You've already forked mariadb-connector-c
mirror of
https://github.com/mariadb-corporation/mariadb-connector-c.git
synced 2025-08-08 14:02:17 +03:00
715 lines
20 KiB
C
715 lines
20 KiB
C
#include <my_global.h>
|
|
#include <my_sys.h>
|
|
#include <m_string.h>
|
|
#include <errmsg.h>
|
|
#include <mysql.h>
|
|
#include <mysql/client_plugin.h>
|
|
#include <violite.h>
|
|
#ifdef HAVE_OPENSSL
|
|
#include <ma_secure.h>
|
|
#endif
|
|
|
|
typedef struct st_mysql_client_plugin_AUTHENTICATION auth_plugin_t;
|
|
static int client_mpvio_write_packet(struct st_plugin_vio*, const uchar*, size_t);
|
|
static int native_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql);
|
|
static int old_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql);
|
|
extern void read_user_name(char *name);
|
|
|
|
#define compile_time_assert(A) \
|
|
do {\
|
|
typedef char constraint[(A) ? 1 : -1];\
|
|
} while (0);
|
|
|
|
static auth_plugin_t native_password_client_plugin=
|
|
{
|
|
MYSQL_CLIENT_AUTHENTICATION_PLUGIN,
|
|
MYSQL_CLIENT_AUTHENTICATION_PLUGIN_INTERFACE_VERSION,
|
|
native_password_plugin_name,
|
|
"R.J.Silk, Sergei Golubchik",
|
|
"Native MySQL authentication",
|
|
{1, 0, 0},
|
|
NULL,
|
|
NULL,
|
|
native_password_auth_client
|
|
};
|
|
|
|
static auth_plugin_t old_password_client_plugin=
|
|
{
|
|
MYSQL_CLIENT_AUTHENTICATION_PLUGIN,
|
|
MYSQL_CLIENT_AUTHENTICATION_PLUGIN_INTERFACE_VERSION,
|
|
old_password_plugin_name,
|
|
"R.J.Silk, Sergei Golubchik",
|
|
"Old MySQL-3.23 authentication",
|
|
{1, 0, 0},
|
|
NULL,
|
|
NULL,
|
|
old_password_auth_client
|
|
};
|
|
|
|
struct st_mysql_client_plugin *mysql_client_builtins[]=
|
|
{
|
|
(struct st_mysql_client_plugin *)&native_password_client_plugin,
|
|
0
|
|
};
|
|
|
|
/* this is a "superset" of MYSQL_PLUGIN_VIO, in C++ I use inheritance */
|
|
typedef struct {
|
|
int (*read_packet)(struct st_plugin_vio *vio, uchar **buf);
|
|
int (*write_packet)(struct st_plugin_vio *vio, const uchar *pkt, size_t pkt_len);
|
|
void (*info)(struct st_plugin_vio *vio, struct st_plugin_vio_info *info);
|
|
/* -= end of MYSQL_PLUGIN_VIO =- */
|
|
MYSQL *mysql;
|
|
auth_plugin_t *plugin; /**< what plugin we're under */
|
|
const char *db;
|
|
struct {
|
|
uchar *pkt; /**< pointer into NET::buff */
|
|
uint pkt_len;
|
|
} cached_server_reply;
|
|
uint packets_read, packets_written; /**< counters for send/received packets */
|
|
my_bool mysql_change_user; /**< if it's mysql_change_user() */
|
|
int last_read_packet_len; /**< the length of the last *read* packet */
|
|
} MCPVIO_EXT;
|
|
|
|
static int native_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql)
|
|
{
|
|
int pkt_len;
|
|
uchar *pkt;
|
|
|
|
if (((MCPVIO_EXT *)vio)->mysql_change_user)
|
|
{
|
|
/*
|
|
in mysql_change_user() the client sends the first packet.
|
|
we use the old scramble.
