}
if (strcmp(source_p->host, source_p->localClient->mangledhost))
{
- strlcpy(source_p->host, source_p->localClient->mangledhost, HOSTLEN);
+ rb_strlcpy(source_p->host, source_p->localClient->mangledhost, HOSTLEN);
distribute_hostchange(source_p);
}
else /* not really nice, but we need to send this numeric here */
if (source_p->localClient->mangledhost != NULL &&
!strcmp(source_p->host, source_p->localClient->mangledhost))
{
- strlcpy(source_p->host, source_p->orighost, HOSTLEN);
+ rb_strlcpy(source_p->host, source_p->orighost, HOSTLEN);
distribute_hostchange(source_p);
}
}
source_p->umodes &= ~user_modes['h'];
if (source_p->umodes & user_modes['h'])
{
- strlcpy(source_p->host, source_p->localClient->mangledhost, sizeof(source_p->host));
+ rb_strlcpy(source_p->host, source_p->localClient->mangledhost, sizeof(source_p->host));
if (irccmp(source_p->host, source_p->orighost))
SetDynSpoof(source_p);
}
}
if (strcmp(source_p->host, source_p->localClient->mangledhost))
{
- strlcpy(source_p->host, source_p->localClient->mangledhost, HOSTLEN);
+ rb_strlcpy(source_p->host, source_p->localClient->mangledhost, HOSTLEN);
distribute_hostchange(source_p);
}
else /* not really nice, but we need to send this numeric here */
if (source_p->localClient->mangledhost != NULL &&
!strcmp(source_p->host, source_p->localClient->mangledhost))
{
- strlcpy(source_p->host, source_p->orighost, HOSTLEN);
+ rb_strlcpy(source_p->host, source_p->orighost, HOSTLEN);
distribute_hostchange(source_p);
}
}
source_p->umodes &= ~user_modes['h'];
if (source_p->umodes & user_modes['h'])
{
- strlcpy(source_p->host, source_p->localClient->mangledhost, sizeof(source_p->host));
+ rb_strlcpy(source_p->host, source_p->localClient->mangledhost, sizeof(source_p->host));
if (irccmp(source_p->host, source_p->orighost))
SetDynSpoof(source_p);
}
{
static char tmpbuf[BUFSIZE]; int i;
- strlcpy(tmpbuf, parv[0], BUFSIZE);
+ rb_strlcpy(tmpbuf, parv[0], BUFSIZE);
for (i = 1; i < parc; i++)
{
strlcat(tmpbuf, " ", BUFSIZE);
}
- strlcpy(source_p->sockhost, parv[4], sizeof(source_p->sockhost));
+ rb_strlcpy(source_p->sockhost, parv[4], sizeof(source_p->sockhost));
if(strlen(parv[3]) <= HOSTLEN)
- strlcpy(source_p->host, parv[3], sizeof(source_p->host));
+ rb_strlcpy(source_p->host, parv[3], sizeof(source_p->host));
else
- strlcpy(source_p->host, source_p->sockhost, sizeof(source_p->host));
+ rb_strlcpy(source_p->host, source_p->sockhost, sizeof(source_p->host));
del_unknown_ip(source_p);
inetpton_sock(parv[4], (struct sockaddr *)&source_p->localClient->ip);
const char *inetntop_sock(struct sockaddr *src, char *dst, unsigned int size);
int inetpton_sock(const char *src, struct sockaddr *dst);
-#ifndef HAVE_STRLCPY
-size_t strlcpy(char *dst, const char *src, size_t siz);
-#endif
-
#ifndef HAVE_STRLCAT
size_t strlcat(char *dst, const char *src, size_t siz);
#endif
mode.mode |= MODE_DISFORWARD;
break;
case 'f':
- strlcpy(mode.forward, parv[4 + args], sizeof(mode.forward));
+ rb_strlcpy(mode.forward, parv[4 + args], sizeof(mode.forward));
args++;
if(parc < 5 + args)
return 0;
return 0;
