sql-common/client.c (5,954 lines of code) (raw):
/* Copyright (c) 2003, 2016, Oracle and/or its affiliates. All rights reserved.
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; version 2 of the License.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */
/*
This file is included by both libmysql.c (the MySQL client C API)
and the mysqld server to connect to another MYSQL server.
The differences for the two cases are:
- Things that only works for the client:
- Trying to automaticly determinate user name if not supplied to
mysql_real_connect()
- Support for reading local file with LOAD DATA LOCAL
- SHARED memory handling
- Prepared statements
- Things that only works for the server
In all other cases, the code should be idential for the client and
server.
*/
#include <my_global.h>
#include "mysql.h"
#include "hash.h"
#include "mysql/client_authentication.h"
/* Remove client convenience wrappers */
#undef max_allowed_packet
#undef net_buffer_length
#ifdef EMBEDDED_LIBRARY
#undef MYSQL_SERVER
#ifndef MYSQL_CLIENT
#define MYSQL_CLIENT
#endif
#define CLI_MYSQL_REAL_CONNECT STDCALL cli_mysql_real_connect
#undef net_flush
my_bool net_flush(NET *net);
#else /*EMBEDDED_LIBRARY*/
#define CLI_MYSQL_REAL_CONNECT STDCALL mysql_real_connect
#endif /*EMBEDDED_LIBRARY*/
#include <my_sys.h>
#include <errno.h>
#include <sys/socket.h>
#include "my_default.h"
#include <mysys_err.h>
#include <m_string.h>
#include <m_ctype.h>
#include "mysql_version.h"
#include "mysqld_error.h"
#include "errmsg.h"
#include <violite.h>
#if defined(HAVE_OPENSSL) && !defined(EMBEDDED_LIBRARY)
#include <openssl/x509.h>
#include <openssl/x509v3.h>
#endif
#if !defined(__WIN__)
#include <my_pthread.h> /* because of signal() */
#endif /* !defined(__WIN__) */
#include <sys/stat.h>
#include <signal.h>
#include <time.h>
#ifdef HAVE_PWD_H
#include <pwd.h>
#endif
#if !defined(__WIN__)
#ifdef HAVE_SELECT_H
# include <select.h>
#endif
#ifdef HAVE_SYS_SELECT_H
# include <sys/select.h>
#endif
#endif /* !defined(__WIN__) */
#ifdef HAVE_SYS_UN_H
# include <sys/un.h>
#endif
#ifndef _WIN32
#include <errno.h>
#define SOCKET_ERROR -1
#endif
#include "client_settings.h"
#include <sql_common.h>
#include <mysql/client_plugin.h>
#define STATE_DATA(M) \
(NULL != (M) ? &(MYSQL_EXTENSION_PTR(M)->state_change) : NULL)
#define ADD_INFO(M, element, type) \
{ \
M= STATE_DATA(mysql); \
M->info_list[type].head_node= list_add(M->info_list[type].head_node, \
element); \
}
#define native_password_plugin_name "mysql_native_password"
#define old_password_plugin_name "mysql_old_password"
/* as defined in net_store_length */
#define MAX_VARIABLE_STRING_LENGTH 9
uint mysql_port=0;
char *mysql_unix_port= 0;
const char *unknown_sqlstate= "HY000";
const char *not_error_sqlstate= "00000";
const char *cant_connect_sqlstate= "08001";
#ifdef HAVE_SMEM
char *shared_memory_base_name= 0;
const char *def_shared_memory_base_name= default_shared_memory_base_name;
#endif
static void mysql_close_free_options(MYSQL *mysql);
static void mysql_close_free(MYSQL *mysql);
static void mysql_prune_stmt_list(MYSQL *mysql);
static void mysql_close_free_connect_context(MYSQL *mysql);
CHARSET_INFO *default_client_charset_info = &my_charset_latin1;
/* Server error code and message */
unsigned int mysql_server_last_errno;
char mysql_server_last_error[MYSQL_ERRMSG_SIZE];
/* forward declaration */
static int read_one_row(MYSQL *mysql,uint fields,MYSQL_ROW row, ulong *lengths);
/**
Convert the connect timeout option to a timeout value for VIO
functions (vio_socket_connect() and vio_io_wait()).
@param mysql Connection handle (client side).
@return The timeout value in milliseconds, or -1 if no timeout.
*/
static timeout_t get_vio_connect_timeout(MYSQL *mysql)
{
return mysql->options.connect_timeout;
}
#ifdef _WIN32
/**
Convert the connect timeout option to a timeout value for WIN32
synchronization functions.
@remark Specific for WIN32 connection methods shared memory and
named pipe.
@param mysql Connection handle (client side).
@return The timeout value in milliseconds, or INFINITE if no timeout.
*/
static DWORD get_win32_connect_timeout(MYSQL *mysql)
{
DWORD timeout_ms;
uint timeout_sec;
/*
A timeout of 0 means no timeout. Also, the connect_timeout
option value is in seconds, while WIN32 timeouts are in
milliseconds. Hence, check for a possible overflow. In case
of overflow, set to no timeout.
*/
timeout_sec= mysql->options.connect_timeout;
if (!timeout_sec || (timeout_sec > INT_MAX/1000))
timeout_ms= INFINITE;
else
timeout_ms= (DWORD) (timeout_sec * 1000);
return timeout_ms;
}
#endif
/**
Set the internal error message to mysql handler
@param mysql connection handle (client side)
@param errcode CR_ error code, passed to ER macro to get
error text
@parma sqlstate SQL standard sqlstate
*/
void set_mysql_error(MYSQL *mysql, int errcode, const char *sqlstate)
{
NET *net;
DBUG_ENTER("set_mysql_error");
DBUG_PRINT("enter", ("error :%d '%s'", errcode, ER(errcode)));
DBUG_ASSERT(mysql != 0);
if (mysql)
{
net= &mysql->net;
net->last_errno= errcode;
strmov(net->last_error, ER(errcode));
strmov(net->sqlstate, sqlstate);
}
else
{
mysql_server_last_errno= errcode;
strmov(mysql_server_last_error, ER(errcode));
}
DBUG_VOID_RETURN;
}
/**
Is this NET instance initialized?
@c my_net_init() and net_end()
*/
my_bool my_net_is_inited(NET *net)
{
return net->buff != NULL;
}
/**
Clear possible error state of struct NET
@param net clear the state of the argument
*/
void net_clear_error(NET *net)
{
net->last_errno= 0;
net->last_error[0]= '\0';
strmov(net->sqlstate, not_error_sqlstate);
}
/**
Set an error message on the client.
@param mysql connection handle
@param errcode CR_* errcode, for client errors
@param sqlstate SQL standard sql state, unknown_sqlstate for the
majority of client errors.
@param format error message template, in sprintf format
@param ... variable number of arguments
*/
void set_mysql_extended_error(MYSQL *mysql, int errcode,
const char *sqlstate,
const char *format, ...)
{
NET *net;
va_list args;
DBUG_ENTER("set_mysql_extended_error");
DBUG_PRINT("enter", ("error :%d '%s'", errcode, format));
DBUG_ASSERT(mysql != 0);
net= &mysql->net;
net->last_errno= errcode;
va_start(args, format);
my_vsnprintf(net->last_error, sizeof(net->last_error)-1,
format, args);
va_end(args);
strmov(net->sqlstate, sqlstate);
DBUG_VOID_RETURN;
}
/*
Create a named pipe connection
*/
#ifdef _WIN32
static HANDLE create_named_pipe(MYSQL *mysql, DWORD connect_timeout,
const char **arg_host,
const char **arg_unix_socket)
{
HANDLE hPipe=INVALID_HANDLE_VALUE;
char pipe_name[1024];
DWORD dwMode;
int i;
my_bool testing_named_pipes=0;
const char *host= *arg_host, *unix_socket= *arg_unix_socket;
if ( ! unix_socket || (unix_socket)[0] == 0x00)
unix_socket = mysql_unix_port;
if (!host || !strcmp(host,LOCAL_HOST))
host=LOCAL_HOST_NAMEDPIPE;
pipe_name[sizeof(pipe_name)-1]= 0; /* Safety if too long string */
strxnmov(pipe_name, sizeof(pipe_name)-1, "\\\\", host, "\\pipe\\",
unix_socket, NullS);
DBUG_PRINT("info",("Server name: '%s'. Named Pipe: %s", host, unix_socket));
for (i=0 ; i < 100 ; i++) /* Don't retry forever */
{
if ((hPipe = CreateFile(pipe_name,
FILE_READ_ATTRIBUTES | FILE_READ_DATA |
FILE_WRITE_ATTRIBUTES | FILE_WRITE_DATA,
0,
NULL,
OPEN_EXISTING,
FILE_FLAG_OVERLAPPED,
NULL )) != INVALID_HANDLE_VALUE)
break;
if (GetLastError() != ERROR_PIPE_BUSY)
{
set_mysql_extended_error(mysql, CR_NAMEDPIPEOPEN_ERROR,
unknown_sqlstate, ER(CR_NAMEDPIPEOPEN_ERROR),
host, unix_socket, (ulong) GetLastError());
return INVALID_HANDLE_VALUE;
}
/* wait for for an other instance */
if (!WaitNamedPipe(pipe_name, connect_timeout))
{
set_mysql_extended_error(mysql, CR_NAMEDPIPEWAIT_ERROR, unknown_sqlstate,
ER(CR_NAMEDPIPEWAIT_ERROR),
host, unix_socket, (ulong) GetLastError());
return INVALID_HANDLE_VALUE;
}
}
if (hPipe == INVALID_HANDLE_VALUE)
{
set_mysql_extended_error(mysql, CR_NAMEDPIPEOPEN_ERROR, unknown_sqlstate,
ER(CR_NAMEDPIPEOPEN_ERROR), host, unix_socket,
(ulong) GetLastError());
return INVALID_HANDLE_VALUE;
}
dwMode = PIPE_READMODE_BYTE | PIPE_WAIT;
if ( !SetNamedPipeHandleState(hPipe, &dwMode, NULL, NULL) )
{
CloseHandle( hPipe );
set_mysql_extended_error(mysql, CR_NAMEDPIPESETSTATE_ERROR,
unknown_sqlstate, ER(CR_NAMEDPIPESETSTATE_ERROR),
host, unix_socket, (ulong) GetLastError());
return INVALID_HANDLE_VALUE;
}
*arg_host=host ; *arg_unix_socket=unix_socket; /* connect arg */
return (hPipe);
}
#endif
/*
Create new shared memory connection, return handler of connection
@param mysql Pointer of mysql structure
@param net Pointer of net structure
@param connect_timeout Timeout of connection (in milliseconds)
@return HANDLE to the shared memory area.
*/
#ifdef HAVE_SMEM
static HANDLE create_shared_memory(MYSQL *mysql, NET *net,
DWORD connect_timeout)
{
ulong smem_buffer_length = shared_memory_buffer_length + 4;
/*
event_connect_request is event object for start connection actions
event_connect_answer is event object for confirm, that server put data
handle_connect_file_map is file-mapping object, use for create shared
memory
handle_connect_map is pointer on shared memory
handle_map is pointer on shared memory for client
event_server_wrote,
event_server_read,
event_client_wrote,
event_client_read are events for transfer data between server and client
handle_file_map is file-mapping object, use for create shared memory
*/
HANDLE event_connect_request = NULL;
HANDLE event_connect_answer = NULL;
HANDLE handle_connect_file_map = NULL;
char *handle_connect_map = NULL;
char *handle_map = NULL;
HANDLE event_server_wrote = NULL;
HANDLE event_server_read = NULL;
HANDLE event_client_wrote = NULL;
HANDLE event_client_read = NULL;
HANDLE event_conn_closed = NULL;
HANDLE handle_file_map = NULL;
ulong connect_number;
char connect_number_char[22], *p;
char *tmp= NULL;
char *suffix_pos;
DWORD error_allow = 0;
DWORD error_code = 0;
DWORD event_access_rights= SYNCHRONIZE | EVENT_MODIFY_STATE;
char *shared_memory_base_name = mysql->options.shared_memory_base_name;
static const char *name_prefixes[] = {"","Global\\"};
const char *prefix;
int i;
/*
If this is NULL, somebody freed the MYSQL* options. mysql_close()
is a good candidate. We don't just silently (re)set it to
def_shared_memory_base_name as that would create really confusing/buggy
behavior if the user passed in a different name on the command-line or
in a my.cnf.
*/
DBUG_ASSERT(shared_memory_base_name != NULL);
/*
get enough space base-name + '_' + longest suffix we might ever send
*/
if (!(tmp= (char *)my_malloc(strlen(shared_memory_base_name) + 32L, MYF(MY_FAE))))
goto err;
/*
The name of event and file-mapping events create agree next rule:
shared_memory_base_name+unique_part
Where:
shared_memory_base_name is unique value for each server
unique_part is uniquel value for each object (events and file-mapping)
*/
for (i = 0; i< array_elements(name_prefixes); i++)
{
prefix= name_prefixes[i];
suffix_pos = strxmov(tmp, prefix , shared_memory_base_name, "_", NullS);
strmov(suffix_pos, "CONNECT_REQUEST");
event_connect_request= OpenEvent(event_access_rights, FALSE, tmp);
if (event_connect_request)
{
break;
}
}
if (!event_connect_request)
{
error_allow = CR_SHARED_MEMORY_CONNECT_REQUEST_ERROR;
goto err;
}
strmov(suffix_pos, "CONNECT_ANSWER");
if (!(event_connect_answer= OpenEvent(event_access_rights,FALSE,tmp)))
{
error_allow = CR_SHARED_MEMORY_CONNECT_ANSWER_ERROR;
goto err;
}
strmov(suffix_pos, "CONNECT_DATA");
if (!(handle_connect_file_map= OpenFileMapping(FILE_MAP_WRITE,FALSE,tmp)))
{
error_allow = CR_SHARED_MEMORY_CONNECT_FILE_MAP_ERROR;
goto err;
}
if (!(handle_connect_map= MapViewOfFile(handle_connect_file_map,
FILE_MAP_WRITE,0,0,sizeof(DWORD))))
{
error_allow = CR_SHARED_MEMORY_CONNECT_MAP_ERROR;
goto err;
}
/* Send to server request of connection */
if (!SetEvent(event_connect_request))
{
error_allow = CR_SHARED_MEMORY_CONNECT_SET_ERROR;
goto err;
}
/* Wait of answer from server */
if (WaitForSingleObject(event_connect_answer, connect_timeout) !=
WAIT_OBJECT_0)
{
error_allow = CR_SHARED_MEMORY_CONNECT_ABANDONED_ERROR;
goto err;
}
/* Get number of connection */
connect_number = uint4korr(handle_connect_map);/*WAX2*/
p= int10_to_str(connect_number, connect_number_char, 10);
/*
The name of event and file-mapping events create agree next rule:
shared_memory_base_name+unique_part+number_of_connection
Where:
shared_memory_base_name is uniquel value for each server
unique_part is uniquel value for each object (events and file-mapping)
number_of_connection is number of connection between server and client
*/
suffix_pos = strxmov(tmp, prefix , shared_memory_base_name, "_", connect_number_char,
"_", NullS);
strmov(suffix_pos, "DATA");
if ((handle_file_map = OpenFileMapping(FILE_MAP_WRITE,FALSE,tmp)) == NULL)
{
error_allow = CR_SHARED_MEMORY_FILE_MAP_ERROR;
goto err2;
}
if ((handle_map = MapViewOfFile(handle_file_map,FILE_MAP_WRITE,0,0,
smem_buffer_length)) == NULL)
{
error_allow = CR_SHARED_MEMORY_MAP_ERROR;
goto err2;
}
strmov(suffix_pos, "SERVER_WROTE");
if ((event_server_wrote = OpenEvent(event_access_rights,FALSE,tmp)) == NULL)
{
error_allow = CR_SHARED_MEMORY_EVENT_ERROR;
goto err2;
}
strmov(suffix_pos, "SERVER_READ");
if ((event_server_read = OpenEvent(event_access_rights,FALSE,tmp)) == NULL)
{
error_allow = CR_SHARED_MEMORY_EVENT_ERROR;
goto err2;
}
strmov(suffix_pos, "CLIENT_WROTE");
if ((event_client_wrote = OpenEvent(event_access_rights,FALSE,tmp)) == NULL)
{
error_allow = CR_SHARED_MEMORY_EVENT_ERROR;
goto err2;
}
strmov(suffix_pos, "CLIENT_READ");
if ((event_client_read = OpenEvent(event_access_rights,FALSE,tmp)) == NULL)
{
error_allow = CR_SHARED_MEMORY_EVENT_ERROR;
goto err2;
}
strmov(suffix_pos, "CONNECTION_CLOSED");
if ((event_conn_closed = OpenEvent(event_access_rights,FALSE,tmp)) == NULL)
{
error_allow = CR_SHARED_MEMORY_EVENT_ERROR;
goto err2;
}
/*
Set event that server should send data
*/
SetEvent(event_server_read);
err2:
if (error_allow == 0)
{
net->vio= vio_new_win32shared_memory(handle_file_map,handle_map,
event_server_wrote,
event_server_read,event_client_wrote,
event_client_read,event_conn_closed);
}
else
{
error_code = GetLastError();
if (event_server_read)
CloseHandle(event_server_read);
if (event_server_wrote)
CloseHandle(event_server_wrote);
if (event_client_read)
CloseHandle(event_client_read);
if (event_client_wrote)
CloseHandle(event_client_wrote);
if (event_conn_closed)
CloseHandle(event_conn_closed);
if (handle_map)
UnmapViewOfFile(handle_map);
if (handle_file_map)
CloseHandle(handle_file_map);
}
err:
my_free(tmp);
if (error_allow)
error_code = GetLastError();
if (event_connect_request)
CloseHandle(event_connect_request);
if (event_connect_answer)
CloseHandle(event_connect_answer);
if (handle_connect_map)
UnmapViewOfFile(handle_connect_map);
if (handle_connect_file_map)
CloseHandle(handle_connect_file_map);
if (error_allow)
{
if (error_allow == CR_SHARED_MEMORY_EVENT_ERROR)
set_mysql_extended_error(mysql, error_allow, unknown_sqlstate,
ER(error_allow), suffix_pos, error_code);
else
set_mysql_extended_error(mysql, error_allow, unknown_sqlstate,
ER(error_allow), error_code);
return(INVALID_HANDLE_VALUE);
}
return(handle_map);
}
#endif
/*
Free all memory acquired to store state change information.
*/
void free_state_change_info(MYSQL_EXTENSION *ext)
{
STATE_INFO *info;
int i;
if (ext)
info= &ext->state_change;
else
return;
for (i= SESSION_TRACK_SYSTEM_VARIABLES; i <= SESSION_TRACK_END; i++)
{
if (list_length(info->info_list[i].head_node) != 0)
{
/*
Since nodes were multi-alloced, we don't need to free the data
separately. But the str member in data needs to be freed.
*/
LIST *tmp_list= info->info_list[i].head_node;
while (tmp_list)
{
LEX_STRING *tmp= (LEX_STRING *)(tmp_list)->data;
if (tmp->str)
my_free(tmp->str);
tmp_list= tmp_list->next;
}
list_free(info->info_list[i].head_node, (uint) 0);
}
}
memset(info, 0, sizeof(STATE_INFO));
}
static LIST* read_resp_attr_entry(uchar **pos)
{
LIST *element= NULL;
LEX_STRING *data= NULL;
if (!my_multi_malloc(MYF(0), &element, sizeof(LIST), &data,
sizeof(LEX_STRING), NullS))
{
return NULL;
}
/* Get the length of the data */
size_t len = (size_t) net_field_length(pos);
if (!(data->str = (char*) my_malloc(len, MYF(MY_WME))))
{
return NULL;
}
memcpy(data->str, *pos, len);
data->length= len;
*pos += len;
element->data= data;
return element;
}
static int read_resp_attrs(MYSQL *mysql, STATE_INFO *info, uchar **pos)
{
(void) net_field_length(pos); // Length is included so it can be skipped
size_t count = (size_t) net_field_length(pos);
LIST *element_key= NULL;
LIST *element_value= NULL;
// The response attributes come in key/value pairs
for (size_t ii = 0; ii < count; ii++)
{
element_key = read_resp_attr_entry(pos);
if (element_key == NULL)
{
return TRUE;
}
element_value = read_resp_attr_entry(pos);
if (element_value == NULL)
{
return TRUE;
}
// Add the value to the list first since the list gets reversed later
ADD_INFO(info, element_value, SESSION_TRACK_RESP_ATTR);
ADD_INFO(info, element_key, SESSION_TRACK_RESP_ATTR);
}
return FALSE;
}
/**
Read Ok packet along with the server state change information.
*/
void read_ok_ex(MYSQL *mysql, ulong length)
{
size_t total_len, len;
uchar *pos, *saved_pos;
my_ulonglong affected_rows, insert_id;
STATE_INFO *info= NULL;
enum enum_session_state_type type;
LIST *element= NULL;
LEX_STRING *data=NULL;
pos= mysql->net.read_pos + 1;
affected_rows = net_field_length_ll(&pos); /* affected rows */
insert_id = net_field_length_ll(&pos); /* insert id */
/*
The following check ensures that we skip the assignment for the
above read fields (i.e. affected_rows and insert_id) wherein the
EOF packets are deprecated and the server sends OK packet instead
with a packet header of 0xFE (254) to identify it as an EOF packet.
We ignore this assignment as the valid contents of EOF packet include
packet marker, server status and warning count only. However, we would
assign these values to the connection handle if it was an OK packet
with a packet header of 0x00.
*/
if (!((mysql->server_capabilities & CLIENT_DEPRECATE_EOF) &&
mysql->net.read_pos[0] == 254))
{
mysql->affected_rows= affected_rows;
mysql->insert_id= insert_id;
DBUG_PRINT("info",("affected_rows: %lu insert_id: %lu",
(ulong) mysql->affected_rows,
(ulong) mysql->insert_id));
}
/* server status */
mysql->server_status= uint2korr(pos);
pos += 2;
if (protocol_41(mysql))
{
mysql->warning_count=uint2korr(pos);
pos += 2;
} else
mysql->warning_count= 0; /* MySQL 4.0 protocol */
DBUG_PRINT("info",("status: %u warning_count: %u",
mysql->server_status, mysql->warning_count));
if (mysql->server_capabilities & CLIENT_SESSION_TRACK)
{
free_state_change_info(mysql->extension);
if (pos < mysql->net.read_pos + length)
{
/* get the info field */
size_t length_msg_member= (size_t)net_field_length(&pos);
mysql->info= (length_msg_member ? (char *)pos : NULL);
pos += (length_msg_member);
/* read session state changes info */
if (mysql->server_status & SERVER_SESSION_STATE_CHANGED)
{
saved_pos= pos;
total_len= (size_t)net_field_length(&pos);
/* ensure that mysql->info is zero-terminated */
if (mysql->info)
*saved_pos= 0;
while (total_len > 0)
{
saved_pos= pos;
type= (enum enum_session_state_type) net_field_length(&pos);
switch (type)
{
case SESSION_TRACK_GTIDS:
if (!my_multi_malloc(MYF(0),
&element, sizeof(LIST),
&data, sizeof(LEX_STRING),
NullS))
{
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
return;
}
/* Move past the total length of the changed entity. */
(void) net_field_length(&pos);
/* read (and ignore for now) the GTIDS encoding specification */
(void) net_field_length(&pos);
/*
For now we ignore the encoding specification, since only one
is supported. In the future the decoding of what comes next
depends on the specification code.
*/
/* read the length of the encoded string. */
len= (size_t) net_field_length(&pos);
if(!(data->str= (char *)my_malloc(len + 1, MYF(MY_WME))))
{
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
return;
}
memcpy(data->str, (char *) pos, len);
data->str[len] = '\0';
data->length= len;
pos += len;
element->data= data;
ADD_INFO(info, element, SESSION_TRACK_GTIDS);
break;
case SESSION_TRACK_STATE_CHANGE:
if (!my_multi_malloc(MYF(0),
&element, sizeof(LIST),
&data, sizeof(LEX_STRING),
NullS))
{
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
return;
}
/* Get the length of the boolean tracker */
len= (size_t) net_field_length(&pos);
/* length for boolean tracker is always 1 */
DBUG_ASSERT(len == 1);
if(!(data->str= (char *)my_malloc(len, MYF(MY_WME))))
{
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
return;
}
memcpy(data->str, (char *) pos, len);
data->length= len;
pos += len;
element->data= data;
ADD_INFO(info, element, SESSION_TRACK_STATE_CHANGE);
break;
case SESSION_TRACK_RESP_ATTR:
if (read_resp_attrs(mysql, info, &pos))
{
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
return;
}
break;
case SESSION_TRACK_SYSTEM_VARIABLES:
case SESSION_TRACK_SCHEMA:
case SESSION_TRACK_TRANSACTION_CHARACTERISTICS:
case SESSION_TRACK_TRANSACTION_STATE:
/* not backported */
default:
DBUG_ASSERT(type <= SESSION_TRACK_END);
/*
Unknown/unsupported type received, get the total length and move
past it.
*/
len= (size_t) net_field_length(&pos);
pos += len;
break;
}
total_len -= (pos - saved_pos);
}
if (info)
{
for (type= SESSION_TRACK_BEGIN; type < SESSION_TRACK_END; type++)
{
if (info->info_list[type].head_node)
{
info->info_list[type].current_node=
info->info_list[type].head_node=
list_reverse(info->info_list[type].head_node);
}
}
}
}
}
}
else if (pos < mysql->net.read_pos+length && net_field_length(&pos))
mysql->info=(char*) pos;
else
mysql->info=NULL;
return;
}
#ifdef HAVE_COMPRESS
/* Uncompresses the event inside @net in place */
ulong uncompress_event(NET* net, ulong len)
{
DBUG_ENTER("uncompress_event");
DBUG_ASSERT(net->compress_event);
DBUG_ASSERT(!(net->compress && net->compress_event));
DBUG_ASSERT(len > COMP_EVENT_HEADER_SIZE);
// NOTE: an extra byte containing a magic number before the compression
// header specifies if the packet contains a compressed event
// case: the first byte of a compressed event packet should always be
// COMP_EVENT_MAGIC_NUMBER
if (net->read_pos[0] != COMP_EVENT_MAGIC_NUMBER)
DBUG_RETURN(packet_error);
size_t pkt_len= len - COMP_EVENT_HEADER_SIZE;
size_t orig_len= uint3korr(net->read_pos + 1);
size_t buff_len= orig_len ? orig_len : pkt_len;
net->read_pos+= COMP_EVENT_HEADER_SIZE;
// case: not enough space in the buffer to store the uncompressed event
if (net->read_pos + buff_len > net->buff_end)
{
size_t read_pos_offset= net->read_pos - net->buff;
if (net_realloc(net, net->read_pos + buff_len - net->buff))
DBUG_RETURN(packet_error);
net->read_pos= net->buff + read_pos_offset;
}
if (my_uncompress(net, (uchar*) net->read_pos, pkt_len, &orig_len))
{
net->error= 2;
net->last_errno= ER_MASTER_FATAL_ERROR_READING_BINLOG;
DBUG_RETURN(packet_error);
}
DBUG_RETURN(buff_len);
}
#endif
/**
Read a packet from server. Give error message if socket was down
or packet is an error message
@param[IN] mysql connection handle
@param[IN] parse_ok if set to TRUE then parse OK packet
if it is received
@param[OUT] is_data_packet
if set to TRUE then packet received is
a "data packet", that is not OK or ERR
packet or EOF in case of old servers
@retval The length of the packet that was read or packet_error in
case of error. In case of error its description is stored
in mysql handle.
*/
ulong
cli_safe_read_with_ok(MYSQL *mysql, my_bool parse_ok,
my_bool *is_data_packet)
{
NET *net= &mysql->net;
ulong len=0;
if (net->vio != 0)
len=my_net_read(net);
return cli_safe_read_complete(mysql, len, parse_ok, is_data_packet);
}
net_async_status
cli_safe_read_with_ok_nonblocking(MYSQL *mysql, ulong* res, my_bool parse_ok,
my_bool *is_data_packet)
{
NET *net= &mysql->net;
ulong len=0, complen=0;
DBUG_ENTER(__func__);
if (net->async_multipacket_read_started == FALSE) {
net->async_multipacket_read_started = TRUE;
net->async_multipacket_read_saved_whereb = net->where_b;
net->async_multipacket_read_total_len = 0;
}
if (net->vio != 0) {
net_async_status status =
my_net_read_nonblocking(net, &len, &complen);
if (len != packet_error) {
net->async_multipacket_read_total_len += len;
net->where_b += len;
}
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
}
net->where_b = net->async_multipacket_read_saved_whereb;
if (!net->compress) {
net->read_pos = net->buff + net->where_b;
}
DBUG_PRINT("info", ("total nb read: %lu", net->async_multipacket_read_total_len));
*res = cli_safe_read_complete(mysql, net->async_multipacket_read_total_len,
parse_ok, is_data_packet);
net->async_multipacket_read_started = FALSE;
net->async_multipacket_read_saved_whereb = 0;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
/*
* Async MySQL Client does not have support for CLIENT_DEPRECATE_EOF
* implemented, so we are not setting it in the CLIENT_CAPABILITIES.
* This function checks if CLIENT_DEPRECATE_EOF was present in both
* server and client flags.
* */
my_bool client_deprecate_eof_enabled(MYSQL *mysql) {
return (mysql->server_capabilities & CLIENT_DEPRECATE_EOF) &&
(mysql->client_flag & CLIENT_DEPRECATE_EOF);
}
ulong cli_safe_read_complete(MYSQL *mysql, ulong len,
my_bool parse_ok, my_bool *is_data_packet)
{
NET *net= &mysql->net;
DBUG_ENTER(__func__);
if (is_data_packet)
*is_data_packet= FALSE;
if (len == packet_error || len == 0)
{
int errcode = CR_SERVER_LOST;
DBUG_PRINT("error",("Wrong connection or packet. fd: %s len: %lu",
vio_description(net->vio),len));
#ifdef MYSQL_SERVER
if (net->vio && (net->last_errno == ER_NET_READ_INTERRUPTED))
DBUG_RETURN((packet_error));
#endif /*MYSQL_SERVER*/
end_server(mysql);
if (net->last_errno == ER_NET_PACKET_TOO_LARGE) {
errcode = CR_NET_PACKET_TOO_LARGE;
} else if (net->last_errno == ER_NET_READ_INTERRUPTED) {
errcode = CR_NET_READ_INTERRUPTED;
} else if (net->last_errno == CR_NET_WRITE_INTERRUPTED) {
errcode = CR_NET_WRITE_INTERRUPTED;
}
set_mysql_error(mysql, errcode, unknown_sqlstate);
DBUG_RETURN((packet_error));
}
// case: this packet contains a compressed event
if (net->read_pos[0] == COMP_EVENT_MAGIC_NUMBER)
{
if (is_data_packet)
*is_data_packet= TRUE;
DBUG_RETURN(len);
}
if (net->read_pos[0] == 255)
{
if (len > 3)
{
char *pos=(char*) net->read_pos+1;
net->last_errno=uint2korr(pos);
pos+=2;
len-=2;
if (protocol_41(mysql) && pos[0] == '#')
{
strmake(net->sqlstate, pos+1, SQLSTATE_LENGTH);
pos+= SQLSTATE_LENGTH+1;
}
else
{
/*
The SQL state hasn't been received -- it should be reset to HY000
(unknown error sql state).
