| 1 |
706 |
jeremybenn |
------------------------------------------------------------------------------
|
| 2 |
|
|
-- --
|
| 3 |
|
|
-- GNAT COMPILER COMPONENTS --
|
| 4 |
|
|
-- --
|
| 5 |
|
|
-- G N A T . P E R F E C T _ H A S H _ G E N E R A T O R S --
|
| 6 |
|
|
-- --
|
| 7 |
|
|
-- S p e c --
|
| 8 |
|
|
-- --
|
| 9 |
|
|
-- Copyright (C) 2002-2010, AdaCore --
|
| 10 |
|
|
-- --
|
| 11 |
|
|
-- GNAT is free software; you can redistribute it and/or modify it under --
|
| 12 |
|
|
-- terms of the GNU General Public License as published by the Free Soft- --
|
| 13 |
|
|
-- ware Foundation; either version 3, or (at your option) any later ver- --
|
| 14 |
|
|
-- sion. GNAT is distributed in the hope that it will be useful, but WITH- --
|
| 15 |
|
|
-- OUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY --
|
| 16 |
|
|
-- or FITNESS FOR A PARTICULAR PURPOSE. --
|
| 17 |
|
|
-- --
|
| 18 |
|
|
-- As a special exception under Section 7 of GPL version 3, you are granted --
|
| 19 |
|
|
-- additional permissions described in the GCC Runtime Library Exception, --
|
| 20 |
|
|
-- version 3.1, as published by the Free Software Foundation. --
|
| 21 |
|
|
-- --
|
| 22 |
|
|
-- You should have received a copy of the GNU General Public License and --
|
| 23 |
|
|
-- a copy of the GCC Runtime Library Exception along with this program; --
|
| 24 |
|
|
-- see the files COPYING3 and COPYING.RUNTIME respectively. If not, see --
|
| 25 |
|
|
-- <http://www.gnu.org/licenses/>. --
|
| 26 |
|
|
-- --
|
| 27 |
|
|
-- GNAT was originally developed by the GNAT team at New York University. --
|
| 28 |
|
|
-- Extensive contributions were provided by Ada Core Technologies Inc. --
|
| 29 |
|
|
-- --
|
| 30 |
|
|
------------------------------------------------------------------------------
|
| 31 |
|
|
|
| 32 |
|
|
-- This package provides a generator of static minimal perfect hash functions.
|
| 33 |
|
|
-- To understand what a perfect hash function is, we define several notions.
|
| 34 |
|
|
-- These definitions are inspired from the following paper:
|
| 35 |
|
|
|
| 36 |
|
|
-- Zbigniew J. Czech, George Havas, and Bohdan S. Majewski ``An Optimal
|
| 37 |
|
|
-- Algorithm for Generating Minimal Perfect Hash Functions'', Information
|
| 38 |
|
|
-- Processing Letters, 43(1992) pp.257-264, Oct.1992
|
| 39 |
|
|
|
| 40 |
|
|
-- Let W be a set of m words. A hash function h is a function that maps the
|
| 41 |
|
|
-- set of words W into some given interval I of integers [0, k-1], where k is
|
| 42 |
|
|
-- an integer, usually k >= m. h (w) where w is a word in W computes an
|
| 43 |
|
|
-- address or an integer from I for the storage or the retrieval of that
|
| 44 |
|
|
-- item. The storage area used to store items is known as a hash table. Words
|
| 45 |
|
|
-- for which the same address is computed are called synonyms. Due to the
|
| 46 |
|
|
-- existence of synonyms a situation called collision may arise in which two
|
| 47 |
|
|
-- items w1 and w2 have the same address. Several schemes for resolving
|
| 48 |
|
|
-- collisions are known. A perfect hash function is an injection from the word
|
| 49 |
|
|
-- set W to the integer interval I with k >= m. If k = m, then h is a minimal
|
| 50 |
|
|
-- perfect hash function. A hash function is order preserving if it puts
|
| 51 |
|
|
-- entries into the hash table in a prespecified order.
|
| 52 |
|
|
|
| 53 |
|
|
-- A minimal perfect hash function is defined by two properties:
|
| 54 |
|
|
|
| 55 |
|
|
-- Since no collisions occur each item can be retrieved from the table in
|
| 56 |
|
|
-- *one* probe. This represents the "perfect" property.
