summaryrefslogtreecommitdiffhomepage
path: root/cli-tcpfwd.c
diff options
context:
space:
mode:
authorMatt Johnston <matt@ucc.asn.au>2015-06-04 23:08:50 +0800
committerMatt Johnston <matt@ucc.asn.au>2015-06-04 23:08:50 +0800
commit1a4db21fe4e06f4a5e5b74e35027091370b54abb (patch)
tree7543bf0e7a5d133c5564dd0ddcf35685bc308a98 /cli-tcpfwd.c
parente7ac4c1ab3eee827d781ececf6c7342c432b91d3 (diff)
buf_getstring and buf_putstring now use non-unsigned char*
Diffstat (limited to 'cli-tcpfwd.c')
-rw-r--r--cli-tcpfwd.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/cli-tcpfwd.c b/cli-tcpfwd.c
index df51e31..ec65f41 100644
--- a/cli-tcpfwd.c
+++ b/cli-tcpfwd.c
@@ -136,9 +136,9 @@ static void send_msg_global_request_remotetcp(const char *addr, int port) {
CHECKCLEARTOWRITE();
buf_putbyte(ses.writepayload, SSH_MSG_GLOBAL_REQUEST);
- buf_putstring(ses.writepayload, (const unsigned char *)"tcpip-forward", 13);
+ buf_putstring(ses.writepayload, "tcpip-forward", 13);
buf_putbyte(ses.writepayload, 1); /* want_reply */
- buf_putstring(ses.writepayload, (const unsigned char *)addr, strlen(addr));
+ buf_putstring(ses.writepayload, addr, strlen(addr));
buf_putint(ses.writepayload, port);
encrypt_packet();
@@ -218,7 +218,7 @@ static int newtcpforwarded(struct Channel * channel) {
char portstring[NI_MAXSERV];
int err = SSH_OPEN_ADMINISTRATIVELY_PROHIBITED;
- origaddr = (char *)buf_getstring(ses.payload, NULL);
+ origaddr = buf_getstring(ses.payload, NULL);
origport = buf_getint(ses.payload);
/* Find which port corresponds. First try and match address as well as port,