mirror of
https://github.com/php/php-src.git
synced 2024-10-03 07:46:12 +00:00
132 lines
4.1 KiB
Plaintext
132 lines
4.1 KiB
Plaintext
|
--TEST--
|
||
|
PAM: SHA-256, option: MYSQLI_SERVER_PUBLIC_KEY
|
||
|
--SKIPIF--
|
||
|
<?php
|
||
|
require_once('skipif.inc');
|
||
|
require_once('skipifemb.inc');
|
||
|
require_once('skipifconnectfailure.inc');
|
||
|
|
||
|
ob_start();
|
||
|
phpinfo(INFO_MODULES);
|
||
|
$tmp = ob_get_contents();
|
||
|
ob_end_clean();
|
||
|
if (!stristr($tmp, "auth_plugin_sha256_password"))
|
||
|
die("skip SHA256 auth plugin not built-in to mysqlnd");
|
||
|
|
||
|
require_once('connect.inc');
|
||
|
if (!$link = my_mysqli_connect($host, $user, $passwd, $db, $port, $socket))
|
||
|
die(printf("skip: [%d] %s\n", mysqli_connect_errno(), mysqli_connect_error()));
|
||
|
|
||
|
if (mysqli_get_server_version($link) < 50606)
|
||
|
die("skip: SHA-256 requires MySQL 5.6.6+");
|
||
|
|
||
|
if (!($res = $link->query("SHOW PLUGINS"))) {
|
||
|
die(sprintf("skip [%d] %s\n", $link->errno, $link->error));
|
||
|
}
|
||
|
|
||
|
$found = false;
|
||
|
while ($row = $res->fetch_assoc()) {
|
||
|
if (($row['Name'] == 'sha256_password') && ($row['Status'] == 'ACTIVE')) {
|
||
|
$found = true;
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
if (!$found)
|
||
|
die("skip SHA-256 server plugin unavailable");
|
||
|
|
||
|
if (!($res = $link->query("SHOW STATUS LIKE 'Rsa_public_key'"))) {
|
||
|
die(sprintf("skip [%d] %s\n", $link->errno, $link->error));
|
||
|
}
|
||
|
|
||
|
if (!($row = $res->fetch_assoc())) {
|
||
|
die(sprintf("skip Failed to check RSA pub key, [%d] %s\n", $link->errno, $link->error));
|
||
|
}
|
||
|
|
||
|
if (strlen($row['Value']) < 100) {
|
||
|
die(sprintf("skip Server misconfiguration? RSA pub key is suspicious, [%d] %s\n", $link->errno, $link->error));
|
||
|
}
|
||
|
|
||
|
/* date changes may give false positive */
|
||
|
$file = sprintf("%s%s%s_%s", sys_get_temp_dir(), DIRECTORY_SEPARATOR, "test_sha256_" , @date("Ymd"));
|
||
|
if ((file_exists($file) && !unlink($file)) || !($fp = @fopen($file, "w"))) {
|
||
|
die(sprintf("skip Cannot create RSA pub key file '%s'", $file));
|
||
|
}
|
||
|
if (strlen($row['Value']) != fwrite($fp, $row['Value'])) {
|
||
|
die(sprintf("skip Failed to create pub key file"));
|
||
|
}
|
||
|
|
||
|
|
||
|
if (!$link->query("SET @@session.old_passwords=2")) {
|
||
|
die(sprintf("skip Cannot set @@session.old_passwords=2 [%d] %s", $link->errno, $link->error));
|
||
|
}
|
||
|
|
||
|
$link->query('DROP USER shatest');
|
||
|
$link->query("DROP USER shatest@localhost");
|
||
|
|
||
|
|
||
|
if (!$link->query('CREATE USER shatest@"%" IDENTIFIED WITH sha256_password') ||
|
||
|
!$link->query('CREATE USER shatest@"localhost" IDENTIFIED WITH sha256_password')) {
|
||
|
die(sprintf("skip CREATE USER failed [%d] %s", $link->errno, $link->error));
|
||
|
}
|
||
|
|
||
|
if (!$link->query('SET PASSWORD FOR shatest@"%" = PASSWORD("shatest")') ||
|
||
|
!$link->query('SET PASSWORD FOR shatest@"localhost" = PASSWORD("shatest")')) {
|
||
|
die(sprintf("skip SET PASSWORD failed [%d] %s", $link->errno, $link->error));
|
||
|
}
|
||
|
|
||
|
if (!$link->query("DROP TABLE IF EXISTS test") ||
|
||
|
!$link->query("CREATE TABLE test (id INT)") ||
|
||
|
!$link->query("INSERT INTO test(id) VALUES (1), (2), (3)"))
|
||
|
die(sprintf("SKIP [%d] %s\n", $link->errno, $link->error));
|
||
|
|
||
|
|
||
|
if (!$link->query(sprintf("GRANT SELECT ON TABLE %s.test TO shatest@'%%'", $db)) ||
|
||
|
!$link->query(sprintf("GRANT SELECT ON TABLE %s.test TO shatest@'localhost'", $db))) {
|
||
|
die(sprintf("skip Cannot grant SELECT to user [%d] %s", mysqli_errno($link), mysqli_error($link)));
|
||
|
}
|
||
|
|
||
|
$link->close();
|
||
|
?>
|
||
|
--FILE--
|
||
|
<?php
|
||
|
require_once("connect.inc");
|
||
|
|
||
|
$file = sprintf("%s%s%s_%s", sys_get_temp_dir(), DIRECTORY_SEPARATOR, "test_sha256_" , @date("Ymd"));
|
||
|
if (file_exists($file) && is_readable($file)) {
|
||
|
|
||
|
$link = mysqli_init();
|
||
|
if (!($link->options(MYSQLI_SERVER_PUBLIC_KEY, $file))) {
|
||
|
printf("[001] mysqli_options failed, [%d] %s\n", $link->errno, $link->error);
|
||
|
}
|
||
|
|
||
|
if (!$link->real_connect($host, 'shatest', 'shatest', $db, $port, $socket)) {
|
||
|
printf("[002] [%d] %s\n", $link->connect_errno, $link->connect_error);
|
||
|
}
|
||
|
|
||
|
if (!$res = $link->query("SELECT id FROM test WHERE id = 1"))
|
||
|
printf("[003] [%d] %s\n", $link->errno, $link->error);
|
||
|
|
||
|
if (!$row = mysqli_fetch_assoc($res)) {
|
||
|
printf("[004] [%d] %s\n", $link->errno, $link->error);
|
||
|
}
|
||
|
|
||
|
if ($row['id'] != 1) {
|
||
|
printf("[005] Expecting 1 got %s/'%s'", gettype($row['id']), $row['id']);
|
||
|
}
|
||
|
|
||
|
$res->close();
|
||
|
$link->close();
|
||
|
}
|
||
|
|
||
|
print "done!";
|
||
|
?>
|
||
|
--CLEAN--
|
||
|
<?php
|
||
|
require_once("clean_table.inc");
|
||
|
$link->query('DROP USER shatest');
|
||
|
$link->query('DROP USER shatest@localhost');
|
||
|
$file = sprintf("%s%s%s_%s", sys_get_temp_dir(), DIRECTORY_SEPARATOR, "test_sha256_" , @date("Ymd"));
|
||
|
@unlink($file);
|
||
|
?>
|
||
|
--EXPECTF--
|
||
|
done!
|