From 560378aaca1784ba19806a0414a32b20c744de39 Mon Sep 17 00:00:00 2001 From: tpearson Date: Mon, 3 Jan 2011 04:12:51 +0000 Subject: Automated conversion for enhanced compatibility with TQt for Qt4 3.4.0 TP1 NOTE: This will not compile with Qt4 (yet), however it does compile with Qt3 git-svn-id: svn://anonsvn.kde.org/home/kde/branches/trinity/kdelibs@1211081 283d02a7-25f6-0310-bc7c-ecb5cbfe19da --- kioslave/http/configure.in.in | 2 +- kioslave/http/http.cc | 178 ++++++++++----------- kioslave/http/http.h | 4 +- kioslave/http/http_cache_cleaner.cpp | 8 +- kioslave/http/kcookiejar/kcookiejar.cpp | 60 +++---- kioslave/http/kcookiejar/kcookiejar.h | 6 +- kioslave/http/kcookiejar/kcookieserver.cpp | 22 +-- kioslave/http/kcookiejar/kcookieserver.h | 12 +- kioslave/http/kcookiejar/kcookiewin.cpp | 30 ++-- kioslave/http/kcookiejar/netscape_cookie_spec.html | 8 +- kioslave/http/kcookiejar/rfc2109 | 20 +-- kioslave/http/kcookiejar/rfc2965 | 28 ++-- kioslave/http/kcookiejar/tests/kcookiejartest.cpp | 20 +-- kioslave/http/shoutcast-icecast.txt | 2 +- 14 files changed, 200 insertions(+), 200 deletions(-) (limited to 'kioslave/http') diff --git a/kioslave/http/configure.in.in b/kioslave/http/configure.in.in index a7d1ca7cf..fed7f4da7 100644 --- a/kioslave/http/configure.in.in +++ b/kioslave/http/configure.in.in @@ -12,7 +12,7 @@ AC_ARG_WITH(gssapi, if test "x$with_gssapi" = "xCHECK" ; then with_gssapi=NOTFOUND KDE_FIND_PATH(krb5-config, KRB5_CONFIG, [${prefix}/bin ${exec_prefix}/bin /usr/bin /usr/local/bin /opt/local/bin /usr/lib/mit/bin], [ - AC_MSG_WARN([Could not find krb5-config]) + AC_MSG_WARN([Could not tqfind krb5-config]) ]) if test -n "$KRB5_CONFIG"; then diff --git a/kioslave/http/http.cc b/kioslave/http/http.cc index f59de0db0..803bad7f5 100644 --- a/kioslave/http/http.cc +++ b/kioslave/http/http.cc @@ -171,7 +171,7 @@ static TQString sanitizeCustomHTTPHeader(const TQString& _header) TQString header = (*it).lower(); // Do not allow Request line to be specified and ignore // the other HTTP headers. - if (header.find(':') == -1 || + if (header.tqfind(':') == -1 || header.startsWith("host") || header.startsWith("via")) continue; @@ -320,7 +320,7 @@ void HTTPProtocol::resetSessionSettings() TQString protocol = referrerURL.protocol(); if (protocol.startsWith("webdav")) { - protocol.replace(0, 6, "http"); + protocol.tqreplace(0, 6, "http"); referrerURL.setProtocol(protocol); } @@ -431,7 +431,7 @@ void HTTPProtocol::setHost( const TQString& host, int port, m_davHostOk = m_davHostUnsupported = false; // is it an IPv6 address? - if (host.find(':') == -1) + if (host.tqfind(':') == -1) { m_request.hostname = host; m_request.encoded_hostname = KIDNA::toAscii(host); @@ -439,7 +439,7 @@ void HTTPProtocol::setHost( const TQString& host, int port, else { m_request.hostname = host; - int pos = host.find('%'); + int pos = host.tqfind('%'); if (pos == -1) m_request.encoded_hostname = '[' + host + ']'; else @@ -607,7 +607,7 @@ void HTTPProtocol::stat(const KURL& url) if ( m_protocol != "webdav" && m_protocol != "webdavs" ) { - TQString statSide = metaData(TQString::fromLatin1("statSide")); + TQString statSide = metaData(TQString::tqfromLatin1("statSide")); if ( statSide != "source" ) { // When uploading we assume the file doesn't exit @@ -686,7 +686,7 @@ void HTTPProtocol::davStatList( const KURL& url, bool stat ) // We are only after certain features... TQCString request; request = "" - ""; + ""; // insert additional XML request from the davRequestResponse metadata if ( hasMetaData( "davRequestResponse" ) ) @@ -708,7 +708,7 @@ void HTTPProtocol::davStatList( const KURL& url, bool stat ) "" ""; } - request += ""; + request += ""; davSetRequest( request ); } @@ -828,8 +828,8 @@ void HTTPProtocol::davGeneric( const KURL& url, KIO::HTTP_METHOD method ) int HTTPProtocol::codeFromResponse( const TQString& response ) { - int firstSpace = response.find( ' ' ); - int secondSpace = response.find( ' ', firstSpace + 1 ); + int firstSpace = response.tqfind( ' ' ); + int secondSpace = response.tqfind( ' ', firstSpace + 1 ); return response.mid( firstSpace + 1, secondSpace - firstSpace - 1 ).toInt(); } @@ -1267,12 +1267,12 @@ void HTTPProtocol::put( const KURL &url, int, bool overwrite, bool) TQCString request; request = "" - "" + "" "" "" "" "" - ""; + ""; davSetRequest( request ); @@ -1797,15 +1797,15 @@ void HTTPProtocol::httpError() bool HTTPProtocol::isOffline(const KURL &url) { - const int NetWorkStatusUnknown = 1; - const int NetWorkStatusOnline = 8; + const int NetWorktqStatusUnknown = 1; + const int NetWorktqStatusOnline = 8; TQCString replyType; TQByteArray params; TQByteArray reply; TQDataStream stream(params, IO_WriteOnly); - if ( url.host() == TQString::fromLatin1("localhost") || url.host() == TQString::fromLatin1("127.0.0.1") || url.host() == TQString::fromLatin1("::") ) { + if ( url.host() == TQString::tqfromLatin1("localhost") || url.host() == TQString::tqfromLatin1("127.0.0.1") || url.host() == TQString::tqfromLatin1("::") ) { return false; } if ( dcopClient()->call( "kded", "networkstatus", "status()", @@ -1815,7 +1815,7 @@ bool HTTPProtocol::isOffline(const KURL &url) TQDataStream stream2( reply, IO_ReadOnly ); stream2 >> result; kdDebug(7113) << "(" << m_pid << ") networkstatus status = " << result << endl; - return (result != NetWorkStatusUnknown) && (result != NetWorkStatusOnline); + return (result != NetWorktqStatusUnknown) && (result != NetWorktqStatusOnline); } kdDebug(7113) << "(" << m_pid << ") networkstatus " << endl; return false; // On error, assume we are online @@ -1824,7 +1824,7 @@ bool HTTPProtocol::isOffline(const KURL &url) void HTTPProtocol::multiGet(const TQByteArray &data) { TQDataStream stream(data, IO_ReadOnly); - Q_UINT32 n; + TQ_UINT32 n; stream >> n; kdDebug(7113) << "(" << m_pid << ") HTTPProtcool::multiGet n = " << n << endl; @@ -2485,7 +2485,7 @@ bool HTTPProtocol::httpOpen() { m_request.cookieMode = HTTPRequest::CookiesAuto; if (m_request.bUseCookiejar) - cookieStr = findCookies( m_request.url.url()); + cookieStr = tqfindCookies( m_request.url.url()); } if (!cookieStr.isEmpty()) @@ -2786,7 +2786,7 @@ try_again: // by assuming that they will be sending html. kdDebug(7113) << "(" << m_pid << ") HTTPPreadHeader: HEAD -> returned " << "mimetype: " << DEFAULT_MIME_TYPE << endl; - mimeType(TQString::fromLatin1(DEFAULT_MIME_TYPE)); + mimeType(TQString::tqfromLatin1(DEFAULT_MIME_TYPE)); return true; } @@ -2847,7 +2847,7 @@ try_again: // Store the the headers so they can be passed to the // calling application later - m_responseHeader << TQString::fromLatin1(buf); + m_responseHeader << TQString::tqfromLatin1(buf); if ((strncasecmp(buf, "HTTP/", 5) == 0) || (strncasecmp(buf, "ICY ", 4) == 0)) // Shoutcast support @@ -3030,7 +3030,7 @@ try_again: // Keep Alive else if (strncasecmp(buf, "Keep-Alive:", 11) == 0) { TQStringList options = TQStringList::split(',', - TQString::fromLatin1(trimLead(buf+11))); + TQString::tqfromLatin1(trimLead(buf+11))); for(TQStringList::ConstIterator it = options.begin(); it != options.end(); it++) @@ -3046,7 +3046,7 @@ try_again: // Cache control else if (strncasecmp(buf, "Cache-Control:", 14) == 0) { TQStringList cacheControls = TQStringList::split(',', - TQString::fromLatin1(trimLead(buf+14))); + TQString::tqfromLatin1(trimLead(buf+14))); for(TQStringList::ConstIterator it = cacheControls.begin(); it != cacheControls.end(); it++) @@ -3081,7 +3081,7 @@ try_again: else if (strncasecmp(buf, "Content-location:", 17) == 0) { setMetaData ("content-location", - TQString::fromLatin1(trimLead(buf+17)).stripWhiteSpace()); + TQString::tqfromLatin1(trimLead(buf+17)).stripWhiteSpace()); } // what type of data do we have? @@ -3093,7 +3093,7 @@ try_again: while ( *pos && *pos != ';' ) pos++; // Assign the mime-type. - m_strMimeType = TQString::fromLatin1(start, pos-start).stripWhiteSpace().lower(); + m_strMimeType = TQString::tqfromLatin1(start, pos-start).stripWhiteSpace().lower(); kdDebug(7113) << "(" << m_pid << ") Content-type: " << m_strMimeType << endl; // If we still have text, then it means we have a mime-type with a @@ -3108,8 +3108,8 @@ try_again: if (*pos) { - mediaAttribute = TQString::fromLatin1(start, pos-start).stripWhiteSpace().lower(); - mediaValue = TQString::fromLatin1(pos+1, end-pos-1).stripWhiteSpace(); + mediaAttribute = TQString::tqfromLatin1(start, pos-start).stripWhiteSpace().lower(); + mediaValue = TQString::tqfromLatin1(pos+1, end-pos-1).stripWhiteSpace(); pos = end; if (mediaValue.length() && (mediaValue[0] == '"') && @@ -3153,7 +3153,7 @@ try_again: // Cache management else if (strncasecmp(buf, "Last-Modified:", 14) == 0) { - m_request.lastModified = (TQString::fromLatin1(trimLead(buf+14))).stripWhiteSpace(); + m_request.lastModified = (TQString::tqfromLatin1(trimLead(buf+14))).stripWhiteSpace(); } // whoops.. we received a warning @@ -3177,7 +3177,7 @@ try_again: // The deprecated Refresh Response else if (strncasecmp(buf,"Refresh:", 8) == 0) { mayCache = false; // Do not cache page as it defeats purpose of Refresh tag! - setMetaData( "http-refresh", TQString::fromLatin1(trimLead(buf+8)).stripWhiteSpace() ); + setMetaData( "http-refresh", TQString::tqfromLatin1(trimLead(buf+8)).stripWhiteSpace() ); } // In fact we should do redirection only if we got redirection code @@ -3254,7 +3254,7 @@ try_again: dispositionBuf--; if ( dispositionBuf > bufStart ) - dispositionFilename = TQString::fromLatin1( bufStart, dispositionBuf-bufStart ); + dispositionFilename = TQString::tqfromLatin1( bufStart, dispositionBuf-bufStart ); break; } @@ -3267,7 +3267,7 @@ try_again: dispositionBuf++; if ( dispositionBuf > bufStart ) - dispositionType = TQString::fromLatin1( bufStart, dispositionBuf-bufStart ).stripWhiteSpace(); + dispositionType = TQString::tqfromLatin1( bufStart, dispositionBuf-bufStart ).stripWhiteSpace(); while ( *dispositionBuf == ';' || *dispositionBuf == ' ' ) dispositionBuf++; @@ -3278,7 +3278,7 @@ try_again: // path, thus we extract the filename only. if ( !dispositionFilename.isEmpty() ) { - int pos = dispositionFilename.findRev( '/' ); + int pos = dispositionFilename.tqfindRev( '/' ); if( pos > -1 ) dispositionFilename = dispositionFilename.mid(pos+1); @@ -3288,7 +3288,7 @@ try_again: } } else if(strncasecmp(buf, "Content-Language:", 17) == 0) { - TQString language = TQString::fromLatin1(trimLead(buf+17)).stripWhiteSpace(); + TQString language = TQString::tqfromLatin1(trimLead(buf+17)).stripWhiteSpace(); if (!language.isEmpty()) setMetaData("content-language", language); } @@ -3302,14 +3302,14 @@ try_again: else if (strncasecmp(buf, "Link:", 5) == 0) { // We only support Link: ; rel="type" so far TQStringList link = TQStringList::split(";", TQString(buf) - .replace(TQRegExp("^Link:[ ]*"), + .tqreplace(TQRegExp("^Link:[ ]*"), "")); if (link.count() == 2) { TQString rel = link[1].stripWhiteSpace(); if (rel.startsWith("rel=\"")) { rel = rel.mid(5, rel.length() - 6); if (rel.lower() == "pageservices") { - TQString url = link[0].replace(TQRegExp("[<>]"),"").stripWhiteSpace(); + TQString url = link[0].tqreplace(TQRegExp("[<>]"),"").stripWhiteSpace(); setMetaData("PageServices", url); } } @@ -3327,14 +3327,14 @@ try_again: if (policy.count() == 2) { if (policy[0].lower() == "policyref") { - policyrefs << policy[1].replace(TQRegExp("[\"\']"), "") + policyrefs << policy[1].tqreplace(TQRegExp("[\"\']"), "") .stripWhiteSpace(); } else if (policy[0].lower() == "cp") { // We convert to cp\ncp\ncp\n[...]\ncp to be consistent with // other metadata sent in strings. This could be a bit more // efficient but I'm going for correctness right now. TQStringList cps = TQStringList::split(" ", - policy[1].replace(TQRegExp("[\"\']"), "") + policy[1].tqreplace(TQRegExp("[\"\']"), "") .simplifyWhiteSpace()); for (TQStringList::Iterator j = cps.begin(); j != cps.end(); ++j) @@ -3381,17 +3381,17 @@ try_again: // md5 signature else if (strncasecmp(buf, "Content-MD5:", 12) == 0) { - m_sContentMD5 = TQString::fromLatin1(trimLead(buf + 12)); + m_sContentMD5 = TQString::tqfromLatin1(trimLead(buf + 12)); } // *** Responses to the HTTP OPTIONS method follow // WebDAV capabilities else if (strncasecmp(buf, "DAV:", 4) == 0) { if (m_davCapabilities.isEmpty()) { - m_davCapabilities << TQString::fromLatin1(trimLead(buf + 4)); + m_davCapabilities << TQString::tqfromLatin1(trimLead(buf + 4)); } else { - m_davCapabilities << TQString::fromLatin1(trimLead(buf + 4)); + m_davCapabilities << TQString::tqfromLatin1(trimLead(buf + 4)); } } // *** Responses to the HTTP OPTIONS method finished @@ -3667,14 +3667,14 @@ try_again: if (m_strMimeType == "application/x-tar") { m_qContentEncodings.remove(m_qContentEncodings.fromLast()); - m_strMimeType = TQString::fromLatin1("application/x-tgz"); + m_strMimeType = TQString::tqfromLatin1("application/x-tgz"); } else if (m_strMimeType == "application/postscript") { // LEONB: Adding another exception for psgz files. // Could we use the mimelnk files instead of hardcoding all this? m_qContentEncodings.remove(m_qContentEncodings.fromLast()); - m_strMimeType = TQString::fromLatin1("application/x-gzpostscript"); + m_strMimeType = TQString::tqfromLatin1("application/x-gzpostscript"); } else if ( m_request.allowCompressedPage && m_strMimeType != "application/x-tgz" && @@ -3683,7 +3683,7 @@ try_again: m_request.url.path().right(6) == ".ps.gz" ) { m_qContentEncodings.remove(m_qContentEncodings.fromLast()); - m_strMimeType = TQString::fromLatin1("application/x-gzpostscript"); + m_strMimeType = TQString::tqfromLatin1("application/x-gzpostscript"); } else if ( (m_request.allowCompressedPage && m_strMimeType == "text/html") @@ -3700,7 +3700,7 @@ try_again: else { m_qContentEncodings.remove(m_qContentEncodings.fromLast()); - m_strMimeType = TQString::fromLatin1("application/x-gzip"); + m_strMimeType = TQString::tqfromLatin1("application/x-gzip"); } } @@ -3713,34 +3713,34 @@ try_again: if (m_qContentEncodings.last() == "bzip2") { m_qContentEncodings.remove(m_qContentEncodings.fromLast()); - m_strMimeType = TQString::fromLatin1("application/x-bzip2"); + m_strMimeType = TQString::tqfromLatin1("application/x-bzip2"); } // Convert some common mimetypes to standard KDE mimetypes if (m_strMimeType == "application/x-targz") - m_strMimeType = TQString::fromLatin1("application/x-tgz"); + m_strMimeType = TQString::tqfromLatin1("application/x-tgz"); else if (m_strMimeType == "application/zip") - m_strMimeType = TQString::fromLatin1("application/x-zip"); + m_strMimeType = TQString::tqfromLatin1("application/x-zip"); else if (m_strMimeType == "image/x-png") - m_strMimeType = TQString::fromLatin1("image/png"); + m_strMimeType = TQString::tqfromLatin1("image/png"); else if (m_strMimeType == "image/bmp") - m_strMimeType = TQString::fromLatin1("image/x-bmp"); + m_strMimeType = TQString::tqfromLatin1("image/x-bmp"); else if (m_strMimeType == "audio/mpeg" || m_strMimeType == "audio/x-mpeg" || m_strMimeType == "audio/mp3") - m_strMimeType = TQString::fromLatin1("audio/x-mp3"); + m_strMimeType = TQString::tqfromLatin1("audio/x-mp3"); else if (m_strMimeType == "audio/microsoft-wave") - m_strMimeType = TQString::fromLatin1("audio/x-wav"); + m_strMimeType = TQString::tqfromLatin1("audio/x-wav"); else if (m_strMimeType == "audio/midi") - m_strMimeType = TQString::fromLatin1("audio/x-midi"); + m_strMimeType = TQString::tqfromLatin1("audio/x-midi"); else if (m_strMimeType == "image/x-xpixmap") - m_strMimeType = TQString::fromLatin1("image/x-xpm"); + m_strMimeType = TQString::tqfromLatin1("image/x-xpm"); else if (m_strMimeType == "application/rtf") - m_strMimeType = TQString::fromLatin1("text/rtf"); + m_strMimeType = TQString::tqfromLatin1("text/rtf"); // Crypto ones.... else if (m_strMimeType == "application/pkix-cert" || m_strMimeType == "application/binary-certificate") { - m_strMimeType = TQString::fromLatin1("application/x-x509-ca-cert"); + m_strMimeType = TQString::tqfromLatin1("application/x-x509-ca-cert"); } // Prefer application/x-tgz or x-gzpostscript over application/x-gzip. @@ -3748,9 +3748,9 @@ try_again: { if ((m_request.url.path().right(7) == ".tar.gz") || (m_request.url.path().right(4) == ".tar")) - m_strMimeType = TQString::fromLatin1("application/x-tgz"); + m_strMimeType = TQString::tqfromLatin1("application/x-tgz"); if ((m_request.url.path().right(6) == ".ps.gz")) - m_strMimeType = TQString::fromLatin1("application/x-gzpostscript"); + m_strMimeType = TQString::tqfromLatin1("application/x-gzpostscript"); } // Some webservers say "text/plain" when they mean "application/x-bzip2" @@ -3758,15 +3758,15 @@ try_again: { TQString ext = m_request.url.path().right(4).upper(); if (ext == ".BZ2") - m_strMimeType = TQString::fromLatin1("application/x-bzip2"); + m_strMimeType = TQString::tqfromLatin1("application/x-bzip2"); else if (ext == ".PEM") - m_strMimeType = TQString::fromLatin1("application/x-x509-ca-cert"); + m_strMimeType = TQString::tqfromLatin1("application/x-x509-ca-cert"); else if (ext == ".SWF") - m_strMimeType = TQString::fromLatin1("application/x-shockwave-flash"); + m_strMimeType = TQString::tqfromLatin1("application/x-shockwave-flash"); else if (ext == ".PLS") - m_strMimeType = TQString::fromLatin1("audio/x-scpls"); + m_strMimeType = TQString::tqfromLatin1("audio/x-scpls"); else if (ext == ".WMV") - m_strMimeType = TQString::fromLatin1("video/x-ms-wmv"); + m_strMimeType = TQString::tqfromLatin1("video/x-ms-wmv"); } #if 0 @@ -3871,11 +3871,11 @@ void HTTPProtocol::addEncoding(TQString encoding, TQStringList &encs) //if ( m_cmd != CMD_COPY ) m_iSize = NO_SIZE; } else if ((encoding == "x-gzip") || (encoding == "gzip")) { - encs.append(TQString::fromLatin1("gzip")); + encs.append(TQString::tqfromLatin1("gzip")); } else if ((encoding == "x-bzip2") || (encoding == "bzip2")) { - encs.append(TQString::fromLatin1("bzip2")); // Not yet supported! + encs.append(TQString::tqfromLatin1("bzip2")); // Not yet supported! } else if ((encoding == "x-deflate") || (encoding == "deflate")) { - encs.append(TQString::fromLatin1("deflate")); + encs.append(TQString::tqfromLatin1("deflate")); } else { kdDebug(7113) << "(" << m_pid << ") Unknown encoding encountered. " << "Please write code. Encoding = \"" << encoding @@ -4018,7 +4018,7 @@ void HTTPProtocol::slave_status() if ( m_iSock != -1 && !isConnectionValid() ) httpCloseConnection(); - slaveStatus( m_state.hostname, (m_iSock != -1) ); + slavetqStatus( m_state.hostname, (m_iSock != -1) ); } void HTTPProtocol::mimetype( const KURL& url ) @@ -4259,7 +4259,7 @@ void HTTPProtocol::slotData(const TQByteArray &_d) << endl; KMimeMagicResult *result; - result = KMimeMagic::self()->findBufferFileType( m_mimeTypeBuffer, + result = KMimeMagic::self()->tqfindBufferFileType( m_mimeTypeBuffer, m_request.url.fileName() ); if( result ) { @@ -4270,7 +4270,7 @@ void HTTPProtocol::slotData(const TQByteArray &_d) if ( m_strMimeType.isEmpty() ) { - m_strMimeType = TQString::fromLatin1( DEFAULT_MIME_TYPE ); + m_strMimeType = TQString::tqfromLatin1( DEFAULT_MIME_TYPE ); kdDebug(7113) << "(" << m_pid << ") Using default mimetype: " << m_strMimeType << endl; } @@ -4344,7 +4344,7 @@ bool HTTPProtocol::readBody( bool dataInternal /* = false */ ) // Update the application with total size except when // it is compressed, or when the data is to be handled // internally (webDAV). If compressed we have to wait - // until we uncompress to find out the actual data size + // until we uncompress to tqfind out the actual data size if ( !dataInternal ) { if ( (m_iSize > 0) && (m_iSize != NO_SIZE)) { totalSize(m_iSize); @@ -4609,7 +4609,7 @@ void HTTPProtocol::addCookies( const TQString &url, const TQCString &cookieHeade } } -TQString HTTPProtocol::findCookies( const TQString &url) +TQString HTTPProtocol::tqfindCookies( const TQString &url) { TQCString replyType; TQByteArray params; @@ -4621,7 +4621,7 @@ TQString HTTPProtocol::findCookies( const TQString &url) TQDataStream stream(params, IO_WriteOnly); stream << url << windowId; - if ( !dcopClient()->call( "kded", "kcookiejar", "findCookies(TQString,long int)", + if ( !dcopClient()->call( "kded", "kcookiejar", "tqfindCookies(TQString,long int)", params, replyType, reply ) ) { kdWarning(7113) << "(" << m_pid << ") Can't communicate with kded_kcookiejar!" << endl; @@ -4634,7 +4634,7 @@ TQString HTTPProtocol::findCookies( const TQString &url) } else { - kdError(7113) << "(" << m_pid << ") DCOP function findCookies(...) returns " + kdError(7113) << "(" << m_pid << ") DCOP function tqfindCookies(...) returns " << replyType << ", expected TQString" << endl; } return result; @@ -4680,12 +4680,12 @@ FILE* HTTPProtocol::checkCacheEntry( bool readWrite) TQString CEF = m_request.path; - int p = CEF.find('/'); + int p = CEF.tqfind('/'); while(p != -1) { CEF[p] = separator; - p = CEF.find('/', p); + p = CEF.tqfind('/', p); } TQString host = m_request.hostname.lower(); @@ -4739,7 +4739,7 @@ FILE* HTTPProtocol::checkCacheEntry( bool readWrite) ok = false; time_t date; - time_t currentDate = time(0); + time_t tqcurrentDate = time(0); // URL if (ok && (!fgets(buffer, 400, fs))) @@ -4762,10 +4762,10 @@ FILE* HTTPProtocol::checkCacheEntry( bool readWrite) { date = (time_t) strtoul(buffer, 0, 10); m_request.creationDate = date; - if (m_maxCacheAge && (difftime(currentDate, date) > m_maxCacheAge)) + if (m_maxCacheAge && (difftime(tqcurrentDate, date) > m_maxCacheAge)) { m_request.bMustRevalidate = true; - m_request.expireDate = currentDate; + m_request.expireDate = tqcurrentDate; } } @@ -4779,14 +4779,14 @@ FILE* HTTPProtocol::checkCacheEntry( bool readWrite) { date = (time_t) strtoul(buffer, 0, 10); // After the expire date we need to revalidate. - if (!date || difftime(currentDate, date) >= 