diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-28 09:34:30 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-28 09:34:30 +0000 |
commit | 4fc2f55f761d71aae1f145d5aa94ba929cc39676 (patch) | |
tree | 5c1e1db3b46dd4edbe11f612d93cb94b96891ce3 /misc.cc | |
parent | Initial commit. (diff) | |
download | dnsdist-4fc2f55f761d71aae1f145d5aa94ba929cc39676.tar.xz dnsdist-4fc2f55f761d71aae1f145d5aa94ba929cc39676.zip |
Adding upstream version 1.7.3.upstream/1.7.3upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'misc.cc')
-rw-r--r-- | misc.cc | 1752 |
1 files changed, 1752 insertions, 0 deletions
@@ -0,0 +1,1752 @@ +/* + * This file is part of PowerDNS or dnsdist. + * Copyright -- PowerDNS.COM B.V. and its contributors + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of version 2 of the GNU General Public License as + * published by the Free Software Foundation. + * + * In addition, for the avoidance of any doubt, permission is granted to + * link this program with OpenSSL and to (re)distribute the binaries + * produced as the result of such linking. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; if not, write to the Free Software + * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. + */ +#ifdef HAVE_CONFIG_H +#include "config.h" +#endif +#include <sys/param.h> +#include <sys/socket.h> +#include <fcntl.h> +#include <netdb.h> +#include <sys/time.h> +#include <time.h> +#include <sys/resource.h> +#include <netinet/in.h> +#include <sys/un.h> +#include <unistd.h> +#include <fstream> +#include "misc.hh" +#include <vector> +#include <sstream> +#include <errno.h> +#include <cstring> +#include <iostream> +#include <sys/types.h> +#include <dirent.h> +#include <algorithm> +#include <poll.h> +#include <iomanip> +#include <netinet/tcp.h> +#include <string.h> +#include <stdlib.h> +#include <stdio.h> +#include "pdnsexception.hh" +#include <sys/types.h> +#include <boost/algorithm/string.hpp> +#include "iputils.hh" +#include "dnsparser.hh" +#include <sys/types.h> +#include <pwd.h> +#include <grp.h> +#include <limits.h> +#ifdef __FreeBSD__ +# include <pthread_np.h> +#endif +#ifdef __NetBSD__ +# include <pthread.h> +# include <sched.h> +#endif + +size_t writen2(int fd, const void *buf, size_t count) +{ + const char *ptr = reinterpret_cast<const char*>(buf); + const char *eptr = ptr + count; + + ssize_t res; + while(ptr != eptr) { + res = ::write(fd, ptr, eptr - ptr); + if(res < 0) { + if (errno == EAGAIN) + throw std::runtime_error("used writen2 on non-blocking socket, got EAGAIN"); + else + unixDie("failed in writen2"); + } + else if (res == 0) + throw std::runtime_error("could not write all bytes, got eof in writen2"); + + ptr += (size_t) res; + } + + return count; +} + +size_t readn2(int fd, void* buffer, size_t len) +{ + size_t pos=0; + ssize_t res; + for(;;) { + res = read(fd, (char*)buffer + pos, len - pos); + if(res == 0) + throw runtime_error("EOF while reading message"); + if(res < 0) { + if (errno == EAGAIN) + throw std::runtime_error("used readn2 on non-blocking socket, got EAGAIN"); + else + unixDie("failed in readn2"); + } + + pos+=(size_t)res; + if(pos == len) + break; + } + return len; +} + +size_t readn2WithTimeout(int fd, void* buffer, size_t len, const struct timeval& idleTimeout, const struct timeval& totalTimeout, bool allowIncomplete) +{ + size_t pos = 0; + struct timeval start{0,0}; + struct timeval remainingTime = totalTimeout; + if (totalTimeout.tv_sec != 0 || totalTimeout.tv_usec != 0) { + gettimeofday(&start, nullptr); + } + + do { + ssize_t got = read(fd, (char *)buffer + pos, len - pos); + if (got > 0) { + pos += (size_t) got; + if (allowIncomplete) { + break; + } + } + else if (got == 0) { + throw runtime_error("EOF while reading message"); + } + else { + if (errno == EAGAIN) { + struct timeval w = ((totalTimeout.tv_sec == 0 && totalTimeout.tv_usec == 0) || idleTimeout <= remainingTime) ? idleTimeout : remainingTime; + int res = waitForData(fd, w.tv_sec, w.tv_usec); + if (res > 0) { + /* there is data available */ + } + else if (res == 0) { + throw runtime_error("Timeout while waiting for data to read"); + } else { + throw runtime_error("Error while waiting for data to read"); + } + } + else { + unixDie("failed in readn2WithTimeout"); + } + } + + if (totalTimeout.tv_sec != 0 || totalTimeout.tv_usec != 0) { + struct timeval now; + gettimeofday(&now, nullptr); + struct timeval elapsed = now - start; + if (remainingTime < elapsed) { + throw runtime_error("Timeout while reading data"); + } + start = now; + remainingTime = remainingTime - elapsed; + } + } + while (pos < len); + + return len; +} + +size_t writen2WithTimeout(int fd, const void * buffer, size_t len, const struct timeval& timeout) +{ + size_t pos = 0; + do { + ssize_t written = write(fd, reinterpret_cast<const char *>(buffer) + pos, len - pos); + + if (written > 0) { + pos += (size_t) written; + } + else if (written == 0) + throw runtime_error("EOF while writing message"); + else { + if (errno == EAGAIN) { + int res = waitForRWData(fd, false, timeout.tv_sec, timeout.tv_usec); + if (res > 0) { + /* there is room available */ + } + else if (res == 0) { + throw runtime_error("Timeout while waiting to write data"); + } else { + throw runtime_error("Error