mysqlnd_wireprotocol.c 83 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600
  1. /*
  2. +----------------------------------------------------------------------+
  3. | PHP Version 5 |
  4. +----------------------------------------------------------------------+
  5. | Copyright (c) 2006-2016 The PHP Group |
  6. +----------------------------------------------------------------------+
  7. | This source file is subject to version 3.01 of the PHP license, |
  8. | that is bundled with this package in the file LICENSE, and is |
  9. | available through the world-wide-web at the following url: |
  10. | http://www.php.net/license/3_01.txt |
  11. | If you did not receive a copy of the PHP license and are unable to |
  12. | obtain it through the world-wide-web, please send a note to |
  13. | license@php.net so we can mail you a copy immediately. |
  14. +----------------------------------------------------------------------+
  15. | Authors: Andrey Hristov <andrey@mysql.com> |
  16. | Ulf Wendel <uwendel@mysql.com> |
  17. | Georg Richter <georg@mysql.com> |
  18. +----------------------------------------------------------------------+
  19. */
  20. /* $Id$ */
  21. #include "php.h"
  22. #include "php_globals.h"
  23. #include "mysqlnd.h"
  24. #include "mysqlnd_priv.h"
  25. #include "mysqlnd_wireprotocol.h"
  26. #include "mysqlnd_statistics.h"
  27. #include "mysqlnd_debug.h"
  28. #include "zend_ini.h"
  29. #define MYSQLND_SILENT 1
  30. #define MYSQLND_DUMP_HEADER_N_BODY
  31. #define PACKET_READ_HEADER_AND_BODY(packet, conn, buf, buf_size, packet_type_as_text, packet_type) \
  32. { \
  33. DBG_INF_FMT("buf=%p size=%u", (buf), (buf_size)); \
  34. if (FAIL == mysqlnd_read_header((conn)->net, &((packet)->header), (conn)->stats, ((conn)->error_info) TSRMLS_CC)) {\
  35. CONN_SET_STATE(conn, CONN_QUIT_SENT); \
  36. SET_CLIENT_ERROR(*conn->error_info, CR_SERVER_GONE_ERROR, UNKNOWN_SQLSTATE, mysqlnd_server_gone);\
  37. php_error_docref(NULL TSRMLS_CC, E_WARNING, "%s", mysqlnd_server_gone); \
  38. DBG_ERR_FMT("Can't read %s's header", (packet_type_as_text)); \
  39. DBG_RETURN(FAIL);\
  40. }\
  41. if ((buf_size) < (packet)->header.size) { \
  42. DBG_ERR_FMT("Packet buffer %u wasn't big enough %u, %u bytes will be unread", \
  43. (buf_size), (packet)->header.size, (packet)->header.size - (buf_size)); \
  44. DBG_RETURN(FAIL); \
  45. }\
  46. if (FAIL == conn->net->data->m.receive_ex((conn)->net, (buf), (packet)->header.size, (conn)->stats, ((conn)->error_info) TSRMLS_CC)) { \
  47. CONN_SET_STATE(conn, CONN_QUIT_SENT); \
  48. SET_CLIENT_ERROR(*conn->error_info, CR_SERVER_GONE_ERROR, UNKNOWN_SQLSTATE, mysqlnd_server_gone);\
  49. php_error_docref(NULL TSRMLS_CC, E_WARNING, "%s", mysqlnd_server_gone); \
  50. DBG_ERR_FMT("Empty '%s' packet body", (packet_type_as_text)); \
  51. DBG_RETURN(FAIL);\
  52. } \
  53. MYSQLND_INC_CONN_STATISTIC_W_VALUE2(conn->stats, packet_type_to_statistic_byte_count[packet_type], \
  54. MYSQLND_HEADER_SIZE + (packet)->header.size, \
  55. packet_type_to_statistic_packet_count[packet_type], \
  56. 1); \
  57. }
  58. #define BAIL_IF_NO_MORE_DATA \
  59. if ((size_t)(p - begin) > packet->header.size) { \
  60. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Premature end of data (mysqlnd_wireprotocol.c:%u)", __LINE__); \
  61. goto premature_end; \
  62. } \
  63. static const char *unknown_sqlstate= "HY000";
  64. const char * const mysqlnd_empty_string = "";
  65. /* Used in mysqlnd_debug.c */
  66. const char mysqlnd_read_header_name[] = "mysqlnd_read_header";
  67. const char mysqlnd_read_body_name[] = "mysqlnd_read_body";
  68. #define ERROR_MARKER 0xFF
  69. #define EODATA_MARKER 0xFE
  70. /* {{{ mysqlnd_command_to_text
  71. */
  72. const char * const mysqlnd_command_to_text[COM_END] =
  73. {
  74. "SLEEP", "QUIT", "INIT_DB", "QUERY", "FIELD_LIST",
  75. "CREATE_DB", "DROP_DB", "REFRESH", "SHUTDOWN", "STATISTICS",
  76. "PROCESS_INFO", "CONNECT", "PROCESS_KILL", "DEBUG", "PING",
  77. "TIME", "DELAYED_INSERT", "CHANGE_USER", "BINLOG_DUMP",
  78. "TABLE_DUMP", "CONNECT_OUT", "REGISTER_SLAVE",
  79. "STMT_PREPARE", "STMT_EXECUTE", "STMT_SEND_LONG_DATA", "STMT_CLOSE",
  80. "STMT_RESET", "SET_OPTION", "STMT_FETCH", "DAEMON", "BINLOG_DUMP_GTID",
  81. "RESET_CONNECTION"
  82. };
  83. /* }}} */
  84. static enum_mysqlnd_collected_stats packet_type_to_statistic_byte_count[PROT_LAST] =
  85. {
  86. STAT_LAST,
  87. STAT_LAST,
  88. STAT_BYTES_RECEIVED_OK,
  89. STAT_BYTES_RECEIVED_EOF,
  90. STAT_LAST,
  91. STAT_BYTES_RECEIVED_RSET_HEADER,
  92. STAT_BYTES_RECEIVED_RSET_FIELD_META,
  93. STAT_BYTES_RECEIVED_RSET_ROW,
  94. STAT_BYTES_RECEIVED_PREPARE_RESPONSE,
  95. STAT_BYTES_RECEIVED_CHANGE_USER,
  96. };
  97. static enum_mysqlnd_collected_stats packet_type_to_statistic_packet_count[PROT_LAST] =
  98. {
  99. STAT_LAST,
  100. STAT_LAST,
  101. STAT_PACKETS_RECEIVED_OK,
  102. STAT_PACKETS_RECEIVED_EOF,
  103. STAT_LAST,
  104. STAT_PACKETS_RECEIVED_RSET_HEADER,
  105. STAT_PACKETS_RECEIVED_RSET_FIELD_META,
  106. STAT_PACKETS_RECEIVED_RSET_ROW,
  107. STAT_PACKETS_RECEIVED_PREPARE_RESPONSE,
  108. STAT_PACKETS_RECEIVED_CHANGE_USER,
  109. };
  110. /* {{{ php_mysqlnd_net_field_length
  111. Get next field's length */
  112. unsigned long
  113. php_mysqlnd_net_field_length(zend_uchar **packet)
  114. {
  115. register zend_uchar *p= (zend_uchar *)*packet;
  116. if (*p < 251) {
  117. (*packet)++;
  118. return (unsigned long) *p;
  119. }
  120. switch (*p) {
  121. case 251:
  122. (*packet)++;
  123. return MYSQLND_NULL_LENGTH;
  124. case 252:
  125. (*packet) += 3;
  126. return (unsigned long) uint2korr(p+1);
  127. case 253:
  128. (*packet) += 4;
  129. return (unsigned long) uint3korr(p+1);
  130. default:
  131. (*packet) += 9;
  132. return (unsigned long) uint4korr(p+1);
  133. }
  134. }
  135. /* }}} */
  136. /* {{{ php_mysqlnd_net_field_length_ll
  137. Get next field's length */
  138. uint64_t
  139. php_mysqlnd_net_field_length_ll(zend_uchar **packet)
  140. {
  141. register zend_uchar *p= (zend_uchar *)*packet;
  142. if (*p < 251) {
  143. (*packet)++;
  144. return (uint64_t) *p;
  145. }
  146. switch (*p) {
  147. case 251:
  148. (*packet)++;
  149. return (uint64_t) MYSQLND_NULL_LENGTH;
  150. case 252:
  151. (*packet) += 3;
  152. return (uint64_t) uint2korr(p + 1);
  153. case 253:
  154. (*packet) += 4;
  155. return (uint64_t) uint3korr(p + 1);
  156. default:
  157. (*packet) += 9;
  158. return (uint64_t) uint8korr(p + 1);
  159. }
  160. }
  161. /* }}} */
  162. /* {{{ php_mysqlnd_net_store_length */
  163. zend_uchar *
  164. php_mysqlnd_net_store_length(zend_uchar *packet, uint64_t length)
  165. {
  166. if (length < (uint64_t) L64(251)) {
  167. *packet = (zend_uchar) length;
  168. return packet + 1;
  169. }
  170. if (length < (uint64_t) L64(65536)) {
  171. *packet++ = 252;
  172. int2store(packet,(unsigned int) length);
  173. return packet + 2;
  174. }
  175. if (length < (uint64_t) L64(16777216)) {
  176. *packet++ = 253;
  177. int3store(packet,(ulong) length);
  178. return packet + 3;
  179. }
  180. *packet++ = 254;
  181. int8store(packet, length);
  182. return packet + 8;
  183. }
  184. /* }}} */
  185. /* {{{ php_mysqlnd_net_store_length_size */
  186. size_t
  187. php_mysqlnd_net_store_length_size(uint64_t length)
  188. {
  189. if (length < (uint64_t) L64(251)) {
  190. return 1;
  191. }
  192. if (length < (uint64_t) L64(65536)) {
  193. return 3;
  194. }
  195. if (length < (uint64_t) L64(16777216)) {
  196. return 4;
  197. }
  198. return 9;
  199. }
  200. /* }}} */
  201. /* {{{ php_mysqlnd_read_error_from_line */
  202. static enum_func_status
  203. php_mysqlnd_read_error_from_line(zend_uchar *buf, size_t buf_len,
  204. char *error, int error_buf_len,
  205. unsigned int *error_no, char *sqlstate TSRMLS_DC)
  206. {
  207. zend_uchar *p = buf;
  208. int error_msg_len= 0;
  209. DBG_ENTER("php_mysqlnd_read_error_from_line");
  210. *error_no = CR_UNKNOWN_ERROR;
  211. memcpy(sqlstate, unknown_sqlstate, MYSQLND_SQLSTATE_LENGTH);
  212. if (buf_len > 2) {
  213. *error_no = uint2korr(p);
  214. p+= 2;
  215. /*
  216. sqlstate is following. No need to check for buf_left_len as we checked > 2 above,
  217. if it was >=2 then we would need a check
  218. */
  219. if (*p == '#') {
  220. ++p;
  221. if ((buf_len - (p - buf)) >= MYSQLND_SQLSTATE_LENGTH) {
  222. memcpy(sqlstate, p, MYSQLND_SQLSTATE_LENGTH);
  223. p+= MYSQLND_SQLSTATE_LENGTH;
  224. } else {
  225. goto end;
  226. }
  227. }
  228. if ((buf_len - (p - buf)) > 0) {
  229. error_msg_len = MIN((int)((buf_len - (p - buf))), (int) (error_buf_len - 1));
  230. memcpy(error, p, error_msg_len);
  231. }
  232. }
  233. end:
  234. sqlstate[MYSQLND_SQLSTATE_LENGTH] = '\0';
  235. error[error_msg_len]= '\0';
  236. DBG_RETURN(FAIL);
  237. }
  238. /* }}} */
  239. /* {{{ mysqlnd_read_header */
  240. static enum_func_status
  241. mysqlnd_read_header(MYSQLND_NET * net, MYSQLND_PACKET_HEADER * header,
  242. MYSQLND_STATS * conn_stats, MYSQLND_ERROR_INFO * error_info TSRMLS_DC)
  243. {
  244. zend_uchar buffer[MYSQLND_HEADER_SIZE];
  245. DBG_ENTER(mysqlnd_read_header_name);
  246. DBG_INF_FMT("compressed=%u", net->data->compressed);
  247. if (FAIL == net->data->m.receive_ex(net, buffer, MYSQLND_HEADER_SIZE, conn_stats, error_info TSRMLS_CC)) {
  248. DBG_RETURN(FAIL);
  249. }
  250. header->size = uint3korr(buffer);
  251. header->packet_no = uint1korr(buffer + 3);
  252. #ifdef MYSQLND_DUMP_HEADER_N_BODY
  253. DBG_INF_FMT("HEADER: prot_packet_no=%u size=%3u", header->packet_no, header->size);
  254. #endif
  255. MYSQLND_INC_CONN_STATISTIC_W_VALUE2(conn_stats,
  256. STAT_PROTOCOL_OVERHEAD_IN, MYSQLND_HEADER_SIZE,
  257. STAT_PACKETS_RECEIVED, 1);
  258. if (net->data->compressed || net->packet_no == header->packet_no) {
  259. /*
  260. Have to increase the number, so we can send correct number back. It will
  261. round at 255 as this is unsigned char. The server needs this for simple
  262. flow control checking.
  263. */
  264. net->packet_no++;
  265. DBG_RETURN(PASS);
  266. }
  267. DBG_ERR_FMT("Logical link: packets out of order. Expected %u received %u. Packet size="MYSQLND_SZ_T_SPEC,
  268. net->packet_no, header->packet_no, header->size);
  269. php_error(E_WARNING, "Packets out of order. Expected %u received %u. Packet size="MYSQLND_SZ_T_SPEC,
  270. net->packet_no, header->packet_no, header->size);
  271. DBG_RETURN(FAIL);
  272. }
  273. /* }}} */
  274. /* {{{ php_mysqlnd_greet_read */
  275. static enum_func_status
  276. php_mysqlnd_greet_read(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC)
  277. {
  278. zend_uchar buf[2048];
  279. zend_uchar *p = buf;
  280. zend_uchar *begin = buf;
  281. zend_uchar *pad_start = NULL;
  282. MYSQLND_PACKET_GREET *packet= (MYSQLND_PACKET_GREET *) _packet;
  283. DBG_ENTER("php_mysqlnd_greet_read");
  284. PACKET_READ_HEADER_AND_BODY(packet, conn, buf, sizeof(buf), "greeting", PROT_GREET_PACKET);
  285. BAIL_IF_NO_MORE_DATA;
  286. packet->auth_plugin_data = packet->intern_auth_plugin_data;
  287. packet->auth_plugin_data_len = sizeof(packet->intern_auth_plugin_data);
  288. if (packet->header.size < sizeof(buf)) {
  289. /*
  290. Null-terminate the string, so strdup can work even if the packets have a string at the end,
  291. which is not ASCIIZ
  292. */
  293. buf[packet->header.size] = '\0';
  294. }
  295. packet->protocol_version = uint1korr(p);
  296. p++;
