@@ -60,23 +60,23 @@ mysqlnd_auth_handshake(MYSQLND_CONN_DATA * conn,
60
60
auth_resp_packet = conn -> payload_decoder_factory -> m .get_auth_response_packet (conn -> payload_decoder_factory , FALSE);
61
61
62
62
if (!auth_resp_packet ) {
63
- SET_OOM_ERROR (* conn -> error_info );
63
+ SET_OOM_ERROR (conn -> error_info );
64
64
goto end ;
65
65
}
66
66
67
67
if (use_full_blown_auth_packet != TRUE) {
68
68
change_auth_resp_packet = conn -> payload_decoder_factory -> m .get_change_auth_response_packet (conn -> payload_decoder_factory , FALSE);
69
69
if (!change_auth_resp_packet ) {
70
- SET_OOM_ERROR (* conn -> error_info );
70
+ SET_OOM_ERROR (conn -> error_info );
71
71
goto end ;
72
72
}
73
73
74
74
change_auth_resp_packet -> auth_data = auth_plugin_data ;
75
75
change_auth_resp_packet -> auth_data_len = auth_plugin_data_len ;
76
76
77
- if (!PACKET_WRITE (change_auth_resp_packet , conn )) {
77
+ if (!PACKET_WRITE (change_auth_resp_packet )) {
78
78
CONN_SET_STATE (conn , CONN_QUIT_SENT );
79
- SET_CLIENT_ERROR (* conn -> error_info , CR_SERVER_GONE_ERROR , UNKNOWN_SQLSTATE , mysqlnd_server_gone );
79
+ SET_CLIENT_ERROR (conn -> error_info , CR_SERVER_GONE_ERROR , UNKNOWN_SQLSTATE , mysqlnd_server_gone );
80
80
goto end ;
81
81
}
82
82
} else {
@@ -103,20 +103,20 @@ mysqlnd_auth_handshake(MYSQLND_CONN_DATA * conn,
103
103
auth_packet -> connect_attr = conn -> options -> connect_attr ;
104
104
}
105
105
106
- if (!PACKET_WRITE (auth_packet , conn )) {
106
+ if (!PACKET_WRITE (auth_packet )) {
107
107
goto end ;
108
108
}
109
109
}
110
110
if (use_full_blown_auth_packet == TRUE) {
111
111
conn -> charset = mysqlnd_find_charset_nr (auth_packet -> charset_no );
112
112
}
113
113
114
- if (FAIL == PACKET_READ (auth_resp_packet , conn ) || auth_resp_packet -> response_code >= 0xFE ) {
114
+ if (FAIL == PACKET_READ (auth_resp_packet ) || auth_resp_packet -> response_code >= 0xFE ) {
115
115
if (auth_resp_packet -> response_code == 0xFE ) {
116
116
/* old authentication with new server !*/
117
117
if (!auth_resp_packet -> new_auth_protocol ) {
118
118
DBG_ERR (mysqlnd_old_passwd );
119
- SET_CLIENT_ERROR (* conn -> error_info , CR_UNKNOWN_ERROR , UNKNOWN_SQLSTATE , mysqlnd_old_passwd );
119
+ SET_CLIENT_ERROR (conn -> error_info , CR_UNKNOWN_ERROR , UNKNOWN_SQLSTATE , mysqlnd_old_passwd );
120
120
} else {
121
121
* switch_to_auth_protocol = mnd_pestrndup (auth_resp_packet -> new_auth_protocol , auth_resp_packet -> new_auth_protocol_len , FALSE);
122
122
* switch_to_auth_protocol_len = auth_resp_packet -> new_auth_protocol_len ;
@@ -134,7 +134,7 @@ mysqlnd_auth_handshake(MYSQLND_CONN_DATA * conn,
134
134
strlcpy (conn -> error_info -> sqlstate , auth_resp_packet -> sqlstate , sizeof (conn -> error_info -> sqlstate ));
135
135
DBG_ERR_FMT ("ERROR:%u [SQLSTATE:%s] %s" , auth_resp_packet -> error_no , auth_resp_packet -> sqlstate , auth_resp_packet -> error );
136
136
}
137
- SET_CLIENT_ERROR (* conn -> error_info , auth_resp_packet -> error_no , UNKNOWN_SQLSTATE , auth_resp_packet -> error );
137
+ SET_CLIENT_ERROR (conn -> error_info , auth_resp_packet -> error_no , UNKNOWN_SQLSTATE , auth_resp_packet -> error );
138
138
}
139
139
goto end ;
140
140
}
@@ -181,30 +181,30 @@ mysqlnd_auth_change_user(MYSQLND_CONN_DATA * const conn,
181
181
chg_user_resp = conn -> payload_decoder_factory -> m .get_change_user_response_packet (conn -> payload_decoder_factory , FALSE);
182
182
183
183
if (!chg_user_resp ) {
184
- SET_OOM_ERROR (* conn -> error_info );
184
+ SET_OOM_ERROR (conn -> error_info );
185
185
goto end ;
186
186
}
187
187
188
188
if (use_full_blown_auth_packet != TRUE) {
