From 7aadfc1bd1b82b2ff6b5e11bce1ad9d9086d39c3 Mon Sep 17 00:00:00 2001
From: "Dmitriy A. Gerasimov" <dmitriy.gerasimov@demlabs.net>
Date: Mon, 31 Aug 2020 14:08:22 +0700
Subject: [PATCH] [-] Removed some useless logs

---
 CMakeLists.txt                     |  2 +-
 dap-sdk/crypto/src/dap_cert.c      |  4 ++--
 dap-sdk/crypto/src/dap_cert_file.c | 10 +++++-----
 3 files changed, 8 insertions(+), 8 deletions(-)

diff --git a/CMakeLists.txt b/CMakeLists.txt
index bcaaefd9ff..c4fcc8f9a4 100644
--- a/CMakeLists.txt
+++ b/CMakeLists.txt
@@ -2,7 +2,7 @@ project(cellframe-sdk C)
 cmake_minimum_required(VERSION 2.8)
 
 set(CMAKE_C_STANDARD 11)
-set(CELLFRAME_SDK_NATIVE_VERSION "2.4-3")
+set(CELLFRAME_SDK_NATIVE_VERSION "2.5-0")
 add_definitions ("-DCELLFRAME_SDK_VERSION=\"${CELLFRAME_SDK_NATIVE_VERSION}\"")
 
 set(DAPSDK_MODULES "")
diff --git a/dap-sdk/crypto/src/dap_cert.c b/dap-sdk/crypto/src/dap_cert.c
index 2916d19b67..b9bc426886 100755
--- a/dap-sdk/crypto/src/dap_cert.c
+++ b/dap-sdk/crypto/src/dap_cert.c
@@ -207,11 +207,11 @@ dap_cert_t * dap_cert_generate_mem_with_seed(const char * a_cert_name, dap_enc_k
     if ( l_enc_key ){
         dap_cert_t * l_cert = dap_cert_new(a_cert_name);
         l_cert->enc_key = l_enc_key;
-        log_it(L_DEBUG,"Certificate generated");
+        //log_it(L_DEBUG,"Certificate generated");
         //dap_cert_item_t * l_cert_item = DAP_NEW_Z(dap_cert_item_t);
         //snprintf(l_cert_item->name,sizeof(l_cert_item->name),"%s",a_cert_name);
         //HASH_ADD_STR(s_certs,name,l_cert_item);
-        log_it(L_DEBUG,"Certificate name %s recorded", a_cert_name);
+        //log_it(L_DEBUG,"Certificate name %s recorded", a_cert_name);
         return l_cert;
     } else {
         log_it(L_ERROR,"Can't generate key in memory!");
diff --git a/dap-sdk/crypto/src/dap_cert_file.c b/dap-sdk/crypto/src/dap_cert_file.c
index cad1955c2d..7a733e50b6 100755
--- a/dap-sdk/crypto/src/dap_cert_file.c
+++ b/dap-sdk/crypto/src/dap_cert_file.c
@@ -238,15 +238,15 @@ uint8_t* dap_cert_mem_save(dap_cert_t * a_cert, uint32_t *a_cert_size_out)
     l_hdr.type = dap_cert_FILE_TYPE_PUBLIC;
     if ( l_priv_key_data ){
         l_hdr.type =  dap_cert_FILE_TYPE_PRIVATE;
-        log_it(L_DEBUG,"Private key size %u",l_priv_key_data_size);
+        //log_it(L_DEBUG,"Private key size %u",l_priv_key_data_size);
     }
     if (l_pub_key_data){
-        log_it(L_DEBUG,"Public key size %u",l_pub_key_data_size);
+        //log_it(L_DEBUG,"Public key size %u",l_pub_key_data_size);
     }else{
         log_it(L_ERROR,"No public or private key in certificate, nothing to save");
         goto lb_exit;
     }
-    log_it(L_DEBUG,"Key private data size %u",l_key->_inheritor_size);
+    //log_it(L_DEBUG,"Key private data size %u",l_key->_inheritor_size);
 
     l_hdr.version = dap_cert_FILE_VERSION;
     l_hdr.data_size = l_pub_key_data_size;
@@ -290,7 +290,7 @@ lb_exit:
         DAP_DELETE(l_metadata);
     }
 
-    log_it(L_NOTICE,"Certificate \"%s\" successfully serialized",a_cert->name);
+    //log_it(L_NOTICE,"Certificate \"%s\" successfully serialized",a_cert->name);
 
     if(a_cert_size_out)
         *a_cert_size_out = l_data_offset;
@@ -378,7 +378,7 @@ dap_cert_t* dap_cert_mem_load(const void * a_data, size_t a_data_size)
             l_data_offset += l_hdr.metadata_size;
         }
         dap_enc_key_update(l_ret->enc_key);
-        log_it(L_NOTICE,"Successfully loaded certificate %s", l_ret->name);
+        //log_it(L_NOTICE,"Successfully loaded certificate %s", l_ret->name);
     }else
         log_it(L_ERROR,"Unrecognizable certificate version, corrupted file or you have too old software");
 
-- 
GitLab