zerocopy/macros.rs
1// Copyright 2024 The Fuchsia Authors
2//
3// Licensed under the 2-Clause BSD License <LICENSE-BSD or
4// https://opensource.org/license/bsd-2-clause>, Apache License, Version 2.0
5// <LICENSE-APACHE or https://www.apache.org/licenses/LICENSE-2.0>, or the MIT
6// license <LICENSE-MIT or https://opensource.org/licenses/MIT>, at your option.
7// This file may not be copied, modified, or distributed except according to
8// those terms.
9
10/// Safely transmutes a value of one type to a value of another type of the same
11/// size.
12///
13/// This macro behaves like an invocation of this function:
14///
15/// ```ignore
16/// const fn transmute<Src, Dst>(src: Src) -> Dst
17/// where
18/// Src: IntoBytes,
19/// Dst: FromBytes,
20/// size_of::<Src>() == size_of::<Dst>(),
21/// {
22/// # /*
23/// ...
24/// # */
25/// }
26/// ```
27///
28/// However, unlike a function, this macro can only be invoked when the types of
29/// `Src` and `Dst` are completely concrete. The types `Src` and `Dst` are
30/// inferred from the calling context; they cannot be explicitly specified in
31/// the macro invocation.
32///
33/// Note that the `Src` produced by the expression `$e` will *not* be dropped.
34/// Semantically, its bits will be copied into a new value of type `Dst`, the
35/// original `Src` will be forgotten, and the value of type `Dst` will be
36/// returned.
37///
38/// # Examples
39///
40/// ```
41/// # use zerocopy::transmute;
42/// let one_dimensional: [u8; 8] = [0, 1, 2, 3, 4, 5, 6, 7];
43///
44/// let two_dimensional: [[u8; 4]; 2] = transmute!(one_dimensional);
45///
46/// assert_eq!(two_dimensional, [[0, 1, 2, 3], [4, 5, 6, 7]]);
47/// ```
48///
49/// # Use in `const` contexts
50///
51/// This macro can be invoked in `const` contexts.
52#[macro_export]
53macro_rules! transmute {
54 ($e:expr) => {{
55 // NOTE: This must be a macro (rather than a function with trait bounds)
56 // because there's no way, in a generic context, to enforce that two
57 // types have the same size. `core::mem::transmute` uses compiler magic
58 // to enforce this so long as the types are concrete.
59
60 let e = $e;
61 if false {
62 // This branch, though never taken, ensures that the type of `e` is
63 // `IntoBytes` and that the type of this macro invocation expression
64 // is `FromBytes`.
65
66 struct AssertIsIntoBytes<T: $crate::IntoBytes>(T);
67 let _ = AssertIsIntoBytes(e);
68
69 struct AssertIsFromBytes<U: $crate::FromBytes>(U);
70 #[allow(unused, unreachable_code)]
71 let u = AssertIsFromBytes(loop {});
72 u.0
73 } else {
74 // SAFETY: `core::mem::transmute` ensures that the type of `e` and
75 // the type of this macro invocation expression have the same size.
76 // We know this transmute is safe thanks to the `IntoBytes` and
77 // `FromBytes` bounds enforced by the `false` branch.
78 //
79 // We use this reexport of `core::mem::transmute` because we know it
80 // will always be available for crates which are using the 2015
81 // edition of Rust. By contrast, if we were to use
82 // `std::mem::transmute`, this macro would not work for such crates
83 // in `no_std` contexts, and if we were to use
84 // `core::mem::transmute`, this macro would not work in `std`
85 // contexts in which `core` was not manually imported. This is not a
86 // problem for 2018 edition crates.
87 let u = unsafe {
88 // Clippy: We can't annotate the types; this macro is designed
89 // to infer the types from the calling context.
90 #[allow(clippy::missing_transmute_annotations)]
91 $crate::util::macro_util::core_reexport::mem::transmute(e)
92 };
93 $crate::util::macro_util::must_use(u)
94 }
95 }}
96}
97
98/// Safely transmutes a mutable or immutable reference of one type to an
99/// immutable reference of another type of the same size and compatible
100/// alignment.
101///
102/// This macro behaves like an invocation of this function:
103///
104/// ```ignore
105/// const fn transmute_ref<'src, 'dst, Src, Dst>(src: &'src Src) -> &'dst Dst
106/// where
107/// 'src: 'dst,
108/// Src: IntoBytes + Immutable,
109/// Dst: FromBytes + Immutable,
110/// size_of::<Src>() == size_of::<Dst>(),
111/// align_of::<Src>() >= align_of::<Dst>(),
112/// {
113/// # /*
114/// ...
115/// # */
116/// }
117/// ```
118///
119/// However, unlike a function, this macro can only be invoked when the types of
120/// `Src` and `Dst` are completely concrete. The types `Src` and `Dst` are
121/// inferred from the calling context; they cannot be explicitly specified in
122/// the macro invocation.
123///
124/// # Examples
125///
126/// ```
127/// # use zerocopy::transmute_ref;
128/// let one_dimensional: [u8; 8] = [0, 1, 2, 3, 4, 5, 6, 7];
129///
130/// let two_dimensional: &[[u8; 4]; 2] = transmute_ref!(&one_dimensional);
131///
132/// assert_eq!(two_dimensional, &[[0, 1, 2, 3], [4, 5, 6, 7]]);
133/// ```
134///
135/// # Use in `const` contexts
136///
137/// This macro can be invoked in `const` contexts.
138///
139/// # Alignment increase error message
140///
141/// Because of limitations on macros, the error message generated when
142/// `transmute_ref!` is used to transmute from a type of lower alignment to a
143/// type of higher alignment is somewhat confusing. For example, the following
144/// code:
145///
146/// ```compile_fail
147/// const INCREASE_ALIGNMENT: &u16 = zerocopy::transmute_ref!(&[0u8; 2]);
148/// ```
149///
150/// ...generates the following error:
151///
152/// ```text
153/// error[E0512]: cannot transmute between types of different sizes, or dependently-sized types
154/// --> src/lib.rs:1524:34
155/// |
156/// 5 | const INCREASE_ALIGNMENT: &u16 = zerocopy::transmute_ref!(&[0u8; 2]);
157/// | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
158/// |
159/// = note: source type: `AlignOf<[u8; 2]>` (8 bits)
160/// = note: target type: `MaxAlignsOf<[u8; 2], u16>` (16 bits)
161/// = note: this error originates in the macro `$crate::assert_align_gt_eq` which comes from the expansion of the macro `transmute_ref` (in Nightly builds, run with -Z macro-backtrace for more info)
162/// ```
163///
164/// This is saying that `max(align_of::<T>(), align_of::<U>()) !=
165/// align_of::<T>()`, which is equivalent to `align_of::<T>() <
166/// align_of::<U>()`.
167#[macro_export]
168macro_rules! transmute_ref {
169 ($e:expr) => {{
170 // NOTE: This must be a macro (rather than a function with trait bounds)
171 // because there's no way, in a generic context, to enforce that two
172 // types have the same size or alignment.
