diff options
author | henning <henning@openbsd.org> | 2012-09-18 10:11:52 +0000 |
---|---|---|
committer | henning <henning@openbsd.org> | 2012-09-18 10:11:52 +0000 |
commit | 08263cb1b79db2a3882e28adb4bf1ab2f466a144 (patch) | |
tree | bab510e3b895c2a2d154b32cfb3e96b830b5337b /usr.sbin/ftp-proxy | |
parent | Print the wieght in the show rib detail output. OK sthen@, henning@ (diff) | |
download | wireguard-openbsd-08263cb1b79db2a3882e28adb4bf1ab2f466a144.tar.xz wireguard-openbsd-08263cb1b79db2a3882e28adb4bf1ab2f466a144.zip |
prio 0 is valid, therefore, I chose an "impossible" value for prio meaning
"not set" and used a PF_PRIO_NOTSET define for it. now that means that
everything that creates a struct pf_rule doesn't get away with bzero'ing it,
which turned out to be not so nice. so get rid of PF_PRIO_NOTSET, instead,
make a rule+state flag PFSTATE_SETPRIO which indicates wether the prio
should be set. ok benno claudio mikeb
Diffstat (limited to 'usr.sbin/ftp-proxy')
-rw-r--r-- | usr.sbin/ftp-proxy/filter.c | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/usr.sbin/ftp-proxy/filter.c b/usr.sbin/ftp-proxy/filter.c index 2709ee66683..25ecc8208b9 100644 --- a/usr.sbin/ftp-proxy/filter.c +++ b/usr.sbin/ftp-proxy/filter.c @@ -1,4 +1,4 @@ -/* $OpenBSD: filter.c,v 1.19 2012/07/07 16:24:32 henning Exp $ */ +/* $OpenBSD: filter.c,v 1.20 2012/09/18 10:11:53 henning Exp $ */ /* * Copyright (c) 2004, 2005 Camiel Dobbelaar, <cd@sentia.nl> @@ -207,7 +207,6 @@ prepare_rule(u_int32_t id, struct sockaddr *src, pfr.rule.dst.addr.type = PF_ADDR_ADDRMASK; pfr.rule.nat.addr.type = PF_ADDR_NONE; pfr.rule.rdr.addr.type = PF_ADDR_NONE; - pfr.rule.set_prio[0] = pfr.rule.set_prio[1] = PF_PRIO_NOTSET; if (src->sa_family == AF_INET) { memcpy(&pfr.rule.src.addr.v.a.addr.v4, |