From f9d37e65a4a215255f61d63a89c99bad1abde7be Mon Sep 17 00:00:00 2001 From: joonicks Date: Fri, 9 Mar 2018 01:29:18 +0100 Subject: [PATCH] 2018 progress --- .gitignore | 5 + COPYING | 339 --------------------------------------------------- VERSIONS | 7 +- src/auth.c | 6 - src/core.c | 160 +++++++++++++----------- src/gencmd.c | 6 +- src/global.h | 4 +- src/h.h | 2 +- src/help.c | 20 ++- src/main.c | 32 +++-- src/net.c | 2 +- src/text.h | 14 ++- src/user.c | 45 ++++--- 13 files changed, 186 insertions(+), 456 deletions(-) delete mode 100644 COPYING diff --git a/.gitignore b/.gitignore index 5b2b409..cc9f56b 100644 --- a/.gitignore +++ b/.gitignore @@ -19,3 +19,8 @@ root.zone* trick.conf conf +debug* +*.log +*.stats +*.session +energymech.userfile diff --git a/COPYING b/COPYING deleted file mode 100644 index a43ea21..0000000 --- a/COPYING +++ /dev/null @@ -1,339 +0,0 @@ - GNU GENERAL PUBLIC LICENSE - Version 2, June 1991 - - Copyright (C) 1989, 1991 Free Software Foundation, Inc. - 675 Mass Ave, Cambridge, MA 02139, USA - Everyone is permitted to copy and distribute verbatim copies - of this license document, but changing it is not allowed. - - Preamble - - The licenses for most software are designed to take away your -freedom to share and change it. By contrast, the GNU General Public -License is intended to guarantee your freedom to share and change free -software--to make sure the software is free for all its users. This -General Public License applies to most of the Free Software -Foundation's software and to any other program whose authors commit to -using it. (Some other Free Software Foundation software is covered by -the GNU Library General Public License instead.) You can apply it to -your programs, too. - - When we speak of free software, we are referring to freedom, not -price. Our General Public Licenses are designed to make sure that you -have the freedom to distribute copies of free software (and charge for -this service if you wish), that you receive source code or can get it -if you want it, that you can change the software or use pieces of it -in new free programs; and that you know you can do these things. - - To protect your rights, we need to make restrictions that forbid -anyone to deny you these rights or to ask you to surrender the rights. -These restrictions translate to certain responsibilities for you if you -distribute copies of the software, or if you modify it. - - For example, if you distribute copies of such a program, whether -gratis or for a fee, you must give the recipients all the rights that -you have. You must make sure that they, too, receive or can get the -source code. And you must show them these terms so they know their -rights. - - We protect your rights with two steps: (1) copyright the software, and -(2) offer you this license which gives you legal permission to copy, -distribute and/or modify the software. - - Also, for each author's protection and ours, we want to make certain -that everyone understands that there is no warranty for this free -software. If the software is modified by someone else and passed on, we -want its recipients to know that what they have is not the original, so -that any problems introduced by others will not reflect on the original -authors' reputations. - - Finally, any free program is threatened constantly by software -patents. We wish to avoid the danger that redistributors of a free -program will individually obtain patent licenses, in effect making the -program proprietary. To prevent this, we have made it clear that any -patent must be licensed for everyone's free use or not licensed at all. - - The precise terms and conditions for copying, distribution and -modification follow. - - GNU GENERAL PUBLIC LICENSE - TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION - - 0. This License applies to any program or other work which contains -a notice placed by the copyright holder saying it may be distributed -under the terms of this General Public License. The "Program", below, -refers to any such program or work, and a "work based on the Program" -means either the Program or any derivative work under copyright law: -that is to say, a work containing the Program or a portion of it, -either verbatim or with modifications and/or translated into another -language. (Hereinafter, translation is included without limitation in -the term "modification".) Each licensee is addressed as "you". - -Activities other than copying, distribution and modification are not -covered by this License; they are outside its scope. The act of -running the Program is not restricted, and the output from the Program -is covered only if its contents constitute a work based on the -Program (independent of having been made by running the Program). -Whether that is true depends on what the Program does. - - 1. You may copy and distribute verbatim copies of the Program's -source code as you receive it, in any medium, provided that you -conspicuously and appropriately publish on each copy an appropriate -copyright notice and disclaimer of warranty; keep intact all the -notices that refer to this License and to the absence of any warranty; -and give any other recipients of the Program a copy of this License -along with the Program. - -You may charge a fee for the physical act of transferring a copy, and -you may at your option offer warranty protection in exchange for a fee. - - 2. You may modify your copy or copies of the Program or any portion -of it, thus forming a work based on the Program, and copy and -distribute such modifications or work under the terms of Section 1 -above, provided that you also meet all of these conditions: - - a) You must cause the modified files to carry prominent notices - stating that you changed the files and the date of any change. - - b) You must cause any work that you distribute or publish, that in - whole or in part contains or is derived from the Program or any - part thereof, to be licensed as a whole at no charge to all third - parties under the terms of this License. - - c) If the modified program normally reads commands interactively - when run, you must cause it, when started running for such - interactive use in the most ordinary way, to print or display an - announcement including an appropriate copyright notice and a - notice that there is no warranty (or else, saying that you provide - a warranty) and that users may redistribute the program under - these conditions, and telling the user how to view a copy of this - License. (Exception: if the Program itself is interactive but - does not normally print such an announcement, your work based on - the Program is not required to print an announcement.) - -These requirements apply to the modified work as a whole. If -identifiable sections of that work are not derived from the Program, -and can be reasonably considered independent and separate works in -themselves, then this License, and its terms, do not apply to those -sections when you distribute them as separate works. But when you -distribute the same sections as part of a whole which is a work based -on the Program, the distribution of the whole must be on the terms of -this License, whose permissions for other licensees extend to the -entire whole, and thus to each and every part regardless of who wrote it. - -Thus, it is not the intent of this section to claim rights or contest -your rights to work written entirely by you; rather, the intent is to -exercise the right to control the distribution of derivative or -collective works based on the Program. - -In addition, mere aggregation of another work not based on the Program -with the Program (or with a work based on the Program) on a volume of -a storage or distribution medium does not bring the other work under -the scope of this License. - - 3. You may copy and distribute the Program (or a work based on it, -under Section 2) in object code or executable form under the terms of -Sections 1 and 2 above provided that you also do one of the following: - - a) Accompany it with the complete corresponding machine-readable - source code, which must