19
23
Low level functions for storing data to be send to the MySQL client.
20
24
The actual communction is handled by the net_xxx functions in net_serv.cc
22
27
#include <drizzled/server_includes.h>
23
28
#include <drizzled/error.h>
24
29
#include <drizzled/sql_state.h>
25
#include <libdrizzle/pack.h>
26
30
#include <drizzled/protocol.h>
27
31
#include <drizzled/session.h>
32
#include <drizzled/data_home.h>
35
#include "oldlibdrizzle.h"
38
Function called by drizzleclient_net_init() to set some check variables
29
41
static const unsigned int PACKET_BUFFER_EXTRA_ALLOC= 1024;
30
/* Declared non-static only because of the embedded library. */
31
static void net_send_error_packet(Session *session, uint32_t sql_errno, const char *err);
32
43
static void write_eof_packet(Session *session, NET *net,
33
44
uint32_t server_status, uint32_t total_warn_count);
35
bool Protocol::net_store_data(const unsigned char *from, size_t length)
46
bool ProtocolOldLibdrizzle::isConnected()
51
void ProtocolOldLibdrizzle::setReadTimeout(uint32_t timeout)
53
drizzleclient_net_set_read_timeout(&net, timeout);
56
void ProtocolOldLibdrizzle::setWriteTimeout(uint32_t timeout)
58
drizzleclient_net_set_write_timeout(&net, timeout);
61
void ProtocolOldLibdrizzle::setRetryCount(uint32_t count)
63
net.retry_count=count;
66
void ProtocolOldLibdrizzle::setError(char error)
71
bool ProtocolOldLibdrizzle::haveError(void)
73
return net.error || net.vio == 0;
76
bool ProtocolOldLibdrizzle::wasAborted(void)
78
return net.error && net.vio != 0;
81
bool ProtocolOldLibdrizzle::haveMoreData(void)
83
return drizzleclient_net_more_data(&net);
86
void ProtocolOldLibdrizzle::enableCompression(void)
91
bool ProtocolOldLibdrizzle::isReading(void)
93
return net.reading_or_writing == 1;
96
bool ProtocolOldLibdrizzle::isWriting(void)
98
return net.reading_or_writing == 2;
101
bool ProtocolOldLibdrizzle::netStoreData(const unsigned char *from, size_t length)
37
103
size_t packet_length= packet->length();
39
105
The +9 comes from that strings of length longer than 16M require
40
9 bytes to be stored (see net_store_length).
106
9 bytes to be stored (see drizzleclient_net_store_length).
42
108
if (packet_length+9+length > packet->alloced_length() &&
43
109
packet->realloc(packet_length+9+length))
45
unsigned char *to= net_store_length((unsigned char*) packet->ptr()+packet_length, length);
111
unsigned char *to= drizzleclient_net_store_length((unsigned char*) packet->ptr()+packet_length, length);
46
112
memcpy(to,from,length);
47
113
packet->length((size_t) (to+length-(unsigned char*) packet->ptr()));
55
net_store_data() - extended version with character set conversion.
119
netStoreData() - extended version with character set conversion.
57
121
It is optimized for short strings whose length after
58
122
conversion is garanteed to be less than 251, which accupies
59
123
exactly one byte to store length. It allows not to use
100
164
to+= copy_and_convert(to, conv_length, to_cs,
101
165
(const char*) from, length, from_cs, &dummy_errors);
103
net_store_length((unsigned char*) length_pos, to - length_pos - 1);
104
packet->length((uint) (to - packet->ptr()));
167
drizzleclient_net_store_length((unsigned char*) length_pos, to - length_pos - 1);
168
packet->length((uint32_t) (to - packet->ptr()));
110
Send a error string to client.
113
net_printf_error and net_send_error are low-level functions
114
that shall be used only when a new connection is being
115
established or at server startup.
117
For SIGNAL/RESIGNAL and GET DIAGNOSTICS functionality it's
118
critical that every error that can be intercepted is issued in one
119
place only, my_message_sql.
121
void net_send_error(Session *session, uint32_t sql_errno, const char *err)
124
assert(err && err[0]);
127
It's one case when we can push an error even though there
128
is an OK or EOF already.
