/** * This file is part of Hercules. * http://herc.ws - http://github.com/HerculesWS/Hercules * * Copyright (C) 2012-2018 Hercules Dev Team * Copyright (C) Athena Dev Teams * * Hercules is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see . */ #define HERCULES_CORE #include "login.h" #include "login/HPMlogin.h" #include "login/account.h" #include "login/ipban.h" #include "login/loginlog.h" #include "login/lclif.h" #include "login/packets_ac_struct.h" #include "common/HPM.h" #include "common/cbasetypes.h" #include "common/conf.h" #include "common/core.h" #include "common/db.h" #include "common/memmgr.h" #include "common/md5calc.h" #include "common/nullpo.h" #include "common/packetsstatic_len.h" #include "common/random.h" #include "common/showmsg.h" #include "common/socket.h" #include "common/strlib.h" #include "common/timer.h" #include "common/utils.h" #include #include #include // stat() /** @file * Implementation of the login interface. */ static struct login_interface login_s; struct login_interface *login; static struct s_login_dbs logindbs; static struct lchrif_interface lchrif_s; struct lchrif_interface *lchrif; static struct Login_Config login_config_; static struct Account_engine account_engine; // account database static AccountDB *accounts = NULL; //----------------------------------------------------- // Auth database //----------------------------------------------------- #define AUTH_TIMEOUT 30000 /** * @see DBCreateData */ static struct DBData login_create_online_user(union DBKey key, va_list args) { struct online_login_data* p; CREATE(p, struct online_login_data, 1); p->account_id = key.i; p->char_server = -1; p->waiting_disconnect = INVALID_TIMER; return DB->ptr2data(p); } static struct online_login_data* login_add_online_user(int char_server, int account_id) { struct online_login_data* p; p = idb_ensure(login->online_db, account_id, login->create_online_user); p->char_server = char_server; if( p->waiting_disconnect != INVALID_TIMER ) { timer->delete(p->waiting_disconnect, login->waiting_disconnect_timer); p->waiting_disconnect = INVALID_TIMER; } return p; } static void login_remove_online_user(int account_id) { struct online_login_data* p; p = (struct online_login_data*)idb_get(login->online_db, account_id); if( p == NULL ) return; if( p->waiting_disconnect != INVALID_TIMER ) timer->delete(p->waiting_disconnect, login->waiting_disconnect_timer); idb_remove(login->online_db, account_id); } static int login_waiting_disconnect_timer(int tid, int64 tick, int id, intptr_t data) { struct online_login_data* p = (struct online_login_data*)idb_get(login->online_db, id); if( p != NULL && p->waiting_disconnect == tid && p->account_id == id ) { p->waiting_disconnect = INVALID_TIMER; login->remove_online_user(id); idb_remove(login->auth_db, id); } return 0; } /** * @see DBApply */ static int login_online_db_setoffline(union DBKey key, struct DBData *data, va_list ap) { struct online_login_data* p = DB->data2ptr(data); int server_id = va_arg(ap, int); nullpo_ret(p); if( server_id == -1 ) { p->char_server = -1; if( p->waiting_disconnect != INVALID_TIMER ) { timer->delete(p->waiting_disconnect, login->waiting_disconnect_timer); p->waiting_disconnect = INVALID_TIMER; } } else if( p->char_server == server_id ) p->char_server = -2; //Char server disconnected. return 0; } /** * @see DBApply */ static int login_online_data_cleanup_sub(union DBKey key, struct DBData *data, va_list ap) { struct online_login_data *character= DB->data2ptr(data); nullpo_ret(character); if (character->char_server == -2) //Unknown server.. set them offline login->remove_online_user(character->account_id); return 0; } static int login_online_data_cleanup(int tid, int64 tick, int id, intptr_t data) { login->online_db->foreach(login->online_db, login->online_data_cleanup_sub); return 0; } //-------------------------------------------------------------------- // Packet send to all char-servers, except one (wos: without our self) //-------------------------------------------------------------------- static int charif_sendallwos(int sfd, uint8 *buf, size_t len) { int i, c; nullpo_ret(buf); for (i = 0, c = 0; i < ARRAYLENGTH(login->dbs->server); ++i) { int fd = login->dbs->server[i].fd; if (sockt->session_is_valid(fd) && fd != sfd) { WFIFOHEAD(fd,len); memcpy(WFIFOP(fd,0), buf, len); WFIFOSET(fd,len); ++c; } } return c; } /// Initializes a server structure. static void lchrif_server_init(int id) { Assert_retv(id >= 0 && id < MAX_SERVERS); memset(&login->dbs->server[id], 0, sizeof(login->dbs->server[id])); login->dbs->server[id].fd = -1; } /// Destroys a server structure. static void lchrif_server_destroy(int id) { Assert_retv(id >= 0 && id < MAX_SERVERS); if (login->dbs->server[id].fd != -1) { sockt->close(login->dbs->server[id].fd); login->dbs->server[id].fd = -1; } } /// Resets all the data related to a server. static void lchrif_server_reset(int id) { login->online_db->foreach(login->online_db, login->online_db_setoffline, id); //Set all chars from this char server to offline. lchrif->server_destroy(id); lchrif->server_init(id); } /// Called when the connection to Char Server is disconnected. static void lchrif_on_disconnect(int id) { Assert_retv(id >= 0 && id < MAX_SERVERS); ShowStatus("Char-server '%s' has disconnected.\n", login->dbs->server[id].name); lchrif->server_reset(id); } //----------------------------------------------------- // periodic ip address synchronization //----------------------------------------------------- static int login_sync_ip_addresses(int tid, int64 tick, int id, intptr_t data) { uint8 buf[2]; ShowInfo("IP Sync in progress...\n"); WBUFW(buf,0) = 0x2735; charif_sendallwos(-1, buf, 2); return 0; } //----------------------------------------------------- // encrypted/unencrypted password check (from eApp) //----------------------------------------------------- static bool login_check_encrypted(const char *str1, const char *str2, const char *passwd) { char tmpstr[64+1], md5str[32+1]; nullpo_ret(str1); nullpo_ret(str2); nullpo_ret(passwd); safesnprintf(tmpstr, sizeof(tmpstr), "%s%s", str1, str2); md5->string(tmpstr, md5str); return (0==strcmp(passwd, md5str)); } static bool login_check_password(const char *md5key, int passwdenc, const char *passwd, const char *refpass) { nullpo_ret(passwd); nullpo_ret(refpass); if(passwdenc == PWENC_NONE) { return (0==strcmp(passwd, refpass)); } else { // password mode set to PWENC_ENCRYPT -> md5(md5key, refpass) enable with // password mode set to PWENC_ENCRYPT2 -> md5(refpass, md5key) enable with return ((passwdenc&PWENC_ENCRYPT) && login->check_encrypted(md5key, refpass, passwd)) || ((passwdenc&PWENC_ENCRYPT2) && login->check_encrypted(refpass, md5key, passwd)); } } /** * Checks whether the given IP comes from LAN or WAN. * * @param ip IP address to check. * @retval 0 if it is a WAN IP. * @return the appropriate LAN server address to send, if it is a LAN IP. */ static uint32 login_lan_subnet_check(uint32 ip) { return sockt->lan_subnet_check(ip, NULL); } static void login_fromchar_auth_ack(int fd, int account_id, uint32 login_id1, uint32 login_id2, uint8 sex, int request_id, struct login_auth_node *node) { WFIFOHEAD(fd,33); WFIFOW(fd,0) = 0x2713; WFIFOL(fd,2) = account_id; WFIFOL(fd,6) = login_id1; WFIFOL(fd,10) = login_id2; WFIFOB(fd,14) = sex; if (node) { WFIFOB(fd,15) = 0;// ok WFIFOL(fd,16) = request_id; WFIFOL(fd,20) = node->version; WFIFOB(fd,24) = node->clienttype; WFIFOL(fd,25) = node->group_id; WFIFOL(fd,29) = (unsigned int)node->expiration_time; } else { WFIFOB(fd,15) = 1;// auth failed WFIFOL(fd,16) = request_id; WFIFOL(fd,20) = 0; WFIFOB(fd,24) = 0; WFIFOL(fd,25) = 0; WFIFOL(fd,29) = 0; } WFIFOSET(fd,33); } static void login_fromchar_parse_auth(int fd, int id, const char *const ip) { struct login_auth_node* node; int account_id = RFIFOL(fd,2); uint32 login_id1 = RFIFOL(fd,6); uint32 login_id2 = RFIFOL(fd,10); uint8 sex = RFIFOB(fd,14); //uint32 ip_ = ntohl(RFIFOL(fd,15)); int request_id = RFIFOL(fd,19); RFIFOSKIP(fd,23); node = (struct login_auth_node*)idb_get(login->auth_db, account_id); if( core->runflag == LOGINSERVER_ST_RUNNING && node != NULL && node->account_id == account_id && node->login_id1 == login_id1 && node->login_id2 == login_id2 && node->sex == sex_num2str(sex) /*&& node->ip == ip_*/ ) {// found //ShowStatus("Char-server '%s': authentication of the account %d accepted (ip: %s).\n", login->dbs->server[id].name, account_id, ip); // send ack login->fromchar_auth_ack(fd, account_id, login_id1, login_id2, sex, request_id, node); // each auth entry can only be used once idb_remove(login->auth_db, account_id); } else {// authentication not found nullpo_retv(ip); ShowStatus("Char-server '%s': authentication of the account %d REFUSED (ip: %s).