diff options
author | deraadt <> | 2019-06-28 13:35:02 +0000 |
---|---|---|
committer | deraadt <> | 2019-06-28 13:35:02 +0000 |
commit | 6585927e66d9ab172754d95c4296dd4309a40512 (patch) | |
tree | bc969c069c7b769f2601db17f08bec99274202a5 /src | |
parent | 74ff76124ba7a371400a9f60d5e33192a3732f03 (diff) | |
download | openbsd-6585927e66d9ab172754d95c4296dd4309a40512.tar.gz openbsd-6585927e66d9ab172754d95c4296dd4309a40512.tar.bz2 openbsd-6585927e66d9ab172754d95c4296dd4309a40512.zip |
When system calls indicate an error they return -1, not some arbitrary
value < 0. errno is only updated in this case. Change all (most?)
callers of syscalls to follow this better, and let's see if this strictness
helps us in the future.
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libc/net/rcmdsh.c | 10 | ||||
-rw-r--r-- | src/lib/libc/net/rresvport.c | 6 | ||||
-rw-r--r-- | src/lib/libc/net/ruserok.c | 4 | ||||
-rw-r--r-- | src/lib/libc/stdlib/malloc.c | 4 | ||||
-rw-r--r-- | src/usr.bin/nc/netcat.c | 32 | ||||
-rw-r--r-- | src/usr.bin/openssl/apps.c | 28 | ||||
-rw-r--r-- | src/usr.bin/openssl/s_client.c | 6 | ||||
-rw-r--r-- | src/usr.bin/openssl/s_server.c | 4 | ||||
-rw-r--r-- | src/usr.bin/openssl/s_socket.c | 8 | ||||
-rw-r--r-- | src/usr.sbin/ocspcheck/http.c | 10 |
10 files changed, 56 insertions, 56 deletions
diff --git a/src/lib/libc/net/rcmdsh.c b/src/lib/libc/net/rcmdsh.c index b9cbd6d5d1..66caac3f3d 100644 --- a/src/lib/libc/net/rcmdsh.c +++ b/src/lib/libc/net/rcmdsh.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: rcmdsh.c,v 1.19 2016/05/28 15:46:00 millert Exp $ */ | 1 | /* $OpenBSD: rcmdsh.c,v 1.20 2019/06/28 13:32:42 deraadt Exp $ */ |
2 | 2 | ||
3 | /* | 3 | /* |
4 | * Copyright (c) 2001, MagniComp | 4 | * Copyright (c) 2001, MagniComp |
@@ -89,13 +89,13 @@ rcmdsh(char **ahost, int rport, const char *locuser, const char *remuser, | |||
89 | } | 89 | } |
90 | 90 | ||
91 | /* Get a socketpair we'll use for stdin and stdout. */ | 91 | /* Get a socketpair we'll use for stdin and stdout. */ |
92 | if (socketpair(AF_UNIX, SOCK_STREAM, PF_UNSPEC, sp) < 0) { | 92 | if (socketpair(AF_UNIX, SOCK_STREAM, PF_UNSPEC, sp) == -1) { |
93 | perror("rcmdsh: socketpair"); | 93 | perror("rcmdsh: socketpair"); |
94 | return(-1); | 94 | return(-1); |
95 | } | 95 | } |
96 | 96 | ||
97 | cpid = fork(); | 97 | cpid = fork(); |
98 | if (cpid < 0) { | 98 | if (cpid == -1) { |
99 | perror("rcmdsh: fork failed"); | 99 | perror("rcmdsh: fork failed"); |
100 | return(-1); | 100 | return(-1); |
101 | } else if (cpid == 0) { | 101 | } else if (cpid == 0) { |
@@ -103,13 +103,13 @@ rcmdsh(char **ahost, int rport, const char *locuser, const char *remuser, | |||
103 | * Child. We use sp[1] to be stdin/stdout, and close sp[0]. | 103 | * Child. We use sp[1] to be stdin/stdout, and close sp[0]. |
104 | */ | 104 | */ |
105 | (void) close(sp[0]); | 105 | (void) close(sp[0]); |
106 | if (dup2(sp[1], 0) < 0 || dup2(0, 1) < 0) { | 106 | if (dup2(sp[1], 0) == -1 || dup2(0, 1) == -1) { |
107 | perror("rcmdsh: dup2 failed"); | 107 | perror("rcmdsh: dup2 failed"); |
108 | _exit(255); | 108 | _exit(255); |
109 | } | 109 | } |
110 | /* Fork again to lose parent. */ | 110 | /* Fork again to lose parent. */ |
