1
/* -*- mode: c++; c-basic-offset: 2; indent-tabs-mode: nil; -*-
2
* vim:expandtab:shiftwidth=2:tabstop=2:smarttab:
4
* Copyright (C) 2008 Sun Microsystems
6
* This program is free software; you can redistribute it and/or modify
7
* it under the terms of the GNU General Public License as published by
8
* the Free Software Foundation; version 2 of the License.
10
* This program is distributed in the hope that it will be useful,
11
* but WITHOUT ANY WARRANTY; without even the implied warranty of
12
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13
* GNU General Public License for more details.
15
* You should have received a copy of the GNU General Public License
16
* along with this program; if not, write to the Free Software
17
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
21
#include <drizzled/gettext.h>
22
#include <drizzled/error.h>
23
#include <drizzled/query_id.h>
24
#include <drizzled/sql_state.h>
25
#include <drizzled/session.h>
26
#include "drizzled/internal/m_string.h"
30
#include "mysql_protocol.h"
31
#include "mysql_password.h"
35
using namespace drizzled;
37
#define PROTOCOL_VERSION 10
41
extern uint32_t global_thread_id;
44
static const unsigned int PACKET_BUFFER_EXTRA_ALLOC= 1024;
46
static uint32_t connect_timeout;
47
static uint32_t read_timeout;
48
static uint32_t write_timeout;
49
static uint32_t retry_count;
50
static uint32_t buffer_length;
51
static char* bind_address;
52
static uint32_t random_seed1;
53
static uint32_t random_seed2;
54
static const uint32_t random_max= 0x3FFFFFFF;
55
static const double random_max_double= (double)0x3FFFFFFF;
57
const char* ListenMySQLProtocol::getHost(void) const
62
in_port_t ListenMySQLProtocol::getPort(void) const
64
return (in_port_t) port;
67
plugin::Client *ListenMySQLProtocol::getClient(int fd)
70
new_fd= acceptTcp(fd);
74
return new (nothrow) ClientMySQLProtocol(new_fd, using_mysql41_protocol);
77
ClientMySQLProtocol::ClientMySQLProtocol(int fd, bool using_mysql41_protocol_arg):
78
using_mysql41_protocol(using_mysql41_protocol_arg)
85
if (drizzleclient_net_init_sock(&net, fd, buffer_length))
88
drizzleclient_net_set_read_timeout(&net, read_timeout);
89
drizzleclient_net_set_write_timeout(&net, write_timeout);
90
net.retry_count=retry_count;
93
ClientMySQLProtocol::~ClientMySQLProtocol()
99
int ClientMySQLProtocol::getFileDescriptor(void)
101
return drizzleclient_net_get_sd(&net);
104
bool ClientMySQLProtocol::isConnected()
109
bool ClientMySQLProtocol::isReading(void)
111
return net.reading_or_writing == 1;
114
bool ClientMySQLProtocol::isWriting(void)
116
return net.reading_or_writing == 2;
119
bool ClientMySQLProtocol::flush()
123
bool ret= drizzleclient_net_write(&net, (unsigned char*) packet.ptr(),
129
void ClientMySQLProtocol::close(void)
133
drizzleclient_net_close(&net);
134
drizzleclient_net_end(&net);
138
bool ClientMySQLProtocol::authenticate()
140
bool connection_is_valid;
142
/* Use "connect_timeout" value during connection phase */
143
drizzleclient_net_set_read_timeout(&net, connect_timeout);
144
drizzleclient_net_set_write_timeout(&net, connect_timeout);
146
connection_is_valid= checkConnection();
148
if (connection_is_valid)
152
sendError(session->main_da.sql_errno(), session->main_da.message());
156
/* Connect completed, set read/write timeouts back to default */
157
drizzleclient_net_set_read_timeout(&net, read_timeout);
158
drizzleclient_net_set_write_timeout(&net, write_timeout);
162
bool ClientMySQLProtocol::readCommand(char **l_packet, uint32_t *packet_length)
165
This thread will do a blocking read from the client which
166
will be interrupted when the next command is received from
167
the client, the connection is closed or "net_wait_timeout"
168
number of seconds has passed
171
/* We can do this much more efficiently with poll timeouts or watcher thread,
172
disabling for now, which means net_wait_timeout == read_timeout. */
173
drizzleclient_net_set_read_timeout(&net,
174
session->variables.net_wait_timeout);
179
*packet_length= drizzleclient_net_read(&net);
180
if (*packet_length == packet_error)
182
/* Check if we can continue without closing the connection */
184
if(net.last_errno== ER_NET_PACKET_TOO_LARGE)
185
my_error(ER_NET_PACKET_TOO_LARGE, MYF(0));
186
if (session->main_da.status() == Diagnostics_area::DA_ERROR)
187
sendError(session->main_da.sql_errno(), session->main_da.message());
192
return false; // We have to close it.
