Commit b46dad89 authored by Ryan Sleevi's avatar Ryan Sleevi Committed by Commit Bot

Remove vestiges of weak Diffie-Hellman checks

Chromium used to warn if the server negotiated a weak DH key. However,
it has since disabled support for DH entirely, so this traces are
no longer used.

Bug: none
Change-Id: I3645cd011287b68bd3343e06faeb5dd9f089862a
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/2012909Reviewed-by: default avatarDavid Benjamin <davidben@chromium.org>
Reviewed-by: default avatarChristopher Thompson <cthomp@chromium.org>
Reviewed-by: default avatarTao Bai <michaelbai@chromium.org>
Commit-Queue: Ryan Sleevi <rsleevi@chromium.org>
Cr-Commit-Position: refs/heads/master@{#734299}
parent 922aa0ff
...@@ -117,7 +117,6 @@ public final class ErrorCodeConversionHelper { ...@@ -117,7 +117,6 @@ public final class ErrorCodeConversionHelper {
case NetError.ERR_SSL_NO_RENEGOTIATION: case NetError.ERR_SSL_NO_RENEGOTIATION:
case NetError.ERR_SSL_DECOMPRESSION_FAILURE_ALERT: case NetError.ERR_SSL_DECOMPRESSION_FAILURE_ALERT:
case NetError.ERR_SSL_BAD_RECORD_MAC_ALERT: case NetError.ERR_SSL_BAD_RECORD_MAC_ALERT:
case NetError.ERR_SSL_WEAK_SERVER_EPHEMERAL_DH_KEY:
case NetError.ERR_SSL_CLIENT_AUTH_PRIVATE_KEY_ACCESS_DENIED: case NetError.ERR_SSL_CLIENT_AUTH_PRIVATE_KEY_ACCESS_DENIED:
case NetError.ERR_SSL_CLIENT_AUTH_CERT_NO_PRIVATE_KEY: case NetError.ERR_SSL_CLIENT_AUTH_CERT_NO_PRIVATE_KEY:
return ERROR_FAILED_SSL_HANDSHAKE; return ERROR_FAILED_SSL_HANDSHAKE;
......
...@@ -45,8 +45,6 @@ namespace { ...@@ -45,8 +45,6 @@ namespace {
static const char kRedirectLoopLearnMoreUrl[] = static const char kRedirectLoopLearnMoreUrl[] =
"https://support.google.com/chrome?p=rl_error"; "https://support.google.com/chrome?p=rl_error";
static const char kWeakDHKeyLearnMoreUrl[] =
"https://support.google.com/chrome?p=dh_error";
static const int kGoogleCachedCopySuggestionType = 0; static const int kGoogleCachedCopySuggestionType = 0;
enum NAV_SUGGESTIONS { enum NAV_SUGGESTIONS {
...@@ -260,12 +258,6 @@ const LocalizedErrorMap net_error_options[] = { ...@@ -260,12 +258,6 @@ const LocalizedErrorMap net_error_options[] = {
SUGGEST_CHECK_CONNECTION | SUGGEST_FIREWALL_CONFIG | SUGGEST_PROXY_CONFIG, SUGGEST_CHECK_CONNECTION | SUGGEST_FIREWALL_CONFIG | SUGGEST_PROXY_CONFIG,
SHOW_BUTTON_RELOAD, SHOW_BUTTON_RELOAD,
}, },
{net::ERR_SSL_WEAK_SERVER_EPHEMERAL_DH_KEY,
IDS_ERRORPAGES_HEADING_INSECURE_CONNECTION,
IDS_ERRORPAGES_SUMMARY_SSL_SECURITY_ERROR,
SUGGEST_LEARNMORE,
SHOW_NO_BUTTONS,
},
{net::ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN, {net::ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN,
IDS_ERRORPAGES_HEADING_INSECURE_CONNECTION, IDS_ERRORPAGES_HEADING_INSECURE_CONNECTION,
IDS_CERT_ERROR_SUMMARY_PINNING_FAILURE_DETAILS, IDS_CERT_ERROR_SUMMARY_PINNING_FAILURE_DETAILS,
