]> jfr.im git - irc/rqf/shadowircd.git/blame - src/s_newconf.c
away stuff from ratbox3
[irc/rqf/shadowircd.git] / src / s_newconf.c
CommitLineData
212380e3 1/*
2 * ircd-ratbox: an advanced Internet Relay Chat Daemon(ircd).
3 * s_newconf.c - code for dealing with conf stuff
4 *
5 * Copyright (C) 2004 Lee Hardy <lee@leeh.co.uk>
6 * Copyright (C) 2004-2005 ircd-ratbox development team
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
10 * met:
11 *
12 * 1.Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 * 2.Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3.The name of the author may not be used to endorse or promote products
18 * derived from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
21 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
22 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
23 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
24 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
26 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
28 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
29 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 *
7d08aa89 32 * $Id: s_newconf.c 3508 2007-06-04 16:04:49Z jilles $
212380e3 33 */
34
35#include "stdinc.h"
36#include "ircd_defs.h"
37#include "common.h"
38#include "s_conf.h"
39#include "s_newconf.h"
212380e3 40#include "client.h"
212380e3 41#include "s_serv.h"
42#include "send.h"
43#include "hostmask.h"
44#include "newconf.h"
45#include "hash.h"
212380e3 46#include "sprintf_irc.h"
b37021a4 47#include "irc_dictionary.h"
212380e3 48
af81d5a0
WP
49rb_dlink_list shared_conf_list;
50rb_dlink_list cluster_conf_list;
51rb_dlink_list oper_conf_list;
52rb_dlink_list hubleaf_conf_list;
53rb_dlink_list server_conf_list;
54rb_dlink_list xline_conf_list;
55rb_dlink_list resv_conf_list; /* nicks only! */
56rb_dlink_list nd_list; /* nick delay */
57rb_dlink_list tgchange_list;
212380e3 58
7f4fa195 59rb_patricia_tree_t *tgchange_tree;
212380e3 60
61static BlockHeap *nd_heap = NULL;
62
63static void expire_temp_rxlines(void *unused);
64static void expire_nd_entries(void *unused);
65
66void
67init_s_newconf(void)
68{
69 tgchange_tree = New_Patricia(PATRICIA_BITS);
70 nd_heap = BlockHeapCreate(sizeof(struct nd_entry), ND_HEAP_SIZE);
71 eventAddIsh("expire_nd_entries", expire_nd_entries, NULL, 30);
72 eventAddIsh("expire_temp_rxlines", expire_temp_rxlines, NULL, 60);
73}
74
75void
76clear_s_newconf(void)
77{
78 struct server_conf *server_p;
af81d5a0 79 rb_dlink_node *ptr;
90a3c35b 80 rb_dlink_node *next_ptr;
212380e3 81
90a3c35b 82 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, shared_conf_list.head)
212380e3 83 {
84 /* ptr here is ptr->data->node */
af81d5a0 85 rb_dlinkDelete(ptr, &shared_conf_list);
212380e3 86 free_remote_conf(ptr->data);
87 }
88
90a3c35b 89 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, cluster_conf_list.head)
212380e3 90 {
af81d5a0 91 rb_dlinkDelete(ptr, &cluster_conf_list);
212380e3 92 free_remote_conf(ptr->data);
93 }
94
90a3c35b 95 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, hubleaf_conf_list.head)
212380e3 96 {
af81d5a0 97 rb_dlinkDelete(ptr, &hubleaf_conf_list);
212380e3 98 free_remote_conf(ptr->data);
99 }
100
90a3c35b 101 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, oper_conf_list.head)
212380e3 102 {
103 free_oper_conf(ptr->data);
af81d5a0 104 rb_dlinkDestroy(ptr, &oper_conf_list);
212380e3 105 }
106
90a3c35b 107 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, server_conf_list.head)
212380e3 108 {
109 server_p = ptr->data;
110
111 if(!server_p->servers)
112 {
af81d5a0 113 rb_dlinkDelete(ptr, &server_conf_list);
212380e3 114 free_server_conf(ptr->data);