130
session->main_da.can_overwrite_status= true;
132
/* Abort multi-result sets */
133
session->server_status&= ~SERVER_MORE_RESULTS_EXISTS;
135
net_send_error_packet(session, sql_errno, err);
137
session->main_da.can_overwrite_status= false;
141
174
Return ok to the client.
143
176
The ok packet has the following structure:
145
178
- 0 : Marker (1 byte)
146
- affected_rows : Stored in 1-9 bytes
147
- id : Stored in 1-9 bytes
148
- server_status : Copy of session->server_status; Can be used by client
179
- affected_rows : Stored in 1-9 bytes
180
- id : Stored in 1-9 bytes
181
- server_status : Copy of session->server_status; Can be used by client
149
182
to check if we are inside an transaction.
150
183
New in 4.0 protocol
151
- warning_count : Stored in 2 bytes; New in 4.1 protocol
152
- message : Stored as packed length (1-9 bytes) + message.
184
- warning_count : Stored in 2 bytes; New in 4.1 protocol
185
- message : Stored as packed length (1-9 bytes) + message.
153
186
Is not stored if no message.
155
@param session Thread handler
156
@param affected_rows Number of rows changed by statement
157
@param id Auto_increment id for first row (if used)
158
@param message Message to send to the client (Used by mysql_status)
188
@param session Thread handler
189
@param affected_rows Number of rows changed by statement
190
@param id Auto_increment id for first row (if used)
191
@param message Message to send to the client (Used by mysql_status)
162
net_send_ok(Session *session,
163
uint32_t server_status, uint32_t total_warn_count,
164
ha_rows affected_rows, uint64_t id, const char *message)
194
void ProtocolOldLibdrizzle::sendOK()
166
NET *net= &session->net;
167
196
unsigned char buff[DRIZZLE_ERRMSG_SIZE+10],*pos;
197
const char *message= NULL;
169
if (! net->vio) // hack for re-parsing queries
200
if (!net.vio) // hack for re-parsing queries
174
buff[0]=0; // No fields
175
pos=net_store_length(buff+1,affected_rows);
176
pos=net_store_length(pos, id);
178
int2store(pos, server_status);
205
buff[0]=0; // No fields
206
if (session->main_da.status() == Diagnostics_area::DA_OK)
208
pos=drizzleclient_net_store_length(buff+1,session->main_da.affected_rows());
209
pos=drizzleclient_net_store_length(pos, session->main_da.last_insert_id());
210
int2store(pos, session->main_da.server_status());
212
tmp= cmin(session->main_da.total_warn_count(), (uint32_t)65535);
213
message= session->main_da.message();
217
pos=drizzleclient_net_store_length(buff+1,0);
218
pos=drizzleclient_net_store_length(pos, 0);
219
int2store(pos, session->server_status);
221
tmp= cmin(session->total_warn_count, (uint32_t)65535);
181
224
/* We can only return up to 65535 warnings in two bytes */
182
uint32_t tmp= cmin(total_warn_count, (uint)65535);
183
225
int2store(pos, tmp);
186
228
session->main_da.can_overwrite_status= true;
188
230
if (message && message[0])
189
pos= net_store_data(pos, (unsigned char*) message, strlen(message));
190
my_net_write(net, buff, (size_t) (pos-buff));
232
size_t length= strlen(message);
233
pos=drizzleclient_net_store_length(pos,length);
234
memcpy(pos,(unsigned char*) message,length);
237
drizzleclient_net_write(&net, buff, (size_t) (pos-buff));
238
drizzleclient_net_flush(&net);
193
240
session->main_da.can_overwrite_status= false;
275
336
/* The first # is to make the protocol backward compatible */
277
pos= (unsigned char*) my_stpcpy((char*) buff+3, drizzle_errno_to_sqlstate(sql_errno));
338
pos= (unsigned char*) strcpy((char*) buff+3, drizzle_errno_to_sqlstate(sql_errno));
339
pos+= strlen(drizzle_errno_to_sqlstate(sql_errno));
279
length= (uint) (strmake((char*) pos, err, DRIZZLE_ERRMSG_SIZE-1) -
341
char *tmp= strncpy((char*)pos, err, DRIZZLE_ERRMSG_SIZE-1);
342
tmp+= strlen((char*)pos);
344
length= (uint32_t)(tmp-(char*)buff);
281
345
err= (char*) buff;
283
net_write_command(net,(unsigned char) 255, (unsigned char*) "", 0, (unsigned char*) err, length);
289
Faster net_store_length when we know that length is less than 65536.