  297. BAIL_IF_NO_MORE_DATA;
  298. if (ERROR_MARKER == packet->protocol_version) {
  299. php_mysqlnd_read_error_from_line(p, packet->header.size - 1,
  300. packet->error, sizeof(packet->error),
  301. &packet->error_no, packet->sqlstate
  302. TSRMLS_CC);
  303. /*
  304. The server doesn't send sqlstate in the greet packet.
  305. It's a bug#26426 , so we have to set it correctly ourselves.
  306. It's probably "Too many connections, which has SQL state 08004".
  307. */
  308. if (packet->error_no == 1040) {
  309. memcpy(packet->sqlstate, "08004", MYSQLND_SQLSTATE_LENGTH);
  310. }
  311. DBG_RETURN(PASS);
  312. }
  313. packet->server_version = estrdup((char *)p);
  314. p+= strlen(packet->server_version) + 1; /* eat the '\0' */
  315. BAIL_IF_NO_MORE_DATA;
  316. packet->thread_id = uint4korr(p);
  317. p+=4;
  318. BAIL_IF_NO_MORE_DATA;
  319. memcpy(packet->auth_plugin_data, p, SCRAMBLE_LENGTH_323);
  320. p+= SCRAMBLE_LENGTH_323;
  321. BAIL_IF_NO_MORE_DATA;
  322. /* pad1 */
  323. p++;
  324. BAIL_IF_NO_MORE_DATA;
  325. packet->server_capabilities = uint2korr(p);
  326. p+= 2;
  327. BAIL_IF_NO_MORE_DATA;
  328. packet->charset_no = uint1korr(p);
  329. p++;
  330. BAIL_IF_NO_MORE_DATA;
  331. packet->server_status = uint2korr(p);
  332. p+= 2;
  333. BAIL_IF_NO_MORE_DATA;
  334. /* pad2 */
  335. pad_start = p;
  336. p+= 13;
  337. BAIL_IF_NO_MORE_DATA;
  338. if ((size_t) (p - buf) < packet->header.size) {
  339. /* auth_plugin_data is split into two parts */
  340. memcpy(packet->auth_plugin_data + SCRAMBLE_LENGTH_323, p, SCRAMBLE_LENGTH - SCRAMBLE_LENGTH_323);
  341. p+= SCRAMBLE_LENGTH - SCRAMBLE_LENGTH_323;
  342. p++; /* 0x0 at the end of the scramble and thus last byte in the packet in 5.1 and previous */
  343. } else {
  344. packet->pre41 = TRUE;
  345. }
  346. /* Is this a 5.5+ server ? */
  347. if ((size_t) (p - buf) < packet->header.size) {
  348. /* backtrack one byte, the 0x0 at the end of the scramble in 5.1 and previous */
  349. p--;
  350. /* Additional 16 bits for server capabilities */
  351. packet->server_capabilities |= uint2korr(pad_start) << 16;
  352. /* And a length of the server scramble in one byte */
  353. packet->auth_plugin_data_len = uint1korr(pad_start + 2);
  354. if (packet->auth_plugin_data_len > SCRAMBLE_LENGTH) {
  355. /* more data*/
  356. zend_uchar * new_auth_plugin_data = emalloc(packet->auth_plugin_data_len);
  357. if (!new_auth_plugin_data) {
  358. goto premature_end;
  359. }
  360. /* copy what we already have */
  361. memcpy(new_auth_plugin_data, packet->auth_plugin_data, SCRAMBLE_LENGTH);
  362. /* add additional scramble data 5.5+ sent us */
  363. memcpy(new_auth_plugin_data + SCRAMBLE_LENGTH, p, packet->auth_plugin_data_len - SCRAMBLE_LENGTH);
  364. p+= (packet->auth_plugin_data_len - SCRAMBLE_LENGTH);
  365. packet->auth_plugin_data = new_auth_plugin_data;
  366. }
  367. }
  368. if (packet->server_capabilities & CLIENT_PLUGIN_AUTH) {
  369. BAIL_IF_NO_MORE_DATA;
  370. /* The server is 5.5.x and supports authentication plugins */
  371. packet->auth_protocol = estrdup((char *)p);
  372. p+= strlen(packet->auth_protocol) + 1; /* eat the '\0' */
  373. }
  374. DBG_INF_FMT("proto=%u server=%s thread_id=%u",
  375. packet->protocol_version, packet->server_version, packet->thread_id);
  376. DBG_INF_FMT("server_capabilities=%u charset_no=%u server_status=%i auth_protocol=%s scramble_length=%u",
  377. packet->server_capabilities, packet->charset_no, packet->server_status,
  378. packet->auth_protocol? packet->auth_protocol:"n/a", packet->auth_plugin_data_len);
  379. DBG_RETURN(PASS);
  380. premature_end:
  381. DBG_ERR_FMT("GREET packet %d bytes shorter than expected", p - begin - packet->header.size);
  382. php_error_docref(NULL TSRMLS_CC, E_WARNING, "GREET packet "MYSQLND_SZ_T_SPEC" bytes shorter than expected",
  383. p - begin - packet->header.size);
  384. DBG_RETURN(FAIL);
  385. }
  386. /* }}} */
  387. /* {{{ php_mysqlnd_greet_free_mem */
  388. static
  389. void php_mysqlnd_greet_free_mem(void * _packet, zend_bool stack_allocation TSRMLS_DC)
  390. {
  391. MYSQLND_PACKET_GREET *p= (MYSQLND_PACKET_GREET *) _packet;
  392. if (p->server_version) {
  393. efree(p->server_version);
  394. p->server_version = NULL;
  395. }
  396. if (p->auth_plugin_data && p->auth_plugin_data != p->intern_auth_plugin_data) {
  397. efree(p->auth_plugin_data);
  398. p->auth_plugin_data = NULL;
  399. }
  400. if (p->auth_protocol) {
  401. efree(p->auth_protocol);
  402. p->auth_protocol = NULL;
  403. }
  404. if (!stack_allocation) {
  405. mnd_pefree(p, p->header.persistent);
  406. }
  407. }
  408. /* }}} */
  409. #define AUTH_WRITE_BUFFER_LEN (MYSQLND_HEADER_SIZE + MYSQLND_MAX_ALLOWED_USER_LEN + SCRAMBLE_LENGTH + MYSQLND_MAX_ALLOWED_DB_LEN + 1 + 4096)
  410. /* {{{ php_mysqlnd_auth_write */
  411. static
  412. size_t php_mysqlnd_auth_write(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC)
  413. {
  414. zend_uchar buffer[AUTH_WRITE_BUFFER_LEN];
  415. zend_uchar *p = buffer + MYSQLND_HEADER_SIZE; /* start after the header */
  416. int len;
  417. MYSQLND_PACKET_AUTH * packet= (MYSQLND_PACKET_AUTH *) _packet;
  418. DBG_ENTER("php_mysqlnd_auth_write");
  419. if (!packet->is_change_user_packet) {
  420. int4store(p, packet->client_flags);
  421. p+= 4;
  422. int4store(p, packet->max_packet_size);
  423. p+= 4;
  424. int1store(p, packet->charset_no);
  425. p++;
  426. memset(p, 0, 23); /* filler */
  427. p+= 23;
  428. }
  429. if (packet->send_auth_data || packet->is_change_user_packet) {
  430. len = MIN(strlen(packet->user), MYSQLND_MAX_ALLOWED_USER_LEN);
  431. memcpy(p, packet->user, len);
  432. p+= len;
  433. *p++ = '\0';
  434. /* defensive coding */
  435. if (packet->auth_data == NULL) {
  436. packet->auth_data_len = 0;
  437. }
  438. if (packet->auth_data_len > 0xFF) {
  439. const char * const msg = "Authentication data too long. "
  440. "Won't fit into the buffer and will be truncated. Authentication will thus fail";
  441. SET_CLIENT_ERROR(*conn->error_info, CR_UNKNOWN_ERROR, UNKNOWN_SQLSTATE, msg);
  442. php_error_docref(NULL TSRMLS_CC, E_WARNING, "%s", msg);
  443. DBG_RETURN(0);
  444. }
  445. int1store(p, packet->auth_data_len);
  446. ++p;
  447. /*!!!!! is the buffer big enough ??? */
  448. if ((sizeof(buffer) - (p - buffer)) < packet->auth_data_len) {
  449. DBG_ERR("the stack buffer was not enough!!");
  450. DBG_RETURN(0);
  451. }
  452. if (packet->auth_data_len) {
  453. memcpy(p, packet->auth_data, packet->auth_data_len);
  454. p+= packet->auth_data_len;
  455. }
  456. if (packet->db) {
  457. /* CLIENT_CONNECT_WITH_DB should have been set */
  458. size_t real_db_len = MIN(MYSQLND_MAX_ALLOWED_DB_LEN, packet->db_len);
  459. memcpy(p, packet->db, real_db_len);
  460. p+= real_db_len;
  461. *p++= '\0';
  462. } else if (packet->is_change_user_packet) {
  463. *p++= '\0';
  464. }
  465. /* no \0 for no DB */
  466. if (packet->is_change_user_packet) {
  467. if (packet->charset_no) {
  468. int2store(p, packet->charset_no);
  469. p+= 2;
  470. }
  471. }
  472. if (packet->auth_plugin_name) {
  473. size_t len = MIN(strlen(packet->auth_plugin_name), sizeof(buffer) - (p - buffer) - 1);
  474. memcpy(p, packet->auth_plugin_name, len);
  475. p+= len;
  476. *p++= '\0';
  477. }
  478. if (packet->connect_attr && zend_hash_num_elements(packet->connect_attr)) {
  479. HashPosition pos_value;
  480. const char ** entry_value;
  481. size_t ca_payload_len = 0;
  482. zend_hash_internal_pointer_reset_ex(packet->connect_attr, &pos_value);
  483. while (SUCCESS == zend_hash_get_current_data_ex(packet->connect_attr, (void **)&entry_value, &pos_value)) {
  484. char *s_key;
  485. unsigned int s_len;
  486. unsigned long num_key;
  487. size_t value_len = strlen(*entry_value);
  488. if (HASH_KEY_IS_STRING == zend_hash_get_current_key_ex(packet->connect_attr, &s_key, &s_len, &num_key, 0, &pos_value)) {
  489. ca_payload_len += php_mysqlnd_net_store_length_size(s_len);
  490. ca_payload_len += s_len;
  491. ca_payload_len += php_mysqlnd_net_store_length_size(value_len);
  492. ca_payload_len += value_len;
  493. }
  494. zend_hash_move_forward_ex(conn->options->connect_attr, &pos_value);
  495. }
  496. if ((sizeof(buffer) - (p - buffer)) >= (ca_payload_len + php_mysqlnd_net_store_length_size(ca_payload_len))) {
  497. p = php_mysqlnd_net_store_length(p, ca_payload_len);
  498. zend_hash_internal_pointer_reset_ex(packet->connect_attr, &pos_value);
  499. while (SUCCESS == zend_hash_get_current_data_ex(packet->connect_attr, (void **)&entry_value, &pos_value)) {
  500. char *s_key;
  501. unsigned int s_len;
  502. unsigned long num_key;
  503. size_t value_len = strlen(*entry_value);
  504. if (HASH_KEY_IS_STRING == zend_hash_get_current_key_ex(packet->connect_attr, &s_key, &s_len, &num_key, 0, &pos_value)) {
  505. /* copy key */
  506. p = php_mysqlnd_net_store_length(p, s_len);
  507. memcpy(p, s_key, s_len);
  508. p+= s_len;
  509. /* copy value */
  510. p = php_mysqlnd_net_store_length(p, value_len);
  511. memcpy(p, *entry_value, value_len);
  512. p+= value_len;
  513. }
  514. zend_hash_move_forward_ex(conn->options->connect_attr, &pos_value);
  515. }
  516. } else {
  517. /* cannot put the data - skip */
  518. }
  519. }
  520. }
  521. if (packet->is_change_user_packet) {
  522. if (PASS != conn->m->simple_command(conn, COM_CHANGE_USER, buffer + MYSQLND_HEADER_SIZE, p - buffer - MYSQLND_HEADER_SIZE,
  523. PROT_LAST /* the caller will handle the OK packet */,
  524. packet->silent, TRUE TSRMLS_CC)) {
  525. DBG_RETURN(0);
  526. }
  527. DBG_RETURN(p - buffer - MYSQLND_HEADER_SIZE);
  528. } else {
  529. size_t sent = conn->net->data->m.send_ex(conn->net, buffer, p - buffer - MYSQLND_HEADER_SIZE, conn->stats, conn->error_info TSRMLS_CC);
  530. if (!sent) {
  531. CONN_SET_STATE(conn, CONN_QUIT_SENT);
  532. }
  533. DBG_RETURN(sent);
  534. }
  535. }
  536. /* }}} */
  537. /* {{{ php_mysqlnd_auth_free_mem */
  538. static
  539. void php_mysqlnd_auth_free_mem(void * _packet, zend_bool stack_allocation TSRMLS_DC)
  540. {
  541. if (!stack_allocation) {
  542. MYSQLND_PACKET_AUTH * p = (MYSQLND_PACKET_AUTH *) _packet;
  543. mnd_pefree(p, p->header.persistent);
  544. }
  545. }
  546. /* }}} */
  547. #define AUTH_RESP_BUFFER_SIZE 2048
  548. /* {{{ php_mysqlnd_auth_response_read */
  549. static enum_func_status
  550. php_mysqlnd_auth_response_read(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC)
  551. {
  552. zend_uchar local_buf[AUTH_RESP_BUFFER_SIZE];
  553. size_t buf_len = conn->net->cmd_buffer.buffer? conn->net->cmd_buffer.length: AUTH_RESP_BUFFER_SIZE;
  554. zend_uchar *buf = conn->net->cmd_buffer.buffer? (zend_uchar *) conn->net->cmd_buffer.buffer : local_buf;
  555. zend_uchar *p = buf;
  556. zend_uchar *begin = buf;
  557. unsigned long i;
  558. register MYSQLND_PACKET_AUTH_RESPONSE * packet= (MYSQLND_PACKET_AUTH_RESPONSE *) _packet;
  559. DBG_ENTER("php_mysqlnd_auth_response_read");
  560. /* leave space for terminating safety \0 */
  561. buf_len--;
  562. PACKET_READ_HEADER_AND_BODY(packet, conn, buf, buf_len, "OK", PROT_OK_PACKET);
  563. BAIL_IF_NO_MORE_DATA;
  564. /*
  565. zero-terminate the buffer for safety. We are sure there is place for the \0
  566. because buf_len is -1 the size of the buffer pointed
  567. */
  568. buf[packet->header.size] = '\0';
  569. /* Should be always 0x0 or ERROR_MARKER for error */
  570. packet->response_code = uint1korr(p);
  571. p++;
  572. BAIL_IF_NO_MORE_DATA;
  573. if (ERROR_MARKER == packet->response_code) {
  574. php_mysqlnd_read_error_from_line(p, packet->header.size - 1,
  575. packet->error, sizeof(packet->error),
  576. &packet->error_no, packet->sqlstate
  577. TSRMLS_CC);
  578. DBG_RETURN(PASS);
  579. }
  580. if (0xFE == packet->response_code) {
  581. /* Authentication Switch Response */
  582. if (packet->header.size > (size_t) (p - buf)) {
  583. packet->new_auth_protocol = mnd_pestrdup((char *)p, FALSE);
  584. packet->new_auth_protocol_len = strlen(packet->new_auth_protocol);
  585. p+= packet->new_auth_protocol_len + 1; /* +1 for the \0 */
  586. packet->new_auth_protocol_data_len = packet->header.size - (size_t) (p - buf);
  587. if (packet->new_auth_protocol_data_len) {
  588. packet->new_auth_protocol_data = mnd_emalloc(packet->new_auth_protocol_data_len);
  589. memcpy(packet->new_auth_protocol_data, p, packet->new_auth_protocol_data_len);
  590. }
  591. DBG_INF_FMT("The server requested switching auth plugin to : %s", packet->new_auth_protocol);
