]> jfr.im git - solanum.git/blob - ircd/s_newconf.c
Merge pull request #336 from edk0/range-leak
[solanum.git] / ircd / s_newconf.c
1 /*
2 * ircd-ratbox: an advanced Internet Relay Chat Daemon(ircd).
3 * s_newconf.c - code for dealing with conf stuff
4 *
5 * Copyright (C) 2004 Lee Hardy <lee@leeh.co.uk>
6 * Copyright (C) 2004-2005 ircd-ratbox development team
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions are
10 * met:
11 *
12 * 1.Redistributions of source code must retain the above copyright notice,
13 * this list of conditions and the following disclaimer.
14 * 2.Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in the
16 * documentation and/or other materials provided with the distribution.
17 * 3.The name of the author may not be used to endorse or promote products
18 * derived from this software without specific prior written permission.
19 *
20 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
21 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
22 * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
23 * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
24 * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
25 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
26 * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
28 * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
29 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
30 * POSSIBILITY OF SUCH DAMAGE.
31 */
32
33 #include "stdinc.h"
34 #include "ircd_defs.h"
35 #include "s_conf.h"
36 #include "s_newconf.h"
37 #include "client.h"
38 #include "s_serv.h"
39 #include "send.h"
40 #include "hostmask.h"
41 #include "newconf.h"
42 #include "hash.h"
43 #include "rb_dictionary.h"
44 #include "rb_radixtree.h"
45 #include "s_assert.h"
46 #include "logger.h"
47 #include "dns.h"
48
49 rb_dlink_list shared_conf_list;
50 rb_dlink_list cluster_conf_list;
51 rb_dlink_list oper_conf_list;
52 rb_dlink_list hubleaf_conf_list;
53 rb_dlink_list server_conf_list;
54 rb_dlink_list xline_conf_list;
55 rb_dlink_list resv_conf_list; /* nicks only! */
56 rb_dlink_list nd_list; /* nick delay */
57 rb_dlink_list tgchange_list;
58
59 rb_patricia_tree_t *tgchange_tree;
60
61 static rb_bh *nd_heap = NULL;
62
63 static void expire_temp_rxlines(void *unused);
64 static void expire_nd_entries(void *unused);
65
66 struct ev_entry *expire_nd_entries_ev = NULL;
67 struct ev_entry *expire_temp_rxlines_ev = NULL;
68
69 void
70 init_s_newconf(void)
71 {
72 tgchange_tree = rb_new_patricia(PATRICIA_BITS);
73 nd_heap = rb_bh_create(sizeof(struct nd_entry), ND_HEAP_SIZE, "nd_heap");
74 expire_nd_entries_ev = rb_event_addish("expire_nd_entries", expire_nd_entries, NULL, 30);
75 expire_temp_rxlines_ev = rb_event_addish("expire_temp_rxlines", expire_temp_rxlines, NULL, 60);
76 }
77
78 void
79 clear_s_newconf(void)
80 {
81 struct server_conf *server_p;
82 rb_dlink_node *ptr;
83 rb_dlink_node *next_ptr;
84
85 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, shared_conf_list.head)
86 {
87 /* ptr here is ptr->data->node */
88 rb_dlinkDelete(ptr, &shared_conf_list);
89 free_remote_conf(ptr->data);
90 }
91
92 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, cluster_conf_list.head)
93 {
94 rb_dlinkDelete(ptr, &cluster_conf_list);
95 free_remote_conf(ptr->data);
96 }
97
98 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, hubleaf_conf_list.head)
99 {
100 rb_dlinkDelete(ptr, &hubleaf_conf_list);
101 free_remote_conf(ptr->data);
102 }
103
104 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, oper_conf_list.head)
105 {
106 free_oper_conf(ptr->data);
107 rb_dlinkDestroy(ptr, &oper_conf_list);
108 }
109