290
We keep a separate version for that range because it's widely used in
293
uint32_t is used as agrument type because of MySQL type conventions:
294
- uint32_t for 0..65536
295
- ulong for 0..4294967296
296
- uint64_t for bigger numbers.
299
static unsigned char *net_store_length_fast(unsigned char *packet, uint32_t length)
303
*packet=(unsigned char) length;
307
int2store(packet,(uint32_t) length);
313
Send the status of the current statement execution over network.
315
@param session in fact, carries two parameters, NET for the transport and
316
Diagnostics_area as the source of status information.
318
In MySQL, there are two types of SQL statements: those that return
319
a result set and those that return status information only.
321
If a statement returns a result set, it consists of 3 parts:
322
- result set meta-data
323
- variable number of result set rows (can be 0)
324
- followed and terminated by EOF or ERROR packet
326
Once the client has seen the meta-data information, it always
327
expects an EOF or ERROR to terminate the result set. If ERROR is
328
received, the result set rows are normally discarded (this is up
329
to the client implementation, libmysql at least does discard them).
330
EOF, on the contrary, means "successfully evaluated the entire
331
result set". Since we don't know how many rows belong to a result
332
set until it's evaluated, EOF/ERROR is the indicator of the end
333
of the row stream. Note, that we can not buffer result set rows
334
on the server -- there may be an arbitrary number of rows. But
335
we do buffer the last packet (EOF/ERROR) in the Diagnostics_area and
336
delay sending it till the very end of execution (here), to be able to
337
change EOF to an ERROR if commit failed or some other error occurred
338
during the last cleanup steps taken after execution.
340
A statement that does not return a result set doesn't send result
341
set meta-data either. Instead it returns one of:
344
Similarly to the EOF/ERROR of the previous statement type, OK/ERROR
345
packet is "buffered" in the diagnostics area and sent to the client
346
in the end of statement.
348
@pre The diagnostics area is assigned or disabled. It can not be empty
349
-- we assume that every SQL statement or COM_* command
350
generates OK, ERROR, or EOF status.
352
@post The status information is encoded to protocol format and sent to the
355
@return We conventionally return void, since the only type of error
356
that can happen here is a NET (transport) error, and that one
357
will become visible when we attempt to read from the NET the
359
Diagnostics_area::is_sent is set for debugging purposes only.
362
void net_end_statement(Session *session)
364
assert(! session->main_da.is_sent);
366
/* Can not be true, but do not take chances in production. */
367
if (session->main_da.is_sent)
370
switch (session->main_da.status()) {
371
case Diagnostics_area::DA_ERROR:
372
/* The query failed, send error to log and abort bootstrap. */
373
net_send_error(session,
374
session->main_da.sql_errno(),
375
session->main_da.message());
377
case Diagnostics_area::DA_EOF:
378
net_send_eof(session,
379
session->main_da.server_status(),
380
session->main_da.total_warn_count());
382
case Diagnostics_area::DA_OK:
384
session->main_da.server_status(),
385
session->main_da.total_warn_count(),
386
session->main_da.affected_rows(),
387
session->main_da.last_insert_id(),
388
session->main_da.message());
390
case Diagnostics_area::DA_DISABLED:
392
case Diagnostics_area::DA_EMPTY:
395
net_send_ok(session, session->server_status, session->total_warn_count,
399
session->main_da.is_sent= true;
403
/****************************************************************************
404
Functions used by the protocol functions (like net_send_ok) to store
405
strings and numbers in the header result packet.
