CFLAGS="$old_cflags"
LIBS="$old_libs"
if test "x$with_sasl" = "xyes" ; then
- AC_DEFINE_UNQUOTED([HAVE_SASL], 1,
+ AC_DEFINE_UNQUOTED([WITH_SASL], 1,
[whether Cyrus SASL is available for authentication])
fi
fi
-AM_CONDITIONAL([HAVE_SASL], [test "x$with_sasl" = "xyes"])
+AM_CONDITIONAL([WITH_SASL], [test "x$with_sasl" = "xyes"])
AC_SUBST([SASL_CFLAGS])
AC_SUBST([SASL_LIBS])
# This is needed for clients too, so can't wrap in
# the WITH_LIBVIRTD conditional
-if HAVE_SASL
+if WITH_SASL
install-data-sasl:
$(MKDIR_P) $(DESTDIR)$(sysconfdir)/sasl2/
$(INSTALL_DATA) $(srcdir)/libvirtd.sasl $(DESTDIR)$(sysconfdir)/sasl2/libvirt.conf
if (STREQ(p->str, "none")) {
*auth = VIR_NET_SERVER_SERVICE_AUTH_NONE;
-#if HAVE_SASL
+#if WITH_SASL
} else if (STREQ(p->str, "sasl")) {
*auth = VIR_NET_SERVER_SERVICE_AUTH_SASL;
#endif
!data->unix_sock_rw_perms)
goto no_memory;
-#if HAVE_SASL
+#if WITH_SASL
data->auth_tcp = REMOTE_AUTH_SASL;
#else
data->auth_tcp = REMOTE_AUTH_NONE;
#include "virdbus.h"
-#if HAVE_SASL
+#if WITH_SASL
virNetSASLContextPtr saslCtxt = NULL;
#endif
virNetServerProgramPtr remoteProgram = NULL;
#endif
}
-#if HAVE_SASL
+#if WITH_SASL
if (config->auth_unix_rw == REMOTE_AUTH_SASL ||
config->auth_unix_ro == REMOTE_AUTH_SASL ||
# if HAVE_GNUTLS
# include "qemu_protocol.h"
# include "virlog.h"
# include "virthread.h"
-# if HAVE_SASL
+# if WITH_SASL
# include "virnetsaslcontext.h"
# endif
# include "virnetserverprogram.h"
int domainEventCallbackID[VIR_DOMAIN_EVENT_ID_LAST];
-# if HAVE_SASL
+# if WITH_SASL
virNetSASLSessionPtr sasl;
# endif
bool keepalive_supported;
};
-# if HAVE_SASL
+# if WITH_SASL
extern virNetSASLContextPtr saslCtxt;
# endif
extern virNetServerProgramPtr remoteProgram;
}
-#ifdef HAVE_SASL
+#ifdef WITH_SASL
/*
* Initializes the SASL session in prepare for authentication
* and gives the client a list of allowed mechanisms to choose
USED_SYM_FILES += $(srcdir)/libvirt_xenxs.syms
endif
-if HAVE_SASL
+if WITH_SASL
USED_SYM_FILES += $(srcdir)/libvirt_sasl.syms
endif
EXTRA_DIST += \
rpc/virnettlscontext.h rpc/virnettlscontext.c
endif
-if HAVE_SASL
+if WITH_SASL
libvirt_net_rpc_la_SOURCES += \
rpc/virnetsaslcontext.h rpc/virnetsaslcontext.c
else
xdrproc_t ret_filter, char *ret);
static int remoteAuthenticate(virConnectPtr conn, struct private_data *priv,
virConnectAuthPtr auth, const char *authtype);
-#if HAVE_SASL
+#if WITH_SASL
static int remoteAuthSASL(virConnectPtr conn, struct private_data *priv,
virConnectAuthPtr auth, const char *mech);
#endif
}
switch (type) {
-#if HAVE_SASL
+#if WITH_SASL
case REMOTE_AUTH_SASL: {
const char *mech = NULL;
if (authtype &&
-#if HAVE_SASL
+#if WITH_SASL
static int remoteAuthCredVir2SASL(int vircred)
{
switch (vircred) {
return ret;
}
-#endif /* HAVE_SASL */
+#endif /* WITH_SASL */
#if HAVE_POLKIT
/* For incoming message packets */
virNetMessage msg;
-#if HAVE_SASL
+#if WITH_SASL
virNetSASLSessionPtr sasl;
#endif
#if HAVE_GNUTLS
virObjectUnref(client->tls);
#endif
-#if HAVE_SASL
+#if WITH_SASL
virObjectUnref(client->sasl);
#endif
virObjectUnref(client->tls);
client->tls = NULL;
#endif
-#if HAVE_SASL
+#if WITH_SASL
virObjectUnref(client->sasl);
client->sasl = NULL;
#endif
}
-#if HAVE_SASL
