nutcracker 0.2.3
Sign up to get free protection for your applications and to get access to all the features.
- data/README.md +22 -0
- data/Rakefile +55 -0
- data/bin/nutcracker +2 -0
- data/ext/nutcracker/ChangeLog +66 -0
- data/ext/nutcracker/LICENSE +177 -0
- data/ext/nutcracker/Makefile.am +7 -0
- data/ext/nutcracker/Makefile.in +726 -0
- data/ext/nutcracker/NOTICE +124 -0
- data/ext/nutcracker/README.md +240 -0
- data/ext/nutcracker/aclocal.m4 +956 -0
- data/ext/nutcracker/conf/nutcracker.leaf.yml +10 -0
- data/ext/nutcracker/conf/nutcracker.root.yml +8 -0
- data/ext/nutcracker/conf/nutcracker.yml +67 -0
- data/ext/nutcracker/config.h.in +316 -0
- data/ext/nutcracker/config/config.guess +1561 -0
- data/ext/nutcracker/config/config.sub +1686 -0
- data/ext/nutcracker/config/depcomp +630 -0
- data/ext/nutcracker/config/install-sh +520 -0
- data/ext/nutcracker/config/ltmain.sh +8413 -0
- data/ext/nutcracker/config/missing +376 -0
- data/ext/nutcracker/configure +18862 -0
- data/ext/nutcracker/configure.ac +155 -0
- data/ext/nutcracker/contrib/Makefile.am +3 -0
- data/ext/nutcracker/contrib/Makefile.in +560 -0
- data/ext/nutcracker/contrib/yaml-0.1.4.tar.gz +0 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/LICENSE +19 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/Makefile.am +20 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/Makefile.in +736 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/README +27 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/aclocal.m4 +956 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/config.h.in +80 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/config/config.guess +1561 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/config/config.sub +1686 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/config/depcomp +630 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/config/install-sh +520 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/config/ltmain.sh +8406 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/config/missing +376 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/configure +13085 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/configure.ac +75 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/doc/doxygen.cfg +222 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/include/yaml.h +1971 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/m4/libtool.m4 +7357 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/m4/ltoptions.m4 +368 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/m4/ltsugar.m4 +123 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/m4/ltversion.m4 +23 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/m4/lt~obsolete.m4 +92 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/src/Makefile.am +4 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/src/Makefile.in +484 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/src/api.c +1392 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/src/dumper.c +394 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/src/emitter.c +2329 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/src/loader.c +432 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/src/parser.c +1374 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/src/reader.c +465 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/src/scanner.c +3570 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/src/writer.c +141 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/src/yaml_private.h +640 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/tests/Makefile.am +8 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/tests/Makefile.in +675 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/tests/example-deconstructor-alt.c +800 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/tests/example-deconstructor.c +1130 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/tests/example-reformatter-alt.c +217 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/tests/example-reformatter.c +202 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/tests/run-dumper.c +311 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/tests/run-emitter.c +327 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/tests/run-loader.c +63 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/tests/run-parser.c +63 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/tests/run-scanner.c +63 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/tests/test-reader.c +354 -0