break;
case 'k':
- strlcpy(mode.key, parv[4 + args], sizeof(mode.key));
+ rb_strlcpy(mode.key, parv[4 + args], sizeof(mode.key));
args++;
if(parc < 5 + args)
return 0;
if(chptr->mode.mode & MODE_NOCOLOR)
{
- strlcpy(text2, text, BUFSIZE);
+ rb_strlcpy(text2, text, BUFSIZE);
strip_colour(text2);
text = text2;
if (EmptyString(text))
*s = '\0';
/* copy the nick and terminate it */
- strlcpy(nick, parv[1], sizeof(nick));
+ rb_strlcpy(nick, parv[1], sizeof(nick));
/* check the nickname is ok */
if(!clean_nick(nick, 1))
flood_endgrace(source_p);
/* terminate nick to NICKLEN, we dont want clean_nick() to error! */
- strlcpy(nick, parv[1], sizeof(nick));
+ rb_strlcpy(nick, parv[1], sizeof(nick));
/* check the nickname is ok */
if(!clean_nick(nick, 1))
if(source_p->flags & FLAGS_SENTUSER)
{
- strlcpy(buf, source_p->username, sizeof(buf));
+ rb_strlcpy(buf, source_p->username, sizeof(buf));
/* got user, heres nick. */
register_local_user(client_p, source_p, buf);
source_p->tsinfo = newts;
strcpy(source_p->name, nick);
- strlcpy(source_p->username, parv[5], sizeof(source_p->username));
- strlcpy(source_p->host, parv[6], sizeof(source_p->host));
- strlcpy(source_p->orighost, source_p->host, sizeof(source_p->orighost));
+ rb_strlcpy(source_p->username, parv[5], sizeof(source_p->username));
+ rb_strlcpy(source_p->host, parv[6], sizeof(source_p->host));
+ rb_strlcpy(source_p->orighost, source_p->host, sizeof(source_p->orighost));
if(parc == 12)
{
- strlcpy(source_p->info, parv[11], sizeof(source_p->info));
- strlcpy(source_p->sockhost, parv[7], sizeof(source_p->sockhost));
- strlcpy(source_p->id, parv[8], sizeof(source_p->id));
+ rb_strlcpy(source_p->info, parv[11], sizeof(source_p->info));
+ rb_strlcpy(source_p->sockhost, parv[7], sizeof(source_p->sockhost));
+ rb_strlcpy(source_p->id, parv[8], sizeof(source_p->id));
add_to_id_hash(source_p->id, source_p);
if (strcmp(parv[9], "*"))
{
- strlcpy(source_p->orighost, parv[9], sizeof(source_p->orighost));
+ rb_strlcpy(source_p->orighost, parv[9], sizeof(source_p->orighost));
if (irccmp(source_p->host, source_p->orighost))
SetDynSpoof(source_p);
}
if (strcmp(parv[10], "*"))
- strlcpy(source_p->user->suser, parv[10], sizeof(source_p->user->suser));
+ rb_strlcpy(source_p->user->suser, parv[10], sizeof(source_p->user->suser));
}
else if(parc == 10)
{
- strlcpy(source_p->info, parv[9], sizeof(source_p->info));
- strlcpy(source_p->sockhost, parv[7], sizeof(source_p->sockhost));
- strlcpy(source_p->id, parv[8], sizeof(source_p->id));
+ rb_strlcpy(source_p->info, parv[9], sizeof(source_p->info));
+ rb_strlcpy(source_p->sockhost, parv[7], sizeof(source_p->sockhost));
+ rb_strlcpy(source_p->id, parv[8], sizeof(source_p->id));
add_to_id_hash(source_p->id, source_p);
}
else
{
- strlcpy(source_p->info, parv[8], sizeof(source_p->info));
+ rb_strlcpy(source_p->info, parv[8], sizeof(source_p->info));
}
/* remove any nd entries for this nick */
reason[0] = '\0';
if(parc > 2)
- strlcpy(reason, parv[2], sizeof(reason));
+ rb_strlcpy(reason, parv[2], sizeof(reason));
name = strtoken(&p, s, ",");
