/* Copyright (c) 2003, 2019, Oracle and/or its affiliates. All rights reserved. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License, version 2.0, as published by the Free Software Foundation. This program is also distributed with certain software (including but not limited to OpenSSL) that is licensed under separate terms, as designated in a particular file or component or in included license documentation. The authors of MySQL hereby grant you an additional permission to link the program and your derivative works with the separately licensed software that they have included with MySQL. Without limiting anything contained in the foregoing, this file, which is part of C Driver for MySQL (Connector/C), is also subject to the Universal FOSS Exception, version 1.0, a copy of which can be found at http://oss.oracle.com/licenses/universal-foss-exception. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License, version 2.0, for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */ /* This file is included by both libmysql.c (the MySQL client C API) and the mysqld server to connect to another MYSQL server. The differences for the two cases are: - Things that only works for the client: - Trying to automaticly determinate user name if not supplied to mysql_real_connect() - Support for reading local file with LOAD DATA LOCAL - SHARED memory handling - Prepared statements - Things that only works for the server In all other cases, the code should be idential for the client and server. */ #include "my_config.h" #include #include #include "m_ctype.h" #include "m_string.h" #include "my_sys.h" #include "mysys_err.h" #ifndef _WIN32 #include #endif #ifdef HAVE_NETINET_IN_H #include #endif #include #include #include "client_async_authentication.h" #include "compression.h" // validate_compression_attributes #include "errmsg.h" #include "lex_string.h" #include "map_helpers.h" #include "my_byteorder.h" #include "my_compiler.h" #include "my_dbug.h" #include "my_default.h" #include "my_inttypes.h" #include "my_io.h" #include "my_loglevel.h" #include "my_macros.h" #include "my_psi_config.h" #include "my_shm_defaults.h" #include "mysql.h" #include "mysql/client_authentication.h" #include "mysql/plugin_auth_common.h" #include "mysql/psi/mysql_memory.h" #include "mysql/service_mysql_alloc.h" #include "mysql_version.h" #include "mysqld_error.h" #include "template_utils.h" #include "typelib.h" #include "violite.h" #if !defined(_WIN32) #include "my_thread.h" /* because of signal() */ #endif /* !defined(_WIN32) */ #include #include #include #ifdef HAVE_PWD_H #include #endif #ifdef HAVE_SYS_SELECT_H #include #endif #ifdef HAVE_SYS_UN_H #include #endif #ifndef _WIN32 #include #define SOCKET_ERROR -1 #endif #ifdef HAVE_OPENSSL #include #endif #include #include #include "../libmysql/init_commands_array.h" #include "../libmysql/mysql_trace.h" /* MYSQL_TRACE() instrumentation */ #include "sql_common.h" #ifdef MYSQL_SERVER #include "mysql_com_server.h" #include "sql/client_settings.h" #else #include "libmysql/client_settings.h" #endif #include "sql/log_event.h" /* Log_event_type */ #include "sql/rpl_constants.h" /* mysql_binlog_XXX() */ using std::string; using std::swap; #define STATE_DATA(M) \ (NULL != (M) ? &(MYSQL_EXTENSION_PTR(M)->state_change) : NULL) #define ADD_INFO(M, element, type) \ { \ M = STATE_DATA(mysql); \ M->info_list[type].head_node = \ list_add(M->info_list[type].head_node, element); \ } #define native_password_plugin_name "mysql_native_password" #define caching_sha2_password_plugin_name "caching_sha2_password" PSI_memory_key key_memory_mysql_options; PSI_memory_key key_memory_MYSQL_DATA; PSI_memory_key key_memory_MYSQL; PSI_memory_key key_memory_MYSQL_RES; PSI_memory_key key_memory_MYSQL_ROW; PSI_memory_key key_memory_MYSQL_state_change_info; PSI_memory_key key_memory_MYSQL_HANDSHAKE; #if defined(_WIN32) PSI_memory_key key_memory_create_shared_memory; #endif /* _WIN32 */ #ifdef HAVE_PSI_INTERFACE /* This code is common to the client and server, and also used in the server when server A connects to server B, for example with replication. Therefore, the code is also instrumented. */ static PSI_memory_info all_client_memory[] = { #if defined(_WIN32) {&key_memory_create_shared_memory, "create_shared_memory", 0, 0, PSI_DOCUMENT_ME}, #endif /* _WIN32 */ {&key_memory_mysql_options, "mysql_options", 0, 0, PSI_DOCUMENT_ME}, {&key_memory_MYSQL_DATA, "MYSQL_DATA", 0, 0, PSI_DOCUMENT_ME}, {&key_memory_MYSQL, "MYSQL", 0, 0, PSI_DOCUMENT_ME}, {&key_memory_MYSQL_RES, "MYSQL_RES", 0, 0, PSI_DOCUMENT_ME}, {&key_memory_MYSQL_ROW, "MYSQL_ROW", 0, 0, PSI_DOCUMENT_ME}, {&key_memory_MYSQL_state_change_info, "MYSQL_STATE_CHANGE_INFO", 0, 0, PSI_DOCUMENT_ME}, {&key_memory_MYSQL_HANDSHAKE, "MYSQL_HANDSHAKE", 0, 0, PSI_DOCUMENT_ME}}; void init_client_psi_keys(void) { const char *category = "client"; int count; count = static_cast(array_elements(all_client_memory)); mysql_memory_register(category, all_client_memory, count); } #endif /* HAVE_PSI_INTERFACE */ uint mysql_port = 0; char *mysql_unix_port = 0; const char *unknown_sqlstate = "HY000"; const char *not_error_sqlstate = "00000"; const char *cant_connect_sqlstate = "08001"; #if defined(_WIN32) static char *shared_memory_base_name = 0; const char *def_shared_memory_base_name = default_shared_memory_base_name; #endif ulong g_net_buffer_length = 8192; ulong g_max_allowed_packet = 1024L * 1024L * 1024L; static void mysql_prune_stmt_list(MYSQL *mysql); static int read_com_query_metadata(MYSQL *mysql, uchar *pos, ulong field_count); CHARSET_INFO *default_client_charset_info = &my_charset_latin1; /* Server error code and message */ unsigned int mysql_server_last_errno; char mysql_server_last_error[MYSQL_ERRMSG_SIZE]; /* forward declaration */ static int read_one_row(MYSQL *mysql, uint fields, MYSQL_ROW row, ulong *lengths); static net_async_status read_one_row_nonblocking(MYSQL *mysql, uint fields, MYSQL_ROW row, ulong *lengths, int *res); /** Convert the connect timeout option to a timeout value for VIO functions (vio_socket_connect() and vio_io_wait()). @param mysql Connection handle (client side). @return The timeout value in milliseconds, or -1 if no timeout. */ static int get_vio_connect_timeout(MYSQL *mysql) { int timeout_ms; uint timeout_sec; /* A timeout of 0 means no timeout. Also, the connect_timeout option value is in seconds, while VIO timeouts are measured in milliseconds. Hence, check for a possible overflow. In case of overflow, set to no timeout. */ timeout_sec = mysql->options.connect_timeout; if (!timeout_sec || (timeout_sec > INT_MAX / 1000)) timeout_ms = -1; else timeout_ms = (int)(timeout_sec * 1000); return timeout_ms; } #ifdef _WIN32 /** Convert the connect timeout option to a timeout value for WIN32 synchronization functions. @remark Specific for WIN32 connection methods shared memory and named pipe. @param mysql Connection handle (client side). @return The timeout value in milliseconds, or INFINITE if no timeout. */ static DWORD get_win32_connect_timeout(MYSQL *mysql) { DWORD timeout_ms; uint timeout_sec; /* A timeout of 0 means no timeout. Also, the connect_timeout option value is in seconds, while WIN32 timeouts are in milliseconds. Hence, check for a possible overflow. In case of overflow, set to no timeout. */ timeout_sec = mysql->options.connect_timeout; if (!timeout_sec || (timeout_sec > INT_MAX / 1000)) timeout_ms = INFINITE; else timeout_ms = (DWORD)(timeout_sec * 1000); return timeout_ms; } #endif /** Set the internal error message to mysql handler @param mysql connection handle (client side) @param errcode CR_ error code, passed to ER macro to get error text @param sqlstate SQL standard sqlstate */ void set_mysql_error(MYSQL *mysql, int errcode, const char *sqlstate) { NET *net; DBUG_TRACE; DBUG_PRINT("enter", ("error :%d '%s'", errcode, ER_CLIENT(errcode))); DBUG_ASSERT(mysql != 0); if (mysql) { net = &mysql->net; net->last_errno = errcode; my_stpcpy(net->last_error, ER_CLIENT(errcode)); my_stpcpy(net->sqlstate, sqlstate); MYSQL_TRACE(ERROR, mysql, ()); } else { mysql_server_last_errno = errcode; my_stpcpy(mysql_server_last_error, ER_CLIENT(errcode)); } } /** Is this NET instance initialized? @c my_net_init() and net_end() */ static bool my_net_is_inited(NET *net) { return net->buff != NULL; } /** Clear possible error state of struct NET @param net clear the state of the argument */ void net_clear_error(NET *net) { net->last_errno = 0; net->last_error[0] = '\0'; my_stpcpy(net->sqlstate, not_error_sqlstate); } /** Set an error message on the client. @param mysql connection handle @param errcode CR_* errcode, for client errors @param sqlstate SQL standard sql state, unknown_sqlstate for the majority of client errors. @param format error message template, in sprintf format @param ... variable number of arguments */ void set_mysql_extended_error(MYSQL *mysql, int errcode, const char *sqlstate, const char *format, ...) { NET *net; va_list args; DBUG_TRACE; DBUG_PRINT("enter", ("error :%d '%s'", errcode, format)); DBUG_ASSERT(mysql != 0); net = &mysql->net; net->last_errno = errcode; va_start(args, format); vsnprintf(net->last_error, sizeof(net->last_error) - 1, format, args); va_end(args); my_stpcpy(net->sqlstate, sqlstate); MYSQL_TRACE(ERROR, mysql, ()); } /* Create a named pipe connection */ #ifdef _WIN32 static HANDLE create_named_pipe(MYSQL *mysql, DWORD connect_timeout, const char **arg_host, const char **arg_unix_socket) { HANDLE hPipe = INVALID_HANDLE_VALUE; char pipe_name[1024]; DWORD dwMode; int i; bool testing_named_pipes = 0; const char *host = *arg_host, *unix_socket = *arg_unix_socket; if (!unix_socket || (unix_socket)[0] == 0x00) unix_socket = mysql_unix_port; if (!host || !strcmp(host, LOCAL_HOST)) host = LOCAL_HOST_NAMEDPIPE; pipe_name[sizeof(pipe_name) - 1] = 0; /* Safety if too long string */ strxnmov(pipe_name, sizeof(pipe_name) - 1, "\\\\.\\pipe\\", unix_socket, NullS); DBUG_PRINT("info", ("Server name: '%s'. Named Pipe: %s", host, unix_socket)); for (i = 0; i < 100; i++) /* Don't retry forever */ { if ((hPipe = CreateFile(pipe_name, FILE_READ_ATTRIBUTES | FILE_READ_DATA | FILE_WRITE_ATTRIBUTES | FILE_WRITE_DATA, 0, NULL, OPEN_EXISTING, FILE_FLAG_OVERLAPPED | SECURITY_SQOS_PRESENT | SECURITY_IDENTIFICATION, NULL)) != INVALID_HANDLE_VALUE) break; if (GetLastError() != ERROR_PIPE_BUSY) { set_mysql_extended_error(mysql, CR_NAMEDPIPEOPEN_ERROR, unknown_sqlstate, ER_CLIENT(CR_NAMEDPIPEOPEN_ERROR), host, unix_socket, (ulong)GetLastError()); return INVALID_HANDLE_VALUE; } /* wait for for an other instance */ if (!WaitNamedPipe(pipe_name, connect_timeout)) { set_mysql_extended_error(mysql, CR_NAMEDPIPEWAIT_ERROR, unknown_sqlstate, ER_CLIENT(CR_NAMEDPIPEWAIT_ERROR), host, unix_socket, (ulong)GetLastError()); return INVALID_HANDLE_VALUE; } } if (hPipe == INVALID_HANDLE_VALUE) { set_mysql_extended_error(mysql, CR_NAMEDPIPEOPEN_ERROR, unknown_sqlstate, ER_CLIENT(CR_NAMEDPIPEOPEN_ERROR), host, unix_socket, (ulong)GetLastError()); return INVALID_HANDLE_VALUE; } dwMode = PIPE_READMODE_BYTE | PIPE_WAIT; if (!SetNamedPipeHandleState(hPipe, &dwMode, NULL, NULL)) { CloseHandle(hPipe); set_mysql_extended_error(mysql, CR_NAMEDPIPESETSTATE_ERROR, unknown_sqlstate, ER_CLIENT(CR_NAMEDPIPESETSTATE_ERROR), host, unix_socket, (ulong)GetLastError()); return INVALID_HANDLE_VALUE; } *arg_host = host; *arg_unix_socket = unix_socket; /* connect arg */ return (hPipe); } #endif /* Create new shared memory connection, return handler of connection @param mysql Pointer of mysql structure @param net Pointer of net structure @param connect_timeout Timeout of connection (in milliseconds) @return HANDLE to the shared memory area. */ #if defined(_WIN32) static HANDLE create_shared_memory(MYSQL *mysql, NET *net, DWORD connect_timeout) { ulong smem_buffer_length = shared_memory_buffer_length + 4; /* event_connect_request is event object for start connection actions event_connect_answer is event object for confirm, that server put data handle_connect_file_map is file-mapping object, use for create shared memory handle_connect_map is pointer on shared memory handle_map is pointer on shared memory for client event_server_wrote, event_server_read, event_client_wrote, event_client_read are events for transfer data between server and client handle_file_map is file-mapping object, use for create shared memory */ HANDLE event_connect_request = NULL; HANDLE event_connect_answer = NULL; HANDLE handle_connect_file_map = NULL; char *handle_connect_map = NULL; char *handle_map = NULL; HANDLE event_server_wrote = NULL; HANDLE event_server_read = NULL; HANDLE event_client_wrote = NULL; HANDLE event_client_read = NULL; HANDLE event_conn_closed = NULL; HANDLE handle_file_map = NULL; HANDLE connect_named_mutex = NULL; ulong connect_number; char connect_number_char[22], *p; char *tmp = NULL; char *suffix_pos; DWORD error_allow = 0; DWORD error_code = 0; DWORD event_access_rights = SYNCHRONIZE | EVENT_MODIFY_STATE; char *shared_memory_base_name = mysql->options.shared_memory_base_name; static const char *name_prefixes[] = {"", "Global\\"}; const char *prefix; int i; /* If this is NULL, somebody freed the MYSQL* options. mysql_close() is a good candidate. We don't just silently (re)set it to def_shared_memory_base_name as that would create really confusing/buggy behavior if the user passed in a different name on the command-line or in a my.cnf. */ DBUG_ASSERT(shared_memory_base_name != NULL); /* get enough space base-name + '_' + longest suffix we might ever send */ if (!(tmp = (char *)my_malloc(key_memory_create_shared_memory, strlen(shared_memory_base_name) + 32L, MYF(MY_FAE)))) goto err; /* The name of event and file-mapping events create agree next rule: shared_memory_base_name+unique_part Where: shared_memory_base_name is unique value for each server unique_part is uniquel value for each object (events and file-mapping) */ for (i = 0; i < array_elements(name_prefixes); i++) { prefix = name_prefixes[i]; suffix_pos = strxmov(tmp, prefix, shared_memory_base_name, "_", NullS); my_stpcpy(suffix_pos, "CONNECT_REQUEST"); event_connect_request = OpenEvent(event_access_rights, false, tmp); if (event_connect_request) { break; } } if (!event_connect_request) { error_allow = CR_SHARED_MEMORY_CONNECT_REQUEST_ERROR; goto err; } my_stpcpy(suffix_pos, "CONNECT_ANSWER"); if (!(event_connect_answer = OpenEvent(event_access_rights, false, tmp))) { error_allow = CR_SHARED_MEMORY_CONNECT_ANSWER_ERROR; goto err; } my_stpcpy(suffix_pos, "CONNECT_DATA"); if (!(handle_connect_file_map = OpenFileMapping(FILE_MAP_WRITE, false, tmp))) { error_allow = CR_SHARED_MEMORY_CONNECT_FILE_MAP_ERROR; goto err; } if (!(handle_connect_map = static_cast(MapViewOfFile( handle_connect_file_map, FILE_MAP_WRITE, 0, 0, sizeof(DWORD))))) { error_allow = CR_SHARED_MEMORY_CONNECT_MAP_ERROR; goto err; } my_stpcpy(suffix_pos, "CONNECT_NAMED_MUTEX"); connect_named_mutex = OpenMutex(SYNCHRONIZE, false, tmp); if (connect_named_mutex == NULL) { error_allow = CR_SHARED_MEMORY_CONNECT_SET_ERROR; goto err; } if (WaitForSingleObject(connect_named_mutex, connect_timeout) != WAIT_OBJECT_0) { error_allow = CR_SHARED_MEMORY_CONNECT_ABANDONED_ERROR; goto err; } /* Send to server request of connection */ if (!SetEvent(event_connect_request)) { error_allow = CR_SHARED_MEMORY_CONNECT_SET_ERROR; goto err; } /* Wait of answer from server */ if (WaitForSingleObject(event_connect_answer, connect_timeout) != WAIT_OBJECT_0) { error_allow = CR_SHARED_MEMORY_CONNECT_ABANDONED_ERROR; goto err; } /* Get number of connection */ connect_number = uint4korr(handle_connect_map); /*WAX2*/ ReleaseMutex(connect_named_mutex); CloseHandle(connect_named_mutex); connect_named_mutex = NULL; p = int10_to_str(connect_number, connect_number_char, 10); /* The name of event and file-mapping events create agree next rule: shared_memory_base_name+unique_part+number_of_connection Where: shared_memory_base_name is uniquel value for each server unique_part is uniquel value for each object (events and file-mapping) number_of_connection is number of connection between server and client */ suffix_pos = strxmov(tmp, prefix, shared_memory_base_name, "_", connect_number_char, "_", NullS); my_stpcpy(suffix_pos, "DATA"); if ((handle_file_map = OpenFileMapping(FILE_MAP_WRITE, false, tmp)) == NULL) { error_allow = CR_SHARED_MEMORY_FILE_MAP_ERROR; goto err2; } if ((handle_map = static_cast(MapViewOfFile( handle_file_map, FILE_MAP_WRITE, 0, 0, smem_buffer_length))) == NULL) { error_allow = CR_SHARED_MEMORY_MAP_ERROR; goto err2; } my_stpcpy(suffix_pos, "SERVER_WROTE"); if ((event_server_wrote = OpenEvent(event_access_rights, false, tmp)) == NULL) { error_allow = CR_SHARED_MEMORY_EVENT_ERROR; goto err2; } my_stpcpy(suffix_pos, "SERVER_READ"); if ((event_server_read = OpenEvent(event_access_rights, false, tmp)) == NULL) { error_allow = CR_SHARED_MEMORY_EVENT_ERROR; goto err2; } my_stpcpy(suffix_pos, "CLIENT_WROTE"); if ((event_client_wrote = OpenEvent(event_access_rights, false, tmp)) == NULL) { error_allow = CR_SHARED_MEMORY_EVENT_ERROR; goto err2; } my_stpcpy(suffix_pos, "CLIENT_READ"); if ((event_client_read = OpenEvent(event_access_rights, false, tmp)) == NULL) { error_allow = CR_SHARED_MEMORY_EVENT_ERROR; goto err2; } my_stpcpy(suffix_pos, "CONNECTION_CLOSED"); if ((event_conn_closed = OpenEvent(event_access_rights, false, tmp)) == NULL) { error_allow = CR_SHARED_MEMORY_EVENT_ERROR; goto err2; } /* Set event that server should send data */ SetEvent(event_server_read); err2: if (error_allow == 0) { net->vio = vio_new_win32shared_memory( handle_file_map, handle_map, event_server_wrote, event_server_read, event_client_wrote, event_client_read, event_conn_closed); } else { error_code = GetLastError(); if (event_server_read) CloseHandle(event_server_read); if (event_server_wrote) CloseHandle(event_server_wrote); if (event_client_read) CloseHandle(event_client_read); if (event_client_wrote) CloseHandle(event_client_wrote); if (event_conn_closed) CloseHandle(event_conn_closed); if (handle_map) UnmapViewOfFile(handle_map); if (handle_file_map) CloseHandle(handle_file_map); } err: my_free(tmp); if (error_allow) error_code = GetLastError(); if (event_connect_request) CloseHandle(event_connect_request); if (event_connect_answer) CloseHandle(event_connect_answer); if (handle_connect_map) UnmapViewOfFile(handle_connect_map); if (handle_connect_file_map) CloseHandle(handle_connect_file_map); if (error_allow) { if (connect_named_mutex) { ReleaseMutex(connect_named_mutex); CloseHandle(connect_named_mutex); } if (error_allow == CR_SHARED_MEMORY_EVENT_ERROR) set_mysql_extended_error(mysql, error_allow, unknown_sqlstate, ER_CLIENT(error_allow), suffix_pos, error_code); else set_mysql_extended_error(mysql, error_allow, unknown_sqlstate, ER_CLIENT(error_allow), error_code); return (INVALID_HANDLE_VALUE); } return (handle_map); } #endif /* Free all memory acquired to store state change information. */ static void free_state_change_info(MYSQL_EXTENSION *ext) { STATE_INFO *info; int i; if (ext) info = &ext->state_change; else return; for (i = SESSION_TRACK_SYSTEM_VARIABLES; i <= SESSION_TRACK_END; i++) { if (list_length(info->info_list[i].head_node) != 0) { list_free(info->info_list[i].head_node, (uint)0); } } memset(info, 0, sizeof(STATE_INFO)); } /** Helper function to check if the buffer has at least bytes remaining If the buffer is too small it raises CR_MALFORMED_PACKET_ERROR. @param mysql the handle that has the buffer @param packet the current position in the buffer @param packet_length the size of the packet @param bytes the bytes that we want available @retval true the buffer has that many bytes @retval false the buffer has less bytes remaining */ inline bool buffer_check_remaining(MYSQL *mysql, uchar *packet, ulong packet_length, size_t bytes) { size_t remaining_bytes = packet_length - (packet - mysql->net.read_pos); if (remaining_bytes < bytes) { set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); return false; } return true; } /* Helper function to safely read a variable size from a buffer. If the buffer is too small it raises CR_MALFORMED_PACKET_ERROR and sets is_error to true. Otherwise it sets is_error to false and calls @ref inet_field_length_ll. @sa @ref net_field_length_ll @param mysql the handle to return an error in @param [in,out] packet pointer to the buffer to read the length from @param packet_length remining bytes in packet @param [out] is_error set to true if the buffer contains no room for a full length, false otherwise. @return the size read. */ inline my_ulonglong net_field_length_ll_safe(MYSQL *mysql, uchar **packet, ulong packet_length, bool *is_error) { size_t sizeof_len = net_field_length_size(*packet); if (!buffer_check_remaining(mysql, *packet, packet_length, sizeof_len)) { *is_error = true; return 0; } *is_error = false; return net_field_length_ll(packet); } /** Read Ok packet along with the server state change information. */ void read_ok_ex(MYSQL *mysql, ulong length) { size_t total_len, len; uchar *pos, *saved_pos; my_ulonglong affected_rows, insert_id; char *db; char *data_str; CHARSET_INFO *saved_cs; bool is_charset; STATE_INFO *info = NULL; enum enum_session_state_type type; LIST *element = NULL; LEX_STRING *data = NULL; bool is_error; pos = mysql->net.read_pos + 1; affected_rows = net_field_length_ll_safe(mysql, &pos, length, &is_error); /* affected rows */ if (is_error) return; insert_id = net_field_length_ll_safe(mysql, &pos, length, &is_error); /* insert id */ if (is_error) return; /* The following check ensures that we skip the assignment for the above read fields (i.e. affected_rows and insert_id) wherein the EOF packets are deprecated and the server sends OK packet instead with a packet header of 0xFE (254) to identify it as an EOF packet. We ignore this assignment as the valid contents of EOF packet include packet marker, server status and warning count only. However, we would assign these values to the connection handle if it was an OK packet with a packet header of 0x00. */ if (!((mysql->server_capabilities & CLIENT_DEPRECATE_EOF) && mysql->net.read_pos[0] == 254)) { mysql->affected_rows = affected_rows; mysql->insert_id = insert_id; DBUG_PRINT("info", ("affected_rows: %lu insert_id: %lu", (ulong)mysql->affected_rows, (ulong)mysql->insert_id)); } if (!buffer_check_remaining(mysql, pos, length, 2)) return; /* server status */ mysql->server_status = uint2korr(pos); pos += 2; if (protocol_41(mysql)) { if (!buffer_check_remaining(mysql, pos, length, 2)) return; mysql->warning_count = uint2korr(pos); pos += 2; } else mysql->warning_count = 0; /* MySQL 4.0 protocol */ DBUG_PRINT("info", ("status: %u warning_count: %u", mysql->server_status, mysql->warning_count)); if (mysql->server_capabilities & CLIENT_SESSION_TRACK) { free_state_change_info(static_cast(mysql->extension)); if (pos < mysql->net.read_pos + length) { /* get the info field */ size_t length_msg_member = (size_t)net_field_length_ll_safe(mysql, &pos, length, &is_error); if (is_error) return; mysql->info = (length_msg_member ? (char *)pos : NULL); pos += (length_msg_member); /* read session state changes info */ if (mysql->server_status & SERVER_SESSION_STATE_CHANGED) { saved_pos = pos; total_len = (size_t)net_field_length_ll_safe(mysql, &pos, length, &is_error); if (is_error) return; /* ensure that mysql->info is zero-terminated */ if (mysql->info) *saved_pos = 0; while (total_len > 0) { saved_pos = pos; type = (enum enum_session_state_type)net_field_length_ll_safe( mysql, &pos, length, &is_error); if (is_error) return; switch (type) { case SESSION_TRACK_SYSTEM_VARIABLES: /* Move past the total length of the changed entity. */ (void)net_field_length_ll_safe(mysql, &pos, length, &is_error); if (is_error) return; /* Name of the system variable. */ len = (size_t)net_field_length_ll_safe(mysql, &pos, length, &is_error); if (is_error) return; if (!buffer_check_remaining(mysql, pos, length, len)) return; if (!my_multi_malloc(key_memory_MYSQL_state_change_info, MYF(0), &element, sizeof(LIST), &data, sizeof(LEX_STRING), &data_str, len, NullS)) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return; } data->str = data_str; memcpy(data->str, (char *)pos, len); data->length = len; pos += len; element->data = data; ADD_INFO(info, element, SESSION_TRACK_SYSTEM_VARIABLES); /* Check if the changed variable was charset. In that case we need to update mysql->charset. */ if (!strncmp(data->str, "character_set_client", data->length)) is_charset = 1; else is_charset = 0; /* Value of the system variable. */ len = (size_t)net_field_length_ll_safe(mysql, &pos, length, &is_error); if (is_error) return; if (!buffer_check_remaining(mysql, pos, length, len)) return; if (!my_multi_malloc(key_memory_MYSQL_state_change_info, MYF(0), &element, sizeof(LIST), &data, sizeof(LEX_STRING), &data_str, len, NullS)) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return; } data->str = data_str; memcpy(data->str, (char *)pos, len); data->length = len; pos += len; element->data = data; ADD_INFO(info, element, SESSION_TRACK_SYSTEM_VARIABLES); if (is_charset == 1) { char charset_name[MY_CS_NAME_SIZE * 8]; // MY_CS_BUFFER_SIZE size_t length = std::min(data->length, sizeof(charset_name) - 1); saved_cs = mysql->charset; memcpy(charset_name, data->str, length); charset_name[length] = 0; if (!(mysql->charset = get_charset_by_csname( charset_name, MY_CS_PRIMARY, MYF(MY_WME)))) { DBUG_PRINT( "warning", ("session tracker supplied %s is not a valid charset." " Keeping the old one.", charset_name)); mysql->charset = saved_cs; } } break; case SESSION_TRACK_TRANSACTION_STATE: case SESSION_TRACK_TRANSACTION_CHARACTERISTICS: case SESSION_TRACK_SCHEMA: /* Move past the total length of the changed entity. */ (void)net_field_length_ll_safe(mysql, &pos, length, &is_error); if (is_error) return; len = (size_t)net_field_length_ll_safe(mysql, &pos, length, &is_error); if (is_error) return; if (!buffer_check_remaining(mysql, pos, length, len)) return; if (!my_multi_malloc(key_memory_MYSQL_state_change_info, MYF(0), &element, sizeof(LIST), &data, sizeof(LEX_STRING), &data_str, len, NullS)) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return; } data->str = data_str; memcpy(data->str, (char *)pos, len); data->length = len; pos += len; element->data = data; ADD_INFO(info, element, type); if (type == SESSION_TRACK_SCHEMA) { if (!(db = (char *)my_malloc(key_memory_MYSQL_state_change_info, data->length + 1, MYF(MY_WME)))) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return; } if (mysql->db) my_free(mysql->db); memcpy(db, data->str, data->length); db[data->length] = '\0'; mysql->db = db; } break; case SESSION_TRACK_GTIDS: /* Move past the total length of the changed entity. */ (void)net_field_length_ll_safe(mysql, &pos, length, &is_error); if (is_error) return; /* read (and ignore for now) the GTIDS encoding specification code */ (void)net_field_length_ll_safe(mysql, &pos, length, &is_error); if (is_error) return; /* For now we ignore the encoding specification, since only one is supported. In the future the decoding of what comes next depends on the specification code. */ /* read the length of the encoded string. */ len = (size_t)net_field_length_ll_safe(mysql, &pos, length, &is_error); if (is_error) return; if (!buffer_check_remaining(mysql, pos, length, len)) return; if (!my_multi_malloc(key_memory_MYSQL_state_change_info, MYF(0), &element, sizeof(LIST), &data, sizeof(LEX_STRING), &data_str, len, NullS)) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return; } data->str = data_str; memcpy(data->str, (char *)pos, len); data->length = len; pos += len; element->data = data; ADD_INFO(info, element, SESSION_TRACK_GTIDS); break; case SESSION_TRACK_STATE_CHANGE: /* Get the length of the boolean tracker */ len = (size_t)net_field_length_ll_safe(mysql, &pos, length, &is_error); if (is_error) return; /* length for boolean tracker is always 1 */ DBUG_ASSERT(len == 1); if (!buffer_check_remaining(mysql, pos, length, len)) return; if (!my_multi_malloc(key_memory_MYSQL_state_change_info, MYF(0), &element, sizeof(LIST), &data, sizeof(LEX_STRING), &data_str, len, NullS)) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return; } data->str = data_str; memcpy(data->str, (char *)pos, len); data->length = len; pos += len; element->data = data; ADD_INFO(info, element, SESSION_TRACK_STATE_CHANGE); break; default: DBUG_ASSERT(type <= SESSION_TRACK_END); /* Unknown/unsupported type received, get the total length and move past it. */ len = (size_t)net_field_length_ll_safe(mysql, &pos, length, &is_error); if (is_error) return; pos += len; break; } total_len -= (pos - saved_pos); } if (info) { int itype; for (itype = SESSION_TRACK_BEGIN; itype < SESSION_TRACK_END; itype++) { if (info->info_list[itype].head_node) { info->info_list[itype].current_node = info->info_list[itype].head_node = list_reverse(info->info_list[itype].head_node); } } } } } } else if (pos < mysql->net.read_pos + length && net_field_length(&pos)) mysql->info = (char *)pos; else mysql->info = NULL; return; } /* Helper for cli_safe_read and cli_safe_read_nonblocking */ static ulong cli_safe_read_with_ok_complete(MYSQL *mysql, bool parse_ok, bool *is_data_packet, ulong len); /** Read a packet from server in asynchronous way. This function can return without completly reading the packet, in such a case call this function again until complete packet is read. @param[in] mysql connection handle @param[in] parse_ok if set to true then parse OK packet if it was sent by server @param[out] is_data_packet if set to true then the packet received was a "data packet". @param[out] res The length of the packet that was read or packet_error in case of error. @retval NET_ASYNC_NOT_READY packet was not completely read @retval NET_ASYNC_COMPLETE finished reading packet */ net_async_status cli_safe_read_with_ok_nonblocking(MYSQL *mysql, bool parse_ok, bool *is_data_packet, ulong *res) { NET *net = &mysql->net; NET_ASYNC *net_async = NET_ASYNC_DATA(net); ulong len = 0, complen = 0; DBUG_TRACE; if (net_async->async_multipacket_read_started == false) { net_async->async_multipacket_read_started = true; net_async->async_multipacket_read_saved_whereb = net->where_b; net_async->async_multipacket_read_total_len = 0; } if (net->vio != 0) { net_async_status status = my_net_read_nonblocking(net, &len, &complen); if (len != packet_error) { net_async->async_multipacket_read_total_len += len; net->where_b += len; } if (status == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } } net->where_b = net_async->async_multipacket_read_saved_whereb; net->read_pos = net->buff + net->where_b; DBUG_PRINT("info", ("total nb read: %lu", net_async->async_multipacket_read_total_len)); *res = cli_safe_read_with_ok_complete( mysql, parse_ok, is_data_packet, net_async->async_multipacket_read_total_len); net_async->async_multipacket_read_started = false; net_async->async_multipacket_read_saved_whereb = 0; return NET_ASYNC_COMPLETE; } /** Its a non blocking version of cli_safe_read */ net_async_status cli_safe_read_nonblocking(MYSQL *mysql, bool *is_data_packet, ulong *res) { return cli_safe_read_with_ok_nonblocking(mysql, 0, is_data_packet, res); } /** Read a packet from server. Give error message if socket was down or packet is an error message @param[in] mysql connection handle @param[in] parse_ok if set to true then parse OK packet if it is received @param[out] is_data_packet if set to true then packet received is a "data packet", that is not OK or ERR packet or EOF in case of old servers @return The length of the packet that was read or packet_error in case of error. In case of error its description is stored in mysql handle. */ ulong cli_safe_read_with_ok(MYSQL *mysql, bool parse_ok, bool *is_data_packet) { NET *net = &mysql->net; ulong len = 0; MYSQL_TRACE(READ_PACKET, mysql, ()); if (is_data_packet) *is_data_packet = false; if (net->vio != 0) len = my_net_read(net); return cli_safe_read_with_ok_complete(mysql, parse_ok, is_data_packet, len); } ulong cli_safe_read_with_ok_complete(MYSQL *mysql, bool parse_ok, bool *is_data_packet, ulong len) { NET *net = &mysql->net; DBUG_TRACE; if (len == packet_error || len == 0) { #ifndef DBUG_OFF char desc[VIO_DESCRIPTION_SIZE]; vio_description(net->vio, desc); DBUG_PRINT("error", ("Wrong connection or packet. fd: %s len: %lu", desc, len)); #endif // DBUG_OFF #ifdef MYSQL_SERVER if (net->vio && (net->last_errno == ER_NET_READ_INTERRUPTED)) return packet_error; #endif /*MYSQL_SERVER*/ end_server(mysql); set_mysql_error(mysql, net->last_errno == ER_NET_PACKET_TOO_LARGE ? CR_NET_PACKET_TOO_LARGE : CR_SERVER_LOST, unknown_sqlstate); return packet_error; } MYSQL_TRACE(PACKET_RECEIVED, mysql, (len, net->read_pos)); if (net->read_pos[0] == 255) { /* After server reprts an error, usually it is ready to accept new commands and we set stage to READY_FOR_COMMAND. This can be modified by the caller of cli_safe_read(). */ MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); if (len > 3) { uchar *pos = net->read_pos + 1; net->last_errno = uint2korr(pos); pos += 2; len -= 2; if (protocol_41(mysql) && pos[0] == '#') { strmake(net->sqlstate, (char *)pos + 1, SQLSTATE_LENGTH); pos += SQLSTATE_LENGTH + 1; } else { /* The SQL state hasn't been received -- it should be reset to HY000 (unknown error sql state). */ my_stpcpy(net->sqlstate, unknown_sqlstate); } (void)strmake(net->last_error, (char *)pos, MY_MIN((uint)len, (uint)sizeof(net->last_error) - 1)); } else set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate); /* Cover a protocol design error: error packet does not contain the server status. Therefore, the client has no way to find out whether there are more result sets of a multiple-result-set statement pending. Luckily, in 5.0 an error always aborts execution of a statement, wherever it is a multi-statement or a stored procedure, so it should be safe to unconditionally turn off the flag here. */ mysql->server_status &= ~SERVER_MORE_RESULTS_EXISTS; DBUG_PRINT("error", ("Got error: %d/%s (%s)", net->last_errno, net->sqlstate, net->last_error)); return packet_error; } else { /* if it is OK packet irrespective of new/old server */ if (net->read_pos[0] == 0) { if (parse_ok) { read_ok_ex(mysql, len); return len; } } /* Now we have a data packet, unless it is OK packet starting with 0xFE - we detect that case below. */ if (is_data_packet) *is_data_packet = true; /* For a packet starting with 0xFE detect if it is OK packet or a huge data packet. Note that old servers do not send OK packets starting with 0xFE. */ if ((mysql->server_capabilities & CLIENT_DEPRECATE_EOF) && (net->read_pos[0] == 254)) { /* detect huge data packet */ if (len > MAX_PACKET_LENGTH) return len; /* otherwise we have OK packet starting with 0xFE */ if (is_data_packet) *is_data_packet = false; /* parse it if requested */ if (parse_ok) read_ok_ex(mysql, len); return len; } /* for old client detect EOF packet */ if (!