| /** | 
 |  * @file IxEthDBLearning.c | 
 |  *  | 
 |  * @par | 
 |  * IXP400 SW Release version 2.0 | 
 |  *  | 
 |  * -- Copyright Notice -- | 
 |  *  | 
 |  * @par | 
 |  * Copyright 2001-2005, Intel Corporation. | 
 |  * All rights reserved. | 
 |  *  | 
 |  * @par | 
 |  * Redistribution and use in source and binary forms, with or without | 
 |  * modification, are permitted provided that the following conditions | 
 |  * are met: | 
 |  * 1. Redistributions of source code must retain the above copyright | 
 |  *    notice, this list of conditions and the following disclaimer. | 
 |  * 2. Redistributions in binary form must reproduce the above copyright | 
 |  *    notice, this list of conditions and the following disclaimer in the | 
 |  *    documentation and/or other materials provided with the distribution. | 
 |  * 3. Neither the name of the Intel Corporation nor the names of its contributors | 
 |  *    may be used to endorse or promote products derived from this software | 
 |  *    without specific prior written permission. | 
 |  *  | 
 |  * @par | 
 |  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' | 
 |  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE | 
 |  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE | 
 |  * ARE DISCLAIMED.  IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE | 
 |  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL | 
 |  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS | 
 |  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) | 
 |  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT | 
 |  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY | 
 |  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 
 |  * SUCH DAMAGE. | 
 |  *  | 
 |  * @par | 
 |  * -- End of Copyright Notice -- | 
 |  */ | 
 |  | 
 | #include "IxEthDB_p.h" | 
 |  | 
 | /** | 
 |  * @brief hashes the mac address in a mac descriptor with a XOR function | 
 |  * | 
 |  * @param entry pointer to a mac descriptor to be hashed | 
 |  *  | 
 |  * This function only extracts the mac address and employs ixEthDBKeyXORHash() | 
 |  * to do the actual hashing. | 
 |  * Used only to add a whole entry to a hash table, as opposed to searching which | 
 |  * takes only a key and uses the key hashing directly. | 
 |  * | 
 |  * @see ixEthDBKeyXORHash() | 
 |  * | 
 |  * @return the hash value | 
 |  * | 
 |  * @internal | 
 |  */ | 
 | UINT32 ixEthDBEntryXORHash(void *entry) | 
 | { | 
 |     MacDescriptor *descriptor = (MacDescriptor *) entry; | 
 |  | 
 |     return ixEthDBKeyXORHash(descriptor->macAddress); | 
 | } | 
 |  | 
 | /** | 
 |  * @brief hashes a mac address | 
 |  * | 
 |  * @param key pointer to a 6 byte structure (typically an IxEthDBMacAddr pointer) | 
 |  * to be hashed | 
 |  * | 
 |  * Given a 6 bytes MAC address, the hash used is: | 
 |  * | 
 |  * hash(MAC[0:5]) = MAC[0:1] ^ MAC[2:3] ^ MAC[4:5] | 
 |  * | 
 |  * Used by the hash table to search and remove entries based | 
 |  * solely on their keys (mac addresses). | 
 |  * | 
 |  * @return the hash value | 
 |  * | 
 |  * @internal | 
 |  */ | 
 | UINT32 ixEthDBKeyXORHash(void *key) | 
 | { | 
 |     UINT32 hashValue; | 
 |     UINT8 *value = (UINT8 *) key; | 
 |      | 
 |     hashValue  = (value[5] << 8) | value[4]; | 
 |     hashValue ^= (value[3] << 8) | value[2]; | 
 |     hashValue ^= (value[1] << 8) | value[0]; | 
 |  | 
 |     return hashValue; | 
 | } | 
 |  | 
 | /** | 
 |  * @brief mac descriptor match function | 
 |  * | 
 |  * @param reference mac address (typically an IxEthDBMacAddr pointer) structure | 
 |  * @param entry pointer to a mac descriptor whose key (mac address) is to be  | 
 |  * matched against the reference key | 
 |  * | 
 |  * Used by the hash table to retrieve entries. Hashing entries can produce | 
 |  * collisions, i.e. descriptors with different mac addresses and the same | 
 |  * hash value, where this function is used to differentiate entries. | 
 |  * | 
 |  * @retval TRUE if the entry matches the reference key (equal addresses) | 
 |  * @retval FALSE if the entry does not match the reference key | 
 |  * | 
 |  * @internal | 
 |  */ | 
 | BOOL ixEthDBAddressMatch(void *reference, void *entry) | 
 | { | 
 |     return (ixEthDBAddressCompare(reference, ((MacDescriptor *) entry)->macAddress) == 0); | 
 | } | 
 |  | 
 | /** | 
 |  * @brief compares two mac addresses | 
 |  * | 
 |  * @param mac1 first mac address to compare | 
 |  * @param mac2 second mac address to compare | 
 |  *  | 
 |  * This comparison works in a similar way to strcmp, producing similar results. | 
 |  * Used to insert values keyed on mac addresses into binary search trees. | 
 |  * | 
 |  * @retval -1 if mac1 < mac2 | 
 |  * @retval 0 if ma1 == mac2 | 
 |  * @retval 1 if mac1 > mac2 | 
 |  */ | 
 | UINT32 ixEthDBAddressCompare(UINT8 *mac1, UINT8 *mac2) | 
 | { | 
 |     UINT32 local_index; | 
 |  | 
 |     for (local_index = 0 ; local_index < IX_IEEE803_MAC_ADDRESS_SIZE ; local_index++) | 
 |     { | 
 |         if (mac1[local_index] > mac2[local_index]) | 
 |         { | 
 |             return 1; | 
 |         } | 
 |         else if (mac1[local_index] < mac2[local_index]) | 
 |         { | 
 |             return -1; | 
 |         } | 
 |     } | 
 |  | 
 |     return 0; | 
 | } | 
 |  |