|
|
|
|
@ -1894,8 +1894,18 @@ __exit_do_auth:
|
|
|
|
|
// ret=false;
|
|
|
|
|
// }
|
|
|
|
|
// }
|
|
|
|
|
proxy_debug(PROXY_DEBUG_MYSQL_PROTOCOL,1,"Handshake (%s auth) <user:\"%s\" pass:\"%s\" scramble:\"%s\" db:\"%s\" max_pkt:%u>, capabilities:%u char:%u, use_ssl:%s\n",
|
|
|
|
|
(capabilities & CLIENT_SECURE_CONNECTION ? "new" : "old"), user, password, pass, db, max_pkt, capabilities, charset, ((*myds)->encrypted ? "yes" : "no"));
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
|
{
|
|
|
|
|
char *tmp_pass=strdup(password);
|
|
|
|
|
int lpass = strlen(tmp_pass);
|
|
|
|
|
for (int i=2; i<lpass-1; i++) {
|
|
|
|
|
tmp_pass[i]='*';
|
|
|
|
|
}
|
|
|
|
|
proxy_debug(PROXY_DEBUG_MYSQL_PROTOCOL,1,"Handshake (%s auth) <user:\"%s\" pass:\"%s\" db:\"%s\" max_pkt:%u>, capabilities:%u char:%u, use_ssl:%s\n",
|
|
|
|
|
(capabilities & CLIENT_SECURE_CONNECTION ? "new" : "old"), user, tmp_pass, db, max_pkt, capabilities, charset, ((*myds)->encrypted ? "yes" : "no"));
|
|
|
|
|
free(tmp_pass);
|
|
|
|
|
}
|
|
|
|
|
#endif
|
|
|
|
|
assert(sess);
|
|
|
|
|
assert(sess->client_myds);
|
|
|
|
|
myconn=sess->client_myds->myconn;
|
|
|
|
|
|