(mysql->server_capabilities & CLIENT_DEPRECATE_EOF) && (net->read_pos[0] == 254) && (len < 8)) { if (is_data_packet) *is_data_packet = false; } } return len; } /** Read a packet from server. Give error message if connection was broken or ERR packet was received. Detect if the packet received was an OK, ERR or something else (a "data packet"). @param[in] mysql connection handle @param[out] is_data_packet if set to true then the packet received was a "data packet". @retval The length of the packet that was read or packet_error in case of error. In case of error its description is stored in mysql handle. */ ulong cli_safe_read(MYSQL *mysql, bool *is_data_packet) { return cli_safe_read_with_ok(mysql, 0, is_data_packet); } void free_rows(MYSQL_DATA *cur) { if (cur) { free_root(cur->alloc, MYF(0)); my_free(cur->alloc); my_free(cur); } } bool cli_advanced_command(MYSQL *mysql, enum enum_server_command command, const uchar *header, size_t header_length, const uchar *arg, size_t arg_length, bool skip_check, MYSQL_STMT *stmt) { NET *net = &mysql->net; bool result = 1; bool stmt_skip = stmt ? stmt->state != MYSQL_STMT_INIT_DONE : false; DBUG_TRACE; if (mysql->net.vio == 0) { /* Do reconnect if possible */ if (mysql_reconnect(mysql) || stmt_skip) return 1; } /* turn off non blocking operations */ if (!vio_is_blocking(mysql->net.vio)) vio_set_blocking_flag(mysql->net.vio, true); if (mysql->status != MYSQL_STATUS_READY || mysql->server_status & SERVER_MORE_RESULTS_EXISTS) { DBUG_PRINT("error", ("state: %d", mysql->status)); set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate); return 1; } net_clear_error(net); mysql->info = 0; mysql->affected_rows = ~(my_ulonglong)0; /* Do not check the socket/protocol buffer on COM_QUIT as the result of a previous command might not have been read. This can happen if a client sends a query but does not reap the result before attempting to close the connection. */ net_clear(&mysql->net, (command != COM_QUIT)); MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); MYSQL_TRACE(SEND_COMMAND, mysql, (command, header_length, arg_length, header, arg)); /* If auto-reconnect mode is enabled check if connection is still alive before sending new command. Otherwise, send() might not notice that connection was closed by the server (for example, due to KILL statement), and the fact that connection is gone will be noticed only on attempt to read command's result, when it is too late to reconnect. Note that such scenario can still occur if connection gets killed after this check but before command is sent to server. But this should be rare. */ if ((command != COM_QUIT) && mysql->reconnect && !vio_is_connected(net->vio)) net->error = 2; if (net_write_command(net, (uchar)command, header, header_length, arg, arg_length)) { DBUG_PRINT("error", ("Can't send command to server. Error: %d", socket_errno)); if (net->last_errno == ER_NET_PACKET_TOO_LARGE) { set_mysql_error(mysql, CR_NET_PACKET_TOO_LARGE, unknown_sqlstate); goto end; } end_server(mysql); if (mysql_reconnect(mysql) || stmt_skip) goto end; MYSQL_TRACE(SEND_COMMAND, mysql, (command, header_length, arg_length, header, arg)); if (net_write_command(net, (uchar)command, header, header_length, arg, arg_length)) { set_mysql_error(mysql, CR_SERVER_GONE_ERROR, unknown_sqlstate); goto end; } } MYSQL_TRACE(PACKET_SENT, mysql, (header_length + arg_length)); #if defined(CLIENT_PROTOCOL_TRACING) switch (command) { case COM_STMT_PREPARE: MYSQL_TRACE_STAGE(mysql, WAIT_FOR_PS_DESCRIPTION); break; case COM_STMT_FETCH: MYSQL_TRACE_STAGE(mysql, WAIT_FOR_ROW); break; /* No server reply is expected after these commands so we reamin ready for the next command. */ case COM_STMT_SEND_LONG_DATA: case COM_STMT_CLOSE: case COM_REGISTER_SLAVE: case COM_QUIT: break; /* These replication commands are not supported and we bail out by pretending that connection has been closed. */ case COM_BINLOG_DUMP: case COM_BINLOG_DUMP_GTID: case COM_TABLE_DUMP: MYSQL_TRACE(DISCONNECTED, mysql, ()); break; /* After COM_CHANGE_USER a regular authentication exchange is performed. */ case COM_CHANGE_USER: MYSQL_TRACE_STAGE(mysql, AUTHENTICATE); break; /* Server replies to COM_STATISTICS with a single packet containing a string with statistics information. */ case COM_STATISTICS: MYSQL_TRACE_STAGE(mysql, WAIT_FOR_PACKET); break; /* For all other commands we expect server to send regular reply which is either OK, ERR or a result-set header. */ default: MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); break; } #endif result = 0; if (!skip_check) { result = ((mysql->packet_length = cli_safe_read_with_ok(mysql, 1, NULL)) == packet_error ? 1 : 0); #if defined(CLIENT_PROTOCOL_TRACING) /* Return to READY_FOR_COMMAND protocol stage in case server reports error or sends OK packet. */ if (result || mysql->net.read_pos[0] == 0x00) MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); #endif } end: DBUG_PRINT("exit", ("result: %d", result)); return result; } net_async_status cli_advanced_command_nonblocking( MYSQL *mysql, enum enum_server_command command, const uchar *header, ulong header_length, const uchar *arg, ulong arg_length, bool skip_check, MYSQL_STMT *stmt, bool *ret) { NET *net = &mysql->net; NET_ASYNC *net_async = NET_ASYNC_DATA(net); bool result = 1; *ret = result; bool stmt_skip = stmt ? stmt->state != MYSQL_STMT_INIT_DONE : false; DBUG_TRACE; DBUG_DUMP("sending", header, header_length); if (arg && arg_length) { DBUG_DUMP("sending arg", arg, arg_length); } if (mysql->net.vio == 0) { set_mysql_error(mysql, CR_SERVER_GONE_ERROR, unknown_sqlstate); goto end; } if (net_async->async_send_command_status == NET_ASYNC_SEND_COMMAND_IDLE) { if (vio_is_blocking(mysql->net.vio)) { vio_set_blocking_flag(net->vio, false); } if (mysql->status != MYSQL_STATUS_READY || mysql->server_status & SERVER_MORE_RESULTS_EXISTS) { DBUG_PRINT("error", ("state: %d", mysql->status)); set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate); return NET_ASYNC_COMPLETE; } net_clear_error(net); mysql->info = 0; mysql->affected_rows = ~(my_ulonglong)0; /* Do not check the socket/protocol buffer on COM_QUIT as the result of a previous command might not have been read. This can happen if a client sends a query but does not reap the result before attempting to close the connection. */ DBUG_ASSERT(command <= COM_END); net_clear(&mysql->net, (command != COM_QUIT)); net_async->async_send_command_status = NET_ASYNC_SEND_COMMAND_WRITE_COMMAND; } MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); if (net_async->async_send_command_status == NET_ASYNC_SEND_COMMAND_WRITE_COMMAND) { bool err; MYSQL_TRACE(SEND_COMMAND, mysql, (command, header_length, arg_length, header, arg)); net_async_status status = net_write_command_nonblocking( net, (uchar)command, header, header_length, arg, arg_length, &err); if (status == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } if (err) { DBUG_PRINT("error", ("Can't send command to server. Error: %d", socket_errno)); if (net->last_errno == ER_NET_PACKET_TOO_LARGE) { set_mysql_error(mysql, CR_NET_PACKET_TOO_LARGE, unknown_sqlstate); goto end; } end_server(mysql); /* reset net_async to null as its reference has been freed */ net_async = nullptr; if (stmt_skip) goto end; set_mysql_error(mysql, CR_SERVER_GONE_ERROR, unknown_sqlstate); goto end; } MYSQL_TRACE(PACKET_SENT, mysql, (header_length + arg_length)); if (skip_check) { result = 0; goto end; } else { net_async->async_send_command_status = NET_ASYNC_SEND_COMMAND_READ_STATUS; } } if (net_async->async_send_command_status == NET_ASYNC_SEND_COMMAND_READ_STATUS) { ulong pkt_len; net_async_status status = cli_safe_read_with_ok_nonblocking(mysql, true, nullptr, &pkt_len); if (status == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } mysql->packet_length = pkt_len; result = (pkt_len == packet_error ? 1 : 0); #if defined(CLIENT_PROTOCOL_TRACING) /* Return to READY_FOR_COMMAND protocol stage in case server reports error or sends OK packet. */ if (!result || mysql->net.read_pos[0] == 0x00) MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); #endif } end: if (net_async) net_async->async_send_command_status = NET_ASYNC_SEND_COMMAND_IDLE; DBUG_PRINT("exit", ("result: %d", result)); *ret = result; return NET_ASYNC_COMPLETE; } void free_old_query(MYSQL *mysql) { DBUG_TRACE; if (mysql->field_alloc) { free_root(mysql->field_alloc, MYF(0)); init_alloc_root(PSI_NOT_INSTRUMENTED, mysql->field_alloc, 8192, 0); /* Assume rowlength < 8192 */ } mysql->fields = 0; mysql->field_count = 0; /* For API */ mysql->warning_count = 0; mysql->info = 0; } /** Finish reading of a partial result set from the server in asynchronous way. This function can return without completly flushing the result set, in such a case call this function again until result set in flushed. Read OK packet incase result set is not a data packet. @param[in] mysql connection handle @param[out] res true in case of protocol error, false otherwise @retval NET_ASYNC_NOT_READY result set not flushed yet @retval NET_ASYNC_COMPLETE finished flushing result set */ static net_async_status flush_one_result_nonblocking(MYSQL *mysql, bool *res) { DBUG_TRACE; *res = false; while (1) { ulong packet_length; bool is_data_packet; if (cli_safe_read_nonblocking(mysql, &is_data_packet, &packet_length) == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } mysql->packet_length = packet_length; if (packet_length == packet_error) { *res = true; break; } if (mysql->net.read_pos[0] != 0 && !is_data_packet) { if (protocol_41(mysql)) { uchar *pos = mysql->net.read_pos + 1; if (mysql->server_capabilities & CLIENT_DEPRECATE_EOF && !is_data_packet) { read_ok_ex(mysql, packet_length); } else { mysql->warning_count = uint2korr(pos); pos += 2; mysql->server_status = uint2korr(pos); } pos += 2; } break; } } return NET_ASYNC_COMPLETE; } /** Finish reading of a partial result set from the server. Get the EOF packet, and update mysql->status and mysql->warning_count. @return true if a communication or protocol error, an error is set in this case, false otherwise. */ static bool flush_one_result(MYSQL *mysql) { ulong packet_length; bool is_data_packet; DBUG_ASSERT(mysql->status != MYSQL_STATUS_READY); do { packet_length = cli_safe_read(mysql, &is_data_packet); /* There is an error reading from the connection, or (sic!) there were no error and no data in the stream, i.e. no more data from the server. Since we know our position in the stream (somewhere in the middle of a result set), this latter case is an error too -- each result set must end with a EOF packet. cli_safe_read() has set an error for us, just return. */ if (packet_length == packet_error) return true; } while (mysql->net.read_pos[0] == 0 || is_data_packet); /* Analyse final OK packet (EOF packet if it is old client) */ if (protocol_41(mysql)) { uchar *pos = mysql->net.read_pos + 1; if (mysql->server_capabilities & CLIENT_DEPRECATE_EOF && !is_data_packet) read_ok_ex(mysql, packet_length); else { mysql->warning_count = uint2korr(pos); pos += 2; mysql->server_status = uint2korr(pos); } pos += 2; } #if defined(CLIENT_PROTOCOL_TRACING) if (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); else MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); #endif return false; } /** Read a packet from network. If it's an OK packet, flush it. @return true if error, false otherwise. In case of success, is_ok_packet is set to true or false, based on what we got from network. */ static bool opt_flush_ok_packet(MYSQL *mysql, bool *is_ok_packet) { bool is_data_packet; ulong packet_length = cli_safe_read(mysql, &is_data_packet); if (packet_length == packet_error) return true; /* cli_safe_read always reads a non-empty packet. */ DBUG_ASSERT(packet_length); *is_ok_packet = ((mysql->net.read_pos[0] == 0) || ((mysql->server_capabilities & CLIENT_DEPRECATE_EOF) && mysql->net.read_pos[0] == 254 && packet_length < MAX_PACKET_LENGTH)); if (*is_ok_packet) { read_ok_ex(mysql, packet_length); #if defined(CLIENT_PROTOCOL_TRACING) if (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); else MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); #endif } return false; } static net_async_status cli_flush_use_result_nonblocking( MYSQL *mysql, bool flush_all_results MY_ATTRIBUTE((unused))) { DBUG_TRACE; /* flush_all_results is only used for mysql_stmt_close, and async is not supported for that. */ DBUG_ASSERT(!flush_all_results); bool res; return flush_one_result_nonblocking(mysql, &res); } /* Flush result set sent from server */ static void cli_flush_use_result(MYSQL *mysql, bool flush_all_results) { /* Clear the current execution status */ DBUG_TRACE; DBUG_PRINT("warning", ("Not all packets read, clearing them")); if (flush_one_result(mysql)) return; /* An error occurred */ if (!flush_all_results) return; while (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) { bool is_ok_packet; if (opt_flush_ok_packet(mysql, &is_ok_packet)) return; /* An error occurred. */ if (is_ok_packet) { /* Indeed what we got from network was an OK packet, and we know that OK is the last one in a multi-result-set, so just return. */ return; } /* It's a result set, not an OK packet. A result set contains of two result set subsequences: field metadata, terminated with EOF packet, and result set data, again terminated with EOF packet. Read and flush them. */ MYSQL_TRACE_STAGE(mysql, WAIT_FOR_FIELD_DEF); if (!(mysql->server_capabilities & CLIENT_DEPRECATE_EOF)) { if (flush_one_result(mysql)) return; /* An error occurred. */ } else { uchar *pos = (uchar *)mysql->net.read_pos; ulong field_count = net_field_length(&pos); if (read_com_query_metadata(mysql, pos, field_count)) { return; } else { free_root(mysql->field_alloc, MYF(0)); } } MYSQL_TRACE_STAGE(mysql, WAIT_FOR_ROW); if (flush_one_result(mysql)) return; } } #ifdef _WIN32 static bool is_NT(void) { char *os = getenv("OS"); return (os && !strcmp(os, "Windows_NT")) ? 1 : 0; } #endif #ifdef CHECK_LICENSE /** Check server side variable 'license'. If the variable does not exist or does not contain 'Commercial', we're talking to non-commercial server from commercial client. @retval 0 success @retval !0 network error or the server is not commercial. Error code is saved in mysql->net.last_errno. */ static int check_license(MYSQL *mysql) { MYSQL_ROW row; MYSQL_RES *res; NET *net = &mysql->net; static const char query[] = "SELECT @@license"; static const char required_license[] = STRINGIFY_ARG(LICENSE); if (mysql_real_query(mysql, query, (ulong)(sizeof(query) - 1))) { if (net->last_errno == ER_UNKNOWN_SYSTEM_VARIABLE) { set_mysql_extended_error(mysql, CR_WRONG_LICENSE, unknown_sqlstate, ER_CLIENT(CR_WRONG_LICENSE), required_license); } return 1; } if (!(res = mysql_use_result(mysql))) return 1; row = mysql_fetch_row(res); /* If no rows in result set, or column value is NULL (none of these two is ever true for server variables now), or column value mismatch, set wrong license error. */ if (!net->last_errno && (!row || !row[0] || strncmp(row[0], required_license, sizeof(required_license)))) { set_mysql_extended_error(mysql, CR_WRONG_LICENSE, unknown_sqlstate, ER_CLIENT(CR_WRONG_LICENSE), required_license); } mysql_free_result(res); return net->last_errno; } #endif /* CHECK_LICENSE */ /************************************************************************** Shut down connection **************************************************************************/ void end_server(MYSQL *mysql) { int save_errno = errno; DBUG_TRACE; if (mysql->net.vio != 0) { #ifndef DBUG_OFF char desc[VIO_DESCRIPTION_SIZE]; vio_description(mysql->net.vio, desc); DBUG_PRINT("info", ("Net: %s", desc)); #endif // DBUG_OFF #ifdef MYSQL_SERVER slave_io_thread_detach_vio(); #endif vio_delete(mysql->net.vio); mysql->net.vio = 0; /* Marker */ mysql_prune_stmt_list(mysql); } net_end(&mysql->net); // net_extension_free(&mysql->net); free_old_query(mysql); errno = save_errno; MYSQL_TRACE(DISCONNECTED, mysql, ()); } /** Frees the memory allocated for a result, set by APIs which would have returned rows. @param[in] result buffer which needs to be freed @retval NET_ASYNC_NOT_READY operation not complete, retry again @retval NET_ASYNC_COMPLETE operation complete */ net_async_status STDCALL mysql_free_result_nonblocking(MYSQL_RES *result) { DBUG_TRACE; DBUG_PRINT("enter", ("mysql_res: %p", result)); if (!result) return NET_ASYNC_COMPLETE; MYSQL *mysql = result->handle; if (mysql) { if (mysql->unbuffered_fetch_owner == &result->unbuffered_fetch_cancelled) mysql->unbuffered_fetch_owner = 0; if (mysql->status == MYSQL_STATUS_USE_RESULT) { if (mysql->methods->flush_use_result_nonblocking(mysql, false) == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } mysql->status = MYSQL_STATUS_READY; if (mysql->unbuffered_fetch_owner) *mysql->unbuffered_fetch_owner = true; } } free_rows(result->data); if (result->field_alloc) { free_root(result->field_alloc, MYF(0)); my_free(result->field_alloc); } my_free(result->row); my_free(result); return NET_ASYNC_COMPLETE; } void STDCALL mysql_free_result(MYSQL_RES *result) { DBUG_TRACE; DBUG_PRINT("enter", ("mysql_res: %p", result)); if (result) { MYSQL *mysql = result->handle; if (mysql) { if (mysql->unbuffered_fetch_owner == &result->unbuffered_fetch_cancelled) mysql->unbuffered_fetch_owner = 0; if (mysql->status == MYSQL_STATUS_USE_RESULT) { (*mysql->methods->flush_use_result)(mysql, false); mysql->status = MYSQL_STATUS_READY; if (mysql->unbuffered_fetch_owner) *mysql->unbuffered_fetch_owner = true; } } free_rows(result->data); if (result->field_alloc) { free_root(result->field_alloc, MYF(0)); my_free(result->field_alloc); } my_free(result->row); my_free(result); } } /**************************************************************************** Get options from my.cnf ****************************************************************************/ static const char *default_options[] = {"port", "socket", "compress", "password", "pipe", "timeout", "user", "init-command", "host", "database", "debug", "return-found-rows", "ssl-key", "ssl-cert", "ssl-ca", "ssl-capath", "character-sets-dir", "default-character-set", "interactive-timeout", "connect-timeout", "local-infile", "disable-local-infile", "ssl-cipher", "max-allowed-packet", "protocol", "shared-memory-base-name", "multi-results", "multi-statements", "multi-queries", "report-data-truncation", "plugin-dir", "default-auth", "bind-address", "ssl-crl", "ssl-crlpath", "enable-cleartext-plugin", "tls-version", "ssl_mode", "optional-resultset-metadata", "ssl-fips-mode", "tls-ciphersuites", NullS}; enum option_id { OPT_port = 1, OPT_socket, OPT_compress, OPT_password, OPT_pipe, OPT_timeout, OPT_user, OPT_init_command, OPT_host, OPT_database, OPT_debug, OPT_return_found_rows, OPT_ssl_key, OPT_ssl_cert, OPT_ssl_ca, OPT_ssl_capath, OPT_character_sets_dir, OPT_default_character_set, OPT_interactive_timeout, OPT_connect_timeout, OPT_local_infile, OPT_disable_local_infile, OPT_ssl_cipher, OPT_max_allowed_packet, OPT_protocol, OPT_shared_memory_base_name, OPT_multi_results, OPT_multi_statements, OPT_multi_queries, OPT_report_data_truncation, OPT_plugin_dir, OPT_default_auth, OPT_bind_address, OPT_ssl_crl, OPT_ssl_crlpath, OPT_enable_cleartext_plugin, OPT_tls_version, OPT_ssl_mode, OPT_optional_resultset_metadata, OPT_ssl_fips_mode, OPT_tls_ciphersuites, OPT_keep_this_one_last }; static TYPELIB option_types = {array_elements(default_options) - 1, "options", default_options, NULL}; const char *sql_protocol_names_lib[] = {"TCP", "SOCKET", "PIPE", "MEMORY", NullS}; TYPELIB sql_protocol_typelib = {array_elements(sql_protocol_names_lib) - 1, "", sql_protocol_names_lib, NULL}; static int add_init_command(struct st_mysql_options *options, const char *cmd) { char *tmp; if (!options->init_commands) { void *rawmem = my_malloc(key_memory_mysql_options, sizeof(Init_commands_array), MYF(MY_WME)); if (!rawmem) return 1; options->init_commands = new (rawmem) Init_commands_array(key_memory_mysql_options); } if (!(tmp = my_strdup(key_memory_mysql_options, cmd, MYF(MY_WME))) || options->init_commands->push_back(tmp)) { my_free(tmp); return 1; } return 0; } #define ALLOCATE_EXTENSIONS(OPTS) \ (OPTS)->extension = (struct st_mysql_options_extention *)my_malloc( \ key_memory_mysql_options, sizeof(struct st_mysql_options_extention), \ MYF(MY_WME | MY_ZEROFILL)) #define ENSURE_EXTENSIONS_PRESENT(OPTS) \ do { \ if (!(OPTS)->extension) ALLOCATE_EXTENSIONS(OPTS); \ } while (0) #define EXTENSION_SET_STRING(OPTS, X, STR) \ do { \ if ((OPTS)->extension) \ my_free((OPTS)->extension->X); \ else \ ALLOCATE_EXTENSIONS(OPTS); \ (OPTS)->extension->X = \ ((STR) != NULL) \ ? my_strdup(key_memory_mysql_options, (STR), MYF(MY_WME)) \ : NULL; \ } while (0) #if defined(HAVE_OPENSSL) #define SET_OPTION(opt_var, arg) \ do { \ if (mysql->options.opt_var) my_free(mysql->options.opt_var); \ mysql->options.opt_var = \ arg ? my_strdup(key_memory_mysql_options, arg, MYF(MY_WME)) : NULL; \ } while (0) #define EXTENSION_SET_SSL_STRING(OPTS, X, STR, mode) \ do { \ EXTENSION_SET_STRING(OPTS, X, static_cast(STR)); \ if ((OPTS)->extension->X) (OPTS)->extension->ssl_mode = mode; \ } while (0) #else #define EXTENSION_SET_SSL_STRING(OPTS, X, STR, mode) \ do { \ ; \ } while (0) #endif static char *set_ssl_option_unpack_path(const char *arg) { char *opt_var = NULL; if (arg) { char *buff = (char *)my_malloc(key_memory_mysql_options, FN_REFLEN + 1, MYF(MY_WME)); unpack_filename(buff, arg); opt_var = my_strdup(key_memory_mysql_options, buff, MYF(MY_WME)); my_free(buff); } return opt_var; } void mysql_read_default_options(struct st_mysql_options *options, const char *filename, const char *group) { int argc; char *argv_buff[1], **argv; const char *groups[3]; DBUG_TRACE; DBUG_PRINT("enter", ("file: %s group: %s", filename, group ? group : "NULL")); static_assert(OPT_keep_this_one_last == array_elements(default_options), "OPT_keep_this_one_last needs to be the last element."); argc = 1; argv = argv_buff; argv_buff[0] = const_cast("client"); groups[0] = "client"; groups[1] = group; groups[2] = nullptr; MEM_ROOT alloc{PSI_NOT_INSTRUMENTED, 512}; my_load_defaults(filename, groups, &argc, &argv, &alloc, nullptr); if (argc != 1) /* If some default option */ { char **option = argv; while (*++option) { if (my_getopt_is_args_separator(option[0])) /* skip arguments separator */ continue; /* DBUG_PRINT("info",("option: %s",option[0])); */ if (option[0][0] == '-' && option[0][1] == '-') { char *end = strchr(*option, '='); char *opt_arg = nullptr; if (end != nullptr) { opt_arg = end + 1; *end = 0; /* Remove '=' */ } /* Change all '_' in variable name to '-' */ for (end = *option; end != nullptr; end = strchr(end, '_')) *end = '-'; switch (find_type(*option + 2, &option_types, FIND_TYPE_BASIC)) { case OPT_port: if (opt_arg) options->port = atoi(opt_arg); break; case OPT_socket: if (opt_arg) { my_free(options->unix_socket); options->unix_socket = my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); } break; case OPT_compress: options->compress = 1; options->client_flag |= CLIENT_COMPRESS; break; case OPT_password: if (opt_arg) { my_free(options->password); options->password = my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); } break; case OPT_pipe: options->protocol = MYSQL_PROTOCOL_PIPE; break; case OPT_connect_timeout: case OPT_timeout: if (opt_arg) options->connect_timeout = atoi(opt_arg); break; case OPT_user: if (opt_arg) { my_free(options->user); options->user = my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); } break; case OPT_init_command: add_init_command(options, opt_arg); break; case OPT_host: if (opt_arg) { my_free(options->host); options->host = my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); } break; case OPT_database: if (opt_arg) { my_free(options->db); options->db = my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); } break; case OPT_debug: #ifndef MYSQL_SERVER mysql_debug(opt_arg ? opt_arg : "d:t:o,/tmp/client.trace"); break; #endif case OPT_return_found_rows: options->client_flag |= CLIENT_FOUND_ROWS; break; #if defined(HAVE_OPENSSL) case OPT_ssl_key: my_free(options->ssl_key); options->ssl_key = my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); break; case OPT_ssl_cert: my_free(options->ssl_cert); options->ssl_cert = my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); break; case OPT_ssl_ca: my_free(options->ssl_ca); options->ssl_ca = my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); break; case OPT_ssl_capath: my_free(options->ssl_capath); options->ssl_capath = my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); break; case OPT_ssl_cipher: my_free(options->ssl_cipher); options->ssl_cipher = my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); break; case OPT_tls_ciphersuites: EXTENSION_SET_STRING(options, tls_ciphersuites, opt_arg); break; case OPT_tls_version: EXTENSION_SET_SSL_STRING(options, tls_version, opt_arg, SSL_MODE_PREFERRED); break; case OPT_ssl_crl: EXTENSION_SET_SSL_STRING(options, ssl_crl, opt_arg, SSL_MODE_PREFERRED); break; case OPT_ssl_crlpath: EXTENSION_SET_SSL_STRING(options, ssl_crlpath, opt_arg, SSL_MODE_PREFERRED); break; #else case OPT_ssl_key: case OPT_ssl_cert: case OPT_ssl_ca: case OPT_ssl_capath: case OPT_ssl_cipher: case OPT_tls_ciphersuites: case OPT_ssl_crl: case OPT_ssl_crlpath: case OPT_tls_version: break; #endif /* HAVE_OPENSSL */ case OPT_character_sets_dir: my_free(options->charset_dir); options->charset_dir = my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); break; case OPT_default_character_set: my_free(options->charset_name); options->charset_name = my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); break; case OPT_interactive_timeout: options->client_flag |= CLIENT_INTERACTIVE; break; case OPT_local_infile: if (!opt_arg || atoi(opt_arg) != 0) options->client_flag |= CLIENT_LOCAL_FILES; else options->client_flag &= ~CLIENT_LOCAL_FILES; break; case OPT_disable_local_infile: options->client_flag &= ~CLIENT_LOCAL_FILES; break; case OPT_max_allowed_packet: if (opt_arg) options->max_allowed_packet = atoi(opt_arg); break; case OPT_protocol: if ((options->protocol = find_type(opt_arg, &sql_protocol_typelib, FIND_TYPE_BASIC)) <= 0) { my_message_local(ERROR_LEVEL, EE_UNKNOWN_PROTOCOL_OPTION, opt_arg); exit(1); } break; case OPT_shared_memory_base_name: #if defined(_WIN32) if (options->shared_memory_base_name != def_shared_memory_base_name) my_free(options->shared_memory_base_name); options->shared_memory_base_name = my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); #endif break; case OPT_multi_results: options->client_flag |= CLIENT_MULTI_RESULTS; break; case OPT_multi_statements: case OPT_multi_queries: options->client_flag |= CLIENT_MULTI_STATEMENTS | CLIENT_MULTI_RESULTS; break; case OPT_report_data_truncation: options->report_data_truncation = opt_arg ? (atoi(opt_arg) != 0) : 1; break; case OPT_plugin_dir: { char buff[FN_REFLEN], buff2[FN_REFLEN]; if (strlen(opt_arg) >= FN_REFLEN) opt_arg[FN_REFLEN] = '\0'; if (my_realpath(buff, opt_arg, 0)) { DBUG_PRINT("warning", ("failed to normalize the plugin path: %s", opt_arg)); break; } convert_dirname(buff2, buff, NULL); EXTENSION_SET_STRING(options, plugin_dir, buff2); } break; case OPT_default_auth: EXTENSION_SET_STRING(options, default_auth, opt_arg); break; case OPT_bind_address: my_free(options->bind_address); options->bind_address = my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); break; case OPT_enable_cleartext_plugin: ENSURE_EXTENSIONS_PRESENT(options); options->extension->enable_cleartext_plugin = (!opt_arg || atoi(opt_arg) != 0) ? true : false; break; case OPT_optional_resultset_metadata: if (!opt_arg || atoi(opt_arg) != 0) options->client_flag |= CLIENT_OPTIONAL_RESULTSET_METADATA; else options->client_flag &= ~CLIENT_OPTIONAL_RESULTSET_METADATA; break; default: DBUG_PRINT("warning", ("unknown option: %s", option[0])); } } } } } /************************************************************************** Get column lengths of the current row If one uses mysql_use_result, res->lengths contains the length information, else the lengths are calculated from the offset between pointers. **************************************************************************/ static void cli_fetch_lengths(ulong *to, MYSQL_ROW column, unsigned int field_count) { ulong *prev_length; char *start = 0; MYSQL_ROW end; prev_length = 0; /* Keep gcc happy */ for (end = column + field_count + 1; column != end; column++, to++) { if (!*column) { *to = 0; /* Null */ continue; } if (start) /* Found end of prev string */ *prev_length = (ulong)(*column - start - 1); start = *column; prev_length = to; } } /** Read field metadata from field descriptor and store it in MYSQL_FIELD structure. String values in MYSQL_FIELD are allocated in a given allocator root. @param mysql connection handle @param alloc memory allocator root @param default_value flag telling if default values should be read from descriptor @param server_capabilities protocol capability flags which determine format of the descriptor @param row field descriptor @param field address of MYSQL_FIELD structure to store metadata in. @returns 0 on success. */ static int unpack_field(MYSQL *mysql, MEM_ROOT *alloc, bool default_value, uint server_capabilities, MYSQL_ROWS *row, MYSQL_FIELD *field) { ulong lengths[9]; /* Max length of each field */ DBUG_TRACE; if (!field) { set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate); return 1; } memset(field, 0, sizeof(MYSQL_FIELD)); if (server_capabilities & CLIENT_PROTOCOL_41) { uchar *pos; /* fields count may be wrong */ cli_fetch_lengths(&lengths[0], row->data, default_value ? 