Skip to content

Commit 19d9c11

Browse files
Steinar H. Gundersondahlerlend
Steinar H. Gunderson
authored andcommitted
Bug #27414321: CLANG-FORMAT EVERYTHING
Post-push fix: Unbreak DOxygen. Change-Id: Ia4354e91b9f08ddcae4453bcf15506fa5d181292
1 parent 8ec7da4 commit 19d9c11

File tree

9 files changed

+202
-221
lines changed

9 files changed

+202
-221
lines changed

doxygen_resources/doxygen-filter-mysqld

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -58,9 +58,9 @@ chomp ($gen_revision);
5858

5959
while (<>) {
6060
$line = $_;
61-
$line =~ s/\${DOXYGEN_GENERATION_DATE}/$gen_date/g;
62-
$line =~ s/\${DOXYGEN_GENERATION_BRANCH}/$gen_branch/g;
63-
$line =~ s/\${DOXYGEN_GENERATION_REVISION}/$gen_revision/g;
61+
$line =~ s/\$\{DOXYGEN_GENERATION_DATE\}/$gen_date/g;
62+
$line =~ s/\$\{DOXYGEN_GENERATION_BRANCH\}/$gen_branch/g;
63+
$line =~ s/\$\{DOXYGEN_GENERATION_REVISION\}/$gen_revision/g;
6464
print $line;
6565
}
6666

libmysql/authentication_win/handshake_client.cc

Lines changed: 9 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -287,8 +287,7 @@ Blob Handshake_client::process_data(const Blob &data) {
287287
/**********************************************************************/
288288

289289
/**
290-
@page
291-
page_protocol_connection_phase_authentication_methods_authentication_windows
290+
@page page_protocol_conn_auth_methods_auth_windows
292291
Windows Native Authentication
293292
294293
Authentication::WindowsAuth:
@@ -310,17 +309,15 @@ Blob Handshake_client::process_data(const Blob &data) {
310309
[Negotiate
311310
SSP]("http://msdn.microsoft.com/en-us/library/windows/desktop/aa378748(v=VS.85).aspx")
312311
in the Auth Phase protocol which either means
313-
@ref
314-
sect_protocol_connection_phase_authentication_methods_authentication_windows_ntlm
312+
@ref sect_protocol_conn_auth_methods_auth_windows_ntlm
315313
or
316-
@ref
317-
sect_protocol_connection_phase_authentication_methods_authentication_windows_spnego
314+
@ref sect_protocol_conn_auth_methods_auth_windows_spnego
318315
are used as underlying protocol.
319316
320317
Due to the implementation details the Windows Native Authentication method
321-
doesn't use the fast path of the @ref page_protocol_connection_phase, but is
318+
doesn't use the fast path of the @ref page_protocol_conn, but is
322319
only triggered on request as part of the
323-
@ref page_protocol_connection_phase_packets_protocol_auth_switch_request
320+
@ref page_protocol_conn_packets_protocol_auth_switch_request
324321
packet.
325322
326323
@@ -332,10 +329,8 @@ Blob Handshake_client::process_data(const Blob &data) {
332329
Also following windows authentication packets don't get split.
333330
334331
The client will send either a
335-
@ref
336-
sect_protocol_connection_phase_authentication_methods_authentication_windows_spnego
337-
or a @ref
338-
sect_protocol_connection_phase_authentication_methods_authentication_windows_ntlm
332+
@ref sect_protocol_conn_auth_methods_auth_windows_spnego
333+
or a @ref sect_protocol_conn_auth_methods_auth_windows_ntlm
339334
packet as a next packet.
340335
341336
To implement the protocol one can use several existing implementations:
@@ -356,8 +351,7 @@ Blob Handshake_client::process_data(const Blob &data) {
356351
@sa win_auth_handshake_client
357352
358353
359-
@section
360-
sect_protocol_connection_phase_authentication_methods_authentication_windows_ntlm
354+
@section sect_protocol_conn_auth_methods_auth_windows_ntlm
361355
NTLM
362356
363357
@note [Removed in Windows Vista and
@@ -375,8 +369,7 @@ Blob Handshake_client::process_data(const Blob &data) {
375369
@enduml
376370
377371
378-
@section
379-
sect_protocol_connection_phase_authentication_methods_authentication_windows_spnego
372+
@section sect_protocol_conn_auth_methods_auth_windows_spnego
380373
SPNEGO
381374
382375
Uses GSS-API as protocol and negotiates the proper auth-method automatically.

