summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorshennetsind <ind@henn.et>2014-01-15 16:28:10 -0200
committershennetsind <ind@henn.et>2014-01-15 16:28:10 -0200
commit533ff4f5ea21695edf89cd94ef06eb89f5a5aa7d (patch)
treebbd7e2a97eab682b022e8323fb88f462d02ae215 /src
parent18291e8b8834d74e5775baeb296104cfaebe9e54 (diff)
downloadhercules-533ff4f5ea21695edf89cd94ef06eb89f5a5aa7d.tar.gz
hercules-533ff4f5ea21695edf89cd94ef06eb89f5a5aa7d.tar.bz2
hercules-533ff4f5ea21695edf89cd94ef06eb89f5a5aa7d.tar.xz
hercules-533ff4f5ea21695edf89cd94ef06eb89f5a5aa7d.zip
Fixed Bug 7952
Game client is sending it twice, causing authfail to trigger it. I'm dropping the disconnect, given 1) its pretty hard scenario to be faked thanks to the wpe-free update and 2) its such a silly action (hatching an egg) and a countermeasure is already present. http://hercules.ws/board/tracker/issue-7952-pet-hatch-error-2013-12-23-ragexe/ Thanks to ossi0110, Tepoo, themon. Signed-off-by: shennetsind <ind@henn.et>
Diffstat (limited to 'src')
-rw-r--r--src/map/clif.c2
1 files changed, 0 insertions, 2 deletions
diff --git a/src/map/clif.c b/src/map/clif.c
index 77d4d20d8..5c2201baf 100644
--- a/src/map/clif.c
+++ b/src/map/clif.c
@@ -13347,8 +13347,6 @@ void clif_parse_CatchPet(int fd, struct map_session_data *sd)
void clif_parse_SelectEgg(int fd, struct map_session_data *sd)
{
if (sd->menuskill_id != SA_TAMINGMONSTER || sd->menuskill_val != -1) {
- //Forged packet, disconnect them [Kevin]
- clif->authfail_fd(fd, 0);
return;
}
pet->select_egg(sd,RFIFOW(fd,2)-2);