Index: webrtc/base/sslstreamadapter_unittest.cc |
diff --git a/webrtc/base/sslstreamadapter_unittest.cc b/webrtc/base/sslstreamadapter_unittest.cc |
index afb133712485db3653811f76b219cff6cf7adceb..2eaa4753913d899404e4d5728ff10c07e03243aa 100644 |
--- a/webrtc/base/sslstreamadapter_unittest.cc |
+++ b/webrtc/base/sslstreamadapter_unittest.cc |
@@ -488,6 +488,13 @@ class SSLStreamAdapterTestBase : public testing::Test, |
return server_ssl_->GetSslCipherSuite(retval); |
} |
+ int GetSslVersion(bool client) { |
+ if (client) |
+ return client_ssl_->GetSslVersion(); |
+ else |
tommi
2016/03/10 21:37:59
nit: remove else
this could also be written as:
torbjorng (webrtc)
2016/03/11 07:50:18
Let's clean that up in a separate CL since here I
|
+ return server_ssl_->GetSslVersion(); |
+ } |
+ |
bool ExportKeyingMaterial(const char *label, |
const unsigned char *context, |
size_t context_len, |
@@ -1066,8 +1073,7 @@ TEST_F(SSLStreamAdapterTestDTLSFromPEMStrings, TestDTLSGetPeerCertificate) { |
// Test getting the used DTLS ciphers. |
// DTLS 1.2 enabled for neither client nor server -> DTLS 1.0 will be used. |
-// Disabled due to new BoringSSLL version, see webrtc:5634 |
-TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuite) { |
+TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuite) { |
MAYBE_SKIP_TEST(HaveDtls); |
SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_10); |
TestHandshake(); |
@@ -1077,11 +1083,12 @@ TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuite) { |
int server_cipher; |
ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
+ ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_10, GetSslVersion(true)); |
+ ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_10, GetSslVersion(false)); |
+ |
ASSERT_EQ(client_cipher, server_cipher); |
- ASSERT_EQ( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
- server_cipher); |
+ ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ server_cipher, ::testing::get<1>(GetParam()).type())); |
} |
// Test getting the used DTLS 1.2 ciphers. |
@@ -1096,16 +1103,16 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Both) { |
int server_cipher; |
ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
+ ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_12, GetSslVersion(true)); |
+ ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_12, GetSslVersion(false)); |
+ |
ASSERT_EQ(client_cipher, server_cipher); |
- ASSERT_EQ( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_12, ::testing::get<1>(GetParam()).type()), |
- server_cipher); |
+ ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ server_cipher, ::testing::get<1>(GetParam()).type())); |
} |
// DTLS 1.2 enabled for client only -> DTLS 1.0 will be used. |
-// Disabled due to new BoringSSLL version, see webrtc:5634 |
-TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Client) { |
+TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Client) { |
MAYBE_SKIP_TEST(HaveDtls); |
SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_12); |
TestHandshake(); |
@@ -1115,16 +1122,16 @@ TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Client) { |
int server_cipher; |
ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
+ ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_10, GetSslVersion(true)); |
+ ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_10, GetSslVersion(false)); |
+ |
ASSERT_EQ(client_cipher, server_cipher); |
- ASSERT_EQ( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
- server_cipher); |
+ ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ server_cipher, ::testing::get<1>(GetParam()).type())); |
} |
// DTLS 1.2 enabled for server only -> DTLS 1.0 will be used. |
-// Disabled due to new BoringSSLL version, see webrtc:5634 |
-TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Server) { |
+TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Server) { |
MAYBE_SKIP_TEST(HaveDtls); |
SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_12, rtc::SSL_PROTOCOL_DTLS_10); |
TestHandshake(); |
@@ -1134,11 +1141,12 @@ TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Server) { |
int server_cipher; |
ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
+ ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_10, GetSslVersion(true)); |
+ ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_10, GetSslVersion(false)); |
+ |
ASSERT_EQ(client_cipher, server_cipher); |
- ASSERT_EQ( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
- server_cipher); |
+ ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ server_cipher, ::testing::get<1>(GetParam()).type())); |
} |
// The RSA keysizes here might look strange, why not include the RFC's size |