Index: remoting/protocol/negotiating_authenticator_unittest.cc |
diff --git a/remoting/protocol/negotiating_authenticator_unittest.cc b/remoting/protocol/negotiating_authenticator_unittest.cc |
index 55830f74474ba54cef4c4ab08868dcad97a7f00d..26d68c51def2ddf81a84eb57ca061762b6e3d61b 100644 |
--- a/remoting/protocol/negotiating_authenticator_unittest.cc |
+++ b/remoting/protocol/negotiating_authenticator_unittest.cc |
@@ -147,14 +147,7 @@ class NegotiatingAuthenticatorTest : public AuthenticatorTestBase { |
DISALLOW_COPY_AND_ASSIGN(NegotiatingAuthenticatorTest); |
}; |
-// These tests use net::SSLServerSocket which is not implemented for OpenSSL. |
-#if defined(USE_OPENSSL) |
-#define MAYBE(x) DISABLED_##x |
-#else |
-#define MAYBE(x) x |
-#endif |
- |
-TEST_F(NegotiatingAuthenticatorTest, MAYBE(SuccessfulAuthHmac)) { |
+TEST_F(NegotiatingAuthenticatorTest, SuccessfulAuthHmac) { |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators( |
kNoClientId, kNoPairedSecret, kTestPin, kTestPin, |
AuthenticationMethod::HMAC_SHA256, false)); |
@@ -162,14 +155,14 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(SuccessfulAuthHmac)) { |
AuthenticationMethod::Spake2(AuthenticationMethod::HMAC_SHA256)); |
} |
-TEST_F(NegotiatingAuthenticatorTest, MAYBE(SuccessfulAuthPlain)) { |
+TEST_F(NegotiatingAuthenticatorTest, SuccessfulAuthPlain) { |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators( |
kNoClientId, kNoPairedSecret, kTestPin, kTestPin, |
AuthenticationMethod::NONE, false)); |
VerifyAccepted(AuthenticationMethod::Spake2(AuthenticationMethod::NONE)); |
} |
-TEST_F(NegotiatingAuthenticatorTest, MAYBE(InvalidSecretHmac)) { |
+TEST_F(NegotiatingAuthenticatorTest, InvalidSecretHmac) { |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators( |
kNoClientId, kNoPairedSecret, kTestPinBad, kTestPin, |
AuthenticationMethod::HMAC_SHA256, false)); |
@@ -178,7 +171,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(InvalidSecretHmac)) { |
VerifyRejected(Authenticator::INVALID_CREDENTIALS); |
} |
-TEST_F(NegotiatingAuthenticatorTest, MAYBE(InvalidSecretPlain)) { |
+TEST_F(NegotiatingAuthenticatorTest, InvalidSecretPlain) { |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators( |
kNoClientId, kNoPairedSecret, kTestPin, kTestPinBad, |
AuthenticationMethod::NONE, false)); |
@@ -187,7 +180,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(InvalidSecretPlain)) { |
VerifyRejected(Authenticator::INVALID_CREDENTIALS); |
} |
-TEST_F(NegotiatingAuthenticatorTest, MAYBE(IncompatibleMethods)) { |
+TEST_F(NegotiatingAuthenticatorTest, IncompatibleMethods) { |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators( |
kNoClientId, kNoPairedSecret, kTestPin, kTestPinBad, |
AuthenticationMethod::NONE, true)); |
@@ -196,7 +189,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(IncompatibleMethods)) { |
VerifyRejected(Authenticator::PROTOCOL_ERROR); |
} |
-TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingNotSupported)) { |
+TEST_F(NegotiatingAuthenticatorTest, PairingNotSupported) { |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators( |
kTestClientId, kTestPairedSecret, kTestPin, kTestPin, |
AuthenticationMethod::HMAC_SHA256, false)); |
@@ -205,7 +198,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingNotSupported)) { |
AuthenticationMethod::Spake2(AuthenticationMethod::HMAC_SHA256)); |
} |
-TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingSupportedButNotPaired)) { |
+TEST_F(NegotiatingAuthenticatorTest, PairingSupportedButNotPaired) { |
CreatePairingRegistry(false); |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators( |
kNoClientId, kNoPairedSecret, kTestPin, kTestPin, |
@@ -214,7 +207,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingSupportedButNotPaired)) { |
VerifyAccepted(AuthenticationMethod::Spake2Pair()); |
} |
-TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingRevokedPinOkay)) { |
+TEST_F(NegotiatingAuthenticatorTest, PairingRevokedPinOkay) { |
CreatePairingRegistry(false); |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators( |
kTestClientId, kTestPairedSecret, kTestPin, kTestPin, |
@@ -223,7 +216,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingRevokedPinOkay)) { |
VerifyAccepted(AuthenticationMethod::Spake2Pair()); |
} |
-TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingRevokedPinBad)) { |
+TEST_F(NegotiatingAuthenticatorTest, PairingRevokedPinBad) { |
CreatePairingRegistry(false); |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators( |
kTestClientId, kTestPairedSecret, kTestPinBad, kTestPin, |
@@ -232,7 +225,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingRevokedPinBad)) { |
VerifyRejected(Authenticator::INVALID_CREDENTIALS); |
} |
-TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingSucceeded)) { |
+TEST_F(NegotiatingAuthenticatorTest, PairingSucceeded) { |
CreatePairingRegistry(true); |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators( |
kTestClientId, kTestPairedSecret, kTestPinBad, kTestPin, |
@@ -242,7 +235,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingSucceeded)) { |
} |
TEST_F(NegotiatingAuthenticatorTest, |
- MAYBE(PairingSucceededInvalidSecretButPinOkay)) { |
+ PairingSucceededInvalidSecretButPinOkay) { |
CreatePairingRegistry(true); |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators( |
kTestClientId, kTestPairedSecretBad, kTestPin, kTestPin, |
@@ -251,7 +244,7 @@ TEST_F(NegotiatingAuthenticatorTest, |
VerifyAccepted(AuthenticationMethod::Spake2Pair()); |
} |
-TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingFailedInvalidSecretAndPin)) { |
+TEST_F(NegotiatingAuthenticatorTest, PairingFailedInvalidSecretAndPin) { |
CreatePairingRegistry(true); |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators( |
kTestClientId, kTestPairedSecretBad, kTestPinBad, kTestPin, |