diff options
Diffstat (limited to 'src/login_sql')
-rw-r--r-- | src/login_sql/login.c | 3221 | ||||
-rw-r--r-- | src/login_sql/login.h | 47 | ||||
-rw-r--r-- | src/login_sql/md5calc.c | 382 | ||||
-rw-r--r-- | src/login_sql/md5calc.h | 4 | ||||
-rw-r--r-- | src/login_sql/strlib.c | 92 | ||||
-rw-r--r-- | src/login_sql/strlib.h | 4 | ||||
-rw-r--r-- | src/login_sql/timer.h | 40 |
7 files changed, 2123 insertions, 1667 deletions
diff --git a/src/login_sql/login.c b/src/login_sql/login.c index a46416c..cc59f19 100644 --- a/src/login_sql/login.c +++ b/src/login_sql/login.c @@ -21,7 +21,7 @@ #include <sys/time.h> #include <time.h> #include <sys/ioctl.h> -#include <sys/stat.h> // for stat/lstat/fstat +#include <sys/stat.h> // for stat/lstat/fstat #include <unistd.h> #include <signal.h> #include <fcntl.h> @@ -64,43 +64,43 @@ //----------------------------------------------------- // global variable //----------------------------------------------------- -int account_id_count = START_ACCOUNT_NUM; -int server_num; -int new_account_flag = 0; -int login_port = 6900; -char lan_char_ip[128]; // Lan char ip added by kashy -int subnetmaski[4]; // Subnetmask added by kashy +int account_id_count = START_ACCOUNT_NUM; +int server_num; +int new_account_flag = 0; +int login_port = 6900; +char lan_char_ip[128]; // Lan char ip added by kashy +int subnetmaski[4]; // Subnetmask added by kashy struct mmo_char_server server[MAX_SERVERS]; -int server_fd[MAX_SERVERS]; -int server_freezeflag[MAX_SERVERS]; // Char-server anti-freeze system. Counter. 5 ok, 4...0 freezed -int anti_freeze_enable = 0; -int ANTI_FREEZE_INTERVAL = 15; +int server_fd[MAX_SERVERS]; +int server_freezeflag[MAX_SERVERS]; // Char-server anti-freeze system. Counter. 5 ok, 4...0 freezed +int anti_freeze_enable = 0; +int ANTI_FREEZE_INTERVAL = 15; -int login_fd; +int login_fd; char date_format[32] = "%Y-%m-%d %H:%M:%S"; -int auth_num = 0, auth_max = 0; +int auth_num = 0, auth_max = 0; -int min_level_to_connect = 0; // minimum level of player/GM (0: player, 1-99: gm) to connect on the server -int check_ip_flag = 1; // It's to check IP of a player between login-server and char-server (part of anti-hacking system) +int min_level_to_connect = 0; // minimum level of player/GM (0: player, 1-99: gm) to connect on the server +int check_ip_flag = 1; // It's to check IP of a player between login-server and char-server (part of anti-hacking system) MYSQL mysql_handle; -int ipban = 1; -int dynamic_account_ban = 1; -int dynamic_account_ban_class = 0; -int dynamic_pass_failure_ban = 1; -int dynamic_pass_failure_ban_time = 5; -int dynamic_pass_failure_ban_how_many = 3; -int dynamic_pass_failure_ban_how_long = 60; +int ipban = 1; +int dynamic_account_ban = 1; +int dynamic_account_ban_class = 0; +int dynamic_pass_failure_ban = 1; +int dynamic_pass_failure_ban_time = 5; +int dynamic_pass_failure_ban_how_many = 3; +int dynamic_pass_failure_ban_how_long = 60; -int login_server_port = 3306; +int login_server_port = 3306; char login_server_ip[32] = "127.0.0.1"; char login_server_id[32] = "ragnarok"; char login_server_pw[32] = "ragnarok"; char login_server_db[32] = "ragnarok"; -int use_md5_passwds = 0; +int use_md5_passwds = 0; char login_db[256] = "login"; char loginlog_db[256] = "loginlog"; @@ -116,13 +116,13 @@ char tmpsql[65535], tmp_sql[65535]; //----------------------------------------------------- #define AUTH_FIFO_SIZE 256 -struct { - int account_id,login_id1,login_id2; - int ip,sex,delflag; +struct +{ + int account_id, login_id1, login_id2; + int ip, sex, delflag; } auth_fifo[AUTH_FIFO_SIZE]; -int auth_fifo_pos = 0; - +int auth_fifo_pos = 0; //----------------------------------------------------- @@ -132,341 +132,406 @@ static char md5key[20], md5keylen = 16; // check user level //----------------------------------------------------- -int isGM(int account_id) { - int level; - - MYSQL_RES* sql_res; - MYSQL_ROW sql_row; - level = 0; - sprintf(tmpsql,"SELECT `%s` FROM `%s` WHERE `%s`='%d'", login_db_level, login_db, login_db_account_id, account_id); - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error (select GM Level to Memory)- %s\n", mysql_error(&mysql_handle)); - } - sql_res = mysql_store_result(&mysql_handle); - if (sql_res) { - sql_row = mysql_fetch_row(sql_res); - level = atoi(sql_row[0]); - if (level > 99) - level = 99; - } - - if (level == 0) { - return 0; - //not GM - } - - mysql_free_result(sql_res); - - return level; +int isGM (int account_id) +{ + int level; + + MYSQL_RES *sql_res; + MYSQL_ROW sql_row; + level = 0; + sprintf (tmpsql, "SELECT `%s` FROM `%s` WHERE `%s`='%d'", login_db_level, + login_db, login_db_account_id, account_id); + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error (select GM Level to Memory)- %s\n", + mysql_error (&mysql_handle)); + } + sql_res = mysql_store_result (&mysql_handle); + if (sql_res) + { + sql_row = mysql_fetch_row (sql_res); + level = atoi (sql_row[0]); + if (level > 99) + level = 99; + } + + if (level == 0) + { + return 0; + //not GM + } + + mysql_free_result (sql_res); + + return level; } //----------------------------------------------------- // Function to suppress control characters in a string. //----------------------------------------------------- -int remove_control_chars(unsigned char *str) { - int i; - int change = 0; - - for(i = 0; str[i]; i++) { - if (str[i] < 32) { - str[i] = '_'; - change = 1; - } - } +int remove_control_chars (unsigned char *str) +{ + int i; + int change = 0; + + for (i = 0; str[i]; i++) + { + if (str[i] < 32) + { + str[i] = '_'; + change = 1; + } + } - return change; + return change; } //--------------------------------------------------- // E-mail check: return 0 (not correct) or 1 (valid). //--------------------------------------------------- -int e_mail_check(unsigned char *email) { - char ch; - unsigned char* last_arobas; - - // athena limits - if (strlen(email) < 3 || strlen(email) > 39) - return 0; - - // part of RFC limits (official reference of e-mail description) - if (strchr(email, '@') == NULL || email[strlen(email)-1] == '@') - return 0; - - if (email[strlen(email)-1] == '.') - return 0; - - last_arobas = strrchr(email, '@'); - - if (strstr(last_arobas, "@.") != NULL || - strstr(last_arobas, "..") != NULL) - return 0; - - for(ch = 1; ch < 32; ch++) { - if (strchr(last_arobas, ch) != NULL) { - return 0; - break; - } - } +int e_mail_check (unsigned char *email) +{ + char ch; + unsigned char *last_arobas; + + // athena limits + if (strlen (email) < 3 || strlen (email) > 39) + return 0; + + // part of RFC limits (official reference of e-mail description) + if (strchr (email, '@') == NULL || email[strlen (email) - 1] == '@') + return 0; + + if (email[strlen (email) - 1] == '.') + return 0; + + last_arobas = strrchr (email, '@'); + + if (strstr (last_arobas, "@.") != NULL || + strstr (last_arobas, "..") != NULL) + return 0; + + for (ch = 1; ch < 32; ch++) + { + if (strchr (last_arobas, ch) != NULL) + { + return 0; + break; + } + } - if (strchr(last_arobas, ' ') != NULL || - strchr(last_arobas, ';') != NULL) - return 0; + if (strchr (last_arobas, ' ') != NULL || + strchr (last_arobas, ';') != NULL) + return 0; - // all correct - return 1; + // all correct + return 1; } //----------------------------------------------------- // Read Account database - mysql db //----------------------------------------------------- -int mmo_auth_sqldb_init(void) { - - printf("Login server init....\n"); - - // memory initialize - printf("memory initialize....\n"); - - mysql_init(&mysql_handle); - - // DB connection start - printf("Connect Login Database Server....\n"); - if (!mysql_real_connect(&mysql_handle, login_server_ip, login_server_id, login_server_pw, - login_server_db, login_server_port, (char *)NULL, 0)) { - // pointer check - printf("%s\n", mysql_error(&mysql_handle)); - exit(1); - } else { - printf("connect success!\n"); - } - - sprintf(tmpsql, "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '', 'lserver', '100','login server started')", loginlog_db); - - //query - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - - return 0; +int mmo_auth_sqldb_init (void) +{ + + printf ("Login server init....\n"); + + // memory initialize + printf ("memory initialize....\n"); + + mysql_init (&mysql_handle); + + // DB connection start + printf ("Connect Login Database Server....\n"); + if (!mysql_real_connect + (&mysql_handle, login_server_ip, login_server_id, login_server_pw, + login_server_db, login_server_port, (char *) NULL, 0)) + { + // pointer check + printf ("%s\n", mysql_error (&mysql_handle)); + exit (1); + } + else + { + printf ("connect success!\n"); + } + + sprintf (tmpsql, + "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '', 'lserver', '100','login server started')", + loginlog_db); + + //query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); + } + + return 0; } //----------------------------------------------------- // DB server connect check //----------------------------------------------------- -void mmo_auth_sqldb_sync(void) { - // db connect check? or close? - // ping pong DB server -if losted? then connect try. else crash. +void mmo_auth_sqldb_sync (void) +{ + // db connect check? or close? + // ping pong DB server -if losted? then connect try. else crash. } //----------------------------------------------------- // close DB //----------------------------------------------------- -void mmo_db_close(void) { - - //set log. - sprintf(tmpsql,"INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '', 'lserver','100', 'login server shutdown')", loginlog_db); - - //query - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - - //delete all server status - sprintf(tmpsql,"DELETE FROM `sstatus`"); - //query - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - - mysql_close(&mysql_handle); - printf("close DB connect....\n"); - - int i, fd; - - for (i = 0; i < MAX_SERVERS; i++) { - if ((fd = server_fd[i]) >= 0) - delete_session(fd); - } - delete_session(login_fd); +void mmo_db_close (void) +{ + + //set log. + sprintf (tmpsql, + "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '', 'lserver','100', 'login server shutdown')", + loginlog_db); + + //query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); + } + + //delete all server status + sprintf (tmpsql, "DELETE FROM `sstatus`"); + //query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); + } + + mysql_close (&mysql_handle); + printf ("close DB connect....\n"); + + int i, fd; + + for (i = 0; i < MAX_SERVERS; i++) + { + if ((fd = server_fd[i]) >= 0) + delete_session (fd); + } + delete_session (login_fd); } //----------------------------------------------------- // Make new account //----------------------------------------------------- -int mmo_auth_sqldb_new(struct mmo_account* account,const char *tmpstr, char sex) { - //no need on DB version +int mmo_auth_sqldb_new (struct mmo_account *account, const char *tmpstr, + char sex) +{ + //no need on DB version - printf("Request new account.... - not support on this version\n"); + printf ("Request new account.... - not support on this version\n"); - return 0; + return 0; } //----------------------------------------------------- // Make new account //----------------------------------------------------- -int mmo_auth_new(struct mmo_account* account, const char *tmpstr, char sex) { +int mmo_auth_new (struct mmo_account *account, const char *tmpstr, char sex) +{ - return 0; + return 0; } #ifdef LCCWIN32 -extern void gettimeofday(struct timeval *t, struct timezone *dummy); +extern void gettimeofday (struct timeval *t, struct timezone *dummy); #endif //----------------------------------------------------- // Auth //----------------------------------------------------- -int mmo_auth( struct mmo_account* account , int fd){ - struct timeval tv; - time_t ban_until_time; - char tmpstr[256]; - char t_uid[256], t_pass[256]; - char user_password[256]; - - MYSQL_RES* sql_res ; - MYSQL_ROW sql_row ; - //int sql_fields, sql_cnt; - char md5str[64], md5bin[32]; - - char ip[16]; - - unsigned char *sin_addr = (unsigned char *)&session[fd]->client_addr.sin_addr; - - printf ("auth start...\n"); - - sprintf(ip, "%d.%d.%d.%d", sin_addr[0], sin_addr[1], sin_addr[2], sin_addr[3]); - - // auth start : time seed - gettimeofday(&tv, NULL); - strftime(tmpstr, 24, "%Y-%m-%d %H:%M:%S",gmtime(&(tv.tv_sec))); - sprintf(tmpstr+19, ".%03d", (int)tv.tv_usec/1000); - - jstrescapecpy(t_uid,account->userid); - jstrescapecpy(t_pass, account->passwd); - - // make query - sprintf(tmpsql, "SELECT `%s`,`%s`,`%s`,`lastlogin`,`logincount`,`sex`,`connect_until`,`last_ip`,`ban_until`,`state`,`%s`" - " FROM `%s` WHERE `%s`='%s'", login_db_account_id, login_db_userid, login_db_user_pass, login_db_level, login_db, login_db_userid, t_uid); - //login {0-account_id/1-userid/2-user_pass/3-lastlogin/4-logincount/5-sex/6-connect_untl/7-last_ip/8-ban_until/9-state} - - // query - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - sql_res = mysql_store_result(&mysql_handle) ; - if (sql_res) { - sql_row = mysql_fetch_row(sql_res); //row fetching - if (!sql_row) { - //there's no id. - printf ("auth failed no account %s %s %s\n", tmpstr, account->userid, account->passwd); - mysql_free_result(sql_res); - return 0; - } - } else { - printf("mmo_auth DB result error ! \n"); - return 0; - } - // Documented by CLOWNISIUS || LLRO || Gunstar lead this one with me - // IF changed to diferent returns~ you get diferent responses from your msgstringtable.txt - //Ireturn 2 == line 9 - //Ireturn 5 == line 311 - //Ireturn 6 == line 450 - //Ireturn 7 == line 440 - //Ireturn 8 == line 682 - //Ireturn 9 == line 704 - //Ireturn 10 == line 705 - //Ireturn 11 == line 706 - //Ireturn 12 == line 707 - //Ireturn 13 == line 708 - //Ireturn 14 == line 709 - //Ireturn 15 == line 710 - //Ireturn -1 == line 010 - // Check status - { - if (atoi(sql_row[9]) == -3) { - //id is banned - mysql_free_result(sql_res); - return -3; - } else if (atoi(sql_row[9]) == -2) { //dynamic ban - //id is banned - mysql_free_result(sql_res); - //add IP list. - return -2; - } +int mmo_auth (struct mmo_account *account, int fd) +{ + struct timeval tv; + time_t ban_until_time; + char tmpstr[256]; + char t_uid[256], t_pass[256]; + char user_password[256]; + + MYSQL_RES *sql_res; + MYSQL_ROW sql_row; + //int sql_fields, sql_cnt; + char md5str[64], md5bin[32]; + + char ip[16]; + + unsigned char *sin_addr = + (unsigned char *) &session[fd]->client_addr.sin_addr; + + printf ("auth start...\n"); + + sprintf (ip, "%d.%d.%d.%d", sin_addr[0], sin_addr[1], sin_addr[2], + sin_addr[3]); + + // auth start : time seed + gettimeofday (&tv, NULL); + strftime (tmpstr, 24, "%Y-%m-%d %H:%M:%S", gmtime (&(tv.tv_sec))); + sprintf (tmpstr + 19, ".