This is an automated email from the ASF dual-hosted git repository.

bcall pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/trafficserver.git


The following commit(s) were added to refs/heads/master by this push:
     new 1a6c991  Ran clang-tidy over the source tree (#7077)
1a6c991 is described below

commit 1a6c9914791bab2b7b97392bd23c6008609204f9
Author: Bryan Call <[email protected]>
AuthorDate: Thu Aug 6 16:40:18 2020 -0700

    Ran clang-tidy over the source tree (#7077)
---
 example/plugins/cpp-api/websocket/WSBuffer.cc      |   2 +-
 iocore/cache/Cache.cc                              |   2 +-
 iocore/cache/CacheLink.cc                          |   2 +-
 iocore/eventsystem/UnixEventProcessor.cc           |   2 +-
 iocore/net/P_QUICNetVConnection.h                  |   4 +-
 iocore/net/P_QUICPacketHandler.h                   |   2 +-
 iocore/net/P_SSLUtils.h                            |   4 +-
 iocore/net/QUICNet.cc                              |   6 +-
 iocore/net/QUICNetVConnection.cc                   |   6 +-
 iocore/net/QUICPacketHandler.cc                    |  10 +-
 iocore/net/SSLUtils.cc                             |   4 +-
 iocore/net/UnixNetVConnection.cc                   |   3 +-
 plugins/cache_promote/lru_policy.cc                |   6 +-
 plugins/experimental/icap/icap_plugin.cc           | 103 +++++++++++----------
 plugins/experimental/maxmind_acl/mmdb.cc           |  12 +--
 plugins/experimental/maxmind_acl/mmdb.h            |  10 +-
 plugins/experimental/memcache/tsmemcache.cc        |   3 +-
 .../experimental/memory_profile/memory_profile.cc  |  12 +--
 plugins/experimental/metalink/metalink.cc          |  15 ++-
 plugins/experimental/remap_stats/remap_stats.cc    |   2 +-
 plugins/experimental/slice/Config.cc               |   8 +-
 plugins/experimental/slice/Range.cc                |   2 +-
 plugins/experimental/slice/server.cc               |   2 +-
 plugins/experimental/slice/slice.cc                |   2 +-
 plugins/experimental/slice/util.cc                 |   2 +-
 .../experimental/ssl_session_reuse/src/publish.cc  |  16 ++--
 .../ssl_session_reuse/src/session_process.cc       |   2 +-
 .../experimental/stream_editor/stream_editor.cc    |  12 +--
 plugins/experimental/traffic_dump/session_data.cc  |   4 +-
 .../experimental/traffic_dump/transaction_data.cc  |   2 +-
 plugins/lua/ts_lua.c                               |   2 +-
 plugins/stats_over_http/stats_over_http.c          |   3 +-
 proxy/ControlMatcher.cc                            |   6 +-
 proxy/ParentConsistentHash.cc                      |   3 +-
 proxy/hdrs/MIME.cc                                 |   9 +-
 proxy/http/Http1Transaction.cc                     |   9 +-
 proxy/http/remap/NextHopConsistentHash.cc          |   2 +-
 proxy/http/remap/NextHopHealthStatus.cc            |   3 +-
 proxy/http/remap/NextHopSelectionStrategy.cc       |  14 +--
 proxy/http/remap/NextHopStrategyFactory.cc         |  16 ++--
 proxy/http/remap/NextHopStrategyFactory.h          |   2 +-
 proxy/logging/Log.cc                               |   2 +-
 proxy/logging/LogAccess.cc                         |   2 +-
 proxy/logging/LogFile.cc                           |   4 +-
 src/traffic_logstats/logstats.cc                   |  10 +-
 src/traffic_server/FetchSM.cc                      |   2 +-
 src/traffic_server/InkAPITest.cc                   |  96 +++++++++----------
 src/tscore/ink_inet.cc                             |  12 +--
 src/tscore/ink_queue.cc                            |  52 +++++++----
 src/tscore/ink_res_init.cc                         |  15 ++-
 src/tscore/unit_tests/test_Regex.cc                |   8 +-
 tests/gold_tests/chunked_encoding/smuggle-client.c |   6 +-
 tests/gold_tests/timeout/ssl-delay-server.cc       |  24 ++---
 tests/gold_tests/tls/ssl-post.c                    |  19 ++--
 tests/tools/plugins/cert_update.cc                 |   2 +-
 tests/tools/plugins/cont_schedule.cc               |   4 +-
 tests/tools/plugins/continuations_verify.cc        |   4 +-
 tests/tools/plugins/custom204plugin.cc             |   6 +-
 tests/tools/plugins/emergency_shutdown.cc          |   4 +-
 tests/tools/plugins/fatal_shutdown.cc              |   4 +-
 tests/tools/plugins/hook_add_plugin.cc             |   2 +-
 tests/tools/plugins/ssl_client_verify_test.cc      |   8 +-
 tests/tools/plugins/ssl_hook_test.cc               |  22 ++---
 tests/tools/plugins/ssl_verify_test.cc             |   4 +-
 tests/tools/plugins/ssntxnorder_verify.cc          |  18 ++--
 tests/tools/plugins/test_log_interface.cc          |   6 +-
 tools/jtest/jtest.cc                               |   4 +-
 67 files changed, 353 insertions(+), 318 deletions(-)

diff --git a/example/plugins/cpp-api/websocket/WSBuffer.cc 
b/example/plugins/cpp-api/websocket/WSBuffer.cc
index 0bbd05d..3b8a9b3 100644
--- a/example/plugins/cpp-api/websocket/WSBuffer.cc
+++ b/example/plugins/cpp-api/websocket/WSBuffer.cc
@@ -113,7 +113,7 @@ WSBuffer::read_buffered_message(std::string &message, int 
&code)
     if (avail < 4 + mask_len) { // 2 + 2 + length bytes + mask.
       return false;
     }
-    msg_len = ntohs(*(uint16_t *)(ws_buf_.data() + 2));
+    msg_len = ntohs(*reinterpret_cast<uint16_t *>(ws_buf_.data() + 2));
     pos     = 4;
   } else if (msg_len == WS_64BIT_LEN) {
     if (avail < 10 + mask_len) { // 2 + 8 length bytes + mask.
diff --git a/iocore/cache/Cache.cc b/iocore/cache/Cache.cc
index e36eafd..80a8394 100644
--- a/iocore/cache/Cache.cc
+++ b/iocore/cache/Cache.cc
@@ -2772,7 +2772,7 @@ cplist_reconfigure()
         int64_t space_in_blks = 0;
         if (0 == tot_forced_space_in_blks) {
           // Calculate the space as percentage of total space in blocks.
-          space_in_blks = static_cast<int64_t>(((double)(config_vol->percent / 
percent_remaining)) * tot_space_in_blks);
+          space_in_blks = static_cast<int64_t>(((config_vol->percent / 
percent_remaining)) * tot_space_in_blks);
         } else {
           // Forced volumes take all disk space, so no percentage calculations 
here.
           space_in_blks = tot_forced_space_in_blks;
diff --git a/iocore/cache/CacheLink.cc b/iocore/cache/CacheLink.cc
index f8ae328..d3055f4 100644
--- a/iocore/cache/CacheLink.cc
+++ b/iocore/cache/CacheLink.cc
@@ -42,7 +42,7 @@ Cache::link(Continuation *cont, const CacheKey *from, const 
CacheKey *to, CacheF
 
   c->buf = new_IOBufferData(BUFFER_SIZE_INDEX_512);
 #ifdef DEBUG
-  Doc *doc = (Doc *)c->buf->data();
+  Doc *doc = reinterpret_cast<Doc *>(c->buf->data());
   memcpy(doc->data(), to, sizeof(*to)); // doublecheck
 #endif
 
diff --git a/iocore/eventsystem/UnixEventProcessor.cc 
b/iocore/eventsystem/UnixEventProcessor.cc
index c2f7fad..c3a30fe 100644
--- a/iocore/eventsystem/UnixEventProcessor.cc
+++ b/iocore/eventsystem/UnixEventProcessor.cc
@@ -193,7 +193,7 @@ ThreadAffinityInitializer::set_affinity(int, Event *)
     hwloc_obj_t obj = hwloc_get_obj_by_type(ink_get_topology(), obj_type, 
t->id % obj_count);
 #if HWLOC_API_VERSION >= 0x00010100
     int cpu_mask_len = hwloc_bitmap_snprintf(nullptr, 0, obj->cpuset) + 1;
-    char *cpu_mask   = (char *)alloca(cpu_mask_len);
+    char *cpu_mask   = static_cast<char *>(alloca(cpu_mask_len));
     hwloc_bitmap_snprintf(cpu_mask, cpu_mask_len, obj->cpuset);
     Debug("iocore_thread", "EThread: %p %s: %d CPU Mask: %s\n", t, obj_name, 
obj->logical_index, cpu_mask);
 #else
diff --git a/iocore/net/P_QUICNetVConnection.h 
b/iocore/net/P_QUICNetVConnection.h
index a3f24a4..484ea45 100644
--- a/iocore/net/P_QUICNetVConnection.h
+++ b/iocore/net/P_QUICNetVConnection.h
@@ -308,7 +308,7 @@ private:
   QUICPacketUPtr _packetize_frames(uint8_t *packet_buf, QUICEncryptionLevel 
level, uint64_t max_packet_size,
                                    std::vector<QUICFrameInfo> &frames);
   void _packetize_closing_frame();
-  QUICPacketUPtr _build_packet(uint8_t *packet_buf, QUICEncryptionLevel level, 
Ptr<IOBufferBlock> parent_block,
+  QUICPacketUPtr _build_packet(uint8_t *packet_buf, QUICEncryptionLevel level, 
const Ptr<IOBufferBlock> &parent_block,
                                bool retransmittable, bool probing, bool 
crypto);
 
   QUICConnectionErrorUPtr _recv_and_ack(const QUICPacketR &packet, bool 
*has_non_probing_frame = nullptr);
@@ -358,7 +358,7 @@ private:
   void _update_local_cid(const QUICConnectionId &new_cid);
   void _rerandomize_original_cid();
 
-  QUICHandshakeProtocol *_setup_handshake_protocol(shared_SSL_CTX ctx);
+  QUICHandshakeProtocol *_setup_handshake_protocol(const shared_SSL_CTX &ctx);
 
   QUICPacketUPtr _the_final_packet = QUICPacketFactory::create_null_packet();
   uint8_t _final_packet_buf[QUICPacket::MAX_INSTANCE_SIZE];
diff --git a/iocore/net/P_QUICPacketHandler.h b/iocore/net/P_QUICPacketHandler.h
index d7f6dc2..0eaae22 100644
--- a/iocore/net/P_QUICPacketHandler.h
+++ b/iocore/net/P_QUICPacketHandler.h
@@ -42,7 +42,7 @@ public:
   ~QUICPacketHandler();
 
   void send_packet(const QUICPacket &packet, QUICNetVConnection *vc, const 
QUICPacketHeaderProtector &pn_protector);
-  void send_packet(QUICNetVConnection *vc, Ptr<IOBufferBlock> udp_payload);
+  void send_packet(QUICNetVConnection *vc, const Ptr<IOBufferBlock> 
&udp_payload);
 
   void close_connection(QUICNetVConnection *conn);
 
diff --git a/iocore/net/P_SSLUtils.h b/iocore/net/P_SSLUtils.h
index 5f0e402..46553dd 100644
--- a/iocore/net/P_SSLUtils.h
+++ b/iocore/net/P_SSLUtils.h
@@ -85,12 +85,12 @@ public:
 protected:
   const SSLConfigParams *_params;
 
-  bool _store_single_ssl_ctx(SSLCertLookup *lookup, 
shared_SSLMultiCertConfigParams sslMultCertSettings, shared_SSL_CTX ctx,
+  bool _store_single_ssl_ctx(SSLCertLookup *lookup, const 
shared_SSLMultiCertConfigParams &sslMultCertSettings, shared_SSL_CTX ctx,
                              std::set<std::string> &names);
 
 private:
   virtual const char *_debug_tag() const;
-  bool _store_ssl_ctx(SSLCertLookup *lookup, shared_SSLMultiCertConfigParams 
ssl_multi_cert_params);
+  bool _store_ssl_ctx(SSLCertLookup *lookup, const 
shared_SSLMultiCertConfigParams &ssl_multi_cert_params);
   virtual void _set_handshake_callbacks(SSL_CTX *ctx);
 };
 
diff --git a/iocore/net/QUICNet.cc b/iocore/net/QUICNet.cc
index 34e21ae..31d33d9 100644
--- a/iocore/net/QUICNet.cc
+++ b/iocore/net/QUICNet.cc
@@ -66,7 +66,7 @@ QUICPollCont::_process_long_header_packet(QUICPollEvent *e, 
NetHandler *nh)
   UDPPacketInternal *p = e->packet;
   // FIXME: VC is nullptr ?
   QUICNetVConnection *vc = static_cast<QUICNetVConnection *>(e->con);
-  uint8_t *buf           = (uint8_t *)p->getIOBlockChain()->buf();
+  uint8_t *buf           = reinterpret_cast<uint8_t 
*>(p->getIOBlockChain()->buf());
 
   QUICPacketType ptype;
   QUICLongHeaderPacketR::type(ptype, buf, 1);
@@ -147,7 +147,7 @@ QUICPollCont::pollEvent(int, Event *)
   }
 
   while ((e = result.pop())) {
-    buf = (uint8_t *)e->packet->getIOBlockChain()->buf();
+    buf = reinterpret_cast<uint8_t *>(e->packet->getIOBlockChain()->buf());
     if (QUICInvariants::is_long_header(buf)) {
       // Long Header Packet with Connection ID, has a valid type value.
       this->_process_long_header_packet(e, nh);
@@ -166,7 +166,7 @@ initialize_thread_for_quic_net(EThread *thread)
   NetHandler *nh       = get_NetHandler(thread);
   QUICPollCont *quicpc = get_QUICPollCont(thread);
 
-  new ((ink_dummy_for_new *)quicpc) QUICPollCont(thread->mutex, nh);
+  new (reinterpret_cast<ink_dummy_for_new *>(quicpc)) 
QUICPollCont(thread->mutex, nh);
 
   thread->schedule_every(quicpc, -HRTIME_MSECONDS(UDP_PERIOD));
 }
diff --git a/iocore/net/QUICNetVConnection.cc b/iocore/net/QUICNetVConnection.cc
index 6af1fd6..f78186e 100644
--- a/iocore/net/QUICNetVConnection.cc
+++ b/iocore/net/QUICNetVConnection.cc
@@ -1060,7 +1060,7 @@ QUICNetVConnection::select_next_protocol(SSL *ssl, const 
unsigned char **out, un
   if (this->getNPN(&npnptr, &npnsize)) {
     // SSL_select_next_proto chooses the first server-offered protocol that 
appears in the clients protocol set, ie. the
     // server selects the protocol. This is a n^2 search, so it's preferable 
to keep the protocol set short.
-    if (SSL_select_next_proto((unsigned char **)out, outlen, npnptr, npnsize, 
in, inlen) == OPENSSL_NPN_NEGOTIATED) {
+    if (SSL_select_next_proto(const_cast<unsigned char **>(out), outlen, 
npnptr, npnsize, in, inlen) == OPENSSL_NPN_NEGOTIATED) {
       Debug("ssl", "selected ALPN protocol %.*s", (int)(*outlen), *out);
       return SSL_TLSEXT_ERR_OK;
     }
@@ -1754,7 +1754,7 @@ QUICNetVConnection::_recv_and_ack(const QUICPacketR 
&packet, bool *has_non_probi
 }
 
 QUICPacketUPtr
-QUICNetVConnection::_build_packet(uint8_t *packet_buf, QUICEncryptionLevel 
level, Ptr<IOBufferBlock> parent_block,
+QUICNetVConnection::_build_packet(uint8_t *packet_buf, QUICEncryptionLevel 
level, const Ptr<IOBufferBlock> &parent_block,
                                   bool ack_eliciting, bool probing, bool 
crypto)
 {
   QUICPacketType type   = QUICTypeUtil::packet_type(level);
@@ -2250,7 +2250,7 @@ QUICNetVConnection::_rerandomize_original_cid()
 }
 
