]> granicus.if.org Git - postgresql/commitdiff
From the SSL_CTX_new man page:
authorPostgreSQL Daemon <webmaster@postgresql.org>
Wed, 18 Dec 2002 13:20:03 +0000 (13:20 +0000)
committerPostgreSQL Daemon <webmaster@postgresql.org>
Wed, 18 Dec 2002 13:20:03 +0000 (13:20 +0000)
"SSLv23_method(void), SSLv23_server_method(void), SSLv23_client_method(void)

 A TLS/SSL connection established with these methods will understand the SSLv2,
 SSLv3, and TLSv1 protocol. A client will send out SSLv2 client hello messages
 and will indicate that it also understands SSLv3 and TLSv1. A server will
 understand SSLv2, SSLv3, and TLSv1 client hello messages. This is the best
 choice when compatibility is a concern."

This will maintain backwards compatibility for those us that don't use
TLS connections ...

src/backend/libpq/be-secure.c
src/interfaces/libpq/fe-secure.c

index 113189571ed8fcaca6bb9380b06eda1e9ad33c73..21cefc0207d4f9ff175d5bff0da8597bb55e47e4 100644 (file)
@@ -11,7 +11,7 @@
  *
  *
  * IDENTIFICATION
- *       $Header: /cvsroot/pgsql/src/backend/libpq/be-secure.c,v 1.15.2.3 2002/12/14 18:39:39 momjian Exp $
+ *       $Header: /cvsroot/pgsql/src/backend/libpq/be-secure.c,v 1.15.2.4 2002/12/18 13:20:00 pgsql Exp $
  *
  *       Since the server static private key ($DataDir/server.key)
  *       will normally be stored unencrypted so that the database
@@ -587,7 +587,7 @@ initialize_SSL(void)
        {
                SSL_library_init();
                SSL_load_error_strings();
-               SSL_context = SSL_CTX_new(TLSv1_method());
+               SSL_context = SSL_CTX_new(SSLv23_method());
                if (!SSL_context)
                {
                        postmaster_error("failed to create SSL context: %s",
index de71699cae1f69591fc76fde84402e6e1df3177c..2107b51d122d44b7db03836e7bc298d803de363e 100644 (file)
@@ -11,7 +11,7 @@
  *
  *
  * IDENTIFICATION
- *       $Header: /cvsroot/pgsql/src/interfaces/libpq/fe-secure.c,v 1.15.2.1 2002/11/07 18:47:08 tgl Exp $
+ *       $Header: /cvsroot/pgsql/src/interfaces/libpq/fe-secure.c,v 1.15.2.2 2002/12/18 13:20:03 pgsql Exp $
  *
  * NOTES
  *       The client *requires* a valid server certificate.  Since
@@ -712,7 +712,7 @@ initialize_SSL(PGconn *conn)
        {
                SSL_library_init();
                SSL_load_error_strings();
-               SSL_context = SSL_CTX_new(TLSv1_method());
+               SSL_context = SSL_CTX_new(SSLv23_method());
                if (!SSL_context)
                {
                        printfPQExpBuffer(&conn->errorMessage,