gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-anastasis] branch master updated: fix misc compiler warnings


From: gnunet
Subject: [taler-anastasis] branch master updated: fix misc compiler warnings
Date: Sun, 06 Oct 2024 12:13:32 +0200

This is an automated email from the git hooks/post-receive script.

grothoff pushed a commit to branch master
in repository anastasis.

The following commit(s) were added to refs/heads/master by this push:
     new e64f50b  fix misc compiler warnings
e64f50b is described below

commit e64f50baffe7bb49e31072ed402852acbb1c78ef
Author: Christian Grothoff <christian@grothoff.org>
AuthorDate: Sun Oct 6 12:13:27 2024 +0200

    fix misc compiler warnings
---
 configure.ac                                       | 124 +++++-----
 contrib/gana                                       |   2 +-
 m4/libcurl.m4                                      |   2 +-
 m4/libgnurl.m4                                     | 250 ---------------------
 .../anastasis-helper-authorization-iban.c          |   6 +-
 src/authorization/anastasis_authorization_plugin.c |   8 +
 .../anastasis_authorization_plugin_email.c         |   8 +
 .../anastasis_authorization_plugin_file.c          |   8 +
 .../anastasis_authorization_plugin_iban.c          |   8 +
 .../anastasis_authorization_plugin_post.c          |   8 +
 .../anastasis_authorization_plugin_sms.c           |   8 +
 .../anastasis_authorization_plugin_totp.c          |  10 +-
 src/backend/anastasis-httpd_policy-upload.c        |  16 +-
 src/backend/anastasis-httpd_truth-challenge.c      |  21 +-
 src/backend/anastasis-httpd_truth-solve.c          |  19 +-
 src/backend/anastasis-httpd_truth-upload.c         | 142 ++++++------
 src/cli/anastasis-cli-discover.c                   |   2 +-
 src/cli/anastasis-cli-redux.c                      |   2 +-
 src/lib/anastasis_recovery.c                       |   6 +-
 src/reducer/anastasis_api_backup_redux.c           |  70 +++---
 src/reducer/anastasis_api_recovery_redux.c         |  91 ++++----
 src/reducer/anastasis_api_redux.c                  |  46 ++--
 src/reducer/validation_CH_AHV.c                    |   4 +
 src/reducer/validation_CZ_BN.c                     |   4 +
 src/reducer/validation_DE_SVN.c                    |   4 +
 src/reducer/validation_DE_TIN.c                    |   4 +
 src/reducer/validation_ES_DNI.c                    |   4 +
 src/reducer/validation_FR_INSEE.c                  |   4 +
 src/reducer/validation_IN_AADHAR.c                 |   4 +
 src/reducer/validation_IT_CF.c                     |   4 +
 src/reducer/validation_NL_BSN.c                    |   4 +
 src/reducer/validation_XX_SQUARE.c                 |   4 +
 src/reducer/validation_XY_PRIME.c                  |   4 +
 src/restclient/Makefile.am                         |   9 +-
 src/restclient/anastasis_api_config.c              |   4 +-
 src/stasis/anastasis_db_plugin.c                   |  10 +-
 src/stasis/plugin_anastasis_postgres.c             |  69 +++---
 src/stasis/test_anastasis_db.c                     |  17 +-
 src/testing/test_anastasis.c                       |   2 +-
 src/testing/test_anastasis_api.c                   |   2 +-
 src/testing/testing_cmd_challenge_answer.c         |  48 ++--
 src/util/anastasis-crypto-tvg.c                    |   6 +-
 src/util/os_installation.c                         |   2 +-
 src/util/test_anastasis_crypto.c                   |   7 +-
 44 files changed, 479 insertions(+), 598 deletions(-)

diff --git a/configure.ac b/configure.ac
index d1c7805..b4ad81b 100644
--- a/configure.ac
+++ b/configure.ac
@@ -3,7 +3,7 @@
 #
 # This configure file is in the public domain
 
-AC_PREREQ([2.69])
+AC_PREREQ([2.71])
 AC_INIT([anastasis],[0.4.2],[taler-bug@gnu.org])
 AC_CONFIG_SRCDIR([src/backend/anastasis-httpd.c])
 AC_CONFIG_HEADERS([anastasis_config.h])
@@ -65,63 +65,10 @@ AC_SUBST(ANASTASIS_LIB_LDFLAGS)
 AC_SUBST(ANASTASIS_PLUGIN_LDFLAGS)
 
 
-# check for libgnurl
-# libgnurl
-LIBGNURL_CHECK_CONFIG(,7.34.0,gnurl=1,gnurl=0)
-AS_IF([test "x$gnurl" = x1],[
-       AM_CONDITIONAL(HAVE_LIBGNURL, true)
-       AC_DEFINE([HAVE_LIBGNURL],[1],[Have libgnurl])
-],[
-       AM_CONDITIONAL(HAVE_LIBGNURL, false)
-])
-
-# libcurl-gnutls
-LIBCURL_CHECK_CONFIG(,7.34.0,[curl=true],[curl=false])
-AS_IF([test "x$curl" = xtrue],
-      [LDFLAGS="-L$with_libcurl/lib $LDFLAGS"
-       CPPFLAGS="-I$with_libcurl/include $CPPFLAGS"
-       AC_CHECK_HEADERS([curl/curl.h],
-                        [AC_CHECK_DECLS(CURLINFO_TLS_SESSION,
-                         [curl=true],
-                         [curl=false],
-                         [[#include <curl/curl.h>]])],
-                        [curl=false])
-       # need libcurl-gnutls.so, everything else is not acceptable
-       AC_CHECK_LIB([curl-gnutls],
-                    [curl_easy_getinfo],,
-                    [curl=false])])
-       # cURL must support CURLINFO_TLS_SESSION, version >= 7.34
-
-# Check for curl/curl.h and gnurl/curl.h so we can use #ifdef
-# HAVE_CURL_CURL_H later (the above LIBCURL_CHECK_CONFIG accepted
-# *either* header set).
-AC_CHECK_HEADERS([curl/curl.h],,
-  curl=false
-  AC_CHECK_HEADERS([gnurl/curl.h],,
-  gnurl=false))
-
-# libgnurl
-AS_IF([test "x$gnurl" = "x0"],
-      [AS_IF([test "x$curl" = "x0"],
-              [AC_MSG_NOTICE([NOTICE: libgnurl not found. taler-bank support 
will not be compiled.])],
-              [AC_MSG_NOTICE([WARNING: libgnurl not found, trying to use 
libcurl-gnutls instead.])])])
-
-AS_IF([test x$curl = xfalse],
-       [AM_CONDITIONAL(HAVE_LIBCURL, false)
-        AS_IF([test "x$gnurl" = "x0"],
-              [AC_MSG_WARN([GNU Taler requires libcurl-gnutls  >= 7.34])])],
-       [AM_CONDITIONAL(HAVE_LIBCURL, true)
-       AC_DEFINE([HAVE_LIBCURL],[1],[Have CURL])])
-
-# gcov compilation
-AC_MSG_CHECKING(whether to compile with support for code coverage analysis)
-AC_ARG_ENABLE([coverage],
-              AS_HELP_STRING([--enable-coverage],
-                             [compile the library with code coverage support]),
-              [use_gcov=${enableval}],
-              [use_gcov=no])
-AC_MSG_RESULT($use_gcov)
-AM_CONDITIONAL([USE_COVERAGE], [test "x$use_gcov" = "xyes"])
+# Save before checks clobber them
+CFLAGS_SAVE=$CFLAGS
+LDFLAGS_SAVE=$LDFLAGS
+LIBS_SAVE=$LIBS
 
 
 # Check for GNUnet's libgnunetutil.
@@ -150,6 +97,66 @@ AS_IF([test $libgnunetutil != 1],
 *** ]])])
 
 
+# check for libcurl
+LIBCURL_CHECK_CONFIG(,7.34.0,[curl=1],[curl=0])
+
+# cURL must support CURLINFO_TLS_SESSION, version >= 7.34
+AS_IF([test "x$curl" = x1],[
+ AC_CHECK_HEADER([curl/curl.h],
+  [AC_CHECK_DECLS(CURLINFO_TLS_SESSION,[curl=1],[curl=0],[[#include 
<curl/curl.h>]])],
+  [curl=0])
+])
+
+# libcurl should be mutually exclusive
+AS_IF([test "$curl" = 1],
+      AM_CONDITIONAL(HAVE_LIBCURL, true)
+      AC_DEFINE([HAVE_LIBCURL],[1],[Have libcurl])
+      [LIBCURL_LIBS="-lcurl"],
+      [AC_MSG_ERROR([FATAL: No libcurl])])
+
+AC_SUBST([LIBCURL_LIBS])
+
+# Check for GNUnet's libgnunetcurl.
+libgnunetcurl=0
+AC_MSG_CHECKING([for libgnunetcurl])
+AC_ARG_WITH(gnunet,
+            [AS_HELP_STRING([--with-gnunet=PFX], [base of GNUnet 
installation])],
+            [AC_MSG_RESULT([given as $with_gnunet])],
+            [AC_MSG_RESULT(not given)
+             with_gnunet=yes])
+AS_CASE([$with_gnunet],
+        [yes], [],
+        [no], [AC_MSG_ERROR([--with-gnunet is required])],
+        [LDFLAGS="-L$with_gnunet/lib $LDFLAGS"
+         CPPFLAGS="-I$with_gnunet/include $CPPFLAGS"])
+AC_CHECK_HEADERS([gnunet/gnunet_curl_lib.h],
+ [AC_CHECK_LIB([gnunetcurl], [GNUNET_CURL_get_select_info], libgnunetcurl=1)])
+AS_IF([test $libgnunetcurl != 1],
+  [AC_MSG_ERROR([[
+***
+*** You need libgnunetcurl to build this program.
+*** Make sure you have libcurl installed while
+*** building GNUnet.
+*** ]])])
+
+
+# Restore after curl checks messed up these values
+CFLAGS=$CFLAGS_SAVE
+LDFLAGS=$LDFLAGS_SAVE
+LIBS=$LIBS_SAVE
+
+
+# gcov compilation
+AC_MSG_CHECKING(whether to compile with support for code coverage analysis)
+AC_ARG_ENABLE([coverage],
+              AS_HELP_STRING([--enable-coverage],
+                             [compile the library with code coverage support]),
+              [use_gcov=${enableval}],
+              [use_gcov=no])
+AC_MSG_RESULT($use_gcov)
+AM_CONDITIONAL([USE_COVERAGE], [test "x$use_gcov" = "xyes"])
+
+
 # test for postgres
 AX_LIB_POSTGRESQL([15])
 AS_IF([test "x$found_postgresql" = "xyes"],[postgres=true])
@@ -311,7 +318,6 @@ AM_CONDITIONAL([ENABLE_DOC], [test "x$enable_doc" = "xyes"])
 # logic if doc_only is set, make sure conditionals are still defined
 AM_CONDITIONAL([HAVE_POSTGRESQL], [false])
 AM_CONDITIONAL([HAVE_LIBCURL], [false])
-AM_CONDITIONAL([HAVE_LIBGNURL], [false])
 AM_CONDITIONAL([USE_COVERAGE], [false])
 AM_CONDITIONAL([ENABLE_DOC], [true])
 
diff --git a/contrib/gana b/contrib/gana
index 6155690..a2f72a9 160000
--- a/contrib/gana
+++ b/contrib/gana
@@ -1 +1 @@
-Subproject commit 61556908520df557832b04bb5e1ee91c708aeef4
+Subproject commit a2f72a9fb7a7d7757091821ea83180e1461714ff
diff --git a/m4/libcurl.m4 b/m4/libcurl.m4
index a84077a..047260b 100644
--- a/m4/libcurl.m4
+++ b/m4/libcurl.m4
@@ -61,7 +61,7 @@ AC_DEFUN([LIBCURL_CHECK_CONFIG],
   AH_TEMPLATE([LIBCURL_PROTOCOL_SMTP],[Defined if libcurl supports SMTP])
 
