diff options
author | Gerald Combs <gerald@wireshark.org> | 2009-04-16 00:45:26 +0000 |
---|---|---|
committer | Gerald Combs <gerald@wireshark.org> | 2009-04-16 00:45:26 +0000 |
commit | 1582e052a196d25a78f8b63bb2f46ce039c0f255 (patch) | |
tree | 6b65acff2d6b239f131eaf8e109ecd8c85915f3a /gtk/follow_tcp.c | |
parent | 36e002f7e8dc8fb3f9fa13863f43da527fafa176 (diff) | |
download | wireshark-1582e052a196d25a78f8b63bb2f46ce039c0f255.tar.gz |
More Win64 fixes.
svn path=/trunk/; revision=28062
Diffstat (limited to 'gtk/follow_tcp.c')
-rw-r--r-- | gtk/follow_tcp.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/gtk/follow_tcp.c b/gtk/follow_tcp.c index ef22411ecf..df1854c8d5 100644 --- a/gtk/follow_tcp.c +++ b/gtk/follow_tcp.c @@ -174,7 +174,7 @@ follow_tcp_stream_cb(GtkWidget * w, gpointer data _U_) /* allocate our new filter. API claims g_malloc terminates program on failure */ /* my calc for max alloc needed is really +10 but when did a few extra bytes hurt ? */ - filter_out_filter_len = strlen(follow_filter) + strlen(previous_filter) + 16; + filter_out_filter_len = (int)(strlen(follow_filter) + strlen(previous_filter) + 16); follow_info->filter_out_filter = (gchar *)g_malloc(filter_out_filter_len); /* append the negation */ @@ -392,7 +392,7 @@ follow_read_tcp_stream(follow_info_t *follow_info, if (nchars == 0) break; /* XXX - if we don't get "bcount" bytes, is that an error? */ - sc.dlen -= nchars; + sc.dlen -= (guint32) nchars; if (!skip) { frs_return = follow_show(follow_info, print_line, buffer, |