Jump to content

Recommended Posts

Posted

I am interested to buy l2j stable interlude files+source for a pvp server.

I can give max money : 100 euro paypal!

 

No customs.

 

Pm me here ,

NOTE:ONLY SERIOUS MEMBER

Posted

100e for l2j pack in here is overpriced.

 

dude get over it really, you have to understand that a good l2j > l2off on many things

Posted

dude get over it really, you have to understand that a good l2j > l2off on many things

A good l2j > l2off on many things - xdem 2013

This quote will make history

Posted

A good l2j > l2off on many things - xdem 2013

This quote will make history

 

l2off c6 is an extended c4 crap of 2002 C code, it isn't even official since its modified, so its far different than real real l2off

Posted

dude get over it really, you have to understand that a good l2j > l2off on many things

Very true indeed but you realise that l2off is more stable/balanced and trustable.

But yes l2j has a huge advantage in relation to l2off due to the fact that you can customise and add almost anything you wish.

 

Posted

Very true indeed but you realise that l2off is more stable/balanced and trustable.

But yes l2j has a huge advantage in relation to l2off due to the fact that you can customise and add almost anything you wish.

 

 

Indeed, but still l2j becomes more and more stable over time

Posted

l2off c6 is an extended c4 crap of 2002 C code, it isn't even official since its modified, so its far different than real real l2off

 

This is factually wrong.

 

(that c4 leak is from 04).

 

 

The amount of feature changes from C4>C6 that need core changing are miniscule.

Most are added on - and condition based.

 

 

There are no real new skill effects in C6 that have a new custom formula for damage - all your pre-existing C4 skill effects are used for most.

And all power numbers in client has always corresponded to each "power" variable in the SkillEffects in skilldata.

 

There is still no L2J fork - that has correct damage formula's taken from the most used skill effects for damage.

There is no L2J fork with the formula for damage calculation taken directly from CWorld::Attack etc.

 

Ergo - all of l2j is unbalanced formulated wrong comparing to retail.

 

You cannot find 1 place in the C4>C6 changelogs that has changed a core formula - only small changes where skills have "toned down" meaning the skilleffect power var has been reduced.

 

Go create a retail dropsystem - where everything is grouped instead of 1 chance for each item.

 

Go create the spawn system proper - where each monster is not spawned in a FIXED position.

 

There's plenty of examples like this.

Some may matter more than others - and the end user might not care.

But to call it unfactually correct is down right retarded.

 

The longer you get away from the base - the more harder it gets to achieve 99% sure.

But when there's nothing that states core changes to how numbers are calculated - then it's not "-beep-ed old 2002" it's retail correct until otherwise stated.

 

Don't be a stupid troll - when you do not know anything about it.

And don't listen to other idiots that pretend they know either.

 

L2J is suffering from the same issue as L2Off - the smart people are leaving.

Guest
This topic is now closed to further replies.


  • Posts

    • I open the l2j server and see 1. XOR->NewCrypt.encXORPass(raw, offset, size, Rnd.nextInt()); ---> xor everything is clear 2. _staticCrypt.crypt(raw, offset, size); -----> private void encryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex) { int xl = bytesTo32bits(src, srcIndex); int xr = bytesTo32bits(src, srcIndex + 4); xl ^= P[0]; for (int i = 1; i < ROUNDS; i += 2) { xr ^= func(xl) ^ P[i]; xl ^= func(xr) ^ P[i + 1]; } xr ^= P[ROUNDS + 1]; bits32ToBytes(xr, dst, dstIndex); bits32ToBytes(xl, dst, dstIndex + 4); }   I scroll down the code and see this code   ----->>> /**      * Decrypt the given input starting at the given offset and place the result in the provided buffer starting at the given offset. The input will be an exact multiple of our blocksize.      * @param src      * @param srcIndex      * @param dst      * @param dstIndex      */     private void decryptBlock(byte[] src, int srcIndex, byte[] dst, int dstIndex)     {         int xl = bytesTo32bits(src, srcIndex);         int xr = bytesTo32bits(src, srcIndex + 4);         xl ^= P[ROUNDS + 1];         for (int i = ROUNDS; i > 0; i -= 2)         {             xr ^= func(xl) ^ P[i];             xl ^= func(xr) ^ P[i - 1];         }         xr ^= P[0];         bits32ToBytes(xr, dst, dstIndex);         bits32ToBytes(xl, dst, dstIndex + 4);     }   ===================================================   I'm transferring this code to C# private void decryptBlock(byte[] src, uint srcIndex, byte[] dst, uint dstIndex)    {        uint xl = BytesTo32bits(src, srcIndex);        uint xr = BytesTo32bits(src, srcIndex + 4);        xl ^= P[ROUNDS + 1];        for (int i = ROUNDS; i > 0; i -= 2)        {            xr ^= F(xl) ^ P[i];            xl ^= F(xr) ^ P[i - 1];        }        xr ^= P[0];        Bits32ToBytes(xr, dst, dstIndex);        Bits32ToBytes(xl, dst, dstIndex + 4);    }   And in c# I first do decryptBlock and then XOR and everything works, I get the package and the first 2 bytes have already been removed as far as I remember   This only works for the login server for the game server, I think it’s not much different  
    • Ask him what you know, and what I know hahaha.
    • https://prnt.sc/2G_hOHfUIGLM   not sure what you mean Teddy boi  
    • Hello first of all thank you for your prompt response and the time you are taking to read this and answer, I am aware that not everyone takes the time and for that I thank you. On the other hand the specific problem is when decrypting this package and being able to parse it,  In some places it says that it is only encrypted with xor, in others that only a static blowfish is used and in others that both are used in the order of xor and then blowfish, this is the problem in spite of being able to see the encryption mechanisms of the servers, I can not put together the function that reverses this encryption to obtain the keys sent by the init packet.   Thanks for your time, hopefully the rest can contribute something because it is a super useful module to extend any functionality to the client and I will publish it in an opensource way when it is finished.
  • Topics

×
×
  • Create New...