   AC_ARG_WITH(libcurl,
-     AC_HELP_STRING([--with-libcurl=PREFIX],[look for the curl library in 
PREFIX/lib and headers in PREFIX/include]),
+     AS_HELP_STRING([--with-libcurl=PREFIX],[look for the curl library in 
PREFIX/lib and headers in PREFIX/include]),
      [_libcurl_with=$withval],[_libcurl_with=ifelse([$1],,[yes],[$1])])
 
   if test "$_libcurl_with" != "no" ; then
diff --git a/m4/libgnurl.m4 b/m4/libgnurl.m4
deleted file mode 100644
index 69aa166..0000000
--- a/m4/libgnurl.m4
+++ /dev/null
@@ -1,250 +0,0 @@
-# LIBGNURL_CHECK_CONFIG ([DEFAULT-ACTION], [MINIMUM-VERSION],
-#                       [ACTION-IF-YES], [ACTION-IF-NO])
-# ----------------------------------------------------------
-#      David Shaw <dshaw@jabberwocky.com>   May-09-2006
-#
-# Checks for libgnurl.  DEFAULT-ACTION is the string yes or no to
-# specify whether to default to --with-libgnurl or --without-libgnurl.
-# If not supplied, DEFAULT-ACTION is yes.  MINIMUM-VERSION is the
-# minimum version of libgnurl to accept.  Pass the version as a regular
-# version number like 7.10.1. If not supplied, any version is
-# accepted.  ACTION-IF-YES is a list of shell commands to run if
-# libgnurl was successfully found and passed the various tests.
-# ACTION-IF-NO is a list of shell commands that are run otherwise.
-# Note that using --without-libgnurl does run ACTION-IF-NO.
-#
-# This macro #defines HAVE_LIBGNURL if a working libgnurl setup is
-# found, and sets @LIBGNURL@ and @LIBGNURL_CPPFLAGS@ to the necessary
-# values.  Other useful defines are LIBGNURL_FEATURE_xxx where xxx are
-# the various features supported by libgnurl, and LIBGNURL_PROTOCOL_yyy
-# where yyy are the various protocols supported by libgnurl.  Both xxx
-# and yyy are capitalized.  See the list of AH_TEMPLATEs at the top of
-# the macro for the complete list of possible defines.  Shell
-# variables $libgnurl_feature_xxx and $libgnurl_protocol_yyy are also
-# defined to 'yes' for those features and protocols that were found.
-# Note that xxx and yyy keep the same capitalization as in the
-# gnurl-config list (e.g. it's "HTTP" and not "http").
-#
-# Users may override the detected values by doing something like:
-# LIBGNURL="-lgnurl" LIBGNURL_CPPFLAGS="-I/usr/myinclude" ./configure
-#
-# For the sake of sanity, this macro assumes that any libgnurl that is
-# found is after version 7.7.2, the first version that included the
-# gnurl-config script.  Note that it is very important for people
-# packaging binary versions of libgnurl to include this script!
-# Without gnurl-config, we can only guess what protocols are available,
-# or use gnurl_version_info to figure it out at runtime.
-
-AC_DEFUN([LIBGNURL_CHECK_CONFIG],
-[
-  AH_TEMPLATE([LIBGNURL_FEATURE_SSL],[Defined if libgnurl supports SSL])
-  AH_TEMPLATE([LIBGNURL_FEATURE_KRB4],[Defined if libgnurl supports KRB4])
-  AH_TEMPLATE([LIBGNURL_FEATURE_IPV6],[Defined if libgnurl supports IPv6])
-  AH_TEMPLATE([LIBGNURL_FEATURE_LIBZ],[Defined if libgnurl supports libz])
-  AH_TEMPLATE([LIBGNURL_FEATURE_ASYNCHDNS],[Defined if libgnurl supports 
AsynchDNS])
-  AH_TEMPLATE([LIBGNURL_FEATURE_IDN],[Defined if libgnurl supports IDN])
-  AH_TEMPLATE([LIBGNURL_FEATURE_SSPI],[Defined if libgnurl supports SSPI])
-  AH_TEMPLATE([LIBGNURL_FEATURE_NTLM],[Defined if libgnurl supports NTLM])
-
-  AH_TEMPLATE([LIBGNURL_PROTOCOL_HTTP],[Defined if libgnurl supports HTTP])
-  AH_TEMPLATE([LIBGNURL_PROTOCOL_HTTPS],[Defined if libgnurl supports HTTPS])
-  AH_TEMPLATE([LIBGNURL_PROTOCOL_FTP],[Defined if libgnurl supports FTP])
-  AH_TEMPLATE([LIBGNURL_PROTOCOL_FTPS],[Defined if libgnurl supports FTPS])
-  AH_TEMPLATE([LIBGNURL_PROTOCOL_FILE],[Defined if libgnurl supports FILE])
-  AH_TEMPLATE([LIBGNURL_PROTOCOL_TELNET],[Defined if libgnurl supports TELNET])
-  AH_TEMPLATE([LIBGNURL_PROTOCOL_LDAP],[Defined if libgnurl supports LDAP])
-  AH_TEMPLATE([LIBGNURL_PROTOCOL_DICT],[Defined if libgnurl supports DICT])
-  AH_TEMPLATE([LIBGNURL_PROTOCOL_TFTP],[Defined if libgnurl supports TFTP])
-  AH_TEMPLATE([LIBGNURL_PROTOCOL_RTSP],[Defined if libgnurl supports RTSP])
-  AH_TEMPLATE([LIBGNURL_PROTOCOL_POP3],[Defined if libgnurl supports POP3])
-  AH_TEMPLATE([LIBGNURL_PROTOCOL_IMAP],[Defined if libgnurl supports IMAP])
-  AH_TEMPLATE([LIBGNURL_PROTOCOL_SMTP],[Defined if libgnurl supports SMTP])
-
-  AC_ARG_WITH(libgnurl,
-     AC_HELP_STRING([--with-libgnurl=PREFIX],[look for the gnurl library in 
PREFIX/lib and headers in PREFIX/include]),
-     [_libgnurl_with=$withval],[_libgnurl_with=ifelse([$1],,[yes],[$1])])
-
-  if test "$_libgnurl_with" != "no" ; then
-
-     AC_PROG_AWK
-
-     _libgnurl_version_parse="eval $AWK '{split(\$NF,A,\".\"); 
X=256*256*A[[1]]+256*A[[2]]+A[[3]]; print X;}'"
-
-     _libgnurl_try_link=yes
-
-     if test -d "$_libgnurl_with" ; then
-        LIBGNURL_CPPFLAGS="-I$withval/include"
-        _libgnurl_ldflags="-L$withval/lib"
-        AC_PATH_PROG([_libgnurl_config],[gnurl-config],[],
-                     ["$withval/bin"])
-     else
-        AC_PATH_PROG([_libgnurl_config],[gnurl-config],[],[$PATH])
-     fi
-
-     if test x$_libgnurl_config != "x" ; then
-        AC_CACHE_CHECK([for the version of libgnurl],
-           [libgnurl_cv_lib_gnurl_version],
-           [libgnurl_cv_lib_gnurl_version=`$_libgnurl_config --version | $AWK 
'{print $[]2}'`])
-
-        _libgnurl_version=`echo $libgnurl_cv_lib_gnurl_version | 
$_libgnurl_version_parse`
-        _libgnurl_wanted=`echo ifelse([$2],,[0],[$2]) | 
$_libgnurl_version_parse`
-
-        if test $_libgnurl_wanted -gt 0 ; then
-           AC_CACHE_CHECK([for libgnurl >= version $2],
-              [libgnurl_cv_lib_version_ok],
-              [
-              if test $_libgnurl_version -ge $_libgnurl_wanted ; then
-                 libgnurl_cv_lib_version_ok=yes
-              else
-                 libgnurl_cv_lib_version_ok=no
-              fi
-              ])
-        fi
-
-        if test $_libgnurl_wanted -eq 0 || test x$libgnurl_cv_lib_version_ok = 
xyes ; then
-           if test x"$LIBGNURL_CPPFLAGS" = "x" ; then
-              LIBGNURL_CPPFLAGS=`$_libgnurl_config --cflags`
-           fi
-           if test x"$LIBGNURL" = "x" ; then
-              LIBGNURL=`$_libgnurl_config --libs`
-
-              # This is so silly, but Apple actually has a bug in their
-              # gnurl-config script.  Fixed in Tiger, but there are still
-              # lots of Panther installs around.
-              case "${host}" in
-                 powerpc-apple-darwin7*)
-                    LIBGNURL=`echo $LIBGNURL | sed -e 's|-arch i386||g'`
-                 ;;
-              esac
-           fi
-
-           # All gnurl-config scripts support --feature
-           _libgnurl_features=`$_libgnurl_config --feature`
-
-           # Is it modern enough to have --protocols? (7.12.4)
-           if test $_libgnurl_version -ge 461828 ; then
-              _libgnurl_protocols=`$_libgnurl_config --protocols`
-           fi
-        else
-           _libgnurl_try_link=no
-        fi
-
-        unset _libgnurl_wanted
-     fi
-
-     if test $_libgnurl_try_link = yes ; then
-
-        # we didn't find gnurl-config, so let's see if the user-supplied
-        # link line (or failing that, "-lgnurl") is enough.
-        LIBGNURL=${LIBGNURL-"$_libgnurl_ldflags -lgnurl"}
-
-        AC_CACHE_CHECK([whether libgnurl is usable],
-           [libgnurl_cv_lib_gnurl_usable],
-           [
-           _libgnurl_save_cppflags=$CPPFLAGS
-           CPPFLAGS="$LIBGNURL_CPPFLAGS $CPPFLAGS"
-           _libgnurl_save_libs=$LIBS
-           LIBS="$LIBGNURL $LIBS"
-
-           AC_LINK_IFELSE([AC_LANG_PROGRAM([#include <curl/curl.h>],[
-/* Try and use a few common options to force a failure if we are
-   missing symbols or can't link. */
-int x;
-curl_easy_setopt(NULL,CURLOPT_URL,NULL);
-x=CURL_ERROR_SIZE;
-x=CURLOPT_WRITEFUNCTION;
-x=CURLOPT_FILE;
-x=CURLOPT_ERRORBUFFER;
-x=CURLOPT_STDERR;
-x=CURLOPT_VERBOSE;
-])],libgnurl_cv_lib_gnurl_usable=yes,libgnurl_cv_lib_gnurl_usable=no)
-
-           CPPFLAGS=$_libgnurl_save_cppflags
-           LIBS=$_libgnurl_save_libs
-           unset _libgnurl_save_cppflags
-           unset _libgnurl_save_libs
-           ])
-
-        if test $libgnurl_cv_lib_gnurl_usable = yes ; then
-
-           # Does gnurl_free() exist in this version of libgnurl?
-           # If not, fake it with free()
-
-           _libgnurl_save_cppflags=$CPPFLAGS
-           CPPFLAGS="$CPPFLAGS $LIBGNURL_CPPFLAGS"
-           _libgnurl_save_libs=$LIBS
-           LIBS="$LIBS $LIBGNURL"
-
-           AC_CHECK_FUNC(curl_free,,
-              AC_DEFINE(curl_free,free,
-                [Define curl_free() as free() if our version of gnurl lacks 
curl_free.]))
-
-           CPPFLAGS=$_libgnurl_save_cppflags
-           LIBS=$_libgnurl_save_libs
-           unset _libgnurl_save_cppflags
-           unset _libgnurl_save_libs
-
-           AC_DEFINE(HAVE_LIBGNURL,1,
-             [Define to 1 if you have a functional gnurl library.])
-           AC_SUBST(LIBGNURL_CPPFLAGS)
-           AC_SUBST(LIBGNURL)
-
-           for _libgnurl_feature in $_libgnurl_features ; do
-              
AC_DEFINE_UNQUOTED(AS_TR_CPP(libgnurl_feature_$_libgnurl_feature),[1])
-              eval AS_TR_SH(libgnurl_feature_$_libgnurl_feature)=yes
-           done
-
-           if test "x$_libgnurl_protocols" = "x" ; then
-
-              # We don't have --protocols, so just assume that all
-              # protocols are available
-              _libgnurl_protocols="HTTP FTP FILE TELNET LDAP DICT TFTP"
-
-              if test x$libgnurl_feature_SSL = xyes ; then
-                 _libgnurl_protocols="$_libgnurl_protocols HTTPS"
-
-                 # FTPS wasn't standards-compliant until version
-                 # 7.11.0 (0x070b00 == 461568)
-                 if test $_libgnurl_version -ge 461568; then
-                    _libgnurl_protocols="$_libgnurl_protocols FTPS"
-                 fi
-              fi
-
-              # RTSP, IMAP, POP3 and SMTP were added in
-              # 7.20.0 (0x071400 == 463872)
-              if test $_libgnurl_version -ge 463872; then
-                 _libgnurl_protocols="$_libgnurl_protocols RTSP IMAP POP3 SMTP"
-              fi
-           fi
-
-           for _libgnurl_protocol in $_libgnurl_protocols ; do
-              
AC_DEFINE_UNQUOTED(AS_TR_CPP(libgnurl_protocol_$_libgnurl_protocol),[1])
-              eval AS_TR_SH(libgnurl_protocol_$_libgnurl_protocol)=yes
-           done
-        else
-           unset LIBGNURL
-           unset LIBGNURL_CPPFLAGS
-        fi
-     fi
-
-     unset _libgnurl_try_link
-     unset _libgnurl_version_parse
-     unset _libgnurl_config
-     unset _libgnurl_feature
-     unset _libgnurl_features
-     unset _libgnurl_protocol
-     unset _libgnurl_protocols
-     unset _libgnurl_version
-     unset _libgnurl_ldflags
-  fi
-
-  if test x$_libgnurl_with = xno || test x$libgnurl_cv_lib_gnurl_usable != 
xyes ; then
-     # This is the IF-NO path
-     ifelse([$4],,:,[$4])
-  else
-     # This is the IF-YES path
-     ifelse([$3],,:,[$3])
-  fi
-
-  unset _libgnurl_with
-])dnl
diff --git a/src/authorization/anastasis-helper-authorization-iban.c 
b/src/authorization/anastasis-helper-authorization-iban.c
index c6e5335..caf4d3f 100644
--- a/src/authorization/anastasis-helper-authorization-iban.c
+++ b/src/authorization/anastasis-helper-authorization-iban.c
@@ -48,7 +48,7 @@ static struct ANASTASIS_EUFIN_AuthenticationData auth;
 /**
  * Bank account IBAN this process is monitoring.
  */
-static char *iban;
+static char *authorization_iban;
 
