123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799 |
- /*
- * This program is free software: you can redistribute it and/or modify it under
- * the terms of the GNU General Public License as published by the Free Software
- * Foundation, either version 3 of the License, or (at your option) any later
- * version.
- *
- * This program is distributed in the hope that it will be useful, but WITHOUT
- * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
- * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more
- * details.
- *
- * You should have received a copy of the GNU General Public License along with
- * this program. If not, see <http://www.gnu.org/licenses/>.
- */
- package com.l2jserver.loginserver;
- import java.net.InetAddress;
- import java.net.UnknownHostException;
- import java.security.GeneralSecurityException;
- import java.security.KeyPairGenerator;
- import java.security.MessageDigest;
- import java.security.interfaces.RSAPrivateKey;
- import java.security.spec.RSAKeyGenParameterSpec;
- import java.sql.Connection;
- import java.sql.PreparedStatement;
- import java.sql.ResultSet;
- import java.util.Collection;
- import java.util.Map;
- import java.util.logging.Level;
- import java.util.logging.Logger;
- import javax.crypto.Cipher;
- import javolution.util.FastMap;
- import com.l2jserver.Config;
- import com.l2jserver.L2DatabaseFactory;
- import com.l2jserver.loginserver.GameServerTable.GameServerInfo;
- import com.l2jserver.loginserver.network.L2LoginClient;
- import com.l2jserver.loginserver.network.gameserverpackets.ServerStatus;
- import com.l2jserver.loginserver.network.serverpackets.LoginFail.LoginFailReason;
- import com.l2jserver.util.Base64;
- import com.l2jserver.util.Rnd;
- import com.l2jserver.util.crypt.ScrambledKeyPair;
- import com.l2jserver.util.lib.Log;
- /**
- * This class ...
- *
- * @version $Revision: 1.7.4.3 $ $Date: 2005/03/27 15:30:09 $
- */
- public class LoginController
- {
- protected static final Logger _log = Logger.getLogger(LoginController.class.getName());
-
- private static LoginController _instance;
-
- /** Time before kicking the client if he didnt logged yet */
- public final static int LOGIN_TIMEOUT = 60 * 1000;
-
- /** Authed Clients on LoginServer*/
- protected FastMap<String, L2LoginClient> _loginServerClients = new FastMap<String, L2LoginClient>().shared();
-
- private final Map<String, BanInfo> _bannedIps = new FastMap<String, BanInfo>().shared();
-
- private final Map<InetAddress, FailedLoginAttempt> _hackProtection;
-
- protected ScrambledKeyPair[] _keyPairs;
-
- private final Thread _purge;
-
- protected byte[][] _blowfishKeys;
- private static final int BLOWFISH_KEYS = 20;
-
- private static final String USER_INFO_SELECT = "SELECT password, IF(? > value OR value IS NULL, accessLevel, -100) AS accessLevel, lastServer, userIp " +
- "FROM accounts LEFT JOIN (account_data) ON (account_data.account_name=accounts.login AND account_data.var=\"ban_temp\") WHERE login=?";
-
- public static void load() throws GeneralSecurityException
- {
- synchronized (LoginController.class)
- {
- if (_instance == null)
- {
- _instance = new LoginController();
- }
- else
- {
- throw new IllegalStateException("LoginController can only be loaded a single time.");
- }
- }
- }
-
- public static LoginController getInstance()
- {
- return _instance;
- }
-
- private LoginController() throws GeneralSecurityException
- {
- _log.info("Loading LoginController...");
-
- _hackProtection = new FastMap<InetAddress, FailedLoginAttempt>();
-
- _keyPairs = new ScrambledKeyPair[10];
-
- KeyPairGenerator keygen = null;
-
- keygen = KeyPairGenerator.getInstance("RSA");
- RSAKeyGenParameterSpec spec = new RSAKeyGenParameterSpec(1024, RSAKeyGenParameterSpec.F4);
- keygen.initialize(spec);
-
- //generate the initial set of keys
- for (int i = 0; i < 10; i++)
- {
- _keyPairs[i] = new ScrambledKeyPair(keygen.generateKeyPair());
- }
- _log.info("Cached 10 KeyPairs for RSA communication");
-
- testCipher((RSAPrivateKey) _keyPairs[0]._pair.getPrivate());
-
- // Store keys for blowfish communication
- generateBlowFishKeys();
-
- _purge = new PurgeThread();
- _purge.setDaemon(true);
- _purge.start();
- }
-
- /**
- * This is mostly to force the initialization of the Crypto Implementation, avoiding it being done on runtime when its first needed.<BR>
- * In short it avoids the worst-case execution time on runtime by doing it on loading.
