Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

eigrpd: remove workarounds for old BSDs #5969

Closed
wants to merge 1 commit into from
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
eigrpd: remove workarounds for old BSDs
Signed-off-by: Ruben Kerkhof <ruben@rubenkerkhof.com>
  • Loading branch information
rubenk committed Mar 11, 2020
commit a38b0c9c5a26325682d378f8431f871a676aacb0
18 changes: 0 additions & 18 deletions eigrpd/eigrp_packet.c
Original file line number Diff line number Diff line change
Expand Up @@ -749,24 +749,6 @@ static struct stream *eigrp_recv_packet(struct eigrp *eigrp,

ip_len = iph->ip_len;

#if !defined(GNU_LINUX) && (OpenBSD < 200311) && (__FreeBSD_version < 1000000)
/*
* Kernel network code touches incoming IP header parameters,
* before protocol specific processing.
*
* 1) Convert byteorder to host representation.
* --> ip_len, ip_id, ip_off
*
* 2) Adjust ip_len to strip IP header size!
* --> If user process receives entire IP packet via RAW
* socket, it must consider adding IP header size to
* the "ip_len" field of "ip" structure.
*
* For more details, see <netinet/ip_input.c>.
*/
ip_len = ip_len + (iph->ip_hl << 2);
#endif

#if defined(__DragonFly__)
/*
* in DragonFly's raw socket, ip_len/ip_off are read
Expand Down