 /**
  * Active request for history.
@@ -403,7 +403,7 @@ run (void *cls,
       GNUNET_CONFIGURATION_get_value_string (cfg,
                                              "authorization-iban",
                                              "CREDIT_IBAN",
-                                             &iban))
+                                             &authorization_iban))
   {
     GNUNET_log_config_missing (GNUNET_ERROR_TYPE_ERROR,
                                "authorization-iban",
@@ -430,7 +430,7 @@ run (void *cls,
     enum GNUNET_DB_QueryStatus qs;
 
     qs = db_plugin->get_last_auth_iban_payment_row (db_plugin->cls,
-                                                    iban,
+                                                    authorization_iban,
                                                     &latest_row_off);
     if (qs < 0)
     {
diff --git a/src/authorization/anastasis_authorization_plugin.c 
b/src/authorization/anastasis_authorization_plugin.c
index 7e25c03..cd7b4cb 100644
--- a/src/authorization/anastasis_authorization_plugin.c
+++ b/src/authorization/anastasis_authorization_plugin.c
@@ -172,6 +172,10 @@ static char *old_dlsearchpath;
  * Setup libtool paths.
  */
 void __attribute__ ((constructor))
+anastasis_authorization_plugin_init (void);
+
+/* declaration to fix compiler warning */
+void __attribute__ ((constructor))
 anastasis_authorization_plugin_init (void)
 {
   int err;
@@ -213,6 +217,10 @@ anastasis_authorization_plugin_init (void)
  * Shutdown libtool.
  */
 void __attribute__ ((destructor))
+anastasis_authorization_plugin_fini (void);
+
+/* declaration to fix compiler warning */
+void __attribute__ ((destructor))
 anastasis_authorization_plugin_fini (void)
 {
   lt_dlsetsearchpath (old_dlsearchpath);
diff --git a/src/authorization/anastasis_authorization_plugin_email.c 
b/src/authorization/anastasis_authorization_plugin_email.c
index 7fc97e7..2335de7 100644
--- a/src/authorization/anastasis_authorization_plugin_email.c
+++ b/src/authorization/anastasis_authorization_plugin_email.c
@@ -536,6 +536,10 @@ email_cleanup (struct ANASTASIS_AUTHORIZATION_State *as)
  * @return NULL on error, otherwise a `struct ANASTASIS_AuthorizationPlugin`
  */
 void *
+libanastasis_plugin_authorization_email_init (void *cls);
+
+/* declaration to fix compiler warning */
+void *
 libanastasis_plugin_authorization_email_init (void *cls)
 {
   const struct ANASTASIS_AuthorizationContext *ac = cls;
@@ -625,6 +629,10 @@ libanastasis_plugin_authorization_email_init (void *cls)
  * @return NULL (always)
  */
 void *
+libanastasis_plugin_authorization_email_done (void *cls);
+
+/* declaration to fix compiler warning */
+void *
 libanastasis_plugin_authorization_email_done (void *cls)
 {
   struct ANASTASIS_AuthorizationPlugin *plugin = cls;
diff --git a/src/authorization/anastasis_authorization_plugin_file.c 
b/src/authorization/anastasis_authorization_plugin_file.c
index 2f4fcb4..0187524 100644
--- a/src/authorization/anastasis_authorization_plugin_file.c
+++ b/src/authorization/anastasis_authorization_plugin_file.c
@@ -291,6 +291,10 @@ file_cleanup (struct ANASTASIS_AUTHORIZATION_State *as)
  * @return NULL on error, otherwise a `struct ANASTASIS_AuthorizationPlugin`
  */
 void *
+libanastasis_plugin_authorization_file_init (void *cls);
+
+/* declaration to fix compiler warning */
+void *
 libanastasis_plugin_authorization_file_init (void *cls)
 {
   const struct ANASTASIS_AuthorizationContext *ac = cls;
@@ -317,6 +321,10 @@ libanastasis_plugin_authorization_file_init (void *cls)
  * @return NULL (always)
  */
 void *
+libanastasis_plugin_authorization_file_done (void *cls);
+
+/* declaration to fix compiler warning */
+void *
 libanastasis_plugin_authorization_file_done (void *cls)
 {
   struct ANASTASIS_AuthorizationPlugin *plugin = cls;
diff --git a/src/authorization/anastasis_authorization_plugin_iban.c 
b/src/authorization/anastasis_authorization_plugin_iban.c
index 92b4565..1bb23d2 100644
--- a/src/authorization/anastasis_authorization_plugin_iban.c
+++ b/src/authorization/anastasis_authorization_plugin_iban.c
@@ -635,6 +635,10 @@ iban_cleanup (struct ANASTASIS_AUTHORIZATION_State *as)
  * @return NULL on error, otherwise a `struct ANASTASIS_AuthorizationPlugin`
  */
 void *
+libanastasis_plugin_authorization_iban_init (void *cls);
+
+/* declaration to fix compiler warning */
+void *
 libanastasis_plugin_authorization_iban_init (void *cls)
 {
   struct ANASTASIS_AuthorizationContext *ac = cls;
@@ -733,6 +737,10 @@ libanastasis_plugin_authorization_iban_init (void *cls)
  * @return NULL (always)
  */
 void *
+libanastasis_plugin_authorization_iban_done (void *cls);
+
+/* declaration to fix compiler warning */
+void *
 libanastasis_plugin_authorization_iban_done (void *cls)
 {
   struct ANASTASIS_AuthorizationPlugin *plugin = cls;
diff --git a/src/authorization/anastasis_authorization_plugin_post.c 
b/src/authorization/anastasis_authorization_plugin_post.c
index 9410b58..99cda96 100644
--- a/src/authorization/anastasis_authorization_plugin_post.c
+++ b/src/authorization/anastasis_authorization_plugin_post.c
@@ -591,6 +591,10 @@ post_cleanup (struct ANASTASIS_AUTHORIZATION_State *as)
  * @return NULL on error, otherwise a `struct ANASTASIS_AuthorizationPlugin`
  */
 void *
+libanastasis_plugin_authorization_post_init (void *cls);
+
+/* declaration to fix compiler warning */
+void *
 libanastasis_plugin_authorization_post_init (void *cls)
 {
   const struct ANASTASIS_AuthorizationContext *ac = cls;
@@ -665,6 +669,10 @@ libanastasis_plugin_authorization_post_init (void *cls)
  * @return NULL (always)
  */
 void *
+libanastasis_plugin_authorization_post_done (void *cls);
+
+/* declaration to fix compiler warning */
+void *
 libanastasis_plugin_authorization_post_done (void *cls)
 {
   struct ANASTASIS_AuthorizationPlugin *plugin = cls;
diff --git a/src/authorization/anastasis_authorization_plugin_sms.c 
b/src/authorization/anastasis_authorization_plugin_sms.c
index 695e5d8..c11c88f 100644
--- a/src/authorization/anastasis_authorization_plugin_sms.c
+++ b/src/authorization/anastasis_authorization_plugin_sms.c
@@ -526,6 +526,10 @@ sms_cleanup (struct ANASTASIS_AUTHORIZATION_State *as)
  * @return NULL on error, otherwise a `struct ANASTASIS_AuthorizationPlugin`
  */
 void *
+libanastasis_plugin_authorization_sms_init (void *cls);
+
+/* declaration to fix compiler warning */
+void *
 libanastasis_plugin_authorization_sms_init (void *cls)
 {
   const struct ANASTASIS_AuthorizationContext *ac = cls;
@@ -614,6 +618,10 @@ libanastasis_plugin_authorization_sms_init (void *cls)
  * @return NULL (always)
  */
 void *
+libanastasis_plugin_authorization_sms_done (void *cls);
+
+/* declaration to fix compiler warning */
+void *
 libanastasis_plugin_authorization_sms_done (void *cls)
 {
   struct ANASTASIS_AuthorizationPlugin *plugin = cls;
diff --git a/src/authorization/anastasis_authorization_plugin_totp.c 
b/src/authorization/anastasis_authorization_plugin_totp.c
index c127e38..6832b0d 100644
--- a/src/authorization/anastasis_authorization_plugin_totp.c
+++ b/src/authorization/anastasis_authorization_plugin_totp.c
@@ -35,7 +35,7 @@
  * How long is a TOTP code valid?
  */
 #define TOTP_VALIDITY_PERIOD GNUNET_TIME_relative_multiply ( \
-    GNUNET_TIME_UNIT_SECONDS, 30)
+          GNUNET_TIME_UNIT_SECONDS, 30)
 
 /**
  * Range of time we allow (plus-minus).
@@ -345,6 +345,10 @@ totp_cleanup (struct ANASTASIS_AUTHORIZATION_State *as)
  * @return NULL on error, otherwise a `struct ANASTASIS_AuthorizationPlugin`
  */
 void *
+libanastasis_plugin_authorization_totp_init (void *cls);
+
+/* declaration to fix compiler warning */
+void *
 libanastasis_plugin_authorization_totp_init (void *cls)
 {
   const struct ANASTASIS_AuthorizationContext *ac = cls;
@@ -372,6 +376,10 @@ libanastasis_plugin_authorization_totp_init (void *cls)
  * @return NULL (always)
  */
 void *
+libanastasis_plugin_authorization_totp_done (void *cls);
+
+/* declaration to fix compiler warning */
+void *
 libanastasis_plugin_authorization_totp_done (void *cls)
 {
   struct ANASTASIS_AuthorizationPlugin *plugin = cls;
diff --git a/src/backend/anastasis-httpd_policy-upload.c 
b/src/backend/anastasis-httpd_policy-upload.c
index 83e8117..ebaafa9 100644
--- a/src/backend/anastasis-httpd_policy-upload.c
+++ b/src/backend/anastasis-httpd_policy-upload.c
@@ -35,7 +35,7 @@
  * we are awaiting payment before giving up?
  */
 #define CHECK_PAYMENT_GENERIC_TIMEOUT GNUNET_TIME_relative_multiply ( \
-    GNUNET_TIME_UNIT_SECONDS, 30)
+          GNUNET_TIME_UNIT_SECONDS, 30)
 
 
 /**
@@ -258,7 +258,7 @@ make_payment_request (struct PolicyUploadContext *puc)
   TALER_MHD_add_global_headers (resp);
   {
     char *hdr;
-    char *pfx;
+    const char *pfx;
     char *hn;
 
     if (0 == strncasecmp ("https://";,
@@ -536,7 +536,8 @@ await_payment (struct PolicyUploadContext *puc)
     puc->cpo = TALER_MERCHANT_merchant_order_get (AH_ctx,
                                                   AH_backend_url,
                                                   order_id,
-                                                  NULL /* our payments are NOT 
session-bound */,
+                                                  NULL /* our payments are NOT 
session-bound */
+                                                  ,
                                                   timeout,
                                                   &check_payment_cb,
                                                   puc);
@@ -763,7 +764,8 @@ AH_handler_policy_post (
             GNUNET_STRINGS_string_to_data (etag + 1,
                                            strlen (etag) - 2,
                                            &puc->new_policy_upload_hash,
-                                           sizeof 
(puc->new_policy_upload_hash))) )
+                                           sizeof 
(puc->new_policy_upload_hash))
+           ) )
       {
         GNUNET_break_op (0);
         return TALER_MHD_reply_with_error (connection,
@@ -941,7 +943,7 @@ AH_handler_policy_post (
 