name = parv[1];
hop = atoi(parv[2]);
- strlcpy(info, parv[3], sizeof(info));
+ rb_strlcpy(info, parv[3], sizeof(info));
if (IsHandshake(client_p) && irccmp(client_p->name, name))
{
* C:line in client_p->name
*/
- strlcpy(client_p->name, name, sizeof(client_p->name));
+ rb_strlcpy(client_p->name, name, sizeof(client_p->name));
set_server_gecos(client_p, info);
client_p->hopcount = hop;
server_estab(client_p);
name = parv[1];
hop = atoi(parv[2]);
- strlcpy(info, parv[3], sizeof(info));
+ rb_strlcpy(info, parv[3], sizeof(info));
if((target_p = find_server(NULL, name)))
{
make_server(target_p);
target_p->hopcount = hop;
- strlcpy(target_p->name, name, sizeof(target_p->name));
+ rb_strlcpy(target_p->name, name, sizeof(target_p->name));
set_server_gecos(target_p, info);
target_p = make_client(client_p);
make_server(target_p);
- strlcpy(target_p->name, parv[1], sizeof(target_p->name));
+ rb_strlcpy(target_p->name, parv[1], sizeof(target_p->name));
target_p->hopcount = atoi(parv[2]);
strcpy(target_p->id, parv[3]);
set_server_gecos(target_p, parv[4]);
/* if there was a trailing space, s could point to \0, so check */
if(s && (*s != '\0'))
{
- strlcpy(client_p->info, s, sizeof(client_p->info));
+ rb_strlcpy(client_p->info, s, sizeof(client_p->info));
return 1;
}
}
}
- strlcpy(client_p->info, "(Unknown Location)", sizeof(client_p->info));
+ rb_strlcpy(client_p->info, "(Unknown Location)", sizeof(client_p->info));
return 1;
}
if(data)
{
- strlcpy(buf, data, sizeof(buf));
+ rb_strlcpy(buf, data, sizeof(buf));
p = buf;
}
if(source_p->name[0] && source_p->user)
{
char buf[USERLEN+1];
- strlcpy(buf, source_p->username, sizeof(buf));
+ rb_strlcpy(buf, source_p->username, sizeof(buf));
register_local_user(source_p, source_p, buf);
}
}
source_p->localClient->chal_time = rb_current_time();
for(;;)
{
- cnt = strlcpy(chal_line, chal, CHALLENGE_WIDTH);
+ cnt = rb_strlcpy(chal_line, chal, CHALLENGE_WIDTH);
sendto_one(source_p, form_str(RPL_RSACHALLENGE2), me.name, source_p->name, chal_line);
if(cnt > CHALLENGE_WIDTH)
chal += CHALLENGE_WIDTH - 1;
return 0;
del_from_hostname_hash(source_p->orighost, source_p);
- strlcpy(source_p->orighost, parv[1], sizeof source_p->orighost);
+ rb_strlcpy(source_p->orighost, parv[1], sizeof source_p->orighost);
if (irccmp(source_p->host, source_p->orighost))
SetDynSpoof(source_p);
else
}
dlhost = parv[loc];
- strlcpy(cidr_form_host, dlhost, sizeof(cidr_form_host));
+ rb_strlcpy(cidr_form_host, dlhost, sizeof(cidr_form_host));
if(!parse_netmask(dlhost, NULL, &bits))
{
return 0;
}
- strlcpy(buf, aconf->host, sizeof buf);
+ rb_strlcpy(buf, aconf->host, sizeof buf);
if(remove_temp_dline(aconf))
{
sendto_one(source_p,
while (fgets(buf, sizeof(buf), in))
{
- strlcpy(buff, buf, sizeof(buff));
+ rb_strlcpy(buff, buf, sizeof(buff));
if((p = strchr(buff, '\n')) != NULL)
*p = '\0';
if (!ConfigFileEntry.operspy_dont_care_user_info)
{
char buf[512];
- strlcpy(buf, mask, sizeof(buf));
+ rb_strlcpy(buf, mask, sizeof(buf));
if(!EmptyString(gecos)) {
strlcat(buf, " ", sizeof(buf));
strlcat(buf, gecos, sizeof(buf));
{
