unrealircd/src/misc.c

2372 lines
59 KiB
C

/*
* Unreal Internet Relay Chat Daemon, src/misc.c
* Copyright (C) 1990 Jarkko Oikarinen and
* University of Oulu, Computing Center
* Copyright (C) 1999-present UnrealIRCd team
*
* See file AUTHORS in IRC package for additional names of
* the programmers.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 1, or (at your option)
* any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
/** @file
* @brief Miscellaneous functions that don't fit in other files.
* Generally these are either simple helper functions or larger
* functions that don't fit in either user.c, channel.c.
*/
#include "unrealircd.h"
static void exit_one_client(Client *, MessageTag *mtags_i, const char *);
static const char *months[] = {
"January", "February", "March", "April",
"May", "June", "July", "August",
"September", "October", "November", "December"
};
static const char *weekdays[] = {
"Sunday", "Monday", "Tuesday", "Wednesday",
"Thursday", "Friday", "Saturday"
};
static const char *short_months[12] = {
"Jan", "Feb", "Mar", "Apr", "May", "Jun",
"Jul", "Aug", "Sep", "Oct", "Nov", "Dec",
};
static const char *short_weekdays[7] = {
"Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat",
};
typedef struct {
int value; /** Unique integer value of item */
char character; /** Unique character assigned to item */
char *name; /** Name of item */
} BanActTable;
static BanActTable banacttable[] = {
{ BAN_ACT_KILL, 'K', "kill" },
{ BAN_ACT_SOFT_KILL, 'i', "soft-kill" },
{ BAN_ACT_TEMPSHUN, 'S', "tempshun" },
{ BAN_ACT_SOFT_TEMPSHUN,'T', "soft-tempshun" },
{ BAN_ACT_SHUN, 's', "shun" },
{ BAN_ACT_SOFT_SHUN, 'H', "soft-shun" },
{ BAN_ACT_KLINE, 'k', "kline" },
{ BAN_ACT_SOFT_KLINE, 'I', "soft-kline" },
{ BAN_ACT_ZLINE, 'z', "zline" },
{ BAN_ACT_GLINE, 'g', "gline" },
{ BAN_ACT_SOFT_GLINE, 'G', "soft-gline" },
{ BAN_ACT_GZLINE, 'Z', "gzline" },
{ BAN_ACT_BLOCK, 'b', "block" },
{ BAN_ACT_SOFT_BLOCK, 'B', "soft-block" },
{ BAN_ACT_DCCBLOCK, 'd', "dccblock" },
{ BAN_ACT_SOFT_DCCBLOCK,'D', "soft-dccblock" },
{ BAN_ACT_VIRUSCHAN, 'v', "viruschan" },
{ BAN_ACT_SOFT_VIRUSCHAN,'V', "soft-viruschan" },
{ BAN_ACT_WARN, 'w', "warn" },
{ BAN_ACT_SOFT_WARN, 'W', "soft-warn" },
{ 0, 0, 0 }
};
typedef struct {
int value; /** Unique integer value of item */
char character; /** Unique character assigned to item */
char *name; /** Name of item */
char *irccommand; /** Raw IRC command of item (not unique!) */
} SpamfilterTargetTable;
SpamfilterTargetTable spamfiltertargettable[] = {
{ SPAMF_CHANMSG, 'c', "channel", "PRIVMSG" },
{ SPAMF_USERMSG, 'p', "private", "PRIVMSG" },
{ SPAMF_USERNOTICE, 'n', "private-notice", "NOTICE" },
{ SPAMF_CHANNOTICE, 'N', "channel-notice", "NOTICE" },
{ SPAMF_PART, 'P', "part", "PART" },
{ SPAMF_QUIT, 'q', "quit", "QUIT" },
{ SPAMF_DCC, 'd', "dcc", "PRIVMSG" },
{ SPAMF_USER, 'u', "user", "NICK" },
{ SPAMF_AWAY, 'a', "away", "AWAY" },
{ SPAMF_TOPIC, 't', "topic", "TOPIC" },
{ SPAMF_MTAG, 'T', "message-tag", "message-tag" },
{ 0, 0, 0, 0 }
};
/** IRC Statistics (quite useless?) */
struct IRCStatistics ircstats;
/** Returns the date in rather long string */
const char *long_date(time_t clock)
{
static char buf[80], plus;
struct tm *lt, *gm;
struct tm gmbuf;
int minswest;
if (!clock)
time(&clock);
gm = gmtime(&clock);
memcpy(&gmbuf, gm, sizeof(gmbuf));
gm = &gmbuf;
lt = localtime(&clock);
#ifndef _WIN32
if (lt->tm_yday == gm->tm_yday)
minswest = (gm->tm_hour - lt->tm_hour) * 60 +
(gm->tm_min - lt->tm_min);
else if (lt->tm_yday > gm->tm_yday)
minswest = (gm->tm_hour - (lt->tm_hour + 24)) * 60;
else
minswest = ((gm->tm_hour + 24) - lt->tm_hour) * 60;
#else
minswest = (_timezone / 60);
#endif
plus = (minswest > 0) ? '-' : '+';
if (minswest < 0)
minswest = -minswest;
ircsnprintf(buf, sizeof(buf), "%s %s %d %d -- %02d:%02d %c%02d:%02d",
weekdays[lt->tm_wday], months[lt->tm_mon], lt->tm_mday,
1900 + lt->tm_year,
lt->tm_hour, lt->tm_min, plus, minswest / 60, minswest % 60);
return buf;
}
/** Convert timestamp to a short date, a la: Wed Jun 30 21:49:08 1993
* @returns A short date string, or NULL if the timestamp is invalid
* (out of range)
* @param ts The timestamp
* @param buf The buffer to store the string (minimum size: 128 bytes),
* or NULL to use temporary static storage.
*/
const char *short_date(time_t ts, char *buf)
{
struct tm *t = gmtime(&ts);
static char retbuf[128];
if (!buf)
buf = retbuf;
*buf = '\0';
if (!t)
return NULL;
if (!strftime(buf, 128, "%a %b %d %H:%M:%S %Y", t))
return NULL;
return buf;
}
/** Return a string with the "pretty date" - yeah, another variant */
const char *pretty_date(time_t t)
{
static char buf[128];
struct tm *tm;
if (!t)
time(&t);
tm = gmtime(&t);
snprintf(buf, sizeof(buf), "%04d-%02d-%02d %02d:%02d:%02d GMT",
1900 + tm->tm_year,
tm->tm_mon + 1,
tm->tm_mday,
tm->tm_hour,
tm->tm_min,
tm->tm_sec);
return buf;
}
/** Helper function for make_user_host() and friends.
* Fixes a string so that the first white space found becomes an end of
* string marker (`\-`). returns the 'fixed' string or "*" if the string
* was NULL length or a NULL pointer.
*/
const char *check_string(const char *s)
{
static char buf[512];
static char star[2] = "*";
const char *str = s;
if (BadPtr(s))
return star;
for (; *s; s++)
{
if (isspace(*s))
{
/* Because this is an unlikely scenario, we have
* delayed the copy until here:
*/
strlncpy(buf, s, sizeof(buf), s - str);
str = buf;
break;
}
}
return (BadPtr(str)) ? star : str;
}
/** Create a user@host based on the provided name and host */
char *make_user_host(const char *name, const char *host)
{
static char namebuf[USERLEN + HOSTLEN + 6];
strlncpy(namebuf, check_string(name), sizeof(namebuf), USERLEN+1);
strlcat(namebuf, "@", sizeof(namebuf));
strlncat(namebuf, check_string(host), sizeof(namebuf), HOSTLEN+1);
return namebuf;
}
/** Create a nick!user@host string based on the provided variables.
* If any of the variables are NULL, it becomes * (asterisk)
* This is the reentrant safe version.
*/
char *make_nick_user_host_r(char *namebuf, size_t namebuflen, const char *nick, const char *name, const char *host)
{
strlncpy(namebuf, check_string(nick), namebuflen, NICKLEN+1);
strlcat(namebuf, "!", namebuflen);
strlncat(namebuf, check_string(name), namebuflen, USERLEN+1);
strlcat(namebuf, "@", namebuflen);
strlncat(namebuf, check_string(host), namebuflen, HOSTLEN+1);
return namebuf;
}
/** Create a nick!user@host string based on the provided variables.
