summaryrefslogtreecommitdiff
path: root/chromium/net/socket/client_socket_pool_manager.cc
diff options
context:
space:
mode:
Diffstat (limited to 'chromium/net/socket/client_socket_pool_manager.cc')
-rw-r--r--chromium/net/socket/client_socket_pool_manager.cc13
1 files changed, 5 insertions, 8 deletions
diff --git a/chromium/net/socket/client_socket_pool_manager.cc b/chromium/net/socket/client_socket_pool_manager.cc
index 3066171fc4a..c053b1f4c04 100644
--- a/chromium/net/socket/client_socket_pool_manager.cc
+++ b/chromium/net/socket/client_socket_pool_manager.cc
@@ -6,7 +6,6 @@
#include <string>
-#include "base/basictypes.h"
#include "base/logging.h"
#include "base/strings/stringprintf.h"
#include "net/base/load_flags.h"
@@ -39,14 +38,12 @@ static_assert(arraysize(g_max_sockets_per_pool) ==
// as home routers blocking the connections!?!? See http://crbug.com/12066.
//
// WebSocket connections are long-lived, and should be treated differently
-// than normal other connections. 6 connections per group sounded too small
-// for such use, thus we use a larger limit which was determined somewhat
-// arbitrarily.
-// TODO(yutak): Look at the usage and determine the right value after
-// WebSocket protocol stack starts to work.
+// than normal other connections. Use a limit of 255, so the limit for wss will
+// be the same as the limit for ws. Also note that Firefox uses a limit of 200.
+// See http://crbug.com/486800
int g_max_sockets_per_group[] = {
6, // NORMAL_SOCKET_POOL
- 30 // WEBSOCKET_SOCKET_POOL
+ 255 // WEBSOCKET_SOCKET_POOL
};
static_assert(arraysize(g_max_sockets_per_group) ==
@@ -146,7 +143,7 @@ int InitSocketPoolHelper(ClientSocketPoolManager::SocketGroupType group_type,
}
// Place sockets with and without deprecated ciphers into separate
// connection groups.
- if (ssl_config_for_origin.enable_deprecated_cipher_suites)
+ if (ssl_config_for_origin.deprecated_cipher_suites_enabled)
prefix += "deprecatedciphers/";
connection_group = prefix + connection_group;
}