]>
Commit | Line | Data |
---|---|---|
1 | /* | |
2 | * charybdis: A useful ircd. | |
3 | * client.h: The ircd client header. | |
4 | * | |
5 | * Copyright (C) 1990 Jarkko Oikarinen and University of Oulu, Co Center | |
6 | * Copyright (C) 1996-2002 Hybrid Development Team | |
7 | * Copyright (C) 2002-2004 ircd-ratbox development team | |
8 | * Copyright (C) 2005 William Pitcock and Jilles Tjoelker | |
9 | * | |
10 | * This program is free software; you can redistribute it and/or modify | |
11 | * it under the terms of the GNU General Public License as published by | |
12 | * the Free Software Foundation; either version 2 of the License, or | |
13 | * (at your option) any later version. | |
14 | * | |
15 | * This program is distributed in the hope that it will be useful, | |
16 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
17 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
18 | * GNU General Public License for more details. | |
19 | * | |
20 | * You should have received a copy of the GNU General Public License | |
21 | * along with this program; if not, write to the Free Software | |
22 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 | |
23 | * USA | |
24 | */ | |
25 | ||
26 | #ifndef INCLUDED_client_h | |
27 | #define INCLUDED_client_h | |
28 | ||
29 | #include "defaults.h" | |
30 | ||
31 | #include "ircd_defs.h" | |
32 | #include "channel.h" | |
33 | #include "dns.h" | |
34 | #include "snomask.h" | |
35 | #include "match.h" | |
36 | #include "ircd.h" | |
37 | #include "privilege.h" | |
38 | ||
39 | /* other structs */ | |
40 | struct Blacklist; | |
41 | ||
42 | /* we store ipv6 ips for remote clients, so this needs to be v6 always */ | |
43 | #define HOSTIPLEN 53 /* sizeof("ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255.ipv6") */ | |
44 | #define PASSWDLEN 128 | |
45 | #define CIPHERKEYLEN 64 /* 512bit */ | |
46 | #define CLIENT_BUFSIZE 512 /* must be at least 512 bytes */ | |
47 | ||
48 | #define IDLEN 10 | |
49 | ||
50 | #define TGCHANGE_NUM 10 /* how many targets we keep track of */ | |
51 | #define TGCHANGE_REPLY 5 /* how many reply targets */ | |
52 | #define TGCHANGE_INITIAL 10 /* initial free targets (normal) */ | |
53 | #define TGCHANGE_INITIAL_LOW 4 /* initial free targets (possible spambot) */ | |
54 | ||
55 | /* | |
56 | * pre declare structs | |
57 | */ | |
58 | struct ConfItem; | |
59 | struct Whowas; | |
60 | struct DNSReply; | |
61 | struct Listener; | |
62 | struct Client; | |
63 | struct User; | |
64 | struct Server; | |
65 | struct LocalUser; | |
66 | struct AuthRequest; | |
67 | struct PreClient; | |
68 | struct ListClient; | |
69 | struct scache_entry; | |
70 | ||
71 | /* | |
72 | * Client structures | |
73 | */ | |
74 | struct User | |
75 | { | |
76 | rb_dlink_list channel; /* chain of channel pointer blocks */ | |
77 | rb_dlink_list invited; /* chain of invite pointer blocks */ | |
78 | char *away; /* pointer to away message */ | |
79 | int refcnt; /* Number of times this block is referenced */ | |
80 | ||
81 | char suser[NICKLEN+1]; | |
82 | }; | |
83 | ||
84 | struct Server | |
85 | { | |
86 | struct User *user; /* who activated this connection */ | |
87 | char by[NICKLEN]; | |
88 | rb_dlink_list servers; | |
89 | rb_dlink_list users; | |
90 | int caps; /* capabilities bit-field */ | |
91 | char *fullcaps; | |
92 | struct scache_entry *nameinfo; | |
93 | }; | |
94 | ||
