]> granicus.if.org Git - postgresql/blobdiff - src/backend/libpq/crypt.c
Fix use of term "verifier"
[postgresql] / src / backend / libpq / crypt.c
index 784fb227aa2614fe529010706de319a9754ec17d..9add6a14b238c9ce2ec9f3fcfd560bd6e7d9ef6d 100644 (file)
@@ -83,7 +83,7 @@ get_role_password(const char *role, char **logdetail)
 }
 
 /*
- * What kind of a password verifier is 'shadow_pass'?
+ * What kind of a password type is 'shadow_pass'?
  */
 PasswordType
 get_password_type(const char *shadow_pass)
@@ -97,14 +97,14 @@ get_password_type(const char *shadow_pass)
                strlen(shadow_pass) == MD5_PASSWD_LEN &&
                strspn(shadow_pass + 3, MD5_PASSWD_CHARSET) == MD5_PASSWD_LEN - 3)
                return PASSWORD_TYPE_MD5;
-       if (parse_scram_verifier(shadow_pass, &iterations, &encoded_salt,
+       if (parse_scram_secret(shadow_pass, &iterations, &encoded_salt,
                                                         stored_key, server_key))
                return PASSWORD_TYPE_SCRAM_SHA_256;
        return PASSWORD_TYPE_PLAINTEXT;
 }
 
 /*
- * Given a user-supplied password, convert it into a verifier of
+ * Given a user-supplied password, convert it into a secret of
  * 'target_type' kind.
  *
  * If the password is already in encrypted form, we cannot reverse the
@@ -137,7 +137,7 @@ encrypt_password(PasswordType target_type, const char *role,
                        return encrypted_password;
 
                case PASSWORD_TYPE_SCRAM_SHA_256:
-                       return pg_be_scram_build_verifier(password);
+                       return pg_be_scram_build_secret(password);
 
                case PASSWORD_TYPE_PLAINTEXT:
                        elog(ERROR, "cannot encrypt password with 'plaintext'");