summaryrefslogtreecommitdiff
path: root/tests/check_session.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/check_session.c')
-rw-r--r--tests/check_session.c271
1 files changed, 271 insertions, 0 deletions
diff --git a/tests/check_session.c b/tests/check_session.c
new file mode 100644
index 0000000..19e7adb
--- /dev/null
+++ b/tests/check_session.c
@@ -0,0 +1,271 @@
+/*
+ * This file is part of the libsigrokdecode project.
+ *
+ * Copyright (C) 2013 Uwe Hermann <uwe@hermann-uwe.de>
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
+ */
+
+#include "../libsigrokdecode.h" /* First, to avoid compiler warning. */
+#include "../libsigrokdecode-internal.h"
+#include <stdlib.h>
+#include <check.h>
+
+static void setup(void)
+{
+ /* Silence libsigrokdecode while the unit tests run. */
+ srd_log_loglevel_set(SRD_LOG_NONE);
+}
+
+static void teardown(void)
+{
+}
+
+/*
+ * Check whether srd_session_new() works.
+ * If it returns != SRD_OK (or segfaults) this test will fail.
+ */
+START_TEST(test_session_new)
+{
+ int ret;
+ struct srd_session *sess;
+
+ srd_init(NULL);
+ ret = srd_session_new(&sess);
+ fail_unless(ret == SRD_OK, "srd_session_new() failed: %d.", ret);
+ srd_exit();
+}
+END_TEST
+
+/*
+ * Check whether srd_session_new() fails for bogus parameters.
+ * If it returns SRD_OK (or segfaults) this test will fail.
+ */
+START_TEST(test_session_new_bogus)
+{
+ int ret;
+
+ srd_init(NULL);
+ ret = srd_session_new(NULL);
+ fail_unless(ret != SRD_OK, "srd_session_new(NULL) worked.");
+ srd_exit();
+}
+END_TEST
+
+/*
+ * Check whether multiple srd_session_new() calls work.
+ * If any call returns != SRD_OK (or segfaults) this test will fail.
+ */
+START_TEST(test_session_new_multiple)
+{
+ int ret;
+ struct srd_session *sess1, *sess2, *sess3;
+
+ sess1 = sess2 = sess3 = NULL;
+
+ srd_init(NULL);
+
+ /* Multiple srd_session_new() calls must work. */
+ ret = srd_session_new(&sess1);
+ fail_unless(ret == SRD_OK, "srd_session_new() 1 failed: %d.", ret);
+ ret = srd_session_new(&sess2);
+ fail_unless(ret == SRD_OK, "srd_session_new() 2 failed: %d.", ret);
+ ret = srd_session_new(&sess3);
+ fail_unless(ret == SRD_OK, "srd_session_new() 3 failed: %d.", ret);
+
+ /* The returned session pointers must all be non-NULL. */
+ fail_unless(sess1 != NULL);
+ fail_unless(sess2 != NULL);
+ fail_unless(sess3 != NULL);
+
+ /* The returned session pointers must not be the same. */
+ fail_unless(sess1 != sess2);
+ fail_unless(sess1 != sess3);
+ fail_unless(sess2 != sess3);
+
+ /* Each session must have another ID than any other session. */
+ fail_unless(sess1->session_id != sess2->session_id);
+ fail_unless(sess1->session_id != sess3->session_id);
+ fail_unless(sess2->session_id != sess3->session_id);
+
+ /* Destroying any of the sessions must work. */
+ ret = srd_session_destroy(sess1);
+ fail_unless(ret == SRD_OK, "srd_session_destroy() 1 failed: %d.", ret);
+ ret = srd_session_destroy(sess2);
+ fail_unless(ret == SRD_OK, "srd_session_destroy() 2 failed: %d.", ret);
+ ret = srd_session_destroy(sess3);
+ fail_unless(ret == SRD_OK, "srd_session_destroy() 3 failed: %d.", ret);
+
+ srd_exit();
+}
+END_TEST
+
+/*
+ * Check whether srd_session_destroy() works.
+ * If it returns != SRD_OK (or segfaults) this test will fail.
+ */
+START_TEST(test_session_destroy)
+{
+ int ret;
+ struct srd_session *sess;
+
+ srd_init(NULL);
+ srd_session_new(&sess);
+ ret = srd_session_destroy(sess);
+ fail_unless(ret == SRD_OK, "srd_session_destroy() failed: %d.", ret);
+ srd_exit();
+}
+END_TEST
+
+/*
+ * Check whether srd_session_destroy() fails for bogus sessions.
+ * If it returns SRD_OK (or segfaults) this test will fail.
