diff options
author | Noel Grandin <noel.grandin@collabora.co.uk> | 2018-11-12 12:17:35 +0200 |
---|---|---|
committer | Noel Grandin <noel.grandin@collabora.co.uk> | 2019-02-11 08:24:19 +0100 |
commit | f76bf262a60c154684ffefbd53a5339fa3864e42 (patch) | |
tree | 6b287051d4ad9d5258eecd3efa0ebb8a020d2b2c /xmlsecurity | |
parent | b143e7642f93e83f4f3c4df56c3e1e8e64e36ce0 (diff) |
new loplugin indentation
look for mixed indentation in compound statements, which makes them hard
to read, and sometimes makes it look like a statement is associated with
a nearby if/for
Change-Id: Ic8429cee1f9a86d938097a4a8769a2bce97b3361
Reviewed-on: https://gerrit.libreoffice.org/63283
Tested-by: Jenkins
Reviewed-by: Noel Grandin <noel.grandin@collabora.co.uk>
Diffstat (limited to 'xmlsecurity')
7 files changed, 16 insertions, 16 deletions
diff --git a/xmlsecurity/source/component/certificatecontainer.cxx b/xmlsecurity/source/component/certificatecontainer.cxx index c110ebb64e6f..845e980baeca 100644 --- a/xmlsecurity/source/component/certificatecontainer.cxx +++ b/xmlsecurity/source/component/certificatecontainer.cxx @@ -96,11 +96,11 @@ CertificateContainer::addCertificate( const OUString & url, const OUString & cer { certMap.emplace( url, certificate_name ); - //remember that the cert is trusted - if (trust) - certTrustMap.emplace( url, certificate_name ); + //remember that the cert is trusted + if (trust) + certTrustMap.emplace( url, certificate_name ); - return true; + return true; } ::security::CertificateContainerStatus diff --git a/xmlsecurity/source/dialogs/digitalsignaturesdialog.cxx b/xmlsecurity/source/dialogs/digitalsignaturesdialog.cxx index 62f939bd3dfb..fa5da389d55e 100644 --- a/xmlsecurity/source/dialogs/digitalsignaturesdialog.cxx +++ b/xmlsecurity/source/dialogs/digitalsignaturesdialog.cxx @@ -608,7 +608,7 @@ void DigitalSignaturesDialog::ImplFillSignaturesBox() if ( bSigValid ) { - bSigValid = DocumentSignatureHelper::checkIfAllFilesAreSigned( + bSigValid = DocumentSignatureHelper::checkIfAllFilesAreSigned( aElementsToBeVerified, rInfo, mode); if( bSigValid ) diff --git a/xmlsecurity/source/helper/xsecctl.cxx b/xmlsecurity/source/helper/xsecctl.cxx index f6d1f89b6a6b..ed7ccfba7fd2 100644 --- a/xmlsecurity/source/helper/xsecctl.cxx +++ b/xmlsecurity/source/helper/xsecctl.cxx @@ -415,7 +415,7 @@ cssu::Reference< css::io::XInputStream > * xInputStream - the XInputStream interface ******************************************************************************/ { - cssu::Reference< css::io::XInputStream > xObjectInputStream; + cssu::Reference< css::io::XInputStream > xObjectInputStream; SAL_WARN_IF( !m_xUriBinding.is(), "xmlsecurity.helper", "Need XUriBinding!" ); diff --git a/xmlsecurity/source/helper/xsecverify.cxx b/xmlsecurity/source/helper/xsecverify.cxx index edd78902313b..97204755715d 100644 --- a/xmlsecurity/source/helper/xsecverify.cxx +++ b/xmlsecurity/source/helper/xsecverify.cxx @@ -164,7 +164,7 @@ void XSecController::addStreamReference( bool isBinary, sal_Int32 nDigestID ) { - SignatureReferenceType type = (isBinary?SignatureReferenceType::BINARYSTREAM:SignatureReferenceType::XMLSTREAM); + SignatureReferenceType type = (isBinary?SignatureReferenceType::BINARYSTREAM:SignatureReferenceType::XMLSTREAM); if (m_vInternalSignatureInformations.empty()) { @@ -178,7 +178,7 @@ void XSecController::addStreamReference( /* * get the input stream */ - cssu::Reference< css::io::XInputStream > xObjectInputStream + cssu::Reference< css::io::XInputStream > xObjectInputStream = getObjectInputStream( ouUri ); if ( xObjectInputStream.is() ) diff --git a/xmlsecurity/source/xmlsec/nss/nssinitializer.cxx b/xmlsecurity/source/xmlsec/nss/nssinitializer.cxx index 534c5bd7fc5c..238f1bb9e41a 100644 --- a/xmlsecurity/source/xmlsec/nss/nssinitializer.cxx +++ b/xmlsecurity/source/xmlsec/nss/nssinitializer.cxx @@ -176,7 +176,7 @@ struct InitNSSInitialize bInitialized = nsscrypto_initialize( m_xContext, bNSSInit ); if (bNSSInit) atexit(nsscrypto_finalize ); - return & bInitialized; + return & bInitialized; } }; diff --git a/xmlsecurity/source/xmlsec/nss/securityenvironment_nssimpl.cxx b/xmlsecurity/source/xmlsec/nss/securityenvironment_nssimpl.cxx index b76684f6075e..3a1001b7447c 100644 --- a/xmlsecurity/source/xmlsec/nss/securityenvironment_nssimpl.cxx +++ b/xmlsecurity/source/xmlsec/nss/securityenvironment_nssimpl.cxx @@ -554,17 +554,17 @@ verifyCertificate( const Reference< csss::XCertificate >& aCert, nullptr /* nickname */, PR_FALSE /* isPerm */, PR_TRUE /* copyDER */); - if (!certTmp) - { + if (!certTmp) + { SAL_INFO("xmlsecurity.xmlsec", "Failed to add a temporary certificate: " << intermediateCerts[i]->getIssuerName()); - } - else - { + } + else + { SAL_INFO("xmlsecurity.xmlsec", "Added temporary certificate: " << (certTmp->subjectName ? certTmp->subjectName : "")); vecTmpNSSCertificates.push_back(certTmp); - } + } } diff --git a/xmlsecurity/source/xmlsec/nss/xmlsignature_nssimpl.cxx b/xmlsecurity/source/xmlsec/nss/xmlsignature_nssimpl.cxx index 311ce6aeb69f..a5d8739aa48b 100644 --- a/xmlsecurity/source/xmlsec/nss/xmlsignature_nssimpl.cxx +++ b/xmlsecurity/source/xmlsec/nss/xmlsignature_nssimpl.cxx @@ -210,7 +210,7 @@ SAL_CALL XMLSignature_NssImpl::validate( throw RuntimeException() ; } - setErrorRecorder(); + setErrorRecorder(); sal_Int32 nSecurityEnvironment = aSecurityCtx->getSecurityEnvironmentNumber(); sal_Int32 i; |