Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(17)

Unified Diff: net/socket/ssl_client_socket_nss.h

Issue 8857002: net: split the SSL session cache between incognito and normal. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: ... Created 9 years ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: net/socket/ssl_client_socket_nss.h
diff --git a/net/socket/ssl_client_socket_nss.h b/net/socket/ssl_client_socket_nss.h
index 7e75cd5e243ca67c821e146e9ab1b669182a7e4a..0aa2bad0e8fe7057fb341687948091f29da43c91 100644
--- a/net/socket/ssl_client_socket_nss.h
+++ b/net/socket/ssl_client_socket_nss.h
@@ -57,8 +57,6 @@ class SSLClientSocketNSS : public SSLClientSocket {
const SSLClientSocketContext& context);
virtual ~SSLClientSocketNSS();
- NET_EXPORT_PRIVATE static void ClearSessionCache();
-
// SSLClientSocket implementation.
virtual void GetSSLInfo(SSLInfo* ssl_info) OVERRIDE;
virtual void GetSSLCertRequestInfo(
@@ -278,6 +276,11 @@ class SSLClientSocketNSS : public SSLClientSocket {
// True if the SSL handshake has been completed.
bool completed_handshake_;
+ // session_cache_shard_ is an opaque string that partitions the SSL session
+ // cache. i.e. sessions created with one value will not attempt to resume on
+ // the socket with a different value.
+ const std::string session_cache_shard_;
+
// True iff we believe that the user has an ESET product intercepting our
// HTTPS connections.
bool eset_mitm_detected_;

Powered by Google App Engine
This is Rietveld 408576698