summaryrefslogtreecommitdiff
path: root/BUILD/compile-hpux11-parisc2-aCC
diff options
context:
space:
mode:
authorRafal Somla <rafal.somla@oracle.com>2011-04-28 21:39:42 +0200
committerRafal Somla <rafal.somla@oracle.com>2011-04-28 21:39:42 +0200
commita6acc73bb18f3a662649c40a12c37063bfae37d6 (patch)
tree117937eb18cc4e988c5738c0d787eaea08cd8b0e /BUILD/compile-hpux11-parisc2-aCC
parent6d7aceeead15eeefe720a2cbb1fe8f955ceb40fd (diff)
downloadmariadb-git-a6acc73bb18f3a662649c40a12c37063bfae37d6.tar.gz
BUG#11879051: FIRST REPLY LENGTH LIMIT (255) CAN BE VIOLATED
BEFORE: First packet sent by client-side plugin (generated by Windows function InitializeSecurityContext()) could be longer than 255 bytes violating the limitation imposed by authentication protocol. AFTER: Handshake protocol is changed so that if first client's reply is longer than 254 bytes then it is be sent in 2 parts. However, for replies shorter than 255 bytes nothing changes. ADDITIONAL CHANGES: - The generic packet processing loop (Handshake::packet_processing_loop) has been refactored. Communication with the peer has been abstracted into virtual methods read/write_packet() which are implemented in client and server and transparently do the required splitting and gluing of packets. - Make it possible to optionally use dbug library in the plugin. - Add code for testing splitting of long first client reply.
Diffstat (limited to 'BUILD/compile-hpux11-parisc2-aCC')
0 files changed, 0 insertions, 0 deletions