  592. DBG_INF_FMT("Server salt : [%d][%.*s]", packet->new_auth_protocol_data_len, packet->new_auth_protocol_data_len, packet->new_auth_protocol_data);
  593. }
  594. } else {
  595. /* Everything was fine! */
  596. packet->affected_rows = php_mysqlnd_net_field_length_ll(&p);
  597. BAIL_IF_NO_MORE_DATA;
  598. packet->last_insert_id = php_mysqlnd_net_field_length_ll(&p);
  599. BAIL_IF_NO_MORE_DATA;
  600. packet->server_status = uint2korr(p);
  601. p+= 2;
  602. BAIL_IF_NO_MORE_DATA;
  603. packet->warning_count = uint2korr(p);
  604. p+= 2;
  605. BAIL_IF_NO_MORE_DATA;
  606. /* There is a message */
  607. if (packet->header.size > (size_t) (p - buf) && (i = php_mysqlnd_net_field_length(&p))) {
  608. packet->message_len = MIN(i, buf_len - (p - begin));
  609. packet->message = mnd_pestrndup((char *)p, packet->message_len, FALSE);
  610. } else {
  611. packet->message = NULL;
  612. packet->message_len = 0;
  613. }
  614. DBG_INF_FMT("OK packet: aff_rows=%lld last_ins_id=%ld server_status=%u warnings=%u",
  615. packet->affected_rows, packet->last_insert_id, packet->server_status,
  616. packet->warning_count);
  617. }
  618. DBG_RETURN(PASS);
  619. premature_end:
  620. DBG_ERR_FMT("OK packet %d bytes shorter than expected", p - begin - packet->header.size);
  621. php_error_docref(NULL TSRMLS_CC, E_WARNING, "AUTH_RESPONSE packet "MYSQLND_SZ_T_SPEC" bytes shorter than expected",
  622. p - begin - packet->header.size);
  623. DBG_RETURN(FAIL);
  624. }
  625. /* }}} */
  626. /* {{{ php_mysqlnd_auth_response_free_mem */
  627. static void
  628. php_mysqlnd_auth_response_free_mem(void * _packet, zend_bool stack_allocation TSRMLS_DC)
  629. {
  630. MYSQLND_PACKET_AUTH_RESPONSE * p = (MYSQLND_PACKET_AUTH_RESPONSE *) _packet;
  631. if (p->message) {
  632. mnd_efree(p->message);
  633. p->message = NULL;
  634. }
  635. if (p->new_auth_protocol) {
  636. mnd_efree(p->new_auth_protocol);
  637. p->new_auth_protocol = NULL;
  638. }
  639. p->new_auth_protocol_len = 0;
  640. if (p->new_auth_protocol_data) {
  641. mnd_efree(p->new_auth_protocol_data);
  642. p->new_auth_protocol_data = NULL;
  643. }
  644. p->new_auth_protocol_data_len = 0;
  645. if (!stack_allocation) {
  646. mnd_pefree(p, p->header.persistent);
  647. }
  648. }
  649. /* }}} */
  650. /* {{{ php_mysqlnd_change_auth_response_write */
  651. static size_t
  652. php_mysqlnd_change_auth_response_write(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC)
  653. {
  654. MYSQLND_PACKET_CHANGE_AUTH_RESPONSE *packet= (MYSQLND_PACKET_CHANGE_AUTH_RESPONSE *) _packet;
  655. zend_uchar * buffer = conn->net->cmd_buffer.length >= packet->auth_data_len? conn->net->cmd_buffer.buffer : mnd_emalloc(packet->auth_data_len);
  656. zend_uchar *p = buffer + MYSQLND_HEADER_SIZE; /* start after the header */
  657. DBG_ENTER("php_mysqlnd_change_auth_response_write");
  658. if (packet->auth_data_len) {
  659. memcpy(p, packet->auth_data, packet->auth_data_len);
  660. p+= packet->auth_data_len;
  661. }
  662. {
  663. size_t sent = conn->net->data->m.send_ex(conn->net, buffer, p - buffer - MYSQLND_HEADER_SIZE, conn->stats, conn->error_info TSRMLS_CC);
  664. if (buffer != conn->net->cmd_buffer.buffer) {
  665. mnd_efree(buffer);
  666. }
  667. if (!sent) {
  668. CONN_SET_STATE(conn, CONN_QUIT_SENT);
  669. }
  670. DBG_RETURN(sent);
  671. }
  672. }
  673. /* }}} */
  674. /* {{{ php_mysqlnd_change_auth_response_free_mem */
  675. static void
  676. php_mysqlnd_change_auth_response_free_mem(void * _packet, zend_bool stack_allocation TSRMLS_DC)
  677. {
  678. if (!stack_allocation) {
  679. MYSQLND_PACKET_CHANGE_AUTH_RESPONSE * p = (MYSQLND_PACKET_CHANGE_AUTH_RESPONSE *) _packet;
  680. mnd_pefree(p, p->header.persistent);
  681. }
  682. }
  683. /* }}} */
  684. #define OK_BUFFER_SIZE 2048
  685. /* {{{ php_mysqlnd_ok_read */
  686. static enum_func_status
  687. php_mysqlnd_ok_read(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC)
  688. {
  689. zend_uchar local_buf[OK_BUFFER_SIZE];
  690. size_t buf_len = conn->net->cmd_buffer.buffer? conn->net->cmd_buffer.length : OK_BUFFER_SIZE;
  691. zend_uchar *buf = conn->net->cmd_buffer.buffer? (zend_uchar *) conn->net->cmd_buffer.buffer : local_buf;
  692. zend_uchar *p = buf;
  693. zend_uchar *begin = buf;
  694. unsigned long i;
  695. register MYSQLND_PACKET_OK *packet= (MYSQLND_PACKET_OK *) _packet;
  696. DBG_ENTER("php_mysqlnd_ok_read");
  697. PACKET_READ_HEADER_AND_BODY(packet, conn, buf, buf_len, "OK", PROT_OK_PACKET);
  698. BAIL_IF_NO_MORE_DATA;
  699. /* Should be always 0x0 or ERROR_MARKER for error */
  700. packet->field_count = uint1korr(p);
  701. p++;
  702. BAIL_IF_NO_MORE_DATA;
  703. if (ERROR_MARKER == packet->field_count) {
  704. php_mysqlnd_read_error_from_line(p, packet->header.size - 1,
  705. packet->error, sizeof(packet->error),
  706. &packet->error_no, packet->sqlstate
  707. TSRMLS_CC);
  708. DBG_INF_FMT("conn->server_status=%u", conn->upsert_status->server_status);
  709. DBG_RETURN(PASS);
  710. }
  711. /* Everything was fine! */
  712. packet->affected_rows = php_mysqlnd_net_field_length_ll(&p);
  713. BAIL_IF_NO_MORE_DATA;
  714. packet->last_insert_id = php_mysqlnd_net_field_length_ll(&p);
  715. BAIL_IF_NO_MORE_DATA;
  716. packet->server_status = uint2korr(p);
  717. p+= 2;
  718. BAIL_IF_NO_MORE_DATA;
  719. packet->warning_count = uint2korr(p);
  720. p+= 2;
  721. BAIL_IF_NO_MORE_DATA;
  722. /* There is a message */
  723. if (packet->header.size > (size_t) (p - buf) && (i = php_mysqlnd_net_field_length(&p))) {
  724. packet->message_len = MIN(i, buf_len - (p - begin));
  725. packet->message = mnd_pestrndup((char *)p, packet->message_len, FALSE);
  726. } else {
  727. packet->message = NULL;
  728. packet->message_len = 0;
  729. }
  730. DBG_INF_FMT("OK packet: aff_rows=%lld last_ins_id=%ld server_status=%u warnings=%u",
  731. packet->affected_rows, packet->last_insert_id, packet->server_status,
  732. packet->warning_count);
  733. BAIL_IF_NO_MORE_DATA;
  734. DBG_RETURN(PASS);
  735. premature_end:
  736. DBG_ERR_FMT("OK packet %d bytes shorter than expected", p - begin - packet->header.size);
  737. php_error_docref(NULL TSRMLS_CC, E_WARNING, "OK packet "MYSQLND_SZ_T_SPEC" bytes shorter than expected",
  738. p - begin - packet->header.size);
  739. DBG_RETURN(FAIL);
  740. }
  741. /* }}} */
  742. /* {{{ php_mysqlnd_ok_free_mem */
  743. static void
  744. php_mysqlnd_ok_free_mem(void * _packet, zend_bool stack_allocation TSRMLS_DC)
  745. {
  746. MYSQLND_PACKET_OK *p= (MYSQLND_PACKET_OK *) _packet;
  747. if (p->message) {
  748. mnd_efree(p->message);
  749. p->message = NULL;
  750. }
  751. if (!stack_allocation) {
  752. mnd_pefree(p, p->header.persistent);
  753. }
  754. }
  755. /* }}} */
  756. /* {{{ php_mysqlnd_eof_read */
  757. static enum_func_status
  758. php_mysqlnd_eof_read(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC)
  759. {
  760. /*
  761. EOF packet is since 4.1 five bytes long,
  762. but we can get also an error, make it bigger.
  763. Error : error_code + '#' + sqlstate + MYSQLND_ERRMSG_SIZE
  764. */
  765. MYSQLND_PACKET_EOF *packet= (MYSQLND_PACKET_EOF *) _packet;
  766. size_t buf_len = conn->net->cmd_buffer.length;
  767. zend_uchar *buf = (zend_uchar *) conn->net->cmd_buffer.buffer;
  768. zend_uchar *p = buf;
  769. zend_uchar *begin = buf;
  770. DBG_ENTER("php_mysqlnd_eof_read");
  771. PACKET_READ_HEADER_AND_BODY(packet, conn, buf, buf_len, "EOF", PROT_EOF_PACKET);
  772. BAIL_IF_NO_MORE_DATA;
  773. /* Should be always EODATA_MARKER */
  774. packet->field_count = uint1korr(p);
  775. p++;
  776. BAIL_IF_NO_MORE_DATA;
  777. if (ERROR_MARKER == packet->field_count) {
  778. php_mysqlnd_read_error_from_line(p, packet->header.size - 1,
  779. packet->error, sizeof(packet->error),
  780. &packet->error_no, packet->sqlstate
  781. TSRMLS_CC);
  782. DBG_RETURN(PASS);
  783. }
  784. /*
  785. 4.1 sends 1 byte EOF packet after metadata of
  786. PREPARE/EXECUTE but 5 bytes after the result. This is not
  787. according to the Docs@Forge!!!
  788. */
  789. if (packet->header.size > 1) {
  790. packet->warning_count = uint2korr(p);
  791. p+= 2;
  792. BAIL_IF_NO_MORE_DATA;
  793. packet->server_status = uint2korr(p);
  794. p+= 2;
  795. BAIL_IF_NO_MORE_DATA;
  796. } else {
  797. packet->warning_count = 0;
  798. packet->server_status = 0;
  799. }
  800. BAIL_IF_NO_MORE_DATA;
  801. DBG_INF_FMT("EOF packet: fields=%u status=%u warnings=%u",
  802. packet->field_count, packet->server_status, packet->warning_count);
  803. DBG_RETURN(PASS);
  804. premature_end:
  805. DBG_ERR_FMT("EOF packet %d bytes shorter than expected", p - begin - packet->header.size);
  806. php_error_docref(NULL TSRMLS_CC, E_WARNING, "EOF packet "MYSQLND_SZ_T_SPEC" bytes shorter than expected",
  807. p - begin - packet->header.size);
  808. DBG_RETURN(FAIL);
  809. }
  810. /* }}} */
  811. /* {{{ php_mysqlnd_eof_free_mem */
  812. static
  813. void php_mysqlnd_eof_free_mem(void * _packet, zend_bool stack_allocation TSRMLS_DC)
  814. {
  815. if (!stack_allocation) {
  816. mnd_pefree(_packet, ((MYSQLND_PACKET_EOF *)_packet)->header.persistent);
  817. }
  818. }
  819. /* }}} */
  820. /* {{{ php_mysqlnd_cmd_write */
  821. size_t php_mysqlnd_cmd_write(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC)
  822. {
  823. /* Let's have some space, which we can use, if not enough, we will allocate new buffer */
  824. MYSQLND_PACKET_COMMAND * packet= (MYSQLND_PACKET_COMMAND *) _packet;
  825. MYSQLND_NET * net = conn->net;
  826. unsigned int error_reporting = EG(error_reporting);
  827. size_t sent = 0;
  828. DBG_ENTER("php_mysqlnd_cmd_write");
  829. /*
  830. Reset packet_no, or we will get bad handshake!
  831. Every command starts a new TX and packet numbers are reset to 0.
  832. */
  833. net->packet_no = 0;
  834. net->compressed_envelope_packet_no = 0; /* this is for the response */
  835. if (error_reporting) {
  836. EG(error_reporting) = 0;
  837. }
  838. MYSQLND_INC_CONN_STATISTIC(conn->stats, STAT_PACKETS_SENT_CMD);
  839. #ifdef MYSQLND_DO_WIRE_CHECK_BEFORE_COMMAND
  840. net->data->m.consume_uneaten_data(net, packet->command TSRMLS_CC);
  841. #endif
  842. if (!packet->argument || !packet->arg_len) {
  843. zend_uchar buffer[MYSQLND_HEADER_SIZE + 1];
  844. int1store(buffer + MYSQLND_HEADER_SIZE, packet->command);
  845. sent = net->data->m.send_ex(net, buffer, 1, conn->stats, conn->error_info TSRMLS_CC);
  846. } else {
  847. size_t tmp_len = packet->arg_len + 1 + MYSQLND_HEADER_SIZE;
  848. zend_uchar *tmp, *p;
  849. tmp = (tmp_len > net->cmd_buffer.length)? mnd_emalloc(tmp_len):net->cmd_buffer.buffer;
  850. if (!tmp) {
  851. goto end;
  852. }
  853. p = tmp + MYSQLND_HEADER_SIZE; /* skip the header */
  854. int1store(p, packet->command);
  855. p++;
  856. memcpy(p, packet->argument, packet->arg_len);
  857. sent = net->data->m.send_ex(net, tmp, tmp_len - MYSQLND_HEADER_SIZE, conn->stats, conn->error_info TSRMLS_CC);
  858. if (tmp != net->cmd_buffer.buffer) {
  859. MYSQLND_INC_CONN_STATISTIC(conn->stats, STAT_CMD_BUFFER_TOO_SMALL);
  860. mnd_efree(tmp);
  861. }
  862. }
  863. end:
  864. if (error_reporting) {
  865. /* restore error reporting */
  866. EG(error_reporting) = error_reporting;
  867. }
  868. if (!sent) {
  869. CONN_SET_STATE(conn, CONN_QUIT_SENT);
  870. }
  871. DBG_RETURN(sent);
  872. }
  873. /* }}} */
  874. /* {{{ php_mysqlnd_cmd_free_mem */
  875. static
  876. void php_mysqlnd_cmd_free_mem(void * _packet, zend_bool stack_allocation TSRMLS_DC)
  877. {
  878. if (!stack_allocation) {
  879. MYSQLND_PACKET_COMMAND * p = (MYSQLND_PACKET_COMMAND *) _packet;
  880. mnd_pefree(p, p->header.persistent);
  881. }
  882. }
  883. /* }}} */
  884. /* {{{ php_mysqlnd_rset_header_read */
  885. static enum_func_status
  886. php_mysqlnd_rset_header_read(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC)
  887. {
  888. enum_func_status ret = PASS;
  889. size_t buf_len = conn->net->cmd_buffer.length;
  890. zend_uchar *buf = (zend_uchar *) conn->net->cmd_buffer.buffer;
  891. zend_uchar *p = buf;
  892. zend_uchar *begin = buf;
  893. size_t len;
  894. MYSQLND_PACKET_RSET_HEADER *packet= (MYSQLND_PACKET_RSET_HEADER *) _packet;
  895. DBG_ENTER("php_mysqlnd_rset_header_read");
  896. PACKET_READ_HEADER_AND_BODY(packet, conn, buf, buf_len, "resultset header", PROT_RSET_HEADER_PACKET);
  897. BAIL_IF_NO_MORE_DATA;
  898. /*
  899. Don't increment. First byte is ERROR_MARKER on error, but otherwise is starting byte
  900. of encoded sequence for length.
