Index: net/socket/ssl_client_socket_nss.h |
diff --git a/net/socket/ssl_client_socket_nss.h b/net/socket/ssl_client_socket_nss.h |
index 7a150ff80433fe9dbeb812556966e85c9972c4b0..f9e69c794cc0e10c575b40701418177a9ead601f 100644 |
--- a/net/socket/ssl_client_socket_nss.h |
+++ b/net/socket/ssl_client_socket_nss.h |
@@ -57,8 +57,6 @@ class SSLClientSocketNSS : public SSLClientSocket { |
const SSLClientSocketContext& context); |
virtual ~SSLClientSocketNSS(); |
- NET_EXPORT_PRIVATE static void ClearSessionCache(); |
- |
// SSLClientSocket implementation. |
virtual void GetSSLInfo(SSLInfo* ssl_info) OVERRIDE; |
virtual void GetSSLCertRequestInfo( |
@@ -269,6 +267,11 @@ class SSLClientSocketNSS : public SSLClientSocket { |
// True if the SSL handshake has been completed. |
bool completed_handshake_; |
+ // ssl_session_cache_shard_ is an opaque string that partitions the SSL |
+ // session cache. i.e. sessions created with one value will not attempt to |
+ // resume on the socket with a different value. |
+ const std::string ssl_session_cache_shard_; |
+ |
// True iff we believe that the user has an ESET product intercepting our |
// HTTPS connections. |
bool eset_mitm_detected_; |