110 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, server_conf_list.head)
111 {
112 server_p = ptr->data;
113
114 if(!server_p->servers)
115 {
116 rb_dlinkDelete(ptr, &server_conf_list);
117 free_server_conf(ptr->data);
118 }
119 else
120 server_p->flags |= SERVER_ILLEGAL;
121 }
122 }
123
124 void
125 clear_s_newconf_bans(void)
126 {
127 struct ConfItem *aconf;
128 rb_dlink_node *ptr, *next_ptr;
129
130 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
131 {
132 aconf = ptr->data;
133
134 if(aconf->hold)
135 continue;
136
137 free_conf(aconf);
138 rb_dlinkDestroy(ptr, &xline_conf_list);
139 }
140
141 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
142 {
143 aconf = ptr->data;
144
145 /* temporary resv */
146 if(aconf->hold)
147 continue;
148
149 free_conf(aconf);
150 rb_dlinkDestroy(ptr, &resv_conf_list);
151 }
152
153 clear_resv_hash();
154 }
155
156 struct remote_conf *
157 make_remote_conf(void)
158 {
159 struct remote_conf *remote_p = rb_malloc(sizeof(struct remote_conf));
160 return remote_p;
161 }
162
163 void
164 free_remote_conf(struct remote_conf *remote_p)
165 {
166 s_assert(remote_p != NULL);
167 if(remote_p == NULL)
168 return;
169
170 rb_free(remote_p->username);
171 rb_free(remote_p->host);
172 rb_free(remote_p->server);
173 rb_free(remote_p);
174 }
175
176 bool
177 find_shared_conf(const char *username, const char *host,
178 const char *server, int flags)
179 {
180 struct remote_conf *shared_p;
181 rb_dlink_node *ptr;
182
183 RB_DLINK_FOREACH(ptr, shared_conf_list.head)
184 {
185 shared_p = ptr->data;
186
187 if(match(shared_p->username, username) &&
188 match(shared_p->host, host) &&
189 match(shared_p->server, server))
190 {
191 if(shared_p->flags & flags)
192 return true;
193 else
194 return false;
195 }
196 }
197
198 return false;
199 }
200
201 void
202 propagate_generic(struct Client *source_p, const char *command,
203 const char *target, int cap, const char *format, ...)
204 {
205 char buffer[BUFSIZE];
206 va_list args;
207
208 va_start(args, format);
209 vsnprintf(buffer, sizeof(buffer), format, args);
210 va_end(args);
211
212 sendto_match_servs(source_p, target, cap, NOCAPS,
213 "%s %s %s",
214 command, target, buffer);
215 sendto_match_servs(source_p, target, CAP_ENCAP, cap,
216 "ENCAP %s %s %s",
217 target, command, buffer);
218 }
219
220 void
221 cluster_generic(struct Client *source_p, const char *command,
222 int cltype, int cap, const char *format, ...)
223 {
224 char buffer[BUFSIZE];
225 struct remote_conf *shared_p;
226 va_list args;
227 rb_dlink_node *ptr;
228
229 va_start(args, format);
230 vsnprintf(buffer, sizeof(buffer), format, args);
231 va_end(args);
232
233 RB_DLINK_FOREACH(ptr, cluster_conf_list.head)
234 {
235 shared_p = ptr->data;
236
237 if(!(shared_p->flags & cltype))
238 continue;
239
240 sendto_match_servs(source_p, shared_p->server, cap, NOCAPS,
241 "%s %s %s",
242 command, shared_p->server, buffer);
243 sendto_match_servs(source_p, shared_p->server, CAP_ENCAP, cap,
244 "ENCAP %s %s %s",
245 shared_p->server, command, buffer);
246 }
247 }
248
249 struct oper_conf *
250 make_oper_conf(void)
251 {
252 struct oper_conf *oper_p = rb_malloc(sizeof(struct oper_conf));
253 return oper_p;
254 }
255
256 void
257 free_oper_conf(struct oper_conf *oper_p)
258 {
259 s_assert(oper_p != NULL);
260 if(oper_p == NULL)
261 return;
262
263 rb_free(oper_p->username);
264 rb_free(oper_p->host);
265 rb_free(oper_p->name);
266 rb_free(oper_p->certfp);
267
268 if(oper_p->passwd)
269 {
270 memset(oper_p->passwd, 0, strlen(oper_p->passwd));
271 rb_free(oper_p->passwd);
272 }
273
274 #ifdef HAVE_LIBCRYPTO
275 rb_free(oper_p->rsa_pubkey_file);
276
