Index: net/socket/ssl_client_socket_nss.h |
diff --git a/net/socket/ssl_client_socket_nss.h b/net/socket/ssl_client_socket_nss.h |
index 7e75cd5e243ca67c821e146e9ab1b669182a7e4a..0aa2bad0e8fe7057fb341687948091f29da43c91 100644 |
--- a/net/socket/ssl_client_socket_nss.h |
+++ b/net/socket/ssl_client_socket_nss.h |
@@ -57,8 +57,6 @@ class SSLClientSocketNSS : public SSLClientSocket { |
const SSLClientSocketContext& context); |
virtual ~SSLClientSocketNSS(); |
- NET_EXPORT_PRIVATE static void ClearSessionCache(); |
- |
// SSLClientSocket implementation. |
virtual void GetSSLInfo(SSLInfo* ssl_info) OVERRIDE; |
virtual void GetSSLCertRequestInfo( |
@@ -278,6 +276,11 @@ class SSLClientSocketNSS : public SSLClientSocket { |
// True if the SSL handshake has been completed. |
bool completed_handshake_; |
+ // session_cache_shard_ is an opaque string that partitions the SSL session |
+ // cache. i.e. sessions created with one value will not attempt to resume on |
+ // the socket with a different value. |
+ const std::string session_cache_shard_; |
+ |
// True iff we believe that the user has an ESET product intercepting our |
// HTTPS connections. |
bool eset_mitm_detected_; |