summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorultramage <ultramage@54d463be-8e91-2dee-dedb-b68131a5f0ec>2008-04-03 12:46:55 +0000
committerultramage <ultramage@54d463be-8e91-2dee-dedb-b68131a5f0ec>2008-04-03 12:46:55 +0000
commitd0e954f07780ee06071e874c6a21fd951a5d6fda (patch)
treea87399e2e7832889cdc66e03bba4534d75f22d74
parentf21ecb9bfff371fb5db70fd3423673391e610ee9 (diff)
downloadhercules-d0e954f07780ee06071e874c6a21fd951a5d6fda.tar.gz
hercules-d0e954f07780ee06071e874c6a21fd951a5d6fda.tar.bz2
hercules-d0e954f07780ee06071e874c6a21fd951a5d6fda.tar.xz
hercules-d0e954f07780ee06071e874c6a21fd951a5d6fda.zip
Renamed 'connect_until_time' to 'expiration_time'.
Renamed 'ban_until_time' to 'unban_time'. this also applies to login table columns (see upgrade_svn12464.sql). git-svn-id: https://rathena.svn.sourceforge.net/svnroot/rathena/trunk@12464 54d463be-8e91-2dee-dedb-b68131a5f0ec
-rw-r--r--Changelog-Trunk.txt5
-rw-r--r--sql-files/main.sql4
-rw-r--r--sql-files/upgrade_svn12464.sql2
-rw-r--r--src/char/char.c20
-rw-r--r--src/char_sql/char.c20
-rw-r--r--src/ladmin/ladmin.c52
-rw-r--r--src/login/admin.c44
-rw-r--r--src/login/login.c64
-rw-r--r--src/login/login.h4
-rw-r--r--src/login_sql/login.c56
-rw-r--r--src/login_sql/login.h4
-rw-r--r--src/map/chrif.c4
-rw-r--r--src/map/chrif.h2
-rw-r--r--src/map/pc.c6
-rw-r--r--src/txt-converter/login-converter.c8
15 files changed, 151 insertions, 144 deletions
diff --git a/Changelog-Trunk.txt b/Changelog-Trunk.txt
index a3c9f0d57..9267eb3d9 100644
--- a/Changelog-Trunk.txt
+++ b/Changelog-Trunk.txt
@@ -3,6 +3,11 @@ Date Added
AS OF SVN REV. 5091, WE ARE NOW USING TRUNK. ALL UNTESTED BUGFIXES/FEATURES GO INTO TRUNK.
IF YOU HAVE A WORKING AND TESTED BUGFIX PUT IT INTO STABLE AS WELL AS TRUNK.
+2008/04/03
+ * More login server work
+ - Renamed 'connect_until_time' to 'expiration_time'
+ - Renamed 'ban_until_time' to 'unban_time'
+ - this also applies to login table columns (see upgrade_svn12464.sql)
2008/04/02
* Rev. 12462 Updated MAX_GUILDCASTLE to support new castles. [L0ne_W0lf]
* Added SV_KEEP_TERMINATOR option to not split the line terminator.
diff --git a/sql-files/main.sql b/sql-files/main.sql
index 4b3b551cd..5ea065677 100644
--- a/sql-files/main.sql
+++ b/sql-files/main.sql
@@ -427,10 +427,10 @@ CREATE TABLE `login` (
`email` varchar(39) NOT NULL default '',
`level` tinyint(3) NOT NULL default '0',
`error_message` smallint(11) unsigned NOT NULL default '0',
- `connect_until` int(11) unsigned NOT NULL default '0',
+ `expiration_time` int(11) unsigned NOT NULL default '0',
`last_ip` varchar(100) NOT NULL default '',
`memo` smallint(11) unsigned NOT NULL default '0',
- `ban_until` int(11) unsigned NOT NULL default '0',
+ `unban_time` int(11) unsigned NOT NULL default '0',
`state` int(11) unsigned NOT NULL default '0',
PRIMARY KEY (`account_id`),
KEY `name` (`userid`)
diff --git a/sql-files/upgrade_svn12464.sql b/sql-files/upgrade_svn12464.sql
new file mode 100644
index 000000000..85b1d336d
--- /dev/null
+++ b/sql-files/upgrade_svn12464.sql
@@ -0,0 +1,2 @@
+ALTER TABLE `login` CHANGE `connect_until` `expiration_time` INT( 11 ) UNSIGNED NOT NULL DEFAULT '0'
+ALTER TABLE `login` CHANGE `ban_until` `unban_time` INT( 11 ) UNSIGNED NOT NULL DEFAULT '0'
diff --git a/src/char/char.c b/src/char/char.c
index 62ac40338..625becef8 100644
--- a/src/char/char.c
+++ b/src/char/char.c
@@ -108,7 +108,7 @@ struct char_session_data {
int account_id, login_id1, login_id2, sex;
int found_char[MAX_CHARS]; // ids of chars on this account
char email[40]; // e-mail (default: a@a.com) by [Yor]
- time_t connect_until_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
+ time_t expiration_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
};
#define AUTH_FIFO_SIZE 256
@@ -117,7 +117,7 @@ struct {
uint32 ip;
int delflag;
int sex;
- time_t connect_until_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
+ time_t expiration_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
} auth_fifo[AUTH_FIFO_SIZE];
int auth_fifo_pos = 0;
@@ -2017,7 +2017,7 @@ int parse_fromlogin(int fd)
int login_id2 = RFIFOL(fd,10);
bool result = RFIFOB(fd,14);
const char* email = (const char*)RFIFOP(fd,15);
- time_t connect_until = (time_t)RFIFOL(fd,55);
+ time_t expiration_time = (time_t)RFIFOL(fd,55);
// find the session with this account id
ARR_FIND( 0, fd_max, i, session[i] && (sd = (struct char_session_data*)session[i]->session_data) &&
@@ -2033,7 +2033,7 @@ int parse_fromlogin(int fd)
memcpy(sd->email, email, 40);
if (e_mail_check(sd->email) == 0)
strncpy(sd->email, "a@a.com", 40); // default e-mail
- sd->connect_until_time = connect_until;
+ sd->expiration_time = expiration_time;
char_auth_ok(i, sd);
}
}
@@ -2051,7 +2051,7 @@ int parse_fromlogin(int fd)
memcpy(sd->email, RFIFOP(fd,6), 40);
if (e_mail_check(sd->email) == 0)
strncpy(sd->email, "a@a.com", 40); // default e-mail
- sd->connect_until_time = (time_t)RFIFOL(fd,46);
+ sd->expiration_time = (time_t)RFIFOL(fd,46);
break;
}
}
@@ -2809,7 +2809,7 @@ int parse_frommap(int fd)
auth_fifo[auth_fifo_pos].login_id1 = RFIFOL(fd,6);
auth_fifo[auth_fifo_pos].login_id2 = RFIFOL(fd,10);
auth_fifo[auth_fifo_pos].delflag = 2;
- auth_fifo[auth_fifo_pos].connect_until_time = 0; // unlimited/unknown time by default (not display in map-server)
+ auth_fifo[auth_fifo_pos].expiration_time = 0; // unlimited/unknown time by default (not display in map-server)
auth_fifo[auth_fifo_pos].ip = ntohl(RFIFOL(fd,14));
auth_fifo_pos++;
WFIFOHEAD(fd,7);
@@ -2854,7 +2854,7 @@ int parse_frommap(int fd)
WFIFOL(map_fd,4) = RFIFOL(fd,2); //Account ID
WFIFOL(map_fd,8) = RFIFOL(fd,6); //Login1
WFIFOL(map_fd,16) = RFIFOL(fd,10); //Login2
- WFIFOL(map_fd,12) = (unsigned long)0; //TODO: connect_until_time, how do I figure it out right now?