|
|
*/
|
|
pkt= (uchar*)mysql->scramble_buff;
|
|
pkt_len= SCRAMBLE_LENGTH + 1;
|
|
}
|
|
else
|
|
{
|
|
/* read the scramble */
|
|
if ((pkt_len= vio->read_packet(vio, &pkt)) < 0)
|
|
return CR_ERROR;
|
|
|
|
if (pkt_len != SCRAMBLE_LENGTH + 1)
|
|
return CR_SERVER_HANDSHAKE_ERR;
|
|
|
|
/* save it in MYSQL */
|
|
memcpy(mysql->scramble_buff, pkt, SCRAMBLE_LENGTH);
|
|
mysql->scramble_buff[SCRAMBLE_LENGTH] = 0;
|
|
}
|
|
|
|
if (mysql->passwd[0])
|
|
{
|
|
char scrambled[SCRAMBLE_LENGTH + 1];
|
|
my_scramble_41((uchar *)scrambled, (char*)pkt, mysql->passwd);
|
|
if (vio->write_packet(vio, (uchar*)scrambled, SCRAMBLE_LENGTH))
|
|
return CR_ERROR;
|
|
}
|
|
else
|
|
if (vio->write_packet(vio, 0, 0)) /* no password */
|
|
return CR_ERROR;
|
|
|
|
return CR_OK;
|
|
}
|
|
|
|
|
|
/**
|
|
client authentication plugin that does old MySQL authentication
|
|
using an 8-byte (4.0-) scramble
|
|
*/
|
|
|
|
static int old_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql)
|
|
{
|
|
uchar *pkt;
|
|
int pkt_len;
|
|
|
|
if (((MCPVIO_EXT *)vio)->mysql_change_user)
|
|
{
|
|
/*
|
|
in mysql_change_user() the client sends the first packet.
|
|
we use the old scramble.
|
|
*/
|
|
pkt= (uchar*)mysql->scramble_buff;
|
|
pkt_len= SCRAMBLE_LENGTH_323 + 1;
|
|
}
|
|
else
|
|
{
|
|
/* read the scramble */
|
|
if ((pkt_len= vio->read_packet(vio, &pkt)) < 0)
|
|
return CR_ERROR;
|
|
|
|
if (pkt_len != SCRAMBLE_LENGTH_323 + 1 &&
|
|
pkt_len != SCRAMBLE_LENGTH + 1)
|
|
return CR_SERVER_HANDSHAKE_ERR;
|
|
|
|
/* save it in MYSQL */
|
|
memcpy(mysql->scramble_buff, pkt, pkt_len);
|
|
mysql->scramble_buff[pkt_len] = 0;
|
|
}
|
|
|
|
if (mysql->passwd[0])
|
|
{
|
|
char scrambled[SCRAMBLE_LENGTH_323 + 1];
|
|
scramble_323(scrambled, (char*)pkt, mysql->passwd);
|
|
if (vio->write_packet(vio, (uchar*)scrambled, SCRAMBLE_LENGTH_323 + 1))
|
|
return CR_ERROR;
|
|
}
|
|
else
|
|
if (vio->write_packet(vio, 0, 0)) /* no password */
|
|
return CR_ERROR;
|
|
|
|
return CR_OK;
|
|
}
|
|
|
|
/**
|
|
sends a COM_CHANGE_USER command with a caller provided payload
|
|
|
|
Packet format:
|
|
|
|
Bytes Content
|
|
----- ----
|
|
n user name - \0-terminated string
|
|
n password
|
|
3.23 scramble - \0-terminated string (9 bytes)
|
|
otherwise - length (1 byte) coded
|
|
n database name - \0-terminated string
|
|
2 character set number (if the server >= 4.1.x)
|
|
n client auth plugin name - \0-terminated string,
|
|
(if the server supports plugin auth)
|
|
|
|
@retval 0 ok
|
|
@retval 1 error
|
|
*/
|
|
|
|
static int send_change_user_packet(MCPVIO_EXT *mpvio,
|
|
const uchar *data, int data_len)
|
|
{
|
|
MYSQL *mysql= mpvio->mysql;
|
|
char *buff, *end;
|
|
int res= 1;
|
|
|
|
buff= my_alloca(USERNAME_LENGTH+1 + data_len+1 + NAME_LEN+1 + 2 + NAME_LEN+1);
|
|
|
|
end= strmake(buff, mysql->user, USERNAME_LENGTH) + 1;
|
|
|
|
if (!data_len)
|
|
*end++= 0;
|
|
else
|
|
{
|
|
if (mysql->client_flag & CLIENT_SECURE_CONNECTION)
|
|
{
|
|
DBUG_ASSERT(data_len <= 255);
