|
|
@@ -153,20 +153,6 @@ TEST_F(UtestModelManagerModelManager, case_load_model_encypt_not_match) { |
|
|
|
delete[](uint8_t *) data.model_data; |
|
|
|
} |
|
|
|
|
|
|
|
#if 0 |
|
|
|
TEST_F(UtestModelManagerModelManager, case_load_model_signature_failed) |
|
|
|
{ |
|
|
|
ModelManager mm; |
|
|
|
ge::ModelData data; |
|
|
|
GenUnencryptModelData(data); |
|
|
|
|
|
|
|
uint32_t model_id = 1; |
|
|
|
MOCKER(&WBDecryptor::CheckSignature).stubs().will(returnValue(false)); |
|
|
|
EXPECT_EQ(ge::PARAM_INVALID, mm.LoadModelOffline(model_id, data, UTEST_CALL_BACK_FUN)); |
|
|
|
delete[](uint8_t*)data.model_data; |
|
|
|
} |
|
|
|
#endif |
|
|
|
|
|
|
|
TEST_F(UtestModelManagerModelManager, case_load_model_encypt_type_unsupported) { |
|
|
|
ModelManager mm; |
|
|
|
ge::ModelData data; |
|
|
@@ -178,87 +164,6 @@ TEST_F(UtestModelManagerModelManager, case_load_model_encypt_type_unsupported) { |
|
|
|
delete[](uint8_t *) data.model_data; |
|
|
|
} |
|
|
|
|
|
|
|
#if 0 |
|
|
|
TEST_F(UtestModelManagerModelManager, case_load_model_header_len_failed) |
|
|
|
{ |
|
|
|
ModelManager mm; |
|
|
|
ge::ModelData data; |
|
|
|
GenEncryptModelData(data); |
|
|
|
ModelFileHeader *header = (ModelFileHeader*)data.model_data; |
|
|
|
data.model_len -= header->length; |
|
|
|
header->length = 0; |
|
|
|
uint32_t model_id = 1; |
|
|
|
EXPECT_EQ(ge::PARAM_INVALID, mm.LoadModelOffline(model_id, data, UTEST_CALL_BACK_FUN)); |
|
|
|
delete[](uint8_t*)data.model_data; |
|
|
|
} |
|
|
|
#endif |
|
|
|
|
|
|
|
#if 0 |
|
|
|
TEST_F(UtestModelManagerModelManager, case_load_success) |
|
|
|
{ |
|
|
|
const char* model_file = "bin/llt/framework/domi/ut/omg/data/leakyrelu.dav"; |
|
|
|
const char* json_file = "test.json"; |
|
|
|
const char* key = "bin/llt/framework/domi/ut/omg/data/leakyrelu.dav.PASSCODE"; |
|
|
|
|
|
|
|
ge::ModelData model; |
|
|
|
Status ret = ModelParserBase::LoadFromFile(model_file, key, 0, &model); |
|
|
|
EXPECT_EQ(ge::SUCCESS, ret); |
|
|
|
|
|
|
|
ModelManager mm; |
|
|
|
uint32_t model_id = 1; |
|
|
|
ret = mm.LoadModelOffline(model_id, model, UTEST_CALL_BACK_FUN); |
|
|
|
EXPECT_EQ(ge::SUCCESS, ret); |
|
|
|
|
|
|
|
if (model.model_data) |
|
|
|
delete[](uint8_t*)model.model_data; |
|
|
|
} |
|
|
|
#endif |
|
|
|
|
|
|
|
#if 0 |
|
|
|
TEST_F(UtestModelManagerModelManager, case_load_encrypt_model_signature_failed) |
|
|
|
{ |
|
|
|
ModelManager mm; |
|
|
|
ge::ModelData data; |
|
|
|
GenEncryptModelData(data); |
|
|
|
uint32_t model_id = 1; |
|
|
|
data.key; |
|
|
|
EXPECT_EQ(ge::PARAM_INVALID, mm.LoadModelOffline(model_id, data, UTEST_CALL_BACK_FUN)); |
|
|
|
delete[](uint8_t*)data.model_data; |
|
|
|
} |
|
|
|
|
|
|
|
TEST_F(UtestModelManagerModelManager, case_load_encrypt_model_invalid_key_len) |
|
|
|
{ |
|
|
|
ModelManager mm; |
|
|
|
ge::ModelData data; |
|
|
|
GenEncryptModelData(data); |
|
|
|
data.key = "0123456789abcdef0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0"; |
|
|
|
uint32_t model_id = 1; |
|
|
|
EXPECT_EQ(ge::PARAM_INVALID, mm.LoadModelOffline(model_id, data, UTEST_CALL_BACK_FUN)); |
|
|
|
delete[](uint8_t*)data.model_data; |
|
|
|
} |
|
|
|
|
|
|
|
TEST_F(UtestModelManagerModelManager, case_load_encrypt_model_invalid_key_char) |
|
|
|
{ |
|
|
|
ModelManager mm; |
|
|
|
ge::ModelData data; |
|
|
|
GenEncryptModelData(data); |
|
|
|
data.key = "0123456789abcdef0123456789ABCDEF0123456789ABCDEF0123456789ABCDEG"; |
|
|
|
uint32_t model_id = 1; |
|
|
|
EXPECT_EQ(ge::PARAM_INVALID, mm.LoadModelOffline(model_id, data, UTEST_CALL_BACK_FUN)); |
|
|
|
delete[](uint8_t*)data.model_data; |
|
|
|
} |
|
|
|
|
|
|
|
TEST_F(UtestModelManagerModelManager, case_load_encrypt_model_load_failed) |
|
|
|
{ |
|
|
|
ModelManager mm; |
|
|
|
ge::ModelData data; |
|
|
|
GenEncryptModelData(data); |
|
|
|
uint32_t model_id = 1; |
|
|
|
EXPECT_EQ(ge::INTERNAL_ERROR, mm.LoadModelOffline(model_id, data, UTEST_CALL_BACK_FUN)); |
|
|
|
delete[](uint8_t*)data.model_data; |
|
|
|
} |
|
|
|
#endif |
|
|
|
|
|
|
|
shared_ptr<ge::ModelListener> LabelCallBack(new DModelListener()); |
|
|
|
|
|
|
|
// test HandleCommand |
|
|
|