Name Description Size
CSPEvalChecker.cpp static 5320
CSPEvalChecker.h 1021
CSPViolationData.cpp 2354
CSPViolationData.h 2026
DomSecurityIPCUtils.h 1222
DOMSecurityMonitor.cpp static 5220
DOMSecurityMonitor.h The fragment parser is triggered anytime JS calls innerHTML or similar JS functions which can generate HTML fragments. This generation of HTML might be dangerous, hence we should ensure that no new instances of innerHTML and similar functions are introduced in system privileged contexts, or also about: pages, in our codebase. If the auditor detects a new instance of innerHTML or similar function it will CRASH using a strong assertion. 1597
featurepolicy
FramingChecker.cpp static 8452
FramingChecker.h Logs to the window about a X-Frame-Options error. @param aMessageTag the error message identifier to log @param aChannel the HTTP Channel @param aURI the URI of the frame attempting to load @param aPolicy the header value string from the frame to the console. 1576
fuzztest
metrics.yaml 13532
moz.build 2072
nsContentSecurityManager.cpp static 66267
nsContentSecurityManager.h nsContentSecurityManager_h___ 4202
nsContentSecurityUtils.cpp A namespace class for static content security utilities. 58903
nsContentSecurityUtils.h A namespace class for static content security utilities. 4188
nsCSPContext.cpp This function is only used for verification purposes within GatherSecurityPolicyViolationEventData. 76112
nsCSPContext.h SetRequestContextWithDocument() needs to be called before the innerWindowID is initialized on the document. Use this function to call back to flush queued up console messages and initialize the innerWindowID. Node, If SetRequestContextWithPrincipal() was called then we do not have a innerWindowID anyway and hence we can not flush messages to the correct console. 9838
nsCSPParser.cpp ===== nsCSPParser ==================== 53014
nsCSPParser.h The CSP parser only has one publicly accessible function, which is parseContentSecurityPolicy. Internally the input string is separated into string tokens and policy() is called, which starts parsing the policy. The parser calls one function after the other according the the source-list from http://www.w3.org/TR/CSP11/#source-list. E.g., the parser can only call port() after the parser has already processed any possible host in host(), similar to a finite state machine. 8245
nsCSPService.cpp static 13880
nsCSPService.h nsCSPService_h___ 1773
nsCSPUtils.cpp 66796
nsCSPUtils.h =============== Logging =================== 26135
nsHTTPSOnlyStreamListener.cpp 9242
nsHTTPSOnlyStreamListener.h This event listener gets registered for requests that have been upgraded using the HTTPS-only mode to log failed upgrades to the console. 1533
nsHTTPSOnlyUtils.cpp static 47007
nsHTTPSOnlyUtils.h Returns if HTTPS-Only Mode preference is enabled @param aFromPrivateWindow true if executing in private browsing mode @return true if HTTPS-Only Mode is enabled 13264
nsIHttpsOnlyModePermission.idl HTTPS-Only/First permission types 1218
nsMixedContentBlocker.cpp nsIChannelEventSink implementation This code is called when a request is redirected. We check the channel associated with the new uri is allowed to load in the current context 41686
nsMixedContentBlocker.h daf1461b-bf29-4f88-8d0e-4bcdf332c862 3839
PolicyTokenizer.cpp 2289
PolicyTokenizer.h How does the parsing work? We generate tokens by splitting the policy-string by whitespace and semicolon. Interally the tokens are represented as an array of string-arrays: [ [ name, src, src, src, ... ], [ name, src, src, src, ... ], [ name, src, src, src, ... ] ] for example: [ [ img-src, http://www.example.com, http:www.test.com ], [ default-src, 'self'], [ script-src, 'unsafe-eval', 'unsafe-inline' ], ] 2095
ReferrerInfo.cpp Default referrer policy to use 54190
ReferrerInfo.h The ReferrerInfo class holds the raw referrer and potentially a referrer policy which allows to query the computed referrer which should be applied to a channel as the actual referrer value. The ReferrerInfo class solely contains readonly fields and represents a 1:1 sync to the referrer header of the corresponding channel. In turn that means the class is immutable - so any modifications require to clone the current ReferrerInfo. For example if a request undergoes a redirect, the new channel will need a new ReferrerInfo clone with members being updated accordingly. 16610
sanitizer
SecFetch.cpp 15356
SecFetch.h 857
SRICheck.cpp Returns whether or not the sub-resource about to be loaded is eligible for integrity checks. If it's not, the checks will be skipped and the sub-resource will be loaded. 17941
SRICheck.h Parse the multiple hashes specified in the integrity attribute and return the strongest supported hash. 3921
SRILogHelper.h 665
SRIMetadata.cpp 6291
SRIMetadata.h Create an empty metadata object. 2783
test
trusted-types