%03d", (int) tv.tv_usec / 1000); + + jstrescapecpy (t_uid, account->userid); + jstrescapecpy (t_pass, account->passwd); + + // make query + sprintf (tmpsql, + "SELECT `%s`,`%s`,`%s`,`lastlogin`,`logincount`,`sex`,`connect_until`,`last_ip`,`ban_until`,`state`,`%s`" + " FROM `%s` WHERE `%s`='%s'", login_db_account_id, + login_db_userid, login_db_user_pass, login_db_level, login_db, + login_db_userid, t_uid); + //login {0-account_id/1-userid/2-user_pass/3-lastlogin/4-logincount/5-sex/6-connect_untl/7-last_ip/8-ban_until/9-state} + + // query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); + } + sql_res = mysql_store_result (&mysql_handle); + if (sql_res) + { + sql_row = mysql_fetch_row (sql_res); //row fetching + if (!sql_row) + { + //there's no id. + printf ("auth failed no account %s %s %s\n", tmpstr, + account->userid, account->passwd); + mysql_free_result (sql_res); + return 0; + } + } + else + { + printf ("mmo_auth DB result error ! \n"); + return 0; + } + // Documented by CLOWNISIUS || LLRO || Gunstar lead this one with me + // IF changed to diferent returns~ you get diferent responses from your msgstringtable.txt + //Ireturn 2 == line 9 + //Ireturn 5 == line 311 + //Ireturn 6 == line 450 + //Ireturn 7 == line 440 + //Ireturn 8 == line 682 + //Ireturn 9 == line 704 + //Ireturn 10 == line 705 + //Ireturn 11 == line 706 + //Ireturn 12 == line 707 + //Ireturn 13 == line 708 + //Ireturn 14 == line 709 + //Ireturn 15 == line 710 + //Ireturn -1 == line 010 + // Check status + { + if (atoi (sql_row[9]) == -3) + { + //id is banned + mysql_free_result (sql_res); + return -3; + } + else if (atoi (sql_row[9]) == -2) + { //dynamic ban + //id is banned + mysql_free_result (sql_res); + //add IP list. + return -2; + } - if (use_md5_passwds) { - MD5_String(account->passwd,user_password); - } else { - jstrescapecpy(user_password, account->passwd); - } - printf("account id ok encval:%d\n",account->passwdenc); - int encpasswdok = 0; + if (use_md5_passwds) + { + MD5_String (account->passwd, user_password); + } + else + { + jstrescapecpy (user_password, account->passwd); + } + printf ("account id ok encval:%d\n", account->passwdenc); + int encpasswdok = 0; #ifdef PASSWORDENC - if (account->passwdenc > 0) { - printf ("start md5calc..\n"); - int j = account->passwdenc; - if (j > 2) - j = 1; - do { - if (j == 1) { - sprintf(md5str, "%s%s", md5key,sql_row[2]); - } else if (j == 2) { - sprintf(md5str, "%s%s", sql_row[2], md5key); - } else - md5str[0] = 0; - printf("j:%d mdstr:%s\n", j, md5str); - MD5_String2binary(md5str, md5bin); - encpasswdok = (memcmp(user_password, md5bin, 16) == 0); - } while (j < 2 && !encpasswdok && (j++) != account->passwdenc); - //printf("key[%s] md5 [%s] ", md5key, md5); - printf("client [%s] accountpass [%s]\n", user_password, sql_row[2]); - printf ("end md5calc..\n"); - } + if (account->passwdenc > 0) + { + printf ("start md5calc..\n"); + int j = account->passwdenc; + if (j > 2) + j = 1; + do + { + if (j == 1) + { + sprintf (md5str, "%s%s", md5key, sql_row[2]); + } + else if (j == 2) + { + sprintf (md5str, "%s%s", sql_row[2], md5key); + } + else + md5str[0] = 0; + printf ("j:%d mdstr:%s\n", j, md5str); + MD5_String2binary (md5str, md5bin); + encpasswdok = (memcmp (user_password, md5bin, 16) == 0); + } + while (j < 2 && !encpasswdok && (j++) != account->passwdenc); + //printf("key[%s] md5 [%s] ", md5key, md5); + printf ("client [%s] accountpass [%s]\n", user_password, + sql_row[2]); + printf ("end md5calc..\n"); + } #endif - if ((strcmp(user_password, sql_row[2]) && !encpasswdok)) { - if (account->passwdenc == 0) { - printf ("auth failed pass error %s %s %s" RETCODE, tmpstr, account->userid, user_password); + if ((strcmp (user_password, sql_row[2]) && !encpasswdok)) + { + if (account->passwdenc == 0) + { + printf ("auth failed pass error %s %s %s" RETCODE, tmpstr, + account->userid, user_password); #ifdef PASSWORDENC - } else { - char logbuf[1024], *p = logbuf; - int j; - p += sprintf(p, "auth failed pass error %s %s recv-md5[", tmpstr, account->userid); - for(j = 0; j < 16; j++) - p += sprintf(p, "%02x", ((unsigned char *)user_password)[j]); - p += sprintf(p, "] calc-md5["); - for(j = 0; j < 16; j++) - p += sprintf(p, "%02x", ((unsigned char *)md5bin)[j]); - p += sprintf(p, "] md5key["); - for(j = 0; j < md5keylen; j++) - p += sprintf(p, "%02x", ((unsigned char *)md5key)[j]); - p += sprintf(p, "]" RETCODE); - printf("%s\n", p); + } + else + { + char logbuf[1024], *p = logbuf; + int j; + p += sprintf (p, "auth failed pass error %s %s recv-md5[", + tmpstr, account->userid); + for (j = 0; j < 16; j++) + p += sprintf (p, "%02x", + ((unsigned char *) user_password)[j]); + p += sprintf (p, "] calc-md5["); + for (j = 0; j < 16; j++) + p += sprintf (p, "%02x", ((unsigned char *) md5bin)[j]); + p += sprintf (p, "] md5key["); + for (j = 0; j < md5keylen; j++) + p += sprintf (p, "%02x", ((unsigned char *) md5key)[j]); + p += sprintf (p, "]" RETCODE); + printf ("%s\n", p); #endif - } - return 1; - } - printf("auth ok %s %s" RETCODE, tmpstr, account->userid); - } - - if (atoi(sql_row[9])) { - switch(atoi(sql_row[9])) { // packet 0x006a value + 1 - case 1: // 0 = Unregistered ID - case 2: // 1 = Incorrect Password - case 3: // 2 = This ID is expired - case 4: // 3 = Rejected from Server - case 5: // 4 = You have been blocked by the GM Team - case 6: // 5 = Your Game's EXE file is not the latest version - case 7: // 6 = Your are Prohibited to log in until %s - case 8: // 7 = Server is jammed due to over populated - case 9: // 8 = No MSG (actually, all states after 9 except 99 are No MSG, use only this) - case 100: // 99 = This ID has been totally erased - printf("Auth Error #%d\n", atoi(sql_row[9])); - return atoi(sql_row[9]) - 1; - break; - default: - return 99; // 99 = ID has been totally erased - break; - } - } + } + return 1; + } + printf ("auth ok %s %s" RETCODE, tmpstr, account->userid); + } + + if (atoi (sql_row[9])) + { + switch (atoi (sql_row[9])) + { // packet 0x006a value + 1 + case 1: // 0 = Unregistered ID + case 2: // 1 = Incorrect Password + case 3: // 2 = This ID is expired + case 4: // 3 = Rejected from Server + case 5: // 4 = You have been blocked by the GM Team + case 6: // 5 = Your Game's EXE file is not the latest version + case 7: // 6 = Your are Prohibited to log in until %s + case 8: // 7 = Server is jammed due to over populated + case 9: // 8 = No MSG (actually, all states after 9 except 99 are No MSG, use only this) + case 100: // 99 = This ID has been totally erased + printf ("Auth Error #%d\n", atoi (sql_row[9])); + return atoi (sql_row[9]) - 1; + break; + default: + return 99; // 99 = ID has been totally erased + break; + } + } /* // do not remove this section. this is meant for future, and current forums usage @@ -498,1185 +563,1511 @@ int mmo_auth( struct mmo_account* account , int fd){ } } */ - ban_until_time = atol(sql_row[8]); - - //login {0-account_id/1-userid/2-user_pass/3-lastlogin/4-logincount/5-sex/6-connect_untl/7-last_ip/8-ban_until/9-state} - if (ban_until_time != 0) { // if account is banned - strftime(tmpstr, 20, date_format, gmtime(&ban_until_time)); - tmpstr[19] = '\0'; - if (ban_until_time > time(NULL)) { // always banned - return 6; // 6 = Your are Prohibited to log in until %s - } else { // ban is finished - // reset the ban time - sprintf(tmpsql, "UPDATE `%s` SET `ban_until`='0' WHERE `%s`='%s'", login_db, login_db_userid, t_uid); - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - } - } - - if (atol(sql_row[6]) != 0 && atol(sql_row[6]) < time(NULL)) { - return 2; // 2 = This ID is expired - } - - account->account_id = atoi(sql_row[0]); - account->login_id1 = rand(); - account->login_id2 = rand(); - memcpy(tmpstr, sql_row[3], 19); - memcpy(account->lastlogin, tmpstr, 24); - account->sex = sql_row[5][0] == 'S' ? 2 : sql_row[5][0]=='M'; - - sprintf(tmpsql, "UPDATE `%s` SET `lastlogin` = NOW(), `logincount`=`logincount` +1, `last_ip`='%s' WHERE `%s` = '%s'", - login_db, ip, login_db_userid, sql_row[1]); - mysql_free_result(sql_res) ; //resource free - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - - return -1; + ban_until_time = atol (sql_row[8]); + + //login {0-account_id/1-userid/2-user_pass/3-lastlogin/4-logincount/5-sex/6-connect_untl/7-last_ip/8-ban_until/9-state} + if (ban_until_time != 0) + { // if account is banned + strftime (tmpstr, 20, date_format, gmtime (&ban_until_time)); + tmpstr[19] = '\0'; + if (ban_until_time > time (NULL)) + { // always banned + return 6; // 6 = Your are Prohibited to log in until %s + } + else + { // ban is finished + // reset the ban time + sprintf (tmpsql, + "UPDATE `%s` SET `ban_until`='0' WHERE `%s`='%s'", + login_db, login_db_userid, t_uid); + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + } + } + + if (atol (sql_row[6]) != 0 && atol (sql_row[6]) < time (NULL)) + { + return 2; // 2 = This ID is expired + } + + account->account_id = atoi (sql_row[0]); + account->login_id1 = rand (); + account->login_id2 = rand (); + memcpy (tmpstr, sql_row[3], 19); + memcpy (account->lastlogin, tmpstr, 24); + account->sex = sql_row[5][0] == 'S' ? 2 : sql_row[5][0] == 'M'; + + sprintf (tmpsql, + "UPDATE `%s` SET `lastlogin` = NOW(), `logincount`=`logincount` +1, `last_ip`='%s' WHERE `%s` = '%s'", + login_db, ip, login_db_userid, sql_row[1]); + mysql_free_result (sql_res); //resource free + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); + } + + return -1; } // Send to char -int charif_sendallwos(int sfd, unsigned char *buf, unsigned int len) { - int i, c; - int fd; - - c = 0; - for(i = 0; i < MAX_SERVERS; i++) { - if ((fd = server_fd[i]) > 0 && fd != sfd) { - memcpy(WFIFOP(fd,0), buf, len); - WFIFOSET(fd,len); - c++; - } - } +int charif_sendallwos (int sfd, unsigned char *buf, unsigned int len) +{ + int i, c; + int fd; + + c = 0; + for (i = 0; i < MAX_SERVERS; i++) + { + if ((fd = server_fd[i]) > 0 && fd != sfd) + { + memcpy (WFIFOP (fd, 0), buf, len); + WFIFOSET (fd, len); + c++; + } + } - return c; + return c; } //-------------------------------- // Char-server anti-freeze system //-------------------------------- -int char_anti_freeze_system(int tid, unsigned int tick, int id, int data) { - int i; - - for(i = 0; i < MAX_SERVERS; i++) { - if (server_fd[i] >= 0) {// if char-server is online -// printf("char_anti_freeze_system: server #%d '%s', flag: %d.\n", i, server[i].name, server_freezeflag[i]); - if (server_freezeflag[i]-- < 1) {// Char-server anti-freeze system. Counter. 5 ok, 4...0 freezed - session[server_fd[i]]->eof = 1; - } - } - } +int char_anti_freeze_system (int tid, unsigned int tick, int id, int data) +{ + int i; + + for (i = 0; i < MAX_SERVERS; i++) + { + if (server_fd[i] >= 0) + { // if char-server is online +// printf("char_anti_freeze_system: server #%d '%s', flag: %d.\n", i, server[i].name, server_freezeflag[i]); + if (server_freezeflag[i]-- < 1) + { // Char-server anti-freeze system. Counter. 5 ok, 4...0 freezed + session[server_fd[i]]->eof = 1; + } + } + } - return 0; + return 0; } //----------------------------------------------------- // char-server packet parse //----------------------------------------------------- -int parse_fromchar(int fd){ - int i, id; - MYSQL_RES* sql_res; - MYSQL_ROW sql_row = NULL; - - unsigned char *p = (unsigned char *) &session[fd]->client_addr.sin_addr; - char ip[16]; - - sprintf(ip, "%d.%d.%d.%d", p[0], p[1], p[2], p[3]); - - for(id = 0; id < MAX_SERVERS; id++) - if (server_fd[id] == fd) - break; - - if (id == MAX_SERVERS || session[fd]->eof) { - if (id < MAX_SERVERS) { - printf("Char-server '%s' has disconnected.\n", server[id].name); - server_fd[id] = -1; - memset(&server[id], 0, sizeof(struct mmo_char_server)); - // server delete - sprintf(tmpsql, "DELETE FROM `sstatus` WHERE `index`='%d'", id); - // query - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - } - close(fd); - delete_session(fd); - return 0; - } - - while(RFIFOREST(fd) >= 2) { -// printf("char_parse: %d %d packet case=%x\n", fd, RFIFOREST(fd), RFIFOW(fd, 0)); - - switch (RFIFOW(fd,0)) { - case 0x2712: - if (RFIFOREST(fd) < 19) - return 0; - { - int account_id; - account_id = RFIFOL(fd,2); // speed up - for(i=0;i<AUTH_FIFO_SIZE;i++){ - if (auth_fifo[i].account_id == account_id && - auth_fifo[i].login_id1 == RFIFOL(fd,6) && +int parse_fromchar (int fd) +{ + int i, id; + MYSQL_RES *sql_res; + MYSQL_ROW sql_row = NULL; + + unsigned char *p = (unsigned char *) &session[fd]->client_addr.sin_addr; + char ip[16]; + + sprintf (ip, "%d.%d.%d.%d", p[0], p[1], p[2], p[3]); + + for (id = 0; id < MAX_SERVERS; id++) + if (server_fd[id] == fd) + break; + + if (id == MAX_SERVERS || session[fd]->eof) + { + if (id < MAX_SERVERS) + { + printf ("Char-server '%s' has disconnected.\n", server[id].name); + server_fd[id] = -1; + memset (&server[id], 0, sizeof (struct mmo_char_server)); + // server delete + sprintf (tmpsql, "DELETE FROM `sstatus` WHERE `index`='%d'", id); + // query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + } + close (fd); + delete_session (fd); + return 0; + } + + while (RFIFOREST (fd) >= 2) + { +// printf("char_parse: %d %d packet case=%x\n", fd, RFIFOREST(fd), RFIFOW(fd, 0)); + + switch (RFIFOW (fd, 0)) + { + case 0x2712: + if (RFIFOREST (fd) < 19) + return 0; + { + int account_id; + account_id = RFIFOL (fd, 2); // speed up + for (i = 0; i < AUTH_FIFO_SIZE; i++) + { + if (auth_fifo[i].account_id == account_id && + auth_fifo[i].login_id1 == RFIFOL (fd, 6) && #if CMP_AUTHFIFO_LOGIN2 != 0 - auth_fifo[i].login_id2 == RFIFOL(fd,10) && // relate to the versions higher than 18 + auth_fifo[i].login_id2 == RFIFOL (fd, 10) && // relate to the versions higher than 18 #endif - auth_fifo[i].sex == RFIFOB(fd,14) && + auth_fifo[i].sex == RFIFOB (fd, 14) && #if CMP_AUTHFIFO_IP != 0 - auth_fifo[i].ip == RFIFOL(fd,15) && + auth_fifo[i].ip == RFIFOL (fd, 15) && #endif - !auth_fifo[i].delflag) { - auth_fifo[i].delflag = 1; - printf("auth -> %d\n", i); - break; - } - } - - if (i != AUTH_FIFO_SIZE) { // send account_reg - int p; - time_t connect_until_time = 0; - char email[40] = ""; - account_id=RFIFOL(fd,2); - sprintf(tmpsql, "SELECT `email`,`connect_until` FROM `%s` WHERE `%s`='%d'", login_db, login_db_account_id, account_id); - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - sql_res = mysql_store_result(&mysql_handle) ; - if (sql_res) { - sql_row = mysql_fetch_row(sql_res); - connect_until_time = atol(sql_row[1]); - strcpy(email, sql_row[0]); - } - mysql_free_result(sql_res); - if (account_id > 0) { - sprintf(tmpsql, "SELECT `str`,`value` FROM `global_reg_value` WHERE `type`='1' AND `account_id`='%d'",account_id); - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - sql_res = mysql_store_result(&mysql_handle) ; - if (sql_res) { - WFIFOW(fd,0) = 0x2729; - WFIFOL(fd,4) = account_id; - for(p = 8; (sql_row = mysql_fetch_row(sql_res));p+=36){ - memcpy(WFIFOP(fd,p), sql_row[0], 32); - WFIFOL(fd,p+32) = atoi(sql_row[1]); - } - WFIFOW(fd,2) = p; - WFIFOSET(fd,p); - //printf("account_reg2 send : login->char (auth fifo)\n"); - WFIFOW(fd,0) = 0x2713; - WFIFOL(fd,2) = account_id; - WFIFOB(fd,6) = 0; - memcpy(WFIFOP(fd, 7), email, 40); - WFIFOL(fd,47) = (unsigned long) connect_until_time; - WFIFOSET(fd,51); - } - mysql_free_result(sql_res); - } - } else { - WFIFOW(fd,0) = 0x2713; - WFIFOL(fd,2) = account_id; - WFIFOB(fd,6) = 1; - WFIFOSET(fd,51); - } - } - RFIFOSKIP(fd,19); - break; - - case 0x2714: - if (RFIFOREST(fd) < 6) - return 0; - // how many users on world? (update) - if (server[id].users != RFIFOL(fd,2)) - printf("set users %s : %d\n", server[id].name, RFIFOL(fd,2)); - server[id].users = RFIFOL(fd,2); - if(anti_freeze_enable) - server_freezeflag[id] = 5; // Char anti-freeze system. Counter. 