diff options
author | Shauren <shauren.trinity@gmail.com> | 2014-06-08 17:58:28 +0200 |
---|---|---|
committer | Shauren <shauren.trinity@gmail.com> | 2014-06-08 17:58:28 +0200 |
commit | 434b3a80e1ef4ccef3d66661e6a260b6328eabe5 (patch) | |
tree | ac51417a1fc3cc9a70be0109252d717961e4a191 /src/server/authserver/Server/BattlenetSocket.cpp | |
parent | 7dd552c8261be9d1c9c8e45628e5aca5cdae405d (diff) |
Core/Commands: Added a set of commands to manage battle.net accounts
TODO: Ban commands, linking game accounts to battle.net accounts
Diffstat (limited to 'src/server/authserver/Server/BattlenetSocket.cpp')
-rw-r--r-- | src/server/authserver/Server/BattlenetSocket.cpp | 9 |
1 files changed, 6 insertions, 3 deletions
diff --git a/src/server/authserver/Server/BattlenetSocket.cpp b/src/server/authserver/Server/BattlenetSocket.cpp index 4ee3c8e9b3d..dad52f64877 100644 --- a/src/server/authserver/Server/BattlenetSocket.cpp +++ b/src/server/authserver/Server/BattlenetSocket.cpp @@ -421,7 +421,8 @@ bool Battlenet::Socket::HandleDisconnect(PacketHeader& /*header*/, BitStream& /* { PreparedStatement* stmt = LoginDatabase.GetPreparedStatement(LOGIN_UPD_BNET_SESSION_KEY); stmt->setString(0, ""); - stmt->setUInt32(1, _accountId); + stmt->setBool(1, false); + stmt->setUInt32(2, _accountId); LoginDatabase.Execute(stmt); return true; } @@ -908,7 +909,8 @@ bool Battlenet::Socket::HandleRiskFingerprintModule(BitStream* dataStream, Serve stmt = LoginDatabase.GetPreparedStatement(LOGIN_UPD_BNET_SESSION_KEY); stmt->setString(0, K.AsHexStr()); - stmt->setUInt32(1, _accountId); + stmt->setBool(1, true); + stmt->setUInt32(2, _accountId); trans->Append(stmt); LoginDatabase.CommitTransaction(trans); @@ -975,7 +977,8 @@ bool Battlenet::Socket::HandleResumeModule(BitStream* dataStream, ServerPacket** PreparedStatement* stmt = LoginDatabase.GetPreparedStatement(LOGIN_UPD_BNET_SESSION_KEY); stmt->setString(0, K.AsHexStr()); - stmt->setUInt32(1, _accountId); + stmt->setBool(1, true); + stmt->setUInt32(2, _accountId); LoginDatabase.Execute(stmt); HmacSha256 serverProof(64, newSessionKey); |