From fe677e8f6a973bb80e3b359c67053607277dbee9 Mon Sep 17 00:00:00 2001 From: Stephan Bergmann Date: Sat, 18 Feb 2017 09:18:30 +0100 Subject: loplugin:subtlezeroinit: xmlsecurity Change-Id: Ife06c74e1665273350b497a1a584d7f76297c13d (cherry picked from commit 7dedccd06d5c822b6bcaeba81753ca9e75fad376) --- xmlsecurity/source/pdfio/pdfdocument.cxx | 10 +++++----- xmlsecurity/source/xmlsec/nss/x509certificate_nssimpl.cxx | 8 ++++---- 2 files changed, 9 insertions(+), 9 deletions(-) diff --git a/xmlsecurity/source/pdfio/pdfdocument.cxx b/xmlsecurity/source/pdfio/pdfdocument.cxx index f4206c6343dd..e071e300f35c 100644 --- a/xmlsecurity/source/pdfio/pdfdocument.cxx +++ b/xmlsecurity/source/pdfio/pdfdocument.cxx @@ -1031,7 +1031,7 @@ bool PDFDocument::Tokenize(SvStream& rStream, TokenizeMode eMode, std::vector< s ++nDictionaryDepth; } else - rElements.push_back(std::unique_ptr(new PDFHexStringElement())); + rElements.push_back(std::unique_ptr(new PDFHexStringElement)); if (!rElements.back()->Read(rStream)) { SAL_WARN("xmlsecurity.pdfio", "PDFDocument::Tokenize: PDFDictionaryElement::Read() failed"); @@ -1100,7 +1100,7 @@ bool PDFDocument::Tokenize(SvStream& rStream, TokenizeMode eMode, std::vector< s } case '(': { - rElements.push_back(std::unique_ptr(new PDFLiteralStringElement())); + rElements.push_back(std::unique_ptr(new PDFLiteralStringElement)); rStream.SeekRel(-1); if (!rElements.back()->Read(rStream)) { @@ -1223,7 +1223,7 @@ bool PDFDocument::Tokenize(SvStream& rStream, TokenizeMode eMode, std::vector< s } else if (aKeyword == "endstream") { - rElements.push_back(std::unique_ptr(new PDFEndStreamElement())); + rElements.push_back(std::unique_ptr(new PDFEndStreamElement)); if (!rElements.back()->Read(rStream)) { SAL_WARN("xmlsecurity.pdfio", "PDFDocument::Tokenize: PDFEndStreamElement::Read() failed"); @@ -1232,7 +1232,7 @@ bool PDFDocument::Tokenize(SvStream& rStream, TokenizeMode eMode, std::vector< s } else if (aKeyword == "endobj") { - rElements.push_back(std::unique_ptr(new PDFEndObjectElement())); + rElements.push_back(std::unique_ptr(new PDFEndObjectElement)); if (!rElements.back()->Read(rStream)) { SAL_WARN("xmlsecurity.pdfio", "PDFDocument::Tokenize: PDFEndObjectElement::Read() failed"); @@ -1255,7 +1255,7 @@ bool PDFDocument::Tokenize(SvStream& rStream, TokenizeMode eMode, std::vector< s else if (aKeyword == "true" || aKeyword == "false") rElements.push_back(std::unique_ptr(new PDFBooleanElement(aKeyword.toBoolean()))); else if (aKeyword == "null") - rElements.push_back(std::unique_ptr(new PDFNullElement())); + rElements.push_back(std::unique_ptr(new PDFNullElement)); else if (aKeyword == "xref") // Allow 'f' and 'n' keywords. bInXRef = true; diff --git a/xmlsecurity/source/xmlsec/nss/x509certificate_nssimpl.cxx b/xmlsecurity/source/xmlsec/nss/x509certificate_nssimpl.cxx index be930a222b3e..283ebbe28b56 100644 --- a/xmlsecurity/source/xmlsec/nss/x509certificate_nssimpl.cxx +++ b/xmlsecurity/source/xmlsec/nss/x509certificate_nssimpl.cxx @@ -209,13 +209,13 @@ css::uno::Sequence< css::uno::Reference< css::security::XCertificateExtension > if (objID.equals("2.5.29.17")) { - SanExtensionImpl* pExtn = new SanExtensionImpl(); + SanExtensionImpl* pExtn = new SanExtensionImpl; pExtn->setCertExtn(value, vlen, objid, objidlen, crit); xExtns[len] = pExtn ; } else { - CertificateExtension_XmlSecImpl* pExtn = new CertificateExtension_XmlSecImpl(); + CertificateExtension_XmlSecImpl* pExtn = new CertificateExtension_XmlSecImpl; pExtn->setCertExtn(value, vlen, objid, objidlen, crit); xExtns[len] = pExtn; } @@ -255,14 +255,14 @@ css::uno::Reference< css::security::XCertificateExtension > SAL_CALL X509Certifi if ( objId.equals("OID.2.5.29.17") ) { rtl::Reference xSanImpl( - new SanExtensionImpl()); + new SanExtensionImpl); xSanImpl->setCertExtn(value, vlen, objid, objidlen, crit); xExtn = xSanImpl.get(); } else { rtl::Reference xSecImpl( - new CertificateExtension_XmlSecImpl()); + new CertificateExtension_XmlSecImpl); xSecImpl->setCertExtn(value, vlen, objid, objidlen, crit); xExtn = xSecImpl.get(); } -- cgit v1.2.3