]> jfr.im git - irc/rqf/shadowircd.git/blame - src/parse.c
[svn] Remove hash_find_masked_server(), which made it possible
[irc/rqf/shadowircd.git] / src / parse.c
CommitLineData
212380e3 1/*
2 * ircd-ratbox: A slightly useful ircd.
3 * parse.c: The message parser.
4 *
5 * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center
6 * Copyright (C) 1996-2002 Hybrid Development Team
7 * Copyright (C) 2002-2005 ircd-ratbox development team
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
13 *
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307
22 * USA
23 *
f42e9ceb 24 * $Id: parse.c 3177 2007-02-01 00:19:14Z jilles $
212380e3 25 */
26
27#include "stdinc.h"
28#include "parse.h"
29#include "client.h"
30#include "channel.h"
31#include "common.h"
32#include "hash.h"
33#include "irc_string.h"
34#include "sprintf_irc.h"
35#include "ircd.h"
36#include "numeric.h"
37#include "s_log.h"
38#include "s_stats.h"
39#include "send.h"
40#include "msg.h"
41#include "s_conf.h"
42#include "memory.h"
43#include "s_serv.h"
44#include "packet.h"
45
46/*
47 * NOTE: parse() should not be called recursively by other functions!
48 */
49static char *sender;
50
51/* parv[0] == source, and parv[LAST] == NULL */
52static char *para[MAXPARA + 2];
53
54static void cancel_clients(struct Client *, struct Client *, char *);
55static void remove_unknown(struct Client *, char *, char *);
56
57static void do_numeric(char[], struct Client *, struct Client *, int, char **);
58static void do_alias(struct alias_entry *, struct Client *, char *);
59
60static int handle_command(struct Message *, struct Client *, struct Client *, int, const char**);
61
62static int cmd_hash(const char *p);
63static struct Message *hash_parse(const char *);
64static struct alias_entry *alias_parse(const char *);
65
66struct MessageHash *msg_hash_table[MAX_MSG_HASH];
67
68static char buffer[1024];
69
70dlink_list alias_hash_table[MAX_MSG_HASH];
71
72/* turn a string into a parc/parv pair */
73
74
75static inline int
76string_to_array(char *string, char **parv)
77{
78 char *p, *buf = string;
79 int x = 1;
80
81 parv[x] = NULL;
82 while (*buf == ' ') /* skip leading spaces */
83 buf++;
84 if(*buf == '\0') /* ignore all-space args */
85 return x;
86
87 do
88 {
89 if(*buf == ':') /* Last parameter */
90 {
91 buf++;
92 parv[x++] = buf;
93 parv[x] = NULL;
94 return x;
95 }
96 else
97 {
98 parv[x++] = buf;
99 parv[x] = NULL;
100 if((p = strchr(buf, ' ')) != NULL)
101 {
102 *p++ = '\0';
103 buf = p;
104 }
105 else
106 return x;
107 }
108 while (*buf == ' ')
109 buf++;
110 if(*buf == '\0')
111 return x;
112 }
113 /* we can go upto parv[MAXPARA], as parv[0] is taken by source */
114 while (x < MAXPARA);
115
116 if(*p == ':')
117 p++;
118
119 parv[x++] = p;
120 parv[x] = NULL;
121 return x;
122}
123
124/* parse()
125 *
126 * given a raw buffer, parses it and generates parv, parc and sender
127 */
128void
129parse(struct Client *client_p, char *pbuffer, char *bufend)
130{
131 struct Client *from = client_p;
132 char *ch;
133 char *s;
134 char *end;
135 int i = 1;
136 char *numeric = 0;
137 struct Message *mptr;
138
139 s_assert(MyConnect(client_p));
140 s_assert(client_p->localClient->fd >= 0);
141 if(IsAnyDead(client_p))
142 return;
143
144 for (ch = pbuffer; *ch == ' '; ch++) /* skip spaces */
