forked from metin2/client
647 lines
16 KiB
C++
647 lines
16 KiB
C++
|
#include "StdAfx.h"
|
|||
|
#include "AccountConnector.h"
|
|||
|
#include "Packet.h"
|
|||
|
#include "PythonNetworkStream.h"
|
|||
|
#include "../EterBase/tea.h"
|
|||
|
#include "../EterPack/EterPackManager.h"
|
|||
|
|
|||
|
#include "Hackshield.h"
|
|||
|
#include "WiseLogicXTrap.h"
|
|||
|
|
|||
|
// CHINA_CRYPT_KEY
|
|||
|
extern DWORD g_adwEncryptKey[4];
|
|||
|
extern DWORD g_adwDecryptKey[4];
|
|||
|
// END_OF_CHINA_CRYPT_KEY
|
|||
|
|
|||
|
#ifdef USE_OPENID
|
|||
|
extern int openid_test;
|
|||
|
#endif
|
|||
|
|
|||
|
void CAccountConnector::SetHandler(PyObject* poHandler)
|
|||
|
{
|
|||
|
m_poHandler = poHandler;
|
|||
|
}
|
|||
|
|
|||
|
void CAccountConnector::SetLoginInfo(const char * c_szName, const char * c_szPwd)
|
|||
|
{
|
|||
|
m_strID = c_szName;
|
|||
|
m_strPassword = c_szPwd;
|
|||
|
}
|
|||
|
|
|||
|
|
|||
|
void CAccountConnector::ClearLoginInfo( void )
|
|||
|
{
|
|||
|
m_strPassword = "";
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::Connect(const char * c_szAddr, int iPort, const char * c_szAccountAddr, int iAccountPort)
|
|||
|
{
|
|||
|
m_strAddr = c_szAddr;
|
|||
|
m_iPort = iPort;
|
|||
|
|
|||
|
__OfflineState_Set();
|
|||
|
|
|||
|
// CHINA_CRYPT_KEY
|
|||
|
if (LocaleService_IsYMIR())
|
|||
|
{
|
|||
|
}
|
|||
|
else
|
|||
|
{
|
|||
|
__BuildClientKey_20050304Myevan();
|
|||
|
}
|
|||
|
// END_OF_CHINA_CRYPT_KEY
|
|||
|
|
|||
|
return CNetworkStream::Connect(c_szAccountAddr, iAccountPort);
|
|||
|
}
|
|||
|
|
|||
|
void CAccountConnector::Disconnect()
|
|||
|
{
|
|||
|
CNetworkStream::Disconnect();
|
|||
|
__OfflineState_Set();
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::SendNEWCIBNPasspodAnswerPacket(const char * answer)
|
|||
|
{
|
|||
|
TPacketCGNEWCIBNPasspodAnswer answerPacket;
|
|||
|
answerPacket.bHeader = HEADER_CG_NEWCIBN_PASSPOD_ANSWER;
|
|||
|
strncpy(answerPacket.szAnswer, answer, NEWCIBN_PASSPOD_ANSWER_MAX_LEN);
|
|||
|
answerPacket.szAnswer[NEWCIBN_PASSPOD_ANSWER_MAX_LEN] = '\0';
|
|||
|
if (!Send(sizeof(answerPacket), &answerPacket))
|
|||
|
{
|
|||
|
TraceError("SendNEWCIBNPasspodAnswerPacket");
|
|||
|
return false;
|
|||
|
}
|
|||
|
return SendSequence();
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::SendRunupMatrixCardPacket(const char * c_szMatrixCardString)
|
|||
|
{
|
|||
|
TPacketCGRunupMatrixAnswer answerPacket;
|
|||
|
answerPacket.bHeader = HEADER_CG_RUNUP_MATRIX_ANSWER;
|
|||
|
strncpy(answerPacket.szAnswer, c_szMatrixCardString, RUNUP_MATRIX_ANSWER_MAX_LEN);
|
|||
|
answerPacket.szAnswer[RUNUP_MATRIX_ANSWER_MAX_LEN] = '\0';
|
|||
|
if (!Send(sizeof(answerPacket), &answerPacket))
|
|||
|
{
|
|||
|
TraceError("SendRunupMatrixCardPacketError");
|
|||
|
return false;
|
|||
|
}
|
|||
|
return SendSequence();