173
174 // Ensure that the source type is a reference or a mutable reference
175 // (note that mutable references are implicitly reborrowed here).
176 let e: &_ = $e;
177
178 #[allow(unused, clippy::diverging_sub_expression)]
179 if false {
180 // This branch, though never taken, ensures that the type of `e` is
181 // `&T` where `T: 't + Sized + IntoBytes + Immutable`, that the type of
182 // this macro expression is `&U` where `U: 'u + Sized + FromBytes +
183 // Immutable`, and that `'t` outlives `'u`.
184
185 struct AssertSrcIsSized<'a, T: ::core::marker::Sized>(&'a T);
186 struct AssertSrcIsIntoBytes<'a, T: ?::core::marker::Sized + $crate::IntoBytes>(&'a T);
187 struct AssertSrcIsImmutable<'a, T: ?::core::marker::Sized + $crate::Immutable>(&'a T);
188 struct AssertDstIsSized<'a, T: ::core::marker::Sized>(&'a T);
189 struct AssertDstIsFromBytes<'a, U: ?::core::marker::Sized + $crate::FromBytes>(&'a U);
190 struct AssertDstIsImmutable<'a, T: ?::core::marker::Sized + $crate::Immutable>(&'a T);
191
192 let _ = AssertSrcIsSized(e);
193 let _ = AssertSrcIsIntoBytes(e);
194 let _ = AssertSrcIsImmutable(e);
195
196 if true {
197 #[allow(unused, unreachable_code)]
198 let u = AssertDstIsSized(loop {});
199 u.0
200 } else if true {
201 #[allow(unused, unreachable_code)]
202 let u = AssertDstIsFromBytes(loop {});
203 u.0
204 } else {
205 #[allow(unused, unreachable_code)]
206 let u = AssertDstIsImmutable(loop {});
207 u.0
208 }
209 } else if false {
210 // This branch, though never taken, ensures that `size_of::<T>() ==
211 // size_of::<U>()` and that that `align_of::<T>() >=
212 // align_of::<U>()`.
213
214 // `t` is inferred to have type `T` because it's assigned to `e` (of
215 // type `&T`) as `&t`.
216 let mut t = loop {};
217 e = &t;
218
219 // `u` is inferred to have type `U` because it's used as `&u` as the
220 // value returned from this branch.
221 let u;
222
223 $crate::assert_size_eq!(t, u);
224 $crate::assert_align_gt_eq!(t, u);
225
226 &u
227 } else {
228 // SAFETY: For source type `Src` and destination type `Dst`:
229 // - We know that `Src: IntoBytes + Immutable` and `Dst: FromBytes +
230 // Immutable` thanks to the uses of `AssertSrcIsIntoBytes`,
231 // `AssertSrcIsImmutable`, `AssertDstIsFromBytes`, and
232 // `AssertDstIsImmutable` above.
233 // - We know that `size_of::<Src>() == size_of::<Dst>()` thanks to
234 // the use of `assert_size_eq!` above.
235 // - We know that `align_of::<Src>() >= align_of::<Dst>()` thanks to
236 // the use of `assert_align_gt_eq!` above.
237 let u = unsafe { $crate::util::macro_util::transmute_ref(e) };
238 $crate::util::macro_util::must_use(u)
239 }
240 }}
241}
242
243/// Safely transmutes a mutable reference of one type to a mutable reference of
244/// another type of the same size and compatible alignment.
245///
246/// This macro behaves like an invocation of this function:
247///
248/// ```ignore
249/// const fn transmute_mut<'src, 'dst, Src, Dst>(src: &'src mut Src) -> &'dst mut Dst
250/// where
251/// 'src: 'dst,
252/// Src: FromBytes + IntoBytes,
253/// Dst: FromBytes + IntoBytes,
254/// size_of::<Src>() == size_of::<Dst>(),
255/// align_of::<Src>() >= align_of::<Dst>(),
256/// {
257/// # /*
258/// ...
259/// # */
260/// }
261/// ```
262///
263/// However, unlike a function, this macro can only be invoked when the types of
264/// `Src` and `Dst` are completely concrete. The types `Src` and `Dst` are
265/// inferred from the calling context; they cannot be explicitly specified in
266/// the macro invocation.
267///
268/// # Examples
269///
270/// ```
271/// # use zerocopy::transmute_mut;
272/// let mut one_dimensional: [u8; 8] = [0, 1, 2, 3, 4, 5, 6, 7];
273///
274/// let two_dimensional: &mut [[u8; 4]; 2] = transmute_mut!(&mut one_dimensional);
275///
276/// assert_eq!(two_dimensional, &[[0, 1, 2, 3], [4, 5, 6, 7]]);
277///
278/// two_dimensional.reverse();
279///
280/// assert_eq!(one_dimensional, [4, 5, 6, 7, 0, 1, 2, 3]);
281/// ```
282///
283/// # Use in `const` contexts
284///
285/// This macro can be invoked in `const` contexts.
286///
287/// # Alignment increase error message
288///
289/// Because of limitations on macros, the error message generated when
290/// `transmute_mut!` is used to transmute from a type of lower alignment to a
291/// type of higher alignment is somewhat confusing. For example, the following
292/// code:
293///
294/// ```compile_fail
295/// const INCREASE_ALIGNMENT: &mut u16 = zerocopy::transmute_mut!(&mut [0u8; 2]);
296/// ```
297///
298/// ...generates the following error:
299///
300/// ```text
301/// error[E0512]: cannot transmute between types of different sizes, or dependently-sized types
302/// --> src/lib.rs:1524:34
303/// |
304/// 5 | const INCREASE_ALIGNMENT: &mut u16 = zerocopy::transmute_mut!(&mut [0u8; 2]);
305/// | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
306/// |
307/// = note: source type: `AlignOf<[u8; 2]>` (8 bits)
308/// = note: target type: `MaxAlignsOf<[u8; 2], u16>` (16 bits)
309/// = note: this error originates in the macro `$crate::assert_align_gt_eq` which comes from the expansion of the macro `transmute_mut` (in Nightly builds, run with -Z macro-backtrace for more info)
310/// ```
311///
312/// This is saying that `max(align_of::<T>(), align_of::<U>()) !=
313/// align_of::<T>()`, which is equivalent to `align_of::<T>() <
314/// align_of::<U>()`.
315#[macro_export]
316macro_rules! transmute_mut {
317 ($e:expr) => {{
318 // NOTE: This must be a macro (rather than a function with trait bounds)
319 // because there's no way, in a generic context, to enforce that two
320 // types have the same size or alignment.
321
322 // Ensure that the source type is a mutable reference.
323 let e: &mut _ = $e;
324
325 #[allow(unused, clippy::diverging_sub_expression)]
326 if false {
327 // This branch, though never taken, ensures that the type of `e` is
328 // `&mut T` where `T: 't + Sized + FromBytes + IntoBytes` and that
329 // the type of this macro expression is `&mut U` where `U: 'u +
330 // Sized + FromBytes + IntoBytes`.
