Chromium Code Reviews| Index: webrtc/base/sslstreamadapter_unittest.cc |
| diff --git a/webrtc/base/sslstreamadapter_unittest.cc b/webrtc/base/sslstreamadapter_unittest.cc |
| index afb133712485db3653811f76b219cff6cf7adceb..ea95c6a17e809bbb77488ba60f936e1c2e4f6389 100644 |
| --- a/webrtc/base/sslstreamadapter_unittest.cc |
| +++ b/webrtc/base/sslstreamadapter_unittest.cc |
| @@ -1066,8 +1066,7 @@ TEST_F(SSLStreamAdapterTestDTLSFromPEMStrings, TestDTLSGetPeerCertificate) { |
| // Test getting the used DTLS ciphers. |
| // DTLS 1.2 enabled for neither client nor server -> DTLS 1.0 will be used. |
| -// Disabled due to new BoringSSLL version, see webrtc:5634 |
| -TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuite) { |
| +TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuite) { |
| MAYBE_SKIP_TEST(HaveDtls); |
| SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_10); |
| TestHandshake(); |
| @@ -1078,10 +1077,8 @@ TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuite) { |
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
| ASSERT_EQ(client_cipher, server_cipher); |
| - ASSERT_EQ( |
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| - rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
| - server_cipher); |
| + ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
| + server_cipher, ::testing::get<1>(GetParam()).type())); |
| } |
| // Test getting the used DTLS 1.2 ciphers. |
| @@ -1097,15 +1094,12 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Both) { |
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
| ASSERT_EQ(client_cipher, server_cipher); |
| - ASSERT_EQ( |
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| - rtc::SSL_PROTOCOL_DTLS_12, ::testing::get<1>(GetParam()).type()), |
| - server_cipher); |
| + ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
| + server_cipher, ::testing::get<1>(GetParam()).type())); |
| } |
| // DTLS 1.2 enabled for client only -> DTLS 1.0 will be used. |
| -// Disabled due to new BoringSSLL version, see webrtc:5634 |
| -TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Client) { |
| +TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Client) { |
| MAYBE_SKIP_TEST(HaveDtls); |
| SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_12); |
| TestHandshake(); |
| @@ -1116,15 +1110,12 @@ TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Client) { |
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
| ASSERT_EQ(client_cipher, server_cipher); |
| - ASSERT_EQ( |
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| - rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
|
davidben_webrtc
2016/03/08 20:29:05
Before, I think you were implicitly checking the r
torbjorng (webrtc)
2016/03/09 13:10:31
I don't think the old test had as a main objective
|
| - server_cipher); |
| + ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
| + server_cipher, ::testing::get<1>(GetParam()).type())); |
| } |
| // DTLS 1.2 enabled for server only -> DTLS 1.0 will be used. |
| -// Disabled due to new BoringSSLL version, see webrtc:5634 |
| -TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Server) { |
| +TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Server) { |
| MAYBE_SKIP_TEST(HaveDtls); |
| SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_12, rtc::SSL_PROTOCOL_DTLS_10); |
| TestHandshake(); |
| @@ -1135,10 +1126,8 @@ TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Server) { |
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
| ASSERT_EQ(client_cipher, server_cipher); |
| - ASSERT_EQ( |
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| - rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
| - server_cipher); |
| + ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
| + server_cipher, ::testing::get<1>(GetParam()).type())); |
| } |
| // The RSA keysizes here might look strange, why not include the RFC's size |