mysqlnd_auth.c 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851
  1. /*
  2. +----------------------------------------------------------------------+
  3. | PHP Version 7 |
  4. +----------------------------------------------------------------------+
  5. | Copyright (c) 2006-2018 The PHP Group |
  6. +----------------------------------------------------------------------+
  7. | This source file is subject to version 3.01 of the PHP license, |
  8. | that is bundled with this package in the file LICENSE, and is |
  9. | available through the world-wide-web at the following url: |
  10. | http://www.php.net/license/3_01.txt |
  11. | If you did not receive a copy of the PHP license and are unable to |
  12. | obtain it through the world-wide-web, please send a note to |
  13. | license@php.net so we can mail you a copy immediately. |
  14. +----------------------------------------------------------------------+
  15. | Authors: Andrey Hristov <andrey@php.net> |
  16. | Ulf Wendel <uw@php.net> |
  17. +----------------------------------------------------------------------+
  18. */
  19. #include "php.h"
  20. #include "mysqlnd.h"
  21. #include "mysqlnd_structs.h"
  22. #include "mysqlnd_auth.h"
  23. #include "mysqlnd_wireprotocol.h"
  24. #include "mysqlnd_connection.h"
  25. #include "mysqlnd_priv.h"
  26. #include "mysqlnd_charset.h"
  27. #include "mysqlnd_debug.h"
  28. static const char * const mysqlnd_old_passwd = "mysqlnd cannot connect to MySQL 4.1+ using the old insecure authentication. "
  29. "Please use an administration tool to reset your password with the command SET PASSWORD = PASSWORD('your_existing_password'). This will "
  30. "store a new, and more secure, hash value in mysql.user. If this user is used in other scripts executed by PHP 5.2 or earlier you might need to remove the old-passwords "
  31. "flag from your my.cnf file";
  32. /* {{{ mysqlnd_run_authentication */
  33. enum_func_status
  34. mysqlnd_run_authentication(
  35. MYSQLND_CONN_DATA * conn,
  36. const char * const user,
  37. const char * const passwd,
  38. const size_t passwd_len,
  39. const char * const db,
  40. const size_t db_len,
  41. const MYSQLND_STRING auth_plugin_data,
  42. const char * const auth_protocol,
  43. unsigned int charset_no,
  44. const MYSQLND_SESSION_OPTIONS * const session_options,
  45. zend_ulong mysql_flags,
  46. zend_bool silent,
  47. zend_bool is_change_user
  48. )
  49. {
  50. enum_func_status ret = FAIL;
  51. zend_bool first_call = TRUE;
  52. char * switch_to_auth_protocol = NULL;
  53. size_t switch_to_auth_protocol_len = 0;
  54. char * requested_protocol = NULL;
  55. zend_uchar * plugin_data;
  56. size_t plugin_data_len;
  57. DBG_ENTER("mysqlnd_run_authentication");
  58. plugin_data_len = auth_plugin_data.l;
  59. plugin_data = mnd_emalloc(plugin_data_len + 1);
  60. if (!plugin_data) {
  61. goto end;
  62. }
  63. memcpy(plugin_data, auth_plugin_data.s, plugin_data_len);
  64. plugin_data[plugin_data_len] = '\0';
  65. requested_protocol = mnd_pestrdup(auth_protocol? auth_protocol : MYSQLND_DEFAULT_AUTH_PROTOCOL, FALSE);
  66. if (!requested_protocol) {
  67. goto end;
  68. }
  69. do {
  70. struct st_mysqlnd_authentication_plugin * auth_plugin = conn->m->fetch_auth_plugin_by_name(requested_protocol);
  71. if (!auth_plugin) {
  72. if (first_call) {
  73. mnd_pefree(requested_protocol, FALSE);
  74. requested_protocol = mnd_pestrdup(MYSQLND_DEFAULT_AUTH_PROTOCOL, FALSE);
  75. } else {
  76. php_error_docref(NULL, E_WARNING, "The server requested authentication method unknown to the client [%s]", requested_protocol);
  77. SET_CLIENT_ERROR(conn->error_info, CR_NOT_IMPLEMENTED, UNKNOWN_SQLSTATE, "The server requested authentication method unknown to the client");
  78. goto end;
  79. }
  80. }
  81. {
  82. zend_uchar * switch_to_auth_protocol_data = NULL;
  83. size_t switch_to_auth_protocol_data_len = 0;
  84. zend_uchar * scrambled_data = NULL;
  85. size_t scrambled_data_len = 0;
  86. switch_to_auth_protocol = NULL;
  87. switch_to_auth_protocol_len = 0;
  88. if (conn->authentication_plugin_data.s) {
  89. mnd_pefree(conn->authentication_plugin_data.s, conn->persistent);
  90. conn->authentication_plugin_data.s = NULL;
  91. }
  92. conn->authentication_plugin_data.l = plugin_data_len;
  93. conn->authentication_plugin_data.s = mnd_pemalloc(conn->authentication_plugin_data.l, conn->persistent);
  94. if (!conn->authentication_plugin_data.s) {
  95. SET_OOM_ERROR(conn->error_info);
  96. goto end;
  97. }
  98. memcpy(conn->authentication_plugin_data.s, plugin_data, plugin_data_len);
  99. DBG_INF_FMT("salt(%d)=[%.*s]", plugin_data_len, plugin_data_len, plugin_data);
  100. /* The data should be allocated with malloc() */
  101. if (auth_plugin) {
  102. scrambled_data =
  103. auth_plugin->methods.get_auth_data(NULL, &scrambled_data_len, conn, user, passwd, passwd_len,
  104. plugin_data, plugin_data_len, session_options,
  105. conn->protocol_frame_codec->data, mysql_flags);
  106. }
  107. if (conn->error_info->error_no) {
  108. goto end;
  109. }
  110. if (FALSE == is_change_user) {
  111. ret = mysqlnd_auth_handshake(conn, user, passwd, passwd_len, db, db_len, session_options, mysql_flags,
  112. charset_no,
  113. first_call,
  114. requested_protocol,
  115. scrambled_data, scrambled_data_len,
  116. &switch_to_auth_protocol, &switch_to_auth_protocol_len,
  117. &switch_to_auth_protocol_data, &switch_to_auth_protocol_data_len
  118. );
  119. } else {
  120. ret = mysqlnd_auth_change_user(conn, user, strlen(user), passwd, passwd_len, db, db_len, silent,
  121. first_call,
  122. requested_protocol,
  123. scrambled_data, scrambled_data_len,
  124. &switch_to_auth_protocol, &switch_to_auth_protocol_len,
  125. &switch_to_auth_protocol_data, &switch_to_auth_protocol_data_len
  126. );
  127. }
  128. first_call = FALSE;
  129. free(scrambled_data);
  130. DBG_INF_FMT("switch_to_auth_protocol=%s", switch_to_auth_protocol? switch_to_auth_protocol:"n/a");
  131. if (requested_protocol && switch_to_auth_protocol) {
  132. mnd_efree(requested_protocol);
  133. requested_protocol = switch_to_auth_protocol;
  134. }
  135. if (plugin_data) {
  136. mnd_efree(plugin_data);
  137. }
  138. plugin_data_len = switch_to_auth_protocol_data_len;
  139. plugin_data = switch_to_auth_protocol_data;
  140. }
  141. DBG_INF_FMT("conn->error_info->error_no = %d", conn->error_info->error_no);
  142. } while (ret == FAIL && conn->error_info->error_no == 0 && switch_to_auth_protocol != NULL);
  143. if (ret == PASS) {
  144. DBG_INF_FMT("saving requested_protocol=%s", requested_protocol);
  145. conn->m->set_client_option(conn, MYSQLND_OPT_AUTH_PROTOCOL, requested_protocol);
  146. }
  147. end:
  148. if (plugin_data) {
  149. mnd_efree(plugin_data);
  150. }
  151. if (requested_protocol) {
  152. mnd_efree(requested_protocol);
  153. }
  154. DBG_RETURN(ret);
  155. }
  156. /* }}} */
  157. /* {{{ mysqlnd_switch_to_ssl_if_needed */
  158. static enum_func_status
  159. mysqlnd_switch_to_ssl_if_needed(MYSQLND_CONN_DATA * conn,
  160. unsigned int charset_no,
  161. size_t server_capabilities,
  162. const MYSQLND_SESSION_OPTIONS * const session_options,
  163. zend_ulong mysql_flags)
  164. {
  165. enum_func_status ret = FAIL;
  166. const MYSQLND_CHARSET * charset;
  167. DBG_ENTER("mysqlnd_switch_to_ssl_if_needed");
  168. if (session_options->charset_name && (charset = mysqlnd_find_charset_name(session_options->charset_name))) {
  169. charset_no = charset->nr;
  170. }
  171. {
  172. size_t client_capabilities = mysql_flags;
  173. ret = conn->run_command(COM_ENABLE_SSL, conn, client_capabilities, server_capabilities, charset_no);
  174. }
  175. DBG_RETURN(ret);
  176. }
  177. /* }}} */
  178. /* {{{ mysqlnd_connect_run_authentication */
  179. enum_func_status
  180. mysqlnd_connect_run_authentication(
  181. MYSQLND_CONN_DATA * conn,
  182. const char * const user,
  183. const char * const passwd,
  184. const char * const db,
  185. size_t db_len,
  186. size_t passwd_len,
  187. MYSQLND_STRING authentication_plugin_data,
  188. const char * const authentication_protocol,
  189. const unsigned int charset_no,
  190. size_t server_capabilities,
  191. const MYSQLND_SESSION_OPTIONS * const session_options,
  192. zend_ulong mysql_flags
  193. )
  194. {
  195. enum_func_status ret = FAIL;
  196. DBG_ENTER("mysqlnd_connect_run_authentication");