\n", login->dbs->server[id].name, account_id, ip); login->fromchar_auth_ack(fd, account_id, login_id1, login_id2, sex, request_id, NULL); } } static void login_fromchar_parse_update_users(int fd, int id) { int users = RFIFOL(fd,2); RFIFOSKIP(fd,6); // how many users on world? (update) if (login->dbs->server[id].users != users) { ShowStatus("set users %s : %d\n", login->dbs->server[id].name, users); login->dbs->server[id].users = (uint16)users; } } static void login_fromchar_parse_request_change_email(int fd, int id, const char *const ip) { struct mmo_account acc; char email[40]; int account_id = RFIFOL(fd,2); safestrncpy(email, RFIFOP(fd,6), 40); remove_control_chars(email); RFIFOSKIP(fd,46); if( e_mail_check(email) == 0 ) ShowNotice("Char-server '%s': Attempt to create an e-mail on an account with a default e-mail REFUSED - e-mail is invalid (account: %d, ip: %s)\n", login->dbs->server[id].name, account_id, ip); else if( !accounts->load_num(accounts, &acc, account_id) || strcmp(acc.email, "a@a.com") == 0 || acc.email[0] == '\0' ) ShowNotice("Char-server '%s': Attempt to create an e-mail on an account with a default e-mail REFUSED - account doesn't exist or e-mail of account isn't default e-mail (account: %d, ip: %s).\n", login->dbs->server[id].name, account_id, ip); else { memcpy(acc.email, email, sizeof(acc.email)); ShowNotice("Char-server '%s': Create an e-mail on an account with a default e-mail (account: %d, new e-mail: %s, ip: %s).\n", login->dbs->server[id].name, account_id, email, ip); // Save accounts->save(accounts, &acc); } } static void login_fromchar_account(int fd, int account_id, struct mmo_account *acc) { WFIFOHEAD(fd,72); WFIFOW(fd,0) = 0x2717; WFIFOL(fd,2) = account_id; if (acc) { time_t expiration_time = 0; char email[40] = ""; int group_id = 0; uint8 char_slots = 0; char birthdate[10+1] = ""; char pincode[4+1] = "\0\0\0\0"; safestrncpy(email, acc->email, sizeof(email)); expiration_time = acc->expiration_time; group_id = acc->group_id; char_slots = acc->char_slots; safestrncpy(pincode, acc->pincode, sizeof(pincode)); safestrncpy(birthdate, acc->birthdate, sizeof(birthdate)); if (pincode[0] == '\0') memset(pincode,'\0',sizeof(pincode)); safestrncpy(WFIFOP(fd,6), email, 40); WFIFOL(fd,46) = (uint32)expiration_time; WFIFOB(fd,50) = (unsigned char)group_id; WFIFOB(fd,51) = char_slots; safestrncpy(WFIFOP(fd,52), birthdate, 10+1); safestrncpy(WFIFOP(fd,63), pincode, 4+1 ); WFIFOL(fd,68) = acc->pincode_change; } else { safestrncpy(WFIFOP(fd,6), "", 40); WFIFOL(fd,46) = 0; WFIFOB(fd,50) = 0; WFIFOB(fd,51) = 0; safestrncpy(WFIFOP(fd,52), "", 10+1); safestrncpy(WFIFOP(fd,63), "\0\0\0\0", 4+1 ); WFIFOL(fd,68) = 0; } WFIFOSET(fd,72); } static void login_fromchar_parse_account_data(int fd, int id, const char *const ip) { struct mmo_account acc; int account_id = RFIFOL(fd,2); RFIFOSKIP(fd,6); if( !accounts->load_num(accounts, &acc, account_id) ) { ShowNotice("Char-server '%s': account %d NOT found (ip: %s).\n", login->dbs->server[id].name, account_id, ip); login->fromchar_account(fd, account_id, NULL); } else { login->fromchar_account(fd, account_id, &acc); } } static void login_fromchar_pong(int fd) { WFIFOHEAD(fd,2); WFIFOW(fd,0) = 0x2718; WFIFOSET(fd,2); } static void login_fromchar_parse_ping(int fd) { RFIFOSKIP(fd,2); login->fromchar_pong(fd); } static void login_fromchar_parse_change_email(int fd, int id, const char *const ip) { struct mmo_account acc; char actual_email[40]; char new_email[40]; int account_id = RFIFOL(fd,2); safestrncpy(actual_email, RFIFOP(fd,6), 40); safestrncpy(new_email, RFIFOP(fd,46), 40); RFIFOSKIP(fd, 86); if( e_mail_check(actual_email) == 0 ) ShowNotice("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command), but actual email is invalid (account: %d, ip: %s)\n", login->dbs->server[id].name, account_id, ip); else if( e_mail_check(new_email) == 0 ) ShowNotice("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command) with a invalid new e-mail (account: %d, ip: %s)\n", login->dbs->server[id].name, account_id, ip); else if( strcmpi(new_email, "a@a.com") == 0 ) ShowNotice("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command) with a default e-mail (account: %d, ip: %s)\n", login->dbs->server[id].name, account_id, ip); else if( !accounts->load_num(accounts, &acc, account_id) ) ShowNotice("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command), but account doesn't exist (account: %d, ip: %s).\n", login->dbs->server[id].name, account_id, ip); else if( strcmpi(acc.email, actual_email) != 0 ) ShowNotice("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command), but actual e-mail is incorrect (account: %d (%s), actual e-mail: %s, proposed e-mail: %s, ip: %s).\n", login->dbs->server[id].name, account_id, acc.userid, acc.email, actual_email, ip); else { safestrncpy(acc.email, new_email, sizeof(acc.email)); ShowNotice("Char-server '%s': Modify an e-mail on an account (@email GM command) (account: %d (%s), new e-mail: %s, ip: %s).\n", login->dbs->server[id].name, account_id, acc.userid, new_email, ip); // Save accounts->save(accounts, &acc); } } static void login_fromchar_account_update_other(int account_id, unsigned int state) { uint8 buf[11]; WBUFW(buf,0) = 0x2731; WBUFL(buf,2) = account_id; WBUFB(buf,6) = 0; // 0: change of state, 1: ban WBUFL(buf,7) = state; // status or final date of a banishment charif_sendallwos(-1, buf, 11); } static void login_fromchar_parse_account_update(int fd, int id, const char *const ip) { struct mmo_account acc; int account_id = RFIFOL(fd,2); unsigned int state = RFIFOL(fd,6); RFIFOSKIP(fd,10); if( !accounts->load_num(accounts, &acc, account_id) ) ShowNotice("Char-server '%s': Error of Status change (account: %d not found, suggested status %u, ip: %s).\n", login->dbs->server[id].name, account_id, state, ip); else if( acc.state == state ) ShowNotice("Char-server '%s': Error of Status change - actual status is already the good status (account: %d, status %u, ip: %s).\n", login->dbs->server[id].name, account_id, state, ip); else { ShowNotice("Char-server '%s': Status change (account: %d, new status %u, ip: %s).\n", login->dbs->server[id].name, account_id, state, ip); acc.state = state; // Save accounts->save(accounts, &acc); // notify other servers if (state != 0) { login->fromchar_account_update_other(account_id, state); } } } static void login_fromchar_ban(int account_id, time_t timestamp) { uint8 buf[11]; WBUFW(buf,0) = 0x2731; WBUFL(buf,2) = account_id; WBUFB(buf,6) = 1; // 0: change of status, 1: ban WBUFL(buf,7) = (uint32)timestamp; // status or final date of a banishment charif_sendallwos(-1, buf, 11); } static void login_fromchar_parse_ban(int fd, int id, const char *const ip) { struct mmo_account acc; int account_id = RFIFOL(fd,2); int year = RFIFOW(fd,6); int month = RFIFOW(fd,8); int mday = RFIFOW(fd,10); int hour = RFIFOW(fd,12); int min = RFIFOW(fd,14); int sec = RFIFOW(fd,16); RFIFOSKIP(fd,18); if (!accounts->load_num(accounts, &acc, account_id)) { ShowNotice("Char-server '%s': Error of ban request (account: %d not found, ip: %s).\n", login->dbs->server[id].name, account_id, ip); } else { time_t timestamp; struct tm *tmtime; if (acc.unban_time == 0 || acc.unban_time < time(NULL)) timestamp = time(NULL); // new ban else timestamp = acc.unban_time; // add to existing ban tmtime = localtime(×tamp); tmtime->tm_year += year; tmtime->tm_mon += month; tmtime->tm_mday += mday; tmtime->tm_hour += hour; tmtime->tm_min += min; tmtime->tm_sec += sec; timestamp = mktime(tmtime); if (timestamp == -1) { ShowNotice("Char-server '%s': Error of ban request (account: %d, invalid date, ip: %s).\n", login->dbs->server[id].name, account_id, ip); } else if( timestamp <= time(NULL) || timestamp == 0 ) { ShowNotice("Char-server '%s': Error of ban request (account: %d, new date unbans the account, ip: %s).\n", login->dbs->server[id].name, account_id, ip); } else { char tmpstr[24]; timestamp2string(tmpstr, sizeof(tmpstr), timestamp, login->config->date_format); ShowNotice("Char-server '%s': Ban request (account: %d, new final date of banishment: %ld (%s), ip: %s).\n", login->dbs->server[id].name, account_id, (long)timestamp, tmpstr, ip); acc.unban_time = timestamp; // Save accounts->save(accounts, &acc); login->fromchar_ban(account_id, timestamp); } } } static void login_fromchar_change_sex_other(int account_id, char sex) { unsigned char buf[7]; WBUFW(buf,0) = 0x2723; WBUFL(buf,2) = account_id; WBUFB(buf,6) = sex_str2num(sex); charif_sendallwos(-1, buf, 7); } static void login_fromchar_parse_change_sex(int fd, int id, const char *const ip) { struct mmo_account acc; int account_id = RFIFOL(fd,2); RFIFOSKIP(fd,6); if( !accounts->load_num(accounts, &acc, account_id) ) ShowNotice("Char-server '%s': Error of sex change (account: %d not found, ip: %s).\n", login->dbs->server[id].name, account_id, ip); else if( acc.sex == 'S' ) ShowNotice("Char-server '%s': Error of sex change - account to change is a Server account (account: %d, ip: %s).\n", login->dbs->server[id].name, account_id, ip); else { char sex = ( acc.sex == 'M' ) ? 'F' : 'M'; //Change gender ShowNotice("Char-server '%s': Sex change (account: %d, new sex %c, ip: %s).