亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? lookup3.c

?? 幾種c語言的hash算法
?? C
?? 第 1 頁 / 共 3 頁
字號:
/*-------------------------------------------------------------------------------lookup3.c, by Bob Jenkins, May 2006, Public Domain.These are functions for producing 32-bit hashes for hash table lookup.hashword(), hashlittle(), hashlittle2(), hashbig(), mix(), and final() are externally useful functions.  Routines to test the hash are included if SELF_TEST is defined.  You can use this free for any purpose.  It's inthe public domain.  It has no warranty.You probably want to use hashlittle().  hashlittle() and hashbig()hash byte arrays.  hashlittle() is is faster than hashbig() onlittle-endian machines.  Intel and AMD are little-endian machines.On second thought, you probably want hashlittle2(), which is identical tohashlittle() except it returns two 32-bit hashes for the price of one.  You could implement hashbig2() if you wanted but I haven't bothered here.If you want to find a hash of, say, exactly 7 integers, do  a = i1;  b = i2;  c = i3;  mix(a,b,c);  a += i4; b += i5; c += i6;  mix(a,b,c);  a += i7;  final(a,b,c);then use c as the hash value.  If you have a variable length array of4-byte integers to hash, use hashword().  If you have a byte array (likea character string), use hashlittle().  If you have several byte arrays, ora mix of things, see the comments above hashlittle().  Why is this so big?  I read 12 bytes at a time into 3 4-byte integers, then mix those integers.  This is fast (you can do a lot more thoroughmixing with 12*3 instructions on 3 integers than you can with 3 instructionson 1 byte), but shoehorning those bytes into integers efficiently is messy.-------------------------------------------------------------------------------*/#define SELF_TEST 1#include <stdio.h>      /* defines printf for tests */#include <time.h>       /* defines time_t for timings in the test */#include <stdint.h>     /* defines uint32_t etc */#include <sys/param.h>  /* attempt to define endianness */#ifdef linux# include <endian.h>    /* attempt to define endianness */#endif/* * My best guess at if you are big-endian or little-endian.  This may * need adjustment. */#if (defined(__BYTE_ORDER) && defined(__LITTLE_ENDIAN) && \     __BYTE_ORDER == __LITTLE_ENDIAN) || \    (defined(i386) || defined(__i386__) || defined(__i486__) || \     defined(__i586__) || defined(__i686__) || defined(vax) || defined(MIPSEL))# define HASH_LITTLE_ENDIAN 1# define HASH_BIG_ENDIAN 0#elif (defined(__BYTE_ORDER) && defined(__BIG_ENDIAN) && \       __BYTE_ORDER == __BIG_ENDIAN) || \      (defined(sparc) || defined(POWERPC) || defined(mc68000) || defined(sel))# define HASH_LITTLE_ENDIAN 0# define HASH_BIG_ENDIAN 1#else# define HASH_LITTLE_ENDIAN 0# define HASH_BIG_ENDIAN 0#endif#define hashsize(n) ((uint32_t)1<<(n))#define hashmask(n) (hashsize(n)-1)#define rot(x,k) (((x)<<(k)) | ((x)>>(32-(k))))/*-------------------------------------------------------------------------------mix -- mix 3 32-bit values reversibly.This is reversible, so any information in (a,b,c) before mix() isstill in (a,b,c) after mix().If four pairs of (a,b,c) inputs are run through mix(), or throughmix() in reverse, there are at least 32 bits of the output thatare sometimes the same for one pair and different for another pair.This was tested for:* pairs that differed by one bit, by two bits, in any combination  of top bits of (a,b,c), or in any combination of bottom bits of  (a,b,c).* "differ" is defined as +, -, ^, or ~^.  For + and -, I transformed  the output delta to a Gray code (a^(a>>1)) so a string of 1's (as  is commonly produced by subtraction) look like a single 1-bit  difference.* the base values were pseudorandom, all zero but one bit set, or   all zero plus a counter that starts at zero.Some k values for my "a-=c; a^=rot(c,k); c+=b;" arrangement thatsatisfy this are    4  6  8 16 19  4    9 15  3 18 27 15   14  9  3  7 17  3Well, "9 15 3 18 27 15" didn't quite get 32 bits diffingfor "differ" defined as + with a one-bit base and a two-bit delta.  Iused http://burtleburtle.net/bob/hash/avalanche.html to choose the operations, constants, and arrangements of the variables.This does not achieve avalanche.  There are input bits of (a,b,c)that fail to affect some output bits of (a,b,c), especially of a.  Themost thoroughly mixed value is c, but it doesn't really even achieveavalanche in c.This allows some parallelism.  Read-after-writes are good at doublingthe number of bits affected, so the goal of mixing pulls in the oppositedirection as the goal of parallelism.  I did what I could.  Rotatesseem to cost as much as shifts on every machine I could lay my handson, and rotates are much kinder to the top and bottom bits, so I usedrotates.-------------------------------------------------------------------------------*/#define mix(a,b,c) \{ \  a -= c;  a ^= rot(c, 4);  c += b; \  b -= a;  b ^= rot(a, 6);  a += c; \  c -= b;  c ^= rot(b, 8);  b += a; \  a -= c;  a ^= rot(c,16);  c += b; \  b -= a;  b ^= rot(a,19);  a += c; \  c -= b;  c ^= rot(b, 4);  b += a; \}/*-------------------------------------------------------------------------------final -- final mixing of 3 32-bit values (a,b,c) into cPairs of (a,b,c) values differing in only a few bits will usuallyproduce values of c that look totally different.  This was tested for* pairs that differed by one bit, by two bits, in any combination  of top bits of (a,b,c), or in any combination of bottom bits of  (a,b,c).* "differ" is defined as +, -, ^, or ~^.  For + and -, I transformed  the output delta to a Gray code (a^(a>>1)) so a string of 1's (as  is commonly produced by subtraction) look like a single 1-bit  difference.