disp_status.c revision 7c478bd95313f5f23a4c958a745db2134aa03244
/*
* Copyright 2002 Sun Microsystems, Inc. All rights reserved.
* Use is subject to license terms.
*/
#pragma ident "%Z%%M% %I% %E% SMI"
/*
* Copyright 1993 by OpenVision Technologies, Inc.
*
* Permission to use, copy, modify, distribute, and sell this software
* and its documentation for any purpose is hereby granted without fee,
* provided that the above copyright notice appears in all copies and
* that both that copyright notice and this permission notice appear in
* supporting documentation, and that the name of OpenVision not be used
* in advertising or publicity pertaining to distribution of the software
* without specific, written prior permission. OpenVision makes no
* representations about the suitability of this software for any
* purpose. It is provided "as is" without express or implied warranty.
*
* OPENVISION DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE,
* INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO
* EVENT SHALL OPENVISION BE LIABLE FOR ANY SPECIAL, INDIRECT OR
* CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF
* USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR
* OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
* PERFORMANCE OF THIS SOFTWARE.
*/
#include <gssapiP_krb5.h>
#include <com_err.h>
/* XXXX internationalization!! */
/* Solaris Kerberos does not dynamically load the error tables */
#if 0
static int init_et = 0;
#endif
/*ARGSUSED*/
OM_uint32
krb5_gss_display_status(ctx, minor_status, status_value, status_type,
mech_type, message_context, status_string)
void *ctx;
OM_uint32 *minor_status;
OM_uint32 status_value;
int status_type;
gss_OID mech_type;
OM_uint32 *message_context;
gss_buffer_t status_string;
{
OM_uint32 major_status = 0;
/* Solaris Kerberos: for MT safety, we avoid the use of a default
* context via kg_get_context() */
#if 0
if (GSS_ERROR(kg_get_context(minor_status, (krb5_context*) &context)))
return(GSS_S_FAILURE);
#endif
mutex_lock(&krb5_mutex);
status_string->length = 0;
status_string->value = NULL;
if ((mech_type != GSS_C_NULL_OID) &&
!g_OID_equal(gss_mech_krb5_v2, mech_type) &&
!g_OID_equal(gss_mech_krb5, mech_type) &&
!g_OID_equal(gss_mech_krb5_old, mech_type)) {
*minor_status = 0;
mutex_unlock(&krb5_mutex);
return(GSS_S_BAD_MECH);
}
if (status_type == GSS_C_GSS_CODE) {
major_status = g_display_major_status(minor_status, status_value,
message_context, status_string);
mutex_unlock(&krb5_mutex);
return(major_status);
} else if (status_type == GSS_C_MECH_CODE) {
/* Solaris Kerberos does not dynamically load the error tables */
#if 0
if (!init_et) {
initialize_k5g_error_table();
init_et = 1;
}
#endif
if (*message_context) {
*minor_status = (OM_uint32) G_BAD_MSG_CTX;
mutex_unlock(&krb5_mutex);
return(GSS_S_FAILURE);
}
major_status = g_display_com_err_status(minor_status, status_value,
status_string);
mutex_unlock(&krb5_mutex);
return(major_status);
} else {
*minor_status = 0;
mutex_unlock(&krb5_mutex);
return(GSS_S_BAD_STATUS);
}
}