95 | struct ZipStats | |
96 | { | |
97 | unsigned long long in; | |
98 | unsigned long long in_wire; | |
99 | unsigned long long out; | |
100 | unsigned long long out_wire; | |
101 | double in_ratio; | |
102 | double out_ratio; | |
103 | }; | |
104 | ||
105 | struct Client | |
106 | { | |
107 | rb_dlink_node node; | |
108 | rb_dlink_node lnode; | |
109 | struct User *user; /* ...defined, if this is a User */ | |
110 | struct Server *serv; /* ...defined, if this is a server */ | |
111 | struct Client *servptr; /* Points to server this Client is on */ | |
112 | struct Client *from; /* == self, if Local Client, *NEVER* NULL! */ | |
113 | ||
114 | rb_dlink_list whowas_clist; | |
115 | ||
116 | time_t tsinfo; /* TS on the nick, SVINFO on server */ | |
117 | unsigned int umodes; /* opers, normal users subset */ | |
118 | unsigned int flags; /* client flags */ | |
119 | unsigned int flags2; /* ugh. overflow */ | |
120 | ||
121 | unsigned int snomask; /* server notice mask */ | |
122 | ||
123 | int hopcount; /* number of servers to this 0 = local */ | |
124 | unsigned short status; /* Client type */ | |
125 | unsigned char handler; /* Handler index */ | |
126 | unsigned long serial; /* used to enforce 1 send per nick */ | |
127 | ||
128 | /* client->name is the unique name for a client nick or host */ | |
129 | char name[HOSTLEN + 1]; | |
130 | ||
131 | /* | |
132 | * client->username is the username from ident or the USER message, | |
133 | * If the client is idented the USER message is ignored, otherwise | |
134 | * the username part of the USER message is put here prefixed with a | |
135 | * tilde depending on the I:line, Once a client has registered, this | |
136 | * field should be considered read-only. | |
137 | */ | |
138 | char username[USERLEN + 1]; /* client's username */ | |
139 | ||
140 | /* | |
141 | * client->host contains the resolved name or ip address | |
142 | * as a string for the user, it may be fiddled with for oper spoofing etc. | |
143 | */ | |
144 | char host[HOSTLEN + 1]; /* client's hostname */ | |
145 | char orighost[HOSTLEN + 1]; /* original hostname (before dynamic spoofing) */ | |
146 | char sockhost[HOSTIPLEN + 1]; /* clients ip */ | |
147 | char info[REALLEN + 1]; /* Free form additional client info */ | |
148 | ||
149 | char id[IDLEN]; /* UID/SID, unique on the network */ | |
150 | ||
151 | /* list of who has this client on their allow list, its counterpart | |
152 | * is in LocalUser | |
153 | */ | |
154 | rb_dlink_list on_allow_list; | |
155 | ||
156 | time_t first_received_message_time; | |
157 | int received_number_of_privmsgs; | |
158 | int flood_noticed; | |
159 | ||
160 | struct LocalUser *localClient; | |
161 | struct PreClient *preClient; | |
162 | ||
163 | time_t large_ctcp_sent; /* ctcp to large group sent, relax flood checks */ | |
164 | char *certfp; /* client certificate fingerprint */ | |
165 | }; | |
166 | ||
167 | struct LocalUser | |
168 | { | |
169 | rb_dlink_node tnode; /* This is the node for the local list type the client is on*/ | |
170 | /* | |
171 | * The following fields are allocated only for local clients | |
172 | * (directly connected to *this* server with a socket. | |
173 | */ | |
174 | /* Anti flooding part, all because of lamers... */ | |
175 | time_t last_join_time; /* when this client last | |
176 | joined a channel */ | |
177 | time_t last_leave_time; /* when this client last | |