+ WFIFOL(map_fd,12) = (unsigned long)0; //TODO: expiration_time, how do I figure it out right now?
memcpy(WFIFOP(map_fd,20), char_data, sizeof(struct mmo_charstatus));
WFIFOSET(map_fd, WFIFOW(map_fd,2));
@@ -3250,7 +3250,7 @@ int parse_char(int fd)
CREATE(session[fd]->session_data, struct char_session_data, 1);
sd = (struct char_session_data*)session[fd]->session_data;
strncpy(sd->email, "no mail", 40); // put here a mail without '@' to refuse deletion if we don't receive the e-mail
- sd->connect_until_time = 0; // unknown or unlimited (not displaying on map-server)
+ sd->expiration_time = 0; // unknown or unlimited (not displaying on map-server)
sd->account_id = account_id;
sd->login_id1 = login_id1;
sd->login_id2 = login_id2;
@@ -3392,7 +3392,7 @@ int parse_char(int fd)
auth_fifo[auth_fifo_pos].login_id2 = sd->login_id2;
auth_fifo[auth_fifo_pos].delflag = 0;
auth_fifo[auth_fifo_pos].sex = sd->sex;
- auth_fifo[auth_fifo_pos].connect_until_time = sd->connect_until_time;
+ auth_fifo[auth_fifo_pos].expiration_time = sd->expiration_time;
auth_fifo[auth_fifo_pos].ip = session[fd]->client_addr;
//Send NEW auth packet [Kevin]
@@ -3416,7 +3416,7 @@ int parse_char(int fd)
WFIFOL(map_fd,4) = auth_fifo[auth_fifo_pos].account_id;
WFIFOL(map_fd,8) = auth_fifo[auth_fifo_pos].login_id1;
WFIFOL(map_fd,16) = auth_fifo[auth_fifo_pos].login_id2;
- WFIFOL(map_fd,12) = (unsigned long)auth_fifo[auth_fifo_pos].connect_until_time;
+ WFIFOL(map_fd,12) = (unsigned long)auth_fifo[auth_fifo_pos].expiration_time;
memcpy(WFIFOP(map_fd,20), cd, sizeof(struct mmo_charstatus));
WFIFOSET(map_fd, WFIFOW(map_fd,2));
diff --git a/src/char_sql/char.c b/src/char_sql/char.c
index 533946546..854dea5f6 100644
--- a/src/char_sql/char.c
+++ b/src/char_sql/char.c
@@ -138,7 +138,7 @@ struct char_session_data {
int account_id, login_id1, login_id2, sex;
int found_char[MAX_CHARS]; // ids of chars on this account
char email[40]; // e-mail (default: a@a.com) by [Yor]
- time_t connect_until_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
+ time_t expiration_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
};
#define AUTH_FIFO_SIZE 256
@@ -147,7 +147,7 @@ struct {
uint32 ip;
int delflag;
int sex;
- time_t connect_until_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
+ time_t expiration_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
} auth_fifo[AUTH_FIFO_SIZE];
int auth_fifo_pos = 0;
@@ -1718,7 +1718,7 @@ int parse_fromlogin(int fd)
int login_id2 = RFIFOL(fd,10);
bool result = RFIFOB(fd,14);
const char* email = (const char*)RFIFOP(fd,15);
- time_t connect_until = (time_t)RFIFOL(fd,55);
+ time_t expiration_time = (time_t)RFIFOL(fd,55);
// find the session with this account id
ARR_FIND( 0, fd_max, i, session[i] && (sd = (struct char_session_data*)session[i]->session_data) &&
@@ -1732,7 +1732,7 @@ int parse_fromlogin(int fd)
WFIFOSET(i,3);
} else { // success
memcpy(sd->email, email, 40);
- sd->connect_until_time = connect_until;
+ sd->expiration_time = expiration_time;
char_auth_ok(i, sd);
}
}
@@ -1750,7 +1750,7 @@ int parse_fromlogin(int fd)
if( i < fd_max )
{
memcpy(sd->email, RFIFOP(fd,6), 40);
- sd->connect_until_time = (time_t)RFIFOL(fd,46);
+ sd->expiration_time = (time_t)RFIFOL(fd,46);
}
RFIFOSKIP(fd,50);
break;
@@ -2391,7 +2391,7 @@ int parse_frommap(int fd)
auth_fifo[auth_fifo_pos].login_id1 = RFIFOL(fd,6);
auth_fifo[auth_fifo_pos].login_id2 = RFIFOL(fd,10);
auth_fifo[auth_fifo_pos].delflag = 2;
- auth_fifo[auth_fifo_pos].connect_until_time = 0; // unlimited/unknown time by default (not display in map-server)
+ auth_fifo[auth_fifo_pos].expiration_time = 0; // unlimited/unknown time by default (not display in map-server)
auth_fifo[auth_fifo_pos].ip = ntohl(RFIFOL(fd,14));
auth_fifo_pos++;
WFIFOHEAD(fd,7);
@@ -2436,7 +2436,7 @@ int parse_frommap(int fd)
WFIFOL(map_fd,4) = RFIFOL(fd,2); //Account ID
WFIFOL(map_fd,8) = RFIFOL(fd,6); //Login1
WFIFOL(map_fd,16) = RFIFOL(fd,10); //Login2
- WFIFOL(map_fd,12) = (unsigned long)0; //TODO: connect_until_time, how do I figure it out right now?
+ WFIFOL(map_fd,12) = (unsigned long)0; //TODO: expiration_time, how do I figure it out right now?
memcpy(WFIFOP(map_fd,20), char_data, sizeof(struct mmo_charstatus));
WFIFOSET(map_fd, WFIFOW(map_fd,2));
@@ -2866,7 +2866,7 @@ int parse_char(int fd)
CREATE(session[fd]->session_data, struct char_session_data, 1);
sd = (struct char_session_data*)session[fd]->session_data;
- sd->connect_until_time = 0; // unknown or unlimited (not displaying on map-server)
+ sd->expiration_time = 0; // unknown or unlimited (not displaying on map-server)
sd->account_id = account_id;
sd->login_id1 = login_id1;
sd->login_id2 = login_id2;
@@ -3014,7 +3014,7 @@ int parse_char(int fd)
auth_fifo[auth_fifo_pos].login_id2 = sd->login_id2;
auth_fifo[auth_fifo_pos].delflag = 0;
auth_fifo[auth_fifo_pos].sex = sd->sex;
- auth_fifo[auth_fifo_pos].connect_until_time = sd->connect_until_time;
+ auth_fifo[auth_fifo_pos].expiration_time = sd->expiration_time;
auth_fifo[auth_fifo_pos].ip = session[fd]->client_addr;
//Send NEW auth packet [Kevin]
@@ -3038,7 +3038,7 @@ int parse_char(int fd)
WFIFOL(map_fd,4) = auth_fifo[auth_fifo_pos].account_id;
WFIFOL(map_fd,8) = auth_fifo[auth_fifo_pos].login_id1;
WFIFOL(map_fd,16) = auth_fifo[auth_fifo_pos].login_id2;
- WFIFOL(map_fd,12) = (unsigned long)auth_fifo[auth_fifo_pos].connect_until_time;
+ WFIFOL(map_fd,12) = (unsigned long)auth_fifo[auth_fifo_pos].expiration_time;
memcpy(WFIFOP(map_fd,20), &char_dat, sizeof(struct mmo_charstatus));
WFIFOSET(map_fd, WFIFOW(map_fd,2));
diff --git a/src/ladmin/ladmin.c b/src/ladmin/ladmin.c
index 89728be84..c39d03c1c 100644
--- a/src/ladmin/ladmin.c
+++ b/src/ladmin/ladmin.c
@@ -1419,13 +1419,13 @@ int banaddaccount(char* param)
int bansetaccountsub(char* name, char* date, char* time)
{
int year, month, day, hour, minute, second;
- time_t ban_until_time; // # of seconds 1/1/1970 (timestamp): ban time limit of the account (0 = no ban)
+ time_t unban_time; // # of seconds 1/1/1970 (timestamp): ban time limit of the account (0 = no ban)
struct tm *tmtime;
WFIFOHEAD(login_fd,30);
year = month = day = hour = minute = second = 0;
- ban_until_time = 0;
- tmtime = localtime(&ban_until_time); // initialize
+ unban_time = 0;
+ tmtime = localtime(&unban_time); // initialize
if (verify_accountname(name) == 0) {
return 102;
@@ -1449,7 +1449,7 @@ int bansetaccountsub(char* name, char* date, char* time)
}
