summaryrefslogtreecommitdiff
path: root/src/login_sql/login.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/login_sql/login.c')
-rw-r--r--src/login_sql/login.c3221
1 files changed, 1806 insertions, 1415 deletions
diff --git a/src/login_sql/login.c b/src/login_sql/login.c
index a46416c..cc59f19 100644
--- a/src/login_sql/login.c
+++ b/src/login_sql/login.c
@@ -21,7 +21,7 @@
#include <sys/time.h>
#include <time.h>
#include <sys/ioctl.h>
-#include <sys/stat.h> // for stat/lstat/fstat
+#include <sys/stat.h> // for stat/lstat/fstat
#include <unistd.h>
#include <signal.h>
#include <fcntl.h>
@@ -64,43 +64,43 @@
//-----------------------------------------------------
// global variable
//-----------------------------------------------------
-int account_id_count = START_ACCOUNT_NUM;
-int server_num;
-int new_account_flag = 0;
-int login_port = 6900;
-char lan_char_ip[128]; // Lan char ip added by kashy
-int subnetmaski[4]; // Subnetmask added by kashy
+int account_id_count = START_ACCOUNT_NUM;
+int server_num;
+int new_account_flag = 0;
+int login_port = 6900;
+char lan_char_ip[128]; // Lan char ip added by kashy
+int subnetmaski[4]; // Subnetmask added by kashy
struct mmo_char_server server[MAX_SERVERS];
-int server_fd[MAX_SERVERS];
-int server_freezeflag[MAX_SERVERS]; // Char-server anti-freeze system. Counter. 5 ok, 4...0 freezed
-int anti_freeze_enable = 0;
-int ANTI_FREEZE_INTERVAL = 15;
+int server_fd[MAX_SERVERS];
+int server_freezeflag[MAX_SERVERS]; // Char-server anti-freeze system. Counter. 5 ok, 4...0 freezed
+int anti_freeze_enable = 0;
+int ANTI_FREEZE_INTERVAL = 15;
-int login_fd;
+int login_fd;
char date_format[32] = "%Y-%m-%d %H:%M:%S";
-int auth_num = 0, auth_max = 0;
+int auth_num = 0, auth_max = 0;
-int min_level_to_connect = 0; // minimum level of player/GM (0: player, 1-99: gm) to connect on the server
-int check_ip_flag = 1; // It's to check IP of a player between login-server and char-server (part of anti-hacking system)
+int min_level_to_connect = 0; // minimum level of player/GM (0: player, 1-99: gm) to connect on the server
+int check_ip_flag = 1; // It's to check IP of a player between login-server and char-server (part of anti-hacking system)
MYSQL mysql_handle;
-int ipban = 1;
-int dynamic_account_ban = 1;
-int dynamic_account_ban_class = 0;
-int dynamic_pass_failure_ban = 1;
-int dynamic_pass_failure_ban_time = 5;
-int dynamic_pass_failure_ban_how_many = 3;
-int dynamic_pass_failure_ban_how_long = 60;
+int ipban = 1;
+int dynamic_account_ban = 1;
+int dynamic_account_ban_class = 0;
+int dynamic_pass_failure_ban = 1;
+int dynamic_pass_failure_ban_time = 5;
+int dynamic_pass_failure_ban_how_many = 3;
+int dynamic_pass_failure_ban_how_long = 60;
-int login_server_port = 3306;
+int login_server_port = 3306;
char login_server_ip[32] = "127.0.0.1";
char login_server_id[32] = "ragnarok";
char login_server_pw[32] = "ragnarok";
char login_server_db[32] = "ragnarok";
-int use_md5_passwds = 0;
+int use_md5_passwds = 0;
char login_db[256] = "login";
char loginlog_db[256] = "loginlog";
@@ -116,13 +116,13 @@ char tmpsql[65535], tmp_sql[65535];
//-----------------------------------------------------
#define AUTH_FIFO_SIZE 256
-struct {
- int account_id,login_id1,login_id2;
- int ip,sex,delflag;
+struct
+{
+ int account_id, login_id1, login_id2;
+ int ip, sex, delflag;
} auth_fifo[AUTH_FIFO_SIZE];
-int auth_fifo_pos = 0;
-
+int auth_fifo_pos = 0;
//-----------------------------------------------------
@@ -132,341 +132,406 @@ static char md5key[20], md5keylen = 16;
// check user level
//-----------------------------------------------------
-int isGM(int account_id) {
- int level;
-
- MYSQL_RES* sql_res;
- MYSQL_ROW sql_row;
- level = 0;
- sprintf(tmpsql,"SELECT `%s` FROM `%s` WHERE `%s`='%d'", login_db_level, login_db, login_db_account_id, account_id);
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error (select GM Level to Memory)- %s\n", mysql_error(&mysql_handle));
- }
- sql_res = mysql_store_result(&mysql_handle);
- if (sql_res) {
- sql_row = mysql_fetch_row(sql_res);
- level = atoi(sql_row[0]);
- if (level > 99)
- level = 99;
- }
-
- if (level == 0) {
- return 0;
- //not GM
- }
-
- mysql_free_result(sql_res);
-
- return level;
+int isGM (int account_id)
+{
+ int level;
+
+ MYSQL_RES *sql_res;
+ MYSQL_ROW sql_row;
+ level = 0;
+ sprintf (tmpsql, "SELECT `%s` FROM `%s` WHERE `%s`='%d'", login_db_level,
+ login_db, login_db_account_id, account_id);
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error (select GM Level to Memory)- %s\n",
+ mysql_error (&mysql_handle));
+ }
+ sql_res = mysql_store_result (&mysql_handle);
+ if (sql_res)
+ {
+ sql_row = mysql_fetch_row (sql_res);
+ level = atoi (sql_row[0]);
+ if (level > 99)
+ level = 99;
+ }
+
+ if (level == 0)
+ {
+ return 0;
+ //not GM
+ }
+
+ mysql_free_result (sql_res);
+
+ return level;
}
//-----------------------------------------------------
// Function to suppress control characters in a string.
//-----------------------------------------------------
-int remove_control_chars(unsigned char *str) {
- int i;
- int change = 0;
-
- for(i = 0; str[i]; i++) {
- if (str[i] < 32) {
- str[i] = '_';
- change = 1;
- }
- }
+int remove_control_chars (unsigned char *str)
+{
+ int i;
+ int change = 0;
+
+ for (i = 0; str[i]; i++)
+ {
+ if (str[i] < 32)
+ {
+ str[i] = '_';
+ change = 1;
+ }
+ }
- return change;
+ return change;
}
//---------------------------------------------------
// E-mail check: return 0 (not correct) or 1 (valid).
//---------------------------------------------------
-int e_mail_check(unsigned char *email) {
- char ch;
- unsigned char* last_arobas;
-
- // athena limits
- if (strlen(email) < 3 || strlen(email) > 39)
- return 0;
-
- // part of RFC limits (official reference of e-mail description)
- if (strchr(email, '@') == NULL || email[strlen(email)-1] == '@')
- return 0;
-
- if (email[strlen(email)-1] == '.')
- return 0;
-
- last_arobas = strrchr(email, '@');
-
- if (strstr(last_arobas, "@.") != NULL ||
- strstr(last_arobas, "..") != NULL)
- return 0;
-
- for(ch = 1; ch < 32; ch++) {
- if (strchr(last_arobas, ch) != NULL) {
- return 0;
- break;
- }
- }
+int e_mail_check (unsigned char *email)
+{
+ char ch;
+ unsigned char *last_arobas;
+
+ // athena limits
+ if (strlen (email) < 3 || strlen (email) > 39)
+ return 0;
+
+ // part of RFC limits (official reference of e-mail description)
+ if (strchr (email, '@') == NULL || email[strlen (email) - 1] == '@')
+ return 0;
+
+ if (email[strlen (email) - 1] == '.')
+ return 0;
+
+ last_arobas = strrchr (email, '@');
+
+ if (strstr (last_arobas, "@.") != NULL ||
+ strstr (last_arobas, "..") != NULL)
+ return 0;
+
+ for (ch = 1; ch < 32; ch++)
+ {
+ if (strchr (last_arobas, ch) != NULL)
+ {
+ return 0;
+ break;
+ }
+ }
- if (strchr(last_arobas, ' ') != NULL ||
- strchr(last_arobas, ';') != NULL)
- return 0;
+ if (strchr (last_arobas, ' ') != NULL ||
+ strchr (last_arobas, ';') != NULL)
+ return 0;
- // all correct
- return 1;
+ // all correct
+ return 1;
}
//-----------------------------------------------------
// Read Account database - mysql db
//-----------------------------------------------------
-int mmo_auth_sqldb_init(void) {
-
- printf("Login server init....\n");
-
- // memory initialize
- printf("memory initialize....\n");
-
- mysql_init(&mysql_handle);
-
- // DB connection start
- printf("Connect Login Database Server....\n");
- if (!mysql_real_connect(&mysql_handle, login_server_ip, login_server_id, login_server_pw,
- login_server_db, login_server_port, (char *)NULL, 0)) {
- // pointer check
- printf("%s\n", mysql_error(&mysql_handle));
- exit(1);
- } else {
- printf("connect success!\n");
- }
-
- sprintf(tmpsql, "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '', 'lserver', '100','login server started')", loginlog_db);
-
- //query
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
-
- return 0;
+int mmo_auth_sqldb_init (void)
+{
+
+ printf ("Login server init....\n");
+
+ // memory initialize
+ printf ("memory initialize....\n");
+
+ mysql_init (&mysql_handle);
+
+ // DB connection start
+ printf ("Connect Login Database Server....\n");
+ if (!mysql_real_connect
+ (&mysql_handle, login_server_ip, login_server_id, login_server_pw,
+ login_server_db, login_server_port, (char *) NULL, 0))
+ {
+ // pointer check
+ printf ("%s\n", mysql_error (&mysql_handle));
+ exit (1);
+ }
+ else
+ {
+ printf ("connect success!\n");
+ }
+
+ sprintf (tmpsql,
+ "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '', 'lserver', '100','login server started')",
+ loginlog_db);
+
+ //query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n", mysql_error (&mysql_handle));
+ }
+
+ return 0;
}
//-----------------------------------------------------
// DB server connect check
//-----------------------------------------------------
-void mmo_auth_sqldb_sync(void) {
- // db connect check? or close?
- // ping pong DB server -if losted? then connect try. else crash.
+void mmo_auth_sqldb_sync (void)
+{
+ // db connect check? or close?
+ // ping pong DB server -if losted? then connect try. else crash.
}
//-----------------------------------------------------
// close DB
//-----------------------------------------------------
-void mmo_db_close(void) {
-
- //set log.
- sprintf(tmpsql,"INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '', 'lserver','100', 'login server shutdown')", loginlog_db);
-
- //query
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
-
- //delete all server status
- sprintf(tmpsql,"DELETE FROM `sstatus`");
- //query
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
-
- mysql_close(&mysql_handle);
- printf("close DB connect....\n");
-
- int i, fd;
-
- for (i = 0; i < MAX_SERVERS; i++) {
- if ((fd = server_fd[i]) >= 0)
- delete_session(fd);
- }
- delete_session(login_fd);
+void mmo_db_close (void)
+{
+
+ //set log.
+ sprintf (tmpsql,
+ "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '', 'lserver','100', 'login server shutdown')",
+ loginlog_db);
+
+ //query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n", mysql_error (&mysql_handle));
+ }
+
+ //delete all server status
+ sprintf (tmpsql, "DELETE FROM `sstatus`");
+ //query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n", mysql_error (&mysql_handle));
+ }
+
+ mysql_close (&mysql_handle);
+ printf ("close DB connect....\n");
+
+ int i, fd;
+
+ for (i = 0; i < MAX_SERVERS; i++)
+ {
+ if ((fd = server_fd[i]) >= 0)
+ delete_session (fd);
+ }
+ delete_session (login_fd);
}
//-----------------------------------------------------
// Make new account
//-----------------------------------------------------
-int mmo_auth_sqldb_new(struct mmo_account* account,const char *tmpstr, char sex) {
- //no need on DB version
+int mmo_auth_sqldb_new (struct mmo_account *account, const char *tmpstr,
+ char sex)
+{
+ //no need on DB version
- printf("Request new account.... - not support on this version\n");
+ printf ("Request new account.... - not support on this version\n");
- return 0;
+ return 0;
}
//-----------------------------------------------------
// Make new account
//-----------------------------------------------------
-int mmo_auth_new(struct mmo_account* account, const char *tmpstr, char sex) {
+int mmo_auth_new (struct mmo_account *account, const char *tmpstr, char sex)
+{
- return 0;
+ return 0;
}
#ifdef LCCWIN32
-extern void gettimeofday(struct timeval *t, struct timezone *dummy);
+extern void gettimeofday (struct timeval *t, struct timezone *dummy);
#endif
//-----------------------------------------------------
// Auth
//-----------------------------------------------------
-int mmo_auth( struct mmo_account* account , int fd){
- struct timeval tv;
- time_t ban_until_time;
- char tmpstr[256];
- char t_uid[256], t_pass[256];
- char user_password[256];
-
- MYSQL_RES* sql_res ;
- MYSQL_ROW sql_row ;
- //int sql_fields, sql_cnt;
- char md5str[64], md5bin[32];
-
- char ip[16];
-
- unsigned char *sin_addr = (unsigned char *)&session[fd]->client_addr.sin_addr;
-
- printf ("auth start...\n");
-
- sprintf(ip, "%d.%d.%d.%d", sin_addr[0], sin_addr[1], sin_addr[2], sin_addr[3]);
-
- // auth start : time seed
- gettimeofday(&tv, NULL);
- strftime(tmpstr, 24, "%Y-%m-%d %H:%M:%S",gmtime(&(tv.tv_sec)));
- sprintf(tmpstr+19, ".%03d", (int)tv.tv_usec/1000);
-
- jstrescapecpy(t_uid,account->userid);
- jstrescapecpy(t_pass, account->passwd);
-
- // make query
- sprintf(tmpsql, "SELECT `%s`,`%s`,`%s`,`lastlogin`,`logincount`,`sex`,`connect_until`,`last_ip`,`ban_until`,`state`,`%s`"
- " FROM `%s` WHERE `%s`='%s'", login_db_account_id, login_db_userid, login_db_user_pass, login_db_level, login_db, login_db_userid, t_uid);
- //login {0-account_id/1-userid/2-user_pass/3-lastlogin/4-logincount/5-sex/6-connect_untl/7-last_ip/8-ban_until/9-state}
-
- // query
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- sql_res = mysql_store_result(&mysql_handle) ;
- if (sql_res) {
- sql_row = mysql_fetch_row(sql_res); //row fetching
- if (!sql_row) {
- //there's no id.
- printf ("auth failed no account %s %s %s\n", tmpstr, account->userid, account->passwd);
- mysql_free_result(sql_res);
- return 0;
- }
- } else {
- printf("mmo_auth DB result error ! \n");
- return 0;
- }
- // Documented by CLOWNISIUS || LLRO || Gunstar lead this one with me
- // IF changed to diferent returns~ you get diferent responses from your msgstringtable.txt
- //Ireturn 2 == line 9
- //Ireturn 5 == line 311
- //Ireturn 6 == line 450
- //Ireturn 7 == line 440
- //Ireturn 8 == line 682
- //Ireturn 9 == line 704
- //Ireturn 10 == line 705
- //Ireturn 11 == line 706
- //Ireturn 12 == line 707
- //Ireturn 13 == line 708
- //Ireturn 14 == line 709
- //Ireturn 15 == line 710
- //Ireturn -1 == line 010
- // Check status
- {
- if (atoi(sql_row[9]) == -3) {
- //id is banned
- mysql_free_result(sql_res);
- return -3;
- } else if (atoi(sql_row[9]) == -2) { //dynamic ban
- //id is banned
- mysql_free_result(sql_res);
- //add IP list.