331
332 // We use immutable references here rather than mutable so that, if
333 // this macro is used in a const context (in which, as of this
334 // writing, mutable references are banned), the error message
335 // appears to originate in the user's code rather than in the
336 // internals of this macro.
337 struct AssertSrcIsSized<'a, T: ::core::marker::Sized>(&'a T);
338 struct AssertSrcIsFromBytes<'a, T: ?::core::marker::Sized + $crate::FromBytes>(&'a T);
339 struct AssertSrcIsIntoBytes<'a, T: ?::core::marker::Sized + $crate::IntoBytes>(&'a T);
340 struct AssertDstIsSized<'a, T: ::core::marker::Sized>(&'a T);
341 struct AssertDstIsFromBytes<'a, T: ?::core::marker::Sized + $crate::FromBytes>(&'a T);
342 struct AssertDstIsIntoBytes<'a, T: ?::core::marker::Sized + $crate::IntoBytes>(&'a T);
343
344 if true {
345 let _ = AssertSrcIsSized(&*e);
346 } else if true {
347 let _ = AssertSrcIsFromBytes(&*e);
348 } else {
349 let _ = AssertSrcIsIntoBytes(&*e);
350 }
351
352 if true {
353 #[allow(unused, unreachable_code)]
354 let u = AssertDstIsSized(loop {});
355 &mut *u.0
356 } else if true {
357 #[allow(unused, unreachable_code)]
358 let u = AssertDstIsFromBytes(loop {});
359 &mut *u.0
360 } else {
361 #[allow(unused, unreachable_code)]
362 let u = AssertDstIsIntoBytes(loop {});
363 &mut *u.0
364 }
365 } else if false {
366 // This branch, though never taken, ensures that `size_of::<T>() ==
367 // size_of::<U>()` and that that `align_of::<T>() >=
368 // align_of::<U>()`.
369
370 // `t` is inferred to have type `T` because it's assigned to `e` (of
371 // type `&mut T`) as `&mut t`.
372 let mut t = loop {};
373 e = &mut t;
374
375 // `u` is inferred to have type `U` because it's used as `&mut u` as
376 // the value returned from this branch.
377 let u;
378
379 $crate::assert_size_eq!(t, u);
380 $crate::assert_align_gt_eq!(t, u);
381
382 &mut u
383 } else {
384 // SAFETY: For source type `Src` and destination type `Dst`:
385 // - We know that `size_of::<Src>() == size_of::<Dst>()` thanks to
386 // the use of `assert_size_eq!` above.
387 // - We know that `align_of::<Src>() >= align_of::<Dst>()` thanks to
388 // the use of `assert_align_gt_eq!` above.
389 let u = unsafe { $crate::util::macro_util::transmute_mut(e) };
390 $crate::util::macro_util::must_use(u)
391 }
392 }}
393}
394
395/// Conditionally transmutes a value of one type to a value of another type of
396/// the same size.
397///
398/// This macro behaves like an invocation of this function:
399///
400/// ```ignore
401/// fn try_transmute<Src, Dst>(src: Src) -> Result<Dst, ValidityError<Src, Dst>>
402/// where
403/// Src: IntoBytes,
404/// Dst: TryFromBytes,
405/// size_of::<Src>() == size_of::<Dst>(),
406/// {
407/// # /*
408/// ...
409/// # */
410/// }
411/// ```
412///
413/// However, unlike a function, this macro can only be invoked when the types of
414/// `Src` and `Dst` are completely concrete. The types `Src` and `Dst` are
415/// inferred from the calling context; they cannot be explicitly specified in
416/// the macro invocation.
417///
418/// Note that the `Src` produced by the expression `$e` will *not* be dropped.
419/// Semantically, its bits will be copied into a new value of type `Dst`, the
420/// original `Src` will be forgotten, and the value of type `Dst` will be
421/// returned.
422///
423/// # Examples
424///
425/// ```
426/// # use zerocopy::*;
427/// // 0u8 → bool = false
428/// assert_eq!(try_transmute!(0u8), Ok(false));
429///
430/// // 1u8 → bool = true
431/// assert_eq!(try_transmute!(1u8), Ok(true));
432///
433/// // 2u8 → bool = error
434/// assert!(matches!(
435/// try_transmute!(2u8),
436/// Result::<bool, _>::Err(ValidityError { .. })
437/// ));
438/// ```
439#[macro_export]
440macro_rules! try_transmute {
441 ($e:expr) => {{
442 // NOTE: This must be a macro (rather than a function with trait bounds)
443 // because there's no way, in a generic context, to enforce that two
444 // types have the same size. `core::mem::transmute` uses compiler magic
445 // to enforce this so long as the types are concrete.
446
447 let e = $e;
448 if false {
449 // Check that the sizes of the source and destination types are
450 // equal.
451
452 // SAFETY: This code is never executed.
453 Ok(unsafe {
454 // Clippy: We can't annotate the types; this macro is designed
455 // to infer the types from the calling context.
456 #[allow(clippy::missing_transmute_annotations)]
457 $crate::util::macro_util::core_reexport::mem::transmute(e)
458 })
459 } else {
460 $crate::util::macro_util::try_transmute::<_, _>(e)
461 }
462 }}
463}
464
465/// Conditionally transmutes a mutable or immutable reference of one type to an
466/// immutable reference of another type of the same size and compatible
467/// alignment.
468///
469/// This macro behaves like an invocation of this function:
470///
471/// ```ignore
472/// fn try_transmute_ref<Src, Dst>(src: &Src) -> Result<&Dst, ValidityError<&Src, Dst>>
473/// where
474/// Src: IntoBytes + Immutable,
475/// Dst: TryFromBytes + Immutable,
476/// size_of::<Src>() == size_of::<Dst>(),
477/// align_of::<Src>() >= align_of::<Dst>(),
478/// {
479/// # /*
480/// ...
481/// # */
482/// }
483/// ```
484///
485/// However, unlike a function, this macro can only be invoked when the types of
486/// `Src` and `Dst` are completely concrete. The types `Src` and `Dst` are
487/// inferred from the calling context; they cannot be explicitly specified in
488/// the macro invocation.