*(hostp++) = '\0'; /* short and squat */
if(*userhost)
- strlcpy(luser, userhost, USERLEN + 1); /* here is my user */
+ rb_strlcpy(luser, userhost, USERLEN + 1); /* here is my user */
else
strcpy(luser, "*");
if(*hostp)
- strlcpy(lhost, hostp, HOSTLEN + 1); /* here is my host */
+ rb_strlcpy(lhost, hostp, HOSTLEN + 1); /* here is my host */
else
strcpy(lhost, "*");
}
luser[0] = '*'; /* no @ found, assume its *@somehost */
luser[1] = '\0';
- strlcpy(lhost, userhost, HOSTLEN + 1);
+ rb_strlcpy(lhost, userhost, HOSTLEN + 1);
}
return 1;
if(source_p->localClient->random_ping == incoming_ping)
{
char buf[USERLEN + 1];
- strlcpy(buf, source_p->username, sizeof(buf));
+ rb_strlcpy(buf, source_p->username, sizeof(buf));
source_p->flags |= FLAGS_PING_COOKIE;
register_local_user(client_p, source_p, buf);
}
break;
}
- strlcpy(buff, buf, sizeof(buff));
+ rb_strlcpy(buff, buf, sizeof(buff));
if((p = strchr(buff, '\n')) != NULL)
*p = '\0';
if(*target_p->preClient->sasl_agent && strncmp(parv[1], target_p->preClient->sasl_agent, IDLEN))
return 0;
else if(!*target_p->preClient->sasl_agent)
- strlcpy(target_p->preClient->sasl_agent, parv[1], IDLEN);
+ rb_strlcpy(target_p->preClient->sasl_agent, parv[1], IDLEN);
if(*parv[3] == 'C')
sendto_one(target_p, "AUTHENTICATE %s", parv[4]);
{
if (!ConfigFileEntry.operspy_dont_care_user_info)
{
- strlcpy(buf, "UMODES", sizeof buf);
+ rb_strlcpy(buf, "UMODES", sizeof buf);
for (i = 2; i < parc; i++)
{
strlcat(buf, " ", sizeof buf);
if(EmptyString(parv[2]))
target_p->user->suser[0] = '\0';
else
- strlcpy(target_p->user->suser, parv[2], sizeof(target_p->user->suser));
+ rb_strlcpy(target_p->user->suser, parv[2], sizeof(target_p->user->suser));
invalidate_bancache_user(target_p);
if(!IsPerson(source_p))
return 0;
- strlcpy(source_p->user->suser, parv[1], sizeof(source_p->user->suser));
+ rb_strlcpy(source_p->user->suser, parv[1], sizeof(source_p->user->suser));
return 0;
}
}
else
{
- strlcpy(GlobalSetOptions.operstring, arg,
+ rb_strlcpy(GlobalSetOptions.operstring, arg,
sizeof(GlobalSetOptions.operstring));
sendto_realops_snomask(SNO_GENERAL, L_ALL,
}
else
{
- strlcpy(GlobalSetOptions.adminstring, arg,
+ rb_strlcpy(GlobalSetOptions.adminstring, arg,
sizeof(GlobalSetOptions.adminstring));
sendto_realops_snomask(SNO_GENERAL, L_ALL,
if(clean_nick(parv[2]))
{
- strlcpy(nick, parv[2], NICKLEN + 1);
+ rb_strlcpy(nick, parv[2], NICKLEN + 1);
valid |= NICK_VALID;
}
else if(*target_p->name)
- strlcpy(nick, target_p->name, NICKLEN + 1);
+ rb_strlcpy(nick, target_p->name, NICKLEN + 1);
else
strcpy(nick, "*");
if(clean_username(parv[3]))
{
- strlcpy(user, parv[3], USERLEN + 1);
+ rb_strlcpy(user, parv[3], USERLEN + 1);
valid |= USER_VALID;
}
else
- strlcpy(user, target_p->username, USERLEN + 1);
+ rb_strlcpy(user, target_p->username, USERLEN + 1);
if(clean_host(parv[4]))
{
- strlcpy(host, parv[4], HOSTLEN + 1);
+ rb_strlcpy(host, parv[4], HOSTLEN + 1);
valid |= HOST_VALID;
}
else
- strlcpy(host, target_p->host, HOSTLEN + 1);
+ rb_strlcpy(host, target_p->host, HOSTLEN + 1);
if(*parv[5] == '*')
{
if(target_p->user)
