Index: net/socket/ssl_server_socket_nss.cc |
diff --git a/net/socket/ssl_server_socket_nss.cc b/net/socket/ssl_server_socket_nss.cc |
index 879a1fa179266e9c38a806c52fc8b564f1d01fad..7821d5ec763854da0233f9f8abb6fa5a7e23b287 100644 |
--- a/net/socket/ssl_server_socket_nss.cc |
+++ b/net/socket/ssl_server_socket_nss.cc |
@@ -53,13 +53,18 @@ namespace net { |
namespace { |
bool g_nss_server_sockets_init = false; |
+int g_max_session_id_cache_entries = 1024; |
+int g_ssl_session_id_cache_timeout = 5; |
class NSSSSLServerInitSingleton { |
public: |
NSSSSLServerInitSingleton() { |
EnsureNSSSSLInit(); |
- SSL_ConfigServerSessionIDCache(1024, 5, 5, NULL); |
+ SSL_ConfigServerSessionIDCache(g_max_session_id_cache_entries, |
+ g_ssl_session_id_cache_timeout, |
+ g_ssl_session_id_cache_timeout, |
+ NULL); |
g_nss_server_sockets_init = true; |
} |
@@ -74,6 +79,16 @@ static base::LazyInstance<NSSSSLServerInitSingleton> |
} // namespace |
+void SetSSLServerSessionCacheParameters( |
+ int max_session_id_cache_entries, |
+ int ssl_session_id_cache_timeout) { |
+ DCHECK(!g_nss_server_sockets_init) << "SetSSLServerSessionCacheParameters" |
+ << " cannot be called after" |
+ << " EnableSSLServerSockets."; |
+ g_max_session_id_cache_entries = max_session_id_cache_entries; |
+ g_ssl_session_id_cache_timeout = ssl_session_id_cache_timeout; |
+} |
+ |
void EnableSSLServerSockets() { |
g_nss_ssl_server_init_singleton.Get(); |
} |
@@ -84,7 +99,7 @@ scoped_ptr<SSLServerSocket> CreateSSLServerSocket( |
crypto::RSAPrivateKey* key, |
const SSLConfig& ssl_config) { |
DCHECK(g_nss_server_sockets_init) << "EnableSSLServerSockets() has not been" |
- << "called yet!"; |
+ << " called yet!"; |
return scoped_ptr<SSLServerSocket>( |
new SSLServerSocketNSS(socket.Pass(), cert, key, ssl_config)); |