  197. ret = mysqlnd_switch_to_ssl_if_needed(conn, charset_no, server_capabilities, session_options, mysql_flags);
  198. if (PASS == ret) {
  199. ret = mysqlnd_run_authentication(conn, user, passwd, passwd_len, db, db_len,
  200. authentication_plugin_data, authentication_protocol,
  201. charset_no, session_options, mysql_flags, FALSE /*silent*/, FALSE/*is_change*/);
  202. }
  203. DBG_RETURN(ret);
  204. }
  205. /* }}} */
  206. /* {{{ mysqlnd_auth_handshake */
  207. enum_func_status
  208. mysqlnd_auth_handshake(MYSQLND_CONN_DATA * conn,
  209. const char * const user,
  210. const char * const passwd,
  211. const size_t passwd_len,
  212. const char * const db,
  213. const size_t db_len,
  214. const MYSQLND_SESSION_OPTIONS * const session_options,
  215. zend_ulong mysql_flags,
  216. unsigned int server_charset_no,
  217. zend_bool use_full_blown_auth_packet,
  218. const char * const auth_protocol,
  219. const zend_uchar * const auth_plugin_data,
  220. const size_t auth_plugin_data_len,
  221. char ** switch_to_auth_protocol,
  222. size_t * switch_to_auth_protocol_len,
  223. zend_uchar ** switch_to_auth_protocol_data,
  224. size_t * switch_to_auth_protocol_data_len
  225. )
  226. {
  227. enum_func_status ret = FAIL;
  228. const MYSQLND_CHARSET * charset = NULL;
  229. MYSQLND_PACKET_AUTH_RESPONSE auth_resp_packet;
  230. DBG_ENTER("mysqlnd_auth_handshake");
  231. conn->payload_decoder_factory->m.init_auth_response_packet(&auth_resp_packet);
  232. if (use_full_blown_auth_packet != TRUE) {
  233. MYSQLND_PACKET_CHANGE_AUTH_RESPONSE change_auth_resp_packet;
  234. conn->payload_decoder_factory->m.init_change_auth_response_packet(&change_auth_resp_packet);
  235. change_auth_resp_packet.auth_data = auth_plugin_data;
  236. change_auth_resp_packet.auth_data_len = auth_plugin_data_len;
  237. if (!PACKET_WRITE(conn, &change_auth_resp_packet)) {
  238. SET_CONNECTION_STATE(&conn->state, CONN_QUIT_SENT);
  239. SET_CLIENT_ERROR(conn->error_info, CR_SERVER_GONE_ERROR, UNKNOWN_SQLSTATE, mysqlnd_server_gone);
  240. PACKET_FREE(&change_auth_resp_packet);
  241. goto end;
  242. }
  243. PACKET_FREE(&change_auth_resp_packet);
  244. } else {
  245. MYSQLND_PACKET_AUTH auth_packet;
  246. conn->payload_decoder_factory->m.init_auth_packet(&auth_packet);
  247. auth_packet.client_flags = mysql_flags;
  248. auth_packet.max_packet_size = session_options->max_allowed_packet;
  249. if (session_options->charset_name && (charset = mysqlnd_find_charset_name(session_options->charset_name))) {
  250. auth_packet.charset_no = charset->nr;
  251. } else {
  252. auth_packet.charset_no = server_charset_no;
  253. }
  254. auth_packet.send_auth_data = TRUE;
  255. auth_packet.user = user;
  256. auth_packet.db = db;
  257. auth_packet.db_len = db_len;
  258. auth_packet.auth_data = auth_plugin_data;
  259. auth_packet.auth_data_len = auth_plugin_data_len;
  260. auth_packet.auth_plugin_name = auth_protocol;
  261. if (conn->server_capabilities & CLIENT_CONNECT_ATTRS) {
  262. auth_packet.connect_attr = conn->options->connect_attr;
  263. }
  264. if (!PACKET_WRITE(conn, &auth_packet)) {
  265. PACKET_FREE(&auth_packet);
  266. goto end;
  267. }
  268. if (use_full_blown_auth_packet == TRUE) {
  269. conn->charset = mysqlnd_find_charset_nr(auth_packet.charset_no);
  270. }
  271. PACKET_FREE(&auth_packet);
  272. }
  273. if (FAIL == PACKET_READ(conn, &auth_resp_packet) || auth_resp_packet.response_code >= 0xFE) {
  274. if (auth_resp_packet.response_code == 0xFE) {
  275. /* old authentication with new server !*/
  276. if (!auth_resp_packet.new_auth_protocol) {
  277. DBG_ERR(mysqlnd_old_passwd);
  278. SET_CLIENT_ERROR(conn->error_info, CR_UNKNOWN_ERROR, UNKNOWN_SQLSTATE, mysqlnd_old_passwd);
  279. } else {
  280. *switch_to_auth_protocol = mnd_pestrndup(auth_resp_packet.new_auth_protocol, auth_resp_packet.new_auth_protocol_len, FALSE);
  281. *switch_to_auth_protocol_len = auth_resp_packet.new_auth_protocol_len;
  282. if (auth_resp_packet.new_auth_protocol_data) {
  283. *switch_to_auth_protocol_data_len = auth_resp_packet.new_auth_protocol_data_len;
  284. *switch_to_auth_protocol_data = mnd_emalloc(*switch_to_auth_protocol_data_len);
  285. memcpy(*switch_to_auth_protocol_data, auth_resp_packet.new_auth_protocol_data, *switch_to_auth_protocol_data_len);
