| Index: net/socket/ssl_client_socket_nss.h
|
| diff --git a/net/socket/ssl_client_socket_nss.h b/net/socket/ssl_client_socket_nss.h
|
| index 7e75cd5e243ca67c821e146e9ab1b669182a7e4a..0aa2bad0e8fe7057fb341687948091f29da43c91 100644
|
| --- a/net/socket/ssl_client_socket_nss.h
|
| +++ b/net/socket/ssl_client_socket_nss.h
|
| @@ -57,8 +57,6 @@ class SSLClientSocketNSS : public SSLClientSocket {
|
| const SSLClientSocketContext& context);
|
| virtual ~SSLClientSocketNSS();
|
|
|
| - NET_EXPORT_PRIVATE static void ClearSessionCache();
|
| -
|
| // SSLClientSocket implementation.
|
| virtual void GetSSLInfo(SSLInfo* ssl_info) OVERRIDE;
|
| virtual void GetSSLCertRequestInfo(
|
| @@ -278,6 +276,11 @@ class SSLClientSocketNSS : public SSLClientSocket {
|
| // True if the SSL handshake has been completed.
|
| bool completed_handshake_;
|
|
|
| + // session_cache_shard_ is an opaque string that partitions the SSL session
|
| + // cache. i.e. sessions created with one value will not attempt to resume on
|
| + // the socket with a different value.
|
| + const std::string session_cache_shard_;
|
| +
|
| // True iff we believe that the user has an ESET product intercepting our
|
| // HTTPS connections.
|
| bool eset_mitm_detected_;
|
|
|