diff options
author | Noel Grandin <noel@peralex.com> | 2014-10-15 13:52:39 +0200 |
---|---|---|
committer | Noel Grandin <noel@peralex.com> | 2014-10-15 13:57:08 +0200 |
commit | fb7b1f45f9593db2d040dfaa06db0ea60f5308ba (patch) | |
tree | 7055dd3d1436a6ba4fe19f0d84a4d096ff401aab /xmlsecurity | |
parent | 5a5d55a8a0f82406a8001015a723596f21d3562c (diff) |
loplugin: cstylecast
Change-Id: I96a0d5d7ec3363076b0165f3c540c51ef01b58f3
Diffstat (limited to 'xmlsecurity')
4 files changed, 8 insertions, 8 deletions
diff --git a/xmlsecurity/source/framework/encryptionengine.cxx b/xmlsecurity/source/framework/encryptionengine.cxx index 589176ed2dfa..6b74377c2aa2 100644 --- a/xmlsecurity/source/framework/encryptionengine.cxx +++ b/xmlsecurity/source/framework/encryptionengine.cxx @@ -162,7 +162,7 @@ void EncryptionEngine::clearUp( ) const xReferenceResolvedBroadcaster->removeReferenceResolvedListener( m_nIdOfTemplateEC, - (const Reference < cssxc::sax::XReferenceResolvedListener >)((SecurityEngine *)this)); + static_cast<const Reference < cssxc::sax::XReferenceResolvedListener > >((SecurityEngine *)this)); m_xSAXEventKeeper->removeElementCollector(m_nIdOfTemplateEC); diff --git a/xmlsecurity/source/framework/saxeventkeeperimpl.cxx b/xmlsecurity/source/framework/saxeventkeeperimpl.cxx index 240f9ec41886..45c89d9f10f6 100644 --- a/xmlsecurity/source/framework/saxeventkeeperimpl.cxx +++ b/xmlsecurity/source/framework/saxeventkeeperimpl.cxx @@ -720,7 +720,7 @@ void SAXEventKeeperImpl::releaseElementMarkBuffer() * it is a EC */ { - ElementCollector* pElementCollector = (ElementCollector*)pElementMark; + ElementCollector* pElementCollector = static_cast<ElementCollector*>(pElementMark); cssxc::sax::ElementMarkPriority nPriority = pElementCollector->getPriority(); /* @@ -1093,7 +1093,7 @@ sal_Int32 SAL_CALL SAXEventKeeperImpl::cloneElementCollector( { sal_Int32 nId = -1; - ElementCollector* pElementCollector = (ElementCollector*)findElementMarkBuffer(referenceId); + ElementCollector* pElementCollector = static_cast<ElementCollector*>(findElementMarkBuffer(referenceId)); if (pElementCollector != NULL) { nId = m_nNextElementMarkId; @@ -1137,7 +1137,7 @@ void SAL_CALL SAXEventKeeperImpl::addReferenceResolvedListener( const cssu::Reference< cssxc::sax::XReferenceResolvedListener >& listener ) throw (cssu::RuntimeException, std::exception) { - ElementCollector* pElementCollector = (ElementCollector*)findElementMarkBuffer(referenceId); + ElementCollector* pElementCollector = static_cast<ElementCollector*>(findElementMarkBuffer(referenceId)); if (pElementCollector != NULL) { pElementCollector->setReferenceResolvedListener(listener); diff --git a/xmlsecurity/source/framework/signatureengine.cxx b/xmlsecurity/source/framework/signatureengine.cxx index 708e536fdadb..655b317b7e7c 100644 --- a/xmlsecurity/source/framework/signatureengine.cxx +++ b/xmlsecurity/source/framework/signatureengine.cxx @@ -176,7 +176,7 @@ void SignatureEngine::clearUp( ) const xReferenceResolvedBroadcaster( m_xSAXEventKeeper, cssu::UNO_QUERY ); xReferenceResolvedBroadcaster->removeReferenceResolvedListener( m_nIdOfTemplateEC, - (const cssu::Reference < cssxc::sax::XReferenceResolvedListener >)((SecurityEngine *)this)); + static_cast<const cssu::Reference < cssxc::sax::XReferenceResolvedListener > >((SecurityEngine *)this)); m_xSAXEventKeeper->removeElementCollector(m_nIdOfTemplateEC); @@ -186,7 +186,7 @@ void SignatureEngine::clearUp( ) const { xReferenceResolvedBroadcaster->removeReferenceResolvedListener( *ii, - (const cssu::Reference < cssxc::sax::XReferenceResolvedListener >)((SecurityEngine *)this)); + static_cast<const cssu::Reference < cssxc::sax::XReferenceResolvedListener > >((SecurityEngine *)this)); m_xSAXEventKeeper->removeElementCollector(*ii); } diff --git a/xmlsecurity/source/xmlsec/nss/secerror.cxx b/xmlsecurity/source/xmlsec/nss/secerror.cxx index 3129f45877f1..2d140f040891 100644 --- a/xmlsecurity/source/xmlsec/nss/secerror.cxx +++ b/xmlsecurity/source/xmlsec/nss/secerror.cxx @@ -88,7 +88,7 @@ printChainFailure(CERTVerifyLog *log) switch (node->error) { case SEC_ERROR_INADEQUATE_KEY_USAGE: - errorFlags = (sal_uIntPtr)node->arg; + errorFlags = reinterpret_cast<unsigned long>(node->arg); switch (errorFlags) { case KU_DIGITAL_SIGNATURE: @@ -106,7 +106,7 @@ printChainFailure(CERTVerifyLog *log) } break; case SEC_ERROR_INADEQUATE_CERT_TYPE: - errorFlags = (sal_uIntPtr)node->arg; + errorFlags = reinterpret_cast<unsigned long>(node->arg); switch (errorFlags) { case NS_CERT_TYPE_SSL_CLIENT: |