Rename HAVE_GNUTLS to WITH_GNUTLS

This commit is contained in:
Daniel P. Berrange 2013-01-08 21:02:05 +00:00
parent 19e285f1ae
commit bccd4a8cbc
20 changed files with 89 additions and 89 deletions

View File

@ -1086,10 +1086,10 @@ if test "x$with_gnutls" != "xno"; then
fi
if test "x$with_gnutls" = "xyes" ; then
AC_DEFINE_UNQUOTED([HAVE_GNUTLS], 1,
AC_DEFINE_UNQUOTED([WITH_GNUTLS], 1,
[whether GNUTLS is available for encryption])
fi
AM_CONDITIONAL([HAVE_GNUTLS], [test "x$with_gnutls" = "xyes"])
AM_CONDITIONAL([WITH_GNUTLS], [test "x$with_gnutls" = "xyes"])
AC_SUBST([GNUTLS_CFLAGS])
AC_SUBST([GNUTLS_LIBS])

View File

@ -449,7 +449,7 @@ static int daemonSetupNetworking(virNetServerPtr srv,
virNetServerServicePtr svc = NULL;
virNetServerServicePtr svcRO = NULL;
virNetServerServicePtr svcTCP = NULL;
#if HAVE_GNUTLS
#if WITH_GNUTLS
virNetServerServicePtr svcTLS = NULL;
#endif
gid_t unix_sock_gid = 0;
@ -476,7 +476,7 @@ static int daemonSetupNetworking(virNetServerPtr srv,
unix_sock_rw_mask,
unix_sock_gid,
config->auth_unix_rw,
#if HAVE_GNUTLS
#if WITH_GNUTLS
NULL,
#endif
false,
@ -488,7 +488,7 @@ static int daemonSetupNetworking(virNetServerPtr srv,
unix_sock_ro_mask,
unix_sock_gid,
config->auth_unix_ro,
#if HAVE_GNUTLS
#if WITH_GNUTLS
NULL,
#endif
true,
@ -513,7 +513,7 @@ static int daemonSetupNetworking(virNetServerPtr srv,
if (!(svcTCP = virNetServerServiceNewTCP(config->listen_addr,
config->tcp_port,
config->auth_tcp,
#if HAVE_GNUTLS
#if WITH_GNUTLS
NULL,
#endif
false,
@ -525,7 +525,7 @@ static int daemonSetupNetworking(virNetServerPtr srv,
goto error;
}
#if HAVE_GNUTLS
#if WITH_GNUTLS
if (config->listen_tls) {
virNetTLSContextPtr ctxt = NULL;
@ -581,7 +581,7 @@ static int daemonSetupNetworking(virNetServerPtr srv,
#if WITH_SASL
if (config->auth_unix_rw == REMOTE_AUTH_SASL ||
config->auth_unix_ro == REMOTE_AUTH_SASL ||
# if HAVE_GNUTLS
# if WITH_GNUTLS
config->auth_tls == REMOTE_AUTH_SASL ||
# endif
config->auth_tcp == REMOTE_AUTH_SASL) {
@ -595,7 +595,7 @@ static int daemonSetupNetworking(virNetServerPtr srv,
return 0;
error:
#if HAVE_GNUTLS
#if WITH_GNUTLS
virObjectUnref(svcTLS);
#endif
virObjectUnref(svcTCP);

View File

@ -2464,7 +2464,7 @@ remoteDispatchAuthSaslInit(virNetServerPtr server ATTRIBUTE_UNUSED,
if (!sasl)
goto authfail;
# if HAVE_GNUTLS
# if WITH_GNUTLS
/* Inform SASL that we've got an external SSF layer from TLS */
if (virNetServerClientHasTLSSession(client)) {
int ssf;

View File

@ -1779,7 +1779,7 @@ else
EXTRA_DIST += \
rpc/virnetsshsession.h rpc/virnetsshsession.c
endif
if HAVE_GNUTLS
if WITH_GNUTLS
libvirt_net_rpc_la_SOURCES += \
rpc/virnettlscontext.h rpc/virnettlscontext.c
else

