| Index: webrtc/base/sslstreamadapter_unittest.cc
|
| diff --git a/webrtc/base/sslstreamadapter_unittest.cc b/webrtc/base/sslstreamadapter_unittest.cc
|
| index a041c25211847cc38392d8a0766d95e85a7cf988..c2e9e6eb5729fddb27a400fb646f59532c8fa8da 100644
|
| --- a/webrtc/base/sslstreamadapter_unittest.cc
|
| +++ b/webrtc/base/sslstreamadapter_unittest.cc
|
| @@ -1077,10 +1077,9 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuite) {
|
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher));
|
|
|
| ASSERT_EQ(client_cipher, server_cipher);
|
| - ASSERT_EQ(
|
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()),
|
| - server_cipher);
|
| + ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher(
|
| + server_cipher, rtc::SSL_PROTOCOL_DTLS_10,
|
| + ::testing::get<1>(GetParam()).type()));
|
| }
|
|
|
| // Test getting the used DTLS 1.2 ciphers.
|
| @@ -1096,10 +1095,9 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Both) {
|
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher));
|
|
|
| ASSERT_EQ(client_cipher, server_cipher);
|
| - ASSERT_EQ(
|
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_12, ::testing::get<1>(GetParam()).type()),
|
| - server_cipher);
|
| + ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher(
|
| + server_cipher, rtc::SSL_PROTOCOL_DTLS_12,
|
| + ::testing::get<1>(GetParam()).type()));
|
| }
|
|
|
| // DTLS 1.2 enabled for client only -> DTLS 1.0 will be used.
|
| @@ -1114,10 +1112,9 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Client) {
|
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher));
|
|
|
| ASSERT_EQ(client_cipher, server_cipher);
|
| - ASSERT_EQ(
|
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()),
|
| - server_cipher);
|
| + ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher(
|
| + server_cipher, rtc::SSL_PROTOCOL_DTLS_10,
|
| + ::testing::get<1>(GetParam()).type()));
|
| }
|
|
|
| // DTLS 1.2 enabled for server only -> DTLS 1.0 will be used.
|
| @@ -1132,10 +1129,9 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Server) {
|
| ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher));
|
|
|
| ASSERT_EQ(client_cipher, server_cipher);
|
| - ASSERT_EQ(
|
| - rtc::SSLStreamAdapter::GetDefaultSslCipherForTest(
|
| - rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()),
|
| - server_cipher);
|
| + ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher(
|
| + server_cipher, rtc::SSL_PROTOCOL_DTLS_10,
|
| + ::testing::get<1>(GetParam()).type()));
|
| }
|
|
|
| // The RSA keysizes here might look strange, why not include the RFC's size
|
|
|