You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

shingles.c 9.4KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408
  1. /*-
  2. * Copyright 2016 Vsevolod Stakhov
  3. *
  4. * Licensed under the Apache License, Version 2.0 (the "License");
  5. * you may not use this file except in compliance with the License.
  6. * You may obtain a copy of the License at
  7. *
  8. * http://www.apache.org/licenses/LICENSE-2.0
  9. *
  10. * Unless required by applicable law or agreed to in writing, software
  11. * distributed under the License is distributed on an "AS IS" BASIS,
  12. * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  13. * See the License for the specific language governing permissions and
  14. * limitations under the License.
  15. */
  16. #include "shingles.h"
  17. #include "fstring.h"
  18. #include "cryptobox.h"
  19. #include "images.h"
  20. #include "libstat/stat_api.h"
  21. #define SHINGLES_WINDOW 3
  22. #define SHINGLES_KEY_SIZE rspamd_cryptobox_SIPKEYBYTES
  23. static guint
  24. rspamd_shingles_keys_hash (gconstpointer k)
  25. {
  26. return rspamd_cryptobox_fast_hash (k, SHINGLES_KEY_SIZE,
  27. rspamd_hash_seed ());
  28. }
  29. static gboolean
  30. rspamd_shingles_keys_equal (gconstpointer k1, gconstpointer k2)
  31. {
  32. return (memcmp (k1, k2, SHINGLES_KEY_SIZE) == 0);
  33. }
  34. static void
  35. rspamd_shingles_keys_free (gpointer p)
  36. {
  37. guchar **k = p;
  38. guint i;
  39. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  40. g_free (k[i]);
  41. }
  42. g_free (k);
  43. }
  44. static guchar **
  45. rspamd_shingles_keys_new (void)
  46. {
  47. guchar **k;
  48. guint i;
  49. k = g_malloc0 (sizeof (guchar *) * RSPAMD_SHINGLE_SIZE);
  50. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  51. k[i] = g_malloc0 (sizeof (guchar) * SHINGLES_KEY_SIZE);
  52. }
  53. return k;
  54. }
  55. static guchar **
  56. rspamd_shingles_get_keys_cached (const guchar key[SHINGLES_KEY_SIZE])
  57. {
  58. static GHashTable *ht = NULL;
  59. guchar **keys = NULL, *key_cpy;
  60. rspamd_cryptobox_hash_state_t bs;
  61. const guchar *cur_key;
  62. guchar shabuf[rspamd_cryptobox_HASHBYTES], *out_key;
  63. guint i;
  64. if (ht == NULL) {
  65. ht = g_hash_table_new_full (rspamd_shingles_keys_hash,
  66. rspamd_shingles_keys_equal, g_free, rspamd_shingles_keys_free);
  67. }
  68. else {
  69. keys = g_hash_table_lookup (ht, key);
  70. }
  71. if (keys == NULL) {
  72. keys = rspamd_shingles_keys_new ();
  73. key_cpy = g_malloc (SHINGLES_KEY_SIZE);
  74. memcpy (key_cpy, key, SHINGLES_KEY_SIZE);
  75. /* Generate keys */
  76. rspamd_cryptobox_hash_init (&bs, NULL, 0);
  77. cur_key = key;
  78. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  79. /*
  80. * To generate a set of hashes we just apply sha256 to the
  81. * initial key as many times as many hashes are required and
  82. * xor left and right parts of sha256 to get a single 16 bytes SIP key.
  83. */
  84. out_key = keys[i];
  85. rspamd_cryptobox_hash_update (&bs, cur_key, 16);
  86. rspamd_cryptobox_hash_final (&bs, shabuf);
  87. memcpy (out_key, shabuf, 16);
  88. rspamd_cryptobox_hash_init (&bs, NULL, 0);
  89. cur_key = out_key;
  90. }
  91. g_hash_table_insert (ht, key_cpy, keys);
  92. }
  93. return keys;
  94. }
  95. struct rspamd_shingle* RSPAMD_OPTIMIZE("unroll-loops")
  96. rspamd_shingles_from_text (GArray *input,
  97. const guchar key[16],
  98. rspamd_mempool_t *pool,
  99. rspamd_shingles_filter filter,
  100. gpointer filterd,
  101. enum rspamd_shingle_alg alg)
  102. {
  103. struct rspamd_shingle *res;
  104. guint64 **hashes;
  105. guchar **keys;
  106. rspamd_fstring_t *row;
  107. rspamd_stat_token_t *word;
  108. guint64 val;
  109. gint i, j, k;
  110. gsize hlen, ilen = 0, beg = 0, widx = 0;
  111. enum rspamd_cryptobox_fast_hash_type ht;
  112. if (pool != NULL) {
  113. res = rspamd_mempool_alloc (pool, sizeof (*res));
  114. }
  115. else {
  116. res = g_malloc (sizeof (*res));
  117. }
  118. row = rspamd_fstring_sized_new (256);
  119. for (i = 0; i < input->len; i ++) {
  120. word = &g_array_index (input, rspamd_stat_token_t, i);
  121. if (!((word->flags & RSPAMD_STAT_TOKEN_FLAG_SKIPPED)
  122. || word->stemmed.len == 0)) {
  123. ilen ++;
  124. }
  125. }
  126. /* Init hashes pipes and keys */
  127. hashes = g_malloc (sizeof (*hashes) * RSPAMD_SHINGLE_SIZE);
  128. hlen = ilen > SHINGLES_WINDOW ?