0) + if (!date || difftime(tqcurrentDate, date) >= 0) m_request.bMustRevalidate = true; m_request.expireDate = date; } else if (m_request.cache == CC_Refresh) { m_request.bMustRevalidate = true; - m_request.expireDate = currentDate; + m_request.expireDate = tqcurrentDate; } } @@ -4875,7 +4875,7 @@ void HTTPProtocol::updateExpireDate(time_t expireDate, bool updateCreationDate) void HTTPProtocol::createCacheEntry( const TQString &mimetype, time_t expireDate) { TQString dir = m_request.cef; - int p = dir.findRev('/'); + int p = dir.tqfindRev('/'); if (p == -1) return; // Error. dir.truncate(p); @@ -5114,7 +5114,7 @@ void HTTPProtocol::configAuth( char *p, bool isForProxy ) { //for sites like lib.homelinux.org TQTextCodec* oldCodec=TQTextCodec::codecForCStrings(); - if (KGlobal::locale()->language().contains("ru")) + if (KGlobal::locale()->language().tqcontains("ru")) TQTextCodec::setCodecForCStrings(TQTextCodec::codecForName("CP1251")); p += 6; @@ -5135,12 +5135,12 @@ void HTTPProtocol::configAuth( char *p, bool isForProxy ) if( isForProxy ) { ProxyAuthentication = f; - m_strProxyAuthorization = TQString::fromLatin1( strAuth ); + m_strProxyAuthorization = TQString::tqfromLatin1( strAuth ); } else { Authentication = f; - m_strAuthorization = TQString::fromLatin1( strAuth ); + m_strAuthorization = TQString::tqfromLatin1( strAuth ); } } @@ -5233,13 +5233,13 @@ bool HTTPProtocol::getAuthorization() { bool isStaleNonce = false; TQString auth = ( m_responseCode == 401 ) ? m_strAuthorization : m_strProxyAuthorization; - int pos = auth.find("stale", 0, false); + int pos = auth.tqfind("stale", 0, false); if ( pos != -1 ) { pos += 5; int len = auth.length(); while( pos < len && (auth[pos] == ' ' || auth[pos] == '=') ) pos++; - if ( pos < len && auth.find("true", pos, false) != -1 ) + if ( pos < len && auth.tqfind("true", pos, false) != -1 ) { isStaleNonce = true; kdDebug(7113) << "(" << m_pid << ") Stale nonce value. " @@ -5311,7 +5311,7 @@ bool HTTPProtocol::getAuthorization() } else { - // At this point we know more details, so use it to find + // At this point we know more details, so use it to tqfind // out if we have a cached version and avoid a re-prompt! // We also do not use verify path unlike the pre-emptive // requests because we already know the realm value... @@ -5358,13 +5358,13 @@ bool HTTPProtocol::getAuthorization() else auth = m_strProxyAuthorization; - int pos = auth.find("stale", 0, false); + int pos = auth.tqfind("stale", 0, false); if ( pos != -1 ) { pos += 5; int len = auth.length(); while( pos < len && (auth[pos] == ' ' || auth[pos] == '=') ) pos++; - if ( pos < len && auth.find("true", pos, false) != -1 ) + if ( pos < len && auth.tqfind("true", pos, false) != -1 ) { info.digestInfo = (m_responseCode == 401) ? m_strAuthorization : m_strProxyAuthorization; kdDebug(7113) << "(" << m_pid << ") Just a stale nonce value! " @@ -5612,7 +5612,7 @@ TQString HTTPProtocol::createNTLMAuth( bool isForProxy ) strauth = m_strAuthorization.latin1(); len = m_strAuthorization.length(); } - if ( user.contains('\\') ) { + if ( user.tqcontains('\\') ) { domain = user.section( '\\', 0, 0); user = user.section( '\\', 1 ); } @@ -5880,7 +5880,7 @@ TQString HTTPProtocol::createDigestAuth ( bool isForProxy ) TQCString uri = TQCString(p,i+1); do { - pos = uri.find( ' ', idx ); + pos = uri.tqfind( ' ', idx ); if ( pos != -1 ) { KURL u (m_request.url, uri.mid(idx, pos-idx)); @@ -6032,7 +6032,7 @@ TQString HTTPProtocol::proxyAuthenticationHeader() info.password = m_proxyURL.pass(); info.verifyPath = true; - // If the proxy URL already contains username + // If the proxy URL already tqcontains username // and password simply attempt to retrieve it // without prompting the user... if ( !info.username.isNull() && !info.password.isNull() ) diff --git a/kioslave/http/http.h b/kioslave/http/http.h index 2985eb938..2ce6de664 100644 --- a/kioslave/http/http.h +++ b/kioslave/http/http.h @@ -335,7 +335,7 @@ protected: /** * Look for cookies in the cookiejar */ - TQString findCookies( const TQString &url); + TQString tqfindCookies( const TQString &url); /** * Do a cache lookup for the current url. (m_state.url) @@ -403,7 +403,7 @@ protected: /** * Resets any per connection settings. These are different from - * per-session settings in that they must be invalidates every time + * per-session settings in that they must be tqinvalidates every time * a request is made, e.g. a retry to re-send the header to the * server, as compared to only when a new request arrives. */ diff --git a/kioslave/http/http_cache_cleaner.cpp b/kioslave/http/http_cache_cleaner.cpp index 74b0b8102..80fc2c69a 100644 --- a/kioslave/http/http_cache_cleaner.cpp +++ b/kioslave/http/http_cache_cleaner.cpp @@ -44,7 +44,7 @@ CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. #include -time_t currentDate; +time_t tqcurrentDate; int m_maxCacheAge; int m_maxCacheSize; @@ -109,7 +109,7 @@ FileInfo *readEntry( const TQString &filename) if (ok) { creationDate = (time_t) strtoul(buffer, 0, 10); - age = (int) difftime(currentDate, creationDate); + age = (int) difftime(tqcurrentDate, creationDate); if ( m_maxCacheAge && ( age > m_maxCacheAge)) { ok = false; // Expired @@ -125,7 +125,7 @@ FileInfo *readEntry( const TQString &filename) #if 0 time_t expireDate; expireDate = (time_t) strtoul(buffer, 0, 10); - if (expireDate && (expireDate < currentDate)) + if (expireDate && (expireDate < tqcurrentDate)) ok = false; // Expired #endif } @@ -213,7 +213,7 @@ extern "C" KDE_EXPORT int kdemain(int argc, char **argv) } } - currentDate = time(0); + tqcurrentDate = time(0); m_maxCacheAge = KProtocolManager::maxCacheAge(); m_maxCacheSize = KProtocolManager::maxCacheSize(); diff --git a/kioslave/http/kcookiejar/kcookiejar.cpp b/kioslave/http/kcookiejar/kcookiejar.cpp index 909f92dcb..555f8e897 100644 --- a/kioslave/http/kcookiejar/kcookiejar.cpp +++ b/kioslave/http/kcookiejar/kcookiejar.cpp @@ -84,12 +84,12 @@ #define READ_BUFFER_SIZE 8192 #define IP_ADDRESS_EXPRESSION "(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)" -// Note with respect to TQString::fromLatin1( ) +// Note with respect to TQString::tqfromLatin1( ) // Cookies are stored as 8 bit data and passed to kio_http as // latin1 regardless of their actual encoding. // L1 is used to indicate latin1 constants -#define L1(x) TQString::fromLatin1(x) +#define L1(x) TQString::tqfromLatin1(x) template class TQPtrList; template class TQPtrDict; @@ -154,9 +154,9 @@ KHttpCookie::KHttpCookie(const TQString &_host, // // Checks if a cookie has been expired // -bool KHttpCookie::isExpired(time_t currentDate) +bool KHttpCookie::isExpired(time_t tqcurrentDate) { - return (mExpireDate != 0) && (mExpireDate < currentDate); + return (mExpireDate != 0) && (mExpireDate < tqcurrentDate); } // @@ -194,14 +194,14 @@ bool KHttpCookie::match(const TQString &fqdn, const TQStringList &domains, if (fqdn != mHost) return false; } - else if (!domains.contains(mDomain)) + else if (!domains.tqcontains(mDomain)) { if (mDomain[0] == '.') return false; // Maybe the domain needs an extra dot. TQString domain = '.' + mDomain; - if ( !domains.contains( domain ) ) + if ( !domains.tqcontains( domain ) ) if ( fqdn != mDomain ) return false; } @@ -261,7 +261,7 @@ KCookieJar::KCookieJar() for(TQStringList::ConstIterator it = countries.begin(); it != countries.end(); ++it) { - m_twoLevelTLD.replace(*it, (int *) 1); + m_twoLevelTLD.tqreplace(*it, (int *) 1); } } @@ -301,7 +301,7 @@ static void removeDuplicateFromList(KHttpCookieList *list, KHttpCookie *cookiePt it != cookie->windowIds().end(); ++it) { long windowId = *it; - if (windowId && (cookiePtr->windowIds().find(windowId) == cookiePtr->windowIds().end())) + if (windowId && (cookiePtr->windowIds().tqfind(windowId) == cookiePtr->windowIds().end())) { cookiePtr->windowIds().append(windowId); } @@ -325,7 +325,7 @@ static void removeDuplicateFromList(KHttpCookieList *list, KHttpCookie *cookiePt // Returned is a string containing all appropriate cookies in a format // which can be added to a HTTP-header without any additional processing. // -TQString KCookieJar::findCookies(const TQString &_url, bool useDOMFormat, long windowId, KHttpCookieList *pendingCookies) +TQString KCookieJar::tqfindCookies(const TQString &_url, bool useDOMFormat, long windowId, KHttpCookieList *pendingCookies) { TQString cookieStr; TQStringList domains; @@ -337,10 +337,10 @@ TQString KCookieJar::findCookies(const TQString &_url, bool useDOMFormat, long w if (!parseURL(_url, fqdn, path)) return cookieStr; - bool secureRequest = (_url.find( L1("https://"), 0, false) == 0 || - _url.find( L1("webdavs://"), 0, false) == 0); + bool secureRequest = (_url.tqfind( L1("https://"), 0, false) == 0 || + _url.tqfind( L1("webdavs://"), 0, false) == 0); - // kdDebug(7104) << "findCookies: URL= " << _url << ", secure = " << secureRequest << endl; + // kdDebug(7104) << "tqfindCookies: URL= " << _url << ", secure = " << secureRequest << endl; extractDomains(fqdn, domains); @@ -399,7 +399,7 @@ TQString KCookieJar::findCookies(const TQString &_url, bool useDOMFormat, long w continue; } - if (windowId && (cookie->windowIds().find(windowId) == cookie->windowIds().end())) + if (windowId && (cookie->windowIds().tqfind(windowId) == cookie->windowIds().end())) { cookie->windowIds().append(windowId); } @@ -479,7 +479,7 @@ static const char * parseNameValue(const char *header, // No '=' sign -> use string as the value, name is empty // (behavior found in Mozilla and IE) Name = ""; - Value = TQString::fromLatin1(header); + Value = TQString::tqfromLatin1(header); Value.truncate( s - header ); Value = Value.stripWhiteSpace(); return (s); @@ -516,12 +516,12 @@ static const char * parseNameValue(const char *header, if ((*s=='\0') || (*s=='\n')) { // End of Name - Value = TQString::fromLatin1(header); + Value = TQString::tqfromLatin1(header); Value.truncate(s - header); return (s); } } - Value = TQString::fromLatin1(header); + Value = TQString::tqfromLatin1(header); // *s == '\"'; if (keepQuotes) Value.truncate( ++s - header ); @@ -542,7 +542,7 @@ static const char * parseNameValue(const char *header, while ((*s != '\0') && (*s != ';') && (*s != '\n')) s++; // End of Name - Value = TQString::fromLatin1(header); + Value = TQString::tqfromLatin1(header); Value.truncate( s - header ); Value = Value.stripWhiteSpace(); } @@ -591,7 +591,7 @@ bool KCookieJar::parseURL(const TQString &_url, // Cookie spoofing protection. Since there is no way a path separator // or escape encoded character is allowed in the hostname according // to RFC 2396, reject attempts to include such things there! - if(_fqdn.find('/') > -1 || _fqdn.find('%') > -1) + if(_fqdn.tqfind('/') > -1 || _fqdn.tqfind('%') > -1) { return false; // deny everything!! } @@ -620,7 +620,7 @@ void KCookieJar::extractDomains(const TQString &_fqdn, // Return numeric IPv4 addresses as is... if ((_fqdn[0] >= '0') && (_fqdn[0] <= '9')) { - if (_fqdn.find(TQRegExp(IP_ADDRESS_EXPRESSION)) > -1) + if (_fqdn.tqfind(TQRegExp(IP_ADDRESS_EXPRESSION)) > -1) { _domains.append( _fqdn ); return; @@ -683,7 +683,7 @@ void KCookieJar::extractDomains(const TQString &_fqdn, */ static TQString fixupDateTime(const TQString& dt) { - const int index = dt.find(TQRegExp("[0-9]{1,2}:[0-9]{1,2}:[0-9]{1,2}")); + const int index = dt.tqfind(TQRegExp("[0-9]{1,2}:[0-9]{1,2}:[0-9]{1,2}")); if (index > -1) { @@ -694,7 +694,7 @@ static TQString fixupDateTime(const TQString& dt) dateStrList[0] = dateStrList[1]; dateStrList[1] = date; date = dt; - return date.replace(index, date.length(), dateStrList.join(" ")); + return date.tqreplace(index, date.length(), dateStrList.join(" ")); } } @@ -729,7 +729,7 @@ KHttpCookieList KCookieJar::makeCookies(const TQString &_url, return KHttpCookieList(); } TQString defaultPath; - int i = path.findRev('/'); + int i = path.tqfindRev('/'); if (i > 0) defaultPath = path.left(i); @@ -811,7 +811,7 @@ KHttpCookieList KCookieJar::makeCookies(const TQString &_url, if(dom.length() > 2 && dom[dom.length()-1] == '.') dom = dom.left(dom.length()-1); - if(dom.contains('.') > 1 || dom == ".local") + if(dom.tqcontains('.') > 1 || dom == ".local") lastCookie->mDomain = dom; } else if (cName == "max-age") @@ -1020,7 +1020,7 @@ KCookieAdvice KCookieJar::cookieAdvice(KHttpCookiePtr cookiePtr) // cross-site cookie injection. if (!cookiePtr->domain().isEmpty()) { - if (!domains.contains(cookiePtr->domain()) && + if (!domains.tqcontains(cookiePtr->domain()) && !cookiePtr->domain().endsWith("."+cookiePtr->host())) cookiePtr->fixDomain(TQString::null); } @@ -1457,11 +1457,11 @@ bool KCookieJar::loadCookies(const TQString &_filename) if ((expDate == 0) || (expDate < curTime)) continue; - KHttpCookie *cookie = new KHttpCookie(TQString::fromLatin1(host), - TQString::fromLatin1(domain), - TQString::fromLatin1(path), - TQString::fromLatin1(name), - TQString::fromLatin1(value), + KHttpCookie *cookie = new KHttpCookie(TQString::tqfromLatin1(host), + TQString::tqfromLatin1(domain), + TQString::tqfromLatin1(path), + TQString::tqfromLatin1(name), + TQString::tqfromLatin1(value), expDate, protVer, secure, httpOnly, explicitPath); addCookie(cookie); @@ -1546,7 +1546,7 @@ void KCookieJar::loadConfig(KConfig *_config, bool reparse ) { const TQString &value = *it++; - int sepPos = value.findRev(':'); + int sepPos = value.tqfindRev(':'); if (sepPos <= 0) continue; diff --git a/kioslave/http/kcookiejar/kcookiejar.h b/kioslave/http/kcookiejar/kcookiejar.h index eb64485ea..32bd5e8c1 100644 --- a/kioslave/http/kcookiejar/kcookiejar.h +++ b/kioslave/http/kcookiejar/kcookiejar.h @@ -89,7 +89,7 @@ public: time_t expireDate(void) { return mExpireDate; } int protocolVersion(void) { return mProtocolVersion; } bool isSecure(void) { return mSecure; } - bool isExpired(time_t currentDate); + bool isExpired(time_t tqcurrentDate); bool isCrossDomain(void) { return mCrossDomain; } bool isHttpOnly(void) { return mHttpOnly; } bool hasExplicitPath(void) { return mExplicitPath; } @@ -160,11 +160,11 @@ public: * * If @p useDOMFormat is true, the string is formatted in a format * in compliance with the DOM standard. - * @p pendingCookies contains a list of cookies that have not been + * @p pendingCookies tqcontains a list of cookies that have not been * approved yet by the user but that will be included in the result * none the less. */ - TQString findCookies(const TQString &_url, bool useDOMFormat, long windowId, KHttpCookieList *pendingCookies=0); + TQString tqfindCookies(const TQString &_url, bool useDOMFormat, long windowId, KHttpCookieList *pendingCookies=0); /** * This function parses cookie_headers and returns a linked list of diff --git a/kioslave/http/kcookiejar/kcookieserver.cpp b/kioslave/http/kcookiejar/kcookieserver.cpp index e6469f127..884f08877 100644 --- a/kioslave/http/kcookiejar/kcookieserver.cpp +++ b/kioslave/http/kcookiejar/kcookieserver.cpp @@ -277,7 +277,7 @@ void KCookieServer::checkCookies( KHttpCookieList *cookieList) { TQCString replyType; TQByteArray replyData; - TQString res = mCookieJar->findCookies( request->url, request->DOM, request->windowId ); + TQString res = mCookieJar->tqfindCookies( request->url, request->DOM, request->windowId ); TQDataStream stream2(replyData, IO_WriteOnly); stream2 << res; @@ -369,14 +369,14 @@ bool KCookieServer::cookieMatches( KHttpCookiePtr c, // DCOP function QString -KCookieServer::findCookies(TQString url) +KCookieServer::tqfindCookies(TQString url) { - return findCookies(url, 0); + return tqfindCookies(url, 0); } // DCOP function QString -KCookieServer::findCookies(TQString url, long windowId) +KCookieServer::tqfindCookies(TQString url, long windowId) { if (cookiesPending(url)) { @@ -390,7 +390,7 @@ KCookieServer::findCookies(TQString url, long windowId) return TQString::null; // Talk to you later :-) } - TQString cookies = mCookieJar->findCookies(url, false, windowId); + TQString cookies = mCookieJar->tqfindCookies(url, false, windowId); if (mCookieJar->changed()) saveCookieJar(); @@ -400,7 +400,7 @@ KCookieServer::findCookies(TQString url, long windowId) // DCOP function QStringList -KCookieServer::findDomains() +KCookieServer::tqfindDomains() { TQStringList result; const TQStringList domains = mCookieJar->getDomainList(); @@ -418,7 +418,7 @@ KCookieServer::findDomains() // DCOP function QStringList -KCookieServer::findCookies(TQValueList fields, +KCookieServer::tqfindCookies(TQValueList fields, TQString domain, TQString fqdn, TQString path, @@ -450,14 +450,14 @@ KCookieServer::findCookies(TQValueList fields, // DCOP function QString -KCookieServer::findDOMCookies(TQString url) +KCookieServer::tqfindDOMCookies(TQString url) { - return findDOMCookies(url, 0); + return tqfindDOMCookies(url, 0); } // DCOP function QString -KCookieServer::findDOMCookies(TQString url, long windowId) +KCookieServer::tqfindDOMCookies(TQString url, long windowId) { // We don't wait for pending cookies because it locks up konqueror // which can cause a deadlock if it happens to have a popup-menu up. @@ -465,7 +465,7 @@ KCookieServer::findDOMCookies(TQString url, long windowId) KHttpCookieList pendingCookies; cookiesPending(url, &pendingCookies); - return mCookieJar->findCookies(url, true, windowId, &pendingCookies); + return mCookieJar->tqfindCookies(url, true, windowId, &pendingCookies); } // DCOP function diff --git a/kioslave/http/kcookiejar/kcookieserver.h b/kioslave/http/kcookiejar/kcookieserver.h index 0c36f10b1..042d75521 100644 --- a/kioslave/http/kcookiejar/kcookieserver.h +++ b/kioslave/http/kcookiejar/kcookieserver.h @@ -45,12 +45,12 @@ public: ~KCookieServer(); k_dcop: - TQString findCookies(TQString); - TQString findCookies(TQString, long); - TQStringList findDomains(); - TQStringList findCookies(TQValueList,TQString,TQString,TQString,TQString); - TQString findDOMCookies(TQString); - TQString findDOMCookies(TQString, long); + TQString tqfindCookies(TQString); + TQString tqfindCookies(TQString, long); + TQStringList tqfindDomains(); + TQStringList tqfindCookies(TQValueList,TQString,TQString,TQString,TQString); + TQString tqfindDOMCookies(TQString); + TQString tqfindDOMCookies(TQString, long); void addCookies(TQString, TQCString, long); void deleteCookie(TQString, TQString, TQString, TQString); void deleteCookiesFromDomain(TQString); diff --git a/kioslave/http/kcookiejar/kcookiewin.cpp b/kioslave/http/kcookiejar/kcookiewin.cpp index 2c11c33cb..f0d29b05a 100644 --- a/kioslave/http/kcookiejar/kcookiewin.cpp +++ b/kioslave/http/kcookiejar/kcookiewin.cpp @@ -93,17 +93,17 @@ KCookieWin::KCookieWin( TQWidget *parent, KHttpCookieList cookieList, } # endif #endif - // Main widget's layout manager... - TQVBoxLayout* vlayout = new TQVBoxLayout( this, KDialog::marginHint(), KDialog::spacingHint() ); - vlayout->setResizeMode( TQLayout::Fixed ); + // Main widget's tqlayout manager... + TQVBoxLayout* vtqlayout = new TQVBoxLayout( this, KDialog::marginHint(), KDialog::spacingHint() ); + vtqlayout->setResizeMode( TQLayout::Fixed ); // Cookie image and message to user TQHBox* hBox = new TQHBox( this ); hBox->setSpacing( KDialog::spacingHint() ); TQLabel* icon = new TQLabel( hBox ); icon->setPixmap( TQMessageBox::standardIcon(TQMessageBox::Warning) ); - icon->setAlignment( Qt::AlignCenter ); - icon->setFixedSize( 2*icon->sizeHint() ); + icon->tqsetAlignment( Qt::AlignCenter ); + icon->setFixedSize( 2*icon->tqsizeHint() ); int count = cookieList.count(); @@ -111,11 +111,11 @@ KCookieWin::KCookieWin( TQWidget *parent, KHttpCookieList cookieList, TQString txt = i18n("You received a cookie from", "You received %n cookies from", count); TQLabel* lbl = new TQLabel( txt, vBox ); - lbl->setAlignment( Qt::AlignCenter ); + lbl->tqsetAlignment( Qt::AlignCenter ); KHttpCookiePtr cookie = cookieList.first(); TQString host (cookie->host()); - int pos = host.find(':'); + int pos = host.tqfind(':'); if ( pos > 0 ) { TQString portNum = host.left(pos); @@ -128,14 +128,14 @@ KCookieWin::KCookieWin( TQWidget *parent, KHttpCookieList cookieList, if (cookie->isCrossDomain()) txt += i18n(" [Cross Domain!]"); lbl = new TQLabel( txt, vBox ); - lbl->setAlignment( Qt::AlignCenter ); + lbl->tqsetAlignment( Qt::AlignCenter ); lbl = new TQLabel( i18n("Do you want to accept or reject?"), vBox ); - lbl->setAlignment( Qt::AlignCenter ); - vlayout->addWidget( hBox, 0, Qt::AlignLeft ); + lbl->tqsetAlignment( Qt::AlignCenter ); + vtqlayout->addWidget( hBox, 0, Qt::AlignLeft ); // Cookie Details dialog... m_detailView = new KCookieDetail( cookieList, count, this ); - vlayout->addWidget( m_detailView ); + vtqlayout->addWidget( m_detailView ); m_showDetails = showDetails; m_showDetails ? m_detailView->show():m_detailView->hide(); @@ -168,7 +168,7 @@ KCookieWin::KCookieWin( TQWidget *parent, KHttpCookieList cookieList, "(see WebBrowsing/Cookies in the Control Center).") ); #endif m_btnGrp->insert( rb ); - vlayout->addWidget( m_btnGrp ); + vtqlayout->addWidget( m_btnGrp ); if ( defaultButton > -1 && defaultButton < 3 ) m_btnGrp->setButton( defaultButton ); @@ -202,8 +202,8 @@ KCookieWin::KCookieWin( TQWidget *parent, KHttpCookieList cookieList, #endif - vlayout->addWidget( bbox ); - setFixedSize( sizeHint() ); + vtqlayout->addWidget( bbox ); + setFixedSize( tqsizeHint() ); } KCookieWin::~KCookieWin() @@ -313,7 +313,7 @@ KCookieDetail::KCookieDetail( KHttpCookieList cookieList, int cookieCount, if ( cookieCount > 1 ) { TQPushButton* btnNext = new TQPushButton( i18n("Next cookie","&Next >>"), this ); - btnNext->setFixedSize( btnNext->sizeHint() ); + btnNext->setFixedSize( btnNext->tqsizeHint() ); grid->addMultiCellWidget( btnNext, 8, 8, 0, 1 ); connect( btnNext, TQT_SIGNAL(clicked()), TQT_SLOT(slotNextCookie()) ); #ifndef QT_NO_TOOLTIP diff --git a/kioslave/http/kcookiejar/netscape_cookie_spec.html b/kioslave/http/kcookiejar/netscape_cookie_spec.html index eb190f2e3..afd1f1565 100644 --- a/kioslave/http/kcookiejar/netscape_cookie_spec.html +++ b/kioslave/http/kcookiejar/netscape_cookie_spec.html @@ -151,7 +151,7 @@ the URL request. The path "/foo" would match "/foobar" and "/foo/bar.html". The path "/" is the most general path.