8 : 7); field->catalog = strmake_root(alloc, (char *)row->data[0], lengths[0]); field->db = strmake_root(alloc, (char *)row->data[1], lengths[1]); field->table = strmake_root(alloc, (char *)row->data[2], lengths[2]); field->org_table = strmake_root(alloc, (char *)row->data[3], lengths[3]); field->name = strmake_root(alloc, (char *)row->data[4], lengths[4]); field->org_name = strmake_root(alloc, (char *)row->data[5], lengths[5]); field->catalog_length = lengths[0]; field->db_length = lengths[1]; field->table_length = lengths[2]; field->org_table_length = lengths[3]; field->name_length = lengths[4]; field->org_name_length = lengths[5]; /* Unpack fixed length parts */ if (lengths[6] != 12) { /* malformed packet. signal an error. */ set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); return 1; } pos = (uchar *)row->data[6]; field->charsetnr = uint2korr(pos); field->length = (uint)uint4korr(pos + 2); field->type = (enum enum_field_types)pos[6]; field->flags = uint2korr(pos + 7); field->decimals = (uint)pos[9]; if (IS_NUM(field->type)) field->flags |= NUM_FLAG; if (default_value && row->data[7]) { field->def = strmake_root(alloc, (char *)row->data[7], lengths[7]); field->def_length = lengths[7]; } else field->def = 0; field->max_length = 0; } #ifndef DELETE_SUPPORT_OF_4_0_PROTOCOL else { /* If any of the row->data[] below is NULL, it can result in a crash. Error out early as it indicates a malformed packet. For data[0], data[1] and data[5], strmake_root() will handle NULL values. */ if (!row->data[2] || !row->data[3] || !row->data[4]) { set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); return 1; } cli_fetch_lengths(&lengths[0], row->data, default_value ? 6 : 5); field->org_table = field->table = strmake_root(alloc, (char *)row->data[0], lengths[0]); field->name = strmake_root(alloc, (char *)row->data[1], lengths[1]); field->length = (uint)uint3korr((uchar *)row->data[2]); field->type = (enum enum_field_types)(uchar)row->data[3][0]; field->catalog = const_cast(""); field->db = const_cast(""); field->catalog_length = 0; field->db_length = 0; field->org_table_length = field->table_length = lengths[0]; field->name_length = lengths[1]; if (server_capabilities & CLIENT_LONG_FLAG) { if (lengths[4] != 3) { /* malformed packet. signal an error. */ set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); return 1; } field->flags = uint2korr((uchar *)row->data[4]); field->decimals = (uint)(uchar)row->data[4][2]; } else { if (lengths[4] != 2) { /* malformed packet. signal an error. */ set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); return 1; } field->flags = (uint)(uchar)row->data[4][0]; field->decimals = (uint)(uchar)row->data[4][1]; } if (IS_NUM(field->type)) field->flags |= NUM_FLAG; if (default_value && row->data[5]) { field->def = strmake_root(alloc, (char *)row->data[5], lengths[5]); field->def_length = lengths[5]; } else field->def = 0; field->max_length = 0; } #endif /* DELETE_SUPPORT_OF_4_0_PROTOCOL */ return 0; } /*************************************************************************** Change field rows to field structs ***************************************************************************/ MYSQL_FIELD *unpack_fields(MYSQL *mysql, MYSQL_ROWS *data, MEM_ROOT *alloc, uint fields, bool default_value, uint server_capabilities) { MYSQL_ROWS *row; MYSQL_FIELD *field, *result; DBUG_TRACE; field = result = (MYSQL_FIELD *)alloc->Alloc((uint)sizeof(*field) * fields); if (!result) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return 0; } memset(field, 0, sizeof(MYSQL_FIELD) * fields); for (row = data; row; row = row->next, field++) { /* fields count may be wrong */ if (field < result || static_cast(field - result) >= fields) { return NULL; } if (unpack_field(mysql, alloc, default_value, server_capabilities, row, field)) { return NULL; } } return result; } /** Read metadata resultset from server in asynchronous way. @param[in] mysql connection handle @param[in] alloc memory allocator root @param[in] field_count total number of fields @param[in] field number of columns in single field descriptor @param[out] ret an array of field rows @retval NET_ASYNC_NOT_READY metadata resultset not read completely @retval NET_ASYNC_COMPLETE finished reading metadata resultset */ net_async_status cli_read_metadata_ex_nonblocking(MYSQL *mysql, MEM_ROOT *alloc, ulong field_count, unsigned int field, MYSQL_FIELD **ret) { DBUG_TRACE; uchar *pos; ulong pkt_len; NET *net = &mysql->net; MYSQL_ASYNC *async_data = ASYNC_DATA(mysql); *ret = nullptr; if (!async_data->async_read_metadata_field_len) { async_data->async_read_metadata_field_len = (ulong *)alloc->Alloc(sizeof(ulong) * field); } if (!async_data->async_read_metadata_fields) { async_data->async_read_metadata_fields = (MYSQL_FIELD *)alloc->Alloc((uint)sizeof(MYSQL_FIELD) * field_count); if (async_data->async_read_metadata_fields) memset(async_data->async_read_metadata_fields, 0, sizeof(MYSQL_FIELD) * field_count); } if (!async_data->async_read_metadata_fields) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); goto end; } if (!async_data->async_read_metadata_data.data) { async_data->async_read_metadata_data.data = (MYSQL_ROW)alloc->Alloc(sizeof(char *) * (field + 1)); memset(async_data->async_read_metadata_data.data, 0, sizeof(char *) * (field + 1)); } /* In this below loop we read each column info as 1 single row and save it in mysql->fields array */ while (async_data->async_read_metadata_cur_field < field_count) { int res; if (read_one_row_nonblocking(mysql, field, async_data->async_read_metadata_data.data, async_data->async_read_metadata_field_len, &res) == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } if (res == -1) { goto end; } if (unpack_field(mysql, alloc, 0, mysql->server_capabilities, &async_data->async_read_metadata_data, async_data->async_read_metadata_fields + async_data->async_read_metadata_cur_field)) { goto end; } async_data->async_read_metadata_cur_field++; } /* Read EOF packet in case of old client */ if (!(mysql->server_capabilities & CLIENT_DEPRECATE_EOF)) { if (cli_safe_read_nonblocking(mysql, nullptr, &pkt_len) == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } if (pkt_len == packet_error) { goto end; } pos = net->read_pos; if (*pos == 254) { mysql->warning_count = uint2korr(pos + 1); mysql->server_status = uint2korr(pos + 3); } } *ret = async_data->async_read_metadata_fields; end: async_data->async_read_metadata_field_len = nullptr; async_data->async_read_metadata_fields = nullptr; memset(&async_data->async_read_metadata_data, 0, sizeof(async_data->async_read_metadata_data)); async_data->async_read_metadata_cur_field = 0; return NET_ASYNC_COMPLETE; } /** Read metadata resultset from server Memory allocated in a given allocator root. @param[in] mysql connection handle @param[in] alloc memory allocator root @param[in] field_count total number of fields @param[in] field number of columns in single field descriptor @retval an array of field rows */ MYSQL_FIELD *cli_read_metadata_ex(MYSQL *mysql, MEM_ROOT *alloc, ulong field_count, unsigned int field) { ulong *len; uint f; uchar *pos; MYSQL_FIELD *fields, *result; MYSQL_ROWS data; NET *net = &mysql->net; size_t size; DBUG_TRACE; len = (ulong *)alloc->Alloc(sizeof(ulong) * field); size = sizeof(MYSQL_FIELD) * field_count; if (field_count != (size / sizeof(MYSQL_FIELD))) { set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); end_server(mysql); return 0; } fields = result = (MYSQL_FIELD *)alloc->Alloc(size); if (!result) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); end_server(mysql); return 0; } memset(fields, 0, sizeof(MYSQL_FIELD) * field_count); data.data = (MYSQL_ROW)alloc->Alloc(sizeof(char *) * (field + 1)); memset(data.data, 0, sizeof(char *) * (field + 1)); /* In this below loop we read each column info as 1 single row and save it in mysql->fields array */ for (f = 0; f < field_count; ++f) { if (read_one_row(mysql, field, data.data, len) == -1) return NULL; if (unpack_field(mysql, alloc, 0, mysql->server_capabilities, &data, fields++)) return NULL; } /* Read EOF packet in case of old client */ if (!(mysql->server_capabilities & CLIENT_DEPRECATE_EOF)) { if (packet_error == cli_safe_read(mysql, NULL)) return 0; pos = net->read_pos; if (*pos == 254) { mysql->warning_count = uint2korr(pos + 1); mysql->server_status = uint2korr(pos + 3); } } return result; } static int alloc_field_alloc(MYSQL *mysql) { if (mysql->field_alloc == nullptr) { mysql->field_alloc = (MEM_ROOT *)my_malloc( key_memory_MYSQL, sizeof(MEM_ROOT), MYF(MY_WME | MY_ZEROFILL)); if (mysql->field_alloc == nullptr) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return 1; } init_alloc_root(PSI_NOT_INSTRUMENTED, mysql->field_alloc, 8192, 0); /* Assume rowlength < 8192 */ } /* At this point the NET is receiving a resultset. max packet should be set */ DBUG_ASSERT(mysql->net.max_packet_size != 0); /* Limit the size of the columns buffer to MAX packet size or 1M */ mysql->field_alloc->set_max_capacity( std::max(1024UL * 1024UL, mysql->net.max_packet_size)); return 0; } /** Read metadata resultset from server @param[in] mysql connection handle @param[in] field_count total number of fields @param[in] field number of columns in single field descriptor @retval an array of field rows */ MYSQL_FIELD *cli_read_metadata(MYSQL *mysql, ulong field_count, unsigned int field) { alloc_field_alloc(mysql); return cli_read_metadata_ex(mysql, mysql->field_alloc, field_count, field); } /** Helper method to read metadata in asynchronous way. */ static net_async_status cli_read_metadata_nonblocking(MYSQL *mysql, ulong field_count, unsigned int field, MYSQL_FIELD **ret) { alloc_field_alloc(mysql); if (cli_read_metadata_ex_nonblocking(mysql, mysql->field_alloc, field_count, field, ret) == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } return NET_ASYNC_COMPLETE; } /** Read resultset metadata returned by COM_QUERY command. @param[in] mysql Client connection handle. @param[in] pos Position in the packet where the metadata starts. @param[in] field_count Number of columns in the field descriptor. @retval 0 Success. @retval 1 Error. */ static int read_com_query_metadata(MYSQL *mysql, uchar *pos, ulong field_count) { /* Store resultset metadata flag. */ if (mysql->client_flag & CLIENT_OPTIONAL_RESULTSET_METADATA) { mysql->resultset_metadata = static_cast(*pos); } else { mysql->resultset_metadata = RESULTSET_METADATA_FULL; } switch (mysql->resultset_metadata) { case RESULTSET_METADATA_FULL: /* Read metadata. */ MYSQL_TRACE_STAGE(mysql, WAIT_FOR_FIELD_DEF); if (!(mysql->fields = cli_read_metadata(mysql, field_count, protocol_41(mysql) ? 7 : 5))) { free_root(mysql->field_alloc, MYF(0)); return 1; } break; case RESULTSET_METADATA_NONE: /* Skip metadata. */ mysql->fields = NULL; break; default: /* Unknown metadata flag. */ mysql->fields = NULL; return 1; } return 0; } /** Read resultset metadata returned by COM_QUERY command in asynchronous way. @param[in] mysql Client connection handle. @param[in] pos Position in the packet where the metadata starts. @param[in] field_count Number of columns in the field descriptor. @param[out] res set to false incase of success and true for error. @retval NET_ASYNC_NOT_READY metadata resultset not read completely @retval NET_ASYNC_COMPLETE finished reading metadata resultset */ static net_async_status read_com_query_metadata_nonblocking(MYSQL *mysql, uchar *pos, ulong field_count, int *res) { DBUG_TRACE; /* pos is only set on the first reentrant call. */ if (pos) { /* Store resultset metadata flag. */ if (mysql->client_flag & CLIENT_OPTIONAL_RESULTSET_METADATA) { mysql->resultset_metadata = static_cast(*pos); } else { mysql->resultset_metadata = RESULTSET_METADATA_FULL; } } switch (mysql->resultset_metadata) { case RESULTSET_METADATA_FULL: /* Read metadata. */ MYSQL_TRACE_STAGE(mysql, WAIT_FOR_FIELD_DEF); if (cli_read_metadata_nonblocking( mysql, field_count, protocol_41(mysql) ? 7 : 5, &mysql->fields) == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } if (!mysql->fields) { free_root(mysql->field_alloc, MYF(0)); *res = 1; return NET_ASYNC_COMPLETE; } break; case RESULTSET_METADATA_NONE: /* Skip metadata. */ mysql->fields = NULL; break; default: /* Unknown metadata flag. */ mysql->fields = NULL; *res = 1; return NET_ASYNC_COMPLETE; } *res = 0; return NET_ASYNC_COMPLETE; } net_async_status cli_read_rows_nonblocking(MYSQL *mysql, MYSQL_FIELD *mysql_fields, unsigned int fields, MYSQL_DATA **result_out) { uint field; ulong pkt_len; ulong len; uchar *cp; char *to, *end_to; MYSQL_ROWS *cur; NET *net = &mysql->net; bool is_data_packet; DBUG_TRACE; MYSQL_ASYNC *async_context = ASYNC_DATA(mysql); NET_ASYNC *net_async = NET_ASYNC_DATA(net); *result_out = nullptr; if (cli_safe_read_nonblocking(mysql, &is_data_packet, &pkt_len) == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } mysql->packet_length = pkt_len; if (pkt_len == packet_error) { if (net_async->read_rows_is_first_read) { free_rows(async_context->rows_result_buffer); async_context->rows_result_buffer = nullptr; } net_async->read_rows_is_first_read = true; return NET_ASYNC_COMPLETE; } if (net_async->read_rows_is_first_read) { MYSQL_DATA *result; if (!(result = (MYSQL_DATA *)my_malloc(key_memory_MYSQL_DATA, sizeof(MYSQL_DATA), MYF(MY_WME | MY_ZEROFILL))) || !(result->alloc = (MEM_ROOT *)my_malloc(key_memory_MYSQL_DATA, sizeof(MEM_ROOT), MYF(MY_WME | MY_ZEROFILL)))) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); net_async->read_rows_is_first_read = true; free_rows(result); return NET_ASYNC_COMPLETE; } async_context->rows_result_buffer = result; init_alloc_root(PSI_NOT_INSTRUMENTED, result->alloc, 8192, 0); /* Assume rowlength < 8192 */ async_context->prev_row_ptr = &result->data; result->rows = 0; result->fields = fields; net_async->read_rows_is_first_read = false; } /* The last EOF packet is either a single 254 character or (in MySQL 4.1) 254 followed by 1-7 status bytes or an OK packet starting with 0xFE */ while (*(cp = net->read_pos) == 0 || is_data_packet) { MYSQL_DATA *result = async_context->rows_result_buffer; result->rows++; if (!(cur = (MYSQL_ROWS *)result->alloc->Alloc(sizeof(MYSQL_ROWS))) || !(cur->data = ((MYSQL_ROW)result->alloc->Alloc( (fields + 1) * sizeof(char *) + pkt_len)))) { free_rows(result); async_context->rows_result_buffer = nullptr; set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); net_async->read_rows_is_first_read = true; return NET_ASYNC_COMPLETE; } *async_context->prev_row_ptr = cur; async_context->prev_row_ptr = &cur->next; to = (char *)(cur->data + fields + 1); end_to = to + pkt_len - 1; for (field = 0; field < fields; field++) { if ((len = (ulong)net_field_length(&cp)) == NULL_LENGTH) { /* null field */ cur->data[field] = 0; } else { cur->data[field] = to; if (len > (ulong)(end_to - to)) { free_rows(result); async_context->rows_result_buffer = nullptr; set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); net_async->read_rows_is_first_read = true; return NET_ASYNC_COMPLETE; } memcpy(to, (char *)cp, len); to[len] = 0; to += len + 1; cp += len; if (mysql_fields) { if (mysql_fields[field].max_length < len) mysql_fields[field].max_length = len; } } } cur->data[field] = to; /* End of last field */ if (cli_safe_read_nonblocking(mysql, &is_data_packet, &pkt_len) == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } mysql->packet_length = pkt_len; if (pkt_len == packet_error) { free_rows(async_context->rows_result_buffer); async_context->rows_result_buffer = nullptr; net_async->read_rows_is_first_read = true; return NET_ASYNC_COMPLETE; } } *async_context->prev_row_ptr = 0; /* last pointer is null */ /* read EOF packet or OK packet if it is new client */ if (pkt_len > 1) { if (mysql->server_capabilities & CLIENT_DEPRECATE_EOF && !is_data_packet) read_ok_ex(mysql, pkt_len); else { mysql->warning_count = uint2korr(cp + 1); mysql->server_status = uint2korr(cp + 3); } DBUG_PRINT("info", ("status: %u warning_count: %u", mysql->server_status, mysql->warning_count)); } #if defined(CLIENT_PROTOCOL_TRACING) if (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); else MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); #endif DBUG_PRINT("exit", ("Got %lu rows", (ulong)async_context->rows_result_buffer->rows)); *result_out = async_context->rows_result_buffer; async_context->rows_result_buffer = nullptr; net_async->read_rows_is_first_read = true; return NET_ASYNC_COMPLETE; } /* Read all rows (data) from server */ MYSQL_DATA *cli_read_rows(MYSQL *mysql, MYSQL_FIELD *mysql_fields, unsigned int fields) { uint field; ulong pkt_len; ulong len; uchar *cp; char *to, *end_to; MYSQL_DATA *result; MYSQL_ROWS **prev_ptr, *cur; NET *net = &mysql->net; bool is_data_packet; DBUG_TRACE; if ((pkt_len = cli_safe_read(mysql, &is_data_packet)) == packet_error) return 0; if (pkt_len == 0) return 0; if (!(result = (MYSQL_DATA *)my_malloc(key_memory_MYSQL_DATA, sizeof(MYSQL_DATA), MYF(MY_WME | MY_ZEROFILL))) || !(result->alloc = (MEM_ROOT *)my_malloc(key_memory_MYSQL_DATA, sizeof(MEM_ROOT), MYF(MY_WME | MY_ZEROFILL)))) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); free_rows(result); return 0; } init_alloc_root(PSI_NOT_INSTRUMENTED, result->alloc, 8192, 0); /* Assume rowlength < 8192 */ prev_ptr = &result->data; result->rows = 0; result->fields = fields; /* The last EOF packet is either a single 254 character or (in MySQL 4.1) 254 followed by 1-7 status bytes or an OK packet starting with 0xFE */ while (*(cp = net->read_pos) == 0 || is_data_packet) { result->rows++; if (!(cur = (MYSQL_ROWS *)result->alloc->Alloc(sizeof(MYSQL_ROWS))) || !(cur->data = ((MYSQL_ROW)result->alloc->Alloc( (fields + 1) * sizeof(char *) + pkt_len)))) { free_rows(result); set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return 0; } *prev_ptr = cur; prev_ptr = &cur->next; to = (char *)(cur->data + fields + 1); end_to = to + pkt_len - 1; for (field = 0; field < fields; field++) { if ((len = (ulong)net_field_length(&cp)) == NULL_LENGTH) { /* null field */ cur->data[field] = 0; } else { cur->data[field] = to; if (len > (ulong)(end_to - to)) { free_rows(result); set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); return 0; } memcpy(to, (char *)cp, len); to[len] = 0; to += len + 1; cp += len; if (mysql_fields) { if (mysql_fields[field].max_length < len) mysql_fields[field].max_length = len; } } } cur->data[field] = to; /* End of last field */ if ((pkt_len = cli_safe_read(mysql, &is_data_packet)) == packet_error) { free_rows(result); return 0; } } *prev_ptr = 0; /* last pointer is null */ /* read EOF packet or OK packet if it is new client */ if (pkt_len > 1) { if (mysql->server_capabilities & CLIENT_DEPRECATE_EOF && !is_data_packet) read_ok_ex(mysql, pkt_len); else { mysql->warning_count = uint2korr(cp + 1); mysql->server_status = uint2korr(cp + 3); } DBUG_PRINT("info", ("status: %u warning_count: %u", mysql->server_status, mysql->warning_count)); } #if defined(CLIENT_PROTOCOL_TRACING) if (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); else MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); #endif DBUG_PRINT("exit", ("Got %lu rows", (ulong)result->rows)); return result; } static int read_one_row_complete(MYSQL *mysql, ulong pkt_len, bool is_data_packet, uint fields, MYSQL_ROW row, ulong *lengths) { uint field; ulong len; uchar *pos, *prev_pos, *end_pos; NET *net = &mysql->net; if (net->read_pos[0] != 0x00 && !is_data_packet) { if (pkt_len > 1) /* MySQL 4.1 protocol */ { if (mysql->server_capabilities & CLIENT_DEPRECATE_EOF) read_ok_ex(mysql, pkt_len); else { mysql->warning_count = uint2korr(net->read_pos + 1); mysql->server_status = uint2korr(net->read_pos + 3); } } #if defined(CLIENT_PROTOCOL_TRACING) if (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); else MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); #endif return 1; /* End of data */ } prev_pos = 0; /* allowed to write at packet[-1] */ pos = net->read_pos; end_pos = pos + pkt_len; for (field = 0; field < fields; field++) { len = (ulong)net_field_length_checked(&pos, (ulong)(end_pos - pos)); if (pos > end_pos) { set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate); return -1; } if (len == NULL_LENGTH) { row[field] = 0; *lengths++ = 0; } else { row[field] = (char *)pos; pos += len; *lengths++ = len; } if (prev_pos) *prev_pos = 0; /* Terminate prev field */ prev_pos = pos; } row[field] = (char *)prev_pos + 1; /* End of last field */ *prev_pos = 0; /* Terminate last field */ return 0; } /* Read one row. Uses packet buffer as storage for fields. When next packet is read, the previous field values are destroyed */ static int read_one_row(MYSQL *mysql, uint fields, MYSQL_ROW row, ulong *lengths) { ulong pkt_len; bool is_data_packet; if ((pkt_len = cli_safe_read(mysql, &is_data_packet)) == packet_error) return -1; return read_one_row_complete(mysql, pkt_len, is_data_packet, fields, row, lengths); } static net_async_status read_one_row_nonblocking(MYSQL *mysql, uint fields, MYSQL_ROW row, ulong *lengths, int *res) { ulong pkt_len; bool is_data_packet; net_async_status status; status = cli_safe_read_nonblocking(mysql, &is_data_packet, &pkt_len); if (status == NET_ASYNC_NOT_READY) { return status; } mysql->packet_length = pkt_len; if (pkt_len == packet_error) { *res = -1; return NET_ASYNC_COMPLETE; } *res = read_one_row_complete(mysql, pkt_len, is_data_packet, fields, row, lengths); return NET_ASYNC_COMPLETE; } /**************************************************************************** Init MySQL structure or allocate one ****************************************************************************/ MYSQL *STDCALL mysql_init(MYSQL *mysql) { if (mysql_server_init(0, NULL, NULL)) return 0; if (!mysql) { if (!(mysql = (MYSQL *)my_malloc(key_memory_MYSQL, sizeof(*mysql), MYF(MY_WME | MY_ZEROFILL)))) { set_mysql_error(NULL, CR_OUT_OF_MEMORY, unknown_sqlstate); return 0; } mysql->free_me = 1; } else memset(mysql, 0, sizeof(*(mysql))); mysql->charset = default_client_charset_info; mysql->field_alloc = (MEM_ROOT *)my_malloc( key_memory_MYSQL, sizeof(*mysql->field_alloc), MYF(MY_WME | MY_ZEROFILL)); if (!mysql->field_alloc) { set_mysql_error(NULL, CR_OUT_OF_MEMORY, unknown_sqlstate); if (mysql->free_me) my_free(mysql); return 0; } my_stpcpy(mysql->net.sqlstate, not_error_sqlstate); /* Only enable LOAD DATA INFILE by default if configured with option ENABLED_LOCAL_INFILE */ #if defined(ENABLED_LOCAL_INFILE) && !defined(MYSQL_SERVER) mysql->options.client_flag |= CLIENT_LOCAL_FILES; #endif #if defined(_WIN32) mysql->options.shared_memory_base_name = (char *)def_shared_memory_base_name; #endif mysql->options.report_data_truncation = true; /* default */ /* Initialize extensions. */ if (!(mysql->extension = mysql_extension_init(mysql))) { set_mysql_error(NULL, CR_OUT_OF_MEMORY, unknown_sqlstate); return 0; } /* By default we don't reconnect because it could silently corrupt data (after reconnection you potentially lose table locks, user variables, session variables (transactions but they are specifically dealt with in mysql_reconnect()). This is a change: < 5.0.3 mysql->reconnect was set to 1 by default. How this change impacts existing apps: - existing apps which relyed on the default will see a behaviour change; they will have to set reconnect=1 after mysql_real_connect(). - existing apps which explicitely asked for reconnection (the only way they could do it was by setting mysql.reconnect to 1 after mysql_real_connect()) will not see a behaviour change. - existing apps which explicitely asked for no reconnection (mysql.reconnect=0) will not see a behaviour change. */ mysql->reconnect = 0; #if defined(HAVE_OPENSSL) && !defined(MYSQL_SERVER) ENSURE_EXTENSIONS_PRESENT(&mysql->options); mysql->options.extension->ssl_mode = SSL_MODE_PREFERRED; #endif /* by default connection_compressed should be OFF */ ENSURE_EXTENSIONS_PRESENT(&mysql->options); mysql->options.extension->connection_compressed = false; mysql->resultset_metadata = RESULTSET_METADATA_FULL; ASYNC_DATA(mysql)->async_op_status = ASYNC_OP_UNSET; return mysql; } /* MYSQL::extension handling (see sql_common.h for declaration of MYSQL_EXTENSION structure). */ MYSQL_EXTENSION *mysql_extension_init(MYSQL *mysql MY_ATTRIBUTE((unused))) { MYSQL_EXTENSION *ext; ext = static_cast(my_malloc(PSI_NOT_INSTRUMENTED, sizeof(MYSQL_EXTENSION), MYF(MY_WME | MY_ZEROFILL))); ext->mysql_async_context = static_cast( my_malloc(PSI_NOT_INSTRUMENTED, sizeof(struct MYSQL_ASYNC), MYF(MY_WME | MY_ZEROFILL))); /* set default value */ ext->mysql_async_context->async_op_status = ASYNC_OP_UNSET; #ifdef MYSQL_SERVER ext->server_extn = nullptr; #endif return ext; } void mysql_extension_free(MYSQL_EXTENSION *ext) { if (!ext) return; if (ext->trace_data) my_free(ext->trace_data); if (ext->mysql_async_context) my_free(ext->mysql_async_context); // free state change related resources. free_state_change_info(ext); my_free(ext); } /* Fill in SSL part of MYSQL structure and set 'use_ssl' flag. NB! Errors are not reported until you do mysql_real_connect. */ bool STDCALL mysql_ssl_set(MYSQL *mysql MY_ATTRIBUTE((unused)), const char *key MY_ATTRIBUTE((unused)), const char *cert MY_ATTRIBUTE((unused)), const char *ca MY_ATTRIBUTE((unused)), const char *capath MY_ATTRIBUTE((unused)), const char *cipher MY_ATTRIBUTE((unused))) { bool result = 0; DBUG_TRACE; #if defined(HAVE_OPENSSL) result = mysql_options(mysql, MYSQL_OPT_SSL_KEY, key) + mysql_options(mysql, MYSQL_OPT_SSL_CERT, cert) + mysql_options(mysql, MYSQL_OPT_SSL_CA, ca) + mysql_options(mysql, MYSQL_OPT_SSL_CAPATH, capath) + mysql_options(mysql, MYSQL_OPT_SSL_CIPHER, cipher) ? 1 : 0; #endif return result; } /* Free strings in the SSL structure and clear 'use_ssl' flag. NB! Errors are not reported until you do mysql_real_connect. */ #if defined(HAVE_OPENSSL) static void mysql_ssl_free(MYSQL *mysql) { DBUG_TRACE; my_free(mysql->options.ssl_key); my_free(mysql->options.ssl_cert); my_free(mysql->options.ssl_ca); my_free(mysql->options.ssl_capath); my_free(mysql->options.ssl_cipher); if (mysql->options.extension) { my_free(mysql->options.extension->tls_version); my_free(mysql->options.extension->ssl_crl); my_free(mysql->options.extension->ssl_crlpath); my_free(mysql->options.extension->tls_ciphersuites); } mysql->options.ssl_key = 0; mysql->options.ssl_cert = 0; mysql->options.ssl_ca = 0; mysql->options.ssl_capath = 0; mysql->options.ssl_cipher = 0; if (mysql->options.extension) { mysql->options.extension->ssl_crl = 0; mysql->options.extension->ssl_crlpath = 0; mysql->options.extension->ssl_ctx_flags = 0; mysql->options.extension->tls_version = 0; mysql->options.extension->ssl_mode = SSL_MODE_DISABLED; mysql->options.extension->ssl_fips_mode = SSL_FIPS_MODE_OFF; mysql->options.extension->tls_ciphersuites = 0; } mysql->connector_fd = 0; } #endif /* HAVE_OPENSSL */ /* Return the SSL cipher (if any) used for current connection to the server. SYNOPSYS mysql_get_ssl_cipher() mysql pointer to the mysql connection */ const char *STDCALL mysql_get_ssl_cipher(MYSQL *mysql MY_ATTRIBUTE((unused))) { DBUG_TRACE; #if defined(HAVE_OPENSSL) if (mysql->net.vio && mysql->net.vio->ssl_arg) return SSL_get_cipher_name((SSL *)mysql->net.vio->ssl_arg); #endif /* HAVE_OPENSSL */ return NULL; } /* Check the server's (subject) Common Name against the hostname we connected to SYNOPSIS ssl_verify_server_cert() vio pointer to a SSL connected vio server_hostname name of the server that we connected to errptr if we fail, we'll return (a pointer to a string describing) the reason here RETURN VALUES 0 Success 1 Failed to validate server */ #if defined(HAVE_OPENSSL) static int ssl_verify_server_cert(Vio *vio, const char *server_hostname, const char **errptr) { SSL *ssl; X509 *server_cert = NULL; int ret_validation = 1; #if !(OPENSSL_VERSION_NUMBER >= 0x10002000L) int cn_loc = -1; char *cn = NULL; ASN1_STRING *cn_asn1 = NULL; X509_NAME_ENTRY *cn_entry = NULL; X509_NAME *subject = NULL; #endif DBUG_TRACE; DBUG_PRINT("enter", ("server_hostname: %s", server_hostname)); if (!(ssl = (SSL *)vio->ssl_arg)) { *errptr = "No SSL pointer found"; goto error; } if (!server_hostname) { *errptr = "No server hostname supplied"; goto error; } if (!