📄 addon.cpp.svn-base
字号:
#include "StdAfx.h"
initialiseSingleton( Mgr );
//#define DEBUG_PRINT__PACKET // Prints out Received packet when char logging in
// hacky key
static uint8 PublicKey[265] = { 0x02, 0x01, 0x01, 0xC3, 0x5B, 0x50, 0x84, 0xB9, 0x3E, 0x32, 0x42, 0x8C, 0xD0, 0xC7, 0x48, 0xFA, 0x0E, 0x5D, 0x54, 0x5A, 0xA3, 0x0E, 0x14, 0xBA, 0x9E, 0x0D, 0xB9, 0x5D, 0x8B, 0xEE, 0xB6, 0x84, 0x93, 0x45, 0x75, 0xFF, 0x31, 0xFE, 0x2F, 0x64, 0x3F, 0x3D, 0x6D, 0x07, 0xD9, 0x44, 0x9B, 0x40, 0x85, 0x59, 0x34, 0x4E, 0x10, 0xE1, 0xE7, 0x43, 0x69, 0xEF, 0x7C, 0x16, 0xFC, 0xB4, 0xED, 0x1B, 0x95, 0x28, 0xA8, 0x23, 0x76, 0x51, 0x31, 0x57, 0x30, 0x2B, 0x79, 0x08, 0x50, 0x10, 0x1C, 0x4A, 0x1A, 0x2C, 0xC8, 0x8B, 0x8F, 0x05, 0x2D, 0x22, 0x3D, 0xDB, 0x5A, 0x24, 0x7A, 0x0F, 0x13, 0x50, 0x37, 0x8F, 0x5A, 0xCC, 0x9E, 0x04, 0x44, 0x0E, 0x87, 0x01, 0xD4, 0xA3, 0x15, 0x94, 0x16, 0x34, 0xC6, 0xC2, 0xC3, 0xFB, 0x49, 0xFE, 0xE1, 0xF9, 0xDA, 0x8C, 0x50, 0x3C, 0xBE, 0x2C, 0xBB, 0x57, 0xED, 0x46, 0xB9, 0xAD, 0x8B, 0xC6, 0xDF, 0x0E, 0xD6, 0x0F, 0xBE, 0x80, 0xB3, 0x8B, 0x1E, 0x77, 0xCF, 0xAD, 0x22, 0xCF, 0xB7, 0x4B, 0xCF, 0xFB, 0xF0, 0x6B, 0x11, 0x45, 0x2D, 0x7A, 0x81, 0x18, 0xF2, 0x92, 0x7E, 0x98, 0x56, 0x5D, 0x5E, 0x69, 0x72, 0x0A, 0x0D, 0x03, 0x0A, 0x85, 0xA2, 0x85, 0x9C, 0xCB, 0xFB, 0x56, 0x6E, 0x8F, 0x44, 0xBB, 0x8F, 0x02, 0x22, 0x68, 0x63, 0x97, 0xBC, 0x85, 0xBA, 0xA8, 0xF7, 0xB5, 0x40, 0x68, 0x3C, 0x77, 0x86, 0x6F, 0x4B, 0xD7, 0x88, 0xCA, 0x8A, 0xD7, 0xCE, 0x36, 0xF0, 0x45, 0x6E, 0xD5, 0x64, 0x79, 0x0F, 0x17, 0xFC, 0x64, 0xDD, 0x10, 0x6F, 0xF3, 0xF5, 0xE0, 0xA6, 0xC3, 0xFB, 0x1B, 0x8C, 0x29, 0xEF, 0x8E, 0xE5, 0x34, 0xCB, 0xD1, 0x2A, 0xCE, 0x79, 0xC3, 0x9A, 0x0D, 0x36, 0xEA, 0x01, 0xE0, 0xAA, 0x91, 0x20, 0x54, 0xF0, 0x72, 0xD8, 0x1E, 0xC7, 0x89, 0xD2, 0x00, 0x00, 0x00, 0x00, 0x00};
Mgr::Mgr()
{
Knowns.clear();
}
Mgr::~Mgr()
{
std::map<std::string, Entry*>::iterator itr;
for(itr = Knowns.begin(); itr!=Knowns.end(); ++itr)
{
delete itr>second;
}
Knowns.clear();
}
bool Mgr::IsBanned(uint64 crc, std::string name)
{
return false; // bleh needs work
}
bool Mgr::IsBanned(std::string name, uint64 crc)
{
std::map<std::string,Entry*>::iterator i = Knowns.find(name);
if(i != Knowns.end())
{
if(i>second>banned)
{
sLog.outDebug(" %s is banned.", name.c_str());
return true;
}
}
else
{
// New . It'll be saved to db at server shutdown.
