Originally posted by [b]cyberking[/b]
http://www.eathena.ws/board/index.php?autocom=bugtracker&showbug=1203
Password in kafra utilized only if u use a kafra storage it's ok?
But 90% of the server using @storage
Kafra check
CODE
// Check Storage Password Function ====================
function script F_CheckKafCode {
if(#kafra_code==0) return;
mes "Enter your storage password:";
set @code_,0;
input @code_;
if(@code_ != #kafra_code-getcharid(3)-1337) {
dispbottom "Wrong storage password.";
close2;
cutin "",255;
end;
}
set @kafcode_try,0;
set @code_,0;
return;
}
atcommand.c Storage
CODE
int atcommand_storage(const int fd, struct map_session_data* sd, const char* command, const char* message)
{
nullpo_retr(-1, sd);
if (sd->npc_id || sd->vender_id || sd->state.trading || sd->state.storage_flag)
return -1;
if (storage_storageopen(sd) == 1)
{ //Already open.
clif_displaymessage(fd, msg_txt(250));
return -1;
}
clif_displaymessage(fd, "Storage opened.");
return 0;
}
How to using this function in @storage because it is more efficient?
Would be a great help for the players not being hacked, because I think the greater the protection, minor problems.
Sorry for post in Bug's,
But this is more or less a bug, but it's not a problem of script.
This post has been edited by cyberking: Mar 17 2008, 12:28 AM