\n", login->dbs->server[id].name, account_id, sex, ip); acc.sex = sex; // Save accounts->save(accounts, &acc); // announce to other servers login->fromchar_change_sex_other(account_id, sex); } } static void login_fromchar_parse_account_reg2(int fd, int id, const char *const ip) { struct mmo_account acc; int account_id = RFIFOL(fd,4); if( !accounts->load_num(accounts, &acc, account_id) ) ShowStatus("Char-server '%s': receiving (from the char-server) of account_reg2 (account: %d not found, ip: %s).\n", login->dbs->server[id].name, account_id, ip); else { account->mmo_save_accreg2(accounts,fd,account_id,RFIFOL(fd, 8)); } RFIFOSKIP(fd,RFIFOW(fd,2)); } static void login_fromchar_parse_unban(int fd, int id, const char *const ip) { struct mmo_account acc; int account_id = RFIFOL(fd,2); RFIFOSKIP(fd,6); if( !accounts->load_num(accounts, &acc, account_id) ) ShowNotice("Char-server '%s': Error of Unban request (account: %d not found, ip: %s).\n", login->dbs->server[id].name, account_id, ip); else if( acc.unban_time == 0 ) ShowNotice("Char-server '%s': Error of Unban request (account: %d, no change for unban date, ip: %s).\n", login->dbs->server[id].name, account_id, ip); else { ShowNotice("Char-server '%s': Unban request (account: %d, ip: %s).\n", login->dbs->server[id].name, account_id, ip); acc.unban_time = 0; accounts->save(accounts, &acc); } } static void login_fromchar_parse_account_online(int fd, int id) { login->add_online_user(id, RFIFOL(fd,2)); RFIFOSKIP(fd,6); } static void login_fromchar_parse_account_offline(int fd) { login->remove_online_user(RFIFOL(fd,2)); RFIFOSKIP(fd,6); } static void login_fromchar_parse_online_accounts(int fd, int id) { uint32 i, users; login->online_db->foreach(login->online_db, login->online_db_setoffline, id); //Set all chars from this char-server offline first users = RFIFOW(fd,4); for (i = 0; i < users; i++) { int aid = RFIFOL(fd,6+i*4); struct online_login_data *p = idb_ensure(login->online_db, aid, login->create_online_user); p->char_server = id; if (p->waiting_disconnect != INVALID_TIMER) { timer->delete(p->waiting_disconnect, login->waiting_disconnect_timer); p->waiting_disconnect = INVALID_TIMER; } } } static void login_fromchar_parse_request_account_reg2(int fd) { int account_id = RFIFOL(fd,2); int char_id = RFIFOL(fd,6); RFIFOSKIP(fd,10); account->mmo_send_accreg2(accounts,fd,account_id,char_id); } static void login_fromchar_parse_update_wan_ip(int fd, int id) { login->dbs->server[id].ip = ntohl(RFIFOL(fd,2)); ShowInfo("Updated IP of Server #%d to %u.%u.%u.%u.\n",id, CONVIP(login->dbs->server[id].ip)); RFIFOSKIP(fd,6); } static void login_fromchar_parse_all_offline(int fd, int id) { ShowInfo("Setting accounts from char-server %d offline.\n", id); login->online_db->foreach(login->online_db, login->online_db_setoffline, id); RFIFOSKIP(fd,2); } static void login_fromchar_parse_change_pincode(int fd) { struct mmo_account acc; if (accounts->load_num(accounts, &acc, RFIFOL(fd,2))) { safestrncpy(acc.pincode, RFIFOP(fd,6), sizeof(acc.pincode)); acc.pincode_change = ((unsigned int)time(NULL)); accounts->save(accounts, &acc); } RFIFOSKIP(fd,11); } static bool login_fromchar_parse_wrong_pincode(int fd) { struct mmo_account acc; if( accounts->load_num(accounts, &acc, RFIFOL(fd,2) ) ) { struct online_login_data* ld = (struct online_login_data*)idb_get(login->online_db,acc.account_id); if (ld == NULL) { RFIFOSKIP(fd,6); return true; } loginlog->log(sockt->host2ip(acc.last_ip), acc.userid, 100, "PIN Code check failed"); // FIXME: Do we really want to log this with the same code as successful logins? } login->remove_online_user(acc.account_id); RFIFOSKIP(fd,6); return false; } static void login_fromchar_accinfo(int fd, int account_id, int u_fd, int u_aid, int u_group, int map_fd, struct mmo_account *acc) { if (acc) { WFIFOHEAD(fd,183); WFIFOW(fd,0) = 0x2737; safestrncpy(WFIFOP(fd,2), acc->userid, NAME_LENGTH); if (u_group >= acc->group_id) safestrncpy(WFIFOP(fd,26), acc->pass, 33); else memset(WFIFOP(fd,26), '\0', 33); safestrncpy(WFIFOP(fd,59), acc->email, 40); safestrncpy(WFIFOP(fd,99), acc->last_ip, 16); WFIFOL(fd,115) = acc->group_id; safestrncpy(WFIFOP(fd,119), acc->lastlogin, 24); WFIFOL(fd,143) = acc->logincount; WFIFOL(fd,147) = acc->state; if (u_group >= acc->group_id) safestrncpy(WFIFOP(fd,151), acc->pincode, 5); else memset(WFIFOP(fd,151), '\0', 5); safestrncpy(WFIFOP(fd,156), acc->birthdate, 11); WFIFOL(fd,167) = map_fd; WFIFOL(fd,171) = u_fd; WFIFOL(fd,175) = u_aid; WFIFOL(fd,179) = account_id; WFIFOSET(fd,183); } else { WFIFOHEAD(fd,18); WFIFOW(fd,0) = 0x2736; WFIFOL(fd,2) = map_fd; WFIFOL(fd,6) = u_fd; WFIFOL(fd,10) = u_aid; WFIFOL(fd,14) = account_id; WFIFOSET(fd,18); } } static void login_fromchar_parse_accinfo(int fd) { struct mmo_account acc; int account_id = RFIFOL(fd, 2), u_fd = RFIFOL(fd, 6), u_aid = RFIFOL(fd, 10), u_group = RFIFOL(fd, 14), map_fd = RFIFOL(fd, 18); if (accounts->load_num(accounts, &acc, account_id)) { login->fromchar_accinfo(fd, account_id, u_fd, u_aid, u_group, map_fd, &acc); } else { login->fromchar_accinfo(fd, account_id, u_fd, u_aid, u_group, map_fd, NULL); } RFIFOSKIP(fd,22); } //-------------------------------- // Packet parsing for char-servers //-------------------------------- static int login_parse_fromchar(int fd) { int id; uint32 ipl; char ip[16]; ARR_FIND(0, ARRAYLENGTH(login->dbs->server), id, login->dbs->server[id].fd == fd); if (id == ARRAYLENGTH(login->dbs->server)) {// not a char server ShowDebug("login_parse_fromchar: Disconnecting invalid session #%d (is not a char-server)\n", fd); sockt->eof(fd); sockt->close(fd); return 0; } if( sockt->session[fd]->flag.eof ) { sockt->close(fd); login->dbs->server[id].fd = -1; lchrif->on_disconnect(id); return 0; } ipl = login->dbs->server[id].ip; sockt->ip2str(ipl, ip); while (RFIFOREST(fd) >= 2) { uint16 command = RFIFOW(fd,0); if (VECTOR_LENGTH(HPM->packets[hpParse_FromChar]) > 0) { int result = HPM->parse_packets(fd,command,hpParse_FromChar); if (result == 1) { if (sockt->session[fd] == NULL) return 0; continue; } if (result == 2) return 0; } switch (command) { case 0x2712: // request from char-server to authenticate an account if( RFIFOREST(fd) < 23 ) return 0; { login->fromchar_parse_auth(fd, id, ip); } break; case 0x2714: if( RFIFOREST(fd) < 6 ) return 0; { login->fromchar_parse_update_users(fd, id); } break; case 0x2715: // request from char server to change e-email from default "a@a.com" if (RFIFOREST(fd) < 46) return 0; { login->fromchar_parse_request_change_email(fd, id, ip); } break; case 0x2716: // request account data if( RFIFOREST(fd) < 6 ) return 0; { login->fromchar_parse_account_data(fd, id, ip); } break; case 0x2719: // ping request from charserver login->fromchar_parse_ping(fd); break; // Map server send information to change an email of an account via char-server case 0x2722: // 0x2722 .L .40B .40B if (RFIFOREST(fd) < 86) return 0; { login->fromchar_parse_change_email(fd, id, ip); } break; case 0x2724: // Receiving an account state update request from a map-server (relayed via char-server) if (RFIFOREST(fd) < 10) return 0; { login->fromchar_parse_account_update(fd, id, ip); } break; case 0x2725: // Receiving of map-server via char-server a ban request if (RFIFOREST(fd) < 18) return 0; { login->fromchar_parse_ban(fd, id, ip); } break; case 0x2727: // Change of sex (sex is reversed) if( RFIFOREST(fd) < 6 ) return 0; { login->fromchar_parse_change_sex(fd, id, ip); } break; case 0x2728: // We receive account_reg2 from a char-server, and we send them to other map-servers. if( RFIFOREST(fd) < 4 || RFIFOREST(fd) < RFIFOW(fd,2) ) return 0; { login->fromchar_parse_account_reg2(fd, id, ip); } break; case 0x272a: // Receiving of map-server via char-server an unban request if( RFIFOREST(fd) < 6 ) return 0; { login->fromchar_parse_unban(fd, id, ip); } break; case 0x272b: // Set account_id to online [Wizputer] if( RFIFOREST(fd) < 6 ) return 0; login->fromchar_parse_account_online(fd, id); break; case 0x272c: // Set account_id to offline [Wizputer] if( RFIFOREST(fd) < 6 ) return 0; login->fromchar_parse_account_offline(fd); break; case 0x272d: // Receive list of all online accounts. [Skotlex] if (RFIFOREST(fd) < 4 || RFIFOREST(fd) < RFIFOW(fd,2)) return 0; { login->fromchar_parse_online_accounts(fd, id); } RFIFOSKIP(fd,RFIFOW(fd,2)); break; case 0x272e: //Request account_reg2 for a character. if (RFIFOREST(fd) < 10) return 0; { login->fromchar_parse_request_account_reg2(fd); } break; case 0x2736: // WAN IP update from char-server if( RFIFOREST(fd) < 6 ) return 0; login->fromchar_parse_update_wan_ip(fd, id); break; case 0x2737: //Request to set all offline. login->fromchar_parse_all_offline(fd, id); break; case 0x2738: //Change PIN Code for a account if( RFIFOREST(fd) < 11 ) return 0; else { login->fromchar_parse_change_pincode(fd); } break; case 0x2739: // PIN Code was entered wrong too often if( RFIFOREST(fd) < 6 ) return 0; else { if (login->fromchar_parse_wrong_pincode(fd)) return 0; } break; case 0x2740: // Accinfo request forwarded by charserver on mapserver's account if( RFIFOREST(fd) < 22 ) return 0; else { login->fromchar_parse_accinfo(fd); } break; default: ShowError("login_parse_fromchar: Unknown packet 0x%x from a char-server! Disconnecting!