(server_cert = SSL_get_peer_certificate(ssl))) { *errptr = "Could not get server certificate"; goto error; } if (X509_V_OK != SSL_get_verify_result(ssl)) { *errptr = "Failed to verify the server certificate"; goto error; } /* We already know that the certificate exchanged was valid; the SSL library handled that. Now we need to verify that the contents of the certificate are what we expect. */ /* Use OpenSSL certificate matching functions instead of our own if we have OpenSSL. The X509_check_* functions return 1 on success. */ #if OPENSSL_VERSION_NUMBER >= 0x10002000L if ((X509_check_host(server_cert, server_hostname, strlen(server_hostname), 0, 0) != 1) && (X509_check_ip_asc(server_cert, server_hostname, 0) != 1)) { *errptr = "Failed to verify the server certificate via X509 certificate " "matching functions"; goto error; } else { /* Success */ ret_validation = 0; } #else /* OPENSSL_VERSION_NUMBER < 0x10002000L */ /* OpenSSL prior to 1.0.2 do not support X509_check_host() function. Use deprecated X509_get_subject_name() instead. */ subject = X509_get_subject_name((X509 *)server_cert); // Find the CN location in the subject cn_loc = X509_NAME_get_index_by_NID(subject, NID_commonName, -1); if (cn_loc < 0) { *errptr = "Failed to get CN location in the certificate subject"; goto error; } // Get the CN entry for given location cn_entry = X509_NAME_get_entry(subject, cn_loc); if (cn_entry == NULL) { *errptr = "Failed to get CN entry using CN location"; goto error; } // Get CN from common name entry cn_asn1 = X509_NAME_ENTRY_get_data(cn_entry); if (cn_asn1 == NULL) { *errptr = "Failed to get CN from CN entry"; goto error; } cn = (char *)ASN1_STRING_data(cn_asn1); // There should not be any NULL embedded in the CN if ((size_t)ASN1_STRING_length(cn_asn1) != strlen(cn)) { *errptr = "NULL embedded in the certificate CN"; goto error; } DBUG_PRINT("info", ("Server hostname in cert: %s", cn)); if (!strcmp(cn, server_hostname)) { /* Success */ ret_validation = 0; } #endif /* OPENSSL_VERSION_NUMBER >= 0x10002000L */ *errptr = "SSL certificate validation failure"; error: if (server_cert != NULL) X509_free(server_cert); return ret_validation; } #endif /* HAVE_OPENSSL */ /* Note that the mysql argument must be initialized with mysql_init() before calling mysql_real_connect ! */ static bool cli_read_query_result(MYSQL *mysql); static net_async_status cli_read_query_result_nonblocking(MYSQL *mysql); static MYSQL_RES *cli_use_result(MYSQL *mysql); int cli_read_change_user_result(MYSQL *mysql) { return cli_safe_read(mysql, NULL); } net_async_status cli_read_change_user_result_nonblocking(MYSQL *mysql, ulong *ret) { return cli_safe_read_nonblocking(mysql, nullptr, ret); } static MYSQL_METHODS client_methods = { cli_read_query_result, /* read_query_result */ cli_advanced_command, /* advanced_command */ cli_read_rows, /* read_rows */ cli_use_result, /* use_result */ cli_fetch_lengths, /* fetch_lengths */ cli_flush_use_result, /* flush_use_result */ cli_read_change_user_result /* read_change_user_result */ #ifndef MYSQL_SERVER , cli_list_fields, /* list_fields */ cli_read_prepare_result, /* read_prepare_result */ cli_stmt_execute, /* stmt_execute */ cli_read_binary_rows, /* read_binary_rows */ cli_unbuffered_fetch, /* unbuffered_fetch */ cli_read_statistics, /* read_statistics */ cli_read_query_result, /* next_result */ cli_read_binary_rows, /* read_rows_from_cursor */ free_rows #endif , cli_read_query_result_nonblocking, /* read_query_result_nonblocking */ cli_advanced_command_nonblocking, /* advanced_command_nonblocking */ cli_read_rows_nonblocking, /* read_rows_nonblocking */ cli_flush_use_result_nonblocking, /* flush_use_result_nonblocking */ cli_read_query_result_nonblocking, /* next_result_nonblocking */ cli_read_change_user_result_nonblocking /* read_change_user_result_nonblocking */ }; typedef enum my_cs_match_type_enum { /* MySQL and OS charsets are fully compatible */ my_cs_exact, /* MySQL charset is very close to OS charset */ my_cs_approx, /* MySQL knows this charset, but it is not supported as client character set. */ my_cs_unsupp } my_cs_match_type; struct MY_CSET_OS_NAME { const char *os_name; const char *my_name; my_cs_match_type param; }; const MY_CSET_OS_NAME charsets[] = { #ifdef _WIN32 {"cp437", "cp850", my_cs_approx}, {"cp850", "cp850", my_cs_exact}, {"cp852", "cp852", my_cs_exact}, {"cp858", "cp850", my_cs_approx}, {"cp866", "cp866", my_cs_exact}, {"cp874", "tis620", my_cs_approx}, {"cp932", "cp932", my_cs_exact}, {"cp936", "gbk", my_cs_approx}, {"cp949", "euckr", my_cs_approx}, {"cp950", "big5", my_cs_exact}, {"cp1200", "utf16le", my_cs_unsupp}, {"cp1201", "utf16", my_cs_unsupp}, {"cp1250", "cp1250", my_cs_exact}, {"cp1251", "cp1251", my_cs_exact}, {"cp1252", "latin1", my_cs_exact}, {"cp1253", "greek", my_cs_exact}, {"cp1254", "latin5", my_cs_exact}, {"cp1255", "hebrew", my_cs_approx}, {"cp1256", "cp1256", my_cs_exact}, {"cp1257", "cp1257", my_cs_exact}, {"cp10000", "macroman", my_cs_exact}, {"cp10001", "sjis", my_cs_approx}, {"cp10002", "big5", my_cs_approx}, {"cp10008", "gb2312", my_cs_approx}, {"cp10021", "tis620", my_cs_approx}, {"cp10029", "macce", my_cs_exact}, {"cp12001", "utf32", my_cs_unsupp}, {"cp20107", "swe7", my_cs_exact}, {"cp20127", "latin1", my_cs_approx}, {"cp20866", "koi8r", my_cs_exact}, {"cp20932", "ujis", my_cs_exact}, {"cp20936", "gb2312", my_cs_approx}, {"cp20949", "euckr", my_cs_approx}, {"cp21866", "koi8u", my_cs_exact}, {"cp28591", "latin1", my_cs_approx}, {"cp28592", "latin2", my_cs_exact}, {"cp28597", "greek", my_cs_exact}, {"cp28598", "hebrew", my_cs_exact}, {"cp28599", "latin5", my_cs_exact}, {"cp28603", "latin7", my_cs_exact}, {"cp38598", "hebrew", my_cs_exact}, {"cp51932", "ujis", my_cs_exact}, {"cp51936", "gb2312", my_cs_exact}, {"cp51949", "euckr", my_cs_exact}, {"cp51950", "big5", my_cs_exact}, {"cp54936", "gb18030", my_cs_exact}, {"cp65001", "utf8mb4", my_cs_exact}, #else /* not Windows */ {"646", "latin1", my_cs_approx}, /* Default on Solaris */ {"ANSI_X3.4-1968", "latin1", my_cs_approx}, {"ansi1251", "cp1251", my_cs_exact}, {"armscii8", "armscii8", my_cs_exact}, {"armscii-8", "armscii8", my_cs_exact}, {"ASCII", "latin1", my_cs_approx}, {"Big5", "big5", my_cs_exact}, {"cp1251", "cp1251", my_cs_exact}, {"cp1255", "hebrew", my_cs_approx}, {"CP866", "cp866", my_cs_exact}, {"eucCN", "gb2312", my_cs_exact}, {"euc-CN", "gb2312", my_cs_exact}, {"eucJP", "ujis", my_cs_exact}, {"euc-JP", "ujis", my_cs_exact}, {"eucKR", "euckr", my_cs_exact}, {"euc-KR", "euckr", my_cs_exact}, {"gb18030", "gb18030", my_cs_exact}, {"gb2312", "gb2312", my_cs_exact}, {"gbk", "gbk", my_cs_exact}, {"georgianps", "geostd8", my_cs_exact}, {"georgian-ps", "geostd8", my_cs_exact}, {"IBM-1252", "cp1252", my_cs_exact}, {"iso88591", "latin1", my_cs_approx}, {"ISO_8859-1", "latin1", my_cs_approx}, {"ISO8859-1", "latin1", my_cs_approx}, {"ISO-8859-1", "latin1", my_cs_approx}, {"iso885913", "latin7", my_cs_exact}, {"ISO_8859-13", "latin7", my_cs_exact}, {"ISO8859-13", "latin7", my_cs_exact}, {"ISO-8859-13", "latin7", my_cs_exact}, {"iso88592", "latin2", my_cs_exact}, {"ISO_8859-2", "latin2", my_cs_exact}, {"ISO8859-2", "latin2", my_cs_exact}, {"ISO-8859-2", "latin2", my_cs_exact}, {"iso88597", "greek", my_cs_exact}, {"ISO_8859-7", "greek", my_cs_exact}, {"ISO8859-7", "greek", my_cs_exact}, {"ISO-8859-7", "greek", my_cs_exact}, {"iso88598", "hebrew", my_cs_exact}, {"ISO_8859-8", "hebrew", my_cs_exact}, {"ISO8859-8", "hebrew", my_cs_exact}, {"ISO-8859-8", "hebrew", my_cs_exact}, {"iso88599", "latin5", my_cs_exact}, {"ISO_8859-9", "latin5", my_cs_exact}, {"ISO8859-9", "latin5", my_cs_exact}, {"ISO-8859-9", "latin5", my_cs_exact}, {"koi8r", "koi8r", my_cs_exact}, {"KOI8-R", "koi8r", my_cs_exact}, {"koi8u", "koi8u", my_cs_exact}, {"KOI8-U", "koi8u", my_cs_exact}, {"roman8", "hp8", my_cs_exact}, /* Default on HP UX */ {"Shift_JIS", "sjis", my_cs_exact}, {"SJIS", "sjis", my_cs_exact}, {"shiftjisx0213", "sjis", my_cs_exact}, {"tis620", "tis620", my_cs_exact}, {"tis-620", "tis620", my_cs_exact}, {"ujis", "ujis", my_cs_exact}, {"US-ASCII", "latin1", my_cs_approx}, {"utf8", "utf8mb4", my_cs_exact}, {"utf-8", "utf8mb4", my_cs_exact}, #endif {NULL, NULL, my_cs_exact}}; const char *my_os_charset_to_mysql_charset(const char *csname) { const MY_CSET_OS_NAME *csp; for (csp = charsets; csp->os_name; csp++) { if (!my_strcasecmp(&my_charset_latin1, csp->os_name, csname)) { switch (csp->param) { case my_cs_exact: return csp->my_name; case my_cs_approx: /* Maybe we should print a warning eventually: character set correspondence is not exact. */ return csp->my_name; default: my_printf_error(ER_UNKNOWN_ERROR, "OS character set '%s'" " is not supported by MySQL client", MYF(0), csp->my_name); goto def; } } } my_printf_error(ER_UNKNOWN_ERROR, "Unknown OS character set '%s'.", MYF(0), csname); def: csname = MYSQL_DEFAULT_CHARSET_NAME; my_printf_error(ER_UNKNOWN_ERROR, "Switching to the default character set '%s'.", MYF(0), csname); return csname; } #ifndef _WIN32 #include /* for getenv() */ #ifdef HAVE_LANGINFO_H #include #endif #include #endif /* _WIN32 */ static int mysql_autodetect_character_set(MYSQL *mysql) { const char *csname = MYSQL_DEFAULT_CHARSET_NAME; #ifdef _WIN32 char cpbuf[64]; { snprintf(cpbuf, sizeof(cpbuf), "cp%d", (int)GetConsoleCP()); csname = my_os_charset_to_mysql_charset(cpbuf); } #elif defined(HAVE_NL_LANGINFO) { if (setlocale(LC_CTYPE, "") && (csname = nl_langinfo(CODESET))) csname = my_os_charset_to_mysql_charset(csname); } #endif if (mysql->options.charset_name) my_free(mysql->options.charset_name); if (!(mysql->options.charset_name = my_strdup(key_memory_mysql_options, csname, MYF(MY_WME)))) return 1; return 0; } static void mysql_set_character_set_with_default_collation(MYSQL *mysql) { const char *save = charsets_dir; if (mysql->options.charset_dir) { #ifdef MYSQL_SERVER // Do not change charsets_dir, it is not thread safe. DBUG_ASSERT(false); #else charsets_dir = mysql->options.charset_dir; #endif } if ((mysql->charset = get_charset_by_csname(mysql->options.charset_name, MY_CS_PRIMARY, MYF(MY_WME)))) { /* Try to set compiled default collation when it's possible. */ CHARSET_INFO *collation; if ((collation = get_charset_by_name(MYSQL_DEFAULT_COLLATION_NAME, MYF(MY_WME))) && my_charset_same(mysql->charset, collation)) { mysql->charset = collation; } else { /* Default compiled collation not found, or is not applicable to the requested character set. Continue with the default collation of the character set. */ } } charsets_dir = save; } int mysql_init_character_set(MYSQL *mysql) { /* Set character set */ if (!mysql->options.charset_name) { if (!(mysql->options.charset_name = my_strdup(key_memory_mysql_options, MYSQL_DEFAULT_CHARSET_NAME, MYF(MY_WME)))) return 1; } else if (!strcmp(mysql->options.charset_name, MYSQL_AUTODETECT_CHARSET_NAME) && mysql_autodetect_character_set(mysql)) return 1; mysql_set_character_set_with_default_collation(mysql); if (!mysql->charset) { if (mysql->options.charset_dir) set_mysql_extended_error(mysql, CR_CANT_READ_CHARSET, unknown_sqlstate, ER_CLIENT(CR_CANT_READ_CHARSET), mysql->options.charset_name, mysql->options.charset_dir); else { char cs_dir_name[FN_REFLEN]; get_charsets_dir(cs_dir_name); set_mysql_extended_error(mysql, CR_CANT_READ_CHARSET, unknown_sqlstate, ER_CLIENT(CR_CANT_READ_CHARSET), mysql->options.charset_name, cs_dir_name); } return 1; } return 0; } /*********** client side authentication support **************************/ static int client_mpvio_write_packet(MYSQL_PLUGIN_VIO *, const uchar *, int); static net_async_status client_mpvio_write_packet_nonblocking( struct MYSQL_PLUGIN_VIO *, const uchar *, int, int *); static int native_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql); static net_async_status native_password_auth_client_nonblocking( MYSQL_PLUGIN_VIO *vio, MYSQL *mysql, int *result); static int clear_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql); static auth_plugin_t native_password_client_plugin = { MYSQL_CLIENT_AUTHENTICATION_PLUGIN, MYSQL_CLIENT_AUTHENTICATION_PLUGIN_INTERFACE_VERSION, native_password_plugin_name, "R.J.Silk, Sergei Golubchik", "Native MySQL authentication", {1, 0, 0}, "GPL", NULL, NULL, NULL, NULL, native_password_auth_client, native_password_auth_client_nonblocking}; static auth_plugin_t clear_password_client_plugin = { MYSQL_CLIENT_AUTHENTICATION_PLUGIN, MYSQL_CLIENT_AUTHENTICATION_PLUGIN_INTERFACE_VERSION, "mysql_clear_password", "Georgi Kodinov", "Clear password authentication plugin", {0, 1, 0}, "GPL", NULL, NULL, NULL, NULL, clear_password_auth_client, NULL}; #if defined(HAVE_OPENSSL) static auth_plugin_t sha256_password_client_plugin = { MYSQL_CLIENT_AUTHENTICATION_PLUGIN, MYSQL_CLIENT_AUTHENTICATION_PLUGIN_INTERFACE_VERSION, "sha256_password", "Oracle Inc", "SHA256 based authentication with salt", {1, 0, 0}, "GPL", NULL, sha256_password_init, sha256_password_deinit, NULL, sha256_password_auth_client, sha256_password_auth_client_nonblocking}; static auth_plugin_t caching_sha2_password_client_plugin = { MYSQL_CLIENT_AUTHENTICATION_PLUGIN, MYSQL_CLIENT_AUTHENTICATION_PLUGIN_INTERFACE_VERSION, caching_sha2_password_plugin_name, "Oracle Inc", "SHA2 based authentication with salt", {1, 0, 0}, "GPL", NULL, caching_sha2_password_init, caching_sha2_password_deinit, NULL, caching_sha2_password_auth_client, caching_sha2_password_auth_client_nonblocking}; #endif #ifdef AUTHENTICATION_WIN extern "C" auth_plugin_t win_auth_client_plugin; #endif /* Test trace plugin can be used only in debug builds. In non-debug ones it is ignored, even if it was enabled by build options (TEST_TRACE_PLUGIN macro). */ #if defined(CLIENT_PROTOCOL_TRACING) && defined(TEST_TRACE_PLUGIN) && \ !defined(DBUG_OFF) extern auth_plugin_t test_trace_plugin; #endif struct st_mysql_client_plugin *mysql_client_builtins[] = { (struct st_mysql_client_plugin *)&native_password_client_plugin, (struct st_mysql_client_plugin *)&clear_password_client_plugin, #if defined(HAVE_OPENSSL) (struct st_mysql_client_plugin *)&sha256_password_client_plugin, (struct st_mysql_client_plugin *)&caching_sha2_password_client_plugin, #endif #ifdef AUTHENTICATION_WIN (struct st_mysql_client_plugin *)&win_auth_client_plugin, #endif #if defined(CLIENT_PROTOCOL_TRACING) && defined(TEST_TRACE_PLUGIN) && \ !defined(DBUG_OFF) (struct st_mysql_client_plugin *)&test_trace_plugin, #endif 0}; static uchar *write_length_encoded_string3(uchar *buf, const char *string, size_t length) { buf = net_store_length(buf, length); memcpy(buf, string, length); buf += length; return buf; } /* The main purpose of this is to hide C++ from st_mysql_options_extention. */ struct My_hash { malloc_unordered_map hash{key_memory_mysql_options}; }; uchar *send_client_connect_attrs(MYSQL *mysql, uchar *buf) { /* check if the server supports connection attributes */ if (mysql->server_capabilities & CLIENT_CONNECT_ATTRS) { /* Always store the length if the client supports it */ buf = net_store_length( buf, mysql->options.extension ? mysql->options.extension->connection_attributes_length : 0); /* check if we have connection attributes */ if (mysql->options.extension && mysql->options.extension->connection_attributes) { /* loop over and dump the connection attributes */ for (const auto &key_and_value : mysql->options.extension->connection_attributes->hash) { const string &key = key_and_value.first; const string &value = key_and_value.second; /* we can't have zero length keys */ DBUG_ASSERT(!key.empty()); buf = write_length_encoded_string3(buf, key.data(), key.size()); buf = write_length_encoded_string3(buf, value.data(), value.size()); } } } return buf; } static size_t get_length_store_length(size_t length) { /* as defined in net_store_length */ #define MAX_VARIABLE_STRING_LENGTH 9 uchar length_buffer[MAX_VARIABLE_STRING_LENGTH], *ptr; ptr = net_store_length(length_buffer, length); return ptr - &length_buffer[0]; } /* Write 1-8 bytes of string length header infromation to dest depending on value of src_len, then copy src_len bytes from src to dest. @param dest Destination buffer of size src_len+8 @param dest_end One byte past the end of the dest buffer @param src Source buff of size src_len @param src_end One byte past the end of the src buffer @return pointer dest+src_len+header size or NULL if */ static char *write_length_encoded_string4(char *dest, char *dest_end, const uchar *src, const uchar *src_end) { size_t src_len = (size_t)(src_end - src); uchar *to = net_store_length((uchar *)dest, src_len); if ((char *)(to + src_len) >= dest_end) return NULL; memcpy(to, src, src_len); return (char *)(to + src_len); } /* Write 1 byte of string length header information to dest and copy src_len bytes from src to dest. */ static char *write_string(char *dest, char *dest_end, const uchar *src, const uchar *src_end) { size_t src_len = (size_t)(src_end - src); uchar *to = NULL; if (src_len >= 251) return NULL; *dest = (uchar)src_len; to = (uchar *)dest + 1; if ((char *)(to + src_len) >= dest_end) return NULL; memcpy(to, src, src_len); return (char *)(to + src_len); } /** Sends a @ref page_protocol_com_change_user with a caller provided payload @retval 0 ok @retval 1 error */ static int send_change_user_packet(MCPVIO_EXT *mpvio, const uchar *data, int data_len) { MYSQL *mysql = mpvio->mysql; char *buff, *end; int res = 1; size_t connect_attrs_len = (mysql->server_capabilities & CLIENT_CONNECT_ATTRS && mysql->options.extension) ? mysql->options.extension->connection_attributes_length : 0; buff = static_cast( my_alloca(USERNAME_LENGTH + data_len + 1 + NAME_LEN + 2 + NAME_LEN + connect_attrs_len + 9 /* for the length of the attrs */)); end = strmake(buff, mysql->user, USERNAME_LENGTH) + 1; if (!data_len) *end++ = 0; else { DBUG_ASSERT(data_len <= 255); if (data_len > 255) { set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); goto error; } *end++ = data_len; memcpy(end, data, data_len); end += data_len; } end = strmake(end, mpvio->db ? mpvio->db : "", NAME_LEN) + 1; if (mysql->server_capabilities & CLIENT_PROTOCOL_41) { int2store((uchar *)end, (ushort)mysql->charset->number); end += 2; } if (mysql->server_capabilities & CLIENT_PLUGIN_AUTH) end = strmake(end, mpvio->plugin->name, NAME_LEN) + 1; end = (char *)send_client_connect_attrs(mysql, (uchar *)end); res = simple_command(mysql, COM_CHANGE_USER, (uchar *)buff, (ulong)(end - buff), 1); error: return res; } /* clang-format off */ /** @page page_protocol_connection_phase_packets_protocol_ssl_request Protocol::SSLRequest: SSL Connection Request Packet. It is like @ref page_protocol_connection_phase_packets_protocol_handshake_response but is truncated right before username field. If server supports ::CLIENT_SSL capability, client can send this packet to request a secure SSL connection. The ::CLIENT_SSL capability flag must be set inside the SSL Connection Request Packet.
Payload
TypeNameDescription
if capabilities @& ::CLIENT_PROTOCOL_41 {
@ref a_protocol_type_int4 "int<4>" client_flag \ref group_cs_capabilities_flags
@ref a_protocol_type_int4 "int<4>" max_packet_size maximum packet size
@ref a_protocol_type_int1 "int<1>" character_set client charset \ref a_protocol_character_set, only the lower 8-bits
@ref sect_protocol_basic_dt_string_fix "string[23]" filler filler to the size of the handhshake response packet. All 0s.
} else {
@ref a_protocol_type_int2 "int<2>" client_flag \ref group_cs_capabilities_flags, only the lower 16 bits
@ref a_protocol_type_int3 "int<3>" max_packet_size maximum packet size, 0xFFFFFF max
}
@sa int2store(), int3store(), int4store(), mysql_fill_packet_header() */ /* clang-format on */ /** Fill in the beginning of the client reply packet. Used to fill in the beginning of the client reply packet or the ssl request packet. @param mysql The mysql handler to operate @param[out] buff The buffer to receive the packet @param buff_size The max size of the buffer. Used in debug only. @return one past to where the buffer is filled @sa page_protocol_conn_packets_protocol_ssl_request send_client_reply_packet() */ static char *mysql_fill_packet_header(MYSQL *mysql, char *buff, size_t buff_size MY_ATTRIBUTE((unused))) { NET *net = &mysql->net; char *end; uchar *buff_p = (uchar *)buff; if (mysql->client_flag & CLIENT_PROTOCOL_41) { /* 4.1 server and 4.1 client has a 32 byte option flag */ DBUG_ASSERT(buff_size >= 32); int4store(buff_p, mysql->client_flag); int4store(buff_p + 4, net->max_packet_size); buff[8] = (char)mysql->charset->number; memset(buff + 9, 0, 32 - 9); end = buff + 32; } else { DBUG_ASSERT(buff_size >= 5); DBUG_ASSERT(mysql->client_flag <= UINT_MAX16); int2store(buff_p, (uint16)mysql->client_flag); int3store(buff_p + 2, net->max_packet_size); end = buff + 5; } return end; } /** Calcualtes client capabilities in effect (mysql->client_flag) Needs to be called immediately after receiving the server handshake packet. @param mysql the connection context @param db The database specified by the client app @param client_flag The client flag as specified by the client app */ static void cli_calculate_client_flag(MYSQL *mysql, const char *db, ulong client_flag) { mysql->client_flag = client_flag; mysql->client_flag |= mysql->options.client_flag; mysql->client_flag |= CLIENT_CAPABILITIES; if (mysql->client_flag & CLIENT_MULTI_STATEMENTS) mysql->client_flag |= CLIENT_MULTI_RESULTS; #if defined(HAVE_OPENSSL) if (mysql->options.extension && mysql->options.extension->ssl_mode != SSL_MODE_DISABLED) mysql->client_flag |= CLIENT_SSL; #endif /* HAVE_OPENSSL */ if (db) mysql->client_flag |= CLIENT_CONNECT_WITH_DB; else mysql->client_flag &= ~CLIENT_CONNECT_WITH_DB; /* Remove options that server doesn't support */ mysql->client_flag = mysql->client_flag & (~(CLIENT_COMPRESS | CLIENT_SSL | CLIENT_PROTOCOL_41 | CLIENT_OPTIONAL_RESULTSET_METADATA) | mysql->server_capabilities); if (mysql->options.protocol == MYSQL_PROTOCOL_SOCKET && mysql->options.extension && mysql->options.extension->ssl_mode <= SSL_MODE_PREFERRED) { mysql->client_flag &= ~CLIENT_SSL; mysql->options.extension->ssl_mode = SSL_MODE_DISABLED; } } /** Establishes SSL if requested and supported. @param mysql the connection handle @retval 0 success @retval 1 failure */ static int cli_establish_ssl(MYSQL *mysql) { #ifdef HAVE_OPENSSL NET *net = &mysql->net; /* Don't fallback on unencrypted connection if SSL required. */ if (mysql->options.extension && mysql->options.extension->ssl_mode >= SSL_MODE_REQUIRED && !(mysql->server_capabilities & CLIENT_SSL)) { set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, ER_CLIENT(CR_SSL_CONNECTION_ERROR), "SSL is required but the server doesn't " "support it"); goto error; } /* If the ssl_mode is VERIFY_CA or VERIFY_IDENTITY, make sure that the connection doesn't succeed without providing the CA certificate. */ if (mysql->options.extension && mysql->options.extension->ssl_mode > SSL_MODE_REQUIRED && !(mysql->options.ssl_ca || mysql->options.ssl_capath)) { set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, ER_CLIENT(CR_SSL_CONNECTION_ERROR), "CA certificate is required if ssl-mode " "is VERIFY_CA or VERIFY_IDENTITY"); goto error; } /* Attempt SSL connection if ssl_mode != SSL_MODE_DISABLED and the server supports SSL. Fallback on unencrypted connection otherwise. */ if (mysql->options.extension && mysql->options.extension->ssl_mode != SSL_MODE_DISABLED && (mysql->server_capabilities & CLIENT_SSL)) { /* Do the SSL layering. */ struct st_mysql_options *options = &mysql->options; struct st_VioSSLFd *ssl_fd; enum enum_ssl_init_error ssl_init_error = SSL_INITERR_NOERROR; const char *cert_error; unsigned long ssl_error; char buff[33], *end; /* check if server supports compression else turn off client capability */ if (!(mysql->server_capabilities & CLIENT_ZSTD_COMPRESSION_ALGORITHM)) mysql->client_flag &= ~CLIENT_ZSTD_COMPRESSION_ALGORITHM; if (!(mysql->server_capabilities & CLIENT_COMPRESS)) mysql->client_flag &= ~CLIENT_COMPRESS; end = mysql_fill_packet_header(mysql, buff, sizeof(buff)); /* Send mysql->client_flag, max_packet_size - unencrypted otherwise the server does not know we want to do SSL */ MYSQL_TRACE(SEND_SSL_REQUEST, mysql, ((size_t)(end - buff), (const unsigned char *)buff)); if (my_net_write(net, (uchar *)buff, (size_t)(end - buff)) || net_flush(net)) { set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate, ER_CLIENT(CR_SERVER_LOST_EXTENDED), "sending connection information to server", errno); goto error; } MYSQL_TRACE_STAGE(mysql, SSL_NEGOTIATION); /* Create the VioSSLConnectorFd - init SSL and load certs */ if (!(ssl_fd = new_VioSSLConnectorFd( options->ssl_key, options->ssl_cert, options->ssl_ca, options->ssl_capath, options->ssl_cipher, options->extension ? options->extension->tls_ciphersuites : NULL, &ssl_init_error, options->extension ? options->extension->ssl_crl : NULL, options->extension ? options->extension->ssl_crlpath : NULL, options->extension ? options->extension->ssl_ctx_flags : 0))) { set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, ER_CLIENT(CR_SSL_CONNECTION_ERROR), sslGetErrString(ssl_init_error)); goto error; } mysql->connector_fd = (unsigned char *)ssl_fd; /* Connect to the server */ DBUG_PRINT("info", ("IO layer change in progress...")); MYSQL_TRACE(SSL_CONNECT, mysql, ()); if (sslconnect(ssl_fd, net->vio, (long)(mysql->options.connect_timeout), &ssl_error, nullptr)) { char buf[512]; ERR_error_string_n(ssl_error, buf, 512); buf[511] = 0; set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, ER_CLIENT(CR_SSL_CONNECTION_ERROR), buf); goto error; } DBUG_PRINT("info", ("IO layer change done!")); /* Verify server cert */ if ((mysql->client_flag & CLIENT_SSL_VERIFY_SERVER_CERT) && ssl_verify_server_cert(net->vio, mysql->host, &cert_error)) { set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, ER_CLIENT(CR_SSL_CONNECTION_ERROR), cert_error); goto error; } MYSQL_TRACE(SSL_CONNECTED, mysql, ()); MYSQL_TRACE_STAGE(mysql, AUTHENTICATE); } return 0; error: return 1; #else (void)mysql; /* avoid warning */ return 0; #endif /* HAVE_OPENSSL */ } /** This function will establish asynchronous ssl connection by completing 4 different ssl connection states. Initial state is set to SSL_NONE during which this functions does priliminary checks like if server supports ssl or not, if CA certificate is required etc. Once preliminary checks are done state is changed to SSL_REQUEST. In this state ssl request packet is sent by client. If this network IO is complete, state is changed to SSL_CONNECT. During SSL_CONNECT sslconnect() is called which can return immediately or complete SSL handshake. If it returns immediately client will save all SSL context in struct mysql_async_auth, so that next call to this function will ensure that SSL_new() is not called twice. Once ssl connection is established state is changed to SSL_COMPLETE. @param[in] mysql Client connection handle. @param[out] res set to false incase of success and true for error. @retval NET_ASYNC_NOT_READY ssl connection not yet established @retval NET_ASYNC_COMPLETE ssl connection established */ static net_async_status cli_establish_ssl_nonblocking(MYSQL *mysql, int *res) { DBUG_TRACE; #ifdef HAVE_OPENSSL NET *net = &mysql->net; NET_ASYNC *net_async = NET_ASYNC_DATA(net); mysql_async_connect *ctx = ASYNC_DATA(mysql)->connect_context; if (ctx->ssl_state == SSL_NONE) { /* Don't fallback on unencrypted connection if SSL required. */ if (mysql->options.extension && mysql->options.extension->ssl_mode >= SSL_MODE_REQUIRED && !(mysql->server_capabilities & CLIENT_SSL)) { set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, ER_CLIENT(CR_SSL_CONNECTION_ERROR), "SSL is required but the server doesn't " "support it"); goto error; } /* If the ssl_mode is VERIFY_CA or VERIFY_IDENTITY, make sure that the connection doesn't succeed without providing the CA certificate. */ if (mysql->options.extension && mysql->options.extension->ssl_mode > SSL_MODE_REQUIRED && !(mysql->options.ssl_ca || mysql->options.ssl_capath)) { set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, ER_CLIENT(CR_SSL_CONNECTION_ERROR), "CA certificate is required if ssl-mode " "is VERIFY_CA or VERIFY_IDENTITY"); goto error; } /* Attempt SSL connection if ssl_mode != SSL_MODE_DISABLED and the server supports SSL. Fallback on unencrypted connection otherwise. */ if (!mysql->options.extension || mysql->options.extension->ssl_mode == SSL_MODE_DISABLED || !(mysql->server_capabilities & CLIENT_SSL)) { goto done; } ctx->ssl_state = SSL_REQUEST; } if (ctx->ssl_state == SSL_REQUEST) { char buff[33], *end; end = mysql_fill_packet_header(mysql, buff, sizeof(buff)); /* Send mysql->client_flag, max_packet_size - unencrypted otherwise the server does not know we want to do SSL */ MYSQL_TRACE(SEND_SSL_REQUEST, mysql, ((size_t)(end - buff), (const unsigned char *)buff)); bool ret; if (my_net_write_nonblocking(net, (uchar *)buff, (size_t)(end - buff), &ret) == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } if (ret) { set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate, ER_CLIENT(CR_SERVER_LOST_EXTENDED), "sending connection information to server", errno); goto error; } ctx->ssl_state = SSL_CONNECT; } if (ctx->ssl_state == SSL_CONNECT) { /* Do the SSL layering. */ struct st_mysql_options *options = &mysql->options; struct st_VioSSLFd *ssl_fd; enum enum_ssl_init_error ssl_init_error; const char *cert_error; unsigned long ssl_error; size_t ret; MYSQL_TRACE_STAGE(mysql, SSL_NEGOTIATION); if (!mysql->connector_fd) { /* Create the VioSSLConnectorFd - init SSL and load certs */ if (!(ssl_fd = new_VioSSLConnectorFd( options->ssl_key, options->ssl_cert, options->ssl_ca, options->ssl_capath, options->ssl_cipher, options->extension ? options->extension->tls_ciphersuites : NULL, &ssl_init_error, options->extension ? options->extension->ssl_crl : NULL, options->extension ? options->extension->ssl_crlpath : NULL, options->extension ? options->extension->ssl_ctx_flags : 0))) { set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, ER_CLIENT(CR_SSL_CONNECTION_ERROR), sslGetErrString(ssl_init_error)); goto error; } mysql->connector_fd = (unsigned char *)ssl_fd; } else { ssl_fd = (struct st_VioSSLFd *)mysql->connector_fd; } /* Connect to the server */ DBUG_PRINT("info", ("IO layer change in progress...")); MYSQL_TRACE(SSL_CONNECT, mysql, ()); if ((ret = sslconnect(ssl_fd, net->vio, (long)(mysql->options.connect_timeout), &ssl_error, &ctx->ssl))) { switch (ret) { case VIO_SOCKET_WANT_READ: net_async->async_blocking_state = NET_NONBLOCKING_READ; return NET_ASYNC_NOT_READY; case VIO_SOCKET_WANT_WRITE: net_async->async_blocking_state = NET_NONBLOCKING_WRITE; return NET_ASYNC_NOT_READY; default: break; /* continue for error handling */ } char buf[512]; ERR_error_string_n(ssl_error, buf, 512); buf[511] = 0; set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, ER_CLIENT(CR_SSL_CONNECTION_ERROR), buf); goto error; } DBUG_PRINT("info", ("IO layer change done!")); /* sslconnect creates a new vio, so update it. */ vio_set_blocking_flag(net->vio, !ctx->non_blocking); /* Verify server cert */ if ((mysql->client_flag & CLIENT_SSL_VERIFY_SERVER_CERT) && ssl_verify_server_cert(net->vio, mysql->host, &cert_error)) { set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, ER_CLIENT(CR_SSL_CONNECTION_ERROR), cert_error); goto error; } MYSQL_TRACE(SSL_CONNECTED, mysql, ()); MYSQL_TRACE_STAGE(mysql, AUTHENTICATE); } done: *res = 0; ctx->ssl_state = SSL_COMPLETE; return NET_ASYNC_COMPLETE; error: *res = 1; ctx->ssl_state = SSL_COMPLETE; return NET_ASYNC_COMPLETE; #else (void)mysql; /* avoid warning */ *res = 0; ctx->ssl_state = SSL_COMPLETE; return NET_ASYNC_COMPLETE; #endif /* HAVE_OPENSSL */ } /** Asynchronous authentication phase is divided into several smaller chunks of subtasks like: 1. Determine the default/initial plugin to use 2. Call authentication plugin API 3. Handle response from authentication plugin API 4. Check if server asked to use a different authentication plugin 5. In case server asked to use a different authentication plugin use that plugin to start the authentication process again. 6. Complete authentication. All above tasks are implemented in below authsm_* functions where authsm stads for authentication state machine. */ static mysql_state_machine_status authsm_begin_plugin_auth( mysql_async_auth *ctx); static mysql_state_machine_status authsm_run_first_authenticate_user( mysql_async_auth *ctx); static mysql_state_machine_status authsm_handle_first_authenticate_user( mysql_async_auth *ctx); static mysql_state_machine_status authsm_read_change_user_result( mysql_async_auth *ctx); static mysql_state_machine_status authsm_handle_change_user_result( mysql_async_auth *ctx); static mysql_state_machine_status authsm_run_second_authenticate_user( mysql_async_auth *ctx); static mysql_state_machine_status authsm_handle_second_authenticate_user( mysql_async_auth *ctx); static mysql_state_machine_status authsm_finish_auth(mysql_async_auth *ctx); /** Asynchronous connection phase is divided into several smaller modules where wach module does following: 1. Begin the connection to the server, including any DNS resolution necessary, socket configuration, etc 2. Complete the connection itself 3. Connection established, read the first packet 4. Parse the handshake from the server 5. Establish SSL connection if needed 6. Invoke the plugin to send the authentication data to the server 7. Authenticated, set intial database if specified 8. Send COM_INIT_DB. 9. Prepare to send a sequence of init commands. 10.Send an init command. Below are the modules which does all above tasks. */ static mysql_state_machine_status csm_begin_connect(mysql_async_connect *ctx); static mysql_state_machine_status csm_complete_connect( mysql_async_connect *ctx); static mysql_state_machine_status csm_read_greeting(mysql_async_connect *ctx); static mysql_state_machine_status csm_parse_handshake(mysql_async_connect *ctx); static mysql_state_machine_status csm_establish_ssl(mysql_async_connect *ctx); static mysql_state_machine_status csm_authenticate(mysql_async_connect *ctx); static mysql_state_machine_status csm_prep_select_database( mysql_async_connect *ctx); #ifndef MYSQL_SERVER static mysql_state_machine_status csm_prep_init_commands( mysql_async_connect *ctx); static mysql_state_machine_status csm_send_one_init_command( mysql_async_connect *ctx); #endif #define MAX_CONNECTION_ATTR_STORAGE_LENGTH 65536 int mysql_get_socket_descriptor(MYSQL *mysql) { if (mysql && mysql->net.vio) { return vio_fd(mysql->net.vio); } return -1; } /* clang-format off */ /** @page page_protocol_connection_phase_packets_protocol_handshake_response Protocol::HandshakeResponse: Depending on the servers support for the ::CLIENT_PROTOCOL_41 capability and the clients understanding of that flag the client has to send either a @ref sect_protocol_connection_phase_packets_protocol_handshake_response320 or @ref sect_protocol_connection_phase_packets_protocol_handshake_response41. @sa send_client_reply_packet @section sect_protocol_connection_phase_packets_protocol_handshake_response320 Protocol::HandshakeResponse320 Old Handshake Response Packet used by old clients or if the server doesn't support ::CLIENT_PROTOCOL_41 @ref group_cs_capabilities_flags flag.
