Protect some cipher suites with ifdefs for legacy openssl compatibility.

BUG=webrtc:5714

Review URL: https://codereview.webrtc.org/1851303002

Cr-Commit-Position: refs/heads/master@{#12284}
diff --git a/webrtc/base/opensslstreamadapter.cc b/webrtc/base/opensslstreamadapter.cc
index 16dd980..b09c2a5 100644
--- a/webrtc/base/opensslstreamadapter.cc
+++ b/webrtc/base/opensslstreamadapter.cc
@@ -18,6 +18,9 @@
 #include <openssl/rand.h>
 #include <openssl/tls1.h>
 #include <openssl/x509v3.h>
+#ifndef OPENSSL_IS_BORINGSSL
+#include <openssl/dtls1.h>
+#endif
 
 #include <vector>
 
@@ -1138,7 +1141,9 @@
 #ifdef TLS1_CK_ECDHE_RSA_WITH_AES_256_GCM_SHA256
   CDEF(ECDHE_RSA_WITH_AES_256_GCM_SHA256),
 #endif
+#ifdef TLS1_CK_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
   CDEF(ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256),
+#endif
 };
 
 static const cipher_list OK_ECDSA_ciphers[] = {
@@ -1148,7 +1153,9 @@
 #ifdef TLS1_CK_ECDHE_ECDSA_WITH_AES_256_GCM_SHA256
   CDEF(ECDHE_ECDSA_WITH_AES_256_GCM_SHA256),
 #endif
+#ifdef TLS1_CK_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
   CDEF(ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256),
+#endif
 };
 #undef CDEF