diff options
| author | click <none@none> | 2010-05-08 05:03:32 +0200 |
|---|---|---|
| committer | click <none@none> | 2010-05-08 05:03:32 +0200 |
| commit | f60d534b73838c2f3c461b0086f6da02576697f3 (patch) | |
| tree | 7c1ba2b4a55ff7eba018c5c012a81d2730e0cdce /src/game/WorldSocket.cpp | |
| parent | d6df19cd9948ff6d108f88e0d8c77bdbda5922ab (diff) | |
Cleanup on some database-related files: merge some DB-related files, add some consistency to callhandles in sourcetree (M
+ combine MySQL-specific files into main database-files (click)
+ fix vcproj-files, adjust handler-function names for consistency (Machiavelli)
--HG--
branch : trunk
Diffstat (limited to 'src/game/WorldSocket.cpp')
| -rw-r--r-- | src/game/WorldSocket.cpp | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/src/game/WorldSocket.cpp b/src/game/WorldSocket.cpp index f558c11bfdb..7dcb6056fbe 100644 --- a/src/game/WorldSocket.cpp +++ b/src/game/WorldSocket.cpp @@ -753,11 +753,11 @@ int WorldSocket::HandleAuthSession (WorldPacket& recvPacket) // Get the account information from the realmd database std::string safe_account = account; // Duplicate, else will screw the SHA hash verification below - loginDatabase.escape_string (safe_account); + LoginDatabase.escape_string (safe_account); // No SQL injection, username escaped. QueryResult_AutoPtr result = - loginDatabase.PQuery ("SELECT " + LoginDatabase.PQuery ("SELECT " "id, " //0 "sessionkey, " //1 "last_ip, " //2 @@ -837,7 +837,7 @@ int WorldSocket::HandleAuthSession (WorldPacket& recvPacket) // Checks gmlevel per Realm result = - loginDatabase.PQuery ("SELECT " + LoginDatabase.PQuery ("SELECT " "RealmID, " //0 "gmlevel " //1 "FROM account_access " @@ -855,7 +855,7 @@ int WorldSocket::HandleAuthSession (WorldPacket& recvPacket) // Re-check account ban (same check as in realmd) QueryResult_AutoPtr banresult = - loginDatabase.PQuery ("SELECT 1 FROM account_banned WHERE id = %u AND active = 1 " + LoginDatabase.PQuery ("SELECT 1 FROM account_banned WHERE id = %u AND active = 1 " "UNION " "SELECT 1 FROM ip_banned WHERE ip = '%s'", id, GetRemoteAddress().c_str()); @@ -917,9 +917,9 @@ int WorldSocket::HandleAuthSession (WorldPacket& recvPacket) // Update the last_ip in the database // No SQL injection, username escaped. - loginDatabase.escape_string (address); + LoginDatabase.escape_string (address); - loginDatabase.PExecute ("UPDATE account " + LoginDatabase.PExecute ("UPDATE account " "SET last_ip = '%s' " "WHERE username = '%s'", address.c_str (), |