115 }
116 else
117 server_p->flags |= SERVER_ILLEGAL;
118 }
119}
120
121void
122clear_s_newconf_bans(void)
123{
124 struct ConfItem *aconf;
90a3c35b 125 rb_dlink_node *ptr, *next_ptr;
212380e3 126
90a3c35b 127 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
212380e3 128 {
129 aconf = ptr->data;
130
131 if(aconf->hold)
132 continue;
133
134 free_conf(aconf);
af81d5a0 135 rb_dlinkDestroy(ptr, &xline_conf_list);
212380e3 136 }
137
90a3c35b 138 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
212380e3 139 {
140 aconf = ptr->data;
141
142 /* temporary resv */
143 if(aconf->hold)
144 continue;
145
146 free_conf(aconf);
af81d5a0 147 rb_dlinkDestroy(ptr, &resv_conf_list);
212380e3 148 }
149
150 clear_resv_hash();
151}
152
153struct remote_conf *
154make_remote_conf(void)
155{
156 struct remote_conf *remote_p = MyMalloc(sizeof(struct remote_conf));
157 return remote_p;
158}
159
160void
161free_remote_conf(struct remote_conf *remote_p)
162{
163 s_assert(remote_p != NULL);
164 if(remote_p == NULL)
165 return;
166
90a3c35b
VY
167 rb_free(remote_p->username);
168 rb_free(remote_p->host);
169 rb_free(remote_p->server);
170 rb_free(remote_p);
212380e3 171}
172
173int
174find_shared_conf(const char *username, const char *host,
175 const char *server, int flags)
176{
177 struct remote_conf *shared_p;
af81d5a0 178 rb_dlink_node *ptr;
212380e3 179
8e69bb4e 180 RB_DLINK_FOREACH(ptr, shared_conf_list.head)
212380e3 181 {
182 shared_p = ptr->data;
183
184 if(match(shared_p->username, username) &&
185 match(shared_p->host, host) &&
186 match(shared_p->server, server))
187 {
188 if(shared_p->flags & flags)
189 return YES;
190 else
191 return NO;
192 }
193 }
194
195 return NO;
196}
197
198void
199propagate_generic(struct Client *source_p, const char *command,
200 const char *target, int cap, const char *format, ...)
201{
202 char buffer[BUFSIZE];
203 va_list args;
204
205 va_start(args, format);
206 ircvsnprintf(buffer, sizeof(buffer), format, args);
207 va_end(args);
208
209 sendto_match_servs(source_p, target, cap, NOCAPS,
210 "%s %s %s",
211 command, target, buffer);
212 sendto_match_servs(source_p, target, CAP_ENCAP, cap,
213 "ENCAP %s %s %s",
214 target, command, buffer);
215}
216
217void
218cluster_generic(struct Client *source_p, const char *command,
219 int cltype, int cap, const char *format, ...)
220{
221 char buffer[BUFSIZE];
222 struct remote_conf *shared_p;
223 va_list args;
af81d5a0 224 rb_dlink_node *ptr;
212380e3 225
226 va_start(args, format);
227 ircvsnprintf(buffer, sizeof(buffer), format, args);
228 va_end(args);
229
8e69bb4e 230 RB_DLINK_FOREACH(ptr, cluster_conf_list.head)
212380e3 231 {
232 shared_p = ptr->data;
233
234 if(!(shared_p->flags & cltype))
235 continue;
236
237 sendto_match_servs(source_p, shared_p->server, cap, NOCAPS,
238 "%s %s %s",
239 command, shared_p->server, buffer);
240 sendto_match_servs(source_p, shared_p->server, CAP_ENCAP, cap,
241 "ENCAP %s %s %s",
242 shared_p->server, command, buffer);
243 }
244}
245
246struct oper_conf *
247make_oper_conf(void)
248{
249 struct oper_conf *oper_p = MyMalloc(sizeof(struct oper_conf));
250 return oper_p;
251}
252
253void
254free_oper_conf(struct oper_conf *oper_p)
255{
256 s_assert(oper_p != NULL);
257 if(oper_p == NULL)
258 return;
259
90a3c35b
VY
260 rb_free(oper_p->username);
261 rb_free(oper_p->host);
262 rb_free(oper_p->name);
212380e3 263
264 if(oper_p->passwd)
265 {
266 memset(oper_p->passwd, 0, strlen(oper_p->passwd));
90a3c35b 267 rb_free(oper_p->passwd);
212380e3 268 }
269
270#ifdef HAVE_LIBCRYPTO
90a3c35b 271 rb_free(oper_p->rsa_pubkey_file);
212380e3 272
273 if(oper_p->rsa_pubkey)
274 RSA_free(oper_p->rsa_pubkey);
