diff --git a/xmlsecurity/source/framework/encryptionengine.cxx b/xmlsecurity/source/framework/encryptionengine.cxx index 589176ed2dfa..6b74377c2aa2 100644 --- a/xmlsecurity/source/framework/encryptionengine.cxx +++ b/xmlsecurity/source/framework/encryptionengine.cxx @@ -162,7 +162,7 @@ void EncryptionEngine::clearUp( ) const xReferenceResolvedBroadcaster->removeReferenceResolvedListener( m_nIdOfTemplateEC, - (const Reference < cssxc::sax::XReferenceResolvedListener >)((SecurityEngine *)this)); + static_cast >((SecurityEngine *)this)); m_xSAXEventKeeper->removeElementCollector(m_nIdOfTemplateEC); diff --git a/xmlsecurity/source/framework/saxeventkeeperimpl.cxx b/xmlsecurity/source/framework/saxeventkeeperimpl.cxx index 240f9ec41886..45c89d9f10f6 100644 --- a/xmlsecurity/source/framework/saxeventkeeperimpl.cxx +++ b/xmlsecurity/source/framework/saxeventkeeperimpl.cxx @@ -720,7 +720,7 @@ void SAXEventKeeperImpl::releaseElementMarkBuffer() * it is a EC */ { - ElementCollector* pElementCollector = (ElementCollector*)pElementMark; + ElementCollector* pElementCollector = static_cast(pElementMark); cssxc::sax::ElementMarkPriority nPriority = pElementCollector->getPriority(); /* @@ -1093,7 +1093,7 @@ sal_Int32 SAL_CALL SAXEventKeeperImpl::cloneElementCollector( { sal_Int32 nId = -1; - ElementCollector* pElementCollector = (ElementCollector*)findElementMarkBuffer(referenceId); + ElementCollector* pElementCollector = static_cast(findElementMarkBuffer(referenceId)); if (pElementCollector != NULL) { nId = m_nNextElementMarkId; @@ -1137,7 +1137,7 @@ void SAL_CALL SAXEventKeeperImpl::addReferenceResolvedListener( const cssu::Reference< cssxc::sax::XReferenceResolvedListener >& listener ) throw (cssu::RuntimeException, std::exception) { - ElementCollector* pElementCollector = (ElementCollector*)findElementMarkBuffer(referenceId); + ElementCollector* pElementCollector = static_cast(findElementMarkBuffer(referenceId)); if (pElementCollector != NULL) { pElementCollector->setReferenceResolvedListener(listener); diff --git a/xmlsecurity/source/framework/signatureengine.cxx b/xmlsecurity/source/framework/signatureengine.cxx index 708e536fdadb..655b317b7e7c 100644 --- a/xmlsecurity/source/framework/signatureengine.cxx +++ b/xmlsecurity/source/framework/signatureengine.cxx @@ -176,7 +176,7 @@ void SignatureEngine::clearUp( ) const xReferenceResolvedBroadcaster( m_xSAXEventKeeper, cssu::UNO_QUERY ); xReferenceResolvedBroadcaster->removeReferenceResolvedListener( m_nIdOfTemplateEC, - (const cssu::Reference < cssxc::sax::XReferenceResolvedListener >)((SecurityEngine *)this)); + static_cast >((SecurityEngine *)this)); m_xSAXEventKeeper->removeElementCollector(m_nIdOfTemplateEC); @@ -186,7 +186,7 @@ void SignatureEngine::clearUp( ) const { xReferenceResolvedBroadcaster->removeReferenceResolvedListener( *ii, - (const cssu::Reference < cssxc::sax::XReferenceResolvedListener >)((SecurityEngine *)this)); + static_cast >((SecurityEngine *)this)); m_xSAXEventKeeper->removeElementCollector(*ii); } diff --git a/xmlsecurity/source/xmlsec/nss/secerror.cxx b/xmlsecurity/source/xmlsec/nss/secerror.cxx index 3129f45877f1..2d140f040891 100644 --- a/xmlsecurity/source/xmlsec/nss/secerror.cxx +++ b/xmlsecurity/source/xmlsec/nss/secerror.cxx @@ -88,7 +88,7 @@ printChainFailure(CERTVerifyLog *log) switch (node->error) { case SEC_ERROR_INADEQUATE_KEY_USAGE: - errorFlags = (sal_uIntPtr)node->arg; + errorFlags = reinterpret_cast(node->arg); switch (errorFlags) { case KU_DIGITAL_SIGNATURE: @@ -106,7 +106,7 @@ printChainFailure(CERTVerifyLog *log) } break; case SEC_ERROR_INADEQUATE_CERT_TYPE: - errorFlags = (sal_uIntPtr)node->arg; + errorFlags = reinterpret_cast(node->arg); switch (errorFlags) { case NS_CERT_TYPE_SSL_CLIENT: