File: plugin_auth_sha256_server_default_tls.result

package info (click to toggle)
percona-xtrabackup 2.2.3-2.1
  • links: PTS
  • area: main
  • in suites: jessie, jessie-kfreebsd
  • size: 293,260 kB
  • ctags: 146,881
  • sloc: cpp: 1,051,960; ansic: 570,217; java: 54,595; perl: 53,495; pascal: 44,194; sh: 27,826; yacc: 15,314; python: 12,142; xml: 7,848; sql: 4,125; makefile: 1,459; awk: 785; lex: 758
file content (64 lines) | stat: -rw-r--r-- 2,874 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
CREATE USER 'kristofer';
SET old_passwords=2;
SET PASSWORD FOR 'kristofer'=PASSWORD('secret');
SELECT user, plugin FROM mysql.user;
user	plugin
root	
root	
root	
root	
kristofer	sha256_password
SELECT USER(),CURRENT_USER();
USER()	CURRENT_USER()
kristofer@localhost	kristofer@%
DROP USER 'kristofer';
GRANT ALL ON *.* TO 'kristofer'@'localhost' IDENTIFIED WITH 'sha256_password';
GRANT ALL ON *.* TO 'kristofer2'@'localhost' IDENTIFIED WITH 'sha256_password';
SET PASSWORD FOR 'kristofer'@'localhost'=PASSWORD('secret2');
SET PASSWORD FOR 'kristofer2'@'localhost'=PASSWORD('secret2');
SELECT USER(),CURRENT_USER();
USER()	CURRENT_USER()
kristofer@localhost	kristofer@localhost
SHOW GRANTS FOR 'kristofer'@'localhost';
Grants for kristofer@localhost
GRANT ALL PRIVILEGES ON *.* TO 'kristofer'@'localhost' IDENTIFIED BY PASSWORD '<non-deterministic-password-hash>'
Change user (should succeed)
SELECT USER(),CURRENT_USER();
USER()	CURRENT_USER()
kristofer2@localhost	kristofer2@localhost
**** Client default_auth=sha_256_password and server default auth=sha256_password
#### Test is disabled because it requires RSA-keys and this only works 
#### with OpenSSL. The reason is that the current client library
#### framework can't know if SSL was attempted or not when the default
#### client auth is switched and hence it will only report that the 
#### connection is unencrypted.
**** Client default_auth=native and server default auth=sha256_password
user()	current_user()
kristofer@localhost	kristofer@localhost
DROP USER 'kristofer'@'localhost';
DROP USER 'kristofer2'@'localhost';
GRANT ALL ON *.* TO 'kristofer'@'localhost';
SET PASSWORD FOR 'kristofer'@'localhost'=PASSWORD('');
SELECT USER(),CURRENT_USER();
USER()	CURRENT_USER()
kristofer@localhost	kristofer@localhost
SHOW GRANTS FOR 'kristofer'@'localhost';
Grants for kristofer@localhost
GRANT ALL PRIVILEGES ON *.* TO 'kristofer'@'localhost' IDENTIFIED BY PASSWORD '<non-deterministic-password-hash>'
DROP USER 'kristofer'@'localhost';
GRANT ALL ON *.* TO 'kristofer'@'33.33.33.33';
SET PASSWORD FOR 'kristofer'@'33.33.33.33'=PASSWORD('');
Connection should fail for localhost
ERROR 28000: Access denied for user 'kristofer'@'localhost' (using password: NO)
DROP USER 'kristofer'@'33.33.33.33';
GRANT ALL ON *.* TO 'kristofer'@'localhost' IDENTIFIED BY 'awesomeness';
SELECT USER(),CURRENT_USER();
USER()	CURRENT_USER()
kristofer@localhost	kristofer@localhost
SHOW GRANTS FOR 'kristofer'@'localhost';
Grants for kristofer@localhost
GRANT ALL PRIVILEGES ON *.* TO 'kristofer'@'localhost' IDENTIFIED BY PASSWORD '<non-deterministic-password-hash>'
SET @@OLD_PASSWORDS= 0;
SET PASSWORD FOR 'kristofer'@'localhost'= PASSWORD('error');
ERROR HY000: The password hash doesn't have the expected format. Check if the correct password algorithm is being used with the PASSWORD() function.
DROP USER 'kristofer'@'localhost';