111 | cpid = fork(); | 111 | cpid = fork(); |
112 | if (cpid < 0) { | 112 | if (cpid == -1) { |
113 | perror("rcmdsh: fork to lose parent failed"); | 113 | perror("rcmdsh: fork to lose parent failed"); |
114 | _exit(255); | 114 | _exit(255); |
115 | } | 115 | } |
diff --git a/src/lib/libc/net/rresvport.c b/src/lib/libc/net/rresvport.c index 6b45000f7b..72c27c3a3f 100644 --- a/src/lib/libc/net/rresvport.c +++ b/src/lib/libc/net/rresvport.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: rresvport.c,v 1.11 2015/09/12 14:56:50 guenther Exp $ */ | 1 | /* $OpenBSD: rresvport.c,v 1.12 2019/06/28 13:32:42 deraadt Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 1995, 1996, 1998 Theo de Raadt. All rights reserved. | 3 | * Copyright (c) 1995, 1996, 1998 Theo de Raadt. All rights reserved. |
4 | * Copyright (c) 1983, 1993, 1994 | 4 | * Copyright (c) 1983, 1993, 1994 |
@@ -82,12 +82,12 @@ rresvport_af(int *alport, int af) | |||
82 | sa->sa_family = af; | 82 | sa->sa_family = af; |
83 | 83 | ||
84 | s = socket(af, SOCK_STREAM, 0); | 84 | s = socket(af, SOCK_STREAM, 0); |
85 | if (s < 0) | 85 | if (s == -1) |
86 | return (-1); | 86 | return (-1); |
87 | 87 | ||
88 | *portp = htons(*alport); | 88 | *portp = htons(*alport); |
89 | if (*alport < IPPORT_RESERVED - 1) { | 89 | if (*alport < IPPORT_RESERVED - 1) { |
90 | if (bind(s, sa, sa->sa_len) >= 0) | 90 | if (bind(s, sa, sa->sa_len) != -1) |
91 | return (s); | 91 | return (s); |
92 | if (errno != EADDRINUSE) { | 92 | if (errno != EADDRINUSE) { |
93 | (void)close(s); | 93 | (void)close(s); |
diff --git a/src/lib/libc/net/ruserok.c b/src/lib/libc/net/ruserok.c index cab6f96449..a399c013e2 100644 --- a/src/lib/libc/net/ruserok.c +++ b/src/lib/libc/net/ruserok.c | |||
@@ -131,11 +131,11 @@ again: | |||
131 | * user or root or if writeable by anyone but the owner, quit. | 131 | * user or root or if writeable by anyone but the owner, quit. |
132 | */ | 132 | */ |
133 | cp = NULL; | 133 | cp = NULL; |
134 | if (lstat(pbuf, &sbuf) < 0) | 134 | if (lstat(pbuf, &sbuf) == -1) |
135 | cp = ".rhosts lstat failed"; | 135 | cp = ".rhosts lstat failed"; |
136 | else if (!S_ISREG(sbuf.st_mode)) | 136 | else if (!S_ISREG(sbuf.st_mode)) |
137 | cp = ".rhosts not regular file"; | 137 | cp = ".rhosts not regular file"; |
138 | else if (fstat(fileno(hostf), &sbuf) < 0) | 138 | else if (fstat(fileno(hostf), &sbuf) == -1) |
139 | cp = ".rhosts fstat failed"; | 139 | cp = ".rhosts fstat failed"; |
140 | else if (sbuf.st_uid && sbuf.st_uid != pwd->pw_uid) | 140 | else if (sbuf.st_uid && sbuf.st_uid != pwd->pw_uid) |
141 | cp = "bad .rhosts owner"; | 141 | cp = "bad .rhosts owner"; |
diff --git a/src/lib/libc/stdlib/malloc.c b/src/lib/libc/stdlib/malloc.c index f2e82679e9..7d49438b7b 100644 --- a/src/lib/libc/stdlib/malloc.c +++ b/src/lib/libc/stdlib/malloc.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: malloc.c,v 1.261 2019/05/23 06:43:18 otto Exp $ */ | 1 | /* $OpenBSD: malloc.c,v 1.262 2019/06/28 13:32:42 deraadt Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2008, 2010, 2011, 2016 Otto Moerbeek <otto@drijf.net> | 3 | * Copyright (c) 2008, 2010, 2011, 2016 Otto Moerbeek <otto@drijf.net> |
4 | * Copyright (c) 2012 Matthew Dempsky <matthew@openbsd.org> | 4 | * Copyright (c) 2012 Matthew Dempsky <matthew@openbsd.org> |
