From 3e3246e42af6979556dec66ec10ad3d3e009217c Mon Sep 17 00:00:00 2001
From: neil_a_wilson <neil_a_wilson@localhost>
Date: Thu, 01 Mar 2007 05:18:42 +0000
Subject: [PATCH] Remove blank lines at the beginning of methods left after eliminating the debugEnter and debugConstructor calls.
---
opendj-sdk/opends/src/server/org/opends/server/protocols/ldap/LDAPClientConnection.java | 66 ---------------------------------
1 files changed, 0 insertions(+), 66 deletions(-)
diff --git a/opendj-sdk/opends/src/server/org/opends/server/protocols/ldap/LDAPClientConnection.java b/opendj-sdk/opends/src/server/org/opends/server/protocols/ldap/LDAPClientConnection.java
index d60b933..a19009b 100644
--- a/opendj-sdk/opends/src/server/org/opends/server/protocols/ldap/LDAPClientConnection.java
+++ b/opendj-sdk/opends/src/server/org/opends/server/protocols/ldap/LDAPClientConnection.java
@@ -272,7 +272,6 @@
*/
public long getConnectionID()
{
-
return connectionID;
}
@@ -285,7 +284,6 @@
*/
public ConnectionHandler getConnectionHandler()
{
-
return connectionHandler;
}
@@ -300,7 +298,6 @@
*/
public LDAPRequestHandler getRequestHandler()
{
-
return requestHandler;
}
@@ -315,7 +312,6 @@
*/
public void setRequestHandler(LDAPRequestHandler requestHandler)
{
-
this.requestHandler = requestHandler;
}
@@ -330,7 +326,6 @@
*/
public SocketChannel getSocketChannel()
{
-
return clientChannel;
}
@@ -345,7 +340,6 @@
*/
public String getProtocol()
{
-
return protocol;
}
@@ -358,7 +352,6 @@
*/
public String getClientAddress()
{
-
return clientAddress;
}
@@ -371,7 +364,6 @@
*/
public int getClientPort()
{
-
return clientPort;
}
@@ -398,7 +390,6 @@
*/
public String getServerAddress()
{
-
return serverAddress;
}
@@ -411,7 +402,6 @@
*/
public int getServerPort()
{
-
return serverPort;
}
@@ -439,7 +429,6 @@
*/
public InetAddress getRemoteAddress()
{
-
return clientChannel.socket().getInetAddress();
}
@@ -456,7 +445,6 @@
*/
public InetAddress getLocalAddress()
{
-
return clientChannel.socket().getLocalAddress();
}
@@ -475,7 +463,6 @@
*/
public boolean isSecure()
{
-
return securityProvider.isSecure();
}
@@ -488,7 +475,6 @@
*/
public ConnectionSecurityProvider getConnectionSecurityProvider()
{
-
return securityProvider;
}
@@ -503,7 +489,6 @@
public void setConnectionSecurityProvider(ConnectionSecurityProvider
securityProvider)
{
-
this.securityProvider = securityProvider;
if (securityProvider.isSecure())
@@ -528,7 +513,6 @@
*/
public String getSecurityMechanism()
{
-
return securityProvider.getSecurityMechanismName();
}
@@ -541,7 +525,6 @@
*/
public long nextOperationID()
{
-
return nextOperationID.getAndIncrement();
}
@@ -555,7 +538,6 @@
*/
public void sendResponse(Operation operation)
{
-
LDAPMessage message = operationToResponseLDAPMessage(operation);
if (message != null)
{
@@ -577,7 +559,6 @@
*/
private LDAPMessage operationToResponseLDAPMessage(Operation operation)
{
-
ResultCode resultCode = operation.getResultCode();
if (resultCode == null)
{
@@ -734,7 +715,6 @@
public void sendSearchEntry(SearchOperation searchOperation,
SearchResultEntry searchEntry)
{
-
SearchResultEntryProtocolOp protocolOp =
new SearchResultEntryProtocolOp(searchEntry);
@@ -776,8 +756,6 @@
public boolean sendSearchReference(SearchOperation searchOperation,
SearchResultReference searchReference)
{
-
-
// Make sure this is not an LDAPv2 client. If it is, then they can't see
// referrals so we'll not send anything. Also, throw an exception so that
// the core server will know not to try sending any more referrals to this
@@ -831,7 +809,6 @@
protected boolean sendIntermediateResponseMessage(
IntermediateResponse intermediateResponse)
{
-
IntermediateResponseProtocolOp protocolOp =
new IntermediateResponseProtocolOp(intermediateResponse.getOID(),
intermediateResponse.getValue());
@@ -869,7 +846,6 @@
private void sendLDAPMessage(ConnectionSecurityProvider secProvider,
LDAPMessage message)
{
-
ASN1Element messageElement = message.encode();
ByteBuffer messageBuffer = ByteBuffer.wrap(messageElement.encode());
@@ -958,8 +934,6 @@
boolean sendNotification, String message,
int messageID)
{
-
-
// If we are already in the middle of a disconnect, then don't do anything.
