[tor-bugs] #14059 [Tor Browser]: Revision of existing double key cookie logic to meet requirements
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Feb 19 13:48:03 UTC 2015
#14059: Revision of existing double key cookie logic to meet requirements
-----------------------------+----------------------------
Reporter: michael | Owner: michael
Type: defect | Status: needs_revision
Priority: normal | Milestone:
Component: Tor Browser | Version:
Resolution: | Keywords:
Actual Points: | Parent ID: #3246
Points: |
-----------------------------+----------------------------
Comment (by gk):
Replying to [comment:16 michael]:
> Replying to [comment:15 gk]:
> > 3) nsICookie2.idl: Why is `aOrigin` of type `ACString` and not
`AUTF8String` (like `host`, `rawHost` etc.)?
> >
> Most host string variables in implementation files are of type
`nsACString` or `nsCString` which implies the IDL variables should use
`ACString`. I assumed that's why you and Dan Witte made it `ACString`, but
I agree that there should be some conformance.
>
> Too bad there's so much AUTF8String already in nsCookie (frozen I think)
so I'll change `origin` to be of type `AUTF8String` to conform.
Well, I was just wondering for the rationale behind it and did not look
that deep. I mainly feared that it could break the cookie logic in a
subtle way but testing indicated that I was wrong. Or maybe my tests were
not elaborate enough.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/14059#comment:19>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list