Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* $NetBSD: res_private.h,v 1.1.1.1 2004/05/20 17:18:54 christos Exp $ */
3 /*
4 * This version of this file is derived from Android 2.3 "Gingerbread",
5 * which contains uncredited changes by Android/Google developers. It has
6 * been modified in 2011 for use in the Android build of Mozilla Firefox by
7 * Mozilla contributors (including Michael Edwards <m.k.edwards@gmail.com>,
8 * and Steve Workman <sjhworkman@gmail.com>).
9 * These changes are offered under the same license as the original NetBSD
10 * file, whose copyright and license are unchanged above.
11 */
13 #ifndef res_private_h
14 #define res_private_h
16 struct __res_state_ext {
17 union res_sockaddr_union nsaddrs[MAXNS];
18 struct sort_list {
19 int af;
20 union {
21 struct in_addr ina;
22 struct in6_addr in6a;
23 } addr, mask;
24 } sort_list[MAXRESOLVSORT];
25 char nsuffix[64];
26 char nsuffix2[64];
27 };
29 extern int
30 res_ourserver_p(const res_state statp, const struct sockaddr *sa);
32 #endif