blob: a8fdd59b2e292aa38e74dd9c80ada8142e46343a [file] [log] [blame]
Simon Kelleyc49778d2016-01-06 18:52:33 +00001/* dnsmasq is Copyright (c) 2000-2016 Simon Kelley
Simon Kelley98c098b2014-01-08 17:31:16 +00002
3 This program is free software; you can redistribute it and/or modify
4 it under the terms of the GNU General Public License as published by
5 the Free Software Foundation; version 2 dated June, 1991, or
6 (at your option) version 3 dated 29 June, 2007.
7
8 This program is distributed in the hope that it will be useful,
9 but WITHOUT ANY WARRANTY; without even the implied warranty of
10 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
11 GNU General Public License for more details.
12
13 You should have received a copy of the GNU General Public License
14 along with this program. If not, see <http://www.gnu.org/licenses/>.
15*/
16
17#include "dnsmasq.h"
18
19#ifdef HAVE_DNSSEC
20
Simon Kelley82e3f452014-01-31 21:05:48 +000021static struct blockdata *keyblock_free;
22static unsigned int blockdata_count, blockdata_hwm, blockdata_alloced;
23
Simon Kelley8d718cb2014-02-03 16:27:37 +000024static void blockdata_expand(int n)
25{
26 struct blockdata *new = whine_malloc(n * sizeof(struct blockdata));
27
Simon Kelleyb692f232014-05-09 10:29:43 +010028 if (n > 0 && new)
Simon Kelley8d718cb2014-02-03 16:27:37 +000029 {
30 int i;
31
32 new[n-1].next = keyblock_free;
33 keyblock_free = new;
34
35 for (i = 0; i < n - 1; i++)
36 new[i].next = &new[i+1];
37
38 blockdata_alloced += n;
39 }
40}
41
Simon Kelley82e3f452014-01-31 21:05:48 +000042/* Preallocate some blocks, proportional to cachesize, to reduce heap fragmentation. */
43void blockdata_init(void)
44{
Simon Kelley8d718cb2014-02-03 16:27:37 +000045 keyblock_free = NULL;
46 blockdata_alloced = 0;
Simon Kelley82e3f452014-01-31 21:05:48 +000047 blockdata_count = 0;
48 blockdata_hwm = 0;
Simon Kelleyb692f232014-05-09 10:29:43 +010049
50 /* Note that daemon->cachesize is enforced to have non-zero size if OPT_DNSSEC_VALID is set */
51 if (option_bool(OPT_DNSSEC_VALID))
52 blockdata_expand((daemon->cachesize * 100) / sizeof(struct blockdata));
Simon Kelley82e3f452014-01-31 21:05:48 +000053}
Simon Kelleyc2207682014-01-08 18:04:20 +000054
55void blockdata_report(void)
56{
Simon Kelleyb692f232014-05-09 10:29:43 +010057 if (option_bool(OPT_DNSSEC_VALID))
58 my_syslog(LOG_INFO, _("DNSSEC memory in use %u, max %u, allocated %u"),
59 blockdata_count * sizeof(struct blockdata),
60 blockdata_hwm * sizeof(struct blockdata),
61 blockdata_alloced * sizeof(struct blockdata));
Simon Kelleyc2207682014-01-08 18:04:20 +000062}
Simon Kelley98c098b2014-01-08 17:31:16 +000063
64struct blockdata *blockdata_alloc(char *data, size_t len)
65{
66 struct blockdata *block, *ret = NULL;
67 struct blockdata **prev = &ret;
68 size_t blen;
69
70 while (len > 0)
71 {
Simon Kelley8d718cb2014-02-03 16:27:37 +000072 if (!keyblock_free)
73 blockdata_expand(50);
74
Simon Kelley98c098b2014-01-08 17:31:16 +000075 if (keyblock_free)
76 {
77 block = keyblock_free;
78 keyblock_free = block->next;
Simon Kelleyc2207682014-01-08 18:04:20 +000079 blockdata_count++;
Simon Kelley98c098b2014-01-08 17:31:16 +000080 }
Simon Kelley5f938532014-02-03 16:44:32 +000081 else
Simon Kelley98c098b2014-01-08 17:31:16 +000082 {
83 /* failed to alloc, free partial chain */
84 blockdata_free(ret);
85 return NULL;
86 }
Simon Kelley82e3f452014-01-31 21:05:48 +000087
88 if (blockdata_hwm < blockdata_count)
89 blockdata_hwm = blockdata_count;
Simon Kelley98c098b2014-01-08 17:31:16 +000090
91 blen = len > KEYBLOCK_LEN ? KEYBLOCK_LEN : len;
92 memcpy(block->key, data, blen);
93 data += blen;
94 len -= blen;
95 *prev = block;
96 prev = &block->next;
97 block->next = NULL;
98 }
99
100 return ret;
101}
102
Simon Kelley98c098b2014-01-08 17:31:16 +0000103void blockdata_free(struct blockdata *blocks)
104{
105 struct blockdata *tmp;
Simon Kelley82e3f452014-01-31 21:05:48 +0000106
Simon Kelley98c098b2014-01-08 17:31:16 +0000107 if (blocks)
108 {
Simon Kelleyc2207682014-01-08 18:04:20 +0000109 for (tmp = blocks; tmp->next; tmp = tmp->next)
110 blockdata_count--;
Simon Kelley98c098b2014-01-08 17:31:16 +0000111 tmp->next = keyblock_free;
Simon Kelleyc2207682014-01-08 18:04:20 +0000112 keyblock_free = blocks;
113 blockdata_count--;
Simon Kelley98c098b2014-01-08 17:31:16 +0000114 }
115}
116
Simon Kelley86bec2d2014-01-13 21:31:20 +0000117/* if data == NULL, return pointer to static block of sufficient size */
118void *blockdata_retrieve(struct blockdata *block, size_t len, void *data)
Simon Kelley98c098b2014-01-08 17:31:16 +0000119{
120 size_t blen;
121 struct blockdata *b;
Simon Kelley86bec2d2014-01-13 21:31:20 +0000122 void *new, *d;
Simon Kelley98c098b2014-01-08 17:31:16 +0000123
Simon Kelley86bec2d2014-01-13 21:31:20 +0000124 static unsigned int buff_len = 0;
125 static unsigned char *buff = NULL;
126
127 if (!data)
128 {
129 if (len > buff_len)
130 {
131 if (!(new = whine_malloc(len)))
132 return NULL;
133 if (buff)
134 free(buff);
135 buff = new;
136 }
137 data = buff;
138 }
139
140 for (d = data, b = block; len > 0 && b; b = b->next)
Simon Kelley98c098b2014-01-08 17:31:16 +0000141 {
142 blen = len > KEYBLOCK_LEN ? KEYBLOCK_LEN : len;
Simon Kelley86bec2d2014-01-13 21:31:20 +0000143 memcpy(d, b->key, blen);
144 d += blen;
Simon Kelley98c098b2014-01-08 17:31:16 +0000145 len -= blen;
146 }
Simon Kelleyb6e9e7c2014-01-08 21:21:20 +0000147
Simon Kelley86bec2d2014-01-13 21:31:20 +0000148 return data;
Simon Kelley98c098b2014-01-08 17:31:16 +0000149}
Simon Kelleyb6e9e7c2014-01-08 21:21:20 +0000150
Simon Kelley98c098b2014-01-08 17:31:16 +0000151#endif