Remove dead code in client auth logic.
Both socket implementations have client auth logic to remove a session from the session cache in case of client auth. In both cases, this doesn't do anything. The OpenSSL one was copied from the NSS one. It was always dead code and became a no-op when we stopped using the internal session cache (see https://crbug.com/466352). The NSS one dates to http://codereview.chromium.org/276037. At that time, we returned SECFailure rather than SECWouldBlock, so the handshake would continue and potentially poison the session cache. As of http://codereview.chromium.org/669198, this was no longer an issue. BUG=none Review URL: https://codereview.chromium.org/1013193004 Cr-Commit-Position: refs/heads/master@{#322178}
Showing
Please register or sign in to comment