- * @param key Any private RSA Key just for testing purposes.
- * @throws GeneralSecurityException if a underlying exception was thrown by the Cipher
- */
- private void testCipher(RSAPrivateKey key) throws GeneralSecurityException
- {
- // avoid worst-case execution, KenM
- Cipher rsaCipher = Cipher.getInstance("RSA/ECB/nopadding");
- rsaCipher.init(Cipher.DECRYPT_MODE, key);
- }
-
- private void generateBlowFishKeys()
- {
- _blowfishKeys = new byte[BLOWFISH_KEYS][16];
-
- for (int i = 0; i < BLOWFISH_KEYS; i++)
- {
- for (int j = 0; j < _blowfishKeys[i].length; j++)
- {
- _blowfishKeys[i][j] = (byte) (Rnd.nextInt(255) + 1);
- }
- }
- _log.info("Stored " + _blowfishKeys.length + " keys for Blowfish communication");
- }
-
- /**
- * @return Returns a random key
- */
- public byte[] getBlowfishKey()
- {
- return _blowfishKeys[(int) (Math.random() * BLOWFISH_KEYS)];
- }
-
- public SessionKey assignSessionKeyToClient(String account, L2LoginClient client)
- {
- SessionKey key;
-
- key = new SessionKey(Rnd.nextInt(), Rnd.nextInt(), Rnd.nextInt(), Rnd.nextInt());
- _loginServerClients.put(account, client);
- return key;
- }
-
- public void removeAuthedLoginClient(String account)
- {
- if (account == null)
- return;
- _loginServerClients.remove(account);
- }
-
- public L2LoginClient getAuthedClient(String account)
- {
- return _loginServerClients.get(account);
- }
-
- public static enum AuthLoginResult
- {
- INVALID_PASSWORD,
- ACCOUNT_BANNED,
- ALREADY_ON_LS,
- ALREADY_ON_GS,
- AUTH_SUCCESS
- }
-
- public AuthLoginResult tryAuthLogin(String account, String password, L2LoginClient client)
- {
- AuthLoginResult ret = AuthLoginResult.INVALID_PASSWORD;
- // check auth
- if (loginValid(account, password, client))
- {
- // login was successful, verify presence on Gameservers
- ret = AuthLoginResult.ALREADY_ON_GS;
- if (!isAccountInAnyGameServer(account))
- {
- // account isnt on any GS verify LS itself
- ret = AuthLoginResult.ALREADY_ON_LS;
-
- if (_loginServerClients.putIfAbsent(account, client) == null)
- {
- ret = AuthLoginResult.AUTH_SUCCESS;
- }
- }
- }
- else
- {
- if (client.getAccessLevel() < 0)
- {
- ret = AuthLoginResult.ACCOUNT_BANNED;
- }
- }
- return ret;
- }
-
- /**
- * Adds the address to the ban list of the login server, with the given duration.
- *
- * @param address The Address to be banned.
- * @param expiration Timestamp in miliseconds when this ban expires
- * @throws UnknownHostException if the address is invalid.
- */
- public void addBanForAddress(String address, long expiration) throws UnknownHostException
- {
- InetAddress netAddress = InetAddress.getByName(address);
- if (!_bannedIps.containsKey(netAddress.getHostAddress()))
- _bannedIps.put(netAddress.getHostAddress(), new BanInfo(netAddress, expiration));
- }
-
- /**
- * Adds the address to the ban list of the login server, with the given duration.
