f806c5829b
* pre-commit: Update and enable clang-format check There is newer version from clang-format so use that. We do not yet want 18 as that is little bit too new. * Format some thing by hand which clang-format "breaks" Clang-format will format some things little bit off in some cases. Format some things by hand so we get cleaner end result. * Run clang-format with ``` pre-commit run --all-files clang-format ``` We have already in previously checked places where clang-format does not make good format and ignored those (hopefully most of the things). --------- Co-authored-by: Kari Argillander <kari.argillander@fidelix.com>
211 lines
6.1 KiB
C
211 lines
6.1 KiB
C
/**
|
|
* @file
|
|
* @brief BACnetAcknowledgeAlarmInfo service encode and decode
|
|
* @author John Minack <minack@users.sourceforge.net>
|
|
* @author Steve Karg <skarg@users.sourceforge.net>
|
|
* @date 2009
|
|
* @copyright SPDX-License-Identifier: GPL-2.0-or-later WITH GCC-exception-2.0
|
|
*/
|
|
#include <stddef.h>
|
|
#include <stdint.h>
|
|
#include "bacnet/alarm_ack.h"
|
|
|
|
/** @file alarm_ack.c Handles Event Notifications (ACKs) */
|
|
|
|
/**
|
|
* @brief Creates a Confirmed BACnetAcknowledgeAlarmInfo service request.
|
|
* @param apdu application data buffer, or NULL for length
|
|
* @param invoke_id Invoked ID
|
|
* @param data Pointer to the service data used for encoding values
|
|
* @return number of bytes encoded
|
|
*/
|
|
int alarm_ack_encode_apdu(
|
|
uint8_t *apdu, uint8_t invoke_id, const BACNET_ALARM_ACK_DATA *data)
|
|
{
|
|
int len = 0; /* length of each encoding */
|
|
int apdu_len = 0; /* total length of the apdu, return value */
|
|
|
|
if (apdu) {
|
|
apdu[0] = PDU_TYPE_CONFIRMED_SERVICE_REQUEST;
|
|
apdu[1] = encode_max_segs_max_apdu(0, MAX_APDU);
|
|
apdu[2] = invoke_id;
|
|
apdu[3] = SERVICE_CONFIRMED_ACKNOWLEDGE_ALARM; /* service choice */
|
|
}
|
|
len = 4;
|
|
apdu_len += len;
|
|
if (apdu) {
|
|
apdu += len;
|
|
}
|
|
len = alarm_ack_encode_service_request(apdu, data);
|
|
apdu_len += len;
|
|
|
|
return apdu_len;
|
|
}
|
|
|
|
/**
|
|
* @brief Encodes a BACnetAcknowledgeAlarmInfo service request
|
|
*
|
|
* BACnetAcknowledgeAlarmInfo ::= SEQUENCE {
|
|
* event-state-acknowledged [0] BACnetEventState,
|
|
* timestamp [1] BACnetTimeStamp
|
|
* }
|
|
*
|
|
* @param apdu application data buffer, or NULL for length
|
|
* @param data Pointer to the service data used for encoding values
|
|
* @return number of bytes encoded
|
|
*/
|
|
int alarm_ack_encode_service_request(
|
|
uint8_t *apdu, const BACNET_ALARM_ACK_DATA *data)
|
|
{
|
|
int len = 0; /* length of each encoding */
|
|
int apdu_len = 0; /* total length of the apdu, return value */
|
|
|
|
if (!data) {
|
|
return 0;
|
|
}
|
|
len = encode_context_unsigned(apdu, 0, data->ackProcessIdentifier);
|
|
apdu_len += len;
|
|
if (apdu) {
|
|
apdu += len;
|
|
}
|
|
len = encode_context_object_id(
|
|
apdu, 1, data->eventObjectIdentifier.type,
|
|
data->eventObjectIdentifier.instance);
|
|
apdu_len += len;
|
|
if (apdu) {
|
|
apdu += len;
|
|
}
|
|
len = encode_context_enumerated(apdu, 2, data->eventStateAcked);
|
|
apdu_len += len;
|
|
if (apdu) {
|
|
apdu += len;
|
|
}
|
|
len = bacapp_encode_context_timestamp(apdu, 3, &data->eventTimeStamp);
|
|
apdu_len += len;
|
|
if (apdu) {
|
|
apdu += len;
|
|
}
|
|
len = encode_context_character_string(apdu, 4, &data->ackSource);
|
|
apdu_len += len;
|
|
if (apdu) {
|
|
apdu += len;
|
|
}
|
|
len = bacapp_encode_context_timestamp(apdu, 5, &data->ackTimeStamp);
|
|
apdu_len += len;
|
|
|
|
return apdu_len;
|
|
}
|
|
|
|
/**
|
|
* @brief Encode the BACnetAcknowledgeAlarmInfo-Request service
|
|
* @param apdu Pointer to the buffer for encoding into
|
|
* @param apdu_size number of bytes available in the buffer
|
|
* @param data Pointer to the service data used for encoding values
|
|
* @return number of bytes encoded, or zero if unable to encode or too large
|
|
*/
|
|
size_t bacnet_acknowledge_alarm_info_request_encode(
|
|
uint8_t *apdu, size_t apdu_size, const BACNET_ALARM_ACK_DATA *data)
|
|
{
|
|
size_t apdu_len = 0; /* total length of the apdu, return value */
|
|
|
|
apdu_len = alarm_ack_encode_service_request(NULL, data);
|
|
if (apdu_len > apdu_size) {
|
|
apdu_len = 0;
|
|
} else {
|
|
apdu_len = alarm_ack_encode_service_request(apdu, data);
|
|
}
|
|
|
|
return apdu_len;
|
|
}
|
|
|
|
/**
|
|
* @brief Decodes the service data part of BACnetAcknowledgeAlarmInfo
|
|
*
|
|
* @param apdu application date buffer
|
|
* @param apdu_size number of bytes application date buffer
|
|
* @param data BACnetAcknowledgeAlarmInfo to hold the decoded data
|
|
* @return number of bytes decoded, or BACNET_STATUS_ERROR on error.
