diff options
author | hcpp <hcpp@ydb.tech> | 2023-11-08 12:09:41 +0300 |
---|---|---|
committer | hcpp <hcpp@ydb.tech> | 2023-11-08 12:56:14 +0300 |
commit | a361f5b98b98b44ea510d274f6769164640dd5e1 (patch) | |
tree | c47c80962c6e2e7b06798238752fd3da0191a3f6 /contrib/libs/libmysql_r/sql-common/client.cc | |
parent | 9478806fde1f4d40bd5a45e7cbe77237dab613e9 (diff) | |
download | ydb-a361f5b98b98b44ea510d274f6769164640dd5e1.tar.gz |
metrics have been added
Diffstat (limited to 'contrib/libs/libmysql_r/sql-common/client.cc')
-rw-r--r-- | contrib/libs/libmysql_r/sql-common/client.cc | 8370 |
1 files changed, 8370 insertions, 0 deletions
diff --git a/contrib/libs/libmysql_r/sql-common/client.cc b/contrib/libs/libmysql_r/sql-common/client.cc new file mode 100644 index 0000000000..ce10a3afda --- /dev/null +++ b/contrib/libs/libmysql_r/sql-common/client.cc @@ -0,0 +1,8370 @@ +/* Copyright (c) 2003, 2019, Oracle and/or its affiliates. All rights reserved. + + This program is free software; you can redistribute it and/or modify + it under the terms of the GNU General Public License, version 2.0, + as published by the Free Software Foundation. + + This program is also distributed with certain software (including + but not limited to OpenSSL) that is licensed under separate terms, + as designated in a particular file or component or in included license + documentation. The authors of MySQL hereby grant you an additional + permission to link the program and your derivative works with the + separately licensed software that they have included with MySQL. + + Without limiting anything contained in the foregoing, this file, + which is part of C Driver for MySQL (Connector/C), is also subject to the + Universal FOSS Exception, version 1.0, a copy of which can be found at + http://oss.oracle.com/licenses/universal-foss-exception. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License, version 2.0, for more details. + + You should have received a copy of the GNU General Public License + along with this program; if not, write to the Free Software + Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */ + +/* + This file is included by both libmysql.c (the MySQL client C API) + and the mysqld server to connect to another MYSQL server. + + The differences for the two cases are: + + - Things that only works for the client: + - Trying to automaticly determinate user name if not supplied to + mysql_real_connect() + - Support for reading local file with LOAD DATA LOCAL + - SHARED memory handling + - Prepared statements + - Things that only works for the server + + In all other cases, the code should be idential for the client and + server. +*/ + +#include "my_config.h" + +#include <stdarg.h> +#include <sys/types.h> + +#include "m_ctype.h" +#include "m_string.h" +#include "my_sys.h" +#include "mysys_err.h" +#ifndef _WIN32 +#include <netdb.h> +#endif +#ifdef HAVE_NETINET_IN_H +#include <netinet/in.h> +#endif +#include <stdio.h> +#include <string> + +#include "client_async_authentication.h" +#include "errmsg.h" +#include "lex_string.h" +#include "map_helpers.h" +#include "my_byteorder.h" +#include "my_compiler.h" +#include "my_dbug.h" +#include "my_default.h" +#include "my_inttypes.h" +#include "my_io.h" +#include "my_loglevel.h" +#include "my_macros.h" +#include "my_psi_config.h" +#include "my_shm_defaults.h" +#include "mysql.h" +#include "mysql/client_authentication.h" +#include "mysql/plugin_auth_common.h" +#include "mysql/psi/mysql_memory.h" +#include "mysql/service_mysql_alloc.h" +#include "mysql_version.h" +#include "mysqld_error.h" +#include "template_utils.h" +#include "typelib.h" +#include "violite.h" + +#if !defined(_WIN32) +#include "my_thread.h" /* because of signal() */ +#endif /* !defined(_WIN32) */ + +#include <signal.h> +#include <sys/stat.h> +#include <time.h> + +#ifdef HAVE_PWD_H +#include <pwd.h> +#endif + +#ifdef HAVE_SYS_SELECT_H +#include <sys/select.h> +#endif + +#ifdef HAVE_SYS_UN_H +#include <sys/un.h> +#endif + +#ifndef _WIN32 +#include <errno.h> + +#define SOCKET_ERROR -1 +#endif + +#ifdef HAVE_OPENSSL +#include <openssl/x509v3.h> +#endif + +#include <mysql/client_plugin.h> +#include <new> + +#include "../libmysql/init_commands_array.h" +#include "../libmysql/mysql_trace.h" /* MYSQL_TRACE() instrumentation */ +#include "sql_common.h" +#ifdef MYSQL_SERVER +#error #include "sql/client_settings.h" +#else +#include "libmysql/client_settings.h" +#endif +#include "sql/log_event.h" /* Log_event_type */ +#include "sql/rpl_constants.h" /* mysql_binlog_XXX() */ + +using std::string; +using std::swap; + +#define STATE_DATA(M) \ + (NULL != (M) ? &(MYSQL_EXTENSION_PTR(M)->state_change) : NULL) + +#define ADD_INFO(M, element, type) \ + { \ + M = STATE_DATA(mysql); \ + M->info_list[type].head_node = \ + list_add(M->info_list[type].head_node, element); \ + } + +#define native_password_plugin_name "mysql_native_password" +#define caching_sha2_password_plugin_name "caching_sha2_password" + +PSI_memory_key key_memory_mysql_options; +PSI_memory_key key_memory_MYSQL_DATA; +PSI_memory_key key_memory_MYSQL; +PSI_memory_key key_memory_MYSQL_RES; +PSI_memory_key key_memory_MYSQL_ROW; +PSI_memory_key key_memory_MYSQL_state_change_info; +PSI_memory_key key_memory_MYSQL_HANDSHAKE; + +#if defined(_WIN32) +PSI_memory_key key_memory_create_shared_memory; +#endif /* _WIN32 */ + +#ifdef HAVE_PSI_INTERFACE +/* + This code is common to the client and server, + and also used in the server when server A connects to server B, + for example with replication. + Therefore, the code is also instrumented. +*/ + +static PSI_memory_info all_client_memory[] = { +#if defined(_WIN32) + {&key_memory_create_shared_memory, "create_shared_memory", 0, 0, + PSI_DOCUMENT_ME}, +#endif /* _WIN32 */ + + {&key_memory_mysql_options, "mysql_options", 0, 0, PSI_DOCUMENT_ME}, + {&key_memory_MYSQL_DATA, "MYSQL_DATA", 0, 0, PSI_DOCUMENT_ME}, + {&key_memory_MYSQL, "MYSQL", 0, 0, PSI_DOCUMENT_ME}, + {&key_memory_MYSQL_RES, "MYSQL_RES", 0, 0, PSI_DOCUMENT_ME}, + {&key_memory_MYSQL_ROW, "MYSQL_ROW", 0, 0, PSI_DOCUMENT_ME}, + {&key_memory_MYSQL_state_change_info, "MYSQL_STATE_CHANGE_INFO", 0, 0, + PSI_DOCUMENT_ME}, + {&key_memory_MYSQL_HANDSHAKE, "MYSQL_HANDSHAKE", 0, 0, PSI_DOCUMENT_ME}}; + +void init_client_psi_keys(void) { + const char *category = "client"; + int count; + + count = static_cast<int>(array_elements(all_client_memory)); + mysql_memory_register(category, all_client_memory, count); +} + +#endif /* HAVE_PSI_INTERFACE */ + +uint mysql_port = 0; +char *mysql_unix_port = 0; +const char *unknown_sqlstate = "HY000"; +const char *not_error_sqlstate = "00000"; +const char *cant_connect_sqlstate = "08001"; +#if defined(_WIN32) +static char *shared_memory_base_name = 0; +const char *def_shared_memory_base_name = default_shared_memory_base_name; +#endif + +ulong g_net_buffer_length = 8192; +ulong g_max_allowed_packet = 1024L * 1024L * 1024L; + +static void mysql_prune_stmt_list(MYSQL *mysql); +static int read_com_query_metadata(MYSQL *mysql, uchar *pos, ulong field_count); + +CHARSET_INFO *default_client_charset_info = &my_charset_latin1; + +/* Server error code and message */ +unsigned int mysql_server_last_errno; +char mysql_server_last_error[MYSQL_ERRMSG_SIZE]; +/* forward declaration */ +static int read_one_row(MYSQL *mysql, uint fields, MYSQL_ROW row, + ulong *lengths); +static net_async_status read_one_row_nonblocking(MYSQL *mysql, uint fields, + MYSQL_ROW row, ulong *lengths, + int *res); + +/** + Convert the connect timeout option to a timeout value for VIO + functions (vio_socket_connect() and vio_io_wait()). + + @param mysql Connection handle (client side). + + @return The timeout value in milliseconds, or -1 if no timeout. +*/ + +static int get_vio_connect_timeout(MYSQL *mysql) { + int timeout_ms; + uint timeout_sec; + + /* + A timeout of 0 means no timeout. Also, the connect_timeout + option value is in seconds, while VIO timeouts are measured + in milliseconds. Hence, check for a possible overflow. In + case of overflow, set to no timeout. + */ + timeout_sec = mysql->options.connect_timeout; + + if (!timeout_sec || (timeout_sec > INT_MAX / 1000)) + timeout_ms = -1; + else + timeout_ms = (int)(timeout_sec * 1000); + + return timeout_ms; +} + +#ifdef _WIN32 + +/** + Convert the connect timeout option to a timeout value for WIN32 + synchronization functions. + + @remark Specific for WIN32 connection methods shared memory and + named pipe. + + @param mysql Connection handle (client side). + + @return The timeout value in milliseconds, or INFINITE if no timeout. +*/ + +static DWORD get_win32_connect_timeout(MYSQL *mysql) { + DWORD timeout_ms; + uint timeout_sec; + + /* + A timeout of 0 means no timeout. Also, the connect_timeout + option value is in seconds, while WIN32 timeouts are in + milliseconds. Hence, check for a possible overflow. In case + of overflow, set to no timeout. + */ + timeout_sec = mysql->options.connect_timeout; + + if (!timeout_sec || (timeout_sec > INT_MAX / 1000)) + timeout_ms = INFINITE; + else + timeout_ms = (DWORD)(timeout_sec * 1000); + + return timeout_ms; +} + +#endif + +/** + Set the internal error message to mysql handler + + @param mysql connection handle (client side) + @param errcode CR_ error code, passed to ER macro to get + error text + @param sqlstate SQL standard sqlstate +*/ + +void set_mysql_error(MYSQL *mysql, int errcode, const char *sqlstate) { + NET *net; + DBUG_ENTER("set_mysql_error"); + DBUG_PRINT("enter", ("error :%d '%s'", errcode, ER_CLIENT(errcode))); + DBUG_ASSERT(mysql != 0); + + if (mysql) { + net = &mysql->net; + net->last_errno = errcode; + my_stpcpy(net->last_error, ER_CLIENT(errcode)); + my_stpcpy(net->sqlstate, sqlstate); + MYSQL_TRACE(ERROR, mysql, ()); + } else { + mysql_server_last_errno = errcode; + my_stpcpy(mysql_server_last_error, ER_CLIENT(errcode)); + } + DBUG_VOID_RETURN; +} + +/** + Is this NET instance initialized? + @c my_net_init() and net_end() + */ + +static bool my_net_is_inited(NET *net) { return net->buff != NULL; } + +/** + Clear possible error state of struct NET + + @param net clear the state of the argument +*/ + +void net_clear_error(NET *net) { + net->last_errno = 0; + net->last_error[0] = '\0'; + my_stpcpy(net->sqlstate, not_error_sqlstate); +} + +/** + Set an error message on the client. + + @param mysql connection handle + @param errcode CR_* errcode, for client errors + @param sqlstate SQL standard sql state, unknown_sqlstate for the + majority of client errors. + @param format error message template, in sprintf format + @param ... variable number of arguments +*/ + +void set_mysql_extended_error(MYSQL *mysql, int errcode, const char *sqlstate, + const char *format, ...) { + NET *net; + va_list args; + DBUG_ENTER("set_mysql_extended_error"); + DBUG_PRINT("enter", ("error :%d '%s'", errcode, format)); + DBUG_ASSERT(mysql != 0); + + net = &mysql->net; + net->last_errno = errcode; + va_start(args, format); + vsnprintf(net->last_error, sizeof(net->last_error) - 1, format, args); + va_end(args); + my_stpcpy(net->sqlstate, sqlstate); + + MYSQL_TRACE(ERROR, mysql, ()); + + DBUG_VOID_RETURN; +} + +/* + Create a named pipe connection +*/ + +#ifdef _WIN32 + +static HANDLE create_named_pipe(MYSQL *mysql, DWORD connect_timeout, + const char **arg_host, + const char **arg_unix_socket) { + HANDLE hPipe = INVALID_HANDLE_VALUE; + char pipe_name[1024]; + DWORD dwMode; + int i; + bool testing_named_pipes = 0; + const char *host = *arg_host, *unix_socket = *arg_unix_socket; + + if (!unix_socket || (unix_socket)[0] == 0x00) unix_socket = mysql_unix_port; + if (!host || !strcmp(host, LOCAL_HOST)) host = LOCAL_HOST_NAMEDPIPE; + + pipe_name[sizeof(pipe_name) - 1] = 0; /* Safety if too long string */ + strxnmov(pipe_name, sizeof(pipe_name) - 1, "\\\\.\\pipe\\", unix_socket, + NullS); + + DBUG_PRINT("info", ("Server name: '%s'. Named Pipe: %s", host, unix_socket)); + + for (i = 0; i < 100; i++) /* Don't retry forever */ + { + if ((hPipe = CreateFile(pipe_name, + FILE_READ_ATTRIBUTES | FILE_READ_DATA | + FILE_WRITE_ATTRIBUTES | FILE_WRITE_DATA, + 0, NULL, OPEN_EXISTING, + FILE_FLAG_OVERLAPPED | SECURITY_SQOS_PRESENT | + SECURITY_IDENTIFICATION, + NULL)) != INVALID_HANDLE_VALUE) + break; + if (GetLastError() != ERROR_PIPE_BUSY) { + set_mysql_extended_error(mysql, CR_NAMEDPIPEOPEN_ERROR, unknown_sqlstate, + ER_CLIENT(CR_NAMEDPIPEOPEN_ERROR), host, + unix_socket, (ulong)GetLastError()); + return INVALID_HANDLE_VALUE; + } + /* wait for for an other instance */ + if (!WaitNamedPipe(pipe_name, connect_timeout)) { + set_mysql_extended_error(mysql, CR_NAMEDPIPEWAIT_ERROR, unknown_sqlstate, + ER_CLIENT(CR_NAMEDPIPEWAIT_ERROR), host, + unix_socket, (ulong)GetLastError()); + return INVALID_HANDLE_VALUE; + } + } + if (hPipe == INVALID_HANDLE_VALUE) { + set_mysql_extended_error(mysql, CR_NAMEDPIPEOPEN_ERROR, unknown_sqlstate, + ER_CLIENT(CR_NAMEDPIPEOPEN_ERROR), host, + unix_socket, (ulong)GetLastError()); + return INVALID_HANDLE_VALUE; + } + dwMode = PIPE_READMODE_BYTE | PIPE_WAIT; + if (!SetNamedPipeHandleState(hPipe, &dwMode, NULL, NULL)) { + CloseHandle(hPipe); + set_mysql_extended_error(mysql, CR_NAMEDPIPESETSTATE_ERROR, + unknown_sqlstate, + ER_CLIENT(CR_NAMEDPIPESETSTATE_ERROR), host, + unix_socket, (ulong)GetLastError()); + return INVALID_HANDLE_VALUE; + } + *arg_host = host; + *arg_unix_socket = unix_socket; /* connect arg */ + return (hPipe); +} +#endif + +/* + Create new shared memory connection, return handler of connection + + @param mysql Pointer of mysql structure + @param net Pointer of net structure + @param connect_timeout Timeout of connection (in milliseconds) + + @return HANDLE to the shared memory area. +*/ + +#if defined(_WIN32) +static HANDLE create_shared_memory(MYSQL *mysql, NET *net, + DWORD connect_timeout) { + ulong smem_buffer_length = shared_memory_buffer_length + 4; + /* + event_connect_request is event object for start connection actions + event_connect_answer is event object for confirm, that server put data + handle_connect_file_map is file-mapping object, use for create shared + memory + handle_connect_map is pointer on shared memory + handle_map is pointer on shared memory for client + event_server_wrote, + event_server_read, + event_client_wrote, + event_client_read are events for transfer data between server and client + handle_file_map is file-mapping object, use for create shared memory + */ + HANDLE event_connect_request = NULL; + HANDLE event_connect_answer = NULL; + HANDLE handle_connect_file_map = NULL; + char *handle_connect_map = NULL; + + char *handle_map = NULL; + HANDLE event_server_wrote = NULL; + HANDLE event_server_read = NULL; + HANDLE event_client_wrote = NULL; + HANDLE event_client_read = NULL; + HANDLE event_conn_closed = NULL; + HANDLE handle_file_map = NULL; + HANDLE connect_named_mutex = NULL; + ulong connect_number; + char connect_number_char[22], *p; + char *tmp = NULL; + char *suffix_pos; + DWORD error_allow = 0; + DWORD error_code = 0; + DWORD event_access_rights = SYNCHRONIZE | EVENT_MODIFY_STATE; + char *shared_memory_base_name = mysql->options.shared_memory_base_name; + static const char *name_prefixes[] = {"", "Global\\"}; + const char *prefix; + int i; + + /* + If this is NULL, somebody freed the MYSQL* options. mysql_close() + is a good candidate. We don't just silently (re)set it to + def_shared_memory_base_name as that would create really confusing/buggy + behavior if the user passed in a different name on the command-line or + in a my.cnf. + */ + DBUG_ASSERT(shared_memory_base_name != NULL); + + /* + get enough space base-name + '_' + longest suffix we might ever send + */ + if (!(tmp = (char *)my_malloc(key_memory_create_shared_memory, + strlen(shared_memory_base_name) + 32L, + MYF(MY_FAE)))) + goto err; + + /* + The name of event and file-mapping events create agree next rule: + shared_memory_base_name+unique_part + Where: + shared_memory_base_name is unique value for each server + unique_part is uniquel value for each object (events and file-mapping) + */ + for (i = 0; i < array_elements(name_prefixes); i++) { + prefix = name_prefixes[i]; + suffix_pos = strxmov(tmp, prefix, shared_memory_base_name, "_", NullS); + my_stpcpy(suffix_pos, "CONNECT_REQUEST"); + event_connect_request = OpenEvent(event_access_rights, false, tmp); + if (event_connect_request) { + break; + } + } + if (!event_connect_request) { + error_allow = CR_SHARED_MEMORY_CONNECT_REQUEST_ERROR; + goto err; + } + my_stpcpy(suffix_pos, "CONNECT_ANSWER"); + if (!(event_connect_answer = OpenEvent(event_access_rights, false, tmp))) { + error_allow = CR_SHARED_MEMORY_CONNECT_ANSWER_ERROR; + goto err; + } + my_stpcpy(suffix_pos, "CONNECT_DATA"); + if (!(handle_connect_file_map = + OpenFileMapping(FILE_MAP_WRITE, false, tmp))) { + error_allow = CR_SHARED_MEMORY_CONNECT_FILE_MAP_ERROR; + goto err; + } + if (!(handle_connect_map = static_cast<char *>(MapViewOfFile( + handle_connect_file_map, FILE_MAP_WRITE, 0, 0, sizeof(DWORD))))) { + error_allow = CR_SHARED_MEMORY_CONNECT_MAP_ERROR; + goto err; + } + + my_stpcpy(suffix_pos, "CONNECT_NAMED_MUTEX"); + connect_named_mutex = OpenMutex(SYNCHRONIZE, false, tmp); + if (connect_named_mutex == NULL) { + error_allow = CR_SHARED_MEMORY_CONNECT_SET_ERROR; + goto err; + } + + if (WaitForSingleObject(connect_named_mutex, connect_timeout) != + WAIT_OBJECT_0) { + error_allow = CR_SHARED_MEMORY_CONNECT_ABANDONED_ERROR; + goto err; + } + + /* Send to server request of connection */ + if (!SetEvent(event_connect_request)) { + error_allow = CR_SHARED_MEMORY_CONNECT_SET_ERROR; + goto err; + } + + /* Wait of answer from server */ + if (WaitForSingleObject(event_connect_answer, connect_timeout) != + WAIT_OBJECT_0) { + error_allow = CR_SHARED_MEMORY_CONNECT_ABANDONED_ERROR; + goto err; + } + + /* Get number of connection */ + connect_number = uint4korr(handle_connect_map); /*WAX2*/ + + ReleaseMutex(connect_named_mutex); + CloseHandle(connect_named_mutex); + connect_named_mutex = NULL; + + p = int10_to_str(connect_number, connect_number_char, 10); + + /* + The name of event and file-mapping events create agree next rule: + shared_memory_base_name+unique_part+number_of_connection + + Where: + shared_memory_base_name is uniquel value for each server + unique_part is uniquel value for each object (events and file-mapping) + number_of_connection is number of connection between server and client + */ + suffix_pos = strxmov(tmp, prefix, shared_memory_base_name, "_", + connect_number_char, "_", NullS); + my_stpcpy(suffix_pos, "DATA"); + if ((handle_file_map = OpenFileMapping(FILE_MAP_WRITE, false, tmp)) == NULL) { + error_allow = CR_SHARED_MEMORY_FILE_MAP_ERROR; + goto err2; + } + if ((handle_map = static_cast<char *>(MapViewOfFile( + handle_file_map, FILE_MAP_WRITE, 0, 0, smem_buffer_length))) == + NULL) { + error_allow = CR_SHARED_MEMORY_MAP_ERROR; + goto err2; + } + + my_stpcpy(suffix_pos, "SERVER_WROTE"); + if ((event_server_wrote = OpenEvent(event_access_rights, false, tmp)) == + NULL) { + error_allow = CR_SHARED_MEMORY_EVENT_ERROR; + goto err2; + } + + my_stpcpy(suffix_pos, "SERVER_READ"); + if ((event_server_read = OpenEvent(event_access_rights, false, tmp)) == + NULL) { + error_allow = CR_SHARED_MEMORY_EVENT_ERROR; + goto err2; + } + + my_stpcpy(suffix_pos, "CLIENT_WROTE"); + if ((event_client_wrote = OpenEvent(event_access_rights, false, tmp)) == + NULL) { + error_allow = CR_SHARED_MEMORY_EVENT_ERROR; + goto err2; + } + + my_stpcpy(suffix_pos, "CLIENT_READ"); + if ((event_client_read = OpenEvent(event_access_rights, false, tmp)) == + NULL) { + error_allow = CR_SHARED_MEMORY_EVENT_ERROR; + goto err2; + } + + my_stpcpy(suffix_pos, "CONNECTION_CLOSED"); + if ((event_conn_closed = OpenEvent(event_access_rights, false, tmp)) == + NULL) { + error_allow = CR_SHARED_MEMORY_EVENT_ERROR; + goto err2; + } + /* + Set event that server should send data + */ + SetEvent(event_server_read); + +err2: + if (error_allow == 0) { + net->vio = vio_new_win32shared_memory( + handle_file_map, handle_map, event_server_wrote, event_server_read, + event_client_wrote, event_client_read, event_conn_closed); + } else { + error_code = GetLastError(); + if (event_server_read) CloseHandle(event_server_read); + if (event_server_wrote) CloseHandle(event_server_wrote); + if (event_client_read) CloseHandle(event_client_read); + if (event_client_wrote) CloseHandle(event_client_wrote); + if (event_conn_closed) CloseHandle(event_conn_closed); + if (handle_map) UnmapViewOfFile(handle_map); + if (handle_file_map) CloseHandle(handle_file_map); + } +err: + my_free(tmp); + if (error_allow) error_code = GetLastError(); + if (event_connect_request) CloseHandle(event_connect_request); + if (event_connect_answer) CloseHandle(event_connect_answer); + if (handle_connect_map) UnmapViewOfFile(handle_connect_map); + if (handle_connect_file_map) CloseHandle(handle_connect_file_map); + if (error_allow) { + if (connect_named_mutex) { + ReleaseMutex(connect_named_mutex); + CloseHandle(connect_named_mutex); + } + + if (error_allow == CR_SHARED_MEMORY_EVENT_ERROR) + set_mysql_extended_error(mysql, error_allow, unknown_sqlstate, + ER_CLIENT(error_allow), suffix_pos, error_code); + else + set_mysql_extended_error(mysql, error_allow, unknown_sqlstate, + ER_CLIENT(error_allow), error_code); + return (INVALID_HANDLE_VALUE); + } + return (handle_map); +} +#endif + +/* + Free all memory acquired to store state change information. +*/ +static void free_state_change_info(MYSQL_EXTENSION *ext) { + STATE_INFO *info; + int i; + + if (ext) + info = &ext->state_change; + else + return; + + for (i = SESSION_TRACK_SYSTEM_VARIABLES; i <= SESSION_TRACK_END; i++) { + if (list_length(info->info_list[i].head_node) != 0) { + list_free(info->info_list[i].head_node, (uint)0); + } + } + memset(info, 0, sizeof(STATE_INFO)); +} + +/** + Helper function to check if the buffer has at least bytes remaining + + If the buffer is too small it raises CR_MALFORMED_PACKET_ERROR. + + @param mysql the handle that has the buffer + @param packet the current position in the buffer + @param packet_length the size of the packet + @param bytes the bytes that we want available + @retval true the buffer has that many bytes + @retval false the buffer has less bytes remaining +*/ +inline bool buffer_check_remaining(MYSQL *mysql, uchar *packet, + ulong packet_length, size_t bytes) { + size_t remaining_bytes = packet_length - (packet - mysql->net.read_pos); + if (remaining_bytes < bytes) { + set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); + return false; + } + return true; +} + +/* + Helper function to safely read a variable size from a buffer. + If the buffer is too small it raises CR_MALFORMED_PACKET_ERROR + and sets is_error to true. + Otherwise it sets is_error to false and calls @ref inet_field_length_ll. + + @sa @ref net_field_length_ll + + @param mysql the handle to return an error in + @param [in,out] packet pointer to the buffer to read the length from + @param packet_length remining bytes in packet + @param [out] is_error set to true if the buffer contains no room for a + full length, false otherwise. + @return the size read. +*/ +inline my_ulonglong net_field_length_ll_safe(MYSQL *mysql, uchar **packet, + ulong packet_length, + bool *is_error) { + size_t sizeof_len = net_field_length_size(*packet); + if (!buffer_check_remaining(mysql, *packet, packet_length, sizeof_len)) { + *is_error = true; + return 0; + } + + *is_error = false; + return net_field_length_ll(packet); +} + +/** + Read Ok packet along with the server state change information. +*/ +void read_ok_ex(MYSQL *mysql, ulong length) { + size_t total_len, len; + uchar *pos, *saved_pos; + my_ulonglong affected_rows, insert_id; + char *db; + char *data_str; + + CHARSET_INFO *saved_cs; + bool is_charset; + + STATE_INFO *info = NULL; + enum enum_session_state_type type; + LIST *element = NULL; + LEX_STRING *data = NULL; + bool is_error; + + pos = mysql->net.read_pos + 1; + + affected_rows = net_field_length_ll_safe(mysql, &pos, length, + &is_error); /* affected rows */ + if (is_error) return; + insert_id = + net_field_length_ll_safe(mysql, &pos, length, &is_error); /* insert id */ + if (is_error) return; + + /* + The following check ensures that we skip the assignment for the + above read fields (i.e. affected_rows and insert_id) wherein the + EOF packets are deprecated and the server sends OK packet instead + with a packet header of 0xFE (254) to identify it as an EOF packet. + We ignore this assignment as the valid contents of EOF packet include + packet marker, server status and warning count only. However, we would + assign these values to the connection handle if it was an OK packet + with a packet header of 0x00. + */ + + if (!((mysql->server_capabilities & CLIENT_DEPRECATE_EOF) && + mysql->net.read_pos[0] == 254)) { + mysql->affected_rows = affected_rows; + mysql->insert_id = insert_id; + + DBUG_PRINT("info", ("affected_rows: %lu insert_id: %lu", + (ulong)mysql->affected_rows, (ulong)mysql->insert_id)); + } + + if (!buffer_check_remaining(mysql, pos, length, 2)) return; + /* server status */ + mysql->server_status = uint2korr(pos); + pos += 2; + + if (protocol_41(mysql)) { + if (!buffer_check_remaining(mysql, pos, length, 2)) return; + mysql->warning_count = uint2korr(pos); + pos += 2; + } else + mysql->warning_count = 0; /* MySQL 4.0 protocol */ + + DBUG_PRINT("info", ("status: %u warning_count: %u", mysql->server_status, + mysql->warning_count)); + if (mysql->server_capabilities & CLIENT_SESSION_TRACK) { + free_state_change_info(static_cast<MYSQL_EXTENSION *>(mysql->extension)); + + if (pos < mysql->net.read_pos + length) { + /* get the info field */ + size_t length_msg_member = + (size_t)net_field_length_ll_safe(mysql, &pos, length, &is_error); + if (is_error) return; + mysql->info = (length_msg_member ? (char *)pos : NULL); + pos += (length_msg_member); + + /* read session state changes info */ + if (mysql->server_status & SERVER_SESSION_STATE_CHANGED) { + saved_pos = pos; + total_len = + (size_t)net_field_length_ll_safe(mysql, &pos, length, &is_error); + if (is_error) return; + /* ensure that mysql->info is zero-terminated */ + if (mysql->info) *saved_pos = 0; + + while (total_len > 0) { + saved_pos = pos; + type = (enum enum_session_state_type)net_field_length_ll_safe( + mysql, &pos, length, &is_error); + if (is_error) return; + switch (type) { + case SESSION_TRACK_SYSTEM_VARIABLES: + /* Move past the total length of the changed entity. */ + (void)net_field_length_ll_safe(mysql, &pos, length, &is_error); + if (is_error) return; + + /* Name of the system variable. */ + len = (size_t)net_field_length_ll_safe(mysql, &pos, length, + &is_error); + if (is_error) return; + if (!buffer_check_remaining(mysql, pos, length, len)) return; + + if (!my_multi_malloc(key_memory_MYSQL_state_change_info, MYF(0), + &element, sizeof(LIST), &data, + sizeof(LEX_STRING), &data_str, len, NullS)) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + return; + } + + data->str = data_str; + memcpy(data->str, (char *)pos, len); + data->length = len; + pos += len; + + element->data = data; + ADD_INFO(info, element, SESSION_TRACK_SYSTEM_VARIABLES); + + /* + Check if the changed variable was charset. In that case we need + to update mysql->charset. + */ + if (!strncmp(data->str, "character_set_client", data->length)) + is_charset = 1; + else + is_charset = 0; + + /* Value of the system variable. */ + len = (size_t)net_field_length_ll_safe(mysql, &pos, length, + &is_error); + if (is_error) return; + if (!buffer_check_remaining(mysql, pos, length, len)) return; + + if (!my_multi_malloc(key_memory_MYSQL_state_change_info, MYF(0), + &element, sizeof(LIST), &data, + sizeof(LEX_STRING), &data_str, len, NullS)) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + return; + } + + data->str = data_str; + memcpy(data->str, (char *)pos, len); + data->length = len; + pos += len; + + element->data = data; + ADD_INFO(info, element, SESSION_TRACK_SYSTEM_VARIABLES); + + if (is_charset == 1) { + char charset_name[MY_CS_NAME_SIZE * 8]; // MY_CS_BUFFER_SIZE + size_t length = + std::min(data->length, sizeof(charset_name) - 1); + saved_cs = mysql->charset; + + memcpy(charset_name, data->str, length); + charset_name[length] = 0; + + if (!(mysql->charset = get_charset_by_csname( + charset_name, MY_CS_PRIMARY, MYF(MY_WME)))) { + DBUG_PRINT( + "warning", + ("session tracker supplied %s is not a valid charset." + " Keeping the old one.", + charset_name)); + mysql->charset = saved_cs; + } + } + break; + case SESSION_TRACK_TRANSACTION_STATE: + case SESSION_TRACK_TRANSACTION_CHARACTERISTICS: + case SESSION_TRACK_SCHEMA: + + /* Move past the total length of the changed entity. */ + (void)net_field_length_ll_safe(mysql, &pos, length, &is_error); + if (is_error) return; + len = (size_t)net_field_length_ll_safe(mysql, &pos, length, + &is_error); + if (is_error) return; + if (!buffer_check_remaining(mysql, pos, length, len)) return; + + if (!my_multi_malloc(key_memory_MYSQL_state_change_info, MYF(0), + &element, sizeof(LIST), &data, + sizeof(LEX_STRING), &data_str, len, NullS)) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + return; + } + + data->str = data_str; + memcpy(data->str, (char *)pos, len); + data->length = len; + pos += len; + + element->data = data; + ADD_INFO(info, element, type); + + if (type == SESSION_TRACK_SCHEMA) { + if (!