Follow-up Comment #5, bug #18233 (project wesnoth):
Ok, then it seems other clients execute the attack without a proper seed
anyway.
Try the following patch:
diff --git a/src/replay.cpp b/src/replay.cpp
index e6d1248..46b8314 100644
--- a/src/replay.cpp
+++ b/src/replay.cpp
@@ -1088,8 +1088,10 @@ bool do_replay_handle(int side_num, const std::string
&do_untill)
continue;
}
+ if (!child.has_attribute("seed")) continue; //
attack was aborted
+
int seed = child["seed"];
- rand_rng::set_seed(child["seed"]);
+ rand_rng::set_seed(seed);
LOG_REPLAY << "Replaying attack with seed " << seed
<< "n";
DBG_REPLAY << "Attacker XP (before attack): " <<
u->experience() << "n";
_______________________________________________________
Reply to this item at:
<http://gna.org/bugs/?18233>
_______________________________________________
Message sent via/by Gna!
http://gna.org/
_______________________________________________
Wesnoth-bugs mailing list
[email protected]
https://mail.gna.org/listinfo/wesnoth-bugs