]>
Commit | Line | Data |
---|---|---|
212380e3 AC |
1 | /* |
2 | * charybdis: A useful ircd. | |
3 | * client.h: The ircd client header. | |
4 | * | |
5 | * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center | |
6 | * Copyright (C) 1996-2002 Hybrid Development Team | |
7 | * Copyright (C) 2002-2004 ircd-ratbox development team | |
8 | * Copyright (C) 2005 William Pitcock and Jilles Tjoelker | |
9 | * | |
10 | * This program is free software; you can redistribute it and/or modify | |
11 | * it under the terms of the GNU General Public License as published by | |
12 | * the Free Software Foundation; either version 2 of the License, or | |
13 | * (at your option) any later version. | |
14 | * | |
15 | * This program is distributed in the hope that it will be useful, | |
16 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
17 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
18 | * GNU General Public License for more details. | |
19 | * | |
20 | * You should have received a copy of the GNU General Public License | |
21 | * along with this program; if not, write to the Free Software | |
22 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 | |
23 | * USA | |
212380e3 AC |
24 | */ |
25 | ||
26 | #ifndef INCLUDED_client_h | |
27 | #define INCLUDED_client_h | |
28 | ||
9b8e9eb3 | 29 | #include "defaults.h" |
212380e3 AC |
30 | |
31 | #include "ircd_defs.h" | |
212380e3 | 32 | #include "channel.h" |
1eeb0469 | 33 | #include "dns.h" |
212380e3 | 34 | #include "snomask.h" |
4562c604 | 35 | #include "match.h" |
212380e3 | 36 | #include "ircd.h" |
ef242716 | 37 | #include "privilege.h" |
212380e3 AC |
38 | |
39 | /* other structs */ | |
40 | struct Blacklist; | |
41 | ||
42 | /* we store ipv6 ips for remote clients, so this needs to be v6 always */ | |
43 | #define HOSTIPLEN 53 /* sizeof("ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255.ipv6") */ | |
154dc91e EM |
44 | #define PASSWDLEN 128 |
45 | #define CIPHERKEYLEN 64 /* 512bit */ | |
46 | #define CLIENT_BUFSIZE 512 /* must be at least 512 bytes */ | |
212380e3 AC |
47 | |
48 | #define IDLEN 10 | |
49 | ||
179becdf | 50 | #define TGCHANGE_NUM 10 /* how many targets we keep track of */ |
c9f01c4f | 51 | #define TGCHANGE_REPLY 5 /* how many reply targets */ |
179becdf JT |
52 | #define TGCHANGE_INITIAL 10 /* initial free targets (normal) */ |
53 | #define TGCHANGE_INITIAL_LOW 4 /* initial free targets (possible spambot) */ | |
ad1d39a7 | 54 | |
212380e3 AC |
55 | /* |
56 | * pre declare structs | |
57 | */ | |
58 | struct ConfItem; | |
59 | struct Whowas; | |
60 | struct DNSReply; | |
61 | struct Listener; | |
62 | struct Client; | |
63 | struct User; | |
64 | struct Server; | |
65 | struct LocalUser; | |
212380e3 | 66 | struct PreClient; |
999fab77 | 67 | struct ListClient; |
994544c2 | 68 | struct scache_entry; |
c53ca1e0 | 69 | struct ws_ctl; |
212380e3 | 70 | |
53789fdd SA |
71 | typedef int SSL_OPEN_CB(struct Client *, int status); |
72 | ||
212380e3 AC |
73 | /* |
74 | * Client structures | |
75 | */ | |
76 | struct User | |
77 | { | |
5b96d9a6 AC |
78 | rb_dlink_list channel; /* chain of channel pointer blocks */ |
79 | rb_dlink_list invited; /* chain of invite pointer blocks */ | |
c127b45b | 80 | char *away; /* pointer to away message */ |
212380e3 | 81 | int refcnt; /* Number of times this block is referenced */ |
212380e3 AC |
82 | |
83 | char suser[NICKLEN+1]; | |
84 | }; | |
85 | ||
86 | struct Server | |
87 | { | |
8f103562 | 88 | struct User *user; /* who activated this connection */ |
212380e3 | 89 | char by[NICKLEN]; |
5b96d9a6 AC |
90 | rb_dlink_list servers; |
91 | rb_dlink_list users; | |
212380e3 AC |
92 | int caps; /* capabilities bit-field */ |
93 | char *fullcaps; | |
