| Index: webrtc/base/sslstreamadapter_unittest.cc
|
| diff --git a/webrtc/base/sslstreamadapter_unittest.cc b/webrtc/base/sslstreamadapter_unittest.cc
|
| index c65bb63ec098727fdfc000174b2a96f7ce33127a..a3e8d9c637980f6ca4d1453283c9915874d40e0e 100644
|
| --- a/webrtc/base/sslstreamadapter_unittest.cc
|
| +++ b/webrtc/base/sslstreamadapter_unittest.cc
|
| @@ -161,11 +161,12 @@ static const int kFifoBufferSize = 4096;
|
| class SSLStreamAdapterTestBase : public testing::Test,
|
| public sigslot::has_slots<> {
|
| public:
|
| - SSLStreamAdapterTestBase(const std::string& client_cert_pem,
|
| - const std::string& client_private_key_pem,
|
| - bool dtls,
|
| - rtc::KeyType client_key_type = rtc::KT_DEFAULT,
|
| - rtc::KeyType server_key_type = rtc::KT_DEFAULT)
|
| + SSLStreamAdapterTestBase(
|
| + const std::string& client_cert_pem,
|
| + const std::string& client_private_key_pem,
|
| + bool dtls,
|
| + rtc::KeyParams client_key_type = rtc::KeyParams(rtc::KT_DEFAULT),
|
| + rtc::KeyParams server_key_type = rtc::KeyParams(rtc::KT_DEFAULT))
|
| : client_buffer_(kFifoBufferSize),
|
| server_buffer_(kFifoBufferSize),
|
| client_stream_(
|
| @@ -224,17 +225,17 @@ class SSLStreamAdapterTestBase : public testing::Test,
|
| server_ssl_->SignalEvent.connect(this, &SSLStreamAdapterTestBase::OnEvent);
|
|
|
| rtc::SSLIdentityParams client_params;
|
| + client_params.key_params = rtc::KeyParams(rtc::KT_DEFAULT);
|
| client_params.common_name = "client";
|
| client_params.not_before = not_before;
|
| client_params.not_after = not_after;
|
| - client_params.key_type = rtc::KT_DEFAULT;
|
| client_identity_ = rtc::SSLIdentity::GenerateForTest(client_params);
|
|
|
| rtc::SSLIdentityParams server_params;
|
| + server_params.key_params = rtc::KeyParams(rtc::KT_DEFAULT);
|
| server_params.common_name = "server";
|
| server_params.not_before = not_before;
|
| server_params.not_after = not_after;
|
| - server_params.key_type = rtc::KT_DEFAULT;
|
| server_identity_ = rtc::SSLIdentity::GenerateForTest(server_params);
|
|
|
| client_ssl_->SetIdentity(client_identity_);
|
| @@ -462,7 +463,7 @@ class SSLStreamAdapterTestBase : public testing::Test,
|
|
|
| class SSLStreamAdapterTestTLS
|
| : public SSLStreamAdapterTestBase,
|
| - public WithParamInterface<tuple<rtc::KeyType, rtc::KeyType>> {
|
| + public WithParamInterface<tuple<rtc::KeyParams, rtc::KeyParams>> {
|
| public:
|
| SSLStreamAdapterTestTLS()
|
| : SSLStreamAdapterTestBase("",
|
| @@ -570,7 +571,7 @@ class SSLStreamAdapterTestTLS
|
|
|
| class SSLStreamAdapterTestDTLS
|
| : public SSLStreamAdapterTestBase,
|
| - public WithParamInterface<tuple<rtc::KeyType, rtc::KeyType>> {
|
| + public WithParamInterface<tuple<rtc::KeyParams, rtc::KeyParams>> {
|
| public:
|
| SSLStreamAdapterTestDTLS()
|
| : SSLStreamAdapterTestBase("",
|
| @@ -978,9 +979,10 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuite) {
|
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher));
|
|
|
| ASSERT_EQ(client_cipher, server_cipher);
|
| - ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam())),
|
| - server_cipher);
|
| + ASSERT_EQ(
|
| + rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| + rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()),
|
| + server_cipher);
|
| }
|
|
|
| // Test getting the used DTLS 1.2 ciphers.
|
| @@ -996,9 +998,10 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Both) {
|
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher));
|
|
|
| ASSERT_EQ(client_cipher, server_cipher);
|
| - ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_12, ::testing::get<1>(GetParam())),
|
| - server_cipher);
|
| + ASSERT_EQ(
|
| + rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| + rtc::SSL_PROTOCOL_DTLS_12, ::testing::get<1>(GetParam()).type()),
|
| + server_cipher);
|
| }
|
|
|
| // DTLS 1.2 enabled for client only -> DTLS 1.0 will be used.
|
| @@ -1013,9 +1016,10 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Client) {
|
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher));
|
|
|
| ASSERT_EQ(client_cipher, server_cipher);
|
| - ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam())),
|
| - server_cipher);
|
| + ASSERT_EQ(
|
| + rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| + rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()),
|
| + server_cipher);
|
| }
|
|
|
| // DTLS 1.2 enabled for server only -> DTLS 1.0 will be used.
|
| @@ -1030,16 +1034,30 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Server) {
|
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher));
|
|
|
| ASSERT_EQ(client_cipher, server_cipher);
|
| - ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam())),
|
| - server_cipher);
|
| + ASSERT_EQ(
|
| + rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| + rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()),
|
| + server_cipher);
|
| }
|
|
|
| -INSTANTIATE_TEST_CASE_P(SSLStreamAdapterTestsTLS,
|
| - SSLStreamAdapterTestTLS,
|
| - Combine(Values(rtc::KT_RSA, rtc::KT_ECDSA),
|
| - Values(rtc::KT_RSA, rtc::KT_ECDSA)));
|
| -INSTANTIATE_TEST_CASE_P(SSLStreamAdapterTestsDTLS,
|
| - SSLStreamAdapterTestDTLS,
|
| - Combine(Values(rtc::KT_RSA, rtc::KT_ECDSA),
|
| - Values(rtc::KT_RSA, rtc::KT_ECDSA)));
|
| +// The RSA keysizes here might look strange, why not include the RFC's size
|
| +// 2048?. The reason is test case slowness; testing two sizes to exercise
|
| +// parametrization is sufficient.
|
| +INSTANTIATE_TEST_CASE_P(
|
| + SSLStreamAdapterTestsTLS,
|
| + SSLStreamAdapterTestTLS,
|
| + Combine(Values(rtc::KeyParams::RSA(1024, 65537),
|
| + rtc::KeyParams::RSA(1152, 65537),
|
| + rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)),
|
| + Values(rtc::KeyParams::RSA(1024, 65537),
|
| + rtc::KeyParams::RSA(1152, 65537),
|
| + rtc::KeyParams::ECDSA(rtc::EC_NIST_P256))));
|
| +INSTANTIATE_TEST_CASE_P(
|
| + SSLStreamAdapterTestsDTLS,
|
| + SSLStreamAdapterTestDTLS,
|
| + Combine(Values(rtc::KeyParams::RSA(1024, 65537),
|
| + rtc::KeyParams::RSA(1152, 65537),
|
| + rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)),
|
| + Values(rtc::KeyParams::RSA(1024, 65537),
|
| + rtc::KeyParams::RSA(1152, 65537),
|
| + rtc::KeyParams::ECDSA(rtc::EC_NIST_P256))));
|
|
|