Perform explicit tests to determine success, true/false, and equality to improve the readability and maintainability of code and for compatibility with common conventions.
In the case that the return value will never change, an explicit test is still preferable to clearly communicate the numeric, rather than boolean, value of the test.
In particular, do not default the test for non-zero. For example, testing for inequality with zero:
if (foo() != 0) ...
is preferable to
if (foo()) ...
despite the fact that C considers 0 to be false. Explicitly testing for inequality with zero benefits maintainability if foo()
is later modified to return -1 rather than 0 on failure.
This recommendation is derived from and considers the implications of the following common conventions:
(1) Functions return 0 if false, and non-zero if true [1].
(2) Function failures can typically be indicated by one of the following return values: -1, or: any non-zero number.
(3) Comparison functions return 0 if the arguments are equal and non-zero otherwise. (such as the standard library function strcmp() which has a trinary return value [2])
Noncompliant Code Example
In this noncompliant code example, is_banned()
return 0 if false, and non-zero if true.
LinkedList bannedUsers; int is_banned(User usr) { int x = 0; Node cur_node = (bannedUsers->head); while (cur_node != NULL) { if(strcmp((char *)cur_node->data, usr->name) { x++; } cur_node = cur_node->next; } return x; } void processRequest(User usr) { if(is_banned(usr) == 1) { return; } serveResults(); }
The call function processRequest()
ignores the convention that most functions in C only guarantee a non-zero return value to indicate "true".
If a banned user is listed twice, the user is granted access. Although is_banned()
follows the common convention of returning non-zero for true, processRequest
only checks for equality with 1.
Compliant Solution
Because most functions only guarantee a return value of non-zero for "true," the code above is better written by checking for inequality with 0 ("false") as follows.
LinkedList bannedUsers; int is_banned(User usr) { int x = 0; Node cur_node = (bannedUsers->head); while(cur_node != NULL) { if (strcmp((char *)cur_node->data, usr->name) { x++; } cur_node = cur_node->next; } return x; } void processRequest(User usr) { if (is_banned(usr) != 0) { return; } serveResults(); }
Noncompliant Code Example
In this noncompliant code example, function failures can typically be indicated by one of the following return values: -1, a non-zero number.
Although failures are frequently indicated by a return value of zero (which C considers to be false), there are common conventions that may conflict in the future with code where the test for non-zero is not explicit. In this case, defaulting the test for non-zero welcomes bugs if and when a developer modifies foo to return an error code or -1 rather than 0 to indicate a failure (all of which are common conventions).
int validateUser(User usr) { if(listContains(validUsers, usr)) { return 1; } return 0; } void processRequest(User usr, Request request) { if(!validateUser(usr)) { return "invalid user"; } else { serveResults(); } }
The code above will work as intended. However, it is very feasible that a future modification will result in the following.
errno_t validateUser(User usr) { if(list_contains(allUsers, usr) == 0) { return 303; // user not found error code } if(list_contains(validUsers, usr) == 0) { return 304; // invalid user error code } return 0; } void processRequest(User usr, Request request) { if(!validateUser(usr)) { return "invalid user"; } serveResults(); }
In this code, the programmer intended to add error code functionality to indicate the cause of a validation failure. The new code, however, validates any invalid or non-existing user. Because there is not an explicit test in processRequest, the logical error is not obvious (the implied "if not validated" seems correct) and seems correct by certain conventions.
Compliant Solution
The following is preferable for code maintenance. By defining what constitutes a failure and explicitly testing for it, the behavior is clearly implied and future modifications are more likely to preserve it. If there is a future modification like the one above, it is immediately obvious that the if statement in processRequest does not utilize the specification of validateUser correctly.
errno_t validateUser(User usr) { if(list_contains(validUsers, usr)) { return 1; } return 0; } void processRequest(User usr, Request request) { if(validateUser(usr) == 0) { return "invalid user"; } else { serveResults(); } }
Noncompliant Code Example
Comparison functions (such as the standard library function strcmp()) return 0 if the arguments are equal and non-zero otherwise.
Because comparison functions (like strcmp) return 0 for equality and non-zero for inequality, they can cause confusion when used to test for equality. If someone were to switch the following strcmp call with an equals function, they might instinctively just replace the function name. Also, when quickly reviewed, the code could easily appear to test for inequality.
void login(char *usr, char *pw) { User user = find_User(usr); if (!strcmp((user->password),pw_given)) { grantAccess(); } denyAccess("Incorrect Password"); }
The code above works correctly.
However, in order to simplify the login code or to facilitate checking a user's password more than once, a programmer might separate the password checking code from the login function. He/she might do so in the following way.
int check_password(User *user, char *pw_given) { if (!strcmp((user->password),pw_given)) { return 1; } return 0; } void login(char *usr, char *pw) { User user = find_User(usr); if (!check_password(user, pw)) { grantAccess(); } denyAccess("Incorrect Password"); }
In an attempt to leave the previous logic intact, he just replaced the strcmp with a call to his new function. However, doing so would produce incorrect behavior. In the case above, any user which inputs an incorrect password is granted access. Again, two conventions conflict and produce code that is easily corrupted when modified. To make code maintainable and to avoid these conflicts, such a result should never be defaulted.
Compliant Solution
The following approach to using a comparison function for this purpose is preferred. By performing an explicit test, any programmer that wishes to modify the equality test can clearly see the implied behavior and convention that is being followed.
void login(char *usr, char *pw) { User user = find_User(usr); if (strcmp((user->password),pw_given) == 0) { grantAccess(); } denyAccess("Incorrect Password"); }
Risk Assessment
Code which does not conform to the common practices presented will be difficult to maintain. Bugs may easily arise when modifying helper functions which evaluate true/false or success/failure. Bugs may also easily arise when modifying code that tests for equality using a comparison function that obeys the same conventions as standard library functions like strcmp.
Recommendation |
Severity |
Likelihood |
Remediation Cost |
Priority |
Level |
---|---|---|---|---|---|
EXP20-C |
medium |
probable |
low |
P8 |
L2 |
References
[1] "Should I return TRUE / FALSE values from a C function?
[[ISO/IEC 9899:1999]]