994544c2 | 94 | struct scache_entry *nameinfo; |
212380e3 AC |
95 | }; |
96 | ||
212380e3 AC |
97 | struct ZipStats |
98 | { | |
8bd5767b JT |
99 | unsigned long long in; |
100 | unsigned long long in_wire; | |
101 | unsigned long long out; | |
102 | unsigned long long out_wire; | |
103 | double in_ratio; | |
212380e3 AC |
104 | double out_ratio; |
105 | }; | |
106 | ||
107 | struct Client | |
108 | { | |
5b96d9a6 AC |
109 | rb_dlink_node node; |
110 | rb_dlink_node lnode; | |
8f103562 JT |
111 | struct User *user; /* ...defined, if this is a User */ |
112 | struct Server *serv; /* ...defined, if this is a server */ | |
113 | struct Client *servptr; /* Points to server this Client is on */ | |
114 | struct Client *from; /* == self, if Local Client, *NEVER* NULL! */ | |
212380e3 | 115 | |
b47f8a4f AC |
116 | rb_dlink_list whowas_clist; |
117 | ||
212380e3 AC |
118 | time_t tsinfo; /* TS on the nick, SVINFO on server */ |
119 | unsigned int umodes; /* opers, normal users subset */ | |
66f7fe67 | 120 | uint64_t flags; /* client flags */ |
212380e3 AC |
121 | |
122 | unsigned int snomask; /* server notice mask */ | |
123 | ||
124 | int hopcount; /* number of servers to this 0 = local */ | |
125 | unsigned short status; /* Client type */ | |
126 | unsigned char handler; /* Handler index */ | |
127 | unsigned long serial; /* used to enforce 1 send per nick */ | |
128 | ||
129 | /* client->name is the unique name for a client nick or host */ | |
130 | char name[HOSTLEN + 1]; | |
131 | ||
55abcbb2 KB |
132 | /* |
133 | * client->username is the username from ident or the USER message, | |
134 | * If the client is idented the USER message is ignored, otherwise | |
135 | * the username part of the USER message is put here prefixed with a | |
212380e3 AC |
136 | * tilde depending on the I:line, Once a client has registered, this |
137 | * field should be considered read-only. | |
138 | */ | |
139 | char username[USERLEN + 1]; /* client's username */ | |
140 | ||
141 | /* | |
142 | * client->host contains the resolved name or ip address | |
143 | * as a string for the user, it may be fiddled with for oper spoofing etc. | |
144 | */ | |
145 | char host[HOSTLEN + 1]; /* client's hostname */ | |
146 | char orighost[HOSTLEN + 1]; /* original hostname (before dynamic spoofing) */ | |
147 | char sockhost[HOSTIPLEN + 1]; /* clients ip */ | |
148 | char info[REALLEN + 1]; /* Free form additional client info */ | |
149 | ||
150 | char id[IDLEN]; /* UID/SID, unique on the network */ | |
151 | ||
152 | /* list of who has this client on their allow list, its counterpart | |
153 | * is in LocalUser | |
154 | */ | |
5b96d9a6 | 155 | rb_dlink_list on_allow_list; |
212380e3 | 156 | |
c24efdc0 JT |
157 | time_t first_received_message_time; |
158 | int received_number_of_privmsgs; | |
159 | int flood_noticed; | |
160 | ||
8f103562 JT |
161 | struct LocalUser *localClient; |
162 | struct PreClient *preClient; | |
aa9c9ed2 JT |
163 | |
164 | time_t large_ctcp_sent; /* ctcp to large group sent, relax flood checks */ | |
8eda114a | 165 | char *certfp; /* client certificate fingerprint */ |
212380e3 AC |
166 | }; |
167 | ||
168 | struct LocalUser | |
169 | { | |
de7cf7e0 AC |
170 | rb_dlink_node tnode; /* This is the node for the local list type the client is on */ |
171 | rb_dlink_list connids; /* This is the list of connids to free */ | |
172 | ||
212380e3 AC |
173 | /* |
174 | * The following fields are allocated only for local clients | |
175 | * (directly connected to *this* server with a socket. | |
176 | */ | |
177 | /* Anti flooding part, all because of lamers... */ | |
55abcbb2 | 178 | time_t last_join_time; /* when this client last |
212380e3 | 179 | joined a channel */ |