199
*l_packet= (char*) net.read_pos;
202
'packet_length' contains length of data, as it was stored in packet
203
header. In case of malformed header, drizzleclient_net_read returns zero.
204
If packet_length is not zero, drizzleclient_net_read ensures that the returned
205
number of bytes was actually read from network.
206
There is also an extra safety measure in drizzleclient_net_read:
207
it sets packet[packet_length]= 0, but only for non-zero packets.
210
if (*packet_length == 0) /* safety */
212
/* Initialize with COM_SLEEP packet */
213
(*l_packet)[0]= (unsigned char) COM_SLEEP;
216
else if (using_mysql41_protocol)
218
/* Map from MySQL commands to Drizzle commands. */
219
switch ((int)(*l_packet)[0])
223
case 2: /* INIT_DB */
227
case 8: /* SHUTDOWN */
228
(*l_packet)[0]= (unsigned char) COM_SHUTDOWN;
232
(*l_packet)[0]= (unsigned char) COM_PING;
237
/* Respond with unknown command for MySQL commands we don't support. */
238
(*l_packet)[0]= (unsigned char) COM_END;
244
/* Do not rely on drizzleclient_net_read, extra safety against programming errors. */
245
(*l_packet)[*packet_length]= '\0'; /* safety */
248
/* See comment above. */
249
/* Restore read timeout value */
250
drizzleclient_net_set_read_timeout(&net,
251
session->variables.net_read_timeout);
258
Return ok to the client.
260
The ok packet has the following structure:
262
- 0 : Marker (1 byte)
263
- affected_rows : Stored in 1-9 bytes
264
- id : Stored in 1-9 bytes
265
- server_status : Copy of session->server_status; Can be used by client
266
to check if we are inside an transaction.
268
- warning_count : Stored in 2 bytes; New in 4.1 client
269
- message : Stored as packed length (1-9 bytes) + message.
270
Is not stored if no message.
272
@param session Thread handler
273
@param affected_rows Number of rows changed by statement
274
@param id Auto_increment id for first row (if used)
275
@param message Message to send to the client (Used by mysql_status)
278
void ClientMySQLProtocol::sendOK()
280
unsigned char buff[DRIZZLE_ERRMSG_SIZE+10],*pos;
281
const char *message= NULL;
284
if (!net.vio) // hack for re-parsing queries
289
buff[0]=0; // No fields
290
if (session->main_da.status() == Diagnostics_area::DA_OK)
292
if (client_capabilities & CLIENT_FOUND_ROWS && session->main_da.found_rows())
293
pos=storeLength(buff+1,session->main_da.found_rows());
295
pos=storeLength(buff+1,session->main_da.affected_rows());
296
pos=storeLength(pos, session->main_da.last_insert_id());
297
int2store(pos, session->main_da.server_status());
299
tmp= min(session->main_da.total_warn_count(), (uint32_t)65535);
300
message= session->main_da.message();
304
pos=storeLength(buff+1,0);
305
pos=storeLength(pos, 0);
306
int2store(pos, session->server_status);
308
tmp= min(session->total_warn_count, (uint32_t)65535);
311
/* We can only return up to 65535 warnings in two bytes */
315
session->main_da.can_overwrite_status= true;
317
if (message && message[0])
319
size_t length= strlen(message);
320
pos=storeLength(pos,length);
321
memcpy(pos,(unsigned char*) message,length);
324
drizzleclient_net_write(&net, buff, (size_t) (pos-buff));
325
drizzleclient_net_flush(&net);
327
session->main_da.can_overwrite_status= false;
331
Send eof (= end of result set) to the client.
333
The eof packet has the following structure:
335
- 254 (DRIZZLE_PROTOCOL_NO_MORE_DATA) : Marker (1 byte)
336
- warning_count : Stored in 2 bytes; New in 4.1 client
337
- status_flag : Stored in 2 bytes;
338
For flags like SERVER_MORE_RESULTS_EXISTS.