- return -2;
- }
+int mmo_auth (struct mmo_account *account, int fd)
+{
+ struct timeval tv;
+ time_t ban_until_time;
+ char tmpstr[256];
+ char t_uid[256], t_pass[256];
+ char user_password[256];
+
+ MYSQL_RES *sql_res;
+ MYSQL_ROW sql_row;
+ //int sql_fields, sql_cnt;
+ char md5str[64], md5bin[32];
+
+ char ip[16];
+
+ unsigned char *sin_addr =
+ (unsigned char *) &session[fd]->client_addr.sin_addr;
+
+ printf ("auth start...\n");
+
+ sprintf (ip, "%d.%d.%d.%d", sin_addr[0], sin_addr[1], sin_addr[2],
+ sin_addr[3]);
+
+ // auth start : time seed
+ gettimeofday (&tv, NULL);
+ strftime (tmpstr, 24, "%Y-%m-%d %H:%M:%S", gmtime (&(tv.tv_sec)));
+ sprintf (tmpstr + 19, ".%03d", (int) tv.tv_usec / 1000);
+
+ jstrescapecpy (t_uid, account->userid);
+ jstrescapecpy (t_pass, account->passwd);
+
+ // make query
+ sprintf (tmpsql,
+ "SELECT `%s`,`%s`,`%s`,`lastlogin`,`logincount`,`sex`,`connect_until`,`last_ip`,`ban_until`,`state`,`%s`"
+ " FROM `%s` WHERE `%s`='%s'", login_db_account_id,
+ login_db_userid, login_db_user_pass, login_db_level, login_db,
+ login_db_userid, t_uid);
+ //login {0-account_id/1-userid/2-user_pass/3-lastlogin/4-logincount/5-sex/6-connect_untl/7-last_ip/8-ban_until/9-state}
+
+ // query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n", mysql_error (&mysql_handle));
+ }
+ sql_res = mysql_store_result (&mysql_handle);
+ if (sql_res)
+ {
+ sql_row = mysql_fetch_row (sql_res); //row fetching
+ if (!sql_row)
+ {
+ //there's no id.
+ printf ("auth failed no account %s %s %s\n", tmpstr,
+ account->userid, account->passwd);
+ mysql_free_result (sql_res);
+ return 0;
+ }
+ }
+ else
+ {
+ printf ("mmo_auth DB result error ! \n");
+ return 0;
+ }
+ // Documented by CLOWNISIUS || LLRO || Gunstar lead this one with me
+ // IF changed to diferent returns~ you get diferent responses from your msgstringtable.txt
+ //Ireturn 2 == line 9
+ //Ireturn 5 == line 311
+ //Ireturn 6 == line 450
+ //Ireturn 7 == line 440
+ //Ireturn 8 == line 682
+ //Ireturn 9 == line 704
+ //Ireturn 10 == line 705
+ //Ireturn 11 == line 706
+ //Ireturn 12 == line 707
+ //Ireturn 13 == line 708
+ //Ireturn 14 == line 709
+ //Ireturn 15 == line 710
+ //Ireturn -1 == line 010
+ // Check status
+ {
+ if (atoi (sql_row[9]) == -3)
+ {
+ //id is banned
+ mysql_free_result (sql_res);
+ return -3;
+ }
+ else if (atoi (sql_row[9]) == -2)
+ { //dynamic ban
+ //id is banned
+ mysql_free_result (sql_res);
+ //add IP list.
+ return -2;
+ }
- if (use_md5_passwds) {
- MD5_String(account->passwd,user_password);
- } else {
- jstrescapecpy(user_password, account->passwd);
- }
- printf("account id ok encval:%d\n",account->passwdenc);
- int encpasswdok = 0;
+ if (use_md5_passwds)
+ {
+ MD5_String (account->passwd, user_password);
+ }
+ else
+ {
+ jstrescapecpy (user_password, account->passwd);
+ }
+ printf ("account id ok encval:%d\n", account->passwdenc);
+ int encpasswdok = 0;
#ifdef PASSWORDENC
- if (account->passwdenc > 0) {
- printf ("start md5calc..\n");
- int j = account->passwdenc;
- if (j > 2)
- j = 1;
- do {
- if (j == 1) {
- sprintf(md5str, "%s%s", md5key,sql_row[2]);
- } else if (j == 2) {
- sprintf(md5str, "%s%s", sql_row[2], md5key);
- } else
- md5str[0] = 0;
- printf("j:%d mdstr:%s\n", j, md5str);
- MD5_String2binary(md5str, md5bin);
- encpasswdok = (memcmp(user_password, md5bin, 16) == 0);
- } while (j < 2 && !encpasswdok && (j++) != account->passwdenc);
- //printf("key[%s] md5 [%s] ", md5key, md5);
- printf("client [%s] accountpass [%s]\n", user_password, sql_row[2]);
- printf ("end md5calc..\n");
- }
+ if (account->passwdenc > 0)
+ {
+ printf ("start md5calc..\n");
+ int j = account->passwdenc;
+ if (j > 2)
+ j = 1;
+ do
+ {
+ if (j == 1)
+ {
+ sprintf (md5str, "%s%s", md5key, sql_row[2]);
+ }
+ else if (j == 2)
+ {
+ sprintf (md5str, "%s%s", sql_row[2], md5key);
+ }
+ else
+ md5str[0] = 0;
+ printf ("j:%d mdstr:%s\n", j, md5str);
+ MD5_String2binary (md5str, md5bin);
+ encpasswdok = (memcmp (user_password, md5bin, 16) == 0);
+ }
+ while (j < 2 && !encpasswdok && (j++) != account->passwdenc);
+ //printf("key[%s] md5 [%s] ", md5key, md5);
+ printf ("client [%s] accountpass [%s]\n", user_password,
+ sql_row[2]);
+ printf ("end md5calc..\n");
+ }
#endif
- if ((strcmp(user_password, sql_row[2]) && !encpasswdok)) {
- if (account->passwdenc == 0) {
- printf ("auth failed pass error %s %s %s" RETCODE, tmpstr, account->userid, user_password);
+ if ((strcmp (user_password, sql_row[2]) && !encpasswdok))
+ {
+ if (account->passwdenc == 0)
+ {
+ printf ("auth failed pass error %s %s %s" RETCODE, tmpstr,
+ account->userid, user_password);
#ifdef PASSWORDENC
- } else {
- char logbuf[1024], *p = logbuf;
- int j;
- p += sprintf(p, "auth failed pass error %s %s recv-md5[", tmpstr, account->userid);
- for(j = 0; j < 16; j++)
- p += sprintf(p, "%02x", ((unsigned char *)user_password)[j]);
- p += sprintf(p, "] calc-md5[");
- for(j = 0; j < 16; j++)
- p += sprintf(p, "%02x", ((unsigned char *)md5bin)[j]);
- p += sprintf(p, "] md5key[");
- for(j = 0; j < md5keylen; j++)
- p += sprintf(p, "%02x", ((unsigned char *)md5key)[j]);
- p += sprintf(p, "]" RETCODE);
- printf("%s\n", p);
+ }
+ else
+ {
+ char logbuf[1024], *p = logbuf;
+ int j;
+ p += sprintf (p, "auth failed pass error %s %s recv-md5[",
+ tmpstr, account->userid);
+ for (j = 0; j < 16; j++)
+ p += sprintf (p, "%02x",
+ ((unsigned char *) user_password)[j]);
+ p += sprintf (p, "] calc-md5[");
+ for (j = 0; j < 16; j++)
+ p += sprintf (p, "%02x", ((unsigned char *) md5bin)[j]);
+ p += sprintf (p, "] md5key[");
+ for (j = 0; j < md5keylen; j++)
+ p += sprintf (p, "%02x", ((unsigned char *) md5key)[j]);
+ p += sprintf (p, "]" RETCODE);
+ printf ("%s\n", p);
#endif
- }
- return 1;
- }
- printf("auth ok %s %s" RETCODE, tmpstr, account->userid);
- }
-
- if (atoi(sql_row[9])) {
- switch(atoi(sql_row[9])) { // packet 0x006a value + 1
- case 1: // 0 = Unregistered ID
- case 2: // 1 = Incorrect Password
- case 3: // 2 = This ID is expired
- case 4: // 3 = Rejected from Server
- case 5: // 4 = You have been blocked by the GM Team
- case 6: // 5 = Your Game's EXE file is not the latest version
- case 7: // 6 = Your are Prohibited to log in until %s
- case 8: // 7 = Server is jammed due to over populated
- case 9: // 8 = No MSG (actually, all states after 9 except 99 are No MSG, use only this)
- case 100: // 99 = This ID has been totally erased
- printf("Auth Error #%d\n", atoi(sql_row[9]));
- return atoi(sql_row[9]) - 1;
- break;
- default:
- return 99; // 99 = ID has been totally erased
- break;
- }
- }
+ }
+ return 1;
+ }
+ printf ("auth ok %s %s" RETCODE, tmpstr, account->userid);
+ }
+
+ if (atoi (sql_row[9]))
+ {
+ switch (atoi (sql_row[9]))
+ { // packet 0x006a value + 1
+ case 1: // 0 = Unregistered ID
+ case 2: // 1 = Incorrect Password
+ case 3: // 2 = This ID is expired
+ case 4: // 3 = Rejected from Server
+ case 5: // 4 = You have been blocked by the GM Team
+ case 6: // 5 = Your Game's EXE file is not the latest version
+ case 7: // 6 = Your are Prohibited to log in until %s
+ case 8: // 7 = Server is jammed due to over populated
+ case 9: // 8 = No MSG (actually, all states after 9 except 99 are No MSG, use only this)
+ case 100: // 99 = This ID has been totally erased
+ printf ("Auth Error #%d\n", atoi (sql_row[9]));
+ return atoi (sql_row[9]) - 1;
+ break;
+ default:
+ return 99; // 99 = ID has been totally erased
+ break;
+ }
+ }
/*
// do not remove this section. this is meant for future, and current forums usage
@@ -498,1185 +563,1511 @@ int mmo_auth( struct mmo_account* account , int fd){
}
}
*/
- ban_until_time = atol(sql_row[8]);
-
- //login {0-account_id/1-userid/2-user_pass/3-lastlogin/4-logincount/5-sex/6-connect_untl/7-last_ip/8-ban_until/9-state}
- if (ban_until_time != 0) { // if account is banned
- strftime(tmpstr, 20, date_format, gmtime(&ban_until_time));
- tmpstr[19] = '\0';
- if (ban_until_time > time(NULL)) { // always banned
- return 6; // 6 = Your are Prohibited to log in until %s
- } else { // ban is finished
- // reset the ban time
- sprintf(tmpsql, "UPDATE `%s` SET `ban_until`='0' WHERE `%s`='%s'", login_db, login_db_userid, t_uid);
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- }
- }
-
- if (atol(sql_row[6]) != 0 && atol(sql_row[6]) < time(NULL)) {
- return 2; // 2 = This ID is expired
- }
-
- account->account_id = atoi(sql_row[0]);
- account->login_id1 = rand();
- account->login_id2 = rand();
- memcpy(tmpstr, sql_row[3], 19);
- memcpy(account->lastlogin, tmpstr, 24);
- account->sex = sql_row[5][0] == 'S' ? 2 : sql_row[5][0]=='M';
-
- sprintf(tmpsql, "UPDATE `%s` SET `lastlogin` = NOW(), `logincount`=`logincount` +1, `last_ip`='%s' WHERE `%s` = '%s'",
- login_db, ip, login_db_userid, sql_row[1]);
- mysql_free_result(sql_res) ; //resource free
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
-
- return -1;
+ ban_until_time = atol (sql_row[8]);
+
+ //login {0-account_id/1-userid/2-user_pass/3-lastlogin/4-logincount/5-sex/6-connect_untl/7-last_ip/8-ban_until/9-state}
+ if (ban_until_time != 0)
+ { // if account is banned
+ strftime (tmpstr, 20, date_format, gmtime (&ban_until_time));
+ tmpstr[19] = '\0';
+ if (ban_until_time > time (NULL))
+ { // always banned
+ return 6; // 6 = Your are Prohibited to log in until %s
+ }
+ else
+ { // ban is finished
+ // reset the ban time
+ sprintf (tmpsql,
+ "UPDATE `%s` SET `ban_until`='0' WHERE `%s`='%s'",
+ login_db, login_db_userid, t_uid);
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ }
+ }
+
+ if (atol (sql_row[6]) != 0 && atol (sql_row[6]) < time (NULL))
+ {
+ return 2; // 2 = This ID is expired
+ }
+
+ account->account_id = atoi (sql_row[0]);
+ account->login_id1 = rand ();
+ account->login_id2 = rand ();
+ memcpy (tmpstr, sql_row[3], 19);
+ memcpy (account->lastlogin, tmpstr, 24);
+ account->sex = sql_row[5][0] == 'S' ? 2 : sql_row[5][0] == 'M';
+
+ sprintf (tmpsql,
+ "UPDATE `%s` SET `lastlogin` = NOW(), `logincount`=`logincount` +1, `last_ip`='%s' WHERE `%s` = '%s'",
+ login_db, ip, login_db_userid, sql_row[1]);
+ mysql_free_result (sql_res); //resource free
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n", mysql_error (&mysql_handle));
+ }
+
+ return -1;
}
// Send to char
-int charif_sendallwos(int sfd, unsigned char *buf, unsigned int len) {
- int i, c;
- int fd;
-
- c = 0;
- for(i = 0; i < MAX_SERVERS; i++) {
- if ((fd = server_fd[i]) > 0 && fd != sfd) {
- memcpy(WFIFOP(fd,0), buf, len);
- WFIFOSET(fd,len);
- c++;
- }
- }
+int charif_sendallwos (int sfd, unsigned char *buf, unsigned int len)
+{
+ int i, c;
+ int fd;
+
+ c = 0;
+ for (i = 0; i < MAX_SERVERS; i++)
+ {
+ if ((fd = server_fd[i]) > 0 && fd != sfd)
+ {
+ memcpy (WFIFOP (fd, 0), buf, len);
+ WFIFOSET (fd, len);
+ c++;
+ }
+ }
- return c;
+ return c;
}
//--------------------------------
// Char-server anti-freeze system
//--------------------------------
-int char_anti_freeze_system(int tid, unsigned int tick, int id, int data) {
- int i;
-
- for(i = 0; i < MAX_SERVERS; i++) {
- if (server_fd[i] >= 0) {// if char-server is online
-// printf("char_anti_freeze_system: server #%d '%s', flag: %d.\n", i, server[i].name, server_freezeflag[i]);
- if (server_freezeflag[i]-- < 1) {// Char-server anti-freeze system. Counter. 5 ok, 4...0 freezed
- session[server_fd[i]]->eof = 1;
- }
- }
- }
+int char_anti_freeze_system (int tid, unsigned int tick, int id, int data)
+{
+ int i;
+
+ for (i = 0; i < MAX_SERVERS; i++)
+ {
+ if (server_fd[i] >= 0)
+ { // if char-server is online
+// printf("char_anti_freeze_system: server #%d '%s', flag: %d.\n", i, server[i].name, server_freezeflag[i]);
+ if (server_freezeflag[i]-- < 1)
+ { // Char-server anti-freeze system. Counter. 5 ok, 4...0 freezed
+ session[server_fd[i]]->eof = 1;
+ }
+ }
+ }
- return 0;
+ return 0;
}
//-----------------------------------------------------
// char-server packet parse
//-----------------------------------------------------
-int parse_fromchar(int fd){
- int i, id;
- MYSQL_RES* sql_res;
- MYSQL_ROW sql_row = NULL;
-
- unsigned char *p = (unsigned char *) &session[fd]->client_addr.sin_addr;
- char ip[16];
-
- sprintf(ip, "%d.%d.%d.%d", p[0], p[1], p[2], p[3]);
-
- for(id = 0; id < MAX_SERVERS; id++)
- if (server_fd[id] == fd)
- break;
-
- if (id == MAX_SERVERS || session[fd]->eof) {
- if (id < MAX_SERVERS) {
- printf("Char-server '%s' has disconnected.\n", server[id].name);
- server_fd[id] = -1;
- memset(&server[id], 0, sizeof(struct mmo_char_server));
- // server delete
- sprintf(tmpsql, "DELETE FROM `sstatus` WHERE `index`='%d'", id);
- // query
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- }
- close(fd);