- strlcpy(login, target_p->user->suser, NICKLEN + 1);
+ rb_strlcpy(login, target_p->user->suser, NICKLEN + 1);
else
login[0] = '\0';
}
else if(!strcmp(parv[5], "0"))
login[0] = '\0';
else
- strlcpy(login, parv[5], NICKLEN + 1);
+ rb_strlcpy(login, parv[5], NICKLEN + 1);
/* Login (mostly) follows nick rules. */
if(*login && !clean_nick(login))
if(valid & HOST_VALID)
strcpy(target_p->preClient->spoofhost, host);
- strlcpy(user_p->suser, login, NICKLEN + 1);
+ rb_strlcpy(user_p->suser, login, NICKLEN + 1);
}
else
{
else if(*parv[5] != '*')
{
if (clean_nick(parv[5]))
- strlcpy(login, parv[5], NICKLEN + 1);
+ rb_strlcpy(login, parv[5], NICKLEN + 1);
else
return 0;
}
if (username != NULL)
{
- strlcpy(user_trunc, username, sizeof user_trunc);
- strlcpy(notildeuser_trunc, *username == '~' ? username + 1 : username, sizeof notildeuser_trunc);
+ rb_strlcpy(user_trunc, username, sizeof user_trunc);
+ rb_strlcpy(notildeuser_trunc, *username == '~' ? username + 1 : username, sizeof notildeuser_trunc);
}
else
{
- strlcpy(user_trunc, "dummy", sizeof user_trunc);
- strlcpy(notildeuser_trunc, "dummy", sizeof notildeuser_trunc);
+ rb_strlcpy(user_trunc, "dummy", sizeof user_trunc);
+ rb_strlcpy(notildeuser_trunc, "dummy", sizeof notildeuser_trunc);
}
/* now look for a matching I/K/G */
if((aconf = find_address_conf(host, NULL, user_trunc, notildeuser_trunc,
source_p->flags |= FLAGS_SENTUSER;
}
- strlcpy(source_p->info, realname, sizeof(source_p->info));
+ rb_strlcpy(source_p->info, realname, sizeof(source_p->info));
if(!IsGotId(source_p))
{
/* This is in this location for a reason..If there is no identd
* and ping cookies are enabled..we need to have a copy of this
*/
- strlcpy(source_p->username, username, sizeof(source_p->username));
+ rb_strlcpy(source_p->username, username, sizeof(source_p->username));
}
if(source_p->name[0])
break;
}
- strlcpy(buff, buf, sizeof(buff));
+ rb_strlcpy(buff, buf, sizeof(buff));
if((p = strchr(buff, '\n')) != NULL)
*p = '\0';
if (rb_dlink_list_length(&blcptr->client_p->preClient->dnsbl_queries) == 0 && blcptr->client_p->flags & FLAGS_SENTUSER && !EmptyString(blcptr->client_p->name))
{
char buf[USERLEN + 1];
- strlcpy(buf, blcptr->client_p->username, sizeof buf);
+ rb_strlcpy(buf, blcptr->client_p->username, sizeof buf);
register_local_user(blcptr->client_p, blcptr->client_p, buf);
}
}
else
blptr->status &= ~CONF_ILLEGAL;
- strlcpy(blptr->host, name, HOSTLEN);
- strlcpy(blptr->reject_reason, reject_reason, IRCD_BUFSIZE);
+ rb_strlcpy(blptr->host, name, HOSTLEN);
+ rb_strlcpy(blptr->reject_reason, reject_reason, IRCD_BUFSIZE);
blptr->lastwarning = 0;
return blptr;
{
if(chptr->topic == NULL)
allocate_topic(chptr);
- strlcpy(chptr->topic, topic, TOPICLEN + 1);
- strlcpy(chptr->topic_info, topic_info, USERHOST_REPLYLEN);
+ rb_strlcpy(chptr->topic, topic, TOPICLEN + 1);
+ rb_strlcpy(chptr->topic_info, topic_info, USERHOST_REPLYLEN);
chptr->topic_time = topicts;
}
else
*mbuf = '\0';
- strlcpy(final, buf1, sizeof final);
+ rb_strlcpy(final, buf1, sizeof final);
strlcat(final, buf2, sizeof final);
return final;
