fast_hash_ring 0.1
Sign up to get free protection for your applications and to get access to all the features.
- data/CREDITS +12 -0
- data/LICENSE +10 -0
- data/README.rdoc +31 -0
- data/Rakefile +69 -0
- data/benchmarks/fast_hash_ring.rb +32 -0
- data/ext/extconf.rb +30 -0
- data/ext/fast_hash_ring.c +192 -0
- data/ext/fast_hash_ring.h +11 -0
- data/ext/md5.c +381 -0
- data/ext/md5.h +101 -0
- data/spec/fast_hash_ring_spec.rb +185 -0
- data/spec/spec_base.rb +9 -0
- metadata +65 -0
data/CREDITS
ADDED
@@ -0,0 +1,12 @@
|
|
1
|
+
======================================
|
2
|
+
= fast_hash_ring credits =
|
3
|
+
======================================
|
4
|
+
|
5
|
+
Original Author (Python Implementation):
|
6
|
+
Amir Salihefendic http://amix.dk
|
7
|
+
|
8
|
+
Ported to Ruby by:
|
9
|
+
Mitchell Hashimoto http://mitchellhashimoto.com
|
10
|
+
|
11
|
+
Ported to C Ruby Extension by:
|
12
|
+
Flinn Mueller http://actsasflinn.com
|
data/LICENSE
ADDED
@@ -0,0 +1,10 @@
|
|
1
|
+
Copyright (c) 2009, Flinn Mueller, Mitchell Hashimoto
|
2
|
+
All rights reserved.
|
3
|
+
|
4
|
+
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
|
5
|
+
|
6
|
+
* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
|
7
|
+
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
|
8
|
+
* Neither the name of the owner nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
|
9
|
+
|
10
|
+
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
data/README.rdoc
ADDED
@@ -0,0 +1,31 @@
|
|
1
|
+
= fast_hash_ring
|
2
|
+
|
3
|
+
== Background
|
4
|
+
|
5
|
+
fast_hash_ring is a Ruby C extension implementation of consistent hashing.
|
6
|
+
fast_hash_ring is based on the Ruby code Mitchell Hashimoto ported from
|
7
|
+
original Python code written by Amir Salihefendic. A comprehensive blog
|
8
|
+
post detailing the methods and reasoning for such a library can be viewed
|
9
|
+
by visiting the following URL:
|
10
|
+
|
11
|
+
http://amix.dk/blog/viewEntry/19367
|
12
|
+
|
13
|
+
== Usage
|
14
|
+
|
15
|
+
require 'rubygems'
|
16
|
+
require 'fast_hash_ring'
|
17
|
+
|
18
|
+
memcache_servers = ['192.168.0.111:14107',
|
19
|
+
'192.168.0.112:14107',
|
20
|
+
'192.168.0.113:14108']
|
21
|
+
|
22
|
+
# Since server 1 has double the RAM, lets weight it
|
23
|
+
# twice as much to get twice the keys. This is optional
|
24
|
+
weights = { '192.168.0.111' => 2 }
|
25
|
+
|
26
|
+
ring = FastHashRing.new(memcache_servers, weights)
|
27
|
+
server = ring.get_node('my_key')
|
28
|
+
|
29
|
+
== Installation
|
30
|
+
|
31
|
+
sudo gem install fast_hash_ring --source=http://gemcutter.org
|
data/Rakefile
ADDED
@@ -0,0 +1,69 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
require 'pathname'
|
4
|
+
$root = Pathname(__FILE__).dirname
|
5
|
+
|
6
|
+
require 'rubygems'
|
7
|
+
require 'rake'
|
8
|
+
require 'rake/clean'
|
9
|
+
require 'rake/packagetask'
|
10
|
+
require 'rake/gempackagetask'
|
11
|
+
require 'rake/testtask'
|
12
|
+
require 'rake/rdoctask'
|
13
|
+
|
14
|
+
task :spec do
|
15
|
+
load $root.join('spec', 'spec_base.rb')
|
16
|
+
end
|
17
|
+
task :default => [ :spec ]
|
18
|
+
|
19
|
+
CLEAN.include('pkg', 'tmp')
|
20
|
+
|
21
|
+
gemspec = Gem::Specification.new do |s|
|
22
|
+
s.name = 'fast_hash_ring'
|
23
|
+
s.version = '0.1'
|
24
|
+
s.authors = [ 'Flinn' ]
|
25
|
+
s.email = 'flinn@actsasflinn.com'
|
26
|
+
s.homepage = 'http://github.com/actsasflinn/fast_hash_ring/'
|
27
|
+
s.platform = Gem::Platform::RUBY
|
28
|
+
s.summary = 'A Ruby C Extension based on the pure Ruby HashRing gem'
|
29
|
+
s.require_path = 'ext'
|
30
|
+
s.test_file = 'spec/spec_base.rb'
|
31
|
+
s.has_rdoc = true
|
32
|
+
s.extra_rdoc_files = %w{ README.rdoc }
|
33
|
+
|
34
|
+
s.files = ['CREDITS',
|
35
|
+
'LICENSE',
|
36
|
+
'Rakefile',
|
37
|
+
'README.rdoc'] +
|
38
|
+
Dir['ext/**/*.[rb|c|h]'] +
|
39
|
+
Dir['spec/**/*'] +
|
40
|
+
Dir['benchmarks/**/*']
|
41
|
+
s.extensions << "ext/extconf.rb"
|
42
|
+
end
|
43
|
+
|
44
|
+
task :gemspec do
|
45
|
+
File.open('fast_hash_ring.gemspec', 'w') do |f|
|
46
|
+
f.write(gemspec.to_ruby)
|
47
|
+
end
|
48
|
+
end
|
49
|
+
|
50
|
+
Rake::GemPackageTask.new(gemspec) do |pkg|
|
51
|
+
pkg.need_tar = true
|
52
|
+
end
|
53
|
+
|
54
|
+
Rake::PackageTask.new('fast_hash_ring', '0.1') do |pkg|
|
55
|
+
pkg.need_zip = true
|
56
|
+
pkg.package_files = FileList[
|
57
|
+
'COPYING',
|
58
|
+
'Rakefile',
|
59
|
+
'README.rdoc',
|
60
|
+
'ext/**/*',
|
61
|
+
'spec/**/*',
|
62
|
+
'benchmarks/**/*'
|
63
|
+
].to_a
|
64
|
+
class << pkg
|
65
|
+
def package_name
|
66
|
+
"#{@name}-#{@version}-src"
|
67
|
+
end
|
68
|
+
end
|
69
|
+
end
|
@@ -0,0 +1,32 @@
|
|
1
|
+
require 'benchmark'
|
2
|
+
require 'rubygems'
|
3
|
+
require 'faker'
|
4
|
+
require 'hash_ring'
|
5
|
+
require 'fast_hash_ring'
|
6
|
+
|
7
|
+
servers = []
|
8
|
+
16.times do |i|
|
9
|
+
servers << "127.0.0.#{i+1}:12345"
|
10
|
+
end
|
11
|
+
|
12
|
+
weights = {}
|
13
|
+
4.times do |i|
|
14
|
+
weights["127.0.0.#{i+1}:12345"] = 8
|
15
|
+
end
|
16
|
+
|
17
|
+
keys = []
|
18
|
+
10_000.times do |i|
|
19
|
+
keys << Faker::Name.name
|
20
|
+
end
|
21
|
+
|
22
|
+
Benchmark.benchmark(' ' * 20 + Benchmark::Tms::CAPTION, 20) do |b|
|
23
|
+
h = HashRing.new(servers, weights)
|
24
|
+
b.report('Hash Ring') do
|
25
|
+
keys.each{ |key| server = h.get_node(key) }
|
26
|
+
end
|
27
|
+
|
28
|
+
fh = FastHashRing.new(servers, weights)
|
29
|
+