- delete_session(fd);
- return 0;
- }
-
- while(RFIFOREST(fd) >= 2) {
-// printf("char_parse: %d %d packet case=%x\n", fd, RFIFOREST(fd), RFIFOW(fd, 0));
-
- switch (RFIFOW(fd,0)) {
- case 0x2712:
- if (RFIFOREST(fd) < 19)
- return 0;
- {
- int account_id;
- account_id = RFIFOL(fd,2); // speed up
- for(i=0;i<AUTH_FIFO_SIZE;i++){
- if (auth_fifo[i].account_id == account_id &&
- auth_fifo[i].login_id1 == RFIFOL(fd,6) &&
+int parse_fromchar (int fd)
+{
+ int i, id;
+ MYSQL_RES *sql_res;
+ MYSQL_ROW sql_row = NULL;
+
+ unsigned char *p = (unsigned char *) &session[fd]->client_addr.sin_addr;
+ char ip[16];
+
+ sprintf (ip, "%d.%d.%d.%d", p[0], p[1], p[2], p[3]);
+
+ for (id = 0; id < MAX_SERVERS; id++)
+ if (server_fd[id] == fd)
+ break;
+
+ if (id == MAX_SERVERS || session[fd]->eof)
+ {
+ if (id < MAX_SERVERS)
+ {
+ printf ("Char-server '%s' has disconnected.\n", server[id].name);
+ server_fd[id] = -1;
+ memset (&server[id], 0, sizeof (struct mmo_char_server));
+ // server delete
+ sprintf (tmpsql, "DELETE FROM `sstatus` WHERE `index`='%d'", id);
+ // query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ }
+ close (fd);
+ delete_session (fd);
+ return 0;
+ }
+
+ while (RFIFOREST (fd) >= 2)
+ {
+// printf("char_parse: %d %d packet case=%x\n", fd, RFIFOREST(fd), RFIFOW(fd, 0));
+
+ switch (RFIFOW (fd, 0))
+ {
+ case 0x2712:
+ if (RFIFOREST (fd) < 19)
+ return 0;
+ {
+ int account_id;
+ account_id = RFIFOL (fd, 2); // speed up
+ for (i = 0; i < AUTH_FIFO_SIZE; i++)
+ {
+ if (auth_fifo[i].account_id == account_id &&
+ auth_fifo[i].login_id1 == RFIFOL (fd, 6) &&
#if CMP_AUTHFIFO_LOGIN2 != 0
- auth_fifo[i].login_id2 == RFIFOL(fd,10) && // relate to the versions higher than 18
+ auth_fifo[i].login_id2 == RFIFOL (fd, 10) && // relate to the versions higher than 18
#endif
- auth_fifo[i].sex == RFIFOB(fd,14) &&
+ auth_fifo[i].sex == RFIFOB (fd, 14) &&
#if CMP_AUTHFIFO_IP != 0
- auth_fifo[i].ip == RFIFOL(fd,15) &&
+ auth_fifo[i].ip == RFIFOL (fd, 15) &&
#endif
- !auth_fifo[i].delflag) {
- auth_fifo[i].delflag = 1;
- printf("auth -> %d\n", i);
- break;
- }
- }
-
- if (i != AUTH_FIFO_SIZE) { // send account_reg
- int p;
- time_t connect_until_time = 0;
- char email[40] = "";
- account_id=RFIFOL(fd,2);
- sprintf(tmpsql, "SELECT `email`,`connect_until` FROM `%s` WHERE `%s`='%d'", login_db, login_db_account_id, account_id);
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- sql_res = mysql_store_result(&mysql_handle) ;
- if (sql_res) {
- sql_row = mysql_fetch_row(sql_res);
- connect_until_time = atol(sql_row[1]);
- strcpy(email, sql_row[0]);
- }
- mysql_free_result(sql_res);
- if (account_id > 0) {
- sprintf(tmpsql, "SELECT `str`,`value` FROM `global_reg_value` WHERE `type`='1' AND `account_id`='%d'",account_id);
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- sql_res = mysql_store_result(&mysql_handle) ;
- if (sql_res) {
- WFIFOW(fd,0) = 0x2729;
- WFIFOL(fd,4) = account_id;
- for(p = 8; (sql_row = mysql_fetch_row(sql_res));p+=36){
- memcpy(WFIFOP(fd,p), sql_row[0], 32);
- WFIFOL(fd,p+32) = atoi(sql_row[1]);
- }
- WFIFOW(fd,2) = p;
- WFIFOSET(fd,p);
- //printf("account_reg2 send : login->char (auth fifo)\n");
- WFIFOW(fd,0) = 0x2713;
- WFIFOL(fd,2) = account_id;
- WFIFOB(fd,6) = 0;
- memcpy(WFIFOP(fd, 7), email, 40);
- WFIFOL(fd,47) = (unsigned long) connect_until_time;
- WFIFOSET(fd,51);
- }
- mysql_free_result(sql_res);
- }
- } else {
- WFIFOW(fd,0) = 0x2713;
- WFIFOL(fd,2) = account_id;
- WFIFOB(fd,6) = 1;
- WFIFOSET(fd,51);
- }
- }
- RFIFOSKIP(fd,19);
- break;
-
- case 0x2714:
- if (RFIFOREST(fd) < 6)
- return 0;
- // how many users on world? (update)
- if (server[id].users != RFIFOL(fd,2))
- printf("set users %s : %d\n", server[id].name, RFIFOL(fd,2));
- server[id].users = RFIFOL(fd,2);
- if(anti_freeze_enable)
- server_freezeflag[id] = 5; // Char anti-freeze system. Counter. 5 ok, 4...0 freezed
-
- sprintf(tmpsql,"UPDATE `sstatus` SET `user` = '%d' WHERE `index` = '%d'", server[id].users, id);
- // query
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- RFIFOSKIP(fd,6);
- break;
-
- // We receive an e-mail/limited time request, because a player comes back from a map-server to the char-server
- case 0x2716:
- if (RFIFOREST(fd) < 6)
- return 0;
- {
- int account_id;
- time_t connect_until_time = 0;
- char email[40] = "";
- account_id=RFIFOL(fd,2);
- sprintf(tmpsql,"SELECT `email`,`connect_until` FROM `%s` WHERE `%s`='%d'",login_db, login_db_account_id, account_id);
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- sql_res = mysql_store_result(&mysql_handle) ;
- if (sql_res) {
- sql_row = mysql_fetch_row(sql_res);
- connect_until_time = atol(sql_row[1]);
- strcpy(email, sql_row[0]);
- }
- mysql_free_result(sql_res);
- //printf("parse_fromchar: E-mail/limited time request from '%s' server (concerned account: %d)\n", server[id].name, RFIFOL(fd,2));
- WFIFOW(fd,0) = 0x2717;
- WFIFOL(fd,2) = RFIFOL(fd,2);
- memcpy(WFIFOP(fd, 6), email, 40);
- WFIFOL(fd,46) = (unsigned long) connect_until_time;
- WFIFOSET(fd,50);
- }
- RFIFOSKIP(fd,6);
- break;
+ !auth_fifo[i].delflag)
+ {
+ auth_fifo[i].delflag = 1;
+ printf ("auth -> %d\n", i);
+ break;
+ }
+ }
- case 0x2720: // GM
- if (RFIFOREST(fd) < 4)
- return 0;
- if (RFIFOREST(fd) < RFIFOW(fd,2))
- return 0;
- //oldacc = RFIFOL(fd,4);
- printf("change GM isn't support in this login server version.\n");
- printf("change GM error 0 %s\n", RFIFOP(fd, 8));
-
- RFIFOSKIP(fd, RFIFOW(fd, 2));
- WFIFOW(fd, 0) = 0x2721;
- WFIFOL(fd, 2) = RFIFOL(fd,4); // oldacc;
- WFIFOL(fd, 6) = 0; // newacc;
- WFIFOSET(fd, 10);
- return 0;
-
- // Map server send information to change an email of an account via char-server
- case 0x2722: // 0x2722 <account_id>.L <actual_e-mail>.40B <new_e-mail>.40B
- if (RFIFOREST(fd) < 86)
- return 0;
- {
- int acc;
- char actual_email[40], new_email[40];
- acc = RFIFOL(fd,2);
- memcpy(actual_email, RFIFOP(fd,6), 40);
- memcpy(new_email, RFIFOP(fd,46), 40);
- if (e_mail_check(actual_email) == 0)
- printf("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command), but actual email is invalid (account: %d, ip: %s)" RETCODE,
- server[id].name, acc, ip);
- else if (e_mail_check(new_email) == 0)
- printf("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command) with a invalid new e-mail (account: %d, ip: %s)" RETCODE,
- server[id].name, acc, ip);
- else if (strcmpi(new_email, "a@a.com") == 0)
- printf("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command) with a default e-mail (account: %d, ip: %s)" RETCODE,
- server[id].name, acc, ip);
- else {
- sprintf(tmpsql, "SELECT `%s`,`email` FROM `%s` WHERE `%s` = '%d'", login_db_userid, login_db, login_db_account_id, acc);
- if (mysql_query(&mysql_handle, tmpsql))
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- sql_res = mysql_store_result(&mysql_handle);
- if (sql_res) {
- sql_row = mysql_fetch_row(sql_res); //row fetching
-
- if (strcmpi(sql_row[1], actual_email) == 0) {
- sprintf(tmpsql, "UPDATE `%s` SET `email` = '%s' WHERE `%s` = '%d'", login_db, new_email, login_db_account_id, acc);
- // query
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- printf("Char-server '%s': Modify an e-mail on an account (@email GM command) (account: %d (%s), new e-mail: %s, ip: %s)." RETCODE,
- server[id].name, acc, sql_row[0], actual_email, ip);
- }
- }
-
- }
- }
- RFIFOSKIP(fd, 86);
- break;
+ if (i != AUTH_FIFO_SIZE)
+ { // send account_reg
+ int p;
+ time_t connect_until_time = 0;
+ char email[40] = "";
+ account_id = RFIFOL (fd, 2);
+ sprintf (tmpsql,
+ "SELECT `email`,`connect_until` FROM `%s` WHERE `%s`='%d'",
+ login_db, login_db_account_id, account_id);
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ sql_res = mysql_store_result (&mysql_handle);
+ if (sql_res)
+ {
+ sql_row = mysql_fetch_row (sql_res);
+ connect_until_time = atol (sql_row[1]);
+ strcpy (email, sql_row[0]);
+ }
+ mysql_free_result (sql_res);
+ if (account_id > 0)
+ {
+ sprintf (tmpsql,
+ "SELECT `str`,`value` FROM `global_reg_value` WHERE `type`='1' AND `account_id`='%d'",
+ account_id);
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ sql_res = mysql_store_result (&mysql_handle);
+ if (sql_res)
+ {
+ WFIFOW (fd, 0) = 0x2729;
+ WFIFOL (fd, 4) = account_id;
+ for (p = 8;
+ (sql_row = mysql_fetch_row (sql_res));
+ p += 36)
+ {
+ memcpy (WFIFOP (fd, p), sql_row[0], 32);
+ WFIFOL (fd, p + 32) = atoi (sql_row[1]);
+ }
+ WFIFOW (fd, 2) = p;
+ WFIFOSET (fd, p);
+ //printf("account_reg2 send : login->char (auth fifo)\n");
+ WFIFOW (fd, 0) = 0x2713;
+ WFIFOL (fd, 2) = account_id;
+ WFIFOB (fd, 6) = 0;
+ memcpy (WFIFOP (fd, 7), email, 40);
+ WFIFOL (fd, 47) =
+ (unsigned long) connect_until_time;
+ WFIFOSET (fd, 51);
+ }
+ mysql_free_result (sql_res);
+ }
+ }
+ else
+ {
+ WFIFOW (fd, 0) = 0x2713;
+ WFIFOL (fd, 2) = account_id;
+ WFIFOB (fd, 6) = 1;
+ WFIFOSET (fd, 51);
+ }
+ }
+ RFIFOSKIP (fd, 19);
+ break;
+
+ case 0x2714:
+ if (RFIFOREST (fd) < 6)
+ return 0;
+ // how many users on world? (update)
+ if (server[id].users != RFIFOL (fd, 2))
+ printf ("set users %s : %d\n", server[id].name,
+ RFIFOL (fd, 2));
+ server[id].users = RFIFOL (fd, 2);
+ if (anti_freeze_enable)
+ server_freezeflag[id] = 5; // Char anti-freeze system. Counter. 5 ok, 4...0 freezed
+
+ sprintf (tmpsql,
+ "UPDATE `sstatus` SET `user` = '%d' WHERE `index` = '%d'",
+ server[id].users, id);
+ // query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ RFIFOSKIP (fd, 6);
+ break;
+
+ // We receive an e-mail/limited time request, because a player comes back from a map-server to the char-server
+ case 0x2716:
+ if (RFIFOREST (fd) < 6)
+ return 0;
+ {
+ int account_id;
+ time_t connect_until_time = 0;
+ char email[40] = "";
+ account_id = RFIFOL (fd, 2);
+ sprintf (tmpsql,
+ "SELECT `email`,`connect_until` FROM `%s` WHERE `%s`='%d'",
+ login_db, login_db_account_id, account_id);
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ sql_res = mysql_store_result (&mysql_handle);
+ if (sql_res)
+ {
+ sql_row = mysql_fetch_row (sql_res);
+ connect_until_time = atol (sql_row[1]);
+ strcpy (email, sql_row[0]);
+ }
+ mysql_free_result (sql_res);
+ //printf("parse_fromchar: E-mail/limited time request from '%s' server (concerned account: %d)\n", server[id].name, RFIFOL(fd,2));
+ WFIFOW (fd, 0) = 0x2717;
+ WFIFOL (fd, 2) = RFIFOL (fd, 2);
+ memcpy (WFIFOP (fd, 6), email, 40);
+ WFIFOL (fd, 46) = (unsigned long) connect_until_time;
+ WFIFOSET (fd, 50);
+ }
+ RFIFOSKIP (fd, 6);
+ break;
+
+ case 0x2720: // GM
+ if (RFIFOREST (fd) < 4)
+ return 0;
+ if (RFIFOREST (fd) < RFIFOW (fd, 2))
+ return 0;
+ //oldacc = RFIFOL(fd,4);
+ printf
+ ("change GM isn't support in this login server version.\n");
+ printf ("change GM error 0 %s\n", RFIFOP (fd, 8));
+
+ RFIFOSKIP (fd, RFIFOW (fd, 2));
+ WFIFOW (fd, 0) = 0x2721;
+ WFIFOL (fd, 2) = RFIFOL (fd, 4); // oldacc;
+ WFIFOL (fd, 6) = 0; // newacc;
+ WFIFOSET (fd, 10);
+ return 0;
+
+ // Map server send information to change an email of an account via char-server
+ case 0x2722: // 0x2722 <account_id>.L <actual_e-mail>.40B <new_e-mail>.40B
+ if (RFIFOREST (fd) < 86)
+ return 0;
+ {
+ int acc;
+ char actual_email[40], new_email[40];
+ acc = RFIFOL (fd, 2);
+ memcpy (actual_email, RFIFOP (fd, 6), 40);
+ memcpy (new_email, RFIFOP (fd, 46), 40);
+ if (e_mail_check (actual_email) == 0)
+ printf
+ ("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command), but actual email is invalid (account: %d, ip: %s)"
+ RETCODE, server[id].name, acc, ip);
+ else if (e_mail_check (new_email) == 0)
+ printf
+ ("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command) with a invalid new e-mail (account: %d, ip: %s)"
+ RETCODE, server[id].name, acc, ip);
+ else if (strcmpi (new_email, "a@a.com") == 0)
+ printf
+ ("Char-server '%s': Attempt to modify an e-mail on an account (@email GM command) with a default e-mail (account: %d, ip: %s)"
+ RETCODE, server[id].name, acc, ip);
+ else
+ {
+ sprintf (tmpsql,
+ "SELECT `%s`,`email` FROM `%s` WHERE `%s` = '%d'",
+ login_db_userid, login_db,
+ login_db_account_id, acc);
+ if (mysql_query (&mysql_handle, tmpsql))
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ sql_res = mysql_store_result (&mysql_handle);
+ if (sql_res)
+ {
+ sql_row = mysql_fetch_row (sql_res); //row fetching
+
+ if (strcmpi (sql_row[1], actual_email) == 0)
+ {
+ sprintf (tmpsql,
+ "UPDATE `%s` SET `email` = '%s' WHERE `%s` = '%d'",
+ login_db, new_email,
+ login_db_account_id, acc);
+ // query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ printf
+ ("Char-server '%s': Modify an e-mail on an account (@email GM command) (account: %d (%s), new e-mail: %s, ip: %s)."
