Index: webrtc/base/sslstreamadapter_unittest.cc |
diff --git a/webrtc/base/sslstreamadapter_unittest.cc b/webrtc/base/sslstreamadapter_unittest.cc |
index 67658ba6103ed8e6f4e0bf369ad5a1126cc07378..d96ee92b31494f8de34a6fb2cfd11e39341be043 100644 |
--- a/webrtc/base/sslstreamadapter_unittest.cc |
+++ b/webrtc/base/sslstreamadapter_unittest.cc |
@@ -165,25 +165,23 @@ class SSLStreamAdapterTestBase : public testing::Test, |
const std::string& client_private_key_pem, |
bool dtls, |
rtc::KeyType client_key_type = rtc::KT_DEFAULT, |
- rtc::KeyType server_key_type = rtc::KT_DEFAULT) |
- : client_buffer_(kFifoBufferSize), |
- server_buffer_(kFifoBufferSize), |
- client_stream_( |
- new SSLDummyStream(this, "c2s", &client_buffer_, &server_buffer_)), |
- server_stream_( |
- new SSLDummyStream(this, "s2c", &server_buffer_, &client_buffer_)), |
- client_ssl_(rtc::SSLStreamAdapter::Create(client_stream_)), |
- server_ssl_(rtc::SSLStreamAdapter::Create(server_stream_)), |
- client_identity_(NULL), |
- server_identity_(NULL), |
- delay_(0), |
- mtu_(1460), |
- loss_(0), |
- lose_first_packet_(false), |
- damage_(false), |
- dtls_(dtls), |
- handshake_wait_(5000), |
- identities_set_(false) { |
+ rtc::KeyType server_key_type = rtc::KT_DEFAULT) : |
tommi (sloooow) - chröme
2015/08/18 14:49:35
nit: no need to change this
|
+ client_buffer_(kFifoBufferSize), |
+ server_buffer_(kFifoBufferSize), |
+ client_stream_( |
+ new SSLDummyStream(this, "c2s", &client_buffer_, &server_buffer_)), |
+ server_stream_( |
+ new SSLDummyStream(this, "s2c", &server_buffer_, &client_buffer_)), |
+ client_ssl_(rtc::SSLStreamAdapter::Create(client_stream_)), |
+ server_ssl_(rtc::SSLStreamAdapter::Create(server_stream_)), |
+ delay_(0), |
+ mtu_(1460), |
+ loss_(0), |
+ lose_first_packet_(false), |
+ damage_(false), |
+ dtls_(dtls), |
+ handshake_wait_(5000), |
+ identities_set_(false) { |
// Set use of the test RNG to get predictable loss patterns. |
rtc::SetRandomTestMode(true); |
@@ -192,15 +190,21 @@ class SSLStreamAdapterTestBase : public testing::Test, |
server_ssl_->SignalEvent.connect(this, &SSLStreamAdapterTestBase::OnEvent); |
if (!client_cert_pem.empty() && !client_private_key_pem.empty()) { |
- client_identity_ = rtc::SSLIdentity::FromPEMStrings( |
- client_private_key_pem, client_cert_pem); |
+ client_certificate_ = webrtc::DtlsCertificate::Create( |
+ rtc::scoped_ptr<rtc::SSLIdentity>( |
+ rtc::SSLIdentity::FromPEMStrings(client_private_key_pem, |
+ client_cert_pem)).Pass()); |
} else { |
- client_identity_ = rtc::SSLIdentity::Generate("client", client_key_type); |
+ client_certificate_ = webrtc::DtlsCertificate::Create( |
+ rtc::scoped_ptr<rtc::SSLIdentity>( |
+ rtc::SSLIdentity::Generate("client", client_key_type)).Pass()); |
} |
- server_identity_ = rtc::SSLIdentity::Generate("server", server_key_type); |
+ server_certificate_ = webrtc::DtlsCertificate::Create( |
+ rtc::scoped_ptr<rtc::SSLIdentity>( |
+ rtc::SSLIdentity::Generate("server", server_key_type)).Pass()); |
- client_ssl_->SetIdentity(client_identity_); |
- server_ssl_->SetIdentity(server_identity_); |
+ client_ssl_->SetCertificate(client_certificate_); |
+ server_ssl_->SetCertificate(server_certificate_); |
} |
~SSLStreamAdapterTestBase() { |
@@ -228,17 +232,21 @@ class SSLStreamAdapterTestBase : public testing::Test, |
client_params.not_before = not_before; |
client_params.not_after = not_after; |
client_params.key_type = rtc::KT_DEFAULT; |
- client_identity_ = rtc::SSLIdentity::GenerateForTest(client_params); |
+ client_certificate_ = webrtc::DtlsCertificate::Create( |
+ rtc::scoped_ptr<rtc::SSLIdentity>( |
+ rtc::SSLIdentity::GenerateForTest(client_params)).Pass()); |
rtc::SSLIdentityParams server_params; |
server_params.common_name = "server"; |
server_params.not_before = not_before; |
server_params.not_after = not_after; |
server_params.key_type = rtc::KT_DEFAULT; |
- server_identity_ = rtc::SSLIdentity::GenerateForTest(server_params); |
+ server_certificate_ = webrtc::DtlsCertificate::Create( |
+ rtc::scoped_ptr<rtc::SSLIdentity>( |
+ rtc::SSLIdentity::GenerateForTest(server_params)).Pass()); |
- client_ssl_->SetIdentity(client_identity_); |
- server_ssl_->SetIdentity(server_identity_); |
+ client_ssl_->SetCertificate(client_certificate_); |
+ server_ssl_->SetCertificate(server_certificate_); |
} |
virtual void OnEvent(rtc::StreamInterface *stream, int sig, int err) { |
@@ -260,9 +268,8 @@ class SSLStreamAdapterTestBase : public testing::Test, |
LOG(LS_INFO) << "Setting peer identities by digest"; |
- rv = server_identity_->certificate().ComputeDigest(rtc::DIGEST_SHA_1, |
- digest, 20, |
- &digest_len); |
+ rv = server_certificate_->identity()->certificate().ComputeDigest( |
+ rtc::DIGEST_SHA_1, digest, 20, &digest_len); |
ASSERT_TRUE(rv); |
if (!correct) { |
LOG(LS_INFO) << "Setting bogus digest for server cert"; |
@@ -273,8 +280,8 @@ class SSLStreamAdapterTestBase : public testing::Test, |
ASSERT_TRUE(rv); |
- rv = client_identity_->certificate().ComputeDigest(rtc::DIGEST_SHA_1, |
- digest, 20, &digest_len); |
+ rv = client_certificate_->identity()->certificate().ComputeDigest( |
+ rtc::DIGEST_SHA_1, digest, 20, &digest_len); |
ASSERT_TRUE(rv); |
if (!correct) { |
LOG(LS_INFO) << "Setting bogus digest for client cert"; |
@@ -448,8 +455,8 @@ class SSLStreamAdapterTestBase : public testing::Test, |
SSLDummyStream *server_stream_; // freed by server_ssl_ destructor |
rtc::scoped_ptr<rtc::SSLStreamAdapter> client_ssl_; |
rtc::scoped_ptr<rtc::SSLStreamAdapter> server_ssl_; |
- rtc::SSLIdentity *client_identity_; // freed by client_ssl_ destructor |
- rtc::SSLIdentity *server_identity_; // freed by server_ssl_ destructor |
+ rtc::scoped_refptr<webrtc::DtlsCertificate> client_certificate_; |
+ rtc::scoped_refptr<webrtc::DtlsCertificate> server_certificate_; |
int delay_; |
size_t mtu_; |
int loss_; |