File tree Expand file tree Collapse file tree 2 files changed +5
-8
lines changed
specs/subresourceintegrity Expand file tree Collapse file tree 2 files changed +5
-8
lines changed Original file line number Diff line number Diff line change @@ -424,7 +424,7 @@ <h4 id="priority">Priority</h4>
424
424
< h3 id ="response-verification-algorithms "> Response verification algorithms</ h3 >
425
425
426
426
< section >
427
- < h4 id ="apply-varalgorithmvar -to-varresponsevar "> Apply < var > algorithm</ var > to < var > response</ var > </ h4 >
427
+ < h4 id ="apply-algorithm -to-response "> Apply < var > algorithm</ var > to < var > response</ var > </ h4 >
428
428
429
429
< ol >
430
430
< li > Let < var > result</ var > be the result of < a href ="#apply-algorithm-to-response "> applying < var > algorithm</ var > </ a >
@@ -436,11 +436,10 @@ <h4 id="apply-varalgorithmvar-to-varresponsevar">Apply <var>algorithm</var> to <
436
436
< var > result</ var > .</ li >
437
437
< li > Return < var > encodedResult</ var > .</ li >
438
438
</ ol >
439
-
440
439
</ section >
441
440
<!-- Algorithms::apply -->
442
441
< section >
443
- < h4 id ="is-varresponsevar -eligible-for-integrity-validation "> Is < var > response</ var > eligible for integrity validation</ h4 >
442
+ < h4 id ="is-response -eligible-for-integrity-validation "> Is < var > response</ var > eligible for integrity validation</ h4 >
444
443
445
444
< p > In order to mitigate an attacker’s ability to read data cross-origin by
446
445
brute-forcing values via integrity checks, responses are only eligible for such
@@ -865,9 +864,6 @@ <h3 id="cross-origin-data-leakage">Cross-origin data leakage</h3>
865
864
common usernames, and specify those hashes while repeatedly attempting
866
865
to load the document.</ p >
867
866
868
- < p > User agents SHOULD mitigate the risk by refusing to fire < code > error</ code > events
869
- on elements which loaded non-CORS cross-origin resources, but
870
- some side-channels will likely be difficult to avoid.</ p >
871
867
</ section >
872
868
<!-- /Security::cross-origin -->
873
869
Original file line number Diff line number Diff line change @@ -301,6 +301,8 @@ only to simplify the algorithm description.
301
301
302
302
<section >
303
303
#### Apply <var >algorithm</var > to <var >response</var >
304
+ {: #apply-algorithm-to-response}
305
+ [ apply-algorithm ] : #apply-algorithm-to-response
304
306
305
307
1 . Let <var >result</var > be the result of [ applying <var >algorithm</var >] [ apply-algorithm ]
306
308
to the [ representation data] [ representationdata ] without any content-codings
@@ -310,11 +312,10 @@ only to simplify the algorithm description.
310
312
2 . Let <var >encodedResult</var > be result of base64-encoding
311
313
<var >result</var >.
312
314
3 . Return <var >encodedResult</var >.
313
-
314
- [ apply-algorithm ] : #apply-algorithm-to-response
315
315
</section ><!-- Algorithms::apply -->
316
316
<section >
317
317
#### Is <var >response</var > eligible for integrity validation
318
+ {: #is-response-eligible-for-integrity-validation}
318
319
[ eligible ] : #is-response-eligible-for-integrity-validation
319
320
320
321
In order to mitigate an attacker's ability to read data cross-origin by
You can’t perform that action at this time.
0 commit comments