2020-08-18 20:42:30 +00:00
|
|
|
#include "CNLoginServer.hpp"
|
|
|
|
#include "CNShared.hpp"
|
|
|
|
#include "CNStructs.hpp"
|
2020-09-01 22:37:09 +00:00
|
|
|
#include "Database.hpp"
|
|
|
|
#include "PlayerManager.hpp"
|
|
|
|
#include <regex>
|
2020-09-03 02:25:09 +00:00
|
|
|
#include "contrib/bcrypt/BCrypt.hpp"
|
2020-08-18 20:42:30 +00:00
|
|
|
|
|
|
|
#include "settings.hpp"
|
|
|
|
|
|
|
|
std::map<CNSocket*, CNLoginData> CNLoginServer::loginSessions;
|
|
|
|
|
|
|
|
CNLoginServer::CNLoginServer(uint16_t p) {
|
|
|
|
port = p;
|
|
|
|
pHandler = &CNLoginServer::handlePacket;
|
|
|
|
init();
|
|
|
|
}
|
|
|
|
|
|
|
|
void CNLoginServer::handlePacket(CNSocket* sock, CNPacketData* data) {
|
2020-08-23 21:09:31 +00:00
|
|
|
printPacket(data, CL2LS);
|
2020-08-22 17:39:13 +00:00
|
|
|
|
2020-08-18 20:42:30 +00:00
|
|
|
switch (data->type) {
|
2020-09-01 22:37:09 +00:00
|
|
|
case P_CL2LS_REQ_LOGIN: {
|
|
|
|
if (data->size != sizeof(sP_CL2LS_REQ_LOGIN))
|
|
|
|
return; // ignore the malformed packet
|
|
|
|
|
2020-09-14 13:53:48 +00:00
|
|
|
sP_CL2LS_REQ_LOGIN* login = (sP_CL2LS_REQ_LOGIN*)data->buf;
|
2020-09-14 14:03:30 +00:00
|
|
|
// TODO: implement better way of sending credentials
|
2020-09-09 19:07:47 +00:00
|
|
|
std::string userLogin((char*)login->szCookie_TEGid);
|
|
|
|
std::string userPassword((char*)login->szCookie_authid);
|
|
|
|
|
2020-09-12 15:09:11 +00:00
|
|
|
/*
|
2020-09-14 13:20:55 +00:00
|
|
|
* Sometimes the client sends garbage cookie data.
|
|
|
|
* Validate it as normal credentials instead of using a length check before falling back.
|
|
|
|
*/
|
2020-09-12 15:41:31 +00:00
|
|
|
if (!CNLoginServer::isLoginDataGood(userLogin, userPassword)) {
|
|
|
|
/*
|
|
|
|
* The std::string -> char* -> std::string maneuver should remove any
|
|
|
|
* trailing garbage after the null terminator.
|
|
|
|
*/
|
2020-09-12 15:09:11 +00:00
|
|
|
userLogin = std::string(U16toU8(login->szID).c_str());
|
|
|
|
userPassword = std::string(U16toU8(login->szPassword).c_str());
|
2020-09-12 15:41:31 +00:00
|
|
|
}
|
2020-09-01 22:37:09 +00:00
|
|
|
|
|
|
|
bool success = false;
|
|
|
|
int errorCode = 0;
|
|
|
|
|
2020-09-14 14:03:30 +00:00
|
|
|
// checking regex
|
2020-09-27 05:12:26 +00:00
|
|
|
if (!CNLoginServer::isLoginDataGood(userLogin, userPassword)) {
|
2020-09-14 13:20:55 +00:00
|
|
|
errorCode = (int)LoginError::LOGIN_ERROR;
|
2020-09-27 05:12:26 +00:00
|
|
|
} else {
|
2020-09-01 22:37:09 +00:00
|
|
|
std::unique_ptr<Database::Account> findUser = Database::findAccount(userLogin);
|
2020-09-21 19:49:08 +00:00
|
|
|
// if account not found, make new one
|
2020-09-27 05:12:26 +00:00
|
|
|
if (findUser == nullptr) {
|
2020-09-21 19:43:53 +00:00
|
|
|
loginSessions[sock] = CNLoginData();
|
|
|
|
loginSessions[sock].userID = Database::addAccount(userLogin, userPassword);
|
|
|
|