489///
490/// # Examples
491///
492/// ```
493/// # use zerocopy::*;
494/// // 0u8 → bool = false
495/// assert_eq!(try_transmute_ref!(&0u8), Ok(&false));
496///
497/// // 1u8 → bool = true
498/// assert_eq!(try_transmute_ref!(&1u8), Ok(&true));
499///
500/// // 2u8 → bool = error
501/// assert!(matches!(
502/// try_transmute_ref!(&2u8),
503/// Result::<&bool, _>::Err(ValidityError { .. })
504/// ));
505/// ```
506///
507/// # Alignment increase error message
508///
509/// Because of limitations on macros, the error message generated when
510/// `try_transmute_ref!` is used to transmute from a type of lower alignment to
511/// a type of higher alignment is somewhat confusing. For example, the following
512/// code:
513///
514/// ```compile_fail
515/// let increase_alignment: Result<&u16, _> = zerocopy::try_transmute_ref!(&[0u8; 2]);
516/// ```
517///
518/// ...generates the following error:
519///
520/// ```text
521/// error[E0512]: cannot transmute between types of different sizes, or dependently-sized types
522/// --> example.rs:1:47
523/// |
524/// 1 | let increase_alignment: Result<&u16, _> = zerocopy::try_transmute_ref!(&[0u8; 2]);
525/// | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
526/// |
527/// = note: source type: `AlignOf<[u8; 2]>` (8 bits)
528/// = note: target type: `MaxAlignsOf<[u8; 2], u16>` (16 bits)
529/// = note: this error originates in the macro `$crate::assert_align_gt_eq` which comes from the expansion of the macro `zerocopy::try_transmute_ref` (in Nightly builds, run with -Z macro-backtrace for more info)/// ```
530/// ```
531///
532/// This is saying that `max(align_of::<T>(), align_of::<U>()) !=
533/// align_of::<T>()`, which is equivalent to `align_of::<T>() <
534/// align_of::<U>()`.
535#[macro_export]
536macro_rules! try_transmute_ref {
537 ($e:expr) => {{
538 // NOTE: This must be a macro (rather than a function with trait bounds)
539 // because there's no way, in a generic context, to enforce that two
540 // types have the same size. `core::mem::transmute` uses compiler magic
541 // to enforce this so long as the types are concrete.
542
543 // Ensure that the source type is a reference or a mutable reference
544 // (note that mutable references are implicitly reborrowed here).
545 let e: &_ = $e;
546
547 #[allow(unreachable_code, unused, clippy::diverging_sub_expression)]
548 if false {
549 // This branch, though never taken, ensures that `size_of::<T>() ==
550 // size_of::<U>()` and that that `align_of::<T>() >=
551 // align_of::<U>()`.
552
553 // `t` is inferred to have type `T` because it's assigned to `e` (of
554 // type `&T`) as `&t`.
555 let mut t = loop {};
556 e = &t;
557
558 // `u` is inferred to have type `U` because it's used as `Ok(&u)` as
559 // the value returned from this branch.
560 let u;
561
562 $crate::assert_size_eq!(t, u);
563 $crate::assert_align_gt_eq!(t, u);
564
565 Ok(&u)
566 } else {
567 $crate::util::macro_util::try_transmute_ref::<_, _>(e)
568 }
569 }}
570}
571
572/// Conditionally transmutes a mutable reference of one type to a mutable
573/// reference of another type of the same size and compatible alignment.
574///
575/// This macro behaves like an invocation of this function:
576///
577/// ```ignore
578/// fn try_transmute_mut<Src, Dst>(src: &mut Src) -> Result<&mut Dst, ValidityError<&mut Src, Dst>>
579/// where
580/// Src: FromBytes + IntoBytes,
581/// Dst: TryFromBytes + IntoBytes,
582/// size_of::<Src>() == size_of::<Dst>(),
583/// align_of::<Src>() >= align_of::<Dst>(),
584/// {
585/// # /*
586/// ...
587/// # */
588/// }
589/// ```
590///
591/// However, unlike a function, this macro can only be invoked when the types of
592/// `Src` and `Dst` are completely concrete. The types `Src` and `Dst` are
593/// inferred from the calling context; they cannot be explicitly specified in
594/// the macro invocation.
595///
596/// # Examples
597///
598/// ```
599/// # use zerocopy::*;
600/// // 0u8 → bool = false
601/// let src = &mut 0u8;
602/// assert_eq!(try_transmute_mut!(src), Ok(&mut false));
603///
604/// // 1u8 → bool = true
605/// let src = &mut 1u8;
606/// assert_eq!(try_transmute_mut!(src), Ok(&mut true));
607///
608/// // 2u8 → bool = error
609/// let src = &mut 2u8;
610/// assert!(matches!(
611/// try_transmute_mut!(src),
612/// Result::<&mut bool, _>::Err(ValidityError { .. })
613/// ));
614/// ```
615///
616/// # Alignment increase error message
617///
618/// Because of limitations on macros, the error message generated when
619/// `try_transmute_ref!` is used to transmute from a type of lower alignment to
620/// a type of higher alignment is somewhat confusing. For example, the following
621/// code:
622///
623/// ```compile_fail
624/// let src = &mut [0u8; 2];
625/// let increase_alignment: Result<&mut u16, _> = zerocopy::try_transmute_mut!(src);
626/// ```
627///
628/// ...generates the following error:
629///
630/// ```text
631/// error[E0512]: cannot transmute between types of different sizes, or dependently-sized types
632/// --> example.rs:2:51
633/// |
634/// 2 | let increase_alignment: Result<&mut u16, _> = zerocopy::try_transmute_mut!(src);
635/// | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
636/// |
637/// = note: source type: `AlignOf<[u8; 2]>` (8 bits)
638/// = note: target type: `MaxAlignsOf<[u8; 2], u16>` (16 bits)
639/// = note: this error originates in the macro `$crate::assert_align_gt_eq` which comes from the expansion of the macro `zerocopy::try_transmute_mut` (in Nightly builds, run with -Z macro-backtrace for more info)
640/// ```
641///
642/// This is saying that `max(align_of::<T>(), align_of::<U>()) !=
643/// align_of::<T>()`, which is equivalent to `align_of::<T>() <
644/// align_of::<U>()`.
645#[macro_export]
646macro_rules! try_transmute_mut {
647 ($e:expr) => {{
648 // NOTE: This must be a macro (rather than a function with trait bounds)
649 // because there's no way, in a generic context, to enforce that two
650 // types have the same size. `core::mem::transmute` uses compiler magic
651 // to enforce this so long as the types are concrete.
652
653 // Ensure that the source type is a mutable reference.
654 let e: &mut _ = $e;
655
656 #[allow(unreachable_code, unused, clippy::diverging_sub_expression)]
657 if false {
658 // This branch, though never taken, ensures that `size_of::<T>() ==
659 // size_of::<U>()` and that that `align_of::<T>() >=
660 // align_of::<U>()`.
661
662 // `t` is inferred to have type `T` because it's assigned to `e` (of
663 // type `&mut T`) as `&mut t`.
664 let mut t = loop {};
665 e = &mut t;
666
667 // `u` is inferred to have type `U` because it's used as `Ok(&mut
668 // u)` as the value returned from this branch.
669 let u;
670
671 $crate::assert_size_eq!(t, u);
672 $crate::assert_align_gt_eq!(t, u);
673
674 Ok(&mut u)
675 } else {
676 $crate::util::macro_util::try_transmute_mut::<_, _>(e)
677 }
678 }}
679}
680
681/// Includes a file and safely transmutes it to a value of an arbitrary type.
682///
683/// The file will be included as a byte array, `[u8; N]`, which will be
684/// transmuted to another type, `T`. `T` is inferred from the calling context,
685/// and must implement [`FromBytes`].
686///
687/// The file is located relative to the current file (similarly to how modules
688/// are found). The provided path is interpreted in a platform-specific way at
689/// compile time. So, for instance, an invocation with a Windows path containing
690/// backslashes `\` would not compile correctly on Unix.
