ChillerDragon
5e02155230
Not acking resent packets did the trick
2022-10-31 08:22:21 +01:00
ChillerDragon
9903508d0b
Ah no nvm it seems to work
...
I managed to stay on a default config vanilla server
until inactive kick
2022-10-30 20:07:08 +01:00
ChillerDragon
e3bda9a3e6
Still timeouts but looks good in wireshark
2022-10-30 19:58:51 +01:00
ChillerDragon
97a44b183f
Still wrong ack but getting a tee in the world again
2022-10-30 19:44:49 +01:00
ChillerDragon
292bbf5fe0
Fixes in the header not sure if it works tho
2022-10-30 19:19:10 +01:00
ChillerDragon
b7a2cfb5c3
Start working on proper packet header
2022-10-30 19:00:13 +01:00
ChillerDragon
f75eaebcee
Print info packet when sending it
2022-10-30 11:18:15 +01:00
ChillerDragon
1ef6abf377
A bit of cleanup
2022-10-30 10:13:18 +01:00
ChillerDragon
8352033d0b
TODO: ack in packet header
2022-10-29 17:04:35 +02:00
ChillerDragon
4544bb3e1a
Reach old connection state with less hacks
2022-10-29 16:18:07 +02:00
ChillerDragon
d68be4eb68
More todos than progress
2022-10-29 13:17:42 +02:00
ChillerDragon
f0762eee9d
I do not understand the connless flags
...
But the control flag seems to be working
So parse packets with the control flag in the header as
control message
and all other messages as connection messsages
aka CClient::ProcessServerPacket()
2022-10-29 12:16:44 +02:00
ChillerDragon
f48968a349
Refactor to check flags and use packet class
...
Break everything in the process
2022-10-29 12:09:10 +02:00
ChillerDragon
694cb4b448
Decompress packet payload
2022-10-25 20:17:07 +02:00
ChillerDragon
6bac18830d
Start working on the client code
2022-10-25 19:42:20 +02:00
Chiller Dragon
81b8366792
Initial commit
2022-10-25 14:07:56 +02:00