Chromium Code Reviews| Index: webrtc/base/sslstreamadapter_unittest.cc |
| diff --git a/webrtc/base/sslstreamadapter_unittest.cc b/webrtc/base/sslstreamadapter_unittest.cc |
| index c8fe9a01e78d466dee20242e7a3fbf6c8a7a17ed..d535d7b4b5a5da33a11fd4f5c85077f7fe411235 100644 |
| --- a/webrtc/base/sslstreamadapter_unittest.cc |
| +++ b/webrtc/base/sslstreamadapter_unittest.cc |
| @@ -161,11 +161,12 @@ static const int kFifoBufferSize = 4096; |
| class SSLStreamAdapterTestBase : public testing::Test, |
| public sigslot::has_slots<> { |
| public: |
| - SSLStreamAdapterTestBase(const std::string& client_cert_pem, |
| - const std::string& client_private_key_pem, |
| - bool dtls, |
| - rtc::KeyType client_key_type = rtc::KT_DEFAULT, |
| - rtc::KeyType server_key_type = rtc::KT_DEFAULT) |
| + SSLStreamAdapterTestBase( |
| + const std::string& client_cert_pem, |
| + const std::string& client_private_key_pem, |
| + bool dtls, |
| + rtc::KeyParams client_key_type = rtc::KeyParams(rtc::KT_DEFAULT), |
| + rtc::KeyParams server_key_type = rtc::KeyParams(rtc::KT_DEFAULT)) |
| : client_buffer_(kFifoBufferSize), |
| server_buffer_(kFifoBufferSize), |
| client_stream_( |
| @@ -223,18 +224,16 @@ class SSLStreamAdapterTestBase : public testing::Test, |
| client_ssl_->SignalEvent.connect(this, &SSLStreamAdapterTestBase::OnEvent); |
| server_ssl_->SignalEvent.connect(this, &SSLStreamAdapterTestBase::OnEvent); |
| - rtc::SSLIdentityParams client_params; |
| + rtc::SSLIdentityParams client_params((rtc::KeyParams(rtc::KT_DEFAULT))); |
|
juberti
2015/10/07 06:35:23
Remove extra parens, here and below
torbjorng (webrtc)
2015/10/07 13:30:04
The extra parens are required; these variable decl
|
| client_params.common_name = "client"; |
| client_params.not_before = not_before; |
| client_params.not_after = not_after; |
| - client_params.key_type = rtc::KT_DEFAULT; |
| client_identity_ = rtc::SSLIdentity::GenerateForTest(client_params); |
| - rtc::SSLIdentityParams server_params; |
| + rtc::SSLIdentityParams server_params((rtc::KeyParams(rtc::KT_DEFAULT))); |
| server_params.common_name = "server"; |
| server_params.not_before = not_before; |
| server_params.not_after = not_after; |
| - server_params.key_type = rtc::KT_DEFAULT; |
| server_identity_ = rtc::SSLIdentity::GenerateForTest(server_params); |
| client_ssl_->SetIdentity(client_identity_); |
| @@ -462,7 +461,7 @@ class SSLStreamAdapterTestBase : public testing::Test, |
| class SSLStreamAdapterTestTLS |
| : public SSLStreamAdapterTestBase, |
| - public WithParamInterface<tuple<rtc::KeyType, rtc::KeyType>> { |
| + public WithParamInterface<tuple<rtc::KeyParams, rtc::KeyParams>> { |
| public: |
| SSLStreamAdapterTestTLS() |
| : SSLStreamAdapterTestBase("", |
| @@ -570,7 +569,7 @@ class SSLStreamAdapterTestTLS |
| class SSLStreamAdapterTestDTLS |
| : public SSLStreamAdapterTestBase, |
| - public WithParamInterface<tuple<rtc::KeyType, rtc::KeyType>> { |
| + public WithParamInterface<tuple<rtc::KeyParams, rtc::KeyParams>> { |
| public: |
| SSLStreamAdapterTestDTLS() |
| : SSLStreamAdapterTestBase("", |
| @@ -978,9 +977,10 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuite) { |
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
| ASSERT_EQ(client_cipher, server_cipher); |
| - ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| - rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam())), |
| - server_cipher); |
| + ASSERT_EQ( |
| + rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| + rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
| + server_cipher); |
| } |
| // Test getting the used DTLS 1.2 ciphers. |
| @@ -996,9 +996,10 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Both) { |
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
| ASSERT_EQ(client_cipher, server_cipher); |
| - ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| - rtc::SSL_PROTOCOL_DTLS_12, ::testing::get<1>(GetParam())), |
| - server_cipher); |
| + ASSERT_EQ( |
| + rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| + rtc::SSL_PROTOCOL_DTLS_12, ::testing::get<1>(GetParam()).type()), |
| + server_cipher); |
| } |
| // DTLS 1.2 enabled for client only -> DTLS 1.0 will be used. |
| @@ -1013,9 +1014,10 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Client) { |
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
| ASSERT_EQ(client_cipher, server_cipher); |
| - ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| - rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam())), |
| - server_cipher); |
| + ASSERT_EQ( |
| + rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| + rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
| + server_cipher); |
| } |
| // DTLS 1.2 enabled for server only -> DTLS 1.0 will be used. |
| @@ -1030,16 +1032,30 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Server) { |
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
| ASSERT_EQ(client_cipher, server_cipher); |
| - ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| - rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam())), |
| - server_cipher); |
| + ASSERT_EQ( |
| + rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| + rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
| + server_cipher); |
| } |
| -INSTANTIATE_TEST_CASE_P(SSLStreamAdapterTestsTLS, |
| - SSLStreamAdapterTestTLS, |
| - Combine(Values(rtc::KT_RSA, rtc::KT_ECDSA), |
| - Values(rtc::KT_RSA, rtc::KT_ECDSA))); |
| -INSTANTIATE_TEST_CASE_P(SSLStreamAdapterTestsDTLS, |
| - SSLStreamAdapterTestDTLS, |
| - Combine(Values(rtc::KT_RSA, rtc::KT_ECDSA), |
| - Values(rtc::KT_RSA, rtc::KT_ECDSA))); |
| +// The RSA keysizes here might look strange, why not include the RFC's size |
| +// 2048?. The reason is test case slowness; testing two sizes to exercise |
| +// parametrization is sufficient. |
| +INSTANTIATE_TEST_CASE_P( |
| + SSLStreamAdapterTestsTLS, |
| + SSLStreamAdapterTestTLS, |
| + Combine(Values(rtc::KeyParams::RSA(1024, 65537), |
| + rtc::KeyParams::RSA(1152, 65537), |
| + rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)), |
| + Values(rtc::KeyParams::RSA(1024, 65537), |
| + rtc::KeyParams::RSA(1152, 65537), |
| + rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)))); |
| +INSTANTIATE_TEST_CASE_P( |
| + SSLStreamAdapterTestsDTLS, |
| + SSLStreamAdapterTestDTLS, |
| + Combine(Values(rtc::KeyParams::RSA(1024, 65537), |
| + rtc::KeyParams::RSA(1152, 65537), |
| + rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)), |
| + Values(rtc::KeyParams::RSA(1024, 65537), |
| + rtc::KeyParams::RSA(1152, 65537), |
| + rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)))); |