691///
692/// `include_value!` is ignorant of byte order. For byte order-aware types, see
693/// the [`byteorder`] module.
694///
695/// [`FromBytes`]: crate::FromBytes
696/// [`byteorder`]: crate::byteorder
697///
698/// # Examples
699///
700/// Assume there are two files in the same directory with the following
701/// contents:
702///
703/// File `data` (no trailing newline):
704///
705/// ```text
706/// abcd
707/// ```
708///
709/// File `main.rs`:
710///
711/// ```rust
712/// use zerocopy::include_value;
713/// # macro_rules! include_value {
714/// # ($file:expr) => { zerocopy::include_value!(concat!("../testdata/include_value/", $file)) };
715/// # }
716///
717/// fn main() {
718/// let as_u32: u32 = include_value!("data");
719/// assert_eq!(as_u32, u32::from_ne_bytes([b'a', b'b', b'c', b'd']));
720/// let as_i32: i32 = include_value!("data");
721/// assert_eq!(as_i32, i32::from_ne_bytes([b'a', b'b', b'c', b'd']));
722/// }
723/// ```
724///
725/// # Use in `const` contexts
726///
727/// This macro can be invoked in `const` contexts.
728#[doc(alias("include_bytes", "include_data", "include_type"))]
729#[macro_export]
730macro_rules! include_value {
731 ($file:expr $(,)?) => {
732 $crate::transmute!(*::core::include_bytes!($file))
733 };
734}
735
736#[doc(hidden)]
737#[macro_export]
738macro_rules! cryptocorrosion_derive_traits {
739 (
740 #[repr($repr:ident)]
741 $(#[$attr:meta])*
742 $vis:vis struct $name:ident $(<$($tyvar:ident),*>)?
743 $(
744 (
745 $($tuple_field_vis:vis $tuple_field_ty:ty),*
746 );
747 )?
748
749 $(
750 {
751 $($field_vis:vis $field_name:ident: $field_ty:ty,)*
752 }
753 )?
754 ) => {
755 $crate::cryptocorrosion_derive_traits!(@assert_allowed_struct_repr #[repr($repr)]);
756
757 $(#[$attr])*
758 #[repr($repr)]
759 $vis struct $name $(<$($tyvar),*>)?
760 $(
761 (
762 $($tuple_field_vis $tuple_field_ty),*
763 );
764 )?
765
766 $(
767 {
768 $($field_vis $field_name: $field_ty,)*
769 }
770 )?
771
772 // SAFETY: See inline.
773 unsafe impl $(<$($tyvar),*>)? $crate::TryFromBytes for $name$(<$($tyvar),*>)?
774 where
775 $(
776 $($tuple_field_ty: $crate::FromBytes,)*
777 )?
778
779 $(
780 $($field_ty: $crate::FromBytes,)*
781 )?
782 {
783 fn is_bit_valid<A>(_c: $crate::Maybe<'_, Self, A>) -> bool
784 where
785 A: $crate::pointer::invariant::Reference
786 {
787 // SAFETY: This macro only accepts `#[repr(C)]` and
788 // `#[repr(transparent)]` structs, and this `impl` block
789 // requires all field types to be `FromBytes`. Thus, all
790 // initialized byte sequences constitutes valid instances of
791 // `Self`.
792 true
793 }
794
795 fn only_derive_is_allowed_to_implement_this_trait() {}
796 }
797
798 // SAFETY: This macro only accepts `#[repr(C)]` and
799 // `#[repr(transparent)]` structs, and this `impl` block requires all
800 // field types to be `FromBytes`, which is a sub-trait of `FromZeros`.
801 unsafe impl $(<$($tyvar),*>)? $crate::FromZeros for $name$(<$($tyvar),*>)?
802 where
803 $(
804 $($tuple_field_ty: $crate::FromBytes,)*
805 )?
806
807 $(
808 $($field_ty: $crate::FromBytes,)*
809 )?
810 {
811 fn only_derive_is_allowed_to_implement_this_trait() {}
812 }
813
814 // SAFETY: This macro only accepts `#[repr(C)]` and
815 // `#[repr(transparent)]` structs, and this `impl` block requires all
816 // field types to be `FromBytes`.
817 unsafe impl $(<$($tyvar),*>)? $crate::FromBytes for $name$(<$($tyvar),*>)?
818 where
819 $(
820 $($tuple_field_ty: $crate::FromBytes,)*
821 )?
822
823 $(
824 $($field_ty: $crate::FromBytes,)*
825 )?
826 {
827 fn only_derive_is_allowed_to_implement_this_trait() {}
828 }
829
830 // SAFETY: This macro only accepts `#[repr(C)]` and
831 // `#[repr(transparent)]` structs, this `impl` block requires all field
832 // types to be `IntoBytes`, and a padding check is used to ensures that
833 // there are no padding bytes.
834 unsafe impl $(<$($tyvar),*>)? $crate::IntoBytes for $name$(<$($tyvar),*>)?
835 where
836 $(
837 $($tuple_field_ty: $crate::IntoBytes,)*
838 )?
839
840 $(
841 $($field_ty: $crate::IntoBytes,)*
842 )?
843
844 (): $crate::util::macro_util::PaddingFree<
845 Self,
846 {
847 $crate::cryptocorrosion_derive_traits!(
848 @struct_padding_check #[repr($repr)]
849 $(($($tuple_field_ty),*))?
850 $({$($field_ty),*})?
851 )
852 },
853 >,
854 {
855 fn only_derive_is_allowed_to_implement_this_trait() {}
856 }
857
858 // SAFETY: This macro only accepts `#[repr(C)]` and
859 // `#[repr(transparent)]` structs, and this `impl` block requires all
860 // field types to be `Immutable`.
861 unsafe impl $(<$($tyvar),*>)? $crate::Immutable for $name$(<$($tyvar),*>)?
862 where
863 $(
864 $($tuple_field_ty: $crate::Immutable,)*
865 )?
866
867 $(
868 $($field_ty: $crate::Immutable,)*
869 )?
870 {
871 fn only_derive_is_allowed_to_implement_this_trait() {}
872 }
873 };
874 (@assert_allowed_struct_repr #[repr(transparent)]) => {};
875 (@assert_allowed_struct_repr #[repr(C)]) => {};
876 (@assert_allowed_struct_repr #[$_attr:meta]) => {
877 compile_error!("repr must be `#[repr(transparent)]` or `#[repr(C)]`");
878 };
879 (
880 @struct_padding_check #[repr(transparent)]
881 $(($($tuple_field_ty:ty),*))?
882 $({$($field_ty:ty),*})?
883 ) => {
884 // SAFETY: `#[repr(transparent)]` structs cannot have the same layout as
885 // their single non-zero-sized field, and so cannot have any padding
886 // outside of that field.
887 false
888 };
889 (
890 @struct_padding_check #[repr(C)]
891 $(($($tuple_field_ty:ty),*))?
