291 |
|
|
292 |
|
if (!valid_hostname(source_p->host)) |
293 |
|
{ |
294 |
< |
sendto_one(source_p, ":%s NOTICE %s :*** Notice -- You have an illegal " |
295 |
< |
"character in your hostname", me.name, source_p->name); |
294 |
> |
sendto_one_notice(source_p, &me, ":*** Notice -- You have an illegal " |
295 |
> |
"character in your hostname"); |
296 |
|
strlcpy(source_p->host, source_p->sockhost, |
297 |
|
sizeof(source_p->host)); |
298 |
|
} |
308 |
|
if (IsNeedIdentd(conf)) |
309 |
|
{ |
310 |
|
++ServerStats.is_ref; |
311 |
< |
sendto_one(source_p, ":%s NOTICE %s :*** Notice -- You need to install " |
312 |
< |
"identd to use this server", me.name, source_p->name); |
311 |
> |
sendto_one_notice(source_p, &me, ":*** Notice -- You need to install " |
312 |
> |
"identd to use this server"); |
313 |
|
exit_client(source_p, &me, "Install identd"); |
314 |
|
return; |
315 |
|
} |
725 |
|
{ |
726 |
|
/* If this user is being spoofed, tell them so */ |
727 |
|
if (IsConfDoSpoofIp(conf)) |
728 |
< |
sendto_one(source_p, |
729 |
< |
":%s NOTICE %s :*** Spoofing your IP. Congrats.", |
730 |
< |
me.name, source_p->name); |
728 |
> |
sendto_one_notice(source_p, &me, ":*** Spoofing your IP. Congrats."); |
729 |
|
|
730 |
|
/* If this user is in the exception class, Set it "E lined" */ |
731 |
|
if (IsConfExemptKline(conf)) |
732 |
|
{ |
733 |
|
SetExemptKline(source_p); |
734 |
< |
sendto_one(source_p, |
737 |
< |
":%s NOTICE %s :*** You are exempt from K/D/G lines. Congrats.", |
738 |
< |
me.name, source_p->name); |
734 |
> |
sendto_one_notice(source_p, &me, ":*** You are exempt from K/D/G lines. Congrats."); |
735 |
|
} |
736 |
|
|
737 |
|
/* |
741 |
|
else if (IsConfExemptGline(conf)) |
742 |
|
{ |
743 |
|
SetExemptGline(source_p); |
744 |
< |
sendto_one(source_p, ":%s NOTICE %s :*** You are exempt from G lines. Congrats.", |
749 |
< |
me.name, source_p->name); |
744 |
> |
sendto_one_notice(source_p, &me, ":*** You are exempt from G lines. Congrats."); |
745 |
|
} |
746 |
|
|
747 |
|
if (IsConfExemptResv(conf)) |
748 |
|
{ |
749 |
|
SetExemptResv(source_p); |
750 |
< |
sendto_one(source_p, ":%s NOTICE %s :*** You are exempt from resvs. Congrats.", |
756 |
< |
me.name, source_p->name); |
750 |
> |
sendto_one_notice(source_p, &me, ":*** You are exempt from resvs. Congrats."); |
751 |
|
} |
752 |
|
|
753 |
|
/* If this user is exempt from user limits set it "F lined" */ |
754 |
|
if (IsConfExemptLimits(conf)) |
755 |
|
{ |
756 |
|
SetExemptLimits(source_p); |
757 |
< |
sendto_one(source_p, |
764 |
< |
":%s NOTICE %s :*** You are exempt from user limits. Congrats.", |
765 |
< |
me.name, source_p->name); |
757 |
> |
sendto_one_notice(source_p, &me, ":*** You are exempt from user limits. Congrats."); |
758 |
|
} |
759 |
|
|
760 |
|
if (IsConfCanFlood(conf)) |
761 |
|
{ |
762 |
|
SetCanFlood(source_p); |
763 |
< |
sendto_one(source_p, ":%s NOTICE %s :*** You are exempt from flood " |
764 |
< |
"protection, aren't you fearsome.", |
773 |
< |
me.name, source_p->name); |
763 |
> |
sendto_one_notice(source_p, &me, ":*** You are exempt from flood " |
764 |
> |
"protection, aren't you fearsome."); |
765 |
|
} |
766 |
|
} |
767 |
|
|
892 |
|
if (MyConnect(source_p) && HasUMode(source_p, UMODE_ADMIN) && |
893 |
|
!HasOFlag(source_p, OPER_FLAG_ADMIN)) |
894 |
|
{ |
895 |
< |
sendto_one(source_p, ":%s NOTICE %s :*** You have no admin flag;", |
905 |
< |
me.name, source_p->name); |
895 |
> |
sendto_one_notice(source_p, &me, ":*** You have no admin flag;"); |
896 |
|
DelUMode(source_p, UMODE_ADMIN); |
897 |
|
} |
898 |
|
|
1112 |
|
if (HasFlag(source_p, FLAGS_SSL)) |
1113 |
|
{ |
1114 |
|
AddUMode(source_p, UMODE_SSL); |
1115 |
< |
sendto_one(source_p, ":%s NOTICE %s :*** Connected securely via %s", |
1116 |
< |
me.name, source_p->name, |
1127 |
< |
ssl_get_cipher(source_p->localClient->fd.ssl)); |
1115 |
> |
sendto_one_notice(source_p, &me, ":*** Connected securely via %s", |
1116 |
> |
ssl_get_cipher(source_p->localClient->fd.ssl)); |
1117 |
|
} |
1118 |
|
#endif |
1119 |
|
|