5 ok, 4...0 freezed - - sprintf(tmpsql,"UPDATE `sstatus` SET `user` = '%d' WHERE `index` = '%d'", server[id].users, id); - // query - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - RFIFOSKIP(fd,6); - break; - - // We receive an e-mail/limited time request, because a player comes back from a map-server to the char-server - case 0x2716: - if (RFIFOREST(fd) < 6) - return 0; - { - int account_id; - time_t connect_until_time = 0; - char email[40] = ""; - account_id=RFIFOL(fd,2); - sprintf(tmpsql,"SELECT `email`,`connect_until` FROM `%s` WHERE `%s`='%d'",login_db, login_db_account_id, account_id); - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - sql_res = mysql_store_result(&mysql_handle) ; - if (sql_res) { - sql_row = mysql_fetch_row(sql_res); - connect_until_time = atol(sql_row[1]); - strcpy(email, sql_row[0]); - } - mysql_free_result(sql_res); - //printf("parse_fromchar: E-mail/limited time request from '%s' server (concerned account: %d)\n", server[id].name, RFIFOL(fd,2)); - WFIFOW(fd,0) = 0x2717; - WFIFOL(fd,2) = RFIFOL(fd,2); - memcpy(WFIFOP(fd, 6), email, 40); - WFIFOL(fd,46) = (unsigned long) connect_until_time; - WFIFOSET(fd,50); - } - RFIFOSKIP(fd,6); - break; + !auth_fifo[i].delflag) + { + auth_fifo[i].delflag = 1; + printf ("auth -> %d\n", i); + break; + } + } - case 0x2720: // GM - if (RFIFOREST(fd) < 4) - return 0; - if (RFIFOREST(fd) < RFIFOW(fd,2)) - return 0; - //oldacc = RFIFOL(fd,4); - printf("change GM isn't support in this login server version.\n"); - printf("change GM error 0 %s\n", RFIFOP(fd, 8)); - - RFIFOSKIP(fd, RFIFOW(fd, 2)); - WFIFOW(fd, 0) = 0x2721; - WFIFOL(fd, 2) = RFIFOL(fd,4); // oldacc; - WFIFOL(fd, 6) = 0; // newacc; - WFIFOSET(fd, 10); - return 0; - - // Map server send information to change an email of an account via char-server - case 0x2722: // 0x2722 <account_id>.L <actual_e-mail>.40B <new_e-mail>.40B - if (RFIFOREST(fd) < 86) - return 0; - { - int acc; - char actual_email[40], new_email[40]; - acc = RFIFOL(fd,2); - memcpy(actual_email, RFIFOP(fd,6), 40); - memcpy(new_email, RFIFOP(fd,46), 40); - if (e_mail_check(actual_email) == 0) - printf("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command), but actual email is invalid (account: %d, ip: %s)" RETCODE, - server[id].name, acc, ip); - else if (e_mail_check(new_email) == 0) - printf("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command) with a invalid new e-mail (account: %d, ip: %s)" RETCODE, - server[id].name, acc, ip); - else if (strcmpi(new_email, "a@a.com") == 0) - printf("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command) with a default e-mail (account: %d, ip: %s)" RETCODE, - server[id].name, acc, ip); - else { - sprintf(tmpsql, "SELECT `%s`,`email` FROM `%s` WHERE `%s` = '%d'", login_db_userid, login_db, login_db_account_id, acc); - if (mysql_query(&mysql_handle, tmpsql)) - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - sql_res = mysql_store_result(&mysql_handle); - if (sql_res) { - sql_row = mysql_fetch_row(sql_res); //row fetching - - if (strcmpi(sql_row[1], actual_email) == 0) { - sprintf(tmpsql, "UPDATE `%s` SET `email` = '%s' WHERE `%s` = '%d'", login_db, new_email, login_db_account_id, acc); - // query - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - printf("Char-server '%s': Modify an e-mail on an account (@email GM command) (account: %d (%s), new e-mail: %s, ip: %s)." RETCODE, - server[id].name, acc, sql_row[0], actual_email, ip); - } - } - - } - } - RFIFOSKIP(fd, 86); - break; + if (i != AUTH_FIFO_SIZE) + { // send account_reg + int p; + time_t connect_until_time = 0; + char email[40] = ""; + account_id = RFIFOL (fd, 2); + sprintf (tmpsql, + "SELECT `email`,`connect_until` FROM `%s` WHERE `%s`='%d'", + login_db, login_db_account_id, account_id); + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + sql_res = mysql_store_result (&mysql_handle); + if (sql_res) + { + sql_row = mysql_fetch_row (sql_res); + connect_until_time = atol (sql_row[1]); + strcpy (email, sql_row[0]); + } + mysql_free_result (sql_res); + if (account_id > 0) + { + sprintf (tmpsql, + "SELECT `str`,`value` FROM `global_reg_value` WHERE `type`='1' AND `account_id`='%d'", + account_id); + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + sql_res = mysql_store_result (&mysql_handle); + if (sql_res) + { + WFIFOW (fd, 0) = 0x2729; + WFIFOL (fd, 4) = account_id; + for (p = 8; + (sql_row = mysql_fetch_row (sql_res)); + p += 36) + { + memcpy (WFIFOP (fd, p), sql_row[0], 32); + WFIFOL (fd, p + 32) = atoi (sql_row[1]); + } + WFIFOW (fd, 2) = p; + WFIFOSET (fd, p); + //printf("account_reg2 send : login->char (auth fifo)\n"); + WFIFOW (fd, 0) = 0x2713; + WFIFOL (fd, 2) = account_id; + WFIFOB (fd, 6) = 0; + memcpy (WFIFOP (fd, 7), email, 40); + WFIFOL (fd, 47) = + (unsigned long) connect_until_time; + WFIFOSET (fd, 51); + } + mysql_free_result (sql_res); + } + } + else + { + WFIFOW (fd, 0) = 0x2713; + WFIFOL (fd, 2) = account_id; + WFIFOB (fd, 6) = 1; + WFIFOSET (fd, 51); + } + } + RFIFOSKIP (fd, 19); + break; + + case 0x2714: + if (RFIFOREST (fd) < 6) + return 0; + // how many users on world? (update) + if (server[id].users != RFIFOL (fd, 2)) + printf ("set users %s : %d\n", server[id].name, + RFIFOL (fd, 2)); + server[id].users = RFIFOL (fd, 2); + if (anti_freeze_enable) + server_freezeflag[id] = 5; // Char anti-freeze system. Counter. 5 ok, 4...0 freezed + + sprintf (tmpsql, + "UPDATE `sstatus` SET `user` = '%d' WHERE `index` = '%d'", + server[id].users, id); + // query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + RFIFOSKIP (fd, 6); + break; + + // We receive an e-mail/limited time request, because a player comes back from a map-server to the char-server + case 0x2716: + if (RFIFOREST (fd) < 6) + return 0; + { + int account_id; + time_t connect_until_time = 0; + char email[40] = ""; + account_id = RFIFOL (fd, 2); + sprintf (tmpsql, + "SELECT `email`,`connect_until` FROM `%s` WHERE `%s`='%d'", + login_db, login_db_account_id, account_id); + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + sql_res = mysql_store_result (&mysql_handle); + if (sql_res) + { + sql_row = mysql_fetch_row (sql_res); + connect_until_time = atol (sql_row[1]); + strcpy (email, sql_row[0]); + } + mysql_free_result (sql_res); + //printf("parse_fromchar: E-mail/limited time request from '%s' server (concerned account: %d)\n", server[id].name, RFIFOL(fd,2)); + WFIFOW (fd, 0) = 0x2717; + WFIFOL (fd, 2) = RFIFOL (fd, 2); + memcpy (WFIFOP (fd, 6), email, 40); + WFIFOL (fd, 46) = (unsigned long) connect_until_time; + WFIFOSET (fd, 50); + } + RFIFOSKIP (fd, 6); + break; + + case 0x2720: // GM + if (RFIFOREST (fd) < 4) + return 0; + if (RFIFOREST (fd) < RFIFOW (fd, 2)) + return 0; + //oldacc = RFIFOL(fd,4); + printf + ("change GM isn't support in this login server version.\n"); + printf ("change GM error 0 %s\n", RFIFOP (fd, 8)); + + RFIFOSKIP (fd, RFIFOW (fd, 2)); + WFIFOW (fd, 0) = 0x2721; + WFIFOL (fd, 2) = RFIFOL (fd, 4); // oldacc; + WFIFOL (fd, 6) = 0; // newacc; + WFIFOSET (fd, 10); + return 0; + + // Map server send information to change an email of an account via char-server + case 0x2722: // 0x2722 <account_id>.L <actual_e-mail>.40B <new_e-mail>.40B + if (RFIFOREST (fd) < 86) + return 0; + { + int acc; + char actual_email[40], new_email[40]; + acc = RFIFOL (fd, 2); + memcpy (actual_email, RFIFOP (fd, 6), 40); + memcpy (new_email, RFIFOP (fd, 46), 40); + if (e_mail_check (actual_email) == 0) + printf + ("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command), but actual email is invalid (account: %d, ip: %s)" + RETCODE, server[id].name, acc, ip); + else if (e_mail_check (new_email) == 0) + printf + ("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command) with a invalid new e-mail (account: %d, ip: %s)" + RETCODE, server[id].name, acc, ip); + else if (strcmpi (new_email, "a@a.com") == 0) + printf + ("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command) with a default e-mail (account: %d, ip: %s)" + RETCODE, server[id].name, acc, ip); + else + { + sprintf (tmpsql, + "SELECT `%s`,`email` FROM `%s` WHERE `%s` = '%d'", + login_db_userid, login_db, + login_db_account_id, acc); + if (mysql_query (&mysql_handle, tmpsql)) + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + sql_res = mysql_store_result (&mysql_handle); + if (sql_res) + { + sql_row = mysql_fetch_row (sql_res); //row fetching + + if (strcmpi (sql_row[1], actual_email) == 0) + { + sprintf (tmpsql, + "UPDATE `%s` SET `email` = '%s' WHERE `%s` = '%d'", + login_db, new_email, + login_db_account_id, acc); + // query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + printf + ("Char-server '%s': Modify an e-mail on an account (@email GM command) (account: %d (%s), new e-mail: %s, ip: %s)." + RETCODE, server[id].name, acc, + sql_row[0], actual_email, ip); + } + } - case 0x2724: // Receiving of map-server via char-server a status change resquest (by Yor) - if (RFIFOREST(fd) < 10) - return 0; - { - int acc, statut; - acc = RFIFOL(fd,2); - statut = RFIFOL(fd,6); - sprintf(tmpsql, "SELECT `state` FROM `%s` WHERE `%s` = '%d'", login_db, login_db_account_id, acc); - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - sql_res = mysql_store_result(&mysql_handle); - if (sql_res) { - sql_row = mysql_fetch_row(sql_res); // row fetching - } - if (atoi(sql_row[0]) != statut && statut != 0) { - unsigned char buf[16]; - WBUFW(buf,0) = 0x2731; - WBUFL(buf,2) = acc; - WBUFB(buf,6) = 0; // 0: change of statut, 1: ban - WBUFL(buf,7) = statut; // status or final date of a banishment - charif_sendallwos(-1, buf, 11); - } - sprintf(tmpsql,"UPDATE `%s` SET `state` = '%d' WHERE `%s` = '%d'", login_db, statut,login_db_account_id,acc); - //query - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - RFIFOSKIP(fd,10); - } - return 0; - - case 0x2725: // Receiving of map-server via char-server a ban resquest (by Yor) - if (RFIFOREST(fd) < 18) - return 0; - { - int acc; - struct tm *tmtime; - time_t timestamp, tmptime; - acc = RFIFOL(fd,2); - sprintf(tmpsql, "SELECT `ban_until` FROM `%s` WHERE `%s` = '%d'",login_db,login_db_account_id,acc); - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - sql_res = mysql_store_result(&mysql_handle); - if (sql_res) { - sql_row = mysql_fetch_row(sql_res); // row fetching - } - tmptime = atol(sql_row[0]); - if (tmptime == 0 || tmptime < time(NULL)) - timestamp = time(NULL); - else - timestamp = tmptime; - tmtime = gmtime(×tamp); - tmtime->tm_year = tmtime->tm_year + (short)RFIFOW(fd,6); - tmtime->tm_mon = tmtime->tm_mon + (short)RFIFOW(fd,8); - tmtime->tm_mday = tmtime->tm_mday + (short)RFIFOW(fd,10); - tmtime->tm_hour = tmtime->tm_hour + (short)RFIFOW(fd,12); - tmtime->tm_min = tmtime->tm_min + (short)RFIFOW(fd,14); - tmtime->tm_sec = tmtime->tm_sec + (short)RFIFOW(fd,16); - timestamp = timegm(tmtime); - if (timestamp != -1) { - if (timestamp <= time(NULL)) - timestamp = 0; - if (tmptime != timestamp) { - if (timestamp != 0) { - unsigned char buf[16]; - WBUFW(buf,0) = 0x2731; - WBUFL(buf,2) = acc; - WBUFB(buf,6) = 1; // 0: change of statut, 1: ban - WBUFL(buf,7) = timestamp; // status or final date of a banishment - charif_sendallwos(-1, buf, 11); - } - printf("Account: %d Banned until: %ld\n", acc, timestamp); - sprintf(tmpsql, "UPDATE `%s` SET `ban_until` = '%ld', `state`='7' WHERE `%s` = '%d'", login_db, timestamp, login_db_account_id, acc); - // query - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - } - } - RFIFOSKIP(fd,18); - break; - } - return 0; - - case 0x2727: - if (RFIFOREST(fd) < 6) - return 0; - { - int acc,sex; - unsigned char buf[16]; - acc=RFIFOL(fd,4); - sprintf(tmpsql,"SELECT `sex` FROM `%s` WHERE `%s` = '%d'",login_db,login_db_account_id,acc); - - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - return 0; + } } - - sql_res = mysql_store_result(&mysql_handle) ; - - if (sql_res) { - if (mysql_num_rows(sql_res) == 0) { - mysql_free_result(sql_res); - return 0; - } - sql_row = mysql_fetch_row(sql_res); //row fetching - } - - if (strcmpi(sql_row[0], "M") == 0) - sex = 1; - else - sex = 0; - sprintf(tmpsql,"UPDATE `%s` SET `sex` = '%c' WHERE `%s` = '%d'", login_db, (sex==0?'M':'F'), login_db_account_id, acc); - //query - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - WBUFW(buf,0) = 0x2723; - WBUFL(buf,2) = acc; - WBUFB(buf,6) = sex; - charif_sendallwos(-1, buf, 7); - RFIFOSKIP(fd,6); - } - return 0; - - case 0x2728: // save account_reg - if (RFIFOREST(fd) < 4 || RFIFOREST(fd) < RFIFOW(fd,2)) - return 0; - { - int acc,p,j; - char str[32]; - char temp_str[32]; - int value; - acc=RFIFOL(fd,4); - - if (acc>0){ - unsigned char buf[RFIFOW(fd,2)+1]; - for(p=8,j=0;p<RFIFOW(fd,2) && j<ACCOUNT_REG2_NUM;p+=36,j++){ - memcpy(str,RFIFOP(fd,p),32); - value=RFIFOL(fd,p+32); - sprintf(tmpsql,"DELETE FROM `global_reg_value` WHERE `type`='1' AND `account_id`='%d' AND `str`='%s';",acc,jstrescapecpy(temp_str,str)); - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - sprintf(tmpsql,"INSERT INTO `global_reg_value` (`type`, `account_id`, `str`, `value`) VALUES ( 1 , '%d' , '%s' , '%d');", acc, jstrescapecpy(temp_str,str), value); - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - } - - // Send to char - memcpy(WBUFP(buf,0),RFIFOP(fd,0),RFIFOW(fd,2)); - WBUFW(buf,0)=0x2729; - charif_sendallwos(fd,buf,WBUFW(buf,2)); - } - } - RFIFOSKIP(fd,RFIFOW(fd,2)); - //printf("login: save account_reg (from char)\n"); - break; - - case 0x272a: // Receiving of map-server via char-server a unban resquest (by Yor) - if (RFIFOREST(fd) < 6) - return 0; - { - int acc; - acc = RFIFOL(fd,2); - sprintf(tmpsql,"SELECT `ban_until` FROM `%s` WHERE `%s` = '%d'",login_db,login_db_account_id,acc); - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); + RFIFOSKIP (fd, 86); + break; + + case 0x2724: // Receiving of map-server via char-server a status change resquest (by Yor) + if (RFIFOREST (fd) < 10) + return 0; + { + int acc, statut; + acc = RFIFOL (fd, 2); + statut = RFIFOL (fd, 6); + sprintf (tmpsql, + "SELECT `state` FROM `%s` WHERE `%s` = '%d'", + login_db, login_db_account_id, acc); + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + sql_res = mysql_store_result (&mysql_handle); + if (sql_res) + { + sql_row = mysql_fetch_row (sql_res); // row fetching + } + if (atoi (sql_row[0]) != statut && statut != 0) + { + unsigned char buf[16]; + WBUFW (buf, 0) = 0x2731; + WBUFL (buf, 2) = acc; + WBUFB (buf, 6) = 0; // 0: change of statut, 1: ban + WBUFL (buf, 7) = statut; // status or final date of a banishment + charif_sendallwos (-1, buf, 11); + } + sprintf (tmpsql, + "UPDATE `%s` SET `state` = '%d' WHERE `%s` = '%d'", + login_db, statut, login_db_account_id, acc); + //query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + RFIFOSKIP (fd, 10); } - sql_res = mysql_store_result(&mysql_handle) ; - if (sql_res) { - sql_row = mysql_fetch_row(sql_res); //row fetching + return 0; + + case 0x2725: // Receiving of map-server via char-server a ban resquest (by Yor) + if (RFIFOREST (fd) < 18) + return 0; + { + int acc; + struct tm *tmtime; + time_t timestamp, tmptime; + acc = RFIFOL (fd, 2); + sprintf (tmpsql, + "SELECT `ban_until` FROM `%s` WHERE `%s` = '%d'", + login_db, login_db_account_id, acc); + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + sql_res = mysql_store_result (&mysql_handle); + if (sql_res) + { + sql_row = mysql_fetch_row (sql_res); // row fetching + } + tmptime = atol (sql_row[0]); + if (tmptime == 0 || tmptime < time (NULL)) + timestamp = time (NULL); + else + timestamp = tmptime; + tmtime = gmtime (×tamp); + tmtime->tm_year = + tmtime->tm_year + (short) RFIFOW (fd, 6); + tmtime->tm_mon = tmtime->tm_mon + (short) RFIFOW (fd, 8); + tmtime->tm_mday = + tmtime->tm_mday + (short) RFIFOW (fd, 10); + tmtime->tm_hour = + tmtime->tm_hour + (short) RFIFOW (fd, 12); + tmtime->tm_min = tmtime->tm_min + (short) RFIFOW (fd, 14); + tmtime->tm_sec = tmtime->tm_sec + (short) RFIFOW (fd, 16); + timestamp = timegm (tmtime); + if (timestamp != -1) + { + if (timestamp <= time (NULL)) + timestamp = 0; + if (tmptime != timestamp) + { + if (timestamp != 0) + { + unsigned char buf[16]; + WBUFW (buf, 0) = 0x2731; + WBUFL (buf, 2) = acc; + WBUFB (buf, 6) = 1; // 0: change of statut, 1: ban + WBUFL (buf, 7) = timestamp; // status or final date of a banishment + charif_sendallwos (-1, buf, 11); + } + printf ("Account: %d Banned until: %ld\n", acc, + timestamp); + sprintf (tmpsql, + "UPDATE `%s` SET `ban_until` = '%ld', `state`='7' WHERE `%s` = '%d'", + login_db, timestamp, login_db_account_id, + acc); + // query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + } + } + RFIFOSKIP (fd, 18); + break; } - if (atol(sql_row[0]) != 0) { - sprintf(tmpsql,"UPDATE `%s` SET `ban_until` = '0', `state`='0' WHERE `%s` = '%d'", login_db,login_db_account_id,acc); + return 0; + + case 0x2727: + if (RFIFOREST (fd) < 6) + return 0; + { + int acc, sex; + unsigned char buf[16]; + acc = RFIFOL (fd, 4); + sprintf (tmpsql, + "SELECT `sex` FROM `%s` WHERE `%s` = '%d'", + login_db, login_db_account_id, acc); + + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + return 0; + } + + sql_res = mysql_store_result (&mysql_handle); + + if (sql_res) + { + if (mysql_num_rows (sql_res) == 0) + { + mysql_free_result (sql_res); + return 0; + } + sql_row = mysql_fetch_row (sql_res); //row fetching + } + + if (strcmpi (sql_row[0], "M") == 0) + sex = 1; + else + sex = 0; + sprintf (tmpsql, + "UPDATE `%s` SET `sex` = '%c' WHERE `%s` = '%d'", + login_db, (sex == 0 ? 'M' : 'F'), + login_db_account_id, acc); //query - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); } - break; - } - RFIFOSKIP(fd,6); - } - return 0; - - default: - printf("login: unknown packet %x! (from char).\n", RFIFOW(fd,0)); - session[fd]->eof = 1; - return 0; - } - } + WBUFW (buf, 0) = 0x2723; + WBUFL (buf, 2) = acc; + WBUFB (buf, 6) = sex; + charif_sendallwos (-1, buf, 7); + RFIFOSKIP (fd, 6); + } + return 0; + + case 0x2728: // save account_reg + if (RFIFOREST (fd) < 4 || RFIFOREST (fd) < RFIFOW (fd, 2)) + return 0; + { + int acc, p, j; + char str[32]; + char temp_str[32]; + int value; + acc = RFIFOL (fd, 4); + + if (acc > 0) + { + unsigned char buf[RFIFOW (fd, 2) + 1]; + for (p = 8, j = 0; + p < RFIFOW (fd, 2) && j < ACCOUNT_REG2_NUM; + p += 36, j++) + { + memcpy (str, RFIFOP (fd, p), 32); + value = RFIFOL (fd, p + 32); + sprintf (tmpsql, + "DELETE FROM `global_reg_value` WHERE `type`='1' AND `account_id`='%d' AND `str`='%s';", + acc, jstrescapecpy (temp_str, str)); + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + sprintf (tmpsql, + "INSERT INTO `global_reg_value` (`type`, `account_id`, `str`, `value`) VALUES ( 1 , '%d' , '%s' , '%d');", + acc, jstrescapecpy (temp_str, str), + value); + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + } + + // Send to char + memcpy (WBUFP (buf, 0), RFIFOP (fd, 0), + RFIFOW (fd, 2)); + WBUFW (buf, 0) = 0x2729; + charif_sendallwos (fd, buf, WBUFW (buf, 2)); + } + } + RFIFOSKIP (fd, RFIFOW (fd, 2)); + //printf("login: save account_reg (from char)\n"); + break; + + case 0x272a: // Receiving of map-server via char-server a unban resquest (by Yor) + if (RFIFOREST (fd) < 6) + return 0; + { + int acc; + acc = RFIFOL (fd, 2); + sprintf (tmpsql, + "SELECT `ban_until` FROM `%s` WHERE `%s` = '%d'", + login_db, login_db_account_id, acc); + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + sql_res = mysql_store_result (&mysql_handle); + if (sql_res) + { + sql_row = mysql_fetch_row (sql_res); //row fetching + } + if (atol (sql_row[0]) != 0) + { + sprintf (tmpsql, + "UPDATE `%s` SET `ban_until` = '0', `state`='0' WHERE `%s` = '%d'", + login_db, login_db_account_id, acc); + //query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + break; + } + RFIFOSKIP (fd, 6); + } + return 0; - return 0; + default: + printf ("login: unknown packet %x! (from char).\n", + RFIFOW (fd, 0)); + session[fd]->eof = 1; + return 0; + } + } + + return 0; } //Lan ip check added by Kashy -int lan_ip_check(unsigned char *p) { - int y; - int lancheck = 1; - int lancharip[4]; - - unsigned int k0, k1, k2, k3; - sscanf(lan_char_ip, "%d.%d.%d.%d", &k0, &k1, &k2, &k3); - lancharip[0] = k0; lancharip[1] = k1; lancharip[2] = k2; lancharip[3] = k3; - - for(y = 0; y < 4; y++) { - if ((lancharip[y] & subnetmaski[y])!= (p[y])) - lancheck = 0; - break; } - - printf("LAN check: %s.\n", (lancheck) ? "\033[1;32mLAN\033[0m" : "\033[1;31mWAN\033[0m"); - return lancheck; +int lan_ip_check (unsigned char *p) +{ + int y; + int lancheck = 1; + int lancharip[4]; + + unsigned int k0, k1, k2, k3; + sscanf (lan_char_ip, "%d.%d.%d.%d", &k0, &k1, &k2, &k3); + lancharip[0] = k0; + lancharip[1] = k1; + lancharip[2] = k2; + lancharip[3] = k3; + + for (y = 0; y < 4; y++) + { + if ((lancharip[y] & subnetmaski[y]) != (p[y])) + lancheck = 0; + break; + } + + printf ("LAN check: %s.\n", + (lancheck) ? "\033[1;32mLAN\033[0m" : "\033[1;31mWAN\033[0m"); + return lancheck; } //---------------------------------------------------------------------------------------- // Default packet parsing (normal players or administation/char-server connection requests) //---------------------------------------------------------------------------------------- -int parse_login(int fd) { - //int len; - - MYSQL_RES* sql_res ; - MYSQL_ROW sql_row = NULL; - - char t_uid[100]; - //int sql_fields, sql_cnt; - struct mmo_account account; - - int result, i; - unsigned char *p = (unsigned char *) &session[fd]->client_addr.sin_addr; - char ip[16]; - - sprintf(ip, "%d.%d.%d.%d", p[0], p[1], p[2], p[3]); - - if (ipban > 0) { - //ip ban - //p[0], p[1], p[2], p[3] - //request DB connection - //check - sprintf(tmpsql, "SELECT count(*) FROM `ipbanlist` WHERE `list` = '%d.*.*.*' OR `list` = '%d.%d.*.*' OR `list` = '%d.%d.%d.*' OR `list` = '%d.%d.%d.%d'", - p[0], p[0], p[1], p[0], p[1], p[2], p[0], p[1], p[2], p[3]); - if (mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - - sql_res = mysql_store_result(&mysql_handle) ; - sql_row = mysql_fetch_row(sql_res); //row fetching - - if (atoi(sql_row[0]) >0) { - // ip ban ok. - printf ("packet from banned ip : %d.%d.%d.%d" RETCODE, p[0], p[1], p[2], p[3]); - sprintf(tmpsql,"INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', 'unknown','-3', 'ip banned')", loginlog_db, p[0], p[1], p[2], p[3]); - - // query - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - printf ("close session connection...\n"); - - // close connection - session[fd]->eof = 1; - - } else { - printf ("packet from ip (ban check ok) : %d.%d.%d.%d" RETCODE, p[0], p[1], p[2], p[3]); - } - mysql_free_result(sql_res); - } - - if (session[fd]->eof) { - for(i = 0; i < MAX_SERVERS; i++) - if (server_fd[i] == fd) - server_fd[i] = -1; - close(fd); - delete_session(fd); - return 0; - } - - while(RFIFOREST(fd)>=2){ - printf("parse_login : %d %d packet case=%x\n", fd, RFIFOREST(fd), RFIFOW(fd,0)); - - switch(RFIFOW(fd,0)){ - case 0x200: // New alive packet: structure: 0x200 <account.userid>.24B. used to verify if client is always alive. - if (RFIFOREST(fd) < 26) - return 0; - RFIFOSKIP(fd,26); - break; - - case 0x204: // New alive packet: structure: 0x204 <encrypted.account.userid>.16B. (new ragexe from 22 june 2004) - if (RFIFOREST(fd) < 18) - return 0; - RFIFOSKIP(fd,18); - break; +int parse_login (int fd) +{ + //int len; + + MYSQL_RES *sql_res; + MYSQL_ROW sql_row = NULL; + + char t_uid[100]; + //int sql_fields, sql_cnt; + struct mmo_account account; + + int result, i; + unsigned char *p = (unsigned char *) &session[fd]->client_addr.sin_addr; + char ip[16]; + + sprintf (ip, "%d.%d.%d.%d", p[0], p[1], p[2], p[3]); + + if (ipban > 0) + { + //ip ban + //p[0], p[1], p[2], p[3] + //request DB connection + //check + sprintf (tmpsql, + "SELECT count(*) FROM `ipbanlist` WHERE `list` = '%d.*.*.*' OR `list` = '%d.%d.*.*' OR `list` = '%d.%d.%d.*' OR `list` = '%d.%d.%d.%d'", + p[0], p[0], p[1], p[0], p[1], p[2], p[0], p[1], p[2], p[3]); + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); + } - case 0x64: // request client login - case 0x01dd: // request client login with encrypt - if(RFIFOREST(fd)< ((RFIFOW(fd, 0) ==0x64)?55:47)) - return 0; + sql_res = mysql_store_result (&mysql_handle); + sql_row = mysql_fetch_row (sql_res); //row fetching + + if (atoi (sql_row[0]) > 0) + { + // ip ban ok. + printf ("packet from banned ip : %d.%d.%d.%d" RETCODE, p[0], p[1], + p[2], p[3]); + sprintf (tmpsql, + "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', 'unknown','-3', 'ip banned')", + loginlog_db, p[0], p[1], p[2], p[3]); + + // query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + printf ("close session connection...\n"); - printf("client connection request %s from %d.%d.%d.%d\n", RFIFOP(fd, 6), p[0], p[1], p[2], p[3]); + // close connection + session[fd]->eof = 1; - account.userid = RFIFOP(fd, 6); - account.passwd = RFIFOP(fd, 30); + } + else + { + printf ("packet from ip (ban check ok) : %d.%d.%d.%d" RETCODE, + p[0], p[1], p[2], p[3]); + } + mysql_free_result (sql_res); + } + + if (session[fd]->eof) + { + for (i = 0; i < MAX_SERVERS; i++) + if (server_fd[i] == fd) + server_fd[i] = -1; + close (fd); + delete_session (fd); + return 0; + } + + while (RFIFOREST (fd) >= 2) + { + printf ("parse_login : %d %d packet case=%x\n", fd, RFIFOREST (fd), + RFIFOW (fd, 0)); + + switch (RFIFOW (fd, 0)) + { + case 0x200: // New alive packet: structure: 0x200 <account.userid>.24B. used to verify if client is always alive. + if (RFIFOREST (fd) < 26) + return 0; + RFIFOSKIP (fd, 26); + break; + + case 0x204: // New alive packet: structure: 0x204 <encrypted.account.userid>.16B. (new ragexe from 22 june 2004) + if (RFIFOREST (fd) < 18) + return 0; + RFIFOSKIP (fd, 18); + break; + + case 0x64: // request client login + case 0x01dd: // request client login with encrypt + if (RFIFOREST (fd) < ((RFIFOW (fd, 0) == 0x64) ? 55 : 47)) + return 0; + + printf ("client connection request %s from %d.%d.%d.%d\n", + RFIFOP (fd, 6), p[0], p[1], p[2], p[3]); + + account.userid = RFIFOP (fd, 6); + account.passwd = RFIFOP (fd, 30); #ifdef PASSWORDENC - account.passwdenc= (RFIFOW(fd,0)==0x64)?0:PASSWORDENC; + account.passwdenc = + (RFIFOW (fd, 0) == 0x64) ? 0 : PASSWORDENC; #else - account.passwdenc=0; + account.passwdenc = 0; #endif - result=mmo_auth(&account, fd); - - jstrescapecpy(t_uid,RFIFOP(fd, 6)); - if(result==-1){ - int gm_level = isGM(account.account_id); - if (min_level_to_connect > gm_level) { - WFIFOW(fd,0) = 0x81; - WFIFOL(fd,2) = 1; // 01 = Server closed - WFIFOSET(fd,3); - } else { - if (p[0] != 127) { - sprintf(tmpsql,"INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', '%s','100', 'login ok')", loginlog_db, p[0], p[1], p[2], p[3], t_uid); - //query - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } + result = mmo_auth (&account, fd); + + jstrescapecpy (t_uid, RFIFOP (fd, 6)); + if (result == -1) + { + int gm_level = isGM (account.account_id); + if (min_level_to_connect > gm_level) + { + WFIFOW (fd, 0) = 0x81; + WFIFOL (fd, 2) = 1; // 01 = Server closed + WFIFOSET (fd, 3); } - if (gm_level) - printf("Connection of the GM (level:%d) account '%s' accepted.\n", gm_level, account.userid); - else - printf("Connection of the account '%s' accepted.\n", account.userid); - server_num=0; - for(i = 0; i < MAX_SERVERS; i++) { - if (server_fd[i] >= 0) { - //Lan check added by Kashy - if (lan_ip_check(p)) - WFIFOL(fd,47+server_num*32) = inet_addr(lan_char_ip); - else - WFIFOL(fd,47+server_num*32) = server[i].ip; - WFIFOW(fd,47+server_num*32+4) = server[i].port; - memcpy(WFIFOP(fd,47+server_num*32+6), server[i].name, 20); - WFIFOW(fd,47+server_num*32+26) = server[i].users; - WFIFOW(fd,47+server_num*32+28) = server[i].maintenance; - WFIFOW(fd,47+server_num*32+30) = server[i].new; - server_num++; + else + { + if (p[0] != 127) + { + sprintf (tmpsql, + "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', '%s','100', 'login ok')", + loginlog_db, p[0], p[1], p[2], p[3], + t_uid); + //query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + } + if (gm_level) + printf + ("Connection of the GM (level:%d) account '%s' accepted.\n", + gm_level, account.userid); + else + printf + ("Connection of the account '%s' accepted.