(db = (char *)my_malloc(key_memory_MYSQL_state_change_info, + data->length + 1, MYF(MY_WME)))) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + return; + } + + if (mysql->db) my_free(mysql->db); + + memcpy(db, data->str, data->length); + db[data->length] = '\0'; + mysql->db = db; + } + + break; + case SESSION_TRACK_GTIDS: + /* Move past the total length of the changed entity. */ + (void)net_field_length_ll_safe(mysql, &pos, length, &is_error); + if (is_error) return; + + /* read (and ignore for now) the GTIDS encoding specification code + */ + (void)net_field_length_ll_safe(mysql, &pos, length, &is_error); + if (is_error) return; + + /* + For now we ignore the encoding specification, since only one + is supported. In the future the decoding of what comes next + depends on the specification code. + */ + + /* read the length of the encoded string. */ + len = (size_t)net_field_length_ll_safe(mysql, &pos, length, + &is_error); + if (is_error) return; + if (!buffer_check_remaining(mysql, pos, length, len)) return; + + if (!my_multi_malloc(key_memory_MYSQL_state_change_info, MYF(0), + &element, sizeof(LIST), &data, + sizeof(LEX_STRING), &data_str, len, NullS)) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + return; + } + + data->str = data_str; + memcpy(data->str, (char *)pos, len); + data->length = len; + pos += len; + + element->data = data; + ADD_INFO(info, element, SESSION_TRACK_GTIDS); + break; + case SESSION_TRACK_STATE_CHANGE: + /* Get the length of the boolean tracker */ + len = (size_t)net_field_length_ll_safe(mysql, &pos, length, + &is_error); + if (is_error) return; + + /* length for boolean tracker is always 1 */ + DBUG_ASSERT(len == 1); + if (!buffer_check_remaining(mysql, pos, length, len)) return; + + if (!my_multi_malloc(key_memory_MYSQL_state_change_info, MYF(0), + &element, sizeof(LIST), &data, + sizeof(LEX_STRING), &data_str, len, NullS)) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + return; + } + + data->str = data_str; + memcpy(data->str, (char *)pos, len); + data->length = len; + pos += len; + + element->data = data; + ADD_INFO(info, element, SESSION_TRACK_STATE_CHANGE); + + break; + default: + DBUG_ASSERT(type <= SESSION_TRACK_END); + /* + Unknown/unsupported type received, get the total length and move + past it. + */ + + len = (size_t)net_field_length_ll_safe(mysql, &pos, length, + &is_error); + if (is_error) return; + pos += len; + break; + } + total_len -= (pos - saved_pos); + } + if (info) { + int itype; + for (itype = SESSION_TRACK_BEGIN; itype < SESSION_TRACK_END; + itype++) { + if (info->info_list[itype].head_node) { + info->info_list[itype].current_node = + info->info_list[itype].head_node = + list_reverse(info->info_list[itype].head_node); + } + } + } + } + } + } else if (pos < mysql->net.read_pos + length && net_field_length(&pos)) + mysql->info = (char *)pos; + else + mysql->info = NULL; + return; +} + +/* Helper for cli_safe_read and cli_safe_read_nonblocking */ +static ulong cli_safe_read_with_ok_complete(MYSQL *mysql, bool parse_ok, + bool *is_data_packet, ulong len); + +/** + Read a packet from server in asynchronous way. This function can return + without completly reading the packet, in such a case call this function + again until complete packet is read. + + @param[in] mysql connection handle + @param[in] parse_ok if set to true then parse OK packet if it + was sent by server + @param[out] is_data_packet if set to true then the packet received + was a "data packet". + @param[out] res The length of the packet that was read or + packet_error in case of error. + + @retval NET_ASYNC_NOT_READY packet was not completely read + @retval NET_ASYNC_COMPLETE finished reading packet +*/ +net_async_status cli_safe_read_with_ok_nonblocking(MYSQL *mysql, bool parse_ok, + bool *is_data_packet, + ulong *res) { + NET *net = &mysql->net; + NET_ASYNC *net_async = NET_ASYNC_DATA(net); + ulong len = 0, complen = 0; + DBUG_ENTER(__func__); + + if (net_async->async_multipacket_read_started == false) { + net_async->async_multipacket_read_started = true; + net_async->async_multipacket_read_saved_whereb = net->where_b; + net_async->async_multipacket_read_total_len = 0; + } + + if (net->vio != 0) { + net_async_status status = my_net_read_nonblocking(net, &len, &complen); + if (len != packet_error) { + net_async->async_multipacket_read_total_len += len; + net->where_b += len; + } + + if (status == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + } + + net->where_b = net_async->async_multipacket_read_saved_whereb; + net->read_pos = net->buff + net->where_b; + + DBUG_PRINT("info", ("total nb read: %lu", + net_async->async_multipacket_read_total_len)); + *res = cli_safe_read_with_ok_complete( + mysql, parse_ok, is_data_packet, + net_async->async_multipacket_read_total_len); + + net_async->async_multipacket_read_started = false; + net_async->async_multipacket_read_saved_whereb = 0; + + DBUG_RETURN(NET_ASYNC_COMPLETE); +} + +/** + Its a non blocking version of cli_safe_read +*/ +net_async_status cli_safe_read_nonblocking(MYSQL *mysql, bool *is_data_packet, + ulong *res) { + return cli_safe_read_with_ok_nonblocking(mysql, 0, is_data_packet, res); +} + +/** + Read a packet from server. Give error message if socket was down + or packet is an error message + + @param[in] mysql connection handle + @param[in] parse_ok if set to true then parse OK packet + if it is received + @param[out] is_data_packet + if set to true then packet received is + a "data packet", that is not OK or ERR + packet or EOF in case of old servers + + @return The length of the packet that was read or packet_error in + case of error. In case of error its description is stored + in mysql handle. +*/ + +ulong cli_safe_read_with_ok(MYSQL *mysql, bool parse_ok, bool *is_data_packet) { + NET *net = &mysql->net; + ulong len = 0; + + MYSQL_TRACE(READ_PACKET, mysql, ()); + + if (is_data_packet) *is_data_packet = false; + + if (net->vio != 0) len = my_net_read(net); + return cli_safe_read_with_ok_complete(mysql, parse_ok, is_data_packet, len); +} + +ulong cli_safe_read_with_ok_complete(MYSQL *mysql, bool parse_ok, + bool *is_data_packet, ulong len) { + NET *net = &mysql->net; + DBUG_ENTER(__func__); + + if (len == packet_error || len == 0) { + char desc[VIO_DESCRIPTION_SIZE]; + vio_description(net->vio, desc); + DBUG_PRINT("error", + ("Wrong connection or packet. fd: %s len: %lu", desc, len)); +#ifdef MYSQL_SERVER + if (net->vio && (net->last_errno == ER_NET_READ_INTERRUPTED)) + DBUG_RETURN(packet_error); +#endif /*MYSQL_SERVER*/ + end_server(mysql); + set_mysql_error(mysql, + net->last_errno == ER_NET_PACKET_TOO_LARGE + ? CR_NET_PACKET_TOO_LARGE + : CR_SERVER_LOST, + unknown_sqlstate); + DBUG_RETURN(packet_error); + } + + MYSQL_TRACE(PACKET_RECEIVED, mysql, (len, net->read_pos)); + + if (net->read_pos[0] == 255) { + /* + After server reprts an error, usually it is ready to accept new commands + and we set stage to READY_FOR_COMMAND. This can be modified by the caller + of cli_safe_read(). + */ + MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); + + if (len > 3) { + uchar *pos = net->read_pos + 1; + net->last_errno = uint2korr(pos); + pos += 2; + len -= 2; + if (protocol_41(mysql) && pos[0] == '#') { + strmake(net->sqlstate, (char *)pos + 1, SQLSTATE_LENGTH); + pos += SQLSTATE_LENGTH + 1; + } else { + /* + The SQL state hasn't been received -- it should be reset to HY000 + (unknown error sql state). + */ + + my_stpcpy(net->sqlstate, unknown_sqlstate); + } + + (void)strmake(net->last_error, (char *)pos, + MY_MIN((uint)len, (uint)sizeof(net->last_error) - 1)); + } else + set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate); + /* + Cover a protocol design error: error packet does not + contain the server status. Therefore, the client has no way + to find out whether there are more result sets of + a multiple-result-set statement pending. Luckily, in 5.0 an + error always aborts execution of a statement, wherever it is + a multi-statement or a stored procedure, so it should be + safe to unconditionally turn off the flag here. + */ + mysql->server_status &= ~SERVER_MORE_RESULTS_EXISTS; + + DBUG_PRINT("error", ("Got error: %d/%s (%s)", net->last_errno, + net->sqlstate, net->last_error)); + DBUG_RETURN(packet_error); + } else { + /* if it is OK packet irrespective of new/old server */ + if (net->read_pos[0] == 0) { + if (parse_ok) { + read_ok_ex(mysql, len); + DBUG_RETURN(len); + } + } + /* + Now we have a data packet, unless it is OK packet starting with + 0xFE - we detect that case below. + */ + if (is_data_packet) *is_data_packet = true; + /* + For a packet starting with 0xFE detect if it is OK packet or a + huge data packet. Note that old servers do not send OK packets + starting with 0xFE. + */ + if ((mysql->server_capabilities & CLIENT_DEPRECATE_EOF) && + (net->read_pos[0] == 254)) { + /* detect huge data packet */ + if (len > MAX_PACKET_LENGTH) DBUG_RETURN(len); + /* otherwise we have OK packet starting with 0xFE */ + if (is_data_packet) *is_data_packet = false; + /* parse it if requested */ + if (parse_ok) read_ok_ex(mysql, len); + DBUG_RETURN(len); + } + /* for old client detect EOF packet */ + if (!(mysql->server_capabilities & CLIENT_DEPRECATE_EOF) && + (net->read_pos[0] == 254) && (len < 8)) { + if (is_data_packet) *is_data_packet = false; + } + } + DBUG_RETURN(len); +} + +/** + Read a packet from server. Give error message if connection was broken or + ERR packet was received. Detect if the packet received was an OK, ERR or + something else (a "data packet"). + + @param[in] mysql connection handle + @param[out] is_data_packet + if set to true then the packet received + was a "data packet". + + @retval The length of the packet that was read or packet_error in case of + error. In case of error its description is stored in mysql handle. +*/ +ulong cli_safe_read(MYSQL *mysql, bool *is_data_packet) { + return cli_safe_read_with_ok(mysql, 0, is_data_packet); +} + +void free_rows(MYSQL_DATA *cur) { + if (cur) { + free_root(cur->alloc, MYF(0)); + my_free(cur->alloc); + my_free(cur); + } +} + +bool cli_advanced_command(MYSQL *mysql, enum enum_server_command command, + const uchar *header, size_t header_length, + const uchar *arg, size_t arg_length, bool skip_check, + MYSQL_STMT *stmt) { + NET *net = &mysql->net; + bool result = 1; + bool stmt_skip = stmt ? stmt->state != MYSQL_STMT_INIT_DONE : false; + DBUG_ENTER("cli_advanced_command"); + + if (mysql->net.vio == 0) { /* Do reconnect if possible */ + if (mysql_reconnect(mysql) || stmt_skip) DBUG_RETURN(1); + } + /* turn off non blocking operations */ + if (!vio_is_blocking(mysql->net.vio)) + vio_set_blocking_flag(mysql->net.vio, true); + + if (mysql->status != MYSQL_STATUS_READY || + mysql->server_status & SERVER_MORE_RESULTS_EXISTS) { + DBUG_PRINT("error", ("state: %d", mysql->status)); + set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate); + DBUG_RETURN(1); + } + + net_clear_error(net); + mysql->info = 0; + mysql->affected_rows = ~(my_ulonglong)0; + /* + Do not check the socket/protocol buffer on COM_QUIT as the + result of a previous command might not have been read. This + can happen if a client sends a query but does not reap the + result before attempting to close the connection. + */ + net_clear(&mysql->net, (command != COM_QUIT)); + + MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); + MYSQL_TRACE(SEND_COMMAND, mysql, + (command, header_length, arg_length, header, arg)); + + /* + If auto-reconnect mode is enabled check if connection is still alive before + sending new command. Otherwise, send() might not notice that connection was + closed by the server (for example, due to KILL statement), and the fact that + connection is gone will be noticed only on attempt to read command's result, + when it is too late to reconnect. Note that such scenario can still occur if + connection gets killed after this check but before command is sent to + server. But this should be rare. + */ + if ((command != COM_QUIT) && mysql->reconnect && !vio_is_connected(net->vio)) + net->error = 2; + + if (net_write_command(net, (uchar)command, header, header_length, arg, + arg_length)) { + DBUG_PRINT("error", + ("Can't send command to server. Error: %d", socket_errno)); + if (net->last_errno == ER_NET_PACKET_TOO_LARGE) { + set_mysql_error(mysql, CR_NET_PACKET_TOO_LARGE, unknown_sqlstate); + goto end; + } + end_server(mysql); + if (mysql_reconnect(mysql) || stmt_skip) goto end; + + MYSQL_TRACE(SEND_COMMAND, mysql, + (command, header_length, arg_length, header, arg)); + if (net_write_command(net, (uchar)command, header, header_length, arg, + arg_length)) { + set_mysql_error(mysql, CR_SERVER_GONE_ERROR, unknown_sqlstate); + goto end; + } + } + + MYSQL_TRACE(PACKET_SENT, mysql, (header_length + arg_length)); + +#if defined(CLIENT_PROTOCOL_TRACING) + switch (command) { + case COM_STMT_PREPARE: + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_PS_DESCRIPTION); + break; + + case COM_STMT_FETCH: + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_ROW); + break; + + /* + No server reply is expected after these commands so we reamin ready + for the next command. + */ + case COM_STMT_SEND_LONG_DATA: + case COM_STMT_CLOSE: + case COM_REGISTER_SLAVE: + case COM_QUIT: + break; + + /* + These replication commands are not supported and we bail out + by pretending that connection has been closed. + */ + case COM_BINLOG_DUMP: + case COM_BINLOG_DUMP_GTID: + case COM_TABLE_DUMP: + MYSQL_TRACE(DISCONNECTED, mysql, ()); + break; + + /* + After COM_CHANGE_USER a regular authentication exchange + is performed. + */ + case COM_CHANGE_USER: + MYSQL_TRACE_STAGE(mysql, AUTHENTICATE); + break; + + /* + Server replies to COM_STATISTICS with a single packet + containing a string with statistics information. + */ + case COM_STATISTICS: + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_PACKET); + break; + + /* + For all other commands we expect server to send regular reply which + is either OK, ERR or a result-set header. + */ + default: + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); + break; + } +#endif + + result = 0; + if (!skip_check) { + result = ((mysql->packet_length = cli_safe_read_with_ok(mysql, 1, NULL)) == + packet_error + ? 1 + : 0); + +#if defined(CLIENT_PROTOCOL_TRACING) + /* + Return to READY_FOR_COMMAND protocol stage in case server reports error + or sends OK packet. + */ + if (result || mysql->net.read_pos[0] == 0x00) + MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); +#endif + } + +end: + DBUG_PRINT("exit", ("result: %d", result)); + DBUG_RETURN(result); +} + +net_async_status cli_advanced_command_nonblocking( + MYSQL *mysql, enum enum_server_command command, const uchar *header, + ulong header_length, const uchar *arg, ulong arg_length, bool skip_check, + MYSQL_STMT *stmt, bool *ret) { + NET *net = &mysql->net; + NET_ASYNC *net_async = NET_ASYNC_DATA(net); + bool result = 1; + *ret = result; + bool stmt_skip = stmt ? stmt->state != MYSQL_STMT_INIT_DONE : false; + DBUG_ENTER(__func__); + DBUG_DUMP("sending", header, header_length); + if (arg && arg_length) { + DBUG_DUMP("sending arg", arg, arg_length); + } + + if (mysql->net.vio == 0) { + set_mysql_error(mysql, CR_SERVER_GONE_ERROR, unknown_sqlstate); + goto end; + } + if (net_async->async_send_command_status == NET_ASYNC_SEND_COMMAND_IDLE) { + if (vio_is_blocking(mysql->net.vio)) { + vio_set_blocking_flag(net->vio, false); + } + + if (mysql->status != MYSQL_STATUS_READY || + mysql->server_status & SERVER_MORE_RESULTS_EXISTS) { + DBUG_PRINT("error", ("state: %d", mysql->status)); + set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate); + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + + net_clear_error(net); + mysql->info = 0; + mysql->affected_rows = ~(my_ulonglong)0; + /* + Do not check the socket/protocol buffer on COM_QUIT as the + result of a previous command might not have been read. This + can happen if a client sends a query but does not reap + the result before attempting to close the connection. + */ + DBUG_ASSERT(command <= COM_END); + net_clear(&mysql->net, (command != COM_QUIT)); + net_async->async_send_command_status = NET_ASYNC_SEND_COMMAND_WRITE_COMMAND; + } + + MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); + if (net_async->async_send_command_status == + NET_ASYNC_SEND_COMMAND_WRITE_COMMAND) { + bool err; + MYSQL_TRACE(SEND_COMMAND, mysql, + (command, header_length, arg_length, header, arg)); + net_async_status status = net_write_command_nonblocking( + net, (uchar)command, header, header_length, arg, arg_length, &err); + if (status == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + if (err) { + DBUG_PRINT("error", + ("Can't send command to server. Error: %d", socket_errno)); + if (net->last_errno == ER_NET_PACKET_TOO_LARGE) { + set_mysql_error(mysql, CR_NET_PACKET_TOO_LARGE, unknown_sqlstate); + goto end; + } + end_server(mysql); + /* reset net_async to null as its reference has been freed */ + net_async = nullptr; + if (stmt_skip) goto end; + set_mysql_error(mysql, CR_SERVER_GONE_ERROR, unknown_sqlstate); + goto end; + } + MYSQL_TRACE(PACKET_SENT, mysql, (header_length + arg_length)); + if (skip_check) { + result = 0; + goto end; + } else { + net_async->async_send_command_status = NET_ASYNC_SEND_COMMAND_READ_STATUS; + } + } + + if (net_async->async_send_command_status == + NET_ASYNC_SEND_COMMAND_READ_STATUS) { + ulong pkt_len; + net_async_status status = + cli_safe_read_with_ok_nonblocking(mysql, true, nullptr, &pkt_len); + if (status == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + mysql->packet_length = pkt_len; + result = (pkt_len == packet_error ? 1 : 0); +#if defined(CLIENT_PROTOCOL_TRACING) + /* + Return to READY_FOR_COMMAND protocol stage in case server reports + error or sends OK packet. + */ + if (!result || mysql->net.read_pos[0] == 0x00) + MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); +#endif + } +end: + if (net_async) + net_async->async_send_command_status = NET_ASYNC_SEND_COMMAND_IDLE; + DBUG_PRINT("exit", ("result: %d", result)); + *ret = result; + DBUG_RETURN(NET_ASYNC_COMPLETE); +} + +void free_old_query(MYSQL *mysql) { + DBUG_ENTER("free_old_query"); + if (mysql->field_alloc) { + free_root(mysql->field_alloc, MYF(0)); + init_alloc_root(PSI_NOT_INSTRUMENTED, mysql->field_alloc, 8192, + 0); /* Assume rowlength < 8192 */ + } + mysql->fields = 0; + mysql->field_count = 0; /* For API */ + mysql->warning_count = 0; + mysql->info = 0; + DBUG_VOID_RETURN; +} + +/** + Finish reading of a partial result set from the server in asynchronous + way. This function can return without completly flushing the result set, + in such a case call this function again until result set in flushed. + Read OK packet incase result set is not a data packet. + + @param[in] mysql connection handle + @param[out] res true in case of protocol error, false otherwise + + @retval NET_ASYNC_NOT_READY result set not flushed yet + @retval NET_ASYNC_COMPLETE finished flushing result set +*/ +static net_async_status flush_one_result_nonblocking(MYSQL *mysql, bool *res) { + DBUG_ENTER(__func__); + + *res = false; + while (1) { + ulong packet_length; + bool is_data_packet; + if (cli_safe_read_nonblocking(mysql, &is_data_packet, &packet_length) == + NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + mysql->packet_length = packet_length; + if (packet_length == packet_error) { + *res = true; + break; + } + if (mysql->net.read_pos[0] != 0 && !is_data_packet) { + if (protocol_41(mysql)) { + uchar *pos = mysql->net.read_pos + 1; + if (mysql->server_capabilities & CLIENT_DEPRECATE_EOF && + !is_data_packet) { + read_ok_ex(mysql, packet_length); + } else { + mysql->warning_count = uint2korr(pos); + pos += 2; + mysql->server_status = uint2korr(pos); + } + pos += 2; + } + break; + } + } + DBUG_RETURN(NET_ASYNC_COMPLETE); +} + +/** + Finish reading of a partial result set from the server. + Get the EOF packet, and update mysql->status + and mysql->warning_count. + + @return true if a communication or protocol error, an error + is set in this case, false otherwise. +*/ + +static bool flush_one_result(MYSQL *mysql) { + ulong packet_length; + bool is_data_packet; + + DBUG_ASSERT(mysql->status != MYSQL_STATUS_READY); + + do { + packet_length = cli_safe_read(mysql, &is_data_packet); + /* + There is an error reading from the connection, + or (sic!) there were no error and no + data in the stream, i.e. no more data from the server. + Since we know our position in the stream (somewhere in + the middle of a result set), this latter case is an error too + -- each result set must end with a EOF packet. + cli_safe_read() has set an error for us, just return. + */ + if (packet_length == packet_error) return true; + } while (mysql->net.read_pos[0] == 0 || is_data_packet); + + /* Analyse final OK packet (EOF packet if it is old client) */ + + if (protocol_41(mysql)) { + uchar *pos = mysql->net.read_pos + 1; + if (mysql->server_capabilities & CLIENT_DEPRECATE_EOF && !is_data_packet) + read_ok_ex(mysql, packet_length); + else { + mysql->warning_count = uint2korr(pos); + pos += 2; + mysql->server_status = uint2korr(pos); + } + pos += 2; + } +#if defined(CLIENT_PROTOCOL_TRACING) + if (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); + else + MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); +#endif + return false; +} + +/** + Read a packet from network. If it's an OK packet, flush it. + + @return true if error, false otherwise. In case of + success, is_ok_packet is set to true or false, + based on what we got from network. +*/ + +static bool opt_flush_ok_packet(MYSQL *mysql, bool *is_ok_packet) { + bool is_data_packet; + ulong packet_length = cli_safe_read(mysql, &is_data_packet); + + if (packet_length == packet_error) return true; + + /* cli_safe_read always reads a non-empty packet. */ + DBUG_ASSERT(packet_length); + + *is_ok_packet = + ((mysql->net.read_pos[0] == 0) || + ((mysql->server_capabilities & CLIENT_DEPRECATE_EOF) && + mysql->net.read_pos[0] == 254 && packet_length < MAX_PACKET_LENGTH)); + if (*is_ok_packet) { + read_ok_ex(mysql, packet_length); +#if defined(CLIENT_PROTOCOL_TRACING) + if (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); + else + MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); +#endif + } + + return false; +} + +static net_async_status cli_flush_use_result_nonblocking( + MYSQL *mysql, bool flush_all_results MY_ATTRIBUTE((unused))) { + DBUG_ENTER(__func__); + /* + flush_all_results is only used for mysql_stmt_close, and async is not + supported for that. + */ + DBUG_ASSERT(!flush_all_results); + bool res; + DBUG_RETURN(flush_one_result_nonblocking(mysql, &res)); +} + +/* + Flush result set sent from server +*/ + +static void cli_flush_use_result(MYSQL *mysql, bool flush_all_results) { + /* Clear the current execution status */ + DBUG_ENTER("cli_flush_use_result"); + DBUG_PRINT("warning", ("Not all packets read, clearing them")); + + if (flush_one_result(mysql)) DBUG_VOID_RETURN; /* An error occurred */ + + if (!flush_all_results) DBUG_VOID_RETURN; + + while (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) { + bool is_ok_packet; + if (opt_flush_ok_packet(mysql, &is_ok_packet)) + DBUG_VOID_RETURN; /* An error occurred. */ + if (is_ok_packet) { + /* + Indeed what we got from network was an OK packet, and we + know that OK is the last one in a multi-result-set, so + just return. + */ + DBUG_VOID_RETURN; + } + + /* + It's a result set, not an OK packet. A result set contains + of two result set subsequences: field metadata, terminated + with EOF packet, and result set data, again terminated with + EOF packet. Read and flush them. + */ + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_FIELD_DEF); + if (!(mysql->server_capabilities & CLIENT_DEPRECATE_EOF)) { + if (flush_one_result(mysql)) DBUG_VOID_RETURN; /* An error occurred. */ + } else { + uchar *pos = (uchar *)mysql->net.read_pos; + ulong field_count = net_field_length(&pos); + if (read_com_query_metadata(mysql, pos, field_count)) { + DBUG_VOID_RETURN; + } else { + free_root(mysql->field_alloc, MYF(0)); + } + } + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_ROW); + if (flush_one_result(mysql)) DBUG_VOID_RETURN; + } + DBUG_VOID_RETURN; +} + +#ifdef _WIN32 +static bool is_NT(void) { + char *os = getenv("OS"); + return (os && !strcmp(os, "Windows_NT")) ? 1 : 0; +} +#endif + +#ifdef CHECK_LICENSE +/** + Check server side variable 'license'. + + If the variable does not exist or does not contain 'Commercial', + we're talking to non-commercial server from commercial client. + + @retval 0 success + @retval !0 network error or the server is not commercial. + Error code is saved in mysql->net.last_errno. +*/ + +static int check_license(MYSQL *mysql) { + MYSQL_ROW row; + MYSQL_RES *res; + NET *net = &mysql->net; + static const char query[] = "SELECT @@license"; + static const char required_license[] = STRINGIFY_ARG(LICENSE); + + if (mysql_real_query(mysql, query, (ulong)(sizeof(query) - 1))) { + if (net->last_errno == ER_UNKNOWN_SYSTEM_VARIABLE) { + set_mysql_extended_error(mysql, CR_WRONG_LICENSE, unknown_sqlstate, + ER_CLIENT(CR_WRONG_LICENSE), required_license); + } + return 1; + } + if (!(res = mysql_use_result(mysql))) return 1; + row = mysql_fetch_row(res); + /* + If no rows in result set, or column value is NULL (none of these + two is ever true for server variables now), or column value + mismatch, set wrong license error. + */ + if (!net->last_errno && + (!row || !row[0] || + strncmp(row[0], required_license, sizeof(required_license)))) { + set_mysql_extended_error(mysql, CR_WRONG_LICENSE, unknown_sqlstate, + ER_CLIENT(CR_WRONG_LICENSE), required_license); + } + mysql_free_result(res); + return net->last_errno; +} +#endif /* CHECK_LICENSE */ + +/************************************************************************** + Shut down connection +**************************************************************************/ + +void end_server(MYSQL *mysql) { + int save_errno = errno; + DBUG_ENTER("end_server"); + if (mysql->net.vio != 0) { + char desc[VIO_DESCRIPTION_SIZE]; + vio_description(mysql->net.vio, desc); + DBUG_PRINT("info", ("Net: %s", desc)); +#ifdef MYSQL_SERVER + slave_io_thread_detach_vio(); +#endif + vio_delete(mysql->net.vio); + mysql->net.vio = 0; /* Marker */ + mysql_prune_stmt_list(mysql); + } + net_end(&mysql->net); + net_extension_free(&mysql->net); + free_old_query(mysql); + errno = save_errno; + MYSQL_TRACE(DISCONNECTED, mysql, ()); + DBUG_VOID_RETURN; +} + +/** + Frees the memory allocated for a result, set by APIs which would have + returned rows. + + @param[in] result buffer which needs to be freed + + @retval NET_ASYNC_NOT_READY operation not complete, retry again + @retval NET_ASYNC_COMPLETE operation complete +*/ +net_async_status STDCALL mysql_free_result_nonblocking(MYSQL_RES *result) { + DBUG_ENTER(__func__); + DBUG_PRINT("enter", ("mysql_res: %p", result)); + if (!result) DBUG_RETURN(NET_ASYNC_COMPLETE); + + MYSQL *mysql = result->handle; + if (mysql) { + if (mysql->unbuffered_fetch_owner == &result->unbuffered_fetch_cancelled) + mysql->unbuffered_fetch_owner = 0; + if (mysql->status == MYSQL_STATUS_USE_RESULT) { + if (mysql->methods->flush_use_result_nonblocking(mysql, false) == + NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + mysql->status = MYSQL_STATUS_READY; + if (mysql->unbuffered_fetch_owner) *mysql->unbuffered_fetch_owner = true; + } + } + free_rows(result->data); + if (result->field_alloc) { + free_root(result->field_alloc, MYF(0)); + my_free(result->field_alloc); + } + my_free(result->row); + my_free(result); + + DBUG_RETURN(NET_ASYNC_COMPLETE); +} + +void STDCALL mysql_free_result(MYSQL_RES *result) { + DBUG_ENTER("mysql_free_result"); + DBUG_PRINT("enter", ("mysql_res: %p", result)); + if (result) { + MYSQL *mysql = result->handle; + if (mysql) { + if (mysql->unbuffered_fetch_owner == &result->unbuffered_fetch_cancelled) + mysql->unbuffered_fetch_owner = 0; + if (mysql->status == MYSQL_STATUS_USE_RESULT) { + (*mysql->methods->flush_use_result)(mysql, false); + mysql->status = MYSQL_STATUS_READY; + if (mysql->unbuffered_fetch_owner) + *mysql->unbuffered_fetch_owner = true; + } + } + free_rows(result->data); + if (result->field_alloc) { + free_root(result->field_alloc, MYF(0)); + my_free(result->field_alloc); + } + my_free(result->row); + my_free(result); + } + DBUG_VOID_RETURN; +} + +/**************************************************************************** + Get options from my.cnf +****************************************************************************/ + +static const char *default_options[] = {"port", + "socket", + "compress", + "password", + "pipe", + "timeout", + "user", + "init-command", + "host", + "database", + "debug", + "return-found-rows", + "ssl-key", + "ssl-cert", + "ssl-ca", + "ssl-capath", + "character-sets-dir", + "default-character-set", + "interactive-timeout", + "connect-timeout", + "local-infile", + "disable-local-infile", + "ssl-cipher", + "max-allowed-packet", + "protocol", + "shared-memory-base-name", + "multi-results", + "multi-statements", + "multi-queries", + "report-data-truncation", + "plugin-dir", + "default-auth", + "bind-address", + "ssl-crl", + "ssl-crlpath", + "enable-cleartext-plugin", + "tls-version", + "ssl_mode", + "optional-resultset-metadata", + "ssl-fips-mode", + "tls-ciphersuites", + NullS}; +enum option_id { + OPT_port = 1, + OPT_socket, + OPT_compress, + OPT_password, + OPT_pipe, + OPT_timeout, + OPT_user, + OPT_init_command, + OPT_host, + OPT_database, + OPT_debug, + OPT_return_found_rows, + OPT_ssl_key, + OPT_ssl_cert, + OPT_ssl_ca, + OPT_ssl_capath, + OPT_character_sets_dir, + OPT_default_character_set, + OPT_interactive_timeout, + OPT_connect_timeout, + OPT_local_infile, + OPT_disable_local_infile, + OPT_ssl_cipher, + OPT_max_allowed_packet, + OPT_protocol, + OPT_shared_memory_base_name, + OPT_multi_results, + OPT_multi_statements, + OPT_multi_queries, + OPT_report_data_truncation, + OPT_plugin_dir, + OPT_default_auth, + OPT_bind_address, + OPT_ssl_crl, + OPT_ssl_crlpath, + OPT_enable_cleartext_plugin, + OPT_tls_version, + OPT_ssl_mode, + OPT_optional_resultset_metadata, + OPT_ssl_fips_mode, + OPT_tls_ciphersuites, + OPT_keep_this_one_last +}; + +static TYPELIB option_types = {array_elements(default_options) - 1, "options", + default_options, NULL}; + +const char *sql_protocol_names_lib[] = {"TCP", "SOCKET", "PIPE", "MEMORY", + NullS}; +TYPELIB sql_protocol_typelib = {array_elements(sql_protocol_names_lib) - 1, "", + sql_protocol_names_lib, NULL}; + +static int add_init_command(struct st_mysql_options *options, const char *cmd) { + char *tmp; + + if (!options->init_commands) { + void *rawmem = my_malloc(key_memory_mysql_options, + sizeof(Init_commands_array), MYF(MY_WME)); + if (!rawmem) return 1; + options->init_commands = + new (rawmem) Init_commands_array(key_memory_mysql_options); + } + + if (!(tmp = my_strdup(key_memory_mysql_options, cmd, MYF(MY_WME))) || + options->init_commands->push_back(tmp)) { + my_free(tmp); + return 1; + } + + return 0; +} + +#define ALLOCATE_EXTENSIONS(OPTS) \ + (OPTS)->extension = (struct st_mysql_options_extention *)my_malloc( \ + key_memory_mysql_options, sizeof(struct st_mysql_options_extention), \ + MYF(MY_WME | MY_ZEROFILL)) + +#define ENSURE_EXTENSIONS_PRESENT(OPTS) \ + do { \ + if (!(OPTS)->extension) ALLOCATE_EXTENSIONS(OPTS); \ + } while (0) + +#define EXTENSION_SET_STRING(OPTS, X, STR) \ + do { \ + if ((OPTS)->extension) \ + my_free((OPTS)->extension->X); \ + else \ + ALLOCATE_EXTENSIONS(OPTS); \ + (OPTS)->extension->X = \ + ((STR) != NULL) \ + ? my_strdup(key_memory_mysql_options, (STR), MYF(MY_WME)) \ + : NULL; \ + } while (0) + +#if defined(HAVE_OPENSSL) +#define SET_OPTION(opt_var, arg) \ + do { \ + if (mysql->options.opt_var) my_free(mysql->options.opt_var); \ + mysql->options.opt_var = \ + arg ? my_strdup(key_memory_mysql_options, arg, MYF(MY_WME)) : NULL; \ + } while (0) + +#define EXTENSION_SET_SSL_STRING(OPTS, X, STR, mode) \ + do { \ + EXTENSION_SET_STRING(OPTS, X, static_cast<const char *>(STR)); \ + if ((OPTS)->extension->X) (OPTS)->extension->ssl_mode = mode; \ + } while (0) +#else +#define EXTENSION_SET_SSL_STRING(OPTS, X, STR, mode) \ + do { \ + ; \ + } while (0) +#endif + +static char *set_ssl_option_unpack_path(const char *arg) { + char *opt_var = NULL; + if (arg) { + char *buff = + (char *)my_malloc(key_memory_mysql_options, FN_REFLEN + 1, MYF(MY_WME)); + unpack_filename(buff, arg); + opt_var = my_strdup(key_memory_mysql_options, buff, MYF(MY_WME)); + my_free(buff); + } + return opt_var; +} + +void mysql_read_default_options(struct st_mysql_options *options, + const char *filename, const char *group) { + int argc; + char *argv_buff[1], **argv; + const char *groups[3]; + DBUG_ENTER("mysql_read_default_options"); + DBUG_PRINT("enter", + ("file: %s group: %s", filename, group ? group : "NULL")); + + static_assert(OPT_keep_this_one_last == array_elements(default_options), + "OPT_keep_this_one_last needs to be the last element."); + + argc = 1; + argv = argv_buff; + argv_buff[0] = const_cast<char *>("client"); + groups[0] = "client"; + groups[1] = group; + groups[2] = nullptr; + + MEM_ROOT alloc{PSI_NOT_INSTRUMENTED, 512}; + my_load_defaults(filename, groups, &argc, &argv, &alloc, nullptr); + if (argc != 1) /* If some default option */ + { + char **option = argv; + while (*++option) { + if (my_getopt_is_args_separator(option[0])) /* skip arguments separator */ + continue; + /* DBUG_PRINT("info",("option: %s",option[0])); */ + if (option[0][0] == '-' && option[0][1] == '-') { + char *end = strchr(*option, '='); + char *opt_arg = nullptr; + if (end != nullptr) { + opt_arg = end + 1; + *end = 0; /* Remove '=' */ + } + /* Change all '_' in variable name to '-' */ + for (end = *option; end != nullptr; end = strchr(end, '_')) *end = '-'; + switch (find_type(*option + 2, &option_types, FIND_TYPE_BASIC)) { + case OPT_port: + if (opt_arg) options->port = atoi(opt_arg); + break; + case OPT_socket: + if (opt_arg) { + my_free(options->unix_socket); + options->unix_socket = + my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); + } + break; + case OPT_compress: + options->compress = 1; + options->client_flag |= CLIENT_COMPRESS; + break; + case OPT_password: + if (opt_arg) { + my_free(options->password); + options->password = + my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); + } + break; + case OPT_pipe: + options->protocol = MYSQL_PROTOCOL_PIPE; + break; + case OPT_connect_timeout: + case OPT_timeout: + if (opt_arg) options->connect_timeout = atoi(opt_arg); + break; + case OPT_user: + if (opt_arg) { + my_free(options->user); + options->user = + my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); + } + break; + case OPT_init_command: + add_init_command(options, opt_arg); + break; + case OPT_host: + if (opt_arg) { + my_free(options->host); + options->host = + my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); + } + break; + case OPT_database: + if (opt_arg) { + my_free(options->db); + options->db = + my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); + } + break; + case OPT_debug: +#ifndef MYSQL_SERVER + mysql_debug(opt_arg ? opt_arg : "d:t:o,/tmp/client.trace"); + break; +#endif + case OPT_return_found_rows: + options->client_flag |= CLIENT_FOUND_ROWS; + break; +#if defined(HAVE_OPENSSL) + case OPT_ssl_key: + my_free(options->ssl_key); + options->ssl_key = + my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); + break; + case OPT_ssl_cert: + my_free(options->ssl_cert); + options->ssl_cert = + my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); + break; + case OPT_ssl_ca: + my_free(options->ssl_ca); + options->ssl_ca = + my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); + break; + case OPT_ssl_capath: + my_free(options->ssl_capath); + options->ssl_capath = + my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); + break; + case OPT_ssl_cipher: + my_free(options->ssl_cipher); + options->ssl_cipher = + my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); + break; + case OPT_tls_ciphersuites: + EXTENSION_SET_STRING(options, tls_ciphersuites, opt_arg); + break; + case OPT_tls_version: + EXTENSION_SET_SSL_STRING(options, tls_version, opt_arg, + SSL_MODE_PREFERRED); + break; + case OPT_ssl_crl: + EXTENSION_SET_SSL_STRING(options, ssl_crl, opt_arg, + SSL_MODE_PREFERRED); + break; + case OPT_ssl_crlpath: + EXTENSION_SET_SSL_STRING(options, ssl_crlpath, opt_arg, + SSL_MODE_PREFERRED); + break; +#else + case OPT_ssl_key: + case OPT_ssl_cert: + case OPT_ssl_ca: + case OPT_ssl_capath: + case OPT_ssl_cipher: + case OPT_tls_ciphersuites: + case OPT_ssl_crl: + case OPT_ssl_crlpath: + case OPT_tls_version: + break; +#endif /* HAVE_OPENSSL */ + case OPT_character_sets_dir: + my_free(options->charset_dir); + options->charset_dir = + my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); + break; + case OPT_default_character_set: + my_free(options->charset_name); + options->charset_name = + my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); + break; + case OPT_interactive_timeout: + options->client_flag |= CLIENT_INTERACTIVE; + break; + case OPT_local_infile: + if (!opt_arg || atoi(opt_arg) != 0) + options->client_flag |= CLIENT_LOCAL_FILES; + else + options->client_flag &= ~CLIENT_LOCAL_FILES; + break; + case OPT_disable_local_infile: + options->client_flag &= ~CLIENT_LOCAL_FILES; + break; + case OPT_max_allowed_packet: + if (opt_arg) options->max_allowed_packet = atoi(opt_arg); + break; + case OPT_protocol: + if ((options->protocol = find_type(opt_arg, &sql_protocol_typelib, + FIND_TYPE_BASIC)) <= 0) { + my_message_local(ERROR_LEVEL, EE_UNKNOWN_PROTOCOL_OPTION, + opt_arg); + exit(1); + } + break; + case OPT_shared_memory_base_name: +#if defined(_WIN32) + if (options->shared_memory_base_name != def_shared_memory_base_name) + my_free(options->shared_memory_base_name); + options->shared_memory_base_name = + my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); +#endif + break; + case OPT_multi_results: + options->client_flag |= CLIENT_MULTI_RESULTS; + break; + case OPT_multi_statements: + case OPT_multi_queries: + options->client_flag |= + CLIENT_MULTI_STATEMENTS | CLIENT_MULTI_RESULTS; + break; + case OPT_report_data_truncation: + options->report_data_truncation = + opt_arg ? (atoi(opt_arg) != 0) : 1; + break; + case OPT_plugin_dir: { + char buff[FN_REFLEN], buff2[FN_REFLEN]; + if (strlen(opt_arg) >= FN_REFLEN) opt_arg[FN_REFLEN] = '\0'; + if (my_realpath(buff, opt_arg, 0)) { + DBUG_PRINT("warning", + ("failed to normalize the plugin path: %s", opt_arg)); + break; + } + convert_dirname(buff2, buff, NULL); + EXTENSION_SET_STRING(options, plugin_dir, buff2); + } break; + case OPT_default_auth: + EXTENSION_SET_STRING(options, default_auth, opt_arg); + break; + case OPT_bind_address: + my_free(options->bind_address); + options->bind_address = + my_strdup(key_memory_mysql_options, opt_arg, MYF(MY_WME)); + break; + case OPT_enable_cleartext_plugin: + ENSURE_EXTENSIONS_PRESENT(options); + options->extension->enable_cleartext_plugin = + (!opt_arg || atoi(opt_arg) != 0) ? true : false; + break; + case OPT_optional_resultset_metadata: + if (!opt_arg || atoi(opt_arg) != 0) + options->client_flag |= CLIENT_OPTIONAL_RESULTSET_METADATA; + else + options->client_flag &= ~CLIENT_OPTIONAL_RESULTSET_METADATA; + break; + + default: + DBUG_PRINT("warning", ("unknown option: %s", option[0])); + } + } + } + } + DBUG_VOID_RETURN; +} + +/************************************************************************** + Get column lengths of the current row + If one uses mysql_use_result, res->lengths contains the length information, + else the lengths are calculated from the offset between pointers. +**************************************************************************/ + +static void cli_fetch_lengths(ulong *to, MYSQL_ROW column, + unsigned int field_count) { + ulong *prev_length; + char *start = 0; + MYSQL_ROW end; + + prev_length = 0; /* Keep gcc happy */ + for (end = column + field_count + 1; column != end; column++, to++) { + if (!