b.report('Fash Hash Ring') do
|
30
|
+
keys.each{ |key| server = fh.get_node(key) }
|
31
|
+
end
|
32
|
+
end
|
data/ext/extconf.rb
ADDED
@@ -0,0 +1,30 @@
|
|
1
|
+
# ENV["RC_ARCHS"] = `uname -m`.chomp if `uname -sr` =~ /^Darwin/
|
2
|
+
#
|
3
|
+
# require 'mkmf'
|
4
|
+
#
|
5
|
+
|
6
|
+
if RUBY_PLATFORM =~ /darwin/
|
7
|
+
ENV["RC_ARCHS"] = `uname -m`.chomp if `uname -sr` =~ /^Darwin/
|
8
|
+
|
9
|
+
ENV["RC_ARCHS"] = "x86_64" if RUBY_PLATFORM =~ /darwin10.0/
|
10
|
+
|
11
|
+
# On PowerPC the defaults are fine
|
12
|
+
ENV["RC_ARCHS"] = '' if `uname -m` =~ /^Power Macintosh/
|
13
|
+
end
|
14
|
+
|
15
|
+
# Loads mkmf which is used to make makefiles for Ruby extensions
|
16
|
+
require 'mkmf'
|
17
|
+
|
18
|
+
# Give it a name
|
19
|
+
extension_name = 'fast_hash_ring'
|
20
|
+
|
21
|
+
dir_config("fast_hash_ring")
|
22
|
+
|
23
|
+
# NOTE: use GCC flags unless Visual C compiler is used
|
24
|
+
$CFLAGS << ' -Wall ' unless RUBY_PLATFORM =~ /mswin/
|
25
|
+
|
26
|
+
if RUBY_VERSION < '1.8.6'
|
27
|
+
$CFLAGS << ' -DRUBY_LESS_THAN_186'
|
28
|
+
end
|
29
|
+
|
30
|
+
create_makefile 'fast_hash_ring'
|
@@ -0,0 +1,192 @@
|
|
1
|
+
#include <fast_hash_ring.h>
|
2
|
+
|
3
|
+
void hash_digest(char *key, unsigned char md5pword[16]){
|
4
|
+
md5_state_t md5state;
|
5
|
+
|
6
|
+
md5_init(&md5state);
|
7
|
+
md5_append(&md5state, (unsigned char *)key, strlen(key));
|
8
|
+
md5_finish(&md5state, md5pword);
|
9
|
+
}
|
10
|
+
|
11
|
+
unsigned int hash_val(char *key, int x){
|
12
|
+
unsigned char digest[16];
|
13
|
+
|
14
|
+
hash_digest(key, digest);
|
15
|
+
return ((digest[3 + x] << 24) |
|
16
|
+
(digest[2 + x] << 16) |
|
17
|
+
(digest[1 + x] << 8) |
|
18
|
+
digest[0 + x]);
|
19
|
+
}
|
20
|
+
|
21
|
+
static VALUE cFastHashRing_generate_circle(VALUE vself){
|
22
|
+
VALUE vnodes, vweights, vring, vsorted_keys;
|
23
|
+
int i, j, n, vnodes_len;
|
24
|
+
int total_weight = 0;
|
25
|
+
|
26
|
+
vnodes = rb_iv_get(vself, "@nodes");
|
27
|
+
vweights = rb_iv_get(vself, "@weights");
|
28
|
+
vring = rb_iv_get(vself, "@ring");
|
29
|
+
vsorted_keys = rb_iv_get(vself, "@sorted_keys");
|
30
|
+
|
31
|
+
vnodes_len = RARRAY_LEN(vnodes);
|
32
|
+
for(i = 0;i < vnodes_len;i++){
|
33
|
+
VALUE vnode = rb_ary_entry(vnodes, i);
|
34
|
+
VALUE vweight = rb_hash_aref(vweights, vnode);
|
35
|
+
|
36
|
+
if(vweight == Qnil) vweight = INT2NUM(1);
|
37
|
+
total_weight += NUM2INT(vweight);
|
38
|
+
}
|
39
|
+
|
40
|
+
for(i = 0;i < vnodes_len;i++){
|
41
|
+
VALUE vnode = rb_ary_entry(vnodes, i);
|
42
|
+
VALUE vweight = rb_hash_aref(vweights, vnode);
|
43
|
+
|
44
|
+
if(vweight == Qnil) vweight = INT2NUM(1);
|
45
|
+
int weight = NUM2INT(vweight);
|
46
|
+
|
47
|
+
int factor = floor((40 * vnodes_len * weight) / total_weight);
|
48
|
+
for(j = 0;j < factor;j++){
|
49
|
+
int blen = 0;
|
50
|
+
VALUE vstring = rb_convert_type(vnode, T_STRING, "String", "to_s");
|
51
|
+
blen += strlen(RSTRING_PTR(vstring));
|
52
|
+
blen += 12;
|
53
|
+
char key[blen];
|
54
|
+
sprintf(key, "%s-%d", RSTRING_PTR(vstring), j);
|
55
|
+
|
56
|
+
for(n=0;n<3;n++){
|
57
|
+
unsigned int hkey = hash_val(key, n*4);
|
58
|
+
rb_hash_aset(vring, INT2NUM(hkey), vnode);
|
59
|
+
rb_ary_push(vsorted_keys, INT2NUM(hkey));
|
60
|
+
}
|
61
|
+
}
|
62
|
+
}
|
63
|
+
rb_iv_set(vself, "@sorted_keys", rb_ary_sort(vsorted_keys));
|
64
|
+
|
65
|
+
return Qtrue;
|
66
|
+
}
|
67
|
+
|
68
|
+
static VALUE cFastHashRing_gen_key(VALUE vself, VALUE vstring_key){
|
69
|
+
unsigned int key = hash_val(RSTRING_PTR(vstring_key), 0);
|
70
|
+
|
71
|
+
return INT2NUM(key);
|
72
|
+
}
|
73
|
+
|
74
|
+
int bisect(VALUE vsorted_keys, VALUE vkey){
|
75
|
+
int i, vsorted_keys_len;
|
76
|
+
|
77
|
+
vsorted_keys_len = RARRAY_LEN(vsorted_keys);
|
78
|
+
for(i=0;i<vsorted_keys_len;i++){
|
79
|
+
VALUE vsorted_key = rb_ary_entry(vsorted_keys, i);
|
80
|
+
if (NUM2LONG(vkey) < NUM2LONG(vsorted_key)) return i;
|
81
|
+
}
|
82
|
+
|
83
|
+
return vsorted_keys_len;
|
84
|
+
}
|
85
|
+
|
86
|
+
static VALUE cFastHashRing_get_node_pos(VALUE vself, VALUE vstring_key){
|
87
|
+
VALUE vring, vsorted_keys, vkey;
|
88
|
+
int pos;
|
89
|
+
|
90
|
+
vring = rb_iv_get(vself, "@ring");
|
91
|
+
|
92
|
+
if(rb_funcall(vring, rb_intern("empty?"), 0)) return Qnil;
|
93
|
+
|
94
|
+
vsorted_keys = rb_iv_get(vself, "@sorted_keys");
|
95
|
+
|
96
|
+
vkey = cFastHashRing_gen_key(vself, vstring_key);
|
97
|
+
pos = bisect(vsorted_keys, vkey);
|
98
|
+
|
99
|
+
if(pos == RARRAY_LEN(vsorted_keys))
|
100
|
+
return INT2NUM(0);
|
101
|
+
else
|
102
|
+
return INT2NUM(pos);
|
103
|
+
}
|
104
|
+
|
105
|
+
static VALUE cFastHashRing_get_node(VALUE vself, VALUE vstring_key){
|
106
|
+
VALUE vpos, vring, vsorted_keys, vkey, vnode;
|
107
|
+
vpos = cFastHashRing_get_node_pos(vself, vstring_key);
|
108
|
+
|
109
|
+
if(vpos == Qnil) return Qnil;
|
110
|
+
|
111
|
+
vring = rb_iv_get(vself, "@ring");
|
112
|
+
vsorted_keys = rb_iv_get(vself, "@sorted_keys");
|
113
|
+
|
114
|
+
vkey = rb_ary_entry(vsorted_keys, NUM2INT(vpos));
|
115
|
+
vnode = rb_hash_aref(vring, vkey);
|
116
|
+
|
117
|
+
return vnode;
|
118
|
+
}
|
119
|
+
|
120
|
+
static VALUE cFastHashRing_iterate_nodes(VALUE vself, VALUE vstring_key){
|
121
|
+
VALUE vreturned_values, vpos, vring, vsorted_keys;
|
122
|
+
int i;
|
123
|
+
|
124
|
+
vreturned_values = rb_ary_new();
|
125
|
+
vpos = cFastHashRing_get_node_pos(vself, vstring_key);
|
126
|
+
|
127
|
