| OLD | NEW | 
|---|
| 1 /* | 1 /* | 
| 2  *  Copyright 2011 The WebRTC Project Authors. All rights reserved. | 2  *  Copyright 2011 The WebRTC Project Authors. All rights reserved. | 
| 3  * | 3  * | 
| 4  *  Use of this source code is governed by a BSD-style license | 4  *  Use of this source code is governed by a BSD-style license | 
| 5  *  that can be found in the LICENSE file in the root of the source | 5  *  that can be found in the LICENSE file in the root of the source | 
| 6  *  tree. An additional intellectual property rights grant can be found | 6  *  tree. An additional intellectual property rights grant can be found | 
| 7  *  in the file PATENTS.  All contributing project authors may | 7  *  in the file PATENTS.  All contributing project authors may | 
| 8  *  be found in the AUTHORS file in the root of the source tree. | 8  *  be found in the AUTHORS file in the root of the source tree. | 
| 9  */ | 9  */ | 
| 10 | 10 | 
| (...skipping 207 matching lines...) Expand 10 before | Expand all | Expand 10 after  Loading... | 
| 218         ASSERT_EQ(cipher, expected_cipher); | 218         ASSERT_EQ(cipher, expected_cipher); | 
| 219       } else { | 219       } else { | 
| 220         ASSERT_FALSE(rv); | 220         ASSERT_FALSE(rv); | 
| 221       } | 221       } | 
| 222     } | 222     } | 
| 223   } | 223   } | 
| 224 | 224 | 
| 225   void CheckSsl(const std::string& expected_cipher) { | 225   void CheckSsl(const std::string& expected_cipher) { | 
| 226     for (std::vector<cricket::DtlsTransportChannelWrapper*>::iterator it = | 226     for (std::vector<cricket::DtlsTransportChannelWrapper*>::iterator it = | 
| 227            channels_.begin(); it != channels_.end(); ++it) { | 227            channels_.begin(); it != channels_.end(); ++it) { | 
| 228       std::string cipher; | 228       rtc::SslCipher cipher; | 
| 229 | 229 | 
| 230       bool rv = (*it)->GetSslCipher(&cipher); | 230       bool rv = (*it)->GetSslCipher(&cipher); | 
| 231       if (negotiated_dtls_ && !expected_cipher.empty()) { | 231       if (negotiated_dtls_ && !expected_cipher.empty()) { | 
| 232         ASSERT_TRUE(rv); | 232         ASSERT_TRUE(rv); | 
| 233 | 233 | 
| 234         ASSERT_EQ(cipher, expected_cipher); | 234         ASSERT_EQ(cipher.name, expected_cipher); | 
| 235       } else { | 235       } else { | 
| 236         ASSERT_FALSE(rv); | 236         ASSERT_FALSE(rv); | 
| 237       } | 237       } | 
| 238     } | 238     } | 
| 239   } | 239   } | 
| 240 | 240 | 
| 241   void SendPackets(size_t channel, size_t size, size_t count, bool srtp) { | 241   void SendPackets(size_t channel, size_t size, size_t count, bool srtp) { | 
| 242     ASSERT(channel < channels_.size()); | 242     ASSERT(channel < channels_.size()); | 
| 243     rtc::scoped_ptr<char[]> packet(new char[size]); | 243     rtc::scoped_ptr<char[]> packet(new char[size]); | 
| 244     size_t sent = 0; | 244     size_t sent = 0; | 
| (...skipping 210 matching lines...) Expand 10 before | Expand all | Expand 10 after  Loading... | 
| 455     } | 455     } | 
| 456 | 456 | 
| 457     // Check that we negotiated the right ciphers. | 457     // Check that we negotiated the right ciphers. | 
| 458     if (use_dtls_srtp_) { | 458     if (use_dtls_srtp_) { | 
| 459       client1_.CheckSrtp(AES_CM_128_HMAC_SHA1_80); | 459       client1_.CheckSrtp(AES_CM_128_HMAC_SHA1_80); | 
| 460       client2_.CheckSrtp(AES_CM_128_HMAC_SHA1_80); | 460       client2_.CheckSrtp(AES_CM_128_HMAC_SHA1_80); | 
| 461     } else { | 461     } else { | 
| 462       client1_.CheckSrtp(""); | 462       client1_.CheckSrtp(""); | 
| 463       client2_.CheckSrtp(""); | 463       client2_.CheckSrtp(""); | 
| 464     } | 464     } | 
| 465     client1_.CheckSsl( | 465     client1_.CheckSsl(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( | 
| 466         rtc::SSLStreamAdapter::GetDefaultSslCipher(ssl_expected_version_)); | 466                           ssl_expected_version_).name); | 
| 467     client2_.CheckSsl( | 467     client2_.CheckSsl(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( | 
| 468         rtc::SSLStreamAdapter::GetDefaultSslCipher(ssl_expected_version_)); | 468                           ssl_expected_version_).name); | 
| 469 | 469 | 
| 470     return true; | 470     return true; | 
| 471   } | 471   } | 
| 472 | 472 | 
| 473   bool Connect() { | 473   bool Connect() { | 
| 474     // By default, Client1 will be Server and Client2 will be Client. | 474     // By default, Client1 will be Server and Client2 will be Client. | 
| 475     return Connect(cricket::CONNECTIONROLE_ACTPASS, | 475     return Connect(cricket::CONNECTIONROLE_ACTPASS, | 
| 476                    cricket::CONNECTIONROLE_ACTIVE); | 476                    cricket::CONNECTIONROLE_ACTIVE); | 
| 477   } | 477   } | 
| 478 | 478 | 
| (...skipping 384 matching lines...) Expand 10 before | Expand all | Expand 10 after  Loading... | 
| 863   // Each side's remote certificate is the other side's local certificate. | 863   // Each side's remote certificate is the other side's local certificate. | 
| 864   ASSERT_TRUE( | 864   ASSERT_TRUE( | 
| 865       client1_.transport()->GetRemoteSSLCertificate(remote_cert1.accept())); | 865       client1_.transport()->GetRemoteSSLCertificate(remote_cert1.accept())); | 
| 866   ASSERT_EQ(remote_cert1->ToPEMString(), | 866   ASSERT_EQ(remote_cert1->ToPEMString(), | 
| 867             certificate2->ssl_certificate().ToPEMString()); | 867             certificate2->ssl_certificate().ToPEMString()); | 
| 868   ASSERT_TRUE( | 868   ASSERT_TRUE( | 
| 869       client2_.transport()->GetRemoteSSLCertificate(remote_cert2.accept())); | 869       client2_.transport()->GetRemoteSSLCertificate(remote_cert2.accept())); | 
| 870   ASSERT_EQ(remote_cert2->ToPEMString(), | 870   ASSERT_EQ(remote_cert2->ToPEMString(), | 
| 871             certificate1->ssl_certificate().ToPEMString()); | 871             certificate1->ssl_certificate().ToPEMString()); | 
| 872 } | 872 } | 
| OLD | NEW | 
|---|