Payload
TypeNameDescription
@ref a_protocol_type_int2 "int<2>" client_flag \ref group_cs_capabilities_flags, only the lower 16 bits. ::CLIENT_PROTOCOL_41 should never be set
@ref a_protocol_type_int3 "int<3>" max_packet_size maximum packet size, 0xFFFFFF max
@ref sect_protocol_basic_dt_string_null "string<NUL>" username login user name
if capabilities @& ::CLIENT_CONNECT_WITH_DB {
@ref sect_protocol_basic_dt_string_null "string<NUL>" auth-response Opaque authentication response data generated by Authentication Method indicated by the plugin name field.
@ref sect_protocol_basic_dt_string_null "string<NUL>" database initail database for the connection. This string should be interpreted using the character set indicated by character set field.
} else {
@ref sect_protocol_basic_dt_string_eof "string<EOF>" auth-response Opaque authentication response data generated by Authentication Method indicated by the plugin name field.
}
Example ======== ~~~~~~~~~~~~~~~~~~~~~ 11 00 00 01 85 24 00 00 00 6f 6c 64 00 47 44 53 .....$...old.GDS 43 51 59 52 5f CQYR_ ~~~~~~~~~~~~~~~~~~~~~ @note If auth-response is followed by a database field it must be NULL terminated. @section sect_protocol_connection_phase_packets_protocol_handshake_response41 Protocol::HandshakeResponse41 Handshake Response Packet sent by 4.1+ clients supporting ::CLIENT_PROTOCOL_41 @ref group_cs_capabilities_flags flag, if the server announced it in its @ref page_protocol_connection_phase_packets_protocol_handshake. Otherwise (talking to an old server) the @ref sect_protocol_connection_phase_packets_protocol_handshake_response320 packet must be used.
Payload
TypeNameDescription
@ref a_protocol_type_int4 "int<4>" client_flag \ref group_cs_capabilities_flags, ::CLIENT_PROTOCOL_41 always set.
@ref a_protocol_type_int4 "int<4>" max_packet_size maximum packet size
@ref a_protocol_type_int1 "int<1>" character_set client charset \ref a_protocol_character_set, only the lower 8-bits
@ref sect_protocol_basic_dt_string_fix "string[23]" filler filler to the size of the handhshake response packet. All 0s.
@ref sect_protocol_basic_dt_string_null "string<NUL>" username login user name
if capabilities @& ::CLIENT_PLUGIN_AUTH_LENENC_CLIENT_DATA {
@ref sect_protocol_basic_dt_string_le "string<length>" auth_response opaque authentication response data generated by Authentication Method indicated by the plugin name field.
} else {
@ref a_protocol_type_int1 "int<1>" auth_response_length length of auth_response
@ref sect_protocol_basic_dt_string_le "string<length>" auth_response opaque authentication response data generated by Authentication Method indicated by the plugin name field.
}
if capabilities @& ::CLIENT_CONNECT_WITH_DB {
@ref sect_protocol_basic_dt_string_null "string<NUL>" database initail database for the connection. This string should be interpreted using the character set indicated by character set field.
}
if capabilities @& ::CLIENT_PLUGIN_AUTH {
@ref sect_protocol_basic_dt_string_null "string<NUL>" client_plugin_name the Authentication Method used by the client to generate auth-response value in this packet. This is an UTF-8 string.
}
if capabilities @& ::CLIENT_CONNECT_ATTRS {
@ref sect_protocol_basic_dt_int_le "int<lenenc>" length of all key-values affected rows
@ref sect_protocol_basic_dt_string_le "string<lenenc>" key1 Name of the 1st client attribute
@ref sect_protocol_basic_dt_string_le "string<lenenc>" value1 Value of the 1st client attribute
.. (if more data in length of all key-values, more keys and values parts)
}
@ref a_protocol_type_int1 "int<1>" zstd_compression_level compression level for zstd compression algorithm
Example ======== On MySQL 5.5.8 with ::CLIENT_PROTOCOL_41 ::CLIENT_PLUGIN_AUTH, CLIENT_SECURE_CONNECTION (removed in 8.0), and ::CLIENT_CONNECT_WITH_DB set, it may look like: ~~~~~~~~~~~~~~~~~~~~~ 54 00 00 01 8d a6 0f 00 00 00 00 01 08 00 00 00 T............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 70 61 6d 00 14 ab 09 ee f6 bc b1 32 ....pam........2 3e 61 14 38 65 c0 99 1d 95 7d 75 d4 47 74 65 73 >a.8e....}u.Gtes 74 00 6d 79 73 71 6c 5f 6e 61 74 69 76 65 5f 70 t.mysql_native_p 61 73 73 77 6f 72 64 00 assword. ~~~~~~~~~~~~~~~~~~~~~ Starting with MySQL 5.6.6 the client may send attributes if ::CLIENT_CONNECT_ATTRS is set: ~~~~~~~~~~~~~~~~~~~~~ b2 00 00 01 85 a2 1e 00 00 00 00 40 08 00 00 00 ...........@.... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 72 6f 6f 74 00 14 22 50 79 a2 12 d4 ....root.."Py... e8 82 e5 b3 f4 1a 97 75 6b c8 be db 9f 80 6d 79 .......uk.....my 73 71 6c 5f 6e 61 74 69 76 65 5f 70 61 73 73 77 sql_native_passw 6f 72 64 00 61 03 5f 6f 73 09 64 65 62 69 61 6e ord.a._os.debian 36 2e 30 0c 5f 63 6c 69 65 6e 74 5f 6e 61 6d 65 6.0._client_name 08 6c 69 62 6d 79 73 71 6c 04 5f 70 69 64 05 32 .libmysql._pid.2 32 33 34 34 0f 5f 63 6c 69 65 6e 74 5f 76 65 72 2344._client_ver 73 69 6f 6e 08 35 2e 36 2e 36 2d 6d 39 09 5f 70 sion.5.6.6-m9._p 6c 61 74 66 6f 72 6d 06 78 38 36 5f 36 34 03 66 latform.x86_64.f 6f 6f 03 62 61 72 oo.bar ~~~~~~~~~~~~~~~~~~~~~ @warning Currently, multibyte character sets such as UCS2, UTF16 and UTF32 are not supported. @note If client wants to have a secure SSL connection and sets CLIENT_SSL flag it should first send the @ref page_protocol_connection_phase_packets_protocol_ssl_request packet and only then, after establishing the secure connection, it should send the @ref page_protocol_connection_phase_packets_protocol_handshake_response packet. */ /* clang-format on */ /** sends a client authentication packet (second packet in the 3-way handshake) @param mpvio The connection to use @param data The scramble to send @param data_len Length of data @param buff_out Buffer holding client handshake packet @param buff_len Length of buffer holding client handshake packet @retval 0 ok @retval 1 error @sa mysql_fill_packet_header() page_protocol_conn_packets_protocol_handshake_response */ static bool prep_client_reply_packet(MCPVIO_EXT *mpvio, const uchar *data, int data_len, char **buff_out, int *buff_len) { DBUG_TRACE; MYSQL *mysql = mpvio->mysql; char *buff, *end; size_t buff_size; size_t connect_attrs_len = (mysql->server_capabilities & CLIENT_CONNECT_ATTRS && mysql->options.extension) ? mysql->options.extension->connection_attributes_length : 0; unsigned int compress_level = 0; bool server_zstd = (mysql->server_capabilities & CLIENT_ZSTD_COMPRESSION_ALGORITHM); bool client_zstd = (mysql->options.client_flag & CLIENT_ZSTD_COMPRESSION_ALGORITHM); /* validate compression configuration */ ENSURE_EXTENSIONS_PRESENT(&mysql->options); if (mysql->options.extension->compression_algorithm) { std::string algorithm = mysql->options.extension->compression_algorithm; if (!algorithm.empty() && validate_compression_attributes(algorithm, std::string(), true)) { set_mysql_error(mysql, CR_COMPRESSION_WRONGLY_CONFIGURED, unknown_sqlstate); return true; } } /** If server/client is configured to use zstd compression then set compression level if specified, else set level to a default value. */ if (server_zstd && client_zstd) { if (mysql->options.extension && mysql->options.extension->zstd_compression_level) compress_level = mysql->options.extension->zstd_compression_level; else compress_level = default_zstd_compression_level; } /* Remove those compression capabilities that server does not support. */ if (!(mysql->server_capabilities & CLIENT_COMPRESS)) mysql->client_flag &= ~CLIENT_COMPRESS; if (!(mysql->server_capabilities & CLIENT_ZSTD_COMPRESSION_ALGORITHM)) mysql->client_flag &= ~CLIENT_ZSTD_COMPRESSION_ALGORITHM; /* If server and client have no compression algorithms in common, we must fall back to uncompressed. In that case, check that uncompressed is allowed by client. */ if (!(mysql->client_flag & CLIENT_COMPRESS) && !(mysql->client_flag & CLIENT_ZSTD_COMPRESSION_ALGORITHM) && mysql->options.extension->connection_compressed) { set_mysql_error(mysql, CR_COMPRESSION_WRONGLY_CONFIGURED, unknown_sqlstate); return true; } DBUG_ASSERT(connect_attrs_len < MAX_CONNECTION_ATTR_STORAGE_LENGTH); *buff_out = nullptr; *buff_len = 0; /* Fixed size of the packet is 32 bytes. See mysql_fill_packet_header. +9 because data is a length encoded binary where meta data size is max 9. */ buff_size = 33 + USERNAME_LENGTH + data_len + 9 + NAME_LEN + NAME_LEN + connect_attrs_len + 9 + ((server_zstd && client_zstd) ? 1 : 0); buff = static_cast( my_malloc(PSI_NOT_INSTRUMENTED, buff_size, MYF(MY_WME | MY_ZEROFILL))); /* The client_flags is already calculated. Just fill in the packet header */ end = mysql_fill_packet_header(mysql, buff, buff_size); DBUG_PRINT( "info", ("Server version = '%s' capabilites: %lu status: %u client_flag: %lu", mysql->server_version, mysql->server_capabilities, mysql->server_status, mysql->client_flag)); static_assert(MYSQL_USERNAME_LENGTH == USERNAME_LENGTH, ""); /* This needs to be changed as it's not useful with big packets */ if (mysql->user[0]) strmake(end, mysql->user, USERNAME_LENGTH); else read_user_name(end); /* We have to handle different version of handshake here */ DBUG_PRINT("info", ("user: %s", end)); end = strend(end) + 1; if (data_len) { /* Since the older versions of server do not have CLIENT_PLUGIN_AUTH_LENENC_CLIENT_DATA capability, a check is performed on this before sending auth data. If lenenc support is not available, the data is sent in the format of first byte representing the length of the string followed by the actual string. */ if (mysql->server_capabilities & CLIENT_PLUGIN_AUTH_LENENC_CLIENT_DATA) end = write_length_encoded_string4(end, (char *)(buff + buff_size), data, data + data_len); else end = write_string(end, (char *)(buff + buff_size), data, data + data_len); if (end == NULL) goto error; } else *end++ = 0; /* Add database if needed */ if (mpvio->db && (mysql->server_capabilities & CLIENT_CONNECT_WITH_DB)) { end = strmake(end, mpvio->db, NAME_LEN) + 1; mysql->db = my_strdup(key_memory_MYSQL, mpvio->db, MYF(MY_WME)); } if (mysql->server_capabilities & CLIENT_PLUGIN_AUTH) end = strmake(end, mpvio->plugin->name, NAME_LEN) + 1; end = (char *)send_client_connect_attrs(mysql, (uchar *)end); if (server_zstd && client_zstd) { /* send compression level if both client and server support it */ *end = static_cast(compress_level); end++; } *buff_out = buff; *buff_len = end - buff; return false; error: my_free(buff); return true; } static int send_client_reply_packet(MCPVIO_EXT *mpvio, const uchar *data, int data_len) { DBUG_TRACE; MYSQL *mysql = mpvio->mysql; NET *net = &mysql->net; char *buff = nullptr, *end = nullptr; int buff_len; int ret = 0; bool prep_err; prep_err = prep_client_reply_packet(mpvio, data, data_len, &buff, &buff_len); if (prep_err) { return 1; } end = buff + buff_len; /* Write authentication package */ MYSQL_TRACE(SEND_AUTH_RESPONSE, mysql, ((size_t)(end - buff), (const unsigned char *)buff)); if (my_net_write(net, (uchar *)buff, (size_t)(end - buff)) || net_flush(net)) { set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate, ER_CLIENT(CR_SERVER_LOST_EXTENDED), "sending authentication information", errno); ret = 1; } MYSQL_TRACE(PACKET_SENT, mysql, ((size_t)(end - buff))); my_free(buff); return ret; } static net_async_status send_client_reply_packet_nonblocking(MCPVIO_EXT *mpvio, const uchar *pkt, int pkt_len, bool *result) { DBUG_TRACE; MYSQL *mysql = mpvio->mysql; mysql_async_auth *ctx = ASYNC_DATA(mysql)->connect_context->auth_context; net_async_status status; bool error = false; if (!ctx->change_user_buff) { error = prep_client_reply_packet(mpvio, pkt, pkt_len, &ctx->change_user_buff, &ctx->change_user_buff_len); if (error) { goto end; } } status = my_net_write_nonblocking(&mysql->net, (uchar *)ctx->change_user_buff, ctx->change_user_buff_len, &error); if (status == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } end: *result = error; my_free(ctx->change_user_buff); ctx->change_user_buff = nullptr; return NET_ASYNC_COMPLETE; } #ifdef __clang__ // Clang UBSAN false positive? // Call to function through pointer to incorrect function type static int client_mpvio_read_packet(MYSQL_PLUGIN_VIO *mpv, uchar **buf) SUPPRESS_UBSAN; #endif // __clang__ /** vio->read_packet() callback method for client authentication plugins This function is called by a client authentication plugin, when it wants to read data from the server. */ static int client_mpvio_read_packet(MYSQL_PLUGIN_VIO *mpv, uchar **buf) { MCPVIO_EXT *mpvio = (MCPVIO_EXT *)mpv; MYSQL *mysql = mpvio->mysql; ulong pkt_len; /* there are cached data left, feed it to a plugin */ if (mpvio->cached_server_reply.pkt) { *buf = mpvio->cached_server_reply.pkt; mpvio->cached_server_reply.pkt = 0; mpvio->packets_read++; return mpvio->cached_server_reply.pkt_len; } if (mpvio->packets_read == 0) { /* the server handshake packet came from the wrong plugin, or it's mysql_change_user(). Either way, there is no data for a plugin to read. send a dummy packet to the server to initiate a dialog. */ if (client_mpvio_write_packet(mpv, 0, 0)) return (int)packet_error; } /* otherwise read the data */ pkt_len = (*mysql->methods->read_change_user_result)(mysql); /* error while reading the change user request */ if (pkt_len == packet_error) return (int)packet_error; mpvio->last_read_packet_len = pkt_len; *buf = mysql->net.read_pos; /* was it a request to change plugins ? */ if (**buf == 254) return (int)packet_error; /* if yes, this plugin shan't continue */ /* the server sends \1\255 or \1\254 instead of just \255 or \254 - for us to not confuse it with an error or "change plugin" packets. We remove this escaping \1 here. See also server_mpvio_write_packet() where the escaping is done. */ if (pkt_len && **buf == 1) { (*buf)++; pkt_len--; } mpvio->packets_read++; return pkt_len; } /** vio->read_packet() nonblocking callback method for client authentication plugins */ static net_async_status client_mpvio_read_packet_nonblocking( struct MYSQL_PLUGIN_VIO *mpv, uchar **buf, int *result) { DBUG_TRACE; MCPVIO_EXT *mpvio = (MCPVIO_EXT *)mpv; MYSQL *mysql = mpvio->mysql; ulong pkt_len; int error; /* there are cached data left, feed it to a plugin */ if (mpvio->cached_server_reply.pkt) { *buf = mpvio->cached_server_reply.pkt; mpvio->cached_server_reply.pkt = 0; mpvio->packets_read++; *result = mpvio->cached_server_reply.pkt_len; return NET_ASYNC_COMPLETE; } if (mpvio->packets_read == 0) { /* the server handshake packet came from the wrong plugin, or it's mysql_change_user(). Either way, there is no data for a plugin to read. send a dummy packet to the server to initiate a dialog. */ net_async_status status = client_mpvio_write_packet_nonblocking(mpv, 0, 0, &error); if (status == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } if (error) { *result = (int)packet_error; return NET_ASYNC_COMPLETE; } } /* packets_read needs to be set here to avoid entering above condition again. */ mpvio->packets_read++; /* otherwise read the data */ net_async_status status = mysql->methods->read_change_user_result_nonblocking(mysql, &pkt_len); if (status == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } mpvio->last_read_packet_len = pkt_len; *buf = mysql->net.read_pos; /* was it a request to change plugins ? */ if (**buf == 254) { *result = (int)packet_error; return NET_ASYNC_COMPLETE; } /* the server sends \1\255 or \1\254 instead of just \255 or \254 - for us to not confuse it with an error or "change plugin" packets. We remove this escaping \1 here. See also server_mpvio_write_packet() where the escaping is done. */ if (pkt_len && **buf == 1) { (*buf)++; pkt_len--; } *result = pkt_len; return NET_ASYNC_COMPLETE; } #ifdef __clang__ // Clang UBSAN false positive? // Call to function through pointer to incorrect function type static int client_mpvio_write_packet(MYSQL_PLUGIN_VIO *mpv, const uchar *pkt, int pkt_len) SUPPRESS_UBSAN; #endif // __clang__ /** vio->write_packet() callback method for client authentication plugins This function is called by a client authentication plugin, when it wants to send data to the server. It transparently wraps the data into a change user or authentication handshake packet, if neccessary. */ static int client_mpvio_write_packet(MYSQL_PLUGIN_VIO *mpv, const uchar *pkt, int pkt_len) { int res; MCPVIO_EXT *mpvio = (MCPVIO_EXT *)mpv; if (mpvio->packets_written == 0) { if (mpvio->mysql_change_user) res = send_change_user_packet(mpvio, pkt, pkt_len); else res = send_client_reply_packet(mpvio, pkt, pkt_len); } else { NET *net = &mpvio->mysql->net; MYSQL_TRACE(SEND_AUTH_DATA, mpvio->mysql, ((size_t)pkt_len, pkt)); if (mpvio->mysql->thd) res = 1; /* no chit-chat in embedded */ else res = my_net_write(net, pkt, pkt_len) || net_flush(net); if (!res) { MYSQL_TRACE(PACKET_SENT, mpvio->mysql, ((size_t)pkt_len)); } else set_mysql_extended_error(mpvio->mysql, CR_SERVER_LOST, unknown_sqlstate, ER_CLIENT(CR_SERVER_LOST_EXTENDED), "sending authentication information", errno); } mpvio->packets_written++; return res; } /** vio->write_packet() nonblocking callback method for client authentication plugins */ static net_async_status client_mpvio_write_packet_nonblocking( struct MYSQL_PLUGIN_VIO *mpv, const uchar *pkt, int pkt_len, int *result) { DBUG_TRACE; MCPVIO_EXT *mpvio = (MCPVIO_EXT *)mpv; bool error = false; if (mpvio->packets_written == 0) { /* mysql_change_user_nonblocking not implemented yet. */ DBUG_ASSERT(!mpvio->mysql_change_user); net_async_status status = send_client_reply_packet_nonblocking(mpvio, pkt, pkt_len, &error); if (status == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } } else { NET *net = &mpvio->mysql->net; MYSQL_TRACE(SEND_AUTH_DATA, mpvio->mysql, ((size_t)pkt_len, pkt)); if (mpvio->mysql->thd) *result = 1; /* no chit-chat in embedded */ else { net_async_status status = my_net_write_nonblocking(net, pkt, pkt_len, &error); if (status == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } *result = error; if (error) { set_mysql_extended_error(mpvio->mysql, CR_SERVER_LOST, unknown_sqlstate, ER_CLIENT(CR_SERVER_LOST_EXTENDED), "sending authentication information", errno); } else { MYSQL_TRACE(PACKET_SENT, mpvio->mysql, ((size_t)pkt_len)); } } } mpvio->packets_written++; *result = error ? -1 : 0; return NET_ASYNC_COMPLETE; } /** fills MYSQL_PLUGIN_VIO_INFO structure with the information about the connection */ void mpvio_info(Vio *vio, MYSQL_PLUGIN_VIO_INFO *info) { memset(info, 0, sizeof(*info)); switch (vio->type) { case VIO_TYPE_TCPIP: info->protocol = MYSQL_PLUGIN_VIO_INFO::MYSQL_VIO_TCP; info->socket = (int)vio_fd(vio); return; case VIO_TYPE_SOCKET: info->protocol = MYSQL_PLUGIN_VIO_INFO::MYSQL_VIO_SOCKET; info->socket = (int)vio_fd(vio); return; case VIO_TYPE_SSL: { struct sockaddr addr; socklen_t addrlen = sizeof(addr); if (getsockname(vio_fd(vio), &addr, &addrlen)) return; info->protocol = addr.sa_family == AF_UNIX ? MYSQL_PLUGIN_VIO_INFO::MYSQL_VIO_SOCKET : MYSQL_PLUGIN_VIO_INFO::MYSQL_VIO_TCP; info->socket = (int)vio_fd(vio); return; } #ifdef _WIN32 case VIO_TYPE_NAMEDPIPE: info->protocol = MYSQL_PLUGIN_VIO_INFO::MYSQL_VIO_PIPE; info->handle = vio->hPipe; return; #if defined(_WIN32) case VIO_TYPE_SHARED_MEMORY: info->protocol = MYSQL_PLUGIN_VIO_INFO::MYSQL_VIO_MEMORY; info->handle = vio->handle_file_map; /* or what ? */ return; #endif #endif default: DBUG_ASSERT(0); } } static void client_mpvio_info(MYSQL_PLUGIN_VIO *vio, MYSQL_PLUGIN_VIO_INFO *info) { MCPVIO_EXT *mpvio = (MCPVIO_EXT *)vio; mpvio_info(mpvio->mysql->net.vio, info); } bool libmysql_cleartext_plugin_enabled = 0; static bool check_plugin_enabled(MYSQL *mysql, mysql_async_auth *ctx) { if (ctx->auth_plugin == &clear_password_client_plugin && (!libmysql_cleartext_plugin_enabled && (!mysql->options.extension || !mysql->options.extension->enable_cleartext_plugin))) { set_mysql_extended_error( mysql, CR_AUTH_PLUGIN_CANNOT_LOAD, unknown_sqlstate, ER_CLIENT(CR_AUTH_PLUGIN_CANNOT_LOAD), clear_password_client_plugin.name, "plugin not enabled"); return true; } if (ctx->non_blocking && !ctx->auth_plugin->authenticate_user_nonblocking) { set_mysql_extended_error( mysql, CR_AUTH_PLUGIN_CANNOT_LOAD, unknown_sqlstate, ER_CLIENT(CR_AUTH_PLUGIN_CANNOT_LOAD), ctx->auth_plugin->name, "plugin does not support nonblocking connect"); } return false; } /** Client side of the plugin driver authentication. @note this is used by both the mysql_real_connect and mysql_change_user @param mysql mysql @param data pointer to the plugin auth data (scramble) in the handshake packet @param data_len the length of the data @param data_plugin a plugin that data were prepared for or 0 if it's mysql_change_user() @param db initial db to use, can be 0 @retval 0 ok @retval 1 error */ int run_plugin_auth(MYSQL *mysql, char *data, uint data_len, const char *data_plugin, const char *db) { DBUG_TRACE; mysql_state_machine_status status; mysql_async_auth ctx; memset(&ctx, 0, sizeof(ctx)); ctx.mysql = mysql; ctx.data = data; ctx.data_len = data_len; ctx.data_plugin = data_plugin; ctx.db = db; ctx.non_blocking = false; ctx.state_function = authsm_begin_plugin_auth; do { status = ctx.state_function(&ctx); } while (status != STATE_MACHINE_FAILED && status != STATE_MACHINE_DONE); return status == STATE_MACHINE_FAILED; } /** This functions drives the authentication on client side in a nonblocking way. This function will call differnt modules in a sequence where each module is responsible to acheive a particular part in entire authentication phase. @note this is used by both the mysql_real_connect_nonblocking @param mysql mysql @param data pointer to the plugin auth data (scramble) in the handshake packet @param data_len the length of the data @param data_plugin a plugin that data were prepared for or 0 if it's mysql_change_user() @param db initial db to use, can be 0 @retval NET_ASYNC_NOT_READY authentication not yet complete @retval NET_ASYNC_COMPLETE authentication done */ mysql_state_machine_status run_plugin_auth_nonblocking(MYSQL *mysql, char *data, uint data_len, const char *data_plugin, const char *db) { DBUG_TRACE; mysql_async_auth *ctx = ASYNC_DATA(mysql)->connect_context->auth_context; if (!ctx) { ctx = static_cast( my_malloc(key_memory_MYSQL, sizeof(*ctx), MYF(MY_WME | MY_ZEROFILL))); ctx->mysql = mysql; ctx->data = data; ctx->data_len = data_len; ctx->data_plugin = data_plugin; ctx->db = db; ctx->non_blocking = true; ctx->state_function = authsm_begin_plugin_auth; ASYNC_DATA(mysql)->connect_context->auth_context = ctx; } mysql_state_machine_status ret = ctx->state_function(ctx); if (ret == STATE_MACHINE_FAILED || ret == STATE_MACHINE_DONE) { my_free(ctx); ASYNC_DATA(mysql)->connect_context->auth_context = nullptr; } return ret; } /** Determine the default/initial plugin to use */ static mysql_state_machine_status authsm_begin_plugin_auth( mysql_async_auth *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; /* determine the default/initial plugin to use */ if (mysql->options.extension && mysql->options.extension->default_auth && mysql->server_capabilities & CLIENT_PLUGIN_AUTH) { ctx->auth_plugin_name = mysql->options.extension->default_auth; if (!(ctx->auth_plugin = (auth_plugin_t *)mysql_client_find_plugin( mysql, ctx->auth_plugin_name, MYSQL_CLIENT_AUTHENTICATION_PLUGIN))) return STATE_MACHINE_FAILED; /* oops, not found */ } else { ctx->auth_plugin = &caching_sha2_password_client_plugin; ctx->auth_plugin_name = ctx->auth_plugin->name; } if (check_plugin_enabled(mysql, ctx)) return STATE_MACHINE_FAILED; DBUG_PRINT("info", ("using plugin %s", ctx->auth_plugin_name)); mysql->net.last_errno = 0; /* just in case */ if (ctx->data_plugin && strcmp(ctx->data_plugin, ctx->auth_plugin_name)) { /* data was prepared for a different plugin, don't show it to this one */ ctx->data = 0; ctx->data_len = 0; } ctx->mpvio.mysql_change_user = ctx->data_plugin == 0; ctx->mpvio.cached_server_reply.pkt = (uchar *)ctx->data; ctx->mpvio.cached_server_reply.pkt_len = ctx->data_len; ctx->mpvio.read_packet = client_mpvio_read_packet; ctx->mpvio.write_packet = client_mpvio_write_packet; ctx->mpvio.read_packet_nonblocking = client_mpvio_read_packet_nonblocking; ctx->mpvio.write_packet_nonblocking = client_mpvio_write_packet_nonblocking; ctx->mpvio.info = client_mpvio_info; ctx->mpvio.mysql = mysql; ctx->mpvio.packets_read = ctx->mpvio.packets_written = 0; ctx->mpvio.db = ctx->db; ctx->mpvio.plugin = ctx->auth_plugin; ctx->client_auth_plugin_state = (int)(client_auth_caching_sha2_password_plugin_status:: CACHING_SHA2_READING_PASSWORD); ctx->state_function = authsm_run_first_authenticate_user; return STATE_MACHINE_CONTINUE; } /** Authentication can have two authenticate_user calls, depending on what the server responds with; this handles the first. */ static mysql_state_machine_status authsm_run_first_authenticate_user( mysql_async_auth *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; MYSQL_TRACE(AUTH_PLUGIN, mysql, (ctx->auth_plugin->name)); if (ctx->non_blocking && ctx->auth_plugin->authenticate_user_nonblocking) { net_async_status status = ctx->auth_plugin->authenticate_user_nonblocking( (struct MYSQL_PLUGIN_VIO *)&ctx->mpvio, mysql, &ctx->res); if (status == NET_ASYNC_NOT_READY) { return STATE_MACHINE_WOULD_BLOCK; } } else { ctx->res = ctx->auth_plugin->authenticate_user( (struct MYSQL_PLUGIN_VIO *)&ctx->mpvio, mysql); } ctx->state_function = authsm_handle_first_authenticate_user; return STATE_MACHINE_CONTINUE; } /** Handle the result of the first authenticate_user. */ static mysql_state_machine_status authsm_handle_first_authenticate_user( mysql_async_auth *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; DBUG_PRINT("info", ("authenticate_user returned %s", ctx->res == CR_OK ? "CR_OK" : ctx->res == CR_ERROR ? "CR_ERROR" : ctx->res == CR_OK_HANDSHAKE_COMPLETE ? "CR_OK_HANDSHAKE_COMPLETE" : "error")); static_assert(CR_OK == -1, ""); static_assert(CR_ERROR == 0, ""); /* The connection may be closed. If so: do not try to read from the buffer. If server sends OK packet without sending auth-switch first, client side auth plugin may not be able to process it correctly. However, if server sends OK, it means server side authentication plugin already performed required checks. Further, server side plugin did not really care about plugin used by client in this case. */ if (ctx->res > CR_OK && (!my_net_is_inited(&mysql->net) || (mysql->net.read_pos[0] != 0 && mysql->net.read_pos[0] != 254))) { /* the plugin returned an error. write it down in mysql, unless the error code is CR_ERROR and mysql->net.last_errno is already set (the plugin has done it) */ DBUG_PRINT("info", ("res=%d", ctx->res)); if (ctx->res > CR_ERROR) set_mysql_error(mysql, ctx->res, unknown_sqlstate); else if (!mysql->net.last_errno) set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate); return STATE_MACHINE_FAILED; } ctx->state_function = authsm_read_change_user_result; return STATE_MACHINE_CONTINUE; } /** After the first authenticate_user comes a call to read the result of the implied change_user. */ static mysql_state_machine_status authsm_read_change_user_result( mysql_async_auth *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; /* read the OK packet (or use the cached value in mysql->net.read_pos */ if (ctx->res == CR_OK) { if (ctx->non_blocking) { net_async_status status = (*mysql->methods->read_change_user_result_nonblocking)( mysql, &ctx->pkt_length); if (status == NET_ASYNC_NOT_READY) { return STATE_MACHINE_WOULD_BLOCK; } } else { ctx->pkt_length = (*mysql->methods->read_change_user_result)(mysql); } } else /* res == CR_OK_HANDSHAKE_COMPLETE */ ctx->pkt_length = ctx->mpvio.last_read_packet_len; ctx->state_function = authsm_handle_change_user_result; return STATE_MACHINE_CONTINUE; } /** Check if server asked to use a different authentication plugin */ static mysql_state_machine_status authsm_handle_change_user_result( mysql_async_auth *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; DBUG_PRINT("info", ("OK packet length=%lu", ctx->pkt_length)); if (ctx->pkt_length == packet_error) { if (mysql->net.last_errno == CR_SERVER_LOST) set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate, ER_CLIENT(CR_SERVER_LOST_EXTENDED), "reading authorization packet", errno); return STATE_MACHINE_FAILED; } if (mysql->net.read_pos[0] == 254) { ctx->state_function = authsm_run_second_authenticate_user; } else ctx->state_function = authsm_finish_auth; return STATE_MACHINE_CONTINUE; } /** Start the authentication process again with the plugin which server asked for. */ static mysql_state_machine_status authsm_run_second_authenticate_user( mysql_async_auth *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; /* The server asked to use a different authentication plugin */ if (ctx->pkt_length < 2) { set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); /* purecov: inspected */ return STATE_MACHINE_FAILED; } else { /* "use different plugin" packet */ uint len; ctx->auth_plugin_name = (char *)mysql->net.read_pos + 1; len = (uint)strlen( ctx->auth_plugin_name); /* safe as my_net_read always appends \0 */ ctx->mpvio.cached_server_reply.pkt_len = ctx->pkt_length - len - 2; ctx->mpvio.cached_server_reply.pkt = mysql->net.read_pos + len + 2; DBUG_PRINT("info", ("change plugin packet from server for plugin %s", ctx->auth_plugin_name)); } if (!