@@ -124,7 +124,7 @@ pg_GSS_continue(PGconn *conn, int payloadlen)
124
124
* first or subsequent packet, just send the same kind of password
125
125
* packet.
126
126
*/
127
- if (pqPacketSend (conn , 'p' ,
127
+ if (pqPacketSend (conn , PqMsg_GSSResponse ,
128
128
goutbuf .value , goutbuf .length ) != STATUS_OK )
129
129
{
130
130
gss_release_buffer (& lmin_s , & goutbuf );
@@ -324,7 +324,7 @@ pg_SSPI_continue(PGconn *conn, int payloadlen)
324
324
*/
325
325
if (outbuf .pBuffers [0 ].cbBuffer > 0 )
326
326
{
327
- if (pqPacketSend (conn , 'p' ,
327
+ if (pqPacketSend (conn , PqMsg_GSSResponse ,
328
328
outbuf .pBuffers [0 ].pvBuffer , outbuf .pBuffers [0 ].cbBuffer ))
329
329
{
330
330
FreeContextBuffer (outbuf .pBuffers [0 ].pvBuffer );
@@ -683,7 +683,7 @@ pg_SASL_continue(PGconn *conn, int payloadlen, bool final)
683
683
/*
684
684
* Send the SASL response to the server.
685
685
*/
686
- res = pqPacketSend (conn , 'p' , output , outputlen );
686
+ res = pqPacketSend (conn , PqMsg_SASLResponse , output , outputlen );
687
687
free (output );
688
688
689
689
if (res != STATUS_OK )
@@ -754,7 +754,8 @@ pg_password_sendauth(PGconn *conn, const char *password, AuthRequest areq)
754
754
default :
755
755
return STATUS_ERROR ;
756
756
}
757
- ret = pqPacketSend (conn , 'p' , pwd_to_send , strlen (pwd_to_send ) + 1 );
757
+ ret = pqPacketSend (conn , PqMsg_PasswordMessage ,
758
+ pwd_to_send , strlen (pwd_to_send ) + 1 );
758
759
free (crypt_pwd );
759
760
return ret ;
760
761
}
0 commit comments