public bool HandleReceive(NetState ns) { ByteQueue buffer = ns.Buffer; if (buffer == null || buffer.Length <= 0) { return(true); } lock ( buffer ) { int length = buffer.Length; if (!ns.Seeded) { if (buffer.GetPacketID() == 0xEF) { // new packet in client 6.0.5.0 replaces the traditional seed method with a seed packet // 0xEF = 239 = multicast IP, so this should never appear in a normal seed. So this is backwards compatible with older clients. ns.Seeded = true; } else if (buffer.Length >= 4) { buffer.Dequeue(m_Peek, 0, 4); int seed = (m_Peek[0] << 24) | (m_Peek[1] << 16) | (m_Peek[2] << 8) | m_Peek[3]; if (seed == 0) { Console.WriteLine("Login: {0}: Invalid client detected, disconnecting", ns); ns.Dispose(); return(false); } ns.m_Seed = seed; ns.Seeded = true; length = buffer.Length; } else { return(true); } } while (length > 0 && ns.Running) { int packetID = buffer.GetPacketID(); if (!ns.SentFirstPacket && packetID != 0xF0 && packetID != 0xF1 && packetID != 0xCF && packetID != 0x80 && packetID != 0x91 && packetID != 0xA4 && packetID != 0xEF) { Console.WriteLine("Client: {0}: Encrypted client detected, disconnecting", ns); ns.Dispose(); break; } PacketHandler handler = ns.GetHandler(packetID); if (handler == null) { byte[] data = new byte[length]; length = buffer.Dequeue(data, 0, length); new PacketReader(data, length, false).Trace(ns); break; } int packetLength = handler.Length; if (packetLength <= 0) { if (length >= 3) { packetLength = buffer.GetPacketLength(); if (packetLength < 3) { ns.Dispose(); break; } } else { break; } } if (length >= packetLength) { if (handler.Ingame && ns.Mobile == null) { Console.WriteLine("Client: {0}: Sent ingame packet (0x{1:X2}) before having been attached to a mobile", ns, packetID); ns.Dispose(); break; } else if (handler.Ingame && ns.Mobile.Deleted) { ns.Dispose(); break; } else { ThrottlePacketCallback throttler = handler.ThrottleCallback; if (throttler != null && !throttler(ns)) { m_Throttled.Enqueue(ns); return(false); } PacketReceiveProfile prof = PacketReceiveProfile.Acquire(packetID); if (prof != null) { prof.Start(); } byte[] packetBuffer; if (BufferSize >= packetLength) { packetBuffer = m_Buffers.AcquireBuffer(); } else { packetBuffer = new byte[packetLength]; } packetLength = buffer.Dequeue(packetBuffer, 0, packetLength); PacketReader r = new PacketReader(packetBuffer, packetLength, handler.Length != 0); handler.OnReceive(ns, r); length = buffer.Length; if (BufferSize >= packetLength) { m_Buffers.ReleaseBuffer(packetBuffer); } if (prof != null) { prof.Finish(packetLength); } } } else { break; } } } return(true); }
public void HandleReceive(NetState ns) { ByteQueue buffer = ns.Buffer; if (buffer == null || buffer.Length <= 0) { return; } lock (buffer) { if (!ns.Seeded && !HandleSeed(ns, buffer)) { return; } int length = buffer.Length; while (length > 0 && ns.Running) { int packetID = buffer.GetPacketID(); if (CheckEncrypted(ns, packetID)) { return; } PacketHandler handler = NetState.GetHandler(packetID); if (handler == null) { byte[] data = new byte[length]; length = buffer.Dequeue(data, 0, length); new PacketReader(data, length, false).Trace(ns); return; } int packetLength = handler.Length; if (packetLength <= 0) { if (length >= 3) { packetLength = buffer.GetPacketLength(); if (packetLength < 3) { ns.Dispose(); return; } } else { return; } } if (length < packetLength) { return; } if (handler.Ingame) { if (ns.Mobile == null) { Utility.PushColor(ConsoleColor.Red); Console.WriteLine("Client: {0}: Packet (0x{1:X2}) Requires State Mobile", ns, packetID); Utility.PopColor(); ns.Dispose(); return; } if (ns.Mobile.Deleted) { Utility.PushColor(ConsoleColor.Red); Console.WriteLine("Client: {0}: Packet (0x{1:X2}) Ivalid State Mobile", ns, packetID); Utility.PopColor(); ns.Dispose(); return; } } ThrottlePacketCallback throttler = handler.ThrottleCallback; if (throttler != null) { if (!throttler(ns, out bool drop)) { if (!drop) { m_Throttled.Enqueue(ns); } else { buffer.Dequeue(new byte[packetLength], 0, packetLength); } return; } } PacketReceiveProfile prof = null; if (Core.Profiling) { prof = PacketReceiveProfile.Acquire(packetID); } if (prof != null) { prof.Start(); } byte[] packetBuffer; if (BufferSize >= packetLength) { packetBuffer = m_Buffers.AcquireBuffer(); } else { packetBuffer = new byte[packetLength]; } packetLength = buffer.Dequeue(packetBuffer, 0, packetLength); if (packetBuffer != null && packetBuffer.Length > 0 && packetLength > 0) { PacketReader r = new PacketReader(packetBuffer, packetLength, handler.Length != 0); handler.OnReceive(ns, r); if (BufferSize >= packetLength) { m_Buffers.ReleaseBuffer(packetBuffer); } } if (prof != null) { prof.Finish(packetLength); } length = buffer.Length; } } }
public bool HandleReceive( NetState ns ) { ByteQueue buffer = ns.Buffer; if ( buffer == null || buffer.Length <= 0 ) return true; lock ( buffer ) { int length = buffer.Length; if ( !ns.Seeded ) { if (buffer.GetPacketID() == 0xEF) { // new packet in client 6.0.5.0 replaces the traditional seed method with a seed packet // 0xEF = 239 = multicast IP, so this should never appear in a normal seed. So this is backwards compatible with older clients. ns.Seeded = true; } else if (buffer.Length >= 4) { buffer.Dequeue( m_Peek, 0, 4 ); int seed = (m_Peek[0] << 24) | (m_Peek[1] << 16) | (m_Peek[2] << 8) | m_Peek[3]; if ( seed == 0 ) { Console.WriteLine( "Login: {0}: Invalid client detected, disconnecting", ns ); ns.Dispose(); return false; } ns.m_Seed = seed; ns.Seeded = true; length = buffer.Length; } else { return true; } } while ( length > 0 && ns.Running ) { int packetID = buffer.GetPacketID(); if (!ns.SentFirstPacket && packetID != 0xF0 && packetID != 0xF1 && packetID != 0xCF && packetID != 0x80 && packetID != 0x91 && packetID != 0xA4 && packetID != 0xEF) { Console.WriteLine( "Client: {0}: Encrypted client detected, disconnecting", ns ); ns.Dispose(); break; } PacketHandler handler = ns.GetHandler( packetID ); if ( handler == null ) { byte[] data = new byte[length]; length = buffer.Dequeue( data, 0, length ); new PacketReader( data, length, false ).Trace( ns ); break; } int packetLength = handler.Length; if ( packetLength <= 0 ) { if ( length >= 3 ) { packetLength = buffer.GetPacketLength(); if ( packetLength < 3 ) { ns.Dispose(); break; } } else { break; } } if ( length >= packetLength ) { if ( handler.Ingame && ns.Mobile == null ) { Console.WriteLine( "Client: {0}: Sent ingame packet (0x{1:X2}) before having been attached to a mobile", ns, packetID ); ns.Dispose(); break; } else if ( handler.Ingame && ns.Mobile.Deleted ) { ns.Dispose(); break; } else { ThrottlePacketCallback throttler = handler.ThrottleCallback; if ( throttler != null && !throttler( ns ) ) { m_Throttled.Enqueue( ns ); return false; } PacketReceiveProfile prof = PacketReceiveProfile.Acquire( packetID ); if ( prof != null ) { prof.Start(); } byte[] packetBuffer; if ( BufferSize >= packetLength ) packetBuffer = m_Buffers.AcquireBuffer(); else packetBuffer = new byte[packetLength]; packetLength = buffer.Dequeue( packetBuffer, 0, packetLength ); PacketReader r = new PacketReader( packetBuffer, packetLength, handler.Length != 0 ); handler.OnReceive( ns, r ); length = buffer.Length; if ( BufferSize >= packetLength ) m_Buffers.ReleaseBuffer( packetBuffer ); if ( prof != null ) { prof.Finish( packetLength ); } } } else { break; } } } return true; }
