diff options
author | Rui Salvaterra <rsalvaterra@gmail.com> | 2020-10-19 17:11:10 +0100 |
---|---|---|
committer | Rui Salvaterra <rsalvaterra@gmail.com> | 2021-03-23 09:18:33 +0000 |
commit | a4355a6faea2c4d59c90cd52851fa9aab4ccee5c (patch) | |
tree | f11eb3d8aa73087b515eae231ead35076febde4f | |
parent | edd0dc5829b4d948fb878d667e2135662d98e011 (diff) | |
download | firewall3-a4355a6faea2c4d59c90cd52851fa9aab4ccee5c.tar.gz |
firewall3: clean up the flow table detection logic
We don't need an extra boolean.
Signed-off-by: Rui Salvaterra <rsalvaterra@gmail.com>
-rw-r--r-- | defaults.c | 8 |
1 files changed, 2 insertions, 6 deletions
@@ -91,8 +91,8 @@ check_target(struct uci_element *e, bool *available, const char *target, const b if (!b) { warn_elem(e, "requires unavailable target extension %s, disabling", target); + *available = false; } - *available = b; } static void @@ -126,7 +126,6 @@ fw3_load_defaults(struct fw3_state *state, struct uci_package *p) struct uci_element *e; struct fw3_defaults *defs = &state->defaults; - bool flow_offload_avaliable = false; bool seen = false; defs->tcp_reject_code = FW3_REJECT_CODE_TCP_RESET; @@ -163,10 +162,7 @@ fw3_load_defaults(struct fw3_state *state, struct uci_package *p) check_any_reject_code(e, &defs->any_reject_code); /* exists in both ipv4 and ipv6, if at all, so only check ipv4 */ - check_target(e, &flow_offload_avaliable, "FLOWOFFLOAD", false); - - if (!flow_offload_avaliable) - defs->flow_offloading = false; + check_target(e, &defs->flow_offloading, "FLOWOFFLOAD", false); } } |