*/
strmov(net->sqlstate, unknown_sqlstate);
}
(void) strmake(net->last_error,(char*) pos,
MY_MIN((uint) len,(uint) sizeof(net->last_error)-1));
}
else
set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate);
/*
Cover a protocol design error: error packet does not
contain the server status. Therefore, the client has no way
to find out whether there are more result sets of
a multiple-result-set statement pending. Luckily, in 5.0 an
error always aborts execution of a statement, wherever it is
a multi-statement or a stored procedure, so it should be
safe to unconditionally turn off the flag here.
*/
mysql->server_status&= ~SERVER_MORE_RESULTS_EXISTS;
DBUG_PRINT("error",("Got error: %d/%s (%s)",
net->last_errno,
net->sqlstate,
net->last_error));
DBUG_RETURN(packet_error);
}
else
{
/* if it is OK packet irrespective of new/old server */
if (net->read_pos[0] == 0)
{
if (parse_ok)
{
read_ok_ex(mysql, len);
DBUG_RETURN(len);
}
}
/*
Now we have a data packet, unless it is OK packet starting with
0xFE - we detect that case below.
*/
if (is_data_packet)
*is_data_packet= TRUE;
/*
For a packet starting with 0xFE detect if it is OK packet or a
huge data packet. Note that old servers do not send OK packets
starting with 0xFE.
*/
if (client_deprecate_eof_enabled(mysql) &&
(net->read_pos[0] == 254))
{
/* detect huge data packet */
if (len > MAX_PACKET_LENGTH)
DBUG_RETURN(len);
/* otherwise we have OK packet starting with 0xFE */
if (is_data_packet)
*is_data_packet= FALSE;
/* parse it if requested */
if (parse_ok)
read_ok_ex(mysql, len);
DBUG_RETURN(len);
}
/* for old client detect EOF packet */
if (!client_deprecate_eof_enabled(mysql) &&
(net->read_pos[0] == 254) && (len < 8))
{
if (is_data_packet)
*is_data_packet= FALSE;
}
}
DBUG_RETURN(len);
}
/**
Read a packet from server. Give error message if connection was broken or
ERR packet was received. Detect if the packet received was an OK, ERR or
something else (a "data packet").
@param[IN] mysql connection handle
@param[OUT] is_data_packet
if set to TRUE then the packet received
was a "data packet".
@retval The length of the packet that was read or packet_error in case of
error. In case of error its description is stored in mysql handle.
*/
ulong STDCALL cli_safe_read(MYSQL *mysql, my_bool *is_data_packet)
{
return cli_safe_read_with_ok(mysql, 0, is_data_packet);
}
net_async_status STDCALL
cli_safe_read_nonblocking(MYSQL *mysql, ulong* res,
my_bool *is_data_packet)
{
return cli_safe_read_with_ok_nonblocking(mysql, res, 0, is_data_packet);
}
void free_rows(MYSQL_DATA *cur)
{
if (cur)
{
free_root(&cur->alloc,MYF(0));
my_free(cur);
}
}
my_bool
cli_advanced_command(MYSQL *mysql, enum enum_server_command command,
const uchar *header, ulong header_length,
const uchar *arg, ulong arg_length, my_bool skip_check,
MYSQL_STMT *stmt)
{
NET *net= &mysql->net;
my_bool result= 1;
my_bool stmt_skip= stmt ? stmt->state != MYSQL_STMT_INIT_DONE : FALSE;
DBUG_ENTER(__func__);
DBUG_DUMP("sending", header, header_length);
if (arg && arg_length)
DBUG_DUMP("sending arg", arg, arg_length);
if (net->vio == 0)
{ /* Do reconnect if possible */
if (mysql_reconnect(mysql) || stmt_skip)
DBUG_RETURN(1);
}
// Set blocking mode except if ssl is involved
if (!(mysql->client_flag & CLIENT_SSL))
{
vio_set_blocking(net->vio, TRUE);
}
if (mysql->status != MYSQL_STATUS_READY ||
mysql->server_status & SERVER_MORE_RESULTS_EXISTS)
{
DBUG_PRINT("error",("state: %d", mysql->status));
set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate);
DBUG_RETURN(1);
}
net_clear_error(net);
mysql->info=0;
mysql->affected_rows= ~(my_ulonglong) 0;
/*
Do not check the socket/protocol buffer on COM_QUIT as the
result of a previous command might not have been read. This
can happen if a client sends a query but does not reap the
result before attempting to close the connection.
*/
net_clear(&mysql->net, (command != COM_QUIT));
#if !defined(EMBEDDED_LIBRARY)
/*
If auto-reconnect mode is enabled check if connection is still alive before
sending new command. Otherwise, send() might not notice that connection was
closed by the server (for example, due to KILL statement), and the fact that
connection is gone will be noticed only on attempt to read command's result,
when it is too late to reconnect. Note that such scenario can still occur if
connection gets killed after this check but before command is sent to
server. But this should be rare.
*/
if ((command != COM_QUIT) && mysql->reconnect && !vio_is_connected(net->vio))
net->error= 2;
#endif
if (net_write_command(net,(uchar) command, header, header_length,
arg, arg_length))
{
DBUG_PRINT("error",("Can't send command to server. Error: %d",
socket_errno));
if (net->last_errno == ER_NET_PACKET_TOO_LARGE)
{
set_mysql_error(mysql, CR_NET_PACKET_TOO_LARGE, unknown_sqlstate);
goto end;
}
end_server(mysql);
if (mysql_reconnect(mysql) || stmt_skip)
goto end;
if (net_write_command(net,(uchar) command, header, header_length,
arg, arg_length))
{
set_mysql_error(mysql, CR_SERVER_GONE_ERROR, unknown_sqlstate);
goto end;
}
}
result=0;
if (!skip_check)
result= ((mysql->packet_length=cli_safe_read_with_ok(mysql, 1, NULL)) ==
packet_error ? 1 : 0);
end:
DBUG_PRINT("exit",("result: %d", result));
DBUG_RETURN(result);
}
net_async_status
cli_advanced_command_nonblocking(MYSQL *mysql, enum enum_server_command command,
const uchar *header, ulong header_length,
const uchar *arg, ulong arg_length,
my_bool skip_check, MYSQL_STMT *stmt,
my_bool* ret)
{
NET *net= &mysql->net;
my_bool result= 1;
*ret = result;
my_bool stmt_skip= stmt ? stmt->state != MYSQL_STMT_INIT_DONE : FALSE;
DBUG_ENTER(__func__);
DBUG_DUMP("sending", header, header_length);
if (arg && arg_length)
DBUG_DUMP("sending arg", arg, arg_length);
if (net->async_send_command_status == NET_ASYNC_SEND_COMMAND_IDLE) {
if (mysql->net.vio == 0)
{
set_mysql_error(mysql, CR_SERVER_GONE_ERROR, unknown_sqlstate);
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
vio_set_blocking(net->vio, FALSE);
if (mysql->status != MYSQL_STATUS_READY ||
mysql->server_status & SERVER_MORE_RESULTS_EXISTS)
{
DBUG_PRINT("error",("state: %d", mysql->status));
set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate);
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
net_clear_error(net);
mysql->info=0;
mysql->affected_rows= ~(my_ulonglong) 0;
/*
Do not check the socket/protocol buffer on COM_QUIT as the
result of a previous command might not have been read. This
can happen if a client sends a query but does not reap the
result before attempting to close the connection.
*/
if (command <= COM_END || command > COM_TOP_END) {
net_clear(&mysql->net, (command != COM_QUIT));
}
net->async_send_command_status = NET_ASYNC_SEND_COMMAND_WRITE_COMMAND;
}
if (net->async_send_command_status == NET_ASYNC_SEND_COMMAND_WRITE_COMMAND) {
my_bool err;
net_async_status status =
net_write_command_nonblocking(net,(uchar) command, header, header_length,
arg, arg_length, &err);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
if (err) {
DBUG_PRINT("error",("Can't send command to server. Error: %d",
socket_errno));
if (net->last_errno == ER_NET_PACKET_TOO_LARGE)
{
set_mysql_error(mysql, CR_NET_PACKET_TOO_LARGE, unknown_sqlstate);
goto end;
}
end_server(mysql);
if (stmt_skip)
goto end;
set_mysql_error(mysql, CR_SERVER_GONE_ERROR, unknown_sqlstate);
goto end;
}
if (skip_check) {
result = 0;
goto end;
} else {
net->async_send_command_status = NET_ASYNC_SEND_COMMAND_READ_STATUS;
}
}
if (net->async_send_command_status == NET_ASYNC_SEND_COMMAND_READ_STATUS) {
ulong pkt_len;
net_async_status status = cli_safe_read_with_ok_nonblocking(mysql,
&pkt_len, 1, NULL);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
mysql->packet_length = pkt_len;
result= (pkt_len == packet_error ? 1 : 0);
}
end:
net->async_send_command_status = NET_ASYNC_SEND_COMMAND_IDLE;
DBUG_PRINT("exit",("result: %d", result));
*ret = result;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
void free_old_query(MYSQL *mysql)
{
DBUG_ENTER("free_old_query");
if (mysql->fields)
free_root(&mysql->field_alloc,MYF(0));
init_alloc_root(&mysql->field_alloc,8192,0); /* Assume rowlength < 8192 */
mysql->fields= 0;
mysql->field_count= 0; /* For API */
mysql->warning_count= 0;
mysql->info= 0;
DBUG_VOID_RETURN;
}
/**
Finish reading of a partial result set from the server.
Get the EOF packet, and update mysql->status
and mysql->warning_count.
@return TRUE if a communication or protocol error, an error
is set in this case, FALSE otherwise.
*/
my_bool flush_one_result(MYSQL *mysql)
{
ulong packet_length;
my_bool is_data_packet;
DBUG_ASSERT(mysql->status != MYSQL_STATUS_READY);
do
{
packet_length= cli_safe_read(mysql, &is_data_packet);
/*
There is an error reading from the connection,
or (sic!) there were no error and no
data in the stream, i.e. no more data from the server.
Since we know our position in the stream (somewhere in
the middle of a result set), this latter case is an error too
-- each result set must end with a EOF packet.
cli_safe_read() has set an error for us, just return.
*/
if (packet_length == packet_error)
return TRUE;
}
while (mysql->net.read_pos[0] == 0 || is_data_packet);
/* Analyse final OK packet (EOF packet if it is old client) */
if (protocol_41(mysql))
{
char *pos= (char*) mysql->net.read_pos + 1;
if (client_deprecate_eof_enabled(mysql) &&
!is_data_packet)
read_ok_ex(mysql, packet_length);
else
{
mysql->warning_count= uint2korr(pos);
pos+=2;
mysql->server_status=uint2korr(pos);
}
pos+=2;
}
return FALSE;
}
/**
Read a packet from network. If it's an OK packet, flush it.
@return TRUE if error, FALSE otherwise. In case of
success, is_ok_packet is set to TRUE or FALSE,
based on what we got from network.
*/
my_bool opt_flush_ok_packet(MYSQL *mysql, my_bool *is_ok_packet)
{
my_bool is_data_packet;
ulong packet_length= cli_safe_read(mysql, &is_data_packet);
if (packet_length == packet_error)
return TRUE;
/* cli_safe_read always reads a non-empty packet. */
DBUG_ASSERT(packet_length);
*is_ok_packet= ((mysql->net.read_pos[0] == 0) ||
(client_deprecate_eof_enabled(mysql) &&
mysql->net.read_pos[0] == 254 &&
packet_length < MAX_PACKET_LENGTH));
if (*is_ok_packet)
{
read_ok_ex(mysql, packet_length);
}
return FALSE;
}
/*
Flush result set sent from server
*/
static void cli_flush_use_result(MYSQL *mysql, my_bool flush_all_results)
{
/* Clear the current execution status */
DBUG_ENTER("cli_flush_use_result");
DBUG_PRINT("warning",("Not all packets read, clearing them"));
if (flush_one_result(mysql))
DBUG_VOID_RETURN; /* An error occurred */
if (! flush_all_results)
DBUG_VOID_RETURN;
while (mysql->server_status & SERVER_MORE_RESULTS_EXISTS)
{
my_bool is_ok_packet;
if (opt_flush_ok_packet(mysql, &is_ok_packet))
DBUG_VOID_RETURN; /* An error occurred. */
if (is_ok_packet)
{
/*
Indeed what we got from network was an OK packet, and we
know that OK is the last one in a multi-result-set, so
just return.
*/
DBUG_VOID_RETURN;
}
/*
It's a result set, not an OK packet. A result set contains
of two result set subsequences: field metadata, terminated
with EOF packet, and result set data, again terminated with
EOF packet. Read and flush them.
*/
if (!client_deprecate_eof_enabled(mysql))
{
if (flush_one_result(mysql))
DBUG_VOID_RETURN; /* An error occurred. */
}
else
{
if ((mysql->fields= cli_read_metadata(mysql,
mysql->net.read_pos[0], protocol_41(mysql) ? 7:5)))
free_root(&mysql->field_alloc,MYF(0));
else
DBUG_VOID_RETURN;
}
if (flush_one_result(mysql))
DBUG_VOID_RETURN;
}
DBUG_VOID_RETURN;
}
static net_async_status
cli_flush_use_result_nonblocking(MYSQL *mysql)
{
my_bool is_data_packet;
DBUG_ENTER(__func__);
while(1)
{
ulong pkt_len;
if (cli_safe_read_nonblocking(mysql, &pkt_len,
&is_data_packet) == NET_ASYNC_NOT_READY)
{
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
mysql->packet_length = pkt_len;
if (pkt_len == packet_error)
break;
if (pkt_len <= 8 && mysql->net.read_pos[0] == 254)
{
if (protocol_41(mysql))
{
char *pos = (char*) mysql->net.read_pos + 1;
mysql->warning_count = uint2korr(pos); pos += 2;
mysql->server_status = uint2korr(pos); pos += 2;
}
break;
}
}
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
#ifdef __WIN__
static my_bool is_NT(void)
{
char *os=getenv("OS");
return (os && !strcmp(os, "Windows_NT")) ? 1 : 0;
}
#endif
#ifdef CHECK_LICENSE
/**
Check server side variable 'license'.
If the variable does not exist or does not contain 'Commercial',
we're talking to non-commercial server from commercial client.
@retval 0 success
@retval !0 network error or the server is not commercial.
Error code is saved in mysql->net.last_errno.
*/
static int check_license(MYSQL *mysql)
{
MYSQL_ROW row;
MYSQL_RES *res;
NET *net= &mysql->net;
static const char query[]= "SELECT @@license";
static const char required_license[]= STRINGIFY_ARG(LICENSE);
if (mysql_real_query(mysql, query, sizeof(query)-1))
{
if (net->last_errno == ER_UNKNOWN_SYSTEM_VARIABLE)
{
set_mysql_extended_error(mysql, CR_WRONG_LICENSE, unknown_sqlstate,
ER(CR_WRONG_LICENSE), required_license);
}
return 1;
}
if (!(res= mysql_use_result(mysql)))
return 1;
row= mysql_fetch_row(res);
/*
If no rows in result set, or column value is NULL (none of these
two is ever true for server variables now), or column value
mismatch, set wrong license error.
*/
if (!net->last_errno &&
(!row || !row[0] ||
strncmp(row[0], required_license, sizeof(required_license))))
{
set_mysql_extended_error(mysql, CR_WRONG_LICENSE, unknown_sqlstate,
ER(CR_WRONG_LICENSE), required_license);
}
mysql_free_result(res);
return net->last_errno;
}
#endif /* CHECK_LICENSE */
/**************************************************************************
Shut down connection
**************************************************************************/
void end_server(MYSQL *mysql)
{
int save_errno= errno;
DBUG_ENTER("end_server");
if (mysql->net.vio != 0)
{
DBUG_PRINT("info",("Net: %s", vio_description(mysql->net.vio)));
#ifdef MYSQL_SERVER
slave_io_thread_detach_vio();
#endif
vio_delete(mysql->net.vio);
mysql->net.vio= 0; /* Marker */
mysql_prune_stmt_list(mysql);
}
net_end(&mysql->net);
free_old_query(mysql);
errno= save_errno;
DBUG_VOID_RETURN;
}
void STDCALL
mysql_free_result(MYSQL_RES *result)
{
DBUG_ENTER("mysql_free_result");
DBUG_PRINT("enter",("mysql_res: 0x%lx", (long) result));
if (result)
{
MYSQL *mysql= result->handle;
if (mysql)
{
if (mysql->unbuffered_fetch_owner == &result->unbuffered_fetch_cancelled)
mysql->unbuffered_fetch_owner= 0;
if (mysql->status == MYSQL_STATUS_USE_RESULT)
{
(*mysql->methods->flush_use_result)(mysql, FALSE);
mysql->status=MYSQL_STATUS_READY;
if (mysql->unbuffered_fetch_owner)
*mysql->unbuffered_fetch_owner= TRUE;
}
}
free_rows(result->data);
if (result->fields)
free_root(&result->field_alloc,MYF(0));
my_free(result->row);
my_free(result);
}
DBUG_VOID_RETURN;
}
net_async_status STDCALL
mysql_free_result_nonblocking(MYSQL_RES *result)
{
MYSQL *mysql = result->handle;
if (!result)
return NET_ASYNC_COMPLETE;
if (mysql)
{
if (mysql->unbuffered_fetch_owner == &result->unbuffered_fetch_cancelled)
mysql->unbuffered_fetch_owner= 0;
if (mysql->status == MYSQL_STATUS_USE_RESULT)
{
if (mysql->methods->flush_use_result_nonblocking(mysql) ==
NET_ASYNC_NOT_READY) {
return NET_ASYNC_NOT_READY;
}
mysql->status=MYSQL_STATUS_READY;
if (mysql->unbuffered_fetch_owner)
*mysql->unbuffered_fetch_owner= TRUE;
}
}
free_rows(result->data);
if (result->fields)
free_root(&result->field_alloc,MYF(0));
my_free(result->row);
my_free(result);
return NET_ASYNC_COMPLETE;
}
/****************************************************************************
Get options from my.cnf
****************************************************************************/
static const char *default_options[]=
{
"port","socket","compress","password","pipe", "timeout", "user",
"init-command", "host", "database", "debug", "return-found-rows",
"ssl-key" ,"ssl-cert" ,"ssl-ca" ,"ssl-capath",
"character-sets-dir", "default-character-set", "interactive-timeout",
"connect-timeout", "local-infile", "disable-local-infile",
"ssl-cipher", "max-allowed-packet", "protocol", "shared-memory-base-name",
"multi-results", "multi-statements", "multi-queries", "secure-auth",
"report-data-truncation", "plugin-dir", "default-auth",
"bind-address", "ssl-crl", "ssl-crlpath", "enable-cleartext-plugin",
"compress_event",
NullS
};
enum option_id {
OPT_port=1, OPT_socket, OPT_compress, OPT_password, OPT_pipe, OPT_timeout, OPT_user,
OPT_init_command, OPT_host, OPT_database, OPT_debug, OPT_return_found_rows,
OPT_ssl_key, OPT_ssl_cert, OPT_ssl_ca, OPT_ssl_capath,
OPT_character_sets_dir, OPT_default_character_set, OPT_interactive_timeout,
OPT_connect_timeout, OPT_local_infile, OPT_disable_local_infile,
OPT_ssl_cipher, OPT_max_allowed_packet, OPT_protocol, OPT_shared_memory_base_name,
OPT_multi_results, OPT_multi_statements, OPT_multi_queries, OPT_secure_auth,
OPT_report_data_truncation, OPT_plugin_dir, OPT_default_auth,
OPT_bind_address, OPT_ssl_crl, OPT_ssl_crlpath, OPT_enable_cleartext_plugin,
OPT_compress_event,
OPT_keep_this_one_last
};
static TYPELIB option_types={array_elements(default_options)-1,
"options",default_options, NULL};
const char *sql_protocol_names_lib[] =
{ "TCP", "SOCKET", "PIPE", "MEMORY", NullS };
TYPELIB sql_protocol_typelib = {array_elements(sql_protocol_names_lib)-1,"",
sql_protocol_names_lib, NULL};
static int add_init_command(struct st_mysql_options *options, const char *cmd)
{
char *tmp;
if (!options->init_commands)
{
options->init_commands= (DYNAMIC_ARRAY*)my_malloc(sizeof(DYNAMIC_ARRAY),
MYF(MY_WME));
init_dynamic_array(options->init_commands,sizeof(char*),0,5);
}
if (!(tmp= my_strdup(cmd,MYF(MY_WME))) ||
insert_dynamic(options->init_commands, &tmp))
{
my_free(tmp);
return 1;
}
return 0;
}
#define ALLOCATE_EXTENSIONS(OPTS) \
(OPTS)->extension= (struct st_mysql_options_extention *) \
my_malloc(sizeof(struct st_mysql_options_extention), \
MYF(MY_WME | MY_ZEROFILL)) \
#define ENSURE_EXTENSIONS_PRESENT(OPTS) \
do { \
if (!(OPTS)->extension) \
ALLOCATE_EXTENSIONS(OPTS); \
} while (0)
#define EXTENSION_SET_STRING(OPTS, X, STR) \
do { \
if ((OPTS)->extension) \
my_free((OPTS)->extension->X); \
else \
ALLOCATE_EXTENSIONS(OPTS); \
(OPTS)->extension->X= ((STR) != NULL) ? \
my_strdup((STR), MYF(MY_WME)) : NULL; \
} while (0)
#if defined(HAVE_OPENSSL) && !defined(EMBEDDED_LIBRARY)
#define SET_SSL_OPTION(opt_var,arg) \
if (mysql->options.opt_var) \
my_free(mysql->options.opt_var); \
mysql->options.opt_var= arg ? my_strdup(arg, MYF(MY_WME)) : NULL; \
if (mysql->options.opt_var) \
mysql->options.use_ssl= 1
#define EXTENSION_SET_SSL_STRING(OPTS, X, STR) \
EXTENSION_SET_STRING(OPTS, X, STR); \
if ((OPTS)->extension->X) \
(OPTS)->use_ssl= 1
#else
#define SET_SSL_OPTION(opt_var,arg) \
do { \
; \
} while(0)
#define EXTENSION_SET_SSL_STRING(OPTS, X, STR) \
do { \
; \
} while(0)
#endif
static char *set_ssl_option_unpack_path(struct st_mysql_options *options,
const char *arg)
{
char *opt_var= NULL;
if (arg)
{
char *buff= (char *)my_malloc(FN_REFLEN + 1, MYF(MY_WME));
unpack_filename(buff, (char *)arg);
opt_var= my_strdup(buff, MYF(MY_WME));
options->use_ssl= 1;
my_free(buff);
}
return opt_var;
}
/* Hack to convert 0 timeouts to infinite timeouts; we need value_ms_
to always be accurate, so we convert any zero passed to us via
mysql_options into infinite timeouts. Used here and in
mysql_options.*/
static void fixup_zero_timeout(timeout_t *t) {
if (t->value_ms_ == 0) {
*t = timeout_infinite();
}
}
void mysql_read_default_options(struct st_mysql_options *options,
const char *filename,const char *group)
{
int argc;
char *argv_buff[1],**argv;
const char *groups[3];
DBUG_ENTER("mysql_read_default_options");
DBUG_PRINT("enter",("file: %s group: %s",filename,group ? group :"NULL"));
compile_time_assert(OPT_keep_this_one_last ==
array_elements(default_options));
argc=1; argv=argv_buff; argv_buff[0]= (char*) "client";
groups[0]= (char*) "client"; groups[1]= (char*) group; groups[2]=0;
my_load_defaults(filename, groups, &argc, &argv, NULL);
if (argc != 1) /* If some default option */
{
char **option=argv;
while (*++option)
{
if (my_getopt_is_args_separator(option[0])) /* skip arguments separator */
continue;
/* DBUG_PRINT("info",("option: %s",option[0])); */
if (option[0][0] == '-' && option[0][1] == '-')
{
char *end=strcend(*option,'=');
char *opt_arg=0;
if (*end)
{
opt_arg=end+1;
*end=0; /* Remove '=' */
}
/* Change all '_' in variable name to '-' */
for (end= *option ; *(end= strcend(end,'_')) ; )
*end= '-';
switch (find_type(*option + 2, &option_types, FIND_TYPE_BASIC)) {
case OPT_port:
if (opt_arg)
options->port=atoi(opt_arg);
break;
case OPT_socket:
if (opt_arg)
{
my_free(options->unix_socket);
options->unix_socket=my_strdup(opt_arg,MYF(MY_WME));
}
break;
case OPT_compress:
options->compress=1;
options->client_flag|= CLIENT_COMPRESS;
break;
case OPT_compress_event:
options->compress_event= 1;
options->client_flag|= CLIENT_COMPRESS_EVENT;
// we disable packet compression if event compression is enabled
options->compress= 0;
options->client_flag&= ~CLIENT_COMPRESS;
break;
case OPT_password:
if (opt_arg)
{
my_free(options->password);
options->password=my_strdup(opt_arg,MYF(MY_WME));
}
break;
case OPT_pipe:
options->protocol = MYSQL_PROTOCOL_PIPE;
case OPT_connect_timeout:
case OPT_timeout:
if (opt_arg) {
options->connect_timeout = timeout_from_seconds(atoi(opt_arg));
fixup_zero_timeout(&options->connect_timeout);
}
break;
case OPT_user:
if (opt_arg)
{
my_free(options->user);
options->user=my_strdup(opt_arg,MYF(MY_WME));
}
break;
case OPT_init_command:
add_init_command(options,opt_arg);
break;
case OPT_host:
if (opt_arg)
{
my_free(options->host);
options->host=my_strdup(opt_arg,MYF(MY_WME));
}
break;
case OPT_database:
if (opt_arg)
{
my_free(options->db);
options->db=my_strdup(opt_arg,MYF(MY_WME));
}
break;
case OPT_debug:
#ifdef MYSQL_CLIENT
mysql_debug(opt_arg ? opt_arg : "d:t:o,/tmp/client.trace");
break;
#endif
case OPT_return_found_rows:
options->client_flag|=CLIENT_FOUND_ROWS;
break;
#if defined(HAVE_OPENSSL) && !defined(EMBEDDED_LIBRARY)
case OPT_ssl_key:
my_free(options->ssl_key);
options->ssl_key = my_strdup(opt_arg, MYF(MY_WME));
break;
case OPT_ssl_cert:
my_free(options->ssl_cert);
options->ssl_cert = my_strdup(opt_arg, MYF(MY_WME));
break;
case OPT_ssl_ca:
my_free(options->ssl_ca);
options->ssl_ca = my_strdup(opt_arg, MYF(MY_WME));
break;
case OPT_ssl_capath:
my_free(options->ssl_capath);
options->ssl_capath = my_strdup(opt_arg, MYF(MY_WME));
break;
case OPT_ssl_cipher:
my_free(options->ssl_cipher);
options->ssl_cipher= my_strdup(opt_arg, MYF(MY_WME));
break;
case OPT_ssl_crl:
EXTENSION_SET_SSL_STRING(options, ssl_crl, opt_arg);
break;
case OPT_ssl_crlpath:
EXTENSION_SET_SSL_STRING(options, ssl_crlpath, opt_arg);
break;
#else
case OPT_ssl_key:
case OPT_ssl_cert:
case OPT_ssl_ca:
case OPT_ssl_capath:
case OPT_ssl_cipher:
case OPT_ssl_crl:
case OPT_ssl_crlpath:
break;
#endif /* HAVE_OPENSSL && !EMBEDDED_LIBRARY */
case OPT_character_sets_dir:
my_free(options->charset_dir);
options->charset_dir = my_strdup(opt_arg, MYF(MY_WME));
break;
case OPT_default_character_set:
my_free(options->charset_name);
options->charset_name = my_strdup(opt_arg, MYF(MY_WME));
break;
case OPT_interactive_timeout:
options->client_flag|= CLIENT_INTERACTIVE;
break;
case OPT_local_infile:
if (!opt_arg || atoi(opt_arg) != 0)
options->client_flag|= CLIENT_LOCAL_FILES;
else
options->client_flag&= ~CLIENT_LOCAL_FILES;
break;
case OPT_disable_local_infile:
options->client_flag&= ~CLIENT_LOCAL_FILES;
break;
case OPT_max_allowed_packet:
if (opt_arg)
options->max_allowed_packet= atoi(opt_arg);
break;
case OPT_protocol:
if ((options->protocol= find_type(opt_arg, &sql_protocol_typelib,
FIND_TYPE_BASIC)) <= 0)
{
fprintf(stderr, "Unknown option to protocol: %s\n", opt_arg);
exit(1);
}
break;
case OPT_shared_memory_base_name:
#ifdef HAVE_SMEM
if (options->shared_memory_base_name != def_shared_memory_base_name)
my_free(options->shared_memory_base_name);
options->shared_memory_base_name=my_strdup(opt_arg,MYF(MY_WME));
#endif
break;
case OPT_multi_results:
options->client_flag|= CLIENT_MULTI_RESULTS;
break;
case OPT_multi_statements:
case OPT_multi_queries:
options->client_flag|= CLIENT_MULTI_STATEMENTS | CLIENT_MULTI_RESULTS;
break;
case OPT_secure_auth:
options->secure_auth= TRUE;
break;
case OPT_report_data_truncation:
options->report_data_truncation= opt_arg ? MY_TEST(atoi(opt_arg)) : 1;
break;
case OPT_plugin_dir:
{
char buff[FN_REFLEN], buff2[FN_REFLEN];
if (strlen(opt_arg) >= FN_REFLEN)
opt_arg[FN_REFLEN]= '\0';
if (my_realpath(buff, opt_arg, 0))
{
DBUG_PRINT("warning",("failed to normalize the plugin path: %s",
opt_arg));
break;
}
convert_dirname(buff2, buff, NULL);
EXTENSION_SET_STRING(options, plugin_dir, buff2);
}
break;
case OPT_default_auth:
EXTENSION_SET_STRING(options, default_auth, opt_arg);
break;
case OPT_bind_address:
my_free(options->ci.bind_address);
options->ci.bind_address= my_strdup(opt_arg, MYF(MY_WME));
break;
case OPT_enable_cleartext_plugin:
ENSURE_EXTENSIONS_PRESENT(options);
options->extension->enable_cleartext_plugin=
(!opt_arg || atoi(opt_arg) != 0) ? TRUE : FALSE;
break;
default:
DBUG_PRINT("warning",("unknown option: %s",option[0]));
}
}
}
}
free_defaults(argv);
DBUG_VOID_RETURN;
}
/**************************************************************************
Get column lengths of the current row
If one uses mysql_use_result, res->lengths contains the length information,
else the lengths are calculated from the offset between pointers.
