From 22189b3a5939d132e6ae84fda17bdd6d9cf5c867 Mon Sep 17 00:00:00 2001 From: Antoine Martin Date: Wed, 28 Aug 2024 16:29:34 +0700 Subject: [PATCH] cosmetic --- xpra/net/protocol/socket_handler.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/xpra/net/protocol/socket_handler.py b/xpra/net/protocol/socket_handler.py index c73919bab5..9772071850 100644 --- a/xpra/net/protocol/socket_handler.py +++ b/xpra/net/protocol/socket_handler.py @@ -436,7 +436,7 @@ def _add_chunks_to_queue(self, packet_type: str | int, data = self.cipher_out.update(padded) if len(data) != actual_size: raise RuntimeError(f"expected encrypted size to be {actual_size}, but got {len(data)}") - cryptolog("sending %s bytes %s encrypted with %s bytes of padding", + cryptolog("sending %6s bytes %s encrypted with %s bytes of padding", payload_size, self.cipher_out_name, padding_size) if proto_flags & FLAGS_NOHEADER: assert not self.cipher_out @@ -1009,7 +1009,7 @@ def check_packet_size(size_to_check, packet_header): if not protocol_flags & FLAGS_CIPHER: self.invalid("unencrypted packet dropped", data) return - cryptolog("received %i %s encrypted bytes with %i padding", + cryptolog("received %6i %s encrypted bytes with %i bytes of padding", payload_size, self.cipher_in_name, padding_size) data = self.cipher_in.update(data) if padding_size > 0: