• Welcome to Valhalla Legends Archive.
 

Very unexpected issues with "The Clan Responding to Invitation" function

Started by Achilles(DE), October 16, 2005, 06:25 PM

Previous topic - Next topic

Achilles(DE)

This is once you already recieved the invitation and you need to accept or decline in 0x79

Private Sub Command1_Click()
Dim ThisName As String
Dim TheTag As String
ThisName = (Form8.Text2.text)
TheTag = Form8.Text1.text
PBuffer.InsertDWORD &H21
PBuffer.InsertNonNTString StrReverse(TheTag)
PBuffer.InsertNTString (ThisName)
PBuffer.InsertBYTE 6
PBuffer.SendPacket &H79
Unload Me
End Sub

It doesn't work...I've tried everything. Even the packet logger shows it works...or at least should

Heres the packet I saw sent out:

00000000 FF 79 18 00 02 00 00 00 44 45 51 41 63 68 69 6C
00000010 6C 65 73 4F 50 53 00 06

Even notice the 06 at the end..it shows that it was accepted...

LivedKrad

Quote from: Achilles(DE) on October 16, 2005, 06:25 PM
This is once you already recieved the invitation and you need to accept or decline in 0x79

Private Sub Command1_Click()
Dim ThisName As String
Dim TheTag As String
ThisName = (Form8.Text2.text)
TheTag = Form8.Text1.text
PBuffer.InsertDWORD &H21
PBuffer.InsertNonNTString StrReverse(TheTag)
PBuffer.InsertNTString (ThisName)
PBuffer.InsertBYTE 6
PBuffer.SendPacket &H79
Unload Me
End Sub

It doesn't work...I've tried everything. Even the packet logger shows it works...or at least should

Heres the packet I saw sent out:

00000000 FF 79 18 00 02 00 00 00 44 45 51 41 63 68 69 6C
00000010 6C 65 73 4F 50 53 00 06

Even notice the 06 at the end..it shows that it was accepted...

Why are you using a constant (0x21) as your Cookie value in the response? I think this cookie value is to identify the specific response to the clan invite that was sent to you. Try using the cookie received in packet 0x77 so Battle.net knows which invitation you're accepting or declining.

Note: I don't know if this is the problem, for I know nothing of Warcraft III. However, it seems logical to me given BnetDocs's accurate explanation of what a Cookie is.

rabbit

The first "DWORD" (don't be fooled, it's actually a WORD) after the header is definately not 0x21.
Grif: Yeah, and the people in the red states are mad because the people in the blue states are mean to them and want them to pay money for roads and schools instead of cool things like NASCAR and shotguns.  Also, there's something about ketchup in there.


UserLoser.

do you have an away message on?  iirc, nobody involved in this process can be marked as away.  also, do you get disconnected? any responses from server?

Achilles(DE)

No none of that. I think my problem is the first cookie. I dont know what to do with that..

UserLoser.

Quote from: Achilles(DE) on October 16, 2005, 10:36 PM
No none of that. I think my problem is the first cookie. I dont know what to do with that..

Cookie doesn't matter.  What matters: do you get disconnected? does the other person recieve anything? you you recieve anything?  We need to know these things

Achilles(DE)

No to getting disconnected, yes to recieving everything. I have a packet logger, everything matches up, even the description. I made my own form, it pops up when someone invites ( Invite on stealth ) then when I accept, it sends a packet back, but no change. The packet looks accurate, but I have never made this before so I can't tell.

LordNevar

PBuffer.InsertNTString (ThisName)

Are you sending your name back, or the name of the person that invited you?

A good fortune may forbode a bad luck, which may in turn disguise a good fortune.
The greatest trick the Devil ever pulled, was convincing the world he didn't exsist.


Topaz

Const CLAN_ACCEPT&          = &H06: according to Constants from BnetDocs

Try enveloping PBuffer.InsertBYTE 6 with PBuffer.InsertBYTE &H6, might help.

l2k-Shadow

Quote from: Topaz on October 17, 2005, 11:04 PM
Const CLAN_ACCEPT&          = &H06: according to Constants from BnetDocs

Try enveloping PBuffer.InsertBYTE 6 with PBuffer.InsertBYTE &H6, might help.

Integer 6 in decimal and 0x06 in hexadecimal have the same value.. therefore that will make no difference.

Try using the same value that was sent to you in the S->C of this packet for the cookie. Also for the Tag, it is not a VOID, it is a DWORD (on 16-bit systems) so therefore it must always be 4 bytes long.

Try something like

     InsertDWORD GetDWORD(Mid$(Data, 5, 4))
     While Len(Tag) < 4
           Tag = Tag & vbNullChar
     Wend
     InsertVOID StrReverse(Tag)
     InsertSTRING ThisName
     InsertBYTE 6
     SendPacket &H79


Now if you wanted to be REALLY simple, you can just do this


    InsertVOID Mid$(Data, 5, 8)
    InsertSTRING ThisName
    InsertBYTE 6
    SendPacket &H79
Quote from: replaced on November 04, 2006, 11:54 AM
I dunno wat it means, someone tell me whats ix86 and pmac?
Can someone send me a working bot source (with bnls support) to my email?  Then help me copy and paste it to my bot? ;D
Já jsem byl určenej abych tady žil,
Dával si ovar, křen a k tomu pivo pil.
Tam by ses povídaj jak prase v žitě měl,
Já nechci před nikym sednout si na prdel.

Já nejsem z USA, já nejsem z USA, já vážně nejsem z USA... a snad se proto na mě nezloběj.