diff options
author | Werner Koch <wk@gnupg.org> | 2010-12-02 14:53:18 +0100 |
---|---|---|
committer | Werner Koch <wk@gnupg.org> | 2010-12-02 14:53:18 +0100 |
commit | 6dda170e32052c34528282bb5dc6214db09155a0 (patch) | |
tree | 1577c12c99fcab1d23c2fb278de2679ed630dfdc | |
parent | Init cache encryption on the fly. (diff) | |
download | gnupg2-6dda170e32052c34528282bb5dc6214db09155a0.tar.xz gnupg2-6dda170e32052c34528282bb5dc6214db09155a0.zip |
Remove recently added debug output
-rw-r--r-- | agent/gpg-agent.c | 21 |
1 files changed, 1 insertions, 20 deletions
diff --git a/agent/gpg-agent.c b/agent/gpg-agent.c index b897a9b7e..92a26eb1e 100644 --- a/agent/gpg-agent.c +++ b/agent/gpg-agent.c @@ -1429,7 +1429,6 @@ get_agent_scd_notify_event (void) } } - log_debug ("returning notify handle %p\n", the_event); return the_event; } #endif /*HAVE_W32_SYSTEM && !HAVE_W32CE_SYSTEM*/ @@ -1800,11 +1799,9 @@ start_connection_thread (void *arg) { ctrl_t ctrl = arg; - if (opt.verbose) - log_debug ("handler 0x%lx checking nonce\n", pth_thread_id ()); if (check_nonce (ctrl, &socket_nonce)) { - log_debug ("handler 0x%lx nonce check FAILED\n", pth_thread_id ()); + log_error ("handler 0x%lx nonce check FAILED\n", pth_thread_id ()); return NULL; } @@ -1924,7 +1921,6 @@ handle_connections (gnupg_fd_t listen_fd, gnupg_fd_t listen_fd_ssh) for (;;) { - log_debug ("%s: Begin main loop\n", __func__); /* Make sure that our signals are not blocked. */ pth_sigmask (SIG_UNBLOCK, &sigs, NULL); @@ -1934,7 +1930,6 @@ handle_connections (gnupg_fd_t listen_fd, gnupg_fd_t listen_fd_ssh) if (pth_ctrl (PTH_CTRL_GETTHREADS) == 1) break; /* ready */ - log_debug ("%s: shutdown pending\n", __func__); /* Do not accept new connections but keep on running the loop to cope with the timer events. */ FD_ZERO (&fdset); @@ -1953,7 +1948,6 @@ handle_connections (gnupg_fd_t listen_fd, gnupg_fd_t listen_fd_ssh) nexttick.tv_usec = 0; } time_ev = pth_event (PTH_EVENT_TIME, nexttick); - log_debug ("%s: time event created\n", __func__); } /* POSIX says that fd_set should be implemented as a structure, @@ -1963,9 +1957,7 @@ handle_connections (gnupg_fd_t listen_fd, gnupg_fd_t listen_fd_ssh) if (time_ev) pth_event_concat (ev, time_ev, NULL); - log_debug ("%s: Pre-select\n", __func__); ret = pth_select_ev (nfd+1, &read_fdset, NULL, NULL, NULL, ev); - log_debug ("%s: Post-select res=%d\n", __func__, ret); if (time_ev) pth_event_isolate (time_ev); @@ -1996,10 +1988,8 @@ handle_connections (gnupg_fd_t listen_fd, gnupg_fd_t listen_fd_ssh) continue; } - log_debug ("%s: Checking events\n", __func__); if (pth_event_occurred (ev)) { - log_debug ("%s: Got event\n", __func__); #if defined(HAVE_W32_SYSTEM) && defined(PTH_EVENT_HANDLE) agent_sigusr2_action (); #else @@ -2009,14 +1999,12 @@ handle_connections (gnupg_fd_t listen_fd, gnupg_fd_t listen_fd_ssh) if (time_ev && pth_event_occurred (time_ev)) { - log_debug ("%s: Got tick event\n", __func__); pth_event_free (time_ev, PTH_FREE_ALL); time_ev = NULL; handle_tick (); } - log_debug ("%s: Restore mask\n", __func__); /* We now might create new threads and because we don't want any signals (as we are handling them here) to be delivered to a new thread. Thus we need to block those signals. */ @@ -2026,11 +2014,9 @@ handle_connections (gnupg_fd_t listen_fd, gnupg_fd_t listen_fd_ssh) { ctrl_t ctrl; - log_debug ("%s: Pre-accept\n", __func__); plen = sizeof paddr; fd = INT2FD (pth_accept (FD2INT(listen_fd), (struct sockaddr *)&paddr, &plen)); - log_debug ("%s: Post-accept fd=%d\n", __func__, fd); if (fd == GNUPG_INVALID_FD) { log_error ("accept failed: %s\n", strerror (errno)); @@ -2052,7 +2038,6 @@ handle_connections (gnupg_fd_t listen_fd, gnupg_fd_t listen_fd_ssh) { char threadname[50]; - log_debug ("%s: Spawning handler\n", __func__); snprintf (threadname, sizeof threadname-1, "conn fd=%d (gpg)", FD2INT(fd)); threadname[sizeof threadname -1] = 0; @@ -2065,7 +2050,6 @@ handle_connections (gnupg_fd_t listen_fd, gnupg_fd_t listen_fd_ssh) assuan_sock_close (fd); xfree (ctrl); } - log_debug ("%s: handler spawned\n", __func__); } fd = GNUPG_INVALID_FD; } @@ -2075,7 +2059,6 @@ handle_connections (gnupg_fd_t listen_fd, gnupg_fd_t listen_fd_ssh) { ctrl_t ctrl; - log_debug ("%s: SSH STUFF!\n", __func__); plen = sizeof paddr; fd = INT2FD(pth_accept (FD2INT(listen_fd_ssh), (struct sockaddr *)&paddr, &plen)); @@ -2116,10 +2099,8 @@ handle_connections (gnupg_fd_t listen_fd, gnupg_fd_t listen_fd_ssh) } fd = GNUPG_INVALID_FD; } - log_debug ("%s: End main loop\n", __func__); } - log_debug ("%s: main loop terminated\n", __func__); pth_event_free (ev, PTH_FREE_ALL); if (time_ev) pth_event_free (time_ev, PTH_FREE_ALL); |