netwerk/base/public/nsIRandomGenerator.idl

Tue, 06 Jan 2015 21:39:09 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Tue, 06 Jan 2015 21:39:09 +0100
branch
TOR_BUG_9701
changeset 8
97036ab72558
permissions
-rw-r--r--

Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.

     1 /* This Source Code Form is subject to the terms of the Mozilla Public
     2  * License, v. 2.0. If a copy of the MPL was not distributed with this
     3  * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
     5 #include "nsISupports.idl"
     7 /**
     8  * Interface used to generate random data.
     9  *
    10  * @threadsafe
    11  */
    12 [scriptable, uuid(2362d97a-747a-4576-8863-697667309209)]
    13 interface nsIRandomGenerator : nsISupports {
    14   /**
    15    * Generates the specified amount of random bytes.
    16    *
    17    * @param aLength
    18    *        The length of the data to generate.
    19    * @param aBuffer
    20    *        A buffer that contains random bytes of size aLength.
    21    */
    22   void generateRandomBytes(in unsigned long aLength,
    23                            [retval, array, size_is(aLength)] out octet aBuffer);
    24 };

mercurial