case 'X':
flags |= LARGE;
+ /* fallthrough */
case 'x':
base = 16;
break;
val2 = val = mask->val;
goto step;
case PM_ASN_EXPR:
- ASSERT(0);
+ bug("Expressions should be evaluated on AS path mask construction.");
case PM_ASN_RANGE:
val = mask->val;
val2 = mask->val2;
case BFD_AUTH_METICULOUS_KEYED_MD5:
case BFD_AUTH_METICULOUS_KEYED_SHA1:
meticulous = 1;
+ /* fallthrough */
case BFD_AUTH_KEYED_MD5:
case BFD_AUTH_KEYED_SHA1:
case BFD_AUTH_METICULOUS_KEYED_MD5:
case BFD_AUTH_METICULOUS_KEYED_SHA1:
meticulous = 1;
+ /* fallthrough */
case BFD_AUTH_KEYED_MD5:
case BFD_AUTH_KEYED_SHA1:
ospf_neigh_sm(n, INM_2WAYREC);
if (n->state != NEIGHBOR_EXSTART)
return;
+ /* fallthrough */
case NEIGHBOR_EXSTART:
if ((ifa->type != OSPF_IT_VLINK) &&
he->domain = 1; /* Abuse domain field to mark the LSA */
hex[jx++] = he;
}
+ /* fallthrough */
default:
accept = 0;
}
return;
}
strncpy(auth->password, pass->password, sizeof(auth->password));
+ /* fallthrough */
case OSPF_AUTH_NONE:
{
{
case RA_EV_CHANGE:
radv_invalidate(ifa);
+ /* fallthrough */
case RA_EV_INIT:
ifa->initial = MAX_INITIAL_RTR_ADVERTISEMENTS;
radv_prepare_prefixes(ifa);
{
u16 must_be_ffff;
u16 auth_type;
- char password[0];
- u16 packet_len;
- u8 key_id;
- u8 auth_len;
- u32 seq_num;
- u32 unused1;
- u32 unused2;
+ union {
+ char password[16];
+ struct {
+ u16 packet_len;
+ u8 key_id;
+ u8 auth_len;
+ u32 seq_num;
+ u32 unused1;
+ u32 unused2;
+ };
+ };
};
/* Authentication tail, RFC 4822 */
default:
return SSH_ERROR;
}
- }
+ } /* fallthrough */
case SK_SSH_SERVER_KNOWN:
{
if (!server_identity_is_ok)
return SSH_ERROR;
}
- }
+ } /* fallthrough */
case SK_SSH_USERAUTH:
{
default:
return SSH_ERROR;
}
- }
+ } /* fallthrough */
case SK_SSH_CHANNEL:
{
s->ssh->channel = ssh_channel_new(s->ssh->session);
if (s->ssh->channel == NULL)
return SSH_ERROR;
- }
+ } /* fallthrough */
case SK_SSH_SESSION:
{
default:
return SSH_ERROR;
}
- }
+ } /* fallthrough */
case SK_SSH_SUBSYSTEM:
{
return SSH_ERROR;
}
}
- }
+ } /* fallthrough */
case SK_SSH_ESTABLISHED:
s->ssh->state = SK_SSH_ESTABLISHED;
switch (e->u.krt.src)
{
case KRT_SRC_BIRD:
- ASSERT(0); /* Should be filtered by the back end */
+ /* Should be filtered by the back end */
+ bug("BIRD originated routes should not get here.");
case KRT_SRC_REDIRECT:
if (new)