* Updated Pseuwow to 3.3.5a (first part)(patch by BThallid)
* Updated Irrklang to recent Version
This commit is contained in:
parent
1ebb1f009b
commit
87b5a5f765
@ -60,7 +60,7 @@ realmport=3724
|
||||
|
||||
// PseuWoW will login on this realm
|
||||
// Case sensitive!
|
||||
realmname=My WoW Realm
|
||||
realmname=MaNGOS
|
||||
|
||||
// your account name
|
||||
accname=test
|
||||
@ -74,9 +74,9 @@ charname=Pseuwow
|
||||
|
||||
|
||||
// Client emulation configuration
|
||||
ClientVersion=3.1.3
|
||||
ClientBuild=9947
|
||||
ClientLanguage=enUS
|
||||
ClientVersion=3.3.5
|
||||
ClientBuild=12340
|
||||
ClientLanguage=enGB
|
||||
// or change to enGB, deDE, ...
|
||||
|
||||
|
||||
|
||||
BIN
bin/ikpMP3.so
BIN
bin/ikpMP3.so
Binary file not shown.
Binary file not shown.
@ -68,7 +68,6 @@ AC_CONFIG_FILES([Makefile
|
||||
src/Makefile
|
||||
src/dep/Makefile
|
||||
src/dep/src/Makefile
|
||||
src/dep/src/irrKlang/Makefile
|
||||
src/dep/src/zlib/Makefile
|
||||
src/dep/src/zthread/Makefile
|
||||
src/tools/Makefile
|
||||
|
||||
@ -530,7 +530,7 @@ void WorldSession::_HandleAuthChallengeOpcode(WorldPacket& recvPacket)
|
||||
Sha1Hash digest;
|
||||
digest.UpdateData(acc);
|
||||
uint32 unk=0;
|
||||
uint64 unk4=0;
|
||||
uint64 unk64=0;
|
||||
digest.UpdateData((uint8*)&unk,sizeof(uint32));
|
||||
BigNumber clientseed;
|
||||
clientseed.SetRand(8*4);
|
||||
@ -540,7 +540,7 @@ void WorldSession::_HandleAuthChallengeOpcode(WorldPacket& recvPacket)
|
||||
digest.UpdateBigNumbers(GetInstance()->GetSessionKey(),NULL);
|
||||
digest.Finalize();
|
||||
WorldPacket auth;
|
||||
auth<<(uint32)(GetInstance()->GetConf()->clientbuild)<<unk<<acc<<unk<<clientseed_uint32<<unk4;
|
||||
auth<<(uint32)(GetInstance()->GetConf()->clientbuild)<<unk<<acc<<unk<<clientseed_uint32<<unk<<unk<<unk<<unk64;
|
||||
auth.append(digest.GetDigest(),20);
|
||||
auth << (uint32)0; // TODO: this is not correct value, expected: 160 bytes of addon_data
|
||||
|
||||
|
||||
@ -32,11 +32,11 @@ AuthCrypt::~AuthCrypt()
|
||||
|
||||
void AuthCrypt::Init(BigNumber *K)
|
||||
{
|
||||
uint8 ClientDecryptionKey[SEED_KEY_SIZE] = { 0x22, 0xBE, 0xE5, 0xCF, 0xBB, 0x07, 0x64, 0xD9, 0x00, 0x45, 0x1B, 0xD0, 0x24, 0xB8, 0xD5, 0x45 };
|
||||
uint8 ClientDecryptionKey[SEED_KEY_SIZE] = { 0xCC, 0x98, 0xAE, 0x04, 0xE8, 0x97, 0xEA, 0xCA, 0x12, 0xDD, 0xC0, 0x93, 0x42, 0x91, 0x53, 0x57 };
|
||||
HmacHash serverEncryptHmac(SEED_KEY_SIZE, (uint8*)ClientDecryptionKey);
|
||||
uint8 *decryptHash = serverEncryptHmac.ComputeHash(K);
|
||||
|
||||
uint8 ServerEncryptionKey[SEED_KEY_SIZE] = { 0xF4, 0x66, 0x31, 0x59, 0xFC, 0x83, 0x6E, 0x31, 0x31, 0x02, 0x51, 0xD5, 0x44, 0x31, 0x67, 0x98 };
|
||||
uint8 ServerEncryptionKey[SEED_KEY_SIZE] = { 0xC2, 0xB3, 0x72, 0x3C, 0xC6, 0xAE, 0xD9, 0xB5, 0x34, 0x3C, 0x53, 0xEE, 0x2F, 0x43, 0x67, 0xCE };
|
||||
HmacHash clientDecryptHmac(SEED_KEY_SIZE, (uint8*)ServerEncryptionKey);
|
||||
uint8 *encryptHash = clientDecryptHmac.ComputeHash(K);
|
||||
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user