mirror of
https://github.com/moparisthebest/curl
synced 2024-12-23 16:48:49 -05:00
880cd5dd20
Instead of using a fixed 256 byte buffer in the connectdata struct. In my build, this reduces the size of the connectdata struct by 11.8%, from 2160 to 1904 bytes with no functionality or performance loss. This also fixes a bug in schannel's Curl_verify_certificate where it called Curl_sspi_strerror when it should have called Curl_strerror for string from GetLastError. the only effect would have been no text or the wrong text being shown for the error. Co-authored-by: Jay Satiro Closes #3612
1103 lines
28 KiB
C
1103 lines
28 KiB
C
/***************************************************************************
|
|
* _ _ ____ _
|
|
* Project ___| | | | _ \| |
|
|
* / __| | | | |_) | |
|
|
* | (__| |_| | _ <| |___
|
|
* \___|\___/|_| \_\_____|
|
|
*
|
|
* Copyright (C) 2004 - 2019, Daniel Stenberg, <daniel@haxx.se>, et al.
|
|
*
|
|
* This software is licensed as described in the file COPYING, which
|
|
* you should have received as part of this distribution. The terms
|
|
* are also available at https://curl.haxx.se/docs/copyright.html.
|
|
*
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
*
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
* KIND, either express or implied.
|
|
*
|
|
***************************************************************************/
|
|
|
|
#include "curl_setup.h"
|
|
|
|
#ifdef HAVE_STRERROR_R
|
|
# if (!defined(HAVE_POSIX_STRERROR_R) && \
|
|
!defined(HAVE_GLIBC_STRERROR_R) && \
|
|
!defined(HAVE_VXWORKS_STRERROR_R)) || \
|
|
(defined(HAVE_POSIX_STRERROR_R) && defined(HAVE_VXWORKS_STRERROR_R)) || \
|
|
(defined(HAVE_GLIBC_STRERROR_R) && defined(HAVE_VXWORKS_STRERROR_R)) || \
|
|
(defined(HAVE_POSIX_STRERROR_R) && defined(HAVE_GLIBC_STRERROR_R))
|
|
# error "strerror_r MUST be either POSIX, glibc or vxworks-style"
|
|
# endif
|
|
#endif
|
|
|
|
#include <curl/curl.h>
|
|
|
|
#ifdef USE_LIBIDN2
|
|
#include <idn2.h>
|
|
#endif
|
|
|
|
#ifdef USE_WINDOWS_SSPI
|
|
#include "curl_sspi.h"
|
|
#endif
|
|
|
|
#include "strerror.h"
|
|
/* The last 3 #include files should be in this order */
|
|
#include "curl_printf.h"
|
|
#include "curl_memory.h"
|
|
#include "memdebug.h"
|
|
|
|
#if defined(WIN32) || defined(_WIN32_WCE)
|
|
#define PRESERVE_WINDOWS_ERROR_CODE
|
|
#endif
|
|
|
|
const char *
|
|
curl_easy_strerror(CURLcode error)
|
|
{
|
|
#ifndef CURL_DISABLE_VERBOSE_STRINGS
|
|
switch(error) {
|
|
case CURLE_OK:
|
|
return "No error";
|
|
|
|
case CURLE_UNSUPPORTED_PROTOCOL:
|
|
return "Unsupported protocol";
|
|
|
|
case CURLE_FAILED_INIT:
|
|
return "Failed initialization";
|
|
|
|
case CURLE_URL_MALFORMAT:
|
|
return "URL using bad/illegal format or missing URL";
|
|
|
|
case CURLE_NOT_BUILT_IN:
|
|
return "A requested feature, protocol or option was not found built-in in"
|
|
" this libcurl due to a build-time decision.";
|
|
|
|
case CURLE_COULDNT_RESOLVE_PROXY:
|
|
return "Couldn't resolve proxy name";
|
|
|
|
case CURLE_COULDNT_RESOLVE_HOST:
|
|
return "Couldn't resolve host name";
|
|
|
|
case CURLE_COULDNT_CONNECT:
|
|
return "Couldn't connect to server";
|
|
|
|
case CURLE_WEIRD_SERVER_REPLY:
|
|
return "Weird server reply";
|
|
|
|
case CURLE_REMOTE_ACCESS_DENIED:
|
|
return "Access denied to remote resource";
|
|
|
|
case CURLE_FTP_ACCEPT_FAILED:
|
|
return "FTP: The server failed to connect to data port";
|
|
|
|
case CURLE_FTP_ACCEPT_TIMEOUT:
|
|
return "FTP: Accepting server connect has timed out";
|
|
|
|
case CURLE_FTP_PRET_FAILED:
|
|
return "FTP: The server did not accept the PRET command.";
|
|
|
|
case CURLE_FTP_WEIRD_PASS_REPLY:
|
|
return "FTP: unknown PASS reply";
|
|
|
|
case CURLE_FTP_WEIRD_PASV_REPLY:
|
|
return "FTP: unknown PASV reply";
|
|
|
|
case CURLE_FTP_WEIRD_227_FORMAT:
|
|
return "FTP: unknown 227 response format";
|
|
|
|
case CURLE_FTP_CANT_GET_HOST:
|
|
return "FTP: can't figure out the host in the PASV response";
|
|
|
|
case CURLE_HTTP2:
|
|
return "Error in the HTTP2 framing layer";
|
|
|
|
case CURLE_FTP_COULDNT_SET_TYPE:
|
|
return "FTP: couldn't set file type";
|
|
|
|
case CURLE_PARTIAL_FILE:
|
|
return "Transferred a partial file";
|
|
|
|
