check_stack.c 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244
  1. /*
  2. ============================================================================
  3. Name : opcuaServer.c
  4. Author :
  5. Version :
  6. Copyright : Your copyright notice
  7. Description :
  8. ============================================================================
  9. */
  10. #include <stdio.h>
  11. #include <stdlib.h>
  12. #include "../src/opcua_transportLayer.h"
  13. #include "../src/opcua_binaryEncDec.h"
  14. #include "../src/opcua_encodingLayer.h"
  15. #include "../src/opcua_advancedDatatypes.h"
  16. #include "check.h"
  17. START_TEST(test_getPacketType_validParameter)
  18. {
  19. char buf[] = {'C','L','O'};
  20. AD_RawMessage rawMessage;
  21. rawMessage.message = buf;
  22. rawMessage.length = 3;
  23. ck_assert_int_eq(TL_getPacketType(&rawMessage),packetType_CLO);
  24. }
  25. END_TEST
  26. /*
  27. START_TEST(decodeRequestHeader_test_validParameter)
  28. {
  29. char testMessage = {0x00,0x00,0x72,0xf1,0xdc,0xc9,0x87,0x0b,
  30. 0xcf,0x01,0x00,0x00,0x00,0x00,0x00,0x00,
  31. 0x00,0x00,0xff,0xff,0xff,0xff,0x00,0x00,
  32. 0x00,0x00,0x00,0x00,0x00};
  33. AD_RawMessage rawMessage;
  34. rawMessage.message = &testMessage;
  35. rawMessage.length = 29;
  36. Int32 position = 0;
  37. T_RequestHeader requestHeader;
  38. decodeRequestHeader(rawMessage,&position,&requestHeader);
  39. ck_assert_int_eq(requestHeader.authenticationToken.EncodingByte,0);
  40. ck_assert_int_eq(requestHeader.returnDiagnostics,0);
  41. ck_assert_int_eq(requestHeader.authenticationToken.EncodingByte,0);
  42. }
  43. END_TEST
  44. */
  45. START_TEST(encodeByte_test)
  46. {
  47. AD_RawMessage rawMessage;
  48. Int32 position = 0;
  49. //EncodeByte
  50. char *mem = malloc(sizeof(Byte));
  51. rawMessage.message = mem;
  52. Byte testByte = 0x08;
  53. rawMessage.length = 1;
  54. position = 0;
  55. encodeByte(testByte, &position, &rawMessage);
  56. ck_assert_int_eq(rawMessage.message[0], 0x08);
  57. ck_assert_int_eq(rawMessage.length, 1);
  58. ck_assert_int_eq(position, 1);
  59. free(mem);
  60. }
  61. END_TEST
  62. START_TEST(decodeUInt16_test)
  63. {
  64. AD_RawMessage rawMessage;
  65. Int32 position = 0;
  66. //EncodeUInt16
  67. char mem[2] = {0x01,0x00};
  68. rawMessage.message = mem;
  69. rawMessage.length = 2;
  70. //encodeUInt16(testUInt16, &position, &rawMessage);
  71. Int32 p = 0;
  72. UInt16 val = decodeUInt16(rawMessage.message,&p);
  73. ck_assert_int_eq(val,1);
  74. //ck_assert_int_eq(p, 2);
  75. //ck_assert_int_eq(rawMessage.message[0], 0xAB);
  76. }
  77. END_TEST
  78. START_TEST(encodeUInt16_test)
  79. {
  80. AD_RawMessage rawMessage;
  81. Int32 position = 0;
  82. //EncodeUInt16
  83. char *mem = malloc(sizeof(UInt16));
  84. rawMessage.message = mem;
  85. UInt16 testUInt16 = 1;
  86. rawMessage.length = 2;
  87. position = 0;
  88. encodeUInt16(testUInt16, &position, &rawMessage);
  89. //encodeUInt16(testUInt16, &position, &rawMessage);
  90. ck_assert_int_eq(position, 2);
  91. Int32 p = 0;
  92. Int16 val = decodeUInt16(rawMessage.message,&p);
  93. ck_assert_int_eq(val,testUInt16);
  94. //ck_assert_int_eq(rawMessage.message[0], 0xAB);
  95. }
  96. END_TEST
  97. START_TEST(diagnosticInfo_calcSize_test)
  98. {
  99. Int32 valreal = 0;
  100. Int32 valcalc = 0;
  101. UA_DiagnosticInfo diagnosticInfo;
