You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@directory.apache.org by el...@apache.org on 2005/08/02 01:48:59 UTC
svn commit: r226910 -
/directory/sandbox/trunk/asn1-new-codec/src/test/org/apache/asn1/ldap/codec/SearchRequestTest.java
Author: elecharny
Date: Mon Aug 1 16:48:55 2005
New Revision: 226910
URL: http://svn.apache.org/viewcvs?rev=226910&view=rev
Log:
- added the encoding test
- changed the boolean value (0x3E) by a valid one (0xFF)
Modified:
directory/sandbox/trunk/asn1-new-codec/src/test/org/apache/asn1/ldap/codec/SearchRequestTest.java
Modified: directory/sandbox/trunk/asn1-new-codec/src/test/org/apache/asn1/ldap/codec/SearchRequestTest.java
URL: http://svn.apache.org/viewcvs/directory/sandbox/trunk/asn1-new-codec/src/test/org/apache/asn1/ldap/codec/SearchRequestTest.java?rev=226910&r1=226909&r2=226910&view=diff
==============================================================================
--- directory/sandbox/trunk/asn1-new-codec/src/test/org/apache/asn1/ldap/codec/SearchRequestTest.java (original)
+++ directory/sandbox/trunk/asn1-new-codec/src/test/org/apache/asn1/ldap/codec/SearchRequestTest.java Mon Aug 1 16:48:55 2005
@@ -20,6 +20,7 @@
import java.util.ArrayList;
import org.apache.asn1.DecoderException;
+import org.apache.asn1.EncoderException;
import org.apache.asn1.ber.Asn1Decoder;
import org.apache.asn1.ber.containers.IAsn1Container;
import org.apache.asn1.ldap.codec.primitives.LdapString;
@@ -32,6 +33,7 @@
import org.apache.asn1.ldap.pojo.filters.OrFilter;
import org.apache.asn1.ldap.pojo.filters.PresentFilter;
import org.apache.asn1.ldap.pojo.filters.SubstringFilter;
+import org.apache.asn1.util.StringUtils;
import org.apache.log4j.Logger;
import org.apache.log4j.PropertyConfigurator;
@@ -85,7 +87,7 @@
0x02, 0x02, 0x03, (byte)0xE8,
// timeLimit INTEGER (0 .. maxInt), (1000)
0x02, 0x02, 0x03, (byte)0xE8,
- 0x01, 0x01, 0x3E, // typesOnly BOOLEAN, (TRUE)
+ 0x01, 0x01, (byte)0xFF, // typesOnly BOOLEAN, (TRUE)
// filter Filter,
(byte)0xA0, 0x3C, // Filter ::= CHOICE {
// and [0] SET OF Filter,
@@ -115,6 +117,7 @@
0x04, 0x05, 'a', 't', 't', 'r', '2' // AttributeDescription ::= LDAPString
} );
+ String decodedPdu = StringUtils.dumpBytes( stream.array() );
stream.flip();
// Allocate a BindRequest Container
@@ -196,6 +199,21 @@
Assert.assertEquals("attr" + i, attribute.toString());
}
+
+ // Check the encoding
+ try
+ {
+ ByteBuffer bb = message.encode( null );
+
+ String encodedPdu = StringUtils.dumpBytes( bb.array() );
+
+ Assert.assertEquals(encodedPdu, decodedPdu );
+ }
+ catch ( EncoderException ee )
+ {
+ ee.printStackTrace();
+ Assert.fail( ee.getMessage() );
+ }
}
/**
@@ -232,7 +250,7 @@
0x02, 0x02, 0x03, (byte)0xE8,
// timeLimit INTEGER (0 .. maxInt), (1000)
0x02, 0x02, 0x03, (byte)0xE8,
- 0x01, 0x01, 0x3E, // typesOnly BOOLEAN, (TRUE)
+ 0x01, 0x01, (byte)0xFF, // typesOnly BOOLEAN, (TRUE)
