summaryrefslogtreecommitdiff
path: root/src/auditor
diff options
context:
space:
mode:
authorChristian Grothoff <christian@grothoff.org>2020-01-18 17:53:47 +0100
committerChristian Grothoff <christian@grothoff.org>2020-01-18 17:53:54 +0100
commitc5c04cb51fddba5ec8a0371155b50145810a92cb (patch)
treefb6f248cd364e868e2ffcf76ed0be5ad3d17e291 /src/auditor
parent0f214150db9fbfe737e451e2ea78000ec175ebab (diff)
downloadexchange-c5c04cb51fddba5ec8a0371155b50145810a92cb.tar.gz
exchange-c5c04cb51fddba5ec8a0371155b50145810a92cb.tar.bz2
exchange-c5c04cb51fddba5ec8a0371155b50145810a92cb.zip
fix -Wextra warnings
Diffstat (limited to 'src/auditor')
-rw-r--r--src/auditor/taler-auditor-dbinit.c3
-rw-r--r--src/auditor/taler-auditor-httpd.c8
-rw-r--r--src/auditor/taler-auditor-httpd_deposit-confirmation.c4
-rw-r--r--src/auditor/taler-auditor-httpd_mhd.c3
-rw-r--r--src/auditor/taler-wire-auditor.c17
5 files changed, 32 insertions, 3 deletions
diff --git a/src/auditor/taler-auditor-dbinit.c b/src/auditor/taler-auditor-dbinit.c
index 2664e0914..291220bec 100644
--- a/src/auditor/taler-auditor-dbinit.c
+++ b/src/auditor/taler-auditor-dbinit.c
@@ -55,6 +55,9 @@ run (void *cls,
{
struct TALER_AUDITORDB_Plugin *plugin;
+ (void) cls;
+ (void) args;
+ (void) cfgfile;
if (NULL ==
(plugin = TALER_AUDITORDB_plugin_load (cfg)))
{
diff --git a/src/auditor/taler-auditor-httpd.c b/src/auditor/taler-auditor-httpd.c
index 0acd8d8bd..2b09a3332 100644
--- a/src/auditor/taler-auditor-httpd.c
+++ b/src/auditor/taler-auditor-httpd.c
@@ -288,6 +288,9 @@ handle_mhd_completion_callback (void *cls,
void **con_cls,
enum MHD_RequestTerminationCode toe)
{
+ (void) cls;
+ (void) connection;
+ (void) toe;
if (NULL == *con_cls)
return;
TALER_MHD_parse_post_cleanup_callback (*con_cls);
@@ -388,11 +391,12 @@ handle_mhd_request (void *cls,
{ "/agpl", MHD_HTTP_METHOD_GET, "text/plain",
NULL, 0,
&TAH_MHD_handler_agpl_redirect, MHD_HTTP_FOUND },
-
- { NULL, NULL, NULL, NULL, 0, 0 }
+ { NULL, NULL, NULL, NULL, 0, NULL, 0 }
};
struct TAH_RequestHandler *rh;
+ (void) cls;
+ (void) version;
GNUNET_log (GNUNET_ERROR_TYPE_INFO,
"Handling request for URL '%s'\n",
url);
diff --git a/src/auditor/taler-auditor-httpd_deposit-confirmation.c b/src/auditor/taler-auditor-httpd_deposit-confirmation.c
index 656b4fb7d..7759b5538 100644
--- a/src/auditor/taler-auditor-httpd_deposit-confirmation.c
+++ b/src/auditor/taler-auditor-httpd_deposit-confirmation.c
@@ -203,6 +203,10 @@ TAH_DEPOSIT_CONFIRMATION_handler (struct TAH_RequestHandler *rh,
GNUNET_JSON_spec_end ()
};
+ (void) rh;
+ (void) connection_cls;
+ (void) upload_data;
+ (void) upload_data_size;
res = TALER_MHD_parse_post_json (connection,
connection_cls,
upload_data,
diff --git a/src/auditor/taler-auditor-httpd_mhd.c b/src/auditor/taler-auditor-httpd_mhd.c
index 01927469e..8d0496645 100644
--- a/src/auditor/taler-auditor-httpd_mhd.c
+++ b/src/auditor/taler-auditor-httpd_mhd.c
