From be922e8555a87263973a038c54171f2db833810d Mon Sep 17 00:00:00 2001
From: Heikki Linnakangas <heikki.linnakangas@iki.fi>
Date: Wed, 14 Oct 2009 22:09:46 +0000
Subject: [PATCH] Rename the new MAX_AUTH_TOKEN_LENGTH #define to
 PG_MAX_AUTH_MAX_TOKEN_LENGTH, to make it more obvious that it's a PostgreSQL
 internal limit, not something that comes from system header files.

---
 src/backend/libpq/auth.c | 10 +++++-----
 1 file changed, 5 insertions(+), 5 deletions(-)

diff --git a/src/backend/libpq/auth.c b/src/backend/libpq/auth.c
index 1994484f969..ff8a7405f4a 100644
--- a/src/backend/libpq/auth.c
+++ b/src/backend/libpq/auth.c
@@ -8,7 +8,7 @@
  *
  *
  * IDENTIFICATION
- *	  $PostgreSQL: pgsql/src/backend/libpq/auth.c,v 1.185 2009/10/14 07:27:13 heikki Exp $
+ *	  $PostgreSQL: pgsql/src/backend/libpq/auth.c,v 1.186 2009/10/14 22:09:46 heikki Exp $
  *
  *-------------------------------------------------------------------------
  */
@@ -184,7 +184,7 @@ static int	pg_SSPI_recvauth(Port *port);
 
 
 /*
- * Maximum size of GSS and SSPI authentication tokens.
+ * Maximum accepted size of GSS and SSPI authentication tokens.
  *
  * Kerberos tickets are usually quite small, but the TGTs issued by Windows
  * domain controllers include an authorization field known as the Privilege
@@ -196,7 +196,7 @@ static int	pg_SSPI_recvauth(Port *port);
  * registry setting. Microsoft recommends that it is not set higher than
  * 65535 bytes, so that seems like a reasonable limit for us as well.
  */
-#define MAX_AUTH_TOKEN_LENGTH	65535
+#define PG_MAX_AUTH_TOKEN_LENGTH	65535
 
 
 /*----------------------------------------------------------------
@@ -963,7 +963,7 @@ pg_GSS_recvauth(Port *port)
 
 		/* Get the actual GSS token */
 		initStringInfo(&buf);
-		if (pq_getmessage(&buf, MAX_AUTH_TOKEN_LENGTH))
+		if (pq_getmessage(&buf, PG_MAX_AUTH_TOKEN_LENGTH))
 		{
 			/* EOF - pq_getmessage already logged error */
 			pfree(buf.data);
@@ -1201,7 +1201,7 @@ pg_SSPI_recvauth(Port *port)
 
 		/* Get the actual SSPI token */
 		initStringInfo(&buf);
-		if (pq_getmessage(&buf, MAX_AUTH_TOKEN_LENGTH))
+		if (pq_getmessage(&buf, PG_MAX_AUTH_TOKEN_LENGTH))
 		{
 			/* EOF - pq_getmessage already logged error */
 			pfree(buf.data);
-- 
GitLab