1 | /* |
1 | /* |
2 | * Copyright (c) 2000-2003 Marc Alexander Lehmann <pcg@goof.com> |
2 | * Copyright (c) 2000-2005 Marc Alexander Lehmann <schmorp@schmorp.de> |
3 | * |
3 | * |
4 | * Redistribution and use in source and binary forms, with or without modifica- |
4 | * Redistribution and use in source and binary forms, with or without modifica- |
5 | * tion, are permitted provided that the following conditions are met: |
5 | * tion, are permitted provided that the following conditions are met: |
6 | * |
6 | * |
7 | * 1. Redistributions of source code must retain the above copyright notice, |
7 | * 1. Redistributions of source code must retain the above copyright notice, |
… | |
… | |
22 | * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; |
22 | * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; |
23 | * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, |
23 | * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, |
24 | * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTH- |
24 | * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTH- |
25 | * ERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
25 | * ERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED |
26 | * OF THE POSSIBILITY OF SUCH DAMAGE. |
26 | * OF THE POSSIBILITY OF SUCH DAMAGE. |
|
|
27 | * |
|
|
28 | * Alternatively, the contents of this file may be used under the terms of |
|
|
29 | * the GNU General Public License version 2 (the "GPL"), in which case the |
|
|
30 | * provisions of the GPL are applicable instead of the above. If you wish to |
|
|
31 | * allow the use of your version of this file only under the terms of the |
|
|
32 | * GPL and not to allow others to use your version of this file under the |
|
|
33 | * BSD license, indicate your decision by deleting the provisions above and |
|
|
34 | * replace them with the notice and other provisions required by the GPL. If |
|
|
35 | * you do not delete the provisions above, a recipient may use your version |
|
|
36 | * of this file under either the BSD or the GPL. |
27 | */ |
37 | */ |
28 | |
38 | |
29 | #include "lzfP.h" |
39 | #include "lzfP.h" |
30 | |
40 | |
31 | #define HSIZE (1 << (HLOG)) |
41 | #define HSIZE (1 << (HLOG)) |
… | |
… | |
34 | * don't play with this unless you benchmark! |
44 | * don't play with this unless you benchmark! |
35 | * decompression is not dependent on the hash function |
45 | * decompression is not dependent on the hash function |
36 | * the hashing function might seem strange, just believe me |
46 | * the hashing function might seem strange, just believe me |
37 | * it works ;) |
47 | * it works ;) |
38 | */ |
48 | */ |
|
|
49 | #ifndef FRST |
39 | #define FRST(p) (((p[0]) << 8) + p[1]) |
50 | # define FRST(p) (((p[0]) << 8) | p[1]) |
40 | #define NEXT(v,p) (((v) << 8) + p[2]) |
51 | # define NEXT(v,p) (((v) << 8) | p[2]) |
41 | #define IDX(h) ((((h ^ (h << 5)) >> (3*8 - HLOG)) + h*3) & (HSIZE - 1)) |
52 | # define IDX(h) ((((h ^ (h << 5)) >> (3*8 - HLOG)) - h*5) & (HSIZE - 1)) |
|
|
53 | #endif |
42 | /* |
54 | /* |
43 | * IDX works because it is very similar to a multiplicative hash, e.g. |
55 | * IDX works because it is very similar to a multiplicative hash, e.g. |