  129. (ilen - SHINGLES_WINDOW + 1) : 1;
  130. keys = rspamd_shingles_get_keys_cached (key);
  131. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  132. hashes[i] = g_malloc (hlen * sizeof (guint64));
  133. }
  134. /* Now parse input words into a vector of hashes using rolling window */
  135. if (alg == RSPAMD_SHINGLES_OLD) {
  136. for (i = 0; i <= (gint)ilen; i ++) {
  137. if (i - beg >= SHINGLES_WINDOW || i == (gint)ilen) {
  138. for (j = beg; j < i; j ++) {
  139. word = NULL;
  140. while (widx < input->len) {
  141. word = &g_array_index (input, rspamd_stat_token_t, widx);
  142. if ((word->flags & RSPAMD_STAT_TOKEN_FLAG_SKIPPED)
  143. || word->stemmed.len == 0) {
  144. widx++;
  145. }
  146. else {
  147. break;
  148. }
  149. }
  150. if (word == NULL) {
  151. /* Nothing but exceptions */
  152. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  153. g_free (hashes[i]);
  154. }
  155. g_free (hashes);
  156. if (pool != NULL) {
  157. g_free (res);
  158. }
  159. return NULL;
  160. }
  161. row = rspamd_fstring_append (row, word->stemmed.begin,
  162. word->stemmed.len);
  163. }
  164. /* Now we need to create a new row here */
  165. for (j = 0; j < RSPAMD_SHINGLE_SIZE; j ++) {
  166. rspamd_cryptobox_siphash ((guchar *)&val, row->str, row->len,
  167. keys[j]);
  168. g_assert (hlen > beg);
  169. hashes[j][beg] = val;
  170. }
  171. beg++;
  172. widx ++;
  173. row = rspamd_fstring_assign (row, "", 0);
  174. }
  175. }
  176. }
  177. else {
  178. guint64 window[SHINGLES_WINDOW * RSPAMD_SHINGLE_SIZE], seed;
  179. switch (alg) {
  180. case RSPAMD_SHINGLES_XXHASH:
  181. ht = RSPAMD_CRYPTOBOX_XXHASH64;
  182. break;
  183. case RSPAMD_SHINGLES_MUMHASH:
  184. ht = RSPAMD_CRYPTOBOX_MUMHASH;
  185. break;
  186. default:
  187. ht = RSPAMD_CRYPTOBOX_HASHFAST_INDEPENDENT;
  188. break;
  189. }
  190. memset (window, 0, sizeof (window));
  191. for (i = 0; i <= ilen; i ++) {
  192. if (i - beg >= SHINGLES_WINDOW || i == ilen) {
  193. for (j = 0; j < RSPAMD_SHINGLE_SIZE; j ++) {
  194. /* Shift hashes window to right */
  195. for (k = 0; k < SHINGLES_WINDOW - 1; k ++) {
  196. window[j * SHINGLES_WINDOW + k] =
  197. window[j * SHINGLES_WINDOW + k + 1];
  198. }
  199. word = NULL;
  200. while (widx < input->len) {
  201. word = &g_array_index (input, rspamd_stat_token_t, widx);
  202. if ((word->flags & RSPAMD_STAT_TOKEN_FLAG_SKIPPED)
  203. || word->stemmed.len == 0) {
  204. widx++;
  205. }
  206. else {
  207. break;
  208. }
  209. }
  210. if (word == NULL) {
  211. /* Nothing but exceptions */
  212. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  213. g_free (hashes[i]);
  214. }
  215. g_free (hashes);
  216. return NULL;
  217. }
  218. /* Insert the last element to the pipe */
  219. memcpy (&seed, keys[j], sizeof (seed));
  220. window[j * SHINGLES_WINDOW + SHINGLES_WINDOW - 1] =
  221. rspamd_cryptobox_fast_hash_specific (ht,
  222. word->stemmed.begin, word->stemmed.len,
  223. seed);
  224. val = 0;
  225. for (k = 0; k < SHINGLES_WINDOW; k ++) {
  226. val ^= window[j * SHINGLES_WINDOW + k] >>
  227. (8 * (SHINGLES_WINDOW - k - 1));
  228. }
  229. g_assert (hlen > beg);
  230. hashes[j][beg] = val;
  231. }
  232. beg ++;
  233. widx ++;
  234. }
  235. }
  236. }
  237. /* Now we need to filter all hashes and make a shingles result */
