Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
michael@0 | 1 | /* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 2 -*- */ |
michael@0 | 2 | /* This Source Code Form is subject to the terms of the Mozilla Public |
michael@0 | 3 | * License, v. 2.0. If a copy of the MPL was not distributed with this |
michael@0 | 4 | * file, You can obtain one at http://mozilla.org/MPL/2.0/. */ |
michael@0 | 5 | |
michael@0 | 6 | #ifndef mozilla_Base64_h__ |
michael@0 | 7 | #define mozilla_Base64_h__ |
michael@0 | 8 | |
michael@0 | 9 | #include "nsString.h" |
michael@0 | 10 | |
michael@0 | 11 | class nsIInputStream; |
michael@0 | 12 | |
michael@0 | 13 | namespace mozilla { |
michael@0 | 14 | |
michael@0 | 15 | nsresult |
michael@0 | 16 | Base64EncodeInputStream(nsIInputStream *aInputStream, |
michael@0 | 17 | nsACString &aDest, |
michael@0 | 18 | uint32_t aCount, |
michael@0 | 19 | uint32_t aOffset = 0); |
michael@0 | 20 | nsresult |
michael@0 | 21 | Base64EncodeInputStream(nsIInputStream *aInputStream, |
michael@0 | 22 | nsAString &aDest, |
michael@0 | 23 | uint32_t aCount, |
michael@0 | 24 | uint32_t aOffset = 0); |
michael@0 | 25 | |
michael@0 | 26 | nsresult |
michael@0 | 27 | Base64Encode(const nsACString &aString, nsACString &aBinary); |
michael@0 | 28 | nsresult |
michael@0 | 29 | Base64Encode(const nsAString &aString, nsAString &aBinaryData); |
michael@0 | 30 | |
michael@0 | 31 | nsresult |
michael@0 | 32 | Base64Decode(const nsACString &aBinaryData, nsACString &aString); |
michael@0 | 33 | nsresult |
michael@0 | 34 | Base64Decode(const nsAString &aBinaryData, nsAString &aString); |
michael@0 | 35 | |
michael@0 | 36 | } // namespace mozilla |
michael@0 | 37 | |
michael@0 | 38 | #endif |