Index: remoting/protocol/v2_authenticator_unittest.cc |
diff --git a/remoting/protocol/v2_authenticator_unittest.cc b/remoting/protocol/v2_authenticator_unittest.cc |
index f57b6c31a2e5013bc7522c0a1b8628b01b36e3f7..9af517b645435e7f8ff97dbcf5decb1aa46689df 100644 |
--- a/remoting/protocol/v2_authenticator_unittest.cc |
+++ b/remoting/protocol/v2_authenticator_unittest.cc |
@@ -51,14 +51,7 @@ class V2AuthenticatorTest : public AuthenticatorTestBase { |
DISALLOW_COPY_AND_ASSIGN(V2AuthenticatorTest); |
}; |
-// These tests use net::SSLServerSocket which is not implemented for OpenSSL. |
-#if defined(USE_OPENSSL) |
-#define MAYBE(x) DISABLED_##x |
-#else |
-#define MAYBE(x) x |
-#endif |
- |
-TEST_F(V2AuthenticatorTest, MAYBE(SuccessfulAuth)) { |
+TEST_F(V2AuthenticatorTest, SuccessfulAuth) { |
ASSERT_NO_FATAL_FAILURE( |
InitAuthenticators(kTestSharedSecret, kTestSharedSecret)); |
ASSERT_NO_FATAL_FAILURE(RunAuthExchange()); |
@@ -79,7 +72,7 @@ TEST_F(V2AuthenticatorTest, MAYBE(SuccessfulAuth)) { |
} |
// Verify that connection is rejected when secrets don't match. |
-TEST_F(V2AuthenticatorTest, MAYBE(InvalidSecret)) { |
+TEST_F(V2AuthenticatorTest, InvalidSecret) { |
ASSERT_NO_FATAL_FAILURE( |
InitAuthenticators(kTestSharedSecretBad, kTestSharedSecret)); |
ASSERT_NO_FATAL_FAILURE(RunAuthExchange()); |