gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[libmicrohttpd] branch master updated (29ff7c68 -> 977d01df)


From: gnunet
Subject: [libmicrohttpd] branch master updated (29ff7c68 -> 977d01df)
Date: Tue, 14 Jun 2022 20:22:51 +0200

This is an automated email from the git hooks/post-receive script.

karlson2k pushed a change to branch master
in repository libmicrohttpd.

    from 29ff7c68 test_str: fixed harmless sanitizer error
     new b7eaffc0 mhd_str: fixed doxy, updated copyright years
     new 4e5bddd0 websocket_threaded_example: minor fixes
     new 202af117 test_helpers: fixed doxy
     new e4850e5b test_str: made test compatible with non-VLA compilers
     new 977d01df src/microhttpd/test_*: fixed more compiler warnings

The 5 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 src/examples/websocket_threaded_example.c          |   6 +-
 src/microhttpd/mhd_str.c                           |   2 +-
 src/microhttpd/mhd_str.h                           |   4 +-
 src/microhttpd/test_client_put_stop.c              |  10 +-
 src/microhttpd/test_helpers.h                      |   6 +-
 src/microhttpd/test_set_panic.c                    |   5 +-
 src/microhttpd/test_str.c                          | 151 +++++++++++----------
 src/microhttpd/test_upgrade.c                      |  12 +-
 src/microhttpd/test_upgrade_large.c                |  12 +-
 src/testcurl/https/test_empty_response.c           |   4 +-
 src/testcurl/https/test_https_get.c                |   4 +-
 src/testcurl/https/test_https_get_iovec.c          |   4 +-
 src/testcurl/https/test_https_get_parallel.c       |   4 +-
 .../https/test_https_get_parallel_threads.c        |   4 +-
 src/testcurl/https/test_https_get_select.c         |   4 +-
 src/testcurl/https/test_https_multi_daemon.c       |   4 +-
 src/testcurl/https/test_https_session_info.c       |   4 +-
 src/testcurl/https/test_https_time_out.c           |   4 +-
 src/testcurl/https/test_tls_authentication.c       |   4 +-
 src/testcurl/https/test_tls_extensions.c           |   4 +-
 src/testcurl/https/test_tls_options.c              |   4 +-
 src/testcurl/https/tls_test_keys.h                 |  96 ++++++-------
 22 files changed, 167 insertions(+), 185 deletions(-)

diff --git a/src/examples/websocket_threaded_example.c 
b/src/examples/websocket_threaded_example.c
index 21f58ed3..e1580548 100644
--- a/src/examples/websocket_threaded_example.c
+++ b/src/examples/websocket_threaded_example.c
@@ -282,7 +282,7 @@ SHA1Result (struct SHA1Context *context, unsigned char
   }
   if (context->corrupted)
   {
-    return context->corrupted;
+    return SHA1_RESULT_STATE_ERROR;
   }
   if (! context->computed)
   {
@@ -319,12 +319,12 @@ SHA1Input (struct SHA1Context *context, const unsigned 
char *message_array,
   }
   if (context->computed)
   {
-    context->corrupted = SHA1_RESULT_STATE_ERROR;
+    context->corrupted = 1;
     return SHA1_RESULT_STATE_ERROR;
   }
   if (context->corrupted)
   {
-    return context->corrupted;
+    return SHA1_RESULT_STATE_ERROR;
   }
   while (length-- && ! context->corrupted)
   {
diff --git a/src/microhttpd/mhd_str.c b/src/microhttpd/mhd_str.c
index d90008c0..0c2b2f46 100644
--- a/src/microhttpd/mhd_str.c
+++ b/src/microhttpd/mhd_str.c
@@ -1,6 +1,6 @@
 /*
   This file is part of libmicrohttpd
-  Copyright (C) 2015, 2016 Karlson2k (Evgeny Grin)
+  Copyright (C) 2015-2022 Karlson2k (Evgeny Grin)
 
   This library is free software; you can redistribute it and/or
   modify it under the terms of the GNU Lesser General Public
diff --git a/src/microhttpd/mhd_str.h b/src/microhttpd/mhd_str.h
index 17921aa1..3d56ba35 100644
--- a/src/microhttpd/mhd_str.h
+++ b/src/microhttpd/mhd_str.h
@@ -1,6 +1,6 @@
 /*
   This file is part of libmicrohttpd
-  Copyright (C) 2015, 2016 Karlson2k (Evgeny Grin)
+  Copyright (C) 2015-2022 Karlson2k (Evgeny Grin)
 
   This library is free software; you can redistribute it and/or
   modify it under the terms of the GNU Lesser General Public
@@ -596,7 +596,7 @@ MHD_str_quote (const char *unquoted,
  * @param bin_size the size of the @a bin buffer in bytes, if the size is
  *                 at least @a base64_len / 4 * 3 then result will always
  *                 fit, regardless of the amount of the padding characters
- * @return 0 if @base64_len is zero, or input string has wrong data (not
+ * @return 0 if @a base64_len is zero, or input string has wrong data (not
  *         valid Base64 sequence), or @a bin_size is too small;
  *         non-zero number of bytes written to the @a bin, the number must be
  *         (base64_len / 4 * 3 - 2), (base64_len / 4 * 3 - 1) or
diff --git a/src/microhttpd/test_client_put_stop.c 
b/src/microhttpd/test_client_put_stop.c
index 9ee7dcf6..c26ff78a 100644
--- a/src/microhttpd/test_client_put_stop.c
+++ b/src/microhttpd/test_client_put_stop.c
@@ -802,6 +802,7 @@ _MHD_dumbClient_send_req (struct _MHD_dumbClient *clnt)
 
