ViewVC Help
View File | Revision Log | Show Annotations | View Changeset | Root Listing
root/svn/ircd-hybrid/trunk/src/user.c
(Generate patch)

Comparing:
ircd-hybrid-8/src/s_user.c (file contents), Revision 1294 by michael, Wed Feb 22 20:48:30 2012 UTC vs.
ircd-hybrid/trunk/src/s_user.c (file contents), Revision 1976 by michael, Wed May 8 19:33:06 2013 UTC

# Line 32 | Line 32
32   #include "fdlist.h"
33   #include "hash.h"
34   #include "irc_string.h"
35 #include "sprintf_irc.h"
35   #include "s_bsd.h"
36   #include "ircd.h"
37   #include "listener.h"
38   #include "motd.h"
39   #include "numeric.h"
40 < #include "s_conf.h"
41 < #include "s_log.h"
40 > #include "conf.h"
41 > #include "log.h"
42   #include "s_serv.h"
43   #include "send.h"
44   #include "supported.h"
# Line 60 | Line 59 | struct Callback *umode_cb = NULL;
59   static char umode_buffer[IRCD_BUFSIZE];
60  
61   static void user_welcome(struct Client *);
62 < static void report_and_set_user_flags(struct Client *, const struct AccessItem *);
62 > static void report_and_set_user_flags(struct Client *, const struct MaskItem *);
63   static int check_xline(struct Client *);
64   static void introduce_client(struct Client *);
65   static const char *uid_get(void);
# Line 93 | Line 92 | unsigned int user_modes[256] =
92    UMODE_CCONN_FULL,   /* C */
93    UMODE_DEAF,         /* D */
94    0,                  /* E */
95 <  0,                  /* F */
95 >  UMODE_FARCONNECT,   /* F */
96    UMODE_SOFTCALLERID, /* G */
97    UMODE_HIDDEN,       /* H */
98    0,                  /* I */
# Line 120 | Line 119 | unsigned int user_modes[256] =
119    UMODE_BOTS,         /* b */
120    UMODE_CCONN,        /* c */
121    UMODE_DEBUG,        /* d */
122 <  0,                  /* e */
122 >  UMODE_EXTERNAL,     /* e */
123    UMODE_FULL,         /* f */
124    UMODE_CALLERID,     /* g */
125    0,                  /* h */
# Line 139 | Line 138 | unsigned int user_modes[256] =
138    UMODE_UNAUTH,       /* u */
139    0,                  /* v */
140    UMODE_WALLOP,       /* w */
141 <  UMODE_EXTERNAL,     /* x */
141 >  0,                  /* x */
142    UMODE_SPY,          /* y */
143    UMODE_OPERWALL,     /* z      0x7A */
144    0,0,0,0,0,          /* 0x7B - 0x7F */
# Line 214 | Line 213 | show_lusers(struct Client *source_p)
213      sendto_one(source_p, form_str(RPL_LUSERME),
214                 from, to, Count.local, Count.myserver);
215      sendto_one(source_p, form_str(RPL_LOCALUSERS),
216 <               from, to, Count.local, Count.max_loc,
218 <               Count.local, Count.max_loc);
216 >               from, to, Count.local, Count.max_loc);
217    }
218    else
219    {
220      sendto_one(source_p, form_str(RPL_LUSERME),
221                 from, to, Count.total, 0);
222      sendto_one(source_p, form_str(RPL_LOCALUSERS),
223 <               from, to, Count.total, Count.max_tot,
226 <               Count.total, Count.max_tot);
223 >               from, to, Count.total, Count.max_tot);
224    }
225  
226    sendto_one(source_p, form_str(RPL_GLOBALUSERS),
227 <             from, to, Count.total, Count.max_tot,
231 <             Count.total, Count.max_tot);
227 >             from, to, Count.total, Count.max_tot);
228  
229    if (!ConfigServerHide.hide_servers || HasUMode(source_p, UMODE_OPER))
230      sendto_one(source_p, form_str(RPL_STATSCONN), from, to,
# Line 280 | Line 276 | void
276   register_local_user(struct Client *source_p)