Entry *ent = new Entry;
ent>name = name;
ent>crc = crc;
ent>banned = false; // by default.. we can change this I guess..
ent>isNew = true;
ent>showinlist = true;
sLog.outDebug("Discovered new %s sent by client.", name.c_str());
Knowns[ent>name] = ent;
}
return false;
}
bool Mgr::ShouldShowInList(std::string name)
{
std::map<std::string,Entry*>::iterator i = Knowns.find(name);
if(i != Knowns.end())
{
if(i>second>showinlist)
return true;
else
return false;
}
else
{
// New . It'll be saved to db at server shutdown.
Entry *ent = new Entry;
ent>name = name;
ent>crc = 0;
ent>banned = false; // by default.. we can change this I guess..
ent>isNew = true;
ent>showinlist = true;
sLog.outDebug("Discovered new %s sent by client.", name.c_str());
Knowns[ent>name] = ent;
}
return true;
}
void Mgr::SendInfoPacket(serverPacket *source, uint32 pos, serverSession *m_session)
{
serverPacket returnpacket;
returnpacket.Initialize(SMSG__INFO); // SMSG__INFO
uint32 realsize;
uLongf rsize;
try
{
*source >> realsize;
}
catch (ByteBuffer::error &)
{
sLog.outDebug("Warning: Incomplete auth session sent.");
return;
}
rsize = realsize;
size_t position = source>rpos();
ByteBuffer unpacked;
unpacked.resize(realsize);
if((source>size() position) < 4 || realsize == 0)
{
// we shouldnt get here.. but just in case this will stop any crash here.
sLog.outDebug("Warning: Incomplete auth session sent.");
return;
}
int32 result;
result = uncompress((uint8*)unpacked.contents(), &rsize, (uint8*)(*source).contents() + position, (uLong)((*source).size() position));
if(result != Z_OK)
{
sLog.outError("Decompression of section of CMSG_AUTH_SESSION failed.");
return;
}
sLog.outDetail("Decompression of section of CMSG_AUTH_SESSION succeeded.");
uint8 Enable; // based on the parsed files from retool
uint32 crc;
uint32 unknown;
std::string name;
size_t p = unpacked.rpos();
while(p != unpacked.size()) // make sure theres always room, otherwise *BAM* crash.
{
unpacked >> name;
unpacked >> Enable;
unpacked >> crc;
unpacked >> unknown;
// Hacky fix, Yea I know its a hacky fix I will make a proper handler one's I got the crc crap
if (crc != 0x4C1C776D) // CRC of public key version 2.0.1
returnpacket.append(PublicKey,264); // part of the hacky fix
else
returnpacket << uint8(0x02) << uint8(0x01) << uint8(0x00) << uint32(0) << uint8(0);
/*if(!AppendPublicKey(returnpacket, name, crc))
returnpacket << uint8(1) << uint8(0) << uint8(0);*/
p = unpacked.rpos();
}
m_session>SendPacket(&returnpacket);
}
bool Mgr::AppendPublicKey(serverPacket& data, string Name, uint32 CRC)
{
if(CRC == 0x4C1C776D)
{
// Open public key file with that
map<string, ByteBuffer>::iterator itr = Data.find(Name);
if(itr != Data.end())
data.append(itr>second);
else
{
// open the file
char path[500];
snprintf(path, 500, "s\\%s.pub", Name.c_str());
FILE * f = fopen(path, "rb");
if(f != 0)
{
// read the file into a bytebuffer
ByteBuffer buf;
fseek(f, 0, SEEK_END);
uint32 length = 264/*ftell(f)*/;
fseek(f, 0, SEEK_SET);
buf.resize(length);
fread((void*)buf.contents(), length, 1, f);
fclose(f);
Data[Name] = buf;
data.append(buf);
}
else
{
ByteBuffer buf;
buf.append(PublicKey, 264);
Data[Name] = buf;
data.append(buf);
}
}
return true;
}
return false;
}
void Mgr::LoadFromDB()
{
QueryResult *result = serverDatabase.Query("SELECT * FROM clients");
if(!result)
{
sLog.outString("Query failed: SELECT * FROM clients");
return;
}
do
{
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -