Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* This Source Code Form is subject to the terms of the Mozilla Public
3 * License, v. 2.0. If a copy of the MPL was not distributed with this
4 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
6 #ifndef mozilla_Base64_h__
7 #define mozilla_Base64_h__
9 #include "nsString.h"
11 class nsIInputStream;
13 namespace mozilla {
15 nsresult
16 Base64EncodeInputStream(nsIInputStream *aInputStream,
17 nsACString &aDest,
18 uint32_t aCount,
19 uint32_t aOffset = 0);
20 nsresult
21 Base64EncodeInputStream(nsIInputStream *aInputStream,
22 nsAString &aDest,
23 uint32_t aCount,
24 uint32_t aOffset = 0);
26 nsresult
27 Base64Encode(const nsACString &aString, nsACString &aBinary);
28 nsresult
29 Base64Encode(const nsAString &aString, nsAString &aBinaryData);
31 nsresult
32 Base64Decode(const nsACString &aBinaryData, nsACString &aString);
33 nsresult
34 Base64Decode(const nsAString &aBinaryData, nsAString &aString);
36 } // namespace mozilla
38 #endif