Jump to content

Recommended Posts

Posted (edited)

All,

 

I'm developing an API for NODEJS that supports L2OFF and L2J (in the future)

 

Here's the module: https://www.npmjs.com/package/l2-api

 

I'm adding more functions and I would like to you help me with the password encryption algorithm.

 

This is an open source project. Feel free to contribute in Github.

Edited by Puchito
Posted

This is inside L2OFF, so...

 

You have to use Admin socket of CacheD... Otherwise you will get old data, races, and performance/security issues. 

Oh, also my kitty might get pregnant. 

 

Seriously, idea is very nice, I was looking for something like that, but all data should be taken from CacheD, because this module doesn't modify SQL each time, it's a CACHE. Also, taking something already prepared from memory is much more faster, then SQL query.

 

About races - when your module get mature, and you would like to change data, no way to use SQL, since changes won't be visible in game, and even probably overridden by CacheD module. 

 

 

Posted

@MasterToma thank you !

 

I was planning to use mssql queries for fetching data and cached for updating data.

 

Is mssql data not up to date? I thought every time the cached performed an action it updates the database.

 

Can you provide me a link or any documentation about CacheD functions? I only found the Depmax64 basic functions in PHP. For instance, if i want to fetch the ranking from the cached, how can i do that?

 

Cheers!

  • 1 month later...
  • 1 month later...
Posted

Here you go:

 

https://ufile.io/rld02qiw

 

This ZIP contains:

 

- L2Crypt.js = Native L2 Password Encryption

- hAuthD.js = MD5 Password Encryption for hAuthD

- L2CacheD/CacheD.js = A bunch of CacheD packets

 

I wrote this code years ago. It is horrible, ugly, and looking back at it makes me want to gag. But it does work. Atleast it did for AdvExt64's Interlude CacheD

  • 5 months later...
Posted

How to crypt password using L2Crypt.js?

I have the error:

 

"message": "Implicit conversion from data type nvarchar to binary is not allowed. Use the CONVERT function to run this query.",

 

how to solve? I use KNEX

Posted (edited)

I had the same issue with frameworks and query builders and so on. This is how I managed to insert the encrypted password. The encrypted password from L2Crypt.js should look like this: 0x256891DE63C270EDD8416767AA301616 . Then you insert this using CONVERT inside user_auth

 

CONVERT(BINARY(16), '$pass', 1)

And for the answers of the security questions (answer1 & answer2 inside user_auth)

 

CONVERT(BINARY(32), '$answer1', 1)

 

Edited by PARADISE
Posted
9 hours ago, PARADISE said:

I had the same issue with frameworks and query builders and so on. This is how I managed to insert the encrypted password. The encrypted password from L2Crypt.js should look like this: 0x256891DE63C270EDD8416767AA301616 . Then you insert this using CONVERT inside user_auth

 


CONVERT(BINARY(16), '$pass', 1)

And for the answers of the security questions (answer1 & answer2 inside user_auth)

 


CONVERT(BINARY(32), '$answer1', 1)

 

 
something like:

knex('user_auth')
   .insert({
      CONVERT(BINARY(16), 'pass', 1), 
      quiz1,
      quiz2, 
      CONVERT(BINARY(16), 'answer1', 1),
      CONVERT(BINARY(16), 'answer2', 1),
   });

what would the query look like?

 

 

  • 6 years later...
Posted
On 5/11/2019 at 3:18 AM, tk422 said:

Here you go:

 

https://ufile.io/rld02qiw

 

This ZIP contains:

 

- L2Crypt.js = Native L2 Password Encryption

- hAuthD.js = MD5 Password Encryption for hAuthD

- L2CacheD/CacheD.js = A bunch of CacheD packets

 

I wrote this code years ago. It is horrible, ugly, and looking back at it makes me want to gag. But it does work. Atleast it did for AdvExt64's Interlude CacheD

who have this files? or info about cached packets?

  • 3 weeks later...
Posted
On 5/11/2019 at 8:18 AM, tk422 said:

给你:

 

https://ufile.io/rld02qiw

 

该邮编包含:

 

- L2Crypt.js = 原生L2密码加密

- hAuthD.js = hAuthD 的 MD5 密码加密

- L2CacheD/CacheD.js = 一堆 CacheD 数据包

 

这段代码是我多年前写的。它很糟糕、丑陋,回头看让我想呕吐。但它确实有效。至少AdvExt64的Interlude CacheD是这样

hello , can you reupload this file . thanks 

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


  • Posts

    • And Discord: https://discord.gg/3aYqWNqb
    • Ofc: https://discord.gg/3aYqWNqb
    • You can find some H5 skins shared in old L2 modding Discords, but most of the higher‑quality ones are either paid or come bundled with full client edits. I usually mix in commissioned work and whatever I can patch myself. On a side note, I fund a lot of these commissions by selling off game items through instant sell cs2 skins, which has been a quick way for me to get some cash for projects.
    • There is no need for gRPC in this case, even tho originally it was gRPC based but since we don't need it to be bi-directional, we switched to simple http requests for the web calls and SSEs for the data streamed from the server. There are distributed locks in place to precent race conditions between actions that can happen between multiple web instances and the server.   Local models can also be slow depending on the model, and most external models can actually be faster than local ones if you use Flash 2.5 or something along those lines. I am running on 512GB of Unified Memory on my Mac Studio M3 Ultra so the speed of the local model for a small model is pretty good but I tested it with Gemini too and it works equally as fast and in some cases faster. The way it works is that I'm using pgvector (one of the benefits of moving to Postgres) to search the data and see what the player can see etc and there is some batching of the next few actions for 2-4 seconds for the user until the next LLM request fires. The batching also includes branching on logic so if they for example fall under some HP they will move to kiting instead of attacking or maybe they heal etc.   Everything is authed and permission-based. The server and the backend of the frontend have secure communication between them, either with a symmetric key (not recommended for production) or a certificate (the recommended way), so there is no worry. It's all tied to the account's access level, etc., so nobody can make an action that they normally wouldn't be allowed to do. Even the MCP is token-based, and there are prompt injection protections in place. The MCP is audited, and every mutation needs confirmation. The admin area is only accessible to the admin account anyway so normal users can't access it.  
  • Topics

×
×
  • Create New...

Important Information

This community uses essential cookies to function properly. Non-essential cookies and third-party services are used only with your consent. Read our Privacy Policy and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..