You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

shingles.c 9.4KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "shingles.h"
  17. #include "fstring.h"
  18. #include "cryptobox.h"
  19. #include "images.h"
  20. #include "libstat/stat_api.h"
  21. #define SHINGLES_WINDOW 3
  22. #define SHINGLES_KEY_SIZE rspamd_cryptobox_SIPKEYBYTES
  23. static guint
  24. rspamd_shingles_keys_hash (gconstpointer k)
  25. {
  26. return rspamd_cryptobox_fast_hash (k, SHINGLES_KEY_SIZE,
  27. rspamd_hash_seed ());
  28. }
  29. static gboolean
  30. rspamd_shingles_keys_equal (gconstpointer k1, gconstpointer k2)
  31. {
  32. return (memcmp (k1, k2, SHINGLES_KEY_SIZE) == 0);
  33. }
  34. static void
  35. rspamd_shingles_keys_free (gpointer p)
  36. {
  37. guchar **k = p;
  38. guint i;
  39. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  40. g_free (k[i]);
  41. }
  42. g_free (k);
  43. }
  44. static guchar **
  45. rspamd_shingles_keys_new (void)
  46. {
  47. guchar **k;
  48. guint i;
  49. k = g_malloc0 (sizeof (guchar *) * RSPAMD_SHINGLE_SIZE);
  50. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  51. k[i] = g_malloc0 (sizeof (guchar) * SHINGLES_KEY_SIZE);
  52. }
  53. return k;
  54. }
  55. static guchar **
  56. rspamd_shingles_get_keys_cached (const guchar key[SHINGLES_KEY_SIZE])
  57. {
  58. static GHashTable *ht = NULL;
  59. guchar **keys = NULL, *key_cpy;
  60. rspamd_cryptobox_hash_state_t bs;
  61. const guchar *cur_key;
  62. guchar shabuf[rspamd_cryptobox_HASHBYTES], *out_key;
  63. guint i;
  64. if (ht == NULL) {
  65. ht = g_hash_table_new_full (rspamd_shingles_keys_hash,
  66. rspamd_shingles_keys_equal, g_free, rspamd_shingles_keys_free);
  67. }
  68. else {
  69. keys = g_hash_table_lookup (ht, key);
  70. }
  71. if (keys == NULL) {
  72. keys = rspamd_shingles_keys_new ();
  73. key_cpy = g_malloc (SHINGLES_KEY_SIZE);
  74. memcpy (key_cpy, key, SHINGLES_KEY_SIZE);
  75. /* Generate keys */
  76. rspamd_cryptobox_hash_init (&bs, NULL, 0);
  77. cur_key = key;
  78. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  79. /*
  80. * To generate a set of hashes we just apply sha256 to the
  81. * initial key as many times as many hashes are required and
  82. * xor left and right parts of sha256 to get a single 16 bytes SIP key.
  83. */
  84. out_key = keys[i];
  85. rspamd_cryptobox_hash_update (&bs, cur_key, 16);
  86. rspamd_cryptobox_hash_final (&bs, shabuf);
  87. memcpy (out_key, shabuf, 16);
  88. rspamd_cryptobox_hash_init (&bs, NULL, 0);
  89. cur_key = out_key;
  90. }
  91. g_hash_table_insert (ht, key_cpy, keys);
  92. }
  93. return keys;
  94. }
  95. struct rspamd_shingle* RSPAMD_OPTIMIZE("unroll-loops")
  96. rspamd_shingles_from_text (GArray *input,
  97. const guchar key[16],
  98. rspamd_mempool_t *pool,
  99. rspamd_shingles_filter filter,
  100. gpointer filterd,
  101. enum rspamd_shingle_alg alg)
  102. {
  103. struct rspamd_shingle *res;
  104. guint64 **hashes;
  105. guchar **keys;
  106. rspamd_fstring_t *row;
  107. rspamd_stat_token_t *word;
  108. guint64 val;
  109. gint i, j, k;
  110. gsize hlen, ilen = 0, beg = 0, widx = 0;
  111. enum rspamd_cryptobox_fast_hash_type ht;
  112. if (pool != NULL) {
  113. res = rspamd_mempool_alloc (pool, sizeof (*res));
  114. }
  115. else {
  116. res = g_malloc (sizeof (*res));
  117. }
  118. row = rspamd_fstring_sized_new (256);
  119. for (i = 0; i < input->len; i ++) {
  120. word = &g_array_index (input, rspamd_stat_token_t, i);
  121. if (!((word->flags & RSPAMD_STAT_TOKEN_FLAG_SKIPPED)
  122. || word->stemmed.len == 0)) {
  123. ilen ++;
  124. }
  125. }
  126. /* Init hashes pipes and keys */
  127. hashes = g_malloc (sizeof (*hashes) * RSPAMD_SHINGLE_SIZE);
  128. hlen = ilen > SHINGLES_WINDOW ?
