You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
468 lines
12 KiB
468 lines
12 KiB
/*
|
|
* Copyright 2004 James Bursa <bursa@users.sourceforge.net>
|
|
* Copyright 2006 Rob Kendrick <rjek@rjek.com>
|
|
*
|
|
* This file is part of NetSurf, http://www.netsurf-browser.org/
|
|
*
|
|
* NetSurf is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; version 2 of the License.
|
|
*
|
|
* NetSurf is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
/**
|
|
* \file
|
|
* Localised message support implementation.
|
|
*
|
|
* Native language messages are loaded from a file and stored hashed by key for
|
|
* fast access.
|
|
*/
|
|
|
|
#include <stdlib.h>
|
|
#include <assert.h>
|
|
#include <errno.h>
|
|
#include <stdio.h>
|
|
#include <stdbool.h>
|
|
#include <string.h>
|
|
#include <zlib.h>
|
|
#include <stdarg.h>
|
|
|
|
#include "utils/log.h"
|
|
#include "utils/messages.h"
|
|
#include "utils/utils.h"
|
|
#include "utils/hashtable.h"
|
|
|
|
/** Messages are stored in a fixed-size hash table. */
|
|
#define HASH_SIZE 101
|
|
|
|
/**
|
|
* The hash table used to store the standard Messages file for the old API
|
|
*/
|
|
static struct hash_table *messages_hash = NULL;
|
|
|
|
|
|
/**
|
|
* Create a message context
|
|
*
|
|
* generate a message context populated with english fallbacks for
|
|
* some formatted messages.
|
|
*/
|
|
static struct hash_table *messages_create_ctx(int hash_size)
|
|
{
|
|
struct hash_table *nctx;
|
|
const struct {
|
|
const char *key;
|
|
const char *value;
|
|
} fallback[] = {
|
|
{ "LoginDescription",
|
|
"The site %s is requesting your username and password. "
|
|
"The realm is \"%s\""},
|
|
{ "PrivacyDescription",
|
|
"A privacy error occurred while communicating with %s this "
|
|
"may be a site configuration error or an attempt to steal "
|
|
"private information (passwords, messages or credit cards)"},
|
|
{ "TimeoutDescription",
|
|
"A connection to %s could not be established. The site may "
|
|
"be temporarily unavailable or too busy to respond."},
|
|
{ "FetchErrorDescription",
|
|
"An error occurred when connecting to %s"},
|
|
{ NULL, NULL}
|
|
};
|
|
nctx = hash_create(hash_size);
|
|
|
|
if (nctx != NULL) {
|
|
int floop;
|
|
for (floop = 0; fallback[floop].key != NULL; floop++) {
|
|
hash_add(nctx,
|
|
fallback[floop].key,
|
|
fallback[floop].value);
|
|
}
|
|
}
|
|
|
|
return nctx;
|
|
}
|
|
|
|
/**
|
|
* Free memory used by a messages hash.
|
|
* The context will not be valid after this function returns.
|
|
*
|
|
* \param ctx context of messages file to free
|
|
*/
|
|
static void messages_destroy_ctx(struct hash_table *ctx)
|
|
{
|
|
if (ctx == NULL)
|
|
return;
|
|
|
|
hash_destroy(ctx);
|
|
}
|
|
|
|
|
|
/**
|
|
* Read keys and values from messages file.
|
|
*
|
|
* \param path pathname of messages file
|
|
* \param ctx reference of hash table to merge with or NULL to create one.
|
|
* \return NSERROR_OK on sucess and ctx updated or error code on faliure.
|
|
*/
|
|
static nserror messages_load_ctx(const char *path, struct hash_table **ctx)
|
|
{
|
|
struct hash_table *nctx; /* new context */
|
|
nserror res;
|
|
|
|
if (*ctx != NULL) {
|
|
/**
|
|
* \note The passed hash is not copied here so this
|
|
* updates in place.
|
|
*/
|
|
return hash_add_file(*ctx, path);
|
|
}
|
|
|
|
nctx = messages_create_ctx(HASH_SIZE);
|
|
if (nctx == NULL) {
|
|
NSLOG(netsurf, INFO,
|
|
"Unable to create hash table for messages file %s",
|
|
path);
|
|
return NSERROR_NOMEM;
|
|
}
|
|
|
|
res = hash_add_file(nctx, path);
|
|
if (res == NSERROR_OK) {
|
|
*ctx = nctx;
|
|
} else {
|
|
hash_destroy(nctx);
|
|
}
|
|
|
|
return res;
|
|
}
|
|
|
|
|
|
/**
|
|
* Fast lookup of a message by key.
