private byte[] inverseTransformKey(final byte[] tkey) { Utils.keyCheck(tkey); return mTransformer.inverseTransformKey(tkey); }
@Override public final int compareKeyTo(byte[] rkey, int offset, int length) { if (offset != 0 || length != rkey.length) { byte[] newRkey = new byte[length]; System.arraycopy(rkey, offset, newRkey, 0, length); rkey = newRkey; } return mSource.compareKeyTo(mTransformer.inverseTransformKey(rkey)); }
private byte[] inverseTransformKey(final byte[] tkey) { Utils.keyCheck(tkey); return mTransformer.inverseTransformKey(tkey); }
@Override public final int compareKeyTo(byte[] rkey, int offset, int length) { if (offset != 0 || length != rkey.length) { byte[] newRkey = new byte[length]; System.arraycopy(rkey, offset, newRkey, 0, length); rkey = newRkey; } return mSource.compareKeyTo(mTransformer.inverseTransformKey(rkey)); }
@Override public final int compareKeyTo(byte[] rkey, int offset, int length) { if (offset != 0 || length != rkey.length) { byte[] newRkey = new byte[length]; System.arraycopy(rkey, offset, newRkey, 0, length); rkey = newRkey; } return mSource.compareKeyTo(mTransformer.inverseTransformKey(rkey)); }
private byte[] inverseTransformKey(final byte[] tkey) { Utils.keyCheck(tkey); return mTransformer.inverseTransformKey(tkey); }
@Override public final int compareKeyTo(byte[] rkey) { return mSource.compareKeyTo(mTransformer.inverseTransformKey(rkey)); }
@Override public final int compareKeyTo(byte[] rkey) { return mSource.compareKeyTo(mTransformer.inverseTransformKey(rkey)); }
private byte[] inverseTransformKey(final byte[] tkey) { Utils.keyCheck(tkey); return mTransformer.inverseTransformKey(tkey); }
private byte[] inverseTransformKey(final byte[] tkey) { Utils.keyCheck(tkey); return mTransformer.inverseTransformKey(tkey); }
@Override public final int compareKeyTo(byte[] rkey) { return mSource.compareKeyTo(mTransformer.inverseTransformKey(rkey)); }
private byte[] inverseTransformKey(final byte[] tkey) { Utils.keyCheck(tkey); return mTransformer.inverseTransformKey(tkey); }
@Override public LockResult open(Transaction txn, byte[] tkey) throws IOException { final byte[] key = mTransformer.inverseTransformKey(tkey); if (key == null) { throw new ViewConstraintException("Unsupported key"); } return mSource.open(txn, key); } }
@Override public LockResult open(Transaction txn, byte[] tkey) throws IOException { final byte[] key = mTransformer.inverseTransformKey(tkey); if (key == null) { throw new ViewConstraintException("Unsupported key"); } return mSource.open(txn, key); } }
/** * Apply an inverse transformation of the given key, strictly greater than the one given. * This method is only called after the regular inverse transformation has been attempted. * Default implementation increments the key by the minimum amount and then calls * inverseTransformKey. * * @param tkey non-null key * @return inverse transformed key or null if inverse transformation of given key is not * supported */ public default byte[] inverseTransformKeyGt(byte[] tkey) { tkey = tkey.clone(); return Utils.increment(tkey, 0, tkey.length) ? inverseTransformKey(tkey) : null; }
/** * Apply an inverse transformation of the given key, strictly greater than the one given. * This method is only called after the regular inverse transformation has been attempted. * Default implementation increments the key by the minimum amount and then calls * inverseTransformKey. * * @param tkey non-null key * @return inverse transformed key or null if inverse transformation of given key is not * supported */ public default byte[] inverseTransformKeyGt(byte[] tkey) { tkey = tkey.clone(); return Utils.increment(tkey, 0, tkey.length) ? inverseTransformKey(tkey) : null; }
/** * Apply an inverse transformation of the given key, strictly less than the one given. * This method is only called after the regular inverse transformation has been attempted. * Default implementation decrements the key by the minimum amount and then calls * inverseTransformKey. * * @param tkey non-null key * @return inverse transformed key or null if inverse transformation of given key is not * supported */ public default byte[] inverseTransformKeyLt(byte[] tkey) { tkey = tkey.clone(); return Utils.decrement(tkey, 0, tkey.length) ? inverseTransformKey(tkey) : null; }
/** * Apply an inverse transformation of the given key, strictly less than the one given. * This method is only called after the regular inverse transformation has been attempted. * Default implementation decrements the key by the minimum amount and then calls * inverseTransformKey. * * @param tkey non-null key * @return inverse transformed key or null if inverse transformation of given key is not * supported */ public default byte[] inverseTransformKeyLt(byte[] tkey) { tkey = tkey.clone(); return Utils.decrement(tkey, 0, tkey.length) ? inverseTransformKey(tkey) : null; }
/** * Apply an inverse transformation of the given key, strictly less than the one given. * This method is only called after the regular inverse transformation has been attempted. * Default implementation decrements the key by the minimum amount and then calls * inverseTransformKey. * * @param tkey non-null key * @return inverse transformed key or null if inverse transformation of given key is not * supported */ public default byte[] inverseTransformKeyLt(byte[] tkey) { tkey = tkey.clone(); return Utils.decrement(tkey, 0, tkey.length) ? inverseTransformKey(tkey) : null; }
/** * Apply an inverse transformation of the given key, strictly greater than the one given. * This method is only called after the regular inverse transformation has been attempted. * Default implementation increments the key by the minimum amount and then calls * inverseTransformKey. * * @param tkey non-null key * @return inverse transformed key or null if inverse transformation of given key is not * supported */ public default byte[] inverseTransformKeyGt(byte[] tkey) { tkey = tkey.clone(); return Utils.increment(tkey, 0, tkey.length) ? inverseTransformKey(tkey) : null; }