 
 /* internal */
+_MHD_NORETURN /* Declared as 'noreturn' until it is implemented */
 static void
 _MHD_dumbClient_recv_reply (struct _MHD_dumbClient *clnt)
 {
@@ -1687,7 +1688,8 @@ printTestResults (FILE *stream,
     fprintf (stream, " Final notification callback has been called %u time%s "
              "with %s code.", term_result->num_called,
              (1 == term_result->num_called) ? "" : "s",
-             term_reason_str (term_result->term_reason));
+             term_reason_str ((enum MHD_RequestTerminationCode)
+                              term_result->term_reason));
   fprintf (stream, "\n");
   fflush (stream);
 }
@@ -1848,7 +1850,9 @@ performTestQueries (struct MHD_Daemon *d, uint16_t d_port,
   if (! found_right_reason)
   {
     fprintf (stderr, "FAILED: termination callback was not called with "
-             "expected (%s) reason.\n", term_reason_str (expected_reason));
+             "expected (%s) reason.\n",
+             term_reason_str ((enum MHD_RequestTerminationCode)
+                              expected_reason));
     fflush (stderr);
     ret |= 1 << 1;
   }
@@ -1971,7 +1975,7 @@ startTestMhdDaemon (enum testMhdThreadsType thrType,
     dinfo = MHD_get_daemon_info (d, MHD_DAEMON_INFO_BIND_PORT);
     if ((NULL == dinfo) || (0 == dinfo->port))
       mhdErrorExitDesc ("MHD_get_daemon_info() failed");
-    *pport = (int) dinfo->port;
+    *pport = dinfo->port;
     if (0 == global_port)
       global_port = *pport; /* Reuse the same port for all tests */
   }
diff --git a/src/microhttpd/test_helpers.h b/src/microhttpd/test_helpers.h
index 993d0718..d3804bc4 100644
--- a/src/microhttpd/test_helpers.h
+++ b/src/microhttpd/test_helpers.h
@@ -34,8 +34,8 @@
  * @param prog_name program name, may include path
  * @param marker    marker to look for.
  * @return zero if any parameter is NULL or empty string or
- *         @prog_name ends with slash or @marker is not found in
- *         program name, non-zero if @maker is found in program
+ *         @a prog_name ends with slash or @a marker is not found in
+ *         program name, non-zero if @a maker is found in program
  *         name.
  */
 static int
@@ -61,7 +61,7 @@ has_in_name (const char *prog_name, const char *marker)
   }
   if (name_pos == pos)
     return 0;
-  return strstr (prog_name + name_pos, marker) != (char*) 0;
+  return strstr (prog_name + name_pos, marker) != (char *) 0;
 }
 
 
diff --git a/src/microhttpd/test_set_panic.c b/src/microhttpd/test_set_panic.c
index f1548380..a2d889c1 100644
--- a/src/microhttpd/test_set_panic.c
+++ b/src/microhttpd/test_set_panic.c
@@ -708,6 +708,7 @@ _MHD_dumbClient_send_req (struct _MHD_dumbClient *clnt)
 
 
 /* internal */
+_MHD_NORETURN /* not implemented */
 static void
 _MHD_dumbClient_recv_reply (struct _MHD_dumbClient *clnt)
 {
@@ -988,7 +989,7 @@ _MHD_dumbClient_close (struct _MHD_dumbClient *clnt)
 }
 
 
-static void
+_MHD_NORETURN static void
 socket_cb (void *cls,
            struct MHD_Connection *c,
            void **socket_context,
@@ -1409,7 +1410,7 @@ testNumThreadsForPool (enum testMhdPollType pollType)
 
 #define PANIC_MAGIC_CHECK 1133
 
-static void
+_MHD_NORETURN static void
 myPanicCallback (void *cls,
                  const char *file,
                  unsigned int line,
diff --git a/src/microhttpd/test_str.c b/src/microhttpd/test_str.c
index f2f4d32c..35e31319 100644
--- a/src/microhttpd/test_str.c
+++ b/src/microhttpd/test_str.c
@@ -513,8 +513,8 @@ check_eq_strings (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(eq_strings) / sizeof(eq_strings[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(eq_strings) / sizeof(eq_strings[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -560,8 +560,8 @@ check_neq_strings (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(neq_strings) / sizeof(neq_strings[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(neq_strings) / sizeof(neq_strings[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -607,8 +607,8 @@ check_eq_strings_n (void)
 {
   size_t t_failed = 0;
   size_t i, j, k;
-  static const size_t n_checks = sizeof(eq_strings) / sizeof(eq_strings[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(eq_strings) / sizeof(eq_strings[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -660,8 +660,8 @@ check_neq_strings_n (void)
 {
   size_t t_failed = 0;
   size_t i, j, k;
-  static const size_t n_checks = sizeof(neq_strings) / sizeof(neq_strings[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(neq_strings) / sizeof(neq_strings[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -932,7 +932,7 @@ static const struct str_with_value dstrs_w_values[] = {
 };
 
 /* strings that should overflow uint64_t */
-const struct str_with_len str_ovflw[] = {
+static const struct str_with_len str_ovflw[] = {
   D_STR_W_LEN ("18446744073709551616"),  /* 0x10000000000000000, UINT64_MAX+1 
*/
   D_STR_W_LEN ("18446744073709551620"),
   D_STR_W_LEN ("18446744083709551615"),
@@ -952,7 +952,7 @@ const struct str_with_len str_ovflw[] = {
 };
 
 /* strings that should not be convertible to numeric value */
-const struct str_with_len str_no_num[] = {
+static const struct str_with_len str_no_num[] = {
   D_STR_W_LEN ("zero"),
   D_STR_W_LEN ("one"),
   D_STR_W_LEN ("\xb9\xb2\xb3"),                                    /* 
superscript "123" in ISO-8859-1/CP1252 */
@@ -1089,7 +1089,7 @@ static const struct str_with_value xdstrs_w_values[] = {
 };
 
 /* hex strings that should overflow uint64_t */
-const struct str_with_len strx_ovflw[] = {
+static const struct str_with_len strx_ovflw[] = {
   D_STR_W_LEN ("10000000000000000"),            /* 0x10000000000000000, 
UINT64_MAX+1 */
   D_STR_W_LEN ("10000000000000001"),
   D_STR_W_LEN ("10000000000000002"),
@@ -1125,9 +1125,9 @@ check_str_to_uint64_valid (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(dstrs_w_values)
-                                 / sizeof(dstrs_w_values[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(dstrs_w_values)
+               / sizeof(dstrs_w_values[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -1191,8 +1191,8 @@ check_str_to_uint64_valid (void)
 static size_t
 check_str_to_uint64_all_chars (void)
 {
-  static const size_t n_checks = 256; /* from 0 to 255 */
-  int c_failed[n_checks];
+  int c_failed[256]; /* from 0 to 255 */
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
   size_t t_failed = 0;
   size_t j;
 
