if (!kr_assume(loop && (!secret_len || secret)))
return NULL;
#if GNUTLS_VERSION_NUMBER < 0x030500
- /* We would need different SESSION_KEY_SIZE; avoid assert. */
+ /* We would need different SESSION_KEY_SIZE; avoid an error. */
return NULL;
#endif
tst_ctx_t *ctx = tst_key_create(secret, secret_len, loop);
/** Materialize RRset + RRSIGs into ans->rrsets[id].
* LATER(optim.): it's slightly wasteful that we allocate knot_rrset_t for the packet
*
- * \return error code. They are all bad conditions and "guarded" by assert.
+ * \return error code. They are all bad conditions and "guarded" by kr_assume().
*/
int entry2answer(struct answer *ans, int id,
const struct entry_h *eh, const uint8_t *eh_bound,
kr_zonecut_deinit(NULL);
kr_zonecut_set(NULL, NULL);
kr_zonecut_set(&cut, NULL);
- /* TODO triggerring inner assert:
+ /* TODO triggerring inner assertion:
assert_int_not_equal(kr_zonecut_add(NULL, NULL, NULL, 0), 0);
*/
assert_null((void *)kr_zonecut_find(NULL, NULL));
#define kr_log_critical(...) kr_log_error(__VA_ARGS__)
#define kr_log_deprecate(...) fprintf(stderr, "deprecation WARNING: " __VA_ARGS__)
-/** assert() but always, regardless of -DNDEBUG. See also kr_assume(). */
+/** Assert() but always, regardless of -DNDEBUG. See also kr_assume(). */
#define kr_require(expression) do { if (!(expression)) { \
kr_fail(true, #expression, __func__, __FILE__, __LINE__); \
__builtin_unreachable(); /* aid code analysis */ \