| 1 |
|
| 2 |
#include <winsock2.h> |
| 3 |
#include "bool.h" |
| 4 |
#include "Flatline_Net.h" |
| 5 |
#include "Flatline_Win32.h" |
| 6 |
#include "Mariusnet_Defs.h" |
| 7 |
#include "Daodan_Console.h" |
| 8 |
#include <stdio.h> |
| 9 |
#include <inaddr.h> |
| 10 |
#pragma comment(lib, "wininet.lib") |
| 11 |
|
| 12 |
|
| 13 |
typedef struct hostent hostent ; |
| 14 |
typedef struct in_addr in_addr; |
| 15 |
|
| 16 |
char MariusLogin[32]={0}; |
| 17 |
unsigned char MariusPassword[16]={0}; |
| 18 |
|
| 19 |
m_room RoomList[64] = {0}; |
| 20 |
bool RoomListGotten = 0; |
| 21 |
|
| 22 |
bool Are_We_Logged_In = 0; |
| 23 |
|
| 24 |
RGBA blue = {0xFF, 0, 0, 0}; |
| 25 |
RGBA green = {0, 0xFF, 0, 0}; |
| 26 |
RGBA red = {0, 0, 0xFF, 0}; |
| 27 |
|
| 28 |
RGBA grey = {0x80,0x80,0x80,0x80}; |
| 29 |
|
| 30 |
int MariusNet_OutgoingPacketWrapper(int socket, const sockaddr* address, marius_packet* data, short datalen) |
| 31 |
{ |
| 32 |
data->header.PacketSize = htonl(datalen); |
| 33 |
//NetUDPSocket_Send( socket, address, (char*)data, sizeof(marius_header) ); |
| 34 |
//datalen -= sizeof(marius_header); |
| 35 |
//(char*)data += sizeof(marius_header); |
| 36 |
return NetUDPSocket_Send( socket, address, (char*)data, datalen); |
| 37 |
} |
| 38 |
|
| 39 |
int PacketCached = 0; |
| 40 |
int MariusNet_IncomingPacketWrapper(int socket, char buffer[], int bufferlength, int flags) |
| 41 |
{ |
| 42 |
int inSize = 0; |
| 43 |
unsigned fullSize = -1; |
| 44 |
static char cacheBuffer[1440] = {0}; |
| 45 |
bool NeedMoreData = 0; |
| 46 |
if(PacketCached) |
| 47 |
{ |
| 48 |
unsigned int PacketSize = ntohl(((marius_packet*)cacheBuffer)->header.PacketSize); |
| 49 |
/* |
| 50 |
if(ntohs(((marius_packet*)cacheBuffer)->header.PacketSignature) != 0xDEAD) |
| 51 |
{ |
| 52 |
PacketCached = PacketSize = 0; |
| 53 |
NeedMoreData = 1; |
| 54 |
} |
| 55 |
*/ |
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
if(PacketCached >= PacketSize) |
| 60 |
{ |
| 61 |
memcpy( buffer, cacheBuffer, PacketSize ); |
| 62 |
PacketCached -= PacketSize; |
| 63 |
} |
| 64 |
else |
| 65 |
{ |
| 66 |
memcpy( buffer, cacheBuffer, PacketCached ); |
| 67 |
inSize += PacketCached; |
| 68 |
NeedMoreData = 1; |
| 69 |
PacketCached = 0; |
| 70 |
} |
| 71 |
if(PacketCached < 0) |
| 72 |
{ |
| 73 |
DDrConsole_PrintF("Warning, took too much from cache"); |
| 74 |
PacketCached = 0; |
| 75 |
} |
| 76 |
else if (PacketCached > 0)// && ntohs((short*)(cacheBuffer + PacketSize)) == 0xDEAD) |
| 77 |
{ |
| 78 |
memcpy( cacheBuffer, cacheBuffer + PacketSize, PacketCached ); |
| 79 |
} |
| 80 |
else |
| 81 |
{ |
