Searched refs:xss (Results 1 – 14 of 14) sorted by relevance
30 int xss; member
124 pr_reg[16] = regs->xss & 0xffff;
404 regs->xss = __USER_DS; \
393 2004-09-28 Andreas Haumer <andreas@xss.co.at>
10821 Fix enable-xss-auditor property documentation, and default value11051 Add a setting "enable-xss-auditor" to enable this feature.
13512 Test: http/tests/security/xss-DENIED-xsl-external-entity.xml13526 Test: http/tests/security/xss-DENIED-xsl-document.xml58924 Tests: http/tests/security/frameNavigation/xss-DENIED-plugin-navigation.html58925 http/tests/security/frameNavigation/xss-DENIED-targeted-link-navigation.html60111 Tests: http/tests/security/aboutBlank/xss-DENIED-navigate-opener-document-write.html60112 http/tests/security/aboutBlank/xss-DENIED-navigate-opener-javascript-url.html60113 http/tests/security/aboutBlank/xss-DENIED-set-opener.html71417 Test: http/tests/security/xss-DENIED-invalid-domain-change.html71447 Tests: http/tests/security/frameNavigation/xss-ALLOWED-parent-navigation-change.html71448 … http/tests/security/frameNavigation/xss-ALLOWED-targeted-subframe-navigation-change.html
12094 Test: http/tests/security/xss-DENIED-javascript-with-spaces.html23903 Test: http/tests/security/xss-DENIED-mime-type-execute-as-html.html30706 Test: http/tests/security/xss-DENIED-iframe-src-alias.html33225 http/tests/security/xssAuditor/xss-protection-parsing-01.html37300 Test: http/tests/security/xss-DENIED-window-open-javascript-url-leading-format-char.html53996 http/tests/security/xssAuditor/malformed-xss-protection-header.html
9506 Tests: http/tests/security/listener/xss-XMLHttpRequest-addEventListener.html9507 http/tests/security/listener/xss-XMLHttpRequest-shortcut.html9741 Tests: http/tests/security/listener/xss-JSTargetNode-onclick-addEventListener.html9742 http/tests/security/listener/xss-JSTargetNode-onclick-shortcut.html9743 http/tests/security/listener/xss-window-onclick-addEventListener.html9744 http/tests/security/listener/xss-window-onclick-shortcut.html
19133 Test: http/tests/security/xss-DENIED-window-open-javascript-url.html26263 http/tests/security/xss-DENIED-sandboxed-iframe.html57061 http/tests/security/xss-DENIED-defineProperty.html60300 Tests: http/tests/security/xss-DENIED-getSVGDocument-iframe.html60301 http/tests/security/xss-DENIED-getSVGDocument-object.html
17878 Test: http/tests/security/xss-DENIED-xml-external-entity.xhtml39746 running http/tests/security/xss-DENIED-xsl-document-redirect.xml73343 Tests: http/tests/security/xss-DENIED-xsl-document-redirect.xml73344 http/tests/security/xss-DENIED-xsl-external-entity-redirect.xml
54565 Test: http/tests/security/xss-DENIED-frame-name.html85857 fast/tokenizer/null-xss.html123532 http/tests/security/javascriptURL/xss-ALLOWED-from-javascript-url-window-open.html126645 * http/tests/security/xssAuditor/xss-protection-parsing-01.html
12203 Brandon removed disable-xss-protection in favor of unsafe-inline and27231 CSP implemented to see the effects of disable-xss-protection. Will
6792 http/tests/security/javascriptURL/xss-ALLOWED-from-javascript-url-window-open.html
2972 [Qt] REGRESSION (r72360): http/tests/security/aboutBlank/xss-DENIED-* tests fail