| Index: net/socket/ssl_client_socket_nss.cc
|
| diff --git a/net/socket/ssl_client_socket_nss.cc b/net/socket/ssl_client_socket_nss.cc
|
| index c303829f9cdb17391bc580d839ff3e19d30577ca..271a8b622051b50f2ae539df47a76d26f4c0ea3f 100644
|
| --- a/net/socket/ssl_client_socket_nss.cc
|
| +++ b/net/socket/ssl_client_socket_nss.cc
|
| @@ -1074,21 +1074,11 @@ bool SSLClientSocketNSS::Core::Init(PRFileDesc* socket,
|
| }
|
|
|
| if (ssl_config_.channel_id_enabled) {
|
| - // TODO(mattm): we can do this check on the network task runner only because
|
| - // we use the NSS internal slot. If we support other slots in the future,
|
| - // checking whether they support ECDSA may block NSS, and thus this check
|
| - // would have to be moved to the NSS task runner.
|
| - crypto::ScopedPK11Slot slot(crypto::GetPublicNSSKeySlot());
|
| - if (PK11_DoesMechanism(slot.get(), CKM_EC_KEY_PAIR_GEN) &&
|
| - PK11_DoesMechanism(slot.get(), CKM_ECDSA)) {
|
| - rv = SSL_SetClientChannelIDCallback(
|
| - nss_fd_, SSLClientSocketNSS::Core::ClientChannelIDHandler, this);
|
| - if (rv != SECSuccess)
|
| - LogFailedNSSFunction(*weak_net_log_, "SSL_SetClientChannelIDCallback",
|
| - "");
|
| - } else {
|
| - DVLOG(1) << "Elliptic Curve not supported, not enabling channel ID.";
|
| - }
|
| + rv = SSL_SetClientChannelIDCallback(
|
| + nss_fd_, SSLClientSocketNSS::Core::ClientChannelIDHandler, this);
|
| + if (rv != SECSuccess)
|
| + LogFailedNSSFunction(*weak_net_log_, "SSL_SetClientChannelIDCallback",
|
| + "");
|
| }
|
|
|
| rv = SSL_HandshakeCallback(
|
|
|