c;
                    125: }
                    126: 
                    127: 
                    128: /*
                    129: --------------------------------------------------------------------
                    130: mixc -- mixc 8 4-bit values as quickly and thoroughly as possible.
                    131: Repeating mix() three times achieves avalanche.
                    132: Repeating mix() four times eliminates all funnels and all
                    133:   characteristics stronger than 2^{-11}.
                    134: --------------------------------------------------------------------
                    135: */
                    136: #define mixc(a,b,c,d,e,f,g,h) \
                    137: { \
                    138:    a^=b<<11; d+=a; b+=c; \
                    139:    b^=c>>2;  e+=b; c+=d; \
                    140:    c^=d<<8;  f+=c; d+=e; \
                    141:    d^=e>>16; g+=d; e+=f; \
                    142:    e^=f<<10; h+=e; f+=g; \
                    143:    f^=g>>4;  a+=f; g+=h; \
                    144:    g^=h<<8;  b+=g; h+=a; \
                    145:    h^=a>>9;  c+=h; a+=b; \
                    146: }
                    147: 
                    148: /*
                    149: --------------------------------------------------------------------
                    150: checksum() -- hash a variable-length key into a 256-bit value
                    151:   k     : the key (the unaligned variable-length array of bytes)
                    152:   len   : the length of the key, counting by bytes
                    153:   state : an array of CHECKSTATE 4-byte values (256 bits)
                    154: The state is the checksum.  Every bit of the key affects every bit of
                    155: the state.  There are no funnels.  About 112+6.875len instructions.
                    156: 
                    157: If you are hashing n strings (ub1 **)k, do it like this:
                    158:   for (i=0; i<8; ++i) state[i] = 0x9e3779b9;
                    159:   for (i=0, h=0; i<n; ++i) checksum( k[i], len[i], state);
                    160: 
                    161: (c) Bob Jenkins, 1996.  bob_jenkins@burtleburtle.net.  You may use this
                    162: code any way you wish, private, educational, or commercial, as long
                    163: as this whole comment accompanies it.
                    164: 
                    165: See http://burtleburtle.net/bob/hash/evahash.html
                    166: Use to detect changes between revisions of documents, assuming nobody
                    167: is trying to cause collisions.  Do NOT use for cryptography.
                    168: --------------------------------------------------------------------
                    169: */
                    170: void  checksum( k, len, state)
                    171: register ub1 *k;
                    172: register ub4  len;
                    173: register ub4 *state;
                    174: {
                    175:    register ub4 a,b,c,d,e,f,g,h,length;
                    176: 
                    177:    /* Use the length and level; add in the golden ratio. */
                    178:    length = len;
                    179:    a=state[0]; b=state[1]; c=state[2]; d=state[3];
                    180:    e=state[4]; f=state[5]; g=state[6]; h=state[7];
                    181: 
                    182:    /*---------------------------------------- handle most of the key */
                    183:    while (len >= 32)
                    184:    {
                    185:       a += (k[0] +(k[1]<<8) +(k[2]<<16) +(k[3]<<24));
                    186:       b += (k[4] +(k[5]<<8) +(k[6]<<16) +(k[7]<<24));
                    187:       c += (k[8] +(k[9]<<8) +(k[10]<<16)+(k[11]<<24));
                    188:       d += (k[12]+(k[13]<<8)+(k[14]<<16)+(k[15]<<24));
                    189:       e += (k[16]+(k[17]<<8)+(k[18]<<16)+(k[19]<<24));
                    190:       f += (k[20]+(k[21]<<8)+(k[22]<<16)+(k[23]<<24));
                    191:       g += (k[24]+(k[25]<<8)+(k[26]<<16)+(k[27]<<24));
                    192:       h += (k[28]+(k[29]<<8)+(k[30]<<16)+(k[31]<<24));
                    193:       mixc(a,b,c,d,e,f,g,h);
                    194:       mixc(a,b,c,d,e,f,g,h);
                    195:       mixc(a,b,c,d,e,f,g,h);
                    196:       mixc(a,b,c,d,e,f,g,h);
                    197:       k += 32; len -= 32;
                    198:    }
                    199: 
                    200:    /*------------------------------------- handle the last 31 bytes */
                    201:    h += length;
                    202:    switch(len)
                    203:    {
                    204:    case 31: h+=(k[30]<<24);
                    205:    case 30: h+=(k[29]<<16);
                    206:    case 29: h+=(k[28]<<8);
                    207:    case 28: g+=(k[27]<<24);
                    208:    case 27: g+=(k[26]<<16);
                    209:    case 26: g+=(k[25]<<8);
                    210:    case 25: g+=k[24];
                    211:    case 24: f+=(k[23]<<24);
                    212:    case 23: f+=(k[22]<<16);
                    213:    case 22: f+=(k[21]<<8);
                    214:    case 21: f+=k[20];
                    215:    case 20: e+=(k[19]<<24);
                    216:    case 19: e+=(k[18]<<16);
                    217:    case 18: e+=(k[17]<<8);
                    218:    case 17: e+=k[16];
                    219:    case 16: d+=(k[15]<<24);
                    220:    case 15: d+=(k[14]<<16);
                    221:    case 14: d+=(k[13]<<8);
                    222:    case 13: d+=k[12];
                    223:    case 12: c+=(k[11]<<24);
                    224:    case 11: c+=(k[10]<<16);
                    225:    case 10: c+=(k[9]<<8);
                    226:    case 9 : c+=k[8];
                    227:    case 8 : b+=(k[7]<<24);
                    228:    case 7 : b+=(k[6]<<16);
                    229:    case 6 : b+=(k[5]<<8);
                    230:    case 5 : b+=k[4];
                    231:    case 4 : a+=(k[3]<<24);
                    232:    case 3 : a+=(k[2]<<16);
                    233:    case 2 : a+=(k[1]<<8);
                    234:    case 1 : a+=k[0];
                    235:    }
                    236:    mixc(a,b,c,d,e,f,g,h);
                    237:    mixc(a,b,c,d,e,f,g,h);
                    238:    mixc(a,b,c,d,e,f,g,h);
                    239:    mixc(a,b,c,d,e,f,g,h);
                    240: 
                    241:    /*-------------------------------------------- report the result */
                    242:    state[0]=a; state[1]=b; state[2]=c; state[3]=d;
                    243:    state[4]=e; state[5]=f; state[6]=g; state[7]=h;
                    244: }

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>