sql-common/client.cc

Lines changed: 17 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -3239,11 +3239,11 @@ static int send_change_user_packet(MCPVIO_EXT *mpvio, const uchar *data,
32393239
}
32403240

32413241
/**
3242-
@page page_protocol_connection_phase_packets_protocol_ssl_request
3242+
@page page_protocol_conn_packets_protocol_ssl_request
32433243
Protocol::SSLRequest:
32443244
32453245
SSL Connection Request Packet. It is like
3246-
@ref page_protocol_connection_phase_packets_protocol_handshake_response but is
3246+
@ref page_protocol_conn_packets_protocol_handshake_response but is
32473247
truncated right before username field. If server supports ::CLIENT_SSL
32483248
capability, client can send this packet to request a secure SSL connection.
32493249
The ::CLIENT_SSL capability flag must be set inside the SSL Connection Request
@@ -3287,7 +3287,7 @@ static int send_change_user_packet(MCPVIO_EXT *mpvio, const uchar *data,
32873287
@param buff_size The max size of the buffer. Used in debug only.
32883288
@return one past to where the buffer is filled
32893289
3290-
@sa page_protocol_connection_phase_packets_protocol_ssl_request
3290+
@sa page_protocol_conn_packets_protocol_ssl_request
32913291
send_client_reply_packet()
32923292
*/
32933293
static char *mysql_fill_packet_header(MYSQL *mysql, char *buff,
@@ -3484,18 +3484,18 @@ static int cli_establish_ssl(MYSQL *mysql) {
34843484
#define MAX_CONNECTION_ATTR_STORAGE_LENGTH 65536
34853485

34863486
/**
3487-
@page page_protocol_connection_phase_packets_protocol_handshake_response
3487+
@page page_protocol_conn_packets_protocol_handshake_response
34883488
Protocol::HandshakeResponse:
34893489
34903490
Depending on the servers support for the ::CLIENT_PROTOCOL_41 capability and
34913491
the clients understanding of that flag the client has to send either
3492-
a @ref sect_protocol_connection_phase_packets_protocol_handshake_response320
3492+
a @ref sect_protocol_conn_packets_protocol_handshake_response320
34933493
or
3494-
@ref sect_protocol_connection_phase_packets_protocol_handshake_response41.
3494+
@ref sect_protocol_conn_packets_protocol_handshake_response41.
34953495
34963496
@sa send_client_reply_packet
34973497
3498-
@section sect_protocol_connection_phase_packets_protocol_handshake_response320
3498+
@section sect_protocol_conn_packets_protocol_handshake_response320
34993499
Protocol::HandshakeResponse320
35003500
35013501
Old Handshake Response Packet used by old clients or if the server doesn't
@@ -3541,15 +3541,15 @@ static int cli_establish_ssl(MYSQL *mysql) {
35413541
@note If auth-response is followed by a database field it must be
35423542
NULL terminated.
35433543
3544-
@section sect_protocol_connection_phase_packets_protocol_handshake_response41
3544+
@section sect_protocol_conn_packets_protocol_handshake_response41
35453545
Protocol::HandshakeResponse41
35463546
35473547
Handshake Response Packet sent by 4.1+ clients supporting
35483548
::CLIENT_PROTOCOL_41 @ref group_cs_capabilities_flags flag,
35493549
if the server announced it in its
3550-
@ref page_protocol_connection_phase_packets_protocol_handshake.
3550+
@ref page_protocol_conn_packets_protocol_handshake.
35513551
Otherwise (talking to an old server) the
3552-
@ref sect_protocol_connection_phase_packets_protocol_handshake_response320
3552+
@ref sect_protocol_conn_packets_protocol_handshake_response320
35533553
packet must be used.
35543554
35553555
@@ -3648,9 +3648,9 @@ static int cli_establish_ssl(MYSQL *mysql) {
36483648
36493649
@note If client wants to have a secure SSL connection and sets
36503650
CLIENT_SSL flag it should first send the
3651-
@ref page_protocol_connection_phase_packets_protocol_ssl_request packet
3651+
@ref page_protocol_conn_packets_protocol_ssl_request packet
36523652
and only then, after establishing the secure connection, it should send
3653-
the @ref page_protocol_connection_phase_packets_protocol_handshake_response
3653+
the @ref page_protocol_conn_packets_protocol_handshake_response
36543654
packet.
36553655
*/
36563656