  129. (ilen - SHINGLES_WINDOW + 1) : 1;
  130. keys = rspamd_shingles_get_keys_cached (key);
  131. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  132. hashes[i] = g_malloc (hlen * sizeof (guint64));
  133. }
  134. /* Now parse input words into a vector of hashes using rolling window */
  135. if (alg == RSPAMD_SHINGLES_OLD) {
  136. for (i = 0; i <= (gint)ilen; i ++) {
  137. if (i - beg >= SHINGLES_WINDOW || i == (gint)ilen) {
  138. for (j = beg; j < i; j ++) {
  139. word = NULL;
  140. while (widx < input->len) {
  141. word = &g_array_index (input, rspamd_stat_token_t, widx);
  142. if ((word->flags & RSPAMD_STAT_TOKEN_FLAG_SKIPPED)
  143. || word->stemmed.len == 0) {
  144. widx++;
  145. }
  146. else {
  147. break;
  148. }
  149. }
  150. if (word == NULL) {
  151. /* Nothing but exceptions */
  152. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  153. g_free (hashes[i]);
  154. }
  155. g_free (hashes);
  156. return NULL;
  157. }
  158. row = rspamd_fstring_append (row, word->stemmed.begin,
  159. word->stemmed.len);
  160. }
  161. /* Now we need to create a new row here */
  162. for (j = 0; j < RSPAMD_SHINGLE_SIZE; j ++) {
  163. rspamd_cryptobox_siphash ((guchar *)&val, row->str, row->len,
  164. keys[j]);
  165. g_assert (hlen > beg);
  166. hashes[j][beg] = val;
  167. }
  168. beg++;
  169. widx ++;
  170. row = rspamd_fstring_assign (row, "", 0);
  171. }
  172. }
  173. }
  174. else {
  175. guint64 window[SHINGLES_WINDOW * RSPAMD_SHINGLE_SIZE], seed;
  176. switch (alg) {
  177. case RSPAMD_SHINGLES_XXHASH:
  178. ht = RSPAMD_CRYPTOBOX_XXHASH64;
  179. break;
  180. case RSPAMD_SHINGLES_MUMHASH:
  181. ht = RSPAMD_CRYPTOBOX_MUMHASH;
  182. break;
  183. default:
  184. ht = RSPAMD_CRYPTOBOX_HASHFAST_INDEPENDENT;
  185. break;
  186. }
  187. memset (window, 0, sizeof (window));
  188. for (i = 0; i <= ilen; i ++) {
  189. if (i - beg >= SHINGLES_WINDOW || i == ilen) {
  190. for (j = 0; j < RSPAMD_SHINGLE_SIZE; j ++) {
  191. /* Shift hashes window to right */
  192. for (k = 0; k < SHINGLES_WINDOW - 1; k ++) {
  193. window[j * SHINGLES_WINDOW + k] =
  194. window[j * SHINGLES_WINDOW + k + 1];
  195. }
  196. word = NULL;
  197. while (widx < input->len) {
  198. word = &g_array_index (input, rspamd_stat_token_t, widx);
  199. if ((word->flags & RSPAMD_STAT_TOKEN_FLAG_SKIPPED)
  200. || word->stemmed.len == 0) {
  201. widx++;
  202. }
  203. else {
  204. break;
  205. }
  206. }
  207. if (word == NULL) {
  208. /* Nothing but exceptions */
  209. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  210. g_free (hashes[i]);
  211. }
  212. g_free (hashes);
  213. return NULL;
  214. }
  215. /* Insert the last element to the pipe */
  216. memcpy (&seed, keys[j], sizeof (seed));
  217. window[j * SHINGLES_WINDOW + SHINGLES_WINDOW - 1] =
  218. rspamd_cryptobox_fast_hash_specific (ht,
  219. word->stemmed.begin, word->stemmed.len,
  220. seed);
  221. val = 0;
  222. for (k = 0; k < SHINGLES_WINDOW; k ++) {
  223. val ^= window[j * SHINGLES_WINDOW + k] >>
  224. (8 * (SHINGLES_WINDOW - k - 1));
  225. }
  226. g_assert (hlen > beg);
  227. hashes[j][beg] = val;
  228. }
  229. beg ++;
  230. widx ++;
  231. }
  232. }
  233. }
  234. /* Now we need to filter all hashes and make a shingles result */
  235. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  236. res->hashes[i] = filter (hashes[i], hlen,