* If any of the variables are NULL, it becomes * (asterisk)
* This version uses static storage.
*/
char *make_nick_user_host(const char *nick, const char *name, const char *host)
{
static char namebuf[NICKLEN + USERLEN + HOSTLEN + 24];
return make_nick_user_host_r(namebuf, sizeof(namebuf), nick, name, host);
}
/** Similar to ctime() but without a potential newline and
* also takes a time_t value rather than a pointer.
*/
const char *myctime(time_t value)
{
static char buf[28];
char *p;
strlcpy(buf, ctime(&value), sizeof buf);
if ((p = strchr(buf, '\n')) != NULL)
*p = '\0';
return buf;
}
/*
** get_client_name
** Return the name of the client for various tracking and
** admin purposes. The main purpose of this function is to
** return the "socket host" name of the client, if that
** differs from the advertised name (other than case).
** But, this can be used to any client structure.
**
** Returns:
** "name[user@ip#.port]" if 'showip' is true;
** "name[sockethost]", if name and sockhost are different and
** showip is false; else
** "name".
**
** NOTE 1:
** Watch out the allocation of "nbuf", if either client->name
** or client->local->sockhost gets changed into pointers instead of
** directly allocated within the structure...
**
** NOTE 2:
** Function return either a pointer to the structure (client) or
** to internal buffer (nbuf). *NEVER* use the returned pointer
** to modify what it points!!!
*/
const char *get_client_name(Client *client, int showip)
{
static char nbuf[HOSTLEN * 2 + USERLEN + 5];
if (MyConnect(client))
{
if (showip)
ircsnprintf(nbuf, sizeof(nbuf), "%s[%s@%s.%u]",
client->name,
IsIdentSuccess(client) ? client->ident : "",
client->ip ? client->ip : "???",
(unsigned int)client->local->port);
else
{
if (mycmp(client->name, client->local->sockhost))
ircsnprintf(nbuf, sizeof(nbuf), "%s[%s]",
client->name, client->local->sockhost);
else
return client->name;
}
return nbuf;
}
return client->name;
}
const char *get_client_host(Client *client)
{
static char nbuf[HOSTLEN * 2 + USERLEN + 5];
if (!MyConnect(client))
return client->name;
if (!client->local->hostp)
return get_client_name(client, FALSE);
ircsnprintf(nbuf, sizeof(nbuf), "%s[%-.*s@%-.*s]",
client->name, USERLEN,
IsIdentSuccess(client) ? client->ident : "",
HOSTLEN, client->local->hostp->h_name);
return nbuf;
}
/*
* Set sockhost to 'host'. Skip the user@ part of 'host' if necessary.
*/
void set_sockhost(Client *client, const char *host)
{
const char *s;
if ((s = strchr(host, '@')))
s++;
else
s = host;
strlcpy(client->local->sockhost, s, sizeof(client->local->sockhost));
}
/** Returns 1 if 'from' is on the allow list of 'to' */
int on_dccallow_list(Client *to, Client *from)
{
Link *lp;
for(lp = to->user->dccallow; lp; lp = lp->next)
if (lp->flags == DCC_LINK_ME && lp->value.client == from)
return 1;
return 0;
}
/** Delete all DCCALLOW references.
* Ultimately, this should be moved to modules/dccallow.c
*/
void remove_dcc_references(Client *client)
{
Client *acptr;
Link *lp, *nextlp;
Link **lpp, *tmp;
int found;
lp = client->user->dccallow;
while(lp)
{
nextlp = lp->next;
acptr = lp->value.client;
for(found = 0, lpp = &(acptr->user->dccallow); *lpp; lpp=&((*lpp)->next))
{
if (lp->flags == (*lpp)->flags)
continue; /* match only opposite types for sanity */
if ((*lpp)->value.client == client)
{
if ((*lpp)->flags == DCC_LINK_ME)
{
sendto_one(acptr, NULL, ":%s %d %s :%s has been removed from "
"your DCC allow list for signing off",
me.name, RPL_DCCINFO, acptr->name, client->name);
}
tmp = *lpp;
*lpp = tmp->next;
free_link(tmp);
found++;
break;
}
}
if (!found)
{
unreal_log(ULOG_WARNING, "main", "BUG_REMOVE_DCC_REFERENCES", acptr,
"[BUG] remove_dcc_references: $client was in dccallowme "
"list of $existing_client but not in dccallowrem list!",
log_data_client("existing_client", client));
}
free_link(lp);
lp = nextlp;
}
}
/*
* Remove all clients that depend on source_p; assumes all (S)QUITs have
* already been sent. we make sure to exit a server's dependent clients
* and servers before the server itself; exit_one_client takes care of
* actually removing things off llists. tweaked from +CSr31 -orabidoo
*/
static void recurse_remove_clients(Client *client, MessageTag *mtags, const char *comment)
{
Client *acptr, *next;
list_for_each_entry_safe(acptr, next, &client_list, client_node)
{
if (acptr->uplink != client)
continue;
exit_one_client(acptr, mtags, comment);
}
list_for_each_entry_safe(acptr, next, &global_server_list, client_node)
{
if (acptr->uplink != client)
continue;
recurse_remove_clients(acptr, mtags, comment);
exit_one_client(acptr, mtags, comment);
}
}
/*
** Remove *everything* that depends on source_p, from all lists, and sending
** all necessary QUITs and SQUITs. source_p itself is still on the lists,
** and its SQUITs have been sent except for the upstream one -orabidoo
*/
static void remove_dependents(Client *client, Client *from, MessageTag *mtags, const char *comment, const char *splitstr)
{
Client *acptr;
list_for_each_entry(acptr, &global_server_list, client_node)
{
if (acptr != from && !(acptr->direction && (acptr->direction == from)))
sendto_one(acptr, mtags, "SQUIT %s :%s", client->name, comment);
}
recurse_remove_clients(client, mtags, splitstr);
}
/*
** Exit one client, local or remote. Assuming all dependants have
** been already removed, and socket closed for local client.
*/
static void exit_one_client(Client *client, MessageTag *mtags_i, const char *comment)
{
Link *lp;
Membership *mp;
assert(!IsMe(client));
if (IsUser(client))
{
MessageTag *mtags_o = NULL;
if (!MyUser(client))
RunHook(HOOKTYPE_REMOTE_QUIT, client, mtags_i, comment);
new_message_special(client, mtags_i, &mtags_o, ":%s QUIT", client->name);
sendto_local_common_channels(client, NULL, 0, mtags_o, ":%s QUIT :%s", client->name, comment);
free_message_tags(mtags_o);
while ((mp = client->user->channel))
remove_user_from_channel(client, mp->channel, 1);
/* again, this is all that is needed */
/* Clean up dccallow list and (if needed) notify other clients
* that have this person on DCCALLOW that the user just left/got removed.
*/
remove_dcc_references(client);
/* For remote clients, we need to check for any outstanding async
* connects attached to this 'client', and set those records to NULL.
* Why not for local? Well, we already do that in close_connection ;)
*/
if (!MyConnect(client))
unrealdns_delreq_bycptr(client);
}
/* Free module related data for this client */
moddata_free_client(client);
if (MyConnect(client))
moddata_free_local_client(client);
/* Remove client from the client list */
if (*client->id)
{
del_from_id_hash_table(client->id, client);
*client->id = '\0';
}
if (*client->name)
del_from_client_hash_table(client->name, client);
if (remote_rehash_client == client)
remote_rehash_client = NULL; /* client did a /REHASH and QUIT before rehash was complete */
remove_client_from_list(client);
}
/** Exit this IRC client, and all the dependents (users, servers) if this is a server.
* @param client The client to exit.
* @param recv_mtags Message tags to use as a base (if any).
* @param comment The (s)quit message
*/
void exit_client(Client *client, MessageTag *recv_mtags, const char *comment)
{
exit_client_ex(client, client->direction, recv_mtags, comment);
}
/** Exit this IRC client, and all the dependents (users, servers) if this is a server.
* @param client The client to exit.
* @param recv_mtags Message tags to use as a base (if any).
* @param comment The (s)quit message
*/
void exit_client_fmt(Client *client, MessageTag *recv_mtags, FORMAT_STRING(const char *pattern), ...)