If the path is not specified, it as assumed to be the same path -as the document being described by the header which contains the cookie. +as the document being described by the header which tqcontains the cookie.

secure
@@ -223,16 +223,16 @@ as long as it is less than 4 kilobytes.
  • If a CGI script wishes to delete a cookie, it can do so by returning a cookie with the same name, and an expires time which is in the past. The path and name must match exactly -in order for the expiring cookie to replace the valid cookie. +in order for the expiring cookie to tqreplace the valid cookie. This requirement makes it difficult for anyone but the originator of a cookie to delete a cookie.

  • When caching HTTP, as a proxy server might do, the Set-cookie response header should never be cached.

  • If a proxy server receives a response which -contains a Set-cookie header, it should propagate the Set-cookie +tqcontains a Set-cookie header, it should propagate the Set-cookie header to the client, regardless of whether the response was 304 (Not Modified) or 200 (OK). -

    Similarly, if a client request contains a Cookie: header, it +

    Similarly, if a client request tqcontains a Cookie: header, it should be forwarded through a proxy, even if the conditional If-modified-since request is being made. diff --git a/kioslave/http/kcookiejar/rfc2109 b/kioslave/http/kcookiejar/rfc2109 index 432fdcc6e..86a4fc7e9 100644 --- a/kioslave/http/kcookiejar/rfc2109 +++ b/kioslave/http/kcookiejar/rfc2109 @@ -13,7 +13,7 @@ Category: Standards Track L. Montulli HTTP State Management Mechanism -Status of this Memo +tqStatus of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for @@ -374,7 +374,7 @@ RFC 2109 HTTP State Management Mechanism February 1997 * The value for the Path attribute is not a prefix of the request- URI. - * The value for the Domain attribute contains no embedded dots or + * The value for the Domain attribute tqcontains no embedded dots or does not start with a dot. * The value for the request-host does not domain-match the Domain @@ -382,12 +382,12 @@ RFC 2109 HTTP State Management Mechanism February 1997 * The request-host is a FQDN (not IP address) and has the form HD, where D is the value of the Domain attribute, and H is a string - that contains one or more dots. + that tqcontains one or more dots. Examples: * A Set-Cookie from request-host y.x.foo.com for Domain=.foo.com - would be rejected, because H is y.x and contains a dot. + would be rejected, because H is y.x and tqcontains a dot. @@ -433,7 +433,7 @@ RFC 2109 HTTP State Management Mechanism February 1997 checkbox (or, conversely, its immediate destruction). Privacy considerations dictate that the user have considerable - control over cookie management. The PRIVACY section contains more + control over cookie management. The PRIVACY section tqcontains more information. 4.3.4 Sending Cookies to the Origin Server @@ -666,7 +666,7 @@ RFC 2109 HTTP State Management Mechanism February 1997 Set-Cookie: Part_Number="Rocket_Launcher_0001"; Version="1"; Path="/acme" - Shopping basket contains an item. + Shopping basket tqcontains an item. @@ -714,7 +714,7 @@ RFC 2109 HTTP State Management Mechanism February 1997 each of which it receives a new cookie. All the cookies have the same Path attribute and (default) domain. Because the request URLs all have /acme as a prefix, and that matches the Path attribute, each - request contains all the cookies received so far. + request tqcontains all the cookies received so far. 5.2 Example 2 @@ -803,7 +803,7 @@ RFC 2109 HTTP State Management Mechanism February 1997 inherently. For example, if a shopping-basket-style application always displays a user's current basket contents on each page, those pages cannot be cached, because each user's basket's contents would - be different. On the other hand, if each page contains just a link + be different. On the other hand, if each page tqcontains just a link that allows the user to "Look at My Shopping Basket", the page can be cached. @@ -862,7 +862,7 @@ RFC 2109 HTTP State Management Mechanism February 1997 of a user through the server. Users may object to this behavior as an intrusive accumulation of information, even if their identity is not evident. (Identity might become evident if a user subsequently - fills out a form that contains identifying information.) This state + fills out a form that tqcontains identifying information.) This state management specification therefore requires that a user agent give the user control over such a possible intrusion, although the interface through which the user is given this control is left @@ -1053,7 +1053,7 @@ RFC 2109 HTTP State Management Mechanism February 1997 Wdy, DD-Mon-YY HH:MM:SS GMT - Note that the Expires date format contains embedded spaces, and that + Note that the Expires date format tqcontains embedded spaces, and that "old" cookies did not have quotes around values. Clients that implement to this specification should be aware of "old" cookies and Expires. diff --git a/kioslave/http/kcookiejar/rfc2965 b/kioslave/http/kcookiejar/rfc2965 index 8a4d02b17..1de450b13 100644 --- a/kioslave/http/kcookiejar/rfc2965 +++ b/kioslave/http/kcookiejar/rfc2965 @@ -13,7 +13,7 @@ Category: Standards Track Epinions.com, Inc. HTTP State Management Mechanism -Status of this Memo +tqStatus of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for @@ -71,7 +71,7 @@ RFC 2965 HTTP State Management Mechanism October 2000 request line. Note that request-host is a HN. The term effective host name is related to host name. If a host name - contains no dots, the effective host name is that name with the + tqcontains no dots, the effective host name is that name with the string .local appended to it. Otherwise the effective host name is the same as the host name. Note that all effective host names contain at least one dot. @@ -472,7 +472,7 @@ RFC 2965 HTTP State Management Mechanism October 2000 * The value for the Path attribute is not a prefix of the request-URI. - * The value for the Domain attribute contains no embedded dots, + * The value for the Domain attribute tqcontains no embedded dots, and the value is not .local. * The effective host name that derives from the request-host does @@ -480,7 +480,7 @@ RFC 2965 HTTP State Management Mechanism October 2000 * The request-host is a HDN (not IP address) and has the form HD, where D is the value of the Domain attribute, and H is a string - that contains one or more dots. + that tqcontains one or more dots. * The Port attribute has a "port-list", and the request-port was not in the list. @@ -488,7 +488,7 @@ RFC 2965 HTTP State Management Mechanism October 2000 Examples: * A Set-Cookie2 from request-host y.x.foo.com for Domain=.foo.com - would be rejected, because H is y.x and contains a dot. + would be rejected, because H is y.x and tqcontains a dot. * A Set-Cookie2 from request-host x.foo.com for Domain=.foo.com would be accepted. @@ -548,7 +548,7 @@ RFC 2965 HTTP State Management Mechanism October 2000 response header, whether or not to accept the cookie. A potentially confusing situation could arise if the following sequence occurs: - * the user agent receives a cookie that contains a CommentURL + * the user agent receives a cookie that tqcontains a CommentURL attribute; * the user agent's cookie inspection interface is configured so @@ -585,7 +585,7 @@ RFC 2965 HTTP State Management Mechanism October 2000 immediate destruction). Privacy considerations dictate that the user have considerable - control over cookie management. The PRIVACY section contains more + control over cookie management. The PRIVACY section tqcontains more information. 