#ifdef ENABLE_GSS
/* If GSSAPI creds used to connect, make sure it was one delegated */
- if (PQconnectionUsedGSSAPI(conn) && be_gssapi_get_deleg(MyProcPort))
+ if (PQconnectionUsedGSSAPI(conn) && be_gssapi_get_delegation(MyProcPort))
return;
#endif
return;
#ifdef ENABLE_GSS
- if (be_gssapi_get_deleg(MyProcPort))
+ if (be_gssapi_get_delegation(MyProcPort))
return;
#endif
#ifdef ENABLE_GSS
/* Connected via GSSAPI with delegated credentials- all good. */
- if (PQconnectionUsedGSSAPI(conn) && be_gssapi_get_deleg(MyProcPort))
+ if (PQconnectionUsedGSSAPI(conn) && be_gssapi_get_delegation(MyProcPort))
return;
#endif
#ifdef ENABLE_GSS
/* ok if the user provided their own delegated credentials */
- if (be_gssapi_get_deleg(MyProcPort))
+ if (be_gssapi_get_delegation(MyProcPort))
return;
#endif
</listitem>
</varlistentry>
- <varlistentry id="guc-gss-accept-deleg" xreflabel="gss_accept_deleg">
- <term><varname>gss_accept_deleg</varname> (<type>boolean</type>)
+ <varlistentry id="guc-gss-accept-deleg" xreflabel="gss_accept_delegation">
+ <term><varname>gss_accept_delegation</varname> (<type>boolean</type>)
<indexterm>
- <primary><varname>gss_accept_deleg</varname> configuration parameter</primary>
+ <primary><varname>gss_accept_delegation</varname> configuration parameter</primary>
</indexterm>
</term>
<listitem>
</para>
<para>
-This is enabled with server variable gss_accept_deleg.
+This is enabled with server variable gss_accept_delegation.
</para>
</listitem>
*/
char *pg_krb_server_keyfile;
bool pg_krb_caseins_users;
-bool pg_gss_accept_deleg;
+bool pg_gss_accept_delegation;
/*----------------------------------------------------------------
&port->gss->outbuf,
&gflags,
NULL,
- pg_gss_accept_deleg ? &delegated_creds : NULL);
+ pg_gss_accept_delegation ? &delegated_creds : NULL);
/* gbuf no longer used */
pfree(buf.data);
GSS_C_NO_CREDENTIAL, &input,
GSS_C_NO_CHANNEL_BINDINGS,
&port->gss->name, NULL, &output, NULL,
- NULL, pg_gss_accept_deleg ? &delegated_creds : NULL);
+ NULL, pg_gss_accept_delegation ? &delegated_creds : NULL);
if (GSS_ERROR(major))
{
* connection.
*/
bool
-be_gssapi_get_deleg(Port *port)
+be_gssapi_get_delegation(Port *port)
{
if (!port || !port->gss)
return false;
lbeentry.st_gss = true;
lgssstatus.gss_auth = be_gssapi_get_auth(MyProcPort);
lgssstatus.gss_enc = be_gssapi_get_enc(MyProcPort);
- lgssstatus.gss_deleg = be_gssapi_get_deleg(MyProcPort);
+ lgssstatus.gss_delegation = be_gssapi_get_delegation(MyProcPort);
if (princ)
strlcpy(lgssstatus.gss_princ, princ, NAMEDATALEN);
}
values[25] = BoolGetDatum(beentry->st_gssstatus->gss_auth); /* gss_auth */
values[26] = CStringGetTextDatum(beentry->st_gssstatus->gss_princ);
values[27] = BoolGetDatum(beentry->st_gssstatus->gss_enc); /* GSS Encryption in use */
- values[28] = BoolGetDatum(beentry->st_gssstatus->gss_deleg); /* GSS credentials
+ values[28] = BoolGetDatum(beentry->st_gssstatus->gss_delegation); /* GSS credentials
* delegated */
}
else
_(" GSS (authenticated=%s, encrypted=%s, deleg_credentials=%s, principal=%s)"),
be_gssapi_get_auth(port) ? _("yes") : _("no"),
be_gssapi_get_enc(port) ? _("yes") : _("no"),
- be_gssapi_get_deleg(port) ? _("yes") : _("no"),
+ be_gssapi_get_delegation(port) ? _("yes") : _("no"),
princ);
else
appendStringInfo(&logmsg,
_(" GSS (authenticated=%s, encrypted=%s, deleg_credentials=%s)"),
be_gssapi_get_auth(port) ? _("yes") : _("no"),
be_gssapi_get_enc(port) ? _("yes") : _("no"),
- be_gssapi_get_deleg(port) ? _("yes") : _("no"));
+ be_gssapi_get_delegation(port) ? _("yes") : _("no"));
}
#endif
},
{
- {"gss_accept_deleg", PGC_SIGHUP, CONN_AUTH_AUTH,
+ {"gss_accept_delegation", PGC_SIGHUP, CONN_AUTH_AUTH,
gettext_noop("Sets whether GSSAPI delegation should be accepted from the client."),
NULL
},
- &pg_gss_accept_deleg,
+ &pg_gss_accept_delegation,
false,
NULL, NULL, NULL
},
extern PGDLLIMPORT char *pg_krb_server_keyfile;
extern PGDLLIMPORT bool pg_krb_caseins_users;
-extern PGDLLIMPORT bool pg_gss_accept_deleg;
+extern PGDLLIMPORT bool pg_gss_accept_delegation;
extern PGDLLIMPORT char *pg_krb_realm;
extern void ClientAuthentication(Port *port);
extern bool be_gssapi_get_auth(Port *port);
extern bool be_gssapi_get_enc(Port *port);
extern const char *be_gssapi_get_princ(Port *port);
-extern bool be_gssapi_get_deleg(Port *port);
+extern bool be_gssapi_get_delegation(Port *port);
/* Read and write to a GSSAPI-encrypted connection. */
extern ssize_t be_gssapi_read(Port *port, void *ptr, size_t len);
char gss_princ[NAMEDATALEN]; /* GSSAPI Principal used to auth */
bool gss_auth; /* If GSSAPI authentication was used */
bool gss_enc; /* If encryption is being used */
- bool gss_deleg; /* If credentials delegated */
+ bool gss_delegation; /* If credentials delegated */
} PgBackendGSSStatus;