Browse Source

update test

tags/v1.1.0
wqtshg 3 years ago
parent
commit
d2497943e0
1 changed files with 0 additions and 95 deletions
  1. +0
    -95
      tests/ut/ge/graph/load/new_model_manager_model_manager_unittest.cc

+ 0
- 95
tests/ut/ge/graph/load/new_model_manager_model_manager_unittest.cc View File

@@ -153,20 +153,6 @@ TEST_F(UtestModelManagerModelManager, case_load_model_encypt_not_match) {
delete[](uint8_t *) data.model_data;
}

#if 0
TEST_F(UtestModelManagerModelManager, case_load_model_signature_failed)
{
ModelManager mm;
ge::ModelData data;
GenUnencryptModelData(data);

uint32_t model_id = 1;
MOCKER(&WBDecryptor::CheckSignature).stubs().will(returnValue(false));
EXPECT_EQ(ge::PARAM_INVALID, mm.LoadModelOffline(model_id, data, UTEST_CALL_BACK_FUN));
delete[](uint8_t*)data.model_data;
}
#endif

TEST_F(UtestModelManagerModelManager, case_load_model_encypt_type_unsupported) {
ModelManager mm;
ge::ModelData data;
@@ -178,87 +164,6 @@ TEST_F(UtestModelManagerModelManager, case_load_model_encypt_type_unsupported) {
delete[](uint8_t *) data.model_data;
}

#if 0
TEST_F(UtestModelManagerModelManager, case_load_model_header_len_failed)
{
ModelManager mm;
ge::ModelData data;
GenEncryptModelData(data);
ModelFileHeader *header = (ModelFileHeader*)data.model_data;
data.model_len -= header->length;
header->length = 0;
uint32_t model_id = 1;
EXPECT_EQ(ge::PARAM_INVALID, mm.LoadModelOffline(model_id, data, UTEST_CALL_BACK_FUN));
delete[](uint8_t*)data.model_data;
}
#endif

#if 0
TEST_F(UtestModelManagerModelManager, case_load_success)
{
const char* model_file = "bin/llt/framework/domi/ut/omg/data/leakyrelu.dav";
const char* json_file = "test.json";
const char* key = "bin/llt/framework/domi/ut/omg/data/leakyrelu.dav.PASSCODE";

ge::ModelData model;
Status ret = ModelParserBase::LoadFromFile(model_file, key, 0, &model);
EXPECT_EQ(ge::SUCCESS, ret);

ModelManager mm;
uint32_t model_id = 1;
ret = mm.LoadModelOffline(model_id, model, UTEST_CALL_BACK_FUN);
EXPECT_EQ(ge::SUCCESS, ret);

if (model.model_data)
delete[](uint8_t*)model.model_data;
}
#endif

#if 0
TEST_F(UtestModelManagerModelManager, case_load_encrypt_model_signature_failed)
{
ModelManager mm;
ge::ModelData data;
GenEncryptModelData(data);
uint32_t model_id = 1;
data.key;
EXPECT_EQ(ge::PARAM_INVALID, mm.LoadModelOffline(model_id, data, UTEST_CALL_BACK_FUN));
delete[](uint8_t*)data.model_data;
}

TEST_F(UtestModelManagerModelManager, case_load_encrypt_model_invalid_key_len)
{
ModelManager mm;
ge::ModelData data;
GenEncryptModelData(data);
data.key = "0123456789abcdef0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0";
uint32_t model_id = 1;
EXPECT_EQ(ge::PARAM_INVALID, mm.LoadModelOffline(model_id, data, UTEST_CALL_BACK_FUN));
delete[](uint8_t*)data.model_data;
}

TEST_F(UtestModelManagerModelManager, case_load_encrypt_model_invalid_key_char)
{
ModelManager mm;
ge::ModelData data;
GenEncryptModelData(data);
data.key = "0123456789abcdef0123456789ABCDEF0123456789ABCDEF0123456789ABCDEG";
uint32_t model_id = 1;
EXPECT_EQ(ge::PARAM_INVALID, mm.LoadModelOffline(model_id, data, UTEST_CALL_BACK_FUN));
delete[](uint8_t*)data.model_data;
}

TEST_F(UtestModelManagerModelManager, case_load_encrypt_model_load_failed)
{
ModelManager mm;
ge::ModelData data;
GenEncryptModelData(data);
uint32_t model_id = 1;
EXPECT_EQ(ge::INTERNAL_ERROR, mm.LoadModelOffline(model_id, data, UTEST_CALL_BACK_FUN));
delete[](uint8_t*)data.model_data;
}
#endif

shared_ptr<ge::ModelListener> LabelCallBack(new DModelListener());

// test HandleCommand


Loading…
Cancel
Save