@@ -1260,8 +1260,8 @@ check_str_to_uint64_overflow (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(str_ovflw) / sizeof(str_ovflw[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(str_ovflw) / sizeof(str_ovflw[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -1318,8 +1318,8 @@ check_str_to_uint64_no_val (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(str_no_num) / sizeof(str_no_num[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(str_no_num) / sizeof(str_no_num[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -1376,9 +1376,9 @@ check_str_to_uint64_n_valid (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(dstrs_w_values)
-                                 / sizeof(dstrs_w_values[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(dstrs_w_values)
+               / sizeof(dstrs_w_values[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -1446,8 +1446,8 @@ check_str_to_uint64_n_valid (void)
 static size_t
 check_str_to_uint64_n_all_chars (void)
 {
-  static const size_t n_checks = 256; /* from 0 to 255 */
-  int c_failed[n_checks];
+  int c_failed[256]; /* from 0 to 255 */
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
   size_t t_failed = 0;
   size_t j;
 
@@ -1525,8 +1525,8 @@ check_str_to_uint64_n_overflow (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(str_ovflw) / sizeof(str_ovflw[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(str_ovflw) / sizeof(str_ovflw[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -1594,8 +1594,8 @@ check_str_to_uint64_n_no_val (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(str_no_num) / sizeof(str_no_num[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(str_no_num) / sizeof(str_no_num[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -1662,9 +1662,9 @@ check_strx_to_uint32_valid (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(xdstrs_w_values)
-                                 / sizeof(xdstrs_w_values[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(xdstrs_w_values)
+               / sizeof(xdstrs_w_values[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -1733,8 +1733,8 @@ check_strx_to_uint32_valid (void)
 static size_t
 check_strx_to_uint32_all_chars (void)
 {
-  static const size_t n_checks = 256; /* from 0 to 255 */
-  int c_failed[n_checks];
+  int c_failed[256]; /* from 0 to 255 */
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
   size_t t_failed = 0;
   size_t j;
 
@@ -1808,10 +1808,10 @@ check_strx_to_uint32_overflow (void)
   size_t t_failed = 0;
   size_t i, j;
   static const size_t n_checks1 = sizeof(strx_ovflw) / sizeof(strx_ovflw[0]);
-  static const size_t n_checks = sizeof(strx_ovflw) / sizeof(strx_ovflw[0])
-                                 + sizeof(xdstrs_w_values)
-                                 / sizeof(xdstrs_w_values[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(strx_ovflw) / sizeof(strx_ovflw[0])
+               + sizeof(xdstrs_w_values)
+               / sizeof(xdstrs_w_values[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -1883,8 +1883,8 @@ check_strx_to_uint32_no_val (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(str_no_num) / sizeof(str_no_num[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(str_no_num) / sizeof(str_no_num[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -1942,9 +1942,9 @@ check_strx_to_uint32_n_valid (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(xdstrs_w_values)
-                                 / sizeof(xdstrs_w_values[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(xdstrs_w_values)
+               / sizeof(xdstrs_w_values[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -2017,8 +2017,8 @@ check_strx_to_uint32_n_valid (void)
 static size_t
 check_strx_to_uint32_n_all_chars (void)
 {
-  static const size_t n_checks = 256; /* from 0 to 255 */
-  int c_failed[n_checks];
+  int c_failed[256]; /* from 0 to 255 */
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
   size_t t_failed = 0;
   size_t j;
 
@@ -2102,10 +2102,10 @@ check_strx_to_uint32_n_overflow (void)
   size_t t_failed = 0;
   size_t i, j;
   static const size_t n_checks1 = sizeof(strx_ovflw) / sizeof(strx_ovflw[0]);
-  static const size_t n_checks = sizeof(strx_ovflw) / sizeof(strx_ovflw[0])
-                                 + sizeof(xdstrs_w_values)
-                                 / sizeof(xdstrs_w_values[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(strx_ovflw) / sizeof(strx_ovflw[0])
+               + sizeof(xdstrs_w_values)
+               / sizeof(xdstrs_w_values[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -2203,8 +2203,8 @@ check_strx_to_uint32_n_no_val (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(str_no_num) / sizeof(str_no_num[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(str_no_num) / sizeof(str_no_num[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -2272,9 +2272,9 @@ check_strx_to_uint64_valid (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(xdstrs_w_values)
-                                 / sizeof(xdstrs_w_values[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(xdstrs_w_values)
+               / sizeof(xdstrs_w_values[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -2339,8 +2339,8 @@ check_strx_to_uint64_valid (void)
 static size_t
 check_strx_to_uint64_all_chars (void)
 {
-  static const size_t n_checks = 256; /* from 0 to 255 */
-  int c_failed[n_checks];
+  int c_failed[256]; /* from 0 to 255 */
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
   size_t t_failed = 0;
   size_t j;
 
@@ -2412,8 +2412,8 @@ check_strx_to_uint64_overflow (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(strx_ovflw) / sizeof(strx_ovflw[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(strx_ovflw) / sizeof(strx_ovflw[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -2470,8 +2470,8 @@ check_strx_to_uint64_no_val (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(str_no_num) / sizeof(str_no_num[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(str_no_num) / sizeof(str_no_num[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -2599,8 +2599,8 @@ check_strx_to_uint64_n_valid (void)
 static size_t
 check_strx_to_uint64_n_all_chars (void)
 {
-  static const size_t n_checks = 256; /* from 0 to 255 */
-  int c_failed[n_checks];
+  int c_failed[256]; /* from 0 to 255 */
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
   size_t t_failed = 0;
   size_t j;
 