     /* Check if existing policy matches upload (and if, skip it) */
     {
-      struct GNUNET_HashCode hc;
+      struct GNUNET_HashCode hash;
       enum ANASTASIS_DB_AccountStatus as;
       uint32_t version;
       struct GNUNET_TIME_Timestamp now;
@@ -950,7 +952,7 @@ AH_handler_policy_post (
       as = db->lookup_account (db->cls,
                                account_pub,
                                &puc->paid_until,
-                               &hc,
+                               &hash,
                                &version);
       now = GNUNET_TIME_timestamp_get ();
       if (GNUNET_TIME_timestamp_cmp (puc->paid_until,
@@ -988,7 +990,7 @@ AH_handler_policy_post (
         /* continue below */
         break;
       case ANASTASIS_DB_ACCOUNT_STATUS_VALID_HASH_RETURNED:
-        if (0 == GNUNET_memcmp (&hc,
+        if (0 == GNUNET_memcmp (&hash,
                                 &puc->new_policy_upload_hash))
         {
           /* Refuse upload: we already have that backup! */
diff --git a/src/backend/anastasis-httpd_truth-challenge.c 
b/src/backend/anastasis-httpd_truth-challenge.c
index a7d138f..98657f4 100644
--- a/src/backend/anastasis-httpd_truth-challenge.c
+++ b/src/backend/anastasis-httpd_truth-challenge.c
@@ -36,19 +36,19 @@
  * clients to attempt to answer security questions?
  */
 #define MAX_QUESTION_FREQ GNUNET_TIME_relative_multiply ( \
-    GNUNET_TIME_UNIT_SECONDS, 30)
+          GNUNET_TIME_UNIT_SECONDS, 30)
 
 /**
  * How long should the wallet check for auto-refunds before giving up?
  */
 #define AUTO_REFUND_TIMEOUT GNUNET_TIME_relative_multiply ( \
-    GNUNET_TIME_UNIT_MINUTES, 2)
+          GNUNET_TIME_UNIT_MINUTES, 2)
 
 /**
  * How long should the wallet check for payment before giving up?
  */
 #define PAYMENT_TIMEOUT GNUNET_TIME_relative_multiply ( \
-    GNUNET_TIME_UNIT_SECONDS, 15)
+          GNUNET_TIME_UNIT_SECONDS, 15)
 
 
 /**
@@ -720,7 +720,8 @@ check_payment_cb (void *cls,
       if (0 <= qs)
       {
         GNUNET_log (GNUNET_ERROR_TYPE_INFO,
-                    "Order has been paid, continuing with request 
processing\n");
+                    "Order has been paid, continuing with request 
processing\n")
+        ;
         return; /* continue as planned */
       }
       GNUNET_break (0);
@@ -1043,17 +1044,17 @@ AH_handler_truth_challenge (
           &gc->no_payment_identifier_provided),
         GNUNET_JSON_spec_end ()
       };
-      enum GNUNET_GenericReturnValue res;
+      enum GNUNET_GenericReturnValue pres;
 
-      res = TALER_MHD_parse_json_data (connection,
-                                       gc->root,
-                                       spec);
-      if (GNUNET_SYSERR == res)
+      pres = TALER_MHD_parse_json_data (connection,
+                                        gc->root,
+                                        spec);
+      if (GNUNET_SYSERR == pres)
       {
         GNUNET_break (0);
         return MHD_NO; /* hard failure */
       }
-      if (GNUNET_NO == res)
+      if (GNUNET_NO == pres)
       {
         GNUNET_break_op (0);
         return MHD_YES; /* failure */
diff --git a/src/backend/anastasis-httpd_truth-solve.c 
b/src/backend/anastasis-httpd_truth-solve.c
index eb09dc7..5403634 100644
--- a/src/backend/anastasis-httpd_truth-solve.c
+++ b/src/backend/anastasis-httpd_truth-solve.c
@@ -36,13 +36,13 @@
  * clients to attempt to answer security questions?
  */
 #define MAX_QUESTION_FREQ GNUNET_TIME_relative_multiply ( \
-    GNUNET_TIME_UNIT_SECONDS, 30)
+          GNUNET_TIME_UNIT_SECONDS, 30)
 
 /**
  * How long should the wallet check for auto-refunds before giving up?
  */
 #define AUTO_REFUND_TIMEOUT GNUNET_TIME_relative_multiply ( \
-    GNUNET_TIME_UNIT_MINUTES, 2)
+          GNUNET_TIME_UNIT_MINUTES, 2)
 
 
 /**
@@ -567,7 +567,8 @@ check_payment_cb (void *cls,
       if (0 <= qs)
       {
         GNUNET_log (GNUNET_ERROR_TYPE_INFO,
-                    "Order has been paid, continuing with request 
processing\n");
+                    "Order has been paid, continuing with request 
processing\n")
+        ;
         return; /* continue as planned */
       }
       GNUNET_break (0);
@@ -1213,17 +1214,17 @@ AH_handler_truth_solve (
           &gc->no_payment_identifier_provided),
         GNUNET_JSON_spec_end ()
       };
-      enum GNUNET_GenericReturnValue res;
+      enum GNUNET_GenericReturnValue pres;
 
-      res = TALER_MHD_parse_json_data (connection,
-                                       gc->root,
-                                       spec);
-      if (GNUNET_SYSERR == res)
+      pres = TALER_MHD_parse_json_data (connection,
+                                        gc->root,
+                                        spec);
+      if (GNUNET_SYSERR == pres)
       {
         GNUNET_break (0);
         return MHD_NO; /* hard failure */
       }
-      if (GNUNET_NO == res)
+      if (GNUNET_NO == pres)
       {
         GNUNET_break_op (0);
         return MHD_YES; /* failure */
diff --git a/src/backend/anastasis-httpd_truth-upload.c 
b/src/backend/anastasis-httpd_truth-upload.c
index 1c2a58d..cf3454d 100644
--- a/src/backend/anastasis-httpd_truth-upload.c
+++ b/src/backend/anastasis-httpd_truth-upload.c
@@ -484,7 +484,8 @@ begin_payment (struct TruthUploadContext *tuc)
   tuc->cpo = TALER_MERCHANT_merchant_order_get (AH_ctx,
                                                 AH_backend_url,
                                                 order_id,
-                                                NULL /* our payments are NOT 
session-bound */,
+                                                NULL /* our payments are NOT 
session-bound */
+                                                ,
                                                 timeout,
                                                 &check_payment_cb,
                                                 tuc);
@@ -521,7 +522,6 @@ AH_handler_truth_post (
   size_t encrypted_truth_size;
   const char *truth_mime = NULL;
   const char *type;
-  enum GNUNET_DB_QueryStatus qs;
   uint32_t storage_years;
   struct GNUNET_TIME_Timestamp paid_until
     = GNUNET_TIME_UNIT_ZERO_TS;
@@ -700,81 +700,85 @@ AH_handler_truth_post (
               "Storing truth %s until %s!\n",
               TALER_B2S (truth_uuid),
               GNUNET_TIME_timestamp2s (paid_until));
-  qs = db->store_truth (db->cls,
-                        truth_uuid,
-                        &key_share_data,
-                        (NULL == truth_mime)
+  {
+    enum GNUNET_DB_QueryStatus qs;
+
+    qs = db->store_truth (db->cls,
+                          truth_uuid,
+                          &key_share_data,
+                          (NULL == truth_mime)
                         ? ""
                         : truth_mime,
-                        encrypted_truth,
-                        encrypted_truth_size,
-                        type,
-                        GNUNET_TIME_absolute_get_remaining (
-                          paid_until.abs_time));
-  switch (qs)
-  {
-  case GNUNET_DB_STATUS_HARD_ERROR:
-  case GNUNET_DB_STATUS_SOFT_ERROR:
-    GNUNET_break (0);
-    GNUNET_JSON_parse_free (spec);
-    return TALER_MHD_reply_with_error (connection,
-                                       MHD_HTTP_INTERNAL_SERVER_ERROR,
-                                       TALER_EC_GENERIC_DB_INVARIANT_FAILURE,
-                                       "store_truth");
-  case GNUNET_DB_STATUS_SUCCESS_NO_RESULTS:
+                          encrypted_truth,
+                          encrypted_truth_size,
+                          type,
+                          GNUNET_TIME_absolute_get_remaining (
+                            paid_until.abs_time));
+    switch (qs)
     {
-      void *xtruth;
-      size_t xtruth_size;
-      char *xtruth_mime;
-      char *xmethod;
-      bool ok = false;
-
-      if (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT ==
-          db->get_escrow_challenge (db->cls,
-                                    truth_uuid,
-                                    &xtruth,
-                                    &xtruth_size,
-                                    &xtruth_mime,
-                                    &xmethod))
+    case GNUNET_DB_STATUS_HARD_ERROR:
+    case GNUNET_DB_STATUS_SOFT_ERROR:
+      GNUNET_break (0);
+      GNUNET_JSON_parse_free (spec);
+      return TALER_MHD_reply_with_error (connection,
+                                         MHD_HTTP_INTERNAL_SERVER_ERROR,
+                                         TALER_EC_GENERIC_DB_INVARIANT_FAILURE,
+                                         "store_truth");
+    case GNUNET_DB_STATUS_SUCCESS_NO_RESULTS:
       {
-        ok = ( (xtruth_size == encrypted_truth_size) &&
-               (0 == strcmp (xmethod,
-                             type)) &&
-               (0 == strcmp (((NULL == truth_mime) ? "" : truth_mime),
-                             ((NULL == xtruth_mime) ? "" : xtruth_mime))) &&
-               (0 == memcmp (xtruth,
-                             encrypted_truth,
-                             xtruth_size)) );
-        GNUNET_free (encrypted_truth);
-        GNUNET_free (xtruth_mime);
-        GNUNET_free (xmethod);
+        void *xtruth;
+        size_t xtruth_size;
+        char *xtruth_mime;
+        char *xmethod;
+        bool ok = false;
+
+        if (GNUNET_DB_STATUS_SUCCESS_ONE_RESULT ==
+            db->get_escrow_challenge (db->cls,
+                                      truth_uuid,
+                                      &xtruth,
+                                      &xtruth_size,
+                                      &xtruth_mime,
+                                      &xmethod))
+        {
+          ok = ( (xtruth_size == encrypted_truth_size) &&
+                 (0 == strcmp (xmethod,
+                               type)) &&
+                 (0 == strcmp (((NULL == truth_mime) ? "" : truth_mime),
+                               ((NULL == xtruth_mime) ? "" : xtruth_mime))) &&
+                 (0 == memcmp (xtruth,
+                               encrypted_truth,
+                               xtruth_size)) );
+          GNUNET_free (encrypted_truth);
+          GNUNET_free (xtruth_mime);
+          GNUNET_free (xmethod);
+        }
+        if (! ok)
+        {
+          GNUNET_JSON_parse_free (spec);
+
+          return TALER_MHD_reply_with_error (connection,
+                                             MHD_HTTP_CONFLICT,
+                                             
TALER_EC_ANASTASIS_TRUTH_UPLOAD_UUID_EXISTS,
+                                             NULL);
+        }
+        /* idempotency detected, intentional fall through! */
       }
-      if (! ok)
+    case GNUNET_DB_STATUS_SUCCESS_ONE_RESULT:
       {
-        GNUNET_JSON_parse_free (spec);
+        struct MHD_Response *resp;
 
