/dports/databases/mariadb103-server/mariadb-10.3.34/sql/ |
H A D | sql_acl.cc | 2519 strmake_buf(sctx->priv_role, user); in acl_getroot() 2697 thd->security_ctx->priv_role[0]= 0; in acl_setrole() 3953 if (sctx->priv_role[0]) in test_if_create_new_users() 7716 if (sctx->priv_role[0]) in check_grant() 8065 if (sctx->priv_role[0] && strcmp(item->user, sctx->priv_role) == 0 && in check_grant_db_routine() 8108 if (sctx->priv_role[0]) in check_grant_db() 8129 if (sctx->priv_role[0] && in check_grant_db() 8176 char *role= sctx->priv_role; in check_grant_routine() 8286 if (sctx->priv_role[0]) in get_table_grant() 11437 if (thd->security_ctx->priv_role[0]) in fill_schema_enabled_roles() [all …]
|
H A D | set_var.cc | 979 if (!thd->security_ctx->priv_role[0]) in check() 982 real_role= thd->security_ctx->priv_role; in check()
|
H A D | sql_db.cc | 1538 if (sctx->priv_role[0]) in mysql_change_db() 1541 db_access|= acl_get("", "", sctx->priv_role, new_db_file_name.str, FALSE); in mysql_change_db()
|
H A D | sql_parse.cc | 982 thd->security_ctx->priv_role[0]= 0; in handle_bootstrap_impl() 2809 bool currole= !curuser && !strcmp(d->user.str, thd->security_ctx->priv_role); in sp_process_definer() 6608 if (sctx->priv_role[0]) in check_access() 6609 db_access|= acl_get("", "", sctx->priv_role, db, db_is_pattern); in check_access() 6657 if (sctx->priv_role[0]) in check_access() 6659 db_access|= acl_get("", "", sctx->priv_role, db, db_is_pattern); in check_access() 9861 definer->user.str= const_cast<char*>(sctx->priv_role); in get_default_definer()
|
/dports/databases/mariadb103-client/mariadb-10.3.34/sql/ |
H A D | sql_acl.cc | 2519 strmake_buf(sctx->priv_role, user); in acl_getroot() 2697 thd->security_ctx->priv_role[0]= 0; in acl_setrole() 3953 if (sctx->priv_role[0]) in test_if_create_new_users() 7716 if (sctx->priv_role[0]) in check_grant() 8065 if (sctx->priv_role[0] && strcmp(item->user, sctx->priv_role) == 0 && in check_grant_db_routine() 8108 if (sctx->priv_role[0]) in check_grant_db() 8129 if (sctx->priv_role[0] && in check_grant_db() 8176 char *role= sctx->priv_role; in check_grant_routine() 8286 if (sctx->priv_role[0]) in get_table_grant() 11437 if (thd->security_ctx->priv_role[0]) in fill_schema_enabled_roles() [all …]
|
H A D | sql_db.cc | 1538 if (sctx->priv_role[0]) 1541 db_access|= acl_get("", "", sctx->priv_role, new_db_file_name.str, FALSE);
|
H A D | set_var.cc | 979 if (!thd->security_ctx->priv_role[0]) 982 real_role= thd->security_ctx->priv_role;
|
H A D | sql_parse.cc | 982 thd->security_ctx->priv_role[0]= 0; in handle_bootstrap_impl() 2809 bool currole= !curuser && !strcmp(d->user.str, thd->security_ctx->priv_role); in sp_process_definer() 6608 if (sctx->priv_role[0]) in check_access() 6609 db_access|= acl_get("", "", sctx->priv_role, db, db_is_pattern); in check_access() 6657 if (sctx->priv_role[0]) in check_access() 6659 db_access|= acl_get("", "", sctx->priv_role, db, db_is_pattern); in check_access() 9861 definer->user.str= const_cast<char*>(sctx->priv_role); in get_default_definer()
|
/dports/databases/mariadb105-client/mariadb-10.5.15/sql/ |
