session.c 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214
  1. /*
  2. * This file is part of the libsigrok project.
  3. *
  4. * Copyright (C) 2014 Uwe Hermann <uwe@hermann-uwe.de>
  5. *
  6. * This program is free software; you can redistribute it and/or modify
  7. * it under the terms of the GNU General Public License as published by
  8. * the Free Software Foundation; either version 2 of the License, or
  9. * (at your option) any later version.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with this program; if not, see <http://www.gnu.org/licenses/>.
  18. */
  19. #include <config.h>
  20. #include <stdlib.h>
  21. #include <check.h>
  22. #include <libsigrok/libsigrok.h>
  23. #include "lib.h"
  24. /*
  25. * Check whether sr_session_new() works.
  26. * If it returns != SR_OK (or segfaults) this test will fail.
  27. */
  28. START_TEST(test_session_new)
  29. {
  30. int ret;
  31. struct sr_session *sess;
  32. ret = sr_session_new(srtest_ctx, &sess);
  33. fail_unless(ret == SR_OK, "sr_session_new() failed: %d.", ret);
  34. sr_session_destroy(sess);
  35. }
  36. END_TEST
  37. /*
  38. * Check whether sr_session_new() fails for bogus parameters.
  39. * If it returns SR_OK (or segfaults) this test will fail.
  40. */
  41. START_TEST(test_session_new_bogus)
  42. {
  43. int ret;
  44. ret = sr_session_new(srtest_ctx, NULL);
  45. fail_unless(ret != SR_OK, "sr_session_new(NULL) worked.");
  46. }
  47. END_TEST
  48. /*
  49. * Check whether multiple sr_session_new() calls work.
  50. * If any call returns != SR_OK (or segfaults) this test will fail.
  51. */
  52. START_TEST(test_session_new_multiple)
  53. {
  54. int ret;
  55. struct sr_session *sess1, *sess2, *sess3;
  56. sess1 = sess2 = sess3 = NULL;
  57. /* Multiple sr_session_new() calls must work. */
  58. ret = sr_session_new(srtest_ctx, &sess1);
  59. fail_unless(ret == SR_OK, "sr_session_new() 1 failed: %d.", ret);
  60. ret = sr_session_new(srtest_ctx, &sess2);
  61. fail_unless(ret == SR_OK, "sr_session_new() 2 failed: %d.", ret);
  62. ret = sr_session_new(srtest_ctx, &sess3);
  63. fail_unless(ret == SR_OK, "sr_session_new() 3 failed: %d.", ret);
  64. /* The returned session pointers must all be non-NULL. */
  65. fail_unless(sess1 != NULL);
  66. fail_unless(sess2 != NULL);
  67. fail_unless(sess3 != NULL);
  68. /* The returned session pointers must not be the same. */
  69. fail_unless(sess1 != sess2);
  70. fail_unless(sess1 != sess3);
  71. fail_unless(sess2 != sess3);
  72. /* Destroying any of the sessions must work. */
  73. ret = sr_session_destroy(sess1);
  74. fail_unless(ret == SR_OK, "sr_session_destroy() 1 failed: %d.", ret);
  75. ret = sr_session_destroy(sess2);
  76. fail_unless(ret == SR_OK, "sr_session_destroy() 2 failed: %d.", ret);
  77. ret = sr_session_destroy(sess3);
  78. fail_unless(ret == SR_OK, "sr_session_destroy() 3 failed: %d.", ret);
  79. }
  80. END_TEST
  81. /*
  82. * Check whether sr_session_destroy() works.
  83. * If it returns != SR_OK (or segfaults) this test will fail.
  84. */
  85. START_TEST(test_session_destroy)
  86. {
  87. int ret;
  88. struct sr_session *sess;
  89. sr_session_new(srtest_ctx, &sess);
  90. ret = sr_session_destroy(sess);
  91. fail_unless(ret == SR_OK, "sr_session_destroy() failed: %d.", ret);
  92. }
  93. END_TEST
  94. /*
  95. * Check whether sr_session_destroy() fails for bogus sessions.
  96. * If it returns SR_OK (or segfaults) this test will fail.
  97. */
  98. START_TEST(test_session_destroy_bogus)
  99. {
  100. int ret;
  101. ret = sr_session_destroy(NULL);
  102. fail_unless(ret != SR_OK, "sr_session_destroy() worked.");
  103. }
  104. END_TEST
  105. START_TEST(test_session_trigger_set_get)
  106. {
  107. int ret;
  108. struct sr_session *sess;
  109. struct sr_trigger *t1, *t2;
  110. sr_session_new(srtest_ctx, &sess);
  111. t1 = sr_trigger_new("T1");
  112. /* Set a trigger and see if getting it works OK. */
  113. ret = sr_session_trigger_set(sess, t1);
  114. fail_unless(ret == SR_OK);
  115. t2 = sr_session_trigger_get(sess);
  116. fail_unless(t2 != NULL);
  117. fail_unless(t1 == t2);
  118. fail_unless(g_slist_length(t1->stages) == g_slist_length(t2->stages));
  119. fail_unless(!strcmp(t1->name, t2->name));
  120. sr_session_destroy(sess);
  121. }
  122. END_TEST
  123. START_TEST(test_session_trigger_set_get_null)
  124. {
  125. int ret;
  126. struct sr_session *sess;
  127. struct sr_trigger *t;
  128. sr_session_new(srtest_ctx, &sess);
  129. /* Adding a NULL trigger is allowed. */
  130. ret = sr_session_trigger_set(sess, NULL);
  131. fail_unless(ret == SR_OK);
  132. t = sr_session_trigger_get(sess);
  133. fail_unless(t == NULL);
  134. sr_session_destroy(sess);
  135. }
  136. END_TEST
  137. START_TEST(test_session_trigger_set_null)
  138. {
  139. int ret;
  140. struct sr_trigger *t;
  141. t = sr_trigger_new("T1");
  142. /* NULL session, must not segfault. */
  143. ret = sr_session_trigger_set(NULL, t);
  144. fail_unless(ret == SR_ERR_ARG);
  145. /* NULL session and NULL trigger, must not segfault. */
  146. ret = sr_session_trigger_set(NULL, NULL);
  147. fail_unless(ret == SR_ERR_ARG);
  148. }
  149. END_TEST
  150. START_TEST(test_session_trigger_get_null)
  151. {
  152. struct sr_trigger *t;
  153. /* NULL session, must not segfault. */
  154. t = sr_session_trigger_get(NULL);
  155. fail_unless(t == NULL);
  156. }
  157. END_TEST
  158. Suite *suite_session(void)
  159. {
  160. Suite *s;
  161. TCase *tc;
  162. s = suite_create("session");
  163. tc = tcase_create("new_destroy");
  164. tcase_add_checked_fixture(tc, srtest_setup, srtest_teardown);
  165. tcase_add_test(tc, test_session_new);
  166. tcase_add_test(tc, test_session_new_bogus);
  167. tcase_add_test(tc, test_session_new_multiple);
  168. tcase_add_test(tc, test_session_destroy);
  169. tcase_add_test(tc, test_session_destroy_bogus);
  170. suite_add_tcase(s, tc);
  171. tc = tcase_create("trigger");
  172. tcase_add_checked_fixture(tc, srtest_setup, srtest_teardown);
  173. tcase_add_test(tc, test_session_trigger_set_get);
  174. tcase_add_test(tc, test_session_trigger_set_get_null);
  175. tcase_add_test(tc, test_session_trigger_set_null);
  176. tcase_add_test(tc, test_session_trigger_get_null);
  177. suite_add_tcase(s, tc);
  178. return s;
  179. }