aboutsummaryrefslogtreecommitdiff
path: root/src/gns/gnunet-service-gns.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/gns/gnunet-service-gns.c')
-rw-r--r--src/gns/gnunet-service-gns.c18
1 files changed, 9 insertions, 9 deletions
diff --git a/src/gns/gnunet-service-gns.c b/src/gns/gnunet-service-gns.c
index 79c453406..ccb1b8e3d 100644
--- a/src/gns/gnunet-service-gns.c
+++ b/src/gns/gnunet-service-gns.c
@@ -116,17 +116,17 @@ struct ClientShortenHandle
116 /** 116 /**
117 * name to shorten 117 * name to shorten
118 */ 118 */
119 char name[MAX_DNS_NAME_LENGTH]; 119 char name[GNUNET_DNSPARSER_MAX_NAME_LENGTH];
120 120
121 /** 121 /**
122 * name of private zone (relative to root) 122 * name of private zone (relative to root)
123 */ 123 */
124 char private_zone_id[MAX_DNS_NAME_LENGTH]; 124 char private_zone_id[GNUNET_DNSPARSER_MAX_NAME_LENGTH];
125 125
126 /** 126 /**
127 * name of shorten zone (relative to root) 127 * name of shorten zone (relative to root)
128 */ 128 */
129 char shorten_zone_id[MAX_DNS_NAME_LENGTH]; 129 char shorten_zone_id[GNUNET_DNSPARSER_MAX_NAME_LENGTH];
130 130
131}; 131};
132 132
@@ -787,7 +787,7 @@ handle_shorten (void *cls,
787{ 787{
788 struct ClientShortenHandle *csh; 788 struct ClientShortenHandle *csh;
789 const char *utf_in; 789 const char *utf_in;
790 char name[MAX_DNS_NAME_LENGTH]; 790 char name[GNUNET_DNSPARSER_MAX_NAME_LENGTH];
791 char* nameptr = name; 791 char* nameptr = name;
792 uint16_t msg_size; 792 uint16_t msg_size;
793 const struct GNUNET_GNS_ClientShortenMessage *sh_msg; 793 const struct GNUNET_GNS_ClientShortenMessage *sh_msg;
@@ -828,7 +828,7 @@ handle_shorten (void *cls,
828 GNUNET_SERVER_receive_done (client, GNUNET_OK); 828 GNUNET_SERVER_receive_done (client, GNUNET_OK);
829 return; 829 return;
830 } 830 }
831 if (strlen (name) > MAX_DNS_NAME_LENGTH) 831 if (strlen (name) > GNUNET_DNSPARSER_MAX_NAME_LENGTH)
832 { 832 {
833 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, 833 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
834 "SHORTEN: %s is too long\n", name); 834 "SHORTEN: %s is too long\n", name);
@@ -922,7 +922,7 @@ handle_get_authority (void *cls,
922{ 922{
923 struct ClientGetAuthHandle *cah; 923 struct ClientGetAuthHandle *cah;
924 const char *utf_in; 924 const char *utf_in;
925 char name[MAX_DNS_NAME_LENGTH]; 925 char name[GNUNET_DNSPARSER_MAX_NAME_LENGTH];
926 char* nameptr = name; 926 char* nameptr = name;
927 uint16_t msg_size; 927 uint16_t msg_size;
928 const struct GNUNET_GNS_ClientGetAuthMessage *sh_msg; 928 const struct GNUNET_GNS_ClientGetAuthMessage *sh_msg;
@@ -957,7 +957,7 @@ handle_get_authority (void *cls,
957 send_get_auth_response(cah, name); 957 send_get_auth_response(cah, name);
958 return; 958 return;
959 } 959 }
960 if (strlen (name) > MAX_DNS_NAME_LENGTH) 960 if (strlen (name) > GNUNET_DNSPARSER_MAX_NAME_LENGTH)
961 { 961 {
962 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG, 962 GNUNET_log(GNUNET_ERROR_TYPE_DEBUG,
963 "GET_AUTH: `%s' is too long", name); 963 "GET_AUTH: `%s' is too long", name);
@@ -1059,7 +1059,7 @@ handle_lookup (void *cls,
1059 const struct GNUNET_MessageHeader * message) 1059 const struct GNUNET_MessageHeader * message)
1060{ 1060{
1061 size_t namelen; 1061 size_t namelen;
1062 char name[MAX_DNS_NAME_LENGTH]; 1062 char name[GNUNET_DNSPARSER_MAX_NAME_LENGTH];
1063 struct ClientLookupHandle *clh; 1063 struct ClientLookupHandle *clh;
1064 char* nameptr = name; 1064 char* nameptr = name;
1065 const char *utf_in; 1065 const char *utf_in;
@@ -1113,7 +1113,7 @@ handle_lookup (void *cls,
1113 1113
1114 only_cached = ntohl (sh_msg->only_cached); 1114 only_cached = ntohl (sh_msg->only_cached);
1115 1115
1116 if (strlen (name) > MAX_DNS_NAME_LENGTH) { 1116 if (strlen (name) > GNUNET_DNSPARSER_MAX_NAME_LENGTH) {
1117 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, 1117 GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
1118 "LOOKUP: %s is too long", name); 1118 "LOOKUP: %s is too long", name);
1119 clh->name = NULL; 1119 clh->name = NULL;