Damn you, Oliver Kiddle, for finding all of the bugs I add to nmh!
if (client == NULL || *client == '\0')
client = "localhost";
-#ifdef CYRUS_SASL
+#if defined(CYRUS_SASL) || defined(TLS_SUPPORT)
sasl_inbuffer = malloc(SASL_MAXRECVBUF);
if (!sasl_inbuffer)
return sm_ierror("Unable to allocate %d bytes for read buffer",
SASL_MAXRECVBUF);
-#endif /* CYRUS_SASL */
+#endif /* CYRUS_SASL || TLS_SUPPORT */
if (pipe (pdi) == NOTOK)
return sm_ierror ("no pipes");
* encryption working
*/
+#ifdef CYRUS_SASL
if (sasl_complete == 0 || sasl_ssf == 0) {
retbuf = tmpbuf;
retbufsize = cc;
return -2;
}
}
+#else /* ! CYRUS_SASL */
+ retbuf = tmpbuf;
+ retbufsize = cc;
+#endif /* CYRUS_SASL */
}
if (retbufsize > SASL_MAXRECVBUF) {