275#endif
276
90a3c35b 277 rb_free(oper_p);
212380e3 278}
279
280struct oper_conf *
281find_oper_conf(const char *username, const char *host, const char *locip, const char *name)
282{
283 struct oper_conf *oper_p;
284 struct irc_sockaddr_storage ip, cip;
285 char addr[HOSTLEN+1];
286 int bits, cbits;
af81d5a0 287 rb_dlink_node *ptr;
212380e3 288
289 parse_netmask(locip, (struct sockaddr *)&cip, &cbits);
290
8e69bb4e 291 RB_DLINK_FOREACH(ptr, oper_conf_list.head)
212380e3 292 {
293 oper_p = ptr->data;
294
295 /* name/username doesnt match.. */
296 if(irccmp(oper_p->name, name) || !match(oper_p->username, username))
297 continue;
298
299 strlcpy(addr, oper_p->host, sizeof(addr));
300
301 if(parse_netmask(addr, (struct sockaddr *)&ip, &bits) != HM_HOST)
302 {
303 if(ip.ss_family == cip.ss_family &&
304 comp_with_mask_sock((struct sockaddr *)&ip, (struct sockaddr *)&cip, bits))
305 return oper_p;
306 }
307
308 /* we have to compare against the host as well, because its
309 * valid to set a spoof to an IP, which if we only compare
310 * in ip form to sockhost will not necessarily match --anfl
311 */
312 if(match(oper_p->host, host))
313 return oper_p;
314 }
315
316 return NULL;
317}
318
319struct oper_flags
320{
321 int flag;
322 char has;
323 char hasnt;
324};
325static struct oper_flags oper_flagtable[] =
326{
327 { OPER_GLINE, 'G', 'g' },
328 { OPER_KLINE, 'K', 'k' },
329 { OPER_XLINE, 'X', 'x' },
1ebe6ffc 330 { OPER_RESV, 'Q', 'q' },
212380e3 331 { OPER_GLOBKILL, 'O', 'o' },
332 { OPER_LOCKILL, 'C', 'c' },
333 { OPER_REMOTE, 'R', 'r' },
334 { OPER_UNKLINE, 'U', 'u' },
335 { OPER_REHASH, 'H', 'h' },
336 { OPER_DIE, 'D', 'd' },
337 { OPER_ADMIN, 'A', 'a' },
338 { OPER_NICKS, 'N', 'n' },
339 { OPER_OPERWALL, 'L', 'l' },
340 { OPER_SPY, 'S', 's' },
341 { OPER_INVIS, 'P', 'p' },
342 { OPER_REMOTEBAN, 'B', 'b' },
c13a2d9a 343 { OPER_MASSNOTICE, 'M', 'm' },
212380e3 344 { 0, '\0', '\0' }
345};
346
347const char *
348get_oper_privs(int flags)
349{
350 static char buf[20];
351 char *p;
352 int i;
353
354 p = buf;
355
356 for(i = 0; oper_flagtable[i].flag; i++)
357 {
358 if(flags & oper_flagtable[i].flag)
359 *p++ = oper_flagtable[i].has;
360 else
361 *p++ = oper_flagtable[i].hasnt;
362 }
363
364 *p = '\0';
365
366 return buf;
367}
368
369struct server_conf *
370make_server_conf(void)
371{
372 struct server_conf *server_p = MyMalloc(sizeof(struct server_conf));
373 server_p->aftype = AF_INET;
374 return server_p;
375}
376
377void
378free_server_conf(struct server_conf *server_p)
379{
380 s_assert(server_p != NULL);
381 if(server_p == NULL)
382 return;
383
384 if(!EmptyString(server_p->passwd))
385 {
386 memset(server_p->passwd, 0, strlen(server_p->passwd));
90a3c35b 387 rb_free(server_p->passwd);
212380e3 388 }
389
390 if(!EmptyString(server_p->spasswd))
391 {
392 memset(server_p->spasswd, 0, strlen(server_p->spasswd));
90a3c35b 393 rb_free(server_p->spasswd);
212380e3 394 }
395
90a3c35b
VY
396 rb_free(server_p->name);
397 rb_free(server_p->host);
398 rb_free(server_p->class_name);
399 rb_free(server_p);
212380e3 400}
401
402void
403add_server_conf(struct server_conf *server_p)
404{
405 if(EmptyString(server_p->class_name))
406 {
407 DupString(server_p->class_name, "default");
408 server_p->class = default_class;
409 return;
410 }
411
412 server_p->class = find_class(server_p->class_name);
413
414 if(server_p->class == default_class)
415 {
416 conf_report_error("Warning connect::class invalid for %s",
417 server_p->name);
418
90a3c35b 419 rb_free(server_p->class_name);
212380e3 420 DupString(server_p->class_name, "default");
421 }
422
423 if(strchr(server_p->host, '*') || strchr(server_p->host, '?'))
