summary refs log tree commit diff
path: root/src
diff options
context:
space:
mode:
authorNicolas Werner <nicolas.werner@hotmail.de>2021-12-11 06:19:54 +0100
committerNicolas Werner <nicolas.werner@hotmail.de>2021-12-11 06:19:54 +0100
commit89e58f78f1b9a67fe75be2c839c6a026011b8ae7 (patch)
treed0120a0f42224628b524e4157ceaa55a46742a8f /src
parentSupport pinned messages (diff)
downloadnheko-89e58f78f1b9a67fe75be2c839c6a026011b8ae7.tar.xz
Fix a few shadowing warnings
fixes #824
Diffstat (limited to 'src')
-rw-r--r--src/encryption/DeviceVerificationFlow.cpp8
-rw-r--r--src/encryption/Olm.cpp4
-rw-r--r--src/encryption/SelfVerificationStatus.cpp10
3 files changed, 11 insertions, 11 deletions
diff --git a/src/encryption/DeviceVerificationFlow.cpp b/src/encryption/DeviceVerificationFlow.cpp

index 42a0d041..13867097 100644 --- a/src/encryption/DeviceVerificationFlow.cpp +++ b/src/encryption/DeviceVerificationFlow.cpp
@@ -46,10 +46,10 @@ DeviceVerificationFlow::DeviceVerificationFlow(QObject *, this->sas = olm::client()->sas_init(); this->isMacVerified = false; - auto user_id = userID.toStdString(); - this->toClient = mtx::identifiers::parse<mtx::identifiers::User>(user_id); + auto user_id_ = userID.toStdString(); + this->toClient = mtx::identifiers::parse<mtx::identifiers::User>(user_id_); cache::client()->query_keys( - user_id, [user_id, this](const UserKeyCache &res, mtx::http::RequestErr err) { + user_id_, [user_id_, this](const UserKeyCache &res, mtx::http::RequestErr err) { if (err) { nhlog::net()->warn("failed to query device keys: {},{}", mtx::errors::to_string(err->matrix_error.errcode), @@ -59,7 +59,7 @@ DeviceVerificationFlow::DeviceVerificationFlow(QObject *, if (!this->deviceId.isEmpty() && (res.device_keys.find(deviceId.toStdString()) == res.device_keys.end())) { - nhlog::net()->warn("no devices retrieved {}", user_id); + nhlog::net()->warn("no devices retrieved {}", user_id_); return; } diff --git a/src/encryption/Olm.cpp b/src/encryption/Olm.cpp
index 0931b4e3..b8df73fc 100644 --- a/src/encryption/Olm.cpp +++ b/src/encryption/Olm.cpp
@@ -1617,8 +1617,8 @@ download_cross_signing_keys() [secrets::cross_signing_user_signing] = user_signing_key->encrypted.begin()->second; - for (const auto &[key, secrets] : secrets) - unlock_secrets(key, secrets); + for (const auto &[key, secret_] : secrets) + unlock_secrets(key, secret_); }); }); }); diff --git a/src/encryption/SelfVerificationStatus.cpp b/src/encryption/SelfVerificationStatus.cpp
index c4f4f196..1e278da1 100644 --- a/src/encryption/SelfVerificationStatus.cpp +++ b/src/encryption/SelfVerificationStatus.cpp
@@ -171,13 +171,13 @@ SelfVerificationStatus::setupCrosssigning(bool useSSSS, QString password, bool u } for (const auto &[user_id, tmp] : res.errors) - for (const auto &[key_id, e] : tmp) + for (const auto &[key_id, e_] : tmp) nhlog::net()->error("signature error for user {} and key " "id {}: {}, {}", user_id, key_id, - mtx::errors::to_string(e.errcode), - e.error); + mtx::errors::to_string(e_.errcode), + e_.error); }); } } @@ -244,8 +244,8 @@ SelfVerificationStatus::verifyUnverifiedDevices() return; std::vector<QString> devices; - for (const auto &[device, keys] : keys->device_keys) { - (void)keys; + for (const auto &[device, keys_] : keys->device_keys) { + (void)keys_; if (!verif.verified_devices.count(device)) devices.push_back(QString::fromStdString(device)); }