public void HandleReceive(NetState ns) { ByteQueue buffer = ns.Buffer; if (buffer == null || buffer.Length <= 0) { return; } lock (buffer) { if (!ns.Seeded) { if (!HandleSeed(ns, buffer)) { return; } } int length = buffer.Length; while (length > 0 && ns.Running) { int packetID = buffer.GetPacketID(); if (CheckEncrypted(ns, packetID)) { break; } PacketHandler handler = ns.GetHandler(packetID); if (handler == null) { byte[] data = new byte[length]; length = buffer.Dequeue(data, 0, length); new PacketReader(data, length, false).Trace(ns); break; } int packetLength = handler.Length; if (packetLength <= 0) { if (length >= 3) { packetLength = buffer.GetPacketLength(); if (packetLength < 3) { ns.Dispose(); break; } } else { break; } } if (length >= packetLength) { if (handler.Ingame) { if (ns.Mobile == null) { Console.WriteLine("Client: {0}: Sent ingame packet (0x{1:X2}) before having been attached to a mobile", ns, packetID); ns.Dispose(); break; } else if (ns.Mobile.Deleted) { ns.Dispose(); break; } } ThrottlePacketCallback throttler = handler.ThrottleCallback; if (throttler != null && !throttler(ns)) { // must be one of the other throttled packets m_Throttled.Enqueue(ns); return; } PacketReceiveProfile prof = null; if (Core.Profiling) { prof = PacketReceiveProfile.Acquire(packetID); } if (prof != null) { prof.Start(); } byte[] packetBuffer; if (BufferSize >= packetLength) { packetBuffer = m_Buffers.AcquireBuffer(); } else { packetBuffer = new byte[packetLength]; } packetLength = buffer.Dequeue(packetBuffer, 0, packetLength); PacketReader r = new PacketReader(packetBuffer, packetLength, handler.Length != 0); handler.OnReceive(ns, r); length = buffer.Length; if (BufferSize >= packetLength) { m_Buffers.ReleaseBuffer(packetBuffer); } if (prof != null) { prof.Finish(packetLength); } } else { break; } } } }
private bool HandleReceive(NetState ns) { lock ( ns ) { ByteQueue buffer = ns.Buffer; if (buffer == null) { return(true); } int length = buffer.Length; if (!ns.Seeded) { if (length >= 4) { buffer.Dequeue(m_Peek, 0, 4); int seed = (m_Peek[0] << 24) | (m_Peek[1] << 16) | (m_Peek[2] << 8) | m_Peek[3]; if (log.IsDebugEnabled) { log.DebugFormat("Login: {0}: Seed is 0x{1:X8}", ns, seed); } if (seed == 0) { log.WarnFormat("Login: {0}: Invalid client detected, disconnecting", ns); ns.Dispose(); return(false); } ns.m_Seed = seed; ns.Seeded = true; } return(true); } while (length > 0 && ns.Running) { int packetID = buffer.GetPacketID(); if (!ns.SentFirstPacket && packetID != 0xF0 && packetID != 0xF1 && packetID != 0xCF && packetID != 0x80 && packetID != 0x91 && packetID != 0xA4 && packetID != 0xBF) { log.WarnFormat("Client: {0}: Encrypted client detected, disconnecting", ns); ns.Dispose(); break; } PacketHandler handler = ns.GetHandler(packetID); if (handler == null) { byte[] data = new byte[length]; length = buffer.Dequeue(data, 0, length); new PacketReader(data, length, false).Trace(ns); break; } int packetLength = handler.Length; if (packetLength <= 0) { if (length >= 3) { packetLength = buffer.GetPacketLength(); if (packetLength < 3) { ns.Dispose(); break; } } else { break; } } if (length >= packetLength) { if (handler.Ingame && ns.Mobile == null) { log.WarnFormat("Client: {0}: Sent ingame packet (0x{1:X2}) before having been attached to a mobile", ns, packetID); ns.Dispose(); break; } else if (handler.Ingame && ns.Mobile.Deleted) { ns.Dispose(); break; } else { ThrottlePacketCallback throttler = handler.ThrottleCallback; if (throttler != null && !throttler(ns)) { m_Throttled.Enqueue(ns); return(false); } PacketProfile profile = PacketProfile.GetIncomingProfile(packetID); DateTime start = (profile == null ? DateTime.MinValue : DateTime.UtcNow); byte[] packetBuffer; if (BufferSize >= packetLength) { packetBuffer = m_Buffers.AquireBuffer(); } else { packetBuffer = new byte[packetLength]; } packetLength = buffer.Dequeue(packetBuffer, 0, packetLength); PacketReader r = new PacketReader(packetBuffer, packetLength, handler.Length != 0); try { handler.OnReceive(ns, r); } catch (Exception e) { log.Fatal(String.Format("Exception disarmed in HandleReceive from {0}", ns.Address), e); } length = buffer.Length; if (BufferSize >= packetLength) { m_Buffers.ReleaseBuffer(packetBuffer); } if (profile != null) { profile.Record(packetLength, DateTime.UtcNow - start); } } } else { break; } } } return(true); }
private bool HandleReceive( NetState ns ) { lock ( ns ) { ByteQueue buffer = ns.Buffer; if ( buffer == null ) return true; int length = buffer.Length; if ( !ns.Seeded ) { if ( length >= 4 ) { buffer.Dequeue( m_Peek, 0, 4 ); int seed = (m_Peek[0] << 24) | (m_Peek[1] << 16) | (m_Peek[2] << 8) | m_Peek[3]; if (log.IsDebugEnabled) log.DebugFormat("Login: {0}: Seed is 0x{1:X8}", ns, seed); if ( seed == 0 ) { log.WarnFormat("Login: {0}: Invalid client detected, disconnecting", ns); ns.Dispose(); return false; } ns.m_Seed = seed; ns.Seeded = true; } return true; } while ( length > 0 && ns.Running ) { int packetID = buffer.GetPacketID(); if ( !ns.SentFirstPacket && packetID != 0xF0 && packetID != 0xF1 && packetID != 0xCF && packetID != 0x80 && packetID != 0x91 && packetID != 0xA4 && packetID != 0xBF ) { log.WarnFormat("Client: {0}: Encrypted client detected, disconnecting", ns); ns.Dispose(); break; } PacketHandler handler = ns.GetHandler( packetID ); if ( handler == null ) { byte[] data = new byte[length]; length = buffer.Dequeue( data, 0, length ); new PacketReader( data, length, false ).Trace( ns ); break; } int packetLength = handler.Length; if ( packetLength <= 0 ) { if ( length >= 3 ) { packetLength = buffer.GetPacketLength(); if ( packetLength < 3 ) { ns.Dispose(); break; } } else { break; } } if ( length >= packetLength ) { if ( handler.Ingame && ns.Mobile == null ) { log.WarnFormat("Client: {0}: Sent ingame packet (0x{1:X2}) before having been attached to a mobile", ns, packetID); ns.Dispose(); break; } else if ( handler.Ingame && ns.Mobile.Deleted ) { ns.Dispose(); break; } else { ThrottlePacketCallback throttler = handler.ThrottleCallback; if ( throttler != null && !throttler( ns ) ) { m_Throttled.Enqueue( ns ); return false; } PacketProfile profile = PacketProfile.GetIncomingProfile( packetID ); DateTime start = ( profile == null ? DateTime.MinValue : DateTime.UtcNow ); byte[] packetBuffer; if ( BufferSize >= packetLength ) packetBuffer = m_Buffers.AquireBuffer(); else packetBuffer = new byte[packetLength]; packetLength = buffer.Dequeue( packetBuffer, 0, packetLength ); PacketReader r = new PacketReader( packetBuffer, packetLength, handler.Length != 0 ); try { handler.OnReceive( ns, r ); } catch (Exception e) { log.Fatal(String.Format("Exception disarmed in HandleReceive from {0}", ns.Address), e); } length = buffer.Length; if ( BufferSize >= packetLength ) m_Buffers.ReleaseBuffer( packetBuffer ); if ( profile != null ) profile.Record( packetLength, DateTime.UtcNow - start ); } } else { break; } } } return true; }