case CURLE_FTP_COULDNT_RETR_FILE:
|
|
return "FTP: couldn't retrieve (RETR failed) the specified file";
|
|
|
|
case CURLE_QUOTE_ERROR:
|
|
return "Quote command returned error";
|
|
|
|
case CURLE_HTTP_RETURNED_ERROR:
|
|
return "HTTP response code said error";
|
|
|
|
case CURLE_WRITE_ERROR:
|
|
return "Failed writing received data to disk/application";
|
|
|
|
case CURLE_UPLOAD_FAILED:
|
|
return "Upload failed (at start/before it took off)";
|
|
|
|
case CURLE_READ_ERROR:
|
|
return "Failed to open/read local data from file/application";
|
|
|
|
case CURLE_OUT_OF_MEMORY:
|
|
return "Out of memory";
|
|
|
|
case CURLE_OPERATION_TIMEDOUT:
|
|
return "Timeout was reached";
|
|
|
|
case CURLE_FTP_PORT_FAILED:
|
|
return "FTP: command PORT failed";
|
|
|
|
case CURLE_FTP_COULDNT_USE_REST:
|
|
return "FTP: command REST failed";
|
|
|
|
case CURLE_RANGE_ERROR:
|
|
return "Requested range was not delivered by the server";
|
|
|
|
case CURLE_HTTP_POST_ERROR:
|
|
return "Internal problem setting up the POST";
|
|
|
|
case CURLE_SSL_CONNECT_ERROR:
|
|
return "SSL connect error";
|
|
|
|
case CURLE_BAD_DOWNLOAD_RESUME:
|
|
return "Couldn't resume download";
|
|
|
|
case CURLE_FILE_COULDNT_READ_FILE:
|
|
return "Couldn't read a file:// file";
|
|
|
|
case CURLE_LDAP_CANNOT_BIND:
|
|
return "LDAP: cannot bind";
|
|
|
|
case CURLE_LDAP_SEARCH_FAILED:
|
|
return "LDAP: search failed";
|
|
|
|
case CURLE_FUNCTION_NOT_FOUND:
|
|
return "A required function in the library was not found";
|
|
|
|
case CURLE_ABORTED_BY_CALLBACK:
|
|
return "Operation was aborted by an application callback";
|
|
|
|
case CURLE_BAD_FUNCTION_ARGUMENT:
|
|
return "A libcurl function was given a bad argument";
|
|
|
|
case CURLE_INTERFACE_FAILED:
|
|
return "Failed binding local connection end";
|
|
|
|
case CURLE_TOO_MANY_REDIRECTS :
|
|
return "Number of redirects hit maximum amount";
|
|
|
|
case CURLE_UNKNOWN_OPTION:
|
|
return "An unknown option was passed in to libcurl";
|
|
|
|
case CURLE_TELNET_OPTION_SYNTAX :
|
|
return "Malformed telnet option";
|
|
|
|
case CURLE_GOT_NOTHING:
|
|
return "Server returned nothing (no headers, no data)";
|
|
|
|
case CURLE_SSL_ENGINE_NOTFOUND:
|
|
return "SSL crypto engine not found";
|
|
|
|
case CURLE_SSL_ENGINE_SETFAILED:
|
|
return "Can not set SSL crypto engine as default";
|
|
|
|
case CURLE_SSL_ENGINE_INITFAILED:
|
|
return "Failed to initialise SSL crypto engine";
|
|
|
|
case CURLE_SEND_ERROR:
|
|
return "Failed sending data to the peer";
|
|
|
|
case CURLE_RECV_ERROR:
|
|
return "Failure when receiving data from the peer";
|
|
|
|
case CURLE_SSL_CERTPROBLEM:
|
|
return "Problem with the local SSL certificate";
|
|
|
|
case CURLE_SSL_CIPHER:
|
|
return "Couldn't use specified SSL cipher";
|
|
|
|
case CURLE_PEER_FAILED_VERIFICATION:
|
|
return "SSL peer certificate or SSH remote key was not OK";
|
|
|
|
case CURLE_SSL_CACERT_BADFILE:
|
|
return "Problem with the SSL CA cert (path? access rights?)";
|
|
|
|
case CURLE_BAD_CONTENT_ENCODING:
|
|
return "Unrecognized or bad HTTP Content or Transfer-Encoding";
|
|
|
|
case CURLE_LDAP_INVALID_URL:
|
|
return "Invalid LDAP URL";
|
|
|
|
case CURLE_FILESIZE_EXCEEDED:
|
|
return "Maximum file size exceeded";
|
|
|
|
case CURLE_USE_SSL_FAILED:
|
|
return "Requested SSL level failed";
|
|
|
|
case CURLE_SSL_SHUTDOWN_FAILED:
|
|
return "Failed to shut down the SSL connection";
|
|
|
|
case CURLE_SSL_CRL_BADFILE:
|
|
return "Failed to load CRL file (path? access rights?, format?)";
|
|
|
|
case CURLE_SSL_ISSUER_ERROR:
|
|
return "Issuer check against peer certificate failed";
|
|
|
|
case CURLE_SEND_FAIL_REWIND:
|
|
return "Send failed since rewinding of the data stream failed";
|
|
|
|
case CURLE_LOGIN_DENIED:
|
|
return "Login denied";
|
|
|
|
case CURLE_TFTP_NOTFOUND:
|
|
return "TFTP: File Not Found";
|
|
|
|
case CURLE_TFTP_PERM:
|
|
return "TFTP: Access Violation";
|
|
|
|
case CURLE_REMOTE_DISK_FULL:
|
|
return "Disk full or allocation exceeded";
|
|
|
|
case CURLE_TFTP_ILLEGAL:
|
|
return "TFTP: Illegal operation";
|
|
|
|
case CURLE_TFTP_UNKNOWNID:
|
|
return "TFTP: Unknown transfer ID";
|
|
|
|
case CURLE_REMOTE_FILE_EXISTS:
|
|
return "Remote file already exists";
|
|
|
|
