X-Git-Url: https://vcs.fsf.org/?a=blobdiff_plain;f=src%2Fsrc%2Fauths%2Fgsasl_exim.c;h=7003b0cbb01183b631ce598c6a0f0b8fc4b021b8;hb=25bd12fdff615275da6b811570b0f65d57ddc441;hp=f527e130af9bc065befa4f8f5e200f69efe69d17;hpb=1c519e07b908a314ce7bdfceb6baa9e18e302dfc;p=exim.git diff --git a/src/src/auths/gsasl_exim.c b/src/src/auths/gsasl_exim.c index f527e130a..7003b0cbb 100644 --- a/src/src/auths/gsasl_exim.c +++ b/src/src/auths/gsasl_exim.c @@ -44,6 +44,11 @@ static void dummy(int x) { dummy2(x-1); } #endif +#if GSASL_VERSION_MINOR >= 9 +# define EXIM_GSASL_HAVE_SCRAM_SHA_256 +#endif + + /* Authenticator-specific options. */ /* I did have server_*_condition options for various mechanisms, but since we only ever handle one mechanism at a time, I didn't see the point in keeping @@ -100,6 +105,14 @@ int auth_gsasl_client(auth_instance *ablock, void * sx, int timeout, uschar *buffer, int buffsize) {return 0;} void auth_gsasl_version_report(FILE *f) {} +void +auth_gsasl_macros(void) +{ +# ifdef EXIM_GSASL_HAVE_SCRAM_SHA_256 + builtin_macro_create(US"_HAVE_AUTH_GSASL_SCRAM_SHA_256"); +# endif +} + #else /*!MACRO_PREDEF*/ @@ -905,6 +918,11 @@ fprintf(f, "Library version: GNU SASL: Compile: %s\n" GSASL_VERSION, runtime); } + + +/* Dummy */ +void auth_gsasl_macros(void) {} + #endif /*!MACRO_PREDEF*/ #endif /* AUTH_GSASL */