mirror of
https://gitlab.gnome.org/GNOME/glib.git
synced 2024-11-10 03:16:17 +01:00
c9cd385b17
There is no reason for key and value to have different annotations. Both may return NULL as a valid value. gpointer typed parameters are nullable by convention, so there is no change here. The (nullable) annotation is just for humans really.
2686 lines
81 KiB
C
2686 lines
81 KiB
C
/* GLIB - Library of useful routines for C programming
|
|
* Copyright (C) 1995-1997 Peter Mattis, Spencer Kimball and Josh MacDonald
|
|
*
|
|
* SPDX-License-Identifier: LGPL-2.1-or-later
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
/*
|
|
* Modified by the GLib Team and others 1997-2000. See the AUTHORS
|
|
* file for a list of people on the GLib Team. See the ChangeLog
|
|
* files for a list of changes. These files are distributed with
|
|
* GLib at ftp://ftp.gtk.org/pub/gtk/.
|
|
*/
|
|
|
|
/*
|
|
* MT safe
|
|
*/
|
|
|
|
#include "config.h"
|
|
|
|
#include <string.h> /* memset */
|
|
|
|
#include "ghash.h"
|
|
#include "gmacros.h"
|
|
#include "glib-private.h"
|
|
#include "gstrfuncs.h"
|
|
#include "gatomic.h"
|
|
#include "gtestutils.h"
|
|
#include "gslice.h"
|
|
#include "grefcount.h"
|
|
#include "gvalgrind.h"
|
|
|
|
/* The following #pragma is here so we can do this...
|
|
*
|
|
* #ifndef USE_SMALL_ARRAYS
|
|
* is_big = TRUE;
|
|
* #endif
|
|
* return is_big ? *(((gpointer *) a) + index) : GUINT_TO_POINTER (*(((guint *) a) + index));
|
|
*
|
|
* ...instead of this...
|
|
*
|
|
* #ifndef USE_SMALL_ARRAYS
|
|
* return *(((gpointer *) a) + index);
|
|
* #else
|
|
* return is_big ? *(((gpointer *) a) + index) : GUINT_TO_POINTER (*(((guint *) a) + index));
|
|
* #endif
|
|
*
|
|
* ...and still compile successfully when -Werror=duplicated-branches is passed. */
|
|
|
|
#if defined(__GNUC__) && __GNUC__ > 6
|
|
#pragma GCC diagnostic ignored "-Wduplicated-branches"
|
|
#endif
|
|
|
|
/**
|
|
* GHashTable:
|
|
*
|
|
* The #GHashTable struct is an opaque data structure to represent a
|
|
* [Hash Table][glib-Hash-Tables]. It should only be accessed via the
|
|
* following functions.
|
|
*/
|
|
|
|
/**
|
|
* GHashFunc:
|
|
* @key: a key
|
|
*
|
|
* Specifies the type of the hash function which is passed to
|
|
* g_hash_table_new() when a #GHashTable is created.
|
|
*
|
|
* The function is passed a key and should return a #guint hash value.
|
|
* The functions g_direct_hash(), g_int_hash() and g_str_hash() provide
|
|
* hash functions which can be used when the key is a #gpointer, #gint*,
|
|
* and #gchar* respectively.
|
|
*
|
|
* g_direct_hash() is also the appropriate hash function for keys
|
|
* of the form `GINT_TO_POINTER (n)` (or similar macros).
|
|
*
|
|
* A good hash functions should produce
|
|
* hash values that are evenly distributed over a fairly large range.
|
|
* The modulus is taken with the hash table size (a prime number) to
|
|
* find the 'bucket' to place each key into. The function should also
|
|
* be very fast, since it is called for each key lookup.
|
|
*
|
|
* Note that the hash functions provided by GLib have these qualities,
|
|
* but are not particularly robust against manufactured keys that
|
|
* cause hash collisions. Therefore, you should consider choosing
|
|
* a more secure hash function when using a GHashTable with keys
|
|
* that originate in untrusted data (such as HTTP requests).
|
|
* Using g_str_hash() in that situation might make your application
|
|
* vulnerable to
|
|
* [Algorithmic Complexity Attacks](https://lwn.net/Articles/474912/).
|
|
*
|
|
* The key to choosing a good hash is unpredictability. Even
|
|
* cryptographic hashes are very easy to find collisions for when the
|
|
* remainder is taken modulo a somewhat predictable prime number. There
|
|
* must be an element of randomness that an attacker is unable to guess.
|
|
*
|
|
* Returns: the hash value corresponding to the key
|
|
*/
|
|
|
|
/**
|
|
* GHFunc:
|
|
* @key: a key
|
|
* @value: the value corresponding to the key
|
|
* @user_data: user data passed to g_hash_table_foreach()
|
|
*
|
|
* Specifies the type of the function passed to g_hash_table_foreach().
|
|
* It is called with each key/value pair, together with the @user_data
|
|
* parameter which is passed to g_hash_table_foreach().
|
|
*/
|
|
|
|
/**
|
|
* GHRFunc:
|
|
* @key: a key
|
|
* @value: the value associated with the key
|
|
* @user_data: user data passed to g_hash_table_remove()
|
|
*
|
|
* Specifies the type of the function passed to
|
|
* g_hash_table_foreach_remove(). It is called with each key/value
|
|
* pair, together with the @user_data parameter passed to
|
|
* g_hash_table_foreach_remove(). It should return %TRUE if the
|
|
* key/value pair should be removed from the #GHashTable.
|
|
*
|
|
* Returns: %TRUE if the key/value pair should be removed from the
|
|
* #GHashTable
|
|
*/
|
|
|
|
/**
|
|
* GEqualFunc:
|
|
* @a: a value
|
|
* @b: a value to compare with
|
|
*
|
|
* Specifies the type of a function used to test two values for
|
|
* equality. The function should return %TRUE if both values are equal
|
|
* and %FALSE otherwise.
|
|
*
|
|
* Returns: %TRUE if @a = @b; %FALSE otherwise
|
|
*/
|
|
|
|
/**
|
|
* GHashTableIter:
|
|
*
|
|
* A GHashTableIter structure represents an iterator that can be used
|
|
* to iterate over the elements of a #GHashTable. GHashTableIter
|
|
* structures are typically allocated on the stack and then initialized
|
|
* with g_hash_table_iter_init().
|
|
*
|
|
* The iteration order of a #GHashTableIter over the keys/values in a hash
|
|
* table is not defined.
|
|
*/
|
|
|
|
/**
|
|
* g_hash_table_freeze:
|
|
* @hash_table: a #GHashTable
|
|
*
|
|
* This function is deprecated and will be removed in the next major
|
|
* release of GLib. It does nothing.
|
|
*/
|
|
|
|
/**
|
|
* g_hash_table_thaw:
|
|
* @hash_table: a #GHashTable
|
|
*
|
|
* This function is deprecated and will be removed in the next major
|
|
* release of GLib. It does nothing.
|
|
*/
|
|
|
|
#define HASH_TABLE_MIN_SHIFT 3 /* 1 << 3 == 8 buckets */
|
|
|
|
#define UNUSED_HASH_VALUE 0
|
|
#define TOMBSTONE_HASH_VALUE 1
|
|
#define HASH_IS_UNUSED(h_) ((h_) == UNUSED_HASH_VALUE)
|
|
#define HASH_IS_TOMBSTONE(h_) ((h_) == TOMBSTONE_HASH_VALUE)
|
|
#define HASH_IS_REAL(h_) ((h_) >= 2)
|
|
|
|
/* If int is smaller than void * on our arch, we start out with
|
|
* int-sized keys and values and resize to pointer-sized entries as
|
|
* needed. This saves a good amount of memory when the HT is being
|
|
* used with e.g. GUINT_TO_POINTER(). */
|
|
|
|
#define BIG_ENTRY_SIZE (SIZEOF_VOID_P)
|
|
#define SMALL_ENTRY_SIZE (SIZEOF_INT)
|
|
|
|
/* NB: The USE_SMALL_ARRAYS code assumes pointers are at most 8 bytes. */
|
|
#if SMALL_ENTRY_SIZE < BIG_ENTRY_SIZE && BIG_ENTRY_SIZE <= 8
|
|
# define USE_SMALL_ARRAYS
|
|
#endif
|
|
|
|
struct _GHashTable
|
|
{
|
|
gsize size;
|
|
gint mod;
|
|
guint mask;
|
|
guint nnodes;
|
|
guint noccupied; /* nnodes + tombstones */
|
|
|
|
guint have_big_keys : 1;
|
|
guint have_big_values : 1;
|
|
|
|
gpointer keys;
|
|
guint *hashes;
|
|
gpointer values;
|
|
|
|
GHashFunc hash_func;
|
|
GEqualFunc key_equal_func;
|
|
gatomicrefcount ref_count;
|
|
#ifndef G_DISABLE_ASSERT
|
|
/*
|
|
* Tracks the structure of the hash table, not its contents: is only
|
|
* incremented when a node is added or removed (is not incremented
|
|
* when the key or data of a node is modified).
|
|
*/
|
|
int version;
|
|
#endif
|
|
GDestroyNotify key_destroy_func;
|
|
GDestroyNotify value_destroy_func;
|
|
};
|
|
|
|
typedef struct
|
|
{
|
|
GHashTable *hash_table;
|
|
gpointer dummy1;
|
|
gpointer dummy2;
|
|
gint position;
|
|
gboolean dummy3;
|
|
gintptr version;
|
|
} RealIter;
|
|
|
|
G_STATIC_ASSERT (sizeof (GHashTableIter) == sizeof (RealIter));
|
|
G_STATIC_ASSERT (G_ALIGNOF (GHashTableIter) >= G_ALIGNOF (RealIter));
|
|
|
|
/* Each table size has an associated prime modulo (the first prime
|
|
* lower than the table size) used to find the initial bucket. Probing
|
|
* then works modulo 2^n. The prime modulo is necessary to get a
|
|
* good distribution with poor hash functions.
|
|
*/
|
|
static const gint prime_mod [] =
|
|
{
|
|
1, /* For 1 << 0 */
|
|
2,
|
|
3,
|
|
7,
|
|
13,
|
|
31,
|
|
61,
|
|
127,
|
|
251,
|
|
509,
|
|
1021,
|
|
2039,
|
|
4093,
|
|
8191,
|
|
16381,
|
|
32749,
|
|
65521, /* For 1 << 16 */
|
|
131071,
|
|
262139,
|
|
524287,
|
|
1048573,
|
|
2097143,
|
|
4194301,
|
|
8388593,
|
|
16777213,
|
|
33554393,
|
|
67108859,
|
|
134217689,
|
|
268435399,
|
|
536870909,
|
|
1073741789,
|
|
2147483647 /* For 1 << 31 */
|
|
};
|
|
|
|
static void
|
|
g_hash_table_set_shift (GHashTable *hash_table, gint shift)
|
|
{
|
|
hash_table->size = 1 << shift;
|
|
hash_table->mod = prime_mod [shift];
|
|
|
|
/* hash_table->size is always a power of two, so we can calculate the mask
|
|
* by simply subtracting 1 from it. The leading assertion ensures that
|
|
* we're really dealing with a power of two. */
|
|
|
|
g_assert ((hash_table->size & (hash_table->size - 1)) == 0);
|
|
hash_table->mask = hash_table->size - 1;
|
|
}
|
|
|
|
static gint
|
|
g_hash_table_find_closest_shift (gint n)
|
|
{
|
|
gint i;
|
|
|
|
for (i = 0; n; i++)
|
|
n >>= 1;
|
|
|
|
return i;
|
|
}
|
|
|
|
static void
|
|
g_hash_table_set_shift_from_size (GHashTable *hash_table, gint size)
|
|
{
|
|
gint shift;
|
|
|
|
shift = g_hash_table_find_closest_shift (size);
|
|
shift = MAX (shift, HASH_TABLE_MIN_SHIFT);
|
|
|
|
g_hash_table_set_shift (hash_table, shift);
|
|
}
|
|
|
|
static inline gpointer
|
|
g_hash_table_realloc_key_or_value_array (gpointer a, guint size, G_GNUC_UNUSED gboolean is_big)
|
|
{
|
|
#ifdef USE_SMALL_ARRAYS
|
|
return g_realloc (a, size * (is_big ? BIG_ENTRY_SIZE : SMALL_ENTRY_SIZE));
|
|
#else
|
|
return g_renew (gpointer, a, size);
|
|
#endif
|
|
}
|
|
|
|
static inline gpointer
|
|
g_hash_table_fetch_key_or_value (gpointer a, guint index, gboolean is_big)
|
|
{
|
|
#ifndef USE_SMALL_ARRAYS
|
|
is_big = TRUE;
|
|
#endif
|
|
return is_big ? *(((gpointer *) a) + index) : GUINT_TO_POINTER (*(((guint *) a) + index));
|
|
}
|
|
|
|
static inline void
|
|
g_hash_table_assign_key_or_value (gpointer a, guint index, gboolean is_big, gpointer v)
|
|
{
|
|
#ifndef USE_SMALL_ARRAYS
|
|
is_big = TRUE;
|
|
#endif
|
|
if (is_big)
|
|
*(((gpointer *) a) + index) = v;
|
|
else
|
|
*(((guint *) a) + index) = GPOINTER_TO_UINT (v);
|
|
}
|
|
|
|
static inline gpointer
|
|
g_hash_table_evict_key_or_value (gpointer a, guint index, gboolean is_big, gpointer v)
|
|
{
|
|
#ifndef USE_SMALL_ARRAYS
|
|
is_big = TRUE;
|
|
#endif
|
|
if (is_big)
|
|
{
|
|
gpointer r = *(((gpointer *) a) + index);
|
|
*(((gpointer *) a) + index) = v;
|
|
return r;
|
|
}
|
|
else
|
|
{
|
|
gpointer r = GUINT_TO_POINTER (*(((guint *) a) + index));
|
|
*(((guint *) a) + index) = GPOINTER_TO_UINT (v);
|
|
return r;
|
|
}
|
|
}
|
|
|
|
static inline guint
|
|
g_hash_table_hash_to_index (GHashTable *hash_table, guint hash)
|
|
{
|
|
/* Multiply the hash by a small prime before applying the modulo. This
|
|
* prevents the table from becoming densely packed, even with a poor hash
|
|
* function. A densely packed table would have poor performance on
|
|
* workloads with many failed lookups or a high degree of churn. */
|
|
return (hash * 11) % hash_table->mod;
|
|
}
|
|
|
|
/*
|
|
* g_hash_table_lookup_node:
|
|
* @hash_table: our #GHashTable
|
|
* @key: the key to look up against
|
|
* @hash_return: key hash return location
|
|
*
|
|
* Performs a lookup in the hash table, preserving extra information
|
|
* usually needed for insertion.