case CURLE_TFTP_NOSUCHUSER:
|
|
return "TFTP: No such user";
|
|
|
|
case CURLE_CONV_FAILED:
|
|
return "Conversion failed";
|
|
|
|
case CURLE_CONV_REQD:
|
|
return "Caller must register CURLOPT_CONV_ callback options";
|
|
|
|
case CURLE_REMOTE_FILE_NOT_FOUND:
|
|
return "Remote file not found";
|
|
|
|
case CURLE_SSH:
|
|
return "Error in the SSH layer";
|
|
|
|
case CURLE_AGAIN:
|
|
return "Socket not ready for send/recv";
|
|
|
|
case CURLE_RTSP_CSEQ_ERROR:
|
|
return "RTSP CSeq mismatch or invalid CSeq";
|
|
|
|
case CURLE_RTSP_SESSION_ERROR:
|
|
return "RTSP session error";
|
|
|
|
case CURLE_FTP_BAD_FILE_LIST:
|
|
return "Unable to parse FTP file list";
|
|
|
|
case CURLE_CHUNK_FAILED:
|
|
return "Chunk callback failed";
|
|
|
|
case CURLE_NO_CONNECTION_AVAILABLE:
|
|
return "The max connection limit is reached";
|
|
|
|
case CURLE_SSL_PINNEDPUBKEYNOTMATCH:
|
|
return "SSL public key does not match pinned public key";
|
|
|
|
case CURLE_SSL_INVALIDCERTSTATUS:
|
|
return "SSL server certificate status verification FAILED";
|
|
|
|
case CURLE_HTTP2_STREAM:
|
|
return "Stream error in the HTTP/2 framing layer";
|
|
|
|
case CURLE_RECURSIVE_API_CALL:
|
|
return "API function called from within callback";
|
|
|
|
/* error codes not used by current libcurl */
|
|
case CURLE_OBSOLETE20:
|
|
case CURLE_OBSOLETE24:
|
|
case CURLE_OBSOLETE29:
|
|
case CURLE_OBSOLETE32:
|
|
case CURLE_OBSOLETE40:
|
|
case CURLE_OBSOLETE44:
|
|
case CURLE_OBSOLETE46:
|
|
case CURLE_OBSOLETE50:
|
|
case CURLE_OBSOLETE51:
|
|
case CURLE_OBSOLETE57:
|
|
case CURL_LAST:
|
|
break;
|
|
}
|
|
/*
|
|
* By using a switch, gcc -Wall will complain about enum values
|
|
* which do not appear, helping keep this function up-to-date.
|
|
* By using gcc -Wall -Werror, you can't forget.
|
|
*
|
|
* A table would not have the same benefit. Most compilers will
|
|
* generate code very similar to a table in any case, so there
|
|
* is little performance gain from a table. And something is broken
|
|
* for the user's application, anyways, so does it matter how fast
|
|
* it _doesn't_ work?
|
|
*
|
|
* The line number for the error will be near this comment, which
|
|
* is why it is here, and not at the start of the switch.
|
|
*/
|
|
return "Unknown error";
|
|
#else
|
|
if(!error)
|
|
return "No error";
|
|
else
|
|
return "Error";
|
|
#endif
|
|
}
|
|
|
|
const char *
|
|
curl_multi_strerror(CURLMcode error)
|
|
{
|
|
#ifndef CURL_DISABLE_VERBOSE_STRINGS
|
|
switch(error) {
|
|
case CURLM_CALL_MULTI_PERFORM:
|
|
return "Please call curl_multi_perform() soon";
|
|
|
|
case CURLM_OK:
|
|
return "No error";
|
|
|
|
case CURLM_BAD_HANDLE:
|
|
return "Invalid multi handle";
|
|
|
|
case CURLM_BAD_EASY_HANDLE:
|
|
return "Invalid easy handle";
|
|
|
|
case CURLM_OUT_OF_MEMORY:
|
|
return "Out of memory";
|
|
|
|
case CURLM_INTERNAL_ERROR:
|
|
return "Internal error";
|
|
|
|
case CURLM_BAD_SOCKET:
|
|
return "Invalid socket argument";
|
|
|
|
case CURLM_UNKNOWN_OPTION:
|
|
return "Unknown option";
|
|
|
|
case CURLM_ADDED_ALREADY:
|
|
return "The easy handle is already added to a multi handle";
|
|
|
|
case CURLM_RECURSIVE_API_CALL:
|
|
return "API function called from within callback";
|
|
|
|
case CURLM_LAST:
|
|
break;
|
|
}
|
|
|
|
return "Unknown error";
|
|
#else
|
|
if(error == CURLM_OK)
|
|
return "No error";
|
|
else
|
|
return "Error";
|
|
#endif
|
|
}
|
|
|
|
const char *
|
|
curl_share_strerror(CURLSHcode error)
|
|
{
|
|
#ifndef CURL_DISABLE_VERBOSE_STRINGS
|
|
switch(error) {
|
|
case CURLSHE_OK:
|
|
return "No error";
|
|
|
|
case CURLSHE_BAD_OPTION:
|
|
return "Unknown share option";
|
|
|
|
case CURLSHE_IN_USE:
|
|
return "Share currently in use";
|
|
|
|
case CURLSHE_INVALID:
|
|
return "Invalid share handle";
|
|
|
|
case CURLSHE_NOMEM:
|
|
return "Out of memory";
|
|
|
|
case CURLSHE_NOT_BUILT_IN:
|
|
return "Feature not enabled in this library";
|
|
|
|
case CURLSHE_LAST:
|
|
break;
|
|
}
|
|
|
|
return "CURLSHcode unknown";
|
|
#else
|
|
if(error == CURLSHE_OK)
|
|
return "No error";
|
|
else
|
|
return "Error";
|
|
#endif
|
|
}
|
|
|
|
#ifdef USE_WINSOCK
|
|
|
|
/* This function handles most / all (?) Winsock errors curl is able to produce.
