changelog
- Tue, 06 Jan 2015 21:39:09 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Tue, 06 Jan 2015 21:39:09 +0100] rev 8
- Conditionally force memory storage according to privacy.thirdparty.isolate;
This solves Tor bug #9701, complying with disk avoidance documented in
https://www.torproject.org/projects/torbrowser/design/#disk-avoidance.
- Sat, 03 Jan 2015 20:18:00 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Sat, 03 Jan 2015 20:18:00 +0100] rev 7
- Conditionally enable double key logic according to:
private browsing mode or privacy.thirdparty.isolate preference and
implement in GetCookieStringCommon and FindCookie where it counts...
With some reservations of how to convince FindCookie users to test
condition and pass a nullptr when disabling double key logic.
- Wed, 31 Dec 2014 13:27:57 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Wed, 31 Dec 2014 13:27:57 +0100] rev 6
- Ignore runtime configuration files generated during quality assurance.
- Wed, 31 Dec 2014 07:53:36 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Wed, 31 Dec 2014 07:53:36 +0100] rev 5
- Correct small whitespace inconsistency, lost while renaming variables.
- Wed, 31 Dec 2014 07:22:50 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Wed, 31 Dec 2014 07:22:50 +0100] rev 4
- Correct previous dual key logic pending first delivery installment.
- Wed, 31 Dec 2014 07:16:47 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Wed, 31 Dec 2014 07:16:47 +0100] rev 3
- Revert simplistic fix pending revisit of Mozilla integration attempt.
- Wed, 31 Dec 2014 06:55:50 +0100
- by Michael Schloh von Bennewitz <michael@schloh.com> [Wed, 31 Dec 2014 06:55:50 +0100] rev 2
- Added tag UPSTREAM_283F7C6 for changeset ca08bd8f51b2