/*
 * xxHash - Extremely Fast Hash algorithm
 * Development source file for `xxh3`
 * Copyright (C) 2019-2020 Yann Collet
 *
 * BSD 2-Clause License (https://www.opensource.org/licenses/bsd-license.php)
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions are
 * met:
 *
 *    * Redistributions of source code must retain the above copyright
 *      notice, this list of conditions and the following disclaimer.
 *    * Redistributions in binary form must reproduce the above
 *      copyright notice, this list of conditions and the following disclaimer
 *      in the documentation and/or other materials provided with the
 *      distribution.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 *
 * You can contact the author at:
 *   - xxHash homepage: https://www.xxhash.com
 *   - xxHash source repository: https://github.com/Cyan4973/xxHash
 */

/*
 * Note: This file is separated for development purposes.
 * It will be integrated into `xxhash.h` when development stage is completed.
 *
 * Credit: most of the work on vectorial and asm variants comes from
 * @easyaspi314
 */

#ifndef XXH3_H_1397135465
#define XXH3_H_1397135465

/* ===   Dependencies   === */
#ifndef XXHASH_H_5627135585666179
  /* special: when including `xxh3.h` directly, turn on XXH_INLINE_ALL */
  #undef XXH_INLINE_ALL                               /* avoid redefinition */
  #define XXH_INLINE_ALL
#endif
#include "xxhash.h"

/* ===   Compiler specifics   === */

#if defined(__STDC_VERSION__) && __STDC_VERSION__ >= 199901L      /* >= C99 */
  #define XXH_RESTRICT restrict
#else
  /* Note: it might be useful to define __restrict or __restrict__ for some C++
   * compilers */
  #define XXH_RESTRICT                                           /* disable */
#endif

#if (defined(__GNUC__) && (__GNUC__ >= 3)) ||                   \
    (defined(__INTEL_COMPILER) && (__INTEL_COMPILER >= 800)) || \
    defined(__clang__)
  #define XXH_likely(x) __builtin_expect(x, 1)
  #define XXH_unlikely(x) __builtin_expect(x, 0)
#else
  #define XXH_likely(x) (x)
  #define XXH_unlikely(x) (x)
#endif

#if defined(__GNUC__)
  #if defined(__AVX2__)
    #include <immintrin.h>
  #elif defined(__SSE2__)
    #include <emmintrin.h>
  #elif defined(__ARM_NEON__) || defined(__ARM_NEON)
    #define inline __inline__                                  /* clang bug */
    #include <arm_neon.h>
    #undef inline
  #endif
#elif defined(_MSC_VER)
  #include <intrin.h>
#endif

/*
 * One goal of XXH3 is to make it fast on both 32-bit and 64-bit, while
 * remaining a true 64-bit/128-bit hash function.
 *
 * This is done by prioritizing a subset of 64-bit operations that can be
 * emulated without too many steps on the average 32-bit machine.
 *
 * For example, these two lines seem similar, and run equally fast on 64-bit:
 *
 *   xxh_u64 x;
 *   x ^= (x >> 47); // good
 *   x ^= (x >> 13); // bad
 *
 * However, to a 32-bit machine, there is a major difference.
 *
 * x ^= (x >> 47) looks like this:
 *
 *   x.lo ^= (x.hi >> (47 - 32));
 *
 * while x ^= (x >> 13) looks like this:
 *
 *   // note: funnel shifts are not usually cheap.
 *   x.lo ^= (x.lo >> 13) | (x.hi << (32 - 13));
 *   x.hi ^= (x.hi >> 13);
 *
 * The first one is significantly faster than the second, simply because the
 * shift is larger than 32. This means:
 *  - All the bits we need are in the upper 32 bits, so we can ignore the lower
 *    32 bits in the shift.
 *  - The shift result will always fit in the lower 32 bits, and therefore,
 *    we can ignore the upper 32 bits in the xor.
 *
 * Thanks to this optimization, XXH3 only requires these features to be
 * efficient:
 *
 *  - Usable unaligned access
 *  - A 32-bit or 64-bit ALU
 *      - If 32-bit, a decent ADC instruction
 *  - A 32 or 64-bit multiply with a 64-bit result
 *  - For the 128-bit variant, a decent byteswap helps short inputs.
 *
 * The first two are already required by XXH32, and almost all 32-bit and 64-bit
 * platforms which can run XXH32 can run XXH3 efficiently.
 *
 * Thumb-1, the classic 16-bit only subset of ARM's instruction set, is one
 * notable exception.
 *
 * First of all, Thumb-1 lacks support for the UMULL instruction which
 * performs the important long multiply. This means numerous __aeabi_lmul
 * calls.
 *
 * Second of all, the 8 functional registers are just not enough.
 * Setup for __aeabi_lmul, byteshift loads, pointers, and all arithmetic need
 * Lo registers, and this shuffling results in thousands more MOVs than A32.
 *
 * A32 and T32 don't have this limitation. They can access all 14 registers,
 * do a 32->64 multiply with UMULL, and the flexible operand allowing free
 * shifts is helpful, too.
 *
 * Therefore, we do a quick sanity check.
 *
 * If compiling Thumb-1 for a target which supports ARM instructions, we will
 * emit a warning, as it is not a "sane" platform to compile for.
 *
 * Usually, if this happens, it is because of an accident and you probably need
 * to specify -march, as you likely meant to compile for a newer architecture.
 */
#if defined(__thumb__) && !defined(__thumb2__) && defined(__ARM_ARCH_ISA_ARM)
  #warning "XXH3 is highly inefficient without ARM or Thumb-2."
#endif

/* ==========================================
 * Vectorization detection
 * ========================================== */
#define XXH_SCALAR 0                             /* Portable scalar version */
#define XXH_SSE2 1                     /* SSE2 for Pentium 4 and all x86_64 */
#define XXH_AVX2 2                        /* AVX2 for Haswell and Bulldozer */
#define XXH_AVX512 3                      /* AVX512 for Skylake and Icelake */
#define XXH_NEON 4                 /* NEON for most ARMv7-A and all AArch64 */
#define XXH_VSX 5                         /* VSX and ZVector for POWER8/z13 */

#ifndef XXH_VECTOR                        /* can be defined on command line */
  #if defined(__AVX512F__)
    #define XXH_VECTOR XXH_AVX512
  #elif defined(__AVX2__)
    #define XXH_VECTOR XXH_AVX2
  #elif defined(__SSE2__) || defined(_M_AMD64) || defined(_M_X64) || \
      (defined(_M_IX86_FP) && (_M_IX86_FP == 2))
    #define XXH_VECTOR XXH_SSE2
  #elif defined(__GNUC__) /* msvc support maybe later */                   \
      && (defined(__ARM_NEON__) || defined(__ARM_NEON)) &&                 \
      (defined(__LITTLE_ENDIAN__) /* We only support little endian NEON */ \
       ||                                                                  \
       (defined(__BYTE_ORDER__) && __BYTE_ORDER__ == __ORDER_LITTLE_ENDIAN__))
    #define XXH_VECTOR XXH_NEON
  #elif (defined(__PPC64__) && defined(__POWER8_VECTOR__)) || \
      (defined(__s390x__) && defined(__VEC__)) &&             \
          defined(__GNUC__)                                 /* TODO: IBM XL */
    #define XXH_VECTOR XXH_VSX
  #else
    #define XXH_VECTOR XXH_SCALAR
  #endif
#endif

/*
 * Controls the alignment of the accumulator,
 * for compatibility with aligned vector loads, which are usually faster.
 */
#ifndef XXH_ACC_ALIGN
  #if defined(XXH_X86DISPATCH)
    #define XXH_ACC_ALIGN 64               /* for compatibility with avx512 */
  #elif XXH_VECTOR == XXH_SCALAR                                  /* scalar */
    #define XXH_ACC_ALIGN 8
  #elif XXH_VECTOR == XXH_SSE2                                      /* sse2 */
    #define XXH_ACC_ALIGN 16
  #elif XXH_VECTOR == XXH_AVX2                                      /* avx2 */
    #define XXH_ACC_ALIGN 32
  #elif XXH_VECTOR == XXH_NEON                                      /* neon */
    #define XXH_ACC_ALIGN 16
  #elif XXH_VECTOR == XXH_VSX                                        /* vsx */
    #define XXH_ACC_ALIGN 16
  #elif XXH_VECTOR == XXH_AVX512                                  /* avx512 */
    #define XXH_ACC_ALIGN 64
  #endif
#endif

#if defined(XXH_X86DISPATCH) || XXH_VECTOR == XXH_SSE2 || \
    XXH_VECTOR == XXH_AVX2 || XXH_VECTOR == XXH_AVX512
  #define XXH_SEC_ALIGN XXH_ACC_ALIGN
#else
  #define XXH_SEC_ALIGN 8
#endif

/*
 * UGLY HACK:
 * GCC usually generates the best code with -O3 for xxHash.
 *
 * However, when targeting AVX2, it is overzealous in its unrolling resulting
 * in code roughly 3/4 the speed of Clang.
 *
 * There are other issues, such as GCC splitting _mm256_loadu_si256 into
 * _mm_loadu_si128 + _mm256_inserti128_si256. This is an optimization which
 * only applies to Sandy and Ivy Bridge... which don't even support AVX2.
 *
 * That is why when compiling the AVX2 version, it is recommended to use either
 *   -O2 -mavx2 -march=haswell
 * or
 *   -O2 -mavx2 -mno-avx256-split-unaligned-load
 * for decent performance, or to use Clang instead.
 *
 * Fortunately, we can control the first one with a pragma that forces GCC into
 * -O2, but the other one we can't control without "failed to inline always
 * inline function due to target mismatch" warnings.
 */
#if XXH_VECTOR == XXH_AVX2                      /* AVX2 */           \
    && defined(__GNUC__) && !defined(__clang__) /* GCC, not Clang */ \
    && defined(__OPTIMIZE__) &&                                      \
    !defined(__OPTIMIZE_SIZE__)                      /* respect -O0 and -Os */
  #pragma GCC push_options
  #pragma GCC optimize("-O2")
#endif

#if XXH_VECTOR == XXH_NEON
  /*
   * NEON's setup for vmlal_u32 is a little more complicated than it is on
   * SSE2, AVX2, and VSX.
   *
   * While PMULUDQ and VMULEUW both perform a mask, VMLAL.U32 performs an
   * upcast.
   *
   * To do the same operation, the 128-bit 'Q' register needs to be split into
   * two 64-bit 'D' registers, performing this operation::
   *
   *   [                a                 |                 b                ]
   *            |              '---------. .--------'                |
   *            |                         x                          |
   *            |              .---------' '--------.                |
   *   [ a & 0xFFFFFFFF | b & 0xFFFFFFFF ],[    a >> 32     |     b >> 32    ]
   *
   * Due to significant changes in aarch64, the fastest method for aarch64 is
   * completely different than the fastest method for ARMv7-A.
   *
   * ARMv7-A treats D registers as unions overlaying Q registers, so modifying
   * D11 will modify the high half of Q5. This is similar to how modifying AH
   * will only affect bits 8-15 of AX on x86.
   *
   * VZIP takes two registers, and puts even lanes in one register and odd lanes
   * in the other.
   *
   * On ARMv7-A, this strangely modifies both parameters in place instead of
   * taking the usual 3-operand form.
   *
   * Therefore, if we want to do this, we can simply use a D-form VZIP.32 on the
   * lower and upper halves of the Q register to end up with the high and low
   * halves where we want - all in one instruction.
   *
   *   vzip.32   d10, d11       @ d10 = { d10[0], d11[0] }; d11 = { d10[1],
   * d11[1] }
   *
   * Unfortunately we need inline assembly for this: Instructions modifying two
   * registers at once is not possible in GCC or Clang's IR, and they have to
   * create a copy.
   *
   * aarch64 requires a different approach.
   *
   * In order to make it easier to write a decent compiler for aarch64, many
   * quirks were removed, such as conditional execution.
   *
   * NEON was also affected by this.
   *
   * aarch64 cannot access the high bits of a Q-form register, and writes to a
   * D-form register zero the high bits, similar to how writes to W-form scalar
   * registers (or DWORD registers on x86_64) work.
   *
   * The formerly free vget_high intrinsics now require a vext (with a few
   * exceptions)
   *
   * Additionally, VZIP was replaced by ZIP1 and ZIP2, which are the equivalent
   * of PUNPCKL* and PUNPCKH* in SSE, respectively, in order to only modify one
   * operand.
   *
   * The equivalent of the VZIP.32 on the lower and upper halves would be this
   * mess:
   *
   *   ext     v2.4s, v0.4s, v0.4s, #2 // v2 = { v0[2], v0[3], v0[0], v0[1] }
   *   zip1    v1.2s, v0.2s, v2.2s     // v1 = { v0[0], v2[0] }
   *   zip2    v0.2s, v0.2s, v1.2s     // v0 = { v0[1], v2[1] }
   *
   * Instead, we use a literal downcast, vmovn_u64 (XTN), and vshrn_n_u64
   * (SHRN):
   *
   *   shrn    v1.2s, v0.2d, #32  // v1 = (uint32x2_t)(v0 >> 32);
   *   xtn     v0.2s, v0.2d       // v0 = (uint32x2_t)(v0 & 0xFFFFFFFF);
   *
   * This is available on ARMv7-A, but is less efficient than a single VZIP.32.
   */

  /*
   * Function-like macro:
   * void XXH_SPLIT_IN_PLACE(uint64x2_t &in, uint32x2_t &outLo, uint32x2_t
   * &outHi)
   * {

   *     outLo = (uint32x2_t)(in & 0xFFFFFFFF);
   *     outHi = (uint32x2_t)(in >> 32);
   *     in = UNDEFINED;
   * }
   */
  #if !defined(XXH_NO_VZIP_HACK) /* define to disable */ \
      && defined(__GNUC__) && !defined(__aarch64__) && !defined(__arm64__)
    #define XXH_SPLIT_IN_PLACE(in, outLo, outHi)                                                   \
      do {                                                                                         \
                                                                                                   \
        /* Undocumented GCC/Clang operand modifier: %e0 = lower D half, %f0 =                      \
         * upper D half */                                                                         \
        /* https://github.com/gcc-mirror/gcc/blob/38cf91e5/gcc/config/arm/arm.c#L22486             \
         */                                                                                        \
        /* https://github.com/llvm-mirror/llvm/blob/2c4ca683/lib/Target/ARM/ARMAsmPrinter.cpp#L399 \
         */                                                                                        \
        __asm__("vzip.32  %e0, %f0" : "+w"(in));                                                   \
        (outLo) = vget_low_u32(vreinterpretq_u32_u64(in));                                         \
        (outHi) = vget_high_u32(vreinterpretq_u32_u64(in));                                        \
                                                                                                   \
      } while (0)

  #else
    #define XXH_SPLIT_IN_PLACE(in, outLo, outHi) \
      do {                                       \
                                                 \
        (outLo) = vmovn_u64(in);                 \
        (outHi) = vshrn_n_u64((in), 32);         \
                                                 \
      } while (0)

  #endif
#endif                                            /* XXH_VECTOR == XXH_NEON */

/*
 * VSX and Z Vector helpers.
 *
 * This is very messy, and any pull requests to clean this up are welcome.
 *
 * There are a lot of problems with supporting VSX and s390x, due to
 * inconsistent intrinsics, spotty coverage, and multiple endiannesses.
 */
#if XXH_VECTOR == XXH_VSX
  #if defined(__s390x__)
    #include <s390intrin.h>
  #else
    #include <altivec.h>
  #endif

  #undef vector                                       /* Undo the pollution */

typedef __vector unsigned long long xxh_u64x2;
typedef __vector unsigned char      xxh_u8x16;
typedef __vector unsigned           xxh_u32x4;

  #ifndef XXH_VSX_BE
    #if defined(__BIG_ENDIAN__) || \
        (defined(__BYTE_ORDER__) && __BYTE_ORDER__ == __ORDER_BIG_ENDIAN__)
      #define XXH_VSX_BE 1
    #elif defined(__VEC_ELEMENT_REG_ORDER__) && \
        __VEC_ELEMENT_REG_ORDER__ == __ORDER_BIG_ENDIAN__
      #warning "-maltivec=be is not recommended. Please use native endianness."
      #define XXH_VSX_BE 1
    #else
      #define XXH_VSX_BE 0
    #endif
  #endif                                            /* !defined(XXH_VSX_BE) */