277 if(oper_p->rsa_pubkey)
278 RSA_free(oper_p->rsa_pubkey);
279 #endif
280
281 rb_free(oper_p);
282 }
283
284 struct oper_conf *
285 find_oper_conf(const char *username, const char *host, const char *locip, const char *name)
286 {
287 struct oper_conf *oper_p;
288 struct rb_sockaddr_storage ip, cip;
289 char addr[HOSTLEN+1];
290 int bits, cbits;
291 rb_dlink_node *ptr;
292
293 parse_netmask(locip, &cip, &cbits);
294
295 RB_DLINK_FOREACH(ptr, oper_conf_list.head)
296 {
297 oper_p = ptr->data;
298
299 /* name/username doesnt match.. */
300 if(irccmp(oper_p->name, name) || !match(oper_p->username, username))
301 continue;
302
303 rb_strlcpy(addr, oper_p->host, sizeof(addr));
304
305 if(parse_netmask(addr, &ip, &bits) != HM_HOST)
306 {
307 if(GET_SS_FAMILY(&ip) == GET_SS_FAMILY(&cip) &&
308 comp_with_mask_sock((struct sockaddr *)&ip, (struct sockaddr *)&cip, bits))
309 return oper_p;
310 }
311
312 /* we have to compare against the host as well, because its
313 * valid to set a spoof to an IP, which if we only compare
314 * in ip form to sockhost will not necessarily match --anfl
315 */
316 if(match(oper_p->host, host))
317 return oper_p;
318 }
319
320 return NULL;
321 }
322
323 struct server_conf *
324 make_server_conf(void)
325 {
326 struct server_conf *server_p = rb_malloc(sizeof(struct server_conf));
327
328 SET_SS_FAMILY(&server_p->connect4, AF_UNSPEC);
329 SET_SS_LEN(&server_p->connect4, sizeof(struct sockaddr_in));
330
331 SET_SS_FAMILY(&server_p->bind4, AF_UNSPEC);
332 SET_SS_LEN(&server_p->bind4, sizeof(struct sockaddr_in));
333
334 SET_SS_FAMILY(&server_p->connect6, AF_UNSPEC);
335 SET_SS_LEN(&server_p->connect6, sizeof(struct sockaddr_in6));
336
337 SET_SS_FAMILY(&server_p->bind6, AF_UNSPEC);
338 SET_SS_LEN(&server_p->bind6, sizeof(struct sockaddr_in6));
339
340 server_p->aftype = AF_UNSPEC;
341
342 return server_p;
343 }
344
345 void
346 free_server_conf(struct server_conf *server_p)
347 {
348 s_assert(server_p != NULL);
349 if(server_p == NULL)
350 return;
351
352 if(!EmptyString(server_p->passwd))
353 {
354 memset(server_p->passwd, 0, strlen(server_p->passwd));
355 rb_free(server_p->passwd);
356 }
357
358 if(!EmptyString(server_p->spasswd))
359 {
360 memset(server_p->spasswd, 0, strlen(server_p->spasswd));
361 rb_free(server_p->spasswd);
362 }
363
364 rb_free(server_p->name);
365 rb_free(server_p->connect_host);
366 rb_free(server_p->bind_host);
367 rb_free(server_p->class_name);
368 rb_free(server_p->certfp);
369 rb_free(server_p);
370 }
371
372 /*
373 * conf_connect_dns_callback
374 * inputs - pointer to struct ConfItem
375 * - pointer to adns reply
376 * output - none
377 * side effects - called when resolver query finishes
378 * if the query resulted in a successful search, hp will contain
379 * a non-null pointer, otherwise hp will be null.
380 * if successful save hp in the conf item it was called with
381 */
382 static void
383 conf_connect_dns_callback(const char *result, int status, int aftype, void *data)
384 {
385 struct server_conf *server_p = data;
386
387 if(aftype == AF_INET)
388 {
389 if(status == 1)
390 rb_inet_pton_sock(result, &server_p->connect4);
391
392 server_p->dns_query_connect4 = 0;
393 }
394 else if(aftype == AF_INET6)
395 {
396 if(status == 1)
397 rb_inet_pton_sock(result, &server_p->connect6);
398
399 server_p->dns_query_connect6 = 0;
400 }
401 }
402
403 /*
404 * conf_bind_dns_callback
405 * inputs - pointer to struct ConfItem
406 * - pointer to adns reply
407 * output - none
408 * side effects - called when resolver query finishes
409 * if the query resulted in a successful search, hp will contain
410 * a non-null pointer, otherwise hp will be null.