892 $({$($field_ty:ty),*})?
893 ) => {
894 $crate::struct_has_padding!(
895 Self,
896 [
897 $($($tuple_field_ty),*)?
898 $($($field_ty),*)?
899 ]
900 )
901 };
902 (
903 #[repr(C)]
904 $(#[$attr:meta])*
905 $vis:vis union $name:ident {
906 $(
907 $field_name:ident: $field_ty:ty,
908 )*
909 }
910 ) => {
911 $(#[$attr])*
912 #[repr(C)]
913 $vis union $name {
914 $(
915 $field_name: $field_ty,
916 )*
917 }
918
919 // SAFETY: See inline.
920 unsafe impl $crate::TryFromBytes for $name
921 where
922 $(
923 $field_ty: $crate::FromBytes,
924 )*
925 {
926 fn is_bit_valid<A>(_c: $crate::Maybe<'_, Self, A>) -> bool
927 where
928 A: $crate::pointer::invariant::Reference
929 {
930 // SAFETY: This macro only accepts `#[repr(C)]` unions, and this
931 // `impl` block requires all field types to be `FromBytes`.
932 // Thus, all initialized byte sequences constitutes valid
933 // instances of `Self`.
934 true
935 }
936
937 fn only_derive_is_allowed_to_implement_this_trait() {}
938 }
939
940 // SAFETY: This macro only accepts `#[repr(C)]` unions, and this `impl`
941 // block requires all field types to be `FromBytes`, which is a
942 // sub-trait of `FromZeros`.
943 unsafe impl $crate::FromZeros for $name
944 where
945 $(
946 $field_ty: $crate::FromBytes,
947 )*
948 {
949 fn only_derive_is_allowed_to_implement_this_trait() {}
950 }
951
952 // SAFETY: This macro only accepts `#[repr(C)]` unions, and this `impl`
953 // block requires all field types to be `FromBytes`.
954 unsafe impl $crate::FromBytes for $name
955 where
956 $(
957 $field_ty: $crate::FromBytes,
958 )*
959 {
960 fn only_derive_is_allowed_to_implement_this_trait() {}
961 }
962
963 // SAFETY: This macro only accepts `#[repr(C)]` unions, this `impl`
964 // block requires all field types to be `IntoBytes`, and a padding check
965 // is used to ensures that there are no padding bytes before or after
966 // any field.
967 unsafe impl $crate::IntoBytes for $name
968 where
969 $(
970 $field_ty: $crate::IntoBytes,
971 )*
972 (): $crate::util::macro_util::PaddingFree<
973 Self,
974 {
975 $crate::union_has_padding!(
976 Self,
977 [$($field_ty),*]
978 )
979 },
980 >,
981 {
982 fn only_derive_is_allowed_to_implement_this_trait() {}
983 }
984
985 // SAFETY: This macro only accepts `#[repr(C)]` unions, and this `impl`
986 // block requires all field types to be `Immutable`.
987 unsafe impl $crate::Immutable for $name
988 where
989 $(
990 $field_ty: $crate::Immutable,
991 )*
992 {
993 fn only_derive_is_allowed_to_implement_this_trait() {}
994 }
995 };
996}
997
998#[cfg(test)]
999mod tests {
1000 use crate::util::testutil::*;
1001 use crate::*;
1002
1003 #[test]
1004 fn test_transmute() {
1005 // Test that memory is transmuted as expected.
1006 let array_of_u8s = [0u8, 1, 2, 3, 4, 5, 6, 7];
1007 let array_of_arrays = [[0, 1], [2, 3], [4, 5], [6, 7]];
1008 let x: [[u8; 2]; 4] = transmute!(array_of_u8s);
1009 assert_eq!(x, array_of_arrays);
1010 let x: [u8; 8] = transmute!(array_of_arrays);
1011 assert_eq!(x, array_of_u8s);
1012
1013 // Test that the source expression's value is forgotten rather than
1014 // dropped.
1015 #[derive(IntoBytes)]
1016 #[repr(transparent)]
1017 struct PanicOnDrop(());
1018 impl Drop for PanicOnDrop {
1019 fn drop(&mut self) {
1020 panic!("PanicOnDrop::drop");
1021 }
1022 }
1023 #[allow(clippy::let_unit_value)]
1024 let _: () = transmute!(PanicOnDrop(()));
1025
1026 // Test that `transmute!` is legal in a const context.
1027 const ARRAY_OF_U8S: [u8; 8] = [0u8, 1, 2, 3, 4, 5, 6, 7];
1028 const ARRAY_OF_ARRAYS: [[u8; 2]; 4] = [[0, 1], [2, 3], [4, 5], [6, 7]];
1029 const X: [[u8; 2]; 4] = transmute!(ARRAY_OF_U8S);
1030 assert_eq!(X, ARRAY_OF_ARRAYS);
1031
1032 // Test that `transmute!` works with `!Immutable` types.
1033 let x: usize = transmute!(UnsafeCell::new(1usize));
1034 assert_eq!(x, 1);
1035 let x: UnsafeCell<usize> = transmute!(1usize);
1036 assert_eq!(x.into_inner(), 1);
1037 let x: UnsafeCell<isize> = transmute!(UnsafeCell::new(1usize));
1038 assert_eq!(x.into_inner(), 1);
1039 }
1040
1041 #[test]
1042 fn test_transmute_ref() {
1043 // Test that memory is transmuted as expected.
1044 let array_of_u8s = [0u8, 1, 2, 3, 4, 5, 6, 7];
1045 let array_of_arrays = [[0, 1], [2, 3], [4, 5], [6, 7]];
1046 let x: &[[u8; 2]; 4] = transmute_ref!(&array_of_u8s);
1047 assert_eq!(*x, array_of_arrays);
1048 let x: &[u8; 8] = transmute_ref!(&array_of_arrays);
1049 assert_eq!(*x, array_of_u8s);
1050
1051 // Test that `transmute_ref!` is legal in a const context.
1052 const ARRAY_OF_U8S: [u8; 8] = [0u8, 1, 2, 3, 4, 5, 6, 7];
1053 const ARRAY_OF_ARRAYS: [[u8; 2]; 4] = [[0, 1], [2, 3], [4, 5], [6, 7]];
1054 #[allow(clippy::redundant_static_lifetimes)]
1055 const X: &'static [[u8; 2]; 4] = transmute_ref!(&ARRAY_OF_U8S);
1056 assert_eq!(*X, ARRAY_OF_ARRAYS);
1057
1058 // Test that it's legal to transmute a reference while shrinking the
1059 // lifetime (note that `X` has the lifetime `'static`).
1060 let x: &[u8; 8] = transmute_ref!(X);
1061 assert_eq!(*x, ARRAY_OF_U8S);
1062
1063 // Test that `transmute_ref!` supports decreasing alignment.
1064 let u = AU64(0);
1065 let array = [0, 0, 0, 0, 0, 0, 0, 0];
1066 let x: &[u8; 8] = transmute_ref!(&u);
1067 assert_eq!(*x, array);
1068
1069 // Test that a mutable reference can be turned into an immutable one.