|
|
*
|
|
* This function first computes the hash value of the key using the
|
|
* user's hash function.
|
|
*
|
|
* If an entry in the table matching @key is found then this function
|
|
* returns the index of that entry in the table, and if not, the
|
|
* index of an unused node (empty or tombstone) where the key can be
|
|
* inserted.
|
|
*
|
|
* The computed hash value is returned in the variable pointed to
|
|
* by @hash_return. This is to save insertions from having to compute
|
|
* the hash record again for the new record.
|
|
*
|
|
* Returns: index of the described node
|
|
*/
|
|
static inline guint
|
|
g_hash_table_lookup_node (GHashTable *hash_table,
|
|
gconstpointer key,
|
|
guint *hash_return)
|
|
{
|
|
guint node_index;
|
|
guint node_hash;
|
|
guint hash_value;
|
|
guint first_tombstone = 0;
|
|
gboolean have_tombstone = FALSE;
|
|
guint step = 0;
|
|
|
|
hash_value = hash_table->hash_func (key);
|
|
if (G_UNLIKELY (!HASH_IS_REAL (hash_value)))
|
|
hash_value = 2;
|
|
|
|
*hash_return = hash_value;
|
|
|
|
node_index = g_hash_table_hash_to_index (hash_table, hash_value);
|
|
node_hash = hash_table->hashes[node_index];
|
|
|
|
while (!HASH_IS_UNUSED (node_hash))
|
|
{
|
|
/* We first check if our full hash values
|
|
* are equal so we can avoid calling the full-blown
|
|
* key equality function in most cases.
|
|
*/
|
|
if (node_hash == hash_value)
|
|
{
|
|
gpointer node_key = g_hash_table_fetch_key_or_value (hash_table->keys, node_index, hash_table->have_big_keys);
|
|
|
|
if (hash_table->key_equal_func)
|
|
{
|
|
if (hash_table->key_equal_func (node_key, key))
|
|
return node_index;
|
|
}
|
|
else if (node_key == key)
|
|
{
|
|
return node_index;
|
|
}
|
|
}
|
|
else if (HASH_IS_TOMBSTONE (node_hash) && !have_tombstone)
|
|
{
|
|
first_tombstone = node_index;
|
|
have_tombstone = TRUE;
|
|
}
|
|
|
|
step++;
|
|
node_index += step;
|
|
node_index &= hash_table->mask;
|
|
node_hash = hash_table->hashes[node_index];
|
|
}
|
|
|
|
if (have_tombstone)
|
|
return first_tombstone;
|
|
|
|
return node_index;
|
|
}
|
|
|
|
/*
|
|
* g_hash_table_remove_node:
|
|
* @hash_table: our #GHashTable
|
|
* @node: pointer to node to remove
|
|
* @notify: %TRUE if the destroy notify handlers are to be called
|
|
*
|
|
* Removes a node from the hash table and updates the node count.
|
|
* The node is replaced by a tombstone. No table resize is performed.
|
|
*
|
|
* If @notify is %TRUE then the destroy notify functions are called
|
|
* for the key and value of the hash node.
|
|
*/
|
|
static void
|
|
g_hash_table_remove_node (GHashTable *hash_table,
|
|
gint i,
|
|
gboolean notify)
|
|
{
|
|
gpointer key;
|
|
gpointer value;
|
|
|
|
key = g_hash_table_fetch_key_or_value (hash_table->keys, i, hash_table->have_big_keys);
|
|
value = g_hash_table_fetch_key_or_value (hash_table->values, i, hash_table->have_big_values);
|
|
|
|
/* Erect tombstone */
|
|
hash_table->hashes[i] = TOMBSTONE_HASH_VALUE;
|
|
|
|
/* Be GC friendly */
|
|
g_hash_table_assign_key_or_value (hash_table->keys, i, hash_table->have_big_keys, NULL);
|
|
g_hash_table_assign_key_or_value (hash_table->values, i, hash_table->have_big_values, NULL);
|
|
|
|
g_assert (hash_table->nnodes > 0);
|
|
hash_table->nnodes--;
|
|
|
|
if (notify && hash_table->key_destroy_func)
|
|
hash_table->key_destroy_func (key);
|
|
|
|
if (notify && hash_table->value_destroy_func)
|
|
hash_table->value_destroy_func (value);
|
|
|
|
}
|
|
|
|
/*
|
|
* g_hash_table_setup_storage:
|
|
* @hash_table: our #GHashTable
|
|
*
|
|
* Initialise the hash table size, mask, mod, and arrays.
|
|
*/
|
|
static void
|
|
g_hash_table_setup_storage (GHashTable *hash_table)
|
|
{
|
|
gboolean small = FALSE;
|
|
|
|
/* We want to use small arrays only if:
|
|
* - we are running on a system where that makes sense (64 bit); and
|
|
* - we are not running under valgrind.
|
|
*/
|
|
|
|
#ifdef USE_SMALL_ARRAYS
|
|
small = TRUE;
|
|
|
|
# ifdef ENABLE_VALGRIND
|
|
if (RUNNING_ON_VALGRIND)
|
|
small = FALSE;
|
|
# endif
|
|
#endif
|
|
|
|
g_hash_table_set_shift (hash_table, HASH_TABLE_MIN_SHIFT);
|
|
|
|
hash_table->have_big_keys = !small;
|
|
hash_table->have_big_values = !small;
|
|
|
|
hash_table->keys = g_hash_table_realloc_key_or_value_array (NULL, hash_table->size, hash_table->have_big_keys);
|
|
hash_table->values = hash_table->keys;
|
|
hash_table->hashes = g_new0 (guint, hash_table->size);
|
|
}
|
|
|
|
/*
|
|
* g_hash_table_remove_all_nodes:
|
|
* @hash_table: our #GHashTable
|
|
* @notify: %TRUE if the destroy notify handlers are to be called
|
|
*
|
|
* Removes all nodes from the table.
|
|
*
|
|
* If @notify is %TRUE then the destroy notify functions are called
|
|
* for the key and value of the hash node.
|
|
*
|
|
* Since this may be a precursor to freeing the table entirely, we'd
|
|
* ideally perform no resize, and we can indeed avoid that in some
|
|
* cases. However: in the case that we'll be making callbacks to user
|
|
* code (via destroy notifies) we need to consider that the user code
|
|
* might call back into the table again. In this case, we setup a new
|
|
* set of arrays so that any callers will see an empty (but valid)
|
|
* table.
|
|
*/
|
|
static void
|
|
g_hash_table_remove_all_nodes (GHashTable *hash_table,
|
|
gboolean notify,
|
|
gboolean destruction)
|
|
{
|
|
int i;
|
|
gpointer key;
|
|
gpointer value;
|
|
gint old_size;
|
|
gpointer *old_keys;
|
|
gpointer *old_values;
|
|
guint *old_hashes;
|
|
gboolean old_have_big_keys;
|
|
gboolean old_have_big_values;
|
|
|
|
/* If the hash table is already empty, there is nothing to be done. */
|
|
if (hash_table->nnodes == 0)
|
|
return;
|
|
|
|
hash_table->nnodes = 0;
|
|
hash_table->noccupied = 0;
|
|
|
|
/* Easy case: no callbacks, so we just zero out the arrays */
|
|
if (!notify ||
|
|
(hash_table->key_destroy_func == NULL &&
|
|
hash_table->value_destroy_func == NULL))
|
|
{
|
|
if (!destruction)
|
|
{
|
|
memset (hash_table->hashes, 0, hash_table->size * sizeof (guint));
|
|
|
|
#ifdef USE_SMALL_ARRAYS
|
|
memset (hash_table->keys, 0, hash_table->size * (hash_table->have_big_keys ? BIG_ENTRY_SIZE : SMALL_ENTRY_SIZE));
|
|
memset (hash_table->values, 0, hash_table->size * (hash_table->have_big_values ? BIG_ENTRY_SIZE : SMALL_ENTRY_SIZE));
|
|
#else
|
|
memset (hash_table->keys, 0, hash_table->size * sizeof (gpointer));
|
|
memset (hash_table->values, 0, hash_table->size * sizeof (gpointer));
|
|
#endif
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
/* Hard case: we need to do user callbacks. There are two
|
|
* possibilities here:
|
|
*
|
|
* 1) there are no outstanding references on the table and therefore
|
|
* nobody should be calling into it again (destroying == true)
|
|
*
|
|
* 2) there are outstanding references, and there may be future
|
|
* calls into the table, either after we return, or from the destroy
|
|
* notifies that we're about to do (destroying == false)
|
|
*
|
|
* We handle both cases by taking the current state of the table into
|
|
* local variables and replacing it with something else: in the "no
|
|
* outstanding references" cases we replace it with a bunch of
|
|
* null/zero values so that any access to the table will fail. In the
|
|
* "may receive future calls" case, we reinitialise the struct to
|
|
* appear like a newly-created empty table.
|
|
*
|
|
* In both cases, we take over the references for the current state,
|
|
* freeing them below.
|
|
*/
|
|
old_size = hash_table->size;
|
|
old_have_big_keys = hash_table->have_big_keys;
|
|
old_have_big_values = hash_table->have_big_values;
|
|
old_keys = g_steal_pointer (&hash_table->keys);
|
|
old_values = g_steal_pointer (&hash_table->values);
|
|
old_hashes = g_steal_pointer (&hash_table->hashes);
|
|
|
|
if (!destruction)
|
|
/* Any accesses will see an empty table */
|
|
g_hash_table_setup_storage (hash_table);
|
|
else
|
|
/* Will cause a quick crash on any attempted access */
|
|
hash_table->size = hash_table->mod = hash_table->mask = 0;
|
|
|
|
/* Now do the actual destroy notifies */
|
|
for (i = 0; i < old_size; i++)
|
|
{
|
|
if (HASH_IS_REAL (old_hashes[i]))
|
|
{
|
|
key = g_hash_table_fetch_key_or_value (old_keys, i, old_have_big_keys);
|
|
value = g_hash_table_fetch_key_or_value (old_values, i, old_have_big_values);
|
|
|
|
old_hashes[i] = UNUSED_HASH_VALUE;
|
|
|
|
g_hash_table_assign_key_or_value (old_keys, i, old_have_big_keys, NULL);
|
|
g_hash_table_assign_key_or_value (old_values, i, old_have_big_values, NULL);
|
|
|
|
if (hash_table->key_destroy_func != NULL)
|
|
hash_table->key_destroy_func (key);
|
|
|
|
if (hash_table->value_destroy_func != NULL)
|
|
hash_table->value_destroy_func (value);
|
|
}
|
|
}
|
|
|
|
/* Destroy old storage space. */
|
|
if (old_keys != old_values)
|
|
g_free (old_values);
|
|
|
|
g_free (old_keys);
|
|
g_free (old_hashes);
|
|
}
|
|
|
|
static void
|
|
realloc_arrays (GHashTable *hash_table, gboolean is_a_set)
|
|
{
|
|
hash_table->hashes = g_renew (guint, hash_table->hashes, hash_table->size);
|
|
hash_table->keys = g_hash_table_realloc_key_or_value_array (hash_table->keys, hash_table->size, hash_table->have_big_keys);
|
|
|
|
if (is_a_set)
|
|
hash_table->values = hash_table->keys;
|
|
else
|
|
hash_table->values = g_hash_table_realloc_key_or_value_array (hash_table->values, hash_table->size, hash_table->have_big_values);
|
|
}
|
|
|
|
/* When resizing the table in place, we use a temporary bit array to keep
|
|
* track of which entries have been assigned a proper location in the new
|
|
* table layout.
