]>
Commit | Line | Data |
---|---|---|
212380e3 | 1 | /* |
8ac75529 | 2 | * charybdis: an advanced ircd. |
212380e3 AC |
3 | * parse.c: The message parser. |
4 | * | |
5 | * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center | |
6 | * Copyright (C) 1996-2002 Hybrid Development Team | |
7 | * Copyright (C) 2002-2005 ircd-ratbox development team | |
4d03595d | 8 | * Copyright (C) 2007-2016 William Pitcock |
212380e3 AC |
9 | * |
10 | * This program is free software; you can redistribute it and/or modify | |
11 | * it under the terms of the GNU General Public License as published by | |
12 | * the Free Software Foundation; either version 2 of the License, or | |
13 | * (at your option) any later version. | |
14 | * | |
15 | * This program is distributed in the hope that it will be useful, | |
16 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
17 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
18 | * GNU General Public License for more details. | |
19 | * | |
20 | * You should have received a copy of the GNU General Public License | |
21 | * along with this program; if not, write to the Free Software | |
22 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 | |
23 | * USA | |
212380e3 AC |
24 | */ |
25 | ||
26 | #include "stdinc.h" | |
27 | #include "parse.h" | |
28 | #include "client.h" | |
29 | #include "channel.h" | |
212380e3 | 30 | #include "hash.h" |
4562c604 | 31 | #include "match.h" |
212380e3 AC |
32 | #include "ircd.h" |
33 | #include "numeric.h" | |
4016731b | 34 | #include "logger.h" |
212380e3 AC |
35 | #include "s_stats.h" |
36 | #include "send.h" | |
37 | #include "msg.h" | |
4d03595d | 38 | #include "msgbuf.h" |
212380e3 | 39 | #include "s_conf.h" |
212380e3 AC |
40 | #include "s_serv.h" |
41 | #include "packet.h" | |
77d3d2db | 42 | #include "s_assert.h" |
212380e3 | 43 | |
4177311e EM |
44 | rb_dictionary *cmd_dict = NULL; |
45 | rb_dictionary *alias_dict = NULL; | |
8ac75529 | 46 | |
29c92cf9 | 47 | static void cancel_clients(struct Client *, struct Client *); |
1579e155 | 48 | static void remove_unknown(struct Client *, const char *, char *); |
212380e3 | 49 | |
4d03595d | 50 | static void do_numeric(int, struct Client *, struct Client *, int, const char **); |
212380e3 AC |
51 | static void do_alias(struct alias_entry *, struct Client *, char *); |
52 | ||
4a84a763 | 53 | static int handle_command(struct Message *, struct MsgBuf *, struct Client *, struct Client *); |
212380e3 | 54 | |
212380e3 AC |
55 | static char buffer[1024]; |
56 | ||
212380e3 AC |
57 | /* turn a string into a parc/parv pair */ |
58 | ||
e4603e3d AC |
59 | char *reconstruct_parv(int parc, const char *parv[]) |
60 | { | |
61 | static char tmpbuf[BUFSIZE]; int i; | |
62 | ||
63 | rb_strlcpy(tmpbuf, parv[0], BUFSIZE); | |
64 | for (i = 1; i < parc; i++) | |
65 | { | |
66 | rb_strlcat(tmpbuf, " ", BUFSIZE); | |
67 | rb_strlcat(tmpbuf, parv[i], BUFSIZE); | |
68 | } | |
69 | return tmpbuf; | |
70 | } | |
212380e3 | 71 | |
212380e3 AC |
72 | /* parse() |
73 | * | |
819dd2d2 | 74 | * given a raw buffer, parses it and generates parv and parc |
212380e3 AC |
75 | */ |
76 | void | |
