hxp
2019-01-07 be1b8eb2ba505610a365c6b918f0ab72d9cb20c4
5722 【后端】【1.5】跨服BOSS开发(进入跨服相关封包)
2个文件已修改
152 ■■■■■ 已修改文件
ServerPython/CoreServerGroup/GameServer/Script/ChPyNetPack.py 100 ●●●●● 补丁 | 查看 | 原始文档 | blame | 历史
ServerPython/ZoneServerGroup/map1_8G/MapServer/MapServerData/Script/ChPyNetPack.py 52 ●●●●● 补丁 | 查看 | 原始文档 | blame | 历史
ServerPython/CoreServerGroup/GameServer/Script/ChPyNetPack.py
@@ -11895,6 +11895,54 @@
#------------------------------------------------------
# A8 06 查询充值结果 #tagCMQueryRecharge
class  tagCMQueryRecharge(Structure):
    _pack_ = 1
    _fields_ = [
                  ("Cmd", c_ubyte),
                  ("SubCmd", c_ubyte),
                  ]
    def __init__(self):
        self.Clear()
        self.Cmd = 0xA8
        self.SubCmd = 0x06
        return
    def ReadData(self, stringData, _pos=0, _len=0):
        self.Clear()
        memmove(addressof(self), stringData[_pos:], self.GetLength())
        return _pos + self.GetLength()
    def Clear(self):
        self.Cmd = 0xA8
        self.SubCmd = 0x06
        return
    def GetLength(self):
        return sizeof(tagCMQueryRecharge)
    def GetBuffer(self):
        return string_at(addressof(self), self.GetLength())
    def OutputString(self):
        DumpString = '''// A8 06 查询充值结果 //tagCMQueryRecharge:
                                Cmd:%s,
                                SubCmd:%s
                                '''\
                                %(
                                self.Cmd,
                                self.SubCmd
                                )
        return DumpString
m_NAtagCMQueryRecharge=tagCMQueryRecharge()
ChNetPackDict[eval("0x%02x%02x"%(m_NAtagCMQueryRecharge.Cmd,m_NAtagCMQueryRecharge.SubCmd))] = m_NAtagCMQueryRecharge
#------------------------------------------------------
# A8 05 VIP杀怪等级信息同步开关 #tagCMVIPKillNPCLVInfoSwitch
class  tagCMVIPKillNPCLVInfoSwitch(Structure):
@@ -15353,6 +15401,58 @@
#------------------------------------------------------
# C1 05 进入跨服地图 #tagCMEnterCrossServer
class  tagCMEnterCrossServer(Structure):
    _pack_ = 1
    _fields_ = [
                  ("Cmd", c_ubyte),
                  ("SubCmd", c_ubyte),
                  ("DataMapID", c_int),
                  ]
    def __init__(self):
        self.Clear()
        self.Cmd = 0xC1
        self.SubCmd = 0x05
        return
    def ReadData(self, stringData, _pos=0, _len=0):
        self.Clear()
        memmove(addressof(self), stringData[_pos:], self.GetLength())
        return _pos + self.GetLength()
    def Clear(self):
        self.Cmd = 0xC1
        self.SubCmd = 0x05
        self.DataMapID = 0
        return
    def GetLength(self):
        return sizeof(tagCMEnterCrossServer)
    def GetBuffer(self):
        return string_at(addressof(self), self.GetLength())
    def OutputString(self):
        DumpString = '''// C1 05 进入跨服地图 //tagCMEnterCrossServer:
                                Cmd:%s,
                                SubCmd:%s,
                                DataMapID:%d
                                '''\
                                %(
                                self.Cmd,
                                self.SubCmd,
                                self.DataMapID
                                )
        return DumpString
m_NAtagCMEnterCrossServer=tagCMEnterCrossServer()
ChNetPackDict[eval("0x%02x%02x"%(m_NAtagCMEnterCrossServer.Cmd,m_NAtagCMEnterCrossServer.SubCmd))] = m_NAtagCMEnterCrossServer
#------------------------------------------------------
# C1 04 主动退出跨服 #tagCMExitCrossRealm
class  tagCMExitCrossRealm(Structure):
ServerPython/ZoneServerGroup/map1_8G/MapServer/MapServerData/Script/ChPyNetPack.py
@@ -15401,6 +15401,58 @@
#------------------------------------------------------
# C1 05 进入跨服地图 #tagCMEnterCrossServer
class  tagCMEnterCrossServer(Structure):
    _pack_ = 1
    _fields_ = [
                  ("Cmd", c_ubyte),
                  ("SubCmd", c_ubyte),
                  ("DataMapID", c_int),
                  ]
    def __init__(self):
        self.Clear()
        self.Cmd = 0xC1
        self.SubCmd = 0x05
        return
    def ReadData(self, stringData, _pos=0, _len=0):
        self.Clear()
        memmove(addressof(self), stringData[_pos:], self.GetLength())
        return _pos + self.GetLength()
    def Clear(self):
        self.Cmd = 0xC1
        self.SubCmd = 0x05
        self.DataMapID = 0
        return
    def GetLength(self):
        return sizeof(tagCMEnterCrossServer)
    def GetBuffer(self):
        return string_at(addressof(self), self.GetLength())
    def OutputString(self):
        DumpString = '''// C1 05 进入跨服地图 //tagCMEnterCrossServer:
                                Cmd:%s,
                                SubCmd:%s,
                                DataMapID:%d
                                '''\
                                %(
                                self.Cmd,
                                self.SubCmd,
                                self.DataMapID
                                )
        return DumpString
m_NAtagCMEnterCrossServer=tagCMEnterCrossServer()
ChNetPackDict[eval("0x%02x%02x"%(m_NAtagCMEnterCrossServer.Cmd,m_NAtagCMEnterCrossServer.SubCmd))] = m_NAtagCMEnterCrossServer
#------------------------------------------------------
# C1 04 主动退出跨服 #tagCMExitCrossRealm
class  tagCMExitCrossRealm(Structure):