Hashmap: Overflow Lists

In this short series of articles we will go to see how it is possible to create the Hashmap data structure in C.

In the implementation we're going to use the doubly concatenated lists as auxiliary data structures. Let's look at a possible implementation. 

Header file

Let's first have a look to what the .h file looks like.

Definition of a node

We define the node data structure as follows:

typedef struct node_t{
    struct node_t *prev;
    struct node_t *next;
    void *data;
    void *key;

We are therefore defining a new node_t data type. This new structure is composed of 4 fields:

  • prev, which represents the predecessor of the node in the list;
  • next, which represents the next node in the list;
  • date, which is the information represented by the node;
  • key is instead the node's identification key;

Both key and date fields have been declared as pointers to void as the idea is to make generic code that can be used under any circumstances.

Definition of the list data type

The list will have a definition like: 

typedef struct overflow_list{
node_t *head;
node_t *tail;
} overflow_list;

The idea is to keep a pointer at the head of the list and also at the tail, in order to perform the head and tail entries in constant time. 

Other useful definitions

It will be useful to make these two typedef.

typedef int (*CMPFUNC)(const void *, const void*);
typedef void (*PRNTFUNC)(const void *);

The first definition states a function pointer that I call CMPFUNC which has two void pointers as parameters. This function will be used later on to compare the two parameters which, in the real implementation, will have well-defined types.

The PRNTFUNC declaration is used to declare the type of a function that prints a pointer. It is necessary because the application I have created prints on the command line of printf, which is why we need to know what type the data you want to print is.

All the functions whose implementation I will provide must have a corresponding statement in the header file.

Function implementation

Creazione di un nodo

The first thing we need is a convenient function to create a new node.

node_t *create_node(void *k, void *d){
node_t *n = (node_t*)malloc(sizeof(node_t));
n -> data = d;
n -> key = k;
n -> next = NULL;
n -> prev = NULL;
return n;

create_node takes as parameter two pointers to void k and d which represent the key and the data stored in the node respectively. After executing the malloc to allocate the necessary space, we assign the parameters to the respective fields of the newly created node_t. The next and prev fields are set to NULL as the node has not yet been entered in the list, so we still don't know what value those two fields will have.

Creating a list

overflow_list *create_empty_doubly_linked_list(){
overflow_list *l = (overflow_list*)malloc(sizeof(overflow_list*));
l -> head = NULL;
l -> tail = NULL;
return l;

This function acts as a "constructor" for the list, allocating the list space and setting both the tail and the head to NULL.

The reason, however trivial, is that an empty list contains no elements, so the two fields will be null.

Inserimento di un elemento nella lista

void insert_item(overflow_list *l, void *k, void *v){
node_t *n = create_node(k, v);
if(l->head == NULL){
l->head = l->tail = n;
l->tail->next = n;
n->prev = l->tail;
l->tail = n;

The important thing to understand is the meaning of the parameters. The list l represents the list within which we want to make the insertion. The k and v fields are the data that will be stored in the node we will insert. Here we do not worry about the presence or absence of duplicates in the collection. Later on we will see a way to avoid the insertion of duplicate elements.

The algorithm is that of queued entries, which can be done in constant time by keeping and updating the pointer at the list queue.

Search for a key

We want to create a function that tells us whether or not an item is present in a list by making a comparison on the keys.

node_t *contains_key(node_t *head, void *k, CMPFUNC compare){
while(head!=NULL && compare(k, head->key) != 0){
head = head->next;
return head != NULL ? head : NULL;

The idea is to scroll through the list until you find the item in question or the list items are finished. 

We need the comparison function to appear as we cannot directly compare two pointers to void. At the end of the method we return the pointer to the node we found if NULL is not valid. We return NULL otherwise. 

Removing an element

To implement the removal, I have defined two auxiliary functions that take care of removing the element from the head or tail.

Head Cancellation

Let's see the delete algorithm from the head of a list.

void remove_from_beg(overflow_list *l){
node_t *temp;
if(l->head == NULL){
printf("Trying to delete from empty listn");
temp = l->head;
l->head = l->head->next;
l->head->prev = NULL;

The only thing to do is to update the pointer at the top of the list. I found it useful to store the node that is disconnecting from the list so that I can call up the free on that node.

You update the pointer to the head by enhancing it with its next element and set the prev field of the new head to NULL.

Queue cancellation

void remove_from_end(overflow_list *l){
node_t *temp;
printf("Trying to delete on empty listn");
temp = l->tail;
l->tail->prev->next = NULL;
l->tail = temp->prev;

L'idea è similare a quella della rimozione in testa, con l'unica differenza che si aggiorna il puntatore alla coda con il suo precedente.

Anche questa operazione viene eseguita in tempo costante.

