Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(58)

Issue 1191623002: Require ECDHE cipher in remoting client. (Closed)

Created:
5 years, 6 months ago by Sergey Ulanov
Modified:
5 years, 6 months ago
Reviewers:
davidben
CC:
chromium-reviews, cbentzel+watch_chromium.org, chromoting-reviews_chromium.org
Base URL:
https://chromium.googlesource.com/chromium/src.git@master
Target Ref:
refs/pending/heads/master
Project:
chromium
Visibility:
Public.

Description

Require ECDHE cipher in remoting client. Also added support for enable_ecdhe flag in SSLClientSocketOpenSSL and SSLClientSocketNSS. It's not really needed with NSS as the client is only compiled with BoringSSL, but added it anyway for consistency. BUG=481163 Committed: https://crrev.com/0144249b934d0869a20a69931e6ec261c5cb27da Cr-Commit-Position: refs/heads/master@{#334684}

Patch Set 1 #

Total comments: 8

Patch Set 2 : #

Unified diffs Side-by-side diffs Delta from patch set Stats (+56 lines, -12 lines) Patch
M net/socket/ssl_client_socket_nss.cc View 1 1 chunk +16 lines, -0 lines 0 comments Download
M net/socket/ssl_client_socket_openssl.cc View 1 chunk +6 lines, -7 lines 0 comments Download
M net/socket/ssl_client_socket_unittest.cc View 1 1 chunk +31 lines, -0 lines 0 comments Download
M net/socket/ssl_server_socket_nss.cc View 1 1 chunk +1 line, -2 lines 0 comments Download
M net/ssl/ssl_config.h View 1 chunk +1 line, -3 lines 0 comments Download
M remoting/protocol/ssl_hmac_channel_authenticator.cc View 1 chunk +1 line, -0 lines 0 comments Download

Messages

Total messages: 10 (3 generated)
Sergey Ulanov
5 years, 6 months ago (2015-06-15 23:21:13 UTC) #2
Sergey Ulanov
https://codereview.chromium.org/1191623002/diff/1/net/socket/ssl_client_socket_openssl.cc File net/socket/ssl_client_socket_openssl.cc (right): https://codereview.chromium.org/1191623002/diff/1/net/socket/ssl_client_socket_openssl.cc#newcode768 net/socket/ssl_client_socket_openssl.cc:768: std::string command("DEFAULT:!SHA256:!SHA384:!AESGCM+AES256:!aPSK"); This is an unrelated cleanup for consistency ...
5 years, 6 months ago (2015-06-15 23:23:36 UTC) #3
davidben
lgtm https://codereview.chromium.org/1191623002/diff/1/net/socket/ssl_client_socket_nss.cc File net/socket/ssl_client_socket_nss.cc (right): https://codereview.chromium.org/1191623002/diff/1/net/socket/ssl_client_socket_nss.cc#newcode2768 net/socket/ssl_client_socket_nss.cc:2768: // Require forward security by iterating over the ...
5 years, 6 months ago (2015-06-16 19:18:21 UTC) #4
Sergey Ulanov
https://codereview.chromium.org/1191623002/diff/1/net/socket/ssl_client_socket_nss.cc File net/socket/ssl_client_socket_nss.cc (right): https://codereview.chromium.org/1191623002/diff/1/net/socket/ssl_client_socket_nss.cc#newcode2768 net/socket/ssl_client_socket_nss.cc:2768: // Require forward security by iterating over the cipher ...
5 years, 6 months ago (2015-06-16 19:29:08 UTC) #5
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-cq-status.appspot.com/patch-status/1191623002/20001
5 years, 6 months ago (2015-06-16 19:32:24 UTC) #8
commit-bot: I haz the power
Committed patchset #2 (id:20001)
5 years, 6 months ago (2015-06-16 20:43:11 UTC) #9
commit-bot: I haz the power
5 years, 6 months ago (2015-06-16 20:45:07 UTC) #10
Message was sent while issue was closed.
Patchset 2 (id:??) landed as
https://crrev.com/0144249b934d0869a20a69931e6ec261c5cb27da
Cr-Commit-Position: refs/heads/master@{#334684}

Powered by Google App Engine
This is Rietveld 408576698