411 * if successful save hp in the conf item it was called with
412 */
413 static void
414 conf_bind_dns_callback(const char *result, int status, int aftype, void *data)
415 {
416 struct server_conf *server_p = data;
417
418 if(aftype == AF_INET)
419 {
420 if(status == 1)
421 rb_inet_pton_sock(result, &server_p->bind4);
422
423 server_p->dns_query_bind4 = 0;
424 }
425 else if(aftype == AF_INET6)
426 {
427 if(status == 1)
428 rb_inet_pton_sock(result, &server_p->bind6);
429
430 server_p->dns_query_bind6 = 0;
431 }
432 }
433
434 void
435 add_server_conf(struct server_conf *server_p)
436 {
437 if(EmptyString(server_p->class_name))
438 {
439 server_p->class_name = rb_strdup("default");
440 server_p->class = default_class;
441 return;
442 }
443
444 server_p->class = find_class(server_p->class_name);
445
446 if(server_p->class == default_class)
447 {
448 conf_report_error("Warning connect::class invalid for %s",
449 server_p->name);
450
451 rb_free(server_p->class_name);
452 server_p->class_name = rb_strdup("default");
453 }
454
455 if(server_p->connect_host && !strpbrk(server_p->connect_host, "*?"))
456 {
457 server_p->dns_query_connect4 =
458 lookup_hostname(server_p->connect_host, AF_INET, conf_connect_dns_callback, server_p);
459 server_p->dns_query_connect6 =
460 lookup_hostname(server_p->connect_host, AF_INET6, conf_connect_dns_callback, server_p);
461 }
462
463 if(server_p->bind_host)
464 {
465 server_p->dns_query_bind4 =
466 lookup_hostname(server_p->bind_host, AF_INET, conf_bind_dns_callback, server_p);
467 server_p->dns_query_bind6 =
468 lookup_hostname(server_p->bind_host, AF_INET6, conf_bind_dns_callback, server_p);
469 }
470 }
471
472 struct server_conf *
473 find_server_conf(const char *name)
474 {
475 struct server_conf *server_p;
476 rb_dlink_node *ptr;
477
478 RB_DLINK_FOREACH(ptr, server_conf_list.head)
479 {
480 server_p = ptr->data;
481
482 if(ServerConfIllegal(server_p))
483 continue;
484
485 if(match(name, server_p->name))
486 return server_p;
487 }
488
489 return NULL;
490 }
491
492 void
493 attach_server_conf(struct Client *client_p, struct server_conf *server_p)
494 {
495 /* already have an attached conf */
496 if(client_p->localClient->att_sconf)
497 {
498 /* short circuit this special case :) */
499 if(client_p->localClient->att_sconf == server_p)
500 return;
501
502 detach_server_conf(client_p);
503 }
504
505 CurrUsers(server_p->class)++;
506
507 client_p->localClient->att_sconf = server_p;
508 server_p->servers++;
509 }
510
511 void
512 detach_server_conf(struct Client *client_p)
513 {
514 struct server_conf *server_p = client_p->localClient->att_sconf;
515
516 if(server_p == NULL)
517 return;
518
519 client_p->localClient->att_sconf = NULL;
520 server_p->servers--;
521 CurrUsers(server_p->class)--;
522
523 if(ServerConfIllegal(server_p) && !server_p->servers)
524 {
525 /* the class this one is using may need destroying too */
526 if(MaxUsers(server_p->class) < 0 && CurrUsers(server_p->class) <= 0)
527 free_class(server_p->class);
528
529 rb_dlinkDelete(&server_p->node, &server_conf_list);
530 free_server_conf(server_p);
531 }
532 }
533
534 void
535 set_server_conf_autoconn(struct Client *source_p, const char *name, int newval)