406
****************************************************************************/
408
/* The following will only be used for short strings < 65K */
410
unsigned char *net_store_data(unsigned char *to, const unsigned char *from, size_t length)
412
to=net_store_length_fast(to,length);
413
memcpy(to,from,length);
417
unsigned char *net_store_data(unsigned char *to,int32_t from)
420
uint32_t length=(uint) (int10_to_str(from,buff,10)-buff);
421
to=net_store_length_fast(to,length);
422
memcpy(to,buff,length);
426
unsigned char *net_store_data(unsigned char *to,int64_t from)
429
uint32_t length=(uint) (int64_t10_to_str(from,buff,10)-buff);
430
to=net_store_length_fast(to,length);
431
memcpy(to,buff,length);
436
/*****************************************************************************
437
Default Protocol functions
438
*****************************************************************************/
440
void Protocol::init(Session *session_arg)
347
drizzleclient_net_write_command(&net,(unsigned char) 255, (unsigned char*) "", 0, (unsigned char*) err, length);
349
session->main_da.can_overwrite_status= false;
353
ProtocolOldLibdrizzle::ProtocolOldLibdrizzle()
359
void ProtocolOldLibdrizzle::setSession(Session *session_arg)
361
session= session_arg;
443
362
packet= &session->packet;
444
363
convert= &session->convert_buffer;
448
Finish the result set with EOF packet, as is expected by the client,
449
if there is an error evaluating the next row and a continue handler
453
void Protocol::end_partial_result_set(Session *session)
455
net_send_eof(session, session->server_status, 0 /* no warnings, we're inside SP */);
459
bool Protocol::flush()
461
return net_flush(&session->net);
466
368
Send name and type of result to client.
468
370
Sum fields has table name empty and field_name.
470
@param Session Thread data object
471
@param list List of items to send to client
472
@param flag Bit mask with the following functions:
372
@param Session Thread data object
373
@param list List of items to send to client
374
@param flag Bit mask with the following functions:
473
375
- 1 send number of rows
474
376
- 2 send default values
475
377
- 4 don't write eof packet
480
1 Error (Note that in this case the error is not sent to the
382
1 Error (Note that in this case the error is not sent to the
483
bool Protocol::send_fields(List<Item> *list, uint32_t flags)
385
bool ProtocolOldLibdrizzle::sendFields(List<Item> *list, uint32_t flags)
485
387
List_iterator_fast<Item> it(*list);
487
389
unsigned char buff[80];
488
390
String tmp((char*) buff,sizeof(buff),&my_charset_bin);
489
Protocol_text prot(session);
490
String *local_packet= prot.storage_packet();
491
const CHARSET_INFO * const session_charset= session->variables.character_set_results;
493
392
if (flags & SEND_NUM_ROWS)
494
{ // Packet with number of elements
495
unsigned char *pos= net_store_length(buff, list->elements);
496
(void) my_net_write(&session->net, buff, (size_t) (pos-buff));
393
{ // Packet with number of elements
394
unsigned char *pos= drizzleclient_net_store_length(buff, list->elements);
395
(void) drizzleclient_net_write(&net, buff, (size_t) (pos-buff));
499
398
while ((item=it++))
568
461
to show that there is no cursor.
569
462
Send no warning information, as it will be sent at statement end.
571
write_eof_packet(session, &session->net, session->server_status, session->total_warn_count);
464
write_eof_packet(session, &net, session->server_status, session->total_warn_count);
573
return(prepare_for_send(list));
467
field_count= list->elements;
576
471
my_message(ER_OUT_OF_RESOURCES, ER(ER_OUT_OF_RESOURCES),
577
MYF(0)); /* purecov: inspected */
578
return(1); /* purecov: inspected */
472
MYF(0)); /* purecov: inspected */
473
return 1; /* purecov: inspected */
582
bool Protocol::write()
477
bool ProtocolOldLibdrizzle::write()
584
return(my_net_write(&session->net, (unsigned char*) packet->ptr(),
479
return(drizzleclient_net_write(&net, (unsigned char*) packet->ptr(),
585
480
packet->length()));
590
Send \\0 end terminated string.
592
@param from NULL or \\0 terminated string
595
In most cases one should use store(from, length) instead of this function
603
bool Protocol::store(const char *from, const CHARSET_INFO * const cs)
607
uint32_t length= strlen(from);
608
return store(from, length, cs);
613
Send a set of strings as one long string with ',' in between.