|
|
*
|
|
* Each bit corresponds to a bucket. A bit is set if an entry was assigned
|
|
* its corresponding location during the resize and thus should not be
|
|
* evicted. The array starts out cleared to zero. */
|
|
|
|
static inline gboolean
|
|
get_status_bit (const guint32 *bitmap, guint index)
|
|
{
|
|
return (bitmap[index / 32] >> (index % 32)) & 1;
|
|
}
|
|
|
|
static inline void
|
|
set_status_bit (guint32 *bitmap, guint index)
|
|
{
|
|
bitmap[index / 32] |= 1U << (index % 32);
|
|
}
|
|
|
|
/* By calling dedicated resize functions for sets and maps, we avoid 2x
|
|
* test-and-branch per key in the inner loop. This yields a small
|
|
* performance improvement at the cost of a bit of macro gunk. */
|
|
|
|
#define DEFINE_RESIZE_FUNC(fname) \
|
|
static void fname (GHashTable *hash_table, guint old_size, guint32 *reallocated_buckets_bitmap) \
|
|
{ \
|
|
guint i; \
|
|
\
|
|
for (i = 0; i < old_size; i++) \
|
|
{ \
|
|
guint node_hash = hash_table->hashes[i]; \
|
|
gpointer key, value G_GNUC_UNUSED; \
|
|
\
|
|
if (!HASH_IS_REAL (node_hash)) \
|
|
{ \
|
|
/* Clear tombstones */ \
|
|
hash_table->hashes[i] = UNUSED_HASH_VALUE; \
|
|
continue; \
|
|
} \
|
|
\
|
|
/* Skip entries relocated through eviction */ \
|
|
if (get_status_bit (reallocated_buckets_bitmap, i)) \
|
|
continue; \
|
|
\
|
|
hash_table->hashes[i] = UNUSED_HASH_VALUE; \
|
|
EVICT_KEYVAL (hash_table, i, NULL, NULL, key, value); \
|
|
\
|
|
for (;;) \
|
|
{ \
|
|
guint hash_val; \
|
|
guint replaced_hash; \
|
|
guint step = 0; \
|
|
\
|
|
hash_val = g_hash_table_hash_to_index (hash_table, node_hash); \
|
|
\
|
|
while (get_status_bit (reallocated_buckets_bitmap, hash_val)) \
|
|
{ \
|
|
step++; \
|
|
hash_val += step; \
|
|
hash_val &= hash_table->mask; \
|
|
} \
|
|
\
|
|
set_status_bit (reallocated_buckets_bitmap, hash_val); \
|
|
\
|
|
replaced_hash = hash_table->hashes[hash_val]; \
|
|
hash_table->hashes[hash_val] = node_hash; \
|
|
if (!HASH_IS_REAL (replaced_hash)) \
|
|
{ \
|
|
ASSIGN_KEYVAL (hash_table, hash_val, key, value); \
|
|
break; \
|
|
} \
|
|
\
|
|
node_hash = replaced_hash; \
|
|
EVICT_KEYVAL (hash_table, hash_val, key, value, key, value); \
|
|
} \
|
|
} \
|
|
}
|
|
|
|
#define ASSIGN_KEYVAL(ht, index, key, value) G_STMT_START{ \
|
|
g_hash_table_assign_key_or_value ((ht)->keys, (index), (ht)->have_big_keys, (key)); \
|
|
g_hash_table_assign_key_or_value ((ht)->values, (index), (ht)->have_big_values, (value)); \
|
|
}G_STMT_END
|
|
|
|
#define EVICT_KEYVAL(ht, index, key, value, outkey, outvalue) G_STMT_START{ \
|
|
(outkey) = g_hash_table_evict_key_or_value ((ht)->keys, (index), (ht)->have_big_keys, (key)); \
|
|
(outvalue) = g_hash_table_evict_key_or_value ((ht)->values, (index), (ht)->have_big_values, (value)); \
|
|
}G_STMT_END
|
|
|
|
DEFINE_RESIZE_FUNC (resize_map)
|
|
|
|
#undef ASSIGN_KEYVAL
|
|
#undef EVICT_KEYVAL
|
|
|
|
#define ASSIGN_KEYVAL(ht, index, key, value) G_STMT_START{ \
|
|
g_hash_table_assign_key_or_value ((ht)->keys, (index), (ht)->have_big_keys, (key)); \
|
|
}G_STMT_END
|
|
|
|
#define EVICT_KEYVAL(ht, index, key, value, outkey, outvalue) G_STMT_START{ \
|
|
(outkey) = g_hash_table_evict_key_or_value ((ht)->keys, (index), (ht)->have_big_keys, (key)); \
|
|
}G_STMT_END
|
|
|
|
DEFINE_RESIZE_FUNC (resize_set)
|
|
|
|
#undef ASSIGN_KEYVAL
|
|
#undef EVICT_KEYVAL
|
|
|
|
/*
|
|
* g_hash_table_resize:
|
|
* @hash_table: our #GHashTable
|
|
*
|
|
* Resizes the hash table to the optimal size based on the number of
|
|
* nodes currently held. If you call this function then a resize will
|
|
* occur, even if one does not need to occur.
|
|
* Use g_hash_table_maybe_resize() instead.
|
|
*
|
|
* This function may "resize" the hash table to its current size, with
|
|
* the side effect of cleaning up tombstones and otherwise optimizing
|
|
* the probe sequences.
|
|
*/
|
|
static void
|
|
g_hash_table_resize (GHashTable *hash_table)
|
|
{
|
|
guint32 *reallocated_buckets_bitmap;
|
|
gsize old_size;
|
|
gboolean is_a_set;
|
|
|
|
old_size = hash_table->size;
|
|
is_a_set = hash_table->keys == hash_table->values;
|
|
|
|
/* The outer checks in g_hash_table_maybe_resize() will only consider
|
|
* cleanup/resize when the load factor goes below .25 (1/4, ignoring
|
|
* tombstones) or above .9375 (15/16, including tombstones).
|
|
*
|
|
* Once this happens, tombstones will always be cleaned out. If our
|
|
* load sans tombstones is greater than .75 (1/1.333, see below), we'll
|
|
* take this opportunity to grow the table too.
|
|
*
|
|
* Immediately after growing, the load factor will be in the range
|
|
* .375 .. .469. After shrinking, it will be exactly .5. */
|
|
|
|
g_hash_table_set_shift_from_size (hash_table, hash_table->nnodes * 1.333);
|
|
|
|
if (hash_table->size > old_size)
|
|
{
|
|
realloc_arrays (hash_table, is_a_set);
|
|
memset (&hash_table->hashes[old_size], 0, (hash_table->size - old_size) * sizeof (guint));
|
|
|
|
reallocated_buckets_bitmap = g_new0 (guint32, (hash_table->size + 31) / 32);
|
|
}
|
|
else
|
|
{
|
|
reallocated_buckets_bitmap = g_new0 (guint32, (old_size + 31) / 32);
|
|
}
|
|
|
|
if (is_a_set)
|
|
resize_set (hash_table, old_size, reallocated_buckets_bitmap);
|
|
else
|
|
resize_map (hash_table, old_size, reallocated_buckets_bitmap);
|
|
|
|
g_free (reallocated_buckets_bitmap);
|
|
|
|
if (hash_table->size < old_size)
|
|
realloc_arrays (hash_table, is_a_set);
|
|
|
|
hash_table->noccupied = hash_table->nnodes;
|
|
}
|
|
|
|
/*
|
|
* g_hash_table_maybe_resize:
|
|
* @hash_table: our #GHashTable
|
|
*
|
|
* Resizes the hash table, if needed.
|
|
*
|
|
* Essentially, calls g_hash_table_resize() if the table has strayed
|
|
* too far from its ideal size for its number of nodes.
|
|
*/
|
|
static inline void
|
|
g_hash_table_maybe_resize (GHashTable *hash_table)
|
|
{
|
|
gsize noccupied = hash_table->noccupied;
|
|
gsize size = hash_table->size;
|
|
|
|
if ((size > hash_table->nnodes * 4 && size > 1 << HASH_TABLE_MIN_SHIFT) ||
|
|
(size <= noccupied + (noccupied / 16)))
|
|
g_hash_table_resize (hash_table);
|
|
}
|
|
|
|
#ifdef USE_SMALL_ARRAYS
|
|
|
|
static inline gboolean
|
|
entry_is_big (gpointer v)
|
|
{
|
|
return (((guintptr) v) >> ((BIG_ENTRY_SIZE - SMALL_ENTRY_SIZE) * 8)) != 0;
|
|
}
|
|
|
|
static inline gboolean
|
|
g_hash_table_maybe_make_big_keys_or_values (gpointer *a_p, gpointer v, gint ht_size)
|
|
{
|
|
if (entry_is_big (v))
|
|
{
|
|
guint *a = (guint *) *a_p;
|
|
gpointer *a_new;
|
|
gint i;
|
|
|
|
a_new = g_new (gpointer, ht_size);
|
|
|
|
for (i = 0; i < ht_size; i++)
|
|
{
|
|
a_new[i] = GUINT_TO_POINTER (a[i]);
|
|
}
|
|
|
|
g_free (a);
|
|
*a_p = a_new;
|
|
return TRUE;
|
|
}
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
#endif
|
|
|
|
static inline void
|
|
g_hash_table_ensure_keyval_fits (GHashTable *hash_table, gpointer key, gpointer value)
|
|
{
|
|
gboolean is_a_set = (hash_table->keys == hash_table->values);
|
|
|
|
#ifdef USE_SMALL_ARRAYS
|
|
|
|
/* Convert from set to map? */
|
|
if (is_a_set)
|
|
{
|
|
if (hash_table->have_big_keys)
|
|
{
|
|
if (key != value)
|
|
hash_table->values = g_memdup2 (hash_table->keys, sizeof (gpointer) * hash_table->size);
|
|
/* Keys and values are both big now, so no need for further checks */
|
|
return;
|
|
}
|
|
else
|
|
{
|
|
if (key != value)
|
|
{
|
|
hash_table->values = g_memdup2 (hash_table->keys, sizeof (guint) * hash_table->size);
|
|
is_a_set = FALSE;
|
|
}
|
|
}
|
|
}
|
|
|
|
/* Make keys big? */
|
|
if (!hash_table->have_big_keys)
|
|
{
|
|
hash_table->have_big_keys = g_hash_table_maybe_make_big_keys_or_values (&hash_table->keys, key, hash_table->size);
|
|
|
|
if (is_a_set)
|
|
{
|
|
hash_table->values = hash_table->keys;
|
|
hash_table->have_big_values = hash_table->have_big_keys;
|
|
}
|
|
}
|
|
|
|
/* Make values big? */
|
|
if (!is_a_set && !hash_table->have_big_values)
|
|
{
|
|
hash_table->have_big_values = g_hash_table_maybe_make_big_keys_or_values (&hash_table->values, value, hash_table->size);
|
|
}
|
|
|
|
#else
|
|
|
|
/* Just split if necessary */
|
|
if (is_a_set && key != value)
|
|
hash_table->values = g_memdup2 (hash_table->keys, sizeof (gpointer) * hash_table->size);
|
|
|
|
#endif
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_new:
|
|
* @hash_func: a function to create a hash value from a key
|
|
* @key_equal_func: a function to check two keys for equality
|
|
*
|
|
* Creates a new #GHashTable with a reference count of 1.
|
|
*
|
|
* Hash values returned by @hash_func are used to determine where keys
|
|
* are stored within the #GHashTable data structure. The g_direct_hash(),
|
|
* g_int_hash(), g_int64_hash(), g_double_hash() and g_str_hash()
|
|
* functions are provided for some common types of keys.
|
|
* If @hash_func is %NULL, g_direct_hash() is used.
|
|
*
|
|
* @key_equal_func is used when looking up keys in the #GHashTable.
|
|
* The g_direct_equal(), g_int_equal(), g_int64_equal(), g_double_equal()
|
|
* and g_str_equal() functions are provided for the most common types
|
|
* of keys. If @key_equal_func is %NULL, keys are compared directly in
|
|
* a similar fashion to g_direct_equal(), but without the overhead of
|
|
* a function call. @key_equal_func is called with the key from the hash table
|
|
* as its first parameter, and the user-provided key to check against as
|
|
* its second.