  286. } else {
  287. *switch_to_auth_protocol_data = NULL;
  288. *switch_to_auth_protocol_data_len = 0;
  289. }
  290. }
  291. } else if (auth_resp_packet.response_code == 0xFF) {
  292. if (auth_resp_packet.sqlstate[0]) {
  293. strlcpy(conn->error_info->sqlstate, auth_resp_packet.sqlstate, sizeof(conn->error_info->sqlstate));
  294. DBG_ERR_FMT("ERROR:%u [SQLSTATE:%s] %s", auth_resp_packet.error_no, auth_resp_packet.sqlstate, auth_resp_packet.error);
  295. }
  296. SET_CLIENT_ERROR(conn->error_info, auth_resp_packet.error_no, UNKNOWN_SQLSTATE, auth_resp_packet.error);
  297. }
  298. goto end;
  299. }
  300. SET_NEW_MESSAGE(conn->last_message.s, conn->last_message.l, auth_resp_packet.message, auth_resp_packet.message_len);
  301. ret = PASS;
  302. end:
  303. PACKET_FREE(&auth_resp_packet);
  304. DBG_RETURN(ret);
  305. }
  306. /* }}} */
  307. /* {{{ mysqlnd_auth_change_user */
  308. enum_func_status
  309. mysqlnd_auth_change_user(MYSQLND_CONN_DATA * const conn,
  310. const char * const user,
  311. const size_t user_len,
  312. const char * const passwd,
  313. const size_t passwd_len,
  314. const char * const db,
  315. const size_t db_len,
  316. const zend_bool silent,
  317. zend_bool use_full_blown_auth_packet,
  318. const char * const auth_protocol,
  319. zend_uchar * auth_plugin_data,
  320. size_t auth_plugin_data_len,
  321. char ** switch_to_auth_protocol,
  322. size_t * switch_to_auth_protocol_len,
  323. zend_uchar ** switch_to_auth_protocol_data,
  324. size_t * switch_to_auth_protocol_data_len
  325. )
  326. {
  327. enum_func_status ret = FAIL;
  328. const MYSQLND_CHARSET * old_cs = conn->charset;
  329. MYSQLND_PACKET_CHG_USER_RESPONSE chg_user_resp;
  330. DBG_ENTER("mysqlnd_auth_change_user");
  331. conn->payload_decoder_factory->m.init_change_user_response_packet(&chg_user_resp);
  332. if (use_full_blown_auth_packet != TRUE) {
  333. MYSQLND_PACKET_CHANGE_AUTH_RESPONSE change_auth_resp_packet;
  334. conn->payload_decoder_factory->m.init_change_auth_response_packet(&change_auth_resp_packet);
  335. change_auth_resp_packet.auth_data = auth_plugin_data;
  336. change_auth_resp_packet.auth_data_len = auth_plugin_data_len;
  337. if (!PACKET_WRITE(conn, &change_auth_resp_packet)) {
  338. SET_CONNECTION_STATE(&conn->state, CONN_QUIT_SENT);
  339. SET_CLIENT_ERROR(conn->error_info, CR_SERVER_GONE_ERROR, UNKNOWN_SQLSTATE, mysqlnd_server_gone);
  340. PACKET_FREE(&change_auth_resp_packet);
  341. goto end;
  342. }
  343. PACKET_FREE(&change_auth_resp_packet);
  344. } else {
  345. MYSQLND_PACKET_AUTH auth_packet;
  346. conn->payload_decoder_factory->m.init_auth_packet(&auth_packet);
  347. auth_packet.is_change_user_packet = TRUE;
  348. auth_packet.user = user;
  349. auth_packet.db = db;
  350. auth_packet.db_len = db_len;
  351. auth_packet.silent = silent;
  352. auth_packet.auth_data = auth_plugin_data;
  353. auth_packet.auth_data_len = auth_plugin_data_len;
  354. auth_packet.auth_plugin_name = auth_protocol;
  355. if (conn->server_capabilities & CLIENT_CONNECT_ATTRS) {
  356. auth_packet.connect_attr = conn->options->connect_attr;
  357. }
  358. if (conn->m->get_server_version(conn) >= 50123) {
  359. auth_packet.charset_no = conn->charset->nr;
  360. }
  361. if (!PACKET_WRITE(conn, &auth_packet)) {
  362. SET_CONNECTION_STATE(&conn->state, CONN_QUIT_SENT);
  363. SET_CLIENT_ERROR(conn->error_info, CR_SERVER_GONE_ERROR, UNKNOWN_SQLSTATE, mysqlnd_server_gone);
  364. PACKET_FREE(&auth_packet);
  365. goto end;
  366. }
  367. PACKET_FREE(&auth_packet);
  368. }
  369. ret = PACKET_READ(conn, &chg_user_resp);
  370. COPY_CLIENT_ERROR(conn->error_info, chg_user_resp.error_info);
  371. if (0xFE == chg_user_resp.response_code) {
  372. ret = FAIL;
  373. if (!chg_user_resp.new_auth_protocol) {
  374. DBG_ERR(mysqlnd_old_passwd);
  375. SET_CLIENT_ERROR(conn->error_info, CR_UNKNOWN_ERROR, UNKNOWN_SQLSTATE, mysqlnd_old_passwd);
  376. } else {
  377. *switch_to_auth_protocol = mnd_pestrndup(chg_user_resp.new_auth_protocol, chg_user_resp.new_auth_protocol_len, FALSE);
  378. *switch_to_auth_protocol_len = chg_user_resp.new_auth_protocol_len;
  379. if (chg_user_resp.new_auth_protocol_data) {
