diff options
| -rw-r--r-- | src/lib/libc/net/rcmdsh.c | 10 | ||||
| -rw-r--r-- | src/lib/libc/net/rresvport.c | 6 | ||||
| -rw-r--r-- | src/lib/libc/net/ruserok.c | 4 | ||||
| -rw-r--r-- | src/lib/libc/stdlib/malloc.c | 4 | ||||
| -rw-r--r-- | src/usr.bin/nc/netcat.c | 32 | ||||
| -rw-r--r-- | src/usr.bin/openssl/apps.c | 28 | ||||
| -rw-r--r-- | src/usr.bin/openssl/s_client.c | 6 | ||||
| -rw-r--r-- | src/usr.bin/openssl/s_server.c | 4 | ||||
| -rw-r--r-- | src/usr.bin/openssl/s_socket.c | 8 | ||||
| -rw-r--r-- | src/usr.sbin/ocspcheck/http.c | 10 |
10 files changed, 56 insertions, 56 deletions
diff --git a/src/lib/libc/net/rcmdsh.c b/src/lib/libc/net/rcmdsh.c index b9cbd6d5d1..66caac3f3d 100644 --- a/src/lib/libc/net/rcmdsh.c +++ b/src/lib/libc/net/rcmdsh.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: rcmdsh.c,v 1.19 2016/05/28 15:46:00 millert Exp $ */ | 1 | /* $OpenBSD: rcmdsh.c,v 1.20 2019/06/28 13:32:42 deraadt Exp $ */ |
| 2 | 2 | ||
| 3 | /* | 3 | /* |
| 4 | * Copyright (c) 2001, MagniComp | 4 | * Copyright (c) 2001, MagniComp |
| @@ -89,13 +89,13 @@ rcmdsh(char **ahost, int rport, const char *locuser, const char *remuser, | |||
| 89 | } | 89 | } |
| 90 | 90 | ||
| 91 | /* Get a socketpair we'll use for stdin and stdout. */ | 91 | /* Get a socketpair we'll use for stdin and stdout. */ |
| 92 | if (socketpair(AF_UNIX, SOCK_STREAM, PF_UNSPEC, sp) < 0) { | 92 | if (socketpair(AF_UNIX, SOCK_STREAM, PF_UNSPEC, sp) == -1) { |
| 93 | perror("rcmdsh: socketpair"); | 93 | perror("rcmdsh: socketpair"); |
| 94 | return(-1); | 94 | return(-1); |
| 95 | } | 95 | } |
| 96 | 96 | ||
| 97 | cpid = fork(); | 97 | cpid = fork(); |
| 98 | if (cpid < 0) { | 98 | if (cpid == -1) { |
| 99 | perror("rcmdsh: fork failed"); | 99 | perror("rcmdsh: fork failed"); |
| 100 | return(-1); | 100 | return(-1); |
| 101 | } else if (cpid == 0) { | 101 | } else if (cpid == 0) { |
| @@ -103,13 +103,13 @@ rcmdsh(char **ahost, int rport, const char *locuser, const char *remuser, | |||
| 103 | * Child. We use sp[1] to be stdin/stdout, and close sp[0]. | 103 | * Child. We use sp[1] to be stdin/stdout, and close sp[0]. |
| 104 | */ | 104 | */ |
| 105 | (void) close(sp[0]); | 105 | (void) close(sp[0]); |
| 106 | if (dup2(sp[1], 0) < 0 || dup2(0, 1) < 0) { | 106 | if (dup2(sp[1], 0) == -1 || dup2(0, 1) == -1) { |
| 107 | perror("rcmdsh: dup2 failed"); | 107 | perror("rcmdsh: dup2 failed"); |
| 108 | _exit(255); | 108 | _exit(255); |
| 109 | } | 109 | } |
| 110 | /* Fork again to lose parent. */ | 110 | /* Fork again to lose parent. */ |
| 111 | cpid = fork(); | 111 | cpid = fork(); |
| 112 | if (cpid < 0) { | 112 | if (cpid == -1) { |
| 113 | perror("rcmdsh: fork to lose parent failed"); | 113 | perror("rcmdsh: fork to lose parent failed"); |
| 114 | _exit(255); | 114 | _exit(255); |
| 115 | } | 115 | } |
diff --git a/src/lib/libc/net/rresvport.c b/src/lib/libc/net/rresvport.c index 6b45000f7b..72c27c3a3f 100644 --- a/src/lib/libc/net/rresvport.c +++ b/src/lib/libc/net/rresvport.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: rresvport.c,v 1.11 2015/09/12 14:56:50 guenther Exp $ */ | 1 | /* $OpenBSD: rresvport.c,v 1.12 2019/06/28 13:32:42 deraadt Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 1995, 1996, 1998 Theo de Raadt. All rights reserved. | 3 | * Copyright (c) 1995, 1996, 1998 Theo de Raadt. All rights reserved. |
