You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
202 lines
6.3 KiB
202 lines
6.3 KiB
// Copyright 2020 The Pigweed Authors
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License"); you may not
|
|
// use this file except in compliance with the License. You may obtain a copy of
|
|
// the License at
|
|
//
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
// WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
// License for the specific language governing permissions and limitations under
|
|
// the License.
|
|
|
|
#include <algorithm>
|
|
#include <array>
|
|
|
|
#include "gtest/gtest.h"
|
|
#include "pw_tokenizer/tokenize.h"
|
|
#include "pw_tokenizer/tokenize_to_global_handler.h"
|
|
#include "pw_tokenizer/tokenize_to_global_handler_with_payload.h"
|
|
|
|
namespace pw {
|
|
namespace tokenizer {
|
|
namespace {
|
|
|
|
template <size_t kSize>
|
|
uint32_t TestHash(const char (&str)[kSize])
|
|
PW_NO_SANITIZE("unsigned-integer-overflow") {
|
|
static_assert(kSize > 0u, "Must have at least a null terminator");
|
|
|
|
static constexpr uint32_t k65599HashConstant = 65599u;
|
|
|
|
// The length is hashed as if it were the first character.
|
|
uint32_t hash = kSize - 1;
|
|
uint32_t coefficient = k65599HashConstant;
|
|
|
|
size_t length =
|
|
std::min(static_cast<size_t>(PW_TOKENIZER_CFG_C_HASH_LENGTH), kSize - 1);
|
|
|
|
// Hash all of the characters in the string as unsigned ints.
|
|
// The coefficient calculation is done modulo 0x100000000, so the unsigned
|
|
// integer overflows are intentional.
|
|
for (size_t i = 0; i < length; ++i) {
|
|
hash += coefficient * str[i];
|
|
coefficient *= k65599HashConstant;
|
|
}
|
|
|
|
return hash;
|
|
}
|
|
|
|
TEST(TokenizeStringLiteral, EmptyString_IsZero) {
|
|
constexpr pw_tokenizer_Token token = PW_TOKENIZE_STRING("");
|
|
EXPECT_TRUE(0u == token);
|
|
}
|
|
|
|
TEST(TokenizeStringLiteral, String_MatchesHash) {
|
|
constexpr uint32_t token = PW_TOKENIZE_STRING("[:-)");
|
|
EXPECT_TRUE(TestHash("[:-)") == token);
|
|
}
|
|
|
|
constexpr uint32_t kGlobalToken = PW_TOKENIZE_STRING(">:-[]");
|
|
|
|
TEST(TokenizeStringLiteral, GlobalVariable_MatchesHash) {
|
|
EXPECT_TRUE(TestHash(">:-[]") == kGlobalToken);
|
|
}
|
|
|
|
class TokenizeToBuffer : public ::testing::Test {
|
|
public:
|
|
TokenizeToBuffer() : buffer_{} {}
|
|
|
|
protected:
|
|
uint8_t buffer_[64];
|
|
};
|
|
|
|
// Test fixture for callback and global handler. Both of these need a global
|
|
// message buffer. To keep the message buffers separate, template this on the
|
|
// derived class type.
|
|
template <typename Impl>
|
|
class GlobalMessage : public ::testing::Test {
|
|
public:
|
|
static void SetMessage(const uint8_t* message, size_t size) {
|
|
ASSERT_TRUE(size <= sizeof(message_));
|
|
std::memcpy(message_, message, size);
|
|
message_size_bytes_ = size;
|
|
}
|
|
|
|
protected:
|
|
GlobalMessage() {
|
|
std::memset(message_, 0, sizeof(message_));
|
|
message_size_bytes_ = 0;
|
|
}
|
|
|
|
static uint8_t message_[256];
|
|
static size_t message_size_bytes_;
|
|
};
|
|
|
|
template <typename Impl>
|
|
uint8_t GlobalMessage<Impl>::message_[256] = {};
|
|
template <typename Impl>
|
|
size_t GlobalMessage<Impl>::message_size_bytes_ = 0;
|
|
|
|
class TokenizeToCallback : public GlobalMessage<TokenizeToCallback> {};
|
|
|
|
