]> jfr.im git - solanum.git/blame_incremental - ircd/s_newconf.c
reference.conf: Document fingerprint generation
[solanum.git] / ircd / s_newconf.c
... / ...
CommitLineData
1/*
2 * ircd-ratbox: an advanced Internet Relay Chat Daemon(ircd).
3 * s_newconf.c - code for dealing with conf stuff
4 *
5 * Copyright (C) 2004 Lee Hardy <lee@leeh.co.uk>
6 * Copyright (C) 2004-2005 ircd-ratbox development team
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
10 * met:
11 *
12 * 1.Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 * 2.Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3.The name of the author may not be used to endorse or promote products
18 * derived from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
21 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
22 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
23 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
24 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
26 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
28 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
29 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 */
32
33#include "stdinc.h"
34#include "ircd_defs.h"
35#include "s_conf.h"
36#include "s_newconf.h"
37#include "client.h"
38#include "s_serv.h"
39#include "send.h"
40#include "hostmask.h"
41#include "newconf.h"
42#include "hash.h"
43#include "rb_dictionary.h"
44#include "rb_radixtree.h"
45#include "s_assert.h"
46#include "logger.h"
47#include "dns.h"
48
49rb_dlink_list shared_conf_list;
50rb_dlink_list cluster_conf_list;
51rb_dlink_list oper_conf_list;
52rb_dlink_list hubleaf_conf_list;
53rb_dlink_list server_conf_list;
54rb_dlink_list xline_conf_list;
55rb_dlink_list resv_conf_list; /* nicks only! */
56rb_dlink_list nd_list; /* nick delay */
57rb_dlink_list tgchange_list;
58
59rb_patricia_tree_t *tgchange_tree;
60
61static rb_bh *nd_heap = NULL;
62
63static void expire_temp_rxlines(void *unused);
64static void expire_nd_entries(void *unused);
65
66struct ev_entry *expire_nd_entries_ev = NULL;
67struct ev_entry *expire_temp_rxlines_ev = NULL;
68
69void
70init_s_newconf(void)
71{
72 tgchange_tree = rb_new_patricia(PATRICIA_BITS);
73 nd_heap = rb_bh_create(sizeof(struct nd_entry), ND_HEAP_SIZE, "nd_heap");
74 expire_nd_entries_ev = rb_event_addish("expire_nd_entries", expire_nd_entries, NULL, 30);
75 expire_temp_rxlines_ev = rb_event_addish("expire_temp_rxlines", expire_temp_rxlines, NULL, 60);
76}
77
78void
79clear_s_newconf(void)
80{
81 struct server_conf *server_p;
82 rb_dlink_node *ptr;
83 rb_dlink_node *next_ptr;
84
85 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, shared_conf_list.head)
86 {
87 /* ptr here is ptr->data->node */
88 rb_dlinkDelete(ptr, &shared_conf_list);
89 free_remote_conf(ptr->data);
90 }
91
92 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, cluster_conf_list.head)
93 {
94 rb_dlinkDelete(ptr, &cluster_conf_list);
95 free_remote_conf(ptr->data);
96 }
97
98 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, hubleaf_conf_list.head)
99 {
100 rb_dlinkDelete(ptr, &hubleaf_conf_list);
101 free_remote_conf(ptr->data);
102 }
103
104 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, oper_conf_list.head)
105 {
106 free_oper_conf(ptr->data);
107 rb_dlinkDestroy(ptr, &oper_conf_list);
108 }
109
110 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, server_conf_list.head)
111 {
112 server_p = ptr->data;
113
114 if(!server_p->servers)
115 {
116 rb_dlinkDelete(ptr, &server_conf_list);
117 free_server_conf(ptr->data);
118 }
119 else
120 server_p->flags |= SERVER_ILLEGAL;
121 }
122}
123
124void
125clear_s_newconf_bans(void)
126{
127 struct ConfItem *aconf;
128 rb_dlink_node *ptr, *next_ptr;
129
130 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
131 {
132 aconf = ptr->data;
133
134 if(aconf->hold)
135 continue;
136
137 free_conf(aconf);
138 rb_dlinkDestroy(ptr, &xline_conf_list);
139 }
140
141 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
142 {
143 aconf = ptr->data;
144
145 /* temporary resv */
146 if(aconf->hold)
147 continue;
148
149 free_conf(aconf);
150 rb_dlinkDestroy(ptr, &resv_conf_list);
151 }
152
153 clear_resv_hash();
154}
155
156struct remote_conf *
157make_remote_conf(void)
158{
159 struct remote_conf *remote_p = rb_malloc(sizeof(struct remote_conf));
160 return remote_p;
161}
162
163void
164free_remote_conf(struct remote_conf *remote_p)
165{
166 s_assert(remote_p != NULL);
167 if(remote_p == NULL)
168 return;
169
170 rb_free(remote_p->username);
171 rb_free(remote_p->host);
172 rb_free(remote_p->server);
173 rb_free(remote_p);
174}
175
176bool
177find_shared_conf(const char *username, const char *host,
178 const char *server, int flags)
179{
180 struct remote_conf *shared_p;
181 rb_dlink_node *ptr;
182
183 RB_DLINK_FOREACH(ptr, shared_conf_list.head)
184 {
185 shared_p = ptr->data;
186
187 if(match(shared_p->username, username) &&
188 match(shared_p->host, host) &&
189 match(shared_p->server, server))
190 {
191 if(shared_p->flags & flags)
192 return true;
193 else
194 return false;
195 }
196 }
197
198 return false;
199}
200
201void
202propagate_generic(struct Client *source_p, const char *command,
203 const char *target, int cap, const char *format, ...)
204{
205 char buffer[BUFSIZE];
206 va_list args;
207
208 va_start(args, format);
209 vsnprintf(buffer, sizeof(buffer), format, args);
210 va_end(args);
211
212 sendto_match_servs(source_p, target, cap, NOCAPS,
213 "%s %s %s",
214 command, target, buffer);
215 sendto_match_servs(source_p, target, CAP_ENCAP, cap,
216 "ENCAP %s %s %s",
217 target, command, buffer);
218}
219
220void
221cluster_generic(struct Client *source_p, const char *command,
222 int cltype, int cap, const char *format, ...)
223{
224 char buffer[BUFSIZE];
225 struct remote_conf *shared_p;
226 va_list args;
227 rb_dlink_node *ptr;
228
229 va_start(args, format);
230 vsnprintf(buffer, sizeof(buffer), format, args);
231 va_end(args);
232
233 RB_DLINK_FOREACH(ptr, cluster_conf_list.head)
234 {
235 shared_p = ptr->data;
236
237 if(!(shared_p->flags & cltype))
238 continue;
239
240 sendto_match_servs(source_p, shared_p->server, cap, NOCAPS,
241 "%s %s %s",
242 command, shared_p->server, buffer);
243 sendto_match_servs(source_p, shared_p->server, CAP_ENCAP, cap,
244 "ENCAP %s %s %s",
245 shared_p->server, command, buffer);
246 }
247}
248
249struct oper_conf *
250make_oper_conf(void)
251{
252 struct oper_conf *oper_p = rb_malloc(sizeof(struct oper_conf));
253 return oper_p;
254}
255
256void
257free_oper_conf(struct oper_conf *oper_p)
258{
259 s_assert(oper_p != NULL);
260 if(oper_p == NULL)
261 return;
262
263 rb_free(oper_p->username);
264 rb_free(oper_p->host);
265 rb_free(oper_p->name);
266 rb_free(oper_p->certfp);
267
268 if(oper_p->passwd)
269 {
270 memset(oper_p->passwd, 0, strlen(oper_p->passwd));
271 rb_free(oper_p->passwd);
272 }
273
274#ifdef HAVE_LIBCRYPTO
275 rb_free(oper_p->rsa_pubkey_file);
276
277 if(oper_p->rsa_pubkey)
278 RSA_free(oper_p->rsa_pubkey);
279#endif
280
281 rb_free(oper_p);
282}
283
284struct oper_conf *
285find_oper_conf(const char *username, const char *host, const char *locip, const char *name)
