Index: webrtc/p2p/base/dtlstransportchannel_unittest.cc |
diff --git a/webrtc/p2p/base/dtlstransportchannel_unittest.cc b/webrtc/p2p/base/dtlstransportchannel_unittest.cc |
index 814957785a765695eb3818796f3be754dc28fec0..e62563e9b56ce7a4a5c8747c4eddcbebacabcaeb 100644 |
--- a/webrtc/p2p/base/dtlstransportchannel_unittest.cc |
+++ b/webrtc/p2p/base/dtlstransportchannel_unittest.cc |
@@ -217,7 +217,7 @@ |
channels_.begin(); it != channels_.end(); ++it) { |
std::string cipher; |
- bool rv = (*it)->GetSrtpCryptoSuite(&cipher); |
+ bool rv = (*it)->GetSrtpCipher(&cipher); |
if (negotiated_dtls_ && !expected_cipher.empty()) { |
ASSERT_TRUE(rv); |
@@ -228,13 +228,13 @@ |
} |
} |
- void CheckSsl(uint16_t expected_cipher) { |
+ void CheckSsl(const std::string& expected_cipher) { |
for (std::vector<cricket::DtlsTransportChannelWrapper*>::iterator it = |
channels_.begin(); it != channels_.end(); ++it) { |
- uint16_t cipher; |
- |
- bool rv = (*it)->GetSslCipherSuite(&cipher); |
- if (negotiated_dtls_ && expected_cipher) { |
+ std::string cipher; |
+ |
+ bool rv = (*it)->GetSslCipher(&cipher); |
+ if (negotiated_dtls_ && !expected_cipher.empty()) { |
ASSERT_TRUE(rv); |
ASSERT_EQ(cipher, expected_cipher); |
@@ -463,10 +463,10 @@ |
client1_.CheckSrtp(""); |
client2_.CheckSrtp(""); |
} |
- client1_.CheckSsl(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- ssl_expected_version_, rtc::KT_DEFAULT)); |
- client2_.CheckSsl(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- ssl_expected_version_, rtc::KT_DEFAULT)); |
+ client1_.CheckSsl( |
+ rtc::SSLStreamAdapter::GetDefaultSslCipher(ssl_expected_version_)); |
+ client2_.CheckSsl( |
+ rtc::SSLStreamAdapter::GetDefaultSslCipher(ssl_expected_version_)); |
return true; |
} |