mariadb/libmysql/authentication_win
Rafal Somla a6acc73bb1 BUG#11879051: FIRST REPLY LENGTH LIMIT (255) CAN BE VIOLATED
BEFORE: First packet sent by client-side plugin (generated by Windows
function InitializeSecurityContext()) could be longer than 255 bytes 
violating the limitation imposed by authentication protocol.

AFTER: Handshake protocol is  changed so that if first client's reply is 
longer than 254 bytes then  it is be sent in 2 parts. However, for replies
shorter than 255 bytes nothing changes.

ADDITIONAL CHANGES: 
- The generic packet processing loop  (Handshake::packet_processing_loop) 
has been refactored. Communication with the peer has been abstracted
into virtual methods read/write_packet() which are implemented in client 
and server and transparently do the required splitting and gluing of packets.
- Make it possible to optionally use dbug library in the plugin.
- Add code for testing splitting of long first client reply.
2011-04-28 21:39:42 +02:00
..
CMakeLists.txt BUG#11879051: FIRST REPLY LENGTH LIMIT (255) CAN BE VIOLATED 2011-04-28 21:39:42 +02:00
common.cc Bug#11766631 (59780) - Move the client authentication_windows plugin 2011-04-28 21:17:29 +02:00
common.h BUG#11879051: FIRST REPLY LENGTH LIMIT (255) CAN BE VIOLATED 2011-04-28 21:39:42 +02:00
handshake.cc BUG#11879051: FIRST REPLY LENGTH LIMIT (255) CAN BE VIOLATED 2011-04-28 21:39:42 +02:00
handshake.h BUG#11879051: FIRST REPLY LENGTH LIMIT (255) CAN BE VIOLATED 2011-04-28 21:39:42 +02:00
handshake_client.cc BUG#11879051: FIRST REPLY LENGTH LIMIT (255) CAN BE VIOLATED 2011-04-28 21:39:42 +02:00
log_client.cc Bug#11766631 (59780) - Move the client authentication_windows plugin 2011-04-28 21:17:29 +02:00
plugin_client.cc Bug#11766631 (59780) - Move the client authentication_windows plugin 2011-04-28 21:17:29 +02:00