}
        buf_free(reqbuf);
 
-       vpninfo->oncp_rec_size = 0;
+       vpninfo->partial_rec_size = 0;
        free(vpninfo->cstp_pkt);
        vpninfo->cstp_pkt = NULL;
 
 {
        int ret;
 
-       if (!vpninfo->oncp_rec_size) {
+       if (!vpninfo->partial_rec_size) {
                unsigned char lenbuf[2];
 
                ret = ssl_nonblock_read(vpninfo, 0, lenbuf, 2);
                                     _("Read only 1 byte of oNCP length field\n"));
                        return -EIO;
                }
-               vpninfo->oncp_rec_size = load_le16(lenbuf);
-               if (!vpninfo->oncp_rec_size) {
+               vpninfo->partial_rec_size = load_le16(lenbuf);
+               if (!vpninfo->partial_rec_size) {
                        ret = ssl_nonblock_read(vpninfo, 0, lenbuf, 1);
                        if (ret == 1) {
                                if (lenbuf[0] == 1) {
                        }
                }
        }
-       if (len > vpninfo->oncp_rec_size)
-               len = vpninfo->oncp_rec_size;
+       if (len > vpninfo->partial_rec_size)
+               len = vpninfo->partial_rec_size;
 
        ret = ssl_nonblock_read(vpninfo, 0, buf, len);
        if (ret > 0)
-               vpninfo->oncp_rec_size -= ret;
+               vpninfo->partial_rec_size -= ret;
        return ret;
 }
 
 
        struct pkt *deflate_pkt;                /* For compressing outbound packets into */
        struct pkt *pending_deflated_pkt;       /* The original packet associated with above */
        struct pkt *current_ssl_pkt;            /* Partially sent SSL packet */
-       int oncp_rec_size;                      /* For packetising incoming oNCP stream */
+       int partial_rec_size;                   /* For tracking partially-received packets */
        /* Packet buffers for receiving into */
        struct pkt *cstp_pkt;
        struct pkt *dtls_pkt;