check_stack.c 25 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058
  1. /*
  2. ============================================================================
  3. Name : check_stack.c
  4. Author :
  5. Version :
  6. Copyright : Your copyright notice
  7. Description :
  8. ============================================================================
  9. */
  10. #include <stdio.h>
  11. #include <stdlib.h>
  12. #include "opcua.h"
  13. #include "opcua_transportLayer.h"
  14. #include "check.h"
  15. START_TEST(test_getPacketType_validParameter)
  16. {
  17. char buf[] = {'C','L','O'};
  18. UA_Int32 pos = 0;
  19. UA_ByteString msg;
  20. msg.data = buf;
  21. msg.length = 3;
  22. ck_assert_int_eq(TL_getPacketType(&msg, &pos),packetType_CLO);
  23. }
  24. END_TEST
  25. START_TEST(decodeByte_test)
  26. {
  27. UA_ByteString rawMessage;
  28. UA_Int32 position = 0;
  29. //EncodeByte
  30. char *mem = malloc(sizeof(UA_Byte));
  31. UA_Byte val;
  32. rawMessage.data = mem;
  33. rawMessage.length = 1;
  34. mem[0] = 0x08;
  35. position = 0;
  36. UA_Byte_decode(rawMessage.data, &position, &val);
  37. ck_assert_int_eq(val, 0x08);
  38. ck_assert_int_eq(position, 1);
  39. free(mem);
  40. }
  41. END_TEST
  42. START_TEST(encodeByte_test)
  43. {
  44. UA_ByteString rawMessage;
  45. UA_Int32 position = 0;
  46. //EncodeByte
  47. char *mem = malloc(sizeof(UA_Byte));
  48. rawMessage.data = mem;
  49. UA_Byte testByte = 0x08;
  50. rawMessage.length = 1;
  51. position = 0;
  52. UA_Byte_encode(&(testByte), &position, rawMessage.data);
  53. ck_assert_int_eq(rawMessage.data[0], 0x08);
  54. ck_assert_int_eq(rawMessage.length, 1);
  55. ck_assert_int_eq(position, 1);
  56. free(mem);
  57. }
  58. END_TEST
  59. /*
  60. START_TEST(decodeRequestHeader_test_validParameter)
  61. {
  62. char testMessage = {0x00,0x00,0x72,0xf1,0xdc,0xc9,0x87,0x0b,
  63. 0xcf,0x01,0x00,0x00,0x00,0x00,0x00,0x00,
  64. 0x00,0x00,0xff,0xff,0xff,0xff,0x00,0x00,
  65. 0x00,0x00,0x00,0x00,0x00};
  66. UA_ByteString rawMessage;
  67. rawMessage.data = &testMessage;
  68. rawMessage.length = 29;
  69. Int32 position = 0;
  70. T_RequestHeader requestHeader;
  71. decodeRequestHeader(rawMessage,&position,&requestHeader);
  72. ck_assert_int_eq(requestHeader.authenticationToken.EncodingByte,0);
  73. ck_assert_int_eq(requestHeader.returnDiagnostics,0);
  74. ck_assert_int_eq(requestHeader.authenticationToken.EncodingByte,0);
  75. }
  76. END_TEST
  77. */
  78. START_TEST(decodeInt16_test_positives)
  79. {
  80. UA_Int32 p = 0;
  81. UA_Int16 val;
  82. UA_ByteString rawMessage;
  83. char mem[] = {
  84. 0x00,0x00, // 0
  85. 0x01,0x00, // 1
  86. 0xFF,0x00, // 255
  87. 0x00,0x01, // 256
  88. };
  89. rawMessage.data = mem;
  90. rawMessage.length = sizeof(mem);
  91. ck_assert_int_eq(rawMessage.length,8);
  92. UA_Int16_decode(rawMessage.data,&p,&val);
  93. ck_assert_int_eq(val,0);
  94. UA_Int16_decode(rawMessage.data,&p,&val);
  95. ck_assert_int_eq(val,1);
  96. UA_Int16_decode(rawMessage.data,&p,&val);
  97. ck_assert_int_eq(val,255);
  98. UA_Int16_decode(rawMessage.data,&p,&val);
  99. ck_assert_int_eq(val,256);
  100. }
  101. END_TEST
  102. START_TEST(decodeInt16_test_negatives)
  103. {
  104. UA_Int32 p = 0;
  105. UA_Int16 val;
  106. UA_ByteString rawMessage;
  107. UA_Byte mem[] = {
  108. 0xFF,0xFF, // -1
  109. 0x00,0x80, // -32768
  110. };
  111. rawMessage.data = mem;
  112. rawMessage.length = sizeof(mem);
  113. ck_assert_int_eq(rawMessage.length,4);
  114. UA_Int16_decode(rawMessage.data,&p,&val);
  115. ck_assert_int_eq(val,-1);
  116. UA_Int16_decode(rawMessage.data,&p,&val);
  117. ck_assert_int_eq(val,-32768);
  118. }
  119. END_TEST
  120. START_TEST(encodeInt16_test)
  121. {
  122. UA_ByteString rawMessage;
  123. UA_Int32 position = 0;
  124. //EncodeUInt16
  125. UA_Byte *mem = malloc(sizeof(UA_UInt16));
  126. rawMessage.data = mem;
