#include "numeric.h"
#include "s_conf.h"
#include "s_newconf.h"
-#include "s_log.h"
+#include "logger.h"
#include "s_serv.h"
#include "s_stats.h"
#include "scache.h"
0, /* W */
0, /* X */
0, /* Y */
- 0, /* Z */
+ UMODE_SSLCLIENT, /* Z */
/* 0x5B */ 0, 0, 0, 0, 0, 0, /* 0x60 */
UMODE_ADMIN, /* a */
0, /* b */
char note[NICKLEN + 10];
del_from_client_hash(source_p->name, source_p);
- strlcpy(source_p->name, source_p->preClient->spoofnick, NICKLEN + 1);
+ rb_strlcpy(source_p->name, source_p->preClient->spoofnick, NICKLEN + 1);
add_to_client_hash(source_p->name, source_p);
rb_snprintf(note, NICKLEN + 10, "Nick: %s", source_p->name);
{
sendto_one_notice(source_p, ":*** Notice -- You have an illegal character in your hostname");
- strlcpy(source_p->host, source_p->sockhost, sizeof(source_p->host));
+ rb_strlcpy(source_p->host, source_p->sockhost, sizeof(source_p->host));
}
(xconf = find_xline(source_p->info, 1)) != NULL)
{
ServerStats.is_ref++;
- add_reject(source_p);
+ add_reject(source_p, xconf->name, NULL);
exit_client(client_p, source_p, &me, "Bad user info");
return CLIENT_EXITED;
}
sendto_one_notice(source_p, ":*** Your IP address %s is listed in %s",
source_p->sockhost, source_p->preClient->dnsbl_listed->host);
source_p->preClient->dnsbl_listed->hits++;
- add_reject(source_p);
+ add_reject(source_p, NULL, NULL);
exit_client(client_p, source_p, &me, "*** Banned (DNS blacklist)");
return CLIENT_EXITED;
}
/* end of valid user name check */
/* Store original hostname -- jilles */
- strlcpy(source_p->orighost, source_p->host, HOSTLEN + 1);
+ rb_strlcpy(source_p->orighost, source_p->host, HOSTLEN + 1);
/* Spoof user@host */
if(*source_p->preClient->spoofuser)
- strlcpy(source_p->username, source_p->preClient->spoofuser, USERLEN + 1);
+ rb_strlcpy(source_p->username, source_p->preClient->spoofuser, USERLEN + 1);
if(*source_p->preClient->spoofhost)
{
- strlcpy(source_p->host, source_p->preClient->spoofhost, HOSTLEN + 1);
+ rb_strlcpy(source_p->host, source_p->preClient->spoofhost, HOSTLEN + 1);
if (irccmp(source_p->host, source_p->orighost))
SetDynSpoof(source_p);
}
add_to_id_hash(source_p->id, source_p);
}
+ if (IsSSL(source_p))
+ source_p->umodes |= UMODE_SSLCLIENT;
+
if (source_p->umodes & UMODE_INVISIBLE)
Count.invisi++;
s_assert(!IsClient(source_p));
+ del_unknown_ip(source_p);
rb_dlinkMoveNode(&source_p->localClient->tnode, &unknown_list, &lclient_list);
SetClient(source_p);
if(IsConfExemptKline(aconf))
{
SetExemptKline(source_p);
- sendto_one_notice(source_p, ":*** You are exempt from K/G/X lines. congrats.");
- }
-
- if(IsConfExemptGline(aconf))
- {
- SetExemptGline(source_p);
-
- /* dont send both a kline and gline exempt notice */
- if(!IsConfExemptKline(aconf))
- sendto_one_notice(source_p, ":*** You are exempt from G lines.");
+ sendto_one_notice(source_p, ":*** You are exempt from K/X lines. congrats.");
}
if(IsConfExemptDNSBL(aconf))
/* can only be set on burst */
case 'S':
+ case 'Z':
case ' ':
case '\n':
case '\r':
void
change_nick_user_host(struct Client *target_p, const char *nick, const char *user,
- const char *host, int newts, char *format, ...)
+ const char *host, int newts, const char *format, ...)
{
rb_dlink_node *ptr;
struct Channel *chptr;
target_p->host, nick);
}
- strlcpy(target_p->username, user, sizeof target_p->username);
- strlcpy(target_p->host, host, sizeof target_p->host);
+ rb_strlcpy(target_p->username, user, sizeof target_p->username);
+ rb_strlcpy(target_p->host, host, sizeof target_p->host);
if (changed)
add_history(target_p, 1);
del_from_client_hash(target_p->name, target_p);
- strlcpy(target_p->name, nick, NICKLEN);
+ rb_strlcpy(target_p->name, nick, NICKLEN);
add_to_client_hash(target_p->name, target_p);
if(changed)