ovs_be32 saddr = htonl(0);
uint32_t flags;
- flags = TNL_F_DF_DEFAULT | TNL_F_HDR_CACHE;
+ if (!strcmp(type, "capwap")) {
+ VLOG_WARN_ONCE("CAPWAP tunnel support is deprecated.");
+ }
+
+ flags = TNL_F_DF_DEFAULT;
if (!strcmp(type, "gre") || !strcmp(type, "gre64")) {
is_gre = true;
} else if (!strcmp(type, "ipsec_gre") || !strcmp(type, "ipsec_gre64")) {
is_gre = true;
is_ipsec = true;
flags |= TNL_F_IPSEC;
- flags &= ~TNL_F_HDR_CACHE;
}
SMAP_FOR_EACH (node, args) {
}
} else if (!strcmp(node->key, "pmtud")) {
if (!strcmp(node->value, "true")) {
+ VLOG_WARN_ONCE("%s: The tunnel Path MTU discovery is "
+ "deprecated and may be removed in February "
+ "2013. Please email dev@openvswitch.org with "
+ "concerns.", name);
flags |= TNL_F_PMTUD;
}
- } else if (!strcmp(node->key, "header_cache")) {
- if (!strcmp(node->value, "false")) {
- flags &= ~TNL_F_HDR_CACHE;
- }
} else if (!strcmp(node->key, "peer_cert") && is_ipsec) {
if (smap_get(args, "certificate")) {
ipsec_mech_set = true;
return error;
}
- flags = nl_attr_get_u32(a[OVS_TUNNEL_ATTR_FLAGS]);
- if (!(flags & TNL_F_HDR_CACHE) == !(flags & TNL_F_IPSEC)) {
- smap_add(args, "header_cache",
- flags & TNL_F_HDR_CACHE ? "true" : "false");
- }
daddr = nl_attr_get_be32(a[OVS_TUNNEL_ATTR_DST_IPV4]);
smap_add_format(args, "remote_ip", IP_FMT, IP_ARGS(&daddr));
}
}
+ flags = nl_attr_get_u32(a[OVS_TUNNEL_ATTR_FLAGS]);
if (flags & TNL_F_TTL_INHERIT) {
smap_add(args, "ttl", "inherit");
} else if (a[OVS_TUNNEL_ATTR_TTL]) {