while waiting for room to write data"); + } + } + else { + unixDie("failed in write2WithTimeout"); + } + } + } + while (pos < len); + + return len; +} + +string nowTime() +{ + time_t now = time(nullptr); + struct tm tm; + localtime_r(&now, &tm); + char buffer[30]; + // YYYY-mm-dd HH:MM:SS TZOFF + strftime(buffer, sizeof(buffer), "%F %T %z", &tm); + buffer[sizeof(buffer)-1] = '\0'; + return string(buffer); +} + +uint16_t getShort(const unsigned char *p) +{ + return p[0] * 256 + p[1]; +} + + +uint16_t getShort(const char *p) +{ + return getShort((const unsigned char *)p); +} + +uint32_t getLong(const unsigned char* p) +{ + return (p[0]<<24) + (p[1]<<16) + (p[2]<<8) + p[3]; +} + +uint32_t getLong(const char* p) +{ + return getLong(reinterpret_cast<const unsigned char *>(p)); +} + +static bool ciEqual(const string& a, const string& b) +{ + if(a.size()!=b.size()) + return false; + + string::size_type pos=0, epos=a.size(); + for(;pos < epos; ++pos) + if(dns_tolower(a[pos])!=dns_tolower(b[pos])) + return false; + return true; +} + +/** does domain end on suffix? Is smart about "wwwds9a.nl" "ds9a.nl" not matching */ +static bool endsOn(const string &domain, const string &suffix) +{ + if( suffix.empty() || ciEqual(domain, suffix) ) + return true; + + if(domain.size()<=suffix.size()) + return false; + + string::size_type dpos=domain.size()-suffix.size()-1, spos=0; + + if(domain[dpos++]!='.') + return false; + + for(; dpos < domain.size(); ++dpos, ++spos) + if(dns_tolower(domain[dpos]) != dns_tolower(suffix[spos])) + return false; + + return true; +} + +/** strips a domain suffix from a domain, returns true if it stripped */ +bool stripDomainSuffix(string *qname, const string &domain) +{ + if(!endsOn(*qname, domain)) + return false; + + if(toLower(*qname)==toLower(domain)) + *qname="@"; + else { + if((*qname)[qname->size()-domain.size()-1]!='.') + return false; + + qname->resize(qname->size()-domain.size()-1); + } + return true; +} + +static void parseService4(const string &descr, ServiceTuple &st) +{ + vector<string>parts; + stringtok(parts,descr,":"); + if(parts.empty()) + throw PDNSException("Unable to parse '"+descr+"' as a service"); + st.host=parts[0]; + if(parts.size()>1) + st.port=pdns_stou(parts[1]); +} + +static void parseService6(const string &descr, ServiceTuple &st) +{ + string::size_type pos=descr.find(']'); + if(pos == string::npos) + throw PDNSException("Unable to parse '"+descr+"' as an IPv6 service"); + + st.host=descr.substr(1, pos-1); + if(pos + 2 < descr.length()) + st.port=pdns_stou(descr.substr(pos+2)); +} + + +void parseService(const string &descr, ServiceTuple &st) +{ + if(descr.empty()) + throw PDNSException("Unable to parse '"+descr+"' as a service"); + + vector<string> parts; + stringtok(parts, descr, ":"); + + if(descr[0]=='[') { + parseService6(descr, st); + } + else if(descr[0]==':' || parts.size() > 2 || descr.find("::") != string::npos) { + st.host=descr; + } + else { + parseService4(descr, st); + } +} + +// returns -1 in case if error, 0 if no data is available, 1 if there is. In the first two cases, errno is set +int waitForData(int fd, int seconds, int useconds) +{ + return waitForRWData(fd, true, seconds, useconds); +} + +int waitForRWData(int fd, bool waitForRead, int seconds, int useconds, bool* error, bool* disconnected) +{ + int ret; + + struct pollfd pfd; + memset(&pfd, 0, sizeof(pfd)); + pfd.fd = fd; + + if(waitForRead) + pfd.events=POLLIN; + else + pfd.events=POLLOUT; + + ret = poll(&pfd, 1, seconds * 1000 + useconds/1000); + if (ret > 0) { + if (error && (pfd.revents & POLLERR)) { + *error = true; + } + if (disconnected && (pfd.revents & POLLHUP)) { + *disconnected = true; + } + } + + return ret; +} + +// returns -1 in case of error, 0 if no data is available, 1 if there is. In the first two cases, errno is set +int waitForMultiData(const set<int>& fds, const int seconds, const int useconds, int* fdOut) { + set<int> realFDs; + for (const auto& fd : fds) { + if (fd >= 0 && realFDs.count(fd) == 0) { + realFDs.insert(fd); + } + } + + std::vector<struct pollfd> pfds(realFDs.size()); + memset(pfds.data(), 0, realFDs.size()*sizeof(struct pollfd)); + int ctr = 0; + for (const auto& fd : realFDs) { + pfds[ctr].fd = fd; + pfds[ctr].events = POLLIN; + ctr++; + } + + int ret; + if(seconds >= 0) + ret = poll(pfds.data(), realFDs.size(), seconds * 1000 + useconds/1000); + else + ret = poll(pfds.data(), realFDs.size(), -1); + if(ret <= 0) + return ret; + + set<int> pollinFDs; + for (const auto& pfd : pfds) { + if (pfd.revents & POLLIN) { + pollinFDs.insert(pfd.fd); + } + } + set<int>::const_iterator it(pollinFDs.begin()); + advance(it, random() % pollinFDs.size()); + *fdOut = *it; + return 1; +} + +// returns -1 in case of error, 0 if no data is available, 1 if there is. In the first two cases, errno is set +int waitFor2Data(int fd1, int fd2, int seconds, int useconds, int*fd) +{ + int ret; + + struct pollfd pfds[2]; + memset(&pfds[0], 0, 2*sizeof(struct pollfd)); + pfds[0].fd = fd1; + pfds[1].fd = fd2; + + pfds[0].events= pfds[1].events = POLLIN; + + int nsocks = 1 + (fd2 >= 0); // fd2 can optionally be -1 + + if(seconds >= 0) + ret = poll(pfds, nsocks, seconds * 1000 + useconds/1000); + else + ret = poll(pfds, nsocks, -1); + if(!ret || ret < 0) + return ret; + + if((pfds[0].revents & POLLIN) && !