changeset 3995:e72b0c30a895

rename SECURE_CLIENT_PROTOCOL_TEST to SECURE_CLIENT_PROTOCOL
author cologic <cologic@users.sourceforge.net>
date Sun, 05 May 2024 09:58:50 +0000
parents 8f6406972c64
children f39a89c15925
files dcpp/AdcHub.cpp dcpp/AdcHub.h
diffstat 2 files changed, 9 insertions(+), 9 deletions(-) [+]
line wrap: on
line diff
--- a/dcpp/AdcHub.cpp	Mon Apr 15 17:31:07 2024 +0200
+++ b/dcpp/AdcHub.cpp	Sun May 05 09:58:50 2024 +0000
@@ -45,7 +45,7 @@
 using std::make_pair;
 
 const string AdcHub::CLIENT_PROTOCOL("ADC/1.0");
-const string AdcHub::SECURE_CLIENT_PROTOCOL_TEST("ADCS/0.10");
+const string AdcHub::SECURE_CLIENT_PROTOCOL("ADCS/0.10");
 const string AdcHub::ADCS_FEATURE("ADC0");
 const string AdcHub::TCP4_FEATURE("TCP4");
 const string AdcHub::TCP6_FEATURE("TCP6");
@@ -341,7 +341,7 @@
 	bool secure = false;
 	if(protocol == CLIENT_PROTOCOL && !SETTING(REQUIRE_TLS)) {
 		// Nothing special
-	} else if(protocol == SECURE_CLIENT_PROTOCOL_TEST && CryptoManager::getInstance()->TLSOk()) {
+	} else if(protocol == SECURE_CLIENT_PROTOCOL && CryptoManager::getInstance()->TLSOk()) {
 		secure = true;
 	} else {
 		unknownProtocol(c.getFrom(), protocol, token);
@@ -371,7 +371,7 @@
 	bool secure;
 	if(protocol == CLIENT_PROTOCOL && !SETTING(REQUIRE_TLS)) {
 		secure = false;
-	} else if(protocol == SECURE_CLIENT_PROTOCOL_TEST && CryptoManager::getInstance()->TLSOk()) {
+	} else if(protocol == SECURE_CLIENT_PROTOCOL && CryptoManager::getInstance()->TLSOk()) {
 		secure = true;
 	} else {
 		unknownProtocol(c.getFrom(), protocol, token);
@@ -486,7 +486,7 @@
 			if(c.getParam("PR", 1, tmp)) {
 				if(tmp == CLIENT_PROTOCOL) {
 					u->getUser()->setFlag(User::NO_ADC_1_0_PROTOCOL);
-				} else if(tmp == SECURE_CLIENT_PROTOCOL_TEST) {
+				} else if(tmp == SECURE_CLIENT_PROTOCOL) {
 					u->getUser()->setFlag(User::NO_ADCS_0_10_PROTOCOL);
 					u->getUser()->unsetFlag(User::TLS);
 				}
@@ -597,7 +597,7 @@
 	bool secure = false;
 	if(protocol == CLIENT_PROTOCOL) {
 		// Nothing special
-	} else if(protocol == SECURE_CLIENT_PROTOCOL_TEST && CryptoManager::getInstance()->TLSOk()) {
+	} else if(protocol == SECURE_CLIENT_PROTOCOL && CryptoManager::getInstance()->TLSOk()) {
 		secure = true;
 	} else {
 		unknownProtocol(c.getFrom(), protocol, token);
@@ -632,7 +632,7 @@
 	bool secure = false;
 	if(protocol == CLIENT_PROTOCOL) {
 		// Nothing special
-	} else if(protocol == SECURE_CLIENT_PROTOCOL_TEST && CryptoManager::getInstance()->TLSOk()) {
+	} else if(protocol == SECURE_CLIENT_PROTOCOL && CryptoManager::getInstance()->TLSOk()) {
 		secure = true;
 	} else {
 		unknownProtocol(c.getFrom(), protocol, token);
@@ -678,7 +678,7 @@
 			/// @todo log
 			return;
 		}
-		proto = &SECURE_CLIENT_PROTOCOL_TEST;
+		proto = &SECURE_CLIENT_PROTOCOL;
 	} else {
 		if(user.getUser()->isSet(User::NO_ADC_1_0_PROTOCOL) || SETTING(REQUIRE_TLS)) {
 			/// @todo log, consider removing from queue
--- a/dcpp/AdcHub.h	Mon Apr 15 17:31:07 2024 +0200
+++ b/dcpp/AdcHub.h	Sun May 05 09:58:50 2024 +0000
@@ -1,5 +1,5 @@
 /*
- * Copyright (C) 2001-2023 Jacek Sieka, arnetheduck on gmail point com
+ * Copyright (C) 2001-2024 Jacek Sieka, arnetheduck on gmail point com
  *
  * This program is free software; you can redistribute it and/or modify
  * it under the terms of the GNU General Public License as published by
@@ -56,7 +56,7 @@
 	static StringList parseSearchExts(int flag);
 
 	static const string CLIENT_PROTOCOL;
-	static const string SECURE_CLIENT_PROTOCOL_TEST;
+	static const string SECURE_CLIENT_PROTOCOL;
 	static const string ADCS_FEATURE;
 	static const string TCP4_FEATURE;
 	static const string TCP6_FEATURE;