mirror of
https://github.com/postgres/postgres.git
synced 2025-11-07 19:06:32 +03:00
Post-PG 10 beta1 pgindent run
perltidy run not included.
This commit is contained in:
@@ -757,10 +757,10 @@ CheckPWChallengeAuth(Port *port, char **logdetail)
|
||||
* If the user does not exist, or has no password or it's expired, we
|
||||
* still go through the motions of authentication, to avoid revealing to
|
||||
* the client that the user didn't exist. If 'md5' is allowed, we choose
|
||||
* whether to use 'md5' or 'scram-sha-256' authentication based on
|
||||
* current password_encryption setting. The idea is that most genuine
|
||||
* users probably have a password of that type, and if we pretend that
|
||||
* this user had a password of that type, too, it "blends in" best.
|
||||
* whether to use 'md5' or 'scram-sha-256' authentication based on current
|
||||
* password_encryption setting. The idea is that most genuine users
|
||||
* probably have a password of that type, and if we pretend that this user
|
||||
* had a password of that type, too, it "blends in" best.
|
||||
*/
|
||||
if (!shadow_pass)
|
||||
pwtype = Password_encryption;
|
||||
@@ -770,8 +770,8 @@ CheckPWChallengeAuth(Port *port, char **logdetail)
|
||||
/*
|
||||
* If 'md5' authentication is allowed, decide whether to perform 'md5' or
|
||||
* 'scram-sha-256' authentication based on the type of password the user
|
||||
* has. If it's an MD5 hash, we must do MD5 authentication, and if it's
|
||||
* a SCRAM verifier, we must do SCRAM authentication.
|
||||
* has. If it's an MD5 hash, we must do MD5 authentication, and if it's a
|
||||
* SCRAM verifier, we must do SCRAM authentication.
|
||||
*
|
||||
* If MD5 authentication is not allowed, always use SCRAM. If the user
|
||||
* had an MD5 password, CheckSCRAMAuth() will fail.
|
||||
|
||||
Reference in New Issue
Block a user