#define sendheader(c, r) sendto_one_notice(c, HeaderMessages[(r)])
-static dlink_list auth_poll_list;
+static rb_dlink_list auth_poll_list;
static BlockHeap *auth_heap;
static EVH timeout_auth_queries_event;
return;
client->localClient->auth_request = NULL;
- dlinkDelete(&auth->node, &auth_poll_list);
+ rb_dlinkDelete(&auth->node, &auth_poll_list);
free_auth_request(auth);
if(client->localClient->F->fd > highest_fd)
highest_fd = client->localClient->F->fd;
* -- adrian
*/
client->localClient->allow_read = MAX_FLOOD;
- comm_setflush(client->localClient->F->fd, 1000, flood_recalc, client);
- dlinkAddTail(client, &client->node, &global_client_list);
+ rb_setflush(client->localClient->F->fd, 1000, flood_recalc, client);
+ rb_dlinkAddTail(client, &client->node, &global_client_list);
read_packet(client->localClient->F->fd, client);
}
sendto_realops_snomask(SNO_GENERAL, L_ALL,
"auth_dns_callback(): auth->client->localClient (%s) is NULL", get_client_name(auth->client, HIDE_IP));
- dlinkDelete(&auth->node, &auth_poll_list);
+ rb_dlinkDelete(&auth->node, &auth_poll_list);
free_auth_request(auth);
/* and they will silently drop through and all will hopefully be ok... -nenolod */
{
++ServerStats->is_abad;
- comm_close(auth->fd);
+ rb_close(auth->fd);
auth->fd = -1;
ClearAuth(auth);
return 0;
family = auth->client->localClient->ip.ss_family;
- if((fd = comm_socket(family, SOCK_STREAM, 0, "ident")) == -1)
+ if((fd = rb_socket(family, SOCK_STREAM, 0, "ident")) == -1)
{
report_error("creating auth stream socket %s:%s",
get_client_name(auth->client, SHOW_IP),
/*
* TBD: this is a pointless arbitrary limit .. we either have a socket or not. -nenolod
*/
- if((comm_get_maxconnections() - 10) < fd)
+ if((rb_get_maxconnections() - 10) < fd)
{
sendto_realops_snomask(SNO_GENERAL, L_ALL,
"Can't allocate fd for auth on %s",
get_client_name(auth->client, SHOW_IP));
- comm_close(fd);
+ rb_close(fd);
return 0;
}
auth->fd = fd;
SetAuthConnect(auth);
- comm_connect_tcp(fd, auth->client->sockhost, 113,
+ rb_connect_tcp(fd, auth->client->sockhost, 113,
(struct sockaddr *) &localaddr, GET_SS_LEN(localaddr),
auth_connect_callback, auth,
localaddr.ss_family, GlobalSetOptions.ident_timeout);
if(ConfigFileEntry.disable_auth == 0)
start_auth_query(auth);
- dlinkAdd(auth, &auth->node, &auth_poll_list);
+ rb_dlinkAdd(auth, &auth->node, &auth_poll_list);
}
/*
static void
timeout_auth_queries_event(void *notused)
{
- dlink_node *ptr;
- dlink_node *next_ptr;
+ rb_dlink_node *ptr;
+ rb_dlink_node *next_ptr;
struct AuthRequest *auth;
DLINK_FOREACH_SAFE(ptr, next_ptr, auth_poll_list.head)
if(auth->timeout < CurrentTime)
{
if(auth->fd >= 0)
- comm_close(auth->fd);
+ rb_close(auth->fd);
if(IsDoingAuth(auth))
{
}
/*
- * auth_connect_callback() - deal with the result of comm_connect_tcp()
+ * auth_connect_callback() - deal with the result of rb_connect_tcp()
*
* If the connection failed, we simply close the auth fd and report
* a failure. If the connection suceeded send the ident server a query
auth_error(auth);
return;
}
- ircsnprintf(authbuf, sizeof(authbuf), "%u , %u\r\n",
+ rb_snprintf(authbuf, sizeof(authbuf), "%u , %u\r\n",
(unsigned int) ntohs(them.sin_port), (unsigned int) ntohs(us.sin_port));
if(write(auth->fd, authbuf, strlen(authbuf)) == -1)
if(len < 0 && ignoreErrno(errno))
{
- comm_setselect(fd, FDLIST_IDLECLIENT, COMM_SELECT_READ, read_auth_reply, auth, 0);
+ rb_setselect(fd, FDLIST_IDLECLIENT, COMM_SELECT_READ, read_auth_reply, auth, 0);
return;
}
}
}
- comm_close(auth->fd);
+ rb_close(auth->fd);
auth->fd = -1;
ClearAuth(auth);
delete_resolver_queries(&auth->dns_query);
if(auth->fd >= 0)
- comm_close(auth->fd);
+ rb_close(auth->fd);
- dlinkDelete(&auth->node, &auth_poll_list);
+ rb_dlinkDelete(&auth->node, &auth_poll_list);
free_auth_request(auth);
}