| 82 |
memset(cacheBuffer, 0, 1440); |
| 83 |
} |
| 84 |
|
| 85 |
if(!NeedMoreData) return PacketSize; |
| 86 |
|
| 87 |
} |
| 88 |
do |
| 89 |
{ |
| 90 |
int tempSize = recv(socket, buffer + inSize, bufferlength, flags); |
| 91 |
if(tempSize == SOCKET_ERROR) |
| 92 |
{ |
| 93 |
NetCatchError(); |
| 94 |
return SOCKET_ERROR; |
| 95 |
} |
| 96 |
|
| 97 |
if(fullSize == -1) |
| 98 |
{ |
| 99 |
if(ntohs(((marius_packet*)buffer)->header.PacketSignature) != 0xDEAD) |
| 100 |
{ |
| 101 |
DDrConsole_PrintF("Bad header signature...closing Mariusnet connection"); |
| 102 |
return SOCKET_ERROR; |
| 103 |
} |
| 104 |
fullSize = ntohl(((marius_packet*)buffer)->header.PacketSize); |
| 105 |
} |
| 106 |
inSize += tempSize; |
| 107 |
|
| 108 |
} |
| 109 |
while(inSize < fullSize); |
| 110 |
|
| 111 |
//double packet madness |
| 112 |
if(inSize > fullSize |
| 113 |
&& ntohs(*(short*)(buffer + fullSize)) == 0xDEAD |
| 114 |
&& ntohl(((marius_packet*)(buffer + fullSize))->header.PacketSize) > 0 |
| 115 |
&& inSize - fullSize > sizeof(marius_header) |
| 116 |
) |
| 117 |
{ |
| 118 |
memcpy(cacheBuffer, buffer + fullSize, inSize - fullSize); |
| 119 |
|
| 120 |
PacketCached = inSize - fullSize; |
| 121 |
} |
| 122 |
else PacketCached = 0; |
| 123 |
return inSize; |
| 124 |
} |
| 125 |
|
| 126 |
|
| 127 |
sockaddr_in Marius_Server; |
| 128 |
|
| 129 |
|
| 130 |
bool MariusNet_Initialize() |
| 131 |
{ |
| 132 |
hostent* host_info = 0; |
| 133 |
//host_info = gethostbyname("myth.mariusnet.com"); |
| 134 |
|
| 135 |
host_info = gethostbyname("metaserver.lhowon.org"); |
| 136 |
if(!host_info) |
| 137 |
{ |
| 138 |
DDrConsole_PrintF("Error, could not resolve myth.mariusnet.com"); |
| 139 |
return 1; |
| 140 |
} |
| 141 |
Marius_Server.sin_port = htons(6321); |
| 142 |
Marius_Server.sin_family = AF_INET; |
| 143 |
Marius_Server.sin_addr.S_un.S_addr = *(ULONG*)host_info->h_addr_list[0]; |
| 144 |
return 0; |
| 145 |
} |
| 146 |
|
| 147 |
void Initialize_MPacket( marius_packet* packet, short ID ) |
| 148 |
{ |
| 149 |
memset( packet, 0, sizeof(marius_packet) ); |
| 150 |
packet->header.PacketSignature = htons(0xDEAD); |
| 151 |
packet->header.PacketId = htons(ID); |
| 152 |
|
| 153 |
} |
| 154 |
|
| 155 |
void Initialize_LoginPacket( marius_packet* packet) |
| 156 |
{ |
| 157 |
int NameSize = 0; |
| 158 |
int TeamSize = 0; |
| 159 |
char (*test)[] = packet; |
| 160 |
Initialize_MPacket(packet, pt_PlayerLogin); |
| 161 |
|
| 162 |
packet->login.UpdateAppearance = 1; |
| 163 |
packet->login.Platform = htons(1); |
| 164 |
strncpy(packet->login.LoginId, MariusLogin, 32); |
| 165 |
