diff options
Diffstat (limited to 'components/service/locator/test/sn_tests.cpp')
-rw-r--r-- | components/service/locator/test/sn_tests.cpp | 91 |
1 files changed, 91 insertions, 0 deletions
diff --git a/components/service/locator/test/sn_tests.cpp b/components/service/locator/test/sn_tests.cpp new file mode 100644 index 000000000..4f8630aeb --- /dev/null +++ b/components/service/locator/test/sn_tests.cpp @@ -0,0 +1,91 @@ +/* + * Copyright (c) 2020, Arm Limited and Contributors. All rights reserved. + * + * SPDX-License-Identifier: BSD-3-Clause + */ + +#include <service/locator/service_name.h> +#include <CppUTest/TestHarness.h> +#include <common/uuid/uuid.h> +#include <string.h> + +TEST_GROUP(ServiceNameTests) { + +}; + +TEST(ServiceNameTests, checkValidServiceNames) { + + const char *sn1 = "sn:trustedfirmware.org:crypto:0"; + CHECK(sn_is_valid(sn1)); + + const char *sn2 = "sn:trustedfirmware.org:secure-storage.1.0:0"; + CHECK(sn_is_valid(sn2)); + + const char *sn3 = "urn:sn:trustedfirmware.org:tpm:3"; + CHECK(sn_is_valid(sn3)); + + const char *sn4 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:0"; + CHECK(sn_is_valid(sn4)); + + const char *sn5 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0"; + CHECK(sn_is_valid(sn5)); +} + +TEST(ServiceNameTests, checkInvalidServiceNames) { + + const char *sn1 = "sn:trustedfirmware.org"; + CHECK(!sn_is_valid(sn1)); + + const char *sn2 = "trustedfirmware.org:secure-storage.1.0:0"; + CHECK(!sn_is_valid(sn2)); +} + +TEST(ServiceNameTests, checkFields) { + + const char *sn1 = "sn:trustedfirmware.org:crypto:2"; + CHECK(sn_check_authority(sn1, "trustedfirmware.org")); + CHECK(!sn_check_authority(sn1, "ffa")); + CHECK(sn_check_service(sn1, "crypto")); + CHECK_EQUAL(2, sn_get_service_instance(sn1)); + + const char *sn2 = "sn:trustedfirmware.org:secure-storage.1.0:0"; + CHECK(sn_check_authority(sn2, "trustedfirmware.org")); + CHECK(sn_check_service(sn2, "secure-storage.1.0")); + CHECK(sn_check_service(sn2, "secure-storage")); + CHECK_EQUAL(0, sn_get_service_instance(sn2)); + + const char *sn3 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:7"; + CHECK(sn_check_authority(sn3, "ffa")); + CHECK(sn_check_service(sn3, "d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0")); + CHECK_EQUAL(7, sn_get_service_instance(sn3)); + + /* Check instance defaults to zero */ + const char *sn4 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0"; + CHECK(sn_is_valid(sn4)); + CHECK_EQUAL(0, sn_get_service_instance(sn4)); +} + +TEST(ServiceNameTests, readService) { + + char buf[UUID_CANONICAL_FORM_LEN + 1]; + + const char *sn1 = "sn:trustedfirmware.org:crypto:2"; + CHECK_EQUAL(strlen("crypto"), sn_read_service(sn1, buf, sizeof(buf))); + CHECK(memcmp(buf, "crypto", strlen("crypto") + 1) == 0); + CHECK_EQUAL(strlen("crypto"), strlen(buf)); + + const char *sn2 = "sn:trustedfirmware.org:crypto.1.7.0:2"; + CHECK_EQUAL(strlen("crypto.1.7.0"), sn_read_service(sn2, buf, sizeof(buf))); + CHECK(memcmp(buf, "crypto.1.7.0", strlen("crypto.1.7.0") + 1) == 0); + CHECK_EQUAL(strlen("crypto.1.7.0"), strlen(buf)); + + const char *sn3 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:7"; + CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, sn_read_service(sn3, buf, sizeof(buf))); + CHECK(memcmp(buf, "d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0", UUID_CANONICAL_FORM_LEN + 1) == 0); + CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, strlen(buf)); + + const char *sn4 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0"; + CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, sn_read_service(sn4, buf, sizeof(buf))); + CHECK(memcmp(buf, "d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0", UUID_CANONICAL_FORM_LEN + 1) == 0); + CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, strlen(buf)); +}
\ No newline at end of file |