Julian Hall | 8cff2b8 | 2020-11-23 18:12:17 +0100 | [diff] [blame] | 1 | /* |
Gabor Ambrus | ec1233e | 2023-03-09 02:52:03 +0100 | [diff] [blame^] | 2 | * Copyright (c) 2020-2023, Arm Limited and Contributors. All rights reserved. |
Julian Hall | 8cff2b8 | 2020-11-23 18:12:17 +0100 | [diff] [blame] | 3 | * |
| 4 | * SPDX-License-Identifier: BSD-3-Clause |
| 5 | */ |
| 6 | |
| 7 | #include <service/locator/service_name.h> |
| 8 | #include <CppUTest/TestHarness.h> |
| 9 | #include <common/uuid/uuid.h> |
| 10 | #include <string.h> |
| 11 | |
| 12 | TEST_GROUP(ServiceNameTests) { |
| 13 | |
| 14 | }; |
| 15 | |
| 16 | TEST(ServiceNameTests, checkValidServiceNames) { |
| 17 | |
| 18 | const char *sn1 = "sn:trustedfirmware.org:crypto:0"; |
| 19 | CHECK(sn_is_valid(sn1)); |
| 20 | |
| 21 | const char *sn2 = "sn:trustedfirmware.org:secure-storage.1.0:0"; |
| 22 | CHECK(sn_is_valid(sn2)); |
| 23 | |
| 24 | const char *sn3 = "urn:sn:trustedfirmware.org:tpm:3"; |
| 25 | CHECK(sn_is_valid(sn3)); |
| 26 | |
| 27 | const char *sn4 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:0"; |
| 28 | CHECK(sn_is_valid(sn4)); |
| 29 | |
| 30 | const char *sn5 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0"; |
| 31 | CHECK(sn_is_valid(sn5)); |
| 32 | } |
| 33 | |
| 34 | TEST(ServiceNameTests, checkInvalidServiceNames) { |
| 35 | |
| 36 | const char *sn1 = "sn:trustedfirmware.org"; |
| 37 | CHECK(!sn_is_valid(sn1)); |
| 38 | |
| 39 | const char *sn2 = "trustedfirmware.org:secure-storage.1.0:0"; |
| 40 | CHECK(!sn_is_valid(sn2)); |
Gabor Ambrus | ec1233e | 2023-03-09 02:52:03 +0100 | [diff] [blame^] | 41 | |
| 42 | const char *sn3 = "urn:trustedfirmware.org:tpm"; |
| 43 | CHECK(!sn_is_valid(sn3)); |
| 44 | |
| 45 | const char *sn4 = "sn:"; |
| 46 | CHECK(!sn_is_valid(sn4)); |
| 47 | |
| 48 | const char *sn5 = "sn"; |
| 49 | CHECK(!sn_is_valid(sn5)); |
Julian Hall | 8cff2b8 | 2020-11-23 18:12:17 +0100 | [diff] [blame] | 50 | } |
| 51 | |
| 52 | TEST(ServiceNameTests, checkFields) { |
| 53 | |
| 54 | const char *sn1 = "sn:trustedfirmware.org:crypto:2"; |
| 55 | CHECK(sn_check_authority(sn1, "trustedfirmware.org")); |
| 56 | CHECK(!sn_check_authority(sn1, "ffa")); |
| 57 | CHECK(sn_check_service(sn1, "crypto")); |
| 58 | CHECK_EQUAL(2, sn_get_service_instance(sn1)); |
| 59 | |
| 60 | const char *sn2 = "sn:trustedfirmware.org:secure-storage.1.0:0"; |
| 61 | CHECK(sn_check_authority(sn2, "trustedfirmware.org")); |
| 62 | CHECK(sn_check_service(sn2, "secure-storage.1.0")); |
| 63 | CHECK(sn_check_service(sn2, "secure-storage")); |
| 64 | CHECK_EQUAL(0, sn_get_service_instance(sn2)); |
| 65 | |
Julian Hall | 7d7b24c | 2021-08-13 13:40:38 +0100 | [diff] [blame] | 66 | const char *sn3 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:77"; |
Julian Hall | 8cff2b8 | 2020-11-23 18:12:17 +0100 | [diff] [blame] | 67 | CHECK(sn_check_authority(sn3, "ffa")); |
| 68 | CHECK(sn_check_service(sn3, "d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0")); |
Julian Hall | 7d7b24c | 2021-08-13 13:40:38 +0100 | [diff] [blame] | 69 | CHECK_EQUAL(77, sn_get_service_instance(sn3)); |
Julian Hall | 8cff2b8 | 2020-11-23 18:12:17 +0100 | [diff] [blame] | 70 | |