286{
287 struct oper_conf *oper_p;
288 struct rb_sockaddr_storage ip, cip;
289 char addr[HOSTLEN+1];
290 int bits, cbits;
291 rb_dlink_node *ptr;
292
293 parse_netmask(locip, &cip, &cbits);
294
295 RB_DLINK_FOREACH(ptr, oper_conf_list.head)
296 {
297 oper_p = ptr->data;
298
299 /* name/username doesnt match.. */
300 if(irccmp(oper_p->name, name) || !match(oper_p->username, username))
301 continue;
302
303 rb_strlcpy(addr, oper_p->host, sizeof(addr));
304
305 if(parse_netmask(addr, &ip, &bits) != HM_HOST)
306 {
307 if(GET_SS_FAMILY(&ip) == GET_SS_FAMILY(&cip) &&
308 comp_with_mask_sock((struct sockaddr *)&ip, (struct sockaddr *)&cip, bits))
309 return oper_p;
310 }
311
312 /* we have to compare against the host as well, because its
313 * valid to set a spoof to an IP, which if we only compare
314 * in ip form to sockhost will not necessarily match --anfl
315 */
316 if(match(oper_p->host, host))
317 return oper_p;
318 }
319
320 return NULL;
321}
322
323struct server_conf *
324make_server_conf(void)
325{
326 struct server_conf *server_p = rb_malloc(sizeof(struct server_conf));
327
328 SET_SS_FAMILY(&server_p->connect4, AF_UNSPEC);
329 SET_SS_LEN(&server_p->connect4, sizeof(struct sockaddr_in));
330
331 SET_SS_FAMILY(&server_p->bind4, AF_UNSPEC);
332 SET_SS_LEN(&server_p->bind4, sizeof(struct sockaddr_in));
333
334#ifdef RB_IPV6
335 SET_SS_FAMILY(&server_p->connect6, AF_UNSPEC);
336 SET_SS_LEN(&server_p->connect6, sizeof(struct sockaddr_in6));
337
338 SET_SS_FAMILY(&server_p->bind6, AF_UNSPEC);
339 SET_SS_LEN(&server_p->bind6, sizeof(struct sockaddr_in6));
340#endif
341
342 server_p->aftype = AF_UNSPEC;
343
344 return rb_malloc(sizeof(struct server_conf));
345}
346
347void
348free_server_conf(struct server_conf *server_p)
349{
350 s_assert(server_p != NULL);
351 if(server_p == NULL)
352 return;
353
354 if(!EmptyString(server_p->passwd))
355 {
356 memset(server_p->passwd, 0, strlen(server_p->passwd));
357 rb_free(server_p->passwd);
358 }
359
360 if(!EmptyString(server_p->spasswd))
361 {
362 memset(server_p->spasswd, 0, strlen(server_p->spasswd));
363 rb_free(server_p->spasswd);
364 }
365
366 rb_free(server_p->name);
367 rb_free(server_p->connect_host);
368 rb_free(server_p->bind_host);
369 rb_free(server_p->class_name);
370 rb_free(server_p);
371}
372
373/*
374 * conf_connect_dns_callback
375 * inputs - pointer to struct ConfItem
376 * - pointer to adns reply
377 * output - none
378 * side effects - called when resolver query finishes
379 * if the query resulted in a successful search, hp will contain
380 * a non-null pointer, otherwise hp will be null.
381 * if successful save hp in the conf item it was called with
382 */
383static void
384conf_connect_dns_callback(const char *result, int status, int aftype, void *data)
385{
386 struct server_conf *server_p = data;
387
388 if(aftype == AF_INET)
389 {
390 if(status == 1)
391 rb_inet_pton_sock(result, (struct sockaddr *)&server_p->connect4);
392
393 server_p->dns_query_connect4 = 0;
394 }
395#ifdef RB_IPV6
396 else if(aftype == AF_INET6)
397 {
398 if(status == 1)
399 rb_inet_pton_sock(result, (struct sockaddr *)&server_p->connect6);
400
401 server_p->dns_query_connect6 = 0;
402 }
403#endif
404}
405
406/*
407 * conf_bind_dns_callback
408 * inputs - pointer to struct ConfItem
409 * - pointer to adns reply
410 * output - none
411 * side effects - called when resolver query finishes
412 * if the query resulted in a successful search, hp will contain
413 * a non-null pointer, otherwise hp will be null.