|
|
*/
|
|
static const char *
|
|
get_winsock_error (int err, char *buf, size_t len)
|
|
{
|
|
#ifdef PRESERVE_WINDOWS_ERROR_CODE
|
|
DWORD old_win_err = GetLastError();
|
|
#endif
|
|
int old_errno = errno;
|
|
const char *p;
|
|
|
|
#ifndef CURL_DISABLE_VERBOSE_STRINGS
|
|
switch(err) {
|
|
case WSAEINTR:
|
|
p = "Call interrupted";
|
|
break;
|
|
case WSAEBADF:
|
|
p = "Bad file";
|
|
break;
|
|
case WSAEACCES:
|
|
p = "Bad access";
|
|
break;
|
|
case WSAEFAULT:
|
|
p = "Bad argument";
|
|
break;
|
|
case WSAEINVAL:
|
|
p = "Invalid arguments";
|
|
break;
|
|
case WSAEMFILE:
|
|
p = "Out of file descriptors";
|
|
break;
|
|
case WSAEWOULDBLOCK:
|
|
p = "Call would block";
|
|
break;
|
|
case WSAEINPROGRESS:
|
|
case WSAEALREADY:
|
|
p = "Blocking call in progress";
|
|
break;
|
|
case WSAENOTSOCK:
|
|
p = "Descriptor is not a socket";
|
|
break;
|
|
case WSAEDESTADDRREQ:
|
|
p = "Need destination address";
|
|
break;
|
|
case WSAEMSGSIZE:
|
|
p = "Bad message size";
|
|
break;
|
|
case WSAEPROTOTYPE:
|
|
p = "Bad protocol";
|
|
break;
|
|
case WSAENOPROTOOPT:
|
|
p = "Protocol option is unsupported";
|
|
break;
|
|
case WSAEPROTONOSUPPORT:
|
|
p = "Protocol is unsupported";
|
|
break;
|
|
case WSAESOCKTNOSUPPORT:
|
|
p = "Socket is unsupported";
|
|
break;
|
|
case WSAEOPNOTSUPP:
|
|
p = "Operation not supported";
|
|
break;
|
|
case WSAEAFNOSUPPORT:
|
|
p = "Address family not supported";
|
|
break;
|
|
case WSAEPFNOSUPPORT:
|
|
p = "Protocol family not supported";
|
|
break;
|
|
case WSAEADDRINUSE:
|
|
p = "Address already in use";
|
|
break;
|
|
case WSAEADDRNOTAVAIL:
|
|
p = "Address not available";
|
|
break;
|
|
case WSAENETDOWN:
|
|
p = "Network down";
|
|
break;
|
|
case WSAENETUNREACH:
|
|
p = "Network unreachable";
|
|
break;
|
|
case WSAENETRESET:
|
|
p = "Network has been reset";
|
|
break;
|
|
case WSAECONNABORTED:
|
|
p = "Connection was aborted";
|
|
break;
|
|
case WSAECONNRESET:
|
|
p = "Connection was reset";
|
|
break;
|
|
case WSAENOBUFS:
|
|
p = "No buffer space";
|
|
break;
|
|
case WSAEISCONN:
|
|
p = "Socket is already connected";
|
|
break;
|
|
case WSAENOTCONN:
|
|
p = "Socket is not connected";
|
|
break;
|
|
case WSAESHUTDOWN:
|
|
p = "Socket has been shut down";
|
|
break;
|
|
case WSAETOOMANYREFS:
|
|
p = "Too many references";
|
|
break;
|
|
case WSAETIMEDOUT:
|
|
p = "Timed out";
|
|
break;
|
|
case WSAECONNREFUSED:
|
|
p = "Connection refused";
|
|
break;
|
|
case WSAELOOP:
|
|
p = "Loop??";
|
|
break;
|
|
case WSAENAMETOOLONG:
|
|
p = "Name too long";
|
|
break;
|
|
case WSAEHOSTDOWN:
|
|
p = "Host down";
|
|
break;
|
|
case WSAEHOSTUNREACH:
|
|
p = "Host unreachable";
|
|
break;
|
|
case WSAENOTEMPTY:
|
|
p = "Not empty";
|
|
break;
|
|
case WSAEPROCLIM:
|
|
p = "Process limit reached";
|
|
break;
|
|
case WSAEUSERS:
|
|
p = "Too many users";
|
|
break;
|
|
case WSAEDQUOT:
|
|
p = "Bad quota";
|
|
break;
|
|
case WSAESTALE:
|
|
p = "Something is stale";
|
|
break;
|
|
case WSAEREMOTE:
|
|
p = "Remote error";
|
|
break;
|
|
#ifdef WSAEDISCON /* missing in SalfordC! */
|
|
case WSAEDISCON:
|
|
p = "Disconnected";
|
|
break;
|
|
#endif
|
|
/* Extended Winsock errors */
|
|
case WSASYSNOTREADY:
|
|
p = "Winsock library is not ready";
|
|
break;
|
|
case WSANOTINITIALISED:
|
|
p = "Winsock library not initialised";
|
|
break;
|
|
case WSAVERNOTSUPPORTED:
|
|
p = "Winsock version not supported";
|
|
break;
|
|
|
|
/* getXbyY() errors (already handled in herrmsg):
|
|
* Authoritative Answer: Host not found */
|
|
case WSAHOST_NOT_FOUND:
|
|
p = "Host not found";
|
|
break;
|
|
|
|
/* Non-Authoritative: Host not found, or SERVERFAIL */
|
|
case WSATRY_AGAIN:
|
|
p = "Host not found, try again";
|
|
break;
|
|
|
|
/* Non recoverable errors, FORMERR, REFUSED, NOTIMP */
|
|
case WSANO_RECOVERY:
|
|
p = "Unrecoverable error in call to nameserver";
|
|
break;
|
|
|
|
/* Valid name, no data record of requested type */
|
|
case WSANO_DATA:
|
|
p = "No data record of requested type";
|
|
break;
|
|
|
|
default:
|
|
return NULL;
|
|
}
|
|
#else
|
|
if(!err)
|
|
return NULL;
|
|
else
|
|
p = "error";
|
|
#endif
|
|
strncpy(buf, p, len);
|
|
buf [len-1] = '\0';
|
|
|
|
if(errno != old_errno)
|
|
errno = old_errno;
|
|
|
|
#ifdef PRESERVE_WINDOWS_ERROR_CODE
|
|
if(old_win_err != GetLastError())
|
|
SetLastError(old_win_err);
|
|
#endif
|
|
|
|
return buf;
|
|
}
|
|
#endif /* USE_WINSOCK */
|
|
|
|
/*
|
|
* Our thread-safe and smart strerror() replacement.
