| 235 |
"%s encrypt error(1): bytes %d (%d)"); |
"%s encrypt error(1): bytes %d (%d)"); |
| 236 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 237 |
"AES128/192/256", bytes, block_size); |
"AES128/192/256", bytes, block_size); |
| 238 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 239 |
goto error; |
goto error; |
| 240 |
} |
} |
| 241 |
|
|
| 243 |
UTIL_get_lang_msg("MSG_ENCRYPT_ERROR2", pvar, "%s encrypt error(2)"); |
UTIL_get_lang_msg("MSG_ENCRYPT_ERROR2", pvar, "%s encrypt error(2)"); |
| 244 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 245 |
"AES128/192/256"); |
"AES128/192/256"); |
| 246 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 247 |
goto error; |
goto error; |
| 248 |
|
|
| 249 |
} else { |
} else { |
| 283 |
"%s decrypt error(1): bytes %d (%d)"); |
"%s decrypt error(1): bytes %d (%d)"); |
| 284 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 285 |
"AES128/192/256", bytes, block_size); |
"AES128/192/256", bytes, block_size); |
| 286 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 287 |
goto error; |
goto error; |
| 288 |
} |
} |
| 289 |
|
|
| 291 |
UTIL_get_lang_msg("MSG_DECRYPT_ERROR2", pvar, "%s decrypt error(2)"); |
UTIL_get_lang_msg("MSG_DECRYPT_ERROR2", pvar, "%s decrypt error(2)"); |
| 292 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 293 |
"AES128/192/256"); |
"AES128/192/256"); |
| 294 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 295 |
goto error; |
goto error; |
| 296 |
|
|
| 297 |
} else { |
} else { |
| 333 |
"%s encrypt error(1): bytes %d (%d)"); |
"%s encrypt error(1): bytes %d (%d)"); |
| 334 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 335 |
"3DES-CBC", bytes, block_size); |
"3DES-CBC", bytes, block_size); |
| 336 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 337 |
goto error; |
goto error; |
| 338 |
} |
} |
| 339 |
|
|
| 341 |
UTIL_get_lang_msg("MSG_ENCRYPT_ERROR2", pvar, "%s encrypt error(2)"); |
UTIL_get_lang_msg("MSG_ENCRYPT_ERROR2", pvar, "%s encrypt error(2)"); |
| 342 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 343 |
"3DES-CBC"); |
"3DES-CBC"); |
| 344 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 345 |
goto error; |
goto error; |
| 346 |
|
|
| 347 |
} else { |
} else { |
| 381 |
"%s decrypt error(1): bytes %d (%d)"); |
"%s decrypt error(1): bytes %d (%d)"); |
| 382 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 383 |
"3DES-CBC", bytes, block_size); |
"3DES-CBC", bytes, block_size); |
| 384 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 385 |
goto error; |
goto error; |
| 386 |
} |
} |
| 387 |
|
|
| 389 |
UTIL_get_lang_msg("MSG_DECRYPT_ERROR2", pvar, "%s decrypt error(2)"); |
UTIL_get_lang_msg("MSG_DECRYPT_ERROR2", pvar, "%s decrypt error(2)"); |
| 390 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 391 |
"3DES-CBC"); |
"3DES-CBC"); |
| 392 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 393 |
goto error; |
goto error; |
| 394 |
|
|
| 395 |
} else { |
} else { |
| 430 |
"%s encrypt error(1): bytes %d (%d)"); |
"%s encrypt error(1): bytes %d (%d)"); |
| 431 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 432 |
"Blowfish", bytes, block_size); |
"Blowfish", bytes, block_size); |
| 433 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 434 |
goto error; |
goto error; |
| 435 |
} |
} |
| 436 |
|
|
| 438 |
UTIL_get_lang_msg("MSG_ENCRYPT_ERROR2", pvar, "%s encrypt error(2)"); |
UTIL_get_lang_msg("MSG_ENCRYPT_ERROR2", pvar, "%s encrypt error(2)"); |
| 439 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 440 |
"Blowfish"); |
"Blowfish"); |
| 441 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 442 |
