X-Git-Url: https://asedeno.scripts.mit.edu/gitweb/?a=blobdiff_plain;f=unix%2Fgtkdlg.c;h=6b5659c2d41b13bc305321b6079ac067076f210b;hb=ac61490a5b9f40a3655d363d5a1014112aae7222;hp=2a2b3ab749ae7530e33c15c2ac0a70e6cabd1782;hpb=5d5ffc274f66381ca427dfca07b1b469b8f4799a;p=PuTTY.git diff --git a/unix/gtkdlg.c b/unix/gtkdlg.c index 2a2b3ab7..6b5659c2 100644 --- a/unix/gtkdlg.c +++ b/unix/gtkdlg.c @@ -2351,22 +2351,19 @@ void verify_ssh_host_key(void *frontend, char *host, int port, char *keytype, } /* - * Ask whether the selected cipher is acceptable (since it was + * Ask whether the selected algorithm is acceptable (since it was * below the configured 'warn' threshold). - * cs: 0 = both ways, 1 = client->server, 2 = server->client */ -void askcipher(void *frontend, char *ciphername, int cs) +void askalg(void *frontend, const char *algtype, const char *algname) { static const char msg[] = - "The first %scipher supported by the server is " + "The first %s supported by the server is " "%s, which is below the configured warning threshold.\n" "Continue with connection?"; char *text; int ret; - text = dupprintf(msg, (cs == 0) ? "" : - (cs == 1) ? "client-to-server " : "server-to-client ", - ciphername); + text = dupprintf(msg, algtype, algname); ret = messagebox(GTK_WIDGET(get_window(frontend)), "PuTTY Security Alert", text, string_width("Continue with connection?"),