]> jfr.im git - irc/rqf/shadowircd.git/blobdiff - modules/m_challenge.c
Make some more files compile.
[irc/rqf/shadowircd.git] / modules / m_challenge.c
index c5ed7c1fb0198c0aad13dd549e00b9003ea42af6..9c2701153322d873c7e0cf466ab92cba4826531d 100644 (file)
@@ -128,7 +128,7 @@ m_challenge(struct Client *client_p, struct Client *source_p, int parc, const ch
                if(!source_p->localClient->challenge)
                        return 0;
 
-               if((CurrentTime - source_p->localClient->chal_time) > CHALLENGE_EXPIRES)
+               if((rb_current_time() - source_p->localClient->chal_time) > CHALLENGE_EXPIRES)
                {
                        sendto_one(source_p, form_str(ERR_PASSWDMISMATCH), me.name, source_p->name);
                        ilog(L_FOPER, "EXPIRED CHALLENGE (%s) by (%s!%s@%s) (%s)",
@@ -226,7 +226,7 @@ m_challenge(struct Client *client_p, struct Client *source_p, int parc, const ch
        if(!generate_challenge(&challenge, &(source_p->localClient->challenge), oper_p->rsa_pubkey))
        {
                char *chal = challenge;
-               source_p->localClient->chal_time = CurrentTime;
+               source_p->localClient->chal_time = rb_current_time();
                for(;;)
                {
                        cnt = strlcpy(chal_line, chal, CHALLENGE_WIDTH);
@@ -240,7 +240,7 @@ m_challenge(struct Client *client_p, struct Client *source_p, int parc, const ch
                sendto_one(source_p, form_str(RPL_ENDOFRSACHALLENGE2), 
                           me.name, source_p->name);
                rb_free(challenge);
-               DupString(source_p->localClient->opername, oper_p->name);
+               source_p->localClient->opername = rb_strdup(oper_p->name);
        }
        else
                sendto_one_notice(source_p, ":Failed to generate challenge.");
@@ -286,11 +286,11 @@ generate_challenge(char **r_challenge, char **r_response, RSA * rsa)
        {
                SHA1_Init(&ctx);
                SHA1_Update(&ctx, (u_int8_t *)secret, CHALLENGE_SECRET_LENGTH);
-               *r_response = MyMalloc(SHA_DIGEST_LENGTH);
+               *r_response = rb_malloc(SHA_DIGEST_LENGTH);
                SHA1_Final((u_int8_t *)*r_response, &ctx);
 
                length = RSA_size(rsa);
-               tmp = MyMalloc(length);
+               tmp = rb_malloc(length);
                ret = RSA_public_encrypt(CHALLENGE_SECRET_LENGTH, secret, tmp, rsa, RSA_PKCS1_OAEP_PADDING);
 
                if (ret >= 0)