| 4 | * Copyright (c) 1983, 1993, 1994 | 4 | * Copyright (c) 1983, 1993, 1994 |
| @@ -82,12 +82,12 @@ rresvport_af(int *alport, int af) | |||
| 82 | sa->sa_family = af; | 82 | sa->sa_family = af; |
| 83 | 83 | ||
| 84 | s = socket(af, SOCK_STREAM, 0); | 84 | s = socket(af, SOCK_STREAM, 0); |
| 85 | if (s < 0) | 85 | if (s == -1) |
| 86 | return (-1); | 86 | return (-1); |
| 87 | 87 | ||
| 88 | *portp = htons(*alport); | 88 | *portp = htons(*alport); |
| 89 | if (*alport < IPPORT_RESERVED - 1) { | 89 | if (*alport < IPPORT_RESERVED - 1) { |
| 90 | if (bind(s, sa, sa->sa_len) >= 0) | 90 | if (bind(s, sa, sa->sa_len) != -1) |
| 91 | return (s); | 91 | return (s); |
| 92 | if (errno != EADDRINUSE) { | 92 | if (errno != EADDRINUSE) { |
| 93 | (void)close(s); | 93 | (void)close(s); |
diff --git a/src/lib/libc/net/ruserok.c b/src/lib/libc/net/ruserok.c index cab6f96449..a399c013e2 100644 --- a/src/lib/libc/net/ruserok.c +++ b/src/lib/libc/net/ruserok.c | |||
| @@ -131,11 +131,11 @@ again: | |||
| 131 | * user or root or if writeable by anyone but the owner, quit. | 131 | * user or root or if writeable by anyone but the owner, quit. |
| 132 | */ | 132 | */ |
| 133 | cp = NULL; | 133 | cp = NULL; |
| 134 | if (lstat(pbuf, &sbuf) < 0) | 134 | if (lstat(pbuf, &sbuf) == -1) |
| 135 | cp = ".rhosts lstat failed"; | 135 | cp = ".rhosts lstat failed"; |
| 136 | else if (!S_ISREG(sbuf.st_mode)) | 136 | else if (!S_ISREG(sbuf.st_mode)) |
| 137 | cp = ".rhosts not regular file"; | 137 | cp = ".rhosts not regular file"; |
| 138 | else if (fstat(fileno(hostf), &sbuf) < 0) | 138 | else if (fstat(fileno(hostf), &sbuf) == -1) |
| 139 | cp = ".rhosts fstat failed"; | 139 | cp = ".rhosts fstat failed"; |
| 140 | else if (sbuf.st_uid && sbuf.st_uid != pwd->pw_uid) | 140 | else if (sbuf.st_uid && sbuf.st_uid != pwd->pw_uid) |
| 141 | cp = "bad .rhosts owner"; | 141 | cp = "bad .rhosts owner"; |
diff --git a/src/lib/libc/stdlib/malloc.c b/src/lib/libc/stdlib/malloc.c index f2e82679e9..7d49438b7b 100644 --- a/src/lib/libc/stdlib/malloc.c +++ b/src/lib/libc/stdlib/malloc.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: malloc.c,v 1.261 2019/05/23 06:43:18 otto Exp $ */ | 1 | /* $OpenBSD: malloc.c,v 1.262 2019/06/28 13:32:42 deraadt Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2008, 2010, 2011, 2016 Otto Moerbeek <otto@drijf.net> | 3 | * Copyright (c) 2008, 2010, 2011, 2016 Otto Moerbeek <otto@drijf.net> |
| 4 | * Copyright (c) 2012 Matthew Dempsky <matthew@openbsd.org> | 4 | * Copyright (c) 2012 Matthew Dempsky <matthew@openbsd.org> |
| @@ -897,7 +897,7 @@ omalloc_make_chunks(struct dir_info *d, int bits, int listnum) | |||
| 897 | return NULL; | 897 | return NULL; |
| 898 | 898 | ||
| 899 | /* memory protect the page allocated in the malloc(0) case */ | 899 | /* memory protect the page allocated in the malloc(0) case */ |
| 900 | if (bits == 0 && mprotect(pp, MALLOC_PAGESIZE, PROT_NONE) < 0) | 900 | if (bits == 0 && mprotect(pp, MALLOC_PAGESIZE, PROT_NONE) == -1) |
| 901 | goto err; | 901 | goto err; |
| 902 | 902 | ||
| 903 | bp = alloc_chunk_info(d, bits); | 903 | bp = alloc_chunk_info(d, bits); |
