ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/trunk/src/conf_parser.y
(Generate patch)

Comparing:
ircd-hybrid-8/src/ircd_parser.y (file contents), Revision 1156 by michael, Tue Aug 9 20:29:20 2011 UTC vs.
ircd-hybrid/trunk/src/conf_parser.y (file contents), Revision 1904 by michael, Sat Apr 27 21:16:22 2013 UTC

# Line 1 | Line 1
1   /*
2   *  ircd-hybrid: an advanced Internet Relay Chat Daemon(ircd).
3 < *  ircd_parser.y: Parses the ircd configuration file.
3 > *  conf_parser.y: Parses the ircd configuration file.
4   *
5   *  Copyright (C) 2005 by the past and present ircd coders, and others.
6   *
# Line 32 | Line 32
32   #include "stdinc.h"
33   #include "ircd.h"
34   #include "list.h"
35 < #include "s_conf.h"
35 > #include "conf.h"
36 > #include "conf_class.h"
37   #include "event.h"
38 < #include "s_log.h"
38 > #include "log.h"
39   #include "client.h"     /* for UMODE_ALL only */
40   #include "irc_string.h"
40 #include "sprintf_irc.h"
41   #include "memory.h"
42   #include "modules.h"
43   #include "s_serv.h"
# Line 52 | Line 52
52   #include <openssl/rsa.h>
53   #include <openssl/bio.h>
54   #include <openssl/pem.h>
55 + #include <openssl/dh.h>
56   #endif
57  
58 < static char *class_name = NULL;
58 < static struct ConfItem *yy_conf = NULL;
59 < static struct AccessItem *yy_aconf = NULL;
60 < static struct MatchItem *yy_match_item = NULL;
61 < static struct ClassItem *yy_class = NULL;
62 < static char *yy_class_name = NULL;
63 <
64 < static dlink_list col_conf_list  = { NULL, NULL, 0 };
65 < static dlink_list hub_conf_list  = { NULL, NULL, 0 };
66 < static dlink_list leaf_conf_list = { NULL, NULL, 0 };
67 < static unsigned int listener_flags = 0;
68 < static unsigned int regex_ban = 0;
69 < static char userbuf[IRCD_BUFSIZE];
70 < static char hostbuf[IRCD_BUFSIZE];
71 < static char reasonbuf[REASONLEN + 1];
72 < static char gecos_name[REALLEN * 4];
73 <
74 < static char *resv_reason = NULL;
75 < static char *listener_address = NULL;
76 < static int not_atom = 0;
77 <
78 < struct CollectItem
79 < {
80 <  dlink_node node;
81 <  char *name;
82 <  char *user;
83 <  char *host;
84 <  char *passwd;
85 <  int  port;
86 <  int  flags;
87 < #ifdef HAVE_LIBCRYPTO
88 <  char *rsa_public_key_file;
89 <  RSA *rsa_public_key;
90 < #endif
91 < };
58 > #include "rsa.h"
59  
60 < static void
61 < free_collect_item(struct CollectItem *item)
60 > int yylex(void);
61 >
62 > static struct
63   {
64 <  MyFree(item->name);
65 <  MyFree(item->user);
66 <  MyFree(item->host);
67 <  MyFree(item->passwd);
68 < #ifdef HAVE_LIBCRYPTO
69 <  MyFree(item->rsa_public_key_file);
70 < #endif
71 <  MyFree(item);
72 < }
64 >  struct {
65 >    dlink_list list;
66 >  } mask,
67 >    leaf,
68 >    hub;
69 >
70 >  struct {
71 >    char buf[IRCD_BUFSIZE];
72 >  } name,
73 >    user,
74 >    host,
75 >    addr,
76 >    bind,
77 >    file,
78 >    ciph,
79 >    rpass,
80 >    spass,
81 >    class;
82 >
83 >  struct {
84 >    unsigned int value;
85 >  } flags,
86 >    modes,
87 >    size,
88 >    type,
89 >    port,
90 >    aftype,
91 >    ping_freq,
92 >    max_perip,
93 >    con_freq,
94 >    min_idle,
95 >    max_idle,
96 >    max_total,
97 >    max_global,
98 >    max_local,
99 >    max_ident,
100 >    max_sendq,
101 >    max_recvq,
102 >    cidr_bitlen_ipv4,
103 >    cidr_bitlen_ipv6,
104 >    number_per_cidr;
105 > } block_state;
106  
107   static void
108 < unhook_hub_leaf_confs(void)
108 > reset_block_state(void)
109   {
110 <  dlink_node *ptr;
111 <  dlink_node *next_ptr;
112 <  struct CollectItem *yy_hconf;
113 <  struct CollectItem *yy_lconf;
110 >  dlink_node *ptr = NULL, *ptr_next = NULL;
111 >
112 >  DLINK_FOREACH_SAFE(ptr, ptr_next, block_state.mask.list.head)
113 >  {
114 >    MyFree(ptr->data);
115 >    dlinkDelete(ptr, &block_state.mask.list);
116 >    free_dlink_node(ptr);
117 >  }
118  
119 <  DLINK_FOREACH_SAFE(ptr, next_ptr, hub_conf_list.head)
119 >  DLINK_FOREACH_SAFE(ptr, ptr_next, block_state.leaf.list.head)
120    {
121 <    yy_hconf = ptr->data;
122 <    dlinkDelete(&yy_hconf->node, &hub_conf_list);
123 <    free_collect_item(yy_hconf);
121 >    MyFree(ptr->data);
122 >    dlinkDelete(ptr, &block_state.leaf.list);
123 >    free_dlink_node(ptr);
124    }
125  
126 <  DLINK_FOREACH_SAFE(ptr, next_ptr, leaf_conf_list.head)
126 >  DLINK_FOREACH_SAFE(ptr, ptr_next, block_state.hub.list.head)
127    {
128 <    yy_lconf = ptr->data;
129 <    dlinkDelete(&yy_lconf->node, &leaf_conf_list);
130 <    free_collect_item(yy_lconf);
128 >    MyFree(ptr->data);
129 >    dlinkDelete(ptr, &block_state.hub.list);
130 >    free_dlink_node(ptr);
131    }
132 +
133 +  memset(&block_state, 0, sizeof(block_state));
134   }
135  
136   %}
# Line 134 | Line 141 | unhook_hub_leaf_confs(void)
141   }
142  
143   %token  ACCEPT_PASSWORD
137 %token  ACTION
144   %token  ADMIN
145   %token  AFTYPE
140 %token  T_ALLOW
146   %token  ANTI_NICK_FLOOD
147   %token  ANTI_SPAM_EXIT_MESSAGE_TIME
148   %token  AUTOCONN
149 < %token  T_BLOCK
145 < %token  BURST_AWAY
146 < %token  BURST_TOPICWHO
147 < %token  BYTES KBYTES MBYTES GBYTES TBYTES
149 > %token  BYTES KBYTES MBYTES
150   %token  CALLER_ID_WAIT
151   %token  CAN_FLOOD
150 %token  CAN_IDLE
152   %token  CHANNEL
153   %token  CIDR_BITLEN_IPV4
154   %token  CIDR_BITLEN_IPV6
154 %token  CIPHER_PREFERENCE
155   %token  CLASS
156 %token  COMPRESSED
157 %token  COMPRESSION_LEVEL
156   %token  CONNECT
157   %token  CONNECTFREQ
160 %token  CRYPTLINK
161 %token  DEFAULT_CIPHER_PREFERENCE
158   %token  DEFAULT_FLOODCOUNT
159   %token  DEFAULT_SPLIT_SERVER_COUNT
160   %token  DEFAULT_SPLIT_USER_COUNT
# Line 167 | Line 163 | unhook_hub_leaf_confs(void)
163   %token  DIE
164   %token  DISABLE_AUTH
165   %token  DISABLE_FAKE_CHANNELS
170 %token  DISABLE_HIDDEN
171 %token  DISABLE_LOCAL_CHANNELS
166   %token  DISABLE_REMOTE_COMMANDS
167   %token  DOTS_IN_IDENT
174 %token  DURATION
168   %token  EGDPOOL_PATH
169   %token  EMAIL
177 %token  ENABLE
170   %token  ENCRYPTED
171   %token  EXCEED_LIMIT
172   %token  EXEMPT
173   %token  FAILED_OPER_NOTICE
174   %token  IRCD_FLAGS
175   %token  FLATTEN_LINKS
184 %token  FFAILED_OPERLOG
185 %token  FKILLLOG
186 %token  FKLINELOG
187 %token  FGLINELOG
188 %token  FIOERRLOG
189 %token  FOPERLOG
190 %token  FOPERSPYLOG
191 %token  FUSERLOG
176   %token  GECOS
177   %token  GENERAL
178   %token  GLINE
179 < %token  GLINES
179 > %token  GLINE_DURATION
180 > %token  GLINE_ENABLE
181   %token  GLINE_EXEMPT
182 < %token  GLINE_LOG
198 < %token  GLINE_TIME
182 > %token  GLINE_REQUEST_DURATION
183   %token  GLINE_MIN_CIDR
184   %token  GLINE_MIN_CIDR6
185   %token  GLOBAL_KILL
# Line 203 | Line 187 | unhook_hub_leaf_confs(void)
187   %token  NEED_IDENT
188   %token  HAVENT_READ_CONF
189   %token  HIDDEN
206 %token  HIDDEN_ADMIN
190   %token  HIDDEN_NAME
208 %token  HIDDEN_OPER
191   %token  HIDE_SERVER_IPS
192   %token  HIDE_SERVERS
193 + %token  HIDE_SERVICES
194   %token  HIDE_SPOOF_IPS
195   %token  HOST
196   %token  HUB
197   %token  HUB_MASK
215 %token  IDLETIME
198   %token  IGNORE_BOGUS_TS
199   %token  INVISIBLE_ON_CONNECT
200   %token  IP
# Line 220 | Line 202 | unhook_hub_leaf_confs(void)
202   %token  KILL_CHASE_TIME_LIMIT
203   %token  KLINE
204   %token  KLINE_EXEMPT
223 %token  KLINE_REASON
224 %token  KLINE_WITH_REASON
205   %token  KNOCK_DELAY
206   %token  KNOCK_DELAY_CHANNEL
207   %token  LEAF_MASK
208   %token  LINKS_DELAY
209   %token  LISTEN
210   %token  T_LOG
211 < %token  LOGGING
232 < %token  LOG_LEVEL
211 > %token  MASK
212   %token  MAX_ACCEPT
213   %token  MAX_BANS
214 + %token  MAX_CHANS_PER_OPER
215   %token  MAX_CHANS_PER_USER
216   %token  MAX_GLOBAL
217   %token  MAX_IDENT
218   %token  MAX_LOCAL
219   %token  MAX_NICK_CHANGES
220 + %token  MAX_NICK_LENGTH
221   %token  MAX_NICK_TIME
222   %token  MAX_NUMBER
223   %token  MAX_TARGETS
224 + %token  MAX_TOPIC_LENGTH
225   %token  MAX_WATCH
244 %token  MESSAGE_LOCALE
226   %token  MIN_NONWILDCARD
227   %token  MIN_NONWILDCARD_SIMPLE
228 + %token  MIN_IDLE
229 + %token  MAX_IDLE
230 + %token  RANDOM_IDLE
231 + %token  HIDE_IDLE_FROM_OPERS
232   %token  MODULE
233   %token  MODULES
234   %token  NAME
# Line 251 | Line 236 | unhook_hub_leaf_confs(void)
236   %token  NETWORK_DESC
237   %token  NETWORK_NAME
238   %token  NICK
254 %token  NICK_CHANGES
239   %token  NO_CREATE_ON_SPLIT
240   %token  NO_JOIN_ON_SPLIT
241   %token  NO_OPER_FLOOD
242   %token  NO_TILDE
259 %token  NOT
243   %token  NUMBER
261 %token  NUMBER_PER_IDENT
244   %token  NUMBER_PER_CIDR
245   %token  NUMBER_PER_IP
264 %token  NUMBER_PER_IP_GLOBAL
246   %token  OPERATOR
247   %token  OPERS_BYPASS_CALLERID
267 %token  OPER_LOG
248   %token  OPER_ONLY_UMODES
249   %token  OPER_PASS_RESV
250   %token  OPER_SPY_T
# Line 277 | Line 257 | unhook_hub_leaf_confs(void)
257   %token  PATH
258   %token  PING_COOKIE
259   %token  PING_TIME
280 %token  PING_WARNING
260   %token  PORT
261   %token  QSTRING
262   %token  QUIET_ON_BAN
# Line 286 | Line 265 | unhook_hub_leaf_confs(void)
265   %token  REDIRSERV
266   %token  REGEX_T
267   %token  REHASH
289 %token  TREJECT_HOLD_TIME
268   %token  REMOTE
269   %token  REMOTEBAN
292 %token  RESTRICT_CHANNELS
293 %token  RESTRICTED
270   %token  RSA_PRIVATE_KEY_FILE
271   %token  RSA_PUBLIC_KEY_FILE
272   %token  SSL_CERTIFICATE_FILE
273 < %token  T_SSL_CONNECTION_METHOD
273 > %token  SSL_DH_PARAM_FILE
274 > %token  T_SSL_CLIENT_METHOD
275 > %token  T_SSL_SERVER_METHOD
276   %token  T_SSLV3
277   %token  T_TLSV1
278   %token  RESV
279   %token  RESV_EXEMPT
280 < %token  SECONDS MINUTES HOURS DAYS WEEKS
280 > %token  SECONDS MINUTES HOURS DAYS WEEKS MONTHS YEARS
281   %token  SENDQ
282   %token  SEND_PASSWORD
283   %token  SERVERHIDE
284   %token  SERVERINFO
307 %token  SERVLINK_PATH
285   %token  IRCD_SID
286   %token  TKLINE_EXPIRE_NOTICES
287   %token  T_SHARED
288   %token  T_CLUSTER
289   %token  TYPE
290   %token  SHORT_MOTD
314 %token  SILENT
291   %token  SPOOF
292   %token  SPOOF_NOTICE
293   %token  STATS_E_DISABLED
# Line 321 | Line 297 | unhook_hub_leaf_confs(void)
297   %token  STATS_P_OPER_ONLY
298   %token  TBOOL
299   %token  TMASKED
324 %token  T_REJECT
300   %token  TS_MAX_DELTA
301   %token  TS_WARN_DELTA
302   %token  TWODOTS
# Line 331 | Line 306 | unhook_hub_leaf_confs(void)
306   %token  T_CALLERID
307   %token  T_CCONN
308   %token  T_CCONN_FULL
309 < %token  T_CLIENT_FLOOD
309 > %token  T_SSL_CIPHER_LIST
310   %token  T_DEAF
311   %token  T_DEBUG
312 < %token  T_DRONE
312 > %token  T_DLINE
313   %token  T_EXTERNAL
314   %token  T_FULL
315   %token  T_INVISIBLE
316   %token  T_IPV4
317   %token  T_IPV6
318   %token  T_LOCOPS
344 %token  T_LOGPATH
345 %token  T_L_CRIT
346 %token  T_L_DEBUG
347 %token  T_L_ERROR
348 %token  T_L_INFO
349 %token  T_L_NOTICE
350 %token  T_L_TRACE
351 %token  T_L_WARN
319   %token  T_MAX_CLIENTS
320   %token  T_NCHANGE
321 + %token  T_NONONREG
322   %token  T_OPERWALL
323 + %token  T_RECVQ
324   %token  T_REJ
325   %token  T_SERVER
326   %token  T_SERVNOTICE
327 + %token  T_SET
328   %token  T_SKILL
329   %token  T_SPY
330   %token  T_SSL
331   %token  T_UMODES
332   %token  T_UNAUTH
333 + %token  T_UNDLINE
334 + %token  T_UNLIMITED
335   %token  T_UNRESV
336   %token  T_UNXLINE
337 + %token  T_GLOBOPS
338   %token  T_WALLOP
339 + %token  T_WEBIRC
340 + %token  T_RESTART
341 + %token  T_SERVICE
342 + %token  T_SERVICES_NAME
343   %token  THROTTLE_TIME
367 %token  TOPICBURST
344   %token  TRUE_NO_OPER_FLOOD
369 %token  TKLINE
370 %token  TXLINE
371 %token  TRESV
345   %token  UNKLINE
346   %token  USER
347   %token  USE_EGD
375 %token  USE_EXCEPT
376 %token  USE_INVEX
377 %token  USE_KNOCK
348   %token  USE_LOGGING
379 %token  USE_WHOIS_ACTUALLY
349   %token  VHOST
350   %token  VHOST6
351   %token  XLINE
383 %token  WARN
352   %token  WARN_NO_NLINE
353 + %token  T_SIZE
354 + %token  T_FILE
355  
356   %type <string> QSTRING
357   %type <number> NUMBER
# Line 405 | Line 375 | conf_item:        admin_entry
375                  | serverinfo_entry
376                  | serverhide_entry
377                  | resv_entry
378 +                | service_entry
379                  | shared_entry
380                  | cluster_entry
381                  | connect_entry
# Line 412 | Line 383 | conf_item:        admin_entry
383                  | deny_entry
384                  | exempt_entry
385                  | general_entry
415                | gline_entry
386                  | gecos_entry
387                  | modules_entry
388                  | error ';'
# Line 445 | Line 415 | timespec:      NUMBER timespec_
415                  {
416                          $$ = $1 * 60 * 60 * 24 * 7 + $3;
417                  }
418 +                | NUMBER MONTHS timespec_
419 +                {
420 +                        $$ = $1 * 60 * 60 * 24 * 7 * 4 + $3;
421 +                }
422 +                | NUMBER YEARS timespec_
423 +                {
424 +                        $$ = $1 * 60 * 60 * 24 * 365 + $3;
425 +                }
426                  ;
427  
428   sizespec_:      { $$ = 0; } | sizespec;
# Line 483 | Line 461 | serverinfo_items:       serverinfo_items
461   serverinfo_item:        serverinfo_name | serverinfo_vhost |
462                          serverinfo_hub | serverinfo_description |
463                          serverinfo_network_name | serverinfo_network_desc |
464 <                        serverinfo_max_clients |
464 >                        serverinfo_max_clients | serverinfo_max_nick_length |
465 >                        serverinfo_max_topic_length | serverinfo_ssl_dh_param_file |
466                          serverinfo_rsa_private_key_file | serverinfo_vhost6 |
467                          serverinfo_sid | serverinfo_ssl_certificate_file |
468 <                        serverinfo_ssl_connection_method |
468 >                        serverinfo_ssl_client_method | serverinfo_ssl_server_method |
469 >                        serverinfo_ssl_cipher_list |
470                          error ';' ;
471  
472  
473 < serverinfo_ssl_connection_method: T_SSL_CONNECTION_METHOD
473 > serverinfo_ssl_client_method: T_SSL_CLIENT_METHOD '=' client_method_types ';' ;
474 > serverinfo_ssl_server_method: T_SSL_SERVER_METHOD '=' server_method_types ';' ;
475 >
476 > client_method_types: client_method_types ',' client_method_type_item | client_method_type_item;
477 > client_method_type_item: T_SSLV3
478   {
479   #ifdef HAVE_LIBCRYPTO
480 <  if (conf_parser_ctx.boot && conf_parser_ctx.pass == 2)
481 <    ServerInfo.tls_version = 0;
480 >  if (conf_parser_ctx.pass == 2 && ServerInfo.client_ctx)
481 >    SSL_CTX_clear_options(ServerInfo.client_ctx, SSL_OP_NO_SSLv3);
482   #endif
483 < } '=' method_types ';'
483 > } | T_TLSV1
484   {
485   #ifdef HAVE_LIBCRYPTO
486 <  if (conf_parser_ctx.boot && conf_parser_ctx.pass == 2)
487 <  {
504 <    if (!(ServerInfo.tls_version & CONF_SERVER_INFO_TLS_VERSION_SSLV3))
505 <      SSL_CTX_set_options(ServerInfo.server_ctx, SSL_OP_NO_SSLv3);
506 <    if (!(ServerInfo.tls_version & CONF_SERVER_INFO_TLS_VERSION_TLSV1))
507 <      SSL_CTX_set_options(ServerInfo.server_ctx, SSL_OP_NO_TLSv1);
508 <  }
486 >  if (conf_parser_ctx.pass == 2 && ServerInfo.client_ctx)
487 >    SSL_CTX_clear_options(ServerInfo.client_ctx, SSL_OP_NO_TLSv1);
488   #endif
489   };
490  
491 < method_types: method_types ',' method_type_item | method_type_item;
492 < method_type_item: T_SSLV3
491 > server_method_types: server_method_types ',' server_method_type_item | server_method_type_item;
492 > server_method_type_item: T_SSLV3
493   {
494   #ifdef HAVE_LIBCRYPTO
495 <  if (conf_parser_ctx.boot && conf_parser_ctx.pass == 2)
496 <    ServerInfo.tls_version |= CONF_SERVER_INFO_TLS_VERSION_SSLV3;
495 >  if (conf_parser_ctx.pass == 2 && ServerInfo.server_ctx)
496 >    SSL_CTX_clear_options(ServerInfo.server_ctx, SSL_OP_NO_SSLv3);
497   #endif
498   } | T_TLSV1
499   {
500   #ifdef HAVE_LIBCRYPTO
501 <  if (conf_parser_ctx.boot && conf_parser_ctx.pass == 2)
502 <    ServerInfo.tls_version |= CONF_SERVER_INFO_TLS_VERSION_TLSV1;
501 >  if (conf_parser_ctx.pass == 2 && ServerInfo.server_ctx)
502 >    SSL_CTX_clear_options(ServerInfo.server_ctx, SSL_OP_NO_TLSv1);
503   #endif
504   };
505  
# Line 531 | Line 510 | serverinfo_ssl_certificate_file: SSL_CER
510    {
511      if (!ServerInfo.rsa_private_key_file)
512      {
513 <      yyerror("No rsa_private_key_file specified, SSL disabled");
513 >      conf_error_report("No rsa_private_key_file specified, SSL disabled");
514        break;
515      }
516  
517      if (SSL_CTX_use_certificate_file(ServerInfo.server_ctx, yylval.string,
518 +                                     SSL_FILETYPE_PEM) <= 0 ||
519 +        SSL_CTX_use_certificate_file(ServerInfo.client_ctx, yylval.string,
520                                       SSL_FILETYPE_PEM) <= 0)
521      {
522 <      yyerror(ERR_lib_error_string(ERR_get_error()));
