1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
|
/* Can't include krb5.h here, or k5-int.h which includes it, because
krb5.h needs to be generated with error tables, after util/et,
which builds after this directory. */
#include <stdarg.h>
#include <string.h>
#include <stdlib.h>
#include <stdio.h>
#include "k5-err.h"
#include "k5-thread.h"
#include "k5-platform.h"
#include "supp-int.h"
#ifdef USE_KIM
#include "kim_string_private.h"
#endif
/* It would be nice to just use error_message() always. Pity that
it's defined in a library that depends on this one, and we're not
allowed to make circular dependencies. */
/* We really want a rwlock here, since we should hold it while calling
the function and copying out its results. But I haven't
implemented shims for rwlock yet. */
static k5_mutex_t krb5int_error_info_support_mutex =
K5_MUTEX_PARTIAL_INITIALIZER;
static const char *(KRB5_CALLCONV *fptr)(long); /* = &error_message */
int
krb5int_err_init (void)
{
return k5_mutex_finish_init (&krb5int_error_info_support_mutex);
}
#define initialize() krb5int_call_thread_support_init()
#define lock() k5_mutex_lock(&krb5int_error_info_support_mutex)
#define unlock() k5_mutex_unlock(&krb5int_error_info_support_mutex)
void
krb5int_set_error (struct errinfo *ep, long code, const char *fmt, ...)
{
va_list args;
va_start (args, fmt);
krb5int_vset_error (ep, code, fmt, args);
va_end (args);
}
void
krb5int_vset_error (struct errinfo *ep, long code,
const char *fmt, va_list args)
{
va_list args2;
char *str = NULL;
const char *loc_fmt = NULL;
#ifdef USE_KIM
/* Try to localize the format string */
if (kim_os_string_create_localized(&loc_fmt, fmt) != KIM_NO_ERROR) {
loc_fmt = fmt;
}
#else
loc_fmt = fmt;
#endif
/* try vasprintf first */
va_copy(args2, args);
if (vasprintf(&str, loc_fmt, args2) < 0) {
str = NULL;
}
va_end(args2);
/* If that failed, try using scratch_buf */
if (str == NULL) {
vsnprintf(ep->scratch_buf, sizeof(ep->scratch_buf), loc_fmt, args);
str = strdup(ep->scratch_buf); /* try allocating again */
}
/* free old string before setting new one */
if (ep->msg && ep->msg != ep->scratch_buf) {
free ((char *) ep->msg);
ep->msg = NULL;
}
ep->code = code;
ep->msg = str ? str : ep->scratch_buf;
#ifdef USE_KIM
if (loc_fmt != fmt) { kim_string_free(&loc_fmt); }
#else
if (loc_fmt != fmt) { free((char *) loc_fmt); }
#endif
}
const char *
krb5int_get_error (struct errinfo *ep, long code)
{
char *r, *r2;
if (code == ep->code && ep->msg) {
r = strdup(ep->msg);
if (r == NULL) {
strlcpy(ep->scratch_buf, _("Out of memory"),
sizeof(ep->scratch_buf));
r = ep->scratch_buf;
}
return r;
}
if (initialize() != 0) {
strncpy(ep->scratch_buf, _("Kerberos library initialization failure"),
sizeof(ep->scratch_buf));
ep->scratch_buf[sizeof(ep->scratch_buf)-1] = 0;
ep->msg = NULL;
return ep->scratch_buf;
}
if (lock())
goto no_fptr;
if (fptr == NULL) {
unlock();
no_fptr:
#ifdef HAVE_STRERROR_R
if (strerror_r (code, ep->scratch_buf, sizeof(ep->scratch_buf)) == 0) {
char *p = strdup(ep->scratch_buf);
if (p)
return p;
return ep->scratch_buf;
}
/* If strerror_r didn't work with the 1K buffer, we can try a
really big one. This seems kind of gratuitous though. */
#define BIG_ERR_BUFSIZ 8192
r = malloc(BIG_ERR_BUFSIZ);
if (r) {
if (strerror_r (code, r, BIG_ERR_BUFSIZ) == 0) {
r2 = realloc (r, 1 + strlen(r));
if (r2)
return r2;
return r;
}
free (r);
}
#endif
r = strerror (code);
if (r) {
if (strlen (r) < sizeof (ep->scratch_buf)
|| (r2 = strdup (r)) == NULL) {
strncpy (ep->scratch_buf, r, sizeof(ep->scratch_buf));
return ep->scratch_buf;
} else
return r2;
}
format_number:
snprintf (ep->scratch_buf, sizeof(ep->scratch_buf),
_("error %ld"), code);
return ep->scratch_buf;
}
r = (char *) fptr(code);
if (r == NULL) {
unlock();
goto format_number;
}
r2 = strdup(r);
if (r2 == NULL) {
strncpy(ep->scratch_buf, r, sizeof(ep->scratch_buf));
unlock();
return ep->scratch_buf;
} else {
unlock();
return r2;
}
}
void
krb5int_free_error (struct errinfo *ep, const char *msg)
{
if (msg != ep->scratch_buf)
free ((char *) msg);
}
void
krb5int_clear_error (struct errinfo *ep)
{
krb5int_free_error (ep, ep->msg);
ep->msg = NULL;
}
void
krb5int_set_error_info_callout_fn (const char *(KRB5_CALLCONV *f)(long))
{
initialize();
if (lock() == 0) {
fptr = f;
unlock();
}
}
|