loginSessions[sock].slot = 1;
|
|
|
|
success = true;
|
2020-09-01 22:37:09 +00:00
|
|
|
}
|
2020-09-14 14:03:30 +00:00
|
|
|
// if user exists, check if password is correct
|
2020-09-27 05:12:26 +00:00
|
|
|
else if (CNLoginServer::isPasswordCorrect(findUser->Password, userPassword)) {
|
2020-10-05 00:03:13 +00:00
|
|
|
/*calling this here to timestamp login attempt,
|
2020-09-21 19:43:53 +00:00
|
|
|
* in order to make duplicate exit sanity check work*/
|
|
|
|
Database::updateSelected(findUser->AccountID, findUser->Selected);
|
2020-09-14 14:03:30 +00:00
|
|
|
// check if account isn't currently in use
|
2020-09-27 05:12:26 +00:00
|
|
|
if (CNLoginServer::isAccountInUse(findUser->AccountID)) {
|
2020-09-14 13:20:55 +00:00
|
|
|
errorCode = (int)LoginError::ID_ALREADY_IN_USE;
|
2020-09-01 22:37:09 +00:00
|
|
|
}
|
2020-09-14 14:03:30 +00:00
|
|
|
// if not, login success
|
2020-09-14 13:53:48 +00:00
|
|
|
else
|
2020-09-01 22:37:09 +00:00
|
|
|
{
|
|
|
|
loginSessions[sock] = CNLoginData();
|
|
|
|
loginSessions[sock].userID = findUser->AccountID;
|
|
|
|
loginSessions[sock].slot = findUser->Selected;
|
|
|
|
success = true;
|
|
|
|
}
|
2020-09-14 13:53:48 +00:00
|
|
|
}
|
2020-09-27 05:12:26 +00:00
|
|
|
else {
|
2020-09-14 13:20:55 +00:00
|
|
|
errorCode = (int)LoginError::ID_AND_PASSWORD_DO_NOT_MATCH;
|
2020-09-01 22:37:09 +00:00
|
|
|
}
|
|
|
|
}
|
2020-08-29 11:14:21 +00:00
|
|
|
|
|
|
|
|
2020-09-27 05:12:26 +00:00
|
|
|
if (success) {
|
2020-09-01 22:37:09 +00:00
|
|
|
std::vector<Player> characters = Database::getCharacters(loginSessions[sock].userID);
|
|
|
|
int charCount = characters.size();
|
|
|
|
|
|
|
|
INITSTRUCT(sP_LS2CL_REP_LOGIN_SUCC, resp);
|
|
|
|
// set username in resp packet
|
|
|
|
memcpy(resp.szID, login->szID, sizeof(char16_t) * 33);
|
|
|
|
|
|
|
|
resp.iCharCount = charCount;
|
|
|
|
resp.iSlotNum = loginSessions[sock].slot;
|
|
|
|
resp.iPaymentFlag = 1;
|
|
|
|
resp.iOpenBetaFlag = 0;
|
|
|
|
resp.uiSvrTime = getTime();
|
2020-10-05 00:03:13 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
// send the resp in with original key
|
|
|
|
sock->sendPacket((void*)&resp, P_LS2CL_REP_LOGIN_SUCC, sizeof(sP_LS2CL_REP_LOGIN_SUCC));
|
|
|
|
|
|
|
|
// update keys
|
|
|
|
sock->setEKey(CNSocketEncryption::createNewKey(resp.uiSvrTime, resp.iCharCount + 1, resp.iSlotNum + 1));
|
|
|
|
sock->setFEKey(CNSocketEncryption::createNewKey((uint64_t)(*(uint64_t*)&CNSocketEncryption::defaultKey[0]), login->iClientVerC, 1));
|
2020-09-14 13:53:48 +00:00
|
|
|
|
|
|
|
// now send the characters :)
|
2020-09-01 22:37:09 +00:00
|
|
|
std::vector<Player>::iterator it;
|
2020-09-27 05:12:26 +00:00
|
|
|
for (it = characters.begin(); it != characters.end(); it++) {
|
2020-08-22 23:31:09 +00:00
|
|
|
sP_LS2CL_REP_CHAR_INFO charInfo = sP_LS2CL_REP_CHAR_INFO();
|
2020-08-18 20:42:30 +00:00
|
|
|
|