55abcbb2 | 180 | time_t last_leave_time; /* when this client last |
212380e3 | 181 | * left a channel */ |
55abcbb2 | 182 | int join_leave_count; /* count of JOIN/LEAVE in less than |
212380e3 | 183 | MIN_JOIN_LEAVE_TIME seconds */ |
55abcbb2 | 184 | int oper_warn_count_down; /* warn opers of this possible |
212380e3 AC |
185 | spambot every time this gets to 0 */ |
186 | time_t last_caller_id_time; | |
212380e3 AC |
187 | |
188 | time_t lasttime; /* last time we parsed something */ | |
189 | time_t firsttime; /* time client was created */ | |
190 | ||
191 | /* Send and receive linebuf queues .. */ | |
192 | buf_head_t buf_sendq; | |
193 | buf_head_t buf_recvq; | |
d3f6b808 | 194 | |
212380e3 AC |
195 | /* |
196 | * we want to use unsigned int here so the sizes have a better chance of | |
197 | * staying the same on 64 bit machines. The current trend is to use | |
198 | * I32LP64, (32 bit ints, 64 bit longs and pointers) and since ircd | |
55abcbb2 | 199 | * will NEVER run on an operating system where ints are less than 32 bits, |
212380e3 | 200 | * it's a relatively safe bet to use ints. Since right shift operations are |
55abcbb2 KB |
201 | * performed on these, it's not safe to allow them to become negative, |
202 | * which is possible for long running server connections. Unsigned values | |
212380e3 | 203 | * generally overflow gracefully. --Bleep |
d3f6b808 EM |
204 | * |
205 | * We have modern conveniences. Let's use uint32_t. --Elizafox | |
212380e3 | 206 | */ |
d3f6b808 EM |
207 | uint32_t sendM; /* Statistics: protocol messages send */ |
208 | uint32_t sendK; /* Statistics: total k-bytes send */ | |
209 | uint32_t receiveM; /* Statistics: protocol messages received */ | |
210 | uint32_t receiveK; /* Statistics: total k-bytes received */ | |
211 | uint16_t sendB; /* counters to count upto 1-k lots of bytes */ | |
212 | uint16_t receiveB; /* sent and received. */ | |
8f103562 JT |
213 | struct Listener *listener; /* listener accepted from */ |
214 | struct ConfItem *att_conf; /* attached conf */ | |
212380e3 AC |
215 | struct server_conf *att_sconf; |
216 | ||
e7046ee5 | 217 | struct rb_sockaddr_storage ip; |
212380e3 AC |
218 | time_t last_nick_change; |
219 | int number_of_nick_changes; | |
220 | ||
221 | /* | |
222 | * XXX - there is no reason to save this, it should be checked when it's | |
223 | * received and not stored, this is not used after registration | |
224 | * | |
225 | * agreed. lets get rid of it someday! --nenolod | |
226 | */ | |
227 | char *passwd; | |
40c1fd47 | 228 | char *auth_user; |
212380e3 AC |
229 | char *opername; /* name of operator{} block being used or tried (challenge) */ |
230 | char *challenge; | |
231 | char *fullcaps; | |
ebe33dbf | 232 | char *cipher_string; |
212380e3 AC |
233 | |
234 | int caps; /* capabilities bit-field */ | |
5b96d9a6 | 235 | rb_fde_t *F; /* >= 0, for local clients */ |
212380e3 AC |
236 | |
237 | /* time challenge response is valid for */ | |
238 | time_t chal_time; | |
239 | ||
d42e6915 | 240 | time_t next_away; /* Don't allow next away before... */ |
212380e3 AC |
241 | time_t last; |
242 | ||
243 | /* clients allowed to talk through +g */ | |
5b96d9a6 | 244 | rb_dlink_list allow_list; |
212380e3 AC |
245 | |
246 | /* nicknames theyre monitoring */ | |
5b96d9a6 | 247 | rb_dlink_list monitor_list; |
212380e3 AC |
248 | |
249 | /* | |
250 | * Anti-flood stuff. We track how many messages were parsed and how | |
251 | * many we were allowed in the current second, and apply a simple decay | |
252 | * to avoid flooding. | |
253 | * -- adrian | |
254 | */ | |
212380e3 AC |
255 | int sent_parsed; /* how many messages we've parsed in this second */ |
256 | time_t last_knock; /* time of last knock */ | |