{
char comment[512];
va_list vl;
va_start(vl, pattern);
vsnprintf(comment, sizeof(comment), pattern, vl);
va_end(vl);
exit_client_ex(client, client->direction, recv_mtags, comment);
}
/** Exit this IRC client, and all the dependents (users, servers) if this is a server.
* @param client The client to exit.
* @param recv_mtags Message tags to use as a base (if any).
* @param comment The (s)quit message
*/
void exit_client_ex(Client *client, Client *origin, MessageTag *recv_mtags, const char *comment)
{
long long on_for;
ConfigItem_listen *listen_conf;
MessageTag *mtags_generated = NULL;
if (IsDead(client))
return; /* Already marked as exited */
/* We replace 'recv_mtags' here with a newly
* generated id if 'recv_mtags' is NULL or is
* non-NULL and contains no msgid etc.
* This saves us from doing a new_message()
* prior to the exit_client() call at around
* 100+ places elsewhere in the code.
*/
new_message(client, recv_mtags, &mtags_generated);
recv_mtags = mtags_generated;
if (MyConnect(client))
{
if (client->local->class)
{
client->local->class->clients--;
if ((client->local->class->flag.temporary) && !client->local->class->clients && !client->local->class->xrefcount)
{
delete_classblock(client->local->class);
client->local->class = NULL;
}
}
if (IsUser(client))
irccounts.me_clients--;
if (client->server && client->server->conf)
{
client->server->conf->refcount--;
if (!client->server->conf->refcount
&& client->server->conf->flag.temporary)
{
delete_linkblock(client->server->conf);
client->server->conf = NULL;
}
}
if (IsServer(client))
{
irccounts.me_servers--;
if (!IsServerDisconnectLogged(client))
{
unreal_log(ULOG_ERROR, "link", "LINK_DISCONNECTED", client,
"Lost server link to $client [$client.ip]: $reason",
log_data_string("reason", comment));
}
}
free_pending_net(client);
if (client->local->listener)
if (client->local->listener && !IsOutgoing(client))
{
listen_conf = client->local->listener;
listen_conf->clients--;
if (listen_conf->flag.temporary && (listen_conf->clients == 0))
{
/* Call listen cleanup */
listen_cleanup();
}
}
SetClosing(client);
if (IsUser(client))
{
long connected_time = TStime() - client->local->creationtime;
RunHook(HOOKTYPE_LOCAL_QUIT, client, recv_mtags, comment);
unreal_log(ULOG_INFO, "connect", "LOCAL_CLIENT_DISCONNECT", client,
"Client exiting: $client ($client.user.username@$client.hostname) [$client.ip] ($reason)",
log_data_string("extended_client_info", get_connect_extinfo(client)),
log_data_string("reason", comment),
log_data_integer("connected_time", connected_time));
} else
if (IsUnknown(client))
{
RunHook(HOOKTYPE_UNKUSER_QUIT, client, recv_mtags, comment);
}
if (client->local->fd >= 0 && !IsConnecting(client))
{
sendto_one(client, NULL, "ERROR :Closing Link: %s (%s)",
get_client_name(client, FALSE), comment);
}
close_connection(client);
}
else if (IsUser(client) && !IsULine(client))
{
if (client->uplink != &me)
{
unreal_log(ULOG_INFO, "connect", "REMOTE_CLIENT_DISCONNECT", client,
"Client exiting: $client ($client.user.username@$client.hostname) [$client.ip] ($reason)",
log_data_string("extended_client_info", get_connect_extinfo(client)),
log_data_string("reason", comment),
log_data_string("from_server_name", client->user->server));
}
}
/*
* Recurse down the client list and get rid of clients who are no
* longer connected to the network (from my point of view)
* Only do this expensive stuff if exited==server -Donwulff
*/
if (IsServer(client))
{
char splitstr[HOSTLEN + HOSTLEN + 2];
assert(client->server != NULL && client->uplink != NULL);
if (FLAT_MAP)
strlcpy(splitstr, "*.net *.split", sizeof splitstr);
else
ircsnprintf(splitstr, sizeof splitstr, "%s %s", client->uplink->name, client->name);
remove_dependents(client, origin, recv_mtags, comment, splitstr);
RunHook(HOOKTYPE_SERVER_QUIT, client, recv_mtags);
}
else if (IsUser(client) && !IsKilled(client))
{
sendto_server(client, 0, 0, recv_mtags, ":%s QUIT :%s", client->id, comment);
}
/* Finally, the client/server itself exits.. */
exit_one_client(client, recv_mtags, comment);
free_message_tags(mtags_generated);
}
/** Initialize the (quite useless) IRC statistics */
void initstats(void)
{
memset(&ircstats, 0, sizeof(ircstats));
}
/** Verify operator count, to catch bugs introduced by flawed services */
void verify_opercount(Client *orig, const char *tag)
{
int counted = 0;
Client *client;
char text[2048];
list_for_each_entry(client, &client_list, client_node)
{
if (IsOper(client) && !IsHideOper(client))
counted++;
}
if (counted == irccounts.operators)
return;
unreal_log(ULOG_WARNING, "main", "BUG_LUSERS_OPERS", orig,
"[BUG] Operator count bug at $where! Value in /LUSERS is $opers, "
"we counted $counted_opers, "
"triggered by $client.details on $client.user.servername",
log_data_integer("opers", irccounts.operators),
log_data_integer("counted_opers", counted),
log_data_string("where", tag));
irccounts.operators = counted;
}
/** Check if the specified hostname does not contain forbidden characters.
* @param host The host name to check
* @param strict If set to 1 then we also check if the hostname
* resembles an IP address (eg contains ':') and
* some other stuff that we don't consider valid
* in actual DNS names (eg '/').
* @returns 1 if valid, 0 if not.
*/
int valid_host(const char *host, int strict)
{
const char *p;
if (!*host)
return 0; /* must at least contain something */
if (strlen(host) > HOSTLEN)
return 0; /* too long hosts are invalid too */
if (strict)
{
for (p=host; *p; p++)
if (!isalnum(*p) && !strchr("_-.", *p))
return 0;
} else {
for (p=host; *p; p++)
if (!isalnum(*p) && !strchr("_-.:/", *p))
return 0;
}
return 1;
}
/*|| BAN ACTION ROUTINES FOLLOW ||*/
/** Converts a banaction string (eg: "kill") to an integer value (eg: BAN_ACT_KILL) */
BanAction banact_stringtoval(const char *s)
{
BanActTable *b;
for (b = &banacttable[0]; b->value; b++)
if (!strcasecmp(s, b->name))
return b->value;
return 0;
}
/** Converts a banaction character (eg: 'K') to an integer value (eg: BAN_ACT_KILL) */
BanAction banact_chartoval(char c)
{
BanActTable *b;
for (b = &banacttable[0]; b->value; b++)
if (b->character == c)
return b->value;
return 0;
}
/** Converts a banaction value (eg: BAN_ACT_KILL) to a character value (eg: 'k') */
char banact_valtochar(BanAction val)
{
BanActTable *b;
for (b = &banacttable[0]; b->value; b++)
if (b->value == val)
return b->character;
return '\0';
}
/** Converts a banaction value (eg: BAN_ACT_KLINE) to a string (eg: "kline") */
const char *banact_valtostring(BanAction val)
{
BanActTable *b;
for (b = &banacttable[0]; b->value; b++)
if (b->value == val)
return b->name;
return "UNKNOWN";
}
/*|| BAN TARGET ROUTINES FOLLOW ||*/
/** Extract target flags from string 's'. */
int spamfilter_gettargets(const char *s, Client *client)
{
SpamfilterTargetTable *e;
int flags = 0;
for (; *s; s++)
{
for (e = &spamfiltertargettable[0]; e->value; e++)
if (e->character == *s)
{
flags |= e->value;
break;
}
if (!e->value && client)
{
sendnotice(client, "Unknown target type '%c'", *s);
return 0;
}
}
return flags;
}
/** Convert a string with a targetname to an integer value */
int spamfilter_getconftargets(const char *s)
{
SpamfilterTargetTable *e;
for (e = &spamfiltertargettable[0]; e->value; e++)
if (!strcmp(s, e->name))
return e->value;
return 0;
}
/** Create a string with (multiple) targets from an integer mask */
char *spamfilter_target_inttostring(int v)
{
static char buf[128];
SpamfilterTargetTable *e;
char *p = buf;
for (e = &spamfiltertargettable[0]; e->value; e++)
if (v & e->value)
*p++ = e->character;
*p = '\0';
return buf;
}
/** Replace underscores back to the space character.
* This is used for the spamfilter reason.
*/
char *unreal_decodespace(char *s)
{
static char buf[512], *i, *o;
for (i = s, o = buf; (*i) && (o < buf+510); i++)
if (*i == '_')
{
if (i[1] != '_')
*o++ = ' ';
else {
*o++ = '_';
i++;
}
}
else
*o++ = *i;
*o = '\0';
return buf;
}
/** Replace spaces to underscore characters.
* This is used for the spamfilter reason.
*/
char *unreal_encodespace(char *s)
{
static char buf[512], *i, *o;
if (!s)
return NULL; /* NULL in = NULL out */
for (i = s, o = buf; (*i) && (o < buf+509); i++)
{
if (*i == ' ')
*o++ = '_';
else if (*i == '_')
{
*o++ = '_';
*o++ = '_';
}
else
*o++ = *i;
}
*o = '\0';
return buf;
}
/** This is basically only used internally by match_spamfilter()... */
const char *cmdname_by_spamftarget(int target)
{
SpamfilterTargetTable *e;
for (e = &spamfiltertargettable[0]; e->value; e++)
if (e->value == target)
return e->irccommand;
return "???";
}
/** Returns 1 if this is a channel from set::auto-join or set::oper-auto-join */
int is_autojoin_chan(const char *chname)
{
char buf[512];
char *p, *name;
if (OPER_AUTO_JOIN_CHANS)
{
strlcpy(buf, OPER_AUTO_JOIN_CHANS, sizeof(buf));
for (name = strtoken(&p, buf, ","); name; name = strtoken(&p, NULL, ","))
if (!strcasecmp(name, chname))
return 1;
}
if (AUTO_JOIN_CHANS)
{
strlcpy(buf, AUTO_JOIN_CHANS, sizeof(buf));
for (name = strtoken(&p, buf, ","); name; name = strtoken(&p, NULL, ","))
if (!strcasecmp(name, chname))
return 1;
}
return 0;
}
/** Free all masks in the mask list */
void unreal_delete_masks(ConfigItem_mask *m)
{
ConfigItem_mask *m_next;
for (; m; m = m_next)
{
m_next = m->next;
safe_free(m->mask);
safe_free(m);
}
}
/** Internal function to add one individual mask to the list */
static void unreal_add_mask(ConfigItem_mask **head, ConfigEntry *ce)
{
ConfigItem_mask *m = safe_alloc(sizeof(ConfigItem_mask));
/* Since we allow both mask "xyz"; and mask { abc; def; };... */
if (ce->value)
safe_strdup(m->mask, ce->value);
else
safe_strdup(m->mask, ce->name);
add_ListItem((ListStruct *)m, (ListStruct **)head);
}
/** Add mask entries from config */
void unreal_add_masks(ConfigItem_mask **head, ConfigEntry *ce)
{
if (ce->items)
{
ConfigEntry *cep;
for (cep = ce->items; cep; cep = cep->next)
unreal_add_mask(head, cep);
} else
{
unreal_add_mask(head, ce);
}
}
/** Check if a client matches any of the masks in the mask list.
* The following rules apply:
* - If you have only negating entries, like '!abc' and '!def', then
* we assume an implicit * rule first, since that is clearly what
* the user wants.
* - If you have a mix, like '*.com', '!irc1*', '!irc2*' then the
* implicit * is dropped and we assume you only want to match *.com,
* with the exception of irc1*.com and irc2*.com.
* - If you only have normal entries without ! then things are
* as they always are.
* @param client The client to run the mask match against
* @param mask The mask entry from the config file
* @returns 1 on match, 0 on non-match.
*/
int unreal_mask_match(Client *client, ConfigItem_mask *mask)
{
int retval = 1;
ConfigItem_mask *m;
if (!mask)
return 0; /* Empty mask block is no match */
/* First check normal matches (without ! prefix) */
for (m = mask; m; m = m->next)
{
if (m->mask[0] != '!')
{
retval = 0; /* no implicit * */
if (match_user(m->mask, client, MATCH_CHECK_REAL|MATCH_CHECK_EXTENDED))
{
retval = 1;
break;
}
}
}
if (retval)
{
/* We matched. Check for exceptions (with ! prefix) */
for (m = mask; m; m = m->next)
{
if ((m->mask[0] == '!') && match_user(m->mask+1, client, MATCH_CHECK_REAL|MATCH_CHECK_EXTENDED))
return 0;
}
}
return retval;
}
/** Check if a string matches any of the masks in the mask list.
* The following rules apply:
* - If you have only negating entries, like '!abc' and '!def', then
* we assume an implicit * rule first, since that is clearly what
* the user wants.
* - If you have a mix, like '*.com', '!irc1*', '!irc2*' then the
* implicit * is dropped and we assume you only want to match *.com,
* with the exception of irc1*.com and irc2*.com.
* - If you only have normal entries without ! then things are
* as they always are.
* @param name The name to run the mask matching on
* @param mask The mask entry from the config file
* @returns 1 on match, 0 on non-match.
*/
int unreal_mask_match_string(const char *name, ConfigItem_mask *mask)
{
int retval = 1;
ConfigItem_mask *m;
if (!mask)
return 0; /* Empty mask block is no match */
/* First check normal matches (without ! prefix) */
for (m = mask; m; m = m->next)
{
if (m->mask[0] != '!')
{
retval = 0; /* no implicit * */
if (match_simple(m->mask, name))
{
retval = 1;
break;
}
}
}
if (retval)
{
/* We matched. Check for exceptions (with ! prefix) */
for (m = mask; m; m = m->next)
{
if ((m->mask[0] == '!') && match_simple(m->mask+1, name))
return 0;
}
}
return retval;
}
/** Our own strcasestr implementation because strcasestr is
* often not available or is not working correctly.
*/
char *our_strcasestr(const char *haystack, const char *needle)
{
int i;
int nlength = strlen(needle);
int hlength = strlen(haystack);
if (nlength > hlength)
return NULL;
if (hlength <= 0)
return NULL;
if (nlength <= 0)
return (char *)haystack;
for (i = 0; i <= (hlength - nlength); i++)
{
if (strncasecmp (haystack + i, needle, nlength) == 0)
return (char *)(haystack + i);
}
return NULL; /* not found */
}
/** Add a title to the users' WHOIS ("special whois"). Broadcast change to servers.
* @param client The client
* @param tag A tag used internally and for server-to-server traffic,
* not visible to end-users.
* @param priority Priority - for ordering multiple swhois entries
* (lower number = further up in the swhoises list in WHOIS)
* @param swhois The actual special whois title (string) you want to add to the user
* @param from Who added this entry
* @param skip Which server(-side) to skip broadcasting this entry to.
*/
int swhois_add(Client *client, const char *tag, int priority, const char *swhois, Client *from, Client *skip)
{
SWhois *s;
/* Make sure the line isn't added yet. If so, then bail out silently. */
for (s = client->user->swhois; s; s = s->next)
if (!strcmp(s->line, swhois))
return -1; /* exists */
s = safe_alloc(sizeof(SWhois));
safe_strdup(s->line, swhois);
safe_strdup(s->setby, tag);
s->priority = priority;
AddListItemPrio(s, client->user->swhois, s->priority);
sendto_server(skip, 0, PROTO_EXTSWHOIS, NULL, ":%s SWHOIS %s :%s",
from->id, client->id, swhois);
sendto_server(skip, PROTO_EXTSWHOIS, 0, NULL, ":%s SWHOIS %s + %s %d :%s",
from->id, client->id, tag, priority, swhois);
return 0;
}
/** Delete swhois title(s).
* Delete swhois by tag and swhois. Then broadcast this change to all other servers.
* @param client The client
* @param tag A tag used internally and for server-to-server traffic,
* not visible to end-users.
* @param swhois The actual special whois title (string) you are removing
* @param from Who added this entry earlier on
* @param skip Which server(-side) to skip broadcasting this entry to.