packet->login.EncryptionType = htons(1); |
| 166 |
strcpy(packet->login.AppName, "MARATHON" ); //ONI ;) |
| 167 |
strncpy(packet->login.BuildDate, __DATE__, 32 ); |
| 168 |
strncpy(packet->login.BuildTime, __TIME__, 32 ); |
| 169 |
|
| 170 |
|
| 171 |
packet->login.PlayerInfo.clientVersion = htons(5000); |
| 172 |
NameSize = sprintf(packet->login.PlayerInfo.Name, MariusLogin); |
| 173 |
//TeamSize = sprintf(packet->login.PlayerInfo.Name + NameSize, "TCTF") + 1; |
| 174 |
|
| 175 |
packet->login.PlayerInfoSize = htons(40 + NameSize + TeamSize); |
| 176 |
} |
| 177 |
|
| 178 |
char EncryptionTypes[][32] = |
| 179 |
{ |
| 180 |
"Plaintext", |
| 181 |
"Braindead Simple", |
| 182 |
}; |
| 183 |
|
| 184 |
enum { |
| 185 |
SyntaxError, |
| 186 |
GamesNotAllowed, |
| 187 |
InvalidVersion, |
| 188 |
BadUserOrPassword, |
| 189 |
UserNotLoggedIn, |
| 190 |
BadMetaserverVersion, |
| 191 |
UserAlreadyLoggedIn, |
| 192 |
UnknownGameType, |
| 193 |
LoginSuccessful, |
| 194 |
LogoutSuccessful, |
| 195 |
PlayerNotInRoom, |
| 196 |
GameAlreadyExists, |
| 197 |
AccountAlreadyLoggedIn, |
| 198 |
RoomFull, |
| 199 |
AccountLocked, |
| 200 |
NotSupported |
| 201 |
}; |
| 202 |
|
| 203 |
static const char* sRoomNames[] = { |
| 204 |
"Crows Bridge", |
| 205 |
"Otter Ferry", |
| 206 |
"White Falls", |
| 207 |
"Silvermines", |
| 208 |
"Shoal", |
| 209 |
"Madrigal", |
| 210 |
"Tyr", |
| 211 |
"Ash", |
| 212 |
"Scales", |
| 213 |
"Covenant", |
| 214 |
"Muirthemne", |
| 215 |
"Seven Gates", |
| 216 |
"Bagrada", |
| 217 |
"The Barrier", |
| 218 |
"Forest Heart", |
| 219 |
"The Ermine", |
| 220 |
"The Dire Marsh", |
| 221 |
"The Highlands", |
| 222 |
"The Drowned Kingdom", |
| 223 |
"The Great Devoid", |
| 224 |
"Shiver", |
| 225 |
"The Caterthuns", |
| 226 |
"Soulblighter", |
| 227 |
"Balor", |
| 228 |
"Sons of Myrgard", |
| 229 |
"Heart of the Stone", |
| 230 |
"Arrival", |
| 231 |
"Ingue Ferroque", |
| 232 |
"Vimy Ridge", |
| 233 |
"Stilwell Road" |
| 234 |
}; |
| 235 |
void MSNet_LoginError_Output( int code ) |
| 236 |
{ |
| 237 |
switch(code) |
| 238 |
{ |
| 239 |
case(BadUserOrPassword): |
| 240 |
DDrConsole_PrintF( "Login denied: bad username or password." ); |
| 241 |
break; |
| 242 |
case(UserAlreadyLoggedIn): |
| 243 |
DDrConsole_PrintF( "Login denied: that user is already logged in."); |
| 244 |
break; |
| 245 |
case(AccountAlreadyLoggedIn): |
| 246 |
DDrConsole_PrintF( "Login denied: that account is already logged in."); |
| 247 |
break; |
| 248 |
case(RoomFull): |
| 249 |
DDrConsole_PrintF( "Login denied: room is full!?"); |
| 250 |
break; |
| 251 |
case(AccountLocked): |