- data/ext/nutcracker/contrib/yaml-0.1.4/tests/test-version.c +29 -0
- data/ext/nutcracker/extconf.rb +5 -0
- data/ext/nutcracker/m4/libtool.m4 +7376 -0
- data/ext/nutcracker/m4/ltoptions.m4 +368 -0
- data/ext/nutcracker/m4/ltsugar.m4 +123 -0
- data/ext/nutcracker/m4/ltversion.m4 +23 -0
- data/ext/nutcracker/m4/lt~obsolete.m4 +92 -0
- data/ext/nutcracker/notes/c-styleguide.txt +425 -0
- data/ext/nutcracker/notes/debug.txt +96 -0
- data/ext/nutcracker/notes/memcache.txt +123 -0
- data/ext/nutcracker/notes/recommendation.md +118 -0
- data/ext/nutcracker/notes/redis.md +415 -0
- data/ext/nutcracker/notes/socket.txt +131 -0
- data/ext/nutcracker/scripts/multi_get.sh +26 -0
- data/ext/nutcracker/scripts/nutcracker.init +73 -0
- data/ext/nutcracker/scripts/nutcracker.spec +52 -0
- data/ext/nutcracker/scripts/pipelined_read.sh +23 -0
- data/ext/nutcracker/scripts/pipelined_write.sh +29 -0
- data/ext/nutcracker/scripts/populate_memcached.sh +24 -0
- data/ext/nutcracker/scripts/redis-check.py +23 -0
- data/ext/nutcracker/scripts/redis-check.sh +564 -0
- data/ext/nutcracker/src/Makefile.am +46 -0
- data/ext/nutcracker/src/Makefile.in +726 -0
- data/ext/nutcracker/src/hashkit/Makefile.am +22 -0
- data/ext/nutcracker/src/hashkit/Makefile.in +501 -0
- data/ext/nutcracker/src/hashkit/nc_crc32.c +105 -0
- data/ext/nutcracker/src/hashkit/nc_fnv.c +82 -0
- data/ext/nutcracker/src/hashkit/nc_hashkit.h +74 -0
- data/ext/nutcracker/src/hashkit/nc_hsieh.c +93 -0
- data/ext/nutcracker/src/hashkit/nc_jenkins.c +230 -0
- data/ext/nutcracker/src/hashkit/nc_ketama.c +240 -0
- data/ext/nutcracker/src/hashkit/nc_md5.c +379 -0
- data/ext/nutcracker/src/hashkit/nc_modula.c +144 -0
- data/ext/nutcracker/src/hashkit/nc_murmur.c +99 -0
- data/ext/nutcracker/src/hashkit/nc_one_at_a_time.c +51 -0
- data/ext/nutcracker/src/hashkit/nc_random.c +146 -0
- data/ext/nutcracker/src/nc.c +573 -0
- data/ext/nutcracker/src/nc_array.c +204 -0
- data/ext/nutcracker/src/nc_array.h +73 -0
- data/ext/nutcracker/src/nc_client.c +189 -0
- data/ext/nutcracker/src/nc_client.h +28 -0
- data/ext/nutcracker/src/nc_conf.c +1766 -0
- data/ext/nutcracker/src/nc_conf.h +134 -0
- data/ext/nutcracker/src/nc_connection.c +392 -0
- data/ext/nutcracker/src/nc_connection.h +99 -0
- data/ext/nutcracker/src/nc_core.c +334 -0
- data/ext/nutcracker/src/nc_core.h +131 -0
- data/ext/nutcracker/src/nc_event.c +214 -0
- data/ext/nutcracker/src/nc_event.h +39 -0
- data/ext/nutcracker/src/nc_log.c +254 -0
- data/ext/nutcracker/src/nc_log.h +120 -0
- data/ext/nutcracker/src/nc_mbuf.c +285 -0
- data/ext/nutcracker/src/nc_mbuf.h +67 -0
- data/ext/nutcracker/src/nc_message.c +828 -0
- data/ext/nutcracker/src/nc_message.h +253 -0
- data/ext/nutcracker/src/nc_proxy.c +359 -0
- data/ext/nutcracker/src/nc_proxy.h +34 -0
- data/ext/nutcracker/src/nc_queue.h +788 -0
- data/ext/nutcracker/src/nc_rbtree.c +348 -0
- data/ext/nutcracker/src/nc_rbtree.h +47 -0
- data/ext/nutcracker/src/nc_request.c +588 -0
- data/ext/nutcracker/src/nc_response.c +332 -0
- data/ext/nutcracker/src/nc_server.c +841 -0
- data/ext/nutcracker/src/nc_server.h +143 -0
- data/ext/nutcracker/src/nc_signal.c +131 -0
- data/ext/nutcracker/src/nc_signal.h +34 -0
- data/ext/nutcracker/src/nc_stats.c +1188 -0
- data/ext/nutcracker/src/nc_stats.h +206 -0
- data/ext/nutcracker/src/nc_string.c +109 -0
- data/ext/nutcracker/src/nc_string.h +112 -0
- data/ext/nutcracker/src/nc_util.c +619 -0
- data/ext/nutcracker/src/nc_util.h +214 -0
- data/ext/nutcracker/src/proto/Makefile.am +14 -0
- data/ext/nutcracker/src/proto/Makefile.in +482 -0
- data/ext/nutcracker/src/proto/nc_memcache.c +1306 -0
- data/ext/nutcracker/src/proto/nc_proto.h +155 -0
- data/ext/nutcracker/src/proto/nc_redis.c +2102 -0
- data/lib/nutcracker.rb +7 -0
- data/lib/nutcracker/version.rb +3 -0
- metadata +194 -0
@@ -0,0 +1,240 @@
|
|
1
|
+
/*
|
2
|
+
* twemproxy - A fast and lightweight proxy for memcached protocol.
|
3
|
+
* Copyright (C) 2011 Twitter, Inc.
|
4
|
+
*
|
5
|
+
* Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
* you may not use this file except in compliance with the License.
|
7
|
+
* You may obtain a copy of the License at
|
8
|
+
*
|
9
|
+
* http://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
*
|
11
|
+
* Unless required by applicable law or agreed to in writing, software
|
12
|
+
* distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
* See the License for the specific language governing permissions and
|
15
|
+
* limitations under the License.
