else /* ( type == SOCK_DGRAM) */
s = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
- if (s == INVALID_SOCKET) {
+ if (s == (int)INVALID_SOCKET) {
perror("socket");
return (0);
}
return (0);
s = socket(AF_UNIX, SOCK_STREAM, 0);
- if (s == INVALID_SOCKET) {
+ if (s == (int)INVALID_SOCKET) {
perror("socket");
return (0);
}
else /* type == SOCK_DGRAM */
s = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
- if (s == INVALID_SOCKET)
+ if (s == (int)INVALID_SOCKET)
goto err;
# if defined SOL_SOCKET && defined SO_REUSEADDR
{
return (0);
s = socket(AF_UNIX, SOCK_STREAM, 0);
- if (s == INVALID_SOCKET)
+ if (s == (int)INVALID_SOCKET)
goto err;
memset(&server, 0, sizeof(server));
* can either go for (int *) or (void *).
*/
ret = accept(acc_sock, (struct sockaddr *)&from, (void *)&len);
- if (ret == INVALID_SOCKET) {
+ if (ret == (int)INVALID_SOCKET) {
# if defined(OPENSSL_SYS_WINDOWS) || (defined(OPENSSL_SYS_NETWARE) && !defined(NETWARE_BSDSOCK))
int i;
i = WSAGetLastError();
/* return(0); */
} else {
*host = app_malloc(strlen(h1->h_name) + 1, "copy hostname");
- BUF_strlcpy(*host, h1->h_name, strlen(h1->h_name) + 1);
+ OPENSSL_strlcpy(*host, h1->h_name, strlen(h1->h_name) + 1);
h2 = gethostbyname(*host);
if (h2 == NULL) {
redoit:
ret = accept(acc_sock, NULL, NULL);
- if (ret == INVALID_SOCKET) {
+ if (ret == (int)INVALID_SOCKET) {
if (errno == EINTR) {
/*
* check_timeout();