From c5c04cb51fddba5ec8a0371155b50145810a92cb Mon Sep 17 00:00:00 2001 From: Christian Grothoff Date: Sat, 18 Jan 2020 17:53:47 +0100 Subject: fix -Wextra warnings --- src/auditor/taler-auditor-dbinit.c | 3 +++ src/auditor/taler-auditor-httpd.c | 8 ++++++-- src/auditor/taler-auditor-httpd_deposit-confirmation.c | 4 ++++ src/auditor/taler-auditor-httpd_mhd.c | 3 +++ src/auditor/taler-wire-auditor.c | 17 ++++++++++++++++- 5 files changed, 32 insertions(+), 3 deletions(-) (limited to 'src/auditor') diff --git a/src/auditor/taler-auditor-dbinit.c b/src/auditor/taler-auditor-dbinit.c index 2664e0914..291220bec 100644 --- a/src/auditor/taler-auditor-dbinit.c +++ b/src/auditor/taler-auditor-dbinit.c @@ -55,6 +55,9 @@ run (void *cls, { struct TALER_AUDITORDB_Plugin *plugin; + (void) cls; + (void) args; + (void) cfgfile; if (NULL == (plugin = TALER_AUDITORDB_plugin_load (cfg))) { diff --git a/src/auditor/taler-auditor-httpd.c b/src/auditor/taler-auditor-httpd.c index 0acd8d8bd..2b09a3332 100644 --- a/src/auditor/taler-auditor-httpd.c +++ b/src/auditor/taler-auditor-httpd.c @@ -288,6 +288,9 @@ handle_mhd_completion_callback (void *cls, void **con_cls, enum MHD_RequestTerminationCode toe) { + (void) cls; + (void) connection; + (void) toe; if (NULL == *con_cls) return; TALER_MHD_parse_post_cleanup_callback (*con_cls); @@ -388,11 +391,12 @@ handle_mhd_request (void *cls, { "/agpl", MHD_HTTP_METHOD_GET, "text/plain", NULL, 0, &TAH_MHD_handler_agpl_redirect, MHD_HTTP_FOUND }, - - { NULL, NULL, NULL, NULL, 0, 0 } + { NULL, NULL, NULL, NULL, 0, NULL, 0 } }; struct TAH_RequestHandler *rh; + (void) cls; + (void) version; GNUNET_log (GNUNET_ERROR_TYPE_INFO, "Handling request for URL '%s'\n", url); diff --git a/src/auditor/taler-auditor-httpd_deposit-confirmation.c b/src/auditor/taler-auditor-httpd_deposit-confirmation.c index 656b4fb7d..7759b5538 100644 --- a/src/auditor/taler-auditor-httpd_deposit-confirmation.c +++ b/src/auditor/taler-auditor-httpd_deposit-confirmation.c @@ -203,6 +203,10 @@ TAH_DEPOSIT_CONFIRMATION_handler (struct TAH_RequestHandler *rh, GNUNET_JSON_spec_end () }; + (void) rh; + (void) connection_cls; + (void) upload_data; + (void) upload_data_size; res = TALER_MHD_parse_post_json (connection, connection_cls, upload_data, diff --git a/src/auditor/taler-auditor-httpd_mhd.c b/src/auditor/taler-auditor-httpd_mhd.c index 01927469e..8d0496645 100644 --- a/src/auditor/taler-auditor-httpd_mhd.c +++ b/src/auditor/taler-auditor-httpd_mhd.c @@ -124,6 +124,9 @@ TAH_MHD_handler_send_json_pack_error (struct TAH_RequestHandler *rh, const char *upload_data, size_t *upload_data_size) { + (void) connection_cls; + (void) upload_data; + (void) upload_data_size; return TALER_MHD_reply_json_pack (connection, rh->response_code, "{s:s}", diff --git a/src/auditor/taler-wire-auditor.c b/src/auditor/taler-wire-auditor.c index 5cf4a5c37..9801a95d4 100644 --- a/src/auditor/taler-wire-auditor.c +++ b/src/auditor/taler-wire-auditor.c @@ -431,6 +431,7 @@ free_rii (void *cls, { struct ReserveInInfo *rii = value; + (void) cls; GNUNET_assert (GNUNET_YES == GNUNET_CONTAINER_multihashmap_remove (in_map, key, @@ -455,6 +456,7 @@ free_roi (void *cls, { struct ReserveOutInfo *roi = value; + (void) cls; GNUNET_assert (GNUNET_YES == GNUNET_CONTAINER_multihashmap_remove (out_map, key, @@ -479,6 +481,7 @@ free_rc (void *cls, { struct ReserveClosure *rc = value; + (void) cls; GNUNET_assert (GNUNET_YES == GNUNET_CONTAINER_multihashmap_remove (reserve_closures, key, @@ -499,6 +502,7 @@ do_shutdown (void *cls) { struct WireAccount *wa; + (void) cls; if (NULL != ctx) { GNUNET_CURL_fini (ctx); @@ -699,6 +703,8 @@ check_pending_rc (void *cls, { struct ReserveClosure *rc = value; + (void) cls; + (void) key; GNUNET_break (GNUNET_OK == TALER_amount_add (&total_closure_amount_lag, &total_closure_amount_lag, @@ -905,6 +911,7 @@ wire_missing_cb (void *cls, /* bool? */ int tiny, /* bool? */ int done) { + (void) cls; GNUNET_break (GNUNET_OK == TALER_amount_add (&total_amount_lag, &total_amount_lag, @@ -1251,6 +1258,7 @@ complain_out_not_found (void *cls, .found = GNUNET_NO }; + (void) key; hash_rc (roi->details.credit_account_url, &roi->details.wtid, &rkey); @@ -1355,6 +1363,7 @@ history_debit_cb (void *cls, struct WireAccount *wa = cls; struct ReserveOutInfo *roi; + (void) json; if (NULL == details) { wa->dhh = NULL; @@ -1481,7 +1490,7 @@ begin_debit_audit () * processing debits. */ static void -conclude_credit_history () +conclude_credit_history (void) { GNUNET_CONTAINER_multihashmap_destroy (in_map); in_map = NULL; @@ -1575,6 +1584,7 @@ complain_in_not_found (void *cls, struct WireAccount *wa = cls; struct ReserveInInfo *rii = value; + (void) key; report (report_reserve_in_inconsistencies, json_pack ("{s:I, s:o, s:o, s:o, s:o, s:s, s:s}", "row", (json_int_t) rii->rowid, @@ -1631,6 +1641,7 @@ history_credit_cb (void *cls, struct ReserveInInfo *rii; struct GNUNET_HashCode key; + (void) json; if (NULL == details) { wa->chh = NULL; @@ -2044,6 +2055,7 @@ process_account_cb (void *cls, { struct WireAccount *wa; + (void) cls; if ( (GNUNET_NO == ai->debit_enabled) && (GNUNET_NO == ai->credit_enabled) ) return; /* not an active exchange account */ @@ -2092,6 +2104,9 @@ run (void *cls, static const struct TALER_MasterPublicKeyP zeromp; char *tinys; + (void) cls; + (void) args; + (void) cfgfile; GNUNET_log (GNUNET_ERROR_TYPE_DEBUG, "Launching auditor\n"); start_time = GNUNET_TIME_absolute_get (); -- cgit v1.2.3