(pfds[1].revents & POLLIN)) + *fd = pfds[0].fd; + else if((pfds[1].revents & POLLIN) && !(pfds[0].revents & POLLIN)) + *fd = pfds[1].fd; + else if(ret == 2) { + *fd = pfds[random()%2].fd; + } + else + *fd = -1; // should never happen + + return 1; +} + + +string humanDuration(time_t passed) +{ + ostringstream ret; + if(passed<60) + ret<<passed<<" seconds"; + else if(passed<3600) + ret<<std::setprecision(2)<<passed/60.0<<" minutes"; + else if(passed<86400) + ret<<std::setprecision(3)<<passed/3600.0<<" hours"; + else if(passed<(86400*30.41)) + ret<<std::setprecision(3)<<passed/86400.0<<" days"; + else + ret<<std::setprecision(3)<<passed/(86400*30.41)<<" months"; + + return ret.str(); +} + +const string unquotify(const string &item) +{ + if(item.size()<2) + return item; + + string::size_type bpos=0, epos=item.size(); + + if(item[0]=='"') + bpos=1; + + if(item[epos-1]=='"') + epos-=1; + + return item.substr(bpos,epos-bpos); +} + +void stripLine(string &line) +{ + string::size_type pos=line.find_first_of("\r\n"); + if(pos!=string::npos) { + line.resize(pos); + } +} + +string urlEncode(const string &text) +{ + string ret; + for(char i : text) + if(i==' ')ret.append("%20"); + else ret.append(1,i); + return ret; +} + +string getHostname() +{ +#ifndef MAXHOSTNAMELEN +#define MAXHOSTNAMELEN 255 +#endif + + char tmp[MAXHOSTNAMELEN]; + if(gethostname(tmp, MAXHOSTNAMELEN)) + return "UNKNOWN"; + + return string(tmp); +} + +string itoa(int i) +{ + ostringstream o; + o<<i; + return o.str(); +} + +string uitoa(unsigned int i) // MSVC 6 doesn't grok overloading (un)signed +{ + ostringstream o; + o<<i; + return o.str(); +} + +string bitFlip(const string &str) +{ + string::size_type pos=0, epos=str.size(); + string ret; + ret.reserve(epos); + for(;pos < epos; ++pos) + ret.append(1, ~str[pos]); + return ret; +} + +string stringerror(int err) +{ + return strerror(err); +} + +string stringerror() +{ + return strerror(errno); +} + +void cleanSlashes(string &str) +{ + string::const_iterator i; + string out; + for(i=str.begin();i!=str.end();++i) { + if(*i=='/' && i!=str.begin() && *(i-1)=='/') + continue; + out.append(1,*i); + } + str=out; +} + + +bool IpToU32(const string &str, uint32_t *ip) +{ + if(str.empty()) { + *ip=0; + return true; + } + + struct in_addr inp; + if(inet_aton(str.c_str(), &inp)) { + *ip=inp.s_addr; + return true; + } + return false; +} + +string U32ToIP(uint32_t val) +{ + char tmp[17]; + snprintf(tmp, sizeof(tmp), "%u.%u.%u.%u", + (val >> 24)&0xff, + (val >> 16)&0xff, + (val >> 8)&0xff, + (val )&0xff); + return string(tmp); +} + + +string makeHexDump(const string& str) +{ + char tmp[5]; + string ret; + ret.reserve((int)(str.size()*2.2)); + + for(char n : str) { + snprintf(tmp, sizeof(tmp), "%02x ", (unsigned char)n); + ret+=tmp; + } + return ret; +} + +string makeBytesFromHex(const string &in) { + if (in.size() % 2 != 0) { + throw std::range_error("odd number of bytes in hex string"); + } + string ret; + ret.reserve(in.size()); + unsigned int num; + for (size_t i = 0; i < in.size(); i+=2) { + string numStr = in.substr(i, 2); + num = 0; + sscanf(numStr.c_str(), "%02x", &num); + ret.push_back((uint8_t)num); + } + return ret; +} + +void normalizeTV(struct timeval& tv) +{ + if(tv.tv_usec > 1000000) { + ++tv.tv_sec; + tv.tv_usec-=1000000; + } + else if(tv.tv_usec < 0) { + --tv.tv_sec; + tv.tv_usec+=1000000; + } +} + +const struct timeval operator+(const struct timeval& lhs, const struct timeval& rhs) +{ + struct timeval ret; + ret.tv_sec=lhs.tv_sec + rhs.tv_sec; + ret.tv_usec=lhs.tv_usec + rhs.tv_usec; + normalizeTV(ret); + return ret; +} + +const struct timeval operator-(const struct timeval& lhs, const struct timeval& rhs) +{ + struct timeval ret; + ret.tv_sec=lhs.tv_sec - rhs.tv_sec; + ret.tv_usec=lhs.tv_usec - rhs.tv_usec; + normalizeTV(ret); + return ret; +} + +pair<string, string> splitField(const string& inp, char sepa) +{ + pair<string, string> ret; + string::size_type cpos=inp.find(sepa); + if(cpos==string::npos) + ret.first=inp; + else { + ret.first=inp.substr(0, cpos); + ret.second=inp.substr(cpos+1); + } + return ret; +} + +int logFacilityToLOG(unsigned int facility) +{ + switch(facility) { + case 0: + return LOG_LOCAL0; + case 1: + return(LOG_LOCAL1); + case 2: + return(LOG_LOCAL2); + case 3: + return(LOG_LOCAL3); + case 4: + return(LOG_LOCAL4); + case 5: + return(LOG_LOCAL5); + case 6: + return(LOG_LOCAL6); + case 7: + return(LOG_LOCAL7); + default: + return -1; + } +} + +string stripDot(const string& dom) +{ + if(dom.empty()) + return dom; + + if(dom[dom.size()-1]!='.') + return dom; + + return dom.substr(0,dom.size()-1); +} + + + +int makeIPv6sockaddr(const std::string& addr, struct sockaddr_in6* ret) +{ + if(addr.empty()) + return -1; + string ourAddr(addr); + bool portSet = false; + unsigned int port; + if(addr[0]=='[') { // [::]:53 style address + string::size_type pos = addr.find(']'); + if(pos == string::npos) + return -1; + ourAddr.assign(addr.c_str() + 1, pos-1); + if (pos + 1 != addr.size()) { // complete after ], no port specified + if (pos + 2 > addr.size() || addr[pos+1]!