| Index: webrtc/p2p/base/dtlstransportchannel_unittest.cc | 
| diff --git a/webrtc/p2p/base/dtlstransportchannel_unittest.cc b/webrtc/p2p/base/dtlstransportchannel_unittest.cc | 
| index 814957785a765695eb3818796f3be754dc28fec0..e62563e9b56ce7a4a5c8747c4eddcbebacabcaeb 100644 | 
| --- a/webrtc/p2p/base/dtlstransportchannel_unittest.cc | 
| +++ b/webrtc/p2p/base/dtlstransportchannel_unittest.cc | 
| @@ -217,7 +217,7 @@ | 
| channels_.begin(); it != channels_.end(); ++it) { | 
| std::string cipher; | 
|  | 
| -      bool rv = (*it)->GetSrtpCryptoSuite(&cipher); | 
| +      bool rv = (*it)->GetSrtpCipher(&cipher); | 
| if (negotiated_dtls_ && !expected_cipher.empty()) { | 
| ASSERT_TRUE(rv); | 
|  | 
| @@ -228,13 +228,13 @@ | 
| } | 
| } | 
|  | 
| -  void CheckSsl(uint16_t expected_cipher) { | 
| +  void CheckSsl(const std::string& expected_cipher) { | 
| for (std::vector<cricket::DtlsTransportChannelWrapper*>::iterator it = | 
| channels_.begin(); it != channels_.end(); ++it) { | 
| -      uint16_t cipher; | 
| - | 
| -      bool rv = (*it)->GetSslCipherSuite(&cipher); | 
| -      if (negotiated_dtls_ && expected_cipher) { | 
| +      std::string cipher; | 
| + | 
| +      bool rv = (*it)->GetSslCipher(&cipher); | 
| +      if (negotiated_dtls_ && !expected_cipher.empty()) { | 
| ASSERT_TRUE(rv); | 
|  | 
| ASSERT_EQ(cipher, expected_cipher); | 
| @@ -463,10 +463,10 @@ | 
| client1_.CheckSrtp(""); | 
| client2_.CheckSrtp(""); | 
| } | 
| -    client1_.CheckSsl(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( | 
| -        ssl_expected_version_, rtc::KT_DEFAULT)); | 
| -    client2_.CheckSsl(rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( | 
| -        ssl_expected_version_, rtc::KT_DEFAULT)); | 
| +    client1_.CheckSsl( | 
| +        rtc::SSLStreamAdapter::GetDefaultSslCipher(ssl_expected_version_)); | 
| +    client2_.CheckSsl( | 
| +        rtc::SSLStreamAdapter::GetDefaultSslCipher(ssl_expected_version_)); | 
|  | 
| return true; | 
| } | 
|  |