+
vring = rb_iv_get(vself, "@ring");
|
128
|
+
vsorted_keys = rb_iv_get(vself, "@sorted_keys");
|
129
|
+
|
130
|
+
for(i=0;i<RARRAY_LEN(vsorted_keys);i++){
|
131
|
+
VALUE vkey = rb_ary_entry(vsorted_keys, i);
|
132
|
+
VALUE vvalue = rb_hash_aref(vring, vkey);
|
133
|
+
if(!(rb_ary_includes(vreturned_values, vvalue)))
|
134
|
+
rb_ary_push(vreturned_values, vvalue);
|
135
|
+
}
|
136
|
+
|
137
|
+
for(i=0;i<RARRAY_LEN(vsorted_keys);i++){
|
138
|
+
if(i >= NUM2INT(vpos)) break;
|
139
|
+
|
140
|
+
VALUE vkey = rb_ary_entry(vsorted_keys, i);
|
141
|
+
VALUE vvalue = rb_hash_aref(vring, vkey);
|
142
|
+
|
143
|
+
if(rb_ary_includes(vreturned_values, vvalue)) continue;
|
144
|
+
|
145
|
+
rb_ary_push(vreturned_values, vvalue);
|
146
|
+
}
|
147
|
+
|
148
|
+
return vreturned_values;
|
149
|
+
}
|
150
|
+
|
151
|
+
static VALUE cFastHashRing_initialize(int argc, VALUE *argv, VALUE vself){
|
152
|
+
VALUE vnodes, vweights, vring, vsorted_keys;
|
153
|
+
|
154
|
+
rb_scan_args(argc, argv, "11", &vnodes, &vweights);
|
155
|
+
|
156
|
+
if(TYPE(vnodes) != T_ARRAY) vnodes = rb_ary_new3(1, vnodes);
|
157
|
+
Check_Type(vnodes, T_ARRAY);
|
158
|
+
if(NIL_P(vweights)) vweights = rb_hash_new();
|
159
|
+
vring = rb_hash_new();
|
160
|
+
vsorted_keys = rb_ary_new();
|
161
|
+
|
162
|
+
rb_iv_set(vself, "@nodes", vnodes);
|
163
|
+
rb_iv_set(vself, "@weights", vweights);
|
164
|
+
|
165
|
+
rb_iv_set(vself, "@ring", vring);
|
166
|
+
rb_iv_set(vself, "@sorted_keys", vsorted_keys);
|
167
|
+
|
168
|
+
return cFastHashRing_generate_circle(vself);
|
169
|
+
}
|
170
|
+
|
171
|
+
static VALUE cFastHashRing_sorted_keys(VALUE vself){
|
172
|
+
return rb_iv_get(vself, "@sorted_keys");
|
173
|
+
}
|
174
|
+
|
175
|
+
static VALUE cFastHashRing_nodes(VALUE vself){
|
176
|
+
return rb_iv_get(vself, "@nodes");
|
177
|
+
}
|
178
|
+
|
179
|
+
VALUE cFastHashRing;
|
180
|
+
|
181
|
+
void Init_fast_hash_ring(){
|
182
|
+
cFastHashRing = rb_define_class("FastHashRing", rb_cObject);
|
183
|
+
|
184
|
+
rb_define_private_method(cFastHashRing, "initialize", cFastHashRing_initialize, -1);
|
185
|
+
rb_define_private_method(cFastHashRing, "generate_circle", cFastHashRing_generate_circle, -1);
|
186
|
+
rb_define_method(cFastHashRing, "get_node", cFastHashRing_get_node, 1);
|
187
|
+
rb_define_method(cFastHashRing, "get_node_pos", cFastHashRing_get_node_pos, 1);
|
188
|
+
rb_define_method(cFastHashRing, "iterate_nodes", cFastHashRing_iterate_nodes, 1);
|
189
|
+
rb_define_method(cFastHashRing, "gen_key", cFastHashRing_gen_key, 1);
|
190
|
+
rb_define_method(cFastHashRing, "sorted_keys", cFastHashRing_sorted_keys, 0);
|
191
|
+
rb_define_method(cFastHashRing, "nodes", cFastHashRing_nodes, 0);
|
192
|
+
}
|
data/ext/md5.c
ADDED
@@ -0,0 +1,381 @@
|
|
1
|
+
/*
|
2
|
+
Copyright (C) 1999, 2000, 2002 Aladdin Enterprises. All rights reserved.
|
3
|
+
|
4
|
+
This software is provided 'as-is', without any express or implied
|
5
|
+
warranty. In no event will the authors be held liable for any damages
|
6
|
+
arising from the use of this software.
|
7
|
+
|
8
|
+
Permission is granted to anyone to use this software for any purpose,
|
9
|
+
including commercial applications, and to alter it and redistribute it
|
10
|
+
freely, subject to the following restrictions:
|
11
|
+
|
12
|
+
1. The origin of this software must not be misrepresented; you must not
|
13
|
+
claim that you wrote the original software. If you use this software
|
14
|
+
in a product, an acknowledgment in the product documentation would be
|
15
|
+
appreciated but is not required.
|
16
|
+
2. Altered source versions must be plainly marked as such, and must not be
|
17
|
+
misrepresented as being the original software.
|
18
|
+
3. This notice may not be removed or altered from any source distribution.
|
19
|
+
|
20
|
+
L. Peter Deutsch
|
21
|
+
ghost@aladdin.com
|
22
|
+
|
23
|
+
*/
|
24
|
+
/* $Id: md5.c,v 1.6 2002/04/13 19:20:28 lpd Exp $ */
|
25
|
+
/*
|
26
|
+
Independent implementation of MD5 (RFC 1321).
|
27
|
+
|
28
|
+
This code implements the MD5 Algorithm defined in RFC 1321, whose
|
29
|
+
text is available at
|
30
|
+
http://www.ietf.org/rfc/rfc1321.txt
|
31
|
+
The code is derived from the text of the RFC, including the test suite
|
32
|
+
(section A.5) but excluding the rest of Appendix A. It does not include
|
33
|
+
any code or documentation that is identified in the RFC as being
|
34
|
+
copyrighted.
|
35
|
+
|
36
|
+
The original and principal author of md5.c is L. Peter Deutsch
|
37
|
+
<ghost@aladdin.com>. Other authors are noted in the change history
|
38
|
+
that follows (in reverse chronological order):
|
39
|
+
|
40
|
+
2002-04-13 lpd Clarified derivation from RFC 1321; now handles byte order
|
41
|
+
either statically or dynamically; added missing #include <string.h>
|
42
|
+
in library.
|
43
|
+
2002-03-11 lpd Corrected argument list for main(), and added int return
|
44
|
+
type, in test program and T value program.
|
45
|
+
2002-02-21 lpd Added missing #include <stdio.h> in test program.
|
46
|
+
2000-07-03 lpd Patched to eliminate warnings about "constant is
|
47
|
+
unsigned in ANSI C, signed in traditional"; made test program
|
48
|
+
self-checking.
|
49
|
+
1999-11-04 lpd Edited comments slightly for automatic TOC extraction.
|
50
|
+
1999-10-18 lpd Fixed typo in header comment (ansi2knr rather than md5).
|
51
|
+
1999-05-03 lpd Original version.
