summaryrefslogtreecommitdiff
path: root/xmlsecurity
diff options
context:
space:
mode:
authorStephan Bergmann <sbergman@redhat.com>2020-06-05 16:18:21 +0200
committerStephan Bergmann <sbergman@redhat.com>2020-06-05 19:47:08 +0200
commit46fcb0bbfec58a132f549f4e465888db6b447d8d (patch)
tree51d42b5a1ffcb769049f94db4904192afc5344b1 /xmlsecurity
parent386dd5a8bc49e2c746fd6999592ae70199965161 (diff)
Upcoming loplugin:elidestringvar: xmlsecurity
Change-Id: Ifaf5027ca12254ced57a3bbd59e660886133fd50 Reviewed-on: https://gerrit.libreoffice.org/c/core/+/95607 Tested-by: Jenkins Reviewed-by: Stephan Bergmann <sbergman@redhat.com>
Diffstat (limited to 'xmlsecurity')
-rw-r--r--xmlsecurity/qa/unit/signing/signing.cxx9
1 files changed, 3 insertions, 6 deletions
diff --git a/xmlsecurity/qa/unit/signing/signing.cxx b/xmlsecurity/qa/unit/signing/signing.cxx
index ed6e55e829d4..637e5057bd05 100644
--- a/xmlsecurity/qa/unit/signing/signing.cxx
+++ b/xmlsecurity/qa/unit/signing/signing.cxx
@@ -262,9 +262,8 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testECDSA)
= getCertificate(aManager, svl::crypto::SignatureMethodAlgorithm::ECDSA);
if (!xCertificate.is())
return;
- OUString aDescription;
sal_Int32 nSecurityId;
- aManager.add(xCertificate, mxSecurityContext, aDescription, nSecurityId, false);
+ aManager.add(xCertificate, mxSecurityContext, "", nSecurityId, false);
// Read back the signature and make sure that it's valid.
aManager.read(/*bUseTempStream=*/true);
@@ -302,9 +301,8 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testECDSAOOXML)
= getCertificate(aManager, svl::crypto::SignatureMethodAlgorithm::ECDSA);
if (!xCertificate.is())
return;
- OUString aDescription;
sal_Int32 nSecurityId;
- aManager.add(xCertificate, mxSecurityContext, aDescription, nSecurityId,
+ aManager.add(xCertificate, mxSecurityContext, "", nSecurityId,
/*bAdESCompliant=*/false);
// Read back the signature and make sure that it's valid.
@@ -343,9 +341,8 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testECDSAPDF)
= getCertificate(aManager, svl::crypto::SignatureMethodAlgorithm::ECDSA);
if (!xCertificate.is())
return;
- OUString aDescription;
sal_Int32 nSecurityId;
- aManager.add(xCertificate, mxSecurityContext, aDescription, nSecurityId,
+ aManager.add(xCertificate, mxSecurityContext, "", nSecurityId,
/*bAdESCompliant=*/true);
// Read back the signature and make sure that it's valid.