@@ -3664,7 +3664,7 @@ static int cli_establish_ssl(MYSQL *mysql) {
36643664
@retval 1 error
36653665
36663666
@sa mysql_fill_packet_header()
3667-
page_protocol_connection_phase_packets_protocol_handshake_response
3667+
page_protocol_conn_packets_protocol_handshake_response
36683668
*/
36693669
static int send_client_reply_packet(MCPVIO_EXT *mpvio, const uchar *data,
36703670
int data_len) {
@@ -6180,8 +6180,7 @@ static int native_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql) {
61806180
}
61816181

61826182
/**
6183-
@page
6184-
page_protocol_connection_phase_authentication_methods_clear_text_password
6183+
@page page_protocol_conn_auth_methods_clear_text_password
61856184
Clear text client plugin
61866185
61876186
<ul>
@@ -6197,7 +6196,7 @@ static int native_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql) {
61976196
Client side requires nothing from the server. But the server generates
61986197
and sends a 20-byte
61996198
@ref
6200-
page_protocol_connection_phase_authentication_methods_native_password_authentication
6199+
page_protocol_conn_auth_methods_native_password_authentication
62016200
compatible scramble.
62026201
</li>
62036202
<li>
@@ -6213,12 +6212,12 @@ static int native_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql) {
62136212
@note
62146213
Sending the scramble is not necessary for the clear text
62156214
method, but, since the server always initiates the exchange by
6216-
sending @ref page_protocol_connection_phase_packets_protocol_handshake
6215+
sending @ref page_protocol_conn_packets_protocol_handshake
62176216
and that one has a placeholder for authentication plugin dependent data the
62186217
server does fill that space with a scramble should it come to pass that
62196218
it will back down to
62206219
@ref
6221-
page_protocol_connection_phase_authentication_methods_native_password_authentication.
6220+
page_protocol_conn_auth_methods_native_password_authentication.
62226221
This is also why it's OK no to specifically read this in
62236222
@ref clear_password_auth_client since it's already read as a part of
62246223
the initial exchange.

sql-common/net_serv.cc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -580,11 +580,11 @@ static bool net_write_raw_loop(NET *net, const uchar *buf, size_t count) {
580580
581581
It is enabled if:
582582
- the server announces ::CLIENT_COMPRESS in its
583-
@ref page_protocol_connection_phase_packets_protocol_handshake and
583+
@ref page_protocol_conn_packets_protocol_handshake and
584584
- the client requests it too in its
585-
@ref page_protocol_connection_phase_packets_protocol_handshake_response
585+
@ref page_protocol_conn_packets_protocol_handshake_response
586586
packet and
587-
- After the server finishes the @ref page_protocol_connection_phase
587+
- After the server finishes the @ref page_protocol_conn
588588
with an @ref page_protocol_basic_ok_packet.
589589
590590
@subpage page_protocol_basic_compression_packet

0 commit comments

Comments
 (0)