|
52
|
+
*/
|
53
|
+
|
54
|
+
#include "md5.h"
|
55
|
+
#include <string.h>
|
56
|
+
|
57
|
+
#undef BYTE_ORDER /* 1 = big-endian, -1 = little-endian, 0 = unknown */
|
58
|
+
#ifdef ARCH_IS_BIG_ENDIAN
|
59
|
+
# define BYTE_ORDER (ARCH_IS_BIG_ENDIAN ? 1 : -1)
|
60
|
+
#else
|
61
|
+
# define BYTE_ORDER 0
|
62
|
+
#endif
|
63
|
+
|
64
|
+
#define T_MASK ((md5_word_t)~0)
|
65
|
+
#define T1 /* 0xd76aa478 */ (T_MASK ^ 0x28955b87)
|
66
|
+
#define T2 /* 0xe8c7b756 */ (T_MASK ^ 0x173848a9)
|
67
|
+
#define T3 0x242070db
|
68
|
+
#define T4 /* 0xc1bdceee */ (T_MASK ^ 0x3e423111)
|
69
|
+
#define T5 /* 0xf57c0faf */ (T_MASK ^ 0x0a83f050)
|
70
|
+
#define T6 0x4787c62a
|
71
|
+
#define T7 /* 0xa8304613 */ (T_MASK ^ 0x57cfb9ec)
|
72
|
+
#define T8 /* 0xfd469501 */ (T_MASK ^ 0x02b96afe)
|
73
|
+
#define T9 0x698098d8
|
74
|
+
#define T10 /* 0x8b44f7af */ (T_MASK ^ 0x74bb0850)
|
75
|
+
#define T11 /* 0xffff5bb1 */ (T_MASK ^ 0x0000a44e)
|
76
|
+
#define T12 /* 0x895cd7be */ (T_MASK ^ 0x76a32841)
|
77
|
+
#define T13 0x6b901122
|
78
|
+
#define T14 /* 0xfd987193 */ (T_MASK ^ 0x02678e6c)
|
79
|
+
#define T15 /* 0xa679438e */ (T_MASK ^ 0x5986bc71)
|
80
|
+
#define T16 0x49b40821
|
81
|
+
#define T17 /* 0xf61e2562 */ (T_MASK ^ 0x09e1da9d)
|
82
|
+
#define T18 /* 0xc040b340 */ (T_MASK ^ 0x3fbf4cbf)
|
83
|
+
#define T19 0x265e5a51
|
84
|
+
#define T20 /* 0xe9b6c7aa */ (T_MASK ^ 0x16493855)
|
85
|
+
#define T21 /* 0xd62f105d */ (T_MASK ^ 0x29d0efa2)
|
86
|
+
#define T22 0x02441453
|
87
|
+
#define T23 /* 0xd8a1e681 */ (T_MASK ^ 0x275e197e)
|
88
|
+
#define T24 /* 0xe7d3fbc8 */ (T_MASK ^ 0x182c0437)
|
89
|
+
#define T25 0x21e1cde6
|
90
|
+
#define T26 /* 0xc33707d6 */ (T_MASK ^ 0x3cc8f829)
|
91
|
+
#define T27 /* 0xf4d50d87 */ (T_MASK ^ 0x0b2af278)
|
92
|
+
#define T28 0x455a14ed
|
93
|
+
#define T29 /* 0xa9e3e905 */ (T_MASK ^ 0x561c16fa)
|
94
|
+
#define T30 /* 0xfcefa3f8 */ (T_MASK ^ 0x03105c07)
|
95
|
+
#define T31 0x676f02d9
|
96
|
+
#define T32 /* 0x8d2a4c8a */ (T_MASK ^ 0x72d5b375)
|
97
|
+
#define T33 /* 0xfffa3942 */ (T_MASK ^ 0x0005c6bd)
|
98
|
+
#define T34 /* 0x8771f681 */ (T_MASK ^ 0x788e097e)
|
99
|
+
#define T35 0x6d9d6122
|
100
|
+
#define T36 /* 0xfde5380c */ (T_MASK ^ 0x021ac7f3)
|
101
|
+
#define T37 /* 0xa4beea44 */ (T_MASK ^ 0x5b4115bb)
|
102
|
+
#define T38 0x4bdecfa9
|
103
|
+
#define T39 /* 0xf6bb4b60 */ (T_MASK ^ 0x0944b49f)
|
104
|
+
#define T40 /* 0xbebfbc70 */ (T_MASK ^ 0x4140438f)
|
105
|
+
#define T41 0x289b7ec6
|
106
|
+
#define T42 /* 0xeaa127fa */ (T_MASK ^ 0x155ed805)
|
107
|
+
#define T43 /* 0xd4ef3085 */ (T_MASK ^ 0x2b10cf7a)
|
108
|
+
#define T44 0x04881d05
|
109
|
+
#define T45 /* 0xd9d4d039 */ (T_MASK ^ 0x262b2fc6)
|
110
|
+
#define T46 /* 0xe6db99e5 */ (T_MASK ^ 0x1924661a)
|
111
|
+
#define T47 0x1fa27cf8
|
112
|
+
#define T48 /* 0xc4ac5665 */ (T_MASK ^ 0x3b53a99a)
|
113
|
+
#define T49 /* 0xf4292244 */ (T_MASK ^ 0x0bd6ddbb)
|
114
|
+
#define T50 0x432aff97
|
115
|
+
#define T51 /* 0xab9423a7 */ (T_MASK ^ 0x546bdc58)
|
116
|
+
#define T52 /* 0xfc93a039 */ (T_MASK ^ 0x036c5fc6)
|
117
|
+
#define T53 0x655b59c3
|
118
|
+
#define T54 /* 0x8f0ccc92 */ (T_MASK ^ 0x70f3336d)
|
119
|
+
#define T55 /* 0xffeff47d */ (T_MASK ^ 0x00100b82)
|
120
|
+
#define T56 /* 0x85845dd1 */ (T_MASK ^ 0x7a7ba22e)
|
121
|
+
#define T57 0x6fa87e4f
|
122
|
+
#define T58 /* 0xfe2ce6e0 */ (T_MASK ^ 0x01d3191f)
|
123
|
+
#define T59 /* 0xa3014314 */ (T_MASK ^ 0x5cfebceb)
|
124
|
+
#define T60 0x4e0811a1
|
125
|
+
#define T61 /* 0xf7537e82 */ (T_MASK ^ 0x08ac817d)
|
126
|
+
#define T62 /* 0xbd3af235 */ (T_MASK ^ 0x42c50dca)
|
127
|
+
#define T63 0x2ad7d2bb
|
128
|
+
#define T64 /* 0xeb86d391 */ (T_MASK ^ 0x14792c6e)
|
129
|
+
|
130
|
+
|
131
|
+
static void
|
132
|
+
md5_process(md5_state_t *pms, const md5_byte_t *data /*[64]*/)
|
133
|
+
{
|
134
|
+
md5_word_t
|
135
|
+
a = pms->abcd[0], b = pms->abcd[1],
|
136
|
+
c = pms->abcd[2], d = pms->abcd[3];
|
137
|
+
md5_word_t t;
|
138
|
+
#if BYTE_ORDER > 0
|
139
|
+
/* Define storage only for big-endian CPUs. */
|
140
|
+
md5_word_t X[16];
|
141
|
+
#else
|
142
|
+
/* Define storage for little-endian or both types of CPUs. */
|
143
|
+
md5_word_t xbuf[16];
|
144
|
+
const md5_word_t *X;
|
145
|
+
#endif
|
146
|
+
|
147
|
+
{
|
148
|
+
#if BYTE_ORDER == 0
|
149
|
+
/*
|
150
|
+
* Determine dynamically whether this is a big-endian or
|
151
|
+
* little-endian machine, since we can use a more efficient
|
152
|
+
* algorithm on the latter.
|
153
|
+
*/
|
154
|
+
static const int w = 1;
|
155
|
+
|
156
|
+
if (*((const md5_byte_t *)&w)) /* dynamic little-endian */
|
157
|
+
#endif
|
158
|
+
#if BYTE_ORDER <= 0 /* little-endian */
|
159
|
+
{
|
160
|
+
/*
|
161
|
+
* On little-endian machines, we can process properly aligned
|
162
|
+
* data without copying it.