*column) { + *to = 0; /* Null */ + continue; + } + if (start) /* Found end of prev string */ + *prev_length = (ulong)(*column - start - 1); + start = *column; + prev_length = to; + } +} + +/** + Read field metadata from field descriptor and store it in MYSQL_FIELD + structure. String values in MYSQL_FIELD are allocated in a given allocator + root. + + @param mysql connection handle + @param alloc memory allocator root + @param default_value flag telling if default values should be read from + descriptor + @param server_capabilities protocol capability flags which determine format + of the descriptor + @param row field descriptor + @param field address of MYSQL_FIELD structure to store metadata in. + + @returns 0 on success. +*/ + +static int unpack_field(MYSQL *mysql, MEM_ROOT *alloc, bool default_value, + uint server_capabilities, MYSQL_ROWS *row, + MYSQL_FIELD *field) { + ulong lengths[9]; /* Max length of each field */ + DBUG_ENTER("unpack_field"); + + if (!field) { + set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate); + DBUG_RETURN(1); + } + + memset(field, 0, sizeof(MYSQL_FIELD)); + + if (server_capabilities & CLIENT_PROTOCOL_41) { + uchar *pos; + /* fields count may be wrong */ + cli_fetch_lengths(&lengths[0], row->data, default_value ? 8 : 7); + field->catalog = strmake_root(alloc, (char *)row->data[0], lengths[0]); + field->db = strmake_root(alloc, (char *)row->data[1], lengths[1]); + field->table = strmake_root(alloc, (char *)row->data[2], lengths[2]); + field->org_table = strmake_root(alloc, (char *)row->data[3], lengths[3]); + field->name = strmake_root(alloc, (char *)row->data[4], lengths[4]); + field->org_name = strmake_root(alloc, (char *)row->data[5], lengths[5]); + + field->catalog_length = lengths[0]; + field->db_length = lengths[1]; + field->table_length = lengths[2]; + field->org_table_length = lengths[3]; + field->name_length = lengths[4]; + field->org_name_length = lengths[5]; + + /* Unpack fixed length parts */ + if (lengths[6] != 12) { + /* malformed packet. signal an error. */ + set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); + DBUG_RETURN(1); + } + + pos = (uchar *)row->data[6]; + field->charsetnr = uint2korr(pos); + field->length = (uint)uint4korr(pos + 2); + field->type = (enum enum_field_types)pos[6]; + field->flags = uint2korr(pos + 7); + field->decimals = (uint)pos[9]; + + if (IS_NUM(field->type)) field->flags |= NUM_FLAG; + if (default_value && row->data[7]) { + field->def = strmake_root(alloc, (char *)row->data[7], lengths[7]); + field->def_length = lengths[7]; + } else + field->def = 0; + field->max_length = 0; + } +#ifndef DELETE_SUPPORT_OF_4_0_PROTOCOL + else { + cli_fetch_lengths(&lengths[0], row->data, default_value ? 6 : 5); + field->org_table = field->table = strdup_root(alloc, (char *)row->data[0]); + field->name = strdup_root(alloc, (char *)row->data[1]); + field->length = (uint)uint3korr((uchar *)row->data[2]); + field->type = (enum enum_field_types)(uchar)row->data[3][0]; + + field->catalog = const_cast<char *>(""); + field->db = const_cast<char *>(""); + field->catalog_length = 0; + field->db_length = 0; + field->org_table_length = field->table_length = lengths[0]; + field->name_length = lengths[1]; + + if (server_capabilities & CLIENT_LONG_FLAG) { + if (lengths[4] != 3) { + /* malformed packet. signal an error. */ + set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); + DBUG_RETURN(1); + } + field->flags = uint2korr((uchar *)row->data[4]); + field->decimals = (uint)(uchar)row->data[4][2]; + } else { + if (lengths[4] != 2) { + /* malformed packet. signal an error. */ + set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); + DBUG_RETURN(1); + } + field->flags = (uint)(uchar)row->data[4][0]; + field->decimals = (uint)(uchar)row->data[4][1]; + } + if (IS_NUM(field->type)) field->flags |= NUM_FLAG; + if (default_value && row->data[5]) { + field->def = strdup_root(alloc, (char *)row->data[5]); + field->def_length = lengths[5]; + } else + field->def = 0; + field->max_length = 0; + } +#endif /* DELETE_SUPPORT_OF_4_0_PROTOCOL */ + DBUG_RETURN(0); +} + +/*************************************************************************** + Change field rows to field structs +***************************************************************************/ + +MYSQL_FIELD *unpack_fields(MYSQL *mysql, MYSQL_ROWS *data, MEM_ROOT *alloc, + uint fields, bool default_value, + uint server_capabilities) { + MYSQL_ROWS *row; + MYSQL_FIELD *field, *result; + DBUG_ENTER("unpack_fields"); + + field = result = (MYSQL_FIELD *)alloc->Alloc((uint)sizeof(*field) * fields); + if (!result) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + DBUG_RETURN(0); + } + memset(field, 0, sizeof(MYSQL_FIELD) * fields); + for (row = data; row; row = row->next, field++) { + /* fields count may be wrong */ + if (field < result || static_cast<uint>(field - result) >= fields) { + DBUG_RETURN(NULL); + } + if (unpack_field(mysql, alloc, default_value, server_capabilities, row, + field)) { + DBUG_RETURN(NULL); + } + } + DBUG_RETURN(result); +} + +/** + Read metadata resultset from server in asynchronous way. + + @param[in] mysql connection handle + @param[in] alloc memory allocator root + @param[in] field_count total number of fields + @param[in] field number of columns in single field descriptor + @param[out] ret an array of field rows + + @retval NET_ASYNC_NOT_READY metadata resultset not read completely + @retval NET_ASYNC_COMPLETE finished reading metadata resultset +*/ +net_async_status cli_read_metadata_ex_nonblocking(MYSQL *mysql, MEM_ROOT *alloc, + ulong field_count, + unsigned int field, + MYSQL_FIELD **ret) { + DBUG_ENTER(__func__); + uchar *pos; + ulong pkt_len; + NET *net = &mysql->net; + MYSQL_ASYNC *async_data = ASYNC_DATA(mysql); + *ret = nullptr; + + if (!async_data->async_read_metadata_field_len) { + async_data->async_read_metadata_field_len = + (ulong *)alloc->Alloc(sizeof(ulong) * field); + } + if (!async_data->async_read_metadata_fields) { + async_data->async_read_metadata_fields = + (MYSQL_FIELD *)alloc->Alloc((uint)sizeof(MYSQL_FIELD) * field_count); + if (async_data->async_read_metadata_fields) + memset(async_data->async_read_metadata_fields, 0, + sizeof(MYSQL_FIELD) * field_count); + } + + if (!async_data->async_read_metadata_fields) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + goto end; + } + + if (!async_data->async_read_metadata_data.data) { + async_data->async_read_metadata_data.data = + (MYSQL_ROW)alloc->Alloc(sizeof(char *) * (field + 1)); + memset(async_data->async_read_metadata_data.data, 0, + sizeof(char *) * (field + 1)); + } + + /* + In this below loop we read each column info as 1 single row + and save it in mysql->fields array + */ + while (async_data->async_read_metadata_cur_field < field_count) { + int res; + if (read_one_row_nonblocking(mysql, field, + async_data->async_read_metadata_data.data, + async_data->async_read_metadata_field_len, + &res) == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + + if (res == -1) { + goto end; + } + + if (unpack_field(mysql, alloc, 0, mysql->server_capabilities, + &async_data->async_read_metadata_data, + async_data->async_read_metadata_fields + + async_data->async_read_metadata_cur_field)) { + goto end; + } + async_data->async_read_metadata_cur_field++; + } + + /* Read EOF packet in case of old client */ + if (!(mysql->server_capabilities & CLIENT_DEPRECATE_EOF)) { + if (cli_safe_read_nonblocking(mysql, nullptr, &pkt_len) == + NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + + if (pkt_len == packet_error) { + goto end; + } + + pos = net->read_pos; + if (*pos == 254) { + mysql->warning_count = uint2korr(pos + 1); + mysql->server_status = uint2korr(pos + 3); + } + } + *ret = async_data->async_read_metadata_fields; + +end: + async_data->async_read_metadata_field_len = nullptr; + async_data->async_read_metadata_fields = nullptr; + memset(&async_data->async_read_metadata_data, 0, + sizeof(async_data->async_read_metadata_data)); + async_data->async_read_metadata_cur_field = 0; + DBUG_RETURN(NET_ASYNC_COMPLETE); +} + +/** + Read metadata resultset from server + Memory allocated in a given allocator root. + + @param[in] mysql connection handle + @param[in] alloc memory allocator root + @param[in] field_count total number of fields + @param[in] field number of columns in single field descriptor + + @retval an array of field rows + +*/ +MYSQL_FIELD *cli_read_metadata_ex(MYSQL *mysql, MEM_ROOT *alloc, + ulong field_count, unsigned int field) { + ulong *len; + uint f; + uchar *pos; + MYSQL_FIELD *fields, *result; + MYSQL_ROWS data; + NET *net = &mysql->net; + + DBUG_ENTER("cli_read_metadata"); + + len = (ulong *)alloc->Alloc(sizeof(ulong) * field); + + fields = result = + (MYSQL_FIELD *)alloc->Alloc((uint)sizeof(MYSQL_FIELD) * field_count); + if (!result) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + end_server(mysql); + DBUG_RETURN(0); + } + memset(fields, 0, sizeof(MYSQL_FIELD) * field_count); + + data.data = (MYSQL_ROW)alloc->Alloc(sizeof(char *) * (field + 1)); + memset(data.data, 0, sizeof(char *) * (field + 1)); + + /* + In this below loop we read each column info as 1 single row + and save it in mysql->fields array + */ + for (f = 0; f < field_count; ++f) { + if (read_one_row(mysql, field, data.data, len) == -1) DBUG_RETURN(NULL); + if (unpack_field(mysql, alloc, 0, mysql->server_capabilities, &data, + fields++)) + DBUG_RETURN(NULL); + } + /* Read EOF packet in case of old client */ + if (!(mysql->server_capabilities & CLIENT_DEPRECATE_EOF)) { + if (packet_error == cli_safe_read(mysql, NULL)) DBUG_RETURN(0); + pos = net->read_pos; + if (*pos == 254) { + mysql->warning_count = uint2korr(pos + 1); + mysql->server_status = uint2korr(pos + 3); + } + } + DBUG_RETURN(result); +} + +static int alloc_field_alloc(MYSQL *mysql) { + if (mysql->field_alloc == nullptr) { + mysql->field_alloc = (MEM_ROOT *)my_malloc( + key_memory_MYSQL, sizeof(MEM_ROOT), MYF(MY_WME | MY_ZEROFILL)); + if (mysql->field_alloc == nullptr) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + return 1; + } + init_alloc_root(PSI_NOT_INSTRUMENTED, mysql->field_alloc, 8192, + 0); /* Assume rowlength < 8192 */ + } + /* At this point the NET is receiving a resultset. max packet should be set */ + DBUG_ASSERT(mysql->net.max_packet_size != 0); + /* Limit the size of the columns buffer to MAX packet size or 1M */ + mysql->field_alloc->set_max_capacity( + std::max(1024UL * 1024UL, mysql->net.max_packet_size)); + return 0; +} + +/** + Read metadata resultset from server + + @param[in] mysql connection handle + @param[in] field_count total number of fields + @param[in] field number of columns in single field descriptor + + @retval an array of field rows + +*/ +MYSQL_FIELD *cli_read_metadata(MYSQL *mysql, ulong field_count, + unsigned int field) { + alloc_field_alloc(mysql); + return cli_read_metadata_ex(mysql, mysql->field_alloc, field_count, field); +} + +/** + Helper method to read metadata in asynchronous way. +*/ +static net_async_status cli_read_metadata_nonblocking(MYSQL *mysql, + ulong field_count, + unsigned int field, + MYSQL_FIELD **ret) { + alloc_field_alloc(mysql); + if (cli_read_metadata_ex_nonblocking(mysql, mysql->field_alloc, field_count, + field, ret) == NET_ASYNC_NOT_READY) { + return NET_ASYNC_NOT_READY; + } + return NET_ASYNC_COMPLETE; +} + +/** + Read resultset metadata returned by COM_QUERY command. + + @param[in] mysql Client connection handle. + @param[in] pos Position in the packet where the metadata + starts. + @param[in] field_count Number of columns in the field descriptor. + + @retval 0 Success. + @retval 1 Error. +*/ +static int read_com_query_metadata(MYSQL *mysql, uchar *pos, + ulong field_count) { + /* Store resultset metadata flag. */ + if (mysql->client_flag & CLIENT_OPTIONAL_RESULTSET_METADATA) { + mysql->resultset_metadata = static_cast<enum enum_resultset_metadata>(*pos); + } else { + mysql->resultset_metadata = RESULTSET_METADATA_FULL; + } + + switch (mysql->resultset_metadata) { + case RESULTSET_METADATA_FULL: + /* Read metadata. */ + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_FIELD_DEF); + + if (!(mysql->fields = cli_read_metadata(mysql, field_count, + protocol_41(mysql) ? 7 : 5))) { + free_root(mysql->field_alloc, MYF(0)); + return 1; + } + break; + + case RESULTSET_METADATA_NONE: + /* Skip metadata. */ + mysql->fields = NULL; + break; + + default: + /* Unknown metadata flag. */ + mysql->fields = NULL; + return 1; + } + + return 0; +} + +/** + Read resultset metadata returned by COM_QUERY command in asynchronous way. + + @param[in] mysql Client connection handle. + @param[in] pos Position in the packet where the metadata + starts. + @param[in] field_count Number of columns in the field descriptor. + @param[out] res set to false incase of success and true for + error. + + @retval NET_ASYNC_NOT_READY metadata resultset not read completely + @retval NET_ASYNC_COMPLETE finished reading metadata resultset +*/ +static net_async_status read_com_query_metadata_nonblocking(MYSQL *mysql, + uchar *pos, + ulong field_count, + int *res) { + DBUG_ENTER(__func__); + /* pos is only set on the first reentrant call. */ + if (pos) { + /* Store resultset metadata flag. */ + if (mysql->client_flag & CLIENT_OPTIONAL_RESULTSET_METADATA) { + mysql->resultset_metadata = + static_cast<enum enum_resultset_metadata>(*pos); + } else { + mysql->resultset_metadata = RESULTSET_METADATA_FULL; + } + } + + switch (mysql->resultset_metadata) { + case RESULTSET_METADATA_FULL: + /* Read metadata. */ + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_FIELD_DEF); + + if (cli_read_metadata_nonblocking( + mysql, field_count, protocol_41(mysql) ? 7 : 5, &mysql->fields) == + NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + + if (!mysql->fields) { + free_root(mysql->field_alloc, MYF(0)); + *res = 1; + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + break; + + case RESULTSET_METADATA_NONE: + /* Skip metadata. */ + mysql->fields = NULL; + break; + + default: + /* Unknown metadata flag. */ + mysql->fields = NULL; + *res = 1; + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + + *res = 0; + DBUG_RETURN(NET_ASYNC_COMPLETE); +} + +net_async_status cli_read_rows_nonblocking(MYSQL *mysql, + MYSQL_FIELD *mysql_fields, + unsigned int fields, + MYSQL_DATA **result_out) { + uint field; + ulong pkt_len; + ulong len; + uchar *cp; + char *to, *end_to; + MYSQL_ROWS *cur; + NET *net = &mysql->net; + bool is_data_packet; + DBUG_ENTER(__func__); + MYSQL_ASYNC *async_context = ASYNC_DATA(mysql); + NET_ASYNC *net_async = NET_ASYNC_DATA(net); + *result_out = nullptr; + + if (cli_safe_read_nonblocking(mysql, &is_data_packet, &pkt_len) == + NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + + mysql->packet_length = pkt_len; + if (pkt_len == packet_error) { + if (net_async->read_rows_is_first_read) { + free_rows(async_context->rows_result_buffer); + async_context->rows_result_buffer = nullptr; + } + net_async->read_rows_is_first_read = true; + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + + if (net_async->read_rows_is_first_read) { + MYSQL_DATA *result; + if (!(result = + (MYSQL_DATA *)my_malloc(key_memory_MYSQL_DATA, sizeof(MYSQL_DATA), + MYF(MY_WME | MY_ZEROFILL))) || + !(result->alloc = + (MEM_ROOT *)my_malloc(key_memory_MYSQL_DATA, sizeof(MEM_ROOT), + MYF(MY_WME | MY_ZEROFILL)))) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + net_async->read_rows_is_first_read = true; + free_rows(result); + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + async_context->rows_result_buffer = result; + init_alloc_root(PSI_NOT_INSTRUMENTED, result->alloc, 8192, + 0); /* Assume rowlength < 8192 */ + async_context->prev_row_ptr = &result->data; + result->rows = 0; + result->fields = fields; + + net_async->read_rows_is_first_read = false; + } + + /* + The last EOF packet is either a single 254 character or (in MySQL 4.1) + 254 followed by 1-7 status bytes or an OK packet starting with 0xFE + */ + while (*(cp = net->read_pos) == 0 || is_data_packet) { + MYSQL_DATA *result = async_context->rows_result_buffer; + result->rows++; + if (!(cur = (MYSQL_ROWS *)result->alloc->Alloc(sizeof(MYSQL_ROWS))) || + !(cur->data = ((MYSQL_ROW)result->alloc->Alloc( + (fields + 1) * sizeof(char *) + pkt_len)))) { + free_rows(result); + async_context->rows_result_buffer = nullptr; + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + net_async->read_rows_is_first_read = true; + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + *async_context->prev_row_ptr = cur; + async_context->prev_row_ptr = &cur->next; + to = (char *)(cur->data + fields + 1); + end_to = to + pkt_len - 1; + for (field = 0; field < fields; field++) { + if ((len = (ulong)net_field_length(&cp)) == + NULL_LENGTH) { /* null field */ + cur->data[field] = 0; + } else { + cur->data[field] = to; + if (len > (ulong)(end_to - to)) { + free_rows(result); + async_context->rows_result_buffer = nullptr; + set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); + net_async->read_rows_is_first_read = true; + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + memcpy(to, (char *)cp, len); + to[len] = 0; + to += len + 1; + cp += len; + if (mysql_fields) { + if (mysql_fields[field].max_length < len) + mysql_fields[field].max_length = len; + } + } + } + cur->data[field] = to; /* End of last field */ + if (cli_safe_read_nonblocking(mysql, &is_data_packet, &pkt_len) == + NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + mysql->packet_length = pkt_len; + if (pkt_len == packet_error) { + free_rows(async_context->rows_result_buffer); + async_context->rows_result_buffer = nullptr; + net_async->read_rows_is_first_read = true; + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + } + + *async_context->prev_row_ptr = 0; /* last pointer is null */ + /* read EOF packet or OK packet if it is new client */ + if (pkt_len > 1) { + if (mysql->server_capabilities & CLIENT_DEPRECATE_EOF && !is_data_packet) + read_ok_ex(mysql, pkt_len); + else { + mysql->warning_count = uint2korr(cp + 1); + mysql->server_status = uint2korr(cp + 3); + } + + DBUG_PRINT("info", ("status: %u warning_count: %u", mysql->server_status, + mysql->warning_count)); + } + +#if defined(CLIENT_PROTOCOL_TRACING) + if (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); + else + MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); +#endif + DBUG_PRINT("exit", + ("Got %lu rows", (ulong)async_context->rows_result_buffer->rows)); + *result_out = async_context->rows_result_buffer; + async_context->rows_result_buffer = nullptr; + net_async->read_rows_is_first_read = true; + DBUG_RETURN(NET_ASYNC_COMPLETE); +} + +/* Read all rows (data) from server */ + +MYSQL_DATA *cli_read_rows(MYSQL *mysql, MYSQL_FIELD *mysql_fields, + unsigned int fields) { + uint field; + ulong pkt_len; + ulong len; + uchar *cp; + char *to, *end_to; + MYSQL_DATA *result; + MYSQL_ROWS **prev_ptr, *cur; + NET *net = &mysql->net; + bool is_data_packet; + DBUG_ENTER("cli_read_rows"); + + if ((pkt_len = cli_safe_read(mysql, &is_data_packet)) == packet_error) + DBUG_RETURN(0); + + if (pkt_len == 0) DBUG_RETURN(0); + if (!(result = + (MYSQL_DATA *)my_malloc(key_memory_MYSQL_DATA, sizeof(MYSQL_DATA), + MYF(MY_WME | MY_ZEROFILL))) || + !(result->alloc = + (MEM_ROOT *)my_malloc(key_memory_MYSQL_DATA, sizeof(MEM_ROOT), + MYF(MY_WME | MY_ZEROFILL)))) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + free_rows(result); + DBUG_RETURN(0); + } + init_alloc_root(PSI_NOT_INSTRUMENTED, result->alloc, 8192, + 0); /* Assume rowlength < 8192 */ + prev_ptr = &result->data; + result->rows = 0; + result->fields = fields; + + /* + The last EOF packet is either a single 254 character or (in MySQL 4.1) + 254 followed by 1-7 status bytes or an OK packet starting with 0xFE + */ + + while (*(cp = net->read_pos) == 0 || is_data_packet) { + result->rows++; + if (!(cur = (MYSQL_ROWS *)result->alloc->Alloc(sizeof(MYSQL_ROWS))) || + !(cur->data = ((MYSQL_ROW)result->alloc->Alloc( + (fields + 1) * sizeof(char *) + pkt_len)))) { + free_rows(result); + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + DBUG_RETURN(0); + } + *prev_ptr = cur; + prev_ptr = &cur->next; + to = (char *)(cur->data + fields + 1); + end_to = to + pkt_len - 1; + for (field = 0; field < fields; field++) { + if ((len = (ulong)net_field_length(&cp)) == + NULL_LENGTH) { /* null field */ + cur->data[field] = 0; + } else { + cur->data[field] = to; + if (len > (ulong)(end_to - to)) { + free_rows(result); + set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); + DBUG_RETURN(0); + } + memcpy(to, (char *)cp, len); + to[len] = 0; + to += len + 1; + cp += len; + if (mysql_fields) { + if (mysql_fields[field].max_length < len) + mysql_fields[field].max_length = len; + } + } + } + cur->data[field] = to; /* End of last field */ + if ((pkt_len = cli_safe_read(mysql, &is_data_packet)) == packet_error) { + free_rows(result); + DBUG_RETURN(0); + } + } + *prev_ptr = 0; /* last pointer is null */ + /* read EOF packet or OK packet if it is new client */ + if (pkt_len > 1) { + if (mysql->server_capabilities & CLIENT_DEPRECATE_EOF && !is_data_packet) + read_ok_ex(mysql, pkt_len); + else { + mysql->warning_count = uint2korr(cp + 1); + mysql->server_status = uint2korr(cp + 3); + } + + DBUG_PRINT("info", ("status: %u warning_count: %u", mysql->server_status, + mysql->warning_count)); + } + +#if defined(CLIENT_PROTOCOL_TRACING) + if (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); + else + MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); +#endif + DBUG_PRINT("exit", ("Got %lu rows", (ulong)result->rows)); + DBUG_RETURN(result); +} + +static int read_one_row_complete(MYSQL *mysql, ulong pkt_len, + bool is_data_packet, uint fields, + MYSQL_ROW row, ulong *lengths) { + uint field; + ulong len; + uchar *pos, *prev_pos, *end_pos; + NET *net = &mysql->net; + + if (net->read_pos[0] != 0x00 && !is_data_packet) { + if (pkt_len > 1) /* MySQL 4.1 protocol */ + { + if (mysql->server_capabilities & CLIENT_DEPRECATE_EOF) + read_ok_ex(mysql, pkt_len); + else { + mysql->warning_count = uint2korr(net->read_pos + 1); + mysql->server_status = uint2korr(net->read_pos + 3); + } + } +#if defined(CLIENT_PROTOCOL_TRACING) + if (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); + else + MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); +#endif + return 1; /* End of data */ + } + prev_pos = 0; /* allowed to write at packet[-1] */ + pos = net->read_pos; + end_pos = pos + pkt_len; + for (field = 0; field < fields; field++) { + len = (ulong)net_field_length_checked(&pos, (ulong)(end_pos - pos)); + if (pos > end_pos) { + set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate); + return -1; + } + + if (len == NULL_LENGTH) { + row[field] = 0; + *lengths++ = 0; + } else { + row[field] = (char *)pos; + pos += len; + *lengths++ = len; + } + if (prev_pos) *prev_pos = 0; /* Terminate prev field */ + prev_pos = pos; + } + row[field] = (char *)prev_pos + 1; /* End of last field */ + *prev_pos = 0; /* Terminate last field */ + return 0; +} + +/* + Read one row. Uses packet buffer as storage for fields. + When next packet is read, the previous field values are destroyed +*/ + +static int read_one_row(MYSQL *mysql, uint fields, MYSQL_ROW row, + ulong *lengths) { + ulong pkt_len; + bool is_data_packet; + + if ((pkt_len = cli_safe_read(mysql, &is_data_packet)) == packet_error) + return -1; + + return read_one_row_complete(mysql, pkt_len, is_data_packet, fields, row, + lengths); +} + +static net_async_status read_one_row_nonblocking(MYSQL *mysql, uint fields, + MYSQL_ROW row, ulong *lengths, + int *res) { + ulong pkt_len; + bool is_data_packet; + net_async_status status; + + status = cli_safe_read_nonblocking(mysql, &is_data_packet, &pkt_len); + if (status == NET_ASYNC_NOT_READY) { + return status; + } + + mysql->packet_length = pkt_len; + if (pkt_len == packet_error) { + *res = -1; + return NET_ASYNC_COMPLETE; + } + + *res = read_one_row_complete(mysql, pkt_len, is_data_packet, fields, row, + lengths); + return NET_ASYNC_COMPLETE; +} + +/**************************************************************************** + Init MySQL structure or allocate one +****************************************************************************/ + +MYSQL *STDCALL mysql_init(MYSQL *mysql) { + if (mysql_server_init(0, NULL, NULL)) return 0; + if (!mysql) { + if (!(mysql = (MYSQL *)my_malloc(key_memory_MYSQL, sizeof(*mysql), + MYF(MY_WME | MY_ZEROFILL)))) { + set_mysql_error(NULL, CR_OUT_OF_MEMORY, unknown_sqlstate); + return 0; + } + mysql->free_me = 1; + } else + memset(mysql, 0, sizeof(*(mysql))); + mysql->charset = default_client_charset_info; + mysql->field_alloc = (MEM_ROOT *)my_malloc( + key_memory_MYSQL, sizeof(*mysql->field_alloc), MYF(MY_WME | MY_ZEROFILL)); + if (!mysql->field_alloc) { + set_mysql_error(NULL, CR_OUT_OF_MEMORY, unknown_sqlstate); + if (mysql->free_me) my_free(mysql); + return 0; + } + my_stpcpy(mysql->net.sqlstate, not_error_sqlstate); + + /* + Only enable LOAD DATA INFILE by default if configured with option + ENABLED_LOCAL_INFILE + */ + +#if defined(ENABLED_LOCAL_INFILE) && !defined(MYSQL_SERVER) + mysql->options.client_flag |= CLIENT_LOCAL_FILES; +#endif + +#if defined(_WIN32) + mysql->options.shared_memory_base_name = (char *)def_shared_memory_base_name; +#endif + + mysql->options.report_data_truncation = true; /* default */ + + /* Initialize extensions. */ + if (!(mysql->extension = mysql_extension_init(mysql))) { + set_mysql_error(NULL, CR_OUT_OF_MEMORY, unknown_sqlstate); + return 0; + } + + /* + By default we don't reconnect because it could silently corrupt data (after + reconnection you potentially lose table locks, user variables, session + variables (transactions but they are specifically dealt with in + mysql_reconnect()). + This is a change: < 5.0.3 mysql->reconnect was set to 1 by default. + How this change impacts existing apps: + - existing apps which relyed on the default will see a behaviour change; + they will have to set reconnect=1 after mysql_real_connect(). + - existing apps which explicitely asked for reconnection (the only way they + could do it was by setting mysql.reconnect to 1 after mysql_real_connect()) + will not see a behaviour change. + - existing apps which explicitely asked for no reconnection + (mysql.reconnect=0) will not see a behaviour change. + */ + mysql->reconnect = 0; +#if defined(HAVE_OPENSSL) && !defined(MYSQL_SERVER) + ENSURE_EXTENSIONS_PRESENT(&mysql->options); + mysql->options.extension->ssl_mode = SSL_MODE_PREFERRED; +#endif + + mysql->resultset_metadata = RESULTSET_METADATA_FULL; + ASYNC_DATA(mysql)->async_op_status = ASYNC_OP_UNSET; + + return mysql; +} + +/* + MYSQL::extension handling (see sql_common.h for declaration + of MYSQL_EXTENSION structure). +*/ + +MYSQL_EXTENSION *mysql_extension_init(MYSQL *mysql MY_ATTRIBUTE((unused))) { + MYSQL_EXTENSION *ext; + + ext = static_cast<MYSQL_EXTENSION *>(my_malloc(PSI_NOT_INSTRUMENTED, + sizeof(MYSQL_EXTENSION), + MYF(MY_WME | MY_ZEROFILL))); + ext->mysql_async_context = static_cast<MYSQL_ASYNC *>( + my_malloc(PSI_NOT_INSTRUMENTED, sizeof(struct MYSQL_ASYNC), + MYF(MY_WME | MY_ZEROFILL))); + /* set default value */ + ext->mysql_async_context->async_op_status = ASYNC_OP_UNSET; + + return ext; +} + +void mysql_extension_free(MYSQL_EXTENSION *ext) { + if (!ext) return; + if (ext->trace_data) my_free(ext->trace_data); + if (ext->mysql_async_context) my_free(ext->mysql_async_context); + // free state change related resources. + free_state_change_info(ext); + + my_free(ext); +} + +/* + Fill in SSL part of MYSQL structure and set 'use_ssl' flag. + NB! Errors are not reported until you do mysql_real_connect. +*/ + +bool STDCALL mysql_ssl_set(MYSQL *mysql MY_ATTRIBUTE((unused)), + const char *key MY_ATTRIBUTE((unused)), + const char *cert MY_ATTRIBUTE((unused)), + const char *ca MY_ATTRIBUTE((unused)), + const char *capath MY_ATTRIBUTE((unused)), + const char *cipher MY_ATTRIBUTE((unused))) { + bool result = 0; + DBUG_ENTER("mysql_ssl_set"); +#if defined(HAVE_OPENSSL) + result = mysql_options(mysql, MYSQL_OPT_SSL_KEY, key) + + mysql_options(mysql, MYSQL_OPT_SSL_CERT, cert) + + mysql_options(mysql, MYSQL_OPT_SSL_CA, ca) + + mysql_options(mysql, MYSQL_OPT_SSL_CAPATH, capath) + + mysql_options(mysql, MYSQL_OPT_SSL_CIPHER, cipher) + ? 