Index: webrtc/base/sslstreamadapter_unittest.cc |
diff --git a/webrtc/base/sslstreamadapter_unittest.cc b/webrtc/base/sslstreamadapter_unittest.cc |
index a041c25211847cc38392d8a0766d95e85a7cf988..c2e9e6eb5729fddb27a400fb646f59532c8fa8da 100644 |
--- a/webrtc/base/sslstreamadapter_unittest.cc |
+++ b/webrtc/base/sslstreamadapter_unittest.cc |
@@ -1077,10 +1077,9 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuite) { |
ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
ASSERT_EQ(client_cipher, server_cipher); |
- ASSERT_EQ( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
- server_cipher); |
+ ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ server_cipher, rtc::SSL_PROTOCOL_DTLS_10, |
+ ::testing::get<1>(GetParam()).type())); |
} |
// Test getting the used DTLS 1.2 ciphers. |
@@ -1096,10 +1095,9 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Both) { |
ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
ASSERT_EQ(client_cipher, server_cipher); |
- ASSERT_EQ( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_12, ::testing::get<1>(GetParam()).type()), |
- server_cipher); |
+ ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ server_cipher, rtc::SSL_PROTOCOL_DTLS_12, |
+ ::testing::get<1>(GetParam()).type())); |
} |
// DTLS 1.2 enabled for client only -> DTLS 1.0 will be used. |
@@ -1114,10 +1112,9 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Client) { |
ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
ASSERT_EQ(client_cipher, server_cipher); |
- ASSERT_EQ( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
- server_cipher); |
+ ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ server_cipher, rtc::SSL_PROTOCOL_DTLS_10, |
+ ::testing::get<1>(GetParam()).type())); |
} |
// DTLS 1.2 enabled for server only -> DTLS 1.0 will be used. |
@@ -1132,10 +1129,9 @@ TEST_P(SSLStreamAdapterTestDTLS, TestGetSslCipherSuiteDtls12Server) { |
ASSERT_TRUE(GetSslCipherSuite(false, &server_cipher)); |
ASSERT_EQ(client_cipher, server_cipher); |
- ASSERT_EQ( |
- rtc::SSLStreamAdapter::GetDefaultSslCipherForTest( |
- rtc::SSL_PROTOCOL_DTLS_10, ::testing::get<1>(GetParam()).type()), |
- server_cipher); |
+ ASSERT_TRUE(rtc::SSLStreamAdapter::IsAcceptableCipher( |
+ server_cipher, rtc::SSL_PROTOCOL_DTLS_10, |
+ ::testing::get<1>(GetParam()).type())); |
} |
// The RSA keysizes here might look strange, why not include the RFC's size |