  #if XXH_VSX_BE
    /* A wrapper for POWER9's vec_revb. */
    #if defined(__POWER9_VECTOR__) || (defined(__clang__) && defined(__s390x__))
      #define XXH_vec_revb vec_revb
    #else
XXH_FORCE_INLINE xxh_u64x2 XXH_vec_revb(xxh_u64x2 val) {

  xxh_u8x16 const vByteSwap = {0x07, 0x06, 0x05, 0x04, 0x03, 0x02, 0x01, 0x00,
                               0x0F, 0x0E, 0x0D, 0x0C, 0x0B, 0x0A, 0x09, 0x08};
  return vec_perm(val, val, vByteSwap);

}

    #endif
  #endif                                                      /* XXH_VSX_BE */

/*
 * Performs an unaligned load and byte swaps it on big endian.
 */
XXH_FORCE_INLINE xxh_u64x2 XXH_vec_loadu(const void *ptr) {

  xxh_u64x2 ret;
  memcpy(&ret, ptr, sizeof(xxh_u64x2));
  #if XXH_VSX_BE
  ret = XXH_vec_revb(ret);
  #endif
  return ret;

}

  /*
   * vec_mulo and vec_mule are very problematic intrinsics on PowerPC
   *
   * These intrinsics weren't added until GCC 8, despite existing for a while,
   * and they are endian dependent. Also, their meaning swap depending on
   * version.
   * */
  #if defined(__s390x__)
    /* s390x is always big endian, no issue on this platform */
    #define XXH_vec_mulo vec_mulo
    #define XXH_vec_mule vec_mule
  #elif defined(__clang__) && XXH_HAS_BUILTIN(__builtin_altivec_vmuleuw)
    /* Clang has a better way to control this, we can just use the builtin which
     * doesn't swap. */
    #define XXH_vec_mulo __builtin_altivec_vmulouw
    #define XXH_vec_mule __builtin_altivec_vmuleuw
  #else
/* gcc needs inline assembly */
/* Adapted from
 * https://github.com/google/highwayhash/blob/master/highwayhash/hh_vsx.h. */
XXH_FORCE_INLINE xxh_u64x2 XXH_vec_mulo(xxh_u32x4 a, xxh_u32x4 b) {

  xxh_u64x2 result;
  __asm__("vmulouw %0, %1, %2" : "=v"(result) : "v"(a), "v"(b));
  return result;

}

XXH_FORCE_INLINE xxh_u64x2 XXH_vec_mule(xxh_u32x4 a, xxh_u32x4 b) {

  xxh_u64x2 result;
  __asm__("vmuleuw %0, %1, %2" : "=v"(result) : "v"(a), "v"(b));
  return result;

}

  #endif                                      /* XXH_vec_mulo, XXH_vec_mule */
#endif                                             /* XXH_VECTOR == XXH_VSX */

/* prefetch
 * can be disabled, by declaring XXH_NO_PREFETCH build macro */
#if defined(XXH_NO_PREFETCH)
  #define XXH_PREFETCH(ptr) (void)(ptr)                         /* disabled */
#else
  #if defined(_MSC_VER) && \
      (defined(_M_X64) ||  \
       defined(_M_I86)) /* _mm_prefetch() is not defined outside of x86/x64 */
    #include <mmintrin.h> /* https://msdn.microsoft.com/fr-fr/library/84szxsww(v=vs.90).aspx */
    #define XXH_PREFETCH(ptr) _mm_prefetch((const char *)(ptr), _MM_HINT_T0)
  #elif defined(__GNUC__) && \
      ((__GNUC__ >= 4) || ((__GNUC__ == 3) && (__GNUC_MINOR__ >= 1)))
    #define XXH_PREFETCH(ptr) \
      __builtin_prefetch((ptr), 0 /* rw==read */, 3 /* locality */)
  #else
    #define XXH_PREFETCH(ptr) (void)(ptr)                       /* disabled */
  #endif
#endif                                                   /* XXH_NO_PREFETCH */

/* ==========================================
 * XXH3 default settings
 * ========================================== */

#define XXH_SECRET_DEFAULT_SIZE 192         /* minimum XXH3_SECRET_SIZE_MIN */

#if (XXH_SECRET_DEFAULT_SIZE < XXH3_SECRET_SIZE_MIN)
  #error "default keyset is not large enough"
#endif

/* Pseudorandom secret taken directly from FARSH */
XXH_ALIGN(64)
static const xxh_u8 XXH3_kSecret[XXH_SECRET_DEFAULT_SIZE] = {

    0xb8, 0xfe, 0x6c, 0x39, 0x23, 0xa4, 0x4b, 0xbe, 0x7c, 0x01, 0x81, 0x2c,
    0xf7, 0x21, 0xad, 0x1c, 0xde, 0xd4, 0x6d, 0xe9, 0x83, 0x90, 0x97, 0xdb,
    0x72, 0x40, 0xa4, 0xa4, 0xb7, 0xb3, 0x67, 0x1f, 0xcb, 0x79, 0xe6, 0x4e,
    0xcc, 0xc0, 0xe5, 0x78, 0x82, 0x5a, 0xd0, 0x7d, 0xcc, 0xff, 0x72, 0x21,
    0xb8, 0x08, 0x46, 0x74, 0xf7, 0x43, 0x24, 0x8e, 0xe0, 0x35, 0x90, 0xe6,
    0x81, 0x3a, 0x26, 0x4c, 0x3c, 0x28, 0x52, 0xbb, 0x91, 0xc3, 0x00, 0xcb,
    0x88, 0xd0, 0x65, 0x8b, 0x1b, 0x53, 0x2e, 0xa3, 0x71, 0x64, 0x48, 0x97,
    0xa2, 0x0d, 0xf9, 0x4e, 0x38, 0x19, 0xef, 0x46, 0xa9, 0xde, 0xac, 0xd8,
    0xa8, 0xfa, 0x76, 0x3f, 0xe3, 0x9c, 0x34, 0x3f, 0xf9, 0xdc, 0xbb, 0xc7,
    0xc7, 0x0b, 0x4f, 0x1d, 0x8a, 0x51, 0xe0, 0x4b, 0xcd, 0xb4, 0x59, 0x31,
    0xc8, 0x9f, 0x7e, 0xc9, 0xd9, 0x78, 0x73, 0x64,

    0xea, 0xc5, 0xac, 0x83, 0x34, 0xd3, 0xeb, 0xc3, 0xc5, 0x81, 0xa0, 0xff,
    0xfa, 0x13, 0x63, 0xeb, 0x17, 0x0d, 0xdd, 0x51, 0xb7, 0xf0, 0xda, 0x49,
    0xd3, 0x16, 0x55, 0x26, 0x29, 0xd4, 0x68, 0x9e, 0x2b, 0x16, 0xbe, 0x58,
    0x7d, 0x47, 0xa1, 0xfc, 0x8f, 0xf8, 0xb8, 0xd1, 0x7a, 0xd0, 0x31, 0xce,
    0x45, 0xcb, 0x3a, 0x8f, 0x95, 0x16, 0x04, 0x28, 0xaf, 0xd7, 0xfb, 0xca,
    0xbb, 0x4b, 0x40, 0x7e,

};

#ifdef XXH_OLD_NAMES
  #define kSecret XXH3_kSecret
#endif

/*
 * Calculates a 32-bit to 64-bit long multiply.
 *
 * Wraps __emulu on MSVC x86 because it tends to call __allmul when it doesn't
 * need to (but it shouldn't need to anyways, it is about 7 instructions to do
 * a 64x64 multiply...). Since we know that this will _always_ emit MULL, we
 * use that instead of the normal method.
 *
 * If you are compiling for platforms like Thumb-1 and don't have a better
 * option, you may also want to write your own long multiply routine here.
 *
 * XXH_FORCE_INLINE xxh_u64 XXH_mult32to64(xxh_u64 x, xxh_u64 y)
 * {

 *    return (x & 0xFFFFFFFF) * (y & 0xFFFFFFFF);
 * }
 */
#if defined(_MSC_VER) && defined(_M_IX86)
  #include <intrin.h>
  #define XXH_mult32to64(x, y) __emulu((unsigned)(x), (unsigned)(y))
#else
  /*
   * Downcast + upcast is usually better than masking on older compilers like
   * GCC 4.2 (especially 32-bit ones), all without affecting newer compilers.
   *
   * The other method, (x & 0xFFFFFFFF) * (y & 0xFFFFFFFF), will AND both
   * operands and perform a full 64x64 multiply -- entirely redundant on 32-bit.
   */
  #define XXH_mult32to64(x, y) ((xxh_u64)(xxh_u32)(x) * (xxh_u64)(xxh_u32)(y))
#endif

/*
 * Calculates a 64->128-bit long multiply.
 *
 * Uses __uint128_t and _umul128 if available, otherwise uses a scalar version.
 */
static XXH128_hash_t XXH_mult64to128(xxh_u64 lhs, xxh_u64 rhs) {

  /*
   * GCC/Clang __uint128_t method.
   *
   * On most 64-bit targets, GCC and Clang define a __uint128_t type.
   * This is usually the best way as it usually uses a native long 64-bit
   * multiply, such as MULQ on x86_64 or MUL + UMULH on aarch64.
   *
   * Usually.
   *
   * Despite being a 32-bit platform, Clang (and emscripten) define this type
   * despite not having the arithmetic for it. This results in a laggy
   * compiler builtin call which calculates a full 128-bit multiply.
   * In that case it is best to use the portable one.
   * https://github.com/Cyan4973/xxHash/issues/211#issuecomment-515575677
   */
#if defined(__GNUC__) && !defined(__wasm__) && defined(__SIZEOF_INT128__) || \
    (defined(_INTEGRAL_MAX_BITS) && _INTEGRAL_MAX_BITS >= 128)

  __uint128_t const product = (__uint128_t)lhs * (__uint128_t)rhs;
  XXH128_hash_t     r128;
  r128.low64 = (xxh_u64)(product);
  r128.high64 = (xxh_u64)(product >> 64);
  return r128;

    /*
     * MSVC for x64's _umul128 method.
     *
     * xxh_u64 _umul128(xxh_u64 Multiplier, xxh_u64 Multiplicand, xxh_u64
     * *HighProduct);
     *
     * This compiles to single operand MUL on x64.
     */
#elif defined(_M_X64) || defined(_M_IA64)

  #ifndef _MSC_VER
    #pragma intrinsic(_umul128)
  #endif
  xxh_u64       product_high;
  xxh_u64 const product_low = _umul128(lhs, rhs, &product_high);
  XXH128_hash_t r128;
  r128.low64 = product_low;
  r128.high64 = product_high;
  return r128;

#else
  /*
   * Portable scalar method. Optimized for 32-bit and 64-bit ALUs.
   *
   * This is a fast and simple grade school multiply, which is shown below
   * with base 10 arithmetic instead of base 0x100000000.
   *
   *           9 3 // D2 lhs = 93
   *         x 7 5 // D2 rhs = 75
   *     ----------
   *           1 5 // D2 lo_lo = (93 % 10) * (75 % 10) = 15
   *         4 5 | // D2 hi_lo = (93 / 10) * (75 % 10) = 45
   *         2 1 | // D2 lo_hi = (93 % 10) * (75 / 10) = 21
   *     + 6 3 | | // D2 hi_hi = (93 / 10) * (75 / 10) = 63
   *     ---------
   *         2 7 | // D2 cross = (15 / 10) + (45 % 10) + 21 = 27
   *     + 6 7 | | // D2 upper = (27 / 10) + (45 / 10) + 63 = 67
   *     ---------
   *       6 9 7 5 // D4 res = (27 * 10) + (15 % 10) + (67 * 100) = 6975
   *
   * The reasons for adding the products like this are:
   *  1. It avoids manual carry tracking. Just like how
   *     (9 * 9) + 9 + 9 = 99, the same applies with this for UINT64_MAX.
   *     This avoids a lot of complexity.
   *
   *  2. It hints for, and on Clang, compiles to, the powerful UMAAL
   *     instruction available in ARM's Digital Signal Processing extension
   *     in 32-bit ARMv6 and later, which is shown below:
   *
   *         void UMAAL(xxh_u32 *RdLo, xxh_u32 *RdHi, xxh_u32 Rn, xxh_u32 Rm)
   *         {

   *             xxh_u64 product = (xxh_u64)*RdLo * (xxh_u64)*RdHi + Rn + Rm;
   *             *RdLo = (xxh_u32)(product & 0xFFFFFFFF);
   *             *RdHi = (xxh_u32)(product >> 32);
   *         }
   *
   *     This instruction was designed for efficient long multiplication, and
   *     allows this to be calculated in only 4 instructions at speeds
   *     comparable to some 64-bit ALUs.
   *
   *  3. It isn't terrible on other platforms. Usually this will be a couple
   *     of 32-bit ADD/ADCs.
   */

  /* First calculate all of the cross products. */
  xxh_u64 const lo_lo = XXH_mult32to64(lhs & 0xFFFFFFFF, rhs & 0xFFFFFFFF);
  xxh_u64 const hi_lo = XXH_mult32to64(lhs >> 32, rhs & 0xFFFFFFFF);
  xxh_u64 const lo_hi = XXH_mult32to64(lhs & 0xFFFFFFFF, rhs >> 32);
  xxh_u64 const hi_hi = XXH_mult32to64(lhs >> 32, rhs >> 32);

  /* Now add the products together. These will never overflow. */
  xxh_u64 const cross = (lo_lo >> 32) + (hi_lo & 0xFFFFFFFF) + lo_hi;
  xxh_u64 const upper = (hi_lo >> 32) + (cross >> 32) + hi_hi;
  xxh_u64 const lower = (cross << 32) | (lo_lo & 0xFFFFFFFF);

  XXH128_hash_t r128;
  r128.low64 = lower;
  r128.high64 = upper;
  return r128;
#endif

}

/*
 * Does a 64-bit to 128-bit multiply, then XOR folds it.
 *
 * The reason for the separate function is to prevent passing too many structs
 * around by value. This will hopefully inline the multiply, but we don't force
 * it.
 */
static xxh_u64 XXH3_mul128_fold64(xxh_u64 lhs, xxh_u64 rhs) {

  XXH128_hash_t product = XXH_mult64to128(lhs, rhs);
  return product.low64 ^ product.high64;

}

/* Seems to produce slightly better code on GCC for some reason. */
XXH_FORCE_INLINE xxh_u64 XXH_xorshift64(xxh_u64 v64, int shift) {

  XXH_ASSERT(0 <= shift && shift < 64);
  return v64 ^ (v64 >> shift);

}

/*
 * We don't need to (or want to) mix as much as XXH64.
 *
 * Short hashes are more evenly distributed, so it isn't necessary.
 */
static XXH64_hash_t XXH3_avalanche(xxh_u64 h64) {

  h64 = XXH_xorshift64(h64, 37);
  h64 *= 0x165667919E3779F9ULL;
  h64 = XXH_xorshift64(h64, 32);
  return h64;

}

/* ==========================================
 * Short keys
 * ==========================================
 * One of the shortcomings of XXH32 and XXH64 was that their performance was
 * sub-optimal on short lengths. It used an iterative algorithm which strongly
 * favored lengths that were a multiple of 4 or 8.
 *
 * Instead of iterating over individual inputs, we use a set of single shot
 * functions which piece together a range of lengths and operate in constant
 * time.
 *
 * Additionally, the number of multiplies has been significantly reduced. This
 * reduces latency, especially when emulating 64-bit multiplies on 32-bit.
 *
 * Depending on the platform, this may or may not be faster than XXH32, but it
 * is almost guaranteed to be faster than XXH64.
 */

/*
 * At very short lengths, there isn't enough input to fully hide secrets, or use
 * the entire secret.
 *
 * There is also only a limited amount of mixing we can do before significantly
 * impacting performance.
 *
 * Therefore, we use different sections of the secret and always mix two secret
 * samples with an XOR. This should have no effect on performance on the
 * seedless or withSeed variants because everything _should_ be constant folded
 * by modern compilers.
 *
 * The XOR mixing hides individual parts of the secret and increases entropy.
 *
 * This adds an extra layer of strength for custom secrets.
 */
XXH_FORCE_INLINE XXH64_hash_t XXH3_len_1to3_64b(const xxh_u8 *input, size_t len,
                                                const xxh_u8 *secret,
                                                XXH64_hash_t  seed) {

  XXH_ASSERT(input != NULL);
  XXH_ASSERT(1 <= len && len <= 3);
  XXH_ASSERT(secret != NULL);
  /*
   * len = 1: combined = { input[0], 0x01, input[0], input[0] }
   * len = 2: combined = { input[1], 0x02, input[0], input[1] }
   * len = 3: combined = { input[2], 0x03, input[0], input[1] }
   */
  {

    xxh_u8 const  c1 = input[0];
    xxh_u8 const  c2 = input[len >> 1];
    xxh_u8 const  c3 = input[len - 1];
    xxh_u32 const combined = ((xxh_u32)c1 << 16) | ((xxh_u32)c2 << 24) |
                             ((xxh_u32)c3 << 0) | ((xxh_u32)len << 8);
    xxh_u64 const bitflip =
        (XXH_readLE32(secret) ^ XXH_readLE32(secret + 4)) + seed;
    xxh_u64 const keyed = (xxh_u64)combined ^ bitflip;
    xxh_u64 const mixed = keyed * XXH_PRIME64_1;
    return XXH3_avalanche(mixed);