=':') + return -1; + try { + port = pdns_stou(addr.substr(pos+2)); + portSet = true; + } + catch(const std::out_of_range&) { + return -1; + } + } + } + ret->sin6_scope_id=0; + ret->sin6_family=AF_INET6; + + if(inet_pton(AF_INET6, ourAddr.c_str(), (void*)&ret->sin6_addr) != 1) { + struct addrinfo* res; + struct addrinfo hints; + memset(&hints, 0, sizeof(hints)); + + hints.ai_family = AF_INET6; + hints.ai_flags = AI_NUMERICHOST; + + // getaddrinfo has anomalous return codes, anything nonzero is an error, positive or negative + if (getaddrinfo(ourAddr.c_str(), nullptr, &hints, &res) != 0) { + return -1; + } + + memcpy(ret, res->ai_addr, res->ai_addrlen); + freeaddrinfo(res); + } + + if(portSet) { + if(port > 65535) + return -1; + + ret->sin6_port = htons(port); + } + + return 0; +} + +int makeIPv4sockaddr(const std::string& str, struct sockaddr_in* ret) +{ + if(str.empty()) { + return -1; + } + struct in_addr inp; + + string::size_type pos = str.find(':'); + if(pos == string::npos) { // no port specified, not touching the port + if(inet_aton(str.c_str(), &inp)) { + ret->sin_addr.s_addr=inp.s_addr; + return 0; + } + return -1; + } + if(!*(str.c_str() + pos + 1)) // trailing : + return -1; + + char *eptr = const_cast<char*>(str.c_str()) + str.size(); + int port = strtol(str.c_str() + pos + 1, &eptr, 10); + if (port < 0 || port > 65535) + return -1; + + if(*eptr) + return -1; + + ret->sin_port = htons(port); + if(inet_aton(str.substr(0, pos).c_str(), &inp)) { + ret->sin_addr.s_addr=inp.s_addr; + return 0; + } + return -1; +} + +int makeUNsockaddr(const std::string& path, struct sockaddr_un* ret) +{ + if (path.empty()) + return -1; + + memset(ret, 0, sizeof(struct sockaddr_un)); + ret->sun_family = AF_UNIX; + if (path.length() >= sizeof(ret->sun_path)) + return -1; + + path.copy(ret->sun_path, sizeof(ret->sun_path), 0); + return 0; +} + +//! read a line of text from a FILE* to a std::string, returns false on 'no data' +bool stringfgets(FILE* fp, std::string& line) +{ + char buffer[1024]; + line.clear(); + + do { + if(!fgets(buffer, sizeof(buffer), fp)) + return !line.empty(); + + line.append(buffer); + } while(!strchr(buffer, '\n')); + return true; +} + +bool readFileIfThere(const char* fname, std::string* line) +{ + line->clear(); + auto fp = std::unique_ptr<FILE, int(*)(FILE*)>(fopen(fname, "r"), fclose); + if(!fp) + return false; + stringfgets(fp.get(), *line); + fp.reset(); + + return true; +} + +Regex::Regex(const string &expr) +{ + if(regcomp(&d_preg, expr.c_str(), REG_ICASE|REG_NOSUB|REG_EXTENDED)) + throw PDNSException("Regular expression did not compile"); +} + +// if you end up here because valgrind told you were are doing something wrong +// with msgh->msg_controllen, please refer to https://github.com/PowerDNS/pdns/pull/3962 +// first. +// Note that cmsgbuf should be aligned the same as a struct cmsghdr +void addCMsgSrcAddr(struct msghdr* msgh, cmsgbuf_aligned* cmsgbuf, const ComboAddress* source, int itfIndex) +{ + struct cmsghdr *cmsg = nullptr; + + if(source->sin4.sin_family == AF_INET6) { + struct in6_pktinfo *pkt; + + msgh->msg_control = cmsgbuf; +#if !defined( __APPLE__ ) + /* CMSG_SPACE is not a constexpr on macOS */ + static_assert(CMSG_SPACE(sizeof(*pkt)) <= sizeof(*cmsgbuf), "Buffer is too small for in6_pktinfo"); +#else /* __APPLE__ */ + if (CMSG_SPACE(sizeof(*pkt)) > sizeof(*cmsgbuf)) { + throw std::runtime_error("Buffer is too small for in6_pktinfo"); + } +#endif /* __APPLE__ */ + msgh->msg_controllen = CMSG_SPACE(sizeof(*pkt)); + + cmsg = CMSG_FIRSTHDR(msgh); + cmsg->cmsg_level = IPPROTO_IPV6; + cmsg->cmsg_type = IPV6_PKTINFO; + cmsg->cmsg_len = CMSG_LEN(sizeof(*pkt)); + + pkt = (struct in6_pktinfo *) CMSG_DATA(cmsg); + // Include the padding to stop valgrind complaining about passing uninitialized data + memset(pkt, 0, CMSG_SPACE(sizeof(*pkt))); + pkt->ipi6_addr = source->sin6.sin6_addr; + pkt->ipi6_ifindex = itfIndex; + } + else { +#if defined(IP_PKTINFO) + struct in_pktinfo *pkt; + + msgh->msg_control = cmsgbuf; +#if !defined( __APPLE__ ) + /* CMSG_SPACE is not a constexpr on macOS */ + static_assert(CMSG_SPACE(sizeof(*pkt)) <= sizeof(*cmsgbuf), "Buffer is too small for in_pktinfo"); +#else /* __APPLE__ */ + if (CMSG_SPACE(sizeof(*pkt)) > sizeof(*cmsgbuf)) { + throw std::runtime_error("Buffer is too small for in_pktinfo"); + } +#endif /* __APPLE__ */ + msgh->msg_controllen = CMSG_SPACE(sizeof(*pkt)); + + cmsg = CMSG_FIRSTHDR(msgh); + cmsg->cmsg_level = IPPROTO_IP; + cmsg->cmsg_type = IP_PKTINFO; + cmsg->cmsg_len = CMSG_LEN(sizeof(*pkt)); + + pkt = (struct in_pktinfo *) CMSG_DATA(cmsg); + // Include the padding to stop valgrind complaining about passing uninitialized data + memset(pkt, 0, CMSG_SPACE(sizeof(*pkt))); + pkt->ipi_spec_dst = source->sin4.sin_addr; + pkt->ipi_ifindex = itfIndex; +#elif defined(IP_SENDSRCADDR) + struct in_addr *in; + + msgh->msg_control = cmsgbuf; +#if !defined( __APPLE__ ) + static_assert(CMSG_SPACE(sizeof(*in)) <= sizeof(*cmsgbuf), "Buffer is too small for in_addr"); +#else /* __APPLE__ */ + if (CMSG_SPACE(sizeof(*in)) > sizeof(*cmsgbuf)) { + throw std::runtime_error("Buffer is too small for in_addr"); + } +#endif /* __APPLE__ */ + msgh->msg_controllen = CMSG_SPACE(sizeof(*in)); + + cmsg = CMSG_FIRSTHDR(msgh); + cmsg->cmsg_level = IPPROTO_IP; + cmsg->cmsg_type = IP_SENDSRCADDR; + cmsg->cmsg_len = CMSG_LEN(sizeof(*in)); + + // Include the padding to stop valgrind complaining about passing uninitialized data + in = (struct in_addr *) CMSG_DATA(cmsg); + memset(in, 0, CMSG_SPACE(sizeof(*in))); + *in = source->sin4.sin_addr; +#endif + } +} + +unsigned int getFilenumLimit(bool hardOrSoft) +{ + struct rlimit rlim; + if(getrlimit(RLIMIT_NOFILE, &rlim) < 0) + unixDie("Requesting number of available file descriptors"); + return hardOrSoft ? rlim.rlim_max : rlim.rlim_cur; +} + +void setFilenumLimit(unsigned int lim) +{ + struct rlimit rlim; + + if(getrlimit(RLIMIT_NOFILE, &rlim) < 0) + unixDie("Requesting number of available file descriptors"); + rlim.rlim_cur=lim; + if(setrlimit(RLIMIT_NOFILE, &rlim) < 0) + unixDie("Setting number of available file descriptors"); +} + +#define burtlemix(a,b,c) \ +{ \ + a -= b; a -= c; a ^= (c>>13); \ + b -= c; b -= a; b ^= (a<<8); \ + c -= a; c -= b; c ^= (b>>13); \ + a -= b; a -= c; a ^= (c>>12); \ + b -= c; b -= a; b ^= (a<<16); \ + c -= a; c -= b; c ^= (b>>5); \ + a -= b; a -= c; a ^= (c>>3); \ + b -= c; b -= a; b ^= (a<<10); \ + c -= a; c -= b; c ^= (b>>15); \ +} + +uint32_t burtle(const unsigned char* k, uint32_t length, uint32_t initval) +{ + uint32_t a,b,c,len; + + /* Set up the internal state */ + len = length; + a = b = 0x9e3779b9; /* the golden ratio; an arbitrary value */ + c = initval; /* the previous hash value */ + + /*---------------------------------------- handle most of the key */ + while (len >= 12) { + a += (k[0] +((uint32_t)k[1]<<8) +((uint32_t)k[2]<<16) +((uint32_t)k[3]<<24)); + b += (k[4] +((uint32_t)k[5]<<8) +((uint32_t)k[6]<<16) +((uint32_t)k[7]<<24)); + c += (k[8] +((uint32_t)k[9]<<8) +((uint32_t)k[10]<<16)+((uint32_t)k[11]<<24)); + burtlemix(a,b,c); + k += 12; len -= 12; + } + + /*------------------------------------- handle the last 11 bytes */ + c += length; + switch(len) { /* all the case statements fall through */ + case 11: c+=((uint32_t)k[10]<<24); + /* fall-through */ + case 10: c+=((uint32_t)k[9]<<16); + /* fall-through */ + case 9 : c+=((uint32_t)k[8]<<8); + /* the first byte of c is reserved for the length */ + /* fall-through */ + case 8 : b+=((uint32_t)k[7]<<24); + /* fall-through */ + case 7 : b+=((uint32_t)k[6]<<16); + /* fall-through */ + case 6 : b+=((uint32_t)k[5]<<8); + /* fall-through */ + case 5 : b+=k[4]; + /* fall-through */ + case 4 : a+=((uint32_t)k[3]<<24); + /* fall-through */ + case 3 : a+=((uint32_t)k[2]<<16); + /* fall-through */ + case 2 : a+=((uint32_t)k[1]<<8); + /* fall-through */ + case 1 : a+=k[0]; + /* case 0: nothing left to add */ + } + burtlemix(a,b,c); + /*-------------------------------------------- report the result */ + return c; +} + +uint32_t burtleCI(const unsigned char* k, uint32_t length, uint32_t initval) +{ + uint32_t a,b,c,len; + + /* Set up the internal state */ + len = length; + a = b = 0x9e3779b9; /* the golden ratio; an arbitrary value */ + c = initval; /* the previous hash value */ + + /*---------------------------------------- handle most of the key */ + while (len >= 12) { + a += (dns_tolower(k[0]) +((uint32_t)dns_tolower(k[1])<<8) +((uint32_t)dns_tolower(k[2])<<16) +((uint32_t)dns_tolower(k[3])<<24)); + b += (dns_tolower(k[4]) +((uint32_t)dns_tolower(k[5])<<8) +((uint32_t)dns_tolower(k[6])<<16) +((uint32_t)dns_tolower(k[7])<<24)); + c += (dns_tolower(k[8]) +((uint32_t)dns_tolower(k[9])<<8) +((uint32_t)dns_tolower(k[10])<<16)+((uint32_t)dns_tolower(k[11])<<24)); + burtlemix(a,b,c); + k += 12; len -= 12; + } + + /*------------------------------------- handle the last 11 bytes */ + c += length; + switch(len) { /* all the case statements fall through */ + case 11: c+=((uint32_t)dns_tolower(k[10])<<24); + /* fall-through */ + case 10: c+=((uint32_t)dns_tolower(k[9])<<16); + /* fall-through */ + case 9 : c+=((uint32_t)dns_tolower(k[8])<<8); + /* the first byte of c is reserved for the length */ + /* fall-through */ + case 8 : b+=((uint32_t)dns_tolower(k[7])<<24); + /* fall-through */ + case 7 : b+=((uint32_t)dns_tolower(k[6])<<16); + /* fall-through */ + case 6 : b+=((uint32_t)dns_tolower(k[5])<<8); + /* fall-through */ + case 5 : b+=dns_tolower(k[4]); + /* fall-through */ + case 4 : a+=((uint32_t)dns_tolower(k[3])<<24); + /* fall-through */ + case 3 : a+=((uint32_t)dns_tolower(k[2])<<16); + /* fall-through */ + case 2 : a+=((uint32_t)dns_tolower(k[1])<<8); + /* fall-through */ + case 1 : a+=dns_tolower(k[0]); + /* case 0: nothing left to add */ + } + burtlemix(a,b,c); + /*-------------------------------------------- report the result */ + return c; +} + + +bool setSocketTimestamps(int fd) +{ +#ifdef SO_TIMESTAMP + int on=1; + return setsockopt(fd, SOL_SOCKET, SO_TIMESTAMP, (char*)&on, sizeof(on)) == 0; +#else + return true; // we pretend this happened. +#endif +} + +bool setTCPNoDelay(int sock) +{ + int flag = 1; + return setsockopt(sock, /* socket affected */ + IPPROTO_TCP, /* set option at TCP level */ + TCP_NODELAY, /* name of option */ + (char *) &flag, /* the cast is historical cruft */ + sizeof(flag)) == 0; /* length of option value */ +} + + +bool setNonBlocking(int sock) +{ + int flags=fcntl(sock,F_GETFL,0); + if(flags<0 || fcntl(sock, F_SETFL,flags|O_NONBLOCK) <0) + return