3.3.4 Sending Cookies to the Origin Server When it sends a request @@ -693,7 +693,7 @@ RFC 2965 HTTP State Management Mechanism October 2000 request header facilitates interoperation between clients and servers that understand different versions of the cookie specification. When the client sends one or more cookies to an origin server, if at least - one of those cookies contains a $Version attribute whose value is + one of those cookies tqcontains a $Version attribute whose value is different from the version that the client understands, then the client MUST also send a Cookie2 request header, the syntax for which is @@ -865,7 +865,7 @@ RFC 2965 HTTP State Management Mechanism October 2000 Set-Cookie2: Part_Number="Rocket_Launcher_0001"; Version="1"; Path="/acme" - Shopping basket contains an item. + Shopping basket tqcontains an item. 5. User Agent -> Server @@ -912,7 +912,7 @@ RFC 2965 HTTP State Management Mechanism October 2000 each of which it receives a new cookie. All the cookies have the same Path attribute and (default) domain. Because the request-URIs all path-match /acme, the Path attribute of each cookie, each request - contains all the cookies received so far. + tqcontains all the cookies received so far. 4.2 Example 2 @@ -996,7 +996,7 @@ RFC 2965 HTTP State Management Mechanism October 2000 inherently. For example, if a shopping-basket-style application always displays a user's current basket contents on each page, those pages cannot be cached, because each user's basket's contents would - be different. On the other hand, if each page contains just a link + be different. On the other hand, if each page tqcontains just a link that allows the user to "Look at My Shopping Basket", the page can be cached. @@ -1052,7 +1052,7 @@ RFC 2965 HTTP State Management Mechanism October 2000 6. PRIVACY Informed consent should guide the design of systems that use cookies. - A user should be able to find out how a web site plans to use + A user should be able to tqfind out how a web site plans to use information in a cookie and should be able to choose whether or not those policies are acceptable. Both the user agent and the origin server must assist informed consent. @@ -1074,7 +1074,7 @@ RFC 2965 HTTP State Management Mechanism October 2000 of a user through the server. Users may object to this behavior as an intrusive accumulation of information, even if their identity is not evident. (Identity might become evident, for example, if a user - subsequently fills out a form that contains identifying information.) + subsequently fills out a form that tqcontains identifying information.) This state management specification therefore requires that a user agent give the user control over such a possible intrusion, although the interface through which the user is given this control is left @@ -1267,7 +1267,7 @@ RFC 2965 HTTP State Management Mechanism October 2000 understand Cookie request headers that also follow this specification. - New cookies MUST replace both equivalent old- and new-style cookies. + New cookies MUST tqreplace both equivalent old- and new-style cookies. That is, if a user agent that follows both this specification and Netscape's original specification receives a Set-Cookie2 response header, and the NAME and the Domain and Path attributes match (per diff --git a/kioslave/http/kcookiejar/tests/kcookiejartest.cpp b/kioslave/http/kcookiejar/tests/kcookiejartest.cpp index 0ad238ab7..53a039310 100644 --- a/kioslave/http/kcookiejar/tests/kcookiejartest.cpp +++ b/kioslave/http/kcookiejar/tests/kcookiejartest.cpp @@ -53,7 +53,7 @@ static void FAIL(const TQString &msg) static void popArg(TQCString &command, TQCString & line) { - int i = line.find(' '); + int i = line.tqfind(' '); if (i != -1) { command = line.left(i); @@ -69,15 +69,15 @@ static void popArg(TQCString &command, TQCString & line) static void popArg(TQString &command, TQCString & line) { - int i = line.find(' '); + int i = line.tqfind(' '); if (i != -1) { - command = TQString::fromLatin1(line.left(i)); + command = TQString::tqfromLatin1(line.left(i)); line = line.mid(i+1); } else { - command = TQString::fromLatin1(line); + command = TQString::tqfromLatin1(line); line = 0; } } @@ -128,8 +128,8 @@ static void processCookie(TQCString &line) if (url.isEmpty()) FAIL(TQString("Missing URL")); - line.replace("%LASTYEAR%", *lastYear); - line.replace("%NEXTYEAR%", *nextYear); + line.tqreplace("%LASTYEAR%", *lastYear); + line.tqreplace("%NEXTYEAR%", *nextYear); KHttpCookieList list = jar->makeCookies(urlStr, line, 0); @@ -158,9 +158,9 @@ static void processCheck(TQCString &line) if (url.isEmpty()) FAIL(TQString("Missing URL")); - TQString expectedCookies = TQString::fromLatin1(line); + TQString expectedCookies = TQString::tqfromLatin1(line); - TQString cookies = jar->findCookies(urlStr, false, 0, 0).stripWhiteSpace(); + TQString cookies = jar->tqfindCookies(urlStr, false, 0, 0).stripWhiteSpace(); if (cookies != expectedCookies) FAIL(urlStr+TQString("\nGot '%1' expected '%2'") .arg(cookies, expectedCookies)); @@ -246,8 +246,8 @@ int main(int argc, char *argv[]) TQCString arg2; TQString result; - lastYear = new TQCString(TQString("Fri, 04-May-%1 01:00:00 GMT").arg(TQDate::currentDate().year()-1).utf8()); - nextYear = new TQCString(TQString(" expires=Fri, 04-May-%1 01:00:00 GMT").arg(TQDate::currentDate().year()+1).utf8()); + lastYear = new TQCString(TQString("Fri, 04-May-%1 01:00:00 GMT").arg(TQDate::tqcurrentDate().year()-1).utf8()); + nextYear = new TQCString(TQString(" expires=Fri, 04-May-%1 01:00:00 GMT").arg(TQDate::tqcurrentDate().year()+1).utf8()); KAboutData about("kcookietest", "kcookietest", "1.0", description, KAboutData::License_GPL, "(C) 2004 Waldo Bastian"); KCmdLineArgs::init( argc, argv, &about); diff --git a/kioslave/http/shoutcast-icecast.txt b/kioslave/http/shoutcast-icecast.txt index f7bdcf1e7..b1eb5b40e 100644 --- a/kioslave/http/shoutcast-icecast.txt +++ b/kioslave/http/shoutcast-icecast.txt @@ -84,7 +84,7 @@ Contents: Although the current HTML 4.01 [HTML4] says to use the object element many browsers out on the market today still look for the embed element. - Below find a little snipbit that will work work in many browsers. + Below tqfind a little snipbit that will work work in many browsers. -- cgit v1.2.1