Tue, 06 Jan 2015 21:39:09 +0100
Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
1 /* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 2 -*- */
2 /* This Source Code Form is subject to the terms of the Mozilla Public
3 * License, v. 2.0. If a copy of the MPL was not distributed with this
4 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
6 #include "nsScriptableBase64Encoder.h"
7 #include "mozilla/Base64.h"
9 using namespace mozilla;
11 NS_IMPL_ISUPPORTS(nsScriptableBase64Encoder, nsIScriptableBase64Encoder)
13 /* ACString encodeToCString (in nsIInputStream stream, in unsigned long length); */
14 NS_IMETHODIMP
15 nsScriptableBase64Encoder::EncodeToCString(nsIInputStream *aStream,
16 uint32_t aLength,
17 nsACString & _retval)
18 {
19 Base64EncodeInputStream(aStream, _retval, aLength);
20 return NS_OK;
21 }
23 /* AString encodeToString (in nsIInputStream stream, in unsigned long length); */
24 NS_IMETHODIMP
25 nsScriptableBase64Encoder::EncodeToString(nsIInputStream *aStream,
26 uint32_t aLength,
27 nsAString & _retval)
28 {
29 Base64EncodeInputStream(aStream, _retval, aLength);
30 return NS_OK;
31 }