be distributed under the terms of Sections - 1 and 2 above on a medium customarily used for software interchange; or, - - b) Accompany it with a written offer, valid for at least three - years, to give any third party, for a charge no more than your - cost of physically performing source distribution, a complete - machine-readable copy of the corresponding source code, to be - distributed under the terms of Sections 1 and 2 above on a medium - customarily used for software interchange; or, - - c) Accompany it with the information you received as to the offer - to distribute corresponding source code. (This alternative is - allowed only for noncommercial distribution and only if you - received the program in object code or executable form with such - an offer, in accord with Subsection b above.) - -The source code for a work means the preferred form of the work for -making modifications to it. For an executable work, complete source -code means all the source code for all modules it contains, plus any -associated interface definition files, plus the scripts used to -control compilation and installation of the executable. However, as a -special exception, the source code distributed need not include -anything that is normally distributed (in either source or binary -form) with the major components (compiler, kernel, and so on) of the -operating system on which the executable runs, unless that component -itself accompanies the executable. - -If distribution of executable or object code is made by offering -access to copy from a designated place, then offering equivalent -access to copy the source code from the same place counts as -distribution of the source code, even though third parties are not -compelled to copy the source along with the object code. - - 4. You may not copy, modify, sublicense, or distribute the Program -except as expressly provided under this License. Any attempt -otherwise to copy, modify, sublicense or distribute the Program is -void, and will automatically terminate your rights under this License. -However, parties who have received copies, or rights, from you under -this License will not have their licenses terminated so long as such -parties remain in full compliance. - - 5. You are not required to accept this License, since you have not -signed it. However, nothing else grants you permission to modify or -distribute the Program or its derivative works. These actions are -prohibited by law if you do not accept this License. Therefore, by -modifying or distributing the Program (or any work based on the -Program), you indicate your acceptance of this License to do so, and -all its terms and conditions for copying, distributing or modifying -the Program or works based on it. - - 6. Each time you redistribute the Program (or any work based on the -Program), the recipient automatically receives a license from the -original licensor to copy, distribute or modify the Program subject to -these terms and conditions. You may not impose any further -restrictions on the recipients' exercise of the rights granted herein. -You are not responsible for enforcing compliance by third parties to -this License. - - 7. If, as a consequence of a court judgment or allegation of patent -infringement or for any other reason (not limited to patent issues), -conditions are imposed on you (whether by court order, agreement or -otherwise) that contradict the conditions of this License, they do not -excuse you from the conditions of this License. If you cannot -distribute so as to satisfy simultaneously your obligations under this -License and any other pertinent obligations, then as a consequence you -may not distribute the Program at all. For example, if a patent -license would not permit royalty-free redistribution of the Program by -all those who receive copies directly or indirectly through you, then -the only way you could satisfy both it and this License would be to -refrain entirely from distribution of the Program. - -If any portion of this section is held invalid or unenforceable under -any