comparison svr-chansession.c @ 1094:c45d65392c1a

Fix pointer differ in signess warnings [-Werror=pointer-sign]
author Gaël PORTAY <gael.portay@gmail.com>
date Sat, 02 May 2015 15:59:06 +0200
parents aae71c5f7d5b
children ae63de5caf81
comparison
equal deleted inserted replaced
1093:aae71c5f7d5b 1094:c45d65392c1a
181 181
182 CHECKCLEARTOWRITE(); 182 CHECKCLEARTOWRITE();
183 183
184 buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_REQUEST); 184 buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_REQUEST);
185 buf_putint(ses.writepayload, channel->remotechan); 185 buf_putint(ses.writepayload, channel->remotechan);
186 buf_putstring(ses.writepayload, "exit-status", 11); 186 buf_putstring(ses.writepayload, (const unsigned char *) "exit-status", 11);
187 buf_putbyte(ses.writepayload, 0); /* boolean FALSE */ 187 buf_putbyte(ses.writepayload, 0); /* boolean FALSE */
188 buf_putint(ses.writepayload, chansess->exit.exitstatus); 188 buf_putint(ses.writepayload, chansess->exit.exitstatus);
189 189
190 encrypt_packet(); 190 encrypt_packet();
191 191
217 return; 217 return;
218 } 218 }
219 219
220 buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_REQUEST); 220 buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_REQUEST);
221 buf_putint(ses.writepayload, channel->remotechan); 221 buf_putint(ses.writepayload, channel->remotechan);
222 buf_putstring(ses.writepayload, "exit-signal", 11); 222 buf_putstring(ses.writepayload, (const unsigned char *) "exit-signal", 11);
223 buf_putbyte(ses.writepayload, 0); /* boolean FALSE */ 223 buf_putbyte(ses.writepayload, 0); /* boolean FALSE */
224 buf_putstring(ses.writepayload, signame, strlen(signame)); 224 buf_putstring(ses.writepayload, signame, strlen(signame));
225 buf_putbyte(ses.writepayload, chansess->exit.exitcore); 225 buf_putbyte(ses.writepayload, chansess->exit.exitcore);
226 buf_putstring(ses.writepayload, "", 0); /* error msg */ 226 buf_putstring(ses.writepayload, (const unsigned char *) "", 0); /* error msg */
227 buf_putstring(ses.writepayload, "", 0); /* lang */ 227 buf_putstring(ses.writepayload, (const unsigned char *) "", 0); /* lang */
228 228
229 encrypt_packet(); 229 encrypt_packet();
230 } 230 }
231 231
232 /* set up a session channel */ 232 /* set up a session channel */
555 * The pty is allocated now, and kept for when the shell/program executes. 555 * The pty is allocated now, and kept for when the shell/program executes.
556 * Returns DROPBEAR_SUCCESS or DROPBEAR_FAILURE */ 556 * Returns DROPBEAR_SUCCESS or DROPBEAR_FAILURE */
557 static int sessionpty(struct ChanSess * chansess) { 557 static int sessionpty(struct ChanSess * chansess) {
558 558
559 unsigned int termlen; 559 unsigned int termlen;
560 unsigned char namebuf[65]; 560 char namebuf[65];
561 struct passwd * pw = NULL; 561 struct passwd * pw = NULL;
562 562
563 TRACE(("enter sessionpty")) 563 TRACE(("enter sessionpty"))
564 564
565 if (!svr_pubkey_allows_pty()) { 565 if (!svr_pubkey_allows_pty()) {