277   {
278    const char *id = NULL;
279 <  const struct AccessItem *aconf = NULL;
284 <  dlink_node *ptr = NULL;
279 >  const struct MaskItem *conf = NULL;
280  
281    assert(source_p != NULL);
282    assert(source_p == source_p->from);
# Line 312 | Line 307 | register_local_user(struct Client *sourc
307    /* Straight up the maximum rate of flooding... */
308    source_p->localClient->allow_read = MAX_FLOOD_BURST;
309  
310 <  if (!execute_callback(client_check_cb, source_p, source_p->username))
310 >  if (!check_client(source_p))
311      return;
312  
313    if (valid_hostname(source_p->host) == 0)
# Line 323 | Line 318 | register_local_user(struct Client *sourc
318              sizeof(source_p->host));
319    }
320  
321 <  ptr   = source_p->localClient->confs.head;
327 <  aconf = map_to_conf(ptr->data);
321 >  conf = source_p->localClient->confs.head->data;
322  
323    if (!IsGotId(source_p))
324    {
# Line 332 | Line 326 | register_local_user(struct Client *sourc
326      const char *p = username;
327      unsigned int i = 0;
328  
329 <    if (IsNeedIdentd(aconf))
329 >    if (IsNeedIdentd(conf))
330      {
331        ++ServerStats.is_ref;
332        sendto_one(source_p, ":%s NOTICE %s :*** Notice -- You need to install "
# Line 343 | Line 337 | register_local_user(struct Client *sourc
337  
338      strlcpy(username, source_p->username, sizeof(username));
339  
340 <    if (!IsNoTilde(aconf))
340 >    if (!IsNoTilde(conf))
341        source_p->username[i++] = '~';
342  
343      for (; *p && i < USERLEN; ++p)
# Line 354 | Line 348 | register_local_user(struct Client *sourc
348    }
349  
350    /* password check */
351 <  if (!EmptyString(aconf->passwd))
351 >  if (!EmptyString(conf->passwd))
352    {
353      const char *pass = source_p->localClient->passwd;
354  
355 <    if (!match_conf_password(pass, aconf))
355 >    if (!match_conf_password(pass, conf))
356      {
357        ++ServerStats.is_ref;
358        sendto_one(source_p, form_str(ERR_PASSWDMISMATCH),
# Line 374 | Line 368 | register_local_user(struct Client *sourc
368     */
369  
370    /* report if user has &^>= etc. and set flags as needed in source_p */
371 <  report_and_set_user_flags(source_p, aconf);
371 >  report_and_set_user_flags(source_p, conf);
372  
373    if (IsDead(source_p))
374      return;
# Line 390 | Line 384 | register_local_user(struct Client *sourc
384    if ((Count.local >= ServerInfo.max_clients + MAX_BUFFER) ||
385        (Count.local >= ServerInfo.max_clients && !IsExemptLimits(source_p)))
386    {
387 <    sendto_realops_flags(UMODE_FULL, L_ALL,
387 >    sendto_realops_flags(UMODE_FULL, L_ALL, SEND_NOTICE,
388                           "Too many clients, rejecting %s[%s].",
389                           source_p->name, source_p->host);
390      ++ServerStats.is_ref;
# Line 403 | Line 397 | register_local_user(struct Client *sourc
397    {
398      char tmpstr2[IRCD_BUFSIZE];
399  
400 <    sendto_realops_flags(UMODE_REJ, L_ALL, "Invalid username: %s (%s@%s)",
400 >    sendto_realops_flags(UMODE_REJ, L_ALL, SEND_NOTICE,
401 >                         "Invalid username: %s (%s@%s)",
402                           source_p->name, source_p->username, source_p->host);
403      ++ServerStats.is_ref;
404      snprintf(tmpstr2, sizeof(tmpstr2), "Invalid username [%s]",
# Line 421 | Line 416 | register_local_user(struct Client *sourc
416    strlcpy(source_p->id, id, sizeof(source_p->id));
417    hash_add_id(source_p);