da20854e | 257 | uint32_t random_ping; |
212380e3 | 258 | |
ae78a571 | 259 | /* target change stuff */ |
c9f01c4f JT |
260 | /* targets we're aware of (fnv32(use_id(target_p))): |
261 | * 0..TGCHANGE_NUM-1 regular slots | |
262 | * TGCHANGE_NUM..TGCHANGE_NUM+TGCHANGE_REPLY-1 reply slots | |
263 | */ | |
264 | uint32_t targets[TGCHANGE_NUM + TGCHANGE_REPLY]; | |
179becdf | 265 | unsigned int targets_free; /* free targets */ |
212380e3 AC |
266 | time_t target_last; /* last time we cleared a slot */ |
267 | ||
e88a1f1b KB |
268 | /* ratelimit items */ |
269 | time_t ratelimit; | |
270 | unsigned int join_who_credits; | |
271 | ||
999fab77 AC |
272 | struct ListClient *safelist_data; |
273 | ||
212380e3 AC |
274 | char *mangledhost; /* non-NULL if host mangling module loaded and |
275 | applicable to this client */ | |
c6d72037 | 276 | |
3318e109 | 277 | struct _ssl_ctl *ssl_ctl; /* which ssl daemon we're associate with */ |
32eadd33 | 278 | struct _ssl_ctl *z_ctl; /* second ctl for ssl+zlib */ |
c53ca1e0 | 279 | struct ws_ctl *ws_ctl; /* ctl for wsockd */ |
53789fdd | 280 | SSL_OPEN_CB *ssl_callback; /* ssl connection is now open */ |
104c6d46 | 281 | uint32_t localflags; |
c6d72037 | 282 | struct ZipStats *zipstats; /* zipstats */ |
104c6d46 | 283 | uint16_t cork_count; /* used for corking/uncorking connections */ |
c6d72037 | 284 | struct ev_entry *event; /* used for associated events */ |
ef242716 AC |
285 | |
286 | struct PrivilegeSet *privset; /* privset... */ | |
c6bc97fd AC |
287 | |
288 | char sasl_agent[IDLEN]; | |
289 | unsigned char sasl_out; | |
290 | unsigned char sasl_complete; | |
9d07a42d MM |
291 | |
292 | unsigned int sasl_messages; | |
293 | unsigned int sasl_failures; | |
294 | time_t sasl_next_retry; | |
212380e3 AC |
295 | }; |
296 | ||
762468f8 SA |
297 | #define AUTHC_F_DEFERRED 0x01 |
298 | #define AUTHC_F_COMPLETE 0x02 | |
299 | ||
154dc91e EM |
300 | struct AuthClient |
301 | { | |
302 | uint32_t cid; /* authd id */ | |
303 | time_t timeout; /* When to terminate authd query */ | |
304 | bool accepted; /* did authd accept us? */ | |
305 | char cause; /* rejection cause */ | |
306 | char *data; /* reason data */ | |
307 | char *reason; /* reason we were rejected */ | |
762468f8 | 308 | int flags; |
154dc91e EM |
309 | }; |
310 | ||
212380e3 AC |
311 | struct PreClient |
312 | { | |
313 | char spoofnick[NICKLEN + 1]; | |
314 | char spoofuser[USERLEN + 1]; | |
315 | char spoofhost[HOSTLEN + 1]; | |
316 | ||
154dc91e | 317 | struct AuthClient auth; |
3540120a JT |
318 | |
319 | struct rb_sockaddr_storage lip; /* address of our side of the connection */ | |
212380e3 AC |
320 | }; |
321 | ||
999fab77 AC |
322 | struct ListClient |
323 | { | |
324 | char *chname; | |
325 | unsigned int users_min, users_max; | |
326 | time_t created_min, created_max, topic_min, topic_max; | |
327 | int operspy; | |
328 | }; | |
329 | ||
212380e3 AC |
330 | /* |
331 | * status macros. | |
332 | */ | |
333 | #define STAT_CONNECTING 0x01 | |
334 | #define STAT_HANDSHAKE 0x02 | |
335 | #define STAT_ME 0x04 | |
336 | #define STAT_UNKNOWN 0x08 | |
337 | #define STAT_REJECT 0x10 | |
338 | #define STAT_SERVER 0x20 | |
339 | #define STAT_CLIENT 0x40 | |
340 | ||
341 | ||
342 | #define IsRegisteredUser(x) ((x)->status == STAT_CLIENT) | |
343 | #define IsRegistered(x) (((x)->status > STAT_UNKNOWN) && ((x)->status != STAT_REJECT)) | |
344 | #define IsConnecting(x) ((x)->status == STAT_CONNECTING) | |
345 | #define IsHandshake(x) ((x)->status == STAT_HANDSHAKE) | |
346 | #define IsMe(x) ((x)->status == STAT_ME) | |
347 | #define IsUnknown(x) ((x)->status == STAT_UNKNOWN) | |
348 | #define IsServer(x) ((x)->status == STAT_SERVER) | |
