This is an automated email from the git hooks/post-receive script.

smcv pushed a commit to annotated tag 1.5a
in repository iortcw.

commit 041444759206880d47109d7733f833abf9b4b1a9
Author: MAN-AT-ARMS <m4n4t4...@gmail.com>
Date:   Sun Sep 11 18:44:36 2016 -0400

    All: Add build option to enable / disable use of auth server
    
    idSoftware's auth servers have been decommissioned
---
 MP/Makefile                | 8 ++++++++
 MP/code/client/cl_main.c   | 4 ++++
 MP/code/qcommon/qcommon.h  | 4 +++-
 MP/code/server/sv_ccmds.c  | 4 ++++
 MP/code/server/sv_client.c | 4 ++++
 MP/code/server/sv_main.c   | 2 ++
 SP/Makefile                | 8 ++++++++
 SP/code/client/cl_main.c   | 4 ++++
 SP/code/qcommon/qcommon.h  | 2 ++
 SP/code/server/sv_ccmds.c  | 4 ++++
 SP/code/server/sv_client.c | 4 ++++
 SP/code/server/sv_main.c   | 2 ++
 12 files changed, 49 insertions(+), 1 deletion(-)

diff --git a/MP/Makefile b/MP/Makefile
index d9c737c..d60f8ab 100644
--- a/MP/Makefile
+++ b/MP/Makefile
@@ -285,6 +285,10 @@ ifndef USE_PBMD5
 USE_PBMD5=1
 endif
 
+ifndef USE_AUTHORIZE_SERVER
+USE_AUTHORIZE_SERVER=0
+endif
+
 
 #############################################################################
 
@@ -1140,6 +1144,10 @@ ifeq ($(BUILD_STANDALONE),1)
   BASE_CFLAGS += -DSTANDALONE
 endif
 
+ifeq ($(USE_AUTHORIZE_SERVER),1)
+  BASE_CFLAGS += -DUSE_AUTHORIZE_SERVER
+endif
+
 ifeq ($(GENERATE_DEPENDENCIES),1)
   DEPEND_CFLAGS = -MMD
 else
diff --git a/MP/code/client/cl_main.c b/MP/code/client/cl_main.c
index 752fd2e..3b3320f 100644
--- a/MP/code/client/cl_main.c
+++ b/MP/code/client/cl_main.c
@@ -1686,6 +1686,7 @@ in anyway.
 ===================
 */
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER
 void CL_RequestAuthorization( void ) {
        char    nums[64];
        int             i, j, l;
@@ -1730,6 +1731,7 @@ void CL_RequestAuthorization( void ) {
        NET_OutOfBandPrint(NS_CLIENT, cls.authorizeServer, "getKeyAuthorize %i 
%s", fs->integer, nums );
 }
 #endif
+#endif
 
 /*
 ======================================================================
@@ -2506,9 +2508,11 @@ void CL_CheckForResend( void ) {
        case CA_CONNECTING:
                // requesting a challenge .. IPv6 users always get in as 
authorize server supports no ipv6.
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER
                if (!com_standalone->integer && clc.serverAddress.type == NA_IP 
&& !Sys_IsLANAddress( clc.serverAddress ) )
                        CL_RequestAuthorization();
 #endif
+#endif
 
                // The challenge request shall be followed by a client 
challenge so no malicious server can hijack this connection.
                // Add the gamename so the server knows we're running the 
correct game or can reject the client
diff --git a/MP/code/qcommon/qcommon.h b/MP/code/qcommon/qcommon.h
index 50cb5e9..4be7ba2 100644
--- a/MP/code/qcommon/qcommon.h
+++ b/MP/code/qcommon/qcommon.h
@@ -306,13 +306,15 @@ extern int demo_protocols[];
 #endif
 
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER
   #ifndef AUTHORIZE_SERVER_NAME
-    #define    AUTHORIZE_SERVER_NAME   "wolfauthorize.idsoftware.com"
+    #define    AUTHORIZE_SERVER_NAME   "wolfauthorize.idsoftware.com"  // 
Decommissioned
   #endif
   #ifndef PORT_AUTHORIZE
     #define    PORT_AUTHORIZE          27952
   #endif
 #endif
+#endif
 
 //#define AUTOUPDATE_SERVER_NAME       "foobar"
 
diff --git a/MP/code/server/sv_ccmds.c b/MP/code/server/sv_ccmds.c
index 69c9e29..bcfe70f 100644
--- a/MP/code/server/sv_ccmds.c
+++ b/MP/code/server/sv_ccmds.c
@@ -697,6 +697,7 @@ static void SV_KickNum_f( void ) {
 }
 
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER
 // these functions require the auth server which of course is not available 
anymore for stand-alone games.
 
