X-Git-Url: https://git.m6w6.name/?a=blobdiff_plain;f=libmemcached%2Fkey.cc;h=cec0eece64400e83d3645234bca3bbc3e53e29ed;hb=bf2fa8274d569da94a626eea30de612f01ec4a7c;hp=ea98c729f02b92f5fdf187623dba9ec4a37b0ad0;hpb=bd53173d0a23c8c2a0dac68056cbd2cc52d5a6ef;p=awesomized%2Flibmemcached diff --git a/libmemcached/key.cc b/libmemcached/key.cc index ea98c729..cec0eece 100644 --- a/libmemcached/key.cc +++ b/libmemcached/key.cc @@ -37,57 +37,71 @@ #include -memcached_return_t memcached_key_test(memcached_st &memc, - const char * const *keys, - const size_t *key_length, - size_t number_of_keys) +static inline memcached_return_t memcached_validate_key_length(size_t key_length, bool) { - if (keys == NULL or key_length == NULL) + if (key_length == 0) { - return memcached_set_error(memc, MEMCACHED_BAD_KEY_PROVIDED, MEMCACHED_AT); + return MEMCACHED_BAD_KEY_PROVIDED; } - if (not memc.flags.verify_key) + // No one ever reimplemented MEMCACHED to use keys longer then the original ascii length +#if 0 + if (binary) { - for (uint32_t x= 0; x < number_of_keys; x++) + if (key_length > 0xffff) { - memcached_return_t rc= memcached_validate_key_length(*(key_length +x), false); - if (memcached_failed(rc)) - { - return rc; - } + return MEMCACHED_BAD_KEY_PROVIDED; } - - return MEMCACHED_SUCCESS; } - - if (memc.flags.binary_protocol) + else +#endif { - for (uint32_t x= 0; x < number_of_keys; x++) + if (key_length >= MEMCACHED_MAX_KEY) { - memcached_return_t rc= memcached_validate_key_length(*(key_length +x), false); - if (memcached_failed(rc)) - { - return rc; - } + return MEMCACHED_BAD_KEY_PROVIDED; } + } - return MEMCACHED_SUCCESS; + return MEMCACHED_SUCCESS; +} + +memcached_return_t memcached_key_test(memcached_st &memc, + const char * const *keys, + const size_t *key_length, + size_t number_of_keys) +{ + if (number_of_keys == 0) + { + return memcached_set_error(memc, MEMCACHED_INVALID_ARGUMENTS, MEMCACHED_AT, memcached_literal_param("Numbers of keys provided was zero")); } - for (uint32_t x= 0; x < number_of_keys; x++) + if (keys == NULL or key_length == NULL) + { + return memcached_set_error(memc, MEMCACHED_BAD_KEY_PROVIDED, MEMCACHED_AT, memcached_literal_param("Key was NULL or length of key was zero.")); + } + + const bool is_binary= memcached_flag(memc, MEMCACHED_FLAG_BINARY_PROTOCOL); + + // If we don't need to verify the key, or we are using the binary protoocol, + // we just check the size of the key + for (size_t x= 0; x < number_of_keys; ++x) { - memcached_return_t rc= memcached_validate_key_length(*(key_length + x), false); + // We should set binary key, but the memcached server is broken for + // longer keys at the moment. + memcached_return_t rc= memcached_validate_key_length(*(key_length +x), false /* memc.flags.binary_protocol */); if (memcached_failed(rc)) { - return rc; + return memcached_set_error(memc, rc, MEMCACHED_AT, memcached_literal_param("Key provided was too long.")); } - - for (size_t y= 0; y < *(key_length + x); y++) + + if (memc.flags.verify_key and is_binary == false) { - if ((isgraph(keys[x][y])) == 0) + for (size_t y= 0; y < *(key_length +x); ++y) { - return MEMCACHED_BAD_KEY_PROVIDED; + if ((isgraph(keys[x][y])) == 0) + { + return memcached_set_error(memc, MEMCACHED_BAD_KEY_PROVIDED, MEMCACHED_AT, memcached_literal_param("Key provided had invalid character.")); + } } } }