145 /* null statement */ ;
146
147 para[0] = from->name;
148
149 if(*ch == ':')
150 {
151 ch++;
152
153 /* point sender to the sender param */
154 sender = ch;
155
156 if((s = strchr(ch, ' ')))
157 {
158 *s = '\0';
159 s++;
160 ch = s;
161 }
162
163 if(*sender && IsServer(client_p))
164 {
f42e9ceb 165 from = find_client(sender);
212380e3 166
167 /* didnt find any matching client, issue a kill */
168 if(from == NULL)
169 {
170 ServerStats->is_unpf++;
171 remove_unknown(client_p, sender, pbuffer);
172 return;
173 }
174
175 para[0] = from->name;
176
177 /* fake direction, hmm. */
178 if(from->from != client_p)
179 {
180 ServerStats->is_wrdi++;
181 cancel_clients(client_p, from, pbuffer);
182 return;
183 }
184 }
185 while (*ch == ' ')
186 ch++;
187 }
188
189 if(*ch == '\0')
190 {
191 ServerStats->is_empt++;
192 return;
193 }
194
195 /* at this point there must be some sort of command parameter */
196
197 /*
198 * Extract the command code from the packet. Point s to the end
199 * of the command code and calculate the length using pointer
200 * arithmetic. Note: only need length for numerics and *all*
201 * numerics must have parameters and thus a space after the command
202 * code. -avalon
203 */
204
205 /* EOB is 3 chars long but is not a numeric */
206
207 if(*(ch + 3) == ' ' && /* ok, lets see if its a possible numeric.. */
208 IsDigit(*ch) && IsDigit(*(ch + 1)) && IsDigit(*(ch + 2)))
209 {
210 mptr = NULL;
211 numeric = ch;
212 ServerStats->is_num++;
213 s = ch + 3; /* I know this is ' ' from above if */
214 *s++ = '\0'; /* blow away the ' ', and point s to next part */
215 }
216 else
217 {
218 int ii = 0;
219
220 if((s = strchr(ch, ' ')))
221 *s++ = '\0';
222
223 mptr = hash_parse(ch);
224
225 /* no command or its encap only, error */
226 if(!mptr || !mptr->cmd)
227 {
228 /*
229 * Note: Give error message *only* to recognized
230 * persons. It's a nightmare situation to have
231 * two programs sending "Unknown command"'s or
232 * equivalent to each other at full blast....
233 * If it has got to person state, it at least
234 * seems to be well behaving. Perhaps this message
235 * should never be generated, though... --msa
236 * Hm, when is the buffer empty -- if a command
237 * code has been found ?? -Armin
238 */
239 if(pbuffer[0] != '\0')
240 {
241 if (IsPerson(client_p))
242 {
243 struct alias_entry *aptr = alias_parse(ch);
244 if (aptr != NULL)
245 {
246 do_alias(aptr, client_p, s);
247 return;
248 }
249 }
250 if(IsPerson(from))
251 {
252 sendto_one(from, form_str(ERR_UNKNOWNCOMMAND),
253 me.name, from->name, ch);
254 }
255 }
256 ServerStats->is_unco++;
257 return;
258 }
259
260 ii = bufend - ((s) ? s : ch);
261 mptr->bytes += ii;
262 }
263
264 end = bufend - 1;
265
266 /* XXX this should be done before parse() is called */
267 if(*end == '\n')
268 *end-- = '\0';
269 if(*end == '\r')
270 *end = '\0';
271
272 if(s != NULL)
273 i = string_to_array(s, para);
274
275 if(mptr == NULL)
276 {
277 do_numeric(numeric, client_p, from, i, para);
278 return;
279 }
280
281 if(handle_command(mptr, client_p, from, i, /* XXX discards const!!! */ (const char **)para) < -1)
282 {
283 char *p;
284 for (p = pbuffer; p <= end; p += 8)
285 {
286 /* HACK HACK */
287 /* Its expected this nasty code can be removed
288 * or rewritten later if still needed.