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::SendChinaMatrixCardPacket(const char * c_szMatrixCardString)
|
|||
|
{
|
|||
|
TPacketCGChinaMatrixCard MatrixCardPacket;
|
|||
|
MatrixCardPacket.bHeader = HEADER_CG_CHINA_MATRIX_CARD;
|
|||
|
strncpy(MatrixCardPacket.szAnswer, c_szMatrixCardString, CHINA_MATRIX_ANSWER_MAX_LEN);
|
|||
|
MatrixCardPacket.szAnswer[CHINA_MATRIX_ANSWER_MAX_LEN] = '\0';
|
|||
|
|
|||
|
if (!Send(sizeof(MatrixCardPacket), &MatrixCardPacket))
|
|||
|
{
|
|||
|
Tracen("SendLogin Error");
|
|||
|
return false;
|
|||
|
}
|
|||
|
|
|||
|
CPythonNetworkStream::Instance().SetWaitFlag();
|
|||
|
m_isWaitKey = TRUE;
|
|||
|
|
|||
|
return SendSequence();
|
|||
|
}
|
|||
|
|
|||
|
void CAccountConnector::Process()
|
|||
|
{
|
|||
|
CNetworkStream::Process();
|
|||
|
|
|||
|
if (!__StateProcess())
|
|||
|
{
|
|||
|
__OfflineState_Set();
|
|||
|
Disconnect();
|
|||
|
}
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::__StateProcess()
|
|||
|
{
|
|||
|
switch (m_eState)
|
|||
|
{
|
|||
|
case STATE_HANDSHAKE:
|
|||
|
return __HandshakeState_Process();
|
|||
|
break;
|
|||
|
case STATE_AUTH:
|
|||
|
return __AuthState_Process();
|
|||
|
break;
|
|||
|
}
|
|||
|
|
|||
|
return true;
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::__HandshakeState_Process()
|
|||
|
{
|
|||
|
if (!__AnalyzePacket(HEADER_GC_PHASE, sizeof(TPacketGCPhase), &CAccountConnector::__AuthState_RecvPhase))
|
|||
|
return false;
|
|||
|
|
|||
|
if (!__AnalyzePacket(HEADER_GC_HANDSHAKE, sizeof(TPacketGCHandshake), &CAccountConnector::__AuthState_RecvHandshake))
|
|||
|
return false;
|
|||
|
|
|||
|
if (!__AnalyzePacket(HEADER_GC_PING, sizeof(TPacketGCPing), &CAccountConnector::__AuthState_RecvPing))
|
|||
|
return false;
|
|||
|
|
|||
|
// TODO : <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD>ϰ<EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> data serialize & deserialize <20>۾<EFBFBD><DBBE>ؾ<EFBFBD> <20>Ѵ<EFBFBD>.
|
|||
|
if (!__AnalyzeVarSizePacket(HEADER_GC_HYBRIDCRYPT_KEYS, &CAccountConnector::__AuthState_RecvHybridCryptKeys))
|
|||
|
return false;
|
|||
|
|
|||
|
if (!__AnalyzeVarSizePacket(HEADER_GC_HYBRIDCRYPT_SDB, &CAccountConnector::__AuthState_RecvHybridCryptSDB))
|
|||
|
return false;
|
|||
|
|
|||
|
return true;
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::__AuthState_Process()
|
|||
|
{
|
|||
|
if (!__AnalyzePacket(0, sizeof(BYTE), &CAccountConnector::__AuthState_RecvEmpty))
|
|||
|
return true;
|
|||
|
|
|||
|
if (!__AnalyzePacket(HEADER_GC_PHASE, sizeof(TPacketGCPhase), &CAccountConnector::__AuthState_RecvPhase))
|
|||
|
return false;
|
|||
|
|
|||
|
if (!__AnalyzePacket(HEADER_GC_PING, sizeof(TPacketGCPing), &CAccountConnector::__AuthState_RecvPing))
|
|||
|
return false;
|
|||
|
|
|||
|
if (!__AnalyzePacket(HEADER_GC_AUTH_SUCCESS, sizeof(TPacketGCAuthSuccess), &CAccountConnector::__AuthState_RecvAuthSuccess))