 /*
@@ -809,6 +810,7 @@ static void SV_BanNum_f( void ) {
        }
 }
 #endif
+#endif
 
 /*
 ==================
@@ -1618,12 +1620,14 @@ void SV_AddOperatorCommands( void ) {
        Cmd_AddCommand( "heartbeat", SV_Heartbeat_f );
        Cmd_AddCommand( "kick", SV_Kick_f );
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER
        if(!com_standalone->integer)
        {
                Cmd_AddCommand ("banUser", SV_Ban_f);
                Cmd_AddCommand ("banClient", SV_BanNum_f);
        }
 #endif
+#endif
        Cmd_AddCommand ("kickbots", SV_KickBots_f);
        Cmd_AddCommand ("kickall", SV_KickAll_f);
        Cmd_AddCommand ("kicknum", SV_KickNum_f);
diff --git a/MP/code/server/sv_client.c b/MP/code/server/sv_client.c
index 74684b5..6d03c24 100644
--- a/MP/code/server/sv_client.c
+++ b/MP/code/server/sv_client.c
@@ -151,6 +151,7 @@ void SV_GetChallenge( netadr_t from )
        challenge->time = svs.time;
 
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER 
        // Drop the authorize stuff if this client is coming in via v6 as the 
auth server does not support ipv6.
        // Drop also for addresses coming in on local LAN and for stand-alone 
games independent from id's assets.
        if(challenge->adr.type == NA_IP && !com_standalone->integer && 
!Sys_IsLANAddress(from))
@@ -204,6 +205,7 @@ void SV_GetChallenge( netadr_t from )
                }
        }
 #endif
+#endif
 
        challenge->pingTime = svs.time;
        NET_OutOfBandPrint(NS_SERVER, challenge->adr, "challengeResponse %d %d 
%d %d",
@@ -212,6 +214,7 @@ void SV_GetChallenge( netadr_t from )
 
 
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER
 /*
 ====================
 SV_AuthorizeIpPacket
@@ -286,6 +289,7 @@ void SV_AuthorizeIpPacket( netadr_t from ) {
        Com_Memset( challengeptr, 0, sizeof(*challengeptr) );
 }
 #endif
+#endif
 
 /*
 ==================
diff --git a/MP/code/server/sv_main.c b/MP/code/server/sv_main.c
index 6ddda3f..7f94e3c 100644
--- a/MP/code/server/sv_main.c
+++ b/MP/code/server/sv_main.c
@@ -1050,9 +1050,11 @@ static void SV_ConnectionlessPacket( netadr_t from, 
msg_t *msg ) {
        } else if ( !Q_stricmp( c,"connect" ) ) {
                SV_DirectConnect( from );
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER
        } else if ( !Q_stricmp( c,"ipAuthorize" ) ) {
                SV_AuthorizeIpPacket( from );
 #endif
+#endif
        } else if ( !Q_stricmp( c, "rcon" ) ) {
                SVC_RemoteCommand( from, msg );
 // DHM - Nerve
diff --git a/SP/Makefile b/SP/Makefile
index 4316045..94d85f6 100644
--- a/SP/Makefile
+++ b/SP/Makefile
@@ -274,6 +274,10 @@ ifndef RASPBERRY_PI
 RASPBERRY_PI=0
 endif
 
+ifndef USE_AUTHORIZE_SERVER
+USE_AUTHORIZE_SERVER=0
+endif
+
 
 #############################################################################
 
@@ -1125,6 +1129,10 @@ ifeq ($(BUILD_STANDALONE),1)
   BASE_CFLAGS += -DSTANDALONE
 endif
 
+ifeq ($(USE_AUTHORIZE_SERVER),1)
+  BASE_CFLAGS += -DUSE_AUTHORIZE_SERVER
+endif
+
 ifeq ($(GENERATE_DEPENDENCIES),1)
   DEPEND_CFLAGS = -MMD
 else
diff --git a/SP/code/client/cl_main.c b/SP/code/client/cl_main.c
index af10013..6e56793 100644
--- a/SP/code/client/cl_main.c
+++ b/SP/code/client/cl_main.c
@@ -1614,6 +1614,7 @@ in anyway.
 ===================
 */
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER
 void CL_RequestAuthorization( void ) {
        char nums[64];
        int i, j, l;
@@ -1658,6 +1659,7 @@ void CL_RequestAuthorization( void ) {
        NET_OutOfBandPrint(NS_CLIENT, cls.authorizeServer, "getKeyAuthorize %i 
%s", fs->integer, nums );
 }
 #endif
+#endif
 
 /*
 ======================================================================
@@ -2361,9 +2363,11 @@ void CL_CheckForResend( void ) {
        case CA_CONNECTING:
                // requesting a challenge .. IPv6 users always get in as 
authorize server supports no ipv6.
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER
                if (!com_standalone->integer && clc.serverAddress.type == NA_IP 
&& !Sys_IsLANAddress( clc.serverAddress ) )
                        CL_RequestAuthorization();
 #endif
+#endif
 