goto error; |
goto error; |
| 443 |
|
|
| 444 |
} else { |
} else { |
| 469 |
"%s decrypt error(1): bytes %d (%d)"); |
"%s decrypt error(1): bytes %d (%d)"); |
| 470 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 471 |
"Blowfish", bytes, block_size); |
"Blowfish", bytes, block_size); |
| 472 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 473 |
goto error; |
goto error; |
| 474 |
} |
} |
| 475 |
|
|
| 477 |
UTIL_get_lang_msg("MSG_DECRYPT_ERROR2", pvar, "%s decrypt error(2)"); |
UTIL_get_lang_msg("MSG_DECRYPT_ERROR2", pvar, "%s decrypt error(2)"); |
| 478 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 479 |
"Blowfish"); |
"Blowfish"); |
| 480 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 481 |
goto error; |
goto error; |
| 482 |
|
|
| 483 |
} else { |
} else { |
| 509 |
"%s encrypt error(1): bytes %d (%d)"); |
"%s encrypt error(1): bytes %d (%d)"); |
| 510 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 511 |
"Arcfour", bytes, block_size); |
"Arcfour", bytes, block_size); |
| 512 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 513 |
goto error; |
goto error; |
| 514 |
} |
} |
| 515 |
|
|
| 517 |
UTIL_get_lang_msg("MSG_ENCRYPT_ERROR2", pvar, "%s encrypt error(2)"); |
UTIL_get_lang_msg("MSG_ENCRYPT_ERROR2", pvar, "%s encrypt error(2)"); |
| 518 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 519 |
"Arcfour"); |
"Arcfour"); |
| 520 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 521 |
goto error; |
goto error; |
| 522 |
|
|
| 523 |
} else { |
} else { |
| 548 |
"%s decrypt error(1): bytes %d (%d)"); |
"%s decrypt error(1): bytes %d (%d)"); |
| 549 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 550 |
"Arcfour", bytes, block_size); |
"Arcfour", bytes, block_size); |
| 551 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 552 |
goto error; |
goto error; |
| 553 |
} |
} |
| 554 |
|
|
| 556 |
UTIL_get_lang_msg("MSG_DECRYPT_ERROR2", pvar, "%s decrypt error(2)"); |
UTIL_get_lang_msg("MSG_DECRYPT_ERROR2", pvar, "%s decrypt error(2)"); |
| 557 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 558 |
"Arcfour"); |
"Arcfour"); |
| 559 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 560 |
goto error; |
goto error; |
| 561 |
|
|
| 562 |
} else { |
} else { |
| 588 |
"%s encrypt error(1): bytes %d (%d)"); |
"%s encrypt error(1): bytes %d (%d)"); |
| 589 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 590 |
"CAST128", bytes, block_size); |
"CAST128", bytes, block_size); |
| 591 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 592 |
goto error; |
goto error; |
| 593 |
} |
} |
| 594 |
|
|
| 596 |
UTIL_get_lang_msg("MSG_ENCRYPT_ERROR2", pvar, "%s encrypt error(2)"); |
UTIL_get_lang_msg("MSG_ENCRYPT_ERROR2", pvar, "%s encrypt error(2)"); |
| 597 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 598 |
"CAST128"); |
"CAST128"); |
| 599 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 600 |
goto error; |
goto error; |
| 601 |
|
|
| 602 |
} else { |
} else { |
| 627 |
"%s decrypt error(1): bytes %d (%d)"); |
"%s decrypt error(1): bytes %d (%d)"); |
| 628 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 629 |
"CAST128", bytes, block_size); |
"CAST128", bytes, block_size); |
| 630 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 631 |
goto error; |
goto error; |
| 632 |
} |
} |
| 633 |
|
|
| 635 |
UTIL_get_lang_msg("MSG_DECRYPT_ERROR2", pvar, "%s decrypt error(2)"); |
UTIL_get_lang_msg("MSG_DECRYPT_ERROR2", pvar, "%s decrypt error(2)"); |
| 636 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 637 |
"CAST128"); |
"CAST128"); |