2020-08-29 11:14:21 +00:00
|
|
|
charInfo.iSlot = (int8_t)it->slot;
|
|
|
|
charInfo.iLevel = (int16_t)it->level;
|
|
|
|
charInfo.sPC_Style = it->PCStyle;
|
|
|
|
charInfo.sPC_Style2 = it->PCStyle2;
|
|
|
|
|
|
|
|
// position
|
|
|
|
charInfo.iX = it->x;
|
|
|
|
charInfo.iY = it->y;
|
|
|
|
charInfo.iZ = it->z;
|
|
|
|
|
2020-09-14 14:03:30 +00:00
|
|
|
// save character in session (for char select)
|
2020-09-01 22:37:09 +00:00
|
|
|
int UID = it->iID;
|
2020-09-14 13:53:48 +00:00
|
|
|
loginSessions[sock].characters[UID] = Player(*it);
|
2020-08-18 20:42:30 +00:00
|
|
|
loginSessions[sock].characters[UID].FEKey = sock->getFEKey();
|
2020-08-29 11:14:21 +00:00
|
|
|
|
2020-09-14 14:03:30 +00:00
|
|
|
// Equip info
|
2020-09-07 00:16:44 +00:00
|
|
|
for (int i = 0; i < AEQUIP_COUNT; i++) {
|
2020-08-29 11:14:21 +00:00
|
|
|
charInfo.aEquip[i] = it->Equip[i];
|
|
|
|
}
|
|
|
|
|
|
|
|
// set default to the first character
|
|
|
|
if (it == characters.begin())
|
|
|
|
loginSessions[sock].selectedChar = UID;
|
2020-08-28 18:02:03 +00:00
|
|
|
|
2020-09-14 13:53:48 +00:00
|
|
|
sock->sendPacket((void*)&charInfo, P_LS2CL_REP_CHAR_INFO, sizeof(sP_LS2CL_REP_CHAR_INFO));
|
2020-08-29 11:14:21 +00:00
|
|
|
}
|
2020-09-27 05:12:26 +00:00
|
|
|
} else {
|
2020-09-01 22:37:09 +00:00
|
|
|
INITSTRUCT(sP_LS2CL_REP_LOGIN_FAIL, resp);
|
2020-10-04 17:50:58 +00:00
|
|
|
U8toU16(userLogin, resp.szID, sizeof(resp.szID));
|
2020-09-01 22:37:09 +00:00
|
|
|
resp.iErrorCode = errorCode;
|
|
|
|
sock->sendPacket((void*)&resp, P_LS2CL_REP_LOGIN_FAIL, sizeof(sP_LS2CL_REP_LOGIN_FAIL));
|
2020-08-18 20:42:30 +00:00
|
|
|
}
|
2020-08-29 11:14:21 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
break;
|
2020-08-18 20:42:30 +00:00
|
|
|
}
|
2020-09-01 22:37:09 +00:00
|
|
|
case P_CL2LS_REP_LIVE_CHECK: {
|
|
|
|
// stubbed, the client really doesn't care LOL
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case P_CL2LS_REQ_CHECK_CHAR_NAME: {
|
|
|
|
if (data->size != sizeof(sP_CL2LS_REQ_CHECK_CHAR_NAME))
|
|
|
|
return;
|
2020-09-14 13:53:48 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
sP_CL2LS_REQ_CHECK_CHAR_NAME* nameCheck = (sP_CL2LS_REQ_CHECK_CHAR_NAME*)data->buf;
|
2020-09-09 12:36:35 +00:00
|
|
|
bool success = true;
|
|
|
|
int errorcode = 0;
|
|
|
|
|
2020-09-14 14:03:30 +00:00
|
|
|
// check regex
|
2020-09-09 12:36:35 +00:00
|
|
|
if (!CNLoginServer::isCharacterNameGood(U16toU8(nameCheck->szFirstName), U16toU8(nameCheck->szLastName))) {
|
|
|
|
success = false;
|
|
|
|
errorcode = 4;
|
2020-09-14 14:03:30 +00:00
|
|
|
} else if (!Database::isNameFree(nameCheck)){ // check if name isn't already occupied
|
2020-09-09 12:36:35 +00:00
|
|
|
success = false;
|
|
|
|
errorcode = 1;
|
|
|
|
}
|
2020-09-01 22:37:09 +00:00
|
|
|
|
2020-09-27 05:12:26 +00:00
|
|
|
if (success) {
|
2020-09-01 22:37:09 +00:00
|
|
|
