mirror of
https://gitlab.torproject.org/tpo/core/tor.git
synced 2024-12-01 08:03:31 +01:00
Replace U64_LITERAL with the standard UINT64_C
This commit is contained in:
parent
cf0b07c2e5
commit
52884f56d4
@ -189,9 +189,7 @@
|
|||||||
#endif
|
#endif
|
||||||
|
|
||||||
#define U64_PRINTF_ARG(a) ((uint64_t)a)
|
#define U64_PRINTF_ARG(a) ((uint64_t)a)
|
||||||
#define U64_LITERAL(n) UINT64_C(n)
|
|
||||||
#define I64_PRINTF_ARG(a) ((int64_t)a)
|
#define I64_PRINTF_ARG(a) ((int64_t)a)
|
||||||
#define I64_LITERAL(n) INT64_C(n)
|
|
||||||
#define U64_FORMAT "%"PRIu64
|
#define U64_FORMAT "%"PRIu64
|
||||||
#define I64_FORMAT "%"PRId64
|
#define I64_FORMAT "%"PRId64
|
||||||
|
|
||||||
|
@ -16,27 +16,27 @@ int
|
|||||||
tor_log2(uint64_t u64)
|
tor_log2(uint64_t u64)
|
||||||
{
|
{
|
||||||
int r = 0;
|
int r = 0;
|
||||||
if (u64 >= (U64_LITERAL(1)<<32)) {
|
if (u64 >= (UINT64_C(1)<<32)) {
|
||||||
u64 >>= 32;
|
u64 >>= 32;
|
||||||
r = 32;
|
r = 32;
|
||||||
}
|
}
|
||||||
if (u64 >= (U64_LITERAL(1)<<16)) {
|
if (u64 >= (UINT64_C(1)<<16)) {
|
||||||
u64 >>= 16;
|
u64 >>= 16;
|
||||||
r += 16;
|
r += 16;
|
||||||
}
|
}
|
||||||
if (u64 >= (U64_LITERAL(1)<<8)) {
|
if (u64 >= (UINT64_C(1)<<8)) {
|
||||||
u64 >>= 8;
|
u64 >>= 8;
|
||||||
r += 8;
|
r += 8;
|
||||||
}
|
}
|
||||||
if (u64 >= (U64_LITERAL(1)<<4)) {
|
if (u64 >= (UINT64_C(1)<<4)) {
|
||||||
u64 >>= 4;
|
u64 >>= 4;
|
||||||
r += 4;
|
r += 4;
|
||||||
}
|
}
|
||||||
if (u64 >= (U64_LITERAL(1)<<2)) {
|
if (u64 >= (UINT64_C(1)<<2)) {
|
||||||
u64 >>= 2;
|
u64 >>= 2;
|
||||||
r += 2;
|
r += 2;
|
||||||
}
|
}
|
||||||
if (u64 >= (U64_LITERAL(1)<<1)) {
|
if (u64 >= (UINT64_C(1)<<1)) {
|
||||||
// u64 >>= 1; // not using this any more.
|
// u64 >>= 1; // not using this any more.
|
||||||
r += 1;
|
r += 1;
|
||||||
}
|
}
|
||||||
@ -55,12 +55,12 @@ round_to_power_of_2(uint64_t u64)
|
|||||||
return 1;
|
return 1;
|
||||||
|
|
||||||
lg2 = tor_log2(u64);
|
lg2 = tor_log2(u64);
|
||||||
low = U64_LITERAL(1) << lg2;
|
low = UINT64_C(1) << lg2;
|
||||||
|
|
||||||
if (lg2 == 63)
|
if (lg2 == 63)
|
||||||
return low;
|
return low;
|
||||||
|
|
||||||
high = U64_LITERAL(1) << (lg2+1);
|
high = UINT64_C(1) << (lg2+1);
|
||||||
if (high - u64 < u64 - low)
|
if (high - u64 < u64 - low)
|
||||||
return high;
|
return high;
|
||||||
else
|
else
|
||||||
|
@ -44,10 +44,10 @@ tor_gettimeofday, (struct timeval *timeval))
|
|||||||
#ifdef _WIN32
|
#ifdef _WIN32
|
||||||
/* Epoch bias copied from perl: number of units between windows epoch and
|
/* Epoch bias copied from perl: number of units between windows epoch and
|
||||||
* Unix epoch. */
|
* Unix epoch. */
|
||||||
#define EPOCH_BIAS U64_LITERAL(116444736000000000)
|
#define EPOCH_BIAS UINT64_C(116444736000000000)
|
||||||
#define UNITS_PER_SEC U64_LITERAL(10000000)
|
#define UNITS_PER_SEC UINT64_C(10000000)
|
||||||
#define USEC_PER_SEC U64_LITERAL(1000000)
|
#define USEC_PER_SEC UINT64_C(1000000)
|
||||||
#define UNITS_PER_USEC U64_LITERAL(10)
|
#define UNITS_PER_USEC UINT64_C(10)
|
||||||
union {
|
union {
|
||||||
uint64_t ft_64;
|
uint64_t ft_64;
|
||||||
FILETIME ft_ft;
|
FILETIME ft_ft;
|
||||||
|
@ -4581,8 +4581,8 @@ compute_real_max_mem_in_queues(const uint64_t val, int log_guess)
