| Index: remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc
|
| diff --git a/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc b/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc
|
| index 0477db4218cca905fb0d8eec0a49ec61a2bd3692..abf288092506a5c5aeaff5db9bd943a3ba4caa26 100644
|
| --- a/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc
|
| +++ b/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc
|
| @@ -137,15 +137,8 @@ class SslHmacChannelAuthenticatorTest : public testing::Test {
|
| DISALLOW_COPY_AND_ASSIGN(SslHmacChannelAuthenticatorTest);
|
| };
|
|
|
| -// These tests use net::SSLServerSocket which is not implemented for OpenSSL.
|
| -#if defined(USE_OPENSSL)
|
| -#define MAYBE(x) DISABLED_##x
|
| -#else
|
| -#define MAYBE(x) x
|
| -#endif
|
| -
|
| // Verify that a channel can be connected using a valid shared secret.
|
| -TEST_F(SslHmacChannelAuthenticatorTest, MAYBE(SuccessfulAuth)) {
|
| +TEST_F(SslHmacChannelAuthenticatorTest, SuccessfulAuth) {
|
| client_auth_ = SslHmacChannelAuthenticator::CreateForClient(
|
| host_cert_, kTestSharedSecret);
|
| host_auth_ = SslHmacChannelAuthenticator::CreateForHost(
|
| @@ -165,7 +158,7 @@ TEST_F(SslHmacChannelAuthenticatorTest, MAYBE(SuccessfulAuth)) {
|
| }
|
|
|
| // Verify that channels cannot be using invalid shared secret.
|
| -TEST_F(SslHmacChannelAuthenticatorTest, MAYBE(InvalidChannelSecret)) {
|
| +TEST_F(SslHmacChannelAuthenticatorTest, InvalidChannelSecret) {
|
| client_auth_ = SslHmacChannelAuthenticator::CreateForClient(
|
| host_cert_, kTestSharedSecretBad);
|
| host_auth_ = SslHmacChannelAuthenticator::CreateForHost(
|
|
|