* @note If you use swhois "*" then it will remove all swhois titles for that tag
*/
int swhois_delete(Client *client, const char *tag, const char *swhois, Client *from, Client *skip)
{
SWhois *s, *s_next;
int ret = -1; /* default to 'not found' */
for (s = client->user->swhois; s; s = s_next)
{
s_next = s->next;
/* If ( same swhois or "*" ) AND same tag */
if ( ((!strcmp(s->line, swhois) || !strcmp(swhois, "*")) &&
!strcmp(s->setby, tag)))
{
DelListItem(s, client->user->swhois);
safe_free(s->line);
safe_free(s->setby);
safe_free(s);
sendto_server(skip, 0, PROTO_EXTSWHOIS, NULL, ":%s SWHOIS %s :",
from->id, client->id);
sendto_server(skip, PROTO_EXTSWHOIS, 0, NULL, ":%s SWHOIS %s - %s %d :%s",
from->id, client->id, tag, 0, swhois);
ret = 0;
}
}
return ret;
}
/** Is this user using a websocket? (LOCAL USERS ONLY) */
int IsWebsocket(Client *client)
{
ModDataInfo *md = findmoddata_byname("websocket", MODDATATYPE_CLIENT);
if (!md)
return 0; /* websocket module not loaded */
return (MyConnect(client) && moddata_client(client, md).ptr) ? 1 : 0;
}
/** Generic function to inform the user he/she has been banned.
* @param client The affected client.
* @param bantype The ban type, such as: "K-Lined", "G-Lined" or "realname".
* @param reason The specified reason.
* @param global Whether the ban is global (1) or for this server only (0)
* @param noexit Set this to NO_EXIT_CLIENT to make us not call exit_client().
* This is really only needed from the accept code, do not
* use it anywhere else. No really, never.
*
* @note This function will call exit_client() appropriately.
*/
void banned_client(Client *client, const char *bantype, const char *reason, int global, int noexit)
{
char buf[512];
char *fmt = global ? iConf.reject_message_gline : iConf.reject_message_kline;
const char *vars[6], *values[6];
if (!MyConnect(client))
abort(); /* hmm... or be more flexible? */
/* This was: "You are not welcome on this %s. %s: %s. %s" but is now dynamic: */
vars[0] = "bantype";
values[0] = bantype;
vars[1] = "banreason";
values[1] = reason;
vars[2] = "klineaddr";
values[2] = KLINE_ADDRESS;
vars[3] = "glineaddr";
values[3] = GLINE_ADDRESS ? GLINE_ADDRESS : KLINE_ADDRESS; /* fallback to klineaddr */
vars[4] = "ip";
values[4] = GetIP(client);
vars[5] = NULL;
values[5] = NULL;
buildvarstring(fmt, buf, sizeof(buf), vars, values);
/* This is a bit extensive but we will send both a YOUAREBANNEDCREEP
* and a notice to the user.
* The YOUAREBANNEDCREEP will be helpful for the client since it makes
* clear the user should not quickly reconnect, as (s)he is banned.
* The notice still needs to be there because it stands out well
* at most IRC clients.
*/
if (noexit != NO_EXIT_CLIENT)
{
sendnumeric(client, ERR_YOUREBANNEDCREEP, buf);
sendnotice(client, "%s", buf);
} else {
send_raw_direct(client, ":%s %d %s :%s",
me.name, ERR_YOUREBANNEDCREEP,
(*client->name ? client->name : "*"),
buf);
send_raw_direct(client, ":%s NOTICE %s :%s",
me.name, (*client->name ? client->name : "*"), buf);
}
/* The final message in the ERROR is shorter. */
if (HIDE_BAN_REASON && IsRegistered(client))
snprintf(buf, sizeof(buf), "Banned (%s)", bantype);
else
snprintf(buf, sizeof(buf), "Banned (%s): %s", bantype, reason);
if (noexit != NO_EXIT_CLIENT)
{
exit_client(client, NULL, buf);
} else {
/* Special handling for direct Z-line code */
send_raw_direct(client, "ERROR :Closing Link: [%s] (%s)",
client->ip, buf);
}
}
/** Our stpcpy implementation - discouraged due to lack of bounds checking */
char *mystpcpy(char *dst, const char *src)
{
for (; *src; src++)
*dst++ = *src;
*dst = '\0';
return dst;
}
/** Helper function for send_channel_modes_sjoin3() and cmd_sjoin()
* to build the SJSBY prefix which is <seton,setby> to
* communicate when the ban was set and by whom.
* @param buf The buffer to write to
* @param setby The setter of the "ban"
* @param seton The time the "ban" was set
* @retval The number of bytes written EXCLUDING the NUL byte,
* so similar to what strlen() would have returned.
* @note Caller must ensure that the buffer 'buf' is of sufficient size.
*/
size_t add_sjsby(char *buf, const char *setby, time_t seton)
{
char tbuf[32];
char *p = buf;
snprintf(tbuf, sizeof(tbuf), "%ld", (long)seton);
*p++ = '<';
p = mystpcpy(p, tbuf);
*p++ = ',';
p = mystpcpy(p, setby);
*p++ = '>';
*p = '\0';
return p - buf;
}
/** Concatenate the entire parameter string.
* The function will take care of spaces in the final parameter (if any).
* @param buf The buffer to output in.
* @param len Length of the buffer.
* @param parc Parameter count, ircd style.
* @param parv Parameters, ircd style, so we will start at parv[1].
* @section ex1 Example
* @code
* char buf[512];
* concat_params(buf, sizeof(buf), parc, parv);
* sendto_server(client, 0, 0, recv_mtags, ":%s SOMECOMMAND %s", client->name, buf);
* @endcode
*/
void concat_params(char *buf, int len, int parc, const char *parv[])
{
int i;
*buf = '\0';
for (i = 1; i < parc; i++)
{
const char *param = parv[i];
if (!param)
break;
if (*buf)
strlcat(buf, " ", len);
if (strchr(param, ' ') || (*param == ':'))
{
/* Last parameter, with : */
strlcat(buf, ":", len);
strlcat(buf, parv[i], len);
break;
}
strlcat(buf, parv[i], len);
}
}
/** Find a particular message-tag in the 'mtags' list */
MessageTag *find_mtag(MessageTag *mtags, const char *token)
{
for (; mtags; mtags = mtags->next)
if (!strcmp(mtags->name, token))
return mtags;
return NULL;
}
/** Free all message tags in the list 'm' */
void free_message_tags(MessageTag *m)
{
MessageTag *m_next;
for (; m; m = m_next)
{
m_next = m->next;
safe_free(m->name);
safe_free(m->value);
safe_free(m);
}
}
/** Duplicate a MessageTag structure.
* @note This duplicate a single MessageTag.
* It does not duplicate an entire linked list.
*/
MessageTag *duplicate_mtag(MessageTag *mtag)
{
MessageTag *m = safe_alloc(sizeof(MessageTag));
safe_strdup(m->name, mtag->name);
safe_strdup(m->value, mtag->value);
return m;
}
/** New message. Either really brand new, or inherited from other servers.
* This function calls modules so they can add tags, such as:
* msgid, time and account.
*/
void new_message(Client *sender, MessageTag *recv_mtags, MessageTag **mtag_list)
{
Hook *h;
for (h = Hooks[HOOKTYPE_NEW_MESSAGE]; h; h = h->next)
(*(h->func.voidfunc))(sender, recv_mtags, mtag_list, NULL);
}
/** New message - SPECIAL edition. Either really brand new, or inherited
* from other servers.
* This function calls modules so they can add tags, such as:
* msgid, time and account.
* This special version deals in a special way with msgid in particular.
* The pattern and vararg create a 'signature', this is normally
* identical to the message that is sent to clients (end-users).
* For example ":xyz JOIN #chan".
*/
void new_message_special(Client *sender, MessageTag *recv_mtags, MessageTag **mtag_list, FORMAT_STRING(const char *pattern), ...)
{
Hook *h;
va_list vl;
char buf[512];
va_start(vl, pattern);
ircvsnprintf(buf, sizeof(buf), pattern, vl);
va_end(vl);
for (h = Hooks[HOOKTYPE_NEW_MESSAGE]; h; h = h->next)
(*(h->func.voidfunc))(sender, recv_mtags, mtag_list, buf);
}
/** Default handler for parse_message_tags().
