Fixed complaints from Jetbrains Clion :-)

This commit is contained in:
Heiko Reese
2021-09-12 22:06:09 +02:00
parent 15de3a6204
commit b32d6fc861
3 changed files with 3 additions and 5 deletions

View File

@ -46,7 +46,7 @@ typedef enum {
int main(int argc, char *argv[]) {
char *prog_basename = basename(argv[0]);
int opt = 0;
int opt;
unsigned char *secretkey, *publickey;
size_t secretkey_len = 0, publickey_len = 0;
char *b64cipherstring;
@ -133,7 +133,6 @@ int main(int argc, char *argv[]) {
case 'h':
print_usage(prog_basename);
exit(EXIT_SUCCESS);
break;
}
}

View File

@ -91,7 +91,6 @@ int main(int argc, char *argv[]) {
case 'h':
print_usage(prog_basename);
exit(EXIT_SUCCESS);
break;
}
}
@ -129,7 +128,7 @@ int main(int argc, char *argv[]) {
if (base64_decode_string(cipherstring, &ciphertext, &ciphertext_len) != 0) {
fprintf(stderr, "[ERROR] Unable to base64-decode ciphertext.\n\n");
exit(EXIT_FAILURE);
};
}
// extract nonce
unsigned char nonce[crypto_secretbox_NONCEBYTES];

View File

@ -64,7 +64,7 @@ int sodium_crypto_secretbox_encrypt_password(uschar **yield, int argc, uschar *a
/*
* Derive a key from the password using a generic hash.
* This operations needs to be fast (exim holds no state, this might be called multiple times per email).
* This operation needs to be fast (exim holds no state, this might be called multiple times per email).
* Collisions avoidance or brute force attacks are not a concern here.
*/
unsigned char keybytes[crypto_secretbox_KEYBYTES];