diff options
author | Stephan Bergmann <sbergman@redhat.com> | 2019-03-05 15:41:18 +0100 |
---|---|---|
committer | Stephan Bergmann <sbergman@redhat.com> | 2019-03-05 22:11:48 +0100 |
commit | b612cf0e06de231b7f936269db3b51a7f0e8ae3b (patch) | |
tree | 2fc88f5b0a78bc952e99b6ee2d24eed8a8241caa /xmlsecurity | |
parent | efbd217afc52390138195e06e96ef9c8f10bf37b (diff) |
Introduce o3tl::underlyingEnumValue
Change-Id: I6554eb86326159b0da707539f45c411f61c0f3de
Reviewed-on: https://gerrit.libreoffice.org/68761
Tested-by: Jenkins
Reviewed-by: Stephan Bergmann <sbergman@redhat.com>
Diffstat (limited to 'xmlsecurity')
-rw-r--r-- | xmlsecurity/qa/unit/signing/signing.cxx | 45 |
1 files changed, 16 insertions, 29 deletions
diff --git a/xmlsecurity/qa/unit/signing/signing.cxx b/xmlsecurity/qa/unit/signing/signing.cxx index 604d006b82d1..82890b2b8808 100644 --- a/xmlsecurity/qa/unit/signing/signing.cxx +++ b/xmlsecurity/qa/unit/signing/signing.cxx @@ -520,8 +520,7 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testODFGood) // We expect NOTVALIDATED in case the root CA is not imported on the system, and OK otherwise, so accept both. SignatureState nActual = pObjectShell->GetDocumentSignatureState(); CPPUNIT_ASSERT_MESSAGE( - (OString::number(static_cast<std::underlying_type<SignatureState>::type>(nActual)) - .getStr()), + (OString::number(o3tl::underlyingEnumValue(nActual)).getStr()), (nActual == SignatureState::NOTVALIDATED || nActual == SignatureState::OK)); } @@ -561,11 +560,9 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testOOXMLPartial) // We expect NOTVALIDATED_PARTIAL_OK in case the root CA is not imported on the system, and PARTIAL_OK otherwise, so accept both. // But reject NOTVALIDATED, hiding incompleteness is not OK. SignatureState nActual = pObjectShell->GetDocumentSignatureState(); - CPPUNIT_ASSERT_MESSAGE( - (OString::number(static_cast<std::underlying_type<SignatureState>::type>(nActual)) - .getStr()), - (nActual == SignatureState::NOTVALIDATED_PARTIAL_OK - || nActual == SignatureState::PARTIAL_OK)); + CPPUNIT_ASSERT_MESSAGE((OString::number(o3tl::underlyingEnumValue(nActual)).getStr()), + (nActual == SignatureState::NOTVALIDATED_PARTIAL_OK + || nActual == SignatureState::PARTIAL_OK)); } /// Test a typical broken OOXML signature where one stream is corrupted. @@ -594,8 +591,7 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testPDFGood) // We expect NOTVALIDATED in case the root CA is not imported on the system, and OK otherwise, so accept both. SignatureState nActual = pObjectShell->GetDocumentSignatureState(); CPPUNIT_ASSERT_MESSAGE( - (OString::number(static_cast<std::underlying_type<SignatureState>::type>(nActual)) - .getStr()), + (OString::number(o3tl::underlyingEnumValue(nActual)).getStr()), (nActual == SignatureState::NOTVALIDATED || nActual == SignatureState::OK)); } @@ -635,11 +631,9 @@ CPPUNIT_TEST_FIXTURE(SigningTest, test96097Calc) CPPUNIT_ASSERT_MESSAGE("Failed to access document shell", pObjectShell); SignatureState nActual = pObjectShell->GetScriptingSignatureState(); - CPPUNIT_ASSERT_MESSAGE( - (OString::number(static_cast<std::underlying_type<SignatureState>::type>(nActual)) - .getStr()), - (nActual == SignatureState::OK || nActual == SignatureState::NOTVALIDATED - || nActual == SignatureState::INVALID)); + CPPUNIT_ASSERT_MESSAGE((OString::number(o3tl::underlyingEnumValue(nActual)).getStr()), + (nActual == SignatureState::OK || nActual == SignatureState::NOTVALIDATED + || nActual == SignatureState::INVALID)); uno::Reference<frame::XStorable> xDocStorable(mxComponent, uno::UNO_QUERY_THROW); @@ -674,11 +668,9 @@ CPPUNIT_TEST_FIXTURE(SigningTest, test96097Doc) CPPUNIT_ASSERT(pObjectShell); SignatureState nActual = pObjectShell->GetScriptingSignatureState(); - CPPUNIT_ASSERT_MESSAGE( - (OString::number(static_cast<std::underlying_type<SignatureState>::type>(nActual)) - .getStr()), - (nActual == SignatureState::OK || nActual == SignatureState::NOTVALIDATED - || nActual == SignatureState::INVALID)); + CPPUNIT_ASSERT_MESSAGE((OString::number(o3tl::underlyingEnumValue(nActual)).getStr()), + (nActual == SignatureState::OK || nActual == SignatureState::NOTVALIDATED + || nActual == SignatureState::INVALID)); uno::Reference<frame::XStorable> xDocStorable(mxComponent, uno::UNO_QUERY_THROW); @@ -778,8 +770,7 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testXAdESGood) // We expect NOTVALIDATED in case the root CA is not imported on the system, and OK otherwise, so accept both. SignatureState nActual = pObjectShell->GetDocumentSignatureState(); CPPUNIT_ASSERT_MESSAGE( - (OString::number(static_cast<std::underlying_type<SignatureState>::type>(nActual)) - .getStr()), + (OString::number(o3tl::underlyingEnumValue(nActual)).getStr()), (nActual == SignatureState::NOTVALIDATED || nActual == SignatureState::OK)); } @@ -840,10 +831,8 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testODFGoodGPG) // Our local gpg config fully trusts the signing cert, so in // contrast to the X509 test we can fail on NOTVALIDATED here SignatureState nActual = pObjectShell->GetDocumentSignatureState(); - CPPUNIT_ASSERT_EQUAL_MESSAGE( - (OString::number(static_cast<std::underlying_type<SignatureState>::type>(nActual)) - .getStr()), - SignatureState::OK, nActual); + CPPUNIT_ASSERT_EQUAL_MESSAGE((OString::number(o3tl::underlyingEnumValue(nActual)).getStr()), + SignatureState::OK, nActual); } /// Test a typical ODF where all streams are GPG-signed, but we don't trust the signature. @@ -858,10 +847,8 @@ CPPUNIT_TEST_FIXTURE(SigningTest, testODFUntrustedGoodGPG) // contrast to the X509 test we can fail everything but // NOTVALIDATED here SignatureState nActual = pObjectShell->GetDocumentSignatureState(); - CPPUNIT_ASSERT_EQUAL_MESSAGE( - (OString::number(static_cast<std::underlying_type<SignatureState>::type>(nActual)) - .getStr()), - SignatureState::NOTVALIDATED, nActual); + CPPUNIT_ASSERT_EQUAL_MESSAGE((OString::number(o3tl::underlyingEnumValue(nActual)).getStr()), + SignatureState::NOTVALIDATED, nActual); } /// Test a typical broken ODF signature where one stream is corrupted. |