1 /*
2 * Copyright 2006 Bob Jenkins
3 *
4 * Derived from public domain source, see
5 * <http://burtleburtle.net/bob/c/lookup3.c>:
6 *
7 * "lookup3.c, by Bob Jenkins, May 2006, Public Domain.
8 *
9 * These are functions for producing 32-bit hashes for hash table lookup...
10 * ...You can use this free for any purpose. It's in the public domain.
11 * It has no warranty."
12 *
13 * Copyright (c) 2014-2015 Solarflare Communications Inc.
14 * All rights reserved.
15 *
16 * Redistribution and use in source and binary forms, with or without
17 * modification, are permitted provided that the following conditions are met:
18 *
19 * 1. Redistributions of source code must retain the above copyright notice,
20 * this list of conditions and the following disclaimer.
21 * 2. Redistributions in binary form must reproduce the above copyright notice,
22 * this list of conditions and the following disclaimer in the documentation
23 * and/or other materials provided with the distribution.
24 *
25 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
26 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
27 * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
28 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR
29 * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
30 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
31 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
32 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
33 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
34 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE,
35 * EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 *
37 * The views and conclusions contained in the software and documentation are
38 * those of the authors and should not be interpreted as representing official
39 * policies, either expressed or implied, of the FreeBSD Project.
40 */
41
42 #include "efx.h"
43 #include "efx_impl.h"
44
45 /* Hash initial value */
46 #define EFX_HASH_INITIAL_VALUE 0xdeadbeef
47
48 /*
49 * Rotate a 32-bit value left
50 *
51 * Allow platform to provide an intrinsic or optimised routine and
52 * fall-back to a simple shift based implementation.
53 */
54 #if EFSYS_HAS_ROTL_DWORD
55
56 #define EFX_HASH_ROTATE(_value, _shift) \
57 EFSYS_ROTL_DWORD(_value, _shift)
58
59 #else
60
61 #define EFX_HASH_ROTATE(_value, _shift) \
62 (((_value) << (_shift)) | ((_value) >> (32 - (_shift))))
63
64 #endif
65
66 /* Mix three 32-bit values reversibly */
67 #define EFX_HASH_MIX(_a, _b, _c) \
68 do { \
69 _a -= _c; \
70 _a ^= EFX_HASH_ROTATE(_c, 4); \
71 _c += _b; \
72 _b -= _a; \
73 _b ^= EFX_HASH_ROTATE(_a, 6); \
74 _a += _c; \
75 _c -= _b; \
76 _c ^= EFX_HASH_ROTATE(_b, 8); \
77 _b += _a; \
78 _a -= _c; \
79 _a ^= EFX_HASH_ROTATE(_c, 16); \
80 _c += _b; \
81 _b -= _a; \
82 _b ^= EFX_HASH_ROTATE(_a, 19); \
83 _a += _c; \
84 _c -= _b; \
85 _c ^= EFX_HASH_ROTATE(_b, 4); \
86 _b += _a; \
87 _NOTE(CONSTANTCONDITION) \
88 } while (B_FALSE)
89
90 /* Final mixing of three 32-bit values into one (_c) */
91 #define EFX_HASH_FINALISE(_a, _b, _c) \
92 do { \
93 _c ^= _b; \
94 _c -= EFX_HASH_ROTATE(_b, 14); \
95 _a ^= _c; \
96 _a -= EFX_HASH_ROTATE(_c, 11); \
97 _b ^= _a; \
98 _b -= EFX_HASH_ROTATE(_a, 25); \
99 _c ^= _b; \
100 _c -= EFX_HASH_ROTATE(_b, 16); \
101 _a ^= _c; \
102 _a -= EFX_HASH_ROTATE(_c, 4); \
103 _b ^= _a; \
104 _b -= EFX_HASH_ROTATE(_a, 14); \
105 _c ^= _b; \
106 _c -= EFX_HASH_ROTATE(_b, 24); \
107 _NOTE(CONSTANTCONDITION) \
108 } while (B_FALSE)
109
110
111 /* Produce a 32-bit hash from 32-bit aligned input */
112 __checkReturn uint32_t
efx_hash_dwords(__in_ecount (count)uint32_t const * input,__in size_t count,__in uint32_t init)113 efx_hash_dwords(
114 __in_ecount(count) uint32_t const *input,
115 __in size_t count,
116 __in uint32_t init)
117 {
118 uint32_t a;
119 uint32_t b;
120 uint32_t c;
121
122 /* Set up the initial internal state */
123 a = b = c = EFX_HASH_INITIAL_VALUE +
124 (((uint32_t)count) * sizeof (uint32_t)) + init;
125
126 /* Handle all but the last three dwords of the input */
127 while (count > 3) {
128 a += input[0];
129 b += input[1];
130 c += input[2];
131 EFX_HASH_MIX(a, b, c);
132
133 count -= 3;
134 input += 3;
135 }
136
137 /* Handle the left-overs */
138 switch (count) {
139 case 3:
140 c += input[2];
141 /* FALLTHROUGH */
142 case 2:
143 b += input[1];
144 /* FALLTHROUGH */
145 case 1:
146 a += input[0];
147 EFX_HASH_FINALISE(a, b, c);
148 break;
149
150 case 0:
