{
struct ifreq ifr;
int fd;
- int err;
strcpy(ifr.ifr_name, dev);
fd = socket(AF_INET, SOCK_DGRAM, 0);
- err = ioctl(fd, SIOCGIFINDEX, &ifr);
- if (err) {
- perror("ioctl");
+ if (ioctl(fd, SIOCGIFINDEX, &ifr)) {
+ perror_msg("ioctl");
return 0;
}
close(fd);
{
struct ifreq ifr;
int fd;
- int err;
strcpy(ifr.ifr_name, dev);
fd = socket(AF_INET, SOCK_DGRAM, 0);
- err = ioctl(fd, SIOCGIFHWADDR, &ifr);
- if (err) {
- perror("ioctl");
+ if (ioctl(fd, SIOCGIFHWADDR, &ifr)) {
+ perror_msg("ioctl");
return -1;
}
close(fd);
}
-static char * do_ioctl_get_ifname(int idx)
+static char *do_ioctl_get_ifname(int idx)
{
static struct ifreq ifr;
int fd;
- int err;
ifr.ifr_ifindex = idx;
fd = socket(AF_INET, SOCK_DGRAM, 0);
- err = ioctl(fd, SIOCGIFNAME, &ifr);
- if (err) {
- perror("ioctl");
+ if (ioctl(fd, SIOCGIFNAME, &ifr)) {
+ perror_msg("ioctl");
return NULL;
}
close(fd);
ifr.ifr_ifru.ifru_data = (void*)p;
fd = socket(AF_INET, SOCK_DGRAM, 0);
err = ioctl(fd, SIOCGETTUNNEL, &ifr);
- if (err)
- perror("ioctl");
+ if (err) {
+ perror_msg("ioctl");
+ }
close(fd);
return err;
}
int fd;
int err;
- if (cmd == SIOCCHGTUNNEL && p->name[0])
+ if (cmd == SIOCCHGTUNNEL && p->name[0]) {
strcpy(ifr.ifr_name, p->name);
- else
+ } else {
strcpy(ifr.ifr_name, basedev);
+ }
ifr.ifr_ifru.ifru_data = (void*)p;
fd = socket(AF_INET, SOCK_DGRAM, 0);
err = ioctl(fd, cmd, &ifr);
- if (err)
- perror("ioctl");
+ if (err) {
+ perror_msg("ioctl");
+ }
close(fd);
return err;
}
int fd;
int err;
- if (p->name[0])
+ if (p->name[0]) {
strcpy(ifr.ifr_name, p->name);
- else
+ } else {
strcpy(ifr.ifr_name, basedev);
+ }
ifr.ifr_ifru.ifru_data = (void*)p;
fd = socket(AF_INET, SOCK_DGRAM, 0);
err = ioctl(fd, SIOCDELTUNNEL, &ifr);
- if (err)
- perror("ioctl");
+ if (err) {
+ perror_msg("ioctl");
+ }
close(fd);
return err;
}
{
int count = 0;
char medium[IFNAMSIZ];
-
memset(p, 0, sizeof(*p));
memset(&medium, 0, sizeof(medium));
if (strcmp(*argv, "ipip") == 0 ||
strcmp(*argv, "ip/ip") == 0) {
if (p->iph.protocol && p->iph.protocol != IPPROTO_IPIP) {
- fprintf(stderr,"You managed to ask for more than one tunnel mode.\n");
+ error_msg("You managed to ask for more than one tunnel mode.");
exit(-1);
}
p->iph.protocol = IPPROTO_IPIP;
} else if (strcmp(*argv, "gre") == 0 ||
strcmp(*argv, "gre/ip") == 0) {
if (p->iph.protocol && p->iph.protocol != IPPROTO_GRE) {
- fprintf(stderr,"You managed to ask for more than one tunnel mode.\n");
+ error_msg("You managed to ask for more than one tunnel mode.");
exit(-1);
}
p->iph.protocol = IPPROTO_GRE;
} else if (strcmp(*argv, "sit") == 0 ||
strcmp(*argv, "ipv6/ip") == 0) {
if (p->iph.protocol && p->iph.protocol != IPPROTO_IPV6) {
