aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--src/backend/libpq/auth.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/src/backend/libpq/auth.c b/src/backend/libpq/auth.c
index 466b3640e85..9a1ae66f037 100644
--- a/src/backend/libpq/auth.c
+++ b/src/backend/libpq/auth.c
@@ -8,7 +8,7 @@
*
*
* IDENTIFICATION
- * $PostgreSQL: pgsql/src/backend/libpq/auth.c,v 1.183.2.1 2009/10/14 07:27:27 heikki Exp $
+ * $PostgreSQL: pgsql/src/backend/libpq/auth.c,v 1.183.2.2 2009/10/14 22:10:01 heikki Exp $
*
*-------------------------------------------------------------------------
*/
@@ -182,7 +182,7 @@ static int pg_SSPI_recvauth(Port *port);
/*
- * Maximum size of GSS and SSPI authentication tokens.
+ * Maximum accepted size of GSS and SSPI authentication tokens.
*
* Kerberos tickets are usually quite small, but the TGTs issued by Windows
* domain controllers include an authorization field known as the Privilege
@@ -194,7 +194,7 @@ static int pg_SSPI_recvauth(Port *port);
* registry setting. Microsoft recommends that it is not set higher than
* 65535 bytes, so that seems like a reasonable limit for us as well.
*/
-#define MAX_AUTH_TOKEN_LENGTH 65535
+#define PG_MAX_AUTH_TOKEN_LENGTH 65535
/*----------------------------------------------------------------
@@ -952,7 +952,7 @@ pg_GSS_recvauth(Port *port)
/* Get the actual GSS token */
initStringInfo(&buf);
- if (pq_getmessage(&buf, MAX_AUTH_TOKEN_LENGTH))
+ if (pq_getmessage(&buf, PG_MAX_AUTH_TOKEN_LENGTH))
{
/* EOF - pq_getmessage already logged error */
pfree(buf.data);
@@ -1190,7 +1190,7 @@ pg_SSPI_recvauth(Port *port)
/* Get the actual SSPI token */
initStringInfo(&buf);
- if (pq_getmessage(&buf, MAX_AUTH_TOKEN_LENGTH))
+ if (pq_getmessage(&buf, PG_MAX_AUTH_TOKEN_LENGTH))
{
/* EOF - pq_getmessage already logged error */
pfree(buf.data);