 QUICHandshakeProtocol *
-QUICNetVConnection::_setup_handshake_protocol(shared_SSL_CTX ctx)
+QUICNetVConnection::_setup_handshake_protocol(const shared_SSL_CTX &ctx)
 {
   // Initialize handshake protocol specific stuff
   // For QUICv1 TLS is the only option
diff --git a/iocore/net/QUICPacketHandler.cc b/iocore/net/QUICPacketHandler.cc
index a6e214d..7c91351 100644
--- a/iocore/net/QUICPacketHandler.cc
+++ b/iocore/net/QUICPacketHandler.cc
@@ -177,7 +177,7 @@ QUICPacketHandlerIn::acceptEvent(int event, void *data)
       this->_collector_event = 
this_ethread()->schedule_every(this->_closed_con_collector, 
HRTIME_MSECONDS(100));
     }
 
-    Queue<UDPPacket> *queue = (Queue<UDPPacket> *)data;
+    Queue<UDPPacket> *queue = static_cast<Queue<UDPPacket> *>(data);
     UDPPacket *packet_r;
     while ((packet_r = queue->dequeue())) {
       this->_recv_packet(event, packet_r);
@@ -191,7 +191,7 @@ QUICPacketHandlerIn::acceptEvent(int event, void *data)
   if (((long)data) == -ECONNABORTED) {
   }
 
-  ink_abort("QUIC accept received fatal error: errno = %d", 
-((int)(intptr_t)data));
+  ink_abort("QUIC accept received fatal error: errno = %d", 
-(static_cast<int>((intptr_t)data)));
   return EVENT_CONT;
   return 0;
 }
@@ -386,7 +386,7 @@ QUICPacketHandler::send_packet(const QUICPacket &packet, 
QUICNetVConnection *vc,
 }
 
 void
-QUICPacketHandler::send_packet(QUICNetVConnection *vc, Ptr<IOBufferBlock> 
udp_payload)
+QUICPacketHandler::send_packet(QUICNetVConnection *vc, const 
Ptr<IOBufferBlock> &udp_payload)
 {
   this->_send_packet(vc->get_udp_con(), vc->con.addr, udp_payload);
 }
@@ -493,7 +493,7 @@ QUICPacketHandlerIn::_send_invalid_token_error(const 
uint8_t *initial_packet, ui
   QUICConnectionId scid;
   scid.randomize();
   uint8_t packet_buf[QUICPacket::MAX_INSTANCE_SIZE];
-  QUICPacketUPtr cc_packet = pf.create_initial_packet(packet_buf, 
scid_in_initial, scid, 0, block, block_len, 0, 0, 1);
+  QUICPacketUPtr cc_packet = pf.create_initial_packet(packet_buf, 
scid_in_initial, scid, 0, block, block_len, false, false, true);
 
   this->_send_packet(*cc_packet, connection, from, 0, &php, scid_in_initial);
 }
@@ -521,7 +521,7 @@ QUICPacketHandlerOut::event_handler(int event, Event *data)
     return EVENT_CONT;
   }
   case NET_EVENT_DATAGRAM_READ_READY: {
-    Queue<UDPPacket> *queue = (Queue<UDPPacket> *)data;
+    Queue<UDPPacket> *queue = reinterpret_cast<Queue<UDPPacket> *>(data);
     UDPPacket *packet_r;
     while ((packet_r = queue->dequeue())) {
       this->_recv_packet(event, packet_r);
diff --git a/iocore/net/SSLUtils.cc b/iocore/net/SSLUtils.cc
index b3f5424..b3ee806 100644
--- a/iocore/net/SSLUtils.cc
+++ b/iocore/net/SSLUtils.cc
@@ -1393,7 +1393,7 @@ SSLCreateServerContext(const SSLConfigParams *params, 
const SSLMultiCertConfigPa
    Do NOT call SSL_CTX_set_* functions from here. SSL_CTX should be set up by 
SSLMultiCertConfigLoader::init_server_ssl_ctx().
  */
 bool
-SSLMultiCertConfigLoader::_store_ssl_ctx(SSLCertLookup *lookup, const 
shared_SSLMultiCertConfigParams sslMultCertSettings)
+SSLMultiCertConfigLoader::_store_ssl_ctx(SSLCertLookup *lookup, const 
shared_SSLMultiCertConfigParams &sslMultCertSettings)
 {
   bool retval = true;
   std::vector<X509 *> cert_list;
@@ -1454,7 +1454,7 @@ SSLMultiCertConfigLoader::_store_ssl_ctx(SSLCertLookup 
*lookup, const shared_SSL
 }
 
 bool
-SSLMultiCertConfigLoader::_store_single_ssl_ctx(SSLCertLookup *lookup, const 
shared_SSLMultiCertConfigParams sslMultCertSettings,
+SSLMultiCertConfigLoader::_store_single_ssl_ctx(SSLCertLookup *lookup, const 
shared_SSLMultiCertConfigParams &sslMultCertSettings,
                                                 shared_SSL_CTX ctx, 
std::set<std::string> &names)
 {
   bool inserted                        = false;
diff --git a/iocore/net/UnixNetVConnection.cc b/iocore/net/UnixNetVConnection.cc
index a0e860b..c1c608b 100644
--- a/iocore/net/UnixNetVConnection.cc
+++ b/iocore/net/UnixNetVConnection.cc
@@ -290,8 +290,9 @@ read_from_net(NetHandler *nh, UnixNetVConnection *vc, 
EThread *thread)
     // Add data to buffer and signal continuation.
     buf.writer()->fill(r);
 #ifdef DEBUG
-    if (buf.writer()->write_avail() <= 0)
+    if (buf.writer()->write_avail() <= 0) {
       Debug("iocore_net", "read_from_net, read buffer full");
+    }
 #endif
     s->vio.ndone += r;
     net_activity(vc, thread);
diff --git a/plugins/cache_promote/lru_policy.cc 
b/plugins/cache_promote/lru_policy.cc
index 34e498a..07eeef8 100644
--- a/plugins/cache_promote/lru_policy.cc
+++ b/plugins/cache_promote/lru_policy.cc
@@ -174,9 +174,9 @@ LRUPolicy::stats_add(const char *remap_id)
     return false;
   }
 
-  for (int ii = 0; ii < 8; ii++) {
-    std::string_view name = std::get<0>(stats[ii]);
-    int *id               = std::get<1>(stats[ii]);
+  for (const auto &stat : stats) {
+    std::string_view name = std::get<0>(stat);
+    int *id               = std::get<1>(stat);
     if ((*(id) = create_stat(name, remap_identifier)) == TS_ERROR) {
       return false;
     }
diff --git a/plugins/experimental/icap/icap_plugin.cc 
b/plugins/experimental/icap/icap_plugin.cc
index b00450e..38ab73d 100644
--- a/plugins/experimental/icap/icap_plugin.cc
+++ b/plugins/experimental/icap/icap_plugin.cc
@@ -215,8 +215,8 @@ handle_invalid_icap_behavior(TSCont contp, TransformData 
*data, const char *msg)
 {
   if (data->icap_vc) {
     TSVConnAbort(data->icap_vc, 1);
-    data->icap_vc  = NULL;
-    data->icap_vio = NULL;
+    data->icap_vc  = nullptr;
+    data->icap_vio = nullptr;
   }
   TSStatIntIncrement(total_icap_invalid, 1);
   TSDebug(PLUGIN_NAME, "\n%s\n", data->icap_header.c_str());
@@ -256,8 +256,9 @@ handle_invalid_icap_behavior(TSCont contp, TransformData 
*data, const char *msg)
 static int
 handle_icap_headers(TSCont contp, TransformData *data)
 {
-  int64_t pos                  = data->icap_header.find("\r\n");
-  std::string icap_status_line = pos != (int64_t)std::string::npos ? 
data->icap_header.substr(0, pos) : data->icap_header;
+  int64_t pos = data->icap_header.find("\r\n");
+  std::string icap_status_line =
+    pos != static_cast<int64_t>(std::string::npos) ? 
data->icap_header.substr(0, pos) : data->icap_header;
   /* Check icap header to determine whether the scan passed or not */
   if (data->icap_header.find("X-Infection-Found") != std::string::npos ||
       data->icap_header.find("X-Violations-Found") != std::string::npos) {
@@ -286,14 +287,15 @@ static void
 handle_icap_http_header(TransformData *data)
 {
   // TSDebug(PLUGIN_NAME, "Handling http header");
-  int64_t pos                  = data->http_header.find("\r\n");
-  std::string http_status_line = pos != (int64_t)std::string::npos ? 
data->http_header.substr(0, pos) : data->http_header;
+  int64_t pos = data->http_header.find("\r\n");
+  std::string http_status_line =
+    pos != static_cast<int64_t>(std::string::npos) ? 
data->http_header.substr(0, pos) : data->http_header;
   /* find content length from header if any */
   std::smatch sm;
   std::regex e("(Content-Length: )([[:digit:]]+)");
   regex_search(data->http_header, sm, e);
   if (sm.size()) {
-    data->icap_reply_content_length = std::stoll(sm[2].str().c_str(), NULL, 
10);
+    data->icap_reply_content_length = std::stoll(sm[2].str().c_str(), nullptr, 
10);
   }
   /* Replace header with the returned header from icap server */
   TSMBuffer bufp;
@@ -357,7 +359,7 @@ handle_read_http_body(TSCont contp, TransformData *data)
           int64_t pos          = sm.position(0);
           int64_t token_length = sm[0].length();
 
-          data->http_body_chunk_length = std::stoi(sm[2].str().c_str(), NULL, 
16);
+          data->http_body_chunk_length = std::stoi(sm[2].str().c_str(), 
nullptr, 16);
           data->http_body_total_length_written += data->http_body_chunk_length;
           TSIOBufferReaderConsume(data->icap_resp_reader, pos + token_length - 
consumed);
           break;
@@ -367,8 +369,9 @@ handle_read_http_body(TSCont contp, TransformData *data)
         consumed += data_len;
         blk = TSIOBufferBlockNext(blk);
       }
-      if (blk == nullptr)
+      if (blk == nullptr) {
         return 0;
+      }
     }
 
     /* Write the chunk to downstream */
@@ -388,12 +391,12 @@ handle_read_http_body(TSCont contp, TransformData *data)
     /* If no more data is to be read for now. Check for eos to determine 
whether data is incomplete. */
     if (data->eos_detected) {
       TSVConnAbort(data->icap_vc, 1);
-      data->icap_vc  = NULL;
-      data->icap_vio = NULL;
+      data->icap_vc  = nullptr;
+      data->icap_vio = nullptr;
 
       TSVConnAbort(data->output_vc, 1);
-      data->output_vc  = NULL;
-      data->output_vio = NULL;
+      data->output_vc  = nullptr;
+      data->output_vio = nullptr;
       return 0;
     }
   }
@@ -420,12 +423,13 @@ transform_destroy(TSCont contp)
 {
   TransformData *data;
 
-  data = (TransformData *)TSContDataGet(contp);
+  data = static_cast<TransformData *>(TSContDataGet(contp));
 
-  if (data != NULL)
+  if (data != nullptr) {
     delete data;
-  else
+  } else {
     TSError("[%s] Unable to get Continuation's Data. TSContDataGet returns 
NULL", PLUGIN_NAME);
+  }
 
   TSContDestroy(contp);
 }
@@ -449,7 +453,7 @@ transform_connect(TSCont contp, TransformData *data)
     TSError("[%s] Invalid address: %s", PLUGIN_NAME, server_ip.c_str());
     return 0;
   }
-  action = TSNetConnect(contp, (struct sockaddr const *)&ip_addr);
+  action = TSNetConnect(contp, reinterpret_cast<struct sockaddr const 
*>(&ip_addr));
 
   if (!TSActionDone(action)) {
     data->pending_action = action;
@@ -478,7 +482,7 @@ transform_read_icap_header(TSCont contp, TransformData 
*data)
   data->icap_resp_buf    = TSIOBufferCreate();
   data->icap_resp_reader = TSIOBufferReaderAlloc(data->icap_resp_buf);
 
-  if (data->icap_resp_reader != NULL) {
+  if (data->icap_resp_reader != nullptr) {
     data->icap_vio = TSVConnRead(data->icap_vc, contp, data->icap_resp_buf, 
INT64_MAX);
   } else {
     TSError("[%s] Error in Allocating a Reader to output buffer. 
TSIOBufferReaderAlloc returns NULL", PLUGIN_NAME);
@@ -493,7 +497,7 @@ transform_read_http_header(TSCont contp, TransformData 
*data)
   data->state = State::READ_HTTP_HEADER;
 
   if (TSIOBufferReaderAvail(data->icap_resp_reader)) {
-    transform_read_http_header_event(contp, data, TS_EVENT_VCONN_READ_READY, 
NULL);
+    transform_read_http_header_event(contp, data, TS_EVENT_VCONN_READ_READY, 
nullptr);
   }
 
   return 0;
@@ -506,7 +510,7 @@ transform_read_http_body(TSCont contp, TransformData *data)
 
   data->output_buf    = TSIOBufferCreate();
   data->output_reader = TSIOBufferReaderAlloc(data->output_buf);
-  data->output_vc     = TSTransformOutputVConnGet((TSVConn)contp);
+  data->output_vc     = TSTransformOutputVConnGet(static_cast<TSVConn>(contp));
   // data->output_vio = TSVConnWrite(data->output_vc, contp, 
data->output_reader, INT64_MAX);
   if (data->icap_reply_content_length) {
     data->output_vio = TSVConnWrite(data->output_vc, contp, 
data->output_reader, data->icap_reply_content_length);
@@ -656,15 +660,15 @@ transform_send_error_msg(TSCont contp, TransformData 
*data)
   data->state         = State::SEND_ERROR_MSG;
   data->output_buf    = TSIOBufferCreate();
   data->output_reader = TSIOBufferReaderAlloc(data->output_buf);
-  data->output_vc     = TSTransformOutputVConnGet((TSVConn)contp);
+  data->output_vc     = TSTransformOutputVConnGet(static_cast<TSVConn>(contp));
 
   TSIOBufferWrite(data->output_buf, data->err_msg.c_str(), 
data->err_msg.size());
 
-  if (data->output_vc == NULL) {
+  if (data->output_vc == nullptr) {
     TSError("[%s] TSTransformOutputVConnGet returns NULL", PLUGIN_NAME);
   } else {
     data->output_vio = TSVConnWrite(data->output_vc, contp, 
data->output_reader, TSIOBufferReaderAvail(data->output_reader));
-    if (data->output_vio == NULL) {
+    if (data->output_vio == nullptr) {
       TSError("[%s] TSVConnWrite returns NULL", PLUGIN_NAME);
     }
   }
@@ -682,13 +686,13 @@ transform_bypass(TSCont contp, TransformData *data)
   data->state         = State::BYPASS;
   data->output_buf    = TSIOBufferCreate();
   data->output_reader = TSIOBufferReaderAlloc(data->output_buf);
-  data->output_vc     = TSTransformOutputVConnGet((TSVConn)contp);
+  data->output_vc     = TSTransformOutputVConnGet(static_cast<TSVConn>(contp));
 
-  if (data->output_vc == NULL) {
+  if (data->output_vc == nullptr) {
     TSError("[%s] TSTransformOutputVConnGet returns NULL", PLUGIN_NAME);
   } else {
     data->output_vio = TSVConnWrite(data->output_vc, contp, 
data->output_reader, 0);
-    if (data->output_vio == NULL) {
+    if (data->output_vio == nullptr) {
       TSError("[%s] TSVConnWrite returns NULL", PLUGIN_NAME);
     }
   }
@@ -727,13 +731,13 @@ transform_send_os_resp(TSCont contp, TransformData *data)
   data->state         = State::SEND_OS_RESP;
   data->output_buf    = TSIOBufferCreate();
   data->output_reader = TSIOBufferReaderAlloc(data->output_buf);
-  data->output_vc     = TSTransformOutputVConnGet((TSVConn)contp);
+  data->output_vc     = TSTransformOutputVConnGet(static_cast<TSVConn>(contp));
 