INITSTRUCT(sP_LS2CL_REP_CHECK_CHAR_NAME_SUCC, resp);
|
|
|
|
|
|
|
|
DEBUGLOG(
|
2020-09-14 13:20:55 +00:00
|
|
|
std::cout << "P_CL2LS_REQ_CHECK_CHAR_NAME:" << std::endl;
|
|
|
|
std::cout << "\tFirstName: " << U16toU8(nameCheck->szFirstName) << " LastName: " << U16toU8(nameCheck->szLastName) << std::endl;
|
2020-09-01 22:37:09 +00:00
|
|
|
)
|
2020-08-18 20:42:30 +00:00
|
|
|
|
2020-08-29 11:14:21 +00:00
|
|
|
memcpy(resp.szFirstName, nameCheck->szFirstName, sizeof(char16_t) * 9);
|
2020-09-01 22:37:09 +00:00
|
|
|
memcpy(resp.szLastName, nameCheck->szLastName, sizeof(char16_t) * 17);
|
2020-09-09 12:36:35 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
sock->sendPacket((void*)&resp, P_LS2CL_REP_CHECK_CHAR_NAME_SUCC, sizeof(sP_LS2CL_REP_CHECK_CHAR_NAME_SUCC));
|
2020-09-14 13:20:55 +00:00
|
|
|
} else {
|
2020-09-01 22:37:09 +00:00
|
|
|
INITSTRUCT(sP_LS2CL_REP_CHECK_CHAR_NAME_FAIL, resp);
|
2020-09-09 12:36:35 +00:00
|
|
|
resp.iErrorCode = errorcode;
|
2020-09-01 22:37:09 +00:00
|
|
|
sock->sendPacket((void*)&resp, P_LS2CL_REP_CHECK_CHAR_NAME_FAIL, sizeof(sP_LS2CL_REP_CHECK_CHAR_NAME_FAIL));
|
|
|
|
}
|
|
|
|
break;
|
2020-08-29 11:14:21 +00:00
|
|
|
}
|
2020-09-01 22:37:09 +00:00
|
|
|
case P_CL2LS_REQ_SAVE_CHAR_NAME: {
|
|
|
|
if (data->size != sizeof(sP_CL2LS_REQ_SAVE_CHAR_NAME))
|
|
|
|
return;
|
2020-09-14 13:53:48 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
sP_CL2LS_REQ_SAVE_CHAR_NAME* save = (sP_CL2LS_REQ_SAVE_CHAR_NAME*)data->buf;
|
|
|
|
INITSTRUCT(sP_LS2CL_REP_SAVE_CHAR_NAME_SUCC, resp);
|
2020-09-14 13:53:48 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
DEBUGLOG(
|
|
|
|
std::cout << "P_CL2LS_REQ_SAVE_CHAR_NAME:" << std::endl;
|
|
|
|
std::cout << "\tSlot: " << (int)save->iSlotNum << std::endl;
|
|
|
|
std::cout << "\tName: " << U16toU8(save->szFirstName) << " " << U16toU8(save->szLastName) << std::endl;
|
|
|
|
)
|
2020-08-29 11:14:21 +00:00
|
|
|
|
|
|
|
resp.iSlotNum = save->iSlotNum;
|
2020-09-01 22:37:09 +00:00
|
|
|
resp.iGender = save->iGender;
|
|
|
|
resp.iPC_UID = Database::createCharacter(save, loginSessions[sock].userID);
|
|
|
|
memcpy(resp.szFirstName, save->szFirstName, sizeof(char16_t) * 9);
|
|
|
|
memcpy(resp.szLastName, save->szLastName, sizeof(char16_t) * 17);
|
2020-08-29 11:14:21 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
sock->sendPacket((void*)&resp, P_LS2CL_REP_SAVE_CHAR_NAME_SUCC, sizeof(sP_LS2CL_REP_SAVE_CHAR_NAME_SUCC));
|
2020-08-29 11:14:21 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
Database::updateSelected(loginSessions[sock].userID, save->iSlotNum);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case P_CL2LS_REQ_CHAR_CREATE: {
|
|
|
|
if (data->size != sizeof(sP_CL2LS_REQ_CHAR_CREATE))
|
|
|
|
return;
|
2020-09-14 13:53:48 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
