Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* This Source Code Form is subject to the terms of the Mozilla Public
3 * License, v. 2.0. If a copy of the MPL was not distributed with this
4 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
6 #include "nsUnicodeToBIG5.h"
7 #include "nsUCvTWDll.h"
8 #include "nsUCConstructors.h"
10 //----------------------------------------------------------------------
11 // Global functions and data [declaration]
14 static const uint16_t *g_Big5MappingTable[2] = {
15 g_ASCIIMappingTable,
16 g_ufBig5Mapping
17 };
19 static const uScanClassID g_Big5ScanClassIDs[2] = {
20 u1ByteCharset,
21 u2BytesCharset
22 };
24 //----------------------------------------------------------------------
25 // Class nsUnicodeToBIG5 [implementation]
27 nsresult
28 nsUnicodeToBIG5Constructor(nsISupports *aOuter, REFNSIID aIID,
29 void **aResult)
30 {
32 return CreateMultiTableEncoder(2,
33 (uScanClassID*) &g_Big5ScanClassIDs,
34 (uMappingTable**) &g_Big5MappingTable,
35 2 /* max length = src * 2 */,
36 aOuter, aIID, aResult);
37 }