mirror of https://github.com/perkeep/perkeep.git
84 lines
2.1 KiB
Go
84 lines
2.1 KiB
Go
package native
|
|
|
|
import (
|
|
"log"
|
|
)
|
|
|
|
func (my *Conn) init() {
|
|
my.seq = 0 // Reset sequence number, mainly for reconnect
|
|
if my.Debug {
|
|
log.Printf("[%2d ->] Init packet:", my.seq)
|
|
}
|
|
pr := my.newPktReader()
|
|
my.info.scramble = make([]byte, 20)
|
|
|
|
my.info.prot_ver = readByte(pr)
|
|
my.info.serv_ver = readNTS(pr)
|
|
my.info.thr_id = readU32(pr)
|
|
readFull(pr, my.info.scramble[0:8])
|
|
read(pr, 1)
|
|
my.info.caps = readU16(pr)
|
|
my.info.lang = readByte(pr)
|
|
my.status = readU16(pr)
|
|
read(pr, 13)
|
|
if my.info.caps&_CLIENT_PROTOCOL_41 != 0 {
|
|
readFull(pr, my.info.scramble[8:])
|
|
}
|
|
pr.readAll() // Skip other information
|
|
if my.Debug {
|
|
log.Printf(tab8s+"ProtVer=%d, ServVer=\"%s\" Status=0x%x",
|
|
my.info.prot_ver, my.info.serv_ver, my.status,
|
|
)
|
|
}
|
|
if my.info.caps&_CLIENT_PROTOCOL_41 == 0 {
|
|
panic(OLD_PROTOCOL_ERROR)
|
|
}
|
|
}
|
|
|
|
func (my *Conn) auth() {
|
|
if my.Debug {
|
|
log.Printf("[%2d <-] Authentication packet", my.seq)
|
|
}
|
|
flags := uint32(
|
|
_CLIENT_PROTOCOL_41 |
|
|
_CLIENT_LONG_PASSWORD |
|
|
_CLIENT_LONG_FLAG |
|
|
_CLIENT_TRANSACTIONS |
|
|
_CLIENT_SECURE_CONN |
|
|
_CLIENT_MULTI_STATEMENTS |
|
|
_CLIENT_MULTI_RESULTS)
|
|
// Reset flags not supported by server
|
|
flags &= uint32(my.info.caps) | 0xffff0000
|
|
scrPasswd := encryptedPasswd(my.passwd, my.info.scramble)
|
|
pay_len := 4 + 4 + 1 + 23 + len(my.user) + 1 + 1 + len(scrPasswd)
|
|
if len(my.dbname) > 0 {
|
|
pay_len += len(my.dbname) + 1
|
|
flags |= _CLIENT_CONNECT_WITH_DB
|
|
}
|
|
pw := my.newPktWriter(pay_len)
|
|
writeU32(pw, flags)
|
|
writeU32(pw, uint32(my.max_pkt_size))
|
|
writeByte(pw, my.info.lang) // Charset number
|
|
write(pw, make([]byte, 23)) // Filler
|
|
writeNTS(pw, my.user) // Username
|
|
writeBin(pw, scrPasswd) // Encrypted password
|
|
if len(my.dbname) > 0 {
|
|
writeNTS(pw, my.dbname)
|
|
}
|
|
if len(my.dbname) > 0 {
|
|
pay_len += len(my.dbname) + 1
|
|
flags |= _CLIENT_CONNECT_WITH_DB
|
|
}
|
|
return
|
|
}
|
|
|
|
func (my *Conn) oldPasswd() {
|
|
if my.Debug {
|
|
log.Printf("[%2d <-] Password packet", my.seq)
|
|
}
|
|
scrPasswd := encryptedOldPassword(my.passwd, my.info.scramble)
|
|
pw := my.newPktWriter(len(scrPasswd) + 1)
|
|
write(pw, scrPasswd)
|
|
writeByte(pw, 0)
|
|
}
|