From 7dedccd06d5c822b6bcaeba81753ca9e75fad376 Mon Sep 17 00:00:00 2001 From: Stephan Bergmann Date: Sat, 18 Feb 2017 09:18:30 +0100 Subject: loplugin:subtlezeroinit: xmlsecurity Change-Id: Ife06c74e1665273350b497a1a584d7f76297c13d --- xmlsecurity/source/pdfio/pdfdocument.cxx | 10 +++++----- xmlsecurity/source/xmlsec/nss/x509certificate_nssimpl.cxx | 8 ++++---- 2 files changed, 9 insertions(+), 9 deletions(-) (limited to 'xmlsecurity') diff --git a/xmlsecurity/source/pdfio/pdfdocument.cxx b/xmlsecurity/source/pdfio/pdfdocument.cxx index 4a7622e6ea38..e724c90be1a7 100644 --- a/xmlsecurity/source/pdfio/pdfdocument.cxx +++ b/xmlsecurity/source/pdfio/pdfdocument.cxx @@ -1032,7 +1032,7 @@ bool PDFDocument::Tokenize(SvStream& rStream, TokenizeMode eMode, std::vector< s ++nDictionaryDepth; } else - rElements.push_back(std::unique_ptr(new PDFHexStringElement())); + rElements.push_back(std::unique_ptr(new PDFHexStringElement)); if (!rElements.back()->Read(rStream)) { SAL_WARN("xmlsecurity.pdfio", "PDFDocument::Tokenize: PDFDictionaryElement::Read() failed"); @@ -1101,7 +1101,7 @@ bool PDFDocument::Tokenize(SvStream& rStream, TokenizeMode eMode, std::vector< s } case '(': { - rElements.push_back(std::unique_ptr(new PDFLiteralStringElement())); + rElements.push_back(std::unique_ptr(new PDFLiteralStringElement)); rStream.SeekRel(-1); if (!rElements.back()->Read(rStream)) { @@ -1224,7 +1224,7 @@ bool PDFDocument::Tokenize(SvStream& rStream, TokenizeMode eMode, std::vector< s } else if (aKeyword == "endstream") { - rElements.push_back(std::unique_ptr(new PDFEndStreamElement())); + rElements.push_back(std::unique_ptr(new PDFEndStreamElement)); if (!rElements.back()->Read(rStream)) { SAL_WARN("xmlsecurity.pdfio", "PDFDocument::Tokenize: PDFEndStreamElement::Read() failed"); @@ -1233,7 +1233,7 @@ bool PDFDocument::Tokenize(SvStream& rStream, TokenizeMode eMode, std::vector< s } else if (aKeyword == "endobj") { - rElements.push_back(std::unique_ptr(new PDFEndObjectElement())); + rElements.push_back(std::unique_ptr(new PDFEndObjectElement)); if (!rElements.back()->Read(rStream)) { SAL_WARN("xmlsecurity.pdfio", "PDFDocument::Tokenize: PDFEndObjectElement::Read() failed"); @@ -1256,7 +1256,7 @@ bool PDFDocument::Tokenize(SvStream& rStream, TokenizeMode eMode, std::vector< s else if (aKeyword == "true" || aKeyword == "false") rElements.push_back(std::unique_ptr(new PDFBooleanElement(aKeyword.toBoolean()))); else if (aKeyword == "null") - rElements.push_back(std::unique_ptr(new PDFNullElement())); + rElements.push_back(std::unique_ptr(new PDFNullElement)); else if (aKeyword == "xref") // Allow 'f' and 'n' keywords. bInXRef = true; diff --git a/xmlsecurity/source/xmlsec/nss/x509certificate_nssimpl.cxx b/xmlsecurity/source/xmlsec/nss/x509certificate_nssimpl.cxx index 00582e4cf307..cc93f1be46b7 100644 --- a/xmlsecurity/source/xmlsec/nss/x509certificate_nssimpl.cxx +++ b/xmlsecurity/source/xmlsec/nss/x509certificate_nssimpl.cxx @@ -209,13 +209,13 @@ css::uno::Sequence< css::uno::Reference< css::security::XCertificateExtension > if (objID.equals("2.5.29.17")) { - SanExtensionImpl* pExtn = new SanExtensionImpl(); + SanExtensionImpl* pExtn = new SanExtensionImpl; pExtn->setCertExtn(value, vlen, objid, objidlen, crit); xExtns[len] = pExtn ; } else { - CertificateExtension_XmlSecImpl* pExtn = new CertificateExtension_XmlSecImpl(); + CertificateExtension_XmlSecImpl* pExtn = new CertificateExtension_XmlSecImpl; pExtn->setCertExtn(value, vlen, objid, objidlen, crit); xExtns[len] = pExtn; } @@ -255,14 +255,14 @@ css::uno::Reference< css::security::XCertificateExtension > SAL_CALL X509Certifi if ( objId.equals("OID.2.5.29.17") ) { rtl::Reference xSanImpl( - new SanExtensionImpl()); + new SanExtensionImpl); xSanImpl->setCertExtn(value, vlen, objid, objidlen, crit); xExtn = xSanImpl.get(); } else { rtl::Reference xSecImpl( - new CertificateExtension_XmlSecImpl()); + new CertificateExtension_XmlSecImpl); xSecImpl->setCertExtn(value, vlen, objid, objidlen, crit); xExtn = xSecImpl.get(); } -- cgit