@@ -2683,8 +2683,8 @@ check_strx_to_uint64_n_overflow (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(strx_ovflw) / sizeof(strx_ovflw[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(strx_ovflw) / sizeof(strx_ovflw[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -2753,8 +2753,8 @@ check_strx_to_uint64_n_no_val (void)
 {
   size_t t_failed = 0;
   size_t i, j;
-  static const size_t n_checks = sizeof(str_no_num) / sizeof(str_no_num[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(str_no_num) / sizeof(str_no_num[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -3173,9 +3173,9 @@ check_str_from_uint16 (void)
     "-@=sd#+&(pdiren456qwe#@C3S!DAS45AOIPUQWESAdFzxcv1s*()&#$%34`"
     "32452d098poiden45SADFFDA3S4D3SDFdfgsdfgsSADFzxdvs$*()&#2342`"
     "adsf##$$@&*^%*^&56qwe#3C@S!DAScFAOIP$#%#$Ad1zs3v1$*()&#1228`";
-  static const size_t n_checks = sizeof(dstrs_w_values)
-                                 / sizeof(dstrs_w_values[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(dstrs_w_values)
+               / sizeof(dstrs_w_values[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -3298,9 +3298,9 @@ check_str_from_uint64 (void)
     "-@=sd#+&(pdirenDSFGSe#@C&S!DAS*!AOIPUQWESAdFzxcvSs*()&#$%KH`"
     "32452d098poiden45SADFFDA3S4D3SDFdfgsdfgsSADFzxdvs$*()&#2342`"
     "adsf##$$@&*^%*^&56qwe#3C@S!DAScFAOIP$#%#$Ad1zs3v1$*()&#1228`";
-  static const size_t n_checks = sizeof(dstrs_w_values)
-                                 / sizeof(dstrs_w_values[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(dstrs_w_values)
+               / sizeof(dstrs_w_values[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
@@ -3338,6 +3338,7 @@ check_str_from_uint64 (void)
                  (unsigned int) i, (unsigned int) t->str.len);
         exit (99);
       }
+      rs = 0; /* Only to mute compiler warning */
       for (b_size = 0; b_size <= t->str.len + 1; ++b_size)
       {
         /* fill buffer with pseudo-random values */
@@ -3420,9 +3421,9 @@ check_strx_from_uint32 (void)
     "jrlkjssfhjfvrjntJHLJ$@%$#adsfdkj;k$##$%#$%FGDF%$#^FDFG%$#$D`"
     ";skjdhjflsdkjhdjfalskdjhdfalkjdhf$%##%$$#%FSDGFSDDGDFSSDSDF`"
     "#5#$%#$#$DFSFDDFSGSDFSDF354FDDSGFDFfdssfddfswqemn,.zxih,.sx`";
-  static const size_t n_checks = sizeof(xdstrs_w_values)
-                                 / sizeof(xdstrs_w_values[0]);
-  int c_failed[n_checks];
+  int c_failed[sizeof(xdstrs_w_values)
+               / sizeof(xdstrs_w_values[0])];
+  static const size_t n_checks = sizeof(c_failed) / sizeof(c_failed[0]);
 
   memset (c_failed, 0, sizeof(c_failed));
 
diff --git a/src/microhttpd/test_upgrade.c b/src/microhttpd/test_upgrade.c
index 5c95a10c..5836db6b 100644
--- a/src/microhttpd/test_upgrade.c
+++ b/src/microhttpd/test_upgrade.c
@@ -184,7 +184,7 @@ enum tls_tool
   TLS_LIB_GNUTLS
 };
 
-enum tls_tool use_tls_tool;
+static enum tls_tool use_tls_tool;
 
 #if defined(HTTPS_SUPPORT) && defined(HAVE_FORK) && defined(HAVE_WAITPID)
 /**
@@ -423,9 +423,9 @@ wr_create_from_plain_sckt (MHD_socket plain_sk)
 static int
 wr_connect (struct wr_socket *s,
             const struct sockaddr *addr,
-            int length)
+            unsigned int length)
 {
-  if (0 != connect (s->fd, addr, length))
+  if (0 != connect (s->fd, addr, (socklen_t) length))
   {
     testErrorLogDesc ("connect() failed");
     return -1;
@@ -797,7 +797,7 @@ send_all (struct wr_socket *sock,
 
 /**
  * Read character-by-character until we
- * get '\r\n\r\n'.
+ * get 'CRLNCRLN'.
  */
 static void
 recv_hdr (struct wr_socket *sock)
@@ -1154,7 +1154,7 @@ run_mhd_select_loop (struct MHD_Daemon *daemon)
  *
  * @param daemon daemon to run it for
  */
-static void
+_MHD_NORETURN static void
 run_mhd_poll_loop (struct MHD_Daemon *daemon)
 {
   (void) daemon; /* Unused. Silent compiler warning. */
@@ -1229,7 +1229,7 @@ run_mhd_epoll_loop (struct MHD_Daemon *daemon)
  */
 static void
 run_mhd_loop (struct MHD_Daemon *daemon,
-              int flags)
+              unsigned int flags)
 {
   if (0 == (flags & (MHD_USE_POLL | MHD_USE_EPOLL)))
     run_mhd_select_loop (daemon);
diff --git a/src/microhttpd/test_upgrade_large.c 
b/src/microhttpd/test_upgrade_large.c
index e6c9b01b..6f2331fa 100644
--- a/src/microhttpd/test_upgrade_large.c
+++ b/src/microhttpd/test_upgrade_large.c
@@ -350,7 +350,7 @@ enum tls_tool
   TLS_LIB_GNUTLS
 };
 
-enum tls_tool use_tls_tool;
+static enum tls_tool use_tls_tool;
 
 #if defined(HTTPS_SUPPORT) && defined(HAVE_FORK) && defined(HAVE_WAITPID)
 /**
@@ -589,9 +589,9 @@ wr_create_from_plain_sckt (MHD_socket plain_sk)
 static int
 wr_connect (struct wr_socket *s,
             const struct sockaddr *addr,
-            int length)
+            unsigned int length)
 {
-  if (0 != connect (s->fd, addr, length))
+  if (0 != connect (s->fd, addr, (socklen_t) length))
   {
     testErrorLogDesc ("connect() failed");
     return -1;
@@ -973,7 +973,7 @@ send_all (struct wr_socket *sock,
 
 /**
  * Read character-by-character until we
- * get '\r\n\r\n'.
+ * get 'CRLNCRLN'.
  */
 static void
 recv_hdr (struct wr_socket *sock)
@@ -1340,7 +1340,7 @@ run_mhd_select_loop (struct MHD_Daemon *daemon)
  *
  * @param daemon daemon to run it for
  */
-static void
+_MHD_NORETURN static void
 run_mhd_poll_loop (struct MHD_Daemon *daemon)
 {
   (void) daemon; /* Unused. Silent compiler warning. */
@@ -1417,7 +1417,7 @@ run_mhd_epoll_loop (struct MHD_Daemon *daemon)
  */
 static void
 run_mhd_loop (struct MHD_Daemon *daemon,
-              int flags)
+              unsigned int flags)
 {
   if (0 == (flags & (MHD_USE_POLL | MHD_USE_EPOLL)))
     run_mhd_select_loop (daemon);
diff --git a/src/testcurl/https/test_empty_response.c 
b/src/testcurl/https/test_empty_response.c
index b338fa2e..a8de5cd2 100644
--- a/src/testcurl/https/test_empty_response.c
+++ b/src/testcurl/https/test_empty_response.c
@@ -32,9 +32,7 @@
 #include <gcrypt.h>
 #endif /* MHD_HTTPS_REQUIRE_GRYPT */
 #include "tls_test_common.h"
-
-extern const char srv_key_pem[];
-extern const char srv_self_signed_cert_pem[];
+#include "tls_test_keys.h"
 
