summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorJared Adams <jaxad0127@gmail.com>2009-12-02 07:52:59 -0700
committerJared Adams <jaxad0127@gmail.com>2009-12-02 07:52:59 -0700
commitdad2bd80f6e05813715739cc2a047d3a4862b8af (patch)
tree86456780e5f8dd04f3884d718f0cb9332ece34f9
parentafa9b43941415a5f995da3c8ec02d338c6ea8fd0 (diff)
downloadtmwa-dad2bd80f6e05813715739cc2a047d3a4862b8af.tar.gz
tmwa-dad2bd80f6e05813715739cc2a047d3a4862b8af.tar.bz2
tmwa-dad2bd80f6e05813715739cc2a047d3a4862b8af.tar.xz
tmwa-dad2bd80f6e05813715739cc2a047d3a4862b8af.zip
Fix map authentication response
This way,t he client will parse the duplicate login packet correctly when logging in.
-rw-r--r--src/map/clif.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/src/map/clif.c b/src/map/clif.c
index c961464..3fe4ad9 100644
--- a/src/map/clif.c
+++ b/src/map/clif.c
@@ -6146,6 +6146,9 @@ void clif_parse_WantToConnection(int fd, struct map_session_data *sd)
account_id = RFIFOL(fd,2);
} else return; // Not the auth packet
+ WFIFOL(fd,0) = account_id;
+ WFIFOSET(fd,4);
+
// if same account already connected, we disconnect the 2 sessions
if ((old_sd = map_id2sd(account_id)) != NULL) {
clif_authfail_fd(fd, 2); // same id
@@ -6161,9 +6164,6 @@ void clif_parse_WantToConnection(int fd, struct map_session_data *sd)
pc_setnewpc(sd, account_id, RFIFOL(fd,6), RFIFOL(fd,10), RFIFOL(fd,14), RFIFOB(fd,18), fd);
- WFIFOL(fd,0) = sd->bl.id;
- WFIFOSET(fd,4);
-
map_addiddb(&sd->bl);
chrif_authreq(sd);