sP_CL2LS_REQ_CHAR_CREATE* character = (sP_CL2LS_REQ_CHAR_CREATE*)data->buf;
|
|
|
|
Database::finishCharacter(character);
|
|
|
|
|
|
|
|
DEBUGLOG(
|
|
|
|
std::cout << "P_CL2LS_REQ_CHAR_CREATE:" << std::endl;
|
|
|
|
std::cout << "\tPC_UID: " << character->PCStyle.iPC_UID << std::endl;
|
|
|
|
std::cout << "\tNameCheck: " << (int)character->PCStyle.iNameCheck << std::endl;
|
|
|
|
std::cout << "\tName: " << U16toU8(character->PCStyle.szFirstName) << " " << U16toU8(character->PCStyle.szLastName) << std::endl;
|
|
|
|
std::cout << "\tGender: " << (int)character->PCStyle.iGender << std::endl;
|
|
|
|
std::cout << "\tFace: " << (int)character->PCStyle.iFaceStyle << std::endl;
|
|
|
|
std::cout << "\tHair: " << (int)character->PCStyle.iHairStyle << std::endl;
|
|
|
|
std::cout << "\tHair Color: " << (int)character->PCStyle.iHairColor << std::endl;
|
|
|
|
std::cout << "\tSkin Color: " << (int)character->PCStyle.iSkinColor << std::endl;
|
|
|
|
std::cout << "\tEye Color: " << (int)character->PCStyle.iEyeColor << std::endl;
|
|
|
|
std::cout << "\tHeight: " << (int)character->PCStyle.iHeight << std::endl;
|
|
|
|
std::cout << "\tBody: " << (int)character->PCStyle.iBody << std::endl;
|
|
|
|
std::cout << "\tClass: " << (int)character->PCStyle.iClass << std::endl;
|
|
|
|
std::cout << "\tiEquipUBID: " << (int)character->sOn_Item.iEquipUBID << std::endl;
|
|
|
|
std::cout << "\tiEquipLBID: " << (int)character->sOn_Item.iEquipLBID << std::endl;
|
|
|
|
std::cout << "\tiEquipFootID: " << (int)character->sOn_Item.iEquipFootID << std::endl;
|
2020-09-07 00:16:44 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
Player player = Database::getPlayer(character->PCStyle.iPC_UID);
|
2020-09-01 22:37:09 +00:00
|
|
|
int64_t UID = player.iID;
|
|
|
|
|
|
|
|
INITSTRUCT(sP_LS2CL_REP_CHAR_CREATE_SUCC, resp);
|
|
|
|
resp.sPC_Style = player.PCStyle;
|
|
|
|
resp.sPC_Style2 = player.PCStyle2;
|
|
|
|
resp.iLevel = player.level;
|
|
|
|
resp.sOn_Item = character->sOn_Item;
|
|
|
|
|
2020-09-14 14:03:30 +00:00
|
|
|
// save player in session
|
2020-09-01 22:37:09 +00:00
|
|
|
loginSessions[sock].characters[UID] = Player(player);
|
|
|
|
loginSessions[sock].characters[UID].FEKey = sock->getFEKey();
|
2020-09-14 13:53:48 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
sock->sendPacket((void*)&resp, P_LS2CL_REP_CHAR_CREATE_SUCC, sizeof(sP_LS2CL_REP_CHAR_CREATE_SUCC));
|
|
|
|
Database::updateSelected(loginSessions[sock].userID, player.slot);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case P_CL2LS_REQ_CHAR_DELETE: {
|
|
|
|
if (data->size != sizeof(sP_CL2LS_REQ_CHAR_DELETE))
|
|
|
|
return;
|
2020-08-29 11:14:21 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
sP_CL2LS_REQ_CHAR_DELETE* del = (sP_CL2LS_REQ_CHAR_DELETE*)data->buf;
|
2020-09-13 20:29:30 +00:00
|
|
|
int operationResult = Database::deleteCharacter(del->iPC_UID, loginSessions[sock].userID);