178 | * left a channel */ | |
179 | int join_leave_count; /* count of JOIN/LEAVE in less than | |
180 | MIN_JOIN_LEAVE_TIME seconds */ | |
181 | int oper_warn_count_down; /* warn opers of this possible | |
182 | spambot every time this gets to 0 */ | |
183 | time_t last_caller_id_time; | |
184 | ||
185 | time_t lasttime; /* last time we parsed something */ | |
186 | time_t firsttime; /* time client was created */ | |
187 | ||
188 | /* Send and receive linebuf queues .. */ | |
189 | buf_head_t buf_sendq; | |
190 | buf_head_t buf_recvq; | |
191 | /* | |
192 | * we want to use unsigned int here so the sizes have a better chance of | |
193 | * staying the same on 64 bit machines. The current trend is to use | |
194 | * I32LP64, (32 bit ints, 64 bit longs and pointers) and since ircd | |
195 | * will NEVER run on an operating system where ints are less than 32 bits, | |
196 | * it's a relatively safe bet to use ints. Since right shift operations are | |
197 | * performed on these, it's not safe to allow them to become negative, | |
198 | * which is possible for long running server connections. Unsigned values | |
199 | * generally overflow gracefully. --Bleep | |
200 | */ | |
201 | unsigned int sendM; /* Statistics: protocol messages send */ | |
202 | unsigned int sendK; /* Statistics: total k-bytes send */ | |
203 | unsigned int receiveM; /* Statistics: protocol messages received */ | |
204 | unsigned int receiveK; /* Statistics: total k-bytes received */ | |
205 | unsigned short sendB; /* counters to count upto 1-k lots of bytes */ | |
206 | unsigned short receiveB; /* sent and received. */ | |
207 | struct Listener *listener; /* listener accepted from */ | |
208 | struct ConfItem *att_conf; /* attached conf */ | |
209 | struct server_conf *att_sconf; | |
210 | ||
211 | struct rb_sockaddr_storage ip; | |
212 | time_t last_nick_change; | |
213 | int number_of_nick_changes; | |
214 | ||
215 | /* | |
216 | * XXX - there is no reason to save this, it should be checked when it's | |
217 | * received and not stored, this is not used after registration | |
218 | * | |
219 | * agreed. lets get rid of it someday! --nenolod | |
220 | */ | |
221 | char *passwd; | |
222 | char *auth_user; | |
223 | char *opername; /* name of operator{} block being used or tried (challenge) */ | |
224 | char *challenge; | |
225 | char *fullcaps; | |
226 | char *cipher_string; | |
227 | ||
228 | int caps; /* capabilities bit-field */ | |
229 | rb_fde_t *F; /* >= 0, for local clients */ | |
230 | ||
231 | /* time challenge response is valid for */ | |
232 | time_t chal_time; | |
233 | ||
234 | time_t next_away; /* Don't allow next away before... */ | |
235 | time_t last; | |
236 | uint32_t connid; | |
237 | ||
238 | /* clients allowed to talk through +g */ | |
239 | rb_dlink_list allow_list; | |
240 | ||
241 | /* nicknames theyre monitoring */ | |
242 | rb_dlink_list monitor_list; | |
243 | ||
244 | /* | |
245 | * Anti-flood stuff. We track how many messages were parsed and how | |
246 | * many we were allowed in the current second, and apply a simple decay | |
247 | * to avoid flooding. | |
248 | * -- adrian | |
249 | */ | |
250 | int sent_parsed; /* how many messages we've parsed in this second */ | |
251 | time_t last_knock; /* time of last knock */ | |
252 | unsigned long random_ping; | |
253 | struct AuthRequest *auth_request; | |
254 | ||
255 | /* target change stuff */ | |
