socks[0] = socks[1] = -1;
do {
if (setsockopt(listener, SOL_SOCKET, SO_REUSEADDR,
- (char*) &reuse, (socklen_t) sizeof(reuse)) == -1)
+ (char *) &reuse, (socklen_t) sizeof(reuse)) == -1)
break;
if (bind(listener, &a.addr, sizeof(a.inaddr)) == SOCKET_ERROR)
break;
if (this->len < 40)
return -EFBIG;
- ret = LZ4_compress_default((void*)this->data, (void*)vpninfo->deflate_pkt->data,
+ ret = LZ4_compress_default((void *)this->data, (void *)vpninfo->deflate_pkt->data,
this->len, this->len);
if (ret <= 0) {
if (ret == 0)
* the RFC5705 context, the output is identical with gnutls_prf(). The
* latter is available in much earlier versions of gnutls. */
err = gnutls_prf(vpninfo->https_sess, PSK_LABEL_SIZE, PSK_LABEL,
- 0, 0, 0, PSK_KEY_SIZE, (char*)vpninfo->dtls_secret);
+ 0, 0, 0, PSK_KEY_SIZE, (char *)vpninfo->dtls_secret);
if (err < 0) {
vpn_progress(vpninfo, PRG_ERR,
_("Failed to generate DTLS key: %s\n"),