aboutsummaryrefslogtreecommitdiff
path: root/src/testcurl
diff options
context:
space:
mode:
authorEvgeny Grin (Karlson2k) <k2k@narod.ru>2020-12-23 22:40:59 +0300
committerEvgeny Grin (Karlson2k) <k2k@narod.ru>2020-12-23 22:40:59 +0300
commit6d7f0a8f54bed3282199afc1bbe9c35c8af80a7f (patch)
tree3d67768870118ada13569e4d8b9487be57e17297 /src/testcurl
parentaee82048c22265757b1b2f99aa709ccdbf6c48ff (diff)
downloadlibmicrohttpd-6d7f0a8f54bed3282199afc1bbe9c35c8af80a7f.tar.gz
libmicrohttpd-6d7f0a8f54bed3282199afc1bbe9c35c8af80a7f.zip
Fixed and muted compiler warnings
Diffstat (limited to 'src/testcurl')
-rw-r--r--src/testcurl/https/test_https_get.c2
-rw-r--r--src/testcurl/test_add_conn.c8
-rw-r--r--src/testcurl/test_digestauth.c19
-rw-r--r--src/testcurl/test_digestauth_sha256.c23
-rw-r--r--src/testcurl/test_digestauth_with_arguments.c17
5 files changed, 37 insertions, 32 deletions
diff --git a/src/testcurl/https/test_https_get.c b/src/testcurl/https/test_https_get.c
index ab0dd9cf..b3f2fbf7 100644
--- a/src/testcurl/https/test_https_get.c
+++ b/src/testcurl/https/test_https_get.c
@@ -236,7 +236,7 @@ main (int argc, char *const *argv)
236{ 236{
237 unsigned int errorCount = 0; 237 unsigned int errorCount = 0;
238 const char *aes256_sha_tlsv1 = "AES256-SHA"; 238 const char *aes256_sha_tlsv1 = "AES256-SHA";
239 (void) argc; /* Unused. Silent compiler warning. */ 239 (void) argc; (void) argv; /* Unused. Silent compiler warning. */
240 240
241#ifdef MHD_HTTPS_REQUIRE_GRYPT 241#ifdef MHD_HTTPS_REQUIRE_GRYPT
242 gcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0); 242 gcry_control (GCRYCTL_ENABLE_QUICK_RANDOM, 0);
diff --git a/src/testcurl/test_add_conn.c b/src/testcurl/test_add_conn.c
index c81939d4..daa45206 100644
--- a/src/testcurl/test_add_conn.c
+++ b/src/testcurl/test_add_conn.c
@@ -260,9 +260,11 @@ static MHD_socket
260createListeningSocket (int *pport) 260createListeningSocket (int *pport)
261{ 261{
262 MHD_socket skt; 262 MHD_socket skt;
263 static const int on = 1;
264 struct sockaddr_in sin; 263 struct sockaddr_in sin;
265 socklen_t sin_len; 264 socklen_t sin_len;
265#ifdef MHD_POSIX_SOCKETS
266 static const int on = 1;
267#endif /* MHD_POSIX_SOCKETS */
266 268
267 skt = socket (PF_INET, SOCK_STREAM, IPPROTO_TCP); 269 skt = socket (PF_INET, SOCK_STREAM, IPPROTO_TCP);
268 if (MHD_INVALID_SOCKET == skt) 270 if (MHD_INVALID_SOCKET == skt)
@@ -286,11 +288,11 @@ createListeningSocket (int *pport)
286 if (0 == *pport) 288 if (0 == *pport)
287 { 289 {
288 memset (&sin, 0, sizeof(sin)); 290 memset (&sin, 0, sizeof(sin));
289 sin_len = sizeof(sin); 291 sin_len = (socklen_t) sizeof(sin);
290 if (0 != getsockname (skt, (struct sockaddr *) &sin, &sin_len)) 292 if (0 != getsockname (skt, (struct sockaddr *) &sin, &sin_len))
291 externalErrorExitDesc ("getsockname() failed"); 293 externalErrorExitDesc ("getsockname() failed");
292 294
293 if (sizeof(sin) < sin_len) 295 if (sizeof(sin) < (size_t) sin_len)
294 externalErrorExitDesc ("getsockname() failed"); 296 externalErrorExitDesc ("getsockname() failed");
295 297
296 if (AF_INET != sin.sin_family) 298 if (AF_INET != sin.sin_family)
diff --git a/src/testcurl/test_digestauth.c b/src/testcurl/test_digestauth.c
index 6a82c5a2..389cfd5a 100644
--- a/src/testcurl/test_digestauth.c
+++ b/src/testcurl/test_digestauth.c
@@ -91,6 +91,7 @@ ahc_echo (void *cls,
91 const char *password = "testpass"; 91 const char *password = "testpass";
92 const char *realm = "test@example.com"; 92 const char *realm = "test@example.com";
