Index: webrtc/api/peerconnection_unittest.cc |
diff --git a/webrtc/api/peerconnection_unittest.cc b/webrtc/api/peerconnection_unittest.cc |
index d0fb9ad4c5a098a8d615506a8d4a04feb2aa2678..7e84f44f2043dfbb8372bd538582b530fddf3920 100644 |
--- a/webrtc/api/peerconnection_unittest.cc |
+++ b/webrtc/api/peerconnection_unittest.cc |
@@ -1436,8 +1436,7 @@ TEST_F(P2PTestConductor, GetBytesSentStats) { |
} |
// Test that DTLS 1.0 is used if both sides only support DTLS 1.0. |
-// Disabled due to new BoringSSLL version, see webrtc:5634 |
-TEST_F(P2PTestConductor, DISABLED_GetDtls12None) { |
+TEST_F(P2PTestConductor, GetDtls12None) { |
PeerConnectionFactory::Options init_options; |
init_options.ssl_max_version = rtc::SSL_PROTOCOL_DTLS_10; |
PeerConnectionFactory::Options recv_options; |
@@ -1449,16 +1448,10 @@ TEST_F(P2PTestConductor, DISABLED_GetDtls12None) { |
initializing_client()->pc()->RegisterUMAObserver(init_observer); |
LocalP2PTest(); |
- EXPECT_EQ_WAIT(rtc::SSLStreamAdapter::SslCipherSuiteToName( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_10, rtc::KT_DEFAULT)), |
- initializing_client()->GetDtlsCipherStats(), |
- kMaxWaitForStatsMs); |
- EXPECT_EQ(1, init_observer->GetEnumCounter( |
- webrtc::kEnumCounterAudioSslCipher, |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_10, rtc::KT_DEFAULT))); |
- |
+ EXPECT_TRUE_WAIT(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ initializing_client()->GetDtlsCipherStats(), |
+ rtc::KT_DEFAULT), |
+ kMaxWaitForStatsMs); |
EXPECT_EQ_WAIT(rtc::SrtpCryptoSuiteToName(kDefaultSrtpCryptoSuite), |
initializing_client()->GetSrtpCipherStats(), |
kMaxWaitForStatsMs); |
@@ -1480,16 +1473,10 @@ TEST_F(P2PTestConductor, GetDtls12Both) { |
initializing_client()->pc()->RegisterUMAObserver(init_observer); |
LocalP2PTest(); |
- EXPECT_EQ_WAIT(rtc::SSLStreamAdapter::SslCipherSuiteToName( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_12, rtc::KT_DEFAULT)), |
- initializing_client()->GetDtlsCipherStats(), |
- kMaxWaitForStatsMs); |
- EXPECT_EQ(1, init_observer->GetEnumCounter( |
- webrtc::kEnumCounterAudioSslCipher, |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_12, rtc::KT_DEFAULT))); |
- |
+ EXPECT_TRUE_WAIT(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ initializing_client()->GetDtlsCipherStats(), |
+ rtc::KT_DEFAULT), |
+ kMaxWaitForStatsMs); |
EXPECT_EQ_WAIT(rtc::SrtpCryptoSuiteToName(kDefaultSrtpCryptoSuite), |
initializing_client()->GetSrtpCipherStats(), |
kMaxWaitForStatsMs); |
@@ -1500,8 +1487,7 @@ TEST_F(P2PTestConductor, GetDtls12Both) { |
// Test that DTLS 1.0 is used if the initator supports DTLS 1.2 and the |
// received supports 1.0. |
-// Disabled due to new BoringSSLL version, see webrtc:5634 |
-TEST_F(P2PTestConductor, DISABLED_GetDtls12Init) { |
+TEST_F(P2PTestConductor, GetDtls12Init) { |
PeerConnectionFactory::Options init_options; |
init_options.ssl_max_version = rtc::SSL_PROTOCOL_DTLS_12; |
PeerConnectionFactory::Options recv_options; |
@@ -1513,16 +1499,10 @@ TEST_F(P2PTestConductor, DISABLED_GetDtls12Init) { |
initializing_client()->pc()->RegisterUMAObserver(init_observer); |
LocalP2PTest(); |
- EXPECT_EQ_WAIT(rtc::SSLStreamAdapter::SslCipherSuiteToName( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_10, rtc::KT_DEFAULT)), |
- initializing_client()->GetDtlsCipherStats(), |
- kMaxWaitForStatsMs); |
- EXPECT_EQ(1, init_observer->GetEnumCounter( |
- webrtc::kEnumCounterAudioSslCipher, |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_10, rtc::KT_DEFAULT))); |
- |
+ EXPECT_TRUE_WAIT(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ initializing_client()->GetDtlsCipherStats(), |
+ rtc::KT_DEFAULT), |
+ kMaxWaitForStatsMs); |
EXPECT_EQ_WAIT(rtc::SrtpCryptoSuiteToName(kDefaultSrtpCryptoSuite), |
initializing_client()->GetSrtpCipherStats(), |
kMaxWaitForStatsMs); |
@@ -1533,8 +1513,7 @@ TEST_F(P2PTestConductor, DISABLED_GetDtls12Init) { |
// Test that DTLS 1.0 is used if the initator supports DTLS 1.0 and the |
// received supports 1.2. |
-// Disabled due to new BoringSSLL version, see webrtc:5634 |
-TEST_F(P2PTestConductor, DISABLED_GetDtls12Recv) { |
+TEST_F(P2PTestConductor, GetDtls12Recv) { |
PeerConnectionFactory::Options init_options; |
init_options.ssl_max_version = rtc::SSL_PROTOCOL_DTLS_10; |
PeerConnectionFactory::Options recv_options; |
@@ -1546,16 +1525,10 @@ TEST_F(P2PTestConductor, DISABLED_GetDtls12Recv) { |
initializing_client()->pc()->RegisterUMAObserver(init_observer); |
LocalP2PTest(); |
- EXPECT_EQ_WAIT(rtc::SSLStreamAdapter::SslCipherSuiteToName( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_10, rtc::KT_DEFAULT)), |
- initializing_client()->GetDtlsCipherStats(), |
- kMaxWaitForStatsMs); |
- EXPECT_EQ(1, init_observer->GetEnumCounter( |
- webrtc::kEnumCounterAudioSslCipher, |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_10, rtc::KT_DEFAULT))); |
- |
+ EXPECT_TRUE_WAIT(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ initializing_client()->GetDtlsCipherStats(), |
+ rtc::KT_DEFAULT), |
+ kMaxWaitForStatsMs); |
EXPECT_EQ_WAIT(rtc::SrtpCryptoSuiteToName(kDefaultSrtpCryptoSuite), |
initializing_client()->GetSrtpCipherStats(), |
kMaxWaitForStatsMs); |