Hey Sky how about the following?
BNLS_DECODECDKEY
C->S
(String) CDkey
S->C
(BOOLEAN) Warcraft3
(DWORD) Product
(DWORD) Val1
If Warcraft3 == True
(BYTE[10]) Val2
Else
(DWORD) Val2
Or something to that effect, that way we can use BNLS_HASHDATA to hash it however we need.
Well this comes in light of Not having a valid way of getting the proper values for SID_CDKEY2 through BNLS.
Considering W2BN still uses SID_CDKEY2 I figure there sould be a way of getting the proper data from BNLS.
Hell you could even add the flag CDKEY_WARCRAFT2_STYLE to BNLS_CDKEY_EX..... (This would be a easier method to implement, I suggest this moreover the new packet.)
~-~(HDX)~-~
If you're going to freaking knock it, suggest an alternate that IS NOT using a library.
Thats the entire point of this, I'm working on a project that is strictly meant to not use an outside library. And don't suggest leeching other's code either -.- because that is never a good option.
~-~(HDX)~-~
Use 0x50, if it ever stops working (lol) then maybe someone will care.
Quote from: Ersan on November 07, 2006, 11:22 PM
Use 0x50, if it ever stops working (lol) then maybe someone will care.
That is not an option. the real client does not use SID_AUTH* so neither should your bot. (You can support it, but you shouldn't make it the primary unless the client gets updated to use it as primary)
~-~(HDX)~-~
+1 for the good idea of an additional flag for BNLS_CDKEY_EX