Index: remoting/protocol/third_party_authenticator_unittest.cc |
diff --git a/remoting/protocol/third_party_authenticator_unittest.cc b/remoting/protocol/third_party_authenticator_unittest.cc |
index a4b49ae6af9f4fd2936ab37c85bbf1ea472ea285..b843eeb5d1db4a255cc01edbfc859aecff28d68b 100644 |
--- a/remoting/protocol/third_party_authenticator_unittest.cc |
+++ b/remoting/protocol/third_party_authenticator_unittest.cc |
@@ -121,14 +121,7 @@ class ThirdPartyAuthenticatorTest : public AuthenticatorTestBase { |
DISALLOW_COPY_AND_ASSIGN(ThirdPartyAuthenticatorTest); |
}; |
-// These tests use net::SSLServerSocket which is not implemented for OpenSSL. |
-#if defined(USE_OPENSSL) |
-#define MAYBE(x) DISABLED_##x |
-#else |
-#define MAYBE(x) x |
-#endif |
- |
-TEST_F(ThirdPartyAuthenticatorTest, MAYBE(SuccessfulAuth)) { |
+TEST_F(ThirdPartyAuthenticatorTest, SuccessfulAuth) { |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); |
ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); |
ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); |
@@ -155,7 +148,7 @@ TEST_F(ThirdPartyAuthenticatorTest, MAYBE(SuccessfulAuth)) { |
tester.CheckResults(); |
} |
-TEST_F(ThirdPartyAuthenticatorTest, MAYBE(ClientNoSecret)) { |
+TEST_F(ThirdPartyAuthenticatorTest, ClientNoSecret) { |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); |
ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); |
ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); |
@@ -167,7 +160,7 @@ TEST_F(ThirdPartyAuthenticatorTest, MAYBE(ClientNoSecret)) { |
ASSERT_EQ(Authenticator::REJECTED, client_->state()); |
} |
-TEST_F(ThirdPartyAuthenticatorTest, MAYBE(InvalidToken)) { |
+TEST_F(ThirdPartyAuthenticatorTest, InvalidToken) { |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); |
ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); |
ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); |
@@ -180,7 +173,7 @@ TEST_F(ThirdPartyAuthenticatorTest, MAYBE(InvalidToken)) { |
ASSERT_EQ(Authenticator::REJECTED, host_->state()); |
} |
-TEST_F(ThirdPartyAuthenticatorTest, MAYBE(CannotFetchToken)) { |
+TEST_F(ThirdPartyAuthenticatorTest, CannotFetchToken) { |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); |
ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); |
ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); |
@@ -193,7 +186,7 @@ TEST_F(ThirdPartyAuthenticatorTest, MAYBE(CannotFetchToken)) { |
} |
// Test that negotiation stops when the fake authentication is rejected. |
-TEST_F(ThirdPartyAuthenticatorTest, MAYBE(HostBadSecret)) { |
+TEST_F(ThirdPartyAuthenticatorTest, HostBadSecret) { |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); |
ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); |
ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); |
@@ -207,7 +200,7 @@ TEST_F(ThirdPartyAuthenticatorTest, MAYBE(HostBadSecret)) { |
ASSERT_EQ(Authenticator::REJECTED, client_->state()); |
} |
-TEST_F(ThirdPartyAuthenticatorTest, MAYBE(ClientBadSecret)) { |
+TEST_F(ThirdPartyAuthenticatorTest, ClientBadSecret) { |
ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); |
ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); |
ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); |