/* Copyright (c) 2000, 2024, Oracle and/or its affiliates. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License, version 2.0, as published by the Free Software Foundation. This program is designed to work with certain software (including but not limited to OpenSSL) that is licensed under separate terms, as designated in a particular file or component or in included license documentation. The authors of MySQL hereby grant you an additional permission to link the program and your derivative works with the separately licensed software that they have either included with the program or referenced in the documentation. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License, version 2.0, for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */ #ifndef SQL_AUTHENTICATION_INCLUDED #define SQL_AUTHENTICATION_INCLUDED #include #include #include #include "lex_string.h" #include "my_thread_local.h" // my_thread_id #include "mysql/plugin_auth.h" // MYSQL_SERVER_AUTH_INFO #include "mysql/plugin_auth_common.h" #include "mysql/strings/m_ctype.h" #include "sql/sql_plugin_ref.h" // plugin_ref class ACL_USER; class Protocol_classic; class THD; class Restrictions; struct MEM_ROOT; struct SHOW_VAR; /* Classes */ class Thd_charset_adapter { THD *thd; public: Thd_charset_adapter(THD *thd_arg) : thd(thd_arg) {} bool init_client_charset(uint cs_number); const CHARSET_INFO *charset(); }; /** The internal version of what plugins know as MYSQL_PLUGIN_VIO, basically the context of the authentication session */ struct MPVIO_EXT : public MYSQL_PLUGIN_VIO { MYSQL_SERVER_AUTH_INFO auth_info; const ACL_USER *acl_user; Restrictions *restrictions; plugin_ref plugin; ///< what plugin we're under LEX_STRING db; ///< db name from the handshake packet /** when restarting a plugin this caches the last client reply */ struct { const char *plugin, *pkt; ///< pointers into NET::buff uint pkt_len; } cached_client_reply; /** this caches the first plugin packet for restart request on the client */ struct { char *pkt; uint pkt_len; } cached_server_packet; int packets_read, packets_written; ///< counters for send/received packets /** when plugin returns a failure this tells us what really happened */ enum { SUCCESS, FAILURE, RESTART, START_MFA } status; /* encapsulation members */ char *scramble; MEM_ROOT *mem_root; struct rand_struct *rand; my_thread_id thread_id; uint *server_status; Protocol_classic *protocol; ulong max_client_packet_length; const char *ip; const char *host; Thd_charset_adapter *charset_adapter; LEX_CSTRING acl_user_plugin; int vio_is_encrypted; bool can_authenticate(); }; class String; bool init_rsa_keys(void); void deinit_rsa_keys(void); int show_rsa_public_key(THD *thd, SHOW_VAR *var, char *buff); typedef struct rsa_st RSA; class Rsa_authentication_keys { private: #if OPENSSL_VERSION_NUMBER >= 0x30000000L EVP_PKEY *m_public_key; EVP_PKEY *m_private_key; #else /* OPENSSL_VERSION_NUMBER >= 0x30000000L */ RSA *m_public_key; RSA *m_private_key; #endif /* OPENSSL_VERSION_NUMBER >= 0x30000000L */ int m_cipher_len; char *m_pem_public_key; char **m_private_key_path; char **m_public_key_path; void get_key_file_path(char *key, String *key_file_path); #if OPENSSL_VERSION_NUMBER >= 0x30000000L bool read_key_file(EVP_PKEY **key_ptr, bool is_priv_key, char **key_text_buffer); #else /* OPENSSL_VERSION_NUMBER >= 0x30000000L */ bool read_key_file(RSA **key_ptr, bool is_priv_key, char **key_text_buffer); #endif /* OPENSSL_VERSION_NUMBER >= 0x30000000L */ public: Rsa_authentication_keys(char **private_key_path, char **public_key_path) : m_public_key(nullptr), m_private_key(nullptr), m_cipher_len(0), m_pem_public_key(nullptr), m_private_key_path(private_key_path), m_public_key_path(public_key_path) {} ~Rsa_authentication_keys() = default; void free_memory(); void *allocate_pem_buffer(size_t buffer_len); #if OPENSSL_VERSION_NUMBER >= 0x30000000L EVP_PKEY *get_private_key() { return m_private_key; } EVP_PKEY *get_public_key() { return m_public_key; } #else /* OPENSSL_VERSION_NUMBER >= 0x30000000L */ RSA *get_private_key() { return m_private_key; } RSA *get_public_key() { return m_public_key; } #endif /* OPENSSL_VERSION_NUMBER >= 0x30000000L */ int get_cipher_length(); bool read_rsa_keys(); const char *get_public_key_as_pem(void) { return m_pem_public_key; } }; /* Data Structures */ extern LEX_CSTRING validate_password_plugin_name; extern bool allow_all_hosts; typedef enum { PLUGIN_CACHING_SHA2_PASSWORD = 0, PLUGIN_MYSQL_NATIVE_PASSWORD, PLUGIN_SHA256_PASSWORD, /* Add new plugin before this */ PLUGIN_LAST } cached_plugins_enum; class Cached_authentication_plugins { public: static const LEX_CSTRING cached_plugins_names[(uint)PLUGIN_LAST]; static void optimize_plugin_compare_by_pointer(LEX_CSTRING *plugin); /** Compare given plugin against one of the cached ones @param [in] plugin_index Cached plugin index @param [in] plugin Plugin to be compared @returns status of comparison @retval true Match @retval false Not a match */ static bool compare_plugin(cached_plugins_enum plugin_index, LEX_CSTRING plugin) { if (plugin_index < PLUGIN_LAST && plugin.str) { optimize_plugin_compare_by_pointer(&plugin); return (plugin.str == cached_plugins_names[plugin_index].str); } return false; } /** Check if given plugin is a builtin @param [in] plugin Plugin name @returns true if builtin, false otherwise */ static bool auth_plugin_is_built_in(LEX_CSTRING *plugin) { for (uint i = 0; i < (uint)PLUGIN_LAST; ++i) { if (plugin->str == cached_plugins_names[i].str) return true; } return false; } /** Get name of the plugin at given index @param [in] plugin_index Cached plugin index @returns name of the cached plugin at given index */ static const char *get_plugin_name(cached_plugins_enum plugin_index) { if (plugin_index < PLUGIN_LAST) return cached_plugins_names[plugin_index].str; return nullptr; } Cached_authentication_plugins(); ~Cached_authentication_plugins(); plugin_ref get_cached_plugin_ref(const LEX_CSTRING *plugin); /** Fetch cached plugin handle @param plugin_index Cached plugin index @returns cached plugin_ref if found, 0 otherwise */ plugin_ref get_cached_plugin_ref(cached_plugins_enum plugin_index) { if (plugin_index < PLUGIN_LAST) return cached_plugins[plugin_index]; return nullptr; } plugin_ref cached_plugins[(uint)PLUGIN_LAST]; bool is_valid() { return m_valid; } private: bool m_valid; }; extern Cached_authentication_plugins *g_cached_authentication_plugins; ACL_USER *decoy_user(const LEX_CSTRING &username, const LEX_CSTRING &hostname, MEM_ROOT *mem, struct rand_struct *rand, bool is_initialized); #define AUTH_DEFAULT_RSA_PRIVATE_KEY "private_key.pem" #define AUTH_DEFAULT_RSA_PUBLIC_KEY "public_key.pem" #endif /* SQL_AUTHENTICATION_INCLUDED */