false; + return true; +} + +bool setBlocking(int sock) +{ + int flags=fcntl(sock,F_GETFL,0); + if(flags<0 || fcntl(sock, F_SETFL,flags&(~O_NONBLOCK)) <0) + return false; + return true; +} + +bool setReuseAddr(int sock) +{ + int tmp = 1; + if (setsockopt(sock, SOL_SOCKET, SO_REUSEADDR, (char*)&tmp, static_cast<unsigned>(sizeof tmp))<0) + throw PDNSException(string("Setsockopt failed: ")+stringerror()); + return true; +} + +bool isNonBlocking(int sock) +{ + int flags=fcntl(sock,F_GETFL,0); + return flags & O_NONBLOCK; +} + +bool setReceiveSocketErrors(int sock, int af) +{ +#ifdef __linux__ + int tmp = 1, ret; + if (af == AF_INET) { + ret = setsockopt(sock, IPPROTO_IP, IP_RECVERR, &tmp, sizeof(tmp)); + } else { + ret = setsockopt(sock, IPPROTO_IPV6, IPV6_RECVERR, &tmp, sizeof(tmp)); + } + if (ret < 0) { + throw PDNSException(string("Setsockopt failed: ") + stringerror()); + } +#endif + return true; +} + +// Closes a socket. +int closesocket( int socket ) +{ + int ret=::close(socket); + if(ret < 0 && errno == ECONNRESET) // see ticket 192, odd BSD behaviour + return 0; + if(ret < 0) + throw PDNSException("Error closing socket: "+stringerror()); + return ret; +} + +bool setCloseOnExec(int sock) +{ + int flags=fcntl(sock,F_GETFD,0); + if(flags<0 || fcntl(sock, F_SETFD,flags|FD_CLOEXEC) <0) + return false; + return true; +} + +string getMACAddress(const ComboAddress& ca) +{ + string ret; +#ifdef __linux__ + ifstream ifs("/proc/net/arp"); + if(!ifs) + return ret; + string line; + string match=ca.toString()+' '; + while(getline(ifs, line)) { + if(boost::starts_with(line, match)) { + vector<string> parts; + stringtok(parts, line, " \n\t\r"); + if(parts.size() < 4) + return ret; + unsigned int tmp[6]; + if (sscanf(parts[3].c_str(), "%02x:%02x:%02x:%02x:%02x:%02x", tmp, tmp+1, tmp+2, tmp+3, tmp+4, tmp+5) != 6) { + return ret; + } + for(unsigned int i : tmp) + ret.append(1, (char)i); + return ret; + } + } +#endif + return ret; +} + +uint64_t udpErrorStats(const std::string& str) +{ +#ifdef __linux__ + ifstream ifs("/proc/net/snmp"); + if (!ifs) { + return 0; + } + + string line; + while (getline(ifs, line)) { + if (boost::starts_with(line, "Udp: ") && isdigit(line.at(5))) { + vector<string> parts; + stringtok(parts, line, " \n\t\r"); + + if (parts.size() < 7) { + break; + } + + if (str == "udp-rcvbuf-errors") { + return std::stoull(parts.at(5)); + } + else if (str == "udp-sndbuf-errors") { + return std::stoull(parts.at(6)); + } + else if (str == "udp-noport-errors") { + return std::stoull(parts.at(2)); + } + else if (str == "udp-in-errors") { + return std::stoull(parts.at(3)); + } + else if (parts.size() >= 8 && str == "udp-in-csum-errors") { + return std::stoull(parts.at(7)); + } + else { + return 0; + } + } + } +#endif + return 0; +} + +uint64_t udp6ErrorStats(const std::string& str) +{ +#ifdef __linux__ + const std::map<std::string, std::string> keys = { + { "udp6-in-errors", "Udp6InErrors" }, + { "udp6-recvbuf-errors", "Udp6RcvbufErrors" }, + { "udp6-sndbuf-errors", "Udp6SndbufErrors" }, + { "udp6-noport-errors", "Udp6NoPorts" }, + { "udp6-in-csum-errors", "Udp6InCsumErrors" } + }; + + auto key = keys.find(str); + if (key == keys.end()) { + return 0; + } + + ifstream ifs("/proc/net/snmp6"); + if (!ifs) { + return 0; + } + + std::string line; + while (getline(ifs, line)) { + if (!boost::starts_with(line, key->second)) { + continue; + } + + std::vector<std::string> parts; + stringtok(parts, line, " \n\t\r"); + + if (parts.size() != 2) { + return 0; + } + + return std::stoull(parts.at(1)); + } +#endif + return 0; +} + +uint64_t tcpErrorStats(const std::string& str) +{ +#ifdef __linux__ + ifstream ifs("/proc/net/netstat"); + if (!ifs) { + return 0; + } + + string line; + vector<string> parts; + while (getline(ifs,line)) { + if (line.size() > 9 && boost::starts_with(line, "TcpExt: ") && isdigit(line.at(8))) { + stringtok(parts, line, " \n\t\r"); + + if (parts.size() < 21) { + break; + } + + return std::stoull(parts.at(20)); + } + } +#endif + return 0; +} + +uint64_t getCPUIOWait(const std::string& str) +{ +#ifdef __linux__ + ifstream ifs("/proc/stat"); + if (!ifs) { + return 0; + } + + string line; + vector<string> parts; + while (getline(ifs, line)) { + if (boost::starts_with(line, "cpu ")) { + stringtok(parts, line, " \n\t\r"); + + if (parts.size() < 6) { + break; + } + + return std::stoull(parts[5]); + } + } +#endif + return 0; +} + +uint64_t getCPUSteal(const std::string& str) +{ +#ifdef __linux__ + ifstream ifs("/proc/stat"); + if (!ifs) { + return 0; + } + + string line; + vector<string> parts; + while (getline(ifs, line)) { + if (boost::starts_with(line, "cpu ")) { + stringtok(parts, line, " \n\t\r"); + + if (parts.size() < 9) { + break; + } + + return std::stoull(parts[8]); + } + } +#endif + return 0; +} + +bool getTSIGHashEnum(const DNSName& algoName, TSIGHashEnum& algoEnum) +{ + if (algoName == DNSName("hmac-md5.sig-alg.reg.int") || algoName == DNSName("hmac-md5")) + algoEnum = TSIG_MD5; + else if (algoName == DNSName("hmac-sha1")) + algoEnum = TSIG_SHA1; + else if (algoName == DNSName("hmac-sha224")) + algoEnum = TSIG_SHA224; + else if (algoName == DNSName("hmac-sha256")) + algoEnum = TSIG_SHA256; + else if (algoName == DNSName("hmac-sha384")) + algoEnum = TSIG_SHA384; + else if (algoName == DNSName("hmac-sha512")) + algoEnum = TSIG_SHA512; + else if (algoName == DNSName("gss-tsig")) + algoEnum = TSIG_GSS; + else { + return false; + } + return true; +} + +DNSName getTSIGAlgoName(TSIGHashEnum& algoEnum) +{ + switch(algoEnum) { + case TSIG_MD5: return DNSName("hmac-md5.sig-alg.reg.int."); + case TSIG_SHA1: return DNSName("hmac-sha1."); + case TSIG_SHA224: return DNSName("hmac-sha224."); + case TSIG_SHA256: return DNSName("hmac-sha256."); + case TSIG_SHA384: return DNSName("hmac-sha384."); + case TSIG_SHA512: return DNSName("hmac-sha512."); + case TSIG_GSS: return DNSName("gss-tsig."); + } + throw PDNSException("getTSIGAlgoName does not understand given algorithm, please fix!"); +} + +uint64_t getOpenFileDescriptors(const std::string&) +{ +#ifdef __linux__ + DIR* dirhdl=opendir(("/proc/"+std::to_string(getpid())+"/fd/").c_str()); + if(!dirhdl) + return 0; + + struct dirent *entry; + int ret=0; + while((entry = readdir(dirhdl))) { + uint32_t num; + try { + num = pdns_stou(entry->d_name); + } catch (...) { + continue; // was not a number. + } + if(std::to_string(num) == entry->d_name) + ret++; + } + closedir(dirhdl); + return ret; + +#elif defined(__OpenBSD__) + // FreeBSD also has this in libopenbsd, but I don't know if that's available always + return getdtablecount(); +#else + return 0; +#endif +} + +uint64_t getRealMemoryUsage(const std::string&) +{ +#ifdef __linux__ + ifstream ifs("/proc/self/statm"); + if(!ifs) + return 0; + + uint64_t size, resident, shared, text, lib, data; + ifs >> size >> resident >> shared >> text >> lib >> data; + + // We used to use "data" here, but it proves unreliable and even is marked "broken" + // in https://www.kernel.org/doc/html/latest/filesystems/proc.html + return resident * getpagesize(); +#else + struct rusage ru; + if (getrusage(RUSAGE_SELF, &ru) != 0) + return 0; + return ru.ru_maxrss * 1024; +#endif +} + + +uint64_t getSpecialMemoryUsage(const std::string&) +{ +#ifdef __linux__ + ifstream ifs("/proc/self/smaps"); + if(!ifs) + return 0; + string line; + uint64_t bytes=0; + string header("Private_Dirty:"); + while(getline(ifs, line)) { + if(boost::starts_with(line, header)) { + bytes += std::stoull(line.substr(header.length() + 1))*1024; + } + } + return bytes; +#else + return 0; +#endif +} + +uint64_t getCPUTimeUser(const std::string&) +{ + struct rusage ru; + getrusage(RUSAGE_SELF, &ru); + return (ru.ru_utime.tv_sec*1000ULL + ru.ru_utime.tv_usec/1000); +} + +uint64_t getCPUTimeSystem(const std::string&) +{ + struct rusage ru; + getrusage(RUSAGE_SELF, &ru); + return (ru.ru_stime.tv_sec*1000ULL + ru.ru_stime.tv_usec/1000); +} + +double DiffTime(const struct timespec& first, const struct timespec& second) +{ + int seconds=second.tv_sec - first.tv_sec; + int nseconds=second.tv_nsec - first.tv_nsec; + + if(nseconds < 0) { + seconds-=1; + nseconds+=1000000000; + } + return seconds + nseconds/1000000000.0; +} + +double DiffTime(const struct timeval& first, const struct timeval& second) +{ + int seconds=second.tv_sec - first.tv_sec; + int useconds=second.tv_usec - first.tv_usec; + + if(useconds < 0) { + seconds-=1; + useconds+=1000000; + } + return seconds + useconds/1000000.0; +} + +uid_t strToUID(const string &str) +{ + uid_t result = 0; + const char * cstr = str.c_str(); + struct passwd * pwd = getpwnam(cstr); + + if (pwd == nullptr) { + long long val; + + try { + val = stoll(str); + } + catch(std::exception& e) { + throw runtime_error((boost::format("Error: Unable to parse user ID %s") % cstr).str() ); + } + + if (val < std::numeric_limits<uid_t>::min() || val > std::numeric_limits<uid_t>::max()) { + throw runtime_error((boost::format("Error: Unable to parse user ID %s") % cstr).str() ); + } + + result = static_cast<uid_t>(val); + } + else { + result = pwd->pw_uid; + } + + return result; +} + +gid_t strToGID(const string &str) +{ + gid_t result = 0; + const char * cstr = str.c_str(); + struct group * grp = getgrnam(cstr); + + if (grp == nullptr) { + long long val; + + try { + val = stoll(str); + } + catch(std::exception& e) { + throw runtime_error((boost::format("Error: Unable to parse group ID %s") % cstr).str() ); + } + + if (val < std::numeric_limits<gid_t>::min() || val > std::numeric_limits<gid_t>::max()) { + throw runtime_error((boost::format("Error: Unable to parse group ID %s") % cstr).str() ); + } + + result = static_cast<gid_t>(val); + } + else { + result = grp->gr_gid; + } + + return result; +} + +unsigned int pdns_stou(const std::string& str, size_t * idx, int base) +{ + if (str.empty()) return 0; // compatibility + unsigned long result; + try { + result = std::stoul(str, idx, base); + } + catch(std::invalid_argument& e) { + throw std::invalid_argument(string(e.what()) + "; (invalid argument during std::stoul); data was \""+str+"\""); + } + catch(std::out_of_range& e) { + throw std::out_of_range(string(e.what()) + "; (out of range during std::stoul); data was \""+str+"\""); + } + if (result > std::numeric_limits<unsigned int>::max()) { + throw std::out_of_range("stoul returned result out of unsigned int range; data was \""+str+"\""); + } + return static_cast<unsigned int>(result); +} + +bool