  380. *switch_to_auth_protocol_data_len = chg_user_resp.new_auth_protocol_data_len;
  381. *switch_to_auth_protocol_data = mnd_emalloc(*switch_to_auth_protocol_data_len);
  382. memcpy(*switch_to_auth_protocol_data, chg_user_resp.new_auth_protocol_data, *switch_to_auth_protocol_data_len);
  383. } else {
  384. *switch_to_auth_protocol_data = NULL;
  385. *switch_to_auth_protocol_data_len = 0;
  386. }
  387. }
  388. }
  389. if (conn->error_info->error_no) {
  390. ret = FAIL;
  391. /*
  392. COM_CHANGE_USER is broken in 5.1. At least in 5.1.15 and 5.1.14, 5.1.11 is immune.
  393. bug#25371 mysql_change_user() triggers "packets out of sync"
  394. When it gets fixed, there should be one more check here
  395. */
  396. if (conn->m->get_server_version(conn) > 50113L &&conn->m->get_server_version(conn) < 50118L) {
  397. MYSQLND_PACKET_OK redundant_error_packet;
  398. conn->payload_decoder_factory->m.init_ok_packet(&redundant_error_packet);
  399. PACKET_READ(conn, &redundant_error_packet);
  400. PACKET_FREE(&redundant_error_packet);
  401. DBG_INF_FMT("Server is %u, buggy, sends two ERR messages", conn->m->get_server_version(conn));
  402. }
  403. }
  404. if (ret == PASS) {
  405. char * tmp = NULL;
  406. /* if we get conn->username as parameter and then we first free it, then estrndup it, we will crash */
  407. tmp = mnd_pestrndup(user, user_len, conn->persistent);
  408. if (conn->username.s) {
  409. mnd_pefree(conn->username.s, conn->persistent);
  410. }
  411. conn->username.s = tmp;
  412. tmp = mnd_pestrdup(passwd, conn->persistent);
  413. if (conn->password.s) {
  414. mnd_pefree(conn->password.s, conn->persistent);
  415. }
  416. conn->password.s = tmp;
  417. if (conn->last_message.s) {
  418. mnd_efree(conn->last_message.s);
  419. conn->last_message.s = NULL;
  420. }
  421. UPSERT_STATUS_RESET(conn->upsert_status);
  422. /* set charset for old servers */
  423. if (conn->m->get_server_version(conn) < 50123) {
  424. ret = conn->m->set_charset(conn, old_cs->name);
  425. }
  426. } else if (ret == FAIL && chg_user_resp.server_asked_323_auth == TRUE) {
  427. /* old authentication with new server !*/
  428. DBG_ERR(mysqlnd_old_passwd);
  429. SET_CLIENT_ERROR(conn->error_info, CR_UNKNOWN_ERROR, UNKNOWN_SQLSTATE, mysqlnd_old_passwd);
  430. }
  431. end:
  432. PACKET_FREE(&chg_user_resp);
  433. DBG_RETURN(ret);
  434. }
  435. /* }}} */
  436. /******************************************* MySQL Native Password ***********************************/
  437. #include "ext/standard/sha1.h"
  438. /* {{{ php_mysqlnd_crypt */
  439. static void
  440. php_mysqlnd_crypt(zend_uchar *buffer, const zend_uchar *s1, const zend_uchar *s2, size_t len)
  441. {
  442. const zend_uchar *s1_end = s1 + len;
  443. while (s1 < s1_end) {
  444. *buffer++= *s1++ ^ *s2++;
  445. }
  446. }
  447. /* }}} */
  448. /* {{{ php_mysqlnd_scramble */
  449. void php_mysqlnd_scramble(zend_uchar * const buffer, const zend_uchar * const scramble, const zend_uchar * const password, const size_t password_len)
  450. {
  451. PHP_SHA1_CTX context;
  452. zend_uchar sha1[SHA1_MAX_LENGTH];
  453. zend_uchar sha2[SHA1_MAX_LENGTH];
  454. /* Phase 1: hash password */
  455. PHP_SHA1Init(&context);
  456. PHP_SHA1Update(&context, password, password_len);
  457. PHP_SHA1Final(sha1, &context);
  458. /* Phase 2: hash sha1 */
  459. PHP_SHA1Init(&context);
  460. PHP_SHA1Update(&context, (zend_uchar*)sha1, SHA1_MAX_LENGTH);
  461. PHP_SHA1Final(sha2, &context);
  462. /* Phase 3: hash scramble + sha2 */
  463. PHP_SHA1Init(&context);
  464. PHP_SHA1Update(&context, scramble, SCRAMBLE_LENGTH);
  465. PHP_SHA1Update(&context, (zend_uchar*)sha2, SHA1_MAX_LENGTH);
  466. PHP_SHA1Final(buffer, &context);
  467. /* let's crypt buffer now */
  468. php_mysqlnd_crypt(buffer, (const zend_uchar *)buffer, (const zend_uchar *)sha1, SHA1_MAX_LENGTH);
  469. }
  470. /* }}} */
  471. /* {{{ mysqlnd_native_auth_get_auth_data */
  472. static zend_uchar *
  473. mysqlnd_native_auth_get_auth_data(struct st_mysqlnd_authentication_plugin * self,
  474. size_t * auth_data_len,
  475. MYSQLND_CONN_DATA * conn, const char * const user, const char * const passwd,
  476. const size_t passwd_len, zend_uchar * auth_plugin_data, size_t auth_plugin_data_len,
