Loading apps/speed.c +2 −2 Original line number Diff line number Diff line Loading @@ -1044,7 +1044,7 @@ int MAIN(int argc, char **argv) { rsa_num=DSA_sign(EVP_PKEY_DSA,buf,20,buf2, &kk,dsa_key[j]); if (rsa_num <= 0) if (rsa_num == 0) { BIO_printf(bio_err,"DSA sign failure\n"); ERR_print_errors(bio_err); Loading @@ -1067,7 +1067,7 @@ int MAIN(int argc, char **argv) { rsa_num2=DSA_verify(EVP_PKEY_DSA,buf,20,buf2, kk,dsa_key[j]); if (rsa_num2 <= 0) if (rsa_num2 == 0) { BIO_printf(bio_err,"DSA verify failure\n"); ERR_print_errors(bio_err); Loading crypto/bio/bss_bio.c +2 −2 Original line number Diff line number Diff line Loading @@ -250,7 +250,7 @@ static size_t bio_nread(BIO *bio, char **buf, size_t num) available = bio_nread0(bio, buf); if (num > available) num = available; if (num <= 0) if (num == 0) return num; b = bio->ptr; Loading Loading @@ -406,7 +406,7 @@ static size_t bio_nwrite(BIO *bio, char **buf, size_t num) space = bio_nwrite0(bio, buf); if (num > space) num = space; if (num <= 0) if (num == 0) return num; b = bio->ptr; assert(b != NULL); Loading ssl/s3_pkt.c +2 −2 Original line number Diff line number Diff line Loading @@ -548,7 +548,7 @@ static int do_ssl3_write(SSL *s, int type, const unsigned char *buf, /* if it went, fall through and send more stuff */ } if (len <= 0) return(len); if (len == 0) return(len); wr= &(s->s3->wrec); wb= &(s->s3->wbuf); Loading Loading @@ -962,7 +962,7 @@ start: memcpy(buf,&(rr->data[rr->off]),(unsigned int)n); rr->length-=n; rr->off+=n; if (rr->length <= 0) if (rr->length == 0) { s->rstate=SSL_ST_READ_HEADER; rr->off=0; Loading Loading
apps/speed.c +2 −2 Original line number Diff line number Diff line Loading @@ -1044,7 +1044,7 @@ int MAIN(int argc, char **argv) { rsa_num=DSA_sign(EVP_PKEY_DSA,buf,20,buf2, &kk,dsa_key[j]); if (rsa_num <= 0) if (rsa_num == 0) { BIO_printf(bio_err,"DSA sign failure\n"); ERR_print_errors(bio_err); Loading @@ -1067,7 +1067,7 @@ int MAIN(int argc, char **argv) { rsa_num2=DSA_verify(EVP_PKEY_DSA,buf,20,buf2, kk,dsa_key[j]); if (rsa_num2 <= 0) if (rsa_num2 == 0) { BIO_printf(bio_err,"DSA verify failure\n"); ERR_print_errors(bio_err); Loading
crypto/bio/bss_bio.c +2 −2 Original line number Diff line number Diff line Loading @@ -250,7 +250,7 @@ static size_t bio_nread(BIO *bio, char **buf, size_t num) available = bio_nread0(bio, buf); if (num > available) num = available; if (num <= 0) if (num == 0) return num; b = bio->ptr; Loading Loading @@ -406,7 +406,7 @@ static size_t bio_nwrite(BIO *bio, char **buf, size_t num) space = bio_nwrite0(bio, buf); if (num > space) num = space; if (num <= 0) if (num == 0) return num; b = bio->ptr; assert(b != NULL); Loading
ssl/s3_pkt.c +2 −2 Original line number Diff line number Diff line Loading @@ -548,7 +548,7 @@ static int do_ssl3_write(SSL *s, int type, const unsigned char *buf, /* if it went, fall through and send more stuff */ } if (len <= 0) return(len); if (len == 0) return(len); wr= &(s->s3->wrec); wb= &(s->s3->wbuf); Loading Loading @@ -962,7 +962,7 @@ start: memcpy(buf,&(rr->data[rr->off]),(unsigned int)n); rr->length-=n; rr->off+=n; if (rr->length <= 0) if (rr->length == 0) { s->rstate=SSL_ST_READ_HEADER; rr->off=0; Loading