fn->fec.u.ipv6.prefixlen) != FILTER_PERMIT)
return (NO_LABEL);
break;
- default:
+ case FEC_TYPE_PWID:
break;
}
fn->fec.u.ipv6.prefixlen) != FILTER_PERMIT)
return (MPLS_LABEL_IMPLICIT_NULL);
return MPLS_LABEL_IPV6_EXPLICIT_NULL;
- default:
+ case FEC_TYPE_PWID:
break;
}
}
prefix->u.prefix6 = fec->u.ipv6.prefix;
prefix->prefixlen = fec->u.ipv6.prefixlen;
break;
- default:
+ case FEC_TYPE_PWID:
prefix->family = AF_UNSPEC;
break;
}
if (!ln->v6_enabled)
return;
break;
- default:
+ case FEC_TYPE_PWID:
fatalx("lde_send_labelrequest: unknown af");
}
} else
if (lde_addr->af != AF_INET6)
continue;
break;
- default:
+ case FEC_TYPE_PWID:
continue;
}
rtctl.prefix.v6 = fn->fec.u.ipv6.prefix;
rtctl.prefixlen = fn->fec.u.ipv6.prefixlen;
break;
- default:
+ case FEC_TYPE_PWID:
continue;
}
fec.u.ipv6.prefixlen) != FILTER_PERMIT)
return;
break;
- default:
+ case FEC_TYPE_PWID:
break;
}
lde_send_notification(ln, S_LOOP_DETECTED, map->msg_id,
htons(MSG_TYPE_LABELREQUEST));
return;
- default:
+ case FEC_TYPE_PWID:
break;
}
}
int
pfkey_establish(struct nbr *nbr, struct nbr_params *nbrp)
{
- if (nbrp->auth.method == AUTH_NONE)
- return (0);
-
switch (nbr->auth.method) {
case AUTH_MD5SIG:
strlcpy(nbr->auth.md5key, nbrp->auth.md5key,
sizeof(nbr->auth.md5key));
- return (pfkey_md5sig_establish(nbr, nbrp));
- default:
- break;
+ return pfkey_md5sig_establish(nbr, nbrp);
+ case AUTH_NONE:
+ return 0;
}
- return (0);
+ assert(!"Reached end of function where we are not expecting to");
}
int
pfkey_remove(struct nbr *nbr)
{
- if (nbr->auth.method == AUTH_NONE || !nbr->auth.established)
- return (0);
+ if (!nbr->auth.established)
+ return 0;
switch (nbr->auth.method) {
case AUTH_MD5SIG:
- return (pfkey_md5sig_remove(nbr));
- default:
+ return pfkey_md5sig_remove(nbr);
+ case AUTH_NONE:
+ return 0;
break;
}
- return (0);
+ assert(!"Reached end of function where we are not expecting to");
}
int