522 >      report_crypto_errors();
523 >      conf_error_report("Could not open/read certificate file");
524        break;
525      }
526  
527      if (SSL_CTX_use_PrivateKey_file(ServerInfo.server_ctx, ServerInfo.rsa_private_key_file,
528 +                                    SSL_FILETYPE_PEM) <= 0 ||
529 +        SSL_CTX_use_PrivateKey_file(ServerInfo.client_ctx, ServerInfo.rsa_private_key_file,
530                                      SSL_FILETYPE_PEM) <= 0)
531      {
532 <      yyerror(ERR_lib_error_string(ERR_get_error()));
532 >      report_crypto_errors();
533 >      conf_error_report("Could not read RSA private key");
534        break;
535      }
536  
537 <    if (!SSL_CTX_check_private_key(ServerInfo.server_ctx))
537 >    if (!SSL_CTX_check_private_key(ServerInfo.server_ctx) ||
538 >        !SSL_CTX_check_private_key(ServerInfo.client_ctx))
539      {
540 <      yyerror(ERR_lib_error_string(ERR_get_error()));
540 >      report_crypto_errors();
541 >      conf_error_report("Could not read RSA private key");
542        break;
543      }
544    }
# Line 577 | Line 564 | serverinfo_rsa_private_key_file: RSA_PRI
564        ServerInfo.rsa_private_key_file = NULL;
565      }
566  
567 <    DupString(ServerInfo.rsa_private_key_file, yylval.string);
567 >    ServerInfo.rsa_private_key_file = xstrdup(yylval.string);
568  
569      if ((file = BIO_new_file(yylval.string, "r")) == NULL)
570      {
571 <      yyerror("File open failed, ignoring");
571 >      conf_error_report("File open failed, ignoring");
572        break;
573      }
574  
575 <    ServerInfo.rsa_private_key = (RSA *)PEM_read_bio_RSAPrivateKey(file, NULL,
589 <      0, NULL);
575 >    ServerInfo.rsa_private_key = PEM_read_bio_RSAPrivateKey(file, NULL, 0, NULL);
576  
577      BIO_set_close(file, BIO_CLOSE);
578      BIO_free(file);
579  
580      if (ServerInfo.rsa_private_key == NULL)
581      {
582 <      yyerror("Couldn't extract key, ignoring");
582 >      conf_error_report("Couldn't extract key, ignoring");
583        break;
584      }
585  
# Line 602 | Line 588 | serverinfo_rsa_private_key_file: RSA_PRI
588        RSA_free(ServerInfo.rsa_private_key);
589        ServerInfo.rsa_private_key = NULL;
590  
591 <      yyerror("Invalid key, ignoring");
591 >      conf_error_report("Invalid key, ignoring");
592        break;
593      }
594  
# Line 612 | Line 598 | serverinfo_rsa_private_key_file: RSA_PRI
598        RSA_free(ServerInfo.rsa_private_key);
599        ServerInfo.rsa_private_key = NULL;
600  
601 <      yyerror("Not a 2048 bit key, ignoring");
601 >      conf_error_report("Not a 2048 bit key, ignoring");
602 >    }
603 >  }
604 > #endif
605 > };
606 >
607 > serverinfo_ssl_dh_param_file: SSL_DH_PARAM_FILE '=' QSTRING ';'
608 > {
609 > /* TBD - XXX: error reporting */
610 > #ifdef HAVE_LIBCRYPTO
611 >  if (conf_parser_ctx.pass == 2 && ServerInfo.server_ctx)
612 >  {
613 >    BIO *file = BIO_new_file(yylval.string, "r");
614 >
615 >    if (file)
616 >    {
617 >      DH *dh = PEM_read_bio_DHparams(file, NULL, NULL, NULL);
618 >
619 >      BIO_free(file);
620 >
621 >      if (dh)
622 >      {
623 >        if (DH_size(dh) < 128)
624 >          conf_error_report("Ignoring serverinfo::ssl_dh_param_file -- need at least a 1024 bit DH prime size");
625 >        else
626 >          SSL_CTX_set_tmp_dh(ServerInfo.server_ctx, dh);
627 >
628 >        DH_free(dh);
629 >      }
630      }
631    }
632   #endif
633   };
634  
635 + serverinfo_ssl_cipher_list: T_SSL_CIPHER_LIST '=' QSTRING ';'
636 + {
637 + #ifdef HAVE_LIBCRYPTO
638 +  if (conf_parser_ctx.pass == 2 && ServerInfo.server_ctx)
639 +    SSL_CTX_set_cipher_list(ServerInfo.server_ctx, yylval.string);
640 + #endif
641 + };
642 +
643   serverinfo_name: NAME '=' QSTRING ';'
644   {
645    /* this isn't rehashable */
646    if (conf_parser_ctx.pass == 2 && !ServerInfo.name)
647    {
648      if (valid_servname(yylval.string))
649 <      DupString(ServerInfo.name, yylval.string);
649 >      ServerInfo.name = xstrdup(yylval.string);
650      else
651      {
652 <      ilog(L_ERROR, "Ignoring serverinfo::name -- invalid name. Aborting.");
652 >      conf_error_report("Ignoring serverinfo::name -- invalid name. Aborting.");
653        exit(0);
654      }
655    }
# Line 639 | Line 661 | serverinfo_sid: IRCD_SID '=' QSTRING ';'
661    if (conf_parser_ctx.pass == 2 && !ServerInfo.sid)
662    {
663      if (valid_sid(yylval.string))
664 <      DupString(ServerInfo.sid, yylval.string);
664 >      ServerInfo.sid = xstrdup(yylval.string);
665      else
666      {
667 <      ilog(L_ERROR, "Ignoring serverinfo::sid -- invalid SID. Aborting.");
667 >      conf_error_report("Ignoring serverinfo::sid -- invalid SID. Aborting.");
668        exit(0);
669      }
670    }
# Line 653 | Line 675 | serverinfo_description: DESCRIPTION '='
675    if (conf_parser_ctx.pass == 2)
676    {
677      MyFree(ServerInfo.description);
678 <    DupString(ServerInfo.description,yylval.string);
678 >    ServerInfo.description = xstrdup(yylval.string);
679    }
680   };
681  
# Line 667 | Line 689 | serverinfo_network_name: NETWORK_NAME '=
689        p = '\0';
690  
691      MyFree(ServerInfo.network_name);
692 <    DupString(ServerInfo.network_name, yylval.string);
692 >    ServerInfo.network_name = xstrdup(yylval.string);
693    }
694   };
695  
# Line 676 | Line 698 | serverinfo_network_desc: NETWORK_DESC '=
698    if (conf_parser_ctx.pass == 2)
699    {
700      MyFree(ServerInfo.network_desc);
701 <    DupString(ServerInfo.network_desc, yylval.string);
701 >    ServerInfo.network_desc = xstrdup(yylval.string);
702    }
703   };
704  
# Line 693 | Line 715 | serverinfo_vhost: VHOST '=' QSTRING ';'
715      hints.ai_flags    = AI_PASSIVE | AI_NUMERICHOST;
716  
717      if (getaddrinfo(yylval.string, NULL, &hints, &res))
718 <      ilog(L_ERROR, "Invalid netmask for server vhost(%s)", yylval.string);
718 >      ilog(LOG_TYPE_IRCD, "Invalid netmask for server vhost(%s)", yylval.string);
719      else
720      {
721        assert(res != NULL);
# Line 722 | Line 744 | serverinfo_vhost6: VHOST6 '=' QSTRING ';
744      hints.ai_flags    = AI_PASSIVE | AI_NUMERICHOST;
745  
746      if (getaddrinfo(yylval.string, NULL, &hints, &res))
747 <      ilog(L_ERROR, "Invalid netmask for server vhost6(%s)", yylval.string);
747 >      ilog(LOG_TYPE_IRCD, "Invalid netmask for server vhost6(%s)", yylval.string);
748      else
749      {
750        assert(res != NULL);
# Line 740 | Line 762 | serverinfo_vhost6: VHOST6 '=' QSTRING ';
762  
763   serverinfo_max_clients: T_MAX_CLIENTS '=' NUMBER ';'
764   {
765 <  if (conf_parser_ctx.pass == 2)
765 >  if (conf_parser_ctx.pass != 2)
766 >    break;
767 >
768 >  if ($3 < MAXCLIENTS_MIN)
769    {
770 <    recalc_fdlimit(NULL);
770 >    char buf[IRCD_BUFSIZE];
771  
772 <    if ($3 < MAXCLIENTS_MIN)
773 <    {
774 <      char buf[IRCD_BUFSIZE];
775 <      ircsprintf(buf, "MAXCLIENTS too low, setting to %d", MAXCLIENTS_MIN);
776 <      yyerror(buf);
777 <    }
778 <    else if ($3 > MAXCLIENTS_MAX)
779 <    {
780 <      char buf[IRCD_BUFSIZE];
781 <      ircsprintf(buf, "MAXCLIENTS too high, setting to %d", MAXCLIENTS_MAX);
782 <      yyerror(buf);
783 <    }
784 <    else
785 <      ServerInfo.max_clients = $3;
772 >    snprintf(buf, sizeof(buf), "MAXCLIENTS too low, setting to %d", MAXCLIENTS_MIN);
773 >    conf_error_report(buf);
774 >    ServerInfo.max_clients = MAXCLIENTS_MIN;
775 >  }
776 >  else if ($3 > MAXCLIENTS_MAX)
777 >  {
778 >    char buf[IRCD_BUFSIZE];
779 >
780 >    snprintf(buf, sizeof(buf), "MAXCLIENTS too high, setting to %d", MAXCLIENTS_MAX);
781 >    conf_error_report(buf);
782 >    ServerInfo.max_clients = MAXCLIENTS_MAX;
783 >  }
784 >  else
785 >    ServerInfo.max_clients = $3;
786 > };
787 >
788 > serverinfo_max_nick_length: MAX_NICK_LENGTH '=' NUMBER ';'
789 > {
790 >  if (conf_parser_ctx.pass != 2)
791 >    break;
792 >
793 >  if ($3 < 9)
794 >  {
795 >    conf_error_report("max_nick_length too low, setting to 9");
796 >    ServerInfo.max_nick_length = 9;
797 >  }
798 >  else if ($3 > NICKLEN)
799 >  {
800 >    char buf[IRCD_BUFSIZE];
801 >
802 >    snprintf(buf, sizeof(buf), "max_nick_length too high, setting to %d", NICKLEN);
803 >    conf_error_report(buf);
804 >    ServerInfo.max_nick_length = NICKLEN;
805 >  }
806 >  else
807 >    ServerInfo.max_nick_length = $3;
808 > };
809 >
810 > serverinfo_max_topic_length: MAX_TOPIC_LENGTH '=' NUMBER ';'
811 > {
812 >  if (conf_parser_ctx.pass != 2)
813 >    break;
814 >
815 >  if ($3 < 80)
816 >  {
817 >    conf_error_report("max_topic_length too low, setting to 80");
818 >    ServerInfo.max_topic_length = 80;
819 >  }
820 >  else if ($3 > TOPICLEN)
821 >  {
822 >    char buf[IRCD_BUFSIZE];
823 >
824 >    snprintf(buf, sizeof(buf), "max_topic_length too high, setting to %d", TOPICLEN);
825 >    conf_error_report(buf);
826 >    ServerInfo.max_topic_length = TOPICLEN;
827    }
828 +  else
829 +    ServerInfo.max_topic_length = $3;
830   };
831  
832   serverinfo_hub: HUB '=' TBOOL ';'
# Line 781 | Line 849 | admin_name: NAME '=' QSTRING ';'
849    if (conf_parser_ctx.pass == 2)
850    {
851      MyFree(AdminInfo.name);
852 <    DupString(AdminInfo.name, yylval.string);
852 >    AdminInfo.name = xstrdup(yylval.string);
853    }
854   };
855  
# Line 790 | Line 858 | admin_email: EMAIL '=' QSTRING ';'
858    if (conf_parser_ctx.pass == 2)
859    {
860      MyFree(AdminInfo.email);
861 <    DupString(AdminInfo.email, yylval.string);
861 >    AdminInfo.email = xstrdup(yylval.string);
862    }
863   };
864  
# Line 799 | Line 867 | admin_description: DESCRIPTION '=' QSTRI
867    if (conf_parser_ctx.pass == 2)
868    {
869      MyFree(AdminInfo.description);
870 <    DupString(AdminInfo.description, yylval.string);
870 >    AdminInfo.description = xstrdup(yylval.string);
871    }
872   };
873  
874   /***************************************************************************
875   *  section logging
876   ***************************************************************************/
877 < /* XXX */
878 < logging_entry:          LOGGING  '{' logging_items '}' ';' ;
811 <
812 < logging_items:          logging_items logging_item |
813 <                        logging_item ;
877 > logging_entry:          T_LOG  '{' logging_items '}' ';' ;
878 > logging_items:          logging_items logging_item | logging_item ;
879  
880 < logging_item:           logging_path | logging_oper_log |
816 <                        logging_log_level |
817 <                        logging_use_logging | logging_fuserlog |
818 <                        logging_foperlog | logging_fglinelog |
819 <                        logging_fklinelog | logging_killlog |
820 <                        logging_foperspylog | logging_ioerrlog |
821 <                        logging_ffailed_operlog |
880 > logging_item:           logging_use_logging | logging_file_entry |
881                          error ';' ;
882  
883 < logging_path:           T_LOGPATH '=' QSTRING ';'
825 <                        {
826 <                        };
827 <
828 < logging_oper_log:       OPER_LOG '=' QSTRING ';'
829 <                        {
830 <                        };
831 <
832 < logging_fuserlog: FUSERLOG '=' QSTRING ';'
883 > logging_use_logging: USE_LOGGING '=' TBOOL ';'
884   {
885    if (conf_parser_ctx.pass == 2)
886 <    strlcpy(ConfigLoggingEntry.userlog, yylval.string,
836 <            sizeof(ConfigLoggingEntry.userlog));
886 >    ConfigLoggingEntry.use_logging = yylval.number;
887   };
888  
889 < logging_ffailed_operlog: FFAILED_OPERLOG '=' QSTRING ';'
889 > logging_file_entry:
890   {
891    if (conf_parser_ctx.pass == 2)
892 <    strlcpy(ConfigLoggingEntry.failed_operlog, yylval.string,
893 <            sizeof(ConfigLoggingEntry.failed_operlog));
844 < };
845 <
846 < logging_foperlog: FOPERLOG '=' QSTRING ';'
892 >    reset_block_state();
893 > } T_FILE  '{' logging_file_items '}' ';'
894   {
895 <  if (conf_parser_ctx.pass == 2)
896 <    strlcpy(ConfigLoggingEntry.operlog, yylval.string,
850 <            sizeof(ConfigLoggingEntry.operlog));
851 < };
895 >  if (conf_parser_ctx.pass != 2)
896 >    break;
897  
898 < logging_foperspylog: FOPERSPYLOG '=' QSTRING ';'
899 < {
900 <  if (conf_parser_ctx.pass == 2)
856 <    strlcpy(ConfigLoggingEntry.operspylog, yylval.string,
857 <            sizeof(ConfigLoggingEntry.operspylog));
898 >  if (block_state.type.value && block_state.file.buf[0])
899 >    log_set_file(block_state.type.value, block_state.size.value,
900 >                 block_state.file.buf);
901   };
902  
903 < logging_fglinelog: FGLINELOG '=' QSTRING ';'
904 < {
862 <  if (conf_parser_ctx.pass == 2)
863 <    strlcpy(ConfigLoggingEntry.glinelog, yylval.string,
864 <            sizeof(ConfigLoggingEntry.glinelog));
865 < };
903 > logging_file_items: logging_file_items logging_file_item |
904 >                    logging_file_item ;
905  
906 < logging_fklinelog: FKLINELOG '=' QSTRING ';'
906 > logging_file_item:  logging_file_name | logging_file_type |
907 >                    logging_file_size | error ';' ;
908 >
909 > logging_file_name: NAME '=' QSTRING ';'
910   {
911 <  if (conf_parser_ctx.pass == 2)
912 <    strlcpy(ConfigLoggingEntry.klinelog, yylval.string,
871 <            sizeof(ConfigLoggingEntry.klinelog));
872 < };
911 >  if (conf_parser_ctx.pass != 2)
912 >    break;
913  
914 < logging_ioerrlog: FIOERRLOG '=' QSTRING ';'
914 >  strlcpy(block_state.file.buf, yylval.string, sizeof(block_state.file.buf));
915 > }
916 >
917 > logging_file_size: T_SIZE '=' sizespec ';'
918   {
919 <  if (conf_parser_ctx.pass == 2)
920 <    strlcpy(ConfigLoggingEntry.ioerrlog, yylval.string,
921 <            sizeof(ConfigLoggingEntry.ioerrlog));
919 >  block_state.size.value = $3;
920 > } | T_SIZE '=' T_UNLIMITED ';'
921 > {
922 >  block_state.size.value = 0;
923   };
924  
925 < logging_killlog: FKILLLOG '=' QSTRING ';'
925 > logging_file_type: TYPE
926   {
927    if (conf_parser_ctx.pass == 2)
928 <    strlcpy(ConfigLoggingEntry.killlog, yylval.string,
929 <            sizeof(ConfigLoggingEntry.killlog));
886 < };
928 >    block_state.type.value = 0;
929 > } '='  logging_file_type_items ';' ;
930  
931 < logging_log_level: LOG_LEVEL '=' T_L_CRIT ';'
932 < {
890 <  if (conf_parser_ctx.pass == 2)
891 <    set_log_level(L_CRIT);
892 < } | LOG_LEVEL '=' T_L_ERROR ';'
931 > logging_file_type_items: logging_file_type_items ',' logging_file_type_item | logging_file_type_item;
932 > logging_file_type_item:  USER
933   {
934    if (conf_parser_ctx.pass == 2)
935 <    set_log_level(L_ERROR);
936 < } | LOG_LEVEL '=' T_L_WARN ';'
935 >    block_state.type.value = LOG_TYPE_USER;
936 > } | OPERATOR
937   {
938    if (conf_parser_ctx.pass == 2)
939 <    set_log_level(L_WARN);
940 < } | LOG_LEVEL '=' T_L_NOTICE ';'
939 >    block_state.type.value = LOG_TYPE_OPER;
940 > } | GLINE
941   {
942    if (conf_parser_ctx.pass == 2)
943 <    set_log_level(L_NOTICE);
944 < } | LOG_LEVEL '=' T_L_TRACE ';'
943 >    block_state.type.value = LOG_TYPE_GLINE;
944 > } | T_DLINE
945   {
946    if (conf_parser_ctx.pass == 2)
947 <    set_log_level(L_TRACE);
948 < } | LOG_LEVEL '=' T_L_INFO ';'
947 >    block_state.type.value = LOG_TYPE_DLINE;
948 > } | KLINE
949   {
950    if (conf_parser_ctx.pass == 2)
951 <    set_log_level(L_INFO);
952 < } | LOG_LEVEL '=' T_L_DEBUG ';'
951 >    block_state.type.value = LOG_TYPE_KLINE;
952 > } | KILL
953   {
954    if (conf_parser_ctx.pass == 2)
955 <    set_log_level(L_DEBUG);
956 < };
917 <
918 < logging_use_logging: USE_LOGGING '=' TBOOL ';'
955 >    block_state.type.value = LOG_TYPE_KILL;
956 > } | T_DEBUG
957   {
958    if (conf_parser_ctx.pass == 2)
959 <    ConfigLoggingEntry.use_logging = yylval.number;
959 >    block_state.type.value = LOG_TYPE_DEBUG;
960   };
961  
962 +
963   /***************************************************************************
964   * section oper
965   ***************************************************************************/
966   oper_entry: OPERATOR
967   {
968 <  if (conf_parser_ctx.pass == 2)
969 <  {
970 <    yy_conf = make_conf_item(OPER_TYPE);
971 <    yy_aconf = map_to_conf(yy_conf);
972 <    SetConfEncrypted(yy_aconf); /* Yes, the default is encrypted */
973 <  }
935 <  else
936 <  {
937 <    MyFree(class_name);
938 <    class_name = NULL;
939 <  }
940 < } oper_name_b '{' oper_items '}' ';'
968 >  if (conf_parser_ctx.pass != 2)
969 >    break;
970 >
971 >  reset_block_state();
972 >  block_state.flags.value |= CONF_FLAGS_ENCRYPTED;
973 > } '{' oper_items '}' ';'
974   {
975 <  if (conf_parser_ctx.pass == 2)
943 <  {
944 <    struct CollectItem *yy_tmp;
945 <    dlink_node *ptr;
946 <    dlink_node *next_ptr;
975 >  dlink_node *ptr = NULL;
976  
977 <    conf_add_class_to_conf(yy_conf, class_name);
977 >  if (conf_parser_ctx.pass != 2)
978 >    break;
979  
980 <    /* Now, make sure there is a copy of the "base" given oper
981 <     * block in each of the collected copies
