Current Path : /compat/linux/proc/68247/root/usr/opt/mysql57/mysql-test/include/ |
FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64 |
Current File : //compat/linux/proc/68247/root/usr/opt/mysql57/mysql-test/include/keyring_udf_keyring_plugin_loaded.inc |
--replace_regex /\.dll/.so/ eval create function keyring_key_fetch returns string soname '$KEYRING_UDF'; --replace_regex /\.dll/.so/ eval create function keyring_key_type_fetch returns string soname '$KEYRING_UDF'; --replace_regex /\.dll/.so/ eval create function keyring_key_length_fetch returns integer soname '$KEYRING_UDF'; --replace_regex /\.dll/.so/ eval create function keyring_key_remove returns integer soname '$KEYRING_UDF'; --replace_regex /\.dll/.so/ eval create function keyring_key_generate returns integer soname '$KEYRING_UDF'; # Error cases -- wrong argument count --error ER_CANT_INITIALIZE_UDF select keyring_key_fetch('Key_1','AES'); --error ER_CANT_INITIALIZE_UDF select keyring_key_type_fetch('Key_1','AES'); --error ER_CANT_INITIALIZE_UDF select keyring_key_length_fetch('Key_1','AES'); --error ER_CANT_INITIALIZE_UDF select keyring_key_remove('Key_1','AES'); --error ER_CANT_INITIALIZE_UDF select keyring_key_generate('Key_1'); --error ER_CANT_INITIALIZE_UDF select keyring_key_generate('Key_1','AES'); --error ER_CANT_INITIALIZE_UDF select keyring_key_generate('Key_1',''); --error ER_CANT_INITIALIZE_UDF select keyring_key_fetch('Key_1',NULL); # End of wrong count # Error cases -- wrong argument type --error ER_CANT_INITIALIZE_UDF select keyring_key_fetch(1); --error ER_CANT_INITIALIZE_UDF select keyring_key_fetch(NULL); --error ER_CANT_INITIALIZE_UDF select keyring_key_type_fetch(1); --error ER_CANT_INITIALIZE_UDF select keyring_key_type_fetch(NULL); --error ER_CANT_INITIALIZE_UDF select keyring_key_length_fetch(1); --error ER_CANT_INITIALIZE_UDF select keyring_key_length_fetch(NULL); --error ER_CANT_INITIALIZE_UDF select keyring_key_generate('Key_1','AES','123'); --error ER_CANT_INITIALIZE_UDF select keyring_key_generate(NULL,'AES','123'); --error ER_CANT_INITIALIZE_UDF select keyring_key_generate('Key_1',NULL,'123'); --error ER_CANT_INITIALIZE_UDF select keyring_key_generate('Key_1','AES',NULL); --error ER_CANT_INITIALIZE_UDF select keyring_key_generate(NULL,NULL,NULL); --error ER_CANT_INITIALIZE_UDF select keyring_key_generate(1,'AES',123); --error ER_CANT_INITIALIZE_UDF select keyring_key_generate('Key_1',123,'123'); --error ER_CANT_INITIALIZE_UDF select keyring_key_generate('Key_invalid_key_type',123,123); --error ER_CANT_INITIALIZE_UDF select keyring_key_remove(1); --error ER_CANT_INITIALIZE_UDF select keyring_key_remove(NULL); # End of wrong argument type #Error case -- too long key --error ER_CANT_INITIALIZE_UDF select keyring_key_generate('Rob_AES_8196','AES',2049); #Check the plugins select PLUGIN_NAME,PLUGIN_AUTHOR from information_schema.plugins where PLUGIN_NAME like '%keyring%'; # Genuine cases # AES # Generate AES_128 select keyring_key_generate('Rob_AES_128','AES',16); select keyring_key_fetch('Rob_AES_128') into @x; select LENGTH(@x); select keyring_key_type_fetch('Rob_AES_128'); select keyring_key_length_fetch('Rob_AES_128'); select keyring_key_remove('Rob_AES_128'); # Generate AES_192 select keyring_key_generate('Rob_AES_192','AES',24); select keyring_key_fetch('Rob_AES_192') into @x; select LENGTH(@x); select keyring_key_type_fetch('Rob_AES_192'); select keyring_key_length_fetch('Rob_AES_192'); select keyring_key_remove('Rob_AES_192'); # Generate AES_256 select keyring_key_generate('Rob_AES_256','AES',32); select keyring_key_fetch('Rob_AES_256') into @x; select LENGTH(@x); select keyring_key_type_fetch('Rob_AES_256'); select keyring_key_length_fetch('Rob_AES_256'); select keyring_key_remove('Rob_AES_256'); # RSA # Generate RSA_1024 select keyring_key_generate('Rob_RSA_1024','RSA',128); select keyring_key_fetch('Rob_RSA_1024') into @x; select LENGTH(@x); select keyring_key_type_fetch('Rob_RSA_1024'); select keyring_key_length_fetch('Rob_RSA_1024'); select keyring_key_remove('Rob_RSA_1024'); #Generate RSA_2048 select keyring_key_generate('Rob_RSA_2048','RSA',256); select keyring_key_fetch('Rob_RSA_2048') into @x; select keyring_key_type_fetch('Rob_RSA_2048'); select keyring_key_length_fetch('Rob_RSA_2048'); select LENGTH(@x); select