-  if (data->output_vc == NULL) {
+  if (data->output_vc == nullptr) {
     TSError("[%s] TSTransformOutputVConnGet returns NULL", PLUGIN_NAME);
   } else {
     data->output_vio = TSVConnWrite(data->output_vc, contp, 
data->os_resp_reader, TSIOBufferReaderAvail(data->os_resp_reader));
-    if (data->output_vio == NULL) {
+    if (data->output_vio == nullptr) {
       TSError("[%s] TSVConnWrite returns NULL", PLUGIN_NAME);
     }
   }
@@ -746,12 +750,12 @@ transform_connect_event(TSCont contp, TransformData 
*data, TSEvent event, void *
 {
   switch (event) {
   case TS_EVENT_NET_CONNECT:
-    data->pending_action = NULL;
-    data->icap_vc        = (TSVConn)edata;
+    data->pending_action = nullptr;
+    data->icap_vc        = static_cast<TSVConn>(edata);
     return handle_write_header(contp, data);
   case TS_EVENT_NET_CONNECT_FAILED:
     TSStatIntIncrement(icap_conn_failed, 1);
-    data->pending_action = NULL;
+    data->pending_action = nullptr;
     return handle_invalid_icap_behavior(contp, data, "Cannot connect to ICAP 
scanner.");
   default:
     break;
@@ -821,7 +825,7 @@ transform_read_icap_header_event(TSCont contp, 
TransformData *data, TSEvent even
 
     while (read_nbytes > 0) {
       TSIOBufferBlock blk = TSIOBufferReaderStart(reader);
-      char *buf           = (char *)TSIOBufferBlockReadStart(blk, reader, 
&avail);
+      char *buf           = const_cast<char *>(TSIOBufferBlockReadStart(blk, 
reader, &avail));
       int64_t read_ndone  = (avail >= read_nbytes) ? read_nbytes : avail;
       int64_t consume     = read_ndone;
       std::string chunk   = std::string(buf, read_ndone);
@@ -832,22 +836,24 @@ transform_read_icap_header_event(TSCont contp, 
TransformData *data, TSEvent even
       int64_t pos          = data->icap_header.find("\r\n\r\n");
       int64_t token_length = std::string("\r\n\r\n").size();
 
-      if (pos != (int64_t)std::string::npos) {
+      if (pos != static_cast<int64_t>(std::string::npos)) {
         data->icap_header.resize(pos);
         consume = pos + token_length - consumed;
         TSIOBufferReaderConsume(reader, consume);
-        if (handle_icap_headers(contp, data))
+        if (handle_icap_headers(contp, data)) {
           return transform_send_os_resp(contp, data);
-        else
+        } else {
           return transform_read_http_header(contp, data);
+        }
       }
 
       if (read_ndone > 0) {
         read_nbytes -= consume;
         TSIOBufferReaderConsume(reader, consume);
         consumed += consume;
-      } else
+      } else {
         break;
+      }
     }
     break;
   }
@@ -876,7 +882,7 @@ transform_read_http_header_event(TSCont contp, 
TransformData *data, TSEvent even
 
     while (read_nbytes > 0) {
       TSIOBufferBlock blk = TSIOBufferReaderStart(reader);
-      char *buf           = (char *)TSIOBufferBlockReadStart(blk, reader, 
&avail);
+      char *buf           = const_cast<char *>(TSIOBufferBlockReadStart(blk, 
reader, &avail));
       int64_t read_ndone  = (avail >= read_nbytes) ? read_nbytes : avail;
       int64_t consume     = read_ndone;
       std::string chunk   = std::string(buf, read_ndone);
@@ -886,7 +892,7 @@ transform_read_http_header_event(TSCont contp, 
TransformData *data, TSEvent even
       int64_t pos          = data->http_header.find("\r\n\r\n");
       int64_t token_length = std::string("\r\n").size();
 
-      if (pos != (int64_t)std::string::npos) {
+      if (pos != static_cast<int64_t>(std::string::npos)) {
         data->http_header.resize(pos);
         consume = pos + token_length - consumed;
         TSIOBufferReaderConsume(reader, consume);
@@ -898,8 +904,9 @@ transform_read_http_header_event(TSCont contp, 
TransformData *data, TSEvent even
         read_nbytes -= consume;
         TSIOBufferReaderConsume(reader, consume);
         consumed += consume;
-      } else
+      } else {
         break;
+      }
     }
 
     if (read_nbytes <= 0) {
@@ -920,12 +927,12 @@ transform_read_http_body_event(TSCont contp, 
TransformData *data, TSEvent event,
   switch (event) {
   case TS_EVENT_ERROR:
     TSVConnAbort(data->icap_vc, 1);
-    data->icap_vc  = NULL;
-    data->icap_vio = NULL;
+    data->icap_vc  = nullptr;
+    data->icap_vio = nullptr;
 
     TSVConnAbort(data->output_vc, 1);
-    data->output_vc  = NULL;
-    data->output_vio = NULL;
+    data->output_vc  = nullptr;
+    data->output_vio = nullptr;
     break;
   case TS_EVENT_VCONN_EOS:
     TSVConnShutdown(data->icap_vc, 1, 0);
@@ -1061,8 +1068,8 @@ transform_handler(TSCont contp, TSEvent event, void 
*edata)
   } else {
     TransformData *data;
 
-    data = (TransformData *)TSContDataGet(contp);
-    if (data == NULL) {
+    data = static_cast<TransformData *>(TSContDataGet(contp));
+    if (data == nullptr) {
       TSError("[%s] Didn't get Continuation's Data, ignoring event", 
PLUGIN_NAME);
       return 0;
     }
@@ -1159,7 +1166,7 @@ server_response_ok(TSHttpTxn txnp)
 static int
 transform_plugin(TSCont contp, TSEvent event, void *edata)
 {
-  TSHttpTxn txnp = (TSHttpTxn)edata;
+  TSHttpTxn txnp = static_cast<TSHttpTxn>(edata);
 
   switch (event) {
   case TS_EVENT_HTTP_READ_REQUEST_HDR:
@@ -1235,6 +1242,6 @@ TSPluginInit(int argc, const char *argv[])
   TSStatIntSet(icap_response_err, 0);
   TSStatIntSet(total_icap_invalid, 0);
 
-  cont = TSContCreate(transform_plugin, NULL);
+  cont = TSContCreate(transform_plugin, nullptr);
   TSHttpHookAdd(TS_HTTP_READ_REQUEST_HDR_HOOK, cont);
 }
diff --git a/plugins/experimental/maxmind_acl/mmdb.cc 
b/plugins/experimental/maxmind_acl/mmdb.cc
index 1634fe8..bc764a5 100644
--- a/plugins/experimental/maxmind_acl/mmdb.cc
+++ b/plugins/experimental/maxmind_acl/mmdb.cc
@@ -117,7 +117,7 @@ Acl::init(char const *filename)
 ///////////////////////////////////////////////////////////////////////////////
 // Parse the deny list country codes and IPs
 bool
-Acl::loaddeny(YAML::Node denyNode)
+Acl::loaddeny(const YAML::Node &denyNode)
 {
   if (!denyNode) {
     TSDebug(PLUGIN_NAME, "No Deny rules set");
@@ -197,7 +197,7 @@ Acl::loaddeny(YAML::Node denyNode)
 
 // Parse the allow list country codes and IPs
 bool
-Acl::loadallow(YAML::Node allowNode)
+Acl::loadallow(const YAML::Node &allowNode)
 {
   if (!allowNode) {
     TSDebug(PLUGIN_NAME, "No Allow rules set");
@@ -277,7 +277,7 @@ Acl::loadallow(YAML::Node allowNode)
 }
 
 void
-Acl::parseregex(YAML::Node regex, bool allow)
+Acl::parseregex(const YAML::Node &regex, bool allow)
 {
   try {
     if (!regex.IsNull()) {
@@ -321,7 +321,7 @@ Acl::parseregex(YAML::Node regex, bool allow)
 }
 
 void
-Acl::loadhtml(YAML::Node htmlNode)
+Acl::loadhtml(const YAML::Node &htmlNode)
 {
   std::string htmlname, htmlloc;
   std::ifstream f;
@@ -357,7 +357,7 @@ Acl::loadhtml(YAML::Node htmlNode)
 ///////////////////////////////////////////////////////////////////////////////
 // Load the maxmind database from the config parameter
 bool
-Acl::loaddb(YAML::Node dbNode)
+Acl::loaddb(const YAML::Node &dbNode)
 {
   std::string dbloc, dbname;
 
@@ -490,7 +490,7 @@ Acl::eval_country(MMDB_entry_data_s *entry_data, const char 
*path, int path_len)
 {
   bool ret     = false;
   bool allow   = default_allow;
-  char *output = NULL;
+  char *output = nullptr;
   output       = (char *)malloc((sizeof(char) * entry_data->data_size));
   strncpy(output, entry_data->utf8_string, entry_data->data_size);
   TSDebug(PLUGIN_NAME, "This IP Country Code: %s", output);
diff --git a/plugins/experimental/maxmind_acl/mmdb.h 
b/plugins/experimental/maxmind_acl/mmdb.h
index aa73c3b..93a1cac 100644
--- a/plugins/experimental/maxmind_acl/mmdb.h
+++ b/plugins/experimental/maxmind_acl/mmdb.h
@@ -98,11 +98,11 @@ protected:
   bool default_allow = false;
   bool db_loaded     = false;
 
-  bool loaddb(YAML::Node dbNode);
-  bool loadallow(YAML::Node allowNode);
-  bool loaddeny(YAML::Node denyNode);
-  void loadhtml(YAML::Node htmlNode);
+  bool loaddb(const YAML::Node &dbNode);
+  bool loadallow(const YAML::Node &allowNode);
+  bool loaddeny(const YAML::Node &denyNode);
+  void loadhtml(const YAML::Node &htmlNode);
   bool eval_country(MMDB_entry_data_s *entry_data, const char *path, int 
path_len);
-  void parseregex(YAML::Node regex, bool allow);
+  void parseregex(const YAML::Node regex, bool allow);
   ipstate eval_ip(const sockaddr *sock) const;
 };
diff --git a/plugins/experimental/memcache/tsmemcache.cc 
b/plugins/experimental/memcache/tsmemcache.cc
index 8e405d3..532c2bb 100644
--- a/plugins/experimental/memcache/tsmemcache.cc
+++ b/plugins/experimental/memcache/tsmemcache.cc
@@ -375,8 +375,9 @@ MC::write_binary_response(const void *d, int hlen, int 
keylen, int dlen)
     if (dlen) {
       MCDebug("tsmemcache", "response dlen %d\n", dlen);
       wbuf->write(d, dlen);
-    } else
+    } else {
       MCDebug("tsmemcache", "no response\n");
+    }
   }
   return writer->read_avail();
 }
diff --git a/plugins/experimental/memory_profile/memory_profile.cc 
b/plugins/experimental/memory_profile/memory_profile.cc
index 85a4c70..163f3dd 100644
--- a/plugins/experimental/memory_profile/memory_profile.cc
+++ b/plugins/experimental/memory_profile/memory_profile.cc
@@ -26,12 +26,12 @@
  *   System must be built with jemalloc to be useful
  */
 
-#include <stdio.h>
+#include <cstdio>
 #include <unistd.h>
-#include <inttypes.h>
+#include <cinttypes>
 #include <ts/ts.h>
-#include <string.h>
-#include <errno.h>
+#include <cstring>
+#include <cerrno>
 #include <tscore/ink_config.h>
 #if TS_HAS_JEMALLOC
 #include <jemalloc/jemalloc.h>
@@ -45,7 +45,7 @@ CallbackHandler(TSCont cont, TSEvent id, void *data)
   (void)cont; // make compiler shut up about unused variable.
 
   if (id == TS_EVENT_LIFECYCLE_MSG) {
-    TSPluginMsg *msg = (TSPluginMsg *)data;
+    TSPluginMsg *msg = static_cast<TSPluginMsg *>(data);
     TSDebug(PLUGIN_NAME, "Message to '%s' - %zu bytes of data", msg->tag, 
msg->data_size);
     if (strcmp(PLUGIN_NAME, msg->tag) == 0) { // Message is for us
 #if TS_HAS_JEMALLOC
@@ -96,7 +96,7 @@ TSPluginInit(int argc, const char *argv[])
     goto Lerror;
   }
 
-  cb = TSContCreate(CallbackHandler, NULL);
+  cb = TSContCreate(CallbackHandler, nullptr);
 
   TSLifecycleHookAdd(TS_LIFECYCLE_MSG_HOOK, cb);
 
diff --git a/plugins/experimental/metalink/metalink.cc 
b/plugins/experimental/metalink/metalink.cc
index fc97e14..9f7d201 100644
--- a/plugins/experimental/metalink/metalink.cc
+++ b/plugins/experimental/metalink/metalink.cc
@@ -44,19 +44,18 @@
 /* TSCacheWrite() and TSVConnWrite() data: Write the digest to the
  * cache and store the request URL at that key */
 
-typedef struct {
+struct WriteData {
   TSHttpTxn txnp;
 
   TSCacheKey key;
 
   TSVConn connp;
   TSIOBuffer cache_bufp;
-
-} WriteData;
+};
 
 /* TSTransformCreate() data: Compute the SHA-256 digest of the content */
 
-typedef struct {
+struct TransformData {
   TSHttpTxn txnp;
 
   /* Null transformation */
@@ -65,13 +64,12 @@ typedef struct {
 
   /* Message digest handle */
   SHA256_CTX c;
-
-} TransformData;
+};
 
 /* TSCacheRead() and TSVConnRead() data: Check the Location and Digest
  * headers */
 
-typedef struct {
+struct SendData {
   TSHttpTxn txnp;
 
   TSMBuffer resp_bufp;
@@ -95,8 +93,7 @@ typedef struct {
 
   const char *value;
   int64_t length;
-
-} SendData;
+};
 
 /* Implement TS_HTTP_READ_RESPONSE_HDR_HOOK to implement a null
  * transformation */
diff --git a/plugins/experimental/remap_stats/remap_stats.cc 
b/plugins/experimental/remap_stats/remap_stats.cc
index 31809bb..727c752 100644
--- a/plugins/experimental/remap_stats/remap_stats.cc
+++ b/plugins/experimental/remap_stats/remap_stats.cc
@@ -110,7 +110,7 @@ get_effective_host(TSHttpTxn txn)
 int
 handle_read_req_hdr(TSCont cont, TSEvent event ATS_UNUSED, void *edata)
 {
-  TSHttpTxn txn = (TSHttpTxn)edata;
+  TSHttpTxn txn = static_cast<TSHttpTxn>(edata);
   config_t *config;
   void *txnd;
 
diff --git a/plugins/experimental/slice/Config.cc 
b/plugins/experimental/slice/Config.cc
index 2ff6866..54df2f1 100644
--- a/plugins/experimental/slice/Config.cc
+++ b/plugins/experimental/slice/Config.cc
@@ -151,7 +151,7 @@ Config::fromArgs(int const argc, char const *const argv[])
       const char *errptr;
       int erroffset;
       m_regexstr = optarg;
-      m_regex    = pcre_compile(m_regexstr.c_str(), 0, &errptr, &erroffset, 
NULL);
+      m_regex    = pcre_compile(m_regexstr.c_str(), 0, &errptr, &erroffset, 
nullptr);
       if (nullptr == m_regex) {
         ERROR_LOG("Invalid regex: '%s'", m_regexstr.c_str());
       } else {
@@ -169,7 +169,7 @@ Config::fromArgs(int const argc, char const *const argv[])
       const char *errptr;
       int erroffset;
       m_regexstr = optarg;
-      m_regex    = pcre_compile(m_regexstr.c_str(), 0, &errptr, &erroffset, 
NULL);
+      m_regex    = pcre_compile(m_regexstr.c_str(), 0, &errptr, &erroffset, 
nullptr);
       if (nullptr == m_regex) {
         ERROR_LOG("Invalid regex: '%s'", m_regexstr.c_str());
       } else {
@@ -269,12 +269,12 @@ Config::matchesRegex(char const *const url, int const 
urllen) const
 
