tmp_addr.p.prefixlen = p->prefixlen;
} else {
/* Here we need to find out which nexthop to be used*/
- if (attr->flag & ATTR_FLAG_BIT(BGP_ATTR_NEXT_HOP)) {
+ if (CHECK_FLAG(attr->flag, ATTR_FLAG_BIT(BGP_ATTR_NEXT_HOP))) {
tmp_addr.p.u.prefix4 = attr->nexthop;
tmp_addr.p.prefixlen = IPV4_MAX_BITLEN;
- } else if ((attr->mp_nexthop_len)
- && ((attr->mp_nexthop_len
- == BGP_ATTR_NHLEN_IPV4)
- || (attr->mp_nexthop_len
- == BGP_ATTR_NHLEN_VPNV4))) {
+ } else if ((attr->mp_nexthop_len) &&
+ ((attr->mp_nexthop_len == BGP_ATTR_NHLEN_IPV4) ||
+ (attr->mp_nexthop_len == BGP_ATTR_NHLEN_VPNV4))) {
tmp_addr.p.u.prefix4 =
attr->mp_nexthop_global_in;
tmp_addr.p.prefixlen = IPV4_MAX_BITLEN;
memset(&tmp_tip, 0, sizeof(tmp_tip));
tmp_tip.addr = attr->nexthop;
- if (attr->flag & ATTR_FLAG_BIT(BGP_ATTR_NEXT_HOP)) {
+ if (CHECK_FLAG(attr->flag, ATTR_FLAG_BIT(BGP_ATTR_NEXT_HOP))) {
tmp_tip.addr = attr->nexthop;
} else if ((attr->mp_nexthop_len) &&
- ((attr->mp_nexthop_len == BGP_ATTR_NHLEN_IPV4)
- || (attr->mp_nexthop_len == BGP_ATTR_NHLEN_VPNV4))) {
+ ((attr->mp_nexthop_len == BGP_ATTR_NHLEN_IPV4) ||
+ (attr->mp_nexthop_len == BGP_ATTR_NHLEN_VPNV4))) {
tmp_tip.addr = attr->mp_nexthop_global_in;
}
if (bgp_debug_neighbor_events(peer)) {
char buf[INET6_BUFSIZ];
- zlog_debug(
- "%pBP rcvd %s %s seq %u %s/%d ge %d le %d%s",
- peer,
- (common & ORF_COMMON_PART_REMOVE
- ? "Remove"
- : "Add"),
- (common & ORF_COMMON_PART_DENY
- ? "deny"
- : "permit"),
- orfp.seq,
- inet_ntop(
- orfp.p.family,
- &orfp.p.u.prefix,
- buf,
- INET6_BUFSIZ),
- orfp.p.prefixlen,
- orfp.ge, orfp.le,
- ok ? "" : " MALFORMED");
+ zlog_debug("%pBP rcvd %s %s seq %u %s/%d ge %d le %d%s",
+ peer,
+ (CHECK_FLAG(common, ORF_COMMON_PART_REMOVE)
+ ? "Remove"
+ : "Add"),
+ (CHECK_FLAG(common, ORF_COMMON_PART_DENY)
+ ? "deny"
+ : "permit"),
+ orfp.seq,
+ inet_ntop(orfp.p.family, &orfp.p.u.prefix,
+ buf, INET6_BUFSIZ),
+ orfp.p.prefixlen, orfp.ge, orfp.le,
+ ok ? "" : " MALFORMED");
}
if (ok)
- ret = prefix_bgp_orf_set(
- name, afi, &orfp,
- (common & ORF_COMMON_PART_DENY
- ? 0
- : 1),
- (common & ORF_COMMON_PART_REMOVE
- ? 0
- : 1));
+ ret = prefix_bgp_orf_set(name, afi, &orfp,
+ (CHECK_FLAG(common,
+ ORF_COMMON_PART_DENY)
+ ? 0
+ : 1),
+ (CHECK_FLAG(common,
+ ORF_COMMON_PART_REMOVE)
+ ? 0
+ : 1));
if (!ok || (ok && ret != CMD_SUCCESS)) {
zlog_info(
if (bgp_debug_neighbor_events(peer))
zlog_debug("%s OPEN has %s capability for afi/safi: %s/%s%s%s",
- peer->host,
- lookup_msg(capcode_str, hdr->code,
- NULL),
- iana_afi2str(pkt_afi),
- iana_safi2str(pkt_safi),
- (bac.flags & BGP_ADDPATH_RX)
- ? ", receive"
- : "",
- (bac.flags & BGP_ADDPATH_TX)
- ? ", transmit"
- : "");
+ peer->host, lookup_msg(capcode_str, hdr->code, NULL),
+ iana_afi2str(pkt_afi), iana_safi2str(pkt_safi),
+ CHECK_FLAG(bac.flags, BGP_ADDPATH_RX) ? ", receive" : "",
+ CHECK_FLAG(bac.flags, BGP_ADDPATH_TX) ? ", transmit"
+ : "");
if (bgp_map_afi_safi_iana2int(pkt_afi, pkt_safi, &afi,
&safi)) {