1 + : 0; +#endif + DBUG_RETURN(result); +} + +/* + Free strings in the SSL structure and clear 'use_ssl' flag. + NB! Errors are not reported until you do mysql_real_connect. +*/ + +#if defined(HAVE_OPENSSL) + +static void mysql_ssl_free(MYSQL *mysql) { + struct st_VioSSLFd *ssl_fd = (struct st_VioSSLFd *)mysql->connector_fd; + DBUG_ENTER("mysql_ssl_free"); + + my_free(mysql->options.ssl_key); + my_free(mysql->options.ssl_cert); + my_free(mysql->options.ssl_ca); + my_free(mysql->options.ssl_capath); + my_free(mysql->options.ssl_cipher); + if (mysql->options.extension) { + my_free(mysql->options.extension->tls_version); + my_free(mysql->options.extension->ssl_crl); + my_free(mysql->options.extension->ssl_crlpath); + my_free(mysql->options.extension->tls_ciphersuites); + } + if (ssl_fd) SSL_CTX_free(ssl_fd->ssl_context); + my_free(mysql->connector_fd); + mysql->options.ssl_key = 0; + mysql->options.ssl_cert = 0; + mysql->options.ssl_ca = 0; + mysql->options.ssl_capath = 0; + mysql->options.ssl_cipher = 0; + if (mysql->options.extension) { + mysql->options.extension->ssl_crl = 0; + mysql->options.extension->ssl_crlpath = 0; + mysql->options.extension->ssl_ctx_flags = 0; + mysql->options.extension->tls_version = 0; + mysql->options.extension->ssl_mode = SSL_MODE_DISABLED; + mysql->options.extension->ssl_fips_mode = SSL_FIPS_MODE_OFF; + mysql->options.extension->tls_ciphersuites = 0; + } + mysql->connector_fd = 0; + DBUG_VOID_RETURN; +} + +#endif /* HAVE_OPENSSL */ + +/* + Return the SSL cipher (if any) used for current + connection to the server. + + SYNOPSYS + mysql_get_ssl_cipher() + mysql pointer to the mysql connection + +*/ + +const char *STDCALL mysql_get_ssl_cipher(MYSQL *mysql MY_ATTRIBUTE((unused))) { + DBUG_ENTER("mysql_get_ssl_cipher"); +#if defined(HAVE_OPENSSL) + if (mysql->net.vio && mysql->net.vio->ssl_arg) + DBUG_RETURN(SSL_get_cipher_name((SSL *)mysql->net.vio->ssl_arg)); +#endif /* HAVE_OPENSSL */ + DBUG_RETURN(NULL); +} + +/* + Check the server's (subject) Common Name against the + hostname we connected to + + SYNOPSIS + ssl_verify_server_cert() + vio pointer to a SSL connected vio + server_hostname name of the server that we connected to + errptr if we fail, we'll return (a pointer to a string + describing) the reason here + + RETURN VALUES + 0 Success + 1 Failed to validate server + + */ + +#if defined(HAVE_OPENSSL) + +static int ssl_verify_server_cert(Vio *vio, const char *server_hostname, + const char **errptr) { + SSL *ssl; + X509 *server_cert = NULL; + int ret_validation = 1; + +#if !(OPENSSL_VERSION_NUMBER >= 0x10002000L || defined(HAVE_WOLFSSL)) + int cn_loc = -1; + char *cn = NULL; + ASN1_STRING *cn_asn1 = NULL; + X509_NAME_ENTRY *cn_entry = NULL; + X509_NAME *subject = NULL; +#endif + + DBUG_ENTER("ssl_verify_server_cert"); + DBUG_PRINT("enter", ("server_hostname: %s", server_hostname)); + + if (!(ssl = (SSL *)vio->ssl_arg)) { + *errptr = "No SSL pointer found"; + goto error; + } + + if (!server_hostname) { + *errptr = "No server hostname supplied"; + goto error; + } + + if (!(server_cert = SSL_get_peer_certificate(ssl))) { + *errptr = "Could not get server certificate"; + goto error; + } + + if (X509_V_OK != SSL_get_verify_result(ssl)) { + *errptr = "Failed to verify the server certificate"; + goto error; + } + /* + We already know that the certificate exchanged was valid; the SSL library + handled that. Now we need to verify that the contents of the certificate + are what we expect. + */ + + /* Use OpenSSL certificate matching functions instead of our own if we + have OpenSSL. The X509_check_* functions return 1 on success. + */ +#if OPENSSL_VERSION_NUMBER >= 0x10002000L || defined(HAVE_WOLFSSL) + if ((X509_check_host(server_cert, server_hostname, strlen(server_hostname), 0, + 0) != 1) && + (X509_check_ip_asc(server_cert, server_hostname, 0) != 1)) { + *errptr = + "Failed to verify the server certificate via X509 certificate " + "matching functions"; + goto error; + + } else { + /* Success */ + ret_validation = 0; + } +#else /* OPENSSL_VERSION_NUMBER < 0x10002000L */ + /* + OpenSSL prior to 1.0.2 do not support X509_check_host() function. + Use deprecated X509_get_subject_name() instead. + */ + subject = X509_get_subject_name((X509 *)server_cert); + // Find the CN location in the subject + cn_loc = X509_NAME_get_index_by_NID(subject, NID_commonName, -1); + if (cn_loc < 0) { + *errptr = "Failed to get CN location in the certificate subject"; + goto error; + } + + // Get the CN entry for given location + cn_entry = X509_NAME_get_entry(subject, cn_loc); + if (cn_entry == NULL) { + *errptr = "Failed to get CN entry using CN location"; + goto error; + } + + // Get CN from common name entry + cn_asn1 = X509_NAME_ENTRY_get_data(cn_entry); + if (cn_asn1 == NULL) { + *errptr = "Failed to get CN from CN entry"; + goto error; + } + + cn = (char *)ASN1_STRING_data(cn_asn1); + + // There should not be any NULL embedded in the CN + if ((size_t)ASN1_STRING_length(cn_asn1) != strlen(cn)) { + *errptr = "NULL embedded in the certificate CN"; + goto error; + } + + DBUG_PRINT("info", ("Server hostname in cert: %s", cn)); + if (!strcmp(cn, server_hostname)) { + /* Success */ + ret_validation = 0; + } +#endif /* OPENSSL_VERSION_NUMBER >= 0x10002000L */ + + *errptr = "SSL certificate validation failure"; + +error: + if (server_cert != NULL) X509_free(server_cert); + DBUG_RETURN(ret_validation); +} + +#endif /* HAVE_OPENSSL */ + +/* + Note that the mysql argument must be initialized with mysql_init() + before calling mysql_real_connect ! +*/ + +static bool cli_read_query_result(MYSQL *mysql); +static net_async_status cli_read_query_result_nonblocking(MYSQL *mysql); +static MYSQL_RES *cli_use_result(MYSQL *mysql); + +int cli_read_change_user_result(MYSQL *mysql) { + return cli_safe_read(mysql, NULL); +} + +net_async_status cli_read_change_user_result_nonblocking(MYSQL *mysql, + ulong *ret) { + return cli_safe_read_nonblocking(mysql, nullptr, ret); +} + +static MYSQL_METHODS client_methods = { + cli_read_query_result, /* read_query_result */ + cli_advanced_command, /* advanced_command */ + cli_read_rows, /* read_rows */ + cli_use_result, /* use_result */ + cli_fetch_lengths, /* fetch_lengths */ + cli_flush_use_result, /* flush_use_result */ + cli_read_change_user_result /* read_change_user_result */ +#ifndef MYSQL_SERVER + , + cli_list_fields, /* list_fields */ + cli_read_prepare_result, /* read_prepare_result */ + cli_stmt_execute, /* stmt_execute */ + cli_read_binary_rows, /* read_binary_rows */ + cli_unbuffered_fetch, /* unbuffered_fetch */ + cli_read_statistics, /* read_statistics */ + cli_read_query_result, /* next_result */ + cli_read_binary_rows, /* read_rows_from_cursor */ + free_rows +#endif + , + cli_read_query_result_nonblocking, /* read_query_result_nonblocking */ + cli_advanced_command_nonblocking, /* advanced_command_nonblocking */ + cli_read_rows_nonblocking, /* read_rows_nonblocking */ + cli_flush_use_result_nonblocking, /* flush_use_result_nonblocking */ + cli_read_query_result_nonblocking, /* next_result_nonblocking */ + cli_read_change_user_result_nonblocking /* read_change_user_result_nonblocking + */ +}; + +typedef enum my_cs_match_type_enum { + /* MySQL and OS charsets are fully compatible */ + my_cs_exact, + /* MySQL charset is very close to OS charset */ + my_cs_approx, + /* + MySQL knows this charset, but it is not supported as client character set. + */ + my_cs_unsupp +} my_cs_match_type; + +struct MY_CSET_OS_NAME { + const char *os_name; + const char *my_name; + my_cs_match_type param; +}; + +const MY_CSET_OS_NAME charsets[] = { +#ifdef _WIN32 + {"cp437", "cp850", my_cs_approx}, + {"cp850", "cp850", my_cs_exact}, + {"cp852", "cp852", my_cs_exact}, + {"cp858", "cp850", my_cs_approx}, + {"cp866", "cp866", my_cs_exact}, + {"cp874", "tis620", my_cs_approx}, + {"cp932", "cp932", my_cs_exact}, + {"cp936", "gbk", my_cs_approx}, + {"cp949", "euckr", my_cs_approx}, + {"cp950", "big5", my_cs_exact}, + {"cp1200", "utf16le", my_cs_unsupp}, + {"cp1201", "utf16", my_cs_unsupp}, + {"cp1250", "cp1250", my_cs_exact}, + {"cp1251", "cp1251", my_cs_exact}, + {"cp1252", "latin1", my_cs_exact}, + {"cp1253", "greek", my_cs_exact}, + {"cp1254", "latin5", my_cs_exact}, + {"cp1255", "hebrew", my_cs_approx}, + {"cp1256", "cp1256", my_cs_exact}, + {"cp1257", "cp1257", my_cs_exact}, + {"cp10000", "macroman", my_cs_exact}, + {"cp10001", "sjis", my_cs_approx}, + {"cp10002", "big5", my_cs_approx}, + {"cp10008", "gb2312", my_cs_approx}, + {"cp10021", "tis620", my_cs_approx}, + {"cp10029", "macce", my_cs_exact}, + {"cp12001", "utf32", my_cs_unsupp}, + {"cp20107", "swe7", my_cs_exact}, + {"cp20127", "latin1", my_cs_approx}, + {"cp20866", "koi8r", my_cs_exact}, + {"cp20932", "ujis", my_cs_exact}, + {"cp20936", "gb2312", my_cs_approx}, + {"cp20949", "euckr", my_cs_approx}, + {"cp21866", "koi8u", my_cs_exact}, + {"cp28591", "latin1", my_cs_approx}, + {"cp28592", "latin2", my_cs_exact}, + {"cp28597", "greek", my_cs_exact}, + {"cp28598", "hebrew", my_cs_exact}, + {"cp28599", "latin5", my_cs_exact}, + {"cp28603", "latin7", my_cs_exact}, + {"cp38598", "hebrew", my_cs_exact}, + {"cp51932", "ujis", my_cs_exact}, + {"cp51936", "gb2312", my_cs_exact}, + {"cp51949", "euckr", my_cs_exact}, + {"cp51950", "big5", my_cs_exact}, + {"cp54936", "gb18030", my_cs_exact}, + {"cp65001", "utf8mb4", my_cs_exact}, + +#else /* not Windows */ + + {"646", "latin1", my_cs_approx}, /* Default on Solaris */ + {"ANSI_X3.4-1968", "latin1", my_cs_approx}, + {"ansi1251", "cp1251", my_cs_exact}, + {"armscii8", "armscii8", my_cs_exact}, + {"armscii-8", "armscii8", my_cs_exact}, + {"ASCII", "latin1", my_cs_approx}, + {"Big5", "big5", my_cs_exact}, + {"cp1251", "cp1251", my_cs_exact}, + {"cp1255", "hebrew", my_cs_approx}, + {"CP866", "cp866", my_cs_exact}, + {"eucCN", "gb2312", my_cs_exact}, + {"euc-CN", "gb2312", my_cs_exact}, + {"eucJP", "ujis", my_cs_exact}, + {"euc-JP", "ujis", my_cs_exact}, + {"eucKR", "euckr", my_cs_exact}, + {"euc-KR", "euckr", my_cs_exact}, + {"gb18030", "gb18030", my_cs_exact}, + {"gb2312", "gb2312", my_cs_exact}, + {"gbk", "gbk", my_cs_exact}, + {"georgianps", "geostd8", my_cs_exact}, + {"georgian-ps", "geostd8", my_cs_exact}, + {"IBM-1252", "cp1252", my_cs_exact}, + + {"iso88591", "latin1", my_cs_approx}, + {"ISO_8859-1", "latin1", my_cs_approx}, + {"ISO8859-1", "latin1", my_cs_approx}, + {"ISO-8859-1", "latin1", my_cs_approx}, + + {"iso885913", "latin7", my_cs_exact}, + {"ISO_8859-13", "latin7", my_cs_exact}, + {"ISO8859-13", "latin7", my_cs_exact}, + {"ISO-8859-13", "latin7", my_cs_exact}, + + {"iso88592", "latin2", my_cs_exact}, + {"ISO_8859-2", "latin2", my_cs_exact}, + {"ISO8859-2", "latin2", my_cs_exact}, + {"ISO-8859-2", "latin2", my_cs_exact}, + + {"iso88597", "greek", my_cs_exact}, + {"ISO_8859-7", "greek", my_cs_exact}, + {"ISO8859-7", "greek", my_cs_exact}, + {"ISO-8859-7", "greek", my_cs_exact}, + + {"iso88598", "hebrew", my_cs_exact}, + {"ISO_8859-8", "hebrew", my_cs_exact}, + {"ISO8859-8", "hebrew", my_cs_exact}, + {"ISO-8859-8", "hebrew", my_cs_exact}, + + {"iso88599", "latin5", my_cs_exact}, + {"ISO_8859-9", "latin5", my_cs_exact}, + {"ISO8859-9", "latin5", my_cs_exact}, + {"ISO-8859-9", "latin5", my_cs_exact}, + + {"koi8r", "koi8r", my_cs_exact}, + {"KOI8-R", "koi8r", my_cs_exact}, + {"koi8u", "koi8u", my_cs_exact}, + {"KOI8-U", "koi8u", my_cs_exact}, + + {"roman8", "hp8", my_cs_exact}, /* Default on HP UX */ + + {"Shift_JIS", "sjis", my_cs_exact}, + {"SJIS", "sjis", my_cs_exact}, + {"shiftjisx0213", "sjis", my_cs_exact}, + + {"tis620", "tis620", my_cs_exact}, + {"tis-620", "tis620", my_cs_exact}, + + {"ujis", "ujis", my_cs_exact}, + + {"US-ASCII", "latin1", my_cs_approx}, + + {"utf8", "utf8mb4", my_cs_exact}, + {"utf-8", "utf8mb4", my_cs_exact}, +#endif + {NULL, NULL, my_cs_exact}}; + +const char *my_os_charset_to_mysql_charset(const char *csname) { + const MY_CSET_OS_NAME *csp; + for (csp = charsets; csp->os_name; csp++) { + if (!my_strcasecmp(&my_charset_latin1, csp->os_name, csname)) { + switch (csp->param) { + case my_cs_exact: + return csp->my_name; + + case my_cs_approx: + /* + Maybe we should print a warning eventually: + character set correspondence is not exact. + */ + return csp->my_name; + + default: + my_printf_error(ER_UNKNOWN_ERROR, + "OS character set '%s'" + " is not supported by MySQL client", + MYF(0), csp->my_name); + goto def; + } + } + } + + my_printf_error(ER_UNKNOWN_ERROR, "Unknown OS character set '%s'.", MYF(0), + csname); + +def: + csname = MYSQL_DEFAULT_CHARSET_NAME; + my_printf_error(ER_UNKNOWN_ERROR, + "Switching to the default character set '%s'.", MYF(0), + csname); + return csname; +} + +#ifndef _WIN32 +#include <stdlib.h> /* for getenv() */ +#ifdef HAVE_LANGINFO_H +#include <langinfo.h> +#endif +#include <locale.h> +#endif /* _WIN32 */ + +static int mysql_autodetect_character_set(MYSQL *mysql) { + const char *csname = MYSQL_DEFAULT_CHARSET_NAME; + +#ifdef _WIN32 + char cpbuf[64]; + { + snprintf(cpbuf, sizeof(cpbuf), "cp%d", (int)GetConsoleCP()); + csname = my_os_charset_to_mysql_charset(cpbuf); + } +#elif defined(HAVE_NL_LANGINFO) + { + if (setlocale(LC_CTYPE, "") && (csname = nl_langinfo(CODESET))) + csname = my_os_charset_to_mysql_charset(csname); + } +#endif + + if (mysql->options.charset_name) my_free(mysql->options.charset_name); + if (!(mysql->options.charset_name = + my_strdup(key_memory_mysql_options, csname, MYF(MY_WME)))) + return 1; + return 0; +} + +static void mysql_set_character_set_with_default_collation(MYSQL *mysql) { + const char *save = charsets_dir; + if (mysql->options.charset_dir) { +#ifdef MYSQL_SERVER + // Do not change charsets_dir, it is not thread safe. + DBUG_ASSERT(false); +#else + charsets_dir = mysql->options.charset_dir; +#endif + } + if ((mysql->charset = get_charset_by_csname(mysql->options.charset_name, + MY_CS_PRIMARY, MYF(MY_WME)))) { + /* Try to set compiled default collation when it's possible. */ + CHARSET_INFO *collation; + if ((collation = + get_charset_by_name(MYSQL_DEFAULT_COLLATION_NAME, MYF(MY_WME))) && + my_charset_same(mysql->charset, collation)) { + mysql->charset = collation; + } else { + /* + Default compiled collation not found, or is not applicable + to the requested character set. + Continue with the default collation of the character set. + */ + } + } + charsets_dir = save; +} + +int mysql_init_character_set(MYSQL *mysql) { + /* Set character set */ + if (!mysql->options.charset_name) { + if (!(mysql->options.charset_name = + my_strdup(key_memory_mysql_options, MYSQL_DEFAULT_CHARSET_NAME, + MYF(MY_WME)))) + return 1; + } else if (!strcmp(mysql->options.charset_name, + MYSQL_AUTODETECT_CHARSET_NAME) && + mysql_autodetect_character_set(mysql)) + return 1; + + mysql_set_character_set_with_default_collation(mysql); + + if (!mysql->charset) { + if (mysql->options.charset_dir) + set_mysql_extended_error(mysql, CR_CANT_READ_CHARSET, unknown_sqlstate, + ER_CLIENT(CR_CANT_READ_CHARSET), + mysql->options.charset_name, + mysql->options.charset_dir); + else { + char cs_dir_name[FN_REFLEN]; + get_charsets_dir(cs_dir_name); + set_mysql_extended_error(mysql, CR_CANT_READ_CHARSET, unknown_sqlstate, + ER_CLIENT(CR_CANT_READ_CHARSET), + mysql->options.charset_name, cs_dir_name); + } + return 1; + } + return 0; +} + +/*********** client side authentication support **************************/ + +static int client_mpvio_write_packet(MYSQL_PLUGIN_VIO *, const uchar *, int); +static net_async_status client_mpvio_write_packet_nonblocking( + struct MYSQL_PLUGIN_VIO *, const uchar *, int, int *); +static int native_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql); +static net_async_status native_password_auth_client_nonblocking( + MYSQL_PLUGIN_VIO *vio, MYSQL *mysql, int *result); +static int clear_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql); + +static auth_plugin_t native_password_client_plugin = { + MYSQL_CLIENT_AUTHENTICATION_PLUGIN, + MYSQL_CLIENT_AUTHENTICATION_PLUGIN_INTERFACE_VERSION, + native_password_plugin_name, + "R.J.Silk, Sergei Golubchik", + "Native MySQL authentication", + {1, 0, 0}, + "GPL", + NULL, + NULL, + NULL, + NULL, + native_password_auth_client, + native_password_auth_client_nonblocking}; + +static auth_plugin_t clear_password_client_plugin = { + MYSQL_CLIENT_AUTHENTICATION_PLUGIN, + MYSQL_CLIENT_AUTHENTICATION_PLUGIN_INTERFACE_VERSION, + "mysql_clear_password", + "Georgi Kodinov", + "Clear password authentication plugin", + {0, 1, 0}, + "GPL", + NULL, + NULL, + NULL, + NULL, + clear_password_auth_client, + NULL}; + +#if defined(HAVE_OPENSSL) +static auth_plugin_t sha256_password_client_plugin = { + MYSQL_CLIENT_AUTHENTICATION_PLUGIN, + MYSQL_CLIENT_AUTHENTICATION_PLUGIN_INTERFACE_VERSION, + "sha256_password", + "Oracle Inc", + "SHA256 based authentication with salt", + {1, 0, 0}, + "GPL", + NULL, + sha256_password_init, + sha256_password_deinit, + NULL, + sha256_password_auth_client, + sha256_password_auth_client_nonblocking}; + +static auth_plugin_t caching_sha2_password_client_plugin = { + MYSQL_CLIENT_AUTHENTICATION_PLUGIN, + MYSQL_CLIENT_AUTHENTICATION_PLUGIN_INTERFACE_VERSION, + caching_sha2_password_plugin_name, + "Oracle Inc", + "SHA2 based authentication with salt", + {1, 0, 0}, + "GPL", + NULL, + caching_sha2_password_init, + caching_sha2_password_deinit, + NULL, + caching_sha2_password_auth_client, + caching_sha2_password_auth_client_nonblocking}; +#endif +#ifdef AUTHENTICATION_WIN +extern "C" auth_plugin_t win_auth_client_plugin; +#endif + +/* + Test trace plugin can be used only in debug builds. In non-debug ones + it is ignored, even if it was enabled by build options (TEST_TRACE_PLUGIN + macro). +*/ + +#if defined(CLIENT_PROTOCOL_TRACING) && defined(TEST_TRACE_PLUGIN) && \ + !defined(DBUG_OFF) +extern auth_plugin_t test_trace_plugin; +#endif + +struct st_mysql_client_plugin *mysql_client_builtins[] = { + (struct st_mysql_client_plugin *)&native_password_client_plugin, + (struct st_mysql_client_plugin *)&clear_password_client_plugin, +#if defined(HAVE_OPENSSL) + (struct st_mysql_client_plugin *)&sha256_password_client_plugin, + (struct st_mysql_client_plugin *)&caching_sha2_password_client_plugin, +#endif +#ifdef AUTHENTICATION_WIN + (struct st_mysql_client_plugin *)&win_auth_client_plugin, +#endif +#if defined(CLIENT_PROTOCOL_TRACING) && defined(TEST_TRACE_PLUGIN) && \ + !defined(DBUG_OFF) + (struct st_mysql_client_plugin *)&test_trace_plugin, +#endif + 0}; + +static uchar *write_length_encoded_string3(uchar *buf, const char *string, + size_t length) { + buf = net_store_length(buf, length); + memcpy(buf, string, length); + buf += length; + return buf; +} + +/* + The main purpose of this is to hide C++ from st_mysql_options_extention. + */ +struct My_hash { + malloc_unordered_map<string, string> hash{key_memory_mysql_options}; +}; + +uchar *send_client_connect_attrs(MYSQL *mysql, uchar *buf) { + /* check if the server supports connection attributes */ + if (mysql->server_capabilities & CLIENT_CONNECT_ATTRS) { + /* Always store the length if the client supports it */ + buf = net_store_length( + buf, mysql->options.extension + ? mysql->options.extension->connection_attributes_length + : 0); + + /* check if we have connection attributes */ + if (mysql->options.extension && + mysql->options.extension->connection_attributes) { + /* loop over and dump the connection attributes */ + for (const auto &key_and_value : + mysql->options.extension->connection_attributes->hash) { + const string &key = key_and_value.first; + const string &value = key_and_value.second; + + /* we can't have zero length keys */ + DBUG_ASSERT(!key.empty()); + + buf = write_length_encoded_string3(buf, key.data(), key.size()); + buf = write_length_encoded_string3(buf, value.data(), value.size()); + } + } + } + return buf; +} + +static size_t get_length_store_length(size_t length) { +/* as defined in net_store_length */ +#define MAX_VARIABLE_STRING_LENGTH 9 + uchar length_buffer[MAX_VARIABLE_STRING_LENGTH], *ptr; + + ptr = net_store_length(length_buffer, length); + + return ptr - &length_buffer[0]; +} + +/* + Write 1-8 bytes of string length header infromation to dest depending on + value of src_len, then copy src_len bytes from src to dest. + + @param dest Destination buffer of size src_len+8 + @param dest_end One byte past the end of the dest buffer + @param src Source buff of size src_len + @param src_end One byte past the end of the src buffer + + @return pointer dest+src_len+header size or NULL if +*/ + +static char *write_length_encoded_string4(char *dest, char *dest_end, + const uchar *src, + const uchar *src_end) { + size_t src_len = (size_t)(src_end - src); + uchar *to = net_store_length((uchar *)dest, src_len); + if ((char *)(to + src_len) >= dest_end) return NULL; + memcpy(to, src, src_len); + return (char *)(to + src_len); +} + +/* + Write 1 byte of string length header information to dest and + copy src_len bytes from src to dest. +*/ +static char *write_string(char *dest, char *dest_end, const uchar *src, + const uchar *src_end) { + size_t src_len = (size_t)(src_end - src); + uchar *to = NULL; + if (src_len >= 251) return NULL; + *dest = (uchar)src_len; + to = (uchar *)dest + 1; + if ((char *)(to + src_len) >= dest_end) return NULL; + memcpy(to, src, src_len); + return (char *)(to + src_len); +} +/** + Sends a @ref page_protocol_com_change_user + with a caller provided payload + + @retval 0 ok + @retval 1 error +*/ +static int send_change_user_packet(MCPVIO_EXT *mpvio, const uchar *data, + int data_len) { + MYSQL *mysql = mpvio->mysql; + char *buff, *end; + int res = 1; + size_t connect_attrs_len = + (mysql->server_capabilities & CLIENT_CONNECT_ATTRS && + mysql->options.extension) + ? mysql->options.extension->connection_attributes_length + : 0; + + buff = static_cast<char *>( + my_alloca(USERNAME_LENGTH + data_len + 1 + NAME_LEN + 2 + NAME_LEN + + connect_attrs_len + 9 /* for the length of the attrs */)); + + end = strmake(buff, mysql->user, USERNAME_LENGTH) + 1; + + if (!data_len) + *end++ = 0; + else { + DBUG_ASSERT(data_len <= 255); + if (data_len > 255) { + set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); + goto error; + } + *end++ = data_len; + memcpy(end, data, data_len); + end += data_len; + } + end = strmake(end, mpvio->db ? mpvio->db : "", NAME_LEN) + 1; + + if (mysql->server_capabilities & CLIENT_PROTOCOL_41) { + int2store((uchar *)end, (ushort)mysql->charset->number); + end += 2; + } + + if (mysql->server_capabilities & CLIENT_PLUGIN_AUTH) + end = strmake(end, mpvio->plugin->name, NAME_LEN) + 1; + + end = (char *)send_client_connect_attrs(mysql, (uchar *)end); + + res = simple_command(mysql, COM_CHANGE_USER, (uchar *)buff, + (ulong)(end - buff), 1); + +error: + return res; +} + +/* clang-format off */ +/** + @page page_protocol_connection_phase_packets_protocol_ssl_request Protocol::SSLRequest: + + SSL Connection Request Packet. It is like + @ref page_protocol_connection_phase_packets_protocol_handshake_response but is + truncated right before username field. If server supports ::CLIENT_SSL + capability, client can send this packet to request a secure SSL connection. + The ::CLIENT_SSL capability flag must be set inside the SSL Connection Request Packet. + + <table> + <caption>Payload</caption> + <tr><th>Type</th><th>Name</th><th>Description</th></tr> + <tr><td colspan="3">if capabilities @& ::CLIENT_PROTOCOL_41 {</td></tr> + <tr><td>@ref a_protocol_type_int4 "int<4>"</td> + <td>client_flag</td> + <td>\ref group_cs_capabilities_flags</td></tr> + <tr><td>@ref a_protocol_type_int4 "int<4>"</td> + <td>max_packet_size</td> + <td>maximum packet size</td></tr> + <tr><td>@ref a_protocol_type_int1 "int<1>"</td> + <td>character_set</td> + <td>client charset \ref a_protocol_character_set, only the lower 8-bits</td></tr> + <tr><td>@ref sect_protocol_basic_dt_string_fix "string[23]"</td> + <td>filler</td> + <td>filler to the size of the handhshake response packet. All 0s.</td></tr> + <tr><td colspan="3">} else {</td></tr> + <tr><td>@ref a_protocol_type_int2 "int<2>"</td> + <td>client_flag</td> + <td>\ref group_cs_capabilities_flags, only the lower 16 bits</td></tr> + <tr><td>@ref a_protocol_type_int3 "int<3>"</td> + <td>max_packet_size</td> + <td>maximum packet size, 0xFFFFFF max</td></tr> + <tr><td colspan="3">}</td></tr> + </table> + + @sa int2store(), int3store(), int4store(), mysql_fill_packet_header() +*/ +/* clang-format on */ +/** + Fill in the beginning of the client reply packet. + + Used to fill in the beginning of the client reply packet + or the ssl request packet. + + @param mysql The mysql handler to operate + @param[out] buff The buffer to receive the packet + @param buff_size The max size of the buffer. Used in debug only. + @return one past to where the buffer is filled + + @sa page_protocol_conn_packets_protocol_ssl_request + send_client_reply_packet() +*/ +static char *mysql_fill_packet_header(MYSQL *mysql, char *buff, + size_t buff_size MY_ATTRIBUTE((unused))) { + NET *net = &mysql->net; + char *end; + uchar *buff_p = (uchar *)buff; + + if (mysql->client_flag & CLIENT_PROTOCOL_41) { + /* 4.1 server and 4.1 client has a 32 byte option flag */ + DBUG_ASSERT(buff_size >= 32); + + int4store(buff_p, mysql->client_flag); + int4store(buff_p + 4, net->max_packet_size); + buff[8] = (char)mysql->charset->number; + memset(buff + 9, 0, 32 - 9); + end = buff + 32; + } else { + DBUG_ASSERT(buff_size >= 5); + DBUG_ASSERT(mysql->client_flag <= UINT_MAX16); + + int2store(buff_p, (uint16)mysql->client_flag); + int3store(buff_p + 2, net->max_packet_size); + end = buff + 5; + } + return end; +} + +/** + Calcualtes client capabilities in effect (mysql->client_flag) + + Needs to be called immediately after receiving the server handshake packet. + + @param mysql the connection context + @param db The database specified by the client app + @param client_flag The client flag as specified by the client app + */ + +static void cli_calculate_client_flag(MYSQL *mysql, const char *db, + ulong client_flag) { + mysql->client_flag = client_flag; + mysql->client_flag |= mysql->options.client_flag; + mysql->client_flag |= CLIENT_CAPABILITIES; + + if (mysql->client_flag & CLIENT_MULTI_STATEMENTS) + mysql->client_flag |= CLIENT_MULTI_RESULTS; + +#if defined(HAVE_OPENSSL) + if (mysql->options.extension && + mysql->options.extension->ssl_mode != SSL_MODE_DISABLED) + mysql->client_flag |= CLIENT_SSL; +#endif /* HAVE_OPENSSL */ + + if (db) + mysql->client_flag |= CLIENT_CONNECT_WITH_DB; + else + mysql->client_flag &= ~CLIENT_CONNECT_WITH_DB; + + /* Remove options that server doesn't support */ + mysql->client_flag = mysql->client_flag & + (~(CLIENT_COMPRESS | CLIENT_SSL | CLIENT_PROTOCOL_41 | + CLIENT_OPTIONAL_RESULTSET_METADATA) | + mysql->server_capabilities); + + if (mysql->options.protocol == MYSQL_PROTOCOL_SOCKET && + mysql->options.extension && + mysql->options.extension->ssl_mode <= SSL_MODE_PREFERRED) { + mysql->client_flag &= ~CLIENT_SSL; + mysql->options.extension->ssl_mode = SSL_MODE_DISABLED; + } +} + +/** +Establishes SSL if requested and supported. + +@param mysql the connection handle +@retval 0 success +@retval 1 failure +*/ +static int cli_establish_ssl(MYSQL *mysql) { +#ifdef HAVE_OPENSSL + NET *net = &mysql->net; + + /* Don't fallback on unencrypted connection if SSL required. */ + if (mysql->options.extension && + mysql->options.extension->ssl_mode >= SSL_MODE_REQUIRED && + !(mysql->server_capabilities & CLIENT_SSL)) { + set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, + ER_CLIENT(CR_SSL_CONNECTION_ERROR), + "SSL is required but the server doesn't " + "support it"); + goto error; + } + + /* + If the ssl_mode is VERIFY_CA or VERIFY_IDENTITY, make sure that the + connection doesn't succeed without providing the CA certificate. + */ + if (mysql->options.extension && + mysql->options.extension->ssl_mode > SSL_MODE_REQUIRED && + !(mysql->options.ssl_ca || mysql->options.ssl_capath)) { + set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, + ER_CLIENT(CR_SSL_CONNECTION_ERROR), + "CA certificate is required if ssl-mode " + "is VERIFY_CA or VERIFY_IDENTITY"); + goto error; + } + + /* + Attempt SSL connection if ssl_mode != SSL_MODE_DISABLED and the + server supports SSL. Fallback on unencrypted connection otherwise. + */ + if (mysql->options.extension && + mysql->options.extension->ssl_mode != SSL_MODE_DISABLED && + (mysql->server_capabilities & CLIENT_SSL)) { + /* Do the SSL layering. */ + struct st_mysql_options *options = &mysql->options; + struct st_VioSSLFd *ssl_fd; + enum enum_ssl_init_error ssl_init_error = SSL_INITERR_NOERROR; + const char *cert_error; + unsigned long ssl_error; + char buff[33], *end; + + end = mysql_fill_packet_header(mysql, buff, sizeof(buff)); + + /* + Send mysql->client_flag, max_packet_size - unencrypted otherwise + the server does not know we want to do SSL + */ + MYSQL_TRACE(SEND_SSL_REQUEST, mysql, + ((size_t)(end - buff), (const unsigned char *)buff)); + if (my_net_write(net, (uchar *)buff, (size_t)(end - buff)) || + net_flush(net)) { + set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate, + ER_CLIENT(CR_SERVER_LOST_EXTENDED), + "sending connection information to server", + errno); + goto error; + } + + MYSQL_TRACE_STAGE(mysql, SSL_NEGOTIATION); + + /* Create the VioSSLConnectorFd - init SSL and load certs */ + if (!(ssl_fd = new_VioSSLConnectorFd( + options->ssl_key, options->ssl_cert, options->ssl_ca, + options->ssl_capath, options->ssl_cipher, + options->extension ? options->extension->tls_ciphersuites : NULL, + &ssl_init_error, + options->extension ? options->extension->ssl_crl : NULL, + options->extension ? options->extension->ssl_crlpath : NULL, + options->extension ? options->extension->ssl_ctx_flags : 0))) { + set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, + ER_CLIENT(CR_SSL_CONNECTION_ERROR), + sslGetErrString(ssl_init_error)); + goto error; + } + mysql->connector_fd = (unsigned char *)ssl_fd; + + /* Connect to the server */ + DBUG_PRINT("info", ("IO layer change in progress...")); + MYSQL_TRACE(SSL_CONNECT, mysql, ()); + if (sslconnect(ssl_fd, net->vio, (long)(mysql->options.connect_timeout), + &ssl_error, nullptr)) { + char buf[512]; + ERR_error_string_n(ssl_error, buf, 512); + buf[511] = 0; + set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, + ER_CLIENT(CR_SSL_CONNECTION_ERROR), buf); + goto error; + } + DBUG_PRINT("info", ("IO layer change done!")); + + /* Verify server cert */ + if ((mysql->client_flag & CLIENT_SSL_VERIFY_SERVER_CERT) && + ssl_verify_server_cert(net->vio, mysql->host, &cert_error)) { + set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, + ER_CLIENT(CR_SSL_CONNECTION_ERROR), cert_error); + goto error; + } + + MYSQL_TRACE(SSL_CONNECTED, mysql, ()); + MYSQL_TRACE_STAGE(mysql, AUTHENTICATE); + } + + return 0; + +error: + return 1; + +#else + (void)mysql; /* avoid warning */ + return 0; +#endif /* HAVE_OPENSSL */ +} + +/** + This function will establish asynchronous ssl connection by completing 4 + different ssl connection states. Initial state is set to SSL_NONE during + which this functions does priliminary checks like if server supports ssl + or not, if CA certificate is required etc. Once preliminary checks are + done state is changed to SSL_REQUEST. In this state ssl request packet + is sent by client. If this network IO is complete, state is changed to + SSL_CONNECT. During SSL_CONNECT sslconnect() is called which can return + immediately or complete SSL handshake. If it returns immediately client + will save all SSL context in struct mysql_async_auth, so that next call + to this function will ensure that SSL_new() is not called twice. Once + ssl connection is established state is changed to SSL_COMPLETE. + + @param[in] mysql Client connection handle. + @param[out] res set to false incase of success and true for + error. + + @retval NET_ASYNC_NOT_READY ssl connection not yet established + @retval NET_ASYNC_COMPLETE ssl connection established +*/ +static net_async_status cli_establish_ssl_nonblocking(MYSQL *mysql, int *res) { + DBUG_ENTER(__func__); +#ifdef HAVE_OPENSSL + NET *net = &mysql->net; + NET_ASYNC *net_async = NET_ASYNC_DATA(net); + mysql_async_connect *ctx = ASYNC_DATA(mysql)->connect_context; + + if (ctx->ssl_state == SSL_NONE) { + /* Don't fallback on unencrypted connection if SSL required. */ + if (mysql->options.extension && + mysql->options.extension->ssl_mode >= SSL_MODE_REQUIRED && + !(mysql->server_capabilities & CLIENT_SSL)) { + set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, + ER_CLIENT(CR_SSL_CONNECTION_ERROR), + "SSL is required but the server doesn't " + "support it"); + goto error; + } + + /* + If the ssl_mode is VERIFY_CA or VERIFY_IDENTITY, make sure + that the connection doesn't succeed without providing the + CA certificate. + */ + if (mysql->options.extension && + mysql->options.extension->ssl_mode > SSL_MODE_REQUIRED && + !(mysql->options.ssl_ca || mysql->options.ssl_capath)) { + set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, + ER_CLIENT(CR_SSL_CONNECTION_ERROR), + "CA certificate is required if ssl-mode " + "is VERIFY_CA or VERIFY_IDENTITY"); + goto error; + } + + /* + Attempt SSL connection if ssl_mode != SSL_MODE_DISABLED and + the server supports SSL. Fallback on unencrypted + connection otherwise. + */ + if (!mysql->options.extension || + mysql->options.extension->ssl_mode == SSL_MODE_DISABLED || + !