aboutsummaryrefslogtreecommitdiff
path: root/src/interfaces/libpq/fe-secure-openssl.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/interfaces/libpq/fe-secure-openssl.c')
-rw-r--r--src/interfaces/libpq/fe-secure-openssl.c37
1 files changed, 18 insertions, 19 deletions
diff --git a/src/interfaces/libpq/fe-secure-openssl.c b/src/interfaces/libpq/fe-secure-openssl.c
index 6d36e1439ef..df1ac209f91 100644
--- a/src/interfaces/libpq/fe-secure-openssl.c
+++ b/src/interfaces/libpq/fe-secure-openssl.c
@@ -71,7 +71,7 @@ static int initialize_SSL(PGconn *conn);
static PostgresPollingStatusType open_client_SSL(PGconn *);
static char *SSLerrmessage(unsigned long ecode);
static void SSLerrfree(char *buf);
-static int PQssl_passwd_cb(char *buf, int size, int rwflag, void *userdata);
+static int PQssl_passwd_cb(char *buf, int size, int rwflag, void *userdata);
static int my_sock_read(BIO *h, char *buf, int size);
static int my_sock_write(BIO *h, const char *buf, int size);
@@ -819,17 +819,16 @@ initialize_SSL(PGconn *conn)
}
/*
- * Delegate the client cert password prompt to the libpq wrapper
- * callback if any is defined.
+ * Delegate the client cert password prompt to the libpq wrapper callback
+ * if any is defined.
*
* If the application hasn't installed its own and the sslpassword
- * parameter is non-null, we install ours now to make sure we
- * supply PGconn->sslpassword to OpenSSL instead of letting it
- * prompt on stdin.
+ * parameter is non-null, we install ours now to make sure we supply
+ * PGconn->sslpassword to OpenSSL instead of letting it prompt on stdin.
*
- * This will replace OpenSSL's default PEM_def_callback (which
- * prompts on stdin), but we're only setting it for this SSL
- * context so it's harmless.
+ * This will replace OpenSSL's default PEM_def_callback (which prompts on
+ * stdin), but we're only setting it for this SSL context so it's
+ * harmless.
*/
if (PQsslKeyPassHook
|| (conn->sslpassword && strlen(conn->sslpassword) > 0))
@@ -1205,14 +1204,14 @@ initialize_SSL(PGconn *conn)
/*
* We'll try to load the file in DER (binary ASN.1) format, and if
* that fails too, report the original error. This could mask
- * issues where there's something wrong with a DER-format cert, but
- * we'd have to duplicate openssl's format detection to be smarter
- * than this. We can't just probe for a leading -----BEGIN because
- * PEM can have leading non-matching lines and blanks. OpenSSL
- * doesn't expose its get_name(...) and its PEM routines don't
- * differentiate between failure modes in enough detail to let us
- * tell the difference between "not PEM, try DER" and "wrong
- * password".
+ * issues where there's something wrong with a DER-format cert,
+ * but we'd have to duplicate openssl's format detection to be
+ * smarter than this. We can't just probe for a leading -----BEGIN
+ * because PEM can have leading non-matching lines and blanks.
+ * OpenSSL doesn't expose its get_name(...) and its PEM routines
+ * don't differentiate between failure modes in enough detail to
+ * let us tell the difference between "not PEM, try DER" and
+ * "wrong password".
*/
if (SSL_use_PrivateKey_file(conn->ssl, fnbuf, SSL_FILETYPE_ASN1) != 1)
{
@@ -1677,7 +1676,7 @@ PQdefaultSSLKeyPassHook(char *buf, int size, PGconn *conn)
if (strlen(conn->sslpassword) + 1 > size)
fprintf(stderr, libpq_gettext("WARNING: sslpassword truncated\n"));
strncpy(buf, conn->sslpassword, size);
- buf[size-1] = '\0';
+ buf[size - 1] = '\0';
return strlen(buf);
}
else
@@ -1707,7 +1706,7 @@ PQsetSSLKeyPassHook(PQsslKeyPassHook_type hook)
static int
PQssl_passwd_cb(char *buf, int size, int rwflag, void *userdata)
{
- PGconn *conn = userdata;
+ PGconn *conn = userdata;
if (PQsslKeyPassHook)
return PQsslKeyPassHook(buf, size, conn);