+ RETCODE, server[id].name, acc,
+ sql_row[0], actual_email, ip);
+ }
+ }
- case 0x2724: // Receiving of map-server via char-server a status change resquest (by Yor)
- if (RFIFOREST(fd) < 10)
- return 0;
- {
- int acc, statut;
- acc = RFIFOL(fd,2);
- statut = RFIFOL(fd,6);
- sprintf(tmpsql, "SELECT `state` FROM `%s` WHERE `%s` = '%d'", login_db, login_db_account_id, acc);
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- sql_res = mysql_store_result(&mysql_handle);
- if (sql_res) {
- sql_row = mysql_fetch_row(sql_res); // row fetching
- }
- if (atoi(sql_row[0]) != statut && statut != 0) {
- unsigned char buf[16];
- WBUFW(buf,0) = 0x2731;
- WBUFL(buf,2) = acc;
- WBUFB(buf,6) = 0; // 0: change of statut, 1: ban
- WBUFL(buf,7) = statut; // status or final date of a banishment
- charif_sendallwos(-1, buf, 11);
- }
- sprintf(tmpsql,"UPDATE `%s` SET `state` = '%d' WHERE `%s` = '%d'", login_db, statut,login_db_account_id,acc);
- //query
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- RFIFOSKIP(fd,10);
- }
- return 0;
-
- case 0x2725: // Receiving of map-server via char-server a ban resquest (by Yor)
- if (RFIFOREST(fd) < 18)
- return 0;
- {
- int acc;
- struct tm *tmtime;
- time_t timestamp, tmptime;
- acc = RFIFOL(fd,2);
- sprintf(tmpsql, "SELECT `ban_until` FROM `%s` WHERE `%s` = '%d'",login_db,login_db_account_id,acc);
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- sql_res = mysql_store_result(&mysql_handle);
- if (sql_res) {
- sql_row = mysql_fetch_row(sql_res); // row fetching
- }
- tmptime = atol(sql_row[0]);
- if (tmptime == 0 || tmptime < time(NULL))
- timestamp = time(NULL);
- else
- timestamp = tmptime;
- tmtime = gmtime(&timestamp);
- tmtime->tm_year = tmtime->tm_year + (short)RFIFOW(fd,6);
- tmtime->tm_mon = tmtime->tm_mon + (short)RFIFOW(fd,8);
- tmtime->tm_mday = tmtime->tm_mday + (short)RFIFOW(fd,10);
- tmtime->tm_hour = tmtime->tm_hour + (short)RFIFOW(fd,12);
- tmtime->tm_min = tmtime->tm_min + (short)RFIFOW(fd,14);
- tmtime->tm_sec = tmtime->tm_sec + (short)RFIFOW(fd,16);
- timestamp = timegm(tmtime);
- if (timestamp != -1) {
- if (timestamp <= time(NULL))
- timestamp = 0;
- if (tmptime != timestamp) {
- if (timestamp != 0) {
- unsigned char buf[16];
- WBUFW(buf,0) = 0x2731;
- WBUFL(buf,2) = acc;
- WBUFB(buf,6) = 1; // 0: change of statut, 1: ban
- WBUFL(buf,7) = timestamp; // status or final date of a banishment
- charif_sendallwos(-1, buf, 11);
- }
- printf("Account: %d Banned until: %ld\n", acc, timestamp);
- sprintf(tmpsql, "UPDATE `%s` SET `ban_until` = '%ld', `state`='7' WHERE `%s` = '%d'", login_db, timestamp, login_db_account_id, acc);
- // query
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- }
- }
- RFIFOSKIP(fd,18);
- break;
- }
- return 0;
-
- case 0x2727:
- if (RFIFOREST(fd) < 6)
- return 0;
- {
- int acc,sex;
- unsigned char buf[16];
- acc=RFIFOL(fd,4);
- sprintf(tmpsql,"SELECT `sex` FROM `%s` WHERE `%s` = '%d'",login_db,login_db_account_id,acc);
-
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- return 0;
+ }
}
-
- sql_res = mysql_store_result(&mysql_handle) ;
-
- if (sql_res) {
- if (mysql_num_rows(sql_res) == 0) {
- mysql_free_result(sql_res);
- return 0;
- }
- sql_row = mysql_fetch_row(sql_res); //row fetching
- }
-
- if (strcmpi(sql_row[0], "M") == 0)
- sex = 1;
- else
- sex = 0;
- sprintf(tmpsql,"UPDATE `%s` SET `sex` = '%c' WHERE `%s` = '%d'", login_db, (sex==0?'M':'F'), login_db_account_id, acc);
- //query
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- WBUFW(buf,0) = 0x2723;
- WBUFL(buf,2) = acc;
- WBUFB(buf,6) = sex;
- charif_sendallwos(-1, buf, 7);
- RFIFOSKIP(fd,6);
- }
- return 0;
-
- case 0x2728: // save account_reg
- if (RFIFOREST(fd) < 4 || RFIFOREST(fd) < RFIFOW(fd,2))
- return 0;
- {
- int acc,p,j;
- char str[32];
- char temp_str[32];
- int value;
- acc=RFIFOL(fd,4);
-
- if (acc>0){
- unsigned char buf[RFIFOW(fd,2)+1];
- for(p=8,j=0;p<RFIFOW(fd,2) && j<ACCOUNT_REG2_NUM;p+=36,j++){
- memcpy(str,RFIFOP(fd,p),32);
- value=RFIFOL(fd,p+32);
- sprintf(tmpsql,"DELETE FROM `global_reg_value` WHERE `type`='1' AND `account_id`='%d' AND `str`='%s';",acc,jstrescapecpy(temp_str,str));
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- sprintf(tmpsql,"INSERT INTO `global_reg_value` (`type`, `account_id`, `str`, `value`) VALUES ( 1 , '%d' , '%s' , '%d');", acc, jstrescapecpy(temp_str,str), value);
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- }
-
- // Send to char
- memcpy(WBUFP(buf,0),RFIFOP(fd,0),RFIFOW(fd,2));
- WBUFW(buf,0)=0x2729;
- charif_sendallwos(fd,buf,WBUFW(buf,2));
- }
- }
- RFIFOSKIP(fd,RFIFOW(fd,2));
- //printf("login: save account_reg (from char)\n");
- break;
-
- case 0x272a: // Receiving of map-server via char-server a unban resquest (by Yor)
- if (RFIFOREST(fd) < 6)
- return 0;
- {
- int acc;
- acc = RFIFOL(fd,2);
- sprintf(tmpsql,"SELECT `ban_until` FROM `%s` WHERE `%s` = '%d'",login_db,login_db_account_id,acc);
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
+ RFIFOSKIP (fd, 86);
+ break;
+
+ case 0x2724: // Receiving of map-server via char-server a status change resquest (by Yor)
+ if (RFIFOREST (fd) < 10)
+ return 0;
+ {
+ int acc, statut;
+ acc = RFIFOL (fd, 2);
+ statut = RFIFOL (fd, 6);
+ sprintf (tmpsql,
+ "SELECT `state` FROM `%s` WHERE `%s` = '%d'",
+ login_db, login_db_account_id, acc);
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ sql_res = mysql_store_result (&mysql_handle);
+ if (sql_res)
+ {
+ sql_row = mysql_fetch_row (sql_res); // row fetching
+ }
+ if (atoi (sql_row[0]) != statut && statut != 0)
+ {
+ unsigned char buf[16];
+ WBUFW (buf, 0) = 0x2731;
+ WBUFL (buf, 2) = acc;
+ WBUFB (buf, 6) = 0; // 0: change of statut, 1: ban
+ WBUFL (buf, 7) = statut; // status or final date of a banishment
+ charif_sendallwos (-1, buf, 11);
+ }
+ sprintf (tmpsql,
+ "UPDATE `%s` SET `state` = '%d' WHERE `%s` = '%d'",
+ login_db, statut, login_db_account_id, acc);
+ //query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ RFIFOSKIP (fd, 10);
}
- sql_res = mysql_store_result(&mysql_handle) ;
- if (sql_res) {
- sql_row = mysql_fetch_row(sql_res); //row fetching
+ return 0;
+
+ case 0x2725: // Receiving of map-server via char-server a ban resquest (by Yor)
+ if (RFIFOREST (fd) < 18)
+ return 0;
+ {
+ int acc;
+ struct tm *tmtime;
+ time_t timestamp, tmptime;
+ acc = RFIFOL (fd, 2);
+ sprintf (tmpsql,
+ "SELECT `ban_until` FROM `%s` WHERE `%s` = '%d'",
+ login_db, login_db_account_id, acc);
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ sql_res = mysql_store_result (&mysql_handle);
+ if (sql_res)
+ {
+ sql_row = mysql_fetch_row (sql_res); // row fetching
+ }
+ tmptime = atol (sql_row[0]);
+ if (tmptime == 0 || tmptime < time (NULL))
+ timestamp = time (NULL);
+ else
+ timestamp = tmptime;
+ tmtime = gmtime (&timestamp);
+ tmtime->tm_year =
+ tmtime->tm_year + (short) RFIFOW (fd, 6);
+ tmtime->tm_mon = tmtime->tm_mon + (short) RFIFOW (fd, 8);
+ tmtime->tm_mday =
+ tmtime->tm_mday + (short) RFIFOW (fd, 10);
+ tmtime->tm_hour =
+ tmtime->tm_hour + (short) RFIFOW (fd, 12);
+ tmtime->tm_min = tmtime->tm_min + (short) RFIFOW (fd, 14);
+ tmtime->tm_sec = tmtime->tm_sec + (short) RFIFOW (fd, 16);
+ timestamp = timegm (tmtime);
+ if (timestamp != -1)
+ {
+ if (timestamp <= time (NULL))
+ timestamp = 0;
+ if (tmptime != timestamp)
+ {
+ if (timestamp != 0)
+ {
+ unsigned char buf[16];
+ WBUFW (buf, 0) = 0x2731;
+ WBUFL (buf, 2) = acc;
+ WBUFB (buf, 6) = 1; // 0: change of statut, 1: ban
+ WBUFL (buf, 7) = timestamp; // status or final date of a banishment
+ charif_sendallwos (-1, buf, 11);
+ }
+ printf ("Account: %d Banned until: %ld\n", acc,
+ timestamp);
+ sprintf (tmpsql,
+ "UPDATE `%s` SET `ban_until` = '%ld', `state`='7' WHERE `%s` = '%d'",
+ login_db, timestamp, login_db_account_id,
+ acc);
+ // query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ }
+ }
+ RFIFOSKIP (fd, 18);
+ break;
}
- if (atol(sql_row[0]) != 0) {
- sprintf(tmpsql,"UPDATE `%s` SET `ban_until` = '0', `state`='0' WHERE `%s` = '%d'", login_db,login_db_account_id,acc);
+ return 0;
+
+ case 0x2727:
+ if (RFIFOREST (fd) < 6)
+ return 0;
+ {
+ int acc, sex;
+ unsigned char buf[16];
+ acc = RFIFOL (fd, 4);
+ sprintf (tmpsql,
+ "SELECT `sex` FROM `%s` WHERE `%s` = '%d'",
+ login_db, login_db_account_id, acc);
+
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ return 0;
+ }
+
+ sql_res = mysql_store_result (&mysql_handle);
+
+ if (sql_res)
+ {
+ if (mysql_num_rows (sql_res) == 0)
+ {
+ mysql_free_result (sql_res);
+ return 0;
+ }
+ sql_row = mysql_fetch_row (sql_res); //row fetching
+ }
+
+ if (strcmpi (sql_row[0], "M") == 0)
+ sex = 1;
+ else
+ sex = 0;
+ sprintf (tmpsql,
+ "UPDATE `%s` SET `sex` = '%c' WHERE `%s` = '%d'",
+ login_db, (sex == 0 ? 'M' : 'F'),
+ login_db_account_id, acc);
//query
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
}
- break;
- }
- RFIFOSKIP(fd,6);
- }
- return 0;
-
- default:
- printf("login: unknown packet %x! (from char).\n", RFIFOW(fd,0));
- session[fd]->eof = 1;
- return 0;
- }
- }
+ WBUFW (buf, 0) = 0x2723;
+ WBUFL (buf, 2) = acc;
+ WBUFB (buf, 6) = sex;
+ charif_sendallwos (-1, buf, 7);
+ RFIFOSKIP (fd, 6);
+ }
+ return 0;
+
+ case 0x2728: // save account_reg
+ if (RFIFOREST (fd) < 4 || RFIFOREST (fd) < RFIFOW (fd, 2))
+ return 0;
+ {
+ int acc, p, j;
+ char str[32];
+ char temp_str[32];
+ int value;
+ acc = RFIFOL (fd, 4);
+
+ if (acc > 0)
+ {
+ unsigned char buf[RFIFOW (fd, 2) + 1];
+ for (p = 8, j = 0;
+ p < RFIFOW (fd, 2) && j < ACCOUNT_REG2_NUM;
+ p += 36, j++)
+ {
+ memcpy (str, RFIFOP (fd, p), 32);
+ value = RFIFOL (fd, p + 32);
+ sprintf (tmpsql,
+ "DELETE FROM `global_reg_value` WHERE `type`='1' AND `account_id`='%d' AND `str`='%s';",
+ acc, jstrescapecpy (temp_str, str));
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ sprintf (tmpsql,
+ "INSERT INTO `global_reg_value` (`type`, `account_id`, `str`, `value`) VALUES ( 1 , '%d' , '%s' , '%d');",
+ acc, jstrescapecpy (temp_str, str),
+ value);
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ }
+
+ // Send to char
+ memcpy (WBUFP (buf, 0), RFIFOP (fd, 0),
+ RFIFOW (fd, 2));
+ WBUFW (buf, 0) = 0x2729;
+ charif_sendallwos (fd, buf, WBUFW (buf, 2));
+ }
+ }
+ RFIFOSKIP (fd, RFIFOW (fd, 2));
+ //printf("login: save account_reg (from char)\n");
+ break;
+
+ case 0x272a: // Receiving of map-server via char-server a unban resquest (by Yor)
+ if (RFIFOREST (fd) < 6)
+ return 0;
+ {
+ int acc;
+ acc = RFIFOL (fd, 2);
+ sprintf (tmpsql,
+ "SELECT `ban_until` FROM `%s` WHERE `%s` = '%d'",
+ login_db, login_db_account_id, acc);
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ sql_res = mysql_store_result (&mysql_handle);
+ if (sql_res)
+ {
+ sql_row = mysql_fetch_row (sql_res); //row fetching
+ }
+ if (atol (sql_row[0]) != 0)
+ {
+ sprintf (tmpsql,
+ "UPDATE `%s` SET `ban_until` = '0', `state`='0' WHERE `%s` = '%d'",
+ login_db, login_db_account_id, acc);
+ //query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ break;
+ }
+ RFIFOSKIP (fd, 6);
+ }
+ return 0;
- return 0;
+ default:
+ printf ("login: unknown packet %x! (from char).\n",
