char *p = buf;
memset(buf, 0, sizeof(buf));
for (unsigned k = 0; k < sizeof(iface.phys_addr); ++k) {
- sprintf(p, "%.2x:", iface.phys_addr[k] & 0xff);
+ sprintf(p, "%s%.2x", k > 0 ? ":" : "", iface.phys_addr[k] & 0xff);
p += 3;
}
- *(p - 1) = '\0';
lua_pushstring(L, buf);
lua_setfield(L, -2, "mac");
return kr_ok();
}
+#ifdef HAS_SYSTEMD
static void free_sd_socket_names(char **socket_names, int count)
{
for (int i = 0; i < count; i++) {
}
free(socket_names);
}
+#endif
int main(int argc, char **argv)
{
handle->type == UV_UDP ? SOCK_DGRAM : SOCK_STREAM,
pkt);
if (ret != kr_ok()) {
+ req_release(task->worker, send_req);
return ret;
}
}
}
int submitted = 0;
- ssize_t nbytes = 0;
struct qr_task *task = session->buffering;
/* If this is a new query, create a new task that we can use
/* Finish reading DNS/TCP message length. */
if (task->bytes_remaining == 0 && pkt_buf->size == 1) {
pkt_buf->wire[1] = msg[0];
- nbytes = msg_size(pkt_buf->wire);
+ ssize_t nbytes = msg_size(pkt_buf->wire);
len -= 1;
msg += 1;
/* Cut off fragment length and start reading DNS message. */
return -2;
}
- const struct knot_cc_alg *cc_alg = NULL;
-
assert(clnt_sett->current.secr);
/* The address must correspond with the client cookie. */
.secret_len = clnt_sett->current.secr->size
};
- cc_alg = kr_cc_alg_get(clnt_sett->current.alg_id);
+ const struct knot_cc_alg *cc_alg = kr_cc_alg_get(clnt_sett->current.alg_id);
if (!cc_alg) {
return -2;
}