|
|||||||
uint64_t result;
|
uint64_t result;
|
||||||
|
|
||||||
if (val == 0) {
|
if (val == 0) {
|
||||||
#define ONE_GIGABYTE (U64_LITERAL(1) << 30)
|
#define ONE_GIGABYTE (UINT64_C(1) << 30)
|
||||||
#define ONE_MEGABYTE (U64_LITERAL(1) << 20)
|
#define ONE_MEGABYTE (UINT64_C(1) << 20)
|
||||||
/* The user didn't pick a memory limit. Choose a very large one
|
/* The user didn't pick a memory limit. Choose a very large one
|
||||||
* that is still smaller than the system memory */
|
* that is still smaller than the system memory */
|
||||||
static int notice_sent = 0;
|
static int notice_sent = 0;
|
||||||
|
@ -24,9 +24,9 @@
|
|||||||
|
|
||||||
/** Maximum default value for MaxMemInQueues, in bytes. */
|
/** Maximum default value for MaxMemInQueues, in bytes. */
|
||||||
#if SIZEOF_VOID_P >= 8
|
#if SIZEOF_VOID_P >= 8
|
||||||
#define MAX_DEFAULT_MEMORY_QUEUE_SIZE (U64_LITERAL(8) << 30)
|
#define MAX_DEFAULT_MEMORY_QUEUE_SIZE (UINT64_C(8) << 30)
|
||||||
#else
|
#else
|
||||||
#define MAX_DEFAULT_MEMORY_QUEUE_SIZE (U64_LITERAL(2) << 30)
|
#define MAX_DEFAULT_MEMORY_QUEUE_SIZE (UINT64_C(2) << 30)
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
MOCK_DECL(const char*, get_dirportfrontpage, (void));
|
MOCK_DECL(const char*, get_dirportfrontpage, (void));
|
||||||
|
@ -1040,15 +1040,15 @@ static struct unit_table_t memory_units[] = {
|
|||||||
{ "gigabit", 1<<27 },
|
{ "gigabit", 1<<27 },
|
||||||
{ "gbits", 1<<27 },
|
{ "gbits", 1<<27 },
|
||||||
{ "gbit", 1<<27 },
|
{ "gbit", 1<<27 },
|
||||||
{ "tb", U64_LITERAL(1)<<40 },
|
{ "tb", UINT64_C(1)<<40 },
|
||||||
{ "tbyte", U64_LITERAL(1)<<40 },
|
{ "tbyte", UINT64_C(1)<<40 },
|
||||||
{ "tbytes", U64_LITERAL(1)<<40 },
|
{ "tbytes", UINT64_C(1)<<40 },
|
||||||
{ "terabyte", U64_LITERAL(1)<<40 },
|
{ "terabyte", UINT64_C(1)<<40 },
|
||||||
{ "terabytes", U64_LITERAL(1)<<40 },
|
{ "terabytes", UINT64_C(1)<<40 },
|
||||||
{ "terabits", U64_LITERAL(1)<<37 },
|
{ "terabits", UINT64_C(1)<<37 },
|
||||||
{ "terabit", U64_LITERAL(1)<<37 },
|
{ "terabit", UINT64_C(1)<<37 },
|
||||||
{ "tbits", U64_LITERAL(1)<<37 },
|
{ "tbits", UINT64_C(1)<<37 },
|
||||||
{ "tbit", U64_LITERAL(1)<<37 },
|
{ "tbit", UINT64_C(1)<<37 },
|
||||||
{ NULL, 0 },
|
{ NULL, 0 },
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -1756,9 +1756,9 @@ networkstatus_compute_consensus(smartlist_t *votes,
|
|||||||
|
|
||||||
/* Build the flag indexes. Note that no vote can have more than 64 members
|
/* Build the flag indexes. Note that no vote can have more than 64 members
|
||||||
* for known_flags, so no value will be greater than 63, so it's safe to
|
* for known_flags, so no value will be greater than 63, so it's safe to
|
||||||
* do U64_LITERAL(1) << index on these values. But note also that
|
* do UINT64_C(1) << index on these values. But note also that
|
||||||
* named_flag and unnamed_flag are initialized to -1, so we need to check
|
* named_flag and unnamed_flag are initialized to -1, so we need to check
|
||||||
* that they're actually set before doing U64_LITERAL(1) << index with
|
* that they're actually set before doing UINT64_C(1) << index with
|
||||||
* them.*/
|
* them.*/
|
||||||
SMARTLIST_FOREACH_BEGIN(votes, networkstatus_t *, v) {
