view libpurple/protocols/zephyr/zephyr_err.c @ 31172:e89df17f5ae7

certificate: Better validation of chains which have an intermediate signed w/ MD5. We already distribute the CAcert class 3 root as a trusted root. Newer versions of GnuTLS (combined with the changes to deal with MSN's cert breakage) require us to check if the last cert (not just its issuer) is in our trusted store.
author Paul Aurich <paul@darkrain42.org>
date Sun, 30 Jan 2011 17:51:02 +0000
parents 5fe8042783c1
children
line wrap: on
line source

#include "zephyr_err.h"

#ifdef __STDC__
#define NOARGS void
#else
#define NOARGS
#define const
#endif

static const char * const text[] = {
	"Packet too long or buffer too small",
	"Notice header too large",
	"Illegal value in notice",
	"Can't get host manager port",
	"Can't assign port",
	"Bad packet format",
	"Incompatible version numbers",
	"No port opened",
	"No notices match criteria",
	"Input queue too long",
	"Hostmanager not responding",
	"Internal error",
	"No previous call to ZLocateUser",
	"No more locations available",
	"Field too long for buffer",
	"Improperly formatted field",
	"SERVNAK received",
	"Server could not verify authentication",
	"Not logged-in",
	"No previous call to ZRetrieveSubscriptions",
	"No more subscriptions available",
	"Too many subscriptions to transmit",
	"End of file detected during read",
    0
};

struct error_table {
    char const * const * msgs;
    long base;
    int n_msgs;
};
struct et_list {
    struct et_list *next;
    const struct error_table * table;
};
extern struct et_list *_et_list;

static const struct error_table et = { text, -772103680L, 23 };

static struct et_list link = { 0, 0 };

void initialize_zeph_error_table (NOARGS) {
    if (!link.table) {
        link.next = _et_list;
        link.table = &et;
        _et_list = &link;
    }
}