   switch (m_regex_type) {
   case Exclude: {
-    if (0 <= pcre_exec(m_regex, m_regex_extra, url, urllen, 0, 0, NULL, 0)) {
+    if (0 <= pcre_exec(m_regex, m_regex_extra, url, urllen, 0, 0, nullptr, 0)) 
{
       matches = false;
     }
   } break;
   case Include: {
-    if (pcre_exec(m_regex, m_regex_extra, url, urllen, 0, 0, NULL, 0) < 0) {
+    if (pcre_exec(m_regex, m_regex_extra, url, urllen, 0, 0, nullptr, 0) < 0) {
       matches = false;
     }
   } break;
diff --git a/plugins/experimental/slice/Range.cc 
b/plugins/experimental/slice/Range.cc
index c0dfb04..c8c4fa3 100644
--- a/plugins/experimental/slice/Range.cc
+++ b/plugins/experimental/slice/Range.cc
@@ -156,7 +156,7 @@ int64_t
 Range::lastBlockFor(int64_t const blocksize) const
 {
   if (0 < blocksize && isValid()) {
-    return std::max((int64_t)0, (m_end - 1) / blocksize);
+    return std::max(static_cast<int64_t>(0), (m_end - 1) / blocksize);
   } else {
     return -1;
   }
diff --git a/plugins/experimental/slice/server.cc 
b/plugins/experimental/slice/server.cc
index ac989c4..bdc37da 100644
--- a/plugins/experimental/slice/server.cc
+++ b/plugins/experimental/slice/server.cc
@@ -75,7 +75,7 @@ contentLengthFrom(HttpHeader const &header)
     // ensure null termination
     constr[conlen] = '\0';
     char *endptr   = nullptr;
-    bytes          = std::max((int64_t)0, (int64_t)strtoll(constr, &endptr, 
10));
+    bytes          = std::max(static_cast<int64_t>(0), 
static_cast<int64_t>(strtoll(constr, &endptr, 10)));
   }
 
   return bytes;
diff --git a/plugins/experimental/slice/slice.cc 
b/plugins/experimental/slice/slice.cc
index ff33650..dcb63b8 100644
--- a/plugins/experimental/slice/slice.cc
+++ b/plugins/experimental/slice/slice.cc
@@ -46,7 +46,7 @@ read_request(TSHttpTxn txnp, Config *const config)
     if (!header.hasKey(SLICER_MIME_FIELD_INFO, SLICER_MIME_LEN_INFO)) {
       // check if any previous plugin has monkeyed with the transaction status
       TSHttpStatus const txnstat = TSHttpTxnStatusGet(txnp);
-      if (0 != (int)txnstat) {
+      if (0 != static_cast<int>(txnstat)) {
         DEBUG_LOG("txn status change detected (%d), skipping plugin\n", 
(int)txnstat);
         return false;
       }
diff --git a/plugins/experimental/slice/util.cc 
b/plugins/experimental/slice/util.cc
index 80f0868..04516d4 100644
--- a/plugins/experimental/slice/util.cc
+++ b/plugins/experimental/slice/util.cc
@@ -86,7 +86,7 @@ request_block(TSCont contp, Data *const data)
   }
 
   // create virtual connection back into ATS
-  TSVConn const upvc = TSHttpConnectWithPluginId((sockaddr 
*)&data->m_client_ip, PLUGIN_NAME, 0);
+  TSVConn const upvc = TSHttpConnectWithPluginId(reinterpret_cast<sockaddr 
*>(&data->m_client_ip), PLUGIN_NAME, 0);
 
   int const hlen = TSHttpHdrLengthGet(header.m_buffer, header.m_lochdr);
 
diff --git a/plugins/experimental/ssl_session_reuse/src/publish.cc 
b/plugins/experimental/ssl_session_reuse/src/publish.cc
index 6aabf26..7c07a0a 100644
--- a/plugins/experimental/ssl_session_reuse/src/publish.cc
+++ b/plugins/experimental/ssl_session_reuse/src/publish.cc
@@ -35,7 +35,7 @@
 #include "Config.h"
 #include "redis_auth.h"
 #include "ssl_utils.h"
-#include <inttypes.h>
+#include <cinttypes>
 #include <condition_variable>
 
 std::mutex q_mutex;
@@ -93,8 +93,8 @@ RedisPublisher::RedisPublisher(const std::string &conf)
           m_redisPublishTries, m_redisConnectTries, m_redisRetryDelay, 
m_maxQueuedMessages);
 
   TSDebug(PLUGIN, "RedisPublisher::RedisPublisher: Redis Publish endpoints are 
as follows:");
-  for (std::vector<RedisEndpoint>::iterator it = m_redisEndpoints.begin(); it 
!= m_redisEndpoints.end(); ++it) {
-    simple_pool *pool = simple_pool::create(it->m_hostname, it->m_port, 
m_poolRedisConnectTimeout);
+  for (auto &m_redisEndpoint : m_redisEndpoints) {
+    simple_pool *pool = simple_pool::create(m_redisEndpoint.m_hostname, 
m_redisEndpoint.m_port, m_poolRedisConnectTimeout);
     pools.push_back(pool);
   }
 
@@ -125,7 +125,7 @@ RedisPublisher::setup_connection(const RedisEndpoint &re)
 {
   uint64_t my_id = 0;
   if (TSIsDebugTagSet(PLUGIN)) {
-    my_id = (uint64_t)pthread_self();
+    my_id = static_cast<uint64_t>(pthread_self());
     TSDebug(PLUGIN, "RedisPublisher::setup_connection: Called by threadId: %" 
PRIx64, my_id);
   }
 
@@ -175,7 +175,7 @@ RedisPublisher::send_publish(RedisContextPtr &ctx, const 
RedisEndpoint &re, cons
 {
   uint64_t my_id = 0;
   if (TSIsDebugTagSet(PLUGIN)) {
-    my_id = (uint64_t)pthread_self();
+    my_id = static_cast<uint64_t>(pthread_self());
     TSDebug(PLUGIN, "RedisPublisher::send_publish: Called by threadId: %" 
PRIx64, my_id);
   }
 
@@ -266,7 +266,7 @@ RedisPublisher::runWorker()
 
       if (current_message.cleanup) {
         if (TSIsDebugTagSet(PLUGIN)) {
-          auto my_id = (uint64_t)pthread_self();
+          auto my_id = static_cast<uint64_t>(pthread_self());
           TSDebug(PLUGIN, "RedisPublisher::runWorker: threadId: %" PRIx64 " 
received the cleanup message. Exiting!", my_id);
         }
         break;
@@ -360,7 +360,7 @@ std::string
 RedisPublisher::get_session(const std::string &channel)
 {
   if (TSIsDebugTagSet(PLUGIN)) {
-    auto my_id = (uint64_t)pthread_self();
+    auto my_id = static_cast<uint64_t>(pthread_self());
     TSDebug(PLUGIN, "RedisPublisher::get_session: Called by threadId: %" 
PRIx64, my_id);
   }
 
@@ -396,7 +396,7 @@ redisReply *
 RedisPublisher::set_session(const Message &msg)
 {
   if (TSIsDebugTagSet(PLUGIN)) {
-    auto my_id = (uint64_t)pthread_self();
+    auto my_id = static_cast<uint64_t>(pthread_self());
     TSDebug(PLUGIN, "RedisPublisher::set_session: Called by threadId: %" 
PRIx64, my_id);
   }
 
diff --git a/plugins/experimental/ssl_session_reuse/src/session_process.cc 
b/plugins/experimental/ssl_session_reuse/src/session_process.cc
index e14cef8..a40b33c 100644
--- a/plugins/experimental/ssl_session_reuse/src/session_process.cc
+++ b/plugins/experimental/ssl_session_reuse/src/session_process.cc
@@ -112,7 +112,7 @@ decrypt_session(const std::string &encrypted_data, const 
unsigned char *key, int
     ssl_sess_ptr += sizeof(int64_t);
 
     // Length
-    ret = *(int32_t *)ssl_sess_ptr;
+    ret = *reinterpret_cast<int32_t *>(ssl_sess_ptr);
     ssl_sess_ptr += sizeof(int32_t);
 
     len_all = ret + sizeof(int64_t) + sizeof(int32_t);
diff --git a/plugins/experimental/stream_editor/stream_editor.cc 
b/plugins/experimental/stream_editor/stream_editor.cc
index 7bcd272..0bd7d8a 100644
--- a/plugins/experimental/stream_editor/stream_editor.cc
+++ b/plugins/experimental/stream_editor/stream_editor.cc
@@ -617,8 +617,8 @@ process_block(contdata_t *contdata, TSIOBufferReader reader)
 
   editset_t edits;
 
-  for (rule_p r = contdata->rules.begin(); r != contdata->rules.end(); ++r) {
-    r->apply(buf, buflen, edits);
+  for (const auto &rule : contdata->rules) {
+    rule.apply(buf, buflen, edits);
   }
 
   for (edit_p p = edits.begin(); p != edits.end(); ++p) {
@@ -767,13 +767,13 @@ streamedit_setup(TSCont contp, TSEvent event, void *edata)
   assert((event == TS_EVENT_HTTP_READ_RESPONSE_HDR) || (event == 
TS_EVENT_HTTP_READ_REQUEST_HDR));
 
   /* make a new list comprising those rules that are in scope */
-  for (rule_p r = rules_in->begin(); r != rules_in->end(); ++r) {
-    if (r->in_scope(txn)) {
+  for (const auto &r : *rules_in) {
+    if (r.in_scope(txn)) {
       if (contdata == nullptr) {
         contdata = new contdata_t();
       }
-      contdata->rules.push_back(*r);
-      contdata->set_cont_size(r->cont_size());
+      contdata->rules.push_back(r);
+      contdata->set_cont_size(r.cont_size());
     }
   }
 
diff --git a/plugins/experimental/traffic_dump/session_data.cc 
b/plugins/experimental/traffic_dump/session_data.cc
index e496c59..de41e09 100644
--- a/plugins/experimental/traffic_dump/session_data.cc
+++ b/plugins/experimental/traffic_dump/session_data.cc
@@ -152,7 +152,7 @@ using get_tls_description_f = std::function<std::string()>;
  * @return The description of the protocol stack.
  */
 std::string
-get_protocol_stack_helper(get_protocol_stack_f get_protocol_stack, 
get_tls_description_f get_tls_node)
+get_protocol_stack_helper(const get_protocol_stack_f &get_protocol_stack, 
const get_tls_description_f &get_tls_node)
 {
   std::ostringstream protocol_description;
   protocol_description << R"("protocol":[)";
@@ -399,7 +399,7 @@ SessionData::global_session_handler(TSCont contp, TSEvent 
event, void *edata)
     if (!sni_filter.empty()) {
       TSVConn ssn_vc           = TSHttpSsnClientVConnGet(ssnp);
       TSSslConnection ssl_conn = TSVConnSslConnectionGet(ssn_vc);
-      SSL *ssl_obj             = (SSL *)ssl_conn;
+      SSL *ssl_obj             = reinterpret_cast<SSL *>(ssl_conn);
       if (ssl_obj == nullptr) {
         TSDebug(debug_tag, "global_session_handler(): Ignore non-HTTPS session 
%" PRId64 "...", id);
         break;
diff --git a/plugins/experimental/traffic_dump/transaction_data.cc 
b/plugins/experimental/traffic_dump/transaction_data.cc
index 20c5f12..51f6350 100644
--- a/plugins/experimental/traffic_dump/transaction_data.cc
+++ b/plugins/experimental/traffic_dump/transaction_data.cc
@@ -280,7 +280,7 @@ TransactionData::global_transaction_handler(TSCont contp, 
TSEvent event, void *e
     // The uuid is a header field for each message in the transaction. Use the
     // "all" node to apply to each message.
     std::string_view name = "uuid";
-    txnData->txn_json += ",\"all\":{\"headers\":{\"fields\":[" + 
json_entry_array(name, uuid_view);
+    txnData->txn_json += R"(,"all":{"headers":{"fields":[)" + 
json_entry_array(name, uuid_view);
     txnData->txn_json += "]}}";
     break;
   }
diff --git a/plugins/lua/ts_lua.c b/plugins/lua/ts_lua.c
index b5728e7..0e7468f 100644
--- a/plugins/lua/ts_lua.c
+++ b/plugins/lua/ts_lua.c
@@ -129,7 +129,7 @@ create_lua_vms()
       ts_lua_max_state_count = TS_LUA_MAX_STATE_COUNT;
     } else {
       ts_lua_max_state_count = (int)mgmt_state;
-      TSDebug(TS_LUA_DEBUG_TAG, "[%s] found %s: [%d]", __FUNCTION__, 
ts_lua_mgmt_state_str, (int)ts_lua_max_state_count);
+      TSDebug(TS_LUA_DEBUG_TAG, "[%s] found %s: [%d]", __FUNCTION__, 
ts_lua_mgmt_state_str, ts_lua_max_state_count);
     }
 
     if (ts_lua_max_state_count < 1) {
diff --git a/plugins/stats_over_http/stats_over_http.c 
b/plugins/stats_over_http/stats_over_http.c
index 1be2d54..9783e62 100644
--- a/plugins/stats_over_http/stats_over_http.c
+++ b/plugins/stats_over_http/stats_over_http.c
@@ -799,8 +799,9 @@ load_config_file(config_holder_t *config_holder)
       TSContScheduleOnPool(free_cont, FREE_TMOUT, TS_THREAD_POOL_TASK);
     }
   }
-  if (fh)
+  if (fh) {
     TSfclose(fh);
+  }
   return;
 }
 
diff --git a/proxy/ControlMatcher.cc b/proxy/ControlMatcher.cc
index ec94609..3ef5b52 100644
--- a/proxy/ControlMatcher.cc
+++ b/proxy/ControlMatcher.cc
@@ -664,10 +664,10 @@ void
 IpMatcher<Data, MatchResult>::Print() const
 {
   printf("\tIp Matcher with %d elements, %zu ranges.\n", num_el, 
ip_map.count());
-  for (IpMap::iterator spot(ip_map.begin()), limit(ip_map.end()); spot != 
limit; ++spot) {
+  for (auto &spot : ip_map) {
     char b1[INET6_ADDRSTRLEN], b2[INET6_ADDRSTRLEN];
-    printf("\tRange %s - %s ", ats_ip_ntop(spot->min(), b1, sizeof b1), 
ats_ip_ntop(spot->max(), b2, sizeof b2));
-    static_cast<Data *>(spot->data())->Print();
+    printf("\tRange %s - %s ", ats_ip_ntop(spot.min(), b1, sizeof b1), 
ats_ip_ntop(spot.max(), b2, sizeof b2));
+    static_cast<Data *>(spot.data())->Print();
   }
 }
 
diff --git a/proxy/ParentConsistentHash.cc b/proxy/ParentConsistentHash.cc
index f7977d7..568fba9 100644
--- a/proxy/ParentConsistentHash.cc
+++ b/proxy/ParentConsistentHash.cc
@@ -121,8 +121,9 @@ chash_lookup(ATSConsistentHash *fhash, uint64_t path_hash, 
ATSConsistentHashIter
   // Do not set wrap_around to true until we try all the parents atleast once.
   bool wrapped = *wrap_around;
   *wrap_around = (*mapWrapped && *wrap_around) ? true : false;
-  if (!*mapWrapped && wrapped)
+  if (!*mapWrapped && wrapped) {
     *mapWrapped = true;
+  }
   return prtmp;
 }
 
