#include "sockopt.h"
-static struct iface *disc_find_iface(unsigned int, int,
- union ldpd_addr *);
+static struct iface *disc_find_iface(unsigned int, int, union ldpd_addr *);
static void session_read(struct event *thread);
static void session_write(struct event *thread);
-static ssize_t session_get_pdu(struct ibuf_read *, char **);
-static void tcp_close(struct tcp_conn *);
-static struct pending_conn *pending_conn_new(int, int, union ldpd_addr *);
+static ssize_t session_get_pdu(struct ibuf_read *, char **);
+static void tcp_close(struct tcp_conn *);
+static struct pending_conn *pending_conn_new(int, int, union ldpd_addr *);
static void pending_conn_timeout(struct event *thread);
int
if ((r = recvmsg(fd, &m, 0)) == -1) {
if (errno != EAGAIN && errno != EINTR)
- log_debug("%s: read error: %s", __func__,
- strerror(errno));
+ log_debug("%s: read error: %s", __func__, strerror(errno));
return;
}
multicast = (m.msg_flags & MSG_MCAST) ? 1 : 0;
#else
multicast = 0;
- for (cmsg = CMSG_FIRSTHDR(&m); cmsg != NULL;
- cmsg = CMSG_NXTHDR(&m, cmsg)) {
+ for (cmsg = CMSG_FIRSTHDR(&m); cmsg != NULL; cmsg = CMSG_NXTHDR(&m, cmsg)) {
#if defined(HAVE_IP_PKTINFO)
- if (af == AF_INET && cmsg->cmsg_level == IPPROTO_IP &&
+ if (af == AF_INET &&
+ cmsg->cmsg_level == IPPROTO_IP &&
cmsg->cmsg_type == IP_PKTINFO) {
struct in_pktinfo *pktinfo;
break;
}
#elif defined(HAVE_IP_RECVDSTADDR)
- if (af == AF_INET && cmsg->cmsg_level == IPPROTO_IP &&
+ if (af == AF_INET &&
+ cmsg->cmsg_level == IPPROTO_IP &&
cmsg->cmsg_type == IP_RECVDSTADDR) {
struct in_addr *addr;
#else
#error "Unsupported socket API"
#endif
- if (af == AF_INET6 && cmsg->cmsg_level == IPPROTO_IPV6 &&
+ if (af == AF_INET6 &&
+ cmsg->cmsg_level == IPPROTO_IPV6 &&
cmsg->cmsg_type == IPV6_PKTINFO) {
struct in6_pktinfo *pktinfo;
}
#endif /* MSG_MCAST */
if (bad_addr(af, &src)) {
- log_debug("%s: invalid source address: %s", __func__,
- log_addr(af, &src));
+ log_debug("%s: invalid source address: %s", __func__, log_addr(af, &src));
return;
}
ifindex = getsockopt_ifindex(af, &m);
/* check packet size */
len = (uint16_t)r;
if (len < (LDP_HDR_SIZE + LDP_MSG_SIZE) || len > LDP_MAX_LEN) {
- log_debug("%s: bad packet size, source %s", __func__,
- log_addr(af, &src));
+ log_debug("%s: bad packet size, source %s", __func__, log_addr(af, &src));
return;
}
*/
if (errno == ENFILE || errno == EMFILE) {
accept_pause();
- } else if (errno != EWOULDBLOCK && errno != EINTR &&
- errno != ECONNABORTED)
- log_debug("%s: accept error: %s", __func__,
- strerror(errno));
+ } else if (errno != EWOULDBLOCK && errno != EINTR && errno != ECONNABORTED)
