mirror of
https://gitlab.freedesktop.org/NetworkManager/NetworkManager.git
synced 2026-02-04 04:50:30 +01:00
libnm: don't use strlen() for checking for non-empty string
It's well understood that these are NUL terminated strings. We don't need strlen() to check that the strings aren't empty.
This commit is contained in:
parent
731d251cc0
commit
395738900f
5 changed files with 25 additions and 33 deletions
|
|
@ -397,8 +397,7 @@ nm_setting_connection_add_permission (NMSettingConnection *setting,
|
|||
GSList *iter;
|
||||
|
||||
g_return_val_if_fail (NM_IS_SETTING_CONNECTION (setting), FALSE);
|
||||
g_return_val_if_fail (ptype, FALSE);
|
||||
g_return_val_if_fail (strlen (ptype) > 0, FALSE);
|
||||
g_return_val_if_fail (ptype && ptype[0], FALSE);
|
||||
g_return_val_if_fail (detail == NULL, FALSE);
|
||||
|
||||
/* Only "user" for now... */
|
||||
|
|
@ -470,8 +469,7 @@ nm_setting_connection_remove_permission_by_value (NMSettingConnection *setting,
|
|||
GSList *iter;
|
||||
|
||||
g_return_val_if_fail (NM_IS_SETTING_CONNECTION (setting), FALSE);
|
||||
g_return_val_if_fail (ptype, FALSE);
|
||||
g_return_val_if_fail (strlen (ptype) > 0, FALSE);
|
||||
g_return_val_if_fail (ptype && ptype[0], FALSE);
|
||||
g_return_val_if_fail (detail == NULL, FALSE);
|
||||
|
||||
/* Only "user" for now... */
|
||||
|
|
|
|||
|
|
@ -173,10 +173,8 @@ nm_setting_vpn_add_data_item (NMSettingVpn *setting,
|
|||
const char *item)
|
||||
{
|
||||
g_return_if_fail (NM_IS_SETTING_VPN (setting));
|
||||
g_return_if_fail (key != NULL);
|
||||
g_return_if_fail (strlen (key) > 0);
|
||||
g_return_if_fail (item != NULL);
|
||||
g_return_if_fail (strlen (item) > 0);
|
||||
g_return_if_fail (key && key[0]);
|
||||
g_return_if_fail (item && item[0]);
|
||||
|
||||
g_hash_table_insert (NM_SETTING_VPN_GET_PRIVATE (setting)->data,
|
||||
g_strdup (key), g_strdup (item));
|
||||
|
|
@ -242,6 +240,7 @@ nm_setting_vpn_remove_data_item (NMSettingVpn *setting, const char *key)
|
|||
gboolean found;
|
||||
|
||||
g_return_val_if_fail (NM_IS_SETTING_VPN (setting), FALSE);
|
||||
g_return_val_if_fail (key, FALSE);
|
||||
|
||||
found = g_hash_table_remove (NM_SETTING_VPN_GET_PRIVATE (setting)->data, key);
|
||||
if (found)
|
||||
|
|
@ -350,10 +349,8 @@ nm_setting_vpn_add_secret (NMSettingVpn *setting,
|
|||
const char *secret)
|
||||
{
|
||||
g_return_if_fail (NM_IS_SETTING_VPN (setting));
|
||||
g_return_if_fail (key != NULL);
|
||||
g_return_if_fail (strlen (key) > 0);
|
||||
g_return_if_fail (secret != NULL);
|
||||
g_return_if_fail (strlen (secret) > 0);
|
||||
g_return_if_fail (key && key[0]);
|
||||
g_return_if_fail (secret && secret[0]);
|
||||
|
||||
g_hash_table_insert (NM_SETTING_VPN_GET_PRIVATE (setting)->secrets,
|
||||
g_strdup (key), g_strdup (secret));
|
||||
|
|
@ -419,6 +416,7 @@ nm_setting_vpn_remove_secret (NMSettingVpn *setting, const char *key)
|
|||
gboolean found;
|
||||
|
||||
g_return_val_if_fail (NM_IS_SETTING_VPN (setting), FALSE);
|
||||
g_return_val_if_fail (key, FALSE);
|
||||
|
||||
found = g_hash_table_remove (NM_SETTING_VPN_GET_PRIVATE (setting)->secrets, key);
|
||||
if (found)
|
||||
|
|
|
|||
|
|
@ -483,8 +483,7 @@ nm_setting_wired_get_s390_option_by_key (NMSettingWired *setting,
|
|||
const char *key)
|
||||
{
|
||||
g_return_val_if_fail (NM_IS_SETTING_WIRED (setting), NULL);
|
||||
g_return_val_if_fail (key != NULL, NULL);
|
||||
g_return_val_if_fail (strlen (key), NULL);
|
||||
g_return_val_if_fail (key && key[0], NULL);
|
||||
|
||||
return g_hash_table_lookup (NM_SETTING_WIRED_GET_PRIVATE (setting)->s390_options, key);
|
||||
}
|
||||
|
|
@ -511,8 +510,7 @@ nm_setting_wired_add_s390_option (NMSettingWired *setting,
|
|||
size_t value_len;
|
||||
|
||||
g_return_val_if_fail (NM_IS_SETTING_WIRED (setting), FALSE);
|
||||
g_return_val_if_fail (key != NULL, FALSE);
|
||||
g_return_val_if_fail (strlen (key), FALSE);
|
||||
g_return_val_if_fail (key && key[0], FALSE);
|
||||
g_return_val_if_fail (g_strv_contains (valid_s390_opts, key), FALSE);
|
||||
g_return_val_if_fail (value != NULL, FALSE);
|
||||
|
||||
|
|
@ -544,8 +542,7 @@ nm_setting_wired_remove_s390_option (NMSettingWired *setting,
|
|||
gboolean found;
|
||||
|
||||
g_return_val_if_fail (NM_IS_SETTING_WIRED (setting), FALSE);
|
||||
g_return_val_if_fail (key != NULL, FALSE);
|
||||
g_return_val_if_fail (strlen (key), FALSE);
|
||||
g_return_val_if_fail (key && key[0], FALSE);
|
||||
|
||||
found = g_hash_table_remove (NM_SETTING_WIRED_GET_PRIVATE (setting)->s390_options, key);
|
||||
if (found)
|
||||
|
|
|
|||
