- 19 Jun, 2007 3 commits
-
-
msvensson@pilot.(none) authored
into pilot.(none):/data/msvensson/mysql/wl3232/my51-wl3232
-
msvensson@pilot.(none) authored
into pilot.(none):/data/msvensson/mysql/wl3232/my50-wl3232
-
msvensson@pilot.(none) authored
- Add test case for this already existing feature
-
- 14 Jun, 2007 2 commits
-
-
msvensson@pilot.(none) authored
- touch up
-
msvensson@pilot.(none) authored
into pilot.(none):/data/msvensson/mysql/mysql-5.1-new-maint
-
- 13 Jun, 2007 15 commits
-
-
dkatz@damien-katzs-computer.local authored
Removed the ability to cache queries with UUID() and UUID_SHORT().
-
dkatz@damien-katzs-computer.local authored
into damien-katzs-computer.local:/Users/dkatz/mysql51
-
dkatz@damien-katzs-computer.local authored
into damien-katzs-computer.local:/Users/dkatz/50_win
-
dkatz@damien-katzs-computer.local authored
Removed the ability to cache queries containing "UUID()".
-
Updated to use new tool(s):Missed on call, resubmitting
-
jmiller/ndbdev@ndb08.mysql.com authored
into mysql.com:/data2/mysql-5.1-maint
-
Updated to use new tool(s)
-
-
ramil/ram@ramil.myoffice.izhnet.ru authored
into mysql.com:/home/ram/work/b28748/b28748.5.0
-
ramil/ram@ramil.myoffice.izhnet.ru authored
into mysql.com:/home/ram/work/b28748/b28748.5.1
-
msvensson@pilot.(none) authored
into pilot.(none):/data/msvensson/mysql/mysql-5.1-new-maint
-
msvensson@pilot.(none) authored
into pilot.(none):/data/msvensson/mysql/mysql-5.0-maint
-
msvensson@pilot.(none) authored
- Make tesingt continue even if test log file does not exists
-
jmiller/ndbdev@ndb08.mysql.com authored
into mysql.com:/data2/mysql-5.1-maint
-
-
- 12 Jun, 2007 8 commits
-
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-5.0-maint-2
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-5.1-maint
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-5.1-maint
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-5.0-maint-2
-
cmiller@zippy.cornsilk.net authored
protocol Fixed duplicated code, same as last commit. One could send a malformed packet that caused the server to SEGV. In recent versions of the password protocol, the client tells the server what length the ciphertext is (almost always 20). If that length was large enough to overflow a signed char, then the number would jump to very large after being casted to unsigned int. Instead, cast the *passwd char to uchar.
-
kaa@polly.local authored
into polly.local:/home/kaa/src/maint/mysql-5.1-maint
-
kaa@polly.local authored
into polly.local:/home/kaa/src/maint/mysql-5.0-maint
-
kaa@polly.local authored
into polly.local:/home/kaa/src/maint/bug28895/my51-bug28895
-
- 11 Jun, 2007 3 commits
-
-
cmiller@zippy.cornsilk.net authored
protocol Update for function moved to new file in 5.1. One could send a malformed packet that caused the server to SEGV. In recent versions of the password protocol, the client tells the server what length the ciphertext is (almost always 20). If that length was large enough to overflow a signed char, then the number would jump to very large after being casted to unsigned int. Instead, cast the *passwd char to uchar.
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-5.1-maint
-
kaa@polly.local authored
In create_tmp_table() don't set full table path as a table name. Other code assumes table names to not exceed NAME_LEN bytes.
-
- 09 Jun, 2007 1 commit
-
-
Problem: we may get unexpected results comparing [u]longlong values as doubles. Fix: adjust the test to use integer comparators. Note: it's not a real fix, we have to implement some new comparators to completely solve the original problem (see my comment in the bug report).
-
- 08 Jun, 2007 8 commits
-
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-5.1-maint
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-5.0-maint-2
-
cmiller@zippy.cornsilk.net authored
into zippy.cornsilk.net:/home/cmiller/work/mysql/mysql-4.1-maint
-
cmiller@zippy.cornsilk.net authored
protocol One could send a malformed packet that caused the server to SEGV. In recent versions of the password protocol, the client tells the server what length the ciphertext is (almost always 20). If that length was large enough to overflow a signed char, then the number would jump to very large after being casted to unsigned int. Instead, cast the *passwd char to uchar.
-
msvensson@pilot.(none) authored
into pilot.(none):/data/msvensson/mysql/mysql-5.1-new-maint
-
msvensson@pilot.(none) authored
-
msvensson@pilot.(none) authored
into pilot.(none):/data/msvensson/mysql/mysql-5.1-new-maint
-
msvensson@pilot.(none) authored
- Backport include/show_binlog_events.inc from 5.1 and use it to make the test output consistent results
-