  127. UA_UInt16 testUInt16 = 1;
  128. rawMessage.length = 2;
  129. position = 0;
  130. UA_UInt16_encode(&testUInt16, &position, rawMessage.data);
  131. ck_assert_int_eq(position, 2);
  132. UA_Int32 p = 0;
  133. UA_Int16 val;
  134. UA_UInt16_decode(rawMessage.data, &p, &val);
  135. ck_assert_int_eq(val,testUInt16);
  136. //ck_assert_int_eq(rawMessage.data[0], 0xAB);
  137. free(mem);
  138. }
  139. END_TEST
  140. START_TEST(decodeUInt16_test)
  141. {
  142. UA_ByteString rawMessage;
  143. UA_Int32 position = 0;
  144. //EncodeUInt16
  145. UA_Byte mem[2] = {0x01,0x00};
  146. rawMessage.data = mem;
  147. rawMessage.length = 2;
  148. //encodeUInt16(testUInt16, &position, &rawMessage);
  149. UA_Int32 p = 0;
  150. UA_UInt16 val;
  151. UA_UInt16_decode(rawMessage.data,&p,&val);
  152. ck_assert_int_eq(val,1);
  153. //ck_assert_int_eq(p, 2);
  154. //ck_assert_int_eq(rawMessage.data[0], 0xAB);
  155. }
  156. END_TEST
  157. START_TEST(encodeUInt16_test)
  158. {
  159. UA_ByteString rawMessage;
  160. UA_Int32 position = 0;
  161. //EncodeUInt16
  162. UA_Byte *mem = (UA_Byte*) malloc(sizeof(UA_UInt16));
  163. rawMessage.data = mem;
  164. UA_UInt16 testUInt16 = 1;
  165. rawMessage.length = 2;
  166. position = 0;
  167. UA_UInt16_encode(&testUInt16, &position, rawMessage.data);
  168. ck_assert_int_eq(position, 2);
  169. UA_Int32 p = 0;
  170. UA_UInt16 val;
  171. UA_UInt16_decode(rawMessage.data, &p, &val);
  172. ck_assert_int_eq(val,testUInt16);
  173. //ck_assert_int_eq(rawMessage.data[0], 0xAB);
  174. free(mem);
  175. }
  176. END_TEST
  177. START_TEST(decodeUInt32_test)
  178. {
  179. UA_ByteString rawMessage;
  180. UA_Int32 position = 0;
  181. //EncodeUInt16
  182. UA_Byte mem[4] = {0xFF,0x00,0x00,0x00};
  183. rawMessage.data = mem;
  184. rawMessage.length = 4;
  185. UA_Int32 p = 0;
  186. UA_UInt32 val;
  187. UA_UInt32_decode(rawMessage.data, &p, &val);
  188. ck_assert_uint_eq(val,255);
  189. }
  190. END_TEST
  191. START_TEST(encodeUInt32_test)
  192. {
  193. UA_ByteString rawMessage;
  194. UA_Int32 position = 0;
  195. UA_UInt32 value = 0x0101FF00;
  196. //EncodeUInt16
  197. rawMessage.data = (UA_Byte*) malloc(2 * sizeof(UA_UInt32));
  198. rawMessage.length = 8;
  199. UA_Int32 p = 4;
  200. UA_UInt32_encode(&value,&p,rawMessage.data);
  201. ck_assert_uint_eq(rawMessage.data[4],0x00);
  202. ck_assert_uint_eq(rawMessage.data[5],0xFF);
  203. ck_assert_uint_eq(rawMessage.data[6],0x01);
  204. ck_assert_uint_eq(rawMessage.data[7],0x01);
  205. ck_assert_int_eq(p,8);
  206. free(rawMessage.data);
  207. }
  208. END_TEST
  209. START_TEST(decodeInt32_test)
  210. {
  211. UA_ByteString rawMessage;
  212. UA_Int32 position = 0;
  213. //EncodeUInt16
  214. UA_Byte mem[4] = {0x00,0xCA,0x9A,0x3B};
  215. rawMessage.data = mem;
  216. rawMessage.length = 4;
  217. UA_Int32 p = 0;
  218. UA_Int32 val;
  219. UA_Int32_decode(rawMessage.data, &p, &val);
  220. ck_assert_int_eq(val,1000000000);
  221. }
  222. END_TEST
  223. START_TEST(encodeInt32_test)
  224. {
  225. }
  226. END_TEST
  227. START_TEST(decodeUInt64_test)
  228. {
  229. UA_ByteString rawMessage;
  230. UA_Int32 position = 0;
  231. UA_UInt64 expectedVal = 0xFF;
  232. expectedVal = expectedVal << 56;
  233. UA_Byte mem[8] = {00,00,00,00,0x00,0x00,0x00,0xFF};
  234. rawMessage.data = mem;
  235. rawMessage.length = 8;
  236. UA_Int32 p = 0;
  237. UA_UInt64 val;
  238. UA_UInt64_decode(rawMessage.data, &p, &val);
  239. ck_assert_uint_eq(val, expectedVal);
  240. }
  241. END_TEST
  242. START_TEST(encodeUInt64_test)
  243. {
  244. UA_ByteString rawMessage;
  245. UA_Int32 position = 0;
  246. UA_UInt64 value = 0x0101FF00FF00FF00;
  247. //EncodeUInt16
  248. rawMessage.data = (UA_Byte*) malloc(sizeof(UA_UInt32));
  249. rawMessage.length = 8;
  250. UA_Int32 p = 0;
  251. UA_UInt64_encode(&value, &p,rawMessage.data);
  252. ck_assert_uint_eq((UA_Byte)rawMessage.data[0],0x00);
