1 Star 0 Fork 0

Hawkenm(BH5EGM) / FTL

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
克隆/下载
datastructure.c 6.34 KB
一键复制 编辑 原始数据 按行查看 历史
/* Pi-hole: A black hole for Internet advertisements
* (c) 2017 Pi-hole, LLC (https://pi-hole.net)
* Network-wide ad blocking via your own hardware.
*
* FTL Engine
* Query processing routines
*
* This file is copyright under the latest version of the EUPL.
* Please see LICENSE file for your rights under this license. */
#include "FTL.h"
// converts upper to lower case, and leaves other characters unchanged
void strtolower(char *str)
{
int i = 0;
while(str[i]){ str[i] = tolower(str[i]); i++; }
}
int findForwardID(const char * forward, bool count)
{
int i, forwardID = -1;
if(counters->forwarded > 0)
validate_access("forwarded", counters->forwarded-1, true, __LINE__, __FUNCTION__, __FILE__);
// Go through already knows forward servers and see if we used one of those
for(i=0; i < counters->forwarded; i++)
{
if(strcmp(getstr(forwarded[i].ippos), forward) == 0)
{
forwardID = i;
if(count) forwarded[forwardID].count++;
return forwardID;
}
}
// This forward server is not known
// Store ID
forwardID = counters->forwarded;
logg("New forward server: %s (%i/%u)", forward, forwardID, counters->forwarded_MAX);
// Check struct size
memory_check(FORWARDED);
validate_access("forwarded", forwardID, false, __LINE__, __FUNCTION__, __FILE__);
// Set magic byte
forwarded[forwardID].magic = MAGICBYTE;
// Initialize its counter
if(count)
forwarded[forwardID].count = 1;
else
forwarded[forwardID].count = 0;
// Save forward destination IP address
forwarded[forwardID].ippos = addstr(forward);
forwarded[forwardID].failed = 0;
// Initialize forward hostname
// Due to the nature of us being the resolver,
// the actual resolving of the host name has
// to be done separately to be non-blocking
forwarded[forwardID].new = true;
forwarded[forwardID].namepos = 0; // 0 -> string with length zero
// Increase counter by one
counters->forwarded++;
return forwardID;
}
int findDomainID(const char *domain)
{
int i;
if(counters->domains > 0)
validate_access("domains", counters->domains-1, true, __LINE__, __FUNCTION__, __FILE__);
for(i=0; i < counters->domains; i++)
{
// Quick test: Does the domain start with the same character?
if(getstr(domains[i].domainpos)[0] != domain[0])
continue;
// If so, compare the full domain using strcmp
if(strcmp(getstr(domains[i].domainpos), domain) == 0)
{
domains[i].count++;
return i;
}
}
// If we did not return until here, then this domain is not known
// Store ID
int domainID = counters->domains;
// Check struct size
memory_check(DOMAINS);
validate_access("domains", domainID, false, __LINE__, __FUNCTION__, __FILE__);
// Set magic byte
domains[domainID].magic = MAGICBYTE;
// Set its counter to 1
domains[domainID].count = 1;
// Set blocked counter to zero
domains[domainID].blockedcount = 0;
// Store domain name - no need to check for NULL here as it doesn't harm
domains[domainID].domainpos = addstr(domain);
// RegEx needs to be evaluated for this new domain
domains[domainID].regexmatch = REGEX_UNKNOWN;
// Increase counter by one
counters->domains++;
return domainID;
}
int findClientID(const char *client, bool count)
{
// Compare content of client against known client IP addresses
if(counters->clients > 0)
validate_access("clients", counters->clients-1, true, __LINE__, __FUNCTION__, __FILE__);
for(int i=0; i < counters->clients; i++)
{
// Quick test: Does the clients IP start with the same character?
if(getstr(clients[i].ippos)[0] != client[0])
continue;
// If so, compare the full IP using strcmp
if(strcmp(getstr(clients[i].ippos), client) == 0)
{
// Add one if count == true (do not add one, e.g., during ARP table processing)
if(count) clients[i].count++;
return i;
}
}
// Return -1 (= not found) if count is false ...
if(!count)
return -1;
// ... otherwise proceed with adding a new client entry
// If we did not return until here, then this client is definitely new
// Store ID
int clientID = counters->clients;
// Check struct size
memory_check(CLIENTS);
validate_access("clients", clientID, false, __LINE__, __FUNCTION__, __FILE__);
// Set magic byte
clients[clientID].magic = MAGICBYTE;
// Set its counter to 1
clients[clientID].count = 1;
// Initialize blocked count to zero
clients[clientID].blockedcount = 0;
// Store client IP - no need to check for NULL here as it doesn't harm
clients[clientID].ippos = addstr(client);
// Initialize client hostname
// Due to the nature of us being the resolver,
// the actual resolving of the host name has
// to be done separately to be non-blocking
clients[clientID].new = true;
clients[clientID].namepos = 0;
// No query seen so far
clients[clientID].lastQuery = 0;
clients[clientID].numQueriesARP = 0;
// Initialize client-specific overTime data
for(int i = 0; i < OVERTIME_SLOTS; i++)
clients[clientID].overTime[i] = 0;
// Increase counter by one
counters->clients++;
return clientID;
}
bool isValidIPv4(const char *addr)
{
struct sockaddr_in sa;
return inet_pton(AF_INET, addr, &(sa.sin_addr)) != 0;
}
bool isValidIPv6(const char *addr)
{
struct sockaddr_in6 sa;
return inet_pton(AF_INET6, addr, &(sa.sin6_addr)) != 0;
}
// Privacy-level sensitive subroutine that returns the domain name
// only when appropriate for the requested query
const char *getDomainString(int queryID)
{
if(queries[queryID].privacylevel < PRIVACY_HIDE_DOMAINS)
{
validate_access("domains", queries[queryID].domainID, true, __LINE__, __FUNCTION__, __FILE__);
return getstr(domains[queries[queryID].domainID].domainpos);
}
else
return HIDDEN_DOMAIN;
}
// Privacy-level sensitive subroutine that returns the client IP
// only when appropriate for the requested query
const char *getClientIPString(int queryID)
{
if(queries[queryID].privacylevel < PRIVACY_HIDE_DOMAINS_CLIENTS)
{
validate_access("clients", queries[queryID].clientID, true, __LINE__, __FUNCTION__, __FILE__);
return getstr(clients[queries[queryID].clientID].ippos);
}
else
return HIDDEN_CLIENT;
}
// Privacy-level sensitive subroutine that returns the client host name
// only when appropriate for the requested query
const char *getClientNameString(int queryID)
{
if(queries[queryID].privacylevel < PRIVACY_HIDE_DOMAINS_CLIENTS)
{
validate_access("clients", queries[queryID].clientID, true, __LINE__, __FUNCTION__, __FILE__);
return getstr(clients[queries[queryID].clientID].namepos);
}
else
return HIDDEN_CLIENT;
}
1
https://gitee.com/Hawkenm/FTL.git
git@gitee.com:Hawkenm/FTL.git
Hawkenm
FTL
FTL
master

搜索帮助