\n", + account.userid); + server_num = 0; + for (i = 0; i < MAX_SERVERS; i++) + { + if (server_fd[i] >= 0) + { + //Lan check added by Kashy + if (lan_ip_check (p)) + WFIFOL (fd, 47 + server_num * 32) = + inet_addr (lan_char_ip); + else + WFIFOL (fd, 47 + server_num * 32) = + server[i].ip; + WFIFOW (fd, 47 + server_num * 32 + 4) = + server[i].port; + memcpy (WFIFOP (fd, 47 + server_num * 32 + 6), + server[i].name, 20); + WFIFOW (fd, 47 + server_num * 32 + 26) = + server[i].users; + WFIFOW (fd, 47 + server_num * 32 + 28) = + server[i].maintenance; + WFIFOW (fd, 47 + server_num * 32 + 30) = + server[i].new; + server_num++; + } + } + // if at least 1 char-server + if (server_num > 0) + { + WFIFOW (fd, 0) = 0x69; + WFIFOW (fd, 2) = 47 + 32 * server_num; + WFIFOL (fd, 4) = account.login_id1; + WFIFOL (fd, 8) = account.account_id; + WFIFOL (fd, 12) = account.login_id2; + WFIFOL (fd, 16) = 0; + memcpy (WFIFOP (fd, 20), account.lastlogin, 24); + WFIFOB (fd, 46) = account.sex; + WFIFOSET (fd, 47 + 32 * server_num); + if (auth_fifo_pos >= AUTH_FIFO_SIZE) + auth_fifo_pos = 0; + auth_fifo[auth_fifo_pos].account_id = + account.account_id; + auth_fifo[auth_fifo_pos].login_id1 = + account.login_id1; + auth_fifo[auth_fifo_pos].login_id2 = + account.login_id2; + auth_fifo[auth_fifo_pos].sex = account.sex; + auth_fifo[auth_fifo_pos].delflag = 0; + auth_fifo[auth_fifo_pos].ip = + session[fd]->client_addr.sin_addr.s_addr; + auth_fifo_pos++; + } + else + { + WFIFOW (fd, 0) = 0x81; + WFIFOL (fd, 2) = 1; // 01 = Server closed + WFIFOSET (fd, 3); } } - // if at least 1 char-server - if (server_num > 0) { - WFIFOW(fd,0)=0x69; - WFIFOW(fd,2)=47+32*server_num; - WFIFOL(fd,4)=account.login_id1; - WFIFOL(fd,8)=account.account_id; - WFIFOL(fd,12)=account.login_id2; - WFIFOL(fd,16)=0; - memcpy(WFIFOP(fd,20),account.lastlogin,24); - WFIFOB(fd,46)=account.sex; - WFIFOSET(fd,47+32*server_num); - if(auth_fifo_pos>=AUTH_FIFO_SIZE) - auth_fifo_pos=0; - auth_fifo[auth_fifo_pos].account_id=account.account_id; - auth_fifo[auth_fifo_pos].login_id1=account.login_id1; - auth_fifo[auth_fifo_pos].login_id2=account.login_id2; - auth_fifo[auth_fifo_pos].sex=account.sex; - auth_fifo[auth_fifo_pos].delflag=0; - auth_fifo[auth_fifo_pos].ip = session[fd]->client_addr.sin_addr.s_addr; - auth_fifo_pos++; - } else { - WFIFOW(fd,0) = 0x81; - WFIFOL(fd,2) = 1; // 01 = Server closed - WFIFOSET(fd,3); + } + else + { + char tmp_sql[512]; + char error[64]; + sprintf (tmp_sql, + "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', '%s', '%d','login failed : %%s')", + loginlog_db, p[0], p[1], p[2], p[3], t_uid, + result); + switch ((result + 1)) + { + case -2: //-3 = Account Banned + sprintf (tmpsql, tmp_sql, "Account banned."); + sprintf (error, "Account banned."); + break; + case -1: //-2 = Dynamic Ban + sprintf (tmpsql, tmp_sql, + "dynamic ban (ip and account)."); + sprintf (error, "dynamic ban (ip and account)."); + break; + case 1: // 0 = Unregistered ID + sprintf (tmpsql, tmp_sql, "Unregisterd ID."); + sprintf (error, "Unregisterd ID."); + break; + case 2: // 1 = Incorrect Password + sprintf (tmpsql, tmp_sql, "Incorrect Password."); + sprintf (error, "Incorrect Password."); + break; + case 3: // 2 = This ID is expired + sprintf (tmpsql, tmp_sql, "Account Expired."); + sprintf (error, "Account Expired."); + break; + case 4: // 3 = Rejected from Server + sprintf (tmpsql, tmp_sql, + "Rejected from server."); + sprintf (error, "Rejected from server."); + break; + case 5: // 4 = You have been blocked by the GM Team + sprintf (tmpsql, tmp_sql, "Blocked by GM."); + sprintf (error, "Blocked by GM."); + break; + case 6: // 5 = Your Game's EXE file is not the latest version + sprintf (tmpsql, tmp_sql, "Not latest game EXE."); + sprintf (error, "Not latest game EXE."); + break; + case 7: // 6 = Your are Prohibited to log in until %s + sprintf (tmpsql, tmp_sql, "Banned."); + sprintf (error, "Banned."); + break; + case 8: // 7 = Server is jammed due to over populated + sprintf (tmpsql, tmp_sql, + "Server Over-population."); + sprintf (error, "Server Over-population."); + break; + case 9: // 8 = No MSG (actually, all states after 9 except 99 are No MSG, use only this) + sprintf (tmpsql, tmp_sql, " "); + sprintf (error, " "); + break; + case 100: // 99 = This ID has been totally erased + sprintf (tmpsql, tmp_sql, "Account gone."); + sprintf (error, "Account gone."); + break; + default: + sprintf (tmpsql, tmp_sql, "Uknown Error."); + sprintf (error, "Uknown Error."); + break; + } + //query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + if ((result == 1) && (dynamic_pass_failure_ban != 0)) + { // failed password + sprintf (tmpsql, "SELECT count(*) FROM `%s` WHERE `ip` = '%d.%d.%d.%d' AND `rcode` = '1' AND `time` > NOW() - INTERVAL %d MINUTE", loginlog_db, p[0], p[1], p[2], p[3], dynamic_pass_failure_ban_time); //how many times filed account? in one ip. + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + //check query result + sql_res = mysql_store_result (&mysql_handle); + sql_row = mysql_fetch_row (sql_res); //row fetching + + if (atoi (sql_row[0]) >= + dynamic_pass_failure_ban_how_many) + { + sprintf (tmpsql, + "INSERT INTO `ipbanlist`(`list`,`btime`,`rtime`,`reason`) VALUES ('%d.%d.%d.*', NOW() , NOW() + INTERVAL %d MINUTE ,'Password error ban: %s')", + p[0], p[1], p[2], + dynamic_pass_failure_ban_how_long, + t_uid); + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + } + mysql_free_result (sql_res); + } + else if (result == -2) + { //dynamic banned - add ip to ban list. + sprintf (tmpsql, + "INSERT INTO `ipbanlist`(`list`,`btime`,`rtime`,`reason`) VALUES ('%d.%d.%d.*', NOW() , NOW() + INTERVAL 1 MONTH ,'Dynamic banned user id : %s')", + p[0], p[1], p[2], t_uid); + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + result = -3; } - } - } else { - char tmp_sql[512]; - char error[64]; - sprintf(tmp_sql,"INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', '%s', '%d','login failed : %%s')", loginlog_db, p[0], p[1], p[2], p[3], t_uid, result); - switch((result + 1)) { - case -2: //-3 = Account Banned - sprintf(tmpsql,tmp_sql,"Account banned."); - sprintf(error,"Account banned."); - break; - case -1: //-2 = Dynamic Ban - sprintf(tmpsql,tmp_sql,"dynamic ban (ip and account)."); - sprintf(error,"dynamic ban (ip and account)."); - break; - case 1: // 0 = Unregistered ID - sprintf(tmpsql,tmp_sql,"Unregisterd ID."); - sprintf(error,"Unregisterd ID."); - break; - case 2: // 1 = Incorrect Password - sprintf(tmpsql,tmp_sql,"Incorrect Password."); - sprintf(error,"Incorrect Password."); - break; - case 3: // 2 = This ID is expired - sprintf(tmpsql,tmp_sql,"Account Expired."); - sprintf(error,"Account Expired."); - break; - case 4: // 3 = Rejected from Server - sprintf(tmpsql,tmp_sql,"Rejected from server."); - sprintf(error,"Rejected from server."); - break; - case 5: // 4 = You have been blocked by the GM Team - sprintf(tmpsql,tmp_sql,"Blocked by GM."); - sprintf(error,"Blocked by GM."); - break; - case 6: // 5 = Your Game's EXE file is not the latest version - sprintf(tmpsql,tmp_sql,"Not latest game EXE."); - sprintf(error,"Not latest game EXE."); - break; - case 7: // 6 = Your are Prohibited to log in until %s - sprintf(tmpsql,tmp_sql,"Banned."); - sprintf(error,"Banned."); - break; - case 8: // 7 = Server is jammed due to over populated - sprintf(tmpsql,tmp_sql,"Server Over-population."); - sprintf(error,"Server Over-population."); - break; - case 9: // 8 = No MSG (actually, all states after 9 except 99 are No MSG, use only this) - sprintf(tmpsql,tmp_sql," "); - sprintf(error," "); - break; - case 100: // 99 = This ID has been totally erased - sprintf(tmpsql,tmp_sql,"Account gone."); - sprintf(error,"Account gone."); - break; - default: - sprintf(tmpsql,tmp_sql,"Uknown Error."); - sprintf(error,"Uknown Error."); - break; - } - //query - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - if ((result == 1) && (dynamic_pass_failure_ban != 0)){ // failed password - sprintf(tmpsql,"SELECT count(*) FROM `%s` WHERE `ip` = '%d.%d.%d.%d' AND `rcode` = '1' AND `time` > NOW() - INTERVAL %d MINUTE", - loginlog_db, p[0], p[1], p[2], p[3], dynamic_pass_failure_ban_time); //how many times filed account? in one ip. - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - //check query result - sql_res = mysql_store_result(&mysql_handle) ; - sql_row = mysql_fetch_row(sql_res); //row fetching - - if (atoi(sql_row[0]) >= dynamic_pass_failure_ban_how_many ) { - sprintf(tmpsql,"INSERT INTO `ipbanlist`(`list`,`btime`,`rtime`,`reason`) VALUES ('%d.%d.%d.*', NOW() , NOW() + INTERVAL %d MINUTE ,'Password error ban: %s')", p[0], p[1], p[2], dynamic_pass_failure_ban_how_long, t_uid); - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - } - mysql_free_result(sql_res); - } - else if (result == -2){ //dynamic banned - add ip to ban list. - sprintf(tmpsql,"INSERT INTO `ipbanlist`(`list`,`btime`,`rtime`,`reason`) VALUES ('%d.%d.%d.*', NOW() , NOW() + INTERVAL 1 MONTH ,'Dynamic banned user id : %s')", p[0], p[1], p[2], t_uid); - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - result = -3; - } - - sprintf(tmpsql,"SELECT `ban_until` FROM `%s` WHERE `%s` = '%s'",login_db,login_db_userid, t_uid); - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - sql_res = mysql_store_result(&mysql_handle) ; - if (sql_res) { - sql_row = mysql_fetch_row(sql_res); //row fetching - } - //cannot connect login failed - memset(WFIFOP(fd,0),'\0',23); - WFIFOW(fd,0)=0x6a; - WFIFOB(fd,2)=result; - if (result == 6) { // 6 = Your are Prohibited to log in until %s - if (atol(sql_row[0]) != 0) { // if account is banned, we send ban timestamp - char tmpstr[256]; - time_t ban_until_time; - ban_until_time = atol(sql_row[0]); - strftime(tmpstr, 20, date_format, gmtime(&ban_until_time)); - tmpstr[19] = '\0'; - memcpy(WFIFOP(fd,3), tmpstr, 20); - } else { // we send error message - memcpy(WFIFOP(fd,3), error, 20); - } - } - WFIFOSET(fd,23); - } - RFIFOSKIP(fd,(RFIFOW(fd,0)==0x64)?55:47); - break; - - case 0x01db: // request password key - if (session[fd]->session_data) { - printf("login: abnormal request of MD5 key (already opened session).\n"); - session[fd]->eof = 1; - return 0; - } - printf("Request Password key -%s\n",md5key); - RFIFOSKIP(fd,2); - WFIFOW(fd,0)=0x01dc; - WFIFOW(fd,2)=4+md5keylen; - memcpy(WFIFOP(fd,4),md5key,md5keylen); - WFIFOSET(fd,WFIFOW(fd,2)); - break; - - case 0x2710: // request Char-server connection - if(RFIFOREST(fd)<86) - return 0; - { - sprintf(tmpsql,"INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', '%s@%s','100', 'charserver - %s@%d.%d.%d.%d:%d')", loginlog_db, p[0], p[1], p[2], p[3], RFIFOP(fd, 2),RFIFOP(fd, 60),RFIFOP(fd, 60), RFIFOB(fd, 54), RFIFOB(fd, 55), RFIFOB(fd, 56), RFIFOB(fd, 57), RFIFOW(fd, 58)); - - //query - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - printf("server connection request %s @ %d.%d.%d.%d:%d (%d.%d.%d.%d)\n", - RFIFOP(fd, 60), RFIFOB(fd, 54), RFIFOB(fd, 55), RFIFOB(fd, 56), RFIFOB(fd, 57), RFIFOW(fd, 58), - p[0], p[1], p[2], p[3]); - unsigned char* server_name; - account.userid = RFIFOP(fd, 2); - account.passwd = RFIFOP(fd, 26); - account.passwdenc = 0; - server_name = RFIFOP(fd,60); - result = mmo_auth(&account, fd); - //printf("Result: %d - Sex: %d - Account ID: %d\n",result,account.sex,(int) account.account_id); - - if(result == -1 && account.sex==2 && account.account_id<MAX_SERVERS && server_fd[account.account_id]==-1){ - printf("Connection of the char-server '%s' accepted.\n", server_name); - memset(&server[account.account_id], 0, sizeof(struct mmo_char_server)); - server[account.account_id].ip=RFIFOL(fd,54); - server[account.account_id].port=RFIFOW(fd,58); - memcpy(server[account.account_id].name,RFIFOP(fd,60),20); - server[account.account_id].users=0; - server[account.account_id].maintenance=RFIFOW(fd,82); - server[account.account_id].new=RFIFOW(fd,84); - server_fd[account.account_id]=fd; - if(anti_freeze_enable) - server_freezeflag[account.account_id] = 5; // Char-server anti-freeze system. Counter. 5 ok, 4...0 freezed - sprintf(tmpsql,"DELETE FROM `sstatus` WHERE `index`='%ld'", account.account_id); - //query - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - - jstrescapecpy(t_uid,server[account.account_id].name); - sprintf(tmpsql,"INSERT INTO `sstatus`(`index`,`name`,`user`) VALUES ( '%ld', '%s', '%d')", - account.account_id, server[account.account_id].name,0); - //query - if(mysql_query(&mysql_handle, tmpsql)) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } - WFIFOW(fd,0)=0x2711; - WFIFOB(fd,2)=0; - WFIFOSET(fd,3); - session[fd]->func_parse=parse_fromchar; - realloc_fifo(fd,FIFOSIZE_SERVERLINK,FIFOSIZE_SERVERLINK); - } else { - WFIFOW(fd, 0) =0x2711; - WFIFOB(fd, 2)=3; - WFIFOSET(fd, 3); - } - } - RFIFOSKIP(fd, 86); - return 0; - - case 0x7530: // request Athena information - WFIFOW(fd,0)=0x7531; - WFIFOB(fd,2)=ATHENA_MAJOR_VERSION; - WFIFOB(fd,3)=ATHENA_MINOR_VERSION; - WFIFOB(fd,4)=ATHENA_REVISION; - WFIFOB(fd,5)=ATHENA_RELEASE_FLAG; - WFIFOB(fd,6)=ATHENA_OFFICIAL_FLAG; - WFIFOB(fd,7)=ATHENA_SERVER_LOGIN; - WFIFOW(fd,8)=ATHENA_MOD_VERSION; - WFIFOSET(fd,10); - RFIFOSKIP(fd,2); - printf ("Athena version check...\n"); - break; - case 0x7532: - default: - printf ("End of connection (ip: %s)" RETCODE, ip); - session[fd]->eof = 1; - return 0; - } - } + sprintf (tmpsql, + "SELECT `ban_until` FROM `%s` WHERE `%s` = '%s'", + login_db, login_db_userid, t_uid); + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + sql_res = mysql_store_result (&mysql_handle); + if (sql_res) + { + sql_row = mysql_fetch_row (sql_res); //row fetching + } + //cannot connect login failed + memset (WFIFOP (fd, 0), '\0', 23); + WFIFOW (fd, 0) = 0x6a; + WFIFOB (fd, 2) = result; + if (result == 6) + { // 6 = Your are Prohibited to log in until %s + if (atol (sql_row[0]) != 0) + { // if account is banned, we send ban timestamp + char tmpstr[256]; + time_t ban_until_time; + ban_until_time = atol (sql_row[0]); + strftime (tmpstr, 20, date_format, + gmtime (&ban_until_time)); + tmpstr[19] = '\0'; + memcpy (WFIFOP (fd, 3), tmpstr, 20); + } + else + { // we send error message + memcpy (WFIFOP (fd, 3), error, 20); + } + } + WFIFOSET (fd, 23); + } + RFIFOSKIP (fd, (RFIFOW (fd, 0) == 0x64) ? 55 : 47); + break; + + case 0x01db: // request password key + if (session[fd]->session_data) + { + printf + ("login: abnormal request of MD5 key (already opened session).\n"); + session[fd]->eof = 1; + return 0; + } + printf ("Request Password key -%s\n", md5key); + RFIFOSKIP (fd, 2); + WFIFOW (fd, 0) = 0x01dc; + WFIFOW (fd, 2) = 4 + md5keylen; + memcpy (WFIFOP (fd, 4), md5key, md5keylen); + WFIFOSET (fd, WFIFOW (fd, 2)); + break; + + case 0x2710: // request Char-server connection + if (RFIFOREST (fd) < 86) + return 0; + { + sprintf (tmpsql, + "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', '%s@%s','100', 'charserver - %s@%d.%d.%d.%d:%d')", + loginlog_db, p[0], p[1], p[2], p[3], RFIFOP (fd, + 2), + RFIFOP (fd, 60), RFIFOP (fd, 60), RFIFOB (fd, + 54), + RFIFOB (fd, 55), RFIFOB (fd, 56), RFIFOB (fd, + 57), + RFIFOW (fd, 58)); + + //query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + printf + ("server connection request %s @ %d.%d.%d.%d:%d (%d.%d.%d.