/***************************************************************************
 *   Copyright (C) 2004 by Christoph Thielecke                             *
 *   crissi99@gmx.de                                                       *
 *                                                                         *
 *   This program is free software; you can redistribute it and/or modify  *
 *   it under the terms of the GNU General Public License as published by  *
 *   the Free Software Foundation; either version 2 of the License, or     *
 *   (at your option) any later version.                                   *
 *                                                                         *
 *   This program is distributed in the hope that it will be useful,       *
 *   but WITHOUT ANY WARRANTY; without even the implied warranty of        *
 *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the         *
 *   GNU General Public License for more details.                          *
 *                                                                         *
 *   You should have received a copy of the GNU General Public License     *
 *   along with this program; if not, write to the                         *
 *   Free Software Foundation, Inc.,                                       *
 *   59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.             *
 ***************************************************************************/

//BEGIN INCLUDES
#include "kvpncconfig.h"
#include "utils.h"
#include "kvpncimportprofileselectiondialog.h"
#include <kstandarddirs.h>
#include <kmessagebox.h>
#include <klistview.h>
#include <klocale.h>
#include <iostream>
#include <kstandarddirs.h>
#include <tqdom.h>
#include <tqdir.h>
#include <tqlistview.h>
#include <tqcheckbox.h>
#include <tqcursor.h>
#include <tqregexp.h>
#include <kpushbutton.h>
#include <klistview.h>
#include <kurl.h>
#include <kinputdialog.h>
#include <klineedit.h>
//END INCLUDES

KVpncConfig::KVpncConfig(TQWidget *parent,KStatusBar *statusbar)
{
	this->parent = parent;
	this->statusbar = statusbar;

	pathToVpnc = "";
	pathToCiscoVpnc = "";
	pathToRacoon = "";
	pathToRacoonctl = "";
	pathToSetkey = "";
	pathToIpsec = "";
	pathToPppd="";
	pathToPptp="";
	pathToL2tpd="";
	pathToXl2tpd="";
	pathToSsh="/usr/bin/ssh";
	pathToKill="";
	pathToKillall="";
	pathToPing="";
	pathToOpenvpn="";
	pathToIp="/sbin/ip";
	pathToIfconfig="/sbin/ifconfig";
	pathToRoute="/sbin/route";
	pathToNetstat="/bin/netstat";
	pathToL2tpd="/usr/sbin/l2tpd";
	pathToPkcs11Tool="/usr/bin/pkcs11-tool";
	pathToVtund="/usr/sbin/vtund";
	pathToCiscoCertMgr="/usr/local/bin/cisco_cert_mgr";
	pathToTail="/usr/bin/tail";
	pathToSsh="/usr/bin/ssh";
	pathToKsshAskpass="/usr/bin/ksshaskpass";
	pathToGnomeSshAskpass="/usr/lib/openssh/gnome-ssh-askpass";
	AutoConnectProfile="";
	Vpnc_pid_file = "";
	Pppd_pid_file = "";
	lastProfile = "";
	logfileName = "";
	InterpreterShell="/bin/bash";

	TmpPassword="";
	TmpGroupPassword="";
	TmpUsername="";
	TmpPrivKeyPassStr="";
	TmpGatewayIP="";
	TmpXauthInterPasscode="";
	TmpPrivateKeyPass="";
	TmpHttpProxyPassword="";
	DnsDevice = "";

	OldDefaultGw="";
	OldDefaultDev="";

	connectSleepDelay = 15;
	connectSleepRetry = 0;
	tryConnectTimeout = 10;
	runningCheckCounter = 0;
	runningCheckTimeout = 60;
	mainwindow_pos_x=0;
	mainwindow_pos_y=0;
	mainwindow_height=200;
	mainwindow_width=400;
	AuthRetryCount=0;
	PppdKernelLogLevel=0;
	maxConnectRetry=3;
	currentConnectRetry=0;

	OpenvpnManagementPort=2222;

	minimizeAfterConnect = true;
	//showDebugConsole = false;
	useDefaultPaths = false;
	writeLogFile = true;
	useSilentQuit = false;
	holdGeneratedScripts = true;
	enableDebugPppd=false;
	enableDebugPptpd=false;
	enableDebugL2tpd=false;
	enableDebugXl2tpd=false;
	enableDebugXl2tpdNetwork=false;
	enableDebugXl2tpdpacket=false;
	enableDebugXl2tpdstate=false;
	enableDebugXl2tpdtunnel=false;
	enableDebugOpenvpn=false;
	useColorizedLogOutput=true;
	showInterfaceIPinTooltip=true;
	dontQuitOnCloseEvent=true;
	PppdDebugLevel = false;
	doAutoConnectAtStartup=false;
	useKwallet=true;
	showStatusBar=true;
	showToolBar=true;
	firstUseOfKwallet=true;
	shutdownIsCalled=false;
	skipKwalletStoring = false;
	hideOnCloseInfo = false;
	enableFreeswanVerbose=false;
	doKillL2tpdIfStillRunning=true;
	doKillRacoonIfStillRunning=true;
	hideMainWindow=false;
	showInterfaceIPinTooltip = true;
	showConnectionTimeInTooltip = true;
	OpenvpnNeedSecurityParameter = false;
	haveUserData=false;
	prefDlgOpen=false;

	VpncDebugLevel = 0;
	RacoonDebugLevel = "info";
	KvpncDebugLevel = 0;
	OpenvpnDebugLevel =0;
	LogViewerFontSize=0; // can be from -3 up to +3

	DebugBackgroundcolor=black;

	ToolList = new TQPtrList<ToolInfo>();
	ToolList->setAutoDelete( TRUE );

	AccountList = new TQPtrList<VpnAccountData>();
	AccountList->setAutoDelete( TRUE ); // the list owns the objects

	InfoLogColor=TQt::black;
	ErrorLogColor=TQt::red;
	SuccessLogColor=TQt::darkGreen;
	DebugLogColor=TQt::yellow;

	KStandardDirs *dirs = KGlobal::dirs();
	logfileName = TQString(dirs->saveLocation( "data" ));
	TQString logfilePath = TQString(logfileName + "/kvpnc/kvpnc.log");
	logfile.setName( logfilePath );
	logFileStream.setDevice( &logfile );

	currentProfile=0L;
}

KVpncConfig::~KVpncConfig()
{
	delete AccountList;
	delete ToolList;
}

void KVpncConfig::setLogOutput(TQTextEdit *LogOutput)
{
	this->LogOutput = LogOutput;
}

void KVpncConfig::appendLogEntry( TQString msg, LogType type )
{

	// write to logfile
	if ( writeLogFile )
	{
		if ( !logfile.isOpen() )
		{
			KStandardDirs * dirs = KGlobal::dirs();
			TQString logfileName = dirs->saveLocation( "data" );
			logfileName += "/kvpnc/kvpnc.log"; // /root.kde/share/apps/kvpnc.log
			//    KMessageBox::information( this, logfileName, "info" );
			logfile.setName( logfileName );
			if ( !logfile.open( IO_WriteOnly | IO_Append ) )
				KMessageBox::error( 0, i18n( "Log file can not be opened!" ) );
			else
			{
				//				TQTextStream s( &logfile );
				logFileStream << i18n( "Log session started at: " );
				logFileStream << TQDateTime::currentDateTime().toString( Qt::TextDate );
				logFileStream << "\n";
				logfile.flush();
			}
		}
		else
		{
			TQString date = TQDate().currentDate().toString(Qt::ISODate)+ " ";
			TQString time = TQTime().currentTime().toString(Qt::ISODate)+ " ";
			TQString prefix="";
			switch ( type )
			{
					case info:
					prefix=i18n("info")+": ";
					break;
					case remote:
					prefix=i18n("remote")+": ";
					break;
					case error:
					prefix=i18n("error")+": ";
					break;
					case success:
					prefix=i18n("success")+": ";
					break;
					case debug:
					prefix=i18n("debug")+": ";
					break;
			}
// 			appPointer->processEvents();
			logFileStream << date << time << prefix << msg << "\n";
			logfile.flush();
// 			appPointer->processEvents();
		}

	}
	// write into debug console
	TQString prefix="";
	TQString postfix="";

	// font size
	prefix+="<font size=\""+TQString().setNum(LogViewerFontSize)+"\">";
	postfix+="<\\font>";

	if (useColorizedLogOutput)
		prefix+="<font color=\"";

	switch ( type )
	{
			case info:
			if (useColorizedLogOutput)
			{
				prefix+=InfoLogColor.name();
				prefix+="\">";
			}
			prefix+=i18n("info")+": ";
			break;
			case remote:
			if (useColorizedLogOutput)
			{
				prefix+=RemoteLogColor.name();
				prefix+="\">";
			}
			prefix+=i18n("remote")+": ";

			break;
			case error:
			if (useColorizedLogOutput)
			{
				prefix+=ErrorLogColor.name();
				prefix+="\">";
			}
			prefix+=i18n("error")+": ";

			break;
			case success:
			if (useColorizedLogOutput)
			{
				prefix+=SuccessLogColor.name();
				prefix+="\">";
			}
			prefix+=i18n("success")+": ";
			break;
			case debug:
			if (useColorizedLogOutput)
			{
				prefix+=DebugLogColor.name();
				prefix+="\">";
			}
			prefix+=i18n("debug")+": ";
			break;
	}

	if (useColorizedLogOutput)
		postfix+="</font>";

	LogOutput->append( prefix+msg+postfix );
// 	if (appPointer->hasPendingEvents ())
// 		appPointer->processEvents();
}

void KVpncConfig::slotStatusMsg( const TQString &text, int id )
{
	if ( id != ID_FLASH_MSG )
	{
		statusbar ->clear();
		statusbar ->changeItem( text, id );
	}
	else
	{
		statusbar->message( text, 2000 );
	}

}

void KVpncConfig::saveOptions(bool saveOneProfile, TQString Profile)
{
	if (saveOneProfile && Profile.isEmpty())
		return;
	KStandardDirs * dirs = KGlobal::dirs();
	TQString filePath = dirs->findResource ( "config", "kvpncrc" );
	TQFile::remove
		( filePath );

	config->setGroup( "Notification Messages" );
	config->writeEntry( "hideOnCloseInfo" ,hideOnCloseInfo);

	if (!saveOneProfile)
	{

		config->setGroup( "General Options" );
		
		checkStandardPathValues();
		
		config->writeEntry( "Minimize after connect", minimizeAfterConnect );
		config->writeEntry("Hide on startup", hideMainWindow );
		config->writeEntry( "Use silent quit", useSilentQuit );
		config->writeEntry( "Dont quit on CloseEvent", dontQuitOnCloseEvent );
		config->writeEntry( "Enable pppd debug", enableDebugPppd );
		config->writeEntry( "Enable pptpd debug", enableDebugPptpd );
		config->writeEntry( "Enable l2tpd debug", enableDebugL2tpd );
		config->writeEntry( "Enable xl2tpd debug", enableDebugXl2tpd );
		config->writeEntry( "Enable openl2tp debug", enableDebugOpenl2tp );
		config->writeEntry( "Enable FreeSWAN verbose", enableFreeswanVerbose );
		config->writeEntry( "Pluto Debug", PlutoDebug.join(" "));
		config->writeEntry( "Klips Debug", KlipsDebug.join(" "));
		config->writeEntry( "Show debugconsole", showDebugConsole );
		config->writeEntry( "Pid file for vpnc ", Vpnc_pid_file );
		config->writeEntry( "Vpnc debuglevel", VpncDebugLevel );
		config->writeEntry( "Racoon debuglevel", RacoonDebugLevel );
		config->writeEntry( "Kvpnc debuglevel", KvpncDebugLevel );
		config->writeEntry( "Pppd debuglevel", PppdDebugLevel );
		config->writeEntry( "Openvpn debuglevel", OpenvpnDebugLevel );
		config->writeEntry( "Pptp debuglevel", PptpLogLevel );
		config->writeEntry( "Ssh debuglevel", SshDebugLevel );
		config->writeEntry( "Pppd kernel log level", PppdKernelLogLevel );
		config->writeEntry( "Path to vpnc-bin", pathToVpnc );
		config->writeEntry( "Path to vpnclient", pathToCiscoVpnc );
		config->writeEntry( "Path to racoon", pathToRacoon );
		config->writeEntry( "Path to racoonctl", pathToRacoonctl );
		config->writeEntry( "Path to setkey", pathToSetkey );
		config->writeEntry( "Path to iptables", pathToIptables );
		config->writeEntry( "Path to openssl", pathToOpenssl );
		config->writeEntry( "Path to freeswan", pathToIpsec );
		config->writeEntry( "Path to pppd", pathToPppd );
		config->writeEntry( "Path to pptp", pathToPptp );
		config->writeEntry( "Path to l2tpd", pathToL2tpd );
		config->writeEntry( "Path to xl2tpd", pathToXl2tpd );
		config->writeEntry( "Path to openl2tp", pathToOpenl2tp );
		config->writeEntry( "Path to kill", pathToKill );
		config->writeEntry( "Path to kill-all", pathToKillall );
		config->writeEntry( "Path to ping", pathToPing );
		config->writeEntry( "Path to openvpn", pathToOpenvpn );
		config->writeEntry( "Path to iputility", pathToIp );
		config->writeEntry( "Path to ifconfig", pathToIfconfig );
		config->writeEntry( "Path to route", pathToRoute );
		config->writeEntry( "Path to netstat", pathToNetstat );
		config->writeEntry( "Path to pkcs11-tool", pathToPkcs11Tool );
		config->writeEntry( "Path to vtund", pathToVtund );
		config->writeEntry( "Path to cisco_cert_mgr",pathToCiscoCertMgr);
		config->writeEntry( "Path to tail",pathToTail);
		config->writeEntry( "Path to ssh",pathToSsh);
		config->writeEntry( "Path to ksshaskpass",pathToKsshAskpass);
		config->writeEntry( "Path to ssh-askpass-gnome",pathToGnomeSshAskpass);
		config->writeEntry( "Show Statusbar", showStatusBar );
		config->writeEntry( "Try connect timeout", tryConnectTimeout );
		config->writeEntry( "Last Profile", lastProfile );
		config->writeEntry( "Write log file", writeLogFile );
		config->writeEntry( "Hold generated scripts", holdGeneratedScripts );
		config->writeEntry( "Programs in path", programsInPath );
		config->writeEntry( "Info logwindow color", InfoLogColor );
		config->writeEntry( "Remote logwindow color", RemoteLogColor );
		config->writeEntry( "Error logwindow color", ErrorLogColor );
		config->writeEntry( "Success  logwindow color", SuccessLogColor );
		config->writeEntry( "Debug logwindow color", DebugLogColor );
		config->writeEntry("Debug background color", DebugBackgroundcolor );
		config->writeEntry( "Use colorized log output", useColorizedLogOutput );
		config->writeEntry( "Show interface IP in tooltip", showInterfaceIPinTooltip );
		config->writeEntry( "Auto connect profile", AutoConnectProfile );
		config->writeEntry( "Do auto connect at startup", doAutoConnectAtStartup );
		config->writeEntry( "Log viewer font size", LogViewerFontSize );
		config->writeEntry( "Mainwindow width", parent->width() );
		config->writeEntry( "Mainwindow height", parent->height() );
		config->writeEntry( "Mainwindow position x", parent->x() );
		config->writeEntry( "Mainwindow position y", parent->y() );
		config->writeEntry("Openvpn management port", OpenvpnManagementPort );
		//config->writeEntry( "ToolBar Settings" ,parent->toolBar( "mainToolBar" ));
		config->writeEntry("Use KWallet",useKwallet);
		config->writeEntry("FeedbackMailSent",feedbackMailSent);
		config->writeEntry("Do kill l2tpd if still running",doKillL2tpdIfStillRunning);
		config->writeEntry("Do kill racoon if still running",doKillRacoonIfStillRunning);
		config->writeEntry("Do kill xl2tpd if still running",doKillXl2tpdIfStillRunning);
		config->writeEntry("Show connection time in Tooltip",showConnectionTimeInTooltip);
		config->writeEntry("Enable debug Openvpn",enableDebugOpenvpn);

		config->writeEntry("EnableDebugXl2tpdNetwork",enableDebugXl2tpdNetwork);
		config->writeEntry("EnableDebugXl2tpdpacket",enableDebugXl2tpdpacket);
		config->writeEntry("EnableDebugXl2tpdstate",enableDebugXl2tpdstate);
		config->writeEntry("EnableDebugXl2tpdtunnel",enableDebugXl2tpdtunnel);

		//appPointer->processEvents();
	}

	if (useKwallet && KWallet::Wallet::isEnabled())
		config->writeEntry( "First use of Kwallet", false );
	/* = user data = */
	VpnAccountData *it;
	if ( !AccountList->isEmpty() )
	{
		/* passwords with kwallet */
		if ( useKwallet && KWallet::Wallet::isEnabled())
		{
			if (!skipKwalletStoring )
			{
				if (KvpncDebugLevel > 2)
					appendLogEntry(i18n( "Wallet enabled and available, writing to wallet." ),debug);
				// Open local wallet
				wallet = KWallet::Wallet::openWallet(KWallet::Wallet::LocalWallet());
				//appPointer->processEvents();
				if (wallet != 0)
				{
				}
			}
		}
		else
		{
			if (KvpncDebugLevel > 2)
				appendLogEntry(i18n( "Wallet disabled or not available, writing to config file." ),debug);
		}

		TQPtrList<VpnAccountData> *TmpAccountList;

		if (!saveOneProfile)
			TmpAccountList = AccountList;
		else
		{
			TmpAccountList = new TQPtrList<VpnAccountData>();
			TmpAccountList->setAutoDelete( TRUE ); // the list owns the objects
			VpnAccountData *ProfileData;

			for ( ProfileData = AccountList->first(); it; it = AccountList->next() )
			{
				if ( ProfileData->getName() == Profile )
				{
					TmpAccountList->append(ProfileData);
					break;
				}
			}
		}

		for ( it = TmpAccountList->first(); it; it = TmpAccountList->next() )
		{
// 			appPointer->processEvents();
// 			std::cout << "Save profile: " << it->getName().ascii() << std::endl;

			if ( !it->getName().isEmpty() )
			{
				TQString name = it->getName();
				TQString ProfileName = "Profile_";
				ProfileName += name;
				config->setGroup( ProfileName );

				config->writeEntry("Description",it->getDescription());

				/* passwords with kwallet */
				if ( useKwallet && KWallet::Wallet::isEnabled())
				{
					if (!skipKwalletStoring )
					{
						if (KvpncDebugLevel > 2)
							appendLogEntry(i18n( "Wallet enabled and available, writing to wallet." ),debug);
						if (wallet != 0)
						{
							TQString walletname="kvpnc";
							// Check if folder exists, otherwise create it
							bool walletOK=true;
							if (!wallet->hasFolder(walletname))
							{
								walletOK = wallet->createFolder(walletname);
// 								wallet->sync();
// 								appPointer->processEvents();
							}
							if (walletOK)
							{
								wallet->setFolder(walletname);
// 								appPointer->processEvents();
								//std::cout << "[set] account: " << ProfileName << ", loginname: " << loginname << ", password: " << pwd << std::endl;
								bool UserPasswordOK=true;
								if ( it->getSaveUserPassword() )
									UserPasswordOK = (wallet->writePassword (TQString(name+"__user_pw"), it->getUserPassword()) == 0);
								else
									UserPasswordOK = (wallet->writePassword (TQString(name+"__user_pw"), "") == 0);
// 								wallet->sync();
// 								appPointer->processEvents();

								bool PskOK=true;
								if ( it->getSavePsk() )
									PskOK = (wallet->writePassword (TQString(name+"__psk"), it->getPreSharedKey()) == 0);
								else
									PskOK = (wallet->writePassword (TQString(name+"__psk"), "") == 0);
// 								wallet->sync();

// 								appPointer->processEvents();

								bool PskKeyPassOK = (wallet->writePassword (TQString(name+"__priv_key_pwd"), it->getPrivateKeyPass()) == 0);
// // 								wallet->sync();

// 								appPointer->processEvents();

								if (KvpncDebugLevel > 2)
								{
									if (UserPasswordOK)
										if (KvpncDebugLevel > 2)
											appendLogEntry(i18n( "write of %1 was ok." ).arg(i18n("user password")), debug);
									else
									{
										// 									if ( KMessageBox::warningContinueCancel( 0,
										// 									        i18n( "KVpnc is unable to save %1 password securely in your wallet.<br>"
										// 									              "Do you want to save the password in the <b>unsafe</b> configuration file instead?" ).arg(i18n("user password")),
										// 									        i18n( "Unable to store secure %1" ).arg(i18n("user password")),
										// 									        KGuiItem( i18n( "Store &Unsafe" ), TQString::fromLatin1( "unlock" ),TQString::fromLatin1( "KWalletFallbackToKConfig" ) ) ) == KMessageBox::Continue )
										// 									{
										// 										config->writeEntry( "User password", it->getUserPassword() );
										// 									}

										appendLogEntry(i18n( "write of %1 has failed." ).arg(i18n("user password")), error);
									}

									if (PskOK)
										if (KvpncDebugLevel > 2)
											appendLogEntry(i18n( "write of %1 was successful." ).arg(i18n("preshared key")), debug);
									else
									{
										// 									if ( KMessageBox::warningContinueCancel( 0,
										// 									        i18n( "KVpnc is unable to save %1 password securely in your wallet.<br>"
										// 									              "Do you want to save the password in the <b>unsafe</b> configuration file instead?" ).arg(i18n("pre shared key")),
										// 									        i18n( "Unable to store secure %1" ).arg(i18n("pre shared key")),
										// 									        KGuiItem( i18n( "Store &Unsafe" ), TQString::fromLatin1( "unlock" ),TQString::fromLatin1( "KWalletFallbackToKConfig" ) ) ) == KMessageBox::Continue )
										// 									{
										// 										config->writeEntry( "Pre shared key", it->getPreSharedKey() );
										// 									}
										appendLogEntry(i18n( "write of %1 has failed." ).arg(i18n("preshared key")),error);
									}

									if (PskOK)
										if (KvpncDebugLevel > 2)
											appendLogEntry(i18n( "write of %1 was successful." ).arg(i18n("preshared key")), debug);
									else
									{
										// 									if ( KMessageBox::warningContinueCancel( 0,
										// 									        i18n( "KVpnc is unable to save %1 password securely in your wallet.<br>"
										// 									              "Do you want to save the password in the <b>unsafe</b> configuration file instead?" ).arg(i18n("preshared key password")),
										// 									        i18n( "Unable to store secure %1" ).arg(i18n("reshared key password")),
										// 									        KGuiItem( i18n( "Store &Unsafe" ), TQString::fromLatin1( "unlock" ),TQString::fromLatin1( "KWalletFallbackToKConfig" ) ) ) == KMessageBox::Continue )
										// 									{
										// 										config->writeEntry( "Pre shared key", it->getPreSharedKey() );
										// 									}
										appendLogEntry(i18n( "write of %1 has failed." ).arg(i18n("preshared key")),error);
									}
									if (PskKeyPassOK)
										if (KvpncDebugLevel > 2)
											appendLogEntry(i18n( "write of %1 was successful." ).arg(i18n("preshared key password")), debug);
									else
									{
										// 									if ( KMessageBox::warningContinueCancel( 0,
										// 									        i18n( "KVpnc is unable to save %1 password securely in your wallet.<br>"
										// 									              "Do you want to save the password in the <b>unsafe</b> configuration file instead?" ).arg(i18n("preshared key password")),
										// 									        i18n( "Unable to store secure %1" ).arg(i18n("reshared key password")),
										// 									        KGuiItem( i18n( "Store &Unsafe" ), TQString::fromLatin1( "unlock" ),TQString::fromLatin1( "KWalletFallbackToKConfig" ) ) ) == KMessageBox::Continue )
										// 									{
										// 										config->writeEntry( "Pre shared key", it->getPreSharedKey() );
										// 									}
										appendLogEntry(i18n( "write of %1 has failed." ).arg(i18n("preshared key password")),error);
									}
									//std::cout << "success: " << pwdOK << std::endl;
								}
// 								appPointer->processEvents();
// 								wallet->sync();
							}
							else
							{
								KMessageBox::error( 0, i18n( "Unable to create wallet folder for kvpnc!" ) );
								appendLogEntry(i18n( "Unable to create wallet folder for kvpnc!" ), error);
							}
						}
					}
					else //sessionSaving neither writing to wallet nor to config-file
					{
					if (KvpncDebugLevel > 2)
							appendLogEntry(i18n( "Writing into Wallet is not possible at shutdown, skipping." ),debug);
					}
				}
				else
				{
					//Wallet not available
					//if (!useKwallet)
					{
						if (KvpncDebugLevel > 2)
							appendLogEntry(i18n( "Wallet disabled or not available, writing to config file." ),debug);
						// write passwords to config file :|
						if ( it->getSaveUserPassword() )
						{
							config->writeEntry( "User password", it->getUserPassword() );
						}
						if ( it->getSavePsk() )
						{
							config->writeEntry( "Pre shared key", it->getPreSharedKey() );
						}
						config->writeEntry( "PrivateKey password", it->getPrivateKeyPass() );
					}
				}

// 				appPointer->processEvents();

// 				KMessageBox::information(0,"connection type changed: "+TQString().setNum(it->getConnectionType())+TQString(" ")+it->getName(),TQString("type set"));

				// normal config
				if ( it->getConnectionType() == VpnAccountData::cisco )
					config->writeEntry( "Connection type", "cisco" );
				else if ( it->getConnectionType() == VpnAccountData::ciscoorig )
					config->writeEntry( "Connection type", "ciscoorig" );
				else if ( it->getConnectionType() == VpnAccountData::racoon )
					config->writeEntry( "Connection type", "racoon" );
				else if ( it->getConnectionType() == VpnAccountData::l2tpd_racoon )
					config->writeEntry( "Connection type", "l2tpd (racoon)" );
				else if ( it->getConnectionType() == VpnAccountData::freeswan )
					config->writeEntry( "Connection type", "freeswan" );
				else if ( it->getConnectionType() == VpnAccountData::l2tpd_freeswan )
					config->writeEntry( "Connection type", "l2tpd (openswan)" );
				else if ( it->getConnectionType() == VpnAccountData::pptp )
					config->writeEntry( "Connection type", "pptp" );
				else if ( it->getConnectionType() == VpnAccountData::openvpn )
					config->writeEntry( "Connection type", "openvpn" );
				else if ( it->getConnectionType() == VpnAccountData::vtun )
					config->writeEntry( "Connection type", "vtun" );
				else if ( it->getConnectionType() == VpnAccountData::ssh )
					config->writeEntry( "Connection type", "ssh" );
				else
					config->writeEntry( "Connection type", "other" );
				config->writeEntry( "VPN Gateway", it->getGateway() );
				config->writeEntry( "VPN ID", it->getID() );
				config->writeEntry( "Username", it->getUserName() );

				config->writeEntry( "Save user password", it->getSaveUserPassword() );
				config->writeEntry( "Save PSK", it->getSavePsk() );
				config->writeEntry( "Save private key password", it->getSavePrivateKeyPassword() );
				config->writeEntry( "Private key", it->getPrivateKey() );
				config->writeEntry( "Use advanced settings", it->getUseAdvancedSettings() );
				config->writeEntry( "Application version", it->getApplicationVersion() );
				config->writeEntry( "Local port", it->getLocalPort() );
				config->writeEntry( "Remote port", it->getRemotePort() );
				config->writeEntry( "NT domain name", it->getNtDomainName() );
				config->writeEntry( "Perfect forward secrety", it->getPerfectForwardSecrety() );
				config->writeEntry( "IKE group", it->getIkeGroup() );
				
				config->writeEntry( "Use application version", it->getUseApplicationVersion() );
				config->writeEntry( "Use global IPSec secret", it->getUseGlobalIpsecSecret() );
				config->writeEntry( "Use IKE group", it->getUseIkeGroup() );
				config->writeEntry( "Use local port", it->getUseLocalPort() );
				config->writeEntry( "Use remote port", it->getUseRemotePort() );
				config->writeEntry( "Use NT domain name", it->getUseNtDomainName() );
				config->writeEntry( "Use single DES", it->getUseSingleDes() );
				config->writeEntry( "Use perfect Forward Secrety", it->getUsePerfectForwardSecrety() );
				config->writeEntry( "Remote net address", it->getRemoteNetAddr() );
				config->writeEntry( "Remote net mask", it->getRemoteNetMask() );

				config->writeEntry( "x509 certificate", it->getX509Certificate() );
				config->writeEntry( "Ca certificate", it->getCaCertificate() );
				config->writeEntry( "Network device", it->getNetworkDevice() );
				config->writeEntry( "Cert path", it->getCertPath() );

