Originally Posted by
OsQu
Wow, I didn't even know that. But I think it would be MUCH more easier to capture packtes with blackd proxy
Here's the description of the XTEA function included in packet.dll (copied from the readme)
(There's some examples showing how to use it too in the zip)
Code:
XTEA:
DWORD XTEA(
BOOL Encrypt,
DWORD ProcessID,
POINTER Key,
POINTER Packet,
POINTER XTEApacket,
BOOL SafeArray,
);
Parameters:
Encrypt
Set to TRUE if the packet is gonna be encrypted, and set to FALSE if the packet is gonne be decrypted.
ProcessID
The process ID of the tibia client that contains the key to be used, set to 0 if the Key parameter is gonna be used.
Key
Pointer to the key that is gonn abe used, need ProcessID to be 0.
(In visual basic, this cant be 0 since there is no thing as a null pointer in vb, to go around this just set this as the same as Packet).
Packet
Pointer to the packet that is gonna be encrypted/decrypted.
XTEApacket
Pointer to the resulting encrypted/decrypted packet.
SafeArray
Set to TRUE if the programming language uses the safe array structure, visual basic for example uses this.
Return value:
Returns the length of the new packet.
It's pretty simple to use
I'd prolly use it if I hadn't already made my own code for encrypting/decrypting packets