@@ -730,7 +730,7 @@ static X509_STORE* NewRootCertStore() {
730
730
BIO_free (bp);
731
731
732
732
// Parse errors from the built-in roots are fatal.
733
- CHECK_NE (x509, nullptr );
733
+ CHECK_NOT_NULL (x509);
734
734
735
735
root_certs_vector.push_back (x509);
736
736
}
@@ -1578,7 +1578,7 @@ static Local<Object> X509ToObject(Environment* env, X509* cert) {
1578
1578
int rv;
1579
1579
1580
1580
ext = X509_get_ext (cert, index );
1581
- CHECK_NE (ext, nullptr );
1581
+ CHECK_NOT_NULL (ext);
1582
1582
1583
1583
if (!SafeX509ExtPrint (bio.get (), ext)) {
1584
1584
rv = X509V3_EXT_print (bio.get (), ext, 0 , 0 );
@@ -3383,7 +3383,7 @@ void Hash::HashDigest(const FunctionCallbackInfo<Value>& args) {
3383
3383
3384
3384
3385
3385
SignBase::Error SignBase::Init (const char * sign_type) {
3386
- CHECK_EQ (mdctx_, nullptr );
3386
+ CHECK_NULL (mdctx_);
3387
3387
// Historically, "dss1" and "DSS1" were DSA aliases for SHA-1
3388
3388
// exposed through the public API.
3389
3389
if (strcmp (sign_type, " dss1" ) == 0 ||
@@ -4238,7 +4238,7 @@ void DiffieHellman::SetKey(const v8::FunctionCallbackInfo<Value>& args,
4238
4238
BIGNUM* num =
4239
4239
BN_bin2bn (reinterpret_cast <unsigned char *>(Buffer::Data (args[0 ])),
4240
4240
Buffer::Length (args[0 ]), nullptr );
4241
- CHECK_NE (num, nullptr );
4241
+ CHECK_NOT_NULL (num);
4242
4242
CHECK_EQ (1 , set_field (dh->dh_ .get (), num));
4243
4243
}
4244
4244
@@ -4496,7 +4496,7 @@ void ECDH::SetPrivateKey(const FunctionCallbackInfo<Value>& args) {
4496
4496
USE (&mark_pop_error_on_return);
4497
4497
4498
4498
const BIGNUM* priv_key = EC_KEY_get0_private_key (ecdh->key_ .get ());
4499
- CHECK_NE (priv_key, nullptr );
4499
+ CHECK_NOT_NULL (priv_key);
4500
4500
4501
4501
ECPointPointer pub (EC_POINT_new (ecdh->group_ ));
4502
4502
CHECK (pub);
@@ -5007,7 +5007,7 @@ void VerifySpkac(const FunctionCallbackInfo<Value>& args) {
5007
5007
return args.GetReturnValue ().Set (verify_result);
5008
5008
5009
5009
char * data = Buffer::Data (args[0 ]);
5010
- CHECK_NE (data, nullptr );
5010
+ CHECK_NOT_NULL (data);
5011
5011
5012
5012
verify_result = VerifySpkac (data, length);
5013
5013
@@ -5052,7 +5052,7 @@ void ExportPublicKey(const FunctionCallbackInfo<Value>& args) {
5052
5052
return args.GetReturnValue ().SetEmptyString ();
5053
5053
5054
5054
char * data = Buffer::Data (args[0 ]);
5055
- CHECK_NE (data, nullptr );
5055
+ CHECK_NOT_NULL (data);
5056
5056
5057
5057
size_t pkey_size;
5058
5058
char * pkey = ExportPublicKey (data, length, &pkey_size);
@@ -5084,7 +5084,7 @@ void ExportChallenge(const FunctionCallbackInfo<Value>& args) {
5084
5084
return args.GetReturnValue ().SetEmptyString ();
5085
5085
5086
5086
char * data = Buffer::Data (args[0 ]);
5087
- CHECK_NE (data, nullptr );
5087
+ CHECK_NOT_NULL (data);
5088
5088
5089
5089
OpenSSLBuffer cert = ExportChallenge (data, len);
5090
5090
if (!cert)
0 commit comments