|
| 57 |
|
|
|
| 58 |
|
|
-- The hash table size corresponds to the exact size of W and *no larger*.
|
| 59 |
|
|
-- This represents the "minimal" property.
|
| 60 |
|
|
|
| 61 |
|
|
-- The functions generated by this package require the words to be known in
|
| 62 |
|
|
-- advance (they are "static" hash functions). The hash functions are also
|
| 63 |
|
|
-- order preserving. If w2 is inserted after w1 in the generator, then h (w1)
|
| 64 |
|
|
-- < h (w2). These hashing functions are convenient for use with realtime
|
| 65 |
|
|
-- applications.
|
| 66 |
|
|
|
| 67 |
|
|
package GNAT.Perfect_Hash_Generators is
|
| 68 |
|
|
|
| 69 |
|
|
Default_K_To_V : constant Float := 2.05;
|
| 70 |
|
|
-- Default ratio for the algorithm. When K is the number of keys, V =
|
| 71 |
|
|
-- (K_To_V) * K is the size of the main table of the hash function. To
|
| 72 |
|
|
-- converge, the algorithm requires K_To_V to be strictly greater than 2.0.
|
| 73 |
|
|
|
| 74 |
|
|
Default_Pkg_Name : constant String := "Perfect_Hash";
|
| 75 |
|
|
-- Default package name in which the hash function is defined
|
| 76 |
|
|
|
| 77 |
|
|
Default_Position : constant String := "";
|
| 78 |
|
|
-- The generator allows selection of the character positions used in the
|
| 79 |
|
|
-- hash function. By default, all positions are selected.
|
| 80 |
|
|
|
| 81 |
|
|
Default_Tries : constant Positive := 20;
|
| 82 |
|
|
-- This algorithm may not succeed to find a possible mapping on the first
|
| 83 |
|
|
-- try and may have to iterate a number of times. This constant bounds the
|
| 84 |
|
|
-- number of tries.
|
| 85 |
|
|
|
| 86 |
|
|
type Optimization is (Memory_Space, CPU_Time);
|
| 87 |
|
|
-- Optimize either the memory space or the execution time. Note: in
|
| 88 |
|
|
-- practice, the optimization mode has little effect on speed. The tables
|
| 89 |
|
|
-- are somewhat smaller with Memory_Space.
|
| 90 |
|
|
|
| 91 |
|
|
Verbose : Boolean := False;
|
| 92 |
|
|
-- Output the status of the algorithm. For instance, the tables, the random
|
| 93 |
|
|
-- graph (edges, vertices) and selected char positions are output between
|
| 94 |
|
|
-- two iterations.
|
| 95 |
|
|
|
| 96 |
|
|
procedure Initialize
|
| 97 |
|
|
(Seed : Natural;
|
| 98 |
|
|
K_To_V : Float := Default_K_To_V;
|
| 99 |
|
|
Optim : Optimization := Memory_Space;
|
| 100 |
|
|
Tries : Positive := Default_Tries);
|
| 101 |
|
|
-- Initialize the generator and its internal structures. Set the ratio of
|
| 102 |
|
|
-- vertices over keys in the random graphs. This value has to be greater
|
| 103 |
|
|
-- than 2.0 in order for the algorithm to succeed. The word set is not
|
| 104 |
|
|
-- modified (in particular when it is already set). For instance, it is
|
| 105 |
|
|
-- possible to run several times the generator with different settings on
|
| 106 |
|
|
-- the same words.
|
| 107 |
|
|
--
|
| 108 |
|
|
-- A classical way of doing is to Insert all the words and then to invoke
|
| 109 |
|
|
-- Initialize and Compute. If Compute fails to find a perfect hash
|
| 110 |
|
|
-- function, invoke Initialize another time with other configuration
|
| 111 |
|
|
-- parameters (probably with a greater K_To_V ratio). Once successful,
|
| 112 |
|
|
-- invoke Produce and Finalize.