982 <     */
980 >  if (!block_state.name.buf[0])
981 >    break;
982 > #ifdef HAVE_LIBCRYPTO
983 >  if (!(block_state.file.buf[0] ||
984 >        block_state.rpass.buf[0]))
985 >    break;
986 > #else
987 >  if (!block_state.rpass.buf[0])
988 >    break;
989 > #endif
990  
991 <    DLINK_FOREACH_SAFE(ptr, next_ptr, col_conf_list.head)
992 <    {
993 <      struct AccessItem *new_aconf;
994 <      struct ConfItem *new_conf;
958 <      yy_tmp = ptr->data;
991 >  DLINK_FOREACH(ptr, block_state.mask.list.head)
992 >  {
993 >    struct MaskItem *conf = NULL;
994 >    struct split_nuh_item nuh;
995  
996 <      new_conf = make_conf_item(OPER_TYPE);
997 <      new_aconf = (struct AccessItem *)map_to_conf(new_conf);
996 >    nuh.nuhmask  = ptr->data;
997 >    nuh.nickptr  = NULL;
998 >    nuh.userptr  = block_state.user.buf;
999 >    nuh.hostptr  = block_state.host.buf;
1000 >    nuh.nicksize = 0;
1001 >    nuh.usersize = sizeof(block_state.user.buf);
1002 >    nuh.hostsize = sizeof(block_state.host.buf);
1003 >    split_nuh(&nuh);
1004  
1005 <      new_aconf->flags = yy_aconf->flags;
1005 >    conf        = conf_make(CONF_OPER);
1006 >    conf->name  = xstrdup(block_state.name.buf);
1007 >    conf->user  = xstrdup(block_state.user.buf);
1008 >    conf->host  = xstrdup(block_state.host.buf);
1009 >
1010 >    if (block_state.rpass.buf[0])
1011 >      conf->passwd = xstrdup(block_state.rpass.buf);
1012 >
1013 >    conf->flags = block_state.flags.value;
1014 >    conf->modes = block_state.modes.value;
1015 >    conf->port  = block_state.port.value;
1016 >    conf->htype = parse_netmask(conf->host, &conf->addr, &conf->bits);
1017  
1018 <      if (yy_conf->name != NULL)
966 <        DupString(new_conf->name, yy_conf->name);
967 <      if (yy_tmp->user != NULL)
968 <        DupString(new_aconf->user, yy_tmp->user);
969 <      else
970 <        DupString(new_aconf->user, "*");
971 <      if (yy_tmp->host != NULL)
972 <        DupString(new_aconf->host, yy_tmp->host);
973 <      else
974 <        DupString(new_aconf->host, "*");
975 <      conf_add_class_to_conf(new_conf, class_name);
976 <      if (yy_aconf->passwd != NULL)
977 <        DupString(new_aconf->passwd, yy_aconf->passwd);
1018 >    conf_add_class_to_conf(conf, block_state.class.buf);
1019  
979      new_aconf->port = yy_aconf->port;
1020   #ifdef HAVE_LIBCRYPTO
1021 <      if (yy_aconf->rsa_public_key_file != NULL)
1022 <      {
1023 <        BIO *file;
1024 <
985 <        DupString(new_aconf->rsa_public_key_file,
986 <                  yy_aconf->rsa_public_key_file);
987 <
988 <        file = BIO_new_file(yy_aconf->rsa_public_key_file, "r");
989 <        new_aconf->rsa_public_key = (RSA *)PEM_read_bio_RSA_PUBKEY(file,
990 <                                                           NULL, 0, NULL);
991 <        BIO_set_close(file, BIO_CLOSE);
992 <        BIO_free(file);
993 <      }
994 < #endif
1021 >    if (block_state.file.buf[0])
1022 >    {
1023 >      BIO *file = NULL;
1024 >      RSA *pkey = NULL;
1025  
1026 < #ifdef HAVE_LIBCRYPTO
997 <      if (yy_tmp->name && (yy_tmp->passwd || yy_aconf->rsa_public_key)
998 <          && yy_tmp->host)
999 < #else
1000 <      if (yy_tmp->name && yy_tmp->passwd && yy_tmp->host)
1001 < #endif
1026 >      if ((file = BIO_new_file(block_state.file.buf, "r")) == NULL)
1027        {
1028 <        conf_add_class_to_conf(new_conf, class_name);
1029 <        if (yy_tmp->name != NULL)
1005 <          DupString(new_conf->name, yy_tmp->name);
1028 >        conf_error_report("Ignoring rsa_public_key_file -- file doesn't exist");
1029 >        break;
1030        }
1031  
1032 <      dlinkDelete(&yy_tmp->node, &col_conf_list);
1033 <      free_collect_item(yy_tmp);
1010 <    }
1011 <
1012 <    yy_conf = NULL;
1013 <    yy_aconf = NULL;
1032 >      if ((pkey = PEM_read_bio_RSA_PUBKEY(file, NULL, 0, NULL)) == NULL)
1033 >        conf_error_report("Ignoring rsa_public_key_file -- Key invalid; check key syntax.");
1034  
1035 <
1036 <    MyFree(class_name);
1037 <    class_name = NULL;
1035 >      conf->rsa_public_key = pkey;
1036 >      BIO_set_close(file, BIO_CLOSE);
1037 >      BIO_free(file);
1038 >    }
1039 > #endif /* HAVE_LIBCRYPTO */
1040    }
1041 < };
1041 > };
1042  
1021 oper_name_b: | oper_name_t;
1043   oper_items:     oper_items oper_item | oper_item;
1044   oper_item:      oper_name | oper_user | oper_password |
1045                  oper_umodes | oper_class | oper_encrypted |
# Line 1027 | Line 1048 | oper_item:      oper_name | oper_user |
1048   oper_name: NAME '=' QSTRING ';'
1049   {
1050    if (conf_parser_ctx.pass == 2)
1051 <  {
1031 <    if (strlen(yylval.string) > OPERNICKLEN)
1032 <      yylval.string[OPERNICKLEN] = '\0';
1033 <
1034 <    MyFree(yy_conf->name);
1035 <    DupString(yy_conf->name, yylval.string);
1036 <  }
1037 < };
1038 <
1039 < oper_name_t: QSTRING
1040 < {
1041 <  if (conf_parser_ctx.pass == 2)
1042 <  {
1043 <    if (strlen(yylval.string) > OPERNICKLEN)
1044 <      yylval.string[OPERNICKLEN] = '\0';
1045 <
1046 <    MyFree(yy_conf->name);
1047 <    DupString(yy_conf->name, yylval.string);
1048 <  }
1051 >    strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
1052   };
1053  
1054   oper_user: USER '=' QSTRING ';'
1055   {
1056    if (conf_parser_ctx.pass == 2)
1057 <  {
1055 <    struct split_nuh_item nuh;
1056 <
1057 <    nuh.nuhmask  = yylval.string;
1058 <    nuh.nickptr  = NULL;
1059 <    nuh.userptr  = userbuf;
1060 <    nuh.hostptr  = hostbuf;
1061 <
1062 <    nuh.nicksize = 0;
1063 <    nuh.usersize = sizeof(userbuf);
1064 <    nuh.hostsize = sizeof(hostbuf);
1065 <
1066 <    split_nuh(&nuh);
1067 <
1068 <    if (yy_aconf->user == NULL)
1069 <    {
1070 <      DupString(yy_aconf->user, userbuf);
1071 <      DupString(yy_aconf->host, hostbuf);
1072 <    }
1073 <    else
1074 <    {
1075 <      struct CollectItem *yy_tmp = MyMalloc(sizeof(struct CollectItem));
1076 <
1077 <      DupString(yy_tmp->user, userbuf);
1078 <      DupString(yy_tmp->host, hostbuf);
1079 <
1080 <      dlinkAdd(yy_tmp, &yy_tmp->node, &col_conf_list);
1081 <    }
1082 <  }
1057 >    dlinkAdd(xstrdup(yylval.string), make_dlink_node(), &block_state.mask.list);
1058   };
1059  
1060   oper_password: PASSWORD '=' QSTRING ';'
1061   {
1062    if (conf_parser_ctx.pass == 2)
1063 <  {
1089 <    if (yy_aconf->passwd != NULL)
1090 <      memset(yy_aconf->passwd, 0, strlen(yy_aconf->passwd));
1091 <
1092 <    MyFree(yy_aconf->passwd);
1093 <    DupString(yy_aconf->passwd, yylval.string);
1094 <  }
1063 >    strlcpy(block_state.rpass.buf, yylval.string, sizeof(block_state.rpass.buf));
1064   };
1065  
1066   oper_encrypted: ENCRYPTED '=' TBOOL ';'
# Line 1099 | Line 1068 | oper_encrypted: ENCRYPTED '=' TBOOL ';'
1068    if (conf_parser_ctx.pass == 2)
1069    {
1070      if (yylval.number)
1071 <      SetConfEncrypted(yy_aconf);
1071 >      block_state.flags.value |= CONF_FLAGS_ENCRYPTED;
1072      else
1073 <      ClearConfEncrypted(yy_aconf);
1073 >      block_state.flags.value &= ~CONF_FLAGS_ENCRYPTED;
1074    }
1075   };
1076  
1077   oper_rsa_public_key_file: RSA_PUBLIC_KEY_FILE '=' QSTRING ';'
1078   {
1110 #ifdef HAVE_LIBCRYPTO
1079    if (conf_parser_ctx.pass == 2)
1080 <  {
1113 <    BIO *file;
1114 <
1115 <    if (yy_aconf->rsa_public_key != NULL)
1116 <    {
1117 <      RSA_free(yy_aconf->rsa_public_key);
1118 <      yy_aconf->rsa_public_key = NULL;
1119 <    }
1120 <
1121 <    if (yy_aconf->rsa_public_key_file != NULL)
1122 <    {
1123 <      MyFree(yy_aconf->rsa_public_key_file);
1124 <      yy_aconf->rsa_public_key_file = NULL;
1125 <    }
1126 <
1127 <    DupString(yy_aconf->rsa_public_key_file, yylval.string);
1128 <    file = BIO_new_file(yylval.string, "r");
1129 <
1130 <    if (file == NULL)
1131 <    {
1132 <      yyerror("Ignoring rsa_public_key_file -- file doesn't exist");
1133 <      break;
1134 <    }
1135 <
1136 <    yy_aconf->rsa_public_key = (RSA *)PEM_read_bio_RSA_PUBKEY(file, NULL, 0, NULL);
1137 <
1138 <    if (yy_aconf->rsa_public_key == NULL)
1139 <    {
1140 <      yyerror("Ignoring rsa_public_key_file -- Key invalid; check key syntax.");
1141 <      break;
1142 <    }
1143 <
1144 <    BIO_set_close(file, BIO_CLOSE);
1145 <    BIO_free(file);
1146 <  }
1147 < #endif /* HAVE_LIBCRYPTO */
1080 >    strlcpy(block_state.file.buf, yylval.string, sizeof(block_state.file.buf));
1081   };
1082  
1083   oper_class: CLASS '=' QSTRING ';'
1084   {
1085    if (conf_parser_ctx.pass == 2)
1086 <  {
1154 <    MyFree(class_name);
1155 <    DupString(class_name, yylval.string);
1156 <  }
1086 >    strlcpy(block_state.class.buf, yylval.string, sizeof(block_state.class.buf));
1087   };
1088  
1089   oper_umodes: T_UMODES
1090   {
1091    if (conf_parser_ctx.pass == 2)
1092 <    yy_aconf->modes = 0;
1092 >    block_state.modes.value = 0;
1093   } '='  oper_umodes_items ';' ;
1094  
1095   oper_umodes_items: oper_umodes_items ',' oper_umodes_item | oper_umodes_item;
1096   oper_umodes_item:  T_BOTS
1097   {
1098    if (conf_parser_ctx.pass == 2)
1099 <    yy_aconf->modes |= UMODE_BOTS;
1099 >    block_state.modes.value |= UMODE_BOTS;
1100   } | T_CCONN
1101   {
1102    if (conf_parser_ctx.pass == 2)
1103 <    yy_aconf->modes |= UMODE_CCONN;
1103 >    block_state.modes.value |= UMODE_CCONN;
1104   } | T_CCONN_FULL
1105   {
1106    if (conf_parser_ctx.pass == 2)
1107 <    yy_aconf->modes |= UMODE_CCONN_FULL;
1107 >    block_state.modes.value |= UMODE_CCONN_FULL;
1108   } | T_DEAF
1109   {
1110    if (conf_parser_ctx.pass == 2)
1111 <    yy_aconf->modes |= UMODE_DEAF;
1111 >    block_state.modes.value |= UMODE_DEAF;
1112   } | T_DEBUG
1113   {
1114    if (conf_parser_ctx.pass == 2)
1115 <    yy_aconf->modes |= UMODE_DEBUG;
1115 >    block_state.modes.value |= UMODE_DEBUG;
1116   } | T_FULL
1117   {
1118    if (conf_parser_ctx.pass == 2)
1119 <    yy_aconf->modes |= UMODE_FULL;
1119 >    block_state.modes.value |= UMODE_FULL;
1120 > } | HIDDEN
1121 > {
1122 >  if (conf_parser_ctx.pass == 2)
1123 >    block_state.modes.value |= UMODE_HIDDEN;
1124   } | T_SKILL
1125   {
1126    if (conf_parser_ctx.pass == 2)
1127 <    yy_aconf->modes |= UMODE_SKILL;
1127 >    block_state.modes.value |= UMODE_SKILL;
1128   } | T_NCHANGE
1129   {
1130    if (conf_parser_ctx.pass == 2)
1131 <    yy_aconf->modes |= UMODE_NCHANGE;
1131 >    block_state.modes.value |= UMODE_NCHANGE;
1132   } | T_REJ
1133   {
1134    if (conf_parser_ctx.pass == 2)
1135 <    yy_aconf->modes |= UMODE_REJ;
1135 >    block_state.modes.value |= UMODE_REJ;
1136   } | T_UNAUTH
1137   {
1138    if (conf_parser_ctx.pass == 2)
1139 <    yy_aconf->modes |= UMODE_UNAUTH;
1139 >    block_state.modes.value |= UMODE_UNAUTH;
1140   } | T_SPY
1141   {
1142    if (conf_parser_ctx.pass == 2)
1143 <    yy_aconf->modes |= UMODE_SPY;
1143 >    block_state.modes.value |= UMODE_SPY;
1144   } | T_EXTERNAL
1145   {
1146    if (conf_parser_ctx.pass == 2)
1147 <    yy_aconf->modes |= UMODE_EXTERNAL;
1147 >    block_state.modes.value |= UMODE_EXTERNAL;
1148   } | T_OPERWALL
1149   {
1150    if (conf_parser_ctx.pass == 2)
1151 <    yy_aconf->modes |= UMODE_OPERWALL;
1151 >    block_state.modes.value |= UMODE_OPERWALL;
1152   } | T_SERVNOTICE
1153   {
1154    if (conf_parser_ctx.pass == 2)
1155 <    yy_aconf->modes |= UMODE_SERVNOTICE;
1155 >    block_state.modes.value |= UMODE_SERVNOTICE;
1156   } | T_INVISIBLE
1157   {
1158    if (conf_parser_ctx.pass == 2)
1159 <    yy_aconf->modes |= UMODE_INVISIBLE;
1159 >    block_state.modes.value |= UMODE_INVISIBLE;
1160   } | T_WALLOP
1161   {
1162    if (conf_parser_ctx.pass == 2)
1163 <    yy_aconf->modes |= UMODE_WALLOP;
1163 >    block_state.modes.value |= UMODE_WALLOP;
1164   } | T_SOFTCALLERID
1165   {
1166    if (conf_parser_ctx.pass == 2)
1167 <    yy_aconf->modes |= UMODE_SOFTCALLERID;
1167 >    block_state.modes.value |= UMODE_SOFTCALLERID;
1168   } | T_CALLERID
1169   {
1170    if (conf_parser_ctx.pass == 2)
1171 <    yy_aconf->modes |= UMODE_CALLERID;
1171 >    block_state.modes.value |= UMODE_CALLERID;
1172   } | T_LOCOPS
1173   {
1174    if (conf_parser_ctx.pass == 2)
1175 <    yy_aconf->modes |= UMODE_LOCOPS;
1175 >    block_state.modes.value |= UMODE_LOCOPS;
1176 > } | T_NONONREG
1177 > {
1178 >  if (conf_parser_ctx.pass == 2)
1179 >    block_state.modes.value |= UMODE_REGONLY;
1180   };
1181  
1182   oper_flags: IRCD_FLAGS
1183   {
1184 +  if (conf_parser_ctx.pass == 2)
1185 +    block_state.port.value = 0;
1186   } '='  oper_flags_items ';';
1187  
1188   oper_flags_items: oper_flags_items ',' oper_flags_item | oper_flags_item;
1189 < oper_flags_item: NOT { not_atom = 1; } oper_flags_item_atom
1250 <                | { not_atom = 0; } oper_flags_item_atom;
1251 <
1252 < oper_flags_item_atom: GLOBAL_KILL
1189 > oper_flags_item: GLOBAL_KILL
1190   {
1191    if (conf_parser_ctx.pass == 2)
1192 <  {
1256 <    if (not_atom)yy_aconf->port &= ~OPER_FLAG_GLOBAL_KILL;
1257 <    else yy_aconf->port |= OPER_FLAG_GLOBAL_KILL;
1258 <  }
1192 >    block_state.port.value |= OPER_FLAG_GLOBAL_KILL;
1193   } | REMOTE
1194   {
1195    if (conf_parser_ctx.pass == 2)
1196 <  {
1263 <    if (not_atom) yy_aconf->port &= ~OPER_FLAG_REMOTE;
1264 <    else yy_aconf->port |= OPER_FLAG_REMOTE;
1265 <  }
1196 >    block_state.port.value |= OPER_FLAG_REMOTE;
1197   } | KLINE
1198   {
1199    if (conf_parser_ctx.pass == 2)
1200 <  {
1270 <    if (not_atom) yy_aconf->port &= ~OPER_FLAG_K;
1271 <    else yy_aconf->port |= OPER_FLAG_K;
1272 <  }
1200 >    block_state.port.value |= OPER_FLAG_K;
1201   } | UNKLINE
1202   {
1203    if (conf_parser_ctx.pass == 2)
1204 <  {
1205 <    if (not_atom) yy_aconf->port &= ~OPER_FLAG_UNKLINE;
1206 <    else yy_aconf->port |= OPER_FLAG_UNKLINE;
1207 <  }
1204 >    block_state.port.value |= OPER_FLAG_UNKLINE;
1205 > } | T_DLINE
1206 > {
1207 >  if (conf_parser_ctx.pass == 2)
1208 >    block_state.port.value |= OPER_FLAG_DLINE;
1209 > } | T_UNDLINE
1210 > {
1211 >  if (conf_parser_ctx.pass == 2)
1212 >    block_state.port.value |= OPER_FLAG_UNDLINE;
1213   } | XLINE
1214   {
1215    if (conf_parser_ctx.pass == 2)
1216 <  {
1284 <    if (not_atom) yy_aconf->port &= ~OPER_FLAG_X;
1285 <    else yy_aconf->port |= OPER_FLAG_X;
1286 <  }
1216 >    block_state.port.value |= OPER_FLAG_X;
1217   } | GLINE
1218   {
1219    if (conf_parser_ctx.pass == 2)
1220 <  {
1291 <    if (not_atom) yy_aconf->port &= ~OPER_FLAG_GLINE;
1292 <    else yy_aconf->port |= OPER_FLAG_GLINE;
1293 <  }
1220 >    block_state.port.value |= OPER_FLAG_GLINE;
1221   } | DIE
1222   {
1223    if (conf_parser_ctx.pass == 2)
1224 <  {
1225 <    if (not_atom) yy_aconf->port &= ~OPER_FLAG_DIE;
1299 <    else yy_aconf->port |= OPER_FLAG_DIE;
1300 <  }
1301 < } | REHASH
1224 >    block_state.port.value |= OPER_FLAG_DIE;
1225 > } | T_RESTART
1226   {
1227    if (conf_parser_ctx.pass == 2)
1228 <  {
1229 <    if (not_atom) yy_aconf->port &= ~OPER_FLAG_REHASH;
1306 <    else yy_aconf->port |= OPER_FLAG_REHASH;
1307 <  }
1308 < } | ADMIN
1228 >    block_state.port.value |= OPER_FLAG_RESTART;
1229 > } | REHASH
1230   {
1231    if (conf_parser_ctx.pass == 2)
1232 <  {
1233 <    if (not_atom) yy_aconf->port &= ~OPER_FLAG_ADMIN;
1313 <    else yy_aconf->port |= OPER_FLAG_ADMIN;
1314 <  }
1315 < } | HIDDEN_ADMIN
1232 >    block_state.port.value |= OPER_FLAG_REHASH;
1233 > } | ADMIN
1234   {
1235    if (conf_parser_ctx.pass == 2)
1236 <  {
1237 <    if (not_atom) yy_aconf->port &= ~OPER_FLAG_HIDDEN_ADMIN;
1320 <    else yy_aconf->port |= OPER_FLAG_HIDDEN_ADMIN;
1321 <  }
1322 < } | NICK_CHANGES
1236 >    block_state.port.value |= OPER_FLAG_ADMIN;
1237 > } | T_OPERWALL
1238   {
1239    if (conf_parser_ctx.pass == 2)
1240 <  {
1241 <    if (not_atom) yy_aconf->port &= ~OPER_FLAG_N;
1327 <    else yy_aconf->port |= OPER_FLAG_N;
1328 <  }
1329 < } | T_OPERWALL
1240 >    block_state.port.value |= OPER_FLAG_OPERWALL;
1241 > } | T_GLOBOPS
1242   {
1243    if (conf_parser_ctx.pass == 2)
1244 <  {
1333 <    if (not_atom) yy_aconf->port &= ~OPER_FLAG_OPERWALL;
1334 <    else yy_aconf->port |= OPER_FLAG_OPERWALL;
1335 <  }
1244 >    block_state.port.value |= OPER_FLAG_GLOBOPS;
1245   } | OPER_SPY_T
1246   {
1247    if (conf_parser_ctx.pass == 2)
1248 <  {
1249 <    if (not_atom) yy_aconf->port &= ~OPER_FLAG_OPER_SPY;
1341 <    else yy_aconf->port |= OPER_FLAG_OPER_SPY;
1342 <  }
1343 < } | HIDDEN_OPER
1248 >    block_state.port.value |= OPER_FLAG_OPER_SPY;
1249 > } | REMOTEBAN
1250   {
1251    if (conf_parser_ctx.pass == 2)
1252 <  {
1253 <    if (not_atom) yy_aconf->port &= ~OPER_FLAG_HIDDEN_OPER;
1348 <    else yy_aconf->port |= OPER_FLAG_HIDDEN_OPER;
1349 <  }
1350 < } | REMOTEBAN
1252 >    block_state.port.value |= OPER_FLAG_REMOTEBAN;
1253 > } | T_SET
1254   {
1255    if (conf_parser_ctx.pass == 2)
1256 <  {
1257 <    if (not_atom) yy_aconf->port &= ~OPER_FLAG_REMOTEBAN;
1355 <    else yy_aconf->port |= OPER_FLAG_REMOTEBAN;
1356 <  }
1357 < } | ENCRYPTED
