| Index: webrtc/base/sslstreamadapter_unittest.cc
|
| diff --git a/webrtc/base/sslstreamadapter_unittest.cc b/webrtc/base/sslstreamadapter_unittest.cc
|
| index 2eaa4753913d899404e4d5728ff10c07e03243aa..1e18b8305cc04f8699b22892252ec5d4058fa480 100644
|
| --- a/webrtc/base/sslstreamadapter_unittest.cc
|
| +++ b/webrtc/base/sslstreamadapter_unittest.cc
|
| @@ -1056,8 +1056,7 @@ TEST_F(SSLStreamAdapterTestDTLSFromPEMStrings, TestDTLSGetPeerCertificate) {
|
| ASSERT_NE(kCERT_PEM, client_peer_string);
|
|
|
| // It must not have a chain, because the test certs are self-signed.
|
| - rtc::SSLCertChain* client_peer_chain;
|
| - ASSERT_FALSE(client_peer_cert->GetChain(&client_peer_chain));
|
| + ASSERT_FALSE(client_peer_cert->GetChain());
|
|
|
| // The server should have a peer certificate after the handshake.
|
| ASSERT_TRUE(GetPeerCertificate(false, server_peer_cert.accept()));
|
| @@ -1067,8 +1066,7 @@ TEST_F(SSLStreamAdapterTestDTLSFromPEMStrings, TestDTLSGetPeerCertificate) {
|
| ASSERT_EQ(kCERT_PEM, server_peer_cert->ToPEMString());
|
|
|
| // It must not have a chain, because the test certs are self-signed.
|
| - rtc::SSLCertChain* server_peer_chain;
|
| - ASSERT_FALSE(server_peer_cert->GetChain(&server_peer_chain));
|
| + ASSERT_FALSE(server_peer_cert->GetChain());
|
| }
|
|
|
| // Test getting the used DTLS ciphers.
|
|
|