@@ -897,7 +897,7 @@ omalloc_make_chunks(struct dir_info *d, int bits, int listnum) | |||
897 | return NULL; | 897 | return NULL; |
898 | 898 | ||
899 | /* memory protect the page allocated in the malloc(0) case */ | 899 | /* memory protect the page allocated in the malloc(0) case */ |
900 | if (bits == 0 && mprotect(pp, MALLOC_PAGESIZE, PROT_NONE) < 0) | 900 | if (bits == 0 && mprotect(pp, MALLOC_PAGESIZE, PROT_NONE) == -1) |
901 | goto err; | 901 | goto err; |
902 | 902 | ||
903 | bp = alloc_chunk_info(d, bits); | 903 | bp = alloc_chunk_info(d, bits); |
diff --git a/src/usr.bin/nc/netcat.c b/src/usr.bin/nc/netcat.c index 26288560b0..c2e769c4c0 100644 --- a/src/usr.bin/nc/netcat.c +++ b/src/usr.bin/nc/netcat.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: netcat.c,v 1.204 2019/06/27 18:03:37 deraadt Exp $ */ | 1 | /* $OpenBSD: netcat.c,v 1.205 2019/06/28 13:35:02 deraadt Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2001 Eric Jackson <ericj@monkey.org> | 3 | * Copyright (c) 2001 Eric Jackson <ericj@monkey.org> |
4 | * Copyright (c) 2015 Bob Beck. All rights reserved. | 4 | * Copyright (c) 2015 Bob Beck. All rights reserved. |
@@ -568,7 +568,7 @@ main(int argc, char *argv[]) | |||
568 | close(s); | 568 | close(s); |
569 | s = local_listen(host, uport, hints); | 569 | s = local_listen(host, uport, hints); |
570 | } | 570 | } |
571 | if (s < 0) | 571 | if (s == -1) |
572 | err(1, NULL); | 572 | err(1, NULL); |
573 | if (uflag && kflag) { | 573 | if (uflag && kflag) { |
574 | /* | 574 | /* |
@@ -590,11 +590,11 @@ main(int argc, char *argv[]) | |||
590 | len = sizeof(z); | 590 | len = sizeof(z); |
591 | rv = recvfrom(s, buf, sizeof(buf), MSG_PEEK, | 591 | rv = recvfrom(s, buf, sizeof(buf), MSG_PEEK, |
592 | (struct sockaddr *)&z, &len); | 592 | (struct sockaddr *)&z, &len); |
593 | if (rv < 0) | 593 | if (rv == -1) |
594 | err(1, "recvfrom"); | 594 | err(1, "recvfrom"); |
595 | 595 | ||
596 | rv = connect(s, (struct sockaddr *)&z, len); | 596 | rv = connect(s, (struct sockaddr *)&z, len); |
597 | if (rv < 0) | 597 | if (rv == -1) |
598 | err(1, "connect"); | 598 | err(1, "connect"); |
599 | 599 | ||
600 | if (vflag) | 600 | if (vflag) |
@@ -628,7 +628,7 @@ main(int argc, char *argv[]) | |||
628 | tls_free(tls_cctx); | 628 | tls_free(tls_cctx); |
629 | } | 629 | } |
630 | if (family == AF_UNIX && uflag) { | 630 | if (family == AF_UNIX && uflag) { |
631 | if (connect(s, NULL, 0) < 0) | 631 | if (connect(s, NULL, 0) == -1) |
632 | err(1, "connect"); | 632 | err(1, "connect"); |
633 | } | 633 | } |
634 | 634 | ||
@@ -739,7 +739,7 @@ unix_bind(char *path, int flags) | |||
739 | 739 | ||
740 | /* Create unix domain socket. */ | 740 | /* Create unix domain socket. */ |
741 | if ((s = socket(AF_UNIX, flags | (uflag ? SOCK_DGRAM : SOCK_STREAM), | 741 | if ((s = socket(AF_UNIX, flags | (uflag ? SOCK_DGRAM : SOCK_STREAM), |
742 | 0)) < 0) | 742 | 0)) == -1) |
743 | return -1; | 743 | return -1; |
744 | 744 | ||
745 | memset(&s_un, 0, sizeof(struct sockaddr_un)); | 745 | memset(&s_un, 0, sizeof(struct sockaddr_un)); |
@@ -752,7 +752,7 @@ unix_bind(char *path, int flags) | |||
752 | return -1; | 752 | return -1; |
753 | } | 753 | } |
