summaryrefslogtreecommitdiffstats
path: root/kopete/protocols/groupwise/gwaccount.cpp
diff options
context:
space:
mode:
authorSlávek Banko <slavek.banko@axis.cz>2012-11-24 16:19:37 +0100
committerSlávek Banko <slavek.banko@axis.cz>2012-11-24 16:21:38 +0100
commit68b5e38626333b0c1c0396ef8b4b9221e425465a (patch)
treefa6a18bcf394cf95dbb901a8234ea399c4869e1f /kopete/protocols/groupwise/gwaccount.cpp
parentb701e9bde1ec398e3c9a89ba8f4de08ab71cd1a7 (diff)
downloadtdenetwork-68b5e38626333b0c1c0396ef8b4b9221e425465a.tar.gz
tdenetwork-68b5e38626333b0c1c0396ef8b4b9221e425465a.zip
Rename QCA to TQCA
Fix FTBFS
Diffstat (limited to 'kopete/protocols/groupwise/gwaccount.cpp')
-rw-r--r--kopete/protocols/groupwise/gwaccount.cpp46
1 files changed, 23 insertions, 23 deletions
diff --git a/kopete/protocols/groupwise/gwaccount.cpp b/kopete/protocols/groupwise/gwaccount.cpp
index d6d89a25..40d04a3e 100644
--- a/kopete/protocols/groupwise/gwaccount.cpp
+++ b/kopete/protocols/groupwise/gwaccount.cpp
@@ -43,7 +43,7 @@
#include <kopeteview.h>
#include "client.h"
-#include "qca.h"
+#include <qca.h>
#include "gwcontact.h"
#include "gwcontactlist.h"
#include "gwprotocol.h"
@@ -87,7 +87,7 @@ GroupWiseAccount::GroupWiseAccount( GroupWiseProtocol *parent, const TQString& a
TQT_SLOT( slotPrivacy() ), this, "actionPrivacy");
m_connector = 0;
- m_QCATLS = 0;
+ m_TQCATLS = 0;
m_tlsHandler = 0;
m_clientStream = 0;
m_client = 0;
@@ -243,12 +243,12 @@ void GroupWiseAccount::performConnectWithPassword( const TQString &password )
if ( isConnected () )
return;
- bool sslPossible = QCA::isSupported(QCA::CAP_TLS);
+ bool sslPossible = TQCA::isSupported(TQCA::CAP_TLS);
if (!sslPossible)
{
KMessageBox::queuedMessageBox(Kopete::UI::Global::mainWidget (), KMessageBox::Error,
- i18n ("SSL support could not be initialized for account %1. This is most likely because the QCA TLS plugin is not installed on your system.").
+ i18n ("SSL support could not be initialized for account %1. This is most likely because the TQCA TLS plugin is not installed on your system.").
arg(myself()->contactId()),
i18n ("GroupWise SSL Error"));
return;
@@ -263,9 +263,9 @@ void GroupWiseAccount::performConnectWithPassword( const TQString &password )
//myConnector->setOptHostPort( "localhost", 8300 );
m_connector->setOptHostPort( server(), port() );
m_connector->setOptSSL( true );
- Q_ASSERT( QCA::isSupported(QCA::CAP_TLS) );
- m_QCATLS = new QCA::TLS;
- m_tlsHandler = new QCATLSHandler( m_QCATLS );
+ Q_ASSERT( TQCA::isSupported(TQCA::CAP_TLS) );
+ m_TQCATLS = new TQCA::TLS;
+ m_tlsHandler = new TQCATLSHandler( m_TQCATLS );
m_clientStream = new ClientStream( m_connector, m_tlsHandler, 0);
TQObject::connect( m_connector, TQT_SIGNAL( error() ), this, TQT_SLOT( slotConnError() ) );
@@ -439,11 +439,11 @@ void GroupWiseAccount::cleanup()
{
delete m_client;
delete m_clientStream;
- delete m_QCATLS;
+ delete m_TQCATLS;
delete m_connector;
m_connector = 0;
- m_QCATLS = 0;
+ m_TQCATLS = 0;
m_clientStream = 0;
m_client = 0;
}
@@ -687,9 +687,9 @@ void GroupWiseAccount::slotCSWarning( int warning )
void GroupWiseAccount::slotTLSHandshaken()
{
kdDebug ( GROUPWISE_DEBUG_GLOBAL ) << k_funcinfo << "TLS handshake complete" << endl;
- int validityResult = m_QCATLS->certificateValidityResult ();
+ int validityResult = m_TQCATLS->certificateValidityResult ();
- if( validityResult == QCA::TLS::Valid )
+ if( validityResult == TQCA::TLS::Valid )
{
kdDebug ( GROUPWISE_DEBUG_GLOBAL ) << "Certificate is valid, continuing." << endl;
// valid certificate, continue
@@ -716,53 +716,53 @@ int GroupWiseAccount::handleTLSWarning (int warning, TQString server, TQString a
switch(warning)
{
- case QCA::TLS::NoCert:
+ case TQCA::TLS::NoCert:
validityString = i18n("No certificate was presented.");
code = "NoCert";
break;
- case QCA::TLS::HostMismatch:
+ case TQCA::TLS::HostMismatch:
validityString = i18n("The host name does not match the one in the certificate.");
code = "HostMismatch";
break;
- case QCA::TLS::Rejected:
+ case TQCA::TLS::Rejected:
validityString = i18n("The Certificate Authority rejected the certificate.");
code = "Rejected";
break;
- case QCA::TLS::Untrusted:
+ case TQCA::TLS::Untrusted:
// FIXME: write better error message here
validityString = i18n("The certificate is untrusted.");
code = "Untrusted";
break;
- case QCA::TLS::SignatureFailed:
+ case TQCA::TLS::SignatureFailed:
validityString = i18n("The signature is invalid.");
code = "SignatureFailed";
break;
- case QCA::TLS::InvalidCA:
+ case TQCA::TLS::InvalidCA:
validityString = i18n("The Certificate Authority is invalid.");
code = "InvalidCA";
break;
- case QCA::TLS::InvalidPurpose:
+ case TQCA::TLS::InvalidPurpose:
// FIXME: write better error message here
validityString = i18n("Invalid certificate purpose.");
code = "InvalidPurpose";
break;
- case QCA::TLS::SelfSigned:
+ case TQCA::TLS::SelfSigned:
validityString = i18n("The certificate is self-signed.");
code = "SelfSigned";
break;
- case QCA::TLS::Revoked:
+ case TQCA::TLS::Revoked:
validityString = i18n("The certificate has been revoked.");
code = "Revoked";
break;
- case QCA::TLS::PathLengthExceeded:
+ case TQCA::TLS::PathLengthExceeded:
validityString = i18n("Maximum certificate chain length was exceeded.");
code = "PathLengthExceeded";
break;
- case QCA::TLS::Expired:
+ case TQCA::TLS::Expired:
validityString = i18n("The certificate has expired.");
code = "Expired";
break;
- case QCA::TLS::Unknown:
+ case TQCA::TLS::Unknown:
default:
validityString = i18n("An unknown error occurred trying to validate the certificate.");
code = "Unknown";