// filter Filter,
(byte)0xA0, 0x3C, // Filter ::= CHOICE {
// and [0] SET OF Filter,
@@ -262,6 +280,7 @@
0x04, 0x05, 'a', 't', 't', 'r', '2' // AttributeDescription ::= LDAPString
} );
+ String decodedPdu = StringUtils.dumpBytes( stream.array() );
stream.flip();
// Allocate a BindRequest Container
@@ -347,6 +366,21 @@
// Check the length
Assert.assertEquals(0x90, message.computeLength());
+
+ // Check the encoding
+ try
+ {
+ ByteBuffer bb = message.encode( null );
+
+ String encodedPdu = StringUtils.dumpBytes( bb.array() );
+
+ Assert.assertEquals(encodedPdu, decodedPdu );
+ }
+ catch ( EncoderException ee )
+ {
+ ee.printStackTrace();
+ Assert.fail( ee.getMessage() );
+ }
}
/**
@@ -383,7 +417,7 @@
0x02, 0x02, 0x03, (byte)0xE8,
// timeLimit INTEGER (0 .. maxInt), (1000)
0x02, 0x02, 0x03, (byte)0xE8,
- 0x01, 0x01, 0x3E, // typesOnly BOOLEAN, (TRUE)
+ 0x01, 0x01, (byte)0xFF, // typesOnly BOOLEAN, (TRUE)
// filter Filter,
(byte)0xA0, 0x29, // Filter ::= CHOICE {
// and [0] SET OF Filter,
@@ -408,6 +442,7 @@
0x04, 0x05, 'a', 't', 't', 'r', '2' // AttributeDescription ::= LDAPString
} );
+ String decodedPdu = StringUtils.dumpBytes( stream.array() );
stream.flip();
// Allocate a BindRequest Container
@@ -486,6 +521,21 @@
// Check the length
Assert.assertEquals(0x7B, message.computeLength());
+
+ // Check the encoding
+ try
+ {
+ ByteBuffer bb = message.encode( null );
+
+ String encodedPdu = StringUtils.dumpBytes( bb.array() );
+
+ Assert.assertEquals(encodedPdu, decodedPdu );
+ }
+ catch ( EncoderException ee )
+ {
+ ee.printStackTrace();
+ Assert.fail( ee.getMessage() );
+ }
}
/**
@@ -521,7 +571,7 @@
0x02, 0x02, 0x03, (byte)0xE8,
// timeLimit INTEGER (0 .. maxInt), (1000)
0x02, 0x02, 0x03, (byte)0xE8,
- 0x01, 0x01, 0x3E, // typesOnly BOOLEAN, (TRUE)
+ 0x01, 0x01, (byte)0xFF, // typesOnly BOOLEAN, (TRUE)
// filter Filter,
(byte)0xA4, 0x12, // Filter ::= CHOICE {
// substrings [4] SubstringFilter
@@ -537,6 +587,7 @@
0x04, 0x05, 'a', 't', 't', 'r', '2' // AttributeDescription ::= LDAPString
} );
+ String decodedPdu = StringUtils.dumpBytes( stream.array() );
stream.flip();
// Allocate a BindRequest Container
@@ -582,6 +633,21 @@
// Check the length
Assert.assertEquals(0x64, message.computeLength());
+
+ // Check the encoding
+ try
+ {
+ ByteBuffer bb = message.encode( null );
+
+ String encodedPdu = StringUtils.dumpBytes( bb.array() );
+
+ Assert.assertEquals(encodedPdu, decodedPdu );
+ }
+ catch ( EncoderException ee )
+ {
+ ee.printStackTrace();
+ Assert.fail( ee.getMessage() );
+ }
}
/**
@@ -617,7 +683,7 @@
0x02, 0x02, 0x03, (byte)0xE8,
// timeLimit INTEGER (0 .. maxInt), (1000)
0x02, 0x02, 0x03, (byte)0xE8,
- 0x01, 0x01, 0x3E, // typesOnly BOOLEAN, (TRUE)
+ 0x01, 0x01, (byte)0xFF, // typesOnly BOOLEAN, (TRUE)
// filter Filter,
(byte)0xA4, 0x12, // Filter ::= CHOICE {
// substrings [4] SubstringFilter
