Follow-up Comment #5, bug #18233 (project wesnoth):

Ok, then it seems other clients execute the attack without a proper seed
anyway.

Try the following patch:


diff --git a/src/replay.cpp b/src/replay.cpp
index e6d1248..46b8314 100644
--- a/src/replay.cpp
+++ b/src/replay.cpp
@@ -1088,8 +1088,10 @@ bool do_replay_handle(int side_num, const std::string
&do_untill)
                                continue;
                        }

+                       if (!child.has_attribute("seed")) continue;  //
attack was aborted
+                       
                        int seed = child["seed"];
-                       rand_rng::set_seed(child["seed"]);
+                       rand_rng::set_seed(seed);
                        LOG_REPLAY << "Replaying attack with seed " << seed
<< "n";
                        
                        DBG_REPLAY << "Attacker XP (before attack): " <<
u->experience() << "n";


    _______________________________________________________

Reply to this item at:

  <http://gna.org/bugs/?18233>

_______________________________________________
  Message sent via/by Gna!
  http://gna.org/


_______________________________________________
Wesnoth-bugs mailing list
[email protected]
https://mail.gna.org/listinfo/wesnoth-bugs

Reply via email to