1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313
// SPDX-License-Identifier: MIT
// SPDX-FileCopyrightText: Copyright (C) 2023 Tsukasa OI <floss_ssdeep@irq.a4lg.com>.
//! # ffuzzy: ssdeep-compatible Fuzzy Hashing Library in pure Rust
//!
//! [ssdeep](https://ssdeep-project.github.io/ssdeep/) is a program for computing
//! context triggered piecewise hashes (CTPH). Also called fuzzy hashes, CTPH
//! can match inputs that have homologies. Such inputs have sequences of identical
//! bytes in the same order, although bytes in between these sequences may be
//! different in both content and length.
//!
//! This crate is the port of ssdeep (libfuzzy) to the Rust language, created
//! by a ssdeep maintainer, Tsukasa OI.
//!
//! This crate is designed to be a replacement to the original ssdeep library,
//! libfuzzy. So, it implements some "easy" functions for daily use cases.
//!
//! Some interface originates from [ffuzzy++](https://github.com/a4lg/ffuzzypp),
//! a C++ port of libfuzzy written by Tsukasa OI with additional features. They
//! enabled more efficient handling of fuzzy hashes on large scale clustering.
//!
//! If you understand both [the property of fuzzy hashes](FuzzyHashData) and
//! this crate well, you can cluster the fuzzy hashes over 5 times faster than
//! libfuzzy.
//!
//!
//! ## License (GNU GPL v2 or later)
//!
//! This crate (as a whole library) is licensed under the terms of the GNU General
//! Public License as published by the Free Software Foundation; either version 2
//! of the License, or (at your option) any later version.
//!
//! However, some portions are licensed under more permissive licenses (see the
//! source code for details).
//!
//!
//! ## Performance
//!
//! While ffuzzy++ performed well in large scale clustering, some use cases were
//! slower than libfuzzy. In contrast, this crate expects (at least) comparable
//! performance to libfuzzy even if only "easy" functions are used and no
//! *unsafe* features are enabled.
//!
//! If we unlock the performance by the `unsafe` feature, it's generally faster than
//! libfuzzy and even comparable to ffuzzy++ (depends on various conditions, though).
//! `*_unchecked` functions will be useful when you use this crate as a part of
//! specialized large scale clustering applications.
//!
//!
//! ## Features New in this Crate
//!
//! ### Dual fuzzy hash object
//!
//! While the fuzzy hash generator normally produces fuzzy hashes without
//! normalization but comparing two fuzzy hashes requires two normalized ones.
//! It enforced users to preserve both normalized and raw fuzzy hashes to collerate
//! the original (raw) fuzzy hash and the comparison-friendly (normalized) one.
//!
//! In this crate, [`DualFuzzyHash`] and [`LongDualFuzzyHash`] allows storing both forms
//! efficiently, achieving the compression ratio of about 5 / 8.
//!
//!
//! ## Usage: Basic
//!
//! ### Hashing a File
//!
//! ```rust
//! # #[cfg(not(all(feature = "std", feature = "easy-functions")))]
//! # fn main() {}
//! // Required Features: "std" and "easy-functions"
//! # #[cfg(all(feature = "std", feature = "easy-functions"))]
//! fn main() -> Result<(), ssdeep::GeneratorOrIOError> {
//! let fuzzy_hash = ssdeep::hash_file("data/examples/hello.txt")?;
//! let fuzzy_hash_str = fuzzy_hash.to_string();
//! assert_eq!(fuzzy_hash_str, "3:aaX8v:aV");
//! Ok(())
//! }
//! ```
//!
//! ### Comparing Two Fuzzy Hashes
//!
//! ```rust
//! // Required Feature: "easy-functions"
//! # #[cfg(feature = "easy-functions")]
//! # {
//! let score = ssdeep::compare(
//! "6:3ll7QzDkmJmMHkQoO/llSZEnEuLszmbMAWn:VqDk5QtLbW",
//! "6:3ll7QzDkmQjmMoDHglHOxPWT0lT0lT0lB:VqDk+n"
//! ).unwrap();
//! assert_eq!(score, 46);
//! # }
//! ```
//!
//! ## Usage: Advanced
//!
//! ### Hashing a Buffer
//!
//! ```rust
//! use ssdeep::{Generator, RawFuzzyHash};
//!
//! let mut generator = Generator::new();
//! let buf: &[u8] = b"Hello, World!";
//!
//! // Optional but supplying the *total* input size first improves the performance.