**************************************************************************/
static void cli_fetch_lengths(ulong *to, MYSQL_ROW column,
unsigned int field_count)
{
ulong *prev_length;
char *start=0;
MYSQL_ROW end;
prev_length=0; /* Keep gcc happy */
for (end=column + field_count + 1 ; column != end ; column++, to++)
{
if (!*column)
{
*to= 0; /* Null */
continue;
}
if (start) /* Found end of prev string */
*prev_length= (ulong) (*column-start-1);
start= *column;
prev_length= to;
}
}
/**
Read field metadata from field descriptor and store it in MYSQL_FIELD struct.
String values in MYSQL_FIELD are allocated in a given allocator root.
@param mysql connection handle
@param alloc memory allocator root
@param default_value flag telling if default values should be read from
descriptor
@param server_capabilities protocol capability flags which determine format
of the descriptor
@param row field descriptor
@param field address of MYSQL_FIELD structure to store metadata in.
@returns 0 on success.
*/
int
unpack_field(MYSQL *mysql, MEM_ROOT *alloc, my_bool default_value,
uint server_capabilities, MYSQL_ROWS *row, MYSQL_FIELD *field)
{
ulong lengths[9]; /* Max length of each field */
DBUG_ENTER("unpack_field");
if (!field)
{
set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate);
DBUG_RETURN(1);
}
memset(field, 0, sizeof(MYSQL_FIELD));
if (server_capabilities & CLIENT_PROTOCOL_41)
{
uchar *pos;
/* fields count may be wrong */
cli_fetch_lengths(&lengths[0], row->data, default_value ? 8 : 7);
field->catalog= strmake_root(alloc,(char*) row->data[0], lengths[0]);
field->db= strmake_root(alloc,(char*) row->data[1], lengths[1]);
field->table= strmake_root(alloc,(char*) row->data[2], lengths[2]);
field->org_table= strmake_root(alloc,(char*) row->data[3], lengths[3]);
field->name= strmake_root(alloc,(char*) row->data[4], lengths[4]);
field->org_name= strmake_root(alloc,(char*) row->data[5], lengths[5]);
field->catalog_length= lengths[0];
field->db_length= lengths[1];
field->table_length= lengths[2];
field->org_table_length= lengths[3];
field->name_length= lengths[4];
field->org_name_length= lengths[5];
/* Unpack fixed length parts */
if (lengths[6] != 12)
{
/* malformed packet. signal an error. */
set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate);
DBUG_RETURN(1);
}
pos= (uchar*) row->data[6];
field->charsetnr= uint2korr(pos);
field->length= (uint) uint4korr(pos+2);
field->type= (enum enum_field_types) pos[6];
field->flags= uint2korr(pos+7);
field->decimals= (uint) pos[9];
if (IS_NUM(field->type))
field->flags|= NUM_FLAG;
if (default_value && row->data[7])
{
field->def=strmake_root(alloc,(char*) row->data[7], lengths[7]);
field->def_length= lengths[7];
}
else
field->def=0;
field->max_length= 0;
}
#ifndef DELETE_SUPPORT_OF_4_0_PROTOCOL
else
{
cli_fetch_lengths(&lengths[0], row->data, default_value ? 6 : 5);
field->org_table= field->table= strdup_root(alloc,(char*) row->data[0]);
field->name= strdup_root(alloc,(char*) row->data[1]);
field->length= (uint) uint3korr((uchar*) row->data[2]);
field->type= (enum enum_field_types) (uchar) row->data[3][0];
field->catalog=(char*) "";
field->db= (char*) "";
field->catalog_length= 0;
field->db_length= 0;
field->org_table_length= field->table_length= lengths[0];
field->name_length= lengths[1];
if (server_capabilities & CLIENT_LONG_FLAG)
{
field->flags= uint2korr((uchar*) row->data[4]);
field->decimals=(uint) (uchar) row->data[4][2];
}
else
{
field->flags= (uint) (uchar) row->data[4][0];
field->decimals=(uint) (uchar) row->data[4][1];
}
if (IS_NUM(field->type))
field->flags|= NUM_FLAG;
if (default_value && row->data[5])
{
field->def=strdup_root(alloc,(char*) row->data[5]);
field->def_length= lengths[5];
}
else
field->def=0;
field->max_length= 0;
}
#endif /* DELETE_SUPPORT_OF_4_0_PROTOCOL */
DBUG_RETURN(0);
}
/***************************************************************************
Change field rows to field structs
***************************************************************************/
MYSQL_FIELD *
unpack_fields(MYSQL *mysql, MYSQL_ROWS *data,MEM_ROOT *alloc,uint fields,
my_bool default_value, uint server_capabilities)
{
MYSQL_ROWS *row;
MYSQL_FIELD *field,*result;
DBUG_ENTER("unpack_fields");
field= result= (MYSQL_FIELD*) alloc_root(alloc,
(uint) sizeof(*field)*fields);
if (!result)
{
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
DBUG_RETURN(0);
}
memset(field, 0, sizeof(MYSQL_FIELD)*fields);
for (row=data; row ; row = row->next,field++)
{
/* fields count may be wrong */
DBUG_ASSERT((uint) (field - result) < fields);
if (unpack_field(mysql, alloc, default_value, server_capabilities,
row, field))
{
DBUG_RETURN(NULL);
}
}
DBUG_RETURN(result);
}
/**
Read metadata resultset from server
Memory allocated in a given allocator root.
@param[IN] mysql connection handle
@param[IN] alloc memory allocator root
@param[IN] field_count total number of fields
@param[IN] field number of columns in single field descriptor
@retval an array of field rows
*/
MYSQL_FIELD *cli_read_metadata_ex(MYSQL *mysql, MEM_ROOT *alloc,
ulong field_count, unsigned int field)
{
ulong *len;
uint f;
uchar *pos;
MYSQL_FIELD *fields, *result;
MYSQL_ROWS data;
NET *net = &mysql->net;
DBUG_ENTER("cli_read_metadata");
len= (ulong*) alloc_root(alloc, sizeof(ulong)*field);
fields= result= (MYSQL_FIELD*) alloc_root(alloc,
(uint) sizeof(MYSQL_FIELD)*field_count);
if (!result)
{
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
DBUG_RETURN(0);
}
memset(fields, 0, sizeof(MYSQL_FIELD)*field_count);
data.data= (MYSQL_ROW) alloc_root(alloc, sizeof(char *)*(field+1));
memset(data.data, 0, sizeof(char *)*(field+1));
/*
In this below loop we read each column info as 1 single row
and save it in mysql->fields array
*/
for (f=0 ; f < field_count ; ++f)
{
if(read_one_row(mysql, field, data.data, len) == -1)
DBUG_RETURN(NULL);
if(unpack_field(mysql, alloc, 0, mysql->server_capabilities, &data,
fields++))
DBUG_RETURN(NULL);
}
/* Read EOF packet in case of old client */
if (!client_deprecate_eof_enabled(mysql))
{
if (packet_error == cli_safe_read(mysql, NULL))
DBUG_RETURN(0);
pos= net->read_pos;
if (*pos == 254)
{
mysql->warning_count= uint2korr(pos + 1);
mysql->server_status= uint2korr(pos + 3);
}
}
DBUG_RETURN(result);
}
/**
Read metadata resultset from server
@param[IN] mysql connection handle
@param[IN] field_count total number of fields
@param[IN] field number of columns in single field descriptor
@retval an array of field rows
*/
MYSQL_FIELD *cli_read_metadata(MYSQL *mysql, ulong field_count,
unsigned int field)
{
return cli_read_metadata_ex(mysql, &mysql->field_alloc, field_count, field);
}
/* Read all rows (data) from server */
MYSQL_DATA *cli_read_rows(MYSQL *mysql,MYSQL_FIELD *mysql_fields,
unsigned int fields)
{
uint field;
ulong pkt_len;
ulong len;
uchar *cp;
char *to, *end_to;
MYSQL_DATA *result;
MYSQL_ROWS **prev_ptr,*cur;
NET *net = &mysql->net;
my_bool is_data_packet;
DBUG_ENTER("cli_read_rows");
if ((pkt_len= cli_safe_read(mysql, &is_data_packet)) == packet_error)
DBUG_RETURN(0);
if (!(result=(MYSQL_DATA*) my_malloc(sizeof(MYSQL_DATA),
MYF(MY_WME | MY_ZEROFILL))))
{
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
DBUG_RETURN(0);
}
init_alloc_root(&result->alloc,8192,0); /* Assume rowlength < 8192 */
result->alloc.min_malloc=sizeof(MYSQL_ROWS);
prev_ptr= &result->data;
result->rows=0;
result->fields=fields;
/*
The last EOF packet is either a single 254 character or (in MySQL 4.1)
254 followed by 1-7 status bytes or an OK packet starting with 0xFE
*/
while (*(cp=net->read_pos) == 0 || is_data_packet)
{
result->rows++;
if (!(cur= (MYSQL_ROWS*) alloc_root(&result->alloc,
sizeof(MYSQL_ROWS))) ||
!(cur->data= ((MYSQL_ROW)
alloc_root(&result->alloc,
(fields+1)*sizeof(char *)+pkt_len))))
{
free_rows(result);
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
DBUG_RETURN(0);
}
*prev_ptr=cur;
prev_ptr= &cur->next;
to= (char*) (cur->data+fields+1);
end_to=to+pkt_len-1;
for (field=0 ; field < fields ; field++)
{
if ((len=(ulong) net_field_length(&cp)) == NULL_LENGTH)
{ /* null field */
cur->data[field] = 0;
}
else
{
cur->data[field] = to;
if (len > (ulong) (end_to - to))
{
free_rows(result);
set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate);
DBUG_RETURN(0);
}
memcpy(to,(char*) cp,len); to[len]=0;
to+=len+1;
cp+=len;
if (mysql_fields)
{
if (mysql_fields[field].max_length < len)
mysql_fields[field].max_length=len;
}
}
}
cur->data[field]=to; /* End of last field */
if ((pkt_len=cli_safe_read(mysql, &is_data_packet)) == packet_error)
{
free_rows(result);
DBUG_RETURN(0);
}
}
*prev_ptr=0; /* last pointer is null */
/* read EOF packet or OK packet if it is new client */
if (pkt_len > 1)
{
if (client_deprecate_eof_enabled(mysql) &&
!is_data_packet)
read_ok_ex(mysql, pkt_len);
else
{
mysql->warning_count= uint2korr(cp + 1);
mysql->server_status= uint2korr(cp + 3);
}
DBUG_PRINT("info",("status: %u warning_count: %u",
mysql->server_status, mysql->warning_count));
}
DBUG_PRINT("exit", ("Got %lu rows", (ulong) result->rows));
DBUG_RETURN(result);
}
net_async_status
cli_read_rows_nonblocking(MYSQL *mysql,
unsigned int fields, MYSQL_DATA** result_out)
{
uint field;
ulong pkt_len;
ulong len;
uchar *cp;
char *to, *end_to;
MYSQL_ROWS *cur;
NET *net = &mysql->net;
my_bool is_data_packet;
DBUG_ENTER(__func__);
*result_out = NULL;
if (cli_safe_read_nonblocking(mysql, &pkt_len,
&is_data_packet) == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
mysql->packet_length = pkt_len;
if (pkt_len == packet_error) {
if (net->read_rows_is_first_read) {
free_rows(mysql->rows_result_buffer);
mysql->rows_result_buffer = NULL;
}
net->read_rows_is_first_read = TRUE;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
if (net->read_rows_is_first_read) {
MYSQL_DATA* result;
result = mysql->rows_result_buffer =
(MYSQL_DATA*) my_malloc(sizeof(MYSQL_DATA),
MYF(MY_WME | MY_ZEROFILL));
if (!mysql->rows_result_buffer)
{
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
net->read_rows_is_first_read = TRUE;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
init_alloc_root(&result->alloc,8192,0); /* Assume rowlength < 8192 */
result->alloc.min_malloc=sizeof(MYSQL_ROWS);
mysql->prev_row_ptr= &result->data;
result->rows=0;
result->fields=fields;
net->read_rows_is_first_read = FALSE;
}
/*
The last EOF packet is either a single 254 character or (in MySQL 4.1)
254 followed by 1-7 status bytes.
This doesn't conflict with normal usage of 254 which stands for a
string where the length of the string is 8 bytes. (see net_field_length())
*/
while (*(cp=net->read_pos) != 254 || pkt_len >= 8)
{
MYSQL_DATA* result = mysql->rows_result_buffer;
result->rows++;
if (!(cur= (MYSQL_ROWS*) alloc_root(&result->alloc,
sizeof(MYSQL_ROWS))) ||
!(cur->data= ((MYSQL_ROW)
alloc_root(&result->alloc,
(fields+1)*sizeof(char *)+pkt_len))))
{
free_rows(result);
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
net->read_rows_is_first_read = TRUE;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
*mysql->prev_row_ptr=cur;
mysql->prev_row_ptr= &cur->next;
to= (char*) (cur->data+fields+1);
end_to=to+pkt_len-1;
for (field=0 ; field < fields ; field++)
{
if ((len=(ulong) net_field_length(&cp)) == NULL_LENGTH)
{ /* null field */
cur->data[field] = 0;
}
else
{
cur->data[field] = to;
if (len > (ulong) (end_to - to))
{
free_rows(result);
set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate);
net->read_rows_is_first_read = TRUE;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
memcpy(to,(char*) cp,len); to[len]=0;
to+=len+1;
cp+=len;
}
}
cur->data[field]=to; /* End of last field */
if (cli_safe_read_nonblocking(mysql, &pkt_len,
&is_data_packet) == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
mysql->packet_length = pkt_len;
if (pkt_len == packet_error)
{
free_rows(mysql->rows_result_buffer);
mysql->rows_result_buffer = NULL;
net->read_rows_is_first_read = TRUE;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
}
*mysql->prev_row_ptr=0; /* last pointer is null */
if (pkt_len > 1) /* MySQL 4.1 protocol */
{
mysql->warning_count= uint2korr(cp + 1);
mysql->server_status= uint2korr(cp + 3);
DBUG_PRINT("info",("status: %u warning_count: %u",
mysql->server_status, mysql->warning_count));
}
DBUG_PRINT("exit", ("Got %lu rows", (ulong) mysql->rows_result_buffer->rows));
*result_out = mysql->rows_result_buffer;
net->read_rows_is_first_read = TRUE;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
static int
read_one_row_complete(MYSQL *mysql, ulong pkt_len, uint fields,
MYSQL_ROW row, ulong *lengths, my_bool is_data_packet)
{
uint field;
ulong len;
uchar *pos, *prev_pos, *end_pos;
NET *net= &mysql->net;
if (net->read_pos[0] != 0x00 && !is_data_packet)
{
if (pkt_len > 1) /* MySQL 4.1 protocol */
{
if (client_deprecate_eof_enabled(mysql))
read_ok_ex(mysql, pkt_len);
else
{
mysql->warning_count= uint2korr(net->read_pos + 1);
mysql->server_status= uint2korr(net->read_pos+3);
}
}
return 1; /* End of data */
}
prev_pos= 0; /* allowed to write at packet[-1] */
pos=net->read_pos;
end_pos=pos+pkt_len;
for (field=0 ; field < fields ; field++)
{
if ((len=(ulong) net_field_length(&pos)) == NULL_LENGTH)
{ /* null field */
row[field] = 0;
*lengths++=0;
}
else
{
if (len > (ulong) (end_pos - pos))
{
set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate);
return -1;
}
row[field] = (char*) pos;
pos+=len;
*lengths++=len;
}
if (prev_pos)
*prev_pos=0; /* Terminate prev field */
prev_pos=pos;
}
row[field]=(char*) prev_pos+1; /* End of last field */
*prev_pos=0; /* Terminate last field */
return 0;
}
/*
Read one row. Uses packet buffer as storage for fields.
When next packet is read, the previous field values are destroyed
*/
static int
read_one_row(MYSQL *mysql,uint fields,MYSQL_ROW row, ulong *lengths)
{
ulong pkt_len;
my_bool is_data_packet;
if ((pkt_len=cli_safe_read(mysql, &is_data_packet)) == packet_error)
return -1;
return read_one_row_complete(mysql, pkt_len, fields, row, lengths,
is_data_packet);
}
static net_async_status
read_one_row_nonblocking(MYSQL *mysql,uint fields,MYSQL_ROW row, ulong *lengths,
uint *res)
{
ulong pkt_len;
net_async_status status;
my_bool is_data_packet;
status = cli_safe_read_nonblocking(mysql, &pkt_len, &is_data_packet);
if (status == NET_ASYNC_NOT_READY)
return NET_ASYNC_NOT_READY;
mysql->packet_length = pkt_len;
DBUG_PRINT("debug", ("pkt len: %lu", pkt_len));
if (pkt_len == packet_error) {
*res = -1;
return NET_ASYNC_COMPLETE;
}
DBUG_DUMP("read_one_row_nonblocking", (uchar*)mysql->net.read_pos, pkt_len);
*res = read_one_row_complete(mysql, pkt_len, fields, row, lengths,
is_data_packet);
return NET_ASYNC_COMPLETE;
}
/****************************************************************************
Init MySQL structure or allocate one
****************************************************************************/
MYSQL * STDCALL
mysql_init(MYSQL *mysql)
{
if (mysql_server_init(0, NULL, NULL))
return 0;
if (!mysql)
{
if (!(mysql=(MYSQL*) my_malloc(sizeof(*mysql),MYF(MY_WME | MY_ZEROFILL))))
{
set_mysql_error(NULL, CR_OUT_OF_MEMORY, unknown_sqlstate);
return 0;
}
mysql->free_me=1;
}
else
memset(mysql, 0, sizeof(*(mysql)));
mysql->charset=default_client_charset_info;
strmov(mysql->net.sqlstate, not_error_sqlstate);
/*
Only enable LOAD DATA INFILE by default if configured with option
ENABLED_LOCAL_INFILE
*/
#if defined(ENABLED_LOCAL_INFILE) && !defined(MYSQL_SERVER)
mysql->options.client_flag|= CLIENT_LOCAL_FILES;
#endif
#ifdef HAVE_SMEM
mysql->options.shared_memory_base_name= (char*) def_shared_memory_base_name;
#endif
mysql->options.methods_to_use= MYSQL_OPT_GUESS_CONNECTION;
mysql->options.report_data_truncation= TRUE; /* default */
/* Initialize extensions. */
if (!(mysql->extension= mysql_extension_init(mysql)))
{
set_mysql_error(NULL, CR_OUT_OF_MEMORY, unknown_sqlstate);
return 0;
}
mysql->options.connect_timeout = timeout_infinite();
mysql->options.read_timeout = timeout_infinite();
mysql->options.write_timeout = timeout_infinite();
/*
By default we don't reconnect because it could silently corrupt data (after
reconnection you potentially lose table locks, user variables, session
variables (transactions but they are specifically dealt with in
mysql_reconnect()).
This is a change: < 5.0.3 mysql->reconnect was set to 1 by default.
How this change impacts existing apps:
- existing apps which relyed on the default will see a behaviour change;
they will have to set reconnect=1 after mysql_real_connect().
- existing apps which explicitely asked for reconnection (the only way they
could do it was by setting mysql.reconnect to 1 after mysql_real_connect())
will not see a behaviour change.
- existing apps which explicitely asked for no reconnection
(mysql.reconnect=0) will not see a behaviour change.
*/
mysql->reconnect= 0;
mysql->options.secure_auth= TRUE;
mysql->async_op_status = ASYNC_OP_UNSET;
mysql->net.receive_buffer_size = 0;
return mysql;
}
/*
MYSQL::extension handling (see sql_common.h for declaration
of st_mysql_extension structure).
*/
MYSQL_EXTENSION* mysql_extension_init(MYSQL *mysql MY_ATTRIBUTE((unused)))
{
MYSQL_EXTENSION *ext;
ext= my_malloc(sizeof(MYSQL_EXTENSION), MYF(MY_WME | MY_ZEROFILL));
return ext;
}
void mysql_extension_free(struct st_mysql_extension* ext)
{
if (!ext)
return;
if (ext->trace_data)
my_free(ext->trace_data);
// free state change related resources.
free_state_change_info(ext);
my_free(ext);
}
/*
Fill in SSL part of MYSQL structure and set 'use_ssl' flag.
NB! Errors are not reported until you do mysql_real_connect.
*/
#define strdup_if_not_null(A) (A) == 0 ? 0 : my_strdup((A),MYF(MY_WME))
my_bool STDCALL
mysql_ssl_set(MYSQL *mysql MY_ATTRIBUTE((unused)) ,
const char *key MY_ATTRIBUTE((unused)),
const char *cert MY_ATTRIBUTE((unused)),
const char *ca MY_ATTRIBUTE((unused)),
const char *capath MY_ATTRIBUTE((unused)),
const char *cipher MY_ATTRIBUTE((unused)))
{
my_bool result= 0;
DBUG_ENTER("mysql_ssl_set");
#if defined(HAVE_OPENSSL) && !defined(EMBEDDED_LIBRARY)
result=
mysql_options(mysql, MYSQL_OPT_SSL_KEY, key) +
mysql_options(mysql, MYSQL_OPT_SSL_CERT, cert) +
mysql_options(mysql, MYSQL_OPT_SSL_CA, ca) +
mysql_options(mysql, MYSQL_OPT_SSL_CAPATH, capath) +
mysql_options(mysql, MYSQL_OPT_SSL_CIPHER, cipher)
? 1 : 0;
#endif
DBUG_RETURN(result);
}
/*
Free strings in the SSL structure and clear 'use_ssl' flag.
NB! Errors are not reported until you do mysql_real_connect.
*/
#if defined(HAVE_OPENSSL) && !defined(EMBEDDED_LIBRARY)
static void
mysql_ssl_free(MYSQL *mysql MY_ATTRIBUTE((unused)))
{
struct st_VioSSLFd *ssl_fd= (struct st_VioSSLFd*) mysql->connector_fd;
DBUG_ENTER("mysql_ssl_free");
my_free(mysql->options.ssl_key);
my_free(mysql->options.ssl_cert);
my_free(mysql->options.ssl_ca);
my_free(mysql->options.ssl_capath);
my_free(mysql->options.ssl_cipher);
if (mysql->options.extension)
{
my_free(mysql->options.extension->ssl_crl);
my_free(mysql->options.extension->ssl_crlpath);
if (mysql->options.extension->ssl_session)
SSL_SESSION_free((SSL_SESSION*)mysql->options.extension->ssl_session);
}
if (ssl_fd) {
free_vio_ssl_fd(ssl_fd);
}
mysql->options.ssl_key = 0;
mysql->options.ssl_cert = 0;
mysql->options.ssl_ca = 0;
mysql->options.ssl_capath = 0;
mysql->options.ssl_cipher= 0;
if (mysql->options.extension)
{
mysql->options.extension->ssl_crl = 0;
mysql->options.extension->ssl_crlpath = 0;
mysql->options.extension->ssl_context = NULL;
mysql->options.extension->ssl_session = NULL;
}
mysql->options.use_ssl = FALSE;
mysql->connector_fd = 0;
DBUG_VOID_RETURN;
}
#endif /* HAVE_OPENSSL && !EMBEDDED_LIBRARY */
/*
Return the SSL cipher (if any) used for current
connection to the server.
SYNOPSYS
mysql_get_ssl_cipher()
mysql pointer to the mysql connection
*/
const char * STDCALL
mysql_get_ssl_cipher(MYSQL *mysql MY_ATTRIBUTE((unused)))
{
DBUG_ENTER("mysql_get_ssl_cipher");
#if defined(HAVE_OPENSSL)
if (mysql->net.vio && mysql->net.vio->ssl_arg)
DBUG_RETURN(SSL_get_cipher_name((SSL*)mysql->net.vio->ssl_arg));
#endif /* HAVE_OPENSSL */
DBUG_RETURN(NULL);
}
void* STDCALL
mysql_get_ssl_session(MYSQL* mysql MY_ATTRIBUTE((unused))) {
DBUG_ENTER("mysql_get_ssl_session");
#if defined(HAVE_OPENSSL) && !defined(EMBEDDED_LIBRARY)
if (mysql->net.vio && mysql->net.vio->ssl_arg) {
DBUG_RETURN(SSL_get1_session((SSL*)mysql->net.vio->ssl_arg));
}
#endif /* HAVE_OPENSSL && !EMBEDDED_LIBRARY */
DBUG_RETURN(NULL);
}
my_bool mysql_get_ssl_session_reused(MYSQL* mysql MY_ATTRIBUTE((unused))) {
DBUG_ENTER("mysql_get_ssl_session_reused");
#if defined(HAVE_OPENSSL) && !defined(EMBEDDED_LIBRARY)
if (mysql->net.vio && mysql->net.vio->ssl_arg) {
DBUG_RETURN(SSL_session_reused((SSL*)mysql->net.vio->ssl_arg));
}
#endif /* HAVE_OPENSSL && !EMBEDDED_LIBRARY */
DBUG_RETURN(FALSE);
}
void* STDCALL
mysql_take_ssl_context_ownership(MYSQL* mysql MY_ATTRIBUTE((unused))) {
DBUG_ENTER("mysql_take_ssl_context_ownership");
#if defined(HAVE_OPENSSL) && !defined(EMBEDDED_LIBRARY)
if (mysql->connector_fd) {
struct st_VioSSLFd *ssl_fd= (struct st_VioSSLFd*) mysql->connector_fd;
ssl_fd->owned = FALSE;
DBUG_RETURN(ssl_fd->ssl_context);
}
#endif /* HAVE_OPENSSL && !EMBEDDED_LIBRARY */
DBUG_RETURN(NULL);
}
my_bool STDCALL
mysql_get_ssl_server_cerfificate_info(MYSQL *mysql MY_ATTRIBUTE((unused)),
char* subject_buf MY_ATTRIBUTE((unused)),
size_t subject_buflen MY_ATTRIBUTE((unused)),
char* issuer_buf MY_ATTRIBUTE((unused)),
size_t issuer_buflen MY_ATTRIBUTE((unused)))
{
DBUG_ENTER("mysql_get_ssl_server_cerfificate_info");
#if defined(HAVE_OPENSSL)
SSL* ssl = (SSL*)mysql->net.vio->ssl_arg;
X509 *cert = NULL;
subject_buf[0] = '\0';
issuer_buf[0] = '\0';
if (!mysql->net.vio || !ssl)
DBUG_RETURN(FALSE);
cert = SSL_get_peer_certificate(ssl);
if (!cert)
DBUG_RETURN(FALSE);
X509_NAME_oneline(X509_get_subject_name(cert), subject_buf, subject_buflen);
X509_NAME_oneline(X509_get_issuer_name(cert), issuer_buf, issuer_buflen);
X509_free(cert);
DBUG_RETURN(TRUE);
#endif /* HAVE_OPENSSL && !EMBEDDED_LIBRARY */
DBUG_RETURN(FALSE);
}
/*
Compare DNS name against pattern with a wildcard.
WARNING: this is a hack. For proper implementation use
X509_check_host() from OpenSSL once it gets released.
We are implementing the most strict rules as per RFC 6125
sections 6.4.3 and 7.2.
Only do wildcard matching for the single left-most wildcard
and only match a single label. E.g.:
'*.fb.com' will match 'a.fb.com' but not 'b.a.fb.com'.
'*.com' will not match anything. Sadly 'anything.uk.co'
will match '*.uk.co.'. There's no simple way around it.
Use X509_check_host() once it becomes available.
'a*fb.com' will not match anything.
Refer to RFC 6125 for details.
SYNOPSIS
check_host_name()
pattern wildcard pattern or regular domain name string.
name fully qualified domain name of the host.
We expect it to be a valid domain name and thus
we are not doing any sanity checks.
RETURN VALUES
0 Success
1 Failed to validate the name against pattern
*/
#if defined(HAVE_OPENSSL) && !defined(EMBEDDED_LIBRARY)
static int check_host_name(const char *pattern, const char *name)
{
const char *p = name;
if (!pattern || !name)
return 1;
if (*pattern != '*')
return strcmp(pattern, name);
if (*(pattern+1) != '.')
return 1;
p = strchr(name, '.');
if (!p)
return 1;
++p;
/*
These are the parts we need to compare, but first make sure
there's another subdomain level after in the name. No CA should
ever issue '*.com', but you never know.
*/
if (!strchr(p, '.'))
return 1;
return strcmp(pattern+2, p);
}
#endif /* HAVE_OPENSSL && !EMBEDDED_LIBRARY */
#if defined(HAVE_OPENSSL) && !defined(EMBEDDED_LIBRARY)
static my_bool ssl_check_SAN_DNS(const char* server_hostname, GENERAL_NAME* gn_entry)
{
my_bool retcode= 0;
int length;
unsigned char* CN_utf8;
length= ASN1_STRING_to_UTF8(&CN_utf8, gn_entry->d.dNSName);
DBUG_PRINT("info", ("aternative hostname in cert: %s", CN_utf8));
// Don't compare if string has null inside
if (length > 0 && (uint32_t) length == strlen((const char*) CN_utf8) &&
!check_host_name((char*) CN_utf8, server_hostname))
{
retcode= 1; // success!