@@ -633,6 +699,7 @@
0x04, 0x05, 'a', 't', 't', 'r', '2' // AttributeDescription ::= LDAPString
} );
+ String decodedPdu = StringUtils.dumpBytes( stream.array() );
stream.flip();
// Allocate a BindRequest Container
@@ -680,6 +747,21 @@
// Check the length
Assert.assertEquals(0x64, message.computeLength());
+
+ // Check the encoding
+ try
+ {
+ ByteBuffer bb = message.encode( null );
+
+ String encodedPdu = StringUtils.dumpBytes( bb.array() );
+
+ Assert.assertEquals(encodedPdu, decodedPdu );
+ }
+ catch ( EncoderException ee )
+ {
+ ee.printStackTrace();
+ Assert.fail( ee.getMessage() );
+ }
}
/**
@@ -715,7 +797,7 @@
0x02, 0x02, 0x03, (byte)0xE8,
// timeLimit INTEGER (0 .. maxInt), (1000)
0x02, 0x02, 0x03, (byte)0xE8,
- 0x01, 0x01, 0x3E, // typesOnly BOOLEAN, (TRUE)
+ 0x01, 0x01, (byte)0xFF, // typesOnly BOOLEAN, (TRUE)
// filter Filter,
(byte)0xA4, 0x15, // Filter ::= CHOICE {
// substrings [4] SubstringFilter
@@ -732,6 +814,7 @@
0x04, 0x05, 'a', 't', 't', 'r', '2' // AttributeDescription ::= LDAPString
} );
+ String decodedPdu = StringUtils.dumpBytes( stream.array() );
stream.flip();
// Allocate a BindRequest Container
@@ -779,6 +862,21 @@
// Check the length
Assert.assertEquals(0x67, message.computeLength());
+
+ // Check the encoding
+ try
+ {
+ ByteBuffer bb = message.encode( null );
+
+ String encodedPdu = StringUtils.dumpBytes( bb.array() );
+
+ Assert.assertEquals(encodedPdu, decodedPdu );
+ }
+ catch ( EncoderException ee )
+ {
+ ee.printStackTrace();
+ Assert.fail( ee.getMessage() );
+ }
}
/**
@@ -814,7 +912,7 @@
0x02, 0x02, 0x03, (byte)0xE8,
// timeLimit INTEGER (0 .. maxInt), (1000)
0x02, 0x02, 0x03, (byte)0xE8,
- 0x01, 0x01, 0x3E, // typesOnly BOOLEAN, (TRUE)
+ 0x01, 0x01, (byte)0xFF, // typesOnly BOOLEAN, (TRUE)
// filter Filter,
(byte)0xA4, 0x18, // Filter ::= CHOICE {
// substrings [4] SubstringFilter
@@ -832,6 +930,7 @@
0x04, 0x05, 'a', 't', 't', 'r', '2' // AttributeDescription ::= LDAPString
} );
+ String decodedPdu = StringUtils.dumpBytes( stream.array() );
stream.flip();
// Allocate a BindRequest Container
@@ -879,6 +978,21 @@
// Check the length
Assert.assertEquals(0x6A, message.computeLength());
+
+ // Check the encoding
+ try
+ {
+ ByteBuffer bb = message.encode( null );
+
+ String encodedPdu = StringUtils.dumpBytes( bb.array() );
+
+ Assert.assertEquals(encodedPdu, decodedPdu );
+ }
+ catch ( EncoderException ee )
+ {
+ ee.printStackTrace();
+ Assert.fail( ee.getMessage() );
+ }
}
/**
@@ -914,7 +1028,7 @@
0x02, 0x02, 0x03, (byte)0xE8,
// timeLimit INTEGER (0 .. maxInt), (1000)
0x02, 0x02, 0x03, (byte)0xE8,
- 0x01, 0x01, 0x3E, // typesOnly BOOLEAN, (TRUE)
+ 0x01, 0x01, (byte)0xFF, // typesOnly BOOLEAN, (TRUE)
// filter Filter,
(byte)0xA4, 0x15, // Filter ::= CHOICE {
// substrings [4] SubstringFilter
@@ -931,6 +1045,7 @@
0x04, 0x05, 'a', 't', 't', 'r', '2' // AttributeDescription ::= LDAPString
