summaryrefslogtreecommitdiff
path: root/src/pso/TProtocol.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'src/pso/TProtocol.cpp')
-rw-r--r--src/pso/TProtocol.cpp8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/pso/TProtocol.cpp b/src/pso/TProtocol.cpp
index e3c45a9..0970d39 100644
--- a/src/pso/TProtocol.cpp
+++ b/src/pso/TProtocol.cpp
@@ -31,13 +31,13 @@ void TProtocol::parse_packet() {
m_packet.bytes[m_packet_offset++] = next();
if (m_packet_offset == sizeof(packet_header)) {
if (m_is_encrypted) {
- m_recv_crypt.encrypt(&m_packet.packet.header, sizeof(packet_header));
+ m_recv_crypt.encrypt(&m_packet.pkt.header, sizeof(packet_header));
}
}
// NOTE: The `const int &` is required here to match.
// Convert packet size to native endian.
- const int &packet_size = m_packet_size = to_be_uint16_t(m_packet.packet.header.size);
+ const int &packet_size = m_packet_size = to_be_uint16_t(m_packet.pkt.header.size);
// Is the packet size invalid?
if (packet_size > max_packet_size || !packet_size) {
m_packet_size = 0;
@@ -48,13 +48,13 @@ void TProtocol::parse_packet() {
} else if (m_packet_size > 0 && m_packet_offset >= m_packet_size) {
// Decrypt it if necessary.
if (m_is_encrypted) {
- m_recv_crypt.encrypt(&m_packet.packet.data, m_packet_size-sizeof(packet_header));
+ m_recv_crypt.encrypt(&m_packet.pkt.data, m_packet_size-sizeof(packet_header));
}
struct packet *pkt = &m_packet;
m_packet_size = 0;
m_packet_offset = 0;
if (m_handle_pings_only) {
- if (pkt->packet.header.command == 0x1d) {
+ if (pkt->pkt.header.command == 0x1d) {
if (!handle_command(pkt)) {
continue;
} else {