|
16
|
+
*/
|
17
|
+
|
18
|
+
#include <stdio.h>
|
19
|
+
#include <stdlib.h>
|
20
|
+
#include <math.h>
|
21
|
+
|
22
|
+
#include <nc_core.h>
|
23
|
+
#include <nc_server.h>
|
24
|
+
#include <nc_hashkit.h>
|
25
|
+
|
26
|
+
#define KETAMA_CONTINUUM_ADDITION 10 /* # extra slots to build into continuum */
|
27
|
+
#define KETAMA_POINTS_PER_SERVER 160 /* 40 points per hash */
|
28
|
+
#define KETAMA_MAX_HOSTLEN 86
|
29
|
+
|
30
|
+
static uint32_t
|
31
|
+
ketama_hash(const char *key, size_t key_length, uint32_t alignment)
|
32
|
+
{
|
33
|
+
unsigned char results[16];
|
34
|
+
|
35
|
+
md5_signature((unsigned char*)key, key_length, results);
|
36
|
+
|
37
|
+
return ((uint32_t) (results[3 + alignment * 4] & 0xFF) << 24)
|
38
|
+
| ((uint32_t) (results[2 + alignment * 4] & 0xFF) << 16)
|
39
|
+
| ((uint32_t) (results[1 + alignment * 4] & 0xFF) << 8)
|
40
|
+
| (results[0 + alignment * 4] & 0xFF);
|
41
|
+
}
|
42
|
+
|
43
|
+
static int
|
44
|
+
ketama_item_cmp(const void *t1, const void *t2)
|
45
|
+
{
|
46
|
+
const struct continuum *ct1 = t1, *ct2 = t2;
|
47
|
+
|
48
|
+
if (ct1->value == ct2->value) {
|
49
|
+
return 0;
|
50
|
+
} else if (ct1->value > ct2->value) {
|
51
|
+
return 1;
|
52
|
+
} else {
|
53
|
+
return -1;
|
54
|
+
}
|
55
|
+
}
|
56
|
+
|
57
|
+
rstatus_t
|
58
|
+
ketama_update(struct server_pool *pool)
|
59
|
+
{
|
60
|
+
uint32_t nserver; /* # server - live and dead */
|
61
|
+
uint32_t nlive_server; /* # live server */
|
62
|
+
uint32_t pointer_per_server; /* pointers per server proportional to weight */
|
63
|
+
uint32_t pointer_per_hash; /* pointers per hash */
|
64
|
+
uint32_t pointer_counter; /* # pointers on continuum */
|
65
|
+
uint32_t pointer_index; /* pointer index */
|
66
|
+
uint32_t points_per_server; /* points per server */
|
67
|
+
uint32_t continuum_index; /* continuum index */
|
68
|
+
uint32_t continuum_addition; /* extra space in the continuum */
|
69
|
+
uint32_t server_index; /* server index */
|
70
|
+
uint32_t value; /* continuum value */
|
71
|
+
uint32_t total_weight; /* total live server weight */
|
72
|
+
int64_t now; /* current timestamp in usec */
|
73
|
+
|
74
|
+
ASSERT(array_n(&pool->server) > 0);
|
75
|
+
|
76
|
+
now = nc_usec_now();
|
77
|
+
if (now < 0) {
|
78
|
+
return NC_ERROR;
|
79
|
+
}
|
80
|
+
|
81
|
+
/*
|
82
|
+
* Count live servers and total weight, and also update the next time to
|
83
|
+
* rebuild the distribution
|
84
|
+
*/
|
85
|
+
nserver = array_n(&pool->server);
|
86
|
+
nlive_server = 0;
|
87
|
+
total_weight = 0;
|
88
|
+
pool->next_rebuild = 0LL;
|
89
|
+
for (server_index = 0; server_index < nserver; server_index++) {
|
90
|
+
struct server *server = array_get(&pool->server, server_index);
|
91
|
+
|
92
|
+
if (pool->auto_eject_hosts) {
|
93
|
+
if (server->next_retry <= now) {
|
94
|
+
server->next_retry = 0LL;
|
95
|
+
nlive_server++;
|
96
|
+
} else if (pool->next_rebuild == 0LL ||
|
97
|
+
server->next_retry < pool->next_rebuild) {
|
98
|
+
pool->next_rebuild = server->next_retry;
|
99
|
+
}
|
100
|
+
} else {
|
101
|
+
nlive_server++;
|
102
|
+
}
|
103
|
+
|
104
|
+
ASSERT(server->weight > 0);
|
105
|
+
|
106
|
+
/* count weight only for live servers */
|
107
|
+
if (!pool->auto_eject_hosts || server->next_retry <= now) {
|
108
|
+
total_weight += server->weight;
|
109
|
+
}
|
110
|
+
}
|
111
|
+
|
112
|
+
pool->nlive_server = nlive_server;
|
113
|
+
|
114
|
+
if (nlive_server == 0) {
|
115
|
+
log_debug(LOG_DEBUG, "no live servers for pool %"PRIu32" '%.*s'",
|
116
|
+
pool->idx, pool->name.len, pool->name.data);
|
117
|
+
|
118
|
+
return NC_OK;
|
119
|
+
}
|
120
|
+
log_debug(LOG_DEBUG, "%"PRIu32" of %"PRIu32" servers are live for pool "
|
121
|
+
"%"PRIu32" '%.*s'", nlive_server, nserver, pool->idx,
|
122
|
+
pool->name.len, pool->name.data);
|
123
|
+
|
124
|
+
continuum_addition = KETAMA_CONTINUUM_ADDITION;
|
125
|
+
points_per_server = KETAMA_POINTS_PER_SERVER;
|
126
|
+
/*
|
127
|
+
* Allocate the continuum for the pool, the first time, and every time we
|
128
|
+
* add a new server to the pool
|
129
|
+
*/
|
130
|
+
if (nlive_server > pool->nserver_continuum) {
|
131
|
+
struct continuum *continuum;
|
132
|
+
uint32_t nserver_continuum = nlive_server + continuum_addition;
|
133
|
+
uint32_t ncontinuum = nserver_continuum * points_per_server;
|
134
|
+
|
135
|
+
continuum = nc_realloc(pool->continuum, sizeof(*continuum) * ncontinuum);
|
136
|
+
