CMD AUTH RECONNECT CHALLENGE Server

From wowdev
Revision as of 18:54, 16 August 2021 by Deadbeef (talk | contribs) (Add example packets)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

CMD_AUTH_RECONNECT_CHALLENGE_Server is a Login Packet sent by the server after receiving a CMD_AUTH_RECONNECT_CHALLENGE_Client. It is followed by a CMD_AUTH_RECONNECT_PROOF_Client from the client.


Packet Layout

AuthReconnectionChallenge_Server
Offset Size / Endianness Type Name Description
Header
0x0 1 / - uint8 command 0x02 for CMD_AUTH_RECONNECT_CHALLENGE
0x1 1 / - uint8 result The fields below are only included if this is SUCCESS (0x0).
Body
0x2 16 / Little char[16] challenge_data Random data, used as challenge data.
0x12 16 / - char[16] checksum_salt No longer used by client after 1.12. Can be all zeros.

Size

For all versions, if the result is not SUCCESS (0x00) the packet is 2 bytes. If the result is SUCCESS the packet is 34 bytes.

Example Packet

Below is complete packet sent from a Vanilla (1.12.1.5875) client. The values are explained as comments. This can be used for verifying packet parser implementations.

char bytes[] =
0x02, // Opcode: CMD_AUTH_RECONNECT_CHALLENGE
0x00, // result: SUCCESS
0xa9, 0x14, 0x99, 0x52, 0xa5, 0x32, 0x31, 0x5d, 0x27, 0x7a, 0x00, 0xe8, 0x5a,
0xda, 0xbb, 0x75, // Challenge data
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
0x00, 0x00, 0x00, 0x00, 0x00, // Checksum data (unused for 1.12)
};