 static int oneone;
 
diff --git a/src/testcurl/https/test_https_get.c 
b/src/testcurl/https/test_https_get.c
index 184cc48e..62546324 100644
--- a/src/testcurl/https/test_https_get.c
+++ b/src/testcurl/https/test_https_get.c
@@ -33,9 +33,7 @@
 #include <gcrypt.h>
 #endif /* MHD_HTTPS_REQUIRE_GRYPT */
 #include "tls_test_common.h"
-
-extern const char srv_signed_cert_pem[];
-extern const char srv_signed_key_pem[];
+#include "tls_test_keys.h"
 
 
 static int global_port;
diff --git a/src/testcurl/https/test_https_get_iovec.c 
b/src/testcurl/https/test_https_get_iovec.c
index 3bdb610f..b2d46c3f 100644
--- a/src/testcurl/https/test_https_get_iovec.c
+++ b/src/testcurl/https/test_https_get_iovec.c
@@ -41,9 +41,7 @@
 #include <gcrypt.h>
 #endif /* MHD_HTTPS_REQUIRE_GRYPT */
 #include "tls_test_common.h"
-
-extern const char srv_signed_cert_pem[];
-extern const char srv_signed_key_pem[];
+#include "tls_test_keys.h"
 
 
 static int global_port;
diff --git a/src/testcurl/https/test_https_get_parallel.c 
b/src/testcurl/https/test_https_get_parallel.c
index 47f644d2..3de7cfe7 100644
--- a/src/testcurl/https/test_https_get_parallel.c
+++ b/src/testcurl/https/test_https_get_parallel.c
@@ -35,6 +35,7 @@
 #include <gcrypt.h>
 #endif /* MHD_HTTPS_REQUIRE_GRYPT */
 #include "tls_test_common.h"
+#include "tls_test_keys.h"
 
 #if defined(MHD_CPU_COUNT) && (MHD_CPU_COUNT + 0) < 4
 #undef MHD_CPU_COUNT
@@ -43,9 +44,6 @@
 #define MHD_CPU_COUNT 4
 #endif
 
-extern const char srv_key_pem[];
-extern const char srv_self_signed_cert_pem[];
-
 int curl_check_version (const char *req_version, ...);
 
 
diff --git a/src/testcurl/https/test_https_get_parallel_threads.c 
b/src/testcurl/https/test_https_get_parallel_threads.c
index 4853e7eb..08ee35e6 100644
--- a/src/testcurl/https/test_https_get_parallel_threads.c
+++ b/src/testcurl/https/test_https_get_parallel_threads.c
@@ -37,6 +37,7 @@
 #include <gcrypt.h>
 #endif /* MHD_HTTPS_REQUIRE_GRYPT */
 #include "tls_test_common.h"
+#include "tls_test_keys.h"
 
 #if defined(MHD_CPU_COUNT) && (MHD_CPU_COUNT + 0) < 4
 #undef MHD_CPU_COUNT
@@ -45,9 +46,6 @@
 #define MHD_CPU_COUNT 4
 #endif
 
-extern const char srv_key_pem[];
-extern const char srv_self_signed_cert_pem[];
-
 int curl_check_version (const char *req_version, ...);
 
 /**
diff --git a/src/testcurl/https/test_https_get_select.c 
b/src/testcurl/https/test_https_get_select.c
index 217c6bfa..3b45323b 100644
--- a/src/testcurl/https/test_https_get_select.c
+++ b/src/testcurl/https/test_https_get_select.c
@@ -33,9 +33,7 @@
 #include <gcrypt.h>
 #endif /* MHD_HTTPS_REQUIRE_GRYPT */
 #include "tls_test_common.h"
-
-extern const char srv_key_pem[];
-extern const char srv_self_signed_cert_pem[];
+#include "tls_test_keys.h"
 
 static int oneone;
 
diff --git a/src/testcurl/https/test_https_multi_daemon.c 
b/src/testcurl/https/test_https_multi_daemon.c
index 6c6e2b5d..10e7f6ed 100644
--- a/src/testcurl/https/test_https_multi_daemon.c
+++ b/src/testcurl/https/test_https_multi_daemon.c
@@ -33,9 +33,7 @@
 #include <gcrypt.h>
 #endif /* MHD_HTTPS_REQUIRE_GRYPT */
 #include "tls_test_common.h"
-
-extern const char srv_key_pem[];
-extern const char srv_self_signed_cert_pem[];
+#include "tls_test_keys.h"
 
 /*
  * assert initiating two separate daemons and having one shut down
diff --git a/src/testcurl/https/test_https_session_info.c 
b/src/testcurl/https/test_https_session_info.c
index b0ccb576..fc6f82f7 100644
--- a/src/testcurl/https/test_https_session_info.c
+++ b/src/testcurl/https/test_https_session_info.c
@@ -33,9 +33,7 @@
 #include <gcrypt.h>
 #endif /* MHD_HTTPS_REQUIRE_GRYPT */
 #include "tls_test_common.h"
-
-extern const char srv_key_pem[];
-extern const char srv_self_signed_cert_pem[];
+#include "tls_test_keys.h"
 
 struct MHD_Daemon *d;
 
diff --git a/src/testcurl/https/test_https_time_out.c 
b/src/testcurl/https/test_https_time_out.c
index 88877b60..939101a6 100644
--- a/src/testcurl/https/test_https_time_out.c
+++ b/src/testcurl/https/test_https_time_out.c
@@ -52,9 +52,7 @@
 #endif /* !WIN32_LEAN_AND_MEAN */
 #include <windows.h>
 #endif
-
-extern const char srv_key_pem[];
-extern const char srv_self_signed_cert_pem[];
+#include "tls_test_keys.h"
 
 static const int TIME_OUT = 2;
 
diff --git a/src/testcurl/https/test_tls_authentication.c 
b/src/testcurl/https/test_tls_authentication.c
index 7aedee72..22d47b26 100644
--- a/src/testcurl/https/test_tls_authentication.c
+++ b/src/testcurl/https/test_tls_authentication.c
@@ -33,9 +33,7 @@
 #include <gcrypt.h>
 #endif /* MHD_HTTPS_REQUIRE_GRYPT */
 #include "tls_test_common.h"
-
-extern const char srv_signed_cert_pem[];
-extern const char srv_signed_key_pem[];
+#include "tls_test_keys.h"
 