View File

@ -55,7 +55,7 @@
#include "configmake.h"
#include "intprops.h"
#include "virconf.h"
#if HAVE_GNUTLS
#if WITH_GNUTLS
# include "rpc/virnettlscontext.h"
#endif
#include "vircommand.h"
@ -271,7 +271,7 @@ winsock_init(void)
#endif
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
static int virTLSMutexInit(void **priv)
{
virMutexPtr lock = NULL;
@ -408,14 +408,14 @@ virGlobalInit(void)
virErrorInitialize() < 0)
goto error;
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
gcry_control(GCRYCTL_SET_THREAD_CBS, &virTLSThreadImpl);
gcry_check_version(NULL);
#endif
virLogSetFromEnv();
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
virNetTLSInit();
#endif

View File

@ -655,7 +655,7 @@ virLockDaemonSetupNetworkingSystemD(virNetServerPtr srv)
/* Systemd passes FDs, starting immediately after stderr,
* so the first FD we'll get is '3'. */
if (!(svc = virNetServerServiceNewFD(3, 0,
#if HAVE_GNUTLS
#if WITH_GNUTLS
NULL,
#endif
false, 1)))
@ -677,7 +677,7 @@ virLockDaemonSetupNetworkingNative(virNetServerPtr srv, const char *sock_path)
VIR_DEBUG("Setting up networking natively");
if (!(svc = virNetServerServiceNewUNIX(sock_path, 0700, 0, 0,
#if HAVE_GNUTLS
#if WITH_GNUTLS
NULL,
#endif
false, 1)))

View File

@ -631,7 +631,7 @@ static int virLXCControllerSetupServer(virLXCControllerPtr ctrl)
0700,
0,
0,
#if HAVE_GNUTLS
#if WITH_GNUTLS
NULL,
#endif
false,

View File

@ -23,7 +23,7 @@
#include <config.h>
#include <sys/time.h>
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
# include <gnutls/gnutls.h>
# include <gnutls/x509.h>
#endif
@ -198,7 +198,7 @@ static void qemuMigrationCookieFree(qemuMigrationCookiePtr mig)
}
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
static char *
qemuDomainExtractTLSSubject(const char *certdir)
{
@ -276,7 +276,7 @@ qemuMigrationCookieGraphicsAlloc(virQEMUDriverPtr driver,
if (!listenAddr)
listenAddr = driver->vncListen;
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
if (driver->vncTLS &&
!(mig->tlsSubject = qemuDomainExtractTLSSubject(driver->vncTLSx509certdir)))
goto error;
@ -291,7 +291,7 @@ qemuMigrationCookieGraphicsAlloc(virQEMUDriverPtr driver,
if (!listenAddr)
listenAddr = driver->spiceListen;
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
if (driver->spiceTLS &&
!(mig->tlsSubject = qemuDomainExtractTLSSubject(driver->spiceTLSx509certdir)))
goto error;
@ -304,7 +304,7 @@ qemuMigrationCookieGraphicsAlloc(virQEMUDriverPtr driver,
no_memory:
virReportOOMError();
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
error:
#endif
qemuMigrationCookieGraphicsFree(mig);

View File

@ -80,7 +80,7 @@ struct private_data {
int counter; /* Serial number for RPC */
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
virNetTLSContextPtr tls;
#endif
@ -598,7 +598,7 @@ doRemoteOpen(virConnectPtr conn,
/* Connect to the remote service. */
switch (transport) {
case trans_tls:
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
priv->tls = virNetTLSContextNewClientPath(pkipath,
geteuid() != 0 ? true : false,
sanity, verify);
@ -618,7 +618,7 @@ doRemoteOpen(virConnectPtr conn,
if (!priv->client)
goto failed;
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
if (priv->tls) {
VIR_DEBUG("Starting TLS session");
if (virNetClientSetTLSSession(priv->client, priv->tls) < 0)
@ -1012,7 +1012,7 @@ doRemoteClose(virConnectPtr conn, struct private_data *priv)
(xdrproc_t) xdr_void, (char *) NULL) == -1)
ret = -1;
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
virObjectUnref(priv->tls);
priv->tls = NULL;
#endif
@ -3893,7 +3893,7 @@ remoteAuthSASL(virConnectPtr conn, struct private_data *priv,
saslcb)))
goto cleanup;
# ifdef HAVE_GNUTLS
# ifdef WITH_GNUTLS
/* Initialize some connection props we care about */
if (priv->tls) {
if ((ssf = virNetClientGetTLSKeySize(priv->client)) < 0)