| 638 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 639 |
goto error; |
goto error; |
| 640 |
|
|
| 641 |
} else { |
} else { |
| 666 |
"%s encrypt error(1): bytes %d (%d)"); |
"%s encrypt error(1): bytes %d (%d)"); |
| 667 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 668 |
"Camellia128/192/256", bytes, block_size); |
"Camellia128/192/256", bytes, block_size); |
| 669 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 670 |
goto error; |
goto error; |
| 671 |
} |
} |
| 672 |
|
|
| 674 |
UTIL_get_lang_msg("MSG_ENCRYPT_ERROR2", pvar, "%s encrypt error(2)"); |
UTIL_get_lang_msg("MSG_ENCRYPT_ERROR2", pvar, "%s encrypt error(2)"); |
| 675 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 676 |
"Camellia128/192/256"); |
"Camellia128/192/256"); |
| 677 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 678 |
goto error; |
goto error; |
| 679 |
|
|
| 680 |
} else { |
} else { |
| 705 |
"%s decrypt error(1): bytes %d (%d)"); |
"%s decrypt error(1): bytes %d (%d)"); |
| 706 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 707 |
"Camellia128/192/256", bytes, block_size); |
"Camellia128/192/256", bytes, block_size); |
| 708 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 709 |
goto error; |
goto error; |
| 710 |
} |
} |
| 711 |
|
|
| 713 |
UTIL_get_lang_msg("MSG_DECRYPT_ERROR2", pvar, "%s decrypt error(2)"); |
UTIL_get_lang_msg("MSG_DECRYPT_ERROR2", pvar, "%s decrypt error(2)"); |
| 714 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, |
| 715 |
"Camellia128/192/256"); |
"Camellia128/192/256"); |
| 716 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 717 |
goto error; |
goto error; |
| 718 |
|
|
| 719 |
} else { |
} else { |
| 881 |
if (key == NULL || key->e == NULL || key->n == NULL) { |
if (key == NULL || key->e == NULL || key->n == NULL) { |
| 882 |
UTIL_get_lang_msg("MSG_RSAKEY_SETUP_ERROR", pvar, |
UTIL_get_lang_msg("MSG_RSAKEY_SETUP_ERROR", pvar, |
| 883 |
"Error setting up RSA keys"); |
"Error setting up RSA keys"); |
| 884 |
notify_fatal_error(pvar, pvar->ts->UIMsg); |
notify_fatal_error(pvar, pvar->ts->UIMsg, TRUE); |
| 885 |
|
|
| 886 |
if (key != NULL) { |
if (key != NULL) { |
| 887 |
if (key->e != NULL) { |
if (key->e != NULL) { |
| 981 |
"The server does not support any of the TTSSH encryption algorithms.\n" |
"The server does not support any of the TTSSH encryption algorithms.\n" |
| 982 |
"A secure connection cannot be made in the TTSSH-to-server direction.\n" |
"A secure connection cannot be made in the TTSSH-to-server direction.\n" |
| 983 |
"The connection will be closed."); |
"The connection will be closed."); |
| 984 |
notify_fatal_error(pvar, pvar->ts->UIMsg); |
notify_fatal_error(pvar, pvar->ts->UIMsg, TRUE); |
| 985 |
return FALSE; |
return FALSE; |
| 986 |
} else if (receiver_ciphers == 0) { |
} else if (receiver_ciphers == 0) { |
| 987 |
UTIL_get_lang_msg("MSG_UNAVAILABLE_CIPHERS_ERROR", pvar, |
UTIL_get_lang_msg("MSG_UNAVAILABLE_CIPHERS_ERROR", pvar, |
| 988 |
"The server does not support any of the TTSSH encryption algorithms.\n" |
"The server does not support any of the TTSSH encryption algorithms.\n" |
| 989 |
"A secure connection cannot be made in the TTSSH-to-server direction.\n" |
"A secure connection cannot be made in the TTSSH-to-server direction.\n" |
| 990 |
"The connection will be closed."); |
"The connection will be closed."); |
| 991 |
notify_fatal_error(pvar, pvar->ts->UIMsg); |
notify_fatal_error(pvar, pvar->ts->UIMsg, TRUE); |
| 992 |
return FALSE; |
return FALSE; |
| 993 |
} else { |
} else { |
| 994 |
return TRUE; |
return TRUE; |
| 1160 |
"To communicate with this server, you will have to enable some more ciphers\n" |
"To communicate with this server, you will have to enable some more ciphers\n" |
| 1161 |
"in the TTSSH Setup dialog box when you run Tera Term again.\n" |
"in the TTSSH Setup dialog box when you run Tera Term again.\n" |
| 1162 |
"This connection will now close."); |
"This connection will now close."); |
| 1163 |
notify_fatal_error(pvar, pvar->ts->UIMsg); |
notify_fatal_error(pvar, pvar->ts->UIMsg, TRUE); |
| 1164 |
return FALSE; |
return FALSE; |
| 1165 |
} else { |
} else { |
| 1166 |
return TRUE; |
return TRUE; |
| 1204 |
if (bit_delta < 128 || server_key_bits < 512 || host_key_bits < 512) { |
if (bit_delta < 128 || server_key_bits < 512 || host_key_bits < 512) { |
| 1205 |
UTIL_get_lang_msg("MSG_RASKEY_TOOWEAK_ERROR", pvar, |
UTIL_get_lang_msg("MSG_RASKEY_TOOWEAK_ERROR", pvar, |
| 1206 |
"Server RSA keys are too weak. A secure connection cannot be established."); |
"Server RSA keys are too weak. A secure connection cannot be established."); |
| 1207 |
notify_fatal_error(pvar, pvar->ts->UIMsg); |
notify_fatal_error(pvar, pvar->ts->UIMsg, TRUE); |
| 1208 |
return 0; |
return 0; |
| 1209 |
} else { |
} else { |
| 1210 |
/* following Goldberg's code, I'm using MD5(servkey->n || hostkey->n || cookie) |
/* following Goldberg's code, I'm using MD5(servkey->n || hostkey->n || cookie) |
| 1381 |
UTIL_get_lang_msg("MSG_CIPHER_INIT_ERROR", pvar, |
UTIL_get_lang_msg("MSG_CIPHER_INIT_ERROR", pvar, |
| 1382 |
"Cipher initialize error(%d)"); |
"Cipher initialize error(%d)"); |
| 1383 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, 1); |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, 1); |
| 1384 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 1385 |
return; |
return; |
| 1386 |
} |
} |
| 1387 |
|
|
| 1391 |
UTIL_get_lang_msg("MSG_CIPHER_INIT_ERROR", pvar, |
UTIL_get_lang_msg("MSG_CIPHER_INIT_ERROR", pvar, |
| 1392 |
"Cipher initialize error(%d)"); |
"Cipher initialize error(%d)"); |
| 1393 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, 2); |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, 2); |
| 1394 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 1395 |
return; |
return; |
| 1396 |
} |
} |
| 1397 |
} |
} |
| 1399 |
UTIL_get_lang_msg("MSG_CIPHER_INIT_ERROR", pvar, |
UTIL_get_lang_msg("MSG_CIPHER_INIT_ERROR", pvar, |
| 1400 |
"Cipher initialize error(%d)"); |
"Cipher initialize error(%d)"); |
| 1401 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, 3); |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, pvar->ts->UIMsg, 3); |
| 1402 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 1403 |
return; |
return; |
| 1404 |
} |
} |
| 1405 |
|
|
| 1412 |
"Cipher initialize error(%d)"); |
"Cipher initialize error(%d)"); |
| 1413 |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, |
_snprintf_s(tmp, sizeof(tmp), _TRUNCATE, |
| 1414 |
pvar->ts->UIMsg, 3); |
pvar->ts->UIMsg, 3); |
| 1415 |
notify_fatal_error(pvar, tmp); |
notify_fatal_error(pvar, tmp, TRUE); |
| 1416 |
} |
} |
| 1417 |
else { |
else { |
| 1418 |
memset(discard, 0, discard_len); |
memset(discard, 0, discard_len); |
| 1781 |
if (!isOK) { |
if (!isOK) { |
| 1782 |
UTIL_get_lang_msg("MSG_CHPHER_NOTSELECTED_ERROR", pvar, |
UTIL_get_lang_msg("MSG_CHPHER_NOTSELECTED_ERROR", pvar, |
| 1783 |
"No cipher selected!"); |
"No cipher selected!"); |
| 1784 |
notify_fatal_error(pvar, pvar->ts->UIMsg); |
notify_fatal_error(pvar, pvar->ts->UIMsg, TRUE); |
| 1785 |
return FALSE; |
return FALSE; |
| 1786 |
} else { |
} else { |
| 1787 |
memset(encryption_key, 0, CRYPT_KEY_LENGTH); |
memset(encryption_key, 0, CRYPT_KEY_LENGTH); |