Cancellation in any position

void remove_item(overflow_list *l, void *k, CMPFUNC compare){
node_t *temp = contains_key(l->head, k, compare);
if(temp == l->head){
}else if(temp == l->tail){
temp->prev->next = temp -> next;
temp->next->prev = temp->prev;

This function combines the two functions written before, adding the removal of an element that is not at the top and the bottom. 

So if the item you want to remove is the head or tail of the list, you call up the appropriate functions. If the item is central, we disconnect it from the list as shown in the image below.


The idea is therefore to "unlink" the knot, thus removing it from the list, then sewing the links so as not to unlink the list.


Having a data structure, research operations are indispensable to say the least. 

We will see two implementations: one iterative and one recursive.

Key search

node_t *contains_key(node_t *head, void *k, CMPFUNC compare){
  while(head!=NULL && compare(k, head->key) != 0){
    head = head->next;
  return head != NULL ? head : NULL;

The fundamental idea is to look for a knot in a list, scrolling the knots one by one starting from the head.

The while guard has this meaning: the cycle continues to iterate until the node we are examining is equal to NULL and until the comparison function gives us a value other than zero when comparing the parameter k and the key of the current node. 

At the end the value of the head parameter will be returned.

Search for a data

The principle of searching for data is exactly the same as that of searching for the key. However, the following implementation is recursive.

node_t *contains_data(node_t *head, void *d, CMPFUNC compare){
  if (head == NULL){
    return NULL;
  else if (compare(head->data, d)==0){
    return head;
    return contains_data(head->next, d, compare);

General scheme of scrolling through a list

In the search operations the scheme for scrolling the list is always the same, and it is the same every time you have to do operations that require scrolling the structure.

Let's see briefly what it is.

void run_through(overflow_list *l){
  node_t *temp = l -> head;
  while (temp != NULL) {
    temp = temp -> next;

We have a temp node that acts as a cursor. In the cycle, the instruction temp = temp -> next uses the node's next field to scroll through the various nodes.

In the next articles we'll look at how to use double-linked lists to implement hashmaps.

by Alessio Mungelli Date: 18-06-2020 programming c hashmap operations basics explanation tutorial source code hits : 84  
Alessio Mungelli

Alessio Mungelli

Computer Science student at UniTo (University of Turin), Network specializtion, blogger and writer. I am a kind of expert in Java desktop developement with interests in AI and web developement. Unix lover (but not Windows hater). I am interested in Linux scripting. I am very inquisitive and I love learning new stuffs.


Related Posts

Dark Mode on website using CSS and JavaScript

In today’s article we are going to learn how to build pretty much standard these days on the web pages and that is the alternative color mode and switching between…

A Java approach: The Cycles - Introduction

Hello everyone and welcome back! Until now, we have been talking about variables and selection structures, going to consider some of the fundamental aspects of these two concepts. Theoretically, to…

A Java Approach: Selection Structures - Use Cases

Hello everyone and welcome back! Up to now we have been concerned to make as complete an overview as possible of the fundamental concepts we need to approach the use…

JavaScript: Spread and Rest operators

In today’s article we are going to talk about one of the features of the ES6 version(ECMAScript 2015) of JavaScript which is Spread operator as well as Rest operator. These features…

A Java approach: boolean variables

The previous time, we talked extensively about Boolean variables, trying to outline the main operations that can be carried out at a practical level.  Of all the cases examined, we have…

A Java approach: condtional structures

Hello everyone and welcome back! The previous times we have introduced the concept of variable, trying to define some basic concepts about it.  However, some situations suggest that the concept of…

Hashmap: hashing, collisions and first functions

Today we are going to study some concepts closely related to hashmaps. The concepts we are going to see are hashing and collisions. Hashing The idea of hashing with chaining is to…

Javascript: what are callbacks and how to use them.

Today we are going to learn about a concept that is widely used in javascript and that is used quite a lot by today's frameworks, libraries, especially NodeJS. This is…

A Java approach: variables - use case

Hello all friends and welcome back! After the introduction made on the variables, we try to analyse some critical issues that may arise in quite common situations. Let's start by analysing…

A Java approach: variables

Hello everyone and welcome back! Today we will begin a journey that will lead us to study, and possibly review, what are the basics of programming. We will start by talking…

How to Unlock Secret Games in Chrome, Edge and Firefox

Your web browser is full of secrets. I usually spend a lot of time studying new features that I can unlock through pages like chrome://flags and about:config in the browser,…

TypeScript: The evolution of JavaScript

When you're involved in the development of a large project, programming languages like JavaScript don't seem to be the best solution. Their lack of elements such as Language Aids has…

We use our own and third-party cookies to improve our services, compile statistical information and analyze your browsing habits. This allows us to personalize the content we offer and to show you advertisements related to your preferences. By clicking "Accept all" you agree to the storage of cookies on your device to improve website navigation, analyse traffic and assist our marketing activities. You can also select "System Cookies Only" to accept only the cookies required for the website to function, or you can select the cookies you wish to activate by clicking on "settings".

Accept All Only sistem cookies Configuration