340
Note that the warning count will not be sent if 'no_flush' is set as
341
we don't want to report the warning count until all data is sent to the
345
void ClientMySQLProtocol::sendEOF()
347
/* Set to true if no active vio, to work well in case of --init-file */
350
session->main_da.can_overwrite_status= true;
351
writeEOFPacket(session->main_da.server_status(),
352
session->main_da.total_warn_count());
353
drizzleclient_net_flush(&net);
354
session->main_da.can_overwrite_status= false;
356
packet.shrink(buffer_length);
360
void ClientMySQLProtocol::sendError(uint32_t sql_errno, const char *err)
364
buff[]: sql_errno:2 + ('#':1 + SQLSTATE_LENGTH:5) + DRIZZLE_ERRMSG_SIZE:512
366
unsigned char buff[2+1+SQLSTATE_LENGTH+DRIZZLE_ERRMSG_SIZE], *pos;
369
assert(err && err[0]);
372
It's one case when we can push an error even though there
373
is an OK or EOF already.
375
session->main_da.can_overwrite_status= true;
377
/* Abort multi-result sets */
378
session->server_status&= ~SERVER_MORE_RESULTS_EXISTS;
381
Send a error string to client.
383
For SIGNAL/RESIGNAL and GET DIAGNOSTICS functionality it's
384
critical that every error that can be intercepted is issued in one
385
place only, my_message_sql.
393
int2store(buff,sql_errno);
396
/* The first # is to make the client backward compatible */
398
pos= (unsigned char*) strcpy((char*) buff+3, drizzle_errno_to_sqlstate(sql_errno));
399
pos+= strlen(drizzle_errno_to_sqlstate(sql_errno));
401
char *tmp= strncpy((char*)pos, err, DRIZZLE_ERRMSG_SIZE-1);
402
tmp+= strlen((char*)pos);
404
length= (uint32_t)(tmp-(char*)buff);
407
drizzleclient_net_write_command(&net,(unsigned char) 255, (unsigned char*) "", 0, (unsigned char*) err, length);
409
session->main_da.can_overwrite_status= false;
413
Send name and type of result to client.
415
Sum fields has table name empty and field_name.
417
@param Session Thread data object
418
@param list List of items to send to client
419
@param flag Bit mask with the following functions:
420
- 1 send number of rows
421
- 2 send default values
422
- 4 don't write eof packet
427
1 Error (Note that in this case the error is not sent to the
430
bool ClientMySQLProtocol::sendFields(List<Item> *list)
432
List_iterator_fast<Item> it(*list);
434
unsigned char buff[80];
435
String tmp((char*) buff,sizeof(buff),&my_charset_bin);
437
unsigned char *row_pos= storeLength(buff, list->elements);
438
(void) drizzleclient_net_write(&net, buff, (size_t) (row_pos-buff));
444
item->make_field(&field);
448
if (store(STRING_WITH_LEN("def")) ||
449
store(field.db_name) ||
450
store(field.table_name) ||
451
store(field.org_table_name) ||
452
store(field.col_name) ||
453
store(field.org_col_name) ||
454
packet.realloc(packet.length()+12))
457
/* Store fixed length fields */
458
pos= (char*) packet.ptr()+packet.length();
459
*pos++= 12; // Length of packed fields
461
int2store(pos, field.charsetnr);
462
int4store(pos+2, field.length);
464
if (using_mysql41_protocol)
466
/* Switch to MySQL field numbering. */
469
case DRIZZLE_TYPE_LONG:
473
case DRIZZLE_TYPE_DOUBLE:
477
case DRIZZLE_TYPE_NULL:
481
case DRIZZLE_TYPE_TIMESTAMP:
485
case DRIZZLE_TYPE_LONGLONG:
489
case DRIZZLE_TYPE_DATETIME:
493
case DRIZZLE_TYPE_DATE:
497
case DRIZZLE_TYPE_VARCHAR:
501
case DRIZZLE_TYPE_DECIMAL:
505
case DRIZZLE_TYPE_ENUM:
509
case DRIZZLE_TYPE_BLOB:
516
/* Add one to compensate for tinyint removal from enum. */
517
pos[6]= field.type + 1;
520
int2store(pos+7,field.flags);
521
pos[9]= (char) field.decimals;
522
pos[10]= 0; // For the future
523
pos[11]= 0; // For the future
526
packet.length((uint32_t) (pos - packet.ptr()));
532
Mark the end of meta-data result set, and store session->server_status,
533
to show that there is no cursor.
