1 | /* |
---|
2 | * EqlHashTable.java |
---|
3 | * |
---|
4 | * Copyright (C) 2004-2006 Peter Graves |
---|
5 | * $Id: EqlHashTable.java 11488 2008-12-27 10:50:33Z ehuelsmann $ |
---|
6 | * |
---|
7 | * This program is free software; you can redistribute it and/or |
---|
8 | * modify it under the terms of the GNU General Public License |
---|
9 | * as published by the Free Software Foundation; either version 2 |
---|
10 | * of the License, or (at your option) any later version. |
---|
11 | * |
---|
12 | * This program is distributed in the hope that it will be useful, |
---|
13 | * but WITHOUT ANY WARRANTY; without even the implied warranty of |
---|
14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
---|
15 | * GNU General Public License for more details. |
---|
16 | * |
---|
17 | * You should have received a copy of the GNU General Public License |
---|
18 | * along with this program; if not, write to the Free Software |
---|
19 | * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. |
---|
20 | * |
---|
21 | * As a special exception, the copyright holders of this library give you |
---|
22 | * permission to link this library with independent modules to produce an |
---|
23 | * executable, regardless of the license terms of these independent |
---|
24 | * modules, and to copy and distribute the resulting executable under |
---|
25 | * terms of your choice, provided that you also meet, for each linked |
---|
26 | * independent module, the terms and conditions of the license of that |
---|
27 | * module. An independent module is a module which is not derived from |
---|
28 | * or based on this library. If you modify this library, you may extend |
---|
29 | * this exception to your version of the library, but you are not |
---|
30 | * obligated to do so. If you do not wish to do so, delete this |
---|
31 | * exception statement from your version. |
---|
32 | */ |
---|
33 | |
---|
34 | package org.armedbear.lisp; |
---|
35 | |
---|
36 | public final class EqlHashTable extends HashTable |
---|
37 | { |
---|
38 | private int mask; |
---|
39 | |
---|
40 | public EqlHashTable() |
---|
41 | { |
---|
42 | } |
---|
43 | |
---|
44 | public EqlHashTable(int size, LispObject rehashSize, |
---|
45 | LispObject rehashThreshold) |
---|
46 | { |
---|
47 | super(calculateInitialCapacity(size), rehashSize, rehashThreshold); |
---|
48 | mask = buckets.length - 1; |
---|
49 | } |
---|
50 | |
---|
51 | @Override |
---|
52 | public Symbol getTest() |
---|
53 | { |
---|
54 | return Symbol.EQL; |
---|
55 | } |
---|
56 | |
---|
57 | @Override |
---|
58 | public LispObject get(LispObject key) |
---|
59 | { |
---|
60 | HashEntry e = buckets[key.sxhash() & mask]; |
---|
61 | while (e != null) |
---|
62 | { |
---|
63 | if (key.eql(e.key)) |
---|
64 | return e.value; |
---|
65 | e = e.next; |
---|
66 | } |
---|
67 | return null; |
---|
68 | } |
---|
69 | |
---|
70 | @Override |
---|
71 | public void put(LispObject key, LispObject value) |
---|
72 | { |
---|
73 | int index = key.sxhash() & mask; |
---|
74 | HashEntry e = buckets[index]; |
---|
75 | while (e != null) |
---|
76 | { |
---|
77 | if (key.eql(e.key)) |
---|
78 | { |
---|
79 | e.value = value; |
---|
80 | return; |
---|
81 | } |
---|
82 | e = e.next; |
---|
83 | } |
---|
84 | // Not found. We need to add a new entry. |
---|
85 | if (++count > threshold) |
---|
86 | { |
---|
87 | rehash(); |
---|
88 | // Need a new hash value to suit the bigger table. |
---|
89 | index = key.sxhash() & mask; |
---|
90 | } |
---|
91 | e = new HashEntry(key, value); |
---|
92 | e.next = buckets[index]; |
---|
93 | buckets[index] = e; |
---|
94 | } |
---|
95 | |
---|
96 | @Override |
---|
97 | public LispObject remove(LispObject key) |
---|
98 | { |
---|
99 | final int index = key.sxhash() & mask; |
---|
100 | HashEntry e = buckets[index]; |
---|
101 | HashEntry last = null; |
---|
102 | while (e != null) |
---|
103 | { |
---|
104 | if (key.eql(e.key)) |
---|
105 | { |
---|
106 | if (last == null) |
---|
107 | buckets[index] = e.next; |
---|
108 | else |
---|
109 | last.next = e.next; |
---|
110 | --count; |
---|
111 | return e.value; |
---|
112 | } |
---|
113 | last = e; |
---|
114 | e = e.next; |
---|
115 | } |
---|
116 | return null; |
---|
117 | } |
---|
118 | |
---|
119 | @Override |
---|
120 | protected void rehash() |
---|
121 | { |
---|
122 | HashEntry[] oldBuckets = buckets; |
---|
123 | int newCapacity = buckets.length * 2; |
---|
124 | threshold = (int) (newCapacity * loadFactor); |
---|
125 | buckets = new HashEntry[newCapacity]; |
---|
126 | mask = buckets.length - 1; |
---|
127 | for (int i = oldBuckets.length; i-- > 0;) |
---|
128 | { |
---|
129 | HashEntry e = oldBuckets[i]; |
---|
130 | while (e != null) |
---|
131 | { |
---|
132 | final int index = e.key.sxhash() & mask; |
---|
133 | HashEntry dest = buckets[index]; |
---|
134 | if (dest != null) |
---|
135 | { |
---|
136 | while (dest.next != null) |
---|
137 | dest = dest.next; |
---|
138 | dest.next = e; |
---|
139 | } |
---|
140 | else |
---|
141 | buckets[index] = e; |
---|
142 | HashEntry next = e.next; |
---|
143 | e.next = null; |
---|
144 | e = next; |
---|
145 | } |
---|
146 | } |
---|
147 | } |
---|
148 | } |
---|