  }

}

XXH_FORCE_INLINE XXH64_hash_t XXH3_len_4to8_64b(const xxh_u8 *input, size_t len,
                                                const xxh_u8 *secret,
                                                XXH64_hash_t  seed) {

  XXH_ASSERT(input != NULL);
  XXH_ASSERT(secret != NULL);
  XXH_ASSERT(4 <= len && len < 8);
  seed ^= (xxh_u64)XXH_swap32((xxh_u32)seed) << 32;
  {

    xxh_u32 const input1 = XXH_readLE32(input);
    xxh_u32 const input2 = XXH_readLE32(input + len - 4);
    xxh_u64 const bitflip =
        (XXH_readLE64(secret + 8) ^ XXH_readLE64(secret + 16)) - seed;
    xxh_u64 const input64 = input2 + (((xxh_u64)input1) << 32);
    xxh_u64       x = input64 ^ bitflip;
    /* this mix is inspired by Pelle Evensen's rrmxmx */
    x ^= XXH_rotl64(x, 49) ^ XXH_rotl64(x, 24);
    x *= 0x9FB21C651E98DF25ULL;
    x ^= (x >> 35) + len;
    x *= 0x9FB21C651E98DF25ULL;
    return XXH_xorshift64(x, 28);

  }

}

XXH_FORCE_INLINE XXH64_hash_t XXH3_len_9to16_64b(const xxh_u8 *input,
                                                 size_t        len,
                                                 const xxh_u8 *secret,
                                                 XXH64_hash_t  seed) {

  XXH_ASSERT(input != NULL);
  XXH_ASSERT(secret != NULL);
  XXH_ASSERT(8 <= len && len <= 16);
  {

    xxh_u64 const bitflip1 =
        (XXH_readLE64(secret + 24) ^ XXH_readLE64(secret + 32)) + seed;
    xxh_u64 const bitflip2 =
        (XXH_readLE64(secret + 40) ^ XXH_readLE64(secret + 48)) - seed;
    xxh_u64 const input_lo = XXH_readLE64(input) ^ bitflip1;
    xxh_u64 const input_hi = XXH_readLE64(input + len - 8) ^ bitflip2;
    xxh_u64 const acc = len + XXH_swap64(input_lo) + input_hi +
                        XXH3_mul128_fold64(input_lo, input_hi);
    return XXH3_avalanche(acc);

  }

}

XXH_FORCE_INLINE XXH64_hash_t XXH3_len_0to16_64b(const xxh_u8 *input,
                                                 size_t        len,
                                                 const xxh_u8 *secret,
                                                 XXH64_hash_t  seed) {

  XXH_ASSERT(len <= 16);
  {

    if (XXH_likely(len > 8))
      return XXH3_len_9to16_64b(input, len, secret, seed);
    if (XXH_likely(len >= 4))
      return XXH3_len_4to8_64b(input, len, secret, seed);
    if (len) return XXH3_len_1to3_64b(input, len, secret, seed);
    return XXH3_avalanche((XXH_PRIME64_1 + seed) ^ (XXH_readLE64(secret + 56) ^
                                                    XXH_readLE64(secret + 64)));

  }

}

/*
 * DISCLAIMER: There are known *seed-dependent* multicollisions here due to
 * multiplication by zero, affecting hashes of lengths 17 to 240.
 *
 * However, they are very unlikely.
 *
 * Keep this in mind when using the unseeded XXH3_64bits() variant: As with all
 * unseeded non-cryptographic hashes, it does not attempt to defend itself
 * against specially crafted inputs, only random inputs.
 *
 * Compared to classic UMAC where a 1 in 2^31 chance of 4 consecutive bytes
 * cancelling out the secret is taken an arbitrary number of times (addressed
 * in XXH3_accumulate_512), this collision is very unlikely with random inputs
 * and/or proper seeding:
 *
 * This only has a 1 in 2^63 chance of 8 consecutive bytes cancelling out, in a
 * function that is only called up to 16 times per hash with up to 240 bytes of
 * input.
 *
 * This is not too bad for a non-cryptographic hash function, especially with
 * only 64 bit outputs.
 *
 * The 128-bit variant (which trades some speed for strength) is NOT affected
 * by this, although it is always a good idea to use a proper seed if you care
 * about strength.
 */
XXH_FORCE_INLINE xxh_u64 XXH3_mix16B(const xxh_u8 *XXH_RESTRICT input,
                                     const xxh_u8 *XXH_RESTRICT secret,
                                     xxh_u64                    seed64) {

#if defined(__GNUC__) && !defined(__clang__)  /* GCC, not Clang */ \
    && defined(__i386__) && defined(__SSE2__) /* x86 + SSE2 */     \
    &&                                                             \
    !defined(XXH_ENABLE_AUTOVECTORIZE) /* Define to disable like XXH32 hack */
  /*
   * UGLY HACK:
   * GCC for x86 tends to autovectorize the 128-bit multiply, resulting in
   * slower code.
   *
   * By forcing seed64 into a register, we disrupt the cost model and
   * cause it to scalarize. See `XXH32_round()`
   *
   * FIXME: Clang's output is still _much_ faster -- On an AMD Ryzen 3600,
   * XXH3_64bits @ len=240 runs at 4.6 GB/s with Clang 9, but 3.3 GB/s on
   * GCC 9.2, despite both emitting scalar code.
   *
   * GCC generates much better scalar code than Clang for the rest of XXH3,
   * which is why finding a more optimal codepath is an interest.
   */
  __asm__("" : "+r"(seed64));
#endif
  {

    xxh_u64 const input_lo = XXH_readLE64(input);
    xxh_u64 const input_hi = XXH_readLE64(input + 8);
    return XXH3_mul128_fold64(input_lo ^ (XXH_readLE64(secret) + seed64),
                              input_hi ^ (XXH_readLE64(secret + 8) - seed64));

  }

}

/* For mid range keys, XXH3 uses a Mum-hash variant. */
XXH_FORCE_INLINE XXH64_hash_t XXH3_len_17to128_64b(
    const xxh_u8 *XXH_RESTRICT input, size_t len,
    const xxh_u8 *XXH_RESTRICT secret, size_t secretSize, XXH64_hash_t seed) {

  XXH_ASSERT(secretSize >= XXH3_SECRET_SIZE_MIN);
  (void)secretSize;
  XXH_ASSERT(16 < len && len <= 128);

  {

    xxh_u64 acc = len * XXH_PRIME64_1;
    if (len > 32) {

      if (len > 64) {

        if (len > 96) {

          acc += XXH3_mix16B(input + 48, secret + 96, seed);
          acc += XXH3_mix16B(input + len - 64, secret + 112, seed);

        }

        acc += XXH3_mix16B(input + 32, secret + 64, seed);
        acc += XXH3_mix16B(input + len - 48, secret + 80, seed);

      }

      acc += XXH3_mix16B(input + 16, secret + 32, seed);
      acc += XXH3_mix16B(input + len - 32, secret + 48, seed);

    }

    acc += XXH3_mix16B(input + 0, secret + 0, seed);
    acc += XXH3_mix16B(input + len - 16, secret + 16, seed);

    return XXH3_avalanche(acc);

  }

}

#define XXH3_MIDSIZE_MAX 240

XXH_NO_INLINE XXH64_hash_t XXH3_len_129to240_64b(
    const xxh_u8 *XXH_RESTRICT input, size_t len,
    const xxh_u8 *XXH_RESTRICT secret, size_t secretSize, XXH64_hash_t seed) {

  XXH_ASSERT(secretSize >= XXH3_SECRET_SIZE_MIN);
  (void)secretSize;
  XXH_ASSERT(128 < len && len <= XXH3_MIDSIZE_MAX);

#define XXH3_MIDSIZE_STARTOFFSET 3
#define XXH3_MIDSIZE_LASTOFFSET 17

  {

    xxh_u64   acc = len * XXH_PRIME64_1;
    int const nbRounds = (int)len / 16;
    int       i;
    for (i = 0; i < 8; i++) {

      acc += XXH3_mix16B(input + (16 * i), secret + (16 * i), seed);

    }

    acc = XXH3_avalanche(acc);
    XXH_ASSERT(nbRounds >= 8);
#if defined(__clang__)                                /* Clang */ \
    && (defined(__ARM_NEON) || defined(__ARM_NEON__)) /* NEON */  \
    && !defined(XXH_ENABLE_AUTOVECTORIZE)              /* Define to disable */
  /*
   * UGLY HACK:
   * Clang for ARMv7-A tries to vectorize this loop, similar to GCC x86.
   * In everywhere else, it uses scalar code.
   *
   * For 64->128-bit multiplies, even if the NEON was 100% optimal, it
   * would still be slower than UMAAL (see XXH_mult64to128).
   *
   * Unfortunately, Clang doesn't handle the long multiplies properly and
   * converts them to the nonexistent "vmulq_u64" intrinsic, which is then
   * scalarized into an ugly mess of VMOV.32 instructions.
   *
   * This mess is difficult to avoid without turning autovectorization
   * off completely, but they are usually relatively minor and/or not
   * worth it to fix.
   *
   * This loop is the easiest to fix, as unlike XXH32, this pragma
   * _actually works_ because it is a loop vectorization instead of an
   * SLP vectorization.
   */
  #pragma clang loop vectorize(disable)
#endif
    for (i = 8; i < nbRounds; i++) {

      acc +=
          XXH3_mix16B(input + (16 * i),
                      secret + (16 * (i - 8)) + XXH3_MIDSIZE_STARTOFFSET, seed);

    }

    /* last bytes */
    acc += XXH3_mix16B(input + len - 16,
                       secret + XXH3_SECRET_SIZE_MIN - XXH3_MIDSIZE_LASTOFFSET,
                       seed);
    return XXH3_avalanche(acc);

  }

}

/* =======     Long Keys     ======= */

#define XXH_STRIPE_LEN 64
#define XXH_SECRET_CONSUME_RATE \
  8                     /* nb of secret bytes consumed at each accumulation */
#define XXH_ACC_NB (XXH_STRIPE_LEN / sizeof(xxh_u64))

#ifdef XXH_OLD_NAMES
  #define STRIPE_LEN XXH_STRIPE_LEN
  #define ACC_NB XXH_ACC_NB
#endif

typedef enum { XXH3_acc_64bits, XXH3_acc_128bits } XXH3_accWidth_e;

XXH_FORCE_INLINE void XXH_writeLE64(void *dst, xxh_u64 v64) {

  if (!XXH_CPU_LITTLE_ENDIAN) v64 = XXH_swap64(v64);
  memcpy(dst, &v64, sizeof(v64));

}

/* Several intrinsic functions below are supposed to accept __int64 as argument,
 * as documented in
 * https://software.intel.com/sites/landingpage/IntrinsicsGuide/ . However,
 * several environments do not define __int64 type, requiring a workaround.
 */
#if !defined(__VMS) &&       \
    (defined(__cplusplus) || \
     (defined(__STDC_VERSION__) && (__STDC_VERSION__ >= 199901L) /* C99 */))
typedef int64_t xxh_i64;
#else
/* the following type must have a width of 64-bit */
typedef long long xxh_i64;
#endif

/*
 * XXH3_accumulate_512 is the tightest loop for long inputs, and it is the most
 * optimized.
 *
 * It is a hardened version of UMAC, based off of FARSH's implementation.
 *
 * This was chosen because it adapts quite well to 32-bit, 64-bit, and SIMD
 * implementations, and it is ridiculously fast.
 *
 * We harden it by mixing the original input to the accumulators as well as the
 * product.
 *
 * This means that in the (relatively likely) case of a multiply by zero, the
 * original input is preserved.
 *
 * On 128-bit inputs, we swap 64-bit pairs when we add the input to improve
 * cross-pollination, as otherwise the upper and lower halves would be
 * essentially independent.
 *
 * This doesn't matter on 64-bit hashes since they all get merged together in
 * the end, so we skip the extra step.
 *
 * Both XXH3_64bits and XXH3_128bits use this subroutine.
 */

#if (XXH_VECTOR == XXH_AVX512) || defined(XXH_X86DISPATCH)

  #ifndef XXH_TARGET_AVX512
    #define XXH_TARGET_AVX512                   /* disable attribute target */
  #endif

XXH_FORCE_INLINE XXH_TARGET_AVX512 void XXH3_accumulate_512_avx512(
    void *XXH_RESTRICT acc, const void *XXH_RESTRICT input,
    const void *XXH_RESTRICT secret, XXH3_accWidth_e accWidth) {

  XXH_ALIGN(64) __m512i *const xacc = (__m512i *)acc;
  XXH_ASSERT((((size_t)acc) & 63) == 0);
  XXH_STATIC_ASSERT(XXH_STRIPE_LEN == sizeof(__m512i));

  {

    /* data_vec    = input[0]; */
    __m512i const data_vec = _mm512_loadu_si512(input);
    /* key_vec     = secret[0]; */
    __m512i const key_vec = _mm512_loadu_si512(secret);
    /* data_key    = data_vec ^ key_vec; */
    __m512i const data_key = _mm512_xor_si512(data_vec, key_vec);
    /* data_key_lo = data_key >> 32; */
    __m512i const data_key_lo =
        _mm512_shuffle_epi32(data_key, _MM_SHUFFLE(0, 3, 0, 1));
    /* product     = (data_key & 0xffffffff) * (data_key_lo & 0xffffffff); */
    __m512i const product = _mm512_mul_epu32(data_key, data_key_lo);
    if (accWidth == XXH3_acc_128bits) {

      /* xacc[0] += swap(data_vec); */
      __m512i const data_swap =
          _mm512_shuffle_epi32(data_vec, _MM_SHUFFLE(1, 0, 3, 2));
      __m512i const sum = _mm512_add_epi64(*xacc, data_swap);
      /* xacc[0] += product; */
      *xacc = _mm512_add_epi64(product, sum);

    } else {                                             /* XXH3_acc_64bits */

      /* xacc[0] += data_vec; */
      __m512i const sum = _mm512_add_epi64(*xacc, data_vec);
      /* xacc[0] += product; */
      *xacc = _mm512_add_epi64(product, sum);

    }

  }

}

/*
 * XXH3_scrambleAcc: Scrambles the accumulators to improve mixing.
 *
 * Multiplication isn't perfect, as explained by Google in HighwayHash:
 *
 *  // Multiplication mixes/scrambles bytes 0-7 of the 64-bit result to
 *  // varying degrees. In descending order of goodness, bytes
 *  // 3 4 2 5 1 6 0 7 have quality 228 224 164 160 100 96 36 32.
 *  // As expected, the upper and lower bytes are much worse.
 *
 * Source:
 * https://github.com/google/highwayhash/blob/0aaf66b/highwayhash/hh_avx2.h#L291
 *
 * Since our algorithm uses a pseudorandom secret to add some variance into the
 * mix, we don't need to (or want to) mix as often or as much as HighwayHash
 * does.
 *
 * This isn't as tight as XXH3_accumulate, but still written in SIMD to avoid
 * extraction.
 *
 * Both XXH3_64bits and XXH3_128bits use this subroutine.
 */

XXH_FORCE_INLINE XXH_TARGET_AVX512 void XXH3_scrambleAcc_avx512(
    void *XXH_RESTRICT acc, const void *XXH_RESTRICT secret) {

  XXH_ASSERT((((size_t)acc) & 63) == 0);
  XXH_STATIC_ASSERT(XXH_STRIPE_LEN == sizeof(__m512i));
  {

    XXH_ALIGN(64) __m512i *const xacc = (__m512i *)acc;
    const __m512i prime32 = _mm512_set1_epi32((int)XXH_PRIME32_1);

    /* xacc[0] ^= (xacc[0] >> 47) */
    __m512i const acc_vec = *xacc;
    __m512i const shifted = _mm512_srli_epi64(acc_vec, 47);
    __m512i const data_vec = _mm512_xor_si512(acc_vec, shifted);
    /* xacc[0] ^= secret; */
    __m512i const key_vec = _mm512_loadu_si512(secret);
    __m512i const data_key = _mm512_xor_si512(data_vec, key_vec);