|
|
if (data_len > 255)
|
|
{
|
|
my_set_error(mysql, CR_MALFORMED_PACKET, SQLSTATE_UNKNOWN, 0);
|
|
goto error;
|
|
}
|
|
*end++= data_len;
|
|
}
|
|
else
|
|
{
|
|
DBUG_ASSERT(data_len == SCRAMBLE_LENGTH_323 + 1);
|
|
DBUG_ASSERT(data[SCRAMBLE_LENGTH_323] == 0);
|
|
}
|
|
memcpy(end, data, data_len);
|
|
end+= data_len;
|
|
}
|
|
end= strmake(end, mpvio->db ? mpvio->db : "", NAME_LEN) + 1;
|
|
|
|
if (mysql->server_capabilities & CLIENT_PROTOCOL_41)
|
|
{
|
|
int2store(end, (ushort) mysql->charset->nr);
|
|
end+= 2;
|
|
}
|
|
|
|
if (mysql->server_capabilities & CLIENT_PLUGIN_AUTH)
|
|
end= strmake(end, mpvio->plugin->name, NAME_LEN) + 1;
|
|
|
|
res= simple_command(mysql, MYSQL_COM_CHANGE_USER,
|
|
buff, (ulong)(end-buff), 1);
|
|
|
|
error:
|
|
my_afree(buff);
|
|
return res;
|
|
}
|
|
|
|
|
|
/**
|
|
sends a client authentication packet (second packet in the 3-way handshake)
|
|
|
|
Packet format (when the server is 4.0 or earlier):
|
|
|
|
Bytes Content
|
|
----- ----
|
|
2 client capabilities
|
|
3 max packet size
|
|
n user name, \0-terminated
|
|
9 scramble_323, \0-terminated
|
|
|
|
Packet format (when the server is 4.1 or newer):
|
|
|
|
Bytes Content
|
|
----- ----
|
|
4 client capabilities
|
|
4 max packet size
|
|
1 charset number
|
|
23 reserved (always 0)
|
|
n user name, \0-terminated
|
|
n plugin auth data (e.g. scramble), length (1 byte) coded
|
|
n database name, \0-terminated
|
|
(if CLIENT_CONNECT_WITH_DB is set in the capabilities)
|
|
n client auth plugin name - \0-terminated string,
|
|
(if CLIENT_PLUGIN_AUTH is set in the capabilities)
|
|
|
|
@retval 0 ok
|
|
@retval 1 error
|
|
*/
|
|
|
|
static int send_client_reply_packet(MCPVIO_EXT *mpvio,
|
|
const uchar *data, int data_len)
|
|
{
|
|
MYSQL *mysql= mpvio->mysql;
|
|
NET *net= &mysql->net;
|
|
char *buff, *end;
|
|
|
|
/* see end= buff+32 below, fixed size of the packet is 32 bytes */
|
|
buff= my_alloca(33 + USERNAME_LENGTH + data_len + NAME_LEN + NAME_LEN);
|
|
|
|
mysql->client_flag|= mysql->options.client_flag;
|
|
mysql->client_flag|= CLIENT_CAPABILITIES;
|
|
|
|
if (mysql->client_flag & CLIENT_MULTI_STATEMENTS)
|
|
mysql->client_flag|= CLIENT_MULTI_RESULTS;
|
|
|
|
#if defined(HAVE_OPENSSL) && !defined(EMBEDDED_LIBRARY)
|
|
if (mysql->options.ssl_key || mysql->options.ssl_cert ||
|
|
mysql->options.ssl_ca || mysql->options.ssl_capath ||
|
|
mysql->options.ssl_cipher)
|
|
mysql->options.use_ssl= 1;
|
|
if (mysql->options.use_ssl)
|
|
mysql->client_flag|= CLIENT_SSL;
|
|
#endif /* HAVE_OPENSSL && !EMBEDDED_LIBRARY*/
|
|
if (mpvio->db)
|
|
mysql->client_flag|= CLIENT_CONNECT_WITH_DB;
|
|
|
|
/* Remove options that server doesn't support */
|
|
mysql->client_flag= mysql->client_flag &
|
|
(~(CLIENT_COMPRESS | CLIENT_SSL | CLIENT_PROTOCOL_41)
|
|
| mysql->server_capabilities);
|
|
|
|
#ifndef HAVE_COMPRESS
|
|
mysql->client_flag&= ~CLIENT_COMPRESS;
|
|
#endif
|
|
|
|
if (mysql->client_flag & CLIENT_PROTOCOL_41)
|
|
{
|
|