349 | #define IsClient(x) ((x)->status == STAT_CLIENT) | |
350 | #define IsReject(x) ((x)->status == STAT_REJECT) | |
351 | ||
352 | #define IsAnyServer(x) (IsServer(x) || IsHandshake(x) || IsConnecting(x)) | |
353 | ||
354 | #define IsOper(x) ((x)->umodes & UMODE_OPER) | |
355 | #define IsAdmin(x) ((x)->umodes & UMODE_ADMIN) | |
356 | ||
357 | #define SetReject(x) {(x)->status = STAT_REJECT; \ | |
358 | (x)->handler = UNREGISTERED_HANDLER; } | |
359 | ||
360 | #define SetConnecting(x) {(x)->status = STAT_CONNECTING; \ | |
361 | (x)->handler = UNREGISTERED_HANDLER; } | |
362 | ||
363 | #define SetHandshake(x) {(x)->status = STAT_HANDSHAKE; \ | |
364 | (x)->handler = UNREGISTERED_HANDLER; } | |
365 | ||
366 | #define SetMe(x) {(x)->status = STAT_ME; \ | |
367 | (x)->handler = UNREGISTERED_HANDLER; } | |
368 | ||
369 | #define SetUnknown(x) {(x)->status = STAT_UNKNOWN; \ | |
370 | (x)->handler = UNREGISTERED_HANDLER; } | |
371 | ||
372 | #define SetServer(x) {(x)->status = STAT_SERVER; \ | |
373 | (x)->handler = SERVER_HANDLER; } | |
374 | ||
375 | #define SetClient(x) {(x)->status = STAT_CLIENT; \ | |
376 | (x)->handler = IsOper((x)) ? \ | |
377 | OPER_HANDLER : CLIENT_HANDLER; } | |
378 | #define SetRemoteClient(x) {(x)->status = STAT_CLIENT; \ | |
379 | (x)->handler = RCLIENT_HANDLER; } | |
380 | ||
381 | #define STAT_CLIENT_PARSE (STAT_UNKNOWN | STAT_CLIENT) | |
382 | #define STAT_SERVER_PARSE (STAT_CONNECTING | STAT_HANDSHAKE | STAT_SERVER) | |
383 | ||
384 | #define PARSE_AS_CLIENT(x) ((x)->status & STAT_CLIENT_PARSE) | |
385 | #define PARSE_AS_SERVER(x) ((x)->status & STAT_SERVER_PARSE) | |
386 | ||
387 | ||
388 | /* | |
389 | * ts stuff | |
390 | */ | |
391 | #define TS_CURRENT 6 | |
212380e3 | 392 | #define TS_MIN 6 |
212380e3 AC |
393 | |
394 | #define TS_DOESTS 0x10000000 | |
395 | #define DoesTS(x) ((x)->tsinfo & TS_DOESTS) | |
396 | ||
397 | #define has_id(source) ((source)->id[0] != '\0') | |
398 | #define use_id(source) ((source)->id[0] != '\0' ? (source)->id : (source)->name) | |
399 | ||
400 | /* if target is TS6, use id if it has one, else name */ | |
401 | #define get_id(source, target) ((IsServer(target->from) && has_id(target->from)) ? \ | |
402 | use_id(source) : (source)->name) | |
403 | ||
404 | /* housekeeping flags */ | |
405 | ||
66f7fe67 EM |
406 | #define FLAGS_PINGSENT 0x00000001 /* Unreplied ping sent */ |
407 | #define FLAGS_DEAD 0x00000002 /* Local socket is dead--Exiting soon */ | |
408 | #define FLAGS_KILLED 0x00000004 /* Prevents "QUIT" from being sent for this */ | |
409 | #define FLAGS_SENTUSER 0x00000008 /* Client sent a USER command. */ | |
410 | #define FLAGS_CLICAP 0x00000010 /* In CAP negotiation, wait for CAP END */ | |
411 | #define FLAGS_CLOSING 0x00000020 /* set when closing to suppress errors */ | |
412 | #define FLAGS_PING_COOKIE 0x00000040 /* has sent ping cookie */ | |
413 | #define FLAGS_GOTID 0x00000080 /* successful ident lookup achieved */ | |
414 | #define FLAGS_FLOODDONE 0x00000100 /* flood grace period over / reported */ | |
415 | #define FLAGS_NORMALEX 0x00000200 /* Client exited normally */ | |
416 | #define FLAGS_MARK 0x00000400 /* marked client */ | |
417 | #define FLAGS_HIDDEN 0x00000800 /* hidden server */ | |
418 | #define FLAGS_EOB 0x00001000 /* EOB */ | |
419 | #define FLAGS_MYCONNECT 0x00002000 /* MyConnect */ | |
420 | #define FLAGS_IOERROR 0x00004000 /* IO error */ | |
421 | #define FLAGS_SERVICE 0x00008000 /* network service */ | |
422 | #define FLAGS_TGCHANGE 0x00010000 /* we're allowed to clear something */ | |
423 | #define FLAGS_DYNSPOOF 0x00020000 /* dynamic spoof, only opers see ip */ | |
424 | #define FLAGS_TGEXCESSIVE 0x00040000 /* whether the client has attemped to change targets excessively fast */ | |