// 				// fix bad type
// 				if ((it->getConnectionType() == VpnAccountData::pptp || it->getConnectionType() == VpnAccountData::openvpn || it->getConnectionType() == VpnAccountData::racoon || it->getConnectionType() == VpnAccountData::l2tpd_racoon || it->getConnectionType() == VpnAccountData::freeswan || it->getConnectionType() == VpnAccountData::l2tpd_freeswan || it->getConnectionType() == VpnAccountData::vtun) && ( it->getAuthType() != "cert" || it->getAuthType() != "psk"))
// 				{
// 					it->setAuthType( VpnAccountData::cert);
// 				}

				if ( it->getAuthType() == VpnAccountData::cert )
					config->writeEntry( "Auth type", "cert" );
				else if ( it->getAuthType() == VpnAccountData::psk )
					config->writeEntry( "Auth type", "psk" );
				else if ( it->getAuthType() == VpnAccountData::hybrid )
					config->writeEntry( "Auth type", "hybrid" );
				else
					config->writeEntry( "Auth type", "unknownauth" );

				config->writeEntry( "do ping ip", it->getDoPingIP() );
				config->writeEntry( "Ping host IP", it->getPingHostIP() );

// 				appPointer->processEvents();

				config->writeEntry( "Use special remote ID", it->getUseSpecialRemoteID() );
				config->writeEntry( "Use special local ID", it->getUseSpecialLocalID() );
				config->writeEntry( "Special server certificate", it->getSpecialServerCertificate() );
				config->writeEntry( "Use special server certificate", it->getUseSpecialServerCertificate() );
				config->writeEntry( "Special remote ID", it->getSpecialRemoteID() );
				config->writeEntry( "Special local ID", it->getSpecialLocalID() );
				config->writeEntry( "Local ID type", it->getLocalIDType() );
				config->writeEntry( "Remote ID type", it->getRemoteIDType() );
				config->writeEntry( "Use UDP-protocol", it->getUseUdp() );
				config->writeEntry( "Use UDP-port", it->getUseUdpPort() );
				config->writeEntry( "local UDP port", it->getUdpPort() );
				config->writeEntry( "use DNS_UPDATE", it->getUseDnsUpdate() );
				config->writeEntry( "use DNS-server", it->getUseDnsServer() );
				config->writeEntry( "DNS server", it->getDnsServer() );
				config->writeEntry( "refuse 40 bit encryption", it->getRefuse40BitEncryption() );
				config->writeEntry( "refuse 128 bit encryption", it->getRefuse128BitEncryption() );
				config->writeEntry( "require stateless encryption", it->getAllowStatefulMode() );
				config->writeEntry( "require mppe", it->getRequireMppe() );
				config->writeEntry( "Disable MPPE compression", it->getDisableMPPEComp() );
				config->writeEntry( "Local virtual IP", it->getLocalVirtualIP() );
				config->writeEntry( "Remote virtual IP", it->getRemoteVirtualIP() );
				config->writeEntry( "Pre shared key file", it->getPreSharedKeyFile() );
				config->writeEntry( "Execute command before connect", it->getExecuteCmdBeforeConnect() );
				config->writeEntry( "Execute command after connect", it->getExecuteCmdAfterConnect() );
				config->writeEntry( "Execute command before disconnect", it->getExecuteCmdBeforeDisconnect() );
				config->writeEntry( "Execute command after disconnect", it->getExecuteCmdAfterDisconnect() );
				config->writeEntry( "Command before connect", it->getCommandBeforeConnect() );
				config->writeEntry( "Command after connect", it->getCommandAfterConnect() );
				config->writeEntry( "Command before disconnect", it->getCommandBeforeDisconnect() );
				config->writeEntry( "Command after disconnect", it->getCommandAfterDisconnect() );
				config->writeEntry( "Use no BSD compression", it->getUseNoBsdComp() );
				config->writeEntry( "Do not use no IP by default", it->getUseNoIpDefault());
				config->writeEntry( "Use no deflate", it->getUseNoDeflate() );
				config->writeEntry( "Replace default route", it->getReplaceDefaultRoute() );
				config->writeEntry( "Use own MTU", it->getUseMtu() );
				config->writeEntry( "Use own MRU", it->getUseMru() );
				config->writeEntry( "MTU for pppd", it->getMtu() );
				config->writeEntry( "MRU for pppd", it->getMru() );
				config->writeEntry( "Use virtual IP", it->getUseVirtualIP() );
				config->writeEntry( "Virtual IP", it->getVirtualIP() );
				config->writeEntry( "PSK is in file", it->getPskIsInFile() );
				config->writeEntry( "Use additional network routes", it->getUseAdditionalNetworkRoutes() );
				config->writeEntry( "Hash algorithm", it->getHashAlgo() );
				config->writeEntry( "Encryption algorithm", it->getEncryptionAlgorithm() );
				config->writeEntry( "Authentication algorithm", it->getAuthenticationAlgorithm() );
				config->writeEntry( "Tunnel device type", it->getTunnelDeviceType() );
				config->writeEntry( "Use userdefined port", it->getUseUserdefinedPort() );
				config->writeEntry( "Userdefined port", it->getUserdefinedPort() );
				config->writeEntry( "NS cert type", it->getNsCertType() );
				config->writeEntry( "Use NS cert type", it->getUseNsCertType() );
				config->writeEntry( "Use connection status check", it->getUseConnectionStatusCheck() );
				config->writeEntry( "Connection check success count", it->getConnectionStatusCheckSuccessCount() );
				config->writeEntry( "Connection check status interval", it->getConnectionStatusInterval() );
				config->writeEntry( "Do reconnect after connection lost", it->getDoReconnectAfterConnectionLost());
				config->writeEntry( "Disable LZO compression", it->getDisableLzoCompression());
				config->writeEntry( "AuthWithUsernameAndPassword", it->getAuthWithUsernameAndPassword() );
				config->writeEntry( "AllowEmptyGroupPassword", it->getAllowEmptyGroupPassword() );
				config->writeEntry( "Use userdefinied cipher", it->getUseUserdefiniedCipher() );
				config->writeEntry( "Userdefinied cipher", it->getUserdefiniedCipher() );
				config->writeEntry( "Use redirect gateway", it->getUseRedirectGateway() );
// 				appPointer->processEvents();
				config->writeEntry( "Use TLS auth", it->getUseTlsAuth() );
				config->writeEntry( "TLS auth file", it->getTlsAuthFile() );
				config->writeEntry( "Use HTTP proxy", it->getUseHttpProxy() );
				config->writeEntry( "HTTP proxy host", it->getHttpProxy() );
				config->writeEntry( "HTTP proxy port", it->getHttpProxyPort() );
				config->writeEntry( "HTTP proxy timeout", it->getHttpProxyTimeout() );
				config->writeEntry( "Dont save username", it->getDontSaveUsername() );
				config->writeEntry( "Use mode config", it->getUseModeConfig() );
				config->writeEntry( "Exchange mode", it->getExchangeMode() );
				config->writeEntry( "Use delay at reconnect", it->getUseReconnectDelay() );
				config->writeEntry( "Reconnect delay", it->getReconnectDelay() );
				config->writeEntry( "Use TLS host", it->getUseTlsRemoteHost() );
				config->writeEntry( "TLS remote host", it->getTlsRemoteHost() );
				config->writeEntry( "Disable opportunistic encryption", it->getDisableOpportunisticEncryption() );
				config->writeEntry( "Right next hop", it->getRightNextHop() );
				config->writeEntry( "Left next hop", it->getLeftNextHop() );
				config->writeEntry( "Use userdefinied packet size for fragmentation", it->getUseFragment() );
				config->writeEntry( "Use userdef packet size", it->getUseMssfix()  );
				config->writeEntry( "Fragment", it->getFragment() );
				config->writeEntry( "PeerTimeout", it->getPeerTimeout() );
				config->writeEntry("Disable CCP", it->getDisableCcp() );
				config->writeEntry("Use smartcard", it->getUseSmartcard() );
				config->writeEntry("Use Xauth interactive", it->getUseXauthInteractive() );
				config->writeEntry("Use HTTP Proxy Authentication", it->getUseHttpProxyAuth() );
				config->writeEntry("HTTP Proxy Authtype", it->getHttpProxyAuthType() );
				config->writeEntry("Use HTTP Proxy Auth user", it->getHttpProxyUser() );
				config->writeEntry("Use HTTP Proxy Auth pass", it->getHttpProxyPass() );
				config->writeEntry("Use only CA cert and user auth", it->getUseOnlyCaCertAndUserAuth() );
				config->writeEntry("Use mail address as identifier", it->getUseMailAddressAsIdentifier() );
				config->writeEntry("Use right next hop", it->getUseRightNextHop() );
				config->writeEntry("Use left next hop", it->getUseLeftNextHop() );
				config->writeEntry("Pkcs11 providers", it->getPkcs11Providers() );
				config->writeEntry("Pkcs11 slot type", it->getPkcs11SlotType() );
				config->writeEntry("Pkcs11 slot", it->getPkcs11Slot() );
				config->writeEntry("Pkcs11 id type", it->getPkcs11IdType() );
				config->writeEntry("Pkcs11 id", it->getPkcs11Id() );
				config->writeEntry("Pkcs11 sign mode", it->getPkcs11SignMode() );
				config->writeEntry("Use Pkcs11 providers", it->getUsePkcs11Providers() );
				config->writeEntry("Allow empty private key password", it->getAllowEmptyPrivateKeyPassword());
				config->writeEntry("Allow ip address change of peer", it->getAllowIpAddressChangeOfPeer());
				config->writeEntry("Auth method", it->getAuthMethod());
				config->writeEntry("Command after connect delay time", it->getCommandAfterConnectDelayTime());
				config->writeEntry("Use search domain in resolv conf",it->getUseSearchDomainInResolvConf());
				config->writeEntry("Use domain in resolv conf",it->getUseDomainInResolvConf());
				config->writeEntry("Search domain in resolv conf",it->getSearchDomainInResolvConf());
				config->writeEntry("Domain in resolv conf",it->getDomainInResolvConf());
				config->writeEntry("Authentication direction",it->getAuthenticationDirection());
				config->writeEntry("CiscoNatMode", it->getCiscoNatMode());
				config->writeEntry("IPSec ESP",it->getIpsecEsp());
				config->writeEntry("IPSec IKE",it->getIpsecIke());
				config->writeEntry("Vtun profile",it->getVtunProfile());
				config->writeEntry("Disable data encryption", it->getDisableDataEncryption());
				config->writeEntry("Use authentication algorithm", it->getUseAuthenticationAlgorithm());
				config->writeEntry("Fix path mtu discovery problem" , it ->getFixPathMtuDiscoveryProblem());
				config->writeEntry("Use remote network", it->getUseRemoteNetwork());
				config->writeEntry("Ipsec vpn mode", it->getIpsecVpnMode());
				config->writeEntry("DisableHeaderCompression",it->getDisableHeaderCompression());
				config->writeEntry("DisableMagicNumberNegotiation",it->getDisableMagicNumberNegotiation());
				config->writeEntry("DisableIpx",it->getDisableIpx());
				config->writeEntry("Disable protocol field compression",it->getDisableProtocolFieldCompression());
				config->writeEntry("Disable adress control compression",it->getDisableAdressControlCompression());
				config->writeEntry("Use custom ike",it->getUseCustomIke());
				config->writeEntry("Use custom esp",it->getUseCustomEsp());
				config->writeEntry("Verify ca cert",it->getVerifyCaCert());
				config->writeEntry("Use DPD idle timeout",it->getUseDpdIdleTimeout());
				config->writeEntry("DPD idle timeout",it->getDpdIdleTimeout());
				config->writeEntry("Hide group password in accountdata dialog",it->getHideGroupPasswordInAccountDataDialog());
				config->writeEntry("MaxConnectTries",it->getMaxConnectTries());
				config->writeEntry("L2tpDaemon",it->getL2tpDaemon());
				config->writeEntry("UseLeftSourceIp",it->getUseLeftSourceIp());
				config->writeEntry("UseRightSourceIp",it->getUseRightSourceIp());
				config->writeEntry("LeftSourceIp",it->getLeftSourceIp());
				config->writeEntry("RightSourceIp",it->getRightSourceIp());
				config->writeEntry("Use virtual subnets",it->getUseVirtualSubnetworks());
				config->writeEntry("Virtual subnets", it->getVirtualSubnetworks());
				config->writeEntry("DisablePushFromServer", it->getDisablePushFromServer());
				config->writeEntry("DisableBind", it->getDisableBind());
				config->writeEntry("UseRenegSec", it->getUseRenegSec());
				config->writeEntry("RenegSec", it->getRenegSec());
				config->writeEntry("UseTunnelPing", it->getUseTunnelPing());
				config->writeEntry("TunnelPing", it->getTunnelPing());
				config->writeEntry("UseTunnelPingRestart", it->getUseTunnelPingRestart());
				config->writeEntry("TunnelPingRestart", it->getTunnelPingRestart());
				config->writeEntry("RequireEap", it->getRequireEap());
				config->writeEntry("UseSshConfigRemoteScript", it->getUseSshConfigRemoteScript());
				config->writeEntry("SshConfigRemoteScript", it->getSshConfigRemoteScript());
				config->writeEntry("AskUserPasswordOnEachConnect", it->getAskUserPasswordOnEachConnect());
				config->writeEntry("UseCiscoCertStore", it->getUseCiscoCertStore());
				config->writeEntry("UseNat", it->getUseNat());

// 				appPointer->processEvents();

				TQString AdditionalNetworkRoutesString;
				TQStringList AdditionalNetworkRoutes = it->getAdditionalNetworkRoutes();

				// Networks delimited by a ','
				for ( TQStringList::Iterator it2 = AdditionalNetworkRoutes.begin(); it2 != 	AdditionalNetworkRoutes.end(); ++it2 )
				{
					AdditionalNetworkRoutesString+=*it2;
					AdditionalNetworkRoutesString+=",";
				}
				AdditionalNetworkRoutesString=AdditionalNetworkRoutesString.left(AdditionalNetworkRoutesString.length()-1);
				config->writeEntry( "Additional network routes", AdditionalNetworkRoutesString );

// 				wallet->sync();
				/* give info */
// 				slotStatusMsg ( i18n( "Profile \"%1\" saved." ).arg( ProfileName.remove("Profile_") ), ID_FLASH_MSG );

				appendLogEntry ( i18n( "Profile \"%1\" saved." ).arg( ProfileName.remove("Profile_") ) , info);
// 				appPointer->processEvents();
			}
			appPointer->processEvents();
		}
	}


// 	if ( !skipKwalletStoring && wallet != 0)
// 		if (useKwallet && KWallet::Wallet::isEnabled())
// 			if (wallet->isOpen())
// 				wallet->sync();
	config->sync();
	doBackupConfig();

	slotStatusMsg ( i18n( "Profiles saved." ) , ID_FLASH_MSG );
	appPointer->processEvents();
}

void KVpncConfig::loadOptions()
{
	config->setGroup( "Notification Messages" );
	hideOnCloseInfo = config->readBoolEntry( "hideOnCloseInfo" ,false);

	config->setGroup( "General Options" );
	minimizeAfterConnect = config->readBoolEntry( "Minimize after connect", true );
	hideMainWindow = config->readBoolEntry("Hide on startup", false );
	useSilentQuit = config->readBoolEntry( "Use silent quit", false );
	dontQuitOnCloseEvent = config->readBoolEntry( "Dont quit on CloseEvent", true );
	showDebugConsole = config->readBoolEntry( "Show debugconsole", true );
	enableDebugPppd = config->readBoolEntry( "Enable pppd debug", false );
	enableDebugPptpd = config->readBoolEntry( "Enable pptpd debug", false );
	enableFreeswanVerbose = config->readBoolEntry( "Enable FreeSWAN verbose", false );
	PlutoDebug = TQStringList::split(" ", config->readEntry( "Pluto Debug", ""));
	KlipsDebug = TQStringList::split(" ", config->readEntry( "Klips Debug", ""));
	Vpnc_pid_file = config->readEntry( "Pid file for vpnc ", "/var/run/vpnc/pid" );
	RacoonDebugLevel = config->readEntry( "Racoon debuglevel", "info" );
	// we need to correct old int value
	if (RacoonDebugLevel == "0")
		RacoonDebugLevel="info";
	if (RacoonDebugLevel != "info" && RacoonDebugLevel != "debug" && RacoonDebugLevel != "debug2" )
		RacoonDebugLevel = "info";

	VpncDebugLevel = config->readNumEntry( "Vpnc debuglevel", 0 );
	KvpncDebugLevel = config->readNumEntry( "Kvpnc debuglevel", 0 );
	PppdDebugLevel = config->readBoolEntry( "Pppd debuglevel", false );
	PppdKernelLogLevel = config->readNumEntry( "Pppd kernel log level", 0 );
	OpenvpnDebugLevel = config->readNumEntry( "Openvpn debuglevel", 0 );
	PptpLogLevel = config->readNumEntry( "Pptp debuglevel", 1 );
	SshDebugLevel = config->readNumEntry( "ssh debuglevel", 1 );
	enableDebugL2tpd = config->readBoolEntry( "enable l2tpd debug", false );
	enableDebugXl2tpd = config->readBoolEntry( "Enable xl2tpd debug", false );
	enableDebugOpenl2tp = config->readBoolEntry( "Enable openl2tp debug", false );

	enableDebugXl2tpdNetwork = config->readBoolEntry("EnableDebugXl2tpdNetwork",false);
	enableDebugXl2tpdpacket = config->readBoolEntry("EnableDebugXl2tpdpacket",false);
	enableDebugXl2tpdstate = config->readBoolEntry("EnableDebugXl2tpdstate",false);
	enableDebugXl2tpdtunnel = config->readBoolEntry("EnableDebugXl2tpdtunnel",false);


	pathToVpnc = config->readEntry( "Path to vpnc-bin", "/usr/sbin/vpnc" );
	pathToCiscoVpnc = config->readEntry( "Path to vpnclient", "/usr/local/bin/vpnclient" );
	pathToSetkey = config->readEntry( "Path to setkey", "/usr/sbin/setkey" );
	pathToRacoon = config->readEntry( "Path to racoon", "/usr/sbin/racoon" );
	pathToRacoonctl = config->readEntry( "Path to racoonctl", "/usr/sbin/racoonctl" );
	pathToIptables = config->readEntry( "Path to iptables", "/sbin/iptables" );
	pathToOpenssl = config->readEntry( "Path to openssl", "/usr/bin/openssl" );
	pathToIpsec = config->readEntry( "Path to freeswan", "/usr/sbin/ipsec" );
	pathToIp = config->readEntry( "Path to iputility", "/sbin/ip" );
	pathToIfconfig = config->readEntry( "Path to ifconfig", "/sbin/ifconfig" );
	pathToRoute = config->readEntry( "Path to route", "/sbin/route" );
	pathToNetstat = config->readEntry( "Path to netstat", "/bin/netstat" );
	pathToPppd = config->readEntry ("Path to pppd","/usr/sbin/pppd");
	pathToPptp = config->readEntry ("Path to pptp","/usr/sbin/pptp");
	pathToL2tpd = config->readEntry ("Path to l2tpd","/usr/sbin/l2tpd");
	pathToXl2tpd = config->readEntry ("Path to xl2tpd","/usr/sbin/xl2tpd");
	pathToOpenl2tp = config->readEntry ("Path to openl2tp","/usr/sbin/openl2tpd");
	pathToKill = config->readEntry ("Path to kill","/bin/kill");
	pathToKillall = config->readEntry ("Path to kill-all","/usr/bin/killall");
	pathToPing = config->readEntry ("Path to ping","/bin/ping");
	pathToOpenvpn = config->readEntry ("Path to openvpn","/usr/sbin/openvpn");
	pathToPkcs11Tool = config->readEntry( "Path to pkcs11-tool", "/usr/bin/pkcs11-tool" );
	pathToVtund = config->readEntry( "Path to vtund", "/usr/sbin/vtund" );
	pathToCiscoCertMgr = config->readEntry( "Path to cisco_cert_mgr","/usr/local/bin/cisco_cert_mgr");
	pathToTail = config->readEntry( "Path to tail","/usr/bin/tail");
	pathToSsh = config->readEntry( "Path to ssh","/usr/bin/ssh");
	pathToKsshAskpass = config->readEntry( "Path to ksshaskpass","/usr/bin/ksshaskpass");
	pathToGnomeSshAskpass = config->readEntry( "Path to ssh-askpass-gnome","/usr/lib/openssh/gnome-ssh-askpass");

	checkStandardPathValues();

	tryConnectTimeout = TQString( config->readEntry( "Try connect timeout", "10" ) ).toInt();
	lastProfile = config->readEntry( "Last Profile", "" );
	writeLogFile = config->readBoolEntry( "Write log file", true );
	holdGeneratedScripts = config->readBoolEntry( "Hold generated scripts", true );
	showStatusBar = config->readBoolEntry( "Show Statusbar", true );
	programsInPath = config->readBoolEntry( "Programs in path", true );

	if (programsInPath)
		useDefaultPaths=true;

	InfoLogColor = config->readColorEntry ( "Info logwindow color", new TQColor(TQt::black) );
	RemoteLogColor = config->readColorEntry ( "Remote logwindow color", new TQColor(TQt::blue) );
	ErrorLogColor = config->readColorEntry( "Error logwindow color", new TQColor(TQt::red ));
	SuccessLogColor = config->readColorEntry( "Success  logwindow color", new TQColor(TQt::darkGreen) );
	DebugLogColor = config->readColorEntry( "Debug logwindow color", new TQColor(255,175,0 ));
	DebugBackgroundcolor = config->readColorEntry("Debug background color", new TQColor (TQt::white) );
	useColorizedLogOutput = config->readBoolEntry("Use colorized log output", true);
	showInterfaceIPinTooltip = config->readBoolEntry( "Show interface IP in tooltip", true );
	AutoConnectProfile= config->readEntry( "Auto connect profile", "" );
	doAutoConnectAtStartup = config->readBoolEntry( "Do auto connect at startup", false );
	LogViewerFontSize = config->readNumEntry( "Log viewer font size", 2 );

	WindowSize = TQSize( config->readNumEntry( "Mainwindow width", 50 ), this->config->readNumEntry( "Mainwindow height", 50 ) );
	WindowPos = TQPoint ( config->readNumEntry( "Mainwindow position x", 10 ), this->config->readNumEntry( "Mainwindow position y", 50 ) );

	OpenvpnManagementPort = config->readNumEntry("Openvpn management port", 2222 );

	appPointer->processEvents();

	if ( writeLogFile )
		if ( !logfile.isOpen() )
		{
			KStandardDirs *dirs = KGlobal::dirs();

			TQDir AppFolder (TQString(dirs->saveLocation( "data" )+"/kvpnc"));
			if (!AppFolder.exists())
			{
				// 		KMessageBox::error( this, i18n( "creating dir: %1" ).arg(dirs->saveLocation( "data" )+"/kvpnc" ));
				TQDir AppFolder2(dirs->saveLocation( "data" ));
				if(!AppFolder2.mkdir("kvpnc",true))
				{
					KMessageBox::error( 0, i18n( "The appdir for kvpnc could not be created. Be sure that you have write permission of \"%1\"." ).arg(dirs->saveLocation( "data" )) );
					appendLogEntry( i18n( "The appdir for kvpnc could not be created. Be sure that you have write permission of \"%1\"." ).arg(dirs->saveLocation( "data" )),error);
				}
			}

			logfileName = dirs->saveLocation( "data" );
			logfileName += "/kvpnc/kvpnc.log";
			//KMessageBox::information( this, logfileName, "info" );
			logfile.setName( logfileName );
			if ( !logfile.open( IO_WriteOnly | IO_Append ) )
			{
				KMessageBox::error( 0, i18n( "Log file cant be opened!" ) );
				appendLogEntry(i18n( "Unable to find \"%1\"!" ).arg("pppd"),error);
			}
			else
			{
				TQTextStream s( &logfile );
				s << i18n( "Log session started at: " ) << TQDateTime::currentDateTime().toString( Qt::TextDate ) << endl;
			}
		}

	useKwallet = config->readBoolEntry("Use KWallet", true);
	firstUseOfKwallet = config->readBoolEntry( "First use of Kwallet", true );
	feedbackMailSent = config->readBoolEntry("FeedbackMailSent",false);
	doKillL2tpdIfStillRunning = config->readBoolEntry("Do kill l2tpd if still running",true);
	doKillXl2tpdIfStillRunning = config->readBoolEntry("Do kill xl2tpd if still running",true);
	doKillRacoonIfStillRunning = config->readBoolEntry("Do kill racoon if still running",true);
	showConnectionTimeInTooltip = config->readBoolEntry("Show connection time in Tooltip",true);
	enableDebugOpenvpn  = config->readBoolEntry("Enable debug Openvpn",false);



	if ( KvpncDebugLevel > 2 )
		appendLogEntry( i18n( "Global configuration loaded." ) ,info);


	/* = user data = */
	/* old style: one profile: will be removed in future */
	/*
	config->setGroup( "Client Options" );
	this->mw->gatewayLineEdit->setText( config->readEntry( "VPN Gateway", "" ) );
	this->mw->IDLineEdit->setText( config->readEntry( "VPN ID", "" ) );
	this->mw->PSKLineEdit->setText( config->readEntry( "Group password", "" ) );
	this->mw->UsernameLineEdit->setText( config->readEntry( "Username", "" ) );
	this->mw->PasswordEdit->setText( config->readEntry( "Password", "" ) );

	this->mw->CheckUserPass->setChecked( config->readBoolEntry( "Save user password", false ) );
	this->mw->CheckGroupPass->setChecked( config->readBoolEntry( "Save group password", false ) );
	*/

	/* profiles are stored in a group which is named to the following scheme:
	 Profile_XXXXX
	 XXXXX is the account name (important: unique!)
	*/
	TQStringList configGroups = config->groupList();
	bool oldConfigurationFound = false;

	bool sessionFound = false;

	for ( TQStringList::Iterator it = configGroups.begin(); it != configGroups.end(); ++it )
	{
		TQString name = *it;
		name.stripWhiteSpace();
		if ( name.left( 7 ) == "Profile" && name.length() > 8 )
		{
			// Profile found

			sessionFound = true;

			if ( KvpncDebugLevel > 2 )
			{
				TQString tmp = i18n( "Profile found: " );
				tmp += name.right( ( name.length() ) - 8 );
				appendLogEntry ( tmp, debug );
			}
			config->setGroup( name );
			TQString UserPassword="";
			TQString PrivateKeyPass="";
			TQString PreSharedKey ="";

			/* passwords with kwallet */
			if (useKwallet && KWallet::Wallet::isEnabled())
			{
				if (KvpncDebugLevel > 2)
					appendLogEntry(i18n( "Wallet enabled and available, reading passwords from wallet." ),debug);
				// Open local wallet
				wallet = KWallet::Wallet::openWallet(KWallet::Wallet::LocalWallet());
				if (wallet != 0)
				{
					TQString walletname="kvpnc";

					if (!wallet->hasFolder(walletname))
					{
						wallet->createFolder(walletname);
						wallet->sync();
					}

					if (wallet->setFolder(walletname))
					{
						if (KvpncDebugLevel > 2)
							appendLogEntry(i18n( "Folder for kvpnc has been set." ),debug);

						TQString profilename = name.right( ( name.length() ) - 8 );

						if (wallet->readPassword(TQString(profilename+"__user_pw"), UserPassword) != 0)
							appendLogEntry(i18n( "read of %1 has failed." ).arg(i18n("user password")),error);
						else
							if (KvpncDebugLevel > 2)
								appendLogEntry(i18n( "read of %1 was successful." ).arg(i18n("user password")),debug);

						if (wallet->readPassword(TQString(profilename+"__psk"), PreSharedKey) != 0)
							appendLogEntry(i18n( "read of %1 has failed." ).arg(i18n("preshared key")),error);
						else
							if (KvpncDebugLevel > 2)
								appendLogEntry(i18n( "read of %1 was successful." ).arg(i18n("preshared key")),debug);

						if (wallet->readPassword(TQString(profilename+"__priv_key_pwd"), PrivateKeyPass) != 0)
							appendLogEntry(i18n( "read of %1 has failed." ).arg(i18n("preshared key password")),error);
						else
							if (KvpncDebugLevel > 2)
								appendLogEntry(i18n( "read of %1 was successful." ).arg(i18n("preshared key password")),debug);
					}
					else
					{
						KMessageBox::error( 0, i18n( "Unable to set wallet folder for kvpnc!" ) );
						appendLogEntry(i18n( "Unable to set wallet folder for kvpnc!" ), error);
					}
					appPointer->processEvents();
				}
				else
				{
					KMessageBox::error( 0, i18n( "Unable to open wallet folder for kvpnc!" ) );
					appendLogEntry(i18n( "Unable to open wallet folder for kvpnc!" ), error);
				}


