diff options
author | Pierre Ossman <ossman@cendio.se> | 2014-09-17 16:45:35 +0200 |
---|---|---|
committer | Pierre Ossman <ossman@cendio.se> | 2014-09-17 16:49:39 +0200 |
commit | 3d2a84b9ea0c9428e8335b1a22d7e8263742cda0 (patch) | |
tree | 68e59b38cd257865773e1107a0e4a0a9817517c5 /common/rfb | |
parent | 906800b173da0a20f23ac0cf063bb0f69e612738 (diff) | |
download | tigervnc-3d2a84b9ea0c9428e8335b1a22d7e8263742cda0.tar.gz tigervnc-3d2a84b9ea0c9428e8335b1a22d7e8263742cda0.zip |
Correct naming convention for some parameters
Diffstat (limited to 'common/rfb')
-rw-r--r-- | common/rfb/CSecurityTLS.cxx | 12 | ||||
-rw-r--r-- | common/rfb/CSecurityTLS.h | 4 | ||||
-rw-r--r-- | common/rfb/SSecurityTLS.cxx | 4 | ||||
-rw-r--r-- | common/rfb/UnixPasswordValidator.cxx | 8 |
4 files changed, 15 insertions, 13 deletions
diff --git a/common/rfb/CSecurityTLS.cxx b/common/rfb/CSecurityTLS.cxx index a8abeeb0..30de37e5 100644 --- a/common/rfb/CSecurityTLS.cxx +++ b/common/rfb/CSecurityTLS.cxx @@ -63,8 +63,8 @@ using namespace rfb; -StringParameter CSecurityTLS::x509ca("x509ca", "X509 CA certificate", "", ConfViewer); -StringParameter CSecurityTLS::x509crl("x509crl", "X509 CRL file", "", ConfViewer); +StringParameter CSecurityTLS::X509CA("X509CA", "X509 CA certificate", "", ConfViewer); +StringParameter CSecurityTLS::X509CRL("X509CRL", "X509 CRL file", "", ConfViewer); static LogWriter vlog("TLS"); static LogWriter vlog_raw("RawTLS"); @@ -94,8 +94,8 @@ void CSecurityTLS::initGlobal() CSecurityTLS::CSecurityTLS(bool _anon) : session(0), anon_cred(0), anon(_anon), fis(0), fos(0) { - cafile = x509ca.getData(); - crlfile = x509crl.getData(); + cafile = X509CA.getData(); + crlfile = X509CRL.getData(); } void CSecurityTLS::setDefaults() @@ -115,9 +115,9 @@ void CSecurityTLS::setDefaults() delete [] homeDir; if (!fileexists(caDefault.buf)) - x509ca.setDefaultStr(strdup(caDefault.buf)); + X509CA.setDefaultStr(strdup(caDefault.buf)); if (!fileexists(crlDefault.buf)) - x509crl.setDefaultStr(strdup(crlDefault.buf)); + X509CRL.setDefaultStr(strdup(crlDefault.buf)); } void CSecurityTLS::shutdown(bool needbye) diff --git a/common/rfb/CSecurityTLS.h b/common/rfb/CSecurityTLS.h index c19307e7..f5f10e47 100644 --- a/common/rfb/CSecurityTLS.h +++ b/common/rfb/CSecurityTLS.h @@ -50,8 +50,8 @@ namespace rfb { { return anon ? "TLS Encryption without VncAuth" : "X509 Encryption without VncAuth"; } static void setDefaults(); - static StringParameter x509ca; - static StringParameter x509crl; + static StringParameter X509CA; + static StringParameter X509CRL; static UserMsgBox *msg; protected: diff --git a/common/rfb/SSecurityTLS.cxx b/common/rfb/SSecurityTLS.cxx index 7a1a41ef..a40ec138 100644 --- a/common/rfb/SSecurityTLS.cxx +++ b/common/rfb/SSecurityTLS.cxx @@ -39,10 +39,10 @@ using namespace rfb; StringParameter SSecurityTLS::X509_CertFile -("x509cert", "specifies path to the x509 certificate in PEM format", "", ConfServer); +("X509Cert", "Path to the X509 certificate in PEM format", "", ConfServer); StringParameter SSecurityTLS::X509_KeyFile -("x509key", "specifies path to the key of the x509 certificate in PEM format", "", ConfServer); +("X509Key", "Path to the key of the X509 certificate in PEM format", "", ConfServer); static LogWriter vlog("TLS"); static LogWriter vlog_raw("RawTLS"); diff --git a/common/rfb/UnixPasswordValidator.cxx b/common/rfb/UnixPasswordValidator.cxx index 5a3996dd..d0960794 100644 --- a/common/rfb/UnixPasswordValidator.cxx +++ b/common/rfb/UnixPasswordValidator.cxx @@ -31,8 +31,10 @@ using namespace rfb; -static StringParameter pam_service - ("pam_service", "service name for pam password validation", "vnc"); +static StringParameter pamService + ("PAMService", "Service name for PAM password validation", "vnc"); +AliasParameter pam_service("pam_service", "Alias for PAMService", + &pamService); int do_pam_auth(const char *service, const char *username, const char *password); @@ -42,7 +44,7 @@ bool UnixPasswordValidator::validateInternal(SConnection * sc, const char *password) { #ifdef HAVE_PAM - CharArray service(strDup(pam_service.getData())); + CharArray service(strDup(pamService.getData())); return do_pam_auth(service.buf, username, password); #else throw AuthFailureException("PAM not supported"); |