@@ -730,7 +730,7 @@ static X509_STORE* NewRootCertStore() {
730
730
BIO_free (bp);
731
731
732
732
// Parse errors from the built-in roots are fatal.
733
- CHECK_NE (x509, nullptr );
733
+ CHECK_NOT_NULL (x509);
734
734
735
735
root_certs_vector.push_back (x509);
736
736
}
@@ -1578,7 +1578,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
1578
1578
int rv;
1579
1579
1580
1580
ext = X509_get_ext (cert, index );
1581
- CHECK_NE (ext, nullptr );
1581
+ CHECK_NOT_NULL (ext);
1582
1582
1583
1583
if (!SafeX509ExtPrint (bio.get (), ext)) {
1584
1584
rv = X509V3_EXT_print (bio.get (), ext, 0 , 0 );
@@ -3377,7 +3377,7 @@ void Hash::HashDigest(const FunctionCallbackInfo<Value>& args) {
3377
3377
3378
3378
3379
3379
SignBase::Error SignBase::Init (const char * sign_type) {
3380
- CHECK_EQ (mdctx_, nullptr );
3380
+ CHECK_NULL (mdctx_);
3381
3381
// Historically, "dss1" and "DSS1" were DSA aliases for SHA-1
3382
3382
// exposed through the public API.
3383
3383
if (strcmp (sign_type, " dss1" ) == 0 ||
@@ -4232,7 +4232,7 @@ void DiffieHellman::SetKey(const v8::FunctionCallbackInfo<Value>& args,
4232
4232
BIGNUM* num =
4233
4233
BN_bin2bn (reinterpret_cast <unsigned char *>(Buffer::Data (args[0 ])),
4234
4234
Buffer::Length (args[0 ]), nullptr );
4235
- CHECK_NE (num, nullptr );
4235
+ CHECK_NOT_NULL (num);
4236
4236
CHECK_EQ (1 , set_field (dh->dh_ .get (), num));
4237
4237
}
4238
4238
@@ -4490,7 +4490,7 @@ void ECDH::SetPrivateKey(const FunctionCallbackInfo<Value>& args) {
4490
4490
USE (&mark_pop_error_on_return);
4491
4491
4492
4492
const BIGNUM* priv_key = EC_KEY_get0_private_key (ecdh->key_ .get ());
4493
- CHECK_NE (priv_key, nullptr );
4493
+ CHECK_NOT_NULL (priv_key);
4494
4494
4495
4495
ECPointPointer pub (EC_POINT_new (ecdh->group_ ));
4496
4496
CHECK (pub);
@@ -5001,7 +5001,7 @@ void VerifySpkac(const FunctionCallbackInfo<Value>& args) {
5001
5001
return args.GetReturnValue ().Set (verify_result);
5002
5002
5003
5003
char * data = Buffer::Data (args[0 ]);
5004
- CHECK_NE (data, nullptr );
5004
+ CHECK_NOT_NULL (data);
5005
5005
5006
5006
verify_result = VerifySpkac (data, length);
5007
5007
@@ -5046,7 +5046,7 @@ void ExportPublicKey(const FunctionCallbackInfo<Value>& args) {
5046
5046
return args.GetReturnValue ().SetEmptyString ();
5047
5047
5048
5048
char * data = Buffer::Data (args[0 ]);
5049
- CHECK_NE (data, nullptr );
5049
+ CHECK_NOT_NULL (data);
5050
5050
5051
5051
size_t pkey_size;
5052
5052
char * pkey = ExportPublicKey (data, length, &pkey_size);
@@ -5078,7 +5078,7 @@ void ExportChallenge(const FunctionCallbackInfo<Value>& args) {
5078
5078
return args.GetReturnValue ().SetEmptyString ();
5079
5079
5080
5080
char * data = Buffer::Data (args[0 ]);
5081
- CHECK_NE (data, nullptr );
5081
+ CHECK_NOT_NULL (data);
5082
5082
5083
5083
OpenSSLBuffer cert = ExportChallenge (data, len);
5084
5084
if (!cert)
0 commit comments