Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
1 /* This Source Code Form is subject to the terms of the Mozilla Public
2 * License, v. 2.0. If a copy of the MPL was not distributed with this file,
3 * You can obtain one at http://mozilla.org/MPL/2.0/. */
5 #include "domstubs.idl"
6 #include "nsIDOMTCPServerSocket.idl"
8 interface nsITCPServerSocketInternal;
10 /**
11 * Interface to allow the content process server socket to reach the IPC bridge.
12 * It is used in the server socket implementation on the child side.
13 */
15 [scriptable, uuid(41a77ec8-fd86-409e-aea9-af2ca407ef8e)]
16 interface nsITCPServerSocketChild : nsISupports
17 {
18 /**
19 * Tell the chrome process to listen on the port with the given parameters.
20 *
21 * @param serverSocket
22 * The server socket generated in the listen of nsIDOMTCPSocket
23 * on the child side.
24 * @param port
25 * The port of the server socket.
26 * @param backlog
27 * The maximum length the queue of pending connections may grow to.
28 * @param binaryType
29 * "arraybuffer" to use UInt8 array instances or "string" to use String.
30 */
31 [implicit_jscontext]
32 void listen(in nsITCPServerSocketInternal serverSocket, in unsigned short port,
33 in unsigned short backlog, in DOMString binaryType);
35 /**
36 * Tell the chrome process to close the server socket.
37 */
38 void close();
39 };