Index: net/socket/ssl_client_socket_nss.cc |
diff --git a/net/socket/ssl_client_socket_nss.cc b/net/socket/ssl_client_socket_nss.cc |
index 78e936b2d453463b9d56d4cdfadd6dc0b7827eda..547ab7650c5d74a936805dcf28311c6a62d0603f 100644 |
--- a/net/socket/ssl_client_socket_nss.cc |
+++ b/net/socket/ssl_client_socket_nss.cc |
@@ -1857,14 +1857,6 @@ int SSLClientSocketNSS::Core::DoHandshake() { |
base::Bind(&AddLogEventWithCallback, weak_net_log_, |
NetLog::TYPE_SSL_HANDSHAKE_ERROR, |
CreateNetLogSSLErrorCallback(net_error, 0))); |
- |
- // If the handshake already succeeded (because the server requests but |
- // doesn't require a client cert), we need to invalidate the SSL session |
- // so that we won't try to resume the non-client-authenticated session in |
- // the next handshake. This will cause the server to ask for a client |
- // cert again. |
- if (rv == SECSuccess && SSL_InvalidateSession(nss_fd_) != SECSuccess) |
- LOG(WARNING) << "Couldn't invalidate SSL session: " << PR_GetError(); |
} else if (rv == SECSuccess) { |
if (!handshake_callback_called_) { |
false_started_ = true; |