| Index: net/third_party/nss/ssl/sslsock.c
 | 
| ===================================================================
 | 
| --- net/third_party/nss/ssl/sslsock.c	(revision 206496)
 | 
| +++ net/third_party/nss/ssl/sslsock.c	(working copy)
 | 
| @@ -796,10 +796,7 @@
 | 
|  	    rv = SECFailure;
 | 
|  	} else {
 | 
|              if (PR_FALSE != on) {
 | 
| -                /* PKCS#11 bypass is not supported with TLS 1.2. */
 | 
| -                if (ss->vrange.max >= SSL_LIBRARY_VERSION_TLS_1_2) {
 | 
| -                    ss->opt.bypassPKCS11 = PR_FALSE;
 | 
| -                } else if (PR_SUCCESS == SSL_BypassSetup() ) {
 | 
| +                if (PR_SUCCESS == SSL_BypassSetup() ) {
 | 
|  #ifdef NO_PKCS11_BYPASS
 | 
|                      ss->opt.bypassPKCS11 = PR_FALSE;
 | 
|  #else
 | 
| @@ -1964,10 +1961,6 @@
 | 
|  	}
 | 
|  	ss->vrange.max = SSL_LIBRARY_VERSION_TLS_1_1;
 | 
|      }
 | 
| -    /* PKCS#11 bypass is not supported with TLS 1.2. */
 | 
| -    if (ss->vrange.max >= SSL_LIBRARY_VERSION_TLS_1_2) {
 | 
| -	ss->opt.bypassPKCS11 = PR_FALSE;
 | 
| -    }
 | 
|  
 | 
|      ssl_ReleaseSSL3HandshakeLock(ss);
 | 
|      ssl_Release1stHandshakeLock(ss);
 | 
| 
 |