/* 4.1 server and 4.1 client has a 32 byte option flag */
|
|
int4store(buff,mysql->client_flag);
|
|
int4store(buff+4, net->max_packet_size);
|
|
buff[8]= (char) mysql->charset->nr;
|
|
bzero(buff+9, 32-9);
|
|
end= buff+32;
|
|
}
|
|
else
|
|
{
|
|
int2store(buff, mysql->client_flag);
|
|
int3store(buff+2, net->max_packet_size);
|
|
end= buff+5;
|
|
}
|
|
#ifdef HAVE_OPENSSL
|
|
if (mysql->client_flag & CLIENT_SSL)
|
|
{
|
|
SSL *ssl;
|
|
/*
|
|
Send mysql->client_flag, max_packet_size - unencrypted otherwise
|
|
the server does not know we want to do SSL
|
|
*/
|
|
if (my_net_write(net, (char*)buff, (size_t) (end-buff)) || net_flush(net))
|
|
{
|
|
my_set_error(mysql, CR_SERVER_LOST, SQLSTATE_UNKNOWN,
|
|
ER(CR_SERVER_LOST_EXTENDED),
|
|
"sending connection information to server",
|
|
errno);
|
|
goto error;
|
|
}
|
|
|
|
/* Create SSL */
|
|
if (!(ssl= my_ssl_init(mysql)))
|
|
goto error;
|
|
|
|
/* Connect to the server */
|
|
if (my_ssl_connect(ssl))
|
|
{
|
|
SSL_free(ssl);
|
|
goto error;
|
|
}
|
|
/* todo: server certification verification */
|
|
}
|
|
#endif /* HAVE_OPENSSL */
|
|
|
|
DBUG_PRINT("info",("Server version = '%s' capabilites: %lu status: %u client_flag: %lu",
|
|
mysql->server_version, mysql->server_capabilities,
|
|
mysql->server_status, mysql->client_flag));
|
|
|
|
compile_time_assert(MYSQL_USERNAME_LENGTH == USERNAME_LENGTH);
|
|
|
|
/* This needs to be changed as it's not useful with big packets */
|
|
if (mysql->user[0])
|
|
strmake(end, mysql->user, USERNAME_LENGTH);
|
|
else
|
|
read_user_name(end);
|
|
|
|
/* We have to handle different version of handshake here */
|
|
DBUG_PRINT("info",("user: %s",end));
|
|
end= strend(end) + 1;
|
|
if (data_len)
|
|
{
|
|
if (mysql->server_capabilities & CLIENT_SECURE_CONNECTION)
|
|
{
|
|
*end++= data_len;
|
|
memcpy(end, data, data_len);
|
|
end+= data_len;
|
|
}
|
|
else
|
|
{
|
|
DBUG_ASSERT(data_len == SCRAMBLE_LENGTH_323 + 1); /* incl. \0 at the end */
|
|
memcpy(end, data, data_len);
|
|
end+= data_len;
|
|
}
|
|
}
|
|
else
|
|
*end++= 0;
|
|
|
|
/* Add database if needed */
|
|
if (mpvio->db && (mysql->server_capabilities & CLIENT_CONNECT_WITH_DB))
|
|
{
|
|
end= strmake(end, mpvio->db, NAME_LEN) + 1;
|
|
mysql->db= my_strdup(mpvio->db, MYF(MY_WME));
|
|
}
|
|
|
|
if (mysql->server_capabilities & CLIENT_PLUGIN_AUTH)
|
|
end= strmake(end, mpvio->plugin->name, NAME_LEN) + 1;
|
|
|
|
/* Write authentication package */
|
|
if (my_net_write(net, buff, (size_t) (end-buff)) || net_flush(net))
|
|
{
|
|
my_set_error(mysql, CR_SERVER_LOST, SQLSTATE_UNKNOWN,
|
|
ER(CR_SERVER_LOST_EXTENDED),
|
|
"sending authentication information",
|
|
errno);
|
|
goto error;
|
|
}
|
|
my_afree(buff);
|
|
return 0;
|
|
|
|
error:
|
|
my_afree(buff);
|
|
return 1;
|
|
}
|
|
|
|
/**
|
|
vio->read_packet() callback method for client authentication plugins
|
|
|
|
This function is called by a client authentication plugin, when it wants
|
|
to read data from the server.