} );
+ String decodedPdu = StringUtils.dumpBytes( stream.array() );
stream.flip();
// Allocate a BindRequest Container
@@ -977,6 +1092,21 @@
// Check the length
Assert.assertEquals(0x67, message.computeLength());
+
+ // Check the encoding
+ try
+ {
+ ByteBuffer bb = message.encode( null );
+
+ String encodedPdu = StringUtils.dumpBytes( bb.array() );
+
+ Assert.assertEquals(encodedPdu, decodedPdu );
+ }
+ catch ( EncoderException ee )
+ {
+ ee.printStackTrace();
+ Assert.fail( ee.getMessage() );
+ }
}
/**
@@ -1012,7 +1142,7 @@
0x02, 0x02, 0x03, (byte)0xE8,
// timeLimit INTEGER (0 .. maxInt), (1000)
0x02, 0x02, 0x03, (byte)0xE8,
- 0x01, 0x01, 0x3E, // typesOnly BOOLEAN, (TRUE)
+ 0x01, 0x01, (byte)0xFF, // typesOnly BOOLEAN, (TRUE)
// filter Filter,
(byte)0xA4, 0x18, // Filter ::= CHOICE {
// substrings [4] SubstringFilter
@@ -1030,6 +1160,7 @@
0x04, 0x05, 'a', 't', 't', 'r', '2' // AttributeDescription ::= LDAPString
} );
+ String decodedPdu = StringUtils.dumpBytes( stream.array() );
stream.flip();
// Allocate a BindRequest Container
@@ -1078,6 +1209,21 @@
// Check the length
Assert.assertEquals(0x6A, message.computeLength());
+
+ // Check the encoding
+ try
+ {
+ ByteBuffer bb = message.encode( null );
+
+ String encodedPdu = StringUtils.dumpBytes( bb.array() );
+
+ Assert.assertEquals(encodedPdu, decodedPdu );
+ }
+ catch ( EncoderException ee )
+ {
+ ee.printStackTrace();
+ Assert.fail( ee.getMessage() );
+ }
}
/**
@@ -1113,7 +1259,7 @@
0x02, 0x02, 0x03, (byte)0xE8,
// timeLimit INTEGER (0 .. maxInt), (1000)
0x02, 0x02, 0x03, (byte)0xE8,
- 0x01, 0x01, 0x3E, // typesOnly BOOLEAN, (TRUE)
+ 0x01, 0x01, (byte)0xFF, // typesOnly BOOLEAN, (TRUE)
// filter Filter,
(byte)0xA4, 0x15, // Filter ::= CHOICE {
// substrings [4] SubstringFilter
@@ -1130,6 +1276,7 @@
0x04, 0x05, 'a', 't', 't', 'r', '2' // AttributeDescription ::= LDAPString
} );
+ String decodedPdu = StringUtils.dumpBytes( stream.array() );
stream.flip();
// Allocate a BindRequest Container
@@ -1176,6 +1323,21 @@
// Check the length
Assert.assertEquals(0x67, message.computeLength());
+
+ // Check the encoding
+ try
+ {
+ ByteBuffer bb = message.encode( null );
+
+ String encodedPdu = StringUtils.dumpBytes( bb.array() );
+
+ Assert.assertEquals(encodedPdu, decodedPdu );
+ }
+ catch ( EncoderException ee )
+ {
+ ee.printStackTrace();
+ Assert.fail( ee.getMessage() );
+ }
}
/**
@@ -1198,11 +1360,11 @@
0x04, 0x1F, // baseObject LDAPDN,
'u', 'i', 'd', '=', 'a', 'k', 'a', 'r', 'a', 's', 'u', 'l', 'u', ',', 'd', 'c', '=',
'e', 'x', 'a', 'm', 'p', 'l', 'e', ',', 'd', 'c', '=', 'c', 'o', 'm',
- 0x0A, 0x01, 0x01, // scope ENUMERATED {
+ 0x0A, 0x01, 0x01, // scope ENUMERATED {
// baseObject (0),
// singleLevel (1),
// wholeSubtree (2) },
- 0x0A, 0x01, 0x03, // derefAliases ENUMERATED {
+ 0x0A, 0x01, 0x03, // derefAliases ENUMERATED {
// neverDerefAliases (0),