418  
419 <  sendto_realops_flags(UMODE_CCONN, L_ALL,
419 >  sendto_realops_flags(UMODE_CCONN, L_ALL, SEND_NOTICE,
420                         "Client connecting: %s (%s@%s) [%s] {%s} [%s] <%s>",
421                         source_p->name, source_p->username, source_p->host,
422                         ConfigFileEntry.hide_spoof_ips && IsIPSpoof(source_p) ?
423                         "255.255.255.255" : source_p->sockhost,
424 <                       get_client_class(source_p),
424 >                       get_client_class(&source_p->localClient->confs),
425                         source_p->info, source_p->id);
426  
427 <  sendto_realops_flags(UMODE_CCONN_FULL, L_ALL,
427 >  sendto_realops_flags(UMODE_CCONN_FULL, L_ALL, SEND_NOTICE,
428                         "CLICONN %s %s %s %s %s %s %s 0 %s",
429                         source_p->name, source_p->username, source_p->host,
430                         ConfigFileEntry.hide_spoof_ips && IsIPSpoof(source_p) ?
431                         "255.255.255.255" : source_p->sockhost,
432 <                       get_client_class(source_p),
432 >                       get_client_class(&source_p->localClient->confs),
433                         ConfigFileEntry.hide_spoof_ips && IsIPSpoof(source_p) ?
434                             "<hidden>" : source_p->localClient->client_host,
435                         ConfigFileEntry.hide_spoof_ips && IsIPSpoof(source_p) ?
# Line 453 | Line 448 | register_local_user(struct Client *sourc
448      Count.max_loc = Count.local;
449  
450      if (!(Count.max_loc % 10))
451 <      sendto_realops_flags(UMODE_ALL, L_ALL, "New Max Local Clients: %d",
451 >      sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
452 >                           "New Max Local Clients: %d",
453                             Count.max_loc);
454    }
455  
# Line 509 | Line 505 | register_remote_user(struct Client *sour
505     */
506    source_p->servptr = hash_find_server(server);
507  
508 <  /* Super GhostDetect:
508 >  /*
509 >   * Super GhostDetect:
510     * If we can't find the server the user is supposed to be on,
511     * then simply blow the user away.        -Taner
512     */
513    if (source_p->servptr == NULL)
514    {
515 <    sendto_realops_flags(UMODE_ALL, L_ALL,
515 >    sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE,
516                           "No server %s for user %s[%s@%s] from %s",
517                           server, source_p->name, source_p->username,
518                           source_p->host, source_p->from->name);
# Line 528 | Line 525 | register_remote_user(struct Client *sour
525  
526    if ((target_p = source_p->servptr) && target_p->from != source_p->from)
527    {
528 <    sendto_realops_flags(UMODE_DEBUG, L_ALL,
528 >    sendto_realops_flags(UMODE_DEBUG, L_ALL, SEND_NOTICE,
529                           "Bad User [%s] :%s USER %s@%s %s, != %s[%s]",
530                           source_p->from->name, source_p->name, source_p->username,
531                           source_p->host, source_p->servptr->name,
# Line 557 | Line 554 | register_remote_user(struct Client *sour
554    add_user_host(source_p->username, source_p->host, 1);
555    SetUserHost(source_p);
556  
557 +  if (HasFlag(source_p->servptr, FLAGS_EOB))
558 +    sendto_realops_flags(UMODE_FARCONNECT, L_ALL, SEND_NOTICE,
559 +                         "Client connecting at %s: %s (%s@%s) [%s] <%s>",
560 +                         source_p->servptr->name,
561 +                         source_p->name, source_p->username, source_p->host,
562 +                         source_p->info, source_p->id);
563 +
564    introduce_client(source_p);
565   }
566  
# Line 597 | Line 601 | introduce_client(struct Client *source_p
601      if (IsCapable(server, CAP_SVS))
602      {
603        if (IsCapable(server, CAP_TS6) && HasID(source_p))
604 <        sendto_one(server, ":%s UID %s %d %lu %s %s %s %s %s %lu :%s",
604 >        sendto_one(server, ":%s UID %s %d %lu %s %s %s %s %s %s :%s",
605                     source_p->servptr->id,
606                     source_p->name, source_p->hopcount+1,
607                     (unsigned long)source_p->tsinfo,
608                     ubuf, source_p->username, source_p->host,
609                     (MyClient(source_p) && IsIPSpoof(source_p)) ?