|
163
|
+
*/
|
164
|
+
if (!((data - (const md5_byte_t *)0) & 3)) {
|
165
|
+
/* data are properly aligned */
|
166
|
+
X = (const md5_word_t *)data;
|
167
|
+
} else {
|
168
|
+
/* not aligned */
|
169
|
+
memcpy(xbuf, data, 64);
|
170
|
+
X = xbuf;
|
171
|
+
}
|
172
|
+
}
|
173
|
+
#endif
|
174
|
+
#if BYTE_ORDER == 0
|
175
|
+
else /* dynamic big-endian */
|
176
|
+
#endif
|
177
|
+
#if BYTE_ORDER >= 0 /* big-endian */
|
178
|
+
{
|
179
|
+
/*
|
180
|
+
* On big-endian machines, we must arrange the bytes in the
|
181
|
+
* right order.
|
182
|
+
*/
|
183
|
+
const md5_byte_t *xp = data;
|
184
|
+
int i;
|
185
|
+
|
186
|
+
# if BYTE_ORDER == 0
|
187
|
+
X = xbuf; /* (dynamic only) */
|
188
|
+
# else
|
189
|
+
# define xbuf X /* (static only) */
|
190
|
+
# endif
|
191
|
+
for (i = 0; i < 16; ++i, xp += 4)
|
192
|
+
xbuf[i] = xp[0] + (xp[1] << 8) + (xp[2] << 16) + (xp[3] << 24);
|
193
|
+
}
|
194
|
+
#endif
|
195
|
+
}
|
196
|
+
|
197
|
+
#define ROTATE_LEFT(x, n) (((x) << (n)) | ((x) >> (32 - (n))))
|
198
|
+
|
199
|
+
/* Round 1. */
|
200
|
+
/* Let [abcd k s i] denote the operation
|
201
|
+
a = b + ((a + F(b,c,d) + X[k] + T[i]) <<< s). */
|
202
|
+
#define F(x, y, z) (((x) & (y)) | (~(x) & (z)))
|
203
|
+
#define SET(a, b, c, d, k, s, Ti)\
|
204
|
+
t = a + F(b,c,d) + X[k] + Ti;\
|
205
|
+
a = ROTATE_LEFT(t, s) + b
|
206
|
+
/* Do the following 16 operations. */
|
207
|
+
SET(a, b, c, d, 0, 7, T1);
|
208
|
+
SET(d, a, b, c, 1, 12, T2);
|
209
|
+
SET(c, d, a, b, 2, 17, T3);
|
210
|
+
SET(b, c, d, a, 3, 22, T4);
|
211
|
+
SET(a, b, c, d, 4, 7, T5);
|
212
|
+
SET(d, a, b, c, 5, 12, T6);
|
213
|
+
SET(c, d, a, b, 6, 17, T7);
|
214
|
+
SET(b, c, d, a, 7, 22, T8);
|
215
|
+
SET(a, b, c, d, 8, 7, T9);
|
216
|
+
SET(d, a, b, c, 9, 12, T10);
|
217
|
+
SET(c, d, a, b, 10, 17, T11);
|
218
|
+
SET(b, c, d, a, 11, 22, T12);
|
219
|
+
SET(a, b, c, d, 12, 7, T13);
|
220
|
+
SET(d, a, b, c, 13, 12, T14);
|
221
|
+
SET(c, d, a, b, 14, 17, T15);
|
222
|
+
SET(b, c, d, a, 15, 22, T16);
|
223
|
+
#undef SET
|
224
|
+
|
225
|
+
/* Round 2. */
|
226
|
+
/* Let [abcd k s i] denote the operation
|
227
|
+
a = b + ((a + G(b,c,d) + X[k] + T[i]) <<< s). */
|
228
|
+
#define G(x, y, z) (((x) & (z)) | ((y) & ~(z)))
|
229
|
+
#define SET(a, b, c, d, k, s, Ti)\
|
230
|
+
t = a + G(b,c,d) + X[k] + Ti;\
|
231
|
+
a = ROTATE_LEFT(t, s) + b
|
232
|
+
/* Do the following 16 operations. */
|
233
|
+
SET(a, b, c, d, 1, 5, T17);
|
234
|
+
SET(d, a, b, c, 6, 9, T18);
|
235
|
+
SET(c, d, a, b, 11, 14, T19);
|
236
|
+
SET(b, c, d, a, 0, 20, T20);
|
237
|
+
SET(a, b, c, d, 5, 5, T21);
|
238
|
+
SET(d, a, b, c, 10, 9, T22);
|
239
|
+
SET(c, d, a, b, 15, 14, T23);
|
240
|
+
SET(b, c, d, a, 4, 20, T24);
|
241
|
+
SET(a, b, c, d, 9, 5, T25);
|
242
|
+
SET(d, a, b, c, 14, 9, T26);
|
243
|
+
SET(c, d, a, b, 3, 14, T27);
|
244
|
+
SET(b, c, d, a, 8, 20, T28);
|
245
|
+
SET(a, b, c, d, 13, 5, T29);
|
246
|
+
SET(d, a, b, c, 2, 9, T30);
|
247
|
+
SET(c, d, a, b, 7, 14, T31);
|
248
|
+
SET(b, c, d, a, 12, 20, T32);
|
249
|
+
#undef SET
|
250
|
+
|
251
|
+
/* Round 3. */
|
252
|
+
/* Let [abcd k s t] denote the operation
|
253
|
+
a = b + ((a + H(b,c,d) + X[k] + T[i]) <<< s). */
|
254
|
+
#define H(x, y, z) ((x) ^ (y) ^ (z))
|
255
|
+
#define SET(a, b, c, d, k, s, Ti)\
|
256
|
+
t = a + H(b,c,d) + X[k] + Ti;\
|
257
|
+
a = ROTATE_LEFT(t, s) + b
|
258
|
+
/* Do the following 16 operations. */
|
259
|
+
SET(a, b, c, d, 5, 4, T33);
|
260
|
+
SET(d, a, b, c, 8, 11, T34);
|
261
|
+
SET(c, d, a, b, 11, 16, T35);
|
262
|
+
SET(b, c, d, a, 14, 23, T36);
|
263
|
+
SET(a, b, c, d, 1, 4, T37);
|
264
|
+
SET(d, a, b, c, 4, 11, T38);
|
265
|
+
SET(c, d, a, b, 7, 16, T39);
|
266
|
+
SET(b, c, d, a, 10, 23, T40);
|
267
|
+
SET(a, b, c, d, 13, 4, T41);
|
268
|
+
SET(d, a, b, c, 0, 11, T42);
|
269
|
+
SET(c, d, a, b, 3, 16, T43);
|
270
|
+
SET(b, c, d, a, 6, 23, T44);
|
271
|
+
SET(a, b, c, d, 9, 4, T45);
|
272
|
+
SET(d, a, b, c, 12, 11, T46);
|
273
|
+
SET(c, d, a, b, 15, 16, T47);
|
274
|
+
SET(b, c, d, a, 2, 23, T48);
|
275
|
+
#undef SET
|
276
|
+
|
277
|
+
/* Round 4. */
|
278
|
+
/* Let [abcd k s t] denote the operation
|
279
|
+
a = b + ((a + I(b,c,d) + X[k] + T[i]) <<< s). */
|
280
|
+
#define I(x, y, z) ((y) ^ ((x) | ~(z)))
|
281
|
+
#define SET(a, b, c, d, k, s, Ti)\
|
282
|
+
t = a + I(b,c,d) + X[k] + Ti;\
|
283
|
+
a = ROTATE_LEFT(t, s) + b
|
284
|
+
/* Do the following 16 operations. */
|
285
|
+
SET(a, b, c, d, 0, 6, T49);
|
286
|
+
SET(d, a, b, c, 7, 10, T50);
|
287
|
+
SET(c, d, a, b, 14, 15, T51);
|
288
|
+
SET(b, c, d, a, 5, 21, T52);
|
289
|
+
SET(a, b, c, d, 12, 6, T53);
|
290
|
+
SET(d, a, b, c, 3, 10, T54);
|
291
|
+
SET(c, d, a, b, 10, 15, T55);
|
292
|
+
SET(b, c, d, a, 1, 21, T56);
|
293
|
+
SET(a, b, c, d, 8, 6, T57);
|
294
|
+
SET(d, a, b, c, 15, 10, T58);
|
295
|
+
SET(c, d, a, b, 6, 15, T59);
|
296
|
+
SET(b, c, d, a, 13, 21, T60);
|
297
|
+
SET(a, b, c, d, 4, 6, T61);
|
298
|
+
SET(d, a, b, c, 11, 10, T62);
|
299
|
+
SET(c, d, a, b, 2, 15, T63);
|
300
|
+
SET(b, c, d, a, 9, 21, T64);
|
301
|
+
#undef SET
|
302
|
+
|
303
|
+
/* Then perform the following additions. (That is increment each
|
304
|
+
of the four registers by the value it had before this block
|
305
|
+
was started.) */
|
306
|
+
pms->abcd[0] += a;
|
307
|
+
pms->abcd[1] += b;
|
308
|
+
pms->abcd[2] += c;
|
309
|
+
pms->abcd[3] += d;
|
310
|
+
}
|
311
|
+
|
312
|
+
void
|
313
|
+
md5_init(md5_state_t *pms)
