Add service locator component

Change-Id: I58ad588deff3c0904b3ba8b9162b20440e9ff7d3
Signed-off-by: Julian Hall <julian.hall@arm.com>
diff --git a/components/service/locator/test/sn_tests.cpp b/components/service/locator/test/sn_tests.cpp
new file mode 100644
index 0000000..4f8630a
--- /dev/null
+++ b/components/service/locator/test/sn_tests.cpp
@@ -0,0 +1,91 @@
+/*
+ * Copyright (c) 2020, Arm Limited and Contributors. All rights reserved.
+ *
+ * SPDX-License-Identifier: BSD-3-Clause
+ */
+
+#include <service/locator/service_name.h>
+#include <CppUTest/TestHarness.h>
+#include <common/uuid/uuid.h>
+#include <string.h>
+
+TEST_GROUP(ServiceNameTests) {
+
+};
+
+TEST(ServiceNameTests, checkValidServiceNames) {
+
+    const char *sn1 = "sn:trustedfirmware.org:crypto:0";
+    CHECK(sn_is_valid(sn1));
+
+    const char *sn2 = "sn:trustedfirmware.org:secure-storage.1.0:0";
+    CHECK(sn_is_valid(sn2));
+
+    const char *sn3 = "urn:sn:trustedfirmware.org:tpm:3";
+    CHECK(sn_is_valid(sn3));
+
+    const char *sn4 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:0";
+    CHECK(sn_is_valid(sn4));
+
+    const char *sn5 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0";
+    CHECK(sn_is_valid(sn5));
+}
+
+TEST(ServiceNameTests, checkInvalidServiceNames) {
+
+    const char *sn1 = "sn:trustedfirmware.org";
+    CHECK(!sn_is_valid(sn1));
+
+    const char *sn2 = "trustedfirmware.org:secure-storage.1.0:0";
+    CHECK(!sn_is_valid(sn2));
+}
+
+TEST(ServiceNameTests, checkFields) {
+
+    const char *sn1 = "sn:trustedfirmware.org:crypto:2";
+    CHECK(sn_check_authority(sn1, "trustedfirmware.org"));
+    CHECK(!sn_check_authority(sn1, "ffa"));
+    CHECK(sn_check_service(sn1, "crypto"));
+    CHECK_EQUAL(2, sn_get_service_instance(sn1));
+
+    const char *sn2 = "sn:trustedfirmware.org:secure-storage.1.0:0";
+    CHECK(sn_check_authority(sn2, "trustedfirmware.org"));
+    CHECK(sn_check_service(sn2, "secure-storage.1.0"));
+    CHECK(sn_check_service(sn2, "secure-storage"));
+    CHECK_EQUAL(0, sn_get_service_instance(sn2));
+
+    const char *sn3 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:7";
+    CHECK(sn_check_authority(sn3, "ffa"));
+    CHECK(sn_check_service(sn3, "d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0"));
+    CHECK_EQUAL(7, sn_get_service_instance(sn3));
+
+    /* Check instance defaults to zero */
+    const char *sn4 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0";
+    CHECK(sn_is_valid(sn4));
+    CHECK_EQUAL(0, sn_get_service_instance(sn4));
+}
+
+TEST(ServiceNameTests, readService) {
+
+    char buf[UUID_CANONICAL_FORM_LEN + 1];
+
+    const char *sn1 = "sn:trustedfirmware.org:crypto:2";
+    CHECK_EQUAL(strlen("crypto"), sn_read_service(sn1, buf, sizeof(buf)));
+    CHECK(memcmp(buf, "crypto", strlen("crypto") + 1) == 0);
+    CHECK_EQUAL(strlen("crypto"), strlen(buf));
+
+    const char *sn2 = "sn:trustedfirmware.org:crypto.1.7.0:2";
+    CHECK_EQUAL(strlen("crypto.1.7.0"), sn_read_service(sn2, buf, sizeof(buf)));
+    CHECK(memcmp(buf, "crypto.1.7.0", strlen("crypto.1.7.0") + 1) == 0);
+    CHECK_EQUAL(strlen("crypto.1.7.0"), strlen(buf));
+
+    const char *sn3 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:7";
+    CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, sn_read_service(sn3, buf, sizeof(buf)));
+    CHECK(memcmp(buf, "d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0", UUID_CANONICAL_FORM_LEN + 1) == 0);
+    CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, strlen(buf));
+
+    const char *sn4 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0";
+    CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, sn_read_service(sn4, buf, sizeof(buf)));
+    CHECK(memcmp(buf, "d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0", UUID_CANONICAL_FORM_LEN + 1) == 0);
+    CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, strlen(buf));
+}
\ No newline at end of file