|
|
*
|
|
* The 'err' argument passed in to this function MUST be a true errno number
|
|
* as reported on this system. We do no range checking on the number before
|
|
* we pass it to the "number-to-message" conversion function and there might
|
|
* be systems that don't do proper range checking in there themselves.
|
|
*
|
|
* We don't do range checking (on systems other than Windows) since there is
|
|
* no good reliable and portable way to do it.
|
|
*/
|
|
const char *Curl_strerror(int err, char *buf, size_t buflen)
|
|
{
|
|
#ifdef PRESERVE_WINDOWS_ERROR_CODE
|
|
DWORD old_win_err = GetLastError();
|
|
#endif
|
|
int old_errno = errno;
|
|
char *p;
|
|
size_t max;
|
|
|
|
DEBUGASSERT(err >= 0);
|
|
|
|
max = buflen - 1;
|
|
*buf = '\0';
|
|
|
|
#ifdef USE_WINSOCK
|
|
|
|
#ifdef _WIN32_WCE
|
|
{
|
|
wchar_t wbuf[256];
|
|
wbuf[0] = L'\0';
|
|
|
|
FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, NULL, err,
|
|
LANG_NEUTRAL, wbuf, sizeof(wbuf)/sizeof(wchar_t), NULL);
|
|
wcstombs(buf, wbuf, max);
|
|
}
|
|
#else
|
|
/* 'sys_nerr' is the maximum errno number, it is not widely portable */
|
|
if(err >= 0 && err < sys_nerr)
|
|
strncpy(buf, strerror(err), max);
|
|
else {
|
|
if(!get_winsock_error(err, buf, max) &&
|
|
!FormatMessageA(FORMAT_MESSAGE_FROM_SYSTEM, NULL, err,
|
|
LANG_NEUTRAL, buf, (DWORD)max, NULL))
|
|
msnprintf(buf, max, "Unknown error %d (%#x)", err, err);
|
|
}
|
|
#endif
|
|
|
|
#else /* not USE_WINSOCK coming up */
|
|
|
|
#if defined(HAVE_STRERROR_R) && defined(HAVE_POSIX_STRERROR_R)
|
|
/*
|
|
* The POSIX-style strerror_r() may set errno to ERANGE if insufficient
|
|
* storage is supplied via 'strerrbuf' and 'buflen' to hold the generated
|
|
* message string, or EINVAL if 'errnum' is not a valid error number.
|
|
*/
|
|
if(0 != strerror_r(err, buf, max)) {
|
|
if('\0' == buf[0])
|
|
msnprintf(buf, max, "Unknown error %d", err);
|
|
}
|
|
#elif defined(HAVE_STRERROR_R) && defined(HAVE_GLIBC_STRERROR_R)
|
|
/*
|
|
* The glibc-style strerror_r() only *might* use the buffer we pass to
|
|
* the function, but it always returns the error message as a pointer,
|
|
* so we must copy that string unconditionally (if non-NULL).
|
|
*/
|
|
{
|
|
char buffer[256];
|
|
char *msg = strerror_r(err, buffer, sizeof(buffer));
|
|
if(msg)
|
|
strncpy(buf, msg, max);
|
|
else
|
|
msnprintf(buf, max, "Unknown error %d", err);
|
|
}
|
|
#elif defined(HAVE_STRERROR_R) && defined(HAVE_VXWORKS_STRERROR_R)
|
|
/*
|
|
* The vxworks-style strerror_r() does use the buffer we pass to the function.