|
SMARTLIST_FOREACH_BEGIN(votes, networkstatus_t *, v) {
|
||||||
flag_map[v_sl_idx] = tor_calloc(smartlist_len(v->known_flags),
|
flag_map[v_sl_idx] = tor_calloc(smartlist_len(v->known_flags),
|
||||||
@ -1787,7 +1787,7 @@ networkstatus_compute_consensus(smartlist_t *votes,
|
|||||||
uint64_t nf;
|
uint64_t nf;
|
||||||
if (named_flag[v_sl_idx]<0)
|
if (named_flag[v_sl_idx]<0)
|
||||||
continue;
|
continue;
|
||||||
nf = U64_LITERAL(1) << named_flag[v_sl_idx];
|
nf = UINT64_C(1) << named_flag[v_sl_idx];
|
||||||
SMARTLIST_FOREACH_BEGIN(v->routerstatus_list,
|
SMARTLIST_FOREACH_BEGIN(v->routerstatus_list,
|
||||||
vote_routerstatus_t *, rs) {
|
vote_routerstatus_t *, rs) {
|
||||||
|
|
||||||
@ -1812,7 +1812,7 @@ networkstatus_compute_consensus(smartlist_t *votes,
|
|||||||
uint64_t uf;
|
uint64_t uf;
|
||||||
if (unnamed_flag[v_sl_idx]<0)
|
if (unnamed_flag[v_sl_idx]<0)
|
||||||
continue;
|
continue;
|
||||||
uf = U64_LITERAL(1) << unnamed_flag[v_sl_idx];
|
uf = UINT64_C(1) << unnamed_flag[v_sl_idx];
|
||||||
SMARTLIST_FOREACH_BEGIN(v->routerstatus_list,
|
SMARTLIST_FOREACH_BEGIN(v->routerstatus_list,
|
||||||
vote_routerstatus_t *, rs) {
|
vote_routerstatus_t *, rs) {
|
||||||
if ((rs->flags & uf) != 0) {
|
if ((rs->flags & uf) != 0) {
|
||||||
@ -1902,11 +1902,11 @@ networkstatus_compute_consensus(smartlist_t *votes,
|
|||||||
|
|
||||||
/* Tally up all the flags. */
|
/* Tally up all the flags. */
|
||||||
for (int flag = 0; flag < n_voter_flags[voter_idx]; ++flag) {
|
for (int flag = 0; flag < n_voter_flags[voter_idx]; ++flag) {
|
||||||
if (rs->flags & (U64_LITERAL(1) << flag))
|
if (rs->flags & (UINT64_C(1) << flag))
|
||||||
++flag_counts[flag_map[voter_idx][flag]];
|
++flag_counts[flag_map[voter_idx][flag]];
|
||||||
}
|
}
|
||||||
if (named_flag[voter_idx] >= 0 &&
|
if (named_flag[voter_idx] >= 0 &&
|
||||||
(rs->flags & (U64_LITERAL(1) << named_flag[voter_idx]))) {
|
(rs->flags & (UINT64_C(1) << named_flag[voter_idx]))) {
|
||||||
if (chosen_name && strcmp(chosen_name, rs->status.nickname)) {
|
if (chosen_name && strcmp(chosen_name, rs->status.nickname)) {
|
||||||
log_notice(LD_DIR, "Conflict on naming for router: %s vs %s",
|
log_notice(LD_DIR, "Conflict on naming for router: %s vs %s",
|
||||||
chosen_name, rs->status.nickname);
|
chosen_name, rs->status.nickname);
|
||||||
|
@ -2408,7 +2408,7 @@ policy_summary_item_split(policy_summary_item_t* old, uint16_t new_starts)
|
|||||||
#define REJECT_CUTOFF_SCALE_IPV4 (0)
|
#define REJECT_CUTOFF_SCALE_IPV4 (0)
|
||||||
/* Ports are rejected in an IPv4 summary if they are rejected in more than two
|
/* Ports are rejected in an IPv4 summary if they are rejected in more than two
|
||||||
* IPv4 /8 address blocks */
|
* IPv4 /8 address blocks */
|
||||||
#define REJECT_CUTOFF_COUNT_IPV4 (U64_LITERAL(1) << \
|
#define REJECT_CUTOFF_COUNT_IPV4 (UINT64_C(1) << \
|
||||||
(IPV4_BITS - REJECT_CUTOFF_SCALE_IPV4 - 7))
|
(IPV4_BITS - REJECT_CUTOFF_SCALE_IPV4 - 7))
|
||||||
|
|
||||||
#define IPV6_BITS (128)
|
#define IPV6_BITS (128)
|
||||||
@ -2420,7 +2420,7 @@ policy_summary_item_split(policy_summary_item_t* old, uint16_t new_starts)
|
|||||||
* some scattered smaller blocks) have been allocated to the RIRs.
|
* some scattered smaller blocks) have been allocated to the RIRs.
|
||||||
* Network providers are typically allocated one or more IPv6 /32s.
|
* Network providers are typically allocated one or more IPv6 /32s.
|
||||||
*/
|
*/
|
||||||
#define REJECT_CUTOFF_COUNT_IPV6 (U64_LITERAL(1) << \
|
#define REJECT_CUTOFF_COUNT_IPV6 (UINT64_C(1) << \
|
||||||
(IPV6_BITS - REJECT_CUTOFF_SCALE_IPV6 - 16))
|
(IPV6_BITS - REJECT_CUTOFF_SCALE_IPV6 - 16))
|
||||||
|
|
||||||
/** Split an exit policy summary so that prt_min and prt_max
|
/** Split an exit policy summary so that prt_min and prt_max
|
||||||
@ -2515,7 +2515,7 @@ policy_summary_reject(smartlist_t *summary,
|
|||||||
* in the range. */
|
* in the range. */
|
||||||
count = UINT64_MAX;
|
count = UINT64_MAX;
|
||||||
} else {
|
} else {
|
||||||
count = (U64_LITERAL(1) << (addrbits - scale - maskbits));
|
count = (UINT64_C(1) << (addrbits - scale - maskbits));
|
||||||
}
|
}
|
||||||
tor_assert_nonfatal_once(count > 0);
|
tor_assert_nonfatal_once(count > 0);
|
||||||
while (i < smartlist_len(summary) &&
|
while (i < smartlist_len(summary) &&
|
||||||
|
@ -2724,7 +2724,7 @@ routerstatus_parse_entry_from_string(memarea_t *area,
|
|||||||
for (i=0; i < tok->n_args; ++i) {
|
for (i=0; i < tok->n_args; ++i) {
|
||||||
int p = smartlist_string_pos(vote->known_flags, tok->args[i]);
|
int p = smartlist_string_pos(vote->known_flags, tok->args[i]);
|
||||||
if (p >= 0) {
|
if (p >= 0) {
|
||||||
vote_rs->flags |= (U64_LITERAL(1)<<p);
|
vote_rs->flags |= (UINT64_C(1)<<p);
|
||||||
} else {
|
} else {
|
||||||
log_warn(LD_DIR, "Flags line had a flag %s not listed in known_flags.",
|
log_warn(LD_DIR, "Flags line had a flag %s not listed in known_flags.",
|
||||||
escaped(tok->args[i]));
|
escaped(tok->args[i]));
|
||||||
|
@ -16,7 +16,7 @@
|
|||||||
// an imaginary time, in timestamp units. Chosen so it will roll over.
|
// an imaginary time, in timestamp units. Chosen so it will roll over.
|
||||||
static const uint32_t START_TS = UINT32_MAX-10;
|
static const uint32_t START_TS = UINT32_MAX-10;
|
||||||
static const int32_t KB = 1024;
|
static const int32_t KB = 1024;
|
||||||
static const uint32_t GB = (U64_LITERAL(1) << 30);
|
static const uint32_t GB = (UINT64_C(1) << 30);
|
||||||
|
|
||||||
static void
|
static void
|
||||||
test_bwmgt_token_buf_init(void *arg)
|
test_bwmgt_token_buf_init(void *arg)
|
||||||
|
@ -554,7 +554,7 @@ test_channel_outbound_cell(void *arg)
|
|||||||
/* Set the test time to be mocked, since this test assumes that no
|
/* Set the test time to be mocked, since this test assumes that no
|
||||||
* time will pass, ewma values will not need to be re-scaled, and so on */
|
* time will pass, ewma values will not need to be re-scaled, and so on */
|
||||||
monotime_enable_test_mocking();
|
monotime_enable_test_mocking();
|
||||||
monotime_set_mock_time_nsec(U64_LITERAL(1000000000) * 12345);
|
monotime_set_mock_time_nsec(UINT64_C(1000000000) * 12345);
|
||||||
|
|
||||||
cmux_ewma_set_options(NULL,NULL);
|
cmux_ewma_set_options(NULL,NULL);
|
||||||
|
|
||||||
|
@ -86,7 +86,7 @@ static void
|
|||||||
test_cmux_compute_ticks(void *arg)
|
test_cmux_compute_ticks(void *arg)
|
||||||
{
|
{
|
||||||
const int64_t NS_PER_S = 1000 * 1000 * 1000;
|
const int64_t NS_PER_S = 1000 * 1000 * 1000;
|
||||||
const int64_t START_NS = U64_LITERAL(1217709000)*NS_PER_S;
|
const int64_t START_NS = UINT64_C(1217709000)*NS_PER_S;
|
||||||
int64_t now;
|
int64_t now;
|
||||||
double rem;
|
double rem;
|
||||||
unsigned tick;
|
unsigned tick;
|
||||||
|
@ -5619,8 +5619,8 @@ test_config_include_opened_file_list(void *data)
|
|||||||
static void
|
static void
|
||||||
test_config_compute_max_mem_in_queues(void *data)
|
test_config_compute_max_mem_in_queues(void *data)
|
||||||
{
|
{
|
||||||
#define GIGABYTE(x) (U64_LITERAL(x) << 30)
|
#define GIGABYTE(x) (UINT64_C(x) << 30)
|
||||||
#define MEGABYTE(x) (U64_LITERAL(x) << 20)
|
#define MEGABYTE(x) (UINT64_C(x) << 20)
|
||||||
(void)data;
|
(void)data;
|
||||||
MOCK(get_total_system_memory, get_total_system_memory_mock);
|
MOCK(get_total_system_memory, get_total_system_memory_mock);
|
||||||
|
|
||||||
|
@ -195,10 +195,10 @@ test_crypto_rng(void *arg)
|
|||||||
j = crypto_rand_int(100);
|
j = crypto_rand_int(100);
|
||||||
if (j < 0 || j >= 100)
|
if (j < 0 || j >= 100)
|
||||||
allok = 0;
|
allok = 0;
|
||||||
big = crypto_rand_uint64(U64_LITERAL(1)<<40);
|
big = crypto_rand_uint64(UINT64_C(1)<<40);
|
||||||
if (big >= (U64_LITERAL(1)<<40))
|
if (big >= (UINT64_C(1)<<40))
|
||||||
allok = 0;
|
allok = 0;
|
||||||
big = crypto_rand_uint64(U64_LITERAL(5));
|
big = crypto_rand_uint64(UINT64_C(5));
|
||||||
if (big >= 5)
|
if (big >= 5)
|
||||||
allok = 0;
|
allok = 0;
|
||||||
d = crypto_rand_double();
|
d = crypto_rand_double();
|
||||||
@ -2806,8 +2806,8 @@ test_crypto_siphash(void *arg)
|
|||||||
{ 0x72, 0x45, 0x06, 0xeb, 0x4c, 0x32, 0x8a, 0x95, }
|
{ 0x72, 0x45, 0x06, 0xeb, 0x4c, 0x32, 0x8a, 0x95, }
|
||||||
};
|
};
|
||||||
|
|
||||||
const struct sipkey K = { U64_LITERAL(0x0706050403020100),
|
const struct sipkey K = { UINT64_C(0x0706050403020100),
|
||||||
U64_LITERAL(0x0f0e0d0c0b0a0908) };
|
UINT64_C(0x0f0e0d0c0b0a0908) };
|
||||||
uint8_t input[64];
|
uint8_t input[64];
|
||||||
int i, j;
|
int i, j;
|
||||||
|
|
||||||
|
@ -2102,7 +2102,7 @@ test_vrs_for_v3ns(vote_routerstatus_t *vrs, int voter, time_t now)
|
|||||||
tt_int_op(rs->or_port,OP_EQ, 443);
|
tt_int_op(rs->or_port,OP_EQ, 443);
|
||||||
tt_int_op(rs->dir_port,OP_EQ, 8000);
|
tt_int_op(rs->dir_port,OP_EQ, 8000);
|
||||||
/* no flags except "running" (16) and "v2dir" (64) and "valid" (128) */
|
/* no flags except "running" (16) and "v2dir" (64) and "valid" (128) */
|
||||||
tt_u64_op(vrs->flags, OP_EQ, U64_LITERAL(0xd0));
|
tt_u64_op(vrs->flags, OP_EQ, UINT64_C(0xd0));
|
||||||
} else if (tor_memeq(rs->identity_digest,
|
} else if (tor_memeq(rs->identity_digest,
|
||||||
"\x5\x5\x5\x5\x5\x5\x5\x5\x5\x5\x5\x5\x5\x5\x5\x5"
|
"\x5\x5\x5\x5\x5\x5\x5\x5\x5\x5\x5\x5\x5\x5\x5\x5"
|
||||||
"\x5\x5\x5\x5",
|
"\x5\x5\x5\x5",
|
||||||
@ -2128,10 +2128,10 @@ test_vrs_for_v3ns(vote_routerstatus_t *vrs, int voter, time_t now)