View File

@ -70,7 +70,7 @@ struct _virNetClient {
virNetSocketPtr sock;
bool asyncIO;
#if HAVE_GNUTLS
#if WITH_GNUTLS
virNetTLSSessionPtr tls;
#endif
char *hostname;
@ -629,7 +629,7 @@ void virNetClientDispose(void *obj)
if (client->sock)
virNetSocketRemoveIOCallback(client->sock);
virObjectUnref(client->sock);
#if HAVE_GNUTLS
#if WITH_GNUTLS
virObjectUnref(client->tls);
#endif
#if WITH_SASL
@ -667,7 +667,7 @@ virNetClientCloseLocked(virNetClientPtr client)
virObjectUnref(client->sock);
client->sock = NULL;
#if HAVE_GNUTLS
#if WITH_GNUTLS
virObjectUnref(client->tls);
client->tls = NULL;
#endif
@ -751,7 +751,7 @@ void virNetClientSetSASLSession(virNetClientPtr client,
#endif
#if HAVE_GNUTLS
#if WITH_GNUTLS
int virNetClientSetTLSSession(virNetClientPtr client,
virNetTLSContextPtr tls)
{
@ -860,7 +860,7 @@ bool virNetClientIsEncrypted(virNetClientPtr client)
{
bool ret = false;
virNetClientLock(client);
#if HAVE_GNUTLS
#if WITH_GNUTLS
if (client->tls)
ret = true;
#endif
@ -966,7 +966,7 @@ const char *virNetClientRemoteAddrString(virNetClientPtr client)
return virNetSocketRemoteAddrString(client->sock);
}
#if HAVE_GNUTLS
#if WITH_GNUTLS
int virNetClientGetTLSKeySize(virNetClientPtr client)
{
int ret = 0;

View File

@ -23,7 +23,7 @@
#ifndef __VIR_NET_CLIENT_H__
# define __VIR_NET_CLIENT_H__
# ifdef HAVE_GNUTLS
# ifdef WITH_GNUTLS
# include "virnettlscontext.h"
# endif
# include "virnetmessage.h"
@ -109,7 +109,7 @@ void virNetClientSetSASLSession(virNetClientPtr client,
virNetSASLSessionPtr sasl);
# endif
# ifdef HAVE_GNUTLS
# ifdef WITH_GNUTLS
int virNetClientSetTLSSession(virNetClientPtr client,
virNetTLSContextPtr tls);
# endif
@ -120,7 +120,7 @@ bool virNetClientIsOpen(virNetClientPtr client);
const char *virNetClientLocalAddrString(virNetClientPtr client);
const char *virNetClientRemoteAddrString(virNetClientPtr client);
# ifdef HAVE_GNUTLS
# ifdef WITH_GNUTLS
int virNetClientGetTLSKeySize(virNetClientPtr client);
# endif

View File

@ -98,7 +98,7 @@ struct _virNetServer {
unsigned int quit :1;
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
virNetTLSContextPtr tls;
#endif
@ -311,7 +311,7 @@ static int virNetServerDispatchNewClient(virNetServerServicePtr svc,
virNetServerServiceGetAuth(svc),
virNetServerServiceIsReadonly(svc),
virNetServerServiceGetMaxRequests(svc),
#if HAVE_GNUTLS
#if WITH_GNUTLS
virNetServerServiceGetTLSContext(svc),
#endif
srv->clientPrivNew,
@ -1038,7 +1038,7 @@ no_memory:
return -1;
}
#if HAVE_GNUTLS
#if WITH_GNUTLS
int virNetServerSetTLSContext(virNetServerPtr srv,
virNetTLSContextPtr tls)
{

