Commit 5a8c468f authored by Sergey Lyubka's avatar Sergey Lyubka

Merge pull request #435 from jhnwkmn/size-macros

Added size macros.
parents 5b143a62 f0f6ae05
...@@ -305,12 +305,14 @@ int ns_resolve(const char *domain_name, char *ip_addr_buf, size_t buf_len); ...@@ -305,12 +305,14 @@ int ns_resolve(const char *domain_name, char *ip_addr_buf, size_t buf_len);
#define NS_FREE free #define NS_FREE free
#endif #endif
#define NS_CTL_MSG_MESSAGE_SIZE (8 * 1024)
#define NS_READ_BUFFER_SIZE 2048
#define NS_UDP_RECEIVE_BUFFER_SIZE 2000 #define NS_UDP_RECEIVE_BUFFER_SIZE 2000
#define NS_VPRINTF_BUFFER_SIZE 500 #define NS_VPRINTF_BUFFER_SIZE 500
struct ctl_msg { struct ctl_msg {
ns_callback_t callback; ns_callback_t callback;
char message[1024 * 8]; char message[NS_CTL_MSG_MESSAGE_SIZE];
}; };
void iobuf_resize(struct iobuf *io, size_t new_size) { void iobuf_resize(struct iobuf *io, size_t new_size) {
...@@ -868,7 +870,7 @@ static int ns_ssl_err(struct ns_connection *conn, int res) { ...@@ -868,7 +870,7 @@ static int ns_ssl_err(struct ns_connection *conn, int res) {
#endif #endif
static void ns_read_from_socket(struct ns_connection *conn) { static void ns_read_from_socket(struct ns_connection *conn) {
char buf[2048]; char buf[NS_READ_BUFFER_SIZE];
int n = 0; int n = 0;
if (conn->flags & NSF_CONNECTING) { if (conn->flags & NSF_CONNECTING) {
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment