mirror of
https://github.com/boostorg/mysql.git
synced 2025-05-12 14:11:41 +00:00
Errors issued by the server for caching_sha2_password users after a fast auth OK packet has been received (e.g. bad database errors) are now reported correctly Handshake now correctly detects protocol violation errors, like double auth switches close #469 close #468
28 lines
982 B
C++
28 lines
982 B
C++
//
|
|
// Copyright (c) 2019-2025 Ruben Perez Hidalgo (rubenperez038 at gmail dot com)
|
|
//
|
|
// Distributed under the Boost Software License, Version 1.0. (See accompanying
|
|
// file LICENSE_1_0.txt or copy at http://www.boost.org/LICENSE_1_0.txt)
|
|
//
|
|
|
|
#include <boost/mysql/diagnostics.hpp>
|
|
|
|
#include <boost/mysql/impl/internal/protocol/db_flavor.hpp>
|
|
#include <boost/mysql/impl/internal/protocol/deserialization.hpp>
|
|
|
|
using namespace boost::mysql::detail;
|
|
|
|
static bool parse_handshake_server_response(const uint8_t* data, size_t size) noexcept
|
|
{
|
|
boost::mysql::diagnostics diag;
|
|
auto msg = deserialize_handshake_server_response({data, size}, db_flavor::mysql, diag);
|
|
return msg.type == handshake_server_response::type_t::error && diag.server_message().empty();
|
|
}
|
|
|
|
extern "C" int LLVMFuzzerTestOneInput(const uint8_t* data, size_t size)
|
|
{
|
|
// Note: this code should never throw exceptions, for any kind of input
|
|
parse_handshake_server_response(data, size);
|
|
return 0;
|
|
}
|