X-Git-Url: https://git.m6w6.name/?a=blobdiff_plain;f=libmemcached%2Fkey.cc;h=cec0eece64400e83d3645234bca3bbc3e53e29ed;hb=bf2fa8274d569da94a626eea30de612f01ec4a7c;hp=e92468811ccf8b80ca3338eb7fffad7c9bb22b9c;hpb=9169cee9ec0f231b3117a0d5a7840d2067f29610;p=awesomized%2Flibmemcached diff --git a/libmemcached/key.cc b/libmemcached/key.cc index e9246881..cec0eece 100644 --- a/libmemcached/key.cc +++ b/libmemcached/key.cc @@ -37,47 +37,71 @@ #include +static inline memcached_return_t memcached_validate_key_length(size_t key_length, bool) +{ + if (key_length == 0) + { + return MEMCACHED_BAD_KEY_PROVIDED; + } + + // No one ever reimplemented MEMCACHED to use keys longer then the original ascii length +#if 0 + if (binary) + { + if (key_length > 0xffff) + { + return MEMCACHED_BAD_KEY_PROVIDED; + } + } + else +#endif + { + if (key_length >= MEMCACHED_MAX_KEY) + { + return MEMCACHED_BAD_KEY_PROVIDED; + } + } + + return MEMCACHED_SUCCESS; +} + memcached_return_t memcached_key_test(memcached_st &memc, const char * const *keys, const size_t *key_length, size_t number_of_keys) { - if (keys == NULL or key_length == NULL) + if (number_of_keys == 0) { - return memcached_set_error(memc, MEMCACHED_BAD_KEY_PROVIDED, MEMCACHED_AT); + return memcached_set_error(memc, MEMCACHED_INVALID_ARGUMENTS, MEMCACHED_AT, memcached_literal_param("Numbers of keys provided was zero")); } - // If we don't need to verify the key, or we are using the binary protoocol, - // we just check the size of the key - if (memc.flags.verify_key == false or memc.flags.binary_protocol == true) + if (keys == NULL or key_length == NULL) { - for (uint32_t x= 0; x < number_of_keys; x++) - { - // We should set binary key, but the memcached server is broken for - // longer keys at the moment. - memcached_return_t rc= memcached_validate_key_length(*(key_length +x), false /* memc.flags.binary_protocol */); - if (memcached_failed(rc)) - { - return rc; - } - } - - return MEMCACHED_SUCCESS; + return memcached_set_error(memc, MEMCACHED_BAD_KEY_PROVIDED, MEMCACHED_AT, memcached_literal_param("Key was NULL or length of key was zero.")); } - for (uint32_t x= 0; x < number_of_keys; x++) + const bool is_binary= memcached_flag(memc, MEMCACHED_FLAG_BINARY_PROTOCOL); + + // If we don't need to verify the key, or we are using the binary protoocol, + // we just check the size of the key + for (size_t x= 0; x < number_of_keys; ++x) { - memcached_return_t rc= memcached_validate_key_length(*(key_length + x), false); + // We should set binary key, but the memcached server is broken for + // longer keys at the moment. + memcached_return_t rc= memcached_validate_key_length(*(key_length +x), false /* memc.flags.binary_protocol */); if (memcached_failed(rc)) { - return rc; + return memcached_set_error(memc, rc, MEMCACHED_AT, memcached_literal_param("Key provided was too long.")); } - - for (size_t y= 0; y < *(key_length + x); y++) + + if (memc.flags.verify_key and is_binary == false) { - if ((isgraph(keys[x][y])) == 0) + for (size_t y= 0; y < *(key_length +x); ++y) { - return MEMCACHED_BAD_KEY_PROVIDED; + if ((isgraph(keys[x][y])) == 0) + { + return memcached_set_error(memc, MEMCACHED_BAD_KEY_PROVIDED, MEMCACHED_AT, memcached_literal_param("Key provided had invalid character.")); + } } } }