  253. ck_assert_uint_eq((UA_Byte)rawMessage.data[1],0xFF);
  254. ck_assert_uint_eq((UA_Byte)rawMessage.data[2],0x00);
  255. ck_assert_uint_eq((UA_Byte)rawMessage.data[3],0xFF);
  256. ck_assert_uint_eq((UA_Byte)rawMessage.data[4],0x00);
  257. ck_assert_uint_eq((UA_Byte)rawMessage.data[5],0xFF);
  258. ck_assert_uint_eq((UA_Byte)rawMessage.data[6],0x01);
  259. ck_assert_uint_eq((UA_Byte)rawMessage.data[7],0x01);
  260. free(rawMessage.data);
  261. }
  262. END_TEST
  263. START_TEST(decodeInt64_test)
  264. {
  265. UA_ByteString rawMessage;
  266. UA_Int32 position = 0;
  267. UA_Int64 expectedVal = 0xFF;
  268. expectedVal = expectedVal << 56;
  269. UA_Byte mem[8] = {00,00,00,00,0x00,0x00,0x00,0xFF};
  270. rawMessage.data = mem;
  271. rawMessage.length = 8;
  272. UA_Int32 p = 0;
  273. UA_Int64 val;
  274. UA_Int64_decode(rawMessage.data, &p, &val);
  275. ck_assert_uint_eq(val, expectedVal);
  276. }
  277. END_TEST
  278. START_TEST(encodeInt64_test)
  279. {
  280. UA_ByteString rawMessage;
  281. UA_Int32 position = 0;
  282. UA_UInt64 value = 0x0101FF00FF00FF00;
  283. //EncodeUInt16
  284. rawMessage.data = (UA_Byte*) malloc(sizeof(UA_UInt32));
  285. rawMessage.length = 8;
  286. UA_Int32 p = 0;
  287. UA_UInt64_encode(&value, &p,rawMessage.data);
  288. ck_assert_uint_eq(rawMessage.data[0],0x00);
  289. ck_assert_uint_eq(rawMessage.data[1],0xFF);
  290. ck_assert_uint_eq(rawMessage.data[2],0x00);
  291. ck_assert_uint_eq(rawMessage.data[3],0xFF);
  292. ck_assert_uint_eq(rawMessage.data[4],0x00);
  293. ck_assert_uint_eq(rawMessage.data[5],0xFF);
  294. ck_assert_uint_eq(rawMessage.data[6],0x01);
  295. ck_assert_uint_eq(rawMessage.data[7],0x01);
  296. free(rawMessage.data);
  297. }
  298. END_TEST
  299. START_TEST(decodeFloat_test)
  300. {
  301. UA_Float expectedValue = -6.5;
  302. UA_Int32 pos = 0;
  303. UA_Byte buf[4] = {0x00,0x00,0xD0,0xC0};
  304. UA_Float fval;
  305. UA_Float_decode(buf, &pos, &fval);
  306. //val should be -6.5
  307. UA_Int32 val = (fval > -6.501 && fval < -6.499);
  308. ck_assert_int_gt(val,0);
  309. }
  310. END_TEST
  311. START_TEST(encodeFloat_test)
  312. {
  313. UA_Float value = -6.5;
  314. UA_Int32 pos = 0;
  315. UA_Byte* buf = (char*)malloc(sizeof(UA_Float));
  316. UA_Float_encode(&value,&pos,buf);
  317. ck_assert_uint_eq(buf[2],0xD0);
  318. ck_assert_uint_eq(buf[3],0xC0);
  319. free(buf);
  320. }
  321. END_TEST
  322. START_TEST(decodeDouble_test)
  323. {
  324. }
  325. END_TEST
  326. START_TEST(encodeDouble_test)
  327. {
  328. UA_Double value = -6.5;
  329. UA_Int32 pos = 0;
  330. UA_Byte* buf = (char*)malloc(sizeof(UA_Double));
  331. UA_Double_encode(&value,&pos,buf);
  332. ck_assert_uint_eq(buf[6],0xD0);
  333. ck_assert_uint_eq(buf[7],0xC0);
  334. free(buf);
  335. }
  336. END_TEST
  337. START_TEST(encodeUAString_test)
  338. {
  339. UA_Int32 pos = 0;
  340. UA_String string;
  341. UA_Int32 l = 11;
  342. UA_Byte mem[11] = "ACPLT OPCUA";
  343. UA_Byte *dstBuf = (char*) malloc(sizeof(UA_Int32)+l);
  344. string.data = mem;
  345. string.length = 11;
  346. UA_String_encode(&string, &pos, dstBuf);
  347. ck_assert_int_eq(dstBuf[0],11);
  348. ck_assert_int_eq(dstBuf[0+sizeof(UA_Int32)],'A');
  349. }
  350. END_TEST
  351. START_TEST(decodeUAString_test)
  352. {
  353. UA_Int32 pos = 0;
  354. UA_String string;
  355. UA_Int32 l = 12;
  356. char binString[12] = {0x08,0x00,0x00,0x00,'A','C','P','L','T',' ','U','A'};
  357. UA_String_decode(binString, &pos, &string);
  358. ck_assert_int_eq(string.length,8);
  359. ck_assert_ptr_eq(string.data,UA_alloc_lastptr);
  360. ck_assert_int_eq(string.data[3],'L');
  361. UA_String_deleteMembers(&string);
  362. }
  363. END_TEST
  364. START_TEST(diagnosticInfo_calcSize_test)
  365. {
  366. UA_Int32 valreal = 0;
  367. UA_Int32 valcalc = 0;
  368. UA_DiagnosticInfo diagnosticInfo;
  369. diagnosticInfo.encodingMask = 0x01 | 0x02 | 0x04 | 0x08 | 0x10;