- *
- * @param address The Address to be banned.
- * @param duration is miliseconds
- */
- public void addBanForAddress(InetAddress address, long duration)
- {
- if (!_bannedIps.containsKey(address.getHostAddress()))
- _bannedIps.put(address.getHostAddress(), new BanInfo(address, System.currentTimeMillis() + duration));
- }
-
- public boolean isBannedAddress(InetAddress address)
- {
- String[] parts = address.getHostAddress().split("\\.");
- BanInfo bi = _bannedIps.get(address.getHostAddress());
- if (bi == null)
- bi = _bannedIps.get(parts[0] + "." + parts[1] + "." + parts[2] + ".0");
- if (bi == null)
- bi = _bannedIps.get(parts[0] + "." + parts[1] + ".0.0");
- if (bi == null)
- bi = _bannedIps.get(parts[0] + ".0.0.0");
- if (bi != null)
- {
- if (bi.hasExpired())
- {
- _bannedIps.remove(address.getHostAddress());
- return false;
- }
- return true;
- }
- return false;
- }
-
- public Map<String, BanInfo> getBannedIps()
- {
- return _bannedIps;
- }
-
- /**
- * Remove the specified address from the ban list
- * @param address The address to be removed from the ban list
- * @return true if the ban was removed, false if there was no ban for this ip
- */
- public boolean removeBanForAddress(InetAddress address)
- {
- return _bannedIps.remove(address.getHostAddress()) != null;
- }
-
- /**
- * Remove the specified address from the ban list
- * @param address The address to be removed from the ban list
- * @return true if the ban was removed, false if there was no ban for this ip or the address was invalid.
- */
- public boolean removeBanForAddress(String address)
- {
- try
- {
- return this.removeBanForAddress(InetAddress.getByName(address));
- }
- catch (UnknownHostException e)
- {
- return false;
- }
- }
-
- public SessionKey getKeyForAccount(String account)
- {
- L2LoginClient client = _loginServerClients.get(account);
- if (client != null)
- {
- return client.getSessionKey();
- }
- return null;
- }
-
- public boolean isAccountInAnyGameServer(String account)
- {
- Collection<GameServerInfo> serverList = GameServerTable.getInstance().getRegisteredGameServers().values();
- for (GameServerInfo gsi : serverList)
- {
- GameServerThread gst = gsi.getGameServerThread();
- if (gst != null && gst.hasAccountOnGameServer(account))
- {
- return true;
- }
- }
- return false;
- }
-
- public GameServerInfo getAccountOnGameServer(String account)
- {
- Collection<GameServerInfo> serverList = GameServerTable.getInstance().getRegisteredGameServers().values();
- for (GameServerInfo gsi : serverList)
- {
- GameServerThread gst = gsi.getGameServerThread();
- if (gst != null && gst.hasAccountOnGameServer(account))
- {
- return gsi;
- }
- }
- return null;
- }
-
- public void getCharactersOnAccount(String account)
- {
- Collection<GameServerInfo> serverList = GameServerTable.getInstance().getRegisteredGameServers().values();
- for (GameServerInfo gsi : serverList)
- {
- if (gsi.isAuthed())
- gsi.getGameServerThread().requestCharacters(account);
- }
- }
-
- /**
- *
- * @param client
- * @param serverId
- * @return
- */