+ log_debug("%s: accept error: %s", __func__, strerror(errno));
return;
}
sock_set_nonblock(newfd);
max_pdu_len = nbr->max_pdu_len;
else
max_pdu_len = LDP_MAX_LEN;
- if (pdu_len < (LDP_HDR_PDU_LEN + LDP_MSG_SIZE) ||
- pdu_len > max_pdu_len) {
+ if (pdu_len < (LDP_HDR_PDU_LEN + LDP_MSG_SIZE) || pdu_len > max_pdu_len) {
session_shutdown(nbr, S_BAD_PDU_LEN, 0, 0);
free(buf);
return;
}
pdu_len -= LDP_HDR_PDU_LEN;
- if (ldp_hdr->lsr_id != nbr->id.s_addr ||
- ldp_hdr->lspace_id != 0) {
+ if (ldp_hdr->lsr_id != nbr->id.s_addr || ldp_hdr->lspace_id != 0) {
session_shutdown(nbr, S_BAD_LDP_ID, 0, 0);
free(buf);
return;
msg = (struct ldp_msg *)pdu;
type = ntohs(msg->type);
msg_len = ntohs(msg->length);
- if (msg_len < LDP_MSG_LEN ||
- (msg_len + LDP_MSG_DEAD_LEN) > pdu_len) {
- session_shutdown(nbr, S_BAD_MSG_LEN, msg->id,
- msg->type);
+ if (msg_len < LDP_MSG_LEN || (msg_len + LDP_MSG_DEAD_LEN) > pdu_len) {
+ session_shutdown(nbr, S_BAD_MSG_LEN, msg->id, msg->type);
free(buf);
return;
}
case MSG_TYPE_INIT:
if ((nbr->state != NBR_STA_INITIAL) &&
(nbr->state != NBR_STA_OPENSENT)) {
- session_shutdown(nbr, S_SHUTDOWN,
- msg->id, msg->type);
+ session_shutdown(nbr, S_SHUTDOWN, msg->id, msg->type);
free(buf);
return;
}
case MSG_TYPE_KEEPALIVE:
if ((nbr->state == NBR_STA_INITIAL) ||
(nbr->state == NBR_STA_OPENSENT)) {
- session_shutdown(nbr, S_SHUTDOWN,
- msg->id, msg->type);
+ session_shutdown(nbr, S_SHUTDOWN, msg->id, msg->type);
free(buf);
return;
}
break;
default:
if (nbr->state != NBR_STA_OPER) {
- session_shutdown(nbr, S_SHUTDOWN,
- msg->id, msg->type);
+ session_shutdown(nbr, S_SHUTDOWN, msg->id, msg->type);
free(buf);
return;
}
case MSG_TYPE_LABELWITHDRAW:
case MSG_TYPE_LABELRELEASE:
case MSG_TYPE_LABELABORTREQ:
- ret = recv_labelmessage(nbr, pdu, msg_size,
- type);
+ ret = recv_labelmessage(nbr, pdu, msg_size, type);
break;
default:
log_debug("%s: unknown LDP message from nbr %pI4",
__func__, &nbr->id);
if (!(ntohs(msg->type) & UNKNOWN_FLAG)) {
nbr->stats.unknown_msg++;
- send_notification(nbr->tcp,
- S_UNKNOWN_MSG, msg->id, msg->type);
+ send_notification(nbr->tcp, S_UNKNOWN_MSG, msg->id, msg->type);
}
/* ignore the message */
ret = 0;
void
session_close(struct nbr *nbr)
{
- log_debug("%s: closing session with lsr-id %pI4", __func__,
- &nbr->id);
+ log_debug("%s: closing session with lsr-id %pI4", __func__, &nbr->id);
ldp_sync_fsm_nbr_event(nbr, LDP_SYNC_EVT_SESSION_CLOSE);
struct pending_conn *pconn;
TAILQ_FOREACH(pconn, &global.pending_conns, entry)
- if (af == pconn->af &&
- ldp_addrcmp(af, addr, &pconn->addr) == 0)
+ if (af == pconn->af && ldp_addrcmp(af, addr, &pconn->addr) == 0)
return (pconn);
return (NULL);