|
|
*/
|
|
|
|
static int client_mpvio_read_packet(struct st_plugin_vio *mpv, uchar **buf)
|
|
{
|
|
MCPVIO_EXT *mpvio= (MCPVIO_EXT*)mpv;
|
|
MYSQL *mysql= mpvio->mysql;
|
|
ulong pkt_len;
|
|
|
|
/* there are cached data left, feed it to a plugin */
|
|
if (mpvio->cached_server_reply.pkt)
|
|
{
|
|
*buf= mpvio->cached_server_reply.pkt;
|
|
mpvio->cached_server_reply.pkt= 0;
|
|
mpvio->packets_read++;
|
|
return mpvio->cached_server_reply.pkt_len;
|
|
}
|
|
|
|
if (mpvio->packets_read == 0)
|
|
{
|
|
/*
|
|
the server handshake packet came from the wrong plugin,
|
|
or it's mysql_change_user(). Either way, there is no data
|
|
for a plugin to read. send a dummy packet to the server
|
|
to initiate a dialog.
|
|
*/
|
|
if (client_mpvio_write_packet(mpv, 0, 0))
|
|
return (int)packet_error;
|
|
}
|
|
|
|
/* otherwise read the data */
|
|
pkt_len= net_safe_read(mysql);
|
|
mpvio->last_read_packet_len= pkt_len;
|
|
*buf= mysql->net.read_pos;
|
|
|
|
/* was it a request to change plugins ? */
|
|
if (**buf == 254)
|
|
return (int)packet_error; /* if yes, this plugin shan't continue */
|
|
|
|
/*
|
|
the server sends \1\255 or \1\254 instead of just \255 or \254 -
|
|
for us to not confuse it with an error or "change plugin" packets.
|
|
We remove this escaping \1 here.
|
|
|
|
See also server_mpvio_write_packet() where the escaping is done.
|
|
*/
|
|
if (pkt_len && **buf == 1)
|
|
{
|
|
(*buf)++;
|
|
pkt_len--;
|
|
}
|
|
mpvio->packets_read++;
|
|
return pkt_len;
|
|
}
|
|
|
|
/**
|
|
vio->write_packet() callback method for client authentication plugins
|
|
|
|
This function is called by a client authentication plugin, when it wants
|
|
to send data to the server.
|
|
|
|
It transparently wraps the data into a change user or authentication
|
|
handshake packet, if neccessary.
|
|
*/
|
|
|
|
static int client_mpvio_write_packet(struct st_plugin_vio *mpv,
|
|
const uchar *pkt, size_t pkt_len)
|
|
{
|
|
int res;
|
|
MCPVIO_EXT *mpvio= (MCPVIO_EXT*)mpv;
|
|
|
|
if (mpvio->packets_written == 0)
|
|
{
|
|
if (mpvio->mysql_change_user)
|
|
res= send_change_user_packet(mpvio, pkt, pkt_len);
|
|
else
|
|
res= send_client_reply_packet(mpvio, pkt, pkt_len);
|
|
}
|
|
else
|
|
{
|
|
NET *net= &mpvio->mysql->net;
|
|
if (mpvio->mysql->thd)
|
|
res= 1; /* no chit-chat in embedded */
|
|
else
|
|
res= my_net_write(net, (char *)pkt, pkt_len) || net_flush(net);
|
|
if (res)
|
|
my_set_error(mpvio->mysql, CR_SERVER_LOST, SQLSTATE_UNKNOWN,
|
|
ER(CR_SERVER_LOST_EXTENDED),
|
|
"sending authentication information",
|
|
errno);
|
|
}
|
|
mpvio->packets_written++;
|
|
return res;
|
|
}
|
|
|
|
/**
|
|
fills MYSQL_PLUGIN_VIO_INFO structure with the information about the
|
|
connection
|
|
*/
|
|
|
|
void mpvio_info(Vio *vio, MYSQL_PLUGIN_VIO_INFO *info)
|
|
{
|
|
bzero(info, sizeof(*info));
|
|
switch (vio->type) {
|
|
case VIO_TYPE_TCPIP:
|
|
info->protocol= MYSQL_VIO_TCP;
|
|
info->socket= vio->sd;
|
|
return;
|
|
case VIO_TYPE_SOCKET:
|
|
info->protocol= MYSQL_VIO_SOCKET;
|
|
info->socket= vio->sd;
|
|
return;
|
|
case VIO_TYPE_SSL:
|
|
{
|
|
struct sockaddr addr;
|
|
SOCKET_SIZE_TYPE addrlen= sizeof(addr);
|
|
if (getsockname(vio->sd, &addr, &addrlen))
|
|
return;
|
|
info->protocol= addr.sa_family == AF_UNIX ?
