CMD AUTH RECONNECT CHALLENGE Server: Difference between revisions

From wowdev
Jump to navigation Jump to search
(Created page with " = Packet Layout = {| class="wikitable" |+ AuthReconnectionChallenge_Server ! Offset ! Size / Endianness ! Type ! Name ! Description |- !colspan="5"| Header |- | 0x0 || 1 / -...")
 
(Add example packets)
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
[[CMD_AUTH_RECONNECT_CHALLENGE_Server]] is a [[Login Packet]] sent by the server after receiving a [[CMD_AUTH_RECONNECT_CHALLENGE_Client]]. It is followed by a [[CMD_AUTH_RECONNECT_PROOF_Client]] from the client.


= Packet Layout =
= Packet Layout =
Line 12: Line 14:
!colspan="5"| Header
!colspan="5"| Header
|-
|-
| 0x0 || 1 / - || uint8 || command || RECON_CHALL (0x2)
| 0x0 || 1 / - || uint8 || command || 0x02 for [[CMD_AUTH_RECONNECT_CHALLENGE]]
|-
|-
| 0x1 || 1 / - || uint8 || error || The fields below are only included if this is SUCCESS (0x0).
| 0x1 || 1 / - || uint8 || result || The fields below are only included if this is SUCCESS (0x0).
|-
|-
!colspan="5"| Body
!colspan="5"| Body
Line 22: Line 24:
| 0x12 || 16 / - || char[16] || checksum_salt || No longer used by client after 1.12. Can be all zeros.
| 0x12 || 16 / - || char[16] || checksum_salt || No longer used by client after 1.12. Can be all zeros.
|}
|}
= Size =
For all versions, if the result is not [[Login_Packet_Results|SUCCESS]] (0x00) the packet is 2 bytes. If the result is SUCCESS the packet is 34 bytes.
= Example Packet =
Below is complete packet sent from a {{Template:Sandbox/PrettyVersion|expansionlevel=1|build=1.12.1.5875}} client. The values are explained as comments. This can be used for verifying packet parser implementations.
char bytes[] =
0x02, // Opcode: CMD_AUTH_RECONNECT_CHALLENGE
0x00, // result: SUCCESS
0xa9, 0x14, 0x99, 0x52, 0xa5, 0x32, 0x31, 0x5d, 0x27, 0x7a, 0x00, 0xe8, 0x5a,
0xda, 0xbb, 0x75, // Challenge data
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, // Checksum data (unused for 1.12)
};
{{Login Packet Categories}}

Latest revision as of 18:54, 16 August 2021

CMD_AUTH_RECONNECT_CHALLENGE_Server is a Login Packet sent by the server after receiving a CMD_AUTH_RECONNECT_CHALLENGE_Client. It is followed by a CMD_AUTH_RECONNECT_PROOF_Client from the client.


Packet Layout

AuthReconnectionChallenge_Server
Offset Size / Endianness Type Name Description
Header
0x0 1 / - uint8 command 0x02 for CMD_AUTH_RECONNECT_CHALLENGE
0x1 1 / - uint8 result The fields below are only included if this is SUCCESS (0x0).
Body
0x2 16 / Little char[16] challenge_data Random data, used as challenge data.
0x12 16 / - char[16] checksum_salt No longer used by client after 1.12. Can be all zeros.

Size

For all versions, if the result is not SUCCESS (0x00) the packet is 2 bytes. If the result is SUCCESS the packet is 34 bytes.

Example Packet

Below is complete packet sent from a Vanilla (1.12.1.5875) client. The values are explained as comments. This can be used for verifying packet parser implementations.

char bytes[] =
0x02, // Opcode: CMD_AUTH_RECONNECT_CHALLENGE
0x00, // result: SUCCESS
0xa9, 0x14, 0x99, 0x52, 0xa5, 0x32, 0x31, 0x5d, 0x27, 0x7a, 0x00, 0xe8, 0x5a,
0xda, 0xbb, 0x75, // Challenge data
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, // Checksum data (unused for 1.12)
};