256 | /* targets we're aware of (fnv32(use_id(target_p))): | |
257 | * 0..TGCHANGE_NUM-1 regular slots | |
258 | * TGCHANGE_NUM..TGCHANGE_NUM+TGCHANGE_REPLY-1 reply slots | |
259 | */ | |
260 | uint32_t targets[TGCHANGE_NUM + TGCHANGE_REPLY]; | |
261 | unsigned int targets_free; /* free targets */ | |
262 | time_t target_last; /* last time we cleared a slot */ | |
263 | ||
264 | /* ratelimit items */ | |
265 | time_t ratelimit; | |
266 | unsigned int join_who_credits; | |
267 | ||
268 | struct ListClient *safelist_data; | |
269 | ||
270 | char *mangledhost; /* non-NULL if host mangling module loaded and | |
271 | applicable to this client */ | |
272 | ||
273 | struct _ssl_ctl *ssl_ctl; /* which ssl daemon we're associate with */ | |
274 | struct _ssl_ctl *z_ctl; /* second ctl for ssl+zlib */ | |
275 | uint32_t zconnid; | |
276 | uint32_t localflags; | |
277 | struct ZipStats *zipstats; /* zipstats */ | |
278 | uint16_t cork_count; /* used for corking/uncorking connections */ | |
279 | struct ev_entry *event; /* used for associated events */ | |
280 | ||
281 | struct PrivilegeSet *privset; /* privset... */ | |
282 | ||
283 | char sasl_agent[IDLEN]; | |
284 | unsigned char sasl_out; | |
285 | unsigned char sasl_complete; | |
286 | }; | |
287 | ||
288 | struct PreClient | |
289 | { | |
290 | char spoofnick[NICKLEN + 1]; | |
291 | char spoofuser[USERLEN + 1]; | |
292 | char spoofhost[HOSTLEN + 1]; | |
293 | ||
294 | rb_dlink_list dnsbl_queries; /* list of struct BlacklistClient * */ | |
295 | struct Blacklist *dnsbl_listed; /* first dnsbl where it's listed */ | |
296 | ||
297 | struct rb_sockaddr_storage lip; /* address of our side of the connection */ | |
298 | }; | |
299 | ||
300 | struct ListClient | |
301 | { | |
302 | char *chname; | |
303 | unsigned int users_min, users_max; | |
304 | time_t created_min, created_max, topic_min, topic_max; | |
305 | int operspy; | |
306 | }; | |
307 | ||
308 | /* | |
309 | * status macros. | |
310 | */ | |
311 | #define STAT_CONNECTING 0x01 | |
312 | #define STAT_HANDSHAKE 0x02 | |
313 | #define STAT_ME 0x04 | |
314 | #define STAT_UNKNOWN 0x08 | |
315 | #define STAT_REJECT 0x10 | |
316 | #define STAT_SERVER 0x20 | |
317 | #define STAT_CLIENT 0x40 | |
318 | ||
319 | ||
320 | #define IsRegisteredUser(x) ((x)->status == STAT_CLIENT) | |
321 | #define IsRegistered(x) (((x)->status > STAT_UNKNOWN) && ((x)->status != STAT_REJECT)) | |
322 | #define IsConnecting(x) ((x)->status == STAT_CONNECTING) | |
323 | #define IsHandshake(x) ((x)->status == STAT_HANDSHAKE) | |
324 | #define IsMe(x) ((x)->status == STAT_ME) | |
325 | #define IsUnknown(x) ((x)->status == STAT_UNKNOWN) | |
326 | #define IsServer(x) ((x)->status == STAT_SERVER) | |
327 | #define IsClient(x) ((x)->status == STAT_CLIENT) | |
328 | #define IsReject(x) ((x)->status == STAT_REJECT) | |
329 | ||
330 | #define IsAnyServer(x) (IsServer(x) || IsHandshake(x) || IsConnecting(x)) | |
331 | ||
332 | #define IsOper(x) ((x)->umodes & UMODE_OPER) | |
333 | #define IsAdmin(x) ((x)->umodes & UMODE_ADMIN) | |
334 | ||
335 | #define SetReject(x) {(x)->status = STAT_REJECT; \ | |
336 | (x)->handler = UNREGISTERED_HANDLER; } | |
337 | ||
338 | #define SetConnecting(x) {(x)->status = STAT_CONNECTING; \ | |
339 | (x)->handler = UNREGISTERED_HANDLER; } | |
340 | ||
341 | #define SetHandshake(x) {(x)->status = STAT_HANDSHAKE; \ | |
342 | (x)->handler = UNREGISTERED_HANDLER; } | |