(ctx->auth_plugin = (auth_plugin_t *)mysql_client_find_plugin( mysql, ctx->auth_plugin_name, MYSQL_CLIENT_AUTHENTICATION_PLUGIN))) return STATE_MACHINE_FAILED; if (check_plugin_enabled(mysql, ctx)) return STATE_MACHINE_FAILED; MYSQL_TRACE(AUTH_PLUGIN, mysql, (ctx->auth_plugin->name)); ctx->mpvio.plugin = ctx->auth_plugin; ctx->res = ctx->auth_plugin->authenticate_user( (struct MYSQL_PLUGIN_VIO *)&ctx->mpvio, mysql); ctx->state_function = authsm_handle_second_authenticate_user; return STATE_MACHINE_CONTINUE; } /* Now read the results. */ static mysql_state_machine_status authsm_handle_second_authenticate_user( mysql_async_auth *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; DBUG_PRINT("info", ("second authenticate_user returned %s", ctx->res == CR_OK ? "CR_OK" : ctx->res == CR_ERROR ? "CR_ERROR" : ctx->res == CR_OK_HANDSHAKE_COMPLETE ? "CR_OK_HANDSHAKE_COMPLETE" : "error")); if (ctx->res > CR_OK) { if (ctx->res > CR_ERROR) set_mysql_error(mysql, ctx->res, unknown_sqlstate); else if (!mysql->net.last_errno) set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate); return STATE_MACHINE_FAILED; } if (ctx->res != CR_OK_HANDSHAKE_COMPLETE) { /* Read what server thinks about out new auth message report */ if (cli_safe_read(mysql, NULL) == packet_error) { if (mysql->net.last_errno == CR_SERVER_LOST) set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate, ER_CLIENT(CR_SERVER_LOST_EXTENDED), "reading final connect information", errno); return STATE_MACHINE_FAILED; } } ctx->state_function = authsm_finish_auth; return STATE_MACHINE_CONTINUE; } /* Final cleanup */ static mysql_state_machine_status authsm_finish_auth(mysql_async_auth *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; /* net->read_pos[0] should always be 0 here if the server implements the protocol correctly */ ctx->res = (mysql->net.read_pos[0] != 0); MYSQL_TRACE(AUTHENTICATED, mysql, ()); return ctx->res ? STATE_MACHINE_FAILED : STATE_MACHINE_DONE; } /** set some default attributes */ static int set_connect_attributes(MYSQL *mysql, char *buff, size_t buf_len) { int rc = 0; /* Clean up any values set by the client code. We want these options as consistent as possible */ rc += mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_client_name"); rc += mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_os"); rc += mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_platform"); rc += mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_pid"); rc += mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_thread"); rc += mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_client_version"); /* Now let's set up some values */ rc += mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD, "_client_name", "libmysql"); rc += mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD, "_client_version", PACKAGE_VERSION); rc += mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD, "_os", SYSTEM_TYPE); rc += mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD, "_platform", MACHINE_TYPE); #ifdef _WIN32 snprintf(buff, buf_len, "%lu", (ulong)GetCurrentProcessId()); #else snprintf(buff, buf_len, "%lu", (ulong)getpid()); #endif rc += mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD, "_pid", buff); #ifdef _WIN32 snprintf(buff, buf_len, "%lu", (ulong)GetCurrentThreadId()); rc += mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD, "_thread", buff); #endif return rc > 0 ? 1 : 0; } MYSQL *STDCALL mysql_real_connect(MYSQL *mysql, const char *host, const char *user, const char *passwd, const char *db, uint port, const char *unix_socket, ulong client_flag) { DBUG_TRACE; mysql_state_machine_status status; mysql_async_connect ctx; memset(&ctx, 0, sizeof(ctx)); ctx.mysql = mysql; ctx.host = host; ctx.port = port; ctx.db = db; ctx.user = user; ctx.passwd = passwd; ctx.unix_socket = unix_socket; ctx.client_flag = client_flag; ctx.state_function = csm_begin_connect; ctx.ssl_state = SSL_NONE; do { status = ctx.state_function(&ctx); } while (status != STATE_MACHINE_FAILED && status != STATE_MACHINE_DONE); if (status == STATE_MACHINE_DONE) { DBUG_PRINT("exit", ("Mysql handler: %p", mysql)); return mysql; } DBUG_PRINT("error", ("message: %u/%s (%s)", mysql->net.last_errno, mysql->net.sqlstate, mysql->net.last_error)); { /* Free alloced memory */ end_server(mysql); mysql_close_free(mysql); if (!(client_flag & CLIENT_REMEMBER_OPTIONS)) mysql_close_free_options(mysql); if (ctx.scramble_buffer_allocated) my_free(ctx.scramble_buffer); } return 0; } /** This API attempts to initialize all the context needed to make an asynchronous connection followed by establishing a connection to MySQL database. If this API returns NET_ASYNC_COMPLETE then connection is established else call this API from the client application until the status returned is NET_ASYNC_COMPLETE. @param[in] mysql connection handle @param[in] host host name or IP address @param[in] user login ID used to connect to host @param[in] passwd password for this login ID @param[in] db default database to be set after connection @param[in] port port number to use for connection @param[in] unix_socket socket file to use for connection @param[in] client_flag flag to indidcate what client can handle @retval NET_ASYNC_COMPLETE Success. @retval NET_ASYNC_ERROR Error. */ net_async_status STDCALL mysql_real_connect_nonblocking( MYSQL *mysql, const char *host, const char *user, const char *passwd, const char *db, uint port, const char *unix_socket, ulong client_flag) { DBUG_TRACE; mysql_state_machine_status status; mysql_async_connect *ctx = ASYNC_DATA(mysql)->connect_context; if (client_flag & MYSQL_OPT_COMPRESS) { set_mysql_error(mysql, CR_COMPRESSION_NOT_SUPPORTED, unknown_sqlstate); return NET_ASYNC_ERROR; } if (!ctx) { ctx = static_cast( my_malloc(key_memory_MYSQL, sizeof(*ctx), MYF(MY_WME | MY_ZEROFILL))); if (!ctx) return NET_ASYNC_ERROR; ctx->mysql = mysql; ctx->host = host; ctx->port = port; ctx->db = db; ctx->user = user; ctx->passwd = passwd; ctx->unix_socket = unix_socket; ctx->client_flag = client_flag; ctx->non_blocking = true; ctx->state_function = csm_begin_connect; ctx->ssl_state = SSL_NONE; ASYNC_DATA(mysql)->connect_context = ctx; ASYNC_DATA(mysql)->async_op_status = ASYNC_OP_CONNECT; } do { status = ctx->state_function(ctx); } while (status != STATE_MACHINE_FAILED && status != STATE_MACHINE_DONE); if (status == STATE_MACHINE_DONE) { my_free(ASYNC_DATA(mysql)->connect_context); ASYNC_DATA(mysql)->connect_context = NULL; ASYNC_DATA(mysql)->async_op_status = ASYNC_OP_UNSET; return NET_ASYNC_COMPLETE; } { DBUG_PRINT("error", ("message: %u/%s (%s)", mysql->net.last_errno, mysql->net.sqlstate, mysql->net.last_error)); /* Free alloced memory */ end_server(mysql); mysql_close_free(mysql); if (!(ctx->client_flag & CLIENT_REMEMBER_OPTIONS)) mysql_close_free_options(mysql); if (ctx->scramble_buffer_allocated) { my_free(ctx->scramble_buffer); ctx->scramble_buffer = nullptr; } my_free(ctx); return NET_ASYNC_ERROR; } } /** Begin the connection to the server, including any DNS resolution necessary, socket configuration, etc. */ static mysql_state_machine_status csm_begin_connect(mysql_async_connect *ctx) { MYSQL *mysql = ctx->mysql; const char *host = ctx->host; const char *user = ctx->user; const char *passwd = ctx->passwd; const char *db = ctx->db; uint port = ctx->port; const char *unix_socket = ctx->unix_socket; ulong client_flag = ctx->client_flag; DBUG_TRACE; DBUG_PRINT("enter", ("host: %s db: %s user: %s (client)", host ? host : "(Null)", db ? db : "(Null)", user ? user : "(Null)")); NET *net = &mysql->net; #ifdef _WIN32 HANDLE hPipe = INVALID_HANDLE_VALUE; #endif #ifdef HAVE_SYS_UN_H struct sockaddr_un UNIXaddr; #endif /* Test whether we're already connected */ if (net->vio) { set_mysql_error(mysql, CR_ALREADY_CONNECTED, unknown_sqlstate); return STATE_MACHINE_FAILED; } if (set_connect_attributes(mysql, ctx->buff, sizeof(ctx->buff))) return STATE_MACHINE_FAILED; mysql->methods = &client_methods; net->vio = 0; /* If something goes wrong */ mysql->client_flag = 0; /* For handshake */ /* use default options */ if (mysql->options.my_cnf_file || mysql->options.my_cnf_group) { mysql_read_default_options( &mysql->options, (mysql->options.my_cnf_file ? mysql->options.my_cnf_file : "my"), mysql->options.my_cnf_group); my_free(mysql->options.my_cnf_file); my_free(mysql->options.my_cnf_group); mysql->options.my_cnf_file = mysql->options.my_cnf_group = 0; } /* Some empty-string-tests are done because of ODBC */ if (!host || !host[0]) host = mysql->options.host; if (!user || !user[0]) { user = mysql->options.user; if (!user) user = ""; } if (!passwd) { passwd = mysql->options.password; #if !defined(MYSQL_SERVER) if (!passwd) passwd = getenv("MYSQL_PWD"); /* get it from environment */ #endif if (!passwd) passwd = ""; } if (!db || !db[0]) db = mysql->options.db; if (!port) port = mysql->options.port; if (!unix_socket) unix_socket = mysql->options.unix_socket; mysql->server_status = SERVER_STATUS_AUTOCOMMIT; DBUG_PRINT("info", ("Connecting")); MYSQL_TRACE_STAGE(mysql, CONNECTING); MYSQL_TRACE(CONNECTING, mysql, ()); #if defined(_WIN32) if ((!mysql->options.protocol || mysql->options.protocol == MYSQL_PROTOCOL_MEMORY) && (!host || !strcmp(host, LOCAL_HOST))) { HANDLE handle_map; DBUG_PRINT("info", ("Using shared memory")); handle_map = create_shared_memory(mysql, net, get_win32_connect_timeout(mysql)); if (handle_map == INVALID_HANDLE_VALUE) { DBUG_PRINT("error", ("host: '%s' socket: '%s' shared memory: %s have_tcpip: %d", host ? host : "", unix_socket ? unix_socket : "", mysql->options.shared_memory_base_name, (int)have_tcpip)); if (mysql->options.protocol == MYSQL_PROTOCOL_MEMORY) return STATE_MACHINE_FAILED; /* Try also with PIPE or TCP/IP. Clear the error from create_shared_memory(). */ net_clear_error(net); } else { mysql->options.protocol = MYSQL_PROTOCOL_MEMORY; unix_socket = 0; host = mysql->options.shared_memory_base_name; snprintf(ctx->host_info = ctx->buff, sizeof(ctx->buff) - 1, ER_CLIENT(CR_SHARED_MEMORY_CONNECTION), host); } } #endif /* _WIN32 */ #if defined(HAVE_SYS_UN_H) if (!net->vio && (!mysql->options.protocol || mysql->options.protocol == MYSQL_PROTOCOL_SOCKET) && (unix_socket || mysql_unix_port) && (!host || !strcmp(host, LOCAL_HOST))) { my_socket sock = socket(AF_UNIX, SOCK_STREAM, 0); DBUG_PRINT("info", ("Using socket")); if (sock == SOCKET_ERROR) { set_mysql_extended_error(mysql, CR_SOCKET_CREATE_ERROR, unknown_sqlstate, ER_CLIENT(CR_SOCKET_CREATE_ERROR), socket_errno); return STATE_MACHINE_FAILED; } net->vio = vio_new(sock, VIO_TYPE_SOCKET, VIO_LOCALHOST | VIO_BUFFERED_READ); if (!net->vio) { DBUG_PRINT("error", ("Unknow protocol %d ", mysql->options.protocol)); set_mysql_error(mysql, CR_CONN_UNKNOW_PROTOCOL, unknown_sqlstate); closesocket(sock); return STATE_MACHINE_FAILED; } if (ctx->non_blocking) vio_set_blocking_flag(net->vio, !ctx->non_blocking); host = LOCAL_HOST; if (!unix_socket) unix_socket = mysql_unix_port; ctx->host_info = const_cast(ER_CLIENT(CR_LOCALHOST_CONNECTION)); DBUG_PRINT("info", ("Using UNIX sock '%s'", unix_socket)); memset(&UNIXaddr, 0, sizeof(UNIXaddr)); UNIXaddr.sun_family = AF_UNIX; strmake(UNIXaddr.sun_path, unix_socket, sizeof(UNIXaddr.sun_path) - 1); if (mysql->options.extension && mysql->options.extension->retry_count) my_net_set_retry_count(net, mysql->options.extension->retry_count); if (vio_socket_connect(net->vio, (struct sockaddr *)&UNIXaddr, sizeof(UNIXaddr), ctx->non_blocking, get_vio_connect_timeout(mysql))) { DBUG_PRINT("error", ("Got error %d on connect to local server", socket_errno)); set_mysql_extended_error(mysql, CR_CONNECTION_ERROR, unknown_sqlstate, ER_CLIENT(CR_CONNECTION_ERROR), unix_socket, socket_errno); vio_delete(net->vio); net->vio = 0; return STATE_MACHINE_FAILED; } mysql->options.protocol = MYSQL_PROTOCOL_SOCKET; } #elif defined(_WIN32) if (!net->vio && (mysql->options.protocol == MYSQL_PROTOCOL_PIPE || (host && !strcmp(host, LOCAL_HOST_NAMEDPIPE)) || (!have_tcpip && (unix_socket || !host && is_NT())))) { hPipe = create_named_pipe(mysql, get_win32_connect_timeout(mysql), &host, &unix_socket); if (hPipe == INVALID_HANDLE_VALUE) { DBUG_PRINT( "error", ("host: '%s' socket: '%s' have_tcpip: %d", host ? host : "", unix_socket ? unix_socket : "", (int)have_tcpip)); if (mysql->options.protocol == MYSQL_PROTOCOL_PIPE || (host && !strcmp(host, LOCAL_HOST_NAMEDPIPE)) || (unix_socket && !strcmp(unix_socket, MYSQL_NAMEDPIPE))) return STATE_MACHINE_FAILED; /* Try also with TCP/IP */ } else { net->vio = vio_new_win32pipe(hPipe); snprintf(ctx->host_info = ctx->buff, sizeof(ctx->buff) - 1, ER_CLIENT(CR_NAMEDPIPE_CONNECTION), unix_socket); } } #endif DBUG_PRINT("info", ("net->vio: %p protocol: %d", net->vio, mysql->options.protocol)); if (!net->vio && (!mysql->options.protocol || mysql->options.protocol == MYSQL_PROTOCOL_TCP)) { struct addrinfo *res_lst, *client_bind_ai_lst = NULL, hints, *t_res; char port_buf[NI_MAXSERV]; my_socket sock = SOCKET_ERROR; int gai_errno, saved_error = 0, status = -1, bind_result = 0; uint flags = VIO_BUFFERED_READ; unix_socket = 0; /* This is not used */ if (!port) port = mysql_port; if (!host) host = LOCAL_HOST; snprintf(ctx->host_info = ctx->buff, sizeof(ctx->buff) - 1, ER_CLIENT(CR_TCP_CONNECTION), host); DBUG_PRINT("info", ("Server name: '%s'. TCP sock: %d", host, port)); memset(&hints, 0, sizeof(hints)); hints.ai_socktype = SOCK_STREAM; hints.ai_protocol = IPPROTO_TCP; hints.ai_family = AF_UNSPEC; DBUG_PRINT("info", ("IPV6 getaddrinfo %s", host)); snprintf(port_buf, NI_MAXSERV, "%d", port); gai_errno = getaddrinfo(host, port_buf, &hints, &res_lst); DBUG_EXECUTE_IF("vio_client_use_localhost", { DBUG_ASSERT(strlen(host) == 255); gai_errno = getaddrinfo(LOCAL_HOST, port_buf, &hints, &res_lst); }); if (gai_errno != 0) { /* For DBUG we are keeping the right message but for client we default to historical error message. */ DBUG_PRINT("info", ("IPV6 getaddrinfo error %d", gai_errno)); set_mysql_extended_error(mysql, CR_UNKNOWN_HOST, unknown_sqlstate, ER_CLIENT(CR_UNKNOWN_HOST), host, errno); return STATE_MACHINE_FAILED; } /* Get address info for client bind name if it is provided */ if (mysql->options.bind_address) { int bind_gai_errno = 0; DBUG_PRINT("info", ("Resolving addresses for client bind: '%s'", mysql->options.bind_address)); /* Lookup address info for name */ bind_gai_errno = getaddrinfo(mysql->options.bind_address, 0, &hints, &client_bind_ai_lst); if (bind_gai_errno) { DBUG_PRINT("info", ("client bind getaddrinfo error %d", bind_gai_errno)); set_mysql_extended_error(mysql, CR_UNKNOWN_HOST, unknown_sqlstate, ER_CLIENT(CR_UNKNOWN_HOST), mysql->options.bind_address, bind_gai_errno); freeaddrinfo(res_lst); return STATE_MACHINE_FAILED; } DBUG_PRINT("info", (" got address info for client bind name")); } /* A hostname might map to multiple IP addresses (IPv4/IPv6). Go over the list of IP addresses until a successful connection can be established. For each IP address, attempt to bind the socket to each client address for the client-side bind hostname until the bind is successful. */ DBUG_PRINT("info", ("Try connect on all addresses for host.")); for (t_res = res_lst; t_res; t_res = t_res->ai_next) { DBUG_PRINT("info", ("Create socket, family: %d type: %d proto: %d", t_res->ai_family, t_res->ai_socktype, t_res->ai_protocol)); sock = socket(t_res->ai_family, t_res->ai_socktype, t_res->ai_protocol); if (sock == SOCKET_ERROR) { DBUG_PRINT("info", ("Socket created was invalid")); /* Try next address if there is one */ saved_error = socket_errno; continue; } if (client_bind_ai_lst) { struct addrinfo *curr_bind_ai = NULL; DBUG_PRINT("info", ("Attempting to bind socket to bind address(es)")); /* We'll attempt to bind to each of the addresses returned, until we find one that works. If none works, we'll try the next destination host address (if any) */ curr_bind_ai = client_bind_ai_lst; while (curr_bind_ai != NULL) { /* Attempt to bind the socket to the given address */ bind_result = bind(sock, curr_bind_ai->ai_addr, static_cast(curr_bind_ai->ai_addrlen)); if (!bind_result) break; /* Success */ DBUG_PRINT("info", ("bind failed, attempting another bind address")); /* Problem with the bind, move to next address if present */ curr_bind_ai = curr_bind_ai->ai_next; } if (bind_result) { /* Could not bind to any client-side address with this destination Try the next destination address (if any) */ DBUG_PRINT("info", ("All bind attempts with this address failed")); saved_error = socket_errno; closesocket(sock); continue; } DBUG_PRINT("info", ("Successfully bound client side of socket")); } /* Create a new Vio object to abstract the socket. */ if (!net->vio) { if (!(net->vio = vio_new(sock, VIO_TYPE_TCPIP, flags))) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); closesocket(sock); freeaddrinfo(res_lst); if (client_bind_ai_lst) freeaddrinfo(client_bind_ai_lst); return STATE_MACHINE_FAILED; } } /* Just reinitialize if one is already allocated. */ else if (vio_reset(net->vio, VIO_TYPE_TCPIP, sock, NULL, flags)) { set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate); closesocket(sock); freeaddrinfo(res_lst); if (client_bind_ai_lst) freeaddrinfo(client_bind_ai_lst); return STATE_MACHINE_FAILED; } if (ctx->non_blocking) vio_set_blocking_flag(net->vio, !ctx->non_blocking); DBUG_PRINT("info", ("Connect socket")); if (mysql->options.extension && mysql->options.extension->retry_count) my_net_set_retry_count(net, mysql->options.extension->retry_count); status = vio_socket_connect( net->vio, t_res->ai_addr, (socklen_t)t_res->ai_addrlen, ctx->non_blocking, get_vio_connect_timeout(mysql)); /* Here we rely on vio_socket_connect() to return success only if the connect attempt was really successful. Otherwise we would stop trying another address, believing we were successful. */ if (!status) break; /* Save either the socket error status or the error code of the failed vio_connection operation. It is necessary to avoid having it overwritten by later operations. */ saved_error = socket_errno; DBUG_PRINT("info", ("No success, try next address.")); } DBUG_PRINT("info", ("End of connect attempts, sock: %d status: %d error: %d", sock, status, saved_error)); freeaddrinfo(res_lst); if (client_bind_ai_lst) freeaddrinfo(client_bind_ai_lst); if (sock == SOCKET_ERROR) { set_mysql_extended_error(mysql, CR_IPSOCK_ERROR, unknown_sqlstate, ER_CLIENT(CR_IPSOCK_ERROR), saved_error); return STATE_MACHINE_FAILED; } if (status) { DBUG_PRINT("error", ("Got error %d on connect to '%s'", saved_error, host)); set_mysql_extended_error(mysql, CR_CONN_HOST_ERROR, unknown_sqlstate, ER_CLIENT(CR_CONN_HOST_ERROR), host, saved_error); return STATE_MACHINE_FAILED; } } ctx->state_function = csm_complete_connect; ctx->host = host; ctx->user = user; ctx->passwd = passwd; ctx->db = db; ctx->port = port; ctx->unix_socket = unix_socket; ctx->client_flag = client_flag; return STATE_MACHINE_CONTINUE; } /** Complete the connection itself, setting options on the now-connected socket. */ static mysql_state_machine_status csm_complete_connect( mysql_async_connect *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; NET *net = &mysql->net; DBUG_PRINT("info", ("net->vio: %p", net->vio)); if (!net->vio) { DBUG_PRINT("error", ("Unknow protocol %d ", mysql->options.protocol)); set_mysql_error(mysql, CR_CONN_UNKNOW_PROTOCOL, unknown_sqlstate); return STATE_MACHINE_FAILED; } if (my_net_init(net, net->vio)) { vio_delete(net->vio); net->vio = 0; set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return STATE_MACHINE_FAILED; } vio_keepalive(net->vio, true); /* If user set read_timeout, let it override the default */ if (mysql->options.read_timeout) my_net_set_read_timeout(net, mysql->options.read_timeout); /* If user set write_timeout, let it override the default */ if (mysql->options.write_timeout) my_net_set_write_timeout(net, mysql->options.write_timeout); /* If user set retry_count, let it override the default */ if (mysql->options.extension && mysql->options.extension->retry_count) my_net_set_retry_count(net, mysql->options.extension->retry_count); if (mysql->options.max_allowed_packet) net->max_packet_size = mysql->options.max_allowed_packet; MYSQL_TRACE(CONNECTED, mysql, ()); MYSQL_TRACE_STAGE(mysql, WAIT_FOR_INIT_PACKET); /* Get version info */ mysql->protocol_version = PROTOCOL_VERSION; /* Assume this */ if (mysql->options.connect_timeout && (vio_io_wait(net->vio, VIO_IO_EVENT_READ, get_vio_connect_timeout(mysql)) < 1)) { set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate, ER_CLIENT(CR_SERVER_LOST_EXTENDED), "waiting for initial communication packet", socket_errno); return STATE_MACHINE_FAILED; } ctx->state_function = csm_read_greeting; return STATE_MACHINE_CONTINUE; } /** Read the greeting from the server that is read the first packet */ static mysql_state_machine_status csm_read_greeting(mysql_async_connect *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; DBUG_PRINT("info", ("Read first packet.")); if (!ctx->non_blocking) ctx->pkt_length = cli_safe_read(mysql, NULL); else { if (cli_safe_read_nonblocking(mysql, NULL, &ctx->pkt_length) == NET_ASYNC_NOT_READY) { return STATE_MACHINE_WOULD_BLOCK; } } if (ctx->pkt_length == packet_error) { if (mysql->net.last_errno == CR_SERVER_LOST) set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate, ER_CLIENT(CR_SERVER_LOST_EXTENDED), "reading initial communication packet", socket_errno); return STATE_MACHINE_FAILED; } ctx->state_function = csm_parse_handshake; return STATE_MACHINE_CONTINUE; } /** Parse the handshake from the server. */ static mysql_state_machine_status csm_parse_handshake( mysql_async_connect *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; NET *net = &mysql->net; int pkt_length = ctx->pkt_length; int pkt_scramble_len = 0; char *end, *server_version_end, *pkt_end; pkt_end = (char *)net->read_pos + pkt_length; /* Check if version of protocol matches current one */ mysql->protocol_version = net->read_pos[0]; DBUG_DUMP("packet", (uchar *)net->read_pos, 10); DBUG_PRINT("info", ("mysql protocol version %d, server=%d", PROTOCOL_VERSION, mysql->protocol_version)); if (mysql->protocol_version != PROTOCOL_VERSION) { set_mysql_extended_error(mysql, CR_VERSION_ERROR, unknown_sqlstate, ER_CLIENT(CR_VERSION_ERROR), mysql->protocol_version, PROTOCOL_VERSION); return STATE_MACHINE_FAILED; } server_version_end = end = strend((char *)net->read_pos + 1); mysql->thread_id = uint4korr((uchar *)end + 1); end += 5; /* Scramble is split into two parts because old clients do not understand long scrambles; here goes the first part. */ ctx->scramble_data = end; ctx->scramble_data_len = AUTH_PLUGIN_DATA_PART_1_LENGTH + 1; ctx->scramble_plugin = NULL; end += ctx->scramble_data_len; if (pkt_end >= end + 1) mysql->server_capabilities = uint2korr((uchar *)end); if (pkt_end >= end + 18) { /* New protocol with 16 bytes to describe server characteristics */ mysql->server_language = end[2]; mysql->server_status = uint2korr((uchar *)end + 3); mysql->server_capabilities |= uint2korr((uchar *)end + 5) << 16; pkt_scramble_len = end[7]; if (pkt_scramble_len < 0) { set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); /* purecov: inspected */ return STATE_MACHINE_FAILED; } } end += 18; if (mysql_init_character_set(mysql)) return STATE_MACHINE_FAILED; /* Save connection information */ if (!my_multi_malloc( key_memory_MYSQL, MYF(0), &mysql->host_info, (uint)strlen(ctx->host_info) + 1, &mysql->host, (uint)strlen(ctx->host) + 1, &mysql->unix_socket, ctx->unix_socket ? (uint)strlen(ctx->unix_socket) + 1 : (uint)1, &mysql->server_version, (uint)(server_version_end - (char *)net->read_pos + 1), NullS) || !(mysql->user = my_strdup(key_memory_MYSQL, ctx->user, MYF(0))) || !(mysql->passwd = my_strdup(key_memory_MYSQL, ctx->passwd, MYF(0)))) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return STATE_MACHINE_FAILED; } my_stpcpy(mysql->host_info, ctx->host_info); my_stpcpy(mysql->host, ctx->host); if (ctx->unix_socket) my_stpcpy(mysql->unix_socket, ctx->unix_socket); else mysql->unix_socket = 0; my_stpcpy(mysql->server_version, (char *)net->read_pos + 1); mysql->port = ctx->port; if (pkt_end >= end + SCRAMBLE_LENGTH - AUTH_PLUGIN_DATA_PART_1_LENGTH + 1) { /* move the first scramble part - directly in the NET buffer - to get a full continuous scramble. We've read all the header, and can overwrite it now. */ memmove(end - AUTH_PLUGIN_DATA_PART_1_LENGTH, ctx->scramble_data, AUTH_PLUGIN_DATA_PART_1_LENGTH); ctx->scramble_data = end - AUTH_PLUGIN_DATA_PART_1_LENGTH; if (mysql->server_capabilities & CLIENT_PLUGIN_AUTH) { ctx->scramble_data_len = pkt_scramble_len; ctx->scramble_plugin = ctx->scramble_data + ctx->scramble_data_len; if (ctx->scramble_data + ctx->scramble_data_len > pkt_end) ctx->scramble_data_len = (int)(pkt_end - ctx->scramble_data); } else { ctx->scramble_data_len = (int)(pkt_end - ctx->scramble_data); ctx->scramble_plugin = caching_sha2_password_plugin_name; } } else { set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); return STATE_MACHINE_FAILED; } ctx->state_function = csm_establish_ssl; return STATE_MACHINE_CONTINUE; } /** Establish SSL if needed. */ static mysql_state_machine_status csm_establish_ssl(mysql_async_connect *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; /* This check happens to work for both sync and async. */ if (ctx->ssl_state == SSL_NONE) { MYSQL_TRACE(INIT_PACKET_RECEIVED, mysql, (ctx->pkt_length, mysql->net.read_pos)); MYSQL_TRACE_STAGE(mysql, AUTHENTICATE); #if defined(_WIN32) if ((mysql->options.extension && mysql->options.extension->ssl_mode <= SSL_MODE_PREFERRED) && (mysql->options.protocol == MYSQL_PROTOCOL_MEMORY || mysql->options.protocol == MYSQL_PROTOCOL_PIPE)) { mysql->options.extension->ssl_mode = SSL_MODE_DISABLED; } #endif /* try and bring up SSL if possible */ cli_calculate_client_flag(mysql, ctx->db, ctx->client_flag); /* Allocate separate buffer for scramble data if we are going to attempt TLS connection. This would prevent a possible overwrite through my_net_write. */ if (ctx->scramble_data_len && mysql->options.extension && mysql->options.extension->ssl_mode != SSL_MODE_DISABLED) { if (!(ctx->scramble_buffer = (char *)my_malloc(key_memory_MYSQL_HANDSHAKE, ctx->scramble_data_len, MYF(MY_WME)))) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return STATE_MACHINE_FAILED; } ctx->scramble_buffer_allocated = true; memcpy(ctx->scramble_buffer, ctx->scramble_data, ctx->scramble_data_len); } else { ctx->scramble_buffer = ctx->scramble_data; } } if (ctx->non_blocking) { int ret; if (cli_establish_ssl_nonblocking(mysql, &ret) == NET_ASYNC_NOT_READY) { return STATE_MACHINE_WOULD_BLOCK; } if (ret) { return STATE_MACHINE_FAILED; } } else { if (cli_establish_ssl(mysql)) { return STATE_MACHINE_FAILED; } } ctx->state_function = csm_authenticate; return STATE_MACHINE_CONTINUE; } /** Invoke the authentication client plugin API to send the authentication data to the server */ static mysql_state_machine_status csm_authenticate(mysql_async_connect *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; if (ctx->non_blocking) { mysql_state_machine_status status = run_plugin_auth_nonblocking( ctx->mysql, ctx->scramble_data, ctx->scramble_data_len, ctx->scramble_plugin, ctx->db); if (status != STATE_MACHINE_DONE) { return status; } } else { if (run_plugin_auth(mysql, ctx->scramble_buffer, ctx->scramble_data_len, ctx->scramble_plugin, ctx->db)) { return STATE_MACHINE_FAILED; } } if (ctx->scramble_buffer_allocated) { ctx->scramble_buffer_allocated = false; my_free(ctx->scramble_buffer); ctx->scramble_buffer = nullptr; } ctx->state_function = csm_prep_select_database; return STATE_MACHINE_CONTINUE; } /** Authenticated, set intial database if specified */ static mysql_state_machine_status csm_prep_select_database( mysql_async_connect *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; NET *net = &mysql->net; MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); /* We will use compression */ if ((mysql->client_flag & CLIENT_COMPRESS) || (mysql->client_flag & CLIENT_ZSTD_COMPRESSION_ALGORITHM)) { net->compress = 1; uint compress_level; enum enum_compression_algorithm algorithm = mysql->client_flag & CLIENT_COMPRESS ? MYSQL_ZLIB : MYSQL_ZSTD; if (mysql->options.extension && mysql->options.extension->zstd_compression_level) compress_level = mysql->options.extension->zstd_compression_level; else compress_level = mysql_default_compression_level(algorithm); #ifndef MYSQL_SERVER NET_EXTENSION *ext = NET_EXTENSION_PTR(net); DBUG_ASSERT(ext != nullptr); mysql_compress_context_init(&ext->compress_ctx, algorithm, compress_level); #else NET_SERVER *server_ext = static_cast(net->extension); if (server_ext == nullptr) { server_ext = static_cast(MYSQL_EXTENSION_PTR(mysql)->server_extn); net->extension = server_ext; } DBUG_ASSERT(server_ext != nullptr); mysql_compress_context_init(&server_ext->compress_ctx, algorithm, compress_level); #endif } #ifdef CHECK_LICENSE if (check_license(mysql)) return STATE_MACHINE_FAILED; #endif #ifdef MYSQL_SERVER return STATE_MACHINE_DONE; #else ctx->state_function = csm_prep_init_commands; #endif return STATE_MACHINE_CONTINUE; } #ifndef MYSQL_SERVER /** Prepare to send a sequence of init commands. */ static mysql_state_machine_status csm_prep_init_commands( mysql_async_connect *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; if (!mysql->options.init_commands) { return STATE_MACHINE_DONE; } ctx->saved_reconnect = mysql->reconnect; mysql->reconnect = 0; ctx->current_init_command = mysql->options.init_commands->begin(); ctx->state_function = csm_send_one_init_command; return STATE_MACHINE_CONTINUE; } /** Send an init command. This is called once per init command until they've all been run (or a failure occurs). */ static mysql_state_machine_status csm_send_one_init_command( mysql_async_connect *ctx) { DBUG_TRACE; MYSQL *mysql = ctx->mysql; if (mysql_real_query(mysql, *ctx->current_init_command, (ulong)strlen(*ctx->current_init_command))) return STATE_MACHINE_FAILED; int status; do { if (mysql->fields) { MYSQL_RES *res; if (!