if (atoi(date) == 0) {
- ban_until_time = 0;
+ unban_time = 0;
} else {
if (year < 70) {
year = year + 100;
@@ -1526,8 +1526,8 @@ int bansetaccountsub(char* name, char* date, char* time)
tmtime->tm_min = minute;
tmtime->tm_sec = second;
tmtime->tm_isdst = -1; // -1: no winter/summer time modification
- ban_until_time = mktime(tmtime);
- if (ban_until_time == -1) {
+ unban_time = mktime(tmtime);
+ if (unban_time == -1) {
if (defaultlanguage == 'F') {
ShowMessage("Date incorrecte.\n");
ShowMessage("Entrez une date et une heure svp (format: aaaa/mm/jj hh:mm:ss).\n");
@@ -1551,7 +1551,7 @@ int bansetaccountsub(char* name, char* date, char* time)
WFIFOW(login_fd,0) = 0x794a;
memcpy(WFIFOP(login_fd,2), name, 24);
- WFIFOL(login_fd,26) = (int)ban_until_time;
+ WFIFOL(login_fd,26) = (int)unban_time;
WFIFOSET(login_fd,30);
bytes_to_read = 1;
@@ -2799,7 +2799,7 @@ int timesetaccount(char* param)
{
char name[1023], date[1023], time[1023];
int year, month, day, hour, minute, second;
- time_t connect_until_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
+ time_t expiration_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
struct tm *tmtime;
WFIFOHEAD(login_fd,30);
@@ -2807,8 +2807,8 @@ int timesetaccount(char* param)
memset(date, '\0', sizeof(date));
memset(time, '\0', sizeof(time));
year = month = day = hour = minute = second = 0;
- connect_until_time = 0;
- tmtime = localtime(&connect_until_time); // initialize
+ expiration_time = 0;
+ tmtime = localtime(&expiration_time); // initialize
if (sscanf(param, "\"%[^\"]\" %s %[^\r\n]", name, date, time) < 2 && // if date = 0, time can be void
sscanf(param, "'%[^']' %s %[^\r\n]", name, date, time) < 2 && // if date = 0, time can be void
@@ -2852,7 +2852,7 @@ int timesetaccount(char* param)
}
if (atoi(date) == 0) {
- connect_until_time = 0;
+ expiration_time = 0;
} else {
if (year < 70) {
year = year + 100;
@@ -2929,8 +2929,8 @@ int timesetaccount(char* param)
tmtime->tm_min = minute;
tmtime->tm_sec = second;
tmtime->tm_isdst = -1; // -1: no winter/summer time modification
- connect_until_time = mktime(tmtime);
- if (connect_until_time == -1) {
+ expiration_time = mktime(tmtime);
+ if (expiration_time == -1) {
if (defaultlanguage == 'F') {
ShowMessage("Date incorrecte.\n");
ShowMessage("Ajoutez 0 ou une date et une heure svp (format: 0 ou aaaa/mm/jj hh:mm:ss).\n");
@@ -2952,7 +2952,7 @@ int timesetaccount(char* param)
WFIFOW(login_fd,0) = 0x7948;
memcpy(WFIFOP(login_fd,2), name, 24);
- WFIFOL(login_fd,26) = (int)connect_until_time;
+ WFIFOL(login_fd,26) = (int)expiration_time;
WFIFOSET(login_fd,30);
bytes_to_read = 1;
@@ -4014,8 +4014,8 @@ int parse_fromlogin(int fd)
return 0;
{
char userid[24], error_message[20], lastlogin[24], last_ip[16], email[40], memo[255];
- time_t ban_until_time; // # of seconds 1/1/1970 (timestamp): ban time limit of the account (0 = no ban)
- time_t connect_until_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
+ time_t unban_time; // # of seconds 1/1/1970 (timestamp): ban time limit of the account (0 = no ban)
+ time_t expiration_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
memcpy(userid, RFIFOP(fd,7), sizeof(userid));
userid[sizeof(userid)-1] = '\0';
memcpy(error_message, RFIFOP(fd,40), sizeof(error_message));
@@ -4026,8 +4026,8 @@ int parse_fromlogin(int fd)
last_ip[sizeof(last_ip)-1] = '\0';
memcpy(email, RFIFOP(fd,100), sizeof(email));
email[sizeof(email)-1] = '\0';
- connect_until_time = (time_t)RFIFOL(fd,140);
- ban_until_time = (time_t)RFIFOL(fd,144);
+ expiration_time = (time_t)RFIFOL(fd,140);
+ unban_time = (time_t)RFIFOL(fd,144);
memset(memo, '\0', sizeof(memo));
strncpy(memo, (const char*)RFIFOP(fd,150), RFIFOW(fd,148));
id = RFIFOL(fd,2);
@@ -4121,11 +4121,11 @@ int parse_fromlogin(int fd)
break;
}
if (defaultlanguage == 'F') {
- if (ban_until_time == 0) {
+ if (unban_time == 0) {
ShowMessage(" Banissement: non banni.\n");
} else {
char tmpstr[128];
- strftime(tmpstr, 24, date_format, localtime(&ban_until_time));
+ strftime(tmpstr, 24, date_format, localtime(&unban_time));
ShowMessage(" Banissement: jusqu'au %s.\n", tmpstr);
}
if (RFIFOL(fd,32) > 1)
@@ -4133,19 +4133,19 @@ int parse_fromlogin(int fd)
else
ShowMessage(" Compteur: %d connexion.\n", (int)RFIFOL(fd,32));
ShowMessage(" Dernière connexion le: %s (ip: %s)\n", lastlogin, last_ip);
- if (connect_until_time == 0) {
+ if (expiration_time == 0) {
ShowMessage(" Limite de validité: illimité.\n");
} else {
char tmpstr[128];
- strftime(tmpstr, 24, date_format, localtime(&connect_until_time));
+ strftime(tmpstr, 24, date_format, localtime(&expiration_time));
ShowMessage(" Limite de validité: jusqu'au %s.\n", tmpstr);
}
} else {
- if (ban_until_time == 0) {
+ if (unban_time == 0) {
ShowMessage(" Banishment: not banished.\n");
} else {
char tmpstr[128];
- strftime(tmpstr, 24, date_format, localtime(&ban_until_time));
+ strftime(tmpstr, 24, date_format, localtime(&unban_time));
ShowMessage(" Banishment: until %s.\n", tmpstr);
}
if (RFIFOL(fd,32) > 1)
@@ -4153,11 +4153,11 @@ int parse_fromlogin(int fd)
else
ShowMessage(" Count: %d connection.\n", (int)RFIFOL(fd,32));
ShowMessage(" Last connection at: %s (ip: %s)\n", lastlogin, last_ip);
- if (connect_until_time == 0) {
+ if (expiration_time == 0) {
ShowMessage(" Validity limit: unlimited.\n");
} else {
char tmpstr[128];
- strftime(tmpstr, 24, date_format, localtime(&connect_until_time));
+ strftime(tmpstr, 24, date_format, localtime(&expiration_time));
ShowMessage(" Validity limit: until %s.\n", tmpstr);
}
}
diff --git a/src/login/admin.c b/src/login/admin.c
index 64f7c1b3c..7115e6f05 100644
--- a/src/login/admin.c
+++ b/src/login/admin.c
@@ -117,7 +117,7 @@ int parse_admin(int fd)
memcpy(WFIFOP(fd,len+5), auth_dat[j].userid, 24);
WFIFOB(fd,len+29) = auth_dat[j].sex;
WFIFOL(fd,len+30) = auth_dat[j].logincount;
- if (auth_dat[j].state == 0 && auth_dat[j].ban_until_time != 0) // if no state and banished
+ if (auth_dat[j].state == 0 && auth_dat[j].unban_time != 0) // if no state and banished
WFIFOL(fd,len+34) = 7; // 6 = Your are Prohibited to log in until %s
else
WFIFOL(fd,len+34) = auth_dat[j].state;
@@ -595,7 +595,7 @@ int parse_admin(int fd)
if (i != -1) {
memcpy(WFIFOP(fd,6), auth_dat[i].userid, 24);
ShowNotice("'ladmin': Change of a validity limit (account: %s, new validity: %d (%s), ip: %s)\n", auth_dat[i].userid, timestamp, (timestamp == 0 ? "unlimited" : tmpstr), ip);
- auth_dat[i].connect_until_time = timestamp;
