diff options
-rw-r--r-- | xmlsecurity/source/pdfio/pdfdocument.cxx | 10 | ||||
-rw-r--r-- | xmlsecurity/source/xmlsec/nss/x509certificate_nssimpl.cxx | 8 |
2 files changed, 9 insertions, 9 deletions
diff --git a/xmlsecurity/source/pdfio/pdfdocument.cxx b/xmlsecurity/source/pdfio/pdfdocument.cxx index f4206c6343dd..e071e300f35c 100644 --- a/xmlsecurity/source/pdfio/pdfdocument.cxx +++ b/xmlsecurity/source/pdfio/pdfdocument.cxx @@ -1031,7 +1031,7 @@ bool PDFDocument::Tokenize(SvStream& rStream, TokenizeMode eMode, std::vector< s ++nDictionaryDepth; } else - rElements.push_back(std::unique_ptr<PDFElement>(new PDFHexStringElement())); + rElements.push_back(std::unique_ptr<PDFElement>(new PDFHexStringElement)); if (!rElements.back()->Read(rStream)) { SAL_WARN("xmlsecurity.pdfio", "PDFDocument::Tokenize: PDFDictionaryElement::Read() failed"); @@ -1100,7 +1100,7 @@ bool PDFDocument::Tokenize(SvStream& rStream, TokenizeMode eMode, std::vector< s } case '(': { - rElements.push_back(std::unique_ptr<PDFElement>(new PDFLiteralStringElement())); + rElements.push_back(std::unique_ptr<PDFElement>(new PDFLiteralStringElement)); rStream.SeekRel(-1); if (!rElements.back()->Read(rStream)) { @@ -1223,7 +1223,7 @@ bool PDFDocument::Tokenize(SvStream& rStream, TokenizeMode eMode, std::vector< s } else if (aKeyword == "endstream") { - rElements.push_back(std::unique_ptr<PDFElement>(new PDFEndStreamElement())); + rElements.push_back(std::unique_ptr<PDFElement>(new PDFEndStreamElement)); if (!rElements.back()->Read(rStream)) { SAL_WARN("xmlsecurity.pdfio", "PDFDocument::Tokenize: PDFEndStreamElement::Read() failed"); @@ -1232,7 +1232,7 @@ bool PDFDocument::Tokenize(SvStream& rStream, TokenizeMode eMode, std::vector< s } else if (aKeyword == "endobj") { - rElements.push_back(std::unique_ptr<PDFElement>(new PDFEndObjectElement())); + rElements.push_back(std::unique_ptr<PDFElement>(new PDFEndObjectElement)); if (!rElements.back()->Read(rStream)) { SAL_WARN("xmlsecurity.pdfio", "PDFDocument::Tokenize: PDFEndObjectElement::Read() failed"); @@ -1255,7 +1255,7 @@ bool PDFDocument::Tokenize(SvStream& rStream, TokenizeMode eMode, std::vector< s else if (aKeyword == "true" || aKeyword == "false") rElements.push_back(std::unique_ptr<PDFElement>(new PDFBooleanElement(aKeyword.toBoolean()))); else if (aKeyword == "null") - rElements.push_back(std::unique_ptr<PDFElement>(new PDFNullElement())); + rElements.push_back(std::unique_ptr<PDFElement>(new PDFNullElement)); else if (aKeyword == "xref") // Allow 'f' and 'n' keywords. bInXRef = true; diff --git a/xmlsecurity/source/xmlsec/nss/x509certificate_nssimpl.cxx b/xmlsecurity/source/xmlsec/nss/x509certificate_nssimpl.cxx index be930a222b3e..283ebbe28b56 100644 --- a/xmlsecurity/source/xmlsec/nss/x509certificate_nssimpl.cxx +++ b/xmlsecurity/source/xmlsec/nss/x509certificate_nssimpl.cxx @@ -209,13 +209,13 @@ css::uno::Sequence< css::uno::Reference< css::security::XCertificateExtension > if (objID.equals("2.5.29.17")) { - SanExtensionImpl* pExtn = new SanExtensionImpl(); + SanExtensionImpl* pExtn = new SanExtensionImpl; pExtn->setCertExtn(value, vlen, objid, objidlen, crit); xExtns[len] = pExtn ; } else { - CertificateExtension_XmlSecImpl* pExtn = new CertificateExtension_XmlSecImpl(); + CertificateExtension_XmlSecImpl* pExtn = new CertificateExtension_XmlSecImpl; pExtn->setCertExtn(value, vlen, objid, objidlen, crit); xExtns[len] = pExtn; } @@ -255,14 +255,14 @@ css::uno::Reference< css::security::XCertificateExtension > SAL_CALL X509Certifi if ( objId.equals("OID.2.5.29.17") ) { rtl::Reference<SanExtensionImpl> xSanImpl( - new SanExtensionImpl()); + new SanExtensionImpl); xSanImpl->setCertExtn(value, vlen, objid, objidlen, crit); xExtn = xSanImpl.get(); } else { rtl::Reference<CertificateExtension_XmlSecImpl> xSecImpl( - new CertificateExtension_XmlSecImpl()); + new CertificateExtension_XmlSecImpl); xSecImpl->setCertExtn(value, vlen, objid, objidlen, crit); xExtn = xSecImpl.get(); } |