| 252 |
DDrConsole_PrintF( "Login denied: your account is locked."); |
| 253 |
break; |
| 254 |
default: |
| 255 |
DDrConsole_PrintF("There was a problem connecting to the server" |
| 256 |
"that tracks Internet games. Please try again later."); |
| 257 |
break; |
| 258 |
} |
| 259 |
|
| 260 |
} |
| 261 |
int MSNet_Room_Join( short Room, char* Key) |
| 262 |
{ |
| 263 |
marius_packet mPacket = {0}; |
| 264 |
|
| 265 |
char incomingData[1400] = {0}; |
| 266 |
marius_packet* incomingPacket = (marius_packet*)incomingData; |
| 267 |
int sent_bytes = 0; |
| 268 |
|
| 269 |
sockaddr_in SockAddr; |
| 270 |
int Room_Socket = NetTCPSocket_Create(RoomList[Room].Port, &SockAddr); |
| 271 |
|
| 272 |
sockaddr_in RoomAddr = {0}; |
| 273 |
RoomAddr.sin_port = RoomList[Room].Port; |
| 274 |
RoomAddr.sin_family = AF_INET; |
| 275 |
RoomAddr.sin_addr.S_un.S_addr = RoomList[Room].IPAddress; |
| 276 |
|
| 277 |
|
| 278 |
|
| 279 |
DDrConsole_PrintF("Joining room %hi", Room); |
| 280 |
|
| 281 |
if(Room_Socket == -1) |
| 282 |
{ |
| 283 |
DDrConsole_PrintF("Failed to initialize room socket!"); |
| 284 |
} |
| 285 |
|
| 286 |
if(connect( Room_Socket, (sockaddr *)&RoomAddr, sizeof(sockaddr_in))) |
| 287 |
{ |
| 288 |
NetCatchError(); |
| 289 |
return 1; |
| 290 |
} |
| 291 |
|
| 292 |
Initialize_MPacket(&mPacket, pt_ChatRoomLogin); |
| 293 |
memcpy(mPacket.chatroom_join.RoomKey, Key, 32); |
| 294 |
strcpy(mPacket.chatroom_join.Name, MariusLogin); |
| 295 |
sent_bytes = MariusNet_OutgoingPacketWrapper(Room_Socket, (sockaddr*)&RoomAddr, (char*)&mPacket, |
| 296 |
sizeof(marius_header) + 33 + strlen(MariusLogin)); |
| 297 |
|
| 298 |
|
| 299 |
|
| 300 |
Initialize_MPacket(&mPacket, pt_RoomPlayerInfo); |
| 301 |
mPacket.player_info.clientVersion = htons(5000); |
| 302 |
sprintf(mPacket.player_info.Name, MariusLogin); |
| 303 |
sent_bytes = MariusNet_OutgoingPacketWrapper(Room_Socket, (sockaddr*)&RoomAddr, (char*)&mPacket, |
| 304 |
sizeof(marius_header) + 40 + strlen(MariusLogin)); |
| 305 |
|
| 306 |
if(MariusNet_IncomingPacketWrapper(Room_Socket, incomingData, 1400, 0) == SOCKET_ERROR) |
| 307 |
{ |
| 308 |
return 0; |
| 309 |
} |
| 310 |
|
| 311 |
if(ntohs(incomingPacket->header.PacketId)== pt_LoginInfo) |
| 312 |
{ |
| 313 |
//DDrConsole_PrintF("Login failed: %s", incomingPacket->login_denied.DenialMessage ); |
| 314 |
MSNet_LoginError_Output(ntohl(incomingPacket->login_denied.code)); |
| 315 |
return 0; |
| 316 |
} |
| 317 |
|
| 318 |
while(1) |
| 319 |
{ |
| 320 |
if(MariusNet_IncomingPacketWrapper(Room_Socket, incomingData, 1400, 0) == SOCKET_ERROR) |
| 321 |
{ |
