diff options
author | Slávek Banko <[email protected]> | 2012-11-24 16:19:37 +0100 |
---|---|---|
committer | Slávek Banko <[email protected]> | 2012-11-24 16:21:38 +0100 |
commit | 68b5e38626333b0c1c0396ef8b4b9221e425465a (patch) | |
tree | fa6a18bcf394cf95dbb901a8234ea399c4869e1f /kopete/protocols/groupwise/gwaccount.cpp | |
parent | b701e9bde1ec398e3c9a89ba8f4de08ab71cd1a7 (diff) | |
download | tdenetwork-68b5e38626333b0c1c0396ef8b4b9221e425465a.tar.gz tdenetwork-68b5e38626333b0c1c0396ef8b4b9221e425465a.zip |
Rename QCA to TQCA
Fix FTBFS
Diffstat (limited to 'kopete/protocols/groupwise/gwaccount.cpp')
-rw-r--r-- | kopete/protocols/groupwise/gwaccount.cpp | 46 |
1 files changed, 23 insertions, 23 deletions
diff --git a/kopete/protocols/groupwise/gwaccount.cpp b/kopete/protocols/groupwise/gwaccount.cpp index d6d89a25..40d04a3e 100644 --- a/kopete/protocols/groupwise/gwaccount.cpp +++ b/kopete/protocols/groupwise/gwaccount.cpp @@ -43,7 +43,7 @@ #include <kopeteview.h> #include "client.h" -#include "qca.h" +#include <qca.h> #include "gwcontact.h" #include "gwcontactlist.h" #include "gwprotocol.h" @@ -87,7 +87,7 @@ GroupWiseAccount::GroupWiseAccount( GroupWiseProtocol *parent, const TQString& a TQT_SLOT( slotPrivacy() ), this, "actionPrivacy"); m_connector = 0; - m_QCATLS = 0; + m_TQCATLS = 0; m_tlsHandler = 0; m_clientStream = 0; m_client = 0; @@ -243,12 +243,12 @@ void GroupWiseAccount::performConnectWithPassword( const TQString &password ) if ( isConnected () ) return; - bool sslPossible = QCA::isSupported(QCA::CAP_TLS); + bool sslPossible = TQCA::isSupported(TQCA::CAP_TLS); if (!sslPossible) { KMessageBox::queuedMessageBox(Kopete::UI::Global::mainWidget (), KMessageBox::Error, - i18n ("SSL support could not be initialized for account %1. This is most likely because the QCA TLS plugin is not installed on your system."). + i18n ("SSL support could not be initialized for account %1. This is most likely because the TQCA TLS plugin is not installed on your system."). arg(myself()->contactId()), i18n ("GroupWise SSL Error")); return; @@ -263,9 +263,9 @@ void GroupWiseAccount::performConnectWithPassword( const TQString &password ) //myConnector->setOptHostPort( "localhost", 8300 ); m_connector->setOptHostPort( server(), port() ); m_connector->setOptSSL( true ); - Q_ASSERT( QCA::isSupported(QCA::CAP_TLS) ); - m_QCATLS = new QCA::TLS; - m_tlsHandler = new QCATLSHandler( m_QCATLS ); + Q_ASSERT( TQCA::isSupported(TQCA::CAP_TLS) ); + m_TQCATLS = new TQCA::TLS; + m_tlsHandler = new TQCATLSHandler( m_TQCATLS ); m_clientStream = new ClientStream( m_connector, m_tlsHandler, 0); TQObject::connect( m_connector, TQT_SIGNAL( error() ), this, TQT_SLOT( slotConnError() ) ); @@ -439,11 +439,11 @@ void GroupWiseAccount::cleanup() { delete m_client; delete m_clientStream; - delete m_QCATLS; + delete m_TQCATLS; delete m_connector; m_connector = 0; - m_QCATLS = 0; + m_TQCATLS = 0; m_clientStream = 0; m_client = 0; } @@ -687,9 +687,9 @@ void GroupWiseAccount::slotCSWarning( int warning ) void GroupWiseAccount::slotTLSHandshaken() { kdDebug ( GROUPWISE_DEBUG_GLOBAL ) << k_funcinfo << "TLS handshake complete" << endl; - int validityResult = m_QCATLS->certificateValidityResult (); + int validityResult = m_TQCATLS->certificateValidityResult (); - if( validityResult == QCA::TLS::Valid ) + if( validityResult == TQCA::TLS::Valid ) { kdDebug ( GROUPWISE_DEBUG_GLOBAL ) << "Certificate is valid, continuing." << endl; // valid certificate, continue @@ -716,53 +716,53 @@ int GroupWiseAccount::handleTLSWarning (int warning, TQString server, TQString a switch(warning) { - case QCA::TLS::NoCert: + case TQCA::TLS::NoCert: validityString = i18n("No certificate was presented."); code = "NoCert"; break; - case QCA::TLS::HostMismatch: + case TQCA::TLS::HostMismatch: validityString = i18n("The host name does not match the one in the certificate."); code = "HostMismatch"; break; - case QCA::TLS::Rejected: + case TQCA::TLS::Rejected: validityString = i18n("The Certificate Authority rejected the certificate."); code = "Rejected"; break; - case QCA::TLS::Untrusted: + case TQCA::TLS::Untrusted: // FIXME: write better error message here validityString = i18n("The certificate is untrusted."); code = "Untrusted"; break; - case QCA::TLS::SignatureFailed: + case TQCA::TLS::SignatureFailed: validityString = i18n("The signature is invalid."); code = "SignatureFailed"; break; - case QCA::TLS::InvalidCA: + case TQCA::TLS::InvalidCA: validityString = i18n("The Certificate Authority is invalid."); code = "InvalidCA"; break; - case QCA::TLS::InvalidPurpose: + case TQCA::TLS::InvalidPurpose: // FIXME: write better error message here validityString = i18n("Invalid certificate purpose."); code = "InvalidPurpose"; break; - case QCA::TLS::SelfSigned: + case TQCA::TLS::SelfSigned: validityString = i18n("The certificate is self-signed."); code = "SelfSigned"; break; - case QCA::TLS::Revoked: + case TQCA::TLS::Revoked: validityString = i18n("The certificate has been revoked."); code = "Revoked"; break; - case QCA::TLS::PathLengthExceeded: + case TQCA::TLS::PathLengthExceeded: validityString = i18n("Maximum certificate chain length was exceeded."); code = "PathLengthExceeded"; break; - case QCA::TLS::Expired: + case TQCA::TLS::Expired: validityString = i18n("The certificate has expired."); code = "Expired"; break; - case QCA::TLS::Unknown: + case TQCA::TLS::Unknown: default: validityString = i18n("An unknown error occurred trying to validate the certificate."); code = "Unknown"; |