X-Git-Url: https://git.distorted.org.uk/~mdw/sgt/putty/blobdiff_plain/bf61b5660299e88399304cd8eb9bacddc73a765b..62793edfb1cbcfec57929279096dd3e7791b3c05:/unix/uxcons.c diff --git a/unix/uxcons.c b/unix/uxcons.c index 579178c7..881b6bfe 100644 --- a/unix/uxcons.c +++ b/unix/uxcons.c @@ -25,13 +25,14 @@ void cleanup_exit(int code) * Clean up. */ sk_cleanup(); - - if (cfg.protocol == PROT_SSH) - random_save_seed(); - + random_save_seed(); exit(code); } +void update_specials_menu(void *frontend) +{ +} + void verify_ssh_host_key(void *frontend, char *host, int port, char *keytype, char *keystr, char *fingerprint) { @@ -40,13 +41,13 @@ void verify_ssh_host_key(void *frontend, char *host, int port, char *keytype, static const char absentmsg_batch[] = "The server's host key is not cached. You have no guarantee\n" "that the server is the computer you think it is.\n" - "The server's key fingerprint is:\n" + "The server's %s key fingerprint is:\n" "%s\n" "Connection abandoned.\n"; static const char absentmsg[] = "The server's host key is not cached. You have no guarantee\n" "that the server is the computer you think it is.\n" - "The server's key fingerprint is:\n" + "The server's %s key fingerprint is:\n" "%s\n" "If you trust this host, enter \"y\" to add the key to\n" "PuTTY's cache and carry on connecting.\n" @@ -62,7 +63,7 @@ void verify_ssh_host_key(void *frontend, char *host, int port, char *keytype, "cached. This means that either the server administrator\n" "has changed the host key, or you have actually connected\n" "to another computer pretending to be the server.\n" - "The new key fingerprint is:\n" + "The new %s key fingerprint is:\n" "%s\n" "Connection abandoned.\n"; static const char wrongmsg[] = @@ -71,7 +72,7 @@ void verify_ssh_host_key(void *frontend, char *host, int port, char *keytype, "cached. This means that either the server administrator\n" "has changed the host key, or you have actually connected\n" "to another computer pretending to be the server.\n" - "The new key fingerprint is:\n" + "The new %s key fingerprint is:\n" "%s\n" "If you were expecting this change and trust the new key,\n" "enter \"y\" to update PuTTY's cache and continue connecting.\n" @@ -96,18 +97,18 @@ void verify_ssh_host_key(void *frontend, char *host, int port, char *keytype, if (ret == 2) { /* key was different */ if (console_batch_mode) { - fprintf(stderr, wrongmsg_batch, fingerprint); + fprintf(stderr, wrongmsg_batch, keytype, fingerprint); cleanup_exit(1); } - fprintf(stderr, wrongmsg, fingerprint); + fprintf(stderr, wrongmsg, keytype, fingerprint); fflush(stderr); } if (ret == 1) { /* key was absent */ if (console_batch_mode) { - fprintf(stderr, absentmsg_batch, fingerprint); + fprintf(stderr, absentmsg_batch, keytype, fingerprint); cleanup_exit(1); } - fprintf(stderr, absentmsg, fingerprint); + fprintf(stderr, absentmsg, keytype, fingerprint); fflush(stderr); } @@ -187,7 +188,7 @@ void askcipher(void *frontend, char *ciphername, int cs) * Ask whether to wipe a session log file before writing to it. * Returns 2 for wipe, 1 for append, 0 for cancel (don't log). */ -int askappend(void *frontend, char *filename) +int askappend(void *frontend, Filename filename) { static const char msgtemplate[] = "The session log file \"%.*s\" already exists.\n" @@ -205,11 +206,11 @@ int askappend(void *frontend, char *filename) char line[32]; if (console_batch_mode) { - fprintf(stderr, msgtemplate_batch, FILENAME_MAX, filename); + fprintf(stderr, msgtemplate_batch, FILENAME_MAX, filename.path); fflush(stderr); return 0; } - fprintf(stderr, msgtemplate, FILENAME_MAX, filename); + fprintf(stderr, msgtemplate, FILENAME_MAX, filename.path); fflush(stderr); { @@ -257,7 +258,7 @@ void old_keyfile_warning(void) fputs(message, stderr); } -void logevent(void *frontend, char *string) +void logevent(void *frontend, const char *string) { log_eventlog(logctx, string); }