  370. diagnosticInfo.symbolicId = 30;
  371. diagnosticInfo.namespaceUri = 25;
  372. diagnosticInfo.localizedText = 22;
  373. diagnosticInfo.additionalInfo.data = "OPCUA";
  374. diagnosticInfo.additionalInfo.length = 5;
  375. ck_assert_int_eq(UA_DiagnosticInfo_calcSize(&diagnosticInfo),26);
  376. }
  377. END_TEST
  378. START_TEST(extensionObject_calcSize_test)
  379. {
  380. UA_Int32 valreal = 0;
  381. UA_Int32 valcalc = 0;
  382. UA_Byte data[3] = {1,2,3};
  383. UA_ExtensionObject extensionObject;
  384. // empty ExtensionObject, handcoded
  385. extensionObject.typeId.encodingByte = UA_NODEIDTYPE_TWOBYTE;
  386. extensionObject.typeId.identifier.numeric = 0;
  387. extensionObject.encoding = UA_EXTENSIONOBJECT_NOBODYISENCODED;
  388. ck_assert_int_eq(UA_ExtensionObject_calcSize(&extensionObject), 1 + 1 + 1);
  389. // ExtensionObject with ByteString-Body
  390. extensionObject.encoding = UA_EXTENSIONOBJECT_BODYISBYTESTRING;
  391. extensionObject.body.data = data;
  392. extensionObject.body.length = 3;
  393. ck_assert_int_eq(UA_ExtensionObject_calcSize(&extensionObject), 3 + 4 + 3);
  394. }
  395. END_TEST
  396. START_TEST(responseHeader_calcSize_test)
  397. {
  398. UA_ResponseHeader responseHeader;
  399. UA_DiagnosticInfo diagnosticInfo;
  400. UA_ExtensionObject extensionObject;
  401. UA_DiagnosticInfo emptyDO = {0x00};
  402. UA_ExtensionObject emptyEO = {{UA_NODEIDTYPE_TWOBYTE,0},UA_EXTENSIONOBJECT_NOBODYISENCODED};
  403. //Should have the size of 26 Bytes
  404. diagnosticInfo.encodingMask = UA_DIAGNOSTICINFO_ENCODINGMASKTYPE_SYMBOLICID | UA_DIAGNOSTICINFO_ENCODINGMASKTYPE_NAMESPACE | UA_DIAGNOSTICINFO_ENCODINGMASKTYPE_LOCALIZEDTEXT | UA_DIAGNOSTICINFO_ENCODINGMASKTYPE_LOCALE | UA_DIAGNOSTICINFO_ENCODINGMASKTYPE_ADDITIONALINFO; // Byte: 1
  405. // Indices into to Stringtable of the responseHeader (62541-6 §5.5.12 )
  406. diagnosticInfo.symbolicId = -1; // Int32: 4
  407. diagnosticInfo.namespaceUri = -1; // Int32: 4
  408. diagnosticInfo.localizedText = -1; // Int32: 4
  409. diagnosticInfo.locale = -1; // Int32: 4
  410. // Additional Info
  411. diagnosticInfo.additionalInfo.length = 5; // Int32: 4
  412. diagnosticInfo.additionalInfo.data = "OPCUA"; // Byte[]: 5
  413. responseHeader.serviceDiagnostics = &diagnosticInfo;
  414. ck_assert_int_eq(UA_DiagnosticInfo_calcSize(&diagnosticInfo),1+(4+4+4+4)+(4+5));
  415. responseHeader.stringTableSize = -1; // Int32: 4
  416. responseHeader.stringTable = NULL;
  417. responseHeader.additionalHeader = &emptyEO; // 3
  418. ck_assert_int_eq(UA_ResponseHeader_calcSize(&responseHeader),16+26+4+3);
  419. responseHeader.serviceDiagnostics = &emptyDO;
  420. ck_assert_int_eq(UA_ResponseHeader_calcSize(&responseHeader),16+1+4+3);
  421. }
  422. END_TEST
  423. //ToDo: Function needs to be filled
  424. START_TEST(expandedNodeId_calcSize_test)
  425. {
  426. UA_Int32 valreal = 300;
  427. UA_Int32 valcalc = 0;
  428. ck_assert_int_eq(valcalc,valreal);
  429. }
  430. END_TEST
  431. START_TEST(encodeDataValue_test)
  432. {
  433. UA_DataValue dataValue;
  434. UA_Int32 pos = 0, retval;
  435. UA_Byte* buf = (char*) malloc(15);
  436. UA_DateTime dateTime;
  437. dateTime = 80;
  438. dataValue.serverTimestamp = dateTime;
  439. //--without Variant
  440. dataValue.encodingMask = UA_DATAVALUE_SERVERTIMPSTAMP; //Only the sourcePicoseconds
  441. UA_DataValue_encode(&dataValue, &pos, buf);
  442. ck_assert_int_eq(pos, 9);// represents the length
  443. ck_assert_uint_eq(buf[0], 0x08); // encodingMask
  444. ck_assert_uint_eq(buf[1], 80); // 8 Byte serverTimestamp
  445. ck_assert_uint_eq(buf[2], 0);
  446. ck_assert_uint_eq(buf[3], 0);
  447. ck_assert_uint_eq(buf[4], 0);
  448. ck_assert_uint_eq(buf[5], 0);
  449. ck_assert_uint_eq(buf[6], 0);
  450. ck_assert_uint_eq(buf[7], 0);
  451. ck_assert_uint_eq(buf[8], 0);
  452. //TestCase for a DataValue with a Variant!
