Mercurial > dropbear
diff svr-chansession.c @ 1123:d7b752525b91
buf_getstring and buf_putstring now use non-unsigned char*
author | Matt Johnston <matt@ucc.asn.au> |
---|---|
date | Thu, 04 Jun 2015 23:08:50 +0800 |
parents | 367d3800555b |
children | b1fabf797bd3 |
line wrap: on
line diff
--- a/svr-chansession.c Thu Jun 04 22:25:28 2015 +0800 +++ b/svr-chansession.c Thu Jun 04 23:08:50 2015 +0800 @@ -183,7 +183,7 @@ buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_REQUEST); buf_putint(ses.writepayload, channel->remotechan); - buf_putstring(ses.writepayload, (const unsigned char *) "exit-status", 11); + buf_putstring(ses.writepayload, "exit-status", 11); buf_putbyte(ses.writepayload, 0); /* boolean FALSE */ buf_putint(ses.writepayload, chansess->exit.exitstatus); @@ -219,12 +219,12 @@ buf_putbyte(ses.writepayload, SSH_MSG_CHANNEL_REQUEST); buf_putint(ses.writepayload, channel->remotechan); - buf_putstring(ses.writepayload, (const unsigned char *) "exit-signal", 11); + buf_putstring(ses.writepayload, "exit-signal", 11); buf_putbyte(ses.writepayload, 0); /* boolean FALSE */ - buf_putstring(ses.writepayload, (const unsigned char *) signame, strlen(signame)); + buf_putstring(ses.writepayload, signame, strlen(signame)); buf_putbyte(ses.writepayload, chansess->exit.exitcore); - buf_putstring(ses.writepayload, (const unsigned char *) "", 0); /* error msg */ - buf_putstring(ses.writepayload, (const unsigned char *) "", 0); /* lang */ + buf_putstring(ses.writepayload, "", 0); /* error msg */ + buf_putstring(ses.writepayload, "", 0); /* lang */ encrypt_packet(); } @@ -351,7 +351,7 @@ TRACE(("enter chansessionrequest")) - type = (char *) buf_getstring(ses.payload, &typelen); + type = buf_getstring(ses.payload, &typelen); wantreply = buf_getbool(ses.payload); if (typelen > MAX_NAME_LEN) { @@ -414,7 +414,7 @@ return DROPBEAR_FAILURE; } - signame = (char *) buf_getstring(ses.payload, NULL); + signame = buf_getstring(ses.payload, NULL); i = 0; while (signames[i].name != 0) { @@ -567,7 +567,7 @@ return DROPBEAR_FAILURE; } - chansess->term = (char *) buf_getstring(ses.payload, &termlen); + chansess->term = buf_getstring(ses.payload, &termlen); if (termlen > MAX_TERM_LEN) { /* TODO send disconnect ? */ TRACE(("leave sessionpty: term len too long")) @@ -649,7 +649,7 @@ if (iscmd) { /* "exec" */ if (chansess->cmd == NULL) { - chansess->cmd = (char *) buf_getstring(ses.payload, &cmdlen); + chansess->cmd = buf_getstring(ses.payload, &cmdlen); if (cmdlen > MAX_CMD_LEN) { m_free(chansess->cmd);