Skip to content

Commit 05540e4

Browse files
committed
Fixed warnings
1 parent ceefc14 commit 05540e4

1 file changed

Lines changed: 8 additions & 8 deletions

File tree

test/test.cc

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -274,7 +274,7 @@ TEST(SocketStream, wait_writable_INET) {
274274
sockaddr_in addr;
275275
memset(&addr, 0, sizeof(addr));
276276
addr.sin_family = AF_INET;
277-
addr.sin_port = htons(PORT + 1);
277+
addr.sin_port = htons(static_cast<uint16_t>(PORT + 1));
278278
addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK);
279279

280280
int disconnected_svr_sock = -1;
@@ -8904,7 +8904,7 @@ TEST(ClientVulnerabilityTest, UnboundedReadWithoutContentLength) {
89048904

89058905
sockaddr_in addr{};
89068906
addr.sin_family = AF_INET;
8907-
addr.sin_port = htons(PORT + 2);
8907+
addr.sin_port = htons(static_cast<uint16_t>(PORT + 2));
89088908
::inet_pton(AF_INET, "127.0.0.1", &addr.sin_addr);
89098909

89108910
int opt = 1;
@@ -9010,7 +9010,7 @@ TEST(ClientVulnerabilityTest, PayloadMaxLengthZeroMeansNoLimit) {
90109010

90119011
sockaddr_in addr{};
90129012
addr.sin_family = AF_INET;
9013-
addr.sin_port = htons(PORT + 2);
9013+
addr.sin_port = htons(static_cast<uint16_t>(PORT + 2));
90149014
::inet_pton(AF_INET, "127.0.0.1", &addr.sin_addr);
90159015

90169016
int opt = 1;
@@ -9121,7 +9121,7 @@ TEST(ClientVulnerabilityTest, ContentReceiverBypassesDefaultPayloadMaxLength) {
91219121

91229122
sockaddr_in addr{};
91239123
addr.sin_family = AF_INET;
9124-
addr.sin_port = htons(PORT + 2);
9124+
addr.sin_port = htons(static_cast<uint16_t>(PORT + 2));
91259125
::inet_pton(AF_INET, "127.0.0.1", &addr.sin_addr);
91269126

91279127
int opt = 1;
@@ -9230,7 +9230,7 @@ TEST(ClientVulnerabilityTest,
92309230

92319231
sockaddr_in addr{};
92329232
addr.sin_family = AF_INET;
9233-
addr.sin_port = htons(PORT + 2);
9233+
addr.sin_port = htons(static_cast<uint16_t>(PORT + 2));
92349234
::inet_pton(AF_INET, "127.0.0.1", &addr.sin_addr);
92359235

92369236
int opt = 1;
@@ -9338,7 +9338,7 @@ TEST(ClientVulnerabilityTest,
93389338

93399339
sockaddr_in addr{};
93409340
addr.sin_family = AF_INET;
9341-
addr.sin_port = htons(PORT + 2);
9341+
addr.sin_port = htons(static_cast<uint16_t>(PORT + 2));
93429342
::inet_pton(AF_INET, "127.0.0.1", &addr.sin_addr);
93439343

93449344
int opt = 1;
@@ -9474,7 +9474,7 @@ TEST(ClientVulnerabilityTest, ZipBombWithoutContentLength) {
94749474

94759475
sockaddr_in addr{};
94769476
addr.sin_family = AF_INET;
9477-
addr.sin_port = htons(PORT + 3);
9477+
addr.sin_port = htons(static_cast<uint16_t>(PORT + 3));
94789478
::inet_pton(AF_INET, "127.0.0.1", &addr.sin_addr);
94799479

94809480
int opt = 1;
@@ -12360,7 +12360,7 @@ TEST(VulnerabilityTest, CRLFInjectionInHeaders) {
1236012360

1236112361
sockaddr_in addr{};
1236212362
addr.sin_family = AF_INET;
12363-
addr.sin_port = htons(PORT + 1);
12363+
addr.sin_port = htons(static_cast<uint16_t>(PORT + 1));
1236412364
::inet_pton(AF_INET, "127.0.0.1", &addr.sin_addr);
1236512365
::bind(srv, reinterpret_cast<sockaddr *>(&addr), sizeof(addr));
1236612366
::listen(srv, 1);

0 commit comments

Comments
 (0)