424 return;
425}
426
427struct server_conf *
428find_server_conf(const char *name)
429{
430 struct server_conf *server_p;
af81d5a0 431 rb_dlink_node *ptr;
212380e3 432
8e69bb4e 433 RB_DLINK_FOREACH(ptr, server_conf_list.head)
212380e3 434 {
435 server_p = ptr->data;
436
437 if(ServerConfIllegal(server_p))
438 continue;
439
440 if(match(name, server_p->name))
441 return server_p;
442 }
443
444 return NULL;
445}
446
447void
448attach_server_conf(struct Client *client_p, struct server_conf *server_p)
449{
450 /* already have an attached conf */
451 if(client_p->localClient->att_sconf)
452 {
453 /* short circuit this special case :) */
454 if(client_p->localClient->att_sconf == server_p)
455 return;
456
457 detach_server_conf(client_p);
458 }
459
460 CurrUsers(server_p->class)++;
461
462 client_p->localClient->att_sconf = server_p;
463 server_p->servers++;
464}
465
466void
467detach_server_conf(struct Client *client_p)
468{
469 struct server_conf *server_p = client_p->localClient->att_sconf;
470
471 if(server_p == NULL)
472 return;
473
474 client_p->localClient->att_sconf = NULL;
475 server_p->servers--;
476 CurrUsers(server_p->class)--;
477
478 if(ServerConfIllegal(server_p) && !server_p->servers)
479 {
480 /* the class this one is using may need destroying too */
481 if(MaxUsers(server_p->class) < 0 && CurrUsers(server_p->class) <= 0)
482 free_class(server_p->class);
483
af81d5a0 484 rb_dlinkDelete(&server_p->node, &server_conf_list);
212380e3 485 free_server_conf(server_p);
486 }
487}
488
489void
490set_server_conf_autoconn(struct Client *source_p, char *name, int newval)
491{
492 struct server_conf *server_p;
493
494 if((server_p = find_server_conf(name)) != NULL)
495 {
496 if(newval)
497 server_p->flags |= SERVER_AUTOCONN;
498 else
499 server_p->flags &= ~SERVER_AUTOCONN;
500
501 sendto_realops_snomask(SNO_GENERAL, L_ALL,
502 "%s has changed AUTOCONN for %s to %i",
503 get_oper_name(source_p), name, newval);
504 }
505 else
5366977b 506 sendto_one_notice(source_p, ":Can't find %s", name);
212380e3 507}
508
509struct ConfItem *
510find_xline(const char *gecos, int counter)
511{
512 struct ConfItem *aconf;
af81d5a0 513 rb_dlink_node *ptr;
212380e3 514
8e69bb4e 515 RB_DLINK_FOREACH(ptr, xline_conf_list.head)
212380e3 516 {
517 aconf = ptr->data;
518
519 if(match_esc(aconf->name, gecos))
520 {
521 if(counter)
522 aconf->port++;
523 return aconf;
524 }
525 }
526
527 return NULL;
528}
529
0fdb2570
JT
530struct ConfItem *
531find_xline_mask(const char *gecos)
532{
533 struct ConfItem *aconf;
af81d5a0 534 rb_dlink_node *ptr;
0fdb2570 535
8e69bb4e 536 RB_DLINK_FOREACH(ptr, xline_conf_list.head)
0fdb2570
JT
537 {
538 aconf = ptr->data;
539
540 if(!irccmp(aconf->name, gecos))
541 return aconf;
542 }
543
544 return NULL;
545}
546
212380e3 547struct ConfItem *
548find_nick_resv(const char *name)
549{
550 struct ConfItem *aconf;
af81d5a0 551 rb_dlink_node *ptr;
212380e3 552