+ RFIFOW (fd, 0));
+ session[fd]->eof = 1;
+ return 0;
+ }
+ }
+
+ return 0;
}
//Lan ip check added by Kashy
-int lan_ip_check(unsigned char *p) {
- int y;
- int lancheck = 1;
- int lancharip[4];
-
- unsigned int k0, k1, k2, k3;
- sscanf(lan_char_ip, "%d.%d.%d.%d", &k0, &k1, &k2, &k3);
- lancharip[0] = k0; lancharip[1] = k1; lancharip[2] = k2; lancharip[3] = k3;
-
- for(y = 0; y < 4; y++) {
- if ((lancharip[y] & subnetmaski[y])!= (p[y]))
- lancheck = 0;
- break; }
-
- printf("LAN check: %s.\n", (lancheck) ? "\033[1;32mLAN\033[0m" : "\033[1;31mWAN\033[0m");
- return lancheck;
+int lan_ip_check (unsigned char *p)
+{
+ int y;
+ int lancheck = 1;
+ int lancharip[4];
+
+ unsigned int k0, k1, k2, k3;
+ sscanf (lan_char_ip, "%d.%d.%d.%d", &k0, &k1, &k2, &k3);
+ lancharip[0] = k0;
+ lancharip[1] = k1;
+ lancharip[2] = k2;
+ lancharip[3] = k3;
+
+ for (y = 0; y < 4; y++)
+ {
+ if ((lancharip[y] & subnetmaski[y]) != (p[y]))
+ lancheck = 0;
+ break;
+ }
+
+ printf ("LAN check: %s.\n",
+ (lancheck) ? "\033[1;32mLAN\033[0m" : "\033[1;31mWAN\033[0m");
+ return lancheck;
}
//----------------------------------------------------------------------------------------
// Default packet parsing (normal players or administation/char-server connection requests)
//----------------------------------------------------------------------------------------
-int parse_login(int fd) {
- //int len;
-
- MYSQL_RES* sql_res ;
- MYSQL_ROW sql_row = NULL;
-
- char t_uid[100];
- //int sql_fields, sql_cnt;
- struct mmo_account account;
-
- int result, i;
- unsigned char *p = (unsigned char *) &session[fd]->client_addr.sin_addr;
- char ip[16];
-
- sprintf(ip, "%d.%d.%d.%d", p[0], p[1], p[2], p[3]);
-
- if (ipban > 0) {
- //ip ban
- //p[0], p[1], p[2], p[3]
- //request DB connection
- //check
- sprintf(tmpsql, "SELECT count(*) FROM `ipbanlist` WHERE `list` = '%d.*.*.*' OR `list` = '%d.%d.*.*' OR `list` = '%d.%d.%d.*' OR `list` = '%d.%d.%d.%d'",
- p[0], p[0], p[1], p[0], p[1], p[2], p[0], p[1], p[2], p[3]);
- if (mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
-
- sql_res = mysql_store_result(&mysql_handle) ;
- sql_row = mysql_fetch_row(sql_res); //row fetching
-
- if (atoi(sql_row[0]) >0) {
- // ip ban ok.
- printf ("packet from banned ip : %d.%d.%d.%d" RETCODE, p[0], p[1], p[2], p[3]);
- sprintf(tmpsql,"INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', 'unknown','-3', 'ip banned')", loginlog_db, p[0], p[1], p[2], p[3]);
-
- // query
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- printf ("close session connection...\n");
-
- // close connection
- session[fd]->eof = 1;
-
- } else {
- printf ("packet from ip (ban check ok) : %d.%d.%d.%d" RETCODE, p[0], p[1], p[2], p[3]);
- }
- mysql_free_result(sql_res);
- }
-
- if (session[fd]->eof) {
- for(i = 0; i < MAX_SERVERS; i++)
- if (server_fd[i] == fd)
- server_fd[i] = -1;
- close(fd);
- delete_session(fd);
- return 0;
- }
-
- while(RFIFOREST(fd)>=2){
- printf("parse_login : %d %d packet case=%x\n", fd, RFIFOREST(fd), RFIFOW(fd,0));
-
- switch(RFIFOW(fd,0)){
- case 0x200: // New alive packet: structure: 0x200 <account.userid>.24B. used to verify if client is always alive.
- if (RFIFOREST(fd) < 26)
- return 0;
- RFIFOSKIP(fd,26);
- break;
-
- case 0x204: // New alive packet: structure: 0x204 <encrypted.account.userid>.16B. (new ragexe from 22 june 2004)
- if (RFIFOREST(fd) < 18)
- return 0;
- RFIFOSKIP(fd,18);
- break;
+int parse_login (int fd)
+{
+ //int len;
+
+ MYSQL_RES *sql_res;
+ MYSQL_ROW sql_row = NULL;
+
+ char t_uid[100];
+ //int sql_fields, sql_cnt;
+ struct mmo_account account;
+
+ int result, i;
+ unsigned char *p = (unsigned char *) &session[fd]->client_addr.sin_addr;
+ char ip[16];
+
+ sprintf (ip, "%d.%d.%d.%d", p[0], p[1], p[2], p[3]);
+
+ if (ipban > 0)
+ {
+ //ip ban
+ //p[0], p[1], p[2], p[3]
+ //request DB connection
+ //check
+ sprintf (tmpsql,
+ "SELECT count(*) FROM `ipbanlist` WHERE `list` = '%d.*.*.*' OR `list` = '%d.%d.*.*' OR `list` = '%d.%d.%d.*' OR `list` = '%d.%d.%d.%d'",
+ p[0], p[0], p[1], p[0], p[1], p[2], p[0], p[1], p[2], p[3]);
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n", mysql_error (&mysql_handle));
+ }
- case 0x64: // request client login
- case 0x01dd: // request client login with encrypt
- if(RFIFOREST(fd)< ((RFIFOW(fd, 0) ==0x64)?55:47))
- return 0;
+ sql_res = mysql_store_result (&mysql_handle);
+ sql_row = mysql_fetch_row (sql_res); //row fetching
+
+ if (atoi (sql_row[0]) > 0)
+ {
+ // ip ban ok.
+ printf ("packet from banned ip : %d.%d.%d.%d" RETCODE, p[0], p[1],
+ p[2], p[3]);
+ sprintf (tmpsql,
+ "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', 'unknown','-3', 'ip banned')",
+ loginlog_db, p[0], p[1], p[2], p[3]);
+
+ // query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ printf ("close session connection...\n");
- printf("client connection request %s from %d.%d.%d.%d\n", RFIFOP(fd, 6), p[0], p[1], p[2], p[3]);
+ // close connection
+ session[fd]->eof = 1;
- account.userid = RFIFOP(fd, 6);
- account.passwd = RFIFOP(fd, 30);
+ }
+ else
+ {
+ printf ("packet from ip (ban check ok) : %d.%d.%d.%d" RETCODE,
+ p[0], p[1], p[2], p[3]);
+ }
+ mysql_free_result (sql_res);
+ }
+
+ if (session[fd]->eof)
+ {
+ for (i = 0; i < MAX_SERVERS; i++)
+ if (server_fd[i] == fd)
+ server_fd[i] = -1;
+ close (fd);
+ delete_session (fd);
+ return 0;
+ }
+
+ while (RFIFOREST (fd) >= 2)
+ {
+ printf ("parse_login : %d %d packet case=%x\n", fd, RFIFOREST (fd),
+ RFIFOW (fd, 0));
+
+ switch (RFIFOW (fd, 0))
+ {
+ case 0x200: // New alive packet: structure: 0x200 <account.userid>.24B. used to verify if client is always alive.
+ if (RFIFOREST (fd) < 26)
+ return 0;
+ RFIFOSKIP (fd, 26);
+ break;
+
+ case 0x204: // New alive packet: structure: 0x204 <encrypted.account.userid>.16B. (new ragexe from 22 june 2004)
+ if (RFIFOREST (fd) < 18)
+ return 0;
+ RFIFOSKIP (fd, 18);
+ break;
+
+ case 0x64: // request client login
+ case 0x01dd: // request client login with encrypt
+ if (RFIFOREST (fd) < ((RFIFOW (fd, 0) == 0x64) ? 55 : 47))
+ return 0;
+
+ printf ("client connection request %s from %d.%d.%d.%d\n",
+ RFIFOP (fd, 6), p[0], p[1], p[2], p[3]);
+
+ account.userid = RFIFOP (fd, 6);
+ account.passwd = RFIFOP (fd, 30);
#ifdef PASSWORDENC
- account.passwdenc= (RFIFOW(fd,0)==0x64)?0:PASSWORDENC;
+ account.passwdenc =
+ (RFIFOW (fd, 0) == 0x64) ? 0 : PASSWORDENC;
#else
- account.passwdenc=0;
+ account.passwdenc = 0;
#endif
- result=mmo_auth(&account, fd);
-
- jstrescapecpy(t_uid,RFIFOP(fd, 6));
- if(result==-1){
- int gm_level = isGM(account.account_id);
- if (min_level_to_connect > gm_level) {
- WFIFOW(fd,0) = 0x81;
- WFIFOL(fd,2) = 1; // 01 = Server closed
- WFIFOSET(fd,3);
- } else {
- if (p[0] != 127) {
- sprintf(tmpsql,"INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', '%s','100', 'login ok')", loginlog_db, p[0], p[1], p[2], p[3], t_uid);
- //query
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
+ result = mmo_auth (&account, fd);
+
+ jstrescapecpy (t_uid, RFIFOP (fd, 6));
+ if (result == -1)
+ {
+ int gm_level = isGM (account.account_id);
+ if (min_level_to_connect > gm_level)
+ {
+ WFIFOW (fd, 0) = 0x81;
+ WFIFOL (fd, 2) = 1; // 01 = Server closed
+ WFIFOSET (fd, 3);
}
- if (gm_level)
- printf("Connection of the GM (level:%d) account '%s' accepted.\n", gm_level, account.userid);
- else
- printf("Connection of the account '%s' accepted.\n", account.userid);
- server_num=0;
- for(i = 0; i < MAX_SERVERS; i++) {
- if (server_fd[i] >= 0) {
- //Lan check added by Kashy
- if (lan_ip_check(p))
- WFIFOL(fd,47+server_num*32) = inet_addr(lan_char_ip);
- else
- WFIFOL(fd,47+server_num*32) = server[i].ip;
- WFIFOW(fd,47+server_num*32+4) = server[i].port;
- memcpy(WFIFOP(fd,47+server_num*32+6), server[i].name, 20);
- WFIFOW(fd,47+server_num*32+26) = server[i].users;
- WFIFOW(fd,47+server_num*32+28) = server[i].maintenance;
- WFIFOW(fd,47+server_num*32+30) = server[i].new;
- server_num++;
+ else
+ {
+ if (p[0] != 127)
+ {
+ sprintf (tmpsql,
+ "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', '%s','100', 'login ok')",
+ loginlog_db, p[0], p[1], p[2], p[3],
+ t_uid);
+ //query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ }
+ if (gm_level)
+ printf
+ ("Connection of the GM (level:%d) account '%s' accepted.\n",
+ gm_level, account.userid);
+ else
+ printf
+ ("Connection of the account '%s' accepted.\n",
+ account.userid);
+ server_num = 0;
+ for (i = 0; i < MAX_SERVERS; i++)
+ {
+ if (server_fd[i] >= 0)
+ {
+ //Lan check added by Kashy
+ if (lan_ip_check (p))
+ WFIFOL (fd, 47 + server_num * 32) =
+ inet_addr (lan_char_ip);
+ else
+ WFIFOL (fd, 47 + server_num * 32) =
+ server[i].ip;
+ WFIFOW (fd, 47 + server_num * 32 + 4) =
+ server[i].port;
+ memcpy (WFIFOP (fd, 47 + server_num * 32 + 6),
+ server[i].name, 20);
+ WFIFOW (fd, 47 + server_num * 32 + 26) =
+ server[i].users;
+ WFIFOW (fd, 47 + server_num * 32 + 28) =
+ server[i].maintenance;
+ WFIFOW (fd, 47 + server_num * 32 + 30) =
+ server[i].new;
+ server_num++;
+ }
+ }
+ // if at least 1 char-server
+ if (server_num > 0)
+ {
+ WFIFOW (fd, 0) = 0x69;
+ WFIFOW (fd, 2) = 47 + 32 * server_num;
+ WFIFOL (fd, 4) = account.login_id1;
+ WFIFOL (fd, 8) = account.account_id;
+ WFIFOL (fd, 12) = account.login_id2;
+ WFIFOL (fd, 16) = 0;
+ memcpy (WFIFOP (fd, 20), account.lastlogin, 24);
+ WFIFOB (fd, 46) = account.sex;
+ WFIFOSET (fd, 47 + 32 * server_num);
+ if (auth_fifo_pos >= AUTH_FIFO_SIZE)
+ auth_fifo_pos = 0;
+ auth_fifo[auth_fifo_pos].account_id =
+ account.account_id;
+ auth_fifo[auth_fifo_pos].login_id1 =
+ account.login_id1;
+ auth_fifo[auth_fifo_pos].login_id2 =
+ account.login_id2;
+ auth_fifo[auth_fifo_pos].sex = account.sex;
+ auth_fifo[auth_fifo_pos].delflag = 0;
+ auth_fifo[auth_fifo_pos].ip =
+ session[fd]->client_addr.sin_addr.s_addr;
+ auth_fifo_pos++;
+ }
+ else
+ {
+ WFIFOW (fd, 0) = 0x81;
+ WFIFOL (fd, 2) = 1; // 01 = Server closed
+ WFIFOSET (fd, 3);
}
}
- // if at least 1 char-server
- if (server_num > 0) {
- WFIFOW(fd,0)=0x69;
- WFIFOW(fd,2)=47+32*server_num;
- WFIFOL(fd,4)=account.login_id1;
- WFIFOL(fd,8)=account.account_id;
- WFIFOL(fd,12)=account.login_id2;
- WFIFOL(fd,16)=0;
- memcpy(WFIFOP(fd,20),account.lastlogin,24);
- WFIFOB(fd,46)=account.sex;
- WFIFOSET(fd,47+32*server_num);
- if(auth_fifo_pos>=AUTH_FIFO_SIZE)
- auth_fifo_pos=0;
- auth_fifo[auth_fifo_pos].account_id=account.account_id;
- auth_fifo[auth_fifo_pos].login_id1=account.login_id1;
- auth_fifo[auth_fifo_pos].login_id2=account.login_id2;
- auth_fifo[auth_fifo_pos].sex=account.sex;
- auth_fifo[auth_fifo_pos].delflag=0;
- auth_fifo[auth_fifo_pos].ip = session[fd]->client_addr.sin_addr.s_addr;
- auth_fifo_pos++;
- } else {
- WFIFOW(fd,0) = 0x81;
- WFIFOL(fd,2) = 1; // 01 = Server closed
- WFIFOSET(fd,3);
+ }
+ else
+ {
+ char tmp_sql[512];
+ char error[64];
+ sprintf (tmp_sql,
+ "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', '%s', '%d','login failed : %%s')",
+ loginlog_db, p[0], p[1], p[2], p[3], t_uid,
+ result);
+ switch ((result + 1))
+ {
+ case -2: //-3 = Account Banned