@@ -124,6 +124,9 @@ TAH_MHD_handler_send_json_pack_error (struct TAH_RequestHandler *rh,
const char *upload_data,
size_t *upload_data_size)
{
+ (void) connection_cls;
+ (void) upload_data;
+ (void) upload_data_size;
return TALER_MHD_reply_json_pack (connection,
rh->response_code,
"{s:s}",
diff --git a/src/auditor/taler-wire-auditor.c b/src/auditor/taler-wire-auditor.c
index 5cf4a5c37..9801a95d4 100644
--- a/src/auditor/taler-wire-auditor.c
+++ b/src/auditor/taler-wire-auditor.c
@@ -431,6 +431,7 @@ free_rii (void *cls,
{
struct ReserveInInfo *rii = value;
+ (void) cls;
GNUNET_assert (GNUNET_YES ==
GNUNET_CONTAINER_multihashmap_remove (in_map,
key,
@@ -455,6 +456,7 @@ free_roi (void *cls,
{
struct ReserveOutInfo *roi = value;
+ (void) cls;
GNUNET_assert (GNUNET_YES ==
GNUNET_CONTAINER_multihashmap_remove (out_map,
key,
@@ -479,6 +481,7 @@ free_rc (void *cls,
{
struct ReserveClosure *rc = value;
+ (void) cls;
GNUNET_assert (GNUNET_YES ==
GNUNET_CONTAINER_multihashmap_remove (reserve_closures,
key,
@@ -499,6 +502,7 @@ do_shutdown (void *cls)
{
struct WireAccount *wa;
+ (void) cls;
if (NULL != ctx)
{
GNUNET_CURL_fini (ctx);
@@ -699,6 +703,8 @@ check_pending_rc (void *cls,
{
struct ReserveClosure *rc = value;
+ (void) cls;
+ (void) key;
GNUNET_break (GNUNET_OK ==
TALER_amount_add (&total_closure_amount_lag,
&total_closure_amount_lag,
@@ -905,6 +911,7 @@ wire_missing_cb (void *cls,
/* bool? */ int tiny,
/* bool? */ int done)
{
+ (void) cls;
GNUNET_break (GNUNET_OK ==
TALER_amount_add (&total_amount_lag,
&total_amount_lag,
@@ -1251,6 +1258,7 @@ complain_out_not_found (void *cls,
.found = GNUNET_NO
};
+ (void) key;
hash_rc (roi->details.credit_account_url,
&roi->details.wtid,
&rkey);
@@ -1355,6 +1363,7 @@ history_debit_cb (void *cls,
struct WireAccount *wa = cls;
struct ReserveOutInfo *roi;
+ (void) json;
if (NULL == details)
{
wa->dhh = NULL;
@@ -1481,7 +1490,7 @@ begin_debit_audit ()
* processing debits.
*/
static void
-conclude_credit_history ()
+conclude_credit_history (void)
{
GNUNET_CONTAINER_multihashmap_destroy (in_map);
in_map = NULL;
@@ -1575,6 +1584,7 @@ complain_in_not_found (void *cls,
struct WireAccount *wa = cls;
struct ReserveInInfo *rii = value;
+ (void) key;
report (report_reserve_in_inconsistencies,
json_pack ("{s:I, s:o, s:o, s:o, s:o, s:s, s:s}",
"row", (json_int_t) rii->rowid,
@@ -1631,6 +1641,7 @@ history_credit_cb (void *cls,
struct ReserveInInfo *rii;
struct GNUNET_HashCode key;
+ (void) json;
if (NULL == details)
{
wa->chh = NULL;
@@ -2044,6 +2055,7 @@ process_account_cb (void *cls,
{
struct WireAccount *wa;
+ (void) cls;
if ( (GNUNET_NO == ai->debit_enabled) &&
(GNUNET_NO == ai->credit_enabled) )
return; /* not an active exchange account */
@@ -2092,6 +2104,9 @@ run (void *cls,
static const struct TALER_MasterPublicKeyP zeromp;
char *tinys;
+ (void) cls;
+ (void) args;
+ (void) cfgfile;
GNUNET_log (GNUNET_ERROR_TYPE_DEBUG,
"Launching auditor\n");
start_time = GNUNET_TIME_absolute_get ();