From: Heikki Linnakangas Date: Wed, 14 Oct 2009 22:10:17 +0000 (+0000) Subject: Rename the new MAX_AUTH_TOKEN_LENGTH #define to PG_MAX_AUTH_MAX_TOKEN_LENGTH, X-Git-Tag: REL8_3_9~23 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=1b198db44e351ab2624a78f55bde5c830e0a5c9c;p=postgresql Rename the new MAX_AUTH_TOKEN_LENGTH #define to PG_MAX_AUTH_MAX_TOKEN_LENGTH, to make it more obvious that it's a PostgreSQL internal limit, not something that comes from system header files. --- diff --git a/src/backend/libpq/auth.c b/src/backend/libpq/auth.c index 9ec424fc5d..6b50e4d3be 100644 --- a/src/backend/libpq/auth.c +++ b/src/backend/libpq/auth.c @@ -8,7 +8,7 @@ * * * IDENTIFICATION - * $PostgreSQL: pgsql/src/backend/libpq/auth.c,v 1.164.2.3 2009/10/14 07:27:44 heikki Exp $ + * $PostgreSQL: pgsql/src/backend/libpq/auth.c,v 1.164.2.4 2009/10/14 22:10:17 heikki Exp $ * *------------------------------------------------------------------------- */ @@ -91,7 +91,7 @@ static int CheckLDAPAuth(Port *port); #endif /* - * Maximum size of GSS and SSPI authentication tokens. + * Maximum accepted size of GSS and SSPI authentication tokens. * * Kerberos tickets are usually quite small, but the TGTs issued by Windows * domain controllers include an authorization field known as the Privilege @@ -103,7 +103,7 @@ static int CheckLDAPAuth(Port *port); * registry setting. Microsoft recommends that it is not set higher than * 65535 bytes, so that seems like a reasonable limit for us as well. */ -#define MAX_AUTH_TOKEN_LENGTH 65535 +#define PG_MAX_AUTH_TOKEN_LENGTH 65535 #ifdef KRB5 /*---------------------------------------------------------------- @@ -477,7 +477,7 @@ pg_GSS_recvauth(Port *port) /* Get the actual GSS token */ initStringInfo(&buf); - if (pq_getmessage(&buf, MAX_AUTH_TOKEN_LENGTH)) + if (pq_getmessage(&buf, PG_MAX_AUTH_TOKEN_LENGTH)) { /* EOF - pq_getmessage already logged error */ pfree(buf.data); @@ -739,7 +739,7 @@ pg_SSPI_recvauth(Port *port) /* Get the actual SSPI token */ initStringInfo(&buf); - if (pq_getmessage(&buf, MAX_AUTH_TOKEN_LENGTH)) + if (pq_getmessage(&buf, PG_MAX_AUTH_TOKEN_LENGTH)) { /* EOF - pq_getmessage already logged error */ pfree(buf.data);