OLD | NEW |
1 /* | 1 /* |
2 * Copyright 2011 The WebRTC Project Authors. All rights reserved. | 2 * Copyright 2011 The WebRTC Project Authors. All rights reserved. |
3 * | 3 * |
4 * Use of this source code is governed by a BSD-style license | 4 * Use of this source code is governed by a BSD-style license |
5 * that can be found in the LICENSE file in the root of the source | 5 * that can be found in the LICENSE file in the root of the source |
6 * tree. An additional intellectual property rights grant can be found | 6 * tree. An additional intellectual property rights grant can be found |
7 * in the file PATENTS. All contributing project authors may | 7 * in the file PATENTS. All contributing project authors may |
8 * be found in the AUTHORS file in the root of the source tree. | 8 * be found in the AUTHORS file in the root of the source tree. |
9 */ | 9 */ |
10 | 10 |
(...skipping 614 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
625 } | 625 } |
626 | 626 |
627 // Connect with B doing DTLS and A not, and transfer some data. | 627 // Connect with B doing DTLS and A not, and transfer some data. |
628 TEST_F(DtlsTransportChannelTest, TestTransferDtlsNotOffered) { | 628 TEST_F(DtlsTransportChannelTest, TestTransferDtlsNotOffered) { |
629 PrepareDtls(false, true, rtc::KT_DEFAULT); | 629 PrepareDtls(false, true, rtc::KT_DEFAULT); |
630 ASSERT_TRUE(Connect()); | 630 ASSERT_TRUE(Connect()); |
631 TestTransfer(0, 1000, 100, false); | 631 TestTransfer(0, 1000, 100, false); |
632 } | 632 } |
633 | 633 |
634 // Create two channels with DTLS 1.0 and check ciphers. | 634 // Create two channels with DTLS 1.0 and check ciphers. |
635 TEST_F(DtlsTransportChannelTest, TestDtls12None) { | 635 // Disabled due to new BoringSSLL version, see webrtc:5634 |
| 636 TEST_F(DtlsTransportChannelTest, DISABLED_TestDtls12None) { |
636 MAYBE_SKIP_TEST(HaveDtls); | 637 MAYBE_SKIP_TEST(HaveDtls); |
637 SetChannelCount(2); | 638 SetChannelCount(2); |
638 PrepareDtls(true, true, rtc::KT_DEFAULT); | 639 PrepareDtls(true, true, rtc::KT_DEFAULT); |
639 SetMaxProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_10); | 640 SetMaxProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_10); |
640 ASSERT_TRUE(Connect()); | 641 ASSERT_TRUE(Connect()); |
641 } | 642 } |
642 | 643 |
643 // Create two channels with DTLS 1.2 and check ciphers. | 644 // Create two channels with DTLS 1.2 and check ciphers. |
644 TEST_F(DtlsTransportChannelTest, TestDtls12Both) { | 645 TEST_F(DtlsTransportChannelTest, TestDtls12Both) { |
645 MAYBE_SKIP_TEST(HaveDtls); | 646 MAYBE_SKIP_TEST(HaveDtls); |
646 SetChannelCount(2); | 647 SetChannelCount(2); |
647 PrepareDtls(true, true, rtc::KT_DEFAULT); | 648 PrepareDtls(true, true, rtc::KT_DEFAULT); |
648 SetMaxProtocolVersions(rtc::SSL_PROTOCOL_DTLS_12, rtc::SSL_PROTOCOL_DTLS_12); | 649 SetMaxProtocolVersions(rtc::SSL_PROTOCOL_DTLS_12, rtc::SSL_PROTOCOL_DTLS_12); |
649 ASSERT_TRUE(Connect()); | 650 ASSERT_TRUE(Connect()); |
650 } | 651 } |
651 | 652 |