-        return TALER_MHD_reply_with_error (connection,
-                                           MHD_HTTP_CONFLICT,
-                                           
TALER_EC_ANASTASIS_TRUTH_UPLOAD_UUID_EXISTS,
-                                           NULL);
+        GNUNET_JSON_parse_free (spec);
+        resp = MHD_create_response_from_buffer (0,
+                                                NULL,
+                                                MHD_RESPMEM_PERSISTENT);
+        TALER_MHD_add_global_headers (resp);
+        ret = MHD_queue_response (connection,
+                                  MHD_HTTP_NO_CONTENT,
+                                  resp);
+        MHD_destroy_response (resp);
+        GNUNET_break (MHD_YES == ret);
+        return ret;
       }
-      /* idempotency detected, intentional fall through! */
-    }
-  case GNUNET_DB_STATUS_SUCCESS_ONE_RESULT:
-    {
-      struct MHD_Response *resp;
-
-      GNUNET_JSON_parse_free (spec);
-      resp = MHD_create_response_from_buffer (0,
-                                              NULL,
-                                              MHD_RESPMEM_PERSISTENT);
-      TALER_MHD_add_global_headers (resp);
-      ret = MHD_queue_response (connection,
-                                MHD_HTTP_NO_CONTENT,
-                                resp);
-      MHD_destroy_response (resp);
-      GNUNET_break (MHD_YES == ret);
-      return ret;
     }
   }
   GNUNET_JSON_parse_free (spec);
diff --git a/src/cli/anastasis-cli-discover.c b/src/cli/anastasis-cli-discover.c
index f614165..ed7a4c7 100644
--- a/src/cli/anastasis-cli-discover.c
+++ b/src/cli/anastasis-cli-discover.c
@@ -162,9 +162,9 @@ run (void *cls,
      const char *cfgfile,
      const struct GNUNET_CONFIGURATION_Handle *cfg)
 {
-  (void) cls;
   json_error_t error;
 
+  (void) cls;
   GNUNET_log (GNUNET_ERROR_TYPE_INFO,
               "Starting anastasis-discover\n");
   GNUNET_SCHEDULER_add_shutdown (&shutdown_task,
diff --git a/src/cli/anastasis-cli-redux.c b/src/cli/anastasis-cli-redux.c
index e2d2e1d..4d8e320 100644
--- a/src/cli/anastasis-cli-redux.c
+++ b/src/cli/anastasis-cli-redux.c
@@ -208,9 +208,9 @@ run (void *cls,
      const char *cfgfile,
      const struct GNUNET_CONFIGURATION_Handle *cfg)
 {
-  (void) cls;
   json_error_t error;
 
+  (void) cls;
   GNUNET_log (GNUNET_ERROR_TYPE_INFO,
               "Starting anastasis-reducer\n");
   GNUNET_SCHEDULER_add_shutdown (&shutdown_task,
diff --git a/src/lib/anastasis_recovery.c b/src/lib/anastasis_recovery.c
index 41f35a5..f832af7 100644
--- a/src/lib/anastasis_recovery.c
+++ b/src/lib/anastasis_recovery.c
@@ -879,7 +879,7 @@ policy_lookup_cb (void *cls,
   {
     struct DecryptionPolicy *dp = &r->dps[j];
     const json_t *uuids;
-    json_t *uuid;
+    json_t *juuid;
     size_t n_index;
     struct GNUNET_JSON_Specification spec[] = {
       GNUNET_JSON_spec_varsize ("master_key",
@@ -924,9 +924,9 @@ policy_lookup_cb (void *cls,
     dp->pub_details.challenges
       = GNUNET_new_array (dp->pub_details.challenges_length,
                           struct ANASTASIS_Challenge *);
-    json_array_foreach (uuids, n_index, uuid)
+    json_array_foreach (uuids, n_index, juuid)
     {
-      const char *uuid_str = json_string_value (uuid);
+      const char *uuid_str = json_string_value (juuid);
       struct ANASTASIS_CRYPTO_TruthUUIDP uuid;
       bool found = false;
 
diff --git a/src/reducer/anastasis_api_backup_redux.c 
b/src/reducer/anastasis_api_backup_redux.c
index 6ca6de7..c91f9b0 100644
--- a/src/reducer/anastasis_api_backup_redux.c
+++ b/src/reducer/anastasis_api_backup_redux.c
@@ -354,7 +354,7 @@ add_authentication (json_t *state,
     json_object_foreach (auth_providers, url, details)
     {
       const json_t *methods = NULL;
-      json_t *method;
+      json_t *imethod;
       size_t index;
       uint32_t size_limit_in_mb = 0;
       const char *status;
@@ -396,11 +396,11 @@ add_authentication (json_t *state,
         GNUNET_break (0);
         continue;
       }
-      json_array_foreach (methods, index, method)
+      json_array_foreach (methods, index, imethod)
       {
         const char *type;
 
-        type = json_string_value (json_object_get (method,
+        type = json_string_value (json_object_get (imethod,
                                                    "type"));
         GNUNET_break (NULL != type);
         if ( (NULL != type) &&
@@ -971,9 +971,7 @@ eval_provider_selection (struct PolicyBuilder *pb,
       GNUNET_break (0);
       pb->ec = TALER_EC_ANASTASIS_REDUCER_INPUT_INVALID;
       pb->hint = "'authentication_method' content malformed";
-      for (unsigned int i = 0; i<pb->req_methods; i++)
-        free_costs (policy_ent[i].usage_fee);
-      return;
+      goto cleanup;
     }
 
     if (MHD_HTTP_OK !=
@@ -981,9 +979,7 @@ eval_provider_selection (struct PolicyBuilder *pb,
                                              "http_status")))
     {
       GNUNET_JSON_parse_free (mspec);
-      for (unsigned int i = 0; i<pb->req_methods; i++)
-        free_costs (policy_ent[i].usage_fee);
-      return; /* skip providers that are down */
+      goto cleanup;
     }
     if (GNUNET_OK !=
         GNUNET_JSON_parse (provider_cfg,
@@ -994,9 +990,7 @@ eval_provider_selection (struct PolicyBuilder *pb,
                   "Skipping provider %s: no suitable configuration\n",
                   prov_sel[i]);
       GNUNET_JSON_parse_free (mspec);
-      for (unsigned int i = 0; i<pb->req_methods; i++)
-        free_costs (policy_ent[i].usage_fee);
-      return;
+      goto cleanup;
     }
     json_array_foreach (provider_methods, index, md)
     {
@@ -1018,9 +1012,7 @@ eval_provider_selection (struct PolicyBuilder *pb,
         GNUNET_break (0);
         pb->ec = TALER_EC_ANASTASIS_REDUCER_STATE_INVALID;
         pb->hint = "'methods' of provider";
-        for (unsigned int i = 0; i<pb->req_methods; i++)
-          free_costs (policy_ent[i].usage_fee);
-        return;
+        goto cleanup;
       }
       if ( (0 == strcmp (type,
                          method_type)) &&
@@ -1040,9 +1032,7 @@ eval_provider_selection (struct PolicyBuilder *pb,
       /* Provider does not OFFER this method, combination not possible.
          Cost is basically 'infinite', but we simply then skip this. */
       GNUNET_JSON_parse_free (mspec);
-      for (unsigned int i = 0; i<pb->req_methods; i++)
-        free_costs (policy_ent[i].usage_fee);
-      return;
+      goto cleanup;
     }
     GNUNET_JSON_parse_free (mspec);
   }
@@ -1073,10 +1063,9 @@ eval_provider_selection (struct PolicyBuilder *pb,
 #endif
   if (curr_diversity < pb->best_diversity)
   {
-    for (unsigned int i = 0; i<pb->req_methods; i++)
-      free_costs (policy_ent[i].usage_fee);
-    return; /* do not allow combinations that are bad
-               for provider diversity */
+    /* do not allow combinations that are bad
+       for provider diversity */
+    goto cleanup;
   }
   if (curr_diversity > pb->best_diversity)
   {
@@ -1121,9 +1110,8 @@ eval_provider_selection (struct PolicyBuilder *pb,
       }
       if (equiv)
       {
-        for (unsigned int i = 0; i<pb->req_methods; i++)
-          free_costs (policy_ent[i].usage_fee);
-        return; /* equivalent to known allocation */
+        /* equivalent to known allocation */
+        goto cleanup;
       }
     }
   }
@@ -1143,6 +1131,10 @@ eval_provider_selection (struct PolicyBuilder *pb,
                                  pb->current_policy->pm_tail,
                                  m);
   }
+  return;
+cleanup:
+  for (unsigned int i = 0; i<pb->req_methods; i++)
+    free_costs (policy_ent[i].usage_fee);
 }
 
 
@@ -1530,7 +1522,7 @@ select_policies (struct PolicyBuilder *pb)
   {
     struct PolicyMap best[cnt];
     struct PolicyMap curr[cnt];
-    unsigned int i;
+    unsigned int off;
 
     pb->best_map = best;
     pb->curr_map = curr;
@@ -1542,12 +1534,12 @@ select_policies (struct PolicyBuilder *pb)
                 "Assessed %u/%u policies\n",
                 pb->evaluations,
                 (unsigned int) MAX_EVALUATIONS);
-    i = 0;
+    off = 0;
     for (struct Policy *p = pb->p_head;
          NULL != p;
          p = p->next)
     {
-      struct PolicyMap *pm = &best[i++];
+      struct PolicyMap *pm = &best[off++];
       json_t *method_arr;
 
 #if DEBUG
@@ -1938,16 +1930,16 @@ add_policy (json_t *state,
 
   /* Add all methods from 'arg_array' to 'methods' */
   {
-    size_t index;
+    size_t aindex;
     json_t *method;
 
-    json_array_foreach (arg_array, index, method)
+    json_array_foreach (arg_array, aindex, method)
     {
       const char *provider_url;
       uint32_t method_idx;
       const char *method_type;
       const json_t *prov_methods;
-      struct GNUNET_JSON_Specification spec[] = {
+      struct GNUNET_JSON_Specification ispec[] = {
         GNUNET_JSON_spec_string ("provider",
                                  &provider_url),
         GNUNET_JSON_spec_uint32 ("authentication_method",
@@ -1957,7 +1949,7 @@ add_policy (json_t *state,
 
       if (GNUNET_OK !=
           GNUNET_JSON_parse (method,
-                             spec,
+                             ispec,
                              NULL, NULL))
       {
         GNUNET_break (0);
@@ -2050,9 +2042,9 @@ add_policy (json_t *state,
 
       {
         bool found = false;
-        size_t index;
+        size_t mindex;
         json_t *pm;
-        json_array_foreach (prov_methods, index, pm)
+        json_array_foreach (prov_methods, mindex, pm)
         {
           struct TALER_Amount method_cost;
           const char *type;
@@ -2097,7 +2089,7 @@ add_policy (json_t *state,
       GNUNET_assert (0 ==
                      json_array_append (methods,
                                         method));
-    } /* end of json_array_foreach (arg_array, index, method) */
+    } /* end of json_array_foreach (arg_array, mindex, method) */
   }
 
   /* add new policy to array of existing policies */
@@ -3479,8 +3471,8 @@ share_secret (struct UploadContext *uc)
                                uc->cb_cls,
                                TALER_EC_ANASTASIS_REDUCER_STATE_INVALID,
                                "'providers' entry malformed");
-        for (unsigned int i = 0; i<policies_len; i++)
-          ANASTASIS_policy_destroy (vpolicies[i]);
+        for (unsigned int p = 0; p<policies_len; p++)
+          ANASTASIS_policy_destroy (vpolicies[p]);
         upload_cancel_cb (uc);
         return;
       }
@@ -4135,7 +4127,7 @@ upload (json_t *state,
         uint32_t am_idx;
         const char *provider_url;
         json_t *truth = NULL;
-        struct GNUNET_JSON_Specification spec[] = {
+        struct GNUNET_JSON_Specification ispec[] = {
           GNUNET_JSON_spec_string ("provider",
                                    &provider_url),
           GNUNET_JSON_spec_uint32 ("authentication_method",
@@ -4149,7 +4141,7 @@ upload (json_t *state,
 
         if (GNUNET_OK !=
             GNUNET_JSON_parse (auth_method,
-                               spec,
+                               ispec,
                                NULL, NULL))
         {
           ANASTASIS_redux_fail_ (cb,
diff --git a/src/reducer/anastasis_api_recovery_redux.c 
b/src/reducer/anastasis_api_recovery_redux.c
index e795c55..58963de 100644
--- a/src/reducer/anastasis_api_recovery_redux.c
+++ b/src/reducer/anastasis_api_recovery_redux.c
@@ -20,7 +20,6 @@
  * @author Dominik Meister
  * @author Dennis Neufeld
  */
-
 #include <platform.h>
 #include <jansson.h>
 #include "anastasis_redux.h"
@@ -262,7 +261,7 @@ sctx_free (void *cls)
  * @param cb_cls closure for @a cb
  * @param rc error code to translate to JSON
  */
-void
+static void
 fail_by_error (ANASTASIS_ActionCallback cb,
                void *cb_cls,
                enum ANASTASIS_RecoveryStatus rc)
@@ -750,7 +749,8 @@ start_feedback_cb (
                          &csr->details.bank_transfer_required.amount),
                        csr->details.bank_transfer_required.target_iban,
                        
csr->details.bank_transfer_required.target_business_name,
-                       
csr->details.bank_transfer_required.wire_transfer_subject);
+                       
csr->details.bank_transfer_required.wire_transfer_subject
+                       );
       reply = GNUNET_JSON_PACK (
         GNUNET_JSON_pack_string ("state",
                                  "iban-instructions"),
@@ -1068,7 +1068,6 @@ solve_challenge_cb (void *cls,
                                  &ps),
     GNUNET_JSON_spec_end ()
   };
-  json_t *challenge;
 
   if (NULL == ri)
   {
@@ -1171,57 +1170,61 @@ solve_challenge_cb (void *cls,
   } /* end resuming async challenges */
 
   /* Check if we got a payment_secret */
-  challenge = find_challenge_in_ri (sctx->state,
-                                    &sctx->uuid);
-  if (NULL == challenge)
   {
-    GNUNET_break_op (0);
-    ANASTASIS_redux_fail_ (sctx->cb,
-                           sctx->cb_cls,
-                           TALER_EC_ANASTASIS_REDUCER_STATE_INVALID,
-                           "challenge not found");
-    sctx_free (sctx);
-    return;
-  }
+    json_t *challenge;
 
-  if (NULL !=
-      json_object_get (sctx->args,
-                       "payment_secret"))
-  {
-    /* check if we got payment secret in args */
-    if (GNUNET_OK !=
-        GNUNET_JSON_parse (sctx->args,
-                           pspec,
-                           NULL, NULL))
+    challenge = find_challenge_in_ri (sctx->state,
+                                      &sctx->uuid);
+    if (NULL == challenge)
     {
       GNUNET_break_op (0);
       ANASTASIS_redux_fail_ (sctx->cb,
                              sctx->cb_cls,
-                             TALER_EC_ANASTASIS_REDUCER_INPUT_INVALID,
-                             "'payment_secret' malformed");
+                             TALER_EC_ANASTASIS_REDUCER_STATE_INVALID,
+                             "challenge not found");
       sctx_free (sctx);
       return;
     }
-    psp = &ps;
-  }
-  else if (NULL !=
-           json_object_get (challenge,
-                            "payment_secret"))
-  {
-    if (GNUNET_OK !=
-        GNUNET_JSON_parse (challenge,
-                           pspec,
-                           NULL, NULL))
+
+    if (NULL !=
+        json_object_get (sctx->args,
+                         "payment_secret"))
     {
-      GNUNET_break_op (0);
-      ANASTASIS_redux_fail_ (sctx->cb,
-                             sctx->cb_cls,
-                             TALER_EC_ANASTASIS_REDUCER_STATE_INVALID,
-                             "'payment_secret' malformed");
-      sctx_free (sctx);
-      return;
+      /* check if we got payment secret in args */
+      if (GNUNET_OK !=
+          GNUNET_JSON_parse (sctx->args,
+                             pspec,
+                             NULL, NULL))
+      {
+        GNUNET_break_op (0);
+        ANASTASIS_redux_fail_ (sctx->cb,
+                               sctx->cb_cls,
+                               TALER_EC_ANASTASIS_REDUCER_INPUT_INVALID,
+                               "'payment_secret' malformed");
+        sctx_free (sctx);
+        return;
+      }
+      psp = &ps;
+    }
+    else if (NULL !=
+             json_object_get (challenge,
+                              "payment_secret"))
+    {
+      if (GNUNET_OK !=
+          GNUNET_JSON_parse (challenge,
+                             pspec,
+                             NULL, NULL))
+      {
+        GNUNET_break_op (0);
+        ANASTASIS_redux_fail_ (sctx->cb,
+                               sctx->cb_cls,
+                               TALER_EC_ANASTASIS_REDUCER_STATE_INVALID,
+                               "'payment_secret' malformed");
+        sctx_free (sctx);
+        return;
+      }
+      psp = &ps;
     }
-    psp = &ps;
   }
 
   /* start or solve selected challenge */
diff --git a/src/reducer/anastasis_api_redux.c 
b/src/reducer/anastasis_api_redux.c
index 4b5ad7b..e3f820d 100644
--- a/src/reducer/anastasis_api_redux.c
+++ b/src/reducer/anastasis_api_redux.c
@@ -497,16 +497,16 @@ notify_waiting (struct ConfigRequest *cr)
 
   while (NULL != (w = cr->w_head))
   {
-    json_t *provider_list;
+    json_t *apl;
     json_t *prov;
 
-    if (NULL == (provider_list = json_object_get (w->state,
-                                                  "authentication_providers")))
+    if (NULL == (apl = json_object_get (w->state,
+                                        "authentication_providers")))
     {
       GNUNET_assert (0 ==
                      json_object_set_new (w->state,
                                           "authentication_providers",
-                                          provider_list = json_object ()));
+                                          apl = json_object ()));
     }
     if (TALER_EC_NONE != cr->ec)
     {
@@ -558,7 +558,7 @@ notify_waiting (struct ConfigRequest *cr)
                                  cr->http_status));
     }
     GNUNET_assert (0 ==
-                   json_object_set_new (provider_list,
+                   json_object_set_new (apl,
                                         cr->url,
                                         prov));
     w->cb (w->cb_cls,
@@ -1033,8 +1033,8 @@ select_continent (json_t *state,
                   ANASTASIS_ActionCallback cb,
                   void *cb_cls)
 {
-  const json_t *redux_countries = ANASTASIS_redux_countries_init_ ();
-  const json_t *root = json_object_get (redux_countries,
+  const json_t *rc = ANASTASIS_redux_countries_init_ ();
+  const json_t *root = json_object_get (rc,
                                         "countries");
   const json_t *continent;
   json_t *countries;
@@ -1129,7 +1129,6 @@ select_country (json_t *state,
 {
   const json_t *required_attrs;
   const json_t *country_code;
-  const json_t *redux_id_attr;
 
   if (NULL == arguments)
   {
@@ -1194,18 +1193,23 @@ select_country (json_t *state,
       return NULL;
     }
   }
-  redux_id_attr = redux_id_attr_init (json_string_value (country_code));
-  if (NULL == redux_id_attr)
+
   {
-    GNUNET_break (0);
-    ANASTASIS_redux_fail_ (cb,
-                           cb_cls,
-                           TALER_EC_ANASTASIS_REDUCER_RESOURCE_MISSING,
-                           json_string_value (country_code));
-    return NULL;
+    const json_t *ria;
+
+    ria = redux_id_attr_init (json_string_value (country_code));
+    if (NULL == ria)
+    {
+      GNUNET_break (0);
+      ANASTASIS_redux_fail_ (cb,
+                             cb_cls,
+                             TALER_EC_ANASTASIS_REDUCER_RESOURCE_MISSING,
+                             json_string_value (country_code));
+      return NULL;
+    }
+    required_attrs = json_object_get (ria,
+                                      "required_attributes");
   }
-  required_attrs = json_object_get (redux_id_attr,
-                                    "required_attributes");
   if (NULL == required_attrs)
   {
     ANASTASIS_redux_fail_ (cb,
@@ -2004,14 +2008,14 @@ ANASTASIS_REDUX_load_continents_ ()
 {
   const json_t *countries;
   json_t *continents;
-  const json_t *redux_countries = ANASTASIS_redux_countries_init_ ();
+  const json_t *rc = ANASTASIS_redux_countries_init_ ();
 
-  if (NULL == redux_countries)
+  if (NULL == rc)
   {
     GNUNET_break (0);
     return NULL;
   }
-  countries = json_object_get (redux_countries,
+  countries = json_object_get (rc,
                                "countries");
   if (NULL == countries)
   {
diff --git a/src/reducer/validation_CH_AHV.c b/src/reducer/validation_CH_AHV.c
index 4ea973c..29e41d8 100644
--- a/src/reducer/validation_CH_AHV.c
+++ b/src/reducer/validation_CH_AHV.c
@@ -30,6 +30,10 @@
  * @return true if validation passed, else false
  */
 bool
+CH_AHV_check (const char *ahv_number);
+
+/* declaration to fix compiler warning */
+bool
 CH_AHV_check (const char *ahv_number)
 {
   unsigned int checknum;
diff --git a/src/reducer/validation_CZ_BN.c b/src/reducer/validation_CZ_BN.c
index b570841..32f046b 100644
--- a/src/reducer/validation_CZ_BN.c
+++ b/src/reducer/validation_CZ_BN.c
@@ -31,6 +31,10 @@
  * @return true if b_number is valid
  */
 bool
+CZ_BN_check (const char *b_number);
+
+/* declaration to fix compiler warning */
+bool
 CZ_BN_check (const char *b_number)
 {
   unsigned long long n;
diff --git a/src/reducer/validation_DE_SVN.c b/src/reducer/validation_DE_SVN.c
index e753f0c..db4e181 100644
--- a/src/reducer/validation_DE_SVN.c
+++ b/src/reducer/validation_DE_SVN.c
@@ -51,6 +51,10 @@ q (unsigned int v)
  * @return true if validation passed, else false
  */
 bool
+DE_SVN_check (const char *ssn_number);
+
+/* declaration to fix compiler warning */
+bool
 DE_SVN_check (const char *ssn_number)
 {
   static const unsigned int factors[] = {
diff --git a/src/reducer/validation_DE_TIN.c b/src/reducer/validation_DE_TIN.c
index 5678579..80ffe90 100644
--- a/src/reducer/validation_DE_TIN.c
+++ b/src/reducer/validation_DE_TIN.c
@@ -32,6 +32,10 @@
  * @return true if validation passed, else false
  */
 bool
+DE_TIN_check (const char *tin_number);
+
+/* declaration to fix compiler warning */
+bool
 DE_TIN_check (const char *tin_number)
 {
   unsigned int csum;
diff --git a/src/reducer/validation_ES_DNI.c b/src/reducer/validation_ES_DNI.c
index 5fb3885..6912a0e 100644
--- a/src/reducer/validation_ES_DNI.c
+++ b/src/reducer/validation_ES_DNI.c
@@ -97,6 +97,10 @@ validate_cif (const char *cif)
  * @return true if validation passed, else false
  */
 bool
+ES_DNI_check (const char *dni_number);
+
+/* declaration to fix compiler warning */
+bool
 ES_DNI_check (const char *dni_number)
 {
   const char map[] = "TRWAGMYFPDXBNJZSQVHLCKE";
diff --git a/src/reducer/validation_FR_INSEE.c 
b/src/reducer/validation_FR_INSEE.c
index 19d81fd..17a34fb 100644
--- a/src/reducer/validation_FR_INSEE.c
+++ b/src/reducer/validation_FR_INSEE.c
@@ -35,6 +35,10 @@
  * @return true if validation passed, else false
  */
 bool
+FR_INSEE_check (const char *insee_number);
+
+/* declaration to fix compiler warning */
+bool
 FR_INSEE_check (const char *insee_number)
 {
   char pfx[14];
diff --git a/src/reducer/validation_IN_AADHAR.c 
b/src/reducer/validation_IN_AADHAR.c
index d53b655..a1461a9 100644
--- a/src/reducer/validation_IN_AADHAR.c
+++ b/src/reducer/validation_IN_AADHAR.c
@@ -98,6 +98,10 @@ string_to_vals (const char *input,
  * @return true if validation passed, else false
  */
 bool
+IN_AADHAR_check (const char *aadhar_number);
+
+/* declaration to fix compiler warning */
+bool
 IN_AADHAR_check (const char *aadhar_number)
 {
   int c = 0;
diff --git a/src/reducer/validation_IT_CF.c b/src/reducer/validation_IT_CF.c
index 6e9c6c6..6246777 100644
--- a/src/reducer/validation_IT_CF.c
+++ b/src/reducer/validation_IT_CF.c
@@ -172,6 +172,10 @@ lookup (const struct MapEntry *map,
  * @return true if @a cf_number is a valid, else false
  */
 bool
+IT_CF_check (const char *cf_number);
+
+/* declaration to fix compiler warning */
+bool
 IT_CF_check (const char *cf_number)
 {
   unsigned int sum = 0;
diff --git a/src/reducer/validation_NL_BSN.c b/src/reducer/validation_NL_BSN.c
index f92bb38..7497385 100644
--- a/src/reducer/validation_NL_BSN.c
+++ b/src/reducer/validation_NL_BSN.c
@@ -31,6 +31,10 @@
  * @return true if validation passed, else false
  */
 bool
+NL_BSN_check (const char *bsn_number);
+
+/* declaration to fix compiler warning */
+bool
 NL_BSN_check (const char *bsn_number)
 {
   static const int factors[] = {
diff --git a/src/reducer/validation_XX_SQUARE.c 
b/src/reducer/validation_XX_SQUARE.c
index 1f43400..3233ac5 100644
--- a/src/reducer/validation_XX_SQUARE.c
+++ b/src/reducer/validation_XX_SQUARE.c
@@ -32,6 +32,10 @@
  * @return true if sq_number is a square, else false
  */
 bool
+XX_SQUARE_check (const char *sq_number);
+
+/* declaration to fix compiler warning */
+bool
 XX_SQUARE_check (const char *sq_number)
 {
   unsigned long long n;
diff --git a/src/reducer/validation_XY_PRIME.c 
b/src/reducer/validation_XY_PRIME.c
index 56aa724..a8540cf 100644
--- a/src/reducer/validation_XY_PRIME.c
+++ b/src/reducer/validation_XY_PRIME.c
@@ -32,6 +32,10 @@
  * @return true if pr_number is a prime, else false
  */
 bool
+XY_PRIME_check (const char *pr_number);
+
+/* declaration to fix compiler warning */
+bool
 XY_PRIME_check (const char *pr_number)
 {
   unsigned long long n;
diff --git a/src/restclient/Makefile.am b/src/restclient/Makefile.am
index 1a4d83c..d811bc3 100644
--- a/src/restclient/Makefile.am
+++ b/src/restclient/Makefile.am
@@ -33,12 +33,5 @@ libanastasisrest_la_LIBADD = \
   -ltalermerchant \
   -ltalerjson \
   -ltalerutil \
+  -lcurl \
   $(XLIB)
-
-if HAVE_LIBCURL
-libanastasisrest_la_LIBADD += -lcurl
-else
-if HAVE_LIBGNURL
-libanastasisrest_la_LIBADD += -lgnurl
-endif
-endif
diff --git a/src/restclient/anastasis_api_config.c 
b/src/restclient/anastasis_api_config.c
index aee0357..78d93a2 100644
--- a/src/restclient/anastasis_api_config.c
+++ b/src/restclient/anastasis_api_config.c
@@ -185,7 +185,7 @@ handle_config_finished (void *cls,
         for (unsigned int i = 0; i<acfg.details.ok.methods_length; i++)
         {
           struct ANASTASIS_AuthorizationMethodConfig *m = &mcfg[i];
-          struct GNUNET_JSON_Specification spec[] = {
+          struct GNUNET_JSON_Specification ispec[] = {
             GNUNET_JSON_spec_string ("type",
                                      &m->type),
             TALER_JSON_spec_amount_any ("cost",
@@ -196,7 +196,7 @@ handle_config_finished (void *cls,
           if ( (GNUNET_OK !=
                 GNUNET_JSON_parse (json_array_get (methods,
                                                    i),
-                                   spec,
+                                   ispec,
                                    NULL, NULL)) )
           {
             GNUNET_break_op (0);
diff --git a/src/stasis/anastasis_db_plugin.c b/src/stasis/anastasis_db_plugin.c
index a7e55b9..6a4d1ce 100644
--- a/src/stasis/anastasis_db_plugin.c
+++ b/src/stasis/anastasis_db_plugin.c
@@ -20,7 +20,7 @@
  * @author Sree Harsha Totakura <sreeharsha@totakura.in>
  */
 #include "platform.h"
-#include "anastasis_database_plugin.h"
+#include "anastasis_database_lib.h"
 #include <ltdl.h>
 
