| Index: webrtc/base/sslstreamadapter_unittest.cc | 
| diff --git a/webrtc/base/sslstreamadapter_unittest.cc b/webrtc/base/sslstreamadapter_unittest.cc | 
| index 68e1b64dbe91a38aac7d5ff076d045be0d1e3074..c8fe9a01e78d466dee20242e7a3fbf6c8a7a17ed 100644 | 
| --- a/webrtc/base/sslstreamadapter_unittest.cc | 
| +++ b/webrtc/base/sslstreamadapter_unittest.cc | 
| @@ -410,11 +410,11 @@ class SSLStreamAdapterTestBase : public testing::Test, | 
| return server_ssl_->GetPeerCertificate(cert); | 
| } | 
|  | 
| -  bool GetSslCipher(bool client, std::string *retval) { | 
| +  bool GetSslCipherSuite(bool client, uint16_t* retval) { | 
| if (client) | 
| -      return client_ssl_->GetSslCipher(retval); | 
| +      return client_ssl_->GetSslCipherSuite(retval); | 
| else | 
| -      return server_ssl_->GetSslCipher(retval); | 
| +      return server_ssl_->GetSslCipherSuite(retval); | 
| } | 
|  | 
| bool ExportKeyingMaterial(const char *label, | 
| @@ -967,70 +967,70 @@ TEST_P(SSLStreamAdapterTestDTLSFromPEMStrings, TestDTLSGetPeerCertificate) { | 
|  | 
| // Test getting the used DTLS ciphers. | 
| // DTLS 1.2 enabled for neither client nor server -> DTLS 1.0 will be used. | 
| -TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipher) { | 
| +TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuite) { | 
| MAYBE_SKIP_TEST(HaveDtls); | 
| SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_10); | 
| TestHandshake(); | 
|  | 
| -  std::string client_cipher; | 
| -  ASSERT_TRUE(GetSslCipher(true, &client_cipher)); | 
| -  std::string server_cipher; | 
| -  ASSERT_TRUE(GetSslCipher(false, &server_cipher)); | 
| +  uint16_t client_cipher; | 
| +  ASSERT_TRUE(GetSslCipherSuite(true, &client_cipher)); | 
| +  uint16_t server_cipher; | 
| +  ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); | 
|  | 
| ASSERT_EQ(client_cipher, server_cipher); | 
| -  ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipher( | 
| +  ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( | 
| rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam())), | 
| server_cipher); | 
| } | 
|  | 
| // Test getting the used DTLS 1.2 ciphers. | 
| // DTLS 1.2 enabled for client and server -> DTLS 1.2 will be used. | 
| -TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherDtls12Both) { | 
| +TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Both) { | 
| MAYBE_SKIP_TEST(HaveDtls); | 
| SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_12, rtc::SSL_PROTOCOL_DTLS_12); | 
| TestHandshake(); | 
|  | 
| -  std::string client_cipher; | 
| -  ASSERT_TRUE(GetSslCipher(true, &client_cipher)); | 
| -  std::string server_cipher; | 
| -  ASSERT_TRUE(GetSslCipher(false, &server_cipher)); | 
| +  uint16_t client_cipher; | 
| +  ASSERT_TRUE(GetSslCipherSuite(true, &client_cipher)); | 
| +  uint16_t server_cipher; | 
| +  ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); | 
|  | 
| ASSERT_EQ(client_cipher, server_cipher); | 
| -  ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipher( | 
| +  ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( | 
| rtc::SSL_PROTOCOL_DTLS_12, ::testing::get<1>(GetParam())), | 
| server_cipher); | 
| } | 
|  | 
| // DTLS 1.2 enabled for client only -> DTLS 1.0 will be used. | 
| -TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherDtls12Client) { | 
| +TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Client) { | 
| MAYBE_SKIP_TEST(HaveDtls); | 
| SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_10, rtc::SSL_PROTOCOL_DTLS_12); | 
| TestHandshake(); | 
|  | 
| -  std::string client_cipher; | 
| -  ASSERT_TRUE(GetSslCipher(true, &client_cipher)); | 
| -  std::string server_cipher; | 
| -  ASSERT_TRUE(GetSslCipher(false, &server_cipher)); | 
| +  uint16_t client_cipher; | 
| +  ASSERT_TRUE(GetSslCipherSuite(true, &client_cipher)); | 
| +  uint16_t server_cipher; | 
| +  ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); | 
|  | 
| ASSERT_EQ(client_cipher, server_cipher); | 
| -  ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipher( | 
| +  ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( | 
| rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam())), | 
| server_cipher); | 
| } | 
|  | 
| // DTLS 1.2 enabled for server only -> DTLS 1.0 will be used. | 
| -TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherDtls12Server) { | 
| +TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Server) { | 
| MAYBE_SKIP_TEST(HaveDtls); | 
| SetupProtocolVersions(rtc::SSL_PROTOCOL_DTLS_12, rtc::SSL_PROTOCOL_DTLS_10); | 
| TestHandshake(); | 
|  | 
| -  std::string client_cipher; | 
| -  ASSERT_TRUE(GetSslCipher(true, &client_cipher)); | 
| -  std::string server_cipher; | 
| -  ASSERT_TRUE(GetSslCipher(false, &server_cipher)); | 
| +  uint16_t client_cipher; | 
| +  ASSERT_TRUE(GetSslCipherSuite(true, &client_cipher)); | 
| +  uint16_t server_cipher; | 
| +  ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); | 
|  | 
| ASSERT_EQ(client_cipher, server_cipher); | 
| -  ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipher( | 
| +  ASSERT_EQ(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( | 
| rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam())), | 
| server_cipher); | 
| } | 
|  |