| Index: net/ssl/ssl_client_session_cache.cc
|
| diff --git a/net/ssl/ssl_client_session_cache.cc b/net/ssl/ssl_client_session_cache.cc
|
| index a21d680b1df7364bbdd03aab70e99a4d59f8390f..e2c32c5b9d35366adca4d47e2d6855011dcfa924 100644
|
| --- a/net/ssl/ssl_client_session_cache.cc
|
| +++ b/net/ssl/ssl_client_session_cache.cc
|
| @@ -142,15 +142,11 @@ void SSLClientSessionCache::DumpMemoryStats(
|
| size_t pair_cert_count = sk_CRYPTO_BUFFER_num(session->certs);
|
| for (size_t i = 0; i < pair_cert_count; ++i) {
|
| const CRYPTO_BUFFER* cert = sk_CRYPTO_BUFFER_value(session->certs, i);
|
| - // TODO(xunjieli): The multipler is added to account for the difference
|
| - // between the serialized form and real cert allocation. Remove after
|
| - // crbug.com/671420 is done.
|
| - size_t individual_cert_size = 4 * CRYPTO_BUFFER_len(cert);
|
| - undeduped_cert_size += individual_cert_size;
|
| + undeduped_cert_size += CRYPTO_BUFFER_len(cert);
|
| auto result = crypto_buffer_set.insert(cert);
|
| if (!result.second)
|
| continue;
|
| - cert_size += individual_cert_size;
|
| + cert_size += CRYPTO_BUFFER_len(cert);
|
| cert_count++;
|
| }
|
| }
|
|
|