\n", command); sockt->eof(fd); return 0; } // switch } // while return 0; } //------------------------------------- // Make new account //------------------------------------- static int login_mmo_auth_new(const char *userid, const char *pass, const char sex, const char *last_ip) { static int num_regs = 0; // registration counter static int64 new_reg_tick = 0; int64 tick = timer->gettick(); struct mmo_account acc; nullpo_retr(3, userid); nullpo_retr(3, pass); nullpo_retr(3, last_ip); //Account Registration Flood Protection by [Kevin] if( new_reg_tick == 0 ) new_reg_tick = timer->gettick(); if (DIFF_TICK(tick, new_reg_tick) < 0 && num_regs >= login->config->allowed_regs) { ShowNotice("Account registration denied (registration limit exceeded)\n"); return 3; } if (login->config->new_acc_length_limit && (strlen(userid) < 4 || strlen(pass) < 4)) return 1; // check for invalid inputs if( sex != 'M' && sex != 'F' ) return 0; // 0 = Unregistered ID if ( strncmp(userid, "~", strlen("~")) == 0 ) return 0; // 0 = Unregistered ID // check if the account doesn't exist already if( accounts->load_str(accounts, &acc, userid) ) { ShowNotice("Attempt of creation of an already existing account (account: %s_%c)\n", userid, sex); return 1; // 1 = Incorrect Password } memset(&acc, '\0', sizeof(acc)); acc.account_id = -1; // assigned by account db safestrncpy(acc.userid, userid, sizeof(acc.userid)); char *spass; spass = (char *)aMalloc((64+1)*sizeof(char)); md5->sha256(pass, spass); safestrncpy(acc.pass, spass, sizeof(acc.pass)); acc.sex = sex; safestrncpy(acc.email, "a@a.com", sizeof(acc.email)); acc.expiration_time = (login->config->start_limited_time != -1) ? time(NULL) + login->config->start_limited_time : 0; safestrncpy(acc.lastlogin, "(never)", sizeof(acc.lastlogin)); safestrncpy(acc.last_ip, last_ip, sizeof(acc.last_ip)); safestrncpy(acc.birthdate, "0000-00-00", sizeof(acc.birthdate)); safestrncpy(acc.pincode, "\0", sizeof(acc.pincode)); acc.pincode_change = 0; acc.char_slots = 0; if( !accounts->create(accounts, &acc) ) return 0; ShowNotice("Account creation (account %s, id: %d, sex: %c)\n", acc.userid, acc.account_id, acc.sex); if( DIFF_TICK(tick, new_reg_tick) > 0 ) {// Update the registration check. num_regs = 0; new_reg_tick = tick + login->config->time_allowed*1000; } ++num_regs; return -1; } //----------------------------------------------------- // Check/authentication of a connection //----------------------------------------------------- // TODO: Map result values to an enum (or at least document them) static int login_mmo_auth(struct login_session_data *sd, bool isServer) { struct mmo_account acc; size_t len; char ip[16]; nullpo_ret(sd); sockt->ip2str(sockt->session[sd->fd]->client_addr, ip); // DNS Blacklist check if (login->config->use_dnsbl) { char r_ip[16]; char ip_dnsbl[256]; uint8* sin_addr = (uint8*)&sockt->session[sd->fd]->client_addr; int i; sprintf(r_ip, "%u.%u.%u.%u", sin_addr[0], sin_addr[1], sin_addr[2], sin_addr[3]); for (i = 0; i < VECTOR_LENGTH(login->config->dnsbl_servers); i++) { char *dnsbl_server = VECTOR_INDEX(login->config->dnsbl_servers, i); sprintf(ip_dnsbl, "%s.%s", r_ip, trim(dnsbl_server)); if (sockt->host2ip(ip_dnsbl)) { ShowInfo("DNSBL: (%s) Blacklisted. User Kicked.\n", r_ip); return 3; } } } //Client Version check if (login->config->check_client_version && sd->version != login->config->client_version_to_connect) return 5; len = strnlen(sd->userid, NAME_LENGTH); // Account creation with _M/_F if (login->config->new_account_flag) { if (len > 2 && sd->passwd[0] != '\0' && // valid user and password lengths sd->passwdenc == PWENC_NONE && // unencoded password sd->userid[len-2] == '_' && memchr("FfMm", sd->userid[len-1], 4)) // _M/_F suffix { int result; // remove the _M/_F suffix len -= 2; sd->userid[len] = '\0'; result = login->mmo_auth_new(sd->userid, sd->passwd, TOUPPER(sd->userid[len+1]), ip); if( result != -1 ) return result;// Failed to make account. [Skotlex]. } } if( len <= 0 ) { /** a empty password is fine, a userid is not. **/ ShowNotice("Empty userid (ip: %s)\n", ip); return 0; // 0 = Unregistered ID } if( !accounts->load_str(accounts, &acc, sd->userid) ) { ShowNotice("Unknown account (account: %s, ip: %s)\n", sd->userid, ip); return 0; // 0 = Unregistered ID } if( !login->check_password(sd->md5key, sd->passwdenc, sd->passwd, acc.pass) ) { ShowNotice("Invalid password (account: '%s', ip: %s)\n", sd->userid, ip); return 1; // 1 = Incorrect Password } if( acc.unban_time != 0 && acc.unban_time > time(NULL) ) { char tmpstr[24]; timestamp2string(tmpstr, sizeof(tmpstr), acc.unban_time, login->config->date_format); ShowNotice("Connection refused (account: %s, banned until %s, ip: %s)\n", sd->userid, tmpstr, ip); return 6; // 6 = Your are Prohibited to log in until %s } if( acc.state != 0 ) { ShowNotice("Connection refused (account: %s, state: %u, ip: %s)\n", sd->userid, acc.state, ip); return acc.state - 1; } if (login->config->client_hash_check && !isServer) { struct client_hash_node *node = NULL; bool match = false; for (node = login->config->client_hash_nodes; node; node = node->next) { if( acc.group_id < node->group_id ) continue; if( *node->hash == '\0' // Allowed to login without hash || (sd->has_client_hash && memcmp(node->hash, sd->client_hash, 16) == 0 ) // Correct hash ) { match = true; break; } } if( !match ) { char smd5[33]; int i; if( !sd->has_client_hash ) { ShowNotice("Client didn't send client hash (account: %s, ip: %s)\n", sd->userid, ip); return 5; } for( i = 0; i < 16; i++ ) sprintf(&smd5[i * 2], "%02x", sd->client_hash[i]); smd5[32] = '\0'; ShowNotice("Invalid client hash (account: %s, sent md5: %s, ip: %s)\n", sd->userid, smd5, ip); return 5; } } ShowNotice("Authentication accepted (account: %s, id: %d, ip: %s)\n", sd->userid, acc.account_id, ip); // update session data sd->account_id = acc.account_id; sd->login_id1 = rnd() + 1; sd->login_id2 = rnd() + 1; safestrncpy(sd->lastlogin, acc.lastlogin, sizeof(sd->lastlogin)); sd->sex = acc.sex; sd->group_id = (uint8)acc.group_id; sd->expiration_time = acc.expiration_time; // update account data timestamp2string(acc.lastlogin, sizeof(acc.lastlogin), time(NULL), "%Y-%m-%d %H:%M:%S"); safestrncpy(acc.last_ip, ip, sizeof(acc.last_ip)); acc.unban_time = 0; acc.logincount++; accounts->save(accounts, &acc); if( sd->sex != 'S' && sd->account_id < START_ACCOUNT_NUM ) ShowWarning("Account %s has account id %d! Account IDs must be over %d to work properly!\n", sd->userid, sd->account_id, START_ACCOUNT_NUM); return -1; // account OK } static void login_kick(struct login_session_data *sd) { uint8 buf[6]; nullpo_retv(sd); WBUFW(buf,0) = 0x2734; WBUFL(buf,2) = sd->account_id; charif_sendallwos(-1, buf, 6); } static void login_auth_ok(struct login_session_data *sd) { int fd = 0; uint32 ip; struct login_auth_node* node; nullpo_retv(sd); fd = sd->fd; ip = sockt->session[fd]->client_addr; if( core->runflag != LOGINSERVER_ST_RUNNING ) { // players can only login while running lclif->connection_error(fd, 1); // 01 = server closed return; } if (login->config->group_id_to_connect >= 0 && sd->group_id != login->config->group_id_to_connect) { ShowStatus("Connection refused: the required group id for connection is %d (account: %s, group: %d).\n", login->config->group_id_to_connect, sd->userid, sd->group_id); lclif->connection_error(fd, 1); // 01 = server closed return; } else if (login->config->min_group_id_to_connect >= 0 && login->config->group_id_to_connect == -1 && sd->group_id < login->config->min_group_id_to_connect) { ShowStatus("Connection refused: the minimum group id required for connection is %d (account: %s, group: %d).\n", login->config->min_group_id_to_connect, sd->userid, sd->group_id); lclif->connection_error(fd, 1); // 01 = server closed return; } { struct online_login_data* data = (struct online_login_data*)idb_get(login->online_db, sd->account_id); if( data ) {// account is already marked as online! if( data->char_server > -1 ) {// Request char servers to kick this account out. [Skotlex] ShowNotice("User '%s' is already online - Rejected.\n", sd->userid); login->kick(sd); if( data->waiting_disconnect == INVALID_TIMER ) data->waiting_disconnect = timer->add(timer->gettick()+AUTH_TIMEOUT, login->waiting_disconnect_timer, sd->account_id, 0); lclif->connection_error(fd, 8); // 08 = Server still recognizes your last login return; } else if( data->char_server == -1 ) {// client has authed but did not access char-server yet // wipe previous session idb_remove(login->auth_db, sd->account_id); login->remove_online_user(sd->account_id); data = NULL; } } } if (!lclif->server_list(sd)) { // if no char-server, don't send void list of servers, just disconnect the player with proper message ShowStatus("Connection refused: there is no char-server online (account: %s).