diff --git a/src/usr.bin/nc/netcat.c b/src/usr.bin/nc/netcat.c index 26288560b0..c2e769c4c0 100644 --- a/src/usr.bin/nc/netcat.c +++ b/src/usr.bin/nc/netcat.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: netcat.c,v 1.204 2019/06/27 18:03:37 deraadt Exp $ */ | 1 | /* $OpenBSD: netcat.c,v 1.205 2019/06/28 13:35:02 deraadt Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2001 Eric Jackson <ericj@monkey.org> | 3 | * Copyright (c) 2001 Eric Jackson <ericj@monkey.org> |
| 4 | * Copyright (c) 2015 Bob Beck. All rights reserved. | 4 | * Copyright (c) 2015 Bob Beck. All rights reserved. |
| @@ -568,7 +568,7 @@ main(int argc, char *argv[]) | |||
| 568 | close(s); | 568 | close(s); |
| 569 | s = local_listen(host, uport, hints); | 569 | s = local_listen(host, uport, hints); |
| 570 | } | 570 | } |
| 571 | if (s < 0) | 571 | if (s == -1) |
| 572 | err(1, NULL); | 572 | err(1, NULL); |
| 573 | if (uflag && kflag) { | 573 | if (uflag && kflag) { |
| 574 | /* | 574 | /* |
| @@ -590,11 +590,11 @@ main(int argc, char *argv[]) | |||
| 590 | len = sizeof(z); | 590 | len = sizeof(z); |
| 591 | rv = recvfrom(s, buf, sizeof(buf), MSG_PEEK, | 591 | rv = recvfrom(s, buf, sizeof(buf), MSG_PEEK, |
| 592 | (struct sockaddr *)&z, &len); | 592 | (struct sockaddr *)&z, &len); |
| 593 | if (rv < 0) | 593 | if (rv == -1) |
| 594 | err(1, "recvfrom"); | 594 | err(1, "recvfrom"); |
| 595 | 595 | ||
| 596 | rv = connect(s, (struct sockaddr *)&z, len); | 596 | rv = connect(s, (struct sockaddr *)&z, len); |
| 597 | if (rv < 0) | 597 | if (rv == -1) |
| 598 | err(1, "connect"); | 598 | err(1, "connect"); |
| 599 | 599 | ||
| 600 | if (vflag) | 600 | if (vflag) |
| @@ -628,7 +628,7 @@ main(int argc, char *argv[]) | |||
| 628 | tls_free(tls_cctx); | 628 | tls_free(tls_cctx); |
| 629 | } | 629 | } |
| 630 | if (family == AF_UNIX && uflag) { | 630 | if (family == AF_UNIX && uflag) { |
| 631 | if (connect(s, NULL, 0) < 0) | 631 | if (connect(s, NULL, 0) == -1) |
| 632 | err(1, "connect"); | 632 | err(1, "connect"); |
| 633 | } | 633 | } |
| 634 | 634 | ||
| @@ -739,7 +739,7 @@ unix_bind(char *path, int flags) | |||
| 739 | 739 | ||
| 740 | /* Create unix domain socket. */ | 740 | /* Create unix domain socket. */ |
| 741 | if ((s = socket(AF_UNIX, flags | (uflag ? SOCK_DGRAM : SOCK_STREAM), | 741 | if ((s = socket(AF_UNIX, flags | (uflag ? SOCK_DGRAM : SOCK_STREAM), |
| 742 | 0)) < 0) | 742 | 0)) == -1) |
| 743 | return -1; | 743 | return -1; |
| 744 | 744 | ||
| 745 | memset(&s_un, 0, sizeof(struct sockaddr_un)); | 745 | memset(&s_un, 0, sizeof(struct sockaddr_un)); |
| @@ -752,7 +752,7 @@ unix_bind(char *path, int flags) | |||
| 752 | return -1; | 752 | return -1; |
| 753 | } | 753 | } |
| 754 | 754 | ||
| 755 | if (bind(s, (struct sockaddr *)&s_un, sizeof(s_un)) < 0) { | 755 | if (bind(s, (struct sockaddr *)&s_un, sizeof(s_un)) == -1) { |
| 756 | save_errno = errno; | 756 | save_errno = errno; |
| 757 | close(s); | 757 | close(s); |
| 758 | errno = save_errno; | 758 | errno = save_errno; |
| @@ -862,10 +862,10 @@ unix_connect(char *path) | |||
| 862 | int s, save_errno; | 862 | int s, save_errno; |
| 863 | 863 | ||
| 864 | if (uflag) { | 864 | if (uflag) { |
