]> git.ipfire.org Git - thirdparty/gcc.git/blob - gcc/ada/libgnat/a-chtgbk.adb
f567cd53e592fe9372155dd01299ed61e67acdd2
[thirdparty/gcc.git] / gcc / ada / libgnat / a-chtgbk.adb
1 ------------------------------------------------------------------------------
2 -- --
3 -- GNAT LIBRARY COMPONENTS --
4 -- --
5 -- ADA.CONTAINERS.HASH_TABLES.GENERIC_BOUNDED_KEYS --
6 -- --
7 -- B o d y --
8 -- --
9 -- Copyright (C) 2004-2019, Free Software Foundation, Inc. --
10 -- --
11 -- GNAT is free software; you can redistribute it and/or modify it under --
12 -- terms of the GNU General Public License as published by the Free Soft- --
13 -- ware Foundation; either version 3, or (at your option) any later ver- --
14 -- sion. GNAT is distributed in the hope that it will be useful, but WITH- --
15 -- OUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY --
16 -- or FITNESS FOR A PARTICULAR PURPOSE. --
17 -- --
18 -- As a special exception under Section 7 of GPL version 3, you are granted --
19 -- additional permissions described in the GCC Runtime Library Exception, --
20 -- version 3.1, as published by the Free Software Foundation. --
21 -- --
22 -- You should have received a copy of the GNU General Public License and --
23 -- a copy of the GCC Runtime Library Exception along with this program; --
24 -- see the files COPYING3 and COPYING.RUNTIME respectively. If not, see --
25 -- <http://www.gnu.org/licenses/>. --
26 -- --
27 -- This unit was originally developed by Matthew J Heaney. --
28 ------------------------------------------------------------------------------
29
30 package body Ada.Containers.Hash_Tables.Generic_Bounded_Keys is
31
32 pragma Warnings (Off, "variable ""Busy*"" is not referenced");
33 pragma Warnings (Off, "variable ""Lock*"" is not referenced");
34 -- See comment in Ada.Containers.Helpers
35
36 -----------------------------
37 -- Checked_Equivalent_Keys --
38 -----------------------------
39
40 function Checked_Equivalent_Keys
41 (HT : aliased in out Hash_Table_Type'Class;
42 Key : Key_Type;
43 Node : Count_Type) return Boolean
44 is
45 Lock : With_Lock (HT.TC'Unrestricted_Access);
46 begin
47 return Equivalent_Keys (Key, HT.Nodes (Node));
48 end Checked_Equivalent_Keys;
49
50 -------------------
51 -- Checked_Index --
52 -------------------
53
54 function Checked_Index
55 (HT : aliased in out Hash_Table_Type'Class;
56 Key : Key_Type) return Hash_Type
57 is
58 Lock : With_Lock (HT.TC'Unrestricted_Access);
59 begin
60 return HT.Buckets'First + Hash (Key) mod HT.Buckets'Length;
61 end Checked_Index;
62
63 --------------------------
64 -- Delete_Key_Sans_Free --
65 --------------------------
66
67 procedure Delete_Key_Sans_Free
68 (HT : in out Hash_Table_Type'Class;
69 Key : Key_Type;
70 X : out Count_Type)
71 is
72 Indx : Hash_Type;
73 Prev : Count_Type;
74
75 begin
76 if HT.Length = 0 then
77 X := 0;
78 return;
79 end if;
80
81 -- Per AI05-0022, the container implementation is required to detect
82 -- element tampering by a generic actual subprogram.
83
84 TC_Check (HT.TC);
85
86 Indx := Checked_Index (HT, Key);
87 X := HT.Buckets (Indx);
88
89 if X = 0 then
90 return;
91 end if;
92
93 if Checked_Equivalent_Keys (HT, Key, X) then
94 TC_Check (HT.TC);
95 HT.Buckets (Indx) := Next (HT.Nodes (X));
96 HT.Length := HT.Length - 1;
97 return;
98 end if;
99
100 loop
101 Prev := X;
102 X := Next (HT.Nodes (Prev));
103
104 if X = 0 then
105 return;
106 end if;
107
108 if Checked_Equivalent_Keys (HT, Key, X) then
109 TC_Check (HT.TC);
110 Set_Next (HT.Nodes (Prev), Next => Next (HT.Nodes (X)));
111 HT.Length := HT.Length - 1;
112 return;
113 end if;
114 end loop;
115 end Delete_Key_Sans_Free;
116
117 ----------
118 -- Find --
119 ----------
120
121 function Find
122 (HT : Hash_Table_Type'Class;
123 Key : Key_Type) return Count_Type
124 is
125 Indx : Hash_Type;
126 Node : Count_Type;
127
128 begin
129 if HT.Length = 0 then
130 return 0;
131 end if;
132
133 Indx := Checked_Index (HT'Unrestricted_Access.all, Key);
134
135 Node := HT.Buckets (Indx);
136 while Node /= 0 loop
137 if Checked_Equivalent_Keys
138 (HT'Unrestricted_Access.all, Key, Node)
139 then
140 return Node;
141 end if;
142 Node := Next (HT.Nodes (Node));
143 end loop;
144
145 return 0;
146 end Find;
147
148 --------------------------------
149 -- Generic_Conditional_Insert --
150 --------------------------------
151
152 procedure Generic_Conditional_Insert
153 (HT : in out Hash_Table_Type'Class;
154 Key : Key_Type;
155 Node : out Count_Type;
156 Inserted : out Boolean)
157 is
158 Indx : Hash_Type;
159
160 begin
161 -- Per AI05-0022, the container implementation is required to detect
162 -- element tampering by a generic actual subprogram.
