diff options
author | Torne (Richard Coles) <torne@google.com> | 2014-08-28 12:05:23 +0100 |
---|---|---|
committer | Torne (Richard Coles) <torne@google.com> | 2014-08-28 12:05:23 +0100 |
commit | 03b57e008b61dfcb1fbad3aea950ae0e001748b0 (patch) | |
tree | 9a740c1a5fbe659ec83484b67cbc679332f5a408 /remoting/protocol | |
parent | ca7d0c81aa30d24514c34c963f43cd24da34a2bf (diff) | |
download | chromium_org-03b57e008b61dfcb1fbad3aea950ae0e001748b0.tar.gz |
Merge from Chromium at DEPS revision 291560
This commit was generated by merge_to_master.py.
Change-Id: Ic58269055810d51286b4109e59b90b6856887a30
Diffstat (limited to 'remoting/protocol')
4 files changed, 22 insertions, 50 deletions
diff --git a/remoting/protocol/negotiating_authenticator_unittest.cc b/remoting/protocol/negotiating_authenticator_unittest.cc index 55830f7447..26d68c51de 100644 --- a/remoting/protocol/negotiating_authenticator_unittest.cc +++ b/remoting/protocol/negotiating_authenticator_unittest.cc @@ -147,14 +147,7 @@ class NegotiatingAuthenticatorTest : public AuthenticatorTestBase { DISALLOW_COPY_AND_ASSIGN(NegotiatingAuthenticatorTest); }; -// These tests use net::SSLServerSocket which is not implemented for OpenSSL. -#if defined(USE_OPENSSL) -#define MAYBE(x) DISABLED_##x -#else -#define MAYBE(x) x -#endif - -TEST_F(NegotiatingAuthenticatorTest, MAYBE(SuccessfulAuthHmac)) { +TEST_F(NegotiatingAuthenticatorTest, SuccessfulAuthHmac) { ASSERT_NO_FATAL_FAILURE(InitAuthenticators( kNoClientId, kNoPairedSecret, kTestPin, kTestPin, AuthenticationMethod::HMAC_SHA256, false)); @@ -162,14 +155,14 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(SuccessfulAuthHmac)) { AuthenticationMethod::Spake2(AuthenticationMethod::HMAC_SHA256)); } -TEST_F(NegotiatingAuthenticatorTest, MAYBE(SuccessfulAuthPlain)) { +TEST_F(NegotiatingAuthenticatorTest, SuccessfulAuthPlain) { ASSERT_NO_FATAL_FAILURE(InitAuthenticators( kNoClientId, kNoPairedSecret, kTestPin, kTestPin, AuthenticationMethod::NONE, false)); VerifyAccepted(AuthenticationMethod::Spake2(AuthenticationMethod::NONE)); } -TEST_F(NegotiatingAuthenticatorTest, MAYBE(InvalidSecretHmac)) { +TEST_F(NegotiatingAuthenticatorTest, InvalidSecretHmac) { ASSERT_NO_FATAL_FAILURE(InitAuthenticators( kNoClientId, kNoPairedSecret, kTestPinBad, kTestPin, AuthenticationMethod::HMAC_SHA256, false)); @@ -178,7 +171,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(InvalidSecretHmac)) { VerifyRejected(Authenticator::INVALID_CREDENTIALS); } -TEST_F(NegotiatingAuthenticatorTest, MAYBE(InvalidSecretPlain)) { +TEST_F(NegotiatingAuthenticatorTest, InvalidSecretPlain) { ASSERT_NO_FATAL_FAILURE(InitAuthenticators( kNoClientId, kNoPairedSecret, kTestPin, kTestPinBad, AuthenticationMethod::NONE, false)); @@ -187,7 +180,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(InvalidSecretPlain)) { VerifyRejected(Authenticator::INVALID_CREDENTIALS); } -TEST_F(NegotiatingAuthenticatorTest, MAYBE(IncompatibleMethods)) { +TEST_F(NegotiatingAuthenticatorTest, IncompatibleMethods) { ASSERT_NO_FATAL_FAILURE(InitAuthenticators( kNoClientId, kNoPairedSecret, kTestPin, kTestPinBad, AuthenticationMethod::NONE, true)); @@ -196,7 +189,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(IncompatibleMethods)) { VerifyRejected(Authenticator::PROTOCOL_ERROR); } -TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingNotSupported)) { +TEST_F(NegotiatingAuthenticatorTest, PairingNotSupported) { ASSERT_NO_FATAL_FAILURE(InitAuthenticators( kTestClientId, kTestPairedSecret, kTestPin, kTestPin, AuthenticationMethod::HMAC_SHA256, false)); @@ -205,7 +198,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingNotSupported)) { AuthenticationMethod::Spake2(AuthenticationMethod::HMAC_SHA256)); } -TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingSupportedButNotPaired)) { +TEST_F(NegotiatingAuthenticatorTest, PairingSupportedButNotPaired) { CreatePairingRegistry(false); ASSERT_NO_FATAL_FAILURE(InitAuthenticators( kNoClientId, kNoPairedSecret, kTestPin, kTestPin, @@ -214,7 +207,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingSupportedButNotPaired)) { VerifyAccepted(AuthenticationMethod::Spake2Pair()); } -TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingRevokedPinOkay)) { +TEST_F(NegotiatingAuthenticatorTest, PairingRevokedPinOkay) { CreatePairingRegistry(false); ASSERT_NO_FATAL_FAILURE(InitAuthenticators( kTestClientId, kTestPairedSecret, kTestPin, kTestPin, @@ -223,7 +216,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingRevokedPinOkay)) { VerifyAccepted(AuthenticationMethod::Spake2Pair()); } -TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingRevokedPinBad)) { +TEST_F(NegotiatingAuthenticatorTest, PairingRevokedPinBad) { CreatePairingRegistry(false); ASSERT_NO_FATAL_FAILURE(InitAuthenticators( kTestClientId, kTestPairedSecret, kTestPinBad, kTestPin, @@ -232,7 +225,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingRevokedPinBad)) { VerifyRejected(Authenticator::INVALID_CREDENTIALS); } -TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingSucceeded)) { +TEST_F(NegotiatingAuthenticatorTest, PairingSucceeded) { CreatePairingRegistry(true); ASSERT_NO_FATAL_FAILURE(InitAuthenticators( kTestClientId, kTestPairedSecret, kTestPinBad, kTestPin, @@ -242,7 +235,7 @@ TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingSucceeded)) { } TEST_F(NegotiatingAuthenticatorTest, - MAYBE(PairingSucceededInvalidSecretButPinOkay)) { + PairingSucceededInvalidSecretButPinOkay) { CreatePairingRegistry(true); ASSERT_NO_FATAL_FAILURE(InitAuthenticators( kTestClientId, kTestPairedSecretBad, kTestPin, kTestPin, @@ -251,7 +244,7 @@ TEST_F(NegotiatingAuthenticatorTest, VerifyAccepted(AuthenticationMethod::Spake2Pair()); } -TEST_F(NegotiatingAuthenticatorTest, MAYBE(PairingFailedInvalidSecretAndPin)) { +TEST_F(NegotiatingAuthenticatorTest, PairingFailedInvalidSecretAndPin) { CreatePairingRegistry(true); ASSERT_NO_FATAL_FAILURE(InitAuthenticators( kTestClientId, kTestPairedSecretBad, kTestPinBad, kTestPin, diff --git a/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc b/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc index 0477db4218..abf2880925 100644 --- a/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc +++ b/remoting/protocol/ssl_hmac_channel_authenticator_unittest.cc @@ -137,15 +137,8 @@ class SslHmacChannelAuthenticatorTest : public testing::Test { DISALLOW_COPY_AND_ASSIGN(SslHmacChannelAuthenticatorTest); }; -// These tests use net::SSLServerSocket which is not implemented for OpenSSL. -#if defined(USE_OPENSSL) -#define MAYBE(x) DISABLED_##x -#else -#define MAYBE(x) x -#endif - // Verify that a channel can be connected using a valid shared secret. -TEST_F(SslHmacChannelAuthenticatorTest, MAYBE(SuccessfulAuth)) { +TEST_F(SslHmacChannelAuthenticatorTest, SuccessfulAuth) { client_auth_ = SslHmacChannelAuthenticator::CreateForClient( host_cert_, kTestSharedSecret); host_auth_ = SslHmacChannelAuthenticator::CreateForHost( @@ -165,7 +158,7 @@ TEST_F(SslHmacChannelAuthenticatorTest, MAYBE(SuccessfulAuth)) { } // Verify that channels cannot be using invalid shared secret. -TEST_F(SslHmacChannelAuthenticatorTest, MAYBE(InvalidChannelSecret)) { +TEST_F(SslHmacChannelAuthenticatorTest, InvalidChannelSecret) { client_auth_ = SslHmacChannelAuthenticator::CreateForClient( host_cert_, kTestSharedSecretBad); host_auth_ = SslHmacChannelAuthenticator::CreateForHost( diff --git a/remoting/protocol/third_party_authenticator_unittest.cc b/remoting/protocol/third_party_authenticator_unittest.cc index a4b49ae6af..b843eeb5d1 100644 --- a/remoting/protocol/third_party_authenticator_unittest.cc +++ b/remoting/protocol/third_party_authenticator_unittest.cc @@ -121,14 +121,7 @@ class ThirdPartyAuthenticatorTest : public AuthenticatorTestBase { DISALLOW_COPY_AND_ASSIGN(ThirdPartyAuthenticatorTest); }; -// These tests use net::SSLServerSocket which is not implemented for OpenSSL. -#if defined(USE_OPENSSL) -#define MAYBE(x) DISABLED_##x -#else -#define MAYBE(x) x -#endif - -TEST_F(ThirdPartyAuthenticatorTest, MAYBE(SuccessfulAuth)) { +TEST_F(ThirdPartyAuthenticatorTest, SuccessfulAuth) { ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); @@ -155,7 +148,7 @@ TEST_F(ThirdPartyAuthenticatorTest, MAYBE(SuccessfulAuth)) { tester.CheckResults(); } -TEST_F(ThirdPartyAuthenticatorTest, MAYBE(ClientNoSecret)) { +TEST_F(ThirdPartyAuthenticatorTest, ClientNoSecret) { ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); @@ -167,7 +160,7 @@ TEST_F(ThirdPartyAuthenticatorTest, MAYBE(ClientNoSecret)) { ASSERT_EQ(Authenticator::REJECTED, client_->state()); } -TEST_F(ThirdPartyAuthenticatorTest, MAYBE(InvalidToken)) { +TEST_F(ThirdPartyAuthenticatorTest, InvalidToken) { ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); @@ -180,7 +173,7 @@ TEST_F(ThirdPartyAuthenticatorTest, MAYBE(InvalidToken)) { ASSERT_EQ(Authenticator::REJECTED, host_->state()); } -TEST_F(ThirdPartyAuthenticatorTest, MAYBE(CannotFetchToken)) { +TEST_F(ThirdPartyAuthenticatorTest, CannotFetchToken) { ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); @@ -193,7 +186,7 @@ TEST_F(ThirdPartyAuthenticatorTest, MAYBE(CannotFetchToken)) { } // Test that negotiation stops when the fake authentication is rejected. -TEST_F(ThirdPartyAuthenticatorTest, MAYBE(HostBadSecret)) { +TEST_F(ThirdPartyAuthenticatorTest, HostBadSecret) { ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); @@ -207,7 +200,7 @@ TEST_F(ThirdPartyAuthenticatorTest, MAYBE(HostBadSecret)) { ASSERT_EQ(Authenticator::REJECTED, client_->state()); } -TEST_F(ThirdPartyAuthenticatorTest, MAYBE(ClientBadSecret)) { +TEST_F(ThirdPartyAuthenticatorTest, ClientBadSecret) { ASSERT_NO_FATAL_FAILURE(InitAuthenticators()); ASSERT_NO_FATAL_FAILURE(RunHostInitiatedAuthExchange()); ASSERT_EQ(Authenticator::PROCESSING_MESSAGE, client_->state()); diff --git a/remoting/protocol/v2_authenticator_unittest.cc b/remoting/protocol/v2_authenticator_unittest.cc index f57b6c31a2..9af517b645 100644 --- a/remoting/protocol/v2_authenticator_unittest.cc +++ b/remoting/protocol/v2_authenticator_unittest.cc @@ -51,14 +51,7 @@ class V2AuthenticatorTest : public AuthenticatorTestBase { DISALLOW_COPY_AND_ASSIGN(V2AuthenticatorTest); }; -// These tests use net::SSLServerSocket which is not implemented for OpenSSL. -#if defined(USE_OPENSSL) -#define MAYBE(x) DISABLED_##x -#else -#define MAYBE(x) x -#endif - -TEST_F(V2AuthenticatorTest, MAYBE(SuccessfulAuth)) { +TEST_F(V2AuthenticatorTest, SuccessfulAuth) { ASSERT_NO_FATAL_FAILURE( InitAuthenticators(kTestSharedSecret, kTestSharedSecret)); ASSERT_NO_FATAL_FAILURE(RunAuthExchange()); @@ -79,7 +72,7 @@ TEST_F(V2AuthenticatorTest, MAYBE(SuccessfulAuth)) { } // Verify that connection is rejected when secrets don't match. -TEST_F(V2AuthenticatorTest, MAYBE(InvalidSecret)) { +TEST_F(V2AuthenticatorTest, InvalidSecret) { ASSERT_NO_FATAL_FAILURE( InitAuthenticators(kTestSharedSecretBad, kTestSharedSecret)); ASSERT_NO_FATAL_FAILURE(RunAuthExchange()); |