|
|||
|
return true;
|
|||
|
|
|||
|
#ifdef USE_OPENID
|
|||
|
if (!__AnalyzePacket(HEADER_GC_AUTH_SUCCESS_OPENID, sizeof(TPacketGCAuthSuccess), &CAccountConnector::__AuthState_RecvAuthSuccess_OpenID))
|
|||
|
return true;
|
|||
|
#endif /* USE_OPENID */
|
|||
|
|
|||
|
if (!__AnalyzePacket(HEADER_GC_LOGIN_FAILURE, sizeof(TPacketGCAuthSuccess), &CAccountConnector::__AuthState_RecvAuthFailure))
|
|||
|
return true;
|
|||
|
|
|||
|
if (!__AnalyzePacket(HEADER_GC_CHINA_MATRIX_CARD, sizeof(TPacketGCChinaMatrixCard), &CAccountConnector::__AuthState_RecvChinaMatrixCard))
|
|||
|
return true;
|
|||
|
|
|||
|
if (!__AnalyzePacket(HEADER_GC_RUNUP_MATRIX_QUIZ, sizeof(TPacketGCRunupMatrixQuiz), &CAccountConnector::__AuthState_RecvRunupMatrixQuiz))
|
|||
|
return true;
|
|||
|
|
|||
|
if (!__AnalyzePacket(HEADER_GC_NEWCIBN_PASSPOD_REQUEST, sizeof(TPacketGCNEWCIBNPasspodRequest), &CAccountConnector::__AuthState_RecvNEWCIBNPasspodRequest))
|
|||
|
return true;
|
|||
|
|
|||
|
if (!__AnalyzePacket(HEADER_GC_HANDSHAKE, sizeof(TPacketGCHandshake), &CAccountConnector::__AuthState_RecvHandshake))
|
|||
|
return false;
|
|||
|
|
|||
|
if (!__AnalyzePacket(HEADER_GC_PANAMA_PACK, sizeof(TPacketGCPanamaPack), &CAccountConnector::__AuthState_RecvPanamaPack))
|
|||
|
return false;
|
|||
|
|
|||
|
// TODO : <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD>ϰ<EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> data serialize & deserialize <20>۾<EFBFBD><DBBE>ؾ<EFBFBD> <20>Ѵ<EFBFBD>.
|
|||
|
if (!__AnalyzeVarSizePacket(HEADER_GC_HYBRIDCRYPT_KEYS, &CAccountConnector::__AuthState_RecvHybridCryptKeys))
|
|||
|
return false;
|
|||
|
|
|||
|
if (!__AnalyzeVarSizePacket(HEADER_GC_HYBRIDCRYPT_SDB, &CAccountConnector::__AuthState_RecvHybridCryptSDB))
|
|||
|
return false;
|
|||
|
|
|||
|
return true;
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::__AuthState_RecvEmpty()
|
|||
|
{
|
|||
|
BYTE byEmpty;
|
|||
|
Recv(sizeof(BYTE), &byEmpty);
|
|||
|
return true;
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::__AuthState_RecvPhase()
|
|||
|
{
|
|||
|
TPacketGCPhase kPacketPhase;
|
|||
|
if (!Recv(sizeof(kPacketPhase), &kPacketPhase))
|
|||
|
return false;
|
|||
|
|
|||
|
if (kPacketPhase.phase == PHASE_HANDSHAKE)
|
|||
|
{
|
|||
|
__HandshakeState_Set();
|
|||
|
}
|
|||
|
else if (kPacketPhase.phase == PHASE_AUTH)
|
|||
|
{
|
|||
|
|
|||
|
#ifdef USE_OPENID
|
|||
|
if (!openid_test)
|
|||
|
{
|
|||
|
//2012.07.19 OpenID : <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
|
|||
|
//Ongoing : <20><><EFBFBD><EFBFBD> <20><><EFBFBD>̵<EFBFBD> <20><><EFBFBD><EFBFBD>-> TPacketCGLogin5
|
|||
|
//Ŭ<><C5AC><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>ִ<EFBFBD> <20><><EFBFBD><EFBFBD>Ű<EFBFBD><C5B0><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>.