			}
			else
			{
				if (KvpncDebugLevel > 2)
				{
					if (useKwallet && KWallet::Wallet::isEnabled() && firstUseOfKwallet)
						appendLogEntry(i18n( "Wallet enabled, available but first time, reading passwords from config file." ),debug);
					else
						appendLogEntry(i18n( "Wallet disabled or not available, reading passwords from config file." ),debug);
				}
				// read from config file
				UserPassword = config->readEntry( "User password", "" );
				PrivateKeyPass = config->readEntry( "PrivateKey password", "" );
				PreSharedKey = config->readEntry( "Pre shared key", "" );
			}

			VpnAccountData::ConnectionType ConnType = VpnAccountData::ConnectionType( VpnAccountData::cisco );
			TQString type_string = config->readEntry( "Connection type", "cisco" );

			if ( type_string == "cisco" )
				ConnType = VpnAccountData::cisco;
			else if ( type_string == "ciscoorig" )
				ConnType = VpnAccountData::ciscoorig;
			else if ( type_string == "racoon" )
				ConnType = VpnAccountData::racoon;
			else if ( type_string == "l2tpd (racoon)" )
				ConnType = VpnAccountData::l2tpd_racoon;
			else if ( type_string == "freeswan" )
				ConnType = VpnAccountData::freeswan;
			else if ( type_string == "l2tpd (openswan)" )
				ConnType = VpnAccountData::l2tpd_freeswan;
			else if ( type_string == "pptp" )
				ConnType = VpnAccountData::pptp;
			else if ( type_string == "openvpn" )
				ConnType = VpnAccountData::openvpn;
			else if ( type_string == "vtun" )
				ConnType = VpnAccountData::vtun;
			else if ( type_string == "ssh" )
				ConnType = VpnAccountData::ssh;
			else
				ConnType = VpnAccountData::other;

			TQString Name = name.right( name.length() - 8 );
			VpnAccountData *data = new VpnAccountData( ConnType, Name );
			data->setGateway( config->readEntry( "VPN Gateway", "" ));
			data->setID( config->readEntry( "VPN ID", "" ) );
			data->setDescription( config->readEntry("Description",""));
			data->setUserName( config->readEntry( "Username", "" ));
			data->setSaveUserPassword( config->readBoolEntry( "Save user password", false ));
			data->setSavePsk( config->readBoolEntry( "Save PSK", false ));
			data->setSavePrivateKeyPassword( config->readBoolEntry( "Save private key password", true ) );
			data->setUseAdvancedSettings( config->readBoolEntry( "Use advanced settings", false ));
			data->setApplicationVersion( config->readEntry( "Application version", "Cisco Systems VPN Client 0.3-rm+zomb.1:Linux" ));
			data->setLocalPort( config->readNumEntry( "Local port", 500 ));
			data->setRemotePort( config->readNumEntry( "Remote port", 500 ));
			data->setNtDomainName( config->readEntry( "NT domain name", "" ));
			data->setPerfectForwardSecrety( config->readEntry( "Perfect forward secrety", "server" ));
			data->setIkeGroup( config->readEntry( "IKE group", "dh1" ));
			data->setUseApplicationVersion( config->readBoolEntry( "Use application version", false ));
			data->setUseGlobalIpsecSecret( config->readBoolEntry( "Use global IPSec secret", false ));
			data->setUseIkeGroup( config->readBoolEntry( "Use IKE group", false ));
			data->setUseLocalPort( config->readBoolEntry( "Use local port", false ));
			data->setUseRemotePort( config->readBoolEntry( "Use remote port", false ));
			data->setUseNtDomainName( config->readBoolEntry( "Use NT domain name", false ));
			data->setUseSingleDes( config->readBoolEntry( "Use single DES", false ));
			data->setUsePerfectForwardSecrety( config->readBoolEntry( "Use perfect Forward Secrety", false ));
			data->setX509Certificate( config->readEntry( "x509 certificate", "" ));
			data->setCaCertificate( config->readEntry( "Ca certificate", "" ));
			data->setNetworkDevice( config->readEntry( "Network device", "default" ));
			data->setCertPath( config->readEntry( "Cert path", "/etc/racoon/certs" ));
			data->setPrivateKey( config->readEntry( "Private key", "" ));
			VpnAccountData::AuthenticationType authtype;
			if ( config->readEntry( "Auth type", "cert" ) == "cert" )
				authtype = VpnAccountData::cert;
			else if ( config->readEntry( "Auth type", "psk" ) == "psk" )
				authtype = VpnAccountData::psk;
			else if ( config->readEntry( "Auth type", "cert" ) == "hybrid" )
				authtype = VpnAccountData::hybrid;
			else
				authtype = VpnAccountData::unknownauth;
			data->setAuthType(authtype);

			appPointer->processEvents();

			data->setDoPingIP( config->readBoolEntry( "do ping ip", false ));
			data->setPingHostIP( config->readEntry( "Ping host IP", "" ));
			data->setUseSpecialRemoteID( config->readBoolEntry( "Use special remote ID", false ));
			data->setUseSpecialLocalID( config->readBoolEntry( "Use special local ID", false ));
			data->setSpecialRemoteID( config->readEntry( "Special remote ID", "" ));
			data->setSpecialLocalID( config->readEntry( "Special local ID", "" ));
			data->setLocalIDType(config->readEntry( "Local ID type", "asn1dn") );
			data->setRemoteIDType(config->readEntry( "Remote ID type", "none") );
			data->setUseSpecialServerCertificate( config->readBoolEntry( "Use special server certificate", false ));
			data->setSpecialServerCertificate( config->readEntry( "Special server certificate", "" ));
			data->setUseUdp( config->readBoolEntry( "Use UDP-protocol", false ));
			data->setUseUdpPort( config->readBoolEntry( "Use UDP-port", false ));
			data->setUdpPort( config->readNumEntry( "local UDP port", 4500 ));
			data->setUseDnsUpdate( config->readBoolEntry( "use DNS_UPDATE", true));
			data->setUseDnsServer( config->readBoolEntry( "use DNS-server", false));
			data->setDnsServer( config->readEntry( "DNS server", "" ));
			data->setRefuse40BitEncryption( config->readBoolEntry( "refuse 40 bit encryption", true ));
			data->setRefuse128BitEncryption( config->readBoolEntry( "refuse 128 bit encryption", false ));
			data->setAllowStatefulMode( config->readBoolEntry( "require stateless encryption",false ));
			data->setRequireMppe( config->readBoolEntry( "require mppe", true ));
			data->setUseNoBsdComp( config->readBoolEntry( "Use no BSD compression", true ));
			data->setUseNoIpDefault(config->readBoolEntry( "Do not use no IP by default", false));
			data->setUseNoDeflate( config->readBoolEntry( "Use no deflate", true ));
			data->setDisableMPPEComp( config->readBoolEntry( "Disable MPPE compression", false ));
			data->setLocalVirtualIP( config->readEntry( "Local virtual IP", "" ));
			data->setRemoteVirtualIP( config->readEntry( "Remote virtual IP", "" ));
			data->setPreSharedKeyFile( config->readEntry( "Pre shared key file", "" ));
			data->setExecuteCmdBeforeConnect( config->readBoolEntry( "Execute command before connect",false));
			data->setExecuteCmdAfterConnect( config->readBoolEntry( "Execute command after connect",false));
			data->setExecuteCmdBeforeDisconnect( config->readBoolEntry( "Execute command before disconnect", false));
			data->setExecuteCmdAfterDisconnect( config->readBoolEntry( "Execute command after disconnect", false));
			data->setCommandBeforeConnect( config->readEntry( "Command before connect", "" ));
			data->setCommandAfterConnect( config->readEntry( "Command after connect", "" ));
			data->setCommandBeforeDisconnect( config->readEntry( "Command before disconnect", "" ));
			data->setCommandAfterDisconnect( config->readEntry( "Command after disconnect", "" ));
			data->setReplaceDefaultRoute( config->readBoolEntry( "Replace default route", false ));
			data->setUseMtu( config->readBoolEntry( "Use own MTU", false ));
			data->setUseMru( config->readBoolEntry( "Use own MRU", false ));
			data->setMtu( config->readNumEntry( "MTU for pppd", 1492 ));
			data->setMru( config->readNumEntry( "MRU for pppd", 1492 ));
			data->setUseVirtualIP( config->readBoolEntry( "Use virtual IP", false ));
			data->setVirtualIP( config->readEntry( "Virtual IP", "" ));
			data->setPskIsInFile( config->readBoolEntry( "PSK is in file", false ));
			data->setUseAdditionalNetworkRoutes(	config->readBoolEntry( "Use additional network routes", false ));
			appPointer->processEvents();
			TQString AdditionalNetworkRoutesString = config->readEntry( "Additional network routes", "" );
			// Networks delimited by a ','
			TQStringList AdditionalNetworkRoutes(TQStringList::split( ",", AdditionalNetworkRoutesString ));
			data->setAdditionalNetworkRoutes(AdditionalNetworkRoutes);
			data->setHashAlgo( config->readEntry( "Hash algorithm", "md5" ));
			data->setEncryptionAlgorithm( config->readEntry( "Encryption algorithm", "3des" ));
			data->setAuthenticationAlgorithm( config->readEntry( "Authentication algorithm", "hmac_sha1" ));
			data->setTunnelDeviceType( config->readEntry( "Tunnel device type", "tun" ));
			data->setUseUserdefinedPort( config->readBoolEntry( "Use userdefined port", false ));
			data->setUserdefinedPort( config->readNumEntry( "Userdefined port", 1194 ));
			data->setNsCertType( config->readEntry( "NS cert type", "client" ));
			data->setUseNsCertType( config->readBoolEntry( "Use NS cert type", false ));
			data->setUseConnectionStatusCheck ( config->readBoolEntry( "Use connection status check", true ));
			data->setConnectionStatusCheckSuccessCount ( config->readNumEntry( "Connection check success count", 4 ));
			data->setConnectionStatusInterval ( config->readNumEntry( "Connection check status interval", 1 ));
			data->setDoReconnectAfterConnectionLost(config->readBoolEntry("Do reconnect after connection lost", false));
			data->setDisableLzoCompression(config->readBoolEntry("Disable LZO compression", true));
			data->setUserPassword( UserPassword );
			data->setRemoteNetAddr( config->readEntry("Remote net address","") );
			data->setRemoteNetMask( TQString().setNum(config->readNumEntry("Remote net mask",24 )));
			data->setPreSharedKey( PreSharedKey );
			data->setPrivateKeyPass( PrivateKeyPass );
			data->setAuthWithUsernameAndPassword( config->readBoolEntry( "AuthWithUsernameAndPassword",false ) );
			data->setAllowEmptyGroupPassword( config->readBoolEntry( "AllowEmptyGroupPassword", false ) );
			data->setUseUserdefiniedCipher( config->readBoolEntry( "Use userdefinied cipher", false ) );
			data->setUserdefiniedCipher( config->readEntry( "Userdefinied cipher", "" ) );
			appPointer->processEvents();
			data->setUseRedirectGateway( config->readBoolEntry( "Use redirect gateway", false ) );
			data->setUseTlsAuth( config->readBoolEntry( "Use TLS auth", false ) );
			data->setTlsAuthFile( config->readEntry( "TLS auth file", "" ) );
			data->setUseHttpProxy( config->readBoolEntry( "Use HTTP proxy", false ) );
			data->setHttpProxy( config->readEntry( "HTTP proxy host", "" ) );
			data->setHttpProxyPort( config->readNumEntry( "HTTP proxy port", 8080 ) );
			data->setHttpProxyTimeout( config->readNumEntry( "HTTP proxy timeout", 5 ) );
			data->setDontSaveUsername( config->readBoolEntry( "Dont save username", false ) );
			data->setUseModeConfig( config->readBoolEntry( "Use mode config", false ) );
			data->setExchangeMode( config->readEntry( "Exchange mode", "main" ) );
			data->setUseReconnectDelay( config->readBoolEntry( "Use delay at reconnect", false ) );
			data->setReconnectDelay( config->readNumEntry( "Reconnect delay", 5 ) );
			data->setUseTlsRemoteHost( config->readBoolEntry( "Use TLS host", false) );
			data->setTlsRemoteHost( config->readEntry( "TLS remote host", "") );
			data->setDisableOpportunisticEncryption( config->readBoolEntry( "Disable opportunistic encryption", false  ) );
			data->setRightNextHop( config->readEntry( "Right next hop", "" ) );
			data->setLeftNextHop( config->readEntry( "Left next hop", "" ) );
			data->setUseMssfix(config->readBoolEntry( "Use userdef packet size", false) );
			data->setUseFragment(config->readBoolEntry( "Use userdefinied packet size for fragmentation" , false) );
			data->setMssfix(config->readNumEntry( "Mssfix", 1300) );
			data->setFragment( config->readNumEntry( "Fragment", 1300) );
			data->setPeerTimeout( config->readNumEntry( "PeerTimeout",0) );
			data->setDisableCcp( config->readBoolEntry("Disable CCP",false) );
			data->setUseSmartcard( config->readBoolEntry("Use smartcard", false) );
			data->setUseXauthInteractive(config->readBoolEntry("Use Xauth interactive", false) );
			data->setUseHttpProxyAuth( config->readBoolEntry("Use HTTP Proxy Authentication", false ) );
			data->setHttpProxyAuthType( config->readEntry("HTTP Proxy Authtype", "basic") );
			data->setHttpProxyUser( config->readEntry("Use HTTP Proxy Auth user", "") );
			data->setHttpProxyPass( config->readEntry("Use HTTP Proxy Auth pass", "") );
			data->setUseOnlyCaCertAndUserAuth(config->readBoolEntry("Use only CA cert and user auth", false) );
			data->setUseMailAddressAsIdentifier(config->readBoolEntry("Use mail address as identifier", false) );
			data->setUseRightNextHop(config->readBoolEntry("Use right next hop", false) );
			data->setUseLeftNextHop(config->readBoolEntry("Use left next hop", false) );
			data->setPkcs11Providers(config->readEntry("Pkcs11 providers", "/usr/local/lib/libetpkcs11.so" ) );
			data->setPkcs11SlotType(config->readEntry("Pkcs11 slot type", "id") );
			data->setPkcs11Slot(config->readEntry("Pkcs11 slot", "0") );
			data->setPkcs11IdType(config->readEntry("Pkcs11 id type", "id") );
			data->setPkcs11Id(config->readEntry("Pkcs11 id","" ) );
			data->setPkcs11SignMode(config->readEntry("Pkcs11 sign mode", "auto") );
			data->setUsePkcs11Providers(config->readBoolEntry("Use Pkcs11 providers", false) );
			data->setAllowEmptyPrivateKeyPassword( config->readBoolEntry("Allow empty private key password", false ));
			data->setAllowIpAddressChangeOfPeer(config->readBoolEntry("Allow ip address change of peer", false));
			data->setAuthMethod(config->readEntry("Auth method", "mschap-v2"));
			data->setCommandAfterConnectDelayTime(config->readNumEntry("Command after connect delay time", 5));
			data->setUseSearchDomainInResolvConf(config->readBoolEntry("Use search domain in resolv conf",false));
			data->setUseDomainInResolvConf(config->readBoolEntry("Use domain in resolv conf",false));
			data->setSearchDomainInResolvConf(config->readEntry("Search domain in resolv conf",""));
			data->setDomainInResolvConf(config->readEntry("Domain in resolv conf",""));
			data->setAuthenticationDirection(config->readEntry("Authentication direction","none"));
			data->setCiscoNatMode(config->readEntry("CiscoNatMode", "natt"));
			data->setIpsecEsp(config->readEntry("IPSec ESP","3des-md5,3des-sha1,aes128-sha1,aes256-sha1"));
			data->setIpsecIke(config->readEntry("IPSec IKE","aes256-sha1,aes128-sha1,3des-sha1-modp2048,3des-md5,3des-sha1"));
			data->setVtunProfile(config->readEntry("Vtun profile",""));
			data->setDisableDataEncryption(config->readBoolEntry("Disable data encryption", false));
			data->setUseAuthenticationAlgorithm(config->readBoolEntry("Use authentication algorithm", false));
			data->setFixPathMtuDiscoveryProblem(config->readBoolEntry("Fix path mtu discovery problem" , false));
			data->setUseRemoteNetwork(config->readBoolEntry("Use remote network",false));
			data->setIpsecVpnMode(config->readEntry("Ipsec vpn mode", "tunnel"));
			data->setDisableHeaderCompression(config->readBoolEntry("DisableHeaderCompression",false));
			data->setDisableMagicNumberNegotiation(config->readBoolEntry("DisableMagicNumberNegotiation",false));
			data->setDisableIpx(config->readBoolEntry("DisableIpx",false));
			data->setDisableProtocolFieldCompression(config->readBoolEntry("Disable protocol field compression",false));
			data->setDisableAdressControlCompression(config->readBoolEntry("Disable adress control compression",false));
			data->setUseCustomIke(config->readBoolEntry("Use custom ike",false));
			data->setUseCustomEsp(config->readBoolEntry("Use custom esp",false));
			data->setVerifyCaCert(config->readBoolEntry("Verify ca cert",true));
			data->setUseDpdIdleTimeout(config->readBoolEntry("Use DPD idle timeout",false));
			data->setDpdIdleTimeout(config->readNumEntry("DPD idle timeout",300));
			data->setHideGroupPasswordInAccountDataDialog(config->readBoolEntry("Hide group password in accountdata dialog",false));
			data->setMaxConnectTries(config->readNumEntry("MaxConnectTries",300));
			data->setL2tpDaemon((VpnAccountData::L2tpDaemonType)config->readNumEntry("L2tpDaemon",0));
			data->setUseLeftSourceIp(config->readBoolEntry("UseLeftSourceIp",false));
			data->setUseRightSourceIp(config->readBoolEntry("UseRightSourceIp",false));
			data->setLeftSourceIp(config->readEntry("LeftSourceIp",""));
			data->setRightSourceIp(config->readEntry("RightSourceIp",""));
			data->setUseVirtualSubnetworks(config->readBoolEntry("Use virtual subnets",false));
			data->setVirtualSubnetworks(config->readEntry("Virtual subnets", ""));
			data->setDisablePushFromServer(config->readBoolEntry("DisablePushFromServer",false));
			data->setDisableBind(config->readBoolEntry("DisableBind",false));
			data->setUseRenegSec( config->readBoolEntry("UseRenegSec", false));
			data->setRenegSec(config->readNumEntry("RenegSec", 3600));
			data->setUseTunnelPing(config->readBoolEntry("UseTunnelPing", false));
			data->setTunnelPing(config->readNumEntry("TunnelPing",10));
			data->setUseTunnelPingRestart(config->readBoolEntry("UseTunnelPingRestart", false));
			data->setTunnelPingRestart(config->readNumEntry("TunnelPingRestart", 120));
			data->setRequireEap(config->readBoolEntry("RequireEap", false));
			data->setUseSshConfigRemoteScript(config->readBoolEntry("UseSshConfigRemoteScript", false));
			data->setSshConfigRemoteScript(config->readEntry("SshConfigRemoteScript", ""));
			data->setAskUserPasswordOnEachConnect(config->readBoolEntry("AskUserPasswordOnEachConnect", false));
			data->setUseCiscoCertStore( config->readBoolEntry("UseCiscoCertStore", false));
			data->setUseNat(config->readBoolEntry("UseNat", true));

			appPointer->processEvents();
			AccountList->append( data );
		}

		if ( name == "Client Options" )
		{
			// old style configuration found
			config->setGroup( "Client Options" );
			TQString Name = "Default";
			VpnAccountData::ConnectionType ConnType = VpnAccountData::cisco;
			TQString Gateway = config->readEntry( "VPN Gateway", "" );
			TQString ID = config->readEntry( "VPN ID", "" );
			TQString Psk = config->readEntry( "Group password", "" );
			TQString Username = config->readEntry( "Username", "" );
			TQString UserPassword = config->readEntry( "Password", "" );
			bool saveUserPassword = config->readBoolEntry( "Save user password", false );
			bool savePsk = config->readBoolEntry( "Save group password", false );

			VpnAccountData *AccData = new VpnAccountData( ConnType, Name);
			AccData->setGateway ( Gateway );
			AccData->setID( ID );
			AccData->setPreSharedKey( Psk);
			AccData->setUserName( Username );
			AccData->setUserPassword( UserPassword );
			AccData->setSaveUserPassword( saveUserPassword );
			AccData->setSavePsk( savePsk );
			AccData->setLocalPort( 500 );
			AccData->setPerfectForwardSecrety ( "server" );
			AccData->setIkeGroup( "dh1" );
			AccountList->append( AccData );

			lastProfile = "Default";

			// now mark for deleting old configuration
			oldConfigurationFound = true;
			if ( KvpncDebugLevel > 2 )
				appendLogEntry ( i18n( "Old configuration found, converted." ),info );

			if ( KvpncDebugLevel > 2 )
				appendLogEntry( i18n( "Configuration for profile \"%1\" loaded." ).arg( Name ),info );

			appPointer->processEvents();
		}


	}
	if ( oldConfigurationFound )
	{
		// delete configuration file
		KStandardDirs * dirs = KGlobal::dirs();
		TQString filePath = dirs->findResource ( "config", "kvpncrc" );
		TQFile::remove
			( filePath );
		if ( KvpncDebugLevel > 2 )
			appendLogEntry ( i18n( "Old configuration deleted." ), debug );
	}
}

void KVpncConfig::checkStandardPathValues()
{
	if (pathToVpnc.isEmpty())
		pathToVpnc = "/usr/sbin/vpnc";
	
	if (pathToCiscoVpnc.isEmpty())
		pathToCiscoVpnc = "/usr/local/bin/vpnclient";
	
	if (pathToSetkey.isEmpty())
		pathToSetkey = "/usr/sbin/setkey";
	
	if (pathToRacoon.isEmpty())
		pathToRacoon = "/usr/sbin/racoon";
	
	if (pathToRacoonctl.isEmpty())
		pathToRacoonctl = "/usr/sbin/racoonctl";
	
	if (pathToIptables.isEmpty())
		pathToIptables = "/sbin/iptables";
	
	if (pathToOpenssl.isEmpty())
		pathToOpenssl = "/usr/bin/openssl";
	
	if (pathToIpsec.isEmpty())
		pathToIpsec = "/usr/sbin/ipsec";
	
	if (pathToIp.isEmpty())
		pathToIp = "/sbin/ip";
	
	if (pathToIfconfig.isEmpty())
		pathToIfconfig = "/sbin/ifconfig";
	
	if (pathToRoute.isEmpty())
		pathToRoute = "/sbin/route";
	
	if (pathToNetstat.isEmpty())
		pathToNetstat = "/bin/netstat";
	
	if (pathToPppd.isEmpty())
		pathToPppd = "/usr/sbin/pppd";
	
	if (pathToPptp.isEmpty())
		pathToPptp = "/usr/sbin/pptp";
	
	if (pathToL2tpd.isEmpty())
		pathToL2tpd = "/usr/sbin/l2tpd";
	
	if (pathToXl2tpd.isEmpty())
		pathToXl2tpd = "/usr/sbin/xl2tpd";
	
	if (pathToOpenl2tp.isEmpty())
		pathToOpenl2tp = "/usr/sbin/openl2tpd";
	
	if (pathToKill.isEmpty())
		pathToKill = "/bin/kill";
	
	if (pathToKillall.isEmpty())
		pathToKillall = "/usr/bin/killall";
	
	if (pathToPing.isEmpty())
		pathToPing = "/bin/ping";
	
	if (pathToOpenvpn.isEmpty())
		pathToOpenvpn = "/usr/sbin/openvpn";
	
	if (pathToPkcs11Tool.isEmpty())
		pathToPkcs11Tool = "/usr/bin/pkcs11-tool";
	
	if (pathToVtund.isEmpty())
		pathToVtund = "/usr/sbin/vtund";
	
	if (pathToCiscoCertMgr.isEmpty())
		pathToCiscoCertMgr = "/usr/local/bin/cisco_cert_mgr";
	
	if (pathToTail.isEmpty())
		pathToTail = "/usr/bin/tail";
	
	if (pathToSsh.isEmpty())
		pathToSsh = "/usr/bin/ssh";
	
	if (pathToKsshAskpass.isEmpty())
		pathToKsshAskpass = "/usr/bin/ksshaskpass";
	
	if (pathToGnomeSshAskpass.isEmpty())
		pathToGnomeSshAskpass = "/usr/lib/openssh/gnome-ssh-askpass";
}

bool KVpncConfig::exportKvpncConfig(TQString filename)
{
	bool ok=true;
	int exportCount=0;
	bool exportGlobal=false;
	TQFile exportfile (filename);
	if (exportfile.exists())
	{
		int res = KMessageBox::questionYesNo ( 0, i18n ( "\"%1\" still exists. Do you really want to overwrite it?" ).arg ( filename ), i18n ( "Overwrite?" ), i18n("&Overwrite") , KStdGuiItem::cancel() );

		if (res == 4)
			ok=false;
	}
	if (ok==true)
	{
		if( exportfile.open(IO_WriteOnly))
		{
				TQPtrList<VpnAccountData> *exportAccountList = new TQPtrList<VpnAccountData>();
				exportAccountList->setAutoDelete( TRUE ); // the list owns the objects
				KvpncImportProfileSelectionBase selectdlg;
				VpnAccountData *it=NULL;
				selectdlg.OpenProfileManagerCheckBox->hide();
				selectdlg.textLabel->setText(i18n("Select profiles for export:"));
				selectdlg.ImportPushButton->setText(i18n("&Export selected profiles..."));
				selectdlg.ImportGlobalSettingsCheckBox->setText(i18n("export &global settings"));

				if ( !AccountList->isEmpty() )
				{
					selectdlg.ImportProfileListView->takeItem(selectdlg.ImportProfileListView->currentItem());
					selectdlg.ImportProfileListView->addColumn(i18n("Name"));
					selectdlg.ImportProfileListView->addColumn(i18n("Type"));
					selectdlg.ImportProfileListView->addColumn(i18n("Gateway"));
					TQCheckListItem *item;
					for ( it = AccountList->first(); it; it = AccountList->next() )
					{
							TQString name = it->getName();
							TQString type;
							if ( it->getConnectionType() == VpnAccountData::cisco )
								type = "cisco" ;
							else if ( it->getConnectionType() == VpnAccountData::ciscoorig )
								type = "ciscoorig" ;
							else if ( it->getConnectionType() == VpnAccountData::racoon )
								type = "racoon" ;
							else if ( it->getConnectionType() == VpnAccountData::l2tpd_racoon )
								type = "l2tpd (racoon)" ;
							else if ( it->getConnectionType() == VpnAccountData::freeswan )
								type = "freeswan" ;
							else if ( it->getConnectionType() == VpnAccountData::l2tpd_freeswan )
								type = "l2tpd (openswan)" ;
							else if ( it->getConnectionType() == VpnAccountData::pptp )
								type = "pptp" ;
							else if ( it->getConnectionType() == VpnAccountData::openvpn )
								type = "openvpn" ;
							else if ( it->getConnectionType() == VpnAccountData::vtun )
								type = "vtun" ;
							else if ( it->getConnectionType() == VpnAccountData::ssh )
								type = "ssh" ;

							else
								type =  i18n("other");


// 						litem->setSelectable(true);
						item = new TQCheckListItem(selectdlg.ImportProfileListView,it->getName(),TQCheckListItem::CheckBox);
						item->setText(1,type);
						item->setText(2,it->getGateway());
						selectdlg.ImportProfileListView->insertItem(item);