8e69bb4e 553 RB_DLINK_FOREACH(ptr, resv_conf_list.head)
212380e3 554 {
555 aconf = ptr->data;
556
557 if(match_esc(aconf->name, name))
558 {
559 aconf->port++;
560 return aconf;
561 }
562 }
563
564 return NULL;
565}
566
0fdb2570
JT
567struct ConfItem *
568find_nick_resv_mask(const char *name)
569{
570 struct ConfItem *aconf;
af81d5a0 571 rb_dlink_node *ptr;
0fdb2570 572
8e69bb4e 573 RB_DLINK_FOREACH(ptr, resv_conf_list.head)
0fdb2570
JT
574 {
575 aconf = ptr->data;
576
577 if(!irccmp(aconf->name, name))
578 return aconf;
579 }
580
581 return NULL;
582}
583
212380e3 584/* clean_resv_nick()
585 *
586 * inputs - nick
587 * outputs - 1 if nick is vaild resv, 0 otherwise
588 * side effects -
589 */
590int
591clean_resv_nick(const char *nick)
592{
593 char tmpch;
594 int as = 0;
595 int q = 0;
596 int ch = 0;
597
598 if(*nick == '-' || IsDigit(*nick))
599 return 0;
600
601 while ((tmpch = *nick++))
602 {
603 if(tmpch == '?' || tmpch == '@' || tmpch == '#')
604 q++;
605 else if(tmpch == '*')
606 as++;
607 else if(IsNickChar(tmpch))
608 ch++;
609 else
610 return 0;
611 }
612
613 if(!ch && as)
614 return 0;
615
616 return 1;
617}
618
619/* valid_wild_card_simple()
620 *
621 * inputs - "thing" to test
622 * outputs - 1 if enough wildcards, else 0
623 * side effects -
624 */
625int
626valid_wild_card_simple(const char *data)
627{
628 const char *p;
629 char tmpch;
630 int nonwild = 0;
7d08aa89 631 int wild = 0;
212380e3 632
633 /* check the string for minimum number of nonwildcard chars */
634 p = data;
635
636 while((tmpch = *p++))
637 {
638 /* found an escape, p points to the char after it, so skip
639 * that and move on.
640 */
7d08aa89 641 if(tmpch == '\\' && *p)
212380e3 642 {
643 p++;
7d08aa89 644 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
645 return 1;
212380e3 646 }
647 else if(!IsMWildChar(tmpch))
648 {
649 /* if we have enough nonwildchars, return */
650 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
651 return 1;
652 }
7d08aa89 653 else
654 wild++;
212380e3 655 }
656
7d08aa89 657 /* strings without wilds are also ok */
658 return wild == 0;
212380e3 659}
660
661time_t
662valid_temp_time(const char *p)
663{
664 time_t result = 0;
665
666 while(*p)
667 {
668 if(IsDigit(*p))
669 {
670 result *= 10;
671 result += ((*p) & 0xF);
672 p++;
673 }
674 else
675 return -1;
676 }
677
678 if(result > (60 * 24 * 7 * 52))
679 result = (60 * 24 * 7 * 52);
680
681 return(result * 60);
682}
683
684static void
685expire_temp_rxlines(void *unused)
686{
687 struct ConfItem *aconf;
af81d5a0 688 rb_dlink_node *ptr;
90a3c35b 689 rb_dlink_node *next_ptr;
212380e3 690 int i;
691
90a3c35b 692 HASH_WALK_SAFE(i, R_MAX, ptr, next_ptr, resvTable)
212380e3 693 {
694 aconf = ptr->data;
695
696 if(aconf->hold && aconf->hold <= CurrentTime)
697 {
698 if(ConfigFileEntry.tkline_expire_notices)
699 sendto_realops_snomask(SNO_GENERAL, L_ALL,
700 "Temporary RESV for [%s] expired",