keyring_key_remove('Rob_RSA_2048'); #Generate RSA_4098 select keyring_key_generate('Rob_RSA_4096','RSA',512); select keyring_key_fetch('Rob_RSA_4096') into @x; select keyring_key_type_fetch('Rob_RSA_4096'); select keyring_key_length_fetch('Rob_RSA_4096'); select LENGTH(@x); select keyring_key_remove('Rob_RSA_4096'); # DSA # Generate DSA 1024 select keyring_key_generate('Rob_DSA_1024','DSA',128); select keyring_key_fetch('Rob_DSA_1024') into @x; select LENGTH(@x); select keyring_key_type_fetch('Rob_DSA_1024'); select keyring_key_length_fetch('Rob_DSA_1024'); select keyring_key_remove('Rob_DSA_1024'); # Generate DSA 2048 select keyring_key_generate('Rob_DSA_2048','DSA',256); select keyring_key_fetch('Rob_DSA_2048') into @x; select LENGTH(@x); select keyring_key_type_fetch('Rob_DSA_2048'); select keyring_key_length_fetch('Rob_DSA_2048'); select keyring_key_remove('Rob_DSA_2048'); # Generate DSA 3072 select keyring_key_generate('Rob_DSA_3072','DSA',384); select keyring_key_fetch('Rob_DSA_3072') into @x; select LENGTH(@x); select keyring_key_type_fetch('Rob_DSA_3072'); select keyring_key_length_fetch('Rob_DSA_3072'); select keyring_key_remove('Rob_DSA_3072'); # Fetch not existing: select keyring_key_fetch('key') into @x; select @x; select keyring_key_type_fetch('key') into @x; select @x; select keyring_key_length_fetch('key') into @x; select @x; --echo #Testing with AES_ENCRYPT/AES_DECRYPT select keyring_key_generate('AES_128','AES',16); select AES_ENCRYPT('secret message', keyring_key_fetch('AES_128')) into @cipher; select AES_DECRYPT(@cipher, keyring_key_fetch('AES_128')); select keyring_key_remove('AES_128'); # Fetch non-existent key - we should get empty string as result select keyring_key_fetch('Rob1'); # Fetch non-existent type select keyring_key_type_fetch('Rob1'); # Fetch length not existing select keyring_key_length_fetch('Rob1'); # Errors comming from keyring --error ER_KEYRING_UDF_KEYRING_SERVICE_ERROR select keyring_key_fetch('') into @x; select @x; --error ER_KEYRING_UDF_KEYRING_SERVICE_ERROR select keyring_key_length_fetch('') into @x; select @x; --error ER_KEYRING_UDF_KEYRING_SERVICE_ERROR select keyring_key_type_fetch('') into @x; select @x; # Remove not existing --error ER_KEYRING_UDF_KEYRING_SERVICE_ERROR select keyring_key_remove('Rob_not_existing') into @x; select @x; --error ER_KEYRING_UDF_KEYRING_SERVICE_ERROR select keyring_key_remove('') into @x; select @x; # Generate wrong key type --error ER_KEYRING_UDF_KEYRING_SERVICE_ERROR select keyring_key_generate('Wrong_type','xxx', 16) into @x; select @x; --error ER_KEYRING_UDF_KEYRING_SERVICE_ERROR select keyring_key_generate('','AES', 16) into @x; select @x; --echo # Testing privileges select keyring_key_generate('roots_key', 'AES',16); create definer=root@localhost procedure shared_key() select keyring_key_fetch('roots_key'); CREATE USER user_execute_test@localhost; connect(conn_no_execute, localhost, user_execute_test); --error ER_CANT_INITIALIZE_UDF select keyring_key_generate('Rob_DSA_no_privilege','DSA',384); connection default; disconnect conn_no_execute; GRANT EXECUTE ON *.* TO 'user_execute_test'@'localhost'; connect(conn_with_execute, localhost, user_execute_test); select keyring_key_generate('Rob_DSA_no_privilege','DSA',384); select keyring_key_generate('another_Rob_DSA_no_privilege','DSA',384); --echo #Check if user you can access another user's keys --error ER_KEYRING_UDF_KEYRING_SERVICE_ERROR select keyring_key_remove('roots_key'); --echo #Check that the user is able to access the key via procedure --replace_column 1 # call shared_key(); connection default; DROP PROCEDURE shared_key; --echo #Check if a user can create a key with id that already exist but belongs --echo #to another user. select keyring_key_generate('Rob_DSA_no_privilege','DSA',384); --echo #Check if user with larger privileges can access another user's key --error ER_KEYRING_UDF_KEYRING_SERVICE_ERROR select keyring_key_remove('another_Rob_DSA_no_privilege'); --echo #Cleanup select keyring_key_remove('Rob_DSA_no_privilege'); select keyring_key_remove('roots_key'); connection conn_with_execute; select keyring_key_remove('Rob_DSA_no_privilege'); select keyring_key_remove('another_Rob_DSA_no_privilege'); connection default; disconnect conn_with_execute; DROP USER 'user_execute_test'@'localhost'; # End of genuine cases