|
|
* The buffer size should be at least NAME_MAX (256)
|
|
*/
|
|
{
|
|
char buffer[256];
|
|
if(OK == strerror_r(err, buffer))
|
|
strncpy(buf, buffer, max);
|
|
else
|
|
msnprintf(buf, max, "Unknown error %d", err);
|
|
}
|
|
#else
|
|
{
|
|
char *msg = strerror(err);
|
|
if(msg)
|
|
strncpy(buf, msg, max);
|
|
else
|
|
msnprintf(buf, max, "Unknown error %d", err);
|
|
}
|
|
#endif
|
|
|
|
#endif /* end of ! USE_WINSOCK */
|
|
|
|
buf[max] = '\0'; /* make sure the string is zero terminated */
|
|
|
|
/* strip trailing '\r\n' or '\n'. */
|
|
p = strrchr(buf, '\n');
|
|
if(p && (p - buf) >= 2)
|
|
*p = '\0';
|
|
p = strrchr(buf, '\r');
|
|
if(p && (p - buf) >= 1)
|
|
*p = '\0';
|
|
|
|
if(errno != old_errno)
|
|
errno = old_errno;
|
|
|
|
#ifdef PRESERVE_WINDOWS_ERROR_CODE
|
|
if(old_win_err != GetLastError())
|
|
SetLastError(old_win_err);
|
|
#endif
|
|
|
|
return buf;
|
|
}
|
|
|
|
#ifdef USE_WINDOWS_SSPI
|
|
const char *Curl_sspi_strerror(int err, char *buf, size_t buflen)
|
|
{
|
|
#ifdef PRESERVE_WINDOWS_ERROR_CODE
|
|
DWORD old_win_err = GetLastError();
|
|
#endif
|
|
int old_errno = errno;
|
|
const char *txt;
|
|
char *outbuf;
|
|
size_t outmax;
|
|
#ifndef CURL_DISABLE_VERBOSE_STRINGS
|
|
char txtbuf[80];
|
|
char msgbuf[256];
|
|
char *p, *str, *msg = NULL;
|
|
bool msg_formatted = FALSE;
|
|
#endif
|
|
|
|
outbuf = buf;
|
|
outmax = buflen - 1;
|
|
*outbuf = '\0';
|
|
|
|
#ifndef CURL_DISABLE_VERBOSE_STRINGS
|
|
|
|
switch(err) {
|
|
case SEC_E_OK:
|
|
txt = "No error";
|
|
break;
|
|
case CRYPT_E_REVOKED:
|
|
txt = "CRYPT_E_REVOKED";
|
|
break;
|
|
case SEC_E_ALGORITHM_MISMATCH:
|
|
txt = "SEC_E_ALGORITHM_MISMATCH";
|
|
break;
|
|
case SEC_E_BAD_BINDINGS:
|
|
txt = "SEC_E_BAD_BINDINGS";
|
|
break;
|
|
case SEC_E_BAD_PKGID:
|
|
txt = "SEC_E_BAD_PKGID";
|
|
break;
|
|
case SEC_E_BUFFER_TOO_SMALL:
|
|
txt = "SEC_E_BUFFER_TOO_SMALL";
|
|
break;
|
|
case SEC_E_CANNOT_INSTALL:
|
|
txt = "SEC_E_CANNOT_INSTALL";
|
|
break;
|
|
case SEC_E_CANNOT_PACK:
|
|
txt = "SEC_E_CANNOT_PACK";
|
|
break;
|
|
case SEC_E_CERT_EXPIRED:
|
|
txt = "SEC_E_CERT_EXPIRED";
|
|
break;
|
|
case SEC_E_CERT_UNKNOWN:
|
|
txt = "SEC_E_CERT_UNKNOWN";
|
|
break;
|
|
case SEC_E_CERT_WRONG_USAGE:
|
|
txt = "SEC_E_CERT_WRONG_USAGE";
|
|
break;
|
|
case SEC_E_CONTEXT_EXPIRED:
|
|
txt = "SEC_E_CONTEXT_EXPIRED";
|
|
break;
|
|
case SEC_E_CROSSREALM_DELEGATION_FAILURE:
|
|
txt = "SEC_E_CROSSREALM_DELEGATION_FAILURE";
|
|
break;
|
|
case SEC_E_CRYPTO_SYSTEM_INVALID:
|
|
txt = "SEC_E_CRYPTO_SYSTEM_INVALID";
|
|
break;
|
|
case SEC_E_DECRYPT_FAILURE:
|
|
txt = "SEC_E_DECRYPT_FAILURE";
|
|
break;
|
|
case SEC_E_DELEGATION_POLICY:
|
|
txt = "SEC_E_DELEGATION_POLICY";
|
|
break;
|
|
case SEC_E_DELEGATION_REQUIRED:
|
|
txt = "SEC_E_DELEGATION_REQUIRED";
|
|
break;
|
|
case SEC_E_DOWNGRADE_DETECTED:
|
|
txt = "SEC_E_DOWNGRADE_DETECTED";
|
|
break;
|
|
case SEC_E_ENCRYPT_FAILURE:
|
|
txt = "SEC_E_ENCRYPT_FAILURE";
|
|
break;
|
|
case SEC_E_ILLEGAL_MESSAGE:
|
|
txt = "SEC_E_ILLEGAL_MESSAGE";
|
|
break;
|
|
case SEC_E_INCOMPLETE_CREDENTIALS:
|
|
txt = "SEC_E_INCOMPLETE_CREDENTIALS";
|
|
break;
|
|
case SEC_E_INCOMPLETE_MESSAGE:
|
|
txt = "SEC_E_INCOMPLETE_MESSAGE";
|
|
break;
|
|
case SEC_E_INSUFFICIENT_MEMORY:
|
|
txt = "SEC_E_INSUFFICIENT_MEMORY";
|
|
break;
|
|
case SEC_E_INTERNAL_ERROR:
|
|