414 * if successful save hp in the conf item it was called with
415 */
416static void
417conf_bind_dns_callback(const char *result, int status, int aftype, void *data)
418{
419 struct server_conf *server_p = data;
420
421 if(aftype == AF_INET)
422 {
423 if(status == 1)
424 rb_inet_pton_sock(result, (struct sockaddr *)&server_p->bind4);
425
426 server_p->dns_query_bind4 = 0;
427 }
428#ifdef RB_IPV6
429 else if(aftype == AF_INET6)
430 {
431 if(status == 1)
432 rb_inet_pton_sock(result, (struct sockaddr *)&server_p->bind6);
433
434 server_p->dns_query_bind6 = 0;
435 }
436#endif
437}
438
439void
440add_server_conf(struct server_conf *server_p)
441{
442 if(EmptyString(server_p->class_name))
443 {
444 server_p->class_name = rb_strdup("default");
445 server_p->class = default_class;
446 return;
447 }
448
449 server_p->class = find_class(server_p->class_name);
450
451 if(server_p->class == default_class)
452 {
453 conf_report_error("Warning connect::class invalid for %s",
454 server_p->name);
455
456 rb_free(server_p->class_name);
457 server_p->class_name = rb_strdup("default");
458 }
459
460 if(server_p->connect_host && !strpbrk(server_p->connect_host, "*?"))
461 {
462 server_p->dns_query_connect4 =
463 lookup_hostname(server_p->connect_host, AF_INET, conf_connect_dns_callback, server_p);
464#ifdef RB_IPV6
465 server_p->dns_query_connect6 =
466 lookup_hostname(server_p->connect_host, AF_INET6, conf_connect_dns_callback, server_p);
467#endif
468 }
469
470 if(server_p->bind_host)
471 {
472 server_p->dns_query_bind4 =
473 lookup_hostname(server_p->bind_host, AF_INET, conf_bind_dns_callback, server_p);
474#ifdef RB_IPV6
475 server_p->dns_query_bind6 =
476 lookup_hostname(server_p->bind_host, AF_INET6, conf_bind_dns_callback, server_p);
477#endif
478 }
479}
480
481struct server_conf *
482find_server_conf(const char *name)
483{
484 struct server_conf *server_p;
485 rb_dlink_node *ptr;
486
487 RB_DLINK_FOREACH(ptr, server_conf_list.head)
488 {
489 server_p = ptr->data;
490
491 if(ServerConfIllegal(server_p))
492 continue;
493
494 if(match(name, server_p->name))
495 return server_p;
496 }
497
498 return NULL;
499}
500
501void
502attach_server_conf(struct Client *client_p, struct server_conf *server_p)
503{
504 /* already have an attached conf */
505 if(client_p->localClient->att_sconf)
506 {
507 /* short circuit this special case :) */
508 if(client_p->localClient->att_sconf == server_p)
509 return;
510
511 detach_server_conf(client_p);
512 }
513
514 CurrUsers(server_p->class)++;
515
516 client_p->localClient->att_sconf = server_p;
517 server_p->servers++;
518}
519
520void
521detach_server_conf(struct Client *client_p)
522{
523 struct server_conf *server_p = client_p->localClient->att_sconf;
524
525 if(server_p == NULL)
526 return;
527
528 client_p->localClient->att_sconf = NULL;
529 server_p->servers--;
530 CurrUsers(server_p->class)--;
531
532 if(ServerConfIllegal(server_p) && !server_p->servers)
533 {
534 /* the class this one is using may need destroying too */
535 if(MaxUsers(server_p->class) < 0 && CurrUsers(server_p->class) <= 0)
536 free_class(server_p->class);
537
538 rb_dlinkDelete(&server_p->node, &server_conf_list);
539 free_server_conf(server_p);
540 }
541}
542
543void
544set_server_conf_autoconn(struct Client *source_p, const char *name, int newval)
545{
546 struct server_conf *server_p;
547
548 if((server_p = find_server_conf(name)) != NULL)
549 {
550 if(newval)
551 server_p->flags |= SERVER_AUTOCONN;
552 else
553 server_p->flags &= ~SERVER_AUTOCONN;
554
555 sendto_realops_snomask(SNO_GENERAL, L_ALL,
556 "%s has changed AUTOCONN for %s to %i",
557 get_oper_name(source_p), name, newval);
558 }
559 else
560 sendto_one_notice(source_p, ":Can't find %s", name);
561}
562
563void
564disable_server_conf_autoconn(const char *name)
565{
566 struct server_conf *server_p;
567
568 server_p = find_server_conf(name);
569 if(server_p != NULL && server_p->flags & SERVER_AUTOCONN)
570 {
571 server_p->flags &= ~SERVER_AUTOCONN;
572
573 sendto_realops_snomask(SNO_GENERAL, L_ALL,
574 "Disabling AUTOCONN for %s because of error",
575 name);
576 ilog(L_SERVER, "Disabling AUTOCONN for %s because of error",
577 name);
578 }
579}
580
581struct ConfItem *
582find_xline(const char *gecos, int counter)
583{
584 struct ConfItem *aconf;
585 rb_dlink_node *ptr;
586
587 RB_DLINK_FOREACH(ptr, xline_conf_list.head)
588 {
589 aconf = ptr->data;
590
591 if(match_esc(aconf->host, gecos))
592 {
593 if(counter)
594 aconf->port++;
595 return aconf;
596 }
597 }
598
599 return NULL;
600}
601
602struct ConfItem *
603find_xline_mask(const char *gecos)
604{
605 struct ConfItem *aconf;
606 rb_dlink_node *ptr;
607
608 RB_DLINK_FOREACH(ptr, xline_conf_list.head)
609 {
610 aconf = ptr->data;
611
612 if(!irccmp(aconf->host, gecos))
613 return aconf;
614 }
615
616 return NULL;
617}
618
619struct ConfItem *
620find_nick_resv(const char *name)
621{
622 struct ConfItem *aconf;
623 rb_dlink_node *ptr;
624
625 RB_DLINK_FOREACH(ptr, resv_conf_list.head)
626 {
627 aconf = ptr->data;
628
629 if(match_esc(aconf->host, name))
630 {
631 aconf->port++;
632 return aconf;
633 }
634 }
635
636 return NULL;
637}
638
639struct ConfItem *
640find_nick_resv_mask(const char *name)
641{
642 struct ConfItem *aconf;
643 rb_dlink_node *ptr;
644
645 RB_DLINK_FOREACH(ptr, resv_conf_list.head)
646 {
647 aconf = ptr->data;
648
649 if(!irccmp(aconf->host, name))
650 return aconf;
651 }
652
653 return NULL;
654}
655
656/* clean_resv_nick()
657 *
658 * inputs - nick
659 * outputs - 1 if nick is vaild resv, 0 otherwise
660 * side effects -
661 */
662int
663clean_resv_nick(const char *nick)
664{
665 char tmpch;
666 int as = 0;
667 int q = 0;
668 int ch = 0;
669
670 if(*nick == '-' || IsDigit(*nick))
671 return 0;
672
673 while ((tmpch = *nick++))
674 {
675 if(tmpch == '?' || tmpch == '@' || tmpch == '#')
676 q++;
677 else if(tmpch == '*')
678 as++;
679 else if(IsNickChar(tmpch))
680 ch++;
681 else
682 return 0;
683 }
684
685 if(!ch && as)
686 return 0;
687
688 return 1;
689}
690
691/* valid_wild_card_simple()
692 *
693 * inputs - "thing" to test
694 * outputs - 1 if enough wildcards, else 0
695 * side effects -
696 */
697int
698valid_wild_card_simple(const char *data)
699{
700 const char *p;
701 char tmpch;
702 int nonwild = 0;
703 int wild = 0;
704
705 /* check the string for minimum number of nonwildcard chars */
706 p = data;
707
708 while((tmpch = *p++))
709 {
710 /* found an escape, p points to the char after it, so skip
711 * that and move on.
