diff options
author | Jared Adams <jaxad0127@gmail.com> | 2009-12-02 07:52:59 -0700 |
---|---|---|
committer | Jared Adams <jaxad0127@gmail.com> | 2009-12-02 07:52:59 -0700 |
commit | dad2bd80f6e05813715739cc2a047d3a4862b8af (patch) | |
tree | 86456780e5f8dd04f3884d718f0cb9332ece34f9 | |
parent | afa9b43941415a5f995da3c8ec02d338c6ea8fd0 (diff) | |
download | tmwa-dad2bd80f6e05813715739cc2a047d3a4862b8af.tar.gz tmwa-dad2bd80f6e05813715739cc2a047d3a4862b8af.tar.bz2 tmwa-dad2bd80f6e05813715739cc2a047d3a4862b8af.tar.xz tmwa-dad2bd80f6e05813715739cc2a047d3a4862b8af.zip |
Fix map authentication response
This way,t he client will parse the duplicate login packet correctly when logging in.
-rw-r--r-- | src/map/clif.c | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/src/map/clif.c b/src/map/clif.c index c961464..3fe4ad9 100644 --- a/src/map/clif.c +++ b/src/map/clif.c @@ -6146,6 +6146,9 @@ void clif_parse_WantToConnection(int fd, struct map_session_data *sd) account_id = RFIFOL(fd,2); } else return; // Not the auth packet + WFIFOL(fd,0) = account_id; + WFIFOSET(fd,4); + // if same account already connected, we disconnect the 2 sessions if ((old_sd = map_id2sd(account_id)) != NULL) { clif_authfail_fd(fd, 2); // same id @@ -6161,9 +6164,6 @@ void clif_parse_WantToConnection(int fd, struct map_session_data *sd) pc_setnewpc(sd, account_id, RFIFOL(fd,6), RFIFOL(fd,10), RFIFOL(fd,14), RFIFOB(fd,18), fd); - WFIFOL(fd,0) = sd->bl.id; - WFIFOSET(fd,4); - map_addiddb(&sd->bl); chrif_authreq(sd); |