From 6bf0a5cb5034a7e684dcc3500e841785237ce2dd Mon Sep 17 00:00:00 2001 From: Daniel Baumann Date: Sun, 7 Apr 2024 19:32:43 +0200 Subject: Adding upstream version 1:115.7.0. Signed-off-by: Daniel Baumann --- .../libwebrtc/pc/dtls_transport_unittest.cc | 181 +++++++++++++++++++++ 1 file changed, 181 insertions(+) create mode 100644 third_party/libwebrtc/pc/dtls_transport_unittest.cc (limited to 'third_party/libwebrtc/pc/dtls_transport_unittest.cc') diff --git a/third_party/libwebrtc/pc/dtls_transport_unittest.cc b/third_party/libwebrtc/pc/dtls_transport_unittest.cc new file mode 100644 index 0000000000..c234176635 --- /dev/null +++ b/third_party/libwebrtc/pc/dtls_transport_unittest.cc @@ -0,0 +1,181 @@ +/* + * Copyright 2018 The WebRTC project authors. All Rights Reserved. + * + * Use of this source code is governed by a BSD-style license + * that can be found in the LICENSE file in the root of the source + * tree. An additional intellectual property rights grant can be found + * in the file PATENTS. All contributing project authors may + * be found in the AUTHORS file in the root of the source tree. + */ + +#include "pc/dtls_transport.h" + +#include +#include + +#include "absl/types/optional.h" +#include "api/make_ref_counted.h" +#include "api/rtc_error.h" +#include "p2p/base/fake_dtls_transport.h" +#include "p2p/base/p2p_constants.h" +#include "rtc_base/fake_ssl_identity.h" +#include "rtc_base/gunit.h" +#include "rtc_base/rtc_certificate.h" +#include "rtc_base/ssl_identity.h" +#include "test/gmock.h" +#include "test/gtest.h" + +constexpr int kDefaultTimeout = 1000; // milliseconds +constexpr int kNonsenseCipherSuite = 1234; + +using cricket::FakeDtlsTransport; +using ::testing::ElementsAre; + +namespace webrtc { + +class TestDtlsTransportObserver : public DtlsTransportObserverInterface { + public: + void OnStateChange(DtlsTransportInformation info) override { + state_change_called_ = true; + states_.push_back(info.state()); + info_ = info; + } + + void OnError(RTCError error) override {} + + DtlsTransportState state() { + if (states_.size() > 0) { + return states_[states_.size() - 1]; + } else { + return DtlsTransportState::kNew; + } + } + + bool state_change_called_ = false; + DtlsTransportInformation info_; + std::vector states_; +}; + +class DtlsTransportTest : public ::testing::Test { + public: + DtlsTransport* transport() { return transport_.get(); } + DtlsTransportObserverInterface* observer() { return &observer_; } + + void CreateTransport(rtc::FakeSSLCertificate* certificate = nullptr) { + auto cricket_transport = std::make_unique( + "audio", cricket::ICE_CANDIDATE_COMPONENT_RTP); + if (certificate) { + cricket_transport->SetRemoteSSLCertificate(certificate); + } + cricket_transport->SetSslCipherSuite(kNonsenseCipherSuite); + transport_ = + rtc::make_ref_counted(std::move(cricket_transport)); + } + + void CompleteDtlsHandshake() { + auto fake_dtls1 = static_cast(transport_->internal()); + auto fake_dtls2 = std::make_unique( + "audio", cricket::ICE_CANDIDATE_COMPONENT_RTP); + auto cert1 = rtc::RTCCertificate::Create( + rtc::SSLIdentity::Create("session1", rtc::KT_DEFAULT)); + fake_dtls1->SetLocalCertificate(cert1); + auto cert2 = rtc::RTCCertificate::Create( + rtc::SSLIdentity::Create("session1", rtc::KT_DEFAULT)); + fake_dtls2->SetLocalCertificate(cert2); + fake_dtls1->SetDestination(fake_dtls2.get()); + } + + rtc::AutoThread