@@ -3239,11 +3239,11 @@ static int send_change_user_packet(MCPVIO_EXT *mpvio, const uchar *data,
3239
3239
}
3240
3240
3241
3241
/* *
3242
- @page page_protocol_connection_phase_packets_protocol_ssl_request
3242
+ @page page_protocol_conn_packets_protocol_ssl_request
3243
3243
Protocol::SSLRequest:
3244
3244
3245
3245
SSL Connection Request Packet. It is like
3246
- @ref page_protocol_connection_phase_packets_protocol_handshake_response but is
3246
+ @ref page_protocol_conn_packets_protocol_handshake_response but is
3247
3247
truncated right before username field. If server supports ::CLIENT_SSL
3248
3248
capability, client can send this packet to request a secure SSL connection.
3249
3249
The ::CLIENT_SSL capability flag must be set inside the SSL Connection Request
@@ -3287,7 +3287,7 @@ static int send_change_user_packet(MCPVIO_EXT *mpvio, const uchar *data,
3287
3287
@param buff_size The max size of the buffer. Used in debug only.
3288
3288
@return one past to where the buffer is filled
3289
3289
3290
- @sa page_protocol_connection_phase_packets_protocol_ssl_request
3290
+ @sa page_protocol_conn_packets_protocol_ssl_request
3291
3291
send_client_reply_packet()
3292
3292
*/
3293
3293
static char *mysql_fill_packet_header (MYSQL *mysql, char *buff,
@@ -3484,18 +3484,18 @@ static int cli_establish_ssl(MYSQL *mysql) {
3484
3484
#define MAX_CONNECTION_ATTR_STORAGE_LENGTH 65536
3485
3485
3486
3486
/* *
3487
- @page page_protocol_connection_phase_packets_protocol_handshake_response
3487
+ @page page_protocol_conn_packets_protocol_handshake_response
3488
3488
Protocol::HandshakeResponse:
3489
3489
3490
3490
Depending on the servers support for the ::CLIENT_PROTOCOL_41 capability and
3491
3491
the clients understanding of that flag the client has to send either
3492
- a @ref sect_protocol_connection_phase_packets_protocol_handshake_response320
3492
+ a @ref sect_protocol_conn_packets_protocol_handshake_response320
3493
3493
or
3494
- @ref sect_protocol_connection_phase_packets_protocol_handshake_response41 .
3494
+ @ref sect_protocol_conn_packets_protocol_handshake_response41 .
3495
3495
3496
3496
@sa send_client_reply_packet
3497
3497
3498
- @section sect_protocol_connection_phase_packets_protocol_handshake_response320
3498
+ @section sect_protocol_conn_packets_protocol_handshake_response320
3499
3499
Protocol::HandshakeResponse320
3500
3500
3501
3501
Old Handshake Response Packet used by old clients or if the server doesn't
@@ -3541,15 +3541,15 @@ static int cli_establish_ssl(MYSQL *mysql) {
3541
3541
@note If auth-response is followed by a database field it must be
3542
3542
NULL terminated.
3543
3543
3544
- @section sect_protocol_connection_phase_packets_protocol_handshake_response41
3544
+ @section sect_protocol_conn_packets_protocol_handshake_response41
3545
3545
Protocol::HandshakeResponse41
3546
3546
3547
3547
Handshake Response Packet sent by 4.1+ clients supporting
3548
3548
::CLIENT_PROTOCOL_41 @ref group_cs_capabilities_flags flag,
3549
3549
if the server announced it in its
3550
- @ref page_protocol_connection_phase_packets_protocol_handshake .
3550
+ @ref page_protocol_conn_packets_protocol_handshake .
3551
3551
Otherwise (talking to an old server) the
3552
- @ref sect_protocol_connection_phase_packets_protocol_handshake_response320
3552
+ @ref sect_protocol_conn_packets_protocol_handshake_response320
3553
3553
packet must be used.
3554
3554
3555
3555
@@ -3648,9 +3648,9 @@ static int cli_establish_ssl(MYSQL *mysql) {
3648
3648
3649
3649
@note If client wants to have a secure SSL connection and sets
3650
3650
CLIENT_SSL flag it should first send the
3651
- @ref page_protocol_connection_phase_packets_protocol_ssl_request packet
3651
+ @ref page_protocol_conn_packets_protocol_ssl_request packet
3652
3652
and only then, after establishing the secure connection, it should send
3653
- the @ref page_protocol_connection_phase_packets_protocol_handshake_response
3653
+ the @ref page_protocol_conn_packets_protocol_handshake_response
3654
3654
packet.
3655
3655
*/
3656
3656
@@ -3664,7 +3664,7 @@ static int cli_establish_ssl(MYSQL *mysql) {
3664
3664
@retval 1 error
3665
3665
3666
3666
@sa mysql_fill_packet_header()
3667
- page_protocol_connection_phase_packets_protocol_handshake_response
3667
+ page_protocol_conn_packets_protocol_handshake_response
3668
3668
*/
3669
3669
static int send_client_reply_packet (MCPVIO_EXT *mpvio, const uchar *data,
3670
3670
int data_len) {
@@ -6180,8 +6180,7 @@ static int native_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql) {
6180
6180
}
6181
6181
6182
6182
/* *
6183
- @page
6184
- page_protocol_connection_phase_authentication_methods_clear_text_password
6183
+ @page page_protocol_conn_auth_methods_clear_text_password
6185
6184
Clear text client plugin
6186
6185
6187
6186
<ul>
@@ -6197,7 +6196,7 @@ static int native_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql) {
6197
6196
Client side requires nothing from the server. But the server generates
6198
6197
and sends a 20-byte
6199
6198
@ref
6200
- page_protocol_connection_phase_authentication_methods_native_password_authentication
6199
+ page_protocol_conn_auth_methods_native_password_authentication
6201
6200
compatible scramble.
6202
6201
</li>
6203
6202
<li>
@@ -6213,12 +6212,12 @@ static int native_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql) {
6213
6212
@note
6214
6213
Sending the scramble is not necessary for the clear text
6215
6214
method, but, since the server always initiates the exchange by
6216
- sending @ref page_protocol_connection_phase_packets_protocol_handshake
6215
+ sending @ref page_protocol_conn_packets_protocol_handshake
6217
6216
and that one has a placeholder for authentication plugin dependent data the
6218
6217
server does fill that space with a scramble should it come to pass that
6219
6218
it will back down to
6220
6219
@ref
6221
- page_protocol_connection_phase_authentication_methods_native_password_authentication .
6220
+ page_protocol_conn_auth_methods_native_password_authentication .
6222
6221
This is also why it's OK no to specifically read this in
6223
6222
@ref clear_password_auth_client since it's already read as a part of
6224
6223
the initial exchange.
0 commit comments