(mysql->server_capabilities & CLIENT_SSL)) { + goto done; + } + ctx->ssl_state = SSL_REQUEST; + } + + if (ctx->ssl_state == SSL_REQUEST) { + char buff[33], *end; + + end = mysql_fill_packet_header(mysql, buff, sizeof(buff)); + + /* + Send mysql->client_flag, max_packet_size - unencrypted + otherwise the server does not know we want to do SSL + */ + MYSQL_TRACE(SEND_SSL_REQUEST, mysql, + ((size_t)(end - buff), (const unsigned char *)buff)); + bool ret; + if (my_net_write_nonblocking(net, (uchar *)buff, (size_t)(end - buff), + &ret) == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + + if (ret) { + set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate, + ER_CLIENT(CR_SERVER_LOST_EXTENDED), + "sending connection information to server", + errno); + goto error; + } + + ctx->ssl_state = SSL_CONNECT; + } + + if (ctx->ssl_state == SSL_CONNECT) { + /* Do the SSL layering. */ + struct st_mysql_options *options = &mysql->options; + struct st_VioSSLFd *ssl_fd; + enum enum_ssl_init_error ssl_init_error; + const char *cert_error; + unsigned long ssl_error; + size_t ret; + + MYSQL_TRACE_STAGE(mysql, SSL_NEGOTIATION); + + if (!mysql->connector_fd) { + /* Create the VioSSLConnectorFd - init SSL and load certs */ + if (!(ssl_fd = new_VioSSLConnectorFd( + options->ssl_key, options->ssl_cert, options->ssl_ca, + options->ssl_capath, options->ssl_cipher, + options->extension ? options->extension->tls_ciphersuites + : NULL, + &ssl_init_error, + options->extension ? options->extension->ssl_crl : NULL, + options->extension ? options->extension->ssl_crlpath : NULL, + options->extension ? options->extension->ssl_ctx_flags : 0))) { + set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, + unknown_sqlstate, + ER_CLIENT(CR_SSL_CONNECTION_ERROR), + sslGetErrString(ssl_init_error)); + goto error; + } + mysql->connector_fd = (unsigned char *)ssl_fd; + } else { + ssl_fd = (struct st_VioSSLFd *)mysql->connector_fd; + } + + /* Connect to the server */ + DBUG_PRINT("info", ("IO layer change in progress...")); + MYSQL_TRACE(SSL_CONNECT, mysql, ()); + if ((ret = sslconnect(ssl_fd, net->vio, + (long)(mysql->options.connect_timeout), &ssl_error, + &ctx->ssl))) { + switch (ret) { + case VIO_SOCKET_WANT_READ: + net_async->async_blocking_state = NET_NONBLOCKING_READ; + DBUG_RETURN(NET_ASYNC_NOT_READY); + case VIO_SOCKET_WANT_WRITE: + net_async->async_blocking_state = NET_NONBLOCKING_WRITE; + DBUG_RETURN(NET_ASYNC_NOT_READY); + default: + break; + /* continue for error handling */ + } + + char buf[512]; + ERR_error_string_n(ssl_error, buf, 512); + buf[511] = 0; + set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, + ER_CLIENT(CR_SSL_CONNECTION_ERROR), buf); + goto error; + } + DBUG_PRINT("info", ("IO layer change done!")); + + /* sslconnect creates a new vio, so update it. */ + vio_set_blocking_flag(net->vio, !ctx->non_blocking); + + /* Verify server cert */ + if ((mysql->client_flag & CLIENT_SSL_VERIFY_SERVER_CERT) && + ssl_verify_server_cert(net->vio, mysql->host, &cert_error)) { + set_mysql_extended_error(mysql, CR_SSL_CONNECTION_ERROR, unknown_sqlstate, + ER_CLIENT(CR_SSL_CONNECTION_ERROR), cert_error); + goto error; + } + + MYSQL_TRACE(SSL_CONNECTED, mysql, ()); + MYSQL_TRACE_STAGE(mysql, AUTHENTICATE); + } + +done: + *res = 0; + ctx->ssl_state = SSL_COMPLETE; + DBUG_RETURN(NET_ASYNC_COMPLETE); + +error: + *res = 1; + ctx->ssl_state = SSL_COMPLETE; + DBUG_RETURN(NET_ASYNC_COMPLETE); + +#else + (void)mysql; /* avoid warning */ + *res = 0; + ctx->ssl_state = SSL_COMPLETE; + DBUG_RETURN(NET_ASYNC_COMPLETE); +#endif /* HAVE_OPENSSL */ +} + +/** + Asynchronous authentication phase is divided into several smaller chunks + of subtasks like: + 1. Determine the default/initial plugin to use + 2. Call authentication plugin API + 3. Handle response from authentication plugin API + 4. Check if server asked to use a different authentication plugin + 5. In case server asked to use a different authentication plugin + use that plugin to start the authentication process again. + 6. Complete authentication. + + All above tasks are implemented in below authsm_* functions where + authsm stads for authentication state machine. +*/ +static mysql_state_machine_status authsm_begin_plugin_auth( + mysql_async_auth *ctx); +static mysql_state_machine_status authsm_run_first_authenticate_user( + mysql_async_auth *ctx); +static mysql_state_machine_status authsm_handle_first_authenticate_user( + mysql_async_auth *ctx); +static mysql_state_machine_status authsm_read_change_user_result( + mysql_async_auth *ctx); +static mysql_state_machine_status authsm_handle_change_user_result( + mysql_async_auth *ctx); +static mysql_state_machine_status authsm_run_second_authenticate_user( + mysql_async_auth *ctx); +static mysql_state_machine_status authsm_handle_second_authenticate_user( + mysql_async_auth *ctx); +static mysql_state_machine_status authsm_finish_auth(mysql_async_auth *ctx); + +/** + Asynchronous connection phase is divided into several smaller modules + where wach module does following: + 1. Begin the connection to the server, including any DNS resolution + necessary, socket configuration, etc + 2. Complete the connection itself + 3. Connection established, read the first packet + 4. Parse the handshake from the server + 5. Establish SSL connection if needed + 6. Invoke the plugin to send the authentication data to the server + 7. Authenticated, set intial database if specified + 8. Send COM_INIT_DB. + 9. Prepare to send a sequence of init commands. + 10.Send an init command. + + Below are the modules which does all above tasks. +*/ +static mysql_state_machine_status csm_begin_connect(mysql_async_connect *ctx); +static mysql_state_machine_status csm_complete_connect( + mysql_async_connect *ctx); +static mysql_state_machine_status csm_read_greeting(mysql_async_connect *ctx); +static mysql_state_machine_status csm_parse_handshake(mysql_async_connect *ctx); +static mysql_state_machine_status csm_establish_ssl(mysql_async_connect *ctx); +static mysql_state_machine_status csm_authenticate(mysql_async_connect *ctx); +static mysql_state_machine_status csm_prep_select_database( + mysql_async_connect *ctx); +#ifndef MYSQL_SERVER +static mysql_state_machine_status csm_prep_init_commands( + mysql_async_connect *ctx); +static mysql_state_machine_status csm_send_one_init_command( + mysql_async_connect *ctx); +#endif + +#define MAX_CONNECTION_ATTR_STORAGE_LENGTH 65536 + +int mysql_get_socket_descriptor(MYSQL *mysql) { + if (mysql && mysql->net.vio) { + return vio_fd(mysql->net.vio); + } + return -1; +} + +/* clang-format off */ +/** + @page page_protocol_connection_phase_packets_protocol_handshake_response Protocol::HandshakeResponse: + + Depending on the servers support for the ::CLIENT_PROTOCOL_41 capability and + the clients understanding of that flag the client has to send either + a @ref sect_protocol_connection_phase_packets_protocol_handshake_response320 or + @ref sect_protocol_connection_phase_packets_protocol_handshake_response41. + + @sa send_client_reply_packet + + @section sect_protocol_connection_phase_packets_protocol_handshake_response320 Protocol::HandshakeResponse320 + + Old Handshake Response Packet used by old clients or if the server doesn't + support ::CLIENT_PROTOCOL_41 @ref group_cs_capabilities_flags flag. + + <table> + <caption>Payload</caption> + <tr><th>Type</th><th>Name</th><th>Description</th></tr> + <tr><td>@ref a_protocol_type_int2 "int<2>"</td> + <td>client_flag</td> + <td>\ref group_cs_capabilities_flags, only the lower 16 bits. ::CLIENT_PROTOCOL_41 should never be set</td></tr> + <tr><td>@ref a_protocol_type_int3 "int<3>"</td> + <td>max_packet_size</td> + <td>maximum packet size, 0xFFFFFF max</td></tr> + <tr><td>@ref sect_protocol_basic_dt_string_null "string<NUL>"</td> + <td>username</td> + <td>login user name</td></tr> + <tr><td colspan="3">if capabilities @& ::CLIENT_CONNECT_WITH_DB {</td></tr> + <tr><td>@ref sect_protocol_basic_dt_string_null "string<NUL>"</td> + <td>auth-response</td> + <td>Opaque authentication response data generated by + Authentication Method indicated by the plugin name field.</td></tr> + <tr><td>@ref sect_protocol_basic_dt_string_null "string<NUL>"</td> + <td>database</td> + <td>initail database for the connection. + This string should be interpreted using the character set indicated by + character set field.</td></tr> + <tr><td colspan="3">} else {</td></tr> + <tr><td>@ref sect_protocol_basic_dt_string_eof "string<EOF>"</td> + <td>auth-response</td> + <td>Opaque authentication response data generated by + Authentication Method indicated by the plugin name field.</td></tr> + <tr><td colspan="3">}</td></tr> + </table> + + Example + ======== + + ~~~~~~~~~~~~~~~~~~~~~ + 11 00 00 01 85 24 00 00 00 6f 6c 64 00 47 44 53 .....$...old.GDS + 43 51 59 52 5f CQYR_ + ~~~~~~~~~~~~~~~~~~~~~ + + @note If auth-response is followed by a database field it must be + NULL terminated. + + @section sect_protocol_connection_phase_packets_protocol_handshake_response41 Protocol::HandshakeResponse41 + + Handshake Response Packet sent by 4.1+ clients supporting + ::CLIENT_PROTOCOL_41 @ref group_cs_capabilities_flags flag, + if the server announced it in its + @ref page_protocol_connection_phase_packets_protocol_handshake. + Otherwise (talking to an old server) the + @ref sect_protocol_connection_phase_packets_protocol_handshake_response320 + packet must be used. + + + <table> + <caption>Payload</caption> + <tr><th>Type</th><th>Name</th><th>Description</th></tr> + <tr><td>@ref a_protocol_type_int4 "int<4>"</td> + <td>client_flag</td> + <td>\ref group_cs_capabilities_flags, ::CLIENT_PROTOCOL_41 always set.</td></tr> + <tr><td>@ref a_protocol_type_int4 "int<4>"</td> + <td>max_packet_size</td> + <td>maximum packet size</td></tr> + <tr><td>@ref a_protocol_type_int1 "int<1>"</td> + <td>character_set</td> + <td>client charset \ref a_protocol_character_set, only the lower 8-bits</td></tr> + <tr><td>@ref sect_protocol_basic_dt_string_fix "string[23]"</td> + <td>filler</td> + <td>filler to the size of the handhshake response packet. All 0s.</td></tr> + <tr><td>@ref sect_protocol_basic_dt_string_null "string<NUL>"</td> + <td>username</td> + <td>login user name</td></tr> + <tr><td colspan="3">if capabilities @& ::CLIENT_PLUGIN_AUTH_LENENC_CLIENT_DATA {</td></tr> + <tr><td>@ref sect_protocol_basic_dt_string_le "string<length>"</td> + <td>auth_response</td> + <td>opaque authentication response data generated by + Authentication Method indicated by the plugin name field. </td></tr> + <tr><td colspan="3">} else {</td></tr> + <tr><td>@ref a_protocol_type_int1 "int<1>"</td> + <td>auth_response_length</td> + <td>length of auth_response</td></tr> + <tr><td>@ref sect_protocol_basic_dt_string_le "string<length>"</td> + <td>auth_response</td> + <td>opaque authentication response data generated by + Authentication Method indicated by the plugin name field. </td></tr> + <tr><td colspan="3">}</td></tr> + <tr><td colspan="3">if capabilities @& ::CLIENT_CONNECT_WITH_DB {</td></tr> + <tr><td>@ref sect_protocol_basic_dt_string_null "string<NUL>"</td> + <td>database</td> + <td>initail database for the connection. + This string should be interpreted using the character set indicated by + character set field.</td></tr> + <tr><td colspan="3">}</td></tr> + <tr><td colspan="3">if capabilities @& ::CLIENT_PLUGIN_AUTH {</td></tr> + <tr><td>@ref sect_protocol_basic_dt_string_null "string<NUL>"</td> + <td>client_plugin_name</td> + <td>the Authentication Method used by the client to generate + auth-response value in this packet. This is an UTF-8 string. </td></tr> + <tr><td colspan="3">}</td></tr> + <tr><td colspan="3">if capabilities @& ::CLIENT_CONNECT_ATTRS {</td></tr> + <tr><td>@ref sect_protocol_basic_dt_int_le "int<lenenc>"</td> + <td>length of all key-values</td> + <td>affected rows</td></tr> + <tr><td>@ref sect_protocol_basic_dt_string_le "string<lenenc>"</td> + <td>key1</td> + <td>Name of the 1st client attribute</td></tr> + <tr><td>@ref sect_protocol_basic_dt_string_le "string<lenenc>"</td> + <td>value1</td> + <td>Value of the 1st client attribute</td></tr> + <tr><td colspan="3">.. (if more data in length of all key-values, more keys and values parts)</td></tr> + <tr><td colspan="3">}</td></tr> + </table> + + Example + ======== + + On MySQL 5.5.8 with ::CLIENT_PROTOCOL_41 ::CLIENT_PLUGIN_AUTH, CLIENT_SECURE_CONNECTION (removed in 8.0), + and ::CLIENT_CONNECT_WITH_DB set, it may look like: + + ~~~~~~~~~~~~~~~~~~~~~ + 54 00 00 01 8d a6 0f 00 00 00 00 01 08 00 00 00 T............... + 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ + 00 00 00 00 70 61 6d 00 14 ab 09 ee f6 bc b1 32 ....pam........2 + 3e 61 14 38 65 c0 99 1d 95 7d 75 d4 47 74 65 73 >a.8e....}u.Gtes + 74 00 6d 79 73 71 6c 5f 6e 61 74 69 76 65 5f 70 t.mysql_native_p + 61 73 73 77 6f 72 64 00 assword. + ~~~~~~~~~~~~~~~~~~~~~ + + Starting with MySQL 5.6.6 the client may send attributes + if ::CLIENT_CONNECT_ATTRS is set: + + ~~~~~~~~~~~~~~~~~~~~~ + b2 00 00 01 85 a2 1e 00 00 00 00 40 08 00 00 00 ...........@.... + 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ + 00 00 00 00 72 6f 6f 74 00 14 22 50 79 a2 12 d4 ....root.."Py... + e8 82 e5 b3 f4 1a 97 75 6b c8 be db 9f 80 6d 79 .......uk.....my + 73 71 6c 5f 6e 61 74 69 76 65 5f 70 61 73 73 77 sql_native_passw + 6f 72 64 00 61 03 5f 6f 73 09 64 65 62 69 61 6e ord.a._os.debian + 36 2e 30 0c 5f 63 6c 69 65 6e 74 5f 6e 61 6d 65 6.0._client_name + 08 6c 69 62 6d 79 73 71 6c 04 5f 70 69 64 05 32 .libmysql._pid.2 + 32 33 34 34 0f 5f 63 6c 69 65 6e 74 5f 76 65 72 2344._client_ver + 73 69 6f 6e 08 35 2e 36 2e 36 2d 6d 39 09 5f 70 sion.5.6.6-m9._p + 6c 61 74 66 6f 72 6d 06 78 38 36 5f 36 34 03 66 latform.x86_64.f + 6f 6f 03 62 61 72 oo.bar + ~~~~~~~~~~~~~~~~~~~~~ + + @warning Currently, multibyte character sets such as UCS2, UTF16 and + UTF32 are not supported. + + @note If client wants to have a secure SSL connection and sets + CLIENT_SSL flag it should first send the + @ref page_protocol_connection_phase_packets_protocol_ssl_request packet + and only then, after establishing the secure connection, it should send + the @ref page_protocol_connection_phase_packets_protocol_handshake_response + packet. +*/ +/* clang-format on */ + +/** + sends a client authentication packet (second packet in the 3-way handshake) + + @param mpvio The connection to use + @param data The scramble to send + @param data_len Length of data + @param buff_out Buffer holding client handshake packet + @param buff_len Length of buffer holding client handshake packet + @retval 0 ok + @retval 1 error + + @sa mysql_fill_packet_header() + page_protocol_conn_packets_protocol_handshake_response +*/ +static bool prep_client_reply_packet(MCPVIO_EXT *mpvio, const uchar *data, + int data_len, char **buff_out, + int *buff_len) { + DBUG_ENTER(__func__); + MYSQL *mysql = mpvio->mysql; + char *buff, *end; + size_t buff_size; + size_t connect_attrs_len = + (mysql->server_capabilities & CLIENT_CONNECT_ATTRS && + mysql->options.extension) + ? mysql->options.extension->connection_attributes_length + : 0; + + DBUG_ASSERT(connect_attrs_len < MAX_CONNECTION_ATTR_STORAGE_LENGTH); + + *buff_out = nullptr; + *buff_len = 0; + + /* + Fixed size of the packet is 32 bytes. See mysql_fill_packet_header. + +9 because data is a length encoded binary where meta data size is max 9. + */ + buff_size = 33 + USERNAME_LENGTH + data_len + 9 + NAME_LEN + NAME_LEN + + connect_attrs_len + 9; + buff = static_cast<char *>( + my_malloc(PSI_NOT_INSTRUMENTED, buff_size, MYF(MY_WME | MY_ZEROFILL))); + + /* The client_flags is already calculated. Just fill in the packet header */ + end = mysql_fill_packet_header(mysql, buff, buff_size); + + DBUG_PRINT( + "info", + ("Server version = '%s' capabilites: %lu status: %u client_flag: %lu", + mysql->server_version, mysql->server_capabilities, mysql->server_status, + mysql->client_flag)); + + static_assert(MYSQL_USERNAME_LENGTH == USERNAME_LENGTH, ""); + + /* This needs to be changed as it's not useful with big packets */ + if (mysql->user[0]) + strmake(end, mysql->user, USERNAME_LENGTH); + else + read_user_name(end); + + /* We have to handle different version of handshake here */ + DBUG_PRINT("info", ("user: %s", end)); + end = strend(end) + 1; + if (data_len) { + /* + Since the older versions of server do not have + CLIENT_PLUGIN_AUTH_LENENC_CLIENT_DATA capability, + a check is performed on this before sending auth data. + If lenenc support is not available, the data is sent + in the format of first byte representing the length of + the string followed by the actual string. + */ + if (mysql->server_capabilities & CLIENT_PLUGIN_AUTH_LENENC_CLIENT_DATA) + end = write_length_encoded_string4(end, (char *)(buff + buff_size), data, + data + data_len); + else + end = + write_string(end, (char *)(buff + buff_size), data, data + data_len); + if (end == NULL) goto error; + } else + *end++ = 0; + + /* Add database if needed */ + if (mpvio->db && (mysql->server_capabilities & CLIENT_CONNECT_WITH_DB)) { + end = strmake(end, mpvio->db, NAME_LEN) + 1; + mysql->db = my_strdup(key_memory_MYSQL, mpvio->db, MYF(MY_WME)); + } + + if (mysql->server_capabilities & CLIENT_PLUGIN_AUTH) + end = strmake(end, mpvio->plugin->name, NAME_LEN) + 1; + + end = (char *)send_client_connect_attrs(mysql, (uchar *)end); + *buff_out = buff; + *buff_len = end - buff; + + DBUG_RETURN(false); + +error: + my_free(buff); + DBUG_RETURN(true); +} + +static int send_client_reply_packet(MCPVIO_EXT *mpvio, const uchar *data, + int data_len) { + DBUG_ENTER(__func__); + MYSQL *mysql = mpvio->mysql; + NET *net = &mysql->net; + char *buff = nullptr, *end = nullptr; + int buff_len; + int ret = 0; + bool prep_err; + + prep_err = prep_client_reply_packet(mpvio, data, data_len, &buff, &buff_len); + if (prep_err) { + DBUG_RETURN(1); + } + + end = buff + buff_len; + /* Write authentication package */ + MYSQL_TRACE(SEND_AUTH_RESPONSE, mysql, + ((size_t)(end - buff), (const unsigned char *)buff)); + if (my_net_write(net, (uchar *)buff, (size_t)(end - buff)) || + net_flush(net)) { + set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate, + ER_CLIENT(CR_SERVER_LOST_EXTENDED), + "sending authentication information", errno); + ret = 1; + } + MYSQL_TRACE(PACKET_SENT, mysql, ((size_t)(end - buff))); + my_free(buff); + DBUG_RETURN(ret); +} + +static net_async_status send_client_reply_packet_nonblocking(MCPVIO_EXT *mpvio, + const uchar *pkt, + int pkt_len, + bool *result) { + DBUG_ENTER(__func__); + MYSQL *mysql = mpvio->mysql; + mysql_async_auth *ctx = ASYNC_DATA(mysql)->connect_context->auth_context; + net_async_status status; + + bool error = false; + if (!ctx->change_user_buff) { + error = + prep_client_reply_packet(mpvio, pkt, pkt_len, &ctx->change_user_buff, + &ctx->change_user_buff_len); + if (error) { + goto end; + } + } + + status = my_net_write_nonblocking(&mysql->net, (uchar *)ctx->change_user_buff, + ctx->change_user_buff_len, &error); + + if (status == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + +end: + *result = error; + my_free(ctx->change_user_buff); + ctx->change_user_buff = nullptr; + + DBUG_RETURN(NET_ASYNC_COMPLETE); +} + +#ifdef __clang__ +// Clang UBSAN false positive? +// Call to function through pointer to incorrect function type +static int client_mpvio_read_packet(MYSQL_PLUGIN_VIO *mpv, + uchar **buf) SUPPRESS_UBSAN; +#endif // __clang__ + +/** + vio->read_packet() callback method for client authentication plugins + + This function is called by a client authentication plugin, when it wants + to read data from the server. +*/ +static int client_mpvio_read_packet(MYSQL_PLUGIN_VIO *mpv, uchar **buf) { + MCPVIO_EXT *mpvio = (MCPVIO_EXT *)mpv; + MYSQL *mysql = mpvio->mysql; + ulong pkt_len; + + /* there are cached data left, feed it to a plugin */ + if (mpvio->cached_server_reply.pkt) { + *buf = mpvio->cached_server_reply.pkt; + mpvio->cached_server_reply.pkt = 0; + mpvio->packets_read++; + return mpvio->cached_server_reply.pkt_len; + } + + if (mpvio->packets_read == 0) { + /* + the server handshake packet came from the wrong plugin, + or it's mysql_change_user(). Either way, there is no data + for a plugin to read. send a dummy packet to the server + to initiate a dialog. + */ + if (client_mpvio_write_packet(mpv, 0, 0)) return (int)packet_error; + } + + /* otherwise read the data */ + pkt_len = (*mysql->methods->read_change_user_result)(mysql); + + /* error while reading the change user request */ + if (pkt_len == packet_error) return (int)packet_error; + + mpvio->last_read_packet_len = pkt_len; + *buf = mysql->net.read_pos; + + /* was it a request to change plugins ? */ + if (**buf == 254) + return (int)packet_error; /* if yes, this plugin shan't continue */ + + /* + the server sends \1\255 or \1\254 instead of just \255 or \254 - + for us to not confuse it with an error or "change plugin" packets. + We remove this escaping \1 here. + + See also server_mpvio_write_packet() where the escaping is done. + */ + if (pkt_len && **buf == 1) { + (*buf)++; + pkt_len--; + } + mpvio->packets_read++; + return pkt_len; +} + +/** + vio->read_packet() nonblocking callback method for client authentication + plugins +*/ +static net_async_status client_mpvio_read_packet_nonblocking( + struct MYSQL_PLUGIN_VIO *mpv, uchar **buf, int *result) { + DBUG_ENTER(__func__); + MCPVIO_EXT *mpvio = (MCPVIO_EXT *)mpv; + MYSQL *mysql = mpvio->mysql; + ulong pkt_len; + int error; + + /* there are cached data left, feed it to a plugin */ + if (mpvio->cached_server_reply.pkt) { + *buf = mpvio->cached_server_reply.pkt; + mpvio->cached_server_reply.pkt = 0; + mpvio->packets_read++; + *result = mpvio->cached_server_reply.pkt_len; + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + + if (mpvio->packets_read == 0) { + /* + the server handshake packet came from the wrong plugin, + or it's mysql_change_user(). Either way, there is no data + for a plugin to read. send a dummy packet to the server + to initiate a dialog. + */ + net_async_status status = + client_mpvio_write_packet_nonblocking(mpv, 0, 0, &error); + if (status == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + if (error) { + *result = (int)packet_error; + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + } + + /* + packets_read needs to be set here to avoid entering above condition + again. + */ + mpvio->packets_read++; + /* otherwise read the data */ + net_async_status status = + mysql->methods->read_change_user_result_nonblocking(mysql, &pkt_len); + if (status == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + + mpvio->last_read_packet_len = pkt_len; + *buf = mysql->net.read_pos; + + /* was it a request to change plugins ? */ + if (**buf == 254) { + *result = (int)packet_error; + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + + /* + the server sends \1\255 or \1\254 instead of just \255 or \254 - + for us to not confuse it with an error or "change plugin" packets. + We remove this escaping \1 here. + See also server_mpvio_write_packet() where the escaping is + done. + */ + if (pkt_len && **buf == 1) { + (*buf)++; + pkt_len--; + } + *result = pkt_len; + DBUG_RETURN(NET_ASYNC_COMPLETE); +} + +#ifdef __clang__ +// Clang UBSAN false positive? +// Call to function through pointer to incorrect function type +static int client_mpvio_write_packet(MYSQL_PLUGIN_VIO *mpv, const uchar *pkt, + int pkt_len) SUPPRESS_UBSAN; +#endif // __clang__ + +/** + vio->write_packet() callback method for client authentication plugins + + This function is called by a client authentication plugin, when it wants + to send data to the server. + + It transparently wraps the data into a change user or authentication + handshake packet, if neccessary. +*/ +static int client_mpvio_write_packet(MYSQL_PLUGIN_VIO *mpv, const uchar *pkt, + int pkt_len) { + int res; + MCPVIO_EXT *mpvio = (MCPVIO_EXT *)mpv; + + if (mpvio->packets_written == 0) { + if (mpvio->mysql_change_user) + res = send_change_user_packet(mpvio, pkt, pkt_len); + else + res = send_client_reply_packet(mpvio, pkt, pkt_len); + } else { + NET *net = &mpvio->mysql->net; + + MYSQL_TRACE(SEND_AUTH_DATA, mpvio->mysql, ((size_t)pkt_len, pkt)); + + if (mpvio->mysql->thd) + res = 1; /* no chit-chat in embedded */ + else + res = my_net_write(net, pkt, pkt_len) || net_flush(net); + + if (!res) { + MYSQL_TRACE(PACKET_SENT, mpvio->mysql, ((size_t)pkt_len)); + } else + set_mysql_extended_error(mpvio->mysql, CR_SERVER_LOST, unknown_sqlstate, + ER_CLIENT(CR_SERVER_LOST_EXTENDED), + "sending authentication information", errno); + } + mpvio->packets_written++; + return res; +} + +/** + vio->write_packet() nonblocking callback method for client authentication + plugins +*/ +static net_async_status client_mpvio_write_packet_nonblocking( + struct MYSQL_PLUGIN_VIO *mpv, const uchar *pkt, int pkt_len, int *result) { + DBUG_ENTER(__func__); + MCPVIO_EXT *mpvio = (MCPVIO_EXT *)mpv; + bool error = false; + + if (mpvio->packets_written == 0) { + /* mysql_change_user_nonblocking not implemented yet. */ + DBUG_ASSERT(!mpvio->mysql_change_user); + net_async_status status = + send_client_reply_packet_nonblocking(mpvio, pkt, pkt_len, &error); + if (status == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + } else { + NET *net = &mpvio->mysql->net; + + MYSQL_TRACE(SEND_AUTH_DATA, mpvio->mysql, ((size_t)pkt_len, pkt)); + + if (mpvio->mysql->thd) + *result = 1; /* no chit-chat in embedded */ + else { + net_async_status status = + my_net_write_nonblocking(net, pkt, pkt_len, &error); + if (status == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + *result = error; + + if (error) { + set_mysql_extended_error(mpvio->mysql, CR_SERVER_LOST, unknown_sqlstate, + ER_CLIENT(CR_SERVER_LOST_EXTENDED), + "sending authentication information", errno); + } else { + MYSQL_TRACE(PACKET_SENT, mpvio->mysql, ((size_t)pkt_len)); + } + } + } + mpvio->packets_written++; + *result = error ? -1 : 0; + DBUG_RETURN(NET_ASYNC_COMPLETE); +} + +/** + fills MYSQL_PLUGIN_VIO_INFO structure with the information about the + connection +*/ +void mpvio_info(Vio *vio, MYSQL_PLUGIN_VIO_INFO *info) { + memset(info, 0, sizeof(*info)); + switch (vio->type) { + case VIO_TYPE_TCPIP: + info->protocol = MYSQL_PLUGIN_VIO_INFO::MYSQL_VIO_TCP; + info->socket = (int)vio_fd(vio); + return; + case VIO_TYPE_SOCKET: + info->protocol = MYSQL_PLUGIN_VIO_INFO::MYSQL_VIO_SOCKET; + info->socket = (int)vio_fd(vio); + return; + case VIO_TYPE_SSL: { + struct sockaddr addr; + socklen_t addrlen = sizeof(addr); + if (getsockname(vio_fd(vio), &addr, &addrlen)) return; + info->protocol = addr.sa_family == AF_UNIX + ? MYSQL_PLUGIN_VIO_INFO::MYSQL_VIO_SOCKET + : MYSQL_PLUGIN_VIO_INFO::MYSQL_VIO_TCP; + info->socket = (int)vio_fd(vio); + return; + } +#ifdef _WIN32 + case VIO_TYPE_NAMEDPIPE: + info->protocol = MYSQL_PLUGIN_VIO_INFO::MYSQL_VIO_PIPE; + info->handle = vio->hPipe; + return; +#if defined(_WIN32) + case VIO_TYPE_SHARED_MEMORY: + info->protocol = MYSQL_PLUGIN_VIO_INFO::MYSQL_VIO_MEMORY; + info->handle = vio->handle_file_map; /* or what ? */ + return; +#endif +#endif + default: + DBUG_ASSERT(0); + } +} + +static void client_mpvio_info(MYSQL_PLUGIN_VIO *vio, + MYSQL_PLUGIN_VIO_INFO *info) { + MCPVIO_EXT *mpvio = (MCPVIO_EXT *)vio; + mpvio_info(mpvio->mysql->net.vio, info); +} + +bool libmysql_cleartext_plugin_enabled = 0; + +static bool check_plugin_enabled(MYSQL *mysql, mysql_async_auth *ctx) { + if (ctx->auth_plugin == &clear_password_client_plugin && + (!libmysql_cleartext_plugin_enabled && + (!mysql->options.extension || + !mysql->options.extension->enable_cleartext_plugin))) { + set_mysql_extended_error( + mysql, CR_AUTH_PLUGIN_CANNOT_LOAD, unknown_sqlstate, + ER_CLIENT(CR_AUTH_PLUGIN_CANNOT_LOAD), + clear_password_client_plugin.name, "plugin not enabled"); + return true; + } + if (ctx->non_blocking && !ctx->auth_plugin->authenticate_user_nonblocking) { + set_mysql_extended_error( + mysql, CR_AUTH_PLUGIN_CANNOT_LOAD, unknown_sqlstate, + ER_CLIENT(CR_AUTH_PLUGIN_CANNOT_LOAD), ctx->auth_plugin->name, + "plugin does not support nonblocking connect"); + } + return false; +} + +/** + Client side of the plugin driver authentication. + + @note this is used by both the mysql_real_connect and mysql_change_user + + @param mysql mysql + @param data pointer to the plugin auth data (scramble) in the + handshake packet + @param data_len the length of the data + @param data_plugin a plugin that data were prepared for + or 0 if it's mysql_change_user() + @param db initial db to use, can be 0 + + @retval 0 ok + @retval 1 error +*/ +int run_plugin_auth(MYSQL *mysql, char *data, uint data_len, + const char *data_plugin, const char *db) { + DBUG_ENTER("run_plugin_auth"); + mysql_state_machine_status status; + mysql_async_auth ctx; + memset(&ctx, 0, sizeof(ctx)); + + ctx.mysql = mysql; + ctx.data = data; + ctx.data_len = data_len; + ctx.data_plugin = data_plugin; + ctx.db = db; + ctx.non_blocking = false; + ctx.state_function = authsm_begin_plugin_auth; + + do { + status = ctx.state_function(&ctx); + } while (status != STATE_MACHINE_FAILED && status != STATE_MACHINE_DONE); + + DBUG_RETURN(status == STATE_MACHINE_FAILED); +} + +/** + This functions drives the authentication on client side in a nonblocking + way. This function will call differnt modules in a sequence where each + module is responsible to acheive a particular part in entire authentication + phase. + + @note this is used by both the mysql_real_connect_nonblocking + + @param mysql mysql + @param data pointer to the plugin auth data (scramble) in the + handshake packet + @param data_len the length of the data + @param data_plugin a plugin that data were prepared for + or 0 if it's mysql_change_user() + @param db initial db to use, can be 0 + + @retval NET_ASYNC_NOT_READY authentication not yet complete + @retval NET_ASYNC_COMPLETE authentication done +*/ +mysql_state_machine_status run_plugin_auth_nonblocking(MYSQL *mysql, char *data, + uint data_len, + const char *data_plugin, + const char *db) { + DBUG_ENTER(__func__); + mysql_async_auth *ctx = ASYNC_DATA(mysql)->connect_context->auth_context; + if (!ctx) { + ctx = static_cast<mysql_async_auth *>( + my_malloc(key_memory_MYSQL, sizeof(*ctx), MYF(MY_WME | MY_ZEROFILL))); + + ctx->mysql = mysql; + ctx->data = data; + ctx->data_len = data_len; + ctx->data_plugin = data_plugin; + ctx->db = db; + ctx->non_blocking = true; + ctx->state_function = authsm_begin_plugin_auth; + ASYNC_DATA(mysql)->connect_context->auth_context = ctx; + } + + mysql_state_machine_status ret = ctx->state_function(ctx); + if (ret == STATE_MACHINE_FAILED || ret == STATE_MACHINE_DONE) { + my_free(ctx); + ASYNC_DATA(mysql)->connect_context->auth_context = nullptr; + } + + DBUG_RETURN(ret); +} + +/** + Determine the default/initial plugin to use +*/ +static mysql_state_machine_status authsm_begin_plugin_auth( + mysql_async_auth *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + /* determine the default/initial plugin to use */ + if (mysql->options.extension && mysql->options.extension->default_auth && + mysql->server_capabilities & CLIENT_PLUGIN_AUTH) { + ctx->auth_plugin_name = mysql->options.extension->default_auth; + if (!