//! // `buf.len` for `update` and `1` for `update_by_iter` (see below).
//! generator.set_fixed_input_size_in_usize(buf.len() + 1).unwrap();
//!
//! // Update the internal state of the generator.
//! // Of course, you can call `update`-family functions multiple times.
//! generator.update(buf);
//! generator.update_by_iter(core::iter::repeat(b'\n').take(1)); // append one '\n'
//!
//! // Retrieve the fuzzy hash and convert to the string.
//! let hash: RawFuzzyHash = generator.finalize().unwrap();
//! assert_eq!(hash.to_string(), "3:aaX8v:aV");
//! ```
//!
//! ### Comparing Fuzzy Hashes
//!
//! ```rust
//! use core::str::FromStr;
//! use ssdeep::{FuzzyHash, FuzzyHashCompareTarget};
//!
//! // Those fuzzy hash strings are "normalized" so that easier to compare.
//! let str1 = "12288:+ySwl5P+C5IxJ845HYV5sxOH/cccccccei:+Klhav84a5sxJ";
//! let str2 = "12288:+yUwldx+C5IxJ845HYV5sxOH/cccccccex:+glvav84a5sxK";
//! let hash1: FuzzyHash = FuzzyHash::from_str(str1).unwrap();
//! let hash2: FuzzyHash = FuzzyHash::from_str(str2).unwrap();
//!
//! // Note that converting the (normalized) fuzzy hash object back to the string
//! // may not preserve the original string. To preserve the original fuzzy hash
//! // string too, consider using dual fuzzy hashes (such like DualFuzzyHash) that
//! // preserves the original string in the compressed format.
//! // * str1: "12288:+ySwl5P+C5IxJ845HYV5sxOH/cccccccei:+Klhav84a5sxJ"
//! // * hash1: "12288:+ySwl5P+C5IxJ845HYV5sxOH/cccei:+Klhav84a5sxJ"
//! assert_ne!(hash1.to_string(), str1);
//!
//! // If we have number of fuzzy hashes and a hash is compared more than once,
//! // storing those hashes as FuzzyHash objects is faster.
//! assert_eq!(hash1.compare(&hash2), 88);
//!
//! // But there's another way of comparison.
//! // If you compare "a fuzzy hash" with "other many fuzzy hashes", this method
//! // (using FuzzyHashCompareTarget as "a fuzzy hash") is much, much faster.
//! let mut target: FuzzyHashCompareTarget = FuzzyHashCompareTarget::new();
//! target.init_from(&hash1);
//! assert_eq!(target.compare(&hash2), 88);
//! ```
//!
//!
//! ## Features
//!
//! * `alloc`, `std` (default)
//! This crate supports `no_std` (by disabling both of them) and
//! `alloc` and `std` are built on the minimum `no_std` implementation.
//! Those features enable implementations that depend on `alloc` and `std`,
//! respectively.
//! * `easy-functions` (default)
//! It provides easy-to-use high-level functions.
//! * `unsafe` (**fast but unsafe**)
//! This crate is optionally unsafe. By default, this crate is built with 100%
//! safe Rust (*this default might change before version 1.0* but safe Rust code
//! will be preserved). Enabling this feature enables unsafe Rust code
//! (although unsafe/safe code share the most using macros).
//! * `nightly`
//! This feature enables some features specific to the Nightly Rust. Note that
//! this feature heavily depends on the version of `rustc` and should not be
//! considered stable (don't expect SemVer-compatible semantics).
//! * `opt-reduce-fnv-table` (not recommended to enable this)
//! ssdeep uses partial (the lowest 6 bits of) FNV hash. While default table
//! lookup instead of full FNV hash computation is faster on most cases, it will
//! not affect the performance much on some configurations.
//! Enabling this option will turn off using precomputed FNV hash table (4KiB).
//! Note that it's not recommended to enable this feature for memory footprint
//! since a generator is about 2KiB in size and a temporary object used for
//! fuzzy hash comparison is about 1KiB in size (so that reducing 4KiB does not
//! benefit well).
//! * `tests-slow` and `tests-very-slow`
//! They will enable "slow" (may take seconds) and "very slow" (may take
//! minutes) tests, respectively.
//!
//!
//! ## History and Main Contributors of ssdeep
//!
//! Andrew Tridgell made the program called
//! ["spamsum"](https://www.samba.org/ftp/unpacked/junkcode/spamsum/)
//! to detect a mail similar to a known spam.