1256 >    block_state.port.value |= OPER_FLAG_SET;
1257 > } | MODULE
1258   {
1259    if (conf_parser_ctx.pass == 2)
1260 <  {
1361 <    if (not_atom) ClearConfEncrypted(yy_aconf);
1362 <    else SetConfEncrypted(yy_aconf);
1363 <  }
1260 >    block_state.port.value |= OPER_FLAG_MODULE;
1261   };
1262  
1263  
# Line 1369 | Line 1266 | oper_flags_item_atom: GLOBAL_KILL
1266   ***************************************************************************/
1267   class_entry: CLASS
1268   {
1269 <  if (conf_parser_ctx.pass == 1)
1270 <  {
1374 <    yy_conf = make_conf_item(CLASS_TYPE);
1375 <    yy_class = map_to_conf(yy_conf);
1376 <  }
1377 < } class_name_b '{' class_items '}' ';'
1378 < {
1379 <  if (conf_parser_ctx.pass == 1)
1380 <  {
1381 <    struct ConfItem *cconf = NULL;
1382 <    struct ClassItem *class = NULL;
1383 <
1384 <    if (yy_class_name == NULL)
1385 <      delete_conf_item(yy_conf);
1386 <    else
1387 <    {
1388 <      cconf = find_exact_name_conf(CLASS_TYPE, yy_class_name, NULL, NULL);
1389 <
1390 <      if (cconf != NULL)                /* The class existed already */
1391 <      {
1392 <        int user_count = 0;
1393 <
1394 <        rebuild_cidr_class(cconf, yy_class);
1269 >  if (conf_parser_ctx.pass != 1)
1270 >    break;
1271  
1272 <        class = map_to_conf(cconf);
1397 <
1398 <        user_count = class->curr_user_count;
1399 <        memcpy(class, yy_class, sizeof(*class));
1400 <        class->curr_user_count = user_count;
1401 <        class->active = 1;
1402 <
1403 <        delete_conf_item(yy_conf);
1404 <
1405 <        MyFree(cconf->name);            /* Allows case change of class name */
1406 <        cconf->name = yy_class_name;
1407 <      }
1408 <      else      /* Brand new class */
1409 <      {
1410 <        MyFree(yy_conf->name);          /* just in case it was allocated */
1411 <        yy_conf->name = yy_class_name;
1412 <        yy_class->active = 1;
1413 <      }
1414 <    }
1272 >  reset_block_state();
1273  
1274 <    yy_class_name = NULL;
1275 <  }
1274 >  block_state.ping_freq.value = DEFAULT_PINGFREQUENCY;
1275 >  block_state.con_freq.value  = DEFAULT_CONNECTFREQUENCY;
1276 >  block_state.max_total.value = MAXIMUM_LINKS_DEFAULT;
1277 >  block_state.max_sendq.value = DEFAULT_SENDQ;
1278 >  block_state.max_recvq.value = DEFAULT_RECVQ;
1279 > } '{' class_items '}' ';'
1280 > {
1281 >  struct ClassItem *class = NULL;
1282 >
1283 >  if (conf_parser_ctx.pass != 1)
1284 >    break;
1285 >
1286 >  if (!block_state.class.buf[0])
1287 >    break;
1288 >
1289 >  if (!(class = class_find(block_state.class.buf, 0)))
1290 >    class = class_make();
1291 >
1292 >  class->active = 1;
1293 >  MyFree(class->name);
1294 >  class->name = xstrdup(block_state.class.buf);
1295 >  class->ping_freq = block_state.ping_freq.value;
1296 >  class->max_perip = block_state.max_perip.value;
1297 >  class->con_freq = block_state.con_freq.value;
1298 >  class->max_total = block_state.max_total.value;
1299 >  class->max_global = block_state.max_global.value;
1300 >  class->max_local = block_state.max_local.value;
1301 >  class->max_ident = block_state.max_ident.value;
1302 >  class->max_sendq = block_state.max_sendq.value;
1303 >  class->max_recvq = block_state.max_recvq.value;
1304 >
1305 >  if (block_state.min_idle.value > block_state.max_idle.value)
1306 >  {
1307 >    block_state.min_idle.value = 0;
1308 >    block_state.max_idle.value = 0;
1309 >    block_state.flags.value &= ~CLASS_FLAGS_FAKE_IDLE;
1310 >  }
1311 >
1312 >  class->flags = block_state.flags.value;
1313 >  class->min_idle = block_state.min_idle.value;
1314 >  class->max_idle = block_state.max_idle.value;
1315 >
1316 >  if (class->number_per_cidr && block_state.number_per_cidr.value)
1317 >    if ((class->cidr_bitlen_ipv4 && block_state.cidr_bitlen_ipv4.value) ||
1318 >        (class->cidr_bitlen_ipv6 && block_state.cidr_bitlen_ipv6.value))
1319 >      if ((class->cidr_bitlen_ipv4 != block_state.cidr_bitlen_ipv4.value) ||
1320 >          (class->cidr_bitlen_ipv6 != block_state.cidr_bitlen_ipv6.value))
1321 >        rebuild_cidr_list(class);
1322 >
1323 >  class->cidr_bitlen_ipv4 = block_state.cidr_bitlen_ipv4.value;
1324 >  class->cidr_bitlen_ipv6 = block_state.cidr_bitlen_ipv6.value;
1325 >  class->number_per_cidr = block_state.number_per_cidr.value;
1326   };
1327  
1420 class_name_b: | class_name_t;
1421
1328   class_items:    class_items class_item | class_item;
1329   class_item:     class_name |
1330                  class_cidr_bitlen_ipv4 | class_cidr_bitlen_ipv6 |
1331                  class_ping_time |
1426                class_ping_warning |
1332                  class_number_per_cidr |
1333                  class_number_per_ip |
1334                  class_connectfreq |
# Line 1431 | Line 1336 | class_item:     class_name |
1336                  class_max_global |
1337                  class_max_local |
1338                  class_max_ident |
1339 <                class_sendq |
1339 >                class_sendq | class_recvq |
1340 >                class_min_idle |
1341 >                class_max_idle |
1342 >                class_flags |
1343                  error ';' ;
1344  
1345   class_name: NAME '=' QSTRING ';'
1346   {
1347    if (conf_parser_ctx.pass == 1)
1348 <  {
1441 <    MyFree(yy_class_name);
1442 <    DupString(yy_class_name, yylval.string);
1443 <  }
1444 < };
1445 <
1446 < class_name_t: QSTRING
1447 < {
1448 <  if (conf_parser_ctx.pass == 1)
1449 <  {
1450 <    MyFree(yy_class_name);
1451 <    DupString(yy_class_name, yylval.string);
1452 <  }
1348 >    strlcpy(block_state.class.buf, yylval.string, sizeof(block_state.class.buf));
1349   };
1350  
1351   class_ping_time: PING_TIME '=' timespec ';'
1352   {
1353    if (conf_parser_ctx.pass == 1)
1354 <    PingFreq(yy_class) = $3;
1459 < };
1460 <
1461 < class_ping_warning: PING_WARNING '=' timespec ';'
1462 < {
1463 <  if (conf_parser_ctx.pass == 1)
1464 <    PingWarning(yy_class) = $3;
1354 >    block_state.ping_freq.value = $3;
1355   };
1356  
1357   class_number_per_ip: NUMBER_PER_IP '=' NUMBER ';'
1358   {
1359    if (conf_parser_ctx.pass == 1)
1360 <    MaxPerIp(yy_class) = $3;
1360 >    block_state.max_perip.value = $3;
1361   };
1362  
1363   class_connectfreq: CONNECTFREQ '=' timespec ';'
1364   {
1365    if (conf_parser_ctx.pass == 1)
1366 <    ConFreq(yy_class) = $3;
1366 >    block_state.con_freq.value = $3;
1367   };
1368  
1369   class_max_number: MAX_NUMBER '=' NUMBER ';'
1370   {
1371    if (conf_parser_ctx.pass == 1)
1372 <    MaxTotal(yy_class) = $3;
1372 >    block_state.max_total.value = $3;
1373   };
1374  
1375   class_max_global: MAX_GLOBAL '=' NUMBER ';'
1376   {
1377    if (conf_parser_ctx.pass == 1)
1378 <    MaxGlobal(yy_class) = $3;
1378 >    block_state.max_global.value = $3;
1379   };
1380  
1381   class_max_local: MAX_LOCAL '=' NUMBER ';'
1382   {
1383    if (conf_parser_ctx.pass == 1)
1384 <    MaxLocal(yy_class) = $3;
1384 >    block_state.max_local.value = $3;
1385   };
1386  
1387   class_max_ident: MAX_IDENT '=' NUMBER ';'
1388   {
1389    if (conf_parser_ctx.pass == 1)
1390 <    MaxIdent(yy_class) = $3;
1390 >    block_state.max_ident.value = $3;
1391   };
1392  
1393   class_sendq: SENDQ '=' sizespec ';'
1394   {
1395    if (conf_parser_ctx.pass == 1)
1396 <    MaxSendq(yy_class) = $3;
1396 >    block_state.max_sendq.value = $3;
1397 > };
1398 >
1399 > class_recvq: T_RECVQ '=' sizespec ';'
1400 > {
1401 >  if (conf_parser_ctx.pass == 1)
1402 >    if ($3 >= CLIENT_FLOOD_MIN && $3 <= CLIENT_FLOOD_MAX)
1403 >      block_state.max_recvq.value = $3;
1404   };
1405  
1406   class_cidr_bitlen_ipv4: CIDR_BITLEN_IPV4 '=' NUMBER ';'
1407   {
1408    if (conf_parser_ctx.pass == 1)
1409 <    CidrBitlenIPV4(yy_class) = $3;
1409 >    block_state.cidr_bitlen_ipv4.value = $3 > 32 ? 32 : $3;
1410   };
1411  
1412   class_cidr_bitlen_ipv6: CIDR_BITLEN_IPV6 '=' NUMBER ';'
1413   {
1414    if (conf_parser_ctx.pass == 1)
1415 <    CidrBitlenIPV6(yy_class) = $3;
1415 >    block_state.cidr_bitlen_ipv6.value = $3 > 128 ? 128 : $3;
1416   };
1417  
1418   class_number_per_cidr: NUMBER_PER_CIDR '=' NUMBER ';'
1419   {
1420    if (conf_parser_ctx.pass == 1)
1421 <    NumberPerCidr(yy_class) = $3;
1421 >    block_state.number_per_cidr.value = $3;
1422 > };
1423 >
1424 > class_min_idle: MIN_IDLE '=' timespec ';'
1425 > {
1426 >  if (conf_parser_ctx.pass != 1)
1427 >    break;
1428 >
1429 >  block_state.min_idle.value = $3;
1430 >  block_state.flags.value |= CLASS_FLAGS_FAKE_IDLE;
1431 > };
1432 >
1433 > class_max_idle: MAX_IDLE '=' timespec ';'
1434 > {
1435 >  if (conf_parser_ctx.pass != 1)
1436 >    break;
1437 >
1438 >  block_state.max_idle.value = $3;
1439 >  block_state.flags.value |= CLASS_FLAGS_FAKE_IDLE;
1440 > };
1441 >
1442 > class_flags: IRCD_FLAGS
1443 > {
1444 >  if (conf_parser_ctx.pass == 1)
1445 >    block_state.flags.value &= CLASS_FLAGS_FAKE_IDLE;
1446 > } '='  class_flags_items ';';
1447 >
1448 > class_flags_items: class_flags_items ',' class_flags_item | class_flags_item;
1449 > class_flags_item: RANDOM_IDLE
1450 > {
1451 >  if (conf_parser_ctx.pass == 1)
1452 >    block_state.flags.value |= CLASS_FLAGS_RANDOM_IDLE;
1453 > } | HIDE_IDLE_FROM_OPERS
1454 > {
1455 >  if (conf_parser_ctx.pass == 1)
1456 >    block_state.flags.value |= CLASS_FLAGS_HIDE_IDLE_FROM_OPERS;
1457   };
1458  
1459 +
1460   /***************************************************************************
1461   *  section listen
1462   ***************************************************************************/
1463   listen_entry: LISTEN
1464   {
1465    if (conf_parser_ctx.pass == 2)
1466 <  {
1467 <    listener_address = NULL;
1535 <    listener_flags = 0;
1536 <  }
1537 < } '{' listen_items '}' ';'
1538 < {
1539 <  if (conf_parser_ctx.pass == 2)
1540 <  {
1541 <    MyFree(listener_address);
1542 <    listener_address = NULL;
1543 <  }
1544 < };
1466 >    reset_block_state();
1467 > } '{' listen_items '}' ';';
1468  
1469   listen_flags: IRCD_FLAGS
1470   {
1471 <  listener_flags = 0;
1471 >  block_state.flags.value = 0;
1472   } '='  listen_flags_items ';';
1473  
1474   listen_flags_items: listen_flags_items ',' listen_flags_item | listen_flags_item;
1475   listen_flags_item: T_SSL
1476   {
1477    if (conf_parser_ctx.pass == 2)
1478 <    listener_flags |= LISTENER_SSL;
1478 >    block_state.flags.value |= LISTENER_SSL;
1479   } | HIDDEN
1480   {
1481    if (conf_parser_ctx.pass == 2)
1482 <    listener_flags |= LISTENER_HIDDEN;
1482 >    block_state.flags.value |= LISTENER_HIDDEN;
1483   } | T_SERVER
1484   {
1485    if (conf_parser_ctx.pass == 2)
1486 <    listener_flags |= LISTENER_SERVER;
1486 >   block_state.flags.value |= LISTENER_SERVER;
1487   };
1488  
1566
1567
1489   listen_items:   listen_items listen_item | listen_item;
1490   listen_item:    listen_port | listen_flags | listen_address | listen_host | error ';';
1491  
1492 < listen_port: PORT '=' port_items { listener_flags = 0; } ';';
1492 > listen_port: PORT '=' port_items { block_state.flags.value = 0; } ';';
1493  
1494   port_items: port_items ',' port_item | port_item;
1495  
# Line 1576 | Line 1497 | port_item: NUMBER
1497   {
1498    if (conf_parser_ctx.pass == 2)
1499    {
1500 <    if ((listener_flags & LISTENER_SSL))
1500 >    if (block_state.flags.value & LISTENER_SSL)
1501   #ifdef HAVE_LIBCRYPTO
1502        if (!ServerInfo.server_ctx)
1503   #endif
1504        {
1505 <        yyerror("SSL not available - port closed");
1505 >        conf_error_report("SSL not available - port closed");
1506          break;
1507        }
1508 <    add_listener($1, listener_address, listener_flags);
1508 >    add_listener($1, block_state.addr.buf, block_state.flags.value);
1509    }
1510   } | NUMBER TWODOTS NUMBER
1511   {
# Line 1592 | Line 1513 | port_item: NUMBER
1513    {
1514      int i;
1515  
1516 <    if ((listener_flags & LISTENER_SSL))
1516 >    if (block_state.flags.value & LISTENER_SSL)
1517   #ifdef HAVE_LIBCRYPTO
1518        if (!ServerInfo.server_ctx)
1519   #endif
1520        {
1521 <        yyerror("SSL not available - port closed");
1521 >        conf_error_report("SSL not available - port closed");
1522          break;
1523        }
1524  
1525      for (i = $1; i <= $3; ++i)
1526 <      add_listener(i, listener_address, listener_flags);
1526 >      add_listener(i, block_state.addr.buf, block_state.flags.value);
1527    }
1528   };
1529  
1530   listen_address: IP '=' QSTRING ';'
1531   {
1532    if (conf_parser_ctx.pass == 2)
1533 <  {
1613 <    MyFree(listener_address);
1614 <    DupString(listener_address, yylval.string);
1615 <  }
1533 >    strlcpy(block_state.addr.buf, yylval.string, sizeof(block_state.addr.buf));
1534   };
1535  
1536   listen_host: HOST '=' QSTRING ';'
1537   {
1538    if (conf_parser_ctx.pass == 2)
1539 <  {
1622 <    MyFree(listener_address);
1623 <    DupString(listener_address, yylval.string);
1624 <  }
1539 >    strlcpy(block_state.addr.buf, yylval.string, sizeof(block_state.addr.buf));
1540   };
1541  
1542   /***************************************************************************
# Line 1630 | Line 1545 | listen_host: HOST '=' QSTRING ';'
1545   auth_entry: IRCD_AUTH
1546   {
1547    if (conf_parser_ctx.pass == 2)
1548 <  {
1634 <    yy_conf = make_conf_item(CLIENT_TYPE);
1635 <    yy_aconf = map_to_conf(yy_conf);
1636 <  }
1637 <  else
1638 <  {
1639 <    MyFree(class_name);
1640 <    class_name = NULL;
1641 <  }
1548 >    reset_block_state();
1549   } '{' auth_items '}' ';'
1550   {
1551 <  if (conf_parser_ctx.pass == 2)
1645 <  {
1646 <    struct CollectItem *yy_tmp = NULL;
1647 <    dlink_node *ptr = NULL, *next_ptr = NULL;
1648 <
1649 <    if (yy_aconf->user && yy_aconf->host)
1650 <    {
1651 <      conf_add_class_to_conf(yy_conf, class_name);
1652 <      add_conf_by_address(CONF_CLIENT, yy_aconf);
1653 <    }
1654 <    else
1655 <      delete_conf_item(yy_conf);
1656 <
1657 <    /* copy over settings from first struct */
1658 <    DLINK_FOREACH_SAFE(ptr, next_ptr, col_conf_list.head)
1659 <    {
1660 <      struct AccessItem *new_aconf;
1661 <      struct ConfItem *new_conf;
1662 <
1663 <      new_conf = make_conf_item(CLIENT_TYPE);
1664 <      new_aconf = map_to_conf(new_conf);
1665 <
1666 <      yy_tmp = ptr->data;
1551 >  dlink_node *ptr = NULL;
1552  
1553 <      assert(yy_tmp->user && yy_tmp->host);
1553 >  if (conf_parser_ctx.pass != 2)
1554 >    break;
1555  
1556 <      if (yy_aconf->passwd != NULL)
1557 <        DupString(new_aconf->passwd, yy_aconf->passwd);
1558 <      if (yy_conf->name != NULL)
1559 <        DupString(new_conf->name, yy_conf->name);
1674 <      if (yy_aconf->passwd != NULL)
1675 <        DupString(new_aconf->passwd, yy_aconf->passwd);
1676 <
1677 <      new_aconf->flags = yy_aconf->flags;
1678 <      new_aconf->port  = yy_aconf->port;
1556 >  DLINK_FOREACH(ptr, block_state.mask.list.head)
1557 >  {
1558 >    struct MaskItem *conf = NULL;
1559 >    struct split_nuh_item nuh;
1560  
1561 <      DupString(new_aconf->user, yy_tmp->user);
1562 <      collapse(new_aconf->user);
1561 >    nuh.nuhmask  = ptr->data;
1562 >    nuh.nickptr  = NULL;
1563 >    nuh.userptr  = block_state.user.buf;
1564 >    nuh.hostptr  = block_state.host.buf;
1565 >    nuh.nicksize = 0;
1566 >    nuh.usersize = sizeof(block_state.user.buf);
1567 >    nuh.hostsize = sizeof(block_state.host.buf);
1568 >    split_nuh(&nuh);
1569  
1570 <      DupString(new_aconf->host, yy_tmp->host);
1571 <      collapse(new_aconf->host);
1570 >    conf        = conf_make(CONF_CLIENT);
1571 >    conf->user  = xstrdup(collapse(block_state.user.buf));
1572 >    conf->host  = xstrdup(collapse(block_state.host.buf));
1573 >
1574 >    if (block_state.rpass.buf[0])
1575 >      conf->passwd = xstrdup(block_state.rpass.buf);
1576 >    if (block_state.name.buf[0])
1577 >      conf->passwd = xstrdup(block_state.name.buf);
1578  
1579 <      conf_add_class_to_conf(new_conf, class_name);
1580 <      add_conf_by_address(CONF_CLIENT, new_aconf);
1688 <      dlinkDelete(&yy_tmp->node, &col_conf_list);
1689 <      free_collect_item(yy_tmp);
1690 <    }
1579 >    conf->flags = block_state.flags.value;
1580 >    conf->port  = block_state.port.value;
1581  
1582 <    MyFree(class_name);
1583 <    class_name = NULL;
1694 <    yy_conf = NULL;
1695 <    yy_aconf = NULL;
1582 >    conf_add_class_to_conf(conf, block_state.class.buf);
1583 >    add_conf_by_address(CONF_CLIENT, conf);
1584    }
1585   };
1586  
# Line 1704 | Line 1592 | auth_item:      auth_user | auth_passwd
1592   auth_user: USER '=' QSTRING ';'
1593   {
1594    if (conf_parser_ctx.pass == 2)
1595 <  {
1708 <    struct CollectItem *yy_tmp = NULL;
1709 <    struct split_nuh_item nuh;
1710 <
1711 <    nuh.nuhmask  = yylval.string;
1712 <    nuh.nickptr  = NULL;
1713 <    nuh.userptr  = userbuf;
1714 <    nuh.hostptr  = hostbuf;
1715 <
1716 <    nuh.nicksize = 0;
1717 <    nuh.usersize = sizeof(userbuf);