 
 /* perform a HTTP GET request via SSL/TLS */
diff --git a/src/testcurl/https/test_tls_extensions.c 
b/src/testcurl/https/test_tls_extensions.c
index 19b98e7e..3fe4ef71 100644
--- a/src/testcurl/https/test_tls_extensions.c
+++ b/src/testcurl/https/test_tls_extensions.c
@@ -32,12 +32,10 @@
 #ifdef MHD_HTTPS_REQUIRE_GRYPT
 #include <gcrypt.h>
 #endif /* MHD_HTTPS_REQUIRE_GRYPT */
+#include "tls_test_keys.h"
 
 #define MAX_EXT_DATA_LENGTH 256
 
-extern const char srv_key_pem[];
-extern const char srv_self_signed_cert_pem[];
-
 /**
  * Test daemon response to TLS client hello requests containing extensions
  *
diff --git a/src/testcurl/https/test_tls_options.c 
b/src/testcurl/https/test_tls_options.c
index d5aa8310..8c67a0c6 100644
--- a/src/testcurl/https/test_tls_options.c
+++ b/src/testcurl/https/test_tls_options.c
@@ -32,9 +32,7 @@
 #include <gcrypt.h>
 #endif /* MHD_HTTPS_REQUIRE_GRYPT */
 #include "tls_test_common.h"
-
-extern const char srv_key_pem[];
-extern const char srv_self_signed_cert_pem[];
+#include "tls_test_keys.h"
 
 int curl_check_version (const char *req_version, ...);
 
diff --git a/src/testcurl/https/tls_test_keys.h 
b/src/testcurl/https/tls_test_keys.h
index 0c662c9e..53e2151d 100644
--- a/src/testcurl/https/tls_test_keys.h
+++ b/src/testcurl/https/tls_test_keys.h
@@ -23,7 +23,7 @@
 /* Test Certificates */
 
 /* Certificate Authority cert */
-const char ca_cert_pem[] =
+static const char ca_cert_pem[] =
   "-----BEGIN CERTIFICATE-----\n\
 MIIGITCCBAmgAwIBAgIBADANBgkqhkiG9w0BAQsFADCBgTELMAkGA1UEBhMCUlUx\n\
 DzANBgNVBAgMBk1vc2NvdzEPMA0GA1UEBwwGTW9zY293MRswGQYDVQQKDBJ0ZXN0\n\
@@ -62,7 +62,7 @@ 
Gy5ZldbTMTjgn7fChNopz15ChPBnwFIjhm+S0CyiLRQAowfknRVq2IBkj7/5kOWg\n\
 
 
 /* test server key */
-const char srv_signed_key_pem[] =
+static const char srv_signed_key_pem[] =
   "-----BEGIN PRIVATE KEY-----\n\
 MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQCff7amw9zNSE+h\n\
 rOMhBrzbbsJluUP3gmd8nOKY5MUimoPkxmAXfp2L0il+MPZT/ZEmo11q0k6J2jfG\n\
@@ -93,7 +93,7 @@ qdJNJ1DkyUc9dN2cliX4R+rG\n\
 -----END PRIVATE KEY-----";
 
 /* test server CA signed certificates */
-const char srv_signed_cert_pem[] =
+static const char srv_signed_cert_pem[] =
   "-----BEGIN CERTIFICATE-----\n\
 MIIFSzCCAzOgAwIBAgIBBDANBgkqhkiG9w0BAQsFADCBgTELMAkGA1UEBhMCUlUx\n\
 DzANBgNVBAgMBk1vc2NvdzEPMA0GA1UEBwwGTW9zY293MRswGQYDVQQKDBJ0ZXN0\n\
@@ -127,52 +127,52 @@ 
OT1qAbIblaRuWqCsid8BzP7ZQiAnAWgMRSUg1gzDwSwRhrYQRRWAyn/Qipzec+27\n\
 -----END CERTIFICATE-----";
 