(ctx->auth_plugin = (auth_plugin_t *)mysql_client_find_plugin( + mysql, ctx->auth_plugin_name, + MYSQL_CLIENT_AUTHENTICATION_PLUGIN))) + DBUG_RETURN(STATE_MACHINE_FAILED); /* oops, not found */ + } else { + ctx->auth_plugin = &caching_sha2_password_client_plugin; + ctx->auth_plugin_name = ctx->auth_plugin->name; + } + + if (check_plugin_enabled(mysql, ctx)) DBUG_RETURN(STATE_MACHINE_FAILED); + + DBUG_PRINT("info", ("using plugin %s", ctx->auth_plugin_name)); + + mysql->net.last_errno = 0; /* just in case */ + + if (ctx->data_plugin && strcmp(ctx->data_plugin, ctx->auth_plugin_name)) { + /* data was prepared for a different plugin, don't show it to this one */ + ctx->data = 0; + ctx->data_len = 0; + } + + ctx->mpvio.mysql_change_user = ctx->data_plugin == 0; + ctx->mpvio.cached_server_reply.pkt = (uchar *)ctx->data; + ctx->mpvio.cached_server_reply.pkt_len = ctx->data_len; + ctx->mpvio.read_packet = client_mpvio_read_packet; + ctx->mpvio.write_packet = client_mpvio_write_packet; + ctx->mpvio.read_packet_nonblocking = client_mpvio_read_packet_nonblocking; + ctx->mpvio.write_packet_nonblocking = client_mpvio_write_packet_nonblocking; + ctx->mpvio.info = client_mpvio_info; + ctx->mpvio.mysql = mysql; + ctx->mpvio.packets_read = ctx->mpvio.packets_written = 0; + ctx->mpvio.db = ctx->db; + ctx->mpvio.plugin = ctx->auth_plugin; + ctx->client_auth_plugin_state = + (int)(client_auth_caching_sha2_password_plugin_status:: + CACHING_SHA2_READING_PASSWORD); + + ctx->state_function = authsm_run_first_authenticate_user; + DBUG_RETURN(STATE_MACHINE_CONTINUE); +} + +/** + Authentication can have two authenticate_user calls, depending on + what the server responds with; this handles the first. +*/ +static mysql_state_machine_status authsm_run_first_authenticate_user( + mysql_async_auth *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + MYSQL_TRACE(AUTH_PLUGIN, mysql, (ctx->auth_plugin->name)); + + if (ctx->non_blocking && ctx->auth_plugin->authenticate_user_nonblocking) { + net_async_status status = ctx->auth_plugin->authenticate_user_nonblocking( + (struct MYSQL_PLUGIN_VIO *)&ctx->mpvio, mysql, &ctx->res); + if (status == NET_ASYNC_NOT_READY) { + DBUG_RETURN(STATE_MACHINE_WOULD_BLOCK); + } + } else { + ctx->res = ctx->auth_plugin->authenticate_user( + (struct MYSQL_PLUGIN_VIO *)&ctx->mpvio, mysql); + } + + ctx->state_function = authsm_handle_first_authenticate_user; + DBUG_RETURN(STATE_MACHINE_CONTINUE); +} + +/** + Handle the result of the first authenticate_user. +*/ +static mysql_state_machine_status authsm_handle_first_authenticate_user( + mysql_async_auth *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + DBUG_PRINT("info", + ("authenticate_user returned %s", + ctx->res == CR_OK + ? "CR_OK" + : ctx->res == CR_ERROR ? "CR_ERROR" + : ctx->res == CR_OK_HANDSHAKE_COMPLETE + ? "CR_OK_HANDSHAKE_COMPLETE" + : "error")); + + static_assert(CR_OK == -1, ""); + static_assert(CR_ERROR == 0, ""); + + /* + The connection may be closed. If so: do not try to read from the buffer. + If server sends OK packet without sending auth-switch first, client side + auth plugin may not be able to process it correctly. + However, if server sends OK, it means server side authentication plugin + already performed required checks. Further, server side plugin did not + really care about plugin used by client in this case. + */ + if (ctx->res > CR_OK && + (!my_net_is_inited(&mysql->net) || + (mysql->net.read_pos[0] != 0 && mysql->net.read_pos[0] != 254))) { + /* + the plugin returned an error. write it down in mysql, + unless the error code is CR_ERROR and mysql->net.last_errno + is already set (the plugin has done it) + */ + DBUG_PRINT("info", ("res=%d", ctx->res)); + if (ctx->res > CR_ERROR) + set_mysql_error(mysql, ctx->res, unknown_sqlstate); + else if (!mysql->net.last_errno) + set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + ctx->state_function = authsm_read_change_user_result; + DBUG_RETURN(STATE_MACHINE_CONTINUE); +} + +/** + After the first authenticate_user comes a call to read the result of the + implied change_user. +*/ +static mysql_state_machine_status authsm_read_change_user_result( + mysql_async_auth *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + /* read the OK packet (or use the cached value in mysql->net.read_pos */ + if (ctx->res == CR_OK) { + if (ctx->non_blocking) { + net_async_status status = + (*mysql->methods->read_change_user_result_nonblocking)( + mysql, &ctx->pkt_length); + if (status == NET_ASYNC_NOT_READY) { + DBUG_RETURN(STATE_MACHINE_WOULD_BLOCK); + } + } else { + ctx->pkt_length = (*mysql->methods->read_change_user_result)(mysql); + } + } else /* res == CR_OK_HANDSHAKE_COMPLETE */ + ctx->pkt_length = ctx->mpvio.last_read_packet_len; + + ctx->state_function = authsm_handle_change_user_result; + DBUG_RETURN(STATE_MACHINE_CONTINUE); +} + +/** + Check if server asked to use a different authentication plugin +*/ +static mysql_state_machine_status authsm_handle_change_user_result( + mysql_async_auth *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + DBUG_PRINT("info", ("OK packet length=%lu", ctx->pkt_length)); + if (ctx->pkt_length == packet_error) { + if (mysql->net.last_errno == CR_SERVER_LOST) + set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate, + ER_CLIENT(CR_SERVER_LOST_EXTENDED), + "reading authorization packet", errno); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + + if (mysql->net.read_pos[0] == 254) { + ctx->state_function = authsm_run_second_authenticate_user; + } else + ctx->state_function = authsm_finish_auth; + + DBUG_RETURN(STATE_MACHINE_CONTINUE); +} + +/** + Start the authentication process again with the plugin which + server asked for. +*/ +static mysql_state_machine_status authsm_run_second_authenticate_user( + mysql_async_auth *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + /* The server asked to use a different authentication plugin */ + if (ctx->pkt_length < 2) { + set_mysql_error(mysql, CR_MALFORMED_PACKET, + unknown_sqlstate); /* purecov: inspected */ + DBUG_RETURN(STATE_MACHINE_FAILED); + } else { + /* "use different plugin" packet */ + uint len; + ctx->auth_plugin_name = (char *)mysql->net.read_pos + 1; + len = (uint)strlen( + ctx->auth_plugin_name); /* safe as my_net_read always appends \0 */ + ctx->mpvio.cached_server_reply.pkt_len = ctx->pkt_length - len - 2; + ctx->mpvio.cached_server_reply.pkt = mysql->net.read_pos + len + 2; + DBUG_PRINT("info", ("change plugin packet from server for plugin %s", + ctx->auth_plugin_name)); + } + if (!(ctx->auth_plugin = (auth_plugin_t *)mysql_client_find_plugin( + mysql, ctx->auth_plugin_name, MYSQL_CLIENT_AUTHENTICATION_PLUGIN))) + DBUG_RETURN(STATE_MACHINE_FAILED); + + if (check_plugin_enabled(mysql, ctx)) DBUG_RETURN(STATE_MACHINE_FAILED); + + MYSQL_TRACE(AUTH_PLUGIN, mysql, (ctx->auth_plugin->name)); + + ctx->mpvio.plugin = ctx->auth_plugin; + ctx->res = ctx->auth_plugin->authenticate_user( + (struct MYSQL_PLUGIN_VIO *)&ctx->mpvio, mysql); + + ctx->state_function = authsm_handle_second_authenticate_user; + DBUG_RETURN(STATE_MACHINE_CONTINUE); +} + +/* Now read the results. */ +static mysql_state_machine_status authsm_handle_second_authenticate_user( + mysql_async_auth *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + DBUG_PRINT("info", + ("second authenticate_user returned %s", + ctx->res == CR_OK + ? "CR_OK" + : ctx->res == CR_ERROR ? "CR_ERROR" + : ctx->res == CR_OK_HANDSHAKE_COMPLETE + ? "CR_OK_HANDSHAKE_COMPLETE" + : "error")); + if (ctx->res > CR_OK) { + if (ctx->res > CR_ERROR) + set_mysql_error(mysql, ctx->res, unknown_sqlstate); + else if (!mysql->net.last_errno) + set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + + if (ctx->res != CR_OK_HANDSHAKE_COMPLETE) { + /* Read what server thinks about out new auth message report */ + if (cli_safe_read(mysql, NULL) == packet_error) { + if (mysql->net.last_errno == CR_SERVER_LOST) + set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate, + ER_CLIENT(CR_SERVER_LOST_EXTENDED), + "reading final connect information", errno); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + } + + ctx->state_function = authsm_finish_auth; + DBUG_RETURN(STATE_MACHINE_CONTINUE); +} + +/* Final cleanup */ +static mysql_state_machine_status authsm_finish_auth(mysql_async_auth *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + /* + net->read_pos[0] should always be 0 here if the server implements + the protocol correctly + */ + ctx->res = (mysql->net.read_pos[0] != 0); + + MYSQL_TRACE(AUTHENTICATED, mysql, ()); + DBUG_RETURN(ctx->res ? STATE_MACHINE_FAILED : STATE_MACHINE_DONE); +} + +/** set some default attributes */ +static int set_connect_attributes(MYSQL *mysql, char *buff, size_t buf_len) { + int rc = 0; + + /* + Clean up any values set by the client code. We want these options as + consistent as possible + */ + rc += mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_client_name"); + rc += mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_os"); + rc += mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_platform"); + rc += mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_pid"); + rc += mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_thread"); + rc += mysql_options(mysql, MYSQL_OPT_CONNECT_ATTR_DELETE, "_client_version"); + + /* + Now let's set up some values + */ + rc += mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD, "_client_name", + "libmysql"); + rc += mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD, "_client_version", + PACKAGE_VERSION); + rc += mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD, "_os", SYSTEM_TYPE); + rc += mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD, "_platform", + MACHINE_TYPE); +#ifdef _WIN32 + snprintf(buff, buf_len, "%lu", (ulong)GetCurrentProcessId()); +#else + snprintf(buff, buf_len, "%lu", (ulong)getpid()); +#endif + rc += mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD, "_pid", buff); + +#ifdef _WIN32 + snprintf(buff, buf_len, "%lu", (ulong)GetCurrentThreadId()); + rc += mysql_options4(mysql, MYSQL_OPT_CONNECT_ATTR_ADD, "_thread", buff); +#endif + + return rc > 0 ? 1 : 0; +} + +MYSQL *STDCALL mysql_real_connect(MYSQL *mysql, const char *host, + const char *user, const char *passwd, + const char *db, uint port, + const char *unix_socket, ulong client_flag) { + DBUG_ENTER("mysql_real_connect"); + mysql_state_machine_status status; + mysql_async_connect ctx; + memset(&ctx, 0, sizeof(ctx)); + + ctx.mysql = mysql; + ctx.host = host; + ctx.port = port; + ctx.db = db; + ctx.user = user; + ctx.passwd = passwd; + ctx.unix_socket = unix_socket; + ctx.client_flag = client_flag; + ctx.state_function = csm_begin_connect; + ctx.ssl_state = SSL_NONE; + + do { + status = ctx.state_function(&ctx); + } while (status != STATE_MACHINE_FAILED && status != STATE_MACHINE_DONE); + + if (status == STATE_MACHINE_DONE) { + DBUG_PRINT("exit", ("Mysql handler: %p", mysql)); + DBUG_RETURN(mysql); + } + + DBUG_PRINT("error", ("message: %u/%s (%s)", mysql->net.last_errno, + mysql->net.sqlstate, mysql->net.last_error)); + { + /* Free alloced memory */ + end_server(mysql); + mysql_close_free(mysql); + if (!(client_flag & CLIENT_REMEMBER_OPTIONS)) + mysql_close_free_options(mysql); + if (ctx.scramble_buffer_allocated) my_free(ctx.scramble_buffer); + } + DBUG_RETURN(0); +} + +/** + This API attempts to initialize all the context needed to make an asynchronous + connection followed by establishing a connection to MySQL database. If this + API returns NET_ASYNC_COMPLETE then connection is established else call this + API from the client application until the status returned is + NET_ASYNC_COMPLETE. + + @param[in] mysql connection handle + @param[in] host host name or IP address + @param[in] user login ID used to connect to host + @param[in] passwd password for this login ID + @param[in] db default database to be set after connection + @param[in] port port number to use for connection + @param[in] unix_socket socket file to use for connection + @param[in] client_flag flag to indidcate what client can handle + + @retval NET_ASYNC_COMPLETE Success. + @retval NET_ASYNC_ERROR Error. +*/ +net_async_status STDCALL mysql_real_connect_nonblocking( + MYSQL *mysql, const char *host, const char *user, const char *passwd, + const char *db, uint port, const char *unix_socket, ulong client_flag) { + DBUG_ENTER(__func__); + + mysql_state_machine_status status; + mysql_async_connect *ctx = ASYNC_DATA(mysql)->connect_context; + + if (client_flag & MYSQL_OPT_COMPRESS) { + set_mysql_error(mysql, CR_COMPRESSION_NOT_SUPPORTED, unknown_sqlstate); + DBUG_RETURN(NET_ASYNC_ERROR); + } + if (!ctx) { + ctx = static_cast<mysql_async_connect *>( + my_malloc(key_memory_MYSQL, sizeof(*ctx), MYF(MY_WME | MY_ZEROFILL))); + if (!ctx) DBUG_RETURN(NET_ASYNC_ERROR); + + ctx->mysql = mysql; + ctx->host = host; + ctx->port = port; + ctx->db = db; + ctx->user = user; + ctx->passwd = passwd; + ctx->unix_socket = unix_socket; + ctx->client_flag = client_flag; + ctx->non_blocking = true; + ctx->state_function = csm_begin_connect; + ctx->ssl_state = SSL_NONE; + ASYNC_DATA(mysql)->connect_context = ctx; + ASYNC_DATA(mysql)->async_op_status = ASYNC_OP_CONNECT; + } + + do { + status = ctx->state_function(ctx); + } while (status != STATE_MACHINE_FAILED && status != STATE_MACHINE_DONE); + + if (status == STATE_MACHINE_DONE) { + my_free(ASYNC_DATA(mysql)->connect_context); + ASYNC_DATA(mysql)->connect_context = NULL; + ASYNC_DATA(mysql)->async_op_status = ASYNC_OP_UNSET; + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + { + DBUG_PRINT("error", ("message: %u/%s (%s)", mysql->net.last_errno, + mysql->net.sqlstate, mysql->net.last_error)); + /* Free alloced memory */ + end_server(mysql); + mysql_close_free(mysql); + if (!(ctx->client_flag & CLIENT_REMEMBER_OPTIONS)) + mysql_close_free_options(mysql); + if (ctx->scramble_buffer_allocated) { + my_free(ctx->scramble_buffer); + ctx->scramble_buffer = nullptr; + } + my_free(ctx); + DBUG_RETURN(NET_ASYNC_ERROR); + } +} +/** + Begin the connection to the server, including any DNS resolution + necessary, socket configuration, etc. +*/ +static mysql_state_machine_status csm_begin_connect(mysql_async_connect *ctx) { + MYSQL *mysql = ctx->mysql; + const char *host = ctx->host; + const char *user = ctx->user; + const char *passwd = ctx->passwd; + const char *db = ctx->db; + uint port = ctx->port; + const char *unix_socket = ctx->unix_socket; + ulong client_flag = ctx->client_flag; + + DBUG_ENTER(__func__); + + DBUG_PRINT("enter", + ("host: %s db: %s user: %s (client)", host ? host : "(Null)", + db ? db : "(Null)", user ? user : "(Null)")); + + NET *net = &mysql->net; +#ifdef _WIN32 + HANDLE hPipe = INVALID_HANDLE_VALUE; +#endif +#ifdef HAVE_SYS_UN_H + struct sockaddr_un UNIXaddr; +#endif + /* Test whether we're already connected */ + if (net->vio) { + set_mysql_error(mysql, CR_ALREADY_CONNECTED, unknown_sqlstate); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + + if (set_connect_attributes(mysql, ctx->buff, sizeof(ctx->buff))) + DBUG_RETURN(STATE_MACHINE_FAILED); + + mysql->methods = &client_methods; + net->vio = 0; /* If something goes wrong */ + mysql->client_flag = 0; /* For handshake */ + + /* use default options */ + if (mysql->options.my_cnf_file || mysql->options.my_cnf_group) { + mysql_read_default_options( + &mysql->options, + (mysql->options.my_cnf_file ? mysql->options.my_cnf_file : "my"), + mysql->options.my_cnf_group); + my_free(mysql->options.my_cnf_file); + my_free(mysql->options.my_cnf_group); + mysql->options.my_cnf_file = mysql->options.my_cnf_group = 0; + } + + /* Some empty-string-tests are done because of ODBC */ + if (!host || !host[0]) host = mysql->options.host; + if (!user || !user[0]) { + user = mysql->options.user; + if (!user) user = ""; + } + if (!passwd) { + passwd = mysql->options.password; +#if !defined(MYSQL_SERVER) + if (!passwd) passwd = getenv("MYSQL_PWD"); /* get it from environment */ +#endif + if (!passwd) passwd = ""; + } + if (!db || !db[0]) db = mysql->options.db; + if (!port) port = mysql->options.port; + if (!unix_socket) unix_socket = mysql->options.unix_socket; + + mysql->server_status = SERVER_STATUS_AUTOCOMMIT; + DBUG_PRINT("info", ("Connecting")); + + MYSQL_TRACE_STAGE(mysql, CONNECTING); + MYSQL_TRACE(CONNECTING, mysql, ()); + +#if defined(_WIN32) + if ((!mysql->options.protocol || + mysql->options.protocol == MYSQL_PROTOCOL_MEMORY) && + (!host || !strcmp(host, LOCAL_HOST))) { + HANDLE handle_map; + DBUG_PRINT("info", ("Using shared memory")); + + handle_map = + create_shared_memory(mysql, net, get_win32_connect_timeout(mysql)); + + if (handle_map == INVALID_HANDLE_VALUE) { + DBUG_PRINT("error", + ("host: '%s' socket: '%s' shared memory: %s have_tcpip: %d", + host ? host : "<null>", unix_socket ? unix_socket : "<null>", + mysql->options.shared_memory_base_name, (int)have_tcpip)); + if (mysql->options.protocol == MYSQL_PROTOCOL_MEMORY) + DBUG_RETURN(STATE_MACHINE_FAILED); + /* + Try also with PIPE or TCP/IP. Clear the error from + create_shared_memory(). + */ + + net_clear_error(net); + } else { + mysql->options.protocol = MYSQL_PROTOCOL_MEMORY; + unix_socket = 0; + host = mysql->options.shared_memory_base_name; + snprintf(ctx->host_info = ctx->buff, sizeof(ctx->buff) - 1, + ER_CLIENT(CR_SHARED_MEMORY_CONNECTION), host); + } + } +#endif /* _WIN32 */ +#if defined(HAVE_SYS_UN_H) + if (!net->vio && + (!mysql->options.protocol || + mysql->options.protocol == MYSQL_PROTOCOL_SOCKET) && + (unix_socket || mysql_unix_port) && + (!host || !strcmp(host, LOCAL_HOST))) { + my_socket sock = socket(AF_UNIX, SOCK_STREAM, 0); + DBUG_PRINT("info", ("Using socket")); + if (sock == SOCKET_ERROR) { + set_mysql_extended_error(mysql, CR_SOCKET_CREATE_ERROR, unknown_sqlstate, + ER_CLIENT(CR_SOCKET_CREATE_ERROR), socket_errno); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + + net->vio = + vio_new(sock, VIO_TYPE_SOCKET, VIO_LOCALHOST | VIO_BUFFERED_READ); + if (!net->vio) { + DBUG_PRINT("error", ("Unknow protocol %d ", mysql->options.protocol)); + set_mysql_error(mysql, CR_CONN_UNKNOW_PROTOCOL, unknown_sqlstate); + closesocket(sock); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + + if (ctx->non_blocking) vio_set_blocking_flag(net->vio, !ctx->non_blocking); + + host = LOCAL_HOST; + if (!unix_socket) unix_socket = mysql_unix_port; + ctx->host_info = const_cast<char *>(ER_CLIENT(CR_LOCALHOST_CONNECTION)); + DBUG_PRINT("info", ("Using UNIX sock '%s'", unix_socket)); + + memset(&UNIXaddr, 0, sizeof(UNIXaddr)); + UNIXaddr.sun_family = AF_UNIX; + strmake(UNIXaddr.sun_path, unix_socket, sizeof(UNIXaddr.sun_path) - 1); + + if (mysql->options.extension && mysql->options.extension->retry_count) + my_net_set_retry_count(net, mysql->options.extension->retry_count); + + if (vio_socket_connect(net->vio, (struct sockaddr *)&UNIXaddr, + sizeof(UNIXaddr), ctx->non_blocking, + get_vio_connect_timeout(mysql))) { + DBUG_PRINT("error", + ("Got error %d on connect to local server", socket_errno)); + set_mysql_extended_error(mysql, CR_CONNECTION_ERROR, unknown_sqlstate, + ER_CLIENT(CR_CONNECTION_ERROR), unix_socket, + socket_errno); + vio_delete(net->vio); + net->vio = 0; + DBUG_RETURN(STATE_MACHINE_FAILED); + } + mysql->options.protocol = MYSQL_PROTOCOL_SOCKET; + } +#elif defined(_WIN32) + if (!net->vio && (mysql->options.protocol == MYSQL_PROTOCOL_PIPE || + (host && !strcmp(host, LOCAL_HOST_NAMEDPIPE)) || + (!have_tcpip && (unix_socket || !host && is_NT())))) { + hPipe = create_named_pipe(mysql, get_win32_connect_timeout(mysql), &host, + &unix_socket); + + if (hPipe == INVALID_HANDLE_VALUE) { + DBUG_PRINT( + "error", + ("host: '%s' socket: '%s' have_tcpip: %d", host ? host : "<null>", + unix_socket ? unix_socket : "<null>", (int)have_tcpip)); + if (mysql->options.protocol == MYSQL_PROTOCOL_PIPE || + (host && !strcmp(host, LOCAL_HOST_NAMEDPIPE)) || + (unix_socket && !strcmp(unix_socket, MYSQL_NAMEDPIPE))) + DBUG_RETURN(STATE_MACHINE_FAILED); + /* Try also with TCP/IP */ + } else { + net->vio = vio_new_win32pipe(hPipe); + snprintf(ctx->host_info = ctx->buff, sizeof(ctx->buff) - 1, + ER_CLIENT(CR_NAMEDPIPE_CONNECTION), unix_socket); + } + } +#endif + DBUG_PRINT("info", + ("net->vio: %p protocol: %d", net->vio, mysql->options.protocol)); + if (!net->vio && (!mysql->options.protocol || + mysql->options.protocol == MYSQL_PROTOCOL_TCP)) { + struct addrinfo *res_lst, *client_bind_ai_lst = NULL, hints, *t_res; + char port_buf[NI_MAXSERV]; + my_socket sock = SOCKET_ERROR; + int gai_errno, saved_error = 0, status = -1, bind_result = 0; + uint flags = VIO_BUFFERED_READ; + + unix_socket = 0; /* This is not used */ + + if (!port) port = mysql_port; + + if (!host) host = LOCAL_HOST; + + snprintf(ctx->host_info = ctx->buff, sizeof(ctx->buff) - 1, + ER_CLIENT(CR_TCP_CONNECTION), host); + DBUG_PRINT("info", ("Server name: '%s'. TCP sock: %d", host, port)); + + memset(&hints, 0, sizeof(hints)); + hints.ai_socktype = SOCK_STREAM; + hints.ai_protocol = IPPROTO_TCP; + hints.ai_family = AF_UNSPEC; + + DBUG_PRINT("info", ("IPV6 getaddrinfo %s", host)); + snprintf(port_buf, NI_MAXSERV, "%d", port); + gai_errno = getaddrinfo(host, port_buf, &hints, &res_lst); + + DBUG_EXECUTE_IF("vio_client_use_localhost", { + DBUG_ASSERT(strlen(host) == 255); + gai_errno = getaddrinfo(LOCAL_HOST, port_buf, &hints, &res_lst); + }); + + if (gai_errno != 0) { + /* + For DBUG we are keeping the right message but for client we default to + historical error message. + */ + DBUG_PRINT("info", ("IPV6 getaddrinfo error %d", gai_errno)); + set_mysql_extended_error(mysql, CR_UNKNOWN_HOST, unknown_sqlstate, + ER_CLIENT(CR_UNKNOWN_HOST), host, errno); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + + /* Get address info for client bind name if it is provided */ + if (mysql->options.bind_address) { + int bind_gai_errno = 0; + + DBUG_PRINT("info", ("Resolving addresses for client bind: '%s'", + mysql->options.bind_address)); + /* Lookup address info for name */ + bind_gai_errno = getaddrinfo(mysql->options.bind_address, 0, &hints, + &client_bind_ai_lst); + if (bind_gai_errno) { + DBUG_PRINT("info", + ("client bind getaddrinfo error %d", bind_gai_errno)); + set_mysql_extended_error(mysql, CR_UNKNOWN_HOST, unknown_sqlstate, + ER_CLIENT(CR_UNKNOWN_HOST), + mysql->options.bind_address, bind_gai_errno); + + freeaddrinfo(res_lst); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + DBUG_PRINT("info", (" got address info for client bind name")); + } + + /* + A hostname might map to multiple IP addresses (IPv4/IPv6). Go over the + list of IP addresses until a successful connection can be established. + For each IP address, attempt to bind the socket to each client address + for the client-side bind hostname until the bind is successful. + */ + DBUG_PRINT("info", ("Try connect on all addresses for host.")); + for (t_res = res_lst; t_res; t_res = t_res->ai_next) { + DBUG_PRINT("info", + ("Create socket, family: %d type: %d proto: %d", + t_res->ai_family, t_res->ai_socktype, t_res->ai_protocol)); + + sock = socket(t_res->ai_family, t_res->ai_socktype, t_res->ai_protocol); + if (sock == SOCKET_ERROR) { + DBUG_PRINT("info", ("Socket created was invalid")); + /* Try next address if there is one */ + saved_error = socket_errno; + continue; + } + + if (client_bind_ai_lst) { + struct addrinfo *curr_bind_ai = NULL; + DBUG_PRINT("info", ("Attempting to bind socket to bind address(es)")); + + /* + We'll attempt to bind to each of the addresses returned, until + we find one that works. + If none works, we'll try the next destination host address + (if any) + */ + curr_bind_ai = client_bind_ai_lst; + + while (curr_bind_ai != NULL) { + /* Attempt to bind the socket to the given address */ + bind_result = bind(sock, curr_bind_ai->ai_addr, + static_cast<int>(curr_bind_ai->ai_addrlen)); + if (!bind_result) break; /* Success */ + + DBUG_PRINT("info", ("bind failed, attempting another bind address")); + /* Problem with the bind, move to next address if present */ + curr_bind_ai = curr_bind_ai->ai_next; + } + + if (bind_result) { + /* + Could not bind to any client-side address with this destination + Try the next destination address (if any) + */ + DBUG_PRINT("info", ("All bind attempts with this address failed")); + saved_error = socket_errno; + closesocket(sock); + continue; + } + DBUG_PRINT("info", ("Successfully bound client side of socket")); + } + + /* Create a new Vio object to abstract the socket. */ + if (!net->vio) { + if (!(net->vio = vio_new(sock, VIO_TYPE_TCPIP, flags))) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + closesocket(sock); + freeaddrinfo(res_lst); + if (client_bind_ai_lst) freeaddrinfo(client_bind_ai_lst); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + } + /* Just reinitialize if one is already allocated. */ + else if (vio_reset(net->vio, VIO_TYPE_TCPIP, sock, NULL, flags)) { + set_mysql_error(mysql, CR_UNKNOWN_ERROR, unknown_sqlstate); + closesocket(sock); + freeaddrinfo(res_lst); + if (client_bind_ai_lst) freeaddrinfo(client_bind_ai_lst); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + + if (ctx->non_blocking) + vio_set_blocking_flag(net->vio, !ctx->non_blocking); + + DBUG_PRINT("info", ("Connect socket")); + + if (mysql->options.extension && mysql->options.extension->retry_count) + my_net_set_retry_count(net, mysql->options.extension->retry_count); + + status = vio_socket_connect( + net->vio, t_res->ai_addr, (socklen_t)t_res->ai_addrlen, + ctx->non_blocking, get_vio_connect_timeout(mysql)); + /* + Here we rely on vio_socket_connect() to return success only if + the connect attempt was really successful. Otherwise we would + stop trying another address, believing we were successful. + */ + if (!status) break; + + /* + Save either the socket error status or the error code of + the failed vio_connection operation. It is necessary to + avoid having it overwritten by later operations. + */ + saved_error = socket_errno; + + DBUG_PRINT("info", ("No success, try next address.")); + } + DBUG_PRINT("info", + ("End of connect attempts, sock: %d status: %d error: %d", + sock, status, saved_error)); + + freeaddrinfo(res_lst); + if (client_bind_ai_lst) freeaddrinfo(client_bind_ai_lst); + + if (sock == SOCKET_ERROR) { + set_mysql_extended_error(mysql, CR_IPSOCK_ERROR, unknown_sqlstate, + ER_CLIENT(CR_IPSOCK_ERROR), saved_error); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + + if (status) { + DBUG_PRINT("error", + ("Got error %d on connect to '%s'", saved_error, host)); + set_mysql_extended_error(mysql, CR_CONN_HOST_ERROR, unknown_sqlstate, + ER_CLIENT(CR_CONN_HOST_ERROR), host, + saved_error); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + } + + ctx->state_function = csm_complete_connect; + ctx->host = host; + ctx->user = user; + ctx->passwd = passwd; + ctx->db = db; + ctx->port = port; + ctx->unix_socket = unix_socket; + ctx->client_flag = client_flag; + DBUG_RETURN(STATE_MACHINE_CONTINUE); +} + +/** + Complete the connection itself, setting options on the now-connected socket. +*/ +static mysql_state_machine_status csm_complete_connect( + mysql_async_connect *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + NET *net = &mysql->net; + DBUG_PRINT("info", ("net->vio: %p", net->vio)); + if (!net->vio) { + DBUG_PRINT("error", ("Unknow protocol %d ", mysql->options.protocol)); + set_mysql_error(mysql, CR_CONN_UNKNOW_PROTOCOL, unknown_sqlstate); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + + if (my_net_init(net, net->vio)) { + vio_delete(net->vio); + net->vio = 0; + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + vio_keepalive(net->vio, true); + + /* If user set read_timeout, let it override the default */ + if (mysql->options.read_timeout) + my_net_set_read_timeout(net, mysql->options.read_timeout); + + /* If user set write_timeout, let it override the default */ + if (mysql->options.write_timeout) + my_net_set_write_timeout(net, mysql->options.write_timeout); + + /* If user set retry_count, let it override the default */ + if (mysql->options.extension && mysql->options.extension->retry_count) + my_net_set_retry_count(net, mysql->options.extension->retry_count); + + if (mysql->options.max_allowed_packet) + net->max_packet_size = mysql->options.max_allowed_packet; + + MYSQL_TRACE(CONNECTED, mysql, ()); + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_INIT_PACKET); + + /* Get version info */ + mysql->protocol_version = PROTOCOL_VERSION; /* Assume this */ + if (mysql->options.connect_timeout && + (vio_io_wait(net->vio, VIO_IO_EVENT_READ, + get_vio_connect_timeout(mysql)) < 1)) { + set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate, + ER_CLIENT(CR_SERVER_LOST_EXTENDED), + "waiting for initial communication packet", + socket_errno); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + ctx->state_function = csm_read_greeting; + DBUG_RETURN(STATE_MACHINE_CONTINUE); +} + +/** + Read the greeting from the server that is read the first packet +*/ +static mysql_state_machine_status csm_read_greeting(mysql_async_connect *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + DBUG_PRINT("info", ("Read first packet.")); + + if (!ctx->non_blocking) + ctx->pkt_length = cli_safe_read(mysql, NULL); + else { + if (cli_safe_read_nonblocking(mysql, NULL, &ctx->pkt_length) == + NET_ASYNC_NOT_READY) { + DBUG_RETURN(STATE_MACHINE_WOULD_BLOCK); + } + } + if (ctx->pkt_length == packet_error) { + if (mysql->net.last_errno == CR_SERVER_LOST) + set_mysql_extended_error(mysql, CR_SERVER_LOST, unknown_sqlstate, + ER_CLIENT(CR_SERVER_LOST_EXTENDED), + "reading initial communication packet", + socket_errno); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + ctx->state_function = csm_parse_handshake; + DBUG_RETURN(STATE_MACHINE_CONTINUE); +} + +/** + Parse the handshake from the server. +*/ +static mysql_state_machine_status csm_parse_handshake( + mysql_async_connect *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + NET *net = &mysql->net; + int pkt_length = ctx->pkt_length; + int pkt_scramble_len = 0; + char *end, *server_version_end, *pkt_end; + pkt_end = (char *)net->read_pos + pkt_length; + /* Check if version of protocol matches current one */ + mysql->protocol_version = net->read_pos[0]; + DBUG_DUMP("packet", (uchar *)net->read_pos, 10); + DBUG_PRINT("info", ("mysql protocol version %d, server=%d", PROTOCOL_VERSION, + mysql->protocol_version)); + if (mysql->protocol_version != PROTOCOL_VERSION) { + set_mysql_extended_error(mysql, CR_VERSION_ERROR, unknown_sqlstate, + ER_CLIENT(CR_VERSION_ERROR), + mysql->protocol_version, PROTOCOL_VERSION); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + server_version_end = end = strend((char *)net->read_pos + 1); + mysql->thread_id = uint4korr((uchar *)end + 1); + end += 5; + /* + Scramble is split into two parts because old clients do not understand + long scrambles; here goes the first part. + */ + ctx->scramble_data = end; + ctx->scramble_data_len = AUTH_PLUGIN_DATA_PART_1_LENGTH + 1; + ctx->scramble_plugin = NULL; + end += ctx->scramble_data_len; + + if (pkt_end >= end + 1) mysql->server_capabilities = uint2korr((uchar *)end); + if (pkt_end >= end + 18) { + /* New protocol with 16 bytes to describe server characteristics */ + mysql->server_language = end[2]; + mysql->server_status = uint2korr((uchar *)end + 3); + mysql->server_capabilities |= (unsigned long)( ((uint32)uint2korr((uchar *)end + 5)) << 16 ); + pkt_scramble_len = end[7]; + if (pkt_scramble_len < 0) { + set_mysql_error(mysql, CR_MALFORMED_PACKET, + unknown_sqlstate); /* purecov: inspected */ + DBUG_RETURN(STATE_MACHINE_FAILED); + } + } + end += 18; + + if (mysql_init_character_set(mysql)) DBUG_RETURN(STATE_MACHINE_FAILED); + + /* Save connection information */ + if (!my_multi_malloc( + key_memory_MYSQL, MYF(0), &mysql->host_info, + (uint)strlen(ctx->host_info) + 1, &mysql->host, + (uint)strlen(ctx->host) + 1, &mysql->unix_socket, + ctx->unix_socket ? (uint)strlen(ctx->unix_socket) + 1 : (uint)1, + &mysql->server_version, + (uint)(server_version_end - (char *)net->read_pos + 1), NullS) || + !(mysql->user = my_strdup(key_memory_MYSQL, ctx->user, MYF(0))) || + !(mysql->passwd = my_strdup(key_memory_MYSQL, ctx->passwd, MYF(0)))) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + my_stpcpy(mysql->host_info, ctx->host_info); + my_stpcpy(mysql->host, ctx->host); + if (ctx->unix_socket) + my_stpcpy(mysql->unix_socket, ctx->unix_socket); + else + mysql->unix_socket = 0; + my_stpcpy(mysql->server_version, (char *)net->read_pos + 1); + mysql->port = ctx->port; + + if (pkt_end >= end + SCRAMBLE_LENGTH - AUTH_PLUGIN_DATA_PART_1_LENGTH + 1) + + { + /* + move the first scramble part - directly in the NET buffer - + to get a full continuous scramble. We've read all the header, + and can overwrite it now. + */ + memmove(end - AUTH_PLUGIN_DATA_PART_1_LENGTH, ctx->scramble_data, + AUTH_PLUGIN_DATA_PART_1_LENGTH); + ctx->scramble_data = end - AUTH_PLUGIN_DATA_PART_1_LENGTH; + if (mysql->server_capabilities & CLIENT_PLUGIN_AUTH) { + ctx->scramble_data_len = pkt_scramble_len; + ctx->scramble_plugin = ctx->scramble_data + ctx->scramble_data_len; + if (ctx->scramble_data + ctx->scramble_data_len > pkt_end) + ctx->scramble_data_len = (int)(pkt_end - ctx->scramble_data); + } else { + ctx->scramble_data_len = (int)(pkt_end - ctx->scramble_data); + ctx->scramble_plugin = caching_sha2_password_plugin_name; + } + } else { + set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + ctx->state_function = csm_establish_ssl; + DBUG_RETURN(STATE_MACHINE_CONTINUE); +} + +/** + Establish SSL if needed. +*/ +static mysql_state_machine_status csm_establish_ssl(mysql_async_connect *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + /* This check happens to work for both sync and async. */ + if (ctx->ssl_state == SSL_NONE) { + MYSQL_TRACE(INIT_PACKET_RECEIVED, mysql, + (ctx->pkt_length, mysql->net.read_pos)); + MYSQL_TRACE_STAGE(mysql, AUTHENTICATE); + +#if defined(_WIN32) + if ((mysql->options.extension && + mysql->options.extension->ssl_mode <= SSL_MODE_PREFERRED) && + (mysql->options.protocol == MYSQL_PROTOCOL_MEMORY || + mysql->options.protocol == MYSQL_PROTOCOL_PIPE)) { + mysql->options.extension->ssl_mode = SSL_MODE_DISABLED; + } +#endif + /* try and bring up SSL if possible */ + cli_calculate_client_flag(mysql, ctx->db, ctx->client_flag); + + /* + Allocate separate buffer for scramble data if we are going + to attempt TLS connection. This would prevent a possible + overwrite through my_net_write. + */ + if (ctx->scramble_data_len && mysql->options.extension && + mysql->options.extension->ssl_mode != SSL_MODE_DISABLED) { + if (!