@@ -23,7 +23,7 @@ extern bool g_in_trusted_environment;
23
23
* Test 1: receives a valid SET_CERTIFICATE request message from Requester to set cert in slot_id:0 with device_cert model
24
24
* Expected Behavior: produces a valid SET_CERTIFICATE_RSP response message
25
25
**/
26
- void libspdm_test_responder_set_cetificate_rsp_case1 (void * * state )
26
+ void libspdm_test_responder_set_certificate_rsp_case1 (void * * state )
27
27
{
28
28
libspdm_return_t status ;
29
29
libspdm_test_context_t * spdm_test_context ;
@@ -156,7 +156,7 @@ void libspdm_test_responder_set_cetificate_rsp_case1(void **state)
156
156
* Test 2: Wrong SET_CERTIFICATE message size (larger than expected)
157
157
* Expected Behavior: generate an ERROR_RESPONSE with code SPDM_ERROR_CODE_INVALID_REQUEST
158
158
**/
159
- void libspdm_test_responder_set_cetificate_rsp_case2 (void * * state )
159
+ void libspdm_test_responder_set_certificate_rsp_case2 (void * * state )
160
160
{
161
161
libspdm_return_t status ;
162
162
libspdm_test_context_t * spdm_test_context ;
@@ -230,7 +230,7 @@ void libspdm_test_responder_set_cetificate_rsp_case2(void **state)
230
230
* Test 3: Force response_state = LIBSPDM_RESPONSE_STATE_BUSY when asked SET_CERTIFICATE
231
231
* Expected Behavior: generate an ERROR_RESPONSE with code SPDM_ERROR_CODE_BUSY
232
232
**/
233
- void libspdm_test_responder_set_cetificate_rsp_case3 (void * * state )
233
+ void libspdm_test_responder_set_certificate_rsp_case3 (void * * state )
234
234
{
235
235
libspdm_return_t status ;
236
236
libspdm_test_context_t * spdm_test_context ;
@@ -307,7 +307,7 @@ void libspdm_test_responder_set_cetificate_rsp_case3(void **state)
307
307
* Test 4: Force response_state = LIBSPDM_RESPONSE_STATE_NEED_RESYNC when asked SET_CERTIFICATE
308
308
* Expected Behavior: generate an ERROR_RESPONSE with code SPDM_ERROR_CODE_REQUEST_RESYNCH
309
309
**/
310
- void libspdm_test_responder_set_cetificate_rsp_case4 (void * * state )
310
+ void libspdm_test_responder_set_certificate_rsp_case4 (void * * state )
311
311
{
312
312
libspdm_return_t status ;
313
313
libspdm_test_context_t * spdm_test_context ;
@@ -383,7 +383,7 @@ void libspdm_test_responder_set_cetificate_rsp_case4(void **state)
383
383
* Test 5: receives a valid SET_CERTIFICATE request message from Requester to set cert in slot_id:1 with session
384
384
* Expected Behavior: produces a valid SET_CERTIFICATE_RSP response message
385
385
**/
386
- void libspdm_test_responder_set_cetificate_rsp_case5 (void * * state )
386
+ void libspdm_test_responder_set_certificate_rsp_case5 (void * * state )
387
387
{
388
388
libspdm_return_t status ;
389
389
libspdm_test_context_t * spdm_test_context ;
@@ -469,7 +469,7 @@ void libspdm_test_responder_set_cetificate_rsp_case5(void **state)
469
469
* Test 6: receives a valid SET_CERTIFICATE request message from Requester with need_reset
470
470
* Expected Behavior: The Responder return need reset
471
471
**/
472
- void libspdm_test_responder_set_cetificate_rsp_case6 (void * * state )
472
+ void libspdm_test_responder_set_certificate_rsp_case6 (void * * state )
473
473
{
474
474
libspdm_return_t status ;
475
475
libspdm_test_context_t * spdm_test_context ;
@@ -544,7 +544,7 @@ void libspdm_test_responder_set_cetificate_rsp_case6(void **state)
544
544
* Test 7: receives a valid SET_CERTIFICATE request message from Requester to set cert in slot_id:0 with alias_cert model
545
545
* Expected Behavior: produces a valid SET_CERTIFICATE_RSP response message
546
546
**/
547
- void libspdm_test_responder_set_cetificate_rsp_case7 (void * * state )
547
+ void libspdm_test_responder_set_certificate_rsp_case7 (void * * state )
548
548
{
549
549
libspdm_return_t status ;
550
550
libspdm_test_context_t * spdm_test_context ;
@@ -620,7 +620,7 @@ void libspdm_test_responder_set_cetificate_rsp_case7(void **state)
620
620
* Test 8: receives a SET_CERTIFICATE request message to set cert in slot_id:1 without session and with trusted environment
621
621
* Expected Behavior: produces a valid SET_CERTIFICATE_RSP response message
622
622
**/
623
- void libspdm_test_responder_set_cetificate_rsp_case8 (void * * state )
623
+ void libspdm_test_responder_set_certificate_rsp_case8 (void * * state )
624
624
{
625
625
libspdm_return_t status ;
626
626
libspdm_test_context_t * spdm_test_context ;
@@ -695,7 +695,7 @@ void libspdm_test_responder_set_cetificate_rsp_case8(void **state)
695
695
* Test 9: receives a SET_CERTIFICATE request message to set cert in slot_id:1 without session and without trusted environment
696
696
* Expected Behavior: produces a valid ERROR response message
697
697
**/
698
- void libspdm_test_responder_set_cetificate_rsp_case9 (void * * state )
698
+ void libspdm_test_responder_set_certificate_rsp_case9 (void * * state )
699
699
{
700
700
libspdm_return_t status ;
701
701
libspdm_test_context_t * spdm_test_context ;
@@ -773,7 +773,7 @@ void libspdm_test_responder_set_cetificate_rsp_case9(void **state)
773
773
* Test 10: receives a valid SET_CERTIFICATE request message from Requester to erase cert in slot_id:1 with session
774
774
* Expected Behavior: produces a valid SET_CERTIFICATE_RSP response message
775
775
**/
776
- void libspdm_test_responder_set_cetificate_rsp_case10 (void * * state )
776
+ void libspdm_test_responder_set_certificate_rsp_case10 (void * * state )
777
777
{
778
778
libspdm_return_t status ;
779
779
libspdm_test_context_t * spdm_test_context ;
@@ -892,7 +892,7 @@ void libspdm_test_responder_set_cetificate_rsp_case10(void **state)
892
892
* Test 11: receives a valid SET_CERTIFICATE request message from Requester to set cert in slot_id:1 with key_pair_id
893
893
* Expected Behavior: produces a valid SET_CERTIFICATE_RSP response message
894
894
**/
895
- void libspdm_test_responder_set_cetificate_rsp_case11 (void * * state )
895
+ void libspdm_test_responder_set_certificate_rsp_case11 (void * * state )
896
896
{
897
897
libspdm_return_t status ;
898
898
libspdm_test_context_t * spdm_test_context ;
@@ -1041,29 +1041,29 @@ void libspdm_test_responder_set_certificate_rsp_case12(void **state)
1041
1041
1042
1042
int libspdm_responder_set_certificate_rsp_test_main (void )
1043
1043
{
1044
- const struct CMUnitTest spdm_responder_set_cetificate_tests [] = {
1044
+ const struct CMUnitTest spdm_responder_set_certificate_tests [] = {
1045
1045
/* Success Case for set_certificate to slot_id:0 with device_cert mode*/
1046
- cmocka_unit_test (libspdm_test_responder_set_cetificate_rsp_case1 ),
1046
+ cmocka_unit_test (libspdm_test_responder_set_certificate_rsp_case1 ),
1047
1047
/* Bad request size*/
1048
- cmocka_unit_test (libspdm_test_responder_set_cetificate_rsp_case2 ),
1048
+ cmocka_unit_test (libspdm_test_responder_set_certificate_rsp_case2 ),
1049
1049
/* response_state: LIBSPDM_RESPONSE_STATE_BUSY*/
1050
- cmocka_unit_test (libspdm_test_responder_set_cetificate_rsp_case3 ),
1050
+ cmocka_unit_test (libspdm_test_responder_set_certificate_rsp_case3 ),
1051
1051
/* response_state: LIBSPDM_RESPONSE_STATE_NEED_RESYNC*/
1052
- cmocka_unit_test (libspdm_test_responder_set_cetificate_rsp_case4 ),
1052
+ cmocka_unit_test (libspdm_test_responder_set_certificate_rsp_case4 ),
1053
1053
/* Success Case for set_certificate to slot_id:1 with session*/
1054
- cmocka_unit_test (libspdm_test_responder_set_cetificate_rsp_case5 ),
1054
+ cmocka_unit_test (libspdm_test_responder_set_certificate_rsp_case5 ),
1055
1055
/* Responder requires a reset to complete the SET_CERTIFICATE request */
1056
- cmocka_unit_test (libspdm_test_responder_set_cetificate_rsp_case6 ),
1056
+ cmocka_unit_test (libspdm_test_responder_set_certificate_rsp_case6 ),
1057
1057
/* Success Case for set_certificate to slot_id:0 with alias_cert mode*/
1058
- cmocka_unit_test (libspdm_test_responder_set_cetificate_rsp_case7 ),
1058
+ cmocka_unit_test (libspdm_test_responder_set_certificate_rsp_case7 ),
1059
1059
/* Success Case for set_certificate to slot_id:1 without session and with trusted environment */
1060
- cmocka_unit_test (libspdm_test_responder_set_cetificate_rsp_case8 ),
1060
+ cmocka_unit_test (libspdm_test_responder_set_certificate_rsp_case8 ),
1061
1061
/* Error Case for set_certificate to slot_id:1 without session and without trusted environment */
1062
- cmocka_unit_test (libspdm_test_responder_set_cetificate_rsp_case9 ),
1062
+ cmocka_unit_test (libspdm_test_responder_set_certificate_rsp_case9 ),
1063
1063
/* Success Case for erase certificate to slot_id:1 with session*/
1064
- cmocka_unit_test (libspdm_test_responder_set_cetificate_rsp_case10 ),
1064
+ cmocka_unit_test (libspdm_test_responder_set_certificate_rsp_case10 ),
1065
1065
/* Success Case for set_certificate to slot_id:1 with key_pair_id*/
1066
- cmocka_unit_test (libspdm_test_responder_set_cetificate_rsp_case11 ),
1066
+ cmocka_unit_test (libspdm_test_responder_set_certificate_rsp_case11 ),
1067
1067
cmocka_unit_test (libspdm_test_responder_set_certificate_rsp_case12 ),
1068
1068
};
1069
1069
@@ -1074,7 +1074,7 @@ int libspdm_responder_set_certificate_rsp_test_main(void)
1074
1074
1075
1075
libspdm_setup_test_context (& test_context );
1076
1076
1077
- return cmocka_run_group_tests (spdm_responder_set_cetificate_tests ,
1077
+ return cmocka_run_group_tests (spdm_responder_set_certificate_tests ,
1078
1078
libspdm_unit_test_group_setup ,
1079
1079
libspdm_unit_test_group_teardown );
1080
1080
}
0 commit comments