}
if(IsPerson(source_p))
rb_sprintf(who, "%s!%s@%s", source_p->name, source_p->username, source_p->host);
else
- strlcpy(who, source_p->name, sizeof(who));
+ rb_strlcpy(who, source_p->name, sizeof(who));
actualBan = allocate_ban(realban, who);
actualBan->when = rb_current_time();
}
}
- strlcpy(chptr->mode.forward, forward, sizeof(chptr->mode.forward));
+ rb_strlcpy(chptr->mode.forward, forward, sizeof(chptr->mode.forward));
mode_changes[mode_count].letter = c;
mode_changes[mode_count].dir = MODE_ADD;
return;
s_assert(key[0] != ' ');
- strlcpy(chptr->mode.key, key, sizeof(chptr->mode.key));
+ rb_strlcpy(chptr->mode.key, key, sizeof(chptr->mode.key));
mode_changes[mode_count].letter = c;
mode_changes[mode_count].dir = MODE_ADD;
abt = (struct abort_client *) rb_malloc(sizeof(struct abort_client));
if(client_p->flags & FLAGS_SENDQEX)
- strlcpy(abt->notice, "Max SendQ exceeded", sizeof(abt->notice));
+ rb_strlcpy(abt->notice, "Max SendQ exceeded", sizeof(abt->notice));
else
rb_snprintf(abt->notice, sizeof(abt->notice), "Write error: %s", strerror(errno));
}
if(error == 0)
- strlcpy(errmsg, "Remote host closed the connection", sizeof(errmsg));
+ rb_strlcpy(errmsg, "Remote host closed the connection", sizeof(errmsg));
else
rb_snprintf(errmsg, sizeof(errmsg), "Read error: %s", strerror(current_error));
}
#endif
-#ifndef HAVE_STRLCPY
-size_t
-strlcpy(char *dst, const char *src, size_t siz)
-{
- char *d = dst;
- const char *s = src;
- size_t n = siz;
- /* Copy as many bytes as will fit */
- if(n != 0 && --n != 0)
- {
- do
- {
- if((*d++ = *s++) == 0)
- break;
- }
- while(--n != 0);
- }
- /* Not enough room in dst, add NUL and traverse rest of src */
- if(n == 0)
- {
- if(siz != 0)
- *d = '\0'; /* NUL-terminate dst */
- while(*s++)
- ;
- }
-
- return (s - src - 1); /* count does not include NUL */
-}
-#endif
-
char *
strip_colour(char *string)
{
GlobalSetOptions.ident_timeout = IDENT_TIMEOUT;
- strlcpy(GlobalSetOptions.operstring,
+ rb_strlcpy(GlobalSetOptions.operstring,
ConfigFileEntry.default_operstring,
sizeof(GlobalSetOptions.operstring));
- strlcpy(GlobalSetOptions.adminstring,
+ rb_strlcpy(GlobalSetOptions.adminstring,
ConfigFileEntry.default_adminstring,
sizeof(GlobalSetOptions.adminstring));
ierror("no server name specified in serverinfo block.");
return -1;
}
- strlcpy(me.name, ServerInfo.name, sizeof(me.name));
+ rb_strlcpy(me.name, ServerInfo.name, sizeof(me.name));
if(ServerInfo.sid[0] == '\0')
{
ierror("no server description specified in serverinfo block.");
return -3;
}
- strlcpy(me.info, ServerInfo.description, sizeof(me.info));
+ rb_strlcpy(me.info, ServerInfo.description, sizeof(me.info));
if(ServerInfo.ssl_cert != NULL && ServerInfo.ssl_private_key != NULL)
{
sizeof(new_client->sockhost));
- strlcpy(new_client->host, new_client->sockhost, sizeof(new_client->host));
+ rb_strlcpy(new_client->host, new_client->sockhost, sizeof(new_client->host));
new_client->localClient->F = F;
add_to_cli_fd_hash(new_client);
{
char host_name[HOSTLEN + 1];
- strlcpy(host_name, name, HOSTLEN + 1);
+ rb_strlcpy(host_name, name, HOSTLEN + 1);
