Remove Net.SSLSecureRenegotiation histogram
The histogram has expired and I don't currently have the cycles to chase
this one down. (On the client, the correct mitigation is to reject *all*
connections without renegotiation info, so this would only have been a
half-measure anyway.)
Bug: 975173
Change-Id: Ib64f4796abe057cf5df606c56926e45682d8cecc
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1727093
Commit-Queue: David Benjamin <davidben@chromium.org>
Reviewed-by: Ilya Sherman <isherman@chromium.org>
Reviewed-by: Steven Valdez <svaldez@chromium.org>
Cr-Commit-Position: refs/heads/master@{#683429}
diff --git a/net/socket/ssl_client_socket_impl.cc b/net/socket/ssl_client_socket_impl.cc
index f41357fb..2253e47 100644
--- a/net/socket/ssl_client_socket_impl.cc
+++ b/net/socket/ssl_client_socket_impl.cc
@@ -319,7 +319,6 @@
// Deduplicate all certificates minted from the SSL_CTX in memory.
SSL_CTX_set0_buffer_pool(ssl_ctx_.get(), x509_util::GetBufferPool());
- SSL_CTX_set_info_callback(ssl_ctx_.get(), InfoCallback);
SSL_CTX_set_msg_callback(ssl_ctx_.get(), MessageCallback);
#if !defined(NET_DISABLE_BROTLI)
@@ -390,11 +389,6 @@
GetInstance()->ssl_key_logger_->WriteLine(line);
}
- static void InfoCallback(const SSL* ssl, int type, int value) {
- SSLClientSocketImpl* socket = GetInstance()->GetClientSocketFromSSL(ssl);
- socket->InfoCallback(type, value);
- }
-
static void MessageCallback(int is_write,
int version,
int content_type,
@@ -1775,13 +1769,6 @@
RetryAllOperations();
}
-void SSLClientSocketImpl::InfoCallback(int type, int value) {
- if (type == SSL_CB_HANDSHAKE_START && completed_connect_) {
- UMA_HISTOGRAM_BOOLEAN("Net.SSLSecureRenegotiation",
- SSL_get_secure_renegotiation_support(ssl_.get()));
- }
-}
-
void SSLClientSocketImpl::MessageCallback(int is_write,
int content_type,
const void* buf,
diff --git a/net/socket/ssl_client_socket_impl.h b/net/socket/ssl_client_socket_impl.h
index a360025e..88bbc58 100644
--- a/net/socket/ssl_client_socket_impl.h
+++ b/net/socket/ssl_client_socket_impl.h
@@ -184,9 +184,6 @@
void OnPrivateKeyComplete(Error error, const std::vector<uint8_t>& signature);
- // Called from the BoringSSL info callback. (See |SSL_CTX_set_info_callback|.)
- void InfoCallback(int type, int value);
-
// Called whenever BoringSSL processes a protocol message.
void MessageCallback(int is_write,
int content_type,
diff --git a/tools/metrics/histograms/histograms.xml b/tools/metrics/histograms/histograms.xml
index ee525f7..de3367e 100644
--- a/tools/metrics/histograms/histograms.xml
+++ b/tools/metrics/histograms/histograms.xml
@@ -78347,6 +78347,9 @@
<histogram name="Net.SSLSecureRenegotiation" enum="BooleanSecure"
expires_after="M77">
+ <obsolete>
+ Removed in August 2019
+ </obsolete>
<owner>davidben@chromium.org</owner>
<summary>
For each attempted SSL renegotiation (non-initial handshake), whether the