343 | ||
344 | #define SetMe(x) {(x)->status = STAT_ME; \ | |
345 | (x)->handler = UNREGISTERED_HANDLER; } | |
346 | ||
347 | #define SetUnknown(x) {(x)->status = STAT_UNKNOWN; \ | |
348 | (x)->handler = UNREGISTERED_HANDLER; } | |
349 | ||
350 | #define SetServer(x) {(x)->status = STAT_SERVER; \ | |
351 | (x)->handler = SERVER_HANDLER; } | |
352 | ||
353 | #define SetClient(x) {(x)->status = STAT_CLIENT; \ | |
354 | (x)->handler = IsOper((x)) ? \ | |
355 | OPER_HANDLER : CLIENT_HANDLER; } | |
356 | #define SetRemoteClient(x) {(x)->status = STAT_CLIENT; \ | |
357 | (x)->handler = RCLIENT_HANDLER; } | |
358 | ||
359 | #define STAT_CLIENT_PARSE (STAT_UNKNOWN | STAT_CLIENT) | |
360 | #define STAT_SERVER_PARSE (STAT_CONNECTING | STAT_HANDSHAKE | STAT_SERVER) | |
361 | ||
362 | #define PARSE_AS_CLIENT(x) ((x)->status & STAT_CLIENT_PARSE) | |
363 | #define PARSE_AS_SERVER(x) ((x)->status & STAT_SERVER_PARSE) | |
364 | ||
365 | ||
366 | /* | |
367 | * ts stuff | |
368 | */ | |
369 | #define TS_CURRENT 6 | |
370 | #define TS_MIN 6 | |
371 | ||
372 | #define TS_DOESTS 0x10000000 | |
373 | #define DoesTS(x) ((x)->tsinfo & TS_DOESTS) | |
374 | ||
375 | #define has_id(source) ((source)->id[0] != '\0') | |
376 | #define use_id(source) ((source)->id[0] != '\0' ? (source)->id : (source)->name) | |
377 | ||
378 | /* if target is TS6, use id if it has one, else name */ | |
379 | #define get_id(source, target) ((IsServer(target->from) && has_id(target->from)) ? \ | |
380 | use_id(source) : (source)->name) | |
381 | ||
382 | /* housekeeping flags */ | |
383 | ||
384 | #define FLAGS_PINGSENT 0x0001 /* Unreplied ping sent */ | |
385 | #define FLAGS_DEAD 0x0002 /* Local socket is dead--Exiting soon */ | |
386 | #define FLAGS_KILLED 0x0004 /* Prevents "QUIT" from being sent for this */ | |
387 | #define FLAGS_SENTUSER 0x0008 /* Client sent a USER command. */ | |
388 | #define FLAGS_CLICAP 0x0010 /* In CAP negotiation, wait for CAP END */ | |
389 | #define FLAGS_CLOSING 0x0020 /* set when closing to suppress errors */ | |
390 | #define FLAGS_PING_COOKIE 0x0040 /* has sent ping cookie */ | |
391 | #define FLAGS_GOTID 0x0080 /* successful ident lookup achieved */ | |
392 | #define FLAGS_FLOODDONE 0x0100 /* flood grace period over / reported */ | |
393 | #define FLAGS_NORMALEX 0x0400 /* Client exited normally */ | |
394 | #define FLAGS_MARK 0x10000 /* marked client */ | |
395 | #define FLAGS_HIDDEN 0x20000 /* hidden server */ | |
396 | #define FLAGS_EOB 0x40000 /* EOB */ | |
397 | #define FLAGS_MYCONNECT 0x80000 /* MyConnect */ | |
398 | #define FLAGS_IOERROR 0x100000 /* IO error */ | |
399 | #define FLAGS_SERVICE 0x200000 /* network service */ | |
400 | #define FLAGS_TGCHANGE 0x400000 /* we're allowed to clear something */ | |
401 | #define FLAGS_DYNSPOOF 0x800000 /* dynamic spoof, only opers see ip */ | |
402 | #define FLAGS_TGEXCESSIVE 0x1000000 /* whether the client has attemped to change targets excessively fast */ | |
403 | #define FLAGS_CLICAP_DATA 0x2000000 /* requested CAP LS 302 */ | |
404 | ||
405 | /* flags for local clients, this needs stuff moved from above to here at some point */ | |
406 | #define LFLAGS_SSL 0x00000001 | |
407 | #define LFLAGS_FLUSH 0x00000002 | |
408 | #define LFLAGS_CORK 0x00000004 | |
409 | ||
410 | /* umodes, settable flags */ | |
411 | /* lots of this moved to snomask -- jilles */ | |