H A D | sql_acl.cc | 3153 strmake_buf(sctx->priv_role, user); in acl_getroot() 3321 thd->security_ctx->priv_role[0]= 0; in acl_setrole() 4529 if (sctx->priv_role[0]) in test_if_create_new_users() 8249 if (sctx->priv_role[0]) in check_grant() 8600 if (sctx->priv_role[0] && strcmp(item->user, sctx->priv_role) == 0 && in check_grant_db_routine() 8643 if (sctx->priv_role[0]) in check_grant_db() 8664 if (sctx->priv_role[0] && in check_grant_db() 8711 char *role= sctx->priv_role; in check_grant_routine() 8820 if (sctx->priv_role[0]) in get_table_grant() 12237 if (thd->security_ctx->priv_role[0]) in fill_schema_enabled_roles() [all …]
|
H A D | set_var.cc | 1000 if (!thd->security_ctx->priv_role[0]) in check() 1003 real_role= thd->security_ctx->priv_role; in check()
|
H A D | sql_db.cc | 1586 if (sctx->priv_role[0]) in mysql_change_db() 1589 db_access|= acl_get("", "", sctx->priv_role, new_db_file_name.str, FALSE); in mysql_change_db()
|
H A D | sql_parse.cc | 1005 thd->security_ctx->priv_role[0]= 0; in bootstrap() 2878 bool currole= !curuser && !strcmp(d->user.str, thd->security_ctx->priv_role); in sp_process_definer() 6818 if (sctx->priv_role[0]) in check_access() 6819 db_access|= acl_get("", "", sctx->priv_role, db, db_is_pattern); in check_access() 6867 if (sctx->priv_role[0]) in check_access() 6869 db_access|= acl_get("", "", sctx->priv_role, db, db_is_pattern); in check_access() 10145 definer->user.str= const_cast<char*>(sctx->priv_role); in get_default_definer()
|
H A D | item_strfunc.cc | 2475 if (ctx->priv_role[0]) in fix_fields() 2477 if (str_value.copy(ctx->priv_role, strlen(ctx->priv_role), in fix_fields()
|
/dports/databases/mariadb104-server/mariadb-10.4.24/sql/ |
H A D | sql_acl.cc | 3023 strmake_buf(sctx->priv_role, user); in acl_getroot() 3190 thd->security_ctx->priv_role[0]= 0; in acl_setrole() 4394 if (sctx->priv_role[0]) in test_if_create_new_users() 8109 if (sctx->priv_role[0]) in check_grant() 8459 if (sctx->priv_role[0] && strcmp(item->user, sctx->priv_role) == 0 && in check_grant_db_routine() 8502 if (sctx->priv_role[0]) in check_grant_db() 8523 if (sctx->priv_role[0] && in check_grant_db() 8570 char *role= sctx->priv_role; in check_grant_routine() 8680 if (sctx->priv_role[0]) in get_table_grant() 11860 if (thd->security_ctx->priv_role[0]) in fill_schema_enabled_roles() [all …]
|
H A D | sql_db.cc | 1538 if (sctx->priv_role[0]) in mysql_change_db() 1541 db_access|= acl_get("", "", sctx->priv_role, new_db_file_name.str, FALSE); in mysql_change_db()
|
H A D | set_var.cc | 979 if (!thd->security_ctx->priv_role[0]) in check() 982 real_role= thd->security_ctx->priv_role; in check()
|
H A D | sql_parse.cc | 1009 thd->security_ctx->priv_role[0]= 0; in bootstrap() 2842 bool currole= !curuser && !strcmp(d->user.str, thd->security_ctx->priv_role); in sp_process_definer() 6723 if (sctx->priv_role[0]) in check_access() 6724 db_access|= acl_get("", "", sctx->priv_role, db, db_is_pattern); in check_access() 6772 if (sctx->priv_role[0]) in check_access() 6774 db_access|= acl_get("", "", sctx->priv_role, db, db_is_pattern); in check_access() 10040 definer->user.str= const_cast<char*>(sctx->priv_role); in get_default_definer()