txt = "SEC_E_INTERNAL_ERROR";
|
|
break;
|
|
case SEC_E_INVALID_HANDLE:
|
|
txt = "SEC_E_INVALID_HANDLE";
|
|
break;
|
|
case SEC_E_INVALID_PARAMETER:
|
|
txt = "SEC_E_INVALID_PARAMETER";
|
|
break;
|
|
case SEC_E_INVALID_TOKEN:
|
|
txt = "SEC_E_INVALID_TOKEN";
|
|
break;
|
|
case SEC_E_ISSUING_CA_UNTRUSTED:
|
|
txt = "SEC_E_ISSUING_CA_UNTRUSTED";
|
|
break;
|
|
case SEC_E_ISSUING_CA_UNTRUSTED_KDC:
|
|
txt = "SEC_E_ISSUING_CA_UNTRUSTED_KDC";
|
|
break;
|
|
case SEC_E_KDC_CERT_EXPIRED:
|
|
txt = "SEC_E_KDC_CERT_EXPIRED";
|
|
break;
|
|
case SEC_E_KDC_CERT_REVOKED:
|
|
txt = "SEC_E_KDC_CERT_REVOKED";
|
|
break;
|
|
case SEC_E_KDC_INVALID_REQUEST:
|
|
txt = "SEC_E_KDC_INVALID_REQUEST";
|
|
break;
|
|
case SEC_E_KDC_UNABLE_TO_REFER:
|
|
txt = "SEC_E_KDC_UNABLE_TO_REFER";
|
|
break;
|
|
case SEC_E_KDC_UNKNOWN_ETYPE:
|
|
txt = "SEC_E_KDC_UNKNOWN_ETYPE";
|
|
break;
|
|
case SEC_E_LOGON_DENIED:
|
|
txt = "SEC_E_LOGON_DENIED";
|
|
break;
|
|
case SEC_E_MAX_REFERRALS_EXCEEDED:
|
|
txt = "SEC_E_MAX_REFERRALS_EXCEEDED";
|
|
break;
|
|
case SEC_E_MESSAGE_ALTERED:
|
|
txt = "SEC_E_MESSAGE_ALTERED";
|
|
break;
|
|
case SEC_E_MULTIPLE_ACCOUNTS:
|
|
txt = "SEC_E_MULTIPLE_ACCOUNTS";
|
|
break;
|
|
case SEC_E_MUST_BE_KDC:
|
|
txt = "SEC_E_MUST_BE_KDC";
|
|
break;
|
|
case SEC_E_NOT_OWNER:
|
|
txt = "SEC_E_NOT_OWNER";
|
|
break;
|
|
case SEC_E_NO_AUTHENTICATING_AUTHORITY:
|
|
txt = "SEC_E_NO_AUTHENTICATING_AUTHORITY";
|
|
break;
|
|
case SEC_E_NO_CREDENTIALS:
|
|
txt = "SEC_E_NO_CREDENTIALS";
|
|
break;
|
|
case SEC_E_NO_IMPERSONATION:
|
|
txt = "SEC_E_NO_IMPERSONATION";
|
|
break;
|
|
case SEC_E_NO_IP_ADDRESSES:
|
|
txt = "SEC_E_NO_IP_ADDRESSES";
|
|
break;
|
|
case SEC_E_NO_KERB_KEY:
|
|
txt = "SEC_E_NO_KERB_KEY";
|
|
break;
|
|
case SEC_E_NO_PA_DATA:
|
|
txt = "SEC_E_NO_PA_DATA";
|
|
break;
|
|
case SEC_E_NO_S4U_PROT_SUPPORT:
|
|
txt = "SEC_E_NO_S4U_PROT_SUPPORT";
|
|
break;
|
|
case SEC_E_NO_TGT_REPLY:
|
|
txt = "SEC_E_NO_TGT_REPLY";
|
|
break;
|
|
case SEC_E_OUT_OF_SEQUENCE:
|
|
txt = "SEC_E_OUT_OF_SEQUENCE";
|
|
break;
|
|
case SEC_E_PKINIT_CLIENT_FAILURE:
|
|
txt = "SEC_E_PKINIT_CLIENT_FAILURE";
|
|
break;
|
|
case SEC_E_PKINIT_NAME_MISMATCH:
|
|
txt = "SEC_E_PKINIT_NAME_MISMATCH";
|
|
break;
|
|
case SEC_E_POLICY_NLTM_ONLY:
|
|
txt = "SEC_E_POLICY_NLTM_ONLY";
|
|
break;
|
|
case SEC_E_QOP_NOT_SUPPORTED:
|
|
txt = "SEC_E_QOP_NOT_SUPPORTED";
|
|
break;
|
|
case SEC_E_REVOCATION_OFFLINE_C:
|
|
txt = "SEC_E_REVOCATION_OFFLINE_C";
|
|
break;
|
|
case SEC_E_REVOCATION_OFFLINE_KDC:
|
|
txt = "SEC_E_REVOCATION_OFFLINE_KDC";
|
|
break;
|
|
case SEC_E_SECPKG_NOT_FOUND:
|
|
txt = "SEC_E_SECPKG_NOT_FOUND";
|
|
break;
|
|
case SEC_E_SECURITY_QOS_FAILED:
|
|
txt = "SEC_E_SECURITY_QOS_FAILED";
|
|
break;
|
|
case SEC_E_SHUTDOWN_IN_PROGRESS:
|
|
txt = "SEC_E_SHUTDOWN_IN_PROGRESS";
|
|
break;
|
|
case SEC_E_SMARTCARD_CERT_EXPIRED:
|
|
txt = "SEC_E_SMARTCARD_CERT_EXPIRED";
|
|
break;
|
|
case SEC_E_SMARTCARD_CERT_REVOKED:
|
|
txt = "SEC_E_SMARTCARD_CERT_REVOKED";
|
|
break;
|
|
case SEC_E_SMARTCARD_LOGON_REQUIRED:
|
|
txt = "SEC_E_SMARTCARD_LOGON_REQUIRED";
|
|
break;
|
|
case SEC_E_STRONG_CRYPTO_NOT_SUPPORTED:
|
|
txt = "SEC_E_STRONG_CRYPTO_NOT_SUPPORTED";
|
|
break;
|
|
case SEC_E_TARGET_UNKNOWN:
|
|
txt = "SEC_E_TARGET_UNKNOWN";
|
|
break;
|
|
case SEC_E_TIME_SKEW:
|
|