  453. dataValue.encodingMask = UA_DATAVALUE_VARIANT | UA_DATAVALUE_SERVERTIMPSTAMP; //Variant & SourvePicoseconds
  454. dataValue.value.vt = &UA_[UA_INT32];
  455. dataValue.value.arrayLength = 0;
  456. dataValue.value.encodingMask = UA_INT32_NS0;
  457. UA_Int32 data = 45;
  458. UA_Int32* pdata = &data;
  459. dataValue.value.data = (void**) &pdata;
  460. pos = 0;
  461. retval = UA_DataValue_encode(&dataValue, &pos, buf);
  462. ck_assert_int_eq(retval, UA_SUCCESS);
  463. ck_assert_int_eq(pos, 1+(1+4)+8);// represents the length
  464. ck_assert_uint_eq(buf[0], 0x08 | 0x01); // encodingMask
  465. ck_assert_uint_eq(buf[1], 0x06); // Variant's Encoding Mask - INT32
  466. ck_assert_uint_eq(buf[2], 45); // the single value
  467. ck_assert_uint_eq(buf[3], 0);
  468. ck_assert_uint_eq(buf[4], 0);
  469. ck_assert_uint_eq(buf[5], 0);
  470. ck_assert_uint_eq(buf[6], 80); // the server timestamp
  471. ck_assert_uint_eq(buf[7], 0);
  472. free(buf);
  473. }
  474. END_TEST
  475. START_TEST(DataValue_calcSize_test)
  476. {
  477. UA_DataValue dataValue;
  478. dataValue.encodingMask = UA_DATAVALUE_STATUSCODE | UA_DATAVALUE_SOURCETIMESTAMP | UA_DATAVALUE_SOURCEPICOSECONDS;
  479. dataValue.status = 12;
  480. UA_DateTime dateTime;
  481. dateTime = 80;
  482. dataValue.sourceTimestamp = dateTime;
  483. UA_DateTime sourceTime;
  484. dateTime = 214;
  485. dataValue.sourcePicoseconds = sourceTime;
  486. int size = 0;
  487. size = UA_DataValue_calcSize(&dataValue);
  488. ck_assert_int_eq(size, 21);
  489. }
  490. END_TEST
  491. START_TEST(encode_builtInDatatypeArray_test_String)
  492. {
  493. UA_Int32 noElements = 2;
  494. UA_ByteString s1 = { 6, "OPC UA" };
  495. UA_ByteString s2 = { -1, NULL };
  496. UA_ByteString* array[] = { &s1, &s2 };
  497. UA_Int32 pos = 0, i;
  498. char buf[256];
  499. char result[] = {
  500. 0x02, 0x00, 0x00, 0x00, // noElements
  501. 0x06, 0x00, 0x00, 0x00, // s1.Length
  502. 'O', 'P', 'C', ' ', 'U', 'A', // s1.Data
  503. 0xFF, 0xFF, 0xFF, 0xFF // s2.Length
  504. };
  505. UA_Array_encode((void const**)array, noElements, UA_BYTESTRING, &pos, buf);
  506. // check size
  507. ck_assert_int_eq(pos, 4 + 4 + 6 + 4);
  508. // check result
  509. for (i=0; i< sizeof(result); i++) {
  510. ck_assert_int_eq(buf[i],result[i]);
  511. }
  512. }
  513. END_TEST
  514. Suite *testSuite_getPacketType(void)
  515. {
  516. Suite *s = suite_create("getPacketType");
  517. TCase *tc_core = tcase_create("Core");
  518. tcase_add_test(tc_core,test_getPacketType_validParameter);
  519. suite_add_tcase(s,tc_core);
  520. return s;
  521. }
  522. Suite *testSuite_encodeByte(void)
  523. {
  524. Suite *s = suite_create("encodeByte_test");
  525. TCase *tc_core = tcase_create("Core");
  526. tcase_add_test(tc_core, decodeByte_test);
  527. tcase_add_test(tc_core, encodeByte_test);
  528. suite_add_tcase(s,tc_core);
  529. return s;
  530. }
  531. Suite *testSuite_decodeInt16(void)
  532. {
  533. Suite *s = suite_create("decodeInt16_test");
  534. TCase *tc_core = tcase_create("Core");
  535. tcase_add_test(tc_core, decodeInt16_test_positives);
  536. tcase_add_test(tc_core, decodeInt16_test_negatives);
  537. suite_add_tcase(s,tc_core);
  538. return s;
  539. }
  540. Suite*testSuite_encodeInt16(void)
  541. {
  542. Suite *s = suite_create("encodeInt16_test");
  543. TCase *tc_core = tcase_create("Core");
  544. tcase_add_test(tc_core, encodeInt16_test);
  545. suite_add_tcase(s,tc_core);
  546. return s;
  547. }
  548. Suite *testSuite_decodeUInt16(void)
  549. {
  550. Suite *s = suite_create("decodeUInt16_test");
  551. TCase *tc_core = tcase_create("Core");
  552. tcase_add_test(tc_core, decodeUInt16_test);
  553. suite_add_tcase(s,tc_core);