616
bool Protocol::store(I_List<i_string>* str_list)
619
String tmp(buf, sizeof(buf), &my_charset_bin);
621
I_List_iterator<i_string> it(*str_list);
630
if ((len= tmp.length()))
631
len--; // Remove last ','
632
return store((char*) tmp.ptr(), len, tmp.charset());
636
bool Protocol::store(String *str)
638
return store((char*) str->ptr(), str->length(), str->charset());
641
void Protocol::free()
483
void ProtocolOldLibdrizzle::free()
647
/****************************************************************************
648
Functions to handle the simple (default) protocol where everything is
649
This protocol is the one that is used by default between the MySQL server
650
and client when you are not using prepared statements.
652
All data are sent as 'packed-string-length' followed by 'string-data'
653
****************************************************************************/
655
void Protocol_text::prepare_for_resend()
489
void ProtocolOldLibdrizzle::setRandom(uint64_t seed1, uint64_t seed2)
491
drizzleclient_randominit(&rand, seed1, seed2);
494
bool ProtocolOldLibdrizzle::setFileDescriptor(int fd)
496
if (drizzleclient_net_init_sock(&net, fd, 0))
501
int ProtocolOldLibdrizzle::fileDescriptor(void)
503
return drizzleclient_net_get_sd(&net);
506
bool ProtocolOldLibdrizzle::authenticate()
508
bool connection_is_valid;
510
/* Use "connect_timeout" value during connection phase */
511
drizzleclient_net_set_read_timeout(&net, connect_timeout);
512
drizzleclient_net_set_write_timeout(&net, connect_timeout);
514
connection_is_valid= checkConnection();
516
if (connection_is_valid)
520
sendError(session->main_da.sql_errno(), session->main_da.message());
524
/* Connect completed, set read/write timeouts back to default */
525
drizzleclient_net_set_read_timeout(&net,
526
session->variables.net_read_timeout);
527
drizzleclient_net_set_write_timeout(&net,
528
session->variables.net_write_timeout);
532
bool ProtocolOldLibdrizzle::readCommand(char **l_packet, uint32_t *packet_length)
535
This thread will do a blocking read from the client which
536
will be interrupted when the next command is received from
537
the client, the connection is closed or "net_wait_timeout"
538
number of seconds has passed
541
/* We can do this much more efficiently with poll timeouts or watcher thread,
542
disabling for now, which means net_wait_timeout == read_timeout. */
543
drizzleclient_net_set_read_timeout(&net,
544
session->variables.net_wait_timeout);
547
session->clear_error();
548
session->main_da.reset_diagnostics_area();
552
*packet_length= drizzleclient_net_read(&net);
553
if (*packet_length == packet_error)
555
/* Check if we can continue without closing the connection */
557
if(net.last_errno== CR_NET_PACKET_TOO_LARGE)
558
my_error(ER_NET_PACKET_TOO_LARGE, MYF(0));
559
if (session->main_da.status() == Diagnostics_area::DA_ERROR)
560
sendError(session->main_da.sql_errno(), session->main_da.message());
562
session->protocol->sendOK();
565
return false; // We have to close it.
572
*l_packet= (char*) net.read_pos;
575
'packet_length' contains length of data, as it was stored in packet
576
header. In case of malformed header, drizzleclient_net_read returns zero.
577
If packet_length is not zero, drizzleclient_net_read ensures that the returned
578
number of bytes was actually read from network.
579
There is also an extra safety measure in drizzleclient_net_read:
580
it sets packet[packet_length]= 0, but only for non-zero packets.
