Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1179)

Unified Diff: net/socket/ssl_client_socket_nss.h

Issue 8857002: net: split the SSL session cache between incognito and normal. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: ... Created 9 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/socket/ssl_client_socket_nss.h
diff --git a/net/socket/ssl_client_socket_nss.h b/net/socket/ssl_client_socket_nss.h
index 7a150ff80433fe9dbeb812556966e85c9972c4b0..f9e69c794cc0e10c575b40701418177a9ead601f 100644
--- a/net/socket/ssl_client_socket_nss.h
+++ b/net/socket/ssl_client_socket_nss.h
@@ -57,8 +57,6 @@ class SSLClientSocketNSS : public SSLClientSocket {
const SSLClientSocketContext& context);
virtual ~SSLClientSocketNSS();
- NET_EXPORT_PRIVATE static void ClearSessionCache();
-
// SSLClientSocket implementation.
virtual void GetSSLInfo(SSLInfo* ssl_info) OVERRIDE;
virtual void GetSSLCertRequestInfo(
@@ -269,6 +267,11 @@ class SSLClientSocketNSS : public SSLClientSocket {
// True if the SSL handshake has been completed.
bool completed_handshake_;
+ // ssl_session_cache_shard_ is an opaque string that partitions the SSL
+ // session cache. i.e. sessions created with one value will not attempt to
+ // resume on the socket with a different value.
+ const std::string ssl_session_cache_shard_;
+
// True iff we believe that the user has an ESET product intercepting our
// HTTPS connections.
bool eset_mitm_detected_;

Powered by Google App Engine
This is Rietveld 408576698