536 {
537 struct server_conf *server_p;
538
539 if((server_p = find_server_conf(name)) != NULL)
540 {
541 if(newval)
542 server_p->flags |= SERVER_AUTOCONN;
543 else
544 server_p->flags &= ~SERVER_AUTOCONN;
545
546 sendto_realops_snomask(SNO_GENERAL, L_ALL,
547 "%s has changed AUTOCONN for %s to %i",
548 get_oper_name(source_p), name, newval);
549 }
550 else
551 sendto_one_notice(source_p, ":Can't find %s", name);
552 }
553
554 void
555 disable_server_conf_autoconn(const char *name)
556 {
557 struct server_conf *server_p;
558
559 server_p = find_server_conf(name);
560 if(server_p != NULL && server_p->flags & SERVER_AUTOCONN)
561 {
562 server_p->flags &= ~SERVER_AUTOCONN;
563
564 sendto_realops_snomask(SNO_GENERAL, L_ALL,
565 "Disabling AUTOCONN for %s because of error",
566 name);
567 ilog(L_SERVER, "Disabling AUTOCONN for %s because of error",
568 name);
569 }
570 }
571
572 struct ConfItem *
573 find_xline(const char *gecos, int counter)
574 {
575 struct ConfItem *aconf;
576 rb_dlink_node *ptr;
577
578 RB_DLINK_FOREACH(ptr, xline_conf_list.head)
579 {
580 aconf = ptr->data;
581
582 if(match_esc(aconf->host, gecos))
583 {
584 if(counter)
585 aconf->port++;
586 return aconf;
587 }
588 }
589
590 return NULL;
591 }
592
593 struct ConfItem *
594 find_xline_mask(const char *gecos)
595 {
596 struct ConfItem *aconf;
597 rb_dlink_node *ptr;
598
599 RB_DLINK_FOREACH(ptr, xline_conf_list.head)
600 {
601 aconf = ptr->data;
602
603 if(!irccmp(aconf->host, gecos))
604 return aconf;
605 }
606
607 return NULL;
608 }
609
610 struct ConfItem *
611 find_nick_resv(const char *name)
612 {
613 struct ConfItem *aconf;
614 rb_dlink_node *ptr;
615
616 RB_DLINK_FOREACH(ptr, resv_conf_list.head)
617 {
618 aconf = ptr->data;
619
620 if(match_esc(aconf->host, name))
621 {
622 aconf->port++;
623 return aconf;
624 }
625 }
626
627 return NULL;
628 }
629
630 struct ConfItem *
631 find_nick_resv_mask(const char *name)
632 {
633 struct ConfItem *aconf;
634 rb_dlink_node *ptr;
635
636 RB_DLINK_FOREACH(ptr, resv_conf_list.head)
637 {
638 aconf = ptr->data;
639
640 if(!irccmp(aconf->host, name))
641 return aconf;
642 }
643
644 return NULL;
645 }
646
647 /* clean_resv_nick()
648 *
649 * inputs - nick
650 * outputs - 1 if nick is vaild resv, 0 otherwise
651 * side effects -
652 */
653 int
654 clean_resv_nick(const char *nick)
655 {
656 char tmpch;
657 int as = 0;
658 int q = 0;
659 int ch = 0;
660
661 if(*nick == '-' || IsDigit(*nick))
662 return 0;
663
664 while ((tmpch = *nick++))
665 {
666 if(tmpch == '?' || tmpch == '@' || tmpch == '#')
667 q++;
668 else if(tmpch == '*')
669 as++;
670 else if(IsNickChar(tmpch))
671 ch++;
672 else
673 return 0;
674 }
675
676 if(!ch && as)
677 return 0;
678
679 return 1;
680 }
681
682 /* valid_wild_card_simple()
683 *
684 * inputs - "thing" to test
685 * outputs - 1 if enough wildcards, else 0
686 * side effects -
687 */
688 int
689 valid_wild_card_simple(const char *data)
690 {
691 const char *p;
692 char tmpch;
693 int nonwild = 0;
694 int wild = 0;
695
696 /* check the string for minimum number of nonwildcard chars */
697 p = data;
698
699 while((tmpch = *p++))
700 {
701 /* found an escape, p points to the char after it, so skip
702 * that and move on.