// 						std::cout << "insert profile into listview: " << name << std::endl;
					}
				}
				bool ret = selectdlg.exec();
				if (ret == true)
				{
					TQListViewItemIterator it2( selectdlg.ImportProfileListView );
					for ( ; it2.current(); ++it2 )
					{
						if (  ( (TQCheckListItem*)it2.current() )->isOn() )
						{
							VpnAccountData *data=NULL;
							it = 0;
							for ( it = AccountList->first(); it; it = AccountList->next() )
								if ( it->getName() == ( (TQCheckListItem*)it2.current() )->text() && ( (TQCheckListItem*)it2.current() )->isOn()  )
									data = it;
							exportAccountList->append(data);
						}
					}
					exportGlobal = selectdlg.ImportGlobalSettingsCheckBox->isChecked();
					if (exportAccountList->count() == 0 && exportGlobal==false)
					{
						KMessageBox::sorry ( 0, i18n ( "No profiles for export, export canceled." ) );
						exportfile.close();
						exportfile.remove();
						return false;
					}
				}
				else
				{
					KMessageBox::sorry ( 0, i18n ( "Export canceled." ) );
					exportfile.close();
					exportfile.remove();
					return false;
				}



			TQString date (__DATE__);
			TQString day= date.section(' ',0,0);
			TQString month= TQString().setNum(TQDate::fromString(date.section(' ',0,0),Qt::ISODate).month());
			TQString year= date.section(' ',2,2);
			
			TQString currentdate ( date+" "+ TQTime().currentTime().toString( "hh:mm" ) );
	
			TQTextStream ExportStream ( &exportfile );
			ExportStream << "<?xml version=\"1.0\" encoding=\"UTF-8\"?>" << "\n";
			ExportStream << "<!-- generated by kvpnc at " << currentdate<< ". Do not edit it. -->" << "\n";
			ExportStream << "<kvpnc>" << "\n";
			ExportStream << "\t<version>" << "\n";
			ExportStream << "\t\t<app>" << "0.9.2" << "</app>" << "\n";
			ExportStream << "\t\t<exportversion>" << "1" << "</exportversion>" << "\n";
			ExportStream << "\t</version>" << "\n";
	
			if (exportGlobal == true)
			{
				ExportStream << "\t<global>" << "\n";
				ExportStream << "\t\t<option name=\"Minimize after connect\"" << " type=\"bool\"" << ">" << int(minimizeAfterConnect)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Hide on startup\"" << " type=\"bool\"" << ">" << int(hideMainWindow)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Use silent quit\"" << " type=\"bool\"" << ">" << int(useSilentQuit)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Dont quit on CloseEvent\"" << " type=\"bool\"" << ">" << int(dontQuitOnCloseEvent)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Enable pppd debug\"" << " type=\"bool\"" << ">" << int(enableDebugPppd)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Enable pptpd debug\"" << " type=\"bool\"" << ">" << int(enableDebugPptpd)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Enable l2tpd debug\"" << " type=\"bool\"" << ">" << int(enableDebugL2tpd)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Enable xl2tpd debug\"" << " type=\"bool\"" << ">" << int(enableDebugXl2tpd)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Enable openl2tp debug\"" << " type=\"bool\"" << ">" << int(enableDebugOpenl2tp)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Enable FreeSWAN verbose\"" << " type=\"bool\"" << ">" << int(enableFreeswanVerbose)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Pluto Debug\"" << " type=\"stringlist\"" << ">" << PlutoDebug.join(" ") << "</option>\n";
				ExportStream << "\t\t<option name=\"Klips Debug\"" << " type=\"stringlist\"" << ">" << KlipsDebug.join(" ") << "</option>\n";
				ExportStream << "\t\t<option name=\"Show debugconsole\"" << " type=\"bool\"" << ">" << int(showDebugConsole)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Pid file for vpnc \"" << " type=\"string\"" << ">" << Vpnc_pid_file<< "</option>\n";
				ExportStream << "\t\t<option name=\"Vpnc debuglevel\"" << " type=\"int\"" << ">" << VpncDebugLevel<< "</option>\n";
				ExportStream << "\t\t<option name=\"Racoon debuglevel\"" << " type=\"string\"" << ">" << RacoonDebugLevel<< "</option>\n";
				ExportStream << "\t\t<option name=\"Kvpnc debuglevel\"" << " type=\"int\"" << ">" << KvpncDebugLevel<< "</option>\n";
				ExportStream << "\t\t<option name=\"Pppd debuglevel\"" << " type=\"bool\"" << ">" << int(PppdDebugLevel)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Pppd kernel log level\"" << " type=\"int\"" << ">" << int(PppdKernelLogLevel)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Openvpn debuglevel\"" << " type=\"int\"" << ">" << OpenvpnDebugLevel<< "</option>\n";
				ExportStream << "\t\t<option name=\"Pptp debuglevel\"" << " type=\"string\"" << ">" << PptpLogLevel<< "</option>\n";
				ExportStream << "\t\t<option name=\"Ssh debuglevel\"" << " type=\"string\"" << ">" << SshDebugLevel<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to vpnc-bin\"" << " type=\"string\"" << ">" << pathToVpnc<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to vpnclient\"" << " type=\"string\"" << ">" << pathToCiscoVpnc<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to racoon\"" << " type=\"string\"" << ">" << pathToRacoon<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to racoonctl\"" << " type=\"string\"" << ">" << pathToRacoonctl<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to setkey\"" << " type=\"string\"" << ">" << pathToSetkey<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to iptables\"" << " type=\"string\"" << ">" << pathToIptables<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to openssl\"" << " type=\"string\"" << ">" << pathToOpenssl<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to freeswan\"" << " type=\"string\"" << ">" << pathToIpsec<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to pppd\"" << " type=\"string\"" << ">" << pathToPppd<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to pptp\"" << " type=\"string\"" << ">" << pathToPptp<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to l2tpd\"" << " type=\"string\"" << ">" << pathToL2tpd<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to xl2tpd\"" << " type=\"string\"" << ">" << pathToXl2tpd<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to openl2tp\"" << " type=\"string\"" << ">" << pathToOpenl2tp<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to kill\"" << " type=\"string\"" << ">" << pathToKill<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to kill-all\"" << " type=\"string\"" << ">" << pathToKillall<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to ping\"" << " type=\"string\"" << ">" << pathToPing<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to openvpn\"" << " type=\"string\"" << ">" << pathToOpenvpn<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to iputility\"" << " type=\"string\"" << ">" << pathToIp<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to ifconfig\"" << " type=\"string\"" << ">" << pathToIfconfig<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to route\"" << " type=\"string\"" << ">" << pathToRoute<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to netstat\"" << " type=\"string\"" << ">" << pathToNetstat<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to pkcs11-tool\"" << " type=\"string\"" << ">" << pathToPkcs11Tool<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to vtund\"" << " type=\"string\"" << ">" << pathToVtund<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to cisco_cert_mgr\"" << " type=\"string\"" << ">" << pathToCiscoCertMgr<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to tail\"" << " type=\"string\"" << ">" << pathToTail<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to ssh\"" << " type=\"string\"" << ">" << pathToSsh<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to ksshaskpass\"" << " type=\"string\"" << ">" << pathToKsshAskpass<< "</option>\n";
				ExportStream << "\t\t<option name=\"Path to ssh-askpass-gnome\"" << " type=\"string\"" << ">" << pathToGnomeSshAskpass<< "</option>\n";
				ExportStream << "\t\t<option name=\"Show Statusbar\"" << " type=\"bool\"" << ">" << int(showStatusBar)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Try connect timeout\"" << " type=\"int\"" << ">" << tryConnectTimeout<< "</option>\n";
				ExportStream << "\t\t<option name=\"Last Profile\"" << " type=\"string\"" << ">" << lastProfile<< "</option>\n";
				ExportStream << "\t\t<option name=\"Write log file\"" << " type=\"bool\"" << ">" << int(writeLogFile)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Hold generated scripts\"" << " type=\"bool\"" << ">" << int(holdGeneratedScripts)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Programs in path\"" << " type=\"bool\"" << ">" << int(programsInPath)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Info logwindow color\"" << " type=\"string\"" << ">" << InfoLogColor.name() << "</option>\n";
				ExportStream << "\t\t<option name=\"Remote logwindow color\"" << " type=\"string\"" << ">" << RemoteLogColor.name() << "</option>\n";
				ExportStream << "\t\t<option name=\"Error logwindow color\"" << " type=\"string\"" << ">" << ErrorLogColor.name() << "</option>\n";
				ExportStream << "\t\t<option name=\"Success  logwindow color\"" << " type=\"string\"" << ">" << SuccessLogColor.name() << "</option>\n";
				ExportStream << "\t\t<option name=\"Debug logwindow color\"" << " type=\"string\"" << ">" << DebugLogColor.name() << "</option>\n";
				ExportStream << "\t\t<option name=\"Debug background color\"" << " type=\"string\"" << ">" << DebugBackgroundcolor.name() << "</option>\n";
				ExportStream << "\t\t<option name=\"Use colorized log output\"" << " type=\"bool\"" << ">" << int(useColorizedLogOutput)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Show interface IP in tooltip\"" << " type=\"bool\"" << ">" << int(showInterfaceIPinTooltip)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Auto connect profile\"" << " type=\"string\"" << ">" << AutoConnectProfile<< "</option>\n";
				ExportStream << "\t\t<option name=\"Do auto connect at startup\"" << " type=\"bool\"" << ">" << int(doAutoConnectAtStartup)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Log viewer font size\"" << " type=\"int\"" << ">" << LogViewerFontSize<< "</option>\n";
				ExportStream << "\t\t<option name=\"Mainwindow width\"" << " type=\"int\"" << ">" << parent->width()<< "</option>\n";
				ExportStream << "\t\t<option name=\"Mainwindow height\"" << " type=\"int\"" << ">" << parent->height()<< "</option>\n";
				ExportStream << "\t\t<option name=\"Mainwindow position x\"" << " type=\"int\"" << ">" << parent->x()<< "</option>\n";
				ExportStream << "\t\t<option name=\"Mainwindow position y\"" << " type=\"int\"" << ">" << parent->y()<< "</option>\n";
				ExportStream << "\t\t<option name=\"Openvpn management port\"" << " type=\"int\"" << ">" << int(OpenvpnManagementPort)<< "</option>\n";
				ExportStream << "\t\t<option name=\"hideOnCloseInfo\"" << " type=\"bool\"" << ">" << int(hideOnCloseInfo)<< "</option>\n";
			//   ExportStream << "\t\t<option name=\"ToolBar Settings\"" << " type=\"bool\"" << ">" << parent->toolBar( "mainToolBar" )<< "</option>\n";
				ExportStream << "\t\t<option name=\"Use KWallet\"" << " type=\"bool\"" << ">" << int(useKwallet)<< "</option>\n";
				ExportStream << "\t\t<option name=\"FeedbackMailSent\"" << " type=\"bool\"" << ">" << int(feedbackMailSent)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Do kill l2tpd if still running\"" << " type=\"bool\"" << ">" << int(doKillL2tpdIfStillRunning)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Do kill xl2tpd if still running\"" << " type=\"bool\"" << ">" << int(doKillXl2tpdIfStillRunning)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Do kill racoon if still running\"" << " type=\"bool\"" << ">" << int(doKillRacoonIfStillRunning)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Show connection time in Tooltip\"" << " type=\"bool\"" << ">" << int(showConnectionTimeInTooltip)<< "</option>\n";
				ExportStream << "\t\t<option name=\"Enable debug Openvpn\"" << " type=\"bool\"" << ">" << int(enableDebugOpenvpn)<< "</option>\n";
				ExportStream << "\t\t<option name=\"EnableDebugXl2tpdNetwork\"" << " type=\"bool\"" << ">" << int(enableDebugXl2tpdNetwork);
				ExportStream << "\t\t<option name=\"EnableDebugXl2tpdpacket\"" << " type=\"bool\"" << ">" << int(enableDebugXl2tpdpacket);
				ExportStream << "\t\t<option name=\"EnableDebugXl2tpdstate\"" << " type=\"bool\"" << ">" << int(enableDebugXl2tpdstate);
				ExportStream << "\t\t<option name=\"EnableDebugXl2tpdtunnel\"" << " type=\"bool\"" << ">" << int(enableDebugXl2tpdtunnel);

				ExportStream << "\t</global>" << "\n";
			}


			ExportStream << "\t<profiles>" << "\n";
// 			VpnAccountData *it;
			if ( !exportAccountList->isEmpty() )
			{
				for ( it = exportAccountList->first(); it; it = exportAccountList->next() )
				{
	// 			std::cout << "export profile: " << it->getName().ascii() << std::endl;
					ExportStream << "\t\t<profile name=\"" << it->getName() << "\">" << "\n";
	
					// normal config
					if ( it->getConnectionType() == VpnAccountData::cisco )
						ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" <<  "cisco" << "</option>" << "\n";
					else if ( it->getConnectionType() == VpnAccountData::ciscoorig )
						ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" <<  "ciscoorig" << "</option>" << "\n";
					else if ( it->getConnectionType() == VpnAccountData::racoon )
						ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" <<  "racoon" << "</option>" << "\n";
					else if ( it->getConnectionType() == VpnAccountData::l2tpd_racoon )
						ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" <<  "l2tpd (racoon)" << "</option>" << "\n";
					else if ( it->getConnectionType() == VpnAccountData::freeswan )
						ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" <<  "freeswan" << "</option>" << "\n";
					else if ( it->getConnectionType() == VpnAccountData::l2tpd_freeswan )
						ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" <<  "l2tpd (openswan)" << "</option>" << "\n";
					else if ( it->getConnectionType() == VpnAccountData::pptp )
						ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" <<  "pptp" << "</option>" << "\n";
					else if ( it->getConnectionType() == VpnAccountData::openvpn )
						ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" <<  "openvpn" << "</option>" << "\n";
					else
						ExportStream << "\t\t\t<option name=\"Connection type\"" << " type=\"string\"" << ">" <<  "other" << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"VPN Gateway\"" << " type=\"string\"" << ">" <<  it->getGateway() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"VPN ID\"" << " type=\"string\"" << ">" <<  it->getID() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Username\"" << " type=\"string\"" << ">" <<  it->getUserName() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Save user password\"" << " type=\"bool\"" << ">" <<  int(it->getSaveUserPassword()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Save PSK\"" << " type=\"bool\"" << ">" <<  it->getSavePsk() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Save private key password\"" << " type=\"bool\"" << ">" <<  int(it->getSavePrivateKeyPassword()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Private key\"" << " type=\"string\"" << ">" <<  it->getPrivateKey() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use advanced settings\"" << " type=\"bool\"" << ">" <<  int(it->getUseAdvancedSettings()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Application version\"" << " type=\"string\"" << ">" <<  it->getApplicationVersion() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Local port\"" << " type=\"int\"" << ">" <<  it->getLocalPort() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Remote port\"" << " type=\"int\"" << ">" <<  it->getRemotePort() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"NT domain name\"" << " type=\"string\"" << ">" <<  it->getNtDomainName() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Perfect forward secrety\"" << " type=\"string\"" << ">" <<  it->getPerfectForwardSecrety() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"IKE group\"" << " type=\"string\"" << ">" <<  it->getIkeGroup() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use application version\"" << " type=\"bool\"" << ">" <<  int(it->getUseApplicationVersion()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use global IPSec secret\"" << " type=\"bool\"" << ">" <<  int(it->getUseGlobalIpsecSecret()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use IKE group\"" << " type=\"bool\"" << ">" <<  int(it->getUseIkeGroup()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use local port\"" << " type=\"bool\"" << ">" <<  int(it->getUseLocalPort()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use remote port\"" << " type=\"bool\"" << ">" <<  int(it->getUseRemotePort()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use NT domain name\"" << " type=\"bool\"" << ">" <<  int(it->getUseNtDomainName()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use single DES\"" << " type=\"bool\"" << ">" <<  int(it->getUseSingleDes()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use perfect Forward Secrety\"" << " type=\"bool\"" << ">" <<  int(it->getUsePerfectForwardSecrety()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Remote net address\"" << " type=\"string\"" << ">" <<  it->getRemoteNetAddr() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Remote net mask\"" << " type=\"string\"" << ">" <<  it->getRemoteNetMask() << "</option>" << "\n";
	
					ExportStream << "\t\t\t<option name=\"x509 certificate\"" << " type=\"string\"" << ">" <<  it->getX509Certificate() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Ca certificate\"" << " type=\"string\"" << ">" <<  it->getCaCertificate() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Network device\"" << " type=\"string\"" << ">" <<  it->getNetworkDevice() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Cert path\"" << " type=\"string\"" << ">" <<  it->getCertPath() << "</option>" << "\n";
					if ( it->getAuthType() == VpnAccountData::cert )
						ExportStream << "\t\t\t<option name=\"Auth type\"" << " type=\"string\"" << ">" <<  "cert" << "</option>" << "\n";
					if ( it->getAuthType() == VpnAccountData::psk )
						ExportStream << "\t\t\t<option name=\"Auth type\"" << " type=\"string\"" << ">" <<  "psk" << "</option>" << "\n";
					if ( it->getAuthType() == VpnAccountData::hybrid )
						ExportStream << "\t\t\t<option name=\"Auth type\"" << " type=\"string\"" << ">" <<  "hybrid" << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"do ping ip\"" << " type=\"bool\"" << ">" <<  int(it->getDoPingIP()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Ping host IP\"" << " type=\"string\"" << ">" <<  it->getPingHostIP() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use special remote ID\"" << " type=\"bool\"" << ">" << int( it->getUseSpecialRemoteID()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use special local ID\"" << " type=\"bool\"" << ">" <<  int(it->getUseSpecialLocalID()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Special server certificate\"" << " type=\"string\"" << ">" <<  it->getSpecialServerCertificate() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use special server certificate\"" << " type=\"bool\"" << ">" << int( it->getUseSpecialServerCertificate()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Special remote ID\"" << " type=\"string\"" << ">" <<  it->getSpecialRemoteID() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Special local ID\"" << " type=\"string\"" << ">" <<  it->getSpecialLocalID() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Local ID type\"" << " type=\"string\"" << ">" <<  it->getLocalIDType() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Remote ID type\"" << " type=\"string\"" << ">" <<  it->getRemoteIDType() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use UDP-protocol\"" << " type=\"bool\"" << ">" << int( it->getUseUdp()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use UDP-port\"" << " type=\"bool\"" << ">" << int( it->getUseUdpPort()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"local UDP port\"" << " type=\"int\"" << ">" <<  it->getUdpPort() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"use DNS_UPDATE\"" << " type=\"bool\"" << ">" << int( it->getUseDnsUpdate()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"use DNS-server\"" << " type=\"bool\"" << ">" << int( it->getUseDnsServer()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"DNS server\"" << " type=\"string\"" << ">" <<  it->getDnsServer() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"refuse 40 bit encryption\"" << " type=\"bool\"" << ">" <<  int(it->getRefuse40BitEncryption() )<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"refuse 128 bit encryption\"" << " type=\"bool\"" << ">" << int( it->getRefuse128BitEncryption()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"require stateless encryption\"" << " type=\"bool\"" << ">" <<  int(it->getAllowStatefulMode()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"require mppe\"" << " type=\"bool\"" << ">" << int( it->getRequireMppe()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Disable MPPE compression\"" << " type=\"bool\"" << ">" << int( it->getDisableMPPEComp()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Local virtual IP\"" << " type=\"string\"" << ">" <<  it->getLocalVirtualIP() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Remote virtual IP\"" << " type=\"string\"" << ">" <<  it->getRemoteVirtualIP() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Pre shared key file\"" << " type=\"string\"" << ">" <<  it->getPreSharedKeyFile() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Execute command before connect\"" << " type=\"string\"" << ">" <<  it->getExecuteCmdBeforeConnect() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Execute command after connect\"" << " type=\"string\"" << ">" <<  it->getExecuteCmdAfterConnect() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Execute command before disconnect\"" << " type=\"string\"" << ">" <<  it->getExecuteCmdBeforeDisconnect() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Execute command after disconnect\"" << " type=\"string\"" << ">" <<  it->getExecuteCmdAfterDisconnect() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Command before connect\"" << " type=\"string\"" << ">" <<  it->getCommandBeforeConnect() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Command after connect\"" << " type=\"string\"" << ">" <<  it->getCommandAfterConnect() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Command before disconnect\"" << " type=\"string\"" << ">" <<  it->getCommandBeforeDisconnect() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Command after disconnect\"" << " type=\"string\"" << ">" <<  it->getCommandAfterDisconnect() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use no BSD compression\"" << " type=\"bool\"" << ">" << int( it->getUseNoBsdComp()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Do not use no IP by default\"" << " type=\"bool\"" << ">" <<  int(it->getUseNoIpDefault())<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use no deflate\"" << " type=\"bool\"" << ">" << int( it->getUseNoDeflate()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Replace default route\"" << " type=\"bool\"" << ">" <<  int(it->getReplaceDefaultRoute()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use own MTU\"" << " type=\"bool\"" << ">" <<  int(it->getUseMtu()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use own MRU\"" << " type=\"bool\"" << ">" <<  int(it->getUseMru()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"MTU for pppd\"" << " type=\"int\"" << ">" <<  it->getMtu() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"MRU for pppd\"" << " type=\"int\"" << ">" <<  it->getMru() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use virtual IP\"" << " type=\"bool\"" << ">" << int( it->getUseVirtualIP()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Virtual IP\"" << " type=\"string\"" << ">" <<  it->getVirtualIP() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"PSK is in file\"" << " type=\"bool\"" << ">" << int( it->getPskIsInFile()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use additional network routes\"" << " type=\"bool\"" << ">" <<  int(it->getUseAdditionalNetworkRoutes()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Hash algorithm\"" << " type=\"string\"" << ">" <<  it->getHashAlgo() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Encryption algorithm\"" << " type=\"string\"" << ">" <<  it->getEncryptionAlgorithm() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Authentication algorithm\"" << " type=\"string\"" << ">" <<  it->getAuthenticationAlgorithm() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Tunnel device type\"" << " type=\"string\"" << ">" <<  it->getTunnelDeviceType() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use userdefined port\"" << " type=\"bool\"" << ">" << int( it->getUseUserdefinedPort()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Userdefined port\"" << " type=\"int\"" << ">" <<  it->getUserdefinedPort() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"NS cert type\"" << " type=\"string\"" << ">" <<  it->getNsCertType() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use NS cert type\"" << " type=\"bool\"" << ">" <<  int(it->getUseNsCertType() )<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use connection status check\"" << " type=\"bool\"" << ">" << int( it->getUseConnectionStatusCheck()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Connection check success count\"" << " type=\"int\"" << ">" <<  it->getConnectionStatusCheckSuccessCount() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Connection check status interval\"" << " type=\"int\"" << ">" <<  it->getConnectionStatusInterval() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Do reconnect after connection lost\"" << " type=\"bool\"" << ">" <<  int(it->getDoReconnectAfterConnectionLost())<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Disable LZO compression\"" << " type=\"bool\"" << ">" << int( it->getDisableLzoCompression())<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"AuthWithUsernameAndPassword\"" << " type=\"bool\"" << ">" << int( it->getAuthWithUsernameAndPassword()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"AllowEmptyGroupPassword\"" << " type=\"bool\"" << ">" << int( it->getAllowEmptyGroupPassword()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use userdefinied cipher\"" << " type=\"bool\"" << ">" <<  int(it->getUseUserdefiniedCipher()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Userdefinied cipher\"" << " type=\"string\"" << ">" <<  it->getUserdefiniedCipher() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use redirect gateway\"" << " type=\"bool\"" << ">" << int( it->getUseRedirectGateway()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use TLS auth\"" << " type=\"bool\"" << ">" <<  int(it->getUseTlsAuth()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"TLS auth file\"" << " type=\"string\"" << ">" <<  it->getTlsAuthFile() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use HTTP proxy\"" << " type=\"bool\"" << ">" << int( it->getUseHttpProxy()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"HTTP proxy host\"" << " type=\"string\"" << ">" <<  it->getHttpProxy() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"HTTP proxy port\"" << " type=\"int\"" << ">" <<  it->getHttpProxyPort() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"HTTP proxy timeout\"" << " type=\"int\"" << ">" <<  it->getHttpProxyTimeout() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Dont save username\"" << " type=\"bool\"" << ">" << int( it->getDontSaveUsername()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use mode config\"" << " type=\"bool\"" << ">" <<  int(it->getUseModeConfig()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Exchange mode\"" << " type=\"string\"" << ">" <<  it->getExchangeMode() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use delay at reconnect\"" << " type=\"bool\"" << ">" << int( it->getUseReconnectDelay()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Reconnect delay\"" << " type=\"int\"" << ">" <<  it->getReconnectDelay() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use TLS host\"" << " type=\"bool\"" << ">" <<  int(it->getUseTlsRemoteHost()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"TLS remote host\"" << " type=\"string\"" << ">" <<  it->getTlsRemoteHost() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Disable opportunistic encryption\"" << " type=\"bool\"" << ">" << int( it->getDisableOpportunisticEncryption() )<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Right next hop\"" << " type=\"string\"" << ">" <<  it->getRightNextHop() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Left next hop\"" << " type=\"string\"" << ">" <<  it->getLeftNextHop() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use userdefinied packet size for fragmentation\"" << " type=\"bool\"" << ">" <<  it->getUseFragment() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use userdef packet size\"" << " type=\"bool\"" << ">" << int( it->getUseMssfix()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Fragment\"" << " type=\"int\"" << ">" <<  it->getFragment() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"PeerTimeout\"" << " type=\"int\"" << ">" <<  it->getPeerTimeout() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Disable CCP\"" << " type=\"bool\"" << ">" << int( it->getDisableCcp()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use smartcard\"" << " type=\"bool\"" << ">" <<int(  it->getUseSmartcard()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use Xauth interactive\"" << " type=\"bool\"" << ">" <<  it->getUseXauthInteractive() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use HTTP Proxy Authentication\"" << " type=\"bool\"" << ">" << int( it->getUseHttpProxyAuth() )<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"HTTP Proxy Authtype\"" << " type=\"string\"" << ">" <<  it->getHttpProxyAuthType() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use HTTP Proxy Auth user\"" << " type=\"string\"" << ">" << it->getHttpProxyUser() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use HTTP Proxy Auth pass\"" << " type=\"string\"" << ">" << it->getHttpProxyPass() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use only CA cert and user auth\"" << " type=\"bool\"" << ">" <<int(  it->getUseOnlyCaCertAndUserAuth()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use mail address as identifier\"" << " type=\"bool\"" << ">" <<int(  it->getUseMailAddressAsIdentifier()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use right next hop\"" << " type=\"bool\"" << ">" << int( it->getUseRightNextHop()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use left next hop\"" << " type=\"bool\"" << ">" <<  int(it->getUseLeftNextHop())<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Pkcs11 providers\"" << " type=\"string\"" << ">" <<  it->getPkcs11Providers() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Pkcs11 slot type\"" << " type=\"string\"" << ">" <<  it->getPkcs11SlotType() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Pkcs11 slot\"" << " type=\"string\"" << ">" <<  it->getPkcs11Slot() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Pkcs11 id type\"" << " type=\"string\"" << ">" <<  it->getPkcs11IdType() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Pkcs11 id\"" << " type=\"string\"" << ">" <<  it->getPkcs11Id() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Pkcs11 sign mode\"" << " type=\"string\"" << ">" <<  it->getPkcs11SignMode() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use Pkcs11 providers\"" << " type=\"bool\"" << ">" << int( it->getUsePkcs11Providers()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Allow empty private key password\"" << " type=\"bool\"" << ">" << int( it->getAllowEmptyPrivateKeyPassword())<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Allow ip address change of peer\"" << " type=\"bool\"" << ">" <<  int(it->getAllowIpAddressChangeOfPeer())<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Auth method\"" << " type=\"string\"" << ">" <<  it->getAuthMethod()<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Command after connect delay time\"" << " type=\"string\"" << ">" <<  it->getCommandAfterConnectDelayTime()<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use search domain in resolv conf\"" << " type=\"bool\"" << ">" <<int( it->getUseSearchDomainInResolvConf())<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use domain in resolv conf\"" << " type=\"bool\"" << ">" <<int( it->getUseDomainInResolvConf())<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Search domain in resolv conf\"" << " type=\"string\"" << ">" <<it->getSearchDomainInResolvConf()<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Domain in resolv conf\"" << " type=\"string\"" << ">" <<it->getDomainInResolvConf()<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Authentication direction\"" << " type=\"string\"" << ">" << it->getAuthenticationDirection()<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"CiscoNatMode\"" << " type=\"string\"" << ">" << it->getCiscoNatMode()<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"IPSec ESP\"" << " type=\"string\"" << ">" << it->getIpsecEsp()<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"IPSec IKE\"" << " type=\"string\"" << ">" << it->getIpsecIke()<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Vtun profile\"" << " type=\"string\"" << ">" << it->getVtunProfile()<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Disable data encryption\"" << " type=\"bool\"" << ">" <<int( it->getDisableDataEncryption())<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use authentication algorithm\"" << " type=\"bool\"" << ">" <<int( it->getUseAuthenticationAlgorithm())<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Fix path mtu discovery problem\"" << " type=\"bool\"" << ">" <<int( it->getFixPathMtuDiscoveryProblem()) <<  "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use remote network\"" << " type=\"bool\"" << ">" <<int( it->getUseRemoteNetwork()) <<  "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Ipsec vpn mode\"" << " type=\"string\"" << ">" <<it->getIpsecVpnMode() <<  "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"DisableHeaderCompression\"" << " type=\"bool\"" << ">" <<int( it->getDisableHeaderCompression()) <<  "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"DisableMagicNumberNegotiation\"" << " type=\"bool\"" << ">" <<int( it->getDisableMagicNumberNegotiation()) <<  "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"DisableIpx\"" << " type=\"bool\"" << ">" <<int( it->getDisableIpx()) <<  "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Disable protocol field compression\"" << " type=\"bool\"" << ">" <<int( it->getDisableProtocolFieldCompression()) <<  "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Disable adress control compression\"" << " type=\"bool\"" << ">" <<int( it->getDisableAdressControlCompression()) <<  "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use custom ike\"" << " type=\"bool\"" << ">" <<int(it->getUseCustomIke()) <<  "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use custom esp\"" << " type=\"bool\"" << ">" <<int(it->getUseCustomEsp()) <<  "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Verify ca cert\"" << " type=\"bool\"" << ">" <<int(it->getVerifyCaCert()) <<  "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use DPD idle timeout\"" << " type=\"bool\"" << ">" <<int(it->getUseDpdIdleTimeout()) <<  "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"DPD idle timeout\"" << " type=\"int\"" << ">" <<  it->getDpdIdleTimeout() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Hide group password in accountdata dialog\"" << " type=\"bool\"" << ">" <<int(it->getHideGroupPasswordInAccountDataDialog()) <<  "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"MaxConnectTries\"" << " type=\"int\"" << ">" <<  it->getMaxConnectTries() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"L2tpDaemon\"" << " type=\"int\"" << ">" <<  it->getL2tpDaemon() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"UseLeftSourceIp\"" << " type=\"bool\"" << ">" <<int(it->getUseLeftSourceIp()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"UseRightSourceIp\"" << " type=\"bool\"" << ">" <<int(it->getUseRightSourceIp()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"LeftSourceIp\"" << " type=\"string\"" << ">" << it->getLeftSourceIp() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"RightSourceIp\"" << " type=\"string\"" << ">" << it->getRightSourceIp() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Use virtual subnets\"" << " type=\"bool\"" << ">" <<int(it->getUseVirtualSubnetworks()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"Virtual subnets\"" << " type=\"string\"" << ">" <<it->getVirtualSubnetworks() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"DisablePushFromServer\"" << " type=\"bool\"" << ">" <<int(it->getDisablePushFromServer()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"DisableBind\"" << " type=\"bool\"" << ">" <<int(it->getDisableBind()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"UseRenegSec\"" << " type=\"bool\"" << ">" <<int(it->getUseRenegSec()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"RenegSec\"" << " type=\"int\"" << ">" << it->getRenegSec() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"UseTunnelPing\"" << " type=\"bool\"" << ">" <<int(it->getUseTunnelPing())  << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"TunnelPing\"" << " type=\"int\"" << ">" << it->getTunnelPing() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"UseTunnelPingRestart\"" << " type=\"bool\"" << ">" <<int( it->getUseTunnelPingRestart()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"TunnelPingRestart\"" << " type=\"int\"" << ">" <<  it->getTunnelPingRestart() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"RequireEap\"" << " type=\"bool\"" << ">" <<int( it->getRequireEap()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"UseSshConfigRemoteScript\"" << " type=\"bool\"" << ">" <<int( it->getUseSshConfigRemoteScript()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"SshConfigRemoteScript\"" << " type=\"string\"" << ">" << it->getSshConfigRemoteScript() << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"AskUserPasswordOnEachConnect\"" << " type=\"bool\"" << ">" <<int( it->getAskUserPasswordOnEachConnect()) << "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"UseCiscoCertStore\"" << " type=\"bool\"" << ">" <<int( it->getUseCiscoCertStore())<< "</option>" << "\n";
					ExportStream << "\t\t\t<option name=\"UseNat\"" << " type=\"bool\"" << ">" <<int( it->getUseNat())<< "</option>" << "\n";

