diff --git a/src/lib/plugin/ns/SecureSocket.cpp b/src/lib/plugin/ns/SecureSocket.cpp index 81c95c83..2e181ae6 100644 --- a/src/lib/plugin/ns/SecureSocket.cpp +++ b/src/lib/plugin/ns/SecureSocket.cpp @@ -36,9 +36,9 @@ #define MAX_ERROR_SIZE 65535 -// g_retryDelay * g_maxRetry = 10s -static const int g_maxRetry = 1000; -static const float g_retryDelay = 0.01f; +// s_retryDelay * s_maxRetry = 10s +static const int s_maxRetry = 1000; +static const float s_retryDelay = 0.01f; enum { kMsgSize = 128 @@ -314,7 +314,7 @@ SecureSocket::secureAccept(int socket) if (retry > 0) { LOG((CLOG_DEBUG2 "retry accepting secure socket")); m_secureReady = false; - ARCH->sleep(g_retryDelay); + ARCH->sleep(s_retryDelay); return 0; } @@ -348,7 +348,7 @@ SecureSocket::secureConnect(int socket) if (retry > 0) { LOG((CLOG_DEBUG2 "retry connect secure socket")); m_secureReady = false; - ARCH->sleep(g_retryDelay); + ARCH->sleep(s_retryDelay); return 0; } @@ -473,8 +473,8 @@ SecureSocket::checkResult(int status, int& retry) } // If the retry max would exceed the allowed, treat it as a fatal error - if (retry > g_maxRetry) { - LOG((CLOG_DEBUG "retry exceeded %f sec", g_maxRetry * g_retryDelay)); + if (retry > s_maxRetry) { + LOG((CLOG_DEBUG "retry exceeded %f sec", s_maxRetry * s_retryDelay)); isFatal(true); }