|
| 113 |
|
|
|
| 114 |
|
|
procedure Finalize;
|
| 115 |
|
|
-- Deallocate the internal structures and the words table
|
| 116 |
|
|
|
| 117 |
|
|
procedure Insert (Value : String);
|
| 118 |
|
|
-- Insert a new word into the table. ASCII.NUL characters are not allowed.
|
| 119 |
|
|
|
| 120 |
|
|
Too_Many_Tries : exception;
|
| 121 |
|
|
-- Raised after Tries unsuccessful runs
|
| 122 |
|
|
|
| 123 |
|
|
procedure Compute (Position : String := Default_Position);
|
| 124 |
|
|
-- Compute the hash function. Position allows to define selection of
|
| 125 |
|
|
-- character positions used in the word hash function. Positions can be
|
| 126 |
|
|
-- separated by commas and ranges like x-y may be used. Character '$'
|
| 127 |
|
|
-- represents the final character of a word. With an empty position, the
|
| 128 |
|
|
-- generator automatically produces positions to reduce the memory usage.
|
| 129 |
|
|
-- Raise Too_Many_Tries if the algorithm does not succeed within Tries
|
| 130 |
|
|
-- attempts (see Initialize).
|
| 131 |
|
|
|
| 132 |
|
|
procedure Produce
|
| 133 |
|
|
(Pkg_Name : String := Default_Pkg_Name;
|
| 134 |
|
|
Use_Stdout : Boolean := False);
|
| 135 |
|
|
-- Generate the hash function package Pkg_Name. This package includes the
|
| 136 |
|
|
-- minimal perfect Hash function. The output is normally placed in the
|
| 137 |
|
|
-- current directory, in files X.ads and X.adb, where X is the standard
|
| 138 |
|
|
-- GNAT file name for a package named Pkg_Name. If Use_Stdout is True, the
|
| 139 |
|
|
-- output goes to standard output, and no files are written.
|
| 140 |
|
|
|
| 141 |
|
|
----------------------------------------------------------------
|
| 142 |
|
|
|
| 143 |
|
|
-- The routines and structures defined below allow producing the hash
|
| 144 |
|
|
-- function using a different way from the procedure above. The procedure
|
| 145 |
|
|
-- Define returns the lengths of an internal table and its item type size.
|
| 146 |
|
|
-- The function Value returns the value of each item in the table.
|
| 147 |
|
|
|
| 148 |
|
|
-- The hash function has the following form:
|
| 149 |
|
|
|
| 150 |
|
|
-- h (w) = (g (f1 (w)) + g (f2 (w))) mod m
|
| 151 |
|
|
|
| 152 |
|
|
-- G is a function based on a graph table [0,n-1] -> [0,m-1]. m is the
|
| 153 |
|
|
-- number of keys. n is an internally computed value and it can be obtained
|
| 154 |
|
|
-- as the length of vector G.
|
| 155 |
|
|
|
| 156 |
|
|
-- F1 and F2 are two functions based on two function tables T1 and T2.
|
| 157 |
|
|
-- Their definition depends on the chosen optimization mode.
