| Index: webrtc/p2p/base/dtlstransportchannel_unittest.cc
|
| diff --git a/webrtc/p2p/base/dtlstransportchannel_unittest.cc b/webrtc/p2p/base/dtlstransportchannel_unittest.cc
|
| index 7034343174063ebb2f00ecc674f5283383b8ef9b..2fc95d4e3b307865c5166b898e6cc7759edd56b2 100644
|
| --- a/webrtc/p2p/base/dtlstransportchannel_unittest.cc
|
| +++ b/webrtc/p2p/base/dtlstransportchannel_unittest.cc
|
| @@ -693,6 +693,7 @@
|
|
|
| // Connect with DTLS, and transfer some data.
|
| TEST_F(DtlsTransportChannelTest, TestTransferDtls) {
|
| + MAYBE_SKIP_TEST(HaveDtls);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| ASSERT_TRUE(Connect());
|
| TestTransfer(0, 1000, 100, false);
|
| @@ -700,6 +701,7 @@
|
|
|
| // Create two channels with DTLS, and transfer some data.
|
| TEST_F(DtlsTransportChannelTest, TestTransferDtlsTwoChannels) {
|
| + MAYBE_SKIP_TEST(HaveDtls);
|
| SetChannelCount(2);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| ASSERT_TRUE(Connect());
|
| @@ -723,6 +725,7 @@
|
|
|
| // Create two channels with DTLS 1.0 and check ciphers.
|
| TEST_F(DtlsTransportChannelTest, TestDtls12None) {
|
| + MAYBE_SKIP_TEST(HaveDtls);
|
| SetChannelCount(2);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| SetMaxProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_10);
|
| @@ -731,6 +734,7 @@
|
|
|
| // Create two channels with DTLS 1.2 and check ciphers.
|
| TEST_F(DtlsTransportChannelTest, TestDtls12Both) {
|
| + MAYBE_SKIP_TEST(HaveDtls);
|
| SetChannelCount(2);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| SetMaxProtocolVersions(rtc::SSL_PROTOCOL_DTLS_12, rtc::SSL_PROTOCOL_DTLS_12);
|
| @@ -739,6 +743,7 @@
|
|
|
| // Create two channels with DTLS 1.0 / DTLS 1.2 and check ciphers.
|
| TEST_F(DtlsTransportChannelTest, TestDtls12Client1) {
|
| + MAYBE_SKIP_TEST(HaveDtls);
|
| SetChannelCount(2);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| SetMaxProtocolVersions(rtc::SSL_PROTOCOL_DTLS_12, rtc::SSL_PROTOCOL_DTLS_10);
|
| @@ -747,6 +752,7 @@
|
|
|
| // Create two channels with DTLS 1.2 / DTLS 1.0 and check ciphers.
|
| TEST_F(DtlsTransportChannelTest, TestDtls12Client2) {
|
| + MAYBE_SKIP_TEST(HaveDtls);
|
| SetChannelCount(2);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| SetMaxProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_12);
|
| @@ -755,6 +761,7 @@
|
|
|
| // Connect with DTLS, negotiate DTLS-SRTP, and transfer SRTP using bypass.
|
| TEST_F(DtlsTransportChannelTest, TestTransferDtlsSrtp) {
|
| + MAYBE_SKIP_TEST(HaveDtlsSrtp);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| PrepareDtlsSrtp(true, true);
|
| ASSERT_TRUE(Connect());
|
| @@ -764,6 +771,7 @@
|
| // Connect with DTLS-SRTP, transfer an invalid SRTP packet, and expects -1
|
| // returned.
|
| TEST_F(DtlsTransportChannelTest, TestTransferDtlsInvalidSrtpPacket) {
|
| + MAYBE_SKIP_TEST(HaveDtls);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| PrepareDtlsSrtp(true, true);
|
| ASSERT_TRUE(Connect());
|
| @@ -773,6 +781,7 @@
|
|
|
| // Connect with DTLS. A does DTLS-SRTP but B does not.
|
| TEST_F(DtlsTransportChannelTest, TestTransferDtlsSrtpRejected) {
|
| + MAYBE_SKIP_TEST(HaveDtlsSrtp);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| PrepareDtlsSrtp(true, false);
|
| ASSERT_TRUE(Connect());
|
| @@ -780,6 +789,7 @@
|
|
|
| // Connect with DTLS. B does DTLS-SRTP but A does not.
|
| TEST_F(DtlsTransportChannelTest, TestTransferDtlsSrtpNotOffered) {
|
| + MAYBE_SKIP_TEST(HaveDtlsSrtp);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| PrepareDtlsSrtp(false, true);
|
| ASSERT_TRUE(Connect());
|
| @@ -787,6 +797,7 @@
|
|
|
| // Create two channels with DTLS, negotiate DTLS-SRTP, and transfer bypass SRTP.
|
| TEST_F(DtlsTransportChannelTest, TestTransferDtlsSrtpTwoChannels) {
|
| + MAYBE_SKIP_TEST(HaveDtlsSrtp);
|
| SetChannelCount(2);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| PrepareDtlsSrtp(true, true);
|
| @@ -797,6 +808,7 @@
|
|
|
| // Create a single channel with DTLS, and send normal data and SRTP data on it.
