Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(14)

Side by Side Diff: webrtc/base/sslstreamadapter_unittest.cc

Issue 1802013002: A bunch of interfaces: Return scoped_ptr<SSLCertificate> (Closed) Base URL: https://chromium.googlesource.com/external/webrtc.git@master
Patch Set: less auto Created 4 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « webrtc/base/sslstreamadapter.h ('k') | webrtc/p2p/base/dtlstransportchannel.h » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 /* 1 /*
2 * Copyright 2011 The WebRTC Project Authors. All rights reserved. 2 * Copyright 2011 The WebRTC Project Authors. All rights reserved.
3 * 3 *
4 * Use of this source code is governed by a BSD-style license 4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source 5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found 6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may 7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree. 8 * be found in the AUTHORS file in the root of the source tree.
9 */ 9 */
10 10
(...skipping 456 matching lines...) Expand 10 before | Expand all | Expand 10 after
467 server_ssl_->SetDtlsSrtpCryptoSuites(ciphers); 467 server_ssl_->SetDtlsSrtpCryptoSuites(ciphers);
468 } 468 }
469 469
470 bool GetDtlsSrtpCryptoSuite(bool client, int* retval) { 470 bool GetDtlsSrtpCryptoSuite(bool client, int* retval) {
471 if (client) 471 if (client)
472 return client_ssl_->GetDtlsSrtpCryptoSuite(retval); 472 return client_ssl_->GetDtlsSrtpCryptoSuite(retval);
473 else 473 else
474 return server_ssl_->GetDtlsSrtpCryptoSuite(retval); 474 return server_ssl_->GetDtlsSrtpCryptoSuite(retval);
475 } 475 }
476 476
477 bool GetPeerCertificate(bool client, rtc::SSLCertificate** cert) { 477 rtc::scoped_ptr<rtc::SSLCertificate> GetPeerCertificate(bool client) {
478 if (client) 478 if (client)
479 return client_ssl_->GetPeerCertificate(cert); 479 return client_ssl_->GetPeerCertificate();
480 else 480 else
481 return server_ssl_->GetPeerCertificate(cert); 481 return server_ssl_->GetPeerCertificate();
482 } 482 }
483 483
484 bool GetSslCipherSuite(bool client, int* retval) { 484 bool GetSslCipherSuite(bool client, int* retval) {
485 if (client) 485 if (client)
486 return client_ssl_->GetSslCipherSuite(retval); 486 return client_ssl_->GetSslCipherSuite(retval);
487 else 487 else
488 return server_ssl_->GetSslCipherSuite(retval); 488 return server_ssl_->GetSslCipherSuite(retval);
489 } 489 }
490 490
491 int GetSslVersion(bool client) { 491 int GetSslVersion(bool client) {
(...skipping 538 matching lines...) Expand 10 before | Expand all | Expand 10 after
1030 MAYBE_SKIP_TEST(HaveDtls); 1030 MAYBE_SKIP_TEST(HaveDtls);
1031 TestHandshake(); 1031 TestHandshake();
1032 TestTransfer(100); 1032 TestTransfer(100);
1033 } 1033 }
1034 1034
1035 // Test getting the remote certificate. 1035 // Test getting the remote certificate.
1036 TEST_F(SSLStreamAdapterTestDTLSFromPEMStrings, TestDTLSGetPeerCertificate) { 1036 TEST_F(SSLStreamAdapterTestDTLSFromPEMStrings, TestDTLSGetPeerCertificate) {
1037 MAYBE_SKIP_TEST(HaveDtls); 1037 MAYBE_SKIP_TEST(HaveDtls);
1038 1038
1039 // Peer certificates haven't been received yet. 1039 // Peer certificates haven't been received yet.