  102. diagnosticInfo.EncodingMask = 0x01 | 0x02 | 0x04 | 0x08 | 0x10;
  103. diagnosticInfo.SymbolicId = 30;
  104. diagnosticInfo.NamespaceUri = 25;
  105. diagnosticInfo.LocalizedText = 22;
  106. diagnosticInfo.AdditionalInfo.Data = "OPCUA";
  107. diagnosticInfo.AdditionalInfo.Length = 5;
  108. valcalc = diagnosticInfo_calcSize(&diagnosticInfo);
  109. valreal = 23;
  110. ck_assert_int_eq(valcalc,valreal);
  111. }
  112. END_TEST
  113. Suite* TL_testSuite_getPacketType(void)
  114. {
  115. Suite *s = suite_create("getPacketType");
  116. TCase *tc_core = tcase_create("Core");
  117. tcase_add_test(tc_core,test_getPacketType_validParameter);
  118. suite_add_tcase(s,tc_core);
  119. return s;
  120. }
  121. Suite* TL_testSuite_decodeUInt16(void)
  122. {
  123. Suite *s = suite_create("decodeUInt16_test");
  124. TCase *tc_core = tcase_create("Core");
  125. tcase_add_test(tc_core, decodeUInt16_test);
  126. suite_add_tcase(s,tc_core);
  127. return s;
  128. }
  129. Suite* TL_testSuite_encodeUInt16(void)
  130. {
  131. Suite *s = suite_create("encodeUInt16_test");
  132. TCase *tc_core = tcase_create("Core");
  133. tcase_add_test(tc_core, encodeUInt16_test);
  134. suite_add_tcase(s,tc_core);
  135. return s;
  136. }
  137. Suite* TL_testSuite_encodeByte(void)
  138. {
  139. Suite *s = suite_create("encodeByte_test");
  140. TCase *tc_core = tcase_create("Core");
  141. tcase_add_test(tc_core, encodeByte_test);
  142. suite_add_tcase(s,tc_core);
  143. return s;
  144. }
  145. /*
  146. Suite* TL_<TESTSUITENAME>(void)
  147. {
  148. Suite *s = suite_create("<TESTSUITENAME>");
  149. TCase *tc_core = tcase_create("Core");
  150. tcase_add_test(tc_core,<TEST_NAME>);
  151. suite_add_tcase(s,tc_core);
  152. return s;
  153. }
  154. */
  155. Suite* TL_testSuite_diagnosticInfo_calcSize()
  156. {
  157. Suite *s = suite_create("diagnosticInfo_calcSize");
  158. TCase *tc_core = tcase_create("Core");
  159. tcase_add_test(tc_core, diagnosticInfo_calcSize_test);
  160. suite_add_tcase(s,tc_core);
  161. return s;
  162. }
  163. int main (void)
  164. {
  165. int number_failed = 0;
  166. Suite *s = TL_testSuite_getPacketType();
  167. SRunner *sr = srunner_create(s);
  168. srunner_run_all(sr,CK_NORMAL);
  169. number_failed = srunner_ntests_failed(sr);
  170. srunner_free(sr);
  171. s = TL_testSuite_decodeUInt16();
  172. sr = srunner_create(s);
  173. srunner_run_all(sr,CK_NORMAL);
  174. number_failed += srunner_ntests_failed(sr);
  175. srunner_free(sr);
  176. s = TL_testSuite_encodeUInt16();
  177. sr = srunner_create(s);
  178. srunner_run_all(sr,CK_NORMAL);
  179. number_failed += srunner_ntests_failed(sr);
  180. srunner_free(sr);
  181. s = TL_testSuite_encodeByte();
  182. sr = srunner_create(s);
  183. srunner_run_all(sr,CK_NORMAL);
  184. number_failed += srunner_ntests_failed(sr);
  185. srunner_free(sr);
  186. s = TL_testSuite_diagnosticInfo_calcSize();
  187. sr = srunner_create(s);
  188. srunner_run_all(sr,CK_NORMAL);
  189. number_failed += srunner_ntests_failed(sr);
  190. srunner_free(sr);
  191. /* <TESTSUITE_TEMPLATE>
  192. s = <TESTSUITENAME>;
  193. sr = srunner_create(s);
  194. srunner_run_all(sr,CK_NORMAL);
  195. number_failed += srunner_ntests_failed(sr);
  196. srunner_free(sr);
  197. */
  198. return (number_failed == 0) ? EXIT_SUCCESS : EXIT_FAILURE;
  199. }