(ctx->scramble_buffer = + (char *)my_malloc(key_memory_MYSQL_HANDSHAKE, + ctx->scramble_data_len, MYF(MY_WME)))) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + DBUG_RETURN(STATE_MACHINE_FAILED); + } + ctx->scramble_buffer_allocated = true; + memcpy(ctx->scramble_buffer, ctx->scramble_data, ctx->scramble_data_len); + } else { + ctx->scramble_buffer = ctx->scramble_data; + } + } + if (ctx->non_blocking) { + int ret; + if (cli_establish_ssl_nonblocking(mysql, &ret) == NET_ASYNC_NOT_READY) { + DBUG_RETURN(STATE_MACHINE_WOULD_BLOCK); + } + if (ret) { + DBUG_RETURN(STATE_MACHINE_FAILED); + } + } else { + if (cli_establish_ssl(mysql)) { + DBUG_RETURN(STATE_MACHINE_FAILED); + } + } + + ctx->state_function = csm_authenticate; + DBUG_RETURN(STATE_MACHINE_CONTINUE); +} + +/** + Invoke the authentication client plugin API to send the authentication + data to the server +*/ +static mysql_state_machine_status csm_authenticate(mysql_async_connect *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + if (ctx->non_blocking) { + mysql_state_machine_status status = run_plugin_auth_nonblocking( + ctx->mysql, ctx->scramble_data, ctx->scramble_data_len, + ctx->scramble_plugin, ctx->db); + if (status != STATE_MACHINE_DONE) { + DBUG_RETURN(status); + } + } else { + if (run_plugin_auth(mysql, ctx->scramble_buffer, ctx->scramble_data_len, + ctx->scramble_plugin, ctx->db)) { + DBUG_RETURN(STATE_MACHINE_FAILED); + } + } + + if (ctx->scramble_buffer_allocated) { + ctx->scramble_buffer_allocated = false; + my_free(ctx->scramble_buffer); + ctx->scramble_buffer = nullptr; + } + + ctx->state_function = csm_prep_select_database; + DBUG_RETURN(STATE_MACHINE_CONTINUE); +} + +/** + Authenticated, set intial database if specified +*/ +static mysql_state_machine_status csm_prep_select_database( + mysql_async_connect *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + NET *net = &mysql->net; + MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); + + if (mysql->client_flag & CLIENT_COMPRESS) /* We will use compression */ + net->compress = 1; + +#ifdef CHECK_LICENSE + if (check_license(mysql)) DBUG_RETURN(STATE_MACHINE_FAILED); +#endif + +#ifdef MYSQL_SERVER + DBUG_RETURN(STATE_MACHINE_DONE); +#else + ctx->state_function = csm_prep_init_commands; +#endif + + DBUG_RETURN(STATE_MACHINE_CONTINUE); +} + +#ifndef MYSQL_SERVER +/** + Prepare to send a sequence of init commands. +*/ +static mysql_state_machine_status csm_prep_init_commands( + mysql_async_connect *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + if (!mysql->options.init_commands) { + DBUG_RETURN(STATE_MACHINE_DONE); + } + + ctx->saved_reconnect = mysql->reconnect; + mysql->reconnect = 0; + ctx->current_init_command = mysql->options.init_commands->begin(); + + ctx->state_function = csm_send_one_init_command; + DBUG_RETURN(STATE_MACHINE_CONTINUE); +} + +/** + Send an init command. This is called once per init command until + they've all been run (or a failure occurs). +*/ +static mysql_state_machine_status csm_send_one_init_command( + mysql_async_connect *ctx) { + DBUG_ENTER(__func__); + MYSQL *mysql = ctx->mysql; + + if (mysql_real_query(mysql, *ctx->current_init_command, + (ulong)strlen(*ctx->current_init_command))) + DBUG_RETURN(STATE_MACHINE_FAILED); + int status; + do { + if (mysql->fields) { + MYSQL_RES *res; + if (!(res = cli_use_result(mysql))) DBUG_RETURN(STATE_MACHINE_FAILED); + mysql_free_result(res); + } + if ((status = mysql_next_result(mysql)) > 0) + DBUG_RETURN(STATE_MACHINE_FAILED); + } while (status == 0); + + ++ctx->current_init_command; + if (ctx->current_init_command < mysql->options.init_commands->end()) { + DBUG_RETURN(STATE_MACHINE_CONTINUE); + } + mysql->reconnect = ctx->saved_reconnect; + DBUG_PRINT("exit", ("Mysql handler: %p", mysql)); + DBUG_RETURN(STATE_MACHINE_DONE); +} +#endif + +bool mysql_reconnect(MYSQL *mysql) { + MYSQL tmp_mysql; + DBUG_ENTER("mysql_reconnect"); + DBUG_ASSERT(mysql); + DBUG_PRINT("enter", ("mysql->reconnect: %d", mysql->reconnect)); + + if (!mysql->reconnect || (mysql->server_status & SERVER_STATUS_IN_TRANS) || + !mysql->host_info) { + /* Allow reconnect next time */ + mysql->server_status &= ~SERVER_STATUS_IN_TRANS; + set_mysql_error(mysql, CR_SERVER_GONE_ERROR, unknown_sqlstate); + DBUG_RETURN(1); + } + mysql_init(&tmp_mysql); + mysql_close_free_options(&tmp_mysql); + tmp_mysql.options = mysql->options; + tmp_mysql.options.my_cnf_file = tmp_mysql.options.my_cnf_group = 0; + + if (!mysql_real_connect(&tmp_mysql, mysql->host, mysql->user, mysql->passwd, + mysql->db, mysql->port, mysql->unix_socket, + mysql->client_flag | CLIENT_REMEMBER_OPTIONS)) { + memset(&tmp_mysql.options, 0, sizeof(tmp_mysql.options)); + mysql_close(&tmp_mysql); + mysql->net.last_errno = tmp_mysql.net.last_errno; + my_stpcpy(mysql->net.last_error, tmp_mysql.net.last_error); + my_stpcpy(mysql->net.sqlstate, tmp_mysql.net.sqlstate); + DBUG_RETURN(1); + } + if (mysql_set_character_set(&tmp_mysql, mysql->charset->csname)) { + DBUG_PRINT("error", ("mysql_set_character_set() failed")); + memset(&tmp_mysql.options, 0, sizeof(tmp_mysql.options)); + mysql_close(&tmp_mysql); + mysql->net.last_errno = tmp_mysql.net.last_errno; + my_stpcpy(mysql->net.last_error, tmp_mysql.net.last_error); + my_stpcpy(mysql->net.sqlstate, tmp_mysql.net.sqlstate); + DBUG_RETURN(1); + } + + DBUG_PRINT("info", ("reconnect succeded")); + tmp_mysql.reconnect = 1; + tmp_mysql.free_me = mysql->free_me; + + /* Move prepared statements (if any) over to the new mysql object */ + tmp_mysql.stmts = mysql->stmts; + mysql->stmts = 0; + + /* Don't free options as these are now used in tmp_mysql */ + memset(&mysql->options, 0, sizeof(mysql->options)); + mysql->free_me = 0; + mysql_close(mysql); + *mysql = std::move(tmp_mysql); + net_clear(&mysql->net, 1); + mysql->affected_rows = ~(my_ulonglong)0; + DBUG_RETURN(0); +} + +/** + Open a new replication stream. + + Compose and send COM_BINLOG_DUMP[_GTID] command + using information in the MYSQL_RPL structure. + + Caller must set the following MYSQL_RPL's slots: + file_name_length, file_name, start_positions, server_id, flags + and in case of MYSQL_RPL_GTID: gtid_set_size, gtid_set + or fix_gtid_set/fix_gtid_set_arg which is used to compose command packet. + + Note: we treat NULL rpl->file_name as an empty string. + If rpl->file_name_length is 0, strlen(rpl->file_name) + will be called to set it. + If rpl->fix_gtid_set is not NULL it will be called to fill + packet gtid set data (rpl->gtid_set is ignored). + + @param mysql Connection handle. + @param rpl Replication stream information. + + @retval -1 Error. + @retval 0 Success. +*/ +int STDCALL mysql_binlog_open(MYSQL *mysql, MYSQL_RPL *rpl) { + DBUG_ENTER("mysql_binlog_open"); + DBUG_ASSERT(mysql); + DBUG_ASSERT(rpl); + + enum enum_server_command command; + uchar *command_buffer = NULL; + size_t command_size = 0; + + /* + No need to check mysql->net.vio here as + it'll be checked in the simple_command(). + */ + + if (!rpl->file_name) { + rpl->file_name = const_cast<char *>(""); + rpl->file_name_length = 0; + } else if (rpl->file_name_length == 0) + rpl->file_name_length = strlen(rpl->file_name); + + if (rpl->file_name_length > UINT_MAX) { + set_mysql_error(mysql, CR_FILE_NAME_TOO_LONG, unknown_sqlstate); + DBUG_RETURN(-1); + } + + if (rpl->flags & MYSQL_RPL_GTID) { + command = COM_BINLOG_DUMP_GTID; + +#define GTID_ENCODED_DATA_SIZE 8 + + size_t alloc_size = rpl->file_name_length + ::BINLOG_FLAGS_INFO_SIZE + + ::BINLOG_SERVER_ID_INFO_SIZE + + ::BINLOG_NAME_SIZE_INFO_SIZE + ::BINLOG_POS_INFO_SIZE + + ::BINLOG_DATA_SIZE_INFO_SIZE + + (rpl->gtid_set_encoded_size ? rpl->gtid_set_encoded_size + : GTID_ENCODED_DATA_SIZE) + + 1; + + if (!(command_buffer = (uchar *)my_malloc(PSI_NOT_INSTRUMENTED, alloc_size, + MYF(MY_WME)))) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + DBUG_RETURN(-1); + } + + uchar *ptr = command_buffer; + + int2store(ptr, rpl->flags); // Note: we use low 16 bits + ptr += ::BINLOG_FLAGS_INFO_SIZE; + int4store(ptr, rpl->server_id); + ptr += ::BINLOG_SERVER_ID_INFO_SIZE; + int4store(ptr, static_cast<uint32>(rpl->file_name_length)); + ptr += ::BINLOG_NAME_SIZE_INFO_SIZE; + memcpy(ptr, rpl->file_name, rpl->file_name_length); + ptr += rpl->file_name_length; + int8store(ptr, rpl->start_position); + ptr += ::BINLOG_POS_INFO_SIZE; + if (rpl->gtid_set_encoded_size) { + int4store(ptr, static_cast<uint32>(rpl->gtid_set_encoded_size)); + ptr += ::BINLOG_DATA_SIZE_INFO_SIZE; + if (rpl->fix_gtid_set) + rpl->fix_gtid_set(rpl, ptr); + else + memcpy(ptr, rpl->gtid_set_arg, rpl->gtid_set_encoded_size); + ptr += rpl->gtid_set_encoded_size; + } else { + /* No GTID set data, store 0 as its length. */ + int4store(ptr, static_cast<uint32>(GTID_ENCODED_DATA_SIZE)); + ptr += ::BINLOG_DATA_SIZE_INFO_SIZE; + int8store(ptr, static_cast<uint64>(0)); + ptr += GTID_ENCODED_DATA_SIZE; + } + + command_size = ptr - command_buffer; + DBUG_ASSERT(command_size == (alloc_size - 1)); + } else { + command = COM_BINLOG_DUMP; + size_t alloc_size = rpl->file_name_length + ::BINLOG_POS_OLD_INFO_SIZE + + ::BINLOG_FLAGS_INFO_SIZE + + ::BINLOG_SERVER_ID_INFO_SIZE + 1; + + if (!(command_buffer = (uchar *)my_malloc(PSI_NOT_INSTRUMENTED, alloc_size, + MYF(MY_WME)))) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + DBUG_RETURN(-1); + } + + uchar *ptr = command_buffer; + + /* + COM_BINLOG_DUMP accepts only 4 bytes for the position, so + we are forced to cast to uint32. + */ + int4store(ptr, (uint32)rpl->start_position); + ptr += ::BINLOG_POS_OLD_INFO_SIZE; + int2store(ptr, rpl->flags); // note: we use low 16 bits + ptr += ::BINLOG_FLAGS_INFO_SIZE; + int4store(ptr, rpl->server_id); + ptr += ::BINLOG_SERVER_ID_INFO_SIZE; + memcpy(ptr, rpl->file_name, rpl->file_name_length); + ptr += rpl->file_name_length; + + command_size = ptr - command_buffer; + DBUG_ASSERT(command_size == (alloc_size - 1)); + } + + if (simple_command(mysql, command, command_buffer, command_size, 1)) { + my_free(command_buffer); + DBUG_RETURN(-1); + } + + my_free(command_buffer); + + DBUG_RETURN(0); +} + +/** + Fetch one event from the server. + + Read one packet and check its validity, + set rpl->buffer and rpl->size accordingly. + + @param mysql Connection handle. + @param rpl Replication stream information. + + @retval -1 Got error packet. + @retval 0 Success. +*/ +int STDCALL mysql_binlog_fetch(MYSQL *mysql, MYSQL_RPL *rpl) { + DBUG_ENTER("mysql_binlog_fetch"); + DBUG_ASSERT(mysql); + DBUG_ASSERT(rpl); + + for (;;) { + /* Read a packet from the server. */ + ulong packet_len = cli_safe_read(mysql, NULL); + + NET *net = &mysql->net; + + /* Check if error packet. */ + if (packet_len == packet_error || packet_len == 0) { + DBUG_RETURN(-1); + } + /* Check if EOF packet. */ + else if (packet_len < 8 && net->read_pos[0] == 254) { + rpl->size = 0; + DBUG_RETURN(0); + } + + /* Normal packet. */ + if (rpl->flags & MYSQL_RPL_SKIP_HEARTBEAT) { + Log_event_type event_type = + (Log_event_type)net->read_pos[1 + EVENT_TYPE_OFFSET]; + if (event_type == binary_log::HEARTBEAT_LOG_EVENT) continue; + } + + rpl->buffer = net->read_pos; + rpl->size = packet_len; + DBUG_RETURN(0); + } +} + +/** + Close replication stream. + + @param mysql Connection handle. + @param rpl Replication stream information. +*/ +void STDCALL mysql_binlog_close(MYSQL *mysql, MYSQL_RPL *rpl) { + DBUG_ENTER("mysql_binlog_close"); + DBUG_ASSERT(mysql); + DBUG_ASSERT(rpl); + + end_server(mysql); + + rpl->buffer = 0; + rpl->size = 0; + + DBUG_VOID_RETURN; +} + +/************************************************************************** + Set current database +**************************************************************************/ + +int STDCALL mysql_select_db(MYSQL *mysql, const char *db) { + int error; + DBUG_ENTER("mysql_select_db"); + DBUG_PRINT("enter", ("db: '%s'", db)); + + if ((error = simple_command(mysql, COM_INIT_DB, (const uchar *)db, + (ulong)strlen(db), 0))) + DBUG_RETURN(error); + my_free(mysql->db); + mysql->db = my_strdup(key_memory_MYSQL, db, MYF(MY_WME)); + DBUG_RETURN(0); +} + +/************************************************************************* + Send a QUIT to the server and close the connection + If handle is alloced by mysql connect free it. +*************************************************************************/ + +void mysql_close_free_options(MYSQL *mysql) { + DBUG_ENTER("mysql_close_free_options"); + + my_free(mysql->options.user); + my_free(mysql->options.host); + my_free(mysql->options.password); + my_free(mysql->options.unix_socket); + my_free(mysql->options.db); + my_free(mysql->options.my_cnf_file); + my_free(mysql->options.my_cnf_group); + my_free(mysql->options.charset_dir); + my_free(mysql->options.charset_name); + my_free(mysql->options.bind_address); + if (mysql->options.init_commands) { + char **ptr = mysql->options.init_commands->begin(); + char **end = mysql->options.init_commands->end(); + for (; ptr < end; ptr++) my_free(*ptr); + mysql->options.init_commands->~Init_commands_array(); + my_free(mysql->options.init_commands); + } +#if defined(HAVE_OPENSSL) + mysql_ssl_free(mysql); +#endif /* HAVE_OPENSSL */ +#if defined(_WIN32) + if (mysql->options.shared_memory_base_name != def_shared_memory_base_name) + my_free(mysql->options.shared_memory_base_name); +#endif /* _WIN32 */ + if (mysql->options.extension) { + my_free(mysql->options.extension->plugin_dir); + my_free(mysql->options.extension->default_auth); + my_free(mysql->options.extension->server_public_key_path); + delete mysql->options.extension->connection_attributes; + my_free(mysql->options.extension); + } + memset(&mysql->options, 0, sizeof(mysql->options)); + DBUG_VOID_RETURN; +} + +/* + Free all memory allocated in a MYSQL handle but preserve + current options if any. +*/ + +void mysql_close_free(MYSQL *mysql) { + my_free(mysql->host_info); + my_free(mysql->user); + my_free(mysql->passwd); + my_free(mysql->db); + + /* Free extension if any */ + if (mysql->extension) + mysql_extension_free(static_cast<MYSQL_EXTENSION *>(mysql->extension)); + + my_free(mysql->field_alloc); + mysql->field_alloc = nullptr; + + /* Clear pointers for better safety */ + mysql->host_info = NULL; + mysql->user = NULL; + mysql->passwd = NULL; + mysql->db = NULL; + mysql->extension = NULL; +} + +/** + For use when the connection to the server has been lost (in which case + the server has discarded all information about prepared statements + associated with the connection). + + Mark all statements in mysql->stmts by setting stmt->mysql= 0 if the + statement has transitioned beyond the MYSQL_STMT_INIT_DONE state, and + unlink the statement from the mysql->stmts list. + + The remaining pruned list of statements (if any) is kept in mysql->stmts. + + @param mysql pointer to the MYSQL object +*/ +static void mysql_prune_stmt_list(MYSQL *mysql) { + LIST *pruned_list = NULL; + + while (mysql->stmts) { + LIST *element = mysql->stmts; + MYSQL_STMT *stmt; + + mysql->stmts = list_delete(element, element); + stmt = (MYSQL_STMT *)element->data; + if (stmt->state != MYSQL_STMT_INIT_DONE) { + stmt->mysql = 0; + stmt->last_errno = CR_SERVER_LOST; + my_stpcpy(stmt->last_error, ER_CLIENT(CR_SERVER_LOST)); + my_stpcpy(stmt->sqlstate, unknown_sqlstate); + } else { + pruned_list = list_add(pruned_list, element); + } + } + + mysql->stmts = pruned_list; +} + +/* + Clear connection pointer of every statement: this is necessary + to give error on attempt to use a prepared statement of closed + connection. + + SYNOPSYS + mysql_detach_stmt_list() + stmt_list pointer to mysql->stmts + func_name name of calling function + + NOTE + There is similar code in mysql_reconnect(), so changes here + should also be reflected there. +*/ + +void mysql_detach_stmt_list(LIST **stmt_list MY_ATTRIBUTE((unused)), + const char *func_name MY_ATTRIBUTE((unused))) { +#ifndef MYSQL_SERVER + /* Reset connection handle in all prepared statements. */ + LIST *element = *stmt_list; + char buff[MYSQL_ERRMSG_SIZE]; + DBUG_ENTER("mysql_detach_stmt_list"); + + snprintf(buff, sizeof(buff) - 1, ER_CLIENT(CR_STMT_CLOSED), func_name); + for (; element; element = element->next) { + MYSQL_STMT *stmt = (MYSQL_STMT *)element->data; + set_stmt_error(stmt, CR_STMT_CLOSED, unknown_sqlstate, buff); + stmt->mysql = 0; + /* No need to call list_delete for statement here */ + } + *stmt_list = 0; + DBUG_VOID_RETURN; +#endif /* !MYSQL_SERVER */ +} + +void STDCALL mysql_close(MYSQL *mysql) { + DBUG_ENTER("mysql_close"); + if (mysql) /* Some simple safety */ + { + /* If connection is still up, send a QUIT message */ + if (mysql->net.vio != 0) { + free_old_query(mysql); + mysql->status = MYSQL_STATUS_READY; /* Force command */ + if (vio_is_blocking(mysql->net.vio)) { + simple_command(mysql, COM_QUIT, (uchar *)0, 0, 1); + } else { + /* + Best effort; try to toss a command on the wire, but we can't wait + to hear back. + */ + bool err; /* unused */ + simple_command_nonblocking(mysql, COM_QUIT, (uchar *)0, 0, 1, &err); + } + + mysql->reconnect = 0; + end_server(mysql); /* Sets mysql->net.vio= 0 */ + } + mysql_close_free_options(mysql); + mysql_close_free(mysql); + mysql_detach_stmt_list(&mysql->stmts, "mysql_close"); + if (mysql->free_me) { + my_free(mysql); + } + } + DBUG_VOID_RETURN; +} + +static bool cli_read_query_result(MYSQL *mysql) { + uchar *pos; + ulong field_count; + ulong length; + DBUG_ENTER("cli_read_query_result"); + + if ((length = cli_safe_read(mysql, NULL)) == packet_error) DBUG_RETURN(1); + free_old_query(mysql); /* Free old result */ +#ifndef MYSQL_SERVER /* Avoid warn of unused labels*/ +get_info: +#endif + pos = (uchar *)mysql->net.read_pos; + if ((field_count = net_field_length(&pos)) == 0) { + read_ok_ex(mysql, length); +#if defined(CLIENT_PROTOCOL_TRACING) + if (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); + else + MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); +#endif + DBUG_RETURN(0); + } +#ifndef MYSQL_SERVER + if (field_count == NULL_LENGTH) /* LOAD DATA LOCAL INFILE */ + { + int error; + + MYSQL_TRACE_STAGE(mysql, FILE_REQUEST); + + if (!(mysql->options.client_flag & CLIENT_LOCAL_FILES)) { + set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); + DBUG_RETURN(1); + } + + error = handle_local_infile(mysql, (char *)pos); + + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); + + if ((length = cli_safe_read(mysql, NULL)) == packet_error || error) + DBUG_RETURN(1); + goto get_info; /* Get info packet */ + } +#endif + if (!(mysql->server_status & SERVER_STATUS_AUTOCOMMIT)) + mysql->server_status |= SERVER_STATUS_IN_TRANS; + + if (read_com_query_metadata(mysql, pos, field_count)) DBUG_RETURN(1); + + mysql->status = MYSQL_STATUS_GET_RESULT; + mysql->field_count = (uint)field_count; + + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_ROW); + + DBUG_PRINT("exit", ("ok")); + DBUG_RETURN(0); +} +static net_async_status cli_read_query_result_nonblocking(MYSQL *mysql) { + DBUG_ENTER(__func__); + NET *net = &mysql->net; + NET_ASYNC *net_async = NET_ASYNC_DATA(net); + uchar *pos = nullptr; + ulong field_count; + ulong length; + + if (net_async->async_read_query_result_status == + NET_ASYNC_READ_QUERY_RESULT_IDLE) { + net_async->async_read_query_result_status = + NET_ASYNC_READ_QUERY_RESULT_FIELD_COUNT; + } + + if (net_async->async_read_query_result_status == + NET_ASYNC_READ_QUERY_RESULT_FIELD_COUNT) { + net_async_status status = + cli_safe_read_nonblocking(mysql, nullptr, &length); + if (status == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + if (length == packet_error) { + net_async->async_read_query_result_status = + NET_ASYNC_READ_QUERY_RESULT_IDLE; + DBUG_RETURN(NET_ASYNC_ERROR); + } + mysql->packet_length = length; + + free_old_query(mysql); /* Free old result */ +#ifndef MYSQL_SERVER /* Avoid warn of unused labels*/ + get_info: +#endif + pos = (uchar *)mysql->net.read_pos; + if ((field_count = net_field_length(&pos)) == 0) { + read_ok_ex(mysql, length); +#if defined(CLIENT_PROTOCOL_TRACING) + if (mysql->server_status & SERVER_MORE_RESULTS_EXISTS) + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); + else + MYSQL_TRACE_STAGE(mysql, READY_FOR_COMMAND); +#endif + net_async->async_read_query_result_status = + NET_ASYNC_READ_QUERY_RESULT_IDLE; + DBUG_RETURN(NET_ASYNC_COMPLETE); + } +#ifndef MYSQL_SERVER + if (field_count == NULL_LENGTH) /* LOAD DATA LOCAL INFILE */ + { + int error; + + MYSQL_TRACE_STAGE(mysql, FILE_REQUEST); + + if (!(mysql->options.client_flag & CLIENT_LOCAL_FILES)) { + set_mysql_error(mysql, CR_MALFORMED_PACKET, unknown_sqlstate); + net_async->async_read_query_result_status = + NET_ASYNC_READ_QUERY_RESULT_IDLE; + DBUG_RETURN(NET_ASYNC_ERROR); + } + + error = handle_local_infile(mysql, (char *)pos); + + MYSQL_TRACE_STAGE(mysql, WAIT_FOR_RESULT); + + /* TODO: Make LOAD DATA LOCAL INFILE asynchronous. */ + if ((length = cli_safe_read(mysql, NULL)) == packet_error || error) { + net_async->async_read_query_result_status = + NET_ASYNC_READ_QUERY_RESULT_IDLE; + DBUG_RETURN(NET_ASYNC_ERROR); + } + goto get_info; /* Get info packet */ + } +#endif + if (!(mysql->server_status & SERVER_STATUS_AUTOCOMMIT)) + mysql->server_status |= SERVER_STATUS_IN_TRANS; + + mysql->field_count = (uint)field_count; + net_async->async_read_query_result_status = + NET_ASYNC_READ_QUERY_RESULT_FIELD_INFO; + } + + if (net_async->async_read_query_result_status == + NET_ASYNC_READ_QUERY_RESULT_FIELD_INFO) { + int res; + net_async_status status = read_com_query_metadata_nonblocking( + mysql, pos, mysql->field_count, &res); + if (status == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + + if (res) { + net_async->async_read_query_result_status = + NET_ASYNC_READ_QUERY_RESULT_IDLE; + DBUG_RETURN(NET_ASYNC_ERROR); + } + } + + mysql->status = MYSQL_STATUS_GET_RESULT; + DBUG_PRINT("exit", ("ok, %u", mysql->field_count)); + net_async->async_read_query_result_status = NET_ASYNC_READ_QUERY_RESULT_IDLE; + DBUG_RETURN(NET_ASYNC_COMPLETE); +} + +/* + Send the query and return so we can do something else. + Needs to be followed by mysql_read_query_result() when we want to + finish processing it. +*/ + +int STDCALL mysql_send_query(MYSQL *mysql, const char *query, ulong length) { + STATE_INFO *info; + + DBUG_ENTER("mysql_send_query"); + + if ((info = STATE_DATA(mysql))) + free_state_change_info(static_cast<MYSQL_EXTENSION *>(mysql->extension)); + + DBUG_RETURN(simple_command(mysql, COM_QUERY, + pointer_cast<const uchar *>(query), length, 1)); +} + +/** + Executes the SQL statement pointed by query. This API is called by + mysql_real_query_nonblocking to send query to server in asynchronous way. + + @param[in] mysql connection handle + @param[in] query query string to be executed + @param[in] length length of query + + @retval NET_ASYNC_ERROR query execution failed + @retval NET_ASYNC_NOT_READY query not yet completed, call this API again + @retval NET_ASYNC_COMPLETE query execution finished +*/ +net_async_status STDCALL mysql_send_query_nonblocking(MYSQL *mysql, + const char *query, + ulong length) { + DBUG_ENTER(__func__); + STATE_INFO *info; + + if ((info = STATE_DATA(mysql))) + free_state_change_info(static_cast<MYSQL_EXTENSION *>(mysql->extension)); + + bool ret; + if (simple_command_nonblocking(mysql, COM_QUERY, + pointer_cast<const uchar *>(query), length, 1, + &ret) == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + if (ret) + DBUG_RETURN(NET_ASYNC_ERROR); + else + DBUG_RETURN(NET_ASYNC_COMPLETE); +} + +int STDCALL mysql_real_query(MYSQL *mysql, const char *query, ulong length) { + int retval; + DBUG_ENTER("mysql_real_query"); + DBUG_PRINT("enter", ("handle: %p", mysql)); + DBUG_PRINT("query", ("Query = '%-.*s'", (int)length, query)); + DBUG_EXECUTE_IF("inject_ER_NET_READ_INTERRUPTED", { + mysql->net.last_errno = ER_NET_READ_INTERRUPTED; + DBUG_SET("-d,inject_ER_NET_READ_INTERRUPTED"); + DBUG_RETURN(1); + }); + + if (mysql_send_query(mysql, query, length)) DBUG_RETURN(1); + retval = (int)(*mysql->methods->read_query_result)(mysql); + DBUG_RETURN(retval); +} + +/** + Executes the SQL statement pointed by query. This sql statement length is set + in length parameter. query string can contain multiple sql statements + separated by semicolons. This function can return immediately with status set + to NET_ASYNC_NOT_READY, in this case client application is expected to call + this API until it returns NET_ASYNC_COMPLETE. + + @param[in] mysql connection handle + @param[in] query query string to be executed + @param[in] length length of query + + @retval NET_ASYNC_ERROR query execution failed + @retval NET_ASYNC_NOT_READY query not yet completed, call this API again + @retval NET_ASYNC_COMPLETE query execution finished +*/ +net_async_status STDCALL mysql_real_query_nonblocking(MYSQL *mysql, + const char *query, + ulong length) { + DBUG_ENTER(__func__); + DBUG_PRINT("enter", ("handle: %p", mysql)); + DBUG_PRINT("query", ("Query = '%-.*s'", (int)length, query)); + DBUG_EXECUTE_IF("inject_ER_NET_READ_INTERRUPTED", { + mysql->net.last_errno = ER_NET_READ_INTERRUPTED; + DBUG_SET("-d,inject_ER_NET_READ_INTERRUPTED"); + DBUG_RETURN(NET_ASYNC_ERROR); + }); + MYSQL_ASYNC *async_context = ASYNC_DATA(mysql); + DBUG_ASSERT(async_context->async_op_status == ASYNC_OP_UNSET || + async_context->async_op_status == ASYNC_OP_QUERY); + + net_async_status status = NET_ASYNC_NOT_READY; + /* 1st phase: send query. */ + if (async_context->async_query_state == QUERY_IDLE) { + async_context->async_query_length = length; + async_context->async_op_status = ASYNC_OP_QUERY; + async_context->async_query_state = QUERY_SENDING; + } + + if (async_context->async_query_state == QUERY_SENDING) { + status = mysql_send_query_nonblocking(mysql, query, length); + if (status == NET_ASYNC_NOT_READY) + DBUG_RETURN(NET_ASYNC_NOT_READY); + else if (status == NET_ASYNC_ERROR) + goto end; + async_context->async_query_state = QUERY_READING_RESULT; + } + + /* 2nd phase: read query result (field count, field info) */ + if (async_context->async_query_state == QUERY_READING_RESULT) { + status = (*mysql->methods->read_query_result_nonblocking)(mysql); + if (status == NET_ASYNC_NOT_READY) + DBUG_RETURN(NET_ASYNC_NOT_READY); + else if (status == NET_ASYNC_ERROR) + goto end; + } + +end: + async_context->async_op_status = ASYNC_OP_UNSET; + async_context->async_query_state = QUERY_IDLE; + async_context->async_query_length = 0; + if (status == NET_ASYNC_ERROR) + DBUG_RETURN(NET_ASYNC_ERROR); + else + DBUG_RETURN(NET_ASYNC_COMPLETE); +} + +/************************************************************************** + Alloc result struct for buffered results. All rows are read to buffer. + mysql_data_seek may be used. +**************************************************************************/ + +MYSQL_RES *STDCALL mysql_store_result(MYSQL *mysql) { + MYSQL_RES *result; + DBUG_ENTER("mysql_store_result"); + + /* + Some queries (e.g. "CALL") may return an empty resultset. + mysql->field_count is 0 in such cases. + */ + if (!mysql->field_count) DBUG_RETURN(0); + if (mysql->status != MYSQL_STATUS_GET_RESULT) { + set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate); + DBUG_RETURN(0); + } + mysql->status = MYSQL_STATUS_READY; /* server is ready */ + if (!(result = (MYSQL_RES *)my_malloc( + key_memory_MYSQL_RES, + (uint)(sizeof(MYSQL_RES) + sizeof(ulong) * mysql->field_count), + MYF(MY_WME | MY_ZEROFILL)))) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + DBUG_RETURN(0); + } + if (!(result->field_alloc = (MEM_ROOT *)my_malloc( + key_memory_MYSQL, sizeof(MEM_ROOT), MYF(MY_WME | MY_ZEROFILL)))) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + my_free(result); + DBUG_RETURN(0); + } + result->methods = mysql->methods; + result->eof = 1; /* Marker for buffered */ + result->lengths = (ulong *)(result + 1); + if (!(result->data = (*mysql->methods->read_rows)(mysql, mysql->fields, + mysql->field_count))) { + my_free(result->field_alloc); + my_free(result); + DBUG_RETURN(0); + } + mysql->affected_rows = result->row_count = result->data->rows; + result->data_cursor = result->data->data; + result->fields = mysql->fields; + *result->field_alloc = std::move(*mysql->field_alloc); + result->field_count = mysql->field_count; + result->metadata = mysql->resultset_metadata; + /* The rest of result members is zerofilled in my_malloc */ + mysql->fields = 0; /* fields is now in result */ + /* just in case this was mistakenly called after mysql_stmt_execute() */ + mysql->unbuffered_fetch_owner = 0; + DBUG_RETURN(result); /* Data fetched */ +} + +/** + This API reads all result set sent by server in an asynchronous way + + @param[in] mysql connection handle + @param[in] result buffer which holds all result sets. + + @retval NET_ASYNC_NOT_READY reading of result sets not complete + @retval NET_ASYNC_COMPLETE completed this asynchronous operation +*/ +enum net_async_status STDCALL +mysql_store_result_nonblocking(MYSQL *mysql, MYSQL_RES **result) { + DBUG_ENTER(__func__); + MYSQL_ASYNC *async_context = ASYNC_DATA(mysql); + *result = nullptr; + + /* + Some queries (e.g. "CALL") may return an empty resultset. + mysql->field_count is 0 in such cases. + */ + if (!mysql->field_count) { + goto end; + } + if (!async_context->async_store_result_result) { + if (mysql->status != MYSQL_STATUS_GET_RESULT) { + set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate); + goto end; + } + mysql->status = MYSQL_STATUS_READY; /* server is ready */ + + if (!(async_context->async_store_result_result = (MYSQL_RES *)my_malloc( + key_memory_MYSQL_RES, + (uint)(sizeof(MYSQL_RES) + sizeof(ulong) * mysql->field_count), + MYF(MY_WME | MY_ZEROFILL)))) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + goto end; + } + if (!(async_context->async_store_result_result->field_alloc = + (MEM_ROOT *)my_malloc(key_memory_MYSQL, sizeof(MEM_ROOT), + MYF(MY_WME | MY_ZEROFILL)))) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + my_free(async_context->async_store_result_result); + goto end; + } + async_context->async_store_result_result->methods = mysql->methods; + async_context->async_store_result_result->eof = 1; /* Marker for buffered */ + async_context->async_store_result_result->lengths = + (ulong *)(async_context->async_store_result_result + 1); + } + + if ((*mysql->methods->read_rows_nonblocking)( + mysql, mysql->fields, mysql->field_count, + &async_context->async_store_result_result->data) == + NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + + if (!async_context->async_store_result_result->data) { + my_free(async_context->async_store_result_result->field_alloc); + my_free(async_context->async_store_result_result); + goto end; + } + mysql->affected_rows = async_context->async_store_result_result->row_count = + async_context->async_store_result_result->data->rows; + async_context->async_store_result_result->data_cursor = + async_context->async_store_result_result->data->data; + async_context->async_store_result_result->fields = mysql->fields; + *async_context->async_store_result_result->field_alloc = + std::move(*mysql->field_alloc); + async_context->async_store_result_result->field_count = mysql->field_count; + async_context->async_store_result_result->metadata = + mysql->resultset_metadata; + /* The rest of result members is zerofilled in my_malloc */ + mysql->fields = 0; /* fields is now in result */ + /* just in case this was mistakenly called after mysql_stmt_execute() */ + mysql->unbuffered_fetch_owner = 0; + *result = async_context->async_store_result_result; +end: + async_context->async_store_result_result = nullptr; + DBUG_RETURN(NET_ASYNC_COMPLETE); +} + +/************************************************************************** + Alloc struct for use with unbuffered reads. Data is fetched by domand + when calling to mysql_fetch_row. + mysql_data_seek is a noop. + + No other queries may be specified with the same MYSQL handle. + There shouldn't be much processing per row because mysql server shouldn't + have to wait for the client (and will not wait more than 30 sec/packet). +**************************************************************************/ + +static MYSQL_RES *cli_use_result(MYSQL *mysql) { + MYSQL_RES *result; + DBUG_ENTER("cli_use_result"); + + /* + Some queries (e.g. "CALL") may return an empty resultset. + mysql->field_count is 0 in such cases. + */ + if (!mysql->field_count) DBUG_RETURN(0); + if (mysql->status != MYSQL_STATUS_GET_RESULT) { + set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate); + DBUG_RETURN(0); + } + if (!(result = (MYSQL_RES *)my_malloc( + key_memory_MYSQL_RES, + sizeof(*result) + sizeof(ulong) * mysql->field_count, + MYF(MY_WME | MY_ZEROFILL)))) + DBUG_RETURN(0); + result->lengths = (ulong *)(result + 1); + result->methods = mysql->methods; + if (!(result->row = (MYSQL_ROW)my_malloc( + key_memory_MYSQL_ROW, + sizeof(result->row[0]) * (mysql->field_count + 1), + MYF(MY_WME)))) { /* Ptrs: to one row */ + my_free(result); + DBUG_RETURN(0); + } + if (!