\n", sd->userid); lclif->connection_error(fd, 1); // 01 = server closed return; } loginlog->log(ip, sd->userid, 100, "login ok"); ShowStatus("Connection of the account '%s' accepted.\n", sd->userid); // create temporary auth entry CREATE(node, struct login_auth_node, 1); node->account_id = sd->account_id; node->login_id1 = sd->login_id1; node->login_id2 = sd->login_id2; node->sex = sd->sex; node->ip = ip; node->version = sd->version; node->clienttype = sd->clienttype; node->group_id = sd->group_id; node->expiration_time = sd->expiration_time; idb_put(login->auth_db, sd->account_id, node); { struct online_login_data* data; // mark client as 'online' data = login->add_online_user(-1, sd->account_id); // schedule deletion of this node data->waiting_disconnect = timer->add(timer->gettick()+AUTH_TIMEOUT, login->waiting_disconnect_timer, sd->account_id, 0); } } static void login_auth_failed(struct login_session_data *sd, int result) { int fd; uint32 ip; time_t ban_time = 0; nullpo_retv(sd); fd = sd->fd; ip = sockt->session[fd]->client_addr; if (login->config->log_login) { const char* error; switch( result ) { case 0: error = "Unregistered ID."; break; // 0 = Unregistered ID case 1: error = "Incorrect Password."; break; // 1 = Incorrect Password case 2: error = "Account Expired."; break; // 2 = This ID is expired case 3: error = "Rejected from server."; break; // 3 = Rejected from Server case 4: error = "Blocked by GM."; break; // 4 = You have been blocked by the GM Team case 5: error = "Not latest game EXE."; break; // 5 = Your Game's EXE file is not the latest version case 6: error = "Banned."; break; // 6 = Your are Prohibited to log in until %s case 7: error = "Server Over-population."; break; // 7 = Server is jammed due to over populated case 8: error = "Account limit from company"; break; // 8 = No more accounts may be connected from this company case 9: error = "Ban by DBA"; break; // 9 = MSI_REFUSE_BAN_BY_DBA case 10: error = "Email not confirmed"; break; // 10 = MSI_REFUSE_EMAIL_NOT_CONFIRMED case 11: error = "Ban by GM"; break; // 11 = MSI_REFUSE_BAN_BY_GM case 12: error = "Working in DB"; break; // 12 = MSI_REFUSE_TEMP_BAN_FOR_DBWORK case 13: error = "Self Lock"; break; // 13 = MSI_REFUSE_SELF_LOCK case 14: error = "Not Permitted Group"; break; // 14 = MSI_REFUSE_NOT_PERMITTED_GROUP case 15: error = "Not Permitted Group"; break; // 15 = MSI_REFUSE_NOT_PERMITTED_GROUP case 99: error = "Account gone."; break; // 99 = This ID has been totally erased case 100: error = "Login info remains."; break; // 100 = Login information remains at %s case 101: error = "Hacking investigation."; break; // 101 = Account has been locked for a hacking investigation. Please contact the GM Team for more information case 102: error = "Bug investigation."; break; // 102 = This account has been temporarily prohibited from login due to a bug-related investigation case 103: error = "Deleting char."; break; // 103 = This character is being deleted. Login is temporarily unavailable for the time being case 104: error = "Deleting spouse char."; break; // 104 = This character is being deleted. Login is temporarily unavailable for the time being default : error = "Unknown Error."; break; } loginlog->log(ip, sd->userid, result, error); // FIXME: result can be 100, conflicting with the value 100 we use for successful login... } if (result == 1 && login->config->dynamic_pass_failure_ban && !sockt->trusted_ip_check(ip)) ipban->log(ip); // log failed password attempt if (result == 6) { struct mmo_account acc = { 0 }; if (accounts->load_str(accounts, &acc, sd->userid)) ban_time = acc.unban_time; } lclif->auth_failed(fd, ban_time, result); } static bool login_client_login(int fd, struct login_session_data *sd) __attribute__((nonnull (2))); static bool login_client_login(int fd, struct login_session_data *sd) { int result; char ip[16]; uint32 ipl = sockt->session[fd]->client_addr; sockt->ip2str(ipl, ip); ShowStatus("Request for connection %sof %s (ip: %s).\n", sd->passwdenc == PASSWORDENC ? " (passwdenc mode)" : "", sd->userid, ip); if (sd->passwdenc != PWENC_NONE && login->config->use_md5_passwds) { login->auth_failed(sd, 3); // send "rejected from server" return true; } result = login->mmo_auth(sd, false); if( result == -1 ) login->auth_ok(sd); else login->auth_failed(sd, result); return false; } static bool login_client_login_otp(int fd, struct login_session_data *sd) __attribute__((nonnull (2))); static bool login_client_login_otp(int fd, struct login_session_data *sd) { #if PACKETVER_MAIN_NUM >= 20170621 || PACKETVER_RE_NUM >= 20170621 || defined(PACKETVER_ZERO) // send ok response with fake token const int len = sizeof(struct PACKET_AC_LOGIN_OTP) + 6; // + "token" string WFIFOHEAD(fd, len); struct PACKET_AC_LOGIN_OTP *packet = WP2PTR(sd->fd); memset(packet, 0, len); packet->packet_id = HEADER_AC_LOGIN_OTP; packet->packet_len = len; packet->loginFlag = 0; // normal login #if PACKETVER_MAIN_NUM >= 20171213 || PACKETVER_RE_NUM >= 20171213 || PACKETVER_ZERO_NUM >= 20171123 safestrncpy(packet->loginFlag2, "S1000", 6); #endif // PACKETVER_MAIN_NUM >= 20171213 || PACKETVER_RE_NUM >= 20171213 || PACKETVER_ZERO_NUM >= 20171123 safestrncpy(packet->token, "token", 6); WFIFOSET(fd, len); return true; #else // PACKETVER_MAIN_NUM >= 20170621 || PACKETVER_RE_NUM >= 20170621 || defined(PACKETVER_ZERO) return false; #endif // PACKETVER_MAIN_NUM >= 20170621 || PACKETVER_RE_NUM >= 20170621 || defined(PACKETVER_ZERO) } static void login_client_login_mobile_otp_request(int fd, struct login_session_data *sd) __attribute__((nonnull (2))); static void login_client_login_mobile_otp_request(int fd, struct login_session_data *sd) { #if PACKETVER_MAIN_NUM >= 20181114 || PACKETVER_RE_NUM >= 20181114 || defined(PACKETVER_ZERO) WFIFOHEAD(sd->fd, sizeof(struct PACKET_AC_REQ_MOBILE_OTP)); struct PACKET_AC_REQ_MOBILE_OTP *packet = WP2PTR(sd->fd); packet->packet_id = HEADER_AC_REQ_MOBILE_OTP; packet->aid = sd->account_id; WFIFOSET(fd, sizeof(struct PACKET_AC_REQ_MOBILE_OTP)); #endif } static void login_char_server_connection_status(int fd, struct login_session_data* sd, uint8 status) __attribute__((nonnull (2))); static void login_char_server_connection_status(int fd, struct login_session_data* sd, uint8 status) { WFIFOHEAD(fd,3); WFIFOW(fd,0) = 0x2711; WFIFOB(fd,2) = status; WFIFOSET(fd,3); } // CA_CHARSERVERCONNECT static void login_parse_request_connection(int fd, struct login_session_data* sd, const char *const ip, uint32 ipl) __attribute__((nonnull (2, 3))); static void login_parse_request_connection(int fd, struct login_session_data* sd, const char *const ip, uint32 ipl) { char server_name[20]; char message[256]; uint32 server_ip; uint16 server_port; uint16 type; uint16 new_; int result; safestrncpy(sd->userid, RFIFOP(fd,2), NAME_LENGTH); safestrncpy(sd->passwd, RFIFOP(fd,26), NAME_LENGTH); if (login->config->use_md5_passwds) md5->string(sd->passwd, sd->passwd); sd->passwdenc = PWENC_NONE; sd->version = login->config->client_version_to_connect; // hack to skip version check server_ip = ntohl(RFIFOL(fd,54)); server_port = ntohs(RFIFOW(fd,58)); safestrncpy(server_name, RFIFOP(fd,60), 20); type = RFIFOW(fd,82); new_ = RFIFOW(fd,84); ShowInfo("Connection request of the char-server '%s' @ %u.%u.%u.%u:%u (account: '%s', ip: '%s')\n", server_name, CONVIP(server_ip), server_port, sd->userid, ip); sprintf(message, "charserver - %s@%u.%u.%u.%u:%u", server_name, CONVIP(server_ip), server_port); loginlog->log(sockt->session[fd]->client_addr, sd->userid, 100, message); result = login->mmo_auth(sd, true); if (!sockt->allowed_ip_check(ipl)) { ShowNotice("Connection of the char-server '%s' REFUSED (IP not allowed).\n", server_name); login->char_server_connection_status(fd, sd, 2); } else if (core->runflag == LOGINSERVER_ST_RUNNING && result == -1 && sd->sex == 'S' && sd->account_id >= 0 && sd->account_id < ARRAYLENGTH(login->dbs->server) && !sockt->session_is_valid(login->dbs->server[sd->account_id].fd)) { ShowStatus("Connection of the char-server '%s' accepted.\n", server_name); safestrncpy(login->dbs->server[sd->account_id].name, server_name, sizeof(login->dbs->server[sd->account_id].name)); login->dbs->server[sd->account_id].fd = fd; login->dbs->server[sd->account_id].ip = server_ip; login->dbs->server[sd->account_id].port = server_port; login->dbs->server[sd->account_id].users = 0; login->dbs->server[sd->account_id].type = type; login->dbs->server[sd->account_id].new_ = new_; sockt->session[fd]->func_parse = login->parse_fromchar; sockt->session[fd]->flag.server = 1; sockt->session[fd]->flag.validate = 0; sockt->realloc_fifo(fd, FIFOSIZE_SERVERLINK, FIFOSIZE_SERVERLINK); // send connection success login->char_server_connection_status(fd, sd, 0); } else { ShowNotice("Connection of the char-server '%s' REFUSED.