@@ -123,7 +123,7 @@ static DecryptionResult DecryptTokenV2(const std::vector<std::uint8_t>& encrypte
123123 idString.resize (idLength);
124124 identityPayloadReader.ReadBytes (const_cast <std::uint8_t *>(reinterpret_cast <const std::uint8_t *>(idString.data ())), 0 , idLength);
125125
126- const std::int32_t privacyBits = identityPayloadReader.ReadInt32 (); // NOLINT(clang-analyzer-deadcode.DeadStores)
126+ /* const std::int32_t privacyBits = */ identityPayloadReader.ReadInt32 ();
127127 const Timestamp established = Timestamp::FromEpochMilli (identityPayloadReader.ReadInt64 ());
128128
129129 if (checkValidity && expires < now) {
@@ -143,7 +143,7 @@ DecryptTokenV3(const std::vector<std::uint8_t>& encryptedId, const KeyContainer&
143143 return DecryptionResult::MakeError (DecryptionStatus::INVALID_IDENTITY_SCOPE);
144144 }
145145
146- const auto version = reader.ReadByte (); // NOLINT(clang-analyzer-deadcode.DeadStores)
146+ /* const auto version = */ reader.ReadByte ();
147147
148148 const std::int32_t masterKeyId = reader.ReadInt32 ();
149149 const auto * const masterKey = keys.Get (masterKeyId);
@@ -152,20 +152,20 @@ DecryptTokenV3(const std::vector<std::uint8_t>& encryptedId, const KeyContainer&
152152 }
153153
154154 std::uint8_t masterPayload[256 ];
155- if (reader.GetRemainingSize () > sizeof (masterPayload)) {
155+ if (reader.GetRemainingSize () > static_cast < int >( sizeof (masterPayload) )) {
156156 return DecryptionResult::MakeError (DecryptionStatus::INVALID_PAYLOAD);
157157 }
158158 const int masterPayloadLen = DecryptGCM (reader.GetCurrentData (), reader.GetRemainingSize (), masterKey->secret_ .data (), masterPayload);
159159
160160 BigEndianByteReader masterPayloadReader (masterPayload, masterPayloadLen);
161161
162162 const Timestamp expires = Timestamp::FromEpochMilli (masterPayloadReader.ReadInt64 ());
163- const Timestamp created = Timestamp::FromEpochMilli (masterPayloadReader.ReadInt64 ()); // NOLINT(clang-analyzer-deadcode.DeadStores)
163+ /* const Timestamp created = */ Timestamp::FromEpochMilli (masterPayloadReader.ReadInt64 ());
164164
165- const auto operatorSiteId = masterPayloadReader.ReadInt32 (); // NOLINT(clang-analyzer-deadcode.DeadStores)
166- const auto operatorType = masterPayloadReader.ReadByte (); // NOLINT(clang-analyzer-deadcode.DeadStores)
167- const auto operatorVersion = masterPayloadReader.ReadInt32 (); // NOLINT(clang-analyzer-deadcode.DeadStores)
168- const auto operatorClientKeyId = masterPayloadReader.ReadInt32 (); // NOLINT(clang-analyzer-deadcode.DeadStores)
165+ /* const auto operatorSiteId = */ masterPayloadReader.ReadInt32 ();
166+ /* const auto operatorType = */ masterPayloadReader.ReadByte ();
167+ /* const auto operatorVersion = */ masterPayloadReader.ReadInt32 ();
168+ /* const auto operatorClientKeyId = */ masterPayloadReader.ReadInt32 ();
169169
170170 const auto siteKeyId = masterPayloadReader.ReadInt32 ();
171171 const auto * const siteKey = keys.Get (siteKeyId);
@@ -174,20 +174,20 @@ DecryptTokenV3(const std::vector<std::uint8_t>& encryptedId, const KeyContainer&
174174 }
175175
176176 std::uint8_t sitePayload[128 ];
177- if (masterPayloadReader.GetRemainingSize () > sizeof (sitePayload)) {
177+ if (masterPayloadReader.GetRemainingSize () > static_cast < int >( sizeof (sitePayload) )) {
178178 return DecryptionResult::MakeError (DecryptionStatus::INVALID_PAYLOAD);
179179 }
180180 const auto sitePayloadLen = DecryptGCM (masterPayloadReader.GetCurrentData (), masterPayloadReader.GetRemainingSize (), siteKey->secret_ .data (), sitePayload);
181181
182182 BigEndianByteReader sitePayloadReader (sitePayload, sitePayloadLen);
183183
184184 const auto siteId = sitePayloadReader.ReadInt32 ();
185- const auto publisherId = sitePayloadReader.ReadInt64 (); // NOLINT(clang-analyzer-deadcode.DeadStores)
186- const auto publisherKeyId = sitePayloadReader.ReadInt32 (); // NOLINT(clang-analyzer-deadcode.DeadStores)
185+ /* const auto publisherId = */ sitePayloadReader.ReadInt64 ();
186+ /* const auto publisherKeyId = */ sitePayloadReader.ReadInt32 ();
187187
188- const auto privacyBits = sitePayloadReader.ReadInt32 (); // NOLINT(clang-analyzer-deadcode.DeadStores)
188+ /* const auto privacyBits = */ sitePayloadReader.ReadInt32 ();
189189 const Timestamp established = Timestamp::FromEpochMilli (sitePayloadReader.ReadInt64 ());
190- const Timestamp refreshed = Timestamp::FromEpochMilli (sitePayloadReader.ReadInt64 ()); // NOLINT(clang-analyzer-deadcode.DeadStores)
190+ /* const Timestamp refreshed = */ Timestamp::FromEpochMilli (sitePayloadReader.ReadInt64 ());
191191
192192 if (checkValidity && expires < now) {
193193 return DecryptionResult::MakeError (DecryptionStatus::EXPIRED_TOKEN, established, siteId, siteKey->siteId_ );
@@ -314,7 +314,7 @@ static DecryptionDataResult DecryptDataV2(const std::vector<std::uint8_t>& encry
314314 }
315315
316316 const auto encryptedAt = Timestamp::FromEpochMilli (reader.ReadInt64 ());
317- const int siteId = reader.ReadInt32 (); // NOLINT(clang-analyzer-deadcode.DeadStores)
317+ /* const int siteId = */ reader.ReadInt32 ();
318318 const std::int64_t keyId = reader.ReadInt32 ();
319319 const auto * const key = keys.Get (keyId);
320320 if (key == nullptr ) {
@@ -351,7 +351,7 @@ static DecryptionDataResult DecryptDataV3(const std::vector<std::uint8_t>& encry
351351
352352 BigEndianByteReader payloadReader (payload.data (), payloadLen);
353353 const auto encryptedAt = Timestamp::FromEpochMilli (payloadReader.ReadInt64 ());
354- const int siteId = payloadReader.ReadInt32 (); // NOLINT(clang-analyzer-deadcode.DeadStores)
354+ /* const int siteId = */ payloadReader.ReadInt32 ();
355355
356356 return DecryptionDataResult::MakeSuccess ({payloadReader.GetCurrentData (), payloadReader.GetCurrentData () + payloadReader.GetRemainingSize ()}, encryptedAt);
357357}
0 commit comments