=================================================================== RCS file: /cvsrepo/anoncvs/cvs/src/usr.bin/ssh/packet.c,v retrieving revision 1.28 retrieving revision 1.29 diff -u -r1.28 -r1.29 --- src/usr.bin/ssh/packet.c 2000/04/14 10:09:15 1.28 +++ src/usr.bin/ssh/packet.c 2000/04/14 10:30:32 1.29 @@ -1,14 +1,14 @@ /* - * + * * packet.c - * + * * Author: Tatu Ylonen - * + * * Copyright (c) 1995 Tatu Ylonen , Espoo, Finland * All rights reserved - * + * * Created: Sat Mar 18 02:40:40 1995 ylo - * + * * This file contains code implementing the packet protocol and communication * with the other side. This same code is used both on client and server side. * @@ -17,7 +17,7 @@ */ #include "includes.h" -RCSID("$Id: packet.c,v 1.28 2000/04/14 10:09:15 markus Exp $"); +RCSID("$Id: packet.c,v 1.29 2000/04/14 10:30:32 markus Exp $"); #include "xmalloc.h" #include "buffer.h" @@ -521,7 +521,7 @@ unsigned int packet_length = 0; unsigned int i, padlen, len; u_int32_t rand = 0; - static unsigned int seqnr = 0; + static unsigned int seqnr = 0; int type; Enc *enc = NULL; Mac *mac = NULL; @@ -603,9 +603,9 @@ fprintf(stderr, "encrypted: "); buffer_dump(&output); #endif - /* increment sequence number for outgoing packets */ - if (++seqnr == 0) - log("outgoing seqnr wraps around"); + /* increment sequence number for outgoing packets */ + if (++seqnr == 0) + log("outgoing seqnr wraps around"); buffer_clear(&outgoing_packet); if (type == SSH2_MSG_NEWKEYS) { @@ -869,7 +869,7 @@ * compute MAC over seqnr and packet, * increment sequence number for incoming packet */ - if (mac && mac->enabled) { + if (mac && mac->enabled) { macbuf = hmac( mac->md, seqnr, (unsigned char *) buffer_ptr(&incoming_packet), buffer_len(&incoming_packet), @@ -880,8 +880,8 @@ DBG(debug("HMAC #%d ok", seqnr)); buffer_consume(&input, mac->mac_len); } - if (++seqnr == 0) - log("incoming seqnr wraps around"); + if (++seqnr == 0) + log("incoming seqnr wraps around"); /* get padlen */ cp = buffer_ptr(&incoming_packet) + 4;