diff options
author | tpearson <tpearson@283d02a7-25f6-0310-bc7c-ecb5cbfe19da> | 2011-08-10 22:19:39 +0000 |
---|---|---|
committer | tpearson <tpearson@283d02a7-25f6-0310-bc7c-ecb5cbfe19da> | 2011-08-10 22:19:39 +0000 |
commit | 9ca32ef31a2566af48c06f258722738df92366af (patch) | |
tree | c847db3bf1bb88b7863fed0cc60eef6bf641306a /src/kvilib/ext/kvi_sharedfiles.cpp | |
parent | 72aaee9802d447ee21340b011856b9b355a58f1a (diff) | |
download | kvirc-9ca32ef31a2566af48c06f258722738df92366af.tar.gz kvirc-9ca32ef31a2566af48c06f258722738df92366af.zip |
rename the following methods:
tqparent parent
tqmask mask
git-svn-id: svn://anonsvn.kde.org/home/kde/branches/trinity/applications/kvirc@1246260 283d02a7-25f6-0310-bc7c-ecb5cbfe19da
Diffstat (limited to 'src/kvilib/ext/kvi_sharedfiles.cpp')
-rw-r--r-- | src/kvilib/ext/kvi_sharedfiles.cpp | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/src/kvilib/ext/kvi_sharedfiles.cpp b/src/kvilib/ext/kvi_sharedfiles.cpp index 0e793a34..a0d52a77 100644 --- a/src/kvilib/ext/kvi_sharedfiles.cpp +++ b/src/kvilib/ext/kvi_sharedfiles.cpp @@ -60,7 +60,7 @@ with /usr/arch/mp3/SonataArctica_SingInSilence_Live.mp3 as real file path , something like "SonataArctica_SingInSilence.mp3". A remote user will then request you a DCC GET SonataArctica_SingInSilence.mp3 and KVIrc will automatically send the file.[br] - Each file offer has an "user tqmask" that the requesting remote users must match to + Each file offer has an "user mask" that the requesting remote users must match to obtain the file: *!*@* matches any user, Pragma!*@* matches any user with nickname pragma, *!*@*.omnikron.net matches any user coming from the omnikron.net domain.[br] Each offer can have an expire time: the offer will be automatically removed after @@ -69,8 +69,8 @@ use an additional "size" parameter in the DCC GET request.[br] [big]Security issues[/big] This is a nice but unsecure method of sharing files.[br] - The user tqmask is a good protection but you have to use it properly!.[br] - Setting the user tqmask to Nick!*@* can be easily exploited (just by making an user disconnect + The user mask is a good protection but you have to use it properly!.[br] + Setting the user mask to Nick!*@* can be easily exploited (just by making an user disconnect in one of the well known ways and then by using his nickname).[br] On the other side, the remote end must know exactly the visible name of the offer to request and noone but you will tell him that name.[br] @@ -175,7 +175,7 @@ void KviSharedFilesManager::doInsert(KviSharedFileList * l, KviSharedFile * o) { if(o->wildcardCount() > 0) { - // the new tqmask has wildcards... if the current one has none, skip it + // the new mask has wildcards... if the current one has none, skip it if(fo->wildcardCount() > 0) { // the one in the list has wildcards too... @@ -200,7 +200,7 @@ void KviSharedFilesManager::doInsert(KviSharedFileList * l, KviSharedFile * o) } } // else the current has no wildcards...skip } else { - // the new tqmask has no wildcards.... + // the new mask has no wildcards.... if(fo->wildcardCount() > 0) { // current one has wildcards...insert @@ -275,7 +275,7 @@ KviSharedFile * KviSharedFilesManager::addSharedFile(const TQString &szName,cons } } -KviSharedFile * KviSharedFilesManager::lookupSharedFile(const TQString &szName,KviIrcMask * tqmask,unsigned int uFileSize) +KviSharedFile * KviSharedFilesManager::lookupSharedFile(const TQString &szName,KviIrcMask * mask,unsigned int uFileSize) { KviSharedFileList * l = m_pSharedListDict->find(szName); if(!l)return 0; @@ -283,10 +283,10 @@ KviSharedFile * KviSharedFilesManager::lookupSharedFile(const TQString &szName,K for(KviSharedFile * o = l->first();o;o = l->next()) { bool bMatch; - if(tqmask) + if(mask) { KviIrcMask umask(o->userMask()); - bMatch = tqmask->matchedBy(umask); + bMatch = mask->matchedBy(umask); } else bMatch = KviTQString::equalCS(o->userMask(),"*!*@*"); if(bMatch) { |