(result->field_alloc = (MEM_ROOT *)my_malloc( + key_memory_MYSQL, sizeof(MEM_ROOT), MYF(MY_WME | MY_ZEROFILL)))) { + my_free(result->row); + my_free(result); + DBUG_RETURN(0); + } + result->fields = mysql->fields; + *result->field_alloc = std::move(*mysql->field_alloc); + result->field_count = mysql->field_count; + result->metadata = mysql->resultset_metadata; + result->current_field = 0; + result->handle = mysql; + result->current_row = 0; + mysql->fields = 0; /* fields is now in result */ + mysql->status = MYSQL_STATUS_USE_RESULT; + mysql->unbuffered_fetch_owner = &result->unbuffered_fetch_cancelled; + DBUG_RETURN(result); /* Data is read to be fetched */ +} + +/************************************************************************** + Return next row of the query results +**************************************************************************/ + +MYSQL_ROW STDCALL mysql_fetch_row(MYSQL_RES *res) { + DBUG_ENTER("mysql_fetch_row"); + if (!res->data) { /* Unbufferred fetch */ + if (!res->eof) { + MYSQL *mysql = res->handle; + if (mysql->status != MYSQL_STATUS_USE_RESULT) { + set_mysql_error(mysql, + res->unbuffered_fetch_cancelled + ? CR_FETCH_CANCELED + : CR_COMMANDS_OUT_OF_SYNC, + unknown_sqlstate); + } else if (!(read_one_row(mysql, res->field_count, res->row, + res->lengths))) { + res->row_count++; + DBUG_RETURN(res->current_row = res->row); + } + DBUG_PRINT("info", ("end of data")); + res->eof = 1; + mysql->status = MYSQL_STATUS_READY; + /* + Reset only if owner points to us: there is a chance that somebody + started new query after mysql_stmt_close(): + */ + if (mysql->unbuffered_fetch_owner == &res->unbuffered_fetch_cancelled) + mysql->unbuffered_fetch_owner = 0; + /* Don't clear handle in mysql_free_result */ + res->handle = 0; + } + DBUG_RETURN((MYSQL_ROW)NULL); + } + { + MYSQL_ROW tmp; + if (!res->data_cursor) { + DBUG_PRINT("info", ("end of data")); + DBUG_RETURN(res->current_row = (MYSQL_ROW)NULL); + } + tmp = res->data_cursor->data; + res->data_cursor = res->data_cursor->next; + DBUG_RETURN(res->current_row = tmp); + } +} +/** + Reads next row of a result set in an asynchronous way. + + @param[in] res buffer in which all rows are stored + @param[out] row return pointer to one row from result set + + @retval NET_ASYNC_NOT_READY fetch operation not complete, retry again + @retval NET_ASYNC_COMPLETE fetch operation complete +*/ +net_async_status STDCALL mysql_fetch_row_nonblocking(MYSQL_RES *res, + MYSQL_ROW *row) { + DBUG_ENTER(__func__); + MYSQL *mysql = res->handle; + *row = nullptr; + + if (!res->data) { /* Unbufferred fetch */ + if (!res->eof) { + if (mysql->status == MYSQL_STATUS_USE_RESULT) { + int ret; + if (read_one_row_nonblocking(mysql, res->field_count, res->row, + res->lengths, + &ret) == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + + if (!ret) { + *row = res->current_row = res->row; + goto end; + } + } + + set_mysql_error(mysql, + res->unbuffered_fetch_cancelled ? CR_FETCH_CANCELED + : CR_COMMANDS_OUT_OF_SYNC, + unknown_sqlstate); + DBUG_PRINT("info", ("end of data")); + res->eof = 1; + mysql->status = MYSQL_STATUS_READY; + /* + Reset only if owner points to us: there is a chance that + somebody started new query after mysql_stmt_close(): + */ + if (mysql->unbuffered_fetch_owner == &res->unbuffered_fetch_cancelled) + mysql->unbuffered_fetch_owner = 0; + /* Don't clear handle in mysql_free_result */ + res->handle = 0; + } + + *row = nullptr; + goto end; + } + { + MYSQL_ROW tmp; + if (!res->data_cursor) { + DBUG_PRINT("info", ("end of data")); + *row = nullptr; + goto end; + } + tmp = res->data_cursor->data; + res->data_cursor = res->data_cursor->next; + *row = res->current_row = tmp; + goto end; + } + +end: + DBUG_RETURN(NET_ASYNC_COMPLETE); +} + +/************************************************************************** + Get column lengths of the current row + If one uses mysql_use_result, res->lengths contains the length information, + else the lengths are calculated from the offset between pointers. +**************************************************************************/ + +ulong *STDCALL mysql_fetch_lengths(MYSQL_RES *res) { + MYSQL_ROW column; + + if (!(column = res->current_row)) return 0; /* Something is wrong */ + if (res->data) + (*res->methods->fetch_lengths)(res->lengths, column, res->field_count); + return res->lengths; +} + +int STDCALL mysql_options(MYSQL *mysql, enum mysql_option option, + const void *arg) { + DBUG_ENTER("mysql_option"); + DBUG_PRINT("enter", ("option: %d", (int)option)); + switch (option) { + case MYSQL_OPT_CONNECT_TIMEOUT: + mysql->options.connect_timeout = *static_cast<const uint *>(arg); + break; + case MYSQL_OPT_READ_TIMEOUT: + mysql->options.read_timeout = *static_cast<const uint *>(arg); + break; + case MYSQL_OPT_WRITE_TIMEOUT: + mysql->options.write_timeout = *static_cast<const uint *>(arg); + break; + case MYSQL_OPT_COMPRESS: + mysql->options.compress = 1; /* Remember for connect */ + mysql->options.client_flag |= CLIENT_COMPRESS; + break; + case MYSQL_OPT_NAMED_PIPE: /* This option is depricated */ + mysql->options.protocol = MYSQL_PROTOCOL_PIPE; /* Force named pipe */ + break; + case MYSQL_OPT_LOCAL_INFILE: /* Allow LOAD DATA LOCAL ?*/ + if (!arg || (*static_cast<const uint *>(arg) != 0)) + mysql->options.client_flag |= CLIENT_LOCAL_FILES; + else + mysql->options.client_flag &= ~CLIENT_LOCAL_FILES; + break; + case MYSQL_INIT_COMMAND: + add_init_command(&mysql->options, static_cast<const char *>(arg)); + break; + case MYSQL_READ_DEFAULT_FILE: + my_free(mysql->options.my_cnf_file); + mysql->options.my_cnf_file = + my_strdup(key_memory_mysql_options, static_cast<const char *>(arg), + MYF(MY_WME)); + break; + case MYSQL_READ_DEFAULT_GROUP: + my_free(mysql->options.my_cnf_group); + mysql->options.my_cnf_group = + my_strdup(key_memory_mysql_options, static_cast<const char *>(arg), + MYF(MY_WME)); + break; + case MYSQL_SET_CHARSET_DIR: + my_free(mysql->options.charset_dir); + mysql->options.charset_dir = + my_strdup(key_memory_mysql_options, static_cast<const char *>(arg), + MYF(MY_WME)); + break; + case MYSQL_SET_CHARSET_NAME: + my_free(mysql->options.charset_name); + mysql->options.charset_name = + my_strdup(key_memory_mysql_options, static_cast<const char *>(arg), + MYF(MY_WME)); + break; + case MYSQL_OPT_PROTOCOL: + mysql->options.protocol = *static_cast<const uint *>(arg); + break; + case MYSQL_SHARED_MEMORY_BASE_NAME: +#if defined(_WIN32) + if (mysql->options.shared_memory_base_name != def_shared_memory_base_name) + my_free(mysql->options.shared_memory_base_name); + mysql->options.shared_memory_base_name = + my_strdup(key_memory_mysql_options, static_cast<const char *>(arg), + MYF(MY_WME)); +#endif + break; + case MYSQL_REPORT_DATA_TRUNCATION: + mysql->options.report_data_truncation = *static_cast<const bool *>(arg); + break; + case MYSQL_OPT_RECONNECT: + mysql->reconnect = *static_cast<const bool *>(arg); + break; + case MYSQL_OPT_BIND: + my_free(mysql->options.bind_address); + mysql->options.bind_address = + my_strdup(key_memory_mysql_options, static_cast<const char *>(arg), + MYF(MY_WME)); + break; + case MYSQL_PLUGIN_DIR: + EXTENSION_SET_STRING(&mysql->options, plugin_dir, + static_cast<const char *>(arg)); + break; + case MYSQL_DEFAULT_AUTH: + EXTENSION_SET_STRING(&mysql->options, default_auth, + static_cast<const char *>(arg)); + break; + case MYSQL_OPT_SSL_KEY: + if (mysql->options.ssl_key) my_free(mysql->options.ssl_key); + mysql->options.ssl_key = + set_ssl_option_unpack_path(static_cast<const char *>(arg)); + break; + case MYSQL_OPT_SSL_CERT: + if (mysql->options.ssl_cert) my_free(mysql->options.ssl_cert); + mysql->options.ssl_cert = + set_ssl_option_unpack_path(static_cast<const char *>(arg)); + break; + case MYSQL_OPT_SSL_CA: + if (mysql->options.ssl_ca) my_free(mysql->options.ssl_ca); + mysql->options.ssl_ca = + set_ssl_option_unpack_path(static_cast<const char *>(arg)); + break; + case MYSQL_OPT_SSL_CAPATH: + if (mysql->options.ssl_capath) my_free(mysql->options.ssl_capath); + mysql->options.ssl_capath = + set_ssl_option_unpack_path(static_cast<const char *>(arg)); + break; + case MYSQL_OPT_SSL_CIPHER: + SET_OPTION(ssl_cipher, static_cast<const char *>(arg)); + break; + case MYSQL_OPT_TLS_CIPHERSUITES: + EXTENSION_SET_STRING(&mysql->options, tls_ciphersuites, + static_cast<const char *>(arg)); + break; + case MYSQL_OPT_SSL_CRL: + if (mysql->options.extension) + my_free(mysql->options.extension->ssl_crl); + else + ALLOCATE_EXTENSIONS(&mysql->options); + mysql->options.extension->ssl_crl = + set_ssl_option_unpack_path(static_cast<const char *>(arg)); + break; + case MYSQL_OPT_SSL_CRLPATH: + if (mysql->options.extension) + my_free(mysql->options.extension->ssl_crlpath); + else + ALLOCATE_EXTENSIONS(&mysql->options); + mysql->options.extension->ssl_crlpath = + set_ssl_option_unpack_path(static_cast<const char *>(arg)); + break; + case MYSQL_OPT_TLS_VERSION: +#if defined(HAVE_OPENSSL) + EXTENSION_SET_STRING(&mysql->options, tls_version, + static_cast<const char *>(arg)); + if ((mysql->options.extension->ssl_ctx_flags = process_tls_version( + mysql->options.extension->tls_version)) == -1) + DBUG_RETURN(1); +#endif + break; + case MYSQL_OPT_SSL_FIPS_MODE: { +#if defined(HAVE_OPENSSL) && !defined(HAVE_WOLFSSL) + char ssl_err_string[OPENSSL_ERROR_LENGTH] = {'\0'}; + ENSURE_EXTENSIONS_PRESENT(&mysql->options); + mysql->options.extension->ssl_fips_mode = *static_cast<const uint *>(arg); + if (set_fips_mode(mysql->options.extension->ssl_fips_mode, + ssl_err_string) != 1) { + DBUG_PRINT("error", ("fips mode set error %s:", ssl_err_string)); + set_mysql_extended_error( + mysql, CR_SSL_FIPS_MODE_ERR, unknown_sqlstate, + "Set Fips mode ON/STRICT failed, detail: '%s'.", ssl_err_string); + DBUG_RETURN(1); + } +#endif // defined(HAVE_OPENSSL) && !defined(HAVE_WOLFSSL) + } break; + case MYSQL_OPT_SSL_MODE: +#if defined(HAVE_OPENSSL) + ENSURE_EXTENSIONS_PRESENT(&mysql->options); + mysql->options.extension->ssl_mode = *static_cast<const uint *>(arg); + if (mysql->options.extension->ssl_mode == SSL_MODE_VERIFY_IDENTITY) + mysql->options.client_flag |= CLIENT_SSL_VERIFY_SERVER_CERT; + else + mysql->options.client_flag &= ~CLIENT_SSL_VERIFY_SERVER_CERT; +#endif + break; + case MYSQL_SERVER_PUBLIC_KEY: + EXTENSION_SET_STRING(&mysql->options, server_public_key_path, + static_cast<const char *>(arg)); + break; + + case MYSQL_OPT_GET_SERVER_PUBLIC_KEY: + ENSURE_EXTENSIONS_PRESENT(&mysql->options); + mysql->options.extension->get_server_public_key = + *static_cast<const bool *>(arg); + break; + + case MYSQL_OPT_CONNECT_ATTR_RESET: + ENSURE_EXTENSIONS_PRESENT(&mysql->options); + if (mysql->options.extension->connection_attributes) { + delete mysql->options.extension->connection_attributes; + mysql->options.extension->connection_attributes = NULL; + mysql->options.extension->connection_attributes_length = 0; + } + break; + case MYSQL_OPT_CONNECT_ATTR_DELETE: + ENSURE_EXTENSIONS_PRESENT(&mysql->options); + if (mysql->options.extension->connection_attributes) { + string key = arg ? pointer_cast<const char *>(arg) : ""; + + if (!key.empty()) { + auto it = + mysql->options.extension->connection_attributes->hash.find(key); + if (it != + mysql->options.extension->connection_attributes->hash.end()) { + const string &key = it->first; + const string &value = it->second; + mysql->options.extension->connection_attributes_length -= + get_length_store_length(key.size()) + key.size() + + get_length_store_length(value.size()) + value.size(); + + mysql->options.extension->connection_attributes->hash.erase(it); + } + } + } + break; + case MYSQL_ENABLE_CLEARTEXT_PLUGIN: + ENSURE_EXTENSIONS_PRESENT(&mysql->options); + mysql->options.extension->enable_cleartext_plugin = + *static_cast<const bool *>(arg); + break; + case MYSQL_OPT_RETRY_COUNT: + ENSURE_EXTENSIONS_PRESENT(&mysql->options); + mysql->options.extension->retry_count = *static_cast<const uint *>(arg); + break; + case MYSQL_OPT_CAN_HANDLE_EXPIRED_PASSWORDS: + if (*static_cast<const bool *>(arg)) + mysql->options.client_flag |= CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS; + else + mysql->options.client_flag &= ~CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS; + break; + + case MYSQL_OPT_MAX_ALLOWED_PACKET: + if (mysql) + mysql->options.max_allowed_packet = *static_cast<const ulong *>(arg); + else + g_max_allowed_packet = *static_cast<const ulong *>(arg); + break; + + case MYSQL_OPT_NET_BUFFER_LENGTH: + g_net_buffer_length = *static_cast<const ulong *>(arg); + break; + + case MYSQL_OPT_OPTIONAL_RESULTSET_METADATA: + if (*static_cast<const bool *>(arg)) + mysql->options.client_flag |= CLIENT_OPTIONAL_RESULTSET_METADATA; + else + mysql->options.client_flag &= ~CLIENT_OPTIONAL_RESULTSET_METADATA; + break; + + default: + DBUG_RETURN(1); + } + DBUG_RETURN(0); +} + +/** + Return the current values for the options settable through mysql_options() + + Returns the current values for all of the connection options. + Callers should not manipulate the returned data ! + Data are valid at the time of returning them until the next C API CALL + arg should always be a pointer to a variable of the appropriate type. + type of variable, based on the parameter: + + uint + MYSQL_OPT_CONNECT_TIMEOUT, MYSQL_OPT_READ_TIMEOUT, MYSQL_OPT_WRITE_TIMEOUT, + MYSQL_OPT_PROTOCOL, MYSQL_OPT_SSL_MODE, MYSQL_OPT_RETRY_COUNT + + bool + MYSQL_OPT_COMPRESS, MYSQL_OPT_LOCAL_INFILE, + MYSQL_REPORT_DATA_TRUNCATION, MYSQL_OPT_RECONNECT, + MYSQL_ENABLE_CLEARTEXT_PLUGIN, MYSQL_OPT_CAN_HANDLE_EXPIRED_PASSWORDS, + MYSQL_OPT_OPTIONAL_RESULTSET_METADATA + + const char * + MYSQL_READ_DEFAULT_FILE, MYSQL_READ_DEFAULT_GROUP, + MYSQL_SET_CHARSET_DIR, MYSQL_SET_CHARSET_NAME, + MYSQL_SHARED_MEMORY_BASE_NAME, MYSQL_SET_CLIENT_IP, MYSQL_OPT_BIND, + MYSQL_PLUGIN_DIR, MYSQL_DEFAULT_AUTH, MYSQL_OPT_SSL_KEY, MYSQL_OPT_SSL_CERT, + MYSQL_OPT_SSL_CA, MYSQL_OPT_SSL_CAPATH, MYSQL_OPT_SSL_CIPHER, + MYSQL_OPT_TLS_CIPHERSUITES, MYSQL_OPT_SSL_CRL, MYSQL_OPT_SSL_CRLPATH, + MYSQL_OPT_TLS_VERSION, MYSQL_SERVER_PUBLIC_KEY, MYSQL_OPT_SSL_FIPS_MODE + + <none, error returned> + MYSQL_OPT_NAMED_PIPE, MYSQL_OPT_CONNECT_ATTR_RESET, + MYSQL_OPT_CONNECT_ATTR_DELETE, MYSQL_INIT_COMMAND + + @param mysql The MYSQL connection to operate on + @param option The option to return the value for + @param [out] arg Must be non-null. Receives the current value. + @return status + @retval 0 SUCCESS +*/ + +int STDCALL mysql_get_option(MYSQL *mysql, enum mysql_option option, + const void *arg) { + DBUG_ENTER("mysql_option"); + DBUG_PRINT("enter", ("option: %d", (int)option)); + + if (!arg) DBUG_RETURN(1); + + switch (option) { + case MYSQL_OPT_CONNECT_TIMEOUT: + *(const_cast<uint *>(static_cast<const uint *>(arg))) = + mysql->options.connect_timeout; + break; + case MYSQL_OPT_READ_TIMEOUT: + *(const_cast<uint *>(static_cast<const uint *>(arg))) = + mysql->options.read_timeout; + break; + case MYSQL_OPT_WRITE_TIMEOUT: + *(const_cast<uint *>(static_cast<const uint *>(arg))) = + mysql->options.write_timeout; + break; + case MYSQL_OPT_COMPRESS: + *(const_cast<bool *>(static_cast<const bool *>(arg))) = + mysql->options.compress; + break; + case MYSQL_OPT_LOCAL_INFILE: /* Allow LOAD DATA LOCAL ?*/ + *(const_cast<uint *>(static_cast<const uint *>(arg))) = + (mysql->options.client_flag & CLIENT_LOCAL_FILES) != 0; + break; + case MYSQL_READ_DEFAULT_FILE: + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.my_cnf_file; + break; + case MYSQL_READ_DEFAULT_GROUP: + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.my_cnf_group; + break; + case MYSQL_SET_CHARSET_DIR: + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.charset_dir; + break; + case MYSQL_SET_CHARSET_NAME: + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.charset_name; + break; + case MYSQL_OPT_PROTOCOL: + *(const_cast<uint *>(static_cast<const uint *>(arg))) = + mysql->options.protocol; + break; + case MYSQL_SHARED_MEMORY_BASE_NAME: +#if defined(_WIN32) + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.shared_memory_base_name; +#else + *(static_cast<char **>(const_cast<void *>(arg))) = const_cast<char *>(""); +#endif + break; + case MYSQL_REPORT_DATA_TRUNCATION: + *(const_cast<bool *>(static_cast<const bool *>(arg))) = + mysql->options.report_data_truncation; + break; + case MYSQL_OPT_RECONNECT: + *(const_cast<bool *>(static_cast<const bool *>(arg))) = mysql->reconnect; + break; + case MYSQL_OPT_BIND: + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.bind_address; + break; + case MYSQL_OPT_SSL_MODE: + *(const_cast<uint *>(static_cast<const uint *>(arg))) = + mysql->options.extension ? mysql->options.extension->ssl_mode : 0; + break; + case MYSQL_OPT_SSL_FIPS_MODE: + *(const_cast<uint *>(static_cast<const uint *>(arg))) = + mysql->options.extension ? mysql->options.extension->ssl_fips_mode + : 0; + break; + case MYSQL_PLUGIN_DIR: + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.extension ? mysql->options.extension->plugin_dir + : nullptr; + break; + case MYSQL_DEFAULT_AUTH: + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.extension ? mysql->options.extension->default_auth + : nullptr; + break; + case MYSQL_OPT_SSL_KEY: + *(static_cast<char **>(const_cast<void *>(arg))) = mysql->options.ssl_key; + break; + case MYSQL_OPT_SSL_CERT: + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.ssl_cert; + break; + case MYSQL_OPT_SSL_CA: + *(static_cast<char **>(const_cast<void *>(arg))) = mysql->options.ssl_ca; + break; + case MYSQL_OPT_SSL_CAPATH: + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.ssl_capath; + break; + case MYSQL_OPT_SSL_CIPHER: + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.ssl_cipher; + break; + case MYSQL_OPT_TLS_CIPHERSUITES: + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.extension ? mysql->options.extension->tls_ciphersuites + : nullptr; + break; + case MYSQL_OPT_RETRY_COUNT: + *(const_cast<uint *>(static_cast<const uint *>(arg))) = + mysql->options.extension ? mysql->options.extension->retry_count : 1; + break; + case MYSQL_OPT_TLS_VERSION: + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.extension ? mysql->options.extension->tls_version + : nullptr; + break; + case MYSQL_OPT_SSL_CRL: + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.extension ? mysql->options.extension->ssl_crl + : nullptr; + break; + case MYSQL_OPT_SSL_CRLPATH: + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.extension ? mysql->options.extension->ssl_crlpath + : nullptr; + break; + case MYSQL_SERVER_PUBLIC_KEY: + *(static_cast<char **>(const_cast<void *>(arg))) = + mysql->options.extension + ? mysql->options.extension->server_public_key_path + : nullptr; + break; + case MYSQL_OPT_GET_SERVER_PUBLIC_KEY: + *(const_cast<bool *>(static_cast<const bool *>(arg))) = + mysql->options.extension && + mysql->options.extension->get_server_public_key; + break; + case MYSQL_ENABLE_CLEARTEXT_PLUGIN: + *(const_cast<bool *>(static_cast<const bool *>(arg))) = + mysql->options.extension && + mysql->options.extension->enable_cleartext_plugin; + break; + case MYSQL_OPT_CAN_HANDLE_EXPIRED_PASSWORDS: + *(const_cast<bool *>(static_cast<const bool *>(arg))) = + (mysql->options.client_flag & CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS) != + 0; + break; + + case MYSQL_OPT_MAX_ALLOWED_PACKET: + if (mysql) + *(const_cast<ulong *>(static_cast<const ulong *>(arg))) = + mysql->options.max_allowed_packet; + else + *(const_cast<ulong *>(static_cast<const ulong *>(arg))) = + g_max_allowed_packet; + break; + + case MYSQL_OPT_NET_BUFFER_LENGTH: + *(const_cast<ulong *>(static_cast<const ulong *>(arg))) = + g_net_buffer_length; + break; + + case MYSQL_OPT_OPTIONAL_RESULTSET_METADATA: + *(const_cast<bool *>(static_cast<const bool *>(arg))) = + (mysql->options.client_flag & CLIENT_OPTIONAL_RESULTSET_METADATA) != + 0; + break; + + case MYSQL_OPT_NAMED_PIPE: /* This option is deprecated */ + case MYSQL_INIT_COMMAND: /* Cumulative */ + case MYSQL_OPT_CONNECT_ATTR_RESET: /* Cumulative */ + case MYSQL_OPT_CONNECT_ATTR_DELETE: /* Cumulative */ + default: + DBUG_RETURN(1); + } + DBUG_RETURN(0); +} + +int STDCALL mysql_options4(MYSQL *mysql, enum mysql_option option, + const void *arg1, const void *arg2) { + DBUG_ENTER("mysql_option"); + DBUG_PRINT("enter", ("option: %d", (int)option)); + + switch (option) { + case MYSQL_OPT_CONNECT_ATTR_ADD: { + const char *key = static_cast<const char *>(arg1); + const char *value = static_cast<const char *>(arg2); + size_t key_len = arg1 ? strlen(key) : 0; + size_t value_len = arg2 ? strlen(value) : 0; + size_t attr_storage_length = key_len + value_len; + + /* we can't have a zero length key */ + if (!key_len) { + set_mysql_error(mysql, CR_INVALID_PARAMETER_NO, unknown_sqlstate); + DBUG_RETURN(1); + } + + /* calculate the total storage length of the attribute */ + attr_storage_length += get_length_store_length(key_len); + attr_storage_length += get_length_store_length(value_len); + + ENSURE_EXTENSIONS_PRESENT(&mysql->options); + + /* + Throw and error if the maximum combined length of the attribute value + will be greater than the maximum that we can safely transmit. + */ + if (attr_storage_length + + mysql->options.extension->connection_attributes_length > + MAX_CONNECTION_ATTR_STORAGE_LENGTH) { + set_mysql_error(mysql, CR_INVALID_PARAMETER_NO, unknown_sqlstate); + DBUG_RETURN(1); + } + + if (!mysql->options.extension->connection_attributes) { + mysql->options.extension->connection_attributes = + new (std::nothrow) My_hash(); + if (!mysql->options.extension->connection_attributes) { + set_mysql_error(mysql, CR_OUT_OF_MEMORY, unknown_sqlstate); + DBUG_RETURN(1); + } + } + if (!mysql->options.extension->connection_attributes->hash + .emplace(key, value) + .second) { + /* can't insert the value */ + set_mysql_error(mysql, CR_DUPLICATE_CONNECTION_ATTR, unknown_sqlstate); + DBUG_RETURN(1); + } + + mysql->options.extension->connection_attributes_length += + attr_storage_length; + + break; + } + + default: + DBUG_RETURN(1); + } + DBUG_RETURN(0); +} + +/**************************************************************************** + Functions to get information from the MySQL structure + These are functions to make shared libraries more usable. +****************************************************************************/ + +/* MYSQL_RES */ +my_ulonglong STDCALL mysql_num_rows(MYSQL_RES *res) { return res->row_count; } + +unsigned int STDCALL mysql_num_fields(MYSQL_RES *res) { + return res->field_count; +} + +uint STDCALL mysql_errno(MYSQL *mysql) { + return mysql ? mysql->net.last_errno : mysql_server_last_errno; +} + +const char *STDCALL mysql_error(MYSQL *mysql) { + return mysql ? mysql->net.last_error : mysql_server_last_error; +} + +/** + Read data and its length from a LIST node. + + Assumes LIST which stores data blobs in LEX_STRING structures, + where LEX_STRING::str is pointer to the data and LEX_STRING::length + is the length of this data. + + If node is NULL then data and length are set to NULL and 0, respectively, + and function returns 0, otherwise, if data has been read from the node, + function returns 1. +*/ + +static int get_data_and_length(LIST *node, const char **data, size_t *length) { + DBUG_ASSERT(!node || node->data); + if (data) *data = node ? ((LEX_STRING *)(node->data))->str : NULL; + if (length) *length = node ? ((LEX_STRING *)(node->data))->length : 0; + + return node ? 0 : 1; +} + +/** + Get the first state change information received from the server. + + @param [in] mysql mysql handle + @param [in] type state change type + @param [out] data buffer to store the data + @param [out] length length of the data + + @return + 0 - Valid data stored + 1 - No data +*/ + +int STDCALL mysql_session_track_get_first(MYSQL *mysql, + enum enum_session_state_type type, + const char **data, size_t *length) { + STATE_INFO *info = STATE_DATA(mysql); + + if (!info || !IS_SESSION_STATE_TYPE(type) || + !(info->info_list[type].head_node)) + return get_data_and_length(NULL, data, length); + + info->info_list[type].current_node = info->info_list[type].head_node; + + return mysql_session_track_get_next(mysql, type, data, length); +} + +/** + Get the subsequent state change information received from the server. + + @param [in] mysql mysql handle + @param [in] type state change type + @param [out] data buffer to store the data + @param [out] length length of the data + + @return + 0 - Valid data stored + 1 - No data +*/ + +int STDCALL mysql_session_track_get_next(MYSQL *mysql, + enum enum_session_state_type type, + const char **data, size_t *length) { + STATE_INFO *info = STATE_DATA(mysql); + int ret; + + if (!info || !IS_SESSION_STATE_TYPE(type) || + !(info->info_list[type].current_node)) + return get_data_and_length(NULL, data, length); + + ret = get_data_and_length(info->info_list[type].current_node, data, length); + + info->info_list[type].current_node = + list_rest(info->info_list[type].current_node); + + return ret; +} + +/* + Get version number for server in a form easy to test on + + SYNOPSIS + mysql_get_server_version() + mysql Connection + + EXAMPLE + 4.1.0-alfa -> 40100 + + NOTES + We will ensure that a newer server always has a bigger number. + + RETURN + Signed number > 323000 + Zero if there is no connection +*/ + +ulong STDCALL mysql_get_server_version(MYSQL *mysql) { + ulong major = 0, minor = 0, version = 0; + + if (mysql->server_version) { + char *pos = mysql->server_version, *end_pos; + major = strtoul(pos, &end_pos, 10); + pos = end_pos + 1; + minor = strtoul(pos, &end_pos, 10); + pos = end_pos + 1; + version = strtoul(pos, &end_pos, 10); + } else { + set_mysql_error(mysql, CR_COMMANDS_OUT_OF_SYNC, unknown_sqlstate); + } + + return major * 10000 + minor * 100 + version; +} + +/* + mysql_set_character_set function sends SET NAMES cs_name to + the server (which changes character_set_client, character_set_result + and character_set_connection) and updates mysql->charset so other + functions like mysql_real_escape will work correctly. +*/ +int STDCALL mysql_set_character_set(MYSQL *mysql, const char *cs_name) { + CHARSET_INFO *cs; + const char *save_csdir = charsets_dir; + + if (mysql->options.charset_dir) { +#ifdef MYSQL_SERVER + // Do not change charsets_dir, it is not thread safe. + DBUG_ASSERT(false); +#else + charsets_dir = mysql->options.charset_dir; +#endif + } + if (!mysql->net.vio) { + /* Initialize with automatic OS character set detection. */ + mysql_options(mysql, MYSQL_SET_CHARSET_NAME, cs_name); + mysql_init_character_set(mysql); + /* + In case of automatic OS character set detection + mysql_init_character_set changes mysql->options.charset_name + from "auto" to the real character set name. + Reset cs_name to the detected character set name, accordingly. + */ + cs_name = mysql->options.charset_name; + } + + if (strlen(cs_name) < MY_CS_NAME_SIZE && + (cs = get_charset_by_csname(cs_name, MY_CS_PRIMARY, MYF(0)))) { + char buff[MY_CS_NAME_SIZE + 10]; + charsets_dir = save_csdir; + if (!mysql->net.vio) { + /* If there is no connection yet we don't send "SET NAMES" query */ + mysql->charset = cs; + return 0; + } + /* Skip execution of "SET NAMES" for pre-4.1 servers */ + if (mysql_get_server_version(mysql) < 40100) return 0; + sprintf(buff, "SET NAMES %s", cs_name); + if (!mysql_real_query(mysql, buff, (ulong)strlen(buff))) { + mysql->charset = cs; + } + } else { + char cs_dir_name[FN_REFLEN]; + get_charsets_dir(cs_dir_name); + set_mysql_extended_error(mysql, CR_CANT_READ_CHARSET, unknown_sqlstate, + ER_CLIENT(CR_CANT_READ_CHARSET), cs_name, + cs_dir_name); + } + charsets_dir = save_csdir; + return mysql->net.last_errno; +} + +/** + Client authentication plugin that does native MySQL authentication + using a 20-byte (4.1+) scramble + + @param vio the channel to operate on + @param mysql the MYSQL structure to operate on + + @retval -1 ::CR_OK : Success + @retval 1 ::CR_ERROR : error reading + @retval 2012 ::CR_SERVER_HANDSHAKE_ERR : malformed handshake data +*/ +static int native_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql) { + int pkt_len; + uchar *pkt; + + DBUG_ENTER("native_password_auth_client"); + + /* read the scramble */ + if ((pkt_len = vio->read_packet(vio, &pkt)) < 0) DBUG_RETURN(CR_ERROR); + + if (pkt_len != SCRAMBLE_LENGTH + 1) DBUG_RETURN(CR_SERVER_HANDSHAKE_ERR); + + /* save it in MYSQL */ + memcpy(mysql->scramble, pkt, SCRAMBLE_LENGTH); + mysql->scramble[SCRAMBLE_LENGTH] = 0; + + if (mysql->passwd[0]) { + char scrambled[SCRAMBLE_LENGTH + 1]; + DBUG_PRINT("info", ("sending scramble")); + scramble(scrambled, (char *)pkt, mysql->passwd); + if (vio->write_packet(vio, (uchar *)scrambled, SCRAMBLE_LENGTH)) + DBUG_RETURN(CR_ERROR); + } else { + DBUG_PRINT("info", ("no password")); + if (vio->write_packet(vio, 0, 0)) /* no password */ + DBUG_RETURN(CR_ERROR); + } + + DBUG_RETURN(CR_OK); +} + +/** + Client authentication plugin that does native MySQL authentication + in a nonblocking way. + + @param[in] vio the channel to operate on + @param[in] mysql the MYSQL structure to operate on + @param[out] result CR_OK : Success, CR_ERROR : error reading, + CR_SERVER_HANDSHAKE_ERR : malformed handshake data + + @retval NET_ASYNC_NOT_READY authentication not yet complete + @retval NET_ASYNC_COMPLETE authentication done +*/ +static net_async_status native_password_auth_client_nonblocking( + MYSQL_PLUGIN_VIO *vio, MYSQL *mysql, int *result) { + DBUG_ENTER(__func__); + int io_result; + uchar *pkt; + mysql_async_auth *ctx = ASYNC_DATA(mysql)->connect_context->auth_context; + + switch (static_cast<client_auth_native_password_plugin_status>( + ctx->client_auth_plugin_state)) { + case client_auth_native_password_plugin_status::NATIVE_READING_PASSWORD: + if (((MCPVIO_EXT *)vio)->mysql_change_user) { + /* mysql_change_user_nonblocking not implemented yet. */ + DBUG_ASSERT(false); + } else { + /* read the scramble */ + net_async_status status = + vio->read_packet_nonblocking(vio, &pkt, &io_result); + if (status == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + + if (io_result < 0) { + *result = CR_ERROR; + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + + if (io_result != SCRAMBLE_LENGTH + 1) { + *result = CR_SERVER_HANDSHAKE_ERR; + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + + /* save it in MYSQL */ + memcpy(mysql->scramble, pkt, SCRAMBLE_LENGTH); + mysql->scramble[SCRAMBLE_LENGTH] = 0; + } + ctx->client_auth_plugin_state = (int) + client_auth_native_password_plugin_status::NATIVE_WRITING_RESPONSE; + + /* fallthrough */ + + case client_auth_native_password_plugin_status::NATIVE_WRITING_RESPONSE: + if (mysql->passwd[0]) { + char scrambled[SCRAMBLE_LENGTH + 1]; + DBUG_PRINT("info", ("sending scramble")); + scramble(scrambled, (char *)pkt, mysql->passwd); + net_async_status status = vio->write_packet_nonblocking( + vio, (uchar *)scrambled, SCRAMBLE_LENGTH, &io_result); + if (status == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + + if (io_result < 0) { + *result = CR_ERROR; + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + } else { + DBUG_PRINT("info", ("no password")); + net_async_status status = vio->write_packet_nonblocking( + vio, 0, 0, &io_result); /* no password */ + + if (status == NET_ASYNC_NOT_READY) { + DBUG_RETURN(NET_ASYNC_NOT_READY); + } + + if (io_result < 0) { + *result = CR_ERROR; + DBUG_RETURN(NET_ASYNC_COMPLETE); + } + } + break; + default: + assert(0); + } + + *result = CR_OK; + DBUG_RETURN(NET_ASYNC_COMPLETE); +} +/* clang-format off */ +/** + @page page_protocol_connection_phase_authentication_methods_clear_text_password Clear text client plugin + + <ul> + <li> + This client side plugin is used by a number of server plugins: + LDAP (*authentication_ldap_simple*) and PAM (*authentication_pam*) to name a few. + </li> + <li> + The client name is *mysql_clear_password* + </li> + <li> + Client side requires nothing from the server. But the server generates + and sends a 20-byte + @ref page_protocol_connection_phase_authentication_methods_native_password_authentication + compatible scramble. + </li> + <li> + Client side sends the password in clear text to the server + </li> + </ul> + + @startuml + Server->Client: 20 bytes of scramble to be ignored + Client->Server: The clear text password. null terminated. + @enduml + + @note + Sending the scramble is not necessary for the clear text + method, but, since the server always initiates the exchange by + sending @ref page_protocol_connection_phase_packets_protocol_handshake + and that one has a placeholder for authentication plugin dependent data the + server does fill that space with a scramble should it come to pass that + it will back down to + @ref page_protocol_connection_phase_authentication_methods_native_password_authentication. + This is also why it's OK no to specifically read this in + @ref clear_password_auth_client since it's already read as a part of + the initial exchange. + + + @sa ::clear_password_auth_client, ::server_mpvio_write_packet, + ::send_server_handshake_packet +*/ +/* clang-format on */ + +/** + The main function of the mysql_clear_password authentication plugin. +*/ + +static int clear_password_auth_client(MYSQL_PLUGIN_VIO *vio, MYSQL *mysql) { + int res; + + /* send password in clear text */ + res = vio->write_packet(vio, (const unsigned char *)mysql->passwd, + (int)strlen(mysql->passwd) + 1); + + return res ? CR_ERROR : CR_OK; +} |