583
if (*packet_length == 0) /* safety */
585
/* Initialize with COM_SLEEP packet */
586
(*l_packet)[0]= (unsigned char) COM_SLEEP;
589
/* Do not rely on drizzleclient_net_read, extra safety against programming errors. */
590
(*l_packet)[*packet_length]= '\0'; /* safety */
593
/* See comment above. */
594
/* Restore read timeout value */
595
drizzleclient_net_set_read_timeout(&net,
596
session->variables.net_read_timeout);
602
void ProtocolOldLibdrizzle::close(void)
606
drizzleclient_net_close(&net);
607
drizzleclient_net_end(&net);
611
void ProtocolOldLibdrizzle::forceClose(void)
614
drizzleclient_vio_close(net.vio);
617
void ProtocolOldLibdrizzle::prepareForResend()
657
619
packet->length(0);
660
bool Protocol_text::store_null()
622
bool ProtocolOldLibdrizzle::store(void)
663
625
buff[0]= (char)251;
680
642
tocs != &my_charset_bin)
682
644
/* Store with conversion */
683
return net_store_data((unsigned char*) from, length, fromcs, tocs);
645
return netStoreData((unsigned char*) from, length, fromcs, tocs);
685
647
/* Store without conversion */
686
return net_store_data((unsigned char*) from, length);
690
bool Protocol_text::store(const char *from, size_t length,
691
const CHARSET_INFO * const fromcs,
692
const CHARSET_INFO * const tocs)
694
return store_string_aux(from, length, fromcs, tocs);
698
bool Protocol_text::store(const char *from, size_t length,
648
return netStoreData((unsigned char*) from, length);
652
bool ProtocolOldLibdrizzle::store(const char *from, size_t length,
699
653
const CHARSET_INFO * const fromcs)
701
const CHARSET_INFO * const tocs= this->session->variables.character_set_results;
702
return store_string_aux(from, length, fromcs, tocs);
706
bool Protocol_text::store_tiny(int64_t from)
709
return net_store_data((unsigned char*) buff,
710
(size_t) (int10_to_str((int) from, buff, -10) - buff));
714
bool Protocol_text::store_short(int64_t from)
717
return net_store_data((unsigned char*) buff,
718
(size_t) (int10_to_str((int) from, buff, -10) -
723
bool Protocol_text::store_long(int64_t from)
726
return net_store_data((unsigned char*) buff,
727
(size_t) (int10_to_str((long int)from, buff,
728
(from <0)?-10:10)-buff));
732
bool Protocol_text::store_int64_t(int64_t from, bool unsigned_flag)
655
const CHARSET_INFO * const tocs= default_charset_info;
656
return storeString(from, length, fromcs, tocs);
660
bool ProtocolOldLibdrizzle::store(int32_t from)
663
return netStoreData((unsigned char*) buff,
664
(size_t) (int10_to_str(from, buff, -10) - buff));
667
bool ProtocolOldLibdrizzle::store(uint32_t from)
670
return netStoreData((unsigned char*) buff,
671
(size_t) (int10_to_str(from, buff, 10) - buff));
674
bool ProtocolOldLibdrizzle::store(int64_t from)
735
return net_store_data((unsigned char*) buff,
736
(size_t) (int64_t10_to_str(from,buff,
737
unsigned_flag ? 10 : -10)-
742
bool Protocol_text::store_decimal(const my_decimal *d)
744
char buff[DECIMAL_MAX_STR_LENGTH];
745
String str(buff, sizeof(buff), &my_charset_bin);
746
(void) my_decimal2string(E_DEC_FATAL_ERROR, d, 0, 0, 0, &str);
747
return net_store_data((unsigned char*) str.ptr(), str.length());
751
bool Protocol_text::store(float from, uint32_t decimals, String *buffer)
753
buffer->set_real((double) from, decimals, session->charset());
754
return net_store_data((unsigned char*) buffer->ptr(), buffer->length());
758
bool Protocol_text::store(double from, uint32_t decimals, String *buffer)
677
return netStoreData((unsigned char*) buff,
678
(size_t) (int64_t10_to_str(from, buff, -10) - buff));
681
bool ProtocolOldLibdrizzle::store(uint64_t from)
684
return netStoreData((unsigned char*) buff,
685
(size_t) (int64_t10_to_str(from, buff, 10) - buff));
689
bool ProtocolOldLibdrizzle::store(double from, uint32_t decimals, String *buffer)
760
691
buffer->set_real(from, decimals, session->charset());
761
return net_store_data((unsigned char*) buffer->ptr(), buffer->length());
692
return netStoreData((unsigned char*) buffer->ptr(), buffer->length());
765
bool Protocol_text::store(Field *field)
696
bool ProtocolOldLibdrizzle::store(Field *from)
767
if (field->is_null())
769
700
char buff[MAX_FIELD_WIDTH];
770
701
String str(buff,sizeof(buff), &my_charset_bin);
771
const CHARSET_INFO * const tocs= this->session->variables.character_set_results;
773
field->val_str(&str);
775
return store_string_aux(str.ptr(), str.length(), str.charset(), tocs);
702
const CHARSET_INFO * const tocs= default_charset_info;
706
return storeString(str.ptr(), str.length(), str.charset(), tocs);
781
Second_part format ("%06") needs to change when
782
we support 0-6 decimals for time.