if (continuum == NULL) {
|
137
|
+
return NC_ENOMEM;
|
138
|
+
}
|
139
|
+
|
140
|
+
pool->continuum = continuum;
|
141
|
+
pool->nserver_continuum = nserver_continuum;
|
142
|
+
/* pool->ncontinuum is initialized later as it could be <= ncontinuum */
|
143
|
+
}
|
144
|
+
|
145
|
+
/*
|
146
|
+
* Build a continuum with the servers that are live and points from
|
147
|
+
* these servers that are proportial to their weight
|
148
|
+
*/
|
149
|
+
continuum_index = 0;
|
150
|
+
pointer_counter = 0;
|
151
|
+
for (server_index = 0; server_index < nserver; server_index++) {
|
152
|
+
struct server *server;
|
153
|
+
float pct;
|
154
|
+
|
155
|
+
server = array_get(&pool->server, server_index);
|
156
|
+
|
157
|
+
if (pool->auto_eject_hosts && server->next_retry > now) {
|
158
|
+
continue;
|
159
|
+
}
|
160
|
+
|
161
|
+
pct = (float)server->weight / (float)total_weight;
|
162
|
+
pointer_per_server = (uint32_t) ((floorf((float) (pct * KETAMA_POINTS_PER_SERVER / 4 * (float)nlive_server + 0.0000000001))) * 4);
|
163
|
+
pointer_per_hash = 4;
|
164
|
+
|
165
|
+
log_debug(LOG_VERB, "%.*s:%"PRIu16" weight %"PRIu32" of %"PRIu32" "
|
166
|
+
"pct %0.5f points per server %"PRIu32"",
|
167
|
+
server->name.len, server->name.data, server->port,
|
168
|
+
server->weight, total_weight, pct, pointer_per_server);
|
169
|
+
|
170
|
+
for (pointer_index = 1;
|
171
|
+
pointer_index <= pointer_per_server / pointer_per_hash;
|
172
|
+
pointer_index++) {
|
173
|
+
|
174
|
+
char host[KETAMA_MAX_HOSTLEN]= "";
|
175
|
+
size_t hostlen;
|
176
|
+
uint32_t x;
|
177
|
+
|
178
|
+
hostlen = snprintf(host, KETAMA_MAX_HOSTLEN, "%.*s-%u",
|
179
|
+
server->name.len, server->name.data,
|
180
|
+
pointer_index - 1);
|
181
|
+
|
182
|
+
for (x = 0; x < pointer_per_hash; x++) {
|
183
|
+
value = ketama_hash(host, hostlen, x);
|
184
|
+
pool->continuum[continuum_index].index = server_index;
|
185
|
+
pool->continuum[continuum_index++].value = value;
|
186
|
+
}
|
187
|
+
}
|
188
|
+
pointer_counter += pointer_per_server;
|
189
|
+
}
|
190
|
+
|
191
|
+
pool->ncontinuum = pointer_counter;
|
192
|
+
qsort(pool->continuum, pool->ncontinuum, sizeof(*pool->continuum),
|
193
|
+
ketama_item_cmp);
|
194
|
+
|
195
|
+
for (pointer_index = 0;
|
196
|
+
pointer_index < ((nlive_server * KETAMA_POINTS_PER_SERVER) - 1);
|
197
|
+
pointer_index++) {
|
198
|
+
if (pointer_index + 1 >= pointer_counter) {
|
199
|
+
break;
|
200
|
+
}
|
201
|
+
ASSERT(pool->continuum[pointer_index].value <=
|
202
|
+
pool->continuum[pointer_index + 1].value);
|
203
|
+
}
|
204
|
+
|
205
|
+
log_debug(LOG_VERB, "updated pool %"PRIu32" '%.*s' with %"PRIu32" of "
|
206
|
+
"%"PRIu32" servers live in %"PRIu32" slots and %"PRIu32" "
|
207
|
+
"active points in %"PRIu32" slots", pool->idx,
|
208
|
+
pool->name.len, pool->name.data, nlive_server, nserver,
|
209
|
+
pool->nserver_continuum, pool->ncontinuum,
|
210
|
+
(pool->nserver_continuum + continuum_addition) * points_per_server);
|
211
|
+
|
212
|
+
return NC_OK;
|
213
|
+
}
|
214
|
+
|
215
|
+
uint32_t
|
216
|
+
ketama_dispatch(struct continuum *continuum, uint32_t ncontinuum, uint32_t hash)
|
217
|
+
{
|
218
|
+
struct continuum *begin, *end, *left, *right, *middle;
|
219
|
+
|
220
|
+
ASSERT(continuum != NULL);
|
221
|
+
ASSERT(ncontinuum != 0);
|
222
|
+
|
223
|
+
begin = left = continuum;
|
224
|
+
end = right = continuum + ncontinuum;
|
225
|
+
|
226
|
+
while (left < right) {
|
227
|
+
middle = left + (right - left) / 2;
|
228
|
+
if (middle->value < hash) {
|
229
|
+
left = middle + 1;
|
230
|
+
} else {
|
231
|
+
right = middle;
|
232
|
+
}
|
233
|
+
}
|
234
|
+
|
235
|
+
if (right == end) {
|
236
|
+
right = begin;
|
237
|
+
}
|
238
|
+
|
239
|
+
return right->index;
|
240
|
+
}
|
@@ -0,0 +1,379 @@
|
|
1
|
+
/*
|
2
|
+
* twemproxy - A fast and lightweight proxy for memcached protocol.
|
3
|
+
* Copyright (C) 2011 Twitter, Inc.
|
4
|
+
*
|
5
|
+
* Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
* you may not use this file except in compliance with the License.
|
7
|
+
* You may obtain a copy of the License at
|
8
|
+
*
|
9
|
+
* http://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
*
|
11
|
+
* Unless required by applicable law or agreed to in writing, software
|
12
|
+
* distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
* See the License for the specific language governing permissions and
|
15
|
+
* limitations under the License.