    /* xacc[0] *= XXH_PRIME32_1; */
    __m512i const data_key_hi =
        _mm512_shuffle_epi32(data_key, _MM_SHUFFLE(0, 3, 0, 1));
    __m512i const prod_lo = _mm512_mul_epu32(data_key, prime32);
    __m512i const prod_hi = _mm512_mul_epu32(data_key_hi, prime32);
    *xacc = _mm512_add_epi64(prod_lo, _mm512_slli_epi64(prod_hi, 32));

  }

}

XXH_FORCE_INLINE XXH_TARGET_AVX512 void XXH3_initCustomSecret_avx512(
    void *XXH_RESTRICT customSecret, xxh_u64 seed64) {

  XXH_STATIC_ASSERT((XXH_SECRET_DEFAULT_SIZE & 63) == 0);
  XXH_STATIC_ASSERT(XXH_SEC_ALIGN == 64);
  XXH_ASSERT(((size_t)customSecret & 63) == 0);
  (void)(&XXH_writeLE64);
  {

    int const     nbRounds = XXH_SECRET_DEFAULT_SIZE / sizeof(__m512i);
    __m512i const seed = _mm512_mask_set1_epi64(
        _mm512_set1_epi64((xxh_i64)seed64), 0xAA, -(xxh_i64)seed64);

    XXH_ALIGN(64) const __m512i *const src = (const __m512i *)XXH3_kSecret;
    XXH_ALIGN(64) __m512i *const       dest = (__m512i *)customSecret;
    int                                i;
    for (i = 0; i < nbRounds; ++i) {

      // GCC has a bug, _mm512_stream_load_si512 accepts 'void*', not 'void
      // const*', this will warn "discards ‘const’ qualifier".
      union {

        XXH_ALIGN(64) const __m512i *const cp;
        XXH_ALIGN(64) void *const p;

      } const remote_const_void = {.cp = src + i};

      dest[i] =
          _mm512_add_epi64(_mm512_stream_load_si512(remote_const_void.p), seed);

    }

  }

}

#endif

#if (XXH_VECTOR == XXH_AVX2) || defined(XXH_X86DISPATCH)

  #ifndef XXH_TARGET_AVX2
    #define XXH_TARGET_AVX2                     /* disable attribute target */
  #endif

XXH_FORCE_INLINE XXH_TARGET_AVX2 void XXH3_accumulate_512_avx2(
    void *XXH_RESTRICT acc, const void *XXH_RESTRICT input,
    const void *XXH_RESTRICT secret, XXH3_accWidth_e accWidth) {

  XXH_ASSERT((((size_t)acc) & 31) == 0);
  {

    XXH_ALIGN(32) __m256i *const xacc = (__m256i *)acc;
    /* Unaligned. This is mainly for pointer arithmetic, and because
     * _mm256_loadu_si256 requires  a const __m256i * pointer for some reason.
     */
    const __m256i *const xinput = (const __m256i *)input;
    /* Unaligned. This is mainly for pointer arithmetic, and because
     * _mm256_loadu_si256 requires a const __m256i * pointer for some reason. */
    const __m256i *const xsecret = (const __m256i *)secret;

    size_t i;
    for (i = 0; i < XXH_STRIPE_LEN / sizeof(__m256i); i++) {

      /* data_vec    = xinput[i]; */
      __m256i const data_vec = _mm256_loadu_si256(xinput + i);
      /* key_vec     = xsecret[i]; */
      __m256i const key_vec = _mm256_loadu_si256(xsecret + i);
      /* data_key    = data_vec ^ key_vec; */
      __m256i const data_key = _mm256_xor_si256(data_vec, key_vec);
      /* data_key_lo = data_key >> 32; */
      __m256i const data_key_lo =
          _mm256_shuffle_epi32(data_key, _MM_SHUFFLE(0, 3, 0, 1));
      /* product     = (data_key & 0xffffffff) * (data_key_lo & 0xffffffff); */
      __m256i const product = _mm256_mul_epu32(data_key, data_key_lo);
      if (accWidth == XXH3_acc_128bits) {

        /* xacc[i] += swap(data_vec); */
        __m256i const data_swap =
            _mm256_shuffle_epi32(data_vec, _MM_SHUFFLE(1, 0, 3, 2));
        __m256i const sum = _mm256_add_epi64(xacc[i], data_swap);
        /* xacc[i] += product; */
        xacc[i] = _mm256_add_epi64(product, sum);

      } else {                                           /* XXH3_acc_64bits */

        /* xacc[i] += data_vec; */
        __m256i const sum = _mm256_add_epi64(xacc[i], data_vec);
        /* xacc[i] += product; */
        xacc[i] = _mm256_add_epi64(product, sum);

      }

    }

  }

}

XXH_FORCE_INLINE XXH_TARGET_AVX2 void XXH3_scrambleAcc_avx2(
    void *XXH_RESTRICT acc, const void *XXH_RESTRICT secret) {

  XXH_ASSERT((((size_t)acc) & 31) == 0);
  {

    XXH_ALIGN(32) __m256i *const xacc = (__m256i *)acc;
    /* Unaligned. This is mainly for pointer arithmetic, and because
     * _mm256_loadu_si256 requires a const __m256i * pointer for some reason. */
    const __m256i *const xsecret = (const __m256i *)secret;
    const __m256i        prime32 = _mm256_set1_epi32((int)XXH_PRIME32_1);

    size_t i;
    for (i = 0; i < XXH_STRIPE_LEN / sizeof(__m256i); i++) {

      /* xacc[i] ^= (xacc[i] >> 47) */
      __m256i const acc_vec = xacc[i];
      __m256i const shifted = _mm256_srli_epi64(acc_vec, 47);
      __m256i const data_vec = _mm256_xor_si256(acc_vec, shifted);
      /* xacc[i] ^= xsecret; */
      __m256i const key_vec = _mm256_loadu_si256(xsecret + i);
      __m256i const data_key = _mm256_xor_si256(data_vec, key_vec);

      /* xacc[i] *= XXH_PRIME32_1; */
      __m256i const data_key_hi =
          _mm256_shuffle_epi32(data_key, _MM_SHUFFLE(0, 3, 0, 1));
      __m256i const prod_lo = _mm256_mul_epu32(data_key, prime32);
      __m256i const prod_hi = _mm256_mul_epu32(data_key_hi, prime32);
      xacc[i] = _mm256_add_epi64(prod_lo, _mm256_slli_epi64(prod_hi, 32));

    }

  }

}

XXH_FORCE_INLINE XXH_TARGET_AVX2 void XXH3_initCustomSecret_avx2(
    void *XXH_RESTRICT customSecret, xxh_u64 seed64) {

  XXH_STATIC_ASSERT((XXH_SECRET_DEFAULT_SIZE & 31) == 0);
  XXH_STATIC_ASSERT((XXH_SECRET_DEFAULT_SIZE / sizeof(__m256i)) == 6);
  XXH_STATIC_ASSERT(XXH_SEC_ALIGN <= 64);
  (void)(&XXH_writeLE64);
  XXH_PREFETCH(customSecret);
  {

    __m256i const seed = _mm256_set_epi64x(-(xxh_i64)seed64, (xxh_i64)seed64,
                                           -(xxh_i64)seed64, (xxh_i64)seed64);

    XXH_ALIGN(64) const __m256i *const src = (const __m256i *)XXH3_kSecret;
    XXH_ALIGN(64) __m256i *            dest = (__m256i *)customSecret;

  #if defined(__GNUC__) || defined(__clang__)
    /*
     * On GCC & Clang, marking 'dest' as modified will cause the compiler:
     *   - do not extract the secret from sse registers in the internal loop
     *   - use less common registers, and avoid pushing these reg into stack
     * The asm hack causes Clang to assume that XXH3_kSecretPtr aliases with
     * customSecret, and on aarch64, this prevented LDP from merging two
     * loads together for free. Putting the loads together before the stores
     * properly generates LDP.
     */
    __asm__("" : "+r"(dest));
  #endif

    /* GCC -O2 need unroll loop manually */
    dest[0] = _mm256_add_epi64(_mm256_stream_load_si256(src + 0), seed);
    dest[1] = _mm256_add_epi64(_mm256_stream_load_si256(src + 1), seed);
    dest[2] = _mm256_add_epi64(_mm256_stream_load_si256(src + 2), seed);
    dest[3] = _mm256_add_epi64(_mm256_stream_load_si256(src + 3), seed);
    dest[4] = _mm256_add_epi64(_mm256_stream_load_si256(src + 4), seed);
    dest[5] = _mm256_add_epi64(_mm256_stream_load_si256(src + 5), seed);

  }

}

#endif

#if (XXH_VECTOR == XXH_SSE2) || defined(XXH_X86DISPATCH)

  #ifndef XXH_TARGET_SSE2
    #define XXH_TARGET_SSE2                     /* disable attribute target */
  #endif

XXH_FORCE_INLINE XXH_TARGET_SSE2 void XXH3_accumulate_512_sse2(
    void *XXH_RESTRICT acc, const void *XXH_RESTRICT input,
    const void *XXH_RESTRICT secret, XXH3_accWidth_e accWidth) {

  /* SSE2 is just a half-scale version of the AVX2 version. */
  XXH_ASSERT((((size_t)acc) & 15) == 0);
  {

    XXH_ALIGN(16) __m128i *const xacc = (__m128i *)acc;
    /* Unaligned. This is mainly for pointer arithmetic, and because
     * _mm_loadu_si128 requires a const __m128i * pointer for some reason. */
    const __m128i *const xinput = (const __m128i *)input;
    /* Unaligned. This is mainly for pointer arithmetic, and because
     * _mm_loadu_si128 requires a const __m128i * pointer for some reason. */
    const __m128i *const xsecret = (const __m128i *)secret;

    size_t i;
    for (i = 0; i < XXH_STRIPE_LEN / sizeof(__m128i); i++) {

      /* data_vec    = xinput[i]; */
      __m128i const data_vec = _mm_loadu_si128(xinput + i);
      /* key_vec     = xsecret[i]; */
      __m128i const key_vec = _mm_loadu_si128(xsecret + i);
      /* data_key    = data_vec ^ key_vec; */
      __m128i const data_key = _mm_xor_si128(data_vec, key_vec);
      /* data_key_lo = data_key >> 32; */
      __m128i const data_key_lo =
          _mm_shuffle_epi32(data_key, _MM_SHUFFLE(0, 3, 0, 1));
      /* product     = (data_key & 0xffffffff) * (data_key_lo & 0xffffffff); */
      __m128i const product = _mm_mul_epu32(data_key, data_key_lo);
      if (accWidth == XXH3_acc_128bits) {

        /* xacc[i] += swap(data_vec); */
        __m128i const data_swap =
            _mm_shuffle_epi32(data_vec, _MM_SHUFFLE(1, 0, 3, 2));
        __m128i const sum = _mm_add_epi64(xacc[i], data_swap);
        /* xacc[i] += product; */
        xacc[i] = _mm_add_epi64(product, sum);

      } else {                                           /* XXH3_acc_64bits */

        /* xacc[i] += data_vec; */
        __m128i const sum = _mm_add_epi64(xacc[i], data_vec);
        /* xacc[i] += product; */
        xacc[i] = _mm_add_epi64(product, sum);

      }

    }

  }

}

XXH_FORCE_INLINE XXH_TARGET_SSE2 void XXH3_scrambleAcc_sse2(
    void *XXH_RESTRICT acc, const void *XXH_RESTRICT secret) {

  XXH_ASSERT((((size_t)acc) & 15) == 0);
  {

    XXH_ALIGN(16) __m128i *const xacc = (__m128i *)acc;
    /* Unaligned. This is mainly for pointer arithmetic, and because
     * _mm_loadu_si128 requires a const __m128i * pointer for some reason. */
    const __m128i *const xsecret = (const __m128i *)secret;
    const __m128i        prime32 = _mm_set1_epi32((int)XXH_PRIME32_1);

    size_t i;
    for (i = 0; i < XXH_STRIPE_LEN / sizeof(__m128i); i++) {

      /* xacc[i] ^= (xacc[i] >> 47) */
      __m128i const acc_vec = xacc[i];
      __m128i const shifted = _mm_srli_epi64(acc_vec, 47);
      __m128i const data_vec = _mm_xor_si128(acc_vec, shifted);
      /* xacc[i] ^= xsecret[i]; */
      __m128i const key_vec = _mm_loadu_si128(xsecret + i);
      __m128i const data_key = _mm_xor_si128(data_vec, key_vec);

      /* xacc[i] *= XXH_PRIME32_1; */
      __m128i const data_key_hi =
          _mm_shuffle_epi32(data_key, _MM_SHUFFLE(0, 3, 0, 1));
      __m128i const prod_lo = _mm_mul_epu32(data_key, prime32);
      __m128i const prod_hi = _mm_mul_epu32(data_key_hi, prime32);
      xacc[i] = _mm_add_epi64(prod_lo, _mm_slli_epi64(prod_hi, 32));

    }

  }

}

XXH_FORCE_INLINE XXH_TARGET_SSE2 void XXH3_initCustomSecret_sse2(
    void *XXH_RESTRICT customSecret, xxh_u64 seed64) {

  XXH_STATIC_ASSERT((XXH_SECRET_DEFAULT_SIZE & 15) == 0);
  (void)(&XXH_writeLE64);
  {

    int const nbRounds = XXH_SECRET_DEFAULT_SIZE / sizeof(__m128i);

  #if defined(_MSC_VER) && defined(_M_IX86) && _MSC_VER < 1900
    // MSVC 32bit mode does not support _mm_set_epi64x before 2015
    XXH_ALIGN(16)
    const xxh_i64 seed64x2[2] = {(xxh_i64)seed64, -(xxh_i64)seed64};
    __m128i const seed = _mm_load_si128((__m128i const *)seed64x2);
  #else
    __m128i const seed = _mm_set_epi64x(-(xxh_i64)seed64, (xxh_i64)seed64);
  #endif
    int i;

    XXH_ALIGN(64) const float *const  src = (float const *)XXH3_kSecret;
    XXH_ALIGN(XXH_SEC_ALIGN) __m128i *dest = (__m128i *)customSecret;
  #if defined(__GNUC__) || defined(__clang__)
    /*
     * On GCC & Clang, marking 'dest' as modified will cause the compiler:
     *   - do not extract the secret from sse registers in the internal loop
     *   - use less common registers, and avoid pushing these reg into stack
     */
    __asm__("" : "+r"(dest));
  #endif

    for (i = 0; i < nbRounds; ++i) {

      dest[i] = _mm_add_epi64(_mm_castps_si128(_mm_load_ps(src + i * 4)), seed);

    }

  }

}

#endif

#if (XXH_VECTOR == XXH_NEON)

XXH_FORCE_INLINE void XXH3_accumulate_512_neon(void *XXH_RESTRICT       acc,
                                               const void *XXH_RESTRICT input,
                                               const void *XXH_RESTRICT secret,
                                               XXH3_accWidth_e accWidth) {

  XXH_ASSERT((((size_t)acc) & 15) == 0);
  {

    XXH_ALIGN(16) uint64x2_t *const xacc = (uint64x2_t *)acc;
    /* We don't use a uint32x4_t pointer because it causes bus errors on ARMv7.
     */
    uint8_t const *const xinput = (const uint8_t *)input;
    uint8_t const *const xsecret = (const uint8_t *)secret;

    size_t i;
    for (i = 0; i < XXH_STRIPE_LEN / sizeof(uint64x2_t); i++) {

      /* data_vec = xinput[i]; */
      uint8x16_t data_vec = vld1q_u8(xinput + (i * 16));
      /* key_vec  = xsecret[i];  */
      uint8x16_t key_vec = vld1q_u8(xsecret + (i * 16));
      uint64x2_t data_key;
      uint32x2_t data_key_lo, data_key_hi;
      if (accWidth == XXH3_acc_64bits) {

        /* xacc[i] += data_vec; */
        xacc[i] = vaddq_u64(xacc[i], vreinterpretq_u64_u8(data_vec));

      } else {                                          /* XXH3_acc_128bits */

        /* xacc[i] += swap(data_vec); */
        uint64x2_t const data64 = vreinterpretq_u64_u8(data_vec);
        uint64x2_t const swapped = vextq_u64(data64, data64, 1);
        xacc[i] = vaddq_u64(xacc[i], swapped);

      }

      /* data_key = data_vec ^ key_vec; */
      data_key = vreinterpretq_u64_u8(veorq_u8(data_vec, key_vec));
      /* data_key_lo = (uint32x2_t) (data_key & 0xFFFFFFFF);
       * data_key_hi = (uint32x2_t) (data_key >> 32);
       * data_key = UNDEFINED; */
      XXH_SPLIT_IN_PLACE(data_key, data_key_lo, data_key_hi);
      /* xacc[i] += (uint64x2_t) data_key_lo * (uint64x2_t) data_key_hi; */
      xacc[i] = vmlal_u32(xacc[i], data_key_lo, data_key_hi);