\n", server_name); login->char_server_connection_status(fd, sd, 1); } } static void login_config_set_defaults(void) { login->config->login_ip = INADDR_ANY; login->config->login_port = 6900; login->config->ipban_cleanup_interval = 60; login->config->ip_sync_interval = 0; login->config->log_login = true; safestrncpy(login->config->date_format, "%Y-%m-%d %H:%M:%S", sizeof(login->config->date_format)); login->config->new_account_flag = true; login->config->new_acc_length_limit = true; login->config->use_md5_passwds = false; login->config->group_id_to_connect = -1; login->config->min_group_id_to_connect = -1; login->config->check_client_version = false; login->config->client_version_to_connect = 20; login->config->allowed_regs = 1; login->config->time_allowed = 10; login->config->ipban = true; login->config->dynamic_pass_failure_ban = true; login->config->dynamic_pass_failure_ban_interval = 5; login->config->dynamic_pass_failure_ban_limit = 7; login->config->dynamic_pass_failure_ban_duration = 5; login->config->use_dnsbl = false; VECTOR_INIT(login->config->dnsbl_servers); login->config->client_hash_check = 0; login->config->client_hash_nodes = NULL; } /** * Reads 'login_configuration/inter' and initializes required variables. * * @param filename Path to configuration file (used in error and warning messages). * @param config The current config being parsed. * @param imported Whether the current config is imported from another file. * * @retval false in case of error. */ static bool login_config_read_inter(const char *filename, struct config_t *config, bool imported) { struct config_setting_t *setting = NULL; const char *str = NULL; nullpo_retr(false, filename); nullpo_retr(false, config); if ((setting = libconfig->lookup(config, "login_configuration/inter")) == NULL) { if (imported) return true; ShowError("login_config_read: login_configuration/inter was not found in %s!\n", filename); return false; } libconfig->setting_lookup_uint16(setting, "login_port", &login->config->login_port); if (libconfig->setting_lookup_uint32(setting, "ip_sync_interval", &login->config->ip_sync_interval) == CONFIG_TRUE) login->config->ip_sync_interval *= 1000*60; // In minutes if (libconfig->setting_lookup_string(setting, "bind_ip", &str) == CONFIG_TRUE) { char old_ip_str[16]; sockt->ip2str(login->config->login_ip, old_ip_str); if ((login->config->login_ip = sockt->host2ip(str)) != 0) ShowStatus("Login server binding IP address : %s -> %s\n", old_ip_str, str); } return true; } /** * Reads 'login_configuration.console' and initializes required variables. * * @param filename Path to configuration file (used in error and warning messages). * @param config The current config being parsed. * @param imported Whether the current config is imported from another file. * * @retval false in case of error. */ static bool login_config_read_console(const char *filename, struct config_t *config, bool imported) { struct config_setting_t *setting = NULL; nullpo_retr(false, filename); nullpo_retr(false, config); if ((setting = libconfig->lookup(config, "login_configuration/console")) == NULL) { if (imported) return true; ShowError("login_config_read: login_configuration/console was not found in %s!\n", filename); return false; } libconfig->setting_lookup_bool_real(setting, "stdout_with_ansisequence", &showmsg->stdout_with_ansisequence); if (libconfig->setting_lookup_int(setting, "console_silent", &showmsg->silent) == CONFIG_TRUE) { if (showmsg->silent) // only bother if its actually enabled ShowInfo("Console Silent Setting: %d\n", showmsg->silent); } libconfig->setting_lookup_mutable_string(setting, "timestamp_format", showmsg->timestamp_format, sizeof(showmsg->timestamp_format)); return true; } /** * Reads 'login_configuration.log' and initializes required variables. * * @param filename Path to configuration file (used in error and warning messages). * @param config The current config being parsed. * @param imported Whether the current config is imported from another file. * * @retval false in case of error. */ static bool login_config_read_log(const char *filename, struct config_t *config, bool imported) { struct config_setting_t *setting = NULL; nullpo_retr(false, filename); nullpo_retr(false, config); if ((setting = libconfig->lookup(config, "login_configuration/log")) == NULL) { if (imported) return true; ShowError("login_config_read: login_configuration/log was not found in %s!\n", filename); return false; } libconfig->setting_lookup_bool_real(setting, "log_login", &login->config->log_login); libconfig->setting_lookup_mutable_string(setting, "date_format", login->config->date_format, sizeof(login->config->date_format)); return true; } /** * Reads 'login_configuration.account' and initializes required variables. * * @param filename Path to configuration file (used in error and warning messages). * @param config The current config being parsed. * @param imported Whether the current config is imported from another file. * * @retval false in case of error. */ static bool login_config_read_account(const char *filename, struct config_t *config, bool imported) { struct config_setting_t *setting = NULL; AccountDB *db = login->dbs->account_engine->db; bool retval = true; nullpo_retr(false, filename); nullpo_retr(false, config); if ((setting = libconfig->lookup(config, "login_configuration/account")) == NULL) { if (imported) return true; ShowError("login_config_read: login_configuration/account was not found in %s!\n", filename); return false; } libconfig->setting_lookup_bool_real(setting, "new_account", &login->config->new_account_flag); libconfig->setting_lookup_bool_real(setting, "new_acc_length_limit", &login->config->new_acc_length_limit); libconfig->setting_lookup_int(setting, "allowed_regs", &login->config->allowed_regs); libconfig->setting_lookup_int(setting, "time_allowed", &login->config->time_allowed); libconfig->setting_lookup_int(setting, "start_limited_time", &login->config->start_limited_time); libconfig->setting_lookup_bool_real(setting, "use_MD5_passwords", &login->config->use_md5_passwds); if (!db->set_property(db, config, imported)) retval = false; if (!ipban->config_read(filename, config, imported)) retval = false; return retval; } /** * Frees login->config->client_hash_nodes **/ static void login_clear_client_hash_nodes(void) { struct client_hash_node *node = login->config->client_hash_nodes; while (node != NULL) { struct client_hash_node *next = node->next; aFree(node); node = next; } login->config->client_hash_nodes = NULL; } /** * Reads information from login_configuration.permission.hash.md5_hashes (unused function) * * @param setting The setting to read from. */ static void login_config_set_md5hash(struct config_setting_t *setting) { int i; int count = libconfig->setting_length(setting); login->clear_client_hash_nodes(); // There's no need to parse if it's disabled or if there's no list if (count <= 0 || !login->config->client_hash_check) return; for (i = 0; i < count; i++) { int j; int group_id = 0; char md5hash[33]; struct client_hash_node *nnode = NULL; struct config_setting_t *item = libconfig->setting_get_elem(setting, i); if (item == NULL) continue; if (libconfig->setting_lookup_int(item, "group_id", &group_id) != CONFIG_TRUE) { ShowWarning("login_config_set_md5hash: entry (%d) is missing group_id! Ignoring...\n", i); continue; } if (libconfig->setting_lookup_mutable_string(item, "hash", md5hash, sizeof(md5hash)) != CONFIG_TRUE) { ShowWarning("login_config_set_md5hash: entry (%d) is missing hash! Ignoring...\n", i); continue; } CREATE(nnode, struct client_hash_node, 1); if (strcmpi(md5hash, "disabled") == 0) { nnode->hash[0] = '\0'; } else { for (j = 0; j < 32; j += 2) { char buf[3]; unsigned int byte; memcpy(buf, &md5hash[j], 2); buf[2] = 0; sscanf(buf, "%x", &byte); nnode->hash[j / 2] = (uint8)(byte & 0xFF); } } nnode->group_id = group_id; nnode->next = login->config->client_hash_nodes; // login->config->client_hash_nodes is initialized before calling this function login->config->client_hash_nodes = nnode; } return; } /** * Reads 'login_configuration/permission/hash' and initializes required variables. * * @param filename Path to configuration file (used in error and warning messages). * @param config The current config being parsed. * @param imported Whether the current config is imported from another file. * * @retval false in case of error. */ static bool login_config_read_permission_hash(const char *filename, struct config_t *config, bool imported) { struct config_setting_t *setting = NULL; nullpo_retr(false, filename); nullpo_retr(false, config); if ((setting = libconfig->lookup(config, "login_configuration/permission/hash")) == NULL) { if (imported) return true; ShowError("login_config_read: login_configuration/permission/hash was not found in %s!