Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(290)

Side by Side Diff: webrtc/base/sslstreamadapter_unittest.cc

Issue 1799233002: SSLCertificate::GetChain: Return scoped_ptr (Closed) Base URL: https://chromium.googlesource.com/external/webrtc.git@master
Patch Set: No auto Created 4 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « webrtc/base/sslidentity.h ('k') | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 /* 1 /*
2 * Copyright 2011 The WebRTC Project Authors. All rights reserved. 2 * Copyright 2011 The WebRTC Project Authors. All rights reserved.
3 * 3 *
4 * Use of this source code is governed by a BSD-style license 4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source 5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found 6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may 7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree. 8 * be found in the AUTHORS file in the root of the source tree.
9 */ 9 */
10 10
(...skipping 1038 matching lines...) Expand 10 before | Expand all | Expand 10 after
1049 1049
1050 // The client should have a peer certificate after the handshake. 1050 // The client should have a peer certificate after the handshake.
1051 ASSERT_TRUE(GetPeerCertificate(true, client_peer_cert.accept())); 1051 ASSERT_TRUE(GetPeerCertificate(true, client_peer_cert.accept()));
1052 ASSERT_TRUE(client_peer_cert != NULL); 1052 ASSERT_TRUE(client_peer_cert != NULL);
1053 1053
1054 // It's not kCERT_PEM. 1054 // It's not kCERT_PEM.
1055 std::string client_peer_string = client_peer_cert->ToPEMString(); 1055 std::string client_peer_string = client_peer_cert->ToPEMString();
1056 ASSERT_NE(kCERT_PEM, client_peer_string); 1056 ASSERT_NE(kCERT_PEM, client_peer_string);
1057 1057
1058 // It must not have a chain, because the test certs are self-signed. 1058 // It must not have a chain, because the test certs are self-signed.
1059 rtc::SSLCertChain* client_peer_chain; 1059 ASSERT_FALSE(client_peer_cert->GetChain());
1060 ASSERT_FALSE(client_peer_cert->GetChain(&client_peer_chain));
1061 1060
1062 // The server should have a peer certificate after the handshake. 1061 // The server should have a peer certificate after the handshake.
1063 ASSERT_TRUE(GetPeerCertificate(false, server_peer_cert.accept())); 1062 ASSERT_TRUE(GetPeerCertificate(false, server_peer_cert.accept()));
1064 ASSERT_TRUE(server_peer_cert != NULL); 1063 ASSERT_TRUE(server_peer_cert != NULL);
1065 1064
1066 // It's kCERT_PEM 1065 // It's kCERT_PEM
1067 ASSERT_EQ(kCERT_PEM, server_peer_cert->ToPEMString()); 1066 ASSERT_EQ(kCERT_PEM, server_peer_cert->ToPEMString());
1068 1067
1069 // It must not have a chain, because the test certs are self-signed. 1068 // It must not have a chain, because the test certs are self-signed.
1070 rtc::SSLCertChain* server_peer_chain; 1069 ASSERT_FALSE(server_peer_cert->GetChain());
1071 ASSERT_FALSE(server_peer_cert->GetChain(&server_peer_chain));
1072 } 1070 }
1073 1071
1074 // Test getting the used DTLS ciphers. 1072 // Test getting the used DTLS ciphers.
1075 // DTLS 1.2 enabled for neither client nor server -> DTLS 1.0 will be used. 1073 // DTLS 1.2 enabled for neither client nor server -> DTLS 1.0 will be used.
1076 TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuite) { 1074 TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuite) {
1077 MAYBE_SKIP_TEST(HaveDtls); 1075 MAYBE_SKIP_TEST(HaveDtls);
1078 SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_10); 1076 SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_10);
1079 TestHandshake(); 1077 TestHandshake();
1080 1078
1081 int client_cipher; 1079 int client_cipher;
(...skipping 81 matching lines...) Expand 10 before | Expand all | Expand 10 after
1163 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)))); 1161 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256))));
1164 INSTANTIATE_TEST_CASE_P( 1162 INSTANTIATE_TEST_CASE_P(
1165 SSLStreamAdapterTestsDTLS, 1163 SSLStreamAdapterTestsDTLS,
1166 SSLStreamAdapterTestDTLS, 1164 SSLStreamAdapterTestDTLS,
1167 Combine(Values(rtc::KeyParams::RSA(1024, 65537), 1165 Combine(Values(rtc::KeyParams::RSA(1024, 65537),
1168 rtc::KeyParams::RSA(1152, 65537), 1166 rtc::KeyParams::RSA(1152, 65537),
1169 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)), 1167 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)),
1170 Values(rtc::KeyParams::RSA(1024, 65537), 1168 Values(rtc::KeyParams::RSA(1024, 65537),
1171 rtc::KeyParams::RSA(1152, 65537), 1169 rtc::KeyParams::RSA(1152, 65537),
1172 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)))); 1170 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256))));
OLDNEW
« no previous file with comments | « webrtc/base/sslidentity.h ('k') | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698