|
314
|
+
{
|
315
|
+
pms->count[0] = pms->count[1] = 0;
|
316
|
+
pms->abcd[0] = 0x67452301;
|
317
|
+
pms->abcd[1] = /*0xefcdab89*/ T_MASK ^ 0x10325476;
|
318
|
+
pms->abcd[2] = /*0x98badcfe*/ T_MASK ^ 0x67452301;
|
319
|
+
pms->abcd[3] = 0x10325476;
|
320
|
+
}
|
321
|
+
|
322
|
+
void
|
323
|
+
md5_append(md5_state_t *pms, const md5_byte_t *data, int nbytes)
|
324
|
+
{
|
325
|
+
const md5_byte_t *p = data;
|
326
|
+
int left = nbytes;
|
327
|
+
int offset = (pms->count[0] >> 3) & 63;
|
328
|
+
md5_word_t nbits = (md5_word_t)(nbytes << 3);
|
329
|
+
|
330
|
+
if (nbytes <= 0)
|
331
|
+
return;
|
332
|
+
|
333
|
+
/* Update the message length. */
|
334
|
+
pms->count[1] += nbytes >> 29;
|
335
|
+
pms->count[0] += nbits;
|
336
|
+
if (pms->count[0] < nbits)
|
337
|
+
pms->count[1]++;
|
338
|
+
|
339
|
+
/* Process an initial partial block. */
|
340
|
+
if (offset) {
|
341
|
+
int copy = (offset + nbytes > 64 ? 64 - offset : nbytes);
|
342
|
+
|
343
|
+
memcpy(pms->buf + offset, p, copy);
|
344
|
+
if (offset + copy < 64)
|
345
|
+
return;
|
346
|
+
p += copy;
|
347
|
+
left -= copy;
|
348
|
+
md5_process(pms, pms->buf);
|
349
|
+
}
|
350
|
+
|
351
|
+
/* Process full blocks. */
|
352
|
+
for (; left >= 64; p += 64, left -= 64)
|
353
|
+
md5_process(pms, p);
|
354
|
+
|
355
|
+
/* Process a final partial block. */
|
356
|
+
if (left)
|
357
|
+
memcpy(pms->buf, p, left);
|
358
|
+
}
|
359
|
+
|
360
|
+
void
|
361
|
+
md5_finish(md5_state_t *pms, md5_byte_t digest[16])
|
362
|
+
{
|
363
|
+
static const md5_byte_t pad[64] = {
|
364
|
+
0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
365
|
+
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
366
|
+
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
367
|
+
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
|
368
|
+
};
|
369
|
+
md5_byte_t data[8];
|
370
|
+
int i;
|
371
|
+
|
372
|
+
/* Save the length before padding. */
|
373
|
+
for (i = 0; i < 8; ++i)
|
374
|
+
data[i] = (md5_byte_t)(pms->count[i >> 2] >> ((i & 3) << 3));
|
375
|
+
/* Pad to 56 bytes mod 64. */
|
376
|
+
md5_append(pms, pad, ((55 - (pms->count[0] >> 3)) & 63) + 1);
|
377
|
+
/* Append the length. */
|
378
|
+
md5_append(pms, data, 8);
|
379
|
+
for (i = 0; i < 16; ++i)
|
380
|
+
digest[i] = (md5_byte_t)(pms->abcd[i >> 2] >> ((i & 3) << 3));
|
381
|
+
}
|
data/ext/md5.h
ADDED
@@ -0,0 +1,101 @@
|
|
1
|
+
/*
|
2
|
+
Copyright (C) 1999, 2002 Aladdin Enterprises. All rights reserved.
|
3
|
+
|
4
|
+
This software is provided 'as-is', without any express or implied
|
5
|
+
warranty. In no event will the authors be held liable for any damages
|
6
|
+
arising from the use of this software.
|
7
|
+
|
8
|
+
Permission is granted to anyone to use this software for any purpose,
|
9
|
+
including commercial applications, and to alter it and redistribute it
|
10
|
+
freely, subject to the following restrictions:
|
11
|
+
|
12
|
+
1. The origin of this software must not be misrepresented; you must not
|
13
|
+
claim that you wrote the original software. If you use this software
|
14
|
+
in a product, an acknowledgment in the product documentation would be
|
15
|
+
appreciated but is not required.
|
16
|
+
2. Altered source versions must be plainly marked as such, and must not be
|
17
|
+
misrepresented as being the original software.
|
18
|
+
3. This notice may not be removed or altered from any source distribution.
|
19
|
+
|
20
|
+
L. Peter Deutsch
|
21
|
+
ghost@aladdin.com
|
22
|
+
|
23
|
+
*/
|
24
|
+
/* $Id: md5.h,v 1.4 2002/04/13 19:20:28 lpd Exp $ */
|
25
|
+
/*
|
26
|
+
Independent implementation of MD5 (RFC 1321).
|
27
|
+
|
28
|
+
This code implements the MD5 Algorithm defined in RFC 1321, whose
|
29
|
+
text is available at
|
30
|
+
http://www.ietf.org/rfc/rfc1321.txt
|
31
|
+
The code is derived from the text of the RFC, including the test suite
|
32
|
+
(section A.5) but excluding the rest of Appendix A. It does not include
|
33
|
+
any code or documentation that is identified in the RFC as being
|
34
|
+
copyrighted.
|
35
|
+
|
36
|
+
The original and principal author of md5.h is L. Peter Deutsch
|
37
|
+
<ghost@aladdin.com>. Other authors are noted in the change history
|
38
|
+
that follows (in reverse chronological order):
|
39
|
+
|
40
|
+
2002-04-13 lpd Removed support for non-ANSI compilers; removed
|
41
|
+
references to Ghostscript; clarified derivation from RFC 1321;
|
42
|
+
now handles byte order either statically or dynamically.
|
43
|
+
1999-11-04 lpd Edited comments slightly for automatic TOC extraction.
|
44
|
+
1999-10-18 lpd Fixed typo in header comment (ansi2knr rather than md5);
|
45
|
+
added conditionalization for C++ compilation from Martin
|
46
|
+
Purschke <purschke@bnl.gov>.
|
47
|
+
1999-05-03 lpd Original version.
|
48
|
+
*/
|
49
|
+
|
50
|
+
#ifndef md5_INCLUDED
|
51
|
+
# define md5_INCLUDED
|
52
|
+
|
53
|
+
/*
|
54
|
+
* This package supports both compile-time and run-time determination of CPU
|
55
|
+
* byte order. If ARCH_IS_BIG_ENDIAN is defined as 0, the code will be
|
56
|
+
* compiled to run only on little-endian CPUs; if ARCH_IS_BIG_ENDIAN is
|
57
|
+
* defined as non-zero, the code will be compiled to run only on big-endian
|
58
|
+
* CPUs; if ARCH_IS_BIG_ENDIAN is not defined, the code will be compiled to
|
59
|
+
* run on either big- or little-endian CPUs, but will run slightly less
|
60
|
+
* efficiently on either one than if ARCH_IS_BIG_ENDIAN is defined.
