- Char server will now ignore packet 0x65 for already authentified accounts.
git-svn-id: https://svn.code.sf.net/p/rathena/svn/trunk@6206 54d463be-8e91-2dee-dedb-b68131a5f0ec
This commit is contained in:
parent
18270f85ed
commit
0db2a0aa0b
@ -4,6 +4,8 @@ AS OF SVN REV. 5091, WE ARE NOW USING TRUNK. ALL UNTESTED BUGFIXES/FEATURES GO
|
|||||||
IF YOU HAVE A WORKING AND TESTED BUGFIX PUT IT INTO STABLE AS WELL AS TRUNK.
|
IF YOU HAVE A WORKING AND TESTED BUGFIX PUT IT INTO STABLE AS WELL AS TRUNK.
|
||||||
|
|
||||||
2006/04/20
|
2006/04/20
|
||||||
|
* Char server will now ignore packet 0x65 for already authentified
|
||||||
|
accounts. [Skotlex]
|
||||||
* Added two columns to item_db: equip_script and unequip_script are scripts
|
* Added two columns to item_db: equip_script and unequip_script are scripts
|
||||||
that are executed once when the corresponding item is equipped or
|
that are executed once when the corresponding item is equipped or
|
||||||
unequipped respectively. [Skotlex]
|
unequipped respectively. [Skotlex]
|
||||||
|
@ -3137,6 +3137,11 @@ int parse_char(int fd) {
|
|||||||
// memset(sd, 0, sizeof(struct char_session_data)); aCalloc does this [Skotlex]
|
// memset(sd, 0, sizeof(struct char_session_data)); aCalloc does this [Skotlex]
|
||||||
strncpy(sd->email, "no mail", 40); // put here a mail without '@' to refuse deletion if we don't receive the e-mail
|
strncpy(sd->email, "no mail", 40); // put here a mail without '@' to refuse deletion if we don't receive the e-mail
|
||||||
sd->connect_until_time = 0; // unknow or illimited (not displaying on map-server)
|
sd->connect_until_time = 0; // unknow or illimited (not displaying on map-server)
|
||||||
|
} else {
|
||||||
|
//Received again auth packet for already authentified account?? Discard it.
|
||||||
|
//TODO: Perhaps log this as a hack attempt?
|
||||||
|
RFIFOSKIP(fd,17);
|
||||||
|
break;
|
||||||
}
|
}
|
||||||
sd->account_id = RFIFOL(fd,2);
|
sd->account_id = RFIFOL(fd,2);
|
||||||
sd->login_id1 = RFIFOL(fd,6);
|
sd->login_id1 = RFIFOL(fd,6);
|
||||||
|
@ -2981,7 +2981,13 @@ int parse_char(int fd) {
|
|||||||
CREATE(session[fd]->session_data, struct char_session_data, 1);
|
CREATE(session[fd]->session_data, struct char_session_data, 1);
|
||||||
sd = (struct char_session_data*)session[fd]->session_data;
|
sd = (struct char_session_data*)session[fd]->session_data;
|
||||||
sd->connect_until_time = 0; // unknow or illimited (not displaying on map-server)
|
sd->connect_until_time = 0; // unknow or illimited (not displaying on map-server)
|
||||||
|
} else {
|
||||||
|
//Received again auth packet for already authentified account?? Discard it.
|
||||||
|
//TODO: Perhaps log this as a hack attempt?
|
||||||
|
RFIFOSKIP(fd,17);
|
||||||
|
break;
|
||||||
}
|
}
|
||||||
|
|
||||||
sd->account_id = RFIFOL(fd, 2);
|
sd->account_id = RFIFOL(fd, 2);
|
||||||
sd->login_id1 = RFIFOL(fd, 6);
|
sd->login_id1 = RFIFOL(fd, 6);
|
||||||
sd->login_id2 = RFIFOL(fd, 10);
|
sd->login_id2 = RFIFOL(fd, 10);
|
||||||
|
Loading…
x
Reference in New Issue
Block a user