Changeset 12 for trunk/src/sh_forward.c
- Timestamp:
- Jan 5, 2006, 11:15:45 PM (19 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/src/sh_forward.c
r11 r12 177 177 178 178 int clt_class = (-1); 179 180 extern int flag_err_debug; 181 extern int flag_err_info; 179 182 180 183 #ifndef SH_STANDALONE … … 1225 1228 else 1226 1229 { 1227 sh_error_handle((-1), FIL__, __LINE__, 0, MSG_TCP_AUTH); 1230 if (flag_err_info == SL_TRUE) 1231 sh_error_handle((-1), FIL__, __LINE__, 0, MSG_TCP_AUTH); 1228 1232 } 1229 1233 } … … 1450 1454 /* --- SERVER CMD END --- */ 1451 1455 #endif 1452 sh_error_handle((-1), FIL__, __LINE__, 0, 1453 MSG_TCP_CONF); 1456 if (flag_err_debug == SL_TRUE) 1457 sh_error_handle((-1), FIL__, __LINE__, 0, 1458 MSG_TCP_CONF); 1454 1459 } 1455 1460 } … … 1648 1653 (void) rewind_tmp (sfd); 1649 1654 (void) sl_sync(sfd); 1650 sh_error_handle((-1), FIL__, __LINE__, 0, MSG_TCP_FOK); 1655 if (flag_err_info == SL_TRUE) 1656 sh_error_handle((-1), FIL__, __LINE__, 0, MSG_TCP_FOK); 1651 1657 } 1652 1658 else … … 2812 2818 conn->head[5] = 'L'; 2813 2819 conn->head[6] = 'T'; 2814 sh_error_handle((-1), FIL__, __LINE__, 0, MSG_TCP_FAUTH, 2815 &(conn->buf[KEY_LEN])); 2820 if (flag_err_info == SL_TRUE) 2821 sh_error_handle((-1), FIL__, __LINE__, 0, MSG_TCP_FAUTH, 2822 &(conn->buf[KEY_LEN])); 2816 2823 strcpy(conn->buf, /* known to fit */ 2817 2824 &(conn->buf[KEY_LEN])); … … 3172 3179 _("msg=<File transfer - EOTE (7).>\n"))); 3173 3180 3174 sh_error_handle((-1), FIL__, __LINE__, 0, MSG_TCP_OKFILE, 3175 conn->peer); 3181 if (flag_err_info == SL_TRUE) 3182 sh_error_handle((-1), FIL__, __LINE__, 0, MSG_TCP_OKFILE, 3183 conn->peer); 3176 3184 3177 3185 if ((conn->client_entry->status_now != CLT_SUSPEND) && … … 3267 3275 conn->head[5] = 'L'; 3268 3276 conn->head[6] = 'T'; 3269 sh_error_handle((-1), FIL__, __LINE__, 0, MSG_TCP_FAUTH, 3270 &(conn->buf[KEY_LEN])); 3277 if (flag_err_info == SL_TRUE) 3278 sh_error_handle((-1), FIL__, __LINE__, 0, MSG_TCP_FAUTH, 3279 &(conn->buf[KEY_LEN])); 3271 3280 strcpy(conn->buf, /* known to fit */ 3272 3281 &(conn->buf[KEY_LEN])); … … 3591 3600 if (0 != (conn->head[0] & SH_PROTO_END)) 3592 3601 { 3593 sh_error_handle((-1), FIL__, __LINE__, 0, MSG_TCP_OKMSG, 3594 sh_strip_domain (conn->peer)); 3602 if (flag_err_debug == SL_TRUE) 3603 sh_error_handle((-1), FIL__, __LINE__, 0, MSG_TCP_OKMSG, 3604 sh_strip_domain (conn->peer)); 3595 3605 sh_forward_do_free (conn); 3596 3606 SL_RET0(_("check_protocol")); … … 4568 4578 newconn->timer = (unsigned long) time (NULL); 4569 4579 4570 sh_error_handle((-1), FIL__, __LINE__, 0, MSG_TCP_CNEW, newconn->fd); 4580 if (flag_err_info == SL_TRUE) 4581 sh_error_handle((-1), FIL__, __LINE__, 0, MSG_TCP_CNEW, newconn->fd); 4571 4582 4572 4583 SL_RETURN( (0), _("sh_forward_accept"));
Note:
See TracChangeset
for help on using the changeset viewer.