754 | 754 | ||
755 | if (bind(s, (struct sockaddr *)&s_un, sizeof(s_un)) < 0) { | 755 | if (bind(s, (struct sockaddr *)&s_un, sizeof(s_un)) == -1) { |
756 | save_errno = errno; | 756 | save_errno = errno; |
757 | close(s); | 757 | close(s); |
758 | errno = save_errno; | 758 | errno = save_errno; |
@@ -862,10 +862,10 @@ unix_connect(char *path) | |||
862 | int s, save_errno; | 862 | int s, save_errno; |
863 | 863 | ||
864 | if (uflag) { | 864 | if (uflag) { |
865 | if ((s = unix_bind(unix_dg_tmp_socket, SOCK_CLOEXEC)) < 0) | 865 | if ((s = unix_bind(unix_dg_tmp_socket, SOCK_CLOEXEC)) == -1) |
866 | return -1; | 866 | return -1; |
867 | } else { | 867 | } else { |
868 | if ((s = socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0)) < 0) | 868 | if ((s = socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0)) == -1) |
869 | return -1; | 869 | return -1; |
870 | } | 870 | } |
871 | 871 | ||
@@ -878,7 +878,7 @@ unix_connect(char *path) | |||
878 | errno = ENAMETOOLONG; | 878 | errno = ENAMETOOLONG; |
879 | return -1; | 879 | return -1; |
880 | } | 880 | } |
881 | if (connect(s, (struct sockaddr *)&s_un, sizeof(s_un)) < 0) { | 881 | if (connect(s, (struct sockaddr *)&s_un, sizeof(s_un)) == -1) { |
882 | save_errno = errno; | 882 | save_errno = errno; |
883 | close(s); | 883 | close(s); |
884 | errno = save_errno; | 884 | errno = save_errno; |
@@ -897,9 +897,9 @@ unix_listen(char *path) | |||
897 | { | 897 | { |
898 | int s; | 898 | int s; |
899 | 899 | ||
900 | if ((s = unix_bind(path, 0)) < 0) | 900 | if ((s = unix_bind(path, 0)) == -1) |
901 | return -1; | 901 | return -1; |
902 | if (listen(s, 5) < 0) { | 902 | if (listen(s, 5) == -1) { |
903 | close(s); | 903 | close(s); |
904 | return -1; | 904 | return -1; |
905 | } | 905 | } |
@@ -926,7 +926,7 @@ remote_connect(const char *host, const char *port, struct addrinfo hints) | |||
926 | 926 | ||
927 | for (res = res0; res; res = res->ai_next) { | 927 | for (res = res0; res; res = res->ai_next) { |
928 | if ((s = socket(res->ai_family, res->ai_socktype | | 928 | if ((s = socket(res->ai_family, res->ai_socktype | |
929 | SOCK_NONBLOCK, res->ai_protocol)) < 0) | 929 | SOCK_NONBLOCK, res->ai_protocol)) == -1) |
930 | continue; | 930 | continue; |
931 | 931 | ||
932 | /* Bind to a local port or source address if specified. */ | 932 | /* Bind to a local port or source address if specified. */ |
@@ -944,7 +944,7 @@ remote_connect(const char *host, const char *port, struct addrinfo hints) | |||
944 | errx(1, "getaddrinfo: %s", gai_strerror(error)); | 944 | errx(1, "getaddrinfo: %s", gai_strerror(error)); |
945 | 945 | ||
946 | if (bind(s, (struct sockaddr *)ares->ai_addr, | 946 | if (bind(s, (struct sockaddr *)ares->ai_addr, |
947 | ares->ai_addrlen) < 0) | 947 | ares->ai_addrlen) == -1) |
948 | err(1, "bind failed"); | 948 | err(1, "bind failed"); |
949 | freeaddrinfo(ares); | 949 | freeaddrinfo(ares); |
950 | } | 950 | } |
@@ -1023,7 +1023,7 @@ local_listen(const char *host, const char *port, struct addrinfo hints) | |||
1023 | 1023 | ||
1024 | for (res = res0; res; res = res->ai_next) { | 1024 | for (res = res0; res; res = res->ai_next) { |
1025 | if ((s = socket(res->ai_family, res->ai_socktype, | 1025 | if ((s = socket(res->ai_family, res->ai_socktype, |