  477. const MYSQLND_SESSION_OPTIONS * const session_options,
  478. const MYSQLND_PFC_DATA * const pfc_data,
  479. zend_ulong mysql_flags
  480. )
  481. {
  482. zend_uchar * ret = NULL;
  483. DBG_ENTER("mysqlnd_native_auth_get_auth_data");
  484. *auth_data_len = 0;
  485. /* 5.5.x reports 21 as scramble length because it needs to show the length of the data before the plugin name */
  486. if (auth_plugin_data_len < SCRAMBLE_LENGTH) {
  487. /* mysql_native_password only works with SCRAMBLE_LENGTH scramble */
  488. SET_CLIENT_ERROR(conn->error_info, CR_MALFORMED_PACKET, UNKNOWN_SQLSTATE, "The server sent wrong length for scramble");
  489. DBG_ERR_FMT("The server sent wrong length for scramble %u. Expected %u", auth_plugin_data_len, SCRAMBLE_LENGTH);
  490. DBG_RETURN(NULL);
  491. }
  492. /* copy scrambled pass*/
  493. if (passwd && passwd_len) {
  494. ret = malloc(SCRAMBLE_LENGTH);
  495. *auth_data_len = SCRAMBLE_LENGTH;
  496. /* In 4.1 we use CLIENT_SECURE_CONNECTION and thus the len of the buf should be passed */
  497. php_mysqlnd_scramble((zend_uchar*)ret, auth_plugin_data, (zend_uchar*)passwd, passwd_len);
  498. }
  499. DBG_RETURN(ret);
  500. }
  501. /* }}} */
  502. static struct st_mysqlnd_authentication_plugin mysqlnd_native_auth_plugin =
  503. {
  504. {
  505. MYSQLND_PLUGIN_API_VERSION,
  506. "auth_plugin_mysql_native_password",
  507. MYSQLND_VERSION_ID,
  508. PHP_MYSQLND_VERSION,
  509. "PHP License 3.01",
  510. "Andrey Hristov <andrey@php.net>, Ulf Wendel <uwendel@mysql.com>, Georg Richter <georg@mysql.com>",
  511. {
  512. NULL, /* no statistics , will be filled later if there are some */
  513. NULL, /* no statistics */
  514. },
  515. {
  516. NULL /* plugin shutdown */
  517. }
  518. },
  519. {/* methods */
  520. mysqlnd_native_auth_get_auth_data
  521. }
  522. };
  523. /******************************************* PAM Authentication ***********************************/
  524. /* {{{ mysqlnd_pam_auth_get_auth_data */
  525. static zend_uchar *
  526. mysqlnd_pam_auth_get_auth_data(struct st_mysqlnd_authentication_plugin * self,
  527. size_t * auth_data_len,
  528. MYSQLND_CONN_DATA * conn, const char * const user, const char * const passwd,
  529. const size_t passwd_len, zend_uchar * auth_plugin_data, size_t auth_plugin_data_len,
  530. const MYSQLND_SESSION_OPTIONS * const session_options,
  531. const MYSQLND_PFC_DATA * const pfc_data,
  532. zend_ulong mysql_flags
  533. )
  534. {
  535. zend_uchar * ret = NULL;
  536. /* copy pass*/
  537. if (passwd && passwd_len) {
  538. ret = (zend_uchar*) zend_strndup(passwd, passwd_len);
  539. }
  540. *auth_data_len = passwd_len;
  541. return ret;
  542. }
  543. /* }}} */
  544. static struct st_mysqlnd_authentication_plugin mysqlnd_pam_authentication_plugin =
  545. {
  546. {
  547. MYSQLND_PLUGIN_API_VERSION,
  548. "auth_plugin_mysql_clear_password",
  549. MYSQLND_VERSION_ID,
  550. PHP_MYSQLND_VERSION,
  551. "PHP License 3.01",
  552. "Andrey Hristov <andrey@php.net>, Ulf Wendel <uw@php.net>, Georg Richter <georg@php.net>",
  553. {
  554. NULL, /* no statistics , will be filled later if there are some */
  555. NULL, /* no statistics */
  556. },
  557. {
  558. NULL /* plugin shutdown */
  559. }
  560. },
  561. {/* methods */
  562. mysqlnd_pam_auth_get_auth_data
  563. }
  564. };
  565. /******************************************* SHA256 Password ***********************************/
  566. #ifdef MYSQLND_HAVE_SSL
  567. static void
  568. mysqlnd_xor_string(char * dst, const size_t dst_len, const char * xor_str, const size_t xor_str_len)
  569. {
  570. unsigned int i;
  571. for (i = 0; i <= dst_len; ++i) {
  572. dst[i] ^= xor_str[i % xor_str_len];
  573. }
  574. }
  575. #include <openssl/rsa.h>
  576. #include <openssl/pem.h>
  577. #include <openssl/err.h>
  578. /* {{{ mysqlnd_sha256_get_rsa_key */
  579. static RSA *
  580. mysqlnd_sha256_get_rsa_key(MYSQLND_CONN_DATA * conn,
  581. const MYSQLND_SESSION_OPTIONS * const session_options,
  582. const MYSQLND_PFC_DATA * const pfc_data
  583. )
  584. {
  585. RSA * ret = NULL;
  586. const char * fname = (pfc_data->sha256_server_public_key && pfc_data->sha256_server_public_key[0] != '\0')?