|
|||
|
|
|||
|
//const char* tempAuthKey = "d4025bc1f752b64fe5d51ae575ec4730"; //<2F>ϵ<EFBFBD><CFB5>ڵ<EFBFBD> <20><><EFBFBD><EFBFBD> 32
|
|||
|
TPacketCGLogin5 LoginPacket;
|
|||
|
LoginPacket.header = HEADER_CG_LOGIN5_OPENID;
|
|||
|
|
|||
|
strncpy(LoginPacket.authKey, LocaleService_GetOpenIDAuthKey(), OPENID_AUTHKEY_LEN);
|
|||
|
LoginPacket.authKey[OPENID_AUTHKEY_LEN] = '\0';
|
|||
|
|
|||
|
for (DWORD i = 0; i < 4; ++i)
|
|||
|
LoginPacket.adwClientKey[i] = g_adwEncryptKey[i];
|
|||
|
|
|||
|
if (!Send(sizeof(LoginPacket), &LoginPacket))
|
|||
|
{
|
|||
|
Tracen(" CAccountConnector::__AuthState_RecvPhase - SendLogin5 Error");
|
|||
|
return false;
|
|||
|
}
|
|||
|
|
|||
|
if (!SendSequence())
|
|||
|
{
|
|||
|
return false;
|
|||
|
}
|
|||
|
}
|
|||
|
else
|
|||
|
{
|
|||
|
TPacketCGLogin3 LoginPacket;
|
|||
|
LoginPacket.header = HEADER_CG_LOGIN3;
|
|||
|
|
|||
|
strncpy(LoginPacket.name, m_strID.c_str(), ID_MAX_NUM);
|
|||
|
strncpy(LoginPacket.pwd, m_strPassword.c_str(), PASS_MAX_NUM);
|
|||
|
LoginPacket.name[ID_MAX_NUM] = '\0';
|
|||
|
LoginPacket.pwd[PASS_MAX_NUM] = '\0';
|
|||
|
|
|||
|
// <20><><EFBFBD>й<EFBFBD>ȣ<EFBFBD><C8A3> <20><DEB8> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20>ִ<EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>־, <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD>
|
|||
|
ClearLoginInfo();
|
|||
|
CPythonNetworkStream& rkNetStream=CPythonNetworkStream::Instance();
|
|||
|
rkNetStream.ClearLoginInfo();
|
|||
|
|
|||
|
m_strPassword = "";
|
|||
|
|
|||
|
for (DWORD i = 0; i < 4; ++i)
|
|||
|
LoginPacket.adwClientKey[i] = g_adwEncryptKey[i];
|
|||
|
|
|||
|
if (!Send(sizeof(LoginPacket), &LoginPacket))
|
|||
|
{
|
|||
|
Tracen(" CAccountConnector::__AuthState_RecvPhase - SendLogin3 Error");
|
|||
|
return false;
|
|||
|
}
|
|||
|
|
|||
|
if (!SendSequence())
|
|||
|
{
|
|||
|
return false;
|
|||
|
}
|
|||
|
}
|
|||
|
#else /* USE_OPENID */
|
|||
|
|
|||
|
#ifdef USE_AHNLAB_HACKSHIELD
|
|||
|
HackShield_SetUserInfo(m_strID.c_str());
|
|||
|
#endif
|
|||
|
#ifdef XTRAP_CLIENT_ENABLE
|
|||
|
XTrap_SetUserInfo(m_strID.c_str(), NULL, NULL, NULL, NULL);
|
|||
|
#endif
|
|||
|
|
|||
|
|
|||
|
TPacketCGLogin3 LoginPacket;
|
|||
|
LoginPacket.header = HEADER_CG_LOGIN3;
|
|||
|
|
|||
|
strncpy(LoginPacket.name, m_strID.c_str(), ID_MAX_NUM);
|
|||
|
strncpy(LoginPacket.pwd, m_strPassword.c_str(), PASS_MAX_NUM);
|
|||
|
LoginPacket.name[ID_MAX_NUM] = '\0';
|
|||
|
LoginPacket.pwd[PASS_MAX_NUM] = '\0';
|
|||
|
|
|||
|
// <20><><EFBFBD>й<EFBFBD>ȣ<EFBFBD><C8A3> <20><DEB8> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20>ִ<EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>־, <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD>
|
|||
|
ClearLoginInfo();
|
|||
|