1026 | res->ai_protocol)) < 0) | 1026 | res->ai_protocol)) == -1) |
1027 | continue; | 1027 | continue; |
1028 | 1028 | ||
1029 | ret = setsockopt(s, SOL_SOCKET, SO_REUSEPORT, &x, sizeof(x)); | 1029 | ret = setsockopt(s, SOL_SOCKET, SO_REUSEPORT, &x, sizeof(x)); |
@@ -1043,7 +1043,7 @@ local_listen(const char *host, const char *port, struct addrinfo hints) | |||
1043 | } | 1043 | } |
1044 | 1044 | ||
1045 | if (!uflag && s != -1) { | 1045 | if (!uflag && s != -1) { |
1046 | if (listen(s, 1) < 0) | 1046 | if (listen(s, 1) == -1) |
1047 | err(1, "listen"); | 1047 | err(1, "listen"); |
1048 | } | 1048 | } |
1049 | if (vflag && s != -1) { | 1049 | if (vflag && s != -1) { |
diff --git a/src/usr.bin/openssl/apps.c b/src/usr.bin/openssl/apps.c index 2297b5bf2b..47e21265af 100644 --- a/src/usr.bin/openssl/apps.c +++ b/src/usr.bin/openssl/apps.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: apps.c,v 1.51 2019/02/09 15:49:21 inoguchi Exp $ */ | 1 | /* $OpenBSD: apps.c,v 1.52 2019/06/28 13:35:02 deraadt Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> |
4 | * | 4 | * |
@@ -1377,7 +1377,7 @@ rotate_serial(char *serialfile, char *new_suffix, char *old_suffix) | |||
1377 | goto err; | 1377 | goto err; |
1378 | } | 1378 | } |
1379 | 1379 | ||
1380 | if (rename(serialfile, opath) < 0 && | 1380 | if (rename(serialfile, opath) == -1 && |
1381 | errno != ENOENT && errno != ENOTDIR) { | 1381 | errno != ENOENT && errno != ENOTDIR) { |
1382 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1382 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
1383 | serialfile, opath); | 1383 | serialfile, opath); |
@@ -1386,11 +1386,11 @@ rotate_serial(char *serialfile, char *new_suffix, char *old_suffix) | |||
1386 | } | 1386 | } |
1387 | 1387 | ||
1388 | 1388 | ||
1389 | if (rename(npath, serialfile) < 0) { | 1389 | if (rename(npath, serialfile) == -1) { |
1390 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1390 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
1391 | npath, serialfile); | 1391 | npath, serialfile); |
1392 | perror("reason"); | 1392 | perror("reason"); |
1393 | if (rename(opath, serialfile) < 0) { | 1393 | if (rename(opath, serialfile) == -1) { |
1394 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1394 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
1395 | opath, serialfile); | 1395 | opath, serialfile); |
1396 | perror("reason"); | 1396 | perror("reason"); |
@@ -1599,18 +1599,18 @@ rotate_index(const char *dbfile, const char *new_suffix, const char *old_suffix) | |||
1599 | goto err; | 1599 | goto err; |
1600 | } | 1600 | } |
1601 | 1601 | ||
1602 | if (rename(dbfile, odbpath) < 0 && errno != ENOENT && errno != ENOTDIR) { | 1602 | if (rename(dbfile, odbpath) == -1 && errno != ENOENT && errno != ENOTDIR) { |
1603 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1603 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
1604 | dbfile, odbpath); | 1604 | dbfile, odbpath); |
1605 | perror("reason"); | 1605 | perror("reason"); |
1606 | goto err; | 1606 | goto err; |
1607 | } | 1607 | } |
1608 | 1608 | ||
1609 | if (rename(dbpath, dbfile) < 0) { | 1609 | if (rename(dbpath, dbfile) == -1) { |
1610 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1610 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
