@ -320,13 +320,13 @@ static const internalPQconninfoOption PQconninfoOptions[] = {
" Require-Peer " , " " , 10 ,
offsetof ( struct pg_conn , requirepeer ) } ,
{ " sslminprotocolversion " , " PGSSLMINPROTOCOLVERSION " , NULL , NULL ,
{ " ssl_ min_ protocol_ version " , " PGSSLMINPROTOCOLVERSION " , NULL , NULL ,
" SSL-Minimum-Protocol-Version " , " " , 8 , /* sizeof("TLSv1.x") == 8 */
offsetof ( struct pg_conn , sslminprotocolversion ) } ,
offsetof ( struct pg_conn , ssl_ min_ protocol_ version ) } ,
{ " sslmaxprotocolversion " , " PGSSLMAXPROTOCOLVERSION " , NULL , NULL ,
{ " ssl_ max_ protocol_ version " , " PGSSLMAXPROTOCOLVERSION " , NULL , NULL ,
" SSL-Maximum-Protocol-Version " , " " , 8 , /* sizeof("TLSv1.x") == 8 */
offsetof ( struct pg_conn , sslmaxprotocolversion ) } ,
offsetof ( struct pg_conn , ssl_ max_ protocol_ version ) } ,
/*
* As with SSL , all GSS options are exposed even in builds that don ' t have
@ -1301,23 +1301,23 @@ connectOptions2(PGconn *conn)
}
/*
* Validate TLS protocol versions for sslminprotocolversion and
* sslmaxprotocolversion .
* Validate TLS protocol versions for ssl_ min_ protocol_ version and
* ssl_ max_ protocol_ version .
*/
if ( ! sslVerifyProtocolVersion ( conn - > sslminprotocolversion ) )
if ( ! sslVerifyProtocolVersion ( conn - > ssl_ min_ protocol_ version ) )
{
conn - > status = CONNECTION_BAD ;
printfPQExpBuffer ( & conn - > errorMessage ,
libpq_gettext ( " invalid sslminprotocolversion value: \" %s \" \n " ) ,
conn - > sslminprotocolversion ) ;
libpq_gettext ( " invalid ssl_ min_ protocol_ version value: \" %s \" \n " ) ,
conn - > ssl_ min_ protocol_ version ) ;
return false ;
}
if ( ! sslVerifyProtocolVersion ( conn - > sslmaxprotocolversion ) )
if ( ! sslVerifyProtocolVersion ( conn - > ssl_ max_ protocol_ version ) )
{
conn - > status = CONNECTION_BAD ;
printfPQExpBuffer ( & conn - > errorMessage ,
libpq_gettext ( " invalid sslmaxprotocolversion value: \" %s \" \n " ) ,
conn - > sslmaxprotocolversion ) ;
libpq_gettext ( " invalid ssl_ max_ protocol_ version value: \" %s \" \n " ) ,
conn - > ssl_ max_ protocol_ version ) ;
return false ;
}
@ -1328,8 +1328,8 @@ connectOptions2(PGconn *conn)
* already - built SSL context when the connection is being established , as
* it would be doomed anyway .
*/
if ( ! sslVerifyProtocolRange ( conn - > sslminprotocolversion ,
conn - > sslmaxprotocolversion ) )
if ( ! sslVerifyProtocolRange ( conn - > ssl_ min_ protocol_ version ,
conn - > ssl_ max_ protocol_ version ) )
{
conn - > status = CONNECTION_BAD ;
printfPQExpBuffer ( & conn - > errorMessage ,
@ -4046,10 +4046,10 @@ freePGconn(PGconn *conn)
free ( conn - > sslcompression ) ;
if ( conn - > requirepeer )
free ( conn - > requirepeer ) ;
if ( conn - > sslminprotocolversion )
free ( conn - > sslminprotocolversion ) ;
if ( conn - > sslmaxprotocolversion )
free ( conn - > sslmaxprotocolversion ) ;
if ( conn - > ssl_ min_ protocol_ version )
free ( conn - > ssl_ min_ protocol_ version ) ;
if ( conn - > ssl_ max_ protocol_ version )
free ( conn - > ssl_ max_ protocol_ version ) ;
if ( conn - > gssencmode )
free ( conn - > gssencmode ) ;
if ( conn - > krbsrvname )
@ -7120,7 +7120,7 @@ pgpassfileWarning(PGconn *conn)
/*
* Check if the SSL procotol value given in input is valid or not .
* This is used as a sanity check routine for the connection parameters
* sslminprotocolversion and sslmaxprotocolversion .
* ssl_ min_ protocol_ version and ssl_ max_ protocol_ version .
*/
static bool
sslVerifyProtocolVersion ( const char * version )