Author | Message | Time |
---|---|---|
Win32 | I've got most packets now covered (C->S) except for a few, which maybe someone has some further information on: [quote] Unknown packets: 0x60 0x58 0x54 0x3D 0x38 0xA3 0x5D 0x38 0x4D ID: 0x3A Length: 3 bytes? ------------------ Notes: Always contains 0x01 0x00 ID: 0x3D Length: 5 bytes? ------------------ ID: 0x5D Length: 7 bytes? ------------------ Seen contents: 0x04 0x01 0x0A 0x00 0x00 0x00 ID: 0x38 Length: 1 byte? ------------------ Blank packet. ID: 0x4D Length: 3 bytes? ------------------ Seen Contents: 0x94 0x00 [/quote] Just a quick compilation of the packets I cannot find any information on. One thing I can clarify, the packets flagged with "Does not appear in 1.11b" do actually appear. Such as repeat right-skill @ location. | July 4, 2007, 4:12 AM |
ShadowDancer | procedure process_0x5D(); begin { 1(BYTE) quest id 1(BYTE) flags (0x20 = notify) 1(BYTE) quest state 2(WORD) param, ie: monsters left in the cave of evil } i:=1; readbyte(cbuf,bytestack[0],i); readbyte(cbuf,bytestack[1],i); readbyte(cbuf,bytestack[2],i); bots[vlink].quest_states[bytestack[0]]:=bytestack[2]; debugmsg(1,'Quest '+inttostr(bytestack[0])+' '+inttostr(bytestack[2]),memo1); d2g_sendpacket_0x40(bots[vlink].connections[2]); end; | August 3, 2007, 9:49 AM |
UserLoser | [quote author=ShadowDancer link=topic=16844.msg171368#msg171368 date=1186134583] procedure process_0x5D(); begin { 1(BYTE) quest id 1(BYTE) flags (0x20 = notify) 1(BYTE) quest state 2(WORD) param, ie: monsters left in the cave of evil } i:=1; readbyte(cbuf,bytestack[0],i); readbyte(cbuf,bytestack[1],i); readbyte(cbuf,bytestack[2],i); bots[vlink].quest_states[bytestack[0]]:=bytestack[2]; debugmsg(1,'Quest '+inttostr(bytestack[0])+' '+inttostr(bytestack[2]),memo1); d2g_sendpacket_0x40(bots[vlink].connections[2]); end; [/quote] ???? | August 3, 2007, 10:27 PM |
Barabajagal | meaning: packet 5D: BYTE Quest ID BYTE Flags BYTE Quest State WORD Param WORD Param (or are these a DWORD?) somethin like that. | August 4, 2007, 2:53 AM |