summaryrefslogtreecommitdiffstats
path: root/src/kvilib/net/kvi_ssl.cpp
diff options
context:
space:
mode:
authorSlávek Banko <slavek.banko@axis.cz>2018-10-29 18:21:41 +0100
committerSlávek Banko <slavek.banko@axis.cz>2018-10-29 18:21:41 +0100
commit7cc4356bc2eceb5a66c2263bff44aa472d2ca290 (patch)
tree08047b60c477dc7026c7623e25770825b5ce7e5c /src/kvilib/net/kvi_ssl.cpp
parent3b217bbf505473102331a7e2ed274fe63a4c3457 (diff)
downloadkvirc-7cc4356bc2eceb5a66c2263bff44aa472d2ca290.tar.gz
kvirc-7cc4356bc2eceb5a66c2263bff44aa472d2ca290.zip
Fix build with a clean TQt namespace.
Signed-off-by: Slávek Banko <slavek.banko@axis.cz>
Diffstat (limited to 'src/kvilib/net/kvi_ssl.cpp')
-rw-r--r--src/kvilib/net/kvi_ssl.cpp8
1 files changed, 4 insertions, 4 deletions
diff --git a/src/kvilib/net/kvi_ssl.cpp b/src/kvilib/net/kvi_ssl.cpp
index 3404b80..038e124 100644
--- a/src/kvilib/net/kvi_ssl.cpp
+++ b/src/kvilib/net/kvi_ssl.cpp
@@ -199,7 +199,7 @@ static DH * my_get_dh(int keylength)
break;
default:
// What the hell do you want from me ?
- debug("OpenSSL is asking for a DH param with keylen %d: no way :D",keylength);
+ tqDebug("OpenSSL is asking for a DH param with keylen %d: no way :D",keylength);
break;
}
@@ -332,7 +332,7 @@ static int cb(char *buf, int size, int rwflag, void *u)
int len = p->len();
if(len >= size)return 0;
kvi_memmove(buf,p->ptr(),len + 1);
-// debug("PASS REQUESTED: %s",p->ptr());
+// tqDebug("PASS REQUESTED: %s",p->ptr());
return len;
}
@@ -346,7 +346,7 @@ KviSSL::Result KviSSL::useCertificateFile(const char * cert,const char * pass)
FILE * f = fopen(cert,"r");
if(!f)return FileIoError;
-// debug("READING CERTIFICATE %s",cert);
+// tqDebug("READING CERTIFICATE %s",cert);
if(PEM_read_X509(f,&x509,cb,&m_szPass))
{
if(!SSL_CTX_use_certificate(m_pSSLCtx,x509))
@@ -372,7 +372,7 @@ KviSSL::Result KviSSL::usePrivateKeyFile(const char * key,const char * pass)
FILE * f = fopen(key,"r");
if(!f)return FileIoError;
-// debug("READING KEY %s",key);
+// tqDebug("READING KEY %s",key);
if(PEM_read_PrivateKey(f,&k,cb,&m_szPass))
{
if(!SSL_CTX_use_PrivateKey(m_pSSLCtx,k))