+ auth_dat[i].expiration_time = timestamp;
WFIFOL(fd,2) = auth_dat[i].account_id;
mmo_auth_sync();
} else {
@@ -628,7 +628,7 @@ int parse_admin(int fd)
memcpy(WFIFOP(fd,6), auth_dat[i].userid, 24);
WFIFOL(fd,2) = auth_dat[i].account_id;
ShowNotice("'ladmin': Change of the final date of a banishment (account: %s, new final date of banishment: %d (%s), ip: %s)\n", auth_dat[i].userid, timestamp, (timestamp == 0 ? "no banishment" : tmpstr), ip);
- if (auth_dat[i].ban_until_time != timestamp) {
+ if (auth_dat[i].unban_time != timestamp) {
if (timestamp != 0) {
unsigned char buf[16];
WBUFW(buf,0) = 0x2731;
@@ -642,7 +642,7 @@ int parse_admin(int fd)
auth_fifo[j].login_id1++; // to avoid reconnection error when come back from map-server (char-server will ask again the authentication)
*/
}
- auth_dat[i].ban_until_time = timestamp;
+ auth_dat[i].unban_time = timestamp;
mmo_auth_sync();
}
} else {
@@ -671,10 +671,10 @@ int parse_admin(int fd)
if (i != -1) {
WFIFOL(fd,2) = auth_dat[i].account_id;
memcpy(WFIFOP(fd,6), auth_dat[i].userid, 24);
- if (auth_dat[i].ban_until_time == 0 || auth_dat[i].ban_until_time < time(NULL))
+ if (auth_dat[i].unban_time == 0 || auth_dat[i].unban_time < time(NULL))
timestamp = time(NULL);
else
- timestamp = auth_dat[i].ban_until_time;
+ timestamp = auth_dat[i].unban_time;
tmtime = localtime(&timestamp);
tmtime->tm_year = tmtime->tm_year + (short)RFIFOW(fd,26);
tmtime->tm_mon = tmtime->tm_mon + (short)RFIFOW(fd,28);
@@ -688,7 +688,7 @@ int parse_admin(int fd)
timestamp = 0;
strftime(tmpstr, 24, login_config.date_format, localtime(&timestamp));
ShowNotice("'ladmin': Adjustment of a final date of a banishment (account: %s, (%+d y %+d m %+d d %+d h %+d mn %+d s) -> new validity: %d (%s), ip: %s)\n", auth_dat[i].userid, (short)RFIFOW(fd,26), (short)RFIFOW(fd,28), (short)RFIFOW(fd,30), (short)RFIFOW(fd,32), (short)RFIFOW(fd,34), (short)RFIFOW(fd,36), timestamp, (timestamp == 0 ? "no banishment" : tmpstr), ip);
- if (auth_dat[i].ban_until_time != timestamp) {
+ if (auth_dat[i].unban_time != timestamp) {
if (timestamp != 0) {
unsigned char buf[16];
WBUFW(buf,0) = 0x2731;
@@ -704,14 +704,14 @@ int parse_admin(int fd)
}
*/
}
- auth_dat[i].ban_until_time = timestamp;
+ auth_dat[i].unban_time = timestamp;
mmo_auth_sync();
}
} else {
- strftime(tmpstr, 24, login_config.date_format, localtime(&auth_dat[i].ban_until_time));
- ShowNotice("'ladmin': Impossible to adjust the final date of a banishment (account: %s, %d (%s) + (%+d y %+d m %+d d %+d h %+d mn %+d s) -> ???, ip: %s)\n", auth_dat[i].userid, auth_dat[i].ban_until_time, (auth_dat[i].ban_until_time == 0 ? "no banishment" : tmpstr), (short)RFIFOW(fd,26), (short)RFIFOW(fd,28), (short)RFIFOW(fd,30), (short)RFIFOW(fd,32), (short)RFIFOW(fd,34), (short)RFIFOW(fd,36), ip);
+ strftime(tmpstr, 24, login_config.date_format, localtime(&auth_dat[i].unban_time));
+ ShowNotice("'ladmin': Impossible to adjust the final date of a banishment (account: %s, %d (%s) + (%+d y %+d m %+d d %+d h %+d mn %+d s) -> ???, ip: %s)\n", auth_dat[i].userid, auth_dat[i].unban_time, (auth_dat[i].unban_time == 0 ? "no banishment" : tmpstr), (short)RFIFOW(fd,26), (short)RFIFOW(fd,28), (short)RFIFOW(fd,30), (short)RFIFOW(fd,32), (short)RFIFOW(fd,34), (short)RFIFOW(fd,36), ip);
}
- WFIFOL(fd,30) = (unsigned long)auth_dat[i].ban_until_time;
+ WFIFOL(fd,30) = (unsigned long)auth_dat[i].unban_time;
} else {
memcpy(WFIFOP(fd,6), account_name, 24);
ShowNotice("'ladmin': Attempt to adjust the final date of a banishment of an unknown account (account: %s, ip: %s)\n", account_name, ip);
@@ -775,7 +775,7 @@ int parse_admin(int fd)
if (i != -1) {
WFIFOL(fd,2) = auth_dat[i].account_id;
memcpy(WFIFOP(fd,6), auth_dat[i].userid, 24);
- timestamp = auth_dat[i].connect_until_time;
+ timestamp = auth_dat[i].expiration_time;
if (timestamp == 0 || timestamp < time(NULL))
timestamp = time(NULL);
tmtime = localtime(&timestamp);
@@ -787,15 +787,15 @@ int parse_admin(int fd)
tmtime->tm_sec = tmtime->tm_sec + (short)RFIFOW(fd,36);
timestamp = mktime(tmtime);
if (timestamp != -1) {
- strftime(tmpstr, 24, login_config.date_format, localtime(&auth_dat[i].connect_until_time));
+ strftime(tmpstr, 24, login_config.date_format, localtime(&auth_dat[i].expiration_time));
strftime(tmpstr2, 24, login_config.date_format, localtime(&timestamp));
- ShowNotice("'ladmin': Adjustment of a validity limit (account: %s, %d (%s) + (%+d y %+d m %+d d %+d h %+d mn %+d s) -> new validity: %d (%s), ip: %s)\n", auth_dat[i].userid, auth_dat[i].connect_until_time, (auth_dat[i].connect_until_time == 0 ? "unlimited" : tmpstr), (short)RFIFOW(fd,26), (short)RFIFOW(fd,28), (short)RFIFOW(fd,30), (short)RFIFOW(fd,32), (short)RFIFOW(fd,34), (short)RFIFOW(fd,36), timestamp, (timestamp == 0 ? "unlimited" : tmpstr2), ip);
- auth_dat[i].connect_until_time = timestamp;
+ ShowNotice("'ladmin': Adjustment of a validity limit (account: %s, %d (%s) + (%+d y %+d m %+d d %+d h %+d mn %+d s) -> new validity: %d (%s), ip: %s)\n", auth_dat[i].userid, auth_dat[i].expiration_time, (auth_dat[i].expiration_time == 0 ? "unlimited" : tmpstr), (short)RFIFOW(fd,26), (short)RFIFOW(fd,28), (short)RFIFOW(fd,30), (short)RFIFOW(fd,32), (short)RFIFOW(fd,34), (short)RFIFOW(fd,36), timestamp, (timestamp == 0 ? "unlimited" : tmpstr2), ip);
+ auth_dat[i].expiration_time = timestamp;
mmo_auth_sync();
- WFIFOL(fd,30) = (unsigned long)auth_dat[i].connect_until_time;
+ WFIFOL(fd,30) = (unsigned long)auth_dat[i].expiration_time;
} else {
- strftime(tmpstr, 24, login_config.date_format, localtime(&auth_dat[i].connect_until_time));
- ShowNotice("'ladmin': Impossible to adjust a validity limit (account: %s, %d (%s) + (%+d y %+d m %+d d %+d h %+d mn %+d s) -> ???, ip: %s)\n", auth_dat[i].userid, auth_dat[i].connect_until_time, (auth_dat[i].connect_until_time == 0 ? "unlimited" : tmpstr), (short)RFIFOW(fd,26), (short)RFIFOW(fd,28), (short)RFIFOW(fd,30), (short)RFIFOW(fd,32), (short)RFIFOW(fd,34), (short)RFIFOW(fd,36), ip);
+ strftime(tmpstr, 24, login_config.date_format, localtime(&auth_dat[i].expiration_time));
+ ShowNotice("'ladmin': Impossible to adjust a validity limit (account: %s, %d (%s) + (%+d y %+d m %+d d %+d h %+d mn %+d s) -> ???, ip: %s)\n", auth_dat[i].userid, auth_dat[i].expiration_time, (auth_dat[i].expiration_time == 0 ? "unlimited" : tmpstr), (short)RFIFOW(fd,26), (short)RFIFOW(fd,28), (short)RFIFOW(fd,30), (short)RFIFOW(fd,32), (short)RFIFOW(fd,34), (short)RFIFOW(fd,36), ip);