44 | * (h * 57321 >> (3*8 - HLOG)) |
56 | * ((h * 57321 >> (3*8 - HLOG)) & (HSIZE - 1)) |
|
|
57 | * the latter is also quite fast on newer CPUs, and sligthly better |
|
|
58 | * |
45 | * the next one is also quite good, albeit slow ;) |
59 | * the next one is also quite good, albeit slow ;) |
46 | * (int)(cos(h & 0xffffff) * 1e6) |
60 | * (int)(cos(h & 0xffffff) * 1e6) |
47 | */ |
61 | */ |
48 | |
62 | |
49 | #if 0 |
63 | #if 0 |
50 | /* original lzv-like hash function */ |
64 | /* original lzv-like hash function, much worse and thus slower */ |
51 | # define FRST(p) (p[0] << 5) ^ p[1] |
65 | # define FRST(p) (p[0] << 5) ^ p[1] |
52 | # define NEXT(v,p) ((v) << 5) ^ p[2] |
66 | # define NEXT(v,p) ((v) << 5) ^ p[2] |
53 | # define IDX(h) ((h) & (HSIZE - 1)) |
67 | # define IDX(h) ((h) & (HSIZE - 1)) |
54 | #endif |
68 | #endif |
55 | |
69 | |
… | |
… | |
59 | |
73 | |
60 | /* |
74 | /* |
61 | * compressed format |
75 | * compressed format |
62 | * |
76 | * |
63 | * 000LLLLL <L+1> ; literal |
77 | * 000LLLLL <L+1> ; literal |
64 | * LLLOOOOO oooooooo ; backref L |
78 | * LLLooooo oooooooo ; backref L |
65 | * 111OOOOO LLLLLLLL oooooooo ; backref L+7 |
79 | * 111ooooo LLLLLLLL oooooooo ; backref L+7 |
66 | * |
80 | * |
67 | */ |
81 | */ |
68 | |
82 | |
69 | unsigned int |
83 | unsigned int |
70 | lzf_compress (const void *const in_data, unsigned int in_len, |
84 | lzf_compress (const void *const in_data, unsigned int in_len, |
… | |
… | |
125 | /* match found at *ref++ */ |
139 | /* match found at *ref++ */ |
126 | unsigned int len = 2; |
140 | unsigned int len = 2; |
127 | unsigned int maxlen = in_end - ip - len; |
141 | unsigned int maxlen = in_end - ip - len; |
128 | maxlen = maxlen > MAX_REF ? MAX_REF : maxlen; |
142 | maxlen = maxlen > MAX_REF ? MAX_REF : maxlen; |
129 | |
143 | |
|
|
144 | if (op + lit + 1 + 3 >= out_end) |
|
|
145 | return 0; |
|
|
146 | |
130 | do |
147 | do |
131 | len++; |
148 | len++; |
132 | while (len < maxlen && ref[len] == ip[len]); |
149 | while (len < maxlen && ref[len] == ip[len]); |
133 | |
|
|
134 | if (op + lit + 1 + 3 >= out_end) |
|
|
135 | return 0; |
|
|
136 | |
150 | |
137 | if (lit) |
151 | if (lit) |
138 | { |
152 | { |
139 | *op++ = lit - 1; |
153 | *op++ = lit - 1; |
140 | lit = -lit; |
154 | lit = -lit; |
… | |
… | |
156 | *op++ = len - 7; |
170 | *op++ = len - 7; |
157 | } |
171 | } |
158 | |
172 | |
159 | *op++ = off; |
173 | *op++ = off; |
160 | |
174 | |
161 | #if ULTRA_FAST |
175 | #if ULTRA_FAST || VERY_FAST |
162 | ip += len; |
176 | ip += len; |
|
|
177 | #if VERY_FAST && !ULTRA_FAST |
|
|
178 | --ip; |
|
|
179 | #endif |
163 | hval = FRST (ip); |
180 | hval = FRST (ip); |
|
|
181 | |
164 | hval = NEXT (hval, ip); |
182 | hval = NEXT (hval, ip); |
165 | htab[IDX (hval)] = ip; |
183 | htab[IDX (hval)] = ip; |
166 | ip++; |
184 | ip++; |
|
|
185 | |
|
|
186 | #if VERY_FAST && !ULTRA_FAST |
|
|
187 | hval = NEXT (hval, ip); |
|
|
188 | htab[IDX (hval)] = ip; |
|
|
189 | ip++; |
|
|
190 | #endif |
167 | #else |
191 | #else |
168 | do |
192 | do |
169 | { |
193 | { |
170 | hval = NEXT (hval, ip); |
194 | hval = NEXT (hval, ip); |
171 | htab[IDX (hval)] = ip; |
195 | htab[IDX (hval)] = ip; |