main_thread_; + rtc::scoped_refptr transport_; + TestDtlsTransportObserver observer_; +}; + +TEST_F(DtlsTransportTest, CreateClearDelete) { + auto cricket_transport = std::make_unique( + "audio", cricket::ICE_CANDIDATE_COMPONENT_RTP); + auto webrtc_transport = + rtc::make_ref_counted(std::move(cricket_transport)); + ASSERT_TRUE(webrtc_transport->internal()); + ASSERT_EQ(DtlsTransportState::kNew, webrtc_transport->Information().state()); + webrtc_transport->Clear(); + ASSERT_FALSE(webrtc_transport->internal()); + ASSERT_EQ(DtlsTransportState::kClosed, + webrtc_transport->Information().state()); +} + +TEST_F(DtlsTransportTest, EventsObservedWhenConnecting) { + CreateTransport(); + transport()->RegisterObserver(observer()); + CompleteDtlsHandshake(); + ASSERT_TRUE_WAIT(observer_.state_change_called_, kDefaultTimeout); + EXPECT_THAT( + observer_.states_, + ElementsAre( // FakeDtlsTransport doesn't signal the "connecting" state. + // TODO(hta): fix FakeDtlsTransport or file bug on it. + // DtlsTransportState::kConnecting, + DtlsTransportState::kConnected)); +} + +TEST_F(DtlsTransportTest, CloseWhenClearing) { + CreateTransport(); + transport()->RegisterObserver(observer()); + CompleteDtlsHandshake(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kConnected, + kDefaultTimeout); + transport()->Clear(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kClosed, + kDefaultTimeout); +} + +TEST_F(DtlsTransportTest, RoleAppearsOnConnect) { + rtc::FakeSSLCertificate fake_certificate("fake data"); + CreateTransport(&fake_certificate); + transport()->RegisterObserver(observer()); + EXPECT_FALSE(transport()->Information().role()); + CompleteDtlsHandshake(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kConnected, + kDefaultTimeout); + EXPECT_TRUE(observer_.info_.role()); + EXPECT_TRUE(transport()->Information().role()); + EXPECT_EQ(transport()->Information().role(), DtlsTransportTlsRole::kClient); +} + +TEST_F(DtlsTransportTest, CertificateAppearsOnConnect) { + rtc::FakeSSLCertificate fake_certificate("fake data"); + CreateTransport(&fake_certificate); + transport()->RegisterObserver(observer()); + CompleteDtlsHandshake(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kConnected, + kDefaultTimeout); + EXPECT_TRUE(observer_.info_.remote_ssl_certificates() != nullptr); +} + +TEST_F(DtlsTransportTest, CertificateDisappearsOnClose) { + rtc::FakeSSLCertificate fake_certificate("fake data"); + CreateTransport(&fake_certificate); + transport()->RegisterObserver(observer()); + CompleteDtlsHandshake(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kConnected, + kDefaultTimeout); + EXPECT_TRUE(observer_.info_.remote_ssl_certificates() != nullptr); + transport()->Clear(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kClosed, + kDefaultTimeout); + EXPECT_FALSE(observer_.info_.remote_ssl_certificates()); +} + +TEST_F(DtlsTransportTest, CipherSuiteVisibleWhenConnected) { + CreateTransport(); + transport()->RegisterObserver(observer()); + CompleteDtlsHandshake(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kConnected, + kDefaultTimeout); + ASSERT_TRUE(observer_.info_.ssl_cipher_suite()); + EXPECT_EQ(kNonsenseCipherSuite, *observer_.info_.ssl_cipher_suite()); + transport()->Clear(); + ASSERT_TRUE_WAIT(observer_.state() == DtlsTransportState::kClosed, + kDefaultTimeout); + EXPECT_FALSE(observer_.info_.ssl_cipher_suite()); +} + +} // namespace webrtc -- cgit v1.2.3