|
61
|
+
*/
|
62
|
+
|
63
|
+
typedef unsigned char md5_byte_t; /* 8-bit byte */
|
64
|
+
typedef unsigned int md5_word_t; /* 32-bit word */
|
65
|
+
|
66
|
+
/* Define the state of the MD5 Algorithm. */
|
67
|
+
typedef struct md5_state_s {
|
68
|
+
md5_word_t count[2]; /* message length in bits, lsw first */
|
69
|
+
md5_word_t abcd[4]; /* digest buffer */
|
70
|
+
md5_byte_t buf[64]; /* accumulate block */
|
71
|
+
} md5_state_t;
|
72
|
+
|
73
|
+
#ifdef __cplusplus
|
74
|
+
extern "C"
|
75
|
+
{
|
76
|
+
#endif
|
77
|
+
|
78
|
+
/* Initialize the algorithm. */
|
79
|
+
|
80
|
+
#ifdef WIN32
|
81
|
+
_declspec(dllexport)
|
82
|
+
#endif
|
83
|
+
void md5_init(md5_state_t *pms);
|
84
|
+
|
85
|
+
/* Append a string to the message. */
|
86
|
+
#ifdef WIN32
|
87
|
+
_declspec(dllexport)
|
88
|
+
#endif
|
89
|
+
void md5_append(md5_state_t *pms, const md5_byte_t *data, int nbytes);
|
90
|
+
|
91
|
+
/* Finish the message and return the digest. */
|
92
|
+
#ifdef WIN32
|
93
|
+
_declspec(dllexport)
|
94
|
+
#endif
|
95
|
+
void md5_finish(md5_state_t *pms, md5_byte_t digest[16]);
|
96
|
+
|
97
|
+
#ifdef __cplusplus
|
98
|
+
} /* end extern "C" */
|
99
|
+
#endif
|
100
|
+
|
101
|
+
#endif /* md5_INCLUDED */
|
@@ -0,0 +1,185 @@
|
|
1
|
+
require File.join(File.dirname(__FILE__), 'spec_base')
|
2
|
+
|
3
|
+
# Basic constants
|
4
|
+
UNWEIGHTED_RUNS = 1000
|
5
|
+
UNWEIGHTED_ERROR_BOUND = 0.05
|
6
|
+
WEIGHTED_RUNS = 1000
|
7
|
+
WEIGHTED_ERROR_BOUND = 0.05
|
8
|
+
|
9
|
+
describe FastHashRing do
|
10
|
+
include FastHashRingHelpers
|
11
|
+
|
12
|
+
it "should allow the creation of a hash ring with non-string objects" do
|
13
|
+
lambda do
|
14
|
+
ring = FastHashRing.new([FastHashRing.new(['a']), FastHashRing.new(['b'])])
|
15
|
+
end.should_not raise_error
|
16
|
+
end
|
17
|
+
|
18
|
+
describe "bisection" do
|
19
|
+
before do
|
20
|
+
@ring = FastHashRing.new(['a'])
|
21
|
+
@test_array = [10,20,30]
|
22
|
+
end
|
23
|
+
|
24
|
+
it "should return 0 if it less than the first element" do
|
25
|
+
@ring.bisect(@test_array, 5).should eql(0)
|
26
|
+
end
|
27
|
+
|
28
|
+
it "should return the index it should go into to maintain order" do
|
29
|
+
@ring.bisect(@test_array, 15).should eql(1)
|
30
|
+
end
|
31
|
+
|
32
|
+
it "should return the final index if greater than all items" do
|
33
|
+
@ring.bisect(@test_array, 40).should eql(3)
|
34
|
+
end
|
35
|
+
end
|
36
|
+
|
37
|
+
describe "iterating nodes" do
|
38
|
+
before do
|
39
|
+
@ring = FastHashRing.new(['a','b','c'])
|
40
|
+
end
|
41
|
+
|
42
|
+
it "should return correct values based on python" do
|
43
|
+
a_iterate = @ring.iterate_nodes('a')
|
44
|
+
b_iterate = @ring.iterate_nodes('b')
|
45
|
+
c_iterate = @ring.iterate_nodes('ccccccccc')
|
46
|
+
|
47
|
+
a_python = ["a","c","b"]
|
48
|
+
b_python = ["b","c","a"]
|
49
|
+
c_python = ["c","a","b"]
|
50
|
+
|
51
|
+
(a_iterate - a_python).should be_empty
|
52
|
+
(b_iterate - b_python).should be_empty
|
53
|
+
(c_iterate - c_python).should be_empty
|
54
|
+
end
|
55
|
+
end
|
56
|
+
|
57
|
+
describe "getting nodes" do
|
58
|
+
def check_consistent_assigns
|
59
|
+
first_node = @ring.get_node(@consistent_key)
|
60
|
+
|
61
|
+
100.times do
|
62
|
+
@ring.get_node(@consistent_key).should eql(first_node)
|
63
|
+
end
|
64
|
+
end
|
65
|
+
|
66
|
+
|
67
|
+
def check_distribution
|
68
|
+
# Keys chosen specifically from trying on Python code
|
69
|
+
first_node = @ring.get_node('a')
|
70
|
+
second_node = @ring.get_node('b')
|
71
|
+
|
72
|
+
first_node.should_not eql(second_node)
|
73
|
+
end
|
74
|
+
|
75
|
+
def check_probability(run_count, error_bound, weights={})
|
76
|
+
counts = {}
|
77
|
+
total_counts = 0
|
78
|
+
|
79
|
+
run_count.times do |i|
|
80
|
+
node = @ring.get_node(random_string)
|
81
|
+
|
82
|
+
if counts[node].nil?
|
83
|
+
counts[node] = 0
|
84
|
+
else
|
85
|
+
counts[node] += 1
|
86
|
+
end
|
87
|
+
|
88
|
+
total_counts += 1
|
89
|
+
end
|
90
|
+
|
91
|
+
total_keys = counts.keys.length
|
92
|
+
|
93
|
+
# Should be bounded, hopefully by 1/total_keys (give or take an error bound)
|
94
|
+
ideal_probability = (1.0/total_keys) + error_bound
|
95
|
+
counts.each do |node, count|
|
96
|
+
weight = weights[node] || 1
|
97
|
+
probability = (count / run_count.to_f)
|
98
|
+
weighted_probability = ideal_probability * weight
|
99
|
+
|
100
|
+
if probability >= weighted_probability
|
101
|
+
fail "#{node} has probability: #{probability}"
|
102
|
+
end
|
103
|
+
end
|
104
|
+
end
|
105
|
+
|
106
|
+
describe "without explicit weights" do
|
107
|
+
before do
|
108
|
+
@ring = FastHashRing.new(['a','b','c'])
|
109
|
+
@consistent_key = 'Hello, World'
|
110
|
+
end
|
111
|
+
|
112
|
+
it "should consistently assign nodes" do
|
113
|
+
check_consistent_assigns
|
114
|
+
end
|
115
|
+
|
116
|
+
it "should distribute keys to different buckets" do
|
117
|
+
check_distribution
|
118
|
+
end
|
119
|
+
|
120
|
+
it "should assign keys fairly randomly" do
|
121
|
+
check_probability(UNWEIGHTED_RUNS, UNWEIGHTED_ERROR_BOUND)
|
122
|
+
end
|
123
|
+
end
|
124
|
+
|
125
|
+
describe "with explicit weights" do
|
126
|
+
before do
|
127
|
+
# Create a hash ring with 'a' having a 2:1 weight
|
128
|
+
@weights = { 'a' => 2 }
|
129
|
+
@ring = FastHashRing.new(['a','b','c'], @weights)
|
130
|
+
@consistent_key = 'Hello, World'
|
131
|
+
end
|
132
|
+
|
133
|
+
it "should consistently assign nodes" do
|
134
|
+
check_consistent_assigns
|
135
|
+
end
|
136
|
+
|
137
|
+
it "should distribute keys to different buckets" do
|
138
|
+
check_distribution
|
139
|
+
end
|
140
|
+
|
141
|
+
it "should assign keys fairly randomly, but according to weights" do
|
142
|
+
check_probability(WEIGHTED_RUNS, WEIGHTED_ERROR_BOUND, @weights)
|
143
|
+
end
|
144
|
+
end
|
145
|
+
end
|
146
|
+
|
147
|
+
describe "hashing methods" do
|
148
|
+
before do
|
149
|
+
@ring = FastHashRing.new(['a'])
|
150
|
+
end
|
151
|
+
|
152
|
+
it "should return the raw digest for _hash_digest" do
|
153
|
+
random_string = 'some random string'
|
154
|
+
|
155
|
+
m = Digest::MD5.new
|
156
|
+
m.update(random_string)
|
157
|
+
|
158
|
+
@ring._hash_digest(random_string).should eql(m.digest)
|
159
|
+
end
|
160
|
+
|
161
|
+
it "should match the python output for _hash_val" do
|
162
|
+
# This output was taken directly from the python library
|
163
|
+
py_output = 2830561728
|
164
|
+
ruby_output = @ring._hash_val(@ring._hash_digest('a')) { |x| x+4 }
|
165
|
+
|
166
|
+
ruby_output.should eql(py_output)