77 | parse(struct Client *client_p, char *pbuffer, char *bufend) | |
78 | { | |
79 | struct Client *from = client_p; | |
212380e3 | 80 | char *end; |
e23126c8 | 81 | int res; |
4d03595d | 82 | int numeric = 0; |
212380e3 | 83 | struct Message *mptr; |
4d03595d | 84 | struct MsgBuf msgbuf; |
212380e3 AC |
85 | |
86 | s_assert(MyConnect(client_p)); | |
8c23bb2e | 87 | s_assert(client_p->localClient->F != NULL); |
212380e3 AC |
88 | if(IsAnyDead(client_p)) |
89 | return; | |
90 | ||
4d03595d | 91 | end = bufend - 1; |
212380e3 | 92 | |
4d03595d AC |
93 | /* XXX this should be done before parse() is called */ |
94 | if(*end == '\n') | |
95 | *end-- = '\0'; | |
96 | if(*end == '\r') | |
97 | *end = '\0'; | |
212380e3 | 98 | |
4d03595d AC |
99 | res = msgbuf_parse(&msgbuf, pbuffer); |
100 | if (res) | |
212380e3 | 101 | { |
4d03595d AC |
102 | ServerStats.is_empt++; |
103 | return; | |
104 | } | |
212380e3 | 105 | |
5a5f173d | 106 | if (msgbuf.origin != NULL && IsServer(client_p)) |
4d03595d AC |
107 | { |
108 | from = find_client(msgbuf.origin); | |
212380e3 | 109 | |
4d03595d AC |
110 | /* didnt find any matching client, issue a kill */ |
111 | if(from == NULL) | |
212380e3 | 112 | { |
4d03595d | 113 | ServerStats.is_unpf++; |
1579e155 | 114 | remove_unknown(client_p, msgbuf.origin, pbuffer); |
4d03595d | 115 | return; |
212380e3 AC |
116 | } |
117 | ||
4d03595d AC |
118 | /* fake direction, hmm. */ |
119 | if(from->from != client_p) | |
212380e3 | 120 | { |
4d03595d AC |
121 | ServerStats.is_wrdi++; |
122 | cancel_clients(client_p, from); | |
123 | return; | |
212380e3 | 124 | } |
212380e3 AC |
125 | } |
126 | ||
4d03595d | 127 | if(IsDigit(*msgbuf.cmd) && IsDigit(*(msgbuf.cmd + 1)) && IsDigit(*(msgbuf.cmd + 2))) |
212380e3 AC |
128 | { |
129 | mptr = NULL; | |
4d03595d | 130 | numeric = atoi(msgbuf.cmd); |
47adde3d | 131 | ServerStats.is_num++; |
212380e3 AC |
132 | } |
133 | else | |
134 | { | |
a4bf26dd | 135 | mptr = rb_dictionary_retrieve(cmd_dict, msgbuf.cmd); |
212380e3 AC |
136 | |
137 | /* no command or its encap only, error */ | |
138 | if(!mptr || !mptr->cmd) | |
139 | { | |
4d03595d | 140 | if (IsPerson(client_p)) |
212380e3 | 141 | { |
a4bf26dd | 142 | struct alias_entry *aptr = rb_dictionary_retrieve(alias_dict, msgbuf.cmd); |
4d03595d | 143 | if (aptr != NULL) |
212380e3 | 144 | { |
1ca8cd52 AC |
145 | if (msgbuf.n_para < 2) |
146 | { | |
147 | sendto_one(client_p, form_str(ERR_NEEDMOREPARAMS), | |
148 | me.name, | |
149 | EmptyString(client_p->name) ? "*" : client_p->name, | |
150 | msgbuf.cmd); | |
151 | return; | |
152 | } | |
153 | ||
20dd3725 | 154 | do_alias(aptr, client_p, reconstruct_parv(msgbuf.n_para - 1, msgbuf.para + 1)); |
4d03595d | 155 | return; |
212380e3 AC |
156 | } |
157 | } | |
4d03595d AC |
158 | if(IsPerson(from)) |
159 | { | |
160 | sendto_one(from, form_str(ERR_UNKNOWNCOMMAND), | |
1579e155 | 161 | me.name, from->name, msgbuf.cmd); |
4d03595d | 162 | } |
47adde3d | 163 | ServerStats.is_unco++; |
212380e3 AC |
164 | return; |
165 | } | |
166 | ||
4d03595d | 167 | mptr->bytes += msgbuf.parselen; |
212380e3 AC |
168 | } |
169 | ||
212380e3 AC |
170 | if(mptr == NULL) |
171 | { | |