}
// else mismatch - keep checking
OPENSSL_free(CN_utf8);
return retcode;
}
static my_bool ssl_check_SAN_IPADD(Vio* vio, GENERAL_NAME* gn_entry)
{
my_bool retcode= 0;
if (vio->type != VIO_TYPE_SSL)
{
DBUG_PRINT("error", ("vio->type unexpectedly non-SSL"));
}
else
{
/* We must call vio_peer_addr to populate vio->remote; this is
* a hack to get around the limited vio API */
my_bool peer_rc;
char unused_ip[NI_MAXHOST];
uint16_t unused_port;
peer_rc= vio_peer_addr(vio, unused_ip, &unused_port, NI_MAXHOST);
if (!peer_rc)
{
DBUG_PRINT("info", ("alternative ip address in cert: %s", unused_ip));
/* Check ipv4 and ipv6 addresses */
#if OPENSSL_VERSION_NUMBER < 0x10100000L
char* data= (char*) ASN1_STRING_data(gn_entry->d.ia5);
#else
char* data= (char*) ASN1_STRING_get0_data(gn_entry->d.ia5);
#endif
int length= ASN1_STRING_length(gn_entry->d.ia5);
struct sockaddr* sa= (struct sockaddr*) &vio->remote;
if (sa->sa_family == AF_INET && length == sizeof(struct in_addr))
{
struct sockaddr_in* sa_in= (struct sockaddr_in*) sa;
if (memcmp(&sa_in->sin_addr, data, length) == 0)
{
retcode= 1;
}
}
else if (sa->sa_family == AF_INET6 && length == sizeof(struct in6_addr))
{
struct sockaddr_in6* sa_in6= (struct sockaddr_in6*) sa;
if (memcmp(&sa_in6->sin6_addr, data, length) == 0)
{
retcode= 1;
}
}
else
{
DBUG_PRINT("error", ("unexpected sa_family/length (%d/%d)",
sa->sa_family, length));
}
}
}
return retcode;
}
static my_bool ssl_check_SAN(Vio* vio, const char* server_hostname,
GENERAL_NAME* gn_entry, my_bool* SAN_DNS_checked)
{
my_bool retcode= 0;
if (gn_entry != NULL)
{
if (gn_entry->type == GEN_DNS)
{
*SAN_DNS_checked= 1; // at least one DNS entry checked
retcode= ssl_check_SAN_DNS(server_hostname, gn_entry);
}
else if (gn_entry->type == GEN_IPADD)
{
retcode= ssl_check_SAN_IPADD(vio, gn_entry);
}
}
return retcode;
}
static my_bool ssl_check_SANs(Vio* vio, X509* server_cert,
const char* server_hostname, my_bool* SAN_DNS_checked)
{
my_bool found = 0;
GENERAL_NAMES* names;
names = X509_get_ext_d2i(server_cert, NID_subject_alt_name, 0, 0);
if (names)
{
int count= sk_GENERAL_NAME_num(names);
for (int index= 0; index < count && !found; index++)
{
found= ssl_check_SAN(vio, server_hostname,
sk_GENERAL_NAME_value(names, index),
SAN_DNS_checked);
}
GENERAL_NAMES_free(names);
}
return found;
}
static ASN1_STRING* ssl_get_CN(X509* server_cert)
{
ASN1_STRING* asn1= NULL;
X509_NAME* subject= X509_get_subject_name(server_cert);
if (subject != NULL)
{
// Find the CN location in the subject
int cn_loc= X509_NAME_get_index_by_NID(subject, NID_commonName, -1);
if (cn_loc >= 0)
{
// Get the CN entry for the given locaiton
X509_NAME_ENTRY* cn_entry= X509_NAME_get_entry(subject, cn_loc);
if (cn_entry != NULL)
{
// Get CN from common name entry
asn1= X509_NAME_ENTRY_get_data(cn_entry);
}
}
}
return asn1;
}
static my_bool ssl_check_CN(X509* server_cert, const char* server_hostname,
const char** errptr)
{
my_bool found= 0;
const char *err = "SSL certificate validation failure";;
ASN1_STRING* CN_asn1= ssl_get_CN(server_cert);
if (CN_asn1 != NULL)
{
unsigned char* CN_utf8;
int length= ASN1_STRING_to_UTF8(&CN_utf8, CN_asn1);
if (length > 0)
{
// There should not be any NULL embedded in the CN
if ((uint32_t) length != strlen((const char*) CN_utf8))
{
err= "failed SSL certificate validation due to null insde CN";
}
else
{
DBUG_PRINT("info", ("Server hostname in cert: %s", CN_utf8));
found= check_host_name((const char*) CN_utf8, server_hostname) == 0;
}
}
OPENSSL_free(CN_utf8);
}
if (!found)
{
*errptr= err;
}
return found;
}
static X509* ssl_get_server_cert(Vio* vio, const char** errptr)
{
SSL* ssl;
X509* server_cert= NULL;
ssl= (SSL*) vio->ssl_arg;
if (ssl == NULL)
{
*errptr= "No SSL pointer found";
}
else
{
server_cert= SSL_get_peer_certificate(ssl);
if (server_cert == NULL)
{
*errptr= "Could not get server certificate";
}
else if (SSL_get_verify_result(ssl) != X509_V_OK)
{
*errptr= "Failed to verify the server certificate";
}
}
return server_cert;
}
/*
Check the server's (subject) Common Name against the
hostname we connected to
SYNOPSIS
ssl_verify_server_cert()
vio pointer to a SSL connected vio
server_hostname name of the server that we connected to
errptr if we fail, we'll return (a pointer to a string
describing) the reason here
RETURN VALUES
0 Success
1 Failed to validate server
*/
static int ssl_verify_server_cert(Vio* vio, const char* server_hostname,
const char** errptr)
{
int retcode= 1;
X509 *server_cert= NULL;
DBUG_ENTER("ssl_verify_server_cert");
if (!server_hostname)
{
*errptr= "No server hostname supplied";
}
else
{
DBUG_PRINT("enter", ("server_hostname: %s", server_hostname));
server_cert= ssl_get_server_cert(vio, errptr);
if (server_cert != NULL)
{
/*
We already know that the certificate exchanged was valid; the SSL
library handled that. Now we need to verify that the contents of the
certificate are what we expect.
Check subject alternative names (SANs) first.
*/
my_bool SAN_DNS_checked= 0;
if (ssl_check_SANs(vio, server_cert, server_hostname, &SAN_DNS_checked))
{
retcode= 0;
}
else if (!SAN_DNS_checked)
{
// Only check CN if there are no alternative names with DNS
if (ssl_check_CN(server_cert, server_hostname, errptr))
{
retcode= 0;
}
}
X509_free(server_cert);
}
}
DBUG_RETURN(retcode);
}
#endif /* HAVE_OPENSSL && !EMBEDDED_LIBRARY */
/*
Note that the mysql argument must be initialized with mysql_init()
before calling mysql_real_connect !
*/
static my_bool cli_read_query_result(MYSQL *mysql);
static MYSQL_RES *cli_use_result(MYSQL *mysql);
static net_async_status
cli_read_query_result_nonblocking(MYSQL *mysql, my_bool *ret);
int cli_read_change_user_result(MYSQL *mysql)
{
return cli_safe_read(mysql, NULL);
}
net_async_status cli_read_change_user_result_nonblocking(MYSQL *mysql, ulong *out)
{
return cli_safe_read_nonblocking(mysql, out, NULL);
}
static MYSQL_METHODS client_methods=
{
cli_read_query_result, /* read_query_result */
cli_advanced_command, /* advanced_command */
cli_read_rows, /* read_rows */
cli_use_result, /* use_result */
cli_fetch_lengths, /* fetch_lengths */
cli_flush_use_result, /* flush_use_result */
cli_read_change_user_result /* read_change_user_result */
#ifndef MYSQL_SERVER
,cli_list_fields, /* list_fields */
cli_read_prepare_result, /* read_prepare_result */
cli_stmt_execute, /* stmt_execute */
cli_read_binary_rows, /* read_binary_rows */
cli_unbuffered_fetch, /* unbuffered_fetch */
NULL, /* free_embedded_thd */
cli_read_statistics, /* read_statistics */
cli_read_query_result, /* next_result */
cli_read_binary_rows /* read_rows_from_cursor */
#endif
, cli_advanced_command_nonblocking
, cli_read_query_result_nonblocking
, cli_flush_use_result_nonblocking
, cli_read_query_result_nonblocking
, cli_read_change_user_result_nonblocking
};
#ifndef __WIN__
#include <stdlib.h> /* for getenv() */
#ifdef HAVE_LANGINFO_H
#include <langinfo.h>
#endif
#ifdef HAVE_LOCALE_H
#include <locale.h>
#endif
#endif /* __WIN__ */
static int
mysql_autodetect_character_set(MYSQL *mysql)
{
const char *csname= MYSQL_DEFAULT_CHARSET_NAME;
if (mysql->options.charset_name)
my_free(mysql->options.charset_name);
if (!(mysql->options.charset_name= my_strdup(csname, MYF(MY_WME))))
return 1;
return 0;
}
static void
mysql_set_character_set_with_default_collation(MYSQL *mysql)
{
const char *save= charsets_dir;
if (mysql->options.charset_dir)
charsets_dir=mysql->options.charset_dir;
if ((mysql->charset= get_charset_by_csname(mysql->options.charset_name,
MY_CS_PRIMARY, MYF(MY_WME))))
{
/* Try to set compiled default collation when it's possible. */
CHARSET_INFO *collation;
if ((collation=
get_charset_by_name(MYSQL_DEFAULT_COLLATION_NAME, MYF(MY_WME))) &&
my_charset_same(mysql->charset, collation))
{
mysql->charset= collation;
}
else
{
/*
Default compiled collation not found, or is not applicable
to the requested character set.
Continue with the default collation of the character set.
*/
}
}
charsets_dir= save;
}
C_MODE_START
int mysql_init_character_set(MYSQL *mysql)
{
/* Set character set */
if (!mysql->options.charset_name)
{
if (!(mysql->options.charset_name=
my_strdup(MYSQL_DEFAULT_CHARSET_NAME,MYF(MY_WME))))
return 1;
}
else if (!strcmp(mysql->options.charset_name,
MYSQL_AUTODETECT_CHARSET_NAME) &&
mysql_autodetect_character_set(mysql))
return 1;
mysql_set_character_set_with_default_collation(mysql);
if (!mysql->charset)
{
if (mysql->options.charset_dir)
set_mysql_extended_error(mysql, CR_CANT_READ_CHARSET, unknown_sqlstate,
ER(CR_CANT_READ_CHARSET),
mysql->options.charset_name,
mysql->options.charset_dir);
else
{
char cs_dir_name[FN_REFLEN];
get_charsets_dir(cs_dir_name);
set_mysql_extended_error(mysql, CR_CANT_READ_CHARSET, unknown_sqlstate,
ER(CR_CANT_READ_CHARSET),
mysql->options.charset_name,
cs_dir_name);
}
return 1;
}
return 0;
}
C_MODE_END
/*********** client side authentication support **************************/
typedef struct st_mysql_client_plugin_AUTHENTICATION auth_plugin_t;
static int client_mpvio_write_packet(struct st_plugin_vio*, const uchar*, int);
static int client_mpvio_write_packet_nonblocking(struct st_plugin_vio*, const uchar*, int, int*);
static int native_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql);
static int native_password_auth_client_nonblocking(MYSQL_PLUGIN_VIO *vio,
MYSQL *mysql, int *result);
static int old_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql);
static int clear_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql);
static auth_plugin_t native_password_client_plugin=
{
MYSQL_CLIENT_AUTHENTICATION_PLUGIN,
MYSQL_CLIENT_AUTHENTICATION_PLUGIN_INTERFACE_VERSION,
native_password_plugin_name,
"R.J.Silk, Sergei Golubchik",
"Native MySQL authentication",
{1, 0, 0},
"GPL",
NULL,
NULL,
NULL,
NULL,
native_password_auth_client,
native_password_auth_client_nonblocking
};
static auth_plugin_t old_password_client_plugin=
{
MYSQL_CLIENT_AUTHENTICATION_PLUGIN,
MYSQL_CLIENT_AUTHENTICATION_PLUGIN_INTERFACE_VERSION,
old_password_plugin_name,
"R.J.Silk, Sergei Golubchik",
"Old MySQL-3.23 authentication",
{1, 0, 0},
"GPL",
NULL,
NULL,
NULL,
NULL,
old_password_auth_client,
NULL
};
static auth_plugin_t clear_password_client_plugin=
{
MYSQL_CLIENT_AUTHENTICATION_PLUGIN,
MYSQL_CLIENT_AUTHENTICATION_PLUGIN_INTERFACE_VERSION,
"mysql_clear_password",
"Georgi Kodinov",
"Clear password authentication plugin",
{0,1,0},
"GPL",
NULL,
NULL,
NULL,
NULL,
clear_password_auth_client,
NULL
};
#if defined(HAVE_OPENSSL)
static auth_plugin_t sha256_password_client_plugin=
{
MYSQL_CLIENT_AUTHENTICATION_PLUGIN,
MYSQL_CLIENT_AUTHENTICATION_PLUGIN_INTERFACE_VERSION,
"sha256_password",
"Oracle Inc",
"SHA256 based authentication with salt",
{1, 0, 0},
"GPL",
NULL,
sha256_password_init,
sha256_password_deinit,
NULL,
sha256_password_auth_client,
NULL
};
#endif
#ifdef AUTHENTICATION_WIN
extern auth_plugin_t win_auth_client_plugin;
#endif
struct st_mysql_client_plugin *mysql_client_builtins[]=
{
(struct st_mysql_client_plugin *)&native_password_client_plugin,
(struct st_mysql_client_plugin *)&old_password_client_plugin,
(struct st_mysql_client_plugin *)&clear_password_client_plugin,
#if defined(HAVE_OPENSSL)
(struct st_mysql_client_plugin *) &sha256_password_client_plugin,
#endif
#ifdef AUTHENTICATION_WIN
(struct st_mysql_client_plugin *)&win_auth_client_plugin,
#endif
0
};
static uchar *
write_length_encoded_string3(uchar *buf, char *string, size_t length)
{
buf= net_store_length(buf, length);
memcpy(buf, string, length);
buf+= length;
return buf;
}
static uchar *
encode_attrs(uchar *buf, HASH *attrs, size_t attrs_length)
{
buf= net_store_length(buf, attrs_length);
/* check if we have attributes */
if (attrs && my_hash_inited(attrs))
{
ulong idx;
/* loop over and dump the attributes */
for (idx= 0; idx < attrs->records; idx++)
{
LEX_STRING *attr= (LEX_STRING *) my_hash_element(attrs, idx);
LEX_STRING *key= attr, *value= attr + 1;
/* we can't have zero length keys */
DBUG_ASSERT(key->length);
buf= write_length_encoded_string3(buf, key->str, key->length);
buf= write_length_encoded_string3(buf, value->str, value->length);
}
}
return buf;
}
uchar *
send_client_connect_attrs(MYSQL *mysql, uchar *buf)
{
/* check if the server supports connection attributes */
if (mysql->server_capabilities & CLIENT_CONNECT_ATTRS)
{
if (mysql->options.extension)
buf= encode_attrs(buf, &mysql->options.extension->connection_attributes,
mysql->options.extension->connection_attributes_length);
else
encode_attrs(buf, NULL, 0);
}
return buf;
}
uchar *
send_client_query_attrs(MYSQL *mysql, uchar *buf)
{
if (mysql->options.extension)
buf= encode_attrs(buf, &mysql->options.extension->query_attributes,
mysql->options.extension->query_attributes_length);
else
encode_attrs(buf, NULL, 0);
return buf;
}
static size_t get_length_store_length(size_t length)
{
uchar length_buffer[MAX_VARIABLE_STRING_LENGTH], *ptr;
ptr= net_store_length(length_buffer, length);
return ptr - &length_buffer[0];
}
/* this is a "superset" of MYSQL_PLUGIN_VIO, in C++ I use inheritance */
typedef struct {
MYSQL_PLUGIN_VIO base;
/* -= end of MYSQL_PLUGIN_VIO =- */
MYSQL *mysql;
auth_plugin_t *plugin; /**< what plugin we're under */
const char *db;
struct {
uchar *pkt; /**< pointer into NET::buff */
uint pkt_len;
} cached_server_reply;
int packets_read, packets_written; /**< counters for send/received packets */
int mysql_change_user; /**< if it's mysql_change_user() */
int last_read_packet_len; /**< the length of the last *read* packet */
} MCPVIO_EXT;
/* A state machine for authentication itself. */
struct st_mysql_authsm_context;
typedef mysql_state_machine_status (*authsm_function)(struct st_mysql_authsm_context*);
typedef enum {
READING_PASSWORD = 8098,
WRITING_RESPONSE = 8099
} native_client_state_enum;
typedef enum {
SSL_REQUEST = 8100,
SSL_CONNECT = 8101,
SSL_COMPLETE = 8102,
SSL_NONE = 8103
} ssl_exchange_state_enum;
struct st_mysql_authsm_context {
MYSQL *mysql;
my_bool non_blocking;
char *data;
uint data_len;
const char *data_plugin;
const char *db;
const char *auth_plugin_name;
auth_plugin_t *auth_plugin;
MCPVIO_EXT mpvio;
ulong pkt_length;
int res;
char *change_user_buff;
int change_user_buff_len;
native_client_state_enum native_client_state;
ssl_exchange_state_enum ssl_exchange_state;
authsm_function state_function;
};
typedef struct st_mysql_authsm_context mysql_authsm_context;
/*
Write 1-8 bytes of string length header infromation to dest depending on
value of src_len, then copy src_len bytes from src to dest.
@param dest Destination buffer of size src_len+8
@param dest_end One byte past the end of the dest buffer
@param src Source buff of size src_len
@param src_end One byte past the end of the src buffer
@return pointer dest+src_len+header size or NULL if
*/
char *write_length_encoded_string4(char *dest, char *dest_end, char *src,
char *src_end)
{
size_t src_len= (size_t)(src_end - src);
uchar *to= net_store_length((uchar*) dest, src_len);
if ((char*)(to + src_len) >= dest_end)
return NULL;
memcpy(to, src, src_len);
return (char*)(to + src_len);
}
/*
Write 1 byte of string length header information to dest and
copy src_len bytes from src to dest.
*/
char *write_string(char *dest, char *dest_end, char *src, char *src_end)
{
size_t src_len= (size_t)(src_end - src);
uchar *to= NULL;
if (src_len >= 251)
return NULL;
*dest=(uchar) src_len;
to= (uchar*) dest+1;
if ((char*)(to + src_len) >= dest_end)
return NULL;
memcpy(to, src, src_len);
return (char*)(to + src_len);
}
/**
sends a COM_CHANGE_USER command with a caller provided payload
Packet format:
Bytes Content
----- ----
n user name - \0-terminated string
n password
3.23 scramble - \0-terminated string (9 bytes)
otherwise - length (1 byte) coded
n database name - \0-terminated string
2 character set number (if the server >= 4.1.x)
n client auth plugin name - \0-terminated string,
(if the server supports plugin auth)
@retval 0 ok
@retval 1 error
*/
static my_bool prep_send_change_user_packet(MCPVIO_EXT *mpvio,
const uchar *data, int data_len,
char **out_buff, int *out_len)
{
DBUG_ENTER(__func__);
MYSQL *mysql= mpvio->mysql;
char *buff, *end;
size_t connect_attrs_len=
(mysql->server_capabilities & CLIENT_CONNECT_ATTRS &&
mysql->options.extension) ?
mysql->options.extension->connection_attributes_length : 0;
*out_buff = NULL;
*out_len = 0;
buff= my_malloc(USERNAME_LENGTH + data_len + 1 + NAME_LEN + 2 + NAME_LEN +
connect_attrs_len + MAX_VARIABLE_STRING_LENGTH,
MYF(MY_WME | MY_ZEROFILL));
end= strmake(buff, mysql->user, USERNAME_LENGTH) + 1;
if (!data_len)
*end++= 0;
else
{
if (mysql->client_flag & CLIENT_SECURE_CONNECTION)
{
DBUG_ASSERT(data_len <= 255);
if (data_len > 255)
{
set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate);
goto error;
}
*end++= data_len;
}
else
{
DBUG_ASSERT(data_len == SCRAMBLE_LENGTH_323 + 1);
DBUG_ASSERT(data[SCRAMBLE_LENGTH_323] == 0);
}
memcpy(end, data, data_len);
end+= data_len;
}
end= strmake(end, mpvio->db ? mpvio->db : "", NAME_LEN) + 1;
if (mysql->server_capabilities & CLIENT_PROTOCOL_41)
{
int2store(end, (ushort) mysql->charset->number);
end+= 2;
}
if (mysql->server_capabilities & CLIENT_PLUGIN_AUTH)
end= strmake(end, mpvio->plugin->name, NAME_LEN) + 1;
end= (char *) send_client_connect_attrs(mysql, (uchar *) end);
*out_buff = buff;
*out_len = end - buff;
DBUG_RETURN(FALSE);
error:
my_free(buff);
DBUG_RETURN(TRUE);
}
static int send_change_user_packet(MCPVIO_EXT *mpvio,
const uchar *data, int data_len)
{
MYSQL *mysql= mpvio->mysql;
char *buff;
int buff_len;
int res = 0;
if (prep_send_change_user_packet(mpvio, data, data_len,
&buff, &buff_len)) {
return 1;
}
if (buff) {
res= simple_command(mysql, COM_CHANGE_USER,
(uchar*)buff, buff_len, 1);
my_free(buff);
}
return res;
}
static int send_change_user_packet_nonblocking(
MCPVIO_EXT *mpvio,const uchar *pkt, int pkt_len, my_bool *result)
{
DBUG_ENTER("send_change_user_packet_nonblocking");
MYSQL *mysql= mpvio->mysql;
mysql_authsm_context *ctx = mysql->connect_context->auth_context;
my_bool error = FALSE;
uchar command = -1;
if (!ctx->change_user_buff) {
command = COM_CHANGE_USER;
error = prep_send_change_user_packet(mpvio, pkt, pkt_len,
&ctx->change_user_buff,
&ctx->change_user_buff_len);
if (error) {
*result = TRUE;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
}
net_async_status status =
simple_command_nonblocking(mysql, command,
(uchar*)ctx->change_user_buff,
ctx->change_user_buff_len, 1, &error);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
my_free(ctx->change_user_buff);
ctx->change_user_buff = NULL;
*result = error;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
/*
* Reads options from within the MYSQL* and updates client_flag accordingly.
*/
static void set_client_flag_from_options(MYSQL* mysql, MCPVIO_EXT *mpvio){
mysql->client_flag|= mysql->options.client_flag;
mysql->client_flag|= CLIENT_CAPABILITIES;
if (mysql->client_flag & CLIENT_MULTI_STATEMENTS)
mysql->client_flag|= CLIENT_MULTI_RESULTS;
#if defined(HAVE_OPENSSL) && !defined(EMBEDDED_LIBRARY)
if (mysql->options.ssl_key || mysql->options.ssl_cert ||
mysql->options.ssl_ca || mysql->options.ssl_capath ||
mysql->options.ssl_cipher ||
(mysql->options.extension && mysql->options.extension->ssl_crl) ||
(mysql->options.extension && mysql->options.extension->ssl_crlpath) ||
(mysql->options.extension && mysql->options.extension->ssl_context))
mysql->options.use_ssl= 1;
if (mysql->options.use_ssl)
mysql->client_flag|= CLIENT_SSL;
#endif /* HAVE_OPENSSL && !EMBEDDED_LIBRARY*/
if (mpvio->db)
mysql->client_flag|= CLIENT_CONNECT_WITH_DB;
else
mysql->client_flag&= ~CLIENT_CONNECT_WITH_DB;
/* Remove options that server doesn't support */
mysql->client_flag= mysql->client_flag &
(~(CLIENT_COMPRESS | CLIENT_COMPRESS_EVENT |
CLIENT_SSL | CLIENT_PROTOCOL_41)
| mysql->server_capabilities);
// Async MySQL Client does not have the CLIENT_DEPRECATE_EOF functionality
// supported. We will forcefully disable it.
if (mysql->connect_context && mysql->connect_context->non_blocking)
mysql->client_flag &= ~CLIENT_DEPRECATE_EOF;
#ifndef HAVE_COMPRESS
mysql->client_flag&= ~(CLIENT_COMPRESS | CLIENT_COMPRESS_EVENT);
#endif
}
#define MAX_ATTR_STORAGE_LENGTH 65536
/**
sends a client authentication packet (second packet in the 3-way handshake)
Packet format (when the server is 4.0 or earlier):
Bytes Content
----- ----
2 client capabilities
3 max packet size
n user name, \0-terminated
9 scramble_323, \0-terminated
Packet format (when the server is 4.1 or newer):
Bytes Content
----- ----
4 client capabilities
4 max packet size
1 charset number
23 reserved (always 0)
n user name, \0-terminated
n plugin auth data (e.g. scramble), length encoded
n database name, \0-terminated
(if CLIENT_CONNECT_WITH_DB is set in the capabilities)
n client auth plugin name - \0-terminated string,
(if CLIENT_PLUGIN_AUTH is set in the capabilities)
@retval 0 ok
@retval 1 error
*/
static my_bool prep_client_reply_packet(MCPVIO_EXT *mpvio,
const uchar *data, int data_len,
char **buff_out, int *buff_len)
{
DBUG_ENTER("prep_client_reply_packet");
MYSQL *mysql= mpvio->mysql;
NET *net= &mysql->net;
char *buff, *end;
size_t buff_size;
size_t connect_attrs_len=
(mysql->server_capabilities & CLIENT_CONNECT_ATTRS &&
mysql->options.extension) ?
mysql->options.extension->connection_attributes_length : 0;
DBUG_ASSERT(connect_attrs_len < MAX_ATTR_STORAGE_LENGTH);
*buff_out = NULL;
*buff_len = 0;
/*
see end= buff+32 below, fixed size of the packet is 32 bytes.
+9 because data is a length encoded binary where meta data size is max 9.
*/
buff_size= 33 + USERNAME_LENGTH + data_len + 9 + NAME_LEN + NAME_LEN + connect_attrs_len + 9;
buff= my_malloc(buff_size, MYF(MY_WME | MY_ZEROFILL));
set_client_flag_from_options(mysql, mpvio);
if (mysql->client_flag & CLIENT_PROTOCOL_41)
{
/* 4.1 server and 4.1 client has a 32 byte option flag */
int4store(buff,mysql->client_flag);
int4store(buff+4, net->max_packet_size);
buff[8]= (char) mysql->charset->number;
memset(buff+9, 0, 32-9);
end= buff+32;
}
else
{
int2store(buff, mysql->client_flag);
int3store(buff+2, net->max_packet_size);
end= buff+5;
}
DBUG_PRINT("info",("Server version = '%s' capabilites: %lu status: %u client_flag: %lu",
mysql->server_version, mysql->server_capabilities,
mysql->server_status, mysql->client_flag));
compile_time_assert(MYSQL_USERNAME_LENGTH == USERNAME_LENGTH);
/* This needs to be changed as it's not useful with big packets */
if (mysql->user[0])
strmake(end, mysql->user, USERNAME_LENGTH);
else
read_user_name(end);
/* We have to handle different version of handshake here */
DBUG_PRINT("info",("user: %s",end));
end= strend(end) + 1;
if (data_len)
{
if (mysql->server_capabilities & CLIENT_SECURE_CONNECTION)
{
/*
Since the older versions of server do not have
CLIENT_PLUGIN_AUTH_LENENC_CLIENT_DATA capability,
a check is performed on this before sending auth data.
If lenenc support is not available, the data is sent
in the format of first byte representing the length of
the string followed by the actual string.
*/
if (mysql->server_capabilities & CLIENT_PLUGIN_AUTH_LENENC_CLIENT_DATA)
end= write_length_encoded_string4(end, (char *)(buff + buff_size),
(char *) data,
(char *)(data + data_len));
else
end= write_string(end, (char *)(buff + buff_size),
(char *) data,
(char *)(data + data_len));
if (end == NULL)
goto error;
}
else
{
DBUG_ASSERT(data_len == SCRAMBLE_LENGTH_323 + 1); /* incl. \0 at the end */
memcpy(end, data, data_len);
end+= data_len;
}
}
else
*end++= 0;
/* Add database if needed */
if (mpvio->db && (mysql->server_capabilities & CLIENT_CONNECT_WITH_DB))
{
end= strmake(end, mpvio->db, NAME_LEN) + 1;
mysql->db= my_strdup(mpvio->db, MYF(MY_WME));
}
if (mysql->server_capabilities & CLIENT_PLUGIN_AUTH)
end= strmake(end, mpvio->plugin->name, NAME_LEN) + 1;
end= (char *) send_client_connect_attrs(mysql, (uchar *) end);
*buff_out = buff;
*buff_len = end - buff;
DBUG_RETURN(FALSE);
error:
if (buff) {
my_free(buff);
}
DBUG_RETURN(TRUE);
}
#ifdef HAVE_OPENSSL
/*
* For SSL connection, client first needs to send a request with
* capabilities to the server so it can then start the SSL exchange.
* The first packet is sent in the `send_client_reply_packet` functions.
*
* Establishes the SSL connection nonblocking or blocking, it will depend
* on what the context it.
*
* Value of `*error` is `true` when an error occurs.