|
167
|
+
end
|
168
|
+
end
|
169
|
+
|
170
|
+
# THIS IS A VERY DIRTY WAY TO SPEC THIS
|
171
|
+
# But given its "random" nature, I figured comparing the two libraries'
|
172
|
+
# (one of which is in production on a huge site) output should be
|
173
|
+
# "safe enough"
|
174
|
+
describe "ring generation" do
|
175
|
+
it "should generate the same ring as python, given the same inputs" do
|
176
|
+
# Yeah... I know... terrible.
|
177
|
+
py_output = [3747649, 3747649, 35374473, 35374473, 61840307, 61840307, 82169324, 82169324, 99513906, 99513906, 171267966, 171267966, 189092589, 189092589, 211562723, 211562723, 274168570, 274168570, 309884358, 309884358, 337859634, 337859634, 359487305, 359487305, 437877875, 437877875, 440532511, 440532511, 441427647, 441427647, 540691923, 540691923, 561744136, 561744136, 566640950, 566640950, 573631360, 573631360, 593354384, 593354384, 616375601, 616375601, 653401705, 653401705, 658933707, 658933707, 711407824, 711407824, 717967565, 717967565, 791654246, 791654246, 815230777, 815230777, 836319689, 836319689, 943387296, 943387296, 948212432, 948212432, 954761114, 954761114, 983151602, 983151602, 1041951938, 1041951938, 1044903177, 1044903177, 1109542669, 1109542669, 1215807553, 1215807553, 1234529376, 1234529376, 1240978794, 1240978794, 1241570279, 1241570279, 1245440929, 1245440929, 1295496069, 1295496069, 1359345465, 1359345465, 1371916815, 1371916815, 1440228341, 1440228341, 1463589668, 1463589668, 1542595588, 1542595588, 1571041323, 1571041323, 1580821462, 1580821462, 1609040193, 1609040193, 1663806909, 1663806909, 1673418579, 1673418579, 1725587406, 1725587406, 1743807106, 1743807106, 1745454947, 1745454947, 1770079607, 1770079607, 1816647406, 1816647406, 1823214399, 1823214399, 1858099396, 1858099396, 1889941457, 1889941457, 1903777629, 1903777629, 1956489818, 1956489818, 1981836821, 1981836821, 2027012493, 2027012493, 2036573472, 2036573472, 2063971870, 2063971870, 2113406442, 2113406442, 2203084188, 2203084188, 2245550483, 2245550483, 2369128516, 2369128516, 2401481896, 2401481896, 2405232024, 2405232024, 2439876819, 2439876819, 2498655628, 2498655628, 2666618195, 2666618195, 2709250454, 2709250454, 2725462545, 2725462545, 2761971368, 2761971368, 2820158560, 2820158560, 2847935782, 2847935782, 2873909817, 2873909817, 2960677255, 2960677255, 2970346521, 2970346521, 3065786853, 3065786853, 3173507458, 3173507458, 3187067483, 3187067483, 3189484171, 3189484171, 3196179889, 3196179889, 3200322582, 3200322582, 3234564840, 3234564840, 3262283799, 3262283799, 3310202261, 3310202261, 3326019031, 3326019031, 3332298302, 3332298302, 3347538539, 3347538539, 3365852132, 3365852132, 3378546819, 3378546819, 3430078214, 3430078214, 3453809654, 3453809654, 3467283568, 3467283568, 3469681976, 3469681976, 3494401641, 3494401641, 3522127265, 3522127265, 3523123410, 3523123410, 3555788439, 3555788439, 3585259232, 3585259232, 3587218875, 3587218875, 3587230532, 3587230532, 3627100732, 3627100732, 3642352831, 3642352831, 3670553958, 3670553958, 3721827301, 3721827301, 3746479890, 3746479890, 3836178086, 3836178086, 3887780209, 3887780209, 3927215372, 3927215372, 3953297430, 3953297430, 3967308270, 3967308270, 4025490138, 4025490138, 4045625605, 4045625605, 4094112530, 4094112530]
|
178
|
+
|
179
|
+
ruby_output = FastHashRing.new(['a'])
|
180
|
+
|
181
|
+
# Calculate the difference of the array, since ordering may be different
|
182
|
+
(ruby_output.sorted_keys - py_output).should be_empty
|
183
|
+
end
|
184
|
+
end
|
185
|
+
end
|
data/spec/spec_base.rb
ADDED
metadata
ADDED
@@ -0,0 +1,65 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: fast_hash_ring
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: "0.1"
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- Flinn
|
8
|
+
autorequire:
|
9
|
+
bindir: bin
|
10
|
+
cert_chain: []
|
11
|
+
|
12
|
+
date: 2009-11-15 00:00:00 -05:00
|
13
|
+
default_executable:
|
14
|
+
dependencies: []
|
15
|
+
|
16
|
+
description:
|
17
|
+
email: flinn@actsasflinn.com
|
18
|
+
executables: []
|
19
|
+
|
20
|
+
extensions:
|
21
|
+
- ext/extconf.rb
|
22
|
+
extra_rdoc_files:
|
23
|
+
- README.rdoc
|
24
|
+
files:
|
25
|
+
- CREDITS
|
26
|
+
- LICENSE
|
27
|
+
- Rakefile
|
28
|
+
- README.rdoc
|
29
|
+
- ext/fast_hash_ring.c
|
30
|
+
- ext/fast_hash_ring.h
|
31
|
+
- ext/md5.c
|
32
|
+
- ext/md5.h
|
33
|
+
- spec/fast_hash_ring_spec.rb
|
34
|
+
- spec/spec_base.rb
|
35
|
+
- benchmarks/fast_hash_ring.rb
|
36
|
+
has_rdoc: true
|
37
|
+
homepage: http://github.com/actsasflinn/fast_hash_ring/
|
38
|
+
licenses: []
|
39
|
+
|
40
|
+
post_install_message:
|
41
|
+
rdoc_options: []
|
42
|
+
|
43
|
+
require_paths:
|
44
|
+
- ext
|
45
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
46
|
+
requirements:
|
47
|
+
- - ">="
|
48
|
+
- !ruby/object:Gem::Version
|
49
|
+
version: "0"
|
50
|
+
version:
|
51
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
52
|
+
requirements:
|
53
|
+
- - ">="
|
54
|
+
- !ruby/object:Gem::Version
|
55
|
+
version: "0"
|
56
|
+
version:
|
57
|
+
requirements: []
|
58
|
+
|
59
|
+
rubyforge_project:
|
60
|
+
rubygems_version: 1.3.5
|
61
|
+
signing_key:
|
62
|
+
specification_version: 3
|
63
|
+
summary: A Ruby C Extension based on the pure Ruby HashRing gem
|
64
|
+
test_files:
|
65
|
+
- spec/spec_base.rb
|