* the base values were pseudorandom, all zero but one bit set, or   all zero plus a counter that starts at zero.These constants passed: 14 11 25 16 4 14 24 12 14 25 16 4 14 24and these came close:  4  8 15 26 3 22 24 10  8 15 26 3 22 24 11  8 15 26 3 22 24-------------------------------------------------------------------------------*/#define final(a,b,c) \{ \  c ^= b; c -= rot(b,14); \  a ^= c; a -= rot(c,11); \  b ^= a; b -= rot(a,25); \  c ^= b; c -= rot(b,16); \  a ^= c; a -= rot(c,4);  \  b ^= a; b -= rot(a,14); \  c ^= b; c -= rot(b,24); \}/*-------------------------------------------------------------------- This works on all machines.  To be useful, it requires -- that the key be an array of uint32_t's, and -- that the length be the number of uint32_t's in the key The function hashword() is identical to hashlittle() on little-endian machines, and identical to hashbig() on big-endian machines, except that the length has to be measured in uint32_ts rather than in bytes.  hashlittle() is more complicated than hashword() only because hashlittle() has to dance around fitting the key bytes into registers.--------------------------------------------------------------------*/uint32_t hashword(const uint32_t *k,                   /* the key, an array of uint32_t values */size_t          length,               /* the length of the key, in uint32_ts */uint32_t        initval)         /* the previous hash, or an arbitrary value */{  uint32_t a,b,c;  /* Set up the internal state */  a = b = c = 0xdeadbeef + (((uint32_t)length)<<2) + initval;  /*------------------------------------------------- handle most of the key */  while (length > 3)  {    a += k[0];    b += k[1];    c += k[2];    mix(a,b,c);    length -= 3;    k += 3;  }  /*------------------------------------------- handle the last 3 uint32_t's */  switch(length)                     /* all the case statements fall through */  {   case 3 : c+=k[2];  case 2 : b+=k[1];  case 1 : a+=k[0];    final(a,b,c);  case 0:     /* case 0: nothing left to add */    break;  }  /*------------------------------------------------------ report the result */  return c;}/*--------------------------------------------------------------------hashword2() -- same as hashword(), but take two seeds and return two32-bit values.  pc and pb must both be nonnull, and *pc and *pb mustboth be initialized with seeds.  If you pass in (*pb)==0, the output (*pc) will be the same as the return value from hashword().--------------------------------------------------------------------*/void hashword2 (const uint32_t *k,                   /* the key, an array of uint32_t values */size_t          length,               /* the length of the key, in uint32_ts */uint32_t       *pc,                      /* IN: seed OUT: primary hash value */uint32_t       *pb)               /* IN: more seed OUT: secondary hash value */{  uint32_t a,b,c;  /* Set up the internal state */  a = b = c = 0xdeadbeef + ((uint32_t)(length<<2)) + *pc;  c += *pb;  /*------------------------------------------------- handle most of the key */  while (length > 3)  {    a += k[0];    b += k[1];    c += k[2];    mix(a,b,c);    length -= 3;    k += 3;  }  /*------------------------------------------- handle the last 3 uint32_t's */  switch(length)                     /* all the case statements fall through */  {   case 3 : c+=k[2];  case 2 : b+=k[1];  case 1 : a+=k[0];    final(a,b,c);  case 0:     /* case 0: nothing left to add */    break;  }  /*------------------------------------------------------ report the result */  *pc=c; *pb=b;}/*-------------------------------------------------------------------------------hashlittle() -- hash a variable-length key into a 32-bit value  k       : the key (the unaligned variable-length array of bytes)  length  : the length of the key, counting by bytes  initval : can be any 4-byte valueReturns a 32-bit value.  Every bit of the key affects every bit ofthe return value.  Two keys differing by one or two bits will havetotally different hash values.The best hash table sizes are powers of 2.  There is no need to domod a prime (mod is sooo slow!).  If you need less than 32 bits,use a bitmask.  For example, if you need only 10 bits, do  h = (h & hashmask(10));In which case, the hash table should have hashsize(10) elements.If you are hashing n strings (uint8_t **)k, do it like this:  for (i=0, h=0; i<n; ++i) h = hashlittle( k[i], len[i], h);By Bob Jenkins, 2006.  bob_jenkins@burtleburtle.net.  You may use thiscode any way you wish, private, educational, or commercial.  It's free.Use for hash table lookup, or anything where one collision in 2^^32 isacceptable.  Do NOT use for cryptographic purposes.-------------------------------------------------------------------------------*/uint32_t hashlittle( const void *key, size_t length, uint32_t initval){  uint32_t a,b,c;                                          /* internal state */  union { const void *ptr; size_t i; } u;     /* needed for Mac Powerbook G4 */  /* Set up the internal state */  a = b = c = 0xdeadbeef + ((uint32_t)length) + initval;  u.ptr = key;  if (HASH_LITTLE_ENDIAN && ((u.i & 0x3) == 0)) {    const uint32_t *k = (const uint32_t *)key;         /* read 32-bit chunks */    const uint8_t  *k8;    /*------ all but last block: aligned reads and affect 32 bits of (a,b,c) */    while (length > 12)    {      a += k[0];      b += k[1];      c += k[2];      mix(a,b,c);      length -= 12;      k += 3;    }    /*----------------------------- handle the last (probably partial) block */    /*      * "k[2]&0xffffff" actually reads beyond the end of the string, but     * then masks off the part it's not allowed to read.  Because the     * string is aligned, the masked-off tail is in the same word as the     * rest of the string.  Every machine with memory protection I've seen     * does it on word boundaries, so is OK with this.  But VALGRIND will     * still catch it and complain.  The masking trick does make the hash     * noticably faster for short strings (like English words).     */#ifndef VALGRIND    switch(length)    {    case 12: c+=k[2]; b+=k[1]; a+=k[0]; break;    case 11: c+=k[2]&0xffffff; b+=k[1]; a+=k[0]; break;    case 10: c+=k[2]&0xffff; b+=k[1]; a+=k[0]; break;    case 9 : c+=k[2]&0xff; b+=k[1]; a+=k[0]; break;    case 8 : b+=k[1]; a+=k[0]; break;    case 7 : b+=k[1]&0xffffff; a+=k[0]; break;    case 6 : b+=k[1]&0xffff; a+=k[0]; break;    case 5 : b+=k[1]&0xff; a+=k[0]; break;    case 4 : a+=k[0]; break;    case 3 : a+=k[0]&0xffffff; break;    case 2 : a+=k[0]&0xffff; break;    case 1 : a+=k[0]&0xff; break;    case 0 : return c;              /* zero length strings require no mixing */    }#else /* make valgrind happy */

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩精品一区二区三区老鸭窝| 欧美无人高清视频在线观看| www.亚洲在线| 欧美三级蜜桃2在线观看| 久久久精品黄色| 日韩精品福利网| 91福利社在线观看| 中文字幕不卡三区| 久久国产福利国产秒拍| 欧美色图12p| 国产精品福利电影一区二区三区四区| 久久精品久久综合| 欧美日韩精品一区二区在线播放| 国产精品免费久久| 国产精品资源在线观看| 欧美一区三区二区| 亚洲一区二区在线视频| 国产成人精品一区二区三区四区| 4438亚洲最大| 亚洲a一区二区| 欧美艳星brazzers| 1000精品久久久久久久久| 国产99精品视频| 精品对白一区国产伦| 久久精品国产免费看久久精品| 欧美日韩精品一区视频| 午夜精品久久久久久| 欧美网站一区二区| 亚洲午夜影视影院在线观看| 91成人看片片| 亚洲影院在线观看| 欧美精品乱人伦久久久久久| 亚洲一区二区av电影| 欧美熟乱第一页| 天天综合网 天天综合色| 欧美日韩中字一区| 午夜国产精品影院在线观看| 欧美挠脚心视频网站| 婷婷开心激情综合| 91精品国产91综合久久蜜臀| 日韩av成人高清| 日韩欧美不卡在线观看视频| 国产一区二区三区精品欧美日韩一区二区三区| 日韩亚洲欧美综合| 狂野欧美性猛交blacked| 久久综合色播五月| 成人app软件下载大全免费| 国产精品麻豆视频| 91传媒视频在线播放| 肉色丝袜一区二区| 欧美xxxxx牲另类人与| 粉嫩嫩av羞羞动漫久久久| 1区2区3区精品视频| 欧美视频自拍偷拍| 日韩成人精品视频| 久久久精品综合| 一本大道久久a久久综合| 日韩电影一区二区三区| 国产欧美一区二区三区在线看蜜臀| 99视频一区二区| 亚洲国产精品久久人人爱蜜臀| 91精品国产综合久久久蜜臀图片| 黄页网站大全一区二区| 亚洲伦理在线免费看| 日韩女优制服丝袜电影| 99久久久精品免费观看国产蜜| 亚洲成人久久影院| 国产午夜精品一区二区三区视频 | 偷拍亚洲欧洲综合| 欧美一级夜夜爽| 91在线视频网址| 美女视频免费一区| 国产精品88av| 久久久久国产成人精品亚洲午夜| 色婷婷精品大在线视频| 久草在线在线精品观看| 亚洲免费观看在线观看| 精品少妇一区二区三区视频免付费 | 精品国产乱码久久| 色女孩综合影院| 国产乱人伦偷精品视频免下载| 亚洲午夜免费电影| 欧美激情综合五月色丁香小说| 欧美久久久久久久久久| 不卡电影一区二区三区| 国产在线不卡一区| 日韩专区欧美专区| 亚洲愉拍自拍另类高清精品| 国产欧美日本一区二区三区| 91精品麻豆日日躁夜夜躁| 91视视频在线观看入口直接观看www| 免费一级片91| 天堂久久久久va久久久久| 亚洲视频免费在线| 国产三级三级三级精品8ⅰ区| 欧美一区二区在线看| 在线观看一区二区视频| eeuss鲁片一区二区三区在线观看 eeuss鲁片一区二区三区在线看 | 波多野结衣中文字幕一区 | 欧美羞羞免费网站| 丁香天五香天堂综合| 国产另类ts人妖一区二区| 久久国产三级精品| 另类小说欧美激情| 日本不卡在线视频| 视频一区二区三区中文字幕| 一区二区三区 在线观看视频| 亚洲欧洲精品天堂一级| 国产精品久久久久7777按摩| 国产欧美一区二区在线| 国产拍揄自揄精品视频麻豆| 精品久久人人做人人爽| 久久综合色天天久久综合图片| 日韩欧美国产系列| 欧美成人福利视频| 2021国产精品久久精品| 亚洲精品一区二区三区99| 久久免费电影网| 国产日韩欧美一区二区三区综合| 久久精品人人爽人人爽| 国产精品人人做人人爽人人添| 国产日韩欧美精品一区| 国产欧美1区2区3区| 国产精品国产三级国产| 中文字幕日韩一区| 一区二区高清在线| 午夜激情久久久| 免费视频一区二区| 九九**精品视频免费播放| 国产999精品久久久久久绿帽| 成人av网站免费| 91免费精品国自产拍在线不卡| 色哟哟国产精品免费观看| 欧美日韩夫妻久久| 日韩精品一区二区三区中文不卡| 精品噜噜噜噜久久久久久久久试看| 精品伦理精品一区| 国产精品每日更新在线播放网址 | 美女诱惑一区二区| 国产麻豆精品在线| 91福利在线导航| 日韩一二在线观看| 中文字幕av一区二区三区高| 亚洲制服丝袜av| 九色|91porny| 99国内精品久久| 91精品国产综合久久精品图片| 久久久www成人免费毛片麻豆| 亚洲三级电影全部在线观看高清| 亚洲1区2区3区视频| 国产一区视频在线看| 色婷婷av一区| wwww国产精品欧美| 亚洲成人午夜影院| 福利一区福利二区| 欧美精品在线观看一区二区| 久久久91精品国产一区二区三区| 亚洲裸体在线观看| 国模少妇一区二区三区| 欧美三级韩国三级日本一级| 国产人成亚洲第一网站在线播放| 亚洲综合色视频| 国产福利精品一区| 91精品国产欧美一区二区18| 国产精品久久久久久久久免费樱桃| 日韩精品久久理论片| 95精品视频在线| 精品va天堂亚洲国产| 午夜欧美视频在线观看| 不卡av电影在线播放| 久久久久国产精品免费免费搜索| 亚洲h在线观看| 色欧美88888久久久久久影院| 久久人人97超碰com| 日本中文字幕一区二区有限公司| 91香蕉国产在线观看软件| 久久这里只精品最新地址| 日韩国产欧美在线观看| 色素色在线综合| 国产精品丝袜91| 国产mv日韩mv欧美| 久久女同互慰一区二区三区| 日韩精品一区第一页| 欧美影视一区在线| 国产精品久久久久精k8| 成人黄色免费短视频| 国产婷婷色一区二区三区| 极品尤物av久久免费看| 欧美一区二区在线免费播放| 日日摸夜夜添夜夜添精品视频| 日本精品免费观看高清观看| 中文字幕欧美一| 成人一级黄色片| 日本一区二区综合亚洲| 成人自拍视频在线| 国产精品另类一区| av电影在线不卡| 综合久久给合久久狠狠狠97色 | 亚洲一区在线看| 欧美视频自拍偷拍|