*
* Returns net_async_status
*/
static int run_ssl_connect(MCPVIO_EXT *mpvio, my_bool *error) {
DBUG_ENTER("run_ssl_connect");
MYSQL *mysql = mpvio->mysql;
NET *net= &mysql->net;
Vio *vio = net->vio;
// we need the ssl connection to be done in non blocking not to block
// indefinitelly if server is not reachable
vio_set_blocking(vio, FALSE);
struct st_mysql_options *options= &mysql->options;
// Init all the SSL parts, from FD to ssl pointer, this is the init phase
// for both sync and async ssl connect.
struct st_VioSSLFd *ssl_fd;
enum enum_ssl_init_error ssl_init_error;
/* Create the VioSSLConnectorFd - init SSL and load certs */
if (!mysql->connector_fd) {
if (options->extension && options->extension->ssl_context) {
ssl_fd= new_VioSSLConnectorFdFromContext(options->extension->ssl_context,
&ssl_init_error);
} else {
ssl_fd= new_VioSSLConnectorFd(options->ssl_key,
options->ssl_cert,
options->ssl_ca,
options->ssl_capath,
options->ssl_cipher,
&ssl_init_error,
options->extension ?
options->extension->ssl_crl : NULL,
options->extension ?
options->extension->ssl_crlpath : NULL);
}
if (!ssl_fd) {
set_mysql_extended_error(
mysql,
CR_SSL_CONNECTION_ERROR,
unknown_sqlstate,
ER(CR_SSL_CONNECTION_ERROR),
sslGetErrString(ssl_init_error));
*error = TRUE;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
mysql->connector_fd= (unsigned char *) ssl_fd;
// When a new SSL FD is created, the SSL handshake needs to initialize
// net->ssl as well. This assignment makes sure that SSL this
// initialization will happen.
net->ssl = NULL;
} else {
ssl_fd = (struct st_VioSSLFd *) mysql->connector_fd;
}
SSL_SESSION* ssl_session = options->extension ?
options->extension->ssl_session : NULL;
const char *cert_error;
unsigned long ssl_error = 0;
size_t ret;
if ((ret = (size_t) sslconnect(
ssl_fd,
vio,
timeout_to_seconds(mysql->options.connect_timeout),
ssl_session,
&net->ssl,
&ssl_error))) {
switch (ret) {
case VIO_SOCKET_WANT_READ:
net->async_blocking_state = NET_NONBLOCKING_READ;
DBUG_RETURN(NET_ASYNC_NOT_READY);
case VIO_SOCKET_WANT_WRITE:
net->async_blocking_state = NET_NONBLOCKING_WRITE;
DBUG_RETURN(NET_ASYNC_NOT_READY);
case VIO_SOCKET_READ_TIMEOUT:
*error = TRUE;
set_mysql_error(mysql, CR_NET_READ_INTERRUPTED, unknown_sqlstate);
DBUG_RETURN(NET_ASYNC_COMPLETE);
case VIO_SOCKET_WRITE_TIMEOUT:
*error = TRUE;
set_mysql_error(mysql, CR_NET_WRITE_INTERRUPTED, unknown_sqlstate);
DBUG_RETURN(NET_ASYNC_COMPLETE);
default:
break;
/* continue for error handling */
}
char buf[512];
ERR_error_string_n(ssl_error, buf, 512);
buf[511]= 0;
set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate,
ER(CR_SSL_CONNECTION_ERROR),
buf);
*error = TRUE;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
// free the SSL session early
if (ssl_session) {
SSL_SESSION_free(ssl_session);
options->extension->ssl_session = NULL;
}
DBUG_PRINT("info", ("IO layer change done!"));
/* Verify server cert */
if ((mysql->client_flag & CLIENT_SSL_VERIFY_SERVER_CERT) &&
ssl_verify_server_cert(net->vio, mysql->host, &cert_error))
{
set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate,
ER(CR_SSL_CONNECTION_ERROR), cert_error);
*error = TRUE;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
*error = FALSE;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
#endif
static int send_client_reply_packet(MCPVIO_EXT *mpvio,
const uchar *data, int data_len)
{
DBUG_ENTER("send_client_reply_packet");
MYSQL *mysql= mpvio->mysql;
NET *net= &mysql->net;
char *buff = NULL, *end = NULL;
int buff_len;
my_bool prep_err;
prep_err = prep_client_reply_packet(mpvio, data, data_len, &buff, &buff_len);
if (prep_err) {
DBUG_RETURN(1);
}
#ifdef HAVE_OPENSSL
/*
For SSL we need to establish the SSL negociation before we move forward
with authentication.
*/
if (mysql->client_flag & CLIENT_SSL)
{
// Request is made of the first 32 bytes of the reply:
// 4 capability flags, CLIENT_SSL always set
// 4 max-packet size
// 1 character set
// string[23] reserved (all [0])
if (my_net_write(net, (uchar*) buff, SSLREQUEST_LENGTH) || net_flush(net))
{
set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate,
ER(CR_SERVER_LOST_EXTENDED),
"sending authentication information",
errno);
DBUG_RETURN(1);
}
my_bool error = FALSE;
run_ssl_connect(mpvio, &error);
if (error) {
my_free(buff);
DBUG_RETURN(1);
}
}
#endif
end = buff + buff_len;
/* Write authentication package */
if (my_net_write(net, (uchar*) buff, (size_t) (end-buff)) || net_flush(net))
{
set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate,
ER(CR_SERVER_LOST_EXTENDED),
"sending authentication information",
errno);
my_free(buff);
DBUG_RETURN(1);
}
my_free(buff);
DBUG_RETURN(0);
}
static net_async_status send_client_reply_packet_nonblocking(
MCPVIO_EXT *mpvio,const uchar *pkt, int pkt_len, my_bool *result)
{
DBUG_ENTER("send_client_reply_packet_nonblocking");
MYSQL *mysql= mpvio->mysql;
mysql_authsm_context *ctx = mysql->connect_context->auth_context;
my_bool error = FALSE;
uchar command = COM_END + 1;
if (!ctx->change_user_buff) {
error = prep_client_reply_packet(mpvio, pkt, pkt_len,
&ctx->change_user_buff,
&ctx->change_user_buff_len);
if (error) {
goto end;
}
#ifdef HAVE_OPENSSL
if (mysql->client_flag & CLIENT_SSL)
ctx->ssl_exchange_state = SSL_REQUEST;
else
ctx->ssl_exchange_state = SSL_NONE;
#endif
}
#ifdef HAVE_OPENSSL
/* For SSL we need to establish the SSL negociation before we move forward
with authentication. */
NET *net= &mysql->net;
if (ctx->ssl_exchange_state == SSL_REQUEST) {
net_async_status status =
my_net_write_nonblocking(
net, (uchar*)ctx->change_user_buff, SSLREQUEST_LENGTH, &error);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
if (error) {
goto end;
}
ctx->ssl_exchange_state = SSL_CONNECT;
}
if (ctx->ssl_exchange_state == SSL_CONNECT) {
net->vio->ssl_is_nonblocking = TRUE;
net_async_status status =
run_ssl_connect(mpvio, &error);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
if (error) {
goto end;
}
ctx->ssl_exchange_state = SSL_COMPLETE;
}
#endif
net_async_status status =
simple_command_nonblocking(mysql, command,
(uchar*)ctx->change_user_buff,
ctx->change_user_buff_len, 1, &error);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
end:
*result = error;
my_free(ctx->change_user_buff);
ctx->change_user_buff = NULL;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
/**
vio->read_packet() callback method for client authentication plugins
This function is called by a client authentication plugin, when it wants
to read data from the server.
*/
static int client_mpvio_read_packet(struct st_plugin_vio *mpv, uchar **buf)
{
DBUG_ENTER("client_mpvio_read_packet");
MCPVIO_EXT *mpvio= (MCPVIO_EXT*)mpv;
MYSQL *mysql= mpvio->mysql;
ulong pkt_len;
/* there are cached data left, feed it to a plugin */
if (mpvio->cached_server_reply.pkt)
{
*buf= mpvio->cached_server_reply.pkt;
mpvio->cached_server_reply.pkt= 0;
mpvio->packets_read++;
DBUG_RETURN(mpvio->cached_server_reply.pkt_len);
}
if (mpvio->packets_read == 0)
{
/*
the server handshake packet came from the wrong plugin,
or it's mysql_change_user(). Either way, there is no data
for a plugin to read. send a dummy packet to the server
to initiate a dialog.
*/
if (client_mpvio_write_packet(mpv, 0, 0))
DBUG_RETURN((int)packet_error);
}
/* otherwise read the data */
pkt_len= (*mysql->methods->read_change_user_result)(mysql);
mpvio->last_read_packet_len= pkt_len;
*buf= mysql->net.read_pos;
/* was it a request to change plugins ? */
if (**buf == 254)
DBUG_RETURN((int)packet_error); /* if yes, this plugin shan't continue */
/*
the server sends \1\255 or \1\254 instead of just \255 or \254 -
for us to not confuse it with an error or "change plugin" packets.
We remove this escaping \1 here.
See also server_mpvio_write_packet() where the escaping is done.
*/
if (pkt_len && **buf == 1)
{
(*buf)++;
pkt_len--;
}
mpvio->packets_read++;
DBUG_RETURN(pkt_len);
}
/* Note this actually returns a net_async_status */
static int
client_mpvio_read_packet_nonblocking(struct st_plugin_vio *mpv, uchar **buf,
int *result)
{
DBUG_ENTER(__func__);
MCPVIO_EXT *mpvio= (MCPVIO_EXT*)mpv;
MYSQL *mysql= mpvio->mysql;
ulong pkt_len;
int error;
/* there are cached data left, feed it to a plugin */
if (mpvio->cached_server_reply.pkt)
{
*buf= mpvio->cached_server_reply.pkt;
mpvio->cached_server_reply.pkt= 0;
mpvio->packets_read++;
*result = mpvio->cached_server_reply.pkt_len;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
if (mpvio->packets_read == 0)
{
/*
the server handshake packet came from the wrong plugin,
or it's mysql_change_user(). Either way, there is no data
for a plugin to read. send a dummy packet to the server
to initiate a dialog.
*/
net_async_status status =
client_mpvio_write_packet_nonblocking(mpv, 0, 0, &error);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
if (error) {
*result = (int)packet_error;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
}
mpvio->packets_read++;
/* otherwise read the data */
net_async_status status =
mysql->methods->read_change_user_result_nonblocking(mysql, &pkt_len);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
mpvio->last_read_packet_len= pkt_len;
*buf= mysql->net.read_pos;
/* was it a request to change plugins ? */
if (**buf == 254) {
*result = (int)packet_error;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
/*
the server sends \1\255 or \1\254 instead of just \255 or \254 -
for us to not confuse it with an error or "change plugin" packets.
We remove this escaping \1 here.
See also server_mpvio_write_packet() where the escaping is done.
*/
if (pkt_len && **buf == 1)
{
(*buf)++;
pkt_len--;
}
*result = pkt_len;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
/**
vio->write_packet() callback method for client authentication plugins
This function is called by a client authentication plugin, when it wants
to send data to the server.
It transparently wraps the data into a change user or authentication
handshake packet, if neccessary.
Return @int `1` if it failed
*/
static int client_mpvio_write_packet(struct st_plugin_vio *mpv,
const uchar *pkt, int pkt_len)
{
DBUG_ENTER("client_mpvio_write_packet");
int res;
MCPVIO_EXT *mpvio= (MCPVIO_EXT*)mpv;
if (mpvio->packets_written == 0)
{
if (mpvio->mysql_change_user)
res= send_change_user_packet(mpvio, pkt, pkt_len);
else
res= send_client_reply_packet(mpvio, pkt, pkt_len);
}
else
{
NET *net= &mpvio->mysql->net;
if (mpvio->mysql->thd)
res= 1; /* no chit-chat in embedded */
else
res= my_net_write(net, pkt, pkt_len) || net_flush(net);
if (res)
set_mysql_extended_error(mpvio->mysql, CR_SERVER_LOST, unknown_sqlstate,
ER(CR_SERVER_LOST_EXTENDED),
"sending authentication information",
errno);
}
mpvio->packets_written++;
DBUG_RETURN(res);
}
/**
* Logic is the same as `client_mpvio_write_packet` but for nonblocking
* context.
*
* @param result[out] `-1` when error happens.
*
* @return Returns `int` that stands for `net_async_status`
*/
static int client_mpvio_write_packet_nonblocking(struct st_plugin_vio *mpv,
const uchar *pkt, int pkt_len,
int *result)
{
DBUG_ENTER("client_mpvio_write_packet_nonblocking");
my_bool error = FALSE;
MCPVIO_EXT *mpvio= (MCPVIO_EXT*)mpv;
if (mpvio->packets_written == 0)
{
net_async_status status;
if (mpvio->mysql_change_user) {
status = send_change_user_packet_nonblocking(mpvio, pkt, pkt_len, &error);
} else {
status =
send_client_reply_packet_nonblocking(mpvio, pkt, pkt_len, &error);
}
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
}
else
{
NET *net= &mpvio->mysql->net;
if (mpvio->mysql->thd)
*result= 1; /* no chit-chat in embedded */
else {
net_async_status status =
my_net_write_nonblocking(net, pkt, pkt_len, &error);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
if (error)
set_mysql_extended_error(mpvio->mysql, CR_SERVER_LOST, unknown_sqlstate,
ER(CR_SERVER_LOST_EXTENDED),
"sending authentication information",
errno);
}
}
mpvio->packets_written++;
*result = error ? -1 : 0;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
/**
fills MYSQL_PLUGIN_VIO_INFO structure with the information about the
connection
*/
void mpvio_info(Vio *vio, MYSQL_PLUGIN_VIO_INFO *info)
{
memset(info, 0, sizeof(*info));
switch (vio->type) {
case VIO_TYPE_TCPIP:
info->protocol= MYSQL_VIO_TCP;
info->socket= vio_fd(vio);
return;
case VIO_TYPE_SOCKET:
info->protocol= MYSQL_VIO_SOCKET;
info->socket= vio_fd(vio);
return;
case VIO_TYPE_SSL:
{
struct sockaddr addr;
socklen_t addrlen= sizeof(addr);
if (getsockname(vio_fd(vio), &addr, &addrlen))
return;
info->protocol= addr.sa_family == AF_UNIX ?
MYSQL_VIO_SOCKET : MYSQL_VIO_TCP;
info->socket= vio_fd(vio);
return;
}
#ifdef _WIN32
case VIO_TYPE_NAMEDPIPE:
info->protocol= MYSQL_VIO_PIPE;
info->handle= vio->hPipe;
return;
#ifdef HAVE_SMEM
case VIO_TYPE_SHARED_MEMORY:
info->protocol= MYSQL_VIO_MEMORY;
info->handle= vio->handle_file_map; /* or what ? */
return;
#endif
#endif
default: DBUG_ASSERT(0);
}
}
static void client_mpvio_info(MYSQL_PLUGIN_VIO *vio,
MYSQL_PLUGIN_VIO_INFO *info)
{
MCPVIO_EXT *mpvio= (MCPVIO_EXT*)vio;
mpvio_info(mpvio->mysql->net.vio, info);
}
my_bool libmysql_cleartext_plugin_enabled= 0;
static my_bool check_plugin_enabled(MYSQL *mysql, mysql_authsm_context *ctx)
{
if (ctx->auth_plugin == &clear_password_client_plugin &&
(!libmysql_cleartext_plugin_enabled &&
(!mysql->options.extension ||
!mysql->options.extension->enable_cleartext_plugin)))
{
set_mysql_extended_error(mysql, CR_AUTH_PLUGIN_CANNOT_LOAD,
unknown_sqlstate,
ER(CR_AUTH_PLUGIN_CANNOT_LOAD),
clear_password_client_plugin.name,
"plugin not enabled");
return TRUE;
}
if (ctx->non_blocking &&
!ctx->auth_plugin->authenticate_user_nonblocking) {
set_mysql_extended_error(mysql, CR_AUTH_PLUGIN_CANNOT_LOAD,
unknown_sqlstate,
ER(CR_AUTH_PLUGIN_CANNOT_LOAD),
clear_password_client_plugin.name,
"plugin does not support nonblocking connect");
return TRUE;
}
return FALSE;
}
static mysql_state_machine_status authsm_begin_plugin_auth(mysql_authsm_context *ctx);
static mysql_state_machine_status authsm_run_first_authenticate_user(mysql_authsm_context *ctx);
static mysql_state_machine_status authsm_handle_first_authenticate_user(mysql_authsm_context *ctx);
static mysql_state_machine_status authsm_read_change_user_result(mysql_authsm_context *ctx);
static mysql_state_machine_status authsm_handle_change_user_result(mysql_authsm_context *ctx);
static mysql_state_machine_status authsm_run_second_authenticate_user(mysql_authsm_context *ctx);
static mysql_state_machine_status authsm_handle_second_authenticate_user(mysql_authsm_context *ctx);
static mysql_state_machine_status authsm_finish_auth(mysql_authsm_context *ctx);
/**
Client side of the plugin driver authentication.
@note this is used by both the mysql_real_connect and mysql_change_user
@param mysql mysql
@param data pointer to the plugin auth data (scramble) in the
handshake packet
@param data_len the length of the data
@param data_plugin a plugin that data were prepared for
or 0 if it's mysql_change_user()
@param db initial db to use, can be 0
@retval 0 ok
@retval 1 error
*/
int run_plugin_auth(MYSQL *mysql, char *data, uint data_len,
const char *data_plugin, const char *db)
{
DBUG_ENTER ("run_plugin_auth");
mysql_state_machine_status status;
mysql_authsm_context ctx;
memset(&ctx, '\0', sizeof(ctx));
ctx.mysql = mysql;
ctx.data = data;
ctx.data_len = data_len;
ctx.data_plugin = data_plugin;
ctx.db = db;
ctx.non_blocking = FALSE;
ctx.state_function = authsm_begin_plugin_auth;
do {
status = ctx.state_function(&ctx);
} while (status == STATE_MACHINE_CONTINUE ||
status == STATE_MACHINE_WOULD_BLOCK);
DBUG_RETURN(status == STATE_MACHINE_FAILED);
}
mysql_state_machine_status
run_plugin_auth_nonblocking(MYSQL *mysql, char *data, uint data_len,
const char *data_plugin, const char *db)
{
DBUG_ENTER (__func__);
mysql_authsm_context *ctx = mysql->connect_context->auth_context;
if (!ctx) {
ctx = my_malloc(sizeof(*ctx), MYF(MY_WME | MY_ZEROFILL));
ctx->mysql = mysql;
ctx->data = data;
ctx->data_len = data_len;
ctx->data_plugin = data_plugin;
ctx->db = db;
ctx->non_blocking = TRUE;
ctx->state_function = authsm_begin_plugin_auth;
mysql->connect_context->auth_context = ctx;
}
mysql_state_machine_status ret = ctx->state_function(ctx);
if (ret == STATE_MACHINE_FAILED ||
ret == STATE_MACHINE_DONE) {
my_free(ctx);
mysql->connect_context->auth_context = NULL;
}
DBUG_RETURN(ret);
}
/* Begin plugin-based authentication */
static mysql_state_machine_status
authsm_begin_plugin_auth(mysql_authsm_context *ctx)
{
DBUG_ENTER(__func__);
MYSQL *mysql = ctx->mysql;
/* determine the default/initial plugin to use */
if (mysql->options.extension && mysql->options.extension->default_auth &&
mysql->server_capabilities & CLIENT_PLUGIN_AUTH)
{
ctx->auth_plugin_name= mysql->options.extension->default_auth;
if (!(ctx->auth_plugin= (auth_plugin_t*) mysql_client_find_plugin(mysql,
ctx->auth_plugin_name, MYSQL_CLIENT_AUTHENTICATION_PLUGIN)))
DBUG_RETURN(STATE_MACHINE_FAILED); /* oops, not found */
}
else
{
ctx->auth_plugin= mysql->server_capabilities & CLIENT_PROTOCOL_41 ?
&native_password_client_plugin : &old_password_client_plugin;
ctx->auth_plugin_name= ctx->auth_plugin->name;
}
if (check_plugin_enabled(mysql, ctx))
DBUG_RETURN(STATE_MACHINE_FAILED);
DBUG_PRINT ("info", ("using plugin %s", ctx->auth_plugin_name));
mysql->net.last_errno= 0; /* just in case */
if (ctx->data_plugin && strcmp(ctx->data_plugin, ctx->auth_plugin_name))
{
/* data was prepared for a different plugin, don't show it to this one */
ctx->data= 0;
ctx->data_len= 0;
}
ctx->mpvio.mysql_change_user= ctx->data_plugin == 0;
ctx->mpvio.cached_server_reply.pkt= (uchar*)ctx->data;
ctx->mpvio.cached_server_reply.pkt_len= ctx->data_len;
ctx->mpvio.base.read_packet= client_mpvio_read_packet;
ctx->mpvio.base.write_packet= client_mpvio_write_packet;
ctx->mpvio.base.read_packet_nonblocking= client_mpvio_read_packet_nonblocking;
ctx->mpvio.base.write_packet_nonblocking= client_mpvio_write_packet_nonblocking;
ctx->mpvio.base.info= client_mpvio_info;
ctx->mpvio.base.mysql= mysql;
ctx->mpvio.mysql= mysql;
ctx->mpvio.packets_read= ctx->mpvio.packets_written= 0;
ctx->mpvio.db= ctx->db;
ctx->mpvio.plugin= ctx->auth_plugin;
ctx->native_client_state = READING_PASSWORD;
ctx->state_function = authsm_run_first_authenticate_user;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
/* Authentication can have two authenticate_user calls, depending on
* what the server responds with; this handles the first. */
static mysql_state_machine_status
authsm_run_first_authenticate_user(mysql_authsm_context *ctx)
{
DBUG_ENTER("authsm_run_first_authenticate_user");
MYSQL *mysql = ctx->mysql;
if (ctx->non_blocking) {
net_async_status status = ctx->auth_plugin->authenticate_user_nonblocking(
(struct st_plugin_vio *)&ctx->mpvio, mysql, &ctx->res);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(STATE_MACHINE_WOULD_BLOCK);
}
} else {
ctx->res= ctx->auth_plugin->authenticate_user((struct st_plugin_vio *)&ctx->mpvio, mysql);
}
ctx->state_function = authsm_handle_first_authenticate_user;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
/* Handle the result of the first authenticate_user. */
static mysql_state_machine_status
authsm_handle_first_authenticate_user(mysql_authsm_context *ctx)
{
DBUG_ENTER(__func__);
MYSQL *mysql = ctx->mysql;
DBUG_PRINT ("info", ("authenticate_user returned %s",
ctx->res == CR_OK ? "CR_OK" :
ctx->res == CR_ERROR ? "CR_ERROR" :
ctx->res == CR_OK_HANDSHAKE_COMPLETE ?
"CR_OK_HANDSHAKE_COMPLETE" : "error"));
compile_time_assert(CR_OK == -1);
compile_time_assert(CR_ERROR == 0);
/*
The connection may be closed. If so: do not try to read from the buffer.
*/
if (ctx->res > CR_OK &&
(!my_net_is_inited(&mysql->net) || mysql->net.read_pos[0] != 254))
{
/*
the plugin returned an error. write it down in mysql,
unless the error code is CR_ERROR and mysql->net.last_errno
is already set (the plugin has done it)
*/
DBUG_PRINT ("info", ("ctx->res=%d", ctx->res));
if (ctx->res > CR_ERROR)
set_mysql_error(mysql, ctx->res, unknown_sqlstate);
else
if (!mysql->net.last_errno)
set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
ctx->state_function = authsm_read_change_user_result;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
/* After the first authenticate_user comes a call to read the result
of the implied change_user. */
static mysql_state_machine_status
authsm_read_change_user_result(mysql_authsm_context *ctx)
{
DBUG_ENTER("authsm_read_change_user_result");
MYSQL *mysql = ctx->mysql;
/* read the OK packet (or use the cached value in mysql->net.read_pos */
if (ctx->res == CR_OK) {
if (ctx->non_blocking) {
net_async_status status =
(*mysql->methods->read_change_user_result_nonblocking)(mysql, &ctx->pkt_length);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(STATE_MACHINE_WOULD_BLOCK);
}
} else {
ctx->pkt_length= (*mysql->methods->read_change_user_result)(mysql);
}
}
else /* ctx->res == CR_OK_HANDSHAKE_COMPLETE */
ctx->pkt_length= ctx->mpvio.last_read_packet_len;
ctx->state_function = authsm_handle_change_user_result;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
/* Handle the change_user result.*/
static mysql_state_machine_status
authsm_handle_change_user_result(mysql_authsm_context *ctx)
{
DBUG_ENTER(__func__);
MYSQL *mysql = ctx->mysql;
DBUG_PRINT ("info", ("OK packet length=%lu", ctx->pkt_length));
if (ctx->pkt_length == packet_error)
{
if (mysql->net.last_errno == CR_SERVER_LOST) {
set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate,
ER(CR_SERVER_LOST_EXTENDED),
"reading authorization packet",
errno);
}
DBUG_RETURN(STATE_MACHINE_FAILED);
}
if (mysql->net.read_pos[0] == 254) {
if (ctx->non_blocking) {
set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate,
ER(CR_SERVER_LOST_EXTENDED),
"nonblocking does not support second auth round",
errno);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
ctx->state_function = authsm_run_second_authenticate_user;
}
else
ctx->state_function = authsm_finish_auth;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
/* We may have another authenticate_user call; this handles the send
of that case.*/
static mysql_state_machine_status
authsm_run_second_authenticate_user(mysql_authsm_context *ctx)
{
DBUG_ENTER("authsm_run_second_authenticate_user");
MYSQL *mysql = ctx->mysql;
/* The server asked to use a different authentication plugin */
if (ctx->pkt_length == 1)
{
/* old "use short scramble" packet */
DBUG_PRINT ("info", ("old use short scramble packet from server"));
ctx->auth_plugin_name= old_password_plugin_name;
ctx->mpvio.cached_server_reply.pkt= (uchar*)mysql->scramble;
ctx->mpvio.cached_server_reply.pkt_len= SCRAMBLE_LENGTH + 1;
}
else
{
/* new "use different plugin" packet */
uint len;
ctx->auth_plugin_name= (char*)mysql->net.read_pos + 1;
len= strlen(ctx->auth_plugin_name); /* safe as my_net_read always appends \0 */
ctx->mpvio.cached_server_reply.pkt_len= ctx->pkt_length - len - 2;
ctx->mpvio.cached_server_reply.pkt= mysql->net.read_pos + len + 2;
DBUG_PRINT ("info", ("change plugin packet from server for plugin %s",
ctx->auth_plugin_name));
}
if (!(ctx->auth_plugin= (auth_plugin_t *) mysql_client_find_plugin(mysql,
ctx->auth_plugin_name, MYSQL_CLIENT_AUTHENTICATION_PLUGIN)))
DBUG_RETURN(STATE_MACHINE_FAILED);
if (check_plugin_enabled(mysql, ctx))
DBUG_RETURN(STATE_MACHINE_FAILED);
ctx->mpvio.plugin= ctx->auth_plugin;
ctx->res= ctx->auth_plugin->authenticate_user((struct st_plugin_vio *)&ctx->mpvio, mysql);
ctx->state_function = authsm_handle_second_authenticate_user;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
/* Now read the results.*/
static mysql_state_machine_status
authsm_handle_second_authenticate_user(mysql_authsm_context *ctx)
{
DBUG_ENTER(__func__);
MYSQL *mysql = ctx->mysql;
DBUG_PRINT ("info", ("second authenticate_user returned %s",
ctx->res == CR_OK ? "CR_OK" :
ctx->res == CR_ERROR ? "CR_ERROR" :
ctx->res == CR_OK_HANDSHAKE_COMPLETE ?
"CR_OK_HANDSHAKE_COMPLETE" : "error"));
if (ctx->res > CR_OK)
{
if (ctx->res > CR_ERROR)
set_mysql_error(mysql, ctx->res, unknown_sqlstate);
else
if (!mysql->net.last_errno)
set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
if (ctx->res != CR_OK_HANDSHAKE_COMPLETE)
{
/* Read what server thinks about out new auth message report */
if (cli_safe_read(mysql, NULL) == packet_error)
{
if (mysql->net.last_errno == CR_SERVER_LOST)
set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate,
ER(CR_SERVER_LOST_EXTENDED),
"reading final connect information",
errno);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
}
/*
net->read_pos[0] should always be 0 here if the server implements
the protocol correctly
*/
ctx->state_function = authsm_finish_auth;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
/* Final cleanup */
static mysql_state_machine_status
authsm_finish_auth(mysql_authsm_context *ctx)
{
DBUG_ENTER(__func__);
MYSQL *mysql = ctx->mysql;
if (mysql->net.read_pos[0] != 0) {
DBUG_RETURN(STATE_MACHINE_FAILED);
} else {
DBUG_RETURN(STATE_MACHINE_DONE);
}
}
/** set some default attributes */
static int
set_connect_attributes(MYSQL *mysql, char *buff, size_t buf_len)
{
int rc= 0;
/*
Clean up any values set by the client code. We want these options as
consistent as possible
*/
rc+= mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_client_name");
rc+= mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_os");
rc+= mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_platform");
rc+= mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_pid");
rc+= mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_thread");
rc+= mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_client_version");
/*
Now let's set up some values
*/
rc+= mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD,
"_client_name", "libmysql");
rc+= mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD,
"_client_version", PACKAGE_VERSION);
rc+= mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD,
"_os", SYSTEM_TYPE);
rc+= mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD,
"_platform", MACHINE_TYPE);
#ifdef __WIN__
snprintf(buff, buf_len, "%lu", (ulong) GetCurrentProcessId());
#else
snprintf(buff, buf_len, "%lu", (ulong) getpid());
#endif
rc+= mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD, "_pid", buff);
#ifdef __WIN__
snprintf(buff, buf_len, "%lu", (ulong) GetCurrentThreadId());
rc+= mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD, "_thread", buff);
#endif
return rc > 0 ? 1 : 0;
}
/* The above context is used for several functions; each reads and
writes various portions of it. The order of the functions are
listed in the order of the actual connection process. */
static mysql_state_machine_status csm_begin_connect(mysql_csm_context *ctx);
static mysql_state_machine_status csm_complete_connect(mysql_csm_context *ctx);
static mysql_state_machine_status csm_read_greeting(mysql_csm_context *ctx);
static mysql_state_machine_status csm_parse_handshake(mysql_csm_context *ctx);
static mysql_state_machine_status csm_authenticate(mysql_csm_context *ctx);
static mysql_state_machine_status csm_prep_select_database(mysql_csm_context *ctx);
static mysql_state_machine_status csm_send_select_database(mysql_csm_context *ctx);
#ifndef MYSQL_SERVER
static mysql_state_machine_status csm_prep_init_commands(mysql_csm_context *ctx);
static mysql_state_machine_status csm_send_one_init_command(mysql_csm_context *ctx);
static mysql_state_machine_status csm_free_init_command_results_nonblocking(mysql_csm_context *ctx);
static mysql_state_machine_status csm_next_init_command_results_nonblocking(mysql_csm_context *ctx);
static mysql_state_machine_status csm_use_init_commands_results_nonblocking(mysql_csm_context *ctx);
static mysql_state_machine_status csm_send_init_commands_nonblocking(mysql_csm_context *ctx);
static mysql_state_machine_status csm_next_init_command_nonblocking(mysql_csm_context *ctx);
#endif
int STDCALL
mysql_get_file_descriptor(MYSQL *mysql) {
if (mysql && mysql->net.vio) {
return vio_fd(mysql->net.vio);
}
return -1;
}
/* The connect function itself, now split to use contexts and the
above functions. */
MYSQL * STDCALL
CLI_MYSQL_REAL_CONNECT(MYSQL *mysql,const char *host, const char *user,
const char *passwd, const char *db,
uint port, const char *unix_socket,ulong client_flag)
{
mysql_state_machine_status status;
mysql_csm_context ctx;
DBUG_ENTER("real_connect");
memset(&ctx, '\0', sizeof(ctx));
ctx.mysql = mysql;
ctx.host = host;
ctx.port = port;
ctx.db = db;
ctx.user = user;
ctx.passwd = passwd;
ctx.unix_socket = unix_socket;
ctx.client_flag = client_flag;
ctx.state_function = csm_begin_connect;
mysql->connect_context = &ctx;
do {
status = ctx.state_function(&ctx);
} while (status != STATE_MACHINE_FAILED && status != STATE_MACHINE_DONE);
if (status == STATE_MACHINE_DONE) {
mysql->connect_context = NULL;
DBUG_RETURN(mysql);
}
if (mysql->net.vio) {
vio_delete(mysql->net.vio);
}
mysql->net.vio = 0;
DBUG_PRINT("error",("message: %u/%s (%s)",
mysql->net.last_errno,
mysql->net.sqlstate,
mysql->net.last_error));
/* Free alloced memory */
end_server(mysql);
mysql_close_free(mysql);
if (!(client_flag & CLIENT_REMEMBER_OPTIONS)) {
mysql_close_free_options(mysql);
}
mysql->connect_context = NULL;
DBUG_RETURN(0);
}
my_bool STDCALL
mysql_real_connect_nonblocking_init(MYSQL *mysql,const char *host,
const char *user,
const char *passwd, const char *db,
uint port, const char *unix_socket,
ulong client_flag)
{
mysql_csm_context *ctx;
DBUG_ENTER(__func__);
ctx = my_malloc(sizeof(*ctx), MYF(MY_WME | MY_ZEROFILL));
if (!ctx) {
DBUG_RETURN(FALSE);
}
ctx->mysql = mysql;
ctx->host = host;
ctx->port = port;
ctx->db = db;
ctx->user = user;
ctx->passwd = passwd;
ctx->unix_socket = unix_socket;
ctx->client_flag = client_flag;
ctx->non_blocking = TRUE;
ctx->state_function = csm_begin_connect;
mysql->connect_context = ctx;
mysql->async_op_status = ASYNC_OP_CONNECT;
DBUG_RETURN(TRUE);
}
net_async_status STDCALL
mysql_real_connect_nonblocking_run(MYSQL *mysql, int* error)
{
DBUG_ENTER(__func__);
*error = 1;
mysql_csm_context *ctx = mysql->connect_context;
mysql_state_machine_status status = ctx->state_function(ctx);
while (status == STATE_MACHINE_CONTINUE) {
status = ctx->state_function(ctx);
}
if (status == STATE_MACHINE_WOULD_BLOCK) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
if (status == STATE_MACHINE_DONE) {
*error = 0;
goto done;
}
/* error was encountered */
if (mysql->net.vio) {
vio_delete(mysql->net.vio);
}
mysql->net.vio = 0;
DBUG_PRINT("error",("message: %u/%s (%s)",
mysql->net.last_errno,
mysql->net.sqlstate,
mysql->net.last_error));
{
/* Free alloced memory */
end_server(mysql);
mysql_close_free(mysql);
if (!(ctx->client_flag & CLIENT_REMEMBER_OPTIONS))
mysql_close_free_options(mysql);
}
done:
my_free(mysql->connect_context);
mysql->connect_context = NULL;
mysql->async_op_status = ASYNC_OP_UNSET;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
/*
Begin the connection to the server, including any DNS resolution
necessary, socket configuration, etc.
