check_stack.c 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290
  1. /*
  2. ============================================================================
  3. Name : opcuaServer.c
  4. Author :
  5. Version :
  6. Copyright : Your copyright notice
  7. Description :
  8. ============================================================================
  9. */
  10. #include <stdio.h>
  11. #include <stdlib.h>
  12. #include "../src/opcua_transportLayer.h"
  13. #include "../src/opcua_binaryEncDec.h"
  14. #include "../src/opcua_encodingLayer.h"
  15. #include "../src/opcua_advancedDatatypes.h"
  16. #include "check.h"
  17. START_TEST(test_getPacketType_validParameter)
  18. {
  19. char buf[] = {'C','L','O'};
  20. AD_RawMessage rawMessage;
  21. rawMessage.message = buf;
  22. rawMessage.length = 3;
  23. ck_assert_int_eq(TL_getPacketType(&rawMessage),packetType_CLO);
  24. }
  25. END_TEST
  26. /*
  27. START_TEST(decodeRequestHeader_test_validParameter)
  28. {
  29. char testMessage = {0x00,0x00,0x72,0xf1,0xdc,0xc9,0x87,0x0b,
  30. 0xcf,0x01,0x00,0x00,0x00,0x00,0x00,0x00,
  31. 0x00,0x00,0xff,0xff,0xff,0xff,0x00,0x00,
  32. 0x00,0x00,0x00,0x00,0x00};
  33. AD_RawMessage rawMessage;
  34. rawMessage.message = &testMessage;
  35. rawMessage.length = 29;
  36. Int32 position = 0;
  37. T_RequestHeader requestHeader;
  38. decodeRequestHeader(rawMessage,&position,&requestHeader);
  39. ck_assert_int_eq(requestHeader.authenticationToken.EncodingByte,0);
  40. ck_assert_int_eq(requestHeader.returnDiagnostics,0);
  41. ck_assert_int_eq(requestHeader.authenticationToken.EncodingByte,0);
  42. }
  43. END_TEST
  44. */
  45. START_TEST(encodeByte_test)
  46. {
  47. AD_RawMessage rawMessage;
  48. Int32 position = 0;
  49. //EncodeByte
  50. char *mem = malloc(sizeof(Byte));
  51. rawMessage.message = mem;
  52. Byte testByte = 0x08;
  53. rawMessage.length = 1;
  54. position = 0;
  55. encodeByte(testByte, &position, &rawMessage);
  56. ck_assert_int_eq(rawMessage.message[0], 0x08);
  57. ck_assert_int_eq(rawMessage.length, 1);
  58. ck_assert_int_eq(position, 1);
  59. free(mem);
  60. }
  61. END_TEST
  62. START_TEST(decodeUInt16_test)
  63. {
  64. AD_RawMessage rawMessage;
  65. Int32 position = 0;
  66. //EncodeUInt16
  67. char mem[2] = {0x01,0x00};
  68. rawMessage.message = mem;
  69. rawMessage.length = 2;
  70. //encodeUInt16(testUInt16, &position, &rawMessage);
  71. Int32 p = 0;
  72. UInt16 val = decodeUInt16(rawMessage.message,&p);
  73. ck_assert_int_eq(val,1);
  74. //ck_assert_int_eq(p, 2);
  75. //ck_assert_int_eq(rawMessage.message[0], 0xAB);
  76. }
  77. END_TEST
  78. START_TEST(encodeUInt16_test)
  79. {
  80. AD_RawMessage rawMessage;
  81. Int32 position = 0;
  82. //EncodeUInt16
  83. char *mem = malloc(sizeof(UInt16));
  84. rawMessage.message = mem;
  85. UInt16 testUInt16 = 1;
  86. rawMessage.length = 2;
  87. position = 0;
  88. encodeUInt16(testUInt16, &position, &rawMessage);
  89. //encodeUInt16(testUInt16, &position, &rawMessage);
  90. ck_assert_int_eq(position, 2);
  91. Int32 p = 0;
  92. Int16 val = decodeUInt16(rawMessage.message,&p);
  93. ck_assert_int_eq(val,testUInt16);
  94. //ck_assert_int_eq(rawMessage.message[0], 0xAB);
  95. }
  96. END_TEST
  97. START_TEST(diagnosticInfo_calcSize_test)
  98. {
  99. Int32 valreal = 0;
  100. Int32 valcalc = 0;
  101. UA_DiagnosticInfo diagnosticInfo;
  102. diagnosticInfo.EncodingMask = 0x01 | 0x02 | 0x04 | 0x08 | 0x10;
  103. diagnosticInfo.SymbolicId = 30;
  104. diagnosticInfo.NamespaceUri = 25;
  105. diagnosticInfo.LocalizedText = 22;
  106. diagnosticInfo.AdditionalInfo.Data = "OPCUA";
  107. diagnosticInfo.AdditionalInfo.Length = 5;
  108. valcalc = diagnosticInfo_calcSize(&diagnosticInfo);
  109. valreal = 26;
  110. ck_assert_int_eq(valcalc,valreal);
  111. }
  112. END_TEST
  113. START_TEST(responseHeader_calcSize_test)
  114. {
  115. Int32 valreal = 0;
  116. Int32 valcalc = 0;
  117. T_ResponseHeader responseHeader;
  118. UA_DiagnosticInfo diagnosticInfo;
  119. UA_ExtensionObject extensionObject;
  120. //Should have the size of 16 Bytes
  121. responseHeader.timestamp = 150014;
  122. responseHeader.requestHandle = 514;
  123. responseHeader.serviceResult = 504;
  124. //Should have the size of 26 Bytes