1718 <    nuh.hostsize = sizeof(hostbuf);
1719 <
1720 <    split_nuh(&nuh);
1721 <
1722 <    if (yy_aconf->user == NULL)
1723 <    {
1724 <      DupString(yy_aconf->user, userbuf);
1725 <      DupString(yy_aconf->host, hostbuf);
1726 <    }
1727 <    else
1728 <    {
1729 <      yy_tmp = MyMalloc(sizeof(struct CollectItem));
1730 <
1731 <      DupString(yy_tmp->user, userbuf);
1732 <      DupString(yy_tmp->host, hostbuf);
1733 <
1734 <      dlinkAdd(yy_tmp, &yy_tmp->node, &col_conf_list);
1735 <    }
1736 <  }
1595 >    dlinkAdd(xstrdup(yylval.string), make_dlink_node(), &block_state.mask.list);
1596   };
1597  
1739 /* XXX - IP/IPV6 tags don't exist anymore - put IP/IPV6 into user. */
1740
1598   auth_passwd: PASSWORD '=' QSTRING ';'
1599   {
1600    if (conf_parser_ctx.pass == 2)
1601 <  {
1745 <    /* be paranoid */
1746 <    if (yy_aconf->passwd != NULL)
1747 <      memset(yy_aconf->passwd, 0, strlen(yy_aconf->passwd));
1748 <
1749 <    MyFree(yy_aconf->passwd);
1750 <    DupString(yy_aconf->passwd, yylval.string);
1751 <  }
1601 >    strlcpy(block_state.rpass.buf, yylval.string, sizeof(block_state.rpass.buf));
1602   };
1603  
1604   auth_class: CLASS '=' QSTRING ';'
1605   {
1606    if (conf_parser_ctx.pass == 2)
1607 <  {
1758 <    MyFree(class_name);
1759 <    DupString(class_name, yylval.string);
1760 <  }
1607 >    strlcpy(block_state.class.buf, yylval.string, sizeof(block_state.class.buf));
1608   };
1609  
1610   auth_encrypted: ENCRYPTED '=' TBOOL ';'
# Line 1765 | Line 1612 | auth_encrypted: ENCRYPTED '=' TBOOL ';'
1612    if (conf_parser_ctx.pass == 2)
1613    {
1614      if (yylval.number)
1615 <      SetConfEncrypted(yy_aconf);
1615 >      block_state.flags.value |= CONF_FLAGS_ENCRYPTED;
1616      else
1617 <      ClearConfEncrypted(yy_aconf);
1617 >      block_state.flags.value &= ~CONF_FLAGS_ENCRYPTED;
1618    }
1619   };
1620  
1621   auth_flags: IRCD_FLAGS
1622   {
1623 +  if (conf_parser_ctx.pass == 2)
1624 +    block_state.flags.value &= CONF_FLAGS_ENCRYPTED;
1625   } '='  auth_flags_items ';';
1626  
1627   auth_flags_items: auth_flags_items ',' auth_flags_item | auth_flags_item;
1628 < auth_flags_item: NOT { not_atom = 1; } auth_flags_item_atom
1780 <                | { not_atom = 0; } auth_flags_item_atom;
1781 <
1782 < auth_flags_item_atom: SPOOF_NOTICE
1628 > auth_flags_item: SPOOF_NOTICE
1629   {
1630    if (conf_parser_ctx.pass == 2)
1631 <  {
1786 <    if (not_atom) yy_aconf->flags &= ~CONF_FLAGS_SPOOF_NOTICE;
1787 <    else yy_aconf->flags |= CONF_FLAGS_SPOOF_NOTICE;
1788 <  }
1631 >    block_state.flags.value |= CONF_FLAGS_SPOOF_NOTICE;
1632   } | EXCEED_LIMIT
1633   {
1634    if (conf_parser_ctx.pass == 2)
1635 <  {
1793 <    if (not_atom) yy_aconf->flags &= ~CONF_FLAGS_NOLIMIT;
1794 <    else yy_aconf->flags |= CONF_FLAGS_NOLIMIT;
1795 <  }
1635 >    block_state.flags.value |= CONF_FLAGS_NOLIMIT;
1636   } | KLINE_EXEMPT
1637   {
1638    if (conf_parser_ctx.pass == 2)
1639 <  {
1800 <    if (not_atom) yy_aconf->flags &= ~CONF_FLAGS_EXEMPTKLINE;
1801 <    else yy_aconf->flags |= CONF_FLAGS_EXEMPTKLINE;
1802 <  }
1639 >    block_state.flags.value |= CONF_FLAGS_EXEMPTKLINE;
1640   } | NEED_IDENT
1641   {
1642    if (conf_parser_ctx.pass == 2)
1643 <  {
1807 <    if (not_atom) yy_aconf->flags &= ~CONF_FLAGS_NEED_IDENTD;
1808 <    else yy_aconf->flags |= CONF_FLAGS_NEED_IDENTD;
1809 <  }
1643 >    block_state.flags.value |= CONF_FLAGS_NEED_IDENTD;
1644   } | CAN_FLOOD
1645   {
1646    if (conf_parser_ctx.pass == 2)
1647 <  {
1814 <    if (not_atom) yy_aconf->flags &= ~CONF_FLAGS_CAN_FLOOD;
1815 <    else yy_aconf->flags |= CONF_FLAGS_CAN_FLOOD;
1816 <  }
1817 < } | CAN_IDLE
1818 < {
1819 <  if (conf_parser_ctx.pass == 2)
1820 <  {
1821 <    if (not_atom) yy_aconf->flags &= ~CONF_FLAGS_IDLE_LINED;
1822 <    else yy_aconf->flags |= CONF_FLAGS_IDLE_LINED;
1823 <  }
1647 >    block_state.flags.value |= CONF_FLAGS_CAN_FLOOD;
1648   } | NO_TILDE
1649   {
1650    if (conf_parser_ctx.pass == 2)
1651 <  {
1828 <    if (not_atom) yy_aconf->flags &= ~CONF_FLAGS_NO_TILDE;
1829 <    else yy_aconf->flags |= CONF_FLAGS_NO_TILDE;
1830 <  }
1651 >    block_state.flags.value |= CONF_FLAGS_NO_TILDE;
1652   } | GLINE_EXEMPT
1653   {
1654    if (conf_parser_ctx.pass == 2)
1655 <  {
1835 <    if (not_atom) yy_aconf->flags &= ~CONF_FLAGS_EXEMPTGLINE;
1836 <    else yy_aconf->flags |= CONF_FLAGS_EXEMPTGLINE;
1837 <  }
1655 >    block_state.flags.value |= CONF_FLAGS_EXEMPTGLINE;
1656   } | RESV_EXEMPT
1657   {
1658    if (conf_parser_ctx.pass == 2)
1659 <  {
1660 <    if (not_atom) yy_aconf->flags &= ~CONF_FLAGS_EXEMPTRESV;
1661 <    else yy_aconf->flags |= CONF_FLAGS_EXEMPTRESV;
1662 <  }
1659 >    block_state.flags.value |= CONF_FLAGS_EXEMPTRESV;
1660 > } | T_WEBIRC
1661 > {
1662 >  if (conf_parser_ctx.pass == 2)
1663 >    block_state.flags.value |= CONF_FLAGS_WEBIRC;
1664   } | NEED_PASSWORD
1665   {
1666    if (conf_parser_ctx.pass == 2)
1667 <  {
1849 <    if (not_atom) yy_aconf->flags &= ~CONF_FLAGS_NEED_PASSWORD;
1850 <    else yy_aconf->flags |= CONF_FLAGS_NEED_PASSWORD;
1851 <  }
1667 >    block_state.flags.value |= CONF_FLAGS_NEED_PASSWORD;
1668   };
1669  
1854 /* XXX - need check for illegal hostnames here */
1670   auth_spoof: SPOOF '=' QSTRING ';'
1671   {
1672 <  if (conf_parser_ctx.pass == 2)
1673 <  {
1859 <    MyFree(yy_conf->name);
1672 >  if (conf_parser_ctx.pass != 2)
1673 >    break;
1674  
1675 <    if (strlen(yylval.string) < HOSTLEN)
1676 <    {    
1677 <      DupString(yy_conf->name, yylval.string);
1678 <      yy_aconf->flags |= CONF_FLAGS_SPOOF_IP;
1865 <    }
1866 <    else
1867 <    {
1868 <      ilog(L_ERROR, "Spoofs must be less than %d..ignoring it", HOSTLEN);
1869 <      yy_conf->name = NULL;
1870 <    }
1675 >  if (strlen(yylval.string) <= HOSTLEN && valid_hostname(yylval.string))
1676 >  {
1677 >    strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
1678 >    block_state.flags.value |= CONF_FLAGS_SPOOF_IP;
1679    }
1680 +  else
1681 +    ilog(LOG_TYPE_IRCD, "Spoof either is too long or contains invalid characters. Ignoring it.");
1682   };
1683  
1684   auth_redir_serv: REDIRSERV '=' QSTRING ';'
1685   {
1686 <  if (conf_parser_ctx.pass == 2)
1687 <  {
1688 <    yy_aconf->flags |= CONF_FLAGS_REDIR;
1689 <    MyFree(yy_conf->name);
1690 <    DupString(yy_conf->name, yylval.string);
1881 <  }
1686 >  if (conf_parser_ctx.pass != 2)
1687 >    break;
1688 >
1689 >  strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
1690 >  block_state.flags.value |= CONF_FLAGS_REDIR;
1691   };
1692  
1693   auth_redir_port: REDIRPORT '=' NUMBER ';'
1694   {
1695 <  if (conf_parser_ctx.pass == 2)
1696 <  {
1697 <    yy_aconf->flags |= CONF_FLAGS_REDIR;
1698 <    yy_aconf->port = $3;
1699 <  }
1695 >  if (conf_parser_ctx.pass != 2)
1696 >    break;
1697 >
1698 >  block_state.flags.value |= CONF_FLAGS_REDIR;
1699 >  block_state.port.value = $3;
1700   };
1701  
1702  
# Line 1896 | Line 1705 | auth_redir_port: REDIRPORT '=' NUMBER ';
1705   ***************************************************************************/
1706   resv_entry: RESV
1707   {
1708 <  if (conf_parser_ctx.pass == 2)
1709 <  {
1710 <    MyFree(resv_reason);
1711 <    resv_reason = NULL;
1712 <  }
1708 >  if (conf_parser_ctx.pass != 2)
1709 >    break;
1710 >
1711 >  reset_block_state();
1712 >  strlcpy(block_state.rpass.buf, CONF_NOREASON, sizeof(block_state.rpass.buf));
1713   } '{' resv_items '}' ';'
1714   {
1715 <  if (conf_parser_ctx.pass == 2)
1716 <  {
1717 <    MyFree(resv_reason);
1718 <    resv_reason = NULL;
1910 <  }
1715 >  if (conf_parser_ctx.pass != 2)
1716 >    break;
1717 >
1718 >  create_resv(block_state.name.buf, block_state.rpass.buf, &block_state.mask.list);
1719   };
1720  
1721   resv_items:     resv_items resv_item | resv_item;
1722 < resv_item:      resv_creason | resv_channel | resv_nick | error ';' ;
1722 > resv_item:      resv_mask | resv_reason | resv_exempt | error ';' ;
1723  
1724 < resv_creason: REASON '=' QSTRING ';'
1724 > resv_mask: MASK '=' QSTRING ';'
1725   {
1726    if (conf_parser_ctx.pass == 2)
1727 <  {
1920 <    MyFree(resv_reason);
1921 <    DupString(resv_reason, yylval.string);
1922 <  }
1727 >    strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
1728   };
1729  
1730 < resv_channel: CHANNEL '=' QSTRING ';'
1730 > resv_reason: REASON '=' QSTRING ';'
1731   {
1732    if (conf_parser_ctx.pass == 2)
1733 <  {
1734 <    if (IsChanPrefix(*yylval.string))
1930 <    {
1931 <      char def_reason[] = "No reason";
1733 >    strlcpy(block_state.rpass.buf, yylval.string, sizeof(block_state.rpass.buf));
1734 > };
1735  
1736 <      create_channel_resv(yylval.string, resv_reason != NULL ? resv_reason : def_reason, 1);
1737 <    }
1738 <  }
1739 <  /* ignore it for now.. but we really should make a warning if
1937 <   * its an erroneous name --fl_ */
1736 > resv_exempt: EXEMPT '=' QSTRING ';'
1737 > {
1738 >  if (conf_parser_ctx.pass == 2)
1739 >    dlinkAdd(xstrdup(yylval.string), make_dlink_node(), &block_state.mask.list);
1740   };
1741  
1742 < resv_nick: NICK '=' QSTRING ';'
1742 >
1743 > /***************************************************************************
1744 > *  section service
1745 > ***************************************************************************/
1746 > service_entry: T_SERVICE '{' service_items '}' ';';
1747 >
1748 > service_items:     service_items service_item | service_item;
1749 > service_item:      service_name | error;
1750 >
1751 > service_name: NAME '=' QSTRING ';'
1752   {
1753    if (conf_parser_ctx.pass == 2)
1754    {
1755 <    char def_reason[] = "No reason";
1756 <
1757 <    create_nick_resv(yylval.string, resv_reason != NULL ? resv_reason : def_reason, 1);
1755 >    if (valid_servname(yylval.string))
1756 >    {
1757 >      struct MaskItem *conf = conf_make(CONF_SERVICE);
1758 >      conf->name = xstrdup(yylval.string);
1759 >    }
1760    }
1761   };
1762  
# Line 1952 | Line 1765 | resv_nick: NICK '=' QSTRING ';'
1765   ***************************************************************************/
1766   shared_entry: T_SHARED
1767   {
1768 <  if (conf_parser_ctx.pass == 2)
1769 <  {
1770 <    yy_conf = make_conf_item(ULINE_TYPE);
1771 <    yy_match_item = map_to_conf(yy_conf);
1772 <    yy_match_item->action = SHARED_ALL;
1773 <  }
1768 >  if (conf_parser_ctx.pass != 2)
1769 >    break;
1770 >
1771 >  reset_block_state();
1772 >
1773 >  strlcpy(block_state.name.buf, "*", sizeof(block_state.name.buf));
1774 >  strlcpy(block_state.user.buf, "*", sizeof(block_state.user.buf));
1775 >  strlcpy(block_state.host.buf, "*", sizeof(block_state.host.buf));
1776 >  block_state.flags.value = SHARED_ALL;
1777   } '{' shared_items '}' ';'
1778   {
1779 <  if (conf_parser_ctx.pass == 2)
1780 <  {
1781 <    yy_conf = NULL;
1782 <  }
1779 >  struct MaskItem *conf = NULL;
1780 >
1781 >  if (conf_parser_ctx.pass != 2)
1782 >    break;
1783 >
1784 >  conf = conf_make(CONF_ULINE);
1785 >  conf->flags = block_state.flags.value;
1786 >  conf->name = xstrdup(block_state.name.buf);
1787 >  conf->user = xstrdup(block_state.user.buf);
1788 >  conf->user = xstrdup(block_state.host.buf);
1789   };
1790  
1791   shared_items: shared_items shared_item | shared_item;
# Line 1972 | Line 1794 | shared_item:  shared_name | shared_user
1794   shared_name: NAME '=' QSTRING ';'
1795   {
1796    if (conf_parser_ctx.pass == 2)
1797 <  {
1976 <    MyFree(yy_conf->name);
1977 <    DupString(yy_conf->name, yylval.string);
1978 <  }
1797 >    strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
1798   };
1799  
1800   shared_user: USER '=' QSTRING ';'
# Line 1986 | Line 1805 | shared_user: USER '=' QSTRING ';'
1805  
1806      nuh.nuhmask  = yylval.string;
1807      nuh.nickptr  = NULL;
1808 <    nuh.userptr  = userbuf;
1809 <    nuh.hostptr  = hostbuf;
1808 >    nuh.userptr  = block_state.user.buf;
1809 >    nuh.hostptr  = block_state.host.buf;
1810  
1811      nuh.nicksize = 0;
1812 <    nuh.usersize = sizeof(userbuf);
1813 <    nuh.hostsize = sizeof(hostbuf);
1812 >    nuh.usersize = sizeof(block_state.user.buf);
1813 >    nuh.hostsize = sizeof(block_state.host.buf);
1814  
1815      split_nuh(&nuh);
1997
1998    DupString(yy_match_item->user, userbuf);
1999    DupString(yy_match_item->host, hostbuf);
1816    }
1817   };
1818  
1819   shared_type: TYPE
1820   {
1821    if (conf_parser_ctx.pass == 2)
1822 <    yy_match_item->action = 0;
1822 >    block_state.flags.value = 0;
1823   } '=' shared_types ';' ;
1824  
1825   shared_types: shared_types ',' shared_type_item | shared_type_item;
1826   shared_type_item: KLINE
1827   {
1828    if (conf_parser_ctx.pass == 2)
1829 <    yy_match_item->action |= SHARED_KLINE;
1830 < } | TKLINE
1829 >    block_state.flags.value |= SHARED_KLINE;
1830 > } | UNKLINE
1831   {
1832    if (conf_parser_ctx.pass == 2)
1833 <    yy_match_item->action |= SHARED_TKLINE;
1834 < } | UNKLINE
1833 >    block_state.flags.value |= SHARED_UNKLINE;
1834 > } | T_DLINE
1835   {
1836    if (conf_parser_ctx.pass == 2)
1837 <    yy_match_item->action |= SHARED_UNKLINE;
1838 < } | XLINE
1837 >    block_state.flags.value |= SHARED_DLINE;
1838 > } | T_UNDLINE
1839   {
1840    if (conf_parser_ctx.pass == 2)
1841 <    yy_match_item->action |= SHARED_XLINE;
1842 < } | TXLINE
1841 >    block_state.flags.value |= SHARED_UNDLINE;
1842 > } | XLINE
1843   {
1844    if (conf_parser_ctx.pass == 2)
1845 <    yy_match_item->action |= SHARED_TXLINE;
1845 >    block_state.flags.value |= SHARED_XLINE;
1846   } | T_UNXLINE
1847   {
1848    if (conf_parser_ctx.pass == 2)
1849 <    yy_match_item->action |= SHARED_UNXLINE;
1849 >    block_state.flags.value |= SHARED_UNXLINE;
1850   } | RESV
1851   {
1852    if (conf_parser_ctx.pass == 2)
1853 <    yy_match_item->action |= SHARED_RESV;
2038 < } | TRESV
2039 < {
2040 <  if (conf_parser_ctx.pass == 2)
2041 <    yy_match_item->action |= SHARED_TRESV;
1853 >    block_state.flags.value |= SHARED_RESV;
1854   } | T_UNRESV
1855   {
1856    if (conf_parser_ctx.pass == 2)
1857 <    yy_match_item->action |= SHARED_UNRESV;
1857 >    block_state.flags.value |= SHARED_UNRESV;
1858   } | T_LOCOPS
1859   {
1860    if (conf_parser_ctx.pass == 2)
1861 <    yy_match_item->action |= SHARED_LOCOPS;
1861 >    block_state.flags.value |= SHARED_LOCOPS;
1862   } | T_ALL
1863   {
1864    if (conf_parser_ctx.pass == 2)
1865 <    yy_match_item->action = SHARED_ALL;
1865 >    block_state.flags.value = SHARED_ALL;
1866   };
1867  
1868   /***************************************************************************
# Line 2058 | Line 1870 | shared_type_item: KLINE
1870   ***************************************************************************/
1871   cluster_entry: T_CLUSTER
1872   {
1873 <  if (conf_parser_ctx.pass == 2)
1874 <  {
1875 <    yy_conf = make_conf_item(CLUSTER_TYPE);
1876 <    yy_conf->flags = SHARED_ALL;
1877 <  }
1873 >  if (conf_parser_ctx.pass != 2)
1874 >    break;
1875 >
1876 >  reset_block_state();
1877 >
1878 >  strlcpy(block_state.name.buf, "*", sizeof(block_state.name.buf));
1879 >  block_state.flags.value = SHARED_ALL;
1880   } '{' cluster_items '}' ';'
1881   {
1882 <  if (conf_parser_ctx.pass == 2)
1883 <  {
1884 <    if (yy_conf->name == NULL)
1885 <      DupString(yy_conf->name, "*");
1886 <    yy_conf = NULL;
1887 <  }
1882 >  struct MaskItem *conf = NULL;
1883 >
1884 >  if (conf_parser_ctx.pass != 2)
1885 >    break;
1886 >
1887 >  conf = conf_make(CONF_CLUSTER);
1888 >  conf->flags = block_state.flags.value;
1889 >  conf->name = xstrdup(block_state.name.buf);
1890   };
1891  
1892   cluster_items:  cluster_items cluster_item | cluster_item;
# Line 2079 | Line 1895 | cluster_item:  cluster_name | cluster_typ
1895   cluster_name: NAME '=' QSTRING ';'
1896   {
1897    if (conf_parser_ctx.pass == 2)
1898 <    DupString(yy_conf->name, yylval.string);
1898 >    strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
1899   };
1900  
1901   cluster_type: TYPE
1902   {
1903    if (conf_parser_ctx.pass == 2)
1904 <    yy_conf->flags = 0;
1904 >    block_state.flags.value = 0;
1905   } '=' cluster_types ';' ;
1906  
1907   cluster_types:  cluster_types ',' cluster_type_item | cluster_type_item;
1908   cluster_type_item: KLINE
1909   {
1910    if (conf_parser_ctx.pass == 2)
1911 <    yy_conf->flags |= SHARED_KLINE;
1912 < } | TKLINE
1911 >    block_state.flags.value |= SHARED_KLINE;
1912 > } | UNKLINE
1913   {
1914    if (conf_parser_ctx.pass == 2)
1915 <    yy_conf->flags |= SHARED_TKLINE;
1916 < } | UNKLINE
1915 >    block_state.flags.value |= SHARED_UNKLINE;
1916 > } | T_DLINE
1917   {
1918    if (conf_parser_ctx.pass == 2)
1919 <    yy_conf->flags |= SHARED_UNKLINE;
1920 < } | XLINE
1919 >    block_state.flags.value |= SHARED_DLINE;
1920 > } | T_UNDLINE
1921   {
1922    if (conf_parser_ctx.pass == 2)
1923 <    yy_conf->flags |= SHARED_XLINE;
1924 < } | TXLINE
1923 >    block_state.flags.value |= SHARED_UNDLINE;
1924 > } | XLINE
1925   {
