Use PqMsg_* macros in fe-auth.c.
authorNathan Bossart <[email protected]>
Wed, 26 Jun 2024 16:25:38 +0000 (11:25 -0500)
committerNathan Bossart <[email protected]>
Wed, 26 Jun 2024 16:25:38 +0000 (11:25 -0500)
Commit f4b54e1ed9, which introduced macros for protocol characters,
missed updating a few places in fe-auth.c.

Author: Jelte Fennema-Nio
Discussion: https://postgr.es/m/CAGECzQSoPHtZ4xe0raJ6FYSEiPPS%2BYWXBhOGo%2BY1YecLgknF3g%40mail.gmail.com

src/interfaces/libpq/fe-auth.c

index 256f596e6bb0d928c2f2ebfea534420633cfb18e..3b25d8afda475d01a16471370c97647ee1cca25c 100644 (file)
@@ -124,7 +124,7 @@ pg_GSS_continue(PGconn *conn, int payloadlen)
         * first or subsequent packet, just send the same kind of password
         * packet.
         */
-       if (pqPacketSend(conn, 'p',
+       if (pqPacketSend(conn, PqMsg_GSSResponse,
                         goutbuf.value, goutbuf.length) != STATUS_OK)
        {
            gss_release_buffer(&lmin_s, &goutbuf);
@@ -324,7 +324,7 @@ pg_SSPI_continue(PGconn *conn, int payloadlen)
         */
        if (outbuf.pBuffers[0].cbBuffer > 0)
        {
-           if (pqPacketSend(conn, 'p',
+           if (pqPacketSend(conn, PqMsg_GSSResponse,
                             outbuf.pBuffers[0].pvBuffer, outbuf.pBuffers[0].cbBuffer))
            {
                FreeContextBuffer(outbuf.pBuffers[0].pvBuffer);
@@ -683,7 +683,7 @@ pg_SASL_continue(PGconn *conn, int payloadlen, bool final)
        /*
         * Send the SASL response to the server.
         */
-       res = pqPacketSend(conn, 'p', output, outputlen);
+       res = pqPacketSend(conn, PqMsg_SASLResponse, output, outputlen);
        free(output);
 
        if (res != STATUS_OK)
@@ -754,7 +754,8 @@ pg_password_sendauth(PGconn *conn, const char *password, AuthRequest areq)
        default:
            return STATUS_ERROR;
    }
-   ret = pqPacketSend(conn, 'p', pwd_to_send, strlen(pwd_to_send) + 1);
+   ret = pqPacketSend(conn, PqMsg_PasswordMessage,
+                      pwd_to_send, strlen(pwd_to_send) + 1);
    free(crypt_pwd);
    return ret;
 }