done:
if (frrtrace_enabled(frr_bgp, input_filter)) {
- char pfxprint[PREFIX_STRLEN_EXTENDED];
+ char pfxprint[PREFIX2STR_BUFFER];
prefix2str(p, pfxprint, sizeof(pfxprint));
frrtrace(5, frr_bgp, input_filter, peer, pfxprint, afi, safi,
}
if (frrtrace_enabled(frr_bgp, output_filter)) {
- char pfxprint[PREFIX_STRLEN_EXTENDED];
+ char pfxprint[PREFIX2STR_BUFFER];
prefix2str(p, pfxprint, sizeof(pfxprint));
frrtrace(5, frr_bgp, output_filter, peer, pfxprint, afi, safi,
int paths_eq, do_mpath;
bool debug;
struct list mp_list;
- char pfx_buf[PREFIX_STRLEN_EXTENDED] = {};
+ char pfx_buf[PREFIX2STR_BUFFER] = {};
char path_buf[PATH_ADDPATH_STR_BUFFER];
bgp_mp_list_init(&mp_list);
int allowas_in = 0;
if (frrtrace_enabled(frr_bgp, process_update)) {
- char pfxprint[PREFIX_STRLEN_EXTENDED];
+ char pfxprint[PREFIX2STR_BUFFER];
prefix2str(p, pfxprint, sizeof(pfxprint));
frrtrace(6, frr_bgp, process_update, peer, pfxprint, addpath_id,
struct vty *vty, json_object *json, bool wide)
{
int len = 0;
- char buf[PREFIX_STRLEN_EXTENDED];
+ char buf[INET6_ADDRSTRLEN];
if (p->family == AF_INET) {
if (!json) {
const char *prefix2str(union prefixconstptr pu, char *str, int size)
{
const struct prefix *p = pu.p;
- char buf[PREFIX_STRLEN_EXTENDED];
+ char buf[PREFIX2STR_BUFFER];
int byte, tmp, a, b;
bool z = false;
size_t l;
static ssize_t prefixhost2str(struct fbuf *fbuf, union prefixconstptr pu)
{
const struct prefix *p = pu.p;
- char buf[PREFIX_STRLEN_EXTENDED];
+ char buf[PREFIX2STR_BUFFER];
switch (p->family) {
case AF_INET:
if (host_only)
return prefixhost2str(buf, (struct prefix *)ptr);
else {
- char cbuf[PREFIX_STRLEN_EXTENDED];
+ char cbuf[PREFIX_STRLEN];
prefix2str(ptr, cbuf, sizeof(cbuf));
return bputs(buf, cbuf);
/* Maximum string length of the result of prefix2str */
#define PREFIX_STRLEN 80
-/* Maximum string length of the result of prefix2str for
- * long string prefixes (eg. BGP Link-State)
- */
-#define PREFIX_STRLEN_EXTENDED 512
-
/*
* Longest possible length of a (S,G) string is 34 bytes
* 123.123.123.123 = 15 * 2