610                     "0" : source_p->sockhost, source_p->id,
611 <                   (unsigned long)source_p->servicestamp,
611 >                   source_p->svid,
612                     source_p->info);
613        else
614 <        sendto_one(server, "NICK %s %d %lu %s %s %s %s %lu :%s",
614 >        sendto_one(server, "NICK %s %d %lu %s %s %s %s %s :%s",
615                     source_p->name, source_p->hopcount+1,
616                     (unsigned long)source_p->tsinfo,
617                     ubuf, source_p->username, source_p->host,
618 <                   source_p->servptr->name, (unsigned long)source_p->servicestamp,
618 >                   source_p->servptr->name, source_p->svid,
619                     source_p->info);
620  
621      }
# Line 658 | Line 662 | valid_hostname(const char *hostname)
662      if (!IsHostChar(*p))
663        return 0;
664  
665 <  return 1;
665 >  return p - hostname <= HOSTLEN;
666   }
667  
668   /* valid_username()
# Line 728 | Line 732 | valid_nickname(const char *nickname, con
732      if (!IsNickChar(*p))
733        return 0;
734  
735 <  return p - nickname <= (NICKLEN - 1);
735 >  return p - nickname <= NICKLEN;
736   }
737  
738   /* report_and_set_user_flags()
739   *
740   * inputs       - pointer to source_p
741 < *              - pointer to aconf for this user
741 > *              - pointer to conf for this user
742   * output       - NONE
743   * side effects - Report to user any special flags
744   *                they are getting, and set them.
745   */
746   static void
747 < report_and_set_user_flags(struct Client *source_p, const struct AccessItem *aconf)
747 > report_and_set_user_flags(struct Client *source_p, const struct MaskItem *conf)
748   {
749    /* If this user is being spoofed, tell them so */
750 <  if (IsConfDoSpoofIp(aconf))
750 >  if (IsConfDoSpoofIp(conf))
751    {
752      sendto_one(source_p,
753                 ":%s NOTICE %s :*** Spoofing your IP. congrats.",
# Line 751 | Line 755 | report_and_set_user_flags(struct Client
755    }
756  
757    /* If this user is in the exception class, Set it "E lined" */
758 <  if (IsConfExemptKline(aconf))
758 >  if (IsConfExemptKline(conf))
759    {
760      SetExemptKline(source_p);
761      sendto_one(source_p,
# Line 762 | Line 766 | report_and_set_user_flags(struct Client
766    /* The else here is to make sure that G line exempt users
767     * do not get noticed twice.
