Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(43)

Issue 7528015: Use HMAC SHA-256, since SHA-1 won't work inside the Windows sandbox. (Closed)

Created:
9 years, 4 months ago by Wez
Modified:
9 years, 4 months ago
CC:
chromium-reviews, jamiewalch+watch_chromium.org, hclam+watch_chromium.org, simonmorris+watch_chromium.org, wez+watch_chromium.org, dmaclach+watch_chromium.org, garykac+watch_chromium.org, lambroslambrou+watch_chromium.org, ajwong+watch_chromium.org, sergeyu+watch_chromium.org
Visibility:
Public.

Description

Use HMAC SHA-256, since SHA-1 won't work inside the Windows sandbox. BUG=91878 TEST=Can connect remoting Client on Windows, with sandbox active, to a Host. Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=95946

Patch Set 1 #

Patch Set 2 : Bump protocol version. #

Patch Set 3 : Update copyright year. #

Unified diffs Side-by-side diffs Delta from patch set Stats (+8 lines, -8 lines) Patch
M remoting/protocol/channel_authenticator.cc View 1 chunk +5 lines, -5 lines 0 comments Download
M remoting/protocol/jingle_session_manager.cc View 1 1 chunk +1 line, -1 line 0 comments Download
M remoting/protocol/session_config.cc View 1 2 2 chunks +2 lines, -2 lines 0 comments Download

Messages

Total messages: 10 (0 generated)
Wez
PTAL
9 years, 4 months ago (2011-08-09 00:31:29 UTC) #1
Jamie
Wasn't there some talk of bumping the protocol version number as well?
9 years, 4 months ago (2011-08-09 00:32:39 UTC) #2
Wez
On 2011/08/09 00:32:39, Jamie wrote: > Wasn't there some talk of bumping the protocol version ...
9 years, 4 months ago (2011-08-09 01:25:55 UTC) #3
Sergey Ulanov
LGTM On 2011/08/09 01:25:55, Wez wrote: > On 2011/08/09 00:32:39, Jamie wrote: > > Wasn't ...
9 years, 4 months ago (2011-08-09 01:51:12 UTC) #4
wtc
This CL will prevent us from changing the HMAC SHA-256 implementation to use Windows CryptoAPI ...
9 years, 4 months ago (2011-08-09 16:37:23 UTC) #5
Alpha Left Google
How does persistent keys get used? I thought we use CRYPT_VERIFYCONTEXT most of the time.
9 years, 4 months ago (2011-08-09 16:49:59 UTC) #6
wtc
On 2011/08/09 16:49:59, Alpha wrote: > How does persistent keys get used? I thought we ...
9 years, 4 months ago (2011-08-09 17:00:46 UTC) #7
Wez
On 2011/08/09 16:37:23, wtc wrote: > This CL will prevent us from changing the HMAC ...
9 years, 4 months ago (2011-08-09 17:09:55 UTC) #8
wtc
On 2011/08/09 17:09:55, Wez wrote: > > What is the motivation for switching to the ...
9 years, 4 months ago (2011-08-10 01:14:15 UTC) #9
Wez
9 years, 4 months ago (2011-08-10 03:03:01 UTC) #10
On 2011/08/10 01:14:15, wtc wrote:
> On 2011/08/09 17:09:55, Wez wrote:
> >
> > What is the motivation for switching to the CryptoAPI version?
> 
> The crypto module in CryptoAPI in every version of Windows has been
> validated for conformance to the FIPS 140-2 standard.  FIPS 140-2
> validation is required by US Federal and Canadian government agencies.
> I'd like to have the option of using CryptoAPI available because
> that is one way for Chrome to achieve FIPS 140-2 conformance.

OK; so we'll need to arrange to load CryptoAPI ahead of time, or allow for this
code to choose the NSS implementation.

Powered by Google App Engine
This is Rietveld 408576698