diff options
author | Michele Calgaro <michele.calgaro@yahoo.it> | 2025-03-22 14:28:03 +0900 |
---|---|---|
committer | Michele Calgaro <michele.calgaro@yahoo.it> | 2025-03-23 10:07:10 +0900 |
commit | 39876d710881d647fd0d755d31b620a7214cf9ff (patch) | |
tree | 0affcc87388c3f41ff8a5013910f9e35cd0da0a9 /src/openvpnmanagementhandler.cpp | |
parent | f45740dc476004d43e63d94b746239e77dfef19e (diff) | |
download | kvpnc-r14.1.4.tar.gz kvpnc-r14.1.4.zip |
Replace TRUE/FALSE with boolean values true/falser14.1.4
Signed-off-by: Michele Calgaro <michele.calgaro@yahoo.it>
(cherry picked from commit b1606f1200c833b5a0896d6bfe08db8db8c6d81e)
Diffstat (limited to 'src/openvpnmanagementhandler.cpp')
-rw-r--r-- | src/openvpnmanagementhandler.cpp | 50 |
1 files changed, 25 insertions, 25 deletions
diff --git a/src/openvpnmanagementhandler.cpp b/src/openvpnmanagementhandler.cpp index 88af157..3a6ce1a 100644 --- a/src/openvpnmanagementhandler.cpp +++ b/src/openvpnmanagementhandler.cpp @@ -166,11 +166,11 @@ void OpenvpnManagementHandler::socketReadyRead() if ( GlobalConfig->KvpncDebugLevel > 2 ) GlobalConfig->appendLogEntry( "OpenvpnManagementHandler raw: " + line, GlobalConfig->debug ); - // if ( line.find( "NOOP", 0, FALSE ) > -1 ) + // if ( line.find( "NOOP", 0, false ) > -1 ) // { // // NOOP // } - // else if ( line.find( ">HOLD:", 0, FALSE ) > -1 ) { + // else if ( line.find( ">HOLD:", 0, false ) > -1 ) { // // if ( GlobalConfig->KvpncDebugLevel > 2 ) // GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message." ).arg("'hold'"), GlobalConfig->debug ); @@ -191,7 +191,7 @@ void OpenvpnManagementHandler::socketReadyRead() // } - if ( line.find( "INFO:OpenVPN Management Interface", 0, FALSE ) > -1 ) + if ( line.find( "INFO:OpenVPN Management Interface", 0, false ) > -1 ) { gotGreeting=true; disconnect ( &greetingtimer, TQ_SIGNAL ( timeout() ), this, TQ_SLOT ( greetingTimedOut() ) ); @@ -201,7 +201,7 @@ void OpenvpnManagementHandler::socketReadyRead() GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n("Got greeting from management interface."), GlobalConfig->debug ); } - else if ( line.find( "> NEED - OK:", 0, FALSE ) > -1 ) + else if ( line.find( "> NEED - OK:", 0, false ) > -1 ) { if ( GlobalConfig->KvpncDebugLevel > 2 ) @@ -237,7 +237,7 @@ void OpenvpnManagementHandler::socketReadyRead() } if (socket) socket->close(); - // if ( line.find( " >PASSWORD:", 0, FALSE ) > -1 ) { + // if ( line.find( " >PASSWORD:", 0, false ) > -1 ) { // // if ( GlobalConfig->KvpncDebugLevel > 2 ) // GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message" ).arg("'password'"), GlobalConfig->debug ); @@ -260,7 +260,7 @@ void OpenvpnManagementHandler::socketReadyRead() // } // sendToServer( "password \"" + req + "\" \"" + pass + "\"\n" ); } - else if ( line.find( "PASSWORD:Need 'Auth' username/password", 0, FALSE ) > -1 ) + else if ( line.find( "PASSWORD:Need 'Auth' username/password", 0, false ) > -1 ) { if ( GlobalConfig->KvpncDebugLevel > 2 ) @@ -310,7 +310,7 @@ void OpenvpnManagementHandler::socketReadyRead() } } } - else if ( line.find( "SUCCESS: 'Auth' username entered", 0, FALSE ) > -1 ) + else if ( line.find( "SUCCESS: 'Auth' username entered", 0, false ) > -1 ) { if ( GlobalConfig->KvpncDebugLevel > 2 ) @@ -364,7 +364,7 @@ void OpenvpnManagementHandler::socketReadyRead() } } - // else if ( line.find( "SUCCESS: 'Auth' username entered", 0, FALSE ) > -1 ) { + // else if ( line.find( "SUCCESS: 'Auth' username entered", 0, false ) > -1 ) { // // if ( GlobalConfig->KvpncDebugLevel > 2 ) // GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message, 2. step" ).arg("'need username/password'"), GlobalConfig->debug ); @@ -379,7 +379,7 @@ void OpenvpnManagementHandler::socketReadyRead() // // } - else if ( line.find( "PASSWORD:Need 'HTTP Proxy' username/password", 0, FALSE ) > -1 ) + else if ( line.find( "PASSWORD:Need 'HTTP Proxy' username/password", 0, false ) > -1 ) { if ( GlobalConfig->KvpncDebugLevel > 2 ) @@ -398,7 +398,7 @@ void OpenvpnManagementHandler::socketReadyRead() } } - else if ( line.find( "SUCCESS: 'HTTP Proxy' username entered", 0, FALSE ) > -1 ) + else if ( line.find( "SUCCESS: 'HTTP Proxy' username entered", 0, false ) > -1 ) { if ( GlobalConfig->KvpncDebugLevel > 2 ) @@ -482,7 +482,7 @@ void OpenvpnManagementHandler::socketReadyRead() } } - else if ( line.find( "PASSWORD:Need 'Private Key' password", 0, FALSE ) > -1 ) + else if ( line.find( "PASSWORD:Need 'Private Key' password", 0, false ) > -1 ) { if ( GlobalConfig->KvpncDebugLevel > 2 ) @@ -569,7 +569,7 @@ void OpenvpnManagementHandler::socketReadyRead() } } - else if ( line.find( "PASSWORD:Verification Failed: 'Private Key'", 0, FALSE ) > -1 ) + else if ( line.find( "PASSWORD:Verification Failed: 'Private Key'", 0, false ) > -1 ) { if ( GlobalConfig->KvpncDebugLevel > 2 ) @@ -628,7 +628,7 @@ void OpenvpnManagementHandler::socketReadyRead() } } - else if ( line.find( "FATAL:script failed: shell command exited with error status", 0, FALSE ) > -1 ) + else if ( line.find( "FATAL:script failed: shell command exited with error status", 0, false ) > -1 ) { if ( GlobalConfig->KvpncDebugLevel > 2 ) @@ -637,7 +637,7 @@ void OpenvpnManagementHandler::socketReadyRead() abort = true; } - else if ( line.find( "PASSWORD:Verification Failed: 'Auth'", 0, FALSE ) > -1 ) + else if ( line.find( "PASSWORD:Verification Failed: 'Auth'", 0, false ) > -1 ) { if ( GlobalConfig->KvpncDebugLevel > 2 ) @@ -648,7 +648,7 @@ void OpenvpnManagementHandler::socketReadyRead() abort = true; } - else if ( line.find( "FATAL:Cannot load CA certificate file", 0, FALSE ) > -1 ) + else if ( line.find( "FATAL:Cannot load CA certificate file", 0, false ) > -1 ) { if ( GlobalConfig->KvpncDebugLevel > 2 ) @@ -659,7 +659,7 @@ void OpenvpnManagementHandler::socketReadyRead() abort = true; } - else if ( line.find( "FATAL:Message hash algorithm", 0, FALSE ) > -1 && line.find( "not found", 0, FALSE ) > -1 ) + else if ( line.find( "FATAL:Message hash algorithm", 0, false ) > -1 && line.find( "not found", 0, false ) > -1 ) { if ( GlobalConfig->KvpncDebugLevel > 2 ) @@ -670,7 +670,7 @@ void OpenvpnManagementHandler::socketReadyRead() abort = true; } - else if ( line.find( "PASSWORD:Need 'eToken token' password", 0, FALSE ) > -1) + else if ( line.find( "PASSWORD:Need 'eToken token' password", 0, false ) > -1) { GlobalConfig->TmpPassword = ""; TQCString password; @@ -724,13 +724,13 @@ void OpenvpnManagementHandler::socketReadyRead() } } - else