Index: webrtc/base/sslstreamadapter_unittest.cc |
diff --git a/webrtc/base/sslstreamadapter_unittest.cc b/webrtc/base/sslstreamadapter_unittest.cc |
index 1e18b8305cc04f8699b22892252ec5d4058fa480..d132da2d9ab5fbbfcf421b8ff725933f62d799cb 100644 |
--- a/webrtc/base/sslstreamadapter_unittest.cc |
+++ b/webrtc/base/sslstreamadapter_unittest.cc |
@@ -474,11 +474,11 @@ class SSLStreamAdapterTestBase : public testing::Test, |
return server_ssl_->GetDtlsSrtpCryptoSuite(retval); |
} |
- bool GetPeerCertificate(bool client, rtc::SSLCertificate** cert) { |
+ rtc::scoped_ptr<rtc::SSLCertificate> GetPeerCertificate(bool client) { |
if (client) |
- return client_ssl_->GetPeerCertificate(cert); |
+ return client_ssl_->GetPeerCertificate(); |
else |
- return server_ssl_->GetPeerCertificate(cert); |
+ return server_ssl_->GetPeerCertificate(); |
} |
bool GetSslCipherSuite(bool client, int* retval) { |
@@ -1037,19 +1037,14 @@ TEST_F(SSLStreamAdapterTestDTLSFromPEMStrings, TestDTLSGetPeerCertificate) { |
MAYBE_SKIP_TEST(HaveDtls); |
// Peer certificates haven't been received yet. |
- rtc::scoped_ptr<rtc::SSLCertificate> client_peer_cert; |
- ASSERT_FALSE(GetPeerCertificate(true, client_peer_cert.accept())); |
- ASSERT_FALSE(client_peer_cert != NULL); |
- |
- rtc::scoped_ptr<rtc::SSLCertificate> server_peer_cert; |
- ASSERT_FALSE(GetPeerCertificate(false, server_peer_cert.accept())); |
- ASSERT_FALSE(server_peer_cert != NULL); |
+ ASSERT_FALSE(GetPeerCertificate(true)); |
+ ASSERT_FALSE(GetPeerCertificate(false)); |
TestHandshake(); |
// The client should have a peer certificate after the handshake. |
- ASSERT_TRUE(GetPeerCertificate(true, client_peer_cert.accept())); |
- ASSERT_TRUE(client_peer_cert != NULL); |
+ auto client_peer_cert = GetPeerCertificate(true); |
perkj_webrtc
2016/04/01 14:19:09
please use rtc::scoped_ptr<rtc::SSLCertificate> fo
kwiberg-webrtc
2016/04/02 01:20:03
Done.
|
+ ASSERT_TRUE(client_peer_cert); |
// It's not kCERT_PEM. |
std::string client_peer_string = client_peer_cert->ToPEMString(); |
@@ -1059,8 +1054,8 @@ TEST_F(SSLStreamAdapterTestDTLSFromPEMStrings, TestDTLSGetPeerCertificate) { |
ASSERT_FALSE(client_peer_cert->GetChain()); |
// The server should have a peer certificate after the handshake. |
- ASSERT_TRUE(GetPeerCertificate(false, server_peer_cert.accept())); |
- ASSERT_TRUE(server_peer_cert != NULL); |
+ auto server_peer_cert = GetPeerCertificate(false); |
+ ASSERT_TRUE(server_peer_cert); |
// It's kCERT_PEM |
ASSERT_EQ(kCERT_PEM, server_peer_cert->ToPEMString()); |