* This is only used if the 'mtags' module is NOT loaded,
* which would be quite unusual, but possible.
*/
void parse_message_tags_default_handler(Client *client, char **str, MessageTag **mtag_list)
{
/* Just skip everything until the space character */
for (; **str && **str != ' '; *str = *str + 1);
}
/** Default handler for mtags_to_string().
* This is only used if the 'mtags' module is NOT loaded,
* which would be quite unusual, but possible.
*/
const char *mtags_to_string_default_handler(MessageTag *m, Client *client)
{
return NULL;
}
/** Default handler for add_silence().
* This is only used if the 'silence' module is NOT loaded,
* which would be unusual, but possible.
*/
int add_silence_default_handler(Client *client, const char *mask, int senderr)
{
return 0;
}
/** Default handler for del_silence().
* This is only used if the 'silence' module is NOT loaded,
* which would be unusual, but possible.
*/
int del_silence_default_handler(Client *client, const char *mask)
{
return 0;
}
/** Default handler for is_silenced().
* This is only used if the 'silence' module is NOT loaded,
* which would be unusual, but possible.
*/
int is_silenced_default_handler(Client *client, Client *acptr)
{
return 0;
}
/** Generate a BATCH id.
* This can be used in a :serv BATCH +%s ... message
*/
void generate_batch_id(char *str)
{
gen_random_alnum(str, BATCHLEN);
}
/** A default handler if labeled-response module is not loaded.
* Normally a NOOP, but since caller will safe_free it
* later we do actually allocate something.
*/
void *labeled_response_save_context_default_handler(void)
{
return safe_alloc(8);
}
/** A default handler for if labeled-response module is not loaded */
void labeled_response_set_context_default_handler(void *ctx)
{
}
/** A default handler for if labeled-response module is not loaded */
void labeled_response_force_end_default_handler(void)
{
}
/** Ad default handler for if the slog module is not loaded */
void do_unreal_log_remote_deliver_default_handler(LogLevel loglevel, const char *subsystem, const char *event_id, MultiLine *msg, const char *json_serialized)
{
}
/** my_timegm: mktime()-like function which will use GMT/UTC.
* Strangely enough there is no standard function for this.
* On some *NIX OS's timegm() may be available, sometimes only
* with the help of certain #define's which we may or may
* not do.
* Windows provides _mkgmtime().
* In the other cases the man pages and basically everyone
* suggests to set TZ to empty prior to calling mktime and
* restoring it after the call. Whut? How ridiculous is that?
*/
time_t my_timegm(struct tm *tm)
{
#if HAVE_TIMEGM
return timegm(tm);
#elif defined(_WIN32)
return _mkgmtime(tm);
#else
time_t ret;
char *tz = NULL;
safe_strdup(tz, getenv("TZ"));
setenv("TZ", "", 1);
ret = mktime(tm);
if (tz)
{
setenv("TZ", tz, 1);
safe_free(tz);
} else {
unsetenv("TZ");
}
tzset();
return ret;
#endif
}
/** Convert an ISO 8601 timestamp ('server-time') to UNIX time */
time_t server_time_to_unix_time(const char *tbuf)
{
struct tm tm;
int dontcare = 0;
time_t ret;
if (!tbuf)
return 0;
if (strlen(tbuf) < 20)
return 0;
memset(&tm, 0, sizeof(tm));
ret = sscanf(tbuf, "%d-%d-%dT%d:%d:%d.%dZ",
&tm.tm_year,
&tm.tm_mon,
&tm.tm_mday,
&tm.tm_hour,
&tm.tm_min,
&tm.tm_sec,
&dontcare);
if (ret != 7)
return 0;
tm.tm_year -= 1900;
tm.tm_mon -= 1;
ret = my_timegm(&tm);
return ret;
}
/** Convert an RFC 2616 timestamp (used in HTTP headers) to UNIX time */
time_t rfc2616_time_to_unix_time(const char *tbuf)
{
struct tm tm;
int dontcare = 0;
time_t ret;
char month[8];
int i;
if (!tbuf)
return 0;
if (strlen(tbuf) < 20)
return 0;
memset(&tm, 0, sizeof(tm));
*month = '\0';
ret = sscanf(tbuf, "%*[a-zA-Z,] %d %3s %d %d:%d:%d",
&tm.tm_mday, month, &tm.tm_year,
&tm.tm_hour, &tm.tm_min, &tm.tm_sec);
if (ret < 6)
return 0;
for (i=0; i < 12; i++)
{
if (!strcmp(short_months[i], month))
{
tm.tm_mon = i;
break;
}
}
if (i == 12)
return 0; /* Month not found */
if (tm.tm_year < 1900)
return 0;
tm.tm_year -= 1900;
ret = my_timegm(&tm);
return ret; /* can still be 0 */
}
/** Returns an RFC 2616 timestamp (used in HTTP headers) */
const char *rfc2616_time(time_t clock)
{
static char buf[80], plus;
struct tm *lt, *gm;
struct tm gmbuf;
int minswest;
if (!clock)
time(&clock);
gm = gmtime(&clock);
snprintf(buf, sizeof(buf),
"%s, %02d %.3s %4d %02d:%02d:%02d GMT",
short_weekdays[gm->tm_wday], gm->tm_mday, short_months[gm->tm_mon],
gm->tm_year + 1900, gm->tm_hour, gm->tm_min, gm->tm_sec);
return buf;
}
/** Write a 64 bit integer to a file.
* @param fd File descriptor
* @param t The value to write
* @returns 1 on success, 0 on failure.
*/
int write_int64(FILE *fd, uint64_t t)
{
if (fwrite(&t, 1, sizeof(t), fd) < sizeof(t))
return 0;
return 1;
}
/** Write a 32 bit integer to a file.
* @param fd File descriptor
* @param t The value to write
* @returns 1 on success, 0 on failure.
*/
int write_int32(FILE *fd, uint32_t t)
{
if (fwrite(&t, 1, sizeof(t), fd) < sizeof(t))
return 0;
return 1;
}
/** Read a 64 bit integer from a file.
* @param fd File descriptor
* @param t The value to write
* @returns 1 on success, 0 on failure.
*/
int read_int64(FILE *fd, uint64_t *t)
{
if (fread(t, 1, sizeof(uint64_t), fd) < sizeof(uint64_t))
return 0;
return 1;
}
/** Read a 32 bit integer from a file.
* @param fd File descriptor
* @param t The value to write
* @returns 1 on success, 0 on failure.
*/
int read_int32(FILE *fd, uint32_t *t)
{
if (fread(t, 1, sizeof(uint32_t), fd) < sizeof(uint32_t))
return 0;
return 1;
}
/** Read binary data from a file.
* @param fd File descriptor
* @param buf Pointer to buffer
* @param len Size of buffer
* @note This function is not used much, in most cases
* you should use read_str(), read_int32() or
* read_int64() instead.
* @returns 1 on success, 0 on failure.
*/
int read_data(FILE *fd, void *buf, size_t len)
{
if (fread(buf, 1, len, fd) < len)
return 0;
return 1;
}
/** Write binary data to a file.
* @param fd File descriptor
* @param buf Pointer to buffer
* @param len Size of buffer
* @note This function is not used much, in most cases
* you should use write_str(), write_int32() or
* write_int64() instead.
* @returns 1 on success, 0 on failure.
*/
int write_data(FILE *fd, const void *buf, size_t len)
{
if (fwrite(buf, 1, len, fd) < len)
return 0;
return 1;
}
/** Write a string to a file.
* @param fd File descriptor
* @param x Pointer to string
* @note This function can write a string up to 65534
* characters, which should be plenty for usage
* in UnrealIRCd.
* Note that 'x' can safely be NULL.
* @returns 1 on success, 0 on failure.
*/
int write_str(FILE *fd, const char *x)
{
uint16_t len;
len = x ? strlen(x) : 0xffff;
if (!write_data(fd, &len, sizeof(len)))
return 0;
if ((len > 0) && (len < 0xffff))
{
if (!write_data(fd, x, len))
return 0;
}
return 1;
}
/** Read a string from a file.
* @param fd File descriptor
* @param x Pointer to string pointer
* @note This function will allocate memory for the data
* and set the string pointer to this value.
* If a NULL pointer was written via write_str()
* then read_str() may also return a NULL pointer.
* @returns 1 on success, 0 on failure.