    }

  }

}

XXH_FORCE_INLINE void XXH3_scrambleAcc_neon(void *XXH_RESTRICT       acc,
                                            const void *XXH_RESTRICT secret) {

  XXH_ASSERT((((size_t)acc) & 15) == 0);

  {

    uint64x2_t *   xacc = (uint64x2_t *)acc;
    uint8_t const *xsecret = (uint8_t const *)secret;
    uint32x2_t     prime = vdup_n_u32(XXH_PRIME32_1);

    size_t i;
    for (i = 0; i < XXH_STRIPE_LEN / sizeof(uint64x2_t); i++) {

      /* xacc[i] ^= (xacc[i] >> 47); */
      uint64x2_t acc_vec = xacc[i];
      uint64x2_t shifted = vshrq_n_u64(acc_vec, 47);
      uint64x2_t data_vec = veorq_u64(acc_vec, shifted);

      /* xacc[i] ^= xsecret[i]; */
      uint8x16_t key_vec = vld1q_u8(xsecret + (i * 16));
      uint64x2_t data_key = veorq_u64(data_vec, vreinterpretq_u64_u8(key_vec));

      /* xacc[i] *= XXH_PRIME32_1 */
      uint32x2_t data_key_lo, data_key_hi;
      /* data_key_lo = (uint32x2_t) (xacc[i] & 0xFFFFFFFF);
       * data_key_hi = (uint32x2_t) (xacc[i] >> 32);
       * xacc[i] = UNDEFINED; */
      XXH_SPLIT_IN_PLACE(data_key, data_key_lo, data_key_hi);
      { /*
         * prod_hi = (data_key >> 32) * XXH_PRIME32_1;
         *
         * Avoid vmul_u32 + vshll_n_u32 since Clang 6 and 7 will
         * incorrectly "optimize" this:
         *   tmp     = vmul_u32(vmovn_u64(a), vmovn_u64(b));
         *   shifted = vshll_n_u32(tmp, 32);
         * to this:
         *   tmp     = "vmulq_u64"(a, b); // no such thing!
         *   shifted = vshlq_n_u64(tmp, 32);
         *
         * However, unlike SSE, Clang lacks a 64-bit multiply routine
         * for NEON, and it scalarizes two 64-bit multiplies instead.
         *
         * vmull_u32 has the same timing as vmul_u32, and it avoids
         * this bug completely.
         * See https://bugs.llvm.org/show_bug.cgi?id=39967
         */
        uint64x2_t prod_hi = vmull_u32(data_key_hi, prime);
        /* xacc[i] = prod_hi << 32; */
        xacc[i] = vshlq_n_u64(prod_hi, 32);
        /* xacc[i] += (prod_hi & 0xFFFFFFFF) * XXH_PRIME32_1; */
        xacc[i] = vmlal_u32(xacc[i], data_key_lo, prime);

      }

    }

  }

}

#endif

#if (XXH_VECTOR == XXH_VSX)

XXH_FORCE_INLINE void XXH3_accumulate_512_vsx(void *XXH_RESTRICT       acc,
                                              const void *XXH_RESTRICT input,
                                              const void *XXH_RESTRICT secret,
                                              XXH3_accWidth_e accWidth) {

  xxh_u64x2 *const       xacc = (xxh_u64x2 *)acc;       /* presumed aligned */
  xxh_u64x2 const *const xinput =
      (xxh_u64x2 const *)input;                 /* no alignment restriction */
  xxh_u64x2 const *const xsecret =
      (xxh_u64x2 const *)secret;                /* no alignment restriction */
  xxh_u64x2 const v32 = {32, 32};
  size_t          i;
  for (i = 0; i < XXH_STRIPE_LEN / sizeof(xxh_u64x2); i++) {

    /* data_vec = xinput[i]; */
    xxh_u64x2 const data_vec = XXH_vec_loadu(xinput + i);
    /* key_vec = xsecret[i]; */
    xxh_u64x2 const key_vec = XXH_vec_loadu(xsecret + i);
    xxh_u64x2 const data_key = data_vec ^ key_vec;
    /* shuffled = (data_key << 32) | (data_key >> 32); */
    xxh_u32x4 const shuffled = (xxh_u32x4)vec_rl(data_key, v32);
    /* product = ((xxh_u64x2)data_key & 0xFFFFFFFF) * ((xxh_u64x2)shuffled &
     * 0xFFFFFFFF); */
    xxh_u64x2 const product = XXH_vec_mulo((xxh_u32x4)data_key, shuffled);
    xacc[i] += product;

    if (accWidth == XXH3_acc_64bits) {

      xacc[i] += data_vec;

    } else {                                            /* XXH3_acc_128bits */

        /* swap high and low halves */
  #ifdef __s390x__
      xxh_u64x2 const data_swapped = vec_permi(data_vec, data_vec, 2);
  #else
      xxh_u64x2 const data_swapped = vec_xxpermdi(data_vec, data_vec, 2);
  #endif
      xacc[i] += data_swapped;

    }

  }

}

XXH_FORCE_INLINE void XXH3_scrambleAcc_vsx(void *XXH_RESTRICT       acc,
                                           const void *XXH_RESTRICT secret) {

  XXH_ASSERT((((size_t)acc) & 15) == 0);

  {

    xxh_u64x2 *const       xacc = (xxh_u64x2 *)acc;
    const xxh_u64x2 *const xsecret = (const xxh_u64x2 *)secret;
    /* constants */
    xxh_u64x2 const v32 = {32, 32};
    xxh_u64x2 const v47 = {47, 47};
    xxh_u32x4 const prime = {XXH_PRIME32_1, XXH_PRIME32_1, XXH_PRIME32_1,
                             XXH_PRIME32_1};
    size_t          i;
    for (i = 0; i < XXH_STRIPE_LEN / sizeof(xxh_u64x2); i++) {

      /* xacc[i] ^= (xacc[i] >> 47); */
      xxh_u64x2 const acc_vec = xacc[i];
      xxh_u64x2 const data_vec = acc_vec ^ (acc_vec >> v47);

      /* xacc[i] ^= xsecret[i]; */
      xxh_u64x2 const key_vec = XXH_vec_loadu(xsecret + i);
      xxh_u64x2 const data_key = data_vec ^ key_vec;

      /* xacc[i] *= XXH_PRIME32_1 */
      /* prod_lo = ((xxh_u64x2)data_key & 0xFFFFFFFF) * ((xxh_u64x2)prime &
       * 0xFFFFFFFF);  */
      xxh_u64x2 const prod_even = XXH_vec_mule((xxh_u32x4)data_key, prime);
      /* prod_hi = ((xxh_u64x2)data_key >> 32) * ((xxh_u64x2)prime >> 32);  */
      xxh_u64x2 const prod_odd = XXH_vec_mulo((xxh_u32x4)data_key, prime);
      xacc[i] = prod_odd + (prod_even << v32);

    }

  }

}

#endif

/* scalar variants - universal */

XXH_FORCE_INLINE void XXH3_accumulate_512_scalar(
    void *XXH_RESTRICT acc, const void *XXH_RESTRICT input,
    const void *XXH_RESTRICT secret, XXH3_accWidth_e accWidth) {

  XXH_ALIGN(XXH_ACC_ALIGN)
  xxh_u64 *const      xacc = (xxh_u64 *)acc;            /* presumed aligned */
  const xxh_u8 *const xinput =
      (const xxh_u8 *)input;                    /* no alignment restriction */
  const xxh_u8 *const xsecret =
      (const xxh_u8 *)secret;                   /* no alignment restriction */
  size_t i;
  XXH_ASSERT(((size_t)acc & (XXH_ACC_ALIGN - 1)) == 0);
  for (i = 0; i < XXH_ACC_NB; i++) {

    xxh_u64 const data_val = XXH_readLE64(xinput + 8 * i);
    xxh_u64 const data_key = data_val ^ XXH_readLE64(xsecret + i * 8);

    if (accWidth == XXH3_acc_64bits) {

      xacc[i] += data_val;

    } else {

      xacc[i ^ 1] += data_val;                       /* swap adjacent lanes */

    }

    xacc[i] += XXH_mult32to64(data_key & 0xFFFFFFFF, data_key >> 32);

  }

}

XXH_FORCE_INLINE void XXH3_scrambleAcc_scalar(void *XXH_RESTRICT       acc,
                                              const void *XXH_RESTRICT secret) {

  XXH_ALIGN(XXH_ACC_ALIGN)
  xxh_u64 *const      xacc = (xxh_u64 *)acc;            /* presumed aligned */
  const xxh_u8 *const xsecret =
      (const xxh_u8 *)secret;                   /* no alignment restriction */
  size_t i;
  XXH_ASSERT((((size_t)acc) & (XXH_ACC_ALIGN - 1)) == 0);
  for (i = 0; i < XXH_ACC_NB; i++) {

    xxh_u64 const key64 = XXH_readLE64(xsecret + 8 * i);
    xxh_u64       acc64 = xacc[i];
    acc64 = XXH_xorshift64(acc64, 47);
    acc64 ^= key64;
    acc64 *= XXH_PRIME32_1;
    xacc[i] = acc64;

  }

}

XXH_FORCE_INLINE void XXH3_initCustomSecret_scalar(
    void *XXH_RESTRICT customSecret, xxh_u64 seed64) {

  /*
   * We need a separate pointer for the hack below,
   * which requires a non-const pointer.
   * Any decent compiler will optimize this out otherwise.
   */
  const xxh_u8 *kSecretPtr = XXH3_kSecret;
  XXH_STATIC_ASSERT((XXH_SECRET_DEFAULT_SIZE & 15) == 0);

#if defined(__clang__) && defined(__aarch64__)
  /*
   * UGLY HACK:
   * Clang generates a bunch of MOV/MOVK pairs for aarch64, and they are
   * placed sequentially, in order, at the top of the unrolled loop.
   *
   * While MOVK is great for generating constants (2 cycles for a 64-bit
   * constant compared to 4 cycles for LDR), long MOVK chains stall the
   * integer pipelines:
   *   I   L   S
   * MOVK
   * MOVK
   * MOVK
   * MOVK
   * ADD
   * SUB      STR
   *          STR
   * By forcing loads from memory (as the asm line causes Clang to assume
   * that XXH3_kSecretPtr has been changed), the pipelines are used more
   * efficiently:
   *   I   L   S
   *      LDR
   *  ADD LDR
   *  SUB     STR
   *          STR
   * XXH3_64bits_withSeed, len == 256, Snapdragon 835
   *   without hack: 2654.4 MB/s
   *   with hack:    3202.9 MB/s
   */
  __asm__("" : "+r"(kSecretPtr));
#endif
  /*
   * Note: in debug mode, this overrides the asm optimization
   * and Clang will emit MOVK chains again.
   */
  XXH_ASSERT(kSecretPtr == XXH3_kSecret);

  {

    int const nbRounds = XXH_SECRET_DEFAULT_SIZE / 16;
    int       i;
    for (i = 0; i < nbRounds; i++) {

      /*
       * The asm hack causes Clang to assume that kSecretPtr aliases with
       * customSecret, and on aarch64, this prevented LDP from merging two
       * loads together for free. Putting the loads together before the stores
       * properly generates LDP.
       */
      xxh_u64 lo = XXH_readLE64(kSecretPtr + 16 * i) + seed64;
      xxh_u64 hi = XXH_readLE64(kSecretPtr + 16 * i + 8) - seed64;
      XXH_writeLE64((xxh_u8 *)customSecret + 16 * i, lo);
      XXH_writeLE64((xxh_u8 *)customSecret + 16 * i + 8, hi);

    }

  }

}

typedef void (*XXH3_f_accumulate_512)(void *XXH_RESTRICT, const void *,
                                      const void *, XXH3_accWidth_e);
typedef void (*XXH3_f_scrambleAcc)(void *XXH_RESTRICT, const void *);
typedef void (*XXH3_f_initCustomSecret)(void *XXH_RESTRICT, xxh_u64);

#if (XXH_VECTOR == XXH_AVX512)

  #define XXH3_accumulate_512 XXH3_accumulate_512_avx512
  #define XXH3_scrambleAcc XXH3_scrambleAcc_avx512
  #define XXH3_initCustomSecret XXH3_initCustomSecret_avx512

#elif (XXH_VECTOR == XXH_AVX2)

  #define XXH3_accumulate_512 XXH3_accumulate_512_avx2
  #define XXH3_scrambleAcc XXH3_scrambleAcc_avx2
  #define XXH3_initCustomSecret XXH3_initCustomSecret_avx2

#elif (XXH_VECTOR == XXH_SSE2)

  #define XXH3_accumulate_512 XXH3_accumulate_512_sse2
  #define XXH3_scrambleAcc XXH3_scrambleAcc_sse2
  #define XXH3_initCustomSecret XXH3_initCustomSecret_sse2

#elif (XXH_VECTOR == XXH_NEON)

  #define XXH3_accumulate_512 XXH3_accumulate_512_neon
  #define XXH3_scrambleAcc XXH3_scrambleAcc_neon
  #define XXH3_initCustomSecret XXH3_initCustomSecret_scalar

#elif (XXH_VECTOR == XXH_VSX)

  #define XXH3_accumulate_512 XXH3_accumulate_512_vsx
  #define XXH3_scrambleAcc XXH3_scrambleAcc_vsx
  #define XXH3_initCustomSecret XXH3_initCustomSecret_scalar

#else                                                             /* scalar */

  #define XXH3_accumulate_512 XXH3_accumulate_512_scalar
  #define XXH3_scrambleAcc XXH3_scrambleAcc_scalar
  #define XXH3_initCustomSecret XXH3_initCustomSecret_scalar

#endif

#ifndef XXH_PREFETCH_DIST
  #ifdef __clang__
    #define XXH_PREFETCH_DIST 320
  #else
    #if (XXH_VECTOR == XXH_AVX512)
      #define XXH_PREFETCH_DIST 512
    #else
      #define XXH_PREFETCH_DIST 384
    #endif
  #endif                                                       /* __clang__ */
#endif                                                 /* XXH_PREFETCH_DIST */

/*
 * XXH3_accumulate()
 * Loops over XXH3_accumulate_512().
 * Assumption: nbStripes will not overflow the secret size
 */
XXH_FORCE_INLINE void XXH3_accumulate(xxh_u64 *XXH_RESTRICT      acc,
                                      const xxh_u8 *XXH_RESTRICT input,
                                      const xxh_u8 *XXH_RESTRICT secret,
                                      size_t                     nbStripes,
                                      XXH3_accWidth_e            accWidth,
                                      XXH3_f_accumulate_512      f_acc512) {

  size_t n;
  for (n = 0; n < nbStripes; n++) {

    const xxh_u8 *const in = input + n * XXH_STRIPE_LEN;
    XXH_PREFETCH(in + XXH_PREFETCH_DIST);
    f_acc512(acc, in, secret + n * XXH_SECRET_CONSUME_RATE, accWidth);

  }

}

XXH_FORCE_INLINE void XXH3_hashLong_internal_loop(
    xxh_u64 *XXH_RESTRICT acc, const xxh_u8 *XXH_RESTRICT input, size_t len,
    const xxh_u8 *XXH_RESTRICT secret, size_t secretSize,
    XXH3_accWidth_e accWidth, XXH3_f_accumulate_512 f_acc512,
    XXH3_f_scrambleAcc f_scramble) {

  size_t const nb_rounds =
      (secretSize - XXH_STRIPE_LEN) / XXH_SECRET_CONSUME_RATE;
  size_t const block_len = XXH_STRIPE_LEN * nb_rounds;
  size_t const nb_blocks = len / block_len;

  size_t n;

  XXH_ASSERT(secretSize >= XXH3_SECRET_SIZE_MIN);

  for (n = 0; n < nb_blocks; n++) {

    XXH3_accumulate(acc, input + n * block_len, secret, nb_rounds, accWidth,
                    f_acc512);
    f_scramble(acc, secret + secretSize - XXH_STRIPE_LEN);

  }

  /* last partial block */
  XXH_ASSERT(len > XXH_STRIPE_LEN);
  {

    size_t const nbStripes = (len - (block_len * nb_blocks)) / XXH_STRIPE_LEN;
    XXH_ASSERT(nbStripes <= (secretSize / XXH_SECRET_CONSUME_RATE));
    XXH3_accumulate(acc, input + nb_blocks * block_len, secret, nbStripes,
                    accWidth, f_acc512);

