Index: webrtc/p2p/base/dtlstransportchannel_unittest.cc |
diff --git a/webrtc/p2p/base/dtlstransportchannel_unittest.cc b/webrtc/p2p/base/dtlstransportchannel_unittest.cc |
index 2abcf8ad5e1aa89a356b8bba39b99cf34f82d6a8..18b355ffd4dd859c3e481f9a5f5957cc8afbdc5e 100644 |
--- a/webrtc/p2p/base/dtlstransportchannel_unittest.cc |
+++ b/webrtc/p2p/base/dtlstransportchannel_unittest.cc |
@@ -229,16 +229,17 @@ class DtlsTestClient : public sigslot::has_slots<> { |
} |
} |
- void CheckSsl(int expected_cipher) { |
+ void CheckSsl() { |
for (std::vector<cricket::DtlsTransportChannelWrapper*>::iterator it = |
channels_.begin(); it != channels_.end(); ++it) { |
int cipher; |
bool rv = (*it)->GetSslCipherSuite(&cipher); |
- if (negotiated_dtls_ && expected_cipher) { |
+ if (negotiated_dtls_) { |
ASSERT_TRUE(rv); |
- ASSERT_EQ(cipher, expected_cipher); |
+ EXPECT_TRUE( |
+ rtc::SSLStreamAdapter::IsAcceptableCipher(cipher, rtc::KT_DEFAULT)); |
} else { |
ASSERT_FALSE(rv); |
} |
@@ -473,10 +474,9 @@ class DtlsTransportChannelTest : public testing::Test { |
client1_.CheckSrtp(rtc::SRTP_INVALID_CRYPTO_SUITE); |
client2_.CheckSrtp(rtc::SRTP_INVALID_CRYPTO_SUITE); |
} |
- client1_.CheckSsl(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- ssl_expected_version_, rtc::KT_DEFAULT)); |
- client2_.CheckSsl(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- ssl_expected_version_, rtc::KT_DEFAULT)); |
+ |
+ client1_.CheckSsl(); |
+ client2_.CheckSsl(); |
return true; |
} |
@@ -632,8 +632,7 @@ TEST_F(DtlsTransportChannelTest, TestTransferDtlsNotOffered) { |
} |
// Create two channels with DTLS 1.0 and check ciphers. |
-// Disabled due to new BoringSSLL version, see webrtc:5634 |
-TEST_F(DtlsTransportChannelTest, DISABLED_TestDtls12None) { |
+TEST_F(DtlsTransportChannelTest, TestDtls12None) { |
MAYBE_SKIP_TEST(HaveDtls); |
SetChannelCount(2); |
PrepareDtls(true, true, rtc::KT_DEFAULT); |
@@ -651,8 +650,7 @@ TEST_F(DtlsTransportChannelTest, TestDtls12Both) { |
} |
// Create two channels with DTLS 1.0 / DTLS 1.2 and check ciphers. |
-// Disabled due to new BoringSSLL version, see webrtc:5634 |
-TEST_F(DtlsTransportChannelTest, DISABLED_TestDtls12Client1) { |
+TEST_F(DtlsTransportChannelTest, TestDtls12Client1) { |
MAYBE_SKIP_TEST(HaveDtls); |
SetChannelCount(2); |
PrepareDtls(true, true, rtc::KT_DEFAULT); |
@@ -661,8 +659,7 @@ TEST_F(DtlsTransportChannelTest, DISABLED_TestDtls12Client1) { |
} |
// Create two channels with DTLS 1.2 / DTLS 1.0 and check ciphers. |
-// Disabled due to new BoringSSLL version, see webrtc:5634 |
-TEST_F(DtlsTransportChannelTest, DISABLED_TestDtls12Client2) { |
+TEST_F(DtlsTransportChannelTest, TestDtls12Client2) { |
MAYBE_SKIP_TEST(HaveDtls); |
SetChannelCount(2); |
PrepareDtls(true, true, rtc::KT_DEFAULT); |