*/
int read_str(FILE *fd, char **x)
{
uint16_t len;
size_t size;
*x = NULL;
if (!read_data(fd, &len, sizeof(len)))
return 0;
if (len == 0xffff)
{
/* Magic value meaning NULL */
*x = NULL;
return 1;
}
if (len == 0)
{
/* 0 means empty string */
safe_strdup(*x, "");
return 1;
}
if (len > 10000)
return 0;
size = len;
*x = safe_alloc(size + 1);
if (!read_data(fd, *x, size))
{
safe_free(*x);
return 0;
}
(*x)[len] = 0;
return 1;
}
/** Convert binary 'data' of size 'len' to a hexadecimal string 'str'.
* The caller is responsible to ensure that 'str' is sufficiently large.
*/
void binarytohex(void *data, size_t len, char *str)
{
const char hexchars[16] = "0123456789abcdef";
char *datastr = (char *)data;
int i, n = 0;
for (i=0; i<len; i++)
{
str[n++] = hexchars[(datastr[i] >> 4) & 0xF];
str[n++] = hexchars[datastr[i] & 0xF];
}
str[n] = '\0';
}
/** Generates an MD5 checksum - binary version.
* @param mdout[out] Buffer to store result in, the result will be 16 bytes in binary
* (not ascii printable!).
* @param src[in] The input data used to generate the checksum.
* @param n[in] Length of data.
* @deprecated The MD5 algorithm is deprecated and insecure,
* so only use this if absolutely needed.
*/
void DoMD5(char *mdout, const char *src, unsigned long n)
{
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
unsigned int md_len;
EVP_MD_CTX *mdctx = EVP_MD_CTX_new();
if (EVP_DigestInit_ex(mdctx, md5_function, NULL) != 1)
abort();
EVP_DigestUpdate(mdctx, src, n);
EVP_DigestFinal_ex(mdctx, mdout, &md_len);
EVP_MD_CTX_free(mdctx);
#else
MD5_CTX hash;
MD5_Init(&hash);
MD5_Update(&hash, src, n);
MD5_Final(mdout, &hash);
#endif
}
/** Generates an MD5 checksum - ASCII printable string (0011223344..etc..).
* @param dst[out] Buffer to store result in, this will be the result will be
* 32 characters + nul terminator, so needs to be at least 33 characters.
* @param src[in] The input data used to generate the checksum.
* @param n[in] Length of data.
* @deprecated The MD5 algorithm is deprecated and insecure,
* so only use this if absolutely needed.
*/
char *md5hash(char *dst, const char *src, unsigned long n)
{
char tmp[16];
DoMD5(tmp, src, n);
binarytohex(tmp, sizeof(tmp), dst);
return dst;
}
/** Generates a SHA256 checksum - binary version.
* Most people will want to use sha256hash() instead which outputs hex.
* @param dst[out] Buffer to store result in, which needs to be 32 bytes in length
* (SHA256_DIGEST_LENGTH).
* @param src[in] The input data used to generate the checksum.
* @param n[in] Length of data.
*/
void sha256hash_binary(char *dst, const char *src, unsigned long n)
{
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
unsigned int md_len;
EVP_MD_CTX *mdctx = EVP_MD_CTX_new();
if (EVP_DigestInit_ex(mdctx, sha256_function, NULL) != 1)
abort();
EVP_DigestUpdate(mdctx, src, n);
EVP_DigestFinal_ex(mdctx, dst, &md_len);
EVP_MD_CTX_free(mdctx);
#else
SHA256_CTX hash;
SHA256_Init(&hash);
SHA256_Update(&hash, src, n);
SHA256_Final(dst, &hash);
#endif
}
/** Generates a SHA256 checksum - ASCII printable string (0011223344..etc..).
* @param dst[out] Buffer to store result in, which needs to be 65 bytes minimum.
* @param src[in] The input data used to generate the checksum.
* @param n[in] Length of data.
*/
char *sha256hash(char *dst, const char *src, unsigned long n)
{
char binaryhash[SHA256_DIGEST_LENGTH];
sha256hash_binary(binaryhash, src, n);
binarytohex(binaryhash, sizeof(binaryhash), dst);
return dst;
}
/** Calculate the SHA256 checksum of a file */
const char *sha256sum_file(const char *fname)
{
FILE *fd;
char buf[2048];
SHA256_CTX hash;
char binaryhash[SHA256_DIGEST_LENGTH];
static char hexhash[SHA256_DIGEST_LENGTH*2+1];
int n;
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
unsigned int md_len;
EVP_MD_CTX *mdctx;
mdctx = EVP_MD_CTX_new();
if (EVP_DigestInit_ex(mdctx, sha256_function, NULL) != 1)
abort();
#else
SHA256_Init(&hash);
#endif
fd = fopen(fname, "rb");
if (!fd)
return NULL;
while ((n = fread(buf, 1, sizeof(buf), fd)) > 0)
{
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
EVP_DigestUpdate(mdctx, buf, n);
#else
SHA256_Update(&hash, buf, n);
#endif
}
fclose(fd);
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
EVP_DigestFinal_ex(mdctx, binaryhash, &md_len);
EVP_MD_CTX_free(mdctx);
#else
SHA256_Final(binaryhash, &hash);
#endif
binarytohex(binaryhash, sizeof(binaryhash), hexhash);
return hexhash;
}
/** Generates a SHA1 checksum - binary version.
* @param dst[out] Buffer to store result in, which needs to be 32 bytes in length
* (SHA1_DIGEST_LENGTH).
* @param src[in] The input data used to generate the checksum.
* @param n[in] Length of data.
* @deprecated The SHA1 algorithm is deprecated and insecure,
* so only use this if absolutely needed.
*/
void sha1hash_binary(char *dst, const char *src, unsigned long n)
{
#if OPENSSL_VERSION_NUMBER >= 0x30000000L
unsigned int md_len;
EVP_MD_CTX *mdctx = EVP_MD_CTX_new();
if (EVP_DigestInit_ex(mdctx, sha1_function, NULL) != 1)
abort();
EVP_DigestUpdate(mdctx, src, n);
EVP_DigestFinal_ex(mdctx, dst, &md_len);
EVP_MD_CTX_free(mdctx);
#else
SHA_CTX hash;
SHA1_Init(&hash);
SHA1_Update(&hash, src, n);
SHA1_Final(dst, &hash);
#endif
}
/** Remove a suffix from a filename, eg ".c" (if it is present) */
char *filename_strip_suffix(const char *fname, const char *suffix)
{
static char buf[512];
strlcpy(buf, fname, sizeof(buf));
if (suffix)
{
int buf_len = strlen(buf);
int suffix_len = strlen(suffix);
if (buf_len >= suffix_len)
{
if (!strncmp(buf+buf_len-suffix_len, suffix, suffix_len))
buf[buf_len-suffix_len] = '\0';
}
} else {
char *p = strrchr(buf, '.');
if (p)
*p = '\0';
}
return buf;
}
/** Add a suffix to a filename, eg ".c" */
char *filename_add_suffix(const char *fname, const char *suffix)
{
static char buf[512];
snprintf(buf, sizeof(buf), "%s%s", fname, suffix);
return buf;
}
/* Returns 1 if the filename has the suffix, eg ".c" */
int filename_has_suffix(const char *fname, const char *suffix)
{
char buf[256];
char *p;
strlcpy(buf, fname, sizeof(buf));
p = strrchr(buf, '.');
if (!p)
return 0;
if (!strcmp(p, suffix))
return 1;
return 0;
}
/** Check if the specified file or directory exists */
int file_exists(const char *file)
{
#ifdef _WIN32
if (_access(file, 0) == 0)
#else
if (access(file, 0) == 0)
#endif
return 1;
return 0;
}
/** Get the file creation time */
time_t get_file_time(const char *fname)
{
struct stat st;
if (stat(fname, &st) != 0)
return 0;
return (time_t)st.st_ctime;
}
/** Get the size of a file */
long get_file_size(const char *fname)
{
struct stat st;
if (stat(fname, &st) != 0)
return -1;
return (long)st.st_size;
}
/** Add a line to a MultiLine list */
void addmultiline(MultiLine **l, const char *line)
{
MultiLine *m = safe_alloc(sizeof(MultiLine));
safe_strdup(m->line, line);
append_ListItem((ListStruct *)m, (ListStruct **)l);
}
/** Free an entire MultiLine list */
void freemultiline(MultiLine *l)
{
MultiLine *l_next;
for (; l; l = l_next)
{
l_next = l->next;
safe_free(l->line);
safe_free(l);
}
}
/** Convert a line regular string containing \n's to a MultiLine linked list */
MultiLine *line2multiline(const char *str)
{
static char buf[8192];
char *p, *p2;
MultiLine *ml = NULL;
strlcpy(buf, str, sizeof(buf));
p = buf;
do {
p2 = strchr(p, '\n');
if (p2)
*p2++ = '\0';
addmultiline(&ml, p);
p = p2;
} while(p2 && *p2);
return ml;
}
/** Convert a sendtype to a command string */
const char *sendtype_to_cmd(SendType sendtype)
{
if (sendtype == SEND_TYPE_PRIVMSG)
return "PRIVMSG";
if (sendtype == SEND_TYPE_NOTICE)
return "NOTICE";
if (sendtype == SEND_TYPE_TAGMSG)
return "TAGMSG";
return NULL;
}
/** Check password strength.