  237. i, key, filterd);
  238. g_free (hashes[i]);
  239. }
  240. g_free (hashes);
  241. rspamd_fstring_free (row);
  242. return res;
  243. }
  244. struct rspamd_shingle* RSPAMD_OPTIMIZE("unroll-loops")
  245. rspamd_shingles_from_image (guchar *dct,
  246. const guchar key[16],
  247. rspamd_mempool_t *pool,
  248. rspamd_shingles_filter filter,
  249. gpointer filterd,
  250. enum rspamd_shingle_alg alg)
  251. {
  252. struct rspamd_shingle *shingle;
  253. guint64 **hashes;
  254. guchar **keys;
  255. guint64 d;
  256. guint64 val;
  257. gint i, j;
  258. gsize hlen, beg = 0;
  259. enum rspamd_cryptobox_fast_hash_type ht;
  260. guint64 res[SHINGLES_WINDOW * RSPAMD_SHINGLE_SIZE], seed;
  261. if (pool != NULL) {
  262. shingle = rspamd_mempool_alloc (pool, sizeof (*shingle));
  263. }
  264. else {
  265. shingle = g_malloc (sizeof (*shingle));
  266. }
  267. /* Init hashes pipes and keys */
  268. hashes = g_malloc (sizeof (*hashes) * RSPAMD_SHINGLE_SIZE);
  269. hlen = RSPAMD_DCT_LEN / NBBY + 1;
  270. keys = rspamd_shingles_get_keys_cached (key);
  271. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  272. hashes[i] = g_malloc (hlen * sizeof (guint64));
  273. }
  274. switch (alg) {
  275. case RSPAMD_SHINGLES_OLD:
  276. ht = RSPAMD_CRYPTOBOX_MUMHASH;
  277. break;
  278. case RSPAMD_SHINGLES_XXHASH:
  279. ht = RSPAMD_CRYPTOBOX_XXHASH64;
  280. break;
  281. case RSPAMD_SHINGLES_MUMHASH:
  282. ht = RSPAMD_CRYPTOBOX_MUMHASH;
  283. break;
  284. default:
  285. ht = RSPAMD_CRYPTOBOX_HASHFAST_INDEPENDENT;
  286. break;
  287. }
  288. memset (res, 0, sizeof (res));
  289. #define INNER_CYCLE_SHINGLES(s, e) for (j = (s); j < (e); j ++) { \
  290. d = dct[beg]; \
  291. memcpy (&seed, keys[j], sizeof (seed)); \
  292. val = rspamd_cryptobox_fast_hash_specific (ht, \
  293. &d, sizeof (d), \
  294. seed); \
  295. hashes[j][beg] = val; \
  296. }
  297. for (i = 0; i < RSPAMD_DCT_LEN / NBBY; i ++) {
  298. INNER_CYCLE_SHINGLES (0, RSPAMD_SHINGLE_SIZE / 4);
  299. INNER_CYCLE_SHINGLES (RSPAMD_SHINGLE_SIZE / 4, RSPAMD_SHINGLE_SIZE / 2);
  300. INNER_CYCLE_SHINGLES (RSPAMD_SHINGLE_SIZE / 2, 3 * RSPAMD_SHINGLE_SIZE / 4);
  301. INNER_CYCLE_SHINGLES (3 * RSPAMD_SHINGLE_SIZE / 4, RSPAMD_SHINGLE_SIZE);
  302. beg++;
  303. }
  304. #undef INNER_CYCLE_SHINGLES
  305. /* Now we need to filter all hashes and make a shingles result */
  306. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  307. shingle->hashes[i] = filter (hashes[i], hlen,
  308. i, key, filterd);
  309. g_free (hashes[i]);
  310. }
  311. g_free (hashes);
  312. return shingle;
  313. }
  314. guint64
  315. rspamd_shingles_default_filter (guint64 *input, gsize count,
  316. gint shno, const guchar *key, gpointer ud)
  317. {
  318. guint64 minimal = G_MAXUINT64;
  319. gsize i;
  320. for (i = 0; i < count; i ++) {
  321. if (minimal > input[i]) {
  322. minimal = input[i];
  323. }
  324. }
  325. return minimal;
  326. }
  327. gdouble rspamd_shingles_compare (const struct rspamd_shingle *a,
  328. const struct rspamd_shingle *b)
  329. {
  330. gint i, common = 0;
  331. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  332. if (a->hashes[i] == b->hashes[i]) {
  333. common ++;
  334. }
  335. }
  336. return (gdouble)common / (gdouble)RSPAMD_SHINGLE_SIZE;
  337. }