Server IP : 104.21.38.3 / Your IP : 172.71.82.19 Web Server : Apache System : Linux krdc-ubuntu-s-2vcpu-4gb-amd-blr1-01.localdomain 5.15.0-142-generic #152-Ubuntu SMP Mon May 19 10:54:31 UTC 2025 x86_64 User : www ( 1000) PHP Version : 7.4.33 Disable Function : passthru,exec,system,putenv,chroot,chgrp,chown,shell_exec,popen,proc_open,pcntl_exec,ini_alter,ini_restore,dl,openlog,syslog,readlink,symlink,popepassthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,imap_open,apache_setenv MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : OFF | Sudo : ON | Pkexec : ON Directory : /www/server/mysql/src/rapid/plugin/x/src/ |
Upload File : |
/* * Copyright (c) 2015, 2023, Oracle and/or its affiliates. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License, version 2.0, * as published by the Free Software Foundation. * * This program is also distributed with certain software (including * but not limited to OpenSSL) that is licensed under separate terms, * as designated in a particular file or component or in included license * documentation. The authors of MySQL hereby grant you an additional * permission to link the program and your derivative works with the * separately licensed software that they have included with MySQL. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License, version 2.0, for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA * 02110-1301 USA */ #ifndef _AUTH_PLAIN_H_ #define _AUTH_PLAIN_H_ #include "ngs/protocol_encoder.h" #include "ngs/protocol_authentication.h" #include "xpl_session.h" #include "xpl_server.h" #include "sql_data_context.h" #include "xpl_client.h" #include "xpl_log.h" namespace xpl { class Sasl_plain_auth : public ngs::Authentication_handler { public: static ngs::Authentication_handler_ptr create(ngs::Session_interface *session) { return Authentication_handler::wrap_ptr(new Sasl_plain_auth((xpl::Session*)session)); } virtual Response handle_start(const std::string &mechanism, const std::string &data, const std::string &initial_response) { Response r; const char* client_address = m_session->client().client_address(); std::string client_hostname = m_session->client().client_hostname(); ngs::Error_code error = sasl_message(client_hostname.empty() ? NULL : client_hostname.c_str(), client_address, data); // data is the username and initial_response is password if (!error) { r.status = Succeeded; r.data = ""; r.error_code = 0; } else { r.status = Failed; r.data = error.message; r.error_code = error.error; } return r; } virtual Response handle_continue(const std::string &data) { // never supposed to get called Response r; r.status = Error; r.error_code = ER_NET_PACKETS_OUT_OF_ORDER; return r; } virtual void done() { delete this; } protected: Sasl_plain_auth(xpl::Session *session) : m_session(session) {} private: xpl::Session *m_session; ngs::Error_code sasl_message(const char *client_hostname, const char *client_address, const std::string &message) { try { const std::size_t sasl_element_max_with_two_additional_bytes = 256; std::size_t message_position = 0; char authzid_db[sasl_element_max_with_two_additional_bytes]; char authcid[sasl_element_max_with_two_additional_bytes]; char passwd[sasl_element_max_with_two_additional_bytes]; if (!extract_null_terminated_element(message, message_position, sasl_element_max_with_two_additional_bytes, authzid_db) || !extract_null_terminated_element(message, message_position, sasl_element_max_with_two_additional_bytes, authcid) || !extract_null_terminated_element(message, message_position, sasl_element_max_with_two_additional_bytes, passwd)) { // throw ngs::Error_code(ER_INVALID_CHARACTER_STRING, "Invalid format of login string"); throw ngs::Error_code(ER_NO_SUCH_USER, "Invalid user or password"); } if (strlen(authcid) == 0) throw ngs::Error_code(ER_NO_SUCH_USER, "Invalid user or password"); std::string password_hash = *passwd ? compute_password_hash(passwd) : ""; On_user_password_hash check_password_hash = ngs::bind(&Sasl_plain_auth::compare_hashes, this, password_hash, ngs::placeholders::_1); ngs::IOptions_session_ptr options_session = m_session->client().connection().options(); const ngs::Connection_type connection_type = m_session->client().connection().connection_type(); return m_session->data_context().authenticate(authcid, client_hostname, client_address, authzid_db, check_password_hash, ((xpl::Client&)m_session->client()).supports_expired_passwords(), options_session, connection_type); } catch(const ngs::Error_code &error_code) { return error_code; } return ngs::Error_code(); } bool compare_hashes(const std::string &user_password_hash, const std::string &db_password_hash) { const bool result = (user_password_hash == db_password_hash); return result; } }; } // namespace xpl #endif // _AUTH_PLAIN_H_