					ExportStream << "\t\t</profile>" << "\n";
					exportCount++;
				}
	
			}
			ExportStream << "\t</profiles>" << "\n";
			ExportStream << "</kvpnc>" << "\n";
			exportfile.close();
		}
		else
		{
			KMessageBox::error ( 0, i18n ( "Creating of \"%1\" has been failed!" ).arg ( filename ) );
			return false;
		}
	}
	else
	{
		KMessageBox::information ( 0, i18n ( "Export canceled." ) );
		return false;
	}
	TQString msg="";
	if (exportCount > 0 && exportGlobal==true)
		msg = i18n("Export was successful. %1 profiles and global settings are exported.").arg(TQString::number(exportCount));
	if (exportCount > 0 && exportGlobal==false)
		msg = i18n("Export was successful. %1 profiles are exported.").arg(TQString::number(exportCount));
	if (exportCount < 1 && exportGlobal==true)
		msg = i18n("Export was successful. Global settings are exported.");
	KMessageBox::information ( 0, msg,i18n("Export success") );
	return true;
}

bool KVpncConfig::importKvpncConfig(TQString filename, TQString& RetName, bool& openProfileManager)
{
	TQFile importfile (filename);
	if (!importfile.exists())
	{
		KMessageBox::error ( 0, i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ) );
		return false;
	}
	TQString kvpncexportversion="";

	TQString pathToVpnc;
	TQString pathToCiscoVpnc;
	TQString pathToRacoon;
	TQString pathToRacoonctl;
	TQString pathToSetkey;
	TQString pathToIptables;
	TQString pathToOpenssl;
	TQString pathToIpsec;
	TQString pathToPppd;
	TQString pathToPptp;
	TQString pathToL2tpd;
	TQString pathToXl2tpd;
	TQString pathToOpenl2tp;
	TQString pathToKill;
	TQString pathToKillall;
	TQString pathToPing;
	TQString pathToOpenvpn;
	TQString pathToIp;
	TQString pathToIfconfig;
	TQString pathToRoute;
	TQString pathToNetstat;
	TQString pathToPkcs11Tool;
	TQString pathToVtund;
	TQString pathToCiscoCertMgr;
	TQString pathToTail;
	TQString pathToSsh;
	TQString pathToKsshAskpass;
	TQString pathToGnomeSshAskpass;
	TQString AutoConnectProfile;
	TQString RacoonDebugLevel;
	TQString Vpnc_pid_file;
	TQString Pppd_pid_file;
	TQString lastProfile;
	TQString logfileName;

	TQString TmpPassword; //< from enter password dialog
	TQString TmpGroupPassword; //< from enter password dialog
	TQString TmpUsername; //< from enter password dialog
	TQString TmpPrivKeyPassStr;
	TQString TmpGatewayIP;
	TQString TmpXauthInterPasscode; //< from Xauth interactive passcode dialog
	TQString TmpPrivateKeyPass;
	TQString TmpHttpProxyPassword;

	bool minimizeAfterConnect=true;
	bool showDebugConsole=true;
	bool writeLogFile=true;
	bool useDefaultPaths=true;
	bool useSilentQuit=false;
	bool holdGeneratedScripts=true;
	bool programsInPath=true;
	bool enableDebugPppd=false;
	bool enableDebugPptpd=false;
	bool enableDebugL2tpd=false;
	bool enableDebugXl2tpd=false;
	bool enableDebugOpenl2tp=false;
	bool enableFreeswanVerbose=false;
	bool enableDebugOpenvpn=false;
	bool useColorizedLogOutput=true;
	bool showInterfaceIPinTooltip=true;
	bool dontQuitOnCloseEvent=true;
	bool doAutoConnectAtStartup=false;
	bool useKwallet=true;
	bool showStatusBar=true;
	bool showToolBar=true;
	bool hideMainWindow=false;
	bool PppdDebugLevel=false;
	bool firstUseOfKwallet=false;
	bool shutdownIsCalled=false;
	bool skipKwalletStoring=false;
	bool hideOnCloseInfo=false;
	bool feedbackMailSent=false;
	bool doKillL2tpdIfStillRunning=false;
	bool doKillXl2tpdIfStillRunning=false;
	bool doKillRacoonIfStillRunning=false;
	bool showConnectionTimeInTooltip=false;

	int VpncDebugLevel=0;
	int KvpncDebugLevel=1;
	int OpenvpnDebugLevel=0;
	int PptpLogLevel=0;
	int SshDebugLevel=0;
	int PppdKernelLogLevel=0;
	int LogViewerFontSize=10;
	int mainwindow_pos_x=10;
	int mainwindow_pos_y=10;
	int mainwindow_height=600;
	int mainwindow_width=800;
	int connectSleepDelay=10;
	int connectSleepRetry=3;
	int tryConnectTimeout=30;
	int connectionStartTime=0;
	int runningCheckCounter=0;
	int runningCheckTimeout=0;
	int OpenvpnManagementPort=2222;
	TQPtrList<VpnAccountData> *ImportedAccountList;

	TQColor InfoLogColor;
	TQColor RemoteLogColor;
	TQColor ErrorLogColor;
	TQColor SuccessLogColor;
	TQColor DebugLogColor;
	TQColor DebugBackgroundcolor;

	TQPoint pos;
	TQPoint WindowPos;
	TQSize WindowSize;

	bool importGlobal=false;
	int importCount=0;
	
	TQDomDocument doc( "kvpncsettingsdoc" );
	if( importfile.open(IO_ReadOnly))
	{
		TQApplication::setOverrideCursor( TQCursor(TQt::WaitCursor) );
	
		if ( !doc.setContent( &importfile ) ) {
			importfile.close();
                      	KMessageBox::error ( 0, i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ) );
			appendLogEntry (i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ), error);
			TQApplication::restoreOverrideCursor();
			return false;
		}
		importfile.close();
	
		// print out the element names of all elements that are direct children
		// of the outermost element.
		TQDomElement docElem = doc.documentElement();
	
		TQDomNode n = docElem.firstChild();
		if (KvpncDebugLevel > 5)
			std::cout << "dom doc:" << std::endl;
		while( !n.isNull() ) 
		{
			if (n.toElement().tagName()  == "version")
			{
				if (KvpncDebugLevel > 5)
					std::cout << "version tag found." << std::endl;
				TQDomNodeList vsubnodes = n.toElement().childNodes();
				for (int i=0;i<=(int)vsubnodes.count();i++)
				{
					TQDomNode n1 = vsubnodes.item(i);
					if (n1.toElement().tagName() == "app")
					{
						if (KvpncDebugLevel > 5)
							std::cout << " doc was created from kvpnc ver " << n1.toElement().text() << std::endl;
					}
					if (n1.toElement().tagName() == "exportversion")
					{
						kvpncexportversion = n1.toElement().text();
						if (KvpncDebugLevel > 5)
							std::cout << " doc was created from kvpnc with exportver " << n1.toElement().text() << std::endl;
					}
				}
			}

			if (n.toElement().tagName()  == "global")
			{
				if (KvpncDebugLevel > 5)
					std::cout << "gobal tag found." << std::endl;
				TQDomNodeList vsubnodes = n.toElement().childNodes();
				for (int i=0;i<=(int)vsubnodes.count();i++)
				{
					TQDomNode n1 = vsubnodes.item(i);
					if (n1.toElement().tagName() != "")
					{
						if (KvpncDebugLevel > 5)
							std::cout << "	=> option: " << ", value: " << n1.toElement().text() <<  std::endl;
					}
					if ( n1.toElement().tagName() == "Minimize after connect" ) { minimizeAfterConnect = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Hide on startup" ) { hideMainWindow = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Use silent quit" ) { useSilentQuit = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Dont quit on CloseEvent" ) { dontQuitOnCloseEvent = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Enable pppd debug" ) { enableDebugPppd = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Enable pptpd debug" ) { enableDebugPptpd = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Enable l2tpd debug" ) { enableDebugL2tpd = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Enable xl2tpd debug" ) { enableDebugXl2tpd = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Enable openl2tp debug" ) { enableDebugOpenl2tp = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Enable FreeSWAN verbose" ) { enableFreeswanVerbose = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Pluto Debug" ) { PlutoDebug = TQStringList::split(' ', n1.toElement().text()); }
					else if ( n1.toElement().tagName() == "Klips Debug" ) { KlipsDebug = TQStringList::split(' ', n1.toElement().text()); }
					else if ( n1.toElement().tagName() == "Show debugconsole" ) { showDebugConsole = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Pid file for vpnc " ) { Vpnc_pid_file = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Vpnc debuglevel" ) { VpncDebugLevel = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Racoon debuglevel" ) { RacoonDebugLevel = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Kvpnc debuglevel" ) { KvpncDebugLevel = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Pppd debuglevel" ) { PppdDebugLevel = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Pppd kernel log level" ) { PppdKernelLogLevel = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Openvpn debuglevel" ) { OpenvpnDebugLevel = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Pptp debuglevel" ) { PptpLogLevel = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Ssh debuglevel" ) { SshDebugLevel = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Path to vpnc-bin" ) { pathToVpnc = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to vpnclient" ) { pathToCiscoVpnc = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to racoon" ) { pathToRacoon = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to racoonctl" ) { pathToRacoonctl = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to setkey" ) { pathToSetkey = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to iptables" ) { pathToIptables = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to openssl" ) { pathToOpenssl = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to freeswan" ) { pathToIpsec = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to pppd" ) { pathToPppd = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to pptp" ) { pathToPptp = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to l2tpd" ) { pathToL2tpd = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to xl2tpd" ) { pathToXl2tpd = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to openl2tp" ) { pathToOpenl2tp = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to kill" ) { pathToKill = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to kill-all" ) { pathToKillall = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to ping" ) { pathToPing = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to openvpn" ) { pathToOpenvpn = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to iputility" ) { pathToIp = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to ifconfig" ) { pathToIfconfig = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to route" ) { pathToRoute = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to netstat" ) { pathToNetstat = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to pkcs11-tool" ) { pathToPkcs11Tool = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to vtund" ) { pathToVtund = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to cisco_cert_mgr" ) { pathToCiscoCertMgr = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to tail" ) { pathToTail = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to ssh" ) { pathToSsh = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to ksshaskpass" ) { pathToKsshAskpass = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Path to ssh-askpass-gnome" ) { pathToGnomeSshAskpass = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Show Statusbar" ) { showStatusBar = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Try connect timeout" ) { tryConnectTimeout = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Last Profile" ) { lastProfile = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Write log file" ) { writeLogFile = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Hold generated scripts" ) { holdGeneratedScripts = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Programs in path" ) { programsInPath = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Info logwindow color" ) { InfoLogColor.name()  = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Remote logwindow color" ) { RemoteLogColor.name()  = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Error logwindow color" ) { ErrorLogColor.name()  = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Success  logwindow color" ) { SuccessLogColor.name()  = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Debug logwindow color" ) { DebugLogColor.name()  = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Debug background color" ) { DebugBackgroundcolor.name()  = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Use colorized log output" ) { useColorizedLogOutput = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Show interface IP in tooltip" ) { showInterfaceIPinTooltip = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Auto connect profile" ) { AutoConnectProfile = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Do auto connect at startup" ) { doAutoConnectAtStartup = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Log viewer font size" ) { LogViewerFontSize = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Mainwindow width" ) { mainwindow_width = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Mainwindow height" ) { mainwindow_height = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Mainwindow position x" ) { mainwindow_pos_x = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Mainwindow position y" ) { mainwindow_pos_y = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Openvpn management port" ) { OpenvpnManagementPort = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "hideOnCloseInfo" ) { hideOnCloseInfo = n1.toElement().text().toInt(); }
					//   else if (n1.toElement().tagName() == "ToolBar Settings") { parent->toolBar( "mainToolBar" ) = n1.toElement().text(); }
					else if ( n1.toElement().tagName() == "Use KWallet" ) { useKwallet = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "FeedbackMailSent" ) { feedbackMailSent = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Do kill l2tpd if still running" ) { doKillL2tpdIfStillRunning = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Do kill xl2tpd if still running" ) { doKillXl2tpdIfStillRunning = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Do kill racoon if still running" ) { doKillRacoonIfStillRunning = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Show connection time in Tooltip" ) { showConnectionTimeInTooltip = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "Enable debug Openvpn" ) { enableDebugOpenvpn = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "EnableDebugXl2tpdNetwork") { enableDebugXl2tpdNetwork  = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "EnableDebugXl2tpdpacket" ) { enableDebugXl2tpdpacket = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "EnableDebugXl2tpdstate" ) { enableDebugXl2tpdstate = n1.toElement().text().toInt(); }
					else if ( n1.toElement().tagName() == "EnableDebugXl2tpdtunnel") {  enableDebugXl2tpdtunnel = n1.toElement().text().toInt(); }
				}
			}

			if (n.toElement().tagName()  == "profiles")
			{
				if (KvpncDebugLevel > 5)
					std::cout << "profiles tag found." << std::endl;

				ImportedAccountList = new TQPtrList<VpnAccountData>();
				ImportedAccountList->setAutoDelete( TRUE ); // the list owns the objects

				TQDomNodeList profiles_subnodes = n.toElement().childNodes();
				for (int i=0;i<=(int)profiles_subnodes.count();i++)
				{
					TQDomNode n1 = profiles_subnodes.item(i);
					if (n1.toElement().attribute("name") != "")
					{
						if (KvpncDebugLevel > 5)
							std::cout << "profile: " << n1.toElement().attribute("name") << std::endl;
						TQString name =  n1.toElement().attribute("name");
						VpnAccountData *data = new VpnAccountData( VpnAccountData::cisco, name); // cisco is a dummy here, it will be set later
						data->setDescription(i18n("import from ")+filename);

						TQDomNodeList profile_subnodes = n1.toElement().childNodes();
						for (int j=0;j<=(int)profile_subnodes.count();j++)
						{
							TQDomNode n2 = profile_subnodes.item(j);
							if (n2.toElement().attribute("name") != "")
							{
								TQString elementname= n2.toElement().attribute("name");
								TQString elementvalue = n2.toElement().text();
								if (KvpncDebugLevel > 5)
									std::cout << "	=> option: " << elementname << ", value: " << elementvalue <<  std::endl;
								// normal config
								if (elementname == "Connection type")
								{  
									TQString type = elementvalue;
									VpnAccountData::ConnectionType ConnType = VpnAccountData::ConnectionType( VpnAccountData::cisco );
									if ( type == "cisco" )
										ConnType = VpnAccountData::cisco;
									else if ( type == "ciscoorig" )
										ConnType = VpnAccountData::ciscoorig;
									else if ( type == "racoon" )
										ConnType = VpnAccountData::racoon;
									else if ( type == "l2tpd (racoon)" )
										ConnType = VpnAccountData::l2tpd_racoon;
									else if ( type == "freeswan" )
										ConnType = VpnAccountData::freeswan;
									else if ( type == "l2tpd (openswan)" )
										ConnType = VpnAccountData::l2tpd_freeswan;
									else if ( type == "pptp" )
										ConnType = VpnAccountData::pptp;
									else if ( type == "openvpn" )
										ConnType = VpnAccountData::openvpn;
									else if ( type == "vtun" )
										ConnType = VpnAccountData::vtun;
									else if ( type == "ssh" )
										ConnType = VpnAccountData::ssh;

									else
										ConnType = VpnAccountData::other;
									data->setConnectionType(ConnType);
// 									std::cout << " ==> type: " << type << std::endl;
								}
			
								else if (elementname == "VPN Gateway") {  data->setGateway(elementvalue); }
								else if (elementname == "VPN ID") {  data->setID(elementvalue); }
								else if (elementname == "Username") {  data->setUserName(elementvalue); }
				
								else if (elementname == "Save user password") {  data->setSaveUserPassword(elementvalue.toInt()); }
								else if (elementname == "Save PSK") {  data->setSavePsk(elementvalue.toInt()); }
								else if (elementname == "Save private key password") {  data->setSavePrivateKeyPassword(elementvalue.toInt()); }
								else if (elementname == "Private key") {  data->setPrivateKey(elementvalue); }
								else if (elementname == "Use advanced settings") {  data->setUseAdvancedSettings(elementvalue.toInt()); }
								else if (elementname == "Application version") {  data->setApplicationVersion(elementvalue); }
								else if (elementname == "Local port") {  data->setLocalPort(elementvalue.toInt()); }
								else if (elementname == "Remote port") {  data->setRemotePort(elementvalue.toInt()); }
								else if (elementname == "NT domain name") {  data->setNtDomainName(elementvalue); }
								else if (elementname == "Perfect forward secrety") {  data->setPerfectForwardSecrety(elementvalue); }
								else if (elementname == "IKE group") {  data->setIkeGroup(elementvalue); }
								
								else if (elementname == "Use application version") {  data->setUseApplicationVersion(elementvalue.toInt()); }
								else if (elementname == "Use global IPSec secret") {  data->setUseGlobalIpsecSecret(elementvalue.toInt()); }
								else if (elementname == "Use IKE group") {  data->setUseIkeGroup(elementvalue.toInt()); }
								else if (elementname == "Use local port") {  data->setUseLocalPort(elementvalue.toInt()); }
								else if (elementname == "Use remote port") {  data->setUseRemotePort(elementvalue.toInt()); }
								else if (elementname == "Use NT domain name") {  data->setUseNtDomainName(elementvalue.toInt()); }
								else if (elementname == "Use single DES") {  data->setUseSingleDes(elementvalue.toInt()); }
								else if (elementname == "Use perfect Forward Secrety") {  data->setUsePerfectForwardSecrety(elementvalue.toInt()); }
								else if (elementname == "Remote net address") {  data->setRemoteNetAddr(elementvalue); }
								else if (elementname == "Remote net mask") {  data->setRemoteNetMask(elementvalue); }
				
								else if (elementname == "x509 certificate") {  data->setX509Certificate(elementvalue); }
								else if (elementname == "Ca certificate") {  data->setCaCertificate(elementvalue); }
								else if (elementname == "Network device") {  data->setNetworkDevice(elementvalue); }
								else if (elementname == "Cert path") {  data->setCertPath(elementvalue); }
								
								else if (elementname == "Auth type")
								{
									TQString Authtype = elementvalue;
									if (Authtype == "cert")
										data->setAuthType(VpnAccountData::cert);
									else if (Authtype == "psk")
										data->setAuthType(VpnAccountData::psk);
									else if (Authtype == "hybrid")
										data->setAuthType(VpnAccountData::hybrid);
									else
										data->setAuthType( VpnAccountData::unknownauth);

									if ((data->getConnectionType() == VpnAccountData::pptp || data->getConnectionType() == VpnAccountData::openvpn ) && (Authtype != "cert" && Authtype == "psk"))
										data->setAuthType(VpnAccountData::cert);

								}
								else if (elementname == "do ping ip") {  data->setDoPingIP(elementvalue.toInt()); }
								else if (elementname == "Ping host IP") {  data->setPingHostIP(elementvalue); }
				
