I would like to do some clean up for openssl(1) pkcs12.
This diff changes pointer value checking to explicit comparison with NULL,
and no functional changes here.
This works fine for me on my local pc.

ok?

Index: pkcs12.c
===================================================================
RCS file: /cvs/src/usr.bin/openssl/pkcs12.c,v
retrieving revision 1.18
diff -u -p -u -p -r1.18 pkcs12.c
--- pkcs12.c    28 Mar 2022 11:02:49 -0000      1.18
+++ pkcs12.c    23 Apr 2022 04:08:55 -0000
@@ -556,7 +556,7 @@ pkcs12_main(int argc, char **argv)
                goto end;
        }
 
-       if (pkcs12_config.passarg) {
+       if (pkcs12_config.passarg != NULL) {
                if (pkcs12_config.export_cert)
                        pkcs12_config.passargout = pkcs12_config.passarg;
                else
@@ -567,13 +567,13 @@ pkcs12_main(int argc, char **argv)
                BIO_printf(bio_err, "Error getting passwords\n");
                goto end;
        }
-       if (!cpass) {
+       if (cpass == NULL) {
                if (pkcs12_config.export_cert)
                        cpass = passout;
                else
                        cpass = passin;
        }
-       if (cpass) {
+       if (cpass != NULL) {
                mpass = cpass;
                pkcs12_config.noprompt = 1;
        } else {
@@ -581,22 +581,22 @@ pkcs12_main(int argc, char **argv)
                mpass = macpass;
        }
 
-       if (!pkcs12_config.infile)
+       if (pkcs12_config.infile == NULL)
                in = BIO_new_fp(stdin, BIO_NOCLOSE);
        else
                in = BIO_new_file(pkcs12_config.infile, "rb");
-       if (!in) {
+       if (in == NULL) {
                BIO_printf(bio_err, "Error opening input file %s\n",
                    pkcs12_config.infile ? pkcs12_config.infile : "<stdin>");
                perror(pkcs12_config.infile);
                goto end;
        }
 
-       if (!pkcs12_config.outfile) {
+       if (pkcs12_config.outfile == NULL) {
                out = BIO_new_fp(stdout, BIO_NOCLOSE);
        } else
                out = BIO_new_file(pkcs12_config.outfile, "wb");
-       if (!out) {
+       if (out == NULL) {
                BIO_printf(bio_err, "Error opening output file %s\n",
                    pkcs12_config.outfile ? pkcs12_config.outfile : "<stdout>");
                perror(pkcs12_config.outfile);
@@ -637,10 +637,10 @@ pkcs12_main(int argc, char **argv)
                if (!(pkcs12_config.options & NOCERTS)) {
                        certs = load_certs(bio_err, pkcs12_config.infile,
                            FORMAT_PEM, NULL, "certificates");
-                       if (!certs)
+                       if (certs == NULL)
                                goto export_end;
 
-                       if (key) {
+                       if (key != NULL) {
                                /* Look for matching private key */
                                for (i = 0; i < sk_X509_num(certs); i++) {
                                        x = sk_X509_value(certs, i);
@@ -654,7 +654,7 @@ pkcs12_main(int argc, char **argv)
                                                break;
                                        }
                                }
-                               if (!ucert) {
+                               if (ucert == NULL) {
                                        BIO_printf(bio_err,
                                            "No certificate matches private 
key\n");
                                        goto export_end;
@@ -663,11 +663,11 @@ pkcs12_main(int argc, char **argv)
                }
 
                /* Add any more certificates asked for */
-               if (pkcs12_config.certfile) {
+               if (pkcs12_config.certfile != NULL) {
                        STACK_OF(X509) *morecerts = NULL;
-                       if (!(morecerts = load_certs(bio_err,
+                       if ((morecerts = load_certs(bio_err,
                            pkcs12_config.certfile, FORMAT_PEM, NULL,
-                           "certificates from certfile")))
+                           "certificates from certfile")) == NULL)
                                goto export_end;
                        while (sk_X509_num(morecerts) > 0)
                                sk_X509_push(certs, sk_X509_shift(morecerts));
@@ -680,7 +680,7 @@ pkcs12_main(int argc, char **argv)
                        int vret;
                        STACK_OF(X509) *chain2;
                        X509_STORE *store = X509_STORE_new();
-                       if (!store) {
+                       if (store == NULL) {
                                BIO_printf(bio_err,
                                    "Memory allocation error\n");
                                goto export_end;
@@ -720,12 +720,12 @@ pkcs12_main(int argc, char **argv)
                        X509_alias_set1(sk_X509_value(certs, i), catmp, -1);
                }
 
-               if (pkcs12_config.csp_name && key)
+               if (pkcs12_config.csp_name != NULL && key != NULL)
                        EVP_PKEY_add1_attr_by_NID(key, NID_ms_csp_name,
                            MBSTRING_ASC,
                            (unsigned char *) pkcs12_config.csp_name, -1);
 
-               if (pkcs12_config.add_lmk && key)
+               if (pkcs12_config.add_lmk && key != NULL)
                        EVP_PKEY_add1_attr_by_NID(key, NID_LocalKeySet, 0, NULL,
                            -1);
 