|
16
|
+
*/
|
17
|
+
|
18
|
+
/*
|
19
|
+
* This Library has been modified from its original form by
|
20
|
+
* Brian Aker (brian@tangent.org)
|
21
|
+
*
|
22
|
+
* See below for original Copyright.
|
23
|
+
*/
|
24
|
+
/* MD5C.C - RSA Data Security, Inc., MD5 message-digest algorithm
|
25
|
+
*
|
26
|
+
* Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All
|
27
|
+
* rights reserved.
|
28
|
+
*
|
29
|
+
* License to copy and use this software is granted provided that it
|
30
|
+
* is identified as the "RSA Data Security, Inc. MD5 Message-Digest
|
31
|
+
* Algorithm" in all material mentioning or referencing this software
|
32
|
+
* or this function.
|
33
|
+
*
|
34
|
+
* License is also granted to make and use derivative works provided
|
35
|
+
* that such works are identified as "derived from the RSA Data
|
36
|
+
* Security, Inc. MD5 Message-Digest Algorithm" in all material
|
37
|
+
* mentioning or referencing the derived work.
|
38
|
+
*
|
39
|
+
* RSA Data Security, Inc. makes no representations concerning either
|
40
|
+
* the merchantability of this software or the suitability of this
|
41
|
+
* software for any particular purpose. It is provided "as is"
|
42
|
+
* without express or implied warranty of any kind.
|
43
|
+
*
|
44
|
+
* These notices must be retained in any copies of any part of this
|
45
|
+
* documentation and/or software.
|
46
|
+
*/
|
47
|
+
|
48
|
+
#include <nc_core.h>
|
49
|
+
|
50
|
+
/* POINTER defines a generic pointer type */
|
51
|
+
typedef unsigned char *POINTER;
|
52
|
+
|
53
|
+
|
54
|
+
/* UINT4 defines a four byte word */
|
55
|
+
typedef unsigned int UINT4;
|
56
|
+
|
57
|
+
|
58
|
+
/* MD5 context. */
|
59
|
+
typedef struct {
|
60
|
+
UINT4 state[4]; /* state (ABCD) */
|
61
|
+
UINT4 count[2]; /* number of bits, modulo 2^64 (lsb first) */
|
62
|
+
unsigned char buffer[64]; /* input buffer */
|
63
|
+
} MD5_CTX;
|
64
|
+
|
65
|
+
static void MD5Init (MD5_CTX *context); /* context */
|
66
|
+
static void MD5Update ( MD5_CTX *context, /* context */
|
67
|
+
const unsigned char *input, /* input block */
|
68
|
+
unsigned int inputLen); /* length of input block */
|
69
|
+
static void MD5Final ( unsigned char digest[16], /* message digest */
|
70
|
+
MD5_CTX *context); /* context */
|
71
|
+
|
72
|
+
/* Constants for MD5Transform routine. */
|
73
|
+
|
74
|
+
#define S11 7
|
75
|
+
#define S12 12
|
76
|
+
#define S13 17
|
77
|
+
#define S14 22
|
78
|
+
#define S21 5
|
79
|
+
#define S22 9
|
80
|
+
#define S23 14
|
81
|
+
#define S24 20
|
82
|
+
#define S31 4
|
83
|
+
#define S32 11
|
84
|
+
#define S33 16
|
85
|
+
#define S34 23
|
86
|
+
#define S41 6
|
87
|
+
#define S42 10
|
88
|
+
#define S43 15
|
89
|
+
#define S44 21
|
90
|
+
|
91
|
+
|
92
|
+
static void MD5Transform (UINT4 state[4],
|
93
|
+
unsigned char block[64]);
|
94
|
+
static void Encode (unsigned char *output,
|
95
|
+
UINT4 *input,
|
96
|
+
unsigned int len);
|
97
|
+
static void Decode(UINT4 *output, unsigned char *input, unsigned int len);
|
98
|
+
|
99
|
+
static unsigned char PADDING[64] = {
|
100
|
+
0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
101
|
+
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
|
102
|
+
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
|
103
|
+
};
|
104
|
+
|
105
|
+
/* F, G, H and I are basic MD5 functions.
|
106
|
+
*/
|
107
|
+
#define F(x, y, z) (((x) & (y)) | ((~x) & (z)))
|
108
|
+
#define G(x, y, z) (((x) & (z)) | ((y) & (~z)))
|
109
|
+
#define H(x, y, z) ((x) ^ (y) ^ (z))
|
110
|
+
#define I(x, y, z) ((y) ^ ((x) | (~z)))
|
111
|
+
|
112
|
+
/* ROTATE_LEFT rotates x left n bits.
|
113
|
+
*/
|
114
|
+
#define ROTATE_LEFT(x, n) (((x) << (n)) | ((x) >> (32-(n))))
|
115
|
+
|
116
|
+
/* FF, GG, HH, and II transformations for rounds 1, 2, 3, and 4.
|
117
|
+
Rotation is separate from addition to prevent recomputation.
