From 2cc0095c28c283ccae7877179a67b180fac8b4ed Mon Sep 17 00:00:00 2001 From: Tor Lillqvist Date: Tue, 13 Dec 2016 17:16:54 +0200 Subject: loplugin:salbool Change-Id: Ia2a2c900bf8bf8ecee2edf130b8ca58f7f35b6aa --- ucb/source/ucp/webdav/SerfSession.cxx | 10 +++++----- ucb/source/ucp/webdav/webdavcontent.cxx | 2 +- 2 files changed, 6 insertions(+), 6 deletions(-) (limited to 'ucb') diff --git a/ucb/source/ucp/webdav/SerfSession.cxx b/ucb/source/ucp/webdav/SerfSession.cxx index 37e6e455a197..40c8ffe9fb26 100644 --- a/ucb/source/ucp/webdav/SerfSession.cxx +++ b/ucb/source/ucp/webdav/SerfSession.cxx @@ -492,7 +492,7 @@ apr_status_t SerfSession::verifySerfCertificateChain ( if (nVerificationResult == 0) { // Certificate (chain) is valid. - xCertificateContainer->addCertificate(getHostName(), sServerCertificateSubject, sal_True); + xCertificateContainer->addCertificate(getHostName(), sServerCertificateSubject, true); return APR_SUCCESS; } else if ((nVerificationResult & security::CertificateValidity::CHAIN_INCOMPLETE) != 0) @@ -506,7 +506,7 @@ apr_status_t SerfSession::verifySerfCertificateChain ( (security::CertificateValidity::INVALID | security::CertificateValidity::REVOKED)) != 0) { // Certificate (chain) is invalid. - xCertificateContainer->addCertificate(getHostName(), sServerCertificateSubject, sal_False); + xCertificateContainer->addCertificate(getHostName(), sServerCertificateSubject, false); return SERF_SSL_CERT_UNKNOWN_FAILURE; } else @@ -536,13 +536,13 @@ apr_status_t SerfSession::verifySerfCertificateChain ( uno::Reference< task::XInteractionApprove > xApprove( xSelection.get(), uno::UNO_QUERY ); if ( xApprove.is() ) { - xCertificateContainer->addCertificate( getHostName(), sServerCertificateSubject, sal_True ); + xCertificateContainer->addCertificate( getHostName(), sServerCertificateSubject, true ); return APR_SUCCESS; } else { // Don't trust cert - xCertificateContainer->addCertificate( getHostName(), sServerCertificateSubject, sal_False ); + xCertificateContainer->addCertificate( getHostName(), sServerCertificateSubject, false ); return SERF_SSL_CERT_UNKNOWN_FAILURE; } } @@ -550,7 +550,7 @@ apr_status_t SerfSession::verifySerfCertificateChain ( else { // Don't trust cert - xCertificateContainer->addCertificate( getHostName(), sServerCertificateSubject, sal_False ); + xCertificateContainer->addCertificate( getHostName(), sServerCertificateSubject, false ); return SERF_SSL_CERT_UNKNOWN_FAILURE; } } diff --git a/ucb/source/ucp/webdav/webdavcontent.cxx b/ucb/source/ucp/webdav/webdavcontent.cxx index 60746e679a44..8db55d9a5f3d 100644 --- a/ucb/source/ucp/webdav/webdavcontent.cxx +++ b/ucb/source/ucp/webdav/webdavcontent.cxx @@ -2715,7 +2715,7 @@ void Content::transfer( xResAccess->getSessionFactory(), sourceURI.GetURI() ); - if ( rArgs.MoveData == sal_True ) + if ( rArgs.MoveData ) { uno::Reference< ucb::XContentIdentifier > xId = new ::ucbhelper::ContentIdentifier( rArgs.SourceURL ); -- cgit