| 865 | if ((s = unix_bind(unix_dg_tmp_socket, SOCK_CLOEXEC)) < 0) | 865 | if ((s = unix_bind(unix_dg_tmp_socket, SOCK_CLOEXEC)) == -1) |
| 866 | return -1; | 866 | return -1; |
| 867 | } else { | 867 | } else { |
| 868 | if ((s = socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0)) < 0) | 868 | if ((s = socket(AF_UNIX, SOCK_STREAM | SOCK_CLOEXEC, 0)) == -1) |
| 869 | return -1; | 869 | return -1; |
| 870 | } | 870 | } |
| 871 | 871 | ||
| @@ -878,7 +878,7 @@ unix_connect(char *path) | |||
| 878 | errno = ENAMETOOLONG; | 878 | errno = ENAMETOOLONG; |
| 879 | return -1; | 879 | return -1; |
| 880 | } | 880 | } |
| 881 | if (connect(s, (struct sockaddr *)&s_un, sizeof(s_un)) < 0) { | 881 | if (connect(s, (struct sockaddr *)&s_un, sizeof(s_un)) == -1) { |
| 882 | save_errno = errno; | 882 | save_errno = errno; |
| 883 | close(s); | 883 | close(s); |
| 884 | errno = save_errno; | 884 | errno = save_errno; |
| @@ -897,9 +897,9 @@ unix_listen(char *path) | |||
| 897 | { | 897 | { |
| 898 | int s; | 898 | int s; |
| 899 | 899 | ||
| 900 | if ((s = unix_bind(path, 0)) < 0) | 900 | if ((s = unix_bind(path, 0)) == -1) |
| 901 | return -1; | 901 | return -1; |
| 902 | if (listen(s, 5) < 0) { | 902 | if (listen(s, 5) == -1) { |
| 903 | close(s); | 903 | close(s); |
| 904 | return -1; | 904 | return -1; |
| 905 | } | 905 | } |
| @@ -926,7 +926,7 @@ remote_connect(const char *host, const char *port, struct addrinfo hints) | |||
| 926 | 926 | ||
| 927 | for (res = res0; res; res = res->ai_next) { | 927 | for (res = res0; res; res = res->ai_next) { |
| 928 | if ((s = socket(res->ai_family, res->ai_socktype | | 928 | if ((s = socket(res->ai_family, res->ai_socktype | |
| 929 | SOCK_NONBLOCK, res->ai_protocol)) < 0) | 929 | SOCK_NONBLOCK, res->ai_protocol)) == -1) |
| 930 | continue; | 930 | continue; |
| 931 | 931 | ||
| 932 | /* Bind to a local port or source address if specified. */ | 932 | /* Bind to a local port or source address if specified. */ |
| @@ -944,7 +944,7 @@ remote_connect(const char *host, const char *port, struct addrinfo hints) | |||
| 944 | errx(1, "getaddrinfo: %s", gai_strerror(error)); | 944 | errx(1, "getaddrinfo: %s", gai_strerror(error)); |
| 945 | 945 | ||
| 946 | if (bind(s, (struct sockaddr *)ares->ai_addr, | 946 | if (bind(s, (struct sockaddr *)ares->ai_addr, |
| 947 | ares->ai_addrlen) < 0) | 947 | ares->ai_addrlen) == -1) |
| 948 | err(1, "bind failed"); | 948 | err(1, "bind failed"); |
| 949 | freeaddrinfo(ares); | 949 | freeaddrinfo(ares); |
| 950 | } | 950 | } |
| @@ -1023,7 +1023,7 @@ local_listen(const char *host, const char *port, struct addrinfo hints) | |||
| 1023 | 1023 | ||
| 1024 | for (res = res0; res; res = res->ai_next) { | 1024 | for (res = res0; res; res = res->ai_next) { |
| 1025 | if ((s = socket(res->ai_family, res->ai_socktype, | 1025 | if ((s = socket(res->ai_family, res->ai_socktype, |
| 1026 | res->ai_protocol)) < 0) | 1026 | res->ai_protocol)) == -1) |
| 1027 | continue; | 1027 | continue; |
| 1028 | 1028 | ||
| 1029 | ret = setsockopt(s, SOL_SOCKET, SO_REUSEPORT, &x, sizeof(x)); | 1029 | ret = setsockopt(s, SOL_SOCKET, SO_REUSEPORT, &x, sizeof(x)); |
| @@ -1043,7 +1043,7 @@ local_listen(const char *host, const char *port, struct addrinfo hints) | |||
| 1043 | } | 1043 | } |
| 1044 | 1044 | ||
