diff options
author | Slávek Banko <[email protected]> | 2018-10-29 18:21:41 +0100 |
---|---|---|
committer | Slávek Banko <[email protected]> | 2022-01-17 13:30:05 +0100 |
commit | eb6ac02bb511f14a2506fb2f3c94d84d469e42cd (patch) | |
tree | 138827ff0c8800f67b7725c352950f0df421916b /src/kvilib/net/kvi_ssl.cpp | |
parent | 351c95fe16505298db187a17e4ceff8d2377190b (diff) | |
download | kvirc-eb6ac02bb511f14a2506fb2f3c94d84d469e42cd.tar.gz kvirc-eb6ac02bb511f14a2506fb2f3c94d84d469e42cd.zip |
Fix build with a clean TQt namespace.
Signed-off-by: Slávek Banko <[email protected]>
(cherry picked from commit 7cc4356bc2eceb5a66c2263bff44aa472d2ca290)
Diffstat (limited to 'src/kvilib/net/kvi_ssl.cpp')
-rw-r--r-- | src/kvilib/net/kvi_ssl.cpp | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/src/kvilib/net/kvi_ssl.cpp b/src/kvilib/net/kvi_ssl.cpp index 3404b80b..038e124a 100644 --- a/src/kvilib/net/kvi_ssl.cpp +++ b/src/kvilib/net/kvi_ssl.cpp @@ -199,7 +199,7 @@ static DH * my_get_dh(int keylength) break; default: // What the hell do you want from me ? - debug("OpenSSL is asking for a DH param with keylen %d: no way :D",keylength); + tqDebug("OpenSSL is asking for a DH param with keylen %d: no way :D",keylength); break; } @@ -332,7 +332,7 @@ static int cb(char *buf, int size, int rwflag, void *u) int len = p->len(); if(len >= size)return 0; kvi_memmove(buf,p->ptr(),len + 1); -// debug("PASS REQUESTED: %s",p->ptr()); +// tqDebug("PASS REQUESTED: %s",p->ptr()); return len; } @@ -346,7 +346,7 @@ KviSSL::Result KviSSL::useCertificateFile(const char * cert,const char * pass) FILE * f = fopen(cert,"r"); if(!f)return FileIoError; -// debug("READING CERTIFICATE %s",cert); +// tqDebug("READING CERTIFICATE %s",cert); if(PEM_read_X509(f,&x509,cb,&m_szPass)) { if(!SSL_CTX_use_certificate(m_pSSLCtx,x509)) @@ -372,7 +372,7 @@ KviSSL::Result KviSSL::usePrivateKeyFile(const char * key,const char * pass) FILE * f = fopen(key,"r"); if(!f)return FileIoError; -// debug("READING KEY %s",key); +// tqDebug("READING KEY %s",key); if(PEM_read_PrivateKey(f,&k,cb,&m_szPass)) { if(!SSL_CTX_use_PrivateKey(m_pSSLCtx,k)) |