| 322 |
return 0; |
| 323 |
} |
| 324 |
switch(ntohs(incomingPacket->header.PacketId)) |
| 325 |
{ |
| 326 |
case pt_RoomList: |
| 327 |
case pt_PlayerInfo: |
| 328 |
case pt_GameList: |
| 329 |
case pt_PlayerList: |
| 330 |
//Do nothing for now |
| 331 |
break; |
| 332 |
case pt_BlueBarMsg: |
| 333 |
DDrConsole_PrintColored(incomingPacket->motd.Message, 0, blue, grey ); |
| 334 |
break; |
| 335 |
case pt_ChatMessage: |
| 336 |
break; |
| 337 |
case pt_KeepAlive: |
| 338 |
MariusNet_OutgoingPacketWrapper(Room_Socket, (sockaddr*)&RoomAddr, incomingData, |
| 339 |
sizeof(marius_header)); |
| 340 |
break; |
| 341 |
default: |
| 342 |
DDrConsole_PrintF("Got packet of type %hi", ntohs(incomingPacket->header.PacketId)); |
| 343 |
break; |
| 344 |
} |
| 345 |
} |
| 346 |
|
| 347 |
return 0; |
| 348 |
} |
| 349 |
|
| 350 |
DWORD WINAPI MSNet_Handler(void* unused) |
| 351 |
{ |
| 352 |
int Port = 4156; |
| 353 |
int Marius_Socket = -1; |
| 354 |
int PlayerID; |
| 355 |
char RoomToken[33] = {0}; |
| 356 |
int i = 0; |
| 357 |
|
| 358 |
|
| 359 |
|
| 360 |
sockaddr_in Marius_Addr = {0}; |
| 361 |
|
| 362 |
if(Are_We_Logged_In) |
| 363 |
{ |
| 364 |
DDrConsole_PrintF("You're already logged in!"); |
| 365 |
return 0; |
| 366 |
} |
| 367 |
|
| 368 |
NetPlatform_Initalize(); |
| 369 |
|
| 370 |
|
| 371 |
if(MariusNet_Initialize()) |
| 372 |
{ |
| 373 |
return 0; |
| 374 |
} |
| 375 |
|
| 376 |
//Horribly set up. |
| 377 |
while( (Marius_Socket == -1 || Marius_Socket == 0 )&& Port < 6641) |
| 378 |
{ |
| 379 |
|
| 380 |
//Marius_Socket = NetTCPSocket_Create(Port, &Marius_Addr); |
| 381 |
//NetUDPSocket_Close( Marius_Socket ); |
| 382 |
Marius_Socket = NetTCPSocket_Create(Port, &Marius_Addr); |
| 383 |
//Port++; |
| 384 |
} |
| 385 |
|
| 386 |
if(Marius_Socket != -1) |
| 387 |
{ |
| 388 |
unsigned char incomingData[1400] = {0}; |
| 389 |
short incomingLength = 0; |
| 390 |
marius_packet* incomingPacket = &incomingData; |
| 391 |
//Initialize |
| 392 |
marius_packet mPacket; |
| 393 |
int sent_bytes; |
| 394 |
Initialize_LoginPacket(&mPacket); |
| 395 |
|
| 396 |
DDrConsole_PrintF("Logging into Mariusnet <%s>...", inet_ntoa(Marius_Server.sin_addr)); |
| 397 |
if(connect( Marius_Socket, &Marius_Server, sizeof(sockaddr_in))) |
| 398 |
{ |
| 399 |
NetCatchError(); |
| 400 |
return 0; |
| 401 |
} |
| 402 |
DDrConsole_PrintF("Sending Player Info..."); |
| 403 |
sent_bytes = MariusNet_OutgoingPacketWrapper(Marius_Socket, (sockaddr*)&Marius_Server, (char*)&mPacket, |
| 404 |
sizeof(marius_header) + sizeof(m_player_login) - (sizeof(m_player_info) - ntohs(mPacket.login.PlayerInfoSize) ) ); |