| 71 | /* Check instance defaults to zero */ |
| 72 | const char *sn4 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0"; |
| 73 | CHECK(sn_is_valid(sn4)); |
| 74 | CHECK_EQUAL(0, sn_get_service_instance(sn4)); |
Gabor Ambrus | ec1233e | 2023-03-09 02:52:03 +0100 | [diff] [blame^] | 75 | |
| 76 | /* Check instance is zero when contains non-number characters */ |
| 77 | const char *sn5 = "sn:trustedfirmware.org:secure-storage.1.0:0xbeef9"; |
| 78 | CHECK(sn_is_valid(sn5)); |
| 79 | CHECK_EQUAL(0, sn_get_service_instance(sn5)); |
| 80 | |
| 81 | /* Checks with invalid service names */ |
| 82 | const char *sn6 = "trustedfirmware.org:secure-storage"; |
| 83 | CHECK(!sn_check_authority(sn6, "trustedfirmware.org")); |
| 84 | CHECK(!sn_check_service(sn6, "secure-storage")); |
| 85 | CHECK_EQUAL(0, sn_get_service_instance(sn6)); |
| 86 | |
| 87 | const char *sn7 = "sn::secure-storage"; |
| 88 | CHECK(!sn_check_authority(sn7, "")); |
| 89 | |
| 90 | const char *sn8 = "sn:trustedfirmware.org:"; |
| 91 | CHECK(!sn_check_service(sn8, "")); |
Julian Hall | 8cff2b8 | 2020-11-23 18:12:17 +0100 | [diff] [blame] | 92 | } |
| 93 | |
| 94 | TEST(ServiceNameTests, readService) { |
| 95 | |
| 96 | char buf[UUID_CANONICAL_FORM_LEN + 1]; |
| 97 | |
| 98 | const char *sn1 = "sn:trustedfirmware.org:crypto:2"; |
| 99 | CHECK_EQUAL(strlen("crypto"), sn_read_service(sn1, buf, sizeof(buf))); |
| 100 | CHECK(memcmp(buf, "crypto", strlen("crypto") + 1) == 0); |
| 101 | CHECK_EQUAL(strlen("crypto"), strlen(buf)); |
| 102 | |
| 103 | const char *sn2 = "sn:trustedfirmware.org:crypto.1.7.0:2"; |
| 104 | CHECK_EQUAL(strlen("crypto.1.7.0"), sn_read_service(sn2, buf, sizeof(buf))); |
| 105 | CHECK(memcmp(buf, "crypto.1.7.0", strlen("crypto.1.7.0") + 1) == 0); |
| 106 | CHECK_EQUAL(strlen("crypto.1.7.0"), strlen(buf)); |
| 107 | |
| 108 | const char *sn3 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0:7"; |
| 109 | CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, sn_read_service(sn3, buf, sizeof(buf))); |
| 110 | CHECK(memcmp(buf, "d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0", UUID_CANONICAL_FORM_LEN + 1) == 0); |
| 111 | CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, strlen(buf)); |
| 112 | |
| 113 | const char *sn4 = "sn:ffa:d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0"; |
| 114 | CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, sn_read_service(sn4, buf, sizeof(buf))); |
| 115 | CHECK(memcmp(buf, "d9df52d5-16a2-4bb2-9aa4-d26d3b84e8c0", UUID_CANONICAL_FORM_LEN + 1) == 0); |
| 116 | CHECK_EQUAL(UUID_CANONICAL_FORM_LEN, strlen(buf)); |
Gabor Ambrus | ec1233e | 2023-03-09 02:52:03 +0100 | [diff] [blame^] | 117 | |
| 118 | /* Checks with invalid service name */ |
| 119 | const char *sn5 = "trustedfirmware.org:crypto.1.7.0"; |
| 120 | CHECK_EQUAL(0, sn_read_service(sn5, buf, sizeof(buf))); |
| 121 | |
| 122 | /* Check when buffer is smaller than service name */ |
| 123 | static size_t SIZE = 4; |
| 124 | char buf2[SIZE]; |
| 125 | const char *sn6 = "sn:trustedfirmware.org:crypto.1.7.0:2"; |
| 126 | CHECK_EQUAL(0, sn_read_service(sn6, buf2, SIZE)); |
Julian Hall | 7d7b24c | 2021-08-13 13:40:38 +0100 | [diff] [blame] | 127 | } |