|
|
|
@ -8,7 +8,7 @@ |
|
|
|
|
* |
|
|
|
|
* |
|
|
|
|
* IDENTIFICATION |
|
|
|
|
* $PostgreSQL: pgsql/src/backend/libpq/auth.c,v 1.185 2009/10/14 07:27:13 heikki Exp $ |
|
|
|
|
* $PostgreSQL: pgsql/src/backend/libpq/auth.c,v 1.186 2009/10/14 22:09:46 heikki Exp $ |
|
|
|
|
* |
|
|
|
|
*------------------------------------------------------------------------- |
|
|
|
|
*/ |
|
|
|
@ -184,7 +184,7 @@ static int pg_SSPI_recvauth(Port *port); |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
|
* Maximum size of GSS and SSPI authentication tokens. |
|
|
|
|
* Maximum accepted size of GSS and SSPI authentication tokens. |
|
|
|
|
* |
|
|
|
|
* Kerberos tickets are usually quite small, but the TGTs issued by Windows |
|
|
|
|
* domain controllers include an authorization field known as the Privilege |
|
|
|
@ -196,7 +196,7 @@ static int pg_SSPI_recvauth(Port *port); |
|
|
|
|
* registry setting. Microsoft recommends that it is not set higher than |
|
|
|
|
* 65535 bytes, so that seems like a reasonable limit for us as well. |
|
|
|
|
*/ |
|
|
|
|
#define MAX_AUTH_TOKEN_LENGTH 65535 |
|
|
|
|
#define PG_MAX_AUTH_TOKEN_LENGTH 65535 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
/*----------------------------------------------------------------
|
|
|
|
@ -963,7 +963,7 @@ pg_GSS_recvauth(Port *port) |
|
|
|
|
|
|
|
|
|
/* Get the actual GSS token */ |
|
|
|
|
initStringInfo(&buf); |
|
|
|
|
if (pq_getmessage(&buf, MAX_AUTH_TOKEN_LENGTH)) |
|
|
|
|
if (pq_getmessage(&buf, PG_MAX_AUTH_TOKEN_LENGTH)) |
|
|
|
|
{ |
|
|
|
|
/* EOF - pq_getmessage already logged error */ |
|
|
|
|
pfree(buf.data); |
|
|
|
@ -1201,7 +1201,7 @@ pg_SSPI_recvauth(Port *port) |
|
|
|
|
|
|
|
|
|
/* Get the actual SSPI token */ |
|
|
|
|
initStringInfo(&buf); |
|
|
|
|
if (pq_getmessage(&buf, MAX_AUTH_TOKEN_LENGTH)) |
|
|
|
|
if (pq_getmessage(&buf, PG_MAX_AUTH_TOKEN_LENGTH)) |
|
|
|
|
{ |
|
|
|
|
/* EOF - pq_getmessage already logged error */ |
|
|
|
|
pfree(buf.data); |
|
|
|
|