diff options
author | Rafal Somla <rafal.somla@oracle.com> | 2011-04-28 21:39:42 +0200 |
---|---|---|
committer | Rafal Somla <rafal.somla@oracle.com> | 2011-04-28 21:39:42 +0200 |
commit | a6acc73bb18f3a662649c40a12c37063bfae37d6 (patch) | |
tree | 117937eb18cc4e988c5738c0d787eaea08cd8b0e /BUILD/compile-hpux11-parisc2-aCC | |
parent | 6d7aceeead15eeefe720a2cbb1fe8f955ceb40fd (diff) | |
download | mariadb-git-a6acc73bb18f3a662649c40a12c37063bfae37d6.tar.gz |
BUG#11879051: FIRST REPLY LENGTH LIMIT (255) CAN BE VIOLATED
BEFORE: First packet sent by client-side plugin (generated by Windows
function InitializeSecurityContext()) could be longer than 255 bytes
violating the limitation imposed by authentication protocol.
AFTER: Handshake protocol is changed so that if first client's reply is
longer than 254 bytes then it is be sent in 2 parts. However, for replies
shorter than 255 bytes nothing changes.
ADDITIONAL CHANGES:
- The generic packet processing loop (Handshake::packet_processing_loop)
has been refactored. Communication with the peer has been abstracted
into virtual methods read/write_packet() which are implemented in client
and server and transparently do the required splitting and gluing of packets.
- Make it possible to optionally use dbug library in the plugin.
- Add code for testing splitting of long first client reply.
Diffstat (limited to 'BUILD/compile-hpux11-parisc2-aCC')
0 files changed, 0 insertions, 0 deletions