Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* This Source Code Form is subject to the terms of the Mozilla Public
2 * License, v. 2.0. If a copy of the MPL was not distributed with this
3 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
6 #include "nsISupports.idl"
8 /**
9 * An interface for verifying that a given string of data was signed by the
10 * private key matching the given public key.
11 */
12 [scriptable, uuid(0a84b3d5-6ba9-432d-89da-4fbd0b0f2aec)]
13 interface nsIDataSignatureVerifier : nsISupports
14 {
15 /**
16 * Verifies that the data matches the data that was used to generate the
17 * signature.
18 *
19 * @param aData The data to be tested.
20 * @param aSignature The signature of the data, base64 encoded.
21 * @param aPublicKey The public part of the key used for signing, DER encoded
22 * then base64 encoded.
23 * @returns true if the signature matches the data, false if not.
24 */
25 boolean verifyData(in ACString aData, in ACString aSignature, in ACString aPublicKey);
26 };