X-Git-Url: https://git.distorted.org.uk/u/mdw/putty/blobdiff_plain/d3fef4a5f0fbcc8990e7cd8c840e06f9675e20f9..f33ba69e92f389f5884eae5a586858a629a5260b:/console.c diff --git a/console.c b/console.c index 27366dee..03bb4726 100644 --- a/console.c +++ b/console.c @@ -1,10 +1,8 @@ /* * console.c: various interactive-prompt routines shared between - * the console PuTTY tools + * the Windows console PuTTY tools */ -#include - #include #include #include @@ -26,7 +24,6 @@ void cleanup_exit(int code) * Clean up. */ sk_cleanup(); - WSACleanup(); random_save_seed(); #ifdef MSCRYPTOAPI @@ -47,14 +44,14 @@ void verify_ssh_host_key(void *frontend, char *host, int port, char *keytype, "The server's host key is not cached in the registry. You\n" "have no guarantee that the server is the computer you\n" "think it is.\n" - "The server's key fingerprint is:\n" + "The server's %s key fingerprint is:\n" "%s\n" "Connection abandoned.\n"; static const char absentmsg[] = "The server's host key is not cached in the registry. You\n" "have no guarantee that the server is the computer you\n" "think it is.\n" - "The server's key fingerprint is:\n" + "The server's %s key fingerprint is:\n" "%s\n" "If you trust this host, enter \"y\" to add the key to\n" "PuTTY's cache and carry on connecting.\n" @@ -71,7 +68,7 @@ void verify_ssh_host_key(void *frontend, char *host, int port, char *keytype, "server administrator has changed the host key, or you\n" "have actually connected to another computer pretending\n" "to be the server.\n" - "The new key fingerprint is:\n" + "The new %s key fingerprint is:\n" "%s\n" "Connection abandoned.\n"; static const char wrongmsg[] = @@ -81,7 +78,7 @@ void verify_ssh_host_key(void *frontend, char *host, int port, char *keytype, "server administrator has changed the host key, or you\n" "have actually connected to another computer pretending\n" "to be the server.\n" - "The new key fingerprint is:\n" + "The new %s key fingerprint is:\n" "%s\n" "If you were expecting this change and trust the new key,\n" "enter \"y\" to update PuTTY's cache and continue connecting.\n" @@ -106,18 +103,18 @@ void verify_ssh_host_key(void *frontend, char *host, int port, char *keytype, if (ret == 2) { /* key was different */ if (console_batch_mode) { - fprintf(stderr, wrongmsg_batch, fingerprint); + fprintf(stderr, wrongmsg_batch, keytype, fingerprint); cleanup_exit(1); } - fprintf(stderr, wrongmsg, fingerprint); + fprintf(stderr, wrongmsg, keytype, fingerprint); fflush(stderr); } if (ret == 1) { /* key was absent */ if (console_batch_mode) { - fprintf(stderr, absentmsg_batch, fingerprint); + fprintf(stderr, absentmsg_batch, keytype, fingerprint); cleanup_exit(1); } - fprintf(stderr, absentmsg, fingerprint); + fprintf(stderr, absentmsg, keytype, fingerprint); fflush(stderr); } @@ -137,6 +134,10 @@ void verify_ssh_host_key(void *frontend, char *host, int port, char *keytype, } } +void update_specials_menu(void *frontend) +{ +} + /* * Ask whether the selected cipher is acceptable (since it was * below the configured 'warn' threshold). @@ -192,7 +193,7 @@ void askcipher(void *frontend, char *ciphername, int cs) * Ask whether to wipe a session log file before writing to it. * Returns 2 for wipe, 1 for append, 0 for cancel (don't log). */ -int askappend(void *frontend, char *filename) +int askappend(void *frontend, Filename filename) { HANDLE hin; DWORD savemode, i; @@ -213,11 +214,11 @@ int askappend(void *frontend, char *filename) char line[32]; if (console_batch_mode) { - fprintf(stderr, msgtemplate_batch, FILENAME_MAX, filename); + fprintf(stderr, msgtemplate_batch, FILENAME_MAX, filename.path); fflush(stderr); return 0; } - fprintf(stderr, msgtemplate, FILENAME_MAX, filename); + fprintf(stderr, msgtemplate, FILENAME_MAX, filename.path); fflush(stderr); hin = GetStdHandle(STD_INPUT_HANDLE); @@ -266,7 +267,7 @@ void console_provide_logctx(void *logctx) console_logctx = logctx; } -void logevent(void *frontend, char *string) +void logevent(void *frontend, const char *string) { if (console_logctx) log_eventlog(console_logctx, string);