Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
michael@0 | 1 | /* |
michael@0 | 2 | Copyright (c) 2007, Adobe Systems, Incorporated |
michael@0 | 3 | All rights reserved. |
michael@0 | 4 | |
michael@0 | 5 | Redistribution and use in source and binary forms, with or without |
michael@0 | 6 | modification, are permitted provided that the following conditions are |
michael@0 | 7 | met: |
michael@0 | 8 | |
michael@0 | 9 | * Redistributions of source code must retain the above copyright |
michael@0 | 10 | notice, this list of conditions and the following disclaimer. |
michael@0 | 11 | |
michael@0 | 12 | * Redistributions in binary form must reproduce the above copyright |
michael@0 | 13 | notice, this list of conditions and the following disclaimer in the |
michael@0 | 14 | documentation and/or other materials provided with the distribution. |
michael@0 | 15 | |
michael@0 | 16 | * Neither the name of Adobe Systems, Network Resonance nor the names of its |
michael@0 | 17 | contributors may be used to endorse or promote products derived from |
michael@0 | 18 | this software without specific prior written permission. |
michael@0 | 19 | |
michael@0 | 20 | THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
michael@0 | 21 | "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
michael@0 | 22 | LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
michael@0 | 23 | A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
michael@0 | 24 | OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
michael@0 | 25 | SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
michael@0 | 26 | LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
michael@0 | 27 | DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
michael@0 | 28 | THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
michael@0 | 29 | (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
michael@0 | 30 | OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
michael@0 | 31 | */ |
michael@0 | 32 | |
michael@0 | 33 | |
michael@0 | 34 | |
michael@0 | 35 | static char *RCSSTRING __UNUSED__="$Id: nr_crypto.c,v 1.2 2008/04/28 17:59:01 ekr Exp $"; |
michael@0 | 36 | |
michael@0 | 37 | #include <nr_api.h> |
michael@0 | 38 | #include "nr_crypto.h" |
michael@0 | 39 | |
michael@0 | 40 | static int nr_ice_crypto_dummy_random_bytes(UCHAR *buf, int len) |
michael@0 | 41 | { |
michael@0 | 42 | fprintf(stderr,"Need to define crypto API implementation\n"); |
michael@0 | 43 | |
michael@0 | 44 | exit(1); |
michael@0 | 45 | } |
michael@0 | 46 | |
michael@0 | 47 | static int nr_ice_crypto_dummy_hmac_sha1(UCHAR *key, int key_l, UCHAR *buf, int buf_l, UCHAR digest[20]) |
michael@0 | 48 | { |
michael@0 | 49 | fprintf(stderr,"Need to define crypto API implementation\n"); |
michael@0 | 50 | |
michael@0 | 51 | exit(1); |
michael@0 | 52 | } |
michael@0 | 53 | |
michael@0 | 54 | static int nr_ice_crypto_dummy_md5(UCHAR *buf, int buf_l, UCHAR digest[16]) |
michael@0 | 55 | { |
michael@0 | 56 | fprintf(stderr,"Need to define crypto API implementation\n"); |
michael@0 | 57 | |
michael@0 | 58 | exit(1); |
michael@0 | 59 | } |
michael@0 | 60 | |
michael@0 | 61 | static nr_ice_crypto_vtbl nr_ice_crypto_dummy_vtbl= { |
michael@0 | 62 | nr_ice_crypto_dummy_random_bytes, |
michael@0 | 63 | nr_ice_crypto_dummy_hmac_sha1, |
michael@0 | 64 | nr_ice_crypto_dummy_md5 |
michael@0 | 65 | }; |
michael@0 | 66 | |
michael@0 | 67 | |
michael@0 | 68 | |
michael@0 | 69 | nr_ice_crypto_vtbl *nr_crypto_vtbl=&nr_ice_crypto_dummy_vtbl; |
michael@0 | 70 | |
michael@0 | 71 |