* @param pass The password to check
* @param min_length The minimum length of the password
* @param strict Whether to require UPPER+lower+digits
* @returns 1 if good, 0 if not.
*/
int check_password_strength(const char *pass, int min_length, int strict, char **err)
{
static char buf[256];
char has_lowercase=0, has_uppercase=0, has_digit=0;
const char *p;
if (err)
*err = NULL;
if (strlen(pass) < min_length)
{
if (err)
{
snprintf(buf, sizeof(buf), "Password must be at least %d characters", min_length);
*err = buf;
}
return 0;
}
for (p=pass; *p; p++)
{
if (islower(*p))
has_lowercase = 1;
else if (isupper(*p))
has_uppercase = 1;
else if (isdigit(*p))
has_digit = 1;
}
if (strict)
{
if (!has_lowercase)
{
if (err)
*err = "Password must contain at least 1 lowercase character";
return 0;
} else
if (!has_uppercase)
{
if (err)
*err = "Password must contain at least 1 UPPERcase character";
return 0;
} else
if (!has_digit)
{
if (err)
*err = "Password must contain at least 1 digit (number)";
return 0;
}
}
return 1;
}
int valid_secret_password(const char *pass, char **err)
{
return check_password_strength(pass, 10, 1, err);
}
int running_interactively(void)
{
#ifndef _WIN32
char *s;
if (!isatty(0))
return 0;
s = getenv("TERM");
if (!s || !strcasecmp(s, "dumb") || !strcasecmp(s, "none"))
return 0;
return 1;
#else
return IsService ? 0 : 1;
#endif
}
int terminal_supports_color(void)
{
#ifndef _WIN32
char *s;
/* Yeah we check all of stdin, stdout, stderr, because
* or more may be redirected (bin/unrealircd >log 2>&1),
* and then we want to say no to color support.
*/
if (!isatty(0) || !isatty(1) || !isatty(2))
return 0;
s = getenv("TERM");
/* Yeah this is a lazy way to detect color-capable terminals
* but it is good enough for me.
*/
if (s)
{
if (strstr(s, "color") || strstr(s, "ansi"))
return 1;
}
return 0;
#else
return 0;
#endif
}
/** Skip whitespace (if any) */
void skip_whitespace(char **p)
{
for (; **p == ' ' || **p == '\t'; *p = *p + 1);
}
/** Keep reading '*p' until we hit any of the 'stopchars'.
* Actually behaves like strstr() but then hit the end
* of the string (\0) i guess?
*/
void read_until(char **p, char *stopchars)
{
for (; **p && !strchr(stopchars, **p); *p = *p + 1);
}
void write_pidfile_failed(void)
{
char *errstr = strerror(errno);
unreal_log(ULOG_WARNING, "config", "WRITE_PID_FILE_FAILED", NULL,
"Unable to write to pid file '$filename': $system_error",
log_data_string("filename", conf_files->pid_file),
log_data_string("system_error", errstr));
}
/** Write PID file */
void write_pidfile(void)
{
#ifdef IRCD_PIDFILE
int fd;
char buff[20];
if ((fd = open(conf_files->pid_file, O_CREAT | O_WRONLY, 0600)) < 0)
{
write_pidfile_failed();
return;
}
ircsnprintf(buff, sizeof(buff), "%5d\n", (int)getpid());
if (write(fd, buff, strlen(buff)) < 0)
write_pidfile_failed();
if (close(fd) < 0)
write_pidfile_failed();
#endif
}
/*
* Determines if the given string is a valid URL. Since libcurl
* supports telnet, ldap, and dict such strings are treated as
* invalid URLs here since we don't want them supported in
* unreal.
*/
int url_is_valid(const char *string)
{
if (strstr(string, " ") || strstr(string, "\t"))
return 0;
if (strstr(string, "telnet://") == string ||
strstr(string, "ldap://") == string ||
strstr(string, "dict://") == string)
{
return 0;
}
return (strstr(string, "://") != NULL);
}
/** A displayable URL for in error messages and such.
* This leaves out any authentication information (user:pass)
* the URL may contain.
*/
const char *displayurl(const char *url)
{
static char buf[512];
char *proto, *rest;
/* protocol://user:pass@host/etc.. */
rest = strchr(url, '@');
if (!rest)
return url; /* contains no auth information */
rest++; /* now points to the rest (remainder) of the URL */
proto = strstr(url, "://");
if (!proto || (proto > rest) || (proto == url))
return url; /* incorrectly formatted, just show entire URL. */
strlncpy(buf, url, sizeof(buf), proto - url);
strlcat(buf, "://***:***@", sizeof(buf));
strlcat(buf, rest, sizeof(buf));
return buf;
}
/*
* Returns the filename portion of the URL. The returned string
* is malloc()'ed and must be freed by the caller. If the specified
* URL does not contain a filename, a '-' is allocated and returned.
*/
char *url_getfilename(const char *url)
{
const char *c, *start;
if ((c = strstr(url, "://")))
c += 3;
else
c = url;
while (*c && *c != '/')
c++;
if (*c == '/')
{
c++;
if (!*c || *c == '?')
return raw_strdup("-");
start = c;
while (*c && *c != '?')
c++;
if (!*c)
return raw_strdup(start);
else
return raw_strldup(start, c-start+1);
}
return raw_strdup("-");
}
#ifdef _WIN32
// https://docs.microsoft.com/en-us/cpp/c-runtime-library/reference/access-waccess
// mode value Checks file for
// 04 Read-only
#define R_OK 04
#endif
/*
* Checks whether a file can be opened for reading.
*/
int is_file_readable(const char *file, const char *dir)
{
char *filename = strdup(file);
convert_to_absolute_path(&filename, dir);
if (access(filename, R_OK)){
safe_free(filename);
return 0;
}
safe_free(filename);
return 1;
}
void delletterfromstring(char *s, char letter)
{
if (s == NULL)
return;
for (; *s; s++)
{
if (*s == letter)
{
for (; *s; s++)
*s = s[1];
break;
}
}
}
int sort_character_lowercase_before_uppercase(char x, char y)
{
/* Lower before upper */
if (islower(x) && isupper(y))
return 1;
if (isupper(x) && islower(y))
return 0;
/* Other than that, easy */
return x < y ? 1 : 0;
}
/* Helper function, mainly used by snomask code */
void addlettertodynamicstringsorted(char **str, char letter)
{
char *i, *o;
char *newbuf;
size_t newbuflen;
/* NULL string? Easy! */
if (*str == NULL)
{
*str = safe_alloc(2);
**str = letter;
return;
}
/* Exists? Then nothing to do */
if (strchr(*str, letter))
return;
/* Ok, we really need to add it */
newbuflen = strlen(*str) + 2;
newbuf = safe_alloc(newbuflen);
for (i = *str, o = newbuf; *i; i++)
{
/* Insert before a higher letter */
if (letter && sort_character_lowercase_before_uppercase(letter, *i))
{
*o++ = letter;
letter = '\0';
}
*o++ = *i;
}
/* Or maybe we should be at the final spot? */
if (letter)
*o++ = letter;
*o = '\0';
safe_free_raw(*str);
*str = newbuf;
}