diff options
author | nduca@google.com <nduca@google.com@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-03-27 00:59:39 +0000 |
---|---|---|
committer | nduca@google.com <nduca@google.com@0039d316-1c4b-4281-b951-d872f2087c98> | 2012-03-27 00:59:39 +0000 |
commit | d29b3a8948b3ae214d3fefcb61ecfb000762a282 (patch) | |
tree | 945fdff2ab8b501f01fde0d63984f0d55f43b5ab /crypto/crypto.gyp | |
parent | 42f06f9ca2fe07018a88994569f87373a7c6c578 (diff) | |
download | chromium_src-d29b3a8948b3ae214d3fefcb61ecfb000762a282.zip chromium_src-d29b3a8948b3ae214d3fefcb61ecfb000762a282.tar.gz chromium_src-d29b3a8948b3ae214d3fefcb61ecfb000762a282.tar.bz2 |
Revert 129061 - Create a database for NaCl validation caching that is shared between processes.
Reverted due to perf regression, see
http://chromegw.corp.google.com/i/chromium/builders/Linux%20x64/builds/25780
This change primarily entails creating a SyncChannel between sel_ldr and the
browser. Queries to the database could be made from any thread inside sel_ldr,
so the query mechanism needs to be thread safe.
This feature is currently disabled by default, and requires an environment
variable to enable. A few changes need to be made before this features is safe
and can be enabled, such as making sure each installation has a unique,
crypographically secure key.
BUG= http://code.google.com/p/nativeclient/issues/detail?id=2515
TEST= Run NaCl w/ NACL_VALIDATION_CACHE=1
Review URL: http://codereview.chromium.org/9796006
TBR=ncbray@chromium.org
Review URL: https://chromiumcodereview.appspot.com/9808113
git-svn-id: svn://svn.chromium.org/chrome/trunk/src@129077 0039d316-1c4b-4281-b951-d872f2087c98
Diffstat (limited to 'crypto/crypto.gyp')
-rw-r--r-- | crypto/crypto.gyp | 53 |
1 files changed, 9 insertions, 44 deletions
diff --git a/crypto/crypto.gyp b/crypto/crypto.gyp index f095719..405ad0b 100644 --- a/crypto/crypto.gyp +++ b/crypto/crypto.gyp @@ -5,19 +5,6 @@ { 'variables': { 'chromium_code': 1, - # Put all transitive dependencies for Windows HMAC here. - # This is required so that we can build them for nacl win64. - 'hmac_win64_related_sources': [ - 'hmac.cc', - 'hmac.h', - 'hmac_win.cc', - 'secure_util.cc', - 'secure_util.h', - 'symmetric_key.h', - 'symmetric_key_win.cc', - 'third_party/nss/chromium-sha256.h', - 'third_party/nss/sha512.cc', - ], }, 'targets': [ { @@ -144,9 +131,6 @@ },], ], 'sources': [ - # NOTE: all transitive dependencies of HMAC on windows need - # to be placed in the source list above. - '<@(hmac_win64_related_sources)', 'capi_util.cc', 'capi_util.h', 'crypto_export.h', @@ -167,9 +151,12 @@ 'encryptor_nss.cc', 'encryptor_openssl.cc', 'encryptor_win.cc', + 'hmac.cc', + 'hmac.h', 'hmac_mac.cc', 'hmac_nss.cc', 'hmac_openssl.cc', + 'hmac_win.cc', 'keychain_mac.cc', 'keychain_mac.h', 'mac_security_services_lock.cc', @@ -198,6 +185,8 @@ 'secure_hash.h', 'secure_hash_default.cc', 'secure_hash_openssl.cc', + 'secure_util.cc', + 'secure_util.h', 'sha2.cc', 'sha2.h', 'signature_creator.h', @@ -208,14 +197,18 @@ 'signature_verifier.h', 'signature_verifier_nss.cc', 'signature_verifier_openssl.cc', + 'symmetric_key.h', 'symmetric_key_mac.cc', 'symmetric_key_nss.cc', 'symmetric_key_openssl.cc', + 'symmetric_key_win.cc', 'third_party/nss/chromium-blapi.h', 'third_party/nss/chromium-blapit.h', 'third_party/nss/chromium-nss.h', + 'third_party/nss/chromium-sha256.h', 'third_party/nss/pk11akey.cc', 'third_party/nss/secsign.cc', + 'third_party/nss/sha512.cc', ], }, { @@ -288,32 +281,4 @@ ], }, ], - 'conditions': [ - [ 'OS == "win"', { - 'targets': [ - { - 'target_name': 'crypto_nacl_win64', - 'type': '<(component)', - 'dependencies': [ - '../base/base.gyp:base_nacl_win64', - '../base/third_party/dynamic_annotations/dynamic_annotations.gyp:dynamic_annotations_win64', - ], - 'sources': [ - '<@(hmac_win64_related_sources)', - ], - 'defines': [ - 'CRYPTO_IMPLEMENTATION', - ], - 'msvs_disabled_warnings': [ - 4018, - ], - 'configurations': { - 'Common_Base': { - 'msvs_target_platform': 'x64', - }, - }, - }, - ], - }], - ], } |