/* One-time initialisation for dmarc. Ensure the spf module is available. */
static BOOL
-dmarc_init(void *)
+dmarc_init(void * dummy)
{
uschar * errstr;
if (!(dmarc_spf_mod_info = misc_mod_find(US"spf", &errstr)))
return FALSE;
}
-/*XXX not yet used, but will be */
if (!(dmarc_dkim_mod_info = misc_mod_find(US"dkim", &errstr)))
{
log_write(0, LOG_MAIN|LOG_PANIC, "dmarc: %s", errstr);
sx->peer_limit_rcptdom);
}
+# ifndef DISABLE_PIPE_CONNECT
/* Apply values read from cache to the current connection */
static void
ehlo_cache_limits_apply(smtp_context * sx)
{
-# ifndef DISABLE_PIPE_CONNECT
ehlo_limits_apply(sx, sx->ehlo_resp.limit_mail, sx->ehlo_resp.limit_rcpt,
sx->ehlo_resp.limit_rcptdom);
-# endif
}
-#endif /*EXPERIMENTAL_ESMTP_LIMITS*/
+# endif
+#endif /*DISABLE_ESMTP_LIMITS*/
/******************************************************************************/
if (tls_out.active.sock >= 0) rc = DEFER;
goto fail;
}
- /*XXX EXPERIMENTAL_ESMTP_LIMITS ? */
+ /*XXX DISABLE_ESMTP_LIMITS ? */
# if !defined(DISABLE_TLS) && !defined(DISABLE_TLS_RESUME)
GET_OPTION("host_name_extract");