425 | #define FLAGS_CLICAP_DATA 0x00080000 /* requested CAP LS 302 */ | |
426 | #define FLAGS_EXTENDCHANS 0x00100000 | |
427 | #define FLAGS_EXEMPTRESV 0x00200000 | |
428 | #define FLAGS_EXEMPTKLINE 0x00400000 | |
429 | #define FLAGS_EXEMPTFLOOD 0x00800000 | |
430 | #define FLAGS_IP_SPOOFING 0x01000000 | |
431 | #define FLAGS_EXEMPTSPAMBOT 0x02000000 | |
432 | #define FLAGS_EXEMPTSHIDE 0x04000000 | |
433 | #define FLAGS_EXEMPTJUPE 0x08000000 | |
434 | ||
212380e3 | 435 | |
3318e109 AC |
436 | /* flags for local clients, this needs stuff moved from above to here at some point */ |
437 | #define LFLAGS_SSL 0x00000001 | |
438 | #define LFLAGS_FLUSH 0x00000002 | |
c6d72037 VY |
439 | #define LFLAGS_CORK 0x00000004 |
440 | ||
212380e3 AC |
441 | /* umodes, settable flags */ |
442 | /* lots of this moved to snomask -- jilles */ | |
443 | #define UMODE_SERVNOTICE 0x0001 /* server notices */ | |
044aa2c7 VY |
444 | #define UMODE_WALLOP 0x0002 /* send wallops to them */ |
445 | #define UMODE_OPERWALL 0x0004 /* Operwalls */ | |
446 | #define UMODE_INVISIBLE 0x0008 /* makes user invisible */ | |
447 | #define UMODE_CALLERID 0x0010 /* block unless caller id's */ | |
448 | #define UMODE_LOCOPS 0x0020 /* show locops */ | |
449 | #define UMODE_SERVICE 0x0040 | |
450 | #define UMODE_DEAF 0x0080 | |
451 | #define UMODE_NOFORWARD 0x0100 /* don't forward */ | |
452 | #define UMODE_REGONLYMSG 0x0200 /* only allow logged in users to msg */ | |
212380e3 AC |
453 | |
454 | /* user information flags, only settable by remote mode or local oper */ | |
044aa2c7 VY |
455 | #define UMODE_OPER 0x1000 /* Operator */ |
456 | #define UMODE_ADMIN 0x2000 /* Admin on server */ | |
457 | #define UMODE_SSLCLIENT 0x4000 /* using SSL */ | |
212380e3 | 458 | |
212380e3 AC |
459 | #define DEFAULT_OPER_UMODES (UMODE_SERVNOTICE | UMODE_OPERWALL | \ |
460 | UMODE_WALLOP | UMODE_LOCOPS) | |
461 | #define DEFAULT_OPER_SNOMASK SNO_GENERAL | |
462 | ||
212380e3 AC |
463 | /* |
464 | * flags macros. | |
465 | */ | |
466 | #define IsPerson(x) (IsClient(x) && (x)->user != NULL) | |
212380e3 AC |
467 | #define HasServlink(x) ((x)->flags & FLAGS_SERVLINK) |
468 | #define SetServlink(x) ((x)->flags |= FLAGS_SERVLINK) | |
469 | #define MyConnect(x) ((x)->flags & FLAGS_MYCONNECT) | |
470 | #define SetMyConnect(x) ((x)->flags |= FLAGS_MYCONNECT) | |
471 | #define ClearMyConnect(x) ((x)->flags &= ~FLAGS_MYCONNECT) | |
472 | ||
473 | #define MyClient(x) (MyConnect(x) && IsClient(x)) | |
474 | #define SetMark(x) ((x)->flags |= FLAGS_MARK) | |
475 | #define ClearMark(x) ((x)->flags &= ~FLAGS_MARK) | |
476 | #define IsMarked(x) ((x)->flags & FLAGS_MARK) | |
477 | #define SetHidden(x) ((x)->flags |= FLAGS_HIDDEN) | |
478 | #define ClearHidden(x) ((x)->flags &= ~FLAGS_HIDDEN) | |
479 | #define IsHidden(x) ((x)->flags & FLAGS_HIDDEN) | |
480 | #define ClearEob(x) ((x)->flags &= ~FLAGS_EOB) | |
481 | #define SetEob(x) ((x)->flags |= FLAGS_EOB) | |
482 | #define HasSentEob(x) ((x)->flags & FLAGS_EOB) | |
483 | #define IsDead(x) ((x)->flags & FLAGS_DEAD) | |
484 | #define SetDead(x) ((x)->flags |= FLAGS_DEAD) | |
485 | #define IsClosing(x) ((x)->flags & FLAGS_CLOSING) | |
486 | #define SetClosing(x) ((x)->flags |= FLAGS_CLOSING) | |
487 | #define IsIOError(x) ((x)->flags & FLAGS_IOERROR) | |
488 | #define SetIOError(x) ((x)->flags |= FLAGS_IOERROR) | |
489 | #define IsAnyDead(x) (IsIOError(x) || IsDead(x) || IsClosing(x)) | |
490 | #define IsTGChange(x) ((x)->flags & FLAGS_TGCHANGE) | |
491 | #define SetTGChange(x) ((x)->flags |= FLAGS_TGCHANGE) | |
492 | #define ClearTGChange(x) ((x)->flags &= ~FLAGS_TGCHANGE) | |
493 | #define IsDynSpoof(x) ((x)->flags & FLAGS_DYNSPOOF) | |
494 | #define SetDynSpoof(x) ((x)->flags |= FLAGS_DYNSPOOF) | |
