[tor-bugs] #14059 [Tor Browser]: Revision of existing double key cookie logic to meet requirements

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Feb 19 13:48:03 UTC 2015


#14059: Revision of existing double key cookie logic to meet requirements
-----------------------------+----------------------------
     Reporter:  michael      |      Owner:  michael
         Type:  defect       |     Status:  needs_revision
     Priority:  normal       |  Milestone:
    Component:  Tor Browser  |    Version:
   Resolution:               |   Keywords:
Actual Points:               |  Parent ID:  #3246
       Points:               |
-----------------------------+----------------------------

Comment (by gk):

 Replying to [comment:16 michael]:
 > Replying to [comment:15 gk]:
 > > 3) nsICookie2.idl: Why is `aOrigin` of type `ACString` and not
 `AUTF8String` (like `host`, `rawHost` etc.)?
 > >
 > Most host string variables in implementation files are of type
 `nsACString` or `nsCString` which implies the IDL variables should use
 `ACString`. I assumed that's why you and Dan Witte made it `ACString`, but
 I agree that there should be some conformance.
 >
 > Too bad there's so much AUTF8String already in nsCookie (frozen I think)
 so I'll change `origin` to be of type `AUTF8String` to conform.

 Well, I was just wondering for the rationale behind it and did not look
 that deep. I mainly feared that it could break the cookie logic in a
 subtle way but testing indicated that I was wrong. Or maybe my tests were
 not elaborate enough.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/14059#comment:19>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list