--- deliantra/server/common/shstr.C 2006/09/04 17:16:19 1.9 +++ deliantra/server/common/shstr.C 2006/09/12 20:55:40 1.18 @@ -1,3 +1,4 @@ + /* * shstr.C */ @@ -5,33 +6,40 @@ #include #include +#include + #include -#include "shstr.h" -#include "util.h" +#include "global.h" -typedef std::tr1::unordered_set HT; +typedef std::tr1::unordered_set , true> HT; static HT ht; -static const char *makevec (const char *s) +static const char * +makevec (const char *s) { int len = strlen (s); - const char *v = (const char *)(2 + (int *)malloc (sizeof (int) * 2 + len + 1)); + const char *v = (const char *) (2 + (int *)g_slice_alloc (sizeof (int) * 2 + len + 1)); shstr::length (v) = len; shstr::refcnt (v) = 1; - memcpy ((char *)v, s, len + 1); + memcpy ((char *) v, s, len + 1); return v; } -const char *shstr::null = makevec (""); +static const char * +makenull () +{ + const char *s = makevec ("(null)"); + shstr::length (s) = 0; + return s; +} -// what weird misoptimisation is this again? -const shstr undead_name ("undead"); +const char *shstr::null = makenull (); const char * shstr::find (const char *s) @@ -41,9 +49,7 @@ HT::iterator i = ht.find (s); - return i != ht.end () - ? *i - : 0; + return i != ht.end ()? *i : 0; } const char * @@ -68,6 +74,9 @@ void shstr::gc () { +return; //D +//D currently disabled: some datastructures might still store them +//D but their pointers will become invalidated static const char *curpos; HT::iterator i = curpos ? ht.find (curpos) : ht.begin (); @@ -91,10 +100,11 @@ { HT::iterator o = i++; const char *s = *o; + ht.erase (o); //printf ("GC %4d %3d %d >%s<%d\n", (int)ht.size (), n, shstr::refcnt (s), s, shstr::length (s)); - free (-2 + (int *)s); + g_slice_free1 (sizeof (int) * 2 + length (s) + 1, -2 + (int *) s); } else ++i; @@ -103,22 +113,27 @@ curpos = *i; } +shstr skill_names[NUM_SKILLS]; + +// what weird misoptimisation is this again? +const shstr undead_name ("undead"); + //TODO: this should of course not be here + /* buf_overflow() - we don't want to exceed the buffer size of * buf1 by adding on buf2! Returns true if overflow will occur. */ -int +int buf_overflow (const char *buf1, const char *buf2, int bufsize) { - int len1 = 0, len2 = 0; + int len1 = 0, len2 = 0; - if (buf1) - len1 = strlen (buf1); - if (buf2) - len2 = strlen (buf2); - if ((len1 + len2) >= bufsize) - return 1; - return 0; + if (buf1) + len1 = strlen (buf1); + if (buf2) + len2 = strlen (buf2); + if ((len1 + len2) >= bufsize) + return 1; + return 0; } -