isSettingThreadCPUAffinitySupported() +{ +#ifdef HAVE_PTHREAD_SETAFFINITY_NP + return true; +#else + return false; +#endif +} + +int mapThreadToCPUList(pthread_t tid, const std::set<int>& cpus) +{ +#ifdef HAVE_PTHREAD_SETAFFINITY_NP +# ifdef __NetBSD__ + cpuset_t *cpuset; + cpuset = cpuset_create(); + for (const auto cpuID : cpus) { + cpuset_set(cpuID, cpuset); + } + + return pthread_setaffinity_np(tid, + cpuset_size(cpuset), + cpuset); +# else +# ifdef __FreeBSD__ +# define cpu_set_t cpuset_t +# endif + cpu_set_t cpuset; + CPU_ZERO(&cpuset); + for (const auto cpuID : cpus) { + CPU_SET(cpuID, &cpuset); + } + + return pthread_setaffinity_np(tid, + sizeof(cpuset), + &cpuset); +# endif +#else + return ENOSYS; +#endif /* HAVE_PTHREAD_SETAFFINITY_NP */ +} + +std::vector<ComboAddress> getResolvers(const std::string& resolvConfPath) +{ + std::vector<ComboAddress> results; + + ifstream ifs(resolvConfPath); + if (!ifs) { + return results; + } + + string line; + while(std::getline(ifs, line)) { + boost::trim_right_if(line, boost::is_any_of(" \r\n\x1a")); + boost::trim_left(line); // leading spaces, let's be nice + + string::size_type tpos = line.find_first_of(";#"); + if (tpos != string::npos) { + line.resize(tpos); + } + + if (boost::starts_with(line, "nameserver ") || boost::starts_with(line, "nameserver\t")) { + vector<string> parts; + stringtok(parts, line, " \t,"); // be REALLY nice + for(vector<string>::const_iterator iter = parts.begin() + 1; iter != parts.end(); ++iter) { + try { + results.emplace_back(*iter, 53); + } + catch(...) + { + } + } + } + } + + return results; +} + +size_t getPipeBufferSize(int fd) +{ +#ifdef F_GETPIPE_SZ + int res = fcntl(fd, F_GETPIPE_SZ); + if (res == -1) { + return 0; + } + return res; +#else + errno = ENOSYS; + return 0; +#endif /* F_GETPIPE_SZ */ +} + +bool setPipeBufferSize(int fd, size_t size) +{ +#ifdef F_SETPIPE_SZ + if (size > static_cast<size_t>(std::numeric_limits<int>::max())) { + errno = EINVAL; + return false; + } + int newSize = static_cast<int>(size); + int res = fcntl(fd, F_SETPIPE_SZ, newSize); + if (res == -1) { + return false; + } + return true; +#else + errno = ENOSYS; + return false; +#endif /* F_SETPIPE_SZ */ +} + +DNSName reverseNameFromIP(const ComboAddress& ip) +{ + if (ip.isIPv4()) { + std::string result("in-addr.arpa."); + auto ptr = reinterpret_cast<const uint8_t*>(&ip.sin4.sin_addr.s_addr); + for (size_t idx = 0; idx < sizeof(ip.sin4.sin_addr.s_addr); idx++) { + result = std::to_string(ptr[idx]) + "." + result; + } + return DNSName(result); + } + else if (ip.isIPv6()) { + std::string result("ip6.arpa."); + auto ptr = reinterpret_cast<const uint8_t*>(&ip.sin6.sin6_addr.s6_addr[0]); + for (size_t idx = 0; idx < sizeof(ip.sin6.sin6_addr.s6_addr); idx++) { + std::stringstream stream; + stream << std::hex << (ptr[idx] & 0x0F); + stream << '.'; + stream << std::hex << (((ptr[idx]) >> 4) & 0x0F); + stream << '.'; + result = stream.str() + result; + } + return DNSName(result); + } + + throw std::runtime_error("Calling reverseNameFromIP() for an address which is neither an IPv4 nor an IPv6"); +} + +static size_t getMaxHostNameSize() +{ +#if defined(HOST_NAME_MAX) + return HOST_NAME_MAX; +#endif + +#if defined(_SC_HOST_NAME_MAX) + auto tmp = sysconf(_SC_HOST_NAME_MAX); + if (tmp != -1) { + return tmp; + } +#endif + + /* _POSIX_HOST_NAME_MAX */ + return 255; +} + +std::string getCarbonHostName() +{ + std::string hostname; + hostname.resize(getMaxHostNameSize() + 1, 0); + + if (gethostname(const_cast<char*>(hostname.c_str()), hostname.size()) != 0) { + throw std::runtime_error(stringerror()); + } + + boost::replace_all(hostname, ".", "_"); + hostname.resize(strlen(hostname.c_str())); + + return hostname; +} + +std::string makeLuaString(const std::string& in) +{ + ostringstream str; + + str<<'"'; + + char item[5]; + for (unsigned char n : in) { + if (islower(n) || isupper(n)) { + item[0] = n; + item[1] = 0; + } + else { + snprintf(item, sizeof(item), "\\%03d", n); + } + str << item; + } + + str<<'"'; + + return str.str(); +} + +size_t parseSVCBValueList(const std::string &in, vector<std::string> &val) { + std::string parsed; + auto ret = parseRFC1035CharString(in, parsed); + parseSVCBValueListFromParsedRFC1035CharString(parsed, val); + return ret; +}; + +#ifdef HAVE_CRYPTO_MEMCMP +#include <openssl/crypto.h> +#else /* HAVE_CRYPTO_MEMCMP */ +#ifdef HAVE_SODIUM_MEMCMP +#include <sodium.h> +#endif /* HAVE_SODIUM_MEMCMP */ +#endif /* HAVE_CRYPTO_MEMCMP */ + +bool constantTimeStringEquals(const std::string& a, const std::string& b) +{ + if (a.size() != b.size()) { + return false; + } + const size_t size = a.size(); +#ifdef HAVE_CRYPTO_MEMCMP + return CRYPTO_memcmp(a.c_str(), b.c_str(), size) == 0; +#else /* HAVE_CRYPTO_MEMCMP */ +#ifdef HAVE_SODIUM_MEMCMP + return sodium_memcmp(a.c_str(), b.c_str(), size) == 0; +#else /* HAVE_SODIUM_MEMCMP */ + const volatile unsigned char *_a = (const volatile unsigned char *) a.c_str(); + const volatile unsigned char *_b = (const volatile unsigned char *) b.c_str(); + unsigned char res = 0; + + for (size_t idx = 0; idx < size; idx++) { + res |= _a[idx] ^ _b[idx]; + } + + return res == 0; +#endif /* !HAVE_SODIUM_MEMCMP */ +#endif /* !HAVE_CRYPTO_MEMCMP */ +} |