| Index: net/url_request/url_request_unittest.cc
|
| diff --git a/net/url_request/url_request_unittest.cc b/net/url_request/url_request_unittest.cc
|
| index c44b1a60a6627a295aa51072567fb5209eacf3b2..791904eed9b53753dc5e0fe7df8f369a12e10f5b 100644
|
| --- a/net/url_request/url_request_unittest.cc
|
| +++ b/net/url_request/url_request_unittest.cc
|
| @@ -7048,11 +7048,7 @@ TEST_F(HTTPSFallbackTest, TLSv1FallbackReset) {
|
|
|
| // Tests that we don't fallback on handshake failure with servers that implement
|
| // TLS_FALLBACK_SCSV. Also ensure that the original error code is reported.
|
| -#if defined(USE_OPENSSL)
|
| -TEST_F(HTTPSFallbackTest, DISABLED_FallbackSCSV) {
|
| -#else
|
| TEST_F(HTTPSFallbackTest, FallbackSCSV) {
|
| -#endif
|
| SpawnedTestServer::SSLOptions ssl_options(
|
| SpawnedTestServer::SSLOptions::CERT_OK);
|
| // Configure HTTPS server to be intolerant of TLS >= 1.0 in order to trigger
|
| @@ -7074,11 +7070,7 @@ TEST_F(HTTPSFallbackTest, FallbackSCSV) {
|
|
|
| // Tests that we don't fallback on connection closed with servers that implement
|
| // TLS_FALLBACK_SCSV. Also ensure that the original error code is reported.
|
| -#if defined(USE_OPENSSL)
|
| -TEST_F(HTTPSFallbackTest, DISABLED_FallbackSCSVClosed) {
|
| -#else
|
| TEST_F(HTTPSFallbackTest, FallbackSCSVClosed) {
|
| -#endif
|
| SpawnedTestServer::SSLOptions ssl_options(
|
| SpawnedTestServer::SSLOptions::CERT_OK);
|
| // Configure HTTPS server to be intolerant of TLS >= 1.0 in order to trigger
|
|
|