View File

@ -26,7 +26,7 @@
# include <signal.h>
# ifdef HAVE_GNUTLS
# ifdef WITH_GNUTLS
# include "virnettlscontext.h"
# endif
# include "virnetserverprogram.h"
@ -81,7 +81,7 @@ int virNetServerAddService(virNetServerPtr srv,
int virNetServerAddProgram(virNetServerPtr srv,
virNetServerProgramPtr prog);
# if HAVE_GNUTLS
# if WITH_GNUTLS
int virNetServerSetTLSContext(virNetServerPtr srv,
virNetTLSContextPtr tls);
# endif

View File

@ -66,7 +66,7 @@ struct _virNetServerClient
int auth;
bool readonly;
char *identity;
#if HAVE_GNUTLS
#if WITH_GNUTLS
virNetTLSContextPtr tlsCtxt;
virNetTLSSessionPtr tls;
#endif
@ -149,7 +149,7 @@ virNetServerClientCalculateHandleMode(virNetServerClientPtr client) {
VIR_DEBUG("tls=%p hs=%d, rx=%p tx=%p",
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
client->tls,
client->tls ? virNetTLSSessionGetHandshakeStatus(client->tls) : -1,
#else
@ -160,7 +160,7 @@ virNetServerClientCalculateHandleMode(virNetServerClientPtr client) {
if (!client->sock || client->wantClose)
return 0;
#if HAVE_GNUTLS
#if WITH_GNUTLS
if (client->tls) {
switch (virNetTLSSessionGetHandshakeStatus(client->tls)) {
case VIR_NET_TLS_HANDSHAKE_RECVING:
@ -188,7 +188,7 @@ virNetServerClientCalculateHandleMode(virNetServerClientPtr client) {
then monitor for writability on socket */
if (client->tx)
mode |= VIR_EVENT_HANDLE_WRITABLE;
#if HAVE_GNUTLS
#if WITH_GNUTLS
}
#endif
VIR_DEBUG("mode=%o", mode);
@ -297,7 +297,7 @@ void virNetServerClientRemoveFilter(virNetServerClientPtr client,
}
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
/* Check the client's access. */
static int
virNetServerClientCheckAccess(virNetServerClientPtr client)
@ -353,7 +353,7 @@ static void virNetServerClientSockTimerFunc(int timer,
static virNetServerClientPtr
virNetServerClientNewInternal(virNetSocketPtr sock,
int auth,
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
virNetTLSContextPtr tls,
#endif
bool readonly,
@ -375,7 +375,7 @@ virNetServerClientNewInternal(virNetSocketPtr sock,
client->sock = virObjectRef(sock);
client->auth = auth;
client->readonly = readonly;
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
client->tlsCtxt = virObjectRef(tls);
#endif
client->nrequests_max = nrequests_max;
@ -411,7 +411,7 @@ virNetServerClientPtr virNetServerClientNew(virNetSocketPtr sock,
int auth,
bool readonly,
size_t nrequests_max,
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
virNetTLSContextPtr tls,
#endif
virNetServerClientPrivNew privNew,
@ -422,7 +422,7 @@ virNetServerClientPtr virNetServerClientNew(virNetSocketPtr sock,