534
Send no warning information, as it will be sent at statement end.
536
writeEOFPacket(session->server_status, session->total_warn_count);
540
my_message(ER_OUT_OF_RESOURCES, ER(ER_OUT_OF_RESOURCES),
545
bool ClientMySQLProtocol::store(Field *from)
549
char buff[MAX_FIELD_WIDTH];
550
String str(buff,sizeof(buff), &my_charset_bin);
554
return netStoreData((const unsigned char *)str.ptr(), str.length());
557
bool ClientMySQLProtocol::store(void)
561
return packet.append(buff, sizeof(buff), PACKET_BUFFER_EXTRA_ALLOC);
564
bool ClientMySQLProtocol::store(int32_t from)
567
return netStoreData((unsigned char*) buff,
568
(size_t) (internal::int10_to_str(from, buff, -10) - buff));
571
bool ClientMySQLProtocol::store(uint32_t from)
574
return netStoreData((unsigned char*) buff,
575
(size_t) (internal::int10_to_str(from, buff, 10) - buff));
578
bool ClientMySQLProtocol::store(int64_t from)
581
return netStoreData((unsigned char*) buff,
582
(size_t) (internal::int64_t10_to_str(from, buff, -10) - buff));
585
bool ClientMySQLProtocol::store(uint64_t from)
588
return netStoreData((unsigned char*) buff,
589
(size_t) (internal::int64_t10_to_str(from, buff, 10) - buff));
592
bool ClientMySQLProtocol::store(double from, uint32_t decimals, String *buffer)
594
buffer->set_real(from, decimals, session->charset());
595
return netStoreData((unsigned char*) buffer->ptr(), buffer->length());
598
bool ClientMySQLProtocol::store(const char *from, size_t length)
600
return netStoreData((const unsigned char *)from, length);
603
bool ClientMySQLProtocol::wasAborted(void)
605
return net.error && net.vio != 0;
608
bool ClientMySQLProtocol::haveMoreData(void)
610
return drizzleclient_net_more_data(&net);
613
bool ClientMySQLProtocol::haveError(void)
615
return net.error || net.vio == 0;
618
bool ClientMySQLProtocol::checkConnection(void)
622
char scramble[SCRAMBLE_LENGTH];
624
makeScramble(scramble);
631
if (drizzleclient_net_peer_addr(&net, ip, &peer_port, NI_MAXHOST))
633
my_error(ER_BAD_HOST_ERROR, MYF(0), session->getSecurityContext().getIp().c_str());
637
session->getSecurityContext().setIp(ip);
639
drizzleclient_net_keepalive(&net, true);
641
uint32_t server_capabilites;
643
/* buff[] needs to big enough to hold the server_version variable */
644
char buff[SERVER_VERSION_LENGTH + SCRAMBLE_LENGTH + 64];
646
server_capabilites= CLIENT_BASIC_FLAGS;
648
if (using_mysql41_protocol)
649
server_capabilites|= CLIENT_PROTOCOL_MYSQL41;
652
server_capabilites|= CLIENT_COMPRESS;
653
#endif /* HAVE_COMPRESS */
655
end= buff + strlen(VERSION);
656
if ((end - buff) >= SERVER_VERSION_LENGTH)
657
end= buff + (SERVER_VERSION_LENGTH - 1);
658
memcpy(buff, VERSION, end - buff);
662
int4store((unsigned char*) end, global_thread_id);
665
/* We don't use scramble anymore. */
666
memcpy(end, scramble, SCRAMBLE_LENGTH_323);
667
end+= SCRAMBLE_LENGTH_323;
668
*end++= 0; /* an empty byte for some reason */
670
int2store(end, server_capabilites);
671
/* write server characteristics: up to 16 bytes allowed */
672
end[2]=(char) default_charset_info->number;
673
int2store(end+3, session->server_status);
674
memset(end+5, 0, 13);
677
/* Write scramble tail. */
678
memcpy(end, scramble + SCRAMBLE_LENGTH_323, SCRAMBLE_LENGTH - SCRAMBLE_LENGTH_323);
679
end+= (SCRAMBLE_LENGTH - SCRAMBLE_LENGTH_323);
680
*end++= 0; /* an empty byte for some reason */
682
/* At this point we write connection message and read reply */
683
if (drizzleclient_net_write_command(&net
684
, (unsigned char) PROTOCOL_VERSION
685
, (unsigned char*) ""
687
, (unsigned char*) buff
688
, (size_t) (end-buff))
689
|| (pkt_len= drizzleclient_net_read(&net)) == packet_error
690
|| pkt_len < MIN_HANDSHAKE_SIZE)
692
my_error(ER_HANDSHAKE_ERROR, MYF(0), session->getSecurityContext().getIp().c_str());
696
if (packet.alloc(buffer_length))
697
return false; /* The error is set by alloc(). */
699
client_capabilities= uint2korr(net.read_pos);
700
if (!(client_capabilities & CLIENT_PROTOCOL_MYSQL41))
702
my_error(ER_HANDSHAKE_ERROR, MYF(0), session->getSecurityContext().getIp().c_str());
706
client_capabilities|= ((uint32_t) uint2korr(net.read_pos + 2)) << 16;
707
session->max_client_packet_length= uint4korr(net.read_pos + 4);
708
end= (char*) net.read_pos + 32;
711
Disable those bits which are not supported by the server.