add_local_domain(host_name, HOSTLEN);
if (request == NULL)
request->state = REQ_A;
}
- strlcpy(request->queryname, host_name, sizeof(request->queryname));
+ rb_strlcpy(request->queryname, host_name, sizeof(request->queryname));
request->type = type;
query_name(request);
}
else if (n == 0)
return (0); /* no more answers left */
- strlcpy(request->name, hostbuf, HOSTLEN + 1);
+ rb_strlcpy(request->name, hostbuf, HOSTLEN + 1);
return (1);
break;
{
if (!inetntop_sock((struct sockaddr *)&(irc_nsaddr_list[i]),
ipaddr, sizeof ipaddr))
- strlcpy(ipaddr, "?", sizeof ipaddr);
+ rb_strlcpy(ipaddr, "?", sizeof ipaddr);
sendto_one_numeric(source_p, RPL_STATSDEBUG,
"A %s", ipaddr);
}
*p = '\0'; /* take the first word */
if (irccmp(opt, "domain") == 0)
- strlcpy(irc_domain, arg, sizeof(irc_domain));
+ rb_strlcpy(irc_domain, arg, sizeof(irc_domain));
else if (irccmp(opt, "nameserver") == 0)
add_nameserver(arg);
}
if(good && strlen(reply->h_name) <= HOSTLEN)
{
- strlcpy(auth->client->host, reply->h_name, sizeof(auth->client->host));
+ rb_strlcpy(auth->client->host, reply->h_name, sizeof(auth->client->host));
sendheader(auth->client, REPORT_FIN_DNS);
}
else if (strlen(reply->h_name) > HOSTLEN)
}
else
{
- strlcpy(non_ident, "~", sizeof(non_ident));
+ rb_strlcpy(non_ident, "~", sizeof(non_ident));
strlcat(non_ident, username, sizeof(non_ident));
aconf = find_address_conf(client_p->host, client_p->sockhost,
non_ident, client_p->username,
char *host = p+1;
*p = '\0';
- strlcpy(client_p->username, aconf->name,
+ rb_strlcpy(client_p->username, aconf->name,
sizeof(client_p->username));
- strlcpy(client_p->host, host,
+ rb_strlcpy(client_p->host, host,
sizeof(client_p->host));
*p = '@';
}
else
- strlcpy(client_p->host, aconf->name, sizeof(client_p->host));
+ rb_strlcpy(client_p->host, aconf->name, sizeof(client_p->host));
}
return (attach_iline(client_p, aconf));
}
read_conf_files(NO);
if(ServerInfo.description != NULL)
- strlcpy(me.info, ServerInfo.description, sizeof(me.info));
+ rb_strlcpy(me.info, ServerInfo.description, sizeof(me.info));
else
- strlcpy(me.info, "unknown", sizeof(me.info));
+ rb_strlcpy(me.info, "unknown", sizeof(me.info));
open_logfiles();
return (0);
- Gozem 2002-07-21
*/
- strlcpy(conffilebuf, filename, sizeof(conffilebuf));
+ rb_strlcpy(conffilebuf, filename, sizeof(conffilebuf));
if((conf_fbfile_in = fopen(filename, "r")) == NULL)
{
if(irccmp(oper_p->name, name) || !match(oper_p->username, username))
continue;
- strlcpy(addr, oper_p->host, sizeof(addr));
+ rb_strlcpy(addr, oper_p->host, sizeof(addr));
if(parse_netmask(addr, (struct sockaddr *)&ip, &bits) != HM_HOST)
{
nd = rb_bh_alloc(nd_heap);
- strlcpy(nd->name, name, sizeof(nd->name));
+ rb_strlcpy(nd->name, name, sizeof(nd->name));
nd->expire = rb_current_time() + ConfigFileEntry.nick_delay;
/* this list is ordered */
* The sockhost may be a hostname, this will be corrected later
* -- jilles
*/
- strlcpy(client_p->name, server_p->name, sizeof(client_p->name));
- strlcpy(client_p->host, server_p->host, sizeof(client_p->host));
