| Index: webrtc/base/sslstreamadapter_unittest.cc
|
| diff --git a/webrtc/base/sslstreamadapter_unittest.cc b/webrtc/base/sslstreamadapter_unittest.cc
|
| index 1e18b8305cc04f8699b22892252ec5d4058fa480..8d5b275db8c19d6ecb9ea784f07edb8da4c98049 100644
|
| --- a/webrtc/base/sslstreamadapter_unittest.cc
|
| +++ b/webrtc/base/sslstreamadapter_unittest.cc
|
| @@ -474,11 +474,11 @@ class SSLStreamAdapterTestBase : public testing::Test,
|
| return server_ssl_->GetDtlsSrtpCryptoSuite(retval);
|
| }
|
|
|
| - bool GetPeerCertificate(bool client, rtc::SSLCertificate** cert) {
|
| + rtc::scoped_ptr<rtc::SSLCertificate> GetPeerCertificate(bool client) {
|
| if (client)
|
| - return client_ssl_->GetPeerCertificate(cert);
|
| + return client_ssl_->GetPeerCertificate();
|
| else
|
| - return server_ssl_->GetPeerCertificate(cert);
|
| + return server_ssl_->GetPeerCertificate();
|
| }
|
|
|
| bool GetSslCipherSuite(bool client, int* retval) {
|
| @@ -1037,19 +1037,15 @@ TEST_F(SSLStreamAdapterTestDTLSFromPEMStrings, TestDTLSGetPeerCertificate) {
|
| MAYBE_SKIP_TEST(HaveDtls);
|
|
|
| // Peer certificates haven't been received yet.
|
| - rtc::scoped_ptr<rtc::SSLCertificate> client_peer_cert;
|
| - ASSERT_FALSE(GetPeerCertificate(true, client_peer_cert.accept()));
|
| - ASSERT_FALSE(client_peer_cert != NULL);
|
| -
|
| - rtc::scoped_ptr<rtc::SSLCertificate> server_peer_cert;
|
| - ASSERT_FALSE(GetPeerCertificate(false, server_peer_cert.accept()));
|
| - ASSERT_FALSE(server_peer_cert != NULL);
|
| + ASSERT_FALSE(GetPeerCertificate(true));
|
| + ASSERT_FALSE(GetPeerCertificate(false));
|
|
|
| TestHandshake();
|
|
|
| // The client should have a peer certificate after the handshake.
|
| - ASSERT_TRUE(GetPeerCertificate(true, client_peer_cert.accept()));
|
| - ASSERT_TRUE(client_peer_cert != NULL);
|
| + rtc::scoped_ptr<rtc::SSLCertificate> client_peer_cert =
|
| + GetPeerCertificate(true);
|
| + ASSERT_TRUE(client_peer_cert);
|
|
|
| // It's not kCERT_PEM.
|
| std::string client_peer_string = client_peer_cert->ToPEMString();
|
| @@ -1059,8 +1055,9 @@ TEST_F(SSLStreamAdapterTestDTLSFromPEMStrings, TestDTLSGetPeerCertificate) {
|
| ASSERT_FALSE(client_peer_cert->GetChain());
|
|
|
| // The server should have a peer certificate after the handshake.
|
| - ASSERT_TRUE(GetPeerCertificate(false, server_peer_cert.accept()));
|
| - ASSERT_TRUE(server_peer_cert != NULL);
|
| + rtc::scoped_ptr<rtc::SSLCertificate> server_peer_cert =
|
| + GetPeerCertificate(false);
|
| + ASSERT_TRUE(server_peer_cert);
|
|
|
| // It's kCERT_PEM
|
| ASSERT_EQ(kCERT_PEM, server_peer_cert->ToPEMString());
|
|
|