@@ -66,7 +66,7 @@ void ESPNowBridge::xorCrypt(uint8_t *data, size_t len) {
6666
6767void ESPNowBridge::onDataRecv (const uint8_t *mac, const uint8_t *data, int32_t len) {
6868 // Ignore packets that are too small to contain header + checksum
69- if (len < (MAGIC_HEADER_SIZE + CHECKSUM_SIZE )) {
69+ if (len < (BRIDGE_MAGIC_SIZE + BRIDGE_CHECKSUM_SIZE )) {
7070#if MESH_PACKET_LOGGING
7171 Serial.printf (" %s: ESPNOW BRIDGE: RX packet too small, len=%d\n " , getLogDateTime (), len);
7272#endif
@@ -83,7 +83,7 @@ void ESPNowBridge::onDataRecv(const uint8_t *mac, const uint8_t *data, int32_t l
8383
8484 // Check packet header magic
8585 uint16_t received_magic = (data[0 ] << 8 ) | data[1 ];
86- if (received_magic != ESPNOW_HEADER_MAGIC ) {
86+ if (received_magic != BRIDGE_PACKET_MAGIC ) {
8787#if MESH_PACKET_LOGGING
8888 Serial.printf (" %s: ESPNOW BRIDGE: RX invalid magic 0x%04X\n " , getLogDateTime (), received_magic);
8989#endif
@@ -92,17 +92,17 @@ void ESPNowBridge::onDataRecv(const uint8_t *mac, const uint8_t *data, int32_t l
9292
9393 // Make a copy we can decrypt
9494 uint8_t decrypted[MAX_ESPNOW_PACKET_SIZE];
95- const size_t encryptedDataLen = len - MAGIC_HEADER_SIZE ;
96- memcpy (decrypted, data + MAGIC_HEADER_SIZE , encryptedDataLen);
95+ const size_t encryptedDataLen = len - BRIDGE_MAGIC_SIZE ;
96+ memcpy (decrypted, data + BRIDGE_MAGIC_SIZE , encryptedDataLen);
9797
9898 // Try to decrypt (checksum + payload)
9999 xorCrypt (decrypted, encryptedDataLen);
100100
101101 // Validate checksum
102102 uint16_t received_checksum = (decrypted[0 ] << 8 ) | decrypted[1 ];
103- const size_t payloadLen = encryptedDataLen - CHECKSUM_SIZE ;
103+ const size_t payloadLen = encryptedDataLen - BRIDGE_CHECKSUM_SIZE ;
104104
105- if (!validateChecksum (decrypted + CHECKSUM_SIZE , payloadLen, received_checksum)) {
105+ if (!validateChecksum (decrypted + BRIDGE_CHECKSUM_SIZE , payloadLen, received_checksum)) {
106106 // Failed to decrypt - likely from a different network
107107#if MESH_PACKET_LOGGING
108108 Serial.printf (" %s: ESPNOW BRIDGE: RX checksum mismatch, rcv=0x%04X\n " , getLogDateTime (),
@@ -119,7 +119,7 @@ void ESPNowBridge::onDataRecv(const uint8_t *mac, const uint8_t *data, int32_t l
119119 mesh::Packet *pkt = _instance->_mgr ->allocNew ();
120120 if (!pkt) return ;
121121
122- if (pkt->readFrom (decrypted + CHECKSUM_SIZE , payloadLen)) {
122+ if (pkt->readFrom (decrypted + BRIDGE_CHECKSUM_SIZE , payloadLen)) {
123123 _instance->onPacketReceived (pkt);
124124 } else {
125125 _instance->_mgr ->free (pkt);
@@ -161,11 +161,11 @@ void ESPNowBridge::onPacketTransmitted(mesh::Packet *packet) {
161161 uint8_t buffer[MAX_ESPNOW_PACKET_SIZE];
162162
163163 // Write magic header (2 bytes)
164- buffer[0 ] = (ESPNOW_HEADER_MAGIC >> 8 ) & 0xFF ;
165- buffer[1 ] = ESPNOW_HEADER_MAGIC & 0xFF ;
164+ buffer[0 ] = (BRIDGE_PACKET_MAGIC >> 8 ) & 0xFF ;
165+ buffer[1 ] = BRIDGE_PACKET_MAGIC & 0xFF ;
166166
167167 // Write packet payload starting after magic header and checksum
168- const size_t packetOffset = MAGIC_HEADER_SIZE + CHECKSUM_SIZE ;
168+ const size_t packetOffset = BRIDGE_MAGIC_SIZE + BRIDGE_CHECKSUM_SIZE ;
169169 memcpy (buffer + packetOffset, sizingBuffer, meshPacketLen);
170170
171171 // Calculate and add checksum (only of the payload)
@@ -174,10 +174,10 @@ void ESPNowBridge::onPacketTransmitted(mesh::Packet *packet) {
174174 buffer[3 ] = checksum & 0xFF ; // Low byte
175175
176176 // Encrypt payload and checksum (not including magic header)
177- xorCrypt (buffer + MAGIC_HEADER_SIZE , meshPacketLen + CHECKSUM_SIZE );
177+ xorCrypt (buffer + BRIDGE_MAGIC_SIZE , meshPacketLen + BRIDGE_CHECKSUM_SIZE );
178178
179179 // Total packet size: magic header + checksum + payload
180- const size_t totalPacketSize = MAGIC_HEADER_SIZE + CHECKSUM_SIZE + meshPacketLen;
180+ const size_t totalPacketSize = BRIDGE_MAGIC_SIZE + BRIDGE_CHECKSUM_SIZE + meshPacketLen;
181181
182182 // Broadcast using ESP-NOW
183183 uint8_t broadcastAddress[] = { 0xFF , 0xFF , 0xFF , 0xFF , 0xFF , 0xFF };
0 commit comments