1926    if (conf_parser_ctx.pass == 2)
1927 <    yy_conf->flags |= SHARED_TXLINE;
1927 >    block_state.flags.value |= SHARED_XLINE;
1928   } | T_UNXLINE
1929   {
1930    if (conf_parser_ctx.pass == 2)
1931 <    yy_conf->flags |= SHARED_UNXLINE;
1931 >    block_state.flags.value |= SHARED_UNXLINE;
1932   } | RESV
1933   {
1934    if (conf_parser_ctx.pass == 2)
1935 <    yy_conf->flags |= SHARED_RESV;
2120 < } | TRESV
2121 < {
2122 <  if (conf_parser_ctx.pass == 2)
2123 <    yy_conf->flags |= SHARED_TRESV;
1935 >    block_state.flags.value |= SHARED_RESV;
1936   } | T_UNRESV
1937   {
1938    if (conf_parser_ctx.pass == 2)
1939 <    yy_conf->flags |= SHARED_UNRESV;
1939 >    block_state.flags.value |= SHARED_UNRESV;
1940   } | T_LOCOPS
1941   {
1942    if (conf_parser_ctx.pass == 2)
1943 <    yy_conf->flags |= SHARED_LOCOPS;
1943 >    block_state.flags.value |= SHARED_LOCOPS;
1944   } | T_ALL
1945   {
1946    if (conf_parser_ctx.pass == 2)
1947 <    yy_conf->flags = SHARED_ALL;
1947 >    block_state.flags.value = SHARED_ALL;
1948   };
1949  
1950   /***************************************************************************
# Line 2140 | Line 1952 | cluster_type_item: KLINE
1952   ***************************************************************************/
1953   connect_entry: CONNECT  
1954   {
2143  if (conf_parser_ctx.pass == 2)
2144  {
2145    yy_conf = make_conf_item(SERVER_TYPE);
2146    yy_aconf = (struct AccessItem *)map_to_conf(yy_conf);
2147    yy_aconf->passwd = NULL;
2148    /* defaults */
2149    yy_aconf->port = PORTNUM;
1955  
1956 <    if (ConfigFileEntry.burst_away)
1957 <      yy_aconf->flags = CONF_FLAGS_BURST_AWAY;
2153 <  }
2154 <  else
2155 <  {
2156 <    MyFree(class_name);
2157 <    class_name = NULL;
2158 <  }
2159 < } connect_name_b '{' connect_items '}' ';'
2160 < {
2161 <  if (conf_parser_ctx.pass == 2)
2162 <  {
2163 <    struct CollectItem *yy_hconf=NULL;
2164 <    struct CollectItem *yy_lconf=NULL;
2165 <    dlink_node *ptr;
2166 <    dlink_node *next_ptr;
2167 < #ifdef HAVE_LIBCRYPTO
2168 <    if (yy_aconf->host &&
2169 <        ((yy_aconf->passwd && yy_aconf->spasswd) ||
2170 <         (yy_aconf->rsa_public_key && IsConfCryptLink(yy_aconf))))
2171 < #else /* !HAVE_LIBCRYPTO */
2172 <      if (yy_aconf->host && !IsConfCryptLink(yy_aconf) &&
2173 <          yy_aconf->passwd && yy_aconf->spasswd)
2174 < #endif /* !HAVE_LIBCRYPTO */
2175 <        {
2176 <          if (conf_add_server(yy_conf, class_name) == -1)
2177 <          {
2178 <            delete_conf_item(yy_conf);
2179 <            yy_conf = NULL;
2180 <            yy_aconf = NULL;
2181 <          }
2182 <        }
2183 <        else
2184 <        {
2185 <          /* Even if yy_conf ->name is NULL
2186 <           * should still unhook any hub/leaf confs still pending
2187 <           */
2188 <          unhook_hub_leaf_confs();
2189 <
2190 <          if (yy_conf->name != NULL)
2191 <          {
2192 < #ifndef HAVE_LIBCRYPTO
2193 <            if (IsConfCryptLink(yy_aconf))
2194 <              yyerror("Ignoring connect block -- no OpenSSL support");
2195 < #else
2196 <            if (IsConfCryptLink(yy_aconf) && !yy_aconf->rsa_public_key)
2197 <              yyerror("Ignoring connect block -- missing key");
2198 < #endif
2199 <            if (yy_aconf->host == NULL)
2200 <              yyerror("Ignoring connect block -- missing host");
2201 <            else if (!IsConfCryptLink(yy_aconf) &&
2202 <                    (!yy_aconf->passwd || !yy_aconf->spasswd))
2203 <              yyerror("Ignoring connect block -- missing password");
2204 <          }
2205 <
2206 <
2207 <          /* XXX
2208 <           * This fixes a try_connections() core (caused by invalid class_ptr
2209 <           * pointers) reported by metalrock. That's an ugly fix, but there
2210 <           * is currently no better way. The entire config subsystem needs an
2211 <           * rewrite ASAP. make_conf_item() shouldn't really add things onto
2212 <           * a doubly linked list immediately without any sanity checks!  -Michael
2213 <           */
2214 <          delete_conf_item(yy_conf);
2215 <
2216 <          yy_aconf = NULL;
2217 <          yy_conf = NULL;
2218 <        }
2219 <
2220 <      /*
2221 <       * yy_conf is still pointing at the server that is having
2222 <       * a connect block built for it. This means, y_aconf->name
2223 <       * points to the actual irc name this server will be known as.
2224 <       * Now this new server has a set or even just one hub_mask (or leaf_mask)
2225 <       * given in the link list at yy_hconf. Fill in the HUB confs
2226 <       * from this link list now.
2227 <       */        
2228 <      DLINK_FOREACH_SAFE(ptr, next_ptr, hub_conf_list.head)
2229 <      {
2230 <        struct ConfItem *new_hub_conf;
2231 <        struct MatchItem *match_item;
1956 >  if (conf_parser_ctx.pass != 2)
1957 >    break;
1958  
1959 <        yy_hconf = ptr->data;
1959 >  reset_block_state();
1960 >  block_state.port.value = PORTNUM;
1961 > } '{' connect_items '}' ';'
1962 > {
1963 >  struct MaskItem *conf = NULL;
1964 >  struct addrinfo hints, *res;
1965 >
1966 >  if (conf_parser_ctx.pass != 2)
1967 >    break;
1968 >
1969 >  if (!block_state.name.buf[0] ||
1970 >      !block_state.host.buf[0])
1971 >    break;
1972 >
1973 >  if (!(block_state.rpass.buf[0] ||
1974 >        block_state.spass.buf[0]))
1975 >    break;
1976 >
1977 >  if (has_wildcards(block_state.name.buf) ||
1978 >      has_wildcards(block_state.host.buf))
1979 >    break;
1980 >
1981 >  conf = conf_make(CONF_SERVER);
1982 >  conf->port = block_state.port.value;
1983 >  conf->flags = block_state.flags.value;
1984 >  conf->aftype = block_state.aftype.value;
1985 >  conf->host = xstrdup(block_state.host.buf);
1986 >  conf->name = xstrdup(block_state.name.buf);
1987 >  conf->passwd = xstrdup(block_state.rpass.buf);
1988 >  conf->spasswd = xstrdup(block_state.spass.buf);
1989 >  conf->cipher_list = xstrdup(block_state.ciph.buf);
1990  
1991 <        /* yy_conf == NULL is a fatal error for this connect block! */
1992 <        if ((yy_conf != NULL) && (yy_conf->name != NULL))
2237 <        {
2238 <          new_hub_conf = make_conf_item(HUB_TYPE);
2239 <          match_item = (struct MatchItem *)map_to_conf(new_hub_conf);
2240 <          DupString(new_hub_conf->name, yy_conf->name);
2241 <          if (yy_hconf->user != NULL)
2242 <            DupString(match_item->user, yy_hconf->user);
2243 <          else
2244 <            DupString(match_item->user, "*");
2245 <          if (yy_hconf->host != NULL)
2246 <            DupString(match_item->host, yy_hconf->host);
2247 <          else
2248 <            DupString(match_item->host, "*");
2249 <        }
2250 <        dlinkDelete(&yy_hconf->node, &hub_conf_list);
2251 <        free_collect_item(yy_hconf);
2252 <      }
1991 >  dlinkMoveList(&block_state.leaf.list, &conf->leaf_list);
1992 >  dlinkMoveList(&block_state.hub.list, &conf->hub_list);
1993  
1994 <      /* Ditto for the LEAF confs */
1994 >  if (block_state.bind.buf[0])
1995 >  {
1996 >    memset(&hints, 0, sizeof(hints));
1997  
1998 <      DLINK_FOREACH_SAFE(ptr, next_ptr, leaf_conf_list.head)
1999 <      {
2000 <        struct ConfItem *new_leaf_conf;
2259 <        struct MatchItem *match_item;
1998 >    hints.ai_family   = AF_UNSPEC;
1999 >    hints.ai_socktype = SOCK_STREAM;
2000 >    hints.ai_flags    = AI_PASSIVE | AI_NUMERICHOST;
2001  
2002 <        yy_lconf = ptr->data;
2002 >    if (getaddrinfo(block_state.bind.buf, NULL, &hints, &res))
2003 >      ilog(LOG_TYPE_IRCD, "Invalid netmask for server vhost(%s)", block_state.bind.buf);
2004 >    else
2005 >    {
2006 >      assert(res != NULL);
2007  
2008 <        if ((yy_conf != NULL) && (yy_conf->name != NULL))
2009 <        {
2010 <          new_leaf_conf = make_conf_item(LEAF_TYPE);
2011 <          match_item = (struct MatchItem *)map_to_conf(new_leaf_conf);
2012 <          DupString(new_leaf_conf->name, yy_conf->name);
2268 <          if (yy_lconf->user != NULL)
2269 <            DupString(match_item->user, yy_lconf->user);
2270 <          else
2271 <            DupString(match_item->user, "*");
2272 <          if (yy_lconf->host != NULL)
2273 <            DupString(match_item->host, yy_lconf->host);
2274 <          else
2275 <            DupString(match_item->host, "*");
2276 <        }
2277 <        dlinkDelete(&yy_lconf->node, &leaf_conf_list);
2278 <        free_collect_item(yy_lconf);
2279 <      }
2280 <      MyFree(class_name);
2281 <      class_name = NULL;
2282 <      yy_conf = NULL;
2283 <      yy_aconf = NULL;
2008 >      memcpy(&conf->bind, res->ai_addr, res->ai_addrlen);
2009 >      conf->bind.ss.ss_family = res->ai_family;
2010 >      conf->bind.ss_len = res->ai_addrlen;
2011 >      freeaddrinfo(res);
2012 >    }
2013    }
2014 +
2015 +  conf_add_class_to_conf(conf, block_state.class.buf);
2016 +  lookup_confhost(conf);
2017   };
2018  
2287 connect_name_b: | connect_name_t;
2019   connect_items:  connect_items connect_item | connect_item;
2020   connect_item:   connect_name | connect_host | connect_vhost |
2021                  connect_send_password | connect_accept_password |
2022 <                connect_aftype | connect_port |
2022 >                connect_aftype | connect_port | connect_ssl_cipher_list |
2023                  connect_flags | connect_hub_mask | connect_leaf_mask |
2024 <                connect_class | connect_encrypted |
2294 <                connect_rsa_public_key_file | connect_cipher_preference |
2024 >                connect_class | connect_encrypted |
2025                  error ';' ;
2026  
2027   connect_name: NAME '=' QSTRING ';'
2028   {
2029    if (conf_parser_ctx.pass == 2)
2030 <  {
2301 <    if (yy_conf->name != NULL)
2302 <      yyerror("Multiple connect name entry");
2303 <
2304 <    MyFree(yy_conf->name);
2305 <    DupString(yy_conf->name, yylval.string);
2306 <  }
2307 < };
2308 <
2309 < connect_name_t: QSTRING
2310 < {
2311 <  if (conf_parser_ctx.pass == 2)
2312 <  {
2313 <    if (yy_conf->name != NULL)
2314 <      yyerror("Multiple connect name entry");
2315 <
2316 <    MyFree(yy_conf->name);
2317 <    DupString(yy_conf->name, yylval.string);
2318 <  }
2030 >    strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
2031   };
2032  
2033   connect_host: HOST '=' QSTRING ';'
2034   {
2035    if (conf_parser_ctx.pass == 2)
2036 <  {
2325 <    MyFree(yy_aconf->host);
2326 <    DupString(yy_aconf->host, yylval.string);
2327 <  }
2036 >    strlcpy(block_state.host.buf, yylval.string, sizeof(block_state.host.buf));
2037   };
2038  
2039   connect_vhost: VHOST '=' QSTRING ';'
2040   {
2041    if (conf_parser_ctx.pass == 2)
2042 <  {
2334 <    struct addrinfo hints, *res;
2335 <
2336 <    memset(&hints, 0, sizeof(hints));
2337 <
2338 <    hints.ai_family   = AF_UNSPEC;
2339 <    hints.ai_socktype = SOCK_STREAM;
2340 <    hints.ai_flags    = AI_PASSIVE | AI_NUMERICHOST;
2341 <
2342 <    if (getaddrinfo(yylval.string, NULL, &hints, &res))
2343 <      ilog(L_ERROR, "Invalid netmask for server vhost(%s)", yylval.string);
2344 <    else
2345 <    {
2346 <      assert(res != NULL);
2347 <
2348 <      memcpy(&yy_aconf->my_ipnum, res->ai_addr, res->ai_addrlen);
2349 <      yy_aconf->my_ipnum.ss.ss_family = res->ai_family;
2350 <      yy_aconf->my_ipnum.ss_len = res->ai_addrlen;
2351 <      freeaddrinfo(res);
2352 <    }
2353 <  }
2042 >    strlcpy(block_state.bind.buf, yylval.string, sizeof(block_state.bind.buf));
2043   };
2044  
2045   connect_send_password: SEND_PASSWORD '=' QSTRING ';'
2046   {
2047 <  if (conf_parser_ctx.pass == 2)
2048 <  {
2360 <    if ($3[0] == ':')
2361 <      yyerror("Server passwords cannot begin with a colon");
2362 <    else if (strchr($3, ' ') != NULL)
2363 <      yyerror("Server passwords cannot contain spaces");
2364 <    else {
2365 <      if (yy_aconf->spasswd != NULL)
2366 <        memset(yy_aconf->spasswd, 0, strlen(yy_aconf->spasswd));
2047 >  if (conf_parser_ctx.pass != 2)
2048 >    break;
2049  
2050 <      MyFree(yy_aconf->spasswd);
2051 <      DupString(yy_aconf->spasswd, yylval.string);
2052 <    }
2053 <  }
2050 >  if ($3[0] == ':')
2051 >    conf_error_report("Server passwords cannot begin with a colon");
2052 >  else if (strchr($3, ' ') != NULL)
2053 >    conf_error_report("Server passwords cannot contain spaces");
2054 >  else
2055 >    strlcpy(block_state.spass.buf, yylval.string, sizeof(block_state.spass.buf));
2056   };
2057  
2058   connect_accept_password: ACCEPT_PASSWORD '=' QSTRING ';'
2059   {
2060 <  if (conf_parser_ctx.pass == 2)
2061 <  {
2378 <    if ($3[0] == ':')
2379 <      yyerror("Server passwords cannot begin with a colon");
2380 <    else if (strchr($3, ' ') != NULL)
2381 <      yyerror("Server passwords cannot contain spaces");
2382 <    else {
2383 <      if (yy_aconf->passwd != NULL)
2384 <        memset(yy_aconf->passwd, 0, strlen(yy_aconf->passwd));
2060 >  if (conf_parser_ctx.pass != 2)
2061 >    break;
2062  
2063 <      MyFree(yy_aconf->passwd);
2064 <      DupString(yy_aconf->passwd, yylval.string);
2065 <    }
2066 <  }
2063 >  if ($3[0] == ':')
2064 >    conf_error_report("Server passwords cannot begin with a colon");
2065 >  else if (strchr($3, ' ') != NULL)
2066 >    conf_error_report("Server passwords cannot contain spaces");
2067 >  else
2068 >    strlcpy(block_state.rpass.buf, yylval.string, sizeof(block_state.rpass.buf));
2069   };
2070  
2071   connect_port: PORT '=' NUMBER ';'
2072   {
2073    if (conf_parser_ctx.pass == 2)
2074 <    yy_aconf->port = $3;
2074 >    block_state.port.value = $3;
2075   };
2076  
2077   connect_aftype: AFTYPE '=' T_IPV4 ';'
2078   {
2079    if (conf_parser_ctx.pass == 2)
2080 <    yy_aconf->aftype = AF_INET;
2080 >    block_state.aftype.value = AF_INET;
2081   } | AFTYPE '=' T_IPV6 ';'
2082   {
2083   #ifdef IPV6
2084    if (conf_parser_ctx.pass == 2)
2085 <    yy_aconf->aftype = AF_INET6;
2085 >    block_state.aftype.value = AF_INET6;
2086   #endif
2087   };
2088  
2089   connect_flags: IRCD_FLAGS
2090   {
2091 +  block_state.flags.value &= CONF_FLAGS_ENCRYPTED;
2092   } '='  connect_flags_items ';';
2093  
2094   connect_flags_items: connect_flags_items ',' connect_flags_item | connect_flags_item;
2095 < connect_flags_item: NOT  { not_atom = 1; } connect_flags_item_atom
2416 <                        |  { not_atom = 0; } connect_flags_item_atom;
2417 <
2418 < connect_flags_item_atom: COMPRESSED
2419 < {
2420 <  if (conf_parser_ctx.pass == 2)
2421 < #ifndef HAVE_LIBZ
2422 <    yyerror("Ignoring flags = compressed; -- no zlib support");
2423 < #else
2424 < {
2425 <   if (not_atom)ClearConfCompressed(yy_aconf);
2426 <   else SetConfCompressed(yy_aconf);
2427 < }
2428 < #endif
2429 < } | CRYPTLINK
2430 < {
2431 <  if (conf_parser_ctx.pass == 2)
2432 <  {
2433 <    if (not_atom)ClearConfCryptLink(yy_aconf);
2434 <    else SetConfCryptLink(yy_aconf);
2435 <  }
2436 < } | AUTOCONN
2437 < {
2438 <  if (conf_parser_ctx.pass == 2)
2439 <  {
2440 <    if (not_atom)ClearConfAllowAutoConn(yy_aconf);
2441 <    else SetConfAllowAutoConn(yy_aconf);
2442 <  }
2443 < } | BURST_AWAY
2095 > connect_flags_item: AUTOCONN
2096   {
2097    if (conf_parser_ctx.pass == 2)
2098 <  {
2099 <    if (not_atom)ClearConfAwayBurst(yy_aconf);
2448 <    else SetConfAwayBurst(yy_aconf);
2449 <  }
2450 < } | TOPICBURST
2098 >    block_state.flags.value |= CONF_FLAGS_ALLOW_AUTO_CONN;
2099 > } | T_SSL
2100   {
2101    if (conf_parser_ctx.pass == 2)
2102 <  {
2454 <    if (not_atom)ClearConfTopicBurst(yy_aconf);
2455 <    else SetConfTopicBurst(yy_aconf);
2456 <  }
2457 < }
2458 < ;
2459 <
2460 < connect_rsa_public_key_file: RSA_PUBLIC_KEY_FILE '=' QSTRING ';'
2461 < {
2462 < #ifdef HAVE_LIBCRYPTO
2463 <  if (conf_parser_ctx.pass == 2)
2464 <  {
2465 <    BIO *file;
2466 <
2467 <    if (yy_aconf->rsa_public_key != NULL)
2468 <    {
2469 <      RSA_free(yy_aconf->rsa_public_key);
2470 <      yy_aconf->rsa_public_key = NULL;
2471 <    }
2472 <
2473 <    if (yy_aconf->rsa_public_key_file != NULL)
2474 <    {
2475 <      MyFree(yy_aconf->rsa_public_key_file);
2476 <      yy_aconf->rsa_public_key_file = NULL;
2477 <    }
2478 <
2479 <    DupString(yy_aconf->rsa_public_key_file, yylval.string);
2480 <
2481 <    if ((file = BIO_new_file(yylval.string, "r")) == NULL)
2482 <    {
2483 <      yyerror("Ignoring rsa_public_key_file -- file doesn't exist");
2484 <      break;
2485 <    }
2486 <
2487 <    yy_aconf->rsa_public_key = (RSA *)PEM_read_bio_RSA_PUBKEY(file, NULL, 0, NULL);
2488 <
2489 <    if (yy_aconf->rsa_public_key == NULL)
2490 <    {
2491 <      yyerror("Ignoring rsa_public_key_file -- Key invalid; check key syntax.");
2492 <      break;
2493 <    }
2494 <      
2495 <    BIO_set_close(file, BIO_CLOSE);
2496 <    BIO_free(file);
2497 <  }
2498 < #endif /* HAVE_LIBCRYPTO */
2102 >    block_state.flags.value |= CONF_FLAGS_SSL;
2103   };
2104  
2105   connect_encrypted: ENCRYPTED '=' TBOOL ';'
