Index: third_party/WebKit/LayoutTests/fast/mediastream/RTCPeerConnection.html |
diff --git a/third_party/WebKit/LayoutTests/fast/mediastream/RTCPeerConnection.html b/third_party/WebKit/LayoutTests/fast/mediastream/RTCPeerConnection.html |
index 2624d778851a9ee3a02b50aa6002ffa7e3550283..577fd443165ba3e2aaa715570e35e5deccdc8925 100644 |
--- a/third_party/WebKit/LayoutTests/fast/mediastream/RTCPeerConnection.html |
+++ b/third_party/WebKit/LayoutTests/fast/mediastream/RTCPeerConnection.html |
@@ -66,6 +66,7 @@ shouldThrow("new webkitRTCPeerConnection({iceServers:[], certificates:[1337]});" |
// Global certificate variables so that the "should..." methods can evaluate them. |
var certRSA = null; |
var certECDSA = null; |
+var certExpired = null; |
function testCertificates1RSA() |
{ |
@@ -86,6 +87,20 @@ function testCertificates2ECDSA() |
.then(function(certificate) { |
certECDSA = certificate; |
shouldNotThrow('new webkitRTCPeerConnection({iceServers:[], certificates:[certECDSA]}, null);'); |
+ testCertificates3Expired(); |
+ }, |
+ function() { |
+ testFailed('Generating ECDSA P-256'); |
+ testCertificates3Expired(); |
+ }); |
+} |
+function testCertificates3Expired() |
+{ |
+ webkitRTCPeerConnection.generateCertificate({ name: "ECDSA", namedCurve: "P-256", expires:0 }) |
+ .then(function(certificate) { |
+ certExpired = certificate; |
+ shouldBeTrue('certExpired.expires <= new Date().getTime()'); |
+ shouldThrow('new webkitRTCPeerConnection({iceServers:[], certificates:[certExpired]}, null);'); |
finishJSTest(); |
}, |
function() { |
@@ -94,7 +109,7 @@ function testCertificates2ECDSA() |
}); |
} |
// Sequentially test construction with RSA and ECDSA certificates. |
-// testCertificates2ECDSA's callback methods mark the end of the async tests. |
+// testCertificates3Expired's callback methods mark the end of the async tests. |
testCertificates1RSA(); |
window.jsTestIsAsync = true; |