CPythonNetworkStream& rkNetStream=CPythonNetworkStream::Instance();
|
|||
|
rkNetStream.ClearLoginInfo();
|
|||
|
|
|||
|
m_strPassword = "";
|
|||
|
|
|||
|
for (DWORD i = 0; i < 4; ++i)
|
|||
|
LoginPacket.adwClientKey[i] = g_adwEncryptKey[i];
|
|||
|
|
|||
|
if (!Send(sizeof(LoginPacket), &LoginPacket))
|
|||
|
{
|
|||
|
Tracen(" CAccountConnector::__AuthState_RecvPhase - SendLogin3 Error");
|
|||
|
return false;
|
|||
|
}
|
|||
|
|
|||
|
if (!SendSequence())
|
|||
|
{
|
|||
|
return false;
|
|||
|
}
|
|||
|
#endif /* USE_OPENID */
|
|||
|
|
|||
|
__AuthState_Set();
|
|||
|
}
|
|||
|
|
|||
|
return true;
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::__AuthState_RecvHandshake()
|
|||
|
{
|
|||
|
TPacketGCHandshake kPacketHandshake;
|
|||
|
if (!Recv(sizeof(kPacketHandshake), &kPacketHandshake))
|
|||
|
return false;
|
|||
|
|
|||
|
// HandShake
|
|||
|
{
|
|||
|
Tracenf("HANDSHAKE RECV %u %d", kPacketHandshake.dwTime, kPacketHandshake.lDelta);
|
|||
|
|
|||
|
ELTimer_SetServerMSec(kPacketHandshake.dwTime+ kPacketHandshake.lDelta);
|
|||
|
|
|||
|
//DWORD dwBaseServerTime = kPacketHandshake.dwTime+ kPacketHandshake.lDelta;
|
|||
|
//DWORD dwBaseClientTime = ELTimer_GetMSec();
|
|||
|
|
|||
|
kPacketHandshake.dwTime = kPacketHandshake.dwTime + kPacketHandshake.lDelta + kPacketHandshake.lDelta;
|
|||
|
kPacketHandshake.lDelta = 0;
|
|||
|
|
|||
|
Tracenf("HANDSHAKE SEND %u", kPacketHandshake.dwTime);
|
|||
|
|
|||
|
if (!Send(sizeof(kPacketHandshake), &kPacketHandshake))
|
|||
|
{
|
|||
|
Tracen(" CAccountConnector::__AuthState_RecvHandshake - SendHandshake Error");
|
|||
|
return false;
|
|||
|
}
|
|||
|
}
|
|||
|
|
|||
|
return true;
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::__AuthState_RecvPanamaPack()
|
|||
|
{
|
|||
|
TPacketGCPanamaPack kPacket;
|
|||
|
|
|||
|
if (!Recv(sizeof(TPacketGCPanamaPack), &kPacket))
|
|||
|
return false;
|
|||
|
|
|||
|
CEterPackManager::instance().RegisterPack(kPacket.szPackName, "*", kPacket.abIV);
|
|||
|
return true;
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::__AuthState_RecvHybridCryptKeys(int iTotalSize)
|
|||
|
{
|
|||
|
int iFixedHeaderSize = TPacketGCHybridCryptKeys::GetFixedHeaderSize();
|
|||
|
|
|||
|
TPacketGCHybridCryptKeys kPacket(iTotalSize-iFixedHeaderSize);
|
|||
|
|
|||
|
if (!Recv(iFixedHeaderSize, &kPacket))
|
|||
|
return false;
|
|||
|
|
|||
|
if (!Recv(kPacket.iKeyStreamLen, kPacket.m_pStream))
|
|||
|
return false;
|
|||
|
|
|||
|
CEterPackManager::Instance().RetrieveHybridCryptPackKeys( kPacket.m_pStream );
|
|||
|
return true;
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::__AuthState_RecvHybridCryptSDB(int iTotalSize)
|
|||
|
{
|
|||
|
int iFixedHeaderSize = TPacketGCHybridSDB::GetFixedHeaderSize();
|
|||
|
|
|||
|
TPacketGCHybridSDB kPacket(iTotalSize-iFixedHeaderSize);
|
|||
|