768     */
769 <  else if (IsConfExemptGline(aconf))
769 >  else if (IsConfExemptGline(conf))
770    {
771      SetExemptGline(source_p);
772      sendto_one(source_p, ":%s NOTICE %s :*** You are exempt from G lines.",
773                 me.name, source_p->name);
774    }
775  
776 <  if (IsConfExemptResv(aconf))
776 >  if (IsConfExemptResv(conf))
777    {
778      SetExemptResv(source_p);
779      sendto_one(source_p, ":%s NOTICE %s :*** You are exempt from resvs.",
# Line 777 | Line 781 | report_and_set_user_flags(struct Client
781    }
782  
783    /* If this user is exempt from user limits set it "F lined" */
784 <  if (IsConfExemptLimits(aconf))
784 >  if (IsConfExemptLimits(conf))
785    {
786      SetExemptLimits(source_p);
787      sendto_one(source_p,
# Line 785 | Line 789 | report_and_set_user_flags(struct Client
789                 me.name,source_p->name);
790    }
791  
792 <  if (IsConfCanFlood(aconf))
792 >  if (IsConfCanFlood(conf))
793    {
794      SetCanFlood(source_p);
795      sendto_one(source_p, ":%s NOTICE %s :*** You are exempt from flood "
# Line 829 | Line 833 | change_simple_umode(va_list args)
833   */
834   void
835   set_user_mode(struct Client *client_p, struct Client *source_p,
836 <              int parc, char *parv[])
836 >              const int parc, char *parv[])
837   {
838    unsigned int flag, setflags;
839    char **p, *m, buf[IRCD_BUFSIZE];
# Line 846 | Line 850 | set_user_mode(struct Client *client_p, s
850      return;
851    }
852  
849  if (IsServer(source_p))
850  {
851     sendto_realops_flags(UMODE_ALL, L_ADMIN, "*** Mode for User %s from %s",
852                          parv[1], source_p->name);
853     return;
854  }
855
853    if (source_p != target_p)
854    {
855       sendto_one(source_p, form_str(ERR_USERSDONTMATCH),
# Line 917 | Line 914 | set_user_mode(struct Client *client_p, s
914              {
915                dlink_node *dm;
916  
917 <              detach_conf(source_p, OPER_TYPE);
917 >              detach_conf(source_p, CONF_OPER);
918                ClrOFlag(source_p);
919                DelUMode(source_p, ConfigFileEntry.oper_only_umodes);
920  
# Line 964 | Line 961 | set_user_mode(struct Client *client_p, s
961      sendto_one(source_p, form_str(ERR_UMODEUNKNOWNFLAG),
962                 me.name, source_p->name);
963  
967  if (HasUMode(source_p, UMODE_NCHANGE) && !HasOFlag(source_p, OPER_FLAG_N))
968  {
969    sendto_one(source_p, ":%s NOTICE %s :*** You have no nchange flag;",
970               me.name, source_p->name);
971    DelUMode(source_p, UMODE_NCHANGE);
972  }
973
964    if (MyConnect(source_p) && HasUMode(source_p, UMODE_ADMIN) &&
965        !HasOFlag(source_p, OPER_FLAG_ADMIN))
966    {
# Line 1088 | Line 1078 | send_umode_out(struct Client *client_p,
1078      send_umode(client_p, source_p, old, 0xffffffff, buf);
1079   }
1080  
1081 + void
1082 + user_set_hostmask(struct Client *target_p, const char *hostname)
1083 + {
1084 +  if (!valid_hostname(hostname))
1085 +    return;
1086 +
1087 +  if (IsUserHostIp(target_p))
1088 +    delete_user_host(target_p->username, target_p->host, !MyConnect(target_p));