diff --git a/proxy/hdrs/MIME.cc b/proxy/hdrs/MIME.cc
index b9a4372..e0fb43c 100644
--- a/proxy/hdrs/MIME.cc
+++ b/proxy/hdrs/MIME.cc
@@ -630,8 +630,9 @@ mime_hdr_sanity_check(MIMEHdrImpl *mh)
         if (field->m_next_dup) {
           bool found = false;
           for (blk = &(mh->m_first_fblock); blk != nullptr; blk = blk->m_next) 
{
-            const char *addr = (const char *)(field->m_next_dup);
-            if ((addr >= (const char *)(blk)) && (addr < (const char *)(blk) + 
sizeof(MIMEFieldBlockImpl))) {
+            const char *addr = reinterpret_cast<const char 
*>(field->m_next_dup);
+            if ((addr >= reinterpret_cast<const char *>(blk)) &&
+                (addr < reinterpret_cast<const char *>(blk) + 
sizeof(MIMEFieldBlockImpl))) {
               found = true;
               break;
             }
@@ -1664,8 +1665,8 @@ mime_hdr_field_delete(HdrHeap *heap, MIMEHdrImpl *mh, 
MIMEField *field, bool del
       if (prev_block != nullptr) {
         if (fblock->m_freetop == MIME_FIELD_BLOCK_SLOTS && 
fblock->contains(field)) {
           // Check if fields in all slots are deleted
-          for (int i = 0; i < MIME_FIELD_BLOCK_SLOTS; ++i) {
-            if (fblock->m_field_slots[i].m_readiness != 
MIME_FIELD_SLOT_READINESS_DELETED) {
+          for (auto &m_field_slot : fblock->m_field_slots) {
+            if (m_field_slot.m_readiness != MIME_FIELD_SLOT_READINESS_DELETED) 
{
               can_destroy_block = false;
               break;
             }
diff --git a/proxy/http/Http1Transaction.cc b/proxy/http/Http1Transaction.cc
index 5d07691..d2f8b2c 100644
--- a/proxy/http/Http1Transaction.cc
+++ b/proxy/http/Http1Transaction.cc
@@ -117,20 +117,23 @@ Http1Transaction::do_io_shutdown(ShutdownHowTo_t howto)
 void
 Http1Transaction::set_active_timeout(ink_hrtime timeout_in)
 {
-  if (_proxy_ssn)
+  if (_proxy_ssn) {
     _proxy_ssn->set_active_timeout(timeout_in);
+  }
 }
 void
 Http1Transaction::set_inactivity_timeout(ink_hrtime timeout_in)
 {
-  if (_proxy_ssn)
+  if (_proxy_ssn) {
     _proxy_ssn->set_inactivity_timeout(timeout_in);
+  }
 }
 void
 Http1Transaction::cancel_inactivity_timeout()
 {
-  if (_proxy_ssn)
+  if (_proxy_ssn) {
     _proxy_ssn->cancel_inactivity_timeout();
+  }
 }
 //
 int
diff --git a/proxy/http/remap/NextHopConsistentHash.cc 
b/proxy/http/remap/NextHopConsistentHash.cc
index 4951fe0..c14c971 100644
--- a/proxy/http/remap/NextHopConsistentHash.cc
+++ b/proxy/http/remap/NextHopConsistentHash.cc
@@ -36,7 +36,7 @@ constexpr std::string_view hash_key_path_fragment = 
"path+fragment";
 constexpr std::string_view hash_key_cache         = "cache_key";
 
 static HostRecord *
-chash_lookup(std::shared_ptr<ATSConsistentHash> ring, uint64_t hash_key, 
ATSConsistentHashIter *iter, bool *wrapped,
+chash_lookup(const std::shared_ptr<ATSConsistentHash> &ring, uint64_t 
hash_key, ATSConsistentHashIter *iter, bool *wrapped,
              ATSHash64Sip24 *hash, bool *hash_init, bool *mapWrapped, uint64_t 
sm_id)
 {
   HostRecord *host_rec = nullptr;
diff --git a/proxy/http/remap/NextHopHealthStatus.cc 
b/proxy/http/remap/NextHopHealthStatus.cc
index 4ae6580..afb43c7 100644
--- a/proxy/http/remap/NextHopHealthStatus.cc
+++ b/proxy/http/remap/NextHopHealthStatus.cc
@@ -30,8 +30,7 @@
 void
 NextHopHealthStatus::insert(std::vector<std::shared_ptr<HostRecord>> &hosts)
 {
-  for (uint32_t ii = 0; ii < hosts.size(); ii++) {
-    std::shared_ptr<HostRecord> h = hosts[ii];
+  for (auto h : hosts) {
     for (auto protocol = h->protocols.begin(); protocol != h->protocols.end(); 
++protocol) {
       const std::string host_port = h->getHostPort((*protocol)->port);
       host_map.emplace(std::make_pair(host_port, h));
diff --git a/proxy/http/remap/NextHopSelectionStrategy.cc 
b/proxy/http/remap/NextHopSelectionStrategy.cc
index 0b0f766..e589c3e 100644
--- a/proxy/http/remap/NextHopSelectionStrategy.cc
+++ b/proxy/http/remap/NextHopSelectionStrategy.cc
@@ -108,8 +108,8 @@ NextHopSelectionStrategy::Init(const YAML::Node &n)
           NH_Error("Error in the response_codes definition for the strategy 
named '%s', skipping response_codes.",
                    strategy_name.c_str());
         } else {
-          for (unsigned int k = 0; k < resp_codes_node.size(); ++k) {
-            auto code = resp_codes_node[k].as<int>();
+          for (auto &&k : resp_codes_node) {
+            auto code = k.as<int>();
             if (code > 300 && code < 599) {
               resp_codes.add(code);
             } else {
@@ -208,8 +208,8 @@ NextHopSelectionStrategy::nextHopExists(TSHttpTxn txnp, 
void *ih)
   int64_t sm_id = sm->sm_id;
 
   for (uint32_t gg = 0; gg < groups; gg++) {
-    for (uint32_t hh = 0; hh < host_groups[gg].size(); hh++) {
-      HostRecord *p = host_groups[gg][hh].get();
+    for (auto &hh : host_groups[gg]) {
+      HostRecord *p = hh.get();
       if (p->available) {
         NH_Debug(NH_DEBUG_TAG, "[%" PRIu64 "] found available next hop %s", 
sm_id, p->hostname.c_str());
         return true;
@@ -262,9 +262,9 @@ template <> struct convert<HostRecord> {
     if (proto.Type() != YAML::NodeType::Sequence) {
       throw std::invalid_argument("Invalid host protocol definition, expected 
a sequence.");
     } else {
-      for (unsigned int ii = 0; ii < proto.size(); ii++) {
-        YAML::Node protocol_node       = proto[ii];
-        std::shared_ptr<NHProtocol> pr = 
std::make_shared<NHProtocol>(protocol_node.as<NHProtocol>());
+      for (auto &&ii : proto) {
+        const YAML::Node &protocol_node = ii;
+        std::shared_ptr<NHProtocol> pr  = 
std::make_shared<NHProtocol>(protocol_node.as<NHProtocol>());
         nh.protocols.push_back(std::move(pr));
       }
     }
diff --git a/proxy/http/remap/NextHopStrategyFactory.cc 
b/proxy/http/remap/NextHopStrategyFactory.cc
index 1bfc9ec..4de0b8a 100644
--- a/proxy/http/remap/NextHopStrategyFactory.cc
+++ b/proxy/http/remap/NextHopStrategyFactory.cc
@@ -24,7 +24,7 @@
 #include <yaml-cpp/yaml.h>
 
 #include <fstream>
-#include <string.h>
+#include <cstring>
 
 #include "NextHopStrategyFactory.h"
 #include "NextHopConsistentHash.h"
@@ -65,15 +65,15 @@ NextHopStrategyFactory::NextHopStrategyFactory(const char 
*file)
       }
     }
     // loop through the strategies document.
-    for (unsigned int i = 0; i < strategies.size(); ++i) {
-      YAML::Node strategy = strategies[i];
+    for (auto &&strategie : strategies) {
+      YAML::Node strategy = strategie;
       auto name           = strategy["strategy"].as<std::string>();
       auto policy         = strategy["policy"];
       if (!policy) {
         NH_Error("No policy is defined for the strategy named '%s', this 
strategy will be ignored.", name.c_str());
         continue;
       }
-      auto policy_value        = policy.Scalar();
+      const auto &policy_value = policy.Scalar();
       NHPolicyType policy_type = NH_UNDEFINED;
 
       if (policy_value == consistent_hash) {
@@ -175,7 +175,7 @@ NextHopStrategyFactory::strategyInstance(const char *name)
  * 'strategy' yaml file would then normally have the '#include hosts.yml' in 
it's begining.
  */
 void
-NextHopStrategyFactory::loadConfigFile(const std::string fileName, 
std::stringstream &doc,
+NextHopStrategyFactory::loadConfigFile(const std::string &fileName, 
std::stringstream &doc,
                                        std::unordered_set<std::string> 
&include_once)
 {
   const char *sep = " \t";
@@ -214,8 +214,8 @@ NextHopStrategyFactory::loadConfigFile(const std::string 
fileName, std::stringst
       std::sort(files.begin(), files.end(),
                 [](const std::string_view lhs, const std::string_view rhs) { 
return lhs.compare(rhs) < 0; });
 
-      for (uint32_t i = 0; i < files.size(); i++) {
-        std::ifstream file(fileName + "/" + files[i].data());
+      for (auto &i : files) {
+        std::ifstream file(fileName + "/" + i.data());
         if (file.is_open()) {
           while (std::getline(file, line)) {
             if (line[0] == '#') {
@@ -225,7 +225,7 @@ NextHopStrategyFactory::loadConfigFile(const std::string 
fileName, std::stringst
           }
           file.close();
         } else {
-          throw std::invalid_argument("Unable to open and read '" + fileName + 
"/" + files[i].data() + "'");
+          throw std::invalid_argument("Unable to open and read '" + fileName + 
"/" + i.data() + "'");
         }
       }
     }
diff --git a/proxy/http/remap/NextHopStrategyFactory.h 
b/proxy/http/remap/NextHopStrategyFactory.h
index 3ef5cdc..ecb25a8 100644
--- a/proxy/http/remap/NextHopStrategyFactory.h
+++ b/proxy/http/remap/NextHopStrategyFactory.h
@@ -48,7 +48,7 @@ public:
 
 private:
   std::string fn;
-  void loadConfigFile(const std::string file, std::stringstream &doc, 
std::unordered_set<std::string> &include_once);
+  void loadConfigFile(const std::string &file, std::stringstream &doc, 
std::unordered_set<std::string> &include_once);
   void createStrategy(const std::string &name, const NHPolicyType policy_type, 
const YAML::Node &node);
   std::unordered_map<std::string, std::shared_ptr<NextHopSelectionStrategy>> 
_strategies;
 };
diff --git a/proxy/logging/Log.cc b/proxy/logging/Log.cc
index 33da376..fe4afa3 100644
--- a/proxy/logging/Log.cc
+++ b/proxy/logging/Log.cc
@@ -943,7 +943,7 @@ Log::init_fields()
   field_symbol_hash.emplace("ppdip", field);
 
   field = new LogField("version_build_number", "vbn", LogField::STRING, 
&LogAccess::marshal_version_build_number,
-                       (LogField::UnmarshalFunc)&LogAccess::unmarshal_str);
+                       
reinterpret_cast<LogField::UnmarshalFunc>(&LogAccess::unmarshal_str));
   global_field_list.add(field, false);
   field_symbol_hash.emplace("vbn", field);
 
diff --git a/proxy/logging/LogAccess.cc b/proxy/logging/LogAccess.cc
index 6aeae95..a394c08 100644
--- a/proxy/logging/LogAccess.cc
+++ b/proxy/logging/LogAccess.cc
@@ -354,7 +354,7 @@ LogAccess::marshal_str(char *dest, const char *source, int 
padded_len)
   // bytes to avoid UMR errors when the buffer is written.
   //
   size_t real_len = (::strlen(source) + 1);
-  while ((int)real_len < padded_len) {
+  while (static_cast<int>(real_len) < padded_len) {
     dest[real_len] = '$';
     real_len++;
   }
diff --git a/proxy/logging/LogFile.cc b/proxy/logging/LogFile.cc
index 26fcca6..89bdc80 100644
--- a/proxy/logging/LogFile.cc
+++ b/proxy/logging/LogFile.cc
@@ -197,7 +197,7 @@ LogFile::open_file()
 #ifdef F_GETPIPE_SZ
     // adjust pipe size if necessary
     if (m_pipe_buffer_size) {
-      long pipe_size = (long)fcntl(m_fd, F_GETPIPE_SZ);
+      long pipe_size = static_cast<long>(fcntl(m_fd, F_GETPIPE_SZ));
       if (pipe_size == -1) {
         Error("Get pipe size failed for pipe %s: %s", m_name, strerror(errno));
       } else {
@@ -209,7 +209,7 @@ LogFile::open_file()
         Error("Set pipe size failed for pipe %s to size %d: %s", m_name, 
m_pipe_buffer_size, strerror(errno));
       }
 
-      pipe_size = (long)fcntl(m_fd, F_GETPIPE_SZ);
+      pipe_size = static_cast<long>(fcntl(m_fd, F_GETPIPE_SZ));
       if (pipe_size == -1) {
         Error("Get pipe size after setting it failed for pipe %s: %s", m_name, 
strerror(errno));
       } else {
diff --git a/src/traffic_logstats/logstats.cc b/src/traffic_logstats/logstats.cc
index 53be58e..c581e1f 100644
--- a/src/traffic_logstats/logstats.cc
+++ b/src/traffic_logstats/logstats.cc
@@ -336,10 +336,10 @@ struct hash_fnv32 {
   }
 };
 
-using LruStack = std::list<UrlStats>;
-typedef std::unordered_map<const char *, OriginStats *, hash_fnv32, eqstr> 
OriginStorage;
-typedef std::unordered_set<const char *, hash_fnv32, eqstr> OriginSet;
-typedef std::unordered_map<const char *, LruStack::iterator, hash_fnv32, 
eqstr> LruHash;
+using LruStack      = std::list<UrlStats>;
+using OriginStorage = std::unordered_map<const char *, OriginStats *, 
hash_fnv32, eqstr>;
+using OriginSet     = std::unordered_set<const char *, hash_fnv32, eqstr>;
+using LruHash       = std::unordered_map<const char *, LruStack::iterator, 
hash_fnv32, eqstr>;
 
 // Resize a hash-based container.
 template <class T, class N>
@@ -1998,7 +1998,7 @@ format_line(const char *desc, const StatsCounter &stat, 
const StatsCounter &tota
 }
 
 // Little "helpers" for the vector we use to sort the Origins.
-typedef pair<const char *, OriginStats *> OriginPair;
+using OriginPair = pair<const char *, OriginStats *>;
 inline bool
 operator<(const OriginPair &a, const OriginPair &b)
 {
diff --git a/src/traffic_server/FetchSM.cc b/src/traffic_server/FetchSM.cc
index 0cb2919..aa73597 100644
--- a/src/traffic_server/FetchSM.cc
+++ b/src/traffic_server/FetchSM.cc
@@ -389,7 +389,7 @@ FetchSM::get_info_from_buffer(IOBufferReader *reader)
 
   if (header_done == 0 && read_done > 0) {
     int bytes_used = 0;
-    header_done    = 1;
+    header_done    = true;
     if (client_response_hdr.parse_resp(&http_parser, reader, &bytes_used, 0) 
== PARSE_RESULT_DONE) {
       if ((bytes_used > 0) && (bytes_used <= read_avail)) {
         memcpy(info, buf, bytes_used);
diff --git a/src/traffic_server/InkAPITest.cc b/src/traffic_server/InkAPITest.cc
index 1b0bad1..2b13745 100644
--- a/src/traffic_server/InkAPITest.cc
+++ b/src/traffic_server/InkAPITest.cc
@@ -90,7 +90,7 @@
 using TxnHandler = int (*)(TSCont, TSEvent, void *);
 
 /* Server transaction structure */
-typedef struct {
+struct ServerTxn {
   TSVConn vconn;
 
   TSVIO read_vio;
@@ -106,24 +106,24 @@ typedef struct {
 
   TxnHandler current_handler;
   unsigned int magic;
-} ServerTxn;
+};
 
 /* Server structure */
-typedef struct {
+struct SocketServer {
   int accept_port;
   TSAction accept_action;
   TSCont accept_cont;
   unsigned int magic;
-} SocketServer;
+};
 
-typedef enum {
+enum RequestStatus {
   REQUEST_SUCCESS,
   REQUEST_INPROGRESS,
   REQUEST_FAILURE,
-} RequestStatus;
+};
 
 /* Client structure */
-typedef struct {
+struct ClientTxn {
   TSVConn vconn;
 
   TSVIO read_vio;
@@ -148,7 +148,7 @@ typedef struct {
   TxnHandler current_handler;
 
   unsigned int magic;
-} ClientTxn;
+};
 
 //////////////////////////////////////////////////////////////////////////////
 // DECLARATIONS
@@ -1597,7 +1597,7 @@ int *SDK_Cache_pstatus;
 static char content[OBJECT_SIZE];
 static int read_counter = 0;
 