 
@@ -91,6 +91,10 @@ static char *old_dlsearchpath;
  * Setup libtool paths.
  */
 void __attribute__ ((constructor))
+plugin_init (void);
+
+/* declaration to fix compiler warning */
+void __attribute__ ((constructor))
 plugin_init ()
 {
   int err;
@@ -132,6 +136,10 @@ plugin_init ()
  * Shutdown libtool.
  */
 void __attribute__ ((destructor))
+plugin_fini (void);
+
+/* declaration to fix compiler warning */
+void __attribute__ ((destructor))
 plugin_fini ()
 {
   lt_dlsetsearchpath (old_dlsearchpath);
diff --git a/src/stasis/plugin_anastasis_postgres.c 
b/src/stasis/plugin_anastasis_postgres.c
index 9f4b969..43e156e 100644
--- a/src/stasis/plugin_anastasis_postgres.c
+++ b/src/stasis/plugin_anastasis_postgres.c
@@ -1129,7 +1129,7 @@ postgres_increment_lifetime (
         else
         {
           /* user does not exist, create new one */
-          struct GNUNET_PQ_QueryParam params[] = {
+          struct GNUNET_PQ_QueryParam iparams[] = {
             GNUNET_PQ_query_param_auto_from_type (account_pub),
             GNUNET_PQ_query_param_timestamp (&expiration),
             GNUNET_PQ_query_param_end
@@ -1145,7 +1145,7 @@ postgres_increment_lifetime (
                                               true));
           qs = GNUNET_PQ_eval_prepared_non_select (pg->conn,
                                                    "user_insert",
-                                                   params);
+                                                   iparams);
         }
         break;
       case GNUNET_DB_STATUS_SUCCESS_ONE_RESULT:
@@ -1164,7 +1164,7 @@ postgres_increment_lifetime (
         else
         {
           /* user exists, payment is new, update expiration_date */
-          struct GNUNET_PQ_QueryParam params[] = {
+          struct GNUNET_PQ_QueryParam iparams[] = {
             GNUNET_PQ_query_param_timestamp (&expiration),
             GNUNET_PQ_query_param_auto_from_type (account_pub),
             GNUNET_PQ_query_param_end
@@ -1184,7 +1184,7 @@ postgres_increment_lifetime (
           *paid_until = expiration;
           qs = GNUNET_PQ_eval_prepared_non_select (pg->conn,
                                                    "user_update",
-                                                   params);
+                                                   iparams);
         }
         break;
       }
@@ -1301,7 +1301,7 @@ postgres_update_lifetime (
       case GNUNET_DB_STATUS_SUCCESS_NO_RESULTS:
         {
           /* user does not exist, create new one */
-          struct GNUNET_PQ_QueryParam params[] = {
+          struct GNUNET_PQ_QueryParam iparams[] = {
             GNUNET_PQ_query_param_auto_from_type (account_pub),
             GNUNET_PQ_query_param_timestamp (&eol),
             GNUNET_PQ_query_param_end
@@ -1310,7 +1310,7 @@ postgres_update_lifetime (
           GNUNET_break (! GNUNET_TIME_absolute_is_never (eol.abs_time));
           qs = GNUNET_PQ_eval_prepared_non_select (pg->conn,
                                                    "user_insert",
-                                                   params);
+                                                   iparams);
           GNUNET_log (GNUNET_ERROR_TYPE_INFO,
                       "Created new account %s with expiration %s\n",
                       TALER_B2S (account_pub),
@@ -1320,7 +1320,7 @@ postgres_update_lifetime (
       case GNUNET_DB_STATUS_SUCCESS_ONE_RESULT:
         {
           /* user exists, update expiration_date */
-          struct GNUNET_PQ_QueryParam params[] = {
+          struct GNUNET_PQ_QueryParam iparams[] = {
             GNUNET_PQ_query_param_timestamp (&expiration),
             GNUNET_PQ_query_param_auto_from_type (account_pub),
             GNUNET_PQ_query_param_end
@@ -1331,7 +1331,7 @@ postgres_update_lifetime (
           GNUNET_break (! GNUNET_TIME_absolute_is_never (expiration.abs_time));
           qs = GNUNET_PQ_eval_prepared_non_select (pg->conn,
                                                    "user_update",
-                                                   params);
+                                                   iparams);
           GNUNET_log (GNUNET_ERROR_TYPE_INFO,
                       "Updated account %s to new expiration %s\n",
                       TALER_B2S (account_pub),
@@ -1409,7 +1409,7 @@ postgres_record_recdoc_payment (
   /* because of constraint at user_id, first we have to verify
      if user exists, and if not, create one */
   {
-    struct GNUNET_PQ_QueryParam params[] = {
+    struct GNUNET_PQ_QueryParam iparams[] = {
       GNUNET_PQ_query_param_auto_from_type (account_pub),
       GNUNET_PQ_query_param_end
     };
@@ -1421,7 +1421,7 @@ postgres_record_recdoc_payment (
 
     qs = GNUNET_PQ_eval_prepared_singleton_select (pg->conn,
                                                    "user_select",
-                                                   params,
+                                                   iparams,
                                                    rs);
   }
   switch (qs)
@@ -1436,7 +1436,7 @@ postgres_record_recdoc_payment (
       /* create new user with short lifetime */
       struct GNUNET_TIME_Timestamp exp
         = GNUNET_TIME_relative_to_timestamp (TRANSIENT_LIFETIME);
-      struct GNUNET_PQ_QueryParam params[] = {
+      struct GNUNET_PQ_QueryParam iparams[] = {
         GNUNET_PQ_query_param_auto_from_type (account_pub),
         GNUNET_PQ_query_param_timestamp (&exp),
         GNUNET_PQ_query_param_end
@@ -1444,7 +1444,7 @@ postgres_record_recdoc_payment (
 
       qs = GNUNET_PQ_eval_prepared_non_select (pg->conn,
                                                "user_insert",
-                                               params);
+                                               iparams);
       switch (qs)
       {
       case GNUNET_DB_STATUS_HARD_ERROR:
@@ -1963,7 +1963,7 @@ postgres_store_truth (
  * @param[out] method type of the challenge
  * @return transaction status
  */
-enum GNUNET_DB_QueryStatus
+static enum GNUNET_DB_QueryStatus
 postgres_get_escrow_challenge (
   void *cls,
   const struct ANASTASIS_CRYPTO_TruthUUIDP *truth_uuid,
@@ -2004,7 +2004,7 @@ postgres_get_escrow_challenge (
  * @param[out] key_share contains the encrypted Keyshare
  * @return transaction status
  */
-enum GNUNET_DB_QueryStatus
+static enum GNUNET_DB_QueryStatus
 postgres_get_key_share (
   void *cls,
   const struct ANASTASIS_CRYPTO_TruthUUIDP *truth_uuid,
@@ -2040,7 +2040,7 @@ postgres_get_key_share (
  * @param[out] version set to the recovery policy version
  * @return transaction status
  */
-enum ANASTASIS_DB_AccountStatus
+static enum ANASTASIS_DB_AccountStatus
 postgres_lookup_account (
   void *cls,
   const struct ANASTASIS_CRYPTO_AccountPublicKeyP *account_pub,
@@ -2136,7 +2136,7 @@ postgres_lookup_account (
  * @param[out] version set to the version number of the policy being returned
  * @return transaction status
  */
-enum GNUNET_DB_QueryStatus
+static enum GNUNET_DB_QueryStatus
 postgres_get_latest_recovery_document (
   void *cls,
   const struct ANASTASIS_CRYPTO_AccountPublicKeyP *account_pub,
@@ -2309,7 +2309,7 @@ postgres_get_recovery_meta_data (
  * @param[out] data blob which contains the recovery document
  * @return transaction status
  */
-enum GNUNET_DB_QueryStatus
+static enum GNUNET_DB_QueryStatus
 postgres_get_recovery_document (
   void *cls,
   const struct ANASTASIS_CRYPTO_AccountPublicKeyP *account_pub,
@@ -2481,7 +2481,7 @@ check_valid_code (void *cls,
  * @param[out] satisfied set to true if the challenge is set to satisfied
  * @return code validity status
  */
-enum ANASTASIS_DB_CodeStatus
+static enum ANASTASIS_DB_CodeStatus
 postgres_verify_challenge_code (
   void *cls,
   const struct ANASTASIS_CRYPTO_TruthUUIDP *truth_uuid,
@@ -2597,7 +2597,7 @@ postgres_test_challenge_code_satisfied (
  * @param[out] payment_secret set to the challenge payment secret
  * @return transaction status
  */
-enum GNUNET_DB_QueryStatus
+static enum GNUNET_DB_QueryStatus
 postgres_lookup_challenge_payment (
   void *cls,
   const struct ANASTASIS_CRYPTO_TruthUUIDP *truth_uuid,
@@ -2635,7 +2635,7 @@ postgres_lookup_challenge_payment (
  * @param payment_identifier proof of payment, must be unique and match 
pending payment
  * @return transaction status
  */
-enum GNUNET_DB_QueryStatus
+static enum GNUNET_DB_QueryStatus
 postgres_update_challenge_payment (
   void *cls,
   const struct ANASTASIS_CRYPTO_TruthUUIDP *truth_uuid,
@@ -2671,7 +2671,7 @@ postgres_update_challenge_payment (
  *        #GNUNET_DB_STATUS_SUCCESS_NO_RESULTS if we are out of valid tries,
  *        #GNUNET_DB_STATUS_SUCCESS_ONE_RESULT if @a code is now in the DB
  */
-enum GNUNET_DB_QueryStatus
+static enum GNUNET_DB_QueryStatus
 postgres_create_challenge_code (
   void *cls,
   const struct ANASTASIS_CRYPTO_TruthUUIDP *truth_uuid,
@@ -2682,7 +2682,6 @@ postgres_create_challenge_code (
   uint64_t *code)
 {
   struct PostgresClosure *pg = cls;
-  enum GNUNET_DB_QueryStatus qs;
   struct GNUNET_TIME_Timestamp now = GNUNET_TIME_timestamp_get ();
   struct GNUNET_TIME_Timestamp expiration_date;
   struct GNUNET_TIME_Absolute ex_rot;
@@ -2766,6 +2765,7 @@ postgres_create_challenge_code (
         GNUNET_PQ_query_param_uint32 (&retry_counter),
         GNUNET_PQ_query_param_end
       };
+      enum GNUNET_DB_QueryStatus qs;
 