712
This is a precautionary measure, if the client lies. See Bug#27944.
714
client_capabilities&= server_capabilites;
716
if (end >= (char*) net.read_pos + pkt_len + 2)
718
my_error(ER_HANDSHAKE_ERROR, MYF(0), session->getSecurityContext().getIp().c_str());
722
net.return_status= &session->server_status;
725
char *passwd= strchr(user, '\0')+1;
726
uint32_t user_len= passwd - user - 1;
730
Only support new password format.
732
Cast *passwd to an unsigned char, so that it doesn't extend the sign for
733
*passwd > 127 and become 2**32-127+ after casting to uint.
736
if (client_capabilities & CLIENT_SECURE_CONNECTION &&
737
passwd < (char *) net.read_pos + pkt_len)
739
passwd_len= (unsigned char)(*passwd++);
742
session->getSecurityContext().setPasswordType(SecurityContext::MYSQL_HASH);
743
session->getSecurityContext().setPasswordContext(scramble, SCRAMBLE_LENGTH);
749
if (client_capabilities & CLIENT_CONNECT_WITH_DB &&
750
passwd < (char *) net.read_pos + pkt_len)
752
l_db= l_db + passwd_len + 1;
757
/* strlen() can't be easily deleted without changing client */
758
uint32_t db_len= l_db ? strlen(l_db) : 0;
760
if (passwd + passwd_len + db_len > (char *) net.read_pos + pkt_len)
762
my_error(ER_HANDSHAKE_ERROR, MYF(0), session->getSecurityContext().getIp().c_str());
766
/* If username starts and ends in "'", chop them off */
767
if (user_len > 1 && user[0] == '\'' && user[user_len - 1] == '\'')
774
session->getSecurityContext().setUser(user);
776
return session->checkUser(passwd, passwd_len, l_db);
779
bool ClientMySQLProtocol::netStoreData(const unsigned char *from, size_t length)
781
size_t packet_length= packet.length();
783
The +9 comes from that strings of length longer than 16M require
784
9 bytes to be stored (see storeLength).
786
if (packet_length+9+length > packet.alloced_length() &&
787
packet.realloc(packet_length+9+length))
789
unsigned char *to= storeLength((unsigned char*) packet.ptr()+packet_length, length);
790
memcpy(to,from,length);
791
packet.length((size_t) (to+length-(unsigned char*) packet.ptr()));
796
Format EOF packet according to the current client and
797
write it to the network output buffer.
800
void ClientMySQLProtocol::writeEOFPacket(uint32_t server_status,
801
uint32_t total_warn_count)
803
unsigned char buff[5];
805
Don't send warn count during SP execution, as the warn_list
806
is cleared between substatements, and mysqltest gets confused
808
uint32_t tmp= min(total_warn_count, (uint32_t)65535);
809
buff[0]= DRIZZLE_PROTOCOL_NO_MORE_DATA;
810
int2store(buff+1, tmp);
812
The following test should never be true, but it's better to do it
813
because if 'is_fatal_error' is set the server is not going to execute
814
other queries (see the if test in dispatch_command / COM_QUERY)
816
if (session->is_fatal_error)
817
server_status&= ~SERVER_MORE_RESULTS_EXISTS;
818
int2store(buff + 3, server_status);
819
drizzleclient_net_write(&net, buff, 5);
823
Store an integer with simple packing into a output package
825
buffer Store the packed integer here
826
length integers to store
828
This is mostly used to store lengths of strings. We have to cast
829
the result for the LL() becasue of a bug in Forte CC compiler.
