-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 21/11/11 13:07, Gert Doering wrote:
> hi,
> 
> On Mon, Nov 21, 2011 at 12:59:25PM +0100, David Sommerseth wrote:
>> As the body of the check_subnet_conflict() function was disabled
>> with an #if 0 clause, remove this function and clean up all places
>> this function was called.
>> 
>> This function also expected get_default_gateway() to return data, 
>> which it does not do any more.  Hence this function is "out-of-date"
>> and no longer usefull.
> 
> I agree with the assessment, but come to a different conclusion - I
> think the functionality is worthwile to have, so maybe we should try
> to repair it, instead of throwing it out completely.
> 
> Meeting topic?

Agreed, lets put this on the agenda.  I've Cc'ed James, so that he can
have a look at it too.

This warning feature got disabled in
commit 7fb0e07ec3f7c5f6514523085dbe02ea6b8933e2 [1], which refactored a
lot of the depending code of check_subnet_conflict().  We would need to
fix get_default_gateway() again.  And further figure out what the reason
for all those false positives.

This commit doesn't change any behaviour, as this code is already removed
via the #if 0.  Hopefully most compilers won't bring in calls to an empty
function (which is the current state of check_subnet_conflict() now)



kind regards,

David Sommerseth


[1]
<http://openvpn.git.sourceforge.net/git/gitweb.cgi?p=openvpn/openvpn-testing.git;a=commitdiff;h=7fb0e07ec3f7c5f6514523085dbe02ea6b8933e2>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk7KQbkACgkQDC186MBRfrotHQCfWSA/TXLueXP5+fp3pjlDXBcp
f2YAnjRuuc7WbPtT1Mgn+GtZbUC+Ewwp
=k46c
-----END PGP SIGNATURE-----

Reply via email to