From be1b8eb2ba505610a365c6b918f0ab72d9cb20c4 Mon Sep 17 00:00:00 2001
From: hxp <ale99527@vip.qq.com>
Date: 星期一, 07 一月 2019 10:12:54 +0800
Subject: [PATCH] 5722 【后端】【1.5】跨服BOSS开发(进入跨服相关封包)

---
 ServerPython/CoreServerGroup/GameServer/Script/ChPyNetPack.py |  100 ++++++++++++++++++++++++++++++++++++++++++++++++++
 1 files changed, 100 insertions(+), 0 deletions(-)

diff --git a/ServerPython/CoreServerGroup/GameServer/Script/ChPyNetPack.py b/ServerPython/CoreServerGroup/GameServer/Script/ChPyNetPack.py
index fe24eb8..990f186 100644
--- a/ServerPython/CoreServerGroup/GameServer/Script/ChPyNetPack.py
+++ b/ServerPython/CoreServerGroup/GameServer/Script/ChPyNetPack.py
@@ -11895,6 +11895,54 @@
 
 
 #------------------------------------------------------
+# A8 06 查询充值结果 #tagCMQueryRecharge
+
+class  tagCMQueryRecharge(Structure):
+    _pack_ = 1
+    _fields_ = [
+                  ("Cmd", c_ubyte),
+                  ("SubCmd", c_ubyte),
+                  ]
+
+    def __init__(self):
+        self.Clear()
+        self.Cmd = 0xA8
+        self.SubCmd = 0x06
+        return
+
+    def ReadData(self, stringData, _pos=0, _len=0):
+        self.Clear()
+        memmove(addressof(self), stringData[_pos:], self.GetLength())
+        return _pos + self.GetLength()
+
+    def Clear(self):
+        self.Cmd = 0xA8
+        self.SubCmd = 0x06
+        return
+
+    def GetLength(self):
+        return sizeof(tagCMQueryRecharge)
+
+    def GetBuffer(self):
+        return string_at(addressof(self), self.GetLength())
+
+    def OutputString(self):
+        DumpString = '''// A8 06 查询充值结果 //tagCMQueryRecharge:
+                                Cmd:%s,
+                                SubCmd:%s
+                                '''\
+                                %(
+                                self.Cmd,
+                                self.SubCmd
+                                )
+        return DumpString
+
+
+m_NAtagCMQueryRecharge=tagCMQueryRecharge()
+ChNetPackDict[eval("0x%02x%02x"%(m_NAtagCMQueryRecharge.Cmd,m_NAtagCMQueryRecharge.SubCmd))] = m_NAtagCMQueryRecharge
+
+
+#------------------------------------------------------
 # A8 05 VIP杀怪等级信息同步开关 #tagCMVIPKillNPCLVInfoSwitch
 
 class  tagCMVIPKillNPCLVInfoSwitch(Structure):
@@ -15353,6 +15401,58 @@
 
 
 #------------------------------------------------------
+# C1 05 进入跨服地图 #tagCMEnterCrossServer
+
+class  tagCMEnterCrossServer(Structure):
+    _pack_ = 1
+    _fields_ = [
+                  ("Cmd", c_ubyte),
+                  ("SubCmd", c_ubyte),
+                  ("DataMapID", c_int),    
+                  ]
+
+    def __init__(self):
+        self.Clear()
+        self.Cmd = 0xC1
+        self.SubCmd = 0x05
+        return
+
+    def ReadData(self, stringData, _pos=0, _len=0):
+        self.Clear()
+        memmove(addressof(self), stringData[_pos:], self.GetLength())
+        return _pos + self.GetLength()
+
+    def Clear(self):
+        self.Cmd = 0xC1
+        self.SubCmd = 0x05
+        self.DataMapID = 0
+        return
+
+    def GetLength(self):
+        return sizeof(tagCMEnterCrossServer)
+
+    def GetBuffer(self):
+        return string_at(addressof(self), self.GetLength())
+
+    def OutputString(self):
+        DumpString = '''// C1 05 进入跨服地图 //tagCMEnterCrossServer:
+                                Cmd:%s,
+                                SubCmd:%s,
+                                DataMapID:%d
+                                '''\
+                                %(
+                                self.Cmd,
+                                self.SubCmd,
+                                self.DataMapID
+                                )
+        return DumpString
+
+
+m_NAtagCMEnterCrossServer=tagCMEnterCrossServer()
+ChNetPackDict[eval("0x%02x%02x"%(m_NAtagCMEnterCrossServer.Cmd,m_NAtagCMEnterCrossServer.SubCmd))] = m_NAtagCMEnterCrossServer
+
+
+#------------------------------------------------------
 # C1 04 主动退出跨服 #tagCMExitCrossRealm
 
 class  tagCMExitCrossRealm(Structure):

--
Gitblit v1.8.0