# Line 2503 | Line 2107 | connect_encrypted: ENCRYPTED '=' TBOOL '
2107    if (conf_parser_ctx.pass == 2)
2108    {
2109      if (yylval.number)
2110 <      yy_aconf->flags |= CONF_FLAGS_ENCRYPTED;
2110 >      block_state.flags.value |= CONF_FLAGS_ENCRYPTED;
2111      else
2112 <      yy_aconf->flags &= ~CONF_FLAGS_ENCRYPTED;
2112 >      block_state.flags.value &= ~CONF_FLAGS_ENCRYPTED;
2113    }
2114   };
2115  
2116   connect_hub_mask: HUB_MASK '=' QSTRING ';'
2117   {
2118    if (conf_parser_ctx.pass == 2)
2119 <  {
2516 <    struct CollectItem *yy_tmp;
2517 <
2518 <    yy_tmp = (struct CollectItem *)MyMalloc(sizeof(struct CollectItem));
2519 <    DupString(yy_tmp->host, yylval.string);
2520 <    DupString(yy_tmp->user, "*");
2521 <    dlinkAdd(yy_tmp, &yy_tmp->node, &hub_conf_list);
2522 <  }
2119 >    dlinkAdd(xstrdup(yylval.string), make_dlink_node(), &block_state.hub.list);
2120   };
2121  
2122   connect_leaf_mask: LEAF_MASK '=' QSTRING ';'
2123   {
2124    if (conf_parser_ctx.pass == 2)
2125 <  {
2529 <    struct CollectItem *yy_tmp;
2530 <
2531 <    yy_tmp = (struct CollectItem *)MyMalloc(sizeof(struct CollectItem));
2532 <    DupString(yy_tmp->host, yylval.string);
2533 <    DupString(yy_tmp->user, "*");
2534 <    dlinkAdd(yy_tmp, &yy_tmp->node, &leaf_conf_list);
2535 <  }
2125 >    dlinkAdd(xstrdup(yylval.string), make_dlink_node(), &block_state.leaf.list);
2126   };
2127  
2128   connect_class: CLASS '=' QSTRING ';'
2129   {
2130    if (conf_parser_ctx.pass == 2)
2131 <  {
2542 <    MyFree(class_name);
2543 <    DupString(class_name, yylval.string);
2544 <  }
2131 >    strlcpy(block_state.class.buf, yylval.string, sizeof(block_state.class.buf));
2132   };
2133  
2134 < connect_cipher_preference: CIPHER_PREFERENCE '=' QSTRING ';'
2134 > connect_ssl_cipher_list: T_SSL_CIPHER_LIST '=' QSTRING ';'
2135   {
2136   #ifdef HAVE_LIBCRYPTO
2137    if (conf_parser_ctx.pass == 2)
2138 <  {
2552 <    struct EncCapability *ecap;
2553 <    const char *cipher_name;
2554 <    int found = 0;
2555 <
2556 <    yy_aconf->cipher_preference = NULL;
2557 <    cipher_name = yylval.string;
2558 <
2559 <    for (ecap = CipherTable; ecap->name; ecap++)
2560 <    {
2561 <      if ((irccmp(ecap->name, cipher_name) == 0) &&
2562 <          (ecap->cap & CAP_ENC_MASK))
2563 <      {
2564 <        yy_aconf->cipher_preference = ecap;
2565 <        found = 1;
2566 <        break;
2567 <      }
2568 <    }
2569 <
2570 <    if (!found)
2571 <      yyerror("Invalid cipher");
2572 <  }
2138 >    strlcpy(block_state.ciph.buf, yylval.string, sizeof(block_state.ciph.buf));
2139   #else
2140    if (conf_parser_ctx.pass == 2)
2141 <    yyerror("Ignoring cipher_preference -- no OpenSSL support");
2141 >    conf_error_report("Ignoring connect::ciphers -- no OpenSSL support");
2142   #endif
2143   };
2144  
2145 +
2146   /***************************************************************************
2147   *  section kill
2148   ***************************************************************************/
2149   kill_entry: KILL
2150   {
2151    if (conf_parser_ctx.pass == 2)
2152 <  {
2586 <    userbuf[0] = hostbuf[0] = reasonbuf[0] = '\0';
2587 <    regex_ban = 0;
2588 <  }
2152 >    reset_block_state();
2153   } '{' kill_items '}' ';'
2154   {
2155 <  if (conf_parser_ctx.pass == 2)
2155 >  struct MaskItem *conf = NULL;
2156 >
2157 >  if (conf_parser_ctx.pass != 2)
2158 >    break;
2159 >
2160 >  if (!block_state.user.buf[0] ||
2161 >      !block_state.host.buf[0])
2162 >    break;
2163 >
2164 >
2165 >  if (block_state.port.value == 1)
2166    {
2593    if (userbuf[0] && hostbuf[0])
2594    {
2595      if (regex_ban)
2596      {
2167   #ifdef HAVE_LIBPCRE
2168 <        void *exp_user = NULL;
2169 <        void *exp_host = NULL;
2170 <        const char *errptr = NULL;
2171 <
2172 <        if (!(exp_user = ircd_pcre_compile(userbuf, &errptr)) ||
2173 <            !(exp_host = ircd_pcre_compile(hostbuf, &errptr)))
2174 <        {
2175 <          ilog(L_ERROR, "Failed to add regular expression based K-Line: %s",
2176 <               errptr);
2177 <          break;
2178 <        }
2609 <
2610 <        yy_aconf = map_to_conf(make_conf_item(RKLINE_TYPE));
2611 <        yy_aconf->regexuser = exp_user;
2612 <        yy_aconf->regexhost = exp_host;
2168 >    void *exp_user = NULL;
2169 >    void *exp_host = NULL;
2170 >    const char *errptr = NULL;
2171 >
2172 >    if (!(exp_user = ircd_pcre_compile(block_state.user.buf, &errptr)) ||
2173 >        !(exp_host = ircd_pcre_compile(block_state.host.buf, &errptr)))
2174 >    {
2175 >      ilog(LOG_TYPE_IRCD, "Failed to add regular expression based K-Line: %s",
2176 >           errptr);
2177 >      break;
2178 >    }
2179  
2180 <        DupString(yy_aconf->user, userbuf);
2181 <        DupString(yy_aconf->host, hostbuf);
2180 >    conf = conf_make(CONF_RKLINE);
2181 >    conf->regexuser = exp_user;
2182 >    conf->regexhost = exp_host;
2183  
2184 <        if (reasonbuf[0])
2185 <          DupString(yy_aconf->reason, reasonbuf);
2186 <        else
2187 <          DupString(yy_aconf->reason, "No reason");
2184 >    conf->user = xstrdup(block_state.user.buf);
2185 >    conf->host = xstrdup(block_state.host.buf);
2186 >
2187 >    if (block_state.rpass.buf[0])
2188 >      conf->reason = xstrdup(block_state.rpass.buf);
2189 >    else
2190 >      conf->reason = xstrdup(CONF_NOREASON);
2191   #else
2192 <        ilog(L_ERROR, "Failed to add regular expression based K-Line: no PCRE support");
2193 <        break;
2192 >    ilog(LOG_TYPE_IRCD, "Failed to add regular expression based K-Line: no PCRE support");
2193 >    break;
2194   #endif
2195 <      }
2196 <      else
2197 <      {
2198 <        yy_aconf = map_to_conf(make_conf_item(KLINE_TYPE));
2629 <
2630 <        DupString(yy_aconf->user, userbuf);
2631 <        DupString(yy_aconf->host, hostbuf);
2195 >  }
2196 >  else
2197 >  {
2198 >    conf = conf_make(CONF_KLINE);
2199  
2200 <        if (reasonbuf[0])
2201 <          DupString(yy_aconf->reason, reasonbuf);
2635 <        else
2636 <          DupString(yy_aconf->reason, "No reason");
2637 <        add_conf_by_address(CONF_KILL, yy_aconf);
2638 <      }
2639 <    }
2200 >    conf->user = xstrdup(block_state.user.buf);
2201 >    conf->host = xstrdup(block_state.host.buf);
2202  
2203 <    yy_aconf = NULL;
2203 >    if (block_state.rpass.buf[0])
2204 >      conf->reason = xstrdup(block_state.rpass.buf);
2205 >    else
2206 >      conf->reason = xstrdup(CONF_NOREASON);
2207 >    add_conf_by_address(CONF_KLINE, conf);
2208    }
2209   };
2210  
2211   kill_type: TYPE
2212   {
2213 +  if (conf_parser_ctx.pass == 2)
2214 +    block_state.port.value = 0;
2215   } '='  kill_type_items ';';
2216  
2217   kill_type_items: kill_type_items ',' kill_type_item | kill_type_item;
2218   kill_type_item: REGEX_T
2219   {
2220    if (conf_parser_ctx.pass == 2)
2221 <    regex_ban = 1;
2221 >    block_state.port.value = 1;
2222   };
2223  
2224   kill_items:     kill_items kill_item | kill_item;
# Line 2658 | Line 2226 | kill_item:      kill_user | kill_reason
2226  
2227   kill_user: USER '=' QSTRING ';'
2228   {
2229 +
2230    if (conf_parser_ctx.pass == 2)
2231    {
2232      struct split_nuh_item nuh;
2233  
2234      nuh.nuhmask  = yylval.string;
2235      nuh.nickptr  = NULL;
2236 <    nuh.userptr  = userbuf;
2237 <    nuh.hostptr  = hostbuf;
2236 >    nuh.userptr  = block_state.user.buf;
2237 >    nuh.hostptr  = block_state.host.buf;
2238  
2239      nuh.nicksize = 0;
2240 <    nuh.usersize = sizeof(userbuf);
2241 <    nuh.hostsize = sizeof(hostbuf);
2240 >    nuh.usersize = sizeof(block_state.user.buf);
2241 >    nuh.hostsize = sizeof(block_state.host.buf);
2242  
2243      split_nuh(&nuh);
2244    }
# Line 2678 | Line 2247 | kill_user: USER '=' QSTRING ';'
2247   kill_reason: REASON '=' QSTRING ';'
2248   {
2249    if (conf_parser_ctx.pass == 2)
2250 <    strlcpy(reasonbuf, yylval.string, sizeof(reasonbuf));
2250 >    strlcpy(block_state.rpass.buf, yylval.string, sizeof(block_state.rpass.buf));
2251   };
2252  
2253   /***************************************************************************
# Line 2687 | Line 2256 | kill_reason: REASON '=' QSTRING ';'
2256   deny_entry: DENY
2257   {
2258    if (conf_parser_ctx.pass == 2)
2259 <    hostbuf[0] = reasonbuf[0] = '\0';
2259 >    reset_block_state();
2260   } '{' deny_items '}' ';'
2261   {
2262 <  if (conf_parser_ctx.pass == 2)
2262 >  struct MaskItem *conf = NULL;
2263 >
2264 >  if (conf_parser_ctx.pass != 2)
2265 >    break;
2266 >
2267 >  if (!block_state.addr.buf[0])
2268 >    break;
2269 >
2270 >  if (parse_netmask(block_state.addr.buf, NULL, NULL) != HM_HOST)
2271    {
2272 <    if (hostbuf[0] && parse_netmask(hostbuf, NULL, NULL) != HM_HOST)
2273 <    {
2697 <      yy_aconf = map_to_conf(make_conf_item(DLINE_TYPE));
2698 <      DupString(yy_aconf->host, hostbuf);
2272 >    conf = conf_make(CONF_DLINE);
2273 >    conf->host = xstrdup(block_state.addr.buf);
2274  
2275 <      if (reasonbuf[0])
2276 <        DupString(yy_aconf->reason, reasonbuf);
2277 <      else
2278 <        DupString(yy_aconf->reason, "No reason");
2279 <      add_conf_by_address(CONF_DLINE, yy_aconf);
2705 <      yy_aconf = NULL;
2706 <    }
2275 >    if (block_state.rpass.buf[0])
2276 >      conf->reason = xstrdup(block_state.rpass.buf);
2277 >    else
2278 >      conf->reason = xstrdup(CONF_NOREASON);
2279 >    add_conf_by_address(CONF_DLINE, conf);
2280    }
2281   };
2282  
# Line 2713 | Line 2286 | deny_item:      deny_ip | deny_reason |
2286   deny_ip: IP '=' QSTRING ';'
2287   {
2288    if (conf_parser_ctx.pass == 2)
2289 <    strlcpy(hostbuf, yylval.string, sizeof(hostbuf));
2289 >    strlcpy(block_state.addr.buf, yylval.string, sizeof(block_state.addr.buf));
2290   };
2291  
2292   deny_reason: REASON '=' QSTRING ';'
2293   {
2294    if (conf_parser_ctx.pass == 2)
2295 <    strlcpy(reasonbuf, yylval.string, sizeof(reasonbuf));
2295 >    strlcpy(block_state.rpass.buf, yylval.string, sizeof(block_state.rpass.buf));
2296   };
2297  
2298   /***************************************************************************
# Line 2736 | Line 2309 | exempt_ip: IP '=' QSTRING ';'
2309    {
2310      if (yylval.string[0] && parse_netmask(yylval.string, NULL, NULL) != HM_HOST)
2311      {
2312 <      yy_aconf = map_to_conf(make_conf_item(EXEMPTDLINE_TYPE));
2313 <      DupString(yy_aconf->host, yylval.string);
2312 >      struct MaskItem *conf = conf_make(CONF_EXEMPT);
2313 >      conf->host = xstrdup(yylval.string);
2314  
2315 <      add_conf_by_address(CONF_EXEMPTDLINE, yy_aconf);
2743 <      yy_aconf = NULL;
2315 >      add_conf_by_address(CONF_EXEMPT, conf);
2316      }
2317    }
2318   };
# Line 2751 | Line 2323 | exempt_ip: IP '=' QSTRING ';'
2323   gecos_entry: GECOS
2324   {
2325    if (conf_parser_ctx.pass == 2)
2326 <  {
2755 <    regex_ban = 0;
2756 <    reasonbuf[0] = gecos_name[0] = '\0';
2757 <  }
2326 >    reset_block_state();
2327   } '{' gecos_items '}' ';'
2328   {
2329 <  if (conf_parser_ctx.pass == 2)
2329 >  struct MaskItem *conf = NULL;
2330 >
2331 >  if (conf_parser_ctx.pass != 2)
2332 >    break;
2333 >
2334 >  if (!block_state.name.buf[0])
2335 >    break;
2336 >
2337 >  if (block_state.port.value == 1)
2338    {
2762    if (gecos_name[0])
2763    {
2764      if (regex_ban)
2765      {
2339   #ifdef HAVE_LIBPCRE
2340 <        void *exp_p = NULL;
2341 <        const char *errptr = NULL;
2340 >    void *exp_p = NULL;
2341 >    const char *errptr = NULL;
2342  
2343 <        if (!(exp_p = ircd_pcre_compile(gecos_name, &errptr)))
2344 <        {
2345 <          ilog(L_ERROR, "Failed to add regular expression based X-Line: %s",
2346 <               errptr);
2347 <          break;
2348 <        }
2343 >    if (!(exp_p = ircd_pcre_compile(block_state.name.buf, &errptr)))
2344 >    {
2345 >      ilog(LOG_TYPE_IRCD, "Failed to add regular expression based X-Line: %s",
2346 >           errptr);
2347 >      break;
2348 >    }
2349  
2350 <        yy_conf = make_conf_item(RXLINE_TYPE);
2351 <        yy_conf->regexpname = exp_p;
2350 >    conf = conf_make(CONF_RXLINE);
2351 >    conf->regexuser = exp_p;
2352   #else
2353 <        ilog(L_ERROR, "Failed to add regular expression based X-Line: no PCRE support");
2354 <        break;
2353 >    conf_error_report("Failed to add regular expression based X-Line: no PCRE support");
2354 >    break;
2355   #endif
2356 <      }
2357 <      else
2358 <        yy_conf = make_conf_item(XLINE_TYPE);
2356 >  }
2357 >  else
2358 >    conf = conf_make(CONF_XLINE);
2359  
2360 <      yy_match_item = map_to_conf(yy_conf);
2788 <      DupString(yy_conf->name, gecos_name);
2360 >  conf->name = xstrdup(block_state.name.buf);
2361  
2362 <      if (reasonbuf[0])
2363 <        DupString(yy_match_item->reason, reasonbuf);
2364 <      else
2365 <        DupString(yy_match_item->reason, "No reason");
2794 <    }
2795 <  }
2362 >  if (block_state.rpass.buf[0])
2363 >    conf->reason = xstrdup(block_state.rpass.buf);
2364 >  else
2365 >    conf->reason = xstrdup(CONF_NOREASON);
2366   };
2367  
2368   gecos_flags: TYPE
2369   {
2370 +  if (conf_parser_ctx.pass == 2)
2371 +    block_state.port.value = 0;
2372   } '='  gecos_flags_items ';';
2373  
2374   gecos_flags_items: gecos_flags_items ',' gecos_flags_item | gecos_flags_item;
2375   gecos_flags_item: REGEX_T
2376   {
2377    if (conf_parser_ctx.pass == 2)
2378 <    regex_ban = 1;
2378 >    block_state.port.value = 1;
2379   };
2380  
2381   gecos_items: gecos_items gecos_item | gecos_item;
# Line 2812 | Line 2384 | gecos_item:  gecos_name | gecos_reason |
2384   gecos_name: NAME '=' QSTRING ';'
2385   {
2386    if (conf_parser_ctx.pass == 2)
2387 <    strlcpy(gecos_name, yylval.string, sizeof(gecos_name));
2387 >    strlcpy(block_state.name.buf, yylval.string, sizeof(block_state.name.buf));
2388   };
2389  
2390   gecos_reason: REASON '=' QSTRING ';'
2391   {
2392    if (conf_parser_ctx.pass == 2)
2393 <    strlcpy(reasonbuf, yylval.string, sizeof(reasonbuf));
2393 >    strlcpy(block_state.rpass.buf, yylval.string, sizeof(block_state.rpass.buf));
2394   };
2395  
2396   /***************************************************************************
# Line 2833 | Line 2405 | general_item:       general_hide_spoof_i
2405                      general_max_nick_time | general_max_nick_changes |
2406                      general_max_accept | general_anti_spam_exit_message_time |
2407                      general_ts_warn_delta | general_ts_max_delta |
2408 <                    general_kill_chase_time_limit | general_kline_with_reason |
2409 <                    general_kline_reason | general_invisible_on_connect |
2408 >                    general_kill_chase_time_limit |
2409 >                    general_invisible_on_connect |
2410                      general_warn_no_nline | general_dots_in_ident |
2411                      general_stats_o_oper_only | general_stats_k_oper_only |
2412                      general_pace_wait | general_stats_i_oper_only |
2413                      general_pace_wait_simple | general_stats_P_oper_only |
2414                      general_short_motd | general_no_oper_flood |
2415                      general_true_no_oper_flood | general_oper_pass_resv |
2844                    general_idletime | general_message_locale |
2416                      general_oper_only_umodes | general_max_targets |
2417                      general_use_egd | general_egdpool_path |
2418                      general_oper_umodes | general_caller_id_wait |
2419                      general_opers_bypass_callerid | general_default_floodcount |
2420                      general_min_nonwildcard | general_min_nonwildcard_simple |
2421 <                    general_servlink_path | general_disable_remote_commands |
2851 <                    general_default_cipher_preference |
2852 <                    general_compression_level | general_client_flood |
2421 >                    general_disable_remote_commands |
2422                      general_throttle_time | general_havent_read_conf |
2423                      general_ping_cookie |
2424 <                    general_disable_auth | general_burst_away |
2425 <                    general_tkline_expire_notices | general_gline_min_cidr |
2426 <                    general_gline_min_cidr6 | general_use_whois_actually |
2427 <                    general_reject_hold_time | general_stats_e_disabled |
2428 <                    general_max_watch |
2424 >                    general_disable_auth |
2425 >                    general_tkline_expire_notices | general_gline_enable |
2426 >                    general_gline_duration | general_gline_request_duration |
2427 >                    general_gline_min_cidr |
2428 >                    general_gline_min_cidr6 |
2429 >                    general_stats_e_disabled |
2430 >                    general_max_watch | general_services_name |
2431                      error;
