summaryrefslogtreecommitdiffstats
path: root/certmanager/lib/ui/keyrequester.cpp
diff options
context:
space:
mode:
authortpearson <tpearson@283d02a7-25f6-0310-bc7c-ecb5cbfe19da>2011-08-10 22:19:39 +0000
committertpearson <tpearson@283d02a7-25f6-0310-bc7c-ecb5cbfe19da>2011-08-10 22:19:39 +0000
commit36a36a5c1015aa0d03f4515c401e907ddb9d6291 (patch)
tree0212ba6d2c749043134005a41f2bd0379619d40f /certmanager/lib/ui/keyrequester.cpp
parent4c6f8d69e2d1501837affb472c4eb8fec4462240 (diff)
downloadtdepim-36a36a5c1015aa0d03f4515c401e907ddb9d6291.tar.gz
tdepim-36a36a5c1015aa0d03f4515c401e907ddb9d6291.zip
rename the following methods:
tqparent parent tqmask mask git-svn-id: svn://anonsvn.kde.org/home/kde/branches/trinity/kdepim@1246260 283d02a7-25f6-0310-bc7c-ecb5cbfe19da
Diffstat (limited to 'certmanager/lib/ui/keyrequester.cpp')
-rw-r--r--certmanager/lib/ui/keyrequester.cpp28
1 files changed, 14 insertions, 14 deletions
diff --git a/certmanager/lib/ui/keyrequester.cpp b/certmanager/lib/ui/keyrequester.cpp
index 16efbd46f..01e6902f5 100644
--- a/certmanager/lib/ui/keyrequester.cpp
+++ b/certmanager/lib/ui/keyrequester.cpp
@@ -82,8 +82,8 @@
#include <assert.h>
Kleo::KeyRequester::KeyRequester( unsigned int allowedKeys, bool multipleKeys,
- TQWidget * tqparent, const char * name )
- : TQWidget( tqparent, name ),
+ TQWidget * parent, const char * name )
+ : TQWidget( parent, name ),
mOpenPGPBackend( 0 ),
mSMIMEBackend( 0 ),
mMulti( multipleKeys ),
@@ -94,8 +94,8 @@ Kleo::KeyRequester::KeyRequester( unsigned int allowedKeys, bool multipleKeys,
init();
}
-Kleo::KeyRequester::KeyRequester( TQWidget * tqparent, const char * name )
- : TQWidget( tqparent, name ),
+Kleo::KeyRequester::KeyRequester( TQWidget * parent, const char * name )
+ : TQWidget( parent, name ),
mOpenPGPBackend( 0 ),
mSMIMEBackend( 0 ),
mMulti( false ),
@@ -226,14 +226,14 @@ void Kleo::KeyRequester::updateKeys() {
#ifndef __KLEO_UI_SHOW_KEY_LIST_ERROR_H__
#define __KLEO_UI_SHOW_KEY_LIST_ERROR_H__
-static void showKeyListError( TQWidget * tqparent, const GpgME::Error & err ) {
+static void showKeyListError( TQWidget * parent, const GpgME::Error & err ) {
assert( err );
const TQString msg = i18n( "<qt><p>An error occurred while fetching "
"the keys from the backend:</p>"
"<p><b>%1</b></p></qt>" )
.tqarg( TQString::fromLocal8Bit( err.asString() ) );
- KMessageBox::error( tqparent, msg, i18n( "Key Listing Failed" ) );
+ KMessageBox::error( parent, msg, i18n( "Key Listing Failed" ) );
}
#endif // __KLEO_UI_SHOW_KEY_LIST_ERROR_H__
@@ -430,15 +430,15 @@ static inline unsigned int signingKeyUsage( bool openpgp, bool smime, bool trust
}
Kleo::EncryptionKeyRequester::EncryptionKeyRequester( bool multi, unsigned int proto,
- TQWidget * tqparent, const char * name,
+ TQWidget * parent, const char * name,
bool onlyTrusted, bool onlyValid )
: KeyRequester( encryptionKeyUsage( proto & OpenPGP, proto & SMIME, onlyTrusted, onlyValid ), multi,
- tqparent, name )
+ parent, name )
{
}
-Kleo::EncryptionKeyRequester::EncryptionKeyRequester( TQWidget * tqparent, const char * name )
- : KeyRequester( 0, false, tqparent, name )
+Kleo::EncryptionKeyRequester::EncryptionKeyRequester( TQWidget * parent, const char * name )
+ : KeyRequester( 0, false, parent, name )
{
}
@@ -451,15 +451,15 @@ void Kleo::EncryptionKeyRequester::setAllowedKeys( unsigned int proto, bool only
}
Kleo::SigningKeyRequester::SigningKeyRequester( bool multi, unsigned int proto,
- TQWidget * tqparent, const char * name,
+ TQWidget * parent, const char * name,
bool onlyTrusted, bool onlyValid )
: KeyRequester( signingKeyUsage( proto & OpenPGP, proto & SMIME, onlyTrusted, onlyValid ), multi,
- tqparent, name )
+ parent, name )
{
}
-Kleo::SigningKeyRequester::SigningKeyRequester( TQWidget * tqparent, const char * name )
- : KeyRequester( 0, false, tqparent, name )
+Kleo::SigningKeyRequester::SigningKeyRequester( TQWidget * parent, const char * name )
+ : KeyRequester( 0, false, parent, name )
{
}