\n", filename); return false; } libconfig->setting_lookup_bool_real(setting, "enabled", &login->config->client_hash_check); if ((setting = libconfig->lookup(config, "login_configuration/permission/hash/MD5_hashes")) != NULL) login->config_set_md5hash(setting); return true; } /** * Clears login->config->dnsbl_servers, freeing any allocated memory. */ static void login_clear_dnsbl_servers(void) { while (VECTOR_LENGTH(login->config->dnsbl_servers) > 0) { aFree(&VECTOR_POP(login->config->dnsbl_servers)); } VECTOR_CLEAR(login->config->dnsbl_servers); } /** * Reads information from login_config/permission/DNS_blacklist/dnsbl_servers. * * @param setting The configuration setting to read from. */ static void login_config_set_dnsbl_servers(struct config_setting_t *setting) { int i; int count = libconfig->setting_length(setting); login->clear_dnsbl_servers(); // There's no need to parse if it's disabled if (count <= 0 || !login->config->use_dnsbl) return; VECTOR_ENSURE(login->config->dnsbl_servers, count, 1); for (i = 0; i < count; i++) { const char *string = libconfig->setting_get_string_elem(setting, i); if (string == NULL || string[0] == '\0') continue; VECTOR_PUSH(login->config->dnsbl_servers, aStrdup(string)); } } /** * Reads 'login_configuration/permission/DNS_blacklist' and initializes required variables. * * @param filename Path to configuration file (used in error and warning messages). * @param config The current config being parsed. * @param imported Whether the current config is imported from another file. * * @retval false in case of error. */ static bool login_config_read_permission_blacklist(const char *filename, struct config_t *config, bool imported) { struct config_setting_t *setting = NULL; nullpo_retr(false, filename); nullpo_retr(false, config); if ((setting = libconfig->lookup(config, "login_configuration/permission/DNS_blacklist")) == NULL) { if (imported) return true; ShowError("login_config_read: login_configuration/permission/DNS_blacklist was not found in %s!\n", filename); return false; } libconfig->setting_lookup_bool_real(setting, "enabled", &login->config->use_dnsbl); if ((setting = libconfig->lookup(config, "login_configuration/permission/DNS_blacklist/dnsbl_servers")) != NULL) login->config_set_dnsbl_servers(setting); return true; } /** * Reads 'login_configuration.permission' and initializes required variables. * * @param filename Path to configuration file (used in error and warning messages). * @param config The current config being parsed. * @param imported Whether the current config is imported from another file. * * @retval false in case of error. */ static bool login_config_read_permission(const char *filename, struct config_t *config, bool imported) { struct config_setting_t *setting = NULL; bool retval = true; nullpo_retr(false, filename); nullpo_retr(false, config); if ((setting = libconfig->lookup(config, "login_configuration/permission")) == NULL) { if (imported) return true; ShowError("login_config_read: login_configuration/permission was not found in %s!\n", filename); return false; } libconfig->setting_lookup_int(setting, "group_id_to_connect", &login->config->group_id_to_connect); libconfig->setting_lookup_int(setting, "min_group_id_to_connect", &login->config->min_group_id_to_connect); libconfig->setting_lookup_bool_real(setting, "check_client_version", &login->config->check_client_version); libconfig->setting_lookup_uint32(setting, "client_version_to_connect", &login->config->client_version_to_connect); if (!login->config_read_permission_hash(filename, config, imported)) retval = false; if (!login->config_read_permission_blacklist(filename, config, imported)) retval = false; return retval; } /** * Reads 'login_configuration.users_count' and initializes required variables. * * @param filename Path to configuration file (used in error and warning messages). * @param config The current config being parsed. * @param imported Whether the current config is imported from another file. * * @retval false in case of error. */ static bool login_config_read_users(const char *filename, struct config_t *config, bool imported) { struct config_setting_t *setting = NULL; bool retval = true; nullpo_retr(false, filename); nullpo_retr(false, config); if ((setting = libconfig->lookup(config, "login_configuration/users_count")) == NULL) { if (imported) return true; ShowError("login_config_read: login_configuration/users_count was not found in %s!\n", filename); return false; } libconfig->setting_lookup_bool_real(setting, "send_user_count_description", &login->config->send_user_count_description); libconfig->setting_lookup_uint32(setting, "low", &login->config->users_low); libconfig->setting_lookup_uint32(setting, "medium", &login->config->users_medium); libconfig->setting_lookup_uint32(setting, "high", &login->config->users_high); return retval; } /** * Reads the 'login-config' configuration file and initializes required variables. * * @param filename Path to configuration file. * @param imported Whether the current config is imported from another file. * * @retval false in case of error. **/ static bool login_config_read(const char *filename, bool imported) { struct config_t config; const char *import = NULL; bool retval = true; nullpo_retr(false, filename); if (!libconfig->load_file(&config, filename)) return false; // Error message is already shown by libconfig->load_file if (!login->config_read_inter(filename, &config, imported)) retval = false; if (!login->config_read_console(filename, &config, imported)) retval = false; if (!login->config_read_log(filename, &config, imported)) retval = false; if (!login->config_read_account(filename, &config, imported)) retval = false; if (!login->config_read_permission(filename, &config, imported)) retval = false; if (!login->config_read_users(filename, &config, imported)) retval = false; if (!loginlog->config_read("conf/common/inter-server.conf", imported)) // Only inter-server retval = false; if (!HPM->parse_conf(&config, filename, HPCT_LOGIN, imported)) retval = false; ShowInfo("Finished reading %s.\n", filename); // import should overwrite any previous configuration, so it should be called last if (libconfig->lookup_string(&config, "import", &import) == CONFIG_TRUE) { if (strcmp(import, filename) == 0 || strcmp(import, login->LOGIN_CONF_NAME) == 0) { ShowWarning("login_config_read: Loop detected in %s! Skipping 'import'...\n", filename); } else { if (!login->config_read(import, true)) retval = false; } } config_destroy(&config); return retval; } /** * Convert users count to colors. * * @param users Actual users count. * * @retval users count or color id. **/ static uint16 login_convert_users_to_colors(uint16 users) { #if PACKETVER >= 20170726 if (!login->config->send_user_count_description) return 4; if (users <= login->config->users_low) return 0; else if (users <= login->config->users_medium) return 1; else if (users <= login->config->users_high) return 2; return 3; #else return users; #endif } //-------------------------------------- // Function called at exit of the server //-------------------------------------- int do_final(void) { int i; ShowStatus("Terminating...\n"); HPM->event(HPET_FINAL); login->clear_client_hash_nodes(); login->clear_dnsbl_servers(); loginlog->log(0, "login server", 100, "login server shutdown"); if (login->config->log_login) loginlog->final(); ipban->final(); if (login->dbs->account_engine->db) {// destroy account engine login->dbs->account_engine->db->destroy(login->dbs->account_engine->db); login->dbs->account_engine->db = NULL; } login->accounts = NULL; // destroyed in account_engine accounts = NULL; login->online_db->destroy(login->online_db, NULL); login->auth_db->destroy(login->auth_db, NULL); for (i = 0; i < ARRAYLENGTH(login->dbs->server); ++i) lchrif->server_destroy(i); if( login->fd != -1 ) { sockt->close(login->fd); login->fd = -1; } lclif->final(); HPM_login_do_final(); aFree(login->LOGIN_CONF_NAME); aFree(login->NET_CONF_NAME); HPM->event(HPET_POST_FINAL); ShowStatus("Finished.\n"); return EXIT_SUCCESS; } //------------------------------ // Function called when the server // has received a crash signal. //------------------------------ void do_abort(void) { } void set_server_type(void) { SERVER_TYPE = SERVER_TYPE_LOGIN; } /// Called when a terminate signal is received. static void do_shutdown_login(void) { if( core->runflag != LOGINSERVER_ST_SHUTDOWN ) { int id; core->runflag = LOGINSERVER_ST_SHUTDOWN; ShowStatus("Shutting down...