diff options
| author | Donald Sharp <sharpd@cumulusnetworks.com> | 2018-06-14 08:58:05 -0400 | 
|---|---|---|
| committer | David Lamparter <equinox@opensourcerouting.org> | 2018-08-11 17:14:58 +0200 | 
| commit | 0ce1ca805d607cec2c0f75dac8950f40e75fc971 (patch) | |
| tree | bf34e7a0084ae76089d43ee7f2c4ca8eeed62c8a /ospfclient | |
| parent | 1408cdfc07202b2c3e31ad2ef40fae0e8a31e8c0 (diff) | |
*: ALLOC calls cannot fail
There is no need to check for failure of a ALLOC call
as that any failure to do so will result in a assert
happening.  So we can safely remove all of this code.
Signed-off-by: Donald Sharp <sharpd@cumulusnetworks.com>
Diffstat (limited to 'ospfclient')
| -rw-r--r-- | ospfclient/ospf_apiclient.c | 10 | 
1 files changed, 2 insertions, 8 deletions
diff --git a/ospfclient/ospf_apiclient.c b/ospfclient/ospf_apiclient.c index 5b46059d78..db624ae074 100644 --- a/ospfclient/ospf_apiclient.c +++ b/ospfclient/ospf_apiclient.c @@ -570,10 +570,7 @@ static void ospf_apiclient_handle_lsa_update(struct ospf_apiclient *oclient,  	/* Extract LSA from message */  	lsalen = ntohs(cn->data.length);  	lsa = XMALLOC(MTYPE_OSPF_APICLIENT, lsalen); -	if (!lsa) { -		fprintf(stderr, "LSA update: Cannot allocate memory for LSA\n"); -		return; -	} +  	memcpy(lsa, &(cn->data), lsalen);  	/* Invoke registered update callback function */ @@ -598,10 +595,7 @@ static void ospf_apiclient_handle_lsa_delete(struct ospf_apiclient *oclient,  	/* Extract LSA from message */  	lsalen = ntohs(cn->data.length);  	lsa = XMALLOC(MTYPE_OSPF_APICLIENT, lsalen); -	if (!lsa) { -		fprintf(stderr, "LSA delete: Cannot allocate memory for LSA\n"); -		return; -	} +  	memcpy(lsa, &(cn->data), lsalen);  	/* Invoke registered update callback function */  | 
