mirror of
https://github.com/postgres/postgres.git
synced 2025-08-12 15:23:02 +03:00
Clean up some stray remaining references to pg_shadow, pg_user, pg_group.
This commit is contained in:
@@ -9,7 +9,7 @@
|
||||
* Portions Copyright (c) 1996-2005, PostgreSQL Global Development Group
|
||||
* Portions Copyright (c) 1994, Regents of the University of California
|
||||
*
|
||||
* $PostgreSQL: pgsql/src/backend/libpq/crypt.c,v 1.64 2005/06/29 22:51:54 tgl Exp $
|
||||
* $PostgreSQL: pgsql/src/backend/libpq/crypt.c,v 1.65 2005/08/15 02:40:25 tgl Exp $
|
||||
*
|
||||
*-------------------------------------------------------------------------
|
||||
*/
|
||||
@@ -57,7 +57,7 @@ md5_crypt_verify(const Port *port, const char *role, char *client_pass)
|
||||
if (shadow_pass == NULL || *shadow_pass == '\0')
|
||||
return STATUS_ERROR;
|
||||
|
||||
/* We can't do crypt with pg_shadow MD5 passwords */
|
||||
/* We can't do crypt with MD5 passwords */
|
||||
if (isMD5(shadow_pass) && port->auth_method == uaCrypt)
|
||||
{
|
||||
ereport(LOG,
|
||||
@@ -75,7 +75,7 @@ md5_crypt_verify(const Port *port, const char *role, char *client_pass)
|
||||
crypt_pwd = palloc(MD5_PASSWD_LEN + 1);
|
||||
if (isMD5(shadow_pass))
|
||||
{
|
||||
/* pg_shadow already encrypted, only do salt */
|
||||
/* stored password already encrypted, only do salt */
|
||||
if (!EncryptMD5(shadow_pass + strlen("md5"),
|
||||
(char *) port->md5Salt,
|
||||
sizeof(port->md5Salt), crypt_pwd))
|
||||
@@ -86,7 +86,7 @@ md5_crypt_verify(const Port *port, const char *role, char *client_pass)
|
||||
}
|
||||
else
|
||||
{
|
||||
/* pg_shadow plain, double-encrypt */
|
||||
/* stored password is plain, double-encrypt */
|
||||
char *crypt_pwd2 = palloc(MD5_PASSWD_LEN + 1);
|
||||
|
||||
if (!EncryptMD5(shadow_pass,
|
||||
@@ -121,10 +121,7 @@ md5_crypt_verify(const Port *port, const char *role, char *client_pass)
|
||||
default:
|
||||
if (isMD5(shadow_pass))
|
||||
{
|
||||
/*
|
||||
* Encrypt user-supplied password to match MD5 in
|
||||
* pg_shadow
|
||||
*/
|
||||
/* Encrypt user-supplied password to match stored MD5 */
|
||||
crypt_client_pass = palloc(MD5_PASSWD_LEN + 1);
|
||||
if (!EncryptMD5(client_pass,
|
||||
port->user_name,
|
||||
|
@@ -20,7 +20,7 @@
|
||||
# "host" is either a plain or SSL-encrypted TCP/IP socket, "hostssl" is an
|
||||
# SSL-encrypted TCP/IP socket, and "hostnossl" is a plain TCP/IP socket.
|
||||
#
|
||||
# DATABASE can be "all", "sameuser", "samegroup", a database name, or
|
||||
# DATABASE can be "all", "sameuser", "samerole", a database name, or
|
||||
# a comma-separated list thereof.
|
||||
#
|
||||
# USER can be "all", a user name, a group name prefixed with "+", or
|
||||
@@ -42,7 +42,7 @@
|
||||
#
|
||||
# Database and user names containing spaces, commas, quotes and other special
|
||||
# characters must be quoted. Quoting one of the keywords "all", "sameuser" or
|
||||
# "samegroup" makes the name lose its special character, and just match a
|
||||
# "samerole" makes the name lose its special character, and just match a
|
||||
# database or username with that name.
|
||||
#
|
||||
# This file is read on server startup and when the postmaster receives
|
||||
|
@@ -5,7 +5,7 @@
|
||||
*
|
||||
* All code should use either of these two functions to find out
|
||||
* whether a given user is a superuser, rather than examining
|
||||
* pg_shadow.usesuper directly, so that the escape hatch built in for
|
||||
* pg_authid.rolsuper directly, so that the escape hatch built in for
|
||||
* the single-user case works.
|
||||
*
|
||||
*
|
||||
@@ -14,7 +14,7 @@
|
||||
*
|
||||
*
|
||||
* IDENTIFICATION
|
||||
* $PostgreSQL: pgsql/src/backend/utils/misc/superuser.c,v 1.32 2005/06/28 05:09:02 tgl Exp $
|
||||
* $PostgreSQL: pgsql/src/backend/utils/misc/superuser.c,v 1.33 2005/08/15 02:40:26 tgl Exp $
|
||||
*
|
||||
*-------------------------------------------------------------------------
|
||||
*/
|
||||
|
Reference in New Issue
Block a user