WFIFOL(fd,30) = 0;
}
} else {
@@ -828,8 +828,8 @@ int parse_admin(int fd)
memcpy(WFIFOP(fd,60), auth_dat[i].lastlogin, 24);
memcpy(WFIFOP(fd,84), auth_dat[i].last_ip, 16);
memcpy(WFIFOP(fd,100), auth_dat[i].email, 40);
- WFIFOL(fd,140) = (unsigned long)auth_dat[i].connect_until_time;
- WFIFOL(fd,144) = (unsigned long)auth_dat[i].ban_until_time;
+ WFIFOL(fd,140) = (unsigned long)auth_dat[i].expiration_time;
+ WFIFOL(fd,144) = (unsigned long)auth_dat[i].unban_time;
WFIFOW(fd,148) = (uint16)strlen(auth_dat[i].memo);
if (auth_dat[i].memo[0]) {
memcpy(WFIFOP(fd,150), auth_dat[i].memo, strlen(auth_dat[i].memo));
@@ -863,8 +863,8 @@ int parse_admin(int fd)
memcpy(WFIFOP(fd,60), auth_dat[i].lastlogin, 24);
memcpy(WFIFOP(fd,84), auth_dat[i].last_ip, 16);
memcpy(WFIFOP(fd,100), auth_dat[i].email, 40);
- WFIFOL(fd,140) = (unsigned long)auth_dat[i].connect_until_time;
- WFIFOL(fd,144) = (unsigned long)auth_dat[i].ban_until_time;
+ WFIFOL(fd,140) = (unsigned long)auth_dat[i].expiration_time;
+ WFIFOL(fd,144) = (unsigned long)auth_dat[i].unban_time;
WFIFOW(fd,148) = (uint16)strlen(auth_dat[i].memo);
if (auth_dat[i].memo[0]) {
memcpy(WFIFOP(fd,150), auth_dat[i].memo, strlen(auth_dat[i].memo));
diff --git a/src/login/login.c b/src/login/login.c
index 8b5243811..88832634f 100644
--- a/src/login/login.c
+++ b/src/login/login.c
@@ -338,7 +338,7 @@ int mmo_auth_tostr(char* str, struct mmo_account* p)
str_p += sprintf(str_p, "%d\t%s\t%s\t%s\t%c\t%d\t%u\t%s\t%s\t%ld\t%s\t%s\t%ld\t",
p->account_id, p->userid, p->pass, p->lastlogin, p->sex,
p->logincount, p->state, p->email, p->error_message,
- (long)p->connect_until_time, p->last_ip, p->memo, (long)p->ban_until_time);
+ (long)p->expiration_time, p->last_ip, p->memo, (long)p->unban_time);
for(i = 0; i < p->account_reg2_num; i++)
if (p->account_reg2[i].str[0])
@@ -358,8 +358,8 @@ int mmo_auth_init(void)
int logincount, n;
uint32 i, j;
char line[2048], *p, userid[2048], pass[2048], lastlogin[2048], sex, email[2048], error_message[2048], last_ip[2048], memo[2048];
- long ban_until_time;
- long connect_until_time;
+ long unban_time;
+ long expiration_time;
char str[2048];
char v[2048];
int GM_count = 0;
@@ -393,11 +393,11 @@ int mmo_auth_init(void)
if (((i = sscanf(line, "%d\t%[^\t]\t%[^\t]\t%[^\t]\t%c\t%d\t%u\t"
"%[^\t]\t%[^\t]\t%ld\t%[^\t]\t%[^\t]\t%ld%n",
&account_id, userid, pass, lastlogin, &sex, &logincount, &state,
- email, error_message, &connect_until_time, last_ip, memo, &ban_until_time, &n)) == 13 && line[n] == '\t') ||
+ email, error_message, &expiration_time, last_ip, memo, &unban_time, &n)) == 13 && line[n] == '\t') ||
((i = sscanf(line, "%d\t%[^\t]\t%[^\t]\t%[^\t]\t%c\t%d\t%u\t"
"%[^\t]\t%[^\t]\t%ld\t%[^\t]\t%[^\t]%n",
&account_id, userid, pass, lastlogin, &sex, &logincount, &state,
- email, error_message, &connect_until_time, last_ip, memo, &n)) == 12 && line[n] == '\t')) {
+ email, error_message, &expiration_time, last_ip, memo, &n)) == 12 && line[n] == '\t')) {
n = n + 1;
// Some checks
@@ -470,11 +470,11 @@ int mmo_auth_init(void)
}
if (i == 13)
- auth_dat[auth_num].ban_until_time = (time_t)ban_until_time;
+ auth_dat[auth_num].unban_time = (time_t)unban_time;
else
- auth_dat[auth_num].ban_until_time = 0;
+ auth_dat[auth_num].unban_time = 0;
- auth_dat[auth_num].connect_until_time = (time_t)connect_until_time;
+ auth_dat[auth_num].expiration_time = (time_t)expiration_time;
last_ip[15] = '\0';
remove_control_chars(last_ip);
@@ -575,8 +575,8 @@ int mmo_auth_init(void)
// Initialization of new data
strncpy(auth_dat[auth_num].email, "a@a.com", 40);
strncpy(auth_dat[auth_num].error_message, "-", 20);
- auth_dat[auth_num].ban_until_time = 0;
- auth_dat[auth_num].connect_until_time = 0;
+ auth_dat[auth_num].unban_time = 0;
+ auth_dat[auth_num].expiration_time = 0;
strncpy(auth_dat[auth_num].last_ip, "-", 16);
strncpy(auth_dat[auth_num].memo, "-", 255);
@@ -848,7 +848,7 @@ int mmo_auth_new(struct mmo_account* account)
static int num_regs = 0; // registration counter
unsigned int tick = gettick();
- time_t connect_until = 0;
+ time_t expiration_time = 0;
unsigned int i = auth_num;
// check if the account doesn't exist already
@@ -889,10 +889,10 @@ int mmo_auth_new(struct mmo_account* account)
auth_dat[i].state = 0;
safestrncpy(auth_dat[i].email, e_mail_check(account->email) ? account->email : "a@a.com", sizeof(auth_dat[i].email));
safestrncpy(auth_dat[i].error_message, "-", sizeof(auth_dat[i].error_message));
- auth_dat[i].ban_until_time = 0;
+ auth_dat[i].unban_time = 0;
if( login_config.start_limited_time != -1 )
- connect_until = time(NULL) + login_config.start_limited_time;
- auth_dat[i].connect_until_time = connect_until;
+ expiration_time = time(NULL) + login_config.start_limited_time;
+ auth_dat[i].expiration_time = expiration_time;
strncpy(auth_dat[i].last_ip, "-", 16);
strncpy(auth_dat[i].memo, "-", 255);
auth_dat[i].account_reg2_num = 0;
@@ -1013,15 +1013,15 @@ int mmo_auth(struct login_session_data* sd)
return 1; // 1 = Incorrect Password
}
- if( auth_dat[i].connect_until_time != 0 && auth_dat[i].connect_until_time < time(NULL) )
+ if( auth_dat[i].expiration_time != 0 && auth_dat[i].expiration_time < time(NULL) )
{
ShowNotice("Connection refused (account: %s, pass: %s, expired ID, ip: %s)\n", sd->userid, sd->passwd, ip);
return 2; // 2 = This ID is expired
}
- if( auth_dat[i].ban_until_time != 0 && auth_dat[i].ban_until_time > time(NULL) )
+ if( auth_dat[i].unban_time != 0 && auth_dat[i].unban_time > time(NULL) )
{
- strftime(tmpstr, 20, login_config.date_format, localtime(&auth_dat[i].ban_until_time));
+ strftime(tmpstr, 20, login_config.date_format, localtime(&auth_dat[i].unban_time));
tmpstr[19] = '\0';
ShowNotice("Connection refused (account: %s, pass: %s, banned until %s, ip: %s)\n", sd->userid, sd->passwd, tmpstr, ip);
return 6; // 6 = Your are Prohibited to log in until %s
@@ -1050,7 +1050,7 @@ int mmo_auth(struct login_session_data* sd)
safestrncpy(auth_dat[i].lastlogin, tmpstr, sizeof(auth_dat[i].lastlogin));
safestrncpy(auth_dat[i].last_ip, ip, sizeof(auth_dat[i].last_ip));
- auth_dat[i].ban_until_time = 0;
+ auth_dat[i].unban_time = 0;
auth_dat[i].logincount++;
// Save until for change ip/time of auth is not very useful => limited save for that
@@ -1146,7 +1146,7 @@ int parse_fromchar(int fd)
node->sex == sex &&
node->ip == ip_ )
{// found
- uint32 connect_until_time;
+ uint32 expiration_time;