  901. */
  902. if (ERROR_MARKER == *p) {
  903. /* Error */
  904. p++;
  905. BAIL_IF_NO_MORE_DATA;
  906. php_mysqlnd_read_error_from_line(p, packet->header.size - 1,
  907. packet->error_info.error, sizeof(packet->error_info.error),
  908. &packet->error_info.error_no, packet->error_info.sqlstate
  909. TSRMLS_CC);
  910. DBG_INF_FMT("conn->server_status=%u", conn->upsert_status->server_status);
  911. DBG_RETURN(PASS);
  912. }
  913. packet->field_count = php_mysqlnd_net_field_length(&p);
  914. BAIL_IF_NO_MORE_DATA;
  915. switch (packet->field_count) {
  916. case MYSQLND_NULL_LENGTH:
  917. DBG_INF("LOAD LOCAL");
  918. /*
  919. First byte in the packet is the field count.
  920. Thus, the name is size - 1. And we add 1 for a trailing \0.
  921. Because we have BAIL_IF_NO_MORE_DATA before the switch, we are guaranteed
  922. that packet->header.size is > 0. Which means that len can't underflow, that
  923. would lead to 0 byte allocation but 2^32 or 2^64 bytes copied.
  924. */
  925. len = packet->header.size - 1;
  926. packet->info_or_local_file = mnd_emalloc(len + 1);
  927. if (packet->info_or_local_file) {
  928. memcpy(packet->info_or_local_file, p, len);
  929. packet->info_or_local_file[len] = '\0';
  930. packet->info_or_local_file_len = len;
  931. } else {
  932. SET_OOM_ERROR(*conn->error_info);
  933. ret = FAIL;
  934. }
  935. break;
  936. case 0x00:
  937. DBG_INF("UPSERT");
  938. packet->affected_rows = php_mysqlnd_net_field_length_ll(&p);
  939. BAIL_IF_NO_MORE_DATA;
  940. packet->last_insert_id = php_mysqlnd_net_field_length_ll(&p);
  941. BAIL_IF_NO_MORE_DATA;
  942. packet->server_status = uint2korr(p);
  943. p+=2;
  944. BAIL_IF_NO_MORE_DATA;
  945. packet->warning_count = uint2korr(p);
  946. p+=2;
  947. BAIL_IF_NO_MORE_DATA;
  948. /* Check for additional textual data */
  949. if (packet->header.size > (size_t) (p - buf) && (len = php_mysqlnd_net_field_length(&p))) {
  950. packet->info_or_local_file = mnd_emalloc(len + 1);
  951. if (packet->info_or_local_file) {
  952. memcpy(packet->info_or_local_file, p, len);
  953. packet->info_or_local_file[len] = '\0';
  954. packet->info_or_local_file_len = len;
  955. } else {
  956. SET_OOM_ERROR(*conn->error_info);
  957. ret = FAIL;
  958. }
  959. }
  960. DBG_INF_FMT("affected_rows=%llu last_insert_id=%llu server_status=%u warning_count=%u",
  961. packet->affected_rows, packet->last_insert_id,
  962. packet->server_status, packet->warning_count);
  963. break;
  964. default:
  965. DBG_INF("SELECT");
  966. /* Result set */
  967. break;
  968. }
  969. BAIL_IF_NO_MORE_DATA;
  970. DBG_RETURN(ret);
  971. premature_end:
  972. DBG_ERR_FMT("RSET_HEADER packet %d bytes shorter than expected", p - begin - packet->header.size);
  973. php_error_docref(NULL TSRMLS_CC, E_WARNING, "RSET_HEADER packet "MYSQLND_SZ_T_SPEC" bytes shorter than expected",
  974. p - begin - packet->header.size);
  975. DBG_RETURN(FAIL);
  976. }
  977. /* }}} */
  978. /* {{{ php_mysqlnd_rset_header_free_mem */
  979. static
  980. void php_mysqlnd_rset_header_free_mem(void * _packet, zend_bool stack_allocation TSRMLS_DC)
  981. {
  982. MYSQLND_PACKET_RSET_HEADER *p= (MYSQLND_PACKET_RSET_HEADER *) _packet;
  983. DBG_ENTER("php_mysqlnd_rset_header_free_mem");
  984. if (p->info_or_local_file) {
  985. mnd_efree(p->info_or_local_file);
  986. p->info_or_local_file = NULL;
  987. }
  988. if (!stack_allocation) {
  989. mnd_pefree(p, p->header.persistent);
  990. }
  991. DBG_VOID_RETURN;
  992. }
  993. /* }}} */
  994. static size_t rset_field_offsets[] =
  995. {
  996. STRUCT_OFFSET(MYSQLND_FIELD, catalog),
  997. STRUCT_OFFSET(MYSQLND_FIELD, catalog_length),
  998. STRUCT_OFFSET(MYSQLND_FIELD, db),
  999. STRUCT_OFFSET(MYSQLND_FIELD, db_length),
  1000. STRUCT_OFFSET(MYSQLND_FIELD, table),
  1001. STRUCT_OFFSET(MYSQLND_FIELD, table_length),
  1002. STRUCT_OFFSET(MYSQLND_FIELD, org_table),
  1003. STRUCT_OFFSET(MYSQLND_FIELD, org_table_length),
  1004. STRUCT_OFFSET(MYSQLND_FIELD, name),
  1005. STRUCT_OFFSET(MYSQLND_FIELD, name_length),
  1006. STRUCT_OFFSET(MYSQLND_FIELD, org_name),
  1007. STRUCT_OFFSET(MYSQLND_FIELD, org_name_length)
  1008. };
  1009. /* {{{ php_mysqlnd_rset_field_read */
  1010. static enum_func_status
  1011. php_mysqlnd_rset_field_read(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC)
  1012. {
  1013. /* Should be enough for the metadata of a single row */
  1014. MYSQLND_PACKET_RES_FIELD *packet= (MYSQLND_PACKET_RES_FIELD *) _packet;
  1015. size_t buf_len = conn->net->cmd_buffer.length, total_len = 0;
  1016. zend_uchar *buf = (zend_uchar *) conn->net->cmd_buffer.buffer;
  1017. zend_uchar *p = buf;
  1018. zend_uchar *begin = buf;
  1019. char *root_ptr;
  1020. unsigned long len;
  1021. MYSQLND_FIELD *meta;
  1022. unsigned int i, field_count = sizeof(rset_field_offsets)/sizeof(size_t);
  1023. DBG_ENTER("php_mysqlnd_rset_field_read");
  1024. PACKET_READ_HEADER_AND_BODY(packet, conn, buf, buf_len, "field", PROT_RSET_FLD_PACKET);
  1025. if (packet->skip_parsing) {
  1026. DBG_RETURN(PASS);
  1027. }
  1028. BAIL_IF_NO_MORE_DATA;
  1029. if (ERROR_MARKER == *p) {
  1030. /* Error */
  1031. p++;
  1032. BAIL_IF_NO_MORE_DATA;
  1033. php_mysqlnd_read_error_from_line(p, packet->header.size - 1,
  1034. packet->error_info.error, sizeof(packet->error_info.error),
  1035. &packet->error_info.error_no, packet->error_info.sqlstate
  1036. TSRMLS_CC);
  1037. DBG_ERR_FMT("Server error : (%u) %s", packet->error_info.error_no, packet->error_info.error);
  1038. DBG_RETURN(PASS);
  1039. } else if (EODATA_MARKER == *p && packet->header.size < 8) {
  1040. /* Premature EOF. That should be COM_FIELD_LIST */
  1041. DBG_INF("Premature EOF. That should be COM_FIELD_LIST");
  1042. packet->stupid_list_fields_eof = TRUE;
  1043. DBG_RETURN(PASS);
  1044. }
  1045. meta = packet->metadata;
  1046. for (i = 0; i < field_count; i += 2) {
  1047. len = php_mysqlnd_net_field_length(&p);
  1048. BAIL_IF_NO_MORE_DATA;
  1049. switch ((len)) {
  1050. case 0:
  1051. *(const char **)(((char*)meta) + rset_field_offsets[i]) = mysqlnd_empty_string;
  1052. *(unsigned int *)(((char*)meta) + rset_field_offsets[i+1]) = 0;
  1053. break;
  1054. case MYSQLND_NULL_LENGTH:
  1055. goto faulty_or_fake;
  1056. default:
  1057. *(const char **)(((char *)meta) + rset_field_offsets[i]) = (const char *)p;
  1058. *(unsigned int *)(((char*)meta) + rset_field_offsets[i+1]) = len;
  1059. p += len;
  1060. total_len += len + 1;
  1061. break;
  1062. }
  1063. BAIL_IF_NO_MORE_DATA;
  1064. }
  1065. /* 1 byte length */
  1066. if (12 != *p) {
  1067. DBG_ERR_FMT("Protocol error. Server sent false length. Expected 12 got %d", (int) *p);
  1068. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Protocol error. Server sent false length. Expected 12");
  1069. }
  1070. p++;
  1071. BAIL_IF_NO_MORE_DATA;
  1072. meta->charsetnr = uint2korr(p);
  1073. p += 2;
  1074. BAIL_IF_NO_MORE_DATA;
  1075. meta->length = uint4korr(p);
  1076. p += 4;
  1077. BAIL_IF_NO_MORE_DATA;
  1078. meta->type = uint1korr(p);
  1079. p += 1;
  1080. BAIL_IF_NO_MORE_DATA;
  1081. meta->flags = uint2korr(p);
  1082. p += 2;
  1083. BAIL_IF_NO_MORE_DATA;
  1084. meta->decimals = uint1korr(p);
  1085. p += 1;
  1086. BAIL_IF_NO_MORE_DATA;
  1087. /* 2 byte filler */
  1088. p +=2;
  1089. BAIL_IF_NO_MORE_DATA;
  1090. /* Should we set NUM_FLAG (libmysql does it) ? */
  1091. if (
  1092. (meta->type <= MYSQL_TYPE_INT24 &&
  1093. (meta->type != MYSQL_TYPE_TIMESTAMP || meta->length == 14 || meta->length == 8)
  1094. ) || meta->type == MYSQL_TYPE_YEAR)
  1095. {
  1096. meta->flags |= NUM_FLAG;
  1097. }
  1098. /*
  1099. def could be empty, thus don't allocate on the root.
  1100. NULL_LENGTH (0xFB) comes from COM_FIELD_LIST when the default value is NULL.
  1101. Otherwise the string is length encoded.
  1102. */
  1103. if (packet->header.size > (size_t) (p - buf) &&
  1104. (len = php_mysqlnd_net_field_length(&p)) &&
  1105. len != MYSQLND_NULL_LENGTH)
  1106. {
  1107. BAIL_IF_NO_MORE_DATA;
  1108. DBG_INF_FMT("Def found, length %lu, persistent=%u", len, packet->persistent_alloc);
  1109. meta->def = mnd_pemalloc(len + 1, packet->persistent_alloc);
  1110. if (!meta->def) {
  1111. SET_OOM_ERROR(*conn->error_info);
  1112. DBG_RETURN(FAIL);
  1113. }
  1114. memcpy(meta->def, p, len);
  1115. meta->def[len] = '\0';
  1116. meta->def_length = len;
  1117. p += len;
  1118. }
  1119. DBG_INF_FMT("allocing root. persistent=%u", packet->persistent_alloc);
  1120. root_ptr = meta->root = mnd_pemalloc(total_len, packet->persistent_alloc);
  1121. if (!root_ptr) {
  1122. SET_OOM_ERROR(*conn->error_info);
  1123. DBG_RETURN(FAIL);
  1124. }
  1125. meta->root_len = total_len;
  1126. /* Now do allocs */
  1127. if (meta->catalog && meta->catalog != mysqlnd_empty_string) {
  1128. len = meta->catalog_length;
  1129. meta->catalog = memcpy(root_ptr, meta->catalog, len);
  1130. *(root_ptr +=len) = '\0';
  1131. root_ptr++;
  1132. }
  1133. if (meta->db && meta->db != mysqlnd_empty_string) {
  1134. len = meta->db_length;
  1135. meta->db = memcpy(root_ptr, meta->db, len);
  1136. *(root_ptr +=len) = '\0';
  1137. root_ptr++;
  1138. }
  1139. if (meta->table && meta->table != mysqlnd_empty_string) {
  1140. len = meta->table_length;
  1141. meta->table = memcpy(root_ptr, meta->table, len);
  1142. *(root_ptr +=len) = '\0';
  1143. root_ptr++;
  1144. }
  1145. if (meta->org_table && meta->org_table != mysqlnd_empty_string) {
  1146. len = meta->org_table_length;
  1147. meta->org_table = memcpy(root_ptr, meta->org_table, len);
  1148. *(root_ptr +=len) = '\0';
  1149. root_ptr++;
  1150. }
  1151. if (meta->name && meta->name != mysqlnd_empty_string) {
  1152. len = meta->name_length;
  1153. meta->name = memcpy(root_ptr, meta->name, len);
  1154. *(root_ptr +=len) = '\0';
  1155. root_ptr++;
  1156. }
  1157. if (meta->org_name && meta->org_name != mysqlnd_empty_string) {
  1158. len = meta->org_name_length;
  1159. meta->org_name = memcpy(root_ptr, meta->org_name, len);
  1160. *(root_ptr +=len) = '\0';
  1161. root_ptr++;
  1162. }
  1163. DBG_INF_FMT("FIELD=[%s.%s.%s]", meta->db? meta->db:"*NA*", meta->table? meta->table:"*NA*",
  1164. meta->name? meta->name:"*NA*");
  1165. DBG_RETURN(PASS);
  1166. faulty_or_fake:
  1167. DBG_ERR_FMT("Protocol error. Server sent NULL_LENGTH. The server is faulty");
  1168. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Protocol error. Server sent NULL_LENGTH."
  1169. " The server is faulty");
  1170. DBG_RETURN(FAIL);
  1171. premature_end:
  1172. DBG_ERR_FMT("RSET field packet %d bytes shorter than expected", p - begin - packet->header.size);
  1173. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Result set field packet "MYSQLND_SZ_T_SPEC" bytes "
  1174. "shorter than expected", p - begin - packet->header.size);
  1175. DBG_RETURN(FAIL);
  1176. }
  1177. /* }}} */
  1178. /* {{{ php_mysqlnd_rset_field_free_mem */
  1179. static
  1180. void php_mysqlnd_rset_field_free_mem(void * _packet, zend_bool stack_allocation TSRMLS_DC)
  1181. {
  1182. MYSQLND_PACKET_RES_FIELD *p= (MYSQLND_PACKET_RES_FIELD *) _packet;
  1183. /* p->metadata was passed to us as temporal buffer */
  1184. if (!stack_allocation) {
  1185. mnd_pefree(p, p->header.persistent);
  1186. }
  1187. }
  1188. /* }}} */
  1189. /* {{{ php_mysqlnd_read_row_ex */
  1190. static enum_func_status
  1191. php_mysqlnd_read_row_ex(MYSQLND_CONN_DATA * conn, MYSQLND_MEMORY_POOL * result_set_memory_pool,
  1192. MYSQLND_MEMORY_POOL_CHUNK ** buffer,
  1193. size_t * data_size, zend_bool persistent_alloc,
  1194. unsigned int prealloc_more_bytes TSRMLS_DC)
  1195. {
  1196. enum_func_status ret = PASS;
  1197. MYSQLND_PACKET_HEADER header;
  1198. zend_uchar * p = NULL;
  1199. zend_bool first_iteration = TRUE;
  1200. DBG_ENTER("php_mysqlnd_read_row_ex");
  1201. /*
  1202. To ease the process the server splits everything in packets up to 2^24 - 1.
  1203. Even in the case the payload is evenly divisible by this value, the last
  1204. packet will be empty, namely 0 bytes. Thus, we can read every packet and ask
  1205. for next one if they have 2^24 - 1 sizes. But just read the header of a
  1206. zero-length byte, don't read the body, there is no such.