                // The challenge request shall be followed by a client 
challenge so no malicious server can hijack this connection.
                // Add the gamename so the server knows we're running the 
correct game or can reject the client
diff --git a/SP/code/qcommon/qcommon.h b/SP/code/qcommon/qcommon.h
index 570efe1..707fcd6 100644
--- a/SP/code/qcommon/qcommon.h
+++ b/SP/code/qcommon/qcommon.h
@@ -294,6 +294,7 @@ extern int demo_protocols[];
 #endif
 
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER
   #ifndef AUTHORIZE_SERVER_NAME
     #define    AUTHORIZE_SERVER_NAME   "authorize.gmistudios.com"
   #endif
@@ -301,6 +302,7 @@ extern int demo_protocols[];
     #define    PORT_AUTHORIZE          27952
   #endif
 #endif
+#endif
 
 #define PORT_MASTER         27950
 #define PORT_UPDATE         27951
diff --git a/SP/code/server/sv_ccmds.c b/SP/code/server/sv_ccmds.c
index ab67154..078bd41 100644
--- a/SP/code/server/sv_ccmds.c
+++ b/SP/code/server/sv_ccmds.c
@@ -714,6 +714,7 @@ static void SV_KickNum_f( void ) {
 }
 
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER
 // these functions require the auth server which of course is not available 
anymore for stand-alone games.
 
 /*
@@ -826,6 +827,7 @@ static void SV_BanNum_f( void ) {
        }
 }
 #endif
+#endif
 
 /*
 ==================
@@ -1624,12 +1626,14 @@ void SV_AddOperatorCommands( void ) {
        Cmd_AddCommand( "heartbeat", SV_Heartbeat_f );
        Cmd_AddCommand( "kick", SV_Kick_f );
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER
        if(!com_standalone->integer)
        {
                Cmd_AddCommand ("banUser", SV_Ban_f);
                Cmd_AddCommand ("banClient", SV_BanNum_f);
        }
 #endif
+#endif
        Cmd_AddCommand ("kickbots", SV_KickBots_f);
        Cmd_AddCommand ("kickall", SV_KickAll_f);
        Cmd_AddCommand ("kicknum", SV_KickNum_f);
diff --git a/SP/code/server/sv_client.c b/SP/code/server/sv_client.c
index 39e7425..5c73f9f 100644
--- a/SP/code/server/sv_client.c
+++ b/SP/code/server/sv_client.c
@@ -152,6 +152,7 @@ void SV_GetChallenge(netadr_t from)
        challenge->time = svs.time;
 
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER
        // Drop the authorize stuff if this client is coming in via v6 as the 
auth server does not support ipv6.
        // Drop also for addresses coming in on local LAN and for stand-alone 
games independent from id's assets.
        if(challenge->adr.type == NA_IP && !com_standalone->integer && 
!Sys_IsLANAddress(from))
@@ -203,6 +204,7 @@ void SV_GetChallenge(netadr_t from)
                }
        }
 #endif
+#endif
 
        challenge->pingTime = svs.time;
        NET_OutOfBandPrint(NS_SERVER, challenge->adr, "challengeResponse %d %d 
%d",
@@ -210,6 +212,7 @@ void SV_GetChallenge(netadr_t from)
 }
 
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER
 /*
 ====================
 SV_AuthorizeIpPacket
@@ -284,6 +287,7 @@ void SV_AuthorizeIpPacket( netadr_t from ) {
        Com_Memset( challengeptr, 0, sizeof(*challengeptr) );
 }
 #endif
+#endif
 
 /*
 ==================
diff --git a/SP/code/server/sv_main.c b/SP/code/server/sv_main.c
index c478a54..0f29b65 100644
--- a/SP/code/server/sv_main.c
+++ b/SP/code/server/sv_main.c
@@ -820,9 +820,11 @@ static void SV_ConnectionlessPacket( netadr_t from, msg_t 
*msg ) {
        } else if ( !Q_stricmp( c,"connect" ) ) {
                SV_DirectConnect( from );
 #ifndef STANDALONE
+#ifdef USE_AUTHORIZE_SERVER
        } else if ( !Q_stricmp( c,"ipAuthorize" ) ) {
                SV_AuthorizeIpPacket( from );
 #endif
+#endif
        } else if ( !Q_stricmp( c, "rcon" ) ) {
                SVC_RemoteCommand( from, msg );
        } else if ( !Q_stricmp( c,"disconnect" ) ) {

-- 
Alioth's /usr/local/bin/git-commit-notice on 
/srv/git.debian.org/git/pkg-games/iortcw.git

_______________________________________________
Pkg-games-commits mailing list
Pkg-games-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-games-commits

Reply via email to