From 533ff4f5ea21695edf89cd94ef06eb89f5a5aa7d Mon Sep 17 00:00:00 2001 From: shennetsind Date: Wed, 15 Jan 2014 16:28:10 -0200 Subject: Fixed Bug 7952 Game client is sending it twice, causing authfail to trigger it. I'm dropping the disconnect, given 1) its pretty hard scenario to be faked thanks to the wpe-free update and 2) its such a silly action (hatching an egg) and a countermeasure is already present. http://hercules.ws/board/tracker/issue-7952-pet-hatch-error-2013-12-23-ragexe/ Thanks to ossi0110, Tepoo, themon. Signed-off-by: shennetsind --- src/map/clif.c | 2 -- 1 file changed, 2 deletions(-) (limited to 'src') diff --git a/src/map/clif.c b/src/map/clif.c index 77d4d20d8..5c2201baf 100644 --- a/src/map/clif.c +++ b/src/map/clif.c @@ -13347,8 +13347,6 @@ void clif_parse_CatchPet(int fd, struct map_session_data *sd) void clif_parse_SelectEgg(int fd, struct map_session_data *sd) { if (sd->menuskill_id != SA_TAMINGMONSTER || sd->menuskill_val != -1) { - //Forged packet, disconnect them [Kevin] - clif->authfail_fd(fd, 0); return; } pet->select_egg(sd,RFIFOW(fd,2)-2); -- cgit v1.2.3-60-g2f50