particular circumstance, the balance of the section is intended to -apply and the section as a whole is intended to apply in other -circumstances. - -It is not the purpose of this section to induce you to infringe any -patents or other property right claims or to contest validity of any -such claims; this section has the sole purpose of protecting the -integrity of the free software distribution system, which is -implemented by public license practices. Many people have made -generous contributions to the wide range of software distributed -through that system in reliance on consistent application of that -system; it is up to the author/donor to decide if he or she is willing -to distribute software through any other system and a licensee cannot -impose that choice. - -This section is intended to make thoroughly clear what is believed to -be a consequence of the rest of this License. - - 8. If the distribution and/or use of the Program is restricted in -certain countries either by patents or by copyrighted interfaces, the -original copyright holder who places the Program under this License -may add an explicit geographical distribution limitation excluding -those countries, so that distribution is permitted only in or among -countries not thus excluded. In such case, this License incorporates -the limitation as if written in the body of this License. - - 9. The Free Software Foundation may publish revised and/or new versions -of the General Public License from time to time. Such new versions will -be similar in spirit to the present version, but may differ in detail to -address new problems or concerns. - -Each version is given a distinguishing version number. If the Program -specifies a version number of this License which applies to it and "any -later version", you have the option of following the terms and conditions -either of that version or of any later version published by the Free -Software Foundation. If the Program does not specify a version number of -this License, you may choose any version ever published by the Free Software -Foundation. - - 10. If you wish to incorporate parts of the Program into other free -programs whose distribution conditions are different, write to the author -to ask for permission. For software which is copyrighted by the Free -Software Foundation, write to the Free Software Foundation; we sometimes -make exceptions for this. Our decision will be guided by the two goals -of preserving the free status of all derivatives of our free software and -of promoting the sharing and reuse of software generally. - - NO WARRANTY - - 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY -FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN -OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES -PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED -OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF -MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS -TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE -PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, -REPAIR OR CORRECTION. - - 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING -WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR -REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, -INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING -OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED -TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY -YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER -PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE -POSSIBILITY OF SUCH DAMAGES. - - END OF TERMS AND CONDITIONS - - Appendix: How to Apply These Terms to Your New Programs - - If you develop a new program, and you want it to be of the greatest -possible use to the public, the best way to achieve this is to make it -free software which everyone can redistribute and change under these terms. - - To do so, attach the following notices to the program. It is safest -to attach them to the start of each source file to most effectively -convey the exclusion of warranty; and