1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
|
/* Can't include krb5.h here, or k5-int.h which includes it, because
krb5.h needs to be generated with error tables, after util/et,
which builds after this directory. */
#include <stdarg.h>
#include <string.h>
#include <stdlib.h>
#include <stdio.h>
#include "k5-err.h"
#include "k5-thread.h"
#include "k5-platform.h"
/* It would be nice to just use error_message() always. Pity that
it's defined in a library that depends on this one, and we're not
allowed to make circular dependencies. */
/* We really want a rwlock here, since we should hold it while calling
the function and copying out its results. But I haven't
implemented shims for rwlock yet. */
static k5_mutex_t krb5int_error_info_support_mutex =
K5_MUTEX_PARTIAL_INITIALIZER;
static const char *(KRB5_CALLCONV *fptr)(long); /* = &error_message */
int
krb5int_err_init (void)
{
return k5_mutex_finish_init (&krb5int_error_info_support_mutex);
}
#define initialize() krb5int_call_thread_support_init()
#define lock() k5_mutex_lock(&krb5int_error_info_support_mutex)
#define unlock() k5_mutex_unlock(&krb5int_error_info_support_mutex)
void
krb5int_set_error (struct errinfo *ep, long code, const char *fmt, ...)
{
va_list args;
va_start (args, fmt);
krb5int_vset_error (ep, code, fmt, args);
va_end (args);
}
void
krb5int_vset_error (struct errinfo *ep, long code,
const char *fmt, va_list args)
{
if (ep->msg && ep->msg != ep->scratch_buf) {
free (ep->msg);
ep->msg = NULL;
}
ep->code = code;
#ifdef HAVE_VASPRINTF
{
char *str = NULL;
if (vasprintf(&str, fmt, args) >= 0 && str != NULL) {
ep->msg = str;
return;
}
}
#endif
vsnprintf(ep->scratch_buf, sizeof(ep->scratch_buf), fmt, args);
ep->msg = ep->scratch_buf;
}
char *
krb5int_get_error (struct errinfo *ep, long code)
{
char *r, *r2;
if (code != ep->code)
krb5int_clear_error (ep);
if (ep->msg) {
r = ep->msg;
ep->msg = NULL;
return r;
}
if (initialize() != 0) {
strncpy(ep->scratch_buf, _("Kerberos library initialization failure"),
sizeof(ep->scratch_buf));
ep->scratch_buf[sizeof(ep->scratch_buf)-1] = 0;
ep->msg = NULL;
return ep->scratch_buf;
}
lock();
if (fptr == NULL) {
unlock();
#ifdef HAVE_STRERROR_R
if (strerror_r (code, ep->scratch_buf, sizeof(ep->scratch_buf)) == 0)
return ep->scratch_buf;
/* If strerror_r didn't work with the 1K buffer, we can try a
really big one. This seems kind of gratuitous though. */
#define BIG_ERR_BUFSIZ 8192
r = malloc(BIG_ERR_BUFSIZ);
if (r) {
if (strerror_r (code, r, BIG_ERR_BUFSIZ) == 0) {
r2 = realloc (r, 1 + strlen(r));
if (r2)
return r2;
return r;
}
free (r);
}
#endif
r = strerror (code);
if (r) {
if (strlen (r) < sizeof (ep->scratch_buf)
|| (r2 = strdup (r)) == NULL) {
strncpy (ep->scratch_buf, r, sizeof(ep->scratch_buf));
return ep->scratch_buf;
} else
return r2;
}
format_number:
sprintf (ep->scratch_buf, _("error %ld"), code);
return ep->scratch_buf;
}
r = fptr(code);
if (r == NULL) {
unlock();
goto format_number;
}
r2 = strdup (r);
if (r2 == NULL) {
strncpy(ep->scratch_buf, r, sizeof(ep->scratch_buf));
unlock();
return ep->scratch_buf;
} else {
unlock();
return r2;
}
}
void
krb5int_free_error (struct errinfo *ep, char *msg)
{
if (msg != ep->scratch_buf)
free (msg);
}
void
krb5int_clear_error (struct errinfo *ep)
{
krb5int_free_error (ep, ep->msg);
ep->msg = NULL;
}
void
krb5int_set_error_info_callout_fn (const char *(KRB5_CALLCONV *f)(long))
{
initialize();
lock();
fptr = f;
unlock();
}
|