Index: webrtc/base/sslstreamadapter_unittest.cc |
diff --git a/webrtc/base/sslstreamadapter_unittest.cc b/webrtc/base/sslstreamadapter_unittest.cc |
index afb133712485db3653811f76b219cff6cf7adceb..ea95c6a17e809bbb77488ba60f936e1c2e4f6389 100644 |
--- a/webrtc/base/sslstreamadapter_unittest.cc |
+++ b/webrtc/base/sslstreamadapter_unittest.cc |
@@ -1066,8 +1066,7 @@ TEST_F(SSLStreamAdapterTestDTLSFromPEMStrings, TestDTLSGetPeerCertificate) { |
// Test getting the used DTLS ciphers. |
// DTLS 1.2 enabled for neither client nor server -> DTLS 1.0 will be used. |
-// Disabled due to new BoringSSLL version, see webrtc:5634 |
-TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuite) { |
+TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuite) { |
MAYBE_SKIP_TEST(HaveDtls); |
SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_10); |
TestHandshake(); |
@@ -1078,10 +1077,8 @@ TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuite) { |
ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
ASSERT_EQ(client_cipher, server_cipher); |
- ASSERT_EQ( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
- server_cipher); |
+ ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ server_cipher, ::testing::get<1>(GetParam()).type())); |
} |
// Test getting the used DTLS 1.2 ciphers. |
@@ -1097,15 +1094,12 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Both) { |
ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
ASSERT_EQ(client_cipher, server_cipher); |
- ASSERT_EQ( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_12, ::testing::get<1>(GetParam()).type()), |
- server_cipher); |
+ ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ server_cipher, ::testing::get<1>(GetParam()).type())); |
} |
// DTLS 1.2 enabled for client only -> DTLS 1.0 will be used. |
-// Disabled due to new BoringSSLL version, see webrtc:5634 |
-TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Client) { |
+TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Client) { |
MAYBE_SKIP_TEST(HaveDtls); |
SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_12); |
TestHandshake(); |
@@ -1116,15 +1110,12 @@ TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Client) { |
ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
ASSERT_EQ(client_cipher, server_cipher); |
- ASSERT_EQ( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
davidben_webrtc
2016/03/08 20:29:05
Before, I think you were implicitly checking the r
torbjorng (webrtc)
2016/03/09 13:10:31
I don't think the old test had as a main objective
|
- server_cipher); |
+ ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ server_cipher, ::testing::get<1>(GetParam()).type())); |
} |
// DTLS 1.2 enabled for server only -> DTLS 1.0 will be used. |
-// Disabled due to new BoringSSLL version, see webrtc:5634 |
-TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Server) { |
+TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Server) { |
MAYBE_SKIP_TEST(HaveDtls); |
SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_12, rtc::SSL_PROTOCOL_DTLS_10); |
TestHandshake(); |
@@ -1135,10 +1126,8 @@ TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Server) { |
ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
ASSERT_EQ(client_cipher, server_cipher); |
- ASSERT_EQ( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
- server_cipher); |
+ ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ server_cipher, ::testing::get<1>(GetParam()).type())); |
} |
// The RSA keysizes here might look strange, why not include the RFC's size |