412 | #define UMODE_SERVNOTICE 0x0001 /* server notices */ | |
413 | #define UMODE_WALLOP 0x0002 /* send wallops to them */ | |
414 | #define UMODE_OPERWALL 0x0004 /* Operwalls */ | |
415 | #define UMODE_INVISIBLE 0x0008 /* makes user invisible */ | |
416 | #define UMODE_CALLERID 0x0010 /* block unless caller id's */ | |
417 | #define UMODE_LOCOPS 0x0020 /* show locops */ | |
418 | #define UMODE_SERVICE 0x0040 | |
419 | #define UMODE_DEAF 0x0080 | |
420 | #define UMODE_NOFORWARD 0x0100 /* don't forward */ | |
421 | #define UMODE_REGONLYMSG 0x0200 /* only allow logged in users to msg */ | |
422 | ||
423 | /* user information flags, only settable by remote mode or local oper */ | |
424 | #define UMODE_OPER 0x1000 /* Operator */ | |
425 | #define UMODE_ADMIN 0x2000 /* Admin on server */ | |
426 | #define UMODE_SSLCLIENT 0x4000 /* using SSL */ | |
427 | ||
428 | /* overflow flags */ | |
429 | /* EARLIER FLAGS ARE IN s_newconf.h */ | |
430 | #define FLAGS2_EXTENDCHANS 0x00200000 | |
431 | #define FLAGS2_EXEMPTRESV 0x00400000 | |
432 | #define FLAGS2_EXEMPTKLINE 0x00800000 | |
433 | #define FLAGS2_EXEMPTFLOOD 0x01000000 | |
434 | #define FLAGS2_IP_SPOOFING 0x10000000 | |
435 | #define FLAGS2_EXEMPTSPAMBOT 0x20000000 | |
436 | #define FLAGS2_EXEMPTSHIDE 0x40000000 | |
437 | #define FLAGS2_EXEMPTJUPE 0x80000000 | |
438 | ||
439 | #define DEFAULT_OPER_UMODES (UMODE_SERVNOTICE | UMODE_OPERWALL | \ | |
440 | UMODE_WALLOP | UMODE_LOCOPS) | |
441 | #define DEFAULT_OPER_SNOMASK SNO_GENERAL | |
442 | ||
443 | /* | |
444 | * flags macros. | |
445 | */ | |
446 | #define IsPerson(x) (IsClient(x) && (x)->user != NULL) | |
447 | #define HasServlink(x) ((x)->flags & FLAGS_SERVLINK) | |
448 | #define SetServlink(x) ((x)->flags |= FLAGS_SERVLINK) | |
449 | #define MyConnect(x) ((x)->flags & FLAGS_MYCONNECT) | |
450 | #define SetMyConnect(x) ((x)->flags |= FLAGS_MYCONNECT) | |
451 | #define ClearMyConnect(x) ((x)->flags &= ~FLAGS_MYCONNECT) | |
452 | ||
453 | #define MyClient(x) (MyConnect(x) && IsClient(x)) | |
454 | #define SetMark(x) ((x)->flags |= FLAGS_MARK) | |
455 | #define ClearMark(x) ((x)->flags &= ~FLAGS_MARK) | |
456 | #define IsMarked(x) ((x)->flags & FLAGS_MARK) | |
457 | #define SetHidden(x) ((x)->flags |= FLAGS_HIDDEN) | |
458 | #define ClearHidden(x) ((x)->flags &= ~FLAGS_HIDDEN) | |
459 | #define IsHidden(x) ((x)->flags & FLAGS_HIDDEN) | |
460 | #define ClearEob(x) ((x)->flags &= ~FLAGS_EOB) | |
461 | #define SetEob(x) ((x)->flags |= FLAGS_EOB) | |
462 | #define HasSentEob(x) ((x)->flags & FLAGS_EOB) | |
463 | #define IsDead(x) ((x)->flags & FLAGS_DEAD) | |
464 | #define SetDead(x) ((x)->flags |= FLAGS_DEAD) | |
465 | #define IsClosing(x) ((x)->flags & FLAGS_CLOSING) | |
466 | #define SetClosing(x) ((x)->flags |= FLAGS_CLOSING) | |
467 | #define IsIOError(x) ((x)->flags & FLAGS_IOERROR) | |
468 | #define SetIOError(x) ((x)->flags |= FLAGS_IOERROR) | |
469 | #define IsAnyDead(x) (IsIOError(x) || IsDead(x) || IsClosing(x)) | |
470 | #define IsTGChange(x) ((x)->flags & FLAGS_TGCHANGE) | |
471 | #define SetTGChange(x) ((x)->flags |= FLAGS_TGCHANGE) | |
472 | #define ClearTGChange(x) ((x)->flags &= ~FLAGS_TGCHANGE) | |
473 | #define IsDynSpoof(x) ((x)->flags & FLAGS_DYNSPOOF) | |
474 | #define SetDynSpoof(x) ((x)->flags |= FLAGS_DYNSPOOF) | |
475 | #define ClearDynSpoof(x) ((x)->flags &= ~FLAGS_DYNSPOOF) | |
476 | #define IsTGExcessive(x) ((x)->flags & FLAGS_TGEXCESSIVE) | |
