|
8 | 8 | *
|
9 | 9 | *
|
10 | 10 | * IDENTIFICATION
|
11 |
| - * $PostgreSQL: pgsql/src/backend/libpq/auth.c,v 1.200 2010/04/21 03:32:53 tgl Exp $ |
| 11 | + * $PostgreSQL: pgsql/src/backend/libpq/auth.c,v 1.201 2010/05/26 20:47:13 tgl Exp $ |
12 | 12 | *
|
13 | 13 | *-------------------------------------------------------------------------
|
14 | 14 | */
|
@@ -257,30 +257,33 @@ auth_failed(Port *port, int status)
|
257 | 257 | caseuaKrb5:
|
258 | 258 | errstr=gettext_noop("Kerberos 5 authentication failed for user \"%s\"");
|
259 | 259 | break;
|
260 |
| -caseuaGSS: |
261 |
| -errstr=gettext_noop("GSSAPI authentication failed for user \"%s\""); |
262 |
| -break; |
263 |
| -caseuaSSPI: |
264 |
| -errstr=gettext_noop("SSPI authentication failed for user \"%s\""); |
265 |
| -break; |
266 | 260 | caseuaTrust:
|
267 | 261 | errstr=gettext_noop("\"trust\" authentication failed for user \"%s\"");
|
268 | 262 | break;
|
269 | 263 | caseuaIdent:
|
270 | 264 | errstr=gettext_noop("Ident authentication failed for user \"%s\"");
|
271 | 265 | break;
|
272 |
| -caseuaMD5: |
273 | 266 | caseuaPassword:
|
| 267 | +caseuaMD5: |
274 | 268 | errstr=gettext_noop("password authentication failed for user \"%s\"");
|
275 | 269 | /* We use it to indicate if a .pgpass password failed. */
|
276 | 270 | errcode_return=ERRCODE_INVALID_PASSWORD;
|
277 | 271 | break;
|
| 272 | +caseuaGSS: |
| 273 | +errstr=gettext_noop("GSSAPI authentication failed for user \"%s\""); |
| 274 | +break; |
| 275 | +caseuaSSPI: |
| 276 | +errstr=gettext_noop("SSPI authentication failed for user \"%s\""); |
| 277 | +break; |
278 | 278 | caseuaPAM:
|
279 | 279 | errstr=gettext_noop("PAM authentication failed for user \"%s\"");
|
280 | 280 | break;
|
281 | 281 | caseuaLDAP:
|
282 | 282 | errstr=gettext_noop("LDAP authentication failed for user \"%s\"");
|
283 | 283 | break;
|
| 284 | +caseuaCert: |
| 285 | +errstr=gettext_noop("certificate authentication failed for user \"%s\""); |
| 286 | +break; |
284 | 287 | caseuaRADIUS:
|
285 | 288 | errstr=gettext_noop("RADIUS authentication failed for user \"%s\"");
|
286 | 289 | break;
|
@@ -2503,7 +2506,7 @@ CheckCertAuth(Port *port)
|
2503 | 2506 | strlen(port->peer_cn) <=0)
|
2504 | 2507 | {
|
2505 | 2508 | ereport(LOG,
|
2506 |
| -(errmsg("Certificate login failed for user \"%s\": client certificate contains no username", |
| 2509 | +(errmsg("certificate authentication failed for user \"%s\": client certificate contains no username", |
2507 | 2510 | port->user_name)));
|
2508 | 2511 | returnSTATUS_ERROR;
|
2509 | 2512 | }
|
|