Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /*
2 * Copyright 2013 Google Inc.
3 *
4 * Use of this source code is governed by a BSD-style license that can be
5 * found in the LICENSE file.
6 */
8 #include "SkFlattenableSerialization.h"
10 #include "SkData.h"
11 #include "SkValidatingReadBuffer.h"
12 #include "SkWriteBuffer.h"
14 SkData* SkValidatingSerializeFlattenable(SkFlattenable* flattenable) {
15 SkWriteBuffer writer(SkWriteBuffer::kValidation_Flag);
16 writer.writeFlattenable(flattenable);
17 size_t size = writer.bytesWritten();
18 void* data = sk_malloc_throw(size);
19 writer.writeToMemory(data);
20 return SkData::NewFromMalloc(data, size);
21 }
23 SkFlattenable* SkValidatingDeserializeFlattenable(const void* data, size_t size,
24 SkFlattenable::Type type) {
25 SkValidatingReadBuffer buffer(data, size);
26 return buffer.readFlattenable(type);
27 }