* If no accept handler was setup, then just return.
*/
if (udp->accept_fn == NULL) {
- dbprintf(_("Receive packet from unknown source"));
+ g_debug(_("Receive packet from unknown source"));
return;
}
* We remove it first because we don't want to get in their
* way if they reschedule it.
*/
- tcpm_stream_read_cancel(rs);
if (rs->rc->pktlen <= 0) {
auth_debug(1, _("sec: stream_read_callback: %s\n"), rs->rc->errmsg);
+ tcpm_stream_read_cancel(rs);
security_stream_seterror(&rs->secstr, "%s", rs->rc->errmsg);
if(rs->closed_by_me == 0 && rs->closed_by_network == 0)
sec_tcp_conn_put(rs->rc);
assert(cookie != NULL);
- auth_debug(1, _("sec: conn_read_callback\n"));
+ auth_debug(1, _("sec: conn_read_callback %d %d\n"), (int)rc->event_id, rc->read);
/* Read the data off the wire. If we get errors, shut down. */
rval = tcpm_recv_token(rc, rc->read, &rc->handle, &rc->errmsg, &rc->pkt,
revent);
/* delete our 'accept' reference */
if (rc->accept_fn != NULL) {
+ (*rc->accept_fn)(NULL, NULL);
if(rc->refcnt != 1) {
dbprintf(_("STRANGE, rc->refcnt should be 1, it is %d\n"),
rc->refcnt);