summaryrefslogtreecommitdiff
path: root/src/test
diff options
context:
space:
mode:
authorTom Gundersen <teg@jklm.no>2014-11-01 14:04:17 +0100
committerTom Gundersen <teg@jklm.no>2014-11-01 15:36:29 +0100
commitf089257d7b573dcff409a5fb0b140fa5c6e4ca84 (patch)
tree9195f3667199b2d75e2892d4813ec2bbd9d0ee25 /src/test
parent5d20fde4a5c4dff4d7c737b545fbd13582d544c1 (diff)
shared: add helpers for unaligend BE read/write
Diffstat (limited to 'src/test')
-rw-r--r--src/test/test-unaligned.c92
1 files changed, 92 insertions, 0 deletions
diff --git a/src/test/test-unaligned.c b/src/test/test-unaligned.c
new file mode 100644
index 0000000000..52693cd325
--- /dev/null
+++ b/src/test/test-unaligned.c
@@ -0,0 +1,92 @@
+/***
+ This file is part of systemd
+
+ Copyright 2014 Tom Gundersen
+
+ systemd is free software; you can redistribute it and/or modify it
+ under the terms of the GNU Lesser General Public License as published by
+ the Free Software Foundation; either version 2.1 of the License, or
+ (at your option) any later version.
+
+ systemd is distributed in the hope that it will be useful, but
+ WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+ Lesser General Public License for more details.
+
+ You should have received a copy of the GNU Lesser General Public License
+ along with systemd; If not, see <http://www.gnu.org/licenses/>.
+***/
+
+#include "unaligned.h"
+#include "util.h"
+
+static uint8_t data[] = {
+ 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07,
+ 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f,
+};
+
+int main(int argc, const char *argv[]) {
+ uint8_t scratch[16];
+
+ assert_se(unaligned_read_be16((be16_t*)&data[0]) == 0x0001);
+ assert_se(unaligned_read_be16((be16_t*)&data[1]) == 0x0102);
+
+ assert_se(unaligned_read_be32((be32_t*)&data[0]) == 0x00010203);
+ assert_se(unaligned_read_be32((be32_t*)&data[1]) == 0x01020304);
+ assert_se(unaligned_read_be32((be32_t*)&data[2]) == 0x02030405);
+ assert_se(unaligned_read_be32((be32_t*)&data[3]) == 0x03040506);
+
+ assert_se(unaligned_read_be64((be64_t*)&data[0]) == 0x0001020304050607);
+ assert_se(unaligned_read_be64((be64_t*)&data[1]) == 0x0102030405060708);
+ assert_se(unaligned_read_be64((be64_t*)&data[2]) == 0x0203040506070809);
+ assert_se(unaligned_read_be64((be64_t*)&data[3]) == 0x030405060708090a);
+ assert_se(unaligned_read_be64((be64_t*)&data[4]) == 0x0405060708090a0b);
+ assert_se(unaligned_read_be64((be64_t*)&data[5]) == 0x05060708090a0b0c);
+ assert_se(unaligned_read_be64((be64_t*)&data[6]) == 0x060708090a0b0c0d);
+ assert_se(unaligned_read_be64((be64_t*)&data[7]) == 0x0708090a0b0c0d0e);
+
+ zero(scratch);
+ unaligned_write_be16((uint16_t*)&scratch[0], 0x0001);
+ assert_se(memcmp(&scratch[0], &data[0], sizeof(uint16_t)) == 0);
+ zero(scratch);
+ unaligned_write_be16((uint16_t*)&scratch[1], 0x0102);
+ assert_se(memcmp(&scratch[1], &data[1], sizeof(uint16_t)) == 0);
+
+ zero(scratch);
+ unaligned_write_be32((be32_t*)&scratch[0], 0x00010203);
+ assert_se(memcmp(&scratch[0], &data[0], sizeof(uint32_t)) == 0);
+ zero(scratch);
+ unaligned_write_be32((be32_t*)&scratch[1], 0x01020304);
+ assert_se(memcmp(&scratch[1], &data[1], sizeof(uint32_t)) == 0);
+ zero(scratch);
+ unaligned_write_be32((be32_t*)&scratch[2], 0x02030405);
+ assert_se(memcmp(&scratch[2], &data[2], sizeof(uint32_t)) == 0);
+ zero(scratch);
+ unaligned_write_be32((be32_t*)&scratch[3], 0x03040506);
+ assert_se(memcmp(&scratch[3], &data[3], sizeof(uint32_t)) == 0);
+
+ zero(scratch);
+ unaligned_write_be64((be64_t*)&scratch[0], 0x0001020304050607);
+ assert_se(memcmp(&scratch[0], &data[0], sizeof(uint64_t)) == 0);
+ zero(scratch);
+ unaligned_write_be64((be64_t*)&scratch[1], 0x0102030405060708);
+ assert_se(memcmp(&scratch[1], &data[1], sizeof(uint64_t)) == 0);
+ zero(scratch);
+ unaligned_write_be64((be64_t*)&scratch[2], 0x0203040506070809);
+ assert_se(memcmp(&scratch[2], &data[2], sizeof(uint64_t)) == 0);
+ zero(scratch);
+ unaligned_write_be64((be64_t*)&scratch[3], 0x030405060708090a);
+ assert_se(memcmp(&scratch[3], &data[3], sizeof(uint64_t)) == 0);
+ zero(scratch);
+ unaligned_write_be64((be64_t*)&scratch[4], 0x0405060708090a0b);
+ assert_se(memcmp(&scratch[4], &data[4], sizeof(uint64_t)) == 0);
+ zero(scratch);
+ unaligned_write_be64((be64_t*)&scratch[5], 0x05060708090a0b0c);
+ assert_se(memcmp(&scratch[5], &data[5], sizeof(uint64_t)) == 0);
+ zero(scratch);
+ unaligned_write_be64((be64_t*)&scratch[6], 0x060708090a0b0c0d);
+ assert_se(memcmp(&scratch[6], &data[6], sizeof(uint64_t)) == 0);
+ zero(scratch);
+ unaligned_write_be64((be64_t*)&scratch[7], 0x0708090a0b0c0d0e);
+ assert_se(memcmp(&scratch[7], &data[7], sizeof(uint64_t)) == 0);
+}