Index: webrtc/base/sslstreamadapter_unittest.cc |
diff --git a/webrtc/base/sslstreamadapter_unittest.cc b/webrtc/base/sslstreamadapter_unittest.cc |
index 2eaa4753913d899404e4d5728ff10c07e03243aa..1e18b8305cc04f8699b22892252ec5d4058fa480 100644 |
--- a/webrtc/base/sslstreamadapter_unittest.cc |
+++ b/webrtc/base/sslstreamadapter_unittest.cc |
@@ -1056,8 +1056,7 @@ TEST_F(SSLStreamAdapterTestDTLSFromPEMStrings, TestDTLSGetPeerCertificate) { |
ASSERT_NE(kCERT_PEM, client_peer_string); |
// It must not have a chain, because the test certs are self-signed. |
- rtc::SSLCertChain* client_peer_chain; |
- ASSERT_FALSE(client_peer_cert->GetChain(&client_peer_chain)); |
+ ASSERT_FALSE(client_peer_cert->GetChain()); |
// The server should have a peer certificate after the handshake. |
ASSERT_TRUE(GetPeerCertificate(false, server_peer_cert.accept())); |
@@ -1067,8 +1066,7 @@ TEST_F(SSLStreamAdapterTestDTLSFromPEMStrings, TestDTLSGetPeerCertificate) { |
ASSERT_EQ(kCERT_PEM, server_peer_cert->ToPEMString()); |
// It must not have a chain, because the test certs are self-signed. |
- rtc::SSLCertChain* server_peer_chain; |
- ASSERT_FALSE(server_peer_cert->GetChain(&server_peer_chain)); |
+ ASSERT_FALSE(server_peer_cert->GetChain()); |
} |
// Test getting the used DTLS ciphers. |