+ sprintf (tmpsql, tmp_sql, "Account banned.");
+ sprintf (error, "Account banned.");
+ break;
+ case -1: //-2 = Dynamic Ban
+ sprintf (tmpsql, tmp_sql,
+ "dynamic ban (ip and account).");
+ sprintf (error, "dynamic ban (ip and account).");
+ break;
+ case 1: // 0 = Unregistered ID
+ sprintf (tmpsql, tmp_sql, "Unregisterd ID.");
+ sprintf (error, "Unregisterd ID.");
+ break;
+ case 2: // 1 = Incorrect Password
+ sprintf (tmpsql, tmp_sql, "Incorrect Password.");
+ sprintf (error, "Incorrect Password.");
+ break;
+ case 3: // 2 = This ID is expired
+ sprintf (tmpsql, tmp_sql, "Account Expired.");
+ sprintf (error, "Account Expired.");
+ break;
+ case 4: // 3 = Rejected from Server
+ sprintf (tmpsql, tmp_sql,
+ "Rejected from server.");
+ sprintf (error, "Rejected from server.");
+ break;
+ case 5: // 4 = You have been blocked by the GM Team
+ sprintf (tmpsql, tmp_sql, "Blocked by GM.");
+ sprintf (error, "Blocked by GM.");
+ break;
+ case 6: // 5 = Your Game's EXE file is not the latest version
+ sprintf (tmpsql, tmp_sql, "Not latest game EXE.");
+ sprintf (error, "Not latest game EXE.");
+ break;
+ case 7: // 6 = Your are Prohibited to log in until %s
+ sprintf (tmpsql, tmp_sql, "Banned.");
+ sprintf (error, "Banned.");
+ break;
+ case 8: // 7 = Server is jammed due to over populated
+ sprintf (tmpsql, tmp_sql,
+ "Server Over-population.");
+ sprintf (error, "Server Over-population.");
+ break;
+ case 9: // 8 = No MSG (actually, all states after 9 except 99 are No MSG, use only this)
+ sprintf (tmpsql, tmp_sql, " ");
+ sprintf (error, " ");
+ break;
+ case 100: // 99 = This ID has been totally erased
+ sprintf (tmpsql, tmp_sql, "Account gone.");
+ sprintf (error, "Account gone.");
+ break;
+ default:
+ sprintf (tmpsql, tmp_sql, "Uknown Error.");
+ sprintf (error, "Uknown Error.");
+ break;
+ }
+ //query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ if ((result == 1) && (dynamic_pass_failure_ban != 0))
+ { // failed password
+ sprintf (tmpsql, "SELECT count(*) FROM `%s` WHERE `ip` = '%d.%d.%d.%d' AND `rcode` = '1' AND `time` > NOW() - INTERVAL %d MINUTE", loginlog_db, p[0], p[1], p[2], p[3], dynamic_pass_failure_ban_time); //how many times filed account? in one ip.
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ //check query result
+ sql_res = mysql_store_result (&mysql_handle);
+ sql_row = mysql_fetch_row (sql_res); //row fetching
+
+ if (atoi (sql_row[0]) >=
+ dynamic_pass_failure_ban_how_many)
+ {
+ sprintf (tmpsql,
+ "INSERT INTO `ipbanlist`(`list`,`btime`,`rtime`,`reason`) VALUES ('%d.%d.%d.*', NOW() , NOW() + INTERVAL %d MINUTE ,'Password error ban: %s')",
+ p[0], p[1], p[2],
+ dynamic_pass_failure_ban_how_long,
+ t_uid);
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ }
+ mysql_free_result (sql_res);
+ }
+ else if (result == -2)
+ { //dynamic banned - add ip to ban list.
+ sprintf (tmpsql,
+ "INSERT INTO `ipbanlist`(`list`,`btime`,`rtime`,`reason`) VALUES ('%d.%d.%d.*', NOW() , NOW() + INTERVAL 1 MONTH ,'Dynamic banned user id : %s')",
+ p[0], p[1], p[2], t_uid);
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ result = -3;
}
- }
- } else {
- char tmp_sql[512];
- char error[64];
- sprintf(tmp_sql,"INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', '%s', '%d','login failed : %%s')", loginlog_db, p[0], p[1], p[2], p[3], t_uid, result);
- switch((result + 1)) {
- case -2: //-3 = Account Banned
- sprintf(tmpsql,tmp_sql,"Account banned.");
- sprintf(error,"Account banned.");
- break;
- case -1: //-2 = Dynamic Ban
- sprintf(tmpsql,tmp_sql,"dynamic ban (ip and account).");
- sprintf(error,"dynamic ban (ip and account).");
- break;
- case 1: // 0 = Unregistered ID
- sprintf(tmpsql,tmp_sql,"Unregisterd ID.");
- sprintf(error,"Unregisterd ID.");
- break;
- case 2: // 1 = Incorrect Password
- sprintf(tmpsql,tmp_sql,"Incorrect Password.");
- sprintf(error,"Incorrect Password.");
- break;
- case 3: // 2 = This ID is expired
- sprintf(tmpsql,tmp_sql,"Account Expired.");
- sprintf(error,"Account Expired.");
- break;
- case 4: // 3 = Rejected from Server
- sprintf(tmpsql,tmp_sql,"Rejected from server.");
- sprintf(error,"Rejected from server.");
- break;
- case 5: // 4 = You have been blocked by the GM Team
- sprintf(tmpsql,tmp_sql,"Blocked by GM.");
- sprintf(error,"Blocked by GM.");
- break;
- case 6: // 5 = Your Game's EXE file is not the latest version
- sprintf(tmpsql,tmp_sql,"Not latest game EXE.");
- sprintf(error,"Not latest game EXE.");
- break;
- case 7: // 6 = Your are Prohibited to log in until %s
- sprintf(tmpsql,tmp_sql,"Banned.");
- sprintf(error,"Banned.");
- break;
- case 8: // 7 = Server is jammed due to over populated
- sprintf(tmpsql,tmp_sql,"Server Over-population.");
- sprintf(error,"Server Over-population.");
- break;
- case 9: // 8 = No MSG (actually, all states after 9 except 99 are No MSG, use only this)
- sprintf(tmpsql,tmp_sql," ");
- sprintf(error," ");
- break;
- case 100: // 99 = This ID has been totally erased
- sprintf(tmpsql,tmp_sql,"Account gone.");
- sprintf(error,"Account gone.");
- break;
- default:
- sprintf(tmpsql,tmp_sql,"Uknown Error.");
- sprintf(error,"Uknown Error.");
- break;
- }
- //query
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- if ((result == 1) && (dynamic_pass_failure_ban != 0)){ // failed password
- sprintf(tmpsql,"SELECT count(*) FROM `%s` WHERE `ip` = '%d.%d.%d.%d' AND `rcode` = '1' AND `time` > NOW() - INTERVAL %d MINUTE",
- loginlog_db, p[0], p[1], p[2], p[3], dynamic_pass_failure_ban_time); //how many times filed account? in one ip.
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- //check query result
- sql_res = mysql_store_result(&mysql_handle) ;
- sql_row = mysql_fetch_row(sql_res); //row fetching
-
- if (atoi(sql_row[0]) >= dynamic_pass_failure_ban_how_many ) {
- sprintf(tmpsql,"INSERT INTO `ipbanlist`(`list`,`btime`,`rtime`,`reason`) VALUES ('%d.%d.%d.*', NOW() , NOW() + INTERVAL %d MINUTE ,'Password error ban: %s')", p[0], p[1], p[2], dynamic_pass_failure_ban_how_long, t_uid);
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- }
- mysql_free_result(sql_res);
- }
- else if (result == -2){ //dynamic banned - add ip to ban list.
- sprintf(tmpsql,"INSERT INTO `ipbanlist`(`list`,`btime`,`rtime`,`reason`) VALUES ('%d.%d.%d.*', NOW() , NOW() + INTERVAL 1 MONTH ,'Dynamic banned user id : %s')", p[0], p[1], p[2], t_uid);
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- result = -3;
- }
-
- sprintf(tmpsql,"SELECT `ban_until` FROM `%s` WHERE `%s` = '%s'",login_db,login_db_userid, t_uid);
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- sql_res = mysql_store_result(&mysql_handle) ;
- if (sql_res) {
- sql_row = mysql_fetch_row(sql_res); //row fetching
- }
- //cannot connect login failed
- memset(WFIFOP(fd,0),'\0',23);
- WFIFOW(fd,0)=0x6a;
- WFIFOB(fd,2)=result;
- if (result == 6) { // 6 = Your are Prohibited to log in until %s
- if (atol(sql_row[0]) != 0) { // if account is banned, we send ban timestamp
- char tmpstr[256];
- time_t ban_until_time;
- ban_until_time = atol(sql_row[0]);
- strftime(tmpstr, 20, date_format, gmtime(&ban_until_time));
- tmpstr[19] = '\0';
- memcpy(WFIFOP(fd,3), tmpstr, 20);
- } else { // we send error message
- memcpy(WFIFOP(fd,3), error, 20);
- }
- }
- WFIFOSET(fd,23);
- }
- RFIFOSKIP(fd,(RFIFOW(fd,0)==0x64)?55:47);
- break;
-
- case 0x01db: // request password key
- if (session[fd]->session_data) {
- printf("login: abnormal request of MD5 key (already opened session).\n");
- session[fd]->eof = 1;
- return 0;
- }
- printf("Request Password key -%s\n",md5key);
- RFIFOSKIP(fd,2);
- WFIFOW(fd,0)=0x01dc;
- WFIFOW(fd,2)=4+md5keylen;
- memcpy(WFIFOP(fd,4),md5key,md5keylen);
- WFIFOSET(fd,WFIFOW(fd,2));
- break;
-
- case 0x2710: // request Char-server connection
- if(RFIFOREST(fd)<86)
- return 0;
- {
- sprintf(tmpsql,"INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', '%s@%s','100', 'charserver - %s@%d.%d.%d.%d:%d')", loginlog_db, p[0], p[1], p[2], p[3], RFIFOP(fd, 2),RFIFOP(fd, 60),RFIFOP(fd, 60), RFIFOB(fd, 54), RFIFOB(fd, 55), RFIFOB(fd, 56), RFIFOB(fd, 57), RFIFOW(fd, 58));
-
- //query
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- printf("server connection request %s @ %d.%d.%d.%d:%d (%d.%d.%d.%d)\n",
- RFIFOP(fd, 60), RFIFOB(fd, 54), RFIFOB(fd, 55), RFIFOB(fd, 56), RFIFOB(fd, 57), RFIFOW(fd, 58),
- p[0], p[1], p[2], p[3]);
- unsigned char* server_name;
- account.userid = RFIFOP(fd, 2);
- account.passwd = RFIFOP(fd, 26);
- account.passwdenc = 0;
- server_name = RFIFOP(fd,60);
- result = mmo_auth(&account, fd);
- //printf("Result: %d - Sex: %d - Account ID: %d\n",result,account.sex,(int) account.account_id);
-
- if(result == -1 && account.sex==2 && account.account_id<MAX_SERVERS && server_fd[account.account_id]==-1){
- printf("Connection of the char-server '%s' accepted.\n", server_name);
- memset(&server[account.account_id], 0, sizeof(struct mmo_char_server));
- server[account.account_id].ip=RFIFOL(fd,54);
- server[account.account_id].port=RFIFOW(fd,58);
- memcpy(server[account.account_id].name,RFIFOP(fd,60),20);
- server[account.account_id].users=0;
- server[account.account_id].maintenance=RFIFOW(fd,82);
- server[account.account_id].new=RFIFOW(fd,84);
- server_fd[account.account_id]=fd;
- if(anti_freeze_enable)
- server_freezeflag[account.account_id] = 5; // Char-server anti-freeze system. Counter. 5 ok, 4...0 freezed
- sprintf(tmpsql,"DELETE FROM `sstatus` WHERE `index`='%ld'", account.account_id);
- //query
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
-
- jstrescapecpy(t_uid,server[account.account_id].name);
- sprintf(tmpsql,"INSERT INTO `sstatus`(`index`,`name`,`user`) VALUES ( '%ld', '%s', '%d')",
- account.account_id, server[account.account_id].name,0);
- //query
- if(mysql_query(&mysql_handle, tmpsql)) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
- WFIFOW(fd,0)=0x2711;
- WFIFOB(fd,2)=0;
- WFIFOSET(fd,3);
- session[fd]->func_parse=parse_fromchar;
- realloc_fifo(fd,FIFOSIZE_SERVERLINK,FIFOSIZE_SERVERLINK);
- } else {
- WFIFOW(fd, 0) =0x2711;
- WFIFOB(fd, 2)=3;
- WFIFOSET(fd, 3);
- }
- }
- RFIFOSKIP(fd, 86);
- return 0;
-
- case 0x7530: // request Athena information
- WFIFOW(fd,0)=0x7531;
- WFIFOB(fd,2)=ATHENA_MAJOR_VERSION;
- WFIFOB(fd,3)=ATHENA_MINOR_VERSION;
- WFIFOB(fd,4)=ATHENA_REVISION;
- WFIFOB(fd,5)=ATHENA_RELEASE_FLAG;
- WFIFOB(fd,6)=ATHENA_OFFICIAL_FLAG;
- WFIFOB(fd,7)=ATHENA_SERVER_LOGIN;
- WFIFOW(fd,8)=ATHENA_MOD_VERSION;
- WFIFOSET(fd,10);
- RFIFOSKIP(fd,2);
- printf ("Athena version check...\n");
- break;
- case 0x7532:
- default:
- printf ("End of connection (ip: %s)" RETCODE, ip);
- session[fd]->eof = 1;
- return 0;
- }
- }
+ sprintf (tmpsql,
+ "SELECT `ban_until` FROM `%s` WHERE `%s` = '%s'",
+ login_db, login_db_userid, t_uid);
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ sql_res = mysql_store_result (&mysql_handle);
+ if (sql_res)
+ {
+ sql_row = mysql_fetch_row (sql_res); //row fetching
+ }
+ //cannot connect login failed
+ memset (WFIFOP (fd, 0), '\0', 23);
+ WFIFOW (fd, 0) = 0x6a;
+ WFIFOB (fd, 2) = result;