each file should have at least -the "copyright" line and a pointer to where the full notice is found. - - - Copyright (C) 19yy - - This program is free software; you can redistribute it and/or modify - it under the terms of the GNU General Public License as published by - the Free Software Foundation; either version 2 of the License, or - (at your option) any later version. - - This program is distributed in the hope that it will be useful, - but WITHOUT ANY WARRANTY; without even the implied warranty of - MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the - GNU General Public License for more details. - - You should have received a copy of the GNU General Public License - along with this program; if not, write to the Free Software - Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - -Also add information on how to contact you by electronic and paper mail. - -If the program is interactive, make it output a short notice like this -when it starts in an interactive mode: - - Gnomovision version 69, Copyright (C) 19yy name of author - Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. - This is free software, and you are welcome to redistribute it - under certain conditions; type `show c' for details. - -The hypothetical commands `show w' and `show c' should show the appropriate -parts of the General Public License. Of course, the commands you use may -be called something other than `show w' and `show c'; they could even be -mouse-clicks or menu items--whatever suits your program. - -You should also get your employer (if you work as a programmer) or your -school, if any, to sign a "copyright disclaimer" for the program, if -necessary. Here is a sample; alter the names: - - Yoyodyne, Inc., hereby disclaims all copyright interest in the program - `Gnomovision' (which makes passes at compilers) written by James Hacker. - - , 1 April 1989 - Ty Coon, President of Vice - -This General Public License does not permit incorporating your program into -proprietary programs. If your program is a subroutine library, you may -consider it more useful to permit linking proprietary applications with the -library. If this is what you want to do, use the GNU Library General -Public License instead of this License. diff --git a/VERSIONS b/VERSIONS index 5176c01..c9ad9e9 100644 --- a/VERSIONS +++ b/VERSIONS @@ -1,5 +1,10 @@ -3.0.99p4 -- February, 2018. +3.0.99p4 -- WORK IN PROGRESS (~February, 2018) + * Fixed: Potential memory corruption bug in do_user(). + * Fixed: Aliases saves to session file. + * Added: CORE & INFO (statistics) can now be output redirected. + * Added: SPY to files saved in sessions. + * Fixed: HELP command should now be working properly again. * Fixed: Strlen/Strlen2 code cleanup. * Fixed: Various compiler warnings. diff --git a/src/auth.c b/src/auth.c index 00cd8a8..05c81af 100644 --- a/src/auth.c +++ b/src/auth.c @@ -447,9 +447,3 @@ listcheck: } to_user(from,"You are now officially immortal"); } - -#ifdef MD5CRYPT -void do_md5(COMMAND_ARGS) -{ -} -#endif /* MD5CRYPT */ diff --git a/src/core.c b/src/core.c index 9476b0d..9e71ad5 100644 --- a/src/core.c +++ b/src/core.c @@ -138,7 +138,11 @@ int write_session(void) #ifdef RAWDNS Strp *p; #endif /* RAWDNS */ +#ifdef ALIAS + Alias *alias; +#endif /* ALIAS */ Server *sp; + Spy *spy; Chan *chan; Mech *bot; UniVar *varval; @@ -155,6 +159,83 @@ int write_session(void) to_file(sf,"dnsserver %s\n",inet_ntoa(ia_ns[j])); #endif /* RAWDNS */ + to_file(sf,"set ctimeout %i\n",ctimeout); + for(sp=serverlist;sp;sp=sp->next) + { + to_file(sf,"server %s %i %s\n",sp->name,(sp->port) ? sp->port : 6667, + (sp->pass[0]) ? sp->pass : ""); + } + +#ifdef BOTNET + if (linkpass) + to_file(sf,"set linkpass %s\n",linkpass); + if (linkport) + to_file(sf,"set linkport %i\n",linkport); + if (autolink) + to_file(sf,"set autolink 1\n"); + for(cfg=netcfglist;cfg;cfg=cfg->next) + { + to_file(sf,"link %i %s",cfg->guid,(cfg->pass) ? cfg->pass : MATCH_ALL); + if (cfg->host) + to_file(sf," %s %i",cfg->host,cfg->port); + to_file(sf,"\n"); + } +#endif /* BOTNET */ + +#ifdef