  238. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  239. res->hashes[i] = filter (hashes[i], hlen,
  240. i, key, filterd);
  241. g_free (hashes[i]);
  242. }
  243. g_free (hashes);
  244. rspamd_fstring_free (row);
  245. return res;
  246. }
  247. struct rspamd_shingle* RSPAMD_OPTIMIZE("unroll-loops")
  248. rspamd_shingles_from_image (guchar *dct,
  249. const guchar key[16],
  250. rspamd_mempool_t *pool,
  251. rspamd_shingles_filter filter,
  252. gpointer filterd,
  253. enum rspamd_shingle_alg alg)
  254. {
  255. struct rspamd_shingle *shingle;
  256. guint64 **hashes;
  257. guchar **keys;
  258. guint64 d;
  259. guint64 val;
  260. gint i, j;
  261. gsize hlen, beg = 0;
  262. enum rspamd_cryptobox_fast_hash_type ht;
  263. guint64 res[SHINGLES_WINDOW * RSPAMD_SHINGLE_SIZE], seed;
  264. if (pool != NULL) {
  265. shingle = rspamd_mempool_alloc (pool, sizeof (*shingle));
  266. }
  267. else {
  268. shingle = g_malloc (sizeof (*shingle));
  269. }
  270. /* Init hashes pipes and keys */
  271. hashes = g_malloc (sizeof (*hashes) * RSPAMD_SHINGLE_SIZE);
  272. hlen = RSPAMD_DCT_LEN / NBBY + 1;
  273. keys = rspamd_shingles_get_keys_cached (key);
  274. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  275. hashes[i] = g_malloc (hlen * sizeof (guint64));
  276. }
  277. switch (alg) {
  278. case RSPAMD_SHINGLES_OLD:
  279. ht = RSPAMD_CRYPTOBOX_MUMHASH;
  280. break;
  281. case RSPAMD_SHINGLES_XXHASH:
  282. ht = RSPAMD_CRYPTOBOX_XXHASH64;
  283. break;
  284. case RSPAMD_SHINGLES_MUMHASH:
  285. ht = RSPAMD_CRYPTOBOX_MUMHASH;
  286. break;
  287. default:
  288. ht = RSPAMD_CRYPTOBOX_HASHFAST_INDEPENDENT;
  289. break;
  290. }
  291. memset (res, 0, sizeof (res));
  292. #define INNER_CYCLE_SHINGLES(s, e) for (j = (s); j < (e); j ++) { \
  293. d = dct[beg]; \
  294. memcpy (&seed, keys[j], sizeof (seed)); \
  295. val = rspamd_cryptobox_fast_hash_specific (ht, \
  296. &d, sizeof (d), \
  297. seed); \
  298. hashes[j][beg] = val; \
  299. }
  300. for (i = 0; i < RSPAMD_DCT_LEN / NBBY; i ++) {
  301. INNER_CYCLE_SHINGLES (0, RSPAMD_SHINGLE_SIZE / 4);
  302. INNER_CYCLE_SHINGLES (RSPAMD_SHINGLE_SIZE / 4, RSPAMD_SHINGLE_SIZE / 2);
  303. INNER_CYCLE_SHINGLES (RSPAMD_SHINGLE_SIZE / 2, 3 * RSPAMD_SHINGLE_SIZE / 4);
  304. INNER_CYCLE_SHINGLES (3 * RSPAMD_SHINGLE_SIZE / 4, RSPAMD_SHINGLE_SIZE);
  305. beg++;
  306. }
  307. #undef INNER_CYCLE_SHINGLES
  308. /* Now we need to filter all hashes and make a shingles result */
  309. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  310. shingle->hashes[i] = filter (hashes[i], hlen,
  311. i, key, filterd);
  312. g_free (hashes[i]);
  313. }
  314. g_free (hashes);
  315. return shingle;
  316. }
  317. guint64
  318. rspamd_shingles_default_filter (guint64 *input, gsize count,
  319. gint shno, const guchar *key, gpointer ud)
  320. {
  321. guint64 minimal = G_MAXUINT64;
  322. gsize i;
  323. for (i = 0; i < count; i ++) {
  324. if (minimal > input[i]) {
  325. minimal = input[i];
  326. }
  327. }
  328. return minimal;
  329. }
  330. gdouble rspamd_shingles_compare (const struct rspamd_shingle *a,
  331. const struct rspamd_shingle *b)
  332. {
  333. gint i, common = 0;
  334. for (i = 0; i < RSPAMD_SHINGLE_SIZE; i ++) {
  335. if (a->hashes[i] == b->hashes[i]) {
  336. common ++;
  337. }
  338. }
  339. return (gdouble)common / (gdouble)RSPAMD_SHINGLE_SIZE;
  340. }