Editing Server:MacSupport

Jump to navigation Jump to search

Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 25: Line 25:
The client then replies with the <span style="font-weight:bold">OP_LoginOSX</span> opcode followed by the username/password and eqworld-52.989studios.com as a UDP datagram.  The url is no longer used but rather parsed server-side to validate mac clients (see [https://github.com/EQArchives/EQMacEmu/blob/09da8370ff01ea671fbc772511579b8d4876741e/loginserver/client.cpp#L62 OP_LoginOSX] and [https://github.com/EQArchives/EQMacEmu/blob/09da8370ff01ea671fbc772511579b8d4876741e/loginserver/client.cpp#L245 handle_login] behavior).
The client then replies with the <span style="font-weight:bold">OP_LoginOSX</span> opcode followed by the username/password and eqworld-52.989studios.com as a UDP datagram.  The url is no longer used but rather parsed server-side to validate mac clients (see [https://github.com/EQArchives/EQMacEmu/blob/09da8370ff01ea671fbc772511579b8d4876741e/loginserver/client.cpp#L62 OP_LoginOSX] and [https://github.com/EQArchives/EQMacEmu/blob/09da8370ff01ea671fbc772511579b8d4876741e/loginserver/client.cpp#L245 handle_login] behavior).


If the username was found in the accounts table, the server pulls the sha1 hash of the user's password and compares it against what the user sent to the server.  If it checks out, the server sends a packet back to the client with the <span style="font-weight:bold">OP_LoginAccepted</span> opcode and the account ID prepended with "LS#" which is used as the session id, a field with the string "unused", and the number 4 (possibly macclientversion where pc=2, intel=4, ppc=8).  The second and third fields would appear on the wire as <span style="font-weight:bold">75 6e 75 73 65 64 00 04</span>.
If the username was found in the accounts table, the server pulls the sha1 hash of the user's password and compares it against what the user sent to the server.  If it checks out, the server sends a packet back to the client with the <span style="font-weight:bold">OP_LoginAccepted</span> opcode and the account ID prepended with "LS#" which is used as the session id, a field with the string "unused", and the number 4.  The second and third fields would appear on the wire as <span style="font-weight:bold">75 6e 75 73 65 64 00 04</span>.


Finally, the client responds to the server with <span style="font-weight:bold">OP_LoginComplete</span>.
Finally, the client responds to the server with <span style="font-weight:bold">OP_LoginComplete</span>.

Please note that all contributions to The Al`Kabor Project Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see The Al'Kabor Project Wiki:Copyrights for details). Do not submit copyrighted work without permission!

To edit this page, please answer the question that appears below (more info):

Cancel Editing help (opens in new window)