aboutsummaryrefslogtreecommitdiff
path: root/src/backend/libpq/auth.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/backend/libpq/auth.c')
-rw-r--r--src/backend/libpq/auth.c16
1 files changed, 1 insertions, 15 deletions
diff --git a/src/backend/libpq/auth.c b/src/backend/libpq/auth.c
index fb43f8e4af8..216343f36c9 100644
--- a/src/backend/libpq/auth.c
+++ b/src/backend/libpq/auth.c
@@ -8,7 +8,7 @@
*
*
* IDENTIFICATION
- * $Header: /cvsroot/pgsql/src/backend/libpq/auth.c,v 1.87 2002/08/29 21:50:36 momjian Exp $
+ * $Header: /cvsroot/pgsql/src/backend/libpq/auth.c,v 1.88 2002/08/30 16:00:41 momjian Exp $
*
*-------------------------------------------------------------------------
*/
@@ -709,20 +709,6 @@ recv_and_check_password_packet(Port *port)
if (pq_eof() == EOF || pq_getint(&len, 4) == EOF)
return STATUS_EOF; /* client didn't want to send password */
- /*
- * Since the remote client has not yet been authenticated, we need
- * to be careful when using the data they send us. The 8K limit is
- * arbitrary, and somewhat bogus: the intent is to ensure we don't
- * allocate an enormous chunk of memory.
- */
-
- if (len < 1 || len > 8192)
- {
- elog(LOG, "Invalid password packet length: %d; "
- "must satisfy 1 <= length <= 8192", len);
- return STATUS_EOF;
- }
-
initStringInfo(&buf);
if (pq_getstr(&buf) == EOF) /* receive password */
{