mirror of
https://github.com/mollyim/webrtc.git
synced 2025-05-16 23:30:48 +01:00

This reverts commit a736f30a5f
.
Due to a downstream project not supporting this
new handover state, it fails. Handover state needs
to be submitted first, then downstream project needs
to be updated, and finally the code changes can be
submitted.
Bug: webrtc:14997
Change-Id: I8551e349408d9bf4eb593cb948279d659467fe20
Reviewed-on: https://webrtc-review.googlesource.com/c/src/+/302821
Bot-Commit: rubber-stamper@appspot.gserviceaccount.com <rubber-stamper@appspot.gserviceaccount.com>
Auto-Submit: Victor Boivie <boivie@webrtc.org>
Commit-Queue: Victor Boivie <boivie@webrtc.org>
Cr-Commit-Position: refs/heads/main@{#39923}
59 lines
2.5 KiB
C++
59 lines
2.5 KiB
C++
/*
|
|
* Copyright (c) 2021 The WebRTC project authors. All Rights Reserved.
|
|
*
|
|
* Use of this source code is governed by a BSD-style license
|
|
* that can be found in the LICENSE file in the root of the source
|
|
* tree. An additional intellectual property rights grant can be found
|
|
* in the file PATENTS. All contributing project authors may
|
|
* be found in the AUTHORS file in the root of the source tree.
|
|
*/
|
|
#include "net/dcsctp/socket/state_cookie.h"
|
|
|
|
#include "net/dcsctp/testing/testing_macros.h"
|
|
#include "rtc_base/gunit.h"
|
|
#include "test/gmock.h"
|
|
|
|
namespace dcsctp {
|
|
namespace {
|
|
using ::testing::SizeIs;
|
|
|
|
TEST(StateCookieTest, SerializeAndDeserialize) {
|
|
Capabilities capabilities = {.partial_reliability = true,
|
|
.message_interleaving = false,
|
|
.reconfig = true,
|
|
.negotiated_maximum_incoming_streams = 123,
|
|
.negotiated_maximum_outgoing_streams = 234};
|
|
StateCookie cookie(VerificationTag(123), TSN(456),
|
|
/*a_rwnd=*/789, TieTag(101112), capabilities);
|
|
std::vector<uint8_t> serialized = cookie.Serialize();
|
|
EXPECT_THAT(serialized, SizeIs(StateCookie::kCookieSize));
|
|
ASSERT_HAS_VALUE_AND_ASSIGN(StateCookie deserialized,
|
|
StateCookie::Deserialize(serialized));
|
|
EXPECT_EQ(deserialized.initiate_tag(), VerificationTag(123));
|
|
EXPECT_EQ(deserialized.initial_tsn(), TSN(456));
|
|
EXPECT_EQ(deserialized.a_rwnd(), 789u);
|
|
EXPECT_EQ(deserialized.tie_tag(), TieTag(101112));
|
|
EXPECT_TRUE(deserialized.capabilities().partial_reliability);
|
|
EXPECT_FALSE(deserialized.capabilities().message_interleaving);
|
|
EXPECT_TRUE(deserialized.capabilities().reconfig);
|
|
EXPECT_EQ(deserialized.capabilities().negotiated_maximum_incoming_streams,
|
|
123);
|
|
EXPECT_EQ(deserialized.capabilities().negotiated_maximum_outgoing_streams,
|
|
234);
|
|
}
|
|
|
|
TEST(StateCookieTest, ValidateMagicValue) {
|
|
Capabilities capabilities = {.partial_reliability = true,
|
|
.message_interleaving = false,
|
|
.reconfig = true};
|
|
StateCookie cookie(VerificationTag(123), TSN(456),
|
|
/*a_rwnd=*/789, TieTag(101112), capabilities);
|
|
std::vector<uint8_t> serialized = cookie.Serialize();
|
|
ASSERT_THAT(serialized, SizeIs(StateCookie::kCookieSize));
|
|
|
|
absl::string_view magic(reinterpret_cast<const char*>(serialized.data()), 8);
|
|
EXPECT_EQ(magic, "dcSCTP00");
|
|
}
|
|
|
|
} // namespace
|
|
} // namespace dcsctp
|