  554. return s;
  555. }
  556. Suite*testSuite_encodeUInt16(void)
  557. {
  558. Suite *s = suite_create("encodeUInt16_test");
  559. TCase *tc_core = tcase_create("Core");
  560. tcase_add_test(tc_core, encodeUInt16_test);
  561. suite_add_tcase(s,tc_core);
  562. return s;
  563. }
  564. Suite*testSuite_decodeUInt32(void)
  565. {
  566. Suite *s = suite_create("decodeUInt32_test");
  567. TCase *tc_core = tcase_create("Core");
  568. tcase_add_test(tc_core, decodeUInt32_test);
  569. suite_add_tcase(s,tc_core);
  570. return s;
  571. }
  572. Suite*testSuite_encodeUInt32(void)
  573. {
  574. Suite *s = suite_create("encodeUInt32_test");
  575. TCase *tc_core = tcase_create("Core");
  576. tcase_add_test(tc_core, encodeUInt32_test);
  577. suite_add_tcase(s,tc_core);
  578. return s;
  579. }
  580. Suite*testSuite_decodeInt32(void)
  581. {
  582. Suite *s = suite_create("decodeInt32_test");
  583. TCase *tc_core = tcase_create("Core");
  584. tcase_add_test(tc_core, decodeInt32_test);
  585. suite_add_tcase(s,tc_core);
  586. return s;
  587. }
  588. Suite*testSuite_encodeInt32(void)
  589. {
  590. Suite *s = suite_create("encodeInt32_test");
  591. TCase *tc_core = tcase_create("Core");
  592. tcase_add_test(tc_core, encodeInt32_test);
  593. suite_add_tcase(s,tc_core);
  594. return s;
  595. }
  596. Suite*testSuite_decodeUInt64(void)
  597. {
  598. Suite *s = suite_create("decodeUInt64_test");
  599. TCase *tc_core = tcase_create("Core");
  600. tcase_add_test(tc_core, decodeUInt64_test);
  601. suite_add_tcase(s,tc_core);
  602. return s;
  603. }
  604. Suite*testSuite_encodeUInt64(void)
  605. {
  606. Suite *s = suite_create("encodeUInt64_test");
  607. TCase *tc_core = tcase_create("Core");
  608. tcase_add_test(tc_core, encodeUInt64_test);
  609. suite_add_tcase(s,tc_core);
  610. return s;
  611. }
  612. Suite*testSuite_decodeInt64(void)
  613. {
  614. Suite *s = suite_create("decodeInt64_test");
  615. TCase *tc_core = tcase_create("Core");
  616. tcase_add_test(tc_core, decodeInt64_test);
  617. suite_add_tcase(s,tc_core);
  618. return s;
  619. }
  620. Suite*testSuite_encodeInt64(void)
  621. {
  622. Suite *s = suite_create("encodeInt64_test");
  623. TCase *tc_core = tcase_create("Core");
  624. tcase_add_test(tc_core, encodeInt64_test);
  625. suite_add_tcase(s,tc_core);
  626. return s;
  627. }
  628. Suite *testSuite_encodeFloat(void)
  629. {
  630. Suite *s = suite_create("encodeFloat_test");
  631. TCase *tc_core = tcase_create("Core");
  632. tcase_add_test(tc_core, encodeFloat_test);
  633. suite_add_tcase(s,tc_core);
  634. return s;
  635. }
  636. Suite *testSuite_decodeFloat(void)
  637. {
  638. Suite *s = suite_create("decodeFloat_test");
  639. TCase *tc_core = tcase_create("Core");
  640. tcase_add_test(tc_core, decodeFloat_test);
  641. suite_add_tcase(s,tc_core);
  642. return s;
  643. }
  644. Suite *testSuite_encodeDouble(void)
  645. {
  646. Suite *s = suite_create("encodeDouble_test");
  647. TCase *tc_core = tcase_create("Core");
  648. tcase_add_test(tc_core, encodeDouble_test);
  649. suite_add_tcase(s,tc_core);
  650. return s;
  651. }
  652. Suite *testSuite_decodeDouble(void)
  653. {
  654. Suite *s = suite_create("decodeDouble_test");
  655. TCase *tc_core = tcase_create("Core");
  656. tcase_add_test(tc_core, decodeDouble_test);
  657. suite_add_tcase(s,tc_core);
  658. return s;
  659. }
  660. Suite * testSuite_encodeUAString(void)
  661. {
  662. Suite *s = suite_create("encodeUAString_test");
  663. TCase *tc_core = tcase_create("Core");
  664. tcase_add_test(tc_core, encodeUAString_test);
  665. suite_add_tcase(s,tc_core);
  666. return s;
  667. }
  668. Suite * testSuite_decodeUAString(void)
  669. {
  670. Suite *s = suite_create("decodeUAString_test");
  671. TCase *tc_core = tcase_create("Core");
  672. tcase_add_test(tc_core, decodeUAString_test);
  673. suite_add_tcase(s,tc_core);
  674. return s;
  675. }
  676. Suite* testSuite_encodeDataValue()
  677. {
  678. Suite *s = suite_create("encodeDataValue");
  679. TCase *tc_core = tcase_create("Core");
  680. tcase_add_test(tc_core, encodeDataValue_test);
  681. suite_add_tcase(s,tc_core);
  682. return s;
  683. }
  684. Suite* testSuite_encode_builtInDatatypeArray()
  685. {
  686. Suite *s = suite_create("encode_builtInDatatypeArray");
  687. TCase *tc_core = tcase_create("Core");
  688. tcase_add_test(tc_core, encode_builtInDatatypeArray_test_String);
  689. suite_add_tcase(s,tc_core);
  690. return s;
  691. }
  692. Suite* testSuite_expandedNodeId_calcSize(void)
  693. {
  694. Suite *s = suite_create("expandedNodeId_calcSize");
  695. TCase *tc_core = tcase_create("Core");
  696. tcase_add_test(tc_core,expandedNodeId_calcSize_test);
  697. suite_add_tcase(s,tc_core);
  698. return s;
  699. }
  700. /*
  701. Suite* TL_<TESTSUITENAME>(void)
  702. {
  703. Suite *s = suite_create("<TESTSUITENAME>");
  704. TCase *tc_core = tcase_create("Core");
  705. tcase_add_test(tc_core,<TEST_NAME>);
  706. suite_add_tcase(s,tc_core);
  707. return s;
  708. }
  709. */
  710. Suite* testSuite_diagnosticInfo_calcSize()
  711. {
  712. Suite *s = suite_create("diagnosticInfo_calcSize");
  713. TCase *tc_core = tcase_create("Core");
  714. tcase_add_test(tc_core, diagnosticInfo_calcSize_test);
  715. suite_add_tcase(s,tc_core);
  716. return s;
  717. }
  718. Suite* testSuite_extensionObject_calcSize()
  719. {
  720. Suite *s = suite_create("extensionObject_calcSize");
  721. TCase *tc_core = tcase_create("Core");
  722. tcase_add_test(tc_core, extensionObject_calcSize_test);
  723. suite_add_tcase(s,tc_core);
  724. return s;
  725. }
  726. Suite* testSuite_responseHeader_calcSize()
  727. {
  728. Suite *s = suite_create("responseHeader_calcSize");
  729. TCase *tc_core = tcase_create("Core");
  730. tcase_add_test(tc_core, responseHeader_calcSize_test);
  731. suite_add_tcase(s,tc_core);
  732. return s;
  733. }
  734. Suite* testSuite_dataValue_calcSize(void)
  735. {
  736. Suite *s = suite_create("dataValue_calcSize");
  737. TCase *tc_core = tcase_create("Core");
  738. tcase_add_test(tc_core,DataValue_calcSize_test);
  739. suite_add_tcase(s,tc_core);
  740. return s;
  741. }
  742. int main (void)
  743. {
  744. int number_failed = 0;
  745. Suite *s = testSuite_getPacketType();
  746. SRunner *sr = srunner_create(s);
  747. srunner_run_all(sr,CK_NORMAL);
  748. number_failed = srunner_ntests_failed(sr);
  749. srunner_free(sr);
  750. s = testSuite_decodeInt16();
  751. sr = srunner_create(s);
  752. srunner_run_all(sr,CK_NORMAL);
  753. number_failed += srunner_ntests_failed(sr);
  754. srunner_free(sr);
  755. s = testSuite_encodeInt16();
  756. sr = srunner_create(s);
  757. srunner_run_all(sr,CK_NORMAL);
  758. number_failed += srunner_ntests_failed(sr);
  759. srunner_free(sr);
  760. s = testSuite_decodeUInt16();
  761. sr = srunner_create(s);
  762. srunner_run_all(sr,CK_NORMAL);
  763. number_failed += srunner_ntests_failed(sr);
  764. srunner_free(sr);
  765. s = testSuite_encodeUInt16();
  766. sr = srunner_create(s);
  767. srunner_run_all(sr,CK_NORMAL);
  768. number_failed += srunner_ntests_failed(sr);
  769. srunner_free(sr);
  770. s = testSuite_decodeUInt32();
  771. sr = srunner_create(s);
  772. srunner_run_all(sr,CK_NORMAL);
  773. number_failed += srunner_ntests_failed(sr);
  774. srunner_free(sr);
  775. s = testSuite_encodeUInt32();
  776. sr = srunner_create(s);