*/
static mysql_state_machine_status
csm_begin_connect(mysql_csm_context *ctx) {
/* copy ctx variables for local use to keep future merges simpler */
MYSQL *mysql = ctx->mysql;
const char *host = ctx->host;
const char *user = ctx->user;
const char *passwd = ctx->passwd;
const char *db = ctx->db;
uint port = ctx->port;
const char *unix_socket = ctx->unix_socket;
ulong client_flag = ctx->client_flag;
NET *net= &mysql->net;
#ifdef __WIN__
HANDLE hPipe=INVALID_HANDLE_VALUE;
#endif
#ifdef HAVE_SYS_UN_H
struct sockaddr_un UNIXaddr;
#endif
DBUG_ENTER(__func__);
DBUG_PRINT("enter",("host: %s db: %s user: %s (client)",
host ? host : "(Null)",
db ? db : "(Null)",
user ? user : "(Null)"));
/* Test whether we're already connected */
if (net->vio)
{
set_mysql_error(mysql, CR_ALREADY_CONNECTED, unknown_sqlstate);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
if (set_connect_attributes(mysql, ctx->buff, sizeof(ctx->buff)))
DBUG_RETURN(STATE_MACHINE_FAILED);
mysql->methods= &client_methods;
net->vio = 0; /* If something goes wrong */
mysql->client_flag=0; /* For handshake */
/* use default options */
if (mysql->options.my_cnf_file || mysql->options.my_cnf_group)
{
mysql_read_default_options(&mysql->options,
(mysql->options.my_cnf_file ?
mysql->options.my_cnf_file : "my"),
mysql->options.my_cnf_group);
my_free(mysql->options.my_cnf_file);
my_free(mysql->options.my_cnf_group);
mysql->options.my_cnf_file=mysql->options.my_cnf_group=0;
}
/* Some empty-string-tests are done because of ODBC */
if (!host || !host[0])
host=mysql->options.host;
if (!user || !user[0])
{
user=mysql->options.user;
if (!user)
user= "";
}
if (!passwd)
{
passwd=mysql->options.password;
#if !defined(DONT_USE_MYSQL_PWD) && !defined(MYSQL_SERVER)
if (!passwd)
passwd=getenv("MYSQL_PWD"); /* get it from environment */
#endif
if (!passwd)
passwd= "";
}
if (!db || !db[0])
db=mysql->options.db;
if (!port)
port=mysql->options.port;
if (!unix_socket)
unix_socket=mysql->options.unix_socket;
mysql->server_status=SERVER_STATUS_AUTOCOMMIT;
DBUG_PRINT("info", ("Connecting"));
#if defined(HAVE_SMEM)
if ((!mysql->options.protocol ||
mysql->options.protocol == MYSQL_PROTOCOL_MEMORY) &&
(!host || !strcmp(host,LOCAL_HOST)))
{
HANDLE handle_map;
DBUG_PRINT("info", ("Using shared memory"));
handle_map= create_shared_memory(mysql, net,
get_win32_connect_timeout(mysql));
if (handle_map == INVALID_HANDLE_VALUE)
{
DBUG_PRINT("error",
("host: '%s' socket: '%s' shared memory: %s have_tcpip: %d",
host ? host : "<null>",
unix_socket ? unix_socket : "<null>",
(int) mysql->options.shared_memory_base_name,
(int) have_tcpip));
if (mysql->options.protocol == MYSQL_PROTOCOL_MEMORY)
DBUG_RETURN(STATE_MACHINE_FAILED);
/*
Try also with PIPE or TCP/IP. Clear the error from
create_shared_memory().
*/
net_clear_error(net);
}
else
{
mysql->options.protocol=MYSQL_PROTOCOL_MEMORY;
unix_socket = 0;
host=mysql->options.shared_memory_base_name;
my_snprintf(ctx->host_info=ctx->buff, sizeof(ctx->buff)-1,
ER(CR_SHARED_MEMORY_CONNECTION), host);
}
}
#endif /* HAVE_SMEM */
#if defined(HAVE_SYS_UN_H)
if (!net->vio &&
(!mysql->options.protocol ||
mysql->options.protocol == MYSQL_PROTOCOL_SOCKET) &&
(unix_socket || mysql_unix_port) &&
(!host || !strcmp(host,LOCAL_HOST)))
{
my_socket sock= socket(AF_UNIX, SOCK_STREAM, 0);
DBUG_PRINT("info", ("Using socket"));
if (sock == SOCKET_ERROR)
{
set_mysql_extended_error(mysql, CR_SOCKET_CREATE_ERROR,
unknown_sqlstate,
ER(CR_SOCKET_CREATE_ERROR),
socket_errno);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
net->vio= vio_new(sock, VIO_TYPE_SOCKET,
VIO_LOCALHOST | VIO_BUFFERED_READ);
if (!net->vio)
{
DBUG_PRINT("error",("Unknown protocol %d ", mysql->options.protocol));
set_mysql_error(mysql, CR_CONN_UNKNOW_PROTOCOL, unknown_sqlstate);
closesocket(sock);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
host= LOCAL_HOST;
if (!unix_socket)
unix_socket= mysql_unix_port;
ctx->host_info= (char*) ER(CR_LOCALHOST_CONNECTION);
DBUG_PRINT("info", ("Using UNIX sock '%s'", unix_socket));
memset(&UNIXaddr, 0, sizeof(UNIXaddr));
UNIXaddr.sun_family= AF_UNIX;
strmake(UNIXaddr.sun_path, unix_socket, sizeof(UNIXaddr.sun_path)-1);
if (vio_socket_connect(net->vio, (struct sockaddr *) &UNIXaddr,
sizeof(UNIXaddr), ctx->non_blocking,
get_vio_connect_timeout(mysql)))
{
DBUG_PRINT("error",("Got error %d on connect to local server",
socket_errno));
set_mysql_extended_error(mysql, CR_CONNECTION_ERROR,
unknown_sqlstate,
ER(CR_CONNECTION_ERROR),
unix_socket, socket_errno);
vio_delete(net->vio);
net->vio= 0;
DBUG_RETURN(STATE_MACHINE_FAILED);
}
mysql->options.protocol=MYSQL_PROTOCOL_SOCKET;
}
#elif defined(_WIN32)
if (!net->vio &&
(mysql->options.protocol == MYSQL_PROTOCOL_PIPE ||
(host && !strcmp(host,LOCAL_HOST_NAMEDPIPE)) ||
(! have_tcpip && (unix_socket || !host && is_NT()))))
{
hPipe= create_named_pipe(mysql, get_win32_connect_timeout(mysql),
&host, &unix_socket);
if (hPipe == INVALID_HANDLE_VALUE)
{
DBUG_PRINT("error",
("host: '%s' socket: '%s' have_tcpip: %d",
host ? host : "<null>",
unix_socket ? unix_socket : "<null>",
(int) have_tcpip));
if (mysql->options.protocol == MYSQL_PROTOCOL_PIPE ||
(host && !strcmp(host,LOCAL_HOST_NAMEDPIPE)) ||
(unix_socket && !strcmp(unix_socket,MYSQL_NAMEDPIPE)))
DBUG_RETURN(STATE_MACHINE_FAILED);
/* Try also with TCP/IP */
}
else
{
net->vio= vio_new_win32pipe(hPipe);
my_snprintf(ctx->host_info=ctx->buff, sizeof(ctx->buff)-1,
ER(CR_NAMEDPIPE_CONNECTION), unix_socket);
}
}
#endif
DBUG_PRINT("info", ("net->vio: %p protocol: %d",
net->vio, mysql->options.protocol));
if (!net->vio &&
(!mysql->options.protocol ||
mysql->options.protocol == MYSQL_PROTOCOL_TCP))
{
struct addrinfo *res_lst, *client_bind_ai_lst= NULL, hints, *t_res;
char port_buf[NI_MAXSERV];
my_socket sock= SOCKET_ERROR;
int gai_errno, saved_error= 0, status= -1, bind_result= 0;
uint flags= VIO_BUFFERED_READ;
unix_socket=0; /* This is not used */
if (!port)
port= mysql_port;
if (!host)
host= LOCAL_HOST;
my_snprintf(ctx->host_info=ctx->buff,
sizeof(ctx->buff)-1, ER(CR_TCP_CONNECTION), host);
DBUG_PRINT("info",("Server name: '%s'. TCP sock: %d", host, port));
memset(&hints, 0, sizeof(hints));
hints.ai_socktype= SOCK_STREAM;
hints.ai_protocol= IPPROTO_TCP;
hints.ai_family= AF_UNSPEC;
DBUG_PRINT("info",("IPV6 getaddrinfo %s", host));
my_snprintf(port_buf, NI_MAXSERV, "%d", port);
gai_errno= getaddrinfo(host, port_buf, &hints, &res_lst);
if (gai_errno != 0)
{
/*
For DBUG we are keeping the right message but for client we default to
historical error message.
*/
DBUG_PRINT("info",("IPV6 getaddrinfo error %d", gai_errno));
set_mysql_extended_error(mysql, CR_UNKNOWN_HOST, unknown_sqlstate,
ER(CR_UNKNOWN_HOST), host, errno);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
/* Get address info for client bind name if it is provided */
if (mysql->options.ci.bind_address)
{
int bind_gai_errno= 0;
DBUG_PRINT("info",("Resolving addresses for client bind: '%s'",
mysql->options.ci.bind_address));
/* Lookup address info for name */
bind_gai_errno= getaddrinfo(mysql->options.ci.bind_address, 0,
&hints, &client_bind_ai_lst);
if (bind_gai_errno)
{
DBUG_PRINT("info",("client bind getaddrinfo error %d", bind_gai_errno));
set_mysql_extended_error(mysql, CR_UNKNOWN_HOST, unknown_sqlstate,
ER(CR_UNKNOWN_HOST),
mysql->options.ci.bind_address,
bind_gai_errno);
freeaddrinfo(res_lst);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
DBUG_PRINT("info", (" got address info for client bind name"));
}
/*
A hostname might map to multiple IP addresses (IPv4/IPv6). Go over the
list of IP addresses until a successful connection can be established.
For each IP address, attempt to bind the socket to each client address
for the client-side bind hostname until the bind is successful.
*/
DBUG_PRINT("info", ("Try connect on all addresses for host."));
for (t_res= res_lst; t_res; t_res= t_res->ai_next)
{
DBUG_PRINT("info", ("Create socket, family: %d type: %d proto: %d",
t_res->ai_family, t_res->ai_socktype,
t_res->ai_protocol));
sock= socket(t_res->ai_family, t_res->ai_socktype, t_res->ai_protocol);
if (sock == SOCKET_ERROR)
{
DBUG_PRINT("info", ("Socket created was invalid"));
/* Try next address if there is one */
saved_error= socket_errno;
continue;
}
if (client_bind_ai_lst)
{
struct addrinfo *curr_bind_ai= NULL;
DBUG_PRINT("info", ("Attempting to bind socket to bind address(es)"));
/*
We'll attempt to bind to each of the addresses returned, until
we find one that works.
If none works, we'll try the next destination host address
(if any)
*/
curr_bind_ai= client_bind_ai_lst;
while (curr_bind_ai != NULL)
{
/* Attempt to bind the socket to the given address */
bind_result= bind(sock,
curr_bind_ai->ai_addr,
curr_bind_ai->ai_addrlen);
if (!bind_result)
break; /* Success */
DBUG_PRINT("info", ("bind failed, attempting another bind address"));
/* Problem with the bind, move to next address if present */
curr_bind_ai= curr_bind_ai->ai_next;
}
if (bind_result)
{
/*
Could not bind to any client-side address with this destination
Try the next destination address (if any)
*/
DBUG_PRINT("info", ("All bind attempts with this address failed"));
saved_error= socket_errno;
closesocket(sock);
continue;
}
DBUG_PRINT("info", ("Successfully bound client side of socket"));
}
/* Create a new Vio object to abstract the socket. */
if (!net->vio)
{
if (!(net->vio= vio_new(sock, VIO_TYPE_TCPIP, flags)))
{
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
closesocket(sock);
freeaddrinfo(res_lst);
if (client_bind_ai_lst)
freeaddrinfo(client_bind_ai_lst);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
}
/* Just reinitialize if one is already allocated. */
else if (vio_reset(net->vio, VIO_TYPE_TCPIP, sock, NULL, flags))
{
set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate);
/* Mark as inactive so vio_delete doesn't double-close this */
net->vio->inactive = TRUE;
closesocket(sock);
freeaddrinfo(res_lst);
if (client_bind_ai_lst)
freeaddrinfo(client_bind_ai_lst);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
if (net->receive_buffer_size &&
setsockopt(net->vio->mysql_socket.fd, SOL_SOCKET, SO_RCVBUF,
&net->receive_buffer_size,
sizeof(net->receive_buffer_size)) == -1)
DBUG_PRINT("error", ("Failed to set SO_RCVBUF with (error: %s).",
strerror(errno)));
DBUG_PRINT("info", ("Connect socket"));
status= vio_socket_connect(net->vio, t_res->ai_addr, t_res->ai_addrlen,
ctx->non_blocking, get_vio_connect_timeout(mysql));
/*
Here we rely on vio_socket_connect() to return success only if
the connect attempt was really successful. Otherwise we would
stop trying another address, believing we were successful.
*/
if (!status)
break;
/*
Save either the socket error status or the error code of
the failed vio_connection operation. It is necessary to
avoid having it overwritten by later operations.
*/
saved_error= socket_errno;
DBUG_PRINT("info", ("No success, try next address."));
}
DBUG_PRINT("info",
("End of connect attempts, sock: %d status: %d error: %d",
sock, status, saved_error));
freeaddrinfo(res_lst);
if (client_bind_ai_lst)
freeaddrinfo(client_bind_ai_lst);
if (sock == SOCKET_ERROR)
{
set_mysql_extended_error(mysql, CR_IPSOCK_ERROR, unknown_sqlstate,
ER(CR_IPSOCK_ERROR), saved_error);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
if (status)
{
DBUG_PRINT("error",("Got error %d on connect to '%s'", saved_error, host));
set_mysql_extended_error(mysql, CR_CONN_HOST_ERROR, unknown_sqlstate,
ER(CR_CONN_HOST_ERROR), host, saved_error);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
}
ctx->state_function = csm_complete_connect;
ctx->host = host;
ctx->user = user;
ctx->passwd = passwd;
ctx->db = db;
ctx->port = port;
ctx->unix_socket = unix_socket;
ctx->client_flag = client_flag;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
const char* mysql_compression_lib_names[] = {"none", "zlib", "zstd", "zstd_stream", "lz4f_stream", NullS};
enum mysql_compression_lib get_client_compression_enum(const char* comp_lib) {
unsigned i = 0;
while(mysql_compression_lib_names[i]) {
if (strcmp(mysql_compression_lib_names[i], comp_lib) == 0) {
return i;
}
i++;
}
return MYSQL_COMPRESSION_ZLIB;
}
/* Complete the connection itself, setting options on the
now-connected socket. */
static mysql_state_machine_status
csm_complete_connect(mysql_csm_context *ctx)
{
MYSQL *mysql = ctx->mysql;
NET *net= &mysql->net;
int res;
DBUG_ENTER(__func__);
DBUG_PRINT("info", ("net->vio: %p", net->vio));
if (!net->vio)
{
DBUG_PRINT("error",("Unknown protocol %d ",mysql->options.protocol));
set_mysql_error(mysql, CR_CONN_UNKNOW_PROTOCOL, unknown_sqlstate);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
res = vio_io_wait(net->vio, VIO_IO_EVENT_CONNECT, timeout_from_seconds(0));
if (res == -1) {
DBUG_PRINT("error",("Got error %d on connect to '%s'", errno, ctx->host));
set_mysql_extended_error(mysql, CR_CONN_HOST_ERROR, unknown_sqlstate,
ER(CR_CONN_HOST_ERROR), ctx->host, errno);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
if (res == 0) {
net->async_blocking_state = NET_NONBLOCKING_WRITE;
DBUG_RETURN(STATE_MACHINE_WOULD_BLOCK);
}
DBUG_ASSERT(res == 1);
// Go back to blocking mode, except if ssl is involved; the timeout
// for connects relies on using non-blocking mode, so we must
// restore blocking.
if (!ctx->non_blocking && !(mysql->client_flag & CLIENT_SSL)) {
vio_set_blocking(net->vio, TRUE);
}
{
int error;
socklen_t error_len = sizeof(error);
res = mysql_socket_getsockopt(net->vio->mysql_socket, SOL_SOCKET, SO_ERROR,
(void*)&error, &error_len);
if (res != 0 || error != 0) {
DBUG_PRINT("error",("Got error %d on connect result to '%s'",
error, ctx->host));
set_mysql_extended_error(mysql, CR_CONN_HOST_ERROR, unknown_sqlstate,
ER(CR_CONN_HOST_ERROR), ctx->host, error);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
}
if (my_net_init(net, net->vio))
{
vio_delete(net->vio);
net->vio = 0;
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
vio_keepalive(net->vio,TRUE);
LEX_STRING *comp_lib = (LEX_STRING *)
my_hash_search(&mysql->options.extension->connection_attributes,
(const void *)"compression_lib", strlen("compression_lib"));
if (comp_lib) {
LEX_STRING *val = comp_lib + 1;
if (val->str) {
net->comp_lib = get_client_compression_enum(val->str);
}
}
/* If user set read_timeout, let it override the default */
if (timeout_is_nonzero(mysql->options.read_timeout))
my_net_set_read_timeout(net, mysql->options.read_timeout);
/* If user set write_timeout, let it override the default */
if (timeout_is_nonzero(mysql->options.write_timeout))
my_net_set_write_timeout(net, mysql->options.write_timeout);
if (mysql->options.max_allowed_packet)
net->max_packet_size= mysql->options.max_allowed_packet;
/* Wait until socket is readable for (blocking mode only) */
mysql->protocol_version= PROTOCOL_VERSION; /* Assume this */
if (timeout_is_nonzero(mysql->options.connect_timeout) &&
!ctx->non_blocking &&
(vio_io_wait(net->vio, VIO_IO_EVENT_READ,
get_vio_connect_timeout(mysql)) < 1))
{
set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate,
ER(CR_SERVER_LOST_EXTENDED),
"waiting for initial communication packet",
socket_errno);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
ctx->state_function = csm_read_greeting;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
/* Read the greeting from the server */
static mysql_state_machine_status
csm_read_greeting(mysql_csm_context *ctx)
{
MYSQL *mysql = ctx->mysql;
DBUG_ENTER(__func__);
if (ctx->non_blocking) {
net_async_status status = cli_safe_read_nonblocking(mysql,
&ctx->pkt_length, NULL);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(STATE_MACHINE_WOULD_BLOCK);
}
} else {
ctx->pkt_length=cli_safe_read(mysql, NULL);
}
if (ctx->pkt_length == packet_error) {
if (mysql->net.last_errno == CR_SERVER_LOST)
set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate,
ER(CR_SERVER_LOST_EXTENDED),
"reading initial communication packet",
socket_errno);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
ctx->state_function = csm_parse_handshake;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
/* Parse the handshake from the server. */
static mysql_state_machine_status
csm_parse_handshake(mysql_csm_context *ctx)
{
MYSQL *mysql = ctx->mysql;
int pkt_length = ctx->pkt_length;
char *end,*server_version_end, *pkt_end;
NET *net = &mysql->net;
DBUG_ENTER(__func__);
pkt_end= (char*)net->read_pos + pkt_length;
/* Check if version of protocol matches current one */
mysql->protocol_version= net->read_pos[0];
DBUG_DUMP("packet",(uchar*) net->read_pos,10);
DBUG_PRINT("info",("mysql protocol version %d, server=%d",
PROTOCOL_VERSION, mysql->protocol_version));
if (mysql->protocol_version != PROTOCOL_VERSION)
{
set_mysql_extended_error(mysql, CR_VERSION_ERROR, unknown_sqlstate,
ER(CR_VERSION_ERROR), mysql->protocol_version,
PROTOCOL_VERSION);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
server_version_end= end= strend((char*) net->read_pos+1);
mysql->thread_id=uint4korr(end+1);
end+=5;
/*
Scramble is split into two parts because old clients do not understand
long scrambles; here goes the first part.
*/
ctx->scramble_data= end;
ctx->scramble_data_len= SCRAMBLE_LENGTH_323 + 1;
ctx->scramble_plugin= old_password_plugin_name;
end+= ctx->scramble_data_len;
if (pkt_end >= end + 1)
mysql->server_capabilities=uint2korr(end);
if (pkt_end >= end + 18)
{
/* New protocol with 16 bytes to describe server characteristics */
mysql->server_language=end[2];
mysql->server_status=uint2korr(end+3);
mysql->server_capabilities |= ((unsigned long) uint2korr(end + 5) << 16);
ctx->pkt_scramble_len= end[7];
if (ctx->pkt_scramble_len < 0)
{
set_mysql_error(mysql, CR_MALFORMED_PACKET,
unknown_sqlstate); /* purecov: inspected */
DBUG_RETURN(STATE_MACHINE_FAILED);
}
}
end+= 18;
if (mysql->options.secure_auth && ctx->passwd[0] &&
!(mysql->server_capabilities & CLIENT_SECURE_CONNECTION))
{
set_mysql_error(mysql, CR_SECURE_AUTH, unknown_sqlstate);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
if (mysql_init_character_set(mysql))
DBUG_RETURN(STATE_MACHINE_FAILED);
/* Save connection information */
if (!my_multi_malloc(MYF(0),
&mysql->host_info, (uint) strlen(ctx->host_info)+1,
&mysql->host, (uint) strlen(ctx->host)+1,
&mysql->unix_socket,ctx->unix_socket ?
(uint) strlen(ctx->unix_socket)+1 : (uint) 1,
&mysql->server_version,
(uint) (server_version_end - (char*) net->read_pos + 1),
NullS) ||
!(mysql->user=my_strdup(ctx->user,MYF(0))) ||
!(mysql->passwd=my_strdup(ctx->passwd,MYF(0))))
{
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
strmov(mysql->host_info,ctx->host_info);
strmov(mysql->host,ctx->host);
if (ctx->unix_socket)
strmov(mysql->unix_socket,ctx->unix_socket);
else
mysql->unix_socket=0;
strmov(mysql->server_version,(char*) net->read_pos+1);
mysql->port=ctx->port;
if (pkt_end >= end + SCRAMBLE_LENGTH - SCRAMBLE_LENGTH_323 + 1)
{
/*
move the first scramble part - directly in the NET buffer -
to get a full continuous scramble. We've read all the header,
and can overwrite it now.
*/
memmove(end - SCRAMBLE_LENGTH_323, ctx->scramble_data,
SCRAMBLE_LENGTH_323);
ctx->scramble_data= end - SCRAMBLE_LENGTH_323;
if (mysql->server_capabilities & CLIENT_PLUGIN_AUTH)
{
ctx->scramble_data_len= ctx->pkt_scramble_len;
ctx->scramble_plugin=
ctx->scramble_data + ctx->scramble_data_len;
if (ctx->scramble_data + ctx->scramble_data_len > pkt_end)
ctx->scramble_data_len= pkt_end - ctx->scramble_data;
}
else
{
ctx->scramble_data_len= pkt_end - ctx->scramble_data;
ctx->scramble_plugin= native_password_plugin_name;
}
}
else
mysql->server_capabilities&= ~CLIENT_SECURE_CONNECTION;
mysql->client_flag= ctx->client_flag;
ctx->state_function = csm_authenticate;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
/* Run the auth plugin; this is a simple wrapper for now, but will
contain more state once the plugin authentication is broken into
state machines. */
static mysql_state_machine_status
csm_authenticate(mysql_csm_context *ctx)
{
DBUG_ENTER(__func__);
if (ctx->non_blocking) {
mysql_state_machine_status status =
run_plugin_auth_nonblocking(ctx->mysql,
ctx->scramble_data,
ctx->scramble_data_len,
ctx->scramble_plugin,
ctx->db);
if (status != STATE_MACHINE_DONE)
DBUG_RETURN(status);
} else {
if (run_plugin_auth(ctx->mysql,
ctx->scramble_data,
ctx->scramble_data_len,
ctx->scramble_plugin,
ctx->db))
DBUG_RETURN(STATE_MACHINE_FAILED);
}
ctx->auth_context = NULL;
ctx->state_function = csm_prep_select_database;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
/* Begin the database selection flow. */
static mysql_state_machine_status
csm_prep_select_database(mysql_csm_context *ctx)
{
MYSQL *mysql = ctx->mysql;
NET *net= &mysql->net;
DBUG_ENTER(__func__);
if (mysql->client_flag & CLIENT_COMPRESS) /* We will use compression */
net->compress=1;
if (mysql->client_flag & CLIENT_COMPRESS_EVENT)
net->compress_event=1;
#ifdef CHECK_LICENSE
if (check_license(mysql))
DBUG_RETURN(STATE_MACHINE_FAILED));
#endif
if (ctx->db && !mysql->db) {
ctx->state_function = csm_send_select_database;
} else {
#ifdef MYSQL_SERVER
DBUG_RETURN(STATE_MACHINE_DONE);
#else
ctx->state_function = csm_prep_init_commands;
#endif
}
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
/* Actually send the select database command. */
static mysql_state_machine_status
csm_send_select_database(mysql_csm_context *ctx)
{
MYSQL *mysql = ctx->mysql;
my_bool error;
DBUG_ENTER(__func__);
if (ctx->non_blocking) {
net_async_status status =
mysql_select_db_nonblocking(mysql, ctx->db, &error);
if (status == NET_ASYNC_NOT_READY) {
return STATE_MACHINE_WOULD_BLOCK;
}
} else {
error = mysql_select_db(mysql, ctx->db);
}
if (error) {
if (mysql->net.last_errno == CR_SERVER_LOST)
set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate,
ER(CR_SERVER_LOST_EXTENDED),
"Setting intital database",
errno);
DBUG_RETURN(STATE_MACHINE_FAILED);
}
#ifndef MYSQL_SERVER
ctx->state_function = csm_prep_init_commands;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
#else
DBUG_RETURN(STATE_MACHINE_DONE);
#endif
}
#ifndef MYSQL_SERVER
/* Prepare to send a sequence of init commands. */
static mysql_state_machine_status
csm_prep_init_commands(mysql_csm_context *ctx)
{
DBUG_ENTER(__func__);
MYSQL *mysql = ctx->mysql;
/*
Part 3: authenticated, finish the initialization of the connection
*/
/*
Using init_commands is not supported when connecting from within the
server.
*/
if (!mysql->options.init_commands) {
DBUG_RETURN(STATE_MACHINE_DONE);
}
ctx->saved_reconnect=mysql->reconnect;
mysql->reconnect=0;
DYNAMIC_ARRAY *init_commands= mysql->options.init_commands;
ctx->current_init_command = (char**)init_commands->buffer;
ctx->last_init_command = ctx->current_init_command + init_commands->elements;
ctx->state_function = csm_send_one_init_command;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
/*
Send an init command. This is called once per init command until
they've all been run (or a failure occurs).
