summaryrefslogtreecommitdiffstats
path: root/src/openvpnmanagementhandler.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'src/openvpnmanagementhandler.cpp')
-rw-r--r--src/openvpnmanagementhandler.cpp50
1 files changed, 25 insertions, 25 deletions
diff --git a/src/openvpnmanagementhandler.cpp b/src/openvpnmanagementhandler.cpp
index 88af157..3a6ce1a 100644
--- a/src/openvpnmanagementhandler.cpp
+++ b/src/openvpnmanagementhandler.cpp
@@ -166,11 +166,11 @@ void OpenvpnManagementHandler::socketReadyRead()
if ( GlobalConfig->KvpncDebugLevel > 2 )
GlobalConfig->appendLogEntry( "OpenvpnManagementHandler raw: " + line, GlobalConfig->debug );
- // if ( line.find( "NOOP", 0, FALSE ) > -1 )
+ // if ( line.find( "NOOP", 0, false ) > -1 )
// {
// // NOOP
// }
- // else if ( line.find( ">HOLD:", 0, FALSE ) > -1 ) {
+ // else if ( line.find( ">HOLD:", 0, false ) > -1 ) {
//
// if ( GlobalConfig->KvpncDebugLevel > 2 )
// GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message." ).arg("'hold'"), GlobalConfig->debug );
@@ -191,7 +191,7 @@ void OpenvpnManagementHandler::socketReadyRead()
// }
- if ( line.find( "INFO:OpenVPN Management Interface", 0, FALSE ) > -1 )
+ if ( line.find( "INFO:OpenVPN Management Interface", 0, false ) > -1 )
{
gotGreeting=true;
disconnect ( &greetingtimer, TQ_SIGNAL ( timeout() ), this, TQ_SLOT ( greetingTimedOut() ) );
@@ -201,7 +201,7 @@ void OpenvpnManagementHandler::socketReadyRead()
GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n("Got greeting from management interface."), GlobalConfig->debug );
}
- else if ( line.find( "> NEED - OK:", 0, FALSE ) > -1 )
+ else if ( line.find( "> NEED - OK:", 0, false ) > -1 )
{
if ( GlobalConfig->KvpncDebugLevel > 2 )
@@ -237,7 +237,7 @@ void OpenvpnManagementHandler::socketReadyRead()
}
if (socket)
socket->close();
- // if ( line.find( " >PASSWORD:", 0, FALSE ) > -1 ) {
+ // if ( line.find( " >PASSWORD:", 0, false ) > -1 ) {
//
// if ( GlobalConfig->KvpncDebugLevel > 2 )
// GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message" ).arg("'password'"), GlobalConfig->debug );
@@ -260,7 +260,7 @@ void OpenvpnManagementHandler::socketReadyRead()
// }
// sendToServer( "password \"" + req + "\" \"" + pass + "\"\n" );
}
- else if ( line.find( "PASSWORD:Need 'Auth' username/password", 0, FALSE ) > -1 )
+ else if ( line.find( "PASSWORD:Need 'Auth' username/password", 0, false ) > -1 )
{
if ( GlobalConfig->KvpncDebugLevel > 2 )
@@ -310,7 +310,7 @@ void OpenvpnManagementHandler::socketReadyRead()
}
}
}
- else if ( line.find( "SUCCESS: 'Auth' username entered", 0, FALSE ) > -1 )
+ else if ( line.find( "SUCCESS: 'Auth' username entered", 0, false ) > -1 )
{
if ( GlobalConfig->KvpncDebugLevel > 2 )
@@ -364,7 +364,7 @@ void OpenvpnManagementHandler::socketReadyRead()
}
}
- // else if ( line.find( "SUCCESS: 'Auth' username entered", 0, FALSE ) > -1 ) {
+ // else if ( line.find( "SUCCESS: 'Auth' username entered", 0, false ) > -1 ) {
//
// if ( GlobalConfig->KvpncDebugLevel > 2 )
// GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message, 2. step" ).arg("'need username/password'"), GlobalConfig->debug );
@@ -379,7 +379,7 @@ void OpenvpnManagementHandler::socketReadyRead()
//
// }
- else if ( line.find( "PASSWORD:Need 'HTTP Proxy' username/password", 0, FALSE ) > -1 )
+ else if ( line.find( "PASSWORD:Need 'HTTP Proxy' username/password", 0, false ) > -1 )
{
if ( GlobalConfig->KvpncDebugLevel > 2 )
@@ -398,7 +398,7 @@ void OpenvpnManagementHandler::socketReadyRead()
}
}
- else if ( line.find( "SUCCESS: 'HTTP Proxy' username entered", 0, FALSE ) > -1 )
+ else if ( line.find( "SUCCESS: 'HTTP Proxy' username entered", 0, false ) > -1 )
{
if ( GlobalConfig->KvpncDebugLevel > 2 )
@@ -482,7 +482,7 @@ void OpenvpnManagementHandler::socketReadyRead()
}
}
- else if ( line.find( "PASSWORD:Need 'Private Key' password", 0, FALSE ) > -1 )
+ else if ( line.find( "PASSWORD:Need 'Private Key' password", 0, false ) > -1 )
{
if ( GlobalConfig->KvpncDebugLevel > 2 )
@@ -569,7 +569,7 @@ void OpenvpnManagementHandler::socketReadyRead()
}
}
- else if ( line.find( "PASSWORD:Verification Failed: 'Private Key'", 0, FALSE ) > -1 )
+ else if ( line.find( "PASSWORD:Verification Failed: 'Private Key'", 0, false ) > -1 )
{
if ( GlobalConfig->KvpncDebugLevel > 2 )
@@ -628,7 +628,7 @@ void OpenvpnManagementHandler::socketReadyRead()
}
}
- else if ( line.find( "FATAL:script failed: shell command exited with error status", 0, FALSE ) > -1 )
+ else if ( line.find( "FATAL:script failed: shell command exited with error status", 0, false ) > -1 )
{
if ( GlobalConfig->KvpncDebugLevel > 2 )
@@ -637,7 +637,7 @@ void OpenvpnManagementHandler::socketReadyRead()
abort = true;
}
- else if ( line.find( "PASSWORD:Verification Failed: 'Auth'", 0, FALSE ) > -1 )
+ else if ( line.find( "PASSWORD:Verification Failed: 'Auth'", 0, false ) > -1 )
{
if ( GlobalConfig->KvpncDebugLevel > 2 )
@@ -648,7 +648,7 @@ void OpenvpnManagementHandler::socketReadyRead()
abort = true;
}
- else if ( line.find( "FATAL:Cannot load CA certificate file", 0, FALSE ) > -1 )
+ else if ( line.find( "FATAL:Cannot load CA certificate file", 0, false ) > -1 )
{
if ( GlobalConfig->KvpncDebugLevel > 2 )
@@ -659,7 +659,7 @@ void OpenvpnManagementHandler::socketReadyRead()
abort = true;
}
- else if ( line.find( "FATAL:Message hash algorithm", 0, FALSE ) > -1 && line.find( "not found", 0, FALSE ) > -1 )
+ else if ( line.find( "FATAL:Message hash algorithm", 0, false ) > -1 && line.find( "not found", 0, false ) > -1 )
{
if ( GlobalConfig->KvpncDebugLevel > 2 )
@@ -670,7 +670,7 @@ void OpenvpnManagementHandler::socketReadyRead()
abort = true;
}
- else if ( line.find( "PASSWORD:Need 'eToken token' password", 0, FALSE ) > -1)
+ else if ( line.find( "PASSWORD:Need 'eToken token' password", 0, false ) > -1)
{
GlobalConfig->TmpPassword = "";
TQCString password;
@@ -724,13 +724,13 @@ void OpenvpnManagementHandler::socketReadyRead()
}
}
- else if ( line.find( "SUCCESS: 'eToken token' password entered, but not yet verified", 0, FALSE ) > -1 )
+ else if ( line.find( "SUCCESS: 'eToken token' password entered, but not yet verified", 0, false ) > -1 )
