⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 error.c

📁 OpenVPN -- A Secure tunneling daemon
💻 C
字号:
/* *  OpenVPN -- An application to securely tunnel IP networks *             over a single UDP port, with support for SSL/TLS-based *             session authentication and key exchange, *             packet encryption, packet authentication, and *             packet compression. * *  Copyright (C) 2002-2003 James Yonan <jim@yonan.net> * *  This program is free software; you can redistribute it and/or modify *  it under the terms of the GNU General Public License as published by *  the Free Software Foundation; either version 2 of the License, or *  (at your option) any later version. * *  This program is distributed in the hope that it will be useful, *  but WITHOUT ANY WARRANTY; without even the implied warranty of *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the *  GNU General Public License for more details. * *  You should have received a copy of the GNU General Public License *  along with this program (see the file COPYING included with this *  distribution); if not, write to the Free Software Foundation, Inc., *  59 Temple Place, Suite 330, Boston, MA  02111-1307  USA */#ifdef WIN32#include "config-win32.h"#else#include "config.h"#endif#include "syshead.h"#include "error.h"#include "buffer.h"#include "thread.h"#include "misc.h"#include "openvpn.h"#ifdef USE_CRYPTO#include <openssl/err.h>#endif#include "memdbg.h"/* Globals */unsigned int x_debug_level;/* Mute state */static int mute_cutoff;static int mute_count;static int mute_category;/* Should messages be written to the syslog? */static bool use_syslog;/* If non-null, messages should be written here */static FILE *msgfp;voidset_debug_level (int level){  x_debug_level = level;}voidset_mute_cutoff (int cutoff){  mute_cutoff = cutoff;}voiderror_reset (){  use_syslog = false;  x_debug_level = 1;  mute_cutoff = 0;  mute_count = 0;  mute_category = 0;#ifdef OPENVPN_DEBUG_COMMAND_LINE  msgfp = fopen (OPENVPN_DEBUG_FILE, "w");  if (!msgfp)    exit (OPENVPN_EXIT_STATUS_CANNOT_OPEN_DEBUG_FILE); /* exit point */#else  msgfp = NULL;#endif}/* * Return a file to print messages to before syslog is opened. */FILE *msg_fp(){  FILE *fp = msgfp;  if (!fp)    fp = OPENVPN_MSG_FP;  if (!fp)    exit (OPENVPN_EXIT_STATUS_CANNOT_OPEN_DEBUG_FILE); /* exit point */  return fp;}#define SWAP { tmp = m1; m1 = m2; m2 = tmp; }#define ERR_BUF_SIZE 1024int msg_line_num;void x_msg (unsigned int flags, const char *format, ...){  va_list arglist;#if SYSLOG_CAPABILITY  int level;#endif  char msg1[ERR_BUF_SIZE];  char msg2[ERR_BUF_SIZE];  char *m1;  char *m2;  char *tmp;  int e;#ifndef HAVE_VARARG_MACROS  /* the macro has checked this otherwise */  if (!MSG_TEST(flags))    return;#endif  if (flags & M_ERRNO_SOCK)    e = openvpn_errno_socket ();  else    e = openvpn_errno ();  if (!(flags & M_NOLOCK))    mutex_lock (L_MSG);  /*   * Apply muting filter.   */  if (mute_cutoff > 0 && !(flags & M_NOMUTE))    {      const int mute_level = DECODE_MUTE_LEVEL(flags);      if (mute_level > 0 && mute_level == mute_category)	{	  if (++mute_count > mute_cutoff)	    {	      if (!(flags & M_NOLOCK))		mutex_unlock (L_MSG);	      return;	    }	}      else	{	  const int suppressed = mute_count - mute_cutoff;	  if (suppressed > 0)	    msg (M_INFO | M_NOLOCK | M_NOMUTE,		 "%d variation(s) on previous %d message(s) suppressed by --mute",		 suppressed,		 mute_cutoff);	  mute_count = 1;	  mute_category = mute_level;	}    }  m1 = msg1;  m2 = msg2;  va_start (arglist, format);  vsnprintf (m1, ERR_BUF_SIZE, format, arglist);  va_end (arglist);  m1[ERR_BUF_SIZE - 1] = 0; /* windows vsnprintf needs this */  if ((flags & (M_ERRNO|M_ERRNO_SOCK)) && e)    {      openvpn_snprintf (m2, ERR_BUF_SIZE, "%s: %s (errno=%d)",			m1, strerror_ts (e), e);      SWAP;    }#ifdef USE_CRYPTO  if (flags & M_SSL)    {      int nerrs = 0;      int err;      while ((err = ERR_get_error ()))	{	  openvpn_snprintf (m2, ERR_BUF_SIZE, "%s: %s",			    m1, ERR_error_string (err, NULL));	  SWAP;	  ++nerrs;	}      if (!nerrs)	{	  openvpn_snprintf (m2, ERR_BUF_SIZE, "%s (OpenSSL)", m1);	  SWAP;	}    }#endif#if SYSLOG_CAPABILITY  if (flags & (M_FATAL|M_NONFATAL))    level = LOG_ERR;  else if (flags & M_WARN)    level = LOG_WARNING;  else    level = LOG_NOTICE;#endif  if (use_syslog)    {#if SYSLOG_CAPABILITY      syslog (level, "%s", m1);#endif    }  else    {      FILE *fp = msg_fp();#ifdef USE_PTHREAD      fprintf (fp, "%s %d[%d]: %s\n", time_string (0), msg_line_num, thread_number (), m1);#else      fprintf (fp, "%s %d: %s\n", time_string (0), msg_line_num, m1);#endif      fflush(fp);      ++msg_line_num;    }  if (flags & M_FATAL)    msg (M_INFO | M_NOLOCK, "Exiting");  if (!(flags & M_NOLOCK))    mutex_unlock (L_MSG);    if (flags & M_FATAL)    exit (OPENVPN_EXIT_STATUS_ERROR); /* exit point */}voidassert_failed (const char *filename, int line){  msg (M_FATAL, "Assertion failed at %s:%d", filename, line);}voidopen_syslog (const char *pgmname){#if SYSLOG_CAPABILITY  if (!msgfp)    {      if (!use_syslog)	{	  openlog ((pgmname ? pgmname : "openvpn"), LOG_PID, LOG_DAEMON);	  use_syslog = true;	  /* Better idea: somehow pipe stdout/stderr output to msg() */	  set_std_files_to_null ();	}    }#else  msg (M_WARN, "Warning on use of --daemon/--inetd: this operating system lacks daemon logging features, therefore when I become a daemon, I won't be able to log status or error messages");#endif}voidclose_syslog (){#if SYSLOG_CAPABILITY  if (use_syslog)    {      closelog();      use_syslog = false;    }#endif}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -