/
init.go
84 lines (79 loc) · 2.09 KB
/
init.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
package native
import (
"github.com/ziutek/mymysql/mysql"
"log"
)
func (my *Conn) init() {
my.seq = 0 // Reset sequence number, mainly for reconnect
if my.Debug {
log.Printf("[%2d ->] Init packet:", my.seq)
}
pr := my.newPktReader()
my.info.prot_ver = pr.readByte()
my.info.serv_ver = pr.readNTB()
my.info.thr_id = pr.readU32()
pr.readFull(my.info.scramble[0:8])
pr.skipN(1)
my.info.caps = pr.readU16()
my.info.lang = pr.readByte()
my.status = pr.readU16()
pr.skipN(13)
if my.info.caps&_CLIENT_PROTOCOL_41 != 0 {
pr.readFull(my.info.scramble[8:])
}
pr.skipAll() // Skip other information
if my.Debug {
log.Printf(tab8s+"ProtVer=%d, ServVer=\"%s\" Status=0x%x",
my.info.prot_ver, my.info.serv_ver, my.status,
)
}
if my.info.caps&_CLIENT_PROTOCOL_41 == 0 {
panic(mysql.ErrOldProtocol)
}
}
func (my *Conn) auth() {
if my.Debug {
log.Printf("[%2d <-] Authentication packet", my.seq)
}
flags := uint32(
_CLIENT_PROTOCOL_41 |
_CLIENT_LONG_PASSWORD |
_CLIENT_LONG_FLAG |
_CLIENT_TRANSACTIONS |
_CLIENT_SECURE_CONN |
_CLIENT_LOCAL_FILES |
_CLIENT_MULTI_STATEMENTS |
_CLIENT_MULTI_RESULTS)
// Reset flags not supported by server
flags &= uint32(my.info.caps) | 0xffff0000
scrPasswd := encryptedPasswd(my.passwd, my.info.scramble[:])
pay_len := 4 + 4 + 1 + 23 + len(my.user) + 1 + 1 + len(scrPasswd)
if len(my.dbname) > 0 {
pay_len += len(my.dbname) + 1
flags |= _CLIENT_CONNECT_WITH_DB
}
pw := my.newPktWriter(pay_len)
pw.writeU32(flags)
pw.writeU32(uint32(my.max_pkt_size))
pw.writeByte(my.info.lang) // Charset number
pw.writeZeros(23) // Filler
pw.writeNTB([]byte(my.user)) // Username
pw.writeBin(scrPasswd) // Encrypted password
if len(my.dbname) > 0 {
pw.writeNTB([]byte(my.dbname))
}
if len(my.dbname) > 0 {
pay_len += len(my.dbname) + 1
flags |= _CLIENT_CONNECT_WITH_DB
}
return
}
func (my *Conn) oldPasswd() {
if my.Debug {
log.Printf("[%2d <-] Password packet", my.seq)
}
scrPasswd := encryptedOldPassword(my.passwd, my.info.scramble[:])
pw := my.newPktWriter(len(scrPasswd) + 1)
pw.write(scrPasswd)
pw.writeByte(0)
}