diff options
author | shennetsind <ind@henn.et> | 2014-01-15 16:28:10 -0200 |
---|---|---|
committer | shennetsind <ind@henn.et> | 2014-01-15 16:28:10 -0200 |
commit | 533ff4f5ea21695edf89cd94ef06eb89f5a5aa7d (patch) | |
tree | bbd7e2a97eab682b022e8323fb88f462d02ae215 | |
parent | 18291e8b8834d74e5775baeb296104cfaebe9e54 (diff) | |
download | hercules-533ff4f5ea21695edf89cd94ef06eb89f5a5aa7d.tar.gz hercules-533ff4f5ea21695edf89cd94ef06eb89f5a5aa7d.tar.bz2 hercules-533ff4f5ea21695edf89cd94ef06eb89f5a5aa7d.tar.xz hercules-533ff4f5ea21695edf89cd94ef06eb89f5a5aa7d.zip |
Fixed Bug 7952
Game client is sending it twice, causing authfail to trigger it. I'm dropping the disconnect, given 1) its pretty hard scenario to be faked thanks to the wpe-free update and 2) its such a silly action (hatching an egg) and a countermeasure is already present.
http://hercules.ws/board/tracker/issue-7952-pet-hatch-error-2013-12-23-ragexe/
Thanks to ossi0110, Tepoo, themon.
Signed-off-by: shennetsind <ind@henn.et>
-rw-r--r-- | src/map/clif.c | 2 |
1 files changed, 0 insertions, 2 deletions
diff --git a/src/map/clif.c b/src/map/clif.c index 77d4d20d8..5c2201baf 100644 --- a/src/map/clif.c +++ b/src/map/clif.c @@ -13347,8 +13347,6 @@ void clif_parse_CatchPet(int fd, struct map_session_data *sd) void clif_parse_SelectEgg(int fd, struct map_session_data *sd) { if (sd->menuskill_id != SA_TAMINGMONSTER || sd->menuskill_val != -1) { - //Forged packet, disconnect them [Kevin] - clif->authfail_fd(fd, 0); return; } pet->select_egg(sd,RFIFOW(fd,2)-2); |