-/* $Id: mac.c,v 1.56 2003/03/25 23:18:59 ben Exp $ */
+/* $Id$ */
/*
* Copyright (c) 1999, 2003 Ben Harris
* All rights reserved.
return FALSE;
}
-void agent_query(void *in, int inlen, void **out, int *outlen)
+int agent_query(void *in, int inlen, void **out, int *outlen,
+ void (*callback)(void *, void *, int), void *callback_ctx)
{
*out = NULL;
*outlen = 0;
+ return 1;
}
/* Temporary null routines for testing. */
-/*
- * FIXME: verify_ssh_host_key() should be passed a frontend handle,
- * but backends have to have a terminal handle instead, because they
- * pass it to from_backend(), so we accept a terminal handle here as
- * well, and hope no-one tries to call us with sensible arguments.
- */
void verify_ssh_host_key(void *frontend, char *host, int port, char *keytype,
char *keystr, char *fingerprint)
{
Str255 stuff;
- Terminal *term = frontend;
- Session *s = term->frontend;
+ Session *s = frontend;
/*
* This function is horribly wrong. For one thing, the alert
* should use the Notification Manager to wake up the user. In
* any case, we shouldn't hold up processing of other connections'
* data just because this one's waiting for the user. It should
- * also handle a host key cache, of course, and see the note above
- * about the "frontend" argument and the one below about closing
- * the connection. All in all, a bit of a mess really.
+ * also handle a host key cache, of course, and see the note below
+ * about closing the connection. All in all, a bit of a mess
+ * really.
*/
stuff[0] = sprintf((char *)(&stuff[1]),
}
}
-void askcipher(void *frontend, char *ciphername, int cs)
+void askalg(void *frontend, const char *algtype, const char *algname)
{
}
/* SGT: I have no idea whether Mac X servers need anything here. */
}
+void update_specials_menu(void *frontend)
+{
+ Session *s = frontend;
+ WindowPtr front;
+
+ front = mac_frontwindow();
+ if (front != NULL && mac_windowsession(front) == s)
+ mac_adjustmenus();
+}
+
/*
* Local Variables:
* c-file-style: "simon"