								else if (elementname == "Special server certificate") {  data->setSpecialServerCertificate(elementvalue); }
								else if (elementname == "Use special server certificate") {  data->setUseSpecialServerCertificate(elementvalue.toInt()); }
								else if (elementname == "Special remote ID") {  data->setSpecialRemoteID(elementvalue); }
								else if (elementname == "Special local ID") {  data->setSpecialLocalID(elementvalue); }
								else if (elementname == "Local ID type") {  data->setLocalIDType(elementvalue); }
								else if (elementname == "Remote ID type") {  data->setRemoteIDType(elementvalue); }
								else if (elementname == "Use UDP-protocol") {  data->setUseUdp(elementvalue.toInt()); }
								else if (elementname == "Use UDP-port") {  data->setUseUdpPort(elementvalue.toInt()); }
								else if (elementname == "local UDP port") {  data->setUdpPort(elementvalue.toInt()); }
								else if (elementname == "use DNS_UPDATE") {  data->setUseDnsUpdate(elementvalue.toInt()); }
								else if (elementname == "use DNS-server") {  data->setUseDnsServer(elementvalue.toInt()); }
								else if (elementname == "DNS server") {  data->setDnsServer(elementvalue); }
								else if (elementname == "refuse 40 bit encryption") {  data->setRefuse40BitEncryption(elementvalue.toInt()); }
								else if (elementname == "refuse 128 bit encryption") {  data->setRefuse128BitEncryption(elementvalue.toInt()); }
								else if (elementname == "require stateless encryption") {  data->setAllowStatefulMode(elementvalue.toInt()); }
								else if (elementname == "require mppe") {  data->setRequireMppe(elementvalue.toInt()); }
								else if (elementname == "Disable MPPE compression") {  data->setDisableMPPEComp(elementvalue.toInt()); }
								else if (elementname == "Local virtual IP") {  data->setLocalVirtualIP(elementvalue); }
								else if (elementname == "Remote virtual IP") {  data->setRemoteVirtualIP(elementvalue); }
								else if (elementname == "Pre shared key file") {  data->setPreSharedKeyFile(elementvalue); }
								else if (elementname == "Execute command before connect") {  data->setExecuteCmdBeforeConnect(elementvalue.toInt()); }
								else if (elementname == "Execute command after connect") {  data->setExecuteCmdAfterConnect(elementvalue.toInt()); }
								else if (elementname == "Execute command before disconnect") {  data->setExecuteCmdBeforeDisconnect(elementvalue.toInt()); }
								else if (elementname == "Execute command after disconnect") {  data->setExecuteCmdAfterDisconnect(elementvalue.toInt()); }
								else if (elementname == "Command before connect") {  data->setCommandBeforeConnect(elementvalue); }
								else if (elementname == "Command after connect") {  data->setCommandAfterConnect(elementvalue); }
								else if (elementname == "Command before disconnect") {  data->setCommandBeforeDisconnect(elementvalue); }
								else if (elementname == "Command after disconnect") {  data->setCommandAfterDisconnect(elementvalue); }
								else if (elementname == "Use no BSD compression") {  data->setUseNoBsdComp(elementvalue.toInt()); }
								else if (elementname == "Do not use no IP by default") {  data->setUseNoIpDefault(elementvalue.toInt()); }
								else if (elementname == "Use no deflate") {  data->setUseNoDeflate(elementvalue.toInt()); }
								else if (elementname == "Replace default route") {  data->setReplaceDefaultRoute(elementvalue.toInt()); }
								else if (elementname == "Use own MTU") {  data->setUseMtu(elementvalue.toInt()); }
								else if (elementname == "Use own MRU") {  data->setUseMru(elementvalue.toInt()); }
								else if (elementname == "MTU for pppd") {  data->setMtu(elementvalue.toInt()); }
								else if (elementname == "MRU for pppd") {  data->setMru(elementvalue.toInt()); }
								else if (elementname == "Use virtual IP") {  data->setUseVirtualIP(elementvalue.toInt()); }
								else if (elementname == "Virtual IP") {  data->setVirtualIP(elementvalue); }
								else if (elementname == "PSK is in file") {  data->setPskIsInFile(elementvalue.toInt()); }
								else if (elementname == "Use additional network routes") {  data->setUseAdditionalNetworkRoutes(elementvalue.toInt()); }
								else if (elementname == "Hash algorithm") {  data->setHashAlgo(elementvalue); }
								else if (elementname == "Encryption algorithm") {  data->setEncryptionAlgorithm(elementvalue); }
								else if (elementname == "Authentication algorithm") {  data->setAuthenticationAlgorithm(elementvalue); }
								else if (elementname == "Tunnel device type") {  data->setTunnelDeviceType(elementvalue); }
								else if (elementname == "Use userdefined port") {  data->setUseUserdefinedPort(elementvalue.toInt()); }
								else if (elementname == "Userdefined port") {  data->setUserdefinedPort(elementvalue.toInt()); }
								else if (elementname == "NS cert type") {  data->setNsCertType(elementvalue); }
								else if (elementname == "Use NS cert type") {  data->setUseNsCertType(elementvalue.toInt()); }
								else if (elementname == "Use connection status check") {  data->setUseConnectionStatusCheck(elementvalue.toInt()); }
								else if (elementname == "Connection check success count") {  data->setConnectionStatusCheckSuccessCount(elementvalue.toInt()); }
								else if (elementname == "Connection check status interval") {  data->setConnectionStatusInterval(elementvalue.toInt()); }
								else if (elementname == "Do reconnect after connection lost") {  data->setDoReconnectAfterConnectionLost(elementvalue.toInt()); }
								else if (elementname == "Disable LZO compression") {  data->setDisableLzoCompression(elementvalue.toInt()); }
								else if (elementname == "AuthWithUsernameAndPassword") {  data->setAuthWithUsernameAndPassword(elementvalue.toInt()); }
								else if (elementname == "AllowEmptyGroupPassword") {  data->setAllowEmptyGroupPassword(elementvalue.toInt()); }
								else if (elementname == "Use userdefinied cipher") {  data->setUseUserdefiniedCipher(elementvalue.toInt()); }
								else if (elementname == "Userdefinied cipher") {  data->setUserdefiniedCipher(elementvalue); }
								else if (elementname == "Use redirect gateway") {  data->setUseRedirectGateway(elementvalue.toInt()); }
				// 				appPointer->processEvents(<< "</option>") { "\n";
								else if (elementname == "Use TLS auth") {  data->setUseTlsAuth(elementvalue.toInt()); }
								else if (elementname == "TLS auth file") {  data->setTlsAuthFile(elementvalue); }
								else if (elementname == "Use HTTP proxy") {  data->setUseHttpProxy(elementvalue.toInt()); }
								else if (elementname == "HTTP proxy host") {  data->setHttpProxy(elementvalue); }
								else if (elementname == "HTTP proxy port") {  data->setHttpProxyPort(elementvalue.toInt()); }
								else if (elementname == "HTTP proxy timeout") {  data->setHttpProxyTimeout(elementvalue.toInt()); }
								else if (elementname == "Dont save username") {  data->setDontSaveUsername(elementvalue.toInt()); }
								else if (elementname == "Use mode config") {  data->setUseModeConfig(elementvalue.toInt()); }
								else if (elementname == "Exchange mode") {  data->setExchangeMode(elementvalue); }
								else if (elementname == "Use delay at reconnect") {  data->setUseReconnectDelay(elementvalue.toInt()); }
								else if (elementname == "Reconnect delay") {  data->setReconnectDelay(elementvalue.toInt()); }
								else if (elementname == "Use TLS host") {  data->setUseTlsRemoteHost(elementvalue.toInt()); }
								else if (elementname == "TLS remote host") {  data->setTlsRemoteHost(elementvalue); }
								else if (elementname == "Disable opportunistic encryption") {  data->setDisableOpportunisticEncryption(elementvalue.toInt()); }
								else if (elementname == "Right next hop") {  data->setRightNextHop(elementvalue); }
								else if (elementname == "Left next hop") {  data->setLeftNextHop(elementvalue); }
								else if (elementname == "Use userdefinied packet size for fragmentation") {  data->setUseFragment(elementvalue.toInt()); }
								else if (elementname == "Use userdef packet size") {  data->setUseMssfix(elementvalue.toInt()); }
								else if (elementname == "Fragment") {  data->setFragment(elementvalue.toInt()); }
								else if (elementname == "PeerTimeout") {  data->setPeerTimeout(elementvalue.toInt()); }
								else if (elementname == "Disable CCP") {  data->setDisableCcp(elementvalue.toInt()); }
								else if (elementname == "Use smartcard") {  data->setUseSmartcard(elementvalue.toInt()); }
								else if (elementname == "Use Xauth interactive") {  data->setUseXauthInteractive(elementvalue.toInt()); }
								else if (elementname == "Use HTTP Proxy Authentication") {  data->setUseHttpProxyAuth(elementvalue.toInt()); }
								else if (elementname == "HTTP Proxy Authtype") {  data->setHttpProxyAuthType(elementvalue); }
								else if (elementname == "HTTP Proxy Auth user") {  data->setHttpProxyUser(elementvalue); }
								else if (elementname == "HTTP Proxy Auth pass") {  data->setHttpProxyPass(elementvalue); }
								else if (elementname == "Use only CA cert and user auth") {  data->setUseOnlyCaCertAndUserAuth(elementvalue.toInt()); }
								else if (elementname == "Use mail address as identifier") {  data->setUseMailAddressAsIdentifier(elementvalue.toInt()); }
								else if (elementname == "Use right next hop") {  data->setUseRightNextHop(elementvalue.toInt()); }
								else if (elementname == "Use left next hop") {  data->setUseLeftNextHop(elementvalue.toInt()); }
								else if (elementname == "Pkcs11 providers") {  data->setPkcs11Providers(elementvalue); }
								else if (elementname == "Pkcs11 slot type") {  data->setPkcs11SlotType(elementvalue); }
								else if (elementname == "Pkcs11 slot") {  data->setPkcs11Slot(elementvalue); }
								else if (elementname == "Pkcs11 id type") {  data->setPkcs11IdType(elementvalue); }
								else if (elementname == "Pkcs11 id") {  data->setPkcs11Id(elementvalue); }
								else if (elementname == "Pkcs11 sign mode") {  data->setPkcs11SignMode(elementvalue); }
								else if (elementname == "Use Pkcs11 providers") {  data->setUsePkcs11Providers(elementvalue.toInt()); }
								else if (elementname == "Allow empty private key password") {  data->setAllowEmptyPrivateKeyPassword(elementvalue.toInt()); }
								else if (elementname == "Allow ip address change of peer") {  data->setAllowIpAddressChangeOfPeer(elementvalue.toInt()); }
								else if (elementname == "Auth method") {  data->setAuthMethod(elementvalue); }
								else if (elementname == "Command after connect delay time") {  data->setCommandAfterConnectDelayTime(elementvalue.toInt()); }
								else if (elementname == "Use search domain in resolv conf") { data->setUseSearchDomainInResolvConf(elementvalue.toInt()); }
								else if (elementname == "Use domain in resolv conf") { data->setUseDomainInResolvConf(elementvalue.toInt()); }
								else if (elementname == "Search domain in resolv conf") { data->setSearchDomainInResolvConf(elementvalue); }
								else if (elementname == "Domain in resolv conf") { data->setDomainInResolvConf(elementvalue); }
								else if (elementname == "Authentication direction") { data->setAuthenticationDirection(elementvalue); }
								else if (elementname == "CiscoNatMode") { data->setCiscoNatMode(elementvalue); }
								else if (elementname == "IPSec ESP") { data->setIpsecEsp(elementvalue); }
								else if (elementname == "IPSec IKE") { data->setIpsecIke(elementvalue); }
								else if (elementname == "Vtun profile") { data->setVtunProfile(elementvalue); }
								else if (elementname == "Disable data encryption") { data->setDisableDataEncryption(elementvalue.toInt()); }
								else if (elementname == "Use authentication algorithm") { data->setUseAuthenticationAlgorithm(elementvalue.toInt()); }
								else if (elementname == "Fix path mtu discovery problem") { data->setFixPathMtuDiscoveryProblem(elementvalue.toInt()); }
								else if (elementname == "Use remote network") { data->setUseRemoteNetwork(elementvalue.toInt()); }
								else if (elementname == "Ipsec vpn mode") { data->setIpsecVpnMode(elementvalue); }
								else if (elementname == "DisableHeaderCompression") { data->setDisableHeaderCompression(elementvalue.toInt()); }
								else if (elementname == "DisableMagicNumberNegotiation") { data->setDisableMagicNumberNegotiation(elementvalue.toInt()); }
								else if (elementname == "DisableIpx") { data->setDisableIpx(elementvalue.toInt()); }
								else if (elementname == "Disable protocol field compression") { data->setDisableProtocolFieldCompression(elementvalue.toInt()); }
								else if (elementname == "Disable adress control compression") { data->setDisableAdressControlCompression(elementvalue.toInt()); }
								else if (elementname == "Use custom ike") { data->setUseCustomIke(elementvalue.toInt()); }
								else if (elementname == "Use custom esp") { data->setUseCustomEsp(elementvalue.toInt()); }
								else if (elementname == "Verify ca cert") { data->setVerifyCaCert(elementvalue.toInt()); }
								else if (elementname == "Use DPD idle timeout") { data->setUseDpdIdleTimeout(elementvalue.toInt()); }
								else if (elementname == "DPD idle timeout") { data->setDpdIdleTimeout(elementvalue.toInt()); }
								else if (elementname == "Hide group password in accountdata dialog") { data->setHideGroupPasswordInAccountDataDialog(elementvalue.toInt()); }
								else if (elementname == "MaxConnectTries") { data->setMaxConnectTries(elementvalue.toInt()); }
								else if (elementname == "L2tpDaemon") { data->setL2tpDaemon((VpnAccountData::L2tpDaemonType)elementvalue.toInt()); }
								else if (elementname == "UseLeftSourceIp") { data->setUseLeftSourceIp(elementvalue.toInt()); }
								else if (elementname == "UseRightSourceIp") { data->setUseRightSourceIp(elementvalue.toInt()); }
								else if (elementname == "LeftSourceIp") { data->setLeftSourceIp(elementvalue); }
								else if (elementname == "RightSourceIp") { data->setRightSourceIp(elementvalue); }
								else if (elementname == "Use virtual subnets") { data->setUseVirtualSubnetworks(elementvalue.toInt()); }
								else if (elementname == "Virtual subnets") { data->setVirtualSubnetworks(elementvalue); }
								else if (elementname == "DisablePushFromServer") { data->setDisablePushFromServer(elementvalue.toInt()); }
								else if (elementname == "DisableBind") { data->setDisableBind(elementvalue.toInt()); }
								else if (elementname == "UseRenegSec") { data->setUseRenegSec(elementvalue.toInt()); }
								else if (elementname == "RenegSec") { data->setRenegSec(elementvalue.toInt()); }
								else if (elementname == "UseTunnelPing") { data->setUseTunnelPing(elementvalue.toInt()); }
								else if (elementname == "TunnelPing") { data->setTunnelPing(elementvalue.toInt()); }
								else if (elementname == "UseTunnelPingRestart") { data->setUseTunnelPingRestart(elementvalue.toInt()); }
								else if (elementname == "TunnelPingRestart") { data->setTunnelPingRestart(elementvalue.toInt()); }
								else if (elementname == "RequireEap") { data->setRequireEap(elementvalue.toInt()); }
								else if (elementname == "UseSshConfigRemoteScript") { data->setUseSshConfigRemoteScript(elementvalue.toInt()); }
								else if (elementname == "SshConfigRemoteScript") { data->setSshConfigRemoteScript(elementvalue); }
								else if (elementname == "AskUserPasswordOnEachConnect") { data->setAskUserPasswordOnEachConnect(elementvalue.toInt()); }
								else if (elementname == "UseCiscoCertStore") { data->setUseCiscoCertStore(elementvalue.toInt()); }
								else if (elementname == "UseNat") { data->setUseNat(elementvalue.toInt()); }
							}
						}
						if (KvpncDebugLevel > 5)
							std::cout << "profile end " << std::endl;
						ImportedAccountList->append(data);
					}
					appPointer->processEvents();
				}
				TQApplication::restoreOverrideCursor();
				KvpncImportProfileSelectionDialog selectdlg;
				VpnAccountData *it=NULL;
				
				if ( !ImportedAccountList->isEmpty() )
				{
					selectdlg.ImportProfileListView->takeItem(selectdlg.ImportProfileListView->currentItem());
					selectdlg.ImportProfileListView->addColumn(i18n("Name"));
					selectdlg.ImportProfileListView->addColumn(i18n("Type"));
					selectdlg.ImportProfileListView->addColumn(i18n("Gateway"));
					selectdlg.ImportNamePrefixLineEdit->setText( "kvpnc_import_");
					
					TQCheckListItem *item;
					for ( it = ImportedAccountList->first(); it; it = ImportedAccountList->next() )
					{
							TQString name = it->getName();
							TQString type;
							if ( it->getConnectionType() == VpnAccountData::cisco )
								type = "cisco" ;
							else if ( it->getConnectionType() == VpnAccountData::ciscoorig )
								type = "ciscoorig" ;
							else if ( it->getConnectionType() == VpnAccountData::racoon )
								type = "racoon" ;
							else if ( it->getConnectionType() == VpnAccountData::l2tpd_racoon )
								type = "l2tpd (racoon)" ;
							else if ( it->getConnectionType() == VpnAccountData::freeswan )
								type = "freeswan" ;
							else if ( it->getConnectionType() == VpnAccountData::l2tpd_freeswan )
								type = "l2tpd (openswan)" ;
							else if ( it->getConnectionType() == VpnAccountData::pptp )
								type = "pptp" ;
							else if ( it->getConnectionType() == VpnAccountData::openvpn )
								type = "openvpn" ;
							else
								type =  i18n("other");


// 						litem->setSelectable(true);
						item = new TQCheckListItem(selectdlg.ImportProfileListView,it->getName(),TQCheckListItem::CheckBox);
						item->setText(1,type);
						item->setText(2,it->getGateway());
						selectdlg.ImportProfileListView->insertItem(item);

// 						std::cout << "insert profile into listview: " << name << std::endl;
					}
				}
				bool ret = selectdlg.exec();
				
				if (ret == true)
				{
					importGlobal=selectdlg.ImportGlobalSettingsCheckBox->isChecked();
					TQListViewItemIterator it2( selectdlg.ImportProfileListView );
					for ( ; it2.current(); ++it2 )
					{
						if (  ( (TQCheckListItem*)it2.current() )->isOn() )
						{
							VpnAccountData *data=NULL;
							it = 0;
							for ( it = ImportedAccountList->first(); it; it = ImportedAccountList->next() )
							{
								if ( it->getName() == ( (TQCheckListItem*)it2.current() )->text() && ( (TQCheckListItem*)it2.current() )->isOn()  )
								{
									data = it;
									importCount++;

									// FIXME last profilename here
									RetName=it->getName();
	
									data->setName(selectdlg.ImportNamePrefixLineEdit->text()+data->getName());
	
									bool ok = false;
									VpnAccountData * it;
									bool nameOk = false;
									while ( nameOk == false )
									{
										for ( it = AccountList->first(); it; it = AccountList->next() )
										{
											if ( it->getName() == data->getName() )
											{
												//account->setName( TQString( account->getName() + "_2" ) );
												// 				KMessageBox::information ( this, i18n( "Profile name exists!\n It will be renamed to \"%1\"." ).arg( account->getName() ), i18n( "Name exist, renamed" ) );
												KMessageBox::error ( 0, i18n ( "Profile name exists!" ), i18n ( "Name Exists" ) );
												nameOk = false;
												TQString newName = KInputDialog::getText ( i18n ( "New Name" ), i18n ( "New name for profile:" ), TQString ( data->getName() + "_2" ), &ok );
												if (newName.isEmpty())
												{
													KMessageBox::information ( 0, i18n ( "Import was canceled." ) );
													appendLogEntry ( i18n ( "Import was canceled." ), info );
													return false;
												}
												if (newName != it->getName() )
												{
													data->setName ( newName );
													nameOk = true;
												}
											}
											else
											{
												nameOk = true;
											}
										}
									}
							
									if ( nameOk == true )
									{
										AccountList->append(data);
									}
								}
							}
						}
					}
					if (selectdlg.OpenProfileManagerCheckBox->isChecked())
						openProfileManager=true;
				}
				else
				{
					KMessageBox::sorry ( 0, i18n ( "Import canceled." ) );
					return false;
				}
			}

			TQDomElement e = n.toElement(); // try to convert the node to an element.
			if( !e.isNull() ) {
				std::cout << e.tagName() << std::endl; // the node really is an element.
			}
			n = n.nextSibling();
		}
		if (KvpncDebugLevel > 5)
			std::cout << "dom doc end" << std::endl;

		if (importGlobal == true)
		{
			this-> pathToVpnc= pathToVpnc;
			this-> pathToCiscoVpnc= pathToCiscoVpnc;
			this-> pathToRacoon= pathToRacoon;
			this-> pathToSetkey= pathToSetkey;
			this-> pathToIptables= pathToIptables;
			this-> pathToIptables= pathToIptables;
			this-> pathToIpsec= pathToIpsec;
			this-> pathToPppd= pathToPppd;
			this-> pathToPptp= pathToPptp;
			this-> pathToL2tpd= pathToL2tpd;
			this-> pathToXl2tpd= pathToXl2tpd;
			this-> pathToSsh= pathToSsh;
			this-> pathToKill= pathToKill;
			this-> pathToKillall= pathToKillall;
			this-> pathToPing= pathToPing;
			this-> pathToOpenvpn= pathToOpenvpn;
			this-> pathToIp= pathToIp;
			this-> pathToIfconfig= pathToIfconfig;
			this-> pathToRoute= pathToRoute;
			this-> pathToNetstat= pathToNetstat;
			this-> pathToPkcs11Tool= pathToPkcs11Tool;
			this-> AutoConnectProfile= AutoConnectProfile;
			this-> RacoonDebugLevel= RacoonDebugLevel;
			this-> Vpnc_pid_file= Vpnc_pid_file;
			this-> Pppd_pid_file= Pppd_pid_file;
			this-> lastProfile= lastProfile;
			this-> logfileName= logfileName;		
			this->minimizeAfterConnect= minimizeAfterConnect;
			this->showDebugConsole= showDebugConsole;
			this-> writeLogFile= writeLogFile;
			this-> useDefaultPaths= useDefaultPaths;
			this-> useSilentQuit= useSilentQuit;
			this-> holdGeneratedScripts= holdGeneratedScripts;
			this-> programsInPath= programsInPath;
			this-> enableDebugPppd= enableDebugPppd;
			this-> enableDebugPptpd= enableDebugPptpd;
			this-> enableDebugL2tpd= enableDebugL2tpd;
			this-> enableDebugXl2tpd= enableDebugXl2tpd;
			this-> enableFreeswanVerbose= enableFreeswanVerbose;
			this-> enableDebugOpenvpn= enableDebugOpenvpn;
			this-> useColorizedLogOutput= useColorizedLogOutput;
			this-> showInterfaceIPinTooltip= showInterfaceIPinTooltip;
			this-> dontQuitOnCloseEvent= dontQuitOnCloseEvent;
			this-> doAutoConnectAtStartup= doAutoConnectAtStartup;
			this-> useKwallet= useKwallet;
			this-> showStatusBar= showStatusBar;
			this-> showToolBar= showToolBar;
			this-> hideMainWindow= hideMainWindow;
			this-> PppdDebugLevel= PppdDebugLevel;
			this-> firstUseOfKwallet= firstUseOfKwallet;
			this-> shutdownIsCalled= shutdownIsCalled;
			this-> skipKwalletStoring= skipKwalletStoring;
			this-> hideOnCloseInfo= hideOnCloseInfo;
			this-> feedbackMailSent= feedbackMailSent;
			this-> doKillL2tpdIfStillRunning= doKillL2tpdIfStillRunning;
			this-> doKillXl2tpdIfStillRunning= doKillXl2tpdIfStillRunning;
			this-> doKillRacoonIfStillRunning= doKillRacoonIfStillRunning;
			this-> showConnectionTimeInTooltip= showConnectionTimeInTooltip;
			this-> VpncDebugLevel= VpncDebugLevel;
			this-> KvpncDebugLevel= KvpncDebugLevel;
			this-> OpenvpnDebugLevel= OpenvpnDebugLevel;
			this-> PptpLogLevel= PptpLogLevel;
			this-> SshDebugLevel= SshDebugLevel;
			this-> LogViewerFontSize= LogViewerFontSize;
			this-> mainwindow_pos_x= mainwindow_pos_x;
			this-> mainwindow_pos_y= mainwindow_pos_y;
			this-> mainwindow_height= mainwindow_height;
			this-> mainwindow_width= mainwindow_width;
			this-> connectSleepDelay= connectSleepDelay;
			this-> connectSleepRetry= connectSleepRetry;
			this-> tryConnectTimeout= tryConnectTimeout;
			this-> connectionStartTime= connectionStartTime;
			this-> runningCheckCounter= runningCheckCounter;
			this-> runningCheckTimeout= runningCheckTimeout;
			this-> OpenvpnManagementPort= OpenvpnManagementPort;
			this->InfoLogColor= InfoLogColor;
			this->RemoteLogColor= RemoteLogColor;
			this->ErrorLogColor= ErrorLogColor;
			this->SuccessLogColor= SuccessLogColor;
			this->DebugLogColor= DebugLogColor;
			this->DebugBackgroundcolor= DebugBackgroundcolor;
			this->pos= pos;
			this->WindowPos= WindowPos;
			this->WindowSize= WindowSize;

		}
		saveOptions();

		TQString msg="";
		if (importCount > 0 && importGlobal==true)
			msg = i18n("Import was successful. %1 profiles and global settings are imported.").arg(TQString::number(importCount));
		if (importCount > 0 && importGlobal==false)
			msg = i18n("Import was successful. %1 profiles are imported.").arg(TQString::number(importCount));
		if (importCount < 1 && importGlobal==false)
			msg = i18n("Import was successful. Global settings are imported.");
		KMessageBox::information ( 0, msg,i18n("Import success") );
	}
	else
	{
		KMessageBox::error ( 0, i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ) );
		appendLogEntry (i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ), error);
		TQApplication::restoreOverrideCursor();
		return false;
	}
	return true;
}

bool KVpncConfig::importIpsecConfig(TQString filename, TQString& RetName, bool& openProfileManager)
{
	TQFile importfile (filename);
	if (!importfile.exists())
	{
		KMessageBox::error ( 0, i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ) );
		return false;
	}
	TQPtrList<VpnAccountData> *ImportedAccountList = new TQPtrList<VpnAccountData>();
	ImportedAccountList->setAutoDelete( TRUE ); // the list owns the objects
	TQPtrList<IpsecImportSection> *IpsecImportSectionList = new TQPtrList<IpsecImportSection>();
	
	bool isIpsecGlobalSection=false;
	bool firstSectionFound=false;
	bool defaultSectionFound=false;
	bool useNat=false;
	bool disableOpportunisticEncryption=true;
	TQStringList InterfaceList;
	int IpsecVersion=1;
// 	bool pskIsInFile=true;
	TQString PskFile="/etc/ipsec.secrets";
	TQString CertPath="/etc/ipsec.d/certs";
	
	TQString IpsecConfigSection="";
	bool validLineFound=false;
	if ( importfile.open(IO_ReadOnly))
	{
		TQString line = NULL;
		TQString IpsecConfigSectionName="";
		TQString IpsecConfigData="";
		bool sectionEndFound=false;

// 		std::cout << "pass1: collecting sections" << std::endl;
		if (KvpncDebugLevel > 2)
			appendLogEntry(i18n ("import ipsec config: pass1: collecting sections"),debug);
		TQTextStream stream(&importfile);
		while ( !stream.atEnd() )
		{
			line = stream.readLine().replace("\"","");

// 			std::cout << "line: \"" << line << "\"" << std::endl;

			if ( IpsecConfigSectionName!="" && (  line=="\n" || removeWhiteSpaceAtBegin(line) =="\n" ||  line == NULL || line.startsWith("include") || line.startsWith("conn") ))
			{
				// end of section found
// 				std::cout << "end of section " << IpsecConfigSectionName << " found." << std::endl;
				if (KvpncDebugLevel > 2)
					appendLogEntry(i18n("import ipsec config: end of section %1 found.").arg(IpsecConfigSectionName), debug);
				sectionEndFound=true;

				IpsecImportSection *section = new IpsecImportSection();
				section->SectionName = IpsecConfigSectionName;
				section->SectionData = IpsecConfigData;
				IpsecImportSectionList->append(section);
				IpsecConfigData="";
				IpsecConfigSectionName="";

// 				std::cout << "Section:"<< std::endl;
// 				std::cout << section->SectionName << std::endl;
// 				std::cout << section->SectionData.join("\n");
// 				std::cout << "-------------------"<< std::endl;

				if (KvpncDebugLevel > 2)
				{
					appendLogEntry( "import ipsec config: Section:", debug);
					appendLogEntry( section->SectionName , debug);
					appendLogEntry( section->SectionData.join("\n"), debug);
					appendLogEntry( "-------------------", debug);
				}
			}

			if (line.startsWith("conn"))
			{
				// section found
				IpsecConfigSectionName=line.simplifyWhiteSpace().section('#',0,0).section(" ",1,1);
// 				std::cout << "normal section found: " << IpsecConfigSectionName << std::endl;

				isIpsecGlobalSection=false;

				if (IpsecConfigSectionName == "%default")
				{
					defaultSectionFound=true;
					sectionEndFound=false;
					firstSectionFound=true;
					if (KvpncDebugLevel > 2)
						appendLogEntry( i18n ("import ipsec config: default section found."), debug);
				}
				else
				{
					if (KvpncDebugLevel > 2)
						appendLogEntry( i18n ("import ipsec config: normal section found: ") + IpsecConfigSectionName , debug);
					sectionEndFound=false;
					firstSectionFound=true;
				}
			}
			if (line.startsWith("version"))
			{
				IpsecVersion=int(TQString(line.simplifyWhiteSpace().section('#',0,0).section(" ",1,1).stripWhiteSpace()).toFloat());
				validLineFound=true;
// 				std::cout << "ipsec version found: " << IpsecVersion << std::endl;
				if (KvpncDebugLevel > 2)
					appendLogEntry(i18n ("import ipsec config: ipsec version found: ")+ TQString().setNum(IpsecVersion) ,debug);
			}
			if (line.startsWith("config setup"))
			{
				// config section found
				isIpsecGlobalSection=true;
				validLineFound=true;
// 				std::cout << "global section found." << std::endl;
				if (KvpncDebugLevel > 2)
					appendLogEntry(i18n ("import ipsec config: global section found."),debug);
			}

			if (isIpsecGlobalSection==true)
			{
				TQString line2 = removeWhiteSpaceAtBegin( line);
// 				std::cout << "global section line: " << line2 << std::endl;
				if (line2.startsWith("plutodebug"))
				{
					validLineFound=true;
					// FIXME not implemented yet
				}
				if (line2.startsWith("nat_traversal="))
				{
					validLineFound=true;
					useNat=false;
					if (line2.section('=',1,1) == "yes")
					{
						useNat=true;
						if (KvpncDebugLevel > 2)
							appendLogEntry(i18n ("import ipsec config: use NAT."),debug);
					}
					else
					{
						useNat=false;
						if (KvpncDebugLevel > 2)
							appendLogEntry(i18n ("import ipsec config: use no NAT."),debug);
					}
				}

				if (line2.startsWith("interfaces="))
				{
					validLineFound=true;
					if (line2.section('=',1,1) == "%defaultroute")
					{
						InterfaceList.append("default");
						if (KvpncDebugLevel > 2)
							appendLogEntry(i18n ("import ipsec config: use interface where default route points"),debug);
					}
					else
					{
						InterfaceList = TQStringList::split(' ',line2.replace("interfaces=","").replace(TQRegExp("ipsec[0-9]="),""));
// 						std::cout << "interface list: " << InterfaceList << std::endl;
						if (KvpncDebugLevel > 2)
							appendLogEntry(i18n ("import ipsec config: use interface from list:")+ " "+InterfaceList.join(", "),debug);
					}
				}
			}
			
			if (line.startsWith("include /etc/ipsec.d/examples/no_oe.conf"))
			{
				validLineFound=true;
				isIpsecGlobalSection=false;
// 				std::cout << "opportunistic enncrytion disabled found." << std::endl;
				if (KvpncDebugLevel > 2)
					appendLogEntry(i18n ("import ipsec config: opportunistic encrytion disabled found"),debug);

				disableOpportunisticEncryption=true;
			}

			if (!sectionEndFound && firstSectionFound==true)
			{
				// collecting data
				TQString cleanLine = removeWhiteSpaceAtBegin(line)+"\n";
// 				std:: cout << "clean line: \"" << cleanLine << "\"" << std::endl;
				if (!cleanLine.startsWith("#") && !cleanLine.startsWith("include")  && cleanLine != ""  && !line.startsWith("conn") && cleanLine != "\n")
				{
// 					std:: cout << "appending line: \"" << line << "\"" << std::endl;
					IpsecConfigData.append(line+"\n");
				}
				else
				{
// 					std:: cout << "skipping line: \"" << line << "\"" << std::endl;
				}
			}
		}
		importfile.close();
		if (IpsecConfigSectionName!="")
		{
			// end of section found
// 			std::cout << "end of section " << IpsecConfigSectionName << " found." << std::endl;
			if (KvpncDebugLevel > 2)
				appendLogEntry("end of section " + IpsecConfigSectionName +" found.",debug);
			sectionEndFound=true;