    /* last stripe */
    if (len & (XXH_STRIPE_LEN - 1)) {

      const xxh_u8 *const p = input + len - XXH_STRIPE_LEN;
      /* Do not align on 8, so that the secret is different from the scrambler
       */
#define XXH_SECRET_LASTACC_START 7
      f_acc512(acc, p,
               secret + secretSize - XXH_STRIPE_LEN - XXH_SECRET_LASTACC_START,
               accWidth);

    }

  }

}

XXH_FORCE_INLINE xxh_u64 XXH3_mix2Accs(const xxh_u64 *XXH_RESTRICT acc,
                                       const xxh_u8 *XXH_RESTRICT  secret) {

  return XXH3_mul128_fold64(acc[0] ^ XXH_readLE64(secret),
                            acc[1] ^ XXH_readLE64(secret + 8));

}

static XXH64_hash_t XXH3_mergeAccs(const xxh_u64 *XXH_RESTRICT acc,
                                   const xxh_u8 *XXH_RESTRICT  secret,
                                   xxh_u64                     start) {

  xxh_u64 result64 = start;
  size_t  i = 0;

  for (i = 0; i < 4; i++) {

    result64 += XXH3_mix2Accs(acc + 2 * i, secret + 16 * i);
#if defined(__clang__)                                /* Clang */ \
    && (defined(__arm__) || defined(__thumb__))       /* ARMv7 */ \
    && (defined(__ARM_NEON) || defined(__ARM_NEON__)) /* NEON */  \
    && !defined(XXH_ENABLE_AUTOVECTORIZE)              /* Define to disable */
    /*
     * UGLY HACK:
     * Prevent autovectorization on Clang ARMv7-a. Exact same problem as
     * the one in XXH3_len_129to240_64b. Speeds up shorter keys > 240b.
     * XXH3_64bits, len == 256, Snapdragon 835:
     *   without hack: 2063.7 MB/s
     *   with hack:    2560.7 MB/s
     */
    __asm__("" : "+r"(result64));
#endif

  }

  return XXH3_avalanche(result64);

}

#define XXH3_INIT_ACC                                                          \
  {                                                                            \
                                                                               \
    XXH_PRIME32_3, XXH_PRIME64_1, XXH_PRIME64_2, XXH_PRIME64_3, XXH_PRIME64_4, \
        XXH_PRIME32_2, XXH_PRIME64_5, XXH_PRIME32_1                            \
                                                                               \
  }

XXH_FORCE_INLINE XXH64_hash_t XXH3_hashLong_64b_internal(
    const xxh_u8 *XXH_RESTRICT input, size_t len,
    const xxh_u8 *XXH_RESTRICT secret, size_t secretSize,
    XXH3_f_accumulate_512 f_acc512, XXH3_f_scrambleAcc f_scramble) {

  XXH_ALIGN(XXH_ACC_ALIGN) xxh_u64 acc[XXH_ACC_NB] = XXH3_INIT_ACC;

  XXH3_hashLong_internal_loop(acc, input, len, secret, secretSize,
                              XXH3_acc_64bits, f_acc512, f_scramble);

  /* converge into final hash */
  XXH_STATIC_ASSERT(sizeof(acc) == 64);
  /* do not align on 8, so that the secret is different from the accumulator */
#define XXH_SECRET_MERGEACCS_START 11
  XXH_ASSERT(secretSize >= sizeof(acc) + XXH_SECRET_MERGEACCS_START);
  return XXH3_mergeAccs(acc, secret + XXH_SECRET_MERGEACCS_START,
                        (xxh_u64)len * XXH_PRIME64_1);

}

/*
 * It's important for performance that XXH3_hashLong is not inlined.
 */
XXH_NO_INLINE XXH64_hash_t XXH3_hashLong_64b_withSecret(
    const xxh_u8 *XXH_RESTRICT input, size_t len, XXH64_hash_t seed64,
    const xxh_u8 *XXH_RESTRICT secret, size_t secretLen) {

  (void)seed64;
  return XXH3_hashLong_64b_internal(input, len, secret, secretLen,
                                    XXH3_accumulate_512, XXH3_scrambleAcc);

}

/*
 * XXH3_hashLong_64b_withSeed():
 * Generate a custom key based on alteration of default XXH3_kSecret with the
 * seed, and then use this key for long mode hashing.
 *
 * This operation is decently fast but nonetheless costs a little bit of time.
 * Try to avoid it whenever possible (typically when seed==0).
 *
 * It's important for performance that XXH3_hashLong is not inlined. Not sure
 * why (uop cache maybe?), but the difference is large and easily measurable.
 */
XXH_FORCE_INLINE XXH64_hash_t XXH3_hashLong_64b_withSeed_internal(
    const xxh_u8 *input, size_t len, XXH64_hash_t seed,
    XXH3_f_accumulate_512 f_acc512, XXH3_f_scrambleAcc f_scramble,
    XXH3_f_initCustomSecret f_initSec) {

  if (seed == 0)
    return XXH3_hashLong_64b_internal(
        input, len, XXH3_kSecret, sizeof(XXH3_kSecret), f_acc512, f_scramble);
  {

    XXH_ALIGN(XXH_SEC_ALIGN) xxh_u8 secret[XXH_SECRET_DEFAULT_SIZE];
    f_initSec(secret, seed);
    return XXH3_hashLong_64b_internal(input, len, secret, sizeof(secret),
                                      f_acc512, f_scramble);

  }

}

/*
 * It's important for performance that XXH3_hashLong is not inlined.
 */
XXH_NO_INLINE XXH64_hash_t XXH3_hashLong_64b_withSeed(const xxh_u8 *input,
                                                      size_t        len,
                                                      XXH64_hash_t  seed,
                                                      const xxh_u8 *secret,
                                                      size_t        secretLen) {

  (void)secret;
  (void)secretLen;
  return XXH3_hashLong_64b_withSeed_internal(
      input, len, seed, XXH3_accumulate_512, XXH3_scrambleAcc,
      XXH3_initCustomSecret);

}

typedef XXH64_hash_t (*XXH3_hashLong64_f)(const xxh_u8 *XXH_RESTRICT, size_t,
                                          XXH64_hash_t,
                                          const xxh_u8 *XXH_RESTRICT, size_t);

XXH_FORCE_INLINE XXH64_hash_t
XXH3_64bits_internal(const void *XXH_RESTRICT input, size_t len,
                     XXH64_hash_t seed64, const void *XXH_RESTRICT secret,
                     size_t secretLen, XXH3_hashLong64_f f_hashLong) {

  XXH_ASSERT(secretLen >= XXH3_SECRET_SIZE_MIN);
  /*
   * If an action is to be taken if `secretLen` condition is not respected,
   * it should be done here.
   * For now, it's a contract pre-condition.
   * Adding a check and a branch here would cost performance at every hash.
   * Also, note that function signature doesn't offer room to return an error.
   */
  if (len <= 16)
    return XXH3_len_0to16_64b((const xxh_u8 *)input, len,
                              (const xxh_u8 *)secret, seed64);
  if (len <= 128)
    return XXH3_len_17to128_64b((const xxh_u8 *)input, len,
                                (const xxh_u8 *)secret, secretLen, seed64);
  if (len <= XXH3_MIDSIZE_MAX)
    return XXH3_len_129to240_64b((const xxh_u8 *)input, len,
                                 (const xxh_u8 *)secret, secretLen, seed64);
  return f_hashLong((const xxh_u8 *)input, len, seed64, (const xxh_u8 *)secret,
                    secretLen);

}

/* ===   Public entry point   === */

XXH_PUBLIC_API XXH64_hash_t XXH3_64bits(const void *input, size_t len) {

  return XXH3_64bits_internal(input, len, 0, XXH3_kSecret, sizeof(XXH3_kSecret),
                              XXH3_hashLong_64b_withSecret);

}

XXH_PUBLIC_API XXH64_hash_t XXH3_64bits_withSecret(const void *input,
                                                   size_t      len,
                                                   const void *secret,
                                                   size_t      secretSize) {

  return XXH3_64bits_internal(input, len, 0, secret, secretSize,
                              XXH3_hashLong_64b_withSecret);

}

XXH_PUBLIC_API XXH64_hash_t XXH3_64bits_withSeed(const void *input, size_t len,
                                                 XXH64_hash_t seed) {

  return XXH3_64bits_internal(input, len, seed, XXH3_kSecret,
                              sizeof(XXH3_kSecret), XXH3_hashLong_64b_withSeed);

}

/* ===   XXH3 streaming   === */

/*
 * Malloc's a pointer that is always aligned to align.
 *
 * This must be freed with `XXH_alignedFree()`.
 *
 * malloc typically guarantees 16 byte alignment on 64-bit systems and 8 byte
 * alignment on 32-bit. This isn't enough for the 32 byte aligned loads in AVX2
 * or on 32-bit, the 16 byte aligned loads in SSE2 and NEON.
 *
 * This underalignment previously caused a rather obvious crash which went
 * completely unnoticed due to XXH3_createState() not actually being tested.
 * Credit to RedSpah for noticing this bug.
 *
 * The alignment is done manually: Functions like posix_memalign or _mm_malloc
 * are avoided: To maintain portability, we would have to write a fallback
 * like this anyways, and besides, testing for the existence of library
 * functions without relying on external build tools is impossible.
 *
 * The method is simple: Overallocate, manually align, and store the offset
 * to the original behind the returned pointer.
 *
 * Align must be a power of 2 and 8 <= align <= 128.
 */
static void *XXH_alignedMalloc(size_t s, size_t align) {

  XXH_ASSERT(align <= 128 && align >= 8);                    /* range check */
  XXH_ASSERT((align & (align - 1)) == 0);                     /* power of 2 */
  XXH_ASSERT(s != 0 && s < (s + align));                  /* empty/overflow */
  {  /* Overallocate to make room for manual realignment and an offset byte */
    xxh_u8 *base = (xxh_u8 *)XXH_malloc(s + align);
    if (base != NULL) {

      /*
       * Get the offset needed to align this pointer.
       *
       * Even if the returned pointer is aligned, there will always be
       * at least one byte to store the offset to the original pointer.
       */
      size_t offset = align - ((size_t)base & (align - 1)); /* base % align */
      /* Add the offset for the now-aligned pointer */
      xxh_u8 *ptr = base + offset;

      XXH_ASSERT((size_t)ptr % align == 0);

      /* Store the offset immediately before the returned pointer. */
      ptr[-1] = (xxh_u8)offset;
      return ptr;

    }

    return NULL;

  }

}

/*
 * Frees an aligned pointer allocated by XXH_alignedMalloc(). Don't pass
 * normal malloc'd pointers, XXH_alignedMalloc has a specific data layout.
 */
static void XXH_alignedFree(void *p) {

  if (p != NULL) {

    xxh_u8 *ptr = (xxh_u8 *)p;
    /* Get the offset byte we added in XXH_malloc. */
    xxh_u8 offset = ptr[-1];
    /* Free the original malloc'd pointer */
    xxh_u8 *base = ptr - offset;
    XXH_free(base);

  }

}

XXH_PUBLIC_API XXH3_state_t *XXH3_createState(void) {

  return (XXH3_state_t *)XXH_alignedMalloc(sizeof(XXH3_state_t), 64);

}

XXH_PUBLIC_API XXH_errorcode XXH3_freeState(XXH3_state_t *statePtr) {

  XXH_alignedFree(statePtr);
  return XXH_OK;

}

XXH_PUBLIC_API void XXH3_copyState(XXH3_state_t *      dst_state,
                                   const XXH3_state_t *src_state) {

  memcpy(dst_state, src_state, sizeof(*dst_state));

}

static void XXH3_64bits_reset_internal(XXH3_state_t *statePtr,
                                       XXH64_hash_t seed, const xxh_u8 *secret,
                                       size_t secretSize) {

  XXH_ASSERT(statePtr != NULL);
  memset(statePtr, 0, sizeof(*statePtr));
  statePtr->acc[0] = XXH_PRIME32_3;
  statePtr->acc[1] = XXH_PRIME64_1;
  statePtr->acc[2] = XXH_PRIME64_2;
  statePtr->acc[3] = XXH_PRIME64_3;
  statePtr->acc[4] = XXH_PRIME64_4;
  statePtr->acc[5] = XXH_PRIME32_2;
  statePtr->acc[6] = XXH_PRIME64_5;
  statePtr->acc[7] = XXH_PRIME32_1;
  statePtr->seed = seed;
  XXH_ASSERT(secret != NULL);
  statePtr->extSecret = secret;
  XXH_ASSERT(secretSize >= XXH3_SECRET_SIZE_MIN);
  statePtr->secretLimit = secretSize - XXH_STRIPE_LEN;
  statePtr->nbStripesPerBlock = statePtr->secretLimit / XXH_SECRET_CONSUME_RATE;

}

XXH_PUBLIC_API XXH_errorcode XXH3_64bits_reset(XXH3_state_t *statePtr) {

  if (statePtr == NULL) return XXH_ERROR;
  XXH3_64bits_reset_internal(statePtr, 0, XXH3_kSecret,
                             XXH_SECRET_DEFAULT_SIZE);
  return XXH_OK;

}

XXH_PUBLIC_API XXH_errorcode XXH3_64bits_reset_withSecret(
    XXH3_state_t *statePtr, const void *secret, size_t secretSize) {

  if (statePtr == NULL) return XXH_ERROR;
  XXH3_64bits_reset_internal(statePtr, 0, (const xxh_u8 *)secret, secretSize);
  if (secret == NULL) return XXH_ERROR;
  if (secretSize < XXH3_SECRET_SIZE_MIN) return XXH_ERROR;
  return XXH_OK;

}

XXH_PUBLIC_API XXH_errorcode XXH3_64bits_reset_withSeed(XXH3_state_t *statePtr,
                                                        XXH64_hash_t  seed) {

  if (statePtr == NULL) return XXH_ERROR;
  XXH3_64bits_reset_internal(statePtr, seed, XXH3_kSecret,
                             XXH_SECRET_DEFAULT_SIZE);
  XXH3_initCustomSecret(statePtr->customSecret, seed);
  statePtr->extSecret = NULL;
  return XXH_OK;

}

XXH_FORCE_INLINE void XXH3_consumeStripes(
    xxh_u64 *XXH_RESTRICT acc, size_t *XXH_RESTRICT nbStripesSoFarPtr,
    size_t nbStripesPerBlock, const xxh_u8 *XXH_RESTRICT input,
    size_t totalStripes, const xxh_u8 *XXH_RESTRICT secret, size_t secretLimit,
    XXH3_accWidth_e accWidth, XXH3_f_accumulate_512 f_acc512,
    XXH3_f_scrambleAcc f_scramble) {

  XXH_ASSERT(*nbStripesSoFarPtr < nbStripesPerBlock);
  if (nbStripesPerBlock - *nbStripesSoFarPtr <= totalStripes) {

    /* need a scrambling operation */
    size_t const nbStripes = nbStripesPerBlock - *nbStripesSoFarPtr;
    XXH3_accumulate(acc, input,
                    secret + nbStripesSoFarPtr[0] * XXH_SECRET_CONSUME_RATE,
                    nbStripes, accWidth, f_acc512);
    f_scramble(acc, secret + secretLimit);
    XXH3_accumulate(acc, input + nbStripes * XXH_STRIPE_LEN, secret,
                    totalStripes - nbStripes, accWidth, f_acc512);
    *nbStripesSoFarPtr = totalStripes - nbStripes;

  } else {

    XXH3_accumulate(acc, input,
                    secret + nbStripesSoFarPtr[0] * XXH_SECRET_CONSUME_RATE,
                    totalStripes, accWidth, f_acc512);
    *nbStripesSoFarPtr += totalStripes;

  }

}

/*
 * Both XXH3_64bits_update and XXH3_128bits_update use this routine.
 */
XXH_FORCE_INLINE XXH_errorcode XXH3_update(XXH3_state_t *state,
                                           const xxh_u8 *input, size_t len,
                                           XXH3_accWidth_e       accWidth,
                                           XXH3_f_accumulate_512 f_acc512,
                                           XXH3_f_scrambleAcc    f_scramble) {

  if (input == NULL)
#if defined(XXH_ACCEPT_NULL_INPUT_POINTER) && \
    (XXH_ACCEPT_NULL_INPUT_POINTER >= 1)
    return XXH_OK;
#else
    return XXH_ERROR;
#endif

  {

    const xxh_u8 *const        bEnd = input + len;
    const unsigned char *const secret =
        (state->extSecret == NULL) ? state->customSecret : state->extSecret;

    state->totalLen += len;

    if (state->bufferedSize + len <=
        XXH3_INTERNALBUFFER_SIZE) {                   /* fill in tmp buffer */
      XXH_memcpy(state->buffer + state->bufferedSize, input, len);
      state->bufferedSize += (XXH32_hash_t)len;
      return XXH_OK;

