1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125
|
/*
* Copyright (c) 2008, 2009, 2010, 2012 Nicira, Inc.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at:
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
#include <config.h>
#include "jhash.h"
#include <string.h>
#include "unaligned.h"
/* This is the public domain lookup3 hash by Bob Jenkins from
* http://burtleburtle.net/bob/c/lookup3.c, modified for style. */
static inline uint32_t
jhash_rot(uint32_t x, int k)
{
return (x << k) | (x >> (32 - k));
}
static inline void
jhash_mix(uint32_t *a, uint32_t *b, uint32_t *c)
{
*a -= *c; *a ^= jhash_rot(*c, 4); *c += *b;
*b -= *a; *b ^= jhash_rot(*a, 6); *a += *c;
*c -= *b; *c ^= jhash_rot(*b, 8); *b += *a;
*a -= *c; *a ^= jhash_rot(*c, 16); *c += *b;
*b -= *a; *b ^= jhash_rot(*a, 19); *a += *c;
*c -= *b; *c ^= jhash_rot(*b, 4); *b += *a;
}
static inline void
jhash_final(uint32_t *a, uint32_t *b, uint32_t *c)
{
*c ^= *b; *c -= jhash_rot(*b, 14);
*a ^= *c; *a -= jhash_rot(*c, 11);
*b ^= *a; *b -= jhash_rot(*a, 25);
*c ^= *b; *c -= jhash_rot(*b, 16);
*a ^= *c; *a -= jhash_rot(*c, 4);
*b ^= *a; *b -= jhash_rot(*a, 14);
*c ^= *b; *c -= jhash_rot(*b, 24);
}
/* Returns the Jenkins hash of the 'n' 32-bit words at 'p', starting from
* 'basis'. 'p' must be properly aligned.
*
* Use hash_words() instead, unless you're computing a hash function whose
* value is exposed "on the wire" so we don't want to change it. */
uint32_t
jhash_words(const uint32_t *p, size_t n, uint32_t basis)
{
uint32_t a, b, c;
a = b = c = 0xdeadbeef + (((uint32_t) n) << 2) + basis;
while (n > 3) {
a += p[0];
b += p[1];
c += p[2];
jhash_mix(&a, &b, &c);
n -= 3;
p += 3;
}
switch (n) {
case 3:
c += p[2];
/* fall through */
case 2:
b += p[1];
/* fall through */
case 1:
a += p[0];
jhash_final(&a, &b, &c);
/* fall through */
case 0:
break;
}
return c;
}
/* Returns the Jenkins hash of the 'n' bytes at 'p', starting from 'basis'.
*
* Use hash_bytes() instead, unless you're computing a hash function whose
* value is exposed "on the wire" so we don't want to change it. */
uint32_t
jhash_bytes(const void *p_, size_t n, uint32_t basis)
{
const uint32_t *p = p_;
uint32_t a, b, c;
a = b = c = 0xdeadbeef + n + basis;
while (n >= 12) {
a += get_unaligned_u32(p);
b += get_unaligned_u32(p + 1);
c += get_unaligned_u32(p + 2);
jhash_mix(&a, &b, &c);
n -= 12;
p += 3;
}
if (n) {
uint32_t tmp[3];
tmp[0] = tmp[1] = tmp[2] = 0;
memcpy(tmp, p, n);
a += tmp[0];
b += tmp[1];
c += tmp[2];
jhash_final(&a, &b, &c);
}
return c;
}
|