store_be32(&this->pulse.vendor, 0xa4c);
store_be32(&this->pulse.type, 4);
store_be32(&this->pulse.len, this->len + 16);
- queue_packet(&vpninfo->oncp_control_queue, this);
+ queue_packet(&vpninfo->tcp_control_queue, this);
work_done = 1;
continue;
}
#endif
init_pkt_queue(&vpninfo->incoming_queue);
init_pkt_queue(&vpninfo->outgoing_queue);
- init_pkt_queue(&vpninfo->oncp_control_queue);
+ init_pkt_queue(&vpninfo->tcp_control_queue);
vpninfo->dtls_tos_current = 0;
vpninfo->dtls_pass_tos = 0;
vpninfo->ssl_fd = vpninfo->dtls_fd = -1;
work_done = 1;
if (queue_packet(&vpninfo->outgoing_queue, out_pkt) +
- vpninfo->oncp_control_queue.count >= vpninfo->max_qlen) {
+ vpninfo->tcp_control_queue.count >= vpninfo->max_qlen) {
out_pkt = NULL;
unmonitor_read_fd(vpninfo, tun);
break;
out_pkt = NULL;
}
vpninfo->tun_pkt = out_pkt;
- } else if (vpninfo->outgoing_queue.count + vpninfo->oncp_control_queue.count < vpninfo->max_qlen) {
+ } else if (vpninfo->outgoing_queue.count + vpninfo->tcp_control_queue.count < vpninfo->max_qlen) {
monitor_read_fd(vpninfo, tun);
}
memcpy(new, &esp_enable_pkt, sizeof(*new) + 13);
new->data[12] = enable;
- queue_packet(&vpninfo->oncp_control_queue, new);
+ queue_packet(&vpninfo->tcp_control_queue, new);
return 0;
}
store_le16(vpninfo->cstp_pkt->oncp.rec,
(p - vpninfo->cstp_pkt->oncp.kmp));
- queue_packet(&vpninfo->oncp_control_queue, vpninfo->cstp_pkt);
+ queue_packet(&vpninfo->tcp_control_queue, vpninfo->cstp_pkt);
vpninfo->cstp_pkt = NULL;
print_esp_keys(vpninfo, _("new incoming"), esp);
goto handle_outgoing;
}
- vpninfo->current_ssl_pkt = dequeue_packet(&vpninfo->oncp_control_queue);
+ vpninfo->current_ssl_pkt = dequeue_packet(&vpninfo->tcp_control_queue);
if (vpninfo->current_ssl_pkt)
goto handle_outgoing;
struct pkt *deflate_pkt; /* For compressing outbound packets into */
struct pkt *pending_deflated_pkt; /* The original packet associated with above */
struct pkt *current_ssl_pkt; /* Partially sent SSL packet */
- struct pkt_q oncp_control_queue; /* Control packets to be sent on oNCP next */
int oncp_rec_size; /* For packetising incoming oNCP stream */
/* Packet buffers for receiving into */
struct pkt *cstp_pkt;
struct pkt_q incoming_queue;
struct pkt_q outgoing_queue;
+ struct pkt_q tcp_control_queue; /* Control packets to be sent via TCP */
int max_qlen;
struct oc_stats stats;
openconnect_stats_vfn stats_handler;
}
vpninfo->cstp_pkt = NULL;
pkt->len = load_be32(&pkt->pulse.len) - 16;
- queue_packet(&vpninfo->oncp_control_queue, pkt);
+ queue_packet(&vpninfo->tcp_control_queue, pkt);
print_esp_keys(vpninfo, _("new incoming"), &vpninfo->esp_in[vpninfo->current_esp_in]);
print_esp_keys(vpninfo, _("new outgoing"), &vpninfo->esp_out);
work_done = 1;
}
- vpninfo->current_ssl_pkt = dequeue_packet(&vpninfo->oncp_control_queue);
+ vpninfo->current_ssl_pkt = dequeue_packet(&vpninfo->tcp_control_queue);
if (vpninfo->current_ssl_pkt) {
/* Anything on the control queue will have the rest of its
header filled in already. */