|
|||||||
tt_int_op(rs->ipv6_orport,OP_EQ, 4711);
|
tt_int_op(rs->ipv6_orport,OP_EQ, 4711);
|
||||||
if (voter == 1) {
|
if (voter == 1) {
|
||||||
/* all except "authority" (1) */
|
/* all except "authority" (1) */
|
||||||
tt_u64_op(vrs->flags, OP_EQ, U64_LITERAL(254));
|
tt_u64_op(vrs->flags, OP_EQ, UINT64_C(254));
|
||||||
} else {
|
} else {
|
||||||
/* 1023 - authority(1) - madeofcheese(16) - madeoftin(32) */
|
/* 1023 - authority(1) - madeofcheese(16) - madeoftin(32) */
|
||||||
tt_u64_op(vrs->flags, OP_EQ, U64_LITERAL(974));
|
tt_u64_op(vrs->flags, OP_EQ, UINT64_C(974));
|
||||||
}
|
}
|
||||||
} else if (tor_memeq(rs->identity_digest,
|
} else if (tor_memeq(rs->identity_digest,
|
||||||
"\x33\x33\x33\x33\x33\x33\x33\x33\x33\x33"
|
"\x33\x33\x33\x33\x33\x33\x33\x33\x33\x33"
|
||||||
@ -2941,8 +2941,8 @@ test_dir_scale_bw(void *testdata)
|
|||||||
for (i=0; i<8; ++i) {
|
for (i=0; i<8; ++i) {
|
||||||
total += vals_u64[i];
|
total += vals_u64[i];
|
||||||
}
|
}
|
||||||
tt_assert(total >= (U64_LITERAL(1)<<60));
|
tt_assert(total >= (UINT64_C(1)<<60));
|
||||||
tt_assert(total <= (U64_LITERAL(1)<<62));
|
tt_assert(total <= (UINT64_C(1)<<62));
|
||||||
|
|
||||||
for (i=0; i<8; ++i) {
|
for (i=0; i<8; ++i) {
|
||||||
/* vals[2].u64 is the scaled value of 1.0 */
|
/* vals[2].u64 is the scaled value of 1.0 */
|
||||||
|
@ -21,7 +21,7 @@ test_mainloop_update_time_normal(void *arg)
|
|||||||
|
|
||||||
monotime_enable_test_mocking();
|
monotime_enable_test_mocking();
|
||||||
/* This is arbitrary */
|
/* This is arbitrary */
|
||||||
uint64_t mt_now = U64_LITERAL(7493289274986);
|
uint64_t mt_now = UINT64_C(7493289274986);
|
||||||
/* This time is in the past as of when this test was written. */
|
/* This time is in the past as of when this test was written. */
|
||||||
time_t now = 1525272090;
|
time_t now = 1525272090;
|
||||||
monotime_coarse_set_mock_time_nsec(mt_now);
|
monotime_coarse_set_mock_time_nsec(mt_now);
|
||||||
@ -63,7 +63,7 @@ test_mainloop_update_time_jumps(void *arg)
|
|||||||
|
|
||||||
monotime_enable_test_mocking();
|
monotime_enable_test_mocking();
|
||||||
/* This is arbitrary */
|
/* This is arbitrary */
|
||||||
uint64_t mt_now = U64_LITERAL(7493289274986);
|
uint64_t mt_now = UINT64_C(7493289274986);
|
||||||
/* This time is in the past as of when this test was written. */
|
/* This time is in the past as of when this test was written. */
|
||||||
time_t now = 220897152;
|
time_t now = 220897152;
|
||||||
monotime_coarse_set_mock_time_nsec(mt_now);
|
monotime_coarse_set_mock_time_nsec(mt_now);
|
||||||
|
@ -275,7 +275,7 @@ test_options_validate(void *arg)
|
|||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
#define MEGABYTEIFY(mb) (U64_LITERAL(mb) << 20)
|
#define MEGABYTEIFY(mb) (UINT64_C(mb) << 20)
|
||||||
static void
|
static void
|
||||||
test_have_enough_mem_for_dircache(void *arg)
|
test_have_enough_mem_for_dircache(void *arg)
|
||||||
{
|
{
|
||||||
|
@ -230,7 +230,7 @@ NS(test_main)(void *arg)
|
|||||||
tor_free(actual);
|