189
189
change_auth_resp_packet = conn -> payload_decoder_factory -> m .get_change_auth_response_packet (conn -> payload_decoder_factory , FALSE);
190
190
if (!change_auth_resp_packet ) {
191
- SET_OOM_ERROR (* conn -> error_info );
191
+ SET_OOM_ERROR (conn -> error_info );
192
192
goto end ;
193
193
}
194
194
195
195
change_auth_resp_packet -> auth_data = auth_plugin_data ;
196
196
change_auth_resp_packet -> auth_data_len = auth_plugin_data_len ;
197
197
198
- if (!PACKET_WRITE (change_auth_resp_packet , conn )) {
198
+ if (!PACKET_WRITE (change_auth_resp_packet )) {
199
199
CONN_SET_STATE (conn , CONN_QUIT_SENT );
200
- SET_CLIENT_ERROR (* conn -> error_info , CR_SERVER_GONE_ERROR , UNKNOWN_SQLSTATE , mysqlnd_server_gone );
200
+ SET_CLIENT_ERROR (conn -> error_info , CR_SERVER_GONE_ERROR , UNKNOWN_SQLSTATE , mysqlnd_server_gone );
201
201
goto end ;
202
202
}
203
203
} else {
204
204
auth_packet = conn -> payload_decoder_factory -> m .get_auth_packet (conn -> payload_decoder_factory , FALSE);
205
205
206
206
if (!auth_packet ) {
207
- SET_OOM_ERROR (* conn -> error_info );
207
+ SET_OOM_ERROR (conn -> error_info );
208
208
goto end ;
209
209
}
210
210
@@ -223,21 +223,21 @@ mysqlnd_auth_change_user(MYSQLND_CONN_DATA * const conn,
223
223
auth_packet -> charset_no = conn -> charset -> nr ;
224
224
}
225
225
226
- if (!PACKET_WRITE (auth_packet , conn )) {
226
+ if (!PACKET_WRITE (auth_packet )) {
227
227
CONN_SET_STATE (conn , CONN_QUIT_SENT );
228
- SET_CLIENT_ERROR (* conn -> error_info , CR_SERVER_GONE_ERROR , UNKNOWN_SQLSTATE , mysqlnd_server_gone );
228
+ SET_CLIENT_ERROR (conn -> error_info , CR_SERVER_GONE_ERROR , UNKNOWN_SQLSTATE , mysqlnd_server_gone );
229
229
goto end ;
230
230
}
231
231
}
232
232
233
- ret = PACKET_READ (chg_user_resp , conn );
234
- COPY_CLIENT_ERROR (* conn -> error_info , chg_user_resp -> error_info );
233
+ ret = PACKET_READ (chg_user_resp );
234
+ COPY_CLIENT_ERROR (conn -> error_info , chg_user_resp -> error_info );
235
235
236
236
if (0xFE == chg_user_resp -> response_code ) {
237
237
ret = FAIL ;
238
238
if (!chg_user_resp -> new_auth_protocol ) {
239
239
DBG_ERR (mysqlnd_old_passwd );
240
- SET_CLIENT_ERROR (* conn -> error_info , CR_UNKNOWN_ERROR , UNKNOWN_SQLSTATE , mysqlnd_old_passwd );
240
+ SET_CLIENT_ERROR (conn -> error_info , CR_UNKNOWN_ERROR , UNKNOWN_SQLSTATE , mysqlnd_old_passwd );
241
241
} else {
242
242
* switch_to_auth_protocol = mnd_pestrndup (chg_user_resp -> new_auth_protocol , chg_user_resp -> new_auth_protocol_len , FALSE);
243
243
* switch_to_auth_protocol_len = chg_user_resp -> new_auth_protocol_len ;
@@ -262,11 +262,11 @@ mysqlnd_auth_change_user(MYSQLND_CONN_DATA * const conn,
262
262
if (conn -> m -> get_server_version (conn ) > 50113L && conn -> m -> get_server_version (conn ) < 50118L ) {
263
263
MYSQLND_PACKET_OK * redundant_error_packet = conn -> payload_decoder_factory -> m .get_ok_packet (conn -> payload_decoder_factory , FALSE);
264
264
if (redundant_error_packet ) {
265
- PACKET_READ (redundant_error_packet , conn );
265
+ PACKET_READ (redundant_error_packet );
266
266
PACKET_FREE (redundant_error_packet );
267
267
DBG_INF_FMT ("Server is %u, buggy, sends two ERR messages" , conn -> m -> get_server_version (conn ));
268
268
} else {
269
- SET_OOM_ERROR (* conn -> error_info );
269
+ SET_OOM_ERROR (conn -> error_info );
270
270
}
271
271
}
272
272
}
@@ -297,7 +297,7 @@ mysqlnd_auth_change_user(MYSQLND_CONN_DATA * const conn,
297
297
} else if (ret == FAIL && chg_user_resp -> server_asked_323_auth == TRUE) {
298
298
/* old authentication with new server !*/
299
299