- public boolean isLoginPossible(L2LoginClient client, int serverId)
- {
- GameServerInfo gsi = GameServerTable.getInstance().getRegisteredGameServerById(serverId);
- int access = client.getAccessLevel();
- if (gsi != null && gsi.isAuthed())
- {
- boolean loginOk = (gsi.getCurrentPlayerCount() < gsi.getMaxPlayers() && gsi.getStatus() != ServerStatus.STATUS_GM_ONLY)
- || access > 0;
-
- if (loginOk && client.getLastServer() != serverId)
- {
- Connection con = null;
- try
- {
- con = L2DatabaseFactory.getInstance().getConnection();
-
- String stmt = "UPDATE accounts SET lastServer = ? WHERE login = ?";
- PreparedStatement statement = con.prepareStatement(stmt);
- statement.setInt(1, serverId);
- statement.setString(2, client.getAccount());
- statement.executeUpdate();
- statement.close();
- }
- catch (Exception e)
- {
- _log.log(Level.WARNING, "Could not set lastServer: " + e.getMessage(), e);
- }
- finally
- {
- L2DatabaseFactory.close(con);
- }
- }
- return loginOk;
- }
- return false;
- }
-
- public void setAccountAccessLevel(String account, int banLevel)
- {
- Connection con = null;
- try
- {
- con = L2DatabaseFactory.getInstance().getConnection();
-
- String stmt = "UPDATE accounts SET accessLevel=? WHERE login=?";
- PreparedStatement statement = con.prepareStatement(stmt);
- statement.setInt(1, banLevel);
- statement.setString(2, account);
- statement.executeUpdate();
- statement.close();
- }
- catch (Exception e)
- {
- _log.log(Level.WARNING, "Could not set accessLevel: " + e.getMessage(), e);
- }
- finally
- {
- L2DatabaseFactory.close(con);
- }
- }
-
- public void setAccountLastTracert(String account, String pcIp,
- String hop1, String hop2, String hop3, String hop4)
- {
- Connection con = null;
- try
- {
- con = L2DatabaseFactory.getInstance().getConnection();
-
- String stmt = "UPDATE accounts SET pcIp=?, hop1=?, hop2=?, hop3=?, hop4=? WHERE login=?";
- PreparedStatement statement = con.prepareStatement(stmt);
- statement.setString(1, pcIp);
- statement.setString(2, hop1);
- statement.setString(3, hop2);
- statement.setString(4, hop3);
- statement.setString(5, hop4);
- statement.setString(6, account);
- statement.executeUpdate();
- statement.close();
- }
- catch (Exception e)
- {
- _log.log(Level.WARNING, "Could not set last tracert: " + e.getMessage(), e);
- }
- finally
- {
- L2DatabaseFactory.close(con);
- }
- }
-
- public void setCharactersOnServer(String account, int charsNum, long[] timeToDel, int serverId)
- {
- L2LoginClient client = _loginServerClients.get(account);
-
- if (client == null)
- return;
-
- if (charsNum > 0)
- client.setCharsOnServ(serverId, charsNum);
-
- if (timeToDel.length > 0)
- client.serCharsWaitingDelOnServ(serverId, timeToDel);
- }
-
- /**
- * <p>This method returns one of the cached {@link ScrambledKeyPair ScrambledKeyPairs} for communication with Login Clients.</p>
- * @return a scrambled keypair
- */
- public ScrambledKeyPair getScrambledRSAKeyPair()
- {
- return _keyPairs[Rnd.nextInt(10)];
- }
-
- /**
- * User name is not case sensitive any more.