  1207. */
  1208. *data_size = prealloc_more_bytes;
  1209. while (1) {
  1210. if (FAIL == mysqlnd_read_header(conn->net, &header, conn->stats, conn->error_info TSRMLS_CC)) {
  1211. ret = FAIL;
  1212. break;
  1213. }
  1214. *data_size += header.size;
  1215. if (first_iteration) {
  1216. first_iteration = FALSE;
  1217. /*
  1218. We need a trailing \0 for the last string, in case of text-mode,
  1219. to be able to implement read-only variables. Thus, we add + 1.
  1220. */
  1221. *buffer = result_set_memory_pool->get_chunk(result_set_memory_pool, *data_size + 1 TSRMLS_CC);
  1222. if (!*buffer) {
  1223. ret = FAIL;
  1224. break;
  1225. }
  1226. p = (*buffer)->ptr;
  1227. } else if (!first_iteration) {
  1228. /* Empty packet after MYSQLND_MAX_PACKET_SIZE packet. That's ok, break */
  1229. if (!header.size) {
  1230. break;
  1231. }
  1232. /*
  1233. We have to realloc the buffer.
  1234. We need a trailing \0 for the last string, in case of text-mode,
  1235. to be able to implement read-only variables.
  1236. */
  1237. if (FAIL == (*buffer)->resize_chunk((*buffer), *data_size + 1 TSRMLS_CC)) {
  1238. SET_OOM_ERROR(*conn->error_info);
  1239. ret = FAIL;
  1240. break;
  1241. }
  1242. /* The position could have changed, recalculate */
  1243. p = (*buffer)->ptr + (*data_size - header.size);
  1244. }
  1245. if (PASS != (ret = conn->net->data->m.receive_ex(conn->net, p, header.size, conn->stats, conn->error_info TSRMLS_CC))) {
  1246. DBG_ERR("Empty row packet body");
  1247. php_error(E_WARNING, "Empty row packet body");
  1248. break;
  1249. }
  1250. if (header.size < MYSQLND_MAX_PACKET_SIZE) {
  1251. break;
  1252. }
  1253. }
  1254. if (ret == FAIL && *buffer) {
  1255. (*buffer)->free_chunk((*buffer) TSRMLS_CC);
  1256. *buffer = NULL;
  1257. }
  1258. *data_size -= prealloc_more_bytes;
  1259. DBG_RETURN(ret);
  1260. }
  1261. /* }}} */
  1262. /* {{{ php_mysqlnd_rowp_read_binary_protocol */
  1263. enum_func_status
  1264. php_mysqlnd_rowp_read_binary_protocol(MYSQLND_MEMORY_POOL_CHUNK * row_buffer, zval ** fields,
  1265. unsigned int field_count, const MYSQLND_FIELD * fields_metadata,
  1266. zend_bool as_int_or_float, MYSQLND_STATS * stats TSRMLS_DC)
  1267. {
  1268. unsigned int i;
  1269. zend_uchar * p = row_buffer->ptr;
  1270. zend_uchar * null_ptr, bit;
  1271. zval **current_field, **end_field, **start_field;
  1272. DBG_ENTER("php_mysqlnd_rowp_read_binary_protocol");
  1273. if (!fields) {
  1274. DBG_RETURN(FAIL);
  1275. }
  1276. end_field = (start_field = fields) + field_count;
  1277. /* skip the first byte, not EODATA_MARKER -> 0x0, status */
  1278. p++;
  1279. null_ptr= p;
  1280. p += (field_count + 9)/8; /* skip null bits */
  1281. bit = 4; /* first 2 bits are reserved */
  1282. for (i = 0, current_field = start_field; current_field < end_field; current_field++, i++) {
  1283. DBG_INF("Directly creating zval");
  1284. MAKE_STD_ZVAL(*current_field);
  1285. if (!*current_field) {
  1286. DBG_RETURN(FAIL);
  1287. }
  1288. }
  1289. for (i = 0, current_field = start_field; current_field < end_field; current_field++, i++) {
  1290. enum_mysqlnd_collected_stats statistic;
  1291. zend_uchar * orig_p = p;
  1292. DBG_INF_FMT("Into zval=%p decoding column %u [%s.%s.%s] type=%u field->flags&unsigned=%u flags=%u is_bit=%u",
  1293. *current_field, i,
  1294. fields_metadata[i].db, fields_metadata[i].table, fields_metadata[i].name, fields_metadata[i].type,
  1295. fields_metadata[i].flags & UNSIGNED_FLAG, fields_metadata[i].flags, fields_metadata[i].type == MYSQL_TYPE_BIT);
  1296. if (*null_ptr & bit) {
  1297. DBG_INF("It's null");
  1298. ZVAL_NULL(*current_field);
  1299. statistic = STAT_BINARY_TYPE_FETCHED_NULL;
  1300. } else {
  1301. enum_mysqlnd_field_types type = fields_metadata[i].type;
  1302. mysqlnd_ps_fetch_functions[type].func(*current_field, &fields_metadata[i], 0, &p TSRMLS_CC);
  1303. if (MYSQLND_G(collect_statistics)) {
  1304. switch (fields_metadata[i].type) {
  1305. case MYSQL_TYPE_DECIMAL: statistic = STAT_BINARY_TYPE_FETCHED_DECIMAL; break;
  1306. case MYSQL_TYPE_TINY: statistic = STAT_BINARY_TYPE_FETCHED_INT8; break;
  1307. case MYSQL_TYPE_SHORT: statistic = STAT_BINARY_TYPE_FETCHED_INT16; break;
  1308. case MYSQL_TYPE_LONG: statistic = STAT_BINARY_TYPE_FETCHED_INT32; break;
  1309. case MYSQL_TYPE_FLOAT: statistic = STAT_BINARY_TYPE_FETCHED_FLOAT; break;
  1310. case MYSQL_TYPE_DOUBLE: statistic = STAT_BINARY_TYPE_FETCHED_DOUBLE; break;
  1311. case MYSQL_TYPE_NULL: statistic = STAT_BINARY_TYPE_FETCHED_NULL; break;
  1312. case MYSQL_TYPE_TIMESTAMP: statistic = STAT_BINARY_TYPE_FETCHED_TIMESTAMP; break;
  1313. case MYSQL_TYPE_LONGLONG: statistic = STAT_BINARY_TYPE_FETCHED_INT64; break;
  1314. case MYSQL_TYPE_INT24: statistic = STAT_BINARY_TYPE_FETCHED_INT24; break;
  1315. case MYSQL_TYPE_DATE: statistic = STAT_BINARY_TYPE_FETCHED_DATE; break;
  1316. case MYSQL_TYPE_TIME: statistic = STAT_BINARY_TYPE_FETCHED_TIME; break;
  1317. case MYSQL_TYPE_DATETIME: statistic = STAT_BINARY_TYPE_FETCHED_DATETIME; break;
  1318. case MYSQL_TYPE_YEAR: statistic = STAT_BINARY_TYPE_FETCHED_YEAR; break;
  1319. case MYSQL_TYPE_NEWDATE: statistic = STAT_BINARY_TYPE_FETCHED_DATE; break;
  1320. case MYSQL_TYPE_VARCHAR: statistic = STAT_BINARY_TYPE_FETCHED_STRING; break;
  1321. case MYSQL_TYPE_BIT: statistic = STAT_BINARY_TYPE_FETCHED_BIT; break;
  1322. case MYSQL_TYPE_NEWDECIMAL: statistic = STAT_BINARY_TYPE_FETCHED_DECIMAL; break;
  1323. case MYSQL_TYPE_ENUM: statistic = STAT_BINARY_TYPE_FETCHED_ENUM; break;
  1324. case MYSQL_TYPE_SET: statistic = STAT_BINARY_TYPE_FETCHED_SET; break;
  1325. case MYSQL_TYPE_TINY_BLOB: statistic = STAT_BINARY_TYPE_FETCHED_BLOB; break;
  1326. case MYSQL_TYPE_MEDIUM_BLOB:statistic = STAT_BINARY_TYPE_FETCHED_BLOB; break;
  1327. case MYSQL_TYPE_LONG_BLOB: statistic = STAT_BINARY_TYPE_FETCHED_BLOB; break;
  1328. case MYSQL_TYPE_BLOB: statistic = STAT_BINARY_TYPE_FETCHED_BLOB; break;
  1329. case MYSQL_TYPE_VAR_STRING: statistic = STAT_BINARY_TYPE_FETCHED_STRING; break;
  1330. case MYSQL_TYPE_STRING: statistic = STAT_BINARY_TYPE_FETCHED_STRING; break;
  1331. case MYSQL_TYPE_GEOMETRY: statistic = STAT_BINARY_TYPE_FETCHED_GEOMETRY; break;
  1332. default: statistic = STAT_BINARY_TYPE_FETCHED_OTHER; break;
  1333. }
  1334. }
  1335. }
  1336. MYSQLND_INC_CONN_STATISTIC_W_VALUE2(stats, statistic, 1,
  1337. STAT_BYTES_RECEIVED_PURE_DATA_PS,
  1338. (Z_TYPE_PP(current_field) == IS_STRING)?
  1339. Z_STRLEN_PP(current_field) : (p - orig_p));
  1340. if (!((bit<<=1) & 255)) {
  1341. bit = 1; /* to the following byte */
  1342. null_ptr++;
  1343. }
  1344. }
  1345. DBG_RETURN(PASS);
  1346. }
  1347. /* }}} */
  1348. /* {{{ php_mysqlnd_rowp_read_text_protocol */
  1349. enum_func_status
  1350. php_mysqlnd_rowp_read_text_protocol_aux(MYSQLND_MEMORY_POOL_CHUNK * row_buffer, zval ** fields,
  1351. unsigned int field_count, const MYSQLND_FIELD * fields_metadata,
  1352. zend_bool as_int_or_float, zend_bool copy_data, MYSQLND_STATS * stats TSRMLS_DC)
  1353. {
  1354. unsigned int i;
  1355. zend_bool last_field_was_string = FALSE;
  1356. zval **current_field, **end_field, **start_field;
  1357. zend_uchar * p = row_buffer->ptr;
  1358. size_t data_size = row_buffer->app;
  1359. zend_uchar * bit_area = (zend_uchar*) row_buffer->ptr + data_size + 1; /* we allocate from here */
  1360. const zend_uchar * const packet_end = (zend_uchar*) row_buffer->ptr + data_size;
  1361. DBG_ENTER("php_mysqlnd_rowp_read_text_protocol_aux");
  1362. if (!fields) {
  1363. DBG_RETURN(FAIL);
  1364. }
  1365. end_field = (start_field = fields) + field_count;
  1366. for (i = 0, current_field = start_field; current_field < end_field; current_field++, i++) {
  1367. DBG_INF("Directly creating zval");
  1368. MAKE_STD_ZVAL(*current_field);
  1369. if (!*current_field) {
  1370. DBG_RETURN(FAIL);
  1371. }
  1372. }
  1373. for (i = 0, current_field = start_field; current_field < end_field; current_field++, i++) {
  1374. /* Don't reverse the order. It is significant!*/
  1375. zend_uchar *this_field_len_pos = p;
  1376. /* php_mysqlnd_net_field_length() call should be after *this_field_len_pos = p; */
  1377. const unsigned long len = php_mysqlnd_net_field_length(&p);
  1378. if (len != MYSQLND_NULL_LENGTH && ((p + len) > packet_end)) {
  1379. php_error_docref(NULL TSRMLS_CC, E_WARNING, "Malformed server packet. Field length pointing "MYSQLND_SZ_T_SPEC
  1380. " bytes after end of packet", (p + len) - packet_end - 1);
  1381. DBG_RETURN(FAIL);
  1382. }
  1383. if (copy_data == FALSE && current_field > start_field && last_field_was_string) {
  1384. /*
  1385. Normal queries:
  1386. We have to put \0 now to the end of the previous field, if it was
  1387. a string. IS_NULL doesn't matter. Because we have already read our
  1388. length, then we can overwrite it in the row buffer.
  1389. This statement terminates the previous field, not the current one.
  1390. NULL_LENGTH is encoded in one byte, so we can stick a \0 there.
  1391. Any string's length is encoded in at least one byte, so we can stick
  1392. a \0 there.
  1393. */
  1394. *this_field_len_pos = '\0';
  1395. }
  1396. /* NULL or NOT NULL, this is the question! */
  1397. if (len == MYSQLND_NULL_LENGTH) {
  1398. ZVAL_NULL(*current_field);
  1399. last_field_was_string = FALSE;
  1400. } else {
  1401. #if defined(MYSQLND_STRING_TO_INT_CONVERSION)
  1402. struct st_mysqlnd_perm_bind perm_bind =
  1403. mysqlnd_ps_fetch_functions[fields_metadata[i].type];
  1404. #endif
  1405. if (MYSQLND_G(collect_statistics)) {
  1406. enum_mysqlnd_collected_stats statistic;
  1407. switch (fields_metadata[i].type) {
  1408. case MYSQL_TYPE_DECIMAL: statistic = STAT_TEXT_TYPE_FETCHED_DECIMAL; break;
  1409. case MYSQL_TYPE_TINY: statistic = STAT_TEXT_TYPE_FETCHED_INT8; break;
  1410. case MYSQL_TYPE_SHORT: statistic = STAT_TEXT_TYPE_FETCHED_INT16; break;
  1411. case MYSQL_TYPE_LONG: statistic = STAT_TEXT_TYPE_FETCHED_INT32; break;
  1412. case MYSQL_TYPE_FLOAT: statistic = STAT_TEXT_TYPE_FETCHED_FLOAT; break;
  1413. case MYSQL_TYPE_DOUBLE: statistic = STAT_TEXT_TYPE_FETCHED_DOUBLE; break;
  1414. case MYSQL_TYPE_NULL: statistic = STAT_TEXT_TYPE_FETCHED_NULL; break;
  1415. case MYSQL_TYPE_TIMESTAMP: statistic = STAT_TEXT_TYPE_FETCHED_TIMESTAMP; break;
  1416. case MYSQL_TYPE_LONGLONG: statistic = STAT_TEXT_TYPE_FETCHED_INT64; break;
  1417. case MYSQL_TYPE_INT24: statistic = STAT_TEXT_TYPE_FETCHED_INT24; break;
  1418. case MYSQL_TYPE_DATE: statistic = STAT_TEXT_TYPE_FETCHED_DATE; break;
  1419. case MYSQL_TYPE_TIME: statistic = STAT_TEXT_TYPE_FETCHED_TIME; break;
  1420. case MYSQL_TYPE_DATETIME: statistic = STAT_TEXT_TYPE_FETCHED_DATETIME; break;
  1421. case MYSQL_TYPE_YEAR: statistic = STAT_TEXT_TYPE_FETCHED_YEAR; break;
  1422. case MYSQL_TYPE_NEWDATE: statistic = STAT_TEXT_TYPE_FETCHED_DATE; break;
  1423. case MYSQL_TYPE_VARCHAR: statistic = STAT_TEXT_TYPE_FETCHED_STRING; break;
  1424. case MYSQL_TYPE_BIT: statistic = STAT_TEXT_TYPE_FETCHED_BIT; break;
  1425. case MYSQL_TYPE_NEWDECIMAL: statistic = STAT_TEXT_TYPE_FETCHED_DECIMAL; break;
  1426. case MYSQL_TYPE_ENUM: statistic = STAT_TEXT_TYPE_FETCHED_ENUM; break;
  1427. case MYSQL_TYPE_SET: statistic = STAT_TEXT_TYPE_FETCHED_SET; break;
  1428. case MYSQL_TYPE_JSON: statistic = STAT_TEXT_TYPE_FETCHED_JSON; break;
  1429. case MYSQL_TYPE_TINY_BLOB: statistic = STAT_TEXT_TYPE_FETCHED_BLOB; break;
  1430. case MYSQL_TYPE_MEDIUM_BLOB:statistic = STAT_TEXT_TYPE_FETCHED_BLOB; break;
  1431. case MYSQL_TYPE_LONG_BLOB: statistic = STAT_TEXT_TYPE_FETCHED_BLOB; break;
  1432. case MYSQL_TYPE_BLOB: statistic = STAT_TEXT_TYPE_FETCHED_BLOB; break;
  1433. case MYSQL_TYPE_VAR_STRING: statistic = STAT_TEXT_TYPE_FETCHED_STRING; break;
  1434. case MYSQL_TYPE_STRING: statistic = STAT_TEXT_TYPE_FETCHED_STRING; break;
  1435. case MYSQL_TYPE_GEOMETRY: statistic = STAT_TEXT_TYPE_FETCHED_GEOMETRY; break;
  1436. default: statistic = STAT_TEXT_TYPE_FETCHED_OTHER; break;
  1437. }
  1438. MYSQLND_INC_CONN_STATISTIC_W_VALUE2(stats, statistic, 1, STAT_BYTES_RECEIVED_PURE_DATA_TEXT, len);
  1439. }
  1440. #ifdef MYSQLND_STRING_TO_INT_CONVERSION
  1441. if (as_int_or_float && perm_bind.php_type == IS_LONG) {
  1442. zend_uchar save = *(p + len);
  1443. /* We have to make it ASCIIZ temporarily */
  1444. *(p + len) = '\0';
  1445. if (perm_bind.pack_len < SIZEOF_LONG) {
  1446. /* direct conversion */
  1447. int64_t v =
  1448. #ifndef PHP_WIN32
  1449. atoll((char *) p);
  1450. #else
  1451. _atoi64((char *) p);
  1452. #endif
  1453. ZVAL_LONG(*current_field, (long) v); /* the cast is safe */
  1454. } else {
  1455. uint64_t v =
  1456. #ifndef PHP_WIN32
  1457. (uint64_t) atoll((char *) p);
  1458. #else
  1459. (uint64_t) _atoi64((char *) p);
  1460. #endif
  1461. zend_bool uns = fields_metadata[i].flags & UNSIGNED_FLAG? TRUE:FALSE;
  1462. /* We have to make it ASCIIZ temporarily */
  1463. #if SIZEOF_LONG==8
  1464. if (uns == TRUE && v > 9223372036854775807L)
  1465. #elif SIZEOF_LONG==4
  1466. if ((uns == TRUE && v > L64(2147483647)) ||
  1467. (uns == FALSE && (( L64(2147483647) < (int64_t) v) ||
  1468. (L64(-2147483648) > (int64_t) v))))
  1469. #else
  1470. #error Need fix for this architecture
  1471. #endif /* SIZEOF */
  1472. {
  1473. ZVAL_STRINGL(*current_field, (char *)p, len, 0);
  1474. } else {
  1475. ZVAL_LONG(*current_field, (long) v); /* the cast is safe */
  1476. }
  1477. }
  1478. *(p + len) = save;
  1479. } else if (as_int_or_float && perm_bind.php_type == IS_DOUBLE) {
  1480. zend_uchar save = *(p + len);
  1481. /* We have to make it ASCIIZ temporarily */
  1482. *(p + len) = '\0';
  1483. ZVAL_DOUBLE(*current_field, atof((char *) p));
  1484. *(p + len) = save;
  1485. } else
  1486. #endif /* MYSQLND_STRING_TO_INT_CONVERSION */
  1487. if (fields_metadata[i].type == MYSQL_TYPE_BIT) {
  1488. /*
  1489. BIT fields are specially handled. As they come as bit mask, we have
  1490. to convert it to human-readable representation. As the bits take
  1491. less space in the protocol than the numbers they represent, we don't
  1492. have enough space in the packet buffer to overwrite inside.