93 enum MHD_Result ret; 93 enum MHD_Result ret;
94 int ret_i;
94 (void) cls; (void) url; /* Unused. Silent compiler warning. */ 95 (void) cls; (void) url; /* Unused. Silent compiler warning. */
95 (void) method; (void) version; (void) upload_data; /* Unused. Silent compiler warning. */ 96 (void) method; (void) version; (void) upload_data; /* Unused. Silent compiler warning. */
96 (void) upload_data_size; (void) unused; /* Unused. Silent compiler warning. */ 97 (void) upload_data_size; (void) unused; /* Unused. Silent compiler warning. */
@@ -110,14 +111,14 @@ ahc_echo (void *cls,
110 MHD_destroy_response (response); 111 MHD_destroy_response (response);
111 return ret; 112 return ret;
112 } 113 }
113 ret = MHD_digest_auth_check (connection, 114 ret_i = MHD_digest_auth_check (connection,
114 realm, 115 realm,
115 username, 116 username,
116 password, 117 password,
117 300); 118 300);
118 free (username); 119 free (username);
119 if ( (ret == MHD_INVALID_NONCE) || 120 if ( (ret_i == MHD_INVALID_NONCE) ||
120 (ret == MHD_NO) ) 121 (ret_i == MHD_NO) )
121 { 122 {
122 response = MHD_create_response_from_buffer (strlen (DENIED), 123 response = MHD_create_response_from_buffer (strlen (DENIED),
123 DENIED, 124 DENIED,
@@ -128,8 +129,8 @@ ahc_echo (void *cls,
128 realm, 129 realm,
129 MY_OPAQUE, 130 MY_OPAQUE,
130 response, 131 response,
131 (MHD_INVALID_NONCE == ret) ? MHD_YES : 132 (MHD_INVALID_NONCE == ret_i) ?
132 MHD_NO); 133 MHD_YES : MHD_NO);
133 MHD_destroy_response (response); 134 MHD_destroy_response (response);
134 return ret; 135 return ret;
135 } 136 }
diff --git a/src/testcurl/test_digestauth_sha256.c b/src/testcurl/test_digestauth_sha256.c
index 4088dc32..5023bcad 100644
--- a/src/testcurl/test_digestauth_sha256.c
+++ b/src/testcurl/test_digestauth_sha256.c
@@ -92,6 +92,7 @@ ahc_echo (void *cls,
92 const char *password = "testpass"; 92 const char *password = "testpass";
93 const char *realm = "test@example.com"; 93 const char *realm = "test@example.com";
94 enum MHD_Result ret; 94 enum MHD_Result ret;
95 int ret_i;
95 (void) cls; (void) url; /* Unused. Silent compiler warning. */ 96 (void) cls; (void) url; /* Unused. Silent compiler warning. */
96 (void) method; (void) version; (void) upload_data; /* Unused. Silent compiler warning. */ 97 (void) method; (void) version; (void) upload_data; /* Unused. Silent compiler warning. */
97 (void) upload_data_size; (void) unused; /* Unused. Silent compiler warning. */ 98 (void) upload_data_size; (void) unused; /* Unused. Silent compiler warning. */
@@ -112,15 +113,15 @@ ahc_echo (void *cls,
112 MHD_destroy_response (response); 113 MHD_destroy_response (response);
113 return ret; 114 return ret;
114 } 115 }
115 ret = MHD_digest_auth_check2 (connection, 116 ret_i = MHD_digest_auth_check2 (connection,
116 realm, 117 realm,
117 username, 118 username,
118 password, 119 password,
119 300, 120 300,
120 MHD_DIGEST_ALG_SHA256); 121 MHD_DIGEST_ALG_SHA256);
121 free (username); 122 free (username);
122 if ( (ret == MHD_INVALID_NONCE) || 123 if ( (ret_i == MHD_INVALID_NONCE) ||
123 (ret == MHD_NO) ) 124 (ret_i == MHD_NO) )
124 { 125 {
125 response = MHD_create_response_from_buffer (strlen (DENIED), 126 response = MHD_create_response_from_buffer (strlen (DENIED),
126 DENIED, 127 DENIED,
@@ -131,8 +132,8 @@ ahc_echo (void *cls,
131 realm, 132 realm,
132 MY_OPAQUE, 133 MY_OPAQUE,
133 response, 134 response,
134 (MHD_INVALID_NONCE == ret) ? MHD_YES : 135 (MHD_INVALID_NONCE == ret_i) ?
