libpurple/protocols/qq/qq_process.c

branch
openq
changeset 24344
712295f3bf6d
parent 24343
9c695a1f475b
child 24345
8c97fe081183
--- a/libpurple/protocols/qq/qq_process.c	Wed Oct 22 14:40:04 2008 +0000
+++ b/libpurple/protocols/qq/qq_process.c	Wed Oct 22 14:41:13 2008 +0000
@@ -607,18 +607,18 @@
 			if (data_len >= 0) {
 				purple_debug_warning("QQ", "Decrypt login packet by random_key, %d bytes\n", data_len);
 			} else {
-				data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.pwd_4th_md5);
+				data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.pwd_twice_md5);
 				if (data_len >= 0) {
-					purple_debug_warning("QQ", "Decrypt login packet by pwd_4th_md5, %d bytes\n", data_len);
+					purple_debug_warning("QQ", "Decrypt login packet by pwd_twice_md5, %d bytes\n", data_len);
 				}
 			}
 			break;
 		case QQ_CMD_LOGIN:
 		default:
 			if (qd->client_version > 2005) {
-				data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.pwd_4th_md5);
+				data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.pwd_twice_md5);
 				if (data_len >= 0) {
-					purple_debug_warning("QQ", "Decrypt login packet by pwd_4th_md5\n");
+					purple_debug_warning("QQ", "Decrypt login packet by pwd_twice_md5\n");
 				} else {
 					data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.login_key);
 					if (data_len >= 0) {
@@ -631,9 +631,9 @@
 				if (data_len >= 0) {
 					purple_debug_warning("QQ", "Decrypt login packet by random_key\n");
 				} else {
-					data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.pwd_2nd_md5);
+					data_len = qq_decrypt(data, rcved, rcved_len, qd->ld.pwd_twice_md5);
 					if (data_len >= 0) {
-						purple_debug_warning("QQ", "Decrypt login packet by pwd_2nd_md5\n");
+						purple_debug_warning("QQ", "Decrypt login packet by pwd_twice_md5\n");
 					}
 				}
 			}

mercurial