summaryrefslogtreecommitdiff
path: root/ucb
diff options
context:
space:
mode:
authorTor Lillqvist <tml@collabora.com>2016-12-13 17:16:54 +0200
committerTor Lillqvist <tml@collabora.com>2016-12-13 18:31:29 +0200
commit2cc0095c28c283ccae7877179a67b180fac8b4ed (patch)
tree179fee0614094b670b4d20a0507b7be6dcc32c3e /ucb
parentf409daff083903b066159c8e62f04bebd9263219 (diff)
loplugin:salbool
Change-Id: Ia2a2c900bf8bf8ecee2edf130b8ca58f7f35b6aa
Diffstat (limited to 'ucb')
-rw-r--r--ucb/source/ucp/webdav/SerfSession.cxx10
-rw-r--r--ucb/source/ucp/webdav/webdavcontent.cxx2
2 files changed, 6 insertions, 6 deletions
diff --git a/ucb/source/ucp/webdav/SerfSession.cxx b/ucb/source/ucp/webdav/SerfSession.cxx
index 37e6e455a197..40c8ffe9fb26 100644
--- a/ucb/source/ucp/webdav/SerfSession.cxx
+++ b/ucb/source/ucp/webdav/SerfSession.cxx
@@ -492,7 +492,7 @@ apr_status_t SerfSession::verifySerfCertificateChain (
if (nVerificationResult == 0)
{
// Certificate (chain) is valid.
- xCertificateContainer->addCertificate(getHostName(), sServerCertificateSubject, sal_True);
+ xCertificateContainer->addCertificate(getHostName(), sServerCertificateSubject, true);
return APR_SUCCESS;
}
else if ((nVerificationResult & security::CertificateValidity::CHAIN_INCOMPLETE) != 0)
@@ -506,7 +506,7 @@ apr_status_t SerfSession::verifySerfCertificateChain (
(security::CertificateValidity::INVALID | security::CertificateValidity::REVOKED)) != 0)
{
// Certificate (chain) is invalid.
- xCertificateContainer->addCertificate(getHostName(), sServerCertificateSubject, sal_False);
+ xCertificateContainer->addCertificate(getHostName(), sServerCertificateSubject, false);
return SERF_SSL_CERT_UNKNOWN_FAILURE;
}
else
@@ -536,13 +536,13 @@ apr_status_t SerfSession::verifySerfCertificateChain (
uno::Reference< task::XInteractionApprove > xApprove( xSelection.get(), uno::UNO_QUERY );
if ( xApprove.is() )
{
- xCertificateContainer->addCertificate( getHostName(), sServerCertificateSubject, sal_True );
+ xCertificateContainer->addCertificate( getHostName(), sServerCertificateSubject, true );
return APR_SUCCESS;
}
else
{
// Don't trust cert
- xCertificateContainer->addCertificate( getHostName(), sServerCertificateSubject, sal_False );
+ xCertificateContainer->addCertificate( getHostName(), sServerCertificateSubject, false );
return SERF_SSL_CERT_UNKNOWN_FAILURE;
}
}
@@ -550,7 +550,7 @@ apr_status_t SerfSession::verifySerfCertificateChain (
else
{
// Don't trust cert
- xCertificateContainer->addCertificate( getHostName(), sServerCertificateSubject, sal_False );
+ xCertificateContainer->addCertificate( getHostName(), sServerCertificateSubject, false );
return SERF_SSL_CERT_UNKNOWN_FAILURE;
}
}
diff --git a/ucb/source/ucp/webdav/webdavcontent.cxx b/ucb/source/ucp/webdav/webdavcontent.cxx
index 60746e679a44..8db55d9a5f3d 100644
--- a/ucb/source/ucp/webdav/webdavcontent.cxx
+++ b/ucb/source/ucp/webdav/webdavcontent.cxx
@@ -2715,7 +2715,7 @@ void Content::transfer(
xResAccess->getSessionFactory(),
sourceURI.GetURI() );
- if ( rArgs.MoveData == sal_True )
+ if ( rArgs.MoveData )
{
uno::Reference< ucb::XContentIdentifier > xId
= new ::ucbhelper::ContentIdentifier( rArgs.SourceURL );