*/
static mysql_state_machine_status
csm_send_one_init_command(mysql_csm_context *ctx)
{
DBUG_ENTER(__func__);
MYSQL *mysql = ctx->mysql;
if (mysql_real_query(mysql,*ctx->current_init_command,
(ulong) strlen(*ctx->current_init_command)))
DBUG_RETURN(STATE_MACHINE_FAILED);
int status;
do {
if (mysql->fields)
{
if (!(ctx->init_command_result= cli_use_result(mysql)))
DBUG_RETURN(STATE_MACHINE_FAILED);
mysql_free_result(ctx->init_command_result);
}
if ((status= mysql_next_result(mysql)) > 0)
DBUG_RETURN(STATE_MACHINE_FAILED);
} while (status == 0);
++ctx->current_init_command;
if (ctx->current_init_command < ctx->last_init_command) {
DBUG_RETURN(STATE_MACHINE_CONTINUE);
} else {
mysql->reconnect=ctx->saved_reconnect;
DBUG_PRINT("exit", ("Mysql handler: 0x%lx", (long) mysql));
DBUG_RETURN(STATE_MACHINE_DONE);
}
}
static mysql_state_machine_status
csm_send_init_commands_nonblocking(mysql_csm_context* ctx)
{
DBUG_ENTER(__func__);
MYSQL *mysql = ctx->mysql;
int error;
net_async_status status =
mysql_real_query_nonblocking(mysql,*ctx->current_init_command,
(ulong) strlen(*ctx->current_init_command),
&error);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(STATE_MACHINE_WOULD_BLOCK);
}
if (error) {
DBUG_RETURN(STATE_MACHINE_FAILED);
}
ctx->state_function = csm_use_init_commands_results_nonblocking;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
static mysql_state_machine_status
csm_use_init_commands_results_nonblocking(mysql_csm_context* ctx)
{
DBUG_ENTER(__func__);
MYSQL *mysql = ctx->mysql;
if (mysql->fields)
{
if (!(ctx->init_command_result= cli_use_result(mysql)))
DBUG_RETURN(STATE_MACHINE_FAILED);
ctx->state_function = csm_free_init_command_results_nonblocking;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
} else {
ctx->state_function = csm_next_init_command_results_nonblocking;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
}
static mysql_state_machine_status
csm_free_init_command_results_nonblocking(mysql_csm_context *ctx)
{
DBUG_ENTER(__func__);
net_async_status status = mysql_free_result_nonblocking(ctx->init_command_result);
if (status == NET_ASYNC_NOT_READY) {
return STATE_MACHINE_WOULD_BLOCK;
}
ctx->state_function = csm_next_init_command_results_nonblocking;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
static mysql_state_machine_status
csm_next_init_command_results_nonblocking(mysql_csm_context *ctx)
{
DBUG_ENTER(__func__);
int error;
net_async_status status = mysql_next_result_nonblocking(ctx->mysql, &error);
if (status == NET_ASYNC_NOT_READY) {
return STATE_MACHINE_WOULD_BLOCK;
}
if (error > 0) {
DBUG_RETURN(STATE_MACHINE_FAILED);
}
if (error == 0) {
ctx->state_function = csm_use_init_commands_results_nonblocking;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
DBUG_ASSERT(error == -1);
ctx->state_function = csm_next_init_command_nonblocking;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
}
static mysql_state_machine_status
csm_next_init_command_nonblocking(mysql_csm_context *ctx)
{
DBUG_ENTER(__func__);
MYSQL *mysql = ctx->mysql;
++ctx->current_init_command;
if (ctx->current_init_command < ctx->last_init_command) {
ctx->state_function = csm_send_init_commands_nonblocking;
DBUG_RETURN(STATE_MACHINE_CONTINUE);
} else {
mysql->reconnect=ctx->saved_reconnect;
DBUG_PRINT("exit", ("Mysql handler: 0x%lx", (long) mysql));
DBUG_RETURN(STATE_MACHINE_DONE);
}
}
#endif
my_bool mysql_reconnect(MYSQL *mysql)
{
MYSQL tmp_mysql;
DBUG_ENTER("mysql_reconnect");
DBUG_ASSERT(mysql);
DBUG_PRINT("enter", ("mysql->reconnect: %d", mysql->reconnect));
if (!mysql->reconnect ||
(mysql->server_status & SERVER_STATUS_IN_TRANS) || !mysql->host_info)
{
/* Allow reconnect next time */
mysql->server_status&= ~SERVER_STATUS_IN_TRANS;
set_mysql_error(mysql, CR_SERVER_GONE_ERROR, unknown_sqlstate);
DBUG_RETURN(1);
}
mysql_init(&tmp_mysql);
tmp_mysql.options= mysql->options;
tmp_mysql.options.my_cnf_file= tmp_mysql.options.my_cnf_group= 0;
if (!mysql_real_connect(&tmp_mysql,mysql->host,mysql->user,mysql->passwd,
mysql->db, mysql->port, mysql->unix_socket,
mysql->client_flag | CLIENT_REMEMBER_OPTIONS))
{
memset(&tmp_mysql.options, 0, sizeof(tmp_mysql.options));
mysql_close(&tmp_mysql);
mysql->net.last_errno= tmp_mysql.net.last_errno;
strmov(mysql->net.last_error, tmp_mysql.net.last_error);
strmov(mysql->net.sqlstate, tmp_mysql.net.sqlstate);
DBUG_RETURN(1);
}
if (mysql_set_character_set(&tmp_mysql, mysql->charset->csname))
{
DBUG_PRINT("error", ("mysql_set_character_set() failed"));
memset(&tmp_mysql.options, 0, sizeof(tmp_mysql.options));
mysql_close(&tmp_mysql);
mysql->net.last_errno= tmp_mysql.net.last_errno;
strmov(mysql->net.last_error, tmp_mysql.net.last_error);
strmov(mysql->net.sqlstate, tmp_mysql.net.sqlstate);
DBUG_RETURN(1);
}
DBUG_PRINT("info", ("reconnect succeded"));
tmp_mysql.reconnect= 1;
tmp_mysql.free_me= mysql->free_me;
/* Move prepared statements (if any) over to the new mysql object */
tmp_mysql.stmts= mysql->stmts;
mysql->stmts= 0;
/* Don't free options as these are now used in tmp_mysql */
memset(&mysql->options, 0, sizeof(mysql->options));
mysql->free_me=0;
mysql_close(mysql);
*mysql=tmp_mysql;
net_clear(&mysql->net, 1);
mysql->affected_rows= ~(my_ulonglong) 0;
DBUG_RETURN(0);
}
/**************************************************************************
Set current database
**************************************************************************/
int STDCALL
mysql_select_db(MYSQL *mysql, const char *db)
{
int error;
DBUG_ENTER("mysql_select_db");
DBUG_PRINT("enter",("db: '%s'",db));
if ((error=simple_command(mysql,COM_INIT_DB, (const uchar*) db,
(ulong) strlen(db),0)))
DBUG_RETURN(error);
my_free(mysql->db);
mysql->db=my_strdup(db,MYF(MY_WME));
DBUG_RETURN(0);
}
net_async_status STDCALL
mysql_select_db_nonblocking(MYSQL *mysql, const char *db, my_bool *error)
{
if (simple_command_nonblocking(mysql, COM_INIT_DB, (const uchar*) db,
(ulong) strlen(db), 0, error))
return 1;
if (*error) {
return 0;
}
my_free(mysql->db);
mysql->db=my_strdup(db,MYF(MY_WME));
return 0;
}
/*************************************************************************
Send a QUIT to the server and close the connection
If handle is alloced by mysql connect free it.
*************************************************************************/
static void mysql_close_free_options(MYSQL *mysql)
{
DBUG_ENTER("mysql_close_free_options");
my_free(mysql->options.user);
my_free(mysql->options.host);
my_free(mysql->options.password);
my_free(mysql->options.unix_socket);
my_free(mysql->options.db);
my_free(mysql->options.my_cnf_file);
my_free(mysql->options.my_cnf_group);
my_free(mysql->options.charset_dir);
my_free(mysql->options.charset_name);
my_free(mysql->options.ci.client_ip);
/* ci.bind_adress is union with client_ip, already freed above */
if (mysql->options.init_commands)
{
DYNAMIC_ARRAY *init_commands= mysql->options.init_commands;
char **ptr= (char**)init_commands->buffer;
char **end= ptr + init_commands->elements;
for (; ptr<end; ptr++)
my_free(*ptr);
delete_dynamic(init_commands);
my_free(init_commands);
}
#if defined(HAVE_OPENSSL) && !defined(EMBEDDED_LIBRARY)
mysql_ssl_free(mysql);
#endif /* HAVE_OPENSSL && !EMBEDDED_LIBRARY */
#ifdef HAVE_SMEM
if (mysql->options.shared_memory_base_name != def_shared_memory_base_name)
my_free(mysql->options.shared_memory_base_name);
#endif /* HAVE_SMEM */
if (mysql->options.extension)
{
my_free(mysql->options.extension->plugin_dir);
my_free(mysql->options.extension->default_auth);
my_hash_free(&mysql->options.extension->connection_attributes);
my_hash_free(&mysql->options.extension->query_attributes);
my_free(mysql->options.extension);
}
memset(&mysql->options, 0, sizeof(mysql->options));
DBUG_VOID_RETURN;
}
static void mysql_close_free(MYSQL *mysql)
{
my_free(mysql->host_info);
my_free(mysql->user);
my_free(mysql->passwd);
my_free(mysql->db);
/* Free extension if any */
if (mysql->extension)
mysql_extension_free(mysql->extension);
#if defined(EMBEDDED_LIBRARY) || MYSQL_VERSION_ID >= 50100
my_free(mysql->info_buffer);
mysql->info_buffer= 0;
#endif
/* Clear pointers for better safety */
mysql->host_info= NULL;
mysql->user= NULL;
mysql->passwd= NULL;
mysql->db= NULL;
mysql->extension= NULL;
}
static void mysql_close_free_connect_context(MYSQL *mysql) {
if (mysql && mysql->connect_context) {
if (mysql->connect_context->auth_context) {
if (mysql->connect_context->auth_context->change_user_buff) {
my_free(mysql->connect_context->auth_context->change_user_buff);
}
my_free(mysql->connect_context->auth_context);
}
my_free(mysql->connect_context);
mysql->connect_context = NULL;
}
}
/**
For use when the connection to the server has been lost (in which case
the server has discarded all information about prepared statements
associated with the connection).
Mark all statements in mysql->stmts by setting stmt->mysql= 0 if the
statement has transitioned beyond the MYSQL_STMT_INIT_DONE state, and
unlink the statement from the mysql->stmts list.
The remaining pruned list of statements (if any) is kept in mysql->stmts.
@param mysql pointer to the MYSQL object
@return none
*/
static void mysql_prune_stmt_list(MYSQL *mysql)
{
LIST *pruned_list= NULL;
while(mysql->stmts)
{
LIST *element= mysql->stmts;
MYSQL_STMT *stmt;
mysql->stmts= list_delete(element, element);
stmt= (MYSQL_STMT *) element->data;
if (stmt->state != MYSQL_STMT_INIT_DONE)
{
stmt->mysql= 0;
stmt->last_errno= CR_SERVER_LOST;
strmov(stmt->last_error, ER(CR_SERVER_LOST));
strmov(stmt->sqlstate, unknown_sqlstate);
}
else
{
pruned_list= list_add(pruned_list, element);
}
}
mysql->stmts= pruned_list;
}
/*
Clear connection pointer of every statement: this is necessary
to give error on attempt to use a prepared statement of closed
connection.
SYNOPSYS
mysql_detach_stmt_list()
stmt_list pointer to mysql->stmts
func_name name of calling function
NOTE
There is similar code in mysql_reconnect(), so changes here
should also be reflected there.
*/
void mysql_detach_stmt_list(LIST **stmt_list MY_ATTRIBUTE((unused)),
const char *func_name MY_ATTRIBUTE((unused)))
{
#ifdef MYSQL_CLIENT
/* Reset connection handle in all prepared statements. */
LIST *element= *stmt_list;
char buff[MYSQL_ERRMSG_SIZE];
DBUG_ENTER("mysql_detach_stmt_list");
my_snprintf(buff, sizeof(buff)-1, ER(CR_STMT_CLOSED), func_name);
for (; element; element= element->next)
{
MYSQL_STMT *stmt= (MYSQL_STMT *) element->data;
set_stmt_error(stmt, CR_STMT_CLOSED, unknown_sqlstate, buff);
stmt->mysql= 0;
/* No need to call list_delete for statement here */
}
*stmt_list= 0;
DBUG_VOID_RETURN;
#endif /* MYSQL_CLIENT */
}
void STDCALL mysql_close(MYSQL *mysql)
{
DBUG_ENTER("mysql_close");
if (mysql) /* Some simple safety */
{
/* If connection is still up, send a QUIT message */
if (mysql->net.vio != 0)
{
free_old_query(mysql);
mysql->status=MYSQL_STATUS_READY; /* Force command */
if (vio_is_blocking(mysql->net.vio)) {
simple_command(mysql,COM_QUIT,(uchar*) 0,0,1);
} else {
/* Best effort; try to toss a command on the wire, but we can't wait
to hear back */
my_bool err; /* unused */
simple_command_nonblocking(mysql,COM_QUIT,(uchar*) 0,0,1,&err);
}
mysql->reconnect=0;
end_server(mysql); /* Sets mysql->net.vio= 0 */
}
mysql_close_free_options(mysql);
mysql_close_free(mysql);
mysql_detach_stmt_list(&mysql->stmts, "mysql_close");
#ifndef MYSQL_SERVER
if (mysql->thd)
(*mysql->methods->free_embedded_thd)(mysql);
#endif
mysql_close_free_connect_context(mysql);
if (mysql->free_me)
my_free(mysql);
}
DBUG_VOID_RETURN;
}
static my_bool cli_read_query_result(MYSQL *mysql)
{
uchar *pos;
ulong field_count;
ulong length;
DBUG_ENTER("cli_read_query_result");
if ((length = cli_safe_read(mysql, NULL)) == packet_error)
DBUG_RETURN(1);
free_old_query(mysql); /* Free old result */
#ifdef MYSQL_CLIENT /* Avoid warn of unused labels*/
get_info:
#endif
pos=(uchar*) mysql->net.read_pos;
if ((field_count= net_field_length(&pos)) == 0)
{
read_ok_ex(mysql, length);
DBUG_RETURN(0);
}
#ifdef MYSQL_CLIENT
if (field_count == NULL_LENGTH) /* LOAD DATA LOCAL INFILE */
{
int error;
if (!(mysql->options.client_flag & CLIENT_LOCAL_FILES))
{
set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate);
DBUG_RETURN(1);
}
error= handle_local_infile(mysql,(char*) pos);
if ((length= cli_safe_read(mysql, NULL)) == packet_error || error)
DBUG_RETURN(1);
goto get_info; /* Get info packet */
}
#endif
if (!(mysql->server_status & SERVER_STATUS_AUTOCOMMIT))
mysql->server_status|= SERVER_STATUS_IN_TRANS;
if (!(mysql->fields=cli_read_metadata(mysql, field_count,
protocol_41(mysql) ? 7:5))) {
free_root(&mysql->field_alloc,MYF(0));
DBUG_RETURN(1);
}
mysql->status= MYSQL_STATUS_GET_RESULT;
mysql->field_count= (uint) field_count;
DBUG_PRINT("exit",("ok"));
DBUG_RETURN(0);
}
static net_async_status
cli_read_query_result_nonblocking(MYSQL *mysql, my_bool *ret)
{
NET *net= &mysql->net;
uchar *pos;
ulong field_count;
ulong length;
DBUG_ENTER(__func__);
if (net->async_read_query_result_status == NET_ASYNC_READ_QUERY_RESULT_IDLE) {
net->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_FIELD_COUNT;
}
if (net->async_read_query_result_status == NET_ASYNC_READ_QUERY_RESULT_FIELD_COUNT) {
net_async_status status = cli_safe_read_nonblocking(mysql, &length, NULL);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
if (length == packet_error) {
*ret = 1;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
mysql->packet_length = length;
free_old_query(mysql); /* Free old result */
#ifdef MYSQL_CLIENT /* Avoid warn of unused labels*/
get_info:
#endif
pos=(uchar*) mysql->net.read_pos;
if ((field_count= net_field_length(&pos)) == 0)
{
read_ok_ex(mysql, length);
DBUG_PRINT("exit",("ok"));
*ret = 0;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
#ifdef MYSQL_CLIENT
if (field_count == NULL_LENGTH) /* LOAD DATA LOCAL INFILE */
{
int error;
if (!(mysql->options.client_flag & CLIENT_LOCAL_FILES))
{
set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate);
net->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_IDLE;
*ret = 1;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
error= handle_local_infile(mysql,(char*) pos);
if ((length= cli_safe_read(mysql, NULL)) == packet_error || error) {
net->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_IDLE;
*ret = 1;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
goto get_info; /* Get info packet */
}
#endif
if (!(mysql->server_status & SERVER_STATUS_AUTOCOMMIT))
mysql->server_status|= SERVER_STATUS_IN_TRANS;
mysql->field_count= (uint) field_count;
net->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_FIELD_INFO;
}
if (net->async_read_query_result_status == NET_ASYNC_READ_QUERY_RESULT_FIELD_INFO) {
MYSQL_DATA *fields;
net_async_status status =
cli_read_rows_nonblocking(mysql, protocol_41(mysql) ? 7:5, &fields);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
if (!fields) {
net->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_IDLE;
*ret = 1;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
if (!(mysql->fields=unpack_fields(mysql, fields->data, &mysql->field_alloc,
mysql->field_count,0,
mysql->server_capabilities))) {
net->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_IDLE;
*ret = 1;
free_rows(fields);
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
free_rows(fields);
}
mysql->status= MYSQL_STATUS_GET_RESULT;
DBUG_PRINT("exit",("ok, %u", mysql->field_count));
net->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_IDLE;
*ret = 0;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
/*
Send the query and return so we can do something else.
Needs to be followed by mysql_read_query_result() when we want to
finish processing it.
*/
int STDCALL
mysql_send_query(MYSQL *mysql, const char *query, ulong length)
{
STATE_INFO *info;
DBUG_ENTER("mysql_send_query");
if ((info= STATE_DATA(mysql)))
free_state_change_info(mysql->extension);
size_t query_attrs_len=
mysql->options.extension ?
mysql->options.extension->query_attributes_length : 0;
if (query_attrs_len > 0) {
my_bool ret;
uchar* buf= my_malloc(query_attrs_len + MAX_VARIABLE_STRING_LENGTH,
MYF(MY_WME | MY_ZEROFILL));
uchar* end= send_client_query_attrs(mysql, buf);
query_attrs_len = end - buf;
ret= (*mysql->methods->advanced_command)(mysql, COM_QUERY_ATTRS, buf,
query_attrs_len, (uchar*) query,
length, 1, NULL);
my_free(buf);
DBUG_RETURN(ret);
} else {
DBUG_RETURN(simple_command(mysql, COM_QUERY, (uchar*) query, length, 1));
}
}
int STDCALL
mysql_real_query(MYSQL *mysql, const char *query, ulong length)
{
int retval;
DBUG_ENTER("mysql_real_query");
DBUG_PRINT("enter",("handle: %p", mysql));
DBUG_PRINT("query",("Query = '%-.*s'", (int) length, query));
if (mysql_send_query(mysql,query,length))
DBUG_RETURN(1);
retval= (int) (*mysql->methods->read_query_result)(mysql);
DBUG_RETURN(retval);
}
net_async_status STDCALL
mysql_send_query_nonblocking(MYSQL *mysql, const char *query, int *error)
{
DBUG_ENTER(__func__);
DBUG_ASSERT(mysql->async_query_state == QUERY_SENDING);
DBUG_PRINT("enter", ("query: %s", query));
my_bool error_bool;
if (!mysql->async_query_length) {
mysql->async_query_length = strlen(query);
}
size_t query_attrs_len=
mysql->options.extension ?
mysql->options.extension->query_attributes_length : 0;
if (query_attrs_len > 0) {
net_async_status ret;
uchar* buf= my_malloc(query_attrs_len + MAX_VARIABLE_STRING_LENGTH,
MYF(MY_WME | MY_ZEROFILL));
uchar* end= send_client_query_attrs(mysql, buf);
query_attrs_len = end - buf;
ret= (*mysql->methods->advanced_command_nonblocking)(mysql,
COM_QUERY_ATTRS, buf,
query_attrs_len,
(uchar*) query,
mysql->async_query_length,
1, NULL, &error_bool);
my_free(buf);
if (ret == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
} else {
if (simple_command_nonblocking(mysql, COM_QUERY, (uchar*) query,
mysql->async_query_length, 1, &error_bool) ==
NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
}
*error = error_bool;
mysql->async_op_status = ASYNC_OP_UNSET;
mysql->async_query_state = QUERY_IDLE;
mysql->async_query_length = 0;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
net_async_status STDCALL
mysql_real_query_nonblocking(MYSQL *mysql, const char *query,
unsigned long length, int *error)
{
DBUG_ENTER(__func__);
my_bool err = 1;
DBUG_ASSERT(mysql->async_op_status == ASYNC_OP_UNSET ||
mysql->async_op_status == ASYNC_OP_QUERY);
/* 1st phase: send query. */
if (mysql->async_query_state == QUERY_IDLE)
{
mysql->async_query_length = length;
mysql->async_op_status = ASYNC_OP_QUERY;
mysql->async_query_state = QUERY_SENDING;
}
if (mysql->async_query_state == QUERY_SENDING)
{
if (mysql_send_query_nonblocking(mysql, query, error)
== NET_ASYNC_NOT_READY)
DBUG_RETURN(NET_ASYNC_NOT_READY);
if (*error)
{
mysql->async_op_status = ASYNC_OP_UNSET;
mysql->async_query_state = QUERY_IDLE;
mysql->async_query_length = 0;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
mysql->async_query_state = QUERY_READING_RESULT;
}
/* 2nd phase: read query result (field count, field info) */
if (mysql->async_query_state == QUERY_READING_RESULT)
{
if ((*mysql->methods->read_query_result_nonblocking)(mysql, &err) ==
NET_ASYNC_NOT_READY)
DBUG_RETURN(NET_ASYNC_NOT_READY);
*error = err;
}
mysql->async_op_status = ASYNC_OP_UNSET;
mysql->async_query_state = QUERY_IDLE;
mysql->async_query_length = 0;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
/**************************************************************************
Alloc result struct for buffered results. All rows are read to buffer.
mysql_data_seek may be used.
**************************************************************************/
MYSQL_RES * STDCALL mysql_store_result(MYSQL *mysql)
{
MYSQL_RES *result;
DBUG_ENTER("mysql_store_result");
if (!mysql->fields)
DBUG_RETURN(0);
if (mysql->status != MYSQL_STATUS_GET_RESULT)
{
set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate);
DBUG_RETURN(0);
}
mysql->status=MYSQL_STATUS_READY; /* server is ready */
if (!(result=(MYSQL_RES*) my_malloc((uint) (sizeof(MYSQL_RES)+
sizeof(ulong) *
mysql->field_count),
MYF(MY_WME | MY_ZEROFILL))))
{
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
DBUG_RETURN(0);
}
result->methods= mysql->methods;
result->eof=1; /* Marker for buffered */
result->lengths=(ulong*) (result+1);
if (!(result->data=
(*mysql->methods->read_rows)(mysql,mysql->fields,mysql->field_count)))
{
my_free(result);
DBUG_RETURN(0);
}
mysql->affected_rows= result->row_count= result->data->rows;
result->data_cursor= result->data->data;
result->fields= mysql->fields;
result->field_alloc= mysql->field_alloc;
result->field_count= mysql->field_count;
/* The rest of result members is zerofilled in my_malloc */
mysql->fields=0; /* fields is now in result */
clear_alloc_root(&mysql->field_alloc);
/* just in case this was mistakenly called after mysql_stmt_execute() */
mysql->unbuffered_fetch_owner= 0;
DBUG_RETURN(result); /* Data fetched */
}
/**************************************************************************
Alloc struct for use with unbuffered reads. Data is fetched by domand
when calling to mysql_fetch_row.
mysql_data_seek is a noop.
No other queries may be specified with the same MYSQL handle.
There shouldn't be much processing per row because mysql server shouldn't
have to wait for the client (and will not wait more than 30 sec/packet).
**************************************************************************/
static MYSQL_RES * cli_use_result(MYSQL *mysql)
{
MYSQL_RES *result;
DBUG_ENTER("cli_use_result");
if (!mysql->fields)
DBUG_RETURN(0);
if (mysql->status != MYSQL_STATUS_GET_RESULT)
{
set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate);
DBUG_RETURN(0);
}
if (!(result=(MYSQL_RES*) my_malloc(sizeof(*result)+
sizeof(ulong)*mysql->field_count,
MYF(MY_WME | MY_ZEROFILL))))
DBUG_RETURN(0);
result->lengths=(ulong*) (result+1);
result->methods= mysql->methods;
if (!(result->row=(MYSQL_ROW)
my_malloc(sizeof(result->row[0])*(mysql->field_count+1), MYF(MY_WME))))
{ /* Ptrs: to one row */
my_free(result);
DBUG_RETURN(0);
}
result->fields= mysql->fields;
result->field_alloc= mysql->field_alloc;
result->field_count= mysql->field_count;
result->current_field=0;
result->handle= mysql;
result->current_row= 0;
mysql->fields=0; /* fields is now in result */
clear_alloc_root(&mysql->field_alloc);
mysql->status=MYSQL_STATUS_USE_RESULT;
mysql->unbuffered_fetch_owner= &result->unbuffered_fetch_cancelled;
DBUG_RETURN(result); /* Data is read to be fetched */
}
/**************************************************************************
Return next row of the query results
**************************************************************************/
static net_async_status
mysql_fetch_row_core(MYSQL_RES *res, MYSQL_ROW* row, my_bool use_nonblocking);
net_async_status STDCALL
mysql_fetch_row_nonblocking(MYSQL_RES *res, MYSQL_ROW* row) {
*row = NULL;
return mysql_fetch_row_core(res, row, TRUE);
}
MYSQL_ROW STDCALL
mysql_fetch_row(MYSQL_RES *res) {
MYSQL *mysql = res->handle;
MYSQL_ROW row;
mysql_fetch_row_core(res, &row, FALSE);
if (mysql && row == NULL && mysql->net.vio &&
!vio_is_blocking(mysql->net.vio) && !(mysql->client_flag & CLIENT_SSL))
{
vio_set_blocking(mysql->net.vio, TRUE);
}
return row;
}
static net_async_status
mysql_fetch_row_core(MYSQL_RES *res, MYSQL_ROW* row, my_bool use_nonblocking)
{
uint okay;
DBUG_ENTER(__func__);
/* We have data (either a fully buffered fetch, or just some async
* rows so far */
if (res->data)
{
MYSQL_ROW tmp;
if (!res->data_cursor)
{
DBUG_PRINT("info",("end of data"));
*row = NULL;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
tmp = res->data_cursor->data;
res->data_cursor = res->data_cursor->next;
*row = res->current_row=tmp;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
/* Unbufferred fetch or need more async rows */
if (!res->eof)
{
MYSQL *mysql= res->handle;
if (mysql->status != MYSQL_STATUS_USE_RESULT)
{
set_mysql_error(mysql,
res->unbuffered_fetch_cancelled ?
CR_FETCH_CANCELED : CR_COMMANDS_OUT_OF_SYNC,
unknown_sqlstate);
}
if (use_nonblocking) {
if (read_one_row_nonblocking(mysql, res->field_count,
res->row, res->lengths, &okay) ==
NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
if (okay == 0)
{
res->row_count++;
*row = res->current_row = res->row;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
/* !okay == error, falls through past next branch */
}
else if (!(read_one_row(mysql, res->field_count, res->row, res->lengths)))
{
res->row_count++;
*row = res->current_row = res->row;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
DBUG_PRINT("info",("end of data"));
res->eof=1;
mysql->status=MYSQL_STATUS_READY;
/*
Reset only if owner points to us: there is a chance that somebody
started new query after mysql_stmt_close():
*/
if (mysql->unbuffered_fetch_owner == &res->unbuffered_fetch_cancelled)
mysql->unbuffered_fetch_owner= 0;
/* Don't clear handle in mysql_free_result */
res->handle=0;
}
*row = NULL;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
/**************************************************************************
Get column lengths of the current row
If one uses mysql_use_result, res->lengths contains the length information,
else the lengths are calculated from the offset between pointers.