+#if WITH_SASL
void virNetClientSetSASLSession(virNetClientPtr client,
virNetSASLSessionPtr sasl)
{
if (client->tls)
ret = true;
#endif
-#if HAVE_SASL
+#if WITH_SASL
if (client->sasl)
ret = true;
#endif
# include "virnettlscontext.h"
# endif
# include "virnetmessage.h"
-# ifdef HAVE_SASL
+# ifdef WITH_SASL
# include "virnetsaslcontext.h"
# endif
# include "virnetclientprogram.h"
virNetMessagePtr msg,
virNetClientStreamPtr st);
-# ifdef HAVE_SASL
+# ifdef WITH_SASL
void virNetClientSetSASLSession(virNetClientPtr client,
virNetSASLSessionPtr sasl);
# endif
#include <config.h>
-#if HAVE_SASL
+#if WITH_SASL
# include <sasl/sasl.h>
#endif
virNetTLSContextPtr tlsCtxt;
virNetTLSSessionPtr tls;
#endif
-#if HAVE_SASL
+#if WITH_SASL
virNetSASLSessionPtr sasl;
#endif
int sockTimer; /* Timer to be fired upon cached data,
if (client->tls)
secure = true;
#endif
-#if HAVE_SASL
+#if WITH_SASL
if (client->sasl)
secure = true;
#endif
}
-
-#if HAVE_SASL
+#if WITH_SASL
void virNetServerClientSetSASLSession(virNetServerClientPtr client,
virNetSASLSessionPtr sasl)
{
client->privateDataFreeFunc(client->privateData);
VIR_FREE(client->identity);
-#if HAVE_SASL
+#if WITH_SASL
virObjectUnref(client->sasl);
#endif
if (client->sockTimer > 0)
client->tx->donefds++;
}
-#if HAVE_SASL
+#if WITH_SASL
/* Completed this 'tx' operation, so now read for all
* future rx/tx to be under a SASL SSF layer
*/
int virNetServerClientGetTLSKeySize(virNetServerClientPtr client);
# endif
-# ifdef HAVE_SASL
+# ifdef WITH_SASL
void virNetServerClientSetSASLSession(virNetServerClientPtr client,
virNetSASLSessionPtr sasl);
# endif
#if HAVE_GNUTLS
virNetTLSSessionPtr tlsSession;
#endif
-#if HAVE_SASL
+#if WITH_SASL
virNetSASLSessionPtr saslSession;
const char *saslDecoded;
virNetTLSSessionSetIOCallbacks(sock->tlsSession, NULL, NULL, NULL);
virObjectUnref(sock->tlsSession);
#endif
-#if HAVE_SASL
+#if WITH_SASL
virObjectUnref(sock->saslSession);
#endif
}
#endif
-#if HAVE_SASL
+#if WITH_SASL
void virNetSocketSetSASLSession(virNetSocketPtr sock,
virNetSASLSessionPtr sess)
{
hasCached = true;
#endif
-#if HAVE_SASL
+#if WITH_SASL
if (sock->saslDecoded)
hasCached = true;
#endif
{
bool hasPending = false;
virMutexLock(&sock->lock);
-#if HAVE_SASL
+#if WITH_SASL
if (sock->saslEncoded)
hasPending = true;
#endif
}
-#if HAVE_SASL
+#if WITH_SASL
static ssize_t virNetSocketReadSASL(virNetSocketPtr sock, char *buf, size_t len)
{
ssize_t got;
{
ssize_t ret;
virMutexLock(&sock->lock);
-#if HAVE_SASL
+#if WITH_SASL
if (sock->saslSession)
ret = virNetSocketReadSASL(sock, buf, len);
else
ssize_t ret;
virMutexLock(&sock->lock);
-#if HAVE_SASL
+#if WITH_SASL
if (sock->saslSession)
ret = virNetSocketWriteSASL(sock, buf, len);
else
# include "virnettlscontext.h"
# endif
# include "virobject.h"
-# ifdef HAVE_SASL
+# ifdef WITH_SASL
# include "virnetsaslcontext.h"
# endif
# include "virjson.h"
virNetTLSSessionPtr sess);
# endif
-# ifdef HAVE_SASL
+# ifdef WITH_SASL
void virNetSocketSetSASLSession(virNetSocketPtr sock,
virNetSASLSessionPtr sess);
# endif
goto cleanup;
}
-#if !HAVE_SASL
+#if !WITH_SASL
if (strstr(err->message, "unsupported auth sasl")) {
VIR_DEBUG("sasl unsupported, skipping this config");
goto cleanup;