Index: webrtc/p2p/base/transportdescriptionfactory_unittest.cc |
diff --git a/webrtc/p2p/base/transportdescriptionfactory_unittest.cc b/webrtc/p2p/base/transportdescriptionfactory_unittest.cc |
index 16a539f2e6fb5437215caaf09ecc0124a8d662ba..e3992dfdd361c252203bacb3940a74d069211295 100644 |
--- a/webrtc/p2p/base/transportdescriptionfactory_unittest.cc |
+++ b/webrtc/p2p/base/transportdescriptionfactory_unittest.cc |
@@ -26,8 +26,10 @@ using cricket::TransportOptions; |
class TransportDescriptionFactoryTest : public testing::Test { |
public: |
TransportDescriptionFactoryTest() |
- : id1_(new rtc::FakeSSLIdentity("User1")), |
- id2_(new rtc::FakeSSLIdentity("User2")) { |
+ : cert1_(rtc::RTCCertificate::Create(scoped_ptr<rtc::SSLIdentity>( |
+ new rtc::FakeSSLIdentity("User1")).Pass())), |
+ cert2_(rtc::RTCCertificate::Create(scoped_ptr<rtc::SSLIdentity>( |
+ new rtc::FakeSSLIdentity("User2")).Pass())) { |
} |
void CheckDesc(const TransportDescription* desc, |
@@ -61,8 +63,8 @@ class TransportDescriptionFactoryTest : public testing::Test { |
if (dtls) { |
f1_.set_secure(cricket::SEC_ENABLED); |
f2_.set_secure(cricket::SEC_ENABLED); |
- f1_.set_identity(id1_.get()); |
- f2_.set_identity(id2_.get()); |
+ f1_.set_certificate(cert1_); |
+ f2_.set_certificate(cert2_); |
} else { |
f1_.set_secure(cricket::SEC_DISABLED); |
f2_.set_secure(cricket::SEC_DISABLED); |
@@ -113,8 +115,9 @@ class TransportDescriptionFactoryTest : public testing::Test { |
protected: |
TransportDescriptionFactory f1_; |
TransportDescriptionFactory f2_; |
- scoped_ptr<rtc::SSLIdentity> id1_; |
- scoped_ptr<rtc::SSLIdentity> id2_; |
+ |
+ rtc::scoped_refptr<rtc::RTCCertificate> cert1_; |
+ rtc::scoped_refptr<rtc::RTCCertificate> cert2_; |
}; |
TEST_F(TransportDescriptionFactoryTest, TestOfferDefault) { |
@@ -125,9 +128,10 @@ TEST_F(TransportDescriptionFactoryTest, TestOfferDefault) { |
TEST_F(TransportDescriptionFactoryTest, TestOfferDtls) { |
f1_.set_secure(cricket::SEC_ENABLED); |
- f1_.set_identity(id1_.get()); |
+ f1_.set_certificate(cert1_); |
std::string digest_alg; |
- ASSERT_TRUE(id1_->certificate().GetSignatureDigestAlgorithm(&digest_alg)); |
+ ASSERT_TRUE(cert1_->ssl_certificate().GetSignatureDigestAlgorithm( |
+ &digest_alg)); |
scoped_ptr<TransportDescription> desc(f1_.CreateOffer( |
TransportOptions(), NULL)); |
CheckDesc(desc.get(), "", "", "", digest_alg); |
@@ -149,9 +153,10 @@ TEST_F(TransportDescriptionFactoryTest, TestOfferDtlsWithNoIdentity) { |
// The ICE credentials should stay the same in the new offer. |
TEST_F(TransportDescriptionFactoryTest, TestOfferDtlsReofferDtls) { |
f1_.set_secure(cricket::SEC_ENABLED); |
- f1_.set_identity(id1_.get()); |
+ f1_.set_certificate(cert1_); |
std::string digest_alg; |
- ASSERT_TRUE(id1_->certificate().GetSignatureDigestAlgorithm(&digest_alg)); |
+ ASSERT_TRUE(cert1_->ssl_certificate().GetSignatureDigestAlgorithm( |
+ &digest_alg)); |
scoped_ptr<TransportDescription> old_desc(f1_.CreateOffer( |
TransportOptions(), NULL)); |
ASSERT_TRUE(old_desc.get() != NULL); |
@@ -192,7 +197,7 @@ TEST_F(TransportDescriptionFactoryTest, TestReanswer) { |
// Test that we handle answering an offer with DTLS with no DTLS. |
TEST_F(TransportDescriptionFactoryTest, TestAnswerDtlsToNoDtls) { |
f1_.set_secure(cricket::SEC_ENABLED); |
- f1_.set_identity(id1_.get()); |
+ f1_.set_certificate(cert1_); |
scoped_ptr<TransportDescription> offer( |
f1_.CreateOffer(TransportOptions(), NULL)); |
ASSERT_TRUE(offer.get() != NULL); |
@@ -205,7 +210,7 @@ TEST_F(TransportDescriptionFactoryTest, TestAnswerDtlsToNoDtls) { |
// but fail if we require DTLS. |
TEST_F(TransportDescriptionFactoryTest, TestAnswerNoDtlsToDtls) { |
f2_.set_secure(cricket::SEC_ENABLED); |
- f2_.set_identity(id2_.get()); |
+ f2_.set_certificate(cert2_); |
scoped_ptr<TransportDescription> offer( |
f1_.CreateOffer(TransportOptions(), NULL)); |
ASSERT_TRUE(offer.get() != NULL); |
@@ -222,14 +227,15 @@ TEST_F(TransportDescriptionFactoryTest, TestAnswerNoDtlsToDtls) { |
// DTLS enabled and required. |
TEST_F(TransportDescriptionFactoryTest, TestAnswerDtlsToDtls) { |
f1_.set_secure(cricket::SEC_ENABLED); |
- f1_.set_identity(id1_.get()); |
+ f1_.set_certificate(cert1_); |
f2_.set_secure(cricket::SEC_ENABLED); |
- f2_.set_identity(id2_.get()); |
+ f2_.set_certificate(cert2_); |
// f2_ produces the answer that is being checked in this test, so the |
- // answer must contain fingerprint lines with id2_'s digest algorithm. |
+ // answer must contain fingerprint lines with cert2_'s digest algorithm. |
std::string digest_alg2; |
- ASSERT_TRUE(id2_->certificate().GetSignatureDigestAlgorithm(&digest_alg2)); |
+ ASSERT_TRUE(cert2_->ssl_certificate().GetSignatureDigestAlgorithm( |
+ &digest_alg2)); |
scoped_ptr<TransportDescription> offer( |
f1_.CreateOffer(TransportOptions(), NULL)); |