  125. diagnosticInfo.EncodingMask = 0x01 | 0x02 | 0x04 | 0x08 | 0x10;
  126. diagnosticInfo.SymbolicId = 30;
  127. diagnosticInfo.NamespaceUri = 25;
  128. diagnosticInfo.LocalizedText = 22;
  129. diagnosticInfo.AdditionalInfo.Data = "OPCUA";
  130. diagnosticInfo.AdditionalInfo.Length = 5;
  131. responseHeader.serviceDiagnostics = &diagnosticInfo;
  132. //Should have the size of 4 Bytes
  133. responseHeader.noOfStringTable = 0;
  134. //Should have the size of 3 Bytes
  135. extensionObject.TypeId.EncodingByte = NIEVT_TWO_BYTE;
  136. extensionObject.TypeId.Identifier.Numeric = 0;
  137. extensionObject.Encoding = 0x00; //binaryBody = false, xmlBody = false
  138. responseHeader.additionalHeader = extensionObject;
  139. valcalc = ResponseHeader_calcSize(&responseHeader);
  140. valreal = 49;
  141. ck_assert_int_eq(valcalc,valreal);
  142. }
  143. END_TEST
  144. Suite* TL_testSuite_getPacketType(void)
  145. {
  146. Suite *s = suite_create("getPacketType");
  147. TCase *tc_core = tcase_create("Core");
  148. tcase_add_test(tc_core,test_getPacketType_validParameter);
  149. suite_add_tcase(s,tc_core);
  150. return s;
  151. }
  152. Suite* TL_testSuite_decodeUInt16(void)
  153. {
  154. Suite *s = suite_create("decodeUInt16_test");
  155. TCase *tc_core = tcase_create("Core");
  156. tcase_add_test(tc_core, decodeUInt16_test);
  157. suite_add_tcase(s,tc_core);
  158. return s;
  159. }
  160. Suite* TL_testSuite_encodeUInt16(void)
  161. {
  162. Suite *s = suite_create("encodeUInt16_test");
  163. TCase *tc_core = tcase_create("Core");
  164. tcase_add_test(tc_core, encodeUInt16_test);
  165. suite_add_tcase(s,tc_core);
  166. return s;
  167. }
  168. Suite* TL_testSuite_encodeByte(void)
  169. {
  170. Suite *s = suite_create("encodeByte_test");
  171. TCase *tc_core = tcase_create("Core");
  172. tcase_add_test(tc_core, encodeByte_test);
  173. suite_add_tcase(s,tc_core);
  174. return s;
  175. }
  176. /*
  177. Suite* TL_<TESTSUITENAME>(void)
  178. {
  179. Suite *s = suite_create("<TESTSUITENAME>");
  180. TCase *tc_core = tcase_create("Core");
  181. tcase_add_test(tc_core,<TEST_NAME>);
  182. suite_add_tcase(s,tc_core);
  183. return s;
  184. }
  185. */
  186. Suite* TL_testSuite_diagnosticInfo_calcSize()
  187. {
  188. Suite *s = suite_create("diagnosticInfo_calcSize");
  189. TCase *tc_core = tcase_create("Core");
  190. tcase_add_test(tc_core, diagnosticInfo_calcSize_test);
  191. suite_add_tcase(s,tc_core);
  192. return s;
  193. }
  194. Suite* TL_testSuite_responseHeader_calcSize()
  195. {
  196. Suite *s = suite_create("responseHeader_calcSize");
  197. TCase *tc_core = tcase_create("Core");
  198. tcase_add_test(tc_core, responseHeader_calcSize_test);
  199. suite_add_tcase(s,tc_core);
  200. return s;
  201. }
  202. int main (void)
  203. {
  204. int number_failed = 0;
  205. Suite *s = TL_testSuite_getPacketType();
  206. SRunner *sr = srunner_create(s);
  207. srunner_run_all(sr,CK_NORMAL);
  208. number_failed = srunner_ntests_failed(sr);
  209. srunner_free(sr);
  210. s = TL_testSuite_decodeUInt16();
  211. sr = srunner_create(s);
  212. srunner_run_all(sr,CK_NORMAL);
  213. number_failed += srunner_ntests_failed(sr);
  214. srunner_free(sr);
  215. s = TL_testSuite_encodeUInt16();
  216. sr = srunner_create(s);
  217. srunner_run_all(sr,CK_NORMAL);
  218. number_failed += srunner_ntests_failed(sr);
  219. srunner_free(sr);
  220. s = TL_testSuite_encodeByte();
  221. sr = srunner_create(s);
  222. srunner_run_all(sr,CK_NORMAL);
  223. number_failed += srunner_ntests_failed(sr);
  224. srunner_free(sr);
  225. s = TL_testSuite_diagnosticInfo_calcSize();
  226. sr = srunner_create(s);
  227. srunner_run_all(sr,CK_NORMAL);
  228. number_failed += srunner_ntests_failed(sr);
  229. srunner_free(sr);
  230. s = TL_testSuite_responseHeader_calcSize();
  231. sr = srunner_create(s);
  232. srunner_run_all(sr,CK_NORMAL);
  233. number_failed += srunner_ntests_failed(sr);
  234. srunner_free(sr);
  235. /* <TESTSUITE_TEMPLATE>
  236. s = <TESTSUITENAME>;
  237. sr = srunner_create(s);
  238. srunner_run_all(sr,CK_NORMAL);
  239. number_failed += srunner_ntests_failed(sr);
  240. srunner_free(sr);
  241. */
  242. return (number_failed == 0) ? EXIT_SUCCESS : EXIT_FAILURE;
  243. }