  587. pfc_data->sha256_server_public_key:
  588. MYSQLND_G(sha256_server_public_key);
  589. php_stream * stream;
  590. DBG_ENTER("mysqlnd_sha256_get_rsa_key");
  591. DBG_INF_FMT("options_s256_pk=[%s] MYSQLND_G(sha256_server_public_key)=[%s]",
  592. pfc_data->sha256_server_public_key? pfc_data->sha256_server_public_key:"n/a",
  593. MYSQLND_G(sha256_server_public_key)? MYSQLND_G(sha256_server_public_key):"n/a");
  594. if (!fname || fname[0] == '\0') {
  595. MYSQLND_PACKET_SHA256_PK_REQUEST pk_req_packet;
  596. MYSQLND_PACKET_SHA256_PK_REQUEST_RESPONSE pk_resp_packet;
  597. do {
  598. DBG_INF("requesting the public key from the server");
  599. conn->payload_decoder_factory->m.init_sha256_pk_request_packet(&pk_req_packet);
  600. conn->payload_decoder_factory->m.init_sha256_pk_request_response_packet(&pk_resp_packet);
  601. if (! PACKET_WRITE(conn, &pk_req_packet)) {
  602. DBG_ERR_FMT("Error while sending public key request packet");
  603. php_error(E_WARNING, "Error while sending public key request packet. PID=%d", getpid());
  604. SET_CONNECTION_STATE(&conn->state, CONN_QUIT_SENT);
  605. break;
  606. }
  607. if (FAIL == PACKET_READ(conn, &pk_resp_packet) || NULL == pk_resp_packet.public_key) {
  608. DBG_ERR_FMT("Error while receiving public key");
  609. php_error(E_WARNING, "Error while receiving public key. PID=%d", getpid());
  610. SET_CONNECTION_STATE(&conn->state, CONN_QUIT_SENT);
  611. break;
  612. }
  613. DBG_INF_FMT("Public key(%d):\n%s", pk_resp_packet.public_key_len, pk_resp_packet.public_key);
  614. /* now extract the public key */
  615. {
  616. BIO * bio = BIO_new_mem_buf(pk_resp_packet.public_key, pk_resp_packet.public_key_len);
  617. ret = PEM_read_bio_RSA_PUBKEY(bio, NULL, NULL, NULL);
  618. BIO_free(bio);
  619. }
  620. } while (0);
  621. PACKET_FREE(&pk_req_packet);
  622. PACKET_FREE(&pk_resp_packet);
  623. DBG_INF_FMT("ret=%p", ret);
  624. DBG_RETURN(ret);
  625. SET_CLIENT_ERROR(conn->error_info, CR_UNKNOWN_ERROR, UNKNOWN_SQLSTATE,
  626. "sha256_server_public_key is not set for the connection or as mysqlnd.sha256_server_public_key");
  627. DBG_ERR("server_public_key is not set");
  628. DBG_RETURN(NULL);
  629. } else {
  630. zend_string * key_str;
  631. DBG_INF_FMT("Key in a file. [%s]", fname);
  632. stream = php_stream_open_wrapper((char *) fname, "rb", REPORT_ERRORS, NULL);
  633. if (stream) {
  634. if ((key_str = php_stream_copy_to_mem(stream, PHP_STREAM_COPY_ALL, 0)) != NULL) {
  635. BIO * bio = BIO_new_mem_buf(ZSTR_VAL(key_str), ZSTR_LEN(key_str));
  636. ret = PEM_read_bio_RSA_PUBKEY(bio, NULL, NULL, NULL);
  637. BIO_free(bio);
  638. DBG_INF("Successfully loaded");
  639. DBG_INF_FMT("Public key:%*.s", ZSTR_LEN(key_str), ZSTR_VAL(key_str));
  640. zend_string_release_ex(key_str, 0);
  641. }
  642. php_stream_close(stream);
  643. }
  644. }
  645. DBG_RETURN(ret);
  646. }
  647. /* }}} */
  648. /* {{{ mysqlnd_sha256_auth_get_auth_data */
  649. static zend_uchar *
  650. mysqlnd_sha256_auth_get_auth_data(struct st_mysqlnd_authentication_plugin * self,
  651. size_t * auth_data_len,
  652. MYSQLND_CONN_DATA * conn, const char * const user, const char * const passwd,
  653. const size_t passwd_len, zend_uchar * auth_plugin_data, size_t auth_plugin_data_len,