| 405 |
/* |
| 406 |
if(!NetUDPSocket_Recieve(Marius_Socket, (sockaddr*)&Marius_Addr,incomingData, &incomingLength)) |
| 407 |
{ |
| 408 |
DDrConsole_PrintF("Data: %s Length %i", incomingData, incomingLength); |
| 409 |
return 0; |
| 410 |
} |
| 411 |
*/ |
| 412 |
if(MariusNet_IncomingPacketWrapper(Marius_Socket, incomingData, 1400, 0) == SOCKET_ERROR) |
| 413 |
{ |
| 414 |
return 0; |
| 415 |
} |
| 416 |
|
| 417 |
if(ntohs(incomingPacket->header.PacketId)== pt_EncryptionKey) |
| 418 |
{ |
| 419 |
//recv( Marius_Socket, incomingData, 1440, 0); |
| 420 |
DDrConsole_PrintF("Encryption Type %s", EncryptionTypes[ntohs(incomingPacket->salt.EncryptionType)] ); |
| 421 |
|
| 422 |
Initialize_MPacket(&mPacket, pt_Password); |
| 423 |
if(incomingPacket->salt.EncryptionType) |
| 424 |
{ |
| 425 |
|
| 426 |
unsigned char* Hash = mPacket.password.passHash; |
| 427 |
unsigned char* Salt = incomingPacket->salt.salt; |
| 428 |
unsigned char Pass[16] = {0}; |
| 429 |
|
| 430 |
memset(Pass, 0x23, 16); |
| 431 |
strcpy(Pass, MariusPassword ); |
| 432 |
|
| 433 |
for( i = 0; i < 16; i++ ) Hash[i] = Pass[i]^Salt[i]; |
| 434 |
for( i = 1; i < 16; i++ ) Hash[i] = Hash[i]^Hash[i-1]; |
| 435 |
for( i = 1; i < 16; i++ ) |
| 436 |
{ |
| 437 |
short value = ~( Hash[i]*Hash[i-1] ); |
| 438 |
Hash[i] = (unsigned char) value; |
| 439 |
|
| 440 |
} |
| 441 |
} |
| 442 |
else |
| 443 |
{ |
| 444 |
strncpy(mPacket.password.passHash, MariusPassword, 16); |
| 445 |
} |
| 446 |
|
| 447 |
DDrConsole_PrintF("Sending Password..."); |
| 448 |
sent_bytes = MariusNet_OutgoingPacketWrapper(Marius_Socket, (sockaddr*)&Marius_Server, (char*)&mPacket, sizeof(marius_header) + sizeof(m_password) ); |
| 449 |
|
| 450 |
if(!NetUDPSocket_Recieve(Marius_Socket, (sockaddr*)&Marius_Addr,incomingData, &incomingLength)) |
| 451 |
{ |
| 452 |
return 0; |
| 453 |
} |
| 454 |
DDrConsole_PrintF("Password ACK!"); |
| 455 |
if(ntohs(incomingPacket->header.PacketId)== pt_PasswordAck) |
| 456 |
{ |
| 457 |
|
| 458 |
Initialize_MPacket(&mPacket, pt_Localization); |
| 459 |
mPacket.localization.one = htonl(1); |
| 460 |
mPacket.localization.two = htonl(2); |
| 461 |
mPacket.localization.three = htonl(3); |
| 462 |
mPacket.localization.zero = 0; |
| 463 |
sent_bytes = MariusNet_OutgoingPacketWrapper(Marius_Socket, (sockaddr*)&Marius_Server, (char*)&mPacket, sizeof(marius_header) + sizeof(m_localization) ); |
| 464 |
|
| 465 |
if(MariusNet_IncomingPacketWrapper(Marius_Socket, incomingData, 1400, 0) == SOCKET_ERROR) |
| 466 |
{ |
| 467 |
return 0; |
| 468 |
} |
| 469 |
} |
| 470 |
} |
| 471 |
|
| 472 |
