diff options
-rw-r--r-- | comphelper/source/misc/docpasswordhelper.cxx | 20 | ||||
-rw-r--r-- | include/comphelper/docpasswordhelper.hxx | 8 | ||||
-rw-r--r-- | oox/source/core/filterdetect.cxx | 4 | ||||
-rw-r--r-- | sc/source/filter/excel/xistream.cxx | 4 | ||||
-rw-r--r-- | sc/source/filter/oox/biffcodec.cxx | 4 | ||||
-rw-r--r-- | sfx2/source/appl/appopen.cxx | 8 |
6 files changed, 24 insertions, 24 deletions
diff --git a/comphelper/source/misc/docpasswordhelper.cxx b/comphelper/source/misc/docpasswordhelper.cxx index 2dd70e3271b9..301612cbaade 100644 --- a/comphelper/source/misc/docpasswordhelper.cxx +++ b/comphelper/source/misc/docpasswordhelper.cxx @@ -356,48 +356,48 @@ Sequence< sal_Int8 > DocPasswordHelper::GetXLHashAsSequence( bool* pbIsDefaultPassword ) { css::uno::Sequence< css::beans::NamedValue > aEncData; - DocPasswordVerifierResult eResult = DocPasswordVerifierResult_WRONG_PASSWORD; + DocPasswordVerifierResult eResult = DocPasswordVerifierResult::WrongPassword; // first, try provided default passwords if( pbIsDefaultPassword ) *pbIsDefaultPassword = false; if( pDefaultPasswords ) { - for( ::std::vector< OUString >::const_iterator aIt = pDefaultPasswords->begin(), aEnd = pDefaultPasswords->end(); (eResult == DocPasswordVerifierResult_WRONG_PASSWORD) && (aIt != aEnd); ++aIt ) + for( ::std::vector< OUString >::const_iterator aIt = pDefaultPasswords->begin(), aEnd = pDefaultPasswords->end(); (eResult == DocPasswordVerifierResult::WrongPassword) && (aIt != aEnd); ++aIt ) { OSL_ENSURE( !aIt->isEmpty(), "DocPasswordHelper::requestAndVerifyDocPassword - unexpected empty default password" ); if( !aIt->isEmpty() ) { eResult = rVerifier.verifyPassword( *aIt, aEncData ); if( pbIsDefaultPassword ) - *pbIsDefaultPassword = eResult == DocPasswordVerifierResult_OK; + *pbIsDefaultPassword = eResult == DocPasswordVerifierResult::OK; } } } // try media encryption data (skip, if result is OK or ABORT) - if( eResult == DocPasswordVerifierResult_WRONG_PASSWORD ) + if( eResult == DocPasswordVerifierResult::WrongPassword ) { if( rMediaEncData.getLength() > 0 ) { eResult = rVerifier.verifyEncryptionData( rMediaEncData ); - if( eResult == DocPasswordVerifierResult_OK ) + if( eResult == DocPasswordVerifierResult::OK ) aEncData = rMediaEncData; } } // try media password (skip, if result is OK or ABORT) - if( eResult == DocPasswordVerifierResult_WRONG_PASSWORD ) + if( eResult == DocPasswordVerifierResult::WrongPassword ) { if( !rMediaPassword.isEmpty() ) eResult = rVerifier.verifyPassword( rMediaPassword, aEncData ); } // request a password (skip, if result is OK or ABORT) - if( (eResult == DocPasswordVerifierResult_WRONG_PASSWORD) && rxInteractHandler.is() ) try + if( (eResult == DocPasswordVerifierResult::WrongPassword) && rxInteractHandler.is() ) try { PasswordRequestMode eRequestMode = PasswordRequestMode_PASSWORD_ENTER; - while( eResult == DocPasswordVerifierResult_WRONG_PASSWORD ) + while( eResult == DocPasswordVerifierResult::WrongPassword ) { DocPasswordRequest* pRequest = new DocPasswordRequest( eRequestType, eRequestMode, rDocumentUrl ); Reference< XInteractionRequest > xRequest( pRequest ); @@ -409,7 +409,7 @@ Sequence< sal_Int8 > DocPasswordHelper::GetXLHashAsSequence( } else { - eResult = DocPasswordVerifierResult_ABORT; + eResult = DocPasswordVerifierResult::Abort; } eRequestMode = PasswordRequestMode_PASSWORD_REENTER; } @@ -418,7 +418,7 @@ Sequence< sal_Int8 > DocPasswordHelper::GetXLHashAsSequence( { } - return (eResult == DocPasswordVerifierResult_OK) ? aEncData : uno::Sequence< beans::NamedValue >(); + return (eResult == DocPasswordVerifierResult::OK) ? aEncData : uno::Sequence< beans::NamedValue >(); } } // namespace comphelper diff --git a/include/comphelper/docpasswordhelper.hxx b/include/comphelper/docpasswordhelper.hxx index e1f9976d7f87..12ecb7ee6e69 100644 --- a/include/comphelper/docpasswordhelper.hxx +++ b/include/comphelper/docpasswordhelper.hxx @@ -30,11 +30,11 @@ namespace com { namespace sun { namespace star { namespace beans { struct Proper namespace comphelper { -enum DocPasswordVerifierResult +enum class DocPasswordVerifierResult { - DocPasswordVerifierResult_OK, - DocPasswordVerifierResult_WRONG_PASSWORD, - DocPasswordVerifierResult_ABORT + OK, + WrongPassword, + Abort }; diff --git a/oox/source/core/filterdetect.cxx b/oox/source/core/filterdetect.cxx index ede7849c599f..02aec2bc88a6 100644 --- a/oox/source/core/filterdetect.cxx +++ b/oox/source/core/filterdetect.cxx @@ -283,12 +283,12 @@ comphelper::DocPasswordVerifierResult PasswordVerifier::verifyPassword( const OU if(mDecryptor.generateEncryptionKey(rPassword)) rEncryptionData = mDecryptor.createEncryptionData(rPassword); - return rEncryptionData.hasElements() ? comphelper::DocPasswordVerifierResult_OK : comphelper::DocPasswordVerifierResult_WRONG_PASSWORD; + return rEncryptionData.hasElements() ? comphelper::DocPasswordVerifierResult::OK : comphelper::DocPasswordVerifierResult::WrongPassword; } comphelper::DocPasswordVerifierResult PasswordVerifier::verifyEncryptionData( const Sequence<NamedValue>& ) { - return comphelper::DocPasswordVerifierResult_WRONG_PASSWORD; + return comphelper::DocPasswordVerifierResult::WrongPassword; } } // namespace diff --git a/sc/source/filter/excel/xistream.cxx b/sc/source/filter/excel/xistream.cxx index 88448ec72032..1c9ab9cdbcf5 100644 --- a/sc/source/filter/excel/xistream.cxx +++ b/sc/source/filter/excel/xistream.cxx @@ -62,14 +62,14 @@ XclImpDecrypterRef XclImpDecrypter::Clone() const { o_rEncryptionData = OnVerifyPassword( rPassword ); mnError = o_rEncryptionData.getLength() ? ERRCODE_NONE : ERRCODE_ABORT; - return o_rEncryptionData.getLength() ? ::comphelper::DocPasswordVerifierResult_OK : ::comphelper::DocPasswordVerifierResult_WRONG_PASSWORD; + return o_rEncryptionData.getLength() ? ::comphelper::DocPasswordVerifierResult::OK : ::comphelper::DocPasswordVerifierResult::WrongPassword; } ::comphelper::DocPasswordVerifierResult XclImpDecrypter::verifyEncryptionData( const uno::Sequence< beans::NamedValue >& rEncryptionData ) { bool bValid = OnVerifyEncryptionData( rEncryptionData ); mnError = bValid ? ERRCODE_NONE : ERRCODE_ABORT; - return bValid ? ::comphelper::DocPasswordVerifierResult_OK : ::comphelper::DocPasswordVerifierResult_WRONG_PASSWORD; + return bValid ? ::comphelper::DocPasswordVerifierResult::OK : ::comphelper::DocPasswordVerifierResult::WrongPassword; } void XclImpDecrypter::Update( SvStream& rStrm, sal_uInt16 nRecSize ) diff --git a/sc/source/filter/oox/biffcodec.cxx b/sc/source/filter/oox/biffcodec.cxx index 382ac5f1b692..18b19d0e23ab 100644 --- a/sc/source/filter/oox/biffcodec.cxx +++ b/sc/source/filter/oox/biffcodec.cxx @@ -45,13 +45,13 @@ BiffDecoderBase::~BiffDecoderBase() { o_rEncryptionData = implVerifyPassword( rPassword ); mbValid = o_rEncryptionData.hasElements(); - return mbValid ? ::comphelper::DocPasswordVerifierResult_OK : ::comphelper::DocPasswordVerifierResult_WRONG_PASSWORD; + return mbValid ? ::comphelper::DocPasswordVerifierResult::OK : ::comphelper::DocPasswordVerifierResult::WrongPassword; } ::comphelper::DocPasswordVerifierResult BiffDecoderBase::verifyEncryptionData( const Sequence< NamedValue >& rEncryptionData ) { mbValid = implVerifyEncryptionData( rEncryptionData ); - return mbValid ? ::comphelper::DocPasswordVerifierResult_OK : ::comphelper::DocPasswordVerifierResult_WRONG_PASSWORD; + return mbValid ? ::comphelper::DocPasswordVerifierResult::OK : ::comphelper::DocPasswordVerifierResult::WrongPassword; } void BiffDecoderBase::decode( sal_uInt8* pnDestData, const sal_uInt8* pnSrcData, sal_Int64 nStreamPos, sal_uInt16 nBytes ) diff --git a/sfx2/source/appl/appopen.cxx b/sfx2/source/appl/appopen.cxx index 61b7dcd3fadc..9675138dc673 100644 --- a/sfx2/source/appl/appopen.cxx +++ b/sfx2/source/appl/appopen.cxx @@ -147,7 +147,7 @@ private: ::comphelper::DocPasswordVerifierResult SfxDocPasswordVerifier::verifyEncryptionData( const uno::Sequence< beans::NamedValue >& rEncryptionData ) { - ::comphelper::DocPasswordVerifierResult eResult = ::comphelper::DocPasswordVerifierResult_WRONG_PASSWORD; + ::comphelper::DocPasswordVerifierResult eResult = ::comphelper::DocPasswordVerifierResult::WrongPassword; try { // check the encryption data @@ -160,17 +160,17 @@ private: embed::ElementModes::READ | embed::ElementModes::NOCREATE ); // no exception -> success - eResult = ::comphelper::DocPasswordVerifierResult_OK; + eResult = ::comphelper::DocPasswordVerifierResult::OK; } catch( const packages::WrongPasswordException& ) { - eResult = ::comphelper::DocPasswordVerifierResult_WRONG_PASSWORD; + eResult = ::comphelper::DocPasswordVerifierResult::WrongPassword; } catch( const uno::Exception& ) { // unknown error, report it as wrong password // TODO/LATER: we need an additional way to report unknown problems in this case - eResult = ::comphelper::DocPasswordVerifierResult_WRONG_PASSWORD; + eResult = ::comphelper::DocPasswordVerifierResult::WrongPassword; } return eResult; } |