if (do_pre_decrypt_check(m, &state, real))
{
/* This is an unknown session but with valid tls-auth/tls-crypt
- * (or no auth at all). If this is the initial packet of a
- * session, we just send a reply with a HMAC session id and
+ * (or no auth at all). If this is the initial packet of a
+ * session, we just send a reply with a HMAC session id and
* do not generate a session slot */
if (frequency_limit_event_allowed(m->new_connection_limiter))
mi->did_real_hash = true;
multi_assign_peer_id(m, mi);
}
- /* If we have a session id already, ensure that the
+ /* If we have a session id already, ensure that the
* state is using the same */
if (session_id_defined(&state.server_session_id)
&& session_id_defined((&state.peer_session_id)))
/* get initial frame parms, still need to finalize */
tas->frame = tls_options->frame;
- packet_id_init(&tas->tls_wrap.opt.packet_id, tls_options->replay_window,
+ packet_id_init(&tas->tls_wrap.opt.packet_id, tls_options->replay_window,
tls_options->replay_time, "TAS", 0);
return tas;