...@@ -592,9 +584,6 @@ void AddLinkedSuggestionToList(const int error_code, ...@@ -592,9 +584,6 @@ void AddLinkedSuggestionToList(const int error_code,
l10n_util::GetStringUTF16(IDS_ERRORPAGES_SUGGESTION_LEARNMORE_SUMMARY); l10n_util::GetStringUTF16(IDS_ERRORPAGES_SUGGESTION_LEARNMORE_SUMMARY);
switch (error_code) { switch (error_code) {
case net::ERR_SSL_WEAK_SERVER_EPHEMERAL_DH_KEY:
learn_more_url = GURL(kWeakDHKeyLearnMoreUrl);
break;
case net::ERR_TOO_MANY_REDIRECTS: case net::ERR_TOO_MANY_REDIRECTS:
learn_more_url = GURL(kRedirectLoopLearnMoreUrl); learn_more_url = GURL(kRedirectLoopLearnMoreUrl);
suggestion_string = l10n_util::GetStringUTF16( suggestion_string = l10n_util::GetStringUTF16(
......
...@@ -28,7 +28,6 @@ int IsCertErrorFatal(int cert_error) { ...@@ -28,7 +28,6 @@ int IsCertErrorFatal(int cert_error) {
case net::ERR_CERT_CONTAINS_ERRORS: case net::ERR_CERT_CONTAINS_ERRORS:
case net::ERR_CERT_REVOKED: case net::ERR_CERT_REVOKED:
case net::ERR_CERT_INVALID: case net::ERR_CERT_INVALID:
case net::ERR_SSL_WEAK_SERVER_EPHEMERAL_DH_KEY:
case net::ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN: case net::ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN:
return true; return true;
default: default:
......
...@@ -220,8 +220,7 @@ NET_ERROR(SSL_BAD_RECORD_MAC_ALERT, -126) ...@@ -220,8 +220,7 @@ NET_ERROR(SSL_BAD_RECORD_MAC_ALERT, -126)
// The proxy requested authentication (for tunnel establishment). // The proxy requested authentication (for tunnel establishment).
NET_ERROR(PROXY_AUTH_REQUESTED, -127) NET_ERROR(PROXY_AUTH_REQUESTED, -127)
// The SSL server attempted to use a weak ephemeral Diffie-Hellman key. // Error -129 was removed (SSL_WEAK_SERVER_EPHEMERAL_DH_KEY).
NET_ERROR(SSL_WEAK_SERVER_EPHEMERAL_DH_KEY, -129)
// Could not create a connection to the proxy server. An error occurred // Could not create a connection to the proxy server. An error occurred
// either in resolving its name, or in connecting a socket to it. // either in resolving its name, or in connecting a socket to it.
......
...@@ -101,8 +101,6 @@ int MapOpenSSLErrorSSL(uint32_t error_code) { ...@@ -101,8 +101,6 @@ int MapOpenSSLErrorSSL(uint32_t error_code) {
return ERR_SSL_DECRYPT_ERROR_ALERT; return ERR_SSL_DECRYPT_ERROR_ALERT;
case SSL_R_TLSV1_UNRECOGNIZED_NAME: case SSL_R_TLSV1_UNRECOGNIZED_NAME:
return ERR_SSL_UNRECOGNIZED_NAME_ALERT; return ERR_SSL_UNRECOGNIZED_NAME_ALERT;
case SSL_R_BAD_DH_P_LENGTH:
return ERR_SSL_WEAK_SERVER_EPHEMERAL_DH_KEY;
case SSL_R_SERVER_CERT_CHANGED: case SSL_R_SERVER_CERT_CHANGED:
return ERR_SSL_SERVER_CERT_CHANGED; return ERR_SSL_SERVER_CERT_CHANGED;
case SSL_R_WRONG_VERSION_ON_EARLY_DATA: case SSL_R_WRONG_VERSION_ON_EARLY_DATA:
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment