const char *text)
{
int result;
- char text2[BUFSIZE];
hook_data_privmsg_channel hdata;
if(MyClient(source_p))
if(result == CAN_SEND_OPV ||
!flood_attack_channel(msgtype, source_p, chptr, chptr->chname))
{
- if (msgtype != MESSAGE_TYPE_NOTICE && *text == '\001' &&
- strncasecmp(text + 1, "ACTION ", 7))
- {
- if (chptr->mode.mode & MODE_NOCTCP)
- {
- sendto_one_numeric(source_p, ERR_CANNOTSENDTOCHAN,
- form_str(ERR_CANNOTSENDTOCHAN), chptr->chname);
- return;
- }
- else if (rb_dlink_list_length(&chptr->locmembers) > (unsigned)(GlobalSetOptions.floodcount / 2))
- source_p->large_ctcp_sent = rb_current_time();
- }
sendto_channel_flags(client_p, ALL_MEMBERS, source_p, chptr,
"%s %s :%s", cmdname[msgtype], chptr->chname, text);
}
struct Client *client_p, struct Client *source_p,
struct Channel *chptr, const char *text)
{
- char text2[BUFSIZE];
hook_data_privmsg_channel hdata;
hdata.msgtype = msgtype;
msg_channel_flags(enum message_type msgtype, struct Client *client_p,
struct Client *source_p, struct Channel *chptr, int flags, const char *text)
{
- char text2[BUFSIZE];
int type;
char c;
hook_data_privmsg_channel hdata;
return;
}
- if (msgtype != MESSAGE_TYPE_NOTICE && *text == '\001' &&
- strncasecmp(text + 1, "ACTION ", 7))
- {
- if (chptr->mode.mode & MODE_NOCTCP)
- {
- sendto_one_numeric(source_p, ERR_CANNOTSENDTOCHAN,
- form_str(ERR_CANNOTSENDTOCHAN), chptr->chname);
- return;
- }
- else if (rb_dlink_list_length(&chptr->locmembers) > (unsigned)(GlobalSetOptions.floodcount / 2))
- {
- /* This overestimates the number of users the CTCP
- * is being sent to, so large_ctcp_sent might be
- * set inappropriately. This should not be a problem.
- */
- source_p->large_ctcp_sent = rb_current_time();
- }
- }
-
sendto_channel_flags(client_p, type, source_p, chptr, "%s %c%s :%s",
cmdname[msgtype], c, chptr->chname, text);
}