{
rsa_num=DSA_sign(EVP_PKEY_DSA,buf,20,buf2,
&kk,dsa_key[j]);
- if (rsa_num <= 0)
+ if (rsa_num == 0)
{
BIO_printf(bio_err,"DSA sign failure\n");
ERR_print_errors(bio_err);
{
rsa_num2=DSA_verify(EVP_PKEY_DSA,buf,20,buf2,
kk,dsa_key[j]);
- if (rsa_num2 <= 0)
+ if (rsa_num2 == 0)
{
BIO_printf(bio_err,"DSA verify failure\n");
ERR_print_errors(bio_err);
available = bio_nread0(bio, buf);
if (num > available)
num = available;
- if (num <= 0)
+ if (num == 0)
return num;
b = bio->ptr;
space = bio_nwrite0(bio, buf);
if (num > space)
num = space;
- if (num <= 0)
+ if (num == 0)
return num;
b = bio->ptr;
assert(b != NULL);
/* if it went, fall through and send more stuff */
}
- if (len <= 0) return(len);
+ if (len == 0) return(len);
wr= &(s->s3->wrec);
wb= &(s->s3->wbuf);
memcpy(buf,&(rr->data[rr->off]),(unsigned int)n);
rr->length-=n;
rr->off+=n;
- if (rr->length <= 0)
+ if (rr->length == 0)
{
s->rstate=SSL_ST_READ_HEADER;
rr->off=0;