(res = cli_use_result(mysql))) return STATE_MACHINE_FAILED; mysql_free_result(res); } if ((status = mysql_next_result(mysql)) > 0) return STATE_MACHINE_FAILED; } while (status == 0); ++ctx->current_init_command; if (ctx->current_init_command < mysql->options.init_commands->end()) { return STATE_MACHINE_CONTINUE; } mysql->reconnect = ctx->saved_reconnect; DBUG_PRINT("exit", ("Mysql handler: %p", mysql)); return STATE_MACHINE_DONE; } #endif bool mysql_reconnect(MYSQL *mysql) { MYSQL tmp_mysql; DBUG_TRACE; DBUG_ASSERT(mysql); DBUG_PRINT("enter", ("mysql->reconnect: %d", mysql->reconnect)); if (!mysql->reconnect || (mysql->server_status & SERVER_STATUS_IN_TRANS) || !mysql->host_info) { /* Allow reconnect next time */ mysql->server_status &= ~SERVER_STATUS_IN_TRANS; set_mysql_error(mysql, CR_SERVER_GONE_ERROR, unknown_sqlstate); return 1; } mysql_init(&tmp_mysql); mysql_close_free_options(&tmp_mysql); tmp_mysql.options = mysql->options; tmp_mysql.options.my_cnf_file = tmp_mysql.options.my_cnf_group = 0; #ifdef MYSQL_SERVER MYSQL_EXTENSION_PTR(&tmp_mysql)->server_extn = MYSQL_EXTENSION_PTR(mysql)->server_extn; MYSQL_EXTENSION_PTR(mysql)->server_extn = nullptr; #endif if (!mysql_real_connect(&tmp_mysql, mysql->host, mysql->user, mysql->passwd, mysql->db, mysql->port, mysql->unix_socket, mysql->client_flag | CLIENT_REMEMBER_OPTIONS)) { memset(&tmp_mysql.options, 0, sizeof(tmp_mysql.options)); mysql_close(&tmp_mysql); mysql->net.last_errno = tmp_mysql.net.last_errno; my_stpcpy(mysql->net.last_error, tmp_mysql.net.last_error); my_stpcpy(mysql->net.sqlstate, tmp_mysql.net.sqlstate); return 1; } if (mysql_set_character_set(&tmp_mysql, mysql->charset->csname)) { DBUG_PRINT("error", ("mysql_set_character_set() failed")); memset(&tmp_mysql.options, 0, sizeof(tmp_mysql.options)); mysql_close(&tmp_mysql); mysql->net.last_errno = tmp_mysql.net.last_errno; my_stpcpy(mysql->net.last_error, tmp_mysql.net.last_error); my_stpcpy(mysql->net.sqlstate, tmp_mysql.net.sqlstate); return 1; } DBUG_PRINT("info", ("reconnect succeded")); tmp_mysql.reconnect = 1; tmp_mysql.free_me = mysql->free_me; /* Move prepared statements (if any) over to the new mysql object */ tmp_mysql.stmts = mysql->stmts; mysql->stmts = 0; /* Don't free options as these are now used in tmp_mysql */ memset(&mysql->options, 0, sizeof(mysql->options)); mysql->free_me = 0; mysql_close(mysql); *mysql = std::move(tmp_mysql); net_clear(&mysql->net, 1); mysql->affected_rows = ~(my_ulonglong)0; return 0; } /** Open a new replication stream. Compose and send COM_BINLOG_DUMP[_GTID] command using information in the MYSQL_RPL structure. Caller must set the following MYSQL_RPL's slots: file_name_length, file_name, start_positions, server_id, flags and in case of MYSQL_RPL_GTID: gtid_set_size, gtid_set or fix_gtid_set/fix_gtid_set_arg which is used to compose command packet. Note: we treat NULL rpl->file_name as an empty string. If rpl->file_name_length is 0, strlen(rpl->file_name) will be called to set it. If rpl->fix_gtid_set is not NULL it will be called to fill packet gtid set data (rpl->gtid_set is ignored). @param mysql Connection handle. @param rpl Replication stream information. @retval -1 Error. @retval 0 Success. */ int STDCALL mysql_binlog_open(MYSQL *mysql, MYSQL_RPL *rpl) { DBUG_TRACE; DBUG_ASSERT(mysql); DBUG_ASSERT(rpl); enum enum_server_command command; uchar *command_buffer = NULL; size_t command_size = 0; /* No need to check mysql->net.vio here as it'll be checked in the simple_command(). */ if (!rpl->file_name) { rpl->file_name = const_cast(""); rpl->file_name_length = 0; } else if (rpl->file_name_length == 0) rpl->file_name_length = strlen(rpl->file_name); if (rpl->file_name_length > UINT_MAX) { set_mysql_error(mysql, CR_FILE_NAME_TOO_LONG, unknown_sqlstate); return -1; } if (rpl->flags & MYSQL_RPL_GTID) { command = COM_BINLOG_DUMP_GTID; #define GTID_ENCODED_DATA_SIZE 8 size_t alloc_size = rpl->file_name_length + ::BINLOG_FLAGS_INFO_SIZE + ::BINLOG_SERVER_ID_INFO_SIZE + ::BINLOG_NAME_SIZE_INFO_SIZE + ::BINLOG_POS_INFO_SIZE + ::BINLOG_DATA_SIZE_INFO_SIZE + (rpl->gtid_set_encoded_size ? rpl->gtid_set_encoded_size : GTID_ENCODED_DATA_SIZE) + 1; if (!(command_buffer = (uchar *)my_malloc(PSI_NOT_INSTRUMENTED, alloc_size, MYF(MY_WME)))) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return -1; } uchar *ptr = command_buffer; int2store(ptr, rpl->flags); // Note: we use low 16 bits ptr += ::BINLOG_FLAGS_INFO_SIZE; int4store(ptr, rpl->server_id); ptr += ::BINLOG_SERVER_ID_INFO_SIZE; int4store(ptr, static_cast(rpl->file_name_length)); ptr += ::BINLOG_NAME_SIZE_INFO_SIZE; memcpy(ptr, rpl->file_name, rpl->file_name_length); ptr += rpl->file_name_length; int8store(ptr, rpl->start_position); ptr += ::BINLOG_POS_INFO_SIZE; if (rpl->gtid_set_encoded_size) { int4store(ptr, static_cast(rpl->gtid_set_encoded_size)); ptr += ::BINLOG_DATA_SIZE_INFO_SIZE; if (rpl->fix_gtid_set) rpl->fix_gtid_set(rpl, ptr); else memcpy(ptr, rpl->gtid_set_arg, rpl->gtid_set_encoded_size); ptr += rpl->gtid_set_encoded_size; } else { /* No GTID set data, store 0 as its length. */ int4store(ptr, static_cast(GTID_ENCODED_DATA_SIZE)); ptr += ::BINLOG_DATA_SIZE_INFO_SIZE; int8store(ptr, static_cast(0)); ptr += GTID_ENCODED_DATA_SIZE; } command_size = ptr - command_buffer; DBUG_ASSERT(command_size == (alloc_size - 1)); } else { command = COM_BINLOG_DUMP; size_t alloc_size = rpl->file_name_length + ::BINLOG_POS_OLD_INFO_SIZE + ::BINLOG_FLAGS_INFO_SIZE + ::BINLOG_SERVER_ID_INFO_SIZE + 1; if (!(command_buffer = (uchar *)my_malloc(PSI_NOT_INSTRUMENTED, alloc_size, MYF(MY_WME)))) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return -1; } uchar *ptr = command_buffer; /* COM_BINLOG_DUMP accepts only 4 bytes for the position, so we are forced to cast to uint32. */ int4store(ptr, (uint32)rpl->start_position); ptr += ::BINLOG_POS_OLD_INFO_SIZE; int2store(ptr, rpl->flags); // note: we use low 16 bits ptr += ::BINLOG_FLAGS_INFO_SIZE; int4store(ptr, rpl->server_id); ptr += ::BINLOG_SERVER_ID_INFO_SIZE; memcpy(ptr, rpl->file_name, rpl->file_name_length); ptr += rpl->file_name_length; command_size = ptr - command_buffer; DBUG_ASSERT(command_size == (alloc_size - 1)); } if (simple_command(mysql, command, command_buffer, command_size, 1)) { my_free(command_buffer); return -1; } my_free(command_buffer); return 0; } /** Fetch one event from the server. Read one packet and check its validity, set rpl->buffer and rpl->size accordingly. @param mysql Connection handle. @param rpl Replication stream information. @retval -1 Got error packet. @retval 0 Success. */ int STDCALL mysql_binlog_fetch(MYSQL *mysql, MYSQL_RPL *rpl) { DBUG_TRACE; DBUG_ASSERT(mysql); DBUG_ASSERT(rpl); for (;;) { /* Read a packet from the server. */ ulong packet_len = cli_safe_read(mysql, NULL); NET *net = &mysql->net; /* Check if error packet. */ if (packet_len == packet_error || packet_len == 0) { return -1; } /* Check if EOF packet. */ else if (packet_len < 8 && net->read_pos[0] == 254) { rpl->size = 0; return 0; } /* Normal packet. */ if (rpl->flags & MYSQL_RPL_SKIP_HEARTBEAT) { Log_event_type event_type = (Log_event_type)net->read_pos[1 + EVENT_TYPE_OFFSET]; if (event_type == binary_log::HEARTBEAT_LOG_EVENT) continue; } rpl->buffer = net->read_pos; rpl->size = packet_len; return 0; } } /** Close replication stream. @param mysql Connection handle. @param rpl Replication stream information. */ void STDCALL mysql_binlog_close(MYSQL *mysql, MYSQL_RPL *rpl) { DBUG_TRACE; DBUG_ASSERT(mysql); DBUG_ASSERT(rpl); end_server(mysql); rpl->buffer = 0; rpl->size = 0; } /************************************************************************** Set current database **************************************************************************/ int STDCALL mysql_select_db(MYSQL *mysql, const char *db) { int error; DBUG_TRACE; DBUG_PRINT("enter", ("db: '%s'", db)); if ((error = simple_command(mysql, COM_INIT_DB, (const uchar *)db, (ulong)strlen(db), 0))) return error; my_free(mysql->db); mysql->db = my_strdup(key_memory_MYSQL, db, MYF(MY_WME)); return 0; } /************************************************************************* Send a QUIT to the server and close the connection If handle is alloced by mysql connect free it. *************************************************************************/ void mysql_close_free_options(MYSQL *mysql) { DBUG_TRACE; my_free(mysql->options.user); my_free(mysql->options.host); my_free(mysql->options.password); my_free(mysql->options.unix_socket); my_free(mysql->options.db); my_free(mysql->options.my_cnf_file); my_free(mysql->options.my_cnf_group); my_free(mysql->options.charset_dir); my_free(mysql->options.charset_name); my_free(mysql->options.bind_address); if (mysql->options.init_commands) { char **ptr = mysql->options.init_commands->begin(); char **end = mysql->options.init_commands->end(); for (; ptr < end; ptr++) my_free(*ptr); mysql->options.init_commands->~Init_commands_array(); my_free(mysql->options.init_commands); } #if defined(HAVE_OPENSSL) mysql_ssl_free(mysql); #endif /* HAVE_OPENSSL */ #if defined(_WIN32) if (mysql->options.shared_memory_base_name != def_shared_memory_base_name) my_free(mysql->options.shared_memory_base_name); #endif /* _WIN32 */ if (mysql->options.extension) { my_free(mysql->options.extension->plugin_dir); my_free(mysql->options.extension->default_auth); my_free(mysql->options.extension->server_public_key_path); delete mysql->options.extension->connection_attributes; my_free(mysql->options.extension->compression_algorithm); mysql->options.extension->total_configured_compression_algorithms = 0; my_free(mysql->options.extension); } memset(&mysql->options, 0, sizeof(mysql->options)); } /* Free all memory allocated in a MYSQL handle but preserve current options if any. */ void mysql_close_free(MYSQL *mysql) { my_free(mysql->host_info); my_free(mysql->user); my_free(mysql->passwd); my_free(mysql->db); /* Free extension if any */ if (mysql->extension) mysql_extension_free(static_cast(mysql->extension)); my_free(mysql->field_alloc); #if defined(HAVE_OPENSSL) if (mysql->connector_fd) free_vio_ssl_acceptor_fd( reinterpret_cast(mysql->connector_fd)); mysql->connector_fd = nullptr; #endif /* HAVE_OPENSSL */ mysql->field_alloc = nullptr; /* Clear pointers for better safety */ mysql->host_info = NULL; mysql->user = NULL; mysql->passwd = NULL; mysql->db = NULL; mysql->extension = NULL; } /** For use when the connection to the server has been lost (in which case the server has discarded all information about prepared statements associated with the connection). Mark all statements in mysql->stmts by setting stmt->mysql= 0 if the statement has transitioned beyond the MYSQL_STMT_INIT_DONE state, and unlink the statement from the mysql->stmts list. The remaining pruned list of statements (if any) is kept in mysql->stmts. @param mysql pointer to the MYSQL object */ static void mysql_prune_stmt_list(MYSQL *mysql) { LIST *pruned_list = NULL; while (mysql->stmts) { LIST *element = mysql->stmts; MYSQL_STMT *stmt; mysql->stmts = list_delete(element, element); stmt = (MYSQL_STMT *)element->data; if (stmt->state != MYSQL_STMT_INIT_DONE) { stmt->mysql = 0; stmt->last_errno = CR_SERVER_LOST; my_stpcpy(stmt->last_error, ER_CLIENT(CR_SERVER_LOST)); my_stpcpy(stmt->sqlstate, unknown_sqlstate); } else { pruned_list = list_add(pruned_list, element); } } mysql->stmts = pruned_list; } /* Clear connection pointer of every statement: this is necessary to give error on attempt to use a prepared statement of closed connection. SYNOPSYS mysql_detach_stmt_list() stmt_list pointer to mysql->stmts func_name name of calling function NOTE There is similar code in mysql_reconnect(), so changes here should also be reflected there. */ void mysql_detach_stmt_list(LIST **stmt_list MY_ATTRIBUTE((unused)), const char *func_name MY_ATTRIBUTE((unused))) { #ifndef MYSQL_SERVER /* Reset connection handle in all prepared statements. */ LIST *element = *stmt_list; char buff[MYSQL_ERRMSG_SIZE]; DBUG_TRACE; snprintf(buff, sizeof(buff) - 1, ER_CLIENT(CR_STMT_CLOSED), func_name); for (; element; element = element->next) { MYSQL_STMT *stmt = (MYSQL_STMT *)element->data; set_stmt_error(stmt, CR_STMT_CLOSED, unknown_sqlstate, buff); stmt->mysql = 0; /* No need to call list_delete for statement here */ } *stmt_list = 0; return; #endif /* !MYSQL_SERVER */ } void STDCALL mysql_close(MYSQL *mysql) { DBUG_TRACE; if (mysql) /* Some simple safety */ { /* If connection is still up, send a QUIT message */ if (mysql->net.vio != 0) { free_old_query(mysql); mysql->status = MYSQL_STATUS_READY; /* Force command */ if (vio_is_blocking(mysql->net.vio)) { simple_command(mysql, COM_QUIT, (uchar *)0, 0, 1); } else { /* Best effort; try to toss a command on the wire, but we can't wait to hear back. */ bool err; /* unused */ simple_command_nonblocking(mysql, COM_QUIT, (uchar *)0, 0, 1, &err); } mysql->reconnect = 0; end_server(mysql); /* Sets mysql->net.vio= 0 */ } mysql_close_free(mysql); mysql_close_free_options(mysql); mysql_detach_stmt_list(&mysql->stmts, "mysql_close"); if (mysql->free_me) { my_free(mysql); } } } static bool cli_read_query_result(MYSQL *mysql) { uchar *pos; ulong field_count; ulong length; DBUG_TRACE; if ((length = cli_safe_read(mysql, NULL)) == packet_error) return 1; free_old_query(mysql); /* Free old result */ #ifndef MYSQL_SERVER /* Avoid warn of unused labels*/ get_info: #endif pos = (uchar *)mysql->net.read_pos; if ((field_count = net_field_length(&pos)) == 0) { read_ok_ex(mysql, length); #if defined(CLIENT_PROTOCOL_TRACING) if (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); else MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); #endif return 0; } #ifndef MYSQL_SERVER if (field_count == NULL_LENGTH) /* LOAD DATA LOCAL INFILE */ { int error; MYSQL_TRACE_STAGE(mysql, FILE_REQUEST); if (!(mysql->options.client_flag & CLIENT_LOCAL_FILES)) { set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); return 1; } error = handle_local_infile(mysql, (char *)pos); MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); if ((length = cli_safe_read(mysql, NULL)) == packet_error || error) return 1; goto get_info; /* Get info packet */ } #endif if (!(mysql->server_status & SERVER_STATUS_AUTOCOMMIT)) mysql->server_status |= SERVER_STATUS_IN_TRANS; if (read_com_query_metadata(mysql, pos, field_count)) return 1; mysql->status = MYSQL_STATUS_GET_RESULT; mysql->field_count = (uint)field_count; MYSQL_TRACE_STAGE(mysql, WAIT_FOR_ROW); DBUG_PRINT("exit", ("ok")); return 0; } static net_async_status cli_read_query_result_nonblocking(MYSQL *mysql) { DBUG_TRACE; NET *net = &mysql->net; NET_ASYNC *net_async = NET_ASYNC_DATA(net); uchar *pos = nullptr; ulong field_count; ulong length; if (net_async->async_read_query_result_status == NET_ASYNC_READ_QUERY_RESULT_IDLE) { net_async->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_FIELD_COUNT; } if (net_async->async_read_query_result_status == NET_ASYNC_READ_QUERY_RESULT_FIELD_COUNT) { net_async_status status = cli_safe_read_nonblocking(mysql, nullptr, &length); if (status == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } if (length == packet_error) { net_async->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_IDLE; return NET_ASYNC_ERROR; } mysql->packet_length = length; free_old_query(mysql); /* Free old result */ #ifndef MYSQL_SERVER /* Avoid warn of unused labels*/ get_info: #endif pos = (uchar *)mysql->net.read_pos; if ((field_count = net_field_length(&pos)) == 0) { read_ok_ex(mysql, length); #if defined(CLIENT_PROTOCOL_TRACING) if (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); else MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); #endif net_async->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_IDLE; return NET_ASYNC_COMPLETE; } #ifndef MYSQL_SERVER if (field_count == NULL_LENGTH) /* LOAD DATA LOCAL INFILE */ { int error; MYSQL_TRACE_STAGE(mysql, FILE_REQUEST); if (!(mysql->options.client_flag & CLIENT_LOCAL_FILES)) { set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); net_async->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_IDLE; return NET_ASYNC_ERROR; } error = handle_local_infile(mysql, (char *)pos); MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); /* TODO: Make LOAD DATA LOCAL INFILE asynchronous. */ if ((length = cli_safe_read(mysql, NULL)) == packet_error || error) { net_async->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_IDLE; return NET_ASYNC_ERROR; } goto get_info; /* Get info packet */ } #endif if (!(mysql->server_status & SERVER_STATUS_AUTOCOMMIT)) mysql->server_status |= SERVER_STATUS_IN_TRANS; mysql->field_count = (uint)field_count; net_async->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_FIELD_INFO; } if (net_async->async_read_query_result_status == NET_ASYNC_READ_QUERY_RESULT_FIELD_INFO) { int res; net_async_status status = read_com_query_metadata_nonblocking( mysql, pos, mysql->field_count, &res); if (status == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } if (res) { net_async->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_IDLE; return NET_ASYNC_ERROR; } } mysql->status = MYSQL_STATUS_GET_RESULT; DBUG_PRINT("exit", ("ok, %u", mysql->field_count)); net_async->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_IDLE; return NET_ASYNC_COMPLETE; } /* Send the query and return so we can do something else. Needs to be followed by mysql_read_query_result() when we want to finish processing it. */ int STDCALL mysql_send_query(MYSQL *mysql, const char *query, ulong length) { STATE_INFO *info; DBUG_TRACE; if ((info = STATE_DATA(mysql))) free_state_change_info(static_cast(mysql->extension)); return simple_command(mysql, COM_QUERY, pointer_cast(query), length, 1); } /** Executes the SQL statement pointed by query. This API is called by mysql_real_query_nonblocking to send query to server in asynchronous way. @param[in] mysql connection handle @param[in] query query string to be executed @param[in] length length of query @retval NET_ASYNC_ERROR query execution failed @retval NET_ASYNC_NOT_READY query not yet completed, call this API again @retval NET_ASYNC_COMPLETE query execution finished */ net_async_status STDCALL mysql_send_query_nonblocking(MYSQL *mysql, const char *query, ulong length) { DBUG_TRACE; STATE_INFO *info; if ((info = STATE_DATA(mysql))) free_state_change_info(static_cast(mysql->extension)); bool ret; if (simple_command_nonblocking(mysql, COM_QUERY, pointer_cast(query), length, 1, &ret) == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } if (ret) return NET_ASYNC_ERROR; else return NET_ASYNC_COMPLETE; } int STDCALL mysql_real_query(MYSQL *mysql, const char *query, ulong length) { int retval; DBUG_TRACE; DBUG_PRINT("enter", ("handle: %p", mysql)); DBUG_PRINT("query", ("Query = '%-.*s'", (int)length, query)); DBUG_EXECUTE_IF("inject_ER_NET_READ_INTERRUPTED", { mysql->net.last_errno = ER_NET_READ_INTERRUPTED; DBUG_SET("-d,inject_ER_NET_READ_INTERRUPTED"); return 1; }); if (mysql_send_query(mysql, query, length)) return 1; retval = (int)(*mysql->methods->read_query_result)(mysql); return retval; } /** Executes the SQL statement pointed by query. This sql statement length is set in length parameter. query string can contain multiple sql statements separated by semicolons. This function can return immediately with status set to NET_ASYNC_NOT_READY, in this case client application is expected to call this API until it returns NET_ASYNC_COMPLETE. @param[in] mysql connection handle @param[in] query query string to be executed @param[in] length length of query @retval NET_ASYNC_ERROR query execution failed @retval NET_ASYNC_NOT_READY query not yet completed, call this API again @retval NET_ASYNC_COMPLETE query execution finished */ net_async_status STDCALL mysql_real_query_nonblocking(MYSQL *mysql, const char *query, ulong length) { DBUG_TRACE; DBUG_PRINT("enter", ("handle: %p", mysql)); DBUG_PRINT("query", ("Query = '%-.*s'", (int)length, query)); DBUG_EXECUTE_IF("inject_ER_NET_READ_INTERRUPTED", { mysql->net.last_errno = ER_NET_READ_INTERRUPTED; DBUG_SET("-d,inject_ER_NET_READ_INTERRUPTED"); return NET_ASYNC_ERROR; }); MYSQL_ASYNC *async_context = ASYNC_DATA(mysql); DBUG_ASSERT(async_context->async_op_status == ASYNC_OP_UNSET || async_context->async_op_status == ASYNC_OP_QUERY); net_async_status status = NET_ASYNC_NOT_READY; /* 1st phase: send query. */ if (async_context->async_query_state == QUERY_IDLE) { async_context->async_query_length = length; async_context->async_op_status = ASYNC_OP_QUERY; async_context->async_query_state = QUERY_SENDING; } if (async_context->async_query_state == QUERY_SENDING) { status = mysql_send_query_nonblocking(mysql, query, length); if (status == NET_ASYNC_NOT_READY) return NET_ASYNC_NOT_READY; else if (status == NET_ASYNC_ERROR) goto end; async_context->async_query_state = QUERY_READING_RESULT; } /* 2nd phase: read query result (field count, field info) */ if (async_context->async_query_state == QUERY_READING_RESULT) { status = (*mysql->methods->read_query_result_nonblocking)(mysql); if (status == NET_ASYNC_NOT_READY) return NET_ASYNC_NOT_READY; else if (status == NET_ASYNC_ERROR) goto end; } end: async_context->async_op_status = ASYNC_OP_UNSET; async_context->async_query_state = QUERY_IDLE; async_context->async_query_length = 0; if (status == NET_ASYNC_ERROR) return NET_ASYNC_ERROR; else return NET_ASYNC_COMPLETE; } /************************************************************************** Alloc result struct for buffered results. All rows are read to buffer. mysql_data_seek may be used. **************************************************************************/ MYSQL_RES *STDCALL mysql_store_result(MYSQL *mysql) { MYSQL_RES *result; DBUG_TRACE; /* Some queries (e.g. "CALL") may return an empty resultset. mysql->field_count is 0 in such cases. */ if (!mysql->field_count) return 0; if (mysql->status != MYSQL_STATUS_GET_RESULT) { set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate); return 0; } mysql->status = MYSQL_STATUS_READY; /* server is ready */ if (!(result = (MYSQL_RES *)my_malloc( key_memory_MYSQL_RES, (uint)(sizeof(MYSQL_RES) + sizeof(ulong) * mysql->field_count), MYF(MY_WME | MY_ZEROFILL)))) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return 0; } if (!(result->field_alloc = (MEM_ROOT *)my_malloc( key_memory_MYSQL, sizeof(MEM_ROOT), MYF(MY_WME | MY_ZEROFILL)))) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); my_free(result); return 0; } result->methods = mysql->methods; result->eof = 1; /* Marker for buffered */ result->lengths = (ulong *)(result + 1); if (!(result->data = (*mysql->methods->read_rows)(mysql, mysql->fields, mysql->field_count))) { my_free(result->field_alloc); my_free(result); return 0; } mysql->affected_rows = result->row_count = result->data->rows; result->data_cursor = result->data->data; result->fields = mysql->fields; *result->field_alloc = std::move(*mysql->field_alloc); result->field_count = mysql->field_count; result->metadata = mysql->resultset_metadata; /* The rest of result members is zerofilled in my_malloc */ mysql->fields = 0; /* fields is now in result */ /* just in case this was mistakenly called after mysql_stmt_execute() */ mysql->unbuffered_fetch_owner = 0; return result; /* Data fetched */ } /** This API reads all result set sent by server in an asynchronous way @param[in] mysql connection handle @param[in] result buffer which holds all result sets. @retval NET_ASYNC_NOT_READY reading of result sets not complete @retval NET_ASYNC_COMPLETE completed this asynchronous operation */ enum net_async_status STDCALL mysql_store_result_nonblocking(MYSQL *mysql, MYSQL_RES **result) { DBUG_TRACE; MYSQL_ASYNC *async_context = ASYNC_DATA(mysql); *result = nullptr; /* Some queries (e.g. "CALL") may return an empty resultset. mysql->field_count is 0 in such cases. */ if (!mysql->field_count) { goto end; } if (!async_context->async_store_result_result) { if (mysql->status != MYSQL_STATUS_GET_RESULT) { set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate); goto end; } mysql->status = MYSQL_STATUS_READY; /* server is ready */ if (!(async_context->async_store_result_result = (MYSQL_RES *)my_malloc( key_memory_MYSQL_RES, (uint)(sizeof(MYSQL_RES) + sizeof(ulong) * mysql->field_count), MYF(MY_WME | MY_ZEROFILL)))) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); goto end; } if (!(async_context->async_store_result_result->field_alloc = (MEM_ROOT *)my_malloc(key_memory_MYSQL, sizeof(MEM_ROOT), MYF(MY_WME | MY_ZEROFILL)))) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); my_free(async_context->async_store_result_result); goto end; } async_context->async_store_result_result->methods = mysql->methods; async_context->async_store_result_result->eof = 1; /* Marker for buffered */ async_context->async_store_result_result->lengths = (ulong *)(async_context->async_store_result_result + 1); } if ((*mysql->methods->read_rows_nonblocking)( mysql, mysql->fields, mysql->field_count, &async_context->async_store_result_result->data) == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } if (!async_context->async_store_result_result->data) { my_free(async_context->async_store_result_result->field_alloc); my_free(async_context->async_store_result_result); goto end; } mysql->affected_rows = async_context->async_store_result_result->row_count = async_context->async_store_result_result->data->rows; async_context->async_store_result_result->data_cursor = async_context->async_store_result_result->data->data; async_context->async_store_result_result->fields = mysql->fields; *async_context->async_store_result_result->field_alloc = std::move(*mysql->field_alloc); async_context->async_store_result_result->field_count = mysql->field_count; async_context->async_store_result_result->metadata = mysql->resultset_metadata; /* The rest of result members is zerofilled in my_malloc */ mysql->fields = 0; /* fields is now in result */ /* just in case this was mistakenly called after mysql_stmt_execute() */ mysql->unbuffered_fetch_owner = 0; *result = async_context->async_store_result_result; end: async_context->async_store_result_result = nullptr; return NET_ASYNC_COMPLETE; } /************************************************************************** Alloc struct for use with unbuffered reads. Data is fetched by domand when calling to mysql_fetch_row. mysql_data_seek is a noop. No other queries may be specified with the same MYSQL handle. There shouldn't be much processing per row because mysql server shouldn't have to wait for the client (and will not wait more than 30 sec/packet). **************************************************************************/ static MYSQL_RES *cli_use_result(MYSQL *mysql) { MYSQL_RES *result; DBUG_TRACE; /* Some queries (e.g. "CALL") may return an empty resultset. mysql->field_count is 0 in such cases. */ if (!mysql->field_count) return 0; if (mysql->status != MYSQL_STATUS_GET_RESULT) { set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate); return 0; } if (!(result = (MYSQL_RES *)my_malloc( key_memory_MYSQL_RES, sizeof(*result) + sizeof(ulong) * mysql->field_count, MYF(MY_WME | MY_ZEROFILL)))) return 0; result->lengths = (ulong *)(result + 1); result->methods = mysql->methods; if (!(result->row = (MYSQL_ROW)my_malloc( key_memory_MYSQL_ROW, sizeof(result->row[0]) * (mysql->field_count + 1), MYF(MY_WME)))) { /* Ptrs: to one row */ my_free(result); return 0; } if (!(result->field_alloc = (MEM_ROOT *)my_malloc( key_memory_MYSQL, sizeof(MEM_ROOT), MYF(MY_WME | MY_ZEROFILL)))) { my_free(result->row); my_free(result); return 0; } result->fields = mysql->fields; *result->field_alloc = std::move(*mysql->field_alloc); result->field_count = mysql->field_count; result->metadata = mysql->resultset_metadata; result->current_field = 0; result->handle = mysql; result->current_row = 0; mysql->fields = 0; /* fields is now in result */ mysql->status = MYSQL_STATUS_USE_RESULT; mysql->unbuffered_fetch_owner = &result->unbuffered_fetch_cancelled; return result; /* Data is read to be fetched */ } /************************************************************************** Return next row of the query results **************************************************************************/ MYSQL_ROW STDCALL mysql_fetch_row(MYSQL_RES *res) { DBUG_TRACE; if (!res->data) { /* Unbufferred fetch */ if (!res->eof) { MYSQL *mysql = res->handle; if (mysql->status != MYSQL_STATUS_USE_RESULT) { set_mysql_error(mysql, res->unbuffered_fetch_cancelled ? CR_FETCH_CANCELED : CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate); } else if (!