if (disconnectRequested)
{
@@ -1142,7 +1116,6 @@
*/
public Collection<Operation> getOperationsInProgress()
{
-
return operationsInProgress.values();
}
@@ -1158,7 +1131,6 @@
*/
public Operation getOperationInProgress(int messageID)
{
-
return operationsInProgress.get(messageID);
}
@@ -1178,7 +1150,6 @@
public void addOperationInProgress(Operation operation)
throws DirectoryException
{
-
int messageID = operation.getMessageID();
// We need to grab a lock to ensure that no one else can add operations to
@@ -1261,7 +1232,6 @@
*/
public boolean removeOperationInProgress(int messageID)
{
-
Operation operation = operationsInProgress.remove(messageID);
return (operation != null);
}
@@ -1281,7 +1251,6 @@
public CancelResult cancelOperation(int messageID,
CancelRequest cancelRequest)
{
-
Operation op = operationsInProgress.get(messageID);
if (op == null)
{
@@ -1326,8 +1295,6 @@
*/
public void cancelAllOperations(CancelRequest cancelRequest)
{
-
-
// Make sure that no one can add any new operations.
opsInProgressLock.lock();
@@ -1387,8 +1354,6 @@
public void cancelAllOperationsExcept(CancelRequest cancelRequest,
int messageID)
{
-
-
// Make sure that no one can add any new operations.
opsInProgressLock.lock();
@@ -1754,8 +1719,6 @@
*/
private boolean processLDAPMessage(LDAPMessage message)
{
-
-
if (keepStats)
{
statTracker.updateMessageRead(message);
@@ -1852,8 +1815,6 @@
private boolean processAbandonRequest(LDAPMessage message,
ArrayList<Control> controls)
{
-
-
AbandonRequestProtocolOp protocolOp = message.getAbandonRequestProtocolOp();
AbandonOperation abandonOp =
new AbandonOperation(this, nextOperationID.getAndIncrement(),
@@ -1886,8 +1847,6 @@
private boolean processAddRequest(LDAPMessage message,
ArrayList<Control> controls)
{
-
-
// Create the add operation and add it into the work queue.