4d03595d | 172 | do_numeric(numeric, client_p, from, msgbuf.n_para, msgbuf.para); |
212380e3 AC |
173 | return; |
174 | } | |
175 | ||
4a84a763 | 176 | if(handle_command(mptr, &msgbuf, client_p, from) < -1) |
212380e3 AC |
177 | { |
178 | char *p; | |
179 | for (p = pbuffer; p <= end; p += 8) | |
180 | { | |
181 | /* HACK HACK */ | |
182 | /* Its expected this nasty code can be removed | |
183 | * or rewritten later if still needed. | |
184 | */ | |
44f442e3 | 185 | if((p + 8) > end) |
212380e3 AC |
186 | { |
187 | for (; p <= end; p++) | |
188 | { | |
189 | ilog(L_MAIN, "%02x |%c", p[0], p[0]); | |
190 | } | |
191 | } | |
192 | else | |
193 | ilog(L_MAIN, | |
194 | "%02x %02x %02x %02x %02x %02x %02x %02x |%c%c%c%c%c%c%c%c", | |
195 | p[0], p[1], p[2], p[3], p[4], p[5], | |
196 | p[6], p[7], p[0], p[1], p[2], p[3], p[4], p[5], p[6], p[7]); | |
197 | } | |
198 | } | |
199 | ||
200 | } | |
201 | ||
202 | /* | |
203 | * handle_command | |
204 | * | |
205 | * inputs - pointer to message block | |
4a84a763 | 206 | * - pointer to message buffer |
212380e3 AC |
207 | * - pointer to client |
208 | * - pointer to client message is from | |
212380e3 AC |
209 | * output - -1 if error from server |
210 | * side effects - | |
211 | */ | |
212 | static int | |
4a84a763 | 213 | handle_command(struct Message *mptr, struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *from) |
212380e3 AC |
214 | { |
215 | struct MessageEntry ehandler; | |
216 | MessageHandler handler = 0; | |
217 | char squitreason[80]; | |
218 | ||
219 | if(IsAnyDead(client_p)) | |
220 | return -1; | |
221 | ||
222 | if(IsServer(client_p)) | |
223 | mptr->rcount++; | |
224 | ||
225 | mptr->count++; | |
226 | ||
212380e3 AC |
227 | ehandler = mptr->handlers[from->handler]; |
228 | handler = ehandler.handler; | |
229 | ||
230 | /* check right amount of params is passed... --is */ | |
4a84a763 AC |
231 | if(msgbuf_p->n_para < ehandler.min_para || |
232 | (ehandler.min_para && EmptyString(msgbuf_p->para[ehandler.min_para - 1]))) | |
212380e3 AC |
233 | { |
234 | if(!IsServer(client_p)) | |
235 | { | |
236 | sendto_one(client_p, form_str(ERR_NEEDMOREPARAMS), | |
55abcbb2 KB |
237 | me.name, |
238 | EmptyString(client_p->name) ? "*" : client_p->name, | |
212380e3 AC |
239 | mptr->cmd); |
240 | if(MyClient(client_p)) | |
241 | return (1); | |
242 | else | |
243 | return (-1); | |
244 | } | |
245 | ||
246 | sendto_realops_snomask(SNO_GENERAL, L_ALL, | |
247 | "Dropping server %s due to (invalid) command '%s'" | |
66769bc1 | 248 | " with only %zu arguments (expecting %zu).", |
4a84a763 | 249 | client_p->name, mptr->cmd, msgbuf_p->n_para, ehandler.min_para); |
212380e3 | 250 | ilog(L_SERVER, |
66769bc1 | 251 | "Insufficient parameters (%zu < %zu) for command '%s' from %s.", |
4a84a763 | 252 | msgbuf_p->n_para, ehandler.min_para, mptr->cmd, client_p->name); |
5203cba5 | 253 | snprintf(squitreason, sizeof squitreason, |
66769bc1 | 254 | "Insufficient parameters (%zu < %zu) for command '%s'", |
4a84a763 | 255 | msgbuf_p->n_para, ehandler.min_para, mptr->cmd); |
212380e3 AC |
256 | exit_client(client_p, client_p, client_p, squitreason); |
257 | return (-1); | |
258 | } | |
259 | ||
