| Index: third_party/re2/util/hash.cc
|
| diff --git a/third_party/re2/util/hash.cc b/third_party/re2/util/hash.cc
|
| deleted file mode 100644
|
| index dfef7b7c364d0d81f3f8de633f141d1757b63d9e..0000000000000000000000000000000000000000
|
| --- a/third_party/re2/util/hash.cc
|
| +++ /dev/null
|
| @@ -1,231 +0,0 @@
|
| -// Modified by Russ Cox to add "namespace re2".
|
| -// Also threw away all but hashword and hashword2.
|
| -// http://burtleburtle.net/bob/c/lookup3.c
|
| -
|
| -/*
|
| --------------------------------------------------------------------------------
|
| -lookup3.c, by Bob Jenkins, May 2006, Public Domain.
|
| -
|
| -These are functions for producing 32-bit hashes for hash table lookup.
|
| -hashword(), hashlittle(), hashlittle2(), hashbig(), mix(), and final()
|
| -are externally useful functions. Routines to test the hash are included
|
| -if SELF_TEST is defined. You can use this free for any purpose. It's in
|
| -the public domain. It has no warranty.
|
| -
|
| -You probably want to use hashlittle(). hashlittle() and hashbig()
|
| -hash byte arrays. hashlittle() is is faster than hashbig() on
|
| -little-endian machines. Intel and AMD are little-endian machines.
|
| -On second thought, you probably want hashlittle2(), which is identical to
|
| -hashlittle() except it returns two 32-bit hashes for the price of one.
|
| -You could implement hashbig2() if you wanted but I haven't bothered here.
|
| -
|
| -If you want to find a hash of, say, exactly 7 integers, do
|
| - a = i1; b = i2; c = i3;
|
| - mix(a,b,c);
|
| - a += i4; b += i5; c += i6;
|
| - mix(a,b,c);
|
| - a += i7;
|
| - final(a,b,c);
|
| -then use c as the hash value. If you have a variable length array of
|
| -4-byte integers to hash, use hashword(). If you have a byte array (like
|
| -a character string), use hashlittle(). If you have several byte arrays, or
|
| -a mix of things, see the comments above hashlittle().
|
| -
|
| -Why is this so big? I read 12 bytes at a time into 3 4-byte integers,
|
| -then mix those integers. This is fast (you can do a lot more thorough
|
| -mixing with 12*3 instructions on 3 integers than you can with 3 instructions
|
| -on 1 byte), but shoehorning those bytes into integers efficiently is messy.
|
| --------------------------------------------------------------------------------
|
| -*/
|
| -
|
| -#include "util/util.h"
|
| -
|
| -#define rot(x,k) (((x)<<(k)) | ((x)>>(32-(k))))
|
| -
|
| -/*
|
| --------------------------------------------------------------------------------
|
| -mix -- mix 3 32-bit values reversibly.
|
| -
|
| -This is reversible, so any information in (a,b,c) before mix() is
|
| -still in (a,b,c) after mix().
|
| -
|
| -If four pairs of (a,b,c) inputs are run through mix(), or through
|
| -mix() in reverse, there are at least 32 bits of the output that
|
| -are sometimes the same for one pair and different for another pair.
|
| -This was tested for:
|
| -* pairs that differed by one bit, by two bits, in any combination
|
| - of top bits of (a,b,c), or in any combination of bottom bits of
|
| - (a,b,c).
|
| -* "differ" is defined as +, -, ^, or ~^. For + and -, I transformed
|
| - the output delta to a Gray code (a^(a>>1)) so a string of 1's (as
|
| - is commonly produced by subtraction) look like a single 1-bit
|
| - difference.
|
| -* the base values were pseudorandom, all zero but one bit set, or
|
| - all zero plus a counter that starts at zero.
|
| -
|
| -Some k values for my "a-=c; a^=rot(c,k); c+=b;" arrangement that
|
| -satisfy this are
|
| - 4 6 8 16 19 4
|
| - 9 15 3 18 27 15
|
| - 14 9 3 7 17 3
|
| -Well, "9 15 3 18 27 15" didn't quite get 32 bits diffing
|
| -for "differ" defined as + with a one-bit base and a two-bit delta. I
|
| -used http://burtleburtle.net/bob/hash/avalanche.html to choose
|
| -the operations, constants, and arrangements of the variables.
|
| -
|
| -This does not achieve avalanche. There are input bits of (a,b,c)
|
| -that fail to affect some output bits of (a,b,c), especially of a. The
|
| -most thoroughly mixed value is c, but it doesn't really even achieve
|
| -avalanche in c.
|
| -
|
| -This allows some parallelism. Read-after-writes are good at doubling
|
| -the number of bits affected, so the goal of mixing pulls in the opposite
|
| -direction as the goal of parallelism. I did what I could. Rotates
|
| -seem to cost as much as shifts on every machine I could lay my hands
|
| -on, and rotates are much kinder to the top and bottom bits, so I used
|
| -rotates.
|
| --------------------------------------------------------------------------------
|
| -*/
|
| -#define mix(a,b,c) \
|
| -{ \
|
| - a -= c; a ^= rot(c, 4); c += b; \
|
| - b -= a; b ^= rot(a, 6); a += c; \
|
| - c -= b; c ^= rot(b, 8); b += a; \
|
| - a -= c; a ^= rot(c,16); c += b; \
|
| - b -= a; b ^= rot(a,19); a += c; \
|
| - c -= b; c ^= rot(b, 4); b += a; \
|
| -}
|
| -
|
| -/*
|
| --------------------------------------------------------------------------------
|
| -final -- final mixing of 3 32-bit values (a,b,c) into c
|
| -
|
| -Pairs of (a,b,c) values differing in only a few bits will usually
|
| -produce values of c that look totally different. This was tested for
|
| -* pairs that differed by one bit, by two bits, in any combination
|
| - of top bits of (a,b,c), or in any combination of bottom bits of
|
| - (a,b,c).