1089 +
1090 +  strlcpy(target_p->host, hostname, sizeof(target_p->host));
1091 +  SetIPSpoof(target_p);
1092 +
1093 +  add_user_host(target_p->username, target_p->host, !MyConnect(target_p));
1094 +  SetUserHost(target_p);
1095 +
1096 +  if (MyClient(target_p))
1097 +    clear_ban_cache_client(target_p);
1098 + }
1099 +
1100   /* user_welcome()
1101   *
1102   * inputs       - client pointer to client to welcome
# Line 1111 | Line 1120 | user_welcome(struct Client *source_p)
1120   #endif
1121  
1122    sendto_one(source_p, form_str(RPL_WELCOME), me.name, source_p->name,
1123 <             ServerInfo.network_name, source_p->name);
1123 >             ServerInfo.network_name, source_p->name,
1124 >             source_p->username, source_p->host);
1125    sendto_one(source_p, form_str(RPL_YOURHOST), me.name, source_p->name,
1126               get_listener_name(source_p->localClient->listener), ircd_version);
1127    sendto_one(source_p, form_str(RPL_CREATED),
# Line 1154 | Line 1164 | user_welcome(struct Client *source_p)
1164   static int
1165   check_xline(struct Client *source_p)
1166   {
1167 <  struct ConfItem *conf = NULL;
1167 >  struct MaskItem *conf = NULL;
1168    const char *reason = NULL;
1169  
1170 <  if ((conf = find_matching_name_conf(XLINE_TYPE, source_p->info, NULL, NULL, 0)) ||
1161 <      (conf = find_matching_name_conf(RXLINE_TYPE, source_p->info, NULL, NULL, 0)))
1170 >  if ((conf = find_matching_name_conf(CONF_XLINE, source_p->info, NULL, NULL, 0)))
1171    {
1172 <    struct MatchItem *reg = map_to_conf(conf);
1172 >    ++conf->count;
1173  
1174 <    ++reg->count;
1175 <
1167 <    if (reg->reason != NULL)
1168 <      reason = reg->reason;
1174 >    if (conf->reason != NULL)
1175 >      reason = conf->reason;
1176      else
1177        reason = "No Reason";
1178  
1179 <    sendto_realops_flags(UMODE_REJ, L_ALL,
1179 >    sendto_realops_flags(UMODE_REJ, L_ALL, SEND_NOTICE,
1180                           "X-line Rejecting [%s] [%s], user %s [%s]",
1181                           source_p->info, reason,
1182                           get_client_name(source_p, HIDE_IP),
1183                           source_p->sockhost);
1184  
1185      ++ServerStats.is_ref;
1186 <    if (REJECT_HOLD_TIME > 0)
1180 <    {
1181 <      sendto_one(source_p, ":%s NOTICE %s :Bad user info",
1182 <                 me.name, source_p->name);
1183 <      source_p->localClient->reject_delay = CurrentTime + REJECT_HOLD_TIME;
1184 <      SetCaptured(source_p);
1185 <    }
1186 <    else
1187 <      exit_client(source_p, &me, "Bad user info");
1186 >    exit_client(source_p, &me, "Bad user info");
1187      return 1;
1188    }
1189  
# Line 1195 | Line 1194 | check_xline(struct Client *source_p)
1194   *
1195   * inputs       - pointer to given client to oper
1196   * output       - NONE
1197 < * side effects - Blindly opers up given source_p, using aconf info
1197 > * side effects - Blindly opers up given source_p, using conf info
1198   *                all checks on passwords have already been done.
1199   *                This could also be used by rsa oper routines.