//!
//! Jesse Kornblum authored the program
//! ["ssdeep"](https://ssdeep-project.github.io/ssdeep/) based on spamsum by adding
//! solid engine to Andrew's work.
//! Jesse continued working to improve ssdeep for years.
//!
//! Helmut Grohne authored his re-written and optimized, streaming fuzzy hashing
//! engine that enabled multi-threaded runs and a capability to process files
//! without seeking.
//!
//! Tsukasa OI, first helped resolving the license issue on the edit distance code
//! (which was not open source), further optimized the engine and introduced
//! bit-parallel string processing functions. He wrote ssdeep compatible engines
//! multiple times, including [ffuzzy++](https://github.com/a4lg/ffuzzypp).
//!
//!
//! ## References
//!
//! * Jesse Kornblum (2006)
//! "Identifying almost identical files using context triggered piecewise hashing"
//! ([doi:10.1016/j.diin.2006.06.015](https://doi.org/10.1016/j.diin.2006.06.015))
//!
//!
//! ## For Developers
//!
//! * [Implementation Notes](crate::internals::impl_notes)
// no_std
#![cfg_attr(not(feature = "std"), no_std)]
// Regular nightly features
#![cfg_attr(feature = "nightly", feature(doc_cfg))]
#![cfg_attr(feature = "nightly", feature(doc_auto_cfg))]
#![cfg_attr(feature = "nightly", feature(core_intrinsics))]
#![cfg_attr(feature = "nightly", feature(no_coverage))]
// int_log feature depending on ilog2 availability
#![cfg_attr(ffuzzy_ilog2 = "unstable", feature(int_log))]
// unsafe code is *only* allowed on either "unsafe" feature or tests
#![cfg_attr(not(any(feature = "unsafe", test)), forbid(unsafe_code))]
// Non-test code requires documents
#![cfg_attr(not(test), warn(missing_docs))]
// Unless in maintainance mode, allow unknown lints.
#![cfg_attr(not(feature = "maint-lints"), allow(unknown_lints))]
#[cfg(feature = "alloc")]
extern crate alloc;
#[cfg(test)]
extern crate rand;
#[cfg(test)]
extern crate rand_xoshiro;
mod base64;
mod compare;
mod compare_easy;
mod generate;
mod generate_easy;
mod generate_easy_std;
mod hash;
mod hash_dual;
mod intrinsics;
mod macros;
mod test_utils;
mod utils;
#[cfg(doc)]
#[allow(missing_docs)]
pub mod internals;
pub use compare::FuzzyHashCompareTarget;
#[cfg(feature = "easy-functions")]
pub use compare_easy::{compare, ParseErrorEither, ParseErrorSide};
pub use generate::{Generator, GeneratorError};
#[cfg(feature = "easy-functions")]
pub use generate_easy::hash_buf;
#[cfg(all(feature = "easy-functions", feature = "std"))]
pub use generate_easy_std::{hash_file, hash_stream, GeneratorOrIOError};
pub use hash::{
FuzzyHashData,
FuzzyHash, RawFuzzyHash, LongFuzzyHash, LongRawFuzzyHash,
FuzzyHashOperationError
};
pub use hash::parser_state::{
ParseError, ParseErrorInfo, ParseErrorKind, ParseErrorOrigin
};
pub use hash::block::{
BlockSize, BlockSizeRelation, BlockHash
};
pub use hash_dual::{
FuzzyHashDualData,
DualFuzzyHash, LongDualFuzzyHash
};
/// Module containing internal hash functions.
pub mod internal_hashes {
pub use super::generate::{PartialFNVHash, RollingHash};
}
/// Module containing internal efficient block hash implementation.
pub mod internal_comparison {
pub use super::compare::BlockHashPositionArray;
}
/// Module containing certain constraints about fuzzy hash data.
pub mod constraints {
pub use super::hash::block::{
BlockHashSize, ConstrainedBlockHashSize,
BlockHashSizes, ConstrainedBlockHashSizes
};
}
/// Constant assertions related to the base requirements.
#[doc(hidden)]
mod const_asserts {
use static_assertions::const_assert;
// We expect that usize is at least 8 bits in width.
// For buffer-related operations in this crate except generator_easy,
// this should be enough. In reality, generator_easy would require
// usize of >= 16 bits and in fact some structs in this crate
// exceeds 256 bytes. Some tests even require that usize is at least
// 32 bits.
const_assert!(usize::BITS >= 8);
}