Just remove MACROS and use true/false.
Signed-off-by: Donatas Abraitis <donatas.abraitis@gmail.com>
* and RFC 5065 by eliminating AS_SET and AS_CONFED_SET types,
* and obsoletes RFC 6472.
*/
- if (peer->bgp->reject_as_sets == BGP_REJECT_AS_SETS_ENABLED)
+ if (peer->bgp->reject_as_sets)
if (aspath_check_as_sets(attr->aspath))
return false;
* and RFC 5065 by eliminating AS_SET and AS_CONFED_SET types,
* and obsoletes RFC 6472.
*/
- if (peer->bgp->reject_as_sets == BGP_REJECT_AS_SETS_ENABLED)
+ if (peer->bgp->reject_as_sets)
if (aspath_check_as_sets(attr->aspath)) {
reason =
"as-path contains AS_SET or AS_CONFED_SET type;";
* subsumed by the previously aggregated route) without AS_SET
* or AS_CONFED_SET in the updates.
*/
- if (bgp->reject_as_sets == BGP_REJECT_AS_SETS_ENABLED) {
+ if (bgp->reject_as_sets) {
if (as_set == AGGREGATE_AS_SET) {
as_set_new = AGGREGATE_AS_UNSET;
zlog_warn(
struct listnode *node, *nnode;
struct peer *peer;
- bgp->reject_as_sets = BGP_REJECT_AS_SETS_ENABLED;
+ bgp->reject_as_sets = true;
/* Reset existing BGP sessions to reject routes
* with aspath containing AS_SET or AS_CONFED_SET.
struct listnode *node, *nnode;
struct peer *peer;
- bgp->reject_as_sets = BGP_REJECT_AS_SETS_DISABLED;
+ bgp->reject_as_sets = false;
/* Reset existing BGP sessions to reject routes
* with aspath containing AS_SET or AS_CONFED_SET.
: "no ");
/* draft-ietf-idr-deprecate-as-set-confed-set */
- if (bgp->reject_as_sets == BGP_REJECT_AS_SETS_ENABLED)
+ if (bgp->reject_as_sets)
vty_out(vty, " bgp reject-as-sets\n");
/* BGP default ipv4-unicast. */
bgp->dynamic_neighbors_count = 0;
bgp->lb_ref_bw = BGP_LINK_BW_REF_BW;
bgp->lb_handling = BGP_LINK_BW_ECMP;
- bgp->reject_as_sets = BGP_REJECT_AS_SETS_DISABLED;
+ bgp->reject_as_sets = false;
bgp_addpath_init_bgp_data(&bgp->tx_addpath);
bgp->as = *as;
* Reject aspaths with AS_SET and/or AS_CONFED_SET.
*/
bool reject_as_sets;
-#define BGP_REJECT_AS_SETS_DISABLED 0
-#define BGP_REJECT_AS_SETS_ENABLED 1
struct bgp_evpn_info *evpn_info;