|
/dports/databases/mariadb104-client/mariadb-10.4.24/sql/ |
H A D | sql_acl.cc | 3023 strmake_buf(sctx->priv_role, user); in acl_getroot() 3190 thd->security_ctx->priv_role[0]= 0; in acl_setrole() 4394 if (sctx->priv_role[0]) in test_if_create_new_users() 8109 if (sctx->priv_role[0]) in check_grant() 8459 if (sctx->priv_role[0] && strcmp(item->user, sctx->priv_role) == 0 && in check_grant_db_routine() 8502 if (sctx->priv_role[0]) in check_grant_db() 8523 if (sctx->priv_role[0] && in check_grant_db() 8570 char *role= sctx->priv_role; in check_grant_routine() 8680 if (sctx->priv_role[0]) in get_table_grant() 11860 if (thd->security_ctx->priv_role[0]) in fill_schema_enabled_roles() [all …]
|
H A D | set_var.cc | 979 if (!thd->security_ctx->priv_role[0]) in check() 982 real_role= thd->security_ctx->priv_role; in check()
|
H A D | sql_db.cc | 1538 if (sctx->priv_role[0]) in mysql_change_db() 1541 db_access|= acl_get("", "", sctx->priv_role, new_db_file_name.str, FALSE); in mysql_change_db()
|
H A D | sql_parse.cc | 1009 thd->security_ctx->priv_role[0]= 0; in bootstrap() 2842 bool currole= !curuser && !strcmp(d->user.str, thd->security_ctx->priv_role); in sp_process_definer() 6723 if (sctx->priv_role[0]) in check_access() 6724 db_access|= acl_get("", "", sctx->priv_role, db, db_is_pattern); in check_access() 6772 if (sctx->priv_role[0]) in check_access() 6774 db_access|= acl_get("", "", sctx->priv_role, db, db_is_pattern); in check_access() 10040 definer->user.str= const_cast<char*>(sctx->priv_role); in get_default_definer()
|
/dports/databases/mariadb105-server/mariadb-10.5.15/sql/ |
H A D | sql_acl.cc | 3153 strmake_buf(sctx->priv_role, user); in acl_getroot() 3321 thd->security_ctx->priv_role[0]= 0; in acl_setrole() 4529 if (sctx->priv_role[0]) in test_if_create_new_users() 8249 if (sctx->priv_role[0]) in check_grant() 8600 if (sctx->priv_role[0] && strcmp(item->user, sctx->priv_role) == 0 && in check_grant_db_routine() 8643 if (sctx->priv_role[0]) in check_grant_db() 8664 if (sctx->priv_role[0] && in check_grant_db() 8711 char *role= sctx->priv_role; in check_grant_routine() 8820 if (sctx->priv_role[0]) in get_table_grant() 12237 if (thd->security_ctx->priv_role[0]) in fill_schema_enabled_roles() [all …]
|
H A D | set_var.cc | 1000 if (!thd->security_ctx->priv_role[0]) in check() 1003 real_role= thd->security_ctx->priv_role; in check()
|
H A D | sql_db.cc | 1586 if (sctx->priv_role[0]) in mysql_change_db() 1589 db_access|= acl_get("", "", sctx->priv_role, new_db_file_name.str, FALSE); in mysql_change_db()
|
H A D | sql_parse.cc | 1005 thd->security_ctx->priv_role[0]= 0; in bootstrap() 2878 bool currole= !curuser && !strcmp(d->user.str, thd->security_ctx->priv_role); in sp_process_definer() 6818 if (sctx->priv_role[0]) in check_access() 6819 db_access|= acl_get("", "", sctx->priv_role, db, db_is_pattern); in check_access() 6867 if (sctx->priv_role[0]) in check_access() 6869 db_access|= acl_get("", "", sctx->priv_role, db, db_is_pattern); in check_access() 10145 definer->user.str= const_cast<char*>(sctx->priv_role); in get_default_definer()
|