703 */
704 if(tmpch == '\\' && *p)
705 {
706 p++;
707 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
708 return 1;
709 }
710 else if(!IsMWildChar(tmpch))
711 {
712 /* if we have enough nonwildchars, return */
713 if(++nonwild >= ConfigFileEntry.min_nonwildcard_simple)
714 return 1;
715 }
716 else
717 wild++;
718 }
719
720 /* strings without wilds are also ok */
721 return wild == 0;
722 }
723
724 time_t
725 valid_temp_time(const char *p)
726 {
727 time_t result = 0;
728
729 while(*p)
730 {
731 if(IsDigit(*p))
732 {
733 result *= 10;
734 result += ((*p) & 0xF);
735 p++;
736 }
737 else
738 return -1;
739 }
740
741 if(result > (60 * 24 * 7 * 52))
742 result = (60 * 24 * 7 * 52);
743
744 return(result * 60);
745 }
746
747 /* Propagated bans are expired elsewhere. */
748 static void
749 expire_temp_rxlines(void *unused)
750 {
751 struct ConfItem *aconf;
752 rb_dlink_node *ptr;
753 rb_dlink_node *next_ptr;
754 rb_radixtree_iteration_state state;
755
756 RB_RADIXTREE_FOREACH(aconf, &state, resv_tree)
757 {
758 if(aconf->lifetime != 0)
759 continue;
760 if(aconf->hold && aconf->hold <= rb_current_time())
761 {
762 if(ConfigFileEntry.tkline_expire_notices)
763 sendto_realops_snomask(SNO_GENERAL, L_ALL,
764 "Temporary RESV for [%s] expired",
765 aconf->host);
766
767 rb_radixtree_delete(resv_tree, aconf->host);
768 free_conf(aconf);
769 }
770 }
771
772 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, resv_conf_list.head)
773 {
774 aconf = ptr->data;
775
776 if(aconf->lifetime != 0)
777 continue;
778 if(aconf->hold && aconf->hold <= rb_current_time())
779 {
780 if(ConfigFileEntry.tkline_expire_notices)
781 sendto_realops_snomask(SNO_GENERAL, L_ALL,
782 "Temporary RESV for [%s] expired",
783 aconf->host);
784 free_conf(aconf);
785 rb_dlinkDestroy(ptr, &resv_conf_list);
786 }
787 }
788
789 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, xline_conf_list.head)
790 {
791 aconf = ptr->data;
792
793 if(aconf->lifetime != 0)
794 continue;
795 if(aconf->hold && aconf->hold <= rb_current_time())
796 {
797 if(ConfigFileEntry.tkline_expire_notices)
798 sendto_realops_snomask(SNO_GENERAL, L_ALL,
799 "Temporary X-line for [%s] expired",
800 aconf->host);
801 free_conf(aconf);
802 rb_dlinkDestroy(ptr, &xline_conf_list);
803 }
804 }
805 }
806
807 unsigned long
808 get_nd_count(void)
809 {
810 return(rb_dlink_list_length(&nd_list));
811 }
812
813 void
814 add_nd_entry(const char *name)
815 {
816 struct nd_entry *nd;
817
818 if(rb_dictionary_find(nd_dict, name) != NULL)
819 return;
820
821 nd = rb_bh_alloc(nd_heap);
822
823 rb_strlcpy(nd->name, name, sizeof(nd->name));
824 nd->expire = rb_current_time() + ConfigFileEntry.nick_delay;
825
826 /* this list is ordered */
827 rb_dlinkAddTail(nd, &nd->lnode, &nd_list);
828
829 rb_dictionary_add(nd_dict, nd->name, nd);
830 }
831
832 void
833 free_nd_entry(struct nd_entry *nd)
834 {
835 rb_dictionary_delete(nd_dict, nd->name);
836
837 rb_dlinkDelete(&nd->lnode, &nd_list);
838 rb_bh_free(nd_heap, nd);
839 }
840
841 void
842 expire_nd_entries(void *unused)
843 {
844 struct nd_entry *nd;
845 rb_dlink_node *ptr;
846 rb_dlink_node *next_ptr;
847
848 RB_DLINK_FOREACH_SAFE(ptr, next_ptr, nd_list.head)
849 {
850 nd = ptr->data;
851
852 /* this list is ordered - we can stop when we hit the first
853 * entry that doesnt expire..
854 */
855 if(nd->expire > rb_current_time())
856 return;
857
858 free_nd_entry(nd);
859 }
860 }
861
862 void
863 add_tgchange(const char *host)
864 {
865 tgchange *target;
866 rb_patricia_node_t *pnode;
867
868 if(find_tgchange(host))
869 return;
870
871 target = rb_malloc(sizeof(tgchange));
872 pnode = make_and_lookup(tgchange_tree, host);
873
874 pnode->data = target;
875 target->pnode = pnode;
876
877 target->ip = rb_strdup(host);
878 target->expiry = rb_current_time() + (60*60*12);
879
880 rb_dlinkAdd(target, &target->node, &tgchange_list);
881 }
882
883 tgchange *
884 find_tgchange(const char *host)
885 {
886 rb_patricia_node_t *pnode;
887
888 if((pnode = rb_match_exact_string(tgchange_tree, host)))
889 return pnode->data;
890
891 return NULL;
892 }