701 aconf->name);
702
703 free_conf(aconf);
af81d5a0 704 rb_dlinkDestroy(ptr, &resvTable[i]);
212380e3 705 }
706 }
707 HASH_WALK_END
708
90a3c35b 709 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
212380e3 710 {
711 aconf = ptr->data;
712
713 if(aconf->hold && aconf->hold <= CurrentTime)
714 {
715 if(ConfigFileEntry.tkline_expire_notices)
716 sendto_realops_snomask(SNO_GENERAL, L_ALL,
717 "Temporary RESV for [%s] expired",
718 aconf->name);
719 free_conf(aconf);
af81d5a0 720 rb_dlinkDestroy(ptr, &resv_conf_list);
212380e3 721 }
722 }
723
90a3c35b 724 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
212380e3 725 {
726 aconf = ptr->data;
727
728 if(aconf->hold && aconf->hold <= CurrentTime)
729 {
730 if(ConfigFileEntry.tkline_expire_notices)
731 sendto_realops_snomask(SNO_GENERAL, L_ALL,
732 "Temporary X-line for [%s] expired",
733 aconf->name);
734 free_conf(aconf);
af81d5a0 735 rb_dlinkDestroy(ptr, &xline_conf_list);
212380e3 736 }
737 }
738}
739
740unsigned long
741get_nd_count(void)
742{
af81d5a0 743 return(rb_dlink_list_length(&nd_list));
212380e3 744}
745
212380e3 746void
747add_nd_entry(const char *name)
748{
749 struct nd_entry *nd;
750
b37021a4 751 if(irc_dictionary_find(nd_dict, name) != NULL)
212380e3 752 return;
753
754 nd = BlockHeapAlloc(nd_heap);
755
756 strlcpy(nd->name, name, sizeof(nd->name));
757 nd->expire = CurrentTime + ConfigFileEntry.nick_delay;
758
759 /* this list is ordered */
af81d5a0 760 rb_dlinkAddTail(nd, &nd->lnode, &nd_list);
b37021a4
WP
761
762 irc_dictionary_add(nd_dict, nd->name, nd);
212380e3 763}
764
765void
766free_nd_entry(struct nd_entry *nd)
767{
b37021a4
WP
768 irc_dictionary_delete(nd_dict, nd->name);
769
af81d5a0 770 rb_dlinkDelete(&nd->lnode, &nd_list);
212380e3 771 BlockHeapFree(nd_heap, nd);
772}
773
774void
775expire_nd_entries(void *unused)
776{
777 struct nd_entry *nd;
af81d5a0 778 rb_dlink_node *ptr;
90a3c35b 779 rb_dlink_node *next_ptr;
212380e3 780
90a3c35b 781 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, nd_list.head)
212380e3 782 {
783 nd = ptr->data;
784
785 /* this list is ordered - we can stop when we hit the first
786 * entry that doesnt expire..
787 */
788 if(nd->expire > CurrentTime)
789 return;
790
791 free_nd_entry(nd);
792 }
793}
794
795void
796add_tgchange(const char *host)
797{
798 tgchange *target;
799 patricia_node_t *pnode;
800
801 if(find_tgchange(host))
802 return;
803
804 target = MyMalloc(sizeof(tgchange));
805 pnode = make_and_lookup(tgchange_tree, host);
806
807 pnode->data = target;
808 target->pnode = pnode;
809
810 DupString(target->ip, host);
811 target->expiry = CurrentTime + (60*60*12);
812
af81d5a0 813 rb_dlinkAdd(target, &target->node, &tgchange_list);
212380e3 814}
815
816tgchange *
817find_tgchange(const char *host)
818{
819 patricia_node_t *pnode;
820
821 if((pnode = match_exact_string(tgchange_tree, host)))
822 return pnode->data;
823
824 return NULL;
825}
826