    }

    /* input is now > XXH3_INTERNALBUFFER_SIZE */

#define XXH3_INTERNALBUFFER_STRIPES (XXH3_INTERNALBUFFER_SIZE / XXH_STRIPE_LEN)
    XXH_STATIC_ASSERT(XXH3_INTERNALBUFFER_SIZE % XXH_STRIPE_LEN ==
                      0);                                 /* clean multiple */

    /*
     * There is some input left inside the internal buffer.
     * Fill it, then consume it.
     */
    if (state->bufferedSize) {

      size_t const loadSize = XXH3_INTERNALBUFFER_SIZE - state->bufferedSize;
      XXH_memcpy(state->buffer + state->bufferedSize, input, loadSize);
      input += loadSize;
      XXH3_consumeStripes(state->acc, &state->nbStripesSoFar,
                          state->nbStripesPerBlock, state->buffer,
                          XXH3_INTERNALBUFFER_STRIPES, secret,
                          state->secretLimit, accWidth, f_acc512, f_scramble);
      state->bufferedSize = 0;

    }

    /* Consume input by full buffer quantities */
    if (input + XXH3_INTERNALBUFFER_SIZE <= bEnd) {

      const xxh_u8 *const limit = bEnd - XXH3_INTERNALBUFFER_SIZE;
      do {

        XXH3_consumeStripes(state->acc, &state->nbStripesSoFar,
                            state->nbStripesPerBlock, input,
                            XXH3_INTERNALBUFFER_STRIPES, secret,
                            state->secretLimit, accWidth, f_acc512, f_scramble);
        input += XXH3_INTERNALBUFFER_SIZE;

      } while (input <= limit);

      /* for last partial stripe */
      memcpy(state->buffer + sizeof(state->buffer) - XXH_STRIPE_LEN,
             input - XXH_STRIPE_LEN, XXH_STRIPE_LEN);

    }

    if (input < bEnd) {                  /* Some remaining input: buffer it */
      XXH_memcpy(state->buffer, input, (size_t)(bEnd - input));
      state->bufferedSize = (XXH32_hash_t)(bEnd - input);

    }

  }

  return XXH_OK;

}

XXH_PUBLIC_API XXH_errorcode XXH3_64bits_update(XXH3_state_t *state,
                                                const void *input, size_t len) {

  return XXH3_update(state, (const xxh_u8 *)input, len, XXH3_acc_64bits,
                     XXH3_accumulate_512, XXH3_scrambleAcc);

}

XXH_FORCE_INLINE void XXH3_digest_long(XXH64_hash_t *       acc,
                                       const XXH3_state_t * state,
                                       const unsigned char *secret,
                                       XXH3_accWidth_e      accWidth) {

  /*
   * Digest on a local copy. This way, the state remains unaltered, and it can
   * continue ingesting more input afterwards.
   */
  memcpy(acc, state->acc, sizeof(state->acc));
  if (state->bufferedSize >= XXH_STRIPE_LEN) {

    size_t const nbStripes = state->bufferedSize / XXH_STRIPE_LEN;
    size_t       nbStripesSoFar = state->nbStripesSoFar;
    XXH3_consumeStripes(acc, &nbStripesSoFar, state->nbStripesPerBlock,
                        state->buffer, nbStripes, secret, state->secretLimit,
                        accWidth, XXH3_accumulate_512, XXH3_scrambleAcc);
    if (state->bufferedSize % XXH_STRIPE_LEN) {  /* one last partial stripe */
      XXH3_accumulate_512(
          acc, state->buffer + state->bufferedSize - XXH_STRIPE_LEN,
          secret + state->secretLimit - XXH_SECRET_LASTACC_START, accWidth);

    }

  } else {                                 /* bufferedSize < XXH_STRIPE_LEN */

    if (state->bufferedSize) {                           /* one last stripe */
      xxh_u8       lastStripe[XXH_STRIPE_LEN];
      size_t const catchupSize = XXH_STRIPE_LEN - state->bufferedSize;
      memcpy(lastStripe, state->buffer + sizeof(state->buffer) - catchupSize,
             catchupSize);
      memcpy(lastStripe + catchupSize, state->buffer, state->bufferedSize);
      XXH3_accumulate_512(
          acc, lastStripe,
          secret + state->secretLimit - XXH_SECRET_LASTACC_START, accWidth);

    }

  }

}

XXH_PUBLIC_API XXH64_hash_t XXH3_64bits_digest(const XXH3_state_t *state) {

  const unsigned char *const secret =
      (state->extSecret == NULL) ? state->customSecret : state->extSecret;
  if (state->totalLen > XXH3_MIDSIZE_MAX) {

    XXH_ALIGN(XXH_ACC_ALIGN) XXH64_hash_t acc[XXH_ACC_NB];
    XXH3_digest_long(acc, state, secret, XXH3_acc_64bits);
    return XXH3_mergeAccs(acc, secret + XXH_SECRET_MERGEACCS_START,
                          (xxh_u64)state->totalLen * XXH_PRIME64_1);

  }

  /* totalLen <= XXH3_MIDSIZE_MAX: digesting a short input */
  if (state->seed)
    return XXH3_64bits_withSeed(state->buffer, (size_t)state->totalLen,
                                state->seed);
  return XXH3_64bits_withSecret(state->buffer, (size_t)(state->totalLen),
                                secret, state->secretLimit + XXH_STRIPE_LEN);

}

#define XXH_MIN(x, y) (((x) > (y)) ? (y) : (x))

XXH_PUBLIC_API void XXH3_generateSecret(void *      secretBuffer,
                                        const void *customSeed,
                                        size_t      customSeedSize) {

  XXH_ASSERT(secretBuffer != NULL);
  if (customSeedSize == 0) {

    memcpy(secretBuffer, XXH3_kSecret, XXH_SECRET_DEFAULT_SIZE);
    return;

  }

  XXH_ASSERT(customSeed != NULL);

  {

    size_t const       segmentSize = sizeof(XXH128_hash_t);
    size_t const       nbSegments = XXH_SECRET_DEFAULT_SIZE / segmentSize;
    XXH128_canonical_t scrambler;
    XXH64_hash_t       seeds[12];
    size_t             segnb;
    XXH_ASSERT(nbSegments == 12);
    XXH_ASSERT(segmentSize * nbSegments ==
               XXH_SECRET_DEFAULT_SIZE);                  /* exact multiple */
    XXH128_canonicalFromHash(&scrambler, XXH128(customSeed, customSeedSize, 0));

    /*
     * Copy customSeed to seeds[], truncating or repeating as necessary.
     */
    {

      size_t toFill = XXH_MIN(customSeedSize, sizeof(seeds));
      size_t filled = toFill;
      memcpy(seeds, customSeed, toFill);
      while (filled < sizeof(seeds)) {

        toFill = XXH_MIN(filled, sizeof(seeds) - filled);
        memcpy((char *)seeds + filled, seeds, toFill);
        filled += toFill;

      }

    }

    /* generate secret */
    memcpy(secretBuffer, &scrambler, sizeof(scrambler));
    for (segnb = 1; segnb < nbSegments; segnb++) {

      size_t const       segmentStart = segnb * segmentSize;
      XXH128_canonical_t segment;
      XXH128_canonicalFromHash(&segment,
                               XXH128(&scrambler, sizeof(scrambler),
                                      XXH_readLE64(seeds + segnb) + segnb));
      memcpy((char *)secretBuffer + segmentStart, &segment, sizeof(segment));

    }

  }

}

/* ==========================================
 * XXH3 128 bits (a.k.a XXH128)
 * ==========================================
 * XXH3's 128-bit variant has better mixing and strength than the 64-bit
 * variant, even without counting the significantly larger output size.
 *
 * For example, extra steps are taken to avoid the seed-dependent collisions
 * in 17-240 byte inputs (See XXH3_mix16B and XXH128_mix32B).
 *
 * This strength naturally comes at the cost of some speed, especially on short
 * lengths. Note that longer hashes are about as fast as the 64-bit version
 * due to it using only a slight modification of the 64-bit loop.
 *
 * XXH128 is also more oriented towards 64-bit machines. It is still extremely
 * fast for a _128-bit_ hash on 32-bit (it usually clears XXH64).
 */

XXH_FORCE_INLINE XXH128_hash_t XXH3_len_1to3_128b(const xxh_u8 *input,
                                                  size_t        len,
                                                  const xxh_u8 *secret,
                                                  XXH64_hash_t  seed) {

  /* A doubled version of 1to3_64b with different constants. */
  XXH_ASSERT(input != NULL);
  XXH_ASSERT(1 <= len && len <= 3);
  XXH_ASSERT(secret != NULL);
  /*
   * len = 1: combinedl = { input[0], 0x01, input[0], input[0] }
   * len = 2: combinedl = { input[1], 0x02, input[0], input[1] }
   * len = 3: combinedl = { input[2], 0x03, input[0], input[1] }
   */
  {

    xxh_u8 const  c1 = input[0];
    xxh_u8 const  c2 = input[len >> 1];
    xxh_u8 const  c3 = input[len - 1];
    xxh_u32 const combinedl = ((xxh_u32)c1 << 16) | ((xxh_u32)c2 << 24) |
                              ((xxh_u32)c3 << 0) | ((xxh_u32)len << 8);
    xxh_u32 const combinedh = XXH_rotl32(XXH_swap32(combinedl), 13);
    xxh_u64 const bitflipl =
        (XXH_readLE32(secret) ^ XXH_readLE32(secret + 4)) + seed;
    xxh_u64 const bitfliph =
        (XXH_readLE32(secret + 8) ^ XXH_readLE32(secret + 12)) - seed;
    xxh_u64 const keyed_lo = (xxh_u64)combinedl ^ bitflipl;
    xxh_u64 const keyed_hi = (xxh_u64)combinedh ^ bitfliph;
    xxh_u64 const mixedl = keyed_lo * XXH_PRIME64_1;
    xxh_u64 const mixedh = keyed_hi * XXH_PRIME64_5;
    XXH128_hash_t h128;
    h128.low64 = XXH3_avalanche(mixedl);
    h128.high64 = XXH3_avalanche(mixedh);
    return h128;

  }

}

XXH_FORCE_INLINE XXH128_hash_t XXH3_len_4to8_128b(const xxh_u8 *input,
                                                  size_t        len,
                                                  const xxh_u8 *secret,
                                                  XXH64_hash_t  seed) {

  XXH_ASSERT(input != NULL);
  XXH_ASSERT(secret != NULL);
  XXH_ASSERT(4 <= len && len <= 8);
  seed ^= (xxh_u64)XXH_swap32((xxh_u32)seed) << 32;
  {

    xxh_u32 const input_lo = XXH_readLE32(input);
    xxh_u32 const input_hi = XXH_readLE32(input + len - 4);
    xxh_u64 const input_64 = input_lo + ((xxh_u64)input_hi << 32);
    xxh_u64 const bitflip =
        (XXH_readLE64(secret + 16) ^ XXH_readLE64(secret + 24)) + seed;
    xxh_u64 const keyed = input_64 ^ bitflip;

    /* Shift len to the left to ensure it is even, this avoids even multiplies.
     */
    XXH128_hash_t m128 = XXH_mult64to128(keyed, XXH_PRIME64_1 + (len << 2));

    m128.high64 += (m128.low64 << 1);
    m128.low64 ^= (m128.high64 >> 3);

    m128.low64 = XXH_xorshift64(m128.low64, 35);
    m128.low64 *= 0x9FB21C651E98DF25ULL;
    m128.low64 = XXH_xorshift64(m128.low64, 28);
    m128.high64 = XXH3_avalanche(m128.high64);
    return m128;

  }

}

XXH_FORCE_INLINE XXH128_hash_t XXH3_len_9to16_128b(const xxh_u8 *input,
                                                   size_t        len,
                                                   const xxh_u8 *secret,
                                                   XXH64_hash_t  seed) {

  XXH_ASSERT(input != NULL);
  XXH_ASSERT(secret != NULL);
  XXH_ASSERT(9 <= len && len <= 16);
  {

    xxh_u64 const bitflipl =
        (XXH_readLE64(secret + 32) ^ XXH_readLE64(secret + 40)) - seed;
    xxh_u64 const bitfliph =
        (XXH_readLE64(secret + 48) ^ XXH_readLE64(secret + 56)) + seed;
    xxh_u64 const input_lo = XXH_readLE64(input);
    xxh_u64       input_hi = XXH_readLE64(input + len - 8);
    XXH128_hash_t m128 =
        XXH_mult64to128(input_lo ^ input_hi ^ bitflipl, XXH_PRIME64_1);
    /*
     * Put len in the middle of m128 to ensure that the length gets mixed to
     * both the low and high bits in the 128x64 multiply below.
     */
    m128.low64 += (xxh_u64)(len - 1) << 54;
    input_hi ^= bitfliph;
    /*
     * Add the high 32 bits of input_hi to the high 32 bits of m128, then
     * add the long product of the low 32 bits of input_hi and XXH_PRIME32_2 to
     * the high 64 bits of m128.
     *
     * The best approach to this operation is different on 32-bit and 64-bit.
     */
    if (sizeof(void *) < sizeof(xxh_u64)) {                       /* 32-bit */
      /*
       * 32-bit optimized version, which is more readable.
       *
       * On 32-bit, it removes an ADC and delays a dependency between the two
       * halves of m128.high64, but it generates an extra mask on 64-bit.
       */
      m128.high64 += (input_hi & 0xFFFFFFFF00000000) +
                     XXH_mult32to64((xxh_u32)input_hi, XXH_PRIME32_2);

    } else {

      /*
       * 64-bit optimized (albeit more confusing) version.
       *
       * Uses some properties of addition and multiplication to remove the mask:
       *
       * Let:
       *    a = input_hi.lo = (input_hi & 0x00000000FFFFFFFF)
       *    b = input_hi.hi = (input_hi & 0xFFFFFFFF00000000)
       *    c = XXH_PRIME32_2
       *
       *    a + (b * c)
       * Inverse Property: x + y - x == y
       *    a + (b * (1 + c - 1))
       * Distributive Property: x * (y + z) == (x * y) + (x * z)
       *    a + (b * 1) + (b * (c - 1))
       * Identity Property: x * 1 == x
       *    a + b + (b * (c - 1))
       *
       * Substitute a, b, and c:
       *    input_hi.hi + input_hi.lo + ((xxh_u64)input_hi.lo * (XXH_PRIME32_2 -
       * 1))
       *
       * Since input_hi.hi + input_hi.lo == input_hi, we get this:
       *    input_hi + ((xxh_u64)input_hi.lo * (XXH_PRIME32_2 - 1))
       */
      m128.high64 +=
          input_hi + XXH_mult32to64((xxh_u32)input_hi, XXH_PRIME32_2 - 1);

    }

    /* m128 ^= XXH_swap64(m128 >> 64); */
    m128.low64 ^= XXH_swap64(m128.high64);

    {                      /* 128x64 multiply: h128 = m128 * XXH_PRIME64_2; */
      XXH128_hash_t h128 = XXH_mult64to128(m128.low64, XXH_PRIME64_2);
      h128.high64 += m128.high64 * XXH_PRIME64_2;

      h128.low64 = XXH3_avalanche(h128.low64);
      h128.high64 = XXH3_avalanche(h128.high64);
      return h128;

    }

  }

}

/*
 * Assumption: `secret` size is >= XXH3_SECRET_SIZE_MIN
 */
XXH_FORCE_INLINE XXH128_hash_t XXH3_len_0to16_128b(const xxh_u8 *input,
                                                   size_t        len,
                                                   const xxh_u8 *secret,
                                                   XXH64_hash_t  seed) {

  XXH_ASSERT(len <= 16);
  {

    if (len > 8) return XXH3_len_9to16_128b(input, len, secret, seed);
    if (len >= 4) return XXH3_len_4to8_128b(input, len, secret, seed);
    if (len) return XXH3_len_1to3_128b(input, len, secret, seed);
    {

      XXH128_hash_t h128;
      xxh_u64 const bitflipl =
          XXH_readLE64(secret + 64) ^ XXH_readLE64(secret + 72);
      xxh_u64 const bitfliph =
          XXH_readLE64(secret + 80) ^ XXH_readLE64(secret + 88);
      h128.low64 = XXH3_avalanche((XXH_PRIME64_1 + seed) ^ bitflipl);
      h128.high64 = XXH3_avalanche((XXH_PRIME64_2 - seed) ^ bitfliph);
      return h128;