  654. const MYSQLND_SESSION_OPTIONS * const session_options,
  655. const MYSQLND_PFC_DATA * const pfc_data,
  656. zend_ulong mysql_flags
  657. )
  658. {
  659. RSA * server_public_key;
  660. zend_uchar * ret = NULL;
  661. DBG_ENTER("mysqlnd_sha256_auth_get_auth_data");
  662. DBG_INF_FMT("salt(%d)=[%.*s]", auth_plugin_data_len, auth_plugin_data_len, auth_plugin_data);
  663. if (conn->vio->data->ssl) {
  664. DBG_INF("simple clear text under SSL");
  665. /* clear text under SSL */
  666. *auth_data_len = passwd_len;
  667. ret = malloc(passwd_len);
  668. memcpy(ret, passwd, passwd_len);
  669. } else {
  670. *auth_data_len = 0;
  671. server_public_key = mysqlnd_sha256_get_rsa_key(conn, session_options, pfc_data);
  672. if (server_public_key) {
  673. int server_public_key_len;
  674. char xor_str[passwd_len + 1];
  675. memcpy(xor_str, passwd, passwd_len);
  676. xor_str[passwd_len] = '\0';
  677. mysqlnd_xor_string(xor_str, passwd_len, (char *) auth_plugin_data, auth_plugin_data_len);
  678. server_public_key_len = RSA_size(server_public_key);
  679. /*
  680. Because RSA_PKCS1_OAEP_PADDING is used there is a restriction on the passwd_len.
  681. RSA_PKCS1_OAEP_PADDING is recommended for new applications. See more here:
  682. http://www.openssl.org/docs/crypto/RSA_public_encrypt.html
  683. */
  684. if ((size_t) server_public_key_len - 41 <= passwd_len) {
  685. /* password message is to long */
  686. SET_CLIENT_ERROR(conn->error_info, CR_UNKNOWN_ERROR, UNKNOWN_SQLSTATE, "password is too long");
  687. DBG_ERR("password is too long");
  688. DBG_RETURN(NULL);
  689. }
  690. *auth_data_len = server_public_key_len;
  691. ret = malloc(*auth_data_len);
  692. RSA_public_encrypt(passwd_len + 1, (zend_uchar *) xor_str, ret, server_public_key, RSA_PKCS1_OAEP_PADDING);
  693. }
  694. }
  695. DBG_RETURN(ret);
  696. }
  697. /* }}} */
  698. static struct st_mysqlnd_authentication_plugin mysqlnd_sha256_authentication_plugin =
  699. {
  700. {
  701. MYSQLND_PLUGIN_API_VERSION,
  702. "auth_plugin_sha256_password",
  703. MYSQLND_VERSION_ID,
  704. PHP_MYSQLND_VERSION,
  705. "PHP License 3.01",
  706. "Andrey Hristov <andrey@php.net>, Ulf Wendel <uwendel@mysql.com>",
  707. {
  708. NULL, /* no statistics , will be filled later if there are some */
  709. NULL, /* no statistics */
  710. },
  711. {
  712. NULL /* plugin shutdown */
  713. }
  714. },
  715. {/* methods */
  716. mysqlnd_sha256_auth_get_auth_data
  717. }
  718. };
  719. #endif
  720. /* {{{ mysqlnd_register_builtin_authentication_plugins */
  721. void
  722. mysqlnd_register_builtin_authentication_plugins(void)
  723. {
  724. mysqlnd_plugin_register_ex((struct st_mysqlnd_plugin_header *) &mysqlnd_native_auth_plugin);
  725. mysqlnd_plugin_register_ex((struct st_mysqlnd_plugin_header *) &mysqlnd_pam_authentication_plugin);
  726. #ifdef MYSQLND_HAVE_SSL
  727. mysqlnd_plugin_register_ex((struct st_mysqlnd_plugin_header *) &mysqlnd_sha256_authentication_plugin);
  728. #endif
  729. }
  730. /* }}} */
  731. /*
  732. * Local variables:
  733. * tab-width: 4
  734. * c-basic-offset: 4
  735. * End:
  736. * vim600: noet sw=4 ts=4 fdm=marker
  737. * vim<600: noet sw=4 ts=4
  738. */