return 0;
/* MPLS carries UN address in next hop */
rfapiNexthop2Prefix(attr, p);
- if (p->family != 0)
+ if (p->family != AF_UNSPEC)
return 0;
return ENOENT;
return 0;
default:
if (p)
- p->family = 0;
+ p->family = AF_UNSPEC;
#ifdef DEBUG_ENCAP_MONITOR
vnc_zlog_debug_verbose(
"%s: bpi->extra->vnc.import.un_family is 0, no UN addr",
bpi1->extra->vnc.import.un.addr6;
break;
default:
- pfx_un1.family = 0;
+ pfx_un1.family = AF_UNSPEC;
break;
}
}
bpi2->extra->vnc.import.un.addr6;
break;
default:
- pfx_un2.family = 0;
+ pfx_un2.family = AF_UNSPEC;
break;
}
}
}
- if (pfx_un1.family == 0 || pfx_un2.family == 0)
+ if (pfx_un1.family == AF_UNSPEC || pfx_un2.family == AF_UNSPEC)
return 0;
if (pfx_un1.family != pfx_un2.family)
struct prefix p;
/* MPLS carries UN address in next hop */
rfapiNexthop2Prefix(bpi->attr, &p);
- if (p.family != 0) {
+ if (p.family != AF_UNSPEC) {
rfapiQprefix2Raddr(&p, &new->un_address);
have_vnc_tunnel_un = 1;
}
default:
zlog_warn("%s: invalid encap nexthop length: %d", __func__,
encap_bpi->attr->mp_nexthop_len);
- vpn_bpi->extra->vnc.import.un_family = 0;
+ vpn_bpi->extra->vnc.import.un_family = AF_UNSPEC;
break;
}
}
__func__);
return 1;
}
- vpn_bpi->extra->vnc.import.un_family = 0;
+ vpn_bpi->extra->vnc.import.un_family = AF_UNSPEC;
memset(&vpn_bpi->extra->vnc.import.un, 0,
sizeof(vpn_bpi->extra->vnc.import.un));
if (CHECK_FLAG(vpn_bpi->flags, BGP_PATH_VALID)) {
/* Not a big deal, just means VPN route got here first */
vnc_zlog_debug_verbose("%s: no encap route for vn addr %pFX",
__func__, &vn_prefix);
- info_new->extra->vnc.import.un_family = 0;
+ info_new->extra->vnc.import.un_family = AF_UNSPEC;
}
if (rn) {