public void HandleReceive( NetState ns ) { ByteQueue buffer = ns.Buffer; if ( buffer == null || buffer.Length <= 0 ) return; lock ( buffer ) { if ( !ns.Seeded ) { if (!HandleSeed(ns, buffer)) return; } int length = buffer.Length; while ( length > 0 && ns.Running ) { int packetID = buffer.GetPacketID(); if (CheckEncrypted(ns, packetID)) break; PacketHandler handler = ns.GetHandler( packetID ); if ( handler == null ) { byte[] data = new byte[length]; length = buffer.Dequeue( data, 0, length ); new PacketReader( data, length, false ).Trace( ns ); break; } int packetLength = handler.Length; if ( packetLength <= 0 ) { if ( length >= 3 ) { packetLength = buffer.GetPacketLength(); if ( packetLength < 3 ) { ns.Dispose(); break; } } else { break; } } if ( length >= packetLength ) { if (handler.Ingame) { if (ns.Mobile == null ) { Console.WriteLine( "Client: {0}: Sent ingame packet (0x{1:X2}) before having been attached to a mobile", ns, packetID ); ns.Dispose(); break; } else if (ns.Mobile.Deleted) { ns.Dispose(); break; } } ThrottlePacketCallback throttler = handler.ThrottleCallback; if ( throttler != null && !throttler( ns ) ) { m_Throttled.Enqueue( ns ); return; } PacketReceiveProfile prof = null; if (Core.Profiling) prof = PacketReceiveProfile.Acquire( packetID ); if ( prof != null ) { prof.Start(); } byte[] packetBuffer; if ( BufferSize >= packetLength ) packetBuffer = m_Buffers.AcquireBuffer(); else packetBuffer = new byte[packetLength]; packetLength = buffer.Dequeue( packetBuffer, 0, packetLength ); PacketReader r = new PacketReader( packetBuffer, packetLength, handler.Length != 0 ); handler.OnReceive( ns, r ); length = buffer.Length; if ( BufferSize >= packetLength ) m_Buffers.ReleaseBuffer( packetBuffer ); if ( prof != null ) { prof.Finish( packetLength ); } } else { break; } } } }
public void HandleReceive(NetState ns) { ByteQueue buffer = ns.Buffer; if (buffer == null || buffer.Length <= 0) { return; } lock (buffer) { if (!ns.Seeded) { if (!HandleSeed(ns, buffer)) { return; } } int length = buffer.Length; while (length > 0 && ns.Running) { int packetID = buffer.GetPacketID(); if (CheckEncrypted(ns, packetID)) { break; } PacketHandler handler = ns.GetHandler(packetID); if (handler == null) { var data = new byte[length]; length = buffer.Dequeue(data, 0, length); new PacketReader(data, length, false).Trace(ns); break; } int packetLength = handler.Length; if (packetLength <= 0) { if (length >= 3) { packetLength = buffer.GetPacketLength(); if (packetLength < 3) { ns.Dispose(); break; } } else { break; } } if (length >= packetLength) { if (handler.Ingame) { if (ns.Mobile == null) { Utility.PushColor(ConsoleColor.DarkRed); Console.WriteLine( "Client: {0}: Sent ingame packet (0x{1:X2}) before having been attached to a mobile", ns, packetID); Utility.PopColor(); ns.Dispose(); break; } else if (ns.Mobile.Deleted) { ns.Dispose(); break; } } ThrottlePacketCallback throttler = handler.ThrottleCallback; if (throttler != null && !throttler(ns)) { m_Throttled.Enqueue(ns); return; } PacketReceiveProfile prof = null; if (Core.Profiling) { prof = PacketReceiveProfile.Acquire(packetID); } if (prof != null) { prof.Start(); } byte[] packetBuffer; if (BufferSize >= packetLength) { packetBuffer = m_Buffers.AcquireBuffer(); } else { packetBuffer = new byte[packetLength]; } packetLength = buffer.Dequeue(packetBuffer, 0, packetLength); var r = new PacketReader(packetBuffer, packetLength, handler.Length != 0); handler.OnReceive(ns, r); length = buffer.Length; if (BufferSize >= packetLength) { m_Buffers.ReleaseBuffer(packetBuffer); } if (prof != null) { prof.Finish(packetLength); } } else { break; } } } #region Enhance Client // Would be nicer to detect the enhanced client in clientversion.cs // It seems that UOKR-EH sends a version number bigger 66.0.0.0, UOSA-EH bigger 67.0.0.0 try { if (ns.Version.Major > 8) ns.IsKRClient = true; } //Standard classic client does not display version this early, so we can rule SA enhanced client out catch { ns.IsKRClient = false; } return; #endregion }
public bool HandleReceive(NetState ns) { ByteQueue buffer = ns.Buffer; if (buffer == null || buffer.Length <= 0) return true; lock (buffer) { int length = buffer.Length; if (!ns.Seeded) { //if (ns.Version > ns.ExpansionInfo.RequiredClient) //{ // ns.IsKRClient = true; //} /* * Genova: Packet Logger Console.WriteLine("packet vindo de buffer: {0}", buffer.GetPacketID()); Console.WriteLine("Tamanho do buffer: {0}", length); */ // Genova: suporte ao UO:KR. if (buffer.GetPacketID() == 0xFF) { // Packet 255 = 0xFF = Client KR. ns.IsKRClient = true; } if (buffer.GetPacketID() == 0xEF) { // new packet in client 6.0.5.0 replaces the traditional seed method with a seed packet // 0xEF = 239 = multicast IP, so this should never appear in a normal seed. So this is backwards compatible with older clients. ns.Seeded = true; } else if (buffer.Length >= 4) { // Genova: suporte ao UO:KR. // Se for KR, isso vai continuar como -1 temporariamente int seed = -1; if (!ns.IsKRClient) { buffer.Dequeue(m_Peek, 0, 4); seed = (m_Peek[0] << 24) | (m_Peek[1] << 16) | (m_Peek[2] << 8) | m_Peek[3]; if (seed == 0) { Console.WriteLine("Login: {0}: Invalid client detected, disconnecting", ns); ns.Dispose(); return false; } } ns.m_Seed = seed; ns.Seeded = true; length = buffer.Length; } else { return true; } } while (length > 0 && ns.Running) { int packetID = buffer.GetPacketID(); if (!ns.SentFirstPacket && packetID != 0xF0 && packetID != 0xF1 && packetID != 0xCF && packetID != 0x80 && packetID != 0x91 && packetID != 0xA4 && packetID != 0xEF) { Console.WriteLine("Client: {0}: Encrypted client detected, disconnecting", ns); ns.Dispose(); break; } PacketHandler handler = ns.GetHandler(packetID); if (handler == null) { byte[] data = new byte[length]; length = buffer.Dequeue(data, 0, length); new PacketReader(data, length, false).Trace(ns); break; } int packetLength = handler.Length; if (packetLength <= 0) { if (length >= 3) { packetLength = buffer.GetPacketLength(); if (packetLength < 3) { ns.Dispose(); break; } } else { break; } } if (length >= packetLength) { if (handler.Ingame && ns.Mobile == null) { Console.WriteLine("Client: {0}: Sent ingame packet (0x{1:X2}) before having been attached to a mobile", ns, packetID); ns.Dispose(); break; } else if (handler.Ingame && ns.Mobile.Deleted) { ns.Dispose(); break; } else { ThrottlePacketCallback throttler = handler.ThrottleCallback; if (throttler != null && !throttler(ns)) { m_Throttled.Enqueue(ns); return false; } PacketReceiveProfile prof = PacketReceiveProfile.Acquire(packetID); if (prof != null) { prof.Start(); } byte[] packetBuffer; if (BufferSize >= packetLength) packetBuffer = m_Buffers.AcquireBuffer(); else packetBuffer = new byte[packetLength]; packetLength = buffer.Dequeue(packetBuffer, 0, packetLength); PacketReader r = new PacketReader(packetBuffer, packetLength, handler.Length != 0); handler.OnReceive(ns, r); length = buffer.Length; if (BufferSize >= packetLength) m_Buffers.ReleaseBuffer(packetBuffer); if (prof != null) { prof.Finish(packetLength); } } } else { break; } } } //attempt to ID enhanced SA client ASAP try { if (ns.Version.Major > 8) ns.IsSAClient = true; } //Standard classic client does not display version this early, so we can rule SA enhanced client out catch { ns.IsSAClient = false; } return true; }
public bool HandleReceive(NetState ns) { ByteQueue buffer = ns.Buffer; if (buffer == null || buffer.Length <= 0) { return(true); } lock (buffer) { int length = buffer.Length; if (!ns.Seeded) { #region Enhanced Client if (buffer.GetPacketID() == 0xFF) { // Packet 255 = 0xFF = Client KR. ns.IsKRClient = true; Console.WriteLine("KR-Client detected", ns); } #endregion if (buffer.GetPacketID() == 0xEF) { // new packet in client 6.0.5.0 replaces the traditional seed method with a seed packet // 0xEF = 239 = multicast IP, so this should never appear in a normal seed. So this is backwards compatible with older clients. ns.Seeded = true; } else if (buffer.Length >= 4) { buffer.Dequeue(m_Peek, 0, 4); int seed = (m_Peek[0] << 24) | (m_Peek[1] << 16) | (m_Peek[2] << 8) | m_Peek[3]; if (seed == 0) { Console.WriteLine("Login: {0}: Invalid client detected, disconnecting", ns); ns.Dispose(); return(false); } ns.m_Seed = seed; ns.Seeded = true; length = buffer.Length; } else { return(true); } } int[] seedablePackets = new int[] { 0xF0, //Unknown - hijacked by Krrios client for login level acknowledgement 0xF1, //Unknown, sent in reply to 0xF2 - also hijacked by some freeshard clients for listings 0xCF, //Login to login server (with username and password) (possibly unused by EA) 0x80, //Login to login server (with username and password) 0x91, //Login to game server (with username and password) 0xA4, //Hardware info 0xEF, //KR and 2D login seed with version 0xE4, //Enhanced Client (KR) encyrption response (to 0xE3 encryption request) 0xFF, // 0x52 //Post bulletin board message - did we hijack this by accident for remoting/region watcher? }; while (length > 0 && ns.Running) { int packetID = buffer.GetPacketID(); if (!ns.SentFirstPacket && Array.IndexOf <int>(seedablePackets, packetID) == -1) { Console.WriteLine("Client: {0}: Encrypted client detected, disconnecting", ns); ns.Dispose(); break; } PacketHandler handler = ns.GetHandler(packetID); if (handler == null) { byte[] data = new byte[length]; length = buffer.Dequeue(data, 0, length); new PacketReader(data, length, false).Trace(ns); break; } int packetLength = handler.Length; if (packetLength <= 0) { if (length >= 3) { packetLength = buffer.GetPacketLength(); if (packetLength < 3) { ns.Dispose(); break; } } else { break; } } if (length >= packetLength) { if (handler.Ingame && ns.Mobile == null) { Console.WriteLine("Client: {0}: Sent ingame packet (0x{1:X2}) before having been attached to a mobile", ns, packetID); ns.Dispose(); break; } else if (handler.Ingame && ns.Mobile.Deleted) { ns.Dispose(); break; } else { ThrottlePacketCallback throttler = handler.ThrottleCallback; if (throttler != null && !throttler(ns)) { m_Throttled.Enqueue(ns); return(false); } PacketReceiveProfile prof = PacketReceiveProfile.Acquire(packetID); if (prof != null) { prof.Start(); } byte[] packetBuffer; if (BufferSize >= packetLength) { packetBuffer = m_Buffers.AcquireBuffer(); } else { packetBuffer = new byte[packetLength]; } packetLength = buffer.Dequeue(packetBuffer, 0, packetLength); PacketReader r = new PacketReader(packetBuffer, packetLength, handler.Length != 0); handler.OnReceive(ns, r); length = buffer.Length; if (BufferSize >= packetLength) { m_Buffers.ReleaseBuffer(packetBuffer); } if (prof != null) { prof.Finish(packetLength); } } } else { break; } } } #region Enhanced Client // ToDo clean this up // Would be nicer to detect the enhanced client in clientversion.cs // It seems that UOKR-EH sends a version number bigger 66.0.0.0, UOSA-EH bigger 67.0.0.0 try { if (ns.Version.Major > 8) { ns.IsKRClient = true; } } catch { //Standard classic client does not display version this early, so we can rule SA enhanced client out ns.IsKRClient = false; } #endregion return(true); }
public void HandleReceive(NetState ns) { ByteQueue buffer = ns.Buffer; if (buffer == null || buffer.Length <= 0) { return; } lock (buffer) { if (!ns.Seeded) { if (!HandleSeed(ns, buffer)) { return; } } int length = buffer.Length; while (length > 0 && ns.Running) { int packetID = buffer.GetPacketID(); if (CheckEncrypted(ns, packetID)) { break; } PacketHandler handler = ns.GetHandler(packetID); if (handler == null) { var data = new byte[length]; length = buffer.Dequeue(data, 0, length); new PacketReader(data, length, false).Trace(ns); break; } int packetLength = handler.Length; if (packetLength <= 0) { if (length >= 3) { packetLength = buffer.GetPacketLength(); if (packetLength < 3) { ns.Dispose(); break; } } else { break; } } if (length >= packetLength) { if (handler.Ingame) { if (ns.Mobile == null) { Utility.PushColor(ConsoleColor.DarkRed); Console.WriteLine( "Client: {0}: Sent ingame packet (0x{1:X2}) before having been attached to a mobile", ns, packetID); Utility.PopColor(); ns.Dispose(); break; } else if (ns.Mobile.Deleted) { ns.Dispose(); break; } } ThrottlePacketCallback throttler = handler.ThrottleCallback; if (throttler != null && !throttler(ns)) { m_Throttled.Enqueue(ns); return; } PacketReceiveProfile prof = null; if (Core.Profiling) { prof = PacketReceiveProfile.Acquire(packetID); } if (prof != null) { prof.Start(); } byte[] packetBuffer; if (BufferSize >= packetLength) { packetBuffer = m_Buffers.AcquireBuffer(); } else { packetBuffer = new byte[packetLength]; } packetLength = buffer.Dequeue(packetBuffer, 0, packetLength); PacketReader r = new PacketReader(packetBuffer, packetLength, handler.Length != 0); handler.OnReceive(ns, r); length = buffer.Length; if (BufferSize >= packetLength) { m_Buffers.ReleaseBuffer(packetBuffer); } if (prof != null) { prof.Finish(packetLength); } } else { break; } } } #region Enhance Client // Would be nicer to detect the enhanced client in clientversion.cs // It seems that UOKR-EH sends a version number bigger 66.0.0.0, UOSA-EH bigger 67.0.0.0 try { if (ns.Version.Major > 8) { ns.IsKRClient = true; } } //Standard classic client does not display version this early, so we can rule SA enhanced client out catch { ns.IsKRClient = false; } return; #endregion }