summaryrefslogtreecommitdiffstats
path: root/kopete/protocols/groupwise/libgroupwise/tests/clientstream_test.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'kopete/protocols/groupwise/libgroupwise/tests/clientstream_test.cpp')
-rw-r--r--kopete/protocols/groupwise/libgroupwise/tests/clientstream_test.cpp18
1 files changed, 9 insertions, 9 deletions
diff --git a/kopete/protocols/groupwise/libgroupwise/tests/clientstream_test.cpp b/kopete/protocols/groupwise/libgroupwise/tests/clientstream_test.cpp
index 4272d956..7a0c039b 100644
--- a/kopete/protocols/groupwise/libgroupwise/tests/clientstream_test.cpp
+++ b/kopete/protocols/groupwise/libgroupwise/tests/clientstream_test.cpp
@@ -37,26 +37,26 @@ void ClientStreamTest::slotDoTest()
dn.dn = "maeuschen";
dn.server = "reiser.suse.de";
// connect to server
- qDebug( "connecting to server ");
+ tqDebug( "connecting to server ");
myTestObject->connectToServer( dn, true ); // fine up to here...
}
void ClientStreamTest::slotConnected()
{
- qDebug( "connection is up");
+ tqDebug( "connection is up");
}
void ClientStreamTest::slotWarning(int warning)
{
- qDebug( "warning: %i", warning);
+ tqDebug( "warning: %i", warning);
}
void ClientStreamTest::slotsend(int layer)
{
- qDebug( "security layer is up: %i", layer);
+ tqDebug( "security layer is up: %i", layer);
RequestFactory testFactory;
// we're not connecting...
- qDebug( "sending request" );
+ tqDebug( "sending request" );
// send a request
TQCString command("login");
Request * firstRequest = testFactory.request( command );
@@ -68,23 +68,23 @@ void ClientStreamTest::slotsend(int layer)
lst.append( new Field::SingleField( NM_A_IP_ADDRESS, 0, NMFIELD_TYPE_UTF8, "10.10.11.103" ) );
firstRequest->setFields( lst );
myTestObject->write( firstRequest );
- qDebug( "done");
+ tqDebug( "done");
}
void ClientStreamTest::slotTLSHandshaken()
{
- qDebug( "TLS handshake complete" );
+ tqDebug( "TLS handshake complete" );
int validityResult = myTLS->certificateValidityResult ();
if( validityResult == QCA::TLS::Valid )
{
- qDebug( "Certificate is valid, continuing.");
+ tqDebug( "Certificate is valid, continuing.");
// valid certificate, continue
myTLSHandler->continueAfterHandshake ();
}
else
{
- qDebug( "Certificate is not valid, continuing" );
+ tqDebug( "Certificate is not valid, continuing" );
// certificate is not valid, query the user
/* if(handleTLSWarning (validityResult, server (), myself()->contactId ()) == KMessageBox::Continue)
{*/