|
118
|
+
*/
|
119
|
+
#define FF(a, b, c, d, x, s, ac) { \
|
120
|
+
(a) += F ((b), (c), (d)) + (x) + (UINT4)(ac); \
|
121
|
+
(a) = ROTATE_LEFT ((a), (s)); \
|
122
|
+
(a) += (b); \
|
123
|
+
}
|
124
|
+
#define GG(a, b, c, d, x, s, ac) { \
|
125
|
+
(a) += G ((b), (c), (d)) + (x) + (UINT4)(ac); \
|
126
|
+
(a) = ROTATE_LEFT ((a), (s)); \
|
127
|
+
(a) += (b); \
|
128
|
+
}
|
129
|
+
#define HH(a, b, c, d, x, s, ac) { \
|
130
|
+
(a) += H ((b), (c), (d)) + (x) + (UINT4)(ac); \
|
131
|
+
(a) = ROTATE_LEFT ((a), (s)); \
|
132
|
+
(a) += (b); \
|
133
|
+
}
|
134
|
+
#define II(a, b, c, d, x, s, ac) { \
|
135
|
+
(a) += I ((b), (c), (d)) + (x) + (UINT4)(ac); \
|
136
|
+
(a) = ROTATE_LEFT ((a), (s)); \
|
137
|
+
(a) += (b); \
|
138
|
+
}
|
139
|
+
|
140
|
+
|
141
|
+
/*
|
142
|
+
Just a simple method for getting the signature
|
143
|
+
result must be == 16
|
144
|
+
*/
|
145
|
+
void md5_signature(const unsigned char *key, unsigned int length, unsigned char *result)
|
146
|
+
{
|
147
|
+
MD5_CTX my_md5;
|
148
|
+
|
149
|
+
MD5Init(&my_md5);
|
150
|
+
(void)MD5Update(&my_md5, key, length);
|
151
|
+
MD5Final(result, &my_md5);
|
152
|
+
}
|
153
|
+
|
154
|
+
/* MD5 initialization. Begins an MD5 operation, writing a new context.
|
155
|
+
*/
|
156
|
+
static void MD5Init (MD5_CTX *context) /* context */
|
157
|
+
{
|
158
|
+
context->count[0] = context->count[1] = 0;
|
159
|
+
/* Load magic initialization constants.
|
160
|
+
*/
|
161
|
+
context->state[0] = 0x67452301;
|
162
|
+
context->state[1] = 0xefcdab89;
|
163
|
+
context->state[2] = 0x98badcfe;
|
164
|
+
context->state[3] = 0x10325476;
|
165
|
+
}
|
166
|
+
|
167
|
+
/* MD5 block update operation. Continues an MD5 message-digest
|
168
|
+
operation, processing another message block, and updating the
|
169
|
+
context.
|
170
|
+
*/
|
171
|
+
|
172
|
+
static void MD5Update (
|
173
|
+
MD5_CTX *context, /* context */
|
174
|
+
const unsigned char *input, /* input block */
|
175
|
+
unsigned int inputLen) /* length of input block */
|
176
|
+
{
|
177
|
+
unsigned int i, idx, partLen;
|
178
|
+
|
179
|
+
/* Compute number of bytes mod 64 */
|
180
|
+
idx = (unsigned int)((context->count[0] >> 3) & 0x3F);
|
181
|
+
|
182
|
+
|
183
|
+
/* Update number of bits */
|
184
|
+
if ((context->count[0] += ((UINT4)inputLen << 3))
|
185
|
+
< ((UINT4)inputLen << 3))
|
186
|
+
context->count[1]++;
|
187
|
+
context->count[1] += ((UINT4)inputLen >> 29);
|
188
|
+
|
189
|
+
partLen = 64 - idx;
|
190
|
+
|
191
|
+
/* Transform as many times as possible.
|
192
|
+
*/
|
193
|
+
if (inputLen >= partLen) {
|
194
|
+
memcpy((POINTER)&context->buffer[idx], (POINTER)input, partLen);
|
195
|
+
MD5Transform(context->state, context->buffer);
|
196
|
+
|
197
|
+
for (i = partLen; i + 63 < inputLen; i += 64)
|
198
|
+
MD5Transform (context->state, (unsigned char *)&input[i]);
|
199
|
+
|
200
|
+
idx = 0;
|
201
|
+
}
|
202
|
+
else
|
203
|
+
i = 0;
|
204
|
+
|
205
|
+
/* Buffer remaining input */
|
206
|
+
memcpy((POINTER)&context->buffer[idx], (POINTER)&input[i],
|
207
|
+
inputLen-i);
|
208
|
+
}
|
209
|
+
|
210
|
+
/* MD5 finalization. Ends an MD5 message-digest operation, writing the
|
211
|
+
the message digest and zeroizing the context.
|
212
|
+
*/
|
213
|
+
|
214
|
+
static void MD5Final (
|
215
|
+
unsigned char digest[16], /* message digest */
|
216
|
+
MD5_CTX *context) /* context */
|
217
|
+
{
|
218
|
+
unsigned char bits[8];
|
219
|
+
unsigned int idx, padLen;
|
220
|
+
|
221
|
+
/* Save number of bits */
|
222
|
+
Encode (bits, context->count, 8);
|
223
|
+
|
224
|
+
/* Pad out to 56 mod 64.
|
225
|
+
*/
|
226
|
+
idx = (unsigned int)((context->count[0] >> 3) & 0x3f);
|
227
|
+
padLen = (idx < 56) ? (56 - idx) : (120 - idx);
|
228
|
+
MD5Update (context, PADDING, padLen);
|
229
|
+
|
230
|
+
/* Append length (before padding) */
|
231
|
+
MD5Update (context, bits, 8);
|
232
|
+
|
233
|
+
/* Store state in digest */
|
234
|
+
Encode (digest, context->state, 16);
|
235
|
+
|
236
|
+
/* Zeroize sensitive information.
