added reading and interpreting of EXI trace file

This commit is contained in:
uhi22 2022-11-09 22:05:33 +01:00
parent 19fbeec864
commit cd6654030f

View file

@ -207,17 +207,32 @@ def testDecoder(strHex, pre="DH", comment=""):
print("Decoder test for " + comment + " with data " + strHex) print("Decoder test for " + comment + " with data " + strHex)
decoded=exiDecode(strHex, pre) decoded=exiDecode(strHex, pre)
print(decoded) print(decoded)
strExpected = comment if (len(comment)>0):
if (decoded.find(strExpected)>0): strExpected = comment
print("---pass---") if (decoded.find(strExpected)>0):
else: print("---pass---")
print("---***!!!FAIL!!!***---") else:
nFail+=1 print("---***!!!FAIL!!!***---")
nFail+=1
def testReadExiFromFile():
file1 = open('results\\tmp.txt', 'r')
Lines = file1.readlines()
for myLine in Lines:
if (myLine[0:9]=="[SNIFFER]"):
posOfEqualsign = myLine.find("=")
s = myLine[posOfEqualsign+1:] # The part after the "=" contains the EXI hex data.
s = s.replace(" ", "") # Remove blanks
s = s.replace("\n", "") # Remove line feeds
#print(s)
testDecoder(s, "DD", "")
if __name__ == "__main__": if __name__ == "__main__":
nFail=0 nFail=0
print("Testing exiConnector...") print("Testing exiConnector...")
testReadExiFromFile()
exit()
#testByteArrayConversion("123456") #testByteArrayConversion("123456")
#testByteArrayConversion("1234567") #testByteArrayConversion("1234567")
#testByteArrayConversion("ABCDEF") #testByteArrayConversion("ABCDEF")