+ if (result == 6)
+ { // 6 = Your are Prohibited to log in until %s
+ if (atol (sql_row[0]) != 0)
+ { // if account is banned, we send ban timestamp
+ char tmpstr[256];
+ time_t ban_until_time;
+ ban_until_time = atol (sql_row[0]);
+ strftime (tmpstr, 20, date_format,
+ gmtime (&ban_until_time));
+ tmpstr[19] = '\0';
+ memcpy (WFIFOP (fd, 3), tmpstr, 20);
+ }
+ else
+ { // we send error message
+ memcpy (WFIFOP (fd, 3), error, 20);
+ }
+ }
+ WFIFOSET (fd, 23);
+ }
+ RFIFOSKIP (fd, (RFIFOW (fd, 0) == 0x64) ? 55 : 47);
+ break;
+
+ case 0x01db: // request password key
+ if (session[fd]->session_data)
+ {
+ printf
+ ("login: abnormal request of MD5 key (already opened session).\n");
+ session[fd]->eof = 1;
+ return 0;
+ }
+ printf ("Request Password key -%s\n", md5key);
+ RFIFOSKIP (fd, 2);
+ WFIFOW (fd, 0) = 0x01dc;
+ WFIFOW (fd, 2) = 4 + md5keylen;
+ memcpy (WFIFOP (fd, 4), md5key, md5keylen);
+ WFIFOSET (fd, WFIFOW (fd, 2));
+ break;
+
+ case 0x2710: // request Char-server connection
+ if (RFIFOREST (fd) < 86)
+ return 0;
+ {
+ sprintf (tmpsql,
+ "INSERT INTO `%s`(`time`,`ip`,`user`,`rcode`,`log`) VALUES (NOW(), '%d.%d.%d.%d', '%s@%s','100', 'charserver - %s@%d.%d.%d.%d:%d')",
+ loginlog_db, p[0], p[1], p[2], p[3], RFIFOP (fd,
+ 2),
+ RFIFOP (fd, 60), RFIFOP (fd, 60), RFIFOB (fd,
+ 54),
+ RFIFOB (fd, 55), RFIFOB (fd, 56), RFIFOB (fd,
+ 57),
+ RFIFOW (fd, 58));
+
+ //query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ printf
+ ("server connection request %s @ %d.%d.%d.%d:%d (%d.%d.%d.%d)\n",
+ RFIFOP (fd, 60), RFIFOB (fd, 54), RFIFOB (fd, 55),
+ RFIFOB (fd, 56), RFIFOB (fd, 57), RFIFOW (fd, 58),
+ p[0], p[1], p[2], p[3]);
+ unsigned char *server_name;
+ account.userid = RFIFOP (fd, 2);
+ account.passwd = RFIFOP (fd, 26);
+ account.passwdenc = 0;
+ server_name = RFIFOP (fd, 60);
+ result = mmo_auth (&account, fd);
+ //printf("Result: %d - Sex: %d - Account ID: %d\n",result,account.sex,(int) account.account_id);
+
+ if (result == -1 && account.sex == 2
+ && account.account_id < MAX_SERVERS
+ && server_fd[account.account_id] == -1)
+ {
+ printf
+ ("Connection of the char-server '%s' accepted.\n",
+ server_name);
+ memset (&server[account.account_id], 0,
+ sizeof (struct mmo_char_server));
+ server[account.account_id].ip = RFIFOL (fd, 54);
+ server[account.account_id].port = RFIFOW (fd, 58);
+ memcpy (server[account.account_id].name,
+ RFIFOP (fd, 60), 20);
+ server[account.account_id].users = 0;
+ server[account.account_id].maintenance =
+ RFIFOW (fd, 82);
+ server[account.account_id].new = RFIFOW (fd, 84);
+ server_fd[account.account_id] = fd;
+ if (anti_freeze_enable)
+ server_freezeflag[account.account_id] = 5; // Char-server anti-freeze system. Counter. 5 ok, 4...0 freezed
+ sprintf (tmpsql,
+ "DELETE FROM `sstatus` WHERE `index`='%ld'",
+ account.account_id);
+ //query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+
+ jstrescapecpy (t_uid,
+ server[account.account_id].name);
+ sprintf (tmpsql,
+ "INSERT INTO `sstatus`(`index`,`name`,`user`) VALUES ( '%ld', '%s', '%d')",
+ account.account_id,
+ server[account.account_id].name, 0);
+ //query
+ if (mysql_query (&mysql_handle, tmpsql))
+ {
+ printf ("DB server Error - %s\n",
+ mysql_error (&mysql_handle));
+ }
+ WFIFOW (fd, 0) = 0x2711;
+ WFIFOB (fd, 2) = 0;
+ WFIFOSET (fd, 3);
+ session[fd]->func_parse = parse_fromchar;
+ realloc_fifo (fd, FIFOSIZE_SERVERLINK,
+ FIFOSIZE_SERVERLINK);
+ }
+ else
+ {
+ WFIFOW (fd, 0) = 0x2711;
+ WFIFOB (fd, 2) = 3;
+ WFIFOSET (fd, 3);
+ }
+ }
+ RFIFOSKIP (fd, 86);
+ return 0;
+
+ case 0x7530: // request Athena information
+ WFIFOW (fd, 0) = 0x7531;
+ WFIFOB (fd, 2) = ATHENA_MAJOR_VERSION;
+ WFIFOB (fd, 3) = ATHENA_MINOR_VERSION;
+ WFIFOB (fd, 4) = ATHENA_REVISION;
+ WFIFOB (fd, 5) = ATHENA_RELEASE_FLAG;
+ WFIFOB (fd, 6) = ATHENA_OFFICIAL_FLAG;
+ WFIFOB (fd, 7) = ATHENA_SERVER_LOGIN;
+ WFIFOW (fd, 8) = ATHENA_MOD_VERSION;
+ WFIFOSET (fd, 10);
+ RFIFOSKIP (fd, 2);
+ printf ("Athena version check...\n");
+ break;
+
+ case 0x7532:
+ default:
+ printf ("End of connection (ip: %s)" RETCODE, ip);
+ session[fd]->eof = 1;
+ return 0;
+ }
+ }
- return 0;
+ return 0;
}
//-------------------------------------------------
// Return numerical value of a switch configuration
// on/off, english, français, deutsch, español
//-------------------------------------------------
-int config_switch(const char *str) {
- if (strcmpi(str, "on") == 0 || strcmpi(str, "yes") == 0 || strcmpi(str, "oui") == 0 || strcmpi(str, "ja") == 0 || strcmpi(str, "si") == 0)
- return 1;
- if (strcmpi(str, "off") == 0 || strcmpi(str, "no") == 0 || strcmpi(str, "non") == 0 || strcmpi(str, "nein") == 0)
- return 0;
-
- return atoi(str);
+int config_switch (const char *str)
+{
+ if (strcmpi (str, "on") == 0 || strcmpi (str, "yes") == 0
+ || strcmpi (str, "oui") == 0 || strcmpi (str, "ja") == 0
+ || strcmpi (str, "si") == 0)
+ return 1;
+ if (strcmpi (str, "off") == 0 || strcmpi (str, "no") == 0
+ || strcmpi (str, "non") == 0 || strcmpi (str, "nein") == 0)
+ return 0;
+
+ return atoi (str);
}
-
//Lan Support conf reading added by Kashy
-int login_lan_config_read(const char *lancfgName){
- int i;
- char subnetmask[128];
- char line[1024], w1[1024], w2[1024];
- FILE *fp;
-
- fp=fopen_(lancfgName, "r");
+int login_lan_config_read (const char *lancfgName)
+{
+ int i;
+ char subnetmask[128];
+ char line[1024], w1[1024], w2[1024];
+ FILE *fp;
+
+ fp = fopen_ (lancfgName, "r");
+
+ if (fp == NULL)
+ {
+ printf ("file not found: %s\n", lancfgName);
+ return 1;
+ }
+ printf ("Start reading of Lan Support configuration file\n");
+ while (fgets (line, sizeof (line) - 1, fp))
+ {
+ if (line[0] == '/' && line[1] == '/')
+ continue;
+
+ i = sscanf (line, "%[^:]: %[^\r\n]", w1, w2);
+ if (i != 2)
+ continue;
+
+ else if (strcmpi (w1, "lan_char_ip") == 0)
+ {
+ strcpy (lan_char_ip, w2);
+ printf ("set Lan_Char_IP : %s\n", w2);
+ }
- if (fp == NULL) {
- printf("file not found: %s\n", lancfgName);
- return 1;
- }
- printf("Start reading of Lan Support configuration file\n");
- while(fgets(line, sizeof(line)-1, fp)){
- if (line[0] == '/' && line[1] == '/')
- continue;
-
- i = sscanf(line,"%[^:]: %[^\r\n]",w1,w2);
- if(i!=2)
- continue;
-
- else if(strcmpi(w1,"lan_char_ip")==0){
- strcpy(lan_char_ip, w2);
- printf ("set Lan_Char_IP : %s\n",w2);
- }
-
- else if(strcmpi(w1,"subnetmask")==0){
- strcpy(subnetmask, w2);
- unsigned int k0, k1, k2, k3;
- sscanf(subnetmask, "%d.%d.%d.%d", &k0, &k1, &k2, &k3);
- subnetmaski[0] = k0; subnetmaski[1] = k1; subnetmaski[2] = k2; subnetmaski[3] = k3;
- printf ("set subnetmask : %s\n",w2);
- }
- }
- fclose_(fp);
-
- {
- unsigned int a0, a1, a2, a3;
- unsigned char p[4];
- sscanf(lan_char_ip, "%d.%d.%d.%d", &a0, &a1, &a2, &a3);
- p[0] = a0; p[1] = a1; p[2] = a2; p[3] = a3;
- printf("LAN test of LAN IP of the char-server: ");
- if (lan_ip_check(p) == 0) {
- printf("\033[1;31m***ERROR: LAN IP of the char-server doesn't belong to the specified Sub-network\033[0m\n");
- }
- }
+ else if (strcmpi (w1, "subnetmask") == 0)
+ {
+ strcpy (subnetmask, w2);
+ unsigned int k0, k1, k2, k3;
+ sscanf (subnetmask, "%d.%d.%d.%d", &k0, &k1, &k2, &k3);
+ subnetmaski[0] = k0;
+ subnetmaski[1] = k1;
+ subnetmaski[2] = k2;
+ subnetmaski[3] = k3;
+ printf ("set subnetmask : %s\n", w2);
+ }
+ }
+ fclose_ (fp);
+
+ {
+ unsigned int a0, a1, a2, a3;
+ unsigned char p[4];
+ sscanf (lan_char_ip, "%d.%d.%d.%d", &a0, &a1, &a2, &a3);
+ p[0] = a0;
+ p[1] = a1;
+ p[2] = a2;
+ p[3] = a3;
+ printf ("LAN test of LAN IP of the char-server: ");
+ if (lan_ip_check (p) == 0)
+ {
+ printf
+ ("\033[1;31m***ERROR: LAN IP of the char-server doesn't belong to the specified Sub-network\033[0m\n");
+ }
+ }
- printf("End reading of Lan Support configuration file\n");
+ printf ("End reading of Lan Support configuration file\n");
- return 0;
+ return 0;
}
//-----------------------------------------------------
//BANNED IP CHECK.
//-----------------------------------------------------
-int ip_ban_check(int tid, unsigned int tick, int id, int data){
+int ip_ban_check (int tid, unsigned int tick, int id, int data)
+{
- //query
- if(mysql_query(&mysql_handle, "DELETE FROM `ipbanlist` WHERE `rtime` <= NOW()")) {
- printf("DB server Error - %s\n", mysql_error(&mysql_handle));
- }
+ //query
+ if (mysql_query
+ (&mysql_handle, "DELETE FROM `ipbanlist` WHERE `rtime` <= NOW()"))
+ {
+ printf ("DB server Error - %s\n", mysql_error (&mysql_handle));
+ }
- return 0;
+ return 0;
}
//-----------------------------------------------------
// reading configuration
//-----------------------------------------------------
-int login_config_read(const char *cfgName){
- int i;
- char line[1024], w1[1024], w2[1024];
- FILE *fp;
-
- fp=fopen_(cfgName,"r");
-
- if(fp==NULL){
- printf("Configuration file (%s) not found.\n", cfgName);
- return 1;
- }
- printf ("start reading configuration...\n");
- while(fgets(line, sizeof(line)-1, fp)){
- if(line[0] == '/' && line[1] == '/')
- continue;
-
- i=sscanf(line,"%[^:]: %[^\r\n]",w1,w2);
- if(i!=2)
- continue;
-
- else if(strcmpi(w1,"login_port")==0){
- login_port=atoi(w2);
- printf ("set login_port : %s\n",w2);
- }
- else if(strcmpi(w1,"ipban")==0){
- ipban=atoi(w2);
- printf ("set ipban : %d\n",ipban);
- }
- //account ban -> ip ban
- else if(strcmpi(w1,"dynamic_account_ban")==0){
- dynamic_account_ban=atoi(w2);
- printf ("set dynamic_account_ban : %d\n",dynamic_account_ban);
- }
- else if(strcmpi(w1,"dynamic_account_ban_class")==0){
- dynamic_account_ban_class=atoi(w2);
- printf ("set dynamic_account_ban_class : %d\n",dynamic_account_ban_class);
- }
- //dynamic password error ban
- else if(strcmpi(w1,"dynamic_pass_failure_ban")==0){
- dynamic_pass_failure_ban=atoi(w2);
- printf ("set dynamic_pass_failure_ban : %d\n",dynamic_pass_failure_ban);
- }
- else if(strcmpi(w1,"dynamic_pass_failure_ban_time")==0){
- dynamic_pass_failure_ban_time=atoi(w2);
- printf ("set dynamic_pass_failure_ban_time : %d\n",dynamic_pass_failure_ban_time);
- }
- else if(strcmpi(w1,"dynamic_pass_failure_ban_how_many")==0){
- dynamic_pass_failure_ban_how_many=atoi(w2);
- printf ("set dynamic_pass_failure_ban_how_many : %d\n",dynamic_pass_failure_ban_how_many);
- }
- else if(strcmpi(w1,"dynamic_pass_failure_ban_how_long")==0){
- dynamic_pass_failure_ban_how_long=atoi(w2);
- printf ("set dynamic_pass_failure_ban_how_long : %d\n",dynamic_pass_failure_ban_how_long);
- }
- else if(strcmpi(w1,"anti_freeze_enable")==0){
- anti_freeze_enable = config_switch(w2);
- }
- else if (strcmpi(w1, "anti_freeze_interval") == 0) {
- ANTI_FREEZE_INTERVAL = atoi(w2);
- if (ANTI_FREEZE_INTERVAL < 5)
- ANTI_FREEZE_INTERVAL = 5; // minimum 5 seconds
- }
- else if (strcmpi(w1, "import") == 0) {
- login_config_read(w2);
- }
- else if(strcmpi(w1,"use_MD5_passwords")==0){
- if (!strcmpi(w2,"yes")) {
- use_md5_passwds=1;
- } else if (!strcmpi(w2,"no")){
- use_md5_passwds=0;
- }
- printf ("Using MD5 Passwords: %s \n",w2);
- }
- else if (strcmpi(w1, "date_format") == 0) { // note: never have more than 19 char for the date!
