| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright 2011 The WebRTC Project Authors. All rights reserved. | 2 * Copyright 2011 The WebRTC Project Authors. All rights reserved. |
| 3 * | 3 * |
| 4 * Use of this source code is governed by a BSD-style license | 4 * Use of this source code is governed by a BSD-style license |
| 5 * that can be found in the LICENSE file in the root of the source | 5 * that can be found in the LICENSE file in the root of the source |
| 6 * tree. An additional intellectual property rights grant can be found | 6 * tree. An additional intellectual property rights grant can be found |
| 7 * in the file PATENTS. All contributing project authors may | 7 * in the file PATENTS. All contributing project authors may |
| 8 * be found in the AUTHORS file in the root of the source tree. | 8 * be found in the AUTHORS file in the root of the source tree. |
| 9 */ | 9 */ |
| 10 | 10 |
| (...skipping 367 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 378 ASSERT((mtu_ == 1460) && (loss_ == 0) && (lose_first_packet_ == 0)); | 378 ASSERT((mtu_ == 1460) && (loss_ == 0) && (lose_first_packet_ == 0)); |
| 379 } | 379 } |
| 380 | 380 |
| 381 if (!identities_set_) | 381 if (!identities_set_) |
| 382 SetPeerIdentitiesByDigest(true); | 382 SetPeerIdentitiesByDigest(true); |
| 383 | 383 |
| 384 // Start the handshake | 384 // Start the handshake |
| 385 int rv; | 385 int rv; |
| 386 | 386 |
| 387 server_ssl_->SetServerRole(); | 387 server_ssl_->SetServerRole(); |
| 388 rv = server_ssl_->StartSSLWithPeer(); | 388 rv = server_ssl_->StartSSL(); |
| 389 ASSERT_EQ(0, rv); | 389 ASSERT_EQ(0, rv); |
| 390 | 390 |
| 391 rv = client_ssl_->StartSSLWithPeer(); | 391 rv = client_ssl_->StartSSL(); |
| 392 ASSERT_EQ(0, rv); | 392 ASSERT_EQ(0, rv); |
| 393 | 393 |
| 394 // Now run the handshake | 394 // Now run the handshake |
| 395 if (expect_success) { | 395 if (expect_success) { |
| 396 EXPECT_TRUE_WAIT((client_ssl_->GetState() == rtc::SS_OPEN) | 396 EXPECT_TRUE_WAIT((client_ssl_->GetState() == rtc::SS_OPEN) |
| 397 && (server_ssl_->GetState() == rtc::SS_OPEN), | 397 && (server_ssl_->GetState() == rtc::SS_OPEN), |
| 398 handshake_wait_); | 398 handshake_wait_); |
| 399 } else { | 399 } else { |
| 400 EXPECT_TRUE_WAIT(client_ssl_->GetState() == rtc::SS_CLOSED, | 400 EXPECT_TRUE_WAIT(client_ssl_->GetState() == rtc::SS_CLOSED, |
| 401 handshake_wait_); | 401 handshake_wait_); |
| (...skipping 756 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1158 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)))); | 1158 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)))); |
| 1159 INSTANTIATE_TEST_CASE_P( | 1159 INSTANTIATE_TEST_CASE_P( |
| 1160 SSLStreamAdapterTestsDTLS, | 1160 SSLStreamAdapterTestsDTLS, |
| 1161 SSLStreamAdapterTestDTLS, | 1161 SSLStreamAdapterTestDTLS, |
| 1162 Combine(Values(rtc::KeyParams::RSA(1024, 65537), | 1162 Combine(Values(rtc::KeyParams::RSA(1024, 65537), |
| 1163 rtc::KeyParams::RSA(1152, 65537), | 1163 rtc::KeyParams::RSA(1152, 65537), |
| 1164 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)), | 1164 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)), |
| 1165 Values(rtc::KeyParams::RSA(1024, 65537), | 1165 Values(rtc::KeyParams::RSA(1024, 65537), |
| 1166 rtc::KeyParams::RSA(1152, 65537), | 1166 rtc::KeyParams::RSA(1152, 65537), |
| 1167 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)))); | 1167 rtc::KeyParams::ECDSA(rtc::EC_NIST_P256)))); |
| OLD | NEW |