summaryrefslogtreecommitdiffstats
path: root/src/kvilib/net/kvi_ssl.cpp
diff options
context:
space:
mode:
authorSlávek Banko <[email protected]>2018-10-29 18:21:41 +0100
committerSlávek Banko <[email protected]>2022-01-17 13:30:05 +0100
commiteb6ac02bb511f14a2506fb2f3c94d84d469e42cd (patch)
tree138827ff0c8800f67b7725c352950f0df421916b /src/kvilib/net/kvi_ssl.cpp
parent351c95fe16505298db187a17e4ceff8d2377190b (diff)
downloadkvirc-eb6ac02bb511f14a2506fb2f3c94d84d469e42cd.tar.gz
kvirc-eb6ac02bb511f14a2506fb2f3c94d84d469e42cd.zip
Fix build with a clean TQt namespace.
Signed-off-by: Slávek Banko <[email protected]> (cherry picked from commit 7cc4356bc2eceb5a66c2263bff44aa472d2ca290)
Diffstat (limited to 'src/kvilib/net/kvi_ssl.cpp')
-rw-r--r--src/kvilib/net/kvi_ssl.cpp8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/kvilib/net/kvi_ssl.cpp b/src/kvilib/net/kvi_ssl.cpp
index 3404b80b..038e124a 100644
--- a/src/kvilib/net/kvi_ssl.cpp
+++ b/src/kvilib/net/kvi_ssl.cpp
@@ -199,7 +199,7 @@ static DH * my_get_dh(int keylength)
break;
default:
// What the hell do you want from me ?
- debug("OpenSSL is asking for a DH param with keylen %d: no way :D",keylength);
+ tqDebug("OpenSSL is asking for a DH param with keylen %d: no way :D",keylength);
break;
}
@@ -332,7 +332,7 @@ static int cb(char *buf, int size, int rwflag, void *u)
int len = p->len();
if(len >= size)return 0;
kvi_memmove(buf,p->ptr(),len + 1);
-// debug("PASS REQUESTED: %s",p->ptr());
+// tqDebug("PASS REQUESTED: %s",p->ptr());
return len;
}
@@ -346,7 +346,7 @@ KviSSL::Result KviSSL::useCertificateFile(const char * cert,const char * pass)
FILE * f = fopen(cert,"r");
if(!f)return FileIoError;
-// debug("READING CERTIFICATE %s",cert);
+// tqDebug("READING CERTIFICATE %s",cert);
if(PEM_read_X509(f,&x509,cb,&m_szPass))
{
if(!SSL_CTX_use_certificate(m_pSSLCtx,x509))
@@ -372,7 +372,7 @@ KviSSL::Result KviSSL::usePrivateKeyFile(const char * key,const char * pass)
FILE * f = fopen(key,"r");
if(!f)return FileIoError;
-// debug("READING KEY %s",key);
+// tqDebug("READING KEY %s",key);
if(PEM_read_PrivateKey(f,&k,cb,&m_szPass))
{
if(!SSL_CTX_use_PrivateKey(m_pSSLCtx,k))