aboutsummaryrefslogtreecommitdiff
path: root/components/service/locator/test/sn_tests.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'components/service/locator/test/sn_tests.cpp')
-rw-r--r--components/service/locator/test/sn_tests.cpp91
1 files changed, 91 insertions, 0 deletions
diff --git a/components/service/locator/test/sn_tests.cpp b/components/service/locator/test/sn_tests.cpp
new file mode 100644
index 000000000..4f8630aeb
--- /dev/null
+++ b/components/service/locator/test/sn_tests.cpp
@@ -0,0 +1,91 @@
+/*
+ * Copyright (c) 2020, Arm Limited and Contributors. All rights reserved.
+ *
+ * SPDX-License-Identifier: BSD-3-Clause
+ */
+
+#include <service/locator/service_name.h>
+#include <CppUTest/TestHarness.h>
+#include <common/uuid/uuid.h>
+#include <string.h>
+
+TEST_GROUP(ServiceNameTests) {
+
+};
+
+TEST(ServiceNameTests, checkValidServiceNames) {
+
+ const char *sn1 = "sn:trustedfirmware.org:crypto:0";
+ CHECK(sn_is_valid(sn1));
+
+ const char *sn2 = "sn:trustedfirmware.org:secure-storage.1.0:0";
+ CHECK(sn_is_valid(sn2));
+
+ const char *sn3 = "urn:sn:trustedfirmware.org:tpm:3";
+ CHECK(sn_is_valid(sn3));
+
+ const char *sn4 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:0";
+ CHECK(sn_is_valid(sn4));
+
+ const char *sn5 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0";
+ CHECK(sn_is_valid(sn5));
+}
+
+TEST(ServiceNameTests, checkInvalidServiceNames) {
+
+ const char *sn1 = "sn:trustedfirmware.org";
+ CHECK(!sn_is_valid(sn1));
+
+ const char *sn2 = "trustedfirmware.org:secure-storage.1.0:0";
+ CHECK(!sn_is_valid(sn2));
+}
+
+TEST(ServiceNameTests, checkFields) {
+
+ const char *sn1 = "sn:trustedfirmware.org:crypto:2";
+ CHECK(sn_check_authority(sn1, "trustedfirmware.org"));
+ CHECK(!sn_check_authority(sn1, "ffa"));
+ CHECK(sn_check_service(sn1, "crypto"));
+ CHECK_EQUAL(2, sn_get_service_instance(sn1));
+
+ const char *sn2 = "sn:trustedfirmware.org:secure-storage.1.0:0";
+ CHECK(sn_check_authority(sn2, "trustedfirmware.org"));
+ CHECK(sn_check_service(sn2, "secure-storage.1.0"));
+ CHECK(sn_check_service(sn2, "secure-storage"));
+ CHECK_EQUAL(0, sn_get_service_instance(sn2));
+
+ const char *sn3 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:7";
+ CHECK(sn_check_authority(sn3, "ffa"));
+ CHECK(sn_check_service(sn3, "d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0"));
+ CHECK_EQUAL(7, sn_get_service_instance(sn3));
+
+ /* Check instance defaults to zero */
+ const char *sn4 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0";
+ CHECK(sn_is_valid(sn4));
+ CHECK_EQUAL(0, sn_get_service_instance(sn4));
+}
+
+TEST(ServiceNameTests, readService) {
+
+ char buf[UUID_CANONICAL_FORM_LEN + 1];
+
+ const char *sn1 = "sn:trustedfirmware.org:crypto:2";
+ CHECK_EQUAL(strlen("crypto"), sn_read_service(sn1, buf, sizeof(buf)));
+ CHECK(memcmp(buf, "crypto", strlen("crypto") + 1) == 0);
+ CHECK_EQUAL(strlen("crypto"), strlen(buf));
+
+ const char *sn2 = "sn:trustedfirmware.org:crypto.1.7.0:2";
+ CHECK_EQUAL(strlen("crypto.1.7.0"), sn_read_service(sn2, buf, sizeof(buf)));
+ CHECK(memcmp(buf, "crypto.1.7.0", strlen("crypto.1.7.0") + 1) == 0);
+ CHECK_EQUAL(strlen("crypto.1.7.0"), strlen(buf));
+
+ const char *sn3 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:7";
+ CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, sn_read_service(sn3, buf, sizeof(buf)));
+ CHECK(memcmp(buf, "d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0", UUID_CANONICAL_FORM_LEN + 1) == 0);
+ CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, strlen(buf));
+
+ const char *sn4 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0";
+ CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, sn_read_service(sn4, buf, sizeof(buf)));
+ CHECK(memcmp(buf, "d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0", UUID_CANONICAL_FORM_LEN + 1) == 0);
+ CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, strlen(buf));
+} \ No newline at end of file