aboutsummaryrefslogtreecommitdiff
path: root/src/trinityrealm/AuthSocket.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'src/trinityrealm/AuthSocket.cpp')
-rw-r--r--src/trinityrealm/AuthSocket.cpp12
1 files changed, 6 insertions, 6 deletions
diff --git a/src/trinityrealm/AuthSocket.cpp b/src/trinityrealm/AuthSocket.cpp
index b5fe5f040c1..c9b88833667 100644
--- a/src/trinityrealm/AuthSocket.cpp
+++ b/src/trinityrealm/AuthSocket.cpp
@@ -361,6 +361,11 @@ bool AuthSocket::_HandleLogonChallenge()
buf[buf.size() - 1] = 0;
sAuthLogonChallenge_C *ch = (sAuthLogonChallenge_C*)&buf[0];
+ ///- Read the remaining of the packet
+ ibuf.Read((char *)&buf[4], remaining);
+ DEBUG_LOG("[AuthChallenge] got full packet, %#04x bytes", ch->size);
+ DEBUG_LOG("[AuthChallenge] name(%d): '%s'", ch->I_len, ch->I);
+
// BigEndian code, nop in little endian case
// size already converted
EndianConvert(*((uint32*)(&ch->gamename[0])));
@@ -371,11 +376,6 @@ bool AuthSocket::_HandleLogonChallenge()
EndianConvert(ch->timezone_bias);
EndianConvert(ch->ip);
- ///- Read the remaining of the packet
- ibuf.Read((char *)&buf[4], remaining);
- DEBUG_LOG("[AuthChallenge] got full packet, %#04x bytes", ch->size);
- DEBUG_LOG("[AuthChallenge] name(%d): '%s'", ch->I_len, ch->I);
-
ByteBuffer pkt;
_login = (const char*)ch->I;
@@ -410,7 +410,7 @@ bool AuthSocket::_HandleLogonChallenge()
///- Get the account details from the account table
// No SQL injection (escaped user name)
- result =
+ result =
loginDatabase.PQuery("SELECT a.sha_pass_hash,a.id,a.locked,a.last_ip,aa.gmlevel,a.v,a.s "
"FROM account a "
"LEFT JOIN account_access aa "