DescriptionRemove dead code in client auth logic.
Both socket implementations have client auth logic to remove a session from the
session cache in case of client auth. In both cases, this doesn't do anything.
The OpenSSL one was copied from the NSS one. It was always dead code and became
a no-op when we stopped using the internal session cache (see
https://crbug.com/466352).
The NSS one dates to http://codereview.chromium.org/276037. At that time, we
returned SECFailure rather than SECWouldBlock, so the handshake would continue
and potentially poison the session cache. As of
http://codereview.chromium.org/669198, this was no longer an issue.
BUG=none
Committed: https://crrev.com/8114f805d2c7ac5692bbf8c854146196cffed11c
Cr-Commit-Position: refs/heads/master@{#322178}
Patch Set 1 #
Messages
Total messages: 13 (4 generated)
|