| Index: webrtc/api/peerconnection_unittest.cc
|
| diff --git a/webrtc/api/peerconnection_unittest.cc b/webrtc/api/peerconnection_unittest.cc
|
| index d0fb9ad4c5a098a8d615506a8d4a04feb2aa2678..87c9d51cbeb6b311fa6f0956f9f077be101854a9 100644
|
| --- a/webrtc/api/peerconnection_unittest.cc
|
| +++ b/webrtc/api/peerconnection_unittest.cc
|
| @@ -1436,8 +1436,7 @@ TEST_F(P2PTestConductor, GetBytesSentStats) {
|
| }
|
|
|
| // Test that DTLS 1.0 is used if both sides only support DTLS 1.0.
|
| -// Disabled due to new BoringSSLL version, see webrtc:5634
|
| -TEST_F(P2PTestConductor, DISABLED_GetDtls12None) {
|
| +TEST_F(P2PTestConductor, GetDtls12None) {
|
| PeerConnectionFactory::Options init_options;
|
| init_options.ssl_max_version = rtc::SSL_PROTOCOL_DTLS_10;
|
| PeerConnectionFactory::Options recv_options;
|
| @@ -1449,16 +1448,10 @@ TEST_F(P2PTestConductor, DISABLED_GetDtls12None) {
|
| initializing_client()->pc()->RegisterUMAObserver(init_observer);
|
| LocalP2PTest();
|
|
|
| - EXPECT_EQ_WAIT(rtc::SSLStreamAdapter::SslCipherSuiteToName(
|
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_10, rtc::KT_DEFAULT)),
|
| - initializing_client()->GetDtlsCipherStats(),
|
| - kMaxWaitForStatsMs);
|
| - EXPECT_EQ(1, init_observer->GetEnumCounter(
|
| - webrtc::kEnumCounterAudioSslCipher,
|
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_10, rtc::KT_DEFAULT)));
|
| -
|
| + EXPECT_TRUE_WAIT(
|
| + rtc::SSLStreamAdapter::IsAcceptableCipher(
|
| + initializing_client()->GetDtlsCipherStats(), rtc::KT_DEFAULT),
|
| + kMaxWaitForStatsMs);
|
| EXPECT_EQ_WAIT(rtc::SrtpCryptoSuiteToName(kDefaultSrtpCryptoSuite),
|
| initializing_client()->GetSrtpCipherStats(),
|
| kMaxWaitForStatsMs);
|
| @@ -1480,16 +1473,10 @@ TEST_F(P2PTestConductor, GetDtls12Both) {
|
| initializing_client()->pc()->RegisterUMAObserver(init_observer);
|
| LocalP2PTest();
|
|
|
| - EXPECT_EQ_WAIT(rtc::SSLStreamAdapter::SslCipherSuiteToName(
|
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_12, rtc::KT_DEFAULT)),
|
| - initializing_client()->GetDtlsCipherStats(),
|
| - kMaxWaitForStatsMs);
|
| - EXPECT_EQ(1, init_observer->GetEnumCounter(
|
| - webrtc::kEnumCounterAudioSslCipher,
|
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_12, rtc::KT_DEFAULT)));
|
| -
|
| + EXPECT_TRUE_WAIT(
|
| + rtc::SSLStreamAdapter::IsAcceptableCipher(
|
| + initializing_client()->GetDtlsCipherStats(), rtc::KT_DEFAULT),
|
| + kMaxWaitForStatsMs);
|
| EXPECT_EQ_WAIT(rtc::SrtpCryptoSuiteToName(kDefaultSrtpCryptoSuite),
|
| initializing_client()->GetSrtpCipherStats(),
|
| kMaxWaitForStatsMs);
|
| @@ -1500,8 +1487,7 @@ TEST_F(P2PTestConductor, GetDtls12Both) {
|
|
|
| // Test that DTLS 1.0 is used if the initator supports DTLS 1.2 and the
|
| // received supports 1.0.
|
| -// Disabled due to new BoringSSLL version, see webrtc:5634
|
| -TEST_F(P2PTestConductor, DISABLED_GetDtls12Init) {
|
| +TEST_F(P2PTestConductor, GetDtls12Init) {
|
| PeerConnectionFactory::Options init_options;
|
| init_options.ssl_max_version = rtc::SSL_PROTOCOL_DTLS_12;
|
| PeerConnectionFactory::Options recv_options;
|
| @@ -1513,16 +1499,10 @@ TEST_F(P2PTestConductor, DISABLED_GetDtls12Init) {
|
| initializing_client()->pc()->RegisterUMAObserver(init_observer);
|
| LocalP2PTest();
|
|
|
| - EXPECT_EQ_WAIT(rtc::SSLStreamAdapter::SslCipherSuiteToName(
|
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_10, rtc::KT_DEFAULT)),
|
| - initializing_client()->GetDtlsCipherStats(),
|
| - kMaxWaitForStatsMs);
|
| - EXPECT_EQ(1, init_observer->GetEnumCounter(
|
| - webrtc::kEnumCounterAudioSslCipher,
|
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_10, rtc::KT_DEFAULT)));
|
| -
|
| + EXPECT_TRUE_WAIT(
|
| + rtc::SSLStreamAdapter::IsAcceptableCipher(
|
| + initializing_client()->GetDtlsCipherStats(), rtc::KT_DEFAULT),
|
| + kMaxWaitForStatsMs);
|
| EXPECT_EQ_WAIT(rtc::SrtpCryptoSuiteToName(kDefaultSrtpCryptoSuite),
|
| initializing_client()->GetSrtpCipherStats(),
|
| kMaxWaitForStatsMs);
|
| @@ -1533,8 +1513,7 @@ TEST_F(P2PTestConductor, DISABLED_GetDtls12Init) {
|
|
|
| // Test that DTLS 1.0 is used if the initator supports DTLS 1.0 and the
|
| // received supports 1.2.
|
| -// Disabled due to new BoringSSLL version, see webrtc:5634
|
| -TEST_F(P2PTestConductor, DISABLED_GetDtls12Recv) {
|
| +TEST_F(P2PTestConductor, GetDtls12Recv) {
|
| PeerConnectionFactory::Options init_options;
|
| init_options.ssl_max_version = rtc::SSL_PROTOCOL_DTLS_10;
|
| PeerConnectionFactory::Options recv_options;
|
| @@ -1546,16 +1525,10 @@ TEST_F(P2PTestConductor, DISABLED_GetDtls12Recv) {
|
| initializing_client()->pc()->RegisterUMAObserver(init_observer);
|
| LocalP2PTest();
|
|
|
| - EXPECT_EQ_WAIT(rtc::SSLStreamAdapter::SslCipherSuiteToName(
|
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_10, rtc::KT_DEFAULT)),
|
| - initializing_client()->GetDtlsCipherStats(),
|
| - kMaxWaitForStatsMs);
|
| - EXPECT_EQ(1, init_observer->GetEnumCounter(
|
| - webrtc::kEnumCounterAudioSslCipher,
|
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_10, rtc::KT_DEFAULT)));
|
| -
|
| + EXPECT_TRUE_WAIT(
|
| + rtc::SSLStreamAdapter::IsAcceptableCipher(
|
| + initializing_client()->GetDtlsCipherStats(), rtc::KT_DEFAULT),
|
| + kMaxWaitForStatsMs);
|
| EXPECT_EQ_WAIT(rtc::SrtpCryptoSuiteToName(kDefaultSrtpCryptoSuite),
|
| initializing_client()->GetSrtpCipherStats(),
|
| kMaxWaitForStatsMs);
|
|
|