163
164 TC_Check (HT.TC);
165
166 Indx := Checked_Index (HT, Key);
167 Node := HT.Buckets (Indx);
168
169 if Node = 0 then
170 if Checks and then HT.Length = HT.Capacity then
171 raise Capacity_Error with "no more capacity for insertion";
172 end if;
173
174 Node := New_Node;
175 Set_Next (HT.Nodes (Node), Next => 0);
176
177 Inserted := True;
178
179 HT.Buckets (Indx) := Node;
180 HT.Length := HT.Length + 1;
181
182 return;
183 end if;
184
185 loop
186 if Checked_Equivalent_Keys (HT, Key, Node) then
187 Inserted := False;
188 return;
189 end if;
190
191 Node := Next (HT.Nodes (Node));
192
193 exit when Node = 0;
194 end loop;
195
196 if Checks and then HT.Length = HT.Capacity then
197 raise Capacity_Error with "no more capacity for insertion";
198 end if;
199
200 Node := New_Node;
201 Set_Next (HT.Nodes (Node), Next => HT.Buckets (Indx));
202
203 Inserted := True;
204
205 HT.Buckets (Indx) := Node;
206 HT.Length := HT.Length + 1;
207 end Generic_Conditional_Insert;
208
209 -----------------------------
210 -- Generic_Replace_Element --
211 -----------------------------
212
213 procedure Generic_Replace_Element
214 (HT : in out Hash_Table_Type'Class;
215 Node : Count_Type;
216 Key : Key_Type)
217 is
218 pragma Assert (HT.Length > 0);
219 pragma Assert (Node /= 0);
220
221 BB : Buckets_Type renames HT.Buckets;
222 NN : Nodes_Type renames HT.Nodes;
223
224 Old_Indx : Hash_Type;
225 New_Indx : constant Hash_Type := Checked_Index (HT, Key);
226
227 New_Bucket : Count_Type renames BB (New_Indx);
228 N, M : Count_Type;
229
230 begin
231 -- Per AI05-0022, the container implementation is required to detect
232 -- element tampering by a generic actual subprogram.
233
234 -- The following block appears to be vestigial -- this should be done
235 -- using Checked_Index instead. Also, we might have to move the actual
236 -- tampering checks to the top of the subprogram, in order to prevent
237 -- infinite recursion when calling Hash. (This is similar to how Insert
238 -- and Delete are implemented.) This implies that we will have to defer
239 -- the computation of New_Index until after the tampering check. ???
240
241 declare
242 Lock : With_Lock (HT.TC'Unrestricted_Access);
243 begin
244 Old_Indx := HT.Buckets'First + Hash (NN (Node)) mod HT.Buckets'Length;
245 end;
246
247 -- Replace_Element is allowed to change a node's key to Key
248 -- (generic formal operation Assign provides the mechanism), but
249 -- only if Key is not already in the hash table. (In a unique-key
250 -- hash table as this one, a key is mapped to exactly one node.)
251
252 if Checked_Equivalent_Keys (HT, Key, Node) then
253 TE_Check (HT.TC);
254
255 -- The new Key value is mapped to this same Node, so Node
256 -- stays in the same bucket.
257
258 Assign (NN (Node), Key);
259 return;
260 end if;
261
262 -- Key is not equivalent to Node, so we now have to determine if it's
263 -- equivalent to some other node in the hash table. This is the case
264 -- irrespective of whether Key is in the same or a different bucket from
265 -- Node.
266
267 N := New_Bucket;
268 while N /= 0 loop
269 if Checks and then Checked_Equivalent_Keys (HT, Key, N) then
270 pragma Assert (N /= Node);
271 raise Program_Error with
272 "attempt to replace existing element";
273 end if;
274
275 N := Next (NN (N));
276 end loop;
277
278 -- We have determined that Key is not already in the hash table, so
279 -- the change is tentatively allowed. We now perform the standard
280 -- checks to determine whether the hash table is locked (because you
281 -- cannot change an element while it's in use by Query_Element or
282 -- Update_Element), or if the container is busy (because moving a
283 -- node to a different bucket would interfere with iteration).
284
285 if Old_Indx = New_Indx then
286 -- The node is already in the bucket implied by Key. In this case
287 -- we merely change its value without moving it.
288
289 TE_Check (HT.TC);
290
291 Assign (NN (Node), Key);
292 return;
293 end if;
294
295 -- The node is a bucket different from the bucket implied by Key
296
297 TC_Check (HT.TC);
298
299 -- Do the assignment first, before moving the node, so that if Assign
300 -- propagates an exception, then the hash table will not have been
301 -- modified (except for any possible side-effect Assign had on Node).
302
303 Assign (NN (Node), Key);
304
305 -- Now we can safely remove the node from its current bucket
306
307 N := BB (Old_Indx); -- get value of first node in old bucket
308 pragma Assert (N /= 0);
309
310 if N = Node then -- node is first node in its bucket
311 BB (Old_Indx) := Next (NN (Node));
312
313 else
314 pragma Assert (HT.Length > 1);
315
316 loop
317 M := Next (NN (N));
318 pragma Assert (M /= 0);
319
320 if M = Node then
321 Set_Next (NN (N), Next => Next (NN (Node)));
322 exit;
323 end if;
324
325 N := M;
326 end loop;
327 end if;
328
329 -- Now we link the node into its new bucket (corresponding to Key)
330
331 Set_Next (NN (Node), Next => New_Bucket);
332 New_Bucket := Node;
333 end Generic_Replace_Element;
334
335 -----------
336 -- Index --
337 -----------
338
339 function Index
340 (HT : Hash_Table_Type'Class;
341 Key : Key_Type) return Hash_Type is
342 begin
343 return HT.Buckets'First + Hash (Key) mod HT.Buckets'Length;
344 end Index;
345
346 end Ada.Containers.Hash_Tables.Generic_Bounded_Keys;