|
|||
|
if (!Recv(iFixedHeaderSize, &kPacket))
|
|||
|
return false;
|
|||
|
|
|||
|
if (!Recv(kPacket.iSDBStreamLen, kPacket.m_pStream))
|
|||
|
return false;
|
|||
|
|
|||
|
CEterPackManager::Instance().RetrieveHybridCryptPackSDB( kPacket.m_pStream );
|
|||
|
return true;
|
|||
|
}
|
|||
|
|
|||
|
|
|||
|
bool CAccountConnector::__AuthState_RecvPing()
|
|||
|
{
|
|||
|
TPacketGCPing kPacketPing;
|
|||
|
if (!Recv(sizeof(kPacketPing), &kPacketPing))
|
|||
|
return false;
|
|||
|
|
|||
|
__AuthState_SendPong();
|
|||
|
|
|||
|
return true;
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::__AuthState_SendPong()
|
|||
|
{
|
|||
|
TPacketCGPong kPacketPong;
|
|||
|
kPacketPong.bHeader = HEADER_CG_PONG;
|
|||
|
if (!Send(sizeof(kPacketPong), &kPacketPong))
|
|||
|
return false;
|
|||
|
|
|||
|
return SendSequence();
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::__AuthState_RecvAuthSuccess()
|
|||
|
{
|
|||
|
TPacketGCAuthSuccess kAuthSuccessPacket;
|
|||
|
if (!Recv(sizeof(kAuthSuccessPacket), &kAuthSuccessPacket))
|
|||
|
return false;
|
|||
|
|
|||
|
if (!kAuthSuccessPacket.bResult)
|
|||
|
{
|
|||
|
if (m_poHandler)
|
|||
|
PyCallClassMemberFunc(m_poHandler, "OnLoginFailure", Py_BuildValue("(s)", "BESAMEKEY"));
|
|||
|
}
|
|||
|
else
|
|||
|
{
|
|||
|
DWORD dwPanamaKey = kAuthSuccessPacket.dwLoginKey ^ g_adwEncryptKey[0] ^ g_adwEncryptKey[1] ^ g_adwEncryptKey[2] ^ g_adwEncryptKey[3];
|
|||
|
CEterPackManager::instance().DecryptPackIV(dwPanamaKey);
|
|||
|
|
|||
|
CPythonNetworkStream & rkNet = CPythonNetworkStream::Instance();
|
|||
|
rkNet.SetLoginKey(kAuthSuccessPacket.dwLoginKey);
|
|||
|
rkNet.Connect(m_strAddr.c_str(), m_iPort);
|
|||
|
}
|
|||
|
|
|||
|
Disconnect();
|
|||
|
__OfflineState_Set();
|
|||
|
|
|||
|
return true;
|
|||
|
}
|
|||
|
|
|||
|
#ifdef USE_OPENID
|
|||
|
bool CAccountConnector::__AuthState_RecvAuthSuccess_OpenID()
|
|||
|
{
|
|||
|
TPacketGCAuthSuccessOpenID kAuthSuccessOpenIDPacket;
|
|||
|
if (!Recv(sizeof(kAuthSuccessOpenIDPacket), &kAuthSuccessOpenIDPacket))
|
|||
|
return false;
|
|||
|
|
|||
|
if (!kAuthSuccessOpenIDPacket.bResult)
|
|||
|
{
|
|||
|
if (m_poHandler)
|
|||
|
PyCallClassMemberFunc(m_poHandler, "OnLoginFailure", Py_BuildValue("(s)", "BESAMEKEY"));
|
|||
|
}
|
|||
|
else
|
|||
|
{
|
|||
|
DWORD dwPanamaKey = kAuthSuccessOpenIDPacket.dwLoginKey ^ g_adwEncryptKey[0] ^ g_adwEncryptKey[1] ^ g_adwEncryptKey[2] ^ g_adwEncryptKey[3];
|
|||
|
CEterPackManager::instance().DecryptPackIV(dwPanamaKey);
|
|||
|
|
|||
|
CPythonNetworkStream & rkNet = CPythonNetworkStream::Instance();
|
|||
|
rkNet.SetLoginInfo(kAuthSuccessOpenIDPacket.login, "0000"); //OpenID <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD>й<EFBFBD>ȣ<EFBFBD><C8A3> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>ʴ´<CAB4>.
