bool Device_Valid_Object_Name(BACNET_CHARACTER_STRING * object_name1, int *object_type, uint32_t * object_instance) { bool found = false; int type = 0; uint32_t instance; unsigned max_objects = 0, i = 0; bool check_id = false; BACNET_CHARACTER_STRING object_name2; struct my_object_functions *pObject = NULL; max_objects = Device_Object_List_Count(); for (i = 1; i <= max_objects; i++) { check_id = Device_Object_List_Identifier(i, &type, &instance); if (check_id) { pObject = Device_Objects_Find_Functions((BACNET_OBJECT_TYPE) type); if ((pObject != NULL) && (pObject->Object_Name != NULL) && (pObject->Object_Name(instance, &object_name2) && characterstring_same(object_name1, &object_name2))) { found = true; if (object_type) { *object_type = type; } if (object_instance) { *object_instance = instance; } break; } } } return found; }
void testWhoHasData( Test * pTest, BACNET_WHO_HAS_DATA * data) { uint8_t apdu[480] = { 0 }; int len = 0; int apdu_len = 0; BACNET_WHO_HAS_DATA test_data; len = whohas_encode_apdu(&apdu[0], data); ct_test(pTest, len != 0); apdu_len = len; len = whohas_decode_apdu(&apdu[0], apdu_len, &test_data); ct_test(pTest, len != -1); ct_test(pTest, test_data.low_limit == data->low_limit); ct_test(pTest, test_data.high_limit == data->high_limit); ct_test(pTest, test_data.object_name == data->object_name); /* Object ID */ if (data->object_name == false) { ct_test(pTest, test_data.object.identifier.type == data->object.identifier.type); ct_test(pTest, test_data.object.identifier.instance == data->object.identifier.instance); } /* Object Name */ else { ct_test(pTest, characterstring_same(&test_data.object.name, &data->object.name)); } }
void test_ReinitializeDevice( Test * pTest) { uint8_t apdu[480] = { 0 }; int len = 0; int apdu_len = 0; uint8_t invoke_id = 128; uint8_t test_invoke_id = 0; BACNET_REINITIALIZED_STATE state; BACNET_REINITIALIZED_STATE test_state; BACNET_CHARACTER_STRING password; BACNET_CHARACTER_STRING test_password; state = BACNET_REINIT_WARMSTART; characterstring_init_ansi(&password, "John 3:16"); len = rd_encode_apdu(&apdu[0], invoke_id, state, &password); ct_test(pTest, len != 0); apdu_len = len; len = rd_decode_apdu(&apdu[0], apdu_len, &test_invoke_id, &test_state, &test_password); ct_test(pTest, len != -1); ct_test(pTest, test_invoke_id == invoke_id); ct_test(pTest, test_state == state); ct_test(pTest, characterstring_same(&test_password, &password)); return; }
bool Device_Set_Object_Name( BACNET_CHARACTER_STRING * object_name) { bool status = false; /*return value */ if (!characterstring_same(&My_Object_Name, object_name)) { /* Make the change and update the database revision */ status = characterstring_copy(&My_Object_Name, object_name); Device_Inc_Database_Revision(); } return status; }
void testIHaveData( Test * pTest, BACNET_I_HAVE_DATA * data) { uint8_t apdu[480] = { 0 }; int len = 0; int apdu_len = 0; BACNET_I_HAVE_DATA test_data; len = ihave_encode_apdu(&apdu[0], data); ct_test(pTest, len != 0); apdu_len = len; len = ihave_decode_apdu(&apdu[0], apdu_len, &test_data); ct_test(pTest, len != -1); ct_test(pTest, test_data.device_id.type == data->device_id.type); ct_test(pTest, test_data.device_id.instance == data->device_id.instance); ct_test(pTest, test_data.object_id.type == data->object_id.type); ct_test(pTest, test_data.object_id.instance == data->object_id.instance); ct_test(pTest, characterstring_same(&test_data.object_name, &data->object_name)); }
void handler_reinitialize_device( uint8_t * service_request, uint16_t service_len, BACNET_ADDRESS * src, BACNET_CONFIRMED_SERVICE_DATA * service_data) { BACNET_REINITIALIZED_STATE state; BACNET_CHARACTER_STRING their_password; int len = 0; int pdu_len = 0; BACNET_NPDU_DATA npdu_data; int bytes_sent = 0; BACNET_ADDRESS my_address; /* encode the NPDU portion of the packet */ datalink_get_my_address(&my_address); npdu_encode_npdu_data(&npdu_data, false, MESSAGE_PRIORITY_NORMAL); pdu_len = npdu_encode_pdu(&Handler_Transmit_Buffer[0], src, &my_address, &npdu_data); if (service_data->segmented_message) { len = abort_encode_apdu(&Handler_Transmit_Buffer[pdu_len], service_data->invoke_id, ABORT_REASON_SEGMENTATION_NOT_SUPPORTED, true); goto RD_ABORT; } /* decode the service request only */ len = rd_decode_service_request(service_request, service_len, &state, &their_password); /* bad decoding or something we didn't understand - send an abort */ if (len < 0) { len = abort_encode_apdu(&Handler_Transmit_Buffer[pdu_len], service_data->invoke_id, ABORT_REASON_OTHER, true); goto RD_ABORT; } /* check the data from the request */ if (state >= MAX_BACNET_REINITIALIZED_STATE) { len = reject_encode_apdu(&Handler_Transmit_Buffer[pdu_len], service_data->invoke_id, REJECT_REASON_UNDEFINED_ENUMERATION); } else { characterstring_init_ansi(&My_Password, Password); if (characterstring_same(&their_password, &My_Password)) { len = encode_simple_ack(&Handler_Transmit_Buffer[pdu_len], service_data->invoke_id, SERVICE_CONFIRMED_REINITIALIZE_DEVICE); /* FIXME: now you can reboot, restart, quit, or something clever */ /* Note: you can use a mix of state and password to do specific stuff */ /* Note: if you don't do something clever like actually restart, you probably should clear any DCC status and timeouts */ /* Note: you probably need to send the reply BEFORE restarting */ } else { len = bacerror_encode_apdu(&Handler_Transmit_Buffer[pdu_len], service_data->invoke_id, SERVICE_CONFIRMED_REINITIALIZE_DEVICE, ERROR_CLASS_SERVICES, ERROR_CODE_PASSWORD_FAILURE); } } RD_ABORT: pdu_len += len; bytes_sent = datalink_send_pdu(src, &npdu_data, &Handler_Transmit_Buffer[0], pdu_len); return; }