1611 | dbpath, dbfile); | 1611 | dbpath, dbfile); |
1612 | perror("reason"); | 1612 | perror("reason"); |
1613 | if (rename(odbpath, dbfile) < 0) { | 1613 | if (rename(odbpath, dbfile) == -1) { |
1614 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1614 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
1615 | odbpath, dbfile); | 1615 | odbpath, dbfile); |
1616 | perror("reason"); | 1616 | perror("reason"); |
@@ -1618,16 +1618,16 @@ rotate_index(const char *dbfile, const char *new_suffix, const char *old_suffix) | |||
1618 | goto err; | 1618 | goto err; |
1619 | } | 1619 | } |
1620 | 1620 | ||
1621 | if (rename(attrpath, oattrpath) < 0 && errno != ENOENT && errno != ENOTDIR) { | 1621 | if (rename(attrpath, oattrpath) == -1 && errno != ENOENT && errno != ENOTDIR) { |
1622 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1622 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
1623 | attrpath, oattrpath); | 1623 | attrpath, oattrpath); |
1624 | perror("reason"); | 1624 | perror("reason"); |
1625 | if (rename(dbfile, dbpath) < 0) { | 1625 | if (rename(dbfile, dbpath) == -1) { |
1626 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1626 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
1627 | dbfile, dbpath); | 1627 | dbfile, dbpath); |
1628 | perror("reason"); | 1628 | perror("reason"); |
1629 | } | 1629 | } |
1630 | if (rename(odbpath, dbfile) < 0) { | 1630 | if (rename(odbpath, dbfile) == -1) { |
1631 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1631 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
1632 | odbpath, dbfile); | 1632 | odbpath, dbfile); |
1633 | perror("reason"); | 1633 | perror("reason"); |
@@ -1635,21 +1635,21 @@ rotate_index(const char *dbfile, const char *new_suffix, const char *old_suffix) | |||
1635 | goto err; | 1635 | goto err; |
1636 | } | 1636 | } |
1637 | 1637 | ||
1638 | if (rename(nattrpath, attrpath) < 0) { | 1638 | if (rename(nattrpath, attrpath) == -1) { |
1639 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1639 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
1640 | nattrpath, attrpath); | 1640 | nattrpath, attrpath); |
1641 | perror("reason"); | 1641 | perror("reason"); |
1642 | if (rename(oattrpath, attrpath) < 0) { | 1642 | if (rename(oattrpath, attrpath) == -1) { |
1643 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1643 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
1644 | oattrpath, attrpath); | 1644 | oattrpath, attrpath); |
1645 | perror("reason"); | 1645 | perror("reason"); |
1646 | } | 1646 | } |
1647 | if (rename(dbfile, dbpath) < 0) { | 1647 | if (rename(dbfile, dbpath) == -1) { |
1648 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1648 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
1649 | dbfile, dbpath); | 1649 | dbfile, dbpath); |
1650 | perror("reason"); | 1650 | perror("reason"); |
1651 | } | 1651 | } |
1652 | if (rename(odbpath, dbfile) < 0) { | 1652 | if (rename(odbpath, dbfile) == -1) { |
1653 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1653 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
1654 | odbpath, dbfile); | 1654 | odbpath, dbfile); |
1655 | perror("reason"); | 1655 | perror("reason"); |