// derefInSearching (1),
// derefFindingBaseObj (2),
@@ -1211,24 +1373,25 @@
0x02, 0x02, 0x03, (byte)0xE8,
// timeLimit INTEGER (0 .. maxInt), (1000)
0x02, 0x02, 0x03, (byte)0xE8,
- 0x01, 0x01, 0x3E, // typesOnly BOOLEAN, (TRUE)
+ 0x01, 0x01, (byte)0xFF, // typesOnly BOOLEAN, (TRUE)
// filter Filter,
- (byte)0xA4, 0x18, // Filter ::= CHOICE {
+ (byte)0xA4, 0x18, // Filter ::= CHOICE {
// substrings [4] SubstringFilter
// }
// SubstringFilter ::= SEQUENCE {
- 0x04, 0x0B, // type AttributeDescription,
+ 0x04, 0x0B, // type AttributeDescription,
'o', 'b', 'j', 'e', 'c', 't', 'c', 'l', 'a', 's', 's',
0x30, 0x09,
- (byte)0x81, 0x01, 't', //
- (byte)0x81, 0x01, 't', //
- (byte)0x81, 0x01, 't', //
+ (byte)0x81, 0x01, 't', //
+ (byte)0x81, 0x01, 't', //
+ (byte)0x81, 0x01, 't', //
0x30, 0x15, // AttributeDescriptionList ::= SEQUENCE OF AttributeDescription
0x04, 0x05, 'a', 't', 't', 'r', '0', // AttributeDescription ::= LDAPString
0x04, 0x05, 'a', 't', 't', 'r', '1', // AttributeDescription ::= LDAPString
0x04, 0x05, 'a', 't', 't', 'r', '2' // AttributeDescription ::= LDAPString
} );
+ String decodedPdu = StringUtils.dumpBytes( stream.array() );
stream.flip();
// Allocate a BindRequest Container
@@ -1278,6 +1441,21 @@
// Check the length
Assert.assertEquals(0x6A, message.computeLength());
+
+ // Check the encoding
+ try
+ {
+ ByteBuffer bb = message.encode( null );
+
+ String encodedPdu = StringUtils.dumpBytes( bb.array() );
+
+ Assert.assertEquals(encodedPdu, decodedPdu );
+ }
+ catch ( EncoderException ee )
+ {
+ ee.printStackTrace();
+ Assert.fail( ee.getMessage() );
+ }
}
/**
@@ -1322,6 +1500,7 @@
0x04, 0x05, 0x61, 0x74, 0x74, 0x72, 0x32 // attr2
} );
+ String decodedPdu = StringUtils.dumpBytes( stream.array() );
stream.flip();
// Allocate a BindRequest Container
@@ -1394,6 +1573,21 @@
// Check the length
Assert.assertEquals(0x96, message.computeLength());
+
+ // Check the encoding
+ try
+ {
+ ByteBuffer bb = message.encode( null );
+
+ String encodedPdu = StringUtils.dumpBytes( bb.array() );
+
+ Assert.assertEquals(encodedPdu, decodedPdu );
+ }
+ catch ( EncoderException ee )
+ {
+ ee.printStackTrace();
+ Assert.fail( ee.getMessage() );
+ }
}
/**
@@ -1430,6 +1624,7 @@
0x04, 0x05, 0x61, 0x74, 0x74, 0x72, 0x32 // attr2
} );
+ String decodedPdu = StringUtils.dumpBytes( stream.array() );
stream.flip();
// Allocate a BindRequest Container
@@ -1466,6 +1661,22 @@
Assert.assertEquals("attr" + i, attribute.toString());
}
- // Check the length675, message.computeLength());
+ // Check the length
+ Assert.assertEquals(0x65, message.computeLength());
+
+ // Check the encoding
+ try
+ {
+ ByteBuffer bb = message.encode( null );
+
+ String encodedPdu = StringUtils.dumpBytes( bb.array() );
+
+ Assert.assertEquals(encodedPdu, decodedPdu );
+ }
+ catch ( EncoderException ee )
+ {
+ ee.printStackTrace();
+ Assert.fail( ee.getMessage() );
+ }
}
}