|
| TEST_F(DtlsTransportChannelTest, TestTransferDtlsSrtpDemux) {
|
| + MAYBE_SKIP_TEST(HaveDtlsSrtp);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| PrepareDtlsSrtp(true, true);
|
| ASSERT_TRUE(Connect());
|
| @@ -806,6 +818,7 @@
|
|
|
| // Testing when the remote is passive.
|
| TEST_F(DtlsTransportChannelTest, TestTransferDtlsAnswererIsPassive) {
|
| + MAYBE_SKIP_TEST(HaveDtlsSrtp);
|
| SetChannelCount(2);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| PrepareDtlsSrtp(true, true);
|
| @@ -818,6 +831,7 @@
|
| // Testing with the legacy DTLS client which doesn't use setup attribute.
|
| // In this case legacy is the answerer.
|
| TEST_F(DtlsTransportChannelTest, TestDtlsSetupWithLegacyAsAnswerer) {
|
| + MAYBE_SKIP_TEST(HaveDtlsSrtp);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| NegotiateWithLegacy();
|
| rtc::SSLRole channel1_role;
|
| @@ -831,6 +845,7 @@
|
| // Testing re offer/answer after the session is estbalished. Roles will be
|
| // kept same as of the previous negotiation.
|
| TEST_F(DtlsTransportChannelTest, TestDtlsReOfferFromOfferer) {
|
| + MAYBE_SKIP_TEST(HaveDtlsSrtp);
|
| SetChannelCount(2);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| PrepareDtlsSrtp(true, true);
|
| @@ -847,6 +862,7 @@
|
| }
|
|
|
| TEST_F(DtlsTransportChannelTest, TestDtlsReOfferFromAnswerer) {
|
| + MAYBE_SKIP_TEST(HaveDtlsSrtp);
|
| SetChannelCount(2);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| PrepareDtlsSrtp(true, true);
|
| @@ -864,6 +880,7 @@
|
|
|
| // Test that any change in role after the intial setup will result in failure.
|
| TEST_F(DtlsTransportChannelTest, TestDtlsRoleReversal) {
|
| + MAYBE_SKIP_TEST(HaveDtlsSrtp);
|
| SetChannelCount(2);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| PrepareDtlsSrtp(true, true);
|
| @@ -879,6 +896,7 @@
|
| // Test that using different setup attributes which results in similar ssl
|
| // role as the initial negotiation will result in success.
|
| TEST_F(DtlsTransportChannelTest, TestDtlsReOfferWithDifferentSetupAttr) {
|
| + MAYBE_SKIP_TEST(HaveDtlsSrtp);
|
| SetChannelCount(2);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| PrepareDtlsSrtp(true, true);
|
| @@ -894,6 +912,7 @@
|
| // Test that re-negotiation can be started before the clients become connected
|
| // in the first negotiation.
|
| TEST_F(DtlsTransportChannelTest, TestRenegotiateBeforeConnect) {
|
| + MAYBE_SKIP_TEST(HaveDtlsSrtp);
|
| SetChannelCount(2);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| PrepareDtlsSrtp(true, true);
|
| @@ -913,6 +932,7 @@
|
|
|
| // Test Certificates state after negotiation but before connection.
|
| TEST_F(DtlsTransportChannelTest, TestCertificatesBeforeConnect) {
|
| + MAYBE_SKIP_TEST(HaveDtls);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| Negotiate();
|
|
|
| @@ -933,6 +953,7 @@
|
|
|
| // Test Certificates state after connection.
|
| TEST_F(DtlsTransportChannelTest, TestCertificatesAfterConnect) {
|
| + MAYBE_SKIP_TEST(HaveDtls);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| ASSERT_TRUE(Connect());
|
|
|
| @@ -963,6 +984,7 @@
|
| // 60 seconds. The timer defaults to 1 second, but for WebRTC we should be
|
| // initializing it to 50ms.
|
| TEST_F(DtlsTransportChannelTest, TestRetransmissionSchedule) {
|
| + MAYBE_SKIP_TEST(HaveDtls);
|
| // We can only change the retransmission schedule with a recently-added
|
| // BoringSSL API. Skip the test if not built with BoringSSL.
|
| MAYBE_SKIP_TEST(IsBoringSsl);
|
| @@ -1003,6 +1025,7 @@
|
| // Test that a DTLS connection can be made even if the underlying transport
|
| // is connected before DTLS fingerprints/roles have been negotiated.
|
| TEST_F(DtlsTransportChannelTest, TestConnectBeforeNegotiate) {
|
| + MAYBE_SKIP_TEST(HaveDtls);
|
| PrepareDtls(true, true, rtc::KT_DEFAULT);
|
| ASSERT_TRUE(Connect(cricket::CONNECTIONROLE_ACTPASS,
|
| cricket::CONNECTIONROLE_ACTIVE,
|
| @@ -1135,6 +1158,7 @@
|
| };
|
|
|
| TEST_P(DtlsEventOrderingTest, TestEventOrdering) {
|
| + MAYBE_SKIP_TEST(HaveDtls);
|
| TestEventOrdering(::testing::get<0>(GetParam()),
|
| ::testing::get<1>(GetParam()));
|
| }
|
|
|