- switch (atoi(w2)) {
- case 0:
- strcpy(date_format, "%d-%m-%Y %H:%M:%S"); // 31-12-2004 23:59:59
- break;
- case 1:
- strcpy(date_format, "%m-%d-%Y %H:%M:%S"); // 12-31-2004 23:59:59
- break;
- case 2:
- strcpy(date_format, "%Y-%d-%m %H:%M:%S"); // 2004-31-12 23:59:59
- break;
- case 3:
- strcpy(date_format, "%Y-%m-%d %H:%M:%S"); // 2004-12-31 23:59:59
- break;
- }
- }
- else if (strcmpi(w1, "min_level_to_connect") == 0) {
- min_level_to_connect = atoi(w2);
- }
- else if (strcmpi(w1, "check_ip_flag") == 0) {
- check_ip_flag = config_switch(w2);
- }
- }
- fclose_(fp);
- printf ("End reading configuration...\n");
- return 0;
+int login_config_read (const char *cfgName)
+{
+ int i;
+ char line[1024], w1[1024], w2[1024];
+ FILE *fp;
+
+ fp = fopen_ (cfgName, "r");
+
+ if (fp == NULL)
+ {
+ printf ("Configuration file (%s) not found.\n", cfgName);
+ return 1;
+ }
+ printf ("start reading configuration...\n");
+ while (fgets (line, sizeof (line) - 1, fp))
+ {
+ if (line[0] == '/' && line[1] == '/')
+ continue;
+
+ i = sscanf (line, "%[^:]: %[^\r\n]", w1, w2);
+ if (i != 2)
+ continue;
+
+ else if (strcmpi (w1, "login_port") == 0)
+ {
+ login_port = atoi (w2);
+ printf ("set login_port : %s\n", w2);
+ }
+ else if (strcmpi (w1, "ipban") == 0)
+ {
+ ipban = atoi (w2);
+ printf ("set ipban : %d\n", ipban);
+ }
+ //account ban -> ip ban
+ else if (strcmpi (w1, "dynamic_account_ban") == 0)
+ {
+ dynamic_account_ban = atoi (w2);
+ printf ("set dynamic_account_ban : %d\n", dynamic_account_ban);
+ }
+ else if (strcmpi (w1, "dynamic_account_ban_class") == 0)
+ {
+ dynamic_account_ban_class = atoi (w2);
+ printf ("set dynamic_account_ban_class : %d\n",
+ dynamic_account_ban_class);
+ }
+ //dynamic password error ban
+ else if (strcmpi (w1, "dynamic_pass_failure_ban") == 0)
+ {
+ dynamic_pass_failure_ban = atoi (w2);
+ printf ("set dynamic_pass_failure_ban : %d\n",
+ dynamic_pass_failure_ban);
+ }
+ else if (strcmpi (w1, "dynamic_pass_failure_ban_time") == 0)
+ {
+ dynamic_pass_failure_ban_time = atoi (w2);
+ printf ("set dynamic_pass_failure_ban_time : %d\n",
+ dynamic_pass_failure_ban_time);
+ }
+ else if (strcmpi (w1, "dynamic_pass_failure_ban_how_many") == 0)
+ {
+ dynamic_pass_failure_ban_how_many = atoi (w2);
+ printf ("set dynamic_pass_failure_ban_how_many : %d\n",
+ dynamic_pass_failure_ban_how_many);
+ }
+ else if (strcmpi (w1, "dynamic_pass_failure_ban_how_long") == 0)
+ {
+ dynamic_pass_failure_ban_how_long = atoi (w2);
+ printf ("set dynamic_pass_failure_ban_how_long : %d\n",
+ dynamic_pass_failure_ban_how_long);
+ }
+ else if (strcmpi (w1, "anti_freeze_enable") == 0)
+ {
+ anti_freeze_enable = config_switch (w2);
+ }
+ else if (strcmpi (w1, "anti_freeze_interval") == 0)
+ {
+ ANTI_FREEZE_INTERVAL = atoi (w2);
+ if (ANTI_FREEZE_INTERVAL < 5)
+ ANTI_FREEZE_INTERVAL = 5; // minimum 5 seconds
+ }
+ else if (strcmpi (w1, "import") == 0)
+ {
+ login_config_read (w2);
+ }
+ else if (strcmpi (w1, "use_MD5_passwords") == 0)
+ {
+ if (!strcmpi (w2, "yes"))
+ {
+ use_md5_passwds = 1;
+ }
+ else if (!strcmpi (w2, "no"))
+ {
+ use_md5_passwds = 0;
+ }
+ printf ("Using MD5 Passwords: %s \n", w2);
+ }
+ else if (strcmpi (w1, "date_format") == 0)
+ { // note: never have more than 19 char for the date!
+ switch (atoi (w2))
+ {
+ case 0:
+ strcpy (date_format, "%d-%m-%Y %H:%M:%S"); // 31-12-2004 23:59:59
+ break;
+ case 1:
+ strcpy (date_format, "%m-%d-%Y %H:%M:%S"); // 12-31-2004 23:59:59
+ break;
+ case 2:
+ strcpy (date_format, "%Y-%d-%m %H:%M:%S"); // 2004-31-12 23:59:59
+ break;
+ case 3:
+ strcpy (date_format, "%Y-%m-%d %H:%M:%S"); // 2004-12-31 23:59:59
+ break;
+ }
+ }
+ else if (strcmpi (w1, "min_level_to_connect") == 0)
+ {
+ min_level_to_connect = atoi (w2);
+ }
+ else if (strcmpi (w1, "check_ip_flag") == 0)
+ {
+ check_ip_flag = config_switch (w2);
+ }
+ }
+ fclose_ (fp);
+ printf ("End reading configuration...\n");
+ return 0;
}
-void sql_config_read(const char *cfgName){ /* Kalaspuff, to get login_db */
- int i;
- char line[1024], w1[1024], w2[1024];
- printf("reading configure: %s\n", cfgName);
- FILE *fp=fopen_(cfgName,"r");
- if(fp==NULL){
- printf("file not found: %s\n",cfgName);
- exit(1);
- }
- while(fgets(line, sizeof(line)-1, fp)){
- if(line[0] == '/' && line[1] == '/')
- continue;
- i=sscanf(line,"%[^:]: %[^\r\n]",w1,w2);
- if(i!=2)
- continue;
- if (strcmpi(w1, "login_db") == 0) {
- strcpy(login_db, w2);
- }
- //add for DB connection
- else if(strcmpi(w1,"login_server_ip")==0){
- strcpy(login_server_ip, w2);
- printf ("set login_server_ip : %s\n",w2);
- }
- else if(strcmpi(w1,"login_server_port")==0){
- login_server_port=atoi(w2);
- printf ("set login_server_port : %s\n",w2);
- }
- else if(strcmpi(w1,"login_server_id")==0){
- strcpy(login_server_id, w2);
- printf ("set login_server_id : %s\n",w2);
- }
- else if(strcmpi(w1,"login_server_pw")==0){
- strcpy(login_server_pw, w2);
- printf ("set login_server_pw : %s\n",w2);
- }
- else if(strcmpi(w1,"login_server_db")==0){
- strcpy(login_server_db, w2);
- printf ("set login_server_db : %s\n",w2);
- }
- //added for custom column names for custom login table
- else if(strcmpi(w1,"login_db_account_id")==0){
- strcpy(login_db_account_id, w2);
- }
- else if(strcmpi(w1,"login_db_userid")==0){
- strcpy(login_db_userid, w2);
- }
- else if(strcmpi(w1,"login_db_user_pass")==0){
- strcpy(login_db_user_pass, w2);
- }
- else if(strcmpi(w1,"login_db_level")==0){
- strcpy(login_db_level, w2);
- }
- //end of custom table config
- else if (strcmpi(w1, "loginlog_db") == 0) {
- strcpy(loginlog_db, w2);
- }
+void sql_config_read (const char *cfgName)
+{ /* Kalaspuff, to get login_db */
+ int i;
+ char line[1024], w1[1024], w2[1024];
+ printf ("reading configure: %s\n", cfgName);
+ FILE *fp = fopen_ (cfgName, "r");
+ if (fp == NULL)
+ {
+ printf ("file not found: %s\n", cfgName);
+ exit (1);
+ }
+ while (fgets (line, sizeof (line) - 1, fp))
+ {
+ if (line[0] == '/' && line[1] == '/')
+ continue;
+ i = sscanf (line, "%[^:]: %[^\r\n]", w1, w2);
+ if (i != 2)
+ continue;
+ if (strcmpi (w1, "login_db") == 0)
+ {
+ strcpy (login_db, w2);
+ }
+ //add for DB connection
+ else if (strcmpi (w1, "login_server_ip") == 0)
+ {
+ strcpy (login_server_ip, w2);
+ printf ("set login_server_ip : %s\n", w2);
+ }
+ else if (strcmpi (w1, "login_server_port") == 0)
+ {
+ login_server_port = atoi (w2);
+ printf ("set login_server_port : %s\n", w2);
+ }
+ else if (strcmpi (w1, "login_server_id") == 0)
+ {
+ strcpy (login_server_id, w2);
+ printf ("set login_server_id : %s\n", w2);
+ }
+ else if (strcmpi (w1, "login_server_pw") == 0)
+ {
+ strcpy (login_server_pw, w2);
+ printf ("set login_server_pw : %s\n", w2);
+ }
+ else if (strcmpi (w1, "login_server_db") == 0)
+ {
+ strcpy (login_server_db, w2);
+ printf ("set login_server_db : %s\n", w2);
+ }
+ //added for custom column names for custom login table
+ else if (strcmpi (w1, "login_db_account_id") == 0)
+ {
+ strcpy (login_db_account_id, w2);
+ }
+ else if (strcmpi (w1, "login_db_userid") == 0)
+ {
+ strcpy (login_db_userid, w2);
+ }
+ else if (strcmpi (w1, "login_db_user_pass") == 0)
+ {
+ strcpy (login_db_user_pass, w2);
}
- fclose_(fp);
- printf("reading configure done.....\n");
+ else if (strcmpi (w1, "login_db_level") == 0)
+ {
+ strcpy (login_db_level, w2);
+ }
+ //end of custom table config
+ else if (strcmpi (w1, "loginlog_db") == 0)
+ {
+ strcpy (loginlog_db, w2);
+ }
+ }
+ fclose_ (fp);
+ printf ("reading configure done.....\n");
}
-int do_init(int argc,char **argv){
- //initialize login server
- int i;
-
- //read login configue
- login_config_read( (argc>1)?argv[1]:LOGIN_CONF_NAME );
- sql_config_read(SQL_CONF_NAME);
- login_lan_config_read((argc > 1) ? argv[1] : LAN_CONF_NAME);
- //Generate Passworded Key.
- printf ("memset md5key \n");
- memset(md5key, 0, sizeof(md5key));
- printf ("memset md5key complete\n");
- printf ("memset keyleng\n");
- md5keylen=rand()%4+12;
- for(i=0;i<md5keylen;i++)
- md5key[i]=rand()%255+1;
- printf ("memset keyleng complete\n");
-
- printf ("set FIFO Size\n");
- for(i=0;i<AUTH_FIFO_SIZE;i++)
- auth_fifo[i].delflag=1;
- printf ("set FIFO Size complete\n");
-
- printf ("set max servers\n");
- for(i=0;i<MAX_SERVERS;i++)
- server_fd[i]=-1;
- printf ("set max servers complete\n");
- //server port open & binding
-
- login_fd=make_listen_port(login_port);
-
- //Auth start
- printf ("Running mmo_auth_sqldb_init()\n");
- mmo_auth_sqldb_init();
- printf ("finished mmo_auth_sqldb_init()\n");
- //sync account when terminating.
- //but no need when you using DBMS (mysql)
- set_termfunc(mmo_db_close);
-
- //set default parser as parse_login function
- set_defaultparse(parse_login);
-
- if(anti_freeze_enable > 0) {
- add_timer_func_list(char_anti_freeze_system, "char_anti_freeze_system");
- i = add_timer_interval(gettick()+1000, char_anti_freeze_system, 0, 0, ANTI_FREEZE_INTERVAL * 1000);
- }
-
- // ban deleter timer - 1 minute term
- printf("add interval tic (ip_ban_check)....\n");
- i=add_timer_interval(gettick()+10, ip_ban_check,0,0,60*1000);
-
- printf("The login-server is \033[1;32mready\033[0m (Server is listening on the port %d).\n\n", login_port);
-
- return 0;
+int do_init (int argc, char **argv)
+{
+ //initialize login server
+ int i;
+
+ //read login configue
+ login_config_read ((argc > 1) ? argv[1] : LOGIN_CONF_NAME);
+ sql_config_read (SQL_CONF_NAME);
+ login_lan_config_read ((argc > 1) ? argv[1] : LAN_CONF_NAME);
+ //Generate Passworded Key.
+ printf ("memset md5key \n");
+ memset (md5key, 0, sizeof (md5key));
+ printf ("memset md5key complete\n");
+ printf ("memset keyleng\n");
+ md5keylen = rand () % 4 + 12;
+ for (i = 0; i < md5keylen; i++)
+ md5key[i] = rand () % 255 + 1;
+ printf ("memset keyleng complete\n");
+
+ printf ("set FIFO Size\n");
+ for (i = 0; i < AUTH_FIFO_SIZE; i++)
+ auth_fifo[i].delflag = 1;
+ printf ("set FIFO Size complete\n");
+
+ printf ("set max servers\n");
+ for (i = 0; i < MAX_SERVERS; i++)
+ server_fd[i] = -1;
+ printf ("set max servers complete\n");
+ //server port open & binding
+
+ login_fd = make_listen_port (login_port);
+
+ //Auth start
+ printf ("Running mmo_auth_sqldb_init()\n");
+ mmo_auth_sqldb_init ();
+ printf ("finished mmo_auth_sqldb_init()\n");
+ //sync account when terminating.
+ //but no need when you using DBMS (mysql)
+ set_termfunc (mmo_db_close);
+
+ //set default parser as parse_login function
+ set_defaultparse (parse_login);
+
+ if (anti_freeze_enable > 0)
+ {
+ add_timer_func_list (char_anti_freeze_system,
+ "char_anti_freeze_system");
+ i = add_timer_interval (gettick () + 1000, char_anti_freeze_system, 0,
+ 0, ANTI_FREEZE_INTERVAL * 1000);
+ }
+
+ // ban deleter timer - 1 minute term
+ printf ("add interval tic (ip_ban_check)....\n");
+ i = add_timer_interval (gettick () + 10, ip_ban_check, 0, 0, 60 * 1000);
+
+ printf
+ ("The login-server is \033[1;32mready\033[0m (Server is listening on the port %d).\n\n",
+ login_port);
+
+ return 0;
}
-
-