blob: 372dfe721c3f53acc5bc6e5cb02a34be9432c58d [file] [log] [blame]
Julian Hall8cff2b82020-11-23 18:12:17 +01001/*
Gabor Ambrusec1233e2023-03-09 02:52:03 +01002 * Copyright (c) 2020-2023, Arm Limited and Contributors. All rights reserved.
Julian Hall8cff2b82020-11-23 18:12:17 +01003 *
4 * SPDX-License-Identifier: BSD-3-Clause
5 */
6
7#include <service/locator/service_name.h>
8#include <CppUTest/TestHarness.h>
9#include <common/uuid/uuid.h>
10#include <string.h>
11
12TEST_GROUP(ServiceNameTests) {
13
14};
15
16TEST(ServiceNameTests, checkValidServiceNames) {
17
18 const char *sn1 = "sn:trustedfirmware.org:crypto:0";
19 CHECK(sn_is_valid(sn1));
20
21 const char *sn2 = "sn:trustedfirmware.org:secure-storage.1.0:0";
22 CHECK(sn_is_valid(sn2));
23
24 const char *sn3 = "urn:sn:trustedfirmware.org:tpm:3";
25 CHECK(sn_is_valid(sn3));
26
27 const char *sn4 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:0";
28 CHECK(sn_is_valid(sn4));
29
30 const char *sn5 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0";
31 CHECK(sn_is_valid(sn5));
32}
33
34TEST(ServiceNameTests, checkInvalidServiceNames) {
35
36 const char *sn1 = "sn:trustedfirmware.org";
37 CHECK(!sn_is_valid(sn1));
38
39 const char *sn2 = "trustedfirmware.org:secure-storage.1.0:0";
40 CHECK(!sn_is_valid(sn2));
Gabor Ambrusec1233e2023-03-09 02:52:03 +010041
42 const char *sn3 = "urn:trustedfirmware.org:tpm";
43 CHECK(!sn_is_valid(sn3));
44
45 const char *sn4 = "sn:";
46 CHECK(!sn_is_valid(sn4));
47
48 const char *sn5 = "sn";
49 CHECK(!sn_is_valid(sn5));
Julian Hall8cff2b82020-11-23 18:12:17 +010050}
51
52TEST(ServiceNameTests, checkFields) {
53
54 const char *sn1 = "sn:trustedfirmware.org:crypto:2";
55 CHECK(sn_check_authority(sn1, "trustedfirmware.org"));
56 CHECK(!sn_check_authority(sn1, "ffa"));
57 CHECK(sn_check_service(sn1, "crypto"));
58 CHECK_EQUAL(2, sn_get_service_instance(sn1));
59
60 const char *sn2 = "sn:trustedfirmware.org:secure-storage.1.0:0";
61 CHECK(sn_check_authority(sn2, "trustedfirmware.org"));
62 CHECK(sn_check_service(sn2, "secure-storage.1.0"));
63 CHECK(sn_check_service(sn2, "secure-storage"));
64 CHECK_EQUAL(0, sn_get_service_instance(sn2));
65
Julian Hall7d7b24c2021-08-13 13:40:38 +010066 const char *sn3 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:77";
Julian Hall8cff2b82020-11-23 18:12:17 +010067 CHECK(sn_check_authority(sn3, "ffa"));
68 CHECK(sn_check_service(sn3, "d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0"));
Julian Hall7d7b24c2021-08-13 13:40:38 +010069 CHECK_EQUAL(77, sn_get_service_instance(sn3));
Julian Hall8cff2b82020-11-23 18:12:17 +010070
71 /* Check instance defaults to zero */
72 const char *sn4 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0";
73 CHECK(sn_is_valid(sn4));
74 CHECK_EQUAL(0, sn_get_service_instance(sn4));
Gabor Ambrusec1233e2023-03-09 02:52:03 +010075
76 /* Check instance is zero when contains non-number characters */
77 const char *sn5 = "sn:trustedfirmware.org:secure-storage.1.0:0xbeef9";
78 CHECK(sn_is_valid(sn5));
79 CHECK_EQUAL(0, sn_get_service_instance(sn5));
80
81 /* Checks with invalid service names */
82 const char *sn6 = "trustedfirmware.org:secure-storage";
83 CHECK(!sn_check_authority(sn6, "trustedfirmware.org"));
84 CHECK(!sn_check_service(sn6, "secure-storage"));
85 CHECK_EQUAL(0, sn_get_service_instance(sn6));
86
87 const char *sn7 = "sn::secure-storage";
88 CHECK(!sn_check_authority(sn7, ""));
89
90 const char *sn8 = "sn:trustedfirmware.org:";
91 CHECK(!sn_check_service(sn8, ""));
Julian Hall8cff2b82020-11-23 18:12:17 +010092}
93
94TEST(ServiceNameTests, readService) {
95
96 char buf[UUID_CANONICAL_FORM_LEN + 1];
97
98 const char *sn1 = "sn:trustedfirmware.org:crypto:2";
99 CHECK_EQUAL(strlen("crypto"), sn_read_service(sn1, buf, sizeof(buf)));
100 CHECK(memcmp(buf, "crypto", strlen("crypto") + 1) == 0);
101 CHECK_EQUAL(strlen("crypto"), strlen(buf));
102
103 const char *sn2 = "sn:trustedfirmware.org:crypto.1.7.0:2";
104 CHECK_EQUAL(strlen("crypto.1.7.0"), sn_read_service(sn2, buf, sizeof(buf)));
105 CHECK(memcmp(buf, "crypto.1.7.0", strlen("crypto.1.7.0") + 1) == 0);
106 CHECK_EQUAL(strlen("crypto.1.7.0"), strlen(buf));
107
108 const char *sn3 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:7";
109 CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, sn_read_service(sn3, buf, sizeof(buf)));
110 CHECK(memcmp(buf, "d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0", UUID_CANONICAL_FORM_LEN + 1) == 0);
111 CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, strlen(buf));
112
113 const char *sn4 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0";
114 CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, sn_read_service(sn4, buf, sizeof(buf)));
115 CHECK(memcmp(buf, "d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0", UUID_CANONICAL_FORM_LEN + 1) == 0);
116 CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, strlen(buf));
Gabor Ambrusec1233e2023-03-09 02:52:03 +0100117
118 /* Checks with invalid service name */
119 const char *sn5 = "trustedfirmware.org:crypto.1.7.0";
120 CHECK_EQUAL(0, sn_read_service(sn5, buf, sizeof(buf)));
121
122 /* Check when buffer is smaller than service name */
123 static size_t SIZE = 4;
124 char buf2[SIZE];
125 const char *sn6 = "sn:trustedfirmware.org:crypto.1.7.0:2";
126 CHECK_EQUAL(0, sn_read_service(sn6, buf2, SIZE));
Julian Hall7d7b24c2021-08-13 13:40:38 +0100127}