  1493. Thus, a bit more space is pre-allocated at the end of the buffer,
  1494. see php_mysqlnd_rowp_read(). And we add the strings at the end.
  1495. Definitely not nice, _hackish_ :(, but works.
  1496. */
  1497. zend_uchar *start = bit_area;
  1498. ps_fetch_from_1_to_8_bytes(*current_field, &(fields_metadata[i]), 0, &p, len TSRMLS_CC);
  1499. /*
  1500. We have advanced in ps_fetch_from_1_to_8_bytes. We should go back because
  1501. later in this function there will be an advancement.
  1502. */
  1503. p -= len;
  1504. if (Z_TYPE_PP(current_field) == IS_LONG) {
  1505. bit_area += 1 + sprintf((char *)start, "%ld", Z_LVAL_PP(current_field));
  1506. ZVAL_STRINGL(*current_field, (char *) start, bit_area - start - 1, copy_data);
  1507. } else if (Z_TYPE_PP(current_field) == IS_STRING){
  1508. memcpy(bit_area, Z_STRVAL_PP(current_field), Z_STRLEN_PP(current_field));
  1509. bit_area += Z_STRLEN_PP(current_field);
  1510. *bit_area++ = '\0';
  1511. zval_dtor(*current_field);
  1512. ZVAL_STRINGL(*current_field, (char *) start, bit_area - start - 1, copy_data);
  1513. }
  1514. } else {
  1515. ZVAL_STRINGL(*current_field, (char *)p, len, copy_data);
  1516. }
  1517. p += len;
  1518. last_field_was_string = TRUE;
  1519. }
  1520. }
  1521. if (copy_data == FALSE && last_field_was_string) {
  1522. /* Normal queries: The buffer has one more byte at the end, because we need it */
  1523. row_buffer->ptr[data_size] = '\0';
  1524. }
  1525. DBG_RETURN(PASS);
  1526. }
  1527. /* }}} */
  1528. /* {{{ php_mysqlnd_rowp_read_text_protocol_zval */
  1529. enum_func_status
  1530. php_mysqlnd_rowp_read_text_protocol_zval(MYSQLND_MEMORY_POOL_CHUNK * row_buffer, zval ** fields,
  1531. unsigned int field_count, const MYSQLND_FIELD * fields_metadata,
  1532. zend_bool as_int_or_float, MYSQLND_STATS * stats TSRMLS_DC)
  1533. {
  1534. enum_func_status ret;
  1535. DBG_ENTER("php_mysqlnd_rowp_read_text_protocol_zval");
  1536. ret = php_mysqlnd_rowp_read_text_protocol_aux(row_buffer, fields, field_count, fields_metadata, as_int_or_float, FALSE, stats TSRMLS_CC);
  1537. DBG_RETURN(ret);
  1538. }
  1539. /* }}} */
  1540. /* {{{ php_mysqlnd_rowp_read_text_protocol_c */
  1541. enum_func_status
  1542. php_mysqlnd_rowp_read_text_protocol_c(MYSQLND_MEMORY_POOL_CHUNK * row_buffer, zval ** fields,
  1543. unsigned int field_count, const MYSQLND_FIELD * fields_metadata,
  1544. zend_bool as_int_or_float, MYSQLND_STATS * stats TSRMLS_DC)
  1545. {
  1546. enum_func_status ret;
  1547. DBG_ENTER("php_mysqlnd_rowp_read_text_protocol_c");
  1548. ret = php_mysqlnd_rowp_read_text_protocol_aux(row_buffer, fields, field_count, fields_metadata, as_int_or_float, TRUE, stats TSRMLS_CC);
  1549. DBG_RETURN(ret);
  1550. }
  1551. /* }}} */
  1552. /* {{{ php_mysqlnd_rowp_read */
  1553. /*
  1554. if normal statements => packet->fields is created by this function,
  1555. if PS => packet->fields is passed from outside
  1556. */
  1557. static enum_func_status
  1558. php_mysqlnd_rowp_read(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC)
  1559. {
  1560. zend_uchar *p;
  1561. enum_func_status ret = PASS;
  1562. MYSQLND_PACKET_ROW *packet= (MYSQLND_PACKET_ROW *) _packet;
  1563. size_t post_alloc_for_bit_fields = 0;
  1564. size_t data_size = 0;
  1565. DBG_ENTER("php_mysqlnd_rowp_read");
  1566. if (!packet->binary_protocol && packet->bit_fields_count) {
  1567. /* For every field we need terminating \0 */
  1568. post_alloc_for_bit_fields = packet->bit_fields_total_len + packet->bit_fields_count;
  1569. }
  1570. ret = php_mysqlnd_read_row_ex(conn, packet->result_set_memory_pool, &packet->row_buffer, &data_size,
  1571. packet->persistent_alloc, post_alloc_for_bit_fields
  1572. TSRMLS_CC);
  1573. if (FAIL == ret) {
  1574. goto end;
  1575. }
  1576. MYSQLND_INC_CONN_STATISTIC_W_VALUE2(conn->stats, packet_type_to_statistic_byte_count[PROT_ROW_PACKET],
  1577. MYSQLND_HEADER_SIZE + packet->header.size,
  1578. packet_type_to_statistic_packet_count[PROT_ROW_PACKET],
  1579. 1);
  1580. /* packet->row_buffer->ptr is of size 'data_size + 1' */
  1581. packet->header.size = data_size;
  1582. packet->row_buffer->app = data_size;
  1583. if (ERROR_MARKER == (*(p = packet->row_buffer->ptr))) {
  1584. /*
  1585. Error message as part of the result set,
  1586. not good but we should not hang. See:
  1587. Bug #27876 : SF with cyrillic variable name fails during execution
  1588. */
  1589. ret = FAIL;
  1590. php_mysqlnd_read_error_from_line(p + 1, data_size - 1,
  1591. packet->error_info.error,
  1592. sizeof(packet->error_info.error),
  1593. &packet->error_info.error_no,
  1594. packet->error_info.sqlstate
  1595. TSRMLS_CC);
  1596. } else if (EODATA_MARKER == *p && data_size < 8) { /* EOF */
  1597. packet->eof = TRUE;
  1598. p++;
  1599. if (data_size > 1) {
  1600. packet->warning_count = uint2korr(p);
  1601. p += 2;
  1602. packet->server_status = uint2korr(p);
  1603. /* Seems we have 3 bytes reserved for future use */
  1604. DBG_INF_FMT("server_status=%u warning_count=%u", packet->server_status, packet->warning_count);
  1605. }
  1606. } else {
  1607. MYSQLND_INC_CONN_STATISTIC(conn->stats,
  1608. packet->binary_protocol? STAT_ROWS_FETCHED_FROM_SERVER_PS:
  1609. STAT_ROWS_FETCHED_FROM_SERVER_NORMAL);
  1610. packet->eof = FALSE;
  1611. /* packet->field_count is set by the user of the packet */
  1612. if (!packet->skip_extraction) {
  1613. if (!packet->fields) {
  1614. DBG_INF("Allocating packet->fields");
  1615. /*
  1616. old-API will probably set packet->fields to NULL every time, though for
  1617. unbuffered sets it makes not much sense as the zvals in this buffer matter,
  1618. not the buffer. Constantly allocating and deallocating brings nothing.
  1619. For PS - if stmt_store() is performed, thus we don't have a cursor, it will
  1620. behave just like old-API buffered. Cursors will behave like a bit different,
  1621. but mostly like old-API unbuffered and thus will populate this array with
  1622. value.
  1623. */
  1624. packet->fields = (zval **) mnd_pecalloc(packet->field_count, sizeof(zval *),
  1625. packet->persistent_alloc);
  1626. }
  1627. } else {
  1628. MYSQLND_INC_CONN_STATISTIC(conn->stats,
  1629. packet->binary_protocol? STAT_ROWS_SKIPPED_PS:
  1630. STAT_ROWS_SKIPPED_NORMAL);
  1631. }
  1632. }
  1633. end:
  1634. DBG_RETURN(ret);
  1635. }
  1636. /* }}} */
  1637. /* {{{ php_mysqlnd_rowp_free_mem */
  1638. static void
  1639. php_mysqlnd_rowp_free_mem(void * _packet, zend_bool stack_allocation TSRMLS_DC)
  1640. {
  1641. MYSQLND_PACKET_ROW *p;
  1642. DBG_ENTER("php_mysqlnd_rowp_free_mem");
  1643. p = (MYSQLND_PACKET_ROW *) _packet;
  1644. if (p->row_buffer) {
  1645. p->row_buffer->free_chunk(p->row_buffer TSRMLS_CC);
  1646. p->row_buffer = NULL;
  1647. }
  1648. DBG_INF_FMT("stack_allocation=%u persistent=%u", (int)stack_allocation, (int)p->header.persistent);
  1649. /*
  1650. Don't free packet->fields :
  1651. - normal queries -> store_result() | fetch_row_unbuffered() will transfer
  1652. the ownership and NULL it.
  1653. - PS will pass in it the bound variables, we have to use them! and of course
  1654. not free the array. As it is passed to us, we should not clean it ourselves.