|
|
*
|
|
* \param key key of message
|
|
* \param ctx context of messages file to look up in
|
|
* \return value of message, or key if not found
|
|
*/
|
|
static const char *
|
|
messages_get_ctx(const char *key, struct hash_table *ctx)
|
|
{
|
|
const char *r = NULL;
|
|
|
|
assert(key != NULL);
|
|
|
|
/* allow attempts to retrieve messages before context is set up. */
|
|
if (ctx != NULL) {
|
|
r = hash_get(ctx, key);
|
|
}
|
|
|
|
/* If called with no context or unable to retrive a value
|
|
* return the key.
|
|
*/
|
|
if (r == NULL) {
|
|
r = key;
|
|
}
|
|
|
|
return r;
|
|
}
|
|
|
|
|
|
/* exported interface documented in messages.h */
|
|
nserror messages_add_from_file(const char *path)
|
|
{
|
|
if (path == NULL) {
|
|
return NSERROR_BAD_PARAMETER;
|
|
}
|
|
|
|
NSLOG(netsurf, INFO, "Loading Messages from '%s'", path);
|
|
|
|
return messages_load_ctx(path, &messages_hash);
|
|
}
|
|
|
|
|
|
/* exported interface documented in messages.h */
|
|
nserror messages_add_from_inline(const uint8_t *data, size_t size)
|
|
{
|
|
/* ensure the hash table is initialised */
|
|
if (messages_hash == NULL) {
|
|
messages_hash = messages_create_ctx(HASH_SIZE);
|
|
}
|
|
if (messages_hash == NULL) {
|
|
NSLOG(netsurf, INFO, "Unable to create hash table");
|
|
return NSERROR_NOMEM;
|
|
}
|
|
return hash_add_inline(messages_hash, data, size);
|
|
}
|
|
|
|
|
|
/* exported interface documented in messages.h */
|
|
char *messages_get_buff(const char *key, ...)
|
|
{
|
|
const char *msg_fmt;
|
|
char *buff = NULL; /* formatted buffer to return */
|
|
int buff_len = 0;
|
|
va_list ap;
|
|
|
|
assert(key != NULL);
|
|
|
|
if (messages_hash == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
msg_fmt = hash_get(messages_hash, key);
|
|
|
|
if (msg_fmt == NULL) {
|
|
return NULL;
|
|
}
|
|
|
|
va_start(ap, key);
|
|
buff_len = vsnprintf(buff, buff_len, msg_fmt, ap);
|
|
va_end(ap);
|
|
|
|
buff = malloc(buff_len + 1);
|
|
|
|
if (buff != NULL) {
|
|
va_start(ap, key);
|
|
vsnprintf(buff, buff_len + 1, msg_fmt, ap);
|
|
va_end(ap);
|
|
}
|
|
|
|
return buff;
|
|
}
|
|
|
|
|
|
/* exported function documented in utils/messages.h */
|
|
const char *messages_get(const char *key)
|
|
{
|
|
return messages_get_ctx(key, messages_hash);
|
|
}
|
|
|
|
|
|
/* exported function documented in utils/messages.h */
|
|
const char *messages_get_errorcode(nserror code)
|
|
{
|
|
switch (code) {
|
|
case NSERROR_OK:
|
|
/* No error */
|
|
return messages_get_ctx("OK", messages_hash);
|
|
|
|
case NSERROR_NOMEM:
|
|
/* Memory exhaustion */
|
|
return messages_get_ctx("NoMemory", messages_hash);
|
|
|
|
case NSERROR_NO_FETCH_HANDLER:
|
|
/* No fetch handler for URL scheme */
|
|
return messages_get_ctx("NoHandler", messages_hash);
|
|
|
|
case NSERROR_NOT_FOUND:
|
|
/* Requested item not found */
|
|
return messages_get_ctx("NotFound", messages_hash);
|
|
|
|
case NSERROR_NOT_DIRECTORY:
|
|
/* Missing directory */
|
|
return messages_get_ctx("NotDirectory", messages_hash);
|
|
|
|
case NSERROR_SAVE_FAILED:
|
|
/* Failed to save data */
|
|
return messages_get_ctx("SaveFailed", messages_hash);
|
|
|
|
case NSERROR_CLONE_FAILED:
|
|
/* Failed to clone handle */
|
|
return messages_get_ctx("CloneFailed", messages_hash);
|
|
|
|
case NSERROR_INIT_FAILED:
|
|
/* Initialisation failed */
|
|
return messages_get_ctx("InitFailed", messages_hash);
|
|
|
|
case NSERROR_BMP_ERROR:
|
|
/* A BMP error occurred */
|
|
return messages_get_ctx("BMPError", messages_hash);