- * @param user
- * @param password
- * @param client
- * @return
- */
- public boolean loginValid(String user, String password, L2LoginClient client)// throws HackingException
- {
- boolean ok = false;
- InetAddress address = client.getConnection().getInetAddress();
-
- // player disconnected meanwhile
- if (address == null || user == null)
- {
- return false;
- }
-
- Connection con = null;
- try
- {
- MessageDigest md = MessageDigest.getInstance("SHA");
- byte[] raw = password.getBytes("UTF-8");
- byte[] hash = md.digest(raw);
-
- byte[] expected = null;
- int access = 0;
- int lastServer = 1;
- String userIP = null;
-
- con = L2DatabaseFactory.getInstance().getConnection();
- PreparedStatement statement = con.prepareStatement(USER_INFO_SELECT);
- statement.setString(1, Long.toString(System.currentTimeMillis()));
- statement.setString(2, user);
- ResultSet rset = statement.executeQuery();
- if (rset.next())
- {
- expected = Base64.decode(rset.getString("password"));
- access = rset.getInt("accessLevel");
- lastServer = rset.getInt("lastServer");
- userIP = rset.getString("userIP");
- if (lastServer <= 0)
- lastServer = 1; // minServerId is 1 in Interlude
- if (Config.DEBUG)
- _log.fine("account exists");
- }
- rset.close();
- statement.close();
-
- // if account doesnt exists
- if (expected == null)
- {
- if (Config.AUTO_CREATE_ACCOUNTS)
- {
- if ((user.length() >= 2) && (user.length() <= 14))
- {
- statement = con.prepareStatement("INSERT INTO accounts (login,password,lastactive,accessLevel,lastIP) values(?,?,?,?,?)");
- statement.setString(1, user);
- statement.setString(2, Base64.encodeBytes(hash));
- statement.setLong(3, System.currentTimeMillis());
- statement.setInt(4, 0);
- statement.setString(5, address.getHostAddress());
- statement.execute();
- statement.close();
-
- if (Config.LOG_LOGIN_CONTROLLER)
- Log.add("'" + user + "' " + address.getHostAddress() + " - OK : AccountCreate", "loginlog");
-
- _log.info("Created new account for " + user);
- return true;
-
- }
- if (Config.LOG_LOGIN_CONTROLLER)
- Log.add("'" + user + "' " + address.getHostAddress() + " - ERR : ErrCreatingACC", "loginlog");
-
- _log.warning("Invalid username creation/use attempt: " + user);
- }
- else
- {
- if (Config.LOG_LOGIN_CONTROLLER)
- Log.add("'" + user + "' " + address.getHostAddress() + " - ERR : AccountMissing", "loginlog");
-
- _log.warning("Account missing for user " + user);
- FailedLoginAttempt failedAttempt = _hackProtection.get(address);
- int failedCount;
- if (failedAttempt == null)
- {
- _hackProtection.put(address, new FailedLoginAttempt(address, password));
- failedCount = 1;
- }
- else
- {
- failedAttempt.increaseCounter();
- failedCount = failedAttempt.getCount();
- }
-
- if (failedCount >= Config.LOGIN_TRY_BEFORE_BAN)
- {
- _log.info("Banning '" + address.getHostAddress() + "' for " + Config.LOGIN_BLOCK_AFTER_BAN + " seconds due to "
- + failedCount + " invalid user name attempts");
- this.addBanForAddress(address, Config.LOGIN_BLOCK_AFTER_BAN * 1000);
- }
- }
- return false;
- }
-
- // is this account banned?
- if (access < 0)
- {
- if (Config.LOG_LOGIN_CONTROLLER)
- Log.add("'" + user + "' " + address.getHostAddress() + " - ERR : AccountBanned", "loginlog");
-
- client.setAccessLevel(access);
- return false;
- }
- // Check IP
- if (userIP != null)
- {
- if(!isValidIPAddress(userIP))
- {
- // Address is not valid so it's a domain name, get IP
- try
- {
- InetAddress addr = InetAddress.getByName(userIP);
- userIP = addr.getHostAddress();
- }
- catch(Exception e)
- {
- return false;
- }
- }
- if(!address.getHostAddress().equalsIgnoreCase(userIP))
- {
- if (Config.LOG_LOGIN_CONTROLLER)
- Log.add("'" + user + "' " + address.getHostAddress() + "/" + userIP + " - ERR : INCORRECT IP", "loginlog");
-
- return false;
- }
- }
- // check password hash
- ok = true;
- for (int i = 0; i < expected.length; i++)
- {
- if (hash[i] != expected[i])
- {
- ok = false;
- break;
- }
- }
-
- if (ok)
- {
- client.setAccessLevel(access);
- client.setLastServer(lastServer);
- statement = con.prepareStatement("UPDATE accounts SET lastactive=?, lastIP=? WHERE login=?");
- statement.setLong(1, System.currentTimeMillis());
- statement.setString(2, address.getHostAddress());
- statement.setString(3, user);
- statement.execute();
- statement.close();
- }
- }
- catch (Exception e)
- {
- _log.log(Level.WARNING, "Could not check password:" + e.getMessage(), e);
- ok = false;
- }
- finally
- {
- L2DatabaseFactory.close(con);
- }
-
- if (!ok)
- {
- if (Config.LOG_LOGIN_CONTROLLER)
- Log.add("'" + user + "' " + address.getHostAddress() + " - ERR : LoginFailed", "loginlog");
-
- FailedLoginAttempt failedAttempt = _hackProtection.get(address);
- int failedCount;
- if (failedAttempt == null)
- {
- _hackProtection.put(address, new FailedLoginAttempt(address, password));
- failedCount = 1;
- }
- else
- {
- failedAttempt.increaseCounter(password);
- failedCount = failedAttempt.getCount();
- }
-
- if (failedCount >= Config.LOGIN_TRY_BEFORE_BAN)
- {
- _log.info("Banning '" + address.getHostAddress() + "' for " + Config.LOGIN_BLOCK_AFTER_BAN + " seconds due to "
- + failedCount + " invalid user/pass attempts");
- this.addBanForAddress(address, Config.LOGIN_BLOCK_AFTER_BAN * 1000);
- }
- }
- else
- {
- _hackProtection.remove(address);
- if (Config.LOG_LOGIN_CONTROLLER)
- Log.add("'" + user + "' " + address.getHostAddress() + " - OK : LoginOk", "loginlog");
- }
-
- return ok;
- }
- public boolean isValidIPAddress(String ipAddress)
- {
- String[] parts = ipAddress.split("\\.");
- if (parts.length != 4)
- return false;
- for (String s : parts)
- {
- int i = Integer.parseInt(s);
- if ((i < 0) || (i > 255))
- return false;
- }
- return true;
- }
- class FailedLoginAttempt
- {
- //private InetAddress _ipAddress;
- private int _count;
- private long _lastAttempTime;
- private String _lastPassword;
-
- public FailedLoginAttempt(InetAddress address, String lastPassword)
- {
- //_ipAddress = address;
- _count = 1;
- _lastAttempTime = System.currentTimeMillis();
- _lastPassword = lastPassword;
- }
-
- public void increaseCounter(String password)
- {
- if (!_lastPassword.equals(password))
- {
- // check if theres a long time since last wrong try
- if (System.currentTimeMillis() - _lastAttempTime < 300 * 1000)
- {
- _count++;
- }
- else
- {
- // restart the status
- _count = 1;
-
- }
- _lastPassword = password;
- _lastAttempTime = System.currentTimeMillis();
- }
- else
- //trying the same password is not brute force
- {
- _lastAttempTime = System.currentTimeMillis();
- }
- }
-
- public int getCount()
- {
- return _count;
- }
-
- public void increaseCounter()
- {
- _count++;
- }
-
- }
-
- class BanInfo
- {
- private final InetAddress _ipAddress;
- // Expiration
- private final long _expiration;
-
- public BanInfo(InetAddress ipAddress, long expiration)
- {
- _ipAddress = ipAddress;
- _expiration = expiration;
- }
-
- public InetAddress getAddress()
- {
- return _ipAddress;
- }
-
- public boolean hasExpired()
- {
- return System.currentTimeMillis() > _expiration && _expiration > 0;
- }
- }
-
- class PurgeThread extends Thread
- {
- public PurgeThread()
- {
- setName("PurgeThread");
- }
- @Override
- public void run()
- {
- while (!isInterrupted())
- {
- for (L2LoginClient client : _loginServerClients.values())
- {
- if (client == null)
- continue;
- if ((client.getConnectionStartTime() + LOGIN_TIMEOUT) < System.currentTimeMillis())
- {
- client.close(LoginFailReason.REASON_ACCESS_FAILED);
- }
- }
-
- try
- {
- Thread.sleep(LOGIN_TIMEOUT / 2);
- }
- catch (InterruptedException e)
- {
- return;
- }
- }
- }
- }
- }
|