Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 #
2 # This Source Code Form is subject to the terms of the Mozilla Public
3 # License, v. 2.0. If a copy of the MPL was not distributed with this
4 # file, You can obtain one at http://mozilla.org/MPL/2.0/.
5 CORE_DEPTH = ../..
7 LIBRARY_NAME = sectool
9 # MODULE public and private header directories are implicitly REQUIRED.
10 MODULE = nss
12 DEFINES = -DNSPR20
14 ifdef NSS_BUILD_SOFTOKEN_ONLY
15 PRIVATE_EXPORTS = basicutil.h \
16 pk11table.h \
17 $(NULL)
19 CSRCS = basicutil.c \
20 pk11table.c \
21 $(NULL)
22 else
23 PRIVATE_EXPORTS = basicutil.h \
24 secutil.h \
25 pk11table.h \
26 $(NULL)
28 CSRCS = basicutil.c \
29 secutil.c \
30 secpwd.c \
31 derprint.c \
32 moreoids.c \
33 pppolicy.c \
34 ffs.c \
35 pk11table.c \
36 $(NULL)
37 endif
39 NO_MD_RELEASE = 1