|
237
|
+
*/
|
238
|
+
memset((POINTER)context, 0, sizeof (*context));
|
239
|
+
}
|
240
|
+
|
241
|
+
/* MD5 basic transformation. Transforms state based on block.
|
242
|
+
*/
|
243
|
+
static void MD5Transform (
|
244
|
+
UINT4 state[4],
|
245
|
+
unsigned char block[64])
|
246
|
+
{
|
247
|
+
UINT4 a = state[0], b = state[1], c = state[2], d = state[3], x[16];
|
248
|
+
|
249
|
+
Decode (x, block, 64);
|
250
|
+
|
251
|
+
/* Round 1 */
|
252
|
+
FF (a, b, c, d, x[ 0], S11, 0xd76aa478); /* 1 */
|
253
|
+
FF (d, a, b, c, x[ 1], S12, 0xe8c7b756); /* 2 */
|
254
|
+
FF (c, d, a, b, x[ 2], S13, 0x242070db); /* 3 */
|
255
|
+
FF (b, c, d, a, x[ 3], S14, 0xc1bdceee); /* 4 */
|
256
|
+
FF (a, b, c, d, x[ 4], S11, 0xf57c0faf); /* 5 */
|
257
|
+
FF (d, a, b, c, x[ 5], S12, 0x4787c62a); /* 6 */
|
258
|
+
FF (c, d, a, b, x[ 6], S13, 0xa8304613); /* 7 */
|
259
|
+
FF (b, c, d, a, x[ 7], S14, 0xfd469501); /* 8 */
|
260
|
+
FF (a, b, c, d, x[ 8], S11, 0x698098d8); /* 9 */
|
261
|
+
FF (d, a, b, c, x[ 9], S12, 0x8b44f7af); /* 10 */
|
262
|
+
FF (c, d, a, b, x[10], S13, 0xffff5bb1); /* 11 */
|
263
|
+
FF (b, c, d, a, x[11], S14, 0x895cd7be); /* 12 */
|
264
|
+
FF (a, b, c, d, x[12], S11, 0x6b901122); /* 13 */
|
265
|
+
FF (d, a, b, c, x[13], S12, 0xfd987193); /* 14 */
|
266
|
+
FF (c, d, a, b, x[14], S13, 0xa679438e); /* 15 */
|
267
|
+
FF (b, c, d, a, x[15], S14, 0x49b40821); /* 16 */
|
268
|
+
|
269
|
+
/* Round 2 */
|
270
|
+
GG (a, b, c, d, x[ 1], S21, 0xf61e2562); /* 17 */
|
271
|
+
GG (d, a, b, c, x[ 6], S22, 0xc040b340); /* 18 */
|
272
|
+
GG (c, d, a, b, x[11], S23, 0x265e5a51); /* 19 */
|
273
|
+
GG (b, c, d, a, x[ 0], S24, 0xe9b6c7aa); /* 20 */
|
274
|
+
GG (a, b, c, d, x[ 5], S21, 0xd62f105d); /* 21 */
|
275
|
+
GG (d, a, b, c, x[10], S22, 0x2441453); /* 22 */
|
276
|
+
GG (c, d, a, b, x[15], S23, 0xd8a1e681); /* 23 */
|
277
|
+
GG (b, c, d, a, x[ 4], S24, 0xe7d3fbc8); /* 24 */
|
278
|
+
GG (a, b, c, d, x[ 9], S21, 0x21e1cde6); /* 25 */
|
279
|
+
GG (d, a, b, c, x[14], S22, 0xc33707d6); /* 26 */
|
280
|
+
GG (c, d, a, b, x[ 3], S23, 0xf4d50d87); /* 27 */
|
281
|
+
GG (b, c, d, a, x[ 8], S24, 0x455a14ed); /* 28 */
|
282
|
+
GG (a, b, c, d, x[13], S21, 0xa9e3e905); /* 29 */
|
283
|
+
GG (d, a, b, c, x[ 2], S22, 0xfcefa3f8); /* 30 */
|
284
|
+
GG (c, d, a, b, x[ 7], S23, 0x676f02d9); /* 31 */
|
285
|
+
GG (b, c, d, a, x[12], S24, 0x8d2a4c8a); /* 32 */
|
286
|
+
|
287
|
+
/* Round 3 */
|
288
|
+
HH (a, b, c, d, x[ 5], S31, 0xfffa3942); /* 33 */
|
289
|
+
HH (d, a, b, c, x[ 8], S32, 0x8771f681); /* 34 */
|
290
|
+
HH (c, d, a, b, x[11], S33, 0x6d9d6122); /* 35 */
|
291
|
+
HH (b, c, d, a, x[14], S34, 0xfde5380c); /* 36 */
|
292
|
+
HH (a, b, c, d, x[ 1], S31, 0xa4beea44); /* 37 */
|
293
|
+
HH (d, a, b, c, x[ 4], S32, 0x4bdecfa9); /* 38 */
|
294
|
+
HH (c, d, a, b, x[ 7], S33, 0xf6bb4b60); /* 39 */
|
295
|
+
HH (b, c, d, a, x[10], S34, 0xbebfbc70); /* 40 */
|
296
|
+
HH (a, b, c, d, x[13], S31, 0x289b7ec6); /* 41 */
|
297
|
+
HH (d, a, b, c, x[ 0], S32, 0xeaa127fa); /* 42 */
|
298
|
+
HH (c, d, a, b, x[ 3], S33, 0xd4ef3085); /* 43 */
|
299
|
+
