Chromium Code Reviews| Index: webrtc/base/sslstreamadapter_unittest.cc |
| diff --git a/webrtc/base/sslstreamadapter_unittest.cc b/webrtc/base/sslstreamadapter_unittest.cc |
| index afb133712485db3653811f76b219cff6cf7adceb..2eaa4753913d899404e4d5728ff10c07e03243aa 100644 |
| --- a/webrtc/base/sslstreamadapter_unittest.cc |
| +++ b/webrtc/base/sslstreamadapter_unittest.cc |
| @@ -488,6 +488,13 @@ class SSLStreamAdapterTestBase : public testing::Test, |
| return server_ssl_->GetSslCipherSuite(retval); |
| } |
| + int GetSslVersion(bool client) { |
| + if (client) |
| + return client_ssl_->GetSslVersion(); |
| + else |
|
tommi
2016/03/10 21:37:59
nit: remove else
this could also be written as:
torbjorng (webrtc)
2016/03/11 07:50:18
Let's clean that up in a separate CL since here I
|
| + return server_ssl_->GetSslVersion(); |
| + } |
| + |
| bool ExportKeyingMaterial(const char *label, |
| const unsigned char *context, |
| size_t context_len, |
| @@ -1066,8 +1073,7 @@ TEST_F(SSLStreamAdapterTestDTLSFromPEMStrings, TestDTLSGetPeerCertificate) { |
| // Test getting the used DTLS ciphers. |
| // DTLS 1.2 enabled for neither client nor server -> DTLS 1.0 will be used. |
| -// Disabled due to new BoringSSLL version, see webrtc:5634 |
| -TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuite) { |
| +TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuite) { |
| MAYBE_SKIP_TEST(HaveDtls); |
| SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_10); |
| TestHandshake(); |
| @@ -1077,11 +1083,12 @@ TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuite) { |
| int server_cipher; |
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
| + ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_10, GetSslVersion(true)); |
| + ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_10, GetSslVersion(false)); |
| + |
| ASSERT_EQ(client_cipher, server_cipher); |
| - ASSERT_EQ( |
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| - rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
| - server_cipher); |
| + ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
| + server_cipher, ::testing::get<1>(GetParam()).type())); |
| } |
| // Test getting the used DTLS 1.2 ciphers. |
| @@ -1096,16 +1103,16 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Both) { |
| int server_cipher; |
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
| + ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_12, GetSslVersion(true)); |
| + ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_12, GetSslVersion(false)); |
| + |
| ASSERT_EQ(client_cipher, server_cipher); |
| - ASSERT_EQ( |
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| - rtc::SSL_PROTOCOL_DTLS_12, ::testing::get<1>(GetParam()).type()), |
| - server_cipher); |
| + ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
| + server_cipher, ::testing::get<1>(GetParam()).type())); |
| } |
| // DTLS 1.2 enabled for client only -> DTLS 1.0 will be used. |
| -// Disabled due to new BoringSSLL version, see webrtc:5634 |
| -TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Client) { |
| +TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Client) { |
| MAYBE_SKIP_TEST(HaveDtls); |
| SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_12); |
| TestHandshake(); |
| @@ -1115,16 +1122,16 @@ TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Client) { |
| int server_cipher; |
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
| + ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_10, GetSslVersion(true)); |
| + ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_10, GetSslVersion(false)); |
| + |
| ASSERT_EQ(client_cipher, server_cipher); |
| - ASSERT_EQ( |
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| - rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
| - server_cipher); |
| + ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
| + server_cipher, ::testing::get<1>(GetParam()).type())); |
| } |
| // DTLS 1.2 enabled for server only -> DTLS 1.0 will be used. |
| -// Disabled due to new BoringSSLL version, see webrtc:5634 |
| -TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Server) { |
| +TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Server) { |
| MAYBE_SKIP_TEST(HaveDtls); |
| SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_12, rtc::SSL_PROTOCOL_DTLS_10); |
| TestHandshake(); |
| @@ -1134,11 +1141,12 @@ TEST_P(SSLStreamAdapterTestDTLS, DISABLED_TestGetSslCipherSuiteDtls12Server) { |
| int server_cipher; |
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
| + ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_10, GetSslVersion(true)); |
| + ASSERT_EQ(rtc::SSL_PROTOCOL_DTLS_10, GetSslVersion(false)); |
| + |
| ASSERT_EQ(client_cipher, server_cipher); |
| - ASSERT_EQ( |
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
| - rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
| - server_cipher); |
| + ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
| + server_cipher, ::testing::get<1>(GetParam()).type())); |
| } |
| // The RSA keysizes here might look strange, why not include the RFC's size |