| Index: remoting/protocol/v2_authenticator_unittest.cc
|
| diff --git a/remoting/protocol/v2_authenticator_unittest.cc b/remoting/protocol/v2_authenticator_unittest.cc
|
| index f57b6c31a2e5013bc7522c0a1b8628b01b36e3f7..9af517b645435e7f8ff97dbcf5decb1aa46689df 100644
|
| --- a/remoting/protocol/v2_authenticator_unittest.cc
|
| +++ b/remoting/protocol/v2_authenticator_unittest.cc
|
| @@ -51,14 +51,7 @@ class V2AuthenticatorTest : public AuthenticatorTestBase {
|
| DISALLOW_COPY_AND_ASSIGN(V2AuthenticatorTest);
|
| };
|
|
|
| -// These tests use net::SSLServerSocket which is not implemented for OpenSSL.
|
| -#if defined(USE_OPENSSL)
|
| -#define MAYBE(x) DISABLED_##x
|
| -#else
|
| -#define MAYBE(x) x
|
| -#endif
|
| -
|
| -TEST_F(V2AuthenticatorTest, MAYBE(SuccessfulAuth)) {
|
| +TEST_F(V2AuthenticatorTest, SuccessfulAuth) {
|
| ASSERT_NO_FATAL_FAILURE(
|
| InitAuthenticators(kTestSharedSecret, kTestSharedSecret));
|
| ASSERT_NO_FATAL_FAILURE(RunAuthExchange());
|
| @@ -79,7 +72,7 @@ TEST_F(V2AuthenticatorTest, MAYBE(SuccessfulAuth)) {
|
| }
|
|
|
| // Verify that connection is rejected when secrets don't match.
|
| -TEST_F(V2AuthenticatorTest, MAYBE(InvalidSecret)) {
|
| +TEST_F(V2AuthenticatorTest, InvalidSecret) {
|
| ASSERT_NO_FATAL_FAILURE(
|
| InitAuthenticators(kTestSharedSecretBad, kTestSharedSecret));
|
| ASSERT_NO_FATAL_FAILURE(RunAuthExchange());
|
|
|