im having problem with getting wrong packets and everyone told me it's because wrong packets splitting but it doesn't make sense for me because
at the above packets , im splitting whenever i find the tq server/client seal , it did split at the seal and on the next packet length is x2100 aka 8448d
which to why it doesn't split on the next tqserver seal x7265767265535154
so even if i removed the length check which should not split until the length complete it will be like
which still wrong packet , length is still 8448 and type still 17959 which will still disconnect me
so should i just split on the seal no matter the length and block server -> client packets which got higher length than normal or unknown types ? will that stop disconnecting me ?
Edit :
at the end of the previous long packet
it does split on that length also on the seal and the next packet only contain the seal
so assume ill merge the end of that long packet and next packet that only contain the seals
so in both case if i split on the length or even seal ill get the same result on the packet that only contain the seal which disconnect me , even when i block it from reaching the client , it still disconnect me
Code:
Packet Nr 8319. Server -> Client, Length : 92, PacketType: 1008
54 00 F0 03 46 BB 77 02 F3 4A 02 00 BB 11 F7 11 ;T ðF»wóJ »÷
03 00 06 00 00 00 00 00 0D 0D 00 00 00 00 00 00 ;
00 05 00 00 00 00 00 00 00 00 00 00 00 00 01 00 ;
09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ;
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ;
00 00 00 00 54 51 53 65 72 76 65 72 ; TQServer
Packet Nr 8320. Server -> Client, Length : 8456, PacketType: 17959
00 21 27 46 00 10 00 01 00 00 00 05 00 00 00 51 ; !'F Q
6A D2 6E 04 00 00 00 00 00 00 00 00 00 00 00 00 ;jÒn
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ;
00 00 00 54 51 53 65 72 76 65 72 34 00 21 27 46 ; TQServer4 !'F
00 10 00 01 00 00 00 05 00 00 00 9F 33 44 70 04 ; Ÿ3Dp
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
which to why it doesn't split on the next tqserver seal x7265767265535154
so even if i removed the length check which should not split until the length complete it will be like
Code:
Packet Nr 8320. Server -> Client, Length : 8456, PacketType: 17959 00 21 27 46 00 10 00 01 00 00 00 05 00 00 00 51 ; !'F Q 6A D2 6E 04 00 00 00 00 00 00 00 00 00 00 00 00 ;jÒn 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ; 00 00 00 54 51 53 65 72 76 65 72
so should i just split on the seal no matter the length and block server -> client packets which got higher length than normal or unknown types ? will that stop disconnecting me ?
Edit :
at the end of the previous long packet
Code:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ; 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ; 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ; 54 51 53 65 72 76 65 72 ;TQServer Packet Nr 8321. Server -> Client, Length : 8, PacketType: 25939 54 51 53 65 72 76 65 72 ;TQServer Packet Nr 8322. Server -> Client, Length : 8, PacketType: 25939 54 51 53 65 72 76 65 72 ;TQServer Packet Nr 8323. Server -> Client, Length : 8, PacketType: 25939 54 51 53 65 72 76 65 72
so assume ill merge the end of that long packet and next packet that only contain the seals
Code:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 54 51 53 65 72 76 65 72 54 51 53 65 72 76 65 72 54 51 53 65 72 76 65 72