**************************************************************************/
ulong * STDCALL
mysql_fetch_lengths(MYSQL_RES *res)
{
MYSQL_ROW column;
if (!(column=res->current_row))
return 0; /* Something is wrong */
if (res->data)
(*res->methods->fetch_lengths)(res->lengths, column, res->field_count);
return res->lengths;
}
int STDCALL
mysql_options(MYSQL *mysql,enum mysql_option option, const void *arg)
{
DBUG_ENTER("mysql_option");
DBUG_PRINT("enter",("option: %d",(int) option));
switch (option) {
case MYSQL_OPT_CONNECT_TIMEOUT:
mysql->options.connect_timeout = timeout_from_seconds((*(uint*) arg));
fixup_zero_timeout(&mysql->options.connect_timeout);
break;
case MYSQL_OPT_CONNECT_TIMEOUT_MS:
mysql->options.connect_timeout = timeout_from_millis((*(uint*) arg));
fixup_zero_timeout(&mysql->options.connect_timeout);
break;
case MYSQL_OPT_READ_TIMEOUT:
mysql->options.read_timeout = timeout_from_seconds((*(uint*) arg));
fixup_zero_timeout(&mysql->options.read_timeout);
break;
case MYSQL_OPT_READ_TIMEOUT_MS:
mysql->options.read_timeout = timeout_from_millis((*(uint*) arg));
fixup_zero_timeout(&mysql->options.read_timeout);
break;
case MYSQL_OPT_WRITE_TIMEOUT:
mysql->options.write_timeout = timeout_from_seconds((*(uint*) arg));
fixup_zero_timeout(&mysql->options.write_timeout);
break;
case MYSQL_OPT_WRITE_TIMEOUT_MS:
mysql->options.write_timeout = timeout_from_millis((*(uint*) arg));
fixup_zero_timeout(&mysql->options.write_timeout);
break;
case MYSQL_OPT_COMP_LIB:
mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "compression_lib");
enum mysql_compression_lib lib_arg =
(enum mysql_compression_lib)(size_t)arg;
if (lib_arg == MYSQL_COMPRESSION_NONE) {
mysql->options.compress = 0;
mysql->options.client_flag &= ~CLIENT_COMPRESS;
break;
}
const char *lib_name = "zlib";
if (lib_arg == MYSQL_COMPRESSION_ZSTD) {
lib_name = "zstd";
}
if (lib_arg == MYSQL_COMPRESSION_ZSTD_STREAM) {
lib_name = "zstd_stream";
}
if (lib_arg == MYSQL_COMPRESSION_LZ4F_STREAM) {
lib_name = "lz4f_stream";
}
mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD,
"compression_lib", lib_name);
break;
case MYSQL_OPT_COMPRESS:
mysql->options.compress= 1; /* Remember for connect */
mysql->options.client_flag|= CLIENT_COMPRESS;
break;
case MYSQL_OPT_COMP_EVENT:
mysql->options.compress_event= 1;
mysql->options.client_flag|= CLIENT_COMPRESS_EVENT;
// we disable packet compression if event compression is enabled
mysql->options.compress= 0;
mysql->options.client_flag&= ~CLIENT_COMPRESS;
break;
case MYSQL_OPT_NAMED_PIPE: /* This option is depricated */
mysql->options.protocol=MYSQL_PROTOCOL_PIPE; /* Force named pipe */
break;
case MYSQL_OPT_LOCAL_INFILE: /* Allow LOAD DATA LOCAL ?*/
if (!arg || MY_TEST(*(uint*) arg))
mysql->options.client_flag|= CLIENT_LOCAL_FILES;
else
mysql->options.client_flag&= ~CLIENT_LOCAL_FILES;
break;
case MYSQL_INIT_COMMAND:
add_init_command(&mysql->options,arg);
break;
case MYSQL_READ_DEFAULT_FILE:
my_free(mysql->options.my_cnf_file);
mysql->options.my_cnf_file=my_strdup(arg,MYF(MY_WME));
break;
case MYSQL_READ_DEFAULT_GROUP:
my_free(mysql->options.my_cnf_group);
mysql->options.my_cnf_group=my_strdup(arg,MYF(MY_WME));
break;
case MYSQL_SET_CHARSET_DIR:
my_free(mysql->options.charset_dir);
mysql->options.charset_dir=my_strdup(arg,MYF(MY_WME));
break;
case MYSQL_SET_CHARSET_NAME:
my_free(mysql->options.charset_name);
mysql->options.charset_name=my_strdup(arg,MYF(MY_WME));
break;
case MYSQL_OPT_PROTOCOL:
mysql->options.protocol= *(uint*) arg;
break;
case MYSQL_SHARED_MEMORY_BASE_NAME:
#ifdef HAVE_SMEM
if (mysql->options.shared_memory_base_name != def_shared_memory_base_name)
my_free(mysql->options.shared_memory_base_name);
mysql->options.shared_memory_base_name=my_strdup(arg,MYF(MY_WME));
#endif
break;
case MYSQL_OPT_USE_REMOTE_CONNECTION:
case MYSQL_OPT_USE_EMBEDDED_CONNECTION:
case MYSQL_OPT_GUESS_CONNECTION:
mysql->options.methods_to_use= option;
break;
case MYSQL_SET_CLIENT_IP:
my_free(mysql->options.ci.client_ip);
mysql->options.ci.client_ip= my_strdup(arg, MYF(MY_WME));
break;
case MYSQL_SECURE_AUTH:
mysql->options.secure_auth= *(my_bool *) arg;
break;
case MYSQL_REPORT_DATA_TRUNCATION:
mysql->options.report_data_truncation= MY_TEST(*(my_bool *) arg);
break;
case MYSQL_OPT_RECONNECT:
mysql->reconnect= *(my_bool *) arg;
break;
case MYSQL_OPT_BIND:
my_free(mysql->options.ci.bind_address);
mysql->options.ci.bind_address= my_strdup(arg, MYF(MY_WME));
break;
case MYSQL_OPT_SSL_VERIFY_SERVER_CERT:
if (*(my_bool*) arg)
mysql->options.client_flag|= CLIENT_SSL_VERIFY_SERVER_CERT;
else
mysql->options.client_flag&= ~CLIENT_SSL_VERIFY_SERVER_CERT;
break;
case MYSQL_PLUGIN_DIR:
EXTENSION_SET_STRING(&mysql->options, plugin_dir, arg);
break;
case MYSQL_DEFAULT_AUTH:
EXTENSION_SET_STRING(&mysql->options, default_auth, arg);
break;
case MYSQL_OPT_SSL_KEY:
if (mysql->options.ssl_key)
my_free(mysql->options.ssl_key);
mysql->options.ssl_key= set_ssl_option_unpack_path(&mysql->options, arg);
break;
case MYSQL_OPT_SSL_CERT:
if (mysql->options.ssl_cert)
my_free(mysql->options.ssl_cert);
mysql->options.ssl_cert= set_ssl_option_unpack_path(&mysql->options, arg);
break;
case MYSQL_OPT_SSL_CA:
if (mysql->options.ssl_ca)
my_free(mysql->options.ssl_ca);
mysql->options.ssl_ca= set_ssl_option_unpack_path(&mysql->options, arg);
break;
case MYSQL_OPT_SSL_CAPATH:
if (mysql->options.ssl_capath)
my_free(mysql->options.ssl_capath);
mysql->options.ssl_capath= set_ssl_option_unpack_path(&mysql->options, arg);
break;
case MYSQL_OPT_SSL_CIPHER: SET_SSL_OPTION(ssl_cipher, arg); break;
case MYSQL_OPT_SSL_CRL:
if (mysql->options.extension)
my_free(mysql->options.extension->ssl_crl);
else
ALLOCATE_EXTENSIONS(&mysql->options);
mysql->options.extension->ssl_crl=
set_ssl_option_unpack_path(&mysql->options, arg);
break;
case MYSQL_OPT_SSL_CRLPATH:
if (mysql->options.extension)
my_free(mysql->options.extension->ssl_crlpath);
else
ALLOCATE_EXTENSIONS(&mysql->options);
mysql->options.extension->ssl_crlpath=
set_ssl_option_unpack_path(&mysql->options, arg);
break;
case MYSQL_OPT_SSL_CONTEXT:
ENSURE_EXTENSIONS_PRESENT(&mysql->options);
mysql->options.extension->ssl_context = (void*)arg;
break;
case MYSQL_SERVER_PUBLIC_KEY:
EXTENSION_SET_STRING(&mysql->options, server_public_key_path, arg);
break;
case MYSQL_OPT_CONNECT_ATTR_RESET:
ENSURE_EXTENSIONS_PRESENT(&mysql->options);
if (my_hash_inited(&mysql->options.extension->connection_attributes))
{
my_hash_free(&mysql->options.extension->connection_attributes);
mysql->options.extension->connection_attributes_length= 0;
}
break;
case MYSQL_OPT_CONNECT_ATTR_DELETE:
ENSURE_EXTENSIONS_PRESENT(&mysql->options);
if (my_hash_inited(&mysql->options.extension->connection_attributes))
{
size_t len;
uchar *elt;
len= arg ? strlen(arg) : 0;
if (len)
{
elt= my_hash_search(&mysql->options.extension->connection_attributes,
arg, len);
if (elt)
{
LEX_STRING *attr= (LEX_STRING *) elt;
LEX_STRING *key= attr, *value= attr + 1;
mysql->options.extension->connection_attributes_length-=
get_length_store_length(key->length) + key->length +
get_length_store_length(value->length) + value->length;
my_hash_delete(&mysql->options.extension->connection_attributes,
elt);
}
}
}
break;
case MYSQL_OPT_QUERY_ATTR_RESET:
ENSURE_EXTENSIONS_PRESENT(&mysql->options);
if (my_hash_inited(&mysql->options.extension->query_attributes))
{
my_hash_free(&mysql->options.extension->query_attributes);
mysql->options.extension->query_attributes_length= 0;
}
break;
case MYSQL_OPT_QUERY_ATTR_DELETE:
ENSURE_EXTENSIONS_PRESENT(&mysql->options);
if (my_hash_inited(&mysql->options.extension->query_attributes))
{
size_t len;
uchar *elt;
len= arg ? strlen(arg) : 0;
if (len)
{
elt= my_hash_search(&mysql->options.extension->query_attributes,
arg, len);
if (elt)
{
LEX_STRING *attr= (LEX_STRING *) elt;
LEX_STRING *key= attr, *value= attr + 1;
mysql->options.extension->query_attributes_length-=
get_length_store_length(key->length) + key->length +
get_length_store_length(value->length) + value->length;
my_hash_delete(&mysql->options.extension->query_attributes,
elt);
}
}
}
break;
case MYSQL_ENABLE_CLEARTEXT_PLUGIN:
ENSURE_EXTENSIONS_PRESENT(&mysql->options);
mysql->options.extension->enable_cleartext_plugin=
(*(my_bool*) arg) ? TRUE : FALSE;
break;
case MYSQL_OPT_CAN_HANDLE_EXPIRED_PASSWORDS:
if (*(my_bool*) arg)
mysql->options.client_flag|= CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS;
else
mysql->options.client_flag&= ~CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS;
break;
case MYSQL_OPT_NET_RECEIVE_BUFFER_SIZE:
mysql->net.receive_buffer_size = *(uint*) arg;
default:
DBUG_RETURN(1);
}
DBUG_RETURN(0);
}
/**
A function to return the key from a connection attribute
*/
uchar *
get_attr_key(LEX_STRING *part, size_t *length,
my_bool not_used MY_ATTRIBUTE((unused)))
{
*length= part[0].length;
return (uchar *) part[0].str;
}
static int
add_attributes(MYSQL *mysql, const void *arg1, const void *arg2,
HASH* attrs, size_t* attrs_length)
{
DBUG_ENTER("add_attributes");
LEX_STRING *elt;
char *key, *value;
size_t key_len= arg1 ? strlen(arg1) : 0,
value_len= arg2 ? strlen(arg2) : 0;
size_t attr_storage_length= key_len + value_len;
/* we can't have a zero length key */
if (!key_len)
{
set_mysql_error(mysql, CR_INVALID_PARAMETER_NO, unknown_sqlstate);
DBUG_RETURN(1);
}
/* calculate the total storage length of the attribute */
attr_storage_length+= get_length_store_length(key_len);
attr_storage_length+= get_length_store_length(value_len);
/*
Throw and error if the maximum combined length of the attribute value
will be greater than the maximum that we can safely transmit.
*/
if (attr_storage_length + *attrs_length > MAX_ATTR_STORAGE_LENGTH)
{
set_mysql_error(mysql, CR_INVALID_PARAMETER_NO, unknown_sqlstate);
DBUG_RETURN(1);
}
if (!my_hash_inited(attrs))
{
if (my_hash_init(attrs, &my_charset_bin, 0, 0, 0,
(my_hash_get_key) get_attr_key, my_free, HASH_UNIQUE))
{
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
DBUG_RETURN(1);
}
}
if (!my_multi_malloc(MY_WME,
&elt, 2 * sizeof(LEX_STRING),
&key, key_len + 1,
&value, value_len + 1,
NULL))
{
set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate);
DBUG_RETURN(1);
}
elt[0].str= key; elt[0].length= key_len;
elt[1].str= value; elt[1].length= value_len;
if (key_len)
memcpy(key, arg1, key_len);
key[key_len]= 0;
if (value_len)
memcpy(value, arg2, value_len);
value[value_len]= 0;
if (my_hash_insert(attrs, (uchar *) elt))
{
/* can't insert the value */
my_free(elt);
set_mysql_error(mysql, CR_DUPLICATE_ATTR, unknown_sqlstate);
DBUG_RETURN(1);
}
*attrs_length+= attr_storage_length;
DBUG_RETURN(0);
}
int STDCALL
mysql_options4(MYSQL *mysql,enum mysql_option option,
const void *arg1, const void *arg2)
{
DBUG_ENTER("mysql_option");
DBUG_PRINT("enter",("option: %d",(int) option));
switch (option)
{
case MYSQL_OPT_CONNECT_ATTR_ADD:
{
ENSURE_EXTENSIONS_PRESENT(&mysql->options);
DBUG_RETURN(add_attributes(mysql, arg1, arg2,
&mysql->options.extension->
connection_attributes,
&mysql->options.extension->
connection_attributes_length));
}
case MYSQL_OPT_QUERY_ATTR_ADD:
{
ENSURE_EXTENSIONS_PRESENT(&mysql->options);
DBUG_RETURN(add_attributes(mysql, arg1, arg2,
&mysql->options.extension->
query_attributes,
&mysql->options.extension->
query_attributes_length));
}
case MYSQL_OPT_SSL_SESSION:
/**
* Set the SSL session to be used during sslConn. The client will
* hold a reference to the session until the connection is closed.
*
* @param take_ownership if true, the client will assume the caller's
* reference count to session.
*/
ENSURE_EXTENSIONS_PRESENT(&mysql->options);
#if defined(HAVE_OPENSSL) && !defined(EMBEDDED_LIBRARY)
SSL_SESSION* ssl_session = (SSL_SESSION*)arg1;
my_bool take_ownership = (long)arg2;
// Increment the reference count
if (!take_ownership && ssl_session != NULL)
#if defined(OPENSSL_IS_BORINGSSL) || OPENSSL_VERSION_NUMBER >= 0x10100000L
SSL_SESSION_up_ref(ssl_session);
#else
CRYPTO_add(&ssl_session->references, 1, CRYPTO_LOCK_SSL_SESSION);
#endif
if (mysql->options.extension->ssl_session)
SSL_SESSION_free((SSL_SESSION*)mysql->options.extension->ssl_session);
mysql->options.extension->ssl_session = (void*)ssl_session;
#endif /* HAVE_OPENSSL && !EMBEDDED_LIBRARY */
break;
default:
DBUG_RETURN(1);
}
DBUG_RETURN(0);
}
/****************************************************************************
Functions to get information from the MySQL structure
These are functions to make shared libraries more usable.
****************************************************************************/
/* MYSQL_RES */
my_ulonglong STDCALL mysql_num_rows(MYSQL_RES *res)
{
return res->row_count;
}
unsigned int STDCALL mysql_num_fields(MYSQL_RES *res)
{
return res->field_count;
}
uint STDCALL mysql_errno(MYSQL *mysql)
{
return mysql ? mysql->net.last_errno : mysql_server_last_errno;
}
const char * STDCALL mysql_error(MYSQL *mysql)
{
return mysql ? mysql->net.last_error : mysql_server_last_error;
}
/**
Read data and its length from a LIST node.
Assumes LIST which stores data blobs in LEX_STRING structures,
where LEX_STRING::str is pointer to the data and LEX_STRING::length
is the length of this data.
If node is NULL then data and length are set to NULL and 0, respectively,
and function returns 0, otherwise, if data has been read from the node,
function returns 1.
*/
static int get_data_and_length(LIST *node, const char **data, size_t *length)
{
DBUG_ASSERT(!node || node->data);
if (data)
*data= node ? ((LEX_STRING*)(node->data))->str : NULL;
if (length)
*length= node ? ((LEX_STRING*)(node->data))->length : 0;
return node ? 0 : 1;
}
/**
Get the first state change information received from the server.
@param mysql [IN] mysql handle
@param type [IN] state change type
@param data [OUT] buffer to store the data
@param length [OUT] length of the data
@return
0 - Valid data stored
1 - No data
*/
int STDCALL mysql_session_track_get_first(MYSQL *mysql,
enum enum_session_state_type type,
const char **data,
size_t *length)
{
STATE_INFO *info= STATE_DATA(mysql);
if (!info || !IS_SESSION_STATE_TYPE(type)
|| !(info->info_list[type].head_node))
return get_data_and_length(NULL, data, length);
info->info_list[type].current_node= info->info_list[type].head_node;
return mysql_session_track_get_next(mysql, type, data, length);
}
/**
Get the subsequent state change information received from the server.
@param mysql [IN] mysql handle
@param type [IN] state change type
@param data [OUT] buffer to store the data
@param length [OUT] length of the data
@return
0 - Valid data stored
1 - No data
*/
int STDCALL mysql_session_track_get_next(MYSQL *mysql,
enum enum_session_state_type type,
const char **data,
size_t *length)
{
STATE_INFO *info= STATE_DATA(mysql);
int ret;
if (!info || !IS_SESSION_STATE_TYPE(type)
|| !(info->info_list[type].current_node))
return get_data_and_length(NULL, data, length);
ret= get_data_and_length(info->info_list[type].current_node,
data, length);
info->info_list[type].current_node=
list_rest(info->info_list[type].current_node);
return ret;
}
/*
Get the first key/value pair from the response attribute data
@param mysql [IN] mysql handle
@param keydata [OUT] the data for the key
@param keylength [OUT] length of the key
@param keydata [OUT] the data for the key
@param keylength [OUT] length of the key
@return
0 - Valid data stored
1 - No data
*/
static int mysql_resp_attr_get_first(MYSQL *mysql,
const char **keydata,
size_t *keylength,
const char **valdata,
size_t *vallength)
{
const char *attr1data;
const char *attr2data;
size_t attr1length;
size_t attr2length;
if (!mysql_session_track_get_first(mysql, SESSION_TRACK_RESP_ATTR,
&attr1data, &attr1length))
{
if (!mysql_session_track_get_next(mysql, SESSION_TRACK_RESP_ATTR,
&attr2data, &attr2length))
{
*keydata = attr1data;
*keylength = attr1length;
*valdata = attr2data;
*vallength = attr2length;
return FALSE;
}
}
return TRUE;
}
/*
Get the next key/value pair from the response attribute data
@param mysql [IN] mysql handle
@param keydata [OUT] the data for the key
@param keylength [OUT] length of the key
@param keydata [OUT] the data for the key
@param keylength [OUT] length of the key
@return
0 - Valid data stored
1 - No data
*/
static int mysql_resp_attr_get_next(MYSQL *mysql,
const char **keydata,
size_t *keylength,
const char **valdata,
size_t *vallength)
{
const char *attr1data;
const char *attr2data;
size_t attr1length;
size_t attr2length;
if (!mysql_session_track_get_next(mysql, SESSION_TRACK_RESP_ATTR,
&attr1data, &attr1length))
{
if (!mysql_session_track_get_next(mysql, SESSION_TRACK_RESP_ATTR,
&attr2data, &attr2length))
{
*keydata = attr1data;
*keylength = attr1length;
*valdata = attr2data;
*vallength = attr2length;
return FALSE;
}
}
return TRUE;
}
/*
Get the response attribute value for a particular key
@param mysql [IN] mysql handle
@param key [IN} the attribute key to find
@param data [OUT] buffer to store the data in
@param length [OUT] length of the data
@return
0 - Valid data stored
1 - No data
*/
int STDCALL mysql_resp_attr_find(MYSQL *mysql,
const char *lookup,
const char **data,
size_t *length)
{
int ret;
const char *key;
const char *val;
size_t keylen;
size_t vallen;
size_t lookup_len = strlen(lookup);
ret = mysql_resp_attr_get_first(mysql, &key, &keylen, &val, &vallen);
while (!ret)
{
if (lookup_len == keylen && strncmp(lookup, key, keylen) == 0)
{
*data = val;
*length = vallen;
return FALSE;
}
ret = mysql_resp_attr_get_next(mysql, &key, &keylen, &val, &vallen);
}
return TRUE;
}
/*
Get version number for server in a form easy to test on
SYNOPSIS
mysql_get_server_version()
mysql Connection
EXAMPLE
4.1.0-alfa -> 40100
NOTES
We will ensure that a newer server always has a bigger number.
RETURN
Signed number > 323000
Zero if there is no connection
*/
ulong STDCALL
mysql_get_server_version(MYSQL *mysql)
{
ulong major= 0, minor= 0, version= 0;
if (mysql->server_version)
{
char *pos= mysql->server_version, *end_pos;
major= strtoul(pos, &end_pos, 10); pos=end_pos+1;
minor= strtoul(pos, &end_pos, 10); pos=end_pos+1;
version= strtoul(pos, &end_pos, 10);
}
else
{
set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate);
}
return major*10000 + minor*100 + version;
}
/*
mysql_set_character_set function sends SET NAMES cs_name to
the server (which changes character_set_client, character_set_result
and character_set_connection) and updates mysql->charset so other
functions like mysql_real_escape will work correctly.
*/
int STDCALL mysql_set_character_set(MYSQL *mysql, const char *cs_name)
{
struct charset_info_st *cs;
const char *save_csdir= charsets_dir;
if (mysql->options.charset_dir)
charsets_dir= mysql->options.charset_dir;
if (!mysql->net.vio)
{
/* Initialize with automatic OS character set detection. */
mysql_options(mysql, MYSQL_SET_CHARSET_NAME, cs_name);
mysql_init_character_set(mysql);
/*
In case of automatic OS character set detection
mysql_init_character_set changes mysql->options.charset_name
from "auto" to the real character set name.
Reset cs_name to the detected character set name, accordingly.
*/
cs_name= mysql->options.charset_name;
}
if (strlen(cs_name) < MY_CS_NAME_SIZE &&
(cs= get_charset_by_csname(cs_name, MY_CS_PRIMARY, MYF(0))))
{
char buff[MY_CS_NAME_SIZE + 10];
charsets_dir= save_csdir;
if (!mysql->net.vio)
{
/* If there is no connection yet we don't send "SET NAMES" query */
mysql->charset= cs;
return 0;
}
/* Skip execution of "SET NAMES" for pre-4.1 servers */
if (mysql_get_server_version(mysql) < 40100)
return 0;
sprintf(buff, "SET NAMES %s", cs_name);
if (!mysql_real_query(mysql, buff, (uint) strlen(buff)))
{
mysql->charset= cs;
}
}
else
{
char cs_dir_name[FN_REFLEN];
get_charsets_dir(cs_dir_name);
set_mysql_extended_error(mysql, CR_CANT_READ_CHARSET, unknown_sqlstate,
ER(CR_CANT_READ_CHARSET), cs_name, cs_dir_name);
}
charsets_dir= save_csdir;
return mysql->net.last_errno;
}
/**
client authentication plugin that does native MySQL authentication
using a 20-byte (4.1+) scramble
*/
static int native_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql)
{
int pkt_len;
uchar *pkt;
DBUG_ENTER("native_password_auth_client");
if (((MCPVIO_EXT *)vio)->mysql_change_user)
{
/*
in mysql_change_user() the client sends the first packet.
we use the old scramble.
*/
pkt= (uchar*)mysql->scramble;
pkt_len= SCRAMBLE_LENGTH + 1;
}
else
{
/* read the scramble */
if ((pkt_len= vio->read_packet(vio, &pkt)) < 0)
DBUG_RETURN(CR_ERROR);
if (pkt_len != SCRAMBLE_LENGTH + 1)
DBUG_RETURN(CR_SERVER_HANDSHAKE_ERR);
/* save it in MYSQL */
memcpy(mysql->scramble, pkt, SCRAMBLE_LENGTH);
mysql->scramble[SCRAMBLE_LENGTH] = 0;
}
if (mysql->passwd[0])
{
char scrambled[SCRAMBLE_LENGTH + 1];
DBUG_PRINT("info", ("sending scramble"));
scramble(scrambled, (char*)pkt, mysql->passwd);
if (vio->write_packet(vio, (uchar*)scrambled, SCRAMBLE_LENGTH))
DBUG_RETURN(CR_ERROR);
}
else
{
DBUG_PRINT("info", ("no password"));
if (vio->write_packet(vio, 0, 0)) /* no password */
DBUG_RETURN(CR_ERROR);
}
DBUG_RETURN(CR_OK);
}
/* NOTE: this really returns a net_async_status */
static int
native_password_auth_client_nonblocking(MYSQL_PLUGIN_VIO *vio,
MYSQL *mysql,
int *result)
{
int io_result;
uchar *pkt;
mysql_authsm_context *ctx = mysql->connect_context->auth_context;
DBUG_ENTER("native_password_auth_client_nonblocking");
switch (ctx->native_client_state) {
case READING_PASSWORD:
if (((MCPVIO_EXT *)vio)->mysql_change_user)
{
/*
in mysql_change_user() the client sends the first packet.
we use the old scramble.
*/
pkt= (uchar*)mysql->scramble;
}
else
{
/* read the scramble */
net_async_status status = vio->read_packet_nonblocking(vio, &pkt, &io_result);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
if (io_result < 0) {
*result = CR_ERROR;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
if (io_result != SCRAMBLE_LENGTH + 1) {
*result = CR_ERROR;
DBUG_RETURN(CR_SERVER_HANDSHAKE_ERR);
}
/* save it in MYSQL */
memcpy(mysql->scramble, pkt, SCRAMBLE_LENGTH);
mysql->scramble[SCRAMBLE_LENGTH] = 0;
}
ctx->native_client_state = WRITING_RESPONSE;
/* fallthrough */
case WRITING_RESPONSE:
if (mysql->passwd[0])
{
char scrambled[SCRAMBLE_LENGTH + 1];
DBUG_PRINT("info", ("sending scramble"));
pkt= (uchar*)mysql->scramble;
scramble(scrambled, (char*)pkt, mysql->passwd);
net_async_status status =
vio->write_packet_nonblocking(vio, (uchar*)scrambled, SCRAMBLE_LENGTH, &io_result);
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
if (io_result < 0) {
*result = CR_ERROR;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
}
else
{
DBUG_PRINT("info", ("no password"));
net_async_status status =
vio->write_packet_nonblocking(vio, 0, 0, &io_result); /* no password */
if (status == NET_ASYNC_NOT_READY) {
DBUG_RETURN(NET_ASYNC_NOT_READY);
}
if (io_result < 0) {
*result = CR_ERROR;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
}
break;
default:
assert(0);
}
*result = CR_OK;
DBUG_RETURN(NET_ASYNC_COMPLETE);
}
/**
client authentication plugin that does old MySQL authentication
using an 8-byte (4.0-) scramble
*/
static int old_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql)
{
uchar *pkt;
int pkt_len;
DBUG_ENTER("old_password_auth_client");
if (((MCPVIO_EXT *)vio)->mysql_change_user)
{
/*
in mysql_change_user() the client sends the first packet.
we use the old scramble.
*/
pkt= (uchar*)mysql->scramble;
pkt_len= SCRAMBLE_LENGTH_323 + 1;
}
else
{
/* read the scramble */
if ((pkt_len= vio->read_packet(vio, &pkt)) < 0)
DBUG_RETURN(CR_ERROR);
if (pkt_len != SCRAMBLE_LENGTH_323 + 1 &&
pkt_len != SCRAMBLE_LENGTH + 1)
DBUG_RETURN(CR_SERVER_HANDSHAKE_ERR);
/*
save it in MYSQL.
Copy data of length SCRAMBLE_LENGTH_323 or SCRAMBLE_LENGTH
to ensure that buffer overflow does not occur.
*/
memcpy(mysql->scramble, pkt, (pkt_len - 1));
mysql->scramble[pkt_len-1] = 0;
}
if (mysql->passwd[0])
{
/*
If --secure-auth option is used, throw an error.
Note that, we do not need to check for CLIENT_SECURE_CONNECTION
capability of server. If server is not capable of handling secure
connections, we would have raised error before reaching here.
TODO: Change following code to access MYSQL structure through
client-side plugin service.
*/
if (mysql->options.secure_auth)
{
set_mysql_error(mysql, CR_SECURE_AUTH, unknown_sqlstate);
DBUG_RETURN(CR_ERROR);
}
else
{
char scrambled[SCRAMBLE_LENGTH_323 + 1];
scramble_323(scrambled, (char*)pkt, mysql->passwd);
if (vio->write_packet(vio, (uchar*)scrambled, SCRAMBLE_LENGTH_323 + 1))
DBUG_RETURN(CR_ERROR);
}
}
else
if (vio->write_packet(vio, 0, 0)) /* no password */
DBUG_RETURN(CR_ERROR);
DBUG_RETURN(CR_OK);
}
/**
The main function of the mysql_clear_password authentication plugin.
*/
static int clear_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql)
{
int res;
/* send password in clear text */
res= vio->write_packet(vio, (const unsigned char *) mysql->passwd,
strlen(mysql->passwd) + 1);
return res ? CR_ERROR : CR_OK;
}
#if defined(EXPORT_SYMVER16)
#ifndef EMBEDDED_LIBRARY
// Hack to provide both libmysqlclient_16 and libmysqlclient_18 symbol versions
#define SYM_16(_exportedsym) __asm__(".symver symver16_" #_exportedsym "," #_exportedsym "@libmysqlclient_16")
void STDCALL symver16_mysql_close(MYSQL *mysql)
{
return mysql_close(mysql);
}
SYM_16(mysql_close);
uint STDCALL symver16_mysql_errno(MYSQL *mysql)
{
return mysql_errno(mysql);
}
SYM_16(mysql_errno);
const char * STDCALL symver16_mysql_error(MYSQL *mysql)
{
return mysql_error(mysql);
}
SYM_16(mysql_error);
ulong * STDCALL symver16_mysql_fetch_lengths(MYSQL_RES *res)
{
return mysql_fetch_lengths(res);
}
SYM_16(mysql_fetch_lengths);
MYSQL_ROW STDCALL symver16_mysql_fetch_row(MYSQL_RES *res)
{
return mysql_fetch_row(res);
}
SYM_16(mysql_fetch_row);
void STDCALL symver16_mysql_free_result(MYSQL_RES *result)
{
return mysql_free_result(result);
}
SYM_16(mysql_free_result);
ulong STDCALL symver16_mysql_get_server_version(MYSQL *mysql)
{
return mysql_get_server_version(mysql);
}
SYM_16(mysql_get_server_version);
const char * STDCALL symver16_mysql_get_ssl_cipher(MYSQL *mysql __attribute__((unused)))
{
return mysql_get_ssl_cipher(mysql);
}
SYM_16(mysql_get_ssl_cipher);
MYSQL * STDCALL symver16_mysql_init(MYSQL *mysql)
{
return mysql_init(mysql);
}
SYM_16(mysql_init);
unsigned int STDCALL symver16_mysql_num_fields(MYSQL_RES *res)
{
return mysql_num_fields(res);
}
SYM_16(mysql_num_fields);
my_ulonglong STDCALL symver16_mysql_num_rows(MYSQL_RES *res)
{
return mysql_num_rows(res);
}
SYM_16(mysql_num_rows);
int STDCALL symver16_mysql_options(MYSQL *mysql,enum mysql_option option, const void *arg)
{
return mysql_options(mysql, option, arg);
}
SYM_16(mysql_options);
int STDCALL symver16_mysql_real_query(MYSQL *mysql, const char *query, ulong length)
{
return mysql_real_query(mysql, query, length);
}
SYM_16(mysql_real_query);
int STDCALL symver16_mysql_select_db(MYSQL *mysql, const char *db)
{
return mysql_select_db(mysql, db);
}
SYM_16(mysql_select_db);
int STDCALL symver16_mysql_send_query(MYSQL* mysql, const char* query, ulong length)
{
return mysql_send_query(mysql, query, length);
}
SYM_16(mysql_send_query);
int STDCALL symver16_mysql_set_character_set(MYSQL *mysql, const char *cs_name)
{
return mysql_set_character_set(mysql, cs_name);
}
SYM_16(mysql_set_character_set);
my_bool STDCALL symver16_mysql_ssl_set(MYSQL *mysql __attribute__((unused)), const char *key __attribute__((unused)), const char *cert __attribute__((unused)), const char *ca __attribute__((unused)), const char *capath __attribute__((unused)), const char *cipher __attribute__((unused)))
{
return mysql_ssl_set(mysql, key, cert, ca, capath, cipher);
}
SYM_16(mysql_ssl_set);
MYSQL_RES * STDCALL symver16_mysql_store_result(MYSQL *mysql)
{
return mysql_store_result(mysql);
}
SYM_16(mysql_store_result);
#endif
#endif /* EXPORT_SYMVER16 */