diff options
Diffstat (limited to 'src/pso')
-rw-r--r-- | src/pso/TProtocol.cpp | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/pso/TProtocol.cpp b/src/pso/TProtocol.cpp index e3c45a9..0970d39 100644 --- a/src/pso/TProtocol.cpp +++ b/src/pso/TProtocol.cpp @@ -31,13 +31,13 @@ void TProtocol::parse_packet() { m_packet.bytes[m_packet_offset++] = next(); if (m_packet_offset == sizeof(packet_header)) { if (m_is_encrypted) { - m_recv_crypt.encrypt(&m_packet.packet.header, sizeof(packet_header)); + m_recv_crypt.encrypt(&m_packet.pkt.header, sizeof(packet_header)); } } // NOTE: The `const int &` is required here to match. // Convert packet size to native endian. - const int &packet_size = m_packet_size = to_be_uint16_t(m_packet.packet.header.size); + const int &packet_size = m_packet_size = to_be_uint16_t(m_packet.pkt.header.size); // Is the packet size invalid? if (packet_size > max_packet_size || !packet_size) { m_packet_size = 0; @@ -48,13 +48,13 @@ void TProtocol::parse_packet() { } else if (m_packet_size > 0 && m_packet_offset >= m_packet_size) { // Decrypt it if necessary. if (m_is_encrypted) { - m_recv_crypt.encrypt(&m_packet.packet.data, m_packet_size-sizeof(packet_header)); + m_recv_crypt.encrypt(&m_packet.pkt.data, m_packet_size-sizeof(packet_header)); } struct packet *pkt = &m_packet; m_packet_size = 0; m_packet_offset = 0; if (m_handle_pings_only) { - if (pkt->packet.header.command == 0x1d) { + if (pkt->pkt.header.command == 0x1d) { if (!handle_command(pkt)) { continue; } else { |