 /* test server self signed certificates */
-const char srv_self_signed_cert_pem[] = "-----BEGIN CERTIFICATE-----\n"
-                                        
"MIIC+jCCAeSgAwIBAgIES0KCvTALBgkqhkiG9w0BAQUwFzEVMBMGA1UEAxMMdGVz\n"
-                                        
"dF9jYV9jZXJ0MB4XDTEwMDEwNTAwMDcyNVoXDTQ1MDMxMjAwMDcyNVowFzEVMBMG\n"
-                                        
"A1UEAxMMdGVzdF9jYV9jZXJ0MIIBHzALBgkqhkiG9w0BAQEDggEOADCCAQkCggEA\n"
-                                        
"tDEagv3p9OUhUL55jMucxjNK9N5cuozhcnrwDfBSU6oVrqm5kPqO1I7Cggzw68Y5\n"
-                                        
"jhTcBi4FXmYOZppm1R3MhSJ5JSi/67Q7X4J5rnJLXYGN27qjMpnoGQ/2xmsNG/is\n"
-                                        
"i+h/2vbtPU+WP9SEJnTfPLLpZ7KqCAk7FUUzKsuLx3/SOKtdkrWxPKwYTgnDEN6D\n"
-                                        
"JL7tEzCnG5DFc4mQ7YW9PaRdC3rS1T8PvQ3jB2BUnohM0cFvKRuiU35tU7h7CPbL\n"
-                                        
"4L66VglXoiwqmgcrwI2U968bD0+wRQ5c5bzNoshJOzN6CTMh1IhbklSh/Z6FA/e8\n"
-                                        
"hj0yVo2tdllXuJGVs3PIEwIDAQABo1UwUzAMBgNVHRMBAf8EAjAAMBMGA1UdJQQM\n"
-                                        
"MAoGCCsGAQUFBwMBMA8GA1UdDwEB/wQFAwMHIAAwHQYDVR0OBBYEFDfU7pAv9LYn\n"
-                                        
"n7jb4WHl4+Vgi2FnMAsGCSqGSIb3DQEBBQOCAQEAkaembPQMmv6OOjbIod8zTatr\n"
-                                        
"x5Bwkwp3TOE1NRyy2OytzFIYRUkNrZYlcmrxcbNNycIK41CNVXbriFCF8gcmIq9y\n"
-                                        
"vaKZn8Gcy+vGggv+1BP9IAPBGKRwSi0wmq9JoGE8hx+qqTpRSdfbM/cps/09hicO\n"
-                                        
"0EIR7kWEbvnpMBcMKYOtYE9Gce7rdSMWVAsKc174xn8vW6TxCUvmWFv5DPg5HG1v\n"
-                                        
"y1SUX73qafRo+W6FN4UC/DHfwRhF8RSKEnVbmgDVCs6GHdKBjU2qRgYyj6nWZqK1\n"
-                                        
"XFUTWgia+Fl3D9vlsXaFcSZKA0Bq1eojl0B0AfeYAxTFwPWXscKvt/bXZfH8bg==\n"
-                                        "-----END CERTIFICATE-----\n";
+static const char srv_self_signed_cert_pem[] = "-----BEGIN CERTIFICATE-----\n"
+                                               
"MIIC+jCCAeSgAwIBAgIES0KCvTALBgkqhkiG9w0BAQUwFzEVMBMGA1UEAxMMdGVz\n"
+                                               
"dF9jYV9jZXJ0MB4XDTEwMDEwNTAwMDcyNVoXDTQ1MDMxMjAwMDcyNVowFzEVMBMG\n"
+                                               
"A1UEAxMMdGVzdF9jYV9jZXJ0MIIBHzALBgkqhkiG9w0BAQEDggEOADCCAQkCggEA\n"
+                                               
"tDEagv3p9OUhUL55jMucxjNK9N5cuozhcnrwDfBSU6oVrqm5kPqO1I7Cggzw68Y5\n"
+                                               
"jhTcBi4FXmYOZppm1R3MhSJ5JSi/67Q7X4J5rnJLXYGN27qjMpnoGQ/2xmsNG/is\n"
+                                               
"i+h/2vbtPU+WP9SEJnTfPLLpZ7KqCAk7FUUzKsuLx3/SOKtdkrWxPKwYTgnDEN6D\n"
+                                               
"JL7tEzCnG5DFc4mQ7YW9PaRdC3rS1T8PvQ3jB2BUnohM0cFvKRuiU35tU7h7CPbL\n"
+                                               
"4L66VglXoiwqmgcrwI2U968bD0+wRQ5c5bzNoshJOzN6CTMh1IhbklSh/Z6FA/e8\n"
+                                               
"hj0yVo2tdllXuJGVs3PIEwIDAQABo1UwUzAMBgNVHRMBAf8EAjAAMBMGA1UdJQQM\n"
+                                               
"MAoGCCsGAQUFBwMBMA8GA1UdDwEB/wQFAwMHIAAwHQYDVR0OBBYEFDfU7pAv9LYn\n"
+                                               
"n7jb4WHl4+Vgi2FnMAsGCSqGSIb3DQEBBQOCAQEAkaembPQMmv6OOjbIod8zTatr\n"
+                                               
"x5Bwkwp3TOE1NRyy2OytzFIYRUkNrZYlcmrxcbNNycIK41CNVXbriFCF8gcmIq9y\n"
+                                               
"vaKZn8Gcy+vGggv+1BP9IAPBGKRwSi0wmq9JoGE8hx+qqTpRSdfbM/cps/09hicO\n"
+                                               
"0EIR7kWEbvnpMBcMKYOtYE9Gce7rdSMWVAsKc174xn8vW6TxCUvmWFv5DPg5HG1v\n"
+                                               
"y1SUX73qafRo+W6FN4UC/DHfwRhF8RSKEnVbmgDVCs6GHdKBjU2qRgYyj6nWZqK1\n"
+                                               
"XFUTWgia+Fl3D9vlsXaFcSZKA0Bq1eojl0B0AfeYAxTFwPWXscKvt/bXZfH8bg==\n"
+                                               "-----END CERTIFICATE-----\n";
 
