2 * Copyright (C) 2006-2009 Brian Aker
5 * Use and distribution licensed under the BSD license. See
6 * the COPYING file in the parent directory for full text.
16 #include "utilities.h"
19 long int timedif(struct timeval a
, struct timeval b
)
23 us
= (int)(a
.tv_usec
- b
.tv_usec
);
25 s
= (int)(a
.tv_sec
- b
.tv_sec
);
30 void version_command(const char *command_name
)
32 printf("%s v%u.%u\n", command_name
, 1U, 0U);
36 static const char *lookup_help(memcached_options option
)
40 case OPT_SERVERS
: return("List which servers you wish to connect to.");
41 case OPT_VERSION
: return("Display the version of the application and then exit.");
42 case OPT_HELP
: return("Display this message and then exit.");
43 case OPT_VERBOSE
: return("Give more details on the progression of the application.");
44 case OPT_DEBUG
: return("Provide output only useful for debugging.");
45 case OPT_FLAG
: return("Provide flag information for storage operation.");
46 case OPT_EXPIRE
: return("Set the expire option for the object.");
47 case OPT_SET
: return("Use set command with memcached when storing.");
48 case OPT_REPLACE
: return("Use replace command with memcached when storing.");
49 case OPT_ADD
: return("Use add command with memcached when storing.");
50 case OPT_SLAP_EXECUTE_NUMBER
: return("Number of times to execute the given test.");
51 case OPT_SLAP_INITIAL_LOAD
: return("Number of key pairs to load before executing tests.");
52 case OPT_SLAP_TEST
: return("Test to run (currently \"get\" or \"set\").");
53 case OPT_SLAP_CONCURRENCY
: return("Number of users to simulate with load.");
54 case OPT_SLAP_NON_BLOCK
: return("Set TCP up to use non-blocking IO.");
55 case OPT_SLAP_TCP_NODELAY
: return("Set TCP socket up to use nodelay.");
56 case OPT_FLUSH
: return("Flush servers before running tests.");
57 case OPT_HASH
: return("Select hash type.");
58 case OPT_BINARY
: return("Switch to binary protocol.");
59 case OPT_ANALYZE
: return("Analyze the provided servers.");
60 case OPT_UDP
: return("Use UDP protocol when communicating with server.");
61 case OPT_USERNAME
: return "Username to use for SASL authentication";
62 case OPT_PASSWD
: return "Password to use for SASL authentication";
63 case OPT_FILE
: return "Path to file in which to save result";
64 case OPT_STAT_ARGS
: return "Argument for statistics";
65 default: WATCHPOINT_ASSERT(0);
69 return "forgot to document this function :)";
72 void help_command(const char *command_name
, const char *description
,
73 const struct option
*long_options
,
74 memcached_programs_help_st
*options
__attribute__((unused
)))
78 printf("%s v%u.%u\n\n", command_name
, 1U, 0U);
79 printf("\t%s\n\n", description
);
80 printf("Current options. A '=' means the option takes a value.\n\n");
82 for (x
= 0; long_options
[x
].name
; x
++)
84 const char *help_message
;
86 printf("\t --%s%c\n", long_options
[x
].name
,
87 long_options
[x
].has_arg
? '=' : ' ');
88 if ((help_message
= lookup_help(long_options
[x
].val
)))
89 printf("\t\t%s\n", help_message
);
96 void process_hash_option(memcached_st
*memc
, char *opt_hash
)
99 memcached_return_t rc
;
101 if (opt_hash
== NULL
)
104 set
= MEMCACHED_HASH_DEFAULT
; /* Just here to solve warning */
105 if (!strcasecmp(opt_hash
, "CRC"))
106 set
= MEMCACHED_HASH_CRC
;
107 else if (!strcasecmp(opt_hash
, "FNV1_64"))
108 set
= MEMCACHED_HASH_FNV1_64
;
109 else if (!strcasecmp(opt_hash
, "FNV1A_64"))
110 set
= MEMCACHED_HASH_FNV1A_64
;
111 else if (!strcasecmp(opt_hash
, "FNV1_32"))
112 set
= MEMCACHED_HASH_FNV1_32
;
113 else if (!strcasecmp(opt_hash
, "FNV1A_32"))
114 set
= MEMCACHED_HASH_FNV1A_32
;
117 fprintf(stderr
, "hash: type not recognized %s\n", opt_hash
);
121 rc
= memcached_behavior_set(memc
, MEMCACHED_BEHAVIOR_HASH
, set
);
122 if (rc
!= MEMCACHED_SUCCESS
)
124 fprintf(stderr
, "hash: memcache error %s\n", memcached_strerror(memc
, rc
));
129 #ifdef LIBMEMCACHED_WITH_SASL_SUPPORT
130 static char *username
;
133 static int get_username(void *context
, int id
, const char **result
,
137 if (!result
|| (id
!= SASL_CB_USER
&& id
!= SASL_CB_AUTHNAME
))
138 return SASL_BADPARAM
;
142 *len
= (username
== NULL
) ? 0 : (unsigned int)strlen(username
);
147 static int get_password(sasl_conn_t
*conn
, void *context
, int id
,
148 sasl_secret_t
**psecret
)
151 static sasl_secret_t
* x
;
153 if (!conn
|| ! psecret
|| id
!= SASL_CB_PASS
)
154 return SASL_BADPARAM
;
162 size_t len
= strlen(passwd
);
163 x
= realloc(x
, sizeof(sasl_secret_t
) + len
);
168 strcpy((void *)x
->data
, passwd
);
174 /* callbacks we support */
175 static sasl_callback_t sasl_callbacks
[] = {
177 SASL_CB_USER
, &get_username
, NULL
179 SASL_CB_AUTHNAME
, &get_username
, NULL
181 SASL_CB_PASS
, &get_password
, NULL
183 SASL_CB_LIST_END
, NULL
, NULL
188 bool initialize_sasl(memcached_st
*memc
, char *user
, char *password
)
190 #ifdef LIBMEMCACHED_WITH_SASL_SUPPORT
191 if (user
!= NULL
&& password
!= NULL
)
196 if (sasl_client_init(NULL
) != SASL_OK
)
198 fprintf(stderr
, "Failed to initialize sasl library!\n");
201 memcached_set_sasl_callbacks(memc
, sasl_callbacks
);
212 void shutdown_sasl(void)
214 #ifdef LIBMEMCACHED_WITH_SASL_SUPPORT
215 if (username
!= NULL
|| passwd
!= NULL
)