tor_free(actual);
|
||||||
|
|
||||||
expected = "10.00 GB";
|
expected = "10.00 GB";
|
||||||
actual = bytes_to_usage((U64_LITERAL(1) << 30) * 10L);
|
actual = bytes_to_usage((UINT64_C(1) << 30) * 10L);
|
||||||
tt_str_op(actual, OP_EQ, expected);
|
tt_str_op(actual, OP_EQ, expected);
|
||||||
tor_free(actual);
|
tor_free(actual);
|
||||||
|
|
||||||
|
@ -1919,7 +1919,7 @@ test_util_strmisc(void *arg)
|
|||||||
tt_int_op(0,OP_EQ, buf[6]);
|
tt_int_op(0,OP_EQ, buf[6]);
|
||||||
/* uint64 */
|
/* uint64 */
|
||||||
tor_snprintf(buf, sizeof(buf), "x!"U64_FORMAT"!x",
|
tor_snprintf(buf, sizeof(buf), "x!"U64_FORMAT"!x",
|
||||||
U64_PRINTF_ARG(U64_LITERAL(12345678901)));
|
U64_PRINTF_ARG(UINT64_C(12345678901)));
|
||||||
tt_str_op("x!12345678901!x",OP_EQ, buf);
|
tt_str_op("x!12345678901!x",OP_EQ, buf);
|
||||||
|
|
||||||
/* Test str{,case}cmpstart */
|
/* Test str{,case}cmpstart */
|
||||||
@ -2166,17 +2166,17 @@ test_util_parse_integer(void *arg)
|
|||||||
tt_int_op(0,OP_EQ, i);
|
tt_int_op(0,OP_EQ, i);
|
||||||
|
|
||||||
/* Test parse_uint64 */
|
/* Test parse_uint64 */
|
||||||
tt_assert(U64_LITERAL(10) == tor_parse_uint64("10 x",10,0,100, &i, &cp));
|
tt_assert(UINT64_C(10) == tor_parse_uint64("10 x",10,0,100, &i, &cp));
|
||||||
tt_int_op(1,OP_EQ, i);
|
tt_int_op(1,OP_EQ, i);
|
||||||
tt_str_op(cp,OP_EQ, " x");
|
tt_str_op(cp,OP_EQ, " x");
|
||||||
tt_assert(U64_LITERAL(12345678901) ==
|
tt_assert(UINT64_C(12345678901) ==
|
||||||
tor_parse_uint64("12345678901",10,0,UINT64_MAX, &i, &cp));
|
tor_parse_uint64("12345678901",10,0,UINT64_MAX, &i, &cp));
|
||||||
tt_int_op(1,OP_EQ, i);
|
tt_int_op(1,OP_EQ, i);
|
||||||
tt_str_op(cp,OP_EQ, "");
|
tt_str_op(cp,OP_EQ, "");
|
||||||
tt_assert(U64_LITERAL(0) ==
|
tt_assert(UINT64_C(0) ==
|
||||||
tor_parse_uint64("12345678901",10,500,INT32_MAX, &i, &cp));
|
tor_parse_uint64("12345678901",10,500,INT32_MAX, &i, &cp));
|
||||||
tt_int_op(0,OP_EQ, i);
|
tt_int_op(0,OP_EQ, i);
|
||||||
tt_assert(U64_LITERAL(0) ==
|
tt_assert(UINT64_C(0) ==
|
||||||
tor_parse_uint64("123",-1,0,INT32_MAX, &i, &cp));
|
tor_parse_uint64("123",-1,0,INT32_MAX, &i, &cp));
|
||||||
tt_int_op(0,OP_EQ, i);
|
tt_int_op(0,OP_EQ, i);
|
||||||
|
|
||||||
@ -2217,7 +2217,7 @@ test_util_parse_integer(void *arg)
|
|||||||
tt_int_op(i,OP_EQ, 0);
|
tt_int_op(i,OP_EQ, 0);
|
||||||
tt_int_op(0UL,OP_EQ, tor_parse_ulong(TOOBIG, 10, 0, ULONG_MAX, &i, NULL));
|
tt_int_op(0UL,OP_EQ, tor_parse_ulong(TOOBIG, 10, 0, ULONG_MAX, &i, NULL));
|
||||||
tt_int_op(i,OP_EQ, 0);
|
tt_int_op(i,OP_EQ, 0);
|
||||||
tt_u64_op(U64_LITERAL(0), OP_EQ, tor_parse_uint64(TOOBIG, 10,
|
tt_u64_op(UINT64_C(0), OP_EQ, tor_parse_uint64(TOOBIG, 10,
|
||||||
0, UINT64_MAX, &i, NULL));
|
0, UINT64_MAX, &i, NULL));
|
||||||
tt_int_op(i,OP_EQ, 0);
|
tt_int_op(i,OP_EQ, 0);
|
||||||
}
|
}
|
||||||
@ -2240,17 +2240,17 @@ test_util_pow2(void *arg)
|
|||||||
tt_int_op(tor_log2(3),OP_EQ, 1);
|
tt_int_op(tor_log2(3),OP_EQ, 1);
|
||||||
tt_int_op(tor_log2(4),OP_EQ, 2);
|
tt_int_op(tor_log2(4),OP_EQ, 2);
|
||||||
tt_int_op(tor_log2(5),OP_EQ, 2);
|
tt_int_op(tor_log2(5),OP_EQ, 2);
|
||||||
tt_int_op(tor_log2(U64_LITERAL(40000000000000000)),OP_EQ, 55);
|
tt_int_op(tor_log2(UINT64_C(40000000000000000)),OP_EQ, 55);
|
||||||
tt_int_op(tor_log2(UINT64_MAX),OP_EQ, 63);
|
tt_int_op(tor_log2(UINT64_MAX),OP_EQ, 63);
|
||||||
|
|
||||||
/* Test round_to_power_of_2 */
|
/* Test round_to_power_of_2 */
|
||||||
tt_u64_op(round_to_power_of_2(120), OP_EQ, 128);
|
tt_u64_op(round_to_power_of_2(120), OP_EQ, 128);
|
||||||
tt_u64_op(round_to_power_of_2(128), OP_EQ, 128);
|
tt_u64_op(round_to_power_of_2(128), OP_EQ, 128);
|
||||||
tt_u64_op(round_to_power_of_2(130), OP_EQ, 128);
|
tt_u64_op(round_to_power_of_2(130), OP_EQ, 128);
|
||||||
tt_u64_op(round_to_power_of_2(U64_LITERAL(40000000000000000)), OP_EQ,
|
tt_u64_op(round_to_power_of_2(UINT64_C(40000000000000000)), OP_EQ,
|
||||||
U64_LITERAL(1)<<55);
|
UINT64_C(1)<<55);
|
||||||
tt_u64_op(round_to_power_of_2(U64_LITERAL(0xffffffffffffffff)), OP_EQ,
|
tt_u64_op(round_to_power_of_2(UINT64_C(0xffffffffffffffff)), OP_EQ,
|
||||||
U64_LITERAL(1)<<63);
|
UINT64_C(1)<<63);
|
||||||
tt_u64_op(round_to_power_of_2(0), OP_EQ, 1);
|
tt_u64_op(round_to_power_of_2(0), OP_EQ, 1);
|
||||||
tt_u64_op(round_to_power_of_2(1), OP_EQ, 1);
|
tt_u64_op(round_to_power_of_2(1), OP_EQ, 1);
|
||||||
tt_u64_op(round_to_power_of_2(2), OP_EQ, 2);
|
tt_u64_op(round_to_power_of_2(2), OP_EQ, 2);
|
||||||
@ -5565,7 +5565,7 @@ test_util_max_mem(void *arg)
|
|||||||
} else {
|
} else {
|
||||||
/* You do not have a petabyte. */
|
/* You do not have a petabyte. */
|
||||||
#if SIZEOF_SIZE_T >= 8
|
#if SIZEOF_SIZE_T >= 8
|
||||||
tt_u64_op(memory1, OP_LT, (U64_LITERAL(1)<<50));
|
tt_u64_op(memory1, OP_LT, (UINT64_C(1)<<50));
|
||||||
#endif
|
#endif
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -19,7 +19,7 @@ test_util_format_unaligned_accessors(void *ignored)
|
|||||||
char buf[9] = "onionsoup"; // 6f6e696f6e736f7570
|
char buf[9] = "onionsoup"; // 6f6e696f6e736f7570
|
||||||
|
|
||||||
tt_u64_op(get_uint64(buf+1), OP_EQ,
|
tt_u64_op(get_uint64(buf+1), OP_EQ,
|
||||||
tor_htonll(U64_LITERAL(0x6e696f6e736f7570)));
|
tor_htonll(UINT64_C(0x6e696f6e736f7570)));
|
||||||
tt_uint_op(get_uint32(buf+1), OP_EQ, htonl(0x6e696f6e));
|
tt_uint_op(get_uint32(buf+1), OP_EQ, htonl(0x6e696f6e));
|
||||||
tt_uint_op(get_uint16(buf+1), OP_EQ, htons(0x6e69));
|
tt_uint_op(get_uint16(buf+1), OP_EQ, htons(0x6e69));
|
||||||
tt_uint_op(get_uint8(buf+1), OP_EQ, 0x6e);
|
tt_uint_op(get_uint8(buf+1), OP_EQ, 0x6e);
|
||||||
@ -33,7 +33,7 @@ test_util_format_unaligned_accessors(void *ignored)
|
|||||||
set_uint32(buf+1, htonl(0x78696465));
|
set_uint32(buf+1, htonl(0x78696465));
|
||||||
tt_mem_op(buf, OP_EQ, "oxidestop", 9);
|
tt_mem_op(buf, OP_EQ, "oxidestop", 9);
|
||||||
|
|
||||||
set_uint64(buf+1, tor_htonll(U64_LITERAL(0x6266757363617465)));
|
set_uint64(buf+1, tor_htonll(UINT64_C(0x6266757363617465)));
|
||||||
tt_mem_op(buf, OP_EQ, "obfuscate", 9);
|
tt_mem_op(buf, OP_EQ, "obfuscate", 9);
|
||||||
done:
|
done:
|
||||||
;
|
;
|
||||||
|
Loading…
Reference in New Issue
Block a user