- fprintf(stderr,"You managed to ask for more than one tunnel mode.\n");
+ error_msg("You managed to ask for more than one tunnel mode.");
exit(-1);
}
p->iph.protocol = IPPROTO_IPV6;
} else {
- fprintf(stderr,"Cannot guess tunnel mode.\n");
+ error_msg("Cannot guess tunnel mode.");
exit(-1);
}
} else if (strcmp(*argv, "key") == 0) {
p->i_key = p->o_key = get_addr32(*argv);
else {
if (get_unsigned(&uval, *argv, 0)<0) {
- fprintf(stderr, "invalid value of \"key\"\n");
+ error_msg("invalid value of \"key\"");
exit(-1);
}
p->i_key = p->o_key = htonl(uval);
p->o_key = get_addr32(*argv);
else {
if (get_unsigned(&uval, *argv, 0)<0) {
- fprintf(stderr, "invalid value of \"ikey\"\n");
+ error_msg("invalid value of \"ikey\"");
exit(-1);
}
p->i_key = htonl(uval);
p->o_key = get_addr32(*argv);
else {
if (get_unsigned(&uval, *argv, 0)<0) {
- fprintf(stderr, "invalid value of \"okey\"\n");
+ error_msg("invalid value of \"okey\"");
exit(-1);
}
p->o_key = htonl(uval);
if (p->iph.protocol == IPPROTO_IPIP || p->iph.protocol == IPPROTO_IPV6) {
if ((p->i_flags & GRE_KEY) || (p->o_flags & GRE_KEY)) {
- fprintf(stderr, "Keys are not allowed with ipip and sit.\n");
+ error_msg("Keys are not allowed with ipip and sit.");
return -1;
}
}
p->o_flags |= GRE_KEY;
}
if (IN_MULTICAST(ntohl(p->iph.daddr)) && !p->iph.saddr) {
- fprintf(stderr, "Broadcast tunnel requires a source address.\n");
+ error_msg("Broadcast tunnel requires a source address.");
return -1;
}
return 0;
return -1;
if (p.iph.ttl && p.iph.frag_off == 0) {
- fprintf(stderr, "ttl != 0 and noptmudisc are incompatible\n");
+ error_msg("ttl != 0 and noptmudisc are incompatible");
return -1;
}
case IPPROTO_IPV6:
return do_add_ioctl(cmd, "sit0", &p);
default:
- fprintf(stderr, "cannot determine tunnel mode (ipip, gre or sit)\n");
+ error_msg("cannot determine tunnel mode (ipip, gre or sit)");
return -1;
}
return -1;
buf[sizeof(buf) - 1] = 0;
if ((ptr = strchr(buf, ':')) == NULL ||
(*ptr++ = 0, sscanf(buf, "%s", name) != 1)) {
- fprintf(stderr, "Wrong format of /proc/net/dev. Sorry.\n");
+ error_msg("Wrong format of /proc/net/dev. Sorry.");
return -1;
}
if (sscanf(ptr, "%ld%ld%ld%ld%ld%ld%ld%*d%ld%ld%ld%ld%ld%ld%ld",
continue;
type = do_ioctl_get_iftype(name);
if (type == -1) {
- fprintf(stderr, "Failed to get type of [%s]\n", name);
+ error_msg("Failed to get type of [%s]", name);
continue;
}
if (type != ARPHRD_TUNNEL && type != ARPHRD_IPGRE && type != ARPHRD_SIT)
} else
return do_show(0, NULL);
- fprintf(stderr, "Command \"%s\" is unknown, try \"ip tunnel help\".\n", *argv);
+ error_msg("Command \"%s\" is unknown, try \"ip tunnel help\".", *argv);
exit(-1);
}