|
|
*
|
|
* Returns: (transfer full): a new #GHashTable
|
|
*/
|
|
GHashTable *
|
|
g_hash_table_new (GHashFunc hash_func,
|
|
GEqualFunc key_equal_func)
|
|
{
|
|
return g_hash_table_new_full (hash_func, key_equal_func, NULL, NULL);
|
|
}
|
|
|
|
|
|
/**
|
|
* g_hash_table_new_full:
|
|
* @hash_func: a function to create a hash value from a key
|
|
* @key_equal_func: a function to check two keys for equality
|
|
* @key_destroy_func: (nullable): a function to free the memory allocated for the key
|
|
* used when removing the entry from the #GHashTable, or %NULL
|
|
* if you don't want to supply such a function.
|
|
* @value_destroy_func: (nullable): a function to free the memory allocated for the
|
|
* value used when removing the entry from the #GHashTable, or %NULL
|
|
* if you don't want to supply such a function.
|
|
*
|
|
* Creates a new #GHashTable like g_hash_table_new() with a reference
|
|
* count of 1 and allows to specify functions to free the memory
|
|
* allocated for the key and value that get called when removing the
|
|
* entry from the #GHashTable.
|
|
*
|
|
* Since version 2.42 it is permissible for destroy notify functions to
|
|
* recursively remove further items from the hash table. This is only
|
|
* permissible if the application still holds a reference to the hash table.
|
|
* This means that you may need to ensure that the hash table is empty by
|
|
* calling g_hash_table_remove_all() before releasing the last reference using
|
|
* g_hash_table_unref().
|
|
*
|
|
* Returns: (transfer full): a new #GHashTable
|
|
*/
|
|
GHashTable *
|
|
g_hash_table_new_full (GHashFunc hash_func,
|
|
GEqualFunc key_equal_func,
|
|
GDestroyNotify key_destroy_func,
|
|
GDestroyNotify value_destroy_func)
|
|
{
|
|
GHashTable *hash_table;
|
|
|
|
hash_table = g_slice_new (GHashTable);
|
|
g_atomic_ref_count_init (&hash_table->ref_count);
|
|
hash_table->nnodes = 0;
|
|
hash_table->noccupied = 0;
|
|
hash_table->hash_func = hash_func ? hash_func : g_direct_hash;
|
|
hash_table->key_equal_func = key_equal_func;
|
|
#ifndef G_DISABLE_ASSERT
|
|
hash_table->version = 0;
|
|
#endif
|
|
hash_table->key_destroy_func = key_destroy_func;
|
|
hash_table->value_destroy_func = value_destroy_func;
|
|
|
|
g_hash_table_setup_storage (hash_table);
|
|
|
|
return hash_table;
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_new_similar:
|
|
* @other_hash_table: (not nullable) (transfer none): Another #GHashTable
|
|
*
|
|
* Creates a new #GHashTable like g_hash_table_new_full() with a reference
|
|
* count of 1.
|
|
*
|
|
* It inherits the hash function, the key equal function, the key destroy function,
|
|
* as well as the value destroy function, from @other_hash_table.
|
|
*
|
|
* The returned hash table will be empty; it will not contain the keys
|
|
* or values from @other_hash_table.
|
|
*
|
|
* Returns: (transfer full) (not nullable): a new #GHashTable
|
|
* Since: 2.72
|
|
*/
|
|
GHashTable *
|
|
g_hash_table_new_similar (GHashTable *other_hash_table)
|
|
{
|
|
g_return_val_if_fail (other_hash_table, NULL);
|
|
|
|
return g_hash_table_new_full (other_hash_table->hash_func,
|
|
other_hash_table->key_equal_func,
|
|
other_hash_table->key_destroy_func,
|
|
other_hash_table->value_destroy_func);
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_iter_init:
|
|
* @iter: an uninitialized #GHashTableIter
|
|
* @hash_table: a #GHashTable
|
|
*
|
|
* Initializes a key/value pair iterator and associates it with
|
|
* @hash_table. Modifying the hash table after calling this function
|
|
* invalidates the returned iterator.
|
|
*
|
|
* The iteration order of a #GHashTableIter over the keys/values in a hash
|
|
* table is not defined.
|
|
*
|
|
* |[<!-- language="C" -->
|
|
* GHashTableIter iter;
|
|
* gpointer key, value;
|
|
*
|
|
* g_hash_table_iter_init (&iter, hash_table);
|
|
* while (g_hash_table_iter_next (&iter, &key, &value))
|
|
* {
|
|
* // do something with key and value
|
|
* }
|
|
* ]|
|
|
*
|
|
* Since: 2.16
|
|
*/
|
|
void
|
|
g_hash_table_iter_init (GHashTableIter *iter,
|
|
GHashTable *hash_table)
|
|
{
|
|
RealIter *ri = (RealIter *) iter;
|
|
|
|
g_return_if_fail (iter != NULL);
|
|
g_return_if_fail (hash_table != NULL);
|
|
|
|
ri->hash_table = hash_table;
|
|
ri->position = -1;
|
|
#ifndef G_DISABLE_ASSERT
|
|
ri->version = hash_table->version;
|
|
#endif
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_iter_next:
|
|
* @iter: an initialized #GHashTableIter
|
|
* @key: (out) (optional) (nullable): a location to store the key
|
|
* @value: (out) (optional) (nullable): a location to store the value
|
|
*
|
|
* Advances @iter and retrieves the key and/or value that are now
|
|
* pointed to as a result of this advancement. If %FALSE is returned,
|
|
* @key and @value are not set, and the iterator becomes invalid.
|
|
*
|
|
* Returns: %FALSE if the end of the #GHashTable has been reached.
|
|
*
|
|
* Since: 2.16
|
|
*/
|
|
gboolean
|
|
g_hash_table_iter_next (GHashTableIter *iter,
|
|
gpointer *key,
|
|
gpointer *value)
|
|
{
|
|
RealIter *ri = (RealIter *) iter;
|
|
gint position;
|
|
|
|
g_return_val_if_fail (iter != NULL, FALSE);
|
|
#ifndef G_DISABLE_ASSERT
|
|
g_return_val_if_fail (ri->version == ri->hash_table->version, FALSE);
|
|
#endif
|
|
g_return_val_if_fail (ri->position < (gssize) ri->hash_table->size, FALSE);
|
|
|
|
position = ri->position;
|
|
|
|
do
|
|
{
|
|
position++;
|
|
if (position >= (gssize) ri->hash_table->size)
|
|
{
|
|
ri->position = position;
|
|
return FALSE;
|
|
}
|
|
}
|
|
while (!HASH_IS_REAL (ri->hash_table->hashes[position]));
|
|
|
|
if (key != NULL)
|
|
*key = g_hash_table_fetch_key_or_value (ri->hash_table->keys, position, ri->hash_table->have_big_keys);
|
|
if (value != NULL)
|
|
*value = g_hash_table_fetch_key_or_value (ri->hash_table->values, position, ri->hash_table->have_big_values);
|
|
|
|
ri->position = position;
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_iter_get_hash_table:
|
|
* @iter: an initialized #GHashTableIter
|
|
*
|
|
* Returns the #GHashTable associated with @iter.
|
|
*
|
|
* Returns: (transfer none): the #GHashTable associated with @iter.
|
|
*
|
|
* Since: 2.16
|
|
*/
|
|
GHashTable *
|
|
g_hash_table_iter_get_hash_table (GHashTableIter *iter)
|
|
{
|
|
g_return_val_if_fail (iter != NULL, NULL);
|
|
|
|
return ((RealIter *) iter)->hash_table;
|
|
}
|
|
|
|
static void
|
|
iter_remove_or_steal (RealIter *ri, gboolean notify)
|
|
{
|
|
g_return_if_fail (ri != NULL);
|
|
#ifndef G_DISABLE_ASSERT
|
|
g_return_if_fail (ri->version == ri->hash_table->version);
|
|
#endif
|
|
g_return_if_fail (ri->position >= 0);
|
|
g_return_if_fail ((gsize) ri->position < ri->hash_table->size);
|
|
|
|
g_hash_table_remove_node (ri->hash_table, ri->position, notify);
|
|
|
|
#ifndef G_DISABLE_ASSERT
|
|
ri->version++;
|
|
ri->hash_table->version++;
|
|
#endif
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_iter_remove:
|
|
* @iter: an initialized #GHashTableIter
|
|
*
|
|
* Removes the key/value pair currently pointed to by the iterator
|
|
* from its associated #GHashTable. Can only be called after
|
|
* g_hash_table_iter_next() returned %TRUE, and cannot be called
|
|
* more than once for the same key/value pair.
|
|
*
|
|
* If the #GHashTable was created using g_hash_table_new_full(),
|
|
* the key and value are freed using the supplied destroy functions,
|
|
* otherwise you have to make sure that any dynamically allocated
|
|
* values are freed yourself.
|
|
*
|
|
* It is safe to continue iterating the #GHashTable afterward:
|
|
* |[<!-- language="C" -->
|
|
* while (g_hash_table_iter_next (&iter, &key, &value))
|
|
* {
|
|
* if (condition)
|
|
* g_hash_table_iter_remove (&iter);
|
|
* }
|
|
* ]|
|
|
*
|
|
* Since: 2.16
|
|
*/
|
|
void
|
|
g_hash_table_iter_remove (GHashTableIter *iter)
|
|
{
|
|
iter_remove_or_steal ((RealIter *) iter, TRUE);
|
|
}
|
|
|
|
/*
|
|
* g_hash_table_insert_node:
|
|
* @hash_table: our #GHashTable
|
|
* @node_index: pointer to node to insert/replace
|
|
* @key_hash: key hash
|
|
* @key: (nullable): key to replace with, or %NULL
|
|
* @value: value to replace with
|
|
* @keep_new_key: whether to replace the key in the node with @key
|
|
* @reusing_key: whether @key was taken out of the existing node
|
|
*
|
|
* Inserts a value at @node_index in the hash table and updates it.
|
|
*
|
|
* If @key has been taken out of the existing node (ie it is not
|
|
* passed in via a g_hash_table_insert/replace) call, then @reusing_key
|
|
* should be %TRUE.
|
|
*
|
|
* Returns: %TRUE if the key did not exist yet
|
|
*/
|
|
static gboolean
|
|
g_hash_table_insert_node (GHashTable *hash_table,
|
|
guint node_index,
|
|
guint key_hash,
|
|
gpointer new_key,
|
|
gpointer new_value,
|
|
gboolean keep_new_key,
|
|
gboolean reusing_key)
|
|
{
|
|
gboolean already_exists;
|
|
guint old_hash;
|
|
gpointer key_to_free = NULL;
|
|
gpointer key_to_keep = NULL;
|
|
gpointer value_to_free = NULL;
|
|
|
|
old_hash = hash_table->hashes[node_index];
|
|
already_exists = HASH_IS_REAL (old_hash);
|
|
|
|
/* Proceed in three steps. First, deal with the key because it is the
|
|
* most complicated. Then consider if we need to split the table in
|
|
* two (because writing the value will result in the set invariant
|
|
* becoming broken). Then deal with the value.
|
|
*
|
|
* There are three cases for the key:
|
|
*
|
|
* - entry already exists in table, reusing key:
|
|
* free the just-passed-in new_key and use the existing value
|
|
*
|
|
* - entry already exists in table, not reusing key:
|
|
* free the entry in the table, use the new key
|
|
*
|
|
* - entry not already in table:
|
|
* use the new key, free nothing
|
|
*
|
|
* We update the hash at the same time...
|
|
*/
|
|
if (already_exists)
|
|
{
|
|
/* Note: we must record the old value before writing the new key
|
|
* because we might change the value in the event that the two
|
|
* arrays are shared.
|
|
*/
|
|
value_to_free = g_hash_table_fetch_key_or_value (hash_table->values, node_index, hash_table->have_big_values);
|
|
|
|
if (keep_new_key)
|
|
{
|
|
key_to_free = g_hash_table_fetch_key_or_value (hash_table->keys, node_index, hash_table->have_big_keys);
|
|
key_to_keep = new_key;
|
|
}
|
|
else
|
|
{
|
|
key_to_free = new_key;
|
|
key_to_keep = g_hash_table_fetch_key_or_value (hash_table->keys, node_index, hash_table->have_big_keys);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
hash_table->hashes[node_index] = key_hash;
|
|
key_to_keep = new_key;
|
|
}
|
|
|
|
/* Resize key/value arrays and split table as necessary */
|
|
g_hash_table_ensure_keyval_fits (hash_table, key_to_keep, new_value);
|
|
g_hash_table_assign_key_or_value (hash_table->keys, node_index, hash_table->have_big_keys, key_to_keep);
|
|
|
|
/* Step 3: Actually do the write */
|
|
g_hash_table_assign_key_or_value (hash_table->values, node_index, hash_table->have_big_values, new_value);
|
|
|
|
/* Now, the bookkeeping... */
|
|
if (!already_exists)
|
|
{
|
|
hash_table->nnodes++;
|
|
|
|
if (HASH_IS_UNUSED (old_hash))
|
|
{
|
|
/* We replaced an empty node, and not a tombstone */
|
|
hash_table->noccupied++;
|
|
g_hash_table_maybe_resize (hash_table);
|
|
}
|
|
|
|
#ifndef G_DISABLE_ASSERT
|
|
hash_table->version++;
|
|
#endif
|
|
}
|
|
|
|
if (already_exists)
|
|
{
|
|
if (hash_table->key_destroy_func && !reusing_key)
|
|
(* hash_table->key_destroy_func) (key_to_free);
|
|
if (hash_table->value_destroy_func)
|
|
(* hash_table->value_destroy_func) (value_to_free);
|
|
}
|
|
|
|
return !already_exists;
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_iter_replace:
|
|
* @iter: an initialized #GHashTableIter
|
|
* @value: the value to replace with
|
|
*
|
|
* Replaces the value currently pointed to by the iterator
|
|
* from its associated #GHashTable. Can only be called after
|
|
* g_hash_table_iter_next() returned %TRUE.