- strlcpy(client_p->sockhost, server_p->host, sizeof(client_p->sockhost));
+ rb_strlcpy(client_p->name, server_p->name, sizeof(client_p->name));
+ rb_strlcpy(client_p->host, server_p->host, sizeof(client_p->host));
+ rb_strlcpy(client_p->sockhost, server_p->host, sizeof(client_p->sockhost));
client_p->localClient->F = F;
add_to_cli_fd_hash(client_p);
char note[NICKLEN + 10];
del_from_client_hash(source_p->name, source_p);
- strlcpy(source_p->name, source_p->preClient->spoofnick, NICKLEN + 1);
+ rb_strlcpy(source_p->name, source_p->preClient->spoofnick, NICKLEN + 1);
add_to_client_hash(source_p->name, source_p);
rb_snprintf(note, NICKLEN + 10, "Nick: %s", source_p->name);
{
sendto_one_notice(source_p, ":*** Notice -- You have an illegal character in your hostname");
- strlcpy(source_p->host, source_p->sockhost, sizeof(source_p->host));
+ rb_strlcpy(source_p->host, source_p->sockhost, sizeof(source_p->host));
}
/* end of valid user name check */
/* Store original hostname -- jilles */
- strlcpy(source_p->orighost, source_p->host, HOSTLEN + 1);
+ rb_strlcpy(source_p->orighost, source_p->host, HOSTLEN + 1);
/* Spoof user@host */
if(*source_p->preClient->spoofuser)
- strlcpy(source_p->username, source_p->preClient->spoofuser, USERLEN + 1);
+ rb_strlcpy(source_p->username, source_p->preClient->spoofuser, USERLEN + 1);
if(*source_p->preClient->spoofhost)
{
- strlcpy(source_p->host, source_p->preClient->spoofhost, HOSTLEN + 1);
+ rb_strlcpy(source_p->host, source_p->preClient->spoofhost, HOSTLEN + 1);
if (irccmp(source_p->host, source_p->orighost))
SetDynSpoof(source_p);
}
target_p->host, nick);
}
- strlcpy(target_p->username, user, sizeof target_p->username);
- strlcpy(target_p->host, host, sizeof target_p->host);
+ rb_strlcpy(target_p->username, user, sizeof target_p->username);
+ rb_strlcpy(target_p->host, host, sizeof target_p->host);
if (changed)
add_history(target_p, 1);
del_from_client_hash(target_p->name, target_p);
- strlcpy(target_p->name, nick, NICKLEN);
+ rb_strlcpy(target_p->name, nick, NICKLEN);
add_to_client_hash(target_p->name, target_p);
if(changed)
ptr = (struct scache_entry *) rb_malloc(sizeof(struct scache_entry));
s_assert(0 != ptr);
- strlcpy(ptr->name, name, sizeof(ptr->name));
+ rb_strlcpy(ptr->name, name, sizeof(ptr->name));
ptr->info[0] = '\0';
ptr->flags = 0;
ptr->known_since = rb_current_time();
struct scache_entry *ptr;
ptr = find_or_add(name);
- strlcpy(ptr->info, info, sizeof(ptr->info));
+ rb_strlcpy(ptr->info, info, sizeof(ptr->info));
ptr->flags |= SC_ONLINE;
if (hidden)
ptr->flags |= SC_HIDDEN;
if (!strcasecmp(varname, val->name))
{
- strlcpy(bptr, val->value, BUFSIZE - (bptr - buf));
+ rb_strlcpy(bptr, val->value, BUFSIZE - (bptr - buf));
bptr += strlen(val->value);
break;
}
* NOTE: strcpy ok here, the sizes in the client struct MUST
* match the sizes in the whowas struct
*/
- strlcpy(who->name, client_p->name, sizeof(who->name));
+ rb_strlcpy(who->name, client_p->name, sizeof(who->name));
strcpy(who->username, client_p->username);
strcpy(who->hostname, client_p->host);
strcpy(who->realname, client_p->info);