HH (b, c, d, a, x[ 6], S34, 0x4881d05); /* 44 */
|
300
|
+
HH (a, b, c, d, x[ 9], S31, 0xd9d4d039); /* 45 */
|
301
|
+
HH (d, a, b, c, x[12], S32, 0xe6db99e5); /* 46 */
|
302
|
+
HH (c, d, a, b, x[15], S33, 0x1fa27cf8); /* 47 */
|
303
|
+
HH (b, c, d, a, x[ 2], S34, 0xc4ac5665); /* 48 */
|
304
|
+
|
305
|
+
/* Round 4 */
|
306
|
+
II (a, b, c, d, x[ 0], S41, 0xf4292244); /* 49 */
|
307
|
+
II (d, a, b, c, x[ 7], S42, 0x432aff97); /* 50 */
|
308
|
+
II (c, d, a, b, x[14], S43, 0xab9423a7); /* 51 */
|
309
|
+
II (b, c, d, a, x[ 5], S44, 0xfc93a039); /* 52 */
|
310
|
+
II (a, b, c, d, x[12], S41, 0x655b59c3); /* 53 */
|
311
|
+
II (d, a, b, c, x[ 3], S42, 0x8f0ccc92); /* 54 */
|
312
|
+
II (c, d, a, b, x[10], S43, 0xffeff47d); /* 55 */
|
313
|
+
II (b, c, d, a, x[ 1], S44, 0x85845dd1); /* 56 */
|
314
|
+
II (a, b, c, d, x[ 8], S41, 0x6fa87e4f); /* 57 */
|
315
|
+
II (d, a, b, c, x[15], S42, 0xfe2ce6e0); /* 58 */
|
316
|
+
II (c, d, a, b, x[ 6], S43, 0xa3014314); /* 59 */
|
317
|
+
II (b, c, d, a, x[13], S44, 0x4e0811a1); /* 60 */
|
318
|
+
II (a, b, c, d, x[ 4], S41, 0xf7537e82); /* 61 */
|
319
|
+
II (d, a, b, c, x[11], S42, 0xbd3af235); /* 62 */
|
320
|
+
II (c, d, a, b, x[ 2], S43, 0x2ad7d2bb); /* 63 */
|
321
|
+
II (b, c, d, a, x[ 9], S44, 0xeb86d391); /* 64 */
|
322
|
+
|
323
|
+
|
324
|
+
state[0] += a;
|
325
|
+
state[1] += b;
|
326
|
+
state[2] += c;
|
327
|
+
state[3] += d;
|
328
|
+
|
329
|
+
/* Zeroize sensitive information.
|
330
|
+
*/
|
331
|
+
memset((POINTER)x, 0, sizeof (x));
|
332
|
+
}
|
333
|
+
|
334
|
+
/* Encodes input (UINT4) into output (unsigned char). Assumes len is
|
335
|
+
a multiple of 4.
|
336
|
+
*/
|
337
|
+
static void Encode (
|
338
|
+
unsigned char *output,
|
339
|
+
UINT4 *input,
|
340
|
+
unsigned int len)
|
341
|
+
{
|
342
|
+
unsigned int i, j;
|
343
|
+
|
344
|
+
for (i = 0, j = 0; j < len; i++, j += 4) {
|
345
|
+
output[j] = (unsigned char)(input[i] & 0xff);
|
346
|
+
output[j+1] = (unsigned char)((input[i] >> 8) & 0xff);
|
347
|
+
output[j+2] = (unsigned char)((input[i] >> 16) & 0xff);
|
348
|
+
output[j+3] = (unsigned char)((input[i] >> 24) & 0xff);
|
349
|
+
}
|
350
|
+
}
|
351
|
+
|
352
|
+
|
353
|
+
/* Decodes input (unsigned char) into output (UINT4). Assumes len is
|
354
|
+
a multiple of 4.
|
355
|
+
*/
|
356
|
+
static void Decode (
|
357
|
+
UINT4 *output,
|
358
|
+
unsigned char *input,
|
359
|
+
unsigned int len)
|
360
|
+
{
|
361
|
+
unsigned int i, j;
|
362
|
+
|
363
|
+
for (i = 0, j = 0; j < len; i++, j += 4)
|
364
|
+
output[i] = ((UINT4)input[j]) | (((UINT4)input[j+1]) << 8) |
|
365
|
+
(((UINT4)input[j+2]) << 16) | (((UINT4)input[j+3]) << 24);
|
366
|
+
}
|
367
|
+
|
368
|
+
uint32_t
|
369
|
+
hash_md5(const char *key, size_t key_length)
|
370
|
+
{
|
371
|
+
unsigned char results[16];
|
372
|
+
|
373
|
+
md5_signature((unsigned char*)key, (unsigned int)key_length, results);
|
374
|
+
|
375
|
+
return ((uint32_t) (results[3] & 0xFF) << 24)
|
376
|
+
| ((uint32_t) (results[2] & 0xFF) << 16)
|
377
|
+
| ((uint32_t) (results[1] & 0xFF) << 8)
|
378
|
+
| (results[0] & 0xFF);
|
379
|
+
}
|