1200   */
1201   void
1202   oper_up(struct Client *source_p)
1203   {
1204 <  unsigned int old = source_p->umodes;
1205 <  const char *operprivs = "";
1207 <  const struct AccessItem *oconf = NULL;
1204 >  const unsigned int old = source_p->umodes;
1205 >  const struct MaskItem *conf = source_p->localClient->confs.head->data;
1206  
1207    assert(source_p->localClient->confs.head);
1210  oconf = map_to_conf((source_p->localClient->confs.head)->data);
1208  
1209    ++Count.oper;
1210    SetOper(source_p);
1211  
1212 <  if (oconf->modes)
1213 <    AddUMode(source_p, oconf->modes);
1212 >  if (conf->modes)
1213 >    AddUMode(source_p, conf->modes);
1214    else if (ConfigFileEntry.oper_umodes)
1215      AddUMode(source_p, ConfigFileEntry.oper_umodes);
1216  
# Line 1225 | Line 1222 | oper_up(struct Client *source_p)
1222    assert(dlinkFind(&oper_list, source_p) == NULL);
1223    dlinkAdd(source_p, make_dlink_node(), &oper_list);
1224  
1225 <  operprivs = oper_privs_as_string(oconf->port);
1229 <
1230 <  AddOFlag(source_p, oconf->port);
1225 >  AddOFlag(source_p, conf->port);
1226  
1227    if (HasOFlag(source_p, OPER_FLAG_ADMIN))
1228      AddUMode(source_p, UMODE_ADMIN);
1234  if (!HasOFlag(source_p, OPER_FLAG_N))
1235    DelUMode(source_p, UMODE_NCHANGE);
1229  
1230 <  sendto_realops_flags(UMODE_ALL, L_ALL, "%s (%s@%s) is now an operator",
1231 <                       source_p->name, source_p->username, source_p->host);
1230 >  sendto_realops_flags(UMODE_ALL, L_ALL, SEND_NOTICE, "%s is now an operator",
1231 >                       get_oper_name(source_p));
1232    send_umode_out(source_p, source_p, old);
1233    sendto_one(source_p, form_str(RPL_YOUREOPER), me.name, source_p->name);
1241  sendto_one(source_p, ":%s NOTICE %s :*** Oper privs are %s",
1242             me.name, source_p->name, operprivs);
1243  send_message_file(source_p, &ConfigFileEntry.opermotd);
1234   }
1235  
1236   static char new_uid[TOTALSIDUID + 1];     /* allow for \0 */
# Line 1268 | Line 1258 | valid_sid(const char *sid)
1258   void
1259   init_uid(void)
1260   {
1261 <  int i;
1261 >  unsigned int i;
1262  
1263    memset(new_uid, 0, sizeof(new_uid));
1264  
# Line 1354 | Line 1344 | init_isupport(void)
1344    add_isupport("DEAF", "D", -1);
1345    add_isupport("KICKLEN", NULL, KICKLEN);
1346    add_isupport("MODES", NULL, MAXMODEPARAMS);
1357  add_isupport("NICKLEN", NULL, NICKLEN-1);
1347   #ifdef HALFOPS
1348    add_isupport("PREFIX", "(ohv)@%+", -1);
1349    add_isupport("STATUSMSG", "@%+", -1);
# Line 1362 | Line 1351 | init_isupport(void)
1351    add_isupport("PREFIX", "(ov)@+", -1);
1352    add_isupport("STATUSMSG", "@+", -1);
1353   #endif
1365  add_isupport("TOPICLEN", NULL, TOPICLEN);
1354   }
1355  
1356   /*
# Line 1397 | Line 1385 | add_isupport(const char *name, const cha
1385      dlinkAddTail(support, &support->node, &support_list);
1386    }
1387  
1388 <  DupString(support->name, name);
1388 >  support->name = xstrdup(name);
1389    if (options != NULL)
1390 <    DupString(support->options, options);
1390 >    support->options = xstrdup(options);
1391    support->number = n;
1392  
1393    rebuild_isupport_message_line();
# Line 1458 | Line 1446 | rebuild_isupport_message_line(void)
1446    {
1447      struct Isupport *support = ptr->data;
1448  
1449 <    p += (n = ircsprintf(p, "%s", support->name));
1449 >    p += (n = sprintf(p, "%s", support->name));
1450      len += n;
1451  
1452      if (support->options != NULL)
1453      {
1454 <      p += (n = ircsprintf(p, "=%s", support->options));
1454 >      p += (n = sprintf(p, "=%s", support->options));
1455        len += n;
1456      }
1457  
1458      if (support->number > 0)
1459      {
1460 <      p += (n = ircsprintf(p, "=%d", support->number));
1460 >      p += (n = sprintf(p, "=%d", support->number));
1461        len += n;
1462      }
1463  

Diff Legend

Removed lines
+ Added lines
< Changed lines (old)
> Changed lines (new)