135 MHD_NO, 136 MHD_YES : MHD_NO,
136 MHD_DIGEST_ALG_SHA256); 137 MHD_DIGEST_ALG_SHA256);
137 MHD_destroy_response (response); 138 MHD_destroy_response (response);
138 return ret; 139 return ret;
@@ -297,7 +298,7 @@ main (int argc, char *const *argv)
297 (void) argc; (void) argv; /* Unused. Silent compiler warning. */ 298 (void) argc; (void) argv; /* Unused. Silent compiler warning. */
298 299
299#ifdef CURL_VERSION_SSPI 300#ifdef CURL_VERSION_SSPI
300 if (0 != (d->features | CURL_VERSION_SSPI)) 301 if (0 != (d->features & CURL_VERSION_SSPI))
301 return 77; /* Skip test, W32 SSPI doesn't support sha256 digest */ 302 return 77; /* Skip test, W32 SSPI doesn't support sha256 digest */
302#endif /* CURL_VERSION_SSPI */ 303#endif /* CURL_VERSION_SSPI */
303 304
diff --git a/src/testcurl/test_digestauth_with_arguments.c b/src/testcurl/test_digestauth_with_arguments.c
index 3d90f0db..c6154ffb 100644
--- a/src/testcurl/test_digestauth_with_arguments.c
+++ b/src/testcurl/test_digestauth_with_arguments.c
@@ -85,6 +85,7 @@ ahc_echo (void *cls,
85 const char *password = "testpass"; 85 const char *password = "testpass";
86 const char *realm = "test@example.com"; 86 const char *realm = "test@example.com";
87 enum MHD_Result ret; 87 enum MHD_Result ret;
88 int ret_i;
88 (void) cls; (void) url; /* Unused. Silent compiler warning. */ 89 (void) cls; (void) url; /* Unused. Silent compiler warning. */
89 (void) method; (void) version; (void) upload_data; /* Unused. Silent compiler warning. */ 90 (void) method; (void) version; (void) upload_data; /* Unused. Silent compiler warning. */
90 (void) upload_data_size; (void) unused; /* Unused. Silent compiler warning. */ 91 (void) upload_data_size; (void) unused; /* Unused. Silent compiler warning. */
@@ -103,13 +104,13 @@ ahc_echo (void *cls,
103 MHD_destroy_response (response); 104 MHD_destroy_response (response);
104 return ret; 105 return ret;
105 } 106 }
106 ret = MHD_digest_auth_check (connection, realm, 107 ret_i = MHD_digest_auth_check (connection, realm,
107 username, 108 username,
108 password, 109 password,
109 300); 110 300);
110 free (username); 111 free (username);
111 if ( (ret == MHD_INVALID_NONCE) || 112 if ( (ret_i == MHD_INVALID_NONCE) ||
112 (ret == MHD_NO) ) 113 (ret_i == MHD_NO) )
113 { 114 {
114 response = MHD_create_response_from_buffer (strlen (DENIED), 115 response = MHD_create_response_from_buffer (strlen (DENIED),
115 DENIED, 116 DENIED,
@@ -119,8 +120,8 @@ ahc_echo (void *cls,
119 ret = MHD_queue_auth_fail_response (connection, realm, 120 ret = MHD_queue_auth_fail_response (connection, realm,
120 MY_OPAQUE, 121 MY_OPAQUE,
121 response, 122 response,
122 (ret == MHD_INVALID_NONCE) ? MHD_YES : 123 (ret_i == MHD_INVALID_NONCE) ?
123 MHD_NO); 124 MHD_YES : MHD_NO);
124 MHD_destroy_response (response); 125 MHD_destroy_response (response);
125 return ret; 126 return ret;
126 } 127 }