virNetServerClientPtr client;
VIR_DEBUG("sock=%p auth=%d tls=%p", sock, auth,
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
tls
#else
NULL
@ -430,7 +430,7 @@ virNetServerClientPtr virNetServerClientNew(virNetSocketPtr sock,
);
if (!(client = virNetServerClientNewInternal(sock, auth,
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
tls,
#endif
readonly, nrequests_max)))
@ -499,7 +499,7 @@ virNetServerClientPtr virNetServerClientNewPostExecRestart(virJSONValuePtr objec
if (!(client = virNetServerClientNewInternal(sock,
auth,
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
NULL,
#endif
readonly,
@ -602,7 +602,7 @@ bool virNetServerClientGetReadonly(virNetServerClientPtr client)
}
#ifdef HAVE_GNUTLS
#ifdef WITH_GNUTLS
bool virNetServerClientHasTLSSession(virNetServerClientPtr client)
{
bool has;
@ -648,7 +648,7 @@ bool virNetServerClientIsSecure(virNetServerClientPtr client)
{
bool secure = false;
virNetServerClientLock(client);
#if HAVE_GNUTLS
#if WITH_GNUTLS
if (client->tls)
secure = true;
#endif
@ -765,7 +765,7 @@ void virNetServerClientDispose(void *obj)
#endif
if (client->sockTimer > 0)
virEventRemoveTimeout(client->sockTimer);
#if HAVE_GNUTLS
#if WITH_GNUTLS
virObjectUnref(client->tls);
virObjectUnref(client->tlsCtxt);
#endif
@ -821,7 +821,7 @@ void virNetServerClientClose(virNetServerClientPtr client)
if (client->sock)
virNetSocketRemoveIOCallback(client->sock);
#if HAVE_GNUTLS
#if WITH_GNUTLS
if (client->tls) {
virObjectUnref(client->tls);
client->tls = NULL;
@ -886,13 +886,13 @@ int virNetServerClientInit(virNetServerClientPtr client)
{
virNetServerClientLock(client);
#if HAVE_GNUTLS
#if WITH_GNUTLS
if (!client->tlsCtxt) {
#endif
/* Plain socket, so prepare to read first message */
if (virNetServerClientRegisterEvent(client) < 0)
goto error;
#if HAVE_GNUTLS
#if WITH_GNUTLS
} else {
int ret;
@ -1224,7 +1224,7 @@ virNetServerClientDispatchWrite(virNetServerClientPtr client)
}
#if HAVE_GNUTLS
#if WITH_GNUTLS
static void
virNetServerClientDispatchHandshake(virNetServerClientPtr client)
{
@ -1264,7 +1264,7 @@ virNetServerClientDispatchEvent(virNetSocketPtr sock, int events, void *opaque)
if (events & (VIR_EVENT_HANDLE_WRITABLE |
VIR_EVENT_HANDLE_READABLE)) {
#if HAVE_GNUTLS
#if WITH_GNUTLS
if (client->tls &&
virNetTLSSessionGetHandshakeStatus(client->tls) !=
VIR_NET_TLS_HANDSHAKE_COMPLETE) {
@ -1276,7 +1276,7 @@ virNetServerClientDispatchEvent(virNetSocketPtr sock, int events, void *opaque)
if (events & VIR_EVENT_HANDLE_READABLE &&
client->rx)
virNetServerClientDispatchRead(client);
#if HAVE_GNUTLS
#if WITH_GNUTLS
}
#endif
}