| 1045 | if (!uflag && s != -1) { | 1045 | if (!uflag && s != -1) { |
| 1046 | if (listen(s, 1) < 0) | 1046 | if (listen(s, 1) == -1) |
| 1047 | err(1, "listen"); | 1047 | err(1, "listen"); |
| 1048 | } | 1048 | } |
| 1049 | if (vflag && s != -1) { | 1049 | if (vflag && s != -1) { |
diff --git a/src/usr.bin/openssl/apps.c b/src/usr.bin/openssl/apps.c index 2297b5bf2b..47e21265af 100644 --- a/src/usr.bin/openssl/apps.c +++ b/src/usr.bin/openssl/apps.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: apps.c,v 1.51 2019/02/09 15:49:21 inoguchi Exp $ */ | 1 | /* $OpenBSD: apps.c,v 1.52 2019/06/28 13:35:02 deraadt Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> | 3 | * Copyright (c) 2014 Joel Sing <jsing@openbsd.org> |
| 4 | * | 4 | * |
| @@ -1377,7 +1377,7 @@ rotate_serial(char *serialfile, char *new_suffix, char *old_suffix) | |||
| 1377 | goto err; | 1377 | goto err; |
| 1378 | } | 1378 | } |
| 1379 | 1379 | ||
| 1380 | if (rename(serialfile, opath) < 0 && | 1380 | if (rename(serialfile, opath) == -1 && |
| 1381 | errno != ENOENT && errno != ENOTDIR) { | 1381 | errno != ENOENT && errno != ENOTDIR) { |
| 1382 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1382 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
| 1383 | serialfile, opath); | 1383 | serialfile, opath); |
| @@ -1386,11 +1386,11 @@ rotate_serial(char *serialfile, char *new_suffix, char *old_suffix) | |||
| 1386 | } | 1386 | } |
| 1387 | 1387 | ||
| 1388 | 1388 | ||
| 1389 | if (rename(npath, serialfile) < 0) { | 1389 | if (rename(npath, serialfile) == -1) { |
| 1390 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1390 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
| 1391 | npath, serialfile); | 1391 | npath, serialfile); |
| 1392 | perror("reason"); | 1392 | perror("reason"); |
| 1393 | if (rename(opath, serialfile) < 0) { | 1393 | if (rename(opath, serialfile) == -1) { |
| 1394 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1394 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
| 1395 | opath, serialfile); | 1395 | opath, serialfile); |
| 1396 | perror("reason"); | 1396 | perror("reason"); |
| @@ -1599,18 +1599,18 @@ rotate_index(const char *dbfile, const char *new_suffix, const char *old_suffix) | |||
| 1599 | goto err; | 1599 | goto err; |
| 1600 | } | 1600 | } |
| 1601 | 1601 | ||
| 1602 | if (rename(dbfile, odbpath) < 0 && errno != ENOENT && errno != ENOTDIR) { | 1602 | if (rename(dbfile, odbpath) == -1 && errno != ENOENT && errno != ENOTDIR) { |
| 1603 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1603 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
| 1604 | dbfile, odbpath); | 1604 | dbfile, odbpath); |
| 1605 | perror("reason"); | 1605 | perror("reason"); |
| 1606 | goto err; | 1606 | goto err; |
| 1607 | } | 1607 | } |
| 1608 | 1608 | ||
| 1609 | if (rename(dbpath, dbfile) < 0) { | 1609 | if (rename(dbpath, dbfile) == -1) { |
| 1610 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1610 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
| 1611 | dbpath, dbfile); | 1611 | dbpath, dbfile); |
| 1612 | perror("reason"); | 1612 | perror("reason"); |
| 1613 | if (rename(odbpath, dbfile) < 0) { | 1613 | if (rename(odbpath, dbfile) == -1) { |