@@ -743,13 +743,13 @@ pkcs12_main(int argc, char **argv)
                    certs, pkcs12_config.key_pbe, pkcs12_config.cert_pbe,
                    pkcs12_config.iter, -1, pkcs12_config.keytype);
 
-               if (!p12) {
+               if (p12 == NULL) {
                        ERR_print_errors(bio_err);
                        goto export_end;
                }
-               if (pkcs12_config.macalg) {
+               if (pkcs12_config.macalg != NULL) {
                        macmd = EVP_get_digestbyname(pkcs12_config.macalg);
-                       if (!macmd) {
+                       if (macmd == NULL) {
                                BIO_printf(bio_err,
                                    "Unknown digest algorithm %s\n",
                                    pkcs12_config.macalg);
@@ -771,7 +771,7 @@ pkcs12_main(int argc, char **argv)
                goto end;
 
        }
-       if (!(p12 = d2i_PKCS12_bio(in, NULL))) {
+       if ((p12 = d2i_PKCS12_bio(in, NULL)) == NULL) {
                ERR_print_errors(bio_err);
                goto end;
        }
@@ -784,7 +784,7 @@ pkcs12_main(int argc, char **argv)
        if (!pkcs12_config.twopass)
                strlcpy(macpass, pass, sizeof macpass);
 
-       if ((pkcs12_config.options & INFO) && p12->mac)
+       if ((pkcs12_config.options & INFO) && p12->mac != NULL)
                BIO_printf(bio_err, "MAC Iteration %ld\n",
                    p12->mac->iter ? ASN1_INTEGER_get(p12->mac->iter) : 1);
        if (pkcs12_config.macver) {
@@ -829,7 +829,7 @@ dump_certs_keys_p12(BIO *out, PKCS12 *p1
        int ret = 0;
        PKCS7 *p7;
 
-       if (!(asafes = PKCS12_unpack_authsafes(p12)))
+       if ((asafes = PKCS12_unpack_authsafes(p12)) == NULL)
                return 0;
        for (i = 0; i < sk_PKCS7_num(asafes); i++) {
                p7 = sk_PKCS7_value(asafes, i);
@@ -847,7 +847,7 @@ dump_certs_keys_p12(BIO *out, PKCS12 *p1
                        bags = PKCS12_unpack_p7encdata(p7, pass, passlen);
                } else
                        continue;
-               if (!bags)
+               if (bags == NULL)
                        goto err;
                if (!dump_certs_pkeys_bags(out, bags, pass, passlen,
                        options, pempass)) {
@@ -915,9 +915,9 @@ dump_certs_pkeys_bag(BIO *out, PKCS12_SA
                if (options & NOKEYS)
                        return 1;
                print_attribs(out, bag->attrib, "Bag Attributes");
-               if (!(p8 = PKCS12_decrypt_skey(bag, pass, passlen)))
+               if ((p8 = PKCS12_decrypt_skey(bag, pass, passlen)) == NULL)
                        return 0;
-               if (!(pkey = EVP_PKCS82PKEY(p8))) {
+               if ((pkey = EVP_PKCS82PKEY(p8)) == NULL) {
                        PKCS8_PRIV_KEY_INFO_free(p8);
                        return 0;
                }
@@ -933,7 +933,7 @@ dump_certs_pkeys_bag(BIO *out, PKCS12_SA
                        BIO_printf(bio_err, "Certificate bag\n");
                if (options & NOCERTS)
                        return 1;
-               if (PKCS12_get_attr(bag, NID_localKeyID)) {
+               if (PKCS12_get_attr(bag, NID_localKeyID) != NULL) {
                        if (options & CACERTS)
                                return 1;
                } else if (options & CLCERTS)
@@ -941,7 +941,7 @@ dump_certs_pkeys_bag(BIO *out, PKCS12_SA
                print_attribs(out, bag->attrib, "Bag Attributes");
                if (OBJ_obj2nid(bag->value.bag->type) != NID_x509Certificate)
                        return 1;
-               if (!(x509 = PKCS12_certbag2x509(bag)))
+               if ((x509 = PKCS12_certbag2x509(bag)) == NULL)
                        return 0;
                dump_cert_text(out, x509);
                PEM_write_bio_X509(out, x509);
@@ -999,7 +999,7 @@ alg_print(BIO *x, const X509_ALGOR *alg)
 
        p = alg->parameter->value.sequence->data;
        pbe = d2i_PBEPARAM(NULL, &p, alg->parameter->value.sequence->length);
-       if (!pbe)
+       if (pbe == NULL)
                return 1;
        BIO_printf(bio_err, "%s, Iteration %ld\n",
            OBJ_nid2ln(OBJ_obj2nid(alg->algorithm)),
@@ -1050,7 +1050,7 @@ print_attribs(BIO *out, const STACK_OF(X
        ASN1_TYPE *av;
        int i, j, attr_nid;
 
-       if (!attrlst) {
+       if (attrlst == NULL) {
                BIO_printf(out, "%s: <No Attributes>\n", name);
                return 1;
        }
@@ -1095,7 +1095,7 @@ hex_prin(BIO *out, unsigned char *buf, i
 static int
 set_pbe(BIO *err, int *ppbe, const char *str)
 {
-       if (!str)
+       if (str == NULL)
                return 0;
        if (!strcmp(str, "NONE")) {
                *ppbe = -1;

Reply via email to