diff --git a/src/usr.bin/openssl/s_client.c b/src/usr.bin/openssl/s_client.c index e542f08481..23bf67e695 100644 --- a/src/usr.bin/openssl/s_client.c +++ b/src/usr.bin/openssl/s_client.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s_client.c,v 1.37 2018/11/14 06:24:21 tb Exp $ */ | 1 | /* $OpenBSD: s_client.c,v 1.38 2019/06/28 13:35:02 deraadt Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -759,7 +759,7 @@ re_start: | |||
759 | if (SSL_version(con) == DTLS1_VERSION) { | 759 | if (SSL_version(con) == DTLS1_VERSION) { |
760 | 760 | ||
761 | sbio = BIO_new_dgram(s, BIO_NOCLOSE); | 761 | sbio = BIO_new_dgram(s, BIO_NOCLOSE); |
762 | if (getsockname(s, &peer, (void *) &peerlen) < 0) { | 762 | if (getsockname(s, &peer, (void *) &peerlen) == -1) { |
763 | BIO_printf(bio_err, "getsockname:errno=%d\n", | 763 | BIO_printf(bio_err, "getsockname:errno=%d\n", |
764 | errno); | 764 | errno); |
765 | shutdown(s, SHUT_RD); | 765 | shutdown(s, SHUT_RD); |
@@ -1013,7 +1013,7 @@ re_start: | |||
1013 | tty_on,read_tty,write_tty,read_ssl,write_ssl);*/ | 1013 | tty_on,read_tty,write_tty,read_ssl,write_ssl);*/ |
1014 | 1014 | ||
1015 | i = poll(pfd, 3, ptimeout); | 1015 | i = poll(pfd, 3, ptimeout); |
1016 | if (i < 0) { | 1016 | if (i == -1) { |
1017 | BIO_printf(bio_err, "bad select %d\n", | 1017 | BIO_printf(bio_err, "bad select %d\n", |
1018 | errno); | 1018 | errno); |
1019 | goto shut; | 1019 | goto shut; |
diff --git a/src/usr.bin/openssl/s_server.c b/src/usr.bin/openssl/s_server.c index 4bdafaf682..a15795151f 100644 --- a/src/usr.bin/openssl/s_server.c +++ b/src/usr.bin/openssl/s_server.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s_server.c,v 1.30 2018/02/07 05:47:55 jsing Exp $ */ | 1 | /* $OpenBSD: s_server.c,v 1.31 2019/06/28 13:35:02 deraadt Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -1512,7 +1512,7 @@ sv_body(char *hostname, int s, unsigned char *context) | |||
1512 | n = write(fileno(stdout), buf + len, i - len); | 1512 | n = write(fileno(stdout), buf + len, i - len); |
1513 | } while (n == -1 && errno == EINTR); | 1513 | } while (n == -1 && errno == EINTR); |
1514 | 1514 | ||
1515 | if (n < 0) { | 1515 | if (n == -1) { |
1516 | BIO_printf(bio_s_out, "ERROR\n"); | 1516 | BIO_printf(bio_s_out, "ERROR\n"); |
1517 | goto err; | 1517 | goto err; |
1518 | } | 1518 | } |
diff --git a/src/usr.bin/openssl/s_socket.c b/src/usr.bin/openssl/s_socket.c index 62b32d3936..5d90fad8bb 100644 --- a/src/usr.bin/openssl/s_socket.c +++ b/src/usr.bin/openssl/s_socket.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: s_socket.c,v 1.10 2018/08/19 20:07:06 tb Exp $ */ | 1 | /* $OpenBSD: s_socket.c,v 1.11 2019/06/28 13:35:02 deraadt Exp $ */ |
2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
3 | * All rights reserved. | 3 | * All rights reserved. |
4 | * | 4 | * |
@@ -107,7 +107,7 @@ init_client(int *sock, char *host, char *port, int type, int af) | |||
107 | i = 0; | 107 | i = 0; |
108 | i = setsockopt(s, SOL_SOCKET, SO_KEEPALIVE, | 108 | i = setsockopt(s, SOL_SOCKET, SO_KEEPALIVE, |
109 | (char *) &i, sizeof(i)); | 109 | (char *) &i, sizeof(i)); |
110 | if (i < 0) { | 110 | if (i == -1) { |
111 | perror("keepalive"); | 111 | perror("keepalive"); |
112 | goto out; | 112 | goto out; |