if(ntohs(incomingPacket->header.PacketId)== pt_UserLoggedIn) |
| 473 |
{ |
| 474 |
PlayerID = ntohl(incomingPacket->login_success.userID); |
| 475 |
//Not sure if this is a string or byte array, so I allocated 33 bytes, |
| 476 |
//so it always zero terminates. |
| 477 |
memcpy(RoomToken, incomingPacket->login_success.Token, 32); |
| 478 |
DDrConsole_PrintF("Logged into Mariusnet!"); |
| 479 |
} |
| 480 |
else if(ntohs(incomingPacket->header.PacketId)== pt_LoginInfo) |
| 481 |
{ |
| 482 |
//DDrConsole_PrintF("Login failed: %s", incomingPacket->login_denied.DenialMessage ); |
| 483 |
MSNet_LoginError_Output(ntohl(incomingPacket->login_denied.code)); |
| 484 |
return 0; |
| 485 |
} |
| 486 |
else |
| 487 |
{ |
| 488 |
DDrConsole_PrintF("Something went wrong! Disconnecting from Mariusnet"); |
| 489 |
return 0; |
| 490 |
} |
| 491 |
|
| 492 |
|
| 493 |
do |
| 494 |
{ |
| 495 |
if(MariusNet_IncomingPacketWrapper(Marius_Socket, incomingData, 1400, 0) == SOCKET_ERROR) |
| 496 |
{ |
| 497 |
return 0; |
| 498 |
} |
| 499 |
if(ntohs(incomingPacket->header.PacketId)== pt_RoomList) |
| 500 |
{ |
| 501 |
DDrConsole_PrintF("Got room list!"); |
| 502 |
RoomListGotten = 1; |
| 503 |
memcpy(RoomList, incomingPacket->roomlist.Rooms, |
| 504 |
ntohl(incomingPacket->header.PacketSize) - sizeof(marius_header)); |
| 505 |
} |
| 506 |
else if(ntohs(incomingPacket->header.PacketId)== pt_PlayerInfo) |
| 507 |
{ |
| 508 |
//What do we do with this?! |
| 509 |
DDrConsole_PrintF("Got player info!"); |
| 510 |
} |
| 511 |
else |
| 512 |
{ |
| 513 |
DDrConsole_PrintF("Invalid packet type %hi", ntohs(incomingPacket->header.PacketId)); |
| 514 |
return 0; |
| 515 |
} |
| 516 |
} |
| 517 |
while(PacketCached || !RoomListGotten); |
| 518 |
|
| 519 |
for(i = 0; i < 64, RoomList[i].IPAddress != 0 ; i++) |
| 520 |
{ |
| 521 |
int IP = ntohl(RoomList[i].IPAddress); |
| 522 |
DDrConsole_PrintF("Room %i %s IP %s Port %hi Players %hi", |
| 523 |
i, |
| 524 |
sRoomNames[ntohs(RoomList[i].RoomIndex)], |
| 525 |
inet_ntoa(*(in_addr*)&IP), |
| 526 |
ntohs(RoomList[i].Port), |
| 527 |
ntohs(RoomList[i].PlayerCount) |
| 528 |
); |
| 529 |
} |
| 530 |
|
| 531 |
closesocket(Marius_Socket); |
| 532 |
|
| 533 |
MSNet_Room_Join( 1, RoomToken ); |
| 534 |
|
| 535 |
|
| 536 |
} |
| 537 |
return 0; |
| 538 |
} |
| 539 |
|
| 540 |
bool MSNet_Login(char* username, char* password) |
| 541 |
{ |
| 542 |
sprintf_s(MariusLogin, 32, "%s", username); |
| 543 |
sprintf_s(MariusPassword, 16, "%s", password); |
| 544 |
CreateThread(NULL, 0, MSNet_Handler, NULL, 0, 0); |
| 545 |
|
| 546 |
return 0; |
| 547 |
} |
| 548 |
|