  1655. */
  1656. if (!stack_allocation) {
  1657. mnd_pefree(p, p->header.persistent);
  1658. }
  1659. DBG_VOID_RETURN;
  1660. }
  1661. /* }}} */
  1662. /* {{{ php_mysqlnd_stats_read */
  1663. static enum_func_status
  1664. php_mysqlnd_stats_read(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC)
  1665. {
  1666. MYSQLND_PACKET_STATS *packet= (MYSQLND_PACKET_STATS *) _packet;
  1667. size_t buf_len = conn->net->cmd_buffer.length;
  1668. zend_uchar *buf = (zend_uchar *) conn->net->cmd_buffer.buffer;
  1669. DBG_ENTER("php_mysqlnd_stats_read");
  1670. PACKET_READ_HEADER_AND_BODY(packet, conn, buf, buf_len, "statistics", PROT_STATS_PACKET);
  1671. packet->message = mnd_emalloc(packet->header.size + 1);
  1672. memcpy(packet->message, buf, packet->header.size);
  1673. packet->message[packet->header.size] = '\0';
  1674. packet->message_len = packet->header.size;
  1675. DBG_RETURN(PASS);
  1676. }
  1677. /* }}} */
  1678. /* {{{ php_mysqlnd_stats_free_mem */
  1679. static
  1680. void php_mysqlnd_stats_free_mem(void * _packet, zend_bool stack_allocation TSRMLS_DC)
  1681. {
  1682. MYSQLND_PACKET_STATS *p= (MYSQLND_PACKET_STATS *) _packet;
  1683. if (p->message) {
  1684. mnd_efree(p->message);
  1685. p->message = NULL;
  1686. }
  1687. if (!stack_allocation) {
  1688. mnd_pefree(p, p->header.persistent);
  1689. }
  1690. }
  1691. /* }}} */
  1692. /* 1 + 4 (id) + 2 (field_c) + 2 (param_c) + 1 (filler) + 2 (warnings ) */
  1693. #define PREPARE_RESPONSE_SIZE_41 9
  1694. #define PREPARE_RESPONSE_SIZE_50 12
  1695. /* {{{ php_mysqlnd_prepare_read */
  1696. static enum_func_status
  1697. php_mysqlnd_prepare_read(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC)
  1698. {
  1699. /* In case of an error, we should have place to put it */
  1700. size_t buf_len = conn->net->cmd_buffer.length;
  1701. zend_uchar *buf = (zend_uchar *) conn->net->cmd_buffer.buffer;
  1702. zend_uchar *p = buf;
  1703. zend_uchar *begin = buf;
  1704. unsigned int data_size;
  1705. MYSQLND_PACKET_PREPARE_RESPONSE *packet= (MYSQLND_PACKET_PREPARE_RESPONSE *) _packet;
  1706. DBG_ENTER("php_mysqlnd_prepare_read");
  1707. PACKET_READ_HEADER_AND_BODY(packet, conn, buf, buf_len, "prepare", PROT_PREPARE_RESP_PACKET);
  1708. BAIL_IF_NO_MORE_DATA;
  1709. data_size = packet->header.size;
  1710. packet->error_code = uint1korr(p);
  1711. p++;
  1712. BAIL_IF_NO_MORE_DATA;
  1713. if (ERROR_MARKER == packet->error_code) {
  1714. php_mysqlnd_read_error_from_line(p, data_size - 1,
  1715. packet->error_info.error,
  1716. sizeof(packet->error_info.error),
  1717. &packet->error_info.error_no,
  1718. packet->error_info.sqlstate
  1719. TSRMLS_CC);
  1720. DBG_RETURN(PASS);
  1721. }
  1722. if (data_size != PREPARE_RESPONSE_SIZE_41 &&
  1723. data_size != PREPARE_RESPONSE_SIZE_50 &&
  1724. !(data_size > PREPARE_RESPONSE_SIZE_50)) {
  1725. DBG_ERR_FMT("Wrong COM_STMT_PREPARE response size. Received %u", data_size);
  1726. php_error(E_WARNING, "Wrong COM_STMT_PREPARE response size. Received %u", data_size);
  1727. DBG_RETURN(FAIL);
  1728. }
  1729. packet->stmt_id = uint4korr(p);
  1730. p += 4;
  1731. BAIL_IF_NO_MORE_DATA;
  1732. /* Number of columns in result set */
  1733. packet->field_count = uint2korr(p);
  1734. p += 2;
  1735. BAIL_IF_NO_MORE_DATA;
  1736. packet->param_count = uint2korr(p);
  1737. p += 2;
  1738. BAIL_IF_NO_MORE_DATA;
  1739. if (data_size > 9) {
  1740. /* 0x0 filler sent by the server for 5.0+ clients */
  1741. p++;
  1742. BAIL_IF_NO_MORE_DATA;
  1743. packet->warning_count = uint2korr(p);
  1744. }
  1745. DBG_INF_FMT("Prepare packet read: stmt_id=%u fields=%u params=%u",
  1746. packet->stmt_id, packet->field_count, packet->param_count);
  1747. BAIL_IF_NO_MORE_DATA;
  1748. DBG_RETURN(PASS);
  1749. premature_end:
  1750. DBG_ERR_FMT("PREPARE packet %d bytes shorter than expected", p - begin - packet->header.size);
  1751. php_error_docref(NULL TSRMLS_CC, E_WARNING, "PREPARE packet "MYSQLND_SZ_T_SPEC" bytes shorter than expected",
  1752. p - begin - packet->header.size);
  1753. DBG_RETURN(FAIL);
  1754. }
  1755. /* }}} */
  1756. /* {{{ php_mysqlnd_prepare_free_mem */
  1757. static void
  1758. php_mysqlnd_prepare_free_mem(void * _packet, zend_bool stack_allocation TSRMLS_DC)
  1759. {
  1760. MYSQLND_PACKET_PREPARE_RESPONSE *p= (MYSQLND_PACKET_PREPARE_RESPONSE *) _packet;
  1761. if (!stack_allocation) {
  1762. mnd_pefree(p, p->header.persistent);
  1763. }
  1764. }
  1765. /* }}} */
  1766. /* {{{ php_mysqlnd_chg_user_read */
  1767. static enum_func_status
  1768. php_mysqlnd_chg_user_read(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC)
  1769. {
  1770. /* There could be an error message */
  1771. size_t buf_len = conn->net->cmd_buffer.length;
  1772. zend_uchar *buf = (zend_uchar *) conn->net->cmd_buffer.buffer;
  1773. zend_uchar *p = buf;
  1774. zend_uchar *begin = buf;
  1775. MYSQLND_PACKET_CHG_USER_RESPONSE *packet= (MYSQLND_PACKET_CHG_USER_RESPONSE *) _packet;
  1776. DBG_ENTER("php_mysqlnd_chg_user_read");
  1777. PACKET_READ_HEADER_AND_BODY(packet, conn, buf, buf_len, "change user response", PROT_CHG_USER_RESP_PACKET);
  1778. BAIL_IF_NO_MORE_DATA;
  1779. /*
  1780. Don't increment. First byte is ERROR_MARKER on error, but otherwise is starting byte
  1781. of encoded sequence for length.
  1782. */
  1783. /* Should be always 0x0 or ERROR_MARKER for error */
  1784. packet->response_code = uint1korr(p);
  1785. p++;
  1786. if (packet->header.size == 1 && buf[0] == EODATA_MARKER && packet->server_capabilities & CLIENT_SECURE_CONNECTION) {
  1787. /* We don't handle 3.23 authentication */
  1788. packet->server_asked_323_auth = TRUE;
  1789. DBG_RETURN(FAIL);
  1790. }
  1791. if (ERROR_MARKER == packet->response_code) {
  1792. php_mysqlnd_read_error_from_line(p, packet->header.size - 1,
  1793. packet->error_info.error,
  1794. sizeof(packet->error_info.error),
  1795. &packet->error_info.error_no,
  1796. packet->error_info.sqlstate
  1797. TSRMLS_CC);
  1798. }
  1799. BAIL_IF_NO_MORE_DATA;
  1800. if (packet->response_code == 0xFE && packet->header.size > (size_t) (p - buf)) {
  1801. packet->new_auth_protocol = mnd_pestrdup((char *)p, FALSE);
  1802. packet->new_auth_protocol_len = strlen(packet->new_auth_protocol);
  1803. p+= packet->new_auth_protocol_len + 1; /* +1 for the \0 */
  1804. packet->new_auth_protocol_data_len = packet->header.size - (size_t) (p - buf);
  1805. if (packet->new_auth_protocol_data_len) {
  1806. packet->new_auth_protocol_data = mnd_emalloc(packet->new_auth_protocol_data_len);
  1807. memcpy(packet->new_auth_protocol_data, p, packet->new_auth_protocol_data_len);
  1808. }
  1809. DBG_INF_FMT("The server requested switching auth plugin to : %s", packet->new_auth_protocol);
  1810. DBG_INF_FMT("Server salt : [%*s]", packet->new_auth_protocol_data_len, packet->new_auth_protocol_data);
  1811. }
  1812. DBG_RETURN(PASS);
  1813. premature_end:
  1814. DBG_ERR_FMT("CHANGE_USER packet %d bytes shorter than expected", p - begin - packet->header.size);
  1815. php_error_docref(NULL TSRMLS_CC, E_WARNING, "CHANGE_USER packet "MYSQLND_SZ_T_SPEC" bytes shorter than expected",
  1816. p - begin - packet->header.size);
  1817. DBG_RETURN(FAIL);
  1818. }
  1819. /* }}} */
  1820. /* {{{ php_mysqlnd_chg_user_free_mem */
  1821. static void
  1822. php_mysqlnd_chg_user_free_mem(void * _packet, zend_bool stack_allocation TSRMLS_DC)
  1823. {
  1824. MYSQLND_PACKET_CHG_USER_RESPONSE * p = (MYSQLND_PACKET_CHG_USER_RESPONSE *) _packet;
  1825. if (p->new_auth_protocol) {
  1826. mnd_efree(p->new_auth_protocol);
  1827. p->new_auth_protocol = NULL;
  1828. }
  1829. p->new_auth_protocol_len = 0;
  1830. if (p->new_auth_protocol_data) {
  1831. mnd_efree(p->new_auth_protocol_data);
  1832. p->new_auth_protocol_data = NULL;
  1833. }
  1834. p->new_auth_protocol_data_len = 0;
  1835. if (!stack_allocation) {
  1836. mnd_pefree(p, p->header.persistent);
  1837. }
  1838. }
  1839. /* }}} */
  1840. /* {{{ php_mysqlnd_sha256_pk_request_write */
  1841. static
  1842. size_t php_mysqlnd_sha256_pk_request_write(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC)
  1843. {
  1844. zend_uchar buffer[MYSQLND_HEADER_SIZE + 1];
  1845. size_t sent;
  1846. DBG_ENTER("php_mysqlnd_sha256_pk_request_write");
  1847. int1store(buffer + MYSQLND_HEADER_SIZE, '\1');
  1848. sent = conn->net->data->m.send_ex(conn->net, buffer, 1, conn->stats, conn->error_info TSRMLS_CC);
  1849. DBG_RETURN(sent);
  1850. }
  1851. /* }}} */
  1852. /* {{{ php_mysqlnd_sha256_pk_request_free_mem */
  1853. static
  1854. void php_mysqlnd_sha256_pk_request_free_mem(void * _packet, zend_bool stack_allocation TSRMLS_DC)
  1855. {
  1856. if (!stack_allocation) {
  1857. MYSQLND_PACKET_SHA256_PK_REQUEST * p = (MYSQLND_PACKET_SHA256_PK_REQUEST *) _packet;
  1858. mnd_pefree(p, p->header.persistent);
  1859. }
  1860. }
  1861. /* }}} */
  1862. #define SHA256_PK_REQUEST_RESP_BUFFER_SIZE 2048
  1863. /* {{{ php_mysqlnd_sha256_pk_request_response_read */
  1864. static enum_func_status
  1865. php_mysqlnd_sha256_pk_request_response_read(void * _packet, MYSQLND_CONN_DATA * conn TSRMLS_DC)
  1866. {
  1867. zend_uchar buf[SHA256_PK_REQUEST_RESP_BUFFER_SIZE];
  1868. zend_uchar *p = buf;
  1869. zend_uchar *begin = buf;
  1870. MYSQLND_PACKET_SHA256_PK_REQUEST_RESPONSE * packet= (MYSQLND_PACKET_SHA256_PK_REQUEST_RESPONSE *) _packet;
  1871. DBG_ENTER("php_mysqlnd_sha256_pk_request_response_read");
  1872. /* leave space for terminating safety \0 */
  1873. PACKET_READ_HEADER_AND_BODY(packet, conn, buf, sizeof(buf), "SHA256_PK_REQUEST_RESPONSE", PROT_SHA256_PK_REQUEST_RESPONSE_PACKET);
  1874. BAIL_IF_NO_MORE_DATA;
  1875. p++;
  1876. BAIL_IF_NO_MORE_DATA;
  1877. packet->public_key_len = packet->header.size - (p - buf);
  1878. packet->public_key = mnd_emalloc(packet->public_key_len + 1);
  1879. memcpy(packet->public_key, p, packet->public_key_len);
  1880. packet->public_key[packet->public_key_len] = '\0';
  1881. DBG_RETURN(PASS);
  1882. premature_end:
  1883. DBG_ERR_FMT("OK packet %d bytes shorter than expected", p - begin - packet->header.size);
  1884. php_error_docref(NULL TSRMLS_CC, E_WARNING, "SHA256_PK_REQUEST_RESPONSE packet "MYSQLND_SZ_T_SPEC" bytes shorter than expected",
  1885. p - begin - packet->header.size);
  1886. DBG_RETURN(FAIL);
  1887. }
  1888. /* }}} */
  1889. /* {{{ php_mysqlnd_sha256_pk_request_response_free_mem */
  1890. static void
  1891. php_mysqlnd_sha256_pk_request_response_free_mem(void * _packet, zend_bool stack_allocation TSRMLS_DC)
  1892. {
  1893. MYSQLND_PACKET_SHA256_PK_REQUEST_RESPONSE * p = (MYSQLND_PACKET_SHA256_PK_REQUEST_RESPONSE *) _packet;
  1894. if (p->public_key) {
  1895. mnd_efree(p->public_key);
  1896. p->public_key = NULL;
  1897. }
  1898. p->public_key_len = 0;
  1899. if (!stack_allocation) {
  1900. mnd_pefree(p, p->header.persistent);
  1901. }
  1902. }
  1903. /* }}} */
  1904. /* {{{ packet_methods */
  1905. static
  1906. mysqlnd_packet_methods packet_methods[PROT_LAST] =
  1907. {
  1908. {
  1909. sizeof(MYSQLND_PACKET_GREET),
  1910. php_mysqlnd_greet_read,
  1911. NULL, /* write */
  1912. php_mysqlnd_greet_free_mem,
  1913. }, /* PROT_GREET_PACKET */
  1914. {
  1915. sizeof(MYSQLND_PACKET_AUTH),
  1916. NULL, /* read */
  1917. php_mysqlnd_auth_write,
  1918. php_mysqlnd_auth_free_mem,
  1919. }, /* PROT_AUTH_PACKET */
  1920. {
  1921. sizeof(MYSQLND_PACKET_AUTH_RESPONSE),
  1922. php_mysqlnd_auth_response_read, /* read */
  1923. NULL, /* write */
  1924. php_mysqlnd_auth_response_free_mem,
  1925. }, /* PROT_AUTH_RESP_PACKET */
  1926. {
  1927. sizeof(MYSQLND_PACKET_CHANGE_AUTH_RESPONSE),
  1928. NULL, /* read */
  1929. php_mysqlnd_change_auth_response_write, /* write */
  1930. php_mysqlnd_change_auth_response_free_mem,
  1931. }, /* PROT_CHANGE_AUTH_RESP_PACKET */
  1932. {
  1933. sizeof(MYSQLND_PACKET_OK),
  1934. php_mysqlnd_ok_read, /* read */
  1935. NULL, /* write */
  1936. php_mysqlnd_ok_free_mem,
  1937. }, /* PROT_OK_PACKET */
  1938. {
  1939. sizeof(MYSQLND_PACKET_EOF),
  1940. php_mysqlnd_eof_read, /* read */
  1941. NULL, /* write */
  1942. php_mysqlnd_eof_free_mem,
  1943. }, /* PROT_EOF_PACKET */
  1944. {
  1945. sizeof(MYSQLND_PACKET_COMMAND),
  1946. NULL, /* read */
  1947. php_mysqlnd_cmd_write, /* write */
  1948. php_mysqlnd_cmd_free_mem,
  1949. }, /* PROT_CMD_PACKET */
  1950. {
  1951. sizeof(MYSQLND_PACKET_RSET_HEADER),
  1952. php_mysqlnd_rset_header_read, /* read */
  1953. NULL, /* write */
  1954. php_mysqlnd_rset_header_free_mem,
  1955. }, /* PROT_RSET_HEADER_PACKET */
  1956. {
  1957. sizeof(MYSQLND_PACKET_RES_FIELD),
  1958. php_mysqlnd_rset_field_read, /* read */
  1959. NULL, /* write */
  1960. php_mysqlnd_rset_field_free_mem,
  1961. }, /* PROT_RSET_FLD_PACKET */
  1962. {
  1963. sizeof(MYSQLND_PACKET_ROW),
  1964. php_mysqlnd_rowp_read, /* read */
  1965. NULL, /* write */
  1966. php_mysqlnd_rowp_free_mem,
