OLD | NEW |
1 /* | 1 /* |
2 * Copyright 2013 The WebRTC project authors. All Rights Reserved. | 2 * Copyright 2013 The WebRTC project authors. All Rights Reserved. |
3 * | 3 * |
4 * Use of this source code is governed by a BSD-style license | 4 * Use of this source code is governed by a BSD-style license |
5 * that can be found in the LICENSE file in the root of the source | 5 * that can be found in the LICENSE file in the root of the source |
6 * tree. An additional intellectual property rights grant can be found | 6 * tree. An additional intellectual property rights grant can be found |
7 * in the file PATENTS. All contributing project authors may | 7 * in the file PATENTS. All contributing project authors may |
8 * be found in the AUTHORS file in the root of the source tree. | 8 * be found in the AUTHORS file in the root of the source tree. |
9 */ | 9 */ |
10 | 10 |
(...skipping 138 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
149 msg_id = MSG_FAILURE; | 149 msg_id = MSG_FAILURE; |
150 } else if (key_params.type() == rtc::KT_RSA) { | 150 } else if (key_params.type() == rtc::KT_RSA) { |
151 RTC_DCHECK(key_params.rsa_params().mod_size == 1024 && | 151 RTC_DCHECK(key_params.rsa_params().mod_size == 1024 && |
152 key_params.rsa_params().pub_exp == 0x10001); | 152 key_params.rsa_params().pub_exp == 0x10001); |
153 msg_id = MSG_SUCCESS_RSA; | 153 msg_id = MSG_SUCCESS_RSA; |
154 } else { | 154 } else { |
155 RTC_DCHECK(key_params.type() == rtc::KT_ECDSA && | 155 RTC_DCHECK(key_params.type() == rtc::KT_ECDSA && |
156 key_params.ec_curve() == rtc::EC_NIST_P256); | 156 key_params.ec_curve() == rtc::EC_NIST_P256); |
157 msg_id = MSG_SUCCESS_ECDSA; | 157 msg_id = MSG_SUCCESS_ECDSA; |
158 } | 158 } |
159 rtc::Thread::Current()->Post(this, msg_id, msg); | 159 rtc::Thread::Current()->Post(FROM_HERE, this, msg_id, msg); |
160 } | 160 } |
161 | 161 |
162 static rtc::scoped_refptr<rtc::RTCCertificate> GenerateCertificate() { | 162 static rtc::scoped_refptr<rtc::RTCCertificate> GenerateCertificate() { |
163 std::unique_ptr<rtc::SSLIdentity> identity; | 163 std::unique_ptr<rtc::SSLIdentity> identity; |
164 switch (rtc::KT_DEFAULT) { | 164 switch (rtc::KT_DEFAULT) { |
165 case rtc::KT_RSA: | 165 case rtc::KT_RSA: |
166 identity.reset( | 166 identity.reset( |
167 rtc::SSLIdentity::FromPEMStrings(kRsaPems[0].private_key(), | 167 rtc::SSLIdentity::FromPEMStrings(kRsaPems[0].private_key(), |
168 kRsaPems[0].certificate())); | 168 kRsaPems[0].certificate())); |
169 break; | 169 break; |
(...skipping 54 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
224 break; | 224 break; |
225 } | 225 } |
226 delete message_data; | 226 delete message_data; |
227 } | 227 } |
228 | 228 |
229 bool should_fail_; | 229 bool should_fail_; |
230 int key_index_ = 0; | 230 int key_index_ = 0; |
231 }; | 231 }; |
232 | 232 |
233 #endif // WEBRTC_API_TEST_FAKEDTLSIDENTITYSERVICE_H_ | 233 #endif // WEBRTC_API_TEST_FAKEDTLSIDENTITYSERVICE_H_ |
OLD | NEW |