-typedef struct {
+struct CacheVConnStruct {
   TSIOBuffer bufp;
   TSIOBuffer out_bufp;
   TSIOBufferReader readerp;
@@ -1609,7 +1609,7 @@ typedef struct {
   TSVIO write_vio;
 
   TSCacheKey key;
-} CacheVConnStruct;
+};
 
 int
 cache_handler(TSCont contp, TSEvent event, void *data)
@@ -2527,10 +2527,10 @@ static RegressionTest *SDK_ContData_test;
 static int *SDK_ContData_pstatus;
 
 // this is specific for this test
-typedef struct {
+struct MyData {
   int data1;
   int data2;
-} MyData;
+};
 
 int
 cont_data_handler(TSCont contp, TSEvent /* event ATS_UNUSED */, void * /* 
edata ATS_UNUSED */)
@@ -3038,7 +3038,7 @@ REGRESSION_TEST(SDK_API_TSContSchedule)(RegressionTest 
*test, int /* atype ATS_U
 
 #define HTTP_HOOK_TEST_REQUEST_ID 1
 
-typedef struct {
+struct SocketTest {
   RegressionTest *regtest;
   int *pstatus;
   SocketServer *os;
@@ -3058,7 +3058,7 @@ typedef struct {
   bool test_client_protocol_stack_contains;
 
   unsigned int magic;
-} SocketTest;
+};
 
 // This func is called by us from mytest_handler to test TSHttpTxnClientIPGet
 static int
@@ -6292,13 +6292,13 @@ REGRESSION_TEST(SDK_API_TSUrlParse)(RegressionTest 
*test, int /* atype ATS_UNUSE
 //////////////////////////////////////////////
 #define LOG_TEST_PATTERN "SDK team rocks"
 
-typedef struct {
+struct LogTestData {
   RegressionTest *test;
   int *pstatus;
   char *fullpath_logname;
   unsigned long magic;
   TSTextLogObject log;
-} LogTestData;
+};
 
 static int
 log_test_handler(TSCont contp, TSEvent event, void * /* edata ATS_UNUSED */)
@@ -6527,19 +6527,19 @@ REGRESSION_TEST(SDK_API_TSMgmtGet)(RegressionTest 
*test, int /* atype ATS_UNUSED
     }                                                                          
                                        \
   }
 
-typedef enum {
+enum ORIG_TSParseResult {
   ORIG_TS_PARSE_ERROR = -1,
   ORIG_TS_PARSE_DONE  = 0,
   ORIG_TS_PARSE_CONT  = 1,
-} ORIG_TSParseResult;
+};
 
-typedef enum {
+enum ORIG_TSHttpType {
   ORIG_TS_HTTP_TYPE_UNKNOWN,
   ORIG_TS_HTTP_TYPE_REQUEST,
   ORIG_TS_HTTP_TYPE_RESPONSE,
-} ORIG_TSHttpType;
+};
 
-typedef enum {
+enum ORIG_TSHttpStatus {
   ORIG_TS_HTTP_STATUS_NONE = 0,
 
   ORIG_TS_HTTP_STATUS_CONTINUE           = 100,
@@ -6584,9 +6584,9 @@ typedef enum {
   ORIG_TS_HTTP_STATUS_SERVICE_UNAVAILABLE   = 503,
   ORIG_TS_HTTP_STATUS_GATEWAY_TIMEOUT       = 504,
   ORIG_TS_HTTP_STATUS_HTTPVER_NOT_SUPPORTED = 505
-} ORIG_TSHttpStatus;
+};
 
-typedef enum {
+enum ORIG_TSHttpHookID {
   ORIG_TS_HTTP_READ_REQUEST_HDR_HOOK,
   ORIG_TS_HTTP_OS_DNS_HOOK,
   ORIG_TS_HTTP_SEND_REQUEST_HDR_HOOK,
@@ -6618,9 +6618,9 @@ typedef enum {
   ORIG_TS_SSL_LAST_HOOK = ORIG_TS_VCONN_OUTBOUND_CLOSE_HOOK,
   ORIG_TS_HTTP_REQUEST_BUFFER_READ_COMPLETE_HOOK,
   ORIG_TS_HTTP_LAST_HOOK
-} ORIG_TSHttpHookID;
+};
 
-typedef enum {
+enum ORIG_TSEvent {
   ORIG_TS_EVENT_NONE      = 0,
   ORIG_TS_EVENT_IMMEDIATE = 1,
   ORIG_TS_EVENT_TIMEOUT   = 2,
@@ -6671,44 +6671,44 @@ typedef enum {
   ORIG_TS_EVENT_HTTP_CACHE_LOOKUP_COMPLETE = 60015,
 
   ORIG_TS_EVENT_MGMT_UPDATE = 60300
-} ORIG_TSEvent;
+};
 
-typedef enum {
+enum ORIG_TSCacheLookupResult {
   ORIG_TS_CACHE_LOOKUP_MISS,
   ORIG_TS_CACHE_LOOKUP_HIT_STALE,
   ORIG_TS_CACHE_LOOKUP_HIT_FRESH,
-} ORIG_TSCacheLookupResult;
+};
 
-typedef enum {
+enum ORIG_TSCacheDataType {
   ORIG_TS_CACHE_DATA_TYPE_NONE,
   ORIG_TS_CACHE_DATA_TYPE_HTTP,
   ORIG_TS_CACHE_DATA_TYPE_OTHER,
-} ORIG_TSCacheDataType;
+};
 
-typedef enum {
+enum ORIG_TSCacheError {
   ORIG_TS_CACHE_ERROR_NO_DOC    = -20400,
   ORIG_TS_CACHE_ERROR_DOC_BUSY  = -20401,
   ORIG_TS_CACHE_ERROR_NOT_READY = -20407
-} ORIG_TSCacheError;
+};
 
-typedef enum {
+enum ORIG_TSCacheScanResult {
   ORIG_TS_CACHE_SCAN_RESULT_DONE     = 0,
   ORIG_TS_CACHE_SCAN_RESULT_CONTINUE = 1,
   ORIG_TS_CACHE_SCAN_RESULT_DELETE   = 10,
   ORIG_TS_CACHE_SCAN_RESULT_DELETE_ALL_ALTERNATES,
   ORIG_TS_CACHE_SCAN_RESULT_UPDATE,
   ORIG_TS_CACHE_SCAN_RESULT_RETRY
-} ORIG_TSCacheScanResult;
+};
 
-typedef enum {
+enum ORIG_TSVConnCloseFlags {
   ORIG_TS_VC_CLOSE_ABORT  = -1,
   ORIG_TS_VC_CLOSE_NORMAL = 1,
-} ORIG_TSVConnCloseFlags;
+};
 
-typedef enum {
+enum ORIG_TSReturnCode {
   ORIG_TS_ERROR   = -1,
   ORIG_TS_SUCCESS = 0,
-} ORIG_TSReturnCode;
+};
 
 REGRESSION_TEST(SDK_API_TSConstant)(RegressionTest *test, int /* atype 
ATS_UNUSED */, int *pstatus)
 {
@@ -6868,7 +6868,7 @@ REGRESSION_TEST(SDK_API_TSConstant)(RegressionTest *test, 
int /* atype ATS_UNUSE
 //                    TSHttpTxnParentProxySet
 //////////////////////////////////////////////
 
-typedef struct {
+struct ContData {
   RegressionTest *test;
   int *pstatus;
   SocketServer *os;
@@ -6881,7 +6881,7 @@ typedef struct {
   int test_passed_txn_error_body_set;
   bool test_passed_Parent_Proxy;
   int magic;
-} ContData;
+};
 
 static int
 checkHttpTxnParentProxy(ContData *data, TSHttpTxn txnp)
@@ -7347,7 +7347,7 @@ 
EXCLUSIVE_REGRESSION_TEST(SDK_API_HttpParentProxySet_Success)(RegressionTest *te
 //                    TSHttpTxnCacheLookupStatusGet
 /////////////////////////////////////////////////////
 
-typedef struct {
+struct CacheTestData {
   RegressionTest *test;
   int *pstatus;
   SocketServer *os;
@@ -7359,7 +7359,7 @@ typedef struct {
   bool test_passed_txn_cache_lookup_status;
   bool first_time;
   int magic;
-} CacheTestData;
+};
 
 static int
 cache_hook_handler(TSCont contp, TSEvent event, void *edata)
@@ -7566,7 +7566,7 @@ 
EXCLUSIVE_REGRESSION_TEST(SDK_API_HttpTxnCache)(RegressionTest *test, int /* aty
 
 /** Append Transform Data Structure Ends **/
 
-typedef struct {
+struct TransformTestData {
   RegressionTest *test;
   int *pstatus;
   SocketServer *os;
@@ -7582,7 +7582,7 @@ typedef struct {
   bool test_passed_transform_create;
   int req_no;
   uint32_t magic;
-} TransformTestData;
+};
 
 /** Append Transform Data Structure **/
 struct AppendTransformTestData {
@@ -8101,7 +8101,7 @@ 
EXCLUSIVE_REGRESSION_TEST(SDK_API_HttpTxnTransform)(RegressionTest *test, int /*
 //                    TSHttpTxnCachedRespGet
 //////////////////////////////////////////////
 
-typedef struct {
+struct AltInfoTestData {
   RegressionTest *test;
   int *pstatus;
   SocketServer *os;
@@ -8118,7 +8118,7 @@ typedef struct {
   bool run_at_least_once;
   bool first_time;
   int magic;
-} AltInfoTestData;
+};
 
 static int
 altinfo_hook_handler(TSCont contp, TSEvent event, void *edata)
@@ -8336,7 +8336,7 @@ 
EXCLUSIVE_REGRESSION_TEST(SDK_API_HttpAltInfo)(RegressionTest *test, int /* atyp
 #define TEST_CASE_CONNECT_ID1 9  // TSHttpTxnIntercept
 #define TEST_CASE_CONNECT_ID2 10 // TSHttpTxnServerIntercept
 
-typedef struct {
+struct ConnectTestData {
   RegressionTest *test;
   int *pstatus;
   int test_case;
@@ -8345,7 +8345,7 @@ typedef struct {
   ClientTxn *browser;
   char *request;
   unsigned long magic;
-} ConnectTestData;
+};
 
 static int
 cont_test_handler(TSCont contp, TSEvent event, void *edata)
diff --git a/src/tscore/ink_inet.cc b/src/tscore/ink_inet.cc
index 5ba9bc3..9d1dff7 100644
--- a/src/tscore/ink_inet.cc
+++ b/src/tscore/ink_inet.cc
@@ -64,7 +64,7 @@ ink_inet_addr(const char *s)
   uint32_t base = 10;
 
   if (nullptr == s) {
-    return htonl((uint32_t)-1);
+    return htonl(static_cast<uint32_t>(-1));
   }
 
   while (n < 4) {
@@ -103,7 +103,7 @@ ink_inet_addr(const char *s)
   }
 
   if (*pc && !ParseRules::is_wslfcr(*pc)) {
-    return htonl((uint32_t)-1);
+    return htonl(static_cast<uint32_t>(-1));
   }
 
   switch (n) {
@@ -111,21 +111,21 @@ ink_inet_addr(const char *s)
     return htonl(u[0]);
   case 2:
     if (u[0] > 0xff || u[1] > 0xffffff) {
-      return htonl((uint32_t)-1);
+      return htonl(static_cast<uint32_t>(-1));
     }
     return htonl((u[0] << 24) | u[1]);
   case 3:
     if (u[0] > 0xff || u[1] > 0xff || u[2] > 0xffff) {
-      return htonl((uint32_t)-1);
+      return htonl(static_cast<uint32_t>(-1));
     }
     return htonl((u[0] << 24) | (u[1] << 16) | u[2]);
   case 4:
     if (u[0] > 0xff || u[1] > 0xff || u[2] > 0xff || u[3] > 0xff) {
-      return htonl((uint32_t)-1);
+      return htonl(static_cast<uint32_t>(-1));
     }
     return htonl((u[0] << 24) | (u[1] << 16) | (u[2] << 8) | u[3]);
   }
-  return htonl((uint32_t)-1);
+  return htonl(static_cast<uint32_t>(-1));
 }
 
 const char *
diff --git a/src/tscore/ink_queue.cc b/src/tscore/ink_queue.cc
index 22f3b32..f4a2841 100644
--- a/src/tscore/ink_queue.cc
+++ b/src/tscore/ink_queue.cc
@@ -227,9 +227,10 @@ freelist_new(InkFreeList *f)
       for (i = 0; i < f->chunk_size; i++) {
         char *a = (static_cast<char *>(FREELIST_POINTER(item))) + i * 
f->type_size;
 #ifdef DEADBEEF
-        const char str[4] = {(char)0xde, (char)0xad, (char)0xbe, (char)0xef};
-        for (int j = 0; j < (int)f->type_size; j++)
+        const char str[4] = {static_cast<char>(0xde), static_cast<char>(0xad), 
static_cast<char>(0xbe), static_cast<char>(0xef)};
+        for (int j = 0; j < static_cast<int>(f->type_size); j++) {
           a[j] = str[j % 4];
+        }
 #endif
         freelist_free(f, a);
       }
@@ -240,12 +241,15 @@ freelist_new(InkFreeList *f)
 
 #ifdef SANITY
       if (result) {
-        if (FREELIST_POINTER(item) == TO_PTR(FREELIST_POINTER(next)))
+        if (FREELIST_POINTER(item) == TO_PTR(FREELIST_POINTER(next))) {
           ink_abort("ink_freelist_new: loop detected");
-        if (((uintptr_t)(TO_PTR(FREELIST_POINTER(next)))) & 3)
+        }
+        if (((uintptr_t)(TO_PTR(FREELIST_POINTER(next)))) & 3) {
           ink_abort("ink_freelist_new: bad list");
-        if (TO_PTR(FREELIST_POINTER(next)))
-          fake_global_for_ink_queue = *(int *)TO_PTR(FREELIST_POINTER(next));
+        }
+        if (TO_PTR(FREELIST_POINTER(next))) {
+          fake_global_for_ink_queue = *static_cast<int 
*>(TO_PTR(FREELIST_POINTER(next)));
+        }
       }
 #endif /* SANITY */
     }
@@ -291,23 +295,27 @@ freelist_free(InkFreeList *f, void *item)
 
 #ifdef DEADBEEF
   {
-    static const char str[4] = {(char)0xde, (char)0xad, (char)0xbe, 
(char)0xef};
+    static const char str[4] = {static_cast<char>(0xde), 
static_cast<char>(0xad), static_cast<char>(0xbe), static_cast<char>(0xef)};
 
     // set the entire item to DEADBEEF
-    for (int j = 0; j < (int)f->type_size; j++)
-      ((char *)item)[j] = str[j % 4];
+    for (int j = 0; j < static_cast<int>(f->type_size); j++) {
+      (static_cast<char *>(item))[j] = str[j % 4];
+    }
   }
 #endif /* DEADBEEF */
 
   while (!result) {
     INK_QUEUE_LD(h, f->head);
 #ifdef SANITY
-    if (TO_PTR(FREELIST_POINTER(h)) == item)
+    if (TO_PTR(FREELIST_POINTER(h)) == item) {
       ink_abort("ink_freelist_free: trying to free item twice");
-    if (((uintptr_t)(TO_PTR(FREELIST_POINTER(h)))) & 3)
+    }
+    if (((uintptr_t)(TO_PTR(FREELIST_POINTER(h)))) & 3) {
       ink_abort("ink_freelist_free: bad list");
-    if (TO_PTR(FREELIST_POINTER(h)))
-      fake_global_for_ink_queue = *(int *)TO_PTR(FREELIST_POINTER(h));
+    }
+    if (TO_PTR(FREELIST_POINTER(h))) {
+      fake_global_for_ink_queue = *static_cast<int 
*>(TO_PTR(FREELIST_POINTER(h)));
+    }
 #endif /* SANITY */
     *adr_of_next = FREELIST_POINTER(h);
     SET_FREELIST_POINTER_VERSION(item_pair, FROM_PTR(item), 
FREELIST_VERSION(h));
@@ -347,13 +355,14 @@ freelist_bulkfree(InkFreeList *f, void *head, void *tail, 
size_t num_item)
 
