Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
michael@0 | 1 | // IPassword.h |
michael@0 | 2 | |
michael@0 | 3 | #ifndef __IPASSWORD_H |
michael@0 | 4 | #define __IPASSWORD_H |
michael@0 | 5 | |
michael@0 | 6 | #include "../Common/MyUnknown.h" |
michael@0 | 7 | #include "../Common/Types.h" |
michael@0 | 8 | |
michael@0 | 9 | // MIDL_INTERFACE("23170F69-40C1-278A-0000-000500xx0000") |
michael@0 | 10 | #define PASSWORD_INTERFACE(i, x) \ |
michael@0 | 11 | DEFINE_GUID(IID_ ## i, \ |
michael@0 | 12 | 0x23170F69, 0x40C1, 0x278A, 0x00, 0x00, 0x00, 0x05, 0x00, x, 0x00, 0x00); \ |
michael@0 | 13 | struct i: public IUnknown |
michael@0 | 14 | |
michael@0 | 15 | PASSWORD_INTERFACE(ICryptoGetTextPassword, 0x10) |
michael@0 | 16 | { |
michael@0 | 17 | STDMETHOD(CryptoGetTextPassword)(BSTR *password) PURE; |
michael@0 | 18 | }; |
michael@0 | 19 | |
michael@0 | 20 | PASSWORD_INTERFACE(ICryptoGetTextPassword2, 0x11) |
michael@0 | 21 | { |
michael@0 | 22 | STDMETHOD(CryptoGetTextPassword2)(Int32 *passwordIsDefined, BSTR *password) PURE; |
michael@0 | 23 | }; |
michael@0 | 24 | |
michael@0 | 25 | #endif |
michael@0 | 26 |