|
|
*
|
|
* If you supplied a @value_destroy_func when creating the
|
|
* #GHashTable, the old value is freed using that function.
|
|
*
|
|
* Since: 2.30
|
|
*/
|
|
void
|
|
g_hash_table_iter_replace (GHashTableIter *iter,
|
|
gpointer value)
|
|
{
|
|
RealIter *ri;
|
|
guint node_hash;
|
|
gpointer key;
|
|
|
|
ri = (RealIter *) iter;
|
|
|
|
g_return_if_fail (ri != NULL);
|
|
#ifndef G_DISABLE_ASSERT
|
|
g_return_if_fail (ri->version == ri->hash_table->version);
|
|
#endif
|
|
g_return_if_fail (ri->position >= 0);
|
|
g_return_if_fail ((gsize) ri->position < ri->hash_table->size);
|
|
|
|
node_hash = ri->hash_table->hashes[ri->position];
|
|
|
|
key = g_hash_table_fetch_key_or_value (ri->hash_table->keys, ri->position, ri->hash_table->have_big_keys);
|
|
|
|
g_hash_table_insert_node (ri->hash_table, ri->position, node_hash, key, value, TRUE, TRUE);
|
|
|
|
#ifndef G_DISABLE_ASSERT
|
|
ri->version++;
|
|
ri->hash_table->version++;
|
|
#endif
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_iter_steal:
|
|
* @iter: an initialized #GHashTableIter
|
|
*
|
|
* Removes the key/value pair currently pointed to by the
|
|
* iterator from its associated #GHashTable, without calling
|
|
* the key and value destroy functions. Can only be called
|
|
* after g_hash_table_iter_next() returned %TRUE, and cannot
|
|
* be called more than once for the same key/value pair.
|
|
*
|
|
* Since: 2.16
|
|
*/
|
|
void
|
|
g_hash_table_iter_steal (GHashTableIter *iter)
|
|
{
|
|
iter_remove_or_steal ((RealIter *) iter, FALSE);
|
|
}
|
|
|
|
|
|
/**
|
|
* g_hash_table_ref:
|
|
* @hash_table: a valid #GHashTable
|
|
*
|
|
* Atomically increments the reference count of @hash_table by one.
|
|
* This function is MT-safe and may be called from any thread.
|
|
*
|
|
* Returns: (transfer full): the passed in #GHashTable
|
|
*
|
|
* Since: 2.10
|
|
*/
|
|
GHashTable *
|
|
g_hash_table_ref (GHashTable *hash_table)
|
|
{
|
|
g_return_val_if_fail (hash_table != NULL, NULL);
|
|
|
|
g_atomic_ref_count_inc (&hash_table->ref_count);
|
|
|
|
return hash_table;
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_unref:
|
|
* @hash_table: (transfer full): a valid #GHashTable
|
|
*
|
|
* Atomically decrements the reference count of @hash_table by one.
|
|
* If the reference count drops to 0, all keys and values will be
|
|
* destroyed, and all memory allocated by the hash table is released.
|
|
* This function is MT-safe and may be called from any thread.
|
|
*
|
|
* Since: 2.10
|
|
*/
|
|
void
|
|
g_hash_table_unref (GHashTable *hash_table)
|
|
{
|
|
g_return_if_fail (hash_table != NULL);
|
|
|
|
if (g_atomic_ref_count_dec (&hash_table->ref_count))
|
|
{
|
|
g_hash_table_remove_all_nodes (hash_table, TRUE, TRUE);
|
|
if (hash_table->keys != hash_table->values)
|
|
g_free (hash_table->values);
|
|
g_free (hash_table->keys);
|
|
g_free (hash_table->hashes);
|
|
g_slice_free (GHashTable, hash_table);
|
|
}
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_destroy:
|
|
* @hash_table: a #GHashTable
|
|
*
|
|
* Destroys all keys and values in the #GHashTable and decrements its
|
|
* reference count by 1. If keys and/or values are dynamically allocated,
|
|
* you should either free them first or create the #GHashTable with destroy
|
|
* notifiers using g_hash_table_new_full(). In the latter case the destroy
|
|
* functions you supplied will be called on all keys and values during the
|
|
* destruction phase.
|
|
*/
|
|
void
|
|
g_hash_table_destroy (GHashTable *hash_table)
|
|
{
|
|
g_return_if_fail (hash_table != NULL);
|
|
|
|
g_hash_table_remove_all (hash_table);
|
|
g_hash_table_unref (hash_table);
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_lookup:
|
|
* @hash_table: a #GHashTable
|
|
* @key: the key to look up
|
|
*
|
|
* Looks up a key in a #GHashTable. Note that this function cannot
|
|
* distinguish between a key that is not present and one which is present
|
|
* and has the value %NULL. If you need this distinction, use
|
|
* g_hash_table_lookup_extended().
|
|
*
|
|
* Returns: (nullable): the associated value, or %NULL if the key is not found
|
|
*/
|
|
gpointer
|
|
g_hash_table_lookup (GHashTable *hash_table,
|
|
gconstpointer key)
|
|
{
|
|
guint node_index;
|
|
guint node_hash;
|
|
|
|
g_return_val_if_fail (hash_table != NULL, NULL);
|
|
|
|
node_index = g_hash_table_lookup_node (hash_table, key, &node_hash);
|
|
|
|
return HASH_IS_REAL (hash_table->hashes[node_index])
|
|
? g_hash_table_fetch_key_or_value (hash_table->values, node_index, hash_table->have_big_values)
|
|
: NULL;
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_lookup_extended:
|
|
* @hash_table: a #GHashTable
|
|
* @lookup_key: the key to look up
|
|
* @orig_key: (out) (optional): return location for the original key
|
|
* @value: (out) (optional) (nullable): return location for the value associated
|
|
* with the key
|
|
*
|
|
* Looks up a key in the #GHashTable, returning the original key and the
|
|
* associated value and a #gboolean which is %TRUE if the key was found. This
|
|
* is useful if you need to free the memory allocated for the original key,
|
|
* for example before calling g_hash_table_remove().
|
|
*
|
|
* You can actually pass %NULL for @lookup_key to test
|
|
* whether the %NULL key exists, provided the hash and equal functions
|
|
* of @hash_table are %NULL-safe.
|
|
*
|
|
* Returns: %TRUE if the key was found in the #GHashTable
|
|
*/
|
|
gboolean
|
|
g_hash_table_lookup_extended (GHashTable *hash_table,
|
|
gconstpointer lookup_key,
|
|
gpointer *orig_key,
|
|
gpointer *value)
|
|
{
|
|
guint node_index;
|
|
guint node_hash;
|
|
|
|
g_return_val_if_fail (hash_table != NULL, FALSE);
|
|
|
|
node_index = g_hash_table_lookup_node (hash_table, lookup_key, &node_hash);
|
|
|
|
if (!HASH_IS_REAL (hash_table->hashes[node_index]))
|
|
{
|
|
if (orig_key != NULL)
|
|
*orig_key = NULL;
|
|
if (value != NULL)
|
|
*value = NULL;
|
|
|
|
return FALSE;
|
|
}
|
|
|
|
if (orig_key)
|
|
*orig_key = g_hash_table_fetch_key_or_value (hash_table->keys, node_index, hash_table->have_big_keys);
|
|
|
|
if (value)
|
|
*value = g_hash_table_fetch_key_or_value (hash_table->values, node_index, hash_table->have_big_values);
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/*
|
|
* g_hash_table_insert_internal:
|
|
* @hash_table: our #GHashTable
|
|
* @key: the key to insert
|
|
* @value: the value to insert
|
|
* @keep_new_key: if %TRUE and this key already exists in the table
|
|
* then call the destroy notify function on the old key. If %FALSE
|
|
* then call the destroy notify function on the new key.
|
|
*
|
|
* Implements the common logic for the g_hash_table_insert() and
|
|
* g_hash_table_replace() functions.
|
|
*
|
|
* Do a lookup of @key. If it is found, replace it with the new
|
|
* @value (and perhaps the new @key). If it is not found, create
|
|
* a new node.
|
|
*
|
|
* Returns: %TRUE if the key did not exist yet
|
|
*/
|
|
static gboolean
|
|
g_hash_table_insert_internal (GHashTable *hash_table,
|
|
gpointer key,
|
|
gpointer value,
|
|
gboolean keep_new_key)
|
|
{
|
|
guint key_hash;
|
|
guint node_index;
|
|
|
|
g_return_val_if_fail (hash_table != NULL, FALSE);
|
|
|
|
node_index = g_hash_table_lookup_node (hash_table, key, &key_hash);
|
|
|
|
return g_hash_table_insert_node (hash_table, node_index, key_hash, key, value, keep_new_key, FALSE);
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_insert:
|
|
* @hash_table: a #GHashTable
|
|
* @key: a key to insert
|
|
* @value: the value to associate with the key
|
|
*
|
|
* Inserts a new key and value into a #GHashTable.
|
|
*
|
|
* If the key already exists in the #GHashTable its current
|
|
* value is replaced with the new value. If you supplied a
|
|
* @value_destroy_func when creating the #GHashTable, the old
|
|
* value is freed using that function. If you supplied a
|
|
* @key_destroy_func when creating the #GHashTable, the passed
|
|
* key is freed using that function.
|
|
*
|
|
* Starting from GLib 2.40, this function returns a boolean value to
|
|
* indicate whether the newly added value was already in the hash table
|
|
* or not.
|
|
*
|
|
* Returns: %TRUE if the key did not exist yet
|
|
*/
|
|
gboolean
|
|
g_hash_table_insert (GHashTable *hash_table,
|
|
gpointer key,
|
|
gpointer value)
|
|
{
|
|
return g_hash_table_insert_internal (hash_table, key, value, FALSE);
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_replace:
|
|
* @hash_table: a #GHashTable
|
|
* @key: a key to insert
|
|
* @value: the value to associate with the key
|
|
*
|
|
* Inserts a new key and value into a #GHashTable similar to
|
|
* g_hash_table_insert(). The difference is that if the key
|
|
* already exists in the #GHashTable, it gets replaced by the
|
|
* new key. If you supplied a @value_destroy_func when creating
|
|
* the #GHashTable, the old value is freed using that function.
|
|
* If you supplied a @key_destroy_func when creating the
|
|
* #GHashTable, the old key is freed using that function.
|
|
*
|
|
* Starting from GLib 2.40, this function returns a boolean value to
|
|
* indicate whether the newly added value was already in the hash table
|
|
* or not.
|
|
*
|
|
* Returns: %TRUE if the key did not exist yet
|
|
*/
|
|
gboolean
|
|
g_hash_table_replace (GHashTable *hash_table,
|
|
gpointer key,
|
|
gpointer value)
|
|
{
|
|
return g_hash_table_insert_internal (hash_table, key, value, TRUE);
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_add:
|
|
* @hash_table: a #GHashTable
|
|
* @key: (transfer full): a key to insert
|
|
*
|
|
* This is a convenience function for using a #GHashTable as a set. It
|
|
* is equivalent to calling g_hash_table_replace() with @key as both the
|
|
* key and the value.
|
|
*
|
|
* In particular, this means that if @key already exists in the hash table, then
|
|
* the old copy of @key in the hash table is freed and @key replaces it in the
|
|
* table.
|
|
*
|
|
* When a hash table only ever contains keys that have themselves as the
|
|
* corresponding value it is able to be stored more efficiently. See
|
|
* the discussion in the section description.
|
|
*
|
|
* Starting from GLib 2.40, this function returns a boolean value to
|
|
* indicate whether the newly added value was already in the hash table
|
|
* or not.
|
|
*
|
|
* Returns: %TRUE if the key did not exist yet
|
|
*
|
|
* Since: 2.32
|
|
*/
|
|
gboolean
|
|
g_hash_table_add (GHashTable *hash_table,
|
|
gpointer key)
|
|
{
|
|
return g_hash_table_insert_internal (hash_table, key, key, TRUE);
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_contains:
|
|
* @hash_table: a #GHashTable
|
|
* @key: a key to check
|
|
*
|
|
* Checks if @key is in @hash_table.