785
bool Protocol_text::store(DRIZZLE_TIME *tm)
789
length= sprintf(buff, "%04d-%02d-%02d %02d:%02d:%02d",
797
length+= sprintf(buff+length, ".%06d",
798
(int)tm->second_part);
799
return net_store_data((unsigned char*) buff, length);
803
bool Protocol_text::store_date(DRIZZLE_TIME *tm)
805
char buff[MAX_DATE_STRING_REP_LENGTH];
806
size_t length= my_date_to_str(tm, buff);
807
return net_store_data((unsigned char*) buff, length);
813
Second_part format ("%06") needs to change when
814
we support 0-6 decimals for time.
817
bool Protocol_text::store_time(DRIZZLE_TIME *tm)
821
uint32_t day= (tm->year || tm->month) ? 0 : tm->day;
822
length= sprintf(buff, "%s%02ld:%02d:%02d",
824
(long) day*24L+(long) tm->hour,
828
length+= sprintf(buff+length, ".%06d", (int)tm->second_part);
829
return net_store_data((unsigned char*) buff, length);
712
Second_part format ("%06") needs to change when
713
we support 0-6 decimals for time.
716
bool ProtocolOldLibdrizzle::store(const DRIZZLE_TIME *tm)
722
switch (tm->time_type)
724
case DRIZZLE_TIMESTAMP_DATETIME:
725
length= sprintf(buff, "%04d-%02d-%02d %02d:%02d:%02d",
733
length+= sprintf(buff+length, ".%06d", (int)tm->second_part);
736
case DRIZZLE_TIMESTAMP_DATE:
737
length= sprintf(buff, "%04d-%02d-%02d",
743
case DRIZZLE_TIMESTAMP_TIME:
744
day= (tm->year || tm->month) ? 0 : tm->day;
745
length= sprintf(buff, "%s%02ld:%02d:%02d", tm->neg ? "-" : "",
746
(long) day*24L+(long) tm->hour, (int) tm->minute,
749
length+= sprintf(buff+length, ".%06d", (int)tm->second_part);
752
case DRIZZLE_TIMESTAMP_NONE:
753
case DRIZZLE_TIMESTAMP_ERROR:
759
return netStoreData((unsigned char*) buff, length);
762
bool ProtocolOldLibdrizzle::checkConnection(void)
771
if (drizzleclient_net_peer_addr(&net, ip, &session->peer_port, NI_MAXHOST))
773
my_error(ER_BAD_HOST_ERROR, MYF(0), session->security_ctx.ip.c_str());
777
session->security_ctx.ip.assign(ip);
779
drizzleclient_net_keepalive(&net, true);
781
uint32_t server_capabilites;
783
/* buff[] needs to big enough to hold the server_version variable */
784
char buff[SERVER_VERSION_LENGTH + SCRAMBLE_LENGTH + 64];
786
server_capabilites= CLIENT_BASIC_FLAGS;
789
server_capabilites|= CLIENT_COMPRESS;
790
#endif /* HAVE_COMPRESS */
792
end= buff + strlen(server_version);
793
if ((end - buff) >= SERVER_VERSION_LENGTH)
794
end= buff + (SERVER_VERSION_LENGTH - 1);
795
memcpy(buff, server_version, end - buff);
799
int4store((unsigned char*) end, thread_id);
802
So as _checkConnection is the only entry point to authorization
803
procedure, scramble is set here. This gives us new scramble for
806
drizzleclient_create_random_string(scramble, SCRAMBLE_LENGTH, &rand);
808
Old clients does not understand long scrambles, but can ignore packet
809
tail: that's why first part of the scramble is placed here, and second
810
part at the end of packet.