1070 let mut x = 0u8;
1071 #[allow(clippy::useless_transmute)]
1072 let y: &u8 = transmute_ref!(&mut x);
1073 assert_eq!(*y, 0);
1074 }
1075
1076 #[test]
1077 fn test_try_transmute() {
1078 // Test that memory is transmuted with `try_transmute` as expected.
1079 let array_of_bools = [false, true, false, true, false, true, false, true];
1080 let array_of_arrays = [[0, 1], [0, 1], [0, 1], [0, 1]];
1081 let x: Result<[[u8; 2]; 4], _> = try_transmute!(array_of_bools);
1082 assert_eq!(x, Ok(array_of_arrays));
1083 let x: Result<[bool; 8], _> = try_transmute!(array_of_arrays);
1084 assert_eq!(x, Ok(array_of_bools));
1085
1086 // Test that `try_transmute!` works with `!Immutable` types.
1087 let x: Result<usize, _> = try_transmute!(UnsafeCell::new(1usize));
1088 assert_eq!(x.unwrap(), 1);
1089 let x: Result<UnsafeCell<usize>, _> = try_transmute!(1usize);
1090 assert_eq!(x.unwrap().into_inner(), 1);
1091 let x: Result<UnsafeCell<isize>, _> = try_transmute!(UnsafeCell::new(1usize));
1092 assert_eq!(x.unwrap().into_inner(), 1);
1093
1094 #[derive(FromBytes, IntoBytes, Debug, PartialEq)]
1095 #[repr(transparent)]
1096 struct PanicOnDrop<T>(T);
1097
1098 impl<T> Drop for PanicOnDrop<T> {
1099 fn drop(&mut self) {
1100 panic!("PanicOnDrop dropped");
1101 }
1102 }
1103
1104 // Since `try_transmute!` semantically moves its argument on failure,
1105 // the `PanicOnDrop` is not dropped, and thus this shouldn't panic.
1106 let x: Result<usize, _> = try_transmute!(PanicOnDrop(1usize));
1107 assert_eq!(x, Ok(1));
1108
1109 // Since `try_transmute!` semantically returns ownership of its argument
1110 // on failure, the `PanicOnDrop` is returned rather than dropped, and
1111 // thus this shouldn't panic.
1112 let y: Result<bool, _> = try_transmute!(PanicOnDrop(2u8));
1113 // We have to use `map_err` instead of comparing against
1114 // `Err(PanicOnDrop(2u8))` because the latter would create and then drop
1115 // its `PanicOnDrop` temporary, which would cause a panic.
1116 assert_eq!(y.as_ref().map_err(|p| &p.src.0), Err::<&bool, _>(&2u8));
1117 mem::forget(y);
1118 }
1119
1120 #[test]
1121 fn test_try_transmute_ref() {
1122 // Test that memory is transmuted with `try_transmute_ref` as expected.
1123 let array_of_bools = &[false, true, false, true, false, true, false, true];
1124 let array_of_arrays = &[[0, 1], [0, 1], [0, 1], [0, 1]];
1125 let x: Result<&[[u8; 2]; 4], _> = try_transmute_ref!(array_of_bools);
1126 assert_eq!(x, Ok(array_of_arrays));
1127 let x: Result<&[bool; 8], _> = try_transmute_ref!(array_of_arrays);
1128 assert_eq!(x, Ok(array_of_bools));
1129
1130 // Test that it's legal to transmute a reference while shrinking the
1131 // lifetime.
1132 {
1133 let x: Result<&[[u8; 2]; 4], _> = try_transmute_ref!(array_of_bools);
1134 assert_eq!(x, Ok(array_of_arrays));
1135 }
1136
1137 // Test that `try_transmute_ref!` supports decreasing alignment.
1138 let u = AU64(0);
1139 let array = [0u8, 0, 0, 0, 0, 0, 0, 0];
1140 let x: Result<&[u8; 8], _> = try_transmute_ref!(&u);
1141 assert_eq!(x, Ok(&array));
1142
1143 // Test that a mutable reference can be turned into an immutable one.
1144 let mut x = 0u8;
1145 #[allow(clippy::useless_transmute)]
1146 let y: Result<&u8, _> = try_transmute_ref!(&mut x);
1147 assert_eq!(y, Ok(&0));
1148 }
1149
1150 #[test]
1151 fn test_try_transmute_mut() {
1152 // Test that memory is transmuted with `try_transmute_mut` as expected.
1153 let array_of_u8s = &mut [0u8, 1, 0, 1, 0, 1, 0, 1];
1154 let array_of_arrays = &mut [[0u8, 1], [0, 1], [0, 1], [0, 1]];
1155 let x: Result<&mut [[u8; 2]; 4], _> = try_transmute_mut!(array_of_u8s);
1156 assert_eq!(x, Ok(array_of_arrays));
1157
1158 let array_of_bools = &mut [false, true, false, true, false, true, false, true];
1159 let array_of_arrays = &mut [[0u8, 1], [0, 1], [0, 1], [0, 1]];
1160 let x: Result<&mut [bool; 8], _> = try_transmute_mut!(array_of_arrays);
1161 assert_eq!(x, Ok(array_of_bools));
1162
1163 // Test that it's legal to transmute a reference while shrinking the
1164 // lifetime.
1165 let array_of_bools = &mut [false, true, false, true, false, true, false, true];
1166 let array_of_arrays = &mut [[0u8, 1], [0, 1], [0, 1], [0, 1]];
1167 {
1168 let x: Result<&mut [bool; 8], _> = try_transmute_mut!(array_of_arrays);
1169 assert_eq!(x, Ok(array_of_bools));
1170 }
1171
1172 // Test that `try_transmute_mut!` supports decreasing alignment.
1173 let u = &mut AU64(0);
1174 let array = &mut [0u8, 0, 0, 0, 0, 0, 0, 0];
1175 let x: Result<&mut [u8; 8], _> = try_transmute_mut!(u);
1176 assert_eq!(x, Ok(array));
1177
1178 // Test that a mutable reference can be turned into an immutable one.
1179 let mut x = 0u8;
1180 #[allow(clippy::useless_transmute)]
1181 let y: Result<&mut u8, _> = try_transmute_mut!(&mut x);
1182 assert_eq!(y, Ok(&mut 0));
1183 }
1184
1185 #[test]
1186 fn test_transmute_mut() {
1187 // Test that memory is transmuted as expected.
1188 let mut array_of_u8s = [0u8, 1, 2, 3, 4, 5, 6, 7];
1189 let mut array_of_arrays = [[0, 1], [2, 3], [4, 5], [6, 7]];
1190 let x: &mut [[u8; 2]; 4] = transmute_mut!(&mut array_of_u8s);
1191 assert_eq!(*x, array_of_arrays);
1192 let x: &mut [u8; 8] = transmute_mut!(&mut array_of_arrays);
1193 assert_eq!(*x, array_of_u8s);
1194
1195 {
1196 // Test that it's legal to transmute a reference while shrinking the
1197 // lifetime.