2432  
2433  
# Line 2865 | Line 2436 | general_max_watch: MAX_WATCH '=' NUMBER
2436    ConfigFileEntry.max_watch = $3;
2437   };
2438  
2439 < general_gline_min_cidr: GLINE_MIN_CIDR '=' NUMBER ';'
2439 > general_gline_enable: GLINE_ENABLE '=' TBOOL ';'
2440   {
2441 <  ConfigFileEntry.gline_min_cidr = $3;
2441 >  if (conf_parser_ctx.pass == 2)
2442 >    ConfigFileEntry.glines = yylval.number;
2443   };
2444  
2445 < general_gline_min_cidr6: GLINE_MIN_CIDR6 '=' NUMBER ';'
2445 > general_gline_duration: GLINE_DURATION '=' timespec ';'
2446   {
2447 <  ConfigFileEntry.gline_min_cidr6 = $3;
2447 >  if (conf_parser_ctx.pass == 2)
2448 >    ConfigFileEntry.gline_time = $3;
2449   };
2450  
2451 < general_burst_away: BURST_AWAY '=' TBOOL ';'
2451 > general_gline_request_duration: GLINE_REQUEST_DURATION '=' timespec ';'
2452   {
2453 <  ConfigFileEntry.burst_away = yylval.number;
2453 >  if (conf_parser_ctx.pass == 2)
2454 >    ConfigFileEntry.gline_request_time = $3;
2455   };
2456  
2457 < general_use_whois_actually: USE_WHOIS_ACTUALLY '=' TBOOL ';'
2457 > general_gline_min_cidr: GLINE_MIN_CIDR '=' NUMBER ';'
2458   {
2459 <  ConfigFileEntry.use_whois_actually = yylval.number;
2459 >  ConfigFileEntry.gline_min_cidr = $3;
2460   };
2461  
2462 < general_reject_hold_time: TREJECT_HOLD_TIME '=' timespec ';'
2462 > general_gline_min_cidr6: GLINE_MIN_CIDR6 '=' NUMBER ';'
2463   {
2464 <  GlobalSetOptions.rejecttime = yylval.number;
2464 >  ConfigFileEntry.gline_min_cidr6 = $3;
2465   };
2466  
2467   general_tkline_expire_notices: TKLINE_EXPIRE_NOTICES '=' TBOOL ';'
# Line 2960 | Line 2534 | general_havent_read_conf: HAVENT_READ_CO
2534   {
2535    if (($3 > 0) && conf_parser_ctx.pass == 1)
2536    {
2537 <    ilog(L_CRIT, "You haven't read your config file properly.");
2538 <    ilog(L_CRIT, "There is a line in the example conf that will kill your server if not removed.");
2539 <    ilog(L_CRIT, "Consider actually reading/editing the conf file, and removing this line.");
2537 >    ilog(LOG_TYPE_IRCD, "You haven't read your config file properly.");
2538 >    ilog(LOG_TYPE_IRCD, "There is a line in the example conf that will kill your server if not removed.");
2539 >    ilog(LOG_TYPE_IRCD, "Consider actually reading/editing the conf file, and removing this line.");
2540      exit(0);
2541    }
2542   };
2543  
2970 general_kline_with_reason: KLINE_WITH_REASON '=' TBOOL ';'
2971 {
2972  ConfigFileEntry.kline_with_reason = yylval.number;
2973 };
2974
2975 general_kline_reason: KLINE_REASON '=' QSTRING ';'
2976 {
2977  if (conf_parser_ctx.pass == 2)
2978  {
2979    MyFree(ConfigFileEntry.kline_reason);
2980    DupString(ConfigFileEntry.kline_reason, yylval.string);
2981  }
2982 };
2983
2544   general_invisible_on_connect: INVISIBLE_ON_CONNECT '=' TBOOL ';'
2545   {
2546    ConfigFileEntry.invisible_on_connect = yylval.number;
# Line 3062 | Line 2622 | general_oper_pass_resv: OPER_PASS_RESV '
2622    ConfigFileEntry.oper_pass_resv = yylval.number;
2623   };
2624  
3065 general_message_locale: MESSAGE_LOCALE '=' QSTRING ';'
3066 {
3067  if (conf_parser_ctx.pass == 2)
3068  {
3069    if (strlen(yylval.string) > LOCALE_LENGTH-2)
3070      yylval.string[LOCALE_LENGTH-1] = '\0';
3071
3072    set_locale(yylval.string);
3073  }
3074 };
3075
3076 general_idletime: IDLETIME '=' timespec ';'
3077 {
3078  ConfigFileEntry.idletime = $3;
3079 };
3080
2625   general_dots_in_ident: DOTS_IN_IDENT '=' NUMBER ';'
2626   {
2627    ConfigFileEntry.dots_in_ident = $3;
# Line 3088 | Line 2632 | general_max_targets: MAX_TARGETS '=' NUM
2632    ConfigFileEntry.max_targets = $3;
2633   };
2634  
2635 < general_servlink_path: SERVLINK_PATH '=' QSTRING ';'
3092 < {
3093 <  if (conf_parser_ctx.pass == 2)
3094 <  {
3095 <    MyFree(ConfigFileEntry.servlink_path);
3096 <    DupString(ConfigFileEntry.servlink_path, yylval.string);
3097 <  }
3098 < };
3099 <
3100 < general_default_cipher_preference: DEFAULT_CIPHER_PREFERENCE '=' QSTRING ';'
2635 > general_use_egd: USE_EGD '=' TBOOL ';'
2636   {
2637 < #ifdef HAVE_LIBCRYPTO
3103 <  if (conf_parser_ctx.pass == 2)
3104 <  {
3105 <    struct EncCapability *ecap;
3106 <    const char *cipher_name;
3107 <    int found = 0;
3108 <
3109 <    ConfigFileEntry.default_cipher_preference = NULL;
3110 <    cipher_name = yylval.string;
3111 <
3112 <    for (ecap = CipherTable; ecap->name; ecap++)
3113 <    {
3114 <      if ((irccmp(ecap->name, cipher_name) == 0) &&
3115 <          (ecap->cap & CAP_ENC_MASK))
3116 <      {
3117 <        ConfigFileEntry.default_cipher_preference = ecap;
3118 <        found = 1;
3119 <        break;
3120 <      }
3121 <    }
3122 <
3123 <    if (!found)
3124 <      yyerror("Invalid cipher");
3125 <  }
3126 < #else
3127 <  if (conf_parser_ctx.pass == 2)
3128 <    yyerror("Ignoring default_cipher_preference -- no OpenSSL support");
3129 < #endif
2637 >  ConfigFileEntry.use_egd = yylval.number;
2638   };
2639  
2640 < general_compression_level: COMPRESSION_LEVEL '=' NUMBER ';'
2640 > general_egdpool_path: EGDPOOL_PATH '=' QSTRING ';'
2641   {
2642    if (conf_parser_ctx.pass == 2)
2643    {
2644 <    ConfigFileEntry.compression_level = $3;
2645 < #ifndef HAVE_LIBZ
3138 <    yyerror("Ignoring compression_level -- no zlib support");
3139 < #else
3140 <    if ((ConfigFileEntry.compression_level < 1) ||
3141 <        (ConfigFileEntry.compression_level > 9))
3142 <    {
3143 <      yyerror("Ignoring invalid compression_level, using default");
3144 <      ConfigFileEntry.compression_level = 0;
3145 <    }
3146 < #endif
2644 >    MyFree(ConfigFileEntry.egdpool_path);
2645 >    ConfigFileEntry.egdpool_path = xstrdup(yylval.string);
2646    }
2647   };
2648  
2649 < general_use_egd: USE_EGD '=' TBOOL ';'
3151 < {
3152 <  ConfigFileEntry.use_egd = yylval.number;
3153 < };
3154 <
3155 < general_egdpool_path: EGDPOOL_PATH '=' QSTRING ';'
2649 > general_services_name: T_SERVICES_NAME '=' QSTRING ';'
2650   {
2651 <  if (conf_parser_ctx.pass == 2)
2651 >  if (conf_parser_ctx.pass == 2 && valid_servname(yylval.string))
2652    {
2653 <    MyFree(ConfigFileEntry.egdpool_path);
2654 <    DupString(ConfigFileEntry.egdpool_path, yylval.string);
2653 >    MyFree(ConfigFileEntry.service_name);
2654 >    ConfigFileEntry.service_name = xstrdup(yylval.string);
2655    }
2656   };
2657  
# Line 3200 | Line 2694 | umode_oitem:     T_BOTS
2694   } | T_FULL
2695   {
2696    ConfigFileEntry.oper_umodes |= UMODE_FULL;
2697 + } | HIDDEN
2698 + {
2699 +  ConfigFileEntry.oper_umodes |= UMODE_HIDDEN;
2700   } | T_SKILL
2701   {
2702    ConfigFileEntry.oper_umodes |= UMODE_SKILL;
# Line 3268 | Line 2765 | umode_item:    T_BOTS
2765   } | T_SKILL
2766   {
2767    ConfigFileEntry.oper_only_umodes |= UMODE_SKILL;
2768 + } | HIDDEN
2769 + {
2770 +  ConfigFileEntry.oper_only_umodes |= UMODE_HIDDEN;
2771   } | T_NCHANGE
2772   {
2773    ConfigFileEntry.oper_only_umodes |= UMODE_NCHANGE;
# Line 3304 | Line 2804 | umode_item:    T_BOTS
2804   } | T_LOCOPS
2805   {
2806    ConfigFileEntry.oper_only_umodes |= UMODE_LOCOPS;
2807 + } | T_NONONREG
2808 + {
2809 +  ConfigFileEntry.oper_only_umodes |= UMODE_REGONLY;
2810   };
2811  
2812   general_min_nonwildcard: MIN_NONWILDCARD '=' NUMBER ';'
# Line 3321 | Line 2824 | general_default_floodcount: DEFAULT_FLOO
2824    ConfigFileEntry.default_floodcount = $3;
2825   };
2826  
3324 general_client_flood: T_CLIENT_FLOOD '=' sizespec ';'
3325 {
3326  ConfigFileEntry.client_flood = $3;
3327 };
3328
3329
3330 /***************************************************************************
3331 *  section glines
3332 ***************************************************************************/
3333 gline_entry: GLINES
3334 {
3335  if (conf_parser_ctx.pass == 2)
3336  {
3337    yy_conf = make_conf_item(GDENY_TYPE);
3338    yy_aconf = map_to_conf(yy_conf);
3339  }
3340 } '{' gline_items '}' ';'
3341 {
3342  if (conf_parser_ctx.pass == 2)
3343  {
3344    /*
3345     * since we re-allocate yy_conf/yy_aconf after the end of action=, at the
3346     * end we will have one extra, so we should free it.
3347     */
3348    if (yy_conf->name == NULL || yy_aconf->user == NULL)
3349    {
3350      delete_conf_item(yy_conf);
3351      yy_conf = NULL;
3352      yy_aconf = NULL;
3353    }
3354  }
3355 };
3356
3357 gline_items:        gline_items gline_item | gline_item;
3358 gline_item:         gline_enable |
3359                    gline_duration |
3360                    gline_logging |
3361                    gline_user |
3362                    gline_server |
3363                    gline_action |
3364                    error;
3365
3366 gline_enable: ENABLE '=' TBOOL ';'
3367 {
3368  if (conf_parser_ctx.pass == 2)
3369    ConfigFileEntry.glines = yylval.number;
3370 };
3371
3372 gline_duration: DURATION '=' timespec ';'
3373 {
3374  if (conf_parser_ctx.pass == 2)
3375    ConfigFileEntry.gline_time = $3;
3376 };
3377
3378 gline_logging: LOGGING
3379 {
3380  if (conf_parser_ctx.pass == 2)
3381    ConfigFileEntry.gline_logging = 0;
3382 } '=' gline_logging_types ';';
3383 gline_logging_types:     gline_logging_types ',' gline_logging_type_item | gline_logging_type_item;
3384 gline_logging_type_item: T_REJECT
3385 {
3386  if (conf_parser_ctx.pass == 2)
3387    ConfigFileEntry.gline_logging |= GDENY_REJECT;
3388 } | T_BLOCK
3389 {
3390  if (conf_parser_ctx.pass == 2)
3391    ConfigFileEntry.gline_logging |= GDENY_BLOCK;
3392 };
3393
3394 gline_user: USER '=' QSTRING ';'
3395 {
3396  if (conf_parser_ctx.pass == 2)
3397  {
3398    struct split_nuh_item nuh;
3399
3400    nuh.nuhmask  = yylval.string;
3401    nuh.nickptr  = NULL;
3402    nuh.userptr  = userbuf;
3403    nuh.hostptr  = hostbuf;
3404
3405    nuh.nicksize = 0;
3406    nuh.usersize = sizeof(userbuf);
3407    nuh.hostsize = sizeof(hostbuf);
3408
3409    split_nuh(&nuh);
3410
3411    if (yy_aconf->user == NULL)
3412    {
3413      DupString(yy_aconf->user, userbuf);
3414      DupString(yy_aconf->host, hostbuf);
3415    }
3416    else
3417    {
3418      struct CollectItem *yy_tmp = MyMalloc(sizeof(struct CollectItem));
3419
3420      DupString(yy_tmp->user, userbuf);
3421      DupString(yy_tmp->host, hostbuf);
3422
3423      dlinkAdd(yy_tmp, &yy_tmp->node, &col_conf_list);
3424    }
3425  }
3426 };
3427
3428 gline_server: NAME '=' QSTRING ';'
3429 {
3430  if (conf_parser_ctx.pass == 2)  
3431  {
3432    MyFree(yy_conf->name);
3433    DupString(yy_conf->name, yylval.string);
3434  }
3435 };
3436
3437 gline_action: ACTION
3438 {
3439  if (conf_parser_ctx.pass == 2)
3440    yy_aconf->flags = 0;
3441 } '=' gdeny_types ';'
3442 {
3443  if (conf_parser_ctx.pass == 2)
3444  {
3445    struct CollectItem *yy_tmp = NULL;
3446    dlink_node *ptr, *next_ptr;
3447
3448    DLINK_FOREACH_SAFE(ptr, next_ptr, col_conf_list.head)
3449    {
3450      struct AccessItem *new_aconf;
3451      struct ConfItem *new_conf;
3452
3453      yy_tmp = ptr->data;
3454      new_conf = make_conf_item(GDENY_TYPE);
3455      new_aconf = map_to_conf(new_conf);
3456
3457      new_aconf->flags = yy_aconf->flags;
3458
3459      if (yy_conf->name != NULL)
3460        DupString(new_conf->name, yy_conf->name);
3461      else
3462        DupString(new_conf->name, "*");
3463      if (yy_aconf->user != NULL)
3464         DupString(new_aconf->user, yy_tmp->user);
3465      else  
3466        DupString(new_aconf->user, "*");
3467      if (yy_aconf->host != NULL)
3468        DupString(new_aconf->host, yy_tmp->host);
3469      else
3470        DupString(new_aconf->host, "*");
3471
3472      dlinkDelete(&yy_tmp->node, &col_conf_list);
3473    }
3474
3475    /*
3476     * In case someone has fed us with more than one action= after user/name
3477     * which would leak memory  -Michael
3478     */
3479    if (yy_conf->name == NULL || yy_aconf->user == NULL)
3480      delete_conf_item(yy_conf);
3481
3482    yy_conf = make_conf_item(GDENY_TYPE);
3483    yy_aconf = map_to_conf(yy_conf);
3484  }
3485 };
3486
3487 gdeny_types: gdeny_types ',' gdeny_type_item | gdeny_type_item;
3488 gdeny_type_item: T_REJECT
3489 {
3490  if (conf_parser_ctx.pass == 2)
3491    yy_aconf->flags |= GDENY_REJECT;
3492 } | T_BLOCK
3493 {
3494  if (conf_parser_ctx.pass == 2)
3495    yy_aconf->flags |= GDENY_BLOCK;
3496 };
2827  
2828   /***************************************************************************
2829   *  section channel
# Line 3502 | Line 2832 | channel_entry: CHANNEL
2832    '{' channel_items '}' ';';
2833  
2834   channel_items:      channel_items channel_item | channel_item;
2835 < channel_item:       channel_disable_local_channels | channel_use_except |
2836 <                    channel_use_invex | channel_use_knock |
2837 <                    channel_max_bans | channel_knock_delay |
3508 <                    channel_knock_delay_channel | channel_max_chans_per_user |
2835 > channel_item:       channel_max_bans |
2836 >                    channel_knock_delay | channel_knock_delay_channel |
2837 >                    channel_max_chans_per_user | channel_max_chans_per_oper |
2838                      channel_quiet_on_ban | channel_default_split_user_count |
2839                      channel_default_split_server_count |
2840 <                    channel_no_create_on_split | channel_restrict_channels |
2841 <                    channel_no_join_on_split | channel_burst_topicwho |
2840 >                    channel_no_create_on_split |
2841 >                    channel_no_join_on_split |
2842                      channel_jflood_count | channel_jflood_time |
2843                      channel_disable_fake_channels | error;
2844  
# Line 3518 | Line 2847 | channel_disable_fake_channels: DISABLE_F
2847    ConfigChannel.disable_fake_channels = yylval.number;
2848   };
2849  
3521 channel_restrict_channels: RESTRICT_CHANNELS '=' TBOOL ';'
3522 {
3523  ConfigChannel.restrict_channels = yylval.number;
3524 };
3525
3526 channel_disable_local_channels: DISABLE_LOCAL_CHANNELS '=' TBOOL ';'
3527 {
3528  ConfigChannel.disable_local_channels = yylval.number;
3529 };
3530
3531 channel_use_except: USE_EXCEPT '=' TBOOL ';'
3532 {
3533  ConfigChannel.use_except = yylval.number;
3534 };
3535
3536 channel_use_invex: USE_INVEX '=' TBOOL ';'
3537 {
3538  ConfigChannel.use_invex = yylval.number;
3539 };
3540
3541 channel_use_knock: USE_KNOCK '=' TBOOL ';'
3542 {
3543  ConfigChannel.use_knock = yylval.number;
3544 };
3545
2850   channel_knock_delay: KNOCK_DELAY '=' timespec ';'
2851   {
2852    ConfigChannel.knock_delay = $3;
# Line 3558 | Line 2862 | channel_max_chans_per_user: MAX_CHANS_PE
2862    ConfigChannel.max_chans_per_user = $3;
2863   };
2864  
2865 + channel_max_chans_per_oper: MAX_CHANS_PER_OPER '=' NUMBER ';'
2866 + {
2867 +  ConfigChannel.max_chans_per_oper = $3;
2868 + };
2869 +
2870   channel_quiet_on_ban: QUIET_ON_BAN '=' TBOOL ';'
2871   {
2872    ConfigChannel.quiet_on_ban = yylval.number;
# Line 3588 | Line 2897 | channel_no_join_on_split: NO_JOIN_ON_SPL
2897    ConfigChannel.no_join_on_split = yylval.number;
2898   };
2899  
3591 channel_burst_topicwho: BURST_TOPICWHO '=' TBOOL ';'
3592 {
3593  ConfigChannel.burst_topicwho = yylval.number;
3594 };
3595
2900   channel_jflood_count: JOIN_FLOOD_COUNT '=' NUMBER ';'
2901   {
2902    GlobalSetOptions.joinfloodcount = yylval.number;
# Line 3611 | Line 2915 | serverhide_entry: SERVERHIDE
2915  
2916   serverhide_items:   serverhide_items serverhide_item | serverhide_item;
2917   serverhide_item:    serverhide_flatten_links | serverhide_hide_servers |
2918 +                    serverhide_hide_services |
2919                      serverhide_links_delay |
3615                    serverhide_disable_hidden |
2920                      serverhide_hidden | serverhide_hidden_name |
2921                      serverhide_hide_server_ips |
2922                      error;
# Line 3629 | Line 2933 | serverhide_hide_servers: HIDE_SERVERS '=
2933      ConfigServerHide.hide_servers = yylval.number;
2934   };
2935  
2936 + serverhide_hide_services: HIDE_SERVICES '=' TBOOL ';'
2937 + {
2938 +  if (conf_parser_ctx.pass == 2)
2939 +    ConfigServerHide.hide_services = yylval.number;
2940 + };
2941 +
2942   serverhide_hidden_name: HIDDEN_NAME '=' QSTRING ';'
2943   {
2944    if (conf_parser_ctx.pass == 2)
2945    {
2946      MyFree(ConfigServerHide.hidden_name);
2947 <    DupString(ConfigServerHide.hidden_name, yylval.string);
2947 >    ConfigServerHide.hidden_name = xstrdup(yylval.string);
2948    }
2949   };
2950  
# Line 3658 | Line 2968 | serverhide_hidden: HIDDEN '=' TBOOL ';'
2968      ConfigServerHide.hidden = yylval.number;
2969   };
2970  
3661 serverhide_disable_hidden: DISABLE_HIDDEN '=' TBOOL ';'
3662 {
3663  if (conf_parser_ctx.pass == 2)
3664    ConfigServerHide.disable_hidden = yylval.number;
3665 };
3666
2971   serverhide_hide_server_ips: HIDE_SERVER_IPS '=' TBOOL ';'
2972   {
2973    if (conf_parser_ctx.pass == 2)

Diff Legend

Removed lines
+ Added lines
< Changed lines (old)
> Changed lines (new)