@@ -380,7 +380,7 @@ <h4 id="agility">Agility</h4>
380
380
381
381
< p > In this case, the user agent will choose the strongest hash function in the
382
382
list, and use that metadata to validate the response (as described below in
383
- the “< a href ="#parse-metadata.x "> parse metadata</ a > ” and “< a href ="#get-the-strongest-metadata-from-set.x "> get the strongest metadata from
383
+ the “< a href ="#parse-metadata "> parse metadata</ a > ” and “< a href ="#get-the-strongest-metadata-from-set "> get the strongest metadata from
384
384
set</ a > ” algorithms).</ p >
385
385
386
386
< p > When a hash function is determined to be insecure, user agents SHOULD deprecate
@@ -424,7 +424,7 @@ <h4 id="priority">Priority</h4>
424
424
< h3 id ="response-verification-algorithms "> Response verification algorithms</ h3 >
425
425
426
426
< section >
427
- < h4 id ="apply-varalgorithmvar -to-varresponsevar "> Apply < var > algorithm</ var > to < var > response</ var > </ h4 >
427
+ < h4 id ="apply-algorithm -to-response "> Apply < var > algorithm</ var > to < var > response</ var > </ h4 >
428
428
429
429
< ol >
430
430
< li > Let < var > result</ var > be the result of < a href ="#apply-algorithm-to-response "> applying < var > algorithm</ var > </ a >
@@ -436,11 +436,10 @@ <h4 id="apply-varalgorithmvar-to-varresponsevar">Apply <var>algorithm</var> to <
436
436
< var > result</ var > .</ li >
437
437
< li > Return < var > encodedResult</ var > .</ li >
438
438
</ ol >
439
-
440
439
</ section >
441
440
<!-- Algorithms::apply -->
442
441
< section >
443
- < h4 id ="is-varresponsevar -eligible-for-integrity-validation "> Is < var > response</ var > eligible for integrity validation</ h4 >
442
+ < h4 id ="is-response -eligible-for-integrity-validation "> Is < var > response</ var > eligible for integrity validation</ h4 >
444
443
445
444
< p > In order to mitigate an attacker’s ability to read data cross-origin by
446
445
brute-forcing values via integrity checks, responses are only eligible for such
@@ -481,7 +480,7 @@ <h4 id="is-varresponsevar-eligible-for-integrity-validation">Is <var>response</v
481
480
</ section >
482
481
<!-- Algorithms::eligible -->
483
482
< section >
484
- < h4 id ="parse-varmetadatavar "> Parse < var > metadata</ var > .</ h4 >
483
+ < h4 id ="parse-metadata "> Parse < var > metadata</ var > .</ h4 >
485
484
486
485
< p > This algorithm accepts a string, and returns either < code > no metadata</ code > , or a set of
487
486
valid hash expressions whose hash functions are understood by
@@ -508,7 +507,7 @@ <h4 id="parse-varmetadatavar">Parse <var>metadata</var>.</h4>
508
507
</ section >
509
508
<!-- Algorithms::parse -->
510
509
< section >
511
- < h4 id ="get-the-strongest-metadata-from-varsetvar "> Get the strongest metadata from < var > set</ var > .</ h4 >
510
+ < h4 id ="get-the-strongest-metadata-from-set "> Get the strongest metadata from < var > set</ var > .</ h4 >
512
511
513
512
< ol >
514
513
< li > Let < var > result</ var > be the empty set and < var > strongest</ var > be the empty
@@ -535,15 +534,15 @@ <h4 id="get-the-strongest-metadata-from-varsetvar">Get the strongest metadata fr
535
534
</ section >
536
535
<!-- /Algorithms::get the strongest metadata -->
537
536
< section >
538
- < h4 id ="does-varresponsevar -match-varmetadatalistvar "> Does < var > response</ var > match < var > metadataList</ var > ?</ h4 >
537
+ < h4 id ="does-response -match-metadatalist "> Does < var > response</ var > match < var > metadataList</ var > ?</ h4 >
539
538
540
539
< ol >
541
540
< li > Let < var > parsedMetadata</ var > be the result of
542
- < a href ="#parse-metadata.x "> parsing < var > metadataList</ var > </ a > .</ li >
541
+ < a href ="#parse-metadata "> parsing < var > metadataList</ var > </ a > .</ li >
543
542
< li > If < var > parsedMetadata</ var > is < code > no metadata</ code > , return < code > true</ code > .</ li >
544
543
< li > If < a href ="#is-response-eligible-for-integrity-validation "> < var > response</ var > is not eligible for integrity
545
544
validation</ a > , return < code > true</ code > .</ li >
546
- < li > Let < var > metadata</ var > be the result of < a href ="#get-the-strongest-metadata-from-set.x "> getting the strongest
545
+ < li > Let < var > metadata</ var > be the result of < a href ="#get-the-strongest-metadata-from-set "> getting the strongest
547
546
metadata from < var > parsedMetadata</ var > </ a > .</ li >
548
547
< li > For each < var > item</ var > in < var > metadata</ var > :
549
548
< ol >
@@ -586,7 +585,6 @@ <h4 id="does-varresponsevar-match-varmetadatalistvar">Does <var>response</var> m
586
585
same-origin or CORS) should fail open since they are not the result of an attack
587
586
in the threat model of this specification. However, user agents SHOULD report
588
587
a warning message about this failure in the developer console.</ p >
589
-
590
588
</ section >
591
589
<!-- Algorithms::Match -->
592
590
</ section >
@@ -865,9 +863,6 @@ <h3 id="cross-origin-data-leakage">Cross-origin data leakage</h3>
865
863
common usernames, and specify those hashes while repeatedly attempting
866
864
to load the document.</ p >
867
865
868
- < p > User agents SHOULD mitigate the risk by refusing to fire < code > error</ code > events
869
- on elements which loaded non-CORS cross-origin resources, but
870
- some side-channels will likely be difficult to avoid.</ p >
871
866
</ section >
872
867
<!-- /Security::cross-origin -->
873
868
0 commit comments