4a84a763 | 260 | (*handler) (msgbuf_p, client_p, from, msgbuf_p->n_para, msgbuf_p->para); |
212380e3 AC |
261 | return (1); |
262 | } | |
263 | ||
264 | void | |
4a84a763 | 265 | handle_encap(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, |
212380e3 AC |
266 | const char *command, int parc, const char *parv[]) |
267 | { | |
268 | struct Message *mptr; | |
269 | struct MessageEntry ehandler; | |
270 | MessageHandler handler = 0; | |
271 | ||
a4bf26dd | 272 | mptr = rb_dictionary_retrieve(cmd_dict, command); |
212380e3 AC |
273 | |
274 | if(mptr == NULL || mptr->cmd == NULL) | |
275 | return; | |
276 | ||
277 | ehandler = mptr->handlers[ENCAP_HANDLER]; | |
278 | handler = ehandler.handler; | |
279 | ||
66769bc1 | 280 | if((size_t)parc < ehandler.min_para || |
212380e3 AC |
281 | (ehandler.min_para && EmptyString(parv[ehandler.min_para - 1]))) |
282 | return; | |
283 | ||
4a84a763 | 284 | (*handler) (msgbuf_p, client_p, source_p, parc, parv); |
212380e3 AC |
285 | } |
286 | ||
287 | /* | |
288 | * clear_hash_parse() | |
289 | * | |
290 | * inputs - | |
291 | * output - NONE | |
292 | * side effects - MUST MUST be called at startup ONCE before | |
293 | * any other keyword hash routine is used. | |
212380e3 AC |
294 | */ |
295 | void | |
296 | clear_hash_parse() | |
297 | { | |
a4bf26dd | 298 | cmd_dict = rb_dictionary_create("command", strcasecmp); |
212380e3 AC |
299 | } |
300 | ||
301 | /* mod_add_cmd | |
302 | * | |
303 | * inputs - command name | |
304 | * - pointer to struct Message | |
305 | * output - none | |
306 | * side effects - load this one command name | |
307 | * msg->count msg->bytes is modified in place, in | |
308 | * modules address space. Might not want to do that... | |
309 | */ | |
310 | void | |
311 | mod_add_cmd(struct Message *msg) | |
312 | { | |
212380e3 AC |
313 | s_assert(msg != NULL); |
314 | if(msg == NULL) | |
315 | return; | |
316 | ||
a4bf26dd | 317 | if (rb_dictionary_find(cmd_dict, msg->cmd) != NULL) |
8ac75529 | 318 | return; |
212380e3 AC |
319 | |
320 | msg->count = 0; | |
321 | msg->rcount = 0; | |
322 | msg->bytes = 0; | |
323 | ||
a4bf26dd | 324 | rb_dictionary_add(cmd_dict, msg->cmd, msg); |
212380e3 AC |
325 | } |
326 | ||
327 | /* mod_del_cmd | |
328 | * | |
329 | * inputs - command name | |
330 | * output - none | |
331 | * side effects - unload this one command name | |
332 | */ | |
333 | void | |
334 | mod_del_cmd(struct Message *msg) | |
335 | { | |
212380e3 AC |
336 | s_assert(msg != NULL); |
337 | if(msg == NULL) | |
338 | return; | |
339 | ||
a4bf26dd | 340 | rb_dictionary_delete(cmd_dict, msg->cmd); |
212380e3 AC |
341 | } |
342 | ||
212380e3 AC |
343 | /* cancel_clients() |
344 | * | |
345 | * inputs - client who sent us the message, client with fake | |
29c92cf9 | 346 | * direction |
212380e3 AC |
347 | * outputs - a given warning about the fake direction |
348 | * side effects - | |
349 | */ | |
350 | static void | |
29c92cf9 | 351 | cancel_clients(struct Client *client_p, struct Client *source_p) |
212380e3 AC |
352 | { |
353 | /* ok, fake prefix happens naturally during a burst on a nick | |
354 | * collision with TS5, we cant kill them because one client has to | |
355 | * survive, so we just send an error. | |
356 | */ | |
357 | if(IsServer(source_p) || IsMe(source_p)) | |
358 | { | |
359 | sendto_realops_snomask(SNO_DEBUG, L_ALL, | |
360 | "Message for %s[%s] from %s", | |
361 | source_p->name, source_p->from->name, | |
b3ebc7ab | 362 | client_p->name); |
212380e3 AC |
363 | } |
364 | else | |
365 | { | |
366 | sendto_realops_snomask(SNO_DEBUG, L_ALL, | |
367 | "Message for %s[%s@%s!%s] from %s (TS, ignored)", | |
368 | source_p->name, | |
369 | source_p->username, | |
370 | source_p->host, | |
371 | source_p->from->name, | |
b3ebc7ab | 372 | client_p->name); |
212380e3 AC |
373 | } |
374 | } | |
375 | ||
376 | /* remove_unknown() | |
377 | * | |
378 | * inputs - client who gave us message, supposed sender, buffer | |
55abcbb2 | 379 | * output - |
212380e3 AC |
380 | * side effects - kills issued for clients, squits for servers |
381 | */ | |
382 | static void | |
1579e155 | 383 | remove_unknown(struct Client *client_p, const char *lsender, char *lbuffer) |
212380e3 AC |
384 | { |
385 | int slen = strlen(lsender); | |
d45f5ea2 JT |
386 | char sid[4]; |
387 | struct Client *server; | |
212380e3 | 388 | |
ba0711fd | 389 | /* meepfoo is a nickname (ignore) |
212380e3 AC |
390 | * #XXXXXXXX is a UID (KILL) |
391 | * #XX is a SID (SQUIT) | |
392 | * meep.foo is a server (SQUIT) | |
393 | */ | |
55abcbb2 | 394 | if((IsDigit(lsender[0]) && slen == 3) || |
212380e3 AC |
395 | (strchr(lsender, '.') != NULL)) |
396 | { | |
397 | sendto_realops_snomask(SNO_DEBUG, L_ALL, | |
398 | "Unknown prefix (%s) from %s, Squitting %s", | |
b3ebc7ab | 399 | lbuffer, client_p->name, lsender); |
212380e3 AC |
400 | |
401 | sendto_one(client_p, | |
402 | ":%s SQUIT %s :(Unknown prefix (%s) from %s)", | |
55abcbb2 | 403 | get_id(&me, client_p), lsender, |
212380e3 AC |
404 | lbuffer, client_p->name); |
405 | } | |
d45f5ea2 JT |
406 | else if(!IsDigit(lsender[0])) |
407 | ; | |
408 | else if(slen != 9) | |
409 | sendto_realops_snomask(SNO_DEBUG, L_ALL, | |
410 | "Invalid prefix (%s) from %s", | |
411 | lbuffer, client_p->name); | |
412 | else | |
413 | { | |
414 | memcpy(sid, lsender, 3); | |
415 | sid[3] = '\0'; | |
416 | server = find_server(NULL, sid); | |
417 | if (server != NULL && server->from == client_p) | |
55abcbb2 | 418 | sendto_one(client_p, ":%s KILL %s :%s (Unknown Client)", |
d45f5ea2 JT |
419 | get_id(&me, client_p), lsender, me.name); |
420 | } | |
212380e3 AC |
421 | } |
422 | ||
423 | ||
424 | ||
425 | /* | |
426 | * | |
427 | * parc number of arguments ('sender' counted as one!) | |
212380e3 AC |
428 | * parv[1]..parv[parc-1] |
429 | * pointers to additional parameters, this is a NULL | |
430 | * terminated list (parv[parc] == NULL). | |
431 | * | |
432 | * *WARNING* | |
433 | * Numerics are mostly error reports. If there is something | |
434 | * wrong with the message, just *DROP* it! Don't even think of | |
435 | * sending back a neat error message -- big danger of creating | |
436 | * a ping pong error message... | |
437 | */ | |
438 | static void | |
4d03595d | 439 | do_numeric(int numeric, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) |
212380e3 AC |
440 | { |
