ok couple super simple packets that I'm fairly sure were already logged before... I don't remember seeing them but I'm confident they must be somewhere
Password seed packet: Sent Server>Client when it connects to login server
| Offset | Type | Value |
|---|
| 0 | ushort | 8 |
| 2 | ushort | 1059 |
| 4 | uint | Value |
Value should just be a random password seed value. Save the number to the char so that you can interpret the password when it's sent.
And Sadly I don't have all the values logged for it yet but maybe someone can fill in the blanks for me..
5290+ auth packet: I have enough values so that it can be interpreted nicely for proxies but sadly not enough info to properly write a custom packet...
Server>Client sent once login details are confirmed. length 52 for valid login, 32 for invalid.
| Offset | Type | Value |
|---|
| 0 | ushort | 52 |
| 2 | ushort | 1055 |
| 4 | uint | CharUID |
| 8 | uint | Key |
| 12 | uint | Port |
| 16 | ushort | Junk |
| 18 | ushort | Junk 2 (or combined) |
| 20 | string | IpAddress |
Junk and junk 2 I'm not sure what they do... They are unique to your character though.
Char UID, Junk and Junk 2 remain constant with the same character but if you log a diff char they change. Not sure what the value is referring too though. I separated them into 2 ushorts rather than a uint to see if they made more sense that way but they are still rather strange.
<edit> works to make functional 5290+ login server even w/ the unknown junk values. Fixed the typo. Length for valid is 52 not 55. Thanks for pointing it out
Not sure how useful those will be to ppl but seeing as I logged them lastnight figured I'd share. If anyone needs some packet structures for current tq patch I could whip up a few. I think most of them are still fairly similar to 5200 though.