|
|
MYSQL_VIO_SOCKET : MYSQL_VIO_TCP;
|
|
info->socket= vio->sd;
|
|
return;
|
|
}
|
|
#ifdef _WIN32
|
|
case VIO_TYPE_NAMEDPIPE:
|
|
info->protocol= MYSQL_VIO_PIPE;
|
|
info->handle= vio->hPipe;
|
|
return;
|
|
/* not supported yet
|
|
case VIO_TYPE_SHARED_MEMORY:
|
|
info->protocol= MYSQL_VIO_MEMORY;
|
|
info->handle= vio->handle_file_map;
|
|
return;
|
|
*/
|
|
#endif
|
|
default: DBUG_ASSERT(0);
|
|
}
|
|
}
|
|
|
|
static void client_mpvio_info(MYSQL_PLUGIN_VIO *vio,
|
|
MYSQL_PLUGIN_VIO_INFO *info)
|
|
{
|
|
MCPVIO_EXT *mpvio= (MCPVIO_EXT*)vio;
|
|
mpvio_info(mpvio->mysql->net.vio, info);
|
|
}
|
|
|
|
/**
|
|
Client side of the plugin driver authentication.
|
|
|
|
@note this is used by both the mysql_real_connect and mysql_change_user
|
|
|
|
@param mysql mysql
|
|
@param data pointer to the plugin auth data (scramble) in the
|
|
handshake packet
|
|
@param data_len the length of the data
|
|
@param data_plugin a plugin that data were prepared for
|
|
or 0 if it's mysql_change_user()
|
|
@param db initial db to use, can be 0
|
|
|
|
@retval 0 ok
|
|
@retval 1 error
|
|
*/
|
|
|
|
int run_plugin_auth(MYSQL *mysql, char *data, uint data_len,
|
|
const char *data_plugin, const char *db)
|
|
{
|
|
const char *auth_plugin_name;
|
|
auth_plugin_t *auth_plugin;
|
|
MCPVIO_EXT mpvio;
|
|
ulong pkt_length;
|
|
int res;
|
|
|
|
/* determine the default/initial plugin to use */
|
|
if (mysql->options.extension && mysql->options.extension->default_auth &&
|
|
mysql->server_capabilities & CLIENT_PLUGIN_AUTH)
|
|
{
|
|
auth_plugin_name= mysql->options.extension->default_auth;
|
|
if (!(auth_plugin= (auth_plugin_t*) mysql_client_find_plugin(mysql,
|
|
auth_plugin_name, MYSQL_CLIENT_AUTHENTICATION_PLUGIN)))
|
|
return 1; /* oops, not found */
|
|
}
|
|
else
|
|
{
|
|
auth_plugin= mysql->server_capabilities & CLIENT_PROTOCOL_41 ?
