diff options
author | Tom Gundersen <teg@jklm.no> | 2014-11-01 14:04:17 +0100 |
---|---|---|
committer | Tom Gundersen <teg@jklm.no> | 2014-11-01 15:36:29 +0100 |
commit | f089257d7b573dcff409a5fb0b140fa5c6e4ca84 (patch) | |
tree | 9195f3667199b2d75e2892d4813ec2bbd9d0ee25 /src/test | |
parent | 5d20fde4a5c4dff4d7c737b545fbd13582d544c1 (diff) |
shared: add helpers for unaligend BE read/write
Diffstat (limited to 'src/test')
-rw-r--r-- | src/test/test-unaligned.c | 92 |
1 files changed, 92 insertions, 0 deletions
diff --git a/src/test/test-unaligned.c b/src/test/test-unaligned.c new file mode 100644 index 0000000000..52693cd325 --- /dev/null +++ b/src/test/test-unaligned.c @@ -0,0 +1,92 @@ +/*** + This file is part of systemd + + Copyright 2014 Tom Gundersen + + systemd is free software; you can redistribute it and/or modify it + under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation; either version 2.1 of the License, or + (at your option) any later version. + + systemd is distributed in the hope that it will be useful, but + WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with systemd; If not, see <http://www.gnu.org/licenses/>. +***/ + +#include "unaligned.h" +#include "util.h" + +static uint8_t data[] = { + 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, + 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, +}; + +int main(int argc, const char *argv[]) { + uint8_t scratch[16]; + + assert_se(unaligned_read_be16((be16_t*)&data[0]) == 0x0001); + assert_se(unaligned_read_be16((be16_t*)&data[1]) == 0x0102); + + assert_se(unaligned_read_be32((be32_t*)&data[0]) == 0x00010203); + assert_se(unaligned_read_be32((be32_t*)&data[1]) == 0x01020304); + assert_se(unaligned_read_be32((be32_t*)&data[2]) == 0x02030405); + assert_se(unaligned_read_be32((be32_t*)&data[3]) == 0x03040506); + + assert_se(unaligned_read_be64((be64_t*)&data[0]) == 0x0001020304050607); + assert_se(unaligned_read_be64((be64_t*)&data[1]) == 0x0102030405060708); + assert_se(unaligned_read_be64((be64_t*)&data[2]) == 0x0203040506070809); + assert_se(unaligned_read_be64((be64_t*)&data[3]) == 0x030405060708090a); + assert_se(unaligned_read_be64((be64_t*)&data[4]) == 0x0405060708090a0b); + assert_se(unaligned_read_be64((be64_t*)&data[5]) == 0x05060708090a0b0c); + assert_se(unaligned_read_be64((be64_t*)&data[6]) == 0x060708090a0b0c0d); + assert_se(unaligned_read_be64((be64_t*)&data[7]) == 0x0708090a0b0c0d0e); + + zero(scratch); + unaligned_write_be16((uint16_t*)&scratch[0], 0x0001); + assert_se(memcmp(&scratch[0], &data[0], sizeof(uint16_t)) == 0); + zero(scratch); + unaligned_write_be16((uint16_t*)&scratch[1], 0x0102); + assert_se(memcmp(&scratch[1], &data[1], sizeof(uint16_t)) == 0); + + zero(scratch); + unaligned_write_be32((be32_t*)&scratch[0], 0x00010203); + assert_se(memcmp(&scratch[0], &data[0], sizeof(uint32_t)) == 0); + zero(scratch); + unaligned_write_be32((be32_t*)&scratch[1], 0x01020304); + assert_se(memcmp(&scratch[1], &data[1], sizeof(uint32_t)) == 0); + zero(scratch); + unaligned_write_be32((be32_t*)&scratch[2], 0x02030405); + assert_se(memcmp(&scratch[2], &data[2], sizeof(uint32_t)) == 0); + zero(scratch); + unaligned_write_be32((be32_t*)&scratch[3], 0x03040506); + assert_se(memcmp(&scratch[3], &data[3], sizeof(uint32_t)) == 0); + + zero(scratch); + unaligned_write_be64((be64_t*)&scratch[0], 0x0001020304050607); + assert_se(memcmp(&scratch[0], &data[0], sizeof(uint64_t)) == 0); + zero(scratch); + unaligned_write_be64((be64_t*)&scratch[1], 0x0102030405060708); + assert_se(memcmp(&scratch[1], &data[1], sizeof(uint64_t)) == 0); + zero(scratch); + unaligned_write_be64((be64_t*)&scratch[2], 0x0203040506070809); + assert_se(memcmp(&scratch[2], &data[2], sizeof(uint64_t)) == 0); + zero(scratch); + unaligned_write_be64((be64_t*)&scratch[3], 0x030405060708090a); + assert_se(memcmp(&scratch[3], &data[3], sizeof(uint64_t)) == 0); + zero(scratch); + unaligned_write_be64((be64_t*)&scratch[4], 0x0405060708090a0b); + assert_se(memcmp(&scratch[4], &data[4], sizeof(uint64_t)) == 0); + zero(scratch); + unaligned_write_be64((be64_t*)&scratch[5], 0x05060708090a0b0c); + assert_se(memcmp(&scratch[5], &data[5], sizeof(uint64_t)) == 0); + zero(scratch); + unaligned_write_be64((be64_t*)&scratch[6], 0x060708090a0b0c0d); + assert_se(memcmp(&scratch[6], &data[6], sizeof(uint64_t)) == 0); + zero(scratch); + unaligned_write_be64((be64_t*)&scratch[7], 0x0708090a0b0c0d0e); + assert_se(memcmp(&scratch[7], &data[7], sizeof(uint64_t)) == 0); +} |