289 */
290 if((unsigned long) (p + 8) > (unsigned long) end)
291 {
292 for (; p <= end; p++)
293 {
294 ilog(L_MAIN, "%02x |%c", p[0], p[0]);
295 }
296 }
297 else
298 ilog(L_MAIN,
299 "%02x %02x %02x %02x %02x %02x %02x %02x |%c%c%c%c%c%c%c%c",
300 p[0], p[1], p[2], p[3], p[4], p[5],
301 p[6], p[7], p[0], p[1], p[2], p[3], p[4], p[5], p[6], p[7]);
302 }
303 }
304
305}
306
307/*
308 * handle_command
309 *
310 * inputs - pointer to message block
311 * - pointer to client
312 * - pointer to client message is from
313 * - count of number of args
314 * - pointer to argv[] array
315 * output - -1 if error from server
316 * side effects -
317 */
318static int
319handle_command(struct Message *mptr, struct Client *client_p,
320 struct Client *from, int i, const char** hpara)
321{
322 struct MessageEntry ehandler;
323 MessageHandler handler = 0;
324 char squitreason[80];
325
326 if(IsAnyDead(client_p))
327 return -1;
328
329 if(IsServer(client_p))
330 mptr->rcount++;
331
332 mptr->count++;
333
334 /* New patch to avoid server flooding from unregistered connects
335 - Pie-Man 07/27/2000 */
336
337 if(!IsRegistered(client_p))
338 {
339 /* if its from a possible server connection
340 * ignore it.. more than likely its a header thats sneaked through
341 */
342
343 if(IsAnyServer(client_p) && !(mptr->flags & MFLG_UNREG))
344 return (1);
345 }
346
347 ehandler = mptr->handlers[from->handler];
348 handler = ehandler.handler;
349
350 /* check right amount of params is passed... --is */
351 if(i < ehandler.min_para ||
352 (ehandler.min_para && EmptyString(hpara[ehandler.min_para - 1])))
353 {
354 if(!IsServer(client_p))
355 {
356 sendto_one(client_p, form_str(ERR_NEEDMOREPARAMS),
357 me.name,
358 EmptyString(client_p->name) ? "*" : client_p->name,
359 mptr->cmd);
360 if(MyClient(client_p))
361 return (1);
362 else
363 return (-1);
364 }
365
366 sendto_realops_snomask(SNO_GENERAL, L_ALL,
367 "Dropping server %s due to (invalid) command '%s'"
368 " with only %d arguments (expecting %d).",
369 client_p->name, mptr->cmd, i, ehandler.min_para);
370 ilog(L_SERVER,
371 "Insufficient parameters (%d < %d) for command '%s' from %s.",
372 i, ehandler.min_para, mptr->cmd, client_p->name);
373 snprintf(squitreason, sizeof squitreason,
374 "Insufficient parameters (%d < %d) for command '%s'",
375 i, ehandler.min_para, mptr->cmd);
376 exit_client(client_p, client_p, client_p, squitreason);
377 return (-1);
378 }
379
380 (*handler) (client_p, from, i, hpara);
381 return (1);
382}
383
384void
385handle_encap(struct Client *client_p, struct Client *source_p,
386 const char *command, int parc, const char *parv[])
387{
388 struct Message *mptr;
389 struct MessageEntry ehandler;
390 MessageHandler handler = 0;
391
392 parv[0] = source_p->name;
393
394 mptr = hash_parse(command);
395
396 if(mptr == NULL || mptr->cmd == NULL)
397 return;
398
399 ehandler = mptr->handlers[ENCAP_HANDLER];
400 handler = ehandler.handler;
401
402 if(parc < ehandler.min_para ||
403 (ehandler.min_para && EmptyString(parv[ehandler.min_para - 1])))
404 return;
405
406 (*handler) (client_p, source_p, parc, parv);
407}
408
409/*
410 * clear_hash_parse()
411 *
412 * inputs -
413 * output - NONE
414 * side effects - MUST MUST be called at startup ONCE before
415 * any other keyword hash routine is used.
416 *
417 */
418void
419clear_hash_parse()
420{
421 memset(msg_hash_table, 0, sizeof(msg_hash_table));
422}
423
424/* mod_add_cmd
425 *
426 * inputs - command name
427 * - pointer to struct Message
428 * output - none
429 * side effects - load this one command name
430 * msg->count msg->bytes is modified in place, in
431 * modules address space. Might not want to do that...
432 */
433void
434mod_add_cmd(struct Message *msg)
435{
436 struct MessageHash *ptr;
437 struct MessageHash *last_ptr = NULL;
438 struct MessageHash *new_ptr;
439 int msgindex;
440
441 s_assert(msg != NULL);
442 if(msg == NULL)
443 return;
444
445 msgindex = cmd_hash(msg->cmd);
446
447 for (ptr = msg_hash_table[msgindex]; ptr; ptr = ptr->next)
448 {
449 if(strcasecmp(msg->cmd, ptr->cmd) == 0)
450 return; /* Its already added */
451 last_ptr = ptr;
452 }
453
454 new_ptr = (struct MessageHash *) MyMalloc(sizeof(struct MessageHash));
455
456 new_ptr->next = NULL;
457 DupString(new_ptr->cmd, msg->cmd);
458 new_ptr->msg = msg;
459
460 msg->count = 0;
461 msg->rcount = 0;
462 msg->bytes = 0;
463
464 if(last_ptr == NULL)
465 msg_hash_table[msgindex] = new_ptr;
466 else
467 last_ptr->next = new_ptr;
468}
469
470/* mod_del_cmd
471 *
472 * inputs - command name
473 * output - none
474 * side effects - unload this one command name
475 */
476void
477mod_del_cmd(struct Message *msg)
478{
479 struct MessageHash *ptr;
480 struct MessageHash *last_ptr = NULL;
481 int msgindex;
482
483 s_assert(msg != NULL);
484 if(msg == NULL)
485 return;
486
487 msgindex = cmd_hash(msg->cmd);
488
489 for (ptr = msg_hash_table[msgindex]; ptr; ptr = ptr->next)
490 {
491 if(strcasecmp(msg->cmd, ptr->cmd) == 0)
492 {
493 MyFree(ptr->cmd);
494 if(last_ptr != NULL)
495 last_ptr->next = ptr->next;
496 else
497 msg_hash_table[msgindex] = ptr->next;
498 MyFree(ptr);
499 return;
500 }
501 last_ptr = ptr;
502 }
503}
504
505/* hash_parse
506 *
507 * inputs - command name
508 * output - pointer to struct Message
509 * side effects -
510 */
511static struct Message *
512hash_parse(const char *cmd)
513{
514 struct MessageHash *ptr;
515 int msgindex;
516
517 msgindex = cmd_hash(cmd);
518
519 for (ptr = msg_hash_table[msgindex]; ptr; ptr = ptr->next)
520 {
521 if(strcasecmp(cmd, ptr->cmd) == 0)
522 return (ptr->msg);
523 }
524
525 return NULL;
526}
527
528/* alias_parse
529 *
530 * inputs - command name
531 * output - pointer to struct Message
532 * side effects -
533 */
534static struct alias_entry *
535alias_parse(const char *cmd)
536{
537 dlink_node *ptr;
538 int msgindex;
539
540 msgindex = cmd_hash(cmd);
541
542 DLINK_FOREACH(ptr, alias_hash_table[msgindex].head)
543 {
544 struct alias_entry *ent = (struct alias_entry *) ptr->data;
545
546 if(strcasecmp(cmd, ent->name) == 0)
547 return ent;
548 }
549
550 return NULL;
551}
552
553/*
554 * hash
555 *
556 * inputs - char string
557 * output - hash index
558 * side effects - NONE
559 *
560 * BUGS - This a HORRIBLE hash function
561 */
562static int
563cmd_hash(const char *p)
564{
565 int hash_val = 0;
566
567 while (*p)
568 {
569 hash_val += ((int) (*p) & 0xDF);
570 p++;
571 }
572
573 return (hash_val % MAX_MSG_HASH);
574}
575
576/*
577 * report_messages
578 *
579 * inputs - pointer to client to report to
580 * output - NONE
581 * side effects - NONE
582 */
583void
584report_messages(struct Client *source_p)
585{
586 int i;
587 struct MessageHash *ptr;
588 dlink_node *pptr;
589
590 for (i = 0; i < MAX_MSG_HASH; i++)
591 {
592 for (ptr = msg_hash_table[i]; ptr; ptr = ptr->next)
593 {
594 s_assert(ptr->msg != NULL);
595 s_assert(ptr->cmd != NULL);
596
597 sendto_one_numeric(source_p, RPL_STATSCOMMANDS,
598 form_str(RPL_STATSCOMMANDS),
599 ptr->cmd, ptr->msg->count,
600 ptr->msg->bytes, ptr->msg->rcount);
601 }
602
603 DLINK_FOREACH(pptr, alias_hash_table[i].head)
604 {
605 struct alias_entry *aptr = (struct alias_entry *) pptr->data;
606
607 s_assert(aptr->name != NULL);
608
609 sendto_one_numeric(source_p, RPL_STATSCOMMANDS,
610 form_str(RPL_STATSCOMMANDS),
611 aptr->name, aptr->hits, 0, 0);
612 }
613 }
614}
615
616/* cancel_clients()
617 *
618 * inputs - client who sent us the message, client with fake
619 * direction, command
620 * outputs - a given warning about the fake direction
621 * side effects -
622 */
623static void
624cancel_clients(struct Client *client_p, struct Client *source_p, char *cmd)
625{
626 /* ok, fake prefix happens naturally during a burst on a nick
627 * collision with TS5, we cant kill them because one client has to
628 * survive, so we just send an error.
