Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* -*- Mode: C++; tab-width: 2; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* vim:set ts=2 sw=2 sts=2 et cindent: */
3 /* This Source Code Form is subject to the terms of the Mozilla Public
4 * License, v. 2.0. If a copy of the MPL was not distributed with this
5 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
7 #pragma once
9 #include "prio.h"
10 #include "nscore.h"
12 /**
13 * OpenAnonymousTemporaryFile
14 *
15 * Creates and opens a temporary file which has a random name. Callers have no
16 * control over the file name, and the file is opened in a temporary location
17 * which is appropriate for the platform.
18 *
19 * Upon success, aOutFileDesc contains an opened handle to the temporary file.
20 * The caller is responsible for closing the file when they're finished with it.
21 *
22 * The file will be deleted when the file handle is closed. On non-Windows
23 * platforms the file will be unlinked before this function returns. On Windows
24 * the OS supplied delete-on-close mechanism is unreliable if the application
25 * crashes or the computer power cycles unexpectedly, so unopened temporary
26 * files are purged at some time after application startup.
27 *
28 */
29 nsresult
30 NS_OpenAnonymousTemporaryFile(PRFileDesc** aOutFileDesc);