|
|
*/
|
|
int alarm_ack_decode_service_request(
|
|
const uint8_t *apdu, unsigned apdu_size, BACNET_ALARM_ACK_DATA *data)
|
|
{
|
|
int len = 0;
|
|
int apdu_len = 0;
|
|
uint32_t enum_value = 0;
|
|
BACNET_UNSIGNED_INTEGER unsigned_value = 0;
|
|
BACNET_OBJECT_TYPE object_type = 0;
|
|
uint32_t instance = 0;
|
|
BACNET_TIMESTAMP *timestamp_value = NULL;
|
|
BACNET_CHARACTER_STRING *cs_value = NULL;
|
|
|
|
if (!apdu) {
|
|
return BACNET_STATUS_ERROR;
|
|
}
|
|
if (apdu_size == 0) {
|
|
return BACNET_STATUS_ERROR;
|
|
}
|
|
len = bacnet_unsigned_context_decode(
|
|
&apdu[apdu_len], apdu_size - apdu_len, 0, &unsigned_value);
|
|
if (len > 0) {
|
|
apdu_len += len;
|
|
} else {
|
|
return BACNET_STATUS_ERROR;
|
|
}
|
|
if (data) {
|
|
data->ackProcessIdentifier = (uint32_t)unsigned_value;
|
|
}
|
|
len = bacnet_object_id_context_decode(
|
|
&apdu[apdu_len], apdu_size - apdu_len, 1, &object_type, &instance);
|
|
if (len > 0) {
|
|
apdu_len += len;
|
|
} else {
|
|
return BACNET_STATUS_ERROR;
|
|
}
|
|
if (data) {
|
|
data->eventObjectIdentifier.type = object_type;
|
|
data->eventObjectIdentifier.instance = instance;
|
|
}
|
|
len = bacnet_enumerated_context_decode(
|
|
&apdu[apdu_len], apdu_size - apdu_len, 2, &enum_value);
|
|
if (len > 0) {
|
|
apdu_len += len;
|
|
} else {
|
|
return BACNET_STATUS_ERROR;
|
|
}
|
|
if (data) {
|
|
data->eventStateAcked = (BACNET_EVENT_STATE)enum_value;
|
|
}
|
|
if (data) {
|
|
timestamp_value = &data->eventTimeStamp;
|
|
}
|
|
len = bacnet_timestamp_context_decode(
|
|
&apdu[apdu_len], apdu_size - apdu_len, 3, timestamp_value);
|
|
if (len > 0) {
|
|
apdu_len += len;
|
|
} else {
|
|
return BACNET_STATUS_ERROR;
|
|
}
|
|
if (data) {
|
|
cs_value = &data->ackSource;
|
|
}
|
|
len = bacnet_character_string_context_decode(
|
|
&apdu[apdu_len], apdu_size - apdu_len, 4, cs_value);
|
|
if (len > 0) {
|
|
apdu_len += len;
|
|
} else {
|
|
return BACNET_STATUS_ERROR;
|
|
}
|
|
if (data) {
|
|
timestamp_value = &data->ackTimeStamp;
|
|
}
|
|
len = bacnet_timestamp_context_decode(
|
|
&apdu[apdu_len], apdu_size - apdu_len, 5, timestamp_value);
|
|
if (len > 0) {
|
|
apdu_len += len;
|
|
} else {
|
|
return BACNET_STATUS_ERROR;
|
|
}
|
|
|
|
return apdu_len;
|
|
}
|