BOUNCE + if (bounce_port) + to_file(sf,"set bncport %i\n",bounce_port); +#endif /* BOUNCE */ + +#ifdef WEB + if (webport) + to_file(sf,"set webport %i\n",webport); +#endif /* WEB */ + +#ifdef UPTIME + if (uptimehost && Strcasecmp(uptimehost,defaultuptimehost)) + to_file(sf,"set uphost %s\n",uptimehost); + if (uptimeport) + to_file(sf,"set upport %i\n",uptimeport); + if (uptimenick) + to_file(sf,"set upnick %s\n",uptimenick); +#endif /* UPTIME */ + +#ifdef TRIVIA + if (triv_qfile) + to_file(sf,"set qfile %s\n",triv_qfile); + to_file(sf,"set qdelay %i\n",triv_qdelay); + to_file(sf,"set qchar %c\n",triv_qchar); +#endif /* TRIVIA */ + +#ifdef SEEN + if (seenfile) + to_file(sf,"set seenfile %s\n",seenfile); +#endif /* SEEN */ + +#ifdef DYNCMD + /* + * because of "chaccess XXX disable" its best to save chaccess last + */ + for(j=0;mcmd[j].name;j++) + { + if (acmd[j] != mcmd[j].defaultaccess) + { + if (acmd[j] == 250) + to_file(sf,"chaccess %s disable\n",mcmd[j].name); + else + to_file(sf,"chaccess %s %i\n",mcmd[j].name,(int)acmd[j]); + } + } +#endif /* DYNCMD */ + +#ifdef ALIAS + for(alias=aliaslist;alias;alias=alias->next) + { + to_file(sf,"alias %s %s\n",alias->alias,alias->format); + } +#endif /* ALIAS */ + for(bot=botlist;bot;bot=bot->next) { to_file(sf,"nick %i %s\n",bot->guid,bot->wantnick); @@ -214,77 +295,20 @@ int write_session(void) } } } - } - - to_file(sf,"set ctimeout %i\n",ctimeout); - for(sp=serverlist;sp;sp=sp->next) - { - to_file(sf,"server %s %i %s\n",sp->name,(sp->port) ? sp->port : 6667, - (sp->pass[0]) ? sp->pass : ""); - } - -#ifdef TRIVIA - if (triv_qfile) - to_file(sf,"set qfile %s\n",triv_qfile); - to_file(sf,"set qdelay %i\n",triv_qdelay); - to_file(sf,"set qchar %c\n",triv_qchar); -#endif /* TRIVIA */ - -#ifdef UPTIME - if (uptimehost && Strcasecmp(uptimehost,defaultuptimehost)) - to_file(sf,"set uphost %s\n",uptimehost); - if (uptimeport) - to_file(sf,"set upport %i\n",uptimeport); - if (uptimenick) - to_file(sf,"set upnick %s\n",uptimenick); -#endif /* UPTIME */ - -#ifdef SEEN - if (seenfile) - to_file(sf,"set seenfile %s\n",seenfile); -#endif /* SEEN */ - -#ifdef BOTNET - if (linkpass) - to_file(sf,"set linkpass %s\n",linkpass); - if (linkport) - to_file(sf,"set linkport %i\n",linkport); - if (autolink) - to_file(sf,"set autolink 1\n"); - for(cfg=netcfglist;cfg;cfg=cfg->next) - { - to_file(sf,"link %i %s",cfg->guid,(cfg->pass) ? cfg->pass : MATCH_ALL); - if (cfg->host) - to_file(sf," %s %i",cfg->host,cfg->port); - to_file(sf,"\n"); - } -#endif /* BOTNET */ - -#ifdef BOUNCE - if (bounce_port) - to_file(sf,"set bncport %i\n",bounce_port); -#endif /* BOUNCE */ - -#ifdef WEB - if (webport) - to_file(sf,"set webport %i\n",webport); -#endif /* WEB */ - -#ifdef DYNCMD - /* - * because of "chaccess XXX disable" its best to save chaccess last - */ - for(j=0;mcmd[j].name;j++) - { - if (acmd[j] != mcmd[j].defaultaccess) + // SPY files + for(spy=bot->spylist;spy;spy=spy->next) { - if (acmd[j] == 250) - to_file(sf,"chaccess %s disable\n",mcmd[j].name); - else - to_file(sf,"chaccess %s %i\n",mcmd[j].name,(int)acmd[j]); + if (spy->t_dest == SPY_FILE) + { + if (spy->src && spy->dest) + to_file(sf,"spy %s > %s\n",spy->src,spy->dest); +#ifdef DEBUG + else + debug("spy to session fail\n"); +#endif /* DEBUG */ + } } } -#endif /* DYNCMD */ close(sf); return(TRUE); diff --git a/src/gencmd.c b/src/gencmd.c index fa6068d..5110e44 100644 --- a/src/gencmd.c +++ b/src/gencmd.c @@ -132,7 +132,7 @@ struct { 0, "READ", "do_read", 40 | CCPW }, #endif /* NOTE */ #ifdef STATS - { 0, "INFO", "do_info", 40 | CCPW | CAXS | DCC }, + { 0, "INFO", "do_info", 40 | CCPW | REDIR | CAXS | DCC }, #endif /* STATS */ /* @@ -227,7 +227,7 @@ struct { 0, "DNSSERVER", "do_dnsserver", 100 | CCPW | GAXS }, { 0, "DNSROOT", "do_dnsroot", 100 | CCPW | GAXS | CARGS }, #endif /* RAWDNS */ - { 0, "CORE", "do_core", 100 | CCPW | DCC }, + { 0, "CORE", "do_core", 100 | CCPW | REDIR | DCC }, { 0, "DIE", "do_die", 100 | CCPW | GAXS }, { 0, "RESET", "do_reset", 100 | CCPW | GAXS | NOCMD }, { 0, "SHUTDOWN", "do_shutdown", 100 | CCPW | GAXS | NOPUB | NOCMD }, @@ -235,7 +235,7 @@ struct { 0, "DEBUG", "do_debug", 100 | CCPW | GAXS }, #endif /* DEBUG */ #ifdef PYTHON -#ifdef PLEASE_HACK_MY_SHELL +#ifdef PLEASE_HACK_MY_SHELL { 0, "PYTHON", "do_python", 100 | CCPW | GAXS | CARGS }, #endif /* PLEASE_HACK_MY_SHELL */ { 0, "PYTHONSCRIPT", "do_pythonscript", 100 | CCPW | GAXS | CARGS }, diff --git a/src/global.h b/src/global.h index 8ed9857..d723634 100644 --- a/src/global.h +++ b/src/global.h @@ -40,8 +40,8 @@ #define DEFAULTCMDCHAR '-' #define MECHUSERLOGIN "v3.energymech.net" -BEG const char VERSION[] MDEF("3.0.99p3"); -BEG const char SRCDATE[] MDEF("July 24th, 2009"); +BEG const char VERSION[] MDEF("3.0.99p4"); +BEG const char SRCDATE[] MDEF("March 5th, 2018"); #ifdef __CYGWIN__ BEG const char BOTCLASS[] MDEF("WinMech"); #else /* ! CYGWIN */ diff --git a/src/h.h b/src/h.h index 48b9b93..15114c1 100644 --- a/src/h.h +++ b/src/h.h @@ -257,7 +257,7 @@ LS void cfg_shit(char *) __page(CFG1_SEG); LS void cfg_user(char *) __page(CFG1_SEG); void mirror_user(User *) __page(CORE_SEG); void mirror_userlist(void) __page(CORE_SEG); -LS void addtouser(Strp **, const char *) __attr(CORE_SEG, __regparm (2) ); +LS void addtouser(Strp **, const char *, int) __attr(CORE_SEG, __regparm (3) ); LS int remfromuser(Strp **, const char *) __attr(CORE_SEG, __regparm (2) ); /* diff --git a/src/help.c b/src/help.c index 6de9791..8b291dd 100644 --- a/src/help.c +++ b/src/help.c @@ -168,12 +168,6 @@ help_loop: return; } - /* - * We dont want to show help for "../../../../../../etc/passwd" - */ - if (!is_safepath(rest)) - return; - pt = Strcpy(line,HELPDIR); for(i=0;(rest[i]);i++) { @@ -184,6 +178,20 @@ help_loop: pt++; } *pt = 0; + + /* + * We dont want to show help for "../../../../../../etc/passwd" + */ + if (!is_safepath(line)) +#ifdef DEBUG + { + debug("(do_help) unsafe help filename (%s), exiting\n",line); + return; + } +#else + return; +#endif /* DEBUG */ + #ifdef DEBUG debug("(do_help) help file check: %s\n",line); #endif /* DEBUG */ diff --git a/src/main.c b/src/main.c index 675acf7..33ab3a9 100644 --- a/src/main.c +++ b/src/main.c @@ -850,16 +850,27 @@ int main(int argc, char **argv, char **envp) versiononly = TRUE; break; case 'h': +/* +#define TEXT_PSWITCH1 " -p encrypt using the password hashing algorithm,\n" +#define TEXT_PSWITCH2 " output the result and then quit.\n" + +#define TEXT_DSWITCH " -d start mech in debug mode\n" +#define TEXT_OSWITCH " -o write debug output to \n" +#define TEXT_XSWITCH " -X write a debug file before exit\n" +*/ + to_file(1,TEXT_USAGE,executable); - to_file(1,TEXT_FSWITCH); - to_file(1,TEXT_CSWITCH); + to_file(1,TEXT_FSWITCH + TEXT_CSWITCH + TEXT_PSWITCH1 + TEXT_PSWITCH2 #ifdef DEBUG - to_file(1," -d start mech in debug mode\n"); - to_file(1," -o write debug output to \n"); - to_file(1," -X write a debug file before exit\n"); + TEXT_DSWITCH + TEXT_OSWITCH + TEXT_XSWITCH #endif /* DEBUG */ - to_file(1,TEXT_HSWITCH); - to_file(1,TEXT_VSWITCH); + TEXT_HSWITCH + TEXT_VSWITCH); _exit(0); case 'c': makecore = TRUE; @@ -887,6 +898,13 @@ int main(int argc, char **argv, char **envp) } do_fork = TRUE; break; + case 'p': + ++argv; + if (*argv) + to_file(1,"%s\n",makepass(*argv)); + else + to_file(1,"error: Missing argument for -p \n"); + _exit(0); case 'X': debug_on_exit = TRUE; break; diff --git a/src/net.c b/src/net.c index e03fe14..9318e7c 100644 --- a/src/net.c +++ b/src/net.c @@ -1016,7 +1016,7 @@ void ushareUser(BotNet *bn, char *rest) #ifdef DEBUG debug("(ushareUser) user %s ++ mask/chan %s\n",user->name,rest); #endif /* DEBUG */ - addtouser((c == '*') ? &user->mask : &user->chan,rest); + addtouser((c == '*') ? &user->mask : &user->chan,rest,TRUE); } } } diff --git a/src/text.h b/src/text.h index 14a2795..8188d8e 100644 --- a/src/text.h +++ b/src/text.h @@ -129,10 +129,16 @@ #define TEXT_SIGUSR1 "QUIT :Switching servers... (SIGUSR1)\n" #define TEXT_USAGE "Usage: %s [switches [args]]\n" -#define TEXT_FSWITCH " -f read configuration from \n" -#define TEXT_CSWITCH " -c make core file instead of coredebug/reset\n" -#define TEXT_HSWITCH " -h show this help\n" -#define TEXT_VSWITCH " -v show EnergyMech version\n" +#define TEXT_FSWITCH " -f read configuration from \n" +#define TEXT_CSWITCH " -c make core file instead of coredebug/reset\n" +#define TEXT_HSWITCH " -h show this help\n" +#define TEXT_VSWITCH " -v show EnergyMech version\n" +#define TEXT_PSWITCH1 " -p encrypt using the password hashing algorithm,\n" +#define TEXT_PSWITCH2 " output the result and then quit.