|
|||
|
rkNet.SetLoginKey(kAuthSuccessOpenIDPacket.dwLoginKey);
|
|||
|
rkNet.Connect(m_strAddr.c_str(), m_iPort);
|
|||
|
}
|
|||
|
|
|||
|
Disconnect();
|
|||
|
__OfflineState_Set();
|
|||
|
|
|||
|
return true;
|
|||
|
}
|
|||
|
#endif /* USE_OPENID */
|
|||
|
|
|||
|
|
|||
|
bool CAccountConnector::__AuthState_RecvAuthFailure()
|
|||
|
{
|
|||
|
TPacketGCLoginFailure packet_failure;
|
|||
|
if (!Recv(sizeof(TPacketGCLoginFailure), &packet_failure))
|
|||
|
return false;
|
|||
|
|
|||
|
if (m_poHandler)
|
|||
|
PyCallClassMemberFunc(m_poHandler, "OnLoginFailure", Py_BuildValue("(s)", packet_failure.szStatus));
|
|||
|
|
|||
|
// __OfflineState_Set();
|
|||
|
|
|||
|
return true;
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::__AuthState_RecvRunupMatrixQuiz()
|
|||
|
{
|
|||
|
TPacketGCRunupMatrixQuiz kMatrixQuizPacket;
|
|||
|
if (!Recv(sizeof(TPacketGCRunupMatrixQuiz), &kMatrixQuizPacket))
|
|||
|
return false;
|
|||
|
|
|||
|
PyCallClassMemberFunc(m_poHandler, "BINARY_OnRunupMatrixQuiz", Py_BuildValue("(s)", kMatrixQuizPacket.szQuiz));
|
|||
|
return true;
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::__AuthState_RecvNEWCIBNPasspodRequest()
|
|||
|
{
|
|||
|
TPacketGCNEWCIBNPasspodRequest kRequestPacket;
|
|||
|
if (!Recv(sizeof(kRequestPacket), &kRequestPacket))
|
|||
|
return false;
|
|||
|
|
|||
|
PyCallClassMemberFunc(m_poHandler, "BINARY_OnNEWCIBNPasspodRequest", Py_BuildValue("()"));
|
|||
|
return true;
|
|||
|
}
|
|||
|
|
|||
|
#define ROW(rows, i) ((rows >> ((4 - i - 1) * 8)) & 0x000000FF)
|
|||
|
#define COL(cols, i) ((cols >> ((4 - i - 1) * 8)) & 0x000000FF)
|
|||
|
|
|||
|
bool CAccountConnector::__AuthState_RecvChinaMatrixCard()
|
|||
|
{
|
|||
|
TPacketGCChinaMatrixCard kMatrixCardPacket;
|
|||
|
if (!Recv(sizeof(TPacketGCChinaMatrixCard), &kMatrixCardPacket))
|
|||
|
return false;
|
|||
|
|
|||
|
if (m_poHandler)
|
|||
|
{
|
|||
|
PyObject * pyValue = Py_BuildValue("(iiiiiiii)", ROW(kMatrixCardPacket.dwRows, 0),
|
|||
|
ROW(kMatrixCardPacket.dwRows, 1),
|
|||
|
ROW(kMatrixCardPacket.dwRows, 2),
|
|||
|
ROW(kMatrixCardPacket.dwRows, 3),
|
|||
|
COL(kMatrixCardPacket.dwCols, 0),
|
|||
|
COL(kMatrixCardPacket.dwCols, 1),
|
|||
|
COL(kMatrixCardPacket.dwCols, 2),
|
|||
|
COL(kMatrixCardPacket.dwCols, 3));
|
|||
|
PyCallClassMemberFunc(m_poHandler, "OnMatrixCard", pyValue);
|
|||
|
}
|
|||
|
|
|||
|
return true;
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::__AnalyzePacket(UINT uHeader, UINT uPacketSize, bool (CAccountConnector::*pfnDispatchPacket)())
|
|||
|
{
|
|||
|
BYTE bHeader;
|
|||
|
