[svn] GnuPG - r5490 - trunk/agent

svn author wk cvs at cvs.gnupg.org
Thu Dec 2 14:53:19 CET 2010


Author: wk
Date: 2010-12-02 14:53:18 +0100 (Thu, 02 Dec 2010)
New Revision: 5490

Modified:
   trunk/agent/gpg-agent.c
Log:
Remove recently added debug output


Modified: trunk/agent/gpg-agent.c
===================================================================
--- trunk/agent/gpg-agent.c	2010-11-29 06:49:44 UTC (rev 5489)
+++ trunk/agent/gpg-agent.c	2010-12-02 13:53:18 UTC (rev 5490)
@@ -1429,7 +1429,6 @@
         }
     }
 
-  log_debug  ("returning notify handle %p\n", the_event);
   return the_event;
 }
 #endif /*HAVE_W32_SYSTEM && !HAVE_W32CE_SYSTEM*/
@@ -1800,11 +1799,9 @@
 {
   ctrl_t ctrl = arg;
 
-  if (opt.verbose)
-    log_debug ("handler 0x%lx checking nonce\n", pth_thread_id ());
   if (check_nonce (ctrl, &socket_nonce))
     {
-      log_debug ("handler 0x%lx nonce check FAILED\n", pth_thread_id ());
+      log_error ("handler 0x%lx nonce check FAILED\n", pth_thread_id ());
       return NULL;
     }
 
@@ -1924,7 +1921,6 @@
 
   for (;;)
     {
-      log_debug ("%s: Begin main loop\n", __func__);
       /* Make sure that our signals are not blocked.  */
       pth_sigmask (SIG_UNBLOCK, &sigs, NULL);
 
@@ -1934,7 +1930,6 @@
           if (pth_ctrl (PTH_CTRL_GETTHREADS) == 1)
             break; /* ready */
 
-          log_debug ("%s: shutdown pending\n", __func__);
           /* Do not accept new connections but keep on running the
              loop to cope with the timer events.  */
           FD_ZERO (&fdset);
@@ -1953,7 +1948,6 @@
               nexttick.tv_usec = 0;
             }
           time_ev = pth_event (PTH_EVENT_TIME, nexttick);
-          log_debug ("%s: time event created\n", __func__);
         }
 
       /* POSIX says that fd_set should be implemented as a structure,
@@ -1963,9 +1957,7 @@
       if (time_ev)
         pth_event_concat (ev, time_ev, NULL);
 
-      log_debug ("%s: Pre-select\n", __func__);
       ret = pth_select_ev (nfd+1, &read_fdset, NULL, NULL, NULL, ev);
-      log_debug ("%s: Post-select res=%d\n", __func__, ret);
       if (time_ev)
         pth_event_isolate (time_ev);
 
@@ -1996,10 +1988,8 @@
           continue;
 	}
 
-      log_debug ("%s: Checking events\n", __func__);
       if (pth_event_occurred (ev))
         {
-          log_debug ("%s: Got event\n", __func__);
 #if defined(HAVE_W32_SYSTEM) && defined(PTH_EVENT_HANDLE)
           agent_sigusr2_action ();
 #else
@@ -2009,14 +1999,12 @@
 
       if (time_ev && pth_event_occurred (time_ev))
         {
-          log_debug ("%s: Got tick event\n", __func__);
           pth_event_free (time_ev, PTH_FREE_ALL);
           time_ev = NULL;
           handle_tick ();
         }
 
 
-      log_debug ("%s: Restore mask\n", __func__);
       /* We now might create new threads and because we don't want any
          signals (as we are handling them here) to be delivered to a
          new thread.  Thus we need to block those signals. */
@@ -2026,11 +2014,9 @@
 	{
           ctrl_t ctrl;
 
-          log_debug ("%s: Pre-accept\n", __func__);
           plen = sizeof paddr;
 	  fd = INT2FD (pth_accept (FD2INT(listen_fd),
                                    (struct sockaddr *)&paddr, &plen));
-          log_debug ("%s: Post-accept fd=%d\n", __func__, fd);
 	  if (fd == GNUPG_INVALID_FD)
 	    {
 	      log_error ("accept failed: %s\n", strerror (errno));
@@ -2052,7 +2038,6 @@
             {
               char threadname[50];
 
-              log_debug ("%s: Spawning handler\n", __func__);
               snprintf (threadname, sizeof threadname-1,
                         "conn fd=%d (gpg)", FD2INT(fd));
               threadname[sizeof threadname -1] = 0;
@@ -2065,7 +2050,6 @@
                   assuan_sock_close (fd);
                   xfree (ctrl);
                 }
-              log_debug ("%s: handler spawned\n", __func__);
             }
           fd = GNUPG_INVALID_FD;
 	}
@@ -2075,7 +2059,6 @@
 	{
           ctrl_t ctrl;
 
-          log_debug ("%s: SSH STUFF!\n", __func__);
           plen = sizeof paddr;
 	  fd = INT2FD(pth_accept (FD2INT(listen_fd_ssh),
                                   (struct sockaddr *)&paddr, &plen));
@@ -2116,10 +2099,8 @@
             }
           fd = GNUPG_INVALID_FD;
 	}
-      log_debug ("%s: End main loop\n", __func__);
     }
 
-  log_debug ("%s: main loop terminated\n", __func__);
   pth_event_free (ev, PTH_FREE_ALL);
   if (time_ev)
     pth_event_free (time_ev, PTH_FREE_ALL);





More information about the Gnupg-commits mailing list