|
|
*
|
|
* Returns: %TRUE if @key is in @hash_table, %FALSE otherwise.
|
|
*
|
|
* Since: 2.32
|
|
**/
|
|
gboolean
|
|
g_hash_table_contains (GHashTable *hash_table,
|
|
gconstpointer key)
|
|
{
|
|
guint node_index;
|
|
guint node_hash;
|
|
|
|
g_return_val_if_fail (hash_table != NULL, FALSE);
|
|
|
|
node_index = g_hash_table_lookup_node (hash_table, key, &node_hash);
|
|
|
|
return HASH_IS_REAL (hash_table->hashes[node_index]);
|
|
}
|
|
|
|
/*
|
|
* g_hash_table_remove_internal:
|
|
* @hash_table: our #GHashTable
|
|
* @key: the key to remove
|
|
* @notify: %TRUE if the destroy notify handlers are to be called
|
|
* Returns: %TRUE if a node was found and removed, else %FALSE
|
|
*
|
|
* Implements the common logic for the g_hash_table_remove() and
|
|
* g_hash_table_steal() functions.
|
|
*
|
|
* Do a lookup of @key and remove it if it is found, calling the
|
|
* destroy notify handlers only if @notify is %TRUE.
|
|
*/
|
|
static gboolean
|
|
g_hash_table_remove_internal (GHashTable *hash_table,
|
|
gconstpointer key,
|
|
gboolean notify)
|
|
{
|
|
guint node_index;
|
|
guint node_hash;
|
|
|
|
g_return_val_if_fail (hash_table != NULL, FALSE);
|
|
|
|
node_index = g_hash_table_lookup_node (hash_table, key, &node_hash);
|
|
|
|
if (!HASH_IS_REAL (hash_table->hashes[node_index]))
|
|
return FALSE;
|
|
|
|
g_hash_table_remove_node (hash_table, node_index, notify);
|
|
g_hash_table_maybe_resize (hash_table);
|
|
|
|
#ifndef G_DISABLE_ASSERT
|
|
hash_table->version++;
|
|
#endif
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_remove:
|
|
* @hash_table: a #GHashTable
|
|
* @key: the key to remove
|
|
*
|
|
* Removes a key and its associated value from a #GHashTable.
|
|
*
|
|
* If the #GHashTable was created using g_hash_table_new_full(), the
|
|
* key and value are freed using the supplied destroy functions, otherwise
|
|
* you have to make sure that any dynamically allocated values are freed
|
|
* yourself.
|
|
*
|
|
* Returns: %TRUE if the key was found and removed from the #GHashTable
|
|
*/
|
|
gboolean
|
|
g_hash_table_remove (GHashTable *hash_table,
|
|
gconstpointer key)
|
|
{
|
|
return g_hash_table_remove_internal (hash_table, key, TRUE);
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_steal:
|
|
* @hash_table: a #GHashTable
|
|
* @key: the key to remove
|
|
*
|
|
* Removes a key and its associated value from a #GHashTable without
|
|
* calling the key and value destroy functions.
|
|
*
|
|
* Returns: %TRUE if the key was found and removed from the #GHashTable
|
|
*/
|
|
gboolean
|
|
g_hash_table_steal (GHashTable *hash_table,
|
|
gconstpointer key)
|
|
{
|
|
return g_hash_table_remove_internal (hash_table, key, FALSE);
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_steal_extended:
|
|
* @hash_table: a #GHashTable
|
|
* @lookup_key: the key to look up
|
|
* @stolen_key: (out) (optional) (transfer full): return location for the
|
|
* original key
|
|
* @stolen_value: (out) (optional) (nullable) (transfer full): return location
|
|
* for the value associated with the key
|
|
*
|
|
* Looks up a key in the #GHashTable, stealing the original key and the
|
|
* associated value and returning %TRUE if the key was found. If the key was
|
|
* not found, %FALSE is returned.
|
|
*
|
|
* If found, the stolen key and value are removed from the hash table without
|
|
* calling the key and value destroy functions, and ownership is transferred to
|
|
* the caller of this method, as with g_hash_table_steal(). That is the case
|
|
* regardless whether @stolen_key or @stolen_value output parameters are
|
|
* requested.
|
|
*
|
|
* You can pass %NULL for @lookup_key, provided the hash and equal functions
|
|
* of @hash_table are %NULL-safe.
|
|
*
|
|
* The dictionary implementation optimizes for having all values identical to
|
|
* their keys, for example by using g_hash_table_add(). When stealing both the
|
|
* key and the value from such a dictionary, the value will be %NULL.
|
|
*
|
|
* Returns: %TRUE if the key was found in the #GHashTable
|
|
* Since: 2.58
|
|
*/
|
|
gboolean
|
|
g_hash_table_steal_extended (GHashTable *hash_table,
|
|
gconstpointer lookup_key,
|
|
gpointer *stolen_key,
|
|
gpointer *stolen_value)
|
|
{
|
|
guint node_index;
|
|
guint node_hash;
|
|
|
|
g_return_val_if_fail (hash_table != NULL, FALSE);
|
|
|
|
node_index = g_hash_table_lookup_node (hash_table, lookup_key, &node_hash);
|
|
|
|
if (!HASH_IS_REAL (hash_table->hashes[node_index]))
|
|
{
|
|
if (stolen_key != NULL)
|
|
*stolen_key = NULL;
|
|
if (stolen_value != NULL)
|
|
*stolen_value = NULL;
|
|
return FALSE;
|
|
}
|
|
|
|
if (stolen_key != NULL)
|
|
{
|
|
*stolen_key = g_hash_table_fetch_key_or_value (hash_table->keys, node_index, hash_table->have_big_keys);
|
|
g_hash_table_assign_key_or_value (hash_table->keys, node_index, hash_table->have_big_keys, NULL);
|
|
}
|
|
|
|
if (stolen_value != NULL)
|
|
{
|
|
*stolen_value = g_hash_table_fetch_key_or_value (hash_table->values, node_index, hash_table->have_big_values);
|
|
g_hash_table_assign_key_or_value (hash_table->values, node_index, hash_table->have_big_values, NULL);
|
|
}
|
|
|
|
g_hash_table_remove_node (hash_table, node_index, FALSE);
|
|
g_hash_table_maybe_resize (hash_table);
|
|
|
|
#ifndef G_DISABLE_ASSERT
|
|
hash_table->version++;
|
|
#endif
|
|
|
|
return TRUE;
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_remove_all:
|
|
* @hash_table: a #GHashTable
|
|
*
|
|
* Removes all keys and their associated values from a #GHashTable.
|
|
*
|
|
* If the #GHashTable was created using g_hash_table_new_full(),
|
|
* the keys and values are freed using the supplied destroy functions,
|
|
* otherwise you have to make sure that any dynamically allocated
|
|
* values are freed yourself.
|
|
*
|
|
* Since: 2.12
|
|
*/
|
|
void
|
|
g_hash_table_remove_all (GHashTable *hash_table)
|
|
{
|
|
g_return_if_fail (hash_table != NULL);
|
|
|
|
#ifndef G_DISABLE_ASSERT
|
|
if (hash_table->nnodes != 0)
|
|
hash_table->version++;
|
|
#endif
|
|
|
|
g_hash_table_remove_all_nodes (hash_table, TRUE, FALSE);
|
|
g_hash_table_maybe_resize (hash_table);
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_steal_all:
|
|
* @hash_table: a #GHashTable
|
|
*
|
|
* Removes all keys and their associated values from a #GHashTable
|
|
* without calling the key and value destroy functions.
|
|
*
|
|
* Since: 2.12
|
|
*/
|
|
void
|
|
g_hash_table_steal_all (GHashTable *hash_table)
|
|
{
|
|
g_return_if_fail (hash_table != NULL);
|
|
|
|
#ifndef G_DISABLE_ASSERT
|
|
if (hash_table->nnodes != 0)
|
|
hash_table->version++;
|
|
#endif
|
|
|
|
g_hash_table_remove_all_nodes (hash_table, FALSE, FALSE);
|
|
g_hash_table_maybe_resize (hash_table);
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_steal_all_keys: (skip)
|
|
* @hash_table: a #GHashTable
|
|
*
|
|
* Removes all keys and their associated values from a #GHashTable
|
|
* without calling the key destroy functions, returning the keys
|
|
* as a #GPtrArray with the free func set to the @hash_table key
|
|
* destroy function.
|
|
*
|
|
* Returns: (transfer container): a #GPtrArray containing each key of
|
|
* the table. Unref with with g_ptr_array_unref() when done.
|
|
*
|
|
* Since: 2.76
|
|
*/
|
|
GPtrArray *
|
|
g_hash_table_steal_all_keys (GHashTable *hash_table)
|
|
{
|
|
GPtrArray *array;
|
|
GDestroyNotify key_destroy_func;
|
|
|
|
g_return_val_if_fail (hash_table != NULL, NULL);
|
|
|
|
array = g_hash_table_get_keys_as_ptr_array (hash_table);
|
|
|
|
/* Ignore the key destroy notify calls during removal, and use it for the
|
|
* array elements instead, but restore it after the hash table has been
|
|
* cleared, so that newly added keys will continue using it.
|
|
*/
|
|
key_destroy_func = g_steal_pointer (&hash_table->key_destroy_func);
|
|
g_ptr_array_set_free_func (array, key_destroy_func);
|
|
|
|
g_hash_table_remove_all (hash_table);
|
|
hash_table->key_destroy_func = g_steal_pointer (&key_destroy_func);
|
|
|
|
return array;
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_steal_all_values: (skip)
|
|
* @hash_table: a #GHashTable
|
|
*
|
|
* Removes all keys and their associated values from a #GHashTable
|
|
* without calling the value destroy functions, returning the values
|
|
* as a #GPtrArray with the free func set to the @hash_table value
|
|
* destroy function.
|
|
*
|
|
* Returns: (transfer container): a #GPtrArray containing each value of
|
|
* the table. Unref with with g_ptr_array_unref() when done.
|
|
*
|
|
* Since: 2.76
|
|
*/
|
|
GPtrArray *
|
|
g_hash_table_steal_all_values (GHashTable *hash_table)
|
|
{
|
|
GPtrArray *array;
|
|
GDestroyNotify value_destroy_func;
|
|
|
|
g_return_val_if_fail (hash_table != NULL, NULL);
|
|
|
|
array = g_hash_table_get_values_as_ptr_array (hash_table);
|
|
|
|
/* Ignore the value destroy notify calls during removal, and use it for the
|
|
* array elements instead, but restore it after the hash table has been
|
|
* cleared, so that newly added values will continue using it.
|
|
*/
|
|
value_destroy_func = g_steal_pointer (&hash_table->value_destroy_func);
|
|
g_ptr_array_set_free_func (array, value_destroy_func);
|
|
|
|
g_hash_table_remove_all (hash_table);
|
|
hash_table->value_destroy_func = g_steal_pointer (&value_destroy_func);
|
|
|
|
return array;
|
|
}
|
|
|
|
/*
|
|
* g_hash_table_foreach_remove_or_steal:
|
|
* @hash_table: a #GHashTable
|
|
* @func: the user's callback function
|
|
* @user_data: data for @func
|
|
* @notify: %TRUE if the destroy notify handlers are to be called
|
|
*
|
|
* Implements the common logic for g_hash_table_foreach_remove()
|
|
* and g_hash_table_foreach_steal().
|
|
*
|
|
* Iterates over every node in the table, calling @func with the key
|
|
* and value of the node (and @user_data). If @func returns %TRUE the
|
|
* node is removed from the table.
|
|
*
|
|
* If @notify is true then the destroy notify handlers will be called
|
|
* for each removed node.
|
|
*/
|
|
static guint
|
|
g_hash_table_foreach_remove_or_steal (GHashTable *hash_table,
|
|
GHRFunc func,
|
|
gpointer user_data,
|
|
gboolean notify)
|
|
{
|
|
guint deleted = 0;
|
|
gsize i;
|
|
#ifndef G_DISABLE_ASSERT
|
|
gint version = hash_table->version;
|
|
#endif
|
|
|
|
for (i = 0; i < hash_table->size; i++)
|
|
{
|
|
guint node_hash = hash_table->hashes[i];
|
|
gpointer node_key = g_hash_table_fetch_key_or_value (hash_table->keys, i, hash_table->have_big_keys);
|
|
gpointer node_value = g_hash_table_fetch_key_or_value (hash_table->values, i, hash_table->have_big_values);
|
|
|
|
if (HASH_IS_REAL (node_hash) &&
|
|
(* func) (node_key, node_value, user_data))
|
|
{
|
|
g_hash_table_remove_node (hash_table, i, notify);
|
|
deleted++;
|
|
}
|
|
|
|
#ifndef G_DISABLE_ASSERT
|
|
g_return_val_if_fail (version == hash_table->version, 0);
|
|
#endif
|
|
}
|
|
|
|
g_hash_table_maybe_resize (hash_table);
|
|
|
|
#ifndef G_DISABLE_ASSERT
|
|
if (deleted > 0)
|
|
hash_table->version++;
|
|
#endif
|
|
|
|
return deleted;
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_foreach_remove:
|
|
* @hash_table: a #GHashTable
|
|
* @func: (scope call): the function to call for each key/value pair
|
|
* @user_data: user data to pass to the function
|
|
*
|
|
* Calls the given function for each key/value pair in the
|
|
* #GHashTable. If the function returns %TRUE, then the key/value
|
|
* pair is removed from the #GHashTable. If you supplied key or
|
|
* value destroy functions when creating the #GHashTable, they are
|
|
* used to free the memory allocated for the removed keys and values.