AddRequestProtocolOp protocolOp = message.getAddRequestProtocolOp();
AddOperation addOp =
@@ -1935,8 +1894,6 @@
private boolean processBindRequest(LDAPMessage message,
ArrayList<Control> controls)
{
-
-
BindRequestProtocolOp protocolOp = message.getBindRequestProtocolOp();
// See if this is an LDAPv2 bind request, and if so whether that should be
@@ -2034,8 +1991,6 @@
private boolean processCompareRequest(LDAPMessage message,
ArrayList<Control> controls)
{
-
-
CompareRequestProtocolOp protocolOp = message.getCompareRequestProtocolOp();
CompareOperation compareOp =
new CompareOperation(this, nextOperationID.getAndIncrement(),
@@ -2087,8 +2042,6 @@
private boolean processDeleteRequest(LDAPMessage message,
ArrayList<Control> controls)
{
-
-
DeleteRequestProtocolOp protocolOp = message.getDeleteRequestProtocolOp();
DeleteOperation deleteOp =
new DeleteOperation(this, nextOperationID.getAndIncrement(),
@@ -2138,8 +2091,6 @@
private boolean processExtendedRequest(LDAPMessage message,
ArrayList<Control> controls)
{
-
-
// See if this is an LDAPv2 client. If it is, then they should not be
// issuing extended requests. We can't send a response that we can be sure
// they can understand, so we have no choice but to close the connection.
@@ -2211,8 +2162,6 @@
private boolean processModifyRequest(LDAPMessage message,
ArrayList<Control> controls)
{
-
-
ModifyRequestProtocolOp protocolOp = message.getModifyRequestProtocolOp();
ModifyOperation modifyOp =
new ModifyOperation(this, nextOperationID.getAndIncrement(),
@@ -2262,8 +2211,6 @@
private boolean processModifyDNRequest(LDAPMessage message,
ArrayList<Control> controls)
{
-
-
ModifyDNRequestProtocolOp protocolOp =
message.getModifyDNRequestProtocolOp();
ModifyDNOperation modifyDNOp =
@@ -2317,8 +2264,6 @@
private boolean processSearchRequest(LDAPMessage message,
ArrayList<Control> controls)
{
-
-
SearchRequestProtocolOp protocolOp = message.getSearchRequestProtocolOp();
SearchOperation searchOp =
new SearchOperation(this, nextOperationID.getAndIncrement(),
@@ -2374,8 +2319,6 @@
private boolean processUnbindRequest(LDAPMessage message,
ArrayList<Control> controls)
{
-
-
UnbindOperation unbindOp =
new UnbindOperation(this, nextOperationID.getAndIncrement(),
message.getMessageID(), controls);
@@ -2394,7 +2337,6 @@
*/
public String getMonitorSummary()
{
-
StringBuilder buffer = new StringBuilder();
buffer.append("connID=\"");
buffer.append(connectionID);
@@ -2445,7 +2387,6 @@
*/
public void toString(StringBuilder buffer)
{
-
buffer.append("LDAP client connection from ");
buffer.append(clientAddress);
buffer.append(":");
@@ -2473,8 +2414,6 @@
*/
public boolean tlsProtectionAvailable(StringBuilder unavailableReason)
{
-
-
// Make sure that this client connection does not already have some other
// security provider enabled.
if (! (securityProvider instanceof NullConnectionSecurityProvider))
@@ -2550,7 +2489,6 @@
public void enableTLSConnectionSecurityProvider()
throws DirectoryException
{
-
if (tlsSecurityProvider == null)
{
int msgID = MSGID_LDAP_TLS_NO_PROVIDER;
@@ -2581,7 +2519,6 @@
public void disableTLSConnectionSecurityProvider()
throws DirectoryException
{
-
int msgID = MSGID_LDAP_TLS_CLOSURE_NOT_ALLOWED;
String message = getMessage(msgID);
@@ -2608,7 +2545,6 @@
public void sendClearResponse(Operation operation)
throws DirectoryException
{
-
if (clearSecurityProvider == null)
{
int msgID = MSGID_LDAP_NO_CLEAR_SECURITY_PROVIDER;
@@ -2628,7 +2564,6 @@
*/
public DN getKeyManagerProviderDN()
{
-
return connectionHandler.getKeyManagerProviderDN();
}
@@ -2639,7 +2574,6 @@
*/
public DN getTrustManagerProviderDN()
{
-
return connectionHandler.getTrustManagerProviderDN();
}
--
Gitblit v1.10.0