View File

@ -52,7 +52,7 @@ virNetServerClientPtr virNetServerClientNew(virNetSocketPtr sock,
int auth,
bool readonly,
size_t nrequests_max,
# ifdef HAVE_GNUTLS
# ifdef WITH_GNUTLS
virNetTLSContextPtr tls,
# endif
virNetServerClientPrivNew privNew,
@ -78,7 +78,7 @@ void virNetServerClientRemoveFilter(virNetServerClientPtr client,
int virNetServerClientGetAuth(virNetServerClientPtr client);
bool virNetServerClientGetReadonly(virNetServerClientPtr client);
# ifdef HAVE_GNUTLS
# ifdef WITH_GNUTLS
bool virNetServerClientHasTLSSession(virNetServerClientPtr client);
int virNetServerClientGetTLSKeySize(virNetServerClientPtr client);
# endif

View File

@ -41,7 +41,7 @@ struct _virNetServerService {
bool readonly;
size_t nrequests_client_max;
#if HAVE_GNUTLS
#if WITH_GNUTLS
virNetTLSContextPtr tls;
#endif
@ -92,7 +92,7 @@ cleanup:
virNetServerServicePtr virNetServerServiceNewTCP(const char *nodename,
const char *service,
int auth,
#if HAVE_GNUTLS
#if WITH_GNUTLS
virNetTLSContextPtr tls,
#endif
bool readonly,
@ -110,7 +110,7 @@ virNetServerServicePtr virNetServerServiceNewTCP(const char *nodename,
svc->auth = auth;
svc->readonly = readonly;
svc->nrequests_client_max = nrequests_client_max;
#if HAVE_GNUTLS
#if WITH_GNUTLS
svc->tls = virObjectRef(tls);
#endif
@ -150,7 +150,7 @@ virNetServerServicePtr virNetServerServiceNewUNIX(const char *path,
mode_t mask,
gid_t grp,
int auth,
#if HAVE_GNUTLS
#if WITH_GNUTLS
virNetTLSContextPtr tls,
#endif
bool readonly,
@ -168,7 +168,7 @@ virNetServerServicePtr virNetServerServiceNewUNIX(const char *path,
svc->auth = auth;
svc->readonly = readonly;
svc->nrequests_client_max = nrequests_client_max;
#if HAVE_GNUTLS
#if WITH_GNUTLS
svc->tls = virObjectRef(tls);
#endif
@ -212,7 +212,7 @@ error:
virNetServerServicePtr virNetServerServiceNewFD(int fd,
int auth,
#if HAVE_GNUTLS
#if WITH_GNUTLS
virNetTLSContextPtr tls,
#endif
bool readonly,
@ -230,7 +230,7 @@ virNetServerServicePtr virNetServerServiceNewFD(int fd,
svc->auth = auth;
svc->readonly = readonly;
svc->nrequests_client_max = nrequests_client_max;
#if HAVE_GNUTLS
#if WITH_GNUTLS
svc->tls = virObjectRef(tls);
#endif
@ -415,7 +415,7 @@ size_t virNetServerServiceGetMaxRequests(virNetServerServicePtr svc)
return svc->nrequests_client_max;
}
#if HAVE_GNUTLS
#if WITH_GNUTLS
virNetTLSContextPtr virNetServerServiceGetTLSContext(virNetServerServicePtr svc)
{
return svc->tls;
@ -440,7 +440,7 @@ void virNetServerServiceDispose(void *obj)
virObjectUnref(svc->socks[i]);
VIR_FREE(svc->socks);
#if HAVE_GNUTLS
#if WITH_GNUTLS
virObjectUnref(svc->tls);
#endif
}

View File

@ -40,7 +40,7 @@ typedef int (*virNetServerServiceDispatchFunc)(virNetServerServicePtr svc,
virNetServerServicePtr virNetServerServiceNewTCP(const char *nodename,
const char *service,
int auth,
# if HAVE_GNUTLS
# if WITH_GNUTLS
virNetTLSContextPtr tls,
# endif
bool readonly,
@ -49,14 +49,14 @@ virNetServerServicePtr virNetServerServiceNewUNIX(const char *path,
mode_t mask,
gid_t grp,
int auth,
# if HAVE_GNUTLS
# if WITH_GNUTLS
virNetTLSContextPtr tls,
# endif
bool readonly,
size_t nrequests_client_max);
virNetServerServicePtr virNetServerServiceNewFD(int fd,
int auth,
# if HAVE_GNUTLS
# if WITH_GNUTLS
virNetTLSContextPtr tls,
# endif
bool readonly,
@ -71,7 +71,7 @@ int virNetServerServiceGetPort(virNetServerServicePtr svc);
int virNetServerServiceGetAuth(virNetServerServicePtr svc);
bool virNetServerServiceIsReadonly(virNetServerServicePtr svc);
size_t virNetServerServiceGetMaxRequests(virNetServerServicePtr svc);
# ifdef HAVE_GNUTLS
# ifdef WITH_GNUTLS
virNetTLSContextPtr virNetServerServiceGetTLSContext(virNetServerServicePtr svc);
# endif