|
2020-09-14 13:53:48 +00:00
|
|
|
|
2020-08-29 11:14:21 +00:00
|
|
|
INITSTRUCT(sP_LS2CL_REP_CHAR_DELETE_SUCC, resp);
|
|
|
|
resp.iSlotNum = operationResult;
|
|
|
|
sock->sendPacket((void*)&resp, P_LS2CL_REP_CHAR_DELETE_SUCC, sizeof(sP_LS2CL_REP_CHAR_DELETE_SUCC));
|
2020-08-18 20:42:30 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case P_CL2LS_REQ_CHAR_SELECT: {
|
|
|
|
if (data->size != sizeof(sP_CL2LS_REQ_CHAR_SELECT))
|
|
|
|
return;
|
2020-09-14 13:53:48 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
// character selected
|
|
|
|
sP_CL2LS_REQ_CHAR_SELECT* chararacter = (sP_CL2LS_REQ_CHAR_SELECT*)data->buf;
|
|
|
|
INITSTRUCT(sP_LS2CL_REP_CHAR_SELECT_SUCC, resp);
|
2020-08-18 20:42:30 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
DEBUGLOG(
|
|
|
|
std::cout << "P_CL2LS_REQ_CHAR_SELECT:" << std::endl;
|
|
|
|
std::cout << "\tPC_UID: " << chararacter->iPC_UID << std::endl;
|
2020-09-14 13:53:48 +00:00
|
|
|
)
|
2020-09-01 22:37:09 +00:00
|
|
|
loginSessions[sock].selectedChar = chararacter->iPC_UID;
|
|
|
|
Database::updateSelected(loginSessions[sock].userID, loginSessions[sock].characters[chararacter->iPC_UID].slot);
|
|
|
|
sock->sendPacket((void*)&resp, P_LS2CL_REP_CHAR_SELECT_SUCC, sizeof(sP_LS2CL_REP_CHAR_SELECT_SUCC));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case P_CL2LS_REQ_SHARD_SELECT: {
|
|
|
|
if (data->size != sizeof(sP_CL2LS_REQ_SHARD_SELECT))
|
|
|
|
return;
|
2020-09-14 13:53:48 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
// tell client to connect to the shard server
|
|
|
|
sP_CL2LS_REQ_SHARD_SELECT* shard = (sP_CL2LS_REQ_SHARD_SELECT*)data->buf;
|
|
|
|
INITSTRUCT(sP_LS2CL_REP_SHARD_SELECT_SUCC, resp);
|
2020-08-29 11:14:21 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
DEBUGLOG(
|
|
|
|
std::cout << "P_CL2LS_REQ_SHARD_SELECT:" << std::endl;
|
|
|
|
std::cout << "\tShard: " << (int)shard->ShardNum << std::endl;
|
|
|
|
)
|
2020-08-18 20:42:30 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
const char* SHARD_IP = settings::SHARDSERVERIP.c_str();
|
|
|
|
resp.iEnterSerialKey = rand();
|
|
|
|
resp.g_FE_ServerPort = settings::SHARDPORT;
|
2020-08-18 20:42:30 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
// copy IP to resp (this struct uses ASCII encoding so we don't have to goof around converting encodings)
|
|
|
|
memcpy(resp.g_FE_ServerIP, SHARD_IP, strlen(SHARD_IP));
|
|
|
|
resp.g_FE_ServerIP[strlen(SHARD_IP)] = '\0';
|
2020-08-18 20:42:30 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
// pass player to CNSharedData
|
|
|
|
CNSharedData::setPlayer(resp.iEnterSerialKey, loginSessions[sock].characters[loginSessions[sock].selectedChar]);
|
2020-08-18 20:42:30 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