441 | struct Client *target_p; | |
442 | struct Channel *chptr; | |
443 | ||
444 | if(parc < 2 || !IsServer(source_p)) | |
445 | return; | |
446 | ||
447 | /* Remap low number numerics. */ | |
4d03595d AC |
448 | if(numeric < 100) |
449 | numeric += 100; | |
212380e3 AC |
450 | |
451 | /* | |
452 | * Prepare the parameter portion of the message into 'buffer'. | |
453 | * (Because the buffer is twice as large as the message buffer | |
454 | * for the socket, no overflow can occur here... ...on current | |
455 | * assumptions--bets are off, if these are changed --msa) | |
456 | * Note: if buffer is non-empty, it will begin with SPACE. | |
457 | */ | |
458 | if(parc > 1) | |
459 | { | |
460 | char *t = buffer; /* Current position within the buffer */ | |
461 | int i; | |
462 | int tl; /* current length of presently being built string in t */ | |
463 | for (i = 2; i < (parc - 1); i++) | |
464 | { | |
5203cba5 | 465 | tl = sprintf(t, " %s", parv[i]); |
212380e3 AC |
466 | t += tl; |
467 | } | |
5203cba5 | 468 | sprintf(t, " :%s", parv[parc - 1]); |
212380e3 AC |
469 | } |
470 | ||
471 | if((target_p = find_client(parv[1])) != NULL) | |
472 | { | |
473 | if(IsMe(target_p)) | |
474 | { | |
475 | /* | |
476 | * We shouldn't get numerics sent to us, | |
477 | * any numerics we do get indicate a bug somewhere.. | |
478 | */ | |
479 | /* ugh. this is here because of nick collisions. when two servers | |
480 | * relink, they burst each other their nicks, then perform collides. | |
481 | * if there is a nick collision, BOTH servers will kill their own | |
482 | * nicks, and BOTH will kill the other servers nick, which wont exist, | |
483 | * because it will have been already killed by the local server. | |
484 | * | |
485 | * unfortunately, as we cant guarantee other servers will do the | |
55abcbb2 | 486 | * "right thing" on a nick collision, we have to keep both kills. |
212380e3 AC |
487 | * ergo we need to ignore ERR_NOSUCHNICK. --fl_ |
488 | */ | |
489 | /* quick comment. This _was_ tried. i.e. assume the other servers | |
490 | * will do the "right thing" and kill a nick that is colliding. | |
491 | * unfortunately, it did not work. --Dianora | |
492 | */ | |
493 | /* note, now we send PING on server connect, we can | |
494 | * also get ERR_NOSUCHSERVER.. | |
495 | */ | |
4d03595d AC |
496 | if(numeric != ERR_NOSUCHNICK && |
497 | numeric != ERR_NOSUCHSERVER) | |
212380e3 | 498 | sendto_realops_snomask(SNO_GENERAL, L_ADMIN, |
4d03595d | 499 | "*** %s(via %s) sent a %03d numeric to me: %s", |
212380e3 AC |
500 | source_p->name, |
501 | client_p->name, numeric, buffer); | |
502 | return; | |
503 | } | |
504 | else if(target_p->from == client_p) | |
505 | { | |
506 | /* This message changed direction (nick collision?) | |
507 | * ignore it. | |
508 | */ | |
509 | return; | |
510 | } | |
511 | ||
512 | /* csircd will send out unknown umode flag for +a (admin), drop it here. */ | |
4d03595d | 513 | if(numeric == ERR_UMODEUNKNOWNFLAG && MyClient(target_p)) |
212380e3 AC |
514 | return; |
515 | ||
516 | /* Fake it for server hiding, if its our client */ | |
4d03595d | 517 | sendto_one(target_p, ":%s %03d %s%s", |
55abcbb2 | 518 | get_id(source_p, target_p), numeric, |
