message.setServerIdentity(d_serverID);
}
-#if HAVE_IPCIPHER
+#ifdef HAVE_IPCIPHER
if (!d_ipEncryptKey.empty()) {
message.setRequestor(encryptCA(dnsquestion->ids.origRemote, d_ipEncryptKey));
}
message.setServerIdentity(d_serverID);
}
-#if HAVE_IPCIPHER
+#ifdef HAVE_IPCIPHER
if (!d_ipEncryptKey.empty()) {
message.setRequestor(encryptCA(response->ids.origRemote, d_ipEncryptKey));
}
return NGHTTP2_ERR_CALLBACK_FAILURE;
}
-#if HAVE_NGHTTP2_CHECK_HEADER_VALUE_RFC9113
+#ifdef HAVE_NGHTTP2_CHECK_HEADER_VALUE_RFC9113
if (nghttp2_check_header_value_rfc9113(value, valuelen) == 0) {
vinfolog("Invalid header value");
return NGHTTP2_ERR_CALLBACK_FAILURE;
// NOLINTNEXTLINE(cppcoreguidelines-pro-type-reinterpret-cast): nghttp2 API
auto valueView = std::string_view(reinterpret_cast<const char*>(value), valuelen);
if (headerMatches(s_pathHeaderName)) {
-#if HAVE_NGHTTP2_CHECK_PATH
+#ifdef HAVE_NGHTTP2_CHECK_PATH
if (nghttp2_check_path(value, valuelen) == 0) {
vinfolog("Invalid path value");
return NGHTTP2_ERR_CALLBACK_FAILURE;
static void handleRuntimeDefaults(Logr::log_t log)
{
-#if HAVE_FIBER_SANITIZER
+#ifdef HAVE_FIBER_SANITIZER
// Asan needs more stack
if (::arg().asNum("stack-size") == 200000) { // the default in table.py
::arg().set("stack-size", "stack size per mthread") = "600000";