    }

  }

}

/*
 * A bit slower than XXH3_mix16B, but handles multiply by zero better.
 */
XXH_FORCE_INLINE XXH128_hash_t XXH128_mix32B(XXH128_hash_t acc,
                                             const xxh_u8 *input_1,
                                             const xxh_u8 *input_2,
                                             const xxh_u8 *secret,
                                             XXH64_hash_t  seed) {

  acc.low64 += XXH3_mix16B(input_1, secret + 0, seed);
  acc.low64 ^= XXH_readLE64(input_2) + XXH_readLE64(input_2 + 8);
  acc.high64 += XXH3_mix16B(input_2, secret + 16, seed);
  acc.high64 ^= XXH_readLE64(input_1) + XXH_readLE64(input_1 + 8);
  return acc;

}

XXH_FORCE_INLINE XXH128_hash_t XXH3_len_17to128_128b(
    const xxh_u8 *XXH_RESTRICT input, size_t len,
    const xxh_u8 *XXH_RESTRICT secret, size_t secretSize, XXH64_hash_t seed) {

  XXH_ASSERT(secretSize >= XXH3_SECRET_SIZE_MIN);
  (void)secretSize;
  XXH_ASSERT(16 < len && len <= 128);

  {

    XXH128_hash_t acc;
    acc.low64 = len * XXH_PRIME64_1;
    acc.high64 = 0;
    if (len > 32) {

      if (len > 64) {

        if (len > 96) {

          acc = XXH128_mix32B(acc, input + 48, input + len - 64, secret + 96,
                              seed);

        }

        acc =
            XXH128_mix32B(acc, input + 32, input + len - 48, secret + 64, seed);

      }

      acc = XXH128_mix32B(acc, input + 16, input + len - 32, secret + 32, seed);

    }

    acc = XXH128_mix32B(acc, input, input + len - 16, secret, seed);
    {

      XXH128_hash_t h128;
      h128.low64 = acc.low64 + acc.high64;
      h128.high64 = (acc.low64 * XXH_PRIME64_1) + (acc.high64 * XXH_PRIME64_4) +
                    ((len - seed) * XXH_PRIME64_2);
      h128.low64 = XXH3_avalanche(h128.low64);
      h128.high64 = (XXH64_hash_t)0 - XXH3_avalanche(h128.high64);
      return h128;

    }

  }

}

XXH_NO_INLINE XXH128_hash_t XXH3_len_129to240_128b(
    const xxh_u8 *XXH_RESTRICT input, size_t len,
    const xxh_u8 *XXH_RESTRICT secret, size_t secretSize, XXH64_hash_t seed) {

  XXH_ASSERT(secretSize >= XXH3_SECRET_SIZE_MIN);
  (void)secretSize;
  XXH_ASSERT(128 < len && len <= XXH3_MIDSIZE_MAX);

  {

    XXH128_hash_t acc;
    int const     nbRounds = (int)len / 32;
    int           i;
    acc.low64 = len * XXH_PRIME64_1;
    acc.high64 = 0;
    for (i = 0; i < 4; i++) {

      acc = XXH128_mix32B(acc, input + (32 * i), input + (32 * i) + 16,
                          secret + (32 * i), seed);

    }

    acc.low64 = XXH3_avalanche(acc.low64);
    acc.high64 = XXH3_avalanche(acc.high64);
    XXH_ASSERT(nbRounds >= 4);
    for (i = 4; i < nbRounds; i++) {

      acc = XXH128_mix32B(acc, input + (32 * i), input + (32 * i) + 16,
                          secret + XXH3_MIDSIZE_STARTOFFSET + (32 * (i - 4)),
                          seed);

    }

    /* last bytes */
    acc = XXH128_mix32B(
        acc, input + len - 16, input + len - 32,
        secret + XXH3_SECRET_SIZE_MIN - XXH3_MIDSIZE_LASTOFFSET - 16,
        0ULL - seed);

    {

      XXH128_hash_t h128;
      h128.low64 = acc.low64 + acc.high64;
      h128.high64 = (acc.low64 * XXH_PRIME64_1) + (acc.high64 * XXH_PRIME64_4) +
                    ((len - seed) * XXH_PRIME64_2);
      h128.low64 = XXH3_avalanche(h128.low64);
      h128.high64 = (XXH64_hash_t)0 - XXH3_avalanche(h128.high64);
      return h128;

    }

  }

}

XXH_FORCE_INLINE XXH128_hash_t XXH3_hashLong_128b_internal(
    const xxh_u8 *XXH_RESTRICT input, size_t len,
    const xxh_u8 *XXH_RESTRICT secret, size_t secretSize,
    XXH3_f_accumulate_512 f_acc512, XXH3_f_scrambleAcc f_scramble) {

  XXH_ALIGN(XXH_ACC_ALIGN) xxh_u64 acc[XXH_ACC_NB] = XXH3_INIT_ACC;

  XXH3_hashLong_internal_loop(acc, input, len, secret, secretSize,
                              XXH3_acc_128bits, f_acc512, f_scramble);

  /* converge into final hash */
  XXH_STATIC_ASSERT(sizeof(acc) == 64);
  XXH_ASSERT(secretSize >= sizeof(acc) + XXH_SECRET_MERGEACCS_START);
  {

    XXH128_hash_t h128;
    h128.low64 = XXH3_mergeAccs(acc, secret + XXH_SECRET_MERGEACCS_START,
                                (xxh_u64)len * XXH_PRIME64_1);
    h128.high64 = XXH3_mergeAccs(
        acc, secret + secretSize - sizeof(acc) - XXH_SECRET_MERGEACCS_START,
        ~((xxh_u64)len * XXH_PRIME64_2));
    return h128;

  }

}

/*
 * It's important for performance that XXH3_hashLong is not inlined.
 */
XXH_NO_INLINE XXH128_hash_t XXH3_hashLong_128b_defaultSecret(
    const xxh_u8 *XXH_RESTRICT input, size_t len, XXH64_hash_t seed64,
    const xxh_u8 *XXH_RESTRICT secret, size_t secretLen) {

  (void)seed64;
  (void)secret;
  (void)secretLen;
  return XXH3_hashLong_128b_internal(input, len, XXH3_kSecret,
                                     sizeof(XXH3_kSecret), XXH3_accumulate_512,
                                     XXH3_scrambleAcc);

}

/*
 * It's important for performance that XXH3_hashLong is not inlined.
 */
XXH_NO_INLINE XXH128_hash_t XXH3_hashLong_128b_withSecret(
    const xxh_u8 *XXH_RESTRICT input, size_t len, XXH64_hash_t seed64,
    const xxh_u8 *XXH_RESTRICT secret, size_t secretLen) {

  (void)seed64;
  return XXH3_hashLong_128b_internal(input, len, secret, secretLen,
                                     XXH3_accumulate_512, XXH3_scrambleAcc);

}

XXH_FORCE_INLINE XXH128_hash_t XXH3_hashLong_128b_withSeed_internal(
    const xxh_u8 *XXH_RESTRICT input, size_t len, XXH64_hash_t seed64,
    XXH3_f_accumulate_512 f_acc512, XXH3_f_scrambleAcc f_scramble,
    XXH3_f_initCustomSecret f_initSec) {

  if (seed64 == 0)
    return XXH3_hashLong_128b_internal(
        input, len, XXH3_kSecret, sizeof(XXH3_kSecret), f_acc512, f_scramble);
  {

    XXH_ALIGN(XXH_SEC_ALIGN) xxh_u8 secret[XXH_SECRET_DEFAULT_SIZE];
    f_initSec(secret, seed64);
    return XXH3_hashLong_128b_internal(input, len, secret, sizeof(secret),
                                       f_acc512, f_scramble);

  }

}

/*
 * It's important for performance that XXH3_hashLong is not inlined.
 */
XXH_NO_INLINE XXH128_hash_t XXH3_hashLong_128b_withSeed(
    const xxh_u8 *input, size_t len, XXH64_hash_t seed64,
    const xxh_u8 *XXH_RESTRICT secret, size_t secretLen) {

  (void)secret;
  (void)secretLen;
  return XXH3_hashLong_128b_withSeed_internal(
      input, len, seed64, XXH3_accumulate_512, XXH3_scrambleAcc,
      XXH3_initCustomSecret);

}

typedef XXH128_hash_t (*XXH3_hashLong128_f)(const xxh_u8 *XXH_RESTRICT, size_t,
                                            XXH64_hash_t,
                                            const xxh_u8 *XXH_RESTRICT, size_t);

XXH_FORCE_INLINE XXH128_hash_t
XXH3_128bits_internal(const void *input, size_t len, XXH64_hash_t seed64,
                      const xxh_u8 *XXH_RESTRICT secret, size_t secretLen,
                      XXH3_hashLong128_f f_hl128) {

  XXH_ASSERT(secretLen >= XXH3_SECRET_SIZE_MIN);
  /*
   * If an action is to be taken if `secret` conditions are not respected,
   * it should be done here.
   * For now, it's a contract pre-condition.
   * Adding a check and a branch here would cost performance at every hash.
   */
  if (len <= 16)
    return XXH3_len_0to16_128b((const xxh_u8 *)input, len, secret, seed64);
  if (len <= 128)
    return XXH3_len_17to128_128b((const xxh_u8 *)input, len, secret, secretLen,
                                 seed64);
  if (len <= XXH3_MIDSIZE_MAX)
    return XXH3_len_129to240_128b((const xxh_u8 *)input, len, secret, secretLen,
                                  seed64);
  return f_hl128((const xxh_u8 *)input, len, seed64, secret, secretLen);

}

/* ===   Public XXH128 API   === */

XXH_PUBLIC_API XXH128_hash_t XXH3_128bits(const void *input, size_t len) {

  return XXH3_128bits_internal(input, len, 0, XXH3_kSecret,
                               sizeof(XXH3_kSecret),
                               XXH3_hashLong_128b_withSecret);

}

XXH_PUBLIC_API XXH128_hash_t XXH3_128bits_withSecret(const void *input,
                                                     size_t      len,
                                                     const void *secret,
                                                     size_t      secretSize) {

  return XXH3_128bits_internal(input, len, 0, (const xxh_u8 *)secret,
                               secretSize, XXH3_hashLong_128b_defaultSecret);

}

XXH_PUBLIC_API XXH128_hash_t XXH3_128bits_withSeed(const void * input,
                                                   size_t       len,
                                                   XXH64_hash_t seed) {

  return XXH3_128bits_internal(input, len, seed, XXH3_kSecret,
                               sizeof(XXH3_kSecret),
                               XXH3_hashLong_128b_withSeed);

}

XXH_PUBLIC_API XXH128_hash_t XXH128(const void *input, size_t len,
                                    XXH64_hash_t seed) {

  return XXH3_128bits_withSeed(input, len, seed);

}

/* ===   XXH3 128-bit streaming   === */

/*
 * All the functions are actually the same as for 64-bit streaming variant.
 * The only difference is the finalizatiom routine.
 */

static void XXH3_128bits_reset_internal(XXH3_state_t *statePtr,
                                        XXH64_hash_t seed, const xxh_u8 *secret,
                                        size_t secretSize) {

  XXH3_64bits_reset_internal(statePtr, seed, secret, secretSize);

}

XXH_PUBLIC_API XXH_errorcode XXH3_128bits_reset(XXH3_state_t *statePtr) {

  if (statePtr == NULL) return XXH_ERROR;
  XXH3_128bits_reset_internal(statePtr, 0, XXH3_kSecret,
                              XXH_SECRET_DEFAULT_SIZE);
  return XXH_OK;

}

XXH_PUBLIC_API XXH_errorcode XXH3_128bits_reset_withSecret(
    XXH3_state_t *statePtr, const void *secret, size_t secretSize) {

  if (statePtr == NULL) return XXH_ERROR;
  XXH3_128bits_reset_internal(statePtr, 0, (const xxh_u8 *)secret, secretSize);
  if (secret == NULL) return XXH_ERROR;
  if (secretSize < XXH3_SECRET_SIZE_MIN) return XXH_ERROR;
  return XXH_OK;

}

XXH_PUBLIC_API XXH_errorcode XXH3_128bits_reset_withSeed(XXH3_state_t *statePtr,
                                                         XXH64_hash_t  seed) {

  if (statePtr == NULL) return XXH_ERROR;
  XXH3_128bits_reset_internal(statePtr, seed, XXH3_kSecret,
                              XXH_SECRET_DEFAULT_SIZE);
  XXH3_initCustomSecret(statePtr->customSecret, seed);
  statePtr->extSecret = NULL;
  return XXH_OK;

}

XXH_PUBLIC_API XXH_errorcode XXH3_128bits_update(XXH3_state_t *state,
                                                 const void *  input,
                                                 size_t        len) {

  return XXH3_update(state, (const xxh_u8 *)input, len, XXH3_acc_128bits,
                     XXH3_accumulate_512, XXH3_scrambleAcc);

}

XXH_PUBLIC_API XXH128_hash_t XXH3_128bits_digest(const XXH3_state_t *state) {

  const unsigned char *const secret =
      (state->extSecret == NULL) ? state->customSecret : state->extSecret;
  if (state->totalLen > XXH3_MIDSIZE_MAX) {

    XXH_ALIGN(XXH_ACC_ALIGN) XXH64_hash_t acc[XXH_ACC_NB];
    XXH3_digest_long(acc, state, secret, XXH3_acc_128bits);
    XXH_ASSERT(state->secretLimit + XXH_STRIPE_LEN >=
               sizeof(acc) + XXH_SECRET_MERGEACCS_START);
    {

      XXH128_hash_t h128;
      h128.low64 = XXH3_mergeAccs(acc, secret + XXH_SECRET_MERGEACCS_START,
                                  (xxh_u64)state->totalLen * XXH_PRIME64_1);
      h128.high64 =
          XXH3_mergeAccs(acc,
                         secret + state->secretLimit + XXH_STRIPE_LEN -
                             sizeof(acc) - XXH_SECRET_MERGEACCS_START,
                         ~((xxh_u64)state->totalLen * XXH_PRIME64_2));
      return h128;

    }

  }

  /* len <= XXH3_MIDSIZE_MAX : short code */
  if (state->seed)
    return XXH3_128bits_withSeed(state->buffer, (size_t)state->totalLen,
                                 state->seed);
  return XXH3_128bits_withSecret(state->buffer, (size_t)(state->totalLen),
                                 secret, state->secretLimit + XXH_STRIPE_LEN);

}

/* 128-bit utility functions */

#include <string.h>                                       /* memcmp, memcpy */

/* return : 1 is equal, 0 if different */
XXH_PUBLIC_API int XXH128_isEqual(XXH128_hash_t h1, XXH128_hash_t h2) {

  /* note : XXH128_hash_t is compact, it has no padding byte */
  return !(memcmp(&h1, &h2, sizeof(h1)));

}

/* This prototype is compatible with stdlib's qsort().
 * return : >0 if *h128_1  > *h128_2
 *          <0 if *h128_1  < *h128_2
 *          =0 if *h128_1 == *h128_2  */
XXH_PUBLIC_API int XXH128_cmp(const void *h128_1, const void *h128_2) {

  XXH128_hash_t const h1 = *(const XXH128_hash_t *)h128_1;
  XXH128_hash_t const h2 = *(const XXH128_hash_t *)h128_2;
  int const           hcmp = (h1.high64 > h2.high64) - (h2.high64 > h1.high64);
  /* note : bets that, in most cases, hash values are different */
  if (hcmp) return hcmp;
  return (h1.low64 > h2.low64) - (h2.low64 > h1.low64);

}

/*======   Canonical representation   ======*/
XXH_PUBLIC_API void XXH128_canonicalFromHash(XXH128_canonical_t *dst,
                                             XXH128_hash_t       hash) {

  XXH_STATIC_ASSERT(sizeof(XXH128_canonical_t) == sizeof(XXH128_hash_t));
  if (XXH_CPU_LITTLE_ENDIAN) {

    hash.high64 = XXH_swap64(hash.high64);
    hash.low64 = XXH_swap64(hash.low64);

  }

  memcpy(dst, &hash.high64, sizeof(hash.high64));
  memcpy((char *)dst + sizeof(hash.high64), &hash.low64, sizeof(hash.low64));

}

XXH_PUBLIC_API XXH128_hash_t
XXH128_hashFromCanonical(const XXH128_canonical_t *src) {

  XXH128_hash_t h;
  h.high64 = XXH_readBE64(src);
  h.low64 = XXH_readBE64(src->digest + 8);
  return h;

}

/* Pop our optimization override from above */
#if XXH_VECTOR == XXH_AVX2                      /* AVX2 */           \
    && defined(__GNUC__) && !defined(__clang__) /* GCC, not Clang */ \
    && defined(__OPTIMIZE__) &&                                      \
    !defined(__OPTIMIZE_SIZE__)                      /* respect -O0 and -Os */
  #pragma GCC pop_options
#endif

#endif                                                 /* XXH3_H_1397135465 */