212380e3 AC |
519 | get_id(target_p, target_p), buffer); |
520 | return; | |
521 | } | |
522 | else if((chptr = find_channel(parv[1])) != NULL) | |
06b697a2 | 523 | sendto_channel_flags(client_p, ALL_MEMBERS, source_p, chptr, |
4d03595d | 524 | "%03d %s%s", |
06b697a2 | 525 | numeric, chptr->chname, buffer); |
212380e3 AC |
526 | } |
527 | ||
528 | static void do_alias(struct alias_entry *aptr, struct Client *source_p, char *text) | |
529 | { | |
530 | char *p; | |
531 | struct Client *target_p; | |
532 | ||
533 | if (!IsFloodDone(source_p) && source_p->localClient->receiveM > 20) | |
534 | flood_endgrace(source_p); | |
535 | ||
536 | p = strchr(aptr->target, '@'); | |
537 | if (p != NULL) | |
538 | { | |
539 | /* user@server */ | |
540 | target_p = find_server(NULL, p + 1); | |
541 | if (target_p != NULL && IsMe(target_p)) | |
542 | target_p = NULL; | |
543 | } | |
544 | else | |
545 | { | |
546 | /* nick, must be +S */ | |
547 | target_p = find_named_person(aptr->target); | |
548 | if (target_p != NULL && !IsService(target_p)) | |
549 | target_p = NULL; | |
550 | } | |
551 | ||
552 | if (target_p == NULL) | |
553 | { | |
554 | sendto_one_numeric(source_p, ERR_SERVICESDOWN, form_str(ERR_SERVICESDOWN), aptr->target); | |
555 | return; | |
556 | } | |
557 | ||
558 | if (text != NULL && *text == ':') | |
559 | text++; | |
560 | if (text == NULL || *text == '\0') | |
561 | { | |
562 | sendto_one(source_p, form_str(ERR_NOTEXTTOSEND), me.name, source_p->name); | |
563 | return; | |
564 | } | |
565 | ||
566 | /* increment the hitcounter on this alias */ | |
567 | aptr->hits++; | |
568 | ||
569 | sendto_one(target_p, ":%s PRIVMSG %s :%s", | |
570 | get_id(source_p, target_p), | |
571 | p != NULL ? aptr->target : get_id(target_p, target_p), | |
572 | text); | |
573 | } | |
574 | ||
3c7d6fcc | 575 | void |
4a84a763 | 576 | m_not_oper(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) |
212380e3 AC |
577 | { |
578 | sendto_one_numeric(source_p, ERR_NOPRIVILEGES, form_str(ERR_NOPRIVILEGES)); | |
212380e3 AC |
579 | } |
580 | ||
3c7d6fcc | 581 | void |
4a84a763 | 582 | m_unregistered(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) |
212380e3 AC |
583 | { |
584 | /* bit of a hack. | |
585 | * I don't =really= want to waste a bit in a flag | |
586 | * number_of_nick_changes is only really valid after the client | |
587 | * is fully registered.. | |
588 | */ | |
589 | if(client_p->localClient->number_of_nick_changes == 0) | |
590 | { | |
591 | sendto_one(client_p, form_str(ERR_NOTREGISTERED), me.name); | |
592 | client_p->localClient->number_of_nick_changes++; | |
593 | } | |
212380e3 AC |
594 | } |
595 | ||
3c7d6fcc | 596 | void |
4a84a763 | 597 | m_registered(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) |
212380e3 AC |
598 | { |
599 | sendto_one(client_p, form_str(ERR_ALREADYREGISTRED), me.name, source_p->name); | |
212380e3 AC |
600 | } |
601 | ||
3c7d6fcc | 602 | void |
4a84a763 | 603 | m_ignore(struct MsgBuf *msgbuf_p, struct Client *client_p, struct Client *source_p, int parc, const char *parv[]) |
212380e3 | 604 | { |
3c7d6fcc | 605 | /* Does nothing */ |
212380e3 | 606 | } |