			IpsecImportSection *section = new IpsecImportSection();
			section->SectionName = IpsecConfigSectionName;
			section->SectionData = IpsecConfigData;
			IpsecImportSectionList->append(section);
			IpsecConfigData="";
			IpsecConfigSectionName="";
		}
		
		
	

// 		std::cout << "pass2: modifiy sections" << std::endl;
		if (KvpncDebugLevel > 2)
			appendLogEntry(i18n ("import ipsec config: pass2: modifiy sections"),debug);

// 		std::cout << "sections: IpsecImportSectionList: " << IpsecImportSectionList->count() << std::endl;
		if (KvpncDebugLevel > 2)
			appendLogEntry(i18n ("import ipsec config: sections: ") + TQString().setNum(IpsecImportSectionList->count()),debug);

		if (!IpsecImportSectionList->isEmpty())
		{
			for ( int i=0; i< (int)IpsecImportSectionList->count();i++ )
			{
				IpsecImportSection *section = IpsecImportSectionList->at(i);
				TQString Name= section->SectionName;
				TQStringList data = TQStringList::split('\n',section->SectionData.join("\n"));

// 				std::cout << "	 => processing section: \"" << Name << "\"" << std::endl;

				if (Name != "%default")
				{
					if (KvpncDebugLevel > 2)
						appendLogEntry(i18n ("import ipsec config: => processing section: ")+"\"" + Name + "\"",debug);

					for ( TQStringList::Iterator it2 = data.begin(); it2 != data.end(); ++it2 )
					{
						TQString dataline = *it2;
	// 					std::cout << "dataline found: \"" << dataline.remove("\n") << "\"" << std::endl;
						if (removeWhiteSpaceAtBegin( dataline).startsWith("also="))
						{
	// 						std::cout << "also= found, looking for other section..." << std::endl;
							if (KvpncDebugLevel > 2)
								appendLogEntry(i18n ("import ipsec config: also= found, looking for other section..."),debug);

							TQString newdata = TQString(section->SectionData.join("\n"));
							newdata.replace(TQRegExp("^.*also=.*$"),"");
							section->SectionData= newdata;

							TQString OtherSection=dataline.simplifyWhiteSpace().section('#',0,0).section("=",1,1);
							// we have to find the other section and replace this line by the config data of the other section (after the =)
							bool section_found=false;
							for (IpsecImportSection * it3 = IpsecImportSectionList->first(); it3; it3 = IpsecImportSectionList->next() )
							{
								if (it3->SectionName == OtherSection)
								{
	// 								std::cout << "section " << OtherSection << " found, appending:" << std::endl;
									if (KvpncDebugLevel > 2)
										appendLogEntry(i18n ("import ipsec config: section %1 found, appending:").arg(OtherSection),debug);
	// 								std::cout << "other data:" << std::endl << it3->SectionData.join("\n")  << "--------" << std::endl;
	// 								std::cout << "section data:" << std::endl << section->SectionData.join("\n")  << "--------" << std::endl;
									section_found=true;
	// 								data.remove(dataline);
									dataline="";
	// 								TQStringList otherdata = TQStringList::split("\n",TQString(it3->SectionData.join("\n")));
									TQString OtherData = TQString(it3->SectionData.join("\n"));

									TQStringList newdata;

									for ( TQStringList::Iterator it6 = data.begin(); it6 != data.end(); ++it6 )
									{
	// 									std::cout << " also line: " << *it6 << std::endl;
										if (KvpncDebugLevel > 2)
											appendLogEntry(i18n ("import ipsec config: also line: ") + TQString(*it6),debug);

										if (TQString(*it6).find("also=") < 0)
										{
	// 										std::cout << " also= found." << std::endl;
											if (KvpncDebugLevel > 2)
												appendLogEntry(i18n ("import ipsec config: also= found."),debug);
											newdata.append(TQString(*it6));
										}
										else
										{
	// 										std::cout << " also= not found." << std::cout;
										if (KvpncDebugLevel > 2)
											appendLogEntry(i18n ("import ipsec config: also= not found.") ,debug);
										}
									}
	// 								newdata.append(data.join("\n"));
									newdata.append(OtherData);
									section->SectionData= newdata;

								}
							}
							if (!section_found)
							{
	// 							std::cout << "section " << OtherSection << " not found, skipping" << std::endl;
								if (KvpncDebugLevel > 2)
									appendLogEntry(i18n ("import ipsec config: section %1 not found, skipping").arg(OtherSection) ,debug);
							}

						}
					}

					if (defaultSectionFound==true)
					{
						if (KvpncDebugLevel > 2)
							appendLogEntry(i18n ("import ipsec config: => default section is set... "),debug);

						for ( int i=0; i< (int)IpsecImportSectionList->count();i++ )
						{
							IpsecImportSection *section2 = IpsecImportSectionList->at(i);
							TQString Name= section2->SectionName;
							if (Name == "%default")
							{

								if (KvpncDebugLevel > 2)
									appendLogEntry(i18n ("import ipsec config: => appending %default section: ")+"\"" + section2->SectionData.join("\n") ,debug);
								
								TQStringList defaultdata = TQStringList::split('\n',section2->SectionData.join("\n"));

								
								for ( TQStringList::Iterator defaultit = defaultdata.begin(); defaultit != defaultdata.end(); ++defaultit )
								{
								if (KvpncDebugLevel > 2)
									appendLogEntry(i18n ("import ipsec config: => appending %default line: ")+"\"" + *defaultit,debug);
									section->SectionData.append(*defaultit);
								}
								break;
							}
						}
					}
				}
			}
		}

// 		std::cout << "modified config" << std::endl << "---------------------" << std::endl;
// 		IpsecImportSection *it5=NULL;
// 		for ( it5 = IpsecImportSectionList->first(); it5; it5 = IpsecImportSectionList->next() )
// 		{
// 			TQString SectionName= it5->SectionName;
// 			TQStringList data = it5->SectionData;
// 
// 			std::cout << SectionName << std::endl;
// 			std::cout << data.join("\n") << std::endl;
// 		}

		// remove default section
		for ( int i=0; i< (int)IpsecImportSectionList->count();i++ )
		{
			IpsecImportSection *section = IpsecImportSectionList->at(i);
			TQString Name= section->SectionName;
			if (Name == "%default")
			{
				IpsecImportSectionList->remove(IpsecImportSectionList->at(i));
				break;
			}
		}

		if (KvpncDebugLevel > 2)
		{
			appendLogEntry(i18n ("modified config") ,debug);
			appendLogEntry( "---------------------" ,debug);
			IpsecImportSection *it5=NULL;
			for ( it5 = IpsecImportSectionList->first(); it5; it5 = IpsecImportSectionList->next() )
			{
				TQString SectionName= it5->SectionName;
				TQStringList data = it5->SectionData;
	
				appendLogEntry(SectionName  ,debug);
				appendLogEntry(data.join("\n")  ,debug);
			}
		}


// 		std::cout << "pass3: parse sections" << std::endl;
		if (KvpncDebugLevel > 2)
			appendLogEntry(i18n ("import ipsec config: pass3: parse sections") ,debug);


		if (!IpsecImportSectionList->isEmpty())
		{
			for ( int i=0; i< (int)IpsecImportSectionList->count();i++ )
			{
				IpsecImportSection *section = IpsecImportSectionList->at(i);

				TQStringList sectiondata = TQStringList::split('\n',section->SectionData.join("\n"));

// 				std::cout << "	 => processing section: \"" << section->SectionName << "\"" << std::endl;
// 				std::cout << "	 => data: \"" << section->SectionData.join("\n") << "\"" << std::endl;
				if (KvpncDebugLevel > 2)
					appendLogEntry(i18n ("import ipsec config: 	 => processing section: ")+"\"" + section->SectionName + "\"" ,debug);

				VpnAccountData *profiledata = new VpnAccountData(VpnAccountData::freeswan,TQString(section->SectionName)) ;
				

				for ( TQStringList::Iterator it2 = sectiondata.begin(); it2!= sectiondata.end() ; it2++ )
				{
					TQString dataline = *it2;
					




					TQString line2 = removeWhiteSpaceAtBegin ( dataline ); // line of text excluding '\n' and replace all white chars with one blank
// 					std::cout << "dataline: \"" << line2 << "\"";
					if ( line2.startsWith ( "rightsubnet=" ) )
					{
						validLineFound=true;
						TQString RightSubnet=line2.section ( "rightsubnet=",1,-1 );
// 						std::cout << "right subnet (remote) found: " << RightSubnet << std::endl;
						if ( KvpncDebugLevel > 2 )
							appendLogEntry ( i18n ( "import ipsec config: right subnet (remote) found: " ) + RightSubnet ,debug );
						profiledata->setRemoteNetAddr ( RightSubnet.section ( '/',0,0 ) );
						profiledata->setRemoteNetMask ( RightSubnet.section ( '/',1,1 ) );

						profiledata->setUseRemoteNetwork ( true );
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "leftsubnet=" ) )
					{
						validLineFound=true;
						TQString LeftSubnet=line2.section ( "leftsubnet=",1,-1 );
// 						std::cout << "left subnet (local) found: " << LeftSubnet << std::endl;
						if ( KvpncDebugLevel > 2 )
							appendLogEntry ( i18n ( "import ipsec config: left subnet (local) found: " ) + LeftSubnet ,debug );
						//						local subnet cant be set yet.
						// 					profiledata->setLocalNetAddr(RightSubnet.section('/',0,0));
						// 					profiledata->setLocalNetMask(RightSubnet.section('/',1,1));
						// 					std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;

					}
					if ( line2.startsWith ( "rightnexthop=" ) )
					{
						validLineFound=true;
						TQString RightNextHop=line2.section ( "rightnexthop=",1,-1 );
// 						std::cout << "right next hop (remote) found: " << RightNextHop << std::endl;
						if ( KvpncDebugLevel > 2 )
							appendLogEntry ( i18n ( "import ipsec config: right next hop (remote) found: " ) +RightNextHop ,debug );
						profiledata->setRightNextHop ( RightNextHop );
						profiledata->setUseRightNextHop(true);
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "leftnexthop=" ) )
					{
						validLineFound=true;
						TQString LeftNextHop=line2.section ( "leftnexthop=",1,-1 );
						std::cout << "left next hop (local) found: " << LeftNextHop << std::endl;
						if (KvpncDebugLevel > 2)
							appendLogEntry("import ipsec config: left next hop (local) found: " +LeftNextHop ,debug);
						profiledata->setLeftNextHop(LeftNextHop);
						profiledata->setUseLeftNextHop(true);
						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
						if (KvpncDebugLevel > 2)
							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "left=" ) )
					{
						validLineFound=true;
						TQString left=line2.section ( "left=",1,-1 );
						//						local ip cant be set yet.
						// 					std::cout << "left found: " << left << std::endl;
// 							if (KvpncDebugLevel > 2)
// 								appendLogEntry("import ipsec config: left found: " + left ,debug);
						// 					profiledata->setLocal (left);
						// 					std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "right=" ) )
					{
						validLineFound=true;
						TQString right=line2.section ( "right=",1,-1 );
// 						std::cout << "right (remote gateway) found: " << right << std::endl;
						if ( KvpncDebugLevel > 2 )
							appendLogEntry ( i18n ( "import ipsec config: right (remote gateway) found: " ) + right ,debug );
						profiledata->setGateway ( right );
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "leftcert=" ) )
					{
						validLineFound=true;
						TQString LeftCert=line2.section ( "leftcert=",1,-1 );
// 						std::cout << "left cert (local) found: " << LeftCert << std::endl;
						if ( KvpncDebugLevel > 2 )
							appendLogEntry ( i18n ( "import ipsec config: left cert (local) found: " ) + LeftCert ,debug );
						profiledata->setX509Certificate ( LeftCert );
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "rightcert=" ) )
					{
						validLineFound=true;
						TQString RightCert=line2.section("rightcert=",1,-1);
// 						std::cout << "right cert (remote) found: " << RightCert << std::endl;
						if (KvpncDebugLevel > 2)
							appendLogEntry(i18n ("import ipsec config: right cert (remote) found: ") + RightCert ,debug);
						profiledata->setUseSpecialServerCertificate(true);
						profiledata->setSpecialServerCertificate(RightCert);
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "rightca=" ) )
					{
						validLineFound=true;
						TQString RightCA=line2.section ( "rightca=",1,-1 );
// 						std::cout << "right CA (remote) found: " << RightCA << std::endl;
						if ( KvpncDebugLevel > 2 )
							appendLogEntry ( i18n ( "import ipsec config: right CA (remote) found: " ) +RightCA ,debug );
						profiledata->setCaCertificate ( RightCA );
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "rightid=" ) )
					{
						validLineFound=true;
						TQString RightID=line2.section ( "rightid=",1,-1 );
// 						std::cout << "right ID (remote) found: " << RightID << std::endl;
						if ( KvpncDebugLevel > 2 )
							appendLogEntry ( i18n ( "import ipsec config: right ID (remote) found: " ) + RightID ,debug );
						profiledata->setUseSpecialRemoteID ( true );
						profiledata->setSpecialRemoteID ( RightID );
						profiledata->setRemoteIDType("keyid");
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "leftid=" ) )
					{
						validLineFound=true;
						TQString LeftID=line2.section ( "leftid=",1,-1 );
// 						std::cout << "local ID (local) found: " << LeftID << std::endl;
						if ( KvpncDebugLevel > 2 )
							appendLogEntry ( i18n ( "import ipsec config: local ID (local) found: " ) + LeftID ,debug );
						profiledata->setUseSpecialLocalID ( true );
						profiledata->setSpecialLocalID ( LeftID );
						profiledata->setLocalIDType("keyid");
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "rightrsasigkey=" ) )
					{
						validLineFound=true;
						TQString RightRsaSigKey=line2.section ( "rightrsasigkey=",1,-1 );
// 						std::cout << "right uses (remote) " << RightRsaSigKey << std::endl;
						if (RightRsaSigKey=="%cert")
						{
							if ( KvpncDebugLevel > 2 )
								appendLogEntry ( i18n ( "import ipsec config: right (remote) uses cert" ),debug );
							profiledata->setAuthType ( VpnAccountData::cert );
						}
						else
						{

							if ( KvpncDebugLevel > 2 )
								appendLogEntry ( i18n ( "import ipsec config: right (remote) uses " ) + RightRsaSigKey ,debug );
							profiledata->setAuthType ( VpnAccountData::psk );

							// ok, we use special server cert here because at psk its unused
							profiledata->setSpecialServerCertificate( RightRsaSigKey );
							profiledata->setUseSpecialServerCertificate(true);
							
						}
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "leftrsasigkey=" ) )
					{
						validLineFound=true;
						TQString LeftRsaSigKey=line2.section ( "leftrsasigkey=",1,-1 );
// 						std::cout << "right uses (remote) " << LeftRsaSigKey << std::endl;
						if (LeftRsaSigKey=="%cert")
						{
							if ( KvpncDebugLevel > 2 )
								appendLogEntry ( i18n ( "import ipsec config: left (local) uses cert" ),debug );
							profiledata->setAuthType ( VpnAccountData::cert );

						}
						else
						{

							if ( KvpncDebugLevel > 2 )
								appendLogEntry ( i18n ( "import ipsec config: left (local) uses " ) + LeftRsaSigKey ,debug );
							profiledata->setAuthType ( VpnAccountData::psk );
	
							profiledata->setPreSharedKeyFile( LeftRsaSigKey );
							profiledata->setPskIsInFile( true );
						}
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "authby=" ) )
					{
						validLineFound=true;
						TQString Authby=line2.simplifyWhiteSpace().section ( "authby=",1,1 );
// 						std::cout << "left and right use certs " << std::endl;
						if ( Authby.find ( "rsasig", 0 , FALSE ) > -1 )
						{
							if ( KvpncDebugLevel > 2 )
								appendLogEntry ( i18n ( "import ipsec config: left and right use certs." ) ,debug );
							profiledata->setAuthType ( VpnAccountData::cert );
							profiledata->setCertPath ( "/etc/ipsec.d/certs" );
							//profiledata->setPskIsInFile ( true );
							//profiledata->setPrivateKey ( "/etc/ipsec.secrets" );
						}
						else if ( Authby.find ( "secret", 0 , FALSE ) > -1 )
						{
							if ( KvpncDebugLevel > 2 )
								appendLogEntry ( i18n ( "import ipsec config: left and right use psk." ) ,debug );
							profiledata->setAuthType ( VpnAccountData::psk );
							//profiledata->setPskIsInFile ( true );
							//profiledata->setPreSharedKeyFile ( "/etc/ipsec.secrets" );
						}
						else
						{
							if ( KvpncDebugLevel > 2 )
								appendLogEntry ( i18n ( "import ipsec config: left and right use unknown auth, guess psk" ) ,debug );
							profiledata->setAuthType ( VpnAccountData::psk );
						}


// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "auto=start" ) )
					{
						// 					validLineFound=true;
						// 					TQString Authby=line2.simplifyWhiteSpace().section('#',0,0).section("=",1,1);
						// 					std::cout << "profile should be started" << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: profile should be started" ,debug);
						// 					profiledata->setAuthType(VpnAccountData::cert);
						// 					std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "leftsourceip=" ) )
					{
						validLineFound=true;
						TQString leftsourceip=line2.section ( "leftsourceip=",1,-1 );
							std::cout << "left (local) have to use IP address " << leftsourceip << std::endl;
						if (KvpncDebugLevel > 2)
							appendLogEntry("import ipsec config: left (local) have to use IP address " + leftsourceip ,debug);
						profiledata->setLocalVirtualIP(leftsourceip);
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
						if (KvpncDebugLevel > 2)
							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "virtual_private=" ) )
					{
						validLineFound=true;
						TQString virtualprivate=line2.section ( "virtual_private=",1,-1 );
											std::cout << "virtual private networks " << virtualprivate << std::endl;
						if (KvpncDebugLevel > 2)
							appendLogEntry("import ipsec config: virtual private networks " +virtualprivate ,debug);
						profiledata->setLocalVirtualIP(virtualprivate);
						profiledata->setUseVirtualIP(true);
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
						if (KvpncDebugLevel > 2)
							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "rightsourceip=" ) )
					{
						validLineFound=true;
						TQString rightsourceip=line2.section ( "rightsourceip=",1,-1 );
											std::cout << "right (remote) have to use IP address " << rightsourceip << std::endl;
						if (KvpncDebugLevel > 2)
							appendLogEntry("import ipsec config: right (remote) have to use IP address " + rightsourceip ,debug);
						profiledata->setRightSourceIp(rightsourceip);
						profiledata->setUseRightSourceIp(true);
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
						if (KvpncDebugLevel > 2)
							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "esp=" ) )
					{
						validLineFound=true;
						TQString IpsecEsp=line2.section ( "esp=",1,-1 );
// 						std::cout << "esp settings found: " << IpsecEsp << std::endl;
						if ( KvpncDebugLevel > 2 )
							appendLogEntry ( i18n ( "import ipsec config: esp settings found: " ) + IpsecEsp ,debug );
						profiledata->setIpsecEsp ( IpsecEsp );
						profiledata->setUseCustomEsp(true);
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "ike=" ) )
					{
						validLineFound=true;
						TQString IpsecIke=line2.section ( "ike=",1,-1 );
// 						std::cout << "ike settings found: " << IpsecIke << std::endl;
						if ( KvpncDebugLevel > 2 )
							appendLogEntry ( i18n ( "import ipsec config: ike settings found: " ) + IpsecIke ,debug );
						profiledata->setIpsecIke ( IpsecIke );
						profiledata->setUseCustomIke(true);
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "type=" ) )
					{
						validLineFound=true;
						TQString IpsecVpnMode=line2.section ( "type=",1,1 );
// 						std::cout << "IpsecType found: " << IpsecType << std::endl;
						if ( KvpncDebugLevel > 2 )
							appendLogEntry ( i18n ( "import ipsec config: IPsec vpn mode found: " ) + IpsecVpnMode ,debug );
						if ( IpsecVpnMode == "tunnel" )
							profiledata->setIpsecVpnMode ( "tunnel" );
						else
							profiledata->setIpsecVpnMode ( "transport" );
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "leftxauthclient=" ) )
					{
						validLineFound=true;
						TQString useXauth=line2.section ( "leftxauthclient=",1,1 );
						if (useXauth=="yes")
						{
 							//std::cout << "Use XAUTH: " << i18n("yes") << std::endl;
							if ( KvpncDebugLevel > 2 )
								appendLogEntry ( i18n ( "Use XAUTH (leftxauthclient found):" )+" " + i18n("yes") ,debug );
							profiledata->setAuthWithUsernameAndPassword( true );
						}
						else
						{
 							//std::cout << "Use XAUTH: " << i18n("no") << std::endl;
							if ( KvpncDebugLevel > 2 )
								appendLogEntry ( i18n ( "Use XAUTH (leftxauthclient found):" )+" " + i18n("no") ,debug );
							profiledata->setAuthWithUsernameAndPassword( false );
						}
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "rightxauthserver=" ) )
					{
						validLineFound=true;
						TQString  useXauth=line2.section ( "rightxauthserver=",1,-1 );
						if (useXauth == "yes")
						{
 							//std::cout << "Use XAUTH: " << i18n("yes") << std::endl;
							if ( KvpncDebugLevel > 2 )
								appendLogEntry ( i18n ( "Use XAUTH (rightxauthserver found):" )+" " + i18n("yes") ,debug );
							profiledata->setAuthWithUsernameAndPassword( true );
						}
						else
						{
 							//std::cout << "Use XAUTH: " << i18n("no") << std::endl;
							if ( KvpncDebugLevel > 2 )
								appendLogEntry ( i18n ( "Use XAUTH (rightxauthserver found):" )+" " + i18n("no") ,debug );
							profiledata->setAuthWithUsernameAndPassword( false );
						}
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "keyingtries=" ) )
					{
						validLineFound=true;
						int MaxConnectTries=TQString(line2.section ( "keyingtries=",1,1 )).toInt();
// 						std::cout << "keyingtries found: " << MaxConnectTries << std::endl;
						if ( KvpncDebugLevel > 2 )
							appendLogEntry ( i18n ( "import ipsec config: keyingtries found: " ) + TQString().setNum(MaxConnectTries) ,debug );
						profiledata->setMaxConnectTries ( MaxConnectTries );
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "pfs=" ) )
					{
						validLineFound=true;
						TQString UsePerfectForwardSecrety=line2.section ( "pfs=",1,1 ).remove ( '"' );
						if (UsePerfectForwardSecrety =="yes")
						{
 							//std::cout << "Use PFS: " << i18n("yes") << std::endl;
							if ( KvpncDebugLevel > 2 )
								appendLogEntry ( i18n ( "Use PFS:" )+" " + i18n("yes") ,debug );
							profiledata->setUsePerfectForwardSecrety( true );
						}
						else
						{
 							//std::cout << "Use PFS: " << i18n("no") << std::endl;
							if ( KvpncDebugLevel > 2 )
								appendLogEntry ( i18n ( "Use PFS:" )+" " + i18n("no") ,debug );
							profiledata->setUsePerfectForwardSecrety( false );
						}
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "pfsgroup=" ) )
					{
						validLineFound=true;
						TQString PerfectForwardSecrety=line2.section ( "pfsgroup=",1,1 );
// 						std::cout << "keyingtries found: " << MaxConnectTries << std::endl;
						if ( KvpncDebugLevel > 2 )
							appendLogEntry ( i18n ( "import ipsec config: PFS group found: " ) + PerfectForwardSecrety ,debug );
						profiledata->setPerfectForwardSecrety ( PerfectForwardSecrety );
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}
					if ( line2.startsWith ( "aggrmode=" ) )
					{
						validLineFound=true;
						TQString UseAgressiveMode=line2.section ( "aggrmode=",1,1 ).remove ( '"' );
						if (UseAgressiveMode == "yes")
						{
 							//std::cout << "Exchange mode: " << i18n("aggressive") << std::endl;
							if ( KvpncDebugLevel > 2 )
								appendLogEntry ( i18n ( "Exchange mode:" )+" " + "aggressive" ,debug );
							profiledata->setExchangeMode( "aggressive" );
						}
						else
						{
 							//std::cout << "Exchange mode: " << i18n("main") << std::endl;
							if ( KvpncDebugLevel > 2 )
								appendLogEntry ( i18n ( "Exchange mode:" )+" " + "main" ,debug );
							profiledata->setExchangeMode( "main" );
						}
// 						std::cout << "	=> set it for profile " << IpsecConfigSection << " ." << std::endl;
// 						if (KvpncDebugLevel > 2)
// 							appendLogEntry("import ipsec config: => set it for profile " + IpsecConfigSection + " ." ,debug);
					}

					else
					{
						// 				std::cout << "comment found." << std::endl;
					}
				}

				if ( useNat )
				{
					profiledata->setUseNat ( true );
// 					std::cout << "nat_traversal=yes found, enabling nat." << std::endl;
					if ( KvpncDebugLevel > 2 )
						appendLogEntry ( i18n ( "import ipsec config: nat_traversal=yes found, enabling nat." ) ,debug );
				}
				else
				{
					profiledata->setUseNat ( false );
// 					std::cout << "nat_traversal=no found, disabling nat." << std::endl;
					if ( KvpncDebugLevel > 2 )
						appendLogEntry ( i18n ( "import ipsec config: nat_traversal=no found, disabling nat." ) ,debug );
				}
				if ( disableOpportunisticEncryption==  true )
				{
					profiledata->setDisableOpportunisticEncryption ( true );
				}
				else
				{
					profiledata->setDisableOpportunisticEncryption ( false );
				}



				// FIXME we only use the first in list
				TQString Interface = InterfaceList.first();
				profiledata->setNetworkDevice(Interface);

				profiledata->setName("kvpnc_import_"+profiledata->getName());
				profiledata->setDescription(TQString(i18n("import from ")+filename));
				ImportedAccountList->append(profiledata);
			}
		 }


		KvpncImportProfileSelectionBase selectdlg;
		selectdlg.ImportGlobalSettingsCheckBox->hide();
		VpnAccountData *it=NULL;
		int importCount=0;

		if ( !ImportedAccountList->isEmpty() )
		{
			selectdlg.ImportProfileListView->takeItem(selectdlg.ImportProfileListView->currentItem());
			selectdlg.ImportProfileListView->addColumn(i18n("Name"));
			selectdlg.ImportProfileListView->addColumn(i18n("Type"));
			selectdlg.ImportProfileListView->addColumn(i18n("Gateway"));
			selectdlg.ImportProfileListView->addColumn(i18n("Authentication"));
			selectdlg.ImportProfileListView->addColumn(i18n("Remote network"));
			TQCheckListItem *item;
			for ( it = ImportedAccountList->first(); it; it = ImportedAccountList->next() )
			{
				TQString name = it->getName();
				TQString type="";
				if ( it->getConnectionType() == VpnAccountData::cisco )
					type = "cisco" ;
				else if ( it->getConnectionType() == VpnAccountData::ciscoorig )
					type = "ciscoorig" ;
				else if ( it->getConnectionType() == VpnAccountData::racoon )
					type = "racoon" ;
				else if ( it->getConnectionType() == VpnAccountData::l2tpd_racoon )
					type = "l2tpd (racoon)" ;
				else if ( it->getConnectionType() == VpnAccountData::freeswan )
					type = "ipsec" ;
				else if ( it->getConnectionType() == VpnAccountData::l2tpd_freeswan )
					type = "l2tpd (ipsec)" ;
				else if ( it->getConnectionType() == VpnAccountData::pptp )
					type = "pptp" ;
				else if ( it->getConnectionType() == VpnAccountData::openvpn )
					type = "openvpn" ;
				else
					type =  i18n("other");
				
// 				litem->setSelectable(true);
				item = new TQCheckListItem(selectdlg.ImportProfileListView,it->getName(),TQCheckListItem::CheckBox);
				item->setText(1,type);
				item->setText(2,it->getGateway());
				if (it->getAuthType() == VpnAccountData::cert)
					item->setText(3,i18n("certificate"));
				else if (it->getAuthType() == VpnAccountData::psk)
					item->setText(3,i18n("preshared key"));
				else if (it->getAuthType() == VpnAccountData::hybrid)
					item->setText(3,i18n("hybrid"));
				else
					item->setText(3,i18n("unknown"));
				selectdlg.ImportProfileListView->insertItem(item);
				TQString RemoteNetDiv="/";
				if (it->getRemoteNetAddr() == "")
				{
					it->setRemoteNetMask("");
					RemoteNetDiv="";
				}
				item->setText(4,TQString(it->getRemoteNetAddr()+RemoteNetDiv+it->getRemoteNetMask()));