 #ifdef DEADBEEF
   {
-    static const char str[4] = {(char)0xde, (char)0xad, (char)0xbe, 
(char)0xef};
+    static const char str[4] = {static_cast<char>(0xde), 
static_cast<char>(0xad), static_cast<char>(0xbe), static_cast<char>(0xef)};
 
     // set the entire item to DEADBEEF;
     void *temp = head;
     for (size_t i = 0; i < num_item; i++) {
-      for (int j = sizeof(void *); j < (int)f->type_size; j++)
-        ((char *)temp)[j] = str[j % 4];
+      for (int j = sizeof(void *); j < static_cast<int>(f->type_size); j++) {
+        (static_cast<char *>(temp))[j] = str[j % 4];
+      }
       *ADDRESS_OF_NEXT(temp, 0) = FROM_PTR(*ADDRESS_OF_NEXT(temp, 0));
       temp                      = TO_PTR(*ADDRESS_OF_NEXT(temp, 0));
     }
@@ -363,12 +372,15 @@ freelist_bulkfree(InkFreeList *f, void *head, void *tail, 
size_t num_item)
   while (!result) {
     INK_QUEUE_LD(h, f->head);
 #ifdef SANITY
-    if (TO_PTR(FREELIST_POINTER(h)) == head)
+    if (TO_PTR(FREELIST_POINTER(h)) == head) {
       ink_abort("ink_freelist_free: trying to free item twice");
-    if (((uintptr_t)(TO_PTR(FREELIST_POINTER(h)))) & 3)
+    }
+    if (((uintptr_t)(TO_PTR(FREELIST_POINTER(h)))) & 3) {
       ink_abort("ink_freelist_free: bad list");
-    if (TO_PTR(FREELIST_POINTER(h)))
-      fake_global_for_ink_queue = *(int *)TO_PTR(FREELIST_POINTER(h));
+    }
+    if (TO_PTR(FREELIST_POINTER(h))) {
+      fake_global_for_ink_queue = *static_cast<int 
*>(TO_PTR(FREELIST_POINTER(h)));
+    }
 #endif /* SANITY */
     *adr_of_next = FREELIST_POINTER(h);
     SET_FREELIST_POINTER_VERSION(item_pair, FROM_PTR(head), 
FREELIST_VERSION(h));
diff --git a/src/tscore/ink_res_init.cc b/src/tscore/ink_res_init.cc
index 42638a8..fdc34bf 100644
--- a/src/tscore/ink_res_init.cc
+++ b/src/tscore/ink_res_init.cc
@@ -169,8 +169,9 @@ ink_res_setoptions(ink_res_state statp, const char 
*options, const char *source
   int i;
 
 #ifdef DEBUG
-  if (statp->options & INK_RES_DEBUG)
+  if (statp->options & INK_RES_DEBUG) {
     printf(";; res_setoptions(\"%s\", \"%s\")...\n", options, source);
+  }
 #endif
   while (*cp) {
     /* skip leading and inner runs of spaces */
@@ -186,8 +187,9 @@ ink_res_setoptions(ink_res_state statp, const char 
*options, const char *source
         statp->ndots = INK_RES_MAXNDOTS;
       }
 #ifdef DEBUG
-      if (statp->options & INK_RES_DEBUG)
+      if (statp->options & INK_RES_DEBUG) {
         printf(";;\tndots=%d\n", statp->ndots);
+      }
 #endif
     } else if (!strncmp(cp, "timeout:", sizeof("timeout:") - 1)) {
       i = atoi(cp + sizeof("timeout:") - 1);
@@ -197,8 +199,9 @@ ink_res_setoptions(ink_res_state statp, const char 
*options, const char *source
         statp->retrans = INK_RES_MAXRETRANS;
       }
 #ifdef DEBUG
-      if (statp->options & INK_RES_DEBUG)
+      if (statp->options & INK_RES_DEBUG) {
         printf(";;\ttimeout=%d\n", statp->retrans);
+      }
 #endif
 #ifdef SOLARIS2
     } else if (!strncmp(cp, "retrans:", sizeof("retrans:") - 1)) {
@@ -224,8 +227,9 @@ ink_res_setoptions(ink_res_state statp, const char 
*options, const char *source
         statp->retry = INK_RES_MAXRETRY;
       }
 #ifdef DEBUG
-      if (statp->options & INK_RES_DEBUG)
+      if (statp->options & INK_RES_DEBUG) {
         printf(";;\tattempts=%d\n", statp->retry);
+      }
 #endif
     } else if (!strncmp(cp, "debug", sizeof("debug") - 1)) {
 #ifdef DEBUG
@@ -569,8 +573,9 @@ ink_res_init(ink_res_state statp,         ///< State object 
to update.
 #ifdef DEBUG
     if (statp->options & INK_RES_DEBUG) {
       printf(";; res_init()... default dnsrch list:\n");
-      for (pp = statp->dnsrch; *pp; pp++)
+      for (pp = statp->dnsrch; *pp; pp++) {
         printf(";;\t%s\n", *pp);
+      }
       printf(";;\t..END..\n");
     }
 #endif
diff --git a/src/tscore/unit_tests/test_Regex.cc 
b/src/tscore/unit_tests/test_Regex.cc
index b0ee29b..e457345 100644
--- a/src/tscore/unit_tests/test_Regex.cc
+++ b/src/tscore/unit_tests/test_Regex.cc
@@ -28,15 +28,15 @@
 #include "tscore/Regex.h"
 #include "catch.hpp"
 
-typedef struct {
+struct subject_match_t {
   std::string_view subject;
   bool match;
-} subject_match_t;
+};
 
-typedef struct {
+struct test_t {
   std::string_view regex;
   std::array<subject_match_t, 4> tests;
-} test_t;
+};
 
 std::array<test_t, 2> test_data{{{{"^foo"}, {{{{"foo"}, true}, {{"bar"}, 
false}, {{"foobar"}, true}, {{"foobarbaz"}, true}}}},
                                  {{"foo$"}, {{{{"foo"}, true}, {{"bar"}, 
false}, {{"foobar"}, false}, {{"foobarbaz"}, false}}}}}};
diff --git a/tests/gold_tests/chunked_encoding/smuggle-client.c 
b/tests/gold_tests/chunked_encoding/smuggle-client.c
index 928db41..db11011 100644
--- a/tests/gold_tests/chunked_encoding/smuggle-client.c
+++ b/tests/gold_tests/chunked_encoding/smuggle-client.c
@@ -85,10 +85,12 @@ main(int argc, char *argv[])
 
   for (rp = result; rp != NULL; rp = rp->ai_next) {
     sfd = socket(rp->ai_family, rp->ai_socktype, rp->ai_protocol);
-    if (sfd == -1)
+    if (sfd == -1) {
       continue;
-    if (connect(sfd, rp->ai_addr, rp->ai_addrlen) != -1)
+    }
+    if (connect(sfd, rp->ai_addr, rp->ai_addrlen) != -1) {
       break; /* Success */
+    }
 
     close(sfd);
   }
diff --git a/tests/gold_tests/timeout/ssl-delay-server.cc 
b/tests/gold_tests/timeout/ssl-delay-server.cc
index 0c0750c..8f12113 100644
--- a/tests/gold_tests/timeout/ssl-delay-server.cc
+++ b/tests/gold_tests/timeout/ssl-delay-server.cc
@@ -25,10 +25,10 @@
 #include <sys/types.h>
 #include <sys/socket.h>
 #include <netdb.h>
-#include <stdio.h>
-#include <stdlib.h>
+#include <cstdio>
+#include <cstdlib>
 #include <unistd.h>
-#include <string.h>
+#include <cstring>
 #include <openssl/ssl.h>
 #include <fcntl.h>
 #include <netinet/tcp.h>
@@ -38,7 +38,7 @@
 #include <openssl/err.h>
 #include <sys/time.h>
 #include <sys/select.h>
-#include <errno.h>
+#include <cerrno>
 
 char req_buf[10000];
 char post_buf[1000];
@@ -47,7 +47,7 @@ SSL_CTX *svr_ctx;
 int connect_delay;
 int ttfb_delay;
 
-pthread_mutex_t *mutex_buf = NULL;
+pthread_mutex_t *mutex_buf = nullptr;
 
 struct thread_info {
   struct addrinfo *result, *rp;
@@ -80,7 +80,7 @@ run_session(void *arg)
 {
   int sfd  = (intptr_t)arg;
   SSL *ssl = SSL_new(svr_ctx);
-  if (ssl == NULL) {
+  if (ssl == nullptr) {
     fprintf(stderr, "Failed to create ssl\n");
     return nullptr;
   }
@@ -138,7 +138,7 @@ run_session(void *arg)
   }
   close(sfd);
 
-  return NULL;
+  return nullptr;
 }
 
 /**
@@ -169,14 +169,14 @@ main(int argc, char *argv[])
   serv_addr.sin_addr.s_addr = htonl(INADDR_ANY);
   serv_addr.sin_port        = htons(listen_port);
 
-  bind(listenfd, (struct sockaddr *)&serv_addr, sizeof(serv_addr));
+  bind(listenfd, reinterpret_cast<struct sockaddr *>(&serv_addr), 
sizeof(serv_addr));
 
   SSL_load_error_strings();
   SSL_library_init();
 
-  mutex_buf = (pthread_mutex_t *)OPENSSL_malloc(CRYPTO_num_locks() * 
sizeof(pthread_mutex_t));
+  mutex_buf = static_cast<pthread_mutex_t *>(OPENSSL_malloc(CRYPTO_num_locks() 
* sizeof(pthread_mutex_t)));
   for (int i = 0; i < CRYPTO_num_locks(); i++) {
-    pthread_mutex_init(&mutex_buf[i], NULL);
+    pthread_mutex_init(&mutex_buf[i], nullptr);
   }
 
   CRYPTO_set_locking_callback(SSL_locking_callback);
@@ -199,7 +199,7 @@ main(int argc, char *argv[])
   listen(listenfd, 10);
 
   for (;;) {
-    sfd = accept(listenfd, (struct sockaddr *)NULL, NULL);
+    sfd = accept(listenfd, (struct sockaddr *)nullptr, nullptr);
     if (sfd <= 0) {
       // Failure
       printf("Listen failure\n");
@@ -210,7 +210,7 @@ main(int argc, char *argv[])
 
     // Spawn off new thread
     pthread_t thread_id;
-    pthread_create(&thread_id, NULL, run_session, (void *)((intptr_t)sfd));
+    pthread_create(&thread_id, nullptr, run_session, (void 
*)(static_cast<intptr_t>(sfd)));
   }
 
   exit(0);
diff --git a/tests/gold_tests/tls/ssl-post.c b/tests/gold_tests/tls/ssl-post.c
index 58376fd..eeb8037 100644
--- a/tests/gold_tests/tls/ssl-post.c
+++ b/tests/gold_tests/tls/ssl-post.c
@@ -142,8 +142,9 @@ spawn_same_session_send(void *arg)
     ret = select(sfd + 1, &reads, &writes, NULL, NULL);
     if (FD_ISSET(sfd, &reads) || FD_ISSET(sfd, &writes)) {
       ret = write_ret = SSL_write(ssl, req_buf, strlen(req_buf));
-      if (write_ret > 0)
+      if (write_ret > 0) {
         post_write_ret = SSL_write(ssl, post_buf, sizeof(post_buf));
+      }
     }
   }
 
@@ -198,10 +199,11 @@ spawn_same_session_send(void *arg)
       read_bytes = SSL_read(ssl, input_buf, sizeof(input_buf));
     }
   }
-  if (read_bytes > 0 && read_bytes < 1024)
+  if (read_bytes > 0 && read_bytes < 1024) {
     input_buf[read_bytes] = '\0';
-  else
+  } else {
     input_buf[1023] = '\0';
+  }
   // printf("total_bytes=%d Received bytes=%d handshake writes=%d handshake 
reads=%d\n", total_read, read_bytes, write_count,
   // read_count);
 
@@ -264,10 +266,12 @@ main(int argc, char *argv[])
 
   for (rp = result; rp != NULL; rp = rp->ai_next) {
     sfd = socket(rp->ai_family, rp->ai_socktype, rp->ai_protocol);
-    if (sfd == -1)
+    if (sfd == -1) {
       continue;
-    if (connect(sfd, rp->ai_addr, rp->ai_addrlen) != -1)
+    }
+    if (connect(sfd, rp->ai_addr, rp->ai_addrlen) != -1) {
       break; /* Success */
+    }
 
     close(sfd);
   }
@@ -320,10 +324,11 @@ main(int argc, char *argv[])
 
   char input_buf[1024];
   int read_bytes = SSL_read(ssl, input_buf, sizeof(input_buf));
-  if (read_bytes > 0 && read_bytes < 1024)
+  if (read_bytes > 0 && read_bytes < 1024) {
     input_buf[read_bytes] = '\0';
-  else
+  } else {
     input_buf[1023] = '\0';
+  }
   // printf("Received %d bytes %s\n", read_bytes, input_buf);
   SSL_SESSION *session = SSL_get_session(ssl);
   close(sfd);
diff --git a/tests/tools/plugins/cert_update.cc 
b/tests/tools/plugins/cert_update.cc
index 1bb18eb..53eeacd 100644
--- a/tests/tools/plugins/cert_update.cc
+++ b/tests/tools/plugins/cert_update.cc
@@ -21,7 +21,7 @@
   limitations under the License.
  */
 
-#include <stdio.h>
+#include <cstdio>
 #include <cstring>
 #include <string>
 #include <string_view>
diff --git a/tests/tools/plugins/cont_schedule.cc 
b/tests/tools/plugins/cont_schedule.cc
index 493c68d..7706d89 100644
--- a/tests/tools/plugins/cont_schedule.cc
+++ b/tests/tools/plugins/cont_schedule.cc
@@ -17,8 +17,8 @@
  */
 
 #include <cstring>
-#include <stdlib.h> // for abort
-#include <ts/ts.h>  // for debug
+#include <cstdlib> // for abort
+#include <ts/ts.h> // for debug
 
 // debug messages viewable by setting 'proxy.config.diags.debug.tags'
 // in 'records.config'
diff --git a/tests/tools/plugins/continuations_verify.cc 
b/tests/tools/plugins/continuations_verify.cc
index 6ad633e..5e6525d 100644
--- a/tests/tools/plugins/continuations_verify.cc
+++ b/tests/tools/plugins/continuations_verify.cc
@@ -23,8 +23,8 @@
   limitations under the License.
 */
 
-#include <stdlib.h> // for abort
-#include <ts/ts.h>  // for debug
+#include <cstdlib> // for abort
+#include <ts/ts.h> // for debug
 
 // debug messages viewable by setting 'proxy.config.diags.debug.tags'
 // in 'records.config'
diff --git a/tests/tools/plugins/custom204plugin.cc 
b/tests/tools/plugins/custom204plugin.cc
index c925bb5..461bc08 100644
--- a/tests/tools/plugins/custom204plugin.cc
+++ b/tests/tools/plugins/custom204plugin.cc
@@ -22,7 +22,7 @@
  */
 
 #include "ts/ts.h"
-#include "string.h"
+#include <cstring>
 
 #define PLUGIN_NAME "custom204plugintest"
 
@@ -42,7 +42,7 @@ local_handler(TSCont contp, TSEvent event, void *edata)
                     "This response was sent via the custom204plugin via a call 
to TSHttpTxnErrorBodySet.\n"
                     "<HR>\n"
                     "</BODY>";
-  TSHttpTxn txnp = (TSHttpTxn)edata;
+  TSHttpTxn txnp = static_cast<TSHttpTxn>(edata);
   TSMBuffer bufp = nullptr;
   TSMLoc hdr_loc = nullptr;
   TSMLoc url_loc = nullptr;
@@ -116,7 +116,7 @@ done:
 static int
 global_handler(TSCont contp, TSEvent event, void *edata)
 {
-  TSHttpTxn txnp   = (TSHttpTxn)edata;
+  TSHttpTxn txnp   = static_cast<TSHttpTxn>(edata);
   TSCont txn_contp = nullptr;
 
   switch (event) {
diff --git a/tests/tools/plugins/emergency_shutdown.cc 
b/tests/tools/plugins/emergency_shutdown.cc
index 9957e40..993d89d 100644
--- a/tests/tools/plugins/emergency_shutdown.cc
+++ b/tests/tools/plugins/emergency_shutdown.cc
@@ -17,8 +17,8 @@
  */
 