| 1614 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1614 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
| 1615 | odbpath, dbfile); | 1615 | odbpath, dbfile); |
| 1616 | perror("reason"); | 1616 | perror("reason"); |
| @@ -1618,16 +1618,16 @@ rotate_index(const char *dbfile, const char *new_suffix, const char *old_suffix) | |||
| 1618 | goto err; | 1618 | goto err; |
| 1619 | } | 1619 | } |
| 1620 | 1620 | ||
| 1621 | if (rename(attrpath, oattrpath) < 0 && errno != ENOENT && errno != ENOTDIR) { | 1621 | if (rename(attrpath, oattrpath) == -1 && errno != ENOENT && errno != ENOTDIR) { |
| 1622 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1622 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
| 1623 | attrpath, oattrpath); | 1623 | attrpath, oattrpath); |
| 1624 | perror("reason"); | 1624 | perror("reason"); |
| 1625 | if (rename(dbfile, dbpath) < 0) { | 1625 | if (rename(dbfile, dbpath) == -1) { |
| 1626 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1626 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
| 1627 | dbfile, dbpath); | 1627 | dbfile, dbpath); |
| 1628 | perror("reason"); | 1628 | perror("reason"); |
| 1629 | } | 1629 | } |
| 1630 | if (rename(odbpath, dbfile) < 0) { | 1630 | if (rename(odbpath, dbfile) == -1) { |
| 1631 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1631 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
| 1632 | odbpath, dbfile); | 1632 | odbpath, dbfile); |
| 1633 | perror("reason"); | 1633 | perror("reason"); |
| @@ -1635,21 +1635,21 @@ rotate_index(const char *dbfile, const char *new_suffix, const char *old_suffix) | |||
| 1635 | goto err; | 1635 | goto err; |
| 1636 | } | 1636 | } |
| 1637 | 1637 | ||
| 1638 | if (rename(nattrpath, attrpath) < 0) { | 1638 | if (rename(nattrpath, attrpath) == -1) { |
| 1639 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1639 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
| 1640 | nattrpath, attrpath); | 1640 | nattrpath, attrpath); |
| 1641 | perror("reason"); | 1641 | perror("reason"); |
| 1642 | if (rename(oattrpath, attrpath) < 0) { | 1642 | if (rename(oattrpath, attrpath) == -1) { |
| 1643 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1643 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
| 1644 | oattrpath, attrpath); | 1644 | oattrpath, attrpath); |
| 1645 | perror("reason"); | 1645 | perror("reason"); |
| 1646 | } | 1646 | } |
| 1647 | if (rename(dbfile, dbpath) < 0) { | 1647 | if (rename(dbfile, dbpath) == -1) { |
| 1648 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1648 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
| 1649 | dbfile, dbpath); | 1649 | dbfile, dbpath); |
| 1650 | perror("reason"); | 1650 | perror("reason"); |
| 1651 | } | 1651 | } |
| 1652 | if (rename(odbpath, dbfile) < 0) { | 1652 | if (rename(odbpath, dbfile) == -1) { |
| 1653 | BIO_printf(bio_err, "unable to rename %s to %s\n", | 1653 | BIO_printf(bio_err, "unable to rename %s to %s\n", |
| 1654 | odbpath, dbfile); | 1654 | odbpath, dbfile); |
| 1655 | perror("reason"); | 1655 | perror("reason"); |