char email[40];
unsigned int k;
@@ -1160,12 +1160,12 @@ int parse_fromchar(int fd)
if( k < auth_num )
{
strcpy(email, auth_dat[k].email);
- connect_until_time = (uint32)auth_dat[k].connect_until_time;
+ expiration_time = (uint32)auth_dat[k].expiration_time;
}
else
{
memset(email, 0, sizeof(email));
- connect_until_time = 0;
+ expiration_time = 0;
}
// send ack
@@ -1176,7 +1176,7 @@ int parse_fromchar(int fd)
WFIFOL(fd,10) = login_id2;
WFIFOB(fd,14) = 0;
memcpy(WFIFOP(fd,15), email, 40);
- WFIFOL(fd,55) = connect_until_time;
+ WFIFOL(fd,55) = expiration_time;
WFIFOSET(fd,59);
}
else
@@ -1243,7 +1243,7 @@ int parse_fromchar(int fd)
if( RFIFOREST(fd) < 6 )
return 0;
{
- uint32 connect_until_time = 0;
+ uint32 expiration_time = 0;
char email[40] = "";
int account_id = RFIFOL(fd,2);
@@ -1255,14 +1255,14 @@ int parse_fromchar(int fd)
else
{
safestrncpy(email, auth_dat[i].email, sizeof(email));
- connect_until_time = (uint32)auth_dat[i].connect_until_time;
+ expiration_time = (uint32)auth_dat[i].expiration_time;
}
WFIFOHEAD(fd,50);
WFIFOW(fd,0) = 0x2717;
WFIFOL(fd,2) = account_id;
safestrncpy((char*)WFIFOP(fd,6), email, 40);
- WFIFOL(fd,46) = connect_until_time;
+ WFIFOL(fd,46) = expiration_time;
WFIFOSET(fd,50);
}
break;
@@ -1368,10 +1368,10 @@ int parse_fromchar(int fd)
{
time_t timestamp;
struct tm *tmtime;
- if (auth_dat[i].ban_until_time == 0 || auth_dat[i].ban_until_time < time(NULL))
+ if (auth_dat[i].unban_time == 0 || auth_dat[i].unban_time < time(NULL))
timestamp = time(NULL);
else
- timestamp = auth_dat[i].ban_until_time;
+ timestamp = auth_dat[i].unban_time;
tmtime = localtime(&timestamp);
tmtime->tm_year = tmtime->tm_year + year;
tmtime->tm_mon = tmtime->tm_mon + month;
@@ -1401,7 +1401,7 @@ int parse_fromchar(int fd)
if( j < AUTH_FIFO_SIZE )
auth_fifo[j].login_id1++; // to avoid reconnection error when come back from map-server (char-server will ask again the authentication)
*/
- auth_dat[i].ban_until_time = timestamp;
+ auth_dat[i].unban_time = timestamp;
// Save
mmo_auth_sync();
}
@@ -1494,11 +1494,11 @@ int parse_fromchar(int fd)
if( i == auth_num )
ShowNotice("Char-server '%s': Error of UnBan request (account: %d not found, ip: %s).\n", server[id].name, account_id, ip);
else
- if( auth_dat[i].ban_until_time == 0 )
+ if( auth_dat[i].unban_time == 0 )
ShowNotice("Char-server '%s': Error of UnBan request (account: %d, no change for unban date, ip: %s).\n", server[id].name, account_id, ip);
else
{
- auth_dat[i].ban_until_time = 0;
+ auth_dat[i].unban_time = 0;
ShowNotice("Char-server '%s': UnBan request (account: %d, ip: %s).\n", server[id].name, account_id, ip);
}
}
@@ -1753,8 +1753,8 @@ void login_auth_failed(struct login_session_data* sd, int result)
{// 6 = Your are Prohibited to log in until %s
char tmpstr[20];
int i = search_account_index(sd->userid);
- time_t ban_until_time = ( i >= 0 ) ? auth_dat[i].ban_until_time : 0;
- strftime(tmpstr, 20, login_config.date_format, localtime(&ban_until_time));
+ time_t unban_time = ( i >= 0 ) ? auth_dat[i].unban_time : 0;
+ strftime(tmpstr, 20, login_config.date_format, localtime(&unban_time));
safestrncpy((char*)WFIFOP(fd,3), tmpstr, 20); // ban timestamp goes here
}
WFIFOSET(fd,23);
diff --git a/src/login/login.h b/src/login/login.h
index 8470578aa..1147d6bb6 100644
--- a/src/login/login.h
+++ b/src/login/login.h
@@ -82,8 +82,8 @@ struct mmo_account {
uint32 state; // packet 0x006a value + 1 (0: compte OK)
char email[40]; // e-mail (by default: a@a.com)
char error_message[20]; // Message of error code #6 = Your are Prohibited to log in until %s (packet 0x006a)
- time_t ban_until_time; // # of seconds 1/1/1970 (timestamp): ban time limit of the account (0 = no ban)
- time_t connect_until_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
+ time_t unban_time; // # of seconds 1/1/1970 (timestamp): ban time limit of the account (0 = no ban)
+ time_t expiration_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
char last_ip[16]; // save of last IP of connection
char memo[255]; // a memo field
int account_reg2_num;
diff --git a/src/login_sql/login.c b/src/login_sql/login.c
index 5ec3c308d..81733f213 100644
--- a/src/login_sql/login.c
+++ b/src/login_sql/login.c
@@ -390,7 +390,7 @@ int mmo_auth_new(struct mmo_account* account)
unsigned int tick = gettick();
char md5buf[32+1];
- time_t connect_until = 0;
+ time_t expiration_time = 0;
SqlStmt* stmt;
int result = 0;
@@ -417,12 +417,12 @@ int mmo_auth_new(struct mmo_account* account)
return result;// error or incorrect user
if( login_config.start_limited_time != -1 )
- connect_until = time(NULL) + login_config.start_limited_time;
+ expiration_time = time(NULL) + login_config.start_limited_time;
// insert new entry into db
//TODO: error checking
stmt = SqlStmt_Malloc(sql_handle);
- SqlStmt_Prepare(stmt, "INSERT INTO `%s` (`%s`, `%s`, `sex`, `email`, `connect_until`) VALUES (?, ?, '%c', 'a@a.com', '%d')", login_db, login_db_userid, login_db_user_pass, account->sex, connect_until);
+ SqlStmt_Prepare(stmt, "INSERT INTO `%s` (`%s`, `%s`, `sex`, `email`, `expiration_time`) VALUES (?, ?, '%c', 'a@a.com', '%d')", login_db, login_db_userid, login_db_user_pass, account->sex, expiration_time);
SqlStmt_BindParam(stmt, 0, SQLDT_STRING, account->userid, strnlen(account->userid, NAME_LENGTH));
if( login_config.use_md5_passwds )
{
@@ -452,10 +452,10 @@ int mmo_auth_new(struct mmo_account* account)
//-----------------------------------------------------
int mmo_auth(struct login_session_data* sd)
{
- time_t ban_until_time;
+ time_t unban_time;
char esc_userid[NAME_LENGTH*2+1];// escaped username
char user_password[256], password[256];
- long connect_until;
+ long expiration_time;
int state;
size_t len;
char* data;
@@ -524,7 +524,7 @@ int mmo_auth(struct login_session_data* sd)
// retrieve login entry for the specified username
if( SQL_ERROR == Sql_Query(sql_handle,
- "SELECT `%s`,`%s`,`lastlogin`,`sex`,`connect_until`,`ban_until`,`state`,`%s` FROM `%s` WHERE `%s`= %s '%s'",
+ "SELECT `%s`,`%s`,`lastlogin`,`sex`,`expiration_time`,`unban_time`,`state`,`%s` FROM `%s` WHERE `%s`= %s '%s'",
login_db_account_id, login_db_user_pass, login_db_level,
login_db, login_db_userid, (login_config.case_sensitive ? "BINARY" : ""), esc_userid) )
Sql_ShowDebug(sql_handle);
@@ -542,8 +542,8 @@ int mmo_auth(struct login_session_data* sd)
Sql_GetData(sql_handle, 1, &data, &len); safestrncpy(password, data, sizeof(password));