{
if ( GlobalConfig->KvpncDebugLevel > 1 )
GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message" ).arg("SUCCESS for 'eToken token' password"), GlobalConfig->debug );
}
- else if ( line.find( ">PASSWORD:Need '", 0, FALSE) > -1 && line.find( "token' password", 0, FALSE ) > -1)
+ else if ( line.find( ">PASSWORD:Need '", 0, false) > -1 && line.find( "token' password", 0, false ) > -1)
{
GlobalConfig->TmpPassword = "";
TQCString password;
@@ -789,7 +789,7 @@ void OpenvpnManagementHandler::socketReadyRead()
}
}
- else if ( line.find( "SUCCESS: '", 0, FALSE ) > -1 && line.find( "token' password entered, but not yet verified", 0, FALSE ) > -1 )
+ else if ( line.find( "SUCCESS: '", 0, false ) > -1 && line.find( "token' password entered, but not yet verified", 0, false ) > -1 )
{
TQString TokenName = line.section('\'',1,1);
if ( GlobalConfig->KvpncDebugLevel > 4 )
@@ -800,13 +800,13 @@ void OpenvpnManagementHandler::socketReadyRead()
GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message" ).arg("SUCCESS for '%1' password").arg(TokenName), GlobalConfig->debug );
}
- else if ( line.find( "SUCCESS: 'Auth' password entered, but not yet verified", 0, FALSE ) > -1 )
+ else if ( line.find( "SUCCESS: 'Auth' password entered, but not yet verified", 0, false ) > -1 )
{
if ( GlobalConfig->KvpncDebugLevel > 1 )
GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message" ).arg("SUCCESS for user password"), GlobalConfig->debug );
}
- else if ( line.find( "Need 'token-insertion-request'", 0, FALSE ) > -1 )
+ else if ( line.find( "Need 'token-insertion-request'", 0, false ) > -1 )
{
// if ( GlobalConfig->KvpncDebugLevel > 1 )
GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message" ).arg("token-insertion-request"), GlobalConfig->debug );
@@ -814,13 +814,13 @@ void OpenvpnManagementHandler::socketReadyRead()
abort = true;
}
- else if ( line.find( "SUCCESS: 'Private Key' password entered, but not yet verified", 0, FALSE ) > -1 )
+ else if ( line.find( "SUCCESS: 'Private Key' password entered, but not yet verified", 0, false ) > -1 )
{
if ( GlobalConfig->KvpncDebugLevel > 1 )
GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "got %1 message" ).arg("SUCCESS for 'Private Key' password"), GlobalConfig->debug );
}
- else if ( line.find( "external program fork failed", 0, FALSE ) > -1 )
+ else if ( line.find( "external program fork failed", 0, false ) > -1 )
{
GlobalConfig->appendLogEntry( "OpenvpnManagementHandler: " + i18n( "External program fork failed, need security parameter." ), GlobalConfig->debug );
@@ -893,7 +893,7 @@ bool OpenvpnManagementHandler::doConnect()
socket->connectToHost( "127.0.0.1", GlobalConfig->OpenvpnManagementPort );
connect ( &greetingtimer, TQ_SIGNAL ( timeout() ), this, TQ_SLOT ( greetingTimedOut() ) );
- greetingtimer.start ( 3 * 1000, TRUE );
+ greetingtimer.start ( 3 * 1000, true );
if ( GlobalConfig->KvpncDebugLevel > 2 )
GlobalConfig->appendLogEntry( "OpenvpnManagementHandler " + i18n("Management greeting timer started."), GlobalConfig->debug );