1198 let x: &mut [u8; 8] = transmute_mut!(&mut array_of_arrays);
1199 assert_eq!(*x, array_of_u8s);
1200 }
1201 // Test that `transmute_mut!` supports decreasing alignment.
1202 let mut u = AU64(0);
1203 let array = [0, 0, 0, 0, 0, 0, 0, 0];
1204 let x: &[u8; 8] = transmute_mut!(&mut u);
1205 assert_eq!(*x, array);
1206
1207 // Test that a mutable reference can be turned into an immutable one.
1208 let mut x = 0u8;
1209 #[allow(clippy::useless_transmute)]
1210 let y: &u8 = transmute_mut!(&mut x);
1211 assert_eq!(*y, 0);
1212 }
1213
1214 #[test]
1215 fn test_macros_evaluate_args_once() {
1216 let mut ctr = 0;
1217 #[allow(clippy::useless_transmute)]
1218 let _: usize = transmute!({
1219 ctr += 1;
1220 0usize
1221 });
1222 assert_eq!(ctr, 1);
1223
1224 let mut ctr = 0;
1225 let _: &usize = transmute_ref!({
1226 ctr += 1;
1227 &0usize
1228 });
1229 assert_eq!(ctr, 1);
1230
1231 let mut ctr: usize = 0;
1232 let _: &mut usize = transmute_mut!({
1233 ctr += 1;
1234 &mut ctr
1235 });
1236 assert_eq!(ctr, 1);
1237
1238 let mut ctr = 0;
1239 #[allow(clippy::useless_transmute)]
1240 let _: usize = try_transmute!({
1241 ctr += 1;
1242 0usize
1243 })
1244 .unwrap();
1245 assert_eq!(ctr, 1);
1246 }
1247
1248 #[test]
1249 fn test_include_value() {
1250 const AS_U32: u32 = include_value!("../testdata/include_value/data");
1251 assert_eq!(AS_U32, u32::from_ne_bytes([b'a', b'b', b'c', b'd']));
1252 const AS_I32: i32 = include_value!("../testdata/include_value/data");
1253 assert_eq!(AS_I32, i32::from_ne_bytes([b'a', b'b', b'c', b'd']));
1254 }
1255
1256 #[test]
1257 #[allow(non_camel_case_types, unreachable_pub, dead_code)]
1258 fn test_cryptocorrosion_derive_traits() {
1259 // Test the set of invocations added in
1260 // https://github.com/cryptocorrosion/cryptocorrosion/pull/85
1261
1262 fn assert_impls<T: FromBytes + IntoBytes + Immutable>() {}
1263
1264 cryptocorrosion_derive_traits! {
1265 #[repr(C)]
1266 #[derive(Clone, Copy)]
1267 pub union vec128_storage {
1268 d: [u32; 4],
1269 q: [u64; 2],
1270 }
1271 }
1272
1273 assert_impls::<vec128_storage>();
1274
1275 cryptocorrosion_derive_traits! {
1276 #[repr(transparent)]
1277 #[derive(Copy, Clone, Debug, PartialEq)]
1278 pub struct u32x4_generic([u32; 4]);
1279 }
1280
1281 assert_impls::<u32x4_generic>();
1282
1283 cryptocorrosion_derive_traits! {
1284 #[repr(transparent)]
1285 #[derive(Copy, Clone, Debug, PartialEq)]
1286 pub struct u64x2_generic([u64; 2]);
1287 }
1288
1289 assert_impls::<u64x2_generic>();
1290
1291 cryptocorrosion_derive_traits! {
1292 #[repr(transparent)]
1293 #[derive(Copy, Clone, Debug, PartialEq)]
1294 pub struct u128x1_generic([u128; 1]);
1295 }
1296
1297 assert_impls::<u128x1_generic>();
1298
1299 cryptocorrosion_derive_traits! {
1300 #[repr(transparent)]
1301 #[derive(Copy, Clone, Default)]
1302 #[allow(non_camel_case_types)]
1303 pub struct x2<W, G>(pub [W; 2], PhantomData<G>);
1304 }
1305
1306 enum NotZerocopy {}
1307 assert_impls::<x2<(), NotZerocopy>>();
1308
1309 cryptocorrosion_derive_traits! {
1310 #[repr(transparent)]
1311 #[derive(Copy, Clone, Default)]
1312 #[allow(non_camel_case_types)]
1313 pub struct x4<W>(pub [W; 4]);
1314 }
1315
1316 assert_impls::<x4<()>>();
1317
1318 #[cfg(feature = "simd")]
1319 #[cfg(any(target_arch = "x86", target_arch = "x86_64"))]
1320 {
1321 #[cfg(target_arch = "x86")]
1322 use core::arch::x86::{__m128i, __m256i};
1323 #[cfg(target_arch = "x86_64")]
1324 use core::arch::x86_64::{__m128i, __m256i};
1325
1326 cryptocorrosion_derive_traits! {
1327 #[repr(C)]
1328 #[derive(Copy, Clone)]
1329 pub struct X4(__m128i, __m128i, __m128i, __m128i);
1330 }
1331
1332 assert_impls::<X4>();
1333
1334 cryptocorrosion_derive_traits! {
1335 #[repr(C)]
1336 /// Generic wrapper for unparameterized storage of any of the possible impls.
1337 /// Converting into and out of this type should be essentially free, although it may be more
1338 /// aligned than a particular impl requires.
1339 #[allow(non_camel_case_types)]
1340 #[derive(Copy, Clone)]
1341 pub union vec128_storage {
1342 u32x4: [u32; 4],
1343 u64x2: [u64; 2],
1344 u128x1: [u128; 1],
1345 sse2: __m128i,
1346 }
1347 }
1348
1349 assert_impls::<vec128_storage>();
1350
1351 cryptocorrosion_derive_traits! {
1352 #[repr(transparent)]
1353 #[allow(non_camel_case_types)]
1354 #[derive(Copy, Clone)]
1355 pub struct vec<S3, S4, NI> {
1356 x: __m128i,
1357 s3: PhantomData<S3>,
1358 s4: PhantomData<S4>,
1359 ni: PhantomData<NI>,
1360 }
1361 }
1362
1363 assert_impls::<vec<NotZerocopy, NotZerocopy, NotZerocopy>>();
1364
1365 cryptocorrosion_derive_traits! {
1366 #[repr(transparent)]
1367 #[derive(Copy, Clone)]
1368 pub struct u32x4x2_avx2<NI> {
1369 x: __m256i,
1370 ni: PhantomData<NI>,
1371 }
1372 }
1373
1374 assert_impls::<u32x4x2_avx2<NotZerocopy>>();
1375 }
1376
1377 // Make sure that our derive works for `#[repr(C)]` structs even though
1378 // cryptocorrosion doesn't currently have any.
1379 cryptocorrosion_derive_traits! {
1380 #[repr(C)]
1381 #[derive(Copy, Clone, Debug, PartialEq)]
1382 pub struct ReprC(u8, u8, u16);
1383 }
1384 }
1385}