\n" + +#define TEXT_DSWITCH " -d start mech in debug mode\n" +#define TEXT_OSWITCH " -o write debug output to \n" +#define TEXT_XSWITCH " -X write a debug file before exit\n" #define TEXT_HDR_VERS "EnergyMech %s, %s\n" #define TEXT_HDR_DATE "Compiled on " __DATE__ " " __TIME__ "\n" diff --git a/src/user.c b/src/user.c index f504065..92e019f 100644 --- a/src/user.c +++ b/src/user.c @@ -69,12 +69,12 @@ void cfg_pass(char *rest) void cfg_mask(char *rest) { - addtouser(&cfgUser->mask,rest); + addtouser(&cfgUser->mask,rest,TRUE); } void cfg_chan(char *rest) { - addtouser(&cfgUser->chan,rest); + addtouser(&cfgUser->chan,rest,TRUE); } LS struct @@ -447,8 +447,8 @@ void rehash_chanusers(void) } } -__attr(CORE_SEG, __regparm (2)) -void addtouser(Strp **pp, const char *string) +__attr(CORE_SEG, __regparm (3)) +void addtouser(Strp **pp, const char *string, int rehash) { Strp *um; @@ -463,7 +463,8 @@ void addtouser(Strp **pp, const char *string) set_mallocdoer(addtouser); *pp = um = (Strp*)Calloc(sizeof(Strp) + strlen(string)); Strcpy(um->p,string); - rehash_chanusers(); + if (rehash) + rehash_chanusers(); } __attr(CORE_SEG, __regparm (2)) @@ -1133,6 +1134,7 @@ void do_user(COMMAND_ARGS) Strp *ump; char *handle,*pt,*mask,*nick,*chan,*anum,*pass,*encpass; char mode; + char tmpmask[NUHLEN]; int change; int newaccess,uaccess; union usercombo combo; @@ -1209,27 +1211,31 @@ void do_user(COMMAND_ARGS) /* * convert and check nick/mask */ - if ((mask = nick2uh(from,nick)) == NULL) + if ((mask = nick2uh(from,nick)) == NULL) // nick2uh uses nuh_buf return; + Strcpy(tmpmask,mask); +#ifdef DEBUG + debug("(do_user) nick2uh(from \"%s\", nick \"%s\") = mask \"%s\"\n",from,nick,tmpmask); +#endif /* DEBUG */ #ifdef NEWBIE - if (!matches(mask,"!@")) + if (!matches(tmpmask,"!@")) { - to_user(from,"Problem adding %s (global mask)",mask); + to_user(from,"Problem adding %s (global mask)",tmpmask); return; } - if (matches("*@?*.?*",mask)) + if (matches("*@?*.?*",tmpmask)) { - to_user(from,"Problem adding %s (invalid mask)",mask); + to_user(from,"Problem adding %s (invalid mask)",tmpmask); return; } #endif /* NEWBIE */ - format_uh(mask,FUH_USERHOST); + format_uh(tmpmask,FUH_USERHOST); // format_uh uses local temporary buffer but copies result back into tmpmask /* * dont duplicate users */ - if (get_useraccess(mask,chan)) + if (get_useraccess(tmpmask,chan)) { - to_user(from,"%s (%s) on %s is already a user",nick,mask,chan); + to_user(from,"%s (%s) on %s is already a user",nick,tmpmask,chan); return; } /* @@ -1246,9 +1252,12 @@ void do_user(COMMAND_ARGS) * add_user() touches current->ul_save for us */ user = add_user(handle,encpass,newaccess); - addtouser(&user->mask,mask); - addtouser(&user->chan,chan); - to_user(from,"%s has been added as %s on %s",handle,mask,chan); + addtouser(&user->mask,tmpmask,FALSE); // does not run rehash_chanusers(), does not clobber nuh_buf + addtouser(&user->chan,chan,TRUE); // clobbers nuh_buf +#ifdef DEBUG + debug("(do_user) from %s, handle %s,\n\tmask %s (arg %s),\n\tuser->mask %s, chan %s\n",from,handle,mask,nick,user->mask,chan); +#endif /* DEBUG */ + to_user(from,"%s has been added as %s on %s",handle,tmpmask,chan); to_user(from,"Access level: %i%s%s",newaccess,(pass) ? " Password: " : "",(pass) ? pass : ""); #ifdef NEWUSER_SPAM if ((newaccess != BOTLEVEL) && find_nuh(nick)) @@ -1418,7 +1427,7 @@ usage: return; } #endif /* NEWBIE */ - addtouser(&user->chan,mask); + addtouser(&user->chan,mask,TRUE); change++; } else @@ -1452,7 +1461,7 @@ usage: return; } #endif /* NEWBIE */ - addtouser(&user->mask,mask); + addtouser(&user->mask,mask,TRUE); change++; }