From b81bca98f8ae77828ec9c90a66df7fc0e7d668df Mon Sep 17 00:00:00 2001 From: Michael Meeks Date: Fri, 1 Jun 2012 14:32:13 +0100 Subject: targetted cppcheck variable scope revert Change-Id: I757615e134eddc1f212533e3e950827e7180c278 --- sal/osl/w32/diagnose.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'sal') diff --git a/sal/osl/w32/diagnose.c b/sal/osl/w32/diagnose.c index 6e793c3cf718..ee39a200063e 100644 --- a/sal/osl/w32/diagnose.c +++ b/sal/osl/w32/diagnose.c @@ -69,6 +69,7 @@ sal_Bool SAL_CALL osl_assertFailedLine(const sal_Char* pszFileName, sal_Int32 nL #else HWND hWndParent; UINT nFlags; + int nCode; /* get app name or NULL if unknown (don't call assert) */ LPCSTR lpszAppName = "Error"; @@ -89,8 +90,7 @@ sal_Bool SAL_CALL osl_assertFailedLine(const sal_Char* pszFileName, sal_Int32 nL { if ( !getenv( "DISABLE_SAL_DBGBOX" ) ) { - TCHAR szBoxMessage[1024]; - int nCode; + TCHAR szBoxMessage[1024]; /* active popup window for the current thread */ hWndParent = GetActiveWindow(); -- cgit