mirror of
https://github.com/postgres/postgres.git
synced 2025-11-19 13:42:17 +03:00
Replace calls of htonl()/ntohl() with pg_bswap.h for GSSAPI encryption
The in-core equivalents can make use of built-in functions if the compiler supports this option, making optimizations possible.0ba99c8replaced all existing calls in the code base at this time, butb0b39f7(GSSAPI encryption) has forgotten to do the switch. Discussion: https://postgr.es/m/20201014055303.GG3349@paquier.xyz
This commit is contained in:
@@ -226,7 +226,7 @@ pg_GSS_write(PGconn *conn, const void *ptr, size_t len)
|
||||
PqGSSSendConsumed += input.length;
|
||||
|
||||
/* 4 network-order bytes of length, then payload */
|
||||
netlen = htonl(output.length);
|
||||
netlen = pg_hton32(output.length);
|
||||
memcpy(PqGSSSendBuffer + PqGSSSendLength, &netlen, sizeof(uint32));
|
||||
PqGSSSendLength += sizeof(uint32);
|
||||
|
||||
@@ -346,7 +346,7 @@ pg_GSS_read(PGconn *conn, void *ptr, size_t len)
|
||||
}
|
||||
|
||||
/* Decode the packet length and check for overlength packet */
|
||||
input.length = ntohl(*(uint32 *) PqGSSRecvBuffer);
|
||||
input.length = pg_ntoh32(*(uint32 *) PqGSSRecvBuffer);
|
||||
|
||||
if (input.length > PQ_GSS_RECV_BUFFER_SIZE - sizeof(uint32))
|
||||
{
|
||||
@@ -589,7 +589,7 @@ pqsecure_open_gss(PGconn *conn)
|
||||
*/
|
||||
|
||||
/* Get the length and check for over-length packet */
|
||||
input.length = ntohl(*(uint32 *) PqGSSRecvBuffer);
|
||||
input.length = pg_ntoh32(*(uint32 *) PqGSSRecvBuffer);
|
||||
if (input.length > PQ_GSS_RECV_BUFFER_SIZE - sizeof(uint32))
|
||||
{
|
||||
printfPQExpBuffer(&conn->errorMessage,
|
||||
@@ -688,7 +688,7 @@ pqsecure_open_gss(PGconn *conn)
|
||||
}
|
||||
|
||||
/* Queue the token for writing */
|
||||
netlen = htonl(output.length);
|
||||
netlen = pg_hton32(output.length);
|
||||
|
||||
memcpy(PqGSSSendBuffer, (char *) &netlen, sizeof(uint32));
|
||||
PqGSSSendLength += sizeof(uint32);
|
||||
|
||||
Reference in New Issue
Block a user