\n"); // TODO proper shutdown procedure; kick all characters, wait for acks, ... [FlavioJS] for (id = 0; id < ARRAYLENGTH(login->dbs->server); ++id) lchrif->server_reset(id); sockt->flush_fifos(); core->runflag = CORE_ST_STOP; } } /** * --login-config handler * * Overrides the default login configuration file. * @see cmdline->exec */ static CMDLINEARG(loginconfig) { aFree(login->LOGIN_CONF_NAME); login->LOGIN_CONF_NAME = aStrdup(params); return true; } /** * --run-once handler * * Causes the server to run its loop once, and shutdown. Useful for testing. * @see cmdline->exec */ static CMDLINEARG(runonce) { core->runflag = CORE_ST_STOP; return true; } /** * --net-config handler * * Overrides the default subnet configuration file. * @see cmdline->exec */ static CMDLINEARG(netconfig) { aFree(login->NET_CONF_NAME); login->NET_CONF_NAME = aStrdup(params); return true; } /** * Defines the local command line arguments */ void cmdline_args_init_local(void) { CMDLINEARG_DEF2(run-once, runonce, "Closes server after loading (testing).", CMDLINE_OPT_NORMAL); CMDLINEARG_DEF2(login-config, loginconfig, "Alternative login-server configuration.", CMDLINE_OPT_PARAM); CMDLINEARG_DEF2(net-config, netconfig, "Alternative subnet configuration.", CMDLINE_OPT_PARAM); } //------------------------------ // Login server initialization //------------------------------ int do_init(int argc, char **argv) { int i; account_defaults(); login_defaults(); // initialize engine (to accept config settings) login->dbs->account_engine->constructor = account->db_sql; login->dbs->account_engine->db = login->dbs->account_engine->constructor(); accounts = login->dbs->account_engine->db; login->accounts = accounts; if( accounts == NULL ) { ShowFatalError("do_init: account engine 'sql' not found.\n"); exit(EXIT_FAILURE); } ipban_defaults(); lchrif_defaults(); lclif_defaults(); loginlog_defaults(); // read login-server configuration login->config_set_defaults(); login->LOGIN_CONF_NAME = aStrdup("conf/login/login-server.conf"); login->NET_CONF_NAME = aStrdup("conf/network.conf"); { // TODO: Remove this when no longer needed. #define CHECK_OLD_LOCAL_CONF(oldname, newname) do { \ if (stat((oldname), &fileinfo) == 0 && fileinfo.st_size > 0) { \ ShowWarning("An old configuration file \"%s\" was found.\n", (oldname)); \ ShowWarning("If it contains settings you wish to keep, please merge them into \"%s\".\n", (newname)); \ ShowWarning("Otherwise, just delete it.\n"); \ ShowInfo("Resuming in 10 seconds...\n"); \ HSleep(10); \ } \ } while (0) struct stat fileinfo; CHECK_OLD_LOCAL_CONF("conf/import/login_conf.txt", "conf/import/login-server.conf"); CHECK_OLD_LOCAL_CONF("conf/import/inter_conf.txt", "conf/import/inter-server.conf"); CHECK_OLD_LOCAL_CONF("conf/import/packet_conf.txt", "conf/import/socket.conf"); #undef CHECK_OLD_LOCAL_CONF } lclif->init(); HPM_login_do_init(); cmdline->exec(argc, argv, CMDLINE_OPT_PREINIT); HPM->config_read(); HPM->event(HPET_PRE_INIT); cmdline->exec(argc, argv, CMDLINE_OPT_NORMAL); login->config_read(login->LOGIN_CONF_NAME, false); sockt->net_config_read(login->NET_CONF_NAME); for (i = 0; i < ARRAYLENGTH(login->dbs->server); ++i) lchrif->server_init(i); // initialize logging if (login->config->log_login) loginlog->init(); // initialize static and dynamic ipban system ipban->init(); // Online user database init login->online_db = idb_alloc(DB_OPT_RELEASE_DATA); timer->add_func_list(login->waiting_disconnect_timer, "login->waiting_disconnect_timer"); // Interserver auth init login->auth_db = idb_alloc(DB_OPT_RELEASE_DATA); // set default parser as lclif->parse function sockt->set_defaultparse(lclif->parse); sockt->validate = true; // every 10 minutes cleanup online account db. timer->add_func_list(login->online_data_cleanup, "login->online_data_cleanup"); timer->add_interval(timer->gettick() + 600*1000, login->online_data_cleanup, 0, 0, 600*1000); // add timer to detect ip address change and perform update if (login->config->ip_sync_interval) { timer->add_func_list(login->sync_ip_addresses, "login->sync_ip_addresses"); timer->add_interval(timer->gettick() + login->config->ip_sync_interval, login->sync_ip_addresses, 0, 0, login->config->ip_sync_interval); } // Account database init if(!accounts->init(accounts)) { ShowFatalError("do_init: Failed to initialize account engine 'sql'.\n"); exit(EXIT_FAILURE); } HPM->event(HPET_INIT); // server port open & binding if ((login->fd = sockt->make_listen_bind(login->config->login_ip,login->config->login_port)) == -1) { ShowFatalError("Failed to bind to port '"CL_WHITE"%d"CL_RESET"'\n",login->config->login_port); exit(EXIT_FAILURE); } if( core->runflag != CORE_ST_STOP ) { core->shutdown_callback = do_shutdown_login; core->runflag = LOGINSERVER_ST_RUNNING; } #ifdef CONSOLE_INPUT console->display_gplnotice(); #endif // CONSOLE_INPUT ShowStatus("The login-server is "CL_GREEN"ready"CL_RESET" (Server is listening on the port %u).\n\n", login->config->login_port); loginlog->log(0, "login server", 100, "login server started"); HPM->event(HPET_READY); return 0; } void login_defaults(void) { login = &login_s; login->config = &login_config_; login->accounts = accounts; login->dbs = &logindbs; login->dbs->account_engine = &account_engine; login->dbs->account_engine->constructor = NULL; login->dbs->account_engine->db = NULL; login->mmo_auth = login_mmo_auth; login->mmo_auth_new = login_mmo_auth_new; login->waiting_disconnect_timer = login_waiting_disconnect_timer; login->create_online_user = login_create_online_user; login->add_online_user = login_add_online_user; login->remove_online_user = login_remove_online_user; login->online_db_setoffline = login_online_db_setoffline; login->online_data_cleanup_sub = login_online_data_cleanup_sub; login->online_data_cleanup = login_online_data_cleanup; login->sync_ip_addresses = login_sync_ip_addresses; login->check_encrypted = login_check_encrypted; login->check_password = login_check_password; login->lan_subnet_check = login_lan_subnet_check; login->fromchar_auth_ack = login_fromchar_auth_ack; login->fromchar_accinfo = login_fromchar_accinfo; login->fromchar_account = login_fromchar_account; login->fromchar_account_update_other = login_fromchar_account_update_other; login->fromchar_ban = login_fromchar_ban; login->fromchar_change_sex_other = login_fromchar_change_sex_other; login->fromchar_pong = login_fromchar_pong; login->fromchar_parse_auth = login_fromchar_parse_auth; login->fromchar_parse_update_users = login_fromchar_parse_update_users; login->fromchar_parse_request_change_email = login_fromchar_parse_request_change_email; login->fromchar_parse_account_data = login_fromchar_parse_account_data; login->fromchar_parse_ping = login_fromchar_parse_ping; login->fromchar_parse_change_email = login_fromchar_parse_change_email; login->fromchar_parse_account_update = login_fromchar_parse_account_update; login->fromchar_parse_ban = login_fromchar_parse_ban; login->fromchar_parse_change_sex = login_fromchar_parse_change_sex; login->fromchar_parse_account_reg2 = login_fromchar_parse_account_reg2; login->fromchar_parse_unban = login_fromchar_parse_unban; login->fromchar_parse_account_online = login_fromchar_parse_account_online; login->fromchar_parse_account_offline = login_fromchar_parse_account_offline; login->fromchar_parse_online_accounts = login_fromchar_parse_online_accounts; login->fromchar_parse_request_account_reg2 = login_fromchar_parse_request_account_reg2; login->fromchar_parse_update_wan_ip = login_fromchar_parse_update_wan_ip; login->fromchar_parse_all_offline = login_fromchar_parse_all_offline; login->fromchar_parse_change_pincode = login_fromchar_parse_change_pincode; login->fromchar_parse_wrong_pincode = login_fromchar_parse_wrong_pincode; login->fromchar_parse_accinfo = login_fromchar_parse_accinfo; login->parse_fromchar = login_parse_fromchar; login->client_login = login_client_login; login->client_login_otp = login_client_login_otp; login->client_login_mobile_otp_request = login_client_login_mobile_otp_request; login->parse_request_connection = login_parse_request_connection; login->auth_ok = login_auth_ok; login->auth_failed = login_auth_failed; login->char_server_connection_status = login_char_server_connection_status; login->kick = login_kick; login->config_set_defaults = login_config_set_defaults; login->config_read = login_config_read; login->config_read_inter = login_config_read_inter; login->config_read_console = login_config_read_console; login->config_read_log = login_config_read_log; login->config_read_account = login_config_read_account; login->config_read_permission = login_config_read_permission; login->config_read_permission_hash = login_config_read_permission_hash; login->config_read_permission_blacklist = login_config_read_permission_blacklist; login->config_read_users = login_config_read_users; login->config_set_dnsbl_servers = login_config_set_dnsbl_servers; login->clear_dnsbl_servers = login_clear_dnsbl_servers; login->clear_client_hash_nodes = login_clear_client_hash_nodes; login->config_set_md5hash = login_config_set_md5hash; login->convert_users_to_colors = login_convert_users_to_colors; login->LOGIN_CONF_NAME = NULL; login->NET_CONF_NAME = NULL; } void lchrif_defaults(void) { lchrif = &lchrif_s; lchrif->server_init = lchrif_server_init; lchrif->server_destroy = lchrif_server_destroy; lchrif->server_reset = lchrif_server_reset; lchrif->on_disconnect = lchrif_on_disconnect; }