diff options
author | Timothy Pearson <[email protected]> | 2011-12-19 11:35:00 -0600 |
---|---|---|
committer | Timothy Pearson <[email protected]> | 2011-12-19 11:35:00 -0600 |
commit | 522c7294f06d294c77bc1ea7d0dec4b371c43373 (patch) | |
tree | 22e15f6e31eba6c17ce06d8e1b0de24ef8b8f002 /src/kgpgme.cpp | |
parent | 2a411f53a04f815770074b633e026a141f6fa875 (diff) | |
download | basket-522c7294f06d294c77bc1ea7d0dec4b371c43373.tar.gz basket-522c7294f06d294c77bc1ea7d0dec4b371c43373.zip |
Remove additional unneeded tq method conversions
Diffstat (limited to 'src/kgpgme.cpp')
-rw-r--r-- | src/kgpgme.cpp | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/src/kgpgme.cpp b/src/kgpgme.cpp index cc5662e..72a5742 100644 --- a/src/kgpgme.cpp +++ b/src/kgpgme.cpp @@ -139,7 +139,7 @@ void KGpgMe::init(gpgme_protocol_t proto) err = gpgme_engine_check_version(proto); if(err) { KMessageBox::error(TQT_TQWIDGET(kapp->activeWindow()), TQString("%1: %2") - .tqarg(gpgme_strsource(err)).tqarg(gpgme_strerror(err))); + .arg(gpgme_strsource(err)).arg(gpgme_strerror(err))); } } @@ -221,7 +221,7 @@ KGpgKeyList KGpgMe::keys(bool privateKeys /* = false */) const if(err) { KMessageBox::error(TQT_TQWIDGET(kapp->activeWindow()), TQString("%1: %2") - .tqarg(gpgme_strsource(err)).tqarg(gpgme_strerror(err))); + .arg(gpgme_strsource(err)).arg(gpgme_strerror(err))); } else { result = gpgme_op_keylist_result(m_ctx); @@ -263,8 +263,8 @@ bool KGpgMe::encrypt(const TQByteArray& inBuffer, TQ_ULONG length, result = gpgme_op_encrypt_result(m_ctx); if (result->invalid_recipients) { KMessageBox::error(TQT_TQWIDGET(kapp->activeWindow()), TQString("%1: %2") - .tqarg(i18n("That public key is not meant for encryption")) - .tqarg(result->invalid_recipients->fpr)); + .arg(i18n("That public key is not meant for encryption")) + .arg(result->invalid_recipients->fpr)); } else { err = readToBuffer(out, outBuffer); @@ -276,7 +276,7 @@ bool KGpgMe::encrypt(const TQByteArray& inBuffer, TQ_ULONG length, } if(err != GPG_ERR_NO_ERROR && err != GPG_ERR_CANCELED) { KMessageBox::error(TQT_TQWIDGET(kapp->activeWindow()), TQString("%1: %2") - .tqarg(gpgme_strsource(err)).tqarg(gpgme_strerror(err))); + .arg(gpgme_strsource(err)).arg(gpgme_strerror(err))); } if(err != GPG_ERR_NO_ERROR) clearCache(); @@ -306,8 +306,8 @@ bool KGpgMe::decrypt(const TQByteArray& inBuffer, TQByteArray* outBuffer) result = gpgme_op_decrypt_result(m_ctx); if(result->unsupported_algorithm) { KMessageBox::error(TQT_TQWIDGET(kapp->activeWindow()), TQString("%1: %2") - .tqarg(i18n("Unsupported algorithm")) - .tqarg(result->unsupported_algorithm)); + .arg(i18n("Unsupported algorithm")) + .arg(result->unsupported_algorithm)); } else { err = readToBuffer(out, outBuffer); @@ -318,7 +318,7 @@ bool KGpgMe::decrypt(const TQByteArray& inBuffer, TQByteArray* outBuffer) } if(err != GPG_ERR_NO_ERROR && err != GPG_ERR_CANCELED) { KMessageBox::error(TQT_TQWIDGET(kapp->activeWindow()), TQString("%1: %2") - .tqarg(gpgme_strsource(err)).tqarg(gpgme_strerror(err))); + .arg(gpgme_strsource(err)).arg(gpgme_strerror(err))); } if(err != GPG_ERR_NO_ERROR) clearCache(); @@ -346,7 +346,7 @@ gpgme_error_t KGpgMe::readToBuffer(gpgme_data_t in, TQByteArray* outBuffer) cons if(buf) { while((ret = gpgme_data_read(in, buf, BUF_SIZE)) > 0) { uint size = outBuffer->size(); - if(outBuffer->tqresize(size + ret)) + if(outBuffer->resize(size + ret)) memcpy(outBuffer->data() + size, buf, ret); } if(ret < 0) |