629 */
630 if(IsServer(source_p) || IsMe(source_p))
631 {
632 sendto_realops_snomask(SNO_DEBUG, L_ALL,
633 "Message for %s[%s] from %s",
634 source_p->name, source_p->from->name,
635 get_server_name(client_p, SHOW_IP));
636 }
637 else
638 {
639 sendto_realops_snomask(SNO_DEBUG, L_ALL,
640 "Message for %s[%s@%s!%s] from %s (TS, ignored)",
641 source_p->name,
642 source_p->username,
643 source_p->host,
644 source_p->from->name,
645 get_server_name(client_p, SHOW_IP));
646 }
647}
648
649/* remove_unknown()
650 *
651 * inputs - client who gave us message, supposed sender, buffer
652 * output -
653 * side effects - kills issued for clients, squits for servers
654 */
655static void
656remove_unknown(struct Client *client_p, char *lsender, char *lbuffer)
657{
658 int slen = strlen(lsender);
659
660 /* meepfoo is a nickname (KILL)
661 * #XXXXXXXX is a UID (KILL)
662 * #XX is a SID (SQUIT)
663 * meep.foo is a server (SQUIT)
664 */
665 if((IsDigit(lsender[0]) && slen == 3) ||
666 (strchr(lsender, '.') != NULL))
667 {
668 sendto_realops_snomask(SNO_DEBUG, L_ALL,
669 "Unknown prefix (%s) from %s, Squitting %s",
670 lbuffer, get_server_name(client_p, SHOW_IP), lsender);
671
672 sendto_one(client_p,
673 ":%s SQUIT %s :(Unknown prefix (%s) from %s)",
674 get_id(&me, client_p), lsender,
675 lbuffer, client_p->name);
676 }
677 else
678 sendto_one(client_p, ":%s KILL %s :%s (Unknown Client)",
679 get_id(&me, client_p), lsender, me.name);
680}
681
682
683
684/*
685 *
686 * parc number of arguments ('sender' counted as one!)
687 * parv[0] pointer to 'sender' (may point to empty string) (not used)
688 * parv[1]..parv[parc-1]
689 * pointers to additional parameters, this is a NULL
690 * terminated list (parv[parc] == NULL).
691 *
692 * *WARNING*
693 * Numerics are mostly error reports. If there is something
694 * wrong with the message, just *DROP* it! Don't even think of
695 * sending back a neat error message -- big danger of creating
696 * a ping pong error message...
697 */
698static void
699do_numeric(char numeric[], struct Client *client_p, struct Client *source_p, int parc, char *parv[])
700{
701 struct Client *target_p;
702 struct Channel *chptr;
703
704 if(parc < 2 || !IsServer(source_p))
705 return;
706
707 /* Remap low number numerics. */
708 if(numeric[0] == '0')
709 numeric[0] = '1';
710
711 /*
712 * Prepare the parameter portion of the message into 'buffer'.
713 * (Because the buffer is twice as large as the message buffer
714 * for the socket, no overflow can occur here... ...on current
715 * assumptions--bets are off, if these are changed --msa)
716 * Note: if buffer is non-empty, it will begin with SPACE.
717 */
718 if(parc > 1)
719 {
720 char *t = buffer; /* Current position within the buffer */
721 int i;
722 int tl; /* current length of presently being built string in t */
723 for (i = 2; i < (parc - 1); i++)
724 {
725 tl = ircsprintf(t, " %s", parv[i]);
726 t += tl;
727 }
728 ircsprintf(t, " :%s", parv[parc - 1]);
729 }
730
731 if((target_p = find_client(parv[1])) != NULL)
732 {
733 if(IsMe(target_p))
734 {
735 /*
736 * We shouldn't get numerics sent to us,
737 * any numerics we do get indicate a bug somewhere..
738 */
739 /* ugh. this is here because of nick collisions. when two servers
740 * relink, they burst each other their nicks, then perform collides.
