Index: remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc |
diff --git a/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc b/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc |
index 0477db4218cca905fb0d8eec0a49ec61a2bd3692..abf288092506a5c5aeaff5db9bd943a3ba4caa26 100644 |
--- a/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc |
+++ b/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc |
@@ -137,15 +137,8 @@ class SslHmacChannelAuthenticatorTest : public testing::Test { |
DISALLOW_COPY_AND_ASSIGN(SslHmacChannelAuthenticatorTest); |
}; |
-// These tests use net::SSLServerSocket which is not implemented for OpenSSL. |
-#if defined(USE_OPENSSL) |
-#define MAYBE(x) DISABLED_##x |
-#else |
-#define MAYBE(x) x |
-#endif |
- |
// Verify that a channel can be connected using a valid shared secret. |
-TEST_F(SslHmacChannelAuthenticatorTest, MAYBE(SuccessfulAuth)) { |
+TEST_F(SslHmacChannelAuthenticatorTest, SuccessfulAuth) { |
client_auth_ = SslHmacChannelAuthenticator::CreateForClient( |
host_cert_, kTestSharedSecret); |
host_auth_ = SslHmacChannelAuthenticator::CreateForHost( |
@@ -165,7 +158,7 @@ TEST_F(SslHmacChannelAuthenticatorTest, MAYBE(SuccessfulAuth)) { |
} |
// Verify that channels cannot be using invalid shared secret. |
-TEST_F(SslHmacChannelAuthenticatorTest, MAYBE(InvalidChannelSecret)) { |
+TEST_F(SslHmacChannelAuthenticatorTest, InvalidChannelSecret) { |
client_auth_ = SslHmacChannelAuthenticator::CreateForClient( |
host_cert_, kTestSharedSecretBad); |
host_auth_ = SslHmacChannelAuthenticator::CreateForHost( |