477 | #define SetTGExcessive(x) ((x)->flags |= FLAGS_TGEXCESSIVE) | |
478 | #define ClearTGExcessive(x) ((x)->flags &= ~FLAGS_TGEXCESSIVE) | |
479 | ||
480 | /* local flags */ | |
481 | ||
482 | #define IsSSL(x) ((x)->localClient->localflags & LFLAGS_SSL) | |
483 | #define SetSSL(x) ((x)->localClient->localflags |= LFLAGS_SSL) | |
484 | #define ClearSSL(x) ((x)->localClient->localflags &= ~LFLAGS_SSL) | |
485 | ||
486 | #define IsFlush(x) ((x)->localClient->localflags & LFLAGS_FLUSH) | |
487 | #define SetFlush(x) ((x)->localClient->localflags |= LFLAGS_FLUSH) | |
488 | #define ClearFlush(x) ((x)->localClient->localflags &= ~LFLAGS_FLUSH) | |
489 | ||
490 | /* oper flags */ | |
491 | #define MyOper(x) (MyConnect(x) && IsOper(x)) | |
492 | ||
493 | #define SetOper(x) {(x)->umodes |= UMODE_OPER; \ | |
494 | if (MyClient((x))) (x)->handler = OPER_HANDLER;} | |
495 | ||
496 | #define ClearOper(x) {(x)->umodes &= ~(UMODE_OPER|UMODE_ADMIN); \ | |
497 | if (MyClient((x)) && !IsOper((x)) && !IsServer((x))) \ | |
498 | (x)->handler = CLIENT_HANDLER; } | |
499 | ||
500 | /* umode flags */ | |
501 | #define IsInvisible(x) ((x)->umodes & UMODE_INVISIBLE) | |
502 | #define SetInvisible(x) ((x)->umodes |= UMODE_INVISIBLE) | |
503 | #define ClearInvisible(x) ((x)->umodes &= ~UMODE_INVISIBLE) | |
504 | #define IsSSLClient(x) ((x)->umodes & UMODE_SSLCLIENT) | |
505 | #define SetSSLClient(x) ((x)->umodes |= UMODE_SSLCLIENT) | |
506 | #define ClearSSLClient(x) ((x)->umodes &= ~UMODE_SSLCLIENT) | |
507 | #define SendWallops(x) ((x)->umodes & UMODE_WALLOP) | |
508 | #define SendLocops(x) ((x)->umodes & UMODE_LOCOPS) | |
509 | #define SendServNotice(x) ((x)->umodes & UMODE_SERVNOTICE) | |
510 | #define SendOperwall(x) ((x)->umodes & UMODE_OPERWALL) | |
511 | #define IsSetCallerId(x) ((x)->umodes & UMODE_CALLERID) | |
512 | #define IsService(x) ((x)->umodes & UMODE_SERVICE) | |
513 | #define IsDeaf(x) ((x)->umodes & UMODE_DEAF) | |
514 | #define IsNoForward(x) ((x)->umodes & UMODE_NOFORWARD) | |
515 | #define IsSetRegOnlyMsg(x) ((x)->umodes & UMODE_REGONLYMSG) | |
516 | ||
517 | #define SetGotId(x) ((x)->flags |= FLAGS_GOTID) | |
518 | #define IsGotId(x) (((x)->flags & FLAGS_GOTID) != 0) | |
519 | ||
520 | /* | |
521 | * flags2 macros. | |
522 | */ | |
523 | #define IsExemptKline(x) ((x)->flags2 & FLAGS2_EXEMPTKLINE) | |
524 | #define SetExemptKline(x) ((x)->flags2 |= FLAGS2_EXEMPTKLINE) | |
525 | #define IsExemptFlood(x) ((x)->flags2 & FLAGS2_EXEMPTFLOOD) | |
526 | #define SetExemptFlood(x) ((x)->flags2 |= FLAGS2_EXEMPTFLOOD) | |
527 | #define IsExemptSpambot(x) ((x)->flags2 & FLAGS2_EXEMPTSPAMBOT) | |
528 | #define SetExemptSpambot(x) ((x)->flags2 |= FLAGS2_EXEMPTSPAMBOT) | |
529 | #define IsExemptShide(x) ((x)->flags2 & FLAGS2_EXEMPTSHIDE) | |
530 | #define SetExemptShide(x) ((x)->flags2 |= FLAGS2_EXEMPTSHIDE) | |
531 | #define IsExemptJupe(x) ((x)->flags2 & FLAGS2_EXEMPTJUPE) | |
532 | #define SetExemptJupe(x) ((x)->flags2 |= FLAGS2_EXEMPTJUPE) | |
533 | #define IsExemptResv(x) ((x)->flags2 & FLAGS2_EXEMPTRESV) | |
534 | #define SetExemptResv(x) ((x)->flags2 |= FLAGS2_EXEMPTRESV) | |
535 | #define IsIPSpoof(x) ((x)->flags2 & FLAGS2_IP_SPOOFING) | |
536 | #define SetIPSpoof(x) ((x)->flags2 |= FLAGS2_IP_SPOOFING) | |
537 | #define IsExtendChans(x) ((x)->flags2 & FLAGS2_EXTENDCHANS) | |
538 | #define SetExtendChans(x) ((x)->flags2 |= FLAGS2_EXTENDCHANS) | |