diff --git a/src/usr.bin/openssl/s_client.c b/src/usr.bin/openssl/s_client.c index e542f08481..23bf67e695 100644 --- a/src/usr.bin/openssl/s_client.c +++ b/src/usr.bin/openssl/s_client.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s_client.c,v 1.37 2018/11/14 06:24:21 tb Exp $ */ | 1 | /* $OpenBSD: s_client.c,v 1.38 2019/06/28 13:35:02 deraadt Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -759,7 +759,7 @@ re_start: | |||
| 759 | if (SSL_version(con) == DTLS1_VERSION) { | 759 | if (SSL_version(con) == DTLS1_VERSION) { |
| 760 | 760 | ||
| 761 | sbio = BIO_new_dgram(s, BIO_NOCLOSE); | 761 | sbio = BIO_new_dgram(s, BIO_NOCLOSE); |
| 762 | if (getsockname(s, &peer, (void *) &peerlen) < 0) { | 762 | if (getsockname(s, &peer, (void *) &peerlen) == -1) { |
| 763 | BIO_printf(bio_err, "getsockname:errno=%d\n", | 763 | BIO_printf(bio_err, "getsockname:errno=%d\n", |
| 764 | errno); | 764 | errno); |
| 765 | shutdown(s, SHUT_RD); | 765 | shutdown(s, SHUT_RD); |
| @@ -1013,7 +1013,7 @@ re_start: | |||
| 1013 | tty_on,read_tty,write_tty,read_ssl,write_ssl);*/ | 1013 | tty_on,read_tty,write_tty,read_ssl,write_ssl);*/ |
| 1014 | 1014 | ||
| 1015 | i = poll(pfd, 3, ptimeout); | 1015 | i = poll(pfd, 3, ptimeout); |
| 1016 | if (i < 0) { | 1016 | if (i == -1) { |
| 1017 | BIO_printf(bio_err, "bad select %d\n", | 1017 | BIO_printf(bio_err, "bad select %d\n", |
| 1018 | errno); | 1018 | errno); |
| 1019 | goto shut; | 1019 | goto shut; |
diff --git a/src/usr.bin/openssl/s_server.c b/src/usr.bin/openssl/s_server.c index 4bdafaf682..a15795151f 100644 --- a/src/usr.bin/openssl/s_server.c +++ b/src/usr.bin/openssl/s_server.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s_server.c,v 1.30 2018/02/07 05:47:55 jsing Exp $ */ | 1 | /* $OpenBSD: s_server.c,v 1.31 2019/06/28 13:35:02 deraadt Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -1512,7 +1512,7 @@ sv_body(char *hostname, int s, unsigned char *context) | |||
| 1512 | n = write(fileno(stdout), buf + len, i - len); | 1512 | n = write(fileno(stdout), buf + len, i - len); |
| 1513 | } while (n == -1 && errno == EINTR); | 1513 | } while (n == -1 && errno == EINTR); |
| 1514 | 1514 | ||
| 1515 | if (n < 0) { | 1515 | if (n == -1) { |
| 1516 | BIO_printf(bio_s_out, "ERROR\n"); | 1516 | BIO_printf(bio_s_out, "ERROR\n"); |
| 1517 | goto err; | 1517 | goto err; |
| 1518 | } | 1518 | } |
diff --git a/src/usr.bin/openssl/s_socket.c b/src/usr.bin/openssl/s_socket.c index 62b32d3936..5d90fad8bb 100644 --- a/src/usr.bin/openssl/s_socket.c +++ b/src/usr.bin/openssl/s_socket.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $OpenBSD: s_socket.c,v 1.10 2018/08/19 20:07:06 tb Exp $ */ | 1 | /* $OpenBSD: s_socket.c,v 1.11 2019/06/28 13:35:02 deraadt Exp $ */ |
| 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) | 2 | /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) |
| 3 | * All rights reserved. | 3 | * All rights reserved. |
| 4 | * | 4 | * |
| @@ -107,7 +107,7 @@ init_client(int *sock, char *host, char *port, int type, int af) | |||
| 107 | i = 0; | 107 | i = 0; |
| 108 | i = setsockopt(s, SOL_SOCKET, SO_KEEPALIVE, | 108 | i = setsockopt(s, SOL_SOCKET, SO_KEEPALIVE, |
| 109 | (char *) &i, sizeof(i)); | 109 | (char *) &i, sizeof(i)); |
| 110 | if (i < 0) { | 110 | if (i == -1) { |
| 111 | perror("keepalive"); | 111 | perror("keepalive"); |
| 112 | goto out; | 112 | goto out; |
| 113 | } | 113 | } |
| @@ -251,10 +251,10 @@ do_accept(int acc_sock, int *sock, char **host) | |||