1040 rtc::scoped_ptr<rtc::SSLCertificate> client_peer_cert; 1040 ASSERT_FALSE(GetPeerCertificate(true));
1041 ASSERT_FALSE(GetPeerCertificate(true, client_peer_cert.accept())); 1041 ASSERT_FALSE(GetPeerCertificate(false));
1042 ASSERT_FALSE(client_peer_cert != NULL);
1043
1044 rtc::scoped_ptr<rtc::SSLCertificate> server_peer_cert;
1045 ASSERT_FALSE(GetPeerCertificate(false, server_peer_cert.accept()));
1046 ASSERT_FALSE(server_peer_cert != NULL);
1047 1042
1048 TestHandshake(); 1043 TestHandshake();
1049 1044
1050 // The client should have a peer certificate after the handshake. 1045 // The client should have a peer certificate after the handshake.
1051 ASSERT_TRUE(GetPeerCertificate(true, client_peer_cert.accept())); 1046 rtc::scoped_ptr<rtc::SSLCertificate> client_peer_cert =
1052 ASSERT_TRUE(client_peer_cert != NULL); 1047 GetPeerCertificate(true);
1048 ASSERT_TRUE(client_peer_cert);
1053 1049
1054 // It's not kCERT_PEM. 1050 // It's not kCERT_PEM.
1055 std::string client_peer_string = client_peer_cert->ToPEMString(); 1051 std::string client_peer_string = client_peer_cert->ToPEMString();
1056 ASSERT_NE(kCERT_PEM, client_peer_string); 1052 ASSERT_NE(kCERT_PEM, client_peer_string);
1057 1053
1058 // It must not have a chain, because the test certs are self-signed. 1054 // It must not have a chain, because the test certs are self-signed.
1059 ASSERT_FALSE(client_peer_cert->GetChain()); 1055 ASSERT_FALSE(client_peer_cert->GetChain());
1060 1056
1061 // The server should have a peer certificate after the handshake. 1057 // The server should have a peer certificate after the handshake.
1062 ASSERT_TRUE(GetPeerCertificate(false, server_peer_cert.accept())); 1058 rtc::scoped_ptr<rtc::SSLCertificate> server_peer_cert =
1063 ASSERT_TRUE(server_peer_cert != NULL); 1059 GetPeerCertificate(false);
1060 ASSERT_TRUE(server_peer_cert);
1064 1061
1065 // It's kCERT_PEM 1062 // It's kCERT_PEM
1066 ASSERT_EQ(kCERT_PEM, server_peer_cert->ToPEMString()); 1063 ASSERT_EQ(kCERT_PEM, server_peer_cert->ToPEMString());
1067 1064
1068 // It must not have a chain, because the test certs are self-signed. 1065 // It must not have a chain, because the test certs are self-signed.
1069 ASSERT_FALSE(server_peer_cert->GetChain()); 1066 ASSERT_FALSE(server_peer_cert->GetChain());
1070 } 1067 }
1071 1068
1072 // Test getting the used DTLS ciphers. 1069 // Test getting the used DTLS ciphers.
1073 // DTLS 1.2 enabled for neither client nor server -> DTLS 1.0 will be used. 1070 // DTLS 1.2 enabled for neither client nor server -> DTLS 1.0 will be used.
(...skipping 87 matching lines...) Expand 10 before | Expand all | Expand 10 after
1161 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)))); 1158 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256))));
1162 INSTANTIATE_TEST_CASE_P( 1159 INSTANTIATE_TEST_CASE_P(
1163 SSLStreamAdapterTestsDTLS, 1160 SSLStreamAdapterTestsDTLS,
1164 SSLStreamAdapterTestDTLS, 1161 SSLStreamAdapterTestDTLS,
1165 Combine(Values(rtc::KeyParams::RSA(1024, 65537), 1162 Combine(Values(rtc::KeyParams::RSA(1024, 65537),
1166 rtc::KeyParams::RSA(1152, 65537), 1163 rtc::KeyParams::RSA(1152, 65537),
1167 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)), 1164 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)),
1168 Values(rtc::KeyParams::RSA(1024, 65537), 1165 Values(rtc::KeyParams::RSA(1024, 65537),
1169 rtc::KeyParams::RSA(1152, 65537), 1166 rtc::KeyParams::RSA(1152, 65537),
1170 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)))); 1167 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256))));
OLDNEW
« no previous file with comments | « webrtc/base/sslstreamadapter.h ('k') | webrtc/p2p/base/dtlstransportchannel.h » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698