%d)\n", + RFIFOP (fd, 60), RFIFOB (fd, 54), RFIFOB (fd, 55), + RFIFOB (fd, 56), RFIFOB (fd, 57), RFIFOW (fd, 58), + p[0], p[1], p[2], p[3]); + unsigned char *server_name; + account.userid = RFIFOP (fd, 2); + account.passwd = RFIFOP (fd, 26); + account.passwdenc = 0; + server_name = RFIFOP (fd, 60); + result = mmo_auth (&account, fd); + //printf("Result: %d - Sex: %d - Account ID: %d\n",result,account.sex,(int) account.account_id); + + if (result == -1 && account.sex == 2 + && account.account_id < MAX_SERVERS + && server_fd[account.account_id] == -1) + { + printf + ("Connection of the char-server '%s' accepted.\n", + server_name); + memset (&server[account.account_id], 0, + sizeof (struct mmo_char_server)); + server[account.account_id].ip = RFIFOL (fd, 54); + server[account.account_id].port = RFIFOW (fd, 58); + memcpy (server[account.account_id].name, + RFIFOP (fd, 60), 20); + server[account.account_id].users = 0; + server[account.account_id].maintenance = + RFIFOW (fd, 82); + server[account.account_id].new = RFIFOW (fd, 84); + server_fd[account.account_id] = fd; + if (anti_freeze_enable) + server_freezeflag[account.account_id] = 5; // Char-server anti-freeze system. Counter. 5 ok, 4...0 freezed + sprintf (tmpsql, + "DELETE FROM `sstatus` WHERE `index`='%ld'", + account.account_id); + //query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + + jstrescapecpy (t_uid, + server[account.account_id].name); + sprintf (tmpsql, + "INSERT INTO `sstatus`(`index`,`name`,`user`) VALUES ( '%ld', '%s', '%d')", + account.account_id, + server[account.account_id].name, 0); + //query + if (mysql_query (&mysql_handle, tmpsql)) + { + printf ("DB server Error - %s\n", + mysql_error (&mysql_handle)); + } + WFIFOW (fd, 0) = 0x2711; + WFIFOB (fd, 2) = 0; + WFIFOSET (fd, 3); + session[fd]->func_parse = parse_fromchar; + realloc_fifo (fd, FIFOSIZE_SERVERLINK, + FIFOSIZE_SERVERLINK); + } + else + { + WFIFOW (fd, 0) = 0x2711; + WFIFOB (fd, 2) = 3; + WFIFOSET (fd, 3); + } + } + RFIFOSKIP (fd, 86); + return 0; + + case 0x7530: // request Athena information + WFIFOW (fd, 0) = 0x7531; + WFIFOB (fd, 2) = ATHENA_MAJOR_VERSION; + WFIFOB (fd, 3) = ATHENA_MINOR_VERSION; + WFIFOB (fd, 4) = ATHENA_REVISION; + WFIFOB (fd, 5) = ATHENA_RELEASE_FLAG; + WFIFOB (fd, 6) = ATHENA_OFFICIAL_FLAG; + WFIFOB (fd, 7) = ATHENA_SERVER_LOGIN; + WFIFOW (fd, 8) = ATHENA_MOD_VERSION; + WFIFOSET (fd, 10); + RFIFOSKIP (fd, 2); + printf ("Athena version check...\n"); + break; + + case 0x7532: + default: + printf ("End of connection (ip: %s)" RETCODE, ip); + session[fd]->eof = 1; + return 0; + } + } - return 0; + return 0; } //------------------------------------------------- // Return numerical value of a switch configuration // on/off, english, français, deutsch, español //------------------------------------------------- -int config_switch(const char *str) { - if (strcmpi(str, "on") == 0 || strcmpi(str, "yes") == 0 || strcmpi(str, "oui") == 0 || strcmpi(str, "ja") == 0 || strcmpi(str, "si") == 0) - return 1; - if (strcmpi(str, "off") == 0 || strcmpi(str, "no") == 0 || strcmpi(str, "non") == 0 || strcmpi(str, "nein") == 0) - return 0; - - return atoi(str); +int config_switch (const char *str) +{ + if (strcmpi (str, "on") == 0 || strcmpi (str, "yes") == 0 + || strcmpi (str, "oui") == 0 || strcmpi (str, "ja") == 0 + || strcmpi (str, "si") == 0) + return 1; + if (strcmpi (str, "off") == 0 || strcmpi (str, "no") == 0 + || strcmpi (str, "non") == 0 || strcmpi (str, "nein") == 0) + return 0; + + return atoi (str); } - //Lan Support conf reading added by Kashy -int login_lan_config_read(const char *lancfgName){ - int i; - char subnetmask[128]; - char line[1024], w1[1024], w2[1024]; - FILE *fp; - - fp=fopen_(lancfgName, "r"); +int login_lan_config_read (const char *lancfgName) +{ + int i; + char subnetmask[128]; + char line[1024], w1[1024], w2[1024]; + FILE *fp; + + fp = fopen_ (lancfgName, "r"); + + if (fp == NULL) + { + printf ("file not found: %s\n", lancfgName); + return 1; + } + printf ("Start reading of Lan Support configuration file\n"); + while (fgets (line, sizeof (line) - 1, fp)) + { + if (line[0] == '/' && line[1] == '/') + continue; + + i = sscanf (line, "%[^:]: %[^\r\n]", w1, w2); + if (i != 2) + continue; + + else if (strcmpi (w1, "lan_char_ip") == 0) + { + strcpy (lan_char_ip, w2); + printf ("set Lan_Char_IP : %s\n", w2); + } - if (fp == NULL) { - printf("file not found: %s\n", lancfgName); - return 1; - } - printf("Start reading of Lan Support configuration file\n"); - while(fgets(line, sizeof(line)-1, fp)){ - if (line[0] == '/' && line[1] == '/') - continue; - - i = sscanf(line,"%[^:]: %[^\r\n]",w1,w2); - if(i!=2) - continue; - - else if(strcmpi(w1,"lan_char_ip")==0){ - strcpy(lan_char_ip, w2); - printf ("set Lan_Char_IP : %s\n",w2); - } - - else if(strcmpi(w1,"subnetmask")==0){ - strcpy(subnetmask, w2); - unsigned int k0, k1, k2, k3; - sscanf(subnetmask, "%d.%d.%d.%d", &k0, &k1, &k2, &k3); - subnetmaski[0] = k0; subnetmaski[1] = k1; subnetmaski[2] = k2; subnetmaski[3] = k3; - printf ("set subnetmask : %s\n",w2); - } - } - fclose_(fp); - - { - unsigned int a0, a1, a2, a3; - unsigned char p[4]; - sscanf(lan_char_ip, "%d.%d.%d.%d", &a0, &a1, &a2, &a3); - p[0] = a0; p[1] = a1; p[2] = a2; p[3] = a3; - printf("LAN test of LAN IP of the char-server: "); - if (lan_ip_check(p) == 0) { - printf("\033[1;31m***ERROR: LAN IP of the char-server doesn't belong to the specified Sub-network\033[0m\n"); - } - } + else if (strcmpi (w1, "subnetmask") == 0) + { + strcpy (subnetmask, w2); + unsigned int k0, k1, k2, k3; + sscanf (subnetmask, "%d.%d.%d.%d", &k0, &k1, &k2, &k3); + subnetmaski[0] = k0; + subnetmaski[1] = k1; + subnetmaski[2] = k2; + subnetmaski[3] = k3; + printf ("set subnetmask : %s\n", w2); + } + } + fclose_ (fp); + + { + unsigned int a0, a1, a2, a3; + unsigned char p[4]; + sscanf (lan_char_ip, "%d.%d.%d.%d", &a0, &a1, &a2, &a3); + p[0] = a0; + p[1] = a1; + p[2] = a2; + p[3] = a3; + printf ("LAN test of LAN IP of the char-server: "); + if (lan_ip_check (p) == 0) + { + printf + ("\033[1;31m***ERROR: LAN IP of the char-server doesn't belong to the specified Sub-network\033[0m\n"); + } + } - printf("End reading of Lan Support configuration file\n"); + printf ("End reading of Lan Support configuration file\n"); - return 0; + return 0; } //----------------------------------------------------- //BANNED IP CHECK. //----------------------------------------------------- -int ip_ban_check(int tid, unsigned int tick, int id, int data){ +int ip_ban_check (int tid, unsigned int tick, int id, int data) +{ - //query - if(mysql_query(&mysql_handle, "DELETE FROM `ipbanlist` WHERE `rtime` <= NOW()")) { - printf("DB server Error - %s\n", mysql_error(&mysql_handle)); - } + //query + if (mysql_query + (&mysql_handle, "DELETE FROM `ipbanlist` WHERE `rtime` <= NOW()")) + { + printf ("DB server Error - %s\n", mysql_error (&mysql_handle)); + } - return 0; + return 0; } //----------------------------------------------------- // reading configuration //----------------------------------------------------- -int login_config_read(const char *cfgName){ - int i; - char line[1024], w1[1024], w2[1024]; - FILE *fp; - - fp=fopen_(cfgName,"r"); - - if(fp==NULL){ - printf("Configuration file (%s) not found.\n", cfgName); - return 1; - } - printf ("start reading configuration...\n"); - while(fgets(line, sizeof(line)-1, fp)){ - if(line[0] == '/' && line[1] == '/') - continue; - - i=sscanf(line,"%[^:]: %[^\r\n]",w1,w2); - if(i!=2) - continue; - - else if(strcmpi(w1,"login_port")==0){ - login_port=atoi(w2); - printf ("set login_port : %s\n",w2); - } - else if(strcmpi(w1,"ipban")==0){ - ipban=atoi(w2); - printf ("set ipban : %d\n",ipban); - } - //account ban -> ip ban - else if(strcmpi(w1,"dynamic_account_ban")==0){ - dynamic_account_ban=atoi(w2); - printf ("set dynamic_account_ban : %d\n",dynamic_account_ban); - } - else if(strcmpi(w1,"dynamic_account_ban_class")==0){ - dynamic_account_ban_class=atoi(w2); - printf ("set dynamic_account_ban_class : %d\n",dynamic_account_ban_class); - } - //dynamic password error ban - else if(strcmpi(w1,"dynamic_pass_failure_ban")==0){ - dynamic_pass_failure_ban=atoi(w2); - printf ("set dynamic_pass_failure_ban : %d\n",dynamic_pass_failure_ban); - } - else if(strcmpi(w1,"dynamic_pass_failure_ban_time")==0){ - dynamic_pass_failure_ban_time=atoi(w2); - printf ("set dynamic_pass_failure_ban_time : %d\n",dynamic_pass_failure_ban_time); - } - else if(strcmpi(w1,"dynamic_pass_failure_ban_how_many")==0){ - dynamic_pass_failure_ban_how_many=atoi(w2); - printf ("set dynamic_pass_failure_ban_how_many : %d\n",dynamic_pass_failure_ban_how_many); - } - else if(strcmpi(w1,"dynamic_pass_failure_ban_how_long")==0){ - dynamic_pass_failure_ban_how_long=atoi(w2); - printf ("set dynamic_pass_failure_ban_how_long : %d\n",dynamic_pass_failure_ban_how_long); - } - else if(strcmpi(w1,"anti_freeze_enable")==0){ - anti_freeze_enable = config_switch(w2); - } - else if (strcmpi(w1, "anti_freeze_interval") == 0) { - ANTI_FREEZE_INTERVAL = atoi(w2); - if (ANTI_FREEZE_INTERVAL < 5) - ANTI_FREEZE_INTERVAL = 5; // minimum 5 seconds - } - else if (strcmpi(w1, "import") == 0) { - login_config_read(w2); - } - else if(strcmpi(w1,"use_MD5_passwords")==0){ - if (!strcmpi(w2,"yes")) { - use_md5_passwds=1; - } else if (!strcmpi(w2,"no")){ - use_md5_passwds=0; - } - printf ("Using MD5 Passwords: %s \n",w2); - } - else if (strcmpi(w1, "date_format") == 0) { // note: never have more than 19 char for the date! - switch (atoi(w2)) { - case 0: - strcpy(date_format, "%d-%m-%Y %H:%M:%S"); // 31-12-2004 23:59:59 - break; - case 1: - strcpy(date_format, "%m-%d-%Y %H:%M:%S"); // 12-31-2004 23:59:59 - break; - case 2: - strcpy(date_format, "%Y-%d-%m %H:%M:%S"); // 2004-31-12 23:59:59 - break; - case 3: - strcpy(date_format, "%Y-%m-%d %H:%M:%S"); // 2004-12-31 23:59:59 - break; - } - } - else if (strcmpi(w1, "min_level_to_connect") == 0) { - min_level_to_connect = atoi(w2); - } - else if (strcmpi(w1, "check_ip_flag") == 0) { - check_ip_flag = config_switch(w2); - } - } - fclose_(fp); - printf ("End reading configuration...\n"); - return 0; +int login_config_read (const char *cfgName) +{ + int i; + char line[1024], w1[1024], w2[1024]; + FILE *fp; + + fp = fopen_ (cfgName, "r"); + + if (fp == NULL) + { + printf ("Configuration file (%s) not found.\n", cfgName); + return 1; + } + printf ("start reading configuration...\n"); + while (fgets (line, sizeof (line) - 1, fp)) + { + if (line[0] == '/' && line[1] == '/') + continue; + + i = sscanf (line, "%[^:]: %[^\r\n]", w1, w2); + if (i != 2) + continue; + + else if (strcmpi (w1, "login_port") == 0) + { + login_port = atoi (w2); + printf ("set login_port : %s\n", w2); + } + else if (strcmpi (w1, "ipban") == 0) + { + ipban = atoi (w2); + printf ("set ipban : %d\n", ipban); + } + //account ban -> ip ban + else if (strcmpi (w1, "dynamic_account_ban") == 0) + { + dynamic_account_ban = atoi (w2); + printf ("set dynamic_account_ban : %d\n", dynamic_account_ban); + } + else if (strcmpi (w1, "dynamic_account_ban_class") == 0) + { + dynamic_account_ban_class = atoi (w2); + printf ("set dynamic_account_ban_class : %d\n", + dynamic_account_ban_class); + } + //dynamic password error ban + else if (strcmpi (w1, "dynamic_pass_failure_ban") == 0) + { + dynamic_pass_failure_ban = atoi (w2); + printf ("set dynamic_pass_failure_ban : %d\n", + dynamic_pass_failure_ban); + } + else if (strcmpi (w1, "dynamic_pass_failure_ban_time") == 0) + { + dynamic_pass_failure_ban_time = atoi (w2); + printf ("set dynamic_pass_failure_ban_time : %d\n", + dynamic_pass_failure_ban_time); + } + else if (strcmpi (w1, "dynamic_pass_failure_ban_how_many") == 0) + { + dynamic_pass_failure_ban_how_many = atoi (w2); + printf ("set dynamic_pass_failure_ban_how_many : %d\n", + dynamic_pass_failure_ban_how_many); + } + else if (strcmpi (w1, "dynamic_pass_failure_ban_how_long") == 0) + { + dynamic_pass_failure_ban_how_long = atoi (w2); + printf ("set dynamic_pass_failure_ban_how_long : %d\n", + dynamic_pass_failure_ban_how_long); + } + else if (strcmpi (w1, "anti_freeze_enable") == 0) + { + anti_freeze_enable = config_switch (w2); + } + else if (strcmpi (w1, "anti_freeze_interval") == 0) + { + ANTI_FREEZE_INTERVAL = atoi (w2); + if (ANTI_FREEZE_INTERVAL < 5) + ANTI_FREEZE_INTERVAL = 5; // minimum 5 seconds + } + else if (strcmpi (w1, "import") == 0) + { + login_config_read (w2); + } + else if (strcmpi (w1, "use_MD5_passwords") == 0) + { + if (!strcmpi (w2, "yes")) + { + use_md5_passwds = 1; + } + else if (!strcmpi (w2, "no")) + { + use_md5_passwds = 0; + } + printf ("Using MD5 Passwords: %s \n", w2); + } + else if (strcmpi (w1, "date_format") == 0) + { // note: never have more than 19 char for the date! + switch (atoi (w2)) + { + case 0: + strcpy (date_format, "%d-%m-%Y %H:%M:%S"); // 31-12-2004 23:59:59 + break; + case 1: + strcpy (date_format, "%m-%d-%Y %H:%M:%S"); // 12-31-2004 23:59:59 + break; + case 2: + strcpy (date_format, "%Y-%d-%m %H:%M:%S"); // 2004-31-12 23:59:59 + break; + case 3: + strcpy (date_format, "%Y-%m-%d %H:%M:%S"); // 2004-12-31 23:59:59 + break; + } + } + else if (strcmpi (w1, "min_level_to_connect") == 0) + { + min_level_to_connect = atoi (w2); + } + else if (strcmpi (w1, "check_ip_flag") == 0) + { + check_ip_flag = config_switch (w2); + } + } + fclose_ (fp); + printf ("End reading configuration...\n"); + return 0; } -void sql_config_read(const char *cfgName){ /* Kalaspuff, to get login_db */ - int i; - char line[1024], w1[1024], w2[1024]; - printf("reading configure: %s\n", cfgName); - FILE *fp=fopen_(cfgName,"r"); - if(fp==NULL){ - printf("file not found: %s\n",cfgName); - exit(1); - } - while(fgets(line, sizeof(line)-1, fp)){ - if(line[0] == '/' && line[1] == '/') - continue; - i=sscanf(line,"%[^:]: %[^\r\n]",w1,w2); - if(i!