495 | #define ClearDynSpoof(x) ((x)->flags &= ~FLAGS_DYNSPOOF) | |
ab894d74 KB |
496 | #define IsTGExcessive(x) ((x)->flags & FLAGS_TGEXCESSIVE) |
497 | #define SetTGExcessive(x) ((x)->flags |= FLAGS_TGEXCESSIVE) | |
498 | #define ClearTGExcessive(x) ((x)->flags &= ~FLAGS_TGEXCESSIVE) | |
212380e3 | 499 | |
3318e109 AC |
500 | /* local flags */ |
501 | ||
502 | #define IsSSL(x) ((x)->localClient->localflags & LFLAGS_SSL) | |
503 | #define SetSSL(x) ((x)->localClient->localflags |= LFLAGS_SSL) | |
504 | #define ClearSSL(x) ((x)->localClient->localflags &= ~LFLAGS_SSL) | |
505 | ||
506 | #define IsFlush(x) ((x)->localClient->localflags & LFLAGS_FLUSH) | |
507 | #define SetFlush(x) ((x)->localClient->localflags |= LFLAGS_FLUSH) | |
c6d72037 VY |
508 | #define ClearFlush(x) ((x)->localClient->localflags &= ~LFLAGS_FLUSH) |
509 | ||
212380e3 AC |
510 | /* oper flags */ |
511 | #define MyOper(x) (MyConnect(x) && IsOper(x)) | |
512 | ||
513 | #define SetOper(x) {(x)->umodes |= UMODE_OPER; \ | |
514 | if (MyClient((x))) (x)->handler = OPER_HANDLER;} | |
515 | ||
516 | #define ClearOper(x) {(x)->umodes &= ~(UMODE_OPER|UMODE_ADMIN); \ | |
517 | if (MyClient((x)) && !IsOper((x)) && !IsServer((x))) \ | |
518 | (x)->handler = CLIENT_HANDLER; } | |
519 | ||
212380e3 AC |
520 | /* umode flags */ |
521 | #define IsInvisible(x) ((x)->umodes & UMODE_INVISIBLE) | |
522 | #define SetInvisible(x) ((x)->umodes |= UMODE_INVISIBLE) | |
523 | #define ClearInvisible(x) ((x)->umodes &= ~UMODE_INVISIBLE) | |
af7aaa84 AC |
524 | #define IsSSLClient(x) ((x)->umodes & UMODE_SSLCLIENT) |
525 | #define SetSSLClient(x) ((x)->umodes |= UMODE_SSLCLIENT) | |
526 | #define ClearSSLClient(x) ((x)->umodes &= ~UMODE_SSLCLIENT) | |
212380e3 | 527 | #define SendWallops(x) ((x)->umodes & UMODE_WALLOP) |
212380e3 AC |
528 | #define SendLocops(x) ((x)->umodes & UMODE_LOCOPS) |
529 | #define SendServNotice(x) ((x)->umodes & UMODE_SERVNOTICE) | |
530 | #define SendOperwall(x) ((x)->umodes & UMODE_OPERWALL) | |
212380e3 AC |
531 | #define IsSetCallerId(x) ((x)->umodes & UMODE_CALLERID) |
532 | #define IsService(x) ((x)->umodes & UMODE_SERVICE) | |
533 | #define IsDeaf(x) ((x)->umodes & UMODE_DEAF) | |
534 | #define IsNoForward(x) ((x)->umodes & UMODE_NOFORWARD) | |
535 | #define IsSetRegOnlyMsg(x) ((x)->umodes & UMODE_REGONLYMSG) | |
536 | ||
212380e3 AC |
537 | #define SetGotId(x) ((x)->flags |= FLAGS_GOTID) |
538 | #define IsGotId(x) (((x)->flags & FLAGS_GOTID) != 0) | |
539 | ||
66f7fe67 EM |
540 | #define IsExemptKline(x) ((x)->flags & FLAGS_EXEMPTKLINE) |
541 | #define SetExemptKline(x) ((x)->flags |= FLAGS_EXEMPTKLINE) | |
542 | #define IsExemptFlood(x) ((x)->flags & FLAGS_EXEMPTFLOOD) | |
543 | #define SetExemptFlood(x) ((x)->flags |= FLAGS_EXEMPTFLOOD) | |
544 | #define IsExemptSpambot(x) ((x)->flags & FLAGS_EXEMPTSPAMBOT) | |
545 | #define SetExemptSpambot(x) ((x)->flags |= FLAGS_EXEMPTSPAMBOT) | |
546 | #define IsExemptShide(x) ((x)->flags & FLAGS_EXEMPTSHIDE) | |
547 | #define SetExemptShide(x) ((x)->flags |= FLAGS_EXEMPTSHIDE) | |
548 | #define IsExemptJupe(x) ((x)->flags & FLAGS_EXEMPTJUPE) | |
549 | #define SetExemptJupe(x) ((x)->flags |= FLAGS_EXEMPTJUPE) | |
550 | #define IsExemptResv(x) ((x)->flags & FLAGS_EXEMPTRESV) | |
551 | #define SetExemptResv(x) ((x)->flags |= FLAGS_EXEMPTRESV) | |
552 | #define IsIPSpoof(x) ((x)->flags & FLAGS_IP_SPOOFING) | |
553 | #define SetIPSpoof(x) ((x)->flags |= FLAGS_IP_SPOOFING) | |
554 | #define IsExtendChans(x) ((x)->flags & FLAGS_EXTENDCHANS) | |
555 | #define SetExtendChans(x) ((x)->flags |= FLAGS_EXTENDCHANS) | |
212380e3 | 556 | |
212380e3 AC |
557 | /* for local users: flood grace period is over |
558 | * for servers: mentioned in networknotice.c notice | |