832
Position in 'buffer' after the packed length
835
unsigned char *ClientMySQLProtocol::storeLength(unsigned char *buffer, uint64_t length)
837
if (length < (uint64_t) 251LL)
839
*buffer=(unsigned char) length;
842
/* 251 is reserved for NULL */
843
if (length < (uint64_t) 65536LL)
846
int2store(buffer,(uint32_t) length);
849
if (length < (uint64_t) 16777216LL)
852
int3store(buffer,(uint32_t) length);
856
int8store(buffer,length);
860
void ClientMySQLProtocol::makeScramble(char *scramble)
862
/* This is the MySQL algorithm with minimal changes. */
863
random_seed1= (random_seed1 * 3 + random_seed2) % random_max;
864
random_seed2= (random_seed1 + random_seed2 + 33) % random_max;
865
uint32_t seed= static_cast<uint32_t>((static_cast<double>(random_seed1) / random_max_double) * 0xffffffff);
868
uint32_t pointer_seed;
869
memcpy(&pointer_seed, &pointer, 4);
870
uint32_t random1= (seed + pointer_seed) % random_max;
871
uint32_t random2= (seed + global_thread_id + net.vio->sd) % random_max;
873
for (char *end= scramble + SCRAMBLE_LENGTH; scramble != end; scramble++)
875
random1= (random1 * 3 + random2) % random_max;
876
random2= (random1 + random2 + 33) % random_max;
877
*scramble= static_cast<char>((static_cast<double>(random1) / random_max_double) * 94 + 33);
881
static ListenMySQLProtocol *listen_obj= NULL;
882
plugin::Create_function<MySQLPassword> *mysql_password= NULL;
884
static int init(drizzled::plugin::Context &context)
886
/* Initialize random seeds for the MySQL algorithm with minimal changes. */
887
time_t seed_time= time(NULL);
888
random_seed1= seed_time % random_max;
889
random_seed2= (seed_time / 2) % random_max;
891
mysql_password= new plugin::Create_function<MySQLPassword>(MySQLPasswordName);
892
context.add(mysql_password);
894
listen_obj= new ListenMySQLProtocol("mysql_protocol", true);
895
context.add(listen_obj);
900
static DRIZZLE_SYSVAR_UINT(port, port, PLUGIN_VAR_RQCMDARG,
901
N_("Port number to use for connection or 0 for default to with MySQL "
903
NULL, NULL, 3306, 0, 65535, 0);
904
static DRIZZLE_SYSVAR_UINT(connect_timeout, connect_timeout,
905
PLUGIN_VAR_RQCMDARG, N_("Connect Timeout."),
906
NULL, NULL, 10, 1, 300, 0);
907
static DRIZZLE_SYSVAR_UINT(read_timeout, read_timeout, PLUGIN_VAR_RQCMDARG,
908
N_("Read Timeout."), NULL, NULL, 30, 1, 300, 0);
909
static DRIZZLE_SYSVAR_UINT(write_timeout, write_timeout, PLUGIN_VAR_RQCMDARG,
910
N_("Write Timeout."), NULL, NULL, 60, 1, 300, 0);
911
static DRIZZLE_SYSVAR_UINT(retry_count, retry_count, PLUGIN_VAR_RQCMDARG,
912
N_("Retry Count."), NULL, NULL, 10, 1, 100, 0);
913
static DRIZZLE_SYSVAR_UINT(buffer_length, buffer_length, PLUGIN_VAR_RQCMDARG,
914
N_("Buffer length."), NULL, NULL, 16384, 1024,
916
static DRIZZLE_SYSVAR_STR(bind_address, bind_address, PLUGIN_VAR_READONLY,
917
N_("Address to bind to."), NULL, NULL, NULL);
919
static drizzle_sys_var* sys_variables[]= {
920
DRIZZLE_SYSVAR(port),
921
DRIZZLE_SYSVAR(connect_timeout),
922
DRIZZLE_SYSVAR(read_timeout),
923
DRIZZLE_SYSVAR(write_timeout),
924
DRIZZLE_SYSVAR(retry_count),
925
DRIZZLE_SYSVAR(buffer_length),
926
DRIZZLE_SYSVAR(bind_address),
930
DRIZZLE_DECLARE_PLUGIN
936
"MySQL Protocol Module",
938
init, /* Plugin Init */
939
sys_variables, /* system variables */
940
NULL /* config options */
942
DRIZZLE_DECLARE_PLUGIN_END;