Sql_GetData(sql_handle, 2, &data, NULL); safestrncpy(sd->lastlogin, data, sizeof(sd->lastlogin));
Sql_GetData(sql_handle, 3, &data, NULL); sd->sex = *data;
- Sql_GetData(sql_handle, 4, &data, NULL); connect_until = atol(data);
- Sql_GetData(sql_handle, 5, &data, NULL); ban_until_time = atol(data);
+ Sql_GetData(sql_handle, 4, &data, NULL); expiration_time = atol(data);
+ Sql_GetData(sql_handle, 5, &data, NULL); unban_time = atol(data);
Sql_GetData(sql_handle, 6, &data, NULL); state = atoi(data);
Sql_GetData(sql_handle, 7, &data, NULL); sd->level = atoi(data);
if( len > sizeof(password) - 1 )
@@ -565,10 +565,10 @@ int mmo_auth(struct login_session_data* sd)
return 1; // 1 = Incorrect Password
}
- if( connect_until != 0 && connect_until < time(NULL) )
+ if( expiration_time != 0 && expiration_time < time(NULL) )
return 2; // 2 = This ID is expired
- if( ban_until_time != 0 && ban_until_time > time(NULL) )
+ if( unban_time != 0 && unban_time > time(NULL) )
return 6; // 6 = Your are Prohibited to log in until %s
if( state )
@@ -583,7 +583,7 @@ int mmo_auth(struct login_session_data* sd)
if( sd->sex != 'S' && sd->account_id < START_ACCOUNT_NUM )
ShowWarning("Account %s has account id %d! Account IDs must be over %d to work properly!\n", sd->userid, sd->account_id, START_ACCOUNT_NUM);
- if( SQL_ERROR == Sql_Query(sql_handle, "UPDATE `%s` SET `lastlogin` = NOW(), `logincount`=`logincount`+1, `last_ip`='%s', `ban_until`='0', `state`='0' WHERE `%s` = '%d'",
+ if( SQL_ERROR == Sql_Query(sql_handle, "UPDATE `%s` SET `lastlogin` = NOW(), `logincount`=`logincount`+1, `last_ip`='%s', `unban_time`='0', `state`='0' WHERE `%s` = '%d'",
login_db, ip, login_db_account_id, sd->account_id) )
Sql_ShowDebug(sql_handle);
@@ -682,14 +682,14 @@ int parse_fromchar(int fd)
node->sex == sex &&
node->ip == ip_ )
{// found
- uint32 connect_until_time;
+ uint32 expiration_time;
char email[40];
// each auth entry can only be used once
idb_remove(auth_db, account_id);
// retrieve email and account expiration time
- if( SQL_ERROR == Sql_Query(sql_handle, "SELECT `email`,`connect_until` FROM `%s` WHERE `%s`='%d'", login_db, login_db_account_id, account_id) )
+ if( SQL_ERROR == Sql_Query(sql_handle, "SELECT `email`,`expiration_time` FROM `%s` WHERE `%s`='%d'", login_db, login_db_account_id, account_id) )
Sql_ShowDebug(sql_handle);
if( SQL_SUCCESS == Sql_NextRow(sql_handle) )
{
@@ -697,7 +697,7 @@ int parse_fromchar(int fd)
size_t len = 0;
Sql_GetData(sql_handle, 0, &data, &len); safestrncpy(email, data, sizeof(email));
- Sql_GetData(sql_handle, 1, &data, NULL); connect_until_time = (uint32)strtoul(data, NULL, 10);
+ Sql_GetData(sql_handle, 1, &data, NULL); expiration_time = (uint32)strtoul(data, NULL, 10);
if( len > sizeof(email) )
ShowDebug("parse_fromchar:0x2712: email is too long (len=%u,maxlen=%u)\n", len, sizeof(email));
@@ -706,7 +706,7 @@ int parse_fromchar(int fd)
else
{
memset(email, 0, sizeof(email));
- connect_until_time = 0;
+ expiration_time = 0;
}
// send ack
@@ -717,7 +717,7 @@ int parse_fromchar(int fd)
WFIFOL(fd,10) = login_id2;
WFIFOB(fd,14) = 0;
memcpy(WFIFOP(fd,15), email, 40);
- WFIFOL(fd,55) = connect_until_time;
+ WFIFOL(fd,55) = expiration_time;
WFIFOSET(fd,59);
}
else
@@ -759,13 +759,13 @@ int parse_fromchar(int fd)
if( RFIFOREST(fd) < 6 )
return 0;
{
- uint32 connect_until_time = 0;
+ uint32 expiration_time = 0;
char email[40] = "";
int account_id = RFIFOL(fd,2);
RFIFOSKIP(fd,6);
- if( SQL_ERROR == Sql_Query(sql_handle, "SELECT `email`,`connect_until` FROM `%s` WHERE `%s`='%d'", login_db, login_db_account_id, account_id) )
+ if( SQL_ERROR == Sql_Query(sql_handle, "SELECT `email`,`expiration_time` FROM `%s` WHERE `%s`='%d'", login_db, login_db_account_id, account_id) )
Sql_ShowDebug(sql_handle);
else if( SQL_SUCCESS == Sql_NextRow(sql_handle) )
{
@@ -776,7 +776,7 @@ int parse_fromchar(int fd)
safestrncpy(email, data, sizeof(email));
Sql_GetData(sql_handle, 1, &data, NULL);
- connect_until_time = (uint32)strtoul(data, NULL, 10);
+ expiration_time = (uint32)strtoul(data, NULL, 10);
Sql_FreeResult(sql_handle);
}
@@ -785,7 +785,7 @@ int parse_fromchar(int fd)
WFIFOW(fd,0) = 0x2717;
WFIFOL(fd,2) = account_id;
safestrncpy((char*)WFIFOP(fd,6), email, 40);
- WFIFOL(fd,46) = connect_until_time;
+ WFIFOL(fd,46) = expiration_time;
WFIFOSET(fd,50);
}
break;
@@ -893,7 +893,7 @@ int parse_fromchar(int fd)
int sec = (short)RFIFOW(fd,16);
RFIFOSKIP(fd,18);
- if( SQL_ERROR == Sql_Query(sql_handle, "SELECT `ban_until` FROM `%s` WHERE `%s` = '%d'", login_db, login_db_account_id, account_id) )
+ if( SQL_ERROR == Sql_Query(sql_handle, "SELECT `unban_time` FROM `%s` WHERE `%s` = '%d'", login_db, login_db_account_id, account_id) )
Sql_ShowDebug(sql_handle);
else if( SQL_SUCCESS == Sql_NextRow(sql_handle) )
{
@@ -928,7 +928,7 @@ int parse_fromchar(int fd)
charif_sendallwos(-1, buf, 11);
}
ShowNotice("Account: %d Banned until: %lu\n", account_id, (unsigned long)timestamp);
- if( SQL_ERROR == Sql_Query(sql_handle, "UPDATE `%s` SET `ban_until` = '%lu' WHERE `%s` = '%d'", login_db, (unsigned long)timestamp, login_db_account_id, account_id) )
+ if( SQL_ERROR == Sql_Query(sql_handle, "UPDATE `%s` SET `unban_time` = '%lu' WHERE `%s` = '%d'", login_db, (unsigned long)timestamp, login_db_account_id, account_id) )
Sql_ShowDebug(sql_handle);
}
}
@@ -1019,11 +1019,11 @@ int parse_fromchar(int fd)
int account_id = RFIFOL(fd,2);
RFIFOSKIP(fd,6);
- if( SQL_ERROR == Sql_Query(sql_handle, "SELECT `ban_until` FROM `%s` WHERE `%s` = '%d'", login_db, login_db_account_id, account_id) )
+ if( SQL_ERROR == Sql_Query(sql_handle, "SELECT `unban_time` FROM `%s` WHERE `%s` = '%d'", login_db, login_db_account_id, account_id) )
Sql_ShowDebug(sql_handle);
else if( Sql_NumRows(sql_handle) > 0 )
{// Found a match
- if( SQL_ERROR == Sql_Query(sql_handle, "UPDATE `%s` SET `ban_until` = '0' WHERE `%s` = '%d'", login_db, login_db_account_id, account_id) )
+ if( SQL_ERROR == Sql_Query(sql_handle, "UPDATE `%s` SET `unban_time` = '0' WHERE `%s` = '%d'", login_db, login_db_account_id, account_id) )
Sql_ShowDebug(sql_handle);
}
}
@@ -1375,18 +1375,18 @@ void login_auth_failed(struct login_session_data* sd, int result)
memset(WFIFOP(fd,3), '\0', 20);
else
{// 6 = Your are Prohibited to log in until %s
- if( SQL_ERROR == Sql_Query(sql_handle, "SELECT `ban_until` FROM `%s` WHERE `%s` = %s '%s'", login_db, login_db_userid, (login_config.case_sensitive ? "BINARY" : ""), esc_userid) )