template <uint8_t... kData, size_t kSize>
|
|
std::array<uint8_t, sizeof(uint32_t) + sizeof...(kData)> ExpectedData(
|
|
const char (&format)[kSize]) {
|
|
const uint32_t value = TestHash(format);
|
|
return std::array<uint8_t, sizeof(uint32_t) + sizeof...(kData)>{
|
|
static_cast<uint8_t>(value & 0xff),
|
|
static_cast<uint8_t>(value >> 8 & 0xff),
|
|
static_cast<uint8_t>(value >> 16 & 0xff),
|
|
static_cast<uint8_t>(value >> 24 & 0xff),
|
|
kData...};
|
|
}
|
|
|
|
TEST_F(TokenizeToCallback, Variety) {
|
|
PW_TOKENIZE_TO_CALLBACK(
|
|
SetMessage, "%s there are %x (%.2f) of them%c", "Now", 2u, 2.0f, '.');
|
|
const auto expected = // clang-format off
|
|
ExpectedData<3, 'N', 'o', 'w', // string "Now"
|
|
0x04, // unsigned 2 (zig-zag encoded)
|
|
0x00, 0x00, 0x00, 0x40, // float 2.0
|
|
0x5C // char '.' (0x2E, zig-zag encoded)
|
|
>("%s there are %x (%.2f) of them%c");
|
|
// clang-format on
|
|
ASSERT_TRUE(expected.size() == message_size_bytes_);
|
|
EXPECT_TRUE(std::memcmp(expected.data(), message_, expected.size()) == 0);
|
|
}
|
|
|
|
class TokenizeToGlobalHandler : public GlobalMessage<TokenizeToGlobalHandler> {
|
|
};
|
|
|
|
TEST_F(TokenizeToGlobalHandler, Variety) {
|
|
PW_TOKENIZE_TO_GLOBAL_HANDLER("%x%lld%1.2f%s", 0, 0ll, -0.0, "");
|
|
const auto expected =
|
|
ExpectedData<0, 0, 0x00, 0x00, 0x00, 0x80, 0>("%x%lld%1.2f%s");
|
|
ASSERT_TRUE(expected.size() == message_size_bytes_);
|
|
EXPECT_TRUE(std::memcmp(expected.data(), message_, expected.size()) == 0);
|
|
}
|
|
|
|
extern "C" void pw_tokenizer_HandleEncodedMessage(
|
|
const uint8_t* encoded_message, size_t size_bytes) {
|
|
TokenizeToGlobalHandler::SetMessage(encoded_message, size_bytes);
|
|
}
|
|
|
|
class TokenizeToGlobalHandlerWithPayload
|
|
: public GlobalMessage<TokenizeToGlobalHandlerWithPayload> {
|
|
public:
|
|
static void SetPayload(pw_tokenizer_Payload payload) {
|
|
payload_ = static_cast<intptr_t>(payload);
|
|
}
|
|
|
|
protected:
|
|
TokenizeToGlobalHandlerWithPayload() { payload_ = {}; }
|
|
|
|
static intptr_t payload_;
|
|
};
|
|
|
|
intptr_t TokenizeToGlobalHandlerWithPayload::payload_;
|
|
|
|
TEST_F(TokenizeToGlobalHandlerWithPayload, Variety) {
|
|
ASSERT_TRUE(payload_ != 123);
|
|
|
|
const auto expected =
|
|
ExpectedData<0, 0, 0x00, 0x00, 0x00, 0x80, 0>("%x%lld%1.2f%s");
|
|
|
|
PW_TOKENIZE_TO_GLOBAL_HANDLER_WITH_PAYLOAD(
|
|
static_cast<pw_tokenizer_Payload>(123),
|
|
"%x%lld%1.2f%s",
|
|
0,
|
|
0ll,
|
|
-0.0,
|
|
"");
|
|
ASSERT_TRUE(expected.size() == message_size_bytes_);
|
|
EXPECT_TRUE(std::memcmp(expected.data(), message_, expected.size()) == 0);
|
|
EXPECT_TRUE(payload_ == 123);
|
|
|
|
PW_TOKENIZE_TO_GLOBAL_HANDLER_WITH_PAYLOAD(
|
|
static_cast<pw_tokenizer_Payload>(-543),
|
|
"%x%lld%1.2f%s",
|
|
0,
|
|
0ll,
|
|
-0.0,
|
|
"");
|
|
ASSERT_TRUE(expected.size() == message_size_bytes_);
|
|
EXPECT_TRUE(std::memcmp(expected.data(), message_, expected.size()) == 0);
|
|
EXPECT_TRUE(payload_ == -543);
|
|
}
|
|
|
|
extern "C" void pw_tokenizer_HandleEncodedMessageWithPayload(
|
|
pw_tokenizer_Payload payload,
|
|
const uint8_t* encoded_message,
|
|
size_t size_bytes) {
|
|
TokenizeToGlobalHandlerWithPayload::SetMessage(encoded_message, size_bytes);
|
|
TokenizeToGlobalHandlerWithPayload::SetPayload(payload);
|
|
}
|
|
|
|
} // namespace
|
|
} // namespace tokenizer
|
|
} // namespace pw
|