DBG_ERR (mysqlnd_old_passwd );
300
- SET_CLIENT_ERROR (* conn -> error_info , CR_UNKNOWN_ERROR , UNKNOWN_SQLSTATE , mysqlnd_old_passwd );
300
+ SET_CLIENT_ERROR (conn -> error_info , CR_UNKNOWN_ERROR , UNKNOWN_SQLSTATE , mysqlnd_old_passwd );
301
301
}
302
302
end :
303
303
PACKET_FREE (change_auth_resp_packet );
@@ -371,7 +371,7 @@ mysqlnd_native_auth_get_auth_data(struct st_mysqlnd_authentication_plugin * self
371
371
/* 5.5.x reports 21 as scramble length because it needs to show the length of the data before the plugin name */
372
372
if (auth_plugin_data_len < SCRAMBLE_LENGTH ) {
373
373
/* mysql_native_password only works with SCRAMBLE_LENGTH scramble */
374
- SET_CLIENT_ERROR (* conn -> error_info , CR_MALFORMED_PACKET , UNKNOWN_SQLSTATE , "The server sent wrong length for scramble" );
374
+ SET_CLIENT_ERROR (conn -> error_info , CR_MALFORMED_PACKET , UNKNOWN_SQLSTATE , "The server sent wrong length for scramble" );
375
375
DBG_ERR_FMT ("The server sent wrong length for scramble %u. Expected %u" , auth_plugin_data_len , SCRAMBLE_LENGTH );
376
376
DBG_RETURN (NULL );
377
377
}
@@ -501,23 +501,23 @@ mysqlnd_sha256_get_rsa_key(MYSQLND_CONN_DATA * conn,
501
501
DBG_INF ("requesting the public key from the server" );
502
502
pk_req_packet = conn -> payload_decoder_factory -> m .get_sha256_pk_request_packet (conn -> payload_decoder_factory , FALSE);
503
503
if (!pk_req_packet ) {
504
- SET_OOM_ERROR (* conn -> error_info );
504
+ SET_OOM_ERROR (conn -> error_info );
505
505
break ;
506
506
}
507
507
pk_resp_packet = conn -> payload_decoder_factory -> m .get_sha256_pk_request_response_packet (conn -> payload_decoder_factory , FALSE);
508
508
if (!pk_resp_packet ) {
509
- SET_OOM_ERROR (* conn -> error_info );
509
+ SET_OOM_ERROR (conn -> error_info );
510
510
PACKET_FREE (pk_req_packet );
511
511
break ;
512
512
}
513
513
514
- if (! PACKET_WRITE (pk_req_packet , conn )) {
514
+ if (! PACKET_WRITE (pk_req_packet )) {
515
515
DBG_ERR_FMT ("Error while sending public key request packet" );
516
516
php_error (E_WARNING , "Error while sending public key request packet. PID=%d" , getpid ());
517
517
CONN_SET_STATE (conn , CONN_QUIT_SENT );
518
518
break ;
519
519
}
520
- if (FAIL == PACKET_READ (pk_resp_packet , conn ) || NULL == pk_resp_packet -> public_key ) {
520
+ if (FAIL == PACKET_READ (pk_resp_packet ) || NULL == pk_resp_packet -> public_key ) {
521
521
DBG_ERR_FMT ("Error while receiving public key" );
522
522
php_error (E_WARNING , "Error while receiving public key. PID=%d" , getpid ());
523
523
CONN_SET_STATE (conn , CONN_QUIT_SENT );
@@ -537,7 +537,7 @@ mysqlnd_sha256_get_rsa_key(MYSQLND_CONN_DATA * conn,
537
537
DBG_INF_FMT ("ret=%p" , ret );
538
538
DBG_RETURN (ret );
539
539
540
- SET_CLIENT_ERROR (* conn -> error_info , CR_UNKNOWN_ERROR , UNKNOWN_SQLSTATE ,
540
+ SET_CLIENT_ERROR (conn -> error_info , CR_UNKNOWN_ERROR , UNKNOWN_SQLSTATE ,
541
541
"sha256_server_public_key is not set for the connection or as mysqlnd.sha256_server_public_key" );
542
542
DBG_ERR ("server_public_key is not set" );
543
543
DBG_RETURN (NULL );
@@ -605,7 +605,7 @@ mysqlnd_sha256_auth_get_auth_data(struct st_mysqlnd_authentication_plugin * self
605
605
*/
606
606
if ((size_t ) server_public_key_len - 41 <= passwd_len ) {
607
607
/* password message is to long */
608
- SET_CLIENT_ERROR (* conn -> error_info , CR_UNKNOWN_ERROR , UNKNOWN_SQLSTATE , "password is too long" );
608
+ SET_CLIENT_ERROR (conn -> error_info , CR_UNKNOWN_ERROR , UNKNOWN_SQLSTATE , "password is too long" );
609
609
DBG_ERR ("password is too long" );
610
610
DBG_RETURN (NULL );
611
611
}
0 commit comments