if (!TEST_ptr(name = OPENSSL_strdup(value)))
return 0;
p = strchr(name, ':');
- if (p != NULL)
+ if (p == NULL)
+ p = "";
+ else
*p++ = '\0';
if (strcmp(name, "r") == 0
}
rv = OSSL_PARAM_allocate_from_text(kdata->p, defs, name, p,
- p != NULL ? strlen(p) : 0, NULL);
+ strlen(p), NULL);
*++kdata->p = OSSL_PARAM_construct_end();
if (!rv) {
t->err = "KDF_PARAM_ERROR";
OPENSSL_free(name);
return 0;
}
- if (p != NULL && strcmp(name, "digest") == 0) {
+ if (strcmp(name, "digest") == 0) {
if (is_digest_disabled(p)) {
TEST_info("skipping, '%s' is disabled", p);
t->skip = 1;
}
goto end;
}
- if (p != NULL
- && (strcmp(name, "cipher") == 0
- || strcmp(name, "cekalg") == 0)
+
+ if ((strcmp(name, "cipher") == 0
+ || strcmp(name, "cekalg") == 0)
&& is_cipher_disabled(p)) {
TEST_info("skipping, '%s' is disabled", p);
t->skip = 1;
goto end;
}
- if (p != NULL
- && (strcmp(name, "mac") == 0)
+ if ((strcmp(name, "mac") == 0)
&& is_mac_disabled(p)) {
TEST_info("skipping, '%s' is disabled", p);
t->skip = 1;