txt = "SEC_E_TIME_SKEW";
|
|
break;
|
|
case SEC_E_TOO_MANY_PRINCIPALS:
|
|
txt = "SEC_E_TOO_MANY_PRINCIPALS";
|
|
break;
|
|
case SEC_E_UNFINISHED_CONTEXT_DELETED:
|
|
txt = "SEC_E_UNFINISHED_CONTEXT_DELETED";
|
|
break;
|
|
case SEC_E_UNKNOWN_CREDENTIALS:
|
|
txt = "SEC_E_UNKNOWN_CREDENTIALS";
|
|
break;
|
|
case SEC_E_UNSUPPORTED_FUNCTION:
|
|
txt = "SEC_E_UNSUPPORTED_FUNCTION";
|
|
break;
|
|
case SEC_E_UNSUPPORTED_PREAUTH:
|
|
txt = "SEC_E_UNSUPPORTED_PREAUTH";
|
|
break;
|
|
case SEC_E_UNTRUSTED_ROOT:
|
|
txt = "SEC_E_UNTRUSTED_ROOT";
|
|
break;
|
|
case SEC_E_WRONG_CREDENTIAL_HANDLE:
|
|
txt = "SEC_E_WRONG_CREDENTIAL_HANDLE";
|
|
break;
|
|
case SEC_E_WRONG_PRINCIPAL:
|
|
txt = "SEC_E_WRONG_PRINCIPAL";
|
|
break;
|
|
case SEC_I_COMPLETE_AND_CONTINUE:
|
|
txt = "SEC_I_COMPLETE_AND_CONTINUE";
|
|
break;
|
|
case SEC_I_COMPLETE_NEEDED:
|
|
txt = "SEC_I_COMPLETE_NEEDED";
|
|
break;
|
|
case SEC_I_CONTEXT_EXPIRED:
|
|
txt = "SEC_I_CONTEXT_EXPIRED";
|
|
break;
|
|
case SEC_I_CONTINUE_NEEDED:
|
|
txt = "SEC_I_CONTINUE_NEEDED";
|
|
break;
|
|
case SEC_I_INCOMPLETE_CREDENTIALS:
|
|
txt = "SEC_I_INCOMPLETE_CREDENTIALS";
|
|
break;
|
|
case SEC_I_LOCAL_LOGON:
|
|
txt = "SEC_I_LOCAL_LOGON";
|
|
break;
|
|
case SEC_I_NO_LSA_CONTEXT:
|
|
txt = "SEC_I_NO_LSA_CONTEXT";
|
|
break;
|
|
case SEC_I_RENEGOTIATE:
|
|
txt = "SEC_I_RENEGOTIATE";
|
|
break;
|
|
case SEC_I_SIGNATURE_NEEDED:
|
|
txt = "SEC_I_SIGNATURE_NEEDED";
|
|
break;
|
|
default:
|
|
txt = "Unknown error";
|
|
}
|
|
|
|
if(err == SEC_E_OK)
|
|
strncpy(outbuf, txt, outmax);
|
|
else if(err == SEC_E_ILLEGAL_MESSAGE)
|
|
msnprintf(outbuf, outmax,
|
|
"SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs "
|
|
"when a fatal SSL/TLS alert is received (e.g. handshake failed)."
|
|
" More detail may be available in the Windows System event log.",
|
|
err);
|
|
else {
|
|
str = txtbuf;
|
|
msnprintf(txtbuf, sizeof(txtbuf), "%s (0x%08X)", txt, err);
|
|
txtbuf[sizeof(txtbuf)-1] = '\0';
|
|
|
|
#ifdef _WIN32_WCE
|
|
{
|
|
wchar_t wbuf[256];
|
|
wbuf[0] = L'\0';
|
|
|
|
if(FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM |
|
|
FORMAT_MESSAGE_IGNORE_INSERTS,
|
|
NULL, err, LANG_NEUTRAL,
|
|
wbuf, sizeof(wbuf)/sizeof(wchar_t), NULL)) {
|
|
wcstombs(msgbuf, wbuf, sizeof(msgbuf)-1);
|
|
msg_formatted = TRUE;
|
|
}
|
|
}
|
|
#else
|
|
if(FormatMessageA(FORMAT_MESSAGE_FROM_SYSTEM |
|
|
FORMAT_MESSAGE_IGNORE_INSERTS,
|
|
NULL, err, LANG_NEUTRAL,
|
|
msgbuf, sizeof(msgbuf)-1, NULL)) {
|
|
msg_formatted = TRUE;
|
|
}
|
|
#endif
|
|
if(msg_formatted) {
|
|
msgbuf[sizeof(msgbuf)-1] = '\0';
|
|
/* strip trailing '\r\n' or '\n' */
|
|
p = strrchr(msgbuf, '\n');
|
|
if(p && (p - msgbuf) >= 2)
|
|
*p = '\0';
|
|
p = strrchr(msgbuf, '\r');
|
|
if(p && (p - msgbuf) >= 1)
|
|
*p = '\0';
|
|
msg = msgbuf;
|
|
}
|
|
if(msg)
|
|
msnprintf(outbuf, outmax, "%s - %s", str, msg);
|
|
else
|
|
strncpy(outbuf, str, outmax);
|
|
}
|
|
|
|
#else
|
|
|
|
if(err == SEC_E_OK)
|
|
txt = "No error";
|
|
else
|
|
txt = "Error";
|
|
|
|
strncpy(outbuf, txt, outmax);
|
|
|
|
#endif
|
|
|
|
outbuf[outmax] = '\0';
|
|
|
|
if(errno != old_errno)
|
|
errno = old_errno;
|
|
|
|
#ifdef PRESERVE_WINDOWS_ERROR_CODE
|
|
if(old_win_err != GetLastError())
|
|
SetLastError(old_win_err);
|
|
#endif
|
|
|
|
return outbuf;
|
|
}
|
|
#endif /* USE_WINDOWS_SSPI */
|