741 * if there is a nick collision, BOTH servers will kill their own
742 * nicks, and BOTH will kill the other servers nick, which wont exist,
743 * because it will have been already killed by the local server.
744 *
745 * unfortunately, as we cant guarantee other servers will do the
746 * "right thing" on a nick collision, we have to keep both kills.
747 * ergo we need to ignore ERR_NOSUCHNICK. --fl_
748 */
749 /* quick comment. This _was_ tried. i.e. assume the other servers
750 * will do the "right thing" and kill a nick that is colliding.
751 * unfortunately, it did not work. --Dianora
752 */
753 /* note, now we send PING on server connect, we can
754 * also get ERR_NOSUCHSERVER..
755 */
756 if(atoi(numeric) != ERR_NOSUCHNICK &&
757 atoi(numeric) != ERR_NOSUCHSERVER)
758 sendto_realops_snomask(SNO_GENERAL, L_ADMIN,
759 "*** %s(via %s) sent a %s numeric to me: %s",
760 source_p->name,
761 client_p->name, numeric, buffer);
762 return;
763 }
764 else if(target_p->from == client_p)
765 {
766 /* This message changed direction (nick collision?)
767 * ignore it.
768 */
769 return;
770 }
771
772 /* csircd will send out unknown umode flag for +a (admin), drop it here. */
773 if((atoi(numeric) == ERR_UMODEUNKNOWNFLAG) && MyClient(target_p))
774 return;
775
776 /* Fake it for server hiding, if its our client */
777 sendto_one(target_p, ":%s %s %s%s",
778 get_id(source_p, target_p), numeric,
779 get_id(target_p, target_p), buffer);
780 return;
781 }
782 else if((chptr = find_channel(parv[1])) != NULL)
783 sendto_channel_local(ALL_MEMBERS, chptr,
784 ":%s %s %s %s",
785 source_p->name, numeric, chptr->chname, buffer);
786}
787
788static void do_alias(struct alias_entry *aptr, struct Client *source_p, char *text)
789{
790 char *p;
791 struct Client *target_p;
792
793 if (!IsFloodDone(source_p) && source_p->localClient->receiveM > 20)
794 flood_endgrace(source_p);
795
796 p = strchr(aptr->target, '@');
797 if (p != NULL)
798 {
799 /* user@server */
800 target_p = find_server(NULL, p + 1);
801 if (target_p != NULL && IsMe(target_p))
802 target_p = NULL;
803 }
804 else
805 {
806 /* nick, must be +S */
807 target_p = find_named_person(aptr->target);
808 if (target_p != NULL && !IsService(target_p))
809 target_p = NULL;
810 }
811
812 if (target_p == NULL)
813 {
814 sendto_one_numeric(source_p, ERR_SERVICESDOWN, form_str(ERR_SERVICESDOWN), aptr->target);
815 return;
816 }
817
818 if (text != NULL && *text == ':')
819 text++;
820 if (text == NULL || *text == '\0')
821 {
822 sendto_one(source_p, form_str(ERR_NOTEXTTOSEND), me.name, source_p->name);
823 return;
824 }
825
826 /* increment the hitcounter on this alias */
827 aptr->hits++;
828
829 sendto_one(target_p, ":%s PRIVMSG %s :%s",
830 get_id(source_p, target_p),
831 p != NULL ? aptr->target : get_id(target_p, target_p),
832 text);
833}
834
835int
836m_not_oper(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
837{
838 sendto_one_numeric(source_p, ERR_NOPRIVILEGES, form_str(ERR_NOPRIVILEGES));
839 return 0;
840}
841
842int
843m_unregistered(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
844{
845 /* bit of a hack.
846 * I don't =really= want to waste a bit in a flag
847 * number_of_nick_changes is only really valid after the client
848 * is fully registered..
849 */
850 if(client_p->localClient->number_of_nick_changes == 0)
851 {
852 sendto_one(client_p, form_str(ERR_NOTREGISTERED), me.name);
853 client_p->localClient->number_of_nick_changes++;
854 }
855
856 return 0;
857}
858
859int
860m_registered(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
861{
862 sendto_one(client_p, form_str(ERR_ALREADYREGISTRED), me.name, source_p->name);
863 return 0;
864}
865
866int
867m_ignore(struct Client *client_p, struct Client *source_p, int parc, const char *parv[])
868{
869 return 0;
870}