  1967. }, /* PROT_ROW_PACKET */
  1968. {
  1969. sizeof(MYSQLND_PACKET_STATS),
  1970. php_mysqlnd_stats_read, /* read */
  1971. NULL, /* write */
  1972. php_mysqlnd_stats_free_mem,
  1973. }, /* PROT_STATS_PACKET */
  1974. {
  1975. sizeof(MYSQLND_PACKET_PREPARE_RESPONSE),
  1976. php_mysqlnd_prepare_read, /* read */
  1977. NULL, /* write */
  1978. php_mysqlnd_prepare_free_mem,
  1979. }, /* PROT_PREPARE_RESP_PACKET */
  1980. {
  1981. sizeof(MYSQLND_PACKET_CHG_USER_RESPONSE),
  1982. php_mysqlnd_chg_user_read, /* read */
  1983. NULL, /* write */
  1984. php_mysqlnd_chg_user_free_mem,
  1985. }, /* PROT_CHG_USER_RESP_PACKET */
  1986. {
  1987. sizeof(MYSQLND_PACKET_SHA256_PK_REQUEST),
  1988. NULL, /* read */
  1989. php_mysqlnd_sha256_pk_request_write,
  1990. php_mysqlnd_sha256_pk_request_free_mem,
  1991. }, /* PROT_SHA256_PK_REQUEST_PACKET */
  1992. {
  1993. sizeof(MYSQLND_PACKET_SHA256_PK_REQUEST_RESPONSE),
  1994. php_mysqlnd_sha256_pk_request_response_read,
  1995. NULL, /* write */
  1996. php_mysqlnd_sha256_pk_request_response_free_mem,
  1997. } /* PROT_SHA256_PK_REQUEST_RESPONSE_PACKET */
  1998. };
  1999. /* }}} */
  2000. /* {{{ mysqlnd_protocol::get_greet_packet */
  2001. static struct st_mysqlnd_packet_greet *
  2002. MYSQLND_METHOD(mysqlnd_protocol, get_greet_packet)(MYSQLND_PROTOCOL * const protocol, zend_bool persistent TSRMLS_DC)
  2003. {
  2004. struct st_mysqlnd_packet_greet * packet = mnd_pecalloc(1, packet_methods[PROT_GREET_PACKET].struct_size, persistent);
  2005. DBG_ENTER("mysqlnd_protocol::get_greet_packet");
  2006. if (packet) {
  2007. packet->header.m = &packet_methods[PROT_GREET_PACKET];
  2008. packet->header.persistent = persistent;
  2009. }
  2010. DBG_RETURN(packet);
  2011. }
  2012. /* }}} */
  2013. /* {{{ mysqlnd_protocol::get_auth_packet */
  2014. static struct st_mysqlnd_packet_auth *
  2015. MYSQLND_METHOD(mysqlnd_protocol, get_auth_packet)(MYSQLND_PROTOCOL * const protocol, zend_bool persistent TSRMLS_DC)
  2016. {
  2017. struct st_mysqlnd_packet_auth * packet = mnd_pecalloc(1, packet_methods[PROT_AUTH_PACKET].struct_size, persistent);
  2018. DBG_ENTER("mysqlnd_protocol::get_auth_packet");
  2019. if (packet) {
  2020. packet->header.m = &packet_methods[PROT_AUTH_PACKET];
  2021. packet->header.persistent = persistent;
  2022. }
  2023. DBG_RETURN(packet);
  2024. }
  2025. /* }}} */
  2026. /* {{{ mysqlnd_protocol::get_auth_response_packet */
  2027. static struct st_mysqlnd_packet_auth_response *
  2028. MYSQLND_METHOD(mysqlnd_protocol, get_auth_response_packet)(MYSQLND_PROTOCOL * const protocol, zend_bool persistent TSRMLS_DC)
  2029. {
  2030. struct st_mysqlnd_packet_auth_response * packet = mnd_pecalloc(1, packet_methods[PROT_AUTH_RESP_PACKET].struct_size, persistent);
  2031. DBG_ENTER("mysqlnd_protocol::get_auth_response_packet");
  2032. if (packet) {
  2033. packet->header.m = &packet_methods[PROT_AUTH_RESP_PACKET];
  2034. packet->header.persistent = persistent;
  2035. }
  2036. DBG_RETURN(packet);
  2037. }
  2038. /* }}} */
  2039. /* {{{ mysqlnd_protocol::get_change_auth_response_packet */
  2040. static struct st_mysqlnd_packet_change_auth_response *
  2041. MYSQLND_METHOD(mysqlnd_protocol, get_change_auth_response_packet)(MYSQLND_PROTOCOL * const protocol, zend_bool persistent TSRMLS_DC)
  2042. {
  2043. struct st_mysqlnd_packet_change_auth_response * packet = mnd_pecalloc(1, packet_methods[PROT_CHANGE_AUTH_RESP_PACKET].struct_size, persistent);
  2044. DBG_ENTER("mysqlnd_protocol::get_change_auth_response_packet");
  2045. if (packet) {
  2046. packet->header.m = &packet_methods[PROT_CHANGE_AUTH_RESP_PACKET];
  2047. packet->header.persistent = persistent;
  2048. }
  2049. DBG_RETURN(packet);
  2050. }
  2051. /* }}} */
  2052. /* {{{ mysqlnd_protocol::get_ok_packet */
  2053. static struct st_mysqlnd_packet_ok *
  2054. MYSQLND_METHOD(mysqlnd_protocol, get_ok_packet)(MYSQLND_PROTOCOL * const protocol, zend_bool persistent TSRMLS_DC)
  2055. {
  2056. struct st_mysqlnd_packet_ok * packet = mnd_pecalloc(1, packet_methods[PROT_OK_PACKET].struct_size, persistent);
  2057. DBG_ENTER("mysqlnd_protocol::get_ok_packet");
  2058. if (packet) {
  2059. packet->header.m = &packet_methods[PROT_OK_PACKET];
  2060. packet->header.persistent = persistent;
  2061. }
  2062. DBG_RETURN(packet);
  2063. }
  2064. /* }}} */
  2065. /* {{{ mysqlnd_protocol::get_eof_packet */
  2066. static struct st_mysqlnd_packet_eof *
  2067. MYSQLND_METHOD(mysqlnd_protocol, get_eof_packet)(MYSQLND_PROTOCOL * const protocol, zend_bool persistent TSRMLS_DC)
  2068. {
  2069. struct st_mysqlnd_packet_eof * packet = mnd_pecalloc(1, packet_methods[PROT_EOF_PACKET].struct_size, persistent);
  2070. DBG_ENTER("mysqlnd_protocol::get_eof_packet");
  2071. if (packet) {
  2072. packet->header.m = &packet_methods[PROT_EOF_PACKET];
  2073. packet->header.persistent = persistent;
  2074. }
  2075. DBG_RETURN(packet);
  2076. }
  2077. /* }}} */
  2078. /* {{{ mysqlnd_protocol::get_command_packet */
  2079. static struct st_mysqlnd_packet_command *
  2080. MYSQLND_METHOD(mysqlnd_protocol, get_command_packet)(MYSQLND_PROTOCOL * const protocol, zend_bool persistent TSRMLS_DC)
  2081. {
  2082. struct st_mysqlnd_packet_command * packet = mnd_pecalloc(1, packet_methods[PROT_CMD_PACKET].struct_size, persistent);
  2083. DBG_ENTER("mysqlnd_protocol::get_command_packet");
  2084. if (packet) {
  2085. packet->header.m = &packet_methods[PROT_CMD_PACKET];
  2086. packet->header.persistent = persistent;
  2087. }
  2088. DBG_RETURN(packet);
  2089. }
  2090. /* }}} */
  2091. /* {{{ mysqlnd_protocol::get_rset_packet */
  2092. static struct st_mysqlnd_packet_rset_header *
  2093. MYSQLND_METHOD(mysqlnd_protocol, get_rset_header_packet)(MYSQLND_PROTOCOL * const protocol, zend_bool persistent TSRMLS_DC)
  2094. {
  2095. struct st_mysqlnd_packet_rset_header * packet = mnd_pecalloc(1, packet_methods[PROT_RSET_HEADER_PACKET].struct_size, persistent);
  2096. DBG_ENTER("mysqlnd_protocol::get_rset_header_packet");
  2097. if (packet) {
  2098. packet->header.m = &packet_methods[PROT_RSET_HEADER_PACKET];
  2099. packet->header.persistent = persistent;
  2100. }
  2101. DBG_RETURN(packet);
  2102. }
  2103. /* }}} */
  2104. /* {{{ mysqlnd_protocol::get_result_field_packet */
  2105. static struct st_mysqlnd_packet_res_field *
  2106. MYSQLND_METHOD(mysqlnd_protocol, get_result_field_packet)(MYSQLND_PROTOCOL * const protocol, zend_bool persistent TSRMLS_DC)
  2107. {
  2108. struct st_mysqlnd_packet_res_field * packet = mnd_pecalloc(1, packet_methods[PROT_RSET_FLD_PACKET].struct_size, persistent);
  2109. DBG_ENTER("mysqlnd_protocol::get_result_field_packet");
  2110. if (packet) {
  2111. packet->header.m = &packet_methods[PROT_RSET_FLD_PACKET];
  2112. packet->header.persistent = persistent;
  2113. }
  2114. DBG_RETURN(packet);
  2115. }
  2116. /* }}} */
  2117. /* {{{ mysqlnd_protocol::get_row_packet */
  2118. static struct st_mysqlnd_packet_row *
  2119. MYSQLND_METHOD(mysqlnd_protocol, get_row_packet)(MYSQLND_PROTOCOL * const protocol, zend_bool persistent TSRMLS_DC)
  2120. {
  2121. struct st_mysqlnd_packet_row * packet = mnd_pecalloc(1, packet_methods[PROT_ROW_PACKET].struct_size, persistent);
  2122. DBG_ENTER("mysqlnd_protocol::get_row_packet");
  2123. if (packet) {
  2124. packet->header.m = &packet_methods[PROT_ROW_PACKET];
  2125. packet->header.persistent = persistent;
  2126. }
  2127. DBG_RETURN(packet);
  2128. }
  2129. /* }}} */
  2130. /* {{{ mysqlnd_protocol::get_stats_packet */
  2131. static struct st_mysqlnd_packet_stats *
  2132. MYSQLND_METHOD(mysqlnd_protocol, get_stats_packet)(MYSQLND_PROTOCOL * const protocol, zend_bool persistent TSRMLS_DC)
  2133. {
  2134. struct st_mysqlnd_packet_stats * packet = mnd_pecalloc(1, packet_methods[PROT_STATS_PACKET].struct_size, persistent);
  2135. DBG_ENTER("mysqlnd_protocol::get_stats_packet");
  2136. if (packet) {
  2137. packet->header.m = &packet_methods[PROT_STATS_PACKET];
  2138. packet->header.persistent = persistent;
  2139. }
  2140. DBG_RETURN(packet);
  2141. }
  2142. /* }}} */
  2143. /* {{{ mysqlnd_protocol::get_prepare_response_packet */
  2144. static struct st_mysqlnd_packet_prepare_response *
  2145. MYSQLND_METHOD(mysqlnd_protocol, get_prepare_response_packet)(MYSQLND_PROTOCOL * const protocol, zend_bool persistent TSRMLS_DC)
  2146. {
  2147. struct st_mysqlnd_packet_prepare_response * packet = mnd_pecalloc(1, packet_methods[PROT_PREPARE_RESP_PACKET].struct_size, persistent);
  2148. DBG_ENTER("mysqlnd_protocol::get_prepare_response_packet");
  2149. if (packet) {
  2150. packet->header.m = &packet_methods[PROT_PREPARE_RESP_PACKET];
  2151. packet->header.persistent = persistent;
  2152. }
  2153. DBG_RETURN(packet);
  2154. }
  2155. /* }}} */
  2156. /* {{{ mysqlnd_protocol::get_change_user_response_packet */
  2157. static struct st_mysqlnd_packet_chg_user_resp*
  2158. MYSQLND_METHOD(mysqlnd_protocol, get_change_user_response_packet)(MYSQLND_PROTOCOL * const protocol, zend_bool persistent TSRMLS_DC)
  2159. {
  2160. struct st_mysqlnd_packet_chg_user_resp * packet = mnd_pecalloc(1, packet_methods[PROT_CHG_USER_RESP_PACKET].struct_size, persistent);
  2161. DBG_ENTER("mysqlnd_protocol::get_change_user_response_packet");
  2162. if (packet) {
  2163. packet->header.m = &packet_methods[PROT_CHG_USER_RESP_PACKET];
  2164. packet->header.persistent = persistent;
  2165. }
  2166. DBG_RETURN(packet);
  2167. }
  2168. /* }}} */
  2169. /* {{{ mysqlnd_protocol::get_sha256_pk_request_packet */
  2170. static struct st_mysqlnd_packet_sha256_pk_request *
  2171. MYSQLND_METHOD(mysqlnd_protocol, get_sha256_pk_request_packet)(MYSQLND_PROTOCOL * const protocol, zend_bool persistent TSRMLS_DC)
  2172. {
  2173. struct st_mysqlnd_packet_sha256_pk_request * packet = mnd_pecalloc(1, packet_methods[PROT_SHA256_PK_REQUEST_PACKET].struct_size, persistent);
  2174. DBG_ENTER("mysqlnd_protocol::get_sha256_pk_request_packet");
  2175. if (packet) {
  2176. packet->header.m = &packet_methods[PROT_SHA256_PK_REQUEST_PACKET];
  2177. packet->header.persistent = persistent;
  2178. }
  2179. DBG_RETURN(packet);
  2180. }
  2181. /* }}} */
  2182. /* {{{ mysqlnd_protocol::get_sha256_pk_request_response_packet */
  2183. static struct st_mysqlnd_packet_sha256_pk_request_response *
  2184. MYSQLND_METHOD(mysqlnd_protocol, get_sha256_pk_request_response_packet)(MYSQLND_PROTOCOL * const protocol, zend_bool persistent TSRMLS_DC)
  2185. {
  2186. struct st_mysqlnd_packet_sha256_pk_request_response * packet = mnd_pecalloc(1, packet_methods[PROT_SHA256_PK_REQUEST_RESPONSE_PACKET].struct_size, persistent);
  2187. DBG_ENTER("mysqlnd_protocol::get_sha256_pk_request_response_packet");
  2188. if (packet) {
  2189. packet->header.m = &packet_methods[PROT_SHA256_PK_REQUEST_RESPONSE_PACKET];
  2190. packet->header.persistent = persistent;
  2191. }
  2192. DBG_RETURN(packet);
  2193. }
  2194. /* }}} */
  2195. MYSQLND_CLASS_METHODS_START(mysqlnd_protocol)
  2196. MYSQLND_METHOD(mysqlnd_protocol, get_greet_packet),
  2197. MYSQLND_METHOD(mysqlnd_protocol, get_auth_packet),
  2198. MYSQLND_METHOD(mysqlnd_protocol, get_auth_response_packet),
  2199. MYSQLND_METHOD(mysqlnd_protocol, get_change_auth_response_packet),
  2200. MYSQLND_METHOD(mysqlnd_protocol, get_ok_packet),
  2201. MYSQLND_METHOD(mysqlnd_protocol, get_command_packet),
  2202. MYSQLND_METHOD(mysqlnd_protocol, get_eof_packet),
  2203. MYSQLND_METHOD(mysqlnd_protocol, get_rset_header_packet),
  2204. MYSQLND_METHOD(mysqlnd_protocol, get_result_field_packet),
  2205. MYSQLND_METHOD(mysqlnd_protocol, get_row_packet),
  2206. MYSQLND_METHOD(mysqlnd_protocol, get_stats_packet),
  2207. MYSQLND_METHOD(mysqlnd_protocol, get_prepare_response_packet),
  2208. MYSQLND_METHOD(mysqlnd_protocol, get_change_user_response_packet),
  2209. MYSQLND_METHOD(mysqlnd_protocol, get_sha256_pk_request_packet),
  2210. MYSQLND_METHOD(mysqlnd_protocol, get_sha256_pk_request_response_packet)
  2211. MYSQLND_CLASS_METHODS_END;
  2212. /* {{{ mysqlnd_protocol_init */
  2213. PHPAPI MYSQLND_PROTOCOL *
  2214. mysqlnd_protocol_init(zend_bool persistent TSRMLS_DC)
  2215. {
  2216. MYSQLND_PROTOCOL * ret;
  2217. DBG_ENTER("mysqlnd_protocol_init");
  2218. ret = MYSQLND_CLASS_METHOD_TABLE_NAME(mysqlnd_object_factory).get_protocol_decoder(persistent TSRMLS_CC);
  2219. DBG_RETURN(ret);
  2220. }
  2221. /* }}} */
  2222. /* {{{ mysqlnd_protocol_free */
  2223. PHPAPI void
  2224. mysqlnd_protocol_free(MYSQLND_PROTOCOL * const protocol TSRMLS_DC)
  2225. {
  2226. DBG_ENTER("mysqlnd_protocol_free");
  2227. if (protocol) {
  2228. zend_bool pers = protocol->persistent;
  2229. mnd_pefree(protocol, pers);
  2230. }
  2231. DBG_VOID_RETURN;
  2232. }
  2233. /* }}} */
  2234. /*
  2235. * Local variables:
  2236. * tab-width: 4
  2237. * c-basic-offset: 4
  2238. * End:
  2239. * vim600: noet sw=4 ts=4 fdm=marker
  2240. * vim<600: noet sw=4 ts=4
  2241. */