Search Results
https://dev.mysql.com/doc/refman/8.4/en/cleartext-pluggable-authentication.html
A client-side authentication plugin is available that enables clients to send passwords to the server as cleartext, without hashing or encryption. Table 8.17 Plugin and Library Names for Cleartext Authentication Plugin or File Plugin or File Name ...
https://dev.mysql.com/doc/refman/8.4/en/column-indexes.html
Take this into account when specifying a prefix length for a nonbinary string column that uses a multibyte character set. The most common type of index involves a single column, storing copies of the values from that column in a data structure, ...
https://dev.mysql.com/doc/refman/8.4/en/communication-errors.html
If these kinds of things happen, it might indicate that someone is trying to break into your server! If the general query log is enabled, messages for these types of problems are logged to it. If connection problems occur such as communication ...
https://dev.mysql.com/doc/refman/8.4/en/conditions-and-parameters.html
If an exception is handled by a CONTINUE or EXIT handler that contains a RESIGNAL statement, execution of RESIGNAL pops the Diagnostics Area stack, thus signalling the exception (that is, the information that existed before entry into the handler).
https://dev.mysql.com/doc/refman/8.4/en/connecting-using-uri-or-key-value-pairs.html
shell.unparseUri() converts a dictionary of URI components and connection options into a valid URI-like connection string for connecting to MySQL, which can be used in MySQL Shell or by MySQL Connectors which implement X DevAPI. This section ...
https://dev.mysql.com/doc/refman/8.4/en/connection-control-plugin-installation.html
Determination of the applicable user name and host name takes proxying into account and occurs as follows: If the client user proxies another user, the account for failed-connection counting is the proxying user, not the proxied user. This section ...
https://dev.mysql.com/doc/refman/8.4/en/controlling-query-plan-evaluation.html
The optimizer_search_depth variable tells how far into the “future” of each incomplete plan the optimizer should look to evaluate whether it should be expanded further. The task of the query optimizer is to find an optimal plan for executing an ...
https://dev.mysql.com/doc/refman/8.4/en/create-tablespace.html
The unique file name is a 128 bit UUID formatted into five groups of hexadecimal numbers separated by dashes (aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee). The precise syntax and semantics depend on the storage engine used. MySQL NDB Cluster also supports ...
https://dev.mysql.com/doc/refman/8.4/en/creating-rsa-files-using-openssl.html
To create the RSA private and public key-pair files, run these commands while logged into the system account used to run the MySQL server so that the files are owned by that account: openssl genrsa -out private_key.pem 2048 openssl rsa -in ... This ...
https://dev.mysql.com/doc/refman/8.4/en/cursor-restrictions.html
In MySQL, a server-side cursor is materialized into an internal temporary table. Server-side cursors are implemented in the C API using the mysql_stmt_attr_set() function. A server-side cursor enables a result set to be generated on the server ...