539 | ||
540 | /* for local users: flood grace period is over | |
541 | * for servers: mentioned in networknotice.c notice | |
542 | */ | |
543 | #define IsFloodDone(x) ((x)->flags & FLAGS_FLOODDONE) | |
544 | #define SetFloodDone(x) ((x)->flags |= FLAGS_FLOODDONE) | |
545 | ||
546 | /* These also operate on the uplink from which it came */ | |
547 | #define IsCork(x) (MyConnect(x) ? (x)->localClient->cork_count : (x)->from->localClient->cork_count) | |
548 | #define SetCork(x) (MyConnect(x) ? (x)->localClient->cork_count++ : (x)->from->localClient->cork_count++ ) | |
549 | #define ClearCork(x) (MyConnect(x) ? (x)->localClient->cork_count-- : (x)->from->localClient->cork_count--) | |
550 | ||
551 | /* | |
552 | * definitions for get_client_name | |
553 | */ | |
554 | #define HIDE_IP 0 | |
555 | #define SHOW_IP 1 | |
556 | #define MASK_IP 2 | |
557 | ||
558 | extern void check_banned_lines(void); | |
559 | extern void check_klines_event(void *unused); | |
560 | extern void check_klines(void); | |
561 | extern void check_dlines(void); | |
562 | extern void check_xlines(void); | |
563 | extern void resv_nick_fnc(const char *mask, const char *reason, int temp_time); | |
564 | ||
565 | extern const char *get_client_name(struct Client *client, int show_ip); | |
566 | extern const char *log_client_name(struct Client *, int); | |
567 | extern int is_remote_connect(struct Client *); | |
568 | extern void init_client(void); | |
569 | extern struct Client *make_client(struct Client *from); | |
570 | extern void free_pre_client(struct Client *client); | |
571 | extern void free_client(struct Client *client); | |
572 | ||
573 | extern int exit_client(struct Client *, struct Client *, struct Client *, const char *); | |
574 | ||
575 | extern void error_exit_client(struct Client *, int); | |
576 | ||
577 | ||
578 | ||
579 | extern void count_local_client_memory(size_t * count, size_t * memory); | |
580 | extern void count_remote_client_memory(size_t * count, size_t * memory); | |
581 | ||
582 | extern int clean_nick(const char *, int loc_client); | |
583 | ||
584 | extern struct Client *find_chasing(struct Client *, const char *, int *); | |
585 | extern struct Client *find_person(const char *); | |
586 | extern struct Client *find_named_person(const char *); | |
587 | extern struct Client *next_client(struct Client *, const char *); | |
588 | ||
589 | #define accept_message(s, t) ((s) == (t) || (rb_dlinkFind((s), &((t)->localClient->allow_list)))) | |
590 | extern void del_all_accepts(struct Client *client_p); | |
591 | ||
592 | extern void dead_link(struct Client *client_p, int sendqex); | |
593 | extern int show_ip(struct Client *source_p, struct Client *target_p); | |
594 | extern int show_ip_conf(struct ConfItem *aconf, struct Client *source_p); | |
595 | extern int show_ip_whowas(struct Whowas *whowas, struct Client *source_p); | |
596 | ||
597 | extern void initUser(void); | |
598 | extern void free_user(struct User *, struct Client *); | |
599 | extern struct User *make_user(struct Client *); | |
600 | extern struct Server *make_server(struct Client *); | |
601 | extern void close_connection(struct Client *); | |
602 | extern void init_uid(void); | |
603 | extern char *generate_uid(void); | |
604 | ||
605 | void allocate_away(struct Client *); | |
606 | void free_away(struct Client *); | |
607 | ||
608 | #endif /* INCLUDED_client_h */ |