// 			std::cout << "insert profile into listview: " << name << std::endl;
			}
		}
		bool ret = selectdlg.exec();
		
		if (ret == true)
		{
			TQListViewItemIterator it2( selectdlg.ImportProfileListView );
			for ( ; it2.current(); ++it2 )
			{
				if (  ( (TQCheckListItem*)it2.current() )->isOn() )
				{
					VpnAccountData *data=NULL;
					it = 0;
					for ( it = ImportedAccountList->first(); it; it = ImportedAccountList->next() )
					{
						if ( it->getName() == ( (TQCheckListItem*)it2.current() )->text() && ( (TQCheckListItem*)it2.current() )->isOn()  )
						{
							data = it;
							importCount++;
							RetName=it->getName();
							break;
						}
					}
					AccountList->append(data);
					saveOptions(true, data->getName());
				}
			}
			if (selectdlg.OpenProfileManagerCheckBox->isChecked() && !ImportedAccountList->isEmpty())
				openProfileManager=true;
		}
		else
		{
			KMessageBox::sorry ( 0, i18n ( "Import canceled." ) );
			return false;
		}

		

		TQString msg="";
		if (importCount > 0 )
			msg = i18n("Import was successful. %1 profiles are imported.").arg(TQString::number(importCount));
		else
			msg = i18n("Import was canceled because no profiles are selected.").arg(TQString::number(importCount));

		KMessageBox::information ( 0, msg,i18n("Import success") );
	
	}
	else
	{
		KMessageBox::error ( 0, i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ) );
		return false;
	}
	

	return true;

}

bool KVpncConfig::importFritzboxConfig(TQString filename, TQString& RetName, bool& openProfileManager)
{
	/*
	// example of vpn config fritzbox user
	version = {
		revision = "$Revision: 1.30 $";
		creatversion = "1.1";
	}
	
	
	pwcheck = {
	}
	
	
	datapipecfg = {
		security = dpsec_quiet;
		icmp = {
			ignore_echo_requests = no;
			destunreach_rate = {
				burstfactor = 6;
				timeout = 1;
			}
			timeexceeded_rate = {
				burstfactor = 6;
				timeout = 1;
			}
			echoreply_rate = {
				burstfactor = 6;
				timeout = 1;
			}
		}
		masqtimeouts = {
			tcp = 15m;
			tcp_fin = 2m;
			tcp_rst = 3s;
			udp = 5m;
			icmp = 30s;
			got_icmp_error = 15s;
			any = 5m;
			tcp_connect = 6m;
			tcp_listen = 2m;
		}
		ipfwlow = {
			input = {
			}
			output = {
			}
		}
		ipfwhigh = {
			input = {
			}
			output = {
			}
		}
		NAT_T_keepalive_interval = 20;
	}
	
	
	targets = {
		policies = {
			name = "My Fritzbox";
			connect_on_channelup = no;
			always_renew = no;
			reject_not_encrypted = no;
			dont_filter_netbios = yes;
			localip = 0.0.0.0;
			virtualip = 192.168.178.201;
			remoteip = 0.0.0.0;
			remotehostname = "dnyn.myfb.com";
			localid = {
				user_fqdn = "user@domain.com";
			}
			mode = mode_aggressive;
			phase1ss = "all/all/all";
			keytype = keytype_pre_shared;
			key = "geheim";
			cert_do_server_auth = no;
			use_nat_t = yes;
			use_xauth = no;
			use_cfgmode = no;
			phase2localid = {
				ipaddr = 192.168.178.201;
			}
			phase2remoteid = {
				ipnet = {
					ipaddr = 192.168.178.0;
					mask = 255.255.255.0;
				}
			}
			phase2ss = "esp-all-all/ah-none/comp-all/pfs";
			accesslist = "permit ip any 192.168.178.0 255.255.255.0";
			wakeupremote = no;
		}
	}
	
	
	policybindings = {
	}

	*/
	TQFile importfile (filename);
	if (!importfile.exists())
	{
		KMessageBox::error ( 0, i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ) );
		return false;
	}
	if ( importfile.open(IO_ReadOnly))
	{
		TQString line = NULL;
		VpnAccountData *profiledata = new VpnAccountData(VpnAccountData::freeswan,"fritzbox") ;
		TQTextStream stream(&importfile);
		bool datapipecfgFound = false;
		bool policiesFound = false;
		bool targetsFound = false;
		bool localidFound = false;
		bool phase2localidFound = false;
		bool phase2remoteidFound = false;
		bool ipnetFound = false;
		bool nameFound = false;
		
		profiledata->setDescription(TQString(i18n("import from ")+filename));
		profiledata->setConnectionType( VpnAccountData::racoon);
		profiledata->setUsePerfectForwardSecrety(true);
		profiledata->setPerfectForwardSecrety("modp1024");
		profiledata->setUseIkeGroup(true);
		profiledata->setIkeGroup("modp1024");
		profiledata->setIpsecIke("aes");
		profiledata->setHashAlgo( "sha1");
		profiledata->setUseAuthenticationAlgorithm(true);
		profiledata->setEncryptionAlgorithm( "aes");
		profiledata->setAuthenticationAlgorithm( "hmac_sha1" );
		profiledata->setLocalIDType("user_fqdn");
		profiledata->setReplaceDefaultRoute(false);
		profiledata->setNetworkDevice("default");
		profiledata->setUseDnsUpdate(false);
		

		while ( !stream.atEnd() )
		{
			line = removeWhiteSpaceAtBegin(stream.readLine()).simplifyWhiteSpace();
			if (KvpncDebugLevel > 6)
				appendLogEntry(i18n ("import fritzbox config: line: %1").arg(line), debug);
			
			if (line.startsWith("datapipecfg"))
			{
				datapipecfgFound = true;
				if (KvpncDebugLevel > 2)
					appendLogEntry(i18n ("import fritzbox config: %1 found").arg("datapipecfg"), debug);
			}
			if (line.startsWith("policies"))
			{
				policiesFound = true;
				if (KvpncDebugLevel > 2)
					appendLogEntry(i18n ("import fritzbox config: %1 found").arg("policies"), debug);
			}
			if (line.startsWith("targets"))
			{
				targetsFound = true;
				if (KvpncDebugLevel > 2)
					appendLogEntry(i18n ("import fritzbox config: %1 found").arg("targets"), debug);
			}
			if (line.startsWith("localid"))
			{
				localidFound = true;
				if (KvpncDebugLevel > 2)
					appendLogEntry(i18n ("import fritzbox config: %1 found").arg("localid"), debug);
			}
			if (line.startsWith("phase2localid"))
			{
				phase2localidFound = true;
				if (KvpncDebugLevel > 2)
					appendLogEntry(i18n ("import fritzbox config: %1 found").arg("phase2localid"), debug);
			}
			if (line.startsWith("phase2remoteid"))
			{
				phase2remoteidFound = true;
				if (KvpncDebugLevel > 2)
					appendLogEntry(i18n ("import fritzbox config: %1 found").arg("phase2remoteid"), debug);
			}
			if (line.startsWith("ipnet"))
			{
				ipnetFound = true;
				if (KvpncDebugLevel > 2)
					appendLogEntry(i18n ("import fritzbox config: ipnetFound found"), debug);
			}
			if ( datapipecfgFound )
			{
				// here we can read masq timeouts, and so on.
			}
			if (targetsFound && policiesFound )
			{
				if (line.startsWith("name = "))
				{
					TQString ProfileName=line.section("= ",1,1).replace("\"","").replace(";","").replace(" ","_");
					if (KvpncDebugLevel > 2)
						appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("name").arg(ProfileName) ,debug);
					profiledata->setName(ProfileName);
					nameFound = true;
				}
				if (line.startsWith(" always_renew = "))
				{
					bool reconnectAfterConnectionLost=false;
					if (line.section("= ",1,1).replace(";","") == "yes")
						reconnectAfterConnectionLost = true;
					if (KvpncDebugLevel > 2)
						if (reconnectAfterConnectionLost)
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("always_renew").arg(i18n("yes")) ,debug);
						else
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("always_renew").arg(i18n("no")) ,debug);
					profiledata->setDoReconnectAfterConnectionLost(reconnectAfterConnectionLost);
				}
				if (line.startsWith("dont_filter_netbios = "))
				{
					bool dont_filter_netbios=false;
					if (line.section("= ",1,1).replace(";","") == "yes")
						dont_filter_netbios = true;
					if (KvpncDebugLevel > 2)
						if (dont_filter_netbios)
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("dont_filter_netbios").arg(i18n("yes")) ,debug);
						else
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("dont_filter_netbios").arg(i18n("no")) ,debug);
					// nothing to yet
				}
				if (line.startsWith("localip = "))
				{
					TQString LocalIp=line.section("= ",1,1).replace("\"","").replace(";","");
					if (KvpncDebugLevel > 2)
						appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("localip").arg(LocalIp) ,debug);
					// nothing to do yet
				}
				if (line.startsWith("virtualip = "))
				{
					TQString LocalVirtualIp=line.section("= ",1,1).replace("\"","").replace(";","");
					if (KvpncDebugLevel > 2)
						appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("virtualip").arg(LocalVirtualIp) ,debug);
					profiledata->setUseLeftSourceIp(true);
					profiledata->setLeftSourceIp(LocalVirtualIp);
				}
				if (line.startsWith("remoteip = "))
				{
					TQString RemoteIp=line.section("= ",1,1).replace("\"","").replace(";","");
					if (KvpncDebugLevel > 2)
						appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("remoteip").arg(RemoteIp) ,debug);
					// nothing to do yet
				}
				if (line.startsWith("remotehostname = "))
				{
					TQString Gateway=line.section("= ",1,1).replace("\"","").replace(";","");
					if (KvpncDebugLevel > 2)
						appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("remotehostname").arg(Gateway) ,debug);
					profiledata->setGateway(Gateway);
				}
				if (localidFound)
				{
					if (line.startsWith("user_fqdn = "))
					{
						TQString LocalId=line.section("= ",1,1).replace("\"","").replace(";","");
						if (KvpncDebugLevel > 2)
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg(TQString("user_fqdn")+" ("+i18n("local id")+")").arg(LocalId) ,debug);
						profiledata->setSpecialLocalID(LocalId);
						profiledata->setUseSpecialLocalID(true);
						profiledata->setLocalIDType("user_fqdn");
						localidFound = false;
					}
				}
				if (line.startsWith("mode = "))
				{
					TQString IpsecExchangeMode=line.section("= ",1,1).replace(";","");
					
					if (KvpncDebugLevel > 2)
						appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg(i18n("exchange mode")).arg(IpsecExchangeMode) ,debug);

					if (IpsecExchangeMode == "mode_aggressive")
						profiledata->setExchangeMode("aggressive");
					else
						profiledata->setExchangeMode("main");
				}
				if (line.startsWith("keytype = "))
				{
					TQString AuthType=line.section("= ",1,1).replace(";","");
					if (KvpncDebugLevel > 2)
						appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("keytype").arg(AuthType) ,debug);
					
					if (AuthType == "keytype_pre_shared")
						profiledata->setAuthType(VpnAccountData::psk);
					else
						profiledata->setAuthType(VpnAccountData::cert);
				}
				if (line.startsWith("key = "))
				{
					TQString PreshardKey=line.section("= ",1,1).replace("\"","").replace(";","");
					if (KvpncDebugLevel > 2 && KvpncDebugLevel < 5)
						appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("key").arg("******") ,debug);
					if (KvpncDebugLevel > 5)
						appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("key").arg(PreshardKey) ,debug);
					profiledata->setPreSharedKey(PreshardKey);
					profiledata->setPskIsInFile(false);
				}
				if (line.startsWith("cert_do_server_auth = "))
				{
					bool cert_do_server_auth=false;
					if (line.section("= ",1,1).replace(";","") == "yes")
						cert_do_server_auth = true;
					if (KvpncDebugLevel > 2)
						if (cert_do_server_auth)
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("cert_do_server_auth").arg(i18n("yes")) ,debug);
						else
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("cert_do_server_auth").arg(i18n("no")) ,debug);
					// nothing to to yet
				}
				if (line.startsWith("use_nat_t = "))
				{
					bool UseNat=false;
					if (line.section("= ",1,1).replace(";","") == "yes")
						UseNat = true;
					if (KvpncDebugLevel > 2)
						if (UseNat)
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("use_nat_t").arg(i18n("yes")) ,debug);
						else
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("use_nat_t").arg(i18n("no")) ,debug);
					profiledata->setUseNat(UseNat);
					profiledata->setUseUdp(true);
				}
				if (line.startsWith("use_xauth = "))
				{
					bool UseXauth=false;
					if (line.section("= ",1,1).replace(";","") == "yes")
						UseXauth = true;
					if (KvpncDebugLevel > 2)
						if (UseXauth)
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("use_xauth").arg(i18n("yes")) ,debug);
						else
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("use_xauth").arg(i18n("no")) ,debug);
					profiledata->setAuthWithUsernameAndPassword(UseXauth);
				}
				if (line.startsWith("use_cfgmode = "))
				{
					bool ModeConfig=false;
					if (line.section("= ",1,1).replace(";","") == "yes")
						ModeConfig = true;
					if (KvpncDebugLevel > 2)
						if (ModeConfig)
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("use_cfgmode").arg(i18n("yes")) ,debug);
						else
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg("use_cfgmode").arg(i18n("no")) ,debug);
					profiledata->setUseModeConfig(ModeConfig);
				}
				if (phase2localidFound)
				{
					if (line.startsWith("ipaddr = "))
					{
						TQString Phase2LocalId=line.section("= ",1,1).replace("\"","").replace(";","");
						if (KvpncDebugLevel > 2)
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg(i18n("ip addr for phase 2")).arg(Phase2LocalId) ,debug);
						// nothing to do yet
					}
				}
				if (phase2remoteidFound && ipnetFound)
				{
					profiledata->setUseRemoteNetwork(true);
					if (line.startsWith("ipaddr = "))
					{
						TQString RemoteNetWorkAddr=line.section("= ",1,1).replace(";","");
						if (KvpncDebugLevel > 2)
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg(i18n("remote network ip")).arg(RemoteNetWorkAddr) ,debug);
						profiledata->setRemoteNetAddr(RemoteNetWorkAddr);
					}
					if (line.startsWith("mask = "))
					{
						TQString RemoteNetWorkMask=line.section("= ",1,1).replace(";","");
						TQString RemoteNetWorkMaskNumeric = TQString().setNum(Utils(this).dottedIpv4Netmask2NetmaskBytes(RemoteNetWorkMask));
						if (KvpncDebugLevel > 2)
						{
							appendLogEntry(i18n ("import fritzbox config: %1 found: %2").arg(i18n("remote network netmask")).arg(RemoteNetWorkMask) ,debug);
							
							appendLogEntry(i18n("Netmask (dotted): %1, numeric value: %2").arg(RemoteNetWorkMask).arg(RemoteNetWorkMaskNumeric), debug);
						}
						profiledata->setRemoteNetMask(RemoteNetWorkMaskNumeric);
					}
				}
			}
		}
		if (policiesFound && nameFound)
		{
		
			bool ok = false;
			VpnAccountData * it;
			bool nameOk = false;
			while ( nameOk == false )
			{
				for ( it = AccountList->first(); it; it = AccountList->next() )
				{
					if ( it->getName() == profiledata->getName() )
					{
						//account->setName( TQString( account->getName() + "_2" ) );
						// 				KMessageBox::information ( this, i18n( "Profile name exists!\n It will be renamed to \"%1\"." ).arg( account->getName() ), i18n( "Name exist, renamed" ) );
						KMessageBox::error ( 0, i18n ( "Profile name exists!" ), i18n ( "Name Exists" ) );
						nameOk = false;
						TQString newName = KInputDialog::getText ( i18n ( "New Name" ), i18n ( "New name for profile:" ), TQString ( profiledata->getName() + "_2" ), &ok );
						if (newName.isEmpty())
						{
							KMessageBox::information ( 0, i18n ( "Import was canceled." ) );
							appendLogEntry ( i18n ( "Import was canceled." ), info );
							return false;
						}
						if (newName != it->getName() )
						{
							profiledata->setName ( newName );
							nameOk = true;
						}
					}
					else
					{
						nameOk = true;
					}
				}
			}
	
			if ( nameOk == true )
			{
				AccountList->append(profiledata);
				RetName = profiledata->getName();
				saveOptions(true, RetName);
				appendLogEntry ( i18n ( "Import of \"%1\" (%2) was successful." ).arg ( profiledata->getName() ).arg ( "Fritzbox" ), info );
				
				TQString bin = "racoon";
				ToolInfo *tool;
				//std::cout << "Tool (bin): " << bin << std::endl;
				if ( !ToolList->isEmpty() )
				{
					for ( tool = ToolList->first(); tool; tool = ToolList->next() )
					{
						if ( bin == tool->Name )
						{
							if ( tool->PathToExec.section ( '/', -1 ) != bin )
							{
								// program is NOT installed
								KMessageBox::information ( 0, i18n ( "The required tool (%1) is not installed, please install it before you are connecting and restart kvpnc." ).arg ( bin ), i18n ( "Tool Missing" ) );
							}
							break;
						}
					}
				}
			}
			else
			{
				KMessageBox::information ( 0, i18n ( "Import was canceled." ) );
				appendLogEntry ( i18n ( "Import was canceled." ), info );
				return false;
			}

		}
		TQString msg="";
		if (policiesFound  && nameFound)
			msg = i18n("Import was successful. 1 profile was imported.");
		else
			msg = i18n("Import was canceled because no profile was found.");

		KMessageBox::information ( 0, msg,i18n("Import success") );
		return policiesFound  && nameFound;
	}
	else
	{
		KMessageBox::error ( 0, i18n ( "Reading of \"%1\" has been failed!" ).arg ( filename ) );
		return false;
	}
	return true;
	
}

VpnAccountData* KVpncConfig::findProfile(TQPtrList<VpnAccountData> *list,const TQString& Name)
{
	VpnAccountData *it=NULL;
	bool found=false;
	if ( !list->isEmpty() )
	{
		for ( it = list->first(); it; it = list->next() )
		{
// 			std::cout << "findProfile(): it: " << it->getName() << " Name: " << Name << std::endl;
			if (Name == it->getName())
			{
				found=true;
// 				std::cout << "findProfile(): profile found." << std::endl;
				break;
			}
		}
	}
	if (found)
		return it;
	else
	{
// 		std::cout << "findProfile(): profile not found." << std::endl;
		return NULL;
	}
}

TQString KVpncConfig::removeWhiteSpaceAtBegin(const TQString str)
{
	TQString newstr="";
	int i=0;
	for (i=0;i<(int)str.length();i++)
	{
		if (!TQChar(str.at(i)).isSpace())
			break;
	}
	newstr = str.right(str.length()-i);
	return newstr;
}

void KVpncConfig::doBackupConfig()
{
	KStandardDirs * dirs = KGlobal::dirs();
	TQString  config = TQString(dirs->saveLocation( "config" )+"/kvpncrc");
	TQFile OriginalConfFile( config );
	TQFile backupOriginalConfFile( config+".backup" );
	TQTextStream writestream( &backupOriginalConfFile );
	TQTextStream readstream( &OriginalConfFile );
	if ( OriginalConfFile.open( IO_ReadOnly ) )
	{
		if (backupOriginalConfFile.open(IO_WriteOnly))
		{
			TQString OriginalConfFileContent = TQString( OriginalConfFile.readAll() )	;
			writestream << OriginalConfFileContent;
			OriginalConfFile.close();
			backupOriginalConfFile.close();
		}
	}
}

void KVpncConfig::restoreBackupConfig()
{
	KStandardDirs * dirs = KGlobal::dirs();
	TQString  config = TQString(dirs->saveLocation( "config" )+"/kvpncrc");
	TQFile OriginalConfFile( config+".backup" );
	TQFile backupOriginalConfFile( config );
	TQTextStream writestream( &backupOriginalConfFile );
	TQTextStream readstream( &OriginalConfFile );
	if ( OriginalConfFile.open( IO_ReadOnly ) )
	{
		if (backupOriginalConfFile.open(IO_WriteOnly))
		{
			TQString OriginalConfFileContent = TQString( OriginalConfFile.readAll() )	;
			writestream << OriginalConfFileContent;
			OriginalConfFile.close();
			backupOriginalConfFile.close();
		}
	}
}

void KVpncConfig::getToolsInfo()
{
	ToolInfo *it;
	//std::cout << "Tool (bin): " << bin << std::endl;
	if (!ToolList->isEmpty())
	{
		for ( it = ToolList->first(); it; it = ToolList->next() )
		{
			it->collectToolInfo();
		}
	}
}

void KVpncConfig::removeEntry(TQString Name)
{
	KStandardDirs * dirs = KGlobal::dirs();
	TQString filePath = dirs->findResource ( "config", "kvpncrc" );

	appPointer->processEvents();

	if (useKwallet && KWallet::Wallet::isEnabled())
		config->deleteEntry( "First use of Kwallet", false );
	/* = user data = */
	VpnAccountData *it;
	if ( !AccountList->isEmpty() )
	{
		for ( it = AccountList->first(); it; it = AccountList->next() )
		{
			if ( !it->getName().isEmpty() )
			{
				TQString name = it->getName();
				if (it->getName() == Name)
				{
					//std::cout << "Remove profile: " << it->getName() << std::endl;
					TQString ProfileName = "Profile_";
					ProfileName += name;
					config->setGroup( ProfileName );

					/* passwords with kwallet */
					if ( useKwallet && KWallet::Wallet::isEnabled())
					{
	// 					if (KvpncDebugLevel > 0)
	// 						appendLogEntry(i18n( "Wallet enabled and available, writing to wallet." ),debug);
	// 					// Open local wallet
						wallet = KWallet::Wallet::openWallet(KWallet::Wallet::LocalWallet());
						if (wallet != 0)
						{
							TQString walletname="kvpnc";
							// Check if folder exists, otherwise create it
							bool walletOK=true;
							if (!wallet->hasFolder(walletname))
							{
								walletOK = wallet->createFolder(walletname);
								wallet->sync();
							}
							if (walletOK)
							{
								wallet->setFolder(walletname);
								//std::cout << "[set] account: " << ProfileName << ", loginname: " << loginname << ", password: " << pwd << std::endl;
								bool UserPasswordOK = (wallet->removeEntry (TQString(name+"__user_pw")) == 0);
								bool PskOK= (wallet->removeEntry (TQString(name+"__psk")) == 0);
								bool PskKeyPassOK = (wallet->removeEntry (TQString(name+"__priv_key_pwd")) == 0);
// 								wallet->sync();

								if (KvpncDebugLevel > 2)
								{
									if (UserPasswordOK)
										appendLogEntry(i18n( "delete of %1 was ok." ).arg(i18n("user password")), debug);
									else
										appendLogEntry(i18n( "delete of %1 has failed." ).arg(i18n("user password")), debug);
	//
									if (PskOK)
										appendLogEntry(i18n( "delete of %1 was successful." ).arg(i18n("preshared key")), debug);
									else
										appendLogEntry(i18n( "delete of %1 has failed." ).arg(i18n("preshared key")),debug);

									if (PskKeyPassOK)
										appendLogEntry(i18n( "delete of %1 was successful." ).arg(i18n("private key password")), debug);
									else
										appendLogEntry(i18n( "delete of %1 has failed." ).arg(i18n("private key password")),debug);


	// 								//std::cout << "success: " << pwdOK << std::endl;
								}
							}
							else
							{
								KMessageBox::error( 0, i18n( "Unable to create wallet folder for kvpnc!" ) );
								appendLogEntry(i18n( "Unable to create wallet folder for kvpnc!" ), error);
						}
					}
				}
					if (KvpncDebugLevel > 0)
						appendLogEntry(i18n( "Wallet disabled or not available, writing to config file." ),debug);
					// write passwords to config file :|
					config->deleteEntry( "User password" );
					config->deleteEntry( "Pre shared key" );
					config->deleteEntry( "PrivateKey password" );
					// 			}

					config->deleteEntry( "Connection type" );
					config->deleteEntry( "VPN Gateway" );
					config->deleteEntry( "VPN ID" );
					config->deleteEntry( "Username" );
					config->deleteEntry( "Save user password" );
					config->deleteEntry( "Save PSK" );
					config->deleteEntry( "Private key" );
					config->deleteEntry( "Use advanced settings" );
					config->deleteEntry( "Application version" );
					config->deleteEntry( "Local port" );
					config->deleteEntry( "NT domain name" );
					config->deleteEntry( "Perfect forward secrety" );
					config->deleteEntry( "IKE group" );
					config->deleteEntry( "Use application version" );
					config->deleteEntry( "Use global IPSec secret" );
					config->deleteEntry( "Use IKE group" );
					config->deleteEntry( "Use local port" );
					config->deleteEntry( "Use NT domain name" );
					config->deleteEntry( "Use single DES" );
					config->deleteEntry( "Use perfect Forward Secrety" );
					config->deleteEntry( "Remote net address" );
					config->deleteEntry( "Remote net mask" );
					config->deleteEntry( "x509 certificate" );
					config->deleteEntry( "Ca certificate" );
					config->deleteEntry( "Network device" );
					config->deleteEntry( "Cert path" );
					config->deleteEntry( "Auth type");
					config->deleteEntry( "do ping ip" );
					config->deleteEntry( "Ping host IP" );
					config->deleteEntry( "Use special remote ID" );
					config->deleteEntry( "Special server certificate" );
					config->deleteEntry( "Use special server certificate" );
					config->deleteEntry( "Special remote ID" );
					config->deleteEntry( "Use UDP-protocol" );
					config->deleteEntry( "Use UDP-port" );
					config->deleteEntry( "local UDP port" );
					config->deleteEntry( "use DNS_UPDATE" );
					config->deleteEntry( "use DNS-server" );
					config->deleteEntry( "DNS server" );
					config->deleteEntry( "get dns server from peer" );
					config->deleteEntry( "refuse 40 bit encryption" );

					appPointer->processEvents();

					config->deleteEntry( "refuse 128 bit encryption" );
					config->deleteEntry( "require stateless encryption" );
					config->deleteEntry( "require mppe" );
					config->deleteEntry( "Disable MPPE compression" );
					config->deleteEntry( "Local virtual IP" );
					config->deleteEntry( "Remote virtual IP" );
					config->deleteEntry( "Pre shared key file" );
					config->deleteEntry( "Execute command before connect" );
					config->deleteEntry( "Execute command after connect" );
					config->deleteEntry( "Execute command before disconnect" );
					config->deleteEntry( "Execute command after disconnect" );
					config->deleteEntry( "Command before connect" );
					config->deleteEntry( "Command after connect" );
					config->deleteEntry( "Command before disconnect" );
					config->deleteEntry( "Command after disconnect" );
					config->deleteEntry( "Use no BSD compression" );
					config->deleteEntry( "Use no deflate" );
					config->deleteEntry( "Set default route" );
					config->deleteEntry( "Replace default route" );
					config->deleteEntry( "Use own MTU" );
					config->deleteEntry( "Use own MRU" );
					config->deleteEntry( "MTU for pppd" );
					config->deleteEntry( "MRU for pppd" );
					config->deleteEntry( "Use Virtual IP" );
					config->deleteEntry( "Virtual IP" );
					config->deleteEntry( "PSK is in file" );
					config->deleteEntry( "Use additional network routes" );
					config->deleteEntry( "Hash algorithm" );
					config->deleteEntry( "Tunnel device type" );
					config->deleteEntry( "Use userdefined port" );
					config->deleteEntry( "Userdefined port" );
					config->deleteEntry( "Keep default route" );
					config->deleteEntry( "Additional network routes" );
					config->deleteEntry("AuthWithUsernameAndPassword" );
					config->deleteEntry("AllowEmptyGroupPassword" );
					config->deleteEntry("Encryption algorithm");
					config->deleteEntry("Authentication algorithm");

					config->deleteGroup( ProfileName );

					/* give info */
					//slotStatusMsg ( i18n( "Profile \"%1\" removed." ).arg( Name ), ID_FLASH_MSG );
					appendLogEntry ( i18n( "Profile \"%1\" removed." ).arg( Name ) , info);
					AccountList->remove(it);
					break;
				}
			}
		}
		appPointer->processEvents();
	}
	config->sync();
	appPointer->processEvents();
}