812
end= strncpy(end, scramble, SCRAMBLE_LENGTH_323);
813
end+= SCRAMBLE_LENGTH_323;
815
*end++= 0; /* an empty byte for some reason */
817
int2store(end, server_capabilites);
818
/* write server characteristics: up to 16 bytes allowed */
819
end[2]=(char) default_charset_info->number;
820
int2store(end+3, session->server_status);
821
memset(end+5, 0, 13);
823
/* write scramble tail */
824
size_t scramble_len= SCRAMBLE_LENGTH - SCRAMBLE_LENGTH_323;
825
end= strncpy(end, scramble + SCRAMBLE_LENGTH_323, scramble_len);
828
*end++= 0; /* an empty byte for some reason */
830
/* At this point we write connection message and read reply */
831
if (drizzleclient_net_write_command(&net
832
, (unsigned char) protocol_version
833
, (unsigned char*) ""
835
, (unsigned char*) buff
836
, (size_t) (end-buff))
837
|| (pkt_len= drizzleclient_net_read(&net)) == packet_error
838
|| pkt_len < MIN_HANDSHAKE_SIZE)
840
my_error(ER_HANDSHAKE_ERROR, MYF(0), session->security_ctx.ip.c_str());
844
if (session->packet.alloc(session->variables.net_buffer_length))
845
return false; /* The error is set by alloc(). */
847
session->client_capabilities= uint2korr(net.read_pos);
850
session->client_capabilities|= ((uint32_t) uint2korr(net.read_pos + 2)) << 16;
851
session->max_client_packet_length= uint4korr(net.read_pos + 4);
852
session->update_charset();
853
end= (char*) net.read_pos + 32;
856
Disable those bits which are not supported by the server.
857
This is a precautionary measure, if the client lies. See Bug#27944.
859
session->client_capabilities&= server_capabilites;
861
if (end >= (char*) net.read_pos + pkt_len + 2)
863
my_error(ER_HANDSHAKE_ERROR, MYF(0), session->security_ctx.ip.c_str());
867
net.return_status= &session->server_status;
870
char *passwd= strchr(user, '\0')+1;
871
uint32_t user_len= passwd - user - 1;
873
char db_buff[NAME_LEN + 1]; // buffer to store db in utf8
874
char user_buff[USERNAME_LENGTH + 1]; // buffer to store user in utf8
875
uint32_t dummy_errors;
878
Old clients send null-terminated string as password; new clients send
879
the size (1 byte) + string (not null-terminated). Hence in case of empty
880
password both send '\0'.
882
This strlen() can't be easily deleted without changing protocol.
884
Cast *passwd to an unsigned char, so that it doesn't extend the sign for
885
*passwd > 127 and become 2**32-127+ after casting to uint.
887
uint32_t passwd_len= session->client_capabilities & CLIENT_SECURE_CONNECTION ?
888
(unsigned char)(*passwd++) : strlen(passwd);
889
l_db= session->client_capabilities & CLIENT_CONNECT_WITH_DB ? l_db + passwd_len + 1 : 0;
891
/* strlen() can't be easily deleted without changing protocol */
892
uint32_t db_len= l_db ? strlen(l_db) : 0;
894
if (passwd + passwd_len + db_len > (char *) net.read_pos + pkt_len)
896
my_error(ER_HANDSHAKE_ERROR, MYF(0), session->security_ctx.ip.c_str());
900
/* Since 4.1 all database names are stored in utf8 */
903
db_buff[copy_and_convert(db_buff, sizeof(db_buff)-1,
906
session->charset(), &dummy_errors)]= 0;
910
user_buff[user_len= copy_and_convert(user_buff, sizeof(user_buff)-1,
911
system_charset_info, user, user_len,
912
session->charset(), &dummy_errors)]= '\0';
915
/* If username starts and ends in "'", chop them off */
916
if (user_len > 1 && user[0] == '\'' && user[user_len - 1] == '\'')
923
session->security_ctx.user.assign(user);
925
return session->checkUser(passwd, passwd_len, l_db);
928
static ProtocolFactoryOldLibdrizzle *factory= NULL;
930
static int init(PluginRegistry ®istry)
932
factory= new ProtocolFactoryOldLibdrizzle;
933
registry.add(factory);
937
static int deinit(PluginRegistry ®istry)
941
registry.remove(factory);
947
drizzle_declare_plugin(oldlibdrizzle)
952
"Old libdrizzle Protocol",
954
init, /* Plugin Init */
955
deinit, /* Plugin Deinit */
956
NULL, /* status variables */
957
NULL, /* system variables */
958
NULL /* config options */
960
drizzle_declare_plugin_end;