Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 diff a/security/manager/boot/src/PublicKeyPinningService.cpp b/security/manager/boot/src/PublicKeyPinningService.cpp (rejected hunks)
2 @@ -296,7 +296,8 @@ PublicKeyPinningService::ChainHasValidPins(const CERTCertList* certList,
3 if (!certList) {
4 return false;
5 }
6 - if (time > TimeFromElapsedSecondsAD(kPreloadPKPinsExpirationTime)) {
7 + if (time > TimeFromEpochInSeconds(kPreloadPKPinsExpirationTime /
8 + PR_USEC_PER_SEC)) {
9 return true;
10 }
11 if (!hostname || hostname[0] == 0) {