|
|
*
|
|
* See #GHashTableIter for an alternative way to loop over the
|
|
* key/value pairs in the hash table.
|
|
*
|
|
* Returns: the number of key/value pairs removed
|
|
*/
|
|
guint
|
|
g_hash_table_foreach_remove (GHashTable *hash_table,
|
|
GHRFunc func,
|
|
gpointer user_data)
|
|
{
|
|
g_return_val_if_fail (hash_table != NULL, 0);
|
|
g_return_val_if_fail (func != NULL, 0);
|
|
|
|
return g_hash_table_foreach_remove_or_steal (hash_table, func, user_data, TRUE);
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_foreach_steal:
|
|
* @hash_table: a #GHashTable
|
|
* @func: (scope call): the function to call for each key/value pair
|
|
* @user_data: user data to pass to the function
|
|
*
|
|
* Calls the given function for each key/value pair in the
|
|
* #GHashTable. If the function returns %TRUE, then the key/value
|
|
* pair is removed from the #GHashTable, but no key or value
|
|
* destroy functions are called.
|
|
*
|
|
* See #GHashTableIter for an alternative way to loop over the
|
|
* key/value pairs in the hash table.
|
|
*
|
|
* Returns: the number of key/value pairs removed.
|
|
*/
|
|
guint
|
|
g_hash_table_foreach_steal (GHashTable *hash_table,
|
|
GHRFunc func,
|
|
gpointer user_data)
|
|
{
|
|
g_return_val_if_fail (hash_table != NULL, 0);
|
|
g_return_val_if_fail (func != NULL, 0);
|
|
|
|
return g_hash_table_foreach_remove_or_steal (hash_table, func, user_data, FALSE);
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_foreach:
|
|
* @hash_table: a #GHashTable
|
|
* @func: (scope call): the function to call for each key/value pair
|
|
* @user_data: user data to pass to the function
|
|
*
|
|
* Calls the given function for each of the key/value pairs in the
|
|
* #GHashTable. The function is passed the key and value of each
|
|
* pair, and the given @user_data parameter. The hash table may not
|
|
* be modified while iterating over it (you can't add/remove
|
|
* items). To remove all items matching a predicate, use
|
|
* g_hash_table_foreach_remove().
|
|
*
|
|
* The order in which g_hash_table_foreach() iterates over the keys/values in
|
|
* the hash table is not defined.
|
|
*
|
|
* See g_hash_table_find() for performance caveats for linear
|
|
* order searches in contrast to g_hash_table_lookup().
|
|
*/
|
|
void
|
|
g_hash_table_foreach (GHashTable *hash_table,
|
|
GHFunc func,
|
|
gpointer user_data)
|
|
{
|
|
gsize i;
|
|
#ifndef G_DISABLE_ASSERT
|
|
gint version;
|
|
#endif
|
|
|
|
g_return_if_fail (hash_table != NULL);
|
|
g_return_if_fail (func != NULL);
|
|
|
|
#ifndef G_DISABLE_ASSERT
|
|
version = hash_table->version;
|
|
#endif
|
|
|
|
for (i = 0; i < hash_table->size; i++)
|
|
{
|
|
guint node_hash = hash_table->hashes[i];
|
|
gpointer node_key = g_hash_table_fetch_key_or_value (hash_table->keys, i, hash_table->have_big_keys);
|
|
gpointer node_value = g_hash_table_fetch_key_or_value (hash_table->values, i, hash_table->have_big_values);
|
|
|
|
if (HASH_IS_REAL (node_hash))
|
|
(* func) (node_key, node_value, user_data);
|
|
|
|
#ifndef G_DISABLE_ASSERT
|
|
g_return_if_fail (version == hash_table->version);
|
|
#endif
|
|
}
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_find:
|
|
* @hash_table: a #GHashTable
|
|
* @predicate: (scope call): function to test the key/value pairs for a certain property
|
|
* @user_data: user data to pass to the function
|
|
*
|
|
* Calls the given function for key/value pairs in the #GHashTable
|
|
* until @predicate returns %TRUE. The function is passed the key
|
|
* and value of each pair, and the given @user_data parameter. The
|
|
* hash table may not be modified while iterating over it (you can't
|
|
* add/remove items).
|
|
*
|
|
* Note, that hash tables are really only optimized for forward
|
|
* lookups, i.e. g_hash_table_lookup(). So code that frequently issues
|
|
* g_hash_table_find() or g_hash_table_foreach() (e.g. in the order of
|
|
* once per every entry in a hash table) should probably be reworked
|
|
* to use additional or different data structures for reverse lookups
|
|
* (keep in mind that an O(n) find/foreach operation issued for all n
|
|
* values in a hash table ends up needing O(n*n) operations).
|
|
*
|
|
* Returns: (nullable): The value of the first key/value pair is returned,
|
|
* for which @predicate evaluates to %TRUE. If no pair with the
|
|
* requested property is found, %NULL is returned.
|
|
*
|
|
* Since: 2.4
|
|
*/
|
|
gpointer
|
|
g_hash_table_find (GHashTable *hash_table,
|
|
GHRFunc predicate,
|
|
gpointer user_data)
|
|
{
|
|
gsize i;
|
|
#ifndef G_DISABLE_ASSERT
|
|
gint version;
|
|
#endif
|
|
gboolean match;
|
|
|
|
g_return_val_if_fail (hash_table != NULL, NULL);
|
|
g_return_val_if_fail (predicate != NULL, NULL);
|
|
|
|
#ifndef G_DISABLE_ASSERT
|
|
version = hash_table->version;
|
|
#endif
|
|
|
|
match = FALSE;
|
|
|
|
for (i = 0; i < hash_table->size; i++)
|
|
{
|
|
guint node_hash = hash_table->hashes[i];
|
|
gpointer node_key = g_hash_table_fetch_key_or_value (hash_table->keys, i, hash_table->have_big_keys);
|
|
gpointer node_value = g_hash_table_fetch_key_or_value (hash_table->values, i, hash_table->have_big_values);
|
|
|
|
if (HASH_IS_REAL (node_hash))
|
|
match = predicate (node_key, node_value, user_data);
|
|
|
|
#ifndef G_DISABLE_ASSERT
|
|
g_return_val_if_fail (version == hash_table->version, NULL);
|
|
#endif
|
|
|
|
if (match)
|
|
return node_value;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_size:
|
|
* @hash_table: a #GHashTable
|
|
*
|
|
* Returns the number of elements contained in the #GHashTable.
|
|
*
|
|
* Returns: the number of key/value pairs in the #GHashTable.
|
|
*/
|
|
guint
|
|
g_hash_table_size (GHashTable *hash_table)
|
|
{
|
|
g_return_val_if_fail (hash_table != NULL, 0);
|
|
|
|
return hash_table->nnodes;
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_get_keys:
|
|
* @hash_table: a #GHashTable
|
|
*
|
|
* Retrieves every key inside @hash_table. The returned data is valid
|
|
* until changes to the hash release those keys.
|
|
*
|
|
* This iterates over every entry in the hash table to build its return value.
|
|
* To iterate over the entries in a #GHashTable more efficiently, use a
|
|
* #GHashTableIter.
|
|
*
|
|
* Returns: (transfer container): a #GList containing all the keys
|
|
* inside the hash table. The content of the list is owned by the
|
|
* hash table and should not be modified or freed. Use g_list_free()
|
|
* when done using the list.
|
|
*
|
|
* Since: 2.14
|
|
*/
|
|
GList *
|
|
g_hash_table_get_keys (GHashTable *hash_table)
|
|
{
|
|
gsize i;
|
|
GList *retval;
|
|
|
|
g_return_val_if_fail (hash_table != NULL, NULL);
|
|
|
|
retval = NULL;
|
|
for (i = 0; i < hash_table->size; i++)
|
|
{
|
|
if (HASH_IS_REAL (hash_table->hashes[i]))
|
|
retval = g_list_prepend (retval, g_hash_table_fetch_key_or_value (hash_table->keys, i, hash_table->have_big_keys));
|
|
}
|
|
|
|
return retval;
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_get_keys_as_array:
|
|
* @hash_table: a #GHashTable
|
|
* @length: (out) (optional): the length of the returned array
|
|
*
|
|
* Retrieves every key inside @hash_table, as an array.
|
|
*
|
|
* The returned array is %NULL-terminated but may contain %NULL as a
|
|
* key. Use @length to determine the true length if it's possible that
|
|
* %NULL was used as the value for a key.
|
|
*
|
|
* Note: in the common case of a string-keyed #GHashTable, the return
|
|
* value of this function can be conveniently cast to (const gchar **).
|
|
*
|
|
* This iterates over every entry in the hash table to build its return value.
|
|
* To iterate over the entries in a #GHashTable more efficiently, use a
|
|
* #GHashTableIter.
|
|
*
|
|
* You should always free the return result with g_free(). In the
|
|
* above-mentioned case of a string-keyed hash table, it may be
|
|
* appropriate to use g_strfreev() if you call g_hash_table_steal_all()
|
|
* first to transfer ownership of the keys.
|
|
*
|
|
* Returns: (array length=length) (transfer container): a
|
|
* %NULL-terminated array containing each key from the table.
|
|
*
|
|
* Since: 2.40
|
|
**/
|
|
gpointer *
|
|
g_hash_table_get_keys_as_array (GHashTable *hash_table,
|
|
guint *length)
|
|
{
|
|
gpointer *result;
|
|
gsize i, j = 0;
|
|
|
|
result = g_new (gpointer, hash_table->nnodes + 1);
|
|
for (i = 0; i < hash_table->size; i++)
|
|
{
|
|
if (HASH_IS_REAL (hash_table->hashes[i]))
|
|
result[j++] = g_hash_table_fetch_key_or_value (hash_table->keys, i, hash_table->have_big_keys);
|
|
}
|
|
g_assert (j == hash_table->nnodes);
|
|
result[j] = NULL;
|
|
|
|
if (length)
|
|
*length = j;
|
|
|
|
return result;
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_get_keys_as_ptr_array: (skip)
|
|
* @hash_table: a #GHashTable
|
|
*
|
|
* Retrieves every key inside @hash_table, as a #GPtrArray.
|
|
* The returned data is valid until changes to the hash release those keys.
|
|
*
|
|
* This iterates over every entry in the hash table to build its return value.
|
|
* To iterate over the entries in a #GHashTable more efficiently, use a
|
|
* #GHashTableIter.
|
|
*
|
|
* You should always unref the returned array with g_ptr_array_unref().
|
|
*
|
|
* Returns: (transfer container): a #GPtrArray containing each key from
|
|
* the table. Unref with with g_ptr_array_unref() when done.
|
|
*
|
|
* Since: 2.76
|
|
**/
|
|
GPtrArray *
|
|
g_hash_table_get_keys_as_ptr_array (GHashTable *hash_table)
|
|
{
|
|
GPtrArray *array;
|
|
|
|
g_return_val_if_fail (hash_table != NULL, NULL);
|
|
|
|
array = g_ptr_array_sized_new (hash_table->size);
|
|
for (gsize i = 0; i < hash_table->size; ++i)
|
|
{
|
|
if (HASH_IS_REAL (hash_table->hashes[i]))
|
|
{
|
|
g_ptr_array_add (array, g_hash_table_fetch_key_or_value (
|
|
hash_table->keys, i, hash_table->have_big_keys));
|
|
}
|
|
}
|
|
g_assert (array->len == hash_table->nnodes);
|
|
|
|
return array;
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_get_values:
|
|
* @hash_table: a #GHashTable
|
|
*
|
|
* Retrieves every value inside @hash_table. The returned data
|
|
* is valid until @hash_table is modified.
|
|
*
|
|
* This iterates over every entry in the hash table to build its return value.
|
|
* To iterate over the entries in a #GHashTable more efficiently, use a
|
|
* #GHashTableIter.
|
|
*
|
|
* Returns: (transfer container): a #GList containing all the values
|
|
* inside the hash table. The content of the list is owned by the
|
|
* hash table and should not be modified or freed. Use g_list_free()
|
|
* when done using the list.