 #include <cstring>
-#include <stdlib.h> // for abort
-#include <ts/ts.h>  // for debug
+#include <cstdlib> // for abort
+#include <ts/ts.h> // for debug
 
 // debug messages viewable by setting 'proxy.config.diags.debug.tags'
 // in 'records.config'
diff --git a/tests/tools/plugins/fatal_shutdown.cc 
b/tests/tools/plugins/fatal_shutdown.cc
index d749008..65eec2b 100644
--- a/tests/tools/plugins/fatal_shutdown.cc
+++ b/tests/tools/plugins/fatal_shutdown.cc
@@ -17,8 +17,8 @@
  */
 
 #include <cstring>
-#include <stdlib.h> // for abort
-#include <ts/ts.h>  // for debug
+#include <cstdlib> // for abort
+#include <ts/ts.h> // for debug
 
 // debug messages viewable by setting 'proxy.config.diags.debug.tags'
 // in 'records.config'
diff --git a/tests/tools/plugins/hook_add_plugin.cc 
b/tests/tools/plugins/hook_add_plugin.cc
index adc9504..baf15e5 100644
--- a/tests/tools/plugins/hook_add_plugin.cc
+++ b/tests/tools/plugins/hook_add_plugin.cc
@@ -57,7 +57,7 @@ transactionHandler(TSCont continuation, TSEvent event, void 
*d)
 int
 sessionHandler(TSCont continuation, TSEvent event, void *d)
 {
-  TSHttpTxn txnp = (TSHttpTxn)d;
+  TSHttpTxn txnp = static_cast<TSHttpTxn>(d);
   TSCont txn_contp;
 
   switch (event) {
diff --git a/tests/tools/plugins/ssl_client_verify_test.cc 
b/tests/tools/plugins/ssl_client_verify_test.cc
index c9de34b..e48dae8 100644
--- a/tests/tools/plugins/ssl_client_verify_test.cc
+++ b/tests/tools/plugins/ssl_client_verify_test.cc
@@ -31,7 +31,7 @@
 #include <openssl/x509v3.h>
 #include <openssl/asn1.h>
 #include <strings.h>
-#include <string.h>
+#include <cstring>
 #include <string>
 #include <map>
 
@@ -41,7 +41,7 @@
 std::map<std::string, int> good_names;
 
 bool
-check_name(std::string name)
+check_name(const std::string &name)
 {
   auto entry = good_names.find(name);
   return entry != good_names.end();
@@ -75,7 +75,7 @@ check_names(X509 *cert)
   }
   if (!retval) {
     // Check the subjectAltNanes (if present)
-    GENERAL_NAMES *names = (GENERAL_NAMES *)X509_get_ext_d2i(cert, 
NID_subject_alt_name, nullptr, nullptr);
+    GENERAL_NAMES *names = static_cast<GENERAL_NAMES *>(X509_get_ext_d2i(cert, 
NID_subject_alt_name, nullptr, nullptr));
     if (names) {
       unsigned count = sk_GENERAL_NAME_num(names);
       for (unsigned i = 0; i < count && !retval; ++i) {
@@ -167,7 +167,7 @@ setup_callbacks(int count)
   TSDebug(PN, "Setup callbacks count=%d", count);
   for (i = 0; i < count; i++) {
     cb = TSContCreate(&CB_client_verify, TSMutexCreate());
-    TSContDataSet(cb, (void *)(intptr_t)i);
+    TSContDataSet(cb, (void *)static_cast<intptr_t>(i));
     TSHttpHookAdd(TS_SSL_VERIFY_CLIENT_HOOK, cb);
   }
   return;
diff --git a/tests/tools/plugins/ssl_hook_test.cc 
b/tests/tools/plugins/ssl_hook_test.cc
index 97412cd..20be782 100644
--- a/tests/tools/plugins/ssl_hook_test.cc
+++ b/tests/tools/plugins/ssl_hook_test.cc
@@ -296,7 +296,7 @@ setup_callbacks(TSHttpTxn txn, int preaccept_count, int 
client_hello_count, int
           client_hello_count, client_hello_count_immediate, sni_count, 
cert_count, cert_count_immediate, preaccept_count_delay);
   for (i = 0; i < preaccept_count; i++) {
     cb = TSContCreate(&CB_Pre_Accept, nullptr);
-    TSContDataSet(cb, (void *)(intptr_t)i);
+    TSContDataSet(cb, (void *)static_cast<intptr_t>(i));
     if (txn) {
       TSHttpTxnHookAdd(txn, TS_VCONN_START_HOOK, cb);
     } else {
@@ -305,7 +305,7 @@ setup_callbacks(TSHttpTxn txn, int preaccept_count, int 
client_hello_count, int
   }
   for (i = 0; i < preaccept_count_delay; i++) {
     cb = TSContCreate(&CB_Pre_Accept_Delay, nullptr);
-    TSContDataSet(cb, (void *)(intptr_t)i);
+    TSContDataSet(cb, (void *)static_cast<intptr_t>(i));
     if (txn) {
       TSHttpTxnHookAdd(txn, TS_VCONN_START_HOOK, cb);
     } else {
@@ -314,7 +314,7 @@ setup_callbacks(TSHttpTxn txn, int preaccept_count, int 
client_hello_count, int
   }
   for (i = 0; i < client_hello_count; i++) {
     cb = TSContCreate(&CB_Client_Hello, TSMutexCreate());
-    TSContDataSet(cb, (void *)(intptr_t)i);
+    TSContDataSet(cb, (void *)static_cast<intptr_t>(i));
     if (txn) {
       TSHttpTxnHookAdd(txn, TS_SSL_CLIENT_HELLO_HOOK, cb);
     } else {
@@ -323,7 +323,7 @@ setup_callbacks(TSHttpTxn txn, int preaccept_count, int 
client_hello_count, int
   }
   for (i = 0; i < client_hello_count_immediate; i++) {
     cb = TSContCreate(&CB_Client_Hello_Immediate, TSMutexCreate());
-    TSContDataSet(cb, (void *)(intptr_t)i);
+    TSContDataSet(cb, (void *)static_cast<intptr_t>(i));
     if (txn) {
       TSHttpTxnHookAdd(txn, TS_SSL_CLIENT_HELLO_HOOK, cb);
     } else {
@@ -332,7 +332,7 @@ setup_callbacks(TSHttpTxn txn, int preaccept_count, int 
client_hello_count, int
   }
   for (i = 0; i < sni_count; i++) {
     cb = TSContCreate(&CB_SNI, nullptr);
-    TSContDataSet(cb, (void *)(intptr_t)i);
+    TSContDataSet(cb, (void *)static_cast<intptr_t>(i));
     if (txn) {
       TSHttpTxnHookAdd(txn, TS_SSL_SERVERNAME_HOOK, cb);
     } else {
@@ -341,7 +341,7 @@ setup_callbacks(TSHttpTxn txn, int preaccept_count, int 
client_hello_count, int
   }
   for (i = 0; i < cert_count; i++) {
     cb = TSContCreate(&CB_Cert, nullptr);
-    TSContDataSet(cb, (void *)(intptr_t)i);
+    TSContDataSet(cb, (void *)static_cast<intptr_t>(i));
     if (txn) {
       TSHttpTxnHookAdd(txn, TS_SSL_CERT_HOOK, cb);
     } else {
@@ -350,7 +350,7 @@ setup_callbacks(TSHttpTxn txn, int preaccept_count, int 
client_hello_count, int
   }
   for (i = 0; i < cert_count_immediate; i++) {
     cb = TSContCreate(&CB_Cert_Immediate, nullptr);
-    TSContDataSet(cb, (void *)(intptr_t)i);
+    TSContDataSet(cb, (void *)static_cast<intptr_t>(i));
     if (txn) {
       TSHttpTxnHookAdd(txn, TS_SSL_CERT_HOOK, cb);
     } else {
@@ -360,7 +360,7 @@ setup_callbacks(TSHttpTxn txn, int preaccept_count, int 
client_hello_count, int
 
   for (i = 0; i < close_count; i++) {
     cb = TSContCreate(&CB_close, nullptr);
-    TSContDataSet(cb, (void *)(intptr_t)i);
+    TSContDataSet(cb, (void *)static_cast<intptr_t>(i));
     if (txn) {
       TSHttpTxnHookAdd(txn, TS_VCONN_CLOSE_HOOK, cb);
     } else {
@@ -369,7 +369,7 @@ setup_callbacks(TSHttpTxn txn, int preaccept_count, int 
client_hello_count, int
   }
   for (i = 0; i < out_start_count; i++) {
     cb = TSContCreate(&CB_out_start, nullptr);
-    TSContDataSet(cb, (void *)(intptr_t)i);
+    TSContDataSet(cb, (void *)static_cast<intptr_t>(i));
     if (txn) {
       TSHttpTxnHookAdd(txn, TS_VCONN_OUTBOUND_START_HOOK, cb);
     } else {
@@ -378,7 +378,7 @@ setup_callbacks(TSHttpTxn txn, int preaccept_count, int 
client_hello_count, int
   }
   for (i = 0; i < out_start_delay_count; i++) {
     cb = TSContCreate(&CB_out_start_delay, nullptr);
-    TSContDataSet(cb, (void *)(intptr_t)i);
+    TSContDataSet(cb, (void *)static_cast<intptr_t>(i));
     if (txn) {
       TSHttpTxnHookAdd(txn, TS_VCONN_OUTBOUND_START_HOOK, cb);
     } else {
@@ -387,7 +387,7 @@ setup_callbacks(TSHttpTxn txn, int preaccept_count, int 
client_hello_count, int
   }
   for (i = 0; i < out_close_count; i++) {
     cb = TSContCreate(&CB_out_close, nullptr);
-    TSContDataSet(cb, (void *)(intptr_t)i);
+    TSContDataSet(cb, (void *)static_cast<intptr_t>(i));
     if (txn) {
       TSHttpTxnHookAdd(txn, TS_VCONN_OUTBOUND_CLOSE_HOOK, cb);
     } else {
diff --git a/tests/tools/plugins/ssl_verify_test.cc 
b/tests/tools/plugins/ssl_verify_test.cc
index a036663..d375a07 100644
--- a/tests/tools/plugins/ssl_verify_test.cc
+++ b/tests/tools/plugins/ssl_verify_test.cc
@@ -48,7 +48,7 @@ CB_server_verify(TSCont cont, TSEvent event, void *edata)
   // Is this a good name or not?
   TSEvent reenable_event = TS_EVENT_CONTINUE;
   TSSslConnection sslobj = TSVConnSslConnectionGet(ssl_vc);
-  SSL *ssl               = (SSL *)sslobj;
+  SSL *ssl               = reinterpret_cast<SSL *>(sslobj);
   const char *sni_name   = SSL_get_servername(ssl, TLSEXT_NAMETYPE_host_name);
   if (sni_name) {
     std::string sni_string(sni_name);
@@ -100,7 +100,7 @@ setup_callbacks(int count)
   TSDebug(PN, "Setup callbacks count=%d", count);
   for (i = 0; i < count; i++) {
     cb = TSContCreate(&CB_server_verify, TSMutexCreate());
-    TSContDataSet(cb, (void *)(intptr_t)i);
+    TSContDataSet(cb, (void *)static_cast<intptr_t>(i));
     TSHttpHookAdd(TS_SSL_VERIFY_SERVER_HOOK, cb);
   }
   return;
diff --git a/tests/tools/plugins/ssntxnorder_verify.cc 
b/tests/tools/plugins/ssntxnorder_verify.cc
index 276fec9..ad856cd 100644
--- a/tests/tools/plugins/ssntxnorder_verify.cc
+++ b/tests/tools/plugins/ssntxnorder_verify.cc
@@ -25,10 +25,10 @@
 #include <iostream>
 #include <set>
 #include <sstream>
-#include <stdlib.h>   // for abort
-#include <ts/ts.h>    // for debug
-#include <inttypes.h> // for PRIu64
-#include <string.h>
+#include <cstdlib>   // for abort
+#include <ts/ts.h>   // for debug
+#include <cinttypes> // for PRIu64
+#include <cstring>
 
 // debug messages viewable by setting 'proxy.config.diags.debug.tags'
 // in 'records.config'
@@ -95,7 +95,7 @@ static const char ctl_dump[] = "dump";      // output active 
ssn/txn tables cmd
         - SSN ID
 */
 static void
-dump_tables(void)
+dump_tables()
 {
   TSDebug(DEBUG_TAG_HOOK, "Dumping active session and transaction tables.");
   std::stringstream dump("");
@@ -106,8 +106,8 @@ dump_tables(void)
     dump << "No active sessions could be found." << std::endl;
   } else {
     // Output for every active session
-    for (std::set<TSHttpSsn>::iterator it = started_ssns.begin(); it != 
started_ssns.end(); ++it) {
-      dump << "Session --> ID: " << *it << std::endl;
+    for (auto started_ssn : started_ssns) {
+      dump << "Session --> ID: " << started_ssn << std::endl;
     }
   }
 
@@ -115,8 +115,8 @@ dump_tables(void)
     dump << "No active transactions could be found." << std::endl;
   } else {
     // Output for every active transaction
-    for (std::set<started_txn, txn_compare>::iterator it = 
started_txns.begin(); it != started_txns.end(); ++it) {
-      dump << "Transaction --> ID: " << it->id << " ; Enclosing SSN ID: " << 
it->ssnp << " ;" << std::endl;
+    for (const auto &it : started_txns) {
+      dump << "Transaction --> ID: " << it.id << " ; Enclosing SSN ID: " << 
it.ssnp << " ;" << std::endl;
     }
   }
   dump << std::string(100, '+') << std::endl;
diff --git a/tests/tools/plugins/test_log_interface.cc 
b/tests/tools/plugins/test_log_interface.cc
index 4e85fc0..66b89c7 100644
--- a/tests/tools/plugins/test_log_interface.cc
+++ b/tests/tools/plugins/test_log_interface.cc
@@ -23,7 +23,7 @@
 
 #include <ts/ts.h>
 #include <string>
-#include <string.h>
+#include <cstring>
 
 constexpr auto plugin_name = "test_log_interface";
 
@@ -40,7 +40,7 @@ is_get_request(TSHttpTxn transaction)
   }
   int method_len     = 0;
   const char *method = TSHttpHdrMethodGet(req_bufp, req_loc, &method_len);
-  if (method_len != (int)strlen(TS_HTTP_METHOD_GET) || strncasecmp(method, 
TS_HTTP_METHOD_GET, method_len) != 0) {
+  if (method_len != static_cast<int>(strlen(TS_HTTP_METHOD_GET)) || 
strncasecmp(method, TS_HTTP_METHOD_GET, method_len) != 0) {
     TSHandleMLocRelease(req_bufp, TS_NULL_MLOC, req_loc);
     return false;
   }
@@ -52,7 +52,7 @@ int
 global_handler(TSCont continuation, TSEvent event, void *data)
 {
   TSHttpSsn session     = static_cast<TSHttpSsn>(data);
-  TSHttpTxn transaction = (TSHttpTxn)data;
+  TSHttpTxn transaction = static_cast<TSHttpTxn>(data);
 
   switch (event) {
   case TS_EVENT_HTTP_READ_REQUEST_HDR:
diff --git a/tools/jtest/jtest.cc b/tools/jtest/jtest.cc
index eaaa402..3f04a50 100644
--- a/tools/jtest/jtest.cc
+++ b/tools/jtest/jtest.cc
@@ -446,7 +446,7 @@ FD::close()
 
 #define MAX_FILE_ARGUMENTS 100
 
-typedef struct {
+struct InkWebURLComponents {
   char sche[MAX_URL_LEN + 1];
   char host[MAX_URL_LEN + 1];
   char port[MAX_URL_LEN + 1];
@@ -466,7 +466,7 @@ typedef struct {
   int rel_url;
   int leading_slash;
   int is_path_name;
-} InkWebURLComponents;
+};
 
 static int ink_web_remove_dots(char *src, char *dest, int *leadingslash, int 
max_dest_len);
 

Reply via email to