mirror of
https://git.tartarus.org/simon/putty.git
synced 2025-06-30 19:12:48 -05:00
Start using C99 variadic macros.
In the past, I've had a lot of macros which you call with double parentheses, along the lines of debug(("format string", params)), so that the inner parens protect the commas and permit the macro to treat the whole printf-style argument list as one macro argument. That's all very well, but it's a bit inconvenient (it doesn't leave you any way to implement such a macro by prepending another argument to the list), and now this code base's rules allow C99isms, I can switch all those macros to using a single pair of parens, using the C99 ability to say '...' in the parameter list of the #define and get at the corresponding suffix of the arguments as __VA_ARGS__. So I'm doing it. I've made the following printf-style macros variadic: bpp_logevent, ppl_logevent, ppl_printf and debug. While I'm here, I've also fixed up a collection of conditioned-out calls to debug() in the Windows front end which were clearly expecting a macro with a different calling syntax, because they had an integer parameter first. If I ever have a need to condition those back in, they should actually work now.
This commit is contained in:
@ -26,7 +26,7 @@ static ChanopenResult chan_open_session(
|
||||
{
|
||||
PacketProtocolLayer *ppl = &s->ppl; /* for ppl_logevent */
|
||||
|
||||
ppl_logevent(("Opened session channel"));
|
||||
ppl_logevent("Opened session channel");
|
||||
CHANOPEN_RETURN_SUCCESS(sesschan_new(sc, s->ppl.logctx,
|
||||
s->sftpserver_vt));
|
||||
}
|
||||
@ -41,21 +41,21 @@ static ChanopenResult chan_open_direct_tcpip(
|
||||
|
||||
dstaddr_str = mkstr(dstaddr);
|
||||
|
||||
ppl_logevent(("Received request to connect to port %s:%d (from %.*s:%d)",
|
||||
dstaddr_str, dstport, PTRLEN_PRINTF(peeraddr), peerport));
|
||||
ppl_logevent("Received request to connect to port %s:%d (from %.*s:%d)",
|
||||
dstaddr_str, dstport, PTRLEN_PRINTF(peeraddr), peerport);
|
||||
err = portfwdmgr_connect(
|
||||
s->portfwdmgr, &ch, dstaddr_str, dstport, sc, ADDRTYPE_UNSPEC);
|
||||
|
||||
sfree(dstaddr_str);
|
||||
|
||||
if (err != NULL) {
|
||||
ppl_logevent(("Port open failed: %s", err));
|
||||
ppl_logevent("Port open failed: %s", err);
|
||||
sfree(err);
|
||||
CHANOPEN_RETURN_FAILURE(
|
||||
SSH2_OPEN_CONNECT_FAILED, ("Connection failed"));
|
||||
}
|
||||
|
||||
ppl_logevent(("Port opened successfully"));
|
||||
ppl_logevent("Port opened successfully");
|
||||
CHANOPEN_RETURN_SUCCESS(ch);
|
||||
}
|
||||
|
||||
@ -121,11 +121,11 @@ PktOut *ssh2_portfwd_chanopen(
|
||||
*/
|
||||
|
||||
if (pi && pi->log_text)
|
||||
ppl_logevent(("Forwarding connection to listening port %s:%d from %s",
|
||||
hostname, port, pi->log_text));
|
||||
ppl_logevent("Forwarding connection to listening port %s:%d from %s",
|
||||
hostname, port, pi->log_text);
|
||||
else
|
||||
ppl_logevent(("Forwarding connection to listening port %s:%d",
|
||||
hostname, port));
|
||||
ppl_logevent("Forwarding connection to listening port %s:%d",
|
||||
hostname, port);
|
||||
|
||||
pktout = ssh2_chanopen_init(c, "forwarded-tcpip");
|
||||
put_stringz(pktout, hostname);
|
||||
@ -169,7 +169,7 @@ SshChannel *ssh2_serverside_x11_open(
|
||||
c->halfopen = true;
|
||||
c->chan = chan;
|
||||
|
||||
ppl_logevent(("Forwarding X11 channel to client"));
|
||||
ppl_logevent("Forwarding X11 channel to client");
|
||||
|
||||
pktout = ssh2_chanopen_init(c, "x11");
|
||||
put_stringz(pktout, (pi && pi->addr_text ? pi->addr_text : "0.0.0.0"));
|
||||
@ -192,7 +192,7 @@ SshChannel *ssh2_serverside_agent_open(ConnectionLayer *cl, Channel *chan)
|
||||
c->halfopen = true;
|
||||
c->chan = chan;
|
||||
|
||||
ppl_logevent(("Forwarding SSH agent to client"));
|
||||
ppl_logevent("Forwarding SSH agent to client");
|
||||
|
||||
pktout = ssh2_chanopen_init(c, "auth-agent@openssh.com");
|
||||
pq_push(s->ppl.out_pq, pktout);
|
||||
|
Reference in New Issue
Block a user