       qs = GNUNET_PQ_eval_prepared_non_select (pg->conn,
                                                "challengecode_insert",
@@ -2788,11 +2788,16 @@ postgres_create_challenge_code (
         break;
       }
     }
-    qs = commit_transaction (pg);
-    if (GNUNET_DB_STATUS_SOFT_ERROR == qs)
-      goto retry;
-    if (qs < 0)
-      return qs;
+
+    {
+      enum GNUNET_DB_QueryStatus qs;
+
+      qs = commit_transaction (pg);
+      if (GNUNET_DB_STATUS_SOFT_ERROR == qs)
+        goto retry;
+      if (qs < 0)
+        return qs;
+    }
     return GNUNET_DB_STATUS_SUCCESS_ONE_RESULT;
 retry:
     rollback (pg);
@@ -2861,7 +2866,7 @@ postgres_mark_challenge_sent (
  *
  * @return transaction status
  */
-enum GNUNET_DB_QueryStatus
+static enum GNUNET_DB_QueryStatus
 postgres_challenge_gc (void *cls)
 {
   struct PostgresClosure *pg = cls;
@@ -2887,6 +2892,10 @@ postgres_challenge_gc (void *cls)
  * @return NULL on error, otherwise a `struct TALER_ANASTASISDB_Plugin`
  */
 void *
+libanastasis_plugin_db_postgres_init (void *cls);
+
+/* declaration to fix compiler warning */
+void *
 libanastasis_plugin_db_postgres_init (void *cls)
 {
   struct GNUNET_CONFIGURATION_Handle *cfg = cls;
@@ -2965,6 +2974,10 @@ libanastasis_plugin_db_postgres_init (void *cls)
  * @return NULL (always)
  */
 void *
+libanastasis_plugin_db_postgres_done (void *cls);
+
+/* declaration to fix compiler warning */
+void *
 libanastasis_plugin_db_postgres_done (void *cls)
 {
   struct ANASTASIS_DatabasePlugin *plugin = cls;
diff --git a/src/stasis/test_anastasis_db.c b/src/stasis/test_anastasis_db.c
index 5ad29bc..cc48db0 100644
--- a/src/stasis/test_anastasis_db.c
+++ b/src/stasis/test_anastasis_db.c
@@ -26,14 +26,15 @@
 
 
 #define FAILIF(cond)                            \
-  do {                                          \
-    if (! (cond)) { break;}                       \
-    GNUNET_break (0);                           \
-    goto drop;                                     \
-  } while (0)
+        do {                                          \
+          if (! (cond)) { break;}                       \
+          GNUNET_break (0);                           \
+          goto drop;                                     \
+        } while (0)
 
 #define RND_BLK(ptr)                                                    \
-  GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, ptr, sizeof (*ptr))
+        GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK, ptr, sizeof (* 
\
+                                                                             
ptr))
 
 /**
  * Global return value for the test.  Initially -1, set to 0 upon
@@ -68,8 +69,8 @@ run (void *cls)
   struct ANASTASIS_CRYPTO_TruthUUIDP truth_uuid;
   struct ANASTASIS_CRYPTO_EncryptedKeyShareP key_share;
   unsigned int post_counter;
-  char *mime_type;
-  char *method;
+  const char *mime_type;
+  const char *method;
   uint32_t docVersion;
   uint32_t res_version;
   size_t recoverydatasize;
diff --git a/src/testing/test_anastasis.c b/src/testing/test_anastasis.c
index f28d9a9..49950e5 100644
--- a/src/testing/test_anastasis.c
+++ b/src/testing/test_anastasis.c
@@ -104,7 +104,7 @@ static json_t *id_data;
  * @param label label to use for the command.
  */
 static struct TALER_TESTING_Command
-cmd_exec_wirewatch (char *label)
+cmd_exec_wirewatch (const char *label)
 {
   return TALER_TESTING_cmd_exec_wirewatch (label,
                                            CONFIG_FILE);
diff --git a/src/testing/test_anastasis_api.c b/src/testing/test_anastasis_api.c
index 7d7e2ac..2160e36 100644
--- a/src/testing/test_anastasis_api.c
+++ b/src/testing/test_anastasis_api.c
@@ -98,7 +98,7 @@ static char *file_secret;
  * @param label label to use for the command.
  */
 static struct TALER_TESTING_Command
-cmd_exec_wirewatch (char *label)
+cmd_exec_wirewatch (const char *label)
 {
   return TALER_TESTING_cmd_exec_wirewatch (label,
                                            CONFIG_FILE);
diff --git a/src/testing/testing_cmd_challenge_answer.c 
b/src/testing/testing_cmd_challenge_answer.c
index ad24861..11e7b1b 100644
--- a/src/testing/testing_cmd_challenge_answer.c
+++ b/src/testing/testing_cmd_challenge_answer.c
@@ -439,42 +439,46 @@ challenge_start_run (void *cls,
 {
   struct ChallengeState *cs = cls;
   const struct ANASTASIS_Challenge **c;
-  const struct TALER_TESTING_Command *ref;
   const struct ANASTASIS_PaymentSecretP *ps;
 
   cs->is = is;
-  ref = TALER_TESTING_interpreter_lookup_command (
-    is,
-    cs->challenge_ref);
-  if (NULL == ref)
   {
-    GNUNET_break (0);
-    TALER_TESTING_interpreter_fail (cs->is);
-    return;
-  }
-  if (GNUNET_OK !=
-      ANASTASIS_TESTING_get_trait_challenges (ref,
-                                              cs->challenge_index,
-                                              &c))
-  {
-    GNUNET_break (0);
-    TALER_TESTING_interpreter_fail (cs->is);
-    return;
+    const struct TALER_TESTING_Command *ref;
+
+    ref = TALER_TESTING_interpreter_lookup_command (
+      is,
+      cs->challenge_ref);
+    if (NULL == ref)
+    {
+      GNUNET_break (0);
+      TALER_TESTING_interpreter_fail (cs->is);
+      return;
+    }
+    if (GNUNET_OK !=
+        ANASTASIS_TESTING_get_trait_challenges (ref,
+                                                cs->challenge_index,
+                                                &c))
+    {
+      GNUNET_break (0);
+      TALER_TESTING_interpreter_fail (cs->is);
+      return;
+    }
   }
+
   if (NULL != cs->payment_ref)
   {
-    const struct TALER_TESTING_Command *ref;
+    const struct TALER_TESTING_Command *pref;
 
-    ref = TALER_TESTING_interpreter_lookup_command (is,
-                                                    cs->payment_ref);
-    if (NULL == ref)
+    pref = TALER_TESTING_interpreter_lookup_command (is,
+                                                     cs->payment_ref);
+    if (NULL == pref)
     {
       GNUNET_break (0);
       TALER_TESTING_interpreter_fail (cs->is);
       return;
     }
     if (GNUNET_OK !=
-        ANASTASIS_TESTING_get_trait_payment_secret (ref,
+        ANASTASIS_TESTING_get_trait_payment_secret (pref,
                                                     &ps))
     {
       GNUNET_break (0);
diff --git a/src/util/anastasis-crypto-tvg.c b/src/util/anastasis-crypto-tvg.c
index d5fc4c1..7187842 100644
--- a/src/util/anastasis-crypto-tvg.c
+++ b/src/util/anastasis-crypto-tvg.c
@@ -328,7 +328,7 @@ output_vectors ()
   {
     json_t *vec = vec_for (vecs, "hash");
     struct GNUNET_HashCode hc;
-    char *str = "Hello, GNUnet";
+    const char *str = "Hello, GNUnet";
 
     GNUNET_CRYPTO_hash (str, strlen (str), &hc);
 
@@ -391,7 +391,7 @@ output_vectors ()
   {
     json_t *vec = vec_for (vecs, "recovery_document_encryption");
     struct ANASTASIS_CRYPTO_UserIdentifierP id;
-    void *rec_doc = "my recovery doc";
+    const void *rec_doc = "my recovery doc";
     size_t rd_size = strlen (rec_doc) + 1;
     void *enc_rec_doc;
     size_t erd_size;
@@ -413,7 +413,7 @@ output_vectors ()
     json_t *vec = vec_for (vecs, "keyshare_encryption");
     struct ANASTASIS_CRYPTO_KeyShareP key_share;
     struct ANASTASIS_CRYPTO_UserIdentifierP id;
-    char *xsalt = "myanswer";
+    const char *xsalt = "myanswer";
     struct ANASTASIS_CRYPTO_EncryptedKeyShareP enc_key_share;
 
     random_auto (&key_share);
diff --git a/src/util/os_installation.c b/src/util/os_installation.c
index cfcf3c3..148e5b4 100644
--- a/src/util/os_installation.c
+++ b/src/util/os_installation.c
@@ -24,7 +24,7 @@
  * @author Christian Grothoff
  */
 #include "platform.h"
-#include <gnunet/gnunet_util_lib.h>
+#include <anastasis/anastasis_util_lib.h>
 
 
 /**
diff --git a/src/util/test_anastasis_crypto.c b/src/util/test_anastasis_crypto.c
index 6132e35..c4f9a9b 100644
--- a/src/util/test_anastasis_crypto.c
+++ b/src/util/test_anastasis_crypto.c
@@ -43,7 +43,7 @@ test_user_identifier_derive (void)
   struct ANASTASIS_CRYPTO_UserIdentifierP id_3;
   struct ANASTASIS_CRYPTO_ProviderSaltP provider_salt;
 
-  char *salt_str = "Server-Salt-Test";
+  const char *salt_str = "Server-Salt-Test";
 
   GNUNET_memcpy (&provider_salt,
                  salt_str,
@@ -102,7 +102,7 @@ test_recovery_document (void)
 
   json_t *id_data = json_object ();
   const char *test = "TEST_ERD";
-  char *salt_str = "Server-Salt-Test";
+  const char *salt_str = "Server-Salt-Test";
 
   GNUNET_memcpy (&provider_salt,
                  salt_str,
@@ -219,13 +219,12 @@ test_core_secret (void)
   unsigned int policy_keys_length = 5;
   struct ANASTASIS_CRYPTO_MasterSaltP salt;
   struct ANASTASIS_CoreSecretEncryptionResult *cser;
+  struct ANASTASIS_CRYPTO_PolicyKeyP policy_keys[policy_keys_length];
 
   GNUNET_CRYPTO_random_block (GNUNET_CRYPTO_QUALITY_WEAK,
                               &salt,
                               sizeof (salt));
-
   // construction of PolicyKey-array
-  struct ANASTASIS_CRYPTO_PolicyKeyP policy_keys[policy_keys_length];
   for (unsigned int i = 0; i < policy_keys_length; i++)
   {
     // construction of KeyShare-array

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]