/* why ipaddr, and not just source_p->sockhost? --fl */
#if 0
static char ipaddr[HOSTIPLEN];
- inetntop_sock(&source_p->localClient->ip, ipaddr, sizeof(ipaddr));
+ rb_inet_ntop_sock(&source_p->localClient->ip, ipaddr, sizeof(ipaddr));
#endif
sendto_realops_snomask(SNO_UNAUTH, L_ALL,
"Unauthorised client connection from "
}
else
{
- strlcpy(non_ident, "~", sizeof(non_ident));
- strlcat(non_ident, username, sizeof(non_ident));
+ rb_strlcpy(non_ident, "~", sizeof(non_ident));
+ rb_strlcat(non_ident, username, sizeof(non_ident));
aconf = find_address_conf(client_p->host, client_p->sockhost,
non_ident, client_p->username,
(struct sockaddr *) &client_p->localClient->ip,
char *host = p+1;
*p = '\0';
- strlcpy(client_p->username, aconf->name,
+ rb_strlcpy(client_p->username, aconf->name,
sizeof(client_p->username));
- strlcpy(client_p->host, host,
+ rb_strlcpy(client_p->host, host,
sizeof(client_p->host));
*p = '@';
}
else
- strlcpy(client_p->host, aconf->name, sizeof(client_p->host));
+ rb_strlcpy(client_p->host, aconf->name, sizeof(client_p->host));
}
return (attach_iline(client_p, aconf));
}
read_conf_files(NO);
if(ServerInfo.description != NULL)
- strlcpy(me.info, ServerInfo.description, sizeof(me.info));
+ rb_strlcpy(me.info, ServerInfo.description, sizeof(me.info));
else
- strlcpy(me.info, "unknown", sizeof(me.info));
+ rb_strlcpy(me.info, "unknown", sizeof(me.info));
open_logfiles();
return (0);
if(ServerInfo.network_desc == NULL)
ServerInfo.network_desc = rb_strdup(NETWORK_DESC_DEFAULT);
- if(ServerInfo.ssld_count < 1)\r
+ if(ServerInfo.ssld_count < 1)
ServerInfo.ssld_count = 1;
- if(!rb_setup_ssl_server(ServerInfo.ssl_cert, ServerInfo.ssl_private_key, ServerInfo.ssl_dh_params))\r
- {\r
- ilog(L_MAIN, "WARNING: Unable to setup SSL.");\r
- ssl_ok = 0;\r
- } else {\r
- ssl_ok = 1;\r
- send_new_ssl_certs(ServerInfo.ssl_cert, ServerInfo.ssl_private_key, ServerInfo.ssl_dh_params);\r
- }\r
-\r
- if(ServerInfo.ssld_count > get_ssld_count())\r
- {\r
- int start = ServerInfo.ssld_count - get_ssld_count();\r
- /* start up additional ssld if needed */\r
- start_ssldaemon(start, ServerInfo.ssl_cert, ServerInfo.ssl_private_key, ServerInfo.ssl_dh_params);\r
- \r
+ if(!rb_setup_ssl_server(ServerInfo.ssl_cert, ServerInfo.ssl_private_key, ServerInfo.ssl_dh_params))
+ {
+ ilog(L_MAIN, "WARNING: Unable to setup SSL.");
+ ssl_ok = 0;
+ } else {
+ ssl_ok = 1;
+ send_new_ssl_certs(ServerInfo.ssl_cert, ServerInfo.ssl_private_key, ServerInfo.ssl_dh_params);
+ }
+
+ if(ServerInfo.ssld_count > get_ssld_count())
+ {
+ int start = ServerInfo.ssld_count - get_ssld_count();
+ /* start up additional ssld if needed */
+ start_ssldaemon(start, ServerInfo.ssl_cert, ServerInfo.ssl_private_key, ServerInfo.ssl_dh_params);
+
}
if((ConfigFileEntry.client_flood < CLIENT_FLOOD_MIN) ||
- Gozem 2002-07-21
*/
- strlcpy(conffilebuf, filename, sizeof(conffilebuf));
+ rb_strlcpy(conffilebuf, filename, sizeof(conffilebuf));
if((conf_fbfile_in = fopen(filename, "r")) == NULL)
{