=2) - continue; - if (strcmpi(w1, "login_db") == 0) { - strcpy(login_db, w2); - } - //add for DB connection - else if(strcmpi(w1,"login_server_ip")==0){ - strcpy(login_server_ip, w2); - printf ("set login_server_ip : %s\n",w2); - } - else if(strcmpi(w1,"login_server_port")==0){ - login_server_port=atoi(w2); - printf ("set login_server_port : %s\n",w2); - } - else if(strcmpi(w1,"login_server_id")==0){ - strcpy(login_server_id, w2); - printf ("set login_server_id : %s\n",w2); - } - else if(strcmpi(w1,"login_server_pw")==0){ - strcpy(login_server_pw, w2); - printf ("set login_server_pw : %s\n",w2); - } - else if(strcmpi(w1,"login_server_db")==0){ - strcpy(login_server_db, w2); - printf ("set login_server_db : %s\n",w2); - } - //added for custom column names for custom login table - else if(strcmpi(w1,"login_db_account_id")==0){ - strcpy(login_db_account_id, w2); - } - else if(strcmpi(w1,"login_db_userid")==0){ - strcpy(login_db_userid, w2); - } - else if(strcmpi(w1,"login_db_user_pass")==0){ - strcpy(login_db_user_pass, w2); - } - else if(strcmpi(w1,"login_db_level")==0){ - strcpy(login_db_level, w2); - } - //end of custom table config - else if (strcmpi(w1, "loginlog_db") == 0) { - strcpy(loginlog_db, w2); - } +void sql_config_read (const char *cfgName) +{ /* Kalaspuff, to get login_db */ + int i; + char line[1024], w1[1024], w2[1024]; + printf ("reading configure: %s\n", cfgName); + FILE *fp = fopen_ (cfgName, "r"); + if (fp == NULL) + { + printf ("file not found: %s\n", cfgName); + exit (1); + } + while (fgets (line, sizeof (line) - 1, fp)) + { + if (line[0] == '/' && line[1] == '/') + continue; + i = sscanf (line, "%[^:]: %[^\r\n]", w1, w2); + if (i != 2) + continue; + if (strcmpi (w1, "login_db") == 0) + { + strcpy (login_db, w2); + } + //add for DB connection + else if (strcmpi (w1, "login_server_ip") == 0) + { + strcpy (login_server_ip, w2); + printf ("set login_server_ip : %s\n", w2); + } + else if (strcmpi (w1, "login_server_port") == 0) + { + login_server_port = atoi (w2); + printf ("set login_server_port : %s\n", w2); + } + else if (strcmpi (w1, "login_server_id") == 0) + { + strcpy (login_server_id, w2); + printf ("set login_server_id : %s\n", w2); + } + else if (strcmpi (w1, "login_server_pw") == 0) + { + strcpy (login_server_pw, w2); + printf ("set login_server_pw : %s\n", w2); + } + else if (strcmpi (w1, "login_server_db") == 0) + { + strcpy (login_server_db, w2); + printf ("set login_server_db : %s\n", w2); + } + //added for custom column names for custom login table + else if (strcmpi (w1, "login_db_account_id") == 0) + { + strcpy (login_db_account_id, w2); + } + else if (strcmpi (w1, "login_db_userid") == 0) + { + strcpy (login_db_userid, w2); + } + else if (strcmpi (w1, "login_db_user_pass") == 0) + { + strcpy (login_db_user_pass, w2); } - fclose_(fp); - printf("reading configure done.....\n"); + else if (strcmpi (w1, "login_db_level") == 0) + { + strcpy (login_db_level, w2); + } + //end of custom table config + else if (strcmpi (w1, "loginlog_db") == 0) + { + strcpy (loginlog_db, w2); + } + } + fclose_ (fp); + printf ("reading configure done.....\n"); } -int do_init(int argc,char **argv){ - //initialize login server - int i; - - //read login configue - login_config_read( (argc>1)?argv[1]:LOGIN_CONF_NAME ); - sql_config_read(SQL_CONF_NAME); - login_lan_config_read((argc > 1) ? argv[1] : LAN_CONF_NAME); - //Generate Passworded Key. - printf ("memset md5key \n"); - memset(md5key, 0, sizeof(md5key)); - printf ("memset md5key complete\n"); - printf ("memset keyleng\n"); - md5keylen=rand()%4+12; - for(i=0;i<md5keylen;i++) - md5key[i]=rand()%255+1; - printf ("memset keyleng complete\n"); - - printf ("set FIFO Size\n"); - for(i=0;i<AUTH_FIFO_SIZE;i++) - auth_fifo[i].delflag=1; - printf ("set FIFO Size complete\n"); - - printf ("set max servers\n"); - for(i=0;i<MAX_SERVERS;i++) - server_fd[i]=-1; - printf ("set max servers complete\n"); - //server port open & binding - - login_fd=make_listen_port(login_port); - - //Auth start - printf ("Running mmo_auth_sqldb_init()\n"); - mmo_auth_sqldb_init(); - printf ("finished mmo_auth_sqldb_init()\n"); - //sync account when terminating. - //but no need when you using DBMS (mysql) - set_termfunc(mmo_db_close); - - //set default parser as parse_login function - set_defaultparse(parse_login); - - if(anti_freeze_enable > 0) { - add_timer_func_list(char_anti_freeze_system, "char_anti_freeze_system"); - i = add_timer_interval(gettick()+1000, char_anti_freeze_system, 0, 0, ANTI_FREEZE_INTERVAL * 1000); - } - - // ban deleter timer - 1 minute term - printf("add interval tic (ip_ban_check)....\n"); - i=add_timer_interval(gettick()+10, ip_ban_check,0,0,60*1000); - - printf("The login-server is \033[1;32mready\033[0m (Server is listening on the port %d).\n\n", login_port); - - return 0; +int do_init (int argc, char **argv) +{ + //initialize login server + int i; + + //read login configue + login_config_read ((argc > 1) ? argv[1] : LOGIN_CONF_NAME); + sql_config_read (SQL_CONF_NAME); + login_lan_config_read ((argc > 1) ? argv[1] : LAN_CONF_NAME); + //Generate Passworded Key. + printf ("memset md5key \n"); + memset (md5key, 0, sizeof (md5key)); + printf ("memset md5key complete\n"); + printf ("memset keyleng\n"); + md5keylen = rand () % 4 + 12; + for (i = 0; i < md5keylen; i++) + md5key[i] = rand () % 255 + 1; + printf ("memset keyleng complete\n"); + + printf ("set FIFO Size\n"); + for (i = 0; i < AUTH_FIFO_SIZE; i++) + auth_fifo[i].delflag = 1; + printf ("set FIFO Size complete\n"); + + printf ("set max servers\n"); + for (i = 0; i < MAX_SERVERS; i++) + server_fd[i] = -1; + printf ("set max servers complete\n"); + //server port open & binding + + login_fd = make_listen_port (login_port); + + //Auth start + printf ("Running mmo_auth_sqldb_init()\n"); + mmo_auth_sqldb_init (); + printf ("finished mmo_auth_sqldb_init()\n"); + //sync account when terminating. + //but no need when you using DBMS (mysql) + set_termfunc (mmo_db_close); + + //set default parser as parse_login function + set_defaultparse (parse_login); + + if (anti_freeze_enable > 0) + { + add_timer_func_list (char_anti_freeze_system, + "char_anti_freeze_system"); + i = add_timer_interval (gettick () + 1000, char_anti_freeze_system, 0, + 0, ANTI_FREEZE_INTERVAL * 1000); + } + + // ban deleter timer - 1 minute term + printf ("add interval tic (ip_ban_check)....\n"); + i = add_timer_interval (gettick () + 10, ip_ban_check, 0, 0, 60 * 1000); + + printf + ("The login-server is \033[1;32mready\033[0m (Server is listening on the port %d).\n\n", + login_port); + + return 0; } - - diff --git a/src/login_sql/login.h b/src/login_sql/login.h index 6335168..7eb3a84 100644 --- a/src/login_sql/login.h +++ b/src/login_sql/login.h @@ -7,35 +7,36 @@ #define SQL_CONF_NAME "conf/inter_athena.conf" #define LAN_CONF_NAME "conf/lan_support.conf" -#define PASSWORDENC 3 // A definition is given when making an encryption password correspond. - // It is 1 at the time of passwordencrypt. - // It is made into 2 at the time of passwordencrypt2. - // When it is made 3, it corresponds to both. +#define PASSWORDENC 3 // A definition is given when making an encryption password correspond. + // It is 1 at the time of passwordencrypt. + // It is made into 2 at the time of passwordencrypt2. + // When it is made 3, it corresponds to both. #define START_ACCOUNT_NUM 2000000 #define END_ACCOUNT_NUM 100000000 -struct mmo_account { - char* userid; - char* passwd; - int passwdenc; - - long account_id; - long login_id1; - long login_id2; - long char_id; - char lastlogin[24]; - int sex; +struct mmo_account +{ + char *userid; + char *passwd; + int passwdenc; + + long account_id; + long login_id1; + long login_id2; + long char_id; + char lastlogin[24]; + int sex; }; -struct mmo_char_server { - char name[20]; - long ip; - short port; - int users; - int maintenance; - int new; +struct mmo_char_server +{ + char name[20]; + long ip; + short port; + int users; + int maintenance; + int new; }; - #endif diff --git a/src/login_sql/md5calc.c b/src/login_sql/md5calc.c index 58cea12..0f0b65d 100644 --- a/src/login_sql/md5calc.c +++ b/src/login_sql/md5calc.c @@ -19,198 +19,255 @@ static unsigned int *pX; // Stirng Table static const unsigned int T[] = { - 0xd76aa478, 0xe8c7b756, 0x242070db, 0xc1bdceee, //0 - 0xf57c0faf, 0x4787c62a, 0xa8304613, 0xfd469501, //4 - 0x698098d8, 0x8b44f7af, 0xffff5bb1, 0x895cd7be, //8 - 0x6b901122, 0xfd987193, 0xa679438e, 0x49b40821, //12 - 0xf61e2562, 0xc040b340, 0x265e5a51, 0xe9b6c7aa, //16 - 0xd62f105d, 0x2441453, 0xd8a1e681, 0xe7d3fbc8, //20 - 0x21e1cde6, 0xc33707d6, 0xf4d50d87, 0x455a14ed, //24 - 0xa9e3e905, 0xfcefa3f8, 0x676f02d9, 0x8d2a4c8a, //28 - 0xfffa3942, 0x8771f681, 0x6d9d6122, 0xfde5380c, //32 - 0xa4beea44, 0x4bdecfa9, 0xf6bb4b60, 0xbebfbc70, //36 - 0x289b7ec6, 0xeaa127fa, 0xd4ef3085, 0x4881d05, //40 - 0xd9d4d039, 0xe6db99e5, 0x1fa27cf8, 0xc4ac5665, //44 - 0xf4292244, 0x432aff97, 0xab9423a7, 0xfc93a039, //48 - 0x655b59c3, 0x8f0ccc92, 0xffeff47d, 0x85845dd1, //52 - 0x6fa87e4f, 0xfe2ce6e0, 0xa3014314, 0x4e0811a1, //56 - 0xf7537e82, 0xbd3af235, 0x2ad7d2bb, 0xeb86d391 //60 + 0xd76aa478, 0xe8c7b756, 0x242070db, 0xc1bdceee, //0 + 0xf57c0faf, 0x4787c62a, 0xa8304613, 0xfd469501, //4 + 0x698098d8, 0x8b44f7af, 0xffff5bb1, 0x895cd7be, //8 + 0x6b901122, 0xfd987193, 0xa679438e, 0x49b40821, //12 + 0xf61e2562, 0xc040b340, 0x265e5a51, 0xe9b6c7aa, //16 + 0xd62f105d, 0x2441453, 0xd8a1e681, 0xe7d3fbc8, //20 + 0x21e1cde6, 0xc33707d6, 0xf4d50d87, 0x455a14ed, //24 + 0xa9e3e905, 0xfcefa3f8, 0x676f02d9, 0x8d2a4c8a, //28 + 0xfffa3942, 0x8771f681, 0x6d9d6122, 0xfde5380c, //32 + 0xa4beea44, 0x4bdecfa9, 0xf6bb4b60, 0xbebfbc70, //36 + 0x289b7ec6, 0xeaa127fa, 0xd4ef3085, 0x4881d05, //40 + 0xd9d4d039, 0xe6db99e5, 0x1fa27cf8, 0xc4ac5665, //44 + 0xf4292244, 0x432aff97, 0xab9423a7, 0xfc93a039, //48 + 0x655b59c3, 0x8f0ccc92, 0xffeff47d, 0x85845dd1, //52 + 0x6fa87e4f, 0xfe2ce6e0, 0xa3014314, 0x4e0811a1, //56 + 0xf7537e82, 0xbd3af235, 0x2ad7d2bb, 0xeb86d391 //60 }; // ROTATE_LEFT The left is made to rotate x [ n-bit ]. This is diverted as it is from RFC. #define ROTATE_LEFT(x, n) (((x) << (n)) | ((x) >> (32-(n)))) // The function used for other calculation -static unsigned int F(unsigned int X, unsigned int Y, unsigned int Z) +static unsigned int F (unsigned int X, unsigned int Y, unsigned int Z) { - return (X & Y) | (~X & Z); + return (X & Y) | (~X & Z); } -static unsigned int G(unsigned int X, unsigned int Y, unsigned int Z) + +static unsigned int G (unsigned int X, unsigned int Y, unsigned int Z) { - return (X & Z) | (Y & ~Z); + return (X & Z) | (Y & ~Z); } -static unsigned int H(unsigned int X, unsigned int Y, unsigned int Z) + +static unsigned int H (unsigned int X, unsigned int Y, unsigned int Z) { - return X ^ Y ^ Z; + return X ^ Y ^ Z; } -static unsigned int I(unsigned int X, unsigned int Y, unsigned int Z) + +static unsigned int I (unsigned int X, unsigned int Y, unsigned int Z) { - return Y ^ (X | ~Z); + return Y ^ (X | ~Z); } -static unsigned int Round(unsigned int a, unsigned int b, unsigned int FGHI, - unsigned int k, unsigned int s, unsigned int i) +static unsigned int Round (unsigned int a, unsigned int b, unsigned int FGHI, + unsigned int k, unsigned int s, unsigned int i) { - return b + ROTATE_LEFT(a + FGHI + pX[k] + T[i], s); + return b + ROTATE_LEFT (a + FGHI + pX[k] + T[i], s); } -static void Round1(unsigned int *a, unsigned int b, unsigned int c, - unsigned int d,unsigned int k, unsigned int s, unsigned int i) +static void Round1 (unsigned int *a, unsigned int b, unsigned int c, + unsigned int d, unsigned int k, unsigned int s, + unsigned int i) { - *a = Round(*a, b, F(b,c,d), k, s, i); + *a = Round (*a, b, F (b, c, d), k, s, i); } -static void Round2(unsigned int *a, unsigned int b, unsigned int c, - unsigned int d,unsigned int k, unsigned int s, unsigned int i) + +static void Round2 (unsigned int *a, unsigned int b, unsigned int c, + unsigned int d, unsigned int k, unsigned int s, + unsigned int i) { - *a = Round(*a, b, G(b,c,d), k, s, i); + *a = Round (*a, b, G (b, c, d), k, s, i); } -static void Round3(unsigned int *a, unsigned int b, unsigned int c, - unsigned int d,unsigned int k, unsigned int s, unsigned int i) + +static void Round3 (unsigned int *a, unsigned int b, unsigned int c, + unsigned int d, unsigned int k, unsigned int s, + unsigned int i) { - *a = Round(*a, b, H(b,c,d), k, s, i); + *a = Round (*a, b, H (b, c, d), k, s, i); } -static void Round4(unsigned int *a, unsigned int b, unsigned int c, - unsigned int d,unsigned int k, unsigned int s, unsigned int i) + +static void Round4 (unsigned int *a, unsigned int b, unsigned int c, + unsigned int d, unsigned int k, unsigned int s, + unsigned int i) { - *a = Round(*a, b, I(b,c,d), k, s, i); + *a = Round (*a, b, I (b, c, d), k, s, i); } -static void MD5_Round_Calculate(const unsigned char *block, - unsigned int *A2, unsigned int *B2, unsigned int *C2, unsigned int *D2) +static void MD5_Round_Calculate (const unsigned char *block, + unsigned int *A2, unsigned int *B2, + unsigned int *C2, unsigned int *D2) { - //create X It is since it is required. - unsigned int X[16]; //512bit 64byte - int j,k; - - //Save A as AA, B as BB, C as CC, and and D as DD (saving of A, B, C, and D) - unsigned int A=*A2, B=*B2, C=*C2, D=*D2; - unsigned int AA = A,BB = B,CC = C,DD = D; - - //It is a large region variable reluctantly because of calculation of a round. . . for Round1...4 - pX = X; - - //Copy block(padding_message) i into X - for (j=0,k=0; j<64; j+=4,k++) - X[k] = ( (unsigned int )block[j] ) // 8byte*4 -> 32byte conversion - | ( ((unsigned int )block[j+1]) << 8 ) // A function called Decode as used in the field of RFC - | ( ((unsigned int )block[j+2]) << 16 ) - | ( ((unsigned int )block[j+3]) << 24 ); - - - //Round 1 - Round1(&A,B,C,D, 0, 7, 0); Round1(&D,A,B,C, 1, 12, 1); Round1(&C,D,A,B, 2, 17, 2); Round1(&B,C,D,A, 3, 22, 3); - Round1(&A,B,C,D, 4, 7, 4); Round1(&D,A,B,C, 5, 12, 5); Round1(&C,D,A,B, 6, 17, 6); Round1(&B,C,D,A, 7, 22, 7); - Round1(&A,B,C,D, 8, 7, 8); Round1(&D,A,B,C, 9, 12, 9); Round1(&C,D,A,B, 10, 17, 10); Round1(&B,C,D,A, 11, 22, 11); - Round1(&A,B,C,D, 12, 7, 12); Round1(&D,A,B,C, 13, 12, 13); Round1(&C,D,A,B, 14, 17, 14); Round1(&B,C,D,A, 15, 22, 15); - - //Round 2 - Round2(&A,B,C,D, 1, 5, 16); Round2(&D,A,B,C, 6, 9, 17); Round2(&C,D,A,B, 11, 14, 18); Round2(&B,C,D,A, 0, 20, 19); - Round2(&A,B,C,D, 5, 5, 20); Round2(&D,A,B,C, 10, 9, 21); Round2(&C,D,A,B, 15, 14, 22); Round2(&B,C,D,A, 4, 20, 23); - Round2(&A,B,C,D, 9, 5, 24); Round2(&D,A,B,C, 14, 9, 25); Round2(&C,D,A,B, 3, 14, 26); Round2(&B,C,D,A, 8, 20, 27); - Round2(&A,B,C,D, 13, 5, 28); Round2(&D,A,B,C, 2, 9, 29); Round2(&C,D,A,B, 7, 14, 30); Round2(&B,C,D,A, 12, 20, 31); - - //Round 3 - Round3(&A,B,C,D, 5, 4, 32); Round3(&D,A,B,C, 8, 11, 33); Round3(&C,D,A,B, 11, 16, 34); Round3(&B,C,D,A, 14, 23, 35); - Round3(&A,B,C,D, 1, 4, 36); Round3(&D,A,B,C, 4, 11, 37); Round3(&C,D,A,B, 7, 16, 38); Round3(&B,C,D,A, 10, 23, 39); - Round3(&A,B,C,D, 13, 4, 40); Round3(&D,A,B,C, 0, 11, 41); Round3(&C,D,A,B, 3, 16, 42); Round3(&B,C,D,A, 6, 23, 43); - Round3(&A,B,C,D, 9, 4, 44); Round3(&D,A,B,C, 12, 11, 45); Round3(&C,D,A,B, 15, 16, 46); Round3(&B,C,D,A, 2, 23, 47); - - //Round 4 - Round4(&A,B,C,D, 0, 6, 48); Round4(&D,A,B,C, 7, 10, 49); Round4(&C,D,A,B, 14, 15, 50); Round4(&B,C,D,A, 5, 21, 51); - Round4(&A,B,C,D, 12, 6, 52); Round4(&D,A,B,C, 3, 10, 53); Round4(&C,D,A,B, 10, 15, 54); Round4(&B,C,D,A, 1, 21, 55); - Round4(&A,B,C,D, 8, 6, 56); Round4(&D,A,B,C, 15, 10, 57); Round4(&C,D,A,B, 6, 15, 58); Round4(&B,C,D,A, 13, 21, 59); - Round4(&A,B,C,D, 4, 6, 60); Round4(&D,A,B,C, 11, 10, 61); Round4(&C,D,A,B, 2, 15, 62); Round4(&B,C,D,A, 9, 21, 63); - - // Then perform the following additions. (let's add) - *A2 = A + AA; - *B2 = B + BB; - *C2 = C + CC; - *D2 = D + DD; - - //The clearance of confidential information - memset(pX, 0, sizeof(X)); + //create X It is since it is required. + unsigned int X[16]; //512bit 64byte + int j, k; + + //Save A as AA, B as BB, C as CC, and and D as DD (saving of A, B, C, and D) + unsigned int A = *A2, B = *B2, C = *C2, D = *D2; + unsigned int AA = A, BB = B, CC = C, DD = D; + + //It is a large region variable reluctantly because of calculation of a round. . . for Round1...4 + pX = X; + + //Copy block(padding_message) i into X + for (j = 0, k = 0; j < 64; j += 4, k++) + X[k] = ((unsigned int) block[j]) // 8byte*4 -> 32byte conversion + | (((unsigned int) block[j + 1]) << 8) // A function called Decode as used in the field of RFC + | (((unsigned int) block[j + 2]) << 16) + | (((unsigned int) block[j + 3]) << 24); + + //Round 1 + Round1 (&A, B, C, D, 0, 7, 0); + Round1 (&D, A, B, C, 1, 12, 1); + Round1 (&C, D, A, B, 2, 17, 2); + Round1 (&B, C, D, A, 3, 22, 3); + Round1 (&A, B, C, D, 4, 7, 4); + Round1 (&D, A, B, C, 5, 12, 5); + Round1 (&C, D, A, B, 6, 17, 6); + Round1 (&B, C, D, A, 7, 22, 7); + Round1 (&A, B, C, D, 8, 7, 8); + Round1 (&D, A, B, C, 9, 12, 9); + Round1 (&C, D, A, B, 10, 17, 10); + Round1 (&B, C, D, A, 11, 22, 11); + Round1 (&A, B, C, D, 12, 7, 12); + Round1 (&D, A, B, C, 13, 12, 13); + Round1 (&C, D, A, B, 14, 17, 14); + Round1 (&B, C, D, A, 15, 22, 15); + + //Round 2 + Round2 (&A, B, C, D, 1, 5, 16); + Round2 (&D, A, B, C, 6, 9, 17); + Round2 (&C, D, A, B, 11, 14, 18); + Round2 (&B, C, D, A, 0, 20, 19); + Round2 (&A, B, C, D, 5, 5, 20); + Round2 (&D, A, B, C, 10, 9, 21); + Round2 (&C, D, A, B, 15, 14, 22); + Round2 (&B, C, D, A, 4, 20, 23); + Round2 (&A, B, C, D, 9, 5, 24); + Round2 (&D, A, B, C, 14, 9, 25); + Round2 (&C, D, A, B, 3, 14, 26); + Round2 (&B, C, D, A, 8, 20, 27); + Round2 (&A, B, C, D, 13, 5, 28); + Round2 (&D, A, B, C, 2, 9, 29); + Round2 (&C, D, A, B, 7, 14, 30); + Round2 (&B, C, D, A, 12, 20, 31); + + //Round 3 + Round3 (&A, B, C, D, 5, 4, 32); + Round3 (&D, A, B, C, 8, 11, 33); + Round3 (&C, D, A, B, 11, 16, 34); + Round3 (&B, C, D, A, 14, 23, 35); + Round3 (&A, B, C, D, 1, 4, 36); + Round3 (&D, A, B, C, 4, 11, 37); + Round3 (&C, D, A, B, 7, 16, 38); + Round3 (&B, C, D, A, 10, 23, 39); + Round3 (&A, B, C, D, 13, 4, 40); + Round3 (&D, A, B, C, 0, 11, 41); + Round3 (&C, D, A, B, 3, 16, 42); + Round3 (&B, C, D, A, 6, 23, 43); + Round3 (&A, B, C, D, 9, 4, 44); + Round3 (&D, A, B, C, 12, 11, 45); + Round3 (&C, D, A, B, 15, 16, 46); + Round3 (&B, C, D, A, 2, 23, 47); + + //Round 4 + Round4 (&A, B, C, D, 0, 6, 48); + Round4 (&D, A, B, C, 7, 10, 49); + Round4 (&C, D, A, B, 14, 15, 50); + Round4 (&B, C, D, A, 5, 21, 51); + Round4 (&A, B, C, D, 12, 6, 52); + Round4 (&D, A, B, C, 3, 10, 53); + Round4 (&C, D, A, B, 10, 15, 54); + Round4 (&B, C, D, A, 1, 21, 55); + Round4 (&A, B, C, D, 8, 6, 56); + Round4 (&D, A, B, C, 15, 10, 57); + Round4 (&C, D, A, B, 6, 15, 58); + Round4 (&B, C, D, A, 13, 21, 59); + Round4 (&A, B, C, D, 4, 6, 60); + Round4 (&D, A, B, C, 11, 10, 61); + Round4 (&C, D, A, B, 2, 15, 62); + Round4 (&B, C, D, A, 9, 21, 63); + + // Then perform the following additions. (let's add) + *A2 = A + AA; + *B2 = B + BB; + *C2 = C + CC; + *D2 = D + DD; + + //The clearance of confidential information + memset (pX, 0, sizeof (X)); } //------------------------------------------------------------------- // The function for the exteriors /** output is the coded binary in the character sequence which wants to code string. */ -void MD5_String2binary(const char * string, char * output) +void MD5_String2binary (const char *string, char *output) { //var - /*8bit*/ - unsigned char padding_message[64]; //Extended message 512bit 64byte - unsigned char *pstring; //The position of string in the present scanning notes is held. + /*8bit */ + unsigned char padding_message[64]; //Extended message 512bit 64byte + unsigned char *pstring; //The position of string in the present scanning notes is held. // unsigned char digest[16]; - /*32bit*/ - unsigned int string_byte_len, //The byte chief of string is held. - string_bit_len, //The bit length of string is held. - copy_len, //The number of bytes which is used by 1-3 and which remained - msg_digest[4]; //Message digest 128bit 4byte - unsigned int *A = &msg_digest[0], //The message digest in accordance with RFC (reference) - *B = &msg_digest[1], - *C = &msg_digest[2], - *D = &msg_digest[3]; - int i; + /*32bit */ + unsigned int string_byte_len, //The byte chief of string is held. + string_bit_len, //The bit length of string is held. + copy_len, //The number of bytes which is used by 1-3 and which remained + msg_digest[4]; //Message digest 128bit 4byte + unsigned int *A = &msg_digest[0], //The message digest in accordance with RFC (reference) + *B = &msg_digest[1], *C = &msg_digest[2], *D = &msg_digest[3]; + int i; //prog - //Step 3.Initialize MD Buffer (although it is the initialization; step 3 of A, B, C, and D -- unavoidable -- a head) - *A = 0x67452301; - *B = 0xefcdab89; - *C = 0x98badcfe; - *D = 0x10325476; - - //Step 1.Append Padding Bits (extension of a mark bit) - //1-1 - string_byte_len = strlen(string); //The byte chief of a character sequence is acquired. - pstring = (unsigned char *)string; //The position of the present character sequence is set. - - //1-2 Repeat calculation until length becomes less than 64 bytes. - for (i=string_byte_len; 64<=i; i-=64,pstring+=64) - MD5_Round_Calculate(pstring, A,B,C,D); - - //1-3 - copy_len = string_byte_len % 64; //The number of bytes which remained is computed. - strncpy((char *)padding_message, (char *)pstring, copy_len); //A message is copied to an extended bit sequence. - memset(padding_message+copy_len, 0, 64 - copy_len); //It buries by 0 until it becomes extended bit length. - padding_message[copy_len] |= 0x80; //The next of a message is 1. - - //1-4 - //If 56 bytes or more (less than 64 bytes) of remainder becomes, it will calculate by extending to 64 bytes. - if (56 <= copy_len) { - MD5_Round_Calculate(padding_message, A,B,C,D); - memset(padding_message, 0, 56); //56 bytes is newly fill uped with 0. - } - - - //Step 2.Append Length (the information on length is added) - string_bit_len = string_byte_len * 8; //From the byte chief to bit length (32 bytes of low rank) - memcpy(&padding_message[56], &string_bit_len, 4); //32 bytes of low rank is set. - - //When bit length cannot be expressed in 32 bytes of low rank, it is a beam raising to a higher rank. - if (UINT_MAX / 8 < string_byte_len) { - unsigned int high = (string_byte_len - UINT_MAX / 8) * 8; - memcpy(&padding_message[60], &high, 4); - } else - memset(&padding_message[60], 0, 4); //In this case, it is good for a higher rank at 0. - - //Step 4.Process Message in 16-Word Blocks (calculation of MD5) - MD5_Round_Calculate(padding_message, A,B,C,D); - - - //Step 5.Output (output) - memcpy(output,msg_digest,16); + //Step 3.Initialize MD Buffer (although it is the initialization; step 3 of A, B, C, and D -- unavoidable -- a head) + *A = 0x67452301; + *B = 0xefcdab89; + *C = 0x98badcfe; + *D = 0x10325476; + + //Step 1.Append Padding Bits (extension of a mark bit) + //1-1 + string_byte_len = strlen (string); //The byte chief of a character sequence is acquired. + pstring = (unsigned char *) string; //The position of the present character sequence is set. + + //1-2 Repeat calculation until length becomes less than 64 bytes. + for (i = string_byte_len; 64 <= i; i -= 64, pstring += 64) + MD5_Round_Calculate (pstring, A, B, C, D); + + //1-3 + copy_len = string_byte_len % 64; //The number of bytes which remained is computed. + strncpy ((char *) padding_message, (char *) pstring, copy_len); //A message is copied to an extended bit sequence. + memset (padding_message + copy_len, 0, 64 - copy_len); //It buries by 0 until it becomes extended bit length. + padding_message[copy_len] |= 0x80; //The next of a message is 1. + + //1-4 + //If 56 bytes or more (less than 64 bytes) of remainder becomes, it will calculate by extending to 64 bytes. + if (56 <= copy_len) + { + MD5_Round_Calculate (padding_message, A, B, C, D); + memset (padding_message, 0, 56); //56 bytes is newly fill uped with 0. + } + + //Step 2.Append Length (the information on length is added) + string_bit_len = string_byte_len * 8; //From the byte chief to bit length (32 bytes of low rank) + memcpy (&padding_message[56], &string_bit_len, 4); //32 bytes of low rank is set. + + //When bit length cannot be expressed in 32 bytes of low rank, it is a beam raising to a higher rank. + if (UINT_MAX / 8 < string_byte_len) + { + unsigned int high = (string_byte_len - UINT_MAX / 8) * 8; + memcpy (&padding_message[60], &high, 4); + } + else + memset (&padding_message[60], 0, 4); //In this case, it is good for a higher rank at 0. + + //Step 4.Process Message in 16-Word Blocks (calculation of MD5) + MD5_Round_Calculate (padding_message, A, B, C, D); + + //Step 5.Output (output) + memcpy (output, msg_digest, 16); // memcpy (digest, msg_digest, and 16); //8 byte*4 < - 32byte conversion A function called Encode as used in the field of RFC /* sprintf(output, "%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x", @@ -221,16 +278,15 @@ void MD5_String2binary(const char * string, char * output) } /** output is the coded character sequence in the character sequence which wants to code string. */ -void MD5_String(const char * string, char * output) +void MD5_String (const char *string, char *output) { - unsigned char digest[16]; - - MD5_String2binary(string,digest); - sprintf(output, - "%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x", - digest[ 0], digest[ 1], digest[ 2], digest[ 3], - digest[ 4], digest[ 5], digest[ 6], digest[ 7], - digest[ 8], digest[ 9], digest[10], digest[11], - digest[12], digest[13], digest[14], digest[15]); + unsigned char digest[16]; + + MD5_String2binary (string, digest); + sprintf (output, + "%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x%02x", + digest[0], digest[1], digest[2], digest[3], + digest[4], digest[5], digest[6], digest[7], + digest[8], digest[9], digest[10], digest[11], + digest[12], digest[13], digest[14], digest[15]); } - diff --git a/src/login_sql/md5calc.h b/src/login_sql/md5calc.h index 9bc554f..16c122d 100644 --- a/src/login_sql/md5calc.h +++ b/src/login_sql/md5calc.h @@ -1,7 +1,7 @@ #ifndef _MD5CALC_H_ #define _MD5CALC_H_ -void MD5_String(const char * string, char * output); -void MD5_String2binary(const char * string, char * output); +void MD5_String (const char *string, char *output); +void MD5_String2binary (const char *string, char *output); #endif diff --git a/src/login_sql/strlib.c b/src/login_sql/strlib.c index 7f6e197..5c87ef6 100644 --- a/src/login_sql/strlib.c +++ b/src/login_sql/strlib.c @@ -7,52 +7,58 @@ //----------------------------------------------- // string lib. -unsigned char* jstrescape (unsigned char* pt) { - //copy from here - unsigned char * ptr; - int i =0, j=0; +unsigned char *jstrescape (unsigned char *pt) +{ + //copy from here + unsigned char *ptr; + int i = 0, j = 0; - //copy string to temporary - CREATE(ptr, char, J_MAX_MALLOC_SIZE); - strcpy (ptr,pt); + //copy string to temporary + CREATE (ptr, char, J_MAX_MALLOC_SIZE); + strcpy (ptr, pt); - while (ptr[i] != '\0') { - switch (ptr[i]) { - case '\'': - pt[j++] = '\\'; - pt[j++] = ptr[i++]; - break; - case '\\': - pt[j++] = '\\'; - pt[j++] = ptr[i++]; - break; - default: - pt[j++] = ptr[i++]; - } - } - pt[j++] = '\0'; - free (ptr); - return (unsigned char*) &pt[0]; + while (ptr[i] != '\0') + { + switch (ptr[i]) + { + case '\'': + pt[j++] = '\\'; + pt[j++] = ptr[i++]; + break; + case '\\': + pt[j++] = '\\'; + pt[j++] = ptr[i++]; + break; + default: + pt[j++] = ptr[i++]; + } + } + pt[j++] = '\0'; + free (ptr); + return (unsigned char *) &pt[0]; } -unsigned char* jstrescapecpy (unsigned char* pt,unsigned char* spt) { - //copy from here - int i =0, j=0; +unsigned char *jstrescapecpy (unsigned char *pt, unsigned char *spt) +{ + //copy from here + int i = 0, j = 0; - while (spt[i] != '\0') { - switch (spt[i]) { - case '\'': - pt[j++] = '\\'; - pt[j++] = spt[i++]; - break; - case '\\': - pt[j++] = '\\'; - pt[j++] = spt[i++]; - break; - default: - pt[j++] = spt[i++]; - } - } - pt[j++] = '\0'; - return (unsigned char*) &pt[0]; + while (spt[i] != '\0') + { + switch (spt[i]) + { + case '\'': + pt[j++] = '\\'; + pt[j++] = spt[i++]; + break; + case '\\': + pt[j++] = '\\'; + pt[j++] = spt[i++]; + break; + default: + pt[j++] = spt[i++]; + } + } + pt[j++] = '\0'; + return (unsigned char *) &pt[0]; } diff --git a/src/login_sql/strlib.h b/src/login_sql/strlib.h index ddf29ab..fadd30f 100644 --- a/src/login_sql/strlib.h +++ b/src/login_sql/strlib.h @@ -4,6 +4,6 @@ // String function library. // code by Jioh L. Jung (ziozzang@4wish.net) // This code is under license "BSD" -unsigned char* jstrescape (unsigned char* pt); -unsigned char* jstrescapecpy (unsigned char* pt,unsigned char* spt); +unsigned char *jstrescape (unsigned char *pt); +unsigned char *jstrescapecpy (unsigned char *pt, unsigned char *spt); #endif diff --git a/src/login_sql/timer.h b/src/login_sql/timer.h index be9706a..8abc259 100644 --- a/src/login_sql/timer.h +++ b/src/login_sql/timer.h @@ -13,31 +13,33 @@ // Struct declaration -struct TimerData { - unsigned int tick; - int (*func)(int,unsigned int,int,int); - int id; - int data; - int type; - int interval; - int heap_pos; +struct TimerData +{ + unsigned int tick; + int (*func) (int, unsigned int, int, int); + int id; + int data; + int type; + int interval; + int heap_pos; }; // Function prototype declaration -unsigned int gettick_nocache(void); -unsigned int gettick(void); +unsigned int gettick_nocache (void); +unsigned int gettick (void); -int add_timer(unsigned int,int (*)(int,unsigned int,int,int),int,int); -int add_timer_interval(unsigned int,int (*)(int,unsigned int,int,int),int,int,int); -int delete_timer(int,int (*)(int,unsigned int,int,int)); +int add_timer (unsigned int, int (*)(int, unsigned int, int, int), int, int); +int add_timer_interval (unsigned int, int (*)(int, unsigned int, int, int), + int, int, int); +int delete_timer (int, int (*)(int, unsigned int, int, int)); -int addtick_timer(int tid,unsigned int tick); -struct TimerData *get_timer(int tid); +int addtick_timer (int tid, unsigned int tick); +struct TimerData *get_timer (int tid); -int do_timer(unsigned int tick); +int do_timer (unsigned int tick); -int add_timer_func_list(int (*)(int,unsigned int,int,int),char*); -char* search_timer_func_list(int (*)(int,unsigned int,int,int)); +int add_timer_func_list (int (*)(int, unsigned int, int, int), char *); +char *search_timer_func_list (int (*)(int, unsigned int, int, int)); -#endif // _TIMER_H_ +#endif // _TIMER_H_ |