|
|
*
|
|
* Since: 2.14
|
|
*/
|
|
GList *
|
|
g_hash_table_get_values (GHashTable *hash_table)
|
|
{
|
|
gsize i;
|
|
GList *retval;
|
|
|
|
g_return_val_if_fail (hash_table != NULL, NULL);
|
|
|
|
retval = NULL;
|
|
for (i = 0; i < hash_table->size; i++)
|
|
{
|
|
if (HASH_IS_REAL (hash_table->hashes[i]))
|
|
retval = g_list_prepend (retval, g_hash_table_fetch_key_or_value (hash_table->values, i, hash_table->have_big_values));
|
|
}
|
|
|
|
return retval;
|
|
}
|
|
|
|
/**
|
|
* g_hash_table_get_values_as_ptr_array: (skip)
|
|
* @hash_table: a #GHashTable
|
|
*
|
|
* Retrieves every value inside @hash_table, as a #GPtrArray.
|
|
* The returned data is valid until changes to the hash release those values.
|
|
*
|
|
* This iterates over every entry in the hash table to build its return value.
|
|
* To iterate over the entries in a #GHashTable more efficiently, use a
|
|
* #GHashTableIter.
|
|
*
|
|
* You should always unref the returned array with g_ptr_array_unref().
|
|
*
|
|
* Returns: (transfer container): a #GPtrArray containing each value from
|
|
* the table. Unref with with g_ptr_array_unref() when done.
|
|
*
|
|
* Since: 2.76
|
|
**/
|
|
GPtrArray *
|
|
g_hash_table_get_values_as_ptr_array (GHashTable *hash_table)
|
|
{
|
|
GPtrArray *array;
|
|
|
|
g_return_val_if_fail (hash_table != NULL, NULL);
|
|
|
|
array = g_ptr_array_sized_new (hash_table->size);
|
|
for (gsize i = 0; i < hash_table->size; ++i)
|
|
{
|
|
if (HASH_IS_REAL (hash_table->hashes[i]))
|
|
{
|
|
g_ptr_array_add (array, g_hash_table_fetch_key_or_value (
|
|
hash_table->values, i, hash_table->have_big_values));
|
|
}
|
|
}
|
|
g_assert (array->len == hash_table->nnodes);
|
|
|
|
return array;
|
|
}
|
|
|
|
/* Hash functions.
|
|
*/
|
|
|
|
/**
|
|
* g_str_equal:
|
|
* @v1: (not nullable): a key
|
|
* @v2: (not nullable): a key to compare with @v1
|
|
*
|
|
* Compares two strings for byte-by-byte equality and returns %TRUE
|
|
* if they are equal. It can be passed to g_hash_table_new() as the
|
|
* @key_equal_func parameter, when using non-%NULL strings as keys in a
|
|
* #GHashTable.
|
|
*
|
|
* This function is typically used for hash table comparisons, but can be used
|
|
* for general purpose comparisons of non-%NULL strings. For a %NULL-safe string
|
|
* comparison function, see g_strcmp0().
|
|
*
|
|
* Returns: %TRUE if the two keys match
|
|
*/
|
|
gboolean
|
|
(g_str_equal) (gconstpointer v1,
|
|
gconstpointer v2)
|
|
{
|
|
const gchar *string1 = v1;
|
|
const gchar *string2 = v2;
|
|
|
|
return strcmp (string1, string2) == 0;
|
|
}
|
|
|
|
/**
|
|
* g_str_hash:
|
|
* @v: (not nullable): a string key
|
|
*
|
|
* Converts a string to a hash value.
|
|
*
|
|
* This function implements the widely used "djb" hash apparently
|
|
* posted by Daniel Bernstein to comp.lang.c some time ago. The 32
|
|
* bit unsigned hash value starts at 5381 and for each byte 'c' in
|
|
* the string, is updated: `hash = hash * 33 + c`. This function
|
|
* uses the signed value of each byte.
|
|
*
|
|
* It can be passed to g_hash_table_new() as the @hash_func parameter,
|
|
* when using non-%NULL strings as keys in a #GHashTable.
|
|
*
|
|
* Note that this function may not be a perfect fit for all use cases.
|
|
* For example, it produces some hash collisions with strings as short
|
|
* as 2.
|
|
*
|
|
* Returns: a hash value corresponding to the key
|
|
*/
|
|
guint
|
|
g_str_hash (gconstpointer v)
|
|
{
|
|
const signed char *p;
|
|
guint32 h = 5381;
|
|
|
|
for (p = v; *p != '\0'; p++)
|
|
h = (h << 5) + h + *p;
|
|
|
|
return h;
|
|
}
|
|
|
|
/**
|
|
* g_direct_hash:
|
|
* @v: (nullable): a #gpointer key
|
|
*
|
|
* Converts a gpointer to a hash value.
|
|
* It can be passed to g_hash_table_new() as the @hash_func parameter,
|
|
* when using opaque pointers compared by pointer value as keys in a
|
|
* #GHashTable.
|
|
*
|
|
* This hash function is also appropriate for keys that are integers
|
|
* stored in pointers, such as `GINT_TO_POINTER (n)`.
|
|
*
|
|
* Returns: a hash value corresponding to the key.
|
|
*/
|
|
guint
|
|
g_direct_hash (gconstpointer v)
|
|
{
|
|
return GPOINTER_TO_UINT (v);
|
|
}
|
|
|
|
/**
|
|
* g_direct_equal:
|
|
* @v1: (nullable): a key
|
|
* @v2: (nullable): a key to compare with @v1
|
|
*
|
|
* Compares two #gpointer arguments and returns %TRUE if they are equal.
|
|
* It can be passed to g_hash_table_new() as the @key_equal_func
|
|
* parameter, when using opaque pointers compared by pointer value as
|
|
* keys in a #GHashTable.
|
|
*
|
|
* This equality function is also appropriate for keys that are integers
|
|
* stored in pointers, such as `GINT_TO_POINTER (n)`.
|
|
*
|
|
* Returns: %TRUE if the two keys match.
|
|
*/
|
|
gboolean
|
|
g_direct_equal (gconstpointer v1,
|
|
gconstpointer v2)
|
|
{
|
|
return v1 == v2;
|
|
}
|
|
|
|
/**
|
|
* g_int_equal:
|
|
* @v1: (not nullable): a pointer to a #gint key
|
|
* @v2: (not nullable): a pointer to a #gint key to compare with @v1
|
|
*
|
|
* Compares the two #gint values being pointed to and returns
|
|
* %TRUE if they are equal.
|
|
* It can be passed to g_hash_table_new() as the @key_equal_func
|
|
* parameter, when using non-%NULL pointers to integers as keys in a
|
|
* #GHashTable.
|
|
*
|
|
* Note that this function acts on pointers to #gint, not on #gint
|
|
* directly: if your hash table's keys are of the form
|
|
* `GINT_TO_POINTER (n)`, use g_direct_equal() instead.
|
|
*
|
|
* Returns: %TRUE if the two keys match.
|
|
*/
|
|
gboolean
|
|
g_int_equal (gconstpointer v1,
|
|
gconstpointer v2)
|
|
{
|
|
return *((const gint*) v1) == *((const gint*) v2);
|
|
}
|
|
|
|
/**
|
|
* g_int_hash:
|
|
* @v: (not nullable): a pointer to a #gint key
|
|
*
|
|
* Converts a pointer to a #gint to a hash value.
|
|
* It can be passed to g_hash_table_new() as the @hash_func parameter,
|
|
* when using non-%NULL pointers to integer values as keys in a #GHashTable.
|
|
*
|
|
* Note that this function acts on pointers to #gint, not on #gint
|
|
* directly: if your hash table's keys are of the form
|
|
* `GINT_TO_POINTER (n)`, use g_direct_hash() instead.
|
|
*
|
|
* Returns: a hash value corresponding to the key.
|
|
*/
|
|
guint
|
|
g_int_hash (gconstpointer v)
|
|
{
|
|
return *(const gint*) v;
|
|
}
|
|
|
|
/**
|
|
* g_uint_equal:
|
|
* @v1: (not nullable): a pointer to a #guint key
|
|
* @v2: (not nullable): a pointer to a #guint key to compare with @v1
|
|
*
|
|
* Compares the two #guint values being pointed to and returns
|
|
* %TRUE if they are equal.
|
|
* It can be passed to g_hash_table_new() as the @key_equal_func
|
|
* parameter, when using non-%NULL pointers to integers as keys in a
|
|
* #GHashTable.
|
|
*
|
|
* Note that this function acts on pointers to #guint, not on #guint
|
|
* directly: if your hash table's keys are of the form
|
|
* `GUINT_TO_POINTER (n)`, use g_direct_equal() instead.
|
|
*
|
|
* Returns: %TRUE if the two keys match.
|
|
*/
|
|
gboolean
|
|
g_uint_equal (gconstpointer v1,
|
|
gconstpointer v2)
|
|
{
|
|
return *((const guint *) v1) == *((const guint *) v2);
|
|
}
|
|
|
|
/**
|
|
* g_uint_hash:
|
|
* @v: (not nullable): a pointer to a #guint key
|
|
*
|
|
* Converts a pointer to a #guint to a hash value.
|
|
* It can be passed to g_hash_table_new() as the @hash_func parameter,
|
|
* when using non-%NULL pointers to integer values as keys in a #GHashTable.
|
|
*
|
|
* Note that this function acts on pointers to #guint, not on #guint
|
|
* directly: if your hash table's keys are of the form
|
|
* `GUINT_TO_POINTER (n)`, use g_direct_hash() instead.
|
|
*
|
|
* Returns: a hash value corresponding to the key.
|
|
*/
|
|
guint
|
|
g_uint_hash (gconstpointer v)
|
|
{
|
|
return *(const guint *) v;
|
|
}
|
|
|
|
/**
|
|
* g_int64_equal:
|
|
* @v1: (not nullable): a pointer to a #gint64 key
|
|
* @v2: (not nullable): a pointer to a #gint64 key to compare with @v1
|
|
*
|
|
* Compares the two #gint64 values being pointed to and returns
|
|
* %TRUE if they are equal.
|
|
* It can be passed to g_hash_table_new() as the @key_equal_func
|
|
* parameter, when using non-%NULL pointers to 64-bit integers as keys in a
|
|
* #GHashTable.
|
|
*
|
|
* Returns: %TRUE if the two keys match.
|
|
*
|
|
* Since: 2.22
|
|
*/
|
|
gboolean
|
|
g_int64_equal (gconstpointer v1,
|
|
gconstpointer v2)
|
|
{
|
|
return *((const gint64*) v1) == *((const gint64*) v2);
|
|
}
|
|
|
|
/**
|
|
* g_int64_hash:
|
|
* @v: (not nullable): a pointer to a #gint64 key
|
|
*
|
|
* Converts a pointer to a #gint64 to a hash value.
|
|
*
|
|
* It can be passed to g_hash_table_new() as the @hash_func parameter,
|
|
* when using non-%NULL pointers to 64-bit integer values as keys in a
|
|
* #GHashTable.
|
|
*
|
|
* Returns: a hash value corresponding to the key.
|
|
*
|
|
* Since: 2.22
|
|
*/
|
|
guint
|
|
g_int64_hash (gconstpointer v)
|
|
{
|
|
const guint64 *bits = v;
|
|
|
|
return (guint) ((*bits >> 32) ^ (*bits & 0xffffffffU));
|
|
}
|
|
|
|
/**
|
|
* g_double_equal:
|
|
* @v1: (not nullable): a pointer to a #gdouble key
|
|
* @v2: (not nullable): a pointer to a #gdouble key to compare with @v1
|
|
*
|
|
* Compares the two #gdouble values being pointed to and returns
|
|
* %TRUE if they are equal.
|
|
* It can be passed to g_hash_table_new() as the @key_equal_func
|
|
* parameter, when using non-%NULL pointers to doubles as keys in a
|
|
* #GHashTable.
|
|
*
|
|
* Returns: %TRUE if the two keys match.
|
|
*
|
|
* Since: 2.22
|
|
*/
|
|
gboolean
|
|
g_double_equal (gconstpointer v1,
|
|
gconstpointer v2)
|
|
{
|
|
return *((const gdouble*) v1) == *((const gdouble*) v2);
|
|
}
|
|
|
|
/**
|
|
* g_double_hash:
|
|
* @v: (not nullable): a pointer to a #gdouble key
|
|
*
|
|
* Converts a pointer to a #gdouble to a hash value.
|
|
* It can be passed to g_hash_table_new() as the @hash_func parameter,
|
|
* It can be passed to g_hash_table_new() as the @hash_func parameter,
|
|
* when using non-%NULL pointers to doubles as keys in a #GHashTable.
|
|
*
|
|
* Returns: a hash value corresponding to the key.
|
|
*
|
|
* Since: 2.22
|
|
*/
|
|
guint
|
|
g_double_hash (gconstpointer v)
|
|
{
|
|
/* Same as g_int64_hash() */
|
|
const guint64 *bits = v;
|
|
|
|
return (guint) ((*bits >> 32) ^ (*bits & 0xffffffffU));
|
|
}
|