151 /* Should only get here if count parameter was zero */
152 break;
153 }
154
155 return (c);
156 }
157
158 #if EFSYS_IS_BIG_ENDIAN
159
160 /* Produce a 32-bit hash from arbitrarily aligned input */
161 __checkReturn uint32_t
efx_hash_bytes(__in_ecount (length)uint8_t const * input,__in size_t length,__in uint32_t init)162 efx_hash_bytes(
163 __in_ecount(length) uint8_t const *input,
164 __in size_t length,
165 __in uint32_t init)
166 {
167 uint32_t a;
168 uint32_t b;
169 uint32_t c;
170
171 /* Set up the initial internal state */
172 a = b = c = EFX_HASH_INITIAL_VALUE + (uint32_t)length + init;
173
174 /* Handle all but the last twelve bytes of the input */
175 while (length > 12) {
176 a += ((uint32_t)input[0]) << 24;
177 a += ((uint32_t)input[1]) << 16;
178 a += ((uint32_t)input[2]) << 8;
179 a += ((uint32_t)input[3]);
180 b += ((uint32_t)input[4]) << 24;
181 b += ((uint32_t)input[5]) << 16;
182 b += ((uint32_t)input[6]) << 8;
183 b += ((uint32_t)input[7]);
184 c += ((uint32_t)input[8]) << 24;
185 c += ((uint32_t)input[9]) << 16;
186 c += ((uint32_t)input[10]) << 8;
187 c += ((uint32_t)input[11]);
188 EFX_HASH_MIX(a, b, c);
189 length -= 12;
190 input += 12;
191 }
192
193 /* Handle the left-overs */
194 switch (length) {
195 case 12:
196 c += ((uint32_t)input[11]);
197 /* Fall-through */
198 case 11:
199 c += ((uint32_t)input[10]) << 8;
200 /* Fall-through */
201 case 10:
202 c += ((uint32_t)input[9]) << 16;
203 /* Fall-through */
204 case 9:
205 c += ((uint32_t)input[8]) << 24;
206 /* Fall-through */
207 case 8:
208 b += ((uint32_t)input[7]);
209 /* Fall-through */
210 case 7:
211 b += ((uint32_t)input[6]) << 8;
212 /* Fall-through */
213 case 6:
214 b += ((uint32_t)input[5]) << 16;
215 /* Fall-through */
216 case 5:
217 b += ((uint32_t)input[4]) << 24;
218 /* Fall-through */
219 case 4:
220 a += ((uint32_t)input[3]);
221 /* Fall-through */
222 case 3:
223 a += ((uint32_t)input[2]) << 8;
224 /* Fall-through */
225 case 2:
226 a += ((uint32_t)input[1]) << 16;
227 /* Fall-through */
228 case 1:
229 a += ((uint32_t)input[0]) << 24;
230 EFX_HASH_FINALISE(a, b, c);
231 break;
232
233 case 0:
234 /* Should only get here if length parameter was zero */
235 break;
236 }
237
238 return (c);
239 }
240
241 #elif EFSYS_IS_LITTLE_ENDIAN
242
243 /* Produce a 32-bit hash from arbitrarily aligned input */
244 __checkReturn uint32_t
efx_hash_bytes(__in_ecount (length)uint8_t const * input,__in size_t length,__in uint32_t init)245 efx_hash_bytes(
246 __in_ecount(length) uint8_t const *input,
247 __in size_t length,
248 __in uint32_t init)
249 {
250 uint32_t a;
251 uint32_t b;
252 uint32_t c;
253
254 /* Set up the initial internal state */
255 a = b = c = EFX_HASH_INITIAL_VALUE + (uint32_t)length + init;
256
257 /* Handle all but the last twelve bytes of the input */
258 while (length > 12) {
259 a += ((uint32_t)input[0]);
260 a += ((uint32_t)input[1]) << 8;
261 a += ((uint32_t)input[2]) << 16;
262 a += ((uint32_t)input[3]) << 24;
263 b += ((uint32_t)input[4]);
264 b += ((uint32_t)input[5]) << 8;
265 b += ((uint32_t)input[6]) << 16;
266 b += ((uint32_t)input[7]) << 24;
267 c += ((uint32_t)input[8]);
268 c += ((uint32_t)input[9]) << 8;
269 c += ((uint32_t)input[10]) << 16;
270 c += ((uint32_t)input[11]) << 24;
271 EFX_HASH_MIX(a, b, c);
272 length -= 12;
273 input += 12;
274 }
275
276 /* Handle the left-overs */
277 switch (length) {
278 case 12:
279 c += ((uint32_t)input[11]) << 24;
280 /* FALLTHROUGH */
281 case 11:
282 c += ((uint32_t)input[10]) << 16;
283 /* FALLTHROUGH */
284 case 10:
285 c += ((uint32_t)input[9]) << 8;
286 /* FALLTHROUGH */
287 case 9:
288 c += ((uint32_t)input[8]);
289 /* FALLTHROUGH */
290 case 8:
291 b += ((uint32_t)input[7]) << 24;
292 /* FALLTHROUGH */
293 case 7:
294 b += ((uint32_t)input[6]) << 16;
295 /* FALLTHROUGH */
296 case 6:
297 b += ((uint32_t)input[5]) << 8;
298 /* FALLTHROUGH */
299 case 5:
300 b += ((uint32_t)input[4]);
301 /* FALLTHROUGH */
302 case 4:
303 a += ((uint32_t)input[3]) << 24;
304 /* FALLTHROUGH */
305 case 3:
306 a += ((uint32_t)input[2]) << 16;
307 /* FALLTHROUGH */
308 case 2:
309 a += ((uint32_t)input[1]) << 8;
310 /* FALLTHROUGH */
311 case 1:
312 a += ((uint32_t)input[0]);
313 EFX_HASH_FINALISE(a, b, c);
314 break;
315
316 case 0:
317 /* Should only get here if length parameter was zero */
318 break;
319 }
320
321 return (c);
322 }
323
324 #else
325
326 #error "Neither of EFSYS_IS_{BIG,LITTLE}_ENDIAN is set"
327
328 #endif
329