+ if( SQL_ERROR == Sql_Query(sql_handle, "SELECT `unban_time` FROM `%s` WHERE `%s` = %s '%s'", login_db, login_db_userid, (login_config.case_sensitive ? "BINARY" : ""), esc_userid) )
Sql_ShowDebug(sql_handle);
else if( SQL_SUCCESS == Sql_NextRow(sql_handle) )
{
char* data;
- time_t ban_until_time;
+ time_t unban_time;
Sql_GetData(sql_handle, 0, &data, NULL);
- ban_until_time = (time_t)strtoul(data, NULL, 10);
+ unban_time = (time_t)strtoul(data, NULL, 10);
Sql_FreeResult(sql_handle);
- strftime((char*)WFIFOP(fd,3), 20, login_config.date_format, localtime(&ban_until_time));
+ strftime((char*)WFIFOP(fd,3), 20, login_config.date_format, localtime(&unban_time));
}
}
WFIFOSET(fd,23);
diff --git a/src/login_sql/login.h b/src/login_sql/login.h
index 4cee1c747..d343c0905 100644
--- a/src/login_sql/login.h
+++ b/src/login_sql/login.h
@@ -82,8 +82,8 @@ struct mmo_account {
uint32 state; // packet 0x006a value + 1 (0: compte OK)
char email[40]; // e-mail (by default: a@a.com)
char error_message[20]; // Message of error code #6 = Your are Prohibited to log in until %s (packet 0x006a)
- time_t ban_until_time; // # of seconds 1/1/1970 (timestamp): ban time limit of the account (0 = no ban)
- time_t connect_until_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
+ time_t unban_time; // # of seconds 1/1/1970 (timestamp): ban time limit of the account (0 = no ban)
+ time_t expiration_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
char last_ip[16]; // save of last IP of connection
char memo[255]; // a memo field
int account_reg2_num;
diff --git a/src/map/chrif.c b/src/map/chrif.c
index e56ae5a56..583c22ad6 100644
--- a/src/map/chrif.c
+++ b/src/map/chrif.c
@@ -523,7 +523,7 @@ void chrif_authreq(struct map_session_data *sd)
node->char_id == sd->status.char_id &&
node->login_id1 == sd->login_id1)
{ //auth ok
- if (!pc_authok(sd, node->login_id2, node->connect_until_time, node->char_dat))
+ if (!pc_authok(sd, node->login_id2, node->expiration_time, node->char_dat))
chrif_auth_delete(node->account_id, node->char_id, ST_LOGIN);
else {
//char_dat no longer needed, but player auth is not completed yet.
@@ -594,7 +594,7 @@ void chrif_authok(int fd)
node->account_id=account_id;
node->char_id=char_id;
node->login_id1=RFIFOL(fd, 8);
- node->connect_until_time=RFIFOL(fd, 12);
+ node->expiration_time=RFIFOL(fd, 12);
node->login_id2=RFIFOL(fd, 16);
memcpy(node->char_dat,status,sizeof(struct mmo_charstatus));
node->node_created=gettick();
diff --git a/src/map/chrif.h b/src/map/chrif.h
index 05c6a334a..57282dcdb 100644
--- a/src/map/chrif.h
+++ b/src/map/chrif.h
@@ -11,7 +11,7 @@ enum sd_state { ST_LOGIN, ST_LOGOUT, ST_MAPCHANGE };
struct auth_node {
int account_id, char_id;
int login_id1, login_id2, sex, fd;
- time_t connect_until_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
+ time_t expiration_time; // # of seconds 1/1/1970 (timestamp): Validity limit of the account (0 = unlimited)
struct map_session_data *sd; //Data from logged on char.
struct mmo_charstatus *char_dat; //Data from char server.
unsigned int node_created; //timestamp for node timeouts
diff --git a/src/map/pc.c b/src/map/pc.c
index e9dde09de..acc8af40c 100644
--- a/src/map/pc.c
+++ b/src/map/pc.c
@@ -724,7 +724,7 @@ int pc_isequip(struct map_session_data *sd,int n)
* session id‚É–â‘è–³‚µ
* charŽI‚©‚ç‘—‚ç‚ê‚Ä‚«‚½ƒXƒe?ƒ^ƒX‚ðÝ’è
*------------------------------------------*/
-bool pc_authok(struct map_session_data *sd, int login_id2, time_t connect_until_time, struct mmo_charstatus *st)
+bool pc_authok(struct map_session_data *sd, int login_id2, time_t expiration_time, struct mmo_charstatus *st)
{
int i;
unsigned long tick = gettick();
@@ -849,9 +849,9 @@ bool pc_authok(struct map_session_data *sd, int login_id2, time_t connect_until_
}
// message of the limited time of the account
- if (connect_until_time != 0) { // don't display if it's unlimited or unknow value
+ if (expiration_time != 0) { // don't display if it's unlimited or unknow value
char tmpstr[1024];
- strftime(tmpstr, sizeof(tmpstr) - 1, msg_txt(501), localtime(&connect_until_time)); // "Your account time limit is: %d-%m-%Y %H:%M:%S."
+ strftime(tmpstr, sizeof(tmpstr) - 1, msg_txt(501), localtime(&expiration_time)); // "Your account time limit is: %d-%m-%Y %H:%M:%S."
clif_wis_message(sd->fd, wisp_server_name, tmpstr, strlen(tmpstr)+1);
}
diff --git a/src/txt-converter/login-converter.c b/src/txt-converter/login-converter.c
index b216ff8d2..edd59d77b 100644
--- a/src/txt-converter/login-converter.c
+++ b/src/txt-converter/login-converter.c
@@ -92,7 +92,7 @@ int convert_login(void)
FILE *fp;
int account_id, logincount, user_level, state, n, i;
char line[2048], userid[2048], pass[2048], lastlogin[2048], sex, email[2048], error_message[2048], last_ip[2048], memo[2048];
- int ban_until_time, connect_until_time;
+ int unban_time, expiration_time;
char dummy[2048];
mysql_handle = Sql_Malloc();
@@ -117,7 +117,7 @@ int convert_login(void)
i = sscanf(line, "%d\t%[^\t]\t%[^\t]\t%[^\t]\t%c\t%d\t%d\t%[^\t]\t%[^\t]\t%d\t%[^\t]\t%[^\t]\t%d\t%[^\r\n]%n",
&account_id, userid, pass, lastlogin, &sex, &logincount, &state,
- email, error_message, &connect_until_time, last_ip, memo, &ban_until_time, dummy, &n);
+ email, error_message, &expiration_time, last_ip, memo, &unban_time, dummy, &n);
if (i < 13) {
ShowWarning("Skipping incompatible data on line %d\n", line_counter);
@@ -133,10 +133,10 @@ int convert_login(void)
stmt = SqlStmt_Malloc(mysql_handle);
if( SQL_ERROR == SqlStmt_Prepare(stmt,
"REPLACE INTO `login` "
- "(`account_id`, `userid`, `user_pass`, `lastlogin`, `sex`, `logincount`, `email`, `level`, `error_message`, `connect_until`, `last_ip`, `memo`, `ban_until`, `state`) "
+ "(`account_id`, `userid`, `user_pass`, `lastlogin`, `sex`, `logincount`, `email`, `level`, `error_message`, `expiration_time`, `last_ip`, `memo`, `unban_time`, `state`) "
"VALUES "
"(%d, ?, ?, '%s', '%c', %d, '%s', %d, '%s', %d, '%s', '%s', %d, %d)",
- account_id, lastlogin, sex, logincount, email, user_level, error_message, connect_until_time, last_ip, memo, ban_until_time, state)
+ account_id, lastlogin, sex, logincount, email, user_level, error_message, expiration_time, last_ip, memo, unban_time, state)
|| SQL_ERROR == SqlStmt_BindParam(stmt, 0, SQLDT_STRING, userid, strnlen(userid, 255))
|| SQL_ERROR == SqlStmt_BindParam(stmt, 1, SQLDT_STRING, pass, strnlen(pass, 32))
|| SQL_ERROR == SqlStmt_Execute(stmt) )