|
|
|
|
case NSERROR_GIF_ERROR:
|
|
/* A GIF error occurred */
|
|
return messages_get_ctx("GIFError", messages_hash);
|
|
|
|
case NSERROR_ICO_ERROR:
|
|
/* A ICO error occurred */
|
|
return messages_get_ctx("ICOError", messages_hash);
|
|
|
|
case NSERROR_PNG_ERROR:
|
|
/* A PNG error occurred */
|
|
return messages_get_ctx("PNGError", messages_hash);
|
|
|
|
case NSERROR_SPRITE_ERROR:
|
|
/* A RISC OS Sprite error occurred */
|
|
return messages_get_ctx("SpriteError", messages_hash);
|
|
|
|
case NSERROR_SVG_ERROR:
|
|
/* A SVG error occurred */
|
|
return messages_get_ctx("SVGError", messages_hash);
|
|
|
|
case NSERROR_BAD_ENCODING:
|
|
/* The character set is unknown */
|
|
return messages_get_ctx("BadEncoding", messages_hash);
|
|
|
|
case NSERROR_NEED_DATA:
|
|
/* More data needed */
|
|
return messages_get_ctx("NeedData", messages_hash);
|
|
|
|
case NSERROR_ENCODING_CHANGE:
|
|
/* The character set encoding change was unhandled */
|
|
return messages_get_ctx("EncodingChanged", messages_hash);
|
|
|
|
case NSERROR_BAD_PARAMETER:
|
|
/* Bad Parameter */
|
|
return messages_get_ctx("BadParameter", messages_hash);
|
|
|
|
case NSERROR_INVALID:
|
|
/* Invalid data */
|
|
return messages_get_ctx("Invalid", messages_hash);
|
|
|
|
case NSERROR_BOX_CONVERT:
|
|
/* Box conversion failed */
|
|
return messages_get_ctx("BoxConvert", messages_hash);
|
|
|
|
case NSERROR_STOPPED:
|
|
/* Content conversion stopped */
|
|
return messages_get_ctx("Stopped", messages_hash);
|
|
|
|
case NSERROR_DOM:
|
|
/* DOM call returned error */
|
|
return messages_get_ctx("ParsingFail", messages_hash);
|
|
|
|
case NSERROR_CSS:
|
|
/* CSS call returned error */
|
|
return messages_get_ctx("CSSGeneric", messages_hash);
|
|
|
|
case NSERROR_CSS_BASE:
|
|
/* CSS base sheet failed */
|
|
return messages_get_ctx("CSSBase", messages_hash);
|
|
|
|
case NSERROR_BAD_URL:
|
|
/* Bad URL */
|
|
return messages_get_ctx("BadURL", messages_hash);
|
|
|
|
case NSERROR_BAD_CONTENT:
|
|
/* Bad Content */
|
|
return messages_get_ctx("BadContent", messages_hash);
|
|
|
|
case NSERROR_FRAME_DEPTH:
|
|
/* Exceeded frame depth */
|
|
return messages_get_ctx("FrameDepth", messages_hash);
|
|
|
|
case NSERROR_PERMISSION:
|
|
/* Permission error */
|
|
return messages_get_ctx("PermissionError", messages_hash);
|
|
|
|
case NSERROR_BAD_SIZE:
|
|
/* Bad size */
|
|
return messages_get_ctx("BadSize", messages_hash);
|
|
|
|
case NSERROR_NOSPACE:
|
|
/* Insufficient space */
|
|
return messages_get_ctx("NoSpace", messages_hash);
|
|
|
|
case NSERROR_NOT_IMPLEMENTED:
|
|
/* Functionality is not implemented */
|
|
return messages_get_ctx("NotImplemented", messages_hash);
|
|
|
|
case NSERROR_UNKNOWN:
|
|
/* Unknown error */
|
|
return messages_get_ctx("Unknown", messages_hash);
|
|
|
|
case NSERROR_BAD_AUTH:
|
|
/* Authentication required */
|
|
return messages_get_ctx("BadAuth", messages_hash);
|
|
|
|
case NSERROR_BAD_REDIRECT:
|
|
/* To many redirects */
|
|
return messages_get_ctx("TooManyRedirects", messages_hash);
|
|
|
|
case NSERROR_BAD_CERTS:
|
|
/* Certificate chain verification failure */
|
|
return messages_get_ctx("CertificateVerificationNeeded", messages_hash);
|
|
|
|
case NSERROR_TIMEOUT:
|
|
/* Operation timed out */
|
|
return messages_get_ctx("Timeout", messages_hash);
|
|
}
|
|
|
|
/* The switch has no default, so the compiler should tell us when we
|
|
* forget to add messages for new error codes. As such, we should
|
|
* never get here.