sock->sendPacket((void*)&resp, P_LS2CL_REP_SHARD_SELECT_SUCC, sizeof(sP_LS2CL_REP_SHARD_SELECT_SUCC));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case P_CL2LS_REQ_SAVE_CHAR_TUTOR: {
|
|
|
|
if (data->size != sizeof(sP_CL2LS_REQ_SAVE_CHAR_TUTOR))
|
|
|
|
return;
|
|
|
|
sP_CL2LS_REQ_SAVE_CHAR_TUTOR* save = (sP_CL2LS_REQ_SAVE_CHAR_TUTOR*)data->buf;
|
|
|
|
Database::finishTutorial(save->iPC_UID);
|
2020-09-14 14:03:30 +00:00
|
|
|
// update character in session
|
2020-09-07 00:16:44 +00:00
|
|
|
auto key = loginSessions[sock].characters[save->iPC_UID].FEKey;
|
|
|
|
loginSessions[sock].characters[save->iPC_UID] = Player(Database::getPlayer(save->iPC_UID));
|
|
|
|
loginSessions[sock].characters[save->iPC_UID].FEKey = key;
|
2020-09-14 14:03:30 +00:00
|
|
|
// no response here
|
2020-09-01 22:37:09 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case P_CL2LS_REQ_CHANGE_CHAR_NAME: {
|
|
|
|
if (data->size != sizeof(sP_CL2LS_REQ_CHANGE_CHAR_NAME))
|
|
|
|
return;
|
2020-09-27 05:12:26 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
sP_CL2LS_REQ_CHANGE_CHAR_NAME* save = (sP_CL2LS_REQ_CHANGE_CHAR_NAME*)data->buf;
|
|
|
|
Database::changeName(save);
|
2020-09-27 05:12:26 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
INITSTRUCT(sP_LS2CL_REP_CHANGE_CHAR_NAME_SUCC, resp);
|
|
|
|
resp.iPC_UID = save->iPCUID;
|
|
|
|
memcpy(resp.szFirstName, save->szFirstName, sizeof(char16_t)*9);
|
|
|
|
memcpy(resp.szLastName, save->szLastName, sizeof(char16_t) * 17);
|
|
|
|
resp.iSlotNum = save->iSlotNum;
|
2020-09-27 05:12:26 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
sock->sendPacket((void*)&resp, P_LS2CL_REP_CHANGE_CHAR_NAME_SUCC, sizeof(sP_LS2CL_REP_CHANGE_CHAR_NAME_SUCC));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case P_CL2LS_REQ_PC_EXIT_DUPLICATE:{
|
|
|
|
if (data->size != sizeof(sP_CL2LS_REQ_PC_EXIT_DUPLICATE))
|
|
|
|
return;
|
2020-09-07 17:23:00 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
sP_CL2LS_REQ_PC_EXIT_DUPLICATE* exit = (sP_CL2LS_REQ_PC_EXIT_DUPLICATE*)data->buf;
|
|
|
|
auto account = Database::findAccount(U16toU8(exit->szID));
|
2020-10-05 00:03:13 +00:00
|
|
|
|
2020-09-27 05:12:26 +00:00
|
|
|
// sanity check
|
|
|
|
if (account == nullptr) {
|
2020-09-21 19:43:53 +00:00
|
|
|
std::cout << "[WARN] P_CL2LS_REQ_PC_EXIT_DUPLICATE submitted unknown username: " << exit->szID << std::endl;
|
2020-09-01 22:37:09 +00:00
|
|
|
break;
|
2020-09-21 19:43:53 +00:00
|
|
|
}
|
2020-09-14 13:53:48 +00:00
|
|
|
|
2020-09-27 05:12:26 +00:00
|
|
|
exitDuplicate(account->AccountID);
|
2020-09-01 22:37:09 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
if (settings::VERBOSITY)
|
|
|
|
std::cerr << "OpenFusion: LOGIN UNIMPLM ERR. PacketType: " << Defines::p2str(CL2LS, data->type) << " (" << data->type << ")" << std::endl;
|
|
|
|
break;
|
|
|
|
/* Unimplemented CL2LS packets:
|
|
|
|
P_CL2LS_CHECK_NAME_LIST - unused by the client
|
|