|
| 158 |
|
|
|
| 159 |
|
|
-- Only some character positions are used in the words because they are
|
| 160 |
|
|
-- significant. They are listed in a character position table (P in the
|
| 161 |
|
|
-- pseudo-code below). For instance, in {"jan", "feb", "mar", "apr", "jun",
|
| 162 |
|
|
-- "jul", "aug", "sep", "oct", "nov", "dec"}, only positions 2 and 3 are
|
| 163 |
|
|
-- significant (the first character can be ignored). In this example, P =
|
| 164 |
|
|
-- {2, 3}
|
| 165 |
|
|
|
| 166 |
|
|
-- When Optimization is CPU_Time, the first dimension of T1 and T2
|
| 167 |
|
|
-- corresponds to the character position in the word and the second to the
|
| 168 |
|
|
-- character set. As all the character set is not used, we define a used
|
| 169 |
|
|
-- character table which associates a distinct index to each used character
|
| 170 |
|
|
-- (unused characters are mapped to zero). In this case, the second
|
| 171 |
|
|
-- dimension of T1 and T2 is reduced to the used character set (C in the
|
| 172 |
|
|
-- pseudo-code below). Therefore, the hash function has the following:
|
| 173 |
|
|
|
| 174 |
|
|
-- function Hash (S : String) return Natural is
|
| 175 |
|
|
-- F : constant Natural := S'First - 1;
|
| 176 |
|
|
-- L : constant Natural := S'Length;
|
| 177 |
|
|
-- F1, F2 : Natural := 0;
|
| 178 |
|
|
-- J : <t>;
|
| 179 |
|
|
|
| 180 |
|
|
-- begin
|
| 181 |
|
|
-- for K in P'Range loop
|
| 182 |
|
|
-- exit when L < P (K);
|
| 183 |
|
|
-- J := C (S (P (K) + F));
|
| 184 |
|
|
-- F1 := (F1 + Natural (T1 (K, J))) mod <n>;
|
| 185 |
|
|
-- F2 := (F2 + Natural (T2 (K, J))) mod <n>;
|
| 186 |
|
|
-- end loop;
|
| 187 |
|
|
|
| 188 |
|
|
-- return (Natural (G (F1)) + Natural (G (F2))) mod <m>;
|
| 189 |
|
|
-- end Hash;
|
| 190 |
|
|
|
| 191 |
|
|
-- When Optimization is Memory_Space, the first dimension of T1 and T2
|
| 192 |
|
|
-- corresponds to the character position in the word and the second
|
| 193 |
|
|
-- dimension is ignored. T1 and T2 are no longer matrices but vectors.
|
| 194 |
|
|
-- Therefore, the used character table is not available. The hash function
|
| 195 |
|
|
-- has the following form:
|
| 196 |
|
|
|
| 197 |
|
|
-- function Hash (S : String) return Natural is
|
| 198 |
|
|
-- F : constant Natural := S'First - 1;
|
| 199 |
|
|
-- L : constant Natural := S'Length;
|
| 200 |
|
|
-- F1, F2 : Natural := 0;
|
| 201 |
|
|
-- J : <t>;
|
| 202 |
|
|
|
| 203 |
|
|
-- begin
|
| 204 |
|
|
-- for K in P'Range loop
|
| 205 |
|
|
-- exit when L < P (K);
|
| 206 |
|
|
-- J := Character'Pos (S (P (K) + F));
|
| 207 |
|
|
-- F1 := (F1 + Natural (T1 (K) * J)) mod <n>;
|
| 208 |
|
|
-- F2 := (F2 + Natural (T2 (K) * J)) mod <n>;
|
| 209 |
|
|
-- end loop;
|
| 210 |
|
|
|
| 211 |
|
|
-- return (Natural (G (F1)) + Natural (G (F2))) mod <m>;
|
| 212 |
|
|
-- end Hash;
|
| 213 |
|
|
|
| 214 |
|
|
type Table_Name is
|
| 215 |
|
|
(Character_Position,
|
| 216 |
|
|
Used_Character_Set,
|
| 217 |
|
|
Function_Table_1,
|
| 218 |
|
|
Function_Table_2,
|
| 219 |
|
|
Graph_Table);
|
| 220 |
|
|
|
| 221 |
|
|
procedure Define
|
| 222 |
|
|
(Name : Table_Name;
|
| 223 |
|
|
Item_Size : out Natural;
|
| 224 |
|
|
Length_1 : out Natural;
|
| 225 |
|
|
Length_2 : out Natural);
|
| 226 |
|
|
-- Return the definition of the table Name. This includes the length of
|
| 227 |
|
|
-- dimensions 1 and 2 and the size of an unsigned integer item. When
|
| 228 |
|
|
-- Length_2 is zero, the table has only one dimension. All the ranges
|
| 229 |
|
|
-- start from zero.
|
| 230 |
|
|
|
| 231 |
|
|
function Value
|
| 232 |
|
|
(Name : Table_Name;
|
| 233 |
|
|
J : Natural;
|
| 234 |
|
|
K : Natural := 0) return Natural;
|
| 235 |
|
|
-- Return the value of the component (I, J) of the table Name. When the
|
| 236 |
|
|
-- table has only one dimension, J is ignored.
|
| 237 |
|
|
|
| 238 |
|
|
end GNAT.Perfect_Hash_Generators;
|