 /* test server key */
-const char srv_key_pem[] = "-----BEGIN RSA PRIVATE KEY-----\n"
-                           
"MIIEpAIBAAKCAQEAtDEagv3p9OUhUL55jMucxjNK9N5cuozhcnrwDfBSU6oVrqm5\n"
-                           
"kPqO1I7Cggzw68Y5jhTcBi4FXmYOZppm1R3MhSJ5JSi/67Q7X4J5rnJLXYGN27qj\n"
-                           
"MpnoGQ/2xmsNG/isi+h/2vbtPU+WP9SEJnTfPLLpZ7KqCAk7FUUzKsuLx3/SOKtd\n"
-                           
"krWxPKwYTgnDEN6DJL7tEzCnG5DFc4mQ7YW9PaRdC3rS1T8PvQ3jB2BUnohM0cFv\n"
-                           
"KRuiU35tU7h7CPbL4L66VglXoiwqmgcrwI2U968bD0+wRQ5c5bzNoshJOzN6CTMh\n"
-                           
"1IhbklSh/Z6FA/e8hj0yVo2tdllXuJGVs3PIEwIDAQABAoIBAAEtcg+LFLGtoxjq\n"
-                           
"b+tFttBJfbRcfdG6ocYqBGmUXF+MgFs573DHX3sHNOQxlaNHtSgIclF1eYgNZFFt\n"
-                           
"VLIoBFTzfEQXoFosPUDoEuqVMeXLttmD7P2jwL780XJLZ4Xj6GY07npq1iGBcEZf\n"
-                           
"yCcdoyGkr9jgc5Auyis8DStGg/jfUBC4NBvF0GnuuNPAdYRPKUpKw9EatI+FdMjy\n"
-                           
"BuroD90fhdkK8EwMEVb9P17bdIc1MCIZFpUE9YHjVdK/oxCUhQ8KRfdbI4JU5Zh3\n"
-                           
"UtO6Jm2wFuP3VmeVpPvE/C2rxI70pyl6HMSiFGNc0rhJYCQ+yhohWj7nZ67H4vLx\n"
-                           
"plv5LxkCgYEAz7ewou8oFafDAMNoxaqKudvUg+lxXewdLDKaYBF5ACi9uAPCJ+v7\n"
-                           
"M5c/fvPFn/XHzo7xaXbtTAH3Z5xzBs+80OsvL+e1Ut4xR+ELRkybknh/s2wQeABk\n"
-                           
"Kb0vA59ukQGj12LV5phZMaVoXe6KJ7hZnN62d3K6m1wGE/k58i4pPLUCgYEA3hN8\n"
-                           
"G95zW7g0jVdSr+KUeVmephph9yh8Yb+3I3ojwOIv6d45TopGx8pFZlnBAMZf1ZQx\n"
-                           
"DIhzJNnaqZy/4w7RNaOGWnPA/5f+MIoHBiLGEEmfHC3lt087Yp9OuwDUHwpETYdV\n"
-                           
"o+KBCvVh60Et3bZUgF/1k/3YXxn8J5dsmJsjNqcCgYBLflyRa1BrRnTGMz9CEDCp\n"
-                           
"Si9b3h1Y4Hbd2GppHhCXMTd6yMrpDYhYANGQB3M9Juv+s88j4JhwNoq/uonH4Pqk\n"
-                           
"B8Y3qAQr4RuSH0WkwDUOsALhqBX4N1QwI1USAQEDbNAqeP5698X7GD3tXcQSmZrg\n"
-                           
"O8WfdjBCRNjkq4EW9xX/vQKBgQDONtmwJ0iHiu2BseyeVo/4fzfKlgUSNQ4K1rOA\n"
-                           
"xhIdMeu8Bxa/z7caHsGC4SVPSuYCtbE2Kh6BwapChcPJXCD45fgEViiJLuJiwEj1\n"
-                           
"caTpyvNsf1IoffJvCe9ZxtMyX549P8ZOgC3Dt0hN5CBrGLwu2Ox5l+YrqT10pi+5\n"
-                           
"JZX1UQKBgQCrcXrdkkDAc/a4+PxNRpJRLcU4fhv8/lr+UWItE8eUe7bd25bTQfQm\n"
-                           
"VpNKc/kAJ66PjIED6fy3ADhd2y4naT2a24uAgQ/M494J68qLnGh6K4JU/09uxR2v\n"
-                           
"1i2q/4FNLdFFk1XP4iNnTHRLZ+NYr2p5Y9RcvQfTjOauz8Ahav0lyg==\n"
-                           "-----END RSA PRIVATE KEY-----\n";
+static const char srv_key_pem[] = "-----BEGIN RSA PRIVATE KEY-----\n"
+                                  
"MIIEpAIBAAKCAQEAtDEagv3p9OUhUL55jMucxjNK9N5cuozhcnrwDfBSU6oVrqm5\n"
+                                  
"kPqO1I7Cggzw68Y5jhTcBi4FXmYOZppm1R3MhSJ5JSi/67Q7X4J5rnJLXYGN27qj\n"
+                                  
"MpnoGQ/2xmsNG/isi+h/2vbtPU+WP9SEJnTfPLLpZ7KqCAk7FUUzKsuLx3/SOKtd\n"
+                                  
"krWxPKwYTgnDEN6DJL7tEzCnG5DFc4mQ7YW9PaRdC3rS1T8PvQ3jB2BUnohM0cFv\n"
+                                  
"KRuiU35tU7h7CPbL4L66VglXoiwqmgcrwI2U968bD0+wRQ5c5bzNoshJOzN6CTMh\n"
+                                  
"1IhbklSh/Z6FA/e8hj0yVo2tdllXuJGVs3PIEwIDAQABAoIBAAEtcg+LFLGtoxjq\n"
+                                  
"b+tFttBJfbRcfdG6ocYqBGmUXF+MgFs573DHX3sHNOQxlaNHtSgIclF1eYgNZFFt\n"
+                                  
"VLIoBFTzfEQXoFosPUDoEuqVMeXLttmD7P2jwL780XJLZ4Xj6GY07npq1iGBcEZf\n"
+                                  
"yCcdoyGkr9jgc5Auyis8DStGg/jfUBC4NBvF0GnuuNPAdYRPKUpKw9EatI+FdMjy\n"
+                                  
"BuroD90fhdkK8EwMEVb9P17bdIc1MCIZFpUE9YHjVdK/oxCUhQ8KRfdbI4JU5Zh3\n"
+                                  
"UtO6Jm2wFuP3VmeVpPvE/C2rxI70pyl6HMSiFGNc0rhJYCQ+yhohWj7nZ67H4vLx\n"
+                                  
"plv5LxkCgYEAz7ewou8oFafDAMNoxaqKudvUg+lxXewdLDKaYBF5ACi9uAPCJ+v7\n"
+                                  
"M5c/fvPFn/XHzo7xaXbtTAH3Z5xzBs+80OsvL+e1Ut4xR+ELRkybknh/s2wQeABk\n"
+                                  
"Kb0vA59ukQGj12LV5phZMaVoXe6KJ7hZnN62d3K6m1wGE/k58i4pPLUCgYEA3hN8\n"
+                                  
"G95zW7g0jVdSr+KUeVmephph9yh8Yb+3I3ojwOIv6d45TopGx8pFZlnBAMZf1ZQx\n"
+                                  
"DIhzJNnaqZy/4w7RNaOGWnPA/5f+MIoHBiLGEEmfHC3lt087Yp9OuwDUHwpETYdV\n"
+                                  
"o+KBCvVh60Et3bZUgF/1k/3YXxn8J5dsmJsjNqcCgYBLflyRa1BrRnTGMz9CEDCp\n"
+                                  
"Si9b3h1Y4Hbd2GppHhCXMTd6yMrpDYhYANGQB3M9Juv+s88j4JhwNoq/uonH4Pqk\n"
+                                  
"B8Y3qAQr4RuSH0WkwDUOsALhqBX4N1QwI1USAQEDbNAqeP5698X7GD3tXcQSmZrg\n"
+                                  
"O8WfdjBCRNjkq4EW9xX/vQKBgQDONtmwJ0iHiu2BseyeVo/4fzfKlgUSNQ4K1rOA\n"
+                                  
"xhIdMeu8Bxa/z7caHsGC4SVPSuYCtbE2Kh6BwapChcPJXCD45fgEViiJLuJiwEj1\n"
+                                  
"caTpyvNsf1IoffJvCe9ZxtMyX549P8ZOgC3Dt0hN5CBrGLwu2Ox5l+YrqT10pi+5\n"
+                                  
"JZX1UQKBgQCrcXrdkkDAc/a4+PxNRpJRLcU4fhv8/lr+UWItE8eUe7bd25bTQfQm\n"
+                                  
"VpNKc/kAJ66PjIED6fy3ADhd2y4naT2a24uAgQ/M494J68qLnGh6K4JU/09uxR2v\n"
+                                  
"1i2q/4FNLdFFk1XP4iNnTHRLZ+NYr2p5Y9RcvQfTjOauz8Ahav0lyg==\n"
+                                  "-----END RSA PRIVATE KEY-----\n";
 
 #endif

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]