| /* SPDX-License-Identifier: LGPL-2.1+ */ |
| |
| #include "sparse-endian.h" |
| #include "unaligned.h" |
| #include "util.h" |
| |
| static uint8_t data[] = { |
| 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, |
| 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, |
| }; |
| |
| static void test_be(void) { |
| uint8_t scratch[16]; |
| |
| assert_se(unaligned_read_be16(&data[0]) == 0x0001); |
| assert_se(unaligned_read_be16(&data[1]) == 0x0102); |
| |
| assert_se(unaligned_read_be32(&data[0]) == 0x00010203); |
| assert_se(unaligned_read_be32(&data[1]) == 0x01020304); |
| assert_se(unaligned_read_be32(&data[2]) == 0x02030405); |
| assert_se(unaligned_read_be32(&data[3]) == 0x03040506); |
| |
| assert_se(unaligned_read_be64(&data[0]) == 0x0001020304050607); |
| assert_se(unaligned_read_be64(&data[1]) == 0x0102030405060708); |
| assert_se(unaligned_read_be64(&data[2]) == 0x0203040506070809); |
| assert_se(unaligned_read_be64(&data[3]) == 0x030405060708090a); |
| assert_se(unaligned_read_be64(&data[4]) == 0x0405060708090a0b); |
| assert_se(unaligned_read_be64(&data[5]) == 0x05060708090a0b0c); |
| assert_se(unaligned_read_be64(&data[6]) == 0x060708090a0b0c0d); |
| assert_se(unaligned_read_be64(&data[7]) == 0x0708090a0b0c0d0e); |
| |
| zero(scratch); |
| unaligned_write_be16(&scratch[0], 0x0001); |
| assert_se(memcmp(&scratch[0], &data[0], sizeof(uint16_t)) == 0); |
| zero(scratch); |
| unaligned_write_be16(&scratch[1], 0x0102); |
| assert_se(memcmp(&scratch[1], &data[1], sizeof(uint16_t)) == 0); |
| |
| zero(scratch); |
| unaligned_write_be32(&scratch[0], 0x00010203); |
| assert_se(memcmp(&scratch[0], &data[0], sizeof(uint32_t)) == 0); |
| zero(scratch); |
| unaligned_write_be32(&scratch[1], 0x01020304); |
| assert_se(memcmp(&scratch[1], &data[1], sizeof(uint32_t)) == 0); |
| zero(scratch); |
| unaligned_write_be32(&scratch[2], 0x02030405); |
| assert_se(memcmp(&scratch[2], &data[2], sizeof(uint32_t)) == 0); |
| zero(scratch); |
| unaligned_write_be32(&scratch[3], 0x03040506); |
| assert_se(memcmp(&scratch[3], &data[3], sizeof(uint32_t)) == 0); |
| |
| zero(scratch); |
| unaligned_write_be64(&scratch[0], 0x0001020304050607); |
| assert_se(memcmp(&scratch[0], &data[0], sizeof(uint64_t)) == 0); |
| zero(scratch); |
| unaligned_write_be64(&scratch[1], 0x0102030405060708); |
| assert_se(memcmp(&scratch[1], &data[1], sizeof(uint64_t)) == 0); |
| zero(scratch); |
| unaligned_write_be64(&scratch[2], 0x0203040506070809); |
| assert_se(memcmp(&scratch[2], &data[2], sizeof(uint64_t)) == 0); |
| zero(scratch); |
| unaligned_write_be64(&scratch[3], 0x030405060708090a); |
| assert_se(memcmp(&scratch[3], &data[3], sizeof(uint64_t)) == 0); |
| zero(scratch); |
| unaligned_write_be64(&scratch[4], 0x0405060708090a0b); |
| assert_se(memcmp(&scratch[4], &data[4], sizeof(uint64_t)) == 0); |
| zero(scratch); |
| unaligned_write_be64(&scratch[5], 0x05060708090a0b0c); |
| assert_se(memcmp(&scratch[5], &data[5], sizeof(uint64_t)) == 0); |
| zero(scratch); |
| unaligned_write_be64(&scratch[6], 0x060708090a0b0c0d); |
| assert_se(memcmp(&scratch[6], &data[6], sizeof(uint64_t)) == 0); |
| zero(scratch); |
| unaligned_write_be64(&scratch[7], 0x0708090a0b0c0d0e); |
| assert_se(memcmp(&scratch[7], &data[7], sizeof(uint64_t)) == 0); |
| } |
| |
| static void test_le(void) { |
| uint8_t scratch[16]; |
| |
| assert_se(unaligned_read_le16(&data[0]) == 0x0100); |
| assert_se(unaligned_read_le16(&data[1]) == 0x0201); |
| |
| assert_se(unaligned_read_le32(&data[0]) == 0x03020100); |
| assert_se(unaligned_read_le32(&data[1]) == 0x04030201); |
| assert_se(unaligned_read_le32(&data[2]) == 0x05040302); |
| assert_se(unaligned_read_le32(&data[3]) == 0x06050403); |
| |
| assert_se(unaligned_read_le64(&data[0]) == 0x0706050403020100); |
| assert_se(unaligned_read_le64(&data[1]) == 0x0807060504030201); |
| assert_se(unaligned_read_le64(&data[2]) == 0x0908070605040302); |
| assert_se(unaligned_read_le64(&data[3]) == 0x0a09080706050403); |
| assert_se(unaligned_read_le64(&data[4]) == 0x0b0a090807060504); |
| assert_se(unaligned_read_le64(&data[5]) == 0x0c0b0a0908070605); |
| assert_se(unaligned_read_le64(&data[6]) == 0x0d0c0b0a09080706); |
| assert_se(unaligned_read_le64(&data[7]) == 0x0e0d0c0b0a090807); |
| |
| zero(scratch); |
| unaligned_write_le16(&scratch[0], 0x0100); |
| assert_se(memcmp(&scratch[0], &data[0], sizeof(uint16_t)) == 0); |
| zero(scratch); |
| unaligned_write_le16(&scratch[1], 0x0201); |
| assert_se(memcmp(&scratch[1], &data[1], sizeof(uint16_t)) == 0); |
| |
| zero(scratch); |
| unaligned_write_le32(&scratch[0], 0x03020100); |
| |
| assert_se(memcmp(&scratch[0], &data[0], sizeof(uint32_t)) == 0); |
| zero(scratch); |
| unaligned_write_le32(&scratch[1], 0x04030201); |
| assert_se(memcmp(&scratch[1], &data[1], sizeof(uint32_t)) == 0); |
| zero(scratch); |
| unaligned_write_le32(&scratch[2], 0x05040302); |
| assert_se(memcmp(&scratch[2], &data[2], sizeof(uint32_t)) == 0); |
| zero(scratch); |
| unaligned_write_le32(&scratch[3], 0x06050403); |
| assert_se(memcmp(&scratch[3], &data[3], sizeof(uint32_t)) == 0); |
| |
| zero(scratch); |
| unaligned_write_le64(&scratch[0], 0x0706050403020100); |
| assert_se(memcmp(&scratch[0], &data[0], sizeof(uint64_t)) == 0); |
| zero(scratch); |
| unaligned_write_le64(&scratch[1], 0x0807060504030201); |
| assert_se(memcmp(&scratch[1], &data[1], sizeof(uint64_t)) == 0); |
| zero(scratch); |
| unaligned_write_le64(&scratch[2], 0x0908070605040302); |
| assert_se(memcmp(&scratch[2], &data[2], sizeof(uint64_t)) == 0); |
| zero(scratch); |
| unaligned_write_le64(&scratch[3], 0x0a09080706050403); |
| assert_se(memcmp(&scratch[3], &data[3], sizeof(uint64_t)) == 0); |
| zero(scratch); |
| unaligned_write_le64(&scratch[4], 0x0B0A090807060504); |
| assert_se(memcmp(&scratch[4], &data[4], sizeof(uint64_t)) == 0); |
| zero(scratch); |
| unaligned_write_le64(&scratch[5], 0x0c0b0a0908070605); |
| assert_se(memcmp(&scratch[5], &data[5], sizeof(uint64_t)) == 0); |
| zero(scratch); |
| unaligned_write_le64(&scratch[6], 0x0d0c0b0a09080706); |
| assert_se(memcmp(&scratch[6], &data[6], sizeof(uint64_t)) == 0); |
| zero(scratch); |
| unaligned_write_le64(&scratch[7], 0x0e0d0c0b0a090807); |
| assert_se(memcmp(&scratch[7], &data[7], sizeof(uint64_t)) == 0); |
| } |
| |
| static void test_ne(void) { |
| uint16_t x = 4711; |
| uint32_t y = 123456; |
| uint64_t z = 9876543210; |
| |
| /* Note that we don't bother actually testing alignment issues in this function, after all the _ne() functions |
| * are just aliases for the _le() or _be() implementations, which we test extensively above. Hence, in this |
| * function, just ensure that they map to the right version on the local architecture. */ |
| |
| assert_se(unaligned_read_ne16(&x) == 4711); |
| assert_se(unaligned_read_ne32(&y) == 123456); |
| assert_se(unaligned_read_ne64(&z) == 9876543210); |
| |
| unaligned_write_ne16(&x, 1); |
| unaligned_write_ne32(&y, 2); |
| unaligned_write_ne64(&z, 3); |
| |
| assert_se(x == 1); |
| assert_se(y == 2); |
| assert_se(z == 3); |
| } |
| |
| int main(int argc, const char *argv[]) { |
| test_be(); |
| test_le(); |
| test_ne(); |
| return 0; |
| } |