}
buf_free(reqbuf);
- vpninfo->oncp_rec_size = 0;
+ vpninfo->partial_rec_size = 0;
free(vpninfo->cstp_pkt);
vpninfo->cstp_pkt = NULL;
{
int ret;
- if (!vpninfo->oncp_rec_size) {
+ if (!vpninfo->partial_rec_size) {
unsigned char lenbuf[2];
ret = ssl_nonblock_read(vpninfo, 0, lenbuf, 2);
_("Read only 1 byte of oNCP length field\n"));
return -EIO;
}
- vpninfo->oncp_rec_size = load_le16(lenbuf);
- if (!vpninfo->oncp_rec_size) {
+ vpninfo->partial_rec_size = load_le16(lenbuf);
+ if (!vpninfo->partial_rec_size) {
ret = ssl_nonblock_read(vpninfo, 0, lenbuf, 1);
if (ret == 1) {
if (lenbuf[0] == 1) {
}
}
}
- if (len > vpninfo->oncp_rec_size)
- len = vpninfo->oncp_rec_size;
+ if (len > vpninfo->partial_rec_size)
+ len = vpninfo->partial_rec_size;
ret = ssl_nonblock_read(vpninfo, 0, buf, len);
if (ret > 0)
- vpninfo->oncp_rec_size -= ret;
+ vpninfo->partial_rec_size -= ret;
return ret;
}
struct pkt *deflate_pkt; /* For compressing outbound packets into */
struct pkt *pending_deflated_pkt; /* The original packet associated with above */
struct pkt *current_ssl_pkt; /* Partially sent SSL packet */
- int oncp_rec_size; /* For packetising incoming oNCP stream */
+ int partial_rec_size; /* For tracking partially-received packets */
/* Packet buffers for receiving into */
struct pkt *cstp_pkt;
struct pkt *dtls_pkt;