652 // Create two channels with DTLS 1.0 / DTLS 1.2 and check ciphers. | 653 // Create two channels with DTLS 1.0 / DTLS 1.2 and check ciphers. |
653 TEST_F(DtlsTransportChannelTest, TestDtls12Client1) { | 654 // Disabled due to new BoringSSLL version, see webrtc:5634 |
| 655 TEST_F(DtlsTransportChannelTest, DISABLED_TestDtls12Client1) { |
654 MAYBE_SKIP_TEST(HaveDtls); | 656 MAYBE_SKIP_TEST(HaveDtls); |
655 SetChannelCount(2); | 657 SetChannelCount(2); |
656 PrepareDtls(true, true, rtc::KT_DEFAULT); | 658 PrepareDtls(true, true, rtc::KT_DEFAULT); |
657 SetMaxProtocolVersions(rtc::SSL_PROTOCOL_DTLS_12, rtc::SSL_PROTOCOL_DTLS_10); | 659 SetMaxProtocolVersions(rtc::SSL_PROTOCOL_DTLS_12, rtc::SSL_PROTOCOL_DTLS_10); |
658 ASSERT_TRUE(Connect()); | 660 ASSERT_TRUE(Connect()); |
659 } | 661 } |
660 | 662 |
661 // Create two channels with DTLS 1.2 / DTLS 1.0 and check ciphers. | 663 // Create two channels with DTLS 1.2 / DTLS 1.0 and check ciphers. |
662 TEST_F(DtlsTransportChannelTest, TestDtls12Client2) { | 664 // Disabled due to new BoringSSLL version, see webrtc:5634 |
| 665 TEST_F(DtlsTransportChannelTest, DISABLED_TestDtls12Client2) { |
663 MAYBE_SKIP_TEST(HaveDtls); | 666 MAYBE_SKIP_TEST(HaveDtls); |
664 SetChannelCount(2); | 667 SetChannelCount(2); |
665 PrepareDtls(true, true, rtc::KT_DEFAULT); | 668 PrepareDtls(true, true, rtc::KT_DEFAULT); |
666 SetMaxProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_12); | 669 SetMaxProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_12); |
667 ASSERT_TRUE(Connect()); | 670 ASSERT_TRUE(Connect()); |
668 } | 671 } |
669 | 672 |
670 // Connect with DTLS, negotiate DTLS-SRTP, and transfer SRTP using bypass. | 673 // Connect with DTLS, negotiate DTLS-SRTP, and transfer SRTP using bypass. |
671 TEST_F(DtlsTransportChannelTest, TestTransferDtlsSrtp) { | 674 TEST_F(DtlsTransportChannelTest, TestTransferDtlsSrtp) { |
672 MAYBE_SKIP_TEST(HaveDtlsSrtp); | 675 MAYBE_SKIP_TEST(HaveDtlsSrtp); |
(...skipping 210 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
883 // Each side's remote certificate is the other side's local certificate. | 886 // Each side's remote certificate is the other side's local certificate. |
884 ASSERT_TRUE( | 887 ASSERT_TRUE( |
885 client1_.transport()->GetRemoteSSLCertificate(remote_cert1.accept())); | 888 client1_.transport()->GetRemoteSSLCertificate(remote_cert1.accept())); |
886 ASSERT_EQ(remote_cert1->ToPEMString(), | 889 ASSERT_EQ(remote_cert1->ToPEMString(), |
887 certificate2->ssl_certificate().ToPEMString()); | 890 certificate2->ssl_certificate().ToPEMString()); |
888 ASSERT_TRUE( | 891 ASSERT_TRUE( |
889 client2_.transport()->GetRemoteSSLCertificate(remote_cert2.accept())); | 892 client2_.transport()->GetRemoteSSLCertificate(remote_cert2.accept())); |
890 ASSERT_EQ(remote_cert2->ToPEMString(), | 893 ASSERT_EQ(remote_cert2->ToPEMString(), |
891 certificate1->ssl_certificate().ToPEMString()); | 894 certificate1->ssl_certificate().ToPEMString()); |
892 } | 895 } |
OLD | NEW |