Index: webrtc/p2p/base/fakedtlstransport.h |
diff --git a/webrtc/p2p/base/fakedtlstransport.h b/webrtc/p2p/base/fakedtlstransport.h |
index da3537f1fd9ec0f0e76b75e5201c1763d65a666e..bd41a11fb9d321d0063eb8c661007b257ba82212 100644 |
--- a/webrtc/p2p/base/fakedtlstransport.h |
+++ b/webrtc/p2p/base/fakedtlstransport.h |
@@ -86,7 +86,6 @@ class FakeDtlsTransport : public DtlsTransportInternal { |
dest_ = dest; |
if (local_cert_ && dest_->local_cert_) { |
do_dtls_ = true; |
- NegotiateSrtpCiphers(); |
} |
SetWritable(true); |
if (!asymmetric) { |
@@ -132,15 +131,8 @@ class FakeDtlsTransport : public DtlsTransportInternal { |
remote_cert_ = cert; |
} |
bool IsDtlsActive() const override { return do_dtls_; } |
- bool SetSrtpCryptoSuites(const std::vector<int>& ciphers) override { |
- srtp_ciphers_ = ciphers; |
- return true; |
- } |
bool GetSrtpCryptoSuite(int* crypto_suite) override { |
- if (chosen_crypto_suite_ != rtc::SRTP_INVALID_CRYPTO_SUITE) { |
- *crypto_suite = chosen_crypto_suite_; |
- return true; |
- } |
+ *crypto_suite = rtc::SRTP_AES128_CM_SHA1_80; |
return false; |
} |
bool GetSslCipherSuite(int* cipher_suite) override { return false; } |
@@ -159,12 +151,11 @@ class FakeDtlsTransport : public DtlsTransportInternal { |
bool use_context, |
uint8_t* result, |
size_t result_len) override { |
- if (chosen_crypto_suite_ != rtc::SRTP_INVALID_CRYPTO_SUITE) { |
- memset(result, 0xff, result_len); |
- return true; |
+ if (!do_dtls_) { |
+ return false; |
} |
- |
- return false; |
+ memset(result, 0xff, result_len); |
+ return true; |
} |
void set_ssl_max_protocol_version(rtc::SSLProtocolVersion version) { |
ssl_max_version_ = version; |
@@ -172,13 +163,6 @@ class FakeDtlsTransport : public DtlsTransportInternal { |
rtc::SSLProtocolVersion ssl_max_protocol_version() const { |
return ssl_max_version_; |
} |
- bool SetSrtpCiphers(const std::vector<std::string>& ciphers) override { |
- std::vector<int> crypto_suites; |
- for (const auto cipher : ciphers) { |
- crypto_suites.push_back(rtc::SrtpCryptoSuiteFromName(cipher)); |
- } |
- return SetSrtpCryptoSuites(crypto_suites); |
- } |
IceTransportInternal* ice_transport() override { return ice_transport_; } |
@@ -213,19 +197,6 @@ class FakeDtlsTransport : public DtlsTransportInternal { |
SignalReadPacket(this, data, len, time, flags); |
} |
- void NegotiateSrtpCiphers() { |
- for (std::vector<int>::const_iterator it1 = srtp_ciphers_.begin(); |
- it1 != srtp_ciphers_.end(); ++it1) { |
- for (std::vector<int>::const_iterator it2 = dest_->srtp_ciphers_.begin(); |
- it2 != dest_->srtp_ciphers_.end(); ++it2) { |
- if (*it1 == *it2) { |
- chosen_crypto_suite_ = *it1; |
- return; |
- } |
- } |
- } |
- } |
- |
void set_receiving(bool receiving) { |
if (receiving_ == receiving) { |
return; |
@@ -253,8 +224,6 @@ class FakeDtlsTransport : public DtlsTransportInternal { |
rtc::scoped_refptr<rtc::RTCCertificate> local_cert_; |
rtc::FakeSSLCertificate* remote_cert_ = nullptr; |
bool do_dtls_ = false; |
- std::vector<int> srtp_ciphers_; |
- int chosen_crypto_suite_ = rtc::SRTP_INVALID_CRYPTO_SUITE; |
rtc::SSLProtocolVersion ssl_max_version_ = rtc::SSL_PROTOCOL_DTLS_12; |
rtc::SSLFingerprint dtls_fingerprint_; |
rtc::SSLRole ssl_role_ = rtc::SSL_CLIENT; |