#define PORT_STR "4433"
#define PROTOCOL "tcp"
-int do_server(int port, int type, int *ret, int (*cb) (char *hostname, int s, unsigned char *context), char *context);
+int do_server(int port, int type, int *ret, int (*cb) (char *hostname, int s, unsigned char *context), unsigned char *context);
#ifdef HEADER_X509_H
int MS_CALLBACK verify_callback(int ok, X509_STORE_CTX *ctx);
#endif
#endif
struct sockaddr peer;
- int peerlen = sizeof(peer);
+ socklen_t peerlen = sizeof(peer);
int enable_timeouts = 0 ;
long mtu = 0;
int vflags = 0;
short port=PORT;
char *CApath=NULL,*CAfile=NULL;
- char *context = NULL;
+ unsigned char *context = NULL;
char *dhfile = NULL;
char *named_curve = NULL;
int badop=0,bugs=0;
else if (strcmp(*argv,"-context") == 0)
{
if (--argc < 1) goto bad;
- context= *(++argv);
+ context= (unsigned char *)*(++argv);
}
else if (strcmp(*argv,"-cert") == 0)
{
return(1);
}
-int do_server(int port, int type, int *ret, int (*cb)(char *hostname, int s, unsigned char *context), char *context)
+int do_server(int port, int type, int *ret, int (*cb)(char *hostname, int s, unsigned char *context), unsigned char *context)
{
int sock;
char *name = NULL;
dtls1_fix_message_header(s, frag_off,
len - DTLS1_HM_HEADER_LENGTH);
- dtls1_write_message_header(s, &s->init_buf->data[s->init_off]);
+ dtls1_write_message_header(s, (unsigned char *)&s->init_buf->data[s->init_off]);
OPENSSL_assert(len >= DTLS1_HM_HEADER_LENGTH);
}
{
unsigned char *p;
- p = s->init_buf->data;
+ p = (unsigned char *)s->init_buf->data;
ssl3_finish_mac(s, &p[s->init_num - frag_len], frag_len);
}
goto err;
}
- p = s->init_buf->data;
+ p = (unsigned char *)s->init_buf->data;
/* read the body of the fragment (header has already been read */
if ( msg_hdr->frag_len > 0)
s->state=stn;
/* next state (stn) */
- p = s->init_buf->data;
+ p = (unsigned char *)s->init_buf->data;
if ( frag_len > 0)
{
* fill that so that we can process the data at a fixed place.
*/
{
- unsigned int i, dest_maxlen = 0;
+ unsigned int k, dest_maxlen = 0;
unsigned char *dest = NULL;
unsigned int *dest_len = NULL;
}
/* now move 'n' bytes: */
- for ( i = 0; i < dest_maxlen; i++)
+ for ( k = 0; k < dest_maxlen; k++)
{
- dest[i] = rr->data[rr->off++];
+ dest[k] = rr->data[rr->off++];
rr->length--;
}
*dest_len = dest_maxlen;
{
int i,j;
void (*cb)(const SSL *ssl,int type,int val)=NULL;
- char buf[2 + 2 + 3]; /* alert level + alert desc + message seq +frag_off */
- char *ptr = &buf[0];
+ unsigned char buf[2 + 2 + 3]; /* alert level + alert desc + message seq +frag_off */
+ unsigned char *ptr = &buf[0];
s->s3->alert_dispatch=0;