|
|
P_CL2LS_REQ_SERVER_SELECT
|
|
|
|
P_CL2LS_REQ_SHARD_LIST_INFO - dev commands, useless as we only run 1 server
|
|
|
|
*/
|
2020-08-18 20:42:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-22 23:31:09 +00:00
|
|
|
void CNLoginServer::newConnection(CNSocket* cns) {
|
|
|
|
cns->setActiveKey(SOCKETKEY_E); // by default they accept keys encrypted with the default key
|
|
|
|
}
|
|
|
|
|
2020-08-18 20:42:30 +00:00
|
|
|
void CNLoginServer::killConnection(CNSocket* cns) {
|
|
|
|
loginSessions.erase(cns);
|
2020-08-22 17:19:46 +00:00
|
|
|
}
|
2020-09-01 22:37:09 +00:00
|
|
|
|
|
|
|
#pragma region helperMethods
|
|
|
|
bool CNLoginServer::isAccountInUse(int accountId) {
|
|
|
|
std::map<CNSocket*, CNLoginData>::iterator it;
|
2020-09-27 05:12:26 +00:00
|
|
|
for (it = CNLoginServer::loginSessions.begin(); it != CNLoginServer::loginSessions.end(); it++) {
|
2020-09-01 22:37:09 +00:00
|
|
|
if (it->second.userID == accountId)
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
2020-09-14 13:20:55 +00:00
|
|
|
|
|
|
|
bool CNLoginServer::exitDuplicate(int accountId) {
|
2020-09-01 22:37:09 +00:00
|
|
|
std::map<CNSocket*, CNLoginData>::iterator it;
|
2020-09-27 05:12:26 +00:00
|
|
|
for (it = CNLoginServer::loginSessions.begin(); it != CNLoginServer::loginSessions.end(); it++) {
|
|
|
|
if (it->second.userID == accountId) {
|
2020-09-01 22:37:09 +00:00
|
|
|
CNSocket* sock = it->first;
|
|
|
|
INITSTRUCT(sP_LS2CL_REP_PC_EXIT_DUPLICATE, resp);
|
|
|
|
resp.iErrorCode = 0;
|
|
|
|
sock->sendPacket((void*)&resp, P_LS2CL_REP_PC_EXIT_DUPLICATE, sizeof(sP_LS2CL_REP_PC_EXIT_DUPLICATE));
|
|
|
|
sock->kill();
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
2020-09-14 13:20:55 +00:00
|
|
|
|
|
|
|
bool CNLoginServer::isLoginDataGood(std::string login, std::string password) {
|
2020-09-06 15:27:53 +00:00
|
|
|
std::regex loginRegex("[a-zA-Z0-9_-]{4,32}");
|
|
|
|
std::regex passwordRegex("[a-zA-Z0-9!@#$%^&*()_+]{8,32}");
|
2020-09-21 19:49:08 +00:00
|
|
|
|
2020-09-01 22:37:09 +00:00
|
|
|
return (std::regex_match(login, loginRegex) && std::regex_match(password, passwordRegex));
|
|
|
|
}
|
2020-09-14 13:20:55 +00:00
|
|
|
|
|
|
|
bool CNLoginServer::isPasswordCorrect(std::string actualPassword, std::string tryPassword) {
|
2020-09-01 22:37:09 +00:00
|
|
|
return BCrypt::validatePassword(tryPassword, actualPassword);
|
|
|
|
}
|
2020-09-14 13:20:55 +00:00
|
|
|
|
|
|
|
bool CNLoginServer::isCharacterNameGood(std::string Firstname, std::string Lastname) {
|
2020-09-09 12:36:35 +00:00
|
|
|
std::regex firstnamecheck("[a-zA-Z0-9]+(?: [a-zA-Z0-9]+)*$");
|
|
|
|
std::regex lastnamecheck("[a-zA-Z0-9]+(?: [a-zA-Z0-9]+)*$");
|
|
|
|
return (std::regex_match(Firstname, firstnamecheck) && std::regex_match(Lastname, lastnamecheck));
|
|
|
|
}
|
2020-09-01 22:37:09 +00:00
|
|
|
#pragma endregion helperMethods
|