| OLD | NEW |
| 1 /* | 1 /* |
| 2 * Copyright 2004 The WebRTC project authors. All Rights Reserved. | 2 * Copyright 2004 The WebRTC project authors. All Rights Reserved. |
| 3 * | 3 * |
| 4 * Use of this source code is governed by a BSD-style license | 4 * Use of this source code is governed by a BSD-style license |
| 5 * that can be found in the LICENSE file in the root of the source | 5 * that can be found in the LICENSE file in the root of the source |
| 6 * tree. An additional intellectual property rights grant can be found | 6 * tree. An additional intellectual property rights grant can be found |
| 7 * in the file PATENTS. All contributing project authors may | 7 * in the file PATENTS. All contributing project authors may |
| 8 * be found in the AUTHORS file in the root of the source tree. | 8 * be found in the AUTHORS file in the root of the source tree. |
| 9 */ | 9 */ |
| 10 | 10 |
| (...skipping 560 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 571 } | 571 } |
| 572 | 572 |
| 573 #if defined(ENABLE_EXTERNAL_AUTH) | 573 #if defined(ENABLE_EXTERNAL_AUTH) |
| 574 TEST_F(SrtpFilterTest, TestGetSendAuthParams) { | 574 TEST_F(SrtpFilterTest, TestGetSendAuthParams) { |
| 575 EXPECT_TRUE(f1_.SetRtpParams(rtc::SRTP_AES128_CM_SHA1_32, kTestKey1, | 575 EXPECT_TRUE(f1_.SetRtpParams(rtc::SRTP_AES128_CM_SHA1_32, kTestKey1, |
| 576 kTestKeyLen, rtc::SRTP_AES128_CM_SHA1_32, | 576 kTestKeyLen, rtc::SRTP_AES128_CM_SHA1_32, |
| 577 kTestKey2, kTestKeyLen)); | 577 kTestKey2, kTestKeyLen)); |
| 578 EXPECT_TRUE(f1_.SetRtcpParams(rtc::SRTP_AES128_CM_SHA1_32, kTestKey1, | 578 EXPECT_TRUE(f1_.SetRtcpParams(rtc::SRTP_AES128_CM_SHA1_32, kTestKey1, |
| 579 kTestKeyLen, rtc::SRTP_AES128_CM_SHA1_32, | 579 kTestKeyLen, rtc::SRTP_AES128_CM_SHA1_32, |
| 580 kTestKey2, kTestKeyLen)); | 580 kTestKey2, kTestKeyLen)); |
| 581 uint8_t* auth_key = NULL; | 581 uint8_t* auth_key = nullptr; |
| 582 int auth_key_len = 0, auth_tag_len = 0; | 582 int auth_key_len = 0, auth_tag_len = 0; |
| 583 EXPECT_TRUE(f1_.GetRtpAuthParams(&auth_key, &auth_key_len, &auth_tag_len)); | 583 EXPECT_TRUE(f1_.GetRtpAuthParams(&auth_key, &auth_key_len, &auth_tag_len)); |
| 584 EXPECT_TRUE(auth_key != NULL); | 584 EXPECT_TRUE(auth_key != nullptr); |
| 585 EXPECT_EQ(20, auth_key_len); | 585 EXPECT_EQ(20, auth_key_len); |
| 586 EXPECT_EQ(4, auth_tag_len); | 586 EXPECT_EQ(4, auth_tag_len); |
| 587 } | 587 } |
| 588 #endif | 588 #endif |
| 589 | 589 |
| 590 class SrtpSessionTest : public testing::Test { | 590 class SrtpSessionTest : public testing::Test { |
| 591 protected: | 591 protected: |
| 592 virtual void SetUp() { | 592 virtual void SetUp() { |
| 593 rtp_len_ = sizeof(kPcmuFrame); | 593 rtp_len_ = sizeof(kPcmuFrame); |
| 594 rtcp_len_ = sizeof(kRtcpReport); | 594 rtcp_len_ = sizeof(kRtcpReport); |
| (...skipping 337 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 932 srtp_stat_.AddUnprotectRtcpResult(srtp_err_status_fail); | 932 srtp_stat_.AddUnprotectRtcpResult(srtp_err_status_fail); |
| 933 EXPECT_EQ(-1, mode_); | 933 EXPECT_EQ(-1, mode_); |
| 934 EXPECT_EQ(cricket::SrtpFilter::ERROR_NONE, error_); | 934 EXPECT_EQ(cricket::SrtpFilter::ERROR_NONE, error_); |
| 935 // Now the error will be triggered again. | 935 // Now the error will be triggered again. |
| 936 Reset(); | 936 Reset(); |
| 937 rtc::Thread::Current()->SleepMs(210); | 937 rtc::Thread::Current()->SleepMs(210); |
| 938 srtp_stat_.AddUnprotectRtcpResult(srtp_err_status_fail); | 938 srtp_stat_.AddUnprotectRtcpResult(srtp_err_status_fail); |
| 939 EXPECT_EQ(cricket::SrtpFilter::UNPROTECT, mode_); | 939 EXPECT_EQ(cricket::SrtpFilter::UNPROTECT, mode_); |
| 940 EXPECT_EQ(cricket::SrtpFilter::ERROR_FAIL, error_); | 940 EXPECT_EQ(cricket::SrtpFilter::ERROR_FAIL, error_); |
| 941 } | 941 } |
| OLD | NEW |