|
|
&native_password_client_plugin : &old_password_client_plugin;
|
|
auth_plugin_name= auth_plugin->name;
|
|
}
|
|
|
|
mysql->net.last_errno= 0; /* just in case */
|
|
|
|
if (data_plugin && strcmp(data_plugin, auth_plugin_name))
|
|
{
|
|
/* data was prepared for a different plugin, don't show it to this one */
|
|
data= 0;
|
|
data_len= 0;
|
|
}
|
|
|
|
mpvio.mysql_change_user= data_plugin == 0;
|
|
mpvio.cached_server_reply.pkt= (uchar*)data;
|
|
mpvio.cached_server_reply.pkt_len= data_len;
|
|
mpvio.read_packet= client_mpvio_read_packet;
|
|
mpvio.write_packet= client_mpvio_write_packet;
|
|
mpvio.info= client_mpvio_info;
|
|
mpvio.mysql= mysql;
|
|
mpvio.packets_read= mpvio.packets_written= 0;
|
|
mpvio.db= db;
|
|
mpvio.plugin= auth_plugin;
|
|
|
|
res= auth_plugin->authenticate_user((struct st_plugin_vio *)&mpvio, mysql);
|
|
|
|
compile_time_assert(CR_OK == -1);
|
|
compile_time_assert(CR_ERROR == 0);
|
|
if (res > CR_OK && mysql->net.read_pos[0] != 254)
|
|
{
|
|
/*
|
|
the plugin returned an error. write it down in mysql,
|
|
unless the error code is CR_ERROR and mysql->net.last_errno
|
|
is already set (the plugin has done it)
|
|
*/
|
|
if (res > CR_ERROR)
|
|
my_set_error(mysql, res, SQLSTATE_UNKNOWN, 0);
|
|
else
|
|
if (!mysql->net.last_errno)
|
|
my_set_error(mysql, CR_UNKNOWN_ERROR, SQLSTATE_UNKNOWN, 0);
|
|
return 1;
|
|
}
|
|
|
|
/* read the OK packet (or use the cached value in mysql->net.read_pos */
|
|
if (res == CR_OK)
|
|
pkt_length= net_safe_read(mysql);
|
|
else /* res == CR_OK_HANDSHAKE_COMPLETE */
|
|
pkt_length= mpvio.last_read_packet_len;
|
|
|
|
if (pkt_length == packet_error)
|
|
{
|
|
if (mysql->net.last_errno == CR_SERVER_LOST)
|
|
my_set_error(mysql, CR_SERVER_LOST, SQLSTATE_UNKNOWN,
|
|
ER(CR_SERVER_LOST_EXTENDED),
|
|
"reading authorization packet",
|
|
errno);
|
|
return 1;
|
|
}
|
|
|
|
if (mysql->net.read_pos[0] == 254)
|
|
{
|
|
/* The server asked to use a different authentication plugin */
|
|
if (pkt_length == 1)
|
|
{
|
|
/* old "use short scramble" packet */
|
|
auth_plugin_name= old_password_plugin_name;
|
|
mpvio.cached_server_reply.pkt= (uchar*)mysql->scramble_buff;
|
|
mpvio.cached_server_reply.pkt_len= SCRAMBLE_LENGTH + 1;
|
|
}
|
|
else
|
|
{
|
|
/* new "use different plugin" packet */
|
|
uint len;
|
|
auth_plugin_name= (char*)mysql->net.read_pos + 1;
|
|
len= strlen(auth_plugin_name); /* safe as my_net_read always appends \0 */
|
|
mpvio.cached_server_reply.pkt_len= pkt_length - len - 2;
|
|
mpvio.cached_server_reply.pkt= mysql->net.read_pos + len + 2;
|
|
}
|
|
|
|
if (!(auth_plugin= (auth_plugin_t *) mysql_client_find_plugin(mysql,
|
|
auth_plugin_name, MYSQL_CLIENT_AUTHENTICATION_PLUGIN)))
|
|
return 1;
|
|
|
|
mpvio.plugin= auth_plugin;
|
|
res= auth_plugin->authenticate_user((struct st_plugin_vio *)&mpvio, mysql);
|
|
|
|
if (res > CR_OK)
|
|
{
|
|
if (res > CR_ERROR)
|
|
my_set_error(mysql, res, SQLSTATE_UNKNOWN, 0);
|
|
else
|
|
if (!mysql->net.last_errno)
|
|
my_set_error(mysql, CR_UNKNOWN_ERROR, SQLSTATE_UNKNOWN, 0);
|
|
return 1;
|
|
}
|
|
|
|
if (res != CR_OK_HANDSHAKE_COMPLETE)
|
|
{
|
|
/* Read what server thinks about out new auth message report */
|
|
if (net_safe_read(mysql) == packet_error)
|
|
{
|
|
if (mysql->net.last_errno == CR_SERVER_LOST)
|
|
my_set_error(mysql, CR_SERVER_LOST, SQLSTATE_UNKNOWN,
|
|
ER(CR_SERVER_LOST_EXTENDED),
|
|
"reading final connect information",
|
|
errno);
|
|
return 1;
|
|
}
|
|
}
|
|
}
|
|
/*
|
|
net->read_pos[0] should always be 0 here if the server implements
|
|
the protocol correctly
|
|
*/
|
|
return mysql->net.read_pos[0] != 0;
|
|
}
|
|
|