diff options
author | Jorge Arellano Cid <jcid@dillo.org> | 2011-05-17 18:58:20 -0400 |
---|---|---|
committer | Jorge Arellano Cid <jcid@dillo.org> | 2011-05-17 18:58:20 -0400 |
commit | 7f0e0e2d10099b8b81c8b43cc37a673fb5232989 (patch) | |
tree | b8c5ab62d0d206143b72751451309c96a59cccf8 /dpi/cookies.c | |
parent | 5bffa87a1d72795ae5c6a7a4778bf6f7323bb953 (diff) | |
parent | 53080478b0025ea89a594ec1282dcd1bd776ae89 (diff) |
merge
Diffstat (limited to 'dpi/cookies.c')
-rw-r--r-- | dpi/cookies.c | 14 |
1 files changed, 5 insertions, 9 deletions
diff --git a/dpi/cookies.c b/dpi/cookies.c index 5e85eefb..8adf59fd 100644 --- a/dpi/cookies.c +++ b/dpi/cookies.c @@ -13,13 +13,9 @@ * */ -/* This is written to follow the HTTP State Working Group's cookie draft - * standard, as of the version somewhere in the general neighbourhood of - * draft-ietf-httpstate-cookie-05.txt. - * TODO: They eventually succeeded in getting RFC 6265 out. What differences - * are there? +/* The current standard for cookies is RFC 6265. * - * Info on cookies in the wild: + * Info from 2009 on cookies in the wild: * http://www.ietf.org/mail-archive/web/http-state/current/msg00078.html * And dates specifically: * http://www.ietf.org/mail-archive/web/http-state/current/msg00128.html @@ -484,7 +480,7 @@ static int Cookies_get_month(const char *month_name) * * Return a pointer to a struct tm, or NULL on error. * - * NOTE that the draft spec wants user agents to be more flexible in what + * NOTE that the RFC wants user agents to be more flexible in what * they accept. For now, let's hack in special cases when they're encountered. * Why? Because this function is currently understandable, and I don't want to * abandon that (or at best decrease that -- see section 5.1.1) until there @@ -1139,8 +1135,8 @@ static bool_t Cookies_match(CookieData_t *cookie, const char *url_path, if (cookie->host_only != host_only_val) return FALSE; - /* Insecure cookies matches both secure and insecure urls, secure - cookies matches only secure urls */ + /* Insecure cookies match both secure and insecure urls, secure + cookies match only secure urls */ if (cookie->secure && !is_ssl) return FALSE; |