if ( line.find( "SUCCESS: 'eToken token' password entered, but not yet verified", 0, FALSE ) > -1 ) + else if ( line.find( "SUCCESS: 'eToken token' password entered, but not yet verified", 0, false ) > -1 ) { if ( GlobalConfig->KvpncDebugLevel > 1 ) GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message" ).arg("SUCCESS for 'eToken token' password"), GlobalConfig->debug ); } - else if ( line.find( ">PASSWORD:Need '", 0, FALSE) > -1 && line.find( "token' password", 0, FALSE ) > -1) + else if ( line.find( ">PASSWORD:Need '", 0, false) > -1 && line.find( "token' password", 0, false ) > -1) { GlobalConfig->TmpPassword = ""; TQCString password; @@ -789,7 +789,7 @@ void OpenvpnManagementHandler::socketReadyRead() } } - else if ( line.find( "SUCCESS: '", 0, FALSE ) > -1 && line.find( "token' password entered, but not yet verified", 0, FALSE ) > -1 ) + else if ( line.find( "SUCCESS: '", 0, false ) > -1 && line.find( "token' password entered, but not yet verified", 0, false ) > -1 ) { TQString TokenName = line.section('\'',1,1); if ( GlobalConfig->KvpncDebugLevel > 4 ) @@ -800,13 +800,13 @@ void OpenvpnManagementHandler::socketReadyRead() GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message" ).arg("SUCCESS for '%1' password").arg(TokenName), GlobalConfig->debug ); } - else if ( line.find( "SUCCESS: 'Auth' password entered, but not yet verified", 0, FALSE ) > -1 ) + else if ( line.find( "SUCCESS: 'Auth' password entered, but not yet verified", 0, false ) > -1 ) { if ( GlobalConfig->KvpncDebugLevel > 1 ) GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message" ).arg("SUCCESS for user password"), GlobalConfig->debug ); } - else if ( line.find( "Need 'token-insertion-request'", 0, FALSE ) > -1 ) + else if ( line.find( "Need 'token-insertion-request'", 0, false ) > -1 ) { // if ( GlobalConfig->KvpncDebugLevel > 1 ) GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message" ).arg("token-insertion-request"), GlobalConfig->debug ); @@ -814,13 +814,13 @@ void OpenvpnManagementHandler::socketReadyRead() abort = true; } - else if ( line.find( "SUCCESS: 'Private Key' password entered, but not yet verified", 0, FALSE ) > -1 ) + else if ( line.find( "SUCCESS: 'Private Key' password entered, but not yet verified", 0, false ) > -1 ) { if ( GlobalConfig->KvpncDebugLevel > 1 ) GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message" ).arg("SUCCESS for 'Private Key' password"), GlobalConfig->debug ); } - else if ( line.find( "external program fork failed", 0, FALSE ) > -1 ) + else if ( line.find( "external program fork failed", 0, false ) > -1 ) { GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "External program fork failed, need security parameter." ), GlobalConfig->debug ); @@ -893,7 +893,7 @@ bool OpenvpnManagementHandler::doConnect() socket->connectToHost( "127.0.0.1", GlobalConfig->OpenvpnManagementPort ); connect ( &greetingtimer, TQ_SIGNAL ( timeout() ), this, TQ_SLOT ( greetingTimedOut() ) ); - greetingtimer.start ( 3 * 1000, TRUE ); + greetingtimer.start ( 3 * 1000, true ); if ( GlobalConfig->KvpncDebugLevel > 2 ) GlobalConfig->appendLogEntry( "OpenvpnManagementHandler " + i18n("Management greeting timer started."), GlobalConfig->debug ); |