+ */
+START_TEST(test_session_destroy_bogus)
+{
+ int ret;
+
+ srd_init(NULL);
+ ret = srd_session_destroy(NULL);
+ fail_unless(ret != SRD_OK, "srd_session_destroy() failed: %d.", ret);
+ srd_exit();
+}
+END_TEST
+
+static void conf_check_ok(struct srd_session *sess, int key, uint64_t x)
+{
+ int ret;
+
+ ret = srd_session_config_set(sess, key, g_variant_new_uint64(x));
+ fail_unless(ret == SRD_OK, "srd_session_config_set(%p, %d, %"
+ PRIu64 ") failed: %d.", sess, key, x, ret);
+}
+
+static void conf_check_fail(struct srd_session *sess, int key, uint64_t x)
+{
+ int ret;
+
+ ret = srd_session_config_set(sess, key, g_variant_new_uint64(x));
+ fail_unless(ret != SRD_OK, "srd_session_config_set(%p, %d, %"
+ PRIu64 ") worked.", sess, key, x);
+}
+
+static void conf_check_fail_null(struct srd_session *sess, int key)
+{
+ int ret;
+
+ ret = srd_session_config_set(sess, key, NULL);
+ fail_unless(ret != SRD_OK,
+ "srd_session_config_set(NULL) for key %d worked.", key);
+}
+
+static void conf_check_fail_str(struct srd_session *sess, int key, const char *s)
+{
+ int ret;
+
+ ret = srd_session_config_set(sess, key, g_variant_new_string(s));
+ fail_unless(ret != SRD_OK, "srd_session_config_set for key %d "
+ "failed: %d.", key, ret);
+}
+
+/*
+ * Check whether srd_session_config_set() works.
+ * If it returns != SRD_OK (or segfaults) this test will fail.
+ */
+START_TEST(test_session_config_set)
+{
+ uint64_t i;
+ struct srd_session *sess;
+
+ srd_init(NULL);
+ srd_session_new(&sess);
+ /* Try a bunch of values. */
+ for (i = 0; i < 1000; i++) {
+ conf_check_ok(sess, SRD_CONF_NUM_PROBES, i);
+ conf_check_ok(sess, SRD_CONF_UNITSIZE, i);
+ conf_check_ok(sess, SRD_CONF_SAMPLERATE, i);
+ }
+ /* Try the max. possible value. */
+ conf_check_ok(sess, SRD_CONF_NUM_PROBES, 18446744073709551615ULL);
+ conf_check_ok(sess, SRD_CONF_UNITSIZE, 18446744073709551615ULL);
+ conf_check_ok(sess, SRD_CONF_SAMPLERATE, 18446744073709551615ULL);
+ srd_session_destroy(sess);
+ srd_exit();
+}
+END_TEST
+
+/*
+ * Check whether srd_session_config_set() fails with invalid input.
+ * If it returns SRD_OK (or segfaults) this test will fail.
+ */
+START_TEST(test_session_config_set_bogus)
+{
+ struct srd_session *sess;
+
+ srd_init(NULL);
+ srd_session_new(&sess);
+
+ /* Incorrect gvariant type (currently only uint64 is used). */
+ conf_check_fail_str(sess, SRD_CONF_NUM_PROBES, "");
+ conf_check_fail_str(sess, SRD_CONF_UNITSIZE, "");
+ conf_check_fail_str(sess, SRD_CONF_SAMPLERATE, "");
+ conf_check_fail_str(sess, SRD_CONF_NUM_PROBES, "Foo");
+ conf_check_fail_str(sess, SRD_CONF_UNITSIZE, "Foo");
+ conf_check_fail_str(sess, SRD_CONF_SAMPLERATE, "Foo");
+
+ /* NULL data pointer. */
+ conf_check_fail_null(sess, SRD_CONF_NUM_PROBES);
+ conf_check_fail_null(sess, SRD_CONF_UNITSIZE);
+ conf_check_fail_null(sess, SRD_CONF_SAMPLERATE);
+
+ /* NULL session. */
+ conf_check_fail(NULL, SRD_CONF_NUM_PROBES, 0);
+ conf_check_fail(NULL, SRD_CONF_UNITSIZE, 0);
+ conf_check_fail(NULL, SRD_CONF_SAMPLERATE, 0);
+
+ /* Invalid keys. */
+ conf_check_fail(sess, -1, 0);
+ conf_check_fail(sess, 9, 0);
+ conf_check_fail(sess, 123, 0);
+
+ srd_session_destroy(sess);
+ srd_exit();
+}
+END_TEST
+
+Suite *suite_session(void)
+{
+ Suite *s;
+ TCase *tc;
+
+ s = suite_create("session");
+
+ tc = tcase_create("new_destroy");
+ tcase_add_checked_fixture(tc, setup, teardown);
+ tcase_add_test(tc, test_session_new);
+ tcase_add_test(tc, test_session_new_bogus);
+ tcase_add_test(tc, test_session_new_multiple);
+ tcase_add_test(tc, test_session_destroy);
+ tcase_add_test(tc, test_session_destroy_bogus);
+ suite_add_tcase(s, tc);
+
+ tc = tcase_create("config");
+ tcase_add_checked_fixture(tc, setup, teardown);
+ tcase_add_test(tc, test_session_config_set);
+ tcase_add_test(tc, test_session_config_set_bogus);
+ suite_add_tcase(s, tc);
+
+ return s;
+}