559 | */ | |
095328a7 JT |
560 | #define IsFloodDone(x) ((x)->flags & FLAGS_FLOODDONE) |
561 | #define SetFloodDone(x) ((x)->flags |= FLAGS_FLOODDONE) | |
212380e3 | 562 | |
3318e109 AC |
563 | /* These also operate on the uplink from which it came */ |
564 | #define IsCork(x) (MyConnect(x) ? (x)->localClient->cork_count : (x)->from->localClient->cork_count) | |
565 | #define SetCork(x) (MyConnect(x) ? (x)->localClient->cork_count++ : (x)->from->localClient->cork_count++ ) | |
c6d72037 VY |
566 | #define ClearCork(x) (MyConnect(x) ? (x)->localClient->cork_count-- : (x)->from->localClient->cork_count--) |
567 | ||
212380e3 AC |
568 | /* |
569 | * definitions for get_client_name | |
570 | */ | |
571 | #define HIDE_IP 0 | |
572 | #define SHOW_IP 1 | |
573 | #define MASK_IP 2 | |
574 | ||
575 | extern void check_banned_lines(void); | |
576 | extern void check_klines_event(void *unused); | |
577 | extern void check_klines(void); | |
212380e3 AC |
578 | extern void check_dlines(void); |
579 | extern void check_xlines(void); | |
330692a1 | 580 | extern void resv_nick_fnc(const char *mask, const char *reason, int temp_time); |
212380e3 AC |
581 | |
582 | extern const char *get_client_name(struct Client *client, int show_ip); | |
212380e3 AC |
583 | extern const char *log_client_name(struct Client *, int); |
584 | extern int is_remote_connect(struct Client *); | |
585 | extern void init_client(void); | |
8f103562 | 586 | extern struct Client *make_client(struct Client *from); |
212380e3 AC |
587 | extern void free_pre_client(struct Client *client); |
588 | extern void free_client(struct Client *client); | |
589 | ||
590 | extern int exit_client(struct Client *, struct Client *, struct Client *, const char *); | |
591 | ||
592 | extern void error_exit_client(struct Client *, int); | |
593 | ||
212380e3 AC |
594 | extern void count_local_client_memory(size_t * count, size_t * memory); |
595 | extern void count_remote_client_memory(size_t * count, size_t * memory); | |
596 | ||
2d28539c JT |
597 | extern int clean_nick(const char *, int loc_client); |
598 | ||
8f103562 JT |
599 | extern struct Client *find_chasing(struct Client *, const char *, int *); |
600 | extern struct Client *find_person(const char *); | |
601 | extern struct Client *find_named_person(const char *); | |
602 | extern struct Client *next_client(struct Client *, const char *); | |
212380e3 | 603 | |
0e7cb7e6 | 604 | #define accept_message(s, t) ((s) == (t) || (rb_dlinkFind((s), &((t)->localClient->allow_list)))) |
212380e3 AC |
605 | extern void del_all_accepts(struct Client *client_p); |
606 | ||
cef7a7bc | 607 | extern void dead_link(struct Client *client_p, int sendqex); |
212380e3 | 608 | extern int show_ip(struct Client *source_p, struct Client *target_p); |
2635cc80 | 609 | extern int show_ip_conf(struct ConfItem *aconf, struct Client *source_p); |
364e59f8 | 610 | extern int show_ip_whowas(struct Whowas *whowas, struct Client *source_p); |
212380e3 | 611 | |
212380e3 | 612 | extern void free_user(struct User *, struct Client *); |
8f103562 JT |
613 | extern struct User *make_user(struct Client *); |
614 | extern struct Server *make_server(struct Client *); | |
212380e3 AC |
615 | extern void close_connection(struct Client *); |
616 | extern void init_uid(void); | |
617 | extern char *generate_uid(void); | |
618 | ||
3318e109 | 619 | void allocate_away(struct Client *); |
300a5433 VY |
620 | void free_away(struct Client *); |
621 | ||
de7cf7e0 AC |
622 | uint32_t connid_get(struct Client *client_p); |
623 | void connid_put(uint32_t id); | |
624 | void client_release_connids(struct Client *client_p); | |
625 | ||
212380e3 | 626 | #endif /* INCLUDED_client_h */ |