712 */
713 if(tmpch == '\\' && *p)
714 {
715 p++;
716 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
717 return 1;
718 }
719 else if(!IsMWildChar(tmpch))
720 {
721 /* if we have enough nonwildchars, return */
722 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
723 return 1;
724 }
725 else
726 wild++;
727 }
728
729 /* strings without wilds are also ok */
730 return wild == 0;
731}
732
733time_t
734valid_temp_time(const char *p)
735{
736 time_t result = 0;
737
738 while(*p)
739 {
740 if(IsDigit(*p))
741 {
742 result *= 10;
743 result += ((*p) & 0xF);
744 p++;
745 }
746 else
747 return -1;
748 }
749
750 if(result > (60 * 24 * 7 * 52))
751 result = (60 * 24 * 7 * 52);
752
753 return(result * 60);
754}
755
756/* Propagated bans are expired elsewhere. */
757static void
758expire_temp_rxlines(void *unused)
759{
760 struct ConfItem *aconf;
761 rb_dlink_node *ptr;
762 rb_dlink_node *next_ptr;
763 rb_radixtree_iteration_state state;
764
765 RB_RADIXTREE_FOREACH(aconf, &state, resv_tree)
766 {
767 if(aconf->lifetime != 0)
768 continue;
769 if(aconf->hold && aconf->hold <= rb_current_time())
770 {
771 if(ConfigFileEntry.tkline_expire_notices)
772 sendto_realops_snomask(SNO_GENERAL, L_ALL,
773 "Temporary RESV for [%s] expired",
774 aconf->host);
775
776 rb_radixtree_delete(resv_tree, aconf->host);
777 free_conf(aconf);
778 }
779 }
780
781 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
782 {
783 aconf = ptr->data;
784
785 if(aconf->lifetime != 0)
786 continue;
787 if(aconf->hold && aconf->hold <= rb_current_time())
788 {
789 if(ConfigFileEntry.tkline_expire_notices)
790 sendto_realops_snomask(SNO_GENERAL, L_ALL,
791 "Temporary RESV for [%s] expired",
792 aconf->host);
793 free_conf(aconf);
794 rb_dlinkDestroy(ptr, &resv_conf_list);
795 }
796 }
797
798 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
799 {
800 aconf = ptr->data;
801
802 if(aconf->lifetime != 0)
803 continue;
804 if(aconf->hold && aconf->hold <= rb_current_time())
805 {
806 if(ConfigFileEntry.tkline_expire_notices)
807 sendto_realops_snomask(SNO_GENERAL, L_ALL,
808 "Temporary X-line for [%s] expired",
809 aconf->host);
810 free_conf(aconf);
811 rb_dlinkDestroy(ptr, &xline_conf_list);
812 }
813 }
814}
815
816unsigned long
817get_nd_count(void)
818{
819 return(rb_dlink_list_length(&nd_list));
820}
821
822void
823add_nd_entry(const char *name)
824{
825 struct nd_entry *nd;
826
827 if(rb_dictionary_find(nd_dict, name) != NULL)
828 return;
829
830 nd = rb_bh_alloc(nd_heap);
831
832 rb_strlcpy(nd->name, name, sizeof(nd->name));
833 nd->expire = rb_current_time() + ConfigFileEntry.nick_delay;
834
835 /* this list is ordered */
836 rb_dlinkAddTail(nd, &nd->lnode, &nd_list);
837
838 rb_dictionary_add(nd_dict, nd->name, nd);
839}
840
841void
842free_nd_entry(struct nd_entry *nd)
843{
844 rb_dictionary_delete(nd_dict, nd->name);
845
846 rb_dlinkDelete(&nd->lnode, &nd_list);
847 rb_bh_free(nd_heap, nd);
848}
849
850void
851expire_nd_entries(void *unused)
852{
853 struct nd_entry *nd;
854 rb_dlink_node *ptr;
855 rb_dlink_node *next_ptr;
856
857 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, nd_list.head)
858 {
859 nd = ptr->data;
860
861 /* this list is ordered - we can stop when we hit the first
862 * entry that doesnt expire..
863 */
864 if(nd->expire > rb_current_time())
865 return;
866
867 free_nd_entry(nd);
868 }
869}
870
871void
872add_tgchange(const char *host)
873{
874 tgchange *target;
875 rb_patricia_node_t *pnode;
876
877 if(find_tgchange(host))
878 return;
879
880 target = rb_malloc(sizeof(tgchange));
881 pnode = make_and_lookup(tgchange_tree, host);
882
883 pnode->data = target;
884 target->pnode = pnode;
885
886 target->ip = rb_strdup(host);
887 target->expiry = rb_current_time() + (60*60*12);
888
889 rb_dlinkAdd(target, &target->node, &tgchange_list);
890}
891
892tgchange *
893find_tgchange(const char *host)
894{
895 rb_patricia_node_t *pnode;
896
897 if((pnode = rb_match_exact_string(tgchange_tree, host)))
898 return pnode->data;
899
900 return NULL;
901}