[tor-bugs] #14059 [Tor Browser]: Revision of existing double key cookie logic to meet requirements

Tor Bug Tracker & Wiki blackhole at torproject.org
Fri Feb 6 13:18:49 UTC 2015


#14059: Revision of existing double key cookie logic to meet requirements
-------------------------+-------------------------------------------------
     Reporter:  michael  |      Owner:  michael
         Type:  defect   |     Status:  needs_information
     Priority:  normal   |  Milestone:
    Component:  Tor      |    Version:
  Browser                |   Keywords:  TorBrowserTeam201502R,
   Resolution:           |  GeorgKoppen201502R
Actual Points:           |  Parent ID:  #3246
       Points:           |
-------------------------+-------------------------------------------------

Comment (by gk):

 Here comes the first part of the review:

 1) nsCookie.*: looks good to me.
 2) CookieServiceParent.cpp: "Method is called nowhere" is not correct
 (anymore). CookieService* are for e10s (see:
 https://bugzilla.mozilla.org/show_bug.cgi?id=537156) which is already on
 Mozilla's dev channels activated. Eventually we need to port double keying
 to it, too. But at least the comment should make that clear.
 3) nsICookie2.idl: Why is `aOrigin` of type `ACString` and not
 `AUTF8String` (like `host`, `rawHost` etc.)?

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/14059#comment:15>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list