113 | } | 113 | } |
@@ -251,10 +251,10 @@ do_accept(int acc_sock, int *sock, char **host) | |||
251 | ling.l_onoff=1; | 251 | ling.l_onoff=1; |
252 | ling.l_linger=0; | 252 | ling.l_linger=0; |
253 | i=setsockopt(ret,SOL_SOCKET,SO_LINGER,(char *)&ling,sizeof(ling)); | 253 | i=setsockopt(ret,SOL_SOCKET,SO_LINGER,(char *)&ling,sizeof(ling)); |
254 | if (i < 0) { perror("linger"); return(0); } | 254 | if (i == -1) { perror("linger"); return(0); } |
255 | i=0; | 255 | i=0; |
256 | i=setsockopt(ret,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i)); | 256 | i=setsockopt(ret,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i)); |
257 | if (i < 0) { perror("keepalive"); return(0); } | 257 | if (i == -1) { perror("keepalive"); return(0); } |
258 | */ | 258 | */ |
259 | 259 | ||
260 | if (host == NULL) | 260 | if (host == NULL) |
diff --git a/src/usr.sbin/ocspcheck/http.c b/src/usr.sbin/ocspcheck/http.c index 5c914a4857..e0df6cfa11 100644 --- a/src/usr.sbin/ocspcheck/http.c +++ b/src/usr.sbin/ocspcheck/http.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $Id: http.c,v 1.11 2018/11/29 14:25:07 tedu Exp $ */ | 1 | /* $Id: http.c,v 1.12 2019/06/28 13:32:49 deraadt Exp $ */ |
2 | /* | 2 | /* |
3 | * Copyright (c) 2016 Kristaps Dzonsons <kristaps@bsd.lv> | 3 | * Copyright (c) 2016 Kristaps Dzonsons <kristaps@bsd.lv> |
4 | * | 4 | * |
@@ -72,7 +72,7 @@ dosysread(char *buf, size_t sz, const struct http *http) | |||
72 | ssize_t rc; | 72 | ssize_t rc; |
73 | 73 | ||
74 | rc = read(http->fd, buf, sz); | 74 | rc = read(http->fd, buf, sz); |
75 | if (rc < 0) | 75 | if (rc == -1) |
76 | warn("%s: read", http->src.ip); | 76 | warn("%s: read", http->src.ip); |
77 | return rc; | 77 | return rc; |
78 | } | 78 | } |
@@ -83,7 +83,7 @@ dosyswrite(const void *buf, size_t sz, const struct http *http) | |||
83 | ssize_t rc; | 83 | ssize_t rc; |
84 | 84 | ||
85 | rc = write(http->fd, buf, sz); | 85 | rc = write(http->fd, buf, sz); |
86 | if (rc < 0) | 86 | if (rc == -1) |
87 | warn("%s: write", http->src.ip); | 87 | warn("%s: write", http->src.ip); |
88 | return rc; | 88 | return rc; |
89 | } | 89 | } |
@@ -97,7 +97,7 @@ dotlsread(char *buf, size_t sz, const struct http *http) | |||
97 | rc = tls_read(http->ctx, buf, sz); | 97 | rc = tls_read(http->ctx, buf, sz); |
98 | } while (rc == TLS_WANT_POLLIN || rc == TLS_WANT_POLLOUT); | 98 | } while (rc == TLS_WANT_POLLIN || rc == TLS_WANT_POLLOUT); |
99 | 99 | ||
100 | if (rc < 0) | 100 | if (rc == -1) |
101 | warnx("%s: tls_read: %s", http->src.ip, | 101 | warnx("%s: tls_read: %s", http->src.ip, |
102 | tls_error(http->ctx)); | 102 | tls_error(http->ctx)); |
103 | return rc; | 103 | return rc; |
@@ -112,7 +112,7 @@ dotlswrite(const void *buf, size_t sz, const struct http *http) | |||
112 | rc = tls_write(http->ctx, buf, sz); | 112 | rc = tls_write(http->ctx, buf, sz); |
113 | } while (rc == TLS_WANT_POLLIN || rc == TLS_WANT_POLLOUT); | 113 | } while (rc == TLS_WANT_POLLIN || rc == TLS_WANT_POLLOUT); |
114 | 114 | ||
115 | if (rc < 0) | 115 | if (rc == -1) |
116 | warnx("%s: tls_write: %s", http->src.ip, | 116 | warnx("%s: tls_write: %s", http->src.ip, |
117 | tls_error(http->ctx)); | 117 | tls_error(http->ctx)); |
118 | return rc; | 118 | return rc; |