(read_one_row(mysql, res->field_count, res->row, res->lengths))) { res->row_count++; return res->current_row = res->row; } DBUG_PRINT("info", ("end of data")); res->eof = 1; mysql->status = MYSQL_STATUS_READY; /* Reset only if owner points to us: there is a chance that somebody started new query after mysql_stmt_close(): */ if (mysql->unbuffered_fetch_owner == &res->unbuffered_fetch_cancelled) mysql->unbuffered_fetch_owner = 0; /* Don't clear handle in mysql_free_result */ res->handle = 0; } return (MYSQL_ROW)NULL; } { MYSQL_ROW tmp; if (!res->data_cursor) { DBUG_PRINT("info", ("end of data")); return res->current_row = (MYSQL_ROW)NULL; } tmp = res->data_cursor->data; res->data_cursor = res->data_cursor->next; return res->current_row = tmp; } } /** Reads next row of a result set in an asynchronous way. @param[in] res buffer in which all rows are stored @param[out] row return pointer to one row from result set @retval NET_ASYNC_NOT_READY fetch operation not complete, retry again @retval NET_ASYNC_COMPLETE fetch operation complete */ net_async_status STDCALL mysql_fetch_row_nonblocking(MYSQL_RES *res, MYSQL_ROW *row) { DBUG_TRACE; MYSQL *mysql = res->handle; *row = nullptr; if (!res->data) { /* Unbufferred fetch */ if (!res->eof) { if (mysql->status == MYSQL_STATUS_USE_RESULT) { int ret; if (read_one_row_nonblocking(mysql, res->field_count, res->row, res->lengths, &ret) == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } if (!ret) { *row = res->current_row = res->row; goto end; } } set_mysql_error(mysql, res->unbuffered_fetch_cancelled ? CR_FETCH_CANCELED : CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate); DBUG_PRINT("info", ("end of data")); res->eof = 1; mysql->status = MYSQL_STATUS_READY; /* Reset only if owner points to us: there is a chance that somebody started new query after mysql_stmt_close(): */ if (mysql->unbuffered_fetch_owner == &res->unbuffered_fetch_cancelled) mysql->unbuffered_fetch_owner = 0; /* Don't clear handle in mysql_free_result */ res->handle = 0; } *row = nullptr; goto end; } { MYSQL_ROW tmp; if (!res->data_cursor) { DBUG_PRINT("info", ("end of data")); *row = nullptr; goto end; } tmp = res->data_cursor->data; res->data_cursor = res->data_cursor->next; *row = res->current_row = tmp; goto end; } end: return NET_ASYNC_COMPLETE; } /************************************************************************** Get column lengths of the current row If one uses mysql_use_result, res->lengths contains the length information, else the lengths are calculated from the offset between pointers. **************************************************************************/ ulong *STDCALL mysql_fetch_lengths(MYSQL_RES *res) { MYSQL_ROW column; if (!(column = res->current_row)) return 0; /* Something is wrong */ if (res->data) (*res->methods->fetch_lengths)(res->lengths, column, res->field_count); return res->lengths; } int STDCALL mysql_options(MYSQL *mysql, enum mysql_option option, const void *arg) { DBUG_TRACE; DBUG_PRINT("enter", ("option: %d", (int)option)); switch (option) { case MYSQL_OPT_CONNECT_TIMEOUT: mysql->options.connect_timeout = *static_cast(arg); break; case MYSQL_OPT_READ_TIMEOUT: mysql->options.read_timeout = *static_cast(arg); break; case MYSQL_OPT_WRITE_TIMEOUT: mysql->options.write_timeout = *static_cast(arg); break; case MYSQL_OPT_COMPRESS: mysql->options.compress = 1; /* Remember for connect */ mysql->options.client_flag |= CLIENT_COMPRESS; break; case MYSQL_OPT_NAMED_PIPE: /* This option is depricated */ mysql->options.protocol = MYSQL_PROTOCOL_PIPE; /* Force named pipe */ break; case MYSQL_OPT_LOCAL_INFILE: /* Allow LOAD DATA LOCAL ?*/ if (!arg || (*static_cast(arg) != 0)) mysql->options.client_flag |= CLIENT_LOCAL_FILES; else mysql->options.client_flag &= ~CLIENT_LOCAL_FILES; break; case MYSQL_INIT_COMMAND: add_init_command(&mysql->options, static_cast(arg)); break; case MYSQL_READ_DEFAULT_FILE: my_free(mysql->options.my_cnf_file); mysql->options.my_cnf_file = my_strdup(key_memory_mysql_options, static_cast(arg), MYF(MY_WME)); break; case MYSQL_READ_DEFAULT_GROUP: my_free(mysql->options.my_cnf_group); mysql->options.my_cnf_group = my_strdup(key_memory_mysql_options, static_cast(arg), MYF(MY_WME)); break; case MYSQL_SET_CHARSET_DIR: my_free(mysql->options.charset_dir); mysql->options.charset_dir = my_strdup(key_memory_mysql_options, static_cast(arg), MYF(MY_WME)); break; case MYSQL_SET_CHARSET_NAME: my_free(mysql->options.charset_name); mysql->options.charset_name = my_strdup(key_memory_mysql_options, static_cast(arg), MYF(MY_WME)); break; case MYSQL_OPT_PROTOCOL: mysql->options.protocol = *static_cast(arg); break; case MYSQL_SHARED_MEMORY_BASE_NAME: #if defined(_WIN32) if (mysql->options.shared_memory_base_name != def_shared_memory_base_name) my_free(mysql->options.shared_memory_base_name); mysql->options.shared_memory_base_name = my_strdup(key_memory_mysql_options, static_cast(arg), MYF(MY_WME)); #endif break; case MYSQL_REPORT_DATA_TRUNCATION: mysql->options.report_data_truncation = *static_cast(arg); break; case MYSQL_OPT_RECONNECT: mysql->reconnect = *static_cast(arg); break; case MYSQL_OPT_BIND: my_free(mysql->options.bind_address); mysql->options.bind_address = my_strdup(key_memory_mysql_options, static_cast(arg), MYF(MY_WME)); break; case MYSQL_PLUGIN_DIR: EXTENSION_SET_STRING(&mysql->options, plugin_dir, static_cast(arg)); break; case MYSQL_DEFAULT_AUTH: EXTENSION_SET_STRING(&mysql->options, default_auth, static_cast(arg)); break; case MYSQL_OPT_SSL_KEY: if (mysql->options.ssl_key) my_free(mysql->options.ssl_key); mysql->options.ssl_key = set_ssl_option_unpack_path(static_cast(arg)); break; case MYSQL_OPT_SSL_CERT: if (mysql->options.ssl_cert) my_free(mysql->options.ssl_cert); mysql->options.ssl_cert = set_ssl_option_unpack_path(static_cast(arg)); break; case MYSQL_OPT_SSL_CA: if (mysql->options.ssl_ca) my_free(mysql->options.ssl_ca); mysql->options.ssl_ca = set_ssl_option_unpack_path(static_cast(arg)); break; case MYSQL_OPT_SSL_CAPATH: if (mysql->options.ssl_capath) my_free(mysql->options.ssl_capath); mysql->options.ssl_capath = set_ssl_option_unpack_path(static_cast(arg)); break; case MYSQL_OPT_SSL_CIPHER: SET_OPTION(ssl_cipher, static_cast(arg)); break; case MYSQL_OPT_TLS_CIPHERSUITES: EXTENSION_SET_STRING(&mysql->options, tls_ciphersuites, static_cast(arg)); break; case MYSQL_OPT_SSL_CRL: if (mysql->options.extension) my_free(mysql->options.extension->ssl_crl); else ALLOCATE_EXTENSIONS(&mysql->options); mysql->options.extension->ssl_crl = set_ssl_option_unpack_path(static_cast(arg)); break; case MYSQL_OPT_SSL_CRLPATH: if (mysql->options.extension) my_free(mysql->options.extension->ssl_crlpath); else ALLOCATE_EXTENSIONS(&mysql->options); mysql->options.extension->ssl_crlpath = set_ssl_option_unpack_path(static_cast(arg)); break; case MYSQL_OPT_TLS_VERSION: #if defined(HAVE_OPENSSL) EXTENSION_SET_STRING(&mysql->options, tls_version, static_cast(arg)); if ((mysql->options.extension->ssl_ctx_flags = process_tls_version( mysql->options.extension->tls_version)) == -1) return 1; #endif break; case MYSQL_OPT_SSL_FIPS_MODE: { #if defined(HAVE_OPENSSL) char ssl_err_string[OPENSSL_ERROR_LENGTH] = {'\0'}; ENSURE_EXTENSIONS_PRESENT(&mysql->options); mysql->options.extension->ssl_fips_mode = *static_cast(arg); if (set_fips_mode(mysql->options.extension->ssl_fips_mode, ssl_err_string) != 1) { DBUG_PRINT("error", ("fips mode set error %s:", ssl_err_string)); set_mysql_extended_error( mysql, CR_SSL_FIPS_MODE_ERR, unknown_sqlstate, "Set Fips mode ON/STRICT failed, detail: '%s'.", ssl_err_string); return 1; } #endif // defined(HAVE_OPENSSL) } break; case MYSQL_OPT_SSL_MODE: #if defined(HAVE_OPENSSL) ENSURE_EXTENSIONS_PRESENT(&mysql->options); mysql->options.extension->ssl_mode = *static_cast(arg); if (mysql->options.extension->ssl_mode == SSL_MODE_VERIFY_IDENTITY) mysql->options.client_flag |= CLIENT_SSL_VERIFY_SERVER_CERT; else mysql->options.client_flag &= ~CLIENT_SSL_VERIFY_SERVER_CERT; #endif break; case MYSQL_SERVER_PUBLIC_KEY: EXTENSION_SET_STRING(&mysql->options, server_public_key_path, static_cast(arg)); break; case MYSQL_OPT_GET_SERVER_PUBLIC_KEY: ENSURE_EXTENSIONS_PRESENT(&mysql->options); mysql->options.extension->get_server_public_key = *static_cast(arg); break; case MYSQL_OPT_CONNECT_ATTR_RESET: ENSURE_EXTENSIONS_PRESENT(&mysql->options); if (mysql->options.extension->connection_attributes) { delete mysql->options.extension->connection_attributes; mysql->options.extension->connection_attributes = NULL; mysql->options.extension->connection_attributes_length = 0; } break; case MYSQL_OPT_CONNECT_ATTR_DELETE: ENSURE_EXTENSIONS_PRESENT(&mysql->options); if (mysql->options.extension->connection_attributes) { string key = arg ? pointer_cast(arg) : ""; if (!key.empty()) { auto it = mysql->options.extension->connection_attributes->hash.find(key); if (it != mysql->options.extension->connection_attributes->hash.end()) { const string &key = it->first; const string &value = it->second; mysql->options.extension->connection_attributes_length -= get_length_store_length(key.size()) + key.size() + get_length_store_length(value.size()) + value.size(); mysql->options.extension->connection_attributes->hash.erase(it); } } } break; case MYSQL_ENABLE_CLEARTEXT_PLUGIN: ENSURE_EXTENSIONS_PRESENT(&mysql->options); mysql->options.extension->enable_cleartext_plugin = *static_cast(arg); break; case MYSQL_OPT_RETRY_COUNT: ENSURE_EXTENSIONS_PRESENT(&mysql->options); mysql->options.extension->retry_count = *static_cast(arg); break; case MYSQL_OPT_CAN_HANDLE_EXPIRED_PASSWORDS: if (*static_cast(arg)) mysql->options.client_flag |= CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS; else mysql->options.client_flag &= ~CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS; break; case MYSQL_OPT_MAX_ALLOWED_PACKET: if (mysql) mysql->options.max_allowed_packet = *static_cast(arg); else g_max_allowed_packet = *static_cast(arg); break; case MYSQL_OPT_NET_BUFFER_LENGTH: g_net_buffer_length = *static_cast(arg); break; case MYSQL_OPT_OPTIONAL_RESULTSET_METADATA: if (*static_cast(arg)) mysql->options.client_flag |= CLIENT_OPTIONAL_RESULTSET_METADATA; else mysql->options.client_flag &= ~CLIENT_OPTIONAL_RESULTSET_METADATA; break; case MYSQL_OPT_COMPRESSION_ALGORITHMS: { std::string compress_option(static_cast(arg)); std::vector list; parse_compression_algorithms_list(compress_option, list); ENSURE_EXTENSIONS_PRESENT(&mysql->options); mysql->options.extension->connection_compressed = true; mysql->options.client_flag &= ~(CLIENT_COMPRESS | CLIENT_ZSTD_COMPRESSION_ALGORITHM); mysql->options.compress = 0; auto it = list.begin(); unsigned int cnt = 0; while (it != list.end() && cnt < COMPRESSION_ALGORITHM_COUNT_MAX) { std::string value = *it; switch (get_compression_algorithm(value)) { case enum_compression_algorithm::MYSQL_ZLIB: mysql->options.client_flag |= CLIENT_COMPRESS; mysql->options.compress = 1; break; case enum_compression_algorithm::MYSQL_ZSTD: mysql->options.client_flag |= CLIENT_ZSTD_COMPRESSION_ALGORITHM; mysql->options.compress = 1; break; case enum_compression_algorithm::MYSQL_UNCOMPRESSED: mysql->options.extension->connection_compressed = false; break; case enum_compression_algorithm::MYSQL_INVALID: break; // report error } it++; cnt++; } if (cnt) EXTENSION_SET_STRING(&mysql->options, compression_algorithm, static_cast(arg)); mysql->options.extension->total_configured_compression_algorithms = cnt; } break; case MYSQL_OPT_ZSTD_COMPRESSION_LEVEL: ENSURE_EXTENSIONS_PRESENT(&mysql->options); mysql->options.extension->zstd_compression_level = *static_cast(arg); break; default: return 1; } return 0; } /** Return the current values for the options settable through mysql_options() Returns the current values for all of the connection options. Callers should not manipulate the returned data ! Data are valid at the time of returning them until the next C API CALL arg should always be a pointer to a variable of the appropriate type. type of variable, based on the parameter: uint MYSQL_OPT_CONNECT_TIMEOUT, MYSQL_OPT_READ_TIMEOUT, MYSQL_OPT_WRITE_TIMEOUT, MYSQL_OPT_PROTOCOL, MYSQL_OPT_SSL_MODE, MYSQL_OPT_RETRY_COUNT bool MYSQL_OPT_COMPRESS, MYSQL_OPT_LOCAL_INFILE, MYSQL_REPORT_DATA_TRUNCATION, MYSQL_OPT_RECONNECT, MYSQL_ENABLE_CLEARTEXT_PLUGIN, MYSQL_OPT_CAN_HANDLE_EXPIRED_PASSWORDS, MYSQL_OPT_OPTIONAL_RESULTSET_METADATA const char * MYSQL_READ_DEFAULT_FILE, MYSQL_READ_DEFAULT_GROUP, MYSQL_SET_CHARSET_DIR, MYSQL_SET_CHARSET_NAME, MYSQL_SHARED_MEMORY_BASE_NAME, MYSQL_SET_CLIENT_IP, MYSQL_OPT_BIND, MYSQL_PLUGIN_DIR, MYSQL_DEFAULT_AUTH, MYSQL_OPT_SSL_KEY, MYSQL_OPT_SSL_CERT, MYSQL_OPT_SSL_CA, MYSQL_OPT_SSL_CAPATH, MYSQL_OPT_SSL_CIPHER, MYSQL_OPT_TLS_CIPHERSUITES, MYSQL_OPT_SSL_CRL, MYSQL_OPT_SSL_CRLPATH, MYSQL_OPT_TLS_VERSION, MYSQL_SERVER_PUBLIC_KEY, MYSQL_OPT_SSL_FIPS_MODE MYSQL_OPT_NAMED_PIPE, MYSQL_OPT_CONNECT_ATTR_RESET, MYSQL_OPT_CONNECT_ATTR_DELETE, MYSQL_INIT_COMMAND @param mysql The MYSQL connection to operate on @param option The option to return the value for @param [out] arg Must be non-null. Receives the current value. @return status @retval 0 SUCCESS */ int STDCALL mysql_get_option(MYSQL *mysql, enum mysql_option option, const void *arg) { DBUG_TRACE; DBUG_PRINT("enter", ("option: %d", (int)option)); if (!arg) return 1; switch (option) { case MYSQL_OPT_CONNECT_TIMEOUT: *(const_cast(static_cast(arg))) = mysql->options.connect_timeout; break; case MYSQL_OPT_READ_TIMEOUT: *(const_cast(static_cast(arg))) = mysql->options.read_timeout; break; case MYSQL_OPT_WRITE_TIMEOUT: *(const_cast(static_cast(arg))) = mysql->options.write_timeout; break; case MYSQL_OPT_COMPRESS: *(const_cast(static_cast(arg))) = mysql->options.compress; break; case MYSQL_OPT_LOCAL_INFILE: /* Allow LOAD DATA LOCAL ?*/ *(const_cast(static_cast(arg))) = (mysql->options.client_flag & CLIENT_LOCAL_FILES) != 0; break; case MYSQL_READ_DEFAULT_FILE: *(static_cast(const_cast(arg))) = mysql->options.my_cnf_file; break; case MYSQL_READ_DEFAULT_GROUP: *(static_cast(const_cast(arg))) = mysql->options.my_cnf_group; break; case MYSQL_SET_CHARSET_DIR: *(static_cast(const_cast(arg))) = mysql->options.charset_dir; break; case MYSQL_SET_CHARSET_NAME: *(static_cast(const_cast(arg))) = mysql->options.charset_name; break; case MYSQL_OPT_PROTOCOL: *(const_cast(static_cast(arg))) = mysql->options.protocol; break; case MYSQL_SHARED_MEMORY_BASE_NAME: #if defined(_WIN32) *(static_cast(const_cast(arg))) = mysql->options.shared_memory_base_name; #else *(static_cast(const_cast(arg))) = const_cast(""); #endif break; case MYSQL_REPORT_DATA_TRUNCATION: *(const_cast(static_cast(arg))) = mysql->options.report_data_truncation; break; case MYSQL_OPT_RECONNECT: *(const_cast(static_cast(arg))) = mysql->reconnect; break; case MYSQL_OPT_BIND: *(static_cast(const_cast(arg))) = mysql->options.bind_address; break; case MYSQL_OPT_SSL_MODE: *(const_cast(static_cast(arg))) = mysql->options.extension ? mysql->options.extension->ssl_mode : 0; break; case MYSQL_OPT_SSL_FIPS_MODE: *(const_cast(static_cast(arg))) = mysql->options.extension ? mysql->options.extension->ssl_fips_mode : 0; break; case MYSQL_PLUGIN_DIR: *(static_cast(const_cast(arg))) = mysql->options.extension ? mysql->options.extension->plugin_dir : nullptr; break; case MYSQL_DEFAULT_AUTH: *(static_cast(const_cast(arg))) = mysql->options.extension ? mysql->options.extension->default_auth : nullptr; break; case MYSQL_OPT_SSL_KEY: *(static_cast(const_cast(arg))) = mysql->options.ssl_key; break; case MYSQL_OPT_SSL_CERT: *(static_cast(const_cast(arg))) = mysql->options.ssl_cert; break; case MYSQL_OPT_SSL_CA: *(static_cast(const_cast(arg))) = mysql->options.ssl_ca; break; case MYSQL_OPT_SSL_CAPATH: *(static_cast(const_cast(arg))) = mysql->options.ssl_capath; break; case MYSQL_OPT_SSL_CIPHER: *(static_cast(const_cast(arg))) = mysql->options.ssl_cipher; break; case MYSQL_OPT_TLS_CIPHERSUITES: *(static_cast(const_cast(arg))) = mysql->options.extension ? mysql->options.extension->tls_ciphersuites : nullptr; break; case MYSQL_OPT_RETRY_COUNT: *(const_cast(static_cast(arg))) = mysql->options.extension ? mysql->options.extension->retry_count : 1; break; case MYSQL_OPT_TLS_VERSION: *(static_cast(const_cast(arg))) = mysql->options.extension ? mysql->options.extension->tls_version : nullptr; break; case MYSQL_OPT_SSL_CRL: *(static_cast(const_cast(arg))) = mysql->options.extension ? mysql->options.extension->ssl_crl : nullptr; break; case MYSQL_OPT_SSL_CRLPATH: *(static_cast(const_cast(arg))) = mysql->options.extension ? mysql->options.extension->ssl_crlpath : nullptr; break; case MYSQL_SERVER_PUBLIC_KEY: *(static_cast(const_cast(arg))) = mysql->options.extension ? mysql->options.extension->server_public_key_path : nullptr; break; case MYSQL_OPT_GET_SERVER_PUBLIC_KEY: *(const_cast(static_cast(arg))) = mysql->options.extension && mysql->options.extension->get_server_public_key; break; case MYSQL_ENABLE_CLEARTEXT_PLUGIN: *(const_cast(static_cast(arg))) = mysql->options.extension && mysql->options.extension->enable_cleartext_plugin; break; case MYSQL_OPT_CAN_HANDLE_EXPIRED_PASSWORDS: *(const_cast(static_cast(arg))) = (mysql->options.client_flag & CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS) != 0; break; case MYSQL_OPT_MAX_ALLOWED_PACKET: if (mysql) *(const_cast(static_cast(arg))) = mysql->options.max_allowed_packet; else *(const_cast(static_cast(arg))) = g_max_allowed_packet; break; case MYSQL_OPT_NET_BUFFER_LENGTH: *(const_cast(static_cast(arg))) = g_net_buffer_length; break; case MYSQL_OPT_OPTIONAL_RESULTSET_METADATA: *(const_cast(static_cast(arg))) = (mysql->options.client_flag & CLIENT_OPTIONAL_RESULTSET_METADATA) != 0; break; case MYSQL_OPT_NAMED_PIPE: /* This option is deprecated */ case MYSQL_INIT_COMMAND: /* Cumulative */ case MYSQL_OPT_CONNECT_ATTR_RESET: /* Cumulative */ case MYSQL_OPT_CONNECT_ATTR_DELETE: /* Cumulative */ default: return 1; } return 0; } int STDCALL mysql_options4(MYSQL *mysql, enum mysql_option option, const void *arg1, const void *arg2) { DBUG_TRACE; DBUG_PRINT("enter", ("option: %d", (int)option)); switch (option) { case MYSQL_OPT_CONNECT_ATTR_ADD: { const char *key = static_cast(arg1); const char *value = static_cast(arg2); size_t key_len = arg1 ? strlen(key) : 0; size_t value_len = arg2 ? strlen(value) : 0; size_t attr_storage_length = key_len + value_len; /* we can't have a zero length key */ if (!key_len) { set_mysql_error(mysql, CR_INVALID_PARAMETER_NO, unknown_sqlstate); return 1; } /* calculate the total storage length of the attribute */ attr_storage_length += get_length_store_length(key_len); attr_storage_length += get_length_store_length(value_len); ENSURE_EXTENSIONS_PRESENT(&mysql->options); /* Throw and error if the maximum combined length of the attribute value will be greater than the maximum that we can safely transmit. */ if (attr_storage_length + mysql->options.extension->connection_attributes_length > MAX_CONNECTION_ATTR_STORAGE_LENGTH) { set_mysql_error(mysql, CR_INVALID_PARAMETER_NO, unknown_sqlstate); return 1; } if (!mysql->options.extension->connection_attributes) { mysql->options.extension->connection_attributes = new (std::nothrow) My_hash(); if (!mysql->options.extension->connection_attributes) { set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); return 1; } } if (!mysql->options.extension->connection_attributes->hash .emplace(key, value) .second) { /* can't insert the value */ set_mysql_error(mysql, CR_DUPLICATE_CONNECTION_ATTR, unknown_sqlstate); return 1; } mysql->options.extension->connection_attributes_length += attr_storage_length; break; } default: return 1; } return 0; } /**************************************************************************** Functions to get information from the MySQL structure These are functions to make shared libraries more usable. ****************************************************************************/ /* MYSQL_RES */ my_ulonglong STDCALL mysql_num_rows(MYSQL_RES *res) { return res->row_count; } unsigned int STDCALL mysql_num_fields(MYSQL_RES *res) { return res->field_count; } uint STDCALL mysql_errno(MYSQL *mysql) { return mysql ? mysql->net.last_errno : mysql_server_last_errno; } const char *STDCALL mysql_error(MYSQL *mysql) { return mysql ? mysql->net.last_error : mysql_server_last_error; } /** Read data and its length from a LIST node. Assumes LIST which stores data blobs in LEX_STRING structures, where LEX_STRING::str is pointer to the data and LEX_STRING::length is the length of this data. If node is NULL then data and length are set to NULL and 0, respectively, and function returns 0, otherwise, if data has been read from the node, function returns 1. */ static int get_data_and_length(LIST *node, const char **data, size_t *length) { DBUG_ASSERT(!node || node->data); if (data) *data = node ? ((LEX_STRING *)(node->data))->str : NULL; if (length) *length = node ? ((LEX_STRING *)(node->data))->length : 0; return node ? 0 : 1; } /** Get the first state change information received from the server. @param [in] mysql mysql handle @param [in] type state change type @param [out] data buffer to store the data @param [out] length length of the data @return 0 - Valid data stored 1 - No data */ int STDCALL mysql_session_track_get_first(MYSQL *mysql, enum enum_session_state_type type, const char **data, size_t *length) { STATE_INFO *info = STATE_DATA(mysql); if (!info || !IS_SESSION_STATE_TYPE(type) || !(info->info_list[type].head_node)) return get_data_and_length(NULL, data, length); info->info_list[type].current_node = info->info_list[type].head_node; return mysql_session_track_get_next(mysql, type, data, length); } /** Get the subsequent state change information received from the server. @param [in] mysql mysql handle @param [in] type state change type @param [out] data buffer to store the data @param [out] length length of the data @return 0 - Valid data stored 1 - No data */ int STDCALL mysql_session_track_get_next(MYSQL *mysql, enum enum_session_state_type type, const char **data, size_t *length) { STATE_INFO *info = STATE_DATA(mysql); int ret; if (!info || !IS_SESSION_STATE_TYPE(type) || !(info->info_list[type].current_node)) return get_data_and_length(NULL, data, length); ret = get_data_and_length(info->info_list[type].current_node, data, length); info->info_list[type].current_node = list_rest(info->info_list[type].current_node); return ret; } /* Get version number for server in a form easy to test on SYNOPSIS mysql_get_server_version() mysql Connection EXAMPLE 4.1.0-alfa -> 40100 NOTES We will ensure that a newer server always has a bigger number. RETURN Signed number > 323000 Zero if there is no connection */ ulong STDCALL mysql_get_server_version(MYSQL *mysql) { ulong major = 0, minor = 0, version = 0; if (mysql->server_version) { char *pos = mysql->server_version, *end_pos; major = strtoul(pos, &end_pos, 10); pos = end_pos + 1; minor = strtoul(pos, &end_pos, 10); pos = end_pos + 1; version = strtoul(pos, &end_pos, 10); } else { set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate); } return major * 10000 + minor * 100 + version; } /* mysql_set_character_set function sends SET NAMES cs_name to the server (which changes character_set_client, character_set_result and character_set_connection) and updates mysql->charset so other functions like mysql_real_escape will work correctly. */ int STDCALL mysql_set_character_set(MYSQL *mysql, const char *cs_name) { CHARSET_INFO *cs; const char *save_csdir = charsets_dir; if (mysql->options.charset_dir) { #ifdef MYSQL_SERVER // Do not change charsets_dir, it is not thread safe. DBUG_ASSERT(false); #else charsets_dir = mysql->options.charset_dir; #endif } if (!mysql->net.vio) { /* Initialize with automatic OS character set detection. */ mysql_options(mysql, MYSQL_SET_CHARSET_NAME, cs_name); mysql_init_character_set(mysql); /* In case of automatic OS character set detection mysql_init_character_set changes mysql->options.charset_name from "auto" to the real character set name. Reset cs_name to the detected character set name, accordingly. */ cs_name = mysql->options.charset_name; } if (strlen(cs_name) < MY_CS_NAME_SIZE && (cs = get_charset_by_csname(cs_name, MY_CS_PRIMARY, MYF(0)))) { char buff[MY_CS_NAME_SIZE + 10]; charsets_dir = save_csdir; if (!mysql->net.vio) { /* If there is no connection yet we don't send "SET NAMES" query */ mysql->charset = cs; return 0; } /* Skip execution of "SET NAMES" for pre-4.1 servers */ if (mysql_get_server_version(mysql) < 40100) return 0; sprintf(buff, "SET NAMES %s", cs_name); if (!mysql_real_query(mysql, buff, (ulong)strlen(buff))) { mysql->charset = cs; } } else { char cs_dir_name[FN_REFLEN]; get_charsets_dir(cs_dir_name); set_mysql_extended_error(mysql, CR_CANT_READ_CHARSET, unknown_sqlstate, ER_CLIENT(CR_CANT_READ_CHARSET), cs_name, cs_dir_name); } charsets_dir = save_csdir; return mysql->net.last_errno; } /** Client authentication plugin that does native MySQL authentication using a 20-byte (4.1+) scramble @param vio the channel to operate on @param mysql the MYSQL structure to operate on @retval -1 ::CR_OK : Success @retval 1 ::CR_ERROR : error reading @retval 2012 ::CR_SERVER_HANDSHAKE_ERR : malformed handshake data */ static int native_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql) { int pkt_len; uchar *pkt; DBUG_TRACE; /* read the scramble */ if ((pkt_len = vio->read_packet(vio, &pkt)) < 0) return CR_ERROR; if (pkt_len != SCRAMBLE_LENGTH + 1) return CR_SERVER_HANDSHAKE_ERR; /* save it in MYSQL */ memcpy(mysql->scramble, pkt, SCRAMBLE_LENGTH); mysql->scramble[SCRAMBLE_LENGTH] = 0; if (mysql->passwd[0]) { char scrambled[SCRAMBLE_LENGTH + 1]; DBUG_PRINT("info", ("sending scramble")); scramble(scrambled, (char *)pkt, mysql->passwd); if (vio->write_packet(vio, (uchar *)scrambled, SCRAMBLE_LENGTH)) return CR_ERROR; } else { DBUG_PRINT("info", ("no password")); if (vio->write_packet(vio, 0, 0)) /* no password */ return CR_ERROR; } return CR_OK; } /** Client authentication plugin that does native MySQL authentication in a nonblocking way. @param[in] vio the channel to operate on @param[in] mysql the MYSQL structure to operate on @param[out] result CR_OK : Success, CR_ERROR : error reading, CR_SERVER_HANDSHAKE_ERR : malformed handshake data @retval NET_ASYNC_NOT_READY authentication not yet complete @retval NET_ASYNC_COMPLETE authentication done */ static net_async_status native_password_auth_client_nonblocking( MYSQL_PLUGIN_VIO *vio, MYSQL *mysql, int *result) { DBUG_TRACE; int io_result; uchar *pkt; mysql_async_auth *ctx = ASYNC_DATA(mysql)->connect_context->auth_context; switch (static_cast( ctx->client_auth_plugin_state)) { case client_auth_native_password_plugin_status::NATIVE_READING_PASSWORD: if (((MCPVIO_EXT *)vio)->mysql_change_user) { /* mysql_change_user_nonblocking not implemented yet. */ DBUG_ASSERT(false); } else { /* read the scramble */ net_async_status status = vio->read_packet_nonblocking(vio, &pkt, &io_result); if (status == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } if (io_result < 0) { *result = CR_ERROR; return NET_ASYNC_COMPLETE; } if (io_result != SCRAMBLE_LENGTH + 1) { *result = CR_SERVER_HANDSHAKE_ERR; return NET_ASYNC_COMPLETE; } /* save it in MYSQL */ memcpy(mysql->scramble, pkt, SCRAMBLE_LENGTH); mysql->scramble[SCRAMBLE_LENGTH] = 0; } ctx->client_auth_plugin_state = (int) client_auth_native_password_plugin_status::NATIVE_WRITING_RESPONSE; /* fallthrough */ case client_auth_native_password_plugin_status::NATIVE_WRITING_RESPONSE: if (mysql->passwd[0]) { char scrambled[SCRAMBLE_LENGTH + 1]; DBUG_PRINT("info", ("sending scramble")); scramble(scrambled, (char *)pkt, mysql->passwd); net_async_status status = vio->write_packet_nonblocking( vio, (uchar *)scrambled, SCRAMBLE_LENGTH, &io_result); if (status == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } if (io_result < 0) { *result = CR_ERROR; return NET_ASYNC_COMPLETE; } } else { DBUG_PRINT("info", ("no password")); net_async_status status = vio->write_packet_nonblocking( vio, 0, 0, &io_result); /* no password */ if (status == NET_ASYNC_NOT_READY) { return NET_ASYNC_NOT_READY; } if (io_result < 0) { *result = CR_ERROR; return NET_ASYNC_COMPLETE; } } break; default: assert(0); } *result = CR_OK; return NET_ASYNC_COMPLETE; } /* clang-format off */ /** @page page_protocol_connection_phase_authentication_methods_clear_text_password Clear text client plugin
  • This client side plugin is used by a number of server plugins: LDAP (*authentication_ldap_simple*) and PAM (*authentication_pam*) to name a few.
  • The client name is *mysql_clear_password*
  • Client side requires nothing from the server. But the server generates and sends a 20-byte @ref page_protocol_connection_phase_authentication_methods_native_password_authentication compatible scramble.
  • Client side sends the password in clear text to the server
@startuml Server->Client: 20 bytes of scramble to be ignored Client->Server: The clear text password. null terminated. @enduml @note Sending the scramble is not necessary for the clear text method, but, since the server always initiates the exchange by sending @ref page_protocol_connection_phase_packets_protocol_handshake and that one has a placeholder for authentication plugin dependent data the server does fill that space with a scramble should it come to pass that it will back down to @ref page_protocol_connection_phase_authentication_methods_native_password_authentication. This is also why it's OK no to specifically read this in @ref clear_password_auth_client since it's already read as a part of the initial exchange. @sa ::clear_password_auth_client, ::server_mpvio_write_packet, ::send_server_handshake_packet */ /* clang-format on */ /** The main function of the mysql_clear_password authentication plugin. */ static int clear_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql) { int res; /* send password in clear text */ res = vio->write_packet(vio, (const unsigned char *)mysql->passwd, (int)strlen(mysql->passwd) + 1); return res ? CR_ERROR : CR_OK; }