* Updated Pseuwow to 3.3.5a (first part)(patch by BThallid)

* Updated Irrklang to recent Version
This commit is contained in:
shlainn 2010-08-12 18:38:51 +02:00 committed by Shlainn
parent 1ebb1f009b
commit 87b5a5f765
6 changed files with 8 additions and 9 deletions

View File

@ -60,7 +60,7 @@ realmport=3724
// PseuWoW will login on this realm // PseuWoW will login on this realm
// Case sensitive! // Case sensitive!
realmname=My WoW Realm realmname=MaNGOS
// your account name // your account name
accname=test accname=test
@ -74,9 +74,9 @@ charname=Pseuwow
// Client emulation configuration // Client emulation configuration
ClientVersion=3.1.3 ClientVersion=3.3.5
ClientBuild=9947 ClientBuild=12340
ClientLanguage=enUS ClientLanguage=enGB
// or change to enGB, deDE, ... // or change to enGB, deDE, ...

Binary file not shown.

Binary file not shown.

View File

@ -68,7 +68,6 @@ AC_CONFIG_FILES([Makefile
src/Makefile src/Makefile
src/dep/Makefile src/dep/Makefile
src/dep/src/Makefile src/dep/src/Makefile
src/dep/src/irrKlang/Makefile
src/dep/src/zlib/Makefile src/dep/src/zlib/Makefile
src/dep/src/zthread/Makefile src/dep/src/zthread/Makefile
src/tools/Makefile src/tools/Makefile

View File

@ -530,7 +530,7 @@ void WorldSession::_HandleAuthChallengeOpcode(WorldPacket& recvPacket)
Sha1Hash digest; Sha1Hash digest;
digest.UpdateData(acc); digest.UpdateData(acc);
uint32 unk=0; uint32 unk=0;
uint64 unk4=0; uint64 unk64=0;
digest.UpdateData((uint8*)&unk,sizeof(uint32)); digest.UpdateData((uint8*)&unk,sizeof(uint32));
BigNumber clientseed; BigNumber clientseed;
clientseed.SetRand(8*4); clientseed.SetRand(8*4);
@ -540,7 +540,7 @@ void WorldSession::_HandleAuthChallengeOpcode(WorldPacket& recvPacket)
digest.UpdateBigNumbers(GetInstance()->GetSessionKey(),NULL); digest.UpdateBigNumbers(GetInstance()->GetSessionKey(),NULL);
digest.Finalize(); digest.Finalize();
WorldPacket auth; WorldPacket auth;
auth<<(uint32)(GetInstance()->GetConf()->clientbuild)<<unk<<acc<<unk<<clientseed_uint32<<unk4; auth<<(uint32)(GetInstance()->GetConf()->clientbuild)<<unk<<acc<<unk<<clientseed_uint32<<unk<<unk<<unk<<unk64;
auth.append(digest.GetDigest(),20); auth.append(digest.GetDigest(),20);
auth << (uint32)0; // TODO: this is not correct value, expected: 160 bytes of addon_data auth << (uint32)0; // TODO: this is not correct value, expected: 160 bytes of addon_data

View File

@ -32,11 +32,11 @@ AuthCrypt::~AuthCrypt()
void AuthCrypt::Init(BigNumber *K) void AuthCrypt::Init(BigNumber *K)
{ {
uint8 ClientDecryptionKey[SEED_KEY_SIZE] = { 0x22, 0xBE, 0xE5, 0xCF, 0xBB, 0x07, 0x64, 0xD9, 0x00, 0x45, 0x1B, 0xD0, 0x24, 0xB8, 0xD5, 0x45 }; uint8 ClientDecryptionKey[SEED_KEY_SIZE] = { 0xCC, 0x98, 0xAE, 0x04, 0xE8, 0x97, 0xEA, 0xCA, 0x12, 0xDD, 0xC0, 0x93, 0x42, 0x91, 0x53, 0x57 };
HmacHash serverEncryptHmac(SEED_KEY_SIZE, (uint8*)ClientDecryptionKey); HmacHash serverEncryptHmac(SEED_KEY_SIZE, (uint8*)ClientDecryptionKey);
uint8 *decryptHash = serverEncryptHmac.ComputeHash(K); uint8 *decryptHash = serverEncryptHmac.ComputeHash(K);
uint8 ServerEncryptionKey[SEED_KEY_SIZE] = { 0xF4, 0x66, 0x31, 0x59, 0xFC, 0x83, 0x6E, 0x31, 0x31, 0x02, 0x51, 0xD5, 0x44, 0x31, 0x67, 0x98 }; uint8 ServerEncryptionKey[SEED_KEY_SIZE] = { 0xC2, 0xB3, 0x72, 0x3C, 0xC6, 0xAE, 0xD9, 0xB5, 0x34, 0x3C, 0x53, 0xEE, 0x2F, 0x43, 0x67, 0xCE };
HmacHash clientDecryptHmac(SEED_KEY_SIZE, (uint8*)ServerEncryptionKey); HmacHash clientDecryptHmac(SEED_KEY_SIZE, (uint8*)ServerEncryptionKey);
uint8 *encryptHash = clientDecryptHmac.ComputeHash(K); uint8 *encryptHash = clientDecryptHmac.ComputeHash(K);