|
| -* "differ" is defined as +, -, ^, or ~^. For + and -, I transformed
|
| - the output delta to a Gray code (a^(a>>1)) so a string of 1's (as
|
| - is commonly produced by subtraction) look like a single 1-bit
|
| - difference.
|
| -* the base values were pseudorandom, all zero but one bit set, or
|
| - all zero plus a counter that starts at zero.
|
| -
|
| -These constants passed:
|
| - 14 11 25 16 4 14 24
|
| - 12 14 25 16 4 14 24
|
| -and these came close:
|
| - 4 8 15 26 3 22 24
|
| - 10 8 15 26 3 22 24
|
| - 11 8 15 26 3 22 24
|
| --------------------------------------------------------------------------------
|
| -*/
|
| -#define final(a,b,c) \
|
| -{ \
|
| - c ^= b; c -= rot(b,14); \
|
| - a ^= c; a -= rot(c,11); \
|
| - b ^= a; b -= rot(a,25); \
|
| - c ^= b; c -= rot(b,16); \
|
| - a ^= c; a -= rot(c,4); \
|
| - b ^= a; b -= rot(a,14); \
|
| - c ^= b; c -= rot(b,24); \
|
| -}
|
| -
|
| -namespace re2 {
|
| -
|
| -/*
|
| ---------------------------------------------------------------------
|
| - This works on all machines. To be useful, it requires
|
| - -- that the key be an array of uint32_t's, and
|
| - -- that the length be the number of uint32_t's in the key
|
| -
|
| - The function hashword() is identical to hashlittle() on little-endian
|
| - machines, and identical to hashbig() on big-endian machines,
|
| - except that the length has to be measured in uint32_ts rather than in
|
| - bytes. hashlittle() is more complicated than hashword() only because
|
| - hashlittle() has to dance around fitting the key bytes into registers.
|
| ---------------------------------------------------------------------
|
| -*/
|
| -uint32 hashword(
|
| -const uint32 *k, /* the key, an array of uint32_t values */
|
| -size_t length, /* the length of the key, in uint32_ts */
|
| -uint32 initval) /* the previous hash, or an arbitrary value */
|
| -{
|
| - uint32_t a,b,c;
|
| -
|
| - /* Set up the internal state */
|
| - a = b = c = 0xdeadbeef + (((uint32_t)length)<<2) + initval;
|
| -
|
| - /*------------------------------------------------- handle most of the key */
|
| - while (length > 3)
|
| - {
|
| - a += k[0];
|
| - b += k[1];
|
| - c += k[2];
|
| - mix(a,b,c);
|
| - length -= 3;
|
| - k += 3;
|
| - }
|
| -
|
| - /*------------------------------------------- handle the last 3 uint32_t's */
|
| - switch(length) /* all the case statements fall through */
|
| - {
|
| - case 3 : c+=k[2];
|
| - case 2 : b+=k[1];
|
| - case 1 : a+=k[0];
|
| - final(a,b,c);
|
| - case 0: /* case 0: nothing left to add */
|
| - break;
|
| - }
|
| - /*------------------------------------------------------ report the result */
|
| - return c;
|
| -}
|
| -
|
| -
|
| -/*
|
| ---------------------------------------------------------------------
|
| -hashword2() -- same as hashword(), but take two seeds and return two
|
| -32-bit values. pc and pb must both be nonnull, and *pc and *pb must
|
| -both be initialized with seeds. If you pass in (*pb)==0, the output
|
| -(*pc) will be the same as the return value from hashword().
|
| ---------------------------------------------------------------------
|
| -*/
|
| -void hashword2 (
|
| -const uint32 *k, /* the key, an array of uint32_t values */
|
| -size_t length, /* the length of the key, in uint32_ts */
|
| -uint32 *pc, /* IN: seed OUT: primary hash value */
|
| -uint32 *pb) /* IN: more seed OUT: secondary hash value */
|
| -{
|
| - uint32_t a,b,c;
|
| -
|
| - /* Set up the internal state */
|
| - a = b = c = 0xdeadbeef + ((uint32_t)(length<<2)) + *pc;
|
| - c += *pb;
|
| -
|
| - /*------------------------------------------------- handle most of the key */
|
| - while (length > 3)
|
| - {
|
| - a += k[0];
|
| - b += k[1];
|
| - c += k[2];
|
| - mix(a,b,c);
|
| - length -= 3;
|
| - k += 3;
|
| - }
|
| -
|
| - /*------------------------------------------- handle the last 3 uint32_t's */
|
| - switch(length) /* all the case statements fall through */
|
| - {
|
| - case 3 : c+=k[2];
|
| - case 2 : b+=k[1];
|
| - case 1 : a+=k[0];
|
| - final(a,b,c);
|
| - case 0: /* case 0: nothing left to add */
|
| - break;
|
| - }
|
| - /*------------------------------------------------------ report the result */
|
| - *pc=c; *pb=b;
|
| -}
|
| -
|
| -} // namespace re2
|
|
|