|
|
*/
|
|
assert(0);
|
|
return messages_get_ctx("Unknown", messages_hash);
|
|
}
|
|
|
|
/* exported function documented in utils/messages.h */
|
|
const char *messages_get_sslcode(ssl_cert_err code)
|
|
{
|
|
switch (code) {
|
|
case SSL_CERT_ERR_OK:
|
|
/* Nothing wrong with this certificate */
|
|
return messages_get_ctx("SSLCertErrOk", messages_hash);
|
|
|
|
case SSL_CERT_ERR_UNKNOWN:
|
|
/* Unknown error */
|
|
return messages_get_ctx("SSLCertErrUnknown", messages_hash);
|
|
|
|
case SSL_CERT_ERR_BAD_ISSUER:
|
|
/* Bad issuer */
|
|
return messages_get_ctx("SSLCertErrBadIssuer", messages_hash);
|
|
|
|
case SSL_CERT_ERR_BAD_SIG:
|
|
/* Bad signature on this certificate */
|
|
return messages_get_ctx("SSLCertErrBadSig", messages_hash);
|
|
|
|
case SSL_CERT_ERR_TOO_YOUNG:
|
|
/* This certificate is not yet valid */
|
|
return messages_get_ctx("SSLCertErrTooYoung", messages_hash);
|
|
|
|
case SSL_CERT_ERR_TOO_OLD:
|
|
/* This certificate is no longer valid */
|
|
return messages_get_ctx("SSLCertErrTooOld", messages_hash);
|
|
|
|
case SSL_CERT_ERR_SELF_SIGNED:
|
|
/* This certificate is self signed */
|
|
return messages_get_ctx("SSLCertErrSelfSigned", messages_hash);
|
|
|
|
case SSL_CERT_ERR_CHAIN_SELF_SIGNED:
|
|
/* This certificate chain is self signed */
|
|
return messages_get_ctx("SSLCertErrChainSelfSigned", messages_hash);
|
|
|
|
case SSL_CERT_ERR_REVOKED:
|
|
/* This certificate has been revoked */
|
|
return messages_get_ctx("SSLCertErrRevoked", messages_hash);
|
|
|
|
case SSL_CERT_ERR_HOSTNAME_MISMATCH:
|
|
/* Common name is invalid */
|
|
return messages_get_ctx("SSLCertErrHostnameMismatch", messages_hash);
|
|
|
|
case SSL_CERT_ERR_CERT_MISSING:
|
|
/* Common name is invalid */
|
|
return messages_get_ctx("SSLCertErrCertMissing", messages_hash);
|
|
|
|
}
|
|
|
|
/* The switch has no default, so the compiler should tell us when we
|
|
* forget to add messages for new error codes. As such, we should
|
|
* never get here.
|
|
*/
|
|
assert(0);
|
|
return messages_get_ctx("Unknown", messages_hash);
|
|
}
|
|
|
|
/* exported function documented in utils/messages.h */
|
|
void messages_destroy(void)
|
|
{
|
|
messages_destroy_ctx(messages_hash);
|
|
messages_hash = NULL;
|
|
}
|