summaryrefslogtreecommitdiffhomepage
path: root/cli-tcpfwd.c
diff options
context:
space:
mode:
authorGaël PORTAY <gael.portay@gmail.com>2015-05-05 20:42:38 +0200
committerGaël PORTAY <gael.portay@gmail.com>2015-05-05 20:42:38 +0200
commit9fdab3ced8374b991bfadce0056cf5bdf7cfb3d6 (patch)
tree5da161bb2372d7a203dd39c616701ae090bb730d /cli-tcpfwd.c
parentef0aac432c986f52a1b973bcd73ddf7324e0e70f (diff)
parent6e15e75391fc117125f50efd9f3d8ed646596da9 (diff)
Merge branch 'fix-pointer-sign-warnings' into fix-warnings
Diffstat (limited to 'cli-tcpfwd.c')
-rw-r--r--cli-tcpfwd.c6
1 files changed, 3 insertions, 3 deletions
diff --git a/cli-tcpfwd.c b/cli-tcpfwd.c
index ec65f41..df51e31 100644
--- a/cli-tcpfwd.c
+++ b/cli-tcpfwd.c
@@ -136,9 +136,9 @@ static void send_msg_global_request_remotetcp(const char *addr, int port) {
CHECKCLEARTOWRITE();
buf_putbyte(ses.writepayload, SSH_MSG_GLOBAL_REQUEST);
- buf_putstring(ses.writepayload, "tcpip-forward", 13);
+ buf_putstring(ses.writepayload, (const unsigned char *)"tcpip-forward", 13);
buf_putbyte(ses.writepayload, 1); /* want_reply */
- buf_putstring(ses.writepayload, addr, strlen(addr));
+ buf_putstring(ses.writepayload, (const unsigned char *)addr, strlen(addr));
buf_putint(ses.writepayload, port);
encrypt_packet();
@@ -218,7 +218,7 @@ static int newtcpforwarded(struct Channel * channel) {
char portstring[NI_MAXSERV];
int err = SSH_OPEN_ADMINISTRATIVELY_PROHIBITED;
- origaddr = buf_getstring(ses.payload, NULL);
+ origaddr = (char *)buf_getstring(ses.payload, NULL);
origport = buf_getint(ses.payload);
/* Find which port corresponds. First try and match address as well as port,