|
|
@ -809,54 +809,54 @@ test_setting_vpn_items (void)
|
|||
nm_setting_vpn_remove_data_item (s_vpn, "foobar4-flags");
|
||||
|
||||
/* Try to add some blank values and make sure they are rejected */
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (key != NULL));
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (key && key[0]));
|
||||
nm_setting_vpn_add_data_item (s_vpn, NULL, NULL);
|
||||
g_test_assert_expected_messages ();
|
||||
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (strlen (key) > 0));
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (key && key[0]));
|
||||
nm_setting_vpn_add_data_item (s_vpn, "", "");
|
||||
g_test_assert_expected_messages ();
|
||||
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (item != NULL));
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (item && item[0]));
|
||||
nm_setting_vpn_add_data_item (s_vpn, "foobar1", NULL);
|
||||
g_test_assert_expected_messages ();
|
||||
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (strlen (item) > 0));
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (item && item[0]));
|
||||
nm_setting_vpn_add_data_item (s_vpn, "foobar1", "");
|
||||
g_test_assert_expected_messages ();
|
||||
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (key != NULL));
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (key && key[0]));
|
||||
nm_setting_vpn_add_data_item (s_vpn, NULL, "blahblah1");
|
||||
g_test_assert_expected_messages ();
|
||||
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (strlen (key) > 0));
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (key && key[0]));
|
||||
nm_setting_vpn_add_data_item (s_vpn, "", "blahblah1");
|
||||
g_test_assert_expected_messages ();
|
||||
|
||||
nm_setting_vpn_foreach_data_item (s_vpn, vpn_check_empty_func, NULL);
|
||||
|
||||
/* Try to add some blank secrets and make sure they are rejected */
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (key != NULL));
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (key && key[0]));
|
||||
nm_setting_vpn_add_secret (s_vpn, NULL, NULL);
|
||||
g_test_assert_expected_messages ();
|
||||
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (strlen (key) > 0));
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (key && key[0]));
|
||||
nm_setting_vpn_add_secret (s_vpn, "", "");
|
||||
g_test_assert_expected_messages ();
|
||||
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (secret != NULL));
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (secret && secret[0]));
|
||||
nm_setting_vpn_add_secret (s_vpn, "foobar1", NULL);
|
||||
g_test_assert_expected_messages ();
|
||||
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (strlen (secret) > 0));
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (secret && secret[0]));
|
||||
nm_setting_vpn_add_secret (s_vpn, "foobar1", "");
|
||||
g_test_assert_expected_messages ();
|
||||
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (key != NULL));
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (key && key[0]));
|
||||
nm_setting_vpn_add_secret (s_vpn, NULL, "blahblah1");
|
||||
g_test_assert_expected_messages ();
|
||||
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (strlen (key) > 0));
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (key && key[0]));
|
||||
nm_setting_vpn_add_secret (s_vpn, "", "blahblah1");
|
||||
g_test_assert_expected_messages ();
|
||||
|
||||
|
|
@ -2347,7 +2347,7 @@ test_setting_connection_permissions_helpers (void)
|
|||
g_assert (!success);
|
||||
|
||||
/* Ensure a bad [type] is rejected */
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (ptype));
|
||||
NMTST_EXPECT_LIBNM_CRITICAL (NMTST_G_RETURN_MSG (ptype && ptype[0]));
|
||||
success = nm_setting_connection_add_permission (s_con, NULL, "blah", NULL);
|
||||
g_test_assert_expected_messages ();
|
||||
g_assert (!success);
|
||||
|
|
|
|||
|
|
@ -892,8 +892,7 @@ nm_secret_agent_old_get_secrets (NMSecretAgentOld *self,
|
|||
g_return_if_fail (NM_IS_SECRET_AGENT_OLD (self));
|
||||
g_return_if_fail (NM_IS_CONNECTION (connection));
|
||||
g_return_if_fail (nm_connection_get_path (connection));
|
||||
g_return_if_fail (setting_name != NULL);
|
||||
g_return_if_fail (strlen (setting_name) > 0);
|
||||
g_return_if_fail (setting_name && setting_name[0]);
|
||||
g_return_if_fail (!(flags & NM_SECRET_AGENT_GET_SECRETS_FLAG_ONLY_SYSTEM));
|
||||
g_return_if_fail (!(flags & NM_SECRET_AGENT_GET_SECRETS_FLAG_NO_ERRORS));
|
||||
g_return_if_fail (callback != NULL);
|
||||
|
|
|
|||
Loading…
Add table
Reference in a new issue