| 251 | ling.l_onoff=1; | 251 | ling.l_onoff=1; |
| 252 | ling.l_linger=0; | 252 | ling.l_linger=0; |
| 253 | i=setsockopt(ret,SOL_SOCKET,SO_LINGER,(char *)&ling,sizeof(ling)); | 253 | i=setsockopt(ret,SOL_SOCKET,SO_LINGER,(char *)&ling,sizeof(ling)); |
| 254 | if (i < 0) { perror("linger"); return(0); } | 254 | if (i == -1) { perror("linger"); return(0); } |
| 255 | i=0; | 255 | i=0; |
| 256 | i=setsockopt(ret,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i)); | 256 | i=setsockopt(ret,SOL_SOCKET,SO_KEEPALIVE,(char *)&i,sizeof(i)); |
| 257 | if (i < 0) { perror("keepalive"); return(0); } | 257 | if (i == -1) { perror("keepalive"); return(0); } |
| 258 | */ | 258 | */ |
| 259 | 259 | ||
| 260 | if (host == NULL) | 260 | if (host == NULL) |
diff --git a/src/usr.sbin/ocspcheck/http.c b/src/usr.sbin/ocspcheck/http.c index 5c914a4857..e0df6cfa11 100644 --- a/src/usr.sbin/ocspcheck/http.c +++ b/src/usr.sbin/ocspcheck/http.c | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | /* $Id: http.c,v 1.11 2018/11/29 14:25:07 tedu Exp $ */ | 1 | /* $Id: http.c,v 1.12 2019/06/28 13:32:49 deraadt Exp $ */ |
| 2 | /* | 2 | /* |
| 3 | * Copyright (c) 2016 Kristaps Dzonsons <kristaps@bsd.lv> | 3 | * Copyright (c) 2016 Kristaps Dzonsons <kristaps@bsd.lv> |
| 4 | * | 4 | * |
| @@ -72,7 +72,7 @@ dosysread(char *buf, size_t sz, const struct http *http) | |||
| 72 | ssize_t rc; | 72 | ssize_t rc; |
| 73 | 73 | ||
| 74 | rc = read(http->fd, buf, sz); | 74 | rc = read(http->fd, buf, sz); |
| 75 | if (rc < 0) | 75 | if (rc == -1) |
| 76 | warn("%s: read", http->src.ip); | 76 | warn("%s: read", http->src.ip); |
| 77 | return rc; | 77 | return rc; |
| 78 | } | 78 | } |
| @@ -83,7 +83,7 @@ dosyswrite(const void *buf, size_t sz, const struct http *http) | |||
| 83 | ssize_t rc; | 83 | ssize_t rc; |
| 84 | 84 | ||
| 85 | rc = write(http->fd, buf, sz); | 85 | rc = write(http->fd, buf, sz); |
| 86 | if (rc < 0) | 86 | if (rc == -1) |
| 87 | warn("%s: write", http->src.ip); | 87 | warn("%s: write", http->src.ip); |
| 88 | return rc; | 88 | return rc; |
| 89 | } | 89 | } |
| @@ -97,7 +97,7 @@ dotlsread(char *buf, size_t sz, const struct http *http) | |||
| 97 | rc = tls_read(http->ctx, buf, sz); | 97 | rc = tls_read(http->ctx, buf, sz); |
| 98 | } while (rc == TLS_WANT_POLLIN || rc == TLS_WANT_POLLOUT); | 98 | } while (rc == TLS_WANT_POLLIN || rc == TLS_WANT_POLLOUT); |
| 99 | 99 | ||
| 100 | if (rc < 0) | 100 | if (rc == -1) |
| 101 | warnx("%s: tls_read: %s", http->src.ip, | 101 | warnx("%s: tls_read: %s", http->src.ip, |
| 102 | tls_error(http->ctx)); | 102 | tls_error(http->ctx)); |
| 103 | return rc; | 103 | return rc; |
| @@ -112,7 +112,7 @@ dotlswrite(const void *buf, size_t sz, const struct http *http) | |||
| 112 | rc = tls_write(http->ctx, buf, sz); | 112 | rc = tls_write(http->ctx, buf, sz); |
| 113 | } while (rc == TLS_WANT_POLLIN || rc == TLS_WANT_POLLOUT); | 113 | } while (rc == TLS_WANT_POLLIN || rc == TLS_WANT_POLLOUT); |
| 114 | 114 | ||
| 115 | if (rc < 0) | 115 | if (rc == -1) |
| 116 | warnx("%s: tls_write: %s", http->src.ip, | 116 | warnx("%s: tls_write: %s", http->src.ip, |
| 117 | tls_error(http->ctx)); | 117 | tls_error(http->ctx)); |
| 118 | return rc; | 118 | return rc; |