View File

@ -79,7 +79,7 @@ struct _virNetSocket {
char *localAddrStr;
char *remoteAddrStr;
#if HAVE_GNUTLS
#if WITH_GNUTLS
virNetTLSSessionPtr tlsSession;
#endif
#if WITH_SASL
@ -950,7 +950,7 @@ virJSONValuePtr virNetSocketPreExecRestart(virNetSocketPtr sock)
goto error;
}
#endif
#if HAVE_GNUTLS
#if WITH_GNUTLS
if (sock->tlsSession) {
virReportError(VIR_ERR_OPERATION_INVALID, "%s",
_("Unable to save socket state when TLS session is active"));
@ -1015,7 +1015,7 @@ void virNetSocketDispose(void *obj)
unlink(sock->localAddr.data.un.sun_path);
#endif
#if HAVE_GNUTLS
#if WITH_GNUTLS
/* Make sure it can't send any more I/O during shutdown */
if (sock->tlsSession)
virNetTLSSessionSetIOCallbacks(sock->tlsSession, NULL, NULL, NULL);
@ -1184,7 +1184,7 @@ const char *virNetSocketRemoteAddrString(virNetSocketPtr sock)
}
#if HAVE_GNUTLS
#if WITH_GNUTLS
static ssize_t virNetSocketTLSSessionWrite(const char *buf,
size_t len,
void *opaque)
@ -1287,7 +1287,7 @@ static ssize_t virNetSocketReadWire(virNetSocketPtr sock, char *buf, size_t len)
#endif
reread:
#if HAVE_GNUTLS
#if WITH_GNUTLS
if (sock->tlsSession &&
virNetTLSSessionGetHandshakeStatus(sock->tlsSession) ==
VIR_NET_TLS_HANDSHAKE_COMPLETE) {
@ -1295,7 +1295,7 @@ reread:
} else {
#endif
ret = read(sock->fd, buf, len);
#if HAVE_GNUTLS
#if WITH_GNUTLS
}
#endif
@ -1346,7 +1346,7 @@ static ssize_t virNetSocketWriteWire(virNetSocketPtr sock, const char *buf, size
#endif
rewrite:
#if HAVE_GNUTLS
#if WITH_GNUTLS
if (sock->tlsSession &&
virNetTLSSessionGetHandshakeStatus(sock->tlsSession) ==
VIR_NET_TLS_HANDSHAKE_COMPLETE) {
@ -1354,7 +1354,7 @@ rewrite:
} else {
#endif
ret = write(sock->fd, buf, len);
#if HAVE_GNUTLS
#if WITH_GNUTLS
}
#endif

View File

@ -26,7 +26,7 @@
# include "virsocketaddr.h"
# include "vircommand.h"
# ifdef HAVE_GNUTLS
# ifdef WITH_GNUTLS
# include "virnettlscontext.h"
# endif
# include "virobject.h"
@ -124,7 +124,7 @@ ssize_t virNetSocketWrite(virNetSocketPtr sock, const char *buf, size_t len);
int virNetSocketSendFD(virNetSocketPtr sock, int fd);
int virNetSocketRecvFD(virNetSocketPtr sock, int *fd);
# ifdef HAVE_GNUTLS
# ifdef WITH_GNUTLS
void virNetSocketSetTLSSession(virNetSocketPtr sock,
virNetTLSSessionPtr sess);
# endif

View File

@ -100,7 +100,7 @@ test_programs = virshtest sockettest \
sysinfotest \
$(NULL)
if HAVE_GNUTLS
if WITH_GNUTLS
test_programs += virnettlscontexttest
endif
@ -530,7 +530,7 @@ virnetsockettest_SOURCES = \
virnetsockettest_CFLAGS = -Dabs_builddir="\"$(abs_builddir)\"" $(AM_CFLAGS)
virnetsockettest_LDADD = $(LDADDS)
if HAVE_GNUTLS
if WITH_GNUTLS
virnettlscontexttest_SOURCES = \
virnettlscontexttest.c testutils.h testutils.c
virnettlscontexttest_CFLAGS = -Dabs_builddir="\"$(abs_builddir)\"" $(AM_CFLAGS)