Ya, its me again. I just want to let you guys know I sent 0x51 without posting!
Now, the issue:
I keep getting disconnected after sending 0x29.
Here is the battle.net packet log:
Send data (1 bytes).
<00000000< 01 .
Send data (58 bytes).
<00000001< FF 50 3A 00 00 00 00 00 36 38 58 49 52 41 54 53 .P:.....68XIRATS
<00000011< CD 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
<00000021< 00 00 00 00 00 00 00 00 55 53 41 00 55 6E 69 74 ........USA.Unit
<00000031< 65 64 20 53 74 61 74 65 73 00 ed States.
Receive data (8 bytes).
>00000000> FF 25 08 00 89 68 DA 91 .%...h..
Receive data (100 bytes).
>00000008> FF 50 64 00 00 00 00 00 EC ED 88 4C 6F C5 16 00 .Pd........Lo...
>00000018> 00 AC 41 43 25 0B C5 01 49 58 38 36 76 65 72 35 ..AC%...IX86ver5
>00000028> 2E 6D 70 71 00 41 3D 31 30 30 36 36 30 33 35 35 .mpq.A=100660355
>00000038> 31 20 42 3D 35 30 32 30 31 33 30 37 39 20 43 3D 1 B=502013079 C=
>00000048> 32 30 39 31 37 35 39 32 36 20 34 20 41 3D 41 5E 209175926 4 A=A^
>00000058> 53 20 42 3D 42 5E 43 20 43 3D 43 2B 41 20 41 3D S B=B^C C=C+A A=
>00000068> 41 2D 42 00 A-B.
Send data (104 bytes).
<0000003B< FF 51 68 00 83 00 00 00 B4 01 01 03 73 77 35 A0 .Qh.........sw5.
<0000004B< 01 00 00 00 00 00 00 00 B3 88 3E 0D 00 00 01 00 ..........>.....
<0000005B< 00 75 38 90 00 00 00 00 38 9B 9A 5B 68 A9 04 3C .u8.....8..[h..<
<0000006B< 30 1D 3D 2B 45 0D 34 2E EF A4 A0 74 61 72 63 72 0.=+E.4....tarcr
<0000007B< 61 66 74 2E 65 78 65 20 30 38 2F 30 37 2F 30 35 aft.exe 08/07/05
<0000008B< 20 31 32 3A 30 36 3A 34 32 20 31 30 39 33 36 33 12:06:42 109363
<0000009B< 32 00 4C 75 78 65 72 00 2.Luxer.
Receive data (9 bytes).
>0000006C> FF 51 09 00 01 01 00 00 00 .Q.......
Send data (46 bytes).
<000000A3< FF 29 2E 00 83 00 00 00 EC ED 88 4C 98 1C 3A 2F .).........L..:/
<000000B3< 87 FC 85 4B AA A8 51 F0 A8 BE 19 9A 2E F9 53 19 ...K..Q.......S.
<000000C3< 41 62 73 6F 6C 75 74 65 2E 5A 65 72 6F 00 Absolute.Zero.
Receive orderly release indication (T_ORDREL_IND = 132).
Send orderly release request (T_ORDREL_REQ = 109).
Send unbind request (T_UNBIND_REQ = 110).
As you can see, the its not the client key or the server key.. Both match up to when they where first sent/received... There are 7 DWORDs (the correct number) and a string...
The BnetDocs page:
(DWORD) Client Token
(DWORD) Server Token
(DWORD[5]) Password Hash
(STRING) Username
Incase it matters (which I doubt) here is the packet log from JBLS (Just that password hash):
Send data (29 bytes).
<00000066< 1D 00 0B 0A 00 00 00 04 00 00 00 ** ** ** ** ** ...........*****
<00000076< 68 75 31 35 34 83 00 00 ** ** ** ** ** *****.......L
Receive data (27 bytes).
>00000114> 1B 00 0B 98 1C 3A 2F 87 FC 85 4B AA A8 51 F0 A8 .....:/...K..Q..
>00000124> BE 19 9A 2E F9 53 19 83 00 00 00 .....S.....
Thanks in advance!