if (!Peek(sizeof(bHeader), &bHeader))
|
|||
|
return true;
|
|||
|
|
|||
|
if (bHeader!=uHeader)
|
|||
|
return true;
|
|||
|
|
|||
|
if (!Peek(uPacketSize))
|
|||
|
return true;
|
|||
|
|
|||
|
return (this->*pfnDispatchPacket)();
|
|||
|
}
|
|||
|
|
|||
|
bool CAccountConnector::__AnalyzeVarSizePacket(UINT uHeader, bool (CAccountConnector::*pfnDispatchPacket)(int))
|
|||
|
{
|
|||
|
BYTE bHeader;
|
|||
|
if (!Peek(sizeof(bHeader), &bHeader))
|
|||
|
return true;
|
|||
|
|
|||
|
if (bHeader!=uHeader)
|
|||
|
return true;
|
|||
|
|
|||
|
TDynamicSizePacketHeader dynamicHeader;
|
|||
|
|
|||
|
if (!Peek(sizeof(dynamicHeader), &dynamicHeader))
|
|||
|
return true;
|
|||
|
|
|||
|
if (!Peek(dynamicHeader.size))
|
|||
|
return true;
|
|||
|
|
|||
|
return (this->*pfnDispatchPacket)(dynamicHeader.size);
|
|||
|
}
|
|||
|
|
|||
|
|
|||
|
void CAccountConnector::__OfflineState_Set()
|
|||
|
{
|
|||
|
__Inialize();
|
|||
|
}
|
|||
|
|
|||
|
void CAccountConnector::__HandshakeState_Set()
|
|||
|
{
|
|||
|
m_eState=STATE_HANDSHAKE;
|
|||
|
}
|
|||
|
|
|||
|
void CAccountConnector::__AuthState_Set()
|
|||
|
{
|
|||
|
m_eState=STATE_AUTH;
|
|||
|
}
|
|||
|
|
|||
|
void CAccountConnector::OnConnectFailure()
|
|||
|
{
|
|||
|
if (m_poHandler)
|
|||
|
PyCallClassMemberFunc(m_poHandler, "OnConnectFailure", Py_BuildValue("()"));
|
|||
|
|
|||
|
__OfflineState_Set();
|
|||
|
}
|
|||
|
|
|||
|
void CAccountConnector::OnConnectSuccess()
|
|||
|
{
|
|||
|
m_eState = STATE_HANDSHAKE;
|
|||
|
}
|
|||
|
|
|||
|
void CAccountConnector::OnRemoteDisconnect()
|
|||
|
{
|
|||
|
// Matrix Card Number <20><> <20><><EFBFBD><EFBFBD> <20><><EFBFBD>Ҵµ<D2B4> close <20>Ǹ<EFBFBD> <20><><EFBFBD>α<CEB1><D7B7><EFBFBD> <20><><EFBFBD><EFBFBD> <20>Ѵ<EFBFBD>.
|
|||
|
if (m_isWaitKey)
|
|||
|
{
|
|||
|
if (m_poHandler)
|
|||
|
{
|
|||
|
PyCallClassMemberFunc(m_poHandler, "OnExit", Py_BuildValue("()"));
|
|||
|
return;
|
|||
|
}
|
|||
|
}
|
|||
|
|
|||
|
__OfflineState_Set();
|
|||
|
}
|
|||
|
|
|||
|
void CAccountConnector::OnDisconnect()
|
|||
|
{
|
|||
|
__OfflineState_Set();
|
|||
|
}
|
|||
|
|
|||
|
void CAccountConnector::__Inialize()
|
|||
|
{
|
|||
|
m_eState=STATE_OFFLINE;
|
|||
|
m_isWaitKey = FALSE;
|
|||
|
}
|
|||
|
|
|||
|
CAccountConnector::CAccountConnector()
|
|||
|
{
|
|||
|
m_poHandler = NULL;
|
|||
|
m_strAddr = "";
|
|||
|
m_iPort = 0;
|
|||
|
|
|||
|
SetLoginInfo("", "");
|
|||
|
SetRecvBufferSize(1024 * 128);
|
|||
|
SetSendBufferSize(2048);
|
|||
|
__Inialize();
|
|||
|
}
|
|||
|
|
|||
|
CAccountConnector::~CAccountConnector()
|
|||
|
{
|
|||
|
__OfflineState_Set();
|
|||
|
}
|