  777. srunner_run_all(sr,CK_NORMAL);
  778. number_failed += srunner_ntests_failed(sr);
  779. srunner_free(sr);
  780. s = testSuite_decodeInt32();
  781. sr = srunner_create(s);
  782. srunner_run_all(sr,CK_NORMAL);
  783. number_failed += srunner_ntests_failed(sr);
  784. srunner_free(sr);
  785. s = testSuite_encodeInt32();
  786. sr = srunner_create(s);
  787. srunner_run_all(sr,CK_NORMAL);
  788. number_failed += srunner_ntests_failed(sr);
  789. srunner_free(sr);
  790. s = testSuite_decodeUInt64();
  791. sr = srunner_create(s);
  792. srunner_run_all(sr,CK_NORMAL);
  793. number_failed += srunner_ntests_failed(sr);
  794. srunner_free(sr);
  795. s = testSuite_encodeUInt64();
  796. sr = srunner_create(s);
  797. srunner_run_all(sr,CK_NORMAL);
  798. number_failed += srunner_ntests_failed(sr);
  799. srunner_free(sr);
  800. s = testSuite_decodeInt64();
  801. sr = srunner_create(s);
  802. srunner_run_all(sr,CK_NORMAL);
  803. number_failed += srunner_ntests_failed(sr);
  804. srunner_free(sr);
  805. s = testSuite_encodeInt64();
  806. sr = srunner_create(s);
  807. srunner_run_all(sr,CK_NORMAL);
  808. number_failed += srunner_ntests_failed(sr);
  809. srunner_free(sr);
  810. s = testSuite_encodeFloat();
  811. sr = srunner_create(s);
  812. srunner_run_all(sr,CK_NORMAL);
  813. number_failed += srunner_ntests_failed(sr);
  814. srunner_free(sr);
  815. s = testSuite_encodeDouble();
  816. sr = srunner_create(s);
  817. srunner_run_all(sr,CK_NORMAL);
  818. number_failed += srunner_ntests_failed(sr);
  819. srunner_free(sr);
  820. s = testSuite_encodeByte();
  821. sr = srunner_create(s);
  822. srunner_run_all(sr,CK_NORMAL);
  823. number_failed += srunner_ntests_failed(sr);
  824. srunner_free(sr);
  825. s = testSuite_encodeUAString();
  826. sr = srunner_create(s);
  827. srunner_run_all(sr,CK_NORMAL);
  828. number_failed += srunner_ntests_failed(sr);
  829. srunner_free(sr);
  830. s = testSuite_decodeUAString();
  831. sr = srunner_create(s);
  832. srunner_run_all(sr,CK_NORMAL);
  833. number_failed += srunner_ntests_failed(sr);
  834. srunner_free(sr);
  835. s = testSuite_diagnosticInfo_calcSize();
  836. sr = srunner_create(s);
  837. srunner_run_all(sr,CK_NORMAL);
  838. number_failed += srunner_ntests_failed(sr);
  839. srunner_free(sr);
  840. s = testSuite_extensionObject_calcSize();
  841. sr = srunner_create(s);
  842. srunner_run_all(sr,CK_NORMAL);
  843. number_failed += srunner_ntests_failed(sr);
  844. srunner_free(sr);
  845. s = testSuite_responseHeader_calcSize();
  846. sr = srunner_create(s);
  847. srunner_run_all(sr,CK_NORMAL);
  848. number_failed += srunner_ntests_failed(sr);
  849. srunner_free(sr);
  850. s = testSuite_encodeDataValue();
  851. sr = srunner_create(s);
  852. srunner_run_all(sr,CK_NORMAL);
  853. number_failed += srunner_ntests_failed(sr);
  854. srunner_free(sr);
  855. s = testSuite_encode_builtInDatatypeArray();
  856. sr = srunner_create(s);
  857. srunner_run_all(sr,CK_NORMAL);
  858. number_failed += srunner_ntests_failed(sr);
  859. srunner_free(sr);
  860. s = testSuite_expandedNodeId_calcSize();
  861. sr = srunner_create(s);
  862. srunner_run_all(sr,CK_NORMAL);
  863. number_failed += srunner_ntests_failed(sr);
  864. srunner_free(sr);
  865. s = testSuite_dataValue_calcSize();
  866. sr = srunner_create(s);
  867. srunner_run_all(sr,CK_NORMAL);
  868. number_failed += srunner_ntests_failed(sr);
  869. srunner_free(sr);
  870. /* <TESTSUITE_TEMPLATE>
  871. s = <TESTSUITENAME>;
  872. sr = srunner_create(s);
  873. srunner_run_all(sr,CK_NORMAL);
  874. number_failed += srunner_ntests_failed(sr);
  875. srunner_free(sr);
  876. */
  877. return (number_failed == 0) ? EXIT_SUCCESS : EXIT_FAILURE;
  878. }