@@ -153,7 +153,7 @@ def decodemsg(buf, source):
153153 class MessageHeaderParseError (Exception ):
154154 pass
155155
156- def lowlevel_read ():
156+ def read_more_input ():
157157 """Read some more data from source into the receive buffer.
158158
159159 Return the current contents of the receive buffer. (All of it,
@@ -198,7 +198,7 @@ def synchronize():
198198 # byte in it. This prevents a malicious sender from crashing the
199199 # receiver by flooding it with nothing but junk.
200200 buf .set (b"" )
201- val = lowlevel_read ()
201+ val = read_more_input ()
202202
203203 def read_header ():
204204 """Parse message header.
@@ -209,7 +209,7 @@ def read_header():
209209 """
210210 val = buf .getvalue ()
211211 while len (val ) < 5 :
212- val = lowlevel_read ()
212+ val = read_more_input ()
213213 # CAUTION: val[0] == 255, but val[0:1] == b"\xff".
214214 if val [0 :1 ] != b"\xff " : # sync byte
215215 raise MessageHeaderParseError
@@ -224,7 +224,7 @@ def read_header():
224224 j = val .find (b";" ) # end of length-of-body field
225225 if j != - 1 : # found
226226 break
227- val = lowlevel_read ()
227+ val = read_more_input ()
228228 if j == - 1 : # maximum length of length-of-body field exceeded, terminator not found.